IOC Report
n5QCsKJ0CP.exe

loading gif

Files

File Path
Type
Category
Malicious
n5QCsKJ0CP.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\build3.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\eimdbt.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Access\InnerException.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\FailedAssemblyInfo.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
modified
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FailedAssemblyInfo.vbs
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Remaining.vbs
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Remaining.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_InstallUtil.exe_8949e4acefc2387d412734ba6064a5467c4ef5d4_072a990f_c80ab6cf-a7e4-4b3e-bb7b-5c0f8717cbac\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER28EA.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Nov 23 08:07:13 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2939.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2998.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\InnerException.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\eimdbt.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp2C97.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp2CA8.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp2CA9.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp2CBA.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp2CCA.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp2CDB.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp2CEC.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp2CFC.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp2CFD.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp65F0.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp6601.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp6612.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp6622.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp6633.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp7E3E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp7E3F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp7E50.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp7E60.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp7E61.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpB50B.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpB50C.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpB51C.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpB51D.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpB89D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpB89E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpB8AE.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpB8BF.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpB8CF.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpB8D0.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpB8E1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpB901.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpB902.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpF2D0.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpF2E1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpF2E2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpF2F2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpF303.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpF314.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpF315.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpF325.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpF326.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpF337.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Roaming\Remaining.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 49 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\n5QCsKJ0CP.exe
"C:\Users\user\Desktop\n5QCsKJ0CP.exe"
malicious
C:\Users\user\AppData\Local\Temp\build3.exe
"C:\Users\user\AppData\Local\Temp\build3.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Users\user\AppData\Local\Temp\eimdbt.exe
"C:\Users\user\AppData\Local\Temp\eimdbt.exe"
malicious
C:\Users\user\AppData\Local\Temp\eimdbt.exe
"C:\Users\user\AppData\Local\Temp\eimdbt.exe"
malicious
C:\Users\user\AppData\Roaming\Access\InnerException.exe
C:\Users\user\AppData\Roaming\Access\InnerException.exe
malicious
C:\Users\user\AppData\Roaming\Access\InnerException.exe
"C:\Users\user\AppData\Roaming\Access\InnerException.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6400 -s 224
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5180 -s 1028
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://cheat.underground-cheat.com
unknown
malicious
http://venom.underground-cheat.com:1337/
31.13.224.34
malicious
http://cheat.underground-cheat.com/Winsvc.exe
81.161.238.38
malicious
venom.underground-cheat.com:1337
malicious
http://venom.underground-cheat.com
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://schemas.m
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://venom.underground-cheat.com:1337t-
unknown
http://tempuri.org/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
https://api.ipify.orgcookies//settinString.Removeg
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://tempuri.org/0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://venom.underground-cheat.com:1337
unknown
http://tempuri.org/Endpoint/VerifyUp
unknown
https://ipinfo.io/ip%appdata%
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://schemas.datacontract.org/2004/07/
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
https://github.com/mgravell/protobuf-net
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
https://www.ecosia.org/newtab/
unknown
http://cheat.underground-cheatT6
unknown
http://tempuri.org/Endpoint/SetEnviron
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
https://stackoverflow.com/q/2152978/23354
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
There are 39 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
venom.underground-cheat.com
31.13.224.34
malicious
cheat.underground-cheat.com
81.161.238.38
s-part-0035.t-0009.t-msedge.net
13.107.246.63
fp2e7a.wpc.phicdn.net
192.229.221.95
api.ip.sb
unknown

IPs

IP
Domain
Country
Malicious
31.13.224.34
venom.underground-cheat.com
Bulgaria
malicious
81.161.238.38
cheat.underground-cheat.com
Germany

Registry

Path
Value
Malicious
\REGISTRY\A\{ff22ab74-677f-07d1-29cc-70efed4a1d02}\Root\InventoryApplicationFile\installutil.exe|95e234cbcbb20632
ProgramId
\REGISTRY\A\{ff22ab74-677f-07d1-29cc-70efed4a1d02}\Root\InventoryApplicationFile\installutil.exe|95e234cbcbb20632
FileId
\REGISTRY\A\{ff22ab74-677f-07d1-29cc-70efed4a1d02}\Root\InventoryApplicationFile\installutil.exe|95e234cbcbb20632
LowerCaseLongPath
\REGISTRY\A\{ff22ab74-677f-07d1-29cc-70efed4a1d02}\Root\InventoryApplicationFile\installutil.exe|95e234cbcbb20632
LongPathHash
\REGISTRY\A\{ff22ab74-677f-07d1-29cc-70efed4a1d02}\Root\InventoryApplicationFile\installutil.exe|95e234cbcbb20632
Name
\REGISTRY\A\{ff22ab74-677f-07d1-29cc-70efed4a1d02}\Root\InventoryApplicationFile\installutil.exe|95e234cbcbb20632
OriginalFileName
\REGISTRY\A\{ff22ab74-677f-07d1-29cc-70efed4a1d02}\Root\InventoryApplicationFile\installutil.exe|95e234cbcbb20632
Publisher
\REGISTRY\A\{ff22ab74-677f-07d1-29cc-70efed4a1d02}\Root\InventoryApplicationFile\installutil.exe|95e234cbcbb20632
Version
\REGISTRY\A\{ff22ab74-677f-07d1-29cc-70efed4a1d02}\Root\InventoryApplicationFile\installutil.exe|95e234cbcbb20632
BinFileVersion
\REGISTRY\A\{ff22ab74-677f-07d1-29cc-70efed4a1d02}\Root\InventoryApplicationFile\installutil.exe|95e234cbcbb20632
BinaryType
\REGISTRY\A\{ff22ab74-677f-07d1-29cc-70efed4a1d02}\Root\InventoryApplicationFile\installutil.exe|95e234cbcbb20632
ProductName
\REGISTRY\A\{ff22ab74-677f-07d1-29cc-70efed4a1d02}\Root\InventoryApplicationFile\installutil.exe|95e234cbcbb20632
ProductVersion
\REGISTRY\A\{ff22ab74-677f-07d1-29cc-70efed4a1d02}\Root\InventoryApplicationFile\installutil.exe|95e234cbcbb20632
LinkDate
\REGISTRY\A\{ff22ab74-677f-07d1-29cc-70efed4a1d02}\Root\InventoryApplicationFile\installutil.exe|95e234cbcbb20632
BinProductVersion
\REGISTRY\A\{ff22ab74-677f-07d1-29cc-70efed4a1d02}\Root\InventoryApplicationFile\installutil.exe|95e234cbcbb20632
AppxPackageFullName
\REGISTRY\A\{ff22ab74-677f-07d1-29cc-70efed4a1d02}\Root\InventoryApplicationFile\installutil.exe|95e234cbcbb20632
AppxPackageRelativeId
\REGISTRY\A\{ff22ab74-677f-07d1-29cc-70efed4a1d02}\Root\InventoryApplicationFile\installutil.exe|95e234cbcbb20632
Size
\REGISTRY\A\{ff22ab74-677f-07d1-29cc-70efed4a1d02}\Root\InventoryApplicationFile\installutil.exe|95e234cbcbb20632
Language
\REGISTRY\A\{ff22ab74-677f-07d1-29cc-70efed4a1d02}\Root\InventoryApplicationFile\installutil.exe|95e234cbcbb20632
IsOsComponent
\REGISTRY\A\{ff22ab74-677f-07d1-29cc-70efed4a1d02}\Root\InventoryApplicationFile\installutil.exe|95e234cbcbb20632
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
FileDirectory
There are 27 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1CD32FF1000
trusted library allocation
page read and write
malicious
28CC000
trusted library allocation
page read and write
malicious
1F91DA28000
trusted library allocation
page read and write
malicious
1F90D321000
trusted library allocation
page read and write
malicious
3688000
trusted library allocation
page read and write
malicious
2541000
trusted library allocation
page read and write
malicious
236AD272000
trusted library allocation
page read and write
malicious
22F8007D000
trusted library allocation
page read and write
malicious
1C65981D000
trusted library allocation
page read and write
malicious
236C5A44000
heap
page read and write
malicious
236AD061000
trusted library allocation
page read and write
malicious
2718007D000
trusted library allocation
page read and write
malicious
35C1000
trusted library allocation
page read and write
malicious
236BD365000
trusted library allocation
page read and write
malicious
51F0000
trusted library section
page read and write
malicious
1CD432F5000
trusted library allocation
page read and write
malicious
1F91D321000
trusted library allocation
page read and write
malicious
1F925D56000
heap
page read and write
malicious
1F90B9D0000
trusted library section
page read and write
malicious
69B0000
trusted library section
page read and write
malicious
1F90D521000
trusted library allocation
page read and write
malicious
34D1000
trusted library allocation
page read and write
malicious
1CD43525000
trusted library allocation
page read and write
malicious
142000
remote allocation
page execute and read and write
malicious
22FFD390000
trusted library section
page read and write
malicious
2668000
trusted library allocation
page read and write
29D2000
trusted library allocation
page read and write
2718032A000
trusted library allocation
page read and write
1F925D4C000
heap
page read and write
2672000
trusted library allocation
page read and write
1C669F91000
trusted library allocation
page read and write
3B75000
trusted library allocation
page read and write
7FFD9BC94000
trusted library allocation
page read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
27180654000
trusted library allocation
page read and write
1F0000
heap
page read and write
5C80000
trusted library allocation
page read and write
22F80726000
trusted library allocation
page read and write
7FFD9BC26000
trusted library allocation
page read and write
16D1000
heap
page read and write
1840000
heap
page execute and read and write
7FFD9B9A2000
trusted library allocation
page read and write
236AD642000
trusted library allocation
page read and write
1C6599A6000
trusted library allocation
page read and write
1C659E0D000
trusted library allocation
page read and write
22F80572000
trusted library allocation
page read and write
22F805BF000
trusted library allocation
page read and write
22F803C7000
trusted library allocation
page read and write
22FFD4C0000
heap
page execute and read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
7FFD9B99B000
trusted library allocation
page execute and read and write
26D1000
trusted library allocation
page read and write
390E000
trusted library allocation
page read and write
22F8057F000
trusted library allocation
page read and write
1C659AE6000
trusted library allocation
page read and write
271801C6000
trusted library allocation
page read and write
653B000
stack
page read and write
1C659A77000
trusted library allocation
page read and write
EF0000
heap
page read and write
6540000
trusted library allocation
page execute and read and write
2A0A000
trusted library allocation
page read and write
37C9000
trusted library allocation
page read and write
6CE2000
trusted library allocation
page read and write
271803C8000
trusted library allocation
page read and write
236C5E11000
heap
page read and write
7E4000
trusted library allocation
page read and write
1C659B49000
trusted library allocation
page read and write
802000
trusted library allocation
page read and write
2838000
trusted library allocation
page read and write
2B7A000
trusted library allocation
page read and write
1C659C1A000
trusted library allocation
page read and write
3904000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
22FFB280000
trusted library allocation
page read and write
1C659E42000
trusted library allocation
page read and write
880000
trusted library allocation
page read and write
271801C4000
trusted library allocation
page read and write
64E5000
trusted library allocation
page read and write
22F8077C000
trusted library allocation
page read and write
1C659CCE000
trusted library allocation
page read and write
271806D2000
trusted library allocation
page read and write
1F925DEF000
heap
page read and write
1C65997C000
trusted library allocation
page read and write
22F8028F000
trusted library allocation
page read and write
5BB000
heap
page read and write
382A000
trusted library allocation
page read and write
236C5B1C000
heap
page read and write
8B0000
trusted library allocation
page read and write
1287000
trusted library allocation
page execute and read and write
1270000
trusted library allocation
page read and write
274B000
trusted library allocation
page read and write
3826000
trusted library allocation
page read and write
236AD68B000
trusted library allocation
page read and write
1B00000
trusted library allocation
page read and write
2AB3000
trusted library allocation
page read and write
236C5DEA000
heap
page read and write
2718062C000
trusted library allocation
page read and write
1F90D6DF000
trusted library allocation
page read and write
22FFB030000
heap
page read and write
2A04000
trusted library allocation
page read and write
4548000
trusted library allocation
page read and write
22F80276000
trusted library allocation
page read and write
2777000
trusted library allocation
page read and write
36F9000
trusted library allocation
page read and write
22F804DD000
trusted library allocation
page read and write
7FFD9B974000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
6234000
heap
page read and write
2AD2000
trusted library allocation
page read and write
EA0000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
621E000
heap
page read and write
271801C9000
trusted library allocation
page read and write
3828000
trusted library allocation
page read and write
7FFD9BB4C000
trusted library allocation
page read and write
236AD62E000
trusted library allocation
page read and write
22F801BD000
trusted library allocation
page read and write
27180001000
trusted library allocation
page read and write
2B7C000
trusted library allocation
page read and write
22F80491000
trusted library allocation
page read and write
2D01000
trusted library allocation
page read and write
280A000
trusted library allocation
page read and write
3AC7000
trusted library allocation
page read and write
17A0000
trusted library allocation
page read and write
1C659A0B000
trusted library allocation
page read and write
2BE1000
trusted library allocation
page read and write
372E000
trusted library allocation
page read and write
22FFB2B0000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page execute and read and write
22FFADC0000
unkown
page readonly
37F6000
trusted library allocation
page read and write
6D80000
trusted library allocation
page execute and read and write
7FFD9BD40000
trusted library allocation
page read and write
271802B6000
trusted library allocation
page read and write
2AE7000
trusted library allocation
page read and write
2680000
trusted library allocation
page read and write
6266000
heap
page read and write
2823000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
7FFD9BBE7000
trusted library allocation
page read and write
1C659A01000
trusted library allocation
page read and write
295C000
trusted library allocation
page read and write
6BEE000
stack
page read and write
7FFD9BD36000
trusted library allocation
page read and write
1C671B21000
heap
page read and write
5987000
trusted library allocation
page read and write
1C659AEB000
trusted library allocation
page read and write
7FFD9BC90000
trusted library allocation
page read and write
1C65998F000
trusted library allocation
page read and write
1CD4B7B0000
heap
page execute and read and write
2381000
trusted library allocation
page read and write
1C659D3F000
trusted library allocation
page read and write
2751000
trusted library allocation
page read and write
26E8000
trusted library allocation
page read and write
22F8074A000
trusted library allocation
page read and write
236AB524000
heap
page read and write
2BDF000
trusted library allocation
page read and write
1C659E0F000
trusted library allocation
page read and write
7FFD9BA2C000
trusted library allocation
page execute and read and write
C82DFF8000
stack
page read and write
27E5000
trusted library allocation
page read and write
271801E8000
trusted library allocation
page read and write
1C659D0C000
trusted library allocation
page read and write
271803AA000
trusted library allocation
page read and write
1C659E66000
trusted library allocation
page read and write
2AD5000
trusted library allocation
page read and write
1F91D625000
trusted library allocation
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
2718067E000
trusted library allocation
page read and write
38A2000
trusted library allocation
page read and write
3785000
trusted library allocation
page read and write
3B1C000
trusted library allocation
page read and write
27180352000
trusted library allocation
page read and write
2B02000
trusted library allocation
page read and write
1C6599D1000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
434000
remote allocation
page execute and read and write
1CD32FE0000
heap
page read and write
4F3E000
stack
page read and write
7FFD9BB99000
trusted library allocation
page read and write
264D000
trusted library allocation
page read and write
7FFD9BA46000
trusted library allocation
page read and write
1F90D599000
trusted library allocation
page read and write
22F805EB000
trusted library allocation
page read and write
2718042B000
trusted library allocation
page read and write
2524000
trusted library allocation
page read and write
236C5A6E000
heap
page read and write
271806E1000
trusted library allocation
page read and write
180000
heap
page read and write
4BFE000
stack
page read and write
236AB6B0000
heap
page read and write
B19E63E000
stack
page read and write
38DE000
trusted library allocation
page read and write
22F80419000
trusted library allocation
page read and write
7FFD9BD20000
trusted library allocation
page read and write
7FFD9BC6B000
trusted library allocation
page read and write
3B19000
trusted library allocation
page read and write
7FFD9BD3C000
trusted library allocation
page read and write
271803D9000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page execute and read and write
236C5A21000
heap
page read and write
3791000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
2BC2000
trusted library allocation
page read and write
3845000
trusted library allocation
page read and write
27180676000
trusted library allocation
page read and write
2A7A000
trusted library allocation
page read and write
C3C000
stack
page read and write
2A61000
trusted library allocation
page read and write
7FFD9BC80000
trusted library allocation
page read and write
1C659B09000
trusted library allocation
page read and write
27180225000
trusted library allocation
page read and write
1C659C1F000
trusted library allocation
page read and write
2734000
trusted library allocation
page read and write
22F80001000
trusted library allocation
page read and write
1264000
trusted library allocation
page read and write
22F804E8000
trusted library allocation
page read and write
3858000
trusted library allocation
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
271F84D0000
heap
page read and write
2718069E000
trusted library allocation
page read and write
2718068B000
trusted library allocation
page read and write
3756000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
22F80702000
trusted library allocation
page read and write
2718033F000
trusted library allocation
page read and write
C82CBFF000
stack
page read and write
7FFD9BC6A000
trusted library allocation
page read and write
22F80590000
trusted library allocation
page read and write
895000
trusted library allocation
page execute and read and write
7FFD9BB40000
trusted library allocation
page read and write
236C5D0A000
heap
page read and write
36DE000
trusted library allocation
page read and write
2B21000
trusted library allocation
page read and write
22F8020B000
trusted library allocation
page read and write
1F90D7D0000
trusted library allocation
page read and write
236AD5A2000
trusted library allocation
page read and write
5CAA000
trusted library allocation
page read and write
10B000
stack
page read and write
378B000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
1F92616E000
heap
page read and write
4B30000
trusted library allocation
page read and write
1AA0000
trusted library allocation
page read and write
505B000
trusted library allocation
page read and write
1CD31490000
heap
page read and write
269F000
trusted library allocation
page read and write
61B0000
trusted library allocation
page execute and read and write
366E000
trusted library allocation
page read and write
6170000
trusted library allocation
page execute and read and write
7FFD9BCF0000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
2988000
trusted library allocation
page read and write
2BEC9FD000
stack
page read and write
3B9B000
trusted library allocation
page read and write
7FFD9BD30000
trusted library allocation
page read and write
79FE000
stack
page read and write
27180491000
trusted library allocation
page read and write
534E000
stack
page read and write
27180395000
trusted library allocation
page read and write
236AD050000
heap
page read and write
2A65000
trusted library allocation
page read and write
7FFD9BC70000
trusted library allocation
page execute and read and write
2718033D000
trusted library allocation
page read and write
22F8047E000
trusted library allocation
page read and write
2A74000
trusted library allocation
page read and write
37BF000
trusted library allocation
page read and write
33FF000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
2711000
trusted library allocation
page read and write
271802CD000
trusted library allocation
page read and write
1CD3159D000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
825F000
stack
page read and write
271B000
trusted library allocation
page read and write
1F925D7D000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
2AFC000
trusted library allocation
page read and write
271807AC000
trusted library allocation
page read and write
2718025A000
trusted library allocation
page read and write
1C659B0B000
trusted library allocation
page read and write
22FFCBBD000
heap
page read and write
34CC000
heap
page read and write
1C659A3C000
trusted library allocation
page read and write
236AD416000
trusted library allocation
page read and write
23EE000
trusted library allocation
page read and write
7FFD9BC62000
trusted library allocation
page read and write
29C8000
trusted library allocation
page read and write
3983000
trusted library allocation
page read and write
22F802EB000
trusted library allocation
page read and write
F13000
trusted library allocation
page execute and read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
7FFD9BB60000
trusted library allocation
page read and write
22F90010000
trusted library allocation
page read and write
271802A5000
trusted library allocation
page read and write
27A8000
trusted library allocation
page read and write
22F806C8000
trusted library allocation
page read and write
22F806B2000
trusted library allocation
page read and write
81B000
trusted library allocation
page execute and read and write
22F8056A000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
7FFD9B9AA000
trusted library allocation
page read and write
7FFD9BA5C000
trusted library allocation
page execute and read and write
70AF000
stack
page read and write
271802EF000
trusted library allocation
page read and write
75F49FE000
stack
page read and write
27C1000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
236C5C0D000
heap
page read and write
7FFD9B973000
trusted library allocation
page execute and read and write
236C5E04000
heap
page read and write
1C672F54000
heap
page read and write
22FFB310000
heap
page read and write
22F80182000
trusted library allocation
page read and write
7FFD9B9A3000
trusted library allocation
page execute and read and write
1C6599CF000
trusted library allocation
page read and write
27190701000
trusted library allocation
page read and write
271F79BB000
heap
page read and write
2719000D000
trusted library allocation
page read and write
22F801C8000
trusted library allocation
page read and write
1CD4BC80000
heap
page read and write
1C659A35000
trusted library allocation
page read and write
27180279000
trusted library allocation
page read and write
271806AB000
trusted library allocation
page read and write
22FFB290000
trusted library allocation
page read and write
2749000
trusted library allocation
page read and write
1C659770000
heap
page execute and read and write
5C98000
trusted library allocation
page read and write
2718054E000
trusted library allocation
page read and write
3683000
trusted library allocation
page read and write
27180712000
trusted library allocation
page read and write
E70000
heap
page read and write
1C659AFA000
trusted library allocation
page read and write
7FFD9BC60000
trusted library allocation
page read and write
2BEB000
trusted library allocation
page read and write
7FFD9BC5D000
trusted library allocation
page read and write
2718031B000
trusted library allocation
page read and write
1C659D30000
trusted library allocation
page read and write
1A0000
heap
page read and write
2718022F000
trusted library allocation
page read and write
2956000
trusted library allocation
page read and write
2B23000
trusted library allocation
page read and write
2B9D000
trusted library allocation
page read and write
380F000
trusted library allocation
page read and write
22F80213000
trusted library allocation
page read and write
22F801FA000
trusted library allocation
page read and write
1C659C1C000
trusted library allocation
page read and write
75F45FE000
stack
page read and write
5CA5000
trusted library allocation
page read and write
F68000
heap
page read and write
2718072E000
trusted library allocation
page read and write
4D3E000
stack
page read and write
2808000
trusted library allocation
page read and write
1C672110000
heap
page execute and read and write
87A000
heap
page read and write
271805FB000
trusted library allocation
page read and write
2AE5000
trusted library allocation
page read and write
1C659A31000
trusted library allocation
page read and write
5C82000
trusted library allocation
page read and write
2BEE23F000
stack
page read and write
7FFD9BC10000
trusted library allocation
page read and write
27180477000
trusted library allocation
page read and write
B19EA3D000
stack
page read and write
2BEC5FE000
stack
page read and write
26EA000
trusted library allocation
page read and write
3B49000
trusted library allocation
page read and write
1C6599A0000
trusted library allocation
page read and write
27190010000
trusted library allocation
page read and write
7FFD9BA56000
trusted library allocation
page execute and read and write
7FFD9BB90000
trusted library allocation
page read and write
1C669CB8000
trusted library allocation
page read and write
1F925D89000
heap
page read and write
22F806D8000
trusted library allocation
page read and write
27180721000
trusted library allocation
page read and write
39AC000
trusted library allocation
page read and write
296F000
trusted library allocation
page read and write
37B7000
trusted library allocation
page read and write
A3E000
stack
page read and write
2791000
trusted library allocation
page read and write
64D8000
trusted library allocation
page read and write
27180689000
trusted library allocation
page read and write
271803D7000
trusted library allocation
page read and write
2952000
trusted library allocation
page read and write
236AD468000
trusted library allocation
page read and write
37AE000
trusted library allocation
page read and write
236AD4E1000
trusted library allocation
page read and write
1CD33304000
trusted library allocation
page read and write
22F8044A000
trusted library allocation
page read and write
7FFD9B972000
trusted library allocation
page read and write
27180508000
trusted library allocation
page read and write
3980000
trusted library allocation
page read and write
22F8018A000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
36F7000
trusted library allocation
page read and write
27180388000
trusted library allocation
page read and write
7FFD9BB69000
trusted library allocation
page read and write
7FFD9BB89000
trusted library allocation
page read and write
2C1D000
trusted library allocation
page read and write
1F90D7B7000
trusted library allocation
page read and write
22F80211000
trusted library allocation
page read and write
22F8051D000
trusted library allocation
page read and write
3A07000
trusted library allocation
page read and write
1C65990C000
trusted library allocation
page read and write
271804A3000
trusted library allocation
page read and write
1F90B867000
heap
page read and write
1C657E85000
heap
page read and write
22F801C6000
trusted library allocation
page read and write
2AA3000
trusted library allocation
page read and write
27180317000
trusted library allocation
page read and write
4D71000
trusted library allocation
page read and write
1F90D651000
trusted library allocation
page read and write
27180386000
trusted library allocation
page read and write
22F80681000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
3B64000
trusted library allocation
page read and write
27180797000
trusted library allocation
page read and write
27180753000
trusted library allocation
page read and write
271802AB000
trusted library allocation
page read and write
3AC5000
trusted library allocation
page read and write
4FF9000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
7FFD9B9D4000
trusted library allocation
page read and write
61B0000
heap
page read and write
1C659B29000
trusted library allocation
page read and write
22F80383000
trusted library allocation
page read and write
7FFD9B9BB000
trusted library allocation
page execute and read and write
1CD3163C000
heap
page read and write
1C659BA2000
trusted library allocation
page read and write
2718065A000
trusted library allocation
page read and write
75F35FE000
stack
page read and write
1C659CC1000
trusted library allocation
page read and write
1C659E9E000
trusted library allocation
page read and write
236C5E14000
heap
page read and write
2BF0000
heap
page read and write
3677000
trusted library allocation
page read and write
1F925E77000
heap
page read and write
1670000
trusted library allocation
page read and write
271805D3000
trusted library allocation
page read and write
3730000
trusted library allocation
page read and write
1A9E000
stack
page read and write
7FFD9B993000
trusted library allocation
page execute and read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
2250000
trusted library allocation
page read and write
3B2A000
trusted library allocation
page read and write
22F8053A000
trusted library allocation
page read and write
7FFD9B99B000
trusted library allocation
page execute and read and write
27180562000
trusted library allocation
page read and write
7FFD9BA0C000
trusted library allocation
page execute and read and write
2BDD000
trusted library allocation
page read and write
236C5A0F000
heap
page read and write
3B5E000
trusted library allocation
page read and write
22F805C7000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
1F926159000
heap
page read and write
1F90D78E000
trusted library allocation
page read and write
27180403000
trusted library allocation
page read and write
1F926168000
heap
page read and write
27BB000
trusted library allocation
page read and write
7FFD9B9B2000
trusted library allocation
page read and write
54D0000
heap
page read and write
298C000
trusted library allocation
page read and write
1C659E58000
trusted library allocation
page read and write
271F852D000
heap
page read and write
886000
trusted library allocation
page execute and read and write
1C6697AD000
trusted library allocation
page read and write
7E70000
trusted library section
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
505E000
trusted library allocation
page read and write
1C659CD2000
trusted library allocation
page read and write
22F8021E000
trusted library allocation
page read and write
1C659D41000
trusted library allocation
page read and write
236AB6B5000
heap
page read and write
4DE0000
trusted library allocation
page execute and read and write
D39000
stack
page read and write
7FFD9BA56000
trusted library allocation
page read and write
26F6000
trusted library allocation
page read and write
2220000
trusted library allocation
page read and write
39A6000
trusted library allocation
page read and write
22F80780000
trusted library allocation
page read and write
1C659D93000
trusted library allocation
page read and write
7FFD9BC6D000
trusted library allocation
page read and write
3402000
trusted library allocation
page read and write
1C659A22000
trusted library allocation
page read and write
14F7000
stack
page read and write
22F803AA000
trusted library allocation
page read and write
22F80683000
trusted library allocation
page read and write
22F802AB000
trusted library allocation
page read and write
2C00000
trusted library allocation
page read and write
22F8028D000
trusted library allocation
page read and write
1F90B827000
heap
page read and write
7FFD9B972000
trusted library allocation
page read and write
22F8046B000
trusted library allocation
page read and write
107C000
unkown
page readonly
800000
trusted library allocation
page read and write
22F8027C000
trusted library allocation
page read and write
1C657CC0000
heap
page read and write
2666000
trusted library allocation
page read and write
7FFD9B9FC000
trusted library allocation
page execute and read and write
22F806B0000
trusted library allocation
page read and write
1698000
heap
page read and write
7FFD9BC90000
trusted library allocation
page execute and read and write
27180319000
trusted library allocation
page read and write
236C5A3E000
heap
page read and write
27180590000
trusted library allocation
page read and write
1C659CD4000
trusted library allocation
page read and write
52F2000
trusted library allocation
page read and write
22F802CB000
trusted library allocation
page read and write
61C0000
trusted library allocation
page execute and read and write
2B91000
trusted library allocation
page read and write
271F6F80000
trusted library allocation
page read and write
271801AD000
trusted library allocation
page read and write
3931000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
271806D8000
trusted library allocation
page read and write
1C659910000
trusted library allocation
page read and write
27180397000
trusted library allocation
page read and write
2990000
trusted library allocation
page read and write
3B17000
trusted library allocation
page read and write
22F80321000
trusted library allocation
page read and write
2AF6000
trusted library allocation
page read and write
3670000
trusted library allocation
page read and write
1C659B4D000
trusted library allocation
page read and write
2718071D000
trusted library allocation
page read and write
1C672F6E000
heap
page read and write
897000
trusted library allocation
page execute and read and write
4B10000
trusted library allocation
page read and write
4388000
trusted library allocation
page read and write
7FFD9B9CD000
trusted library allocation
page execute and read and write
2BEB9ED000
stack
page read and write
2840000
trusted library allocation
page read and write
7FFD9BC70000
trusted library allocation
page execute and read and write
236AB5C0000
trusted library allocation
page read and write
22FFE36D000
heap
page read and write
B19C1ED000
stack
page read and write
882000
trusted library allocation
page read and write
397A000
trusted library allocation
page read and write
F28000
heap
page read and write
22F80755000
trusted library allocation
page read and write
27A2000
trusted library allocation
page read and write
236C5D7C000
heap
page read and write
22F801BB000
trusted library allocation
page read and write
50EE000
stack
page read and write
4B60000
heap
page execute and read and write
F4E000
heap
page read and write
84E000
stack
page read and write
22F80704000
trusted library allocation
page read and write
1CD4B6B2000
heap
page read and write
1C659DC4000
trusted library allocation
page read and write
22F8045E000
trusted library allocation
page read and write
1F9256A8000
heap
page read and write
37DE000
trusted library allocation
page read and write
1C659A0D000
trusted library allocation
page read and write
7C31000
trusted library allocation
page read and write
7FFD9B994000
trusted library allocation
page read and write
236C5A1E000
heap
page read and write
2A99000
trusted library allocation
page read and write
38F7000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
1F90B8E0000
heap
page read and write
1F925F6E000
heap
page read and write
271804F9000
trusted library allocation
page read and write
5CC2000
trusted library allocation
page read and write
7FFD9BC9B000
trusted library allocation
page read and write
12F0000
trusted library allocation
page execute and read and write
236AD13B000
trusted library allocation
page read and write
3789000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
7FFD9BD00000
trusted library allocation
page read and write
38CE000
trusted library allocation
page read and write
2A40000
trusted library allocation
page read and write
22FFB000000
heap
page read and write
34BD000
trusted library allocation
page read and write
1C659AC4000
trusted library allocation
page read and write
1C659EB5000
trusted library allocation
page read and write
2718054C000
trusted library allocation
page read and write
2718021C000
trusted library allocation
page read and write
3B86000
trusted library allocation
page read and write
5AB0000
heap
page read and write
1C657D4F000
heap
page read and write
1F90D6D2000
trusted library allocation
page read and write
817000
trusted library allocation
page execute and read and write
4C9E000
trusted library allocation
page read and write
236C5DAF000
heap
page read and write
271802CF000
trusted library allocation
page read and write
36B0000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
1C659D91000
trusted library allocation
page read and write
22F8036E000
trusted library allocation
page read and write
22F8024D000
trusted library allocation
page read and write
236AD663000
trusted library allocation
page read and write
1C659CB0000
trusted library allocation
page read and write
27180421000
trusted library allocation
page read and write
22F8072A000
trusted library allocation
page read and write
1C659A90000
trusted library allocation
page read and write
7FFD9B973000
trusted library allocation
page execute and read and write
236AD180000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
1F90D7CA000
trusted library allocation
page read and write
61A0000
heap
page read and write
22F8077E000
trusted library allocation
page read and write
271F533C000
heap
page read and write
271F5465000
heap
page read and write
22FFB010000
heap
page read and write
46DE000
stack
page read and write
236AD514000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
1676000
trusted library allocation
page execute and read and write
2270000
heap
page read and write
22F8037F000
trusted library allocation
page read and write
F5A000
heap
page read and write
560000
heap
page read and write
1C659E11000
trusted library allocation
page read and write
4B26000
trusted library allocation
page read and write
374F000
trusted library allocation
page read and write
236AB5B0000
heap
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
7E6E000
stack
page read and write
1C65998D000
trusted library allocation
page read and write
271806E9000
trusted library allocation
page read and write
271F5430000
trusted library allocation
page read and write
7FFD9BB30000
trusted library allocation
page read and write
1C6599FE000
trusted library allocation
page read and write
38BD000
trusted library allocation
page read and write
64B6000
trusted library allocation
page read and write
27180572000
trusted library allocation
page read and write
3B82000
trusted library allocation
page read and write
93A000
heap
page read and write
22F805A7000
trusted library allocation
page read and write
2718055D000
trusted library allocation
page read and write
38A4000
trusted library allocation
page read and write
2718071F000
trusted library allocation
page read and write
35FD000
trusted library allocation
page read and write
2655000
trusted library allocation
page read and write
7FFD9BC40000
trusted library allocation
page read and write
36C3000
trusted library allocation
page read and write
236C5C28000
heap
page read and write
27190751000
trusted library allocation
page read and write
236C5A25000
heap
page read and write
3B47000
trusted library allocation
page read and write
1F90B8D8000
heap
page read and write
1C659DCA000
trusted library allocation
page read and write
271F6EB0000
heap
page execute and read and write
26CF000
trusted library allocation
page read and write
26C0000
trusted library allocation
page read and write
160E000
stack
page read and write
1C659B18000
trusted library allocation
page read and write
271802A9000
trusted library allocation
page read and write
1F925FD8000
heap
page read and write
1C659B1A000
trusted library allocation
page read and write
3942000
trusted library allocation
page read and write
1C659A1C000
trusted library allocation
page read and write
2BEBDFE000
stack
page read and write
22F8046D000
trusted library allocation
page read and write
1CD32EB0000
heap
page execute and read and write
E2000
unkown
page readonly
7FFD9B9B0000
trusted library allocation
page read and write
880000
heap
page read and write
1F90D705000
trusted library allocation
page read and write
2789000
trusted library allocation
page read and write
611D000
stack
page read and write
22F80307000
trusted library allocation
page read and write
236BD225000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
22F8061C000
trusted library allocation
page read and write
1C659B95000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
2C1B000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
2A91000
trusted library allocation
page read and write
22F8020D000
trusted library allocation
page read and write
26B4000
trusted library allocation
page read and write
27180202000
trusted library allocation
page read and write
1CD3159B000
heap
page read and write
271802DE000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
397E000
trusted library allocation
page read and write
4E9E000
stack
page read and write
22F801FC000
trusted library allocation
page read and write
271802C9000
trusted library allocation
page read and write
22F8061A000
trusted library allocation
page read and write
37E4000
trusted library allocation
page read and write
1C659C92000
trusted library allocation
page read and write
3847000
trusted library allocation
page read and write
236C5E20000
heap
page read and write
2772000
trusted library allocation
page read and write
27C7000
trusted library allocation
page read and write
5A0E000
stack
page read and write
36C9000
trusted library allocation
page read and write
5275000
trusted library allocation
page read and write
22F801E7000
trusted library allocation
page read and write
7FFD9BBEE000
trusted library allocation
page read and write
F97000
heap
page read and write
22FFCB60000
heap
page execute and read and write
1C659C3E000
trusted library allocation
page read and write
22F806D6000
trusted library allocation
page read and write
26A3000
trusted library allocation
page read and write
2811000
trusted library allocation
page read and write
3408000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
61F0000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
3935000
trusted library allocation
page read and write
6C0000
heap
page read and write
B19BBDE000
stack
page read and write
236AD649000
trusted library allocation
page read and write
371B000
trusted library allocation
page read and write
22F805B6000
trusted library allocation
page read and write
236AB575000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
1C659DD7000
trusted library allocation
page read and write
B19D9FF000
stack
page read and write
1C659E22000
trusted library allocation
page read and write
2230000
trusted library allocation
page read and write
2B13000
trusted library allocation
page read and write
22F80372000
trusted library allocation
page read and write
33F8000
trusted library allocation
page read and write
87E000
heap
page read and write
27180480000
trusted library allocation
page read and write
272A000
trusted library allocation
page read and write
531E000
stack
page read and write
1C659A66000
trusted library allocation
page read and write
22F80398000
trusted library allocation
page read and write
2B7E000
trusted library allocation
page read and write
38AA000
trusted library allocation
page read and write
1CD4B6B0000
heap
page read and write
C10000
heap
page execute and read and write
7FFD9B9C0000
trusted library allocation
page read and write
1F925F60000
heap
page read and write
22F80739000
trusted library allocation
page read and write
5C85000
trusted library allocation
page read and write
3B51000
trusted library allocation
page read and write
165D000
trusted library allocation
page execute and read and write
2A95000
trusted library allocation
page read and write
1C659BA4000
trusted library allocation
page read and write
1C659B3C000
trusted library allocation
page read and write
1C659D2E000
trusted library allocation
page read and write
271F84EA000
heap
page read and write
1F926086000
heap
page read and write
3B45000
trusted library allocation
page read and write
1C659A0F000
trusted library allocation
page read and write
17EE000
stack
page read and write
271805F3000
trusted library allocation
page read and write
1CD32FE8000
heap
page read and write
1C659B98000
trusted library allocation
page read and write
352DFF000
stack
page read and write
3B15000
trusted library allocation
page read and write
22F80692000
trusted library allocation
page read and write
2AFE000
trusted library allocation
page read and write
F89000
heap
page read and write
27180546000
trusted library allocation
page read and write
1F925D3D000
heap
page read and write
236C5A89000
heap
page read and write
236BD1B1000
trusted library allocation
page read and write
5A4E000
stack
page read and write
7FFD9BB64000
trusted library allocation
page read and write
1C659A24000
trusted library allocation
page read and write
F65000
heap
page read and write
2718055B000
trusted library allocation
page read and write
1C659A57000
trusted library allocation
page read and write
3B73000
trusted library allocation
page read and write
1C6599FC000
trusted library allocation
page read and write
384B000
trusted library allocation
page read and write
7ED000
trusted library allocation
page execute and read and write
829C000
stack
page read and write
1CD31652000
heap
page read and write
271801FA000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
2709000
trusted library allocation
page read and write
38E2000
trusted library allocation
page read and write
3959000
trusted library allocation
page read and write
7FFD9BC30000
trusted library allocation
page read and write
1CD31390000
heap
page read and write
22F80329000
trusted library allocation
page read and write
8C0000
heap
page execute and read and write
27180328000
trusted library allocation
page read and write
7FFD9BD30000
trusted library allocation
page read and write
1C659D3D000
trusted library allocation
page read and write
1CD314C5000
heap
page read and write
391C000
trusted library allocation
page read and write
5C9A000
trusted library allocation
page read and write
22F803FE000
trusted library allocation
page read and write
4EA0000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
340F000
trusted library allocation
page read and write
2B42000
trusted library allocation
page read and write
38E0000
trusted library allocation
page read and write
22F80570000
trusted library allocation
page read and write
236C5ABB000
heap
page read and write
78BC000
stack
page read and write
1C657D16000
heap
page read and write
2718069C000
trusted library allocation
page read and write
1C6599D8000
trusted library allocation
page read and write
2684000
trusted library allocation
page read and write
271F529F000
heap
page read and write
38BF000
trusted library allocation
page read and write
640000
heap
page read and write
3872000
trusted library allocation
page read and write
169E000
heap
page read and write
7F0000
trusted library allocation
page read and write
271F84E0000
heap
page read and write
BEC000
stack
page read and write
271802F1000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
1C659C8A000
trusted library allocation
page read and write
236AD5E2000
trusted library allocation
page read and write
2B55000
trusted library allocation
page read and write
2B48000
trusted library allocation
page read and write
24D7000
trusted library allocation
page read and write
7FFD9BD53000
trusted library allocation
page read and write
27180466000
trusted library allocation
page read and write
1F926160000
heap
page read and write
2C17000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page execute and read and write
27190336000
trusted library allocation
page read and write
B19C9FF000
stack
page read and write
383F000
trusted library allocation
page read and write
271F52E7000
heap
page read and write
3997000
trusted library allocation
page read and write
1C659923000
trusted library allocation
page read and write
22FFB050000
heap
page read and write
2B78000
trusted library allocation
page read and write
1DD000
stack
page read and write
236BD10D000
trusted library allocation
page read and write
372A000
trusted library allocation
page read and write
236C5D18000
heap
page read and write
7FFD9BB1F000
trusted library allocation
page read and write
6970000
trusted library allocation
page read and write
5300000
trusted library allocation
page execute and read and write
7FFD9BC3D000
trusted library allocation
page read and write
612E000
stack
page read and write
271802BF000
trusted library allocation
page read and write
1C659A9B000
trusted library allocation
page read and write
22F8050C000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
22F804EA000
trusted library allocation
page read and write
3912000
trusted library allocation
page read and write
59CE000
stack
page read and write
1672000
trusted library allocation
page read and write
79BC000
stack
page read and write
2679000
trusted library allocation
page read and write
5980000
trusted library allocation
page read and write
236C5A2E000
heap
page read and write
236C5090000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
271F53E0000
trusted library allocation
page read and write
22F8057D000
trusted library allocation
page read and write
27ED000
trusted library allocation
page read and write
7FFD9BD60000
trusted library allocation
page read and write
2817000
trusted library allocation
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
3760000
trusted library allocation
page read and write
1C659D1D000
trusted library allocation
page read and write
1F90D403000
trusted library allocation
page read and write
271F529B000
heap
page read and write
22F804C0000
trusted library allocation
page read and write
1CD31560000
heap
page read and write
271F8522000
heap
page read and write
397C000
trusted library allocation
page read and write
27180372000
trusted library allocation
page read and write
1F925AF0000
heap
page read and write
22F801B7000
trusted library allocation
page read and write
7FFD9B9C4000
trusted library allocation
page read and write
52C0000
trusted library allocation
page read and write
1C657E80000
heap
page read and write
22F8071A000
trusted library allocation
page read and write
1C659A4D000
trusted library allocation
page read and write
5C9F000
trusted library allocation
page read and write
2745000
trusted library allocation
page read and write
271805E2000
trusted library allocation
page read and write
22F80482000
trusted library allocation
page read and write
2A48000
trusted library allocation
page read and write
271804AA000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
1C659CC5000
trusted library allocation
page read and write
C82E7FD000
stack
page read and write
391E000
trusted library allocation
page read and write
271803BB000
trusted library allocation
page read and write
271806F6000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
36E4000
trusted library allocation
page read and write
2AAF000
trusted library allocation
page read and write
7FFD9B9DD000
trusted library allocation
page execute and read and write
5300000
trusted library allocation
page read and write
378F000
trusted library allocation
page read and write
22F8036C000
trusted library allocation
page read and write
27F1000
trusted library allocation
page read and write
2804000
trusted library allocation
page read and write
6268000
heap
page read and write
2677000
trusted library allocation
page read and write
5023000
heap
page read and write
7FFD9BA30000
trusted library allocation
page execute and read and write
2B67000
trusted library allocation
page read and write
36E2000
trusted library allocation
page read and write
236AD67E000
trusted library allocation
page read and write
78E000
stack
page read and write
1CD4B020000
trusted library allocation
page read and write
281F000
trusted library allocation
page read and write
1F90D848000
trusted library allocation
page read and write
271805D1000
trusted library allocation
page read and write
2A76000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
271F52A5000
heap
page read and write
27AF000
trusted library allocation
page read and write
2718078C000
trusted library allocation
page read and write
236C5D52000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
1690000
heap
page read and write
1F925EBA000
heap
page read and write
2B00000
heap
page read and write
2A85000
trusted library allocation
page read and write
271806D0000
trusted library allocation
page read and write
271801C2000
trusted library allocation
page read and write
3B0D000
trusted library allocation
page read and write
271F5170000
heap
page read and write
7FFD9BCA0000
trusted library allocation
page execute and read and write
264F000
trusted library allocation
page read and write
1C659A42000
trusted library allocation
page read and write
1F90D88B000
trusted library allocation
page read and write
C82D3FF000
stack
page read and write
236AB4FB000
heap
page read and write
7FFD9BB5F000
trusted library allocation
page read and write
1C659B05000
trusted library allocation
page read and write
2BCC000
trusted library allocation
page read and write
5414000
trusted library allocation
page read and write
236C5B49000
heap
page read and write
6400000
trusted library allocation
page read and write
C6C000
trusted library allocation
page read and write
1F90D7BD000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1C659932000
trusted library allocation
page read and write
1C659EC0000
trusted library allocation
page read and write
27180326000
trusted library allocation
page read and write
1F90B960000
trusted library allocation
page read and write
282B000
trusted library allocation
page read and write
3A90000
trusted library allocation
page read and write
22F8074C000
trusted library allocation
page read and write
1C659D50000
trusted library allocation
page read and write
1C659D3B000
trusted library allocation
page read and write
22F804C8000
trusted library allocation
page read and write
1F92608B000
heap
page read and write
1C659B8F000
trusted library allocation
page read and write
236C5B31000
heap
page read and write
33FE000
stack
page read and write
22F8068E000
trusted library allocation
page read and write
271806FC000
trusted library allocation
page read and write
27180251000
trusted library allocation
page read and write
2AB1000
trusted library allocation
page read and write
26FE000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
38E4000
trusted library allocation
page read and write
1F90D4A0000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
2BF8000
trusted library allocation
page read and write
22F803F1000
trusted library allocation
page read and write
22FFB0C9000
heap
page read and write
395D000
trusted library allocation
page read and write
37F4000
trusted library allocation
page read and write
1F90BA85000
heap
page read and write
6C21000
trusted library allocation
page read and write
5350000
trusted library allocation
page execute and read and write
399B000
trusted library allocation
page read and write
22F80696000
trusted library allocation
page read and write
7FFD9BB5C000
trusted library allocation
page read and write
23FE000
trusted library allocation
page read and write
1F90B869000
heap
page read and write
271801E2000
trusted library allocation
page read and write
22F80177000
trusted library allocation
page read and write
670000
heap
page read and write
27180277000
trusted library allocation
page read and write
2718034C000
trusted library allocation
page read and write
1C659D32000
trusted library allocation
page read and write
236AB890000
heap
page read and write
7FFD9BC56000
trusted library allocation
page read and write
341B000
trusted library allocation
page read and write
3747000
trusted library allocation
page read and write
864000
trusted library allocation
page read and write
29B5000
trusted library allocation
page read and write
1F92601A000
heap
page read and write
1F925DAD000
heap
page read and write
1F925EB2000
heap
page read and write
236C5DBD000
heap
page read and write
29F2000
trusted library allocation
page read and write
2718046C000
trusted library allocation
page read and write
27180268000
trusted library allocation
page read and write
27180522000
trusted library allocation
page read and write
5F2E000
stack
page read and write
1C659E0B000
trusted library allocation
page read and write
92A01FD000
stack
page read and write
1CD4B9C0000
heap
page read and write
27AA000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
2A4A000
trusted library allocation
page read and write
389C000
trusted library allocation
page read and write
253F000
stack
page read and write
271803EE000
trusted library allocation
page read and write
2A6E000
trusted library allocation
page read and write
3B62000
trusted library allocation
page read and write
7FFD9BB4F000
trusted library allocation
page read and write
22F802E9000
trusted library allocation
page read and write
22F80595000
trusted library allocation
page read and write
7FFD9BC52000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page execute and read and write
64B4000
trusted library allocation
page read and write
2718050B000
trusted library allocation
page read and write
602E000
stack
page read and write
22F80607000
trusted library allocation
page read and write
34B0000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
3496000
trusted library allocation
page read and write
1C6698B0000
trusted library allocation
page read and write
3989000
trusted library allocation
page read and write
27180253000
trusted library allocation
page read and write
22F804D7000
trusted library allocation
page read and write
27180710000
trusted library allocation
page read and write
22F80735000
trusted library allocation
page read and write
284B000
trusted library allocation
page read and write
1C6599B1000
trusted library allocation
page read and write
87D000
trusted library allocation
page execute and read and write
5E2E000
stack
page read and write
C82D7FE000
stack
page read and write
51EE000
stack
page read and write
27F5000
trusted library allocation
page read and write
236C5DF0000
heap
page read and write
64CE000
trusted library allocation
page read and write
3832000
trusted library allocation
page read and write
7FFD9BBAE000
trusted library allocation
page read and write
7FFD9BC60000
trusted library allocation
page read and write
2B99000
trusted library allocation
page read and write
376E000
trusted library allocation
page read and write
64E2000
trusted library allocation
page read and write
38FB000
trusted library allocation
page read and write
2B4E000
trusted library allocation
page read and write
1F92603D000
heap
page read and write
2653000
trusted library allocation
page read and write
BAE000
stack
page read and write
271803BF000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
1C657D7C000
heap
page read and write
376A000
trusted library allocation
page read and write
1C659AC8000
trusted library allocation
page read and write
27180768000
trusted library allocation
page read and write
2718059F000
trusted library allocation
page read and write
1C659B7E000
trusted library allocation
page read and write
2BD0000
trusted library allocation
page read and write
1F925D3A000
heap
page read and write
2BFA000
trusted library allocation
page read and write
1C659AA8000
trusted library allocation
page read and write
1C659B6B000
trusted library allocation
page read and write
1C659B80000
trusted library allocation
page read and write
610000
heap
page read and write
7FFD9BA30000
trusted library allocation
page execute and read and write
22F803A3000
trusted library allocation
page read and write
3392000
trusted library allocation
page read and write
1F90BA7E000
heap
page read and write
1F92602D000
heap
page read and write
271F84FE000
heap
page read and write
2BC8000
trusted library allocation
page read and write
1C6697A1000
trusted library allocation
page read and write
B19D1FD000
stack
page read and write
7FFD9BD10000
trusted library allocation
page read and write
6220000
heap
page read and write
22FFD3E0000
trusted library section
page read and write
3529FE000
stack
page read and write
1C659936000
trusted library allocation
page read and write
1C659B73000
trusted library allocation
page read and write
22F80408000
trusted library allocation
page read and write
1653000
trusted library allocation
page execute and read and write
4EA0000
trusted library allocation
page read and write
2A68000
trusted library allocation
page read and write
22F80171000
trusted library allocation
page read and write
236C5A81000
heap
page read and write
2A42000
trusted library allocation
page read and write
7FFD9BB20000
trusted library allocation
page read and write
2B44000
trusted library allocation
page read and write
4DA0000
trusted library allocation
page read and write
1C659EA2000
trusted library allocation
page read and write
1C659938000
trusted library allocation
page read and write
1C659B07000
trusted library allocation
page read and write
1C659D5D000
trusted library allocation
page read and write
58D0000
heap
page read and write
36E9000
trusted library allocation
page read and write
22F80289000
trusted library allocation
page read and write
236AD4AB000
trusted library allocation
page read and write
236C5C56000
heap
page read and write
7FFD9BB40000
trusted library allocation
page read and write
2BC4000
trusted library allocation
page read and write
22F8059F000
trusted library allocation
page read and write
2B2D000
trusted library allocation
page read and write
22F80413000
trusted library allocation
page read and write
271801B1000
trusted library allocation
page read and write
7FFD9B98A000
trusted library allocation
page read and write
1C669BFF000
trusted library allocation
page read and write
2682000
trusted library allocation
page read and write
4F7000
stack
page read and write
7E0000
trusted library allocation
page read and write
22F801A6000
trusted library allocation
page read and write
1C659D82000
trusted library allocation
page read and write
26B6000
trusted library allocation
page read and write
4DAE000
stack
page read and write
2849000
trusted library allocation
page read and write
271F5288000
heap
page read and write
386C000
trusted library allocation
page read and write
22F806D2000
trusted library allocation
page read and write
3B4F000
trusted library allocation
page read and write
7FFD9B9CD000
trusted library allocation
page execute and read and write
27A0000
trusted library allocation
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
236AB895000
heap
page read and write
236C5CAC000
heap
page read and write
29E7000
trusted library allocation
page read and write
22F805F8000
trusted library allocation
page read and write
2240000
trusted library allocation
page read and write
3885000
trusted library allocation
page read and write
92A05FF000
stack
page read and write
1C659A79000
trusted library allocation
page read and write
38A6000
trusted library allocation
page read and write
22F8030D000
trusted library allocation
page read and write
3531FF000
stack
page read and write
1F925E89000
heap
page read and write
37C1000
trusted library allocation
page read and write
2B9F000
trusted library allocation
page read and write
6EC6000
heap
page read and write
29F8000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
1F925E71000
heap
page read and write
B19D5FF000
stack
page read and write
1C659A59000
trusted library allocation
page read and write
27180504000
trusted library allocation
page read and write
4D62000
trusted library allocation
page read and write
870000
trusted library allocation
page read and write
1C659643000
trusted library allocation
page read and write
168B000
trusted library allocation
page execute and read and write
1C659914000
trusted library allocation
page read and write
2730000
trusted library allocation
page read and write
1C659DB7000
trusted library allocation
page read and write
7FFD9BB3C000
trusted library allocation
page read and write
3B2C000
trusted library allocation
page read and write
55CE000
stack
page read and write
1C659E95000
trusted library allocation
page read and write
7FFD9BA56000
trusted library allocation
page read and write
2A08000
trusted library allocation
page read and write
380D000
trusted library allocation
page read and write
E20000
unkown
page readonly
1C659A8A000
trusted library allocation
page read and write
3B11000
trusted library allocation
page read and write
22F80433000
trusted library allocation
page read and write
27180764000
trusted library allocation
page read and write
811E000
stack
page read and write
22F8037D000
trusted library allocation
page read and write
22F80627000
trusted library allocation
page read and write
271804D1000
trusted library allocation
page read and write
3511E2000
stack
page read and write
22F802F6000
trusted library allocation
page read and write
1F925E95000
heap
page read and write
185000
heap
page read and write
2718056A000
trusted library allocation
page read and write
3685000
trusted library allocation
page read and write
271803F4000
trusted library allocation
page read and write
22F80495000
trusted library allocation
page read and write
1C659947000
trusted library allocation
page read and write
7FFD9BC82000
trusted library allocation
page read and write
2A5F000
trusted library allocation
page read and write
22F80428000
trusted library allocation
page read and write
6410000
trusted library allocation
page read and write
38FF000
trusted library allocation
page read and write
1C65991F000
trusted library allocation
page read and write
269B000
trusted library allocation
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
1C659E8D000
trusted library allocation
page read and write
2821000
trusted library allocation
page read and write
236AD3FB000
trusted library allocation
page read and write
7FFD9BB5C000
trusted library allocation
page read and write
1F925D42000
heap
page read and write
5CC0000
trusted library allocation
page read and write
27A6000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
7FFD9BC32000
trusted library allocation
page read and write
1F90B8F4000
heap
page read and write
35323F000
stack
page read and write
22F80673000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
22F802E7000
trusted library allocation
page read and write
75F29E2000
stack
page read and write
2753000
trusted library allocation
page read and write
29A3000
trusted library allocation
page read and write
22F806A3000
trusted library allocation
page read and write
22F80605000
trusted library allocation
page read and write
27180208000
trusted library allocation
page read and write
1C659BB9000
trusted library allocation
page read and write
1F90B7D0000
heap
page read and write
1180000
heap
page read and write
6DA0000
heap
page read and write
127A000
trusted library allocation
page execute and read and write
1C659A20000
trusted library allocation
page read and write
930000
heap
page read and write
1C659D06000
trusted library allocation
page read and write
3933000
trusted library allocation
page read and write
1F92605A000
heap
page read and write
7FFD9BBBC000
trusted library allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
2719045F000
trusted library allocation
page read and write
1C65991D000
trusted library allocation
page read and write
1C659B0E000
trusted library allocation
page read and write
1C659B86000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
27180757000
trusted library allocation
page read and write
39B4000
trusted library allocation
page read and write
5DB0000
trusted library allocation
page read and write
1F91D855000
trusted library allocation
page read and write
22F8053C000
trusted library allocation
page read and write
271804D3000
trusted library allocation
page read and write
236AD4FB000
trusted library allocation
page read and write
4D40000
trusted library allocation
page read and write
1C659AE2000
trusted library allocation
page read and write
5C89000
trusted library allocation
page read and write
5CE0000
heap
page execute and read and write
27180585000
trusted library allocation
page read and write
7FFD9BB5A000
trusted library allocation
page read and write
3519FF000
stack
page read and write
271806D4000
trusted library allocation
page read and write
37F2000
trusted library allocation
page read and write
1F90D761000
trusted library allocation
page read and write
1C659E33000
trusted library allocation
page read and write
370A000
trusted library allocation
page read and write
1C659926000
trusted library allocation
page read and write
2C22000
trusted library allocation
page read and write
236C5D38000
heap
page read and write
27180658000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
3738000
trusted library allocation
page read and write
2686000
trusted library allocation
page read and write
236C5D8F000
heap
page read and write
236AB450000
heap
page read and write
271805A4000
trusted library allocation
page read and write
4E10000
trusted library allocation
page execute and read and write
1C659B2F000
trusted library allocation
page read and write
6950000
trusted library allocation
page read and write
2774000
trusted library allocation
page read and write
61D000
heap
page read and write
BF0000
heap
page read and write
1CD31530000
heap
page read and write
2A78000
trusted library allocation
page read and write
7FFD9BD50000
trusted library allocation
page read and write
A6F000
stack
page read and write
1F925BF0000
heap
page execute and read and write
236AD551000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
2866000
trusted library allocation
page read and write
4F40000
trusted library allocation
page execute and read and write
29A7000
trusted library allocation
page read and write
590E000
stack
page read and write
1F90B82A000
heap
page read and write
3967000
trusted library allocation
page read and write
4D6E000
stack
page read and write
27180548000
trusted library allocation
page read and write
3547000
trusted library allocation
page read and write
22F80422000
trusted library allocation
page read and write
2AB5000
trusted library allocation
page read and write
271F6F40000
heap
page read and write
236AB89E000
heap
page read and write
3841000
trusted library allocation
page read and write
37CC000
trusted library allocation
page read and write
236C58D0000
heap
page execute and read and write
236C5C1D000
heap
page read and write
2718054A000
trusted library allocation
page read and write
2B82000
trusted library allocation
page read and write
2718065C000
trusted library allocation
page read and write
1654000
trusted library allocation
page read and write
1C659C31000
trusted library allocation
page read and write
278F000
trusted library allocation
page read and write
22F802CF000
trusted library allocation
page read and write
2BEE000
trusted library allocation
page read and write
38CC000
trusted library allocation
page read and write
2693000
trusted library allocation
page read and write
1F90BA30000
heap
page execute and read and write
110C000
stack
page read and write
1F90D4C8000
trusted library allocation
page read and write
F14000
trusted library allocation
page read and write
6CC0000
trusted library allocation
page read and write
1C6599ED000
trusted library allocation
page read and write
1F925E65000
heap
page read and write
22F80225000
trusted library allocation
page read and write
27180488000
trusted library allocation
page read and write
2787000
trusted library allocation
page read and write
1C659E20000
trusted library allocation
page read and write
3824000
trusted library allocation
page read and write
1F90D67A000
trusted library allocation
page read and write
22F8023C000
trusted library allocation
page read and write
7FFD9BA26000
trusted library allocation
page read and write
1F90D5F4000
trusted library allocation
page read and write
68F0000
trusted library section
page read and write
24E2000
trusted library allocation
page read and write
3898000
trusted library allocation
page read and write
271802DA000
trusted library allocation
page read and write
29D6000
trusted library allocation
page read and write
5945000
trusted library allocation
page read and write
385A000
trusted library allocation
page read and write
2984000
trusted library allocation
page read and write
1B20000
heap
page read and write
7FFD9BBCF000
trusted library allocation
page read and write
271802E1000
trusted library allocation
page read and write
2AAD000
trusted library allocation
page read and write
236C5A71000
heap
page read and write
1C659BA8000
trusted library allocation
page read and write
5F0000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1C659D85000
trusted library allocation
page read and write
22FFCCC0000
heap
page execute and read and write
3690000
trusted library allocation
page read and write
B6F000
stack
page read and write
22F8067F000
trusted library allocation
page read and write
1F90D79C000
trusted library allocation
page read and write
27190518000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
2699000
trusted library allocation
page read and write
FA9000
heap
page read and write
1C657CD0000
heap
page read and write
22F80538000
trusted library allocation
page read and write
1C6599C0000
trusted library allocation
page read and write
3B0F000
trusted library allocation
page read and write
22F803ED000
trusted library allocation
page read and write
367D000
trusted library allocation
page read and write
240E000
trusted library allocation
page read and write
2A93000
trusted library allocation
page read and write
22F806F5000
trusted library allocation
page read and write
2B93000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
22F804FD000
trusted library allocation
page read and write
264B000
trusted library allocation
page read and write
7FFD9BD60000
trusted library allocation
page read and write
2BEB3EE000
stack
page read and write
3734000
trusted library allocation
page read and write
1682000
trusted library allocation
page read and write
3796000
trusted library allocation
page read and write
7FFD9BBA4000
trusted library allocation
page read and write
F7F000
heap
page read and write
1C659C3C000
trusted library allocation
page read and write
36A4000
trusted library allocation
page read and write
236C5B4E000
heap
page read and write
236C5AB7000
heap
page read and write
271801F5000
trusted library allocation
page read and write
1C672F40000
heap
page read and write
2244000
trusted library allocation
page read and write
22F80220000
trusted library allocation
page read and write
7FFD9BC20000
trusted library allocation
page execute and read and write
50A4000
trusted library allocation
page read and write
920000
heap
page read and write
1C659EA0000
trusted library allocation
page read and write
64D6000
trusted library allocation
page read and write
22FFB0A0000
heap
page read and write
22F80708000
trusted library allocation
page read and write
1F90D645000
trusted library allocation
page read and write
1C659D1F000
trusted library allocation
page read and write
501D000
heap
page read and write
C82C7FE000
stack
page read and write
236AB410000
heap
page read and write
C82C3FF000
stack
page read and write
24D9000
trusted library allocation
page read and write
1F925C00000
trusted library section
page read and write
27180788000
trusted library allocation
page read and write
236AD4E7000
trusted library allocation
page read and write
1B50000
heap
page read and write
236C5720000
heap
page read and write
75F3DFD000
stack
page read and write
1F925FD0000
heap
page read and write
7FFD9BC00000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
11F0000
heap
page read and write
36CD000
trusted library allocation
page read and write
2B10000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
236C5B3A000
heap
page read and write
1C659AAA000
trusted library allocation
page read and write
7FFD9BB86000
trusted library allocation
page read and write
27180550000
trusted library allocation
page read and write
1C659B3E000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
29BC000
trusted library allocation
page read and write
36AC000
trusted library allocation
page read and write
22FFCBA0000
heap
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
929EDE2000
stack
page read and write
1F926096000
heap
page read and write
1F90D7B0000
trusted library allocation
page read and write
27180408000
trusted library allocation
page read and write
1F925FA7000
heap
page read and write
236AB4DB000
heap
page read and write
7FFD9BB30000
trusted library allocation
page read and write
3830000
trusted library allocation
page read and write
7FFD9B9EC000
trusted library allocation
page execute and read and write
240A000
trusted library allocation
page read and write
22F80278000
trusted library allocation
page read and write
271804B1000
trusted library allocation
page read and write
271807A6000
trusted library allocation
page read and write
2A3E000
trusted library allocation
page read and write
1C657DBB000
heap
page read and write
2B5D000
trusted library allocation
page read and write
38C5000
trusted library allocation
page read and write
22F802E5000
trusted library allocation
page read and write
271801D7000
trusted library allocation
page read and write
22FFB0E1000
heap
page read and write
37E2000
trusted library allocation
page read and write
22F804C2000
trusted library allocation
page read and write
22F80501000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
271801E6000
trusted library allocation
page read and write
1680000
trusted library allocation
page read and write
22F801B9000
trusted library allocation
page read and write
236AB330000
heap
page read and write
266C000
trusted library allocation
page read and write
2829000
trusted library allocation
page read and write
22F802AD000
trusted library allocation
page read and write
2A1B000
trusted library allocation
page read and write
812000
trusted library allocation
page read and write
7FFD9BB12000
trusted library allocation
page read and write
27180204000
trusted library allocation
page read and write
22F80374000
trusted library allocation
page read and write
539E000
stack
page read and write
236AB548000
heap
page read and write
2718068D000
trusted library allocation
page read and write
3868000
trusted library allocation
page read and write
35363E000
stack
page read and write
12EE000
stack
page read and write
22F8027A000
trusted library allocation
page read and write
3B41000
trusted library allocation
page read and write
298E000
trusted library allocation
page read and write
92A0DFF000
stack
page read and write
377D000
trusted library allocation
page read and write
27E7000
trusted library allocation
page read and write
5A0F000
stack
page read and write
2718066B000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
22F80620000
trusted library allocation
page read and write
3835000
trusted library allocation
page read and write
7FFD9BC45000
trusted library allocation
page read and write
22F805F6000
trusted library allocation
page read and write
1C657D1C000
heap
page read and write
5AA0000
trusted library allocation
page execute and read and write
38D0000
trusted library allocation
page read and write
22F80175000
trusted library allocation
page read and write
22F805E3000
trusted library allocation
page read and write
236C5CD3000
heap
page read and write
22F802E3000
trusted library allocation
page read and write
236C5D11000
heap
page read and write
1C65993F000
trusted library allocation
page read and write
1F90B900000
heap
page read and write
38C3000
trusted library allocation
page read and write
1C659A13000
trusted library allocation
page read and write
271802AD000
trusted library allocation
page read and write
22F8067D000
trusted library allocation
page read and write
1F90D6B0000
trusted library allocation
page read and write
3B13000
trusted library allocation
page read and write
2B46000
trusted library allocation
page read and write
7FFD9BC3A000
trusted library allocation
page read and write
236AD44E000
trusted library allocation
page read and write
2718078A000
trusted library allocation
page read and write
1C659DA0000
trusted library allocation
page read and write
36AE000
trusted library allocation
page read and write
863000
trusted library allocation
page execute and read and write
1F925E69000
heap
page read and write
7FFD9BD20000
trusted library allocation
page read and write
236C5DED000
heap
page read and write
37FB000
trusted library allocation
page read and write
1F925FCA000
heap
page read and write
1C659A55000
trusted library allocation
page read and write
7FFD9BC28000
trusted library allocation
page read and write
236C5A06000
heap
page read and write
286C000
trusted library allocation
page read and write
36E0000
trusted library allocation
page read and write
1C659A99000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
2A7C000
trusted library allocation
page read and write
2842000
trusted library allocation
page read and write
2260000
trusted library allocation
page read and write
1700000
heap
page read and write
22FFB0DE000
heap
page read and write
7FFD9BB27000
trusted library allocation
page read and write
22F80474000
trusted library allocation
page read and write
1C659C8C000
trusted library allocation
page read and write
27EB000
trusted library allocation
page read and write
382E000
trusted library allocation
page read and write
1C659B91000
trusted library allocation
page read and write
271804F1000
trusted library allocation
page read and write
2718076A000
trusted library allocation
page read and write
52B5000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
22F80188000
trusted library allocation
page read and write
1F90BA80000
heap
page read and write
3870000
trusted library allocation
page read and write
1CD4B9F1000
heap
page read and write
22F803A7000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
1CD4BA0F000
heap
page read and write
27180626000
trusted library allocation
page read and write
1F90D631000
trusted library allocation
page read and write
4D56000
trusted library allocation
page read and write
22F80392000
trusted library allocation
page read and write
22F803F6000
trusted library allocation
page read and write
2A1D000
trusted library allocation
page read and write
236C5AF6000
heap
page read and write
27E9000
trusted library allocation
page read and write
22F8028B000
trusted library allocation
page read and write
1C659E8F000
trusted library allocation
page read and write
1C659ED8000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
3849000
trusted library allocation
page read and write
2A4D000
trusted library allocation
page read and write
3617000
trusted library allocation
page read and write
3B99000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
5D8F000
stack
page read and write
7FFD9BB70000
trusted library allocation
page read and write
2BE3000
trusted library allocation
page read and write
236C5C9F000
heap
page read and write
22F802FE000
trusted library allocation
page read and write
2BE9000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
2C13000
trusted library allocation
page read and write
22F804B5000
trusted library allocation
page read and write
1C659AC6000
trusted library allocation
page read and write
27180669000
trusted library allocation
page read and write
1F91D675000
trusted library allocation
page read and write
1CD315C6000
heap
page read and write
3946000
trusted library allocation
page read and write
36D2000
trusted library allocation
page read and write
1C659E62000
trusted library allocation
page read and write
22F80581000
trusted library allocation
page read and write
2BECDFE000
stack
page read and write
1C659C4D000
trusted library allocation
page read and write
1C659C7D000
trusted library allocation
page read and write
27180755000
trusted library allocation
page read and write
1F90D506000
trusted library allocation
page read and write
1C672F44000
heap
page read and write
1C669969000
trusted library allocation
page read and write
2A46000
trusted library allocation
page read and write
670000
heap
page read and write
1C657DCF000
heap
page read and write
36AA000
trusted library allocation
page read and write
22F801EB000
trusted library allocation
page read and write
36CB000
trusted library allocation
page read and write
2B6A000
trusted library allocation
page read and write
2BFC000
trusted library allocation
page read and write
1F925D9E000
heap
page read and write
26C5000
trusted library allocation
page read and write
271901C9000
trusted library allocation
page read and write
1C659EA6000
trusted library allocation
page read and write
22F80184000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
3957000
trusted library allocation
page read and write
1C659640000
trusted library allocation
page read and write
236C5C5F000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
6CBD000
stack
page read and write
61C7000
heap
page read and write
27180751000
trusted library allocation
page read and write
1F90D80D000
trusted library allocation
page read and write
2AC4000
trusted library allocation
page read and write
1C659B3A000
trusted library allocation
page read and write
2BCA000
trusted library allocation
page read and write
26F8000
trusted library allocation
page read and write
2B80000
trusted library allocation
page read and write
236BD209000
trusted library allocation
page read and write
1C659DE4000
trusted library allocation
page read and write
296D000
trusted library allocation
page read and write
37D8000
trusted library allocation
page read and write
236C5B43000
heap
page read and write
1C659950000
trusted library allocation
page read and write
2B40000
trusted library allocation
page read and write
195E000
stack
page read and write
271F5250000
heap
page read and write
3717000
trusted library allocation
page read and write
1C657D52000
heap
page read and write
2C0F000
trusted library allocation
page read and write
4D51000
trusted library allocation
page read and write
1F925DA7000
heap
page read and write
27180393000
trusted library allocation
page read and write
C82E3FF000
stack
page read and write
1CD3312B000
trusted library allocation
page read and write
22F90658000
trusted library allocation
page read and write
3B6A000
trusted library allocation
page read and write
7FFD9B97D000
trusted library allocation
page execute and read and write
7FFD9BBB3000
trusted library allocation
page read and write
3708000
trusted library allocation
page read and write
2BBC000
trusted library allocation
page read and write
2718047B000
trusted library allocation
page read and write
265B000
trusted library allocation
page read and write
1F926180000
heap
page read and write
1C659B31000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page execute and read and write
5D4D000
stack
page read and write
22F804F1000
trusted library allocation
page read and write
22F804EE000
trusted library allocation
page read and write
2697000
trusted library allocation
page read and write
27180502000
trusted library allocation
page read and write
1F925DE8000
heap
page read and write
36C1000
trusted library allocation
page read and write
2A32000
trusted library allocation
page read and write
2847000
trusted library allocation
page read and write
5FD000
stack
page read and write
353A7C000
stack
page read and write
4E60000
trusted library allocation
page read and write
26FC000
trusted library allocation
page read and write
7FFD9BBE3000
trusted library allocation
page read and write
7FFD9BB1C000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
850000
trusted library allocation
page read and write
1C659AF8000
trusted library allocation
page read and write
271803F6000
trusted library allocation
page read and write
44D1000
trusted library allocation
page read and write
237E000
stack
page read and write
1CD43141000
trusted library allocation
page read and write
36B2000
trusted library allocation
page read and write
27180725000
trusted library allocation
page read and write
385C000
trusted library allocation
page read and write
269D000
trusted library allocation
page read and write
6200000
heap
page read and write
2A2F000
trusted library allocation
page read and write
7CE000
stack
page read and write
236C5D2C000
heap
page read and write
2B07000
trusted library allocation
page read and write
22FFE353000
heap
page read and write
338E000
trusted library allocation
page read and write
1C659983000
trusted library allocation
page read and write
271F55A0000
heap
page read and write
299B000
trusted library allocation
page read and write
271F000
trusted library allocation
page read and write
2732000
trusted library allocation
page read and write
1C659E80000
trusted library allocation
page read and write
22F8042B000
trusted library allocation
page read and write
271D000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
929F9FF000
stack
page read and write
1C659C9B000
trusted library allocation
page read and write
1C657E60000
trusted library allocation
page read and write
2B50000
trusted library allocation
page read and write
236C5BF0000
heap
page read and write
298A000
trusted library allocation
page read and write
1F925E0E000
heap
page read and write
7FFD9BA6C000
trusted library allocation
page execute and read and write
22FFAFE0000
heap
page read and write
2BEDE3F000
stack
page read and write
1C659A7E000
trusted library allocation
page read and write
7FFD9BD18000
trusted library allocation
page read and write
236AD6D0000
trusted library allocation
page read and write
1C659C18000
trusted library allocation
page read and write
1C659CC3000
trusted library allocation
page read and write
5A8E000
stack
page read and write
7E3000
trusted library allocation
page execute and read and write
236C5A51000
heap
page read and write
83A0000
heap
page read and write
22F806C5000
trusted library allocation
page read and write
860000
trusted library allocation
page read and write
170E000
heap
page read and write
1C6697F7000
trusted library allocation
page read and write
D90000
heap
page read and write
271F76F0000
heap
page execute and read and write
1170000
heap
page read and write
34C0000
heap
page read and write
271F5413000
trusted library allocation
page read and write
7FFD9B982000
trusted library allocation
page read and write
22F804DF000
trusted library allocation
page read and write
22F80715000
trusted library allocation
page read and write
1C659CBF000
trusted library allocation
page read and write
271804D5000
trusted library allocation
page read and write
271F79B0000
heap
page read and write
2BFE000
trusted library allocation
page read and write
3856000
trusted library allocation
page read and write
22F803C9000
trusted library allocation
page read and write
22F8046F000
trusted library allocation
page read and write
29E5000
trusted library allocation
page read and write
2AD0000
trusted library allocation
page read and write
F3E000
heap
page read and write
48DE000
stack
page read and write
22F802D1000
trusted library allocation
page read and write
22F805D0000
trusted library allocation
page read and write
389E000
trusted library allocation
page read and write
236AB600000
heap
page execute and read and write
236BD061000
trusted library allocation
page read and write
27180361000
trusted library allocation
page read and write
26BE000
trusted library allocation
page read and write
48F0000
heap
page execute and read and write
B19E1F8000
stack
page read and write
3B88000
trusted library allocation
page read and write
3732000
trusted library allocation
page read and write
236C5D97000
heap
page read and write
23D0000
trusted library allocation
page read and write
27190001000
trusted library allocation
page read and write
7FFD9B9CC000
trusted library allocation
page execute and read and write
271801C0000
trusted library allocation
page read and write
2AAB000
trusted library allocation
page read and write
295A000
trusted library allocation
page read and write
22F805FD000
trusted library allocation
page read and write
1F90D41F000
trusted library allocation
page read and write
271805F7000
trusted library allocation
page read and write
2992000
trusted library allocation
page read and write
236C5ADC000
heap
page read and write
1C659C0E000
trusted library allocation
page read and write
2B95000
trusted library allocation
page read and write
236C5CF8000
heap
page read and write
3381000
trusted library allocation
page read and write
1C659C41000
trusted library allocation
page read and write
1EE000
stack
page read and write
7FFD9B9A2000
trusted library allocation
page read and write
22F8023E000
trusted library allocation
page read and write
27180730000
trusted library allocation
page read and write
22F8052C000
trusted library allocation
page read and write
7FFD9BB20000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page execute and read and write
276E000
trusted library allocation
page read and write
22F804B1000
trusted library allocation
page read and write
1C659BC2000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
27190282000
trusted library allocation
page read and write
2825000
trusted library allocation
page read and write
580000
heap
page read and write
C82B88F000
stack
page read and write
22F8075B000
trusted library allocation
page read and write
48F3000
heap
page execute and read and write
27180624000
trusted library allocation
page read and write
271806F4000
trusted library allocation
page read and write
2700000
trusted library allocation
page read and write
50AE000
stack
page read and write
392D000
trusted library allocation
page read and write
7A3F000
stack
page read and write
7FFD9BB80000
trusted library allocation
page read and write
271802FC000
trusted library allocation
page read and write
7FFD9B982000
trusted library allocation
page read and write
36A6000
trusted library allocation
page read and write
22F8022D000
trusted library allocation
page read and write
22F805A1000
trusted library allocation
page read and write
295F000
trusted library allocation
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
22F805E5000
trusted library allocation
page read and write
92A09FE000
stack
page read and write
2718021E000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page execute and read and write
276C000
trusted library allocation
page read and write
5C60000
trusted library allocation
page execute and read and write
3991000
trusted library allocation
page read and write
22F9000D000
trusted library allocation
page read and write
850000
trusted library allocation
page read and write
3B80000
trusted library allocation
page read and write
22FFB315000
heap
page read and write
3901000
trusted library allocation
page read and write
6C00000
trusted library allocation
page execute and read and write
271803CA000
trusted library allocation
page read and write
22F8051F000
trusted library allocation
page read and write
271805D8000
trusted library allocation
page read and write
236C5CC1000
heap
page read and write
777E000
stack
page read and write
7FFD9BA4C000
trusted library allocation
page execute and read and write
2B50000
heap
page execute and read and write
236AD42A000
trusted library allocation
page read and write
22FFD4D0000
trusted library section
page read and write
1C659E13000
trusted library allocation
page read and write
1C6697B0000
trusted library allocation
page read and write
22F8027E000
trusted library allocation
page read and write
3918000
trusted library allocation
page read and write
86D000
trusted library allocation
page execute and read and write
27180401000
trusted library allocation
page read and write
22F802AF000
trusted library allocation
page read and write
1C659EAF000
trusted library allocation
page read and write
22F80497000
trusted library allocation
page read and write
22F805F4000
trusted library allocation
page read and write
27180429000
trusted library allocation
page read and write
6300000
trusted library allocation
page execute and read and write
59F000
heap
page read and write
4E8D000
trusted library allocation
page read and write
1C65999E000
trusted library allocation
page read and write
7FFD9B9CB000
trusted library allocation
page execute and read and write
7FFD9BBF0000
trusted library allocation
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
271F76F4000
heap
page execute and read and write
1F90BA70000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page execute and read and write
2718031D000
trusted library allocation
page read and write
3719000
trusted library allocation
page read and write
22F8054C000
trusted library allocation
page read and write
860000
trusted library allocation
page read and write
271801B5000
trusted library allocation
page read and write
271803FF000
trusted library allocation
page read and write
22F805B0000
trusted library allocation
page read and write
6940000
heap
page read and write
8B1000
heap
page read and write
5CB0000
trusted library allocation
page read and write
29AF000
trusted library allocation
page read and write
7FFD9BCE0000
trusted library allocation
page execute and read and write
7FFD9BBB0000
trusted library allocation
page read and write
29E9000
trusted library allocation
page read and write
1F9260DC000
heap
page read and write
63FA000
trusted library allocation
page read and write
38A8000
trusted library allocation
page read and write
236AB4E5000
heap
page read and write
5CAF000
trusted library allocation
page read and write
63F0000
trusted library allocation
page read and write
378D000
trusted library allocation
page read and write
3B4D000
trusted library allocation
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
1C659D1B000
trusted library allocation
page read and write
2B20000
trusted library allocation
page read and write
22F805C1000
trusted library allocation
page read and write
39B7000
trusted library allocation
page read and write
1663000
trusted library allocation
page read and write
22F80549000
trusted library allocation
page read and write
1CD3157F000
heap
page read and write
5050000
trusted library allocation
page read and write
1CD433E2000
trusted library allocation
page read and write
26C3000
trusted library allocation
page read and write
1C659EC4000
trusted library allocation
page read and write
2717000
trusted library allocation
page read and write
2718078F000
trusted library allocation
page read and write
368B000
trusted library allocation
page read and write
7FFD9B97D000
trusted library allocation
page execute and read and write
22F80512000
trusted library allocation
page read and write
271F52BB000
heap
page read and write
7FFD9B9CD000
trusted library allocation
page execute and read and write
353E7E000
stack
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
7FFD9BBC0000
trusted library allocation
page execute and read and write
1CD314C0000
heap
page read and write
3B37000
trusted library allocation
page read and write
3678000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
36E6000
trusted library allocation
page read and write
22F80748000
trusted library allocation
page read and write
22F802B1000
trusted library allocation
page read and write
2718036A000
trusted library allocation
page read and write
892000
trusted library allocation
page read and write
927000
heap
page read and write
1F90D871000
trusted library allocation
page read and write
2738000
trusted library allocation
page read and write
2718032C000
trusted library allocation
page read and write
1C659E24000
trusted library allocation
page read and write
1C659CA4000
trusted library allocation
page read and write
7FFD9BBB6000
trusted library allocation
page read and write
36DC000
trusted library allocation
page read and write
1C659AC2000
trusted library allocation
page read and write
7FFD9B9B3000
trusted library allocation
page execute and read and write
22F8026C000
trusted library allocation
page read and write
1F90D795000
trusted library allocation
page read and write
6EB0000
heap
page read and write
39B0000
trusted library allocation
page read and write
1C65997A000
trusted library allocation
page read and write
38E8000
trusted library allocation
page read and write
22F80462000
trusted library allocation
page read and write
236C5AF0000
heap
page read and write
7FFD9BD4C000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
22FFD4C4000
heap
page execute and read and write
1C659A68000
trusted library allocation
page read and write
1F926151000
heap
page read and write
37C5000
trusted library allocation
page read and write
1F926187000
heap
page read and write
36CF000
trusted library allocation
page read and write
1C659A3E000
trusted library allocation
page read and write
22F8062F000
trusted library allocation
page read and write
64BF000
trusted library allocation
page read and write
1CD42FF1000
trusted library allocation
page read and write
236AD156000
trusted library allocation
page read and write
C82CFFD000
stack
page read and write
5B8E000
stack
page read and write
7FFD9BA20000
trusted library allocation
page read and write
236AD476000
trusted library allocation
page read and write
22F8050E000
trusted library allocation
page read and write
2ADF000
trusted library allocation
page read and write
3713000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
3961000
trusted library allocation
page read and write
22F80179000
trusted library allocation
page read and write
3809000
trusted library allocation
page read and write
283A000
trusted library allocation
page read and write
27BF000
trusted library allocation
page read and write
26BC000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
271805E8000
trusted library allocation
page read and write
27180526000
trusted library allocation
page read and write
1C6599AF000
trusted library allocation
page read and write
8F0000
heap
page read and write
1C659BC4000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
2C04000
trusted library allocation
page read and write
22F8032D000
trusted library allocation
page read and write
236AD4A5000
trusted library allocation
page read and write
271F55A5000
heap
page read and write
271F52BD000
heap
page read and write
7FFD9BB8F000
trusted library allocation
page read and write
27180248000
trusted library allocation
page read and write
1F90D610000
trusted library allocation
page read and write
1F90D6FF000
trusted library allocation
page read and write
236C5C89000
heap
page read and write
271804E4000
trusted library allocation
page read and write
36FF000
trusted library allocation
page read and write
236AB526000
heap
page read and write
7FFD9BD48000
trusted library allocation
page read and write
374D000
trusted library allocation
page read and write
1CD3324F000
trusted library allocation
page read and write
271803E8000
trusted library allocation
page read and write
22F806B6000
trusted library allocation
page read and write
5B7E000
stack
page read and write
B19E23E000
stack
page read and write
1C659E7E000
trusted library allocation
page read and write
271F6D5B000
heap
page read and write
615E000
stack
page read and write
1C6697DA000
trusted library allocation
page read and write
266E000
trusted library allocation
page read and write
1C657D10000
heap
page read and write
75F41FF000
stack
page read and write
391A000
trusted library allocation
page read and write
392F000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
1F925F79000
heap
page read and write
2AC8000
trusted library allocation
page read and write
3541000
trusted library allocation
page read and write
236C5A7B000
heap
page read and write
7FFD9BBBF000
trusted library allocation
page read and write
6190000
trusted library allocation
page read and write
236AD594000
trusted library allocation
page read and write
1F90D695000
trusted library allocation
page read and write
271803F0000
trusted library allocation
page read and write
1C6599F0000
trusted library allocation
page read and write
29B7000
trusted library allocation
page read and write
3875000
trusted library allocation
page read and write
2AFD000
stack
page read and write
7FFD9BA26000
trusted library allocation
page read and write
1C659993000
trusted library allocation
page read and write
38D2000
trusted library allocation
page read and write
7FFD9BBDE000
trusted library allocation
page read and write
3517000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
2718066E000
trusted library allocation
page read and write
22F80318000
trusted library allocation
page read and write
27F3000
trusted library allocation
page read and write
271801EA000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page execute and read and write
2718077D000
trusted library allocation
page read and write
1C659BB1000
trusted library allocation
page read and write
37A4000
trusted library allocation
page read and write
63D6000
trusted library allocation
page read and write
6242000
heap
page read and write
22F8020F000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
271804CF000
trusted library allocation
page read and write
53C0000
heap
page execute and read and write
58F0000
heap
page read and write
278D000
trusted library allocation
page read and write
1CD315C4000
heap
page read and write
22F8060B000
trusted library allocation
page read and write
489E000
stack
page read and write
400000
remote allocation
page execute and read and write
22F805E7000
trusted library allocation
page read and write
22F8031E000
trusted library allocation
page read and write
271802BA000
trusted library allocation
page read and write
167A000
trusted library allocation
page execute and read and write
1C659C51000
trusted library allocation
page read and write
1C659E7C000
trusted library allocation
page read and write
22FFADC2000
unkown
page readonly
7FFD9B990000
trusted library allocation
page read and write
4DEE000
stack
page read and write
271F52E5000
heap
page read and write
27180235000
trusted library allocation
page read and write
22F8069F000
trusted library allocation
page read and write
271804BF000
trusted library allocation
page read and write
1F925350000
trusted library allocation
page read and write
1C659CD0000
trusted library allocation
page read and write
1C659E83000
trusted library allocation
page read and write
2A44000
trusted library allocation
page read and write
63B2000
trusted library allocation
page read and write
1C6722D0000
heap
page read and write
63D0000
trusted library allocation
page read and write
1CD4B9EC000
heap
page read and write
22F8033A000
trusted library allocation
page read and write
2AE9000
trusted library allocation
page read and write
5CB4000
trusted library allocation
page read and write
1C659CAE000
trusted library allocation
page read and write
27180723000
trusted library allocation
page read and write
22F80426000
trusted library allocation
page read and write
29B9000
trusted library allocation
page read and write
236C5AFC000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
22F801F0000
trusted library allocation
page read and write
1C659E44000
trusted library allocation
page read and write
1CD4309D000
trusted library allocation
page read and write
52D0000
trusted library allocation
page execute and read and write
271F5280000
heap
page read and write
75F39FC000
stack
page read and write
1C67239B000
heap
page read and write
2747000
trusted library allocation
page read and write
3B30000
trusted library allocation
page read and write
2B5F000
trusted library allocation
page read and write
7FFD9BBBE000
trusted library allocation
page read and write
22F80424000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
395B000
trusted library allocation
page read and write
27180570000
trusted library allocation
page read and write
4910000
heap
page read and write
7FFD9B974000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
3890000
trusted library allocation
page read and write
271806E3000
trusted library allocation
page read and write
1F926072000
heap
page read and write
2A0C000
trusted library allocation
page read and write
1C659C5A000
trusted library allocation
page read and write
8010000
heap
page read and write
2A63000
trusted library allocation
page read and write
2718057D000
trusted library allocation
page read and write
4AFE000
stack
page read and write
7FFD9B994000
trusted library allocation
page read and write
38E6000
trusted library allocation
page read and write
1C659930000
trusted library allocation
page read and write
2785000
trusted library allocation
page read and write
236C5DA5000
heap
page read and write
3414000
trusted library allocation
page read and write
1F90D408000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
2718049F000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page read and write
22F8073C000
trusted library allocation
page read and write
1F925DE2000
heap
page read and write
27180339000
trusted library allocation
page read and write
3963000
trusted library allocation
page read and write
1C659EB7000
trusted library allocation
page read and write
1F90B980000
trusted library allocation
page read and write
236AD058000
heap
page read and write
22F802BE000
trusted library allocation
page read and write
1C669A22000
trusted library allocation
page read and write
1CD31585000
heap
page read and write
1C657CC5000
heap
page read and write
3D01000
trusted library allocation
page read and write
22F8056E000
trusted library allocation
page read and write
3883000
trusted library allocation
page read and write
1F90D64B000
trusted library allocation
page read and write
1C659995000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
1F90D500000
trusted library allocation
page read and write
1F92609A000
heap
page read and write
3762000
trusted library allocation
page read and write
271806D6000
trusted library allocation
page read and write
37AC000
trusted library allocation
page read and write
7FFD9BA96000
trusted library allocation
page execute and read and write
2718034A000
trusted library allocation
page read and write
22FFB109000
heap
page read and write
3754000
trusted library allocation
page read and write
4D4B000
trusted library allocation
page read and write
22F8029C000
trusted library allocation
page read and write
1C669D07000
trusted library allocation
page read and write
1830000
trusted library allocation
page execute and read and write
236C5B2A000
heap
page read and write
1C657D3B000
heap
page read and write
386E000
trusted library allocation
page read and write
236C5C92000
heap
page read and write
27190841000
trusted library allocation
page read and write
1F90D83B000
trusted library allocation
page read and write
23F6000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
2718057F000
trusted library allocation
page read and write
236C5D94000
heap
page read and write
2C15000
trusted library allocation
page read and write
1F926065000
heap
page read and write
3751000
trusted library allocation
page read and write
2B2F000
trusted library allocation
page read and write
38B7000
trusted library allocation
page read and write
4FAE000
stack
page read and write
1C659DA8000
trusted library allocation
page read and write
22F801B3000
trusted library allocation
page read and write
1310000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
1C659B82000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9BA66000
trusted library allocation
page read and write
1F926170000
heap
page read and write
27EF000
trusted library allocation
page read and write
236C5722000
heap
page read and write
1F90D66D000
trusted library allocation
page read and write
36FD000
trusted library allocation
page read and write
22F802BC000
trusted library allocation
page read and write
64BC000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
3647000
trusted library allocation
page read and write
7FFD9B9A2000
trusted library allocation
page read and write
1C659E1E000
trusted library allocation
page read and write
1F90D4BB000
trusted library allocation
page read and write
128B000
trusted library allocation
page execute and read and write
22F80400000
trusted library allocation
page read and write
3921000
trusted library allocation
page read and write
2A7E000
trusted library allocation
page read and write
1F925EAA000
heap
page read and write
1CD4B7F3000
heap
page execute and read and write
1C659690000
heap
page read and write
22FFCD00000
trusted library allocation
page read and write
27180656000
trusted library allocation
page read and write
271803DB000
trusted library allocation
page read and write
620000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
271801B7000
trusted library allocation
page read and write
271805CF000
trusted library allocation
page read and write
929F5FE000
stack
page read and write
61F0000
trusted library allocation
page execute and read and write
392B000
trusted library allocation
page read and write
1A5F000
stack
page read and write
1CD431B5000
trusted library allocation
page read and write
1F90B6F0000
heap
page read and write
7FFD9BD20000
trusted library allocation
page read and write
1C659C8E000
trusted library allocation
page read and write
2813000
trusted library allocation
page read and write
7FFD9BB1C000
trusted library allocation
page read and write
2718049B000
trusted library allocation
page read and write
7FFD9BC70000
trusted library allocation
page read and write
236C5B09000
heap
page read and write
236C5D1E000
heap
page read and write
22F80406000
trusted library allocation
page read and write
1F90B83D000
heap
page read and write
2718029A000
trusted library allocation
page read and write
3976000
trusted library allocation
page read and write
2954000
trusted library allocation
page read and write
236AB4FD000
heap
page read and write
1C659D17000
trusted library allocation
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
3410000
trusted library allocation
page read and write
27180443000
trusted library allocation
page read and write
22FFB090000
trusted library allocation
page read and write
23FC000
trusted library allocation
page read and write
39B2000
trusted library allocation
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
3701000
trusted library allocation
page read and write
2958000
trusted library allocation
page read and write
22F80442000
trusted library allocation
page read and write
1F90D800000
trusted library allocation
page read and write
890000
trusted library allocation
page read and write
1C659980000
trusted library allocation
page read and write
1C659D0F000
trusted library allocation
page read and write
6EC0000
heap
page read and write
3400000
trusted library allocation
page read and write
5A7E000
stack
page read and write
1F90D828000
trusted library allocation
page read and write
3430000
heap
page execute and read and write
1F90B920000
heap
page read and write
22F803A5000
trusted library allocation
page read and write
3AC9000
trusted library allocation
page read and write
3766000
trusted library allocation
page read and write
27180423000
trusted library allocation
page read and write
7FFD9BC90000
trusted library allocation
page read and write
7D0000
trusted library allocation
page read and write
26D3000
trusted library allocation
page read and write
1650000
trusted library allocation
page read and write
29D4000
trusted library allocation
page read and write
2B25000
trusted library allocation
page read and write
7FFD9BB42000
trusted library allocation
page read and write
29EB000
trusted library allocation
page read and write
22F803A1000
trusted library allocation
page read and write
7FFD9B9B2000
trusted library allocation
page read and write
1F90D47F000
trusted library allocation
page read and write
1C659C0B000
trusted library allocation
page read and write
4C3D000
stack
page read and write
22F801FE000
trusted library allocation
page read and write
36A8000
trusted library allocation
page read and write
3B71000
trusted library allocation
page read and write
1F90D74D000
trusted library allocation
page read and write
2ACE000
trusted library allocation
page read and write
2718036C000
trusted library allocation
page read and write
36D6000
trusted library allocation
page read and write
22F8031A000
trusted library allocation
page read and write
1C659D97000
trusted library allocation
page read and write
1B10000
trusted library allocation
page read and write
B19DDFE000
stack
page read and write
2657000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
22F80197000
trusted library allocation
page read and write
236C59F0000
heap
page read and write
2A81000
trusted library allocation
page read and write
535E000
stack
page read and write
2ACA000
trusted library allocation
page read and write
236AD05A000
heap
page read and write
1C659E7A000
trusted library allocation
page read and write
4E1F000
trusted library allocation
page read and write
22F8030B000
trusted library allocation
page read and write
1CD31540000
trusted library allocation
page read and write
64DD000
trusted library allocation
page read and write
2651000
trusted library allocation
page read and write
271F5380000
heap
page read and write
22F80523000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
236AD56C000
trusted library allocation
page read and write
3965000
trusted library allocation
page read and write
59F0000
trusted library allocation
page execute and read and write
22F80338000
trusted library allocation
page read and write
1610000
heap
page read and write
1C6717D0000
trusted library allocation
page read and write
371D000
trusted library allocation
page read and write
2718060A000
trusted library allocation
page read and write
7FF4A30B0000
trusted library allocation
page execute and read and write
236AB4E3000
heap
page read and write
7FFD9B9A3000
trusted library allocation
page execute and read and write
22F80222000
trusted library allocation
page read and write
26FA000
trusted library allocation
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
236C5CA1000
heap
page read and write
22F8051B000
trusted library allocation
page read and write
3726000
trusted library allocation
page read and write
3887000
trusted library allocation
page read and write
27180240000
trusted library allocation
page read and write
2543000
trusted library allocation
page read and write
27180399000
trusted library allocation
page read and write
1C659E40000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
37C7000
trusted library allocation
page read and write
7FFD9BA2C000
trusted library allocation
page execute and read and write
236AD5FD000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
22F80231000
trusted library allocation
page read and write
37E0000
trusted library allocation
page read and write
1C659BFC000
trusted library allocation
page read and write
870000
heap
page read and write
283E000
trusted library allocation
page read and write
388B000
trusted library allocation
page read and write
236AD139000
trusted library allocation
page read and write
839C000
stack
page read and write
C50000
trusted library allocation
page read and write
22F805A5000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
11CE000
stack
page read and write
26CD000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page execute and read and write
53D0000
heap
page read and write
3916000
trusted library allocation
page read and write
236AD521000
trusted library allocation
page read and write
C39000
heap
page read and write
22F804B3000
trusted library allocation
page read and write
236C5D4E000
heap
page read and write
22F803EF000
trusted library allocation
page read and write
27180691000
trusted library allocation
page read and write
22F802C0000
trusted library allocation
page read and write
4EFD000
stack
page read and write
2AC6000
trusted library allocation
page read and write
1C659921000
trusted library allocation
page read and write
236C5C00000
heap
page read and write
4E00000
trusted library allocation
page read and write
1C659CDF000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
3B2E000
trusted library allocation
page read and write
FF0000
heap
page read and write
236C5DF8000
heap
page read and write
1C659B6F000
trusted library allocation
page read and write
451D000
stack
page read and write
1C659C9F000
trusted library allocation
page read and write
236AD3AB000
trusted library allocation
page read and write
1F90B8FE000
heap
page read and write
22F80584000
trusted library allocation
page read and write
271803A6000
trusted library allocation
page read and write
58D6000
heap
page read and write
27180777000
trusted library allocation
page read and write
1C659C09000
trusted library allocation
page read and write
27180220000
trusted library allocation
page read and write
C6E000
trusted library allocation
page read and write
22FFB005000
heap
page read and write
27180255000
trusted library allocation
page read and write
1F90D81A000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
22F8057B000
trusted library allocation
page read and write
1277000
trusted library allocation
page execute and read and write
22F80706000
trusted library allocation
page read and write
22F804CA000
trusted library allocation
page read and write
7FFD9BB4C000
trusted library allocation
page read and write
27180419000
trusted library allocation
page read and write
1C659630000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
929FDFC000
stack
page read and write
2B65000
trusted library allocation
page read and write
1F90D787000
trusted library allocation
page read and write
22FFB293000
trusted library allocation
page read and write
2B04000
trusted library allocation
page read and write
3AC1000
trusted library allocation
page read and write
7FFD9BD23000
trusted library allocation
page read and write
236C5E08000
heap
page read and write
1C659A8C000
trusted library allocation
page read and write
1C6599FA000
trusted library allocation
page read and write
236C5CB6000
heap
page read and write
236AD347000
trusted library allocation
page read and write
1C659A5B000
trusted library allocation
page read and write
5CC5000
trusted library allocation
page read and write
7FFD9BD10000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
7F680000
trusted library allocation
page execute and read and write
22F8055C000
trusted library allocation
page read and write
630000
heap
page read and write
6990000
trusted library allocation
page execute and read and write
22F8019C000
trusted library allocation
page read and write
1C659B2D000
trusted library allocation
page read and write
1C659DA6000
trusted library allocation
page read and write
22F80713000
trusted library allocation
page read and write
1C659D95000
trusted library allocation
page read and write
2B52000
trusted library allocation
page read and write
3B68000
trusted library allocation
page read and write
27180242000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
271803B9000
trusted library allocation
page read and write
22F8061E000
trusted library allocation
page read and write
588000
heap
page read and write
3689000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
39AA000
trusted library allocation
page read and write
1C659CA1000
trusted library allocation
page read and write
171D000
heap
page read and write
26C9000
trusted library allocation
page read and write
2719000
trusted library allocation
page read and write
22F9045F000
trusted library allocation
page read and write
271804E2000
trusted library allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
22FFD710000
heap
page read and write
2718047D000
trusted library allocation
page read and write
3ABF000
trusted library allocation
page read and write
22FFE340000
heap
page read and write
7FFD9BD40000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page execute and read and write
1C659C4F000
trusted library allocation
page read and write
182C000
stack
page read and write
27180416000
trusted library allocation
page read and write
1CD31638000
heap
page read and write
7FFD9BC75000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
C82B8CE000
stack
page read and write
1F90D781000
trusted library allocation
page read and write
2718061B000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
1C659E37000
trusted library allocation
page read and write
2713000
trusted library allocation
page read and write
1C659C2B000
trusted library allocation
page read and write
1F925D10000
heap
page read and write
395F000
trusted library allocation
page read and write
22FFB0AC000
heap
page read and write
2A02000
trusted library allocation
page read and write
7FFD9B9FC000
trusted library allocation
page execute and read and write
E0000
unkown
page readonly
7FFD9BD30000
trusted library allocation
page read and write
38BB000
trusted library allocation
page read and write
2718067C000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1C659F03000
trusted library allocation
page read and write
3681000
trusted library allocation
page read and write
38F9000
trusted library allocation
page read and write
3787000
trusted library allocation
page read and write
236AB430000
heap
page read and write
7FFD9BB40000
trusted library allocation
page read and write
3B8B000
trusted library allocation
page read and write
1CD32FEA000
heap
page read and write
1C659A40000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
399D000
trusted library allocation
page read and write
27180237000
trusted library allocation
page read and write
3793000
trusted library allocation
page read and write
1C659DD5000
trusted library allocation
page read and write
34BF000
trusted library allocation
page read and write
22F80480000
trusted library allocation
page read and write
271F53A0000
heap
page read and write
22F803F3000
trusted library allocation
page read and write
1850000
heap
page read and write
4ACE000
stack
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
2BEC1FE000
stack
page read and write
7FFD9BB30000
trusted library allocation
page read and write
2688000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page execute and read and write
1C657E10000
heap
page read and write
2B27000
trusted library allocation
page read and write
6D00000
trusted library allocation
page execute and read and write
35367E000
stack
page read and write
7FFD9BD50000
trusted library allocation
page read and write
61D8000
heap
page read and write
37D4000
trusted library allocation
page read and write
274D000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
2718038A000
trusted library allocation
page read and write
236AD14F000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
61EC000
heap
page read and write
5C7F000
stack
page read and write
271804A1000
trusted library allocation
page read and write
27180257000
trusted library allocation
page read and write
236C5AEE000
heap
page read and write
1C659E93000
trusted library allocation
page read and write
277F000
trusted library allocation
page read and write
3426000
trusted library allocation
page read and write
5546000
heap
page read and write
4F50000
heap
page read and write
1CD31510000
trusted library allocation
page read and write
22F8056C000
trusted library allocation
page read and write
271F5400000
trusted library allocation
page read and write
2827000
trusted library allocation
page read and write
1C65990E000
trusted library allocation
page read and write
27180583000
trusted library allocation
page read and write
236C5E0C000
heap
page read and write
27180762000
trusted library allocation
page read and write
22F80448000
trusted library allocation
page read and write
1F925F8D000
heap
page read and write
2B9B000
trusted library allocation
page read and write
22F80404000
trusted library allocation
page read and write
3978000
trusted library allocation
page read and write
60C000
heap
page read and write
1C659DC8000
trusted library allocation
page read and write
37A6000
trusted library allocation
page read and write
22F80711000
trusted library allocation
page read and write
1C659C9D000
trusted library allocation
page read and write
B19C5FF000
stack
page read and write
1C659D8F000
trusted library allocation
page read and write
1C659DB1000
trusted library allocation
page read and write
1C659DBA000
trusted library allocation
page read and write
1F90D56E000
trusted library allocation
page read and write
1C659DC6000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
1C669EF1000
trusted library allocation
page read and write
271801D5000
trusted library allocation
page read and write
1C659D08000
trusted library allocation
page read and write
22F80737000
trusted library allocation
page read and write
22F8058E000
trusted library allocation
page read and write
37F8000
trusted library allocation
page read and write
7FFD9BD70000
trusted library allocation
page read and write
2845000
trusted library allocation
page read and write
7FFD9BC09000
trusted library allocation
page read and write
236AD619000
trusted library allocation
page read and write
2718057B000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page execute and read and write
22F805A3000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
7FFD9BB8F000
trusted library allocation
page read and write
22F804AF000
trusted library allocation
page read and write
3944000
trusted library allocation
page read and write
278B000
trusted library allocation
page read and write
1C659660000
trusted library allocation
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
1C6599A2000
trusted library allocation
page read and write
90E000
stack
page read and write
372C000
trusted library allocation
page read and write
2718046E000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
236AD3CC000
trusted library allocation
page read and write
224A000
trusted library allocation
page read and write
2A1F000
trusted library allocation
page read and write
2977000
trusted library allocation
page read and write
11F5000
heap
page read and write
271F5410000
trusted library allocation
page read and write
236C5A61000
heap
page read and write
37E6000
trusted library allocation
page read and write
89B000
trusted library allocation
page execute and read and write
52F0000
trusted library allocation
page execute and read and write
587000
stack
page read and write
1C659E55000
trusted library allocation
page read and write
27180775000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
1C659E60000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
6BB0000
heap
page read and write
140000
remote allocation
page execute and read and write
48C000
stack
page read and write
1F92612D000
heap
page read and write
22F80186000
trusted library allocation
page read and write
1CD31470000
heap
page read and write
1C659A6A000
trusted library allocation
page read and write
271802E9000
trusted library allocation
page read and write
236AD310000
trusted library allocation
page read and write
190000
remote allocation
page execute and read and write
29CE000
trusted library allocation
page read and write
271806AF000
trusted library allocation
page read and write
236AD530000
trusted library allocation
page read and write
C70000
trusted library allocation
page read and write
4FC3000
heap
page read and write
2718032F000
trusted library allocation
page read and write
36F6000
trusted library allocation
page read and write
2718060D000
trusted library allocation
page read and write
1F90B9C0000
trusted library section
page read and write
22F80521000
trusted library allocation
page read and write
166D000
trusted library allocation
page execute and read and write
3843000
trusted library allocation
page read and write
382C000
trusted library allocation
page read and write
1F925EC0000
heap
page read and write
1C659AD9000
trusted library allocation
page read and write
1F925EAE000
heap
page read and write
22F80638000
trusted library allocation
page read and write
271802DC000
trusted library allocation
page read and write
271804E8000
trusted library allocation
page read and write
1C659ACB000
trusted library allocation
page read and write
380B000
trusted library allocation
page read and write
280C000
trusted library allocation
page read and write
1640000
trusted library allocation
page read and write
38FD000
trusted library allocation
page read and write
92B000
heap
page read and write
1C659CAC000
trusted library allocation
page read and write
2BF7000
heap
page read and write
22F804FF000
trusted library allocation
page read and write
37AA000
trusted library allocation
page read and write
236BD595000
trusted library allocation
page read and write
1C659941000
trusted library allocation
page read and write
2CFE000
stack
page read and write
3999000
trusted library allocation
page read and write
236C5AA1000
heap
page read and write
22F8021C000
trusted library allocation
page read and write
236AD303000
trusted library allocation
page read and write
236C5CE4000
heap
page read and write
1F925D52000
heap
page read and write
27180524000
trusted library allocation
page read and write
22F801AC000
trusted library allocation
page read and write
236AD37C000
trusted library allocation
page read and write
4900000
heap
page read and write
1CD31550000
trusted library allocation
page read and write
1C659AB0000
trusted library allocation
page read and write
22F803B8000
trusted library allocation
page read and write
271802EB000
trusted library allocation
page read and write
3764000
trusted library allocation
page read and write
1C6599B5000
trusted library allocation
page read and write
840000
trusted library allocation
page execute and read and write
1C659BB3000
trusted library allocation
page read and write
5B90000
trusted library section
page read and write
1C659B4B000
trusted library allocation
page read and write
7FFD9B9BA000
trusted library allocation
page read and write
1C659B71000
trusted library allocation
page read and write
1F925D25000
heap
page read and write
2975000
trusted library allocation
page read and write
2718049D000
trusted library allocation
page read and write
1C65997E000
trusted library allocation
page read and write
7FFD9B9DB000
trusted library allocation
page execute and read and write
27180716000
trusted library allocation
page read and write
6130000
trusted library allocation
page read and write
271801D9000
trusted library allocation
page read and write
2C02000
trusted library allocation
page read and write
271803F2000
trusted library allocation
page read and write
3AC3000
trusted library allocation
page read and write
1F925E60000
heap
page read and write
1CD4BA32000
heap
page read and write
22F804CE000
trusted library allocation
page read and write
2BED9F8000
stack
page read and write
2A72000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
1C659CFD000
trusted library allocation
page read and write
271807AE000
trusted library allocation
page read and write
1C659B1C000
trusted library allocation
page read and write
2A97000
trusted library allocation
page read and write
6208000
heap
page read and write
5C8000
heap
page read and write
22F80439000
trusted library allocation
page read and write
22F804A2000
trusted library allocation
page read and write
1F926155000
heap
page read and write
1F90B83F000
heap
page read and write
3ACC000
trusted library allocation
page read and write
2BCE000
trusted library allocation
page read and write
27180593000
trusted library allocation
page read and write
3B4B000
trusted library allocation
page read and write
2B8B000
trusted library allocation
page read and write
1C6599EB000
trusted library allocation
page read and write
271802A7000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
1F90D310000
heap
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
64D1000
trusted library allocation
page read and write
C82BFED000
stack
page read and write
1C6599F8000
trusted library allocation
page read and write
7FFD9BBD5000
trusted library allocation
page read and write
3948000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page read and write
2C19000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
3993000
trusted library allocation
page read and write
2B4A000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
59D0000
trusted library allocation
page execute and read and write
C90000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1C659AFC000
trusted library allocation
page read and write
271802ED000
trusted library allocation
page read and write
3420000
trusted library allocation
page read and write
1C659A64000
trusted library allocation
page read and write
22F806C3000
trusted library allocation
page read and write
1F90D87E000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
600000
heap
page read and write
1F90BA75000
heap
page read and write
29AB000
trusted library allocation
page read and write
271806E7000
trusted library allocation
page read and write
236AD362000
trusted library allocation
page read and write
F1D000
trusted library allocation
page execute and read and write
7FFD9B9C4000
trusted library allocation
page read and write
7FFD9B994000
trusted library allocation
page read and write
22F80700000
trusted library allocation
page read and write
22F80460000
trusted library allocation
page read and write
22F8045C000
trusted library allocation
page read and write
22F80694000
trusted library allocation
page read and write
3768000
trusted library allocation
page read and write
26A5000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
37A8000
trusted library allocation
page read and write
27180427000
trusted library allocation
page read and write
3687000
trusted library allocation
page read and write
1C659A2F000
trusted library allocation
page read and write
22F80193000
trusted library allocation
page read and write
22F80717000
trusted library allocation
page read and write
1F925D74000
heap
page read and write
3749000
trusted library allocation
page read and write
22F802FA000
trusted library allocation
page read and write
7FFD9BC72000
trusted library allocation
page read and write
1CD33252000
trusted library allocation
page read and write
1C659E02000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
27BD000
trusted library allocation
page read and write
7FFD9B9CC000
trusted library allocation
page execute and read and write
27180604000
trusted library allocation
page read and write
1F926179000
heap
page read and write
1C659A6C000
trusted library allocation
page read and write
2BED1FE000
stack
page read and write
26D7000
trusted library allocation
page read and write
236AB4C0000
heap
page read and write
1C659DA2000
trusted library allocation
page read and write
271801F7000
trusted library allocation
page read and write
22F80298000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
22F801A8000
trusted library allocation
page read and write
22F80493000
trusted library allocation
page read and write
910000
trusted library allocation
page execute and read and write
22F80173000
trusted library allocation
page read and write
368E000
trusted library allocation
page read and write
7F2000
trusted library allocation
page read and write
22F80385000
trusted library allocation
page read and write
236C5A39000
heap
page read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
6960000
trusted library allocation
page execute and read and write
1C659C2D000
trusted library allocation
page read and write
7FFD9BD40000
trusted library allocation
page read and write
2718048A000
trusted library allocation
page read and write
5B0F000
stack
page read and write
272C000
trusted library allocation
page read and write
5900000
heap
page read and write
C82DBFF000
stack
page read and write
80A000
trusted library allocation
page execute and read and write
236AD454000
trusted library allocation
page read and write
1F90D464000
trusted library allocation
page read and write
27190057000
trusted library allocation
page read and write
929F1FE000
stack
page read and write
1F926091000
heap
page read and write
22F80486000
trusted library allocation
page read and write
1C659CB2000
trusted library allocation
page read and write
2715000
trusted library allocation
page read and write
27180608000
trusted library allocation
page read and write
236AD395000
trusted library allocation
page read and write
53B0000
remote allocation
page read and write
7FFD9BBB7000
trusted library allocation
page read and write
22F80690000
trusted library allocation
page read and write
236AD3E7000
trusted library allocation
page read and write
61F9000
heap
page read and write
22F80287000
trusted library allocation
page read and write
236C5C6C000
heap
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
3B3D000
trusted library allocation
page read and write
1687000
trusted library allocation
page execute and read and write
1C659DD3000
trusted library allocation
page read and write
271F5530000
heap
page execute and read and write
2B97000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
27C3000
trusted library allocation
page read and write
22F805B4000
trusted library allocation
page read and write
1C657CF0000
heap
page read and write
4B70000
trusted library section
page read and write
3889000
trusted library allocation
page read and write
2AE3000
trusted library allocation
page read and write
63E0000
trusted library allocation
page execute and read and write
3736000
trusted library allocation
page read and write
1CD31553000
trusted library allocation
page read and write
6CE0000
trusted library allocation
page read and write
1C659EFA000
trusted library allocation
page read and write
1C659D0A000
trusted library allocation
page read and write
E22000
unkown
page readonly
22F80411000
trusted library allocation
page read and write
271802B8000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
27180581000
trusted library allocation
page read and write
2BC6000
trusted library allocation
page read and write
7FFD9BA56000
trusted library allocation
page execute and read and write
22F804D9000
trusted library allocation
page read and write
2718068F000
trusted library allocation
page read and write
2718046A000
trusted library allocation
page read and write
1F926146000
heap
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
7FFD9BB8C000
trusted library allocation
page read and write
22F8031C000
trusted library allocation
page read and write
26A1000
trusted library allocation
page read and write
2AA9000
trusted library allocation
page read and write
22F80199000
trusted library allocation
page read and write
22F80746000
trusted library allocation
page read and write
1C659C5E000
trusted library allocation
page read and write
1C669CF6000
trusted library allocation
page read and write
22F90001000
trusted library allocation
page read and write
2718055F000
trusted library allocation
page read and write
351DFD000
stack
page read and write
271805D5000
trusted library allocation
page read and write
1C659DDB000
trusted library allocation
page read and write
2948000
trusted library allocation
page read and write
1C659790000
heap
page execute and read and write
1F90D69C000
trusted library allocation
page read and write
22F8052E000
trusted library allocation
page read and write
29CA000
trusted library allocation
page read and write
1C6599B8000
trusted library allocation
page read and write
1C659CD6000
trusted library allocation
page read and write
29A5000
trusted library allocation
page read and write
6D7E000
stack
page read and write
64C4000
trusted library allocation
page read and write
7FFD9BBA5000
trusted library allocation
page read and write
27180412000
trusted library allocation
page read and write
22F8030F000
trusted library allocation
page read and write
3939000
trusted library allocation
page read and write
271801E4000
trusted library allocation
page read and write
22F80471000
trusted library allocation
page read and write
3715000
trusted library allocation
page read and write
27180271000
trusted library allocation
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
1C659D61000
trusted library allocation
page read and write
1F90D71D000
trusted library allocation
page read and write
4E8A000
trusted library allocation
page read and write
7FFD9BC20000
trusted library allocation
page read and write
1C657BE0000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
22F804EC000
trusted library allocation
page read and write
1C659D19000
trusted library allocation
page read and write
1F925D72000
heap
page read and write
271803DD000
trusted library allocation
page read and write
236ACEBB000
heap
page read and write
271804F7000
trusted library allocation
page read and write
29AD000
trusted library allocation
page read and write
3B34000
trusted library allocation
page read and write
3AB9000
trusted library allocation
page read and write
27180350000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page execute and read and write
2B2B000
trusted library allocation
page read and write
27D6000
trusted library allocation
page read and write
4940000
heap
page read and write
2B74000
trusted library allocation
page read and write
675000
heap
page read and write
1C659DB3000
trusted library allocation
page read and write
1C659B5A000
trusted library allocation
page read and write
1F90B800000
heap
page read and write
2AF2000
trusted library allocation
page read and write
271F5460000
heap
page read and write
2718039C000
trusted library allocation
page read and write
1C659C7F000
trusted library allocation
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
7FFD9BB63000
trusted library allocation
page read and write
271804E0000
trusted library allocation
page read and write
5260000
trusted library allocation
page execute and read and write
1F90B822000
heap
page read and write
2A19000
trusted library allocation
page read and write
27180759000
trusted library allocation
page read and write
1AC0000
trusted library allocation
page execute and read and write
3B84000
trusted library allocation
page read and write
69A0000
trusted library allocation
page read and write
815E000
stack
page read and write
22FFB15C000
heap
page read and write
1C659D52000
trusted library allocation
page read and write
1C659EB1000
trusted library allocation
page read and write
1CD314D0000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
3914000
trusted library allocation
page read and write
1F926008000
heap
page read and write
3706000
trusted library allocation
page read and write
271804F3000
trusted library allocation
page read and write
22F806B8000
trusted library allocation
page read and write
2718035B000
trusted library allocation
page read and write
236AD6C3000
trusted library allocation
page read and write
7FFD9BD1C000
trusted library allocation
page read and write
2718035F000
trusted library allocation
page read and write
236C5E2F000
heap
page read and write
3B60000
trusted library allocation
page read and write
26D5000
trusted library allocation
page read and write
26BA000
trusted library allocation
page read and write
1C6597A1000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
27180262000
trusted library allocation
page read and write
7FFD9BC80000
trusted library allocation
page read and write
1F90D46B000
trusted library allocation
page read and write
2BED5FE000
stack
page read and write
1F926038000
heap
page read and write
75F2DFE000
stack
page read and write
2AEB000
trusted library allocation
page read and write
3703000
trusted library allocation
page read and write
1CD31568000
heap
page read and write
1C659CB4000
trusted library allocation
page read and write
2703000
trusted library allocation
page read and write
4D6E000
trusted library allocation
page read and write
38A0000
trusted library allocation
page read and write
38B9000
trusted library allocation
page read and write
22F803C1000
trusted library allocation
page read and write
C30000
heap
page read and write
22F806B4000
trusted library allocation
page read and write
2C20000
trusted library allocation
page read and write
64C8000
trusted library allocation
page read and write
7FFD9B9CB000
trusted library allocation
page execute and read and write
236C5A32000
heap
page read and write
236AB596000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9BBEE000
trusted library allocation
page read and write
1F925E67000
heap
page read and write
386A000
trusted library allocation
page read and write
1C659E35000
trusted library allocation
page read and write
F20000
heap
page read and write
22F801B5000
trusted library allocation
page read and write
27190110000
trusted library allocation
page read and write
1C659DA4000
trusted library allocation
page read and write
29EF000
trusted library allocation
page read and write
7FFD9BB94000
trusted library allocation
page read and write
7FD000
trusted library allocation
page execute and read and write
1C669EA1000
trusted library allocation
page read and write
3816000
trusted library allocation
page read and write
2B60000
heap
page read and write
2718033B000
trusted library allocation
page read and write
2A06000
trusted library allocation
page read and write
7FFD9BC90000
trusted library allocation
page read and write
2806000
trusted library allocation
page read and write
1F92619D000
heap
page read and write
5AF000
heap
page read and write
37DA000
trusted library allocation
page read and write
36C5000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page execute and read and write
27180468000
trusted library allocation
page read and write
2B00000
trusted library allocation
page read and write
B19CDFE000
stack
page read and write
1F90D674000
trusted library allocation
page read and write
1CD4B7F0000
heap
page execute and read and write
29CC000
trusted library allocation
page read and write
221C000
stack
page read and write
271801B3000
trusted library allocation
page read and write
1C672114000
heap
page execute and read and write
7FFD9BB57000
trusted library allocation
page read and write
3456000
trusted library allocation
page read and write
3811000
trusted library allocation
page read and write
806000
trusted library allocation
page execute and read and write
48E1000
trusted library allocation
page read and write
236AB4A0000
trusted library allocation
page read and write
1CD31587000
heap
page read and write
7FFD9BB6C000
trusted library allocation
page read and write
1C66A0D1000
trusted library allocation
page read and write
236C5AC2000
heap
page read and write
22F80759000
trusted library allocation
page read and write
4B05000
trusted library allocation
page read and write
297A000
trusted library allocation
page read and write
7FFD9BC58000
trusted library allocation
page read and write
22F80558000
trusted library allocation
page read and write
27180233000
trusted library allocation
page read and write
22F80592000
trusted library allocation
page read and write
504B000
heap
page read and write
22F80309000
trusted library allocation
page read and write
1C659C07000
trusted library allocation
page read and write
22F804DB000
trusted library allocation
page read and write
1C659C90000
trusted library allocation
page read and write
271F84E6000
heap
page read and write
22F801ED000
trusted library allocation
page read and write
2675000
trusted library allocation
page read and write
1C659C3A000
trusted library allocation
page read and write
1C659B6D000
trusted library allocation
page read and write
75F31FF000
stack
page read and write
22F802F8000
trusted library allocation
page read and write
27180667000
trusted library allocation
page read and write
1C659C05000
trusted library allocation
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
271803A8000
trusted library allocation
page read and write
3813000
trusted library allocation
page read and write
22F80618000
trusted library allocation
page read and write
1CD31535000
heap
page read and write
271805E4000
trusted library allocation
page read and write
53E000
stack
page read and write
271802BC000
trusted library allocation
page read and write
64B0000
trusted library allocation
page read and write
7FFD9BA5C000
trusted library allocation
page execute and read and write
2A8F000
trusted library allocation
page read and write
29A9000
trusted library allocation
page read and write
8A4000
heap
page read and write
22F902C0000
trusted library allocation
page read and write
22F801E9000
trusted library allocation
page read and write
3822000
trusted library allocation
page read and write
22F804CC000
trusted library allocation
page read and write
7FFD9BBFD000
trusted library allocation
page read and write
1C659E46000
trusted library allocation
page read and write
There are 2870 hidden memdumps, click here to show them.