IOC Report
test.ps1

loading gif

Files

File Path
Type
Category
Malicious
test.ps1
ASCII text, with very long lines (702), with no line terminators
initial sample
malicious
C:\Users\Public\ajbs50ul.bat
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\4smg.ini
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\oSyU.ini
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\Desktop\utox_x86_x64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\regsvr32.EXE.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1fpywe1a.3ki.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ed4h13m.zby.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5hfinaoj.cmb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bi5apl12.bus.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d0rpsldo.xy0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_odght2dz.fko.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rmehz2qx.pdv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s0z2xbau.5dc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v2o35p3n.u3c.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vbeuk0i1.rlf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\second_data_temp.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\W72MS75UTRADULZQLMHG.temp
data
dropped
C:\Users\user\AppData\Roaming\Tox\tox_save.tox
data
dropped
C:\Users\user\AppData\Roaming\Tox\utox_save.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Tox\utox_save.in~
Generic INItialization configuration [interface]
dropped
There are 13 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\test.ps1"
malicious
C:\Users\Public\ajbs50ul.bat
"C:\Users\Public\ajbs50ul.bat"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/s /i:INSTALL C:\Users\user\AppData/Roaming/4smg.ini\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{C804C8C0-8CC0-4804-C048-00888CC0048C}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries)"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\user\AppData/Roaming/4smg.ini
malicious
C:\Users\user\Desktop\utox_x86_x64.exe
"C:\Users\user\Desktop\utox_x86_x64.exe"
malicious
C:\Windows\System32\OpenWith.exe
"C:\Windows\system32\openwith.exe"
malicious
C:\Windows\System32\regsvr32.exe
"regsvr32" /s /i:INSTALL C:\Users\user\AppData/Roaming/4smg.ini
malicious
C:\Program Files\Windows Media Player\wmpnscfg.exe
"C:\Program Files\Windows Media Player\wmpnscfg.exe"
malicious
C:\Windows\System32\dllhost.exe
"C:\Windows\system32\dllhost.exe"
malicious
C:\Windows\System32\rekeywiz.exe
"C:\Windows\system32\rekeywiz.exe"
malicious
C:\Windows\System32\rekeywiz.exe
"C:\Windows\system32\rekeywiz.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/s /i:INSTALL C:\Users\user\AppData/Roaming/oSyU.ini\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{848CC004-CC00-4888-C000-44488CCC0488}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries)"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\user\AppData/Roaming/oSyU.ini
malicious
C:\Windows\System32\regsvr32.exe
"regsvr32" /s /i:INSTALL C:\Users\user\AppData/Roaming/oSyU.ini
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
malicious
https://go.micro
unknown
malicious
https://147.45.126.71:3752/20846e26ac9fe96c52/8ackhmnt.9e5wm
malicious
https://github.com/Pester/Pester
unknown
malicious
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
https://discord.com
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://discordapp.com
unknown
https://contoso.com/Icon
unknown
https://rocketdocs.lol/utox_x86.exe
188.114.97.3
https://rocketdocs.lol
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://bemostake.space/test/ast21/g341g43134g/2245h1234/f21f2123/Rh-416-72-341-23.exe
188.114.96.3
http://rocketdocs.lol
unknown
https://aka.ms/pscore68
unknown
https://bemostake.space/test/ast21/g341g43134g/2245h1234/f21f2123/Rh-416-72-341-23.exeHtj
unknown
http://bemostake.space
unknown
https://bemostake.space
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 15 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bemostake.space
188.114.96.3
bg.microsoft.map.fastly.net
199.232.210.172
rocketdocs.lol
188.114.97.3
241.42.69.40.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.7
unknown
unknown
malicious
46.29.238.96
unknown
Russian Federation
malicious
147.45.126.71
unknown
Russian Federation
malicious
104.223.122.15
unknown
United States
malicious
185.196.9.174
unknown
Switzerland
malicious
195.93.190.6
unknown
Ukraine
192.168.2.8
unknown
unknown
104.233.104.126
unknown
Saudi Arabia
148.251.23.146
unknown
Germany
163.172.136.118
unknown
United Kingdom
192.168.2.9
unknown
unknown
95.215.44.78
unknown
Latvia
193.124.186.205
unknown
Russian Federation
192.168.2.5
unknown
unknown
8.8.8.8
unknown
United States
37.97.185.116
unknown
Netherlands
130.133.110.14
unknown
Germany
194.249.212.109
unknown
Slovenia
136.243.141.187
unknown
Germany
37.187.122.30
unknown
France
185.14.30.213
unknown
Ukraine
185.58.206.164
unknown
Russian Federation
51.254.84.212
unknown
France
80.87.193.193
unknown
Russian Federation
46.229.52.198
unknown
Ukraine
188.114.97.3
rocketdocs.lol
European Union
205.185.116.116
unknown
United States
85.21.144.224
unknown
Russian Federation
188.114.96.3
bemostake.space
European Union
192.168.2.255
unknown
unknown
198.98.51.198
unknown
United States
There are 21 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\SibCode
sn2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit
Version
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1BD8812D000
heap
page read and write
malicious
3121000
trusted library allocation
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD854A0000
direct allocation
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD88031000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
30E0000
direct allocation
page read and write
malicious
1C0C1000
direct allocation
page execute and read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
1BD8812D000
heap
page read and write
malicious
30E0000
trusted library allocation
page read and write
203FED6F000
unkown
page read and write
7FFAAC6C0000
trusted library allocation
page read and write
8D9D0FB000
stack
page read and write
1B023000
trusted library allocation
page read and write
1BD88055000
heap
page read and write
1BD880C8000
heap
page read and write
7FFAAC580000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
1BD880DF000
heap
page read and write
1AFB0000
trusted library allocation
page read and write
2B1F9FCF000
heap
page read and write
1B730000
trusted library allocation
page read and write
7FFAAC4D2000
trusted library allocation
page read and write
2B1F9FD3000
heap
page read and write
1BD8759D000
heap
page read and write
1BD877CF000
heap
page read and write
1BD877D6000
heap
page read and write
1D896530000
heap
page read and write
7FFAAC320000
trusted library allocation
page read and write
1BDF0000
trusted library allocation
page read and write
1BD8779C000
heap
page read and write
203FEE72000
heap
page read and write
1B730000
trusted library allocation
page read and write
1BD87616000
heap
page read and write
E4C1EFE000
stack
page read and write
1BD85340000
unkown
page execute and read and write
E4C1F79000
stack
page read and write
1BB80000
trusted library allocation
page read and write
1BD87B10000
unkown
page read and write
7FF79E8F0000
unkown
page readonly
1BD877F0000
heap
page read and write
D1E000
heap
page read and write
1BD877A5000
heap
page read and write
1B023000
trusted library allocation
page read and write
7FFAAC430000
trusted library allocation
page execute and read and write
51A7000
heap
page read and write
1BD877C0000
heap
page read and write
1D8B07E6000
heap
page read and write
1B020000
trusted library allocation
page read and write
2253000
trusted library allocation
page read and write
1BB83000
trusted library allocation
page read and write
1BD880C7000
heap
page read and write
1BD87830000
unkown
page read and write
B78000
stack
page read and write
7FFAAC400000
trusted library allocation
page execute and read and write
1BD877BA000
heap
page read and write
1B8D0000
trusted library allocation
page read and write
2F20000
trusted library section
page read and write
1BD8778D000
heap
page read and write
1B745000
trusted library allocation
page read and write
1BC60000
trusted library allocation
page read and write
2A21000
heap
page read and write
D44000
heap
page read and write
1BD8822A000
heap
page read and write
1BD8822A000
heap
page read and write
1BB40000
trusted library allocation
page read and write
1BD87604000
heap
page read and write
E4C2038000
stack
page read and write
1BDA0000
trusted library allocation
page read and write
401000
unkown
page execute read
D94000
heap
page read and write
23BE000
trusted library allocation
page read and write
7FFAAC770000
trusted library allocation
page read and write
1B651000
trusted library allocation
page read and write
1BD880DF000
heap
page read and write
1B09B000
stack
page read and write
1B8C0000
trusted library allocation
page read and write
1BD90000
trusted library allocation
page read and write
1BD87830000
unkown
page read and write
1BD877A5000
heap
page read and write
1BD880AE000
heap
page read and write
1BD875A6000
heap
page read and write
1BD8757E000
heap
page read and write
1B660000
trusted library allocation
page read and write
1B740000
trusted library allocation
page read and write
1BDED000
trusted library allocation
page read and write
2B1F9BF0000
heap
page read and write
1B023000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
1B8D0000
trusted library allocation
page read and write
1BD880E7000
heap
page read and write
7FFAAC450000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
899000
unkown
page write copy
18C0E030000
heap
page read and write
1BBC0000
trusted library allocation
page read and write
1B733000
trusted library allocation
page read and write
1BD877B8000
heap
page read and write
1BD880CF000
heap
page read and write
1BD8779F000
heap
page read and write
2F45000
heap
page read and write
1BD8822A000
heap
page read and write
2B1DFD65000
heap
page read and write
1BD877C0000
heap
page read and write
1B980000
trusted library allocation
page read and write
7FFAAC670000
trusted library allocation
page read and write
1BD88117000
heap
page read and write
1BD877FD000
heap
page read and write
1D897F50000
heap
page read and write
2250000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
1B67E000
stack
page read and write
1B830000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
2B44000
heap
page read and write
260AF590000
unkown
page read and write
1BBA0000
trusted library allocation
page read and write
1D8B0BE0000
heap
page read and write
203FEE29000
heap
page read and write
5065000
heap
page read and write
203FE7AC000
heap
page read and write
1BD875A1000
heap
page read and write
170000
heap
page read and write
6B0000
heap
page read and write
18C26128000
heap
page read and write
1BC70000
trusted library allocation
page read and write
1BD8558B000
heap
page read and write
1BD87624000
heap
page read and write
7FFAAC356000
trusted library allocation
page execute and read and write
2B1E26F2000
trusted library allocation
page read and write
1BD877FB000
heap
page read and write
F23000
heap
page read and write
1BD877FD000
heap
page read and write
2913E110000
heap
page read and write
D94000
heap
page read and write
1BD877BF000
heap
page read and write
7FFAAC3F6000
trusted library allocation
page read and write
18C0F72C000
trusted library allocation
page read and write
E4C1CFF000
stack
page read and write
1BD880D7000
heap
page read and write
26F9000
trusted library allocation
page read and write
1BD87604000
heap
page read and write
1BD879A8000
unkown
page read and write
1BD8778D000
heap
page read and write
1BD877F4000
heap
page read and write
1BD87B92000
unkown
page read and write
201C1320000
heap
page read and write
1B8C0000
trusted library allocation
page read and write
757000
heap
page read and write
7FFAAC421000
trusted library allocation
page read and write
1BD880F7000
heap
page read and write
1BD877D6000
heap
page read and write
1BD87BB6000
heap
page read and write
7FFAAC700000
trusted library allocation
page read and write
1B0EC000
heap
page read and write
7FFAAC6D0000
trusted library allocation
page read and write
1BD87801000
heap
page read and write
1B020000
trusted library allocation
page read and write
1B030000
trusted library allocation
page read and write
1BD87840000
direct allocation
page read and write
1B720000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
1B730000
trusted library allocation
page read and write
1B027000
trusted library allocation
page read and write
1BA30000
trusted library allocation
page read and write
1BD877FD000
heap
page read and write
1BD87617000
heap
page read and write
1B023000
trusted library allocation
page read and write
7FFAAC28D000
trusted library allocation
page execute and read and write
1BD876CE000
heap
page read and write
7FF6E4C8D000
direct allocation
page execute and read and write
1BD8761D000
heap
page read and write
1BD880F8000
heap
page read and write
7FF6E4A8F000
direct allocation
page execute and read and write
2B1F1A23000
trusted library allocation
page read and write
1B770000
trusted library allocation
page read and write
1B9FC000
stack
page read and write
7FFAAC660000
trusted library allocation
page read and write
1BD880A6000
heap
page read and write
1BD880B7000
heap
page read and write
1BD8778F000
heap
page read and write
1B023000
trusted library allocation
page read and write
1BD8810F000
heap
page read and write
1BD88107000
heap
page read and write
1B023000
trusted library allocation
page read and write
2BCA1320000
heap
page read and write
1BD8776E000
heap
page read and write
1BD880FF000
heap
page read and write
7DF4C6CD0000
trusted library allocation
page execute and read and write
1B023000
trusted library allocation
page read and write
18C0C1D0000
heap
page read and write
2B1E161E000
heap
page read and write
8D9CE7E000
stack
page read and write
1BD877B8000
heap
page read and write
1BD87772000
heap
page read and write
1D8981F6000
trusted library allocation
page read and write
2685000
trusted library allocation
page read and write
1AEE7000
heap
page read and write
1B860000
trusted library allocation
page read and write
1BD877F3000
heap
page read and write
1BD8822A000
heap
page read and write
1BD88096000
heap
page read and write
1D8A8476000
trusted library allocation
page read and write
2B1F1A32000
trusted library allocation
page read and write
1BD87787000
heap
page read and write
1BDE0000
trusted library allocation
page read and write
1BBD0000
trusted library allocation
page read and write
1BD877F8000
heap
page read and write
2260000
trusted library allocation
page read and write
1BD880F7000
heap
page read and write
2EC0000
trusted library allocation
page read and write
7FFAAC5E0000
trusted library allocation
page read and write
1BD880EF000
heap
page read and write
1BD880DF000
heap
page read and write
1BD880DF000
heap
page read and write
1BD87589000
heap
page read and write
7FFAAC264000
trusted library allocation
page read and write
1AEDA000
heap
page read and write
7FFAAC680000
trusted library allocation
page read and write
18C0C220000
trusted library allocation
page read and write
1BD880B7000
heap
page read and write
7FFAAC28D000
trusted library allocation
page execute and read and write
1BD8822A000
heap
page read and write
1D896560000
heap
page read and write
1BD877D6000
heap
page read and write
1BD87604000
heap
page read and write
1B023000
trusted library allocation
page read and write
1BD875B0000
heap
page read and write
1BD877FF000
heap
page read and write
797000
heap
page read and write
1BD87778000
heap
page read and write
1BD877AC000
heap
page read and write
6E0000
heap
page read and write
18C0D9E0000
heap
page readonly
1B020000
trusted library allocation
page read and write
1B730000
trusted library allocation
page read and write
1AFA0000
trusted library allocation
page read and write
1BD87609000
heap
page read and write
2B1E24A4000
trusted library allocation
page read and write
518E000
heap
page read and write
1BD880EF000
heap
page read and write
201C122C000
unkown
page read and write
1BD85568000
heap
page read and write
F23000
heap
page read and write
6A0000
heap
page read and write
203FF316000
heap
page read and write
2BCA14A0000
heap
page read and write
1B020000
trusted library allocation
page read and write
1BD87593000
heap
page read and write
D32000
heap
page read and write
1BD8810F000
heap
page read and write
7FFAAC630000
trusted library allocation
page read and write
2B1E1730000
heap
page execute and read and write
2267000
trusted library allocation
page read and write
7FFAAC263000
trusted library allocation
page execute and read and write
1B8C0000
trusted library allocation
page read and write
1BC40000
trusted library allocation
page read and write
1B800000
trusted library allocation
page read and write
1BD8810F000
heap
page read and write
1B733000
trusted library allocation
page read and write
7FFAAC560000
trusted library allocation
page read and write
190000
heap
page read and write
1BD87801000
heap
page read and write
E4C20BC000
stack
page read and write
1C8B0000
unkown
page read and write
2263000
trusted library allocation
page read and write
1BD8810F000
heap
page read and write
1B020000
trusted library allocation
page read and write
1BCE0000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
1B023000
trusted library allocation
page read and write
1D8B09DE000
heap
page read and write
2B1DFD00000
heap
page read and write
18C26115000
heap
page read and write
1BD880D1000
heap
page read and write
7FFAAC6B6000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
2260000
trusted library allocation
page read and write
1BDD0000
trusted library allocation
page read and write
1BD88107000
heap
page read and write
1BD877FB000
heap
page read and write
1B020000
trusted library allocation
page read and write
7FFAAC29D000
trusted library allocation
page execute and read and write
1D8B0C1F000
heap
page read and write
1BD8810F000
heap
page read and write
3F0000
trusted library section
page read and write
1B680000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
7FFAAC454000
trusted library allocation
page read and write
1BD8810F000
heap
page read and write
7FFAAC420000
trusted library allocation
page read and write
1BD877A2000
heap
page read and write
1BD88107000
heap
page read and write
1BD87615000
heap
page read and write
1BD8822A000
heap
page read and write
11D0000
heap
page read and write
1B023000
trusted library allocation
page read and write
1BD85592000
heap
page read and write
1B760000
trusted library allocation
page read and write
1AED0000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
1AE60000
trusted library allocation
page read and write
2962000
heap
page read and write
1B790000
trusted library allocation
page read and write
7FFAAC430000
trusted library allocation
page read and write
2A4B000
heap
page read and write
1BD8822A000
heap
page read and write
8D9D279000
stack
page read and write
1B747000
trusted library allocation
page read and write
75E000
heap
page read and write
1BD877E8000
heap
page read and write
1BD877B5000
heap
page read and write
1BD87840000
trusted library allocation
page read and write
2B1F9FD8000
heap
page read and write
1BD877FF000
heap
page read and write
203FEE4A000
heap
page read and write
1BD880DF000
heap
page read and write
1B740000
trusted library allocation
page read and write
203FEEB2000
heap
page read and write
1BD8810F000
heap
page read and write
18C2605D000
heap
page read and write
1D89A076000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
1B610000
trusted library allocation
page read and write
1BD880F7000
heap
page read and write
1BD877F0000
heap
page read and write
1D899BD0000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
1BD880E0000
heap
page read and write
1BD8758D000
heap
page read and write
1B8E0000
trusted library allocation
page read and write
1BD877A8000
heap
page read and write
7FFAAC7C0000
trusted library allocation
page read and write
203FF270000
heap
page read and write
1AD20000
trusted library allocation
page read and write
2A46000
heap
page read and write
1BD87797000
heap
page read and write
1AE4C000
heap
page read and write
1BD88086000
heap
page read and write
1BD8810F000
heap
page read and write
3100000
trusted library allocation
page read and write
7FFAAC334000
trusted library allocation
page read and write
1BB70000
trusted library allocation
page read and write
1BD877FD000
heap
page read and write
1BD87B86000
unkown
page read and write
1BD87801000
heap
page read and write
1B720000
trusted library allocation
page read and write
1D8A845C000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
1D899D1A000
trusted library allocation
page read and write
7FFAAC512000
trusted library allocation
page read and write
2260000
trusted library allocation
page read and write
1BD880DF000
heap
page read and write
81D7DFF000
stack
page read and write
1BD8822B000
heap
page read and write
1D8B0926000
heap
page read and write
1BD88056000
heap
page read and write
1BD877CF000
heap
page read and write
1BD877D6000
heap
page read and write
1B790000
trusted library allocation
page read and write
1BD87615000
heap
page read and write
7FFAAC689000
trusted library allocation
page read and write
1BD8778F000
heap
page read and write
1BD8822A000
heap
page read and write
1B720000
trusted library allocation
page read and write
1B7FA000
stack
page read and write
1BD60000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
8D9D3FB000
stack
page read and write
1BD877D8000
heap
page read and write
2913E210000
heap
page read and write
7FFAAC32D000
trusted library allocation
page execute and read and write
1B0C1000
heap
page read and write
1BCE0000
trusted library allocation
page read and write
2B1FA0A0000
heap
page read and write
7FFB16791000
unkown
page execute read
680000
heap
page read and write
2B1DFB07000
heap
page read and write
7FFB167B2000
unkown
page readonly
7FFB167B5000
unkown
page readonly
7FF79E9AB000
unkown
page read and write
201C12A0000
heap
page read and write
1B020000
trusted library allocation
page read and write
1BB10000
trusted library allocation
page read and write
2913E070000
heap
page read and write
EDB000
heap
page read and write
1B020000
trusted library allocation
page read and write
1BD87801000
heap
page read and write
1BD877B7000
heap
page read and write
6D5000
heap
page read and write
7FFB167B0000
unkown
page read and write
1BC10000
trusted library allocation
page read and write
1BD8811F000
heap
page read and write
1BCCE000
trusted library allocation
page read and write
1D8A8466000
trusted library allocation
page read and write
1CA22000
unkown
page read and write
1BD877FF000
heap
page read and write
1BD88040000
heap
page read and write
1B8D0000
trusted library allocation
page read and write
1B710000
trusted library allocation
page read and write
23B8000
trusted library allocation
page read and write
1BD877C5000
heap
page read and write
12376000
trusted library allocation
page read and write
1BD880F7000
heap
page read and write
1BD880E0000
heap
page read and write
81D81FE000
stack
page read and write
203FEEB2000
heap
page read and write
1BD8779F000
heap
page read and write
7FFAAC5F0000
trusted library allocation
page read and write
7FFAAC390000
trusted library allocation
page execute and read and write
7FFB167B5000
unkown
page readonly
1BD880DF000
heap
page read and write
1BD8822A000
heap
page read and write
1B070000
trusted library allocation
page read and write
2B1F9E8A000
heap
page read and write
1BD877C6000
heap
page read and write
1D897F10000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
1B737000
trusted library allocation
page read and write
2B1E15D0000
trusted library allocation
page read and write
1BD8809F000
heap
page read and write
18C0C1D5000
heap
page read and write
54DF000
stack
page read and write
1B020000
trusted library allocation
page read and write
18C0DA20000
trusted library allocation
page read and write
2260000
trusted library allocation
page read and write
1BD877FF000
heap
page read and write
7FFB0D74D000
unkown
page readonly
1BD8822A000
heap
page read and write
7FFAAC42A000
trusted library allocation
page read and write
1BD88049000
heap
page read and write
1BD8822A000
heap
page read and write
8D9D076000
stack
page read and write
1AFCF000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
1AE40000
trusted library allocation
page read and write
203FEE10000
heap
page read and write
7FFAAC67C000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
1B640000
trusted library allocation
page read and write
22FE000
stack
page read and write
7FFAAC4F0000
trusted library allocation
page read and write
1BDB6000
trusted library allocation
page read and write
50EB000
heap
page read and write
1BD877A5000
heap
page read and write
1BD8811F000
heap
page read and write
203FEEB2000
heap
page read and write
1BD8822A000
heap
page read and write
1BD87840000
trusted library allocation
page read and write
7FF6E4941000
direct allocation
page execute and read and write
1B020000
trusted library allocation
page read and write
1BD87569000
heap
page read and write
1D8B04B0000
trusted library allocation
page read and write
1BD8757B000
heap
page read and write
7DF423EC6000
unkown
page read and write
1BD87794000
heap
page read and write
1BD87787000
heap
page read and write
313C000
trusted library allocation
page read and write
1BD877E8000
heap
page read and write
1BD87787000
heap
page read and write
1BD877F3000
heap
page read and write
1BD87783000
heap
page read and write
1D8B08DA000
heap
page read and write
7FF79E9AB000
unkown
page write copy
3074000
heap
page read and write
1BD877D6000
heap
page read and write
D38000
heap
page read and write
1BD88081000
heap
page read and write
1BD87609000
heap
page read and write
1BD8759A000
heap
page read and write
2B1F9F20000
heap
page read and write
1BD87778000
heap
page read and write
1BDA0000
trusted library allocation
page read and write
7FFAAC280000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
7DF49A990000
trusted library allocation
page execute and read and write
1BD8778A000
heap
page read and write
2B1DFB20000
heap
page read and write
1BD87787000
heap
page read and write
30E0000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
2B1E1963000
trusted library allocation
page read and write
1BD880E7000
heap
page read and write
7FFAAC2CC000
trusted library allocation
page execute and read and write
1AD53000
trusted library allocation
page read and write
979000
unkown
page readonly
7FFAAC27D000
trusted library allocation
page execute and read and write
1BCB0000
trusted library allocation
page read and write
2B1F9EBD000
heap
page read and write
1BAF0000
trusted library allocation
page read and write
1BD87595000
heap
page read and write
1BB7D000
stack
page read and write
2253000
trusted library allocation
page read and write
1BCC0000
trusted library allocation
page read and write
1BBD0000
trusted library allocation
page read and write
203FEE3B000
heap
page read and write
1BD87589000
heap
page read and write
367F000
stack
page read and write
1B020000
trusted library allocation
page read and write
7FFAAC510000
trusted library allocation
page execute and read and write
2B1E32B8000
trusted library allocation
page read and write
7FFAAC410000
trusted library allocation
page read and write
1C6C0000
unkown
page read and write
2B1E213C000
trusted library allocation
page read and write
6BB000
heap
page read and write
1AD00000
trusted library allocation
page read and write
2B10000
trusted library allocation
page read and write
8D9CF7D000
stack
page read and write
2250000
trusted library allocation
page read and write
7FFAAC530000
trusted library allocation
page read and write
1C0C0000
trusted library allocation
page read and write
221F000
heap
page read and write
7FFAAC2BC000
trusted library allocation
page execute and read and write
1B743000
trusted library allocation
page read and write
7FFAAC340000
trusted library allocation
page read and write
1BD877F8000
heap
page read and write
201C1219000
unkown
page read and write
1B860000
trusted library allocation
page read and write
90000
heap
page read and write
89D000
unkown
page write copy
1B720000
trusted library allocation
page read and write
1BD880B7000
heap
page read and write
1BD23000
trusted library allocation
page read and write
203FE7AD000
heap
page read and write
260AF7A7000
heap
page read and write
28F0000
heap
page execute and read and write
401000
unkown
page execute read
7FFAAC37C000
trusted library allocation
page execute and read and write
1BB90000
trusted library allocation
page read and write
203FF298000
heap
page read and write
1B720000
trusted library allocation
page read and write
B2EED7D000
stack
page read and write
1BD8770D000
heap
page read and write
201C11D0000
unkown
page read and write
7FFAAC580000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
81D8E4E000
stack
page read and write
2110000
heap
page read and write
1B690000
trusted library allocation
page read and write
201C11D1000
unkown
page execute read
7FFAAC416000
trusted library allocation
page execute and read and write
1BD87801000
heap
page read and write
735000
unkown
page read and write
295F000
heap
page read and write
1BD87801000
heap
page read and write
5072000
heap
page read and write
1AD40000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
1B8E0000
trusted library allocation
page read and write
1BD877FF000
heap
page read and write
1AE9D000
heap
page read and write
201C1250000
heap
page read and write
260AF787000
heap
page read and write
1D8B0566000
heap
page execute and read and write
1BC10000
trusted library allocation
page read and write
1BBF0000
trusted library allocation
page read and write
1BDB0000
trusted library allocation
page read and write
2B1E3644000
trusted library allocation
page read and write
268F000
trusted library allocation
page read and write
1BD877BD000
heap
page read and write
1B023000
trusted library allocation
page read and write
1B670000
trusted library allocation
page read and write
81D7BFE000
stack
page read and write
2BCA2D41000
heap
page read and write
1B023000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
1BD87894000
heap
page read and write
1BD880AF000
heap
page read and write
1BD877EB000
heap
page read and write
1B0C1000
heap
page read and write
1BA18000
trusted library allocation
page read and write
2320000
trusted library allocation
page read and write
81D7D7B000
stack
page read and write
1BBB0000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
210F000
stack
page read and write
2656000
trusted library allocation
page read and write
2260000
remote allocation
page read and write
1BD8822A000
heap
page read and write
1AF05000
heap
page read and write
1BD877F0000
heap
page read and write
1BD87778000
heap
page read and write
1BD87609000
heap
page read and write
7FFAAC590000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
18C0F752000
trusted library allocation
page read and write
7DF423EB6000
unkown
page read and write
1BD877C5000
heap
page read and write
1BD877D8000
heap
page read and write
1BBB0000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
1B023000
trusted library allocation
page read and write
2913DF70000
heap
page read and write
1A8C1000
heap
page read and write
1B023000
trusted library allocation
page read and write
1A6CD000
heap
page read and write
1B020000
trusted library allocation
page read and write
203FE7A6000
heap
page read and write
1B040000
trusted library allocation
page read and write
1BD880B0000
heap
page read and write
7FFAAC350000
trusted library allocation
page read and write
E40000
trusted library allocation
page read and write
E88000
heap
page read and write
239A000
trusted library allocation
page read and write
1CA36000
unkown
page read and write
D89000
heap
page read and write
1BD8778F000
heap
page read and write
2BCA1464000
heap
page read and write
1B9C0000
trusted library allocation
page read and write
1B700000
trusted library allocation
page read and write
1BD8778F000
heap
page read and write
7FFAAC26D000
trusted library allocation
page execute and read and write
2913E320000
heap
page read and write
1BD877B8000
heap
page read and write
1BB80000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
7FFAAC35D000
trusted library allocation
page execute and read and write
1B023000
trusted library allocation
page read and write
1A8C1000
heap
page read and write
1BDD0000
trusted library allocation
page read and write
1BA00000
trusted library allocation
page read and write
1BD877B2000
heap
page read and write
1AF21000
heap
page read and write
7FFAAC3F0000
trusted library allocation
page read and write
7FFAAC5C0000
trusted library allocation
page read and write
1BD8778F000
heap
page read and write
1BD875A3000
heap
page read and write
7FFAAC4B0000
trusted library allocation
page read and write
1BD8810F000
heap
page read and write
2F40000
heap
page read and write
203FE760000
heap
page read and write
350000
heap
page read and write
1BD8778F000
heap
page read and write
1BD8777E000
heap
page read and write
2646000
trusted library allocation
page read and write
1B733000
trusted library allocation
page read and write
1BD8811F000
heap
page read and write
1C83B000
unkown
page read and write
7FFAAC514000
trusted library allocation
page read and write
1BD879A4000
unkown
page read and write
2B1F9CD0000
heap
page read and write
7FFAAC690000
trusted library allocation
page read and write
203FE6C1000
unkown
page execute read
7FFAAC33D000
trusted library allocation
page execute and read and write
69F000
unkown
page write copy
1BD880F7000
heap
page read and write
7FFAAC530000
trusted library allocation
page execute and read and write
1BD8779F000
heap
page read and write
1BC20000
trusted library allocation
page read and write
1BD880EF000
heap
page read and write
1B700000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
7FFAAC5C9000
trusted library allocation
page read and write
1BD876BF000
heap
page read and write
7FFAAC640000
trusted library allocation
page read and write
18C1E041000
trusted library allocation
page read and write
7FFB0D749000
unkown
page read and write
1BD85592000
heap
page read and write
50FE000
heap
page read and write
1B023000
trusted library allocation
page read and write
1BD87589000
heap
page read and write
7FFAAC343000
trusted library allocation
page execute and read and write
1AEB0000
trusted library allocation
page read and write
1BD8779F000
heap
page read and write
1BD877A3000
heap
page read and write
1BD8759F000
heap
page read and write
1B020000
trusted library allocation
page read and write
1BD87CBD000
heap
page read and write
7FFAAC4F1000
trusted library allocation
page read and write
7FF79E9AC000
unkown
page readonly
2EB3000
trusted library allocation
page read and write
1D8B0977000
heap
page read and write
1BD880C7000
heap
page read and write
1B023000
trusted library allocation
page read and write
203FF316000
heap
page read and write
81D7EFD000
stack
page read and write
1B8F0000
trusted library allocation
page read and write
7FFAAC6B0000
trusted library allocation
page read and write
1B8D0000
trusted library allocation
page read and write
1BD8760B000
heap
page read and write
203FE768000
heap
page read and write
1D899B72000
trusted library allocation
page read and write
512E000
heap
page read and write
1BD877B7000
heap
page read and write
18C0C066000
heap
page read and write
1BD88117000
heap
page read and write
1B733000
trusted library allocation
page read and write
1B038000
trusted library allocation
page read and write
1BD877A0000
heap
page read and write
6B9000
heap
page read and write
1BD8779A000
heap
page read and write
7FFAAC450000
trusted library allocation
page execute and read and write
1BD88107000
heap
page read and write
2B1E291F000
trusted library allocation
page read and write
1B720000
trusted library allocation
page read and write
1BD50000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
7FFAAC610000
trusted library allocation
page read and write
1ACB0000
trusted library allocation
page read and write
1BD877FD000
heap
page read and write
1BD877C0000
heap
page read and write
1B740000
trusted library allocation
page read and write
1B730000
trusted library allocation
page read and write
1BD88107000
heap
page read and write
1BD8806C000
heap
page read and write
7FFAAC330000
trusted library allocation
page read and write
1BD88107000
heap
page read and write
1A370000
trusted library allocation
page read and write
7FFAAC660000
trusted library allocation
page read and write
1A8BA000
heap
page read and write
1BD87BB6000
heap
page read and write
1BD88107000
heap
page read and write
E6B000
heap
page read and write
1B020000
trusted library allocation
page read and write
81D827E000
stack
page read and write
2320000
trusted library allocation
page read and write
1BD8810F000
heap
page read and write
1BB10000
trusted library allocation
page read and write
201C1327000
heap
page read and write
2BCA2E40000
heap
page read and write
7FFAAC262000
trusted library allocation
page read and write
1BD88064000
heap
page read and write
1AE10000
trusted library allocation
page read and write
7FFAAC680000
trusted library allocation
page read and write
1BD877D6000
heap
page read and write
1BD87593000
heap
page read and write
1BC0F000
trusted library allocation
page read and write
1BD880FF000
heap
page read and write
7FFAAC540000
trusted library allocation
page read and write
2310000
trusted library allocation
page read and write
2260000
trusted library allocation
page read and write
203FE946000
heap
page read and write
3070000
heap
page read and write
1BD880F7000
heap
page read and write
1BD88056000
heap
page read and write
1BD8760B000
heap
page read and write
7FFAAC470000
trusted library allocation
page read and write
260AF760000
heap
page read and write
81D7CFE000
stack
page read and write
1BC90000
trusted library allocation
page read and write
D80000
heap
page read and write
2250000
trusted library allocation
page read and write
1BD877B2000
heap
page read and write
1B720000
trusted library allocation
page read and write
7FF79EACC000
unkown
page write copy
1BC50000
trusted library allocation
page read and write
1BD877FC000
heap
page read and write
7FFAAC560000
trusted library allocation
page read and write
385F000
stack
page read and write
1BD880EF000
heap
page read and write
81D8DCD000
stack
page read and write
1BD877A7000
heap
page read and write
1BD88107000
heap
page read and write
1D8B092F000
heap
page read and write
1BD877C5000
heap
page read and write
1BD88107000
heap
page read and write
81D80F8000
stack
page read and write
1BD8770D000
heap
page read and write
2B1E22CB000
trusted library allocation
page read and write
8D9CC7E000
stack
page read and write
2200000
heap
page read and write
1B720000
trusted library allocation
page read and write
1B740000
trusted library allocation
page read and write
1BB80000
trusted library allocation
page read and write
1BD8559E000
heap
page read and write
1BD88107000
heap
page read and write
7DF423EB4000
unkown
page read and write
1BD880DF000
heap
page read and write
203FF2D5000
heap
page read and write
2260000
trusted library allocation
page read and write
347F000
stack
page read and write
7FFAAC426000
trusted library allocation
page execute and read and write
2B1F9E83000
heap
page read and write
1BD875A1000
heap
page read and write
1D8993F3000
trusted library allocation
page read and write
ED7000
heap
page read and write
203FED7C000
unkown
page read and write
1BCA7000
trusted library allocation
page read and write
1BD87572000
heap
page read and write
1AD30000
trusted library allocation
page read and write
2B1DFCE0000
heap
page read and write
2F3C000
trusted library allocation
page read and write
1BD880AF000
heap
page read and write
1BD85568000
heap
page read and write
7FFB16790000
unkown
page readonly
1B020000
trusted library allocation
page read and write
2B1F1A42000
trusted library allocation
page read and write
1D896670000
heap
page read and write
7FFAAC320000
trusted library allocation
page execute and read and write
1AD03000
trusted library allocation
page read and write
1BCD0000
trusted library allocation
page read and write
1B740000
trusted library allocation
page read and write
1B8C0000
trusted library allocation
page read and write
1B7E0000
trusted library allocation
page read and write
897000
unkown
page read and write
2B1F9F38000
heap
page read and write
1B870000
trusted library allocation
page read and write
400000
unkown
page readonly
1B6F0000
trusted library allocation
page read and write
1D8B064E000
heap
page read and write
7FFAAC6A0000
trusted library allocation
page read and write
1B640000
trusted library allocation
page read and write
2913E090000
heap
page readonly
1BD877EB000
heap
page read and write
1BD88107000
heap
page read and write
1BD8757B000
heap
page read and write
1B74A000
trusted library allocation
page read and write
7DF423EC1000
unkown
page execute read
1BD8778F000
heap
page read and write
1B020000
trusted library allocation
page read and write
1BD877C0000
heap
page read and write
1BA20000
trusted library allocation
page read and write
1BD87787000
heap
page read and write
2B1F9B80000
heap
page execute and read and write
1D8B057B000
heap
page read and write
7DF423EB0000
unkown
page read and write
1BD880D7000
heap
page read and write
1BD87801000
heap
page read and write
7FFAAC550000
trusted library allocation
page read and write
1BD8759A000
heap
page read and write
1BD8757B000
heap
page read and write
EC16FF4000
stack
page read and write
1B020000
trusted library allocation
page read and write
7FFAAC4D0000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
1BC00000
trusted library allocation
page read and write
8A9000
unkown
page readonly
1BAE0000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
18C0BF00000
heap
page read and write
1BB80000
trusted library allocation
page read and write
1BD877FF000
heap
page read and write
1B040000
trusted library allocation
page read and write
1BD8761E000
heap
page read and write
720000
heap
page read and write
7FFAAC406000
trusted library allocation
page execute and read and write
1BD8811F000
heap
page read and write
1B020000
trusted library allocation
page read and write
1BD880C7000
heap
page read and write
7FFAAC5A0000
trusted library allocation
page read and write
18C0F745000
trusted library allocation
page read and write
18C0C05C000
heap
page read and write
1BD880FF000
heap
page read and write
1A94D000
stack
page read and write
1BD8810F000
heap
page read and write
1BD8810F000
heap
page read and write
E4C2D8D000
stack
page read and write
1BD880D7000
heap
page read and write
1AEB7000
heap
page read and write
1BD88044000
heap
page read and write
1BD877D6000
heap
page read and write
1BB87000
trusted library allocation
page read and write
1ADFF000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
18C2625C000
heap
page read and write
1BD8822A000
heap
page read and write
13121000
trusted library allocation
page read and write
D1D000
heap
page read and write
D80000
heap
page read and write
509E000
heap
page read and write
1B740000
trusted library allocation
page read and write
979000
unkown
page readonly
1BD880BF000
heap
page read and write
1BD880EF000
heap
page read and write
1B67B000
trusted library allocation
page read and write
1BD877CF000
heap
page read and write
23B0000
trusted library allocation
page read and write
1BD880BF000
heap
page read and write
1BD875A1000
heap
page read and write
1D8A81DF000
trusted library allocation
page read and write
1BD88053000
heap
page read and write
1B725000
trusted library allocation
page read and write
1BD880E7000
heap
page read and write
1BD87794000
heap
page read and write
1BD8777C000
heap
page read and write
1B740000
trusted library allocation
page read and write
1AE9C000
trusted library allocation
page read and write
508D000
heap
page read and write
23AE000
trusted library allocation
page read and write
1AE20000
trusted library allocation
page read and write
7FFAAC330000
trusted library allocation
page read and write
1B740000
trusted library allocation
page read and write
1BD877B8000
heap
page read and write
51AA000
heap
page read and write
18C0C0AA000
heap
page read and write
7FFAAC342000
trusted library allocation
page read and write
18C1E0B0000
trusted library allocation
page read and write
1BD880CF000
heap
page read and write
1D899C17000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
1B720000
trusted library allocation
page read and write
1BD88057000
heap
page read and write
7FFAAC34D000
trusted library allocation
page execute and read and write
7FFAAC4FA000
trusted library allocation
page read and write
1B7A0000
trusted library allocation
page read and write
7FFAAC69C000
trusted library allocation
page read and write
1BD877EB000
heap
page read and write
1BD880CF000
heap
page read and write
7FFAAC7A0000
trusted library allocation
page read and write
1BD880D7000
heap
page read and write
1BD877EF000
heap
page read and write
7FFAAC34D000
trusted library allocation
page execute and read and write
7FFAAC273000
trusted library allocation
page execute and read and write
1BD30000
trusted library allocation
page read and write
1BD8778E000
heap
page read and write
18C0F74E000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
7FFB2CE20000
direct allocation
page execute and read and write
1BD87626000
heap
page read and write
1B730000
trusted library allocation
page read and write
2260000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
1BD875A3000
heap
page read and write
1BD8778F000
heap
page read and write
1BBE0000
trusted library allocation
page read and write
7FFAAC740000
trusted library allocation
page read and write
7FFAAC690000
trusted library allocation
page read and write
1BD880C7000
heap
page read and write
7FFAAC272000
trusted library allocation
page read and write
8D9CFF9000
stack
page read and write
1BD87796000
heap
page read and write
1B720000
trusted library allocation
page read and write
7FFAAC333000
trusted library allocation
page execute and read and write
1BD880A6000
heap
page read and write
1B030000
trusted library allocation
page read and write
1AFE0000
trusted library allocation
page read and write
264C000
trusted library allocation
page read and write
7FFAAC5E0000
trusted library allocation
page read and write
1BD877BF000
heap
page read and write
219F000
stack
page read and write
1BD87572000
heap
page read and write
DAA000
heap
page read and write
89D000
unkown
page write copy
8D9D17E000
stack
page read and write
1D8B093F000
heap
page read and write
1BD877D0000
heap
page read and write
680000
trusted library section
page read and write
2F30000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
1BD8809F000
heap
page read and write
1BD87840000
direct allocation
page execute and read and write
1B020000
trusted library allocation
page read and write
1D898110000
heap
page execute and read and write
7FFAAC520000
trusted library allocation
page read and write
1D8B0969000
heap
page read and write
1B9F0000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
7FFAAC344000
trusted library allocation
page read and write
1BD880AF000
heap
page read and write
7FFAAC5D0000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
7FFAAC4D0000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
1BD89003000
heap
page read and write
1B01E000
stack
page read and write
1BD8822A000
heap
page read and write
203FED40000
direct allocation
page execute and read and write
50F1000
heap
page read and write
900000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
E8F000
heap
page read and write
7FFAAC684000
trusted library allocation
page read and write
2BCA14C0000
heap
page read and write
1D8B093B000
heap
page read and write
1BD877A0000
heap
page read and write
1B770000
trusted library allocation
page read and write
7FFAAC460000
trusted library allocation
page execute and read and write
203FE950000
heap
page read and write
5077000
heap
page read and write
81D82FE000
stack
page read and write
897000
unkown
page write copy
2300000
heap
page read and write
F23000
heap
page read and write
2BCA1420000
heap
page read and write
7FFAAC440000
trusted library allocation
page execute and read and write
5ADB000
stack
page read and write
203FEE31000
heap
page read and write
1BD877A9000
heap
page read and write
7FFAAC4F0000
trusted library allocation
page execute and read and write
D35000
heap
page read and write
E4C2138000
stack
page read and write
1BD87840000
trusted library allocation
page read and write
1BD877F0000
heap
page read and write
2250000
trusted library allocation
page read and write
1BD85591000
heap
page read and write
2B1E2A5B000
trusted library allocation
page read and write
7FFAAC680000
trusted library allocation
page read and write
7FFAAC500000
trusted library allocation
page read and write
1BD875A3000
heap
page read and write
1BD8804B000
heap
page read and write
1BD880F7000
heap
page read and write
2243000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
1BD877A8000
heap
page read and write
7DF423EB1000
unkown
page execute read
1BD880B0000
heap
page read and write
5067000
heap
page read and write
895000
unkown
page readonly
1BCA0000
trusted library allocation
page read and write
1B0D5000
heap
page read and write
1ADC0000
trusted library allocation
page read and write
1BD88117000
heap
page read and write
4FE0000
heap
page read and write
1B730000
trusted library allocation
page read and write
1BD88107000
heap
page read and write
71E000
heap
page read and write
1BD880B7000
heap
page read and write
18C0BF70000
heap
page read and write
18C26347000
heap
page read and write
203FEEB3000
heap
page read and write
18C0DAC7000
heap
page execute and read and write
7FFAAC3E0000
trusted library allocation
page read and write
1BD8804B000
heap
page read and write
18C262A2000
heap
page read and write
1BD8822A000
heap
page read and write
2260000
trusted library allocation
page read and write
1BD87615000
heap
page read and write
260AF610000
heap
page read and write
1BD8757B000
heap
page read and write
1B720000
trusted library allocation
page read and write
690000
heap
page read and write
1BD877A0000
heap
page read and write
1D8B05FA000
heap
page read and write
1BD88068000
heap
page read and write
2913DF10000
remote allocation
page execute and read and write
1D89935A000
trusted library allocation
page read and write
1B010000
trusted library allocation
page read and write
1BD880C7000
heap
page read and write
1BD87BFD000
heap
page read and write
1BD8760E000
heap
page read and write
1BD87792000
heap
page read and write
18C0FC0C000
trusted library allocation
page read and write
1CAA7000
unkown
page read and write
1BD876CF000
heap
page read and write
1B023000
trusted library allocation
page read and write
7DF423EB0000
unkown
page read and write
1BD877D8000
heap
page read and write
2267000
trusted library allocation
page read and write
1BAA0000
trusted library allocation
page read and write
1D8965AB000
heap
page read and write
895000
unkown
page readonly
1B6B0000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
7FFAAC6C0000
trusted library allocation
page read and write
7FFAAC663000
trusted library allocation
page read and write
E4C233B000
stack
page read and write
18C1E1F2000
trusted library allocation
page read and write
1B85D000
stack
page read and write
7FFAAC690000
trusted library allocation
page execute and read and write
1BD880E7000
heap
page read and write
1BA10000
trusted library allocation
page read and write
7FFAAC4C0000
trusted library allocation
page read and write
1BD880FF000
heap
page read and write
1B020000
trusted library allocation
page read and write
1B720000
trusted library allocation
page read and write
1BBC0000
trusted library allocation
page read and write
1BBD0000
trusted library allocation
page read and write
13128000
trusted library allocation
page read and write
1BD875A9000
heap
page read and write
1BD877D5000
heap
page read and write
1B750000
trusted library allocation
page read and write
1BD8810F000
heap
page read and write
7FFAAC5A3000
trusted library allocation
page read and write
1BD875B0000
heap
page read and write
1BD87616000
heap
page read and write
18C0FCE4000
trusted library allocation
page read and write
1BD880DF000
heap
page read and write
1BD880EF000
heap
page read and write
1B740000
trusted library allocation
page read and write
1BAD0000
heap
page read and write
7FFB0D6D1000
unkown
page execute read
DA5000
heap
page read and write
1AD80000
trusted library allocation
page read and write
7FFB0D71F000
unkown
page read and write
1BD8777E000
heap
page read and write
1B090000
trusted library allocation
page read and write
1BD87776000
heap
page read and write
1B880000
trusted library allocation
page read and write
1BD880F7000
heap
page read and write
18C26240000
heap
page read and write
D3A000
heap
page read and write
1BD877B6000
heap
page read and write
7FFAAC610000
trusted library allocation
page read and write
1BD87794000
heap
page read and write
1B722000
trusted library allocation
page read and write
1BD877B7000
heap
page read and write
203FE7AC000
heap
page read and write
1B020000
trusted library allocation
page read and write
1BD880DF000
heap
page read and write
2250000
trusted library allocation
page read and write
1BD880A6000
heap
page read and write
7FFAAC600000
trusted library allocation
page read and write
1BA80000
trusted library allocation
page read and write
1B730000
trusted library allocation
page read and write
1BD8759D000
heap
page read and write
7FFAAC322000
trusted library allocation
page read and write
91F000
trusted library allocation
page read and write
18C262B2000
heap
page read and write
1D89839A000
trusted library allocation
page read and write
1BD877E8000
heap
page read and write
1BD8776E000
heap
page read and write
1B9E0000
trusted library allocation
page read and write
1BD877FF000
heap
page read and write
73C000
heap
page read and write
1ADA0000
trusted library allocation
page read and write
1BA70000
trusted library allocation
page read and write
1BD880D0000
heap
page read and write
1BBE0000
trusted library allocation
page read and write
18C260CA000
heap
page read and write
1C6C0000
unkown
page read and write
81D7C7D000
stack
page read and write
1BD88107000
heap
page read and write
7FFAAC760000
trusted library allocation
page execute and read and write
1D8B063F000
heap
page read and write
1AE63000
heap
page read and write
1BD880EF000
heap
page read and write
7FFAAC6A0000
trusted library allocation
page read and write
2B1E31A8000
trusted library allocation
page read and write
18C0C07C000
heap
page read and write
2BCA2D53000
heap
page read and write
D0B000
heap
page read and write
7FFAAC630000
trusted library allocation
page read and write
2B1E1741000
trusted library allocation
page read and write
E5F000
trusted library allocation
page read and write
7DF423EB1000
unkown
page execute read
1BD87593000
heap
page read and write
1BE00000
trusted library allocation
page read and write
1BD880DF000
heap
page read and write
1BA90000
trusted library allocation
page read and write
1BD877C0000
heap
page read and write
1BD877FF000
heap
page read and write
18C0BF30000
heap
page read and write
7FF6E47F0000
direct allocation
page execute and read and write
1BD8810F000
heap
page read and write
1B0E2000
heap
page read and write
2250000
trusted library allocation
page read and write
1BD87570000
heap
page read and write
203FE71F000
unkown
page execute and read and write
1C834000
unkown
page read and write
1BD88040000
heap
page read and write
1B6D0000
trusted library allocation
page read and write
7FFB167A6000
unkown
page readonly
7FFAAC5F0000
trusted library allocation
page read and write
1BD88823000
heap
page read and write
1BD877EB000
heap
page read and write
1B033000
trusted library allocation
page read and write
2B1DFB4A000
heap
page read and write
7FFAAC540000
trusted library allocation
page read and write
1BD880D1000
heap
page read and write
1BD8822A000
heap
page read and write
1B000000
trusted library allocation
page read and write
1BD8758D000
heap
page read and write
1BD8810F000
heap
page read and write
1BD877A8000
heap
page read and write
1AE05000
trusted library allocation
page read and write
2250000
trusted library allocation
page read and write
7FF79E9AC000
unkown
page readonly
1BB90000
trusted library allocation
page read and write
1BB90000
trusted library allocation
page read and write
203FEE21000
heap
page read and write
1BC66000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
1BD877B8000
heap
page read and write
1BD8822A000
heap
page read and write
1B9B0000
trusted library allocation
page read and write
18C0FBB5000
trusted library allocation
page read and write
7FFAAC332000
trusted library allocation
page read and write
1BB80000
trusted library allocation
page read and write
BE0000
heap
page read and write
7FF79E8F1000
unkown
page execute read
2B1E29C7000
trusted library allocation
page read and write
2B1DFB60000
heap
page read and write
B2EEC74000
stack
page read and write
1BE00000
trusted library allocation
page read and write
1BD877F2000
heap
page read and write
6A7000
unkown
page readonly
1B020000
trusted library allocation
page read and write
1BD88066000
heap
page read and write
1AE70000
trusted library allocation
page read and write
203FEE30000
heap
page read and write
2EE0000
trusted library allocation
page read and write
7DF423EB6000
unkown
page read and write
18C0C230000
heap
page read and write
1BD8758D000
heap
page read and write
1AC90000
trusted library allocation
page read and write
8A9000
unkown
page readonly
8D9CD7F000
stack
page read and write
203FE948000
heap
page read and write
1BD87C17000
unkown
page read and write
CC9000
heap
page read and write
1BC50000
trusted library allocation
page read and write
1BD877D6000
heap
page read and write
7FFB16790000
unkown
page readonly
1B023000
trusted library allocation
page read and write
7FF79EACB000
unkown
page write copy
260AF730000
heap
page read and write
2260000
trusted library allocation
page read and write
1BD880B0000
heap
page read and write
1AEBB000
heap
page read and write
1AF4E000
heap
page read and write
1BD877B7000
heap
page read and write
1BD880CF000
heap
page read and write
264F000
trusted library allocation
page read and write
1BBA0000
trusted library allocation
page read and write
1BD8779F000
heap
page read and write
1BD8822A000
heap
page read and write
92D42CC000
stack
page read and write
1BD877A2000
heap
page read and write
1ACC0000
trusted library allocation
page read and write
1BDC0000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
18C0F76A000
trusted library allocation
page read and write
18C0BFB0000
heap
page read and write
1B650000
trusted library allocation
page read and write
2652000
trusted library allocation
page read and write
1D8965E7000
heap
page read and write
50A4000
heap
page read and write
2BCA2E41000
heap
page read and write
2253000
trusted library allocation
page read and write
7FFAAC4C0000
trusted library allocation
page read and write
7FFAAC4E2000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
1BD8777C000
heap
page read and write
1B730000
trusted library allocation
page read and write
1B750000
trusted library allocation
page read and write
1BD30000
trusted library allocation
page read and write
7FFAAC280000
trusted library allocation
page read and write
1BD877FD000
heap
page read and write
1BD877BA000
heap
page read and write
2B1F9C30000
heap
page read and write
1BD8757A000
heap
page read and write
1BD20000
trusted library allocation
page read and write
1BD88107000
heap
page read and write
7DF49A9A0000
trusted library allocation
page execute and read and write
1BD8822A000
heap
page read and write
1B720000
trusted library allocation
page read and write
1BD880DF000
heap
page read and write
1BD879FC000
heap
page read and write
1BBC0000
trusted library allocation
page read and write
2B1DFDB0000
heap
page read and write
1BD877A1000
heap
page read and write
1BD8760D000
heap
page read and write
8D9DE4C000
stack
page read and write
1BD875B0000
heap
page read and write
1BD8779C000
heap
page read and write
1BD8822D000
heap
page read and write
1BD877FD000
heap
page read and write
2B1DFB40000
heap
page read and write
2B1E1560000
trusted library allocation
page read and write
2260000
trusted library allocation
page read and write
7FFB167B2000
unkown
page readonly
1BD877FF000
heap
page read and write
1BD877FD000
heap
page read and write
30F0000
trusted library allocation
page read and write
1BD877FF000
heap
page read and write
260AF5EC000
unkown
page read and write
2F00000
trusted library allocation
page read and write
1BD87787000
heap
page read and write
1B023000
trusted library allocation
page read and write
7FFAAC4A0000
trusted library allocation
page read and write
1AE89000
heap
page read and write
1BD877F0000
heap
page read and write
1BD877BF000
heap
page read and write
2B1F1A2A000
trusted library allocation
page read and write
7FFAAC340000
trusted library allocation
page read and write
260AF780000
heap
page read and write
1BB90000
trusted library allocation
page read and write
1BD85591000
heap
page read and write
1B721000
trusted library allocation
page read and write
1B770000
trusted library allocation
page read and write
1BB00000
trusted library allocation
page read and write
1BB83000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
1B740000
trusted library allocation
page read and write
1BD8778F000
heap
page read and write
18C0DB10000
heap
page read and write
1BD877C4000
heap
page read and write
1D89659F000
heap
page read and write
201C2DF0000
heap
page read and write
1BD877B5000
heap
page read and write
18C0F756000
trusted library allocation
page read and write
18C262D7000
heap
page read and write
7FFAAC5F0000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
203FED20000
heap
page readonly
1BD87BA6000
unkown
page read and write
7FFAAC576000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
67B000
stack
page read and write
1BD877FF000
heap
page read and write
1B0ED000
heap
page read and write
1BD87796000
heap
page read and write
1BB00000
trusted library allocation
page read and write
EC16FFB000
stack
page read and write
3872000
stack
page read and write
7FFAAC346000
trusted library allocation
page execute and read and write
2B1FA000000
trusted library allocation
page read and write
7FFAAC3E6000
trusted library allocation
page read and write
1BD877B8000
heap
page read and write
58DC000
stack
page read and write
1BC20000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
2270000
heap
page execute and read and write
1BD87801000
heap
page read and write
1AE30000
trusted library allocation
page read and write
1BB30000
trusted library allocation
page read and write
1BD880CF000
heap
page read and write
1BD8810F000
heap
page read and write
18C0FC21000
trusted library allocation
page read and write
2320000
trusted library allocation
page read and write
1BD880C7000
heap
page read and write
1BAD0000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
1BD877D5000
heap
page read and write
1BD877F0000
heap
page read and write
CC0000
heap
page read and write
1BDF0000
trusted library allocation
page read and write
1B730000
trusted library allocation
page read and write
2B1F9B86000
heap
page execute and read and write
1BD8822A000
heap
page read and write
1B980000
trusted library allocation
page read and write
1BD877A9000
heap
page read and write
1BD85598000
heap
page read and write
1B050000
trusted library allocation
page read and write
1B6D0000
trusted library allocation
page read and write
1BD880F7000
heap
page read and write
1BD880F7000
heap
page read and write
1BD8779A000
heap
page read and write
1B6AC000
trusted library allocation
page read and write
D3D000
heap
page read and write
7FFAAC570000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
1BD88044000
heap
page read and write
1BD88083000
heap
page read and write
7FFAAC522000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
1BD877AC000
heap
page read and write
7FFAAC730000
trusted library allocation
page read and write
2320000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
1BD877FF000
heap
page read and write
1BD8822A000
heap
page read and write
1B030000
trusted library allocation
page read and write
1D8B058D000
heap
page read and write
1BD8811F000
heap
page read and write
1B780000
trusted library allocation
page read and write
1ACE0000
trusted library allocation
page read and write
2341000
trusted library allocation
page read and write
513E000
heap
page read and write
1BD87572000
heap
page read and write
1D8966D0000
trusted library allocation
page read and write
2B1F9CB0000
heap
page read and write
1BD877B5000
heap
page read and write
1BD877FF000
heap
page read and write
7FFAAC5DC000
trusted library allocation
page read and write
1B721000
trusted library allocation
page read and write
1B760000
trusted library allocation
page read and write
1D896510000
heap
page read and write
1BD854D0000
direct allocation
page read and write
1BD877F8000
heap
page read and write
1BD8822A000
heap
page read and write
260AF5D9000
unkown
page read and write
201C1347000
heap
page read and write
1B8C0000
trusted library allocation
page read and write
1B037000
trusted library allocation
page read and write
7FFAAC6B0000
trusted library allocation
page read and write
1BD8778F000
heap
page read and write
1BD87609000
heap
page read and write
7DF423EC0000
unkown
page read and write
1B720000
trusted library allocation
page read and write
1BD8779F000
heap
page read and write
1BD88096000
heap
page read and write
203FED40000
direct allocation
page execute and read and write
1D898CFB000
trusted library allocation
page read and write
7FFAAC580000
trusted library allocation
page read and write
1B840000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
7FFAAC620000
trusted library allocation
page read and write
1BD877A2000
heap
page read and write
7FFAAC316000
trusted library allocation
page read and write
1BD88067000
heap
page read and write
7FFAAC4EA000
trusted library allocation
page read and write
1BD877D8000
heap
page read and write
18C0C038000
heap
page read and write
30F0000
trusted library allocation
page read and write
1BC90000
trusted library allocation
page read and write
1B8C0000
trusted library allocation
page read and write
92D46FD000
stack
page read and write
7FFAAC35B000
trusted library allocation
page read and write
1BD8779B000
heap
page read and write
2B1E17B3000
trusted library allocation
page read and write
7FFAAC3DC000
trusted library allocation
page execute and read and write
1BD87DA5000
unkown
page read and write
1BD880F7000
heap
page read and write
1BD8779F000
heap
page read and write
1BD880EF000
heap
page read and write
1B8D0000
trusted library allocation
page read and write
1AD10000
trusted library allocation
page read and write
2EC3000
trusted library allocation
page read and write
2F33000
trusted library allocation
page read and write
1D898160000
heap
page execute and read and write
2B1F9DEA000
heap
page read and write
7FFB0D74A000
unkown
page write copy
1BD00000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
1BD8757E000
heap
page read and write
1AEF6000
heap
page read and write
1BD880CF000
heap
page read and write
1BD88053000
heap
page read and write
1B020000
trusted library allocation
page read and write
60B0000
heap
page read and write
1AE84000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
2B1F1750000
trusted library allocation
page read and write
1BD876BF000
heap
page read and write
1D896581000
heap
page read and write
2B1F1761000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
1BD875A1000
heap
page read and write
EC171FF000
stack
page read and write
1BD877AC000
heap
page read and write
2250000
trusted library allocation
page read and write
1BD877F0000
heap
page read and write
505C000
heap
page read and write
1D8B0BF9000
heap
page read and write
1BD87778000
heap
page read and write
1BD8779C000
heap
page read and write
7FFAAC570000
trusted library allocation
page read and write
51AD000
heap
page read and write
8D9DECD000
stack
page read and write
2B1E1590000
heap
page read and write
81D8079000
stack
page read and write
7FFAAC260000
trusted library allocation
page read and write
7FFAAC273000
trusted library allocation
page read and write
1BD877D8000
heap
page read and write
1E4000
heap
page read and write
7FFAAC5D0000
trusted library allocation
page read and write
2260000
remote allocation
page read and write
1B020000
trusted library allocation
page read and write
1BD8779F000
heap
page read and write
7FFB167B5000
unkown
page readonly
7FFAAC274000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
12341000
trusted library allocation
page read and write
203FF2D5000
heap
page read and write
1BD880BF000
heap
page read and write
18C0E272000
trusted library allocation
page read and write
7FFAAC590000
trusted library allocation
page read and write
1B630000
trusted library allocation
page read and write
1BC60000
trusted library allocation
page read and write
1BD880EF000
heap
page read and write
1BA20000
trusted library allocation
page read and write
7FF6E4D69000
direct allocation
page execute and read and write
2253000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
1BC80000
trusted library allocation
page read and write
1BD88057000
heap
page read and write
1BDC0000
trusted library allocation
page read and write
1BD877F0000
heap
page read and write
1BD8760B000
heap
page read and write
1BD877B7000
heap
page read and write
1BD877FF000
heap
page read and write
7FFAAC5D0000
trusted library allocation
page read and write
1B720000
trusted library allocation
page read and write
1BD8759F000
heap
page read and write
1ADA0000
heap
page read and write
1BD8559D000
heap
page read and write
1D8B05A9000
heap
page read and write
5083000
heap
page read and write
730000
heap
page read and write
1B730000
trusted library allocation
page read and write
1BD875C2000
heap
page read and write
8D9C9A3000
stack
page read and write
203FEE30000
heap
page read and write
2263000
trusted library allocation
page read and write
1BD87604000
heap
page read and write
1BD877FF000
heap
page read and write
1BD877AC000
heap
page read and write
1B750000
trusted library allocation
page read and write
1C838000
unkown
page read and write
3F0000
heap
page read and write
1BD880B0000
heap
page read and write
1BD877CF000
heap
page read and write
1B070000
trusted library allocation
page read and write
1B950000
trusted library allocation
page read and write
1BD87799000
heap
page read and write
2F30000
direct allocation
page execute and read and write
203FE709000
unkown
page read and write
1BD87609000
heap
page read and write
1A8C1000
heap
page read and write
1AFC0000
trusted library allocation
page read and write
1BD88107000
heap
page read and write
2B2A000
heap
page read and write
1B080000
trusted library allocation
page read and write
1B720000
trusted library allocation
page read and write
1BD875A4000
heap
page read and write
1BD880F7000
heap
page read and write
1BD88107000
heap
page read and write
1BD877F2000
heap
page read and write
1BD877D1000
heap
page read and write
1BD85576000
heap
page read and write
1BD87593000
heap
page read and write
2263000
trusted library allocation
page read and write
7DF423EBA000
unkown
page read and write
1BD88127000
heap
page read and write
8D9CEFA000
stack
page read and write
2F2000
stack
page read and write
203FEE4A000
heap
page read and write
1BD88077000
heap
page read and write
1BD877B8000
heap
page read and write
2B1E1580000
trusted library allocation
page read and write
1BD877A1000
heap
page read and write
18C26107000
heap
page read and write
7FFAAC650000
trusted library allocation
page read and write
1BD87778000
heap
page read and write
18C260CC000
heap
page read and write
2C31000
heap
page read and write
1B13F000
heap
page read and write
2313000
trusted library allocation
page read and write
1BD880EF000
heap
page read and write
1BD87794000
heap
page read and write
18C0FBCE000
trusted library allocation
page read and write
2263000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
1BD88066000
heap
page read and write
1BD877D6000
heap
page read and write
1BD877C0000
heap
page read and write
1B023000
trusted library allocation
page read and write
2250000
trusted library allocation
page read and write
1BCF0000
trusted library allocation
page read and write
1BD877BF000
heap
page read and write
BD0000
heap
page readonly
2B1DFD90000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
1AEE7000
heap
page read and write
1B023000
trusted library allocation
page read and write
1B7F0000
trusted library allocation
page read and write
7FFAAC440000
trusted library allocation
page execute and read and write
2B1F1741000
trusted library allocation
page read and write
2B1F9BAF000
heap
page read and write
1BD880F7000
heap
page read and write
1B990000
trusted library allocation
page read and write
18C0C0A4000
heap
page read and write
201C122F000
unkown
page execute and read and write
1BD880D7000
heap
page read and write
1BD87569000
heap
page read and write
1BD87801000
heap
page read and write
1BD880DF000
heap
page read and write
884000
unkown
page read and write
1B720000
trusted library allocation
page read and write
11D5000
heap
page read and write
1B023000
trusted library allocation
page read and write
2250000
trusted library allocation
page read and write
1BD8761B000
heap
page read and write
1B023000
trusted library allocation
page read and write
1BD877BA000
heap
page read and write
1D898B6C000
trusted library allocation
page read and write
E4C1DFE000
stack
page read and write
1BD88072000
heap
page read and write
2263000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
18C26040000
heap
page read and write
1BD8822A000
heap
page read and write
1B023000
trusted library allocation
page read and write
1BD88048000
heap
page read and write
5CDC000
stack
page read and write
2B1F9BF9000
heap
page read and write
1BD875A2000
heap
page read and write
5131000
heap
page read and write
203FED30000
trusted library allocation
page read and write
D41000
heap
page read and write
D94000
heap
page read and write
1BD10000
trusted library allocation
page read and write
5085000
heap
page read and write
92D467D000
stack
page read and write
2910000
heap
page read and write
1AFD0000
trusted library allocation
page read and write
2260000
trusted library allocation
page read and write
1BD877D8000
heap
page read and write
7FFAAC5B0000
trusted library allocation
page read and write
7FF79EACB000
unkown
page read and write
1B020000
trusted library allocation
page read and write
1CA16000
unkown
page read and write
203FF261000
heap
page read and write
1AD70000
trusted library allocation
page read and write
1B725000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
1BD88077000
heap
page read and write
2B1F9E7D000
heap
page read and write
1BD8779F000
heap
page read and write
1B023000
trusted library allocation
page read and write
1BD88110000
heap
page read and write
7FFAAC6E0000
trusted library allocation
page read and write
1B720000
trusted library allocation
page read and write
1B860000
trusted library allocation
page read and write
18C0E041000
trusted library allocation
page read and write
1BD877D6000
heap
page read and write
E50000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
2250000
trusted library allocation
page read and write
203FE7AC000
heap
page read and write
1ED000
heap
page read and write
1BD88107000
heap
page read and write
1BD88056000
heap
page read and write
1B730000
trusted library allocation
page read and write
1CC35000
unkown
page read and write
1BB20000
trusted library allocation
page read and write
E4C1C7E000
stack
page read and write
1BB80000
trusted library allocation
page read and write
1BB80000
trusted library allocation
page read and write
1AEFE000
heap
page read and write
2659000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
1BD877FC000
heap
page read and write
1BD87801000
heap
page read and write
2B1F9B90000
heap
page read and write
1B720000
trusted library allocation
page read and write
1B670000
trusted library allocation
page read and write
2B1DFB00000
heap
page read and write
1B71B000
stack
page read and write
1B720000
trusted library allocation
page read and write
7FFAAC310000
trusted library allocation
page read and write
260AF765000
heap
page read and write
201C16D0000
heap
page read and write
1B8C0000
trusted library allocation
page read and write
203FF461000
heap
page read and write
2B1F9CD3000
heap
page read and write
1BD877B7000
heap
page read and write
2B1E36E6000
trusted library allocation
page read and write
1B710000
trusted library allocation
page read and write
2913E32A000
heap
page read and write
1D8B0C11000
heap
page read and write
1BD8822A000
heap
page read and write
1BD8760A000
heap
page read and write
9B5B0FC000
stack
page read and write
7FFAAC570000
trusted library allocation
page read and write
1BD88062000
heap
page read and write
1B620000
trusted library allocation
page read and write
1B740000
trusted library allocation
page read and write
1BC90000
trusted library allocation
page read and write
26E2000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
1BD8810F000
heap
page read and write
1BA00000
trusted library allocation
page read and write
7FFAAC650000
trusted library allocation
page read and write
7FFAAC610000
trusted library allocation
page read and write
7FFAAC517000
trusted library allocation
page read and write
1BD87616000
heap
page read and write
1BD8779F000
heap
page read and write
1BCC0000
trusted library allocation
page read and write
203FF260000
heap
page read and write
1BD8810F000
heap
page read and write
1B880000
trusted library section
page read and write
1BD877C0000
heap
page read and write
7FFB16791000
unkown
page execute read
1BD88107000
heap
page read and write
E4C1E7A000
stack
page read and write
1BD88120000
heap
page read and write
203FE740000
heap
page read and write
2B1F9BCE000
heap
page read and write
1BD875D5000
heap
page read and write
2257000
trusted library allocation
page read and write
7FFAAC33D000
trusted library allocation
page execute and read and write
30E0000
trusted library allocation
page read and write
7FFB0D720000
unkown
page readonly
1BD877C0000
heap
page read and write
1BD877F0000
heap
page read and write
1B730000
trusted library allocation
page read and write
1BB80000
trusted library allocation
page read and write
2B1F9F41000
heap
page read and write
1BD8810F000
heap
page read and write
1BD876C0000
heap
page read and write
1BD87799000
heap
page read and write
1BD877C5000
heap
page read and write
1BD880EF000
heap
page read and write
1BD8777F000
heap
page read and write
203FE970000
heap
page read and write
1D896730000
heap
page read and write
DAA000
heap
page read and write
1BD880DF000
heap
page read and write
1BD877A7000
heap
page read and write
1B020000
trusted library allocation
page read and write
1D8966A0000
trusted library section
page read and write
1B060000
trusted library allocation
page read and write
2260000
remote allocation
page read and write
1B020000
trusted library allocation
page read and write
1BD88066000
heap
page read and write
1BD875A4000
heap
page read and write
5075000
heap
page read and write
2B1E1570000
heap
page readonly
72B000
heap
page read and write
1BD877A9000
heap
page read and write
1BD87783000
heap
page read and write
2BCA1598000
heap
page read and write
7FFAAC6A0000
trusted library allocation
page read and write
1C0000
heap
page read and write
1B6A0000
trusted library allocation
page read and write
1B720000
trusted library allocation
page read and write
8D9D1FE000
stack
page read and write
7DF423EC4000
unkown
page read and write
1BD875B0000
heap
page read and write
2B1F9DE0000
heap
page read and write
30E0000
trusted library allocation
page read and write
1BD70000
trusted library allocation
page read and write
6D0000
heap
page read and write
1C4C0000
heap
page read and write
1AEAC000
heap
page read and write
2A20000
heap
page read and write
2260000
trusted library allocation
page read and write
1BC40000
trusted library allocation
page read and write
201C2DF1000
heap
page read and write
1BD87794000
heap
page read and write
1BD875A3000
heap
page read and write
2F31000
direct allocation
page execute and read and write
2B1F9BD8000
heap
page read and write
1BD87778000
heap
page read and write
1B023000
trusted library allocation
page read and write
203FE791000
heap
page read and write
2320000
trusted library allocation
page read and write
1BCB0000
trusted library allocation
page read and write
1B730000
trusted library allocation
page read and write
30DD000
stack
page read and write
1B720000
trusted library allocation
page read and write
7FFB16790000
unkown
page readonly
1B020000
trusted library allocation
page read and write
1B720000
trusted library allocation
page read and write
1BD87593000
heap
page read and write
1D8A8458000
trusted library allocation
page read and write
1BD880F7000
heap
page read and write
203FEE20000
heap
page read and write
E69000
heap
page read and write
18C0C235000
heap
page read and write
8D9D2FC000
stack
page read and write
1D898171000
trusted library allocation
page read and write
1BAED000
heap
page read and write
203FED40000
direct allocation
page execute and read and write
1D8966E0000
heap
page readonly
1BD87616000
heap
page read and write
2F30000
trusted library allocation
page read and write
1AEF4000
heap
page read and write
1A8C9000
heap
page read and write
1BD877B2000
heap
page read and write
1BD877E8000
heap
page read and write
1BD880B7000
heap
page read and write
1ADB0000
trusted library allocation
page read and write
1BD877FF000
heap
page read and write
5EDD000
stack
page read and write
1B756000
trusted library allocation
page read and write
2B1F9F8D000
heap
page read and write
1BD877D6000
heap
page read and write
50D2000
heap
page read and write
1BB50000
trusted library allocation
page read and write
1B8B0000
trusted library allocation
page read and write
1D899FA5000
trusted library allocation
page read and write
7FFAAC5A0000
trusted library allocation
page read and write
1B730000
trusted library allocation
page read and write
1B030000
trusted library allocation
page read and write
1AD9C000
heap
page execute and read and write
7FFB2CE20000
direct allocation
page execute and read and write
81D7A75000
stack
page read and write
1AEDA000
heap
page read and write
4FE2000
heap
page read and write
1BBF0000
trusted library allocation
page read and write
1BD87624000
heap
page read and write
1BD8822A000
heap
page read and write
81D8D4F000
stack
page read and write
2BCA1400000
heap
page read and write
1B023000
trusted library allocation
page read and write
2B1F9F6B000
heap
page read and write
1B730000
trusted library allocation
page read and write
7FFAAC4E1000
trusted library allocation
page read and write
5070000
heap
page read and write
1D8966F0000
trusted library allocation
page read and write
1D897FE4000
heap
page read and write
18C1E050000
trusted library allocation
page read and write
1B720000
trusted library allocation
page read and write
2B1F17AA000
trusted library allocation
page read and write
81D817E000
stack
page read and write
1BD8759D000
heap
page read and write
7FFAAC3E0000
trusted library allocation
page execute and read and write
1D8965A3000
heap
page read and write
18C0BF10000
heap
page read and write
1D8B0700000
heap
page read and write
2F20000
trusted library allocation
page read and write
1B910000
trusted library allocation
page read and write
1BD8778F000
heap
page read and write
26D5000
trusted library allocation
page read and write
2CDA000
heap
page read and write
1BD877C0000
heap
page read and write
1B6CF000
trusted library allocation
page read and write
1BD8558B000
heap
page read and write
1BD8778E000
heap
page read and write
2EAE000
stack
page read and write
1B020000
trusted library allocation
page read and write
1BD8806F000
heap
page read and write
1BE03000
trusted library allocation
page read and write
1B730000
trusted library allocation
page read and write
7FFB167A6000
unkown
page readonly
1D8965A5000
heap
page read and write
1BD87615000
heap
page read and write
1BD877FB000
heap
page read and write
1B6A0000
trusted library allocation
page read and write
2F10000
trusted library allocation
page read and write
2B1F9F4E000
heap
page read and write
2A80000
heap
page read and write
1BD877F0000
heap
page read and write
1D8B09D6000
heap
page read and write
1B023000
trusted library allocation
page read and write
1B6F0000
trusted library allocation
page read and write
203FE7A2000
heap
page read and write
7FFAAC452000
trusted library allocation
page read and write
1BD877A8000
heap
page read and write
F23000
heap
page read and write
1BD8804D000
heap
page read and write
1B020000
trusted library allocation
page read and write
1BCA0000
trusted library allocation
page read and write
2250000
trusted library allocation
page read and write
1BD00000
trusted library allocation
page read and write
5120000
heap
page read and write
2B40000
heap
page read and write
81D7FF7000
stack
page read and write
7FFAAC350000
trusted library allocation
page read and write
2200000
heap
page read and write
1BD87787000
heap
page read and write
1B023000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
1BD87801000
heap
page read and write
1BD8778D000
heap
page read and write
1BD8811F000
heap
page read and write
201C1260000
heap
page read and write
1BD880EF000
heap
page read and write
3C0000
heap
page readonly
203FE78B000
heap
page read and write
1BD880DF000
heap
page read and write
5197000
heap
page read and write
1BD880CF000
heap
page read and write
1BD877A8000
heap
page read and write
1BD877CF000
heap
page read and write
1BD8758D000
heap
page read and write
1B023000
trusted library allocation
page read and write
203FEE72000
heap
page read and write
1D897FE0000
heap
page read and write
1BB40000
trusted library allocation
page read and write
1BD8778F000
heap
page read and write
1BD8822A000
heap
page read and write
1BD87609000
heap
page read and write
1BD8822A000
heap
page read and write
1B030000
trusted library allocation
page read and write
1BD877BA000
heap
page read and write
E4C1D79000
stack
page read and write
1B0DB000
heap
page read and write
203FEE72000
heap
page read and write
7FFAAC28B000
trusted library allocation
page execute and read and write
1BD87609000
heap
page read and write
1BD877E8000
heap
page read and write
1B870000
heap
page execute and read and write
1BD8822A000
heap
page read and write
1BD877A3000
heap
page read and write
1BD8810F000
heap
page read and write
7FFAAC270000
trusted library allocation
page read and write
1BD877C0000
heap
page read and write
2B1F9F7D000
heap
page read and write
1B020000
trusted library allocation
page read and write
1BD880A6000
heap
page read and write
1B090000
trusted library allocation
page read and write
3D0000
heap
page read and write
1BD8757A000
heap
page read and write
1BD877FD000
heap
page read and write
1BD87569000
heap
page read and write
1BD87800000
heap
page read and write
1ADF0000
trusted library allocation
page read and write
1BD880F7000
heap
page read and write
B04000
stack
page read and write
203FE940000
heap
page read and write
1B720000
trusted library allocation
page read and write
2913DF50000
remote allocation
page execute and read and write
2B1DFB46000
heap
page read and write
1BC75000
trusted library allocation
page read and write
1B690000
trusted library allocation
page read and write
30F0000
direct allocation
page read and write
7FFAAC5B0000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
2B1FA2FC000
heap
page read and write
1BD87801000
heap
page read and write
1B7D0000
trusted library allocation
page read and write
1BD87D7B000
heap
page read and write
1B730000
trusted library allocation
page read and write
203FED30000
trusted library allocation
page read and write
7FFAAC27D000
trusted library allocation
page execute and read and write
1BD88107000
heap
page read and write
1D89912D000
trusted library allocation
page read and write
1BD880AE000
heap
page read and write
7FFAAC326000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
1B720000
trusted library allocation
page read and write
1BD87801000
heap
page read and write
1B660000
trusted library allocation
page read and write
51BE000
heap
page read and write
7FFAAC590000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
1BD88097000
heap
page read and write
1E0000
heap
page read and write
2335000
heap
page read and write
1BAC0000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
1B730000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
1B0CF000
heap
page read and write
260AF591000
unkown
page execute read
1BD877C5000
heap
page read and write
1BD877B5000
heap
page read and write
1B020000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
7FFAAC5D2000
trusted library allocation
page read and write
1BD87A20000
unkown
page read and write
1BBA0000
trusted library allocation
page read and write
67B000
stack
page read and write
1BD87801000
heap
page read and write
1BD880D7000
heap
page read and write
7FFAAC410000
trusted library allocation
page read and write
1BD87794000
heap
page read and write
1B020000
trusted library allocation
page read and write
1B74F000
trusted library allocation
page read and write
1B720000
trusted library allocation
page read and write
203FF316000
heap
page read and write
7FFAAC550000
trusted library allocation
page read and write
18C0C062000
heap
page read and write
1B023000
trusted library allocation
page read and write
1A8B6000
heap
page read and write
1BD877CF000
heap
page read and write
400000
unkown
page readonly
1BD87801000
heap
page read and write
1BD8757B000
heap
page read and write
1BD87830000
unkown
page read and write
1BD877A3000
heap
page read and write
1B023000
trusted library allocation
page read and write
1BD877FC000
heap
page read and write
1BD880FF000
heap
page read and write
1BD8761B000
heap
page read and write
1AEDA000
heap
page read and write
2B1E357F000
trusted library allocation
page read and write
D38000
heap
page read and write
1BD877B7000
heap
page read and write
D35000
heap
page read and write
B798E7D000
stack
page read and write
2B1F9F81000
heap
page read and write
7FFAAC510000
trusted library allocation
page read and write
1B760000
trusted library allocation
page read and write
18C2625F000
heap
page read and write
1D8B07F6000
heap
page read and write
1BD88056000
heap
page read and write
1D89659D000
heap
page read and write
7FF79E8F0000
unkown
page readonly
1BD875B0000
heap
page read and write
1B8FE000
stack
page read and write
1B720000
trusted library allocation
page read and write
203FE79B000
heap
page read and write
1BD87626000
heap
page read and write
260B1150000
heap
page readonly
2913E11C000
heap
page read and write
6A7000
unkown
page readonly
2EE0000
trusted library allocation
page read and write
1BD87588000
heap
page read and write
B2EEC7C000
stack
page read and write
1B030000
trusted library allocation
page read and write
B798EFE000
stack
page read and write
1BB20000
trusted library allocation
page read and write
2BCA2E41000
heap
page read and write
7FFAAC3D0000
trusted library allocation
page read and write
1BD87615000
heap
page read and write
2A44000
heap
page read and write
7FFAAC3EC000
trusted library allocation
page execute and read and write
1BD877FD000
heap
page read and write
1B023000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
1D8A8171000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
1BD877C5000
heap
page read and write
1B040000
trusted library allocation
page read and write
18C26160000
heap
page read and write
2B1F9F67000
heap
page read and write
1BD87572000
heap
page read and write
203FEDA0000
heap
page read and write
7FFAAC31C000
trusted library allocation
page execute and read and write
1BD8759D000
heap
page read and write
1BD880E7000
heap
page read and write
1B730000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
1BD8778F000
heap
page read and write
1BD877D7000
heap
page read and write
2250000
trusted library allocation
page read and write
1BD8761D000
heap
page read and write
8AD000
unkown
page readonly
1BD87796000
heap
page read and write
1BDE0000
trusted library allocation
page read and write
7FFAAC5A0000
trusted library allocation
page read and write
1D896430000
heap
page read and write
203FEE72000
heap
page read and write
92D477C000
stack
page read and write
1B023000
trusted library allocation
page read and write
7FFAAC490000
trusted library allocation
page read and write
1BD880D7000
heap
page read and write
2320000
trusted library allocation
page read and write
1B960000
trusted library allocation
page read and write
1BD88083000
heap
page read and write
1D8B08A7000
heap
page read and write
1BD88117000
heap
page read and write
A90000
heap
page read and write
1BD88053000
heap
page read and write
1B740000
trusted library allocation
page read and write
1BD877A9000
heap
page read and write
1BD88071000
heap
page read and write
1BD875A1000
heap
page read and write
1BD877D0000
heap
page read and write
1BD8757B000
heap
page read and write
1BD880D7000
heap
page read and write
1B023000
trusted library allocation
page read and write
1BD8759C000
heap
page read and write
1ADE0000
trusted library allocation
page read and write
18C262A9000
heap
page read and write
1BCD0000
trusted library allocation
page read and write
B2EECFD000
stack
page read and write
1BD87778000
heap
page read and write
3110000
heap
page execute and read and write
1B600000
trusted library allocation
page read and write
7FFAAC332000
trusted library allocation
page read and write
1B8A0000
trusted library allocation
page read and write
B50000
heap
page read and write
1BD87615000
heap
page read and write
1BD8760D000
heap
page read and write
18C26262000
heap
page read and write
E4C2E8D000
stack
page read and write
7FFAAC324000
trusted library allocation
page read and write
2913E050000
heap
page read and write
201C16D5000
heap
page read and write
1B8BA000
stack
page read and write
201C1399000
heap
page read and write
2913E326000
heap
page read and write
203FF4D2000
heap
page read and write
1BD8822A000
heap
page read and write
1BD8822A000
heap
page read and write
2913E32E000
heap
page read and write
1BD877FF000
heap
page read and write
1BD8810F000
heap
page read and write
1BD87615000
heap
page read and write
2260000
trusted library allocation
page read and write
1BD880EF000
heap
page read and write
56DF000
stack
page read and write
1B930000
heap
page read and write
1BD88053000
heap
page read and write
1BD880F7000
heap
page read and write
203FEE73000
heap
page read and write
1BA60000
trusted library allocation
page read and write
1B7B0000
trusted library allocation
page read and write
1BD88057000
heap
page read and write
8AD000
unkown
page readonly
2B1F9EF7000
heap
page read and write
18C0DAC0000
heap
page execute and read and write
1B740000
trusted library allocation
page read and write
7FFAAC750000
trusted library allocation
page read and write
1BD877AC000
heap
page read and write
7FFAAC380000
trusted library allocation
page execute and read and write
7FFAAC670000
trusted library allocation
page read and write
8D9CDFA000
stack
page read and write
1BD8761B000
heap
page read and write
1BD8811F000
heap
page read and write
1BD8759F000
heap
page read and write
340000
heap
page read and write
2B1E31EF000
trusted library allocation
page read and write
1B727000
trusted library allocation
page read and write
1BD8810F000
heap
page read and write
203FE7AC000
heap
page read and write
1BDA9000
trusted library allocation
page read and write
1BD87794000
heap
page read and write
7FFAAC400000
trusted library allocation
page read and write
2B1DFB8C000
heap
page read and write
7FF6E4C9D000
direct allocation
page execute and read and write
1BD8811F000
heap
page read and write
1B020000
trusted library allocation
page read and write
7DF4C6CF0000
trusted library allocation
page execute and read and write
1BD87778000
heap
page read and write
2B1F1A28000
trusted library allocation
page read and write
1BD880B1000
heap
page read and write
1BD8779D000
heap
page read and write
30F0000
trusted library allocation
page read and write
1BD8777E000
heap
page read and write
1B023000
trusted library allocation
page read and write
7FFAAC32C000
trusted library allocation
page execute and read and write
E77000
heap
page read and write
8D9C9EE000
stack
page read and write
1B9D0000
trusted library allocation
page read and write
203FE794000
heap
page read and write
1BD88040000
heap
page read and write
1BD877C0000
heap
page read and write
1BD8559D000
heap
page read and write
2BCA2D40000
heap
page read and write
1B6B0000
trusted library allocation
page read and write
26F2000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
1BD875E2000
heap
page read and write
1B620000
trusted library allocation
page read and write
18C0C1F0000
trusted library allocation
page read and write
63E000
stack
page read and write
1BDBA000
trusted library allocation
page read and write
18C0F672000
trusted library allocation
page read and write
1BA10000
trusted library allocation
page read and write
203FED30000
unkown
page read and write
1BD877B5000
heap
page read and write
1BD8822A000
heap
page read and write
1BD8822A000
heap
page read and write
1BD8757A000
heap
page read and write
1BD87609000
heap
page read and write
2B1DFDB5000
heap
page read and write
7FFAAC600000
trusted library allocation
page read and write
1BD8811F000
heap
page read and write
DA5000
heap
page read and write
1BD87609000
heap
page read and write
1D8B0C25000
heap
page read and write
1BD877FD000
heap
page read and write
1AD60000
trusted library allocation
page read and write
7FF79E8F1000
unkown
page execute read
7FFAAC284000
trusted library allocation
page read and write
1B733000
trusted library allocation
page read and write
1BD877B2000
heap
page read and write
1BD880D7000
heap
page read and write
1BD87776000
heap
page read and write
2BCA2E44000
heap
page read and write
1B750000
trusted library allocation
page read and write
1D8B0540000
heap
page read and write
1B050000
trusted library allocation
page read and write
E4C2D0E000
stack
page read and write
7FFAAC560000
trusted library allocation
page read and write
2F30000
trusted library allocation
page read and write
1BD877FF000
heap
page read and write
1BD880EF000
heap
page read and write
D80000
heap
page read and write
1B730000
trusted library allocation
page read and write
D4A000
heap
page read and write
2260000
trusted library allocation
page read and write
69F000
unkown
page read and write
2644000
trusted library allocation
page read and write
2B1F9CE3000
heap
page read and write
1BD87776000
heap
page read and write
203FED60000
unkown
page read and write
1BCC0000
trusted library allocation
page read and write
1BD87801000
heap
page read and write
23C1000
trusted library allocation
page read and write
1ACA0000
trusted library allocation
page read and write
1BD8559D000
heap
page read and write
1B900000
trusted library allocation
page read and write
1BD87615000
heap
page read and write
1BD8777C000
heap
page read and write
1B7C0000
trusted library allocation
page read and write
7FFB167B2000
unkown
page readonly
7FFB167B0000
unkown
page read and write
5096000
heap
page read and write
1B020000
trusted library allocation
page read and write
1BD875A1000
heap
page read and write
1D899C46000
trusted library allocation
page read and write
1AD85000
trusted library allocation
page read and write
1BD875A3000
heap
page read and write
1BD87569000
heap
page read and write
1B020000
trusted library allocation
page read and write
1C780000
unkown
page read and write
1B8C0000
trusted library allocation
page read and write
1BD880F7000
heap
page read and write
1B020000
trusted library allocation
page read and write
1BD87778000
heap
page read and write
7FFAAC540000
trusted library allocation
page read and write
1D897FFD000
heap
page read and write
1BD85591000
heap
page read and write
2260000
trusted library allocation
page read and write
1BD8778D000
heap
page read and write
7FFAAC5E0000
trusted library allocation
page read and write
690000
trusted library allocation
page read and write
50FC000
heap
page read and write
1BD87E76000
heap
page read and write
1D8B09D2000
heap
page read and write
1B033000
trusted library allocation
page read and write
1BD880F7000
heap
page read and write
7FFAAC550000
trusted library allocation
page read and write
1B659000
trusted library allocation
page read and write
1B730000
trusted library allocation
page read and write
1BD87778000
heap
page read and write
1BD8810F000
heap
page read and write
1BD87787000
heap
page read and write
1D8A81A1000
trusted library allocation
page read and write
7DF49A980000
trusted library allocation
page execute and read and write
7FFB167B0000
unkown
page read and write
1B020000
trusted library allocation
page read and write
D81000
heap
page read and write
1B023000
trusted library allocation
page read and write
23A8000
trusted library allocation
page read and write
1BD877C8000
heap
page read and write
1BD877F2000
heap
page read and write
7FFB0D6D0000
unkown
page readonly
2100000
heap
page read and write
1BD88096000
heap
page read and write
B90000
heap
page read and write
1D899C5C000
trusted library allocation
page read and write
E4C21BE000
stack
page read and write
1D8B092B000
heap
page read and write
7FFAAC660000
trusted library allocation
page read and write
7FFAAC5C0000
trusted library allocation
page read and write
D0F000
heap
page read and write
1B810000
trusted library allocation
page read and write
1BD880F7000
heap
page read and write
327F000
stack
page read and write
1BC30000
trusted library allocation
page read and write
1BD877F0000
heap
page read and write
1ACF0000
trusted library allocation
page read and write
D55000
heap
page read and write
1B060000
trusted library allocation
page read and write
1BD8810F000
heap
page read and write
1B040000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
2B1F1A30000
trusted library allocation
page read and write
1B740000
trusted library allocation
page read and write
1BD70000
trusted library allocation
page read and write
1BD8779F000
heap
page read and write
1BD8811F000
heap
page read and write
18C0FC10000
trusted library allocation
page read and write
2B1E32F2000
trusted library allocation
page read and write
1BD87569000
heap
page read and write
1BD14000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
7FFAAC500000
trusted library allocation
page execute and read and write
E4C1942000
stack
page read and write
26F7000
trusted library allocation
page read and write
7FFB167B0000
unkown
page read and write
1B020000
trusted library allocation
page read and write
955000
heap
page read and write
2B1E3234000
trusted library allocation
page read and write
2B1DFD60000
heap
page read and write
1BD8810F000
heap
page read and write
2B1E314A000
trusted library allocation
page read and write
2B1F9EB9000
heap
page read and write
1B020000
trusted library allocation
page read and write
E4C2E0D000
stack
page read and write
1BD880EF000
heap
page read and write
1B050000
trusted library allocation
page read and write
1BAB0000
trusted library allocation
page read and write
1BD88110000
heap
page read and write
1BD8778D000
heap
page read and write
1BC30000
trusted library allocation
page read and write
1BD87609000
heap
page read and write
8D9D47E000
stack
page read and write
920000
heap
page execute and read and write
1BD879AB000
unkown
page read and write
1BD877A8000
heap
page read and write
18C0DE64000
heap
page read and write
7FFAAC480000
trusted library allocation
page read and write
203FE78B000
heap
page read and write
1B920000
trusted library allocation
page read and write
1D8B07F8000
heap
page read and write
2B1E321E000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
18C262F2000
heap
page read and write
2B1E15A0000
trusted library allocation
page read and write
910000
trusted library allocation
page read and write
8D9DDCE000
stack
page read and write
7FFB167A6000
unkown
page readonly
201C1350000
heap
page read and write
1BD87781000
heap
page read and write
1BD880CF000
heap
page read and write
1BD877B7000
heap
page read and write
1BD10000
trusted library allocation
page read and write
1BD88117000
heap
page read and write
7FFAAC290000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
1BD877B8000
heap
page read and write
1AFB0000
trusted library allocation
page read and write
736000
heap
page read and write
1BD87604000
heap
page read and write
18C0DA23000
trusted library allocation
page read and write
1BD880D7000
heap
page read and write
1B020000
trusted library allocation
page read and write
1B773000
trusted library allocation
page read and write
1BD877F0000
heap
page read and write
1D8965BD000
heap
page read and write
1BD88048000
heap
page read and write
1BD87778000
heap
page read and write
1BD877A7000
heap
page read and write
1D8B0570000
heap
page read and write
1B780000
trusted library allocation
page read and write
1D8965EA000
heap
page read and write
203FEE28000
heap
page read and write
1AEE7000
heap
page read and write
1B730000
trusted library allocation
page read and write
1BD877E8000
heap
page read and write
2B1DFD40000
heap
page read and write
1BD8809F000
heap
page read and write
2B1FA2B0000
heap
page read and write
79A000
heap
page read and write
1B020000
trusted library allocation
page read and write
212E000
stack
page read and write
1BD40000
trusted library allocation
page read and write
1BD877CF000
heap
page read and write
1C0D2000
direct allocation
page execute and read and write
2AB0000
trusted library allocation
page read and write
1D8B08F0000
heap
page read and write
1BD877B5000
heap
page read and write
1B770000
trusted library allocation
page read and write
1B720000
trusted library allocation
page read and write
31C3000
trusted library allocation
page read and write
7FFAAC698000
trusted library allocation
page read and write
1B040000
trusted library allocation
page read and write
2E3C000
heap
page read and write
1BD87574000
heap
page read and write
1BD8779D000
heap
page read and write
1BBE0000
trusted library allocation
page read and write
2B1F9DE3000
heap
page read and write
81D7AFE000
stack
page read and write
1BD87E13000
heap
page read and write
7DF418660000
trusted library allocation
page execute and read and write
1B730000
trusted library allocation
page read and write
1BD40000
trusted library allocation
page read and write
1D8B07E0000
heap
page read and write
1BD880EF000
heap
page read and write
1BD88072000
heap
page read and write
1BD87CBD000
heap
page read and write
1B850000
trusted library allocation
page read and write
260AF6F0000
heap
page read and write
7FFAAC530000
trusted library allocation
page read and write
1BD87779000
heap
page read and write
1BD875A1000
heap
page read and write
D94000
heap
page read and write
1BD880EF000
heap
page read and write
1B750000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
203FF316000
heap
page read and write
1BD8811F000
heap
page read and write
1BD80000
trusted library allocation
page read and write
7FFAAC5C4000
trusted library allocation
page read and write
203FF460000
heap
page read and write
1BD8805F000
heap
page read and write
1B6C0000
trusted library allocation
page read and write
1B730000
trusted library allocation
page read and write
1B970000
trusted library allocation
page read and write
2BCA14A8000
heap
page read and write
1ACD0000
trusted library allocation
page read and write
203FF270000
heap
page read and write
5099000
heap
page read and write
2F30000
trusted library allocation
page read and write
1B87C000
heap
page execute and read and write
1BD877BF000
heap
page read and write
1BE30000
trusted library allocation
page read and write
2BCA1460000
heap
page read and write
1BD87615000
heap
page read and write
1BD8779B000
heap
page read and write
203FEEEA000
heap
page read and write
7FFAAC4E0000
trusted library allocation
page read and write
2310000
trusted library allocation
page read and write
2B1F9F69000
heap
page read and write
1B023000
trusted library allocation
page read and write
1BD8811F000
heap
page read and write
1AE5E000
heap
page read and write
1BCD0000
trusted library allocation
page read and write
1B720000
trusted library allocation
page read and write
7FFB167B0000
unkown
page read and write
1BD875A3000
heap
page read and write
1BD8778F000
heap
page read and write
18C0DAD0000
heap
page execute and read and write
1D8B0900000
heap
page read and write
1AD90000
heap
page execute and read and write
50F6000
heap
page read and write
1ADD0000
trusted library allocation
page read and write
1B67D000
trusted library allocation
page read and write
18C0E000000
heap
page execute and read and write
1B023000
trusted library allocation
page read and write
1BD8758B000
heap
page read and write
1BD880E0000
heap
page read and write
1B600000
trusted library allocation
page read and write
1BD8810F000
heap
page read and write
12349000
trusted library allocation
page read and write
1BD87796000
heap
page read and write
E4C1FBE000
stack
page read and write
1AFA0000
trusted library allocation
page read and write
7FFAAC600000
trusted library allocation
page read and write
1BD60000
trusted library allocation
page read and write
260AF5EF000
unkown
page execute and read and write
7FFAAC620000
trusted library allocation
page read and write
2B1F9F05000
heap
page read and write
507D000
heap
page read and write
7FFAAC5D8000
trusted library allocation
page read and write
1AEC0000
trusted library allocation
page read and write
7FFB0D748000
unkown
page readonly
60C0000
trusted library allocation
page read and write
7FFAAC34B000
trusted library allocation
page read and write
1BB30000
trusted library allocation
page read and write
E60000
heap
page read and write
1BD87840000
trusted library allocation
page read and write
7FF79EACF000
unkown
page readonly
7FFAAC5C0000
trusted library allocation
page read and write
1BD87787000
heap
page read and write
7FFAAC440000
trusted library allocation
page execute and read and write
1BD880CF000
heap
page read and write
2B1F9BD6000
heap
page read and write
7FFAAC640000
trusted library allocation
page read and write
203FF2D5000
heap
page read and write
1BD88044000
heap
page read and write
1B730000
trusted library allocation
page read and write
1BD88117000
heap
page read and write
1D8B0993000
heap
page read and write
7FFAAC7D0000
trusted library allocation
page read and write
1BD880F7000
heap
page read and write
1BD8758D000
heap
page read and write
1BD88048000
heap
page read and write
1B8E0000
trusted library allocation
page read and write
1BD87787000
heap
page read and write
1BD8758B000
heap
page read and write
7FFAAC723000
trusted library allocation
page read and write
1BD85568000
heap
page read and write
1B730000
trusted library allocation
page read and write
1BD877FF000
heap
page read and write
2B1F9DF4000
heap
page read and write
DA7000
heap
page read and write
1BD8778D000
heap
page read and write
1A7D0000
heap
page read and write
7FFB16791000
unkown
page execute read
506A000
heap
page read and write
1BD8822A000
heap
page read and write
23BA000
trusted library allocation
page read and write
1BD88086000
heap
page read and write
1BD87801000
heap
page read and write
1BD88087000
heap
page read and write
1B680000
trusted library allocation
page read and write
203FE6C0000
unkown
page read and write
1B020000
trusted library allocation
page read and write
1BD87794000
heap
page read and write
1BD87778000
heap
page read and write
1AD8B000
stack
page read and write
1D8966B0000
trusted library allocation
page read and write
18C0F731000
trusted library allocation
page read and write
2330000
heap
page read and write
1BD8760B000
heap
page read and write
1B020000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
1BD8558B000
heap
page read and write
1B023000
trusted library allocation
page read and write
1BD85592000
heap
page read and write
1BD87593000
heap
page read and write
509C000
heap
page read and write
7DF44A1E0000
trusted library allocation
page execute and read and write
1BD877E4000
heap
page read and write
1B023000
trusted library allocation
page read and write
1BD877E8000
heap
page read and write
1BD8822A000
heap
page read and write
1BD88044000
heap
page read and write
6B0000
heap
page read and write
1BD8760B000
heap
page read and write
1BD877FC000
heap
page read and write
2C30000
heap
page read and write
286E000
stack
page read and write
1B023000
trusted library allocation
page read and write
1D898EDF000
trusted library allocation
page read and write
1BD8779D000
heap
page read and write
1BD880EF000
heap
page read and write
1BD8777E000
heap
page read and write
1BD875B7000
heap
page read and write
1BD8811F000
heap
page read and write
1BD877FF000
heap
page read and write
1BD880F7000
heap
page read and write
81D837B000
stack
page read and write
7FF6E4C85000
direct allocation
page execute and read and write
5116000
heap
page read and write
7FF79EACF000
unkown
page readonly
1BD8822A000
heap
page read and write
1B9A0000
trusted library allocation
page read and write
E4C22BE000
stack
page read and write
1B610000
trusted library allocation
page read and write
1ADFA000
trusted library allocation
page read and write
1B740000
trusted library allocation
page read and write
2240000
trusted library allocation
page read and write
6C7000
heap
page read and write
1B023000
trusted library allocation
page read and write
203FE71C000
unkown
page read and write
1BD8822A000
heap
page read and write
791000
heap
page read and write
1BD88107000
heap
page read and write
1D897EE0000
trusted library allocation
page read and write
1AFF0000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
2250000
trusted library allocation
page read and write
1BD87801000
heap
page read and write
D3A000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
1C9A0000
unkown
page read and write
2250000
trusted library allocation
page read and write
7FFAAC424000
trusted library allocation
page read and write
1BD87794000
heap
page read and write
1BD87787000
heap
page read and write
1B743000
trusted library allocation
page read and write
1BD877B5000
heap
page read and write
2A76000
heap
page read and write
1B020000
trusted library allocation
page read and write
203FEE30000
heap
page read and write
1BD877D8000
heap
page read and write
1BD877F0000
heap
page read and write
1BD85591000
heap
page read and write
203FF2D5000
heap
page read and write
7FFAAC28B000
trusted library allocation
page read and write
1BD877A8000
heap
page read and write
2260000
trusted library allocation
page read and write
1D8B0560000
heap
page execute and read and write
1B020000
trusted library allocation
page read and write
1B97B000
stack
page read and write
1BD877A2000
heap
page read and write
203FF261000
heap
page read and write
1B020000
trusted library allocation
page read and write
1BD877C0000
heap
page read and write
1AF72000
heap
page read and write
1BD877FD000
heap
page read and write
1D8B05D1000
heap
page read and write
1AD00000
trusted library allocation
page read and write
B60000
heap
page read and write
1B8C0000
trusted library allocation
page read and write
18C0EC72000
trusted library allocation
page read and write
1AEA0000
trusted library allocation
page read and write
2A71000
heap
page read and write
2920000
heap
page read and write
1B8C3000
trusted library allocation
page read and write
1BD87622000
heap
page read and write
1B023000
trusted library allocation
page read and write
18C0DA60000
trusted library allocation
page read and write
1BD880B0000
heap
page read and write
1D896690000
trusted library section
page read and write
1B023000
trusted library allocation
page read and write
1AED0000
heap
page read and write
26E0000
trusted library allocation
page read and write
1BD877F3000
heap
page read and write
7FFAAC4D0000
trusted library allocation
page read and write
DA7000
heap
page read and write
7FFAAC3FC000
trusted library allocation
page execute and read and write
1B8C0000
trusted library allocation
page read and write
1BD8822A000
heap
page read and write
1BD878F0000
unkown
page read and write
D41000
heap
page read and write
1B8C0000
trusted library allocation
page read and write
7FFAAC720000
trusted library allocation
page read and write
2B1F9FB3000
heap
page read and write
1B023000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
1BCE0000
trusted library allocation
page read and write
1BD87609000
heap
page read and write
18C26330000
heap
page read and write
201C1310000
heap
page readonly
1BCB0000
trusted library allocation
page read and write
1BD87787000
heap
page read and write
1BD877F6000
heap
page read and write
1BD85591000
heap
page read and write
7FFAAC457000
trusted library allocation
page read and write
313E000
trusted library allocation
page read and write
1B080000
trusted library allocation
page read and write
7FFAAC4E0000
trusted library allocation
page read and write
18C0F743000
trusted library allocation
page read and write
2BCA304D000
heap
page read and write
7FFAAC38C000
trusted library allocation
page execute and read and write
1B023000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
1BD880C7000
heap
page read and write
1BD877D8000
heap
page read and write
2260000
trusted library allocation
page read and write
1BD877D8000
heap
page read and write
81D7B7E000
stack
page read and write
1BD877F2000
heap
page read and write
1B730000
trusted library allocation
page read and write
7FFAAC790000
trusted library allocation
page read and write
1D897FE6000
heap
page read and write
1BD877BF000
heap
page read and write
2ED0000
heap
page read and write
1B720000
trusted library allocation
page read and write
1AED4000
heap
page read and write
1BD80000
trusted library allocation
page read and write
2D83000
heap
page read and write
1B023000
trusted library allocation
page read and write
1AE50000
trusted library allocation
page read and write
5107000
heap
page read and write
203FE790000
heap
page read and write
3100000
trusted library allocation
page read and write
1D896734000
heap
page read and write
380000
heap
page read and write
1BC63000
trusted library allocation
page read and write
1BD875A1000
heap
page read and write
1BA30000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
81D7F76000
stack
page read and write
1BD8805F000
heap
page read and write
B798BFD000
stack
page read and write
E4C223E000
stack
page read and write
8D9CCFE000
stack
page read and write
2B1DFB88000
heap
page read and write
1BD8777F000
heap
page read and write
1D8B0618000
heap
page read and write
268D000
trusted library allocation
page read and write
1AFA0000
trusted library allocation
page read and write
1BC40000
trusted library allocation
page read and write
2B1DFC00000
heap
page read and write
2210000
trusted library section
page read and write
1A7F4000
heap
page read and write
2B1F9DB0000
heap
page execute and read and write
1BA30000
trusted library allocation
page read and write
2B1F9F79000
heap
page read and write
2D83000
heap
page read and write
2253000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
8D9D37E000
stack
page read and write
1BD8811F000
heap
page read and write
1BD87572000
heap
page read and write
1BD8777C000
heap
page read and write
1AEE0000
trusted library allocation
page read and write
1BD877FC000
heap
page read and write
2A36000
heap
page read and write
1BD8822A000
heap
page read and write
1BD87792000
heap
page read and write
1BD8761B000
heap
page read and write
1BD877A8000
heap
page read and write
1BD88066000
heap
page read and write
1BCA2000
trusted library allocation
page read and write
1BD87579000
heap
page read and write
1BD87801000
heap
page read and write
1D899CDF000
trusted library allocation
page read and write
1BD50000
trusted library allocation
page read and write
1B6C0000
trusted library allocation
page read and write
7FFAAC460000
trusted library allocation
page execute and read and write
7DF4C6CE0000
trusted library allocation
page execute and read and write
1BD87569000
heap
page read and write
1B720000
trusted library allocation
page read and write
1AEF6000
heap
page read and write
18C0C03D000
heap
page read and write
2B1F9E81000
heap
page read and write
B798B7A000
stack
page read and write
2257000
trusted library allocation
page read and write
1BB60000
trusted library allocation
page read and write
1B030000
trusted library allocation
page read and write
1AD0D000
stack
page read and write
18C26324000
heap
page read and write
1B8D0000
trusted library allocation
page read and write
1BD87778000
heap
page read and write
1BD877B5000
heap
page read and write
7FFAAC520000
trusted library allocation
page execute and read and write
18C0E0CB000
trusted library allocation
page read and write
28EE000
stack
page read and write
1BD87797000
heap
page read and write
2250000
trusted library allocation
page read and write
23C3000
trusted library allocation
page read and write
18C0FCDF000
trusted library allocation
page read and write
D80000
heap
page read and write
1B733000
trusted library allocation
page read and write
7FFAAC270000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
203FE78B000
heap
page read and write
1AE80000
trusted library allocation
page read and write
1BD877AC000
heap
page read and write
2BCA3159000
heap
page read and write
7FFAAC34D000
trusted library allocation
page execute and read and write
7FFAAC334000
trusted library allocation
page read and write
1D8A8464000
trusted library allocation
page read and write
1BD8777E000
heap
page read and write
1BC00000
trusted library allocation
page read and write
7FFAAC323000
trusted library allocation
page execute and read and write
1BD87794000
heap
page read and write
729000
heap
page read and write
1B020000
trusted library allocation
page read and write
1D8A8191000
trusted library allocation
page read and write
51A4000
heap
page read and write
1BD880D7000
heap
page read and write
1BD880F7000
heap
page read and write
1AEB3000
heap
page read and write
950000
heap
page read and write
1B720000
trusted library allocation
page read and write
2B1F1771000
trusted library allocation
page read and write
81D7E7E000
stack
page read and write
1BD8822A000
heap
page read and write
203FF316000
heap
page read and write
1C6C0000
unkown
page read and write
1BD875A3000
heap
page read and write
1BD88436000
heap
page read and write
7FF6E47F0000
direct allocation
page execute and read and write
7DF4D7030000
trusted library allocation
page execute and read and write
1B740000
trusted library allocation
page read and write
1B023000
trusted library allocation
page read and write
2649000
trusted library allocation
page read and write
D45000
heap
page read and write
1BD87569000
heap
page read and write
1B760000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
7FFAAC780000
trusted library allocation
page read and write
E4C19CE000
stack
page read and write
1BC83000
trusted library allocation
page read and write
203FE7AD000
heap
page read and write
517E000
heap
page read and write
EC173FF000
stack
page read and write
1B720000
trusted library allocation
page read and write
1BD87714000
heap
page read and write
1B030000
trusted library allocation
page read and write
1B760000
trusted library allocation
page read and write
2B1F9E6B000
heap
page read and write
1BD877C8000
heap
page read and write
1BD877C4000
heap
page read and write
A94000
heap
page read and write
1BCF0000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
1BD87593000
heap
page read and write
1BD877E8000
heap
page read and write
1BC80000
trusted library allocation
page read and write
1B630000
trusted library allocation
page read and write
1AEC3000
heap
page read and write
There are 2763 hidden memdumps, click here to show them.