IOC Report
LisectAVT_2403002A_29.exe

loading gif

Files

File Path
Type
Category
Malicious
LisectAVT_2403002A_29.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\LisectAVT_2403002A_29.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\svchost.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage user DataBase, version 0x620, checksum 0xae2b4804, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_dae5beae797db3ecbb8fa0e3475fee7a94437a_7c70d214_3cc1fd1a-b0cd-4737-9eb1-8abc11b81acf\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_dae5beae797db3ecbb8fa0e3475fee7a94437a_7c70d214_53517162-9d0a-4a4e-8846-387dccff8f9e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_dae5beae797db3ecbb8fa0e3475fee7a94437a_7c70d214_8052cdf5-e893-4404-94d0-50bb24e27abc\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_dae5beae797db3ecbb8fa0e3475fee7a94437a_7c70d214_dfc11d99-f50b-48ba-81f2-80667f6ca4c0\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB0D8.tmp.dmp
Mini DuMP crash report, 16 streams, Thu Jul 25 19:54:06 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB388.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB3E7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB3F5.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB482.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB646.tmp.dmp
Mini DuMP crash report, 16 streams, Thu Jul 25 19:54:08 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBAFA.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBB3A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBB4A.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBBE7.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD632.tmp.dmp
Mini DuMP crash report, 16 streams, Thu Jul 25 19:54:15 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD7F8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD828.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD859.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD906.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF524.tmp.dmp
Mini DuMP crash report, 16 streams, Thu Jul 25 19:54:23 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF748.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF797.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF7DA.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF980.tmp.txt
data
dropped
C:\Users\user\AppData\Local\Temp\tmp990A.tmp.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped
There are 24 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LisectAVT_2403002A_29.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_29.exe"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp990A.tmp.bat""
malicious
C:\Windows\System32\schtasks.exe
schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"'
malicious
C:\Users\user\AppData\Roaming\svchost.exe
C:\Users\user\AppData\Roaming\svchost.exe
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\timeout.exe
timeout 3
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -pss -s 464 -p 1808 -ip 1808
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1808 -s 1044
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -pss -s 428 -p 3260 -ip 3260
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 3260 -s 1212
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -pss -s 536 -p 7280 -ip 7280
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7280 -s 1192
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -pss -s 572 -p 7572 -ip 7572
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7572 -s 1204
There are 23 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
unknown
https://g.live.com/odclientsettings/ProdV21C:
unknown
http://crl.ver)
unknown
http://upx.sf.net
unknown
https://g.live.com/odclientsettings/Prod1C:
unknown
https://sectigo.com/CPS0
unknown
https://account.dyn.com/
unknown
http://ocsp.sectigo.com0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://cp8nl.hyperhost.ua
unknown

Domains

Name
IP
Malicious
cp8nl.hyperhost.ua
185.174.175.187
malicious
bg.microsoft.map.fastly.net
199.232.214.172
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
185.174.175.187
cp8nl.hyperhost.ua
Ukraine
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
svchost
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
ProgramId
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
FileId
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
LowerCaseLongPath
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
LongPathHash
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
Name
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
OriginalFileName
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
Publisher
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
Version
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
BinFileVersion
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
BinaryType
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
ProductName
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
ProductVersion
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
LinkDate
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
BinProductVersion
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
AppxPackageFullName
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
AppxPackageRelativeId
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
Size
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
Language
\REGISTRY\A\{a655aa2f-1234-7026-dae3-fcdf45329607}\Root\InventoryApplicationFile\svchost.exe|ad4dc622deff9043
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
There are 17 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
17052012000
trusted library allocation
page read and write
malicious
308E000
trusted library allocation
page read and write
malicious
2AC1000
trusted library allocation
page read and write
malicious
1F244011000
trusted library allocation
page read and write
malicious
2CDE000
trusted library allocation
page read and write
malicious
2B0E000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
21D90C2C000
trusted library allocation
page read and write
malicious
191004DC000
trusted library allocation
page read and write
malicious
2B39000
trusted library allocation
page read and write
malicious
1704247C000
trusted library allocation
page read and write
malicious
2A11000
trusted library allocation
page read and write
malicious
30B9000
trusted library allocation
page read and write
malicious
2D09000
trusted library allocation
page read and write
malicious
3041000
trusted library allocation
page read and write
malicious
1911138A000
trusted library allocation
page read and write
malicious
214422A8000
trusted library allocation
page read and write
malicious
21D9084F000
trusted library allocation
page read and write
malicious
2A8C000
trusted library allocation
page read and write
malicious
2CC7000
trusted library allocation
page read and write
malicious
2A61000
trusted library allocation
page read and write
malicious
21452241000
trusted library allocation
page read and write
malicious
21DA92E0000
heap
page read and write
7FFD347E0000
trusted library allocation
page read and write
51EB000
trusted library allocation
page read and write
1B9F3F02000
heap
page read and write
7FFD34760000
trusted library allocation
page read and write
DE4000
trusted library allocation
page read and write
B82AA7E000
unkown
page readonly
298F0E10000
heap
page read and write
55A3000
heap
page read and write
298F0EF2000
heap
page read and write
E15000
heap
page read and write
7FFD34730000
trusted library allocation
page read and write
275E000
stack
page read and write
7FFD34770000
trusted library allocation
page read and write
DF7000
heap
page read and write
7FFD34626000
trusted library allocation
page read and write
21D8EF50000
heap
page read and write
7FFD34750000
trusted library allocation
page read and write
509C000
stack
page read and write
4FAE000
trusted library allocation
page read and write
21D8ED42000
heap
page read and write
5570000
trusted library allocation
page read and write
560F000
stack
page read and write
5048000
trusted library allocation
page read and write
B82B97E000
unkown
page readonly
51F2000
trusted library allocation
page read and write
7FFD346F0000
trusted library allocation
page execute and read and write
5F50000
trusted library allocation
page read and write
21D908F3000
trusted library allocation
page read and write
11DE000
stack
page read and write
BD0000
heap
page read and write
7FFD346D0000
trusted library allocation
page execute and read and write
21D9086E000
trusted library allocation
page read and write
1F233FA3000
trusted library allocation
page read and write
214524C8000
trusted library allocation
page read and write
2145A92F000
trusted library section
page readonly
21D90A11000
trusted library allocation
page read and write
17041FA1000
trusted library allocation
page read and write
298EC440000
trusted library allocation
page read and write
7FFD34816000
trusted library allocation
page read and write
FBE000
stack
page read and write
2145AE02000
heap
page read and write
1F23222E000
heap
page read and write
B30000
heap
page read and write
7FFD346E4000
trusted library allocation
page read and write
17040570000
heap
page read and write
1F24CB7E000
heap
page read and write
553E000
trusted library allocation
page read and write
17041FA3000
trusted library allocation
page read and write
5EFE000
stack
page read and write
1F232520000
heap
page read and write
298F0E83000
heap
page read and write
298EB620000
heap
page read and write
19173D02000
heap
page read and write
1F234078000
trusted library allocation
page read and write
21D90933000
trusted library allocation
page read and write
19173A3B000
heap
page read and write
7FFD34770000
trusted library allocation
page read and write
170405D0000
heap
page execute and read and write
4E50000
heap
page read and write
7FFD34575000
trusted library allocation
page read and write
7FFD34800000
trusted library allocation
page read and write
2145B010000
heap
page read and write
2145AD78000
heap
page read and write
7FFD3457D000
trusted library allocation
page execute and read and write
7FFD347F0000
trusted library allocation
page read and write
11C0000
heap
page read and write
1F2322AD000
heap
page read and write
527E000
stack
page read and write
1A189D02000
heap
page read and write
21D90930000
trusted library allocation
page read and write
5F47000
trusted library allocation
page read and write
B82BD7E000
unkown
page readonly
13B0000
heap
page read and write
7FFD34534000
trusted library allocation
page read and write
7FFD345F0000
trusted library allocation
page execute and read and write
1705AC19000
heap
page read and write
6464000
heap
page read and write
7FFD346E9000
trusted library allocation
page read and write
B82CA7E000
unkown
page readonly
4FBA000
trusted library allocation
page read and write
298F0EE5000
heap
page read and write
2960000
trusted library allocation
page read and write
7FFD34730000
trusted library allocation
page read and write
656E000
stack
page read and write
5F3E000
stack
page read and write
5520000
trusted library allocation
page read and write
298EB800000
heap
page read and write
1396000
trusted library allocation
page execute and read and write
7FFD347C0000
trusted library allocation
page read and write
21D8ED0D000
heap
page read and write
21440813000
heap
page read and write
17040253000
heap
page read and write
7FFD3453B000
trusted library allocation
page read and write
1F23403E000
trusted library allocation
page read and write
30C9000
trusted library allocation
page read and write
1393000
trusted library allocation
page execute and read and write
5956000
trusted library allocation
page read and write
1BA15FF000
stack
page read and write
4FAB000
trusted library allocation
page read and write
7FFD34550000
trusted library allocation
page read and write
298EB892000
heap
page read and write
7FFD34620000
trusted library allocation
page execute and read and write
7022DFE000
stack
page read and write
1000000
heap
page read and write
214421B0000
heap
page read and write
7FFD34767000
trusted library allocation
page read and write
7FFD3456D000
trusted library allocation
page execute and read and write
1B9F3F13000
heap
page read and write
2B35000
trusted library allocation
page read and write
1705AC7C000
heap
page read and write
1705AB00000
heap
page read and write
2145AD80000
heap
page read and write
D2E000
stack
page read and write
C3A000
heap
page read and write
21D8ECE1000
heap
page read and write
19177113000
heap
page read and write
1360000
heap
page read and write
539F000
stack
page read and write
13E8000
heap
page read and write
19173A3F000
heap
page read and write
7FFD34711000
trusted library allocation
page read and write
1F243FA8000
trusted library allocation
page read and write
4FBE000
trusted library allocation
page read and write
7FFD347CF000
trusted library allocation
page read and write
5768000
trusted library allocation
page read and write
B82B37B000
stack
page read and write
6AB0000
trusted library allocation
page read and write
21D908B1000
trusted library allocation
page read and write
5776000
trusted library allocation
page read and write
51E6000
trusted library allocation
page read and write
7FFD347E1000
trusted library allocation
page read and write
298F0D80000
remote allocation
page read and write
653E000
stack
page read and write
56AD000
stack
page read and write
5C0F000
stack
page read and write
4E6D000
stack
page read and write
7FFD34714000
trusted library allocation
page read and write
7FFD3476C000
trusted library allocation
page read and write
185E3AE0000
heap
page read and write
19110072000
trusted library allocation
page read and write
7FFD347E0000
trusted library allocation
page read and write
1F233FA1000
trusted library allocation
page read and write
B90000
heap
page read and write
1C611168000
heap
page read and write
21DA8F50000
heap
page read and write
7FFD3458D000
trusted library allocation
page execute and read and write
6370000
trusted library allocation
page read and write
635E000
stack
page read and write
7FFD34690000
trusted library allocation
page execute and read and write
7FFD3478B000
trusted library allocation
page read and write
7FFD34786000
trusted library allocation
page read and write
7FFD346D2000
trusted library allocation
page read and write
1705B010000
heap
page read and write
7022993000
stack
page read and write
1F2322BE000
heap
page read and write
298F0BE1000
trusted library allocation
page read and write
631E000
stack
page read and write
537E000
stack
page read and write
1A189CC0000
heap
page read and write
7FFD3470A000
trusted library allocation
page read and write
7FFD3458A000
trusted library allocation
page read and write
7FFD34746000
trusted library allocation
page read and write
5030000
heap
page read and write
2CF7000
trusted library allocation
page read and write
1F233FB3000
trusted library allocation
page read and write
5020000
heap
page read and write
21D90981000
trusted library allocation
page read and write
214423A3000
trusted library allocation
page read and write
7FFD34570000
trusted library allocation
page read and write
7FFD34700000
trusted library allocation
page read and write
7FFD34690000
trusted library allocation
page execute and read and write
4DA8BFE000
unkown
page readonly
4AC8000
trusted library allocation
page read and write
FC0000
trusted library allocation
page read and write
21DA90D0000
heap
page read and write
214521D1000
trusted library allocation
page read and write
1B9F3F00000
heap
page read and write
1F24D010000
heap
page read and write
FD7000
trusted library allocation
page execute and read and write
4FB2000
trusted library allocation
page read and write
7FFD34724000
trusted library allocation
page read and write
298EB600000
heap
page read and write
298F0BE0000
trusted library allocation
page read and write
19175D20000
heap
page read and write
12C0000
heap
page read and write
1BA12FF000
stack
page read and write
298F0BE0000
trusted library allocation
page read and write
287E000
trusted library allocation
page read and write
5C86000
trusted library allocation
page read and write
17042173000
trusted library allocation
page read and write
17040702000
heap
page read and write
1F243FB1000
trusted library allocation
page read and write
1F23402C000
trusted library allocation
page read and write
21D8ED0B000
heap
page read and write
1B9F3A78000
heap
page read and write
5576000
trusted library allocation
page read and write
BA964FD000
stack
page read and write
515E000
stack
page read and write
7FFD34581000
trusted library allocation
page read and write
17040560000
trusted library allocation
page read and write
4F8C000
stack
page read and write
139D000
trusted library allocation
page execute and read and write
1F2321B0000
trusted library allocation
page read and write
5190000
heap
page execute and read and write
21D8EE95000
heap
page read and write
675E000
stack
page read and write
19175CC0000
trusted library allocation
page read and write
287B000
trusted library allocation
page read and write
7FFD346C2000
trusted library allocation
page execute and read and write
2145A8A0000
trusted library allocation
page read and write
4F93000
heap
page read and write
5F17000
heap
page read and write
191001D3000
trusted library allocation
page read and write
7FFD347AE000
trusted library allocation
page read and write
1B9F3A2B000
heap
page read and write
1005FF000
stack
page read and write
7FFD34780000
trusted library allocation
page read and write
55A0000
heap
page read and write
21440699000
heap
page read and write
873BEFF000
stack
page read and write
21DA90DE000
heap
page read and write
7FFD347C2000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page execute and read and write
7FFD34710000
trusted library allocation
page read and write
17040500000
heap
page read and write
298F0E2D000
heap
page read and write
298F0E20000
heap
page read and write
5E06000
trusted library allocation
page read and write
E40000
heap
page read and write
1F232654000
heap
page read and write
19175620000
trusted library allocation
page read and write
BC0000
heap
page read and write
C4E000
heap
page read and write
6280000
trusted library allocation
page read and write
DA4000
trusted library allocation
page read and write
7FFD34775000
trusted library allocation
page read and write
4FC6000
trusted library allocation
page read and write
5290000
heap
page execute and read and write
21DAA5D0000
trusted library section
page read and write
6220000
trusted library allocation
page read and write
B82C27E000
unkown
page readonly
170402A9000
heap
page read and write
2896000
trusted library allocation
page read and write
6040000
trusted library allocation
page execute and read and write
7FFD347AD000
trusted library allocation
page read and write
21DA90C0000
heap
page read and write
7FFD34740000
trusted library allocation
page read and write
B40000
heap
page read and write
68B0000
trusted library allocation
page execute and read and write
7FFD34620000
trusted library allocation
page read and write
7FFD3469F000
trusted library allocation
page execute and read and write
7FFD34594000
trusted library allocation
page read and write
7FFD34720000
trusted library allocation
page execute and read and write
B82B67E000
unkown
page readonly
D2398F3000
stack
page read and write
13FF000
heap
page read and write
19175CF0000
heap
page execute and read and write
21DAAAD2000
trusted library allocation
page read and write
1394000
trusted library allocation
page read and write
2D19000
trusted library allocation
page read and write
7FFD3459B000
trusted library allocation
page execute and read and write
4DA8DFE000
unkown
page readonly
298EBF02000
heap
page read and write
2144232E000
trusted library allocation
page read and write
FCA000
trusted library allocation
page execute and read and write
7FFD347A0000
trusted library allocation
page read and write
518E000
stack
page read and write
1B9F3A3A000
heap
page read and write
21D908E3000
trusted library allocation
page read and write
B82B47E000
unkown
page readonly
170402FF000
heap
page read and write
BA966FE000
stack
page read and write
298EB870000
heap
page read and write
574E000
stack
page read and write
6910000
heap
page read and write
191738B0000
heap
page read and write
7FFD34790000
trusted library allocation
page execute and read and write
5780000
heap
page execute and read and write
F86000
heap
page read and write
170402D9000
heap
page read and write
7FFD34659000
trusted library allocation
page execute and read and write
595C000
trusted library allocation
page read and write
4FA6000
trusted library allocation
page read and write
7FFD34530000
trusted library allocation
page read and write
7FFD34543000
trusted library allocation
page read and write
298EBF1A000
heap
page read and write
5C90000
trusted library allocation
page execute and read and write
7FFD3476B000
trusted library allocation
page read and write
1380000
trusted library allocation
page read and write
EAD000
heap
page read and write
13B2000
trusted library allocation
page read and write
BF9000
heap
page read and write
1390000
trusted library allocation
page read and write
21DA92C5000
heap
page read and write
2B29000
trusted library allocation
page read and write
19177235000
heap
page read and write
2145AD17000
heap
page read and write
7FFD3474A000
trusted library allocation
page read and write
21D909E2000
trusted library allocation
page read and write
13A7000
trusted library allocation
page execute and read and write
21D90967000
trusted library allocation
page read and write
19176010000
heap
page read and write
19173C13000
heap
page read and write
21D8ECE3000
heap
page read and write
7FFD34782000
trusted library allocation
page read and write
B82BA7D000
stack
page read and write
1457000
heap
page read and write
21DA8F70000
heap
page read and write
6400000
heap
page read and write
298EC101000
trusted library allocation
page read and write
1001FE000
stack
page read and write
E30000
heap
page read and write
1BA14FE000
stack
page read and write
7FFD347A0000
trusted library allocation
page read and write
6226000
trusted library allocation
page read and write
2145A920000
trusted library section
page readonly
7FFD3474A000
trusted library allocation
page read and write
7FFD34540000
trusted library allocation
page read and write
7FFD34699000
trusted library allocation
page execute and read and write
7FFD3453D000
trusted library allocation
page execute and read and write
21D8ECA0000
heap
page read and write
21D908D6000
trusted library allocation
page read and write
E03000
heap
page read and write
19110008000
trusted library allocation
page read and write
1C611080000
heap
page read and write
298EB913000
heap
page read and write
1F24BFD0000
trusted library allocation
page read and write
7FFD346BB000
trusted library allocation
page execute and read and write
7FFD34564000
trusted library allocation
page read and write
2B27000
trusted library allocation
page read and write
E55000
heap
page read and write
298EB8B2000
heap
page read and write
CB1000
heap
page read and write
21D90887000
trusted library allocation
page read and write
5706000
trusted library allocation
page read and write
298F0980000
trusted library allocation
page read and write
7FFD347F0000
trusted library allocation
page execute and read and write
21D90918000
trusted library allocation
page read and write
2145A8D0000
heap
page execute and read and write
2AEB000
trusted library allocation
page execute and read and write
1B9F3A39000
heap
page read and write
28C0000
trusted library allocation
page read and write
51DD000
stack
page read and write
555D000
trusted library allocation
page read and write
2A94000
trusted library allocation
page read and write
7FFD3466C000
trusted library allocation
page execute and read and write
DE3000
trusted library allocation
page execute and read and write
300F000
stack
page read and write
F79000
heap
page read and write
B82A38B000
stack
page read and write
21D8ED90000
heap
page read and write
1F2321F0000
trusted library allocation
page read and write
5720000
heap
page read and write
50DE000
stack
page read and write
1705AB02000
heap
page read and write
5212000
trusted library allocation
page read and write
21DA90C3000
heap
page read and write
21D909D1000
trusted library allocation
page read and write
5E60000
trusted library allocation
page execute and read and write
645E000
stack
page read and write
1A189D03000
heap
page read and write
2145AD1F000
heap
page read and write
7FFD34572000
trusted library allocation
page read and write
7FFD347D0000
trusted library allocation
page read and write
1F234112000
trusted library allocation
page read and write
298F0EAE000
heap
page read and write
FC6000
trusted library allocation
page execute and read and write
2145A200000
trusted library allocation
page read and write
54AC000
stack
page read and write
17040410000
heap
page read and write
214405E0000
trusted library allocation
page read and write
11F0000
trusted library allocation
page read and write
298F0EE7000
heap
page read and write
DA0000
trusted library allocation
page read and write
7FFD34803000
trusted library allocation
page read and write
B82B07E000
unkown
page readonly
21DAA3D0000
heap
page read and write
7FFD34790000
trusted library allocation
page read and write
21D8EC50000
heap
page read and write
298EBF00000
heap
page read and write
30B5000
trusted library allocation
page read and write
BA968FF000
stack
page read and write
4DA87FE000
unkown
page readonly
5920000
trusted library allocation
page read and write
BFC000
heap
page read and write
E60000
trusted library allocation
page execute and read and write
1910010E000
trusted library allocation
page read and write
17040654000
heap
page read and write
5556000
trusted library allocation
page read and write
7FFD34770000
trusted library allocation
page read and write
7FFD34767000
trusted library allocation
page read and write
7FFD346A6000
trusted library allocation
page execute and read and write
298EBDA0000
trusted library section
page read and write
298F0E61000
heap
page read and write
21D8EC80000
heap
page read and write
19175D00000
heap
page read and write
B82AB7E000
stack
page read and write
283C000
stack
page read and write
298F0EBA000
heap
page read and write
7022CFE000
stack
page read and write
17051FA1000
trusted library allocation
page read and write
7022EFE000
stack
page read and write
3C91000
trusted library allocation
page read and write
BEA000
heap
page read and write
2980000
trusted library allocation
page read and write
7FFD34740000
trusted library allocation
page read and write
1B9F3A89000
heap
page read and write
1F23403C000
trusted library allocation
page read and write
7FFD34550000
trusted library allocation
page read and write
1BA13FD000
stack
page read and write
13B0000
trusted library allocation
page read and write
1705AA02000
heap
page read and write
17040239000
heap
page read and write
F84000
heap
page read and write
DCA000
heap
page read and write
2900000
heap
page read and write
2876000
trusted library allocation
page read and write
1B9F3B15000
trusted library allocation
page read and write
5E00000
trusted library allocation
page read and write
1A189C40000
heap
page read and write
56F0000
heap
page read and write
214421C0000
heap
page execute and read and write
19100003000
trusted library allocation
page read and write
7FFD34730000
trusted library allocation
page execute and read and write
737FBFF000
unkown
page read and write
7FFD3469D000
trusted library allocation
page execute and read and write
7FFD3458D000
trusted library allocation
page execute and read and write
554A000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
308C000
trusted library allocation
page read and write
4DA807C000
stack
page read and write
564A000
heap
page read and write
E9F000
heap
page read and write
B82B6FE000
stack
page read and write
7FFD3470C000
trusted library allocation
page read and write
B82AC7E000
unkown
page readonly
B82AE7E000
unkown
page readonly
21D8EE70000
heap
page read and write
21D90871000
trusted library allocation
page read and write
6127000
trusted library allocation
page read and write
1F23223E000
heap
page read and write
2145AD7E000
heap
page read and write
298F0EF8000
heap
page read and write
21DA0758000
trusted library allocation
page read and write
21D8EC60000
heap
page read and write
1F232110000
heap
page read and write
7FFD347C3000
trusted library allocation
page read and write
7FFD34740000
trusted library allocation
page read and write
21DA9170000
heap
page read and write
1705AB35000
heap
page read and write
551D000
stack
page read and write
19177124000
heap
page read and write
7FFD34810000
trusted library allocation
page read and write
13A0000
trusted library allocation
page read and write
7F790000
trusted library allocation
page execute and read and write
B82B27E000
unkown
page readonly
6110000
heap
page read and write
1BA19FD000
stack
page read and write
298F0A00000
trusted library allocation
page read and write
298F0F0C000
heap
page read and write
21D90897000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
21D90879000
trusted library allocation
page read and write
7F520000
trusted library allocation
page execute and read and write
A2E40FE000
stack
page read and write
BA960FE000
stack
page read and write
298EB902000
heap
page read and write
7FFD3455E000
trusted library allocation
page execute and read and write
51E0000
trusted library allocation
page read and write
D23A0FE000
stack
page read and write
511D000
stack
page read and write
298F0D80000
remote allocation
page read and write
2ABE000
stack
page read and write
1A189F60000
heap
page read and write
19175CC3000
trusted library allocation
page read and write
B82BBFE000
stack
page read and write
7FFD346D4000
trusted library allocation
page read and write
7FFD3465D000
trusted library allocation
page execute and read and write
7FFD34584000
trusted library allocation
page read and write
2A9B000
trusted library allocation
page read and write
298EBE00000
heap
page read and write
1F2321F3000
trusted library allocation
page read and write
100BFD000
stack
page read and write
298F0B00000
trusted library allocation
page read and write
5E10000
trusted library allocation
page execute and read and write
1F243FA1000
trusted library allocation
page read and write
2145AD00000
heap
page read and write
1373000
trusted library allocation
page execute and read and write
5536000
trusted library allocation
page read and write
14A7000
heap
page read and write
7FFD34580000
trusted library allocation
page read and write
191739B0000
heap
page read and write
7FFD347B0000
trusted library allocation
page read and write
7FFD345BC000
trusted library allocation
page execute and read and write
7FFD346DA000
trusted library allocation
page execute and read and write
BA963FD000
stack
page read and write
7FFD34735000
trusted library allocation
page read and write
21DA0761000
trusted library allocation
page read and write
298EB875000
heap
page read and write
298F0C3E000
trusted library allocation
page read and write
21D9097E000
trusted library allocation
page read and write
7FFD346F0000
trusted library allocation
page execute and read and write
B82A977000
stack
page read and write
1F232213000
heap
page read and write
E17000
trusted library allocation
page execute and read and write
7FFD346DF000
trusted library allocation
page execute and read and write
7FFD34690000
trusted library allocation
page execute and read and write
66C0000
trusted library allocation
page execute and read and write
7FFD34554000
trusted library allocation
page read and write
2CE6000
trusted library allocation
page read and write
21440854000
heap
page read and write
7FFD3469A000
trusted library allocation
page execute and read and write
185E3822000
heap
page read and write
4FCD000
trusted library allocation
page read and write
CA3000
heap
page read and write
1705229A000
trusted library allocation
page read and write
55C0000
heap
page read and write
7FFD34531000
trusted library allocation
page read and write
191738D0000
heap
page read and write
19173A39000
heap
page read and write
1F2322F8000
heap
page read and write
2AE2000
trusted library allocation
page read and write
1F232130000
heap
page read and write
565E000
stack
page read and write
B82BF7E000
unkown
page readonly
1BA0EF3000
stack
page read and write
D239EFD000
stack
page read and write
21D8EED0000
trusted library allocation
page read and write
298F0CB0000
trusted library allocation
page read and write
19173C02000
heap
page read and write
2CF9000
trusted library allocation
page read and write
28B4000
trusted library allocation
page read and write
B82B77E000
unkown
page readonly
5226000
trusted library allocation
page read and write
7FFD34682000
trusted library allocation
page execute and read and write
7FFD346EE000
trusted library allocation
page read and write
7FFD346D1000
trusted library allocation
page read and write
2B50000
heap
page execute and read and write
5E5D000
stack
page read and write
B82C179000
stack
page read and write
21D9099E000
trusted library allocation
page read and write
21D908DE000
trusted library allocation
page read and write
2144063B000
heap
page read and write
56EC000
trusted library allocation
page read and write
19173A87000
heap
page read and write
191755E0000
heap
page execute and read and write
1180000
heap
page read and write
1B9F3950000
trusted library allocation
page read and write
2C80000
heap
page read and write
60DE000
stack
page read and write
13D0000
trusted library allocation
page read and write
7FFD34610000
trusted library allocation
page read and write
298EB88D000
heap
page read and write
2860000
trusted library allocation
page read and write
1B9F3E13000
heap
page read and write
15DE000
stack
page read and write
17040600000
heap
page read and write
1B9F3A78000
heap
page read and write
1F232240000
heap
page read and write
501C000
stack
page read and write
D239AFE000
stack
page read and write
21440902000
heap
page read and write
21D90923000
trusted library allocation
page read and write
19175D40000
trusted library section
page readonly
2A88000
trusted library allocation
page read and write
298EB8BA000
heap
page read and write
BA962FF000
stack
page read and write
5023000
heap
page read and write
685E000
stack
page read and write
13A0000
trusted library allocation
page read and write
685E000
stack
page read and write
7FFD3474C000
trusted library allocation
page read and write
51FE000
trusted library allocation
page read and write
7FFD34701000
trusted library allocation
page read and write
17040590000
heap
page read and write
1F2321D0000
heap
page execute and read and write
DB0000
trusted library allocation
page read and write
1B9F3F00000
heap
page read and write
13C0000
heap
page read and write
7FFD34650000
trusted library allocation
page execute and read and write
7FFD3477D000
trusted library allocation
page read and write
7FFD3458D000
trusted library allocation
page execute and read and write
1F232229000
heap
page read and write
70236FD000
stack
page read and write
528C000
stack
page read and write
21440702000
heap
page read and write
137D000
trusted library allocation
page execute and read and write
4DA86FE000
stack
page read and write
7FFD34616000
trusted library allocation
page read and write
21D908BF000
trusted library allocation
page read and write
6478000
heap
page read and write
298F0E4E000
heap
page read and write
7FFD34727000
trusted library allocation
page read and write
BB9000
stack
page read and write
19173C00000
heap
page read and write
6A6E000
stack
page read and write
298F0F04000
heap
page read and write
298F0CB0000
trusted library allocation
page read and write
7FFD3458C000
trusted library allocation
page execute and read and write
3A39000
trusted library allocation
page read and write
4B0E000
stack
page read and write
5C80000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
298F0E19000
heap
page read and write
550E000
stack
page read and write
70234FF000
stack
page read and write
1705AC00000
heap
page read and write
2891000
trusted library allocation
page read and write
7FFD34656000
trusted library allocation
page execute and read and write
1F23407A000
trusted library allocation
page read and write
17040285000
heap
page read and write
298F0ED4000
heap
page read and write
51F5000
trusted library allocation
page read and write
1704022C000
heap
page read and write
2D11000
trusted library allocation
page read and write
185E4002000
trusted library allocation
page read and write
7FFD347B2000
trusted library allocation
page read and write
7FFD34744000
trusted library allocation
page read and write
1B9F3E02000
heap
page read and write
12A0000
heap
page read and write
7FFD346E7000
trusted library allocation
page execute and read and write
191755A0000
trusted library allocation
page read and write
298EB85B000
heap
page read and write
1F234173000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
554E000
trusted library allocation
page read and write
1F2321C0000
heap
page read and write
1F24CC00000
heap
page read and write
100F000
heap
page read and write
7FFD345E6000
trusted library allocation
page read and write
298EB813000
heap
page read and write
5170000
heap
page execute and read and write
298EB877000
heap
page read and write
1008FE000
stack
page read and write
3020000
trusted library allocation
page read and write
3AE9000
trusted library allocation
page read and write
7FFD34784000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
5EFC000
stack
page read and write
1F24CB38000
heap
page read and write
298EBF1A000
heap
page read and write
1370000
trusted library allocation
page read and write
298F0E20000
heap
page read and write
298F09F0000
trusted library allocation
page read and write
FD5000
trusted library allocation
page execute and read and write
D239BFE000
stack
page read and write
4C5D000
stack
page read and write
5224000
trusted library allocation
page read and write
21DA92D0000
heap
page read and write
671E000
stack
page read and write
1F232190000
trusted library allocation
page read and write
21D90720000
heap
page execute and read and write
1F232247000
heap
page read and write
59CE000
stack
page read and write
28A2000
trusted library allocation
page read and write
1B9F3B24000
heap
page read and write
1200000
heap
page read and write
56B0000
trusted library allocation
page read and write
19173B02000
heap
page read and write
7FFD346E0000
trusted library allocation
page read and write
21D908AB000
trusted library allocation
page read and write
1009FE000
stack
page read and write
E06000
heap
page read and write
7FFD34820000
trusted library allocation
page read and write
7FFD3468B000
trusted library allocation
page execute and read and write
19173A21000
heap
page read and write
7FFD34573000
trusted library allocation
page execute and read and write
1206000
heap
page read and write
7FFD34580000
trusted library allocation
page read and write
6360000
trusted library allocation
page execute and read and write
2B49000
trusted library allocation
page read and write
E1B000
trusted library allocation
page execute and read and write
5230000
trusted library allocation
page read and write
1B9F3F02000
heap
page read and write
2B4E000
stack
page read and write
2144064F000
heap
page read and write
627D000
stack
page read and write
7FFD34583000
trusted library allocation
page read and write
7FFD3457B000
trusted library allocation
page read and write
19177102000
heap
page read and write
21D909C9000
trusted library allocation
page read and write
21440641000
heap
page read and write
30C1000
trusted library allocation
page read and write
2D05000
trusted library allocation
page read and write
737FAFB000
stack
page read and write
298F0E5B000
heap
page read and write
170405A0000
trusted library allocation
page read and write
21D90A0F000
trusted library allocation
page read and write
298EB82B000
heap
page read and write
B82C9FE000
stack
page read and write
1B9F3A00000
unkown
page read and write
21D8ECCF000
heap
page read and write
E15000
trusted library allocation
page execute and read and write
17040261000
heap
page read and write
21D90915000
trusted library allocation
page read and write
7FFD34554000
trusted library allocation
page read and write
5760000
trusted library allocation
page read and write
1A189D01000
heap
page read and write
1F2324F0000
heap
page execute and read and write
17051FB1000
trusted library allocation
page read and write
1A189C50000
heap
page read and write
7FFD3454D000
trusted library allocation
page execute and read and write
7FFD346C6000
trusted library allocation
page execute and read and write
21D909C4000
trusted library allocation
page read and write
214521E1000
trusted library allocation
page read and write
B82AD7C000
stack
page read and write
214426AC000
trusted library allocation
page read and write
4FA4000
trusted library allocation
page read and write
3010000
trusted library allocation
page execute and read and write
21D908C2000
trusted library allocation
page read and write
7FFD34761000
trusted library allocation
page read and write
6210000
heap
page read and write
51D0000
trusted library allocation
page read and write
7FFD347C6000
trusted library allocation
page read and write
B82B57E000
unkown
page readonly
2145A8E0000
heap
page read and write
21D8EF55000
heap
page read and write
298EB8FC000
heap
page read and write
5DE2000
trusted library allocation
page read and write
1C612BE0000
heap
page read and write
214406D2000
heap
page read and write
1BA10FE000
stack
page read and write
1A189D02000
heap
page read and write
295C000
stack
page read and write
298F0D40000
trusted library allocation
page read and write
1F232252000
heap
page read and write
1705A802000
heap
page read and write
7FFD347FF000
trusted library allocation
page read and write
100DFD000
stack
page read and write
21440800000
heap
page read and write
5562000
trusted library allocation
page read and write
2145A8A3000
trusted library allocation
page read and write
7FFD34534000
trusted library allocation
page read and write
2145AC02000
heap
page read and write
7FFD3475E000
trusted library allocation
page read and write
BA961FE000
stack
page read and write
B82BCFE000
stack
page read and write
611E000
stack
page read and write
2AE5000
trusted library allocation
page execute and read and write
6577000
trusted library allocation
page read and write
4D6C000
stack
page read and write
60FE000
stack
page read and write
5ACE000
stack
page read and write
291F000
stack
page read and write
21D909D4000
trusted library allocation
page read and write
1705AC02000
heap
page read and write
1705AC6E000
heap
page read and write
651E000
stack
page read and write
6680000
trusted library allocation
page read and write
13B6000
trusted library allocation
page execute and read and write
298EC5E0000
trusted library section
page readonly
B82BFFE000
stack
page read and write
BA969FA000
stack
page read and write
7FFD345E0000
trusted library allocation
page read and write
13BA000
trusted library allocation
page execute and read and write
7FFD34573000
trusted library allocation
page execute and read and write
138D000
trusted library allocation
page execute and read and write
7FFD34712000
trusted library allocation
page read and write
BA965FE000
stack
page read and write
4069000
trusted library allocation
page read and write
191755C0000
trusted library allocation
page read and write
28B6000
trusted library allocation
page read and write
7FFD345E6000
trusted library allocation
page read and write
21D908C5000
trusted library allocation
page read and write
D239CFE000
stack
page read and write
B82C37B000
stack
page read and write
3AC1000
trusted library allocation
page read and write
298EB700000
heap
page read and write
547E000
stack
page read and write
185E3802000
heap
page read and write
A69000
stack
page read and write
7FFD34760000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
5DF4000
trusted library allocation
page read and write
B82B4FE000
stack
page read and write
298F0D30000
trusted library allocation
page read and write
5545000
trusted library allocation
page read and write
1F233FE1000
trusted library allocation
page read and write
1BA16FF000
stack
page read and write
7FFD34757000
trusted library allocation
page read and write
7FFD347CC000
trusted library allocation
page read and write
1C612BE5000
heap
page read and write
214405A0000
heap
page read and write
DC0000
heap
page read and write
1019000
heap
page read and write
17040200000
heap
page read and write
298EC951000
trusted library allocation
page read and write
DFB000
heap
page read and write
1705A680000
trusted library section
page readonly
21D8ED4E000
heap
page read and write
FD9000
heap
page read and write
7FFD345CC000
trusted library allocation
page execute and read and write
288A000
trusted library allocation
page read and write
19110011000
trusted library allocation
page read and write
298EC5F0000
trusted library section
page readonly
1BA17FD000
stack
page read and write
2850000
trusted library allocation
page read and write
7FFD34710000
trusted library allocation
page read and write
7FFD3477D000
trusted library allocation
page read and write
70231FE000
stack
page read and write
D23A3FA000
stack
page read and write
2145AD24000
heap
page read and write
FDB000
trusted library allocation
page execute and read and write
2C9C000
trusted library allocation
page read and write
2882000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page read and write
55CC000
heap
page read and write
7FFD347B6000
trusted library allocation
page read and write
19173C54000
heap
page read and write
5C70000
trusted library allocation
page read and write
4DA8CFE000
stack
page read and write
6449000
heap
page read and write
51B0000
trusted library allocation
page execute and read and write
B45000
heap
page read and write
BA967FE000
stack
page read and write
6AF0000
trusted library allocation
page execute and read and write
21DA0A47000
trusted library allocation
page read and write
A2E3C7D000
stack
page read and write
4C98000
trusted library allocation
page read and write
1310000
heap
page read and write
2840000
heap
page execute and read and write
6167000
heap
page read and write
185E3F70000
trusted library allocation
page read and write
1705AC1D000
heap
page read and write
C89000
heap
page read and write
21DA07C0000
trusted library allocation
page read and write
170405E0000
heap
page read and write
7FFD34570000
trusted library allocation
page read and write
B82BC7E000
unkown
page readonly
70235FA000
stack
page read and write
2768000
trusted library allocation
page read and write
21D90730000
trusted library section
page readonly
7FFD34720000
trusted library allocation
page read and write
17040224000
heap
page read and write
17040213000
heap
page read and write
19173AE8000
heap
page read and write
298F0EE3000
heap
page read and write
7FFD347BD000
trusted library allocation
page read and write
6230000
trusted library allocation
page execute and read and write
2A5F000
trusted library allocation
page read and write
BE0000
heap
page read and write
28B0000
trusted library allocation
page read and write
14BC000
heap
page read and write
21D8ED13000
heap
page read and write
5534000
trusted library allocation
page read and write
655E000
stack
page read and write
7FFD347D0000
trusted library allocation
page execute and read and write
2C5E000
stack
page read and write
298F0F02000
heap
page read and write
3030000
heap
page read and write
1F24C802000
heap
page read and write
170405A3000
trusted library allocation
page read and write
21D8EEF0000
trusted library allocation
page read and write
1F24CB00000
heap
page read and write
7FFD347A0000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page execute and read and write
7FFD34730000
trusted library allocation
page read and write
7FFD34650000
trusted library allocation
page execute and read and write
7FFD3467B000
trusted library allocation
page execute and read and write
21440624000
heap
page read and write
298EBD90000
trusted library allocation
page read and write
A10000
heap
page read and write
170402CE000
heap
page read and write
5F40000
trusted library allocation
page read and write
1F24CB15000
heap
page read and write
AB9000
stack
page read and write
1705AC65000
heap
page read and write
3A11000
trusted library allocation
page read and write
4F90000
heap
page read and write
1F232302000
heap
page read and write
6ED0000
heap
page read and write
E12000
trusted library allocation
page read and write
2A0E000
stack
page read and write
100AFE000
stack
page read and write
1BA11FD000
stack
page read and write
21DA9309000
heap
page read and write
695F000
stack
page read and write
5740000
trusted library allocation
page read and write
7FFD34800000
trusted library allocation
page read and write
7FFD3455B000
trusted library allocation
page execute and read and write
E8F000
heap
page read and write
5580000
trusted library allocation
page read and write
21D909FD000
trusted library allocation
page read and write
7FFD3453D000
trusted library allocation
page execute and read and write
6426000
heap
page read and write
2870000
trusted library allocation
page read and write
F10000
heap
page read and write
5DFC000
stack
page read and write
DD0000
trusted library allocation
page read and write
185E3800000
heap
page read and write
103A000
stack
page read and write
7FFD34680000
trusted library allocation
page execute and read and write
E70000
heap
page read and write
D23A1FE000
stack
page read and write
53DE000
stack
page read and write
1F232540000
trusted library section
page readonly
21440674000
heap
page read and write
7FFD34616000
trusted library allocation
page execute and read and write
7FFD345EC000
trusted library allocation
page execute and read and write
185E3902000
heap
page read and write
214406AA000
heap
page read and write
1705AB13000
heap
page read and write
62DE000
stack
page read and write
2145AA02000
heap
page read and write
B69000
stack
page read and write
577C000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
7FFD34540000
trusted library allocation
page read and write
1704023B000
heap
page read and write
D23A5FE000
stack
page read and write
100CFA000
stack
page read and write
7FFD345F0000
trusted library allocation
page execute and read and write
C5E000
heap
page read and write
7FFD34788000
trusted library allocation
page read and write
7FFD347D0000
trusted library allocation
page read and write
D23A7FE000
stack
page read and write
1030000
heap
page read and write
DFD000
trusted library allocation
page execute and read and write
298EBF5A000
heap
page read and write
7FFD3457D000
trusted library allocation
page execute and read and write
1B9F3A13000
unkown
page read and write
D239DFB000
stack
page read and write
7FFD347F0000
trusted library allocation
page read and write
298F0C00000
trusted library allocation
page read and write
7FFD347C8000
trusted library allocation
page read and write
7FFD347D0000
trusted library allocation
page execute and read and write
2145AE13000
heap
page read and write
51FA000
trusted library allocation
page read and write
F40000
heap
page read and write
17051FA7000
trusted library allocation
page read and write
30A7000
trusted library allocation
page read and write
191755D0000
heap
page read and write
191102F9000
trusted library allocation
page read and write
21D8EE90000
heap
page read and write
E00000
trusted library allocation
page read and write
1F2340AF000
trusted library allocation
page read and write
298F0E41000
heap
page read and write
7FFD3476E000
trusted library allocation
page read and write
21DA8780000
trusted library allocation
page read and write
17040258000
heap
page read and write
63F5000
heap
page read and write
1007FC000
stack
page read and write
6B6E000
stack
page read and write
7FFD346AF000
trusted library allocation
page execute and read and write
7A9000
stack
page read and write
1F232602000
heap
page read and write
1B9F3F13000
heap
page read and write
298EC5D0000
trusted library section
page readonly
672D000
stack
page read and write
7FFD34727000
trusted library allocation
page read and write
1705A660000
heap
page read and write
5700000
trusted library allocation
page read and write
298EBE02000
heap
page read and write
298F0C20000
trusted library allocation
page read and write
298F2000000
heap
page read and write
B82B17C000
stack
page read and write
603D000
stack
page read and write
56B8000
trusted library allocation
page read and write
1F24CC02000
heap
page read and write
7FFD34750000
trusted library allocation
page read and write
3CFA000
trusted library allocation
page read and write
2144062C000
heap
page read and write
1705AC78000
heap
page read and write
E0A000
trusted library allocation
page execute and read and write
1F232200000
heap
page read and write
19175F02000
heap
page execute and read and write
7FFD34630000
trusted library allocation
page execute and read and write
FD2000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
1004FE000
stack
page read and write
56E0000
trusted library allocation
page read and write
19177179000
heap
page read and write
B82B5FE000
stack
page read and write
7FFD34646000
trusted library allocation
page execute and read and write
19173AAE000
heap
page read and write
1419000
heap
page read and write
D239FFE000
stack
page read and write
2EFC000
stack
page read and write
298F0F0E000
heap
page read and write
7FFD34770000
trusted library allocation
page read and write
21D8ED9B000
heap
page read and write
298EB928000
heap
page read and write
5551000
trusted library allocation
page read and write
12C5000
heap
page read and write
5574000
trusted library allocation
page read and write
7FFD34770000
trusted library allocation
page read and write
298F0E00000
heap
page read and write
21D908D3000
trusted library allocation
page read and write
7FFD347D4000
trusted library allocation
page read and write
298EC600000
trusted library section
page readonly
6580000
trusted library allocation
page read and write
5657000
heap
page read and write
7FFD347C1000
trusted library allocation
page read and write
7FFD34590000
trusted library allocation
page read and write
298EC5C0000
trusted library section
page readonly
17040302000
heap
page read and write
7FFD3480F000
trusted library allocation
page read and write
21DA8F30000
heap
page read and write
1BA18FA000
stack
page read and write
7FFD3461C000
trusted library allocation
page execute and read and write
21D90926000
trusted library allocation
page read and write
298EC980000
trusted library allocation
page read and write
520D000
trusted library allocation
page read and write
1F232500000
heap
page read and write
19173A2C000
heap
page read and write
7FFD34786000
trusted library allocation
page read and write
70232FF000
stack
page read and write
6AA000
stack
page read and write
BF0000
heap
page read and write
298F0D30000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
7FFD34579000
trusted library allocation
page read and write
1A189CF1000
heap
page read and write
7FFD34796000
trusted library allocation
page read and write
2A69000
trusted library allocation
page read and write
1392000
trusted library allocation
page read and write
7FFD347E0000
trusted library allocation
page read and write
21D90751000
trusted library allocation
page read and write
7022FFD000
stack
page read and write
1C611160000
heap
page read and write
7FFD34533000
trusted library allocation
page execute and read and write
2145A890000
heap
page read and write
1A189CF2000
heap
page read and write
13AD000
trusted library allocation
page execute and read and write
298EBE15000
heap
page read and write
7FC40000
trusted library allocation
page execute and read and write
B82BB7E000
unkown
page readonly
7FFD347C0000
trusted library allocation
page execute and read and write
7FFD34763000
trusted library allocation
page read and write
DAD000
trusted library allocation
page execute and read and write
6890000
heap
page read and write
1B9F3920000
heap
page read and write
7FFD34710000
trusted library allocation
page read and write
298F0D10000
trusted library allocation
page read and write
1F232140000
heap
page read and write
51EE000
trusted library allocation
page read and write
19173AE3000
heap
page read and write
7FFD3480C000
trusted library allocation
page read and write
21DA8ADF000
heap
page read and write
1F23447C000
trusted library allocation
page read and write
2145AD02000
heap
page read and write
2A7A000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
7FFD3459D000
trusted library allocation
page execute and read and write
19177173000
heap
page read and write
298EB840000
heap
page read and write
214404B0000
heap
page read and write
63F0000
heap
page read and write
7FFD34814000
trusted library allocation
page read and write
D23A2FD000
stack
page read and write
7FFD347B0000
trusted library allocation
page read and write
2990000
heap
page execute and read and write
7FFD347B0000
trusted library allocation
page read and write
1F233FDA000
trusted library allocation
page read and write
6860000
trusted library allocation
page read and write
7FFD3473A000
trusted library allocation
page read and write
1416000
heap
page read and write
7FFD346AC000
trusted library allocation
page execute and read and write
7FFD34782000
trusted library allocation
page read and write
5708000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
2CDC000
trusted library allocation
page read and write
55CA000
heap
page read and write
4FC1000
trusted library allocation
page read and write
DED000
trusted library allocation
page execute and read and write
19173A4F000
heap
page read and write
53A0000
heap
page read and write
529C000
stack
page read and write
13C6000
heap
page read and write
185E3813000
heap
page read and write
21D8EBB2000
unkown
page readonly
B82C47E000
unkown
page readonly
19177100000
heap
page read and write
5C74000
trusted library allocation
page read and write
7FFD34750000
trusted library allocation
page read and write
B82B8FE000
stack
page read and write
D6E000
stack
page read and write
7FFD34560000
trusted library allocation
page read and write
5201000
trusted library allocation
page read and write
214421A0000
trusted library allocation
page read and write
298EB879000
heap
page read and write
7FFD34563000
trusted library allocation
page execute and read and write
298F0D20000
trusted library allocation
page read and write
1374000
trusted library allocation
page read and write
7FFD34721000
trusted library allocation
page read and write
13A2000
trusted library allocation
page read and write
5206000
trusted library allocation
page read and write
21440490000
heap
page read and write
21440802000
heap
page read and write
7FFD347D1000
trusted library allocation
page read and write
E02000
trusted library allocation
page read and write
101D000
heap
page read and write
7FFD3462C000
trusted library allocation
page execute and read and write
1350000
trusted library allocation
page read and write
FF780000
trusted library allocation
page execute and read and write
7FFD34730000
trusted library allocation
page execute and read and write
14D4000
heap
page read and write
7FFD346CB000
trusted library allocation
page execute and read and write
298EBF13000
heap
page read and write
19173A13000
heap
page read and write
A2E3E7E000
stack
page read and write
7FFD3457D000
trusted library allocation
page execute and read and write
7FFD347BD000
trusted library allocation
page read and write
1B9F3B00000
trusted library allocation
page read and write
574E000
stack
page read and write
288E000
trusted library allocation
page read and write
19177002000
heap
page read and write
E9C000
heap
page read and write
3CB9000
trusted library allocation
page read and write
1F2321E0000
heap
page read and write
17040580000
heap
page execute and read and write
7FFD3479E000
trusted library allocation
page read and write
139A000
trusted library allocation
page execute and read and write
21D909AD000
trusted library allocation
page read and write
D23A6FE000
stack
page read and write
19110001000
trusted library allocation
page read and write
21440613000
heap
page read and write
1B9F3940000
heap
page read and write
7FFD3472E000
trusted library allocation
page read and write
21D8EBB0000
unkown
page readonly
1A189CCA000
heap
page read and write
1F2322B5000
heap
page read and write
7FFD345E0000
trusted library allocation
page read and write
1BA0FFF000
stack
page read and write
7FFD347C6000
trusted library allocation
page read and write
7FFD34594000
trusted library allocation
page read and write
1F24CC35000
heap
page read and write
1B9F3E00000
heap
page read and write
130E000
stack
page read and write
21D90891000
trusted library allocation
page read and write
E10000
heap
page read and write
6120000
trusted library allocation
page read and write
140B000
heap
page read and write
170404F0000
heap
page read and write
66B0000
heap
page read and write
19177202000
heap
page read and write
E06000
trusted library allocation
page execute and read and write
1F232226000
heap
page read and write
21D90A13000
trusted library allocation
page read and write
1B9F3B02000
trusted library allocation
page read and write
13A5000
trusted library allocation
page execute and read and write
21D909D7000
trusted library allocation
page read and write
1917710B000
heap
page read and write
19173A44000
heap
page read and write
B82BE7E000
stack
page read and write
588C000
stack
page read and write
7FFD3458B000
trusted library allocation
page execute and read and write
BDE000
heap
page read and write
214521D7000
trusted library allocation
page read and write
2AE7000
trusted library allocation
page execute and read and write
21442291000
trusted library allocation
page read and write
7FFD34543000
trusted library allocation
page read and write
FC2000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page read and write
7FF46C1A0000
trusted library allocation
page execute and read and write
5DF0000
trusted library allocation
page read and write
17040602000
heap
page read and write
1A189C70000
heap
page read and write
6377000
trusted library allocation
page read and write
7FFD34760000
trusted library allocation
page read and write
873BE7F000
stack
page read and write
298F0E55000
heap
page read and write
2C60000
heap
page read and write
7FFD34656000
trusted library allocation
page execute and read and write
652E000
stack
page read and write
19173AF0000
heap
page read and write
7FFD347B0000
trusted library allocation
page read and write
21D90955000
trusted library allocation
page read and write
298F0C10000
trusted library allocation
page read and write
1F2322B7000
heap
page read and write
185E382B000
heap
page read and write
7FFD34723000
trusted library allocation
page read and write
1F234061000
trusted library allocation
page read and write
D2399FE000
stack
page read and write
588E000
stack
page read and write
6AE0000
heap
page read and write
298F0D80000
remote allocation
page read and write
4FA0000
trusted library allocation
page read and write
661E000
stack
page read and write
298F0F00000
heap
page read and write
1F23224B000
heap
page read and write
5700000
trusted library allocation
page read and write
7FFD34810000
trusted library allocation
page read and write
7FFD345EC000
trusted library allocation
page execute and read and write
7FFD34756000
trusted library allocation
page read and write
13E0000
heap
page read and write
51C0000
trusted library allocation
page read and write
7FFD3472C000
trusted library allocation
page read and write
2CBC000
trusted library allocation
page read and write
7FFD34729000
trusted library allocation
page read and write
6130000
trusted library allocation
page read and write
6CE0000
heap
page read and write
11E0000
trusted library allocation
page execute and read and write
29B0000
heap
page read and write
5710000
trusted library allocation
page execute and read and write
7FFD347C2000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
7FFD345CC000
trusted library allocation
page execute and read and write
21D8ED44000
heap
page read and write
17040613000
heap
page read and write
5772000
trusted library allocation
page read and write
1A189CF1000
heap
page read and write
2EBE000
stack
page read and write
1F23228B000
heap
page read and write
7FFD34573000
trusted library allocation
page read and write
70233FE000
stack
page read and write
298F0EC0000
heap
page read and write
7FFD3473D000
trusted library allocation
page read and write
21440639000
heap
page read and write
5CDD000
stack
page read and write
6284000
trusted library allocation
page read and write
2C91000
trusted library allocation
page read and write
7FFD3477D000
trusted library allocation
page read and write
BA95DE4000
stack
page read and write
5DE6000
trusted library allocation
page read and write
BA96AFD000
stack
page read and write
2145AD13000
heap
page read and write
1705A902000
heap
page execute and read and write
56EC000
stack
page read and write
DBD000
trusted library allocation
page execute and read and write
298F0990000
trusted library allocation
page read and write
21440590000
heap
page read and write
289D000
trusted library allocation
page read and write
2F00000
heap
page execute and read and write
21D9094A000
trusted library allocation
page read and write
40A9000
trusted library allocation
page read and write
1F232279000
heap
page read and write
7FFD34574000
trusted library allocation
page read and write
F4B000
heap
page read and write
4041000
trusted library allocation
page read and write
7FFD34686000
trusted library allocation
page execute and read and write
DA3000
trusted library allocation
page execute and read and write
737FCFE000
stack
page read and write
6570000
trusted library allocation
page read and write
7FFD3455B000
trusted library allocation
page execute and read and write
A2E41F9000
stack
page read and write
1A189F65000
heap
page read and write
7FFD34790000
trusted library allocation
page execute and read and write
1000F3000
stack
page read and write
298EB88B000
heap
page read and write
1139000
stack
page read and write
598E000
stack
page read and write
2B0C000
trusted library allocation
page read and write
52A0000
heap
page read and write
17059FD0000
trusted library allocation
page read and write
214421D1000
trusted library allocation
page read and write
19177169000
heap
page read and write
21D909B8000
trusted library allocation
page read and write
55B0000
heap
page read and write
2145AE00000
heap
page read and write
298F0CC0000
trusted library allocation
page read and write
D23A4FD000
stack
page read and write
4DA84FE000
unkown
page readonly
21D908E5000
trusted library allocation
page read and write
19175E02000
heap
page read and write
5952000
trusted library allocation
page read and write
B82C07E000
unkown
page readonly
21D90740000
heap
page execute and read and write
561E000
stack
page read and write
7FFD3455D000
trusted library allocation
page execute and read and write
7FFD347CA000
trusted library allocation
page read and write
1F24CBA2000
heap
page read and write
1C6110C0000
heap
page read and write
5542000
trusted library allocation
page read and write
19100001000
trusted library allocation
page read and write
7FFD347CF000
trusted library allocation
page read and write
873BB9C000
stack
page read and write
4DA88FE000
stack
page read and write
1006FD000
stack
page read and write
298F0C10000
trusted library allocation
page read and write
5928000
trusted library allocation
page read and write
170401F0000
heap
page read and write
19173A75000
heap
page read and write
1F24CC13000
heap
page read and write
146D000
heap
page read and write
7FFD34626000
trusted library allocation
page read and write
B82AF7E000
stack
page read and write
2145AE35000
heap
page read and write
7FFD34780000
trusted library allocation
page read and write
7FFD3458C000
trusted library allocation
page execute and read and write
19173A00000
heap
page read and write
1F24CA02000
heap
page read and write
3B2A000
trusted library allocation
page read and write
19177213000
heap
page read and write
19175CB0000
heap
page read and write
21DA0751000
trusted library allocation
page read and write
564E000
stack
page read and write
21D908FC000
trusted library allocation
page read and write
7FFD34720000
trusted library allocation
page read and write
2B41000
trusted library allocation
page read and write
7FFD3454D000
trusted library allocation
page execute and read and write
19177106000
heap
page read and write
7FFD346E0000
trusted library allocation
page read and write
191739C0000
heap
page read and write
1F24C902000
heap
page execute and read and write
3A7A000
trusted library allocation
page read and write
68A0000
heap
page read and write
7FFD3480F000
trusted library allocation
page read and write
1F24CB91000
heap
page read and write
5770000
trusted library allocation
page read and write
7FFD34721000
trusted library allocation
page read and write
1F232150000
heap
page read and write
1F232702000
heap
page read and write
2145A900000
heap
page read and write
1F232613000
heap
page read and write
53A3000
heap
page read and write
7FFD34583000
trusted library allocation
page read and write
1A189F70000
heap
page read and write
298EC5B0000
trusted library section
page readonly
7FFD34750000
trusted library allocation
page read and write
185E3844000
heap
page read and write
1F244298000
trusted library allocation
page read and write
7FFD3466F000
trusted library allocation
page execute and read and write
7FFD34616000
trusted library allocation
page execute and read and write
4FD2000
trusted library allocation
page read and write
19177200000
heap
page read and write
2B16000
trusted library allocation
page read and write
70230FC000
stack
page read and write
54DE000
stack
page read and write
17040540000
trusted library allocation
page read and write
1F24CB44000
heap
page read and write
1917717B000
heap
page read and write
298EB89D000
heap
page read and write
21D9098C000
trusted library allocation
page read and write
7FFD34533000
trusted library allocation
page execute and read and write
30A9000
trusted library allocation
page read and write
6B00000
heap
page read and write
E30000
trusted library allocation
page read and write
1704024F000
heap
page read and write
21440600000
heap
page read and write
21D90913000
trusted library allocation
page read and write
D23A8FB000
stack
page read and write
2145AB02000
heap
page execute and read and write
2B00000
trusted library allocation
page read and write
4DA89FE000
unkown
page readonly
553B000
trusted library allocation
page read and write
4DA83FD000
stack
page read and write
5950000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
13AB000
trusted library allocation
page execute and read and write
7FFD34590000
trusted library allocation
page read and write
643E000
stack
page read and write
1A189CF1000
heap
page read and write
21D9087C000
trusted library allocation
page read and write
5F0D000
heap
page read and write
7FFD347E0000
trusted library allocation
page read and write
55E0000
heap
page read and write
7FFD347F0000
trusted library allocation
page read and write
578E000
stack
page read and write
5B0E000
stack
page read and write
7FFD34820000
trusted library allocation
page read and write
298F0C24000
trusted library allocation
page read and write
214406DD000
heap
page read and write
1C610FA0000
heap
page read and write
A2E3FFE000
stack
page read and write
4DA8AFC000
stack
page read and write
5DEC000
trusted library allocation
page read and write
5F00000
heap
page read and write
1B9F3A89000
heap
page read and write
7FFD34750000
trusted library allocation
page read and write
2970000
trusted library allocation
page read and write
21DA92C0000
heap
page read and write
185E37E0000
heap
page read and write
CA8000
heap
page read and write
185E3A00000
heap
page read and write
21D8EF30000
heap
page read and write
1F232600000
heap
page read and write
214422E1000
trusted library allocation
page read and write
1380000
trusted library allocation
page read and write
There are 1382 hidden memdumps, click here to show them.