IOC Report
4ra1Fo2Zql.exe

loading gif

Files

File Path
Type
Category
Malicious
4ra1Fo2Zql.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Google\GrVEPTmsoNTbY.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Google\GrVEPTmsoNTbY.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\MSECache\OfficeKMS\csrss.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\MSECache\OfficeKMS\csrss.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Windows Media Player\GrVEPTmsoNTbY.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Portable Devices\GrVEPTmsoNTbY.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\4ra1Fo2Zql.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\IZdub348jc.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\U9jP4iZUUm.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\q4lxag2s\q4lxag2s.cmdline
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
malicious
C:\Users\user\Desktop\CAgBdTQY.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\MjzRNvWG.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\VLoPWCmN.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\VTXhBlNT.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\cPGganVc.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\fuHfGerv.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\gwaXxxDZ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\myawJPbK.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\sTRlxExW.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\xxMkqOtN.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\RuntimeBroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\RuntimeBroker.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Windows\System32\SecurityHealthSystray.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Google\b4601131bf8590
ASCII text, with very long lines (742), with no line terminators
dropped
C:\Program Files (x86)\MSECache\OfficeKMS\886983d96e3d3e
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\Microsoft\Edge\Application\CSCFABAA3A3EFF44E7388BEDB3353C25726.TMP
MSVC .res
dropped
C:\Program Files (x86)\Windows Media Player\GrVEPTmsoNTbY.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Media Player\b4601131bf8590
ASCII text, with no line terminators
dropped
C:\Program Files\Windows Portable Devices\GrVEPTmsoNTbY.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Portable Devices\b4601131bf8590
ASCII text, with very long lines (390), with no line terminators
dropped
C:\Users\user\9e8d7a4ca61bd9
ASCII text, with very long lines (943), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\GrVEPTmsoNTbY.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\RuntimeBroker.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\csrss.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\00tp5zly\00tp5zly.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\Temp\00tp5zly\00tp5zly.cmdline
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\00tp5zly\00tp5zly.out
Unicode text, UTF-8 (with BOM) text, with very long lines (331), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\QqKaK8MzOz
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\RES2144.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x6d0, 10 symbols, created Thu Aug 29 22:39:12 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\RES22AB.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x6ec, 10 symbols, created Thu Aug 29 22:39:12 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\dfacWBhiVN
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\q4lxag2s\q4lxag2s.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\Temp\q4lxag2s\q4lxag2s.out
Unicode text, UTF-8 (with BOM) text, with very long lines (346), with CRLF, CR line terminators
modified
C:\Users\user\Desktop\cfd09d23ba9398
ASCII text, with no line terminators
dropped
C:\Windows\System32\CSC1FF918B0E6FF4E65A25AACD427A2AFF8.TMP
MSVC .res
dropped
\Device\Null
ASCII text
dropped
There are 38 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\4ra1Fo2Zql.exe
"C:\Users\user\Desktop\4ra1Fo2Zql.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "GrVEPTmsoNTbYG" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\google\GrVEPTmsoNTbY.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "GrVEPTmsoNTbY" /sc ONLOGON /tr "'C:\Program Files (x86)\google\GrVEPTmsoNTbY.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "GrVEPTmsoNTbYG" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\google\GrVEPTmsoNTbY.exe'" /rl HIGHEST /f
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\q4lxag2s\q4lxag2s.cmdline"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\00tp5zly\00tp5zly.cmdline"
malicious
C:\Program Files (x86)\Google\GrVEPTmsoNTbY.exe
"C:\Program Files (x86)\google\GrVEPTmsoNTbY.exe"
malicious
C:\Program Files (x86)\Google\GrVEPTmsoNTbY.exe
"C:\Program Files (x86)\google\GrVEPTmsoNTbY.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\msecache\OfficeKMS\csrss.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\msecache\OfficeKMS\csrss.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\msecache\OfficeKMS\csrss.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "GrVEPTmsoNTbYG" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\windows media player\GrVEPTmsoNTbY.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "GrVEPTmsoNTbY" /sc ONLOGON /tr "'C:\Program Files (x86)\windows media player\GrVEPTmsoNTbY.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "GrVEPTmsoNTbYG" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\windows media player\GrVEPTmsoNTbY.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Users\user\RuntimeBroker.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\user\RuntimeBroker.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Users\user\RuntimeBroker.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "GrVEPTmsoNTbYG" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Portable Devices\GrVEPTmsoNTbY.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "GrVEPTmsoNTbY" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\GrVEPTmsoNTbY.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "GrVEPTmsoNTbYG" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Portable Devices\GrVEPTmsoNTbY.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "4ra1Fo2Zql4" /sc MINUTE /mo 6 /tr "'C:\Users\user\Desktop\4ra1Fo2Zql.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "4ra1Fo2Zql" /sc ONLOGON /tr "'C:\Users\user\Desktop\4ra1Fo2Zql.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "4ra1Fo2Zql4" /sc MINUTE /mo 13 /tr "'C:\Users\user\Desktop\4ra1Fo2Zql.exe'" /rl HIGHEST /f
malicious
C:\Users\user\Desktop\4ra1Fo2Zql.exe
C:\Users\user\Desktop\4ra1Fo2Zql.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\IZdub348jc.bat"
malicious
C:\Users\user\Desktop\4ra1Fo2Zql.exe
C:\Users\user\Desktop\4ra1Fo2Zql.exe
malicious
C:\Program Files (x86)\MSECache\OfficeKMS\csrss.exe
"C:\Program Files (x86)\msecache\OfficeKMS\csrss.exe"
malicious
C:\Program Files (x86)\MSECache\OfficeKMS\csrss.exe
"C:\Program Files (x86)\msecache\OfficeKMS\csrss.exe"
malicious
C:\Users\user\RuntimeBroker.exe
C:\Users\user\RuntimeBroker.exe
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Users\user\RuntimeBroker.exe
C:\Users\user\RuntimeBroker.exe
malicious
C:\Program Files\Windows Portable Devices\GrVEPTmsoNTbY.exe
"C:\Program Files\Windows Portable Devices\GrVEPTmsoNTbY.exe"
malicious
C:\Program Files (x86)\MSECache\OfficeKMS\csrss.exe
"C:\Program Files (x86)\msecache\OfficeKMS\csrss.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\U9jP4iZUUm.bat"
malicious
C:\Program Files (x86)\MSECache\OfficeKMS\csrss.exe
"C:\Program Files (x86)\msecache\OfficeKMS\csrss.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES2144.tmp" "c:\Program Files (x86)\Microsoft\Edge\Application\CSCFABAA3A3EFF44E7388BEDB3353C25726.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES22AB.tmp" "c:\Windows\System32\CSC1FF918B0E6FF4E65A25AACD427A2AFF8.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
There are 34 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://621287cm.n9shteam2.top/
unknown
malicious
http://621287cm.n9shteam2.top/UpdatelinuxWindowsUniversal.php
80.211.144.156
malicious
http://621287cm.n9shteam2.top
unknown
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
621287cm.n9shteam2.top
80.211.144.156
malicious

IPs

IP
Domain
Country
Malicious
80.211.144.156
621287cm.n9shteam2.top
Italy
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
GrVEPTmsoNTbY
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
csrss
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RuntimeBroker
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
4ra1Fo2Zql
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
GrVEPTmsoNTbY
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
GrVEPTmsoNTbY
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\f4637f49c96b8435fcc300bd6ef3dba616e748a9
0e64880caba3a31ccf6e220ccf7196ae295c38e1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
GrVEPTmsoNTbY
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
csrss
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RuntimeBroker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
4ra1Fo2Zql
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
GrVEPTmsoNTbY
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
GrVEPTmsoNTbY
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASMANCS
FileDirectory
There are 26 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
32000
unkown
page readonly
malicious
126E7000
trusted library allocation
page read and write
malicious
6EC000
heap
page read and write
132C4000
trusted library allocation
page read and write
7FF848D9C000
trusted library allocation
page execute and read and write
2A86A15D000
heap
page read and write
2A86BC40000
direct allocation
page read and write
1BDFE000
stack
page read and write
2EF2000
trusted library allocation
page read and write
7FF848D3D000
trusted library allocation
page execute and read and write
A74000
heap
page read and write
7A0000
heap
page read and write
1B08F000
stack
page read and write
9D0000
trusted library allocation
page read and write
5C784FC000
stack
page read and write
28AB000
trusted library allocation
page read and write
3146000
trusted library allocation
page read and write
7FF848D73000
trusted library allocation
page execute and read and write
2A86BC00000
direct allocation
page read and write
3050000
trusted library allocation
page read and write
1BBEF000
stack
page read and write
639000
heap
page read and write
2A86A16C000
heap
page read and write
1240000
trusted library allocation
page read and write
7FF848D8C000
trusted library allocation
page read and write
2814000
trusted library allocation
page read and write
7FF848F44000
trusted library allocation
page read and write
175DBE67000
heap
page read and write
7FF848F93000
trusted library allocation
page read and write
2EDF000
trusted library allocation
page read and write
2A86A353000
direct allocation
page read and write
DE0000
heap
page read and write
1855000
heap
page read and write
349C000
trusted library allocation
page read and write
7FF848F5D000
trusted library allocation
page read and write
2E6A000
heap
page read and write
7FF848F23000
trusted library allocation
page read and write
1B28E000
stack
page read and write
1B616000
heap
page read and write
25C6000
trusted library allocation
page read and write
2B3F000
trusted library allocation
page read and write
3DE73CC000
stack
page read and write
19E80C90000
heap
page read and write
2AF7000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
7FF848D4D000
trusted library allocation
page execute and read and write
2A86A390000
heap
page read and write
30CB000
trusted library allocation
page read and write
2A86A12F000
heap
page read and write
2805000
trusted library allocation
page read and write
1B608000
heap
page read and write
1633000
heap
page read and write
121F000
heap
page read and write
1BD8E000
stack
page read and write
E680AFE000
stack
page read and write
18D5000
heap
page read and write
1B6A3000
heap
page read and write
3630000
trusted library allocation
page read and write
7FF848D6B000
trusted library allocation
page execute and read and write
31EB000
trusted library allocation
page read and write
2A86BC83000
direct allocation
page read and write
7FF849250000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
DC0000
heap
page read and write
3041000
trusted library allocation
page read and write
7FF848D4C000
trusted library allocation
page read and write
2A86A2B0000
heap
page read and write
124A000
heap
page read and write
7FF848F53000
trusted library allocation
page read and write
3133000
trusted library allocation
page read and write
7FF848F64000
trusted library allocation
page read and write
1530000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page execute and read and write
7FF848F30000
trusted library allocation
page read and write
DA0000
heap
page read and write
3030000
heap
page execute and read and write
23A2000
unkown
page readonly
7FF848F80000
trusted library allocation
page execute and read and write
23076961000
heap
page read and write
1328000
heap
page read and write
7FF848F1C000
trusted library allocation
page read and write
730000
heap
page read and write
7FF848EEA000
trusted library allocation
page read and write
2F8F000
trusted library allocation
page read and write
9FF000
stack
page read and write
7FF849200000
trusted library allocation
page read and write
33B5000
trusted library allocation
page read and write
CE3000
stack
page read and write
1B1AD000
heap
page read and write
34E1000
trusted library allocation
page read and write
2A86A11A000
heap
page read and write
23076972000
heap
page read and write
1290000
heap
page read and write
7FF849332000
trusted library allocation
page read and write
175DBE20000
heap
page read and write
2A86A11A000
heap
page read and write
2ACB000
trusted library allocation
page read and write
26A7000
trusted library allocation
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
D10000
trusted library allocation
page read and write
6DC000
heap
page read and write
7FF848D7C000
trusted library allocation
page read and write
1B792000
heap
page read and write
2A86A150000
heap
page read and write
1B708000
heap
page read and write
15C7000
heap
page read and write
980000
heap
page read and write
2AD18A25000
heap
page read and write
7FF848F57000
trusted library allocation
page read and write
E39000
heap
page read and write
2AD6000
trusted library allocation
page read and write
31B4000
trusted library allocation
page read and write
7FF848D8C000
trusted library allocation
page read and write
1C200000
heap
page read and write
1B940000
heap
page read and write
7FF848F8D000
trusted library allocation
page read and write
2E46000
trusted library allocation
page read and write
621000
heap
page read and write
2A86A136000
heap
page read and write
7FF848DE0000
trusted library allocation
page read and write
2A86A12F000
heap
page read and write
19E80C9F000
heap
page read and write
7FF848DFC000
trusted library allocation
page execute and read and write
7FF848F0C000
trusted library allocation
page read and write
130B1000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page read and write
7FF848EE0000
trusted library allocation
page read and write
754000
heap
page read and write
7FF848F50000
trusted library allocation
page read and write
272F000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
19E80CA4000
heap
page read and write
31E5000
trusted library allocation
page read and write
11C0000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
2A86BD40000
heap
page read and write
26F2000
trusted library allocation
page read and write
1C32E000
stack
page read and write
3122000
trusted library allocation
page read and write
12836000
trusted library allocation
page read and write
11D0000
heap
page read and write
1AF80000
heap
page execute and read and write
1B9CE000
stack
page read and write
129F7000
trusted library allocation
page read and write
2B09000
trusted library allocation
page read and write
317B000
trusted library allocation
page read and write
19E80DD0000
direct allocation
page read and write
1C15E000
stack
page read and write
14FE000
stack
page read and write
29F0000
trusted library allocation
page read and write
1B8E0000
heap
page execute and read and write
F00000
heap
page read and write
111F000
heap
page read and write
12F50000
trusted library allocation
page read and write
E2C000
heap
page read and write
7FF848EF8000
trusted library allocation
page read and write
7FF848EE9000
trusted library allocation
page read and write
3238000
trusted library allocation
page read and write
1A500000
trusted library allocation
page read and write
12950000
trusted library allocation
page read and write
1B7E1000
heap
page read and write
12E0000
heap
page read and write
7FF848D94000
trusted library allocation
page read and write
7FF848D88000
trusted library allocation
page read and write
26DF000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page read and write
1BC7B000
stack
page read and write
7FF848FA0000
trusted library allocation
page execute and read and write
EDB000
heap
page read and write
7FF848FCA000
trusted library allocation
page read and write
1ADA0000
heap
page read and write
7FF848D64000
trusted library allocation
page read and write
7FF848F1C000
trusted library allocation
page read and write
2EDB000
trusted library allocation
page read and write
2A86A357000
direct allocation
page read and write
2591000
trusted library allocation
page read and write
2F93000
trusted library allocation
page read and write
19E80CEF000
heap
page read and write
1E602520000
heap
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
2832000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
7FF848E10000
trusted library allocation
page read and write
1C050000
heap
page read and write
2812000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
19E80C7F000
heap
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
3114000
trusted library allocation
page read and write
163C000
heap
page read and write
7FF848D8D000
trusted library allocation
page execute and read and write
1C190000
heap
page execute and read and write
29FF000
trusted library allocation
page read and write
7FF848E26000
trusted library allocation
page read and write
27DF000
trusted library allocation
page read and write
7FF848D44000
trusted library allocation
page read and write
12E5000
heap
page read and write
DE0000
heap
page execute and read and write
3227000
trusted library allocation
page read and write
2A14000
trusted library allocation
page read and write
A40000
heap
page read and write
7FF848F60000
trusted library allocation
page read and write
7FF848F6D000
trusted library allocation
page read and write
30F5000
trusted library allocation
page read and write
1BCB0000
heap
page execute and read and write
1C220000
heap
page execute and read and write
31C1000
trusted library allocation
page read and write
1AB6B000
heap
page read and write
7FF848E46000
trusted library allocation
page execute and read and write
7FF848D73000
trusted library allocation
page read and write
2A64000
trusted library allocation
page read and write
7FF848E60000
trusted library allocation
page execute and read and write
2A7E000
trusted library allocation
page read and write
19E80AB0000
heap
page read and write
19E80C87000
heap
page read and write
25AF000
trusted library allocation
page read and write
7FF848E50000
trusted library allocation
page execute and read and write
2749000
trusted library allocation
page read and write
230768B0000
heap
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
12AB000
heap
page read and write
1AFC0000
unkown
page readonly
19E80C8C000
heap
page read and write
19E8261F000
direct allocation
page read and write
78B000
heap
page read and write
2E1F000
trusted library allocation
page read and write
31FB000
trusted library allocation
page read and write
30000
unkown
page readonly
2FD9000
trusted library allocation
page read and write
7FF848EE6000
trusted library allocation
page read and write
2A86A11A000
heap
page read and write
2A86A12F000
heap
page read and write
7FF848EF6000
trusted library allocation
page read and write
12600000
trusted library allocation
page read and write
28A7000
trusted library allocation
page read and write
760000
trusted library allocation
page read and write
70D000
heap
page read and write
2AED000
trusted library allocation
page read and write
2FEB000
trusted library allocation
page read and write
7FF848E91000
trusted library allocation
page execute and read and write
7FF848D54000
trusted library allocation
page read and write
2A86A10C000
heap
page read and write
1C102000
heap
page execute and read and write
7FF848F20000
trusted library allocation
page read and write
96F000
stack
page read and write
2F18000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page read and write
7FF848D58000
trusted library allocation
page read and write
3F0000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
2A86A0E8000
heap
page read and write
9D0000
trusted library allocation
page read and write
735000
heap
page read and write
2A86A11F000
heap
page read and write
18FF000
stack
page read and write
7FF848F0C000
trusted library allocation
page read and write
7FF848D74000
trusted library allocation
page read and write
2A86A119000
heap
page read and write
11E0000
heap
page read and write
7FF848F64000
trusted library allocation
page read and write
7FF848D7C000
trusted library allocation
page read and write
7FF849310000
trusted library allocation
page read and write
523000
stack
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
7FF848F03000
trusted library allocation
page read and write
7FF848EE8000
trusted library allocation
page read and write
327E000
stack
page read and write
E13000
heap
page read and write
23076961000
heap
page read and write
7FF848DFC000
trusted library allocation
page execute and read and write
1676000
heap
page read and write
23076930000
heap
page read and write
7FF848F0C000
trusted library allocation
page read and write
2A86A310000
direct allocation
page read and write
7FF848EF4000
trusted library allocation
page read and write
2807000
trusted library allocation
page read and write
2EFF000
trusted library allocation
page read and write
2A3F000
trusted library allocation
page read and write
1D256000
heap
page read and write
282B000
trusted library allocation
page read and write
7FF848D5C000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
7FF848D64000
trusted library allocation
page read and write
2A86A175000
heap
page read and write
3656000
trusted library allocation
page read and write
7FF848D44000
trusted library allocation
page read and write
7FF848F83000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page read and write
1AD1D000
stack
page read and write
3194000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page read and write
7FF848D94000
trusted library allocation
page read and write
1213000
heap
page read and write
7FF848F5D000
trusted library allocation
page read and write
3725000
trusted library allocation
page read and write
A95000
heap
page read and write
3183000
trusted library allocation
page read and write
1B6E8000
heap
page read and write
2FB0000
heap
page execute and read and write
7FF848F70000
trusted library allocation
page read and write
1A855000
heap
page read and write
7FF848D78000
trusted library allocation
page read and write
1560000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
2AD18A48000
heap
page read and write
23A0000
unkown
page readonly
349E000
trusted library allocation
page read and write
2A86A3F0000
direct allocation
page read and write
26A0000
heap
page read and write
281F000
trusted library allocation
page read and write
2F1F000
trusted library allocation
page read and write
1B73E000
heap
page read and write
2A86A160000
heap
page read and write
25B8000
trusted library allocation
page read and write
25C0000
trusted library allocation
page read and write
11A0000
heap
page read and write
2953000
trusted library allocation
page read and write
2380000
heap
page execute and read and write
2649000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page read and write
2A86A165000
heap
page read and write
2A86A12B000
heap
page read and write
3351000
trusted library allocation
page read and write
7FF848D58000
trusted library allocation
page read and write
19E80CEC000
heap
page read and write
7FF848D30000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
3510000
trusted library allocation
page read and write
7FF848D5D000
trusted library allocation
page execute and read and write
27F4000
trusted library allocation
page read and write
134E1000
trusted library allocation
page read and write
2A86A144000
heap
page read and write
1C400000
heap
page read and write
722000
heap
page read and write
1602000
heap
page read and write
3A0000
heap
page read and write
7FF848F60000
trusted library allocation
page read and write
790000
heap
page read and write
261F000
trusted library allocation
page read and write
27DB000
trusted library allocation
page read and write
12A0D000
trusted library allocation
page read and write
7FF848F37000
trusted library allocation
page read and write
1228000
heap
page read and write
1D1DE000
stack
page read and write
1AFE0000
unkown
page readonly
6B6000
heap
page read and write
2AB9000
trusted library allocation
page read and write
2A1F000
trusted library allocation
page read and write
23C0000
heap
page read and write
7FF848E90000
trusted library allocation
page execute and read and write
1B13000
heap
page read and write
1BE50000
heap
page execute and read and write
A44000
heap
page read and write
1C402000
heap
page read and write
29E1000
trusted library allocation
page read and write
19E80C7C000
heap
page read and write
27E1000
trusted library allocation
page read and write
7FF848F53000
trusted library allocation
page read and write
12990000
trusted library allocation
page read and write
19E82640000
direct allocation
page read and write
7FF848E00000
trusted library allocation
page execute and read and write
30FB000
trusted library allocation
page read and write
7FF848D84000
trusted library allocation
page read and write
323F000
trusted library allocation
page read and write
1622000
heap
page read and write
74F000
heap
page read and write
1B68D000
heap
page read and write
2DD6BFE000
stack
page read and write
1BDEF000
stack
page read and write
7FF848D73000
trusted library allocation
page execute and read and write
1B947000
heap
page read and write
7FF848F83000
trusted library allocation
page read and write
7FF848D84000
trusted library allocation
page read and write
19E826A0000
direct allocation
page read and write
1BA02000
heap
page read and write
1B74A000
heap
page read and write
2AAF000
trusted library allocation
page read and write
19E80E10000
direct allocation
page read and write
7B0000
heap
page read and write
125B1000
trusted library allocation
page read and write
310D000
trusted library allocation
page read and write
2F53000
trusted library allocation
page read and write
31B3000
trusted library allocation
page read and write
1C600000
heap
page read and write
13500000
trusted library allocation
page read and write
2E2C41E0000
heap
page read and write
A00000
heap
page read and write
19E80CA4000
heap
page read and write
230767D0000
heap
page read and write
D20000
heap
page read and write
1300000
heap
page read and write
15EF000
stack
page read and write
7FF848F40000
trusted library allocation
page read and write
19E80CB5000
heap
page read and write
3182000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
E680BFF000
stack
page read and write
7FF848E70000
trusted library allocation
page execute and read and write
3DE77FF000
stack
page read and write
D80000
heap
page read and write
269E000
stack
page read and write
26BB000
trusted library allocation
page read and write
7FF48A0C0000
trusted library allocation
page execute and read and write
D30000
trusted library allocation
page read and write
34C6000
trusted library allocation
page read and write
12461000
trusted library allocation
page read and write
7FF848F26000
trusted library allocation
page read and write
1326F000
trusted library allocation
page read and write
1B92E000
stack
page read and write
2A86A160000
heap
page read and write
12A5E000
trusted library allocation
page read and write
2E2C3E37000
heap
page read and write
2AAD000
trusted library allocation
page read and write
1313000
heap
page read and write
128A1000
trusted library allocation
page read and write
2D9E000
stack
page read and write
1ADB8000
heap
page read and write
2A75000
trusted library allocation
page read and write
1BA11000
heap
page read and write
23076A30000
heap
page read and write
2A86A15E000
heap
page read and write
2C75000
trusted library allocation
page read and write
2280000
heap
page read and write
7FF848F30000
trusted library allocation
page read and write
7FF848D78000
trusted library allocation
page read and write
C02000
heap
page read and write
7FF8491F0000
trusted library allocation
page read and write
7FF848E16000
trusted library allocation
page read and write
2A60000
trusted library allocation
page read and write
163F000
heap
page read and write
1D5FE000
stack
page read and write
19E80CCF000
heap
page read and write
560000
heap
page read and write
7FF848D5D000
trusted library allocation
page execute and read and write
1B76B000
heap
page read and write
590000
heap
page read and write
19E82660000
direct allocation
page read and write
2A86A36B000
direct allocation
page read and write
7FF848F34000
trusted library allocation
page read and write
810000
trusted library allocation
page read and write
25B0000
trusted library allocation
page read and write
132BE000
trusted library allocation
page read and write
1BEFF000
stack
page read and write
30C7000
trusted library allocation
page read and write
19E80CD2000
heap
page read and write
30000
unkown
page readonly
7FF848D40000
trusted library allocation
page read and write
1568000
heap
page read and write
3179000
trusted library allocation
page read and write
25B5000
trusted library allocation
page read and write
1293A000
trusted library allocation
page read and write
624000
heap
page read and write
7FF848F70000
trusted library allocation
page read and write
7FF848F77000
trusted library allocation
page read and write
2A07000
trusted library allocation
page read and write
7FF848F57000
trusted library allocation
page read and write
2708000
trusted library allocation
page read and write
2E2C3E30000
heap
page read and write
12781000
trusted library allocation
page read and write
7FF848E80000
trusted library allocation
page execute and read and write
990000
heap
page read and write
12ACF000
trusted library allocation
page read and write
126B1000
trusted library allocation
page read and write
7FF848F63000
trusted library allocation
page read and write
1B759000
heap
page read and write
19E80CAA000
heap
page read and write
10E3000
stack
page read and write
27CB000
trusted library allocation
page read and write
7FF848E91000
trusted library allocation
page execute and read and write
3E0000
heap
page read and write
33A3000
trusted library allocation
page read and write
2DAB000
trusted library allocation
page read and write
62C000
heap
page read and write
1AE4B000
heap
page read and write
1288A000
trusted library allocation
page read and write
3149000
trusted library allocation
page read and write
652000
heap
page read and write
2718000
trusted library allocation
page read and write
2C82000
trusted library allocation
page read and write
7FF848F03000
trusted library allocation
page read and write
7FF849200000
trusted library allocation
page read and write
2DCD000
trusted library allocation
page read and write
2A57000
trusted library allocation
page read and write
D60000
heap
page read and write
2A86A3B0000
direct allocation
page read and write
2A86A10C000
heap
page read and write
23076974000
heap
page read and write
28A9000
trusted library allocation
page read and write
2A86A13B000
heap
page read and write
26AB000
trusted library allocation
page read and write
19E80CEC000
heap
page read and write
7FF848F50000
trusted library allocation
page read and write
2AF5000
trusted library allocation
page read and write
7FF848F28000
trusted library allocation
page read and write
348D000
trusted library allocation
page read and write
175DBE00000
heap
page read and write
3169000
trusted library allocation
page read and write
1B0B0000
heap
page read and write
34C8000
trusted library allocation
page read and write
600000
heap
page read and write
2AB7000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
258D000
trusted library allocation
page read and write
2909000
trusted library allocation
page read and write
2A86A177000
heap
page read and write
2A86A3D0000
direct allocation
page read and write
770000
heap
page read and write
7FF848D4D000
trusted library allocation
page execute and read and write
2DD69F5000
stack
page read and write
1B968000
heap
page read and write
7FF848F55000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page execute and read and write
7FF848F55000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page read and write
7FF848F8D000
trusted library allocation
page read and write
76000
unkown
page readonly
1AE9E000
heap
page read and write
7FF848F28000
trusted library allocation
page read and write
7FF848D7C000
trusted library allocation
page read and write
1AE10000
heap
page read and write
2AD18A40000
heap
page read and write
7FF848D53000
trusted library allocation
page read and write
390000
heap
page read and write
1B950000
heap
page execute and read and write
1ACEA081000
heap
page read and write
2F72000
trusted library allocation
page read and write
15C9000
heap
page read and write
A0C000
heap
page read and write
6D0000
heap
page read and write
33AE000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page read and write
258F000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page read and write
7FF848D64000
trusted library allocation
page read and write
318C000
trusted library allocation
page read and write
23076971000
heap
page read and write
7FF848E46000
trusted library allocation
page execute and read and write
1AF9F000
stack
page read and write
DD0000
heap
page execute and read and write
23076972000
heap
page read and write
2FA0000
heap
page read and write
7FF848D64000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
1B95D000
stack
page read and write
2610000
trusted library allocation
page read and write
2C08000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
7FF848D33000
trusted library allocation
page execute and read and write
31B8000
trusted library allocation
page read and write
3181000
trusted library allocation
page read and write
E41000
heap
page read and write
3135000
trusted library allocation
page read and write
7FF848D63000
trusted library allocation
page execute and read and write
7FF848F50000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
AAB000
heap
page read and write
7FF848F40000
trusted library allocation
page read and write
2A86A15C000
heap
page read and write
1641000
heap
page read and write
19E80C20000
heap
page read and write
2B5B000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
2EF4000
trusted library allocation
page read and write
7FF848F47000
trusted library allocation
page read and write
1B600000
heap
page read and write
7FF848D48000
trusted library allocation
page read and write
6F0000
heap
page read and write
805000
heap
page read and write
7FF848D53000
trusted library allocation
page read and write
AD1000
heap
page read and write
7FF848F60000
trusted library allocation
page read and write
7FF848E2C000
trusted library allocation
page execute and read and write
2E2C3E10000
heap
page read and write
7FF848F30000
trusted library allocation
page read and write
2A6C000
trusted library allocation
page read and write
7FF848F4C000
trusted library allocation
page read and write
14BE000
stack
page read and write
1B00000
heap
page read and write
7FF848D73000
trusted library allocation
page read and write
7FF848F18000
trusted library allocation
page read and write
1E5E73DA000
heap
page read and write
7FF848E80000
trusted library allocation
page execute and read and write
1ACE9FE0000
heap
page read and write
B02000
heap
page read and write
F13000
heap
page read and write
7FF848F77000
trusted library allocation
page read and write
7FF848D78000
trusted library allocation
page read and write
126A7000
trusted library allocation
page read and write
31B2000
trusted library allocation
page read and write
26ED000
trusted library allocation
page read and write
2A82000
trusted library allocation
page read and write
292A000
trusted library allocation
page read and write
182F000
stack
page read and write
1B605000
heap
page read and write
7FF848F85000
trusted library allocation
page read and write
1B4BD000
stack
page read and write
1AFC2000
unkown
page readonly
1600000
heap
page read and write
2A86A370000
direct allocation
page read and write
1131000
heap
page read and write
7FF848E56000
trusted library allocation
page execute and read and write
7FF848F4E000
trusted library allocation
page read and write
175DBD20000
heap
page read and write
282E000
trusted library allocation
page read and write
3203000
trusted library allocation
page read and write
19E82680000
direct allocation
page read and write
12AB8000
trusted library allocation
page read and write
7FF848DF6000
trusted library allocation
page read and write
E74000
heap
page read and write
3621000
trusted library allocation
page read and write
2816000
trusted library allocation
page read and write
3659000
trusted library allocation
page read and write
DCE000
stack
page read and write
3420000
trusted library allocation
page read and write
7FF848D74000
trusted library allocation
page read and write
1D4FE000
stack
page read and write
312F000
trusted library allocation
page read and write
1B390000
heap
page execute and read and write
D40000
heap
page read and write
2A4B000
trusted library allocation
page read and write
7FF848F77000
trusted library allocation
page read and write
7FF848D64000
trusted library allocation
page read and write
2A86A144000
heap
page read and write
33B2000
trusted library allocation
page read and write
7FF8491E0000
trusted library allocation
page read and write
27AF000
stack
page read and write
1B765000
heap
page read and write
2A86A14A000
heap
page read and write
2F07000
trusted library allocation
page read and write
CCE000
stack
page read and write
1B790000
heap
page read and write
2A7B000
trusted library allocation
page read and write
2825000
trusted library allocation
page read and write
1BE4E000
stack
page read and write
12B05000
trusted library allocation
page read and write
D02000
heap
page read and write
7FF848F57000
trusted library allocation
page read and write
620000
heap
page read and write
64A000
heap
page read and write
B0F000
stack
page read and write
2823000
trusted library allocation
page read and write
13431000
trusted library allocation
page read and write
1B6F0000
heap
page read and write
1C4FE000
stack
page read and write
73E000
stack
page read and write
19E80C9F000
heap
page read and write
1BE00000
heap
page read and write
2860000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page read and write
2A59000
trusted library allocation
page read and write
7FF848F64000
trusted library allocation
page read and write
7FF848D5C000
trusted library allocation
page read and write
7FF849210000
trusted library allocation
page read and write
1ACEA081000
heap
page read and write
2A86A178000
heap
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
19E80DF0000
direct allocation
page read and write
7FF848F64000
trusted library allocation
page read and write
7FF848D54000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page execute and read and write
7FF848F08000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
D80000
heap
page read and write
3637000
trusted library allocation
page read and write
7FF848F63000
trusted library allocation
page read and write
7FF848F34000
trusted library allocation
page read and write
C4C63F5000
stack
page read and write
5C786FF000
stack
page read and write
7FF849070000
trusted library allocation
page read and write
7FF848D8D000
trusted library allocation
page execute and read and write
1713000
heap
page read and write
2A86BC20000
direct allocation
page read and write
7FF848E26000
trusted library allocation
page execute and read and write
7FF848D5C000
trusted library allocation
page read and write
3189000
trusted library allocation
page read and write
11F0000
heap
page read and write
1ACEA082000
heap
page read and write
1357F000
trusted library allocation
page read and write
7FF848F63000
trusted library allocation
page read and write
1B72E000
heap
page read and write
7FF848D8C000
trusted library allocation
page execute and read and write
7FF848F5C000
trusted library allocation
page read and write
6F0000
heap
page read and write
7FF848EEC000
trusted library allocation
page read and write
7FF848D32000
trusted library allocation
page read and write
19E82760000
heap
page read and write
1699000
heap
page read and write
1B682000
heap
page read and write
25A2000
trusted library allocation
page read and write
7FF848E80000
trusted library allocation
page execute and read and write
126A1000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
1C4CE000
stack
page read and write
12AAB000
trusted library allocation
page read and write
7FF848DCC000
trusted library allocation
page execute and read and write
7FF848D53000
trusted library allocation
page read and write
2DD6DFF000
stack
page read and write
7FF848F90000
trusted library allocation
page read and write
25F4000
trusted library allocation
page read and write
19E80C8D000
heap
page read and write
2FAD000
trusted library allocation
page read and write
2835000
trusted library allocation
page read and write
334A000
heap
page read and write
2A51000
trusted library allocation
page read and write
285B000
trusted library allocation
page read and write
320C000
trusted library allocation
page read and write
629000
heap
page read and write
CFF000
stack
page read and write
1BF02000
heap
page execute and read and write
2A86A158000
heap
page read and write
175DC050000
heap
page read and write
157B000
heap
page read and write
1C623000
heap
page read and write
2A86BCA0000
direct allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
13180000
trusted library allocation
page read and write
2F12000
trusted library allocation
page read and write
600000
heap
page read and write
302A000
trusted library allocation
page read and write
B7E000
stack
page read and write
B00000
heap
page read and write
7FF8491F0000
trusted library allocation
page read and write
12A50000
trusted library allocation
page read and write
1B77D000
heap
page read and write
2EC0000
heap
page read and write
7FF848F3D000
trusted library allocation
page read and write
1AE2D000
heap
page read and write
361B000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page read and write
2A86A14C000
heap
page read and write
25A4000
trusted library allocation
page read and write
271F000
trusted library allocation
page read and write
7FF848F5E000
trusted library allocation
page read and write
7FF848F3C000
trusted library allocation
page read and write
1ACEA081000
heap
page read and write
128D8000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page read and write
12451000
trusted library allocation
page read and write
7FF848D84000
trusted library allocation
page read and write
1AA1D000
stack
page read and write
7FF848EF0000
trusted library allocation
page read and write
1B69A000
stack
page read and write
23076910000
heap
page read and write
361D000
trusted library allocation
page read and write
287D000
trusted library allocation
page read and write
33A8000
trusted library allocation
page read and write
2D5E000
trusted library allocation
page read and write
16B6000
heap
page read and write
19E80C7C000
heap
page read and write
7FF848D9C000
trusted library allocation
page execute and read and write
1BCFF000
stack
page read and write
1B21D000
stack
page read and write
3024000
trusted library allocation
page read and write
7FF848DBC000
trusted library allocation
page execute and read and write
34B7000
trusted library allocation
page read and write
2646000
trusted library allocation
page read and write
12E0000
heap
page read and write
259F000
stack
page read and write
1E5E74E0000
heap
page read and write
1C9FE000
stack
page read and write
289F000
stack
page read and write
3079000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
702000
heap
page read and write
2F5B000
trusted library allocation
page read and write
1E602500000
heap
page read and write
2828000
trusted library allocation
page read and write
12C0000
heap
page read and write
DA0000
trusted library allocation
page read and write
2E2C4000000
heap
page read and write
11EE000
heap
page read and write
34C0000
trusted library allocation
page read and write
19E80C7E000
heap
page read and write
7FF848E70000
trusted library allocation
page execute and read and write
19E80D97000
direct allocation
page read and write
38BB000
trusted library allocation
page read and write
3648000
trusted library allocation
page read and write
2C7B000
trusted library allocation
page read and write
1B13E000
stack
page read and write
2AD189B0000
heap
page read and write
A41000
heap
page read and write
258B000
trusted library allocation
page read and write
645000
heap
page read and write
3181000
trusted library allocation
page read and write
7FF848E26000
trusted library allocation
page execute and read and write
3234000
trusted library allocation
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
12FE1000
trusted library allocation
page read and write
19E80CF0000
heap
page read and write
7FF848FD5000
trusted library allocation
page read and write
3230000
trusted library allocation
page read and write
2AE1000
trusted library allocation
page read and write
1180000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
2F4F000
trusted library allocation
page read and write
2AD9000
trusted library allocation
page read and write
23B0000
unkown
page readonly
1BB02000
heap
page execute and read and write
3126000
trusted library allocation
page read and write
2EE1000
trusted library allocation
page read and write
7FF848DF6000
trusted library allocation
page read and write
230768D0000
heap
page read and write
C5A867F000
stack
page read and write
2907000
trusted library allocation
page read and write
125C8000
trusted library allocation
page read and write
1AF5E000
stack
page read and write
7FF848D8C000
trusted library allocation
page execute and read and write
1BA00000
heap
page read and write
3241000
trusted library allocation
page read and write
2B1D000
trusted library allocation
page read and write
72000
unkown
page readonly
115F000
heap
page read and write
1B23F000
stack
page read and write
7FF848F63000
trusted library allocation
page read and write
26F4000
trusted library allocation
page read and write
2D48000
trusted library allocation
page read and write
7FF848EF3000
trusted library allocation
page read and write
7FF848D43000
trusted library allocation
page execute and read and write
136B000
heap
page read and write
678000
heap
page read and write
7FF848D60000
trusted library allocation
page read and write
97E000
stack
page read and write
7FF848D73000
trusted library allocation
page read and write
2A3F000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page execute and read and write
34A4000
trusted library allocation
page read and write
1B930000
heap
page read and write
2EE4000
trusted library allocation
page read and write
19E80CE5000
heap
page read and write
3192000
trusted library allocation
page read and write
29F6000
trusted library allocation
page read and write
1C502000
heap
page execute and read and write
1B75F000
heap
page read and write
1B02000
heap
page read and write
1510000
trusted library allocation
page read and write
34A6000
trusted library allocation
page read and write
7FF848F18000
trusted library allocation
page read and write
1BF5E000
stack
page read and write
7FF848E46000
trusted library allocation
page execute and read and write
1B18E000
stack
page read and write
34A0000
trusted library allocation
page read and write
7FF849062000
trusted library allocation
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
2A12000
trusted library allocation
page read and write
B13000
heap
page read and write
12B48000
trusted library allocation
page read and write
2A86A450000
heap
page read and write
26DD000
trusted library allocation
page read and write
1B59E000
stack
page read and write
3175000
trusted library allocation
page read and write
1BDBE000
stack
page read and write
9E0000
heap
page read and write
34A4000
trusted library allocation
page read and write
3B2000
stack
page read and write
38BE000
trusted library allocation
page read and write
13270000
trusted library allocation
page read and write
7D6000
heap
page read and write
B02000
heap
page read and write
C4C65FE000
stack
page read and write
7FF848E46000
trusted library allocation
page execute and read and write
10F0000
heap
page read and write
2A86A410000
direct allocation
page read and write
3491000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page execute and read and write
30C1000
trusted library allocation
page read and write
1B73C000
heap
page read and write
7FF848D63000
trusted library allocation
page execute and read and write
1646000
heap
page read and write
A80000
trusted library allocation
page read and write
3283000
trusted library allocation
page read and write
319D000
trusted library allocation
page read and write
7FF848D8B000
trusted library allocation
page execute and read and write
7FF848F74000
trusted library allocation
page read and write
7FF849240000
trusted library allocation
page read and write
7FF849240000
trusted library allocation
page read and write
2A86A10A000
heap
page read and write
2721000
trusted library allocation
page read and write
5C785FE000
unkown
page read and write
1BA56000
heap
page read and write
1ACEA2D0000
heap
page read and write
7FF848F30000
trusted library allocation
page read and write
2B0D000
trusted library allocation
page read and write
1B90C000
stack
page read and write
2A86A175000
heap
page read and write
125A1000
trusted library allocation
page read and write
2851000
trusted library allocation
page read and write
11C0000
heap
page read and write
14E0000
heap
page read and write
7FF848F7E000
trusted library allocation
page read and write
2FE0000
trusted library allocation
page read and write
19E80CB5000
heap
page read and write
2E20000
heap
page execute and read and write
19E80E30000
direct allocation
page read and write
613000
heap
page read and write
2A86A126000
heap
page read and write
2B4C000
trusted library allocation
page read and write
2F14000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page execute and read and write
2853000
trusted library allocation
page read and write
7FF848F1A000
trusted library allocation
page read and write
7FF848F6C000
trusted library allocation
page read and write
19E80C9F000
heap
page read and write
1AFA2000
unkown
page readonly
26AA000
heap
page read and write
2AD18A4A000
heap
page read and write
2E2C3E00000
heap
page read and write
7FF848F75000
trusted library allocation
page read and write
317F000
trusted library allocation
page read and write
CD0000
heap
page read and write
1200000
heap
page read and write
A2D000
heap
page read and write
26A1000
trusted library allocation
page read and write
131FF000
trusted library allocation
page read and write
1B49E000
stack
page read and write
124D1000
trusted library allocation
page read and write
E24000
heap
page read and write
7FF848D72000
trusted library allocation
page read and write
1AE6C000
heap
page read and write
26E3000
trusted library allocation
page read and write
11D0000
trusted library allocation
page read and write
13357000
trusted library allocation
page read and write
130C1000
trusted library allocation
page read and write
65000
unkown
page readonly
26E5000
trusted library allocation
page read and write
2A86A12F000
heap
page read and write
7FF848D5D000
trusted library allocation
page execute and read and write
2880000
trusted library allocation
page read and write
A90000
heap
page read and write
11F0000
trusted library allocation
page read and write
3140000
trusted library allocation
page read and write
2A79000
trusted library allocation
page read and write
E00000
heap
page read and write
318E000
trusted library allocation
page read and write
23076972000
heap
page read and write
31AD000
trusted library allocation
page read and write
1B2AF000
stack
page read and write
7FF848F3C000
trusted library allocation
page read and write
2A86A0E0000
heap
page read and write
7FF848EF8000
trusted library allocation
page read and write
27E1000
trusted library allocation
page read and write
7FF848F23000
trusted library allocation
page read and write
7FF848F2C000
trusted library allocation
page read and write
12FD000
heap
page read and write
2FCE000
stack
page read and write
1AE39000
heap
page read and write
ADB000
heap
page read and write
2F51000
trusted library allocation
page read and write
1C3AB000
stack
page read and write
2FA2000
trusted library allocation
page read and write
19E80C7C000
heap
page read and write
19E80CD9000
heap
page read and write
3131000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page read and write
2F05000
trusted library allocation
page read and write
1AFA0000
unkown
page readonly
7FF848D9C000
trusted library allocation
page execute and read and write
26B0000
trusted library allocation
page read and write
F02000
heap
page read and write
2AC1000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page read and write
1D0D0000
heap
page execute and read and write
A3F000
heap
page read and write
7FF849250000
trusted library allocation
page execute and read and write
7FF848F3D000
trusted library allocation
page read and write
363F000
trusted library allocation
page read and write
1AFD8000
unkown
page readonly
7FF848F27000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
7FF848E16000
trusted library allocation
page read and write
1ACE9FC0000
heap
page read and write
1C444000
heap
page read and write
7FF8491ED000
trusted library allocation
page read and write
ED1000
heap
page read and write
1AF02000
heap
page execute and read and write
7FF848D3D000
trusted library allocation
page execute and read and write
3120000
trusted library allocation
page read and write
2B01000
trusted library allocation
page read and write
7FF848D8D000
trusted library allocation
page execute and read and write
950000
heap
page read and write
7FF848D9B000
trusted library allocation
page execute and read and write
1ACEA084000
heap
page read and write
1E5E75C0000
heap
page read and write
2E2F000
trusted library allocation
page read and write
7FF848DBC000
trusted library allocation
page execute and read and write
7FF848D64000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
1170000
heap
page read and write
7FF848EF8000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page execute and read and write
16D0000
heap
page read and write
3204000
trusted library allocation
page read and write
19E80C96000
heap
page read and write
1B65A000
heap
page read and write
12750000
trusted library allocation
page read and write
16CE000
heap
page read and write
810000
heap
page read and write
1E602608000
heap
page read and write
12DA7000
trusted library allocation
page read and write
32000
unkown
page readonly
269E000
stack
page read and write
1850000
heap
page read and write
7FF8492D0000
trusted library allocation
page read and write
2A86BC60000
direct allocation
page read and write
1AE67000
heap
page read and write
641000
heap
page read and write
7FF848F00000
trusted library allocation
page read and write
7FF848F16000
trusted library allocation
page read and write
D9E3DFE000
stack
page read and write
128A7000
trusted library allocation
page read and write
DF0000
heap
page read and write
1AE09000
heap
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
33AB000
trusted library allocation
page read and write
7FF848EE8000
trusted library allocation
page read and write
19E80CEC000
heap
page read and write
7FF848EB1000
trusted library allocation
page execute and read and write
7FF848F40000
trusted library allocation
page execute and read and write
7FF848F80000
trusted library allocation
page read and write
234A000
heap
page read and write
7FF848DCC000
trusted library allocation
page execute and read and write
830000
trusted library allocation
page read and write
1BF4D000
stack
page read and write
2A86A175000
heap
page read and write
2FD1000
trusted library allocation
page read and write
2EC5000
trusted library allocation
page read and write
19E80CD0000
heap
page read and write
D9E3CFC000
stack
page read and write
19E8260D000
direct allocation
page read and write
31B6000
trusted library allocation
page read and write
129A000
heap
page read and write
7FF848D78000
trusted library allocation
page read and write
26FF000
trusted library allocation
page read and write
19E80CEC000
heap
page read and write
1B6FA000
heap
page read and write
1234000
heap
page read and write
23076972000
heap
page read and write
A11000
heap
page read and write
1B38B000
stack
page read and write
7FF848F80000
trusted library allocation
page execute and read and write
290F000
trusted library allocation
page read and write
2F7D000
trusted library allocation
page read and write
A98000
heap
page read and write
7FF848DE6000
trusted library allocation
page read and write
23B2000
unkown
page readonly
67000
unkown
page readonly
16D5000
heap
page read and write
684000
heap
page read and write
1ACEA040000
heap
page read and write
32AF7FE000
stack
page read and write
14E3000
stack
page read and write
10E3000
stack
page read and write
317E000
trusted library allocation
page read and write
123E000
heap
page read and write
7FF848F00000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page read and write
1B880000
heap
page read and write
1B798000
heap
page read and write
2A86A13B000
heap
page read and write
1C6FE000
stack
page read and write
800000
heap
page read and write
3142000
trusted library allocation
page read and write
7FF848F38000
trusted library allocation
page read and write
7FF848E60000
trusted library allocation
page execute and read and write
2D77000
trusted library allocation
page read and write
7FF848F44000
trusted library allocation
page read and write
23076972000
heap
page read and write
1B654000
heap
page read and write
7FF848F64000
trusted library allocation
page read and write
361F000
trusted library allocation
page read and write
2330000
heap
page read and write
2AFF000
trusted library allocation
page read and write
33A5000
trusted library allocation
page read and write
19E80CEF000
heap
page read and write
7FF848F60000
trusted library allocation
page read and write
7FF848D58000
trusted library allocation
page read and write
7FF8491D0000
trusted library allocation
page read and write
7FF848F74000
trusted library allocation
page read and write
1133000
heap
page read and write
7FF848E80000
trusted library allocation
page execute and read and write
11CF000
stack
page read and write
2A86BC0D000
direct allocation
page read and write
7FF848D8B000
trusted library allocation
page execute and read and write
11D0000
heap
page read and write
6E0000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
7FF848EC1000
trusted library allocation
page execute and read and write
34C4000
trusted library allocation
page read and write
19E80D79000
direct allocation
page read and write
2A86A0B0000
heap
page read and write
12457000
trusted library allocation
page read and write
7FF849320000
trusted library allocation
page execute and read and write
3236000
trusted library allocation
page read and write
7FF848E56000
trusted library allocation
page execute and read and write
A00000
heap
page read and write
7FF848E1C000
trusted library allocation
page execute and read and write
1AE8C000
heap
page read and write
33B0000
trusted library allocation
page read and write
31A2000
trusted library allocation
page read and write
25C4000
trusted library allocation
page read and write
7FF849330000
trusted library allocation
page read and write
132C7000
trusted library allocation
page read and write
19E80C98000
heap
page read and write
7FF848D33000
trusted library allocation
page execute and read and write
7FF848EE6000
trusted library allocation
page read and write
348F000
trusted library allocation
page read and write
1B624000
heap
page read and write
3201000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
310F000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
297D000
trusted library allocation
page read and write
3650000
trusted library allocation
page read and write
19E80C89000
heap
page read and write
313F000
trusted library allocation
page read and write
160B000
heap
page read and write
7FF848F3C000
trusted library allocation
page read and write
33D0000
heap
page execute and read and write
7FF848D7D000
trusted library allocation
page execute and read and write
2AD18990000
heap
page read and write
A2D000
heap
page read and write
10FC000
heap
page read and write
128B1000
trusted library allocation
page read and write
2763000
trusted library allocation
page read and write
2A86A10E000
heap
page read and write
1B53D000
stack
page read and write
1D0FE000
stack
page read and write
1AE99000
heap
page read and write
12A92000
trusted library allocation
page read and write
317B000
trusted library allocation
page read and write
7FF848D4D000
trusted library allocation
page execute and read and write
3166000
trusted library allocation
page read and write
7FF849217000
trusted library allocation
page read and write
19E82685000
direct allocation
page read and write
7FF848DE6000
trusted library allocation
page read and write
7FF848EB1000
trusted library allocation
page execute and read and write
1E602420000
heap
page read and write
DD0000
heap
page read and write
3183000
trusted library allocation
page read and write
2716000
trusted library allocation
page read and write
30BF000
stack
page read and write
305F000
trusted library allocation
page read and write
19E80CA4000
heap
page read and write
2818000
trusted library allocation
page read and write
7FF848F3C000
trusted library allocation
page read and write
9CF000
stack
page read and write
7D0000
heap
page read and write
7FF848D9C000
trusted library allocation
page execute and read and write
1D200000
heap
page read and write
1AFE2000
unkown
page readonly
1AE20000
heap
page read and write
7FF848D83000
trusted library allocation
page read and write
1AE36000
heap
page read and write
7FF848D80000
trusted library allocation
page read and write
1B68F000
heap
page read and write
7FF848F16000
trusted library allocation
page read and write
7FF848EF8000
trusted library allocation
page read and write
1AE7E000
heap
page read and write
1BB7E000
stack
page read and write
2A86A13B000
heap
page read and write
1B17E000
heap
page read and write
E87000
heap
page read and write
2A86A10C000
heap
page read and write
2A86A0A0000
heap
page read and write
2370000
heap
page execute and read and write
7FF849300000
trusted library allocation
page read and write
2A86A164000
heap
page read and write
7FF848D64000
trusted library allocation
page read and write
7FF848F26000
trusted library allocation
page read and write
E32000
heap
page read and write
12DA1000
trusted library allocation
page read and write
1B638000
heap
page read and write
1B910000
heap
page read and write
7FF848F55000
trusted library allocation
page read and write
1BA44000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
699000
heap
page read and write
2C79000
trusted library allocation
page read and write
7FF848F23000
trusted library allocation
page read and write
64F000
heap
page read and write
7FF848F40000
trusted library allocation
page read and write
1B633000
heap
page read and write
7FF848F30000
trusted library allocation
page read and write
E6807BC000
stack
page read and write
135C1000
trusted library allocation
page read and write
580000
heap
page read and write
13EE000
stack
page read and write
3634000
trusted library allocation
page read and write
2350000
heap
page read and write
2AD18980000
heap
page read and write
7FF848E26000
trusted library allocation
page execute and read and write
34C2000
trusted library allocation
page read and write
1BA52000
heap
page read and write
3652000
trusted library allocation
page read and write
2A4B000
trusted library allocation
page read and write
2A86A160000
heap
page read and write
7FF848F6D000
trusted library allocation
page read and write
12A0000
heap
page read and write
7FF848F45000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
7FF848F5D000
trusted library allocation
page read and write
2A28000
trusted library allocation
page read and write
10D0000
heap
page read and write
7FF848F83000
trusted library allocation
page read and write
2A14000
trusted library allocation
page read and write
2A18000
trusted library allocation
page read and write
19E80CA4000
heap
page read and write
7FF848D43000
trusted library allocation
page read and write
12FCF000
trusted library allocation
page read and write
12DD000
heap
page read and write
28B0000
trusted library allocation
page read and write
1B983000
heap
page read and write
26F7000
trusted library allocation
page read and write
1B6B9000
heap
page read and write
115C000
heap
page read and write
AB6000
heap
page read and write
128CF000
trusted library allocation
page read and write
134F1000
trusted library allocation
page read and write
23076971000
heap
page read and write
2793000
trusted library allocation
page read and write
284F000
trusted library allocation
page read and write
2310000
heap
page execute and read and write
2A10000
trusted library allocation
page read and write
7FF848D62000
trusted library allocation
page read and write
7FF848D4C000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page execute and read and write
7FF848D88000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
1B9F0000
heap
page read and write
7FF848F2D000
trusted library allocation
page read and write
1AF5E000
stack
page read and write
7FF848F5D000
trusted library allocation
page read and write
2A16000
trusted library allocation
page read and write
1AB1D000
stack
page read and write
325A000
trusted library allocation
page read and write
1B79B000
stack
page read and write
26DB000
trusted library allocation
page read and write
319F000
trusted library allocation
page read and write
1AD60000
heap
page read and write
5A0000
heap
page read and write
19E80CE7000
heap
page read and write
2D9F000
trusted library allocation
page read and write
1ACEA081000
heap
page read and write
27F2000
trusted library allocation
page read and write
1B640000
heap
page read and write
7FF848EE0000
trusted library allocation
page read and write
7FF849220000
trusted library allocation
page read and write
658000
heap
page read and write
7FF848E20000
trusted library allocation
page execute and read and write
18D0000
heap
page read and write
26F4000
trusted library allocation
page read and write
9F0000
heap
page execute and read and write
25AB000
trusted library allocation
page read and write
128F1000
trusted library allocation
page read and write
6B4000
heap
page read and write
1B675000
heap
page read and write
33C0000
heap
page read and write
7FF848F9D000
trusted library allocation
page read and write
1B952000
heap
page read and write
14EE000
stack
page read and write
2F16000
trusted library allocation
page read and write
19E80BB0000
heap
page read and write
7FF848F50000
trusted library allocation
page read and write
12A0F000
trusted library allocation
page read and write
26E1000
trusted library allocation
page read and write
2A86A350000
direct allocation
page read and write
7FF848D58000
trusted library allocation
page read and write
7FF848F7E000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page read and write
7FF848D40000
trusted library allocation
page read and write
12FD7000
trusted library allocation
page read and write
7FF849212000
trusted library allocation
page read and write
1E5E73D7000
heap
page read and write
2A86A11A000
heap
page read and write
19E82600000
direct allocation
page read and write
1ACEA04B000
heap
page read and write
DF0000
heap
page read and write
122D000
heap
page read and write
7FF848DF0000
trusted library allocation
page execute and read and write
2859000
trusted library allocation
page read and write
7FF848F5E000
trusted library allocation
page read and write
1B0E6000
heap
page read and write
30C3000
trusted library allocation
page read and write
26A9000
trusted library allocation
page read and write
348B000
trusted library allocation
page read and write
7FF848E16000
trusted library allocation
page execute and read and write
3632000
trusted library allocation
page read and write
1B960000
heap
page read and write
C5A831C000
stack
page read and write
7FF848F60000
trusted library allocation
page read and write
1A02000
heap
page read and write
7FF848D43000
trusted library allocation
page execute and read and write
7FF848F28000
trusted library allocation
page read and write
1E6025F0000
heap
page read and write
7FF848F1A000
trusted library allocation
page read and write
A13000
heap
page read and write
1C635000
heap
page read and write
2ACF000
trusted library allocation
page read and write
1585000
heap
page read and write
7FF848E16000
trusted library allocation
page read and write
7FF848E26000
trusted library allocation
page execute and read and write
31A1000
trusted library allocation
page read and write
27F6000
trusted library allocation
page read and write
12981000
trusted library allocation
page read and write
32B0000
heap
page execute and read and write
2B41000
trusted library allocation
page read and write
7FF848F2A000
trusted library allocation
page read and write
13690000
trusted library allocation
page read and write
C5A839F000
stack
page read and write
1BE44000
heap
page read and write
E46000
heap
page read and write
2451000
trusted library allocation
page read and write
12A5000
heap
page read and write
7FF848F40000
trusted library allocation
page read and write
1ACE9FB0000
heap
page read and write
19E80CBE000
heap
page read and write
19E80D50000
direct allocation
page read and write
7FF849220000
trusted library allocation
page read and write
923000
stack
page read and write
7FF848F10000
trusted library allocation
page read and write
7FF848EFA000
trusted library allocation
page read and write
DE0000
heap
page execute and read and write
7FF848F6D000
trusted library allocation
page read and write
A6F000
stack
page read and write
7FF848F6D000
trusted library allocation
page read and write
7FF848D53000
trusted library allocation
page read and write
613000
heap
page read and write
7FF848F75000
trusted library allocation
page read and write
3625000
trusted library allocation
page read and write
19E80C9F000
heap
page read and write
7FF848EB1000
trusted library allocation
page execute and read and write
2A86A167000
heap
page read and write
1BCEE000
stack
page read and write
2746000
trusted library allocation
page read and write
7FF848F2C000
trusted library allocation
page read and write
A6B000
heap
page read and write
131F0000
trusted library allocation
page read and write
1C253000
heap
page read and write
7FF848F44000
trusted library allocation
page read and write
2DAB000
trusted library allocation
page read and write
2FDB000
trusted library allocation
page read and write
7FF848D34000
trusted library allocation
page read and write
29F2000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page read and write
EB1000
heap
page read and write
A06000
heap
page read and write
12E81000
trusted library allocation
page read and write
A33000
heap
page read and write
19E80C8A000
heap
page read and write
5E0000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page read and write
2987000
trusted library allocation
page read and write
7FF848F34000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
2B29000
trusted library allocation
page read and write
31FF000
trusted library allocation
page read and write
DB0000
heap
page read and write
3DE76FF000
unkown
page read and write
2DEE000
stack
page read and write
7FF848F18000
trusted library allocation
page read and write
2DA7000
trusted library allocation
page read and write
2460000
trusted library allocation
page read and write
A7F000
stack
page read and write
DD0000
heap
page read and write
26C5000
trusted library allocation
page read and write
2B37000
trusted library allocation
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
7FF848DBC000
trusted library allocation
page execute and read and write
7FF848E91000
trusted library allocation
page execute and read and write
2EF6000
trusted library allocation
page read and write
23076972000
heap
page read and write
1283D000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
1B70E000
heap
page read and write
175DBE50000
heap
page read and write
3360000
trusted library allocation
page read and write
7FF848D34000
trusted library allocation
page read and write
19E80CD2000
heap
page read and write
B90000
heap
page read and write
162D000
heap
page read and write
702000
heap
page read and write
7AB000
heap
page read and write
778000
heap
page read and write
1B6E1000
heap
page read and write
1B62C000
heap
page read and write
1B9A2000
heap
page read and write
7FF848D73000
trusted library allocation
page read and write
3645000
trusted library allocation
page read and write
1A810000
trusted library allocation
page read and write
7FF848D64000
trusted library allocation
page read and write
314B000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
7FF848D8D000
trusted library allocation
page execute and read and write
875000
heap
page read and write
7FF848E60000
trusted library allocation
page execute and read and write
11A0000
heap
page read and write
317D000
trusted library allocation
page read and write
337B000
trusted library allocation
page read and write
1A4D0000
trusted library allocation
page read and write
7FF848D62000
trusted library allocation
page read and write
7FF848F34000
trusted library allocation
page read and write
E02000
heap
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
2ADF000
trusted library allocation
page read and write
3D540FE000
stack
page read and write
2A86A144000
heap
page read and write
7FF848F30000
trusted library allocation
page read and write
1BCA0000
heap
page read and write
3654000
trusted library allocation
page read and write
1ACEA081000
heap
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
D63000
stack
page read and write
7FF848D7C000
trusted library allocation
page read and write
1C05E000
stack
page read and write
7FF848F83000
trusted library allocation
page read and write
1588000
heap
page read and write
12FF000
heap
page read and write
1E5E73D0000
heap
page read and write
1240000
heap
page read and write
31BF000
trusted library allocation
page read and write
19E80C9A000
heap
page read and write
1AA5B000
stack
page read and write
1B61E000
heap
page read and write
D00000
heap
page read and write
A70000
heap
page read and write
34B5000
trusted library allocation
page read and write
2A86A110000
heap
page read and write
6E6000
heap
page read and write
19E80CDF000
heap
page read and write
2E93000
trusted library allocation
page read and write
15FE000
stack
page read and write
2DB5000
trusted library allocation
page read and write
7FF848E16000
trusted library allocation
page read and write
13047000
trusted library allocation
page read and write
1279000
heap
page read and write
7FF84923F000
trusted library allocation
page read and write
7FF848F03000
trusted library allocation
page read and write
318B000
trusted library allocation
page read and write
2FD7000
trusted library allocation
page read and write
3D5407E000
stack
page read and write
29DF000
trusted library allocation
page read and write
2B21000
trusted library allocation
page read and write
2A86A144000
heap
page read and write
70B000
heap
page read and write
3494000
trusted library allocation
page read and write
3340000
heap
page read and write
14E3000
stack
page read and write
7FF848F60000
trusted library allocation
page read and write
1BCC0000
heap
page read and write
310B000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
1B033000
heap
page execute and read and write
19E80CC7000
heap
page read and write
B80000
heap
page execute and read and write
7FF848F20000
trusted library allocation
page read and write
1E5E75E0000
heap
page read and write
7FF848F44000
trusted library allocation
page read and write
158C000
heap
page read and write
12D6000
heap
page read and write
D13000
heap
page read and write
14E5000
heap
page read and write
1C256000
heap
page read and write
38B5000
trusted library allocation
page read and write
A02000
heap
page read and write
19E80CE8000
heap
page read and write
32AFA7E000
stack
page read and write
635000
heap
page read and write
2978000
trusted library allocation
page read and write
7FF848D84000
trusted library allocation
page read and write
1C6FE000
stack
page read and write
654000
heap
page read and write
1302000
heap
page read and write
2DF4000
trusted library allocation
page read and write
32AF77B000
stack
page read and write
7FF848F30000
trusted library allocation
page read and write
7FF848D83000
trusted library allocation
page read and write
2693000
trusted library allocation
page read and write
26EE000
trusted library allocation
page read and write
19E82683000
direct allocation
page read and write
12DB1000
trusted library allocation
page read and write
19E80E50000
heap
page read and write
1B718000
heap
page read and write
7FF848D5D000
trusted library allocation
page execute and read and write
7FF848F16000
trusted library allocation
page read and write
24D1000
trusted library allocation
page read and write
2C7E000
trusted library allocation
page read and write
19E82620000
direct allocation
page read and write
7FF848D5B000
trusted library allocation
page execute and read and write
2A86A12A000
heap
page read and write
38C5000
trusted library allocation
page read and write
7FF848D9D000
trusted library allocation
page execute and read and write
7A5000
heap
page read and write
244E000
stack
page read and write
2E49000
trusted library allocation
page read and write
2A86A11C000
heap
page read and write
130D1000
trusted library allocation
page read and write
159B000
heap
page read and write
29E4000
trusted library allocation
page read and write
1BD4E000
stack
page read and write
7FF848EA0000
trusted library allocation
page execute and read and write
7FF848D6D000
trusted library allocation
page execute and read and write
1B775000
heap
page read and write
1B952000
heap
page read and write
7FF848F1C000
trusted library allocation
page read and write
3212000
trusted library allocation
page read and write
7FF848F54000
trusted library allocation
page read and write
1860000
heap
page read and write
1B5FC000
stack
page read and write
7FF848F80000
trusted library allocation
page execute and read and write
7FF848E00000
trusted library allocation
page execute and read and write
1C62D000
heap
page read and write
632000
heap
page read and write
12A11000
trusted library allocation
page read and write
2340000
heap
page read and write
1BDEE000
stack
page read and write
12923000
trusted library allocation
page read and write
3111000
trusted library allocation
page read and write
2DBB000
trusted library allocation
page read and write
1ADFE000
heap
page read and write
D9E3EFF000
stack
page read and write
1ADF8000
heap
page read and write
7FF848F70000
trusted library allocation
page read and write
970000
heap
page read and write
3144000
trusted library allocation
page read and write
25BB000
trusted library allocation
page read and write
125A7000
trusted library allocation
page read and write
7FF848F75000
trusted library allocation
page read and write
12966000
trusted library allocation
page read and write
19E80CD2000
heap
page read and write
7FF848DF6000
trusted library allocation
page read and write
DF0000
heap
page read and write
19E80C50000
heap
page read and write
7FF849230000
trusted library allocation
page read and write
7FF848D4D000
trusted library allocation
page execute and read and write
19E80CBC000
heap
page read and write
7FF848E1C000
trusted library allocation
page execute and read and write
2A86A167000
heap
page read and write
1B6D5000
heap
page read and write
2AC3000
trusted library allocation
page read and write
2B2D000
trusted library allocation
page read and write
1AD6B000
stack
page read and write
724000
heap
page read and write
1D244000
heap
page read and write
2C86000
trusted library allocation
page read and write
25A7000
trusted library allocation
page read and write
19E80C8B000
heap
page read and write
7FF848F70000
trusted library allocation
page read and write
3400000
trusted library allocation
page read and write
19E80CA5000
heap
page read and write
27F0000
trusted library allocation
page read and write
19E80DB0000
direct allocation
page read and write
7FF848D5C000
trusted library allocation
page read and write
7FF848DF6000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page read and write
1AE02000
heap
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
262F000
trusted library allocation
page read and write
1B924000
heap
page read and write
2D95000
trusted library allocation
page read and write
2DA9000
trusted library allocation
page read and write
6E2000
heap
page read and write
7FF848D60000
trusted library allocation
page read and write
1C380000
heap
page execute and read and write
7FF848F80000
trusted library allocation
page read and write
2E60000
heap
page read and write
DE0000
heap
page read and write
7FF848D42000
trusted library allocation
page read and write
7FF848EF7000
trusted library allocation
page read and write
627000
heap
page read and write
2A86BC1F000
direct allocation
page read and write
19E80CE7000
heap
page read and write
291A000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page read and write
2F10000
trusted library allocation
page read and write
7FF848F87000
trusted library allocation
page read and write
2A05000
trusted library allocation
page read and write
29EC000
trusted library allocation
page read and write
DC0000
heap
page read and write
159D000
heap
page read and write
7FF848F2C000
trusted library allocation
page read and write
19E80C79000
heap
page read and write
393000
stack
page read and write
7FF848F3D000
trusted library allocation
page read and write
1ACEA071000
heap
page read and write
7FF848F40000
trusted library allocation
page read and write
19E80D90000
direct allocation
page read and write
3C0000
heap
page read and write
1B55C000
stack
page read and write
19E80CAA000
heap
page read and write
27D0000
heap
page execute and read and write
7FF8492F0000
trusted library allocation
page read and write
13361000
trusted library allocation
page read and write
19E80C9B000
heap
page read and write
8F0000
heap
page read and write
C4C67FF000
stack
page read and write
131A1000
trusted library allocation
page read and write
23CA000
heap
page read and write
D50000
heap
page read and write
19FF000
stack
page read and write
1C0FE000
stack
page read and write
7FF849082000
trusted library allocation
page read and write
1267F000
trusted library allocation
page read and write
DC0000
heap
page read and write
1AE0F000
heap
page read and write
1BCB0000
heap
page read and write
795000
heap
page read and write
1B725000
heap
page read and write
2714000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page read and write
1B68B000
heap
page read and write
2B33000
trusted library allocation
page read and write
1650000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
7FF848DEC000
trusted library allocation
page execute and read and write
7FF848F2C000
trusted library allocation
page read and write
19E80CEF000
heap
page read and write
2B17000
trusted library allocation
page read and write
3216000
trusted library allocation
page read and write
1AFF4000
unkown
page readonly
6E4000
heap
page read and write
2607000
trusted library allocation
page read and write
1B0F7000
heap
page read and write
1700000
heap
page read and write
2EEC000
trusted library allocation
page read and write
B70000
heap
page read and write
3076000
trusted library allocation
page read and write
7FF848F5E000
trusted library allocation
page read and write
25A0000
trusted library allocation
page read and write
12E7000
heap
page read and write
7FF848D50000
trusted library allocation
page read and write
63B000
heap
page read and write
1240000
trusted library allocation
page read and write
130C7000
trusted library allocation
page read and write
2A86A339000
direct allocation
page read and write
3214000
trusted library allocation
page read and write
7FF848E26000
trusted library allocation
page read and write
1C002000
heap
page read and write
314F000
trusted library allocation
page read and write
7FF848F15000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
25C2000
trusted library allocation
page read and write
14C0000
heap
page read and write
7FF848E70000
trusted library allocation
page execute and read and write
19E80CEF000
heap
page read and write
1302000
heap
page read and write
7FF848F70000
trusted library allocation
page read and write
7FF848E16000
trusted library allocation
page execute and read and write
3623000
trusted library allocation
page read and write
28BB000
trusted library allocation
page read and write
7FF848D4D000
trusted library allocation
page execute and read and write
36A0000
trusted library allocation
page read and write
7FF848F24000
trusted library allocation
page read and write
3190000
trusted library allocation
page read and write
1E5E76E5000
heap
page read and write
12531000
trusted library allocation
page read and write
34AF000
trusted library allocation
page read and write
1702000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
1ACEA2C0000
heap
page read and write
7FF848D70000
trusted library allocation
page read and write
2A86A173000
heap
page read and write
12B85000
trusted library allocation
page read and write
2ECB000
trusted library allocation
page read and write
7FF848F8D000
trusted library allocation
page read and write
1C7FE000
stack
page read and write
34CF000
trusted library allocation
page read and write
7FF848D5D000
trusted library allocation
page execute and read and write
1E5E76E0000
heap
page read and write
7FF849270000
trusted library allocation
page execute and read and write
7AD000
heap
page read and write
14FE000
stack
page read and write
19E8260B000
direct allocation
page read and write
DB0000
heap
page read and write
3221000
trusted library allocation
page read and write
13051000
trusted library allocation
page read and write
2307693B000
heap
page read and write
2AEB000
trusted library allocation
page read and write
7FF848D90000
trusted library allocation
page read and write
7FF848D4D000
trusted library allocation
page execute and read and write
1E602600000
heap
page read and write
1613000
heap
page read and write
27E4000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
2EDD000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
290D000
trusted library allocation
page read and write
30DB000
trusted library allocation
page read and write
27DD000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page read and write
25C9000
trusted library allocation
page read and write
9F0000
trusted library allocation
page read and write
2A86BC80000
direct allocation
page read and write
7FF848F7E000
trusted library allocation
page read and write
1B7A6000
heap
page read and write
2ECA000
heap
page read and write
38AF000
trusted library allocation
page read and write
2A86BC85000
direct allocation
page read and write
304F000
trusted library allocation
page read and write
2A86BC0B000
direct allocation
page read and write
2A86A128000
heap
page read and write
34A2000
trusted library allocation
page read and write
1C5FE000
stack
page read and write
33E000
stack
page read and write
1B030000
heap
page execute and read and write
1260000
trusted library allocation
page read and write
7FF848DBC000
trusted library allocation
page execute and read and write
12B70000
trusted library allocation
page read and write
127E1000
trusted library allocation
page read and write
3113000
trusted library allocation
page read and write
31FD000
trusted library allocation
page read and write
15F0000
trusted library allocation
page read and write
1643000
heap
page read and write
2C1E000
trusted library allocation
page read and write
13351000
trusted library allocation
page read and write
2701000
trusted library allocation
page read and write
870000
heap
page read and write
1162000
heap
page read and write
7FF848EFC000
trusted library allocation
page read and write
1B62E000
heap
page read and write
7FF848F0C000
trusted library allocation
page read and write
19DF000
stack
page read and write
62E000
heap
page read and write
12A6B000
trusted library allocation
page read and write
19E80DAB000
direct allocation
page read and write
7FF848F33000
trusted library allocation
page read and write
1B647000
heap
page read and write
7FF848D63000
trusted library allocation
page execute and read and write
7FF848E20000
trusted library allocation
page read and write
19E80C73000
heap
page read and write
1C04D000
stack
page read and write
19E80B90000
heap
page read and write
7FF848E81000
trusted library allocation
page execute and read and write
1245000
heap
page read and write
2593000
trusted library allocation
page read and write
6FE000
heap
page read and write
2DA1000
trusted library allocation
page read and write
25A6000
trusted library allocation
page read and write
129CF000
trusted library allocation
page read and write
29DD000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
29F4000
trusted library allocation
page read and write
290B000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
7FF848F28000
trusted library allocation
page read and write
27EC000
trusted library allocation
page read and write
1702000
heap
page read and write
28A1000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page execute and read and write
2F59000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page read and write
132EF000
trusted library allocation
page read and write
7FF849237000
trusted library allocation
page read and write
7FF848F08000
trusted library allocation
page read and write
7FF848F54000
trusted library allocation
page read and write
30C9000
trusted library allocation
page read and write
7FF848F0C000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
12681000
trusted library allocation
page read and write
1251000
heap
page read and write
7FF8492E0000
trusted library allocation
page read and write
1ACEA081000
heap
page read and write
1370F000
trusted library allocation
page read and write
7FF848D43000
trusted library allocation
page execute and read and write
34DE000
stack
page read and write
3412000
trusted library allocation
page read and write
1A9DD000
stack
page read and write
7FF848D6B000
trusted library allocation
page execute and read and write
7FF848E90000
trusted library allocation
page execute and read and write
1BC3E000
stack
page read and write
3186000
trusted library allocation
page read and write
1BB3E000
stack
page read and write
1202000
heap
page read and write
DF5000
heap
page read and write
1B78C000
heap
page read and write
7FF848D44000
trusted library allocation
page read and write
1B8FE000
stack
page read and write
1B63C000
heap
page read and write
2A86A104000
heap
page read and write
7FF848FA0000
trusted library allocation
page execute and read and write
7FF849260000
trusted library allocation
page read and write
7FF848E60000
trusted library allocation
page execute and read and write
A3C000
heap
page read and write
7FF848F10000
trusted library allocation
page read and write
1290A000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page read and write
27C5000
trusted library allocation
page read and write
710000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
127CF000
trusted library allocation
page read and write
1C8FE000
stack
page read and write
24CF000
stack
page read and write
19E80CB5000
heap
page read and write
1B0DD000
heap
page read and write
E4F000
heap
page read and write
F02000
heap
page read and write
12C8000
heap
page read and write
13041000
trusted library allocation
page read and write
1B8ED000
stack
page read and write
25A1000
trusted library allocation
page read and write
1BE02000
heap
page read and write
1ACEA081000
heap
page read and write
DD0000
heap
page read and write
19E80D93000
direct allocation
page read and write
12EE000
heap
page read and write
321F000
trusted library allocation
page read and write
7FF848D43000
trusted library allocation
page execute and read and write
1B393000
heap
page execute and read and write
7FF848EFA000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
7FF848D63000
trusted library allocation
page execute and read and write
3D53DDC000
stack
page read and write
12A64000
trusted library allocation
page read and write
1B9E0000
heap
page execute and read and write
2AD5000
trusted library allocation
page read and write
7FF848D48000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page read and write
12FD1000
trusted library allocation
page read and write
7FF848F93000
trusted library allocation
page read and write
1BD3E000
stack
page read and write
2AD18A20000
heap
page read and write
3E0000
heap
page read and write
2872000
trusted library allocation
page read and write
1B702000
heap
page execute and read and write
7FF848E50000
trusted library allocation
page execute and read and write
25A9000
trusted library allocation
page read and write
24D9000
trusted library allocation
page read and write
7FF848EF6000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page execute and read and write
7FF848D44000
trusted library allocation
page read and write
317F000
trusted library allocation
page read and write
1C24F000
heap
page read and write
1285E000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page execute and read and write
7FF848F8E000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page execute and read and write
A00000
heap
page read and write
1BE3E000
stack
page read and write
1B66B000
heap
page read and write
1B602000
heap
page read and write
1AE1F000
stack
page read and write
A22000
heap
page read and write
2B13000
trusted library allocation
page read and write
2DB1000
trusted library allocation
page read and write
3138000
trusted library allocation
page read and write
7FF848D43000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
DC0000
trusted library allocation
page read and write
12850000
trusted library allocation
page read and write
16D8000
heap
page read and write
134E7000
trusted library allocation
page read and write
27FF000
trusted library allocation
page read and write
E3B000
heap
page read and write
7FF848F08000
trusted library allocation
page read and write
29DB000
trusted library allocation
page read and write
1C244000
heap
page read and write
1B7B0000
heap
page read and write
320E000
trusted library allocation
page read and write
7FF848E60000
trusted library allocation
page execute and read and write
175DBE59000
heap
page read and write
1ACEA071000
heap
page read and write
1B48A000
stack
page read and write
There are 1853 hidden memdumps, click here to show them.