IOC Report
fdsN8iw6WG.exe

loading gif

Files

File Path
Type
Category
Malicious
fdsN8iw6WG.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Microsoft\sihost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Microsoft\sihost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Windows Portable Devices\dEhCbXEAIUCUplvbdoWVtmGx.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Portable Devices\dEhCbXEAIUCUplvbdoWVtmGx.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Windows Sidebar\Shared Gadgets\RuntimeBroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Sidebar\Shared Gadgets\RuntimeBroker.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\fdsN8iw6WG.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\V10Cviyryl.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\diacazft\diacazft.cmdline
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
malicious
C:\Users\user\Desktop\FMuYuXzk.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\PvOoeAES.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\YehEOcJA.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\eWKdrIOo.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\iMBUyFOh.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\nASSbBeV.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\qcbjycVR.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\dEhCbXEAIUCUplvbdoWVtmGx.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\System32\SecurityHealthSystray.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\CSC13EEC4598AE74082ADE16A1F2183AE80.TMP
MSVC .res
dropped
C:\Program Files\Microsoft\66fc9ff0ee96c2
ASCII text, with very long lines (332), with no line terminators
dropped
C:\Program Files\Windows Portable Devices\9e0136ccaf7772
ASCII text, with very long lines (915), with no line terminators
dropped
C:\Program Files\Windows Sidebar\Shared Gadgets\9e8d7a4ca61bd9
ASCII text, with very long lines (465), with no line terminators
dropped
C:\Users\user\9e0136ccaf7772
MGR bitmap, modern format, 8-bit aligned
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\RuntimeBroker.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dEhCbXEAIUCUplvbdoWVtmGx.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\sihost.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\3a401533b82e2cb9c9bc589aa6ee01300983b035
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\AY9NvOnlHp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\RES34F8.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x6d0, 10 symbols, created Fri Oct 4 16:46:30 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\RES38D0.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x6ec, 10 symbols, created Fri Oct 4 16:46:31 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0tajbc0f.e5j.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2dobmehz.24v.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3itvei3k.yet.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3j3f3kin.tx4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_44ldsf1b.pc4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4bqqyszl.zwx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4jjukrcd.43p.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4tcnu5by.qsy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cg4pdg1a.qja.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cjhhrvcz.li2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_czye3rc5.a23.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_duylgtxd.hgo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ertewja2.3zs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j4k2tofd.bky.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jj5zh10i.fgl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kcqwktpf.3r5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kuzo2tp4.ws0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lmeqz20l.ga1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mcdixpv2.uns.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ryq3vxmq.oki.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v0heos1j.43u.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vzeota2v.du2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wylfqmjf.10h.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z5s2x1ud.no5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\diacazft\diacazft.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\Temp\diacazft\diacazft.out
Unicode text, UTF-8 (with BOM) text, with very long lines (346), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\khjlbg4u\khjlbg4u.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\Temp\khjlbg4u\khjlbg4u.cmdline
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\khjlbg4u\khjlbg4u.out
Unicode text, UTF-8 (with BOM) text, with very long lines (331), with CRLF, CR line terminators
modified
C:\Users\user\Desktop\1549a610452dc1
ASCII text, with very long lines (809), with no line terminators
dropped
C:\Users\user\dEhCbXEAIUCUplvbdoWVtmGx.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Windows\System32\CSC8295EB2BCC8D4700AEF6D1253A133871.TMP
MSVC .res
dropped
\Device\Null
ASCII text
dropped
There are 57 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\fdsN8iw6WG.exe
"C:\Users\user\Desktop\fdsN8iw6WG.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\diacazft\diacazft.cmdline"
malicious
C:\Program Files\Microsoft\sihost.exe
"C:\Program Files\Microsoft\sihost.exe"
malicious
C:\Program Files\Microsoft\sihost.exe
"C:\Program Files\Microsoft\sihost.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\khjlbg4u\khjlbg4u.cmdline"
malicious
C:\Program Files\Windows Portable Devices\dEhCbXEAIUCUplvbdoWVtmGx.exe
"C:\Program Files\Windows Portable Devices\dEhCbXEAIUCUplvbdoWVtmGx.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft\sihost.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\dEhCbXEAIUCUplvbdoWVtmGx.exe'
malicious
C:\Program Files\Windows Portable Devices\dEhCbXEAIUCUplvbdoWVtmGx.exe
"C:\Program Files\Windows Portable Devices\dEhCbXEAIUCUplvbdoWVtmGx.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Sidebar\Shared Gadgets\RuntimeBroker.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\user\dEhCbXEAIUCUplvbdoWVtmGx.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\dEhCbXEAIUCUplvbdoWVtmGx.exe'
malicious
C:\Users\user\Desktop\fdsN8iw6WG.exe
C:\Users\user\Desktop\fdsN8iw6WG.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\fdsN8iw6WG.exe'
malicious
C:\Users\user\Desktop\fdsN8iw6WG.exe
C:\Users\user\Desktop\fdsN8iw6WG.exe
malicious
C:\Program Files\Windows Sidebar\Shared Gadgets\RuntimeBroker.exe
"C:\Program Files\Windows Sidebar\Shared Gadgets\RuntimeBroker.exe"
malicious
C:\Program Files\Windows Sidebar\Shared Gadgets\RuntimeBroker.exe
"C:\Program Files\Windows Sidebar\Shared Gadgets\RuntimeBroker.exe"
malicious
C:\Program Files\Windows Portable Devices\dEhCbXEAIUCUplvbdoWVtmGx.exe
"C:\Program Files\Windows Portable Devices\dEhCbXEAIUCUplvbdoWVtmGx.exe"
malicious
C:\Program Files\Microsoft\sihost.exe
"C:\Program Files\Microsoft\sihost.exe"
malicious
C:\Program Files\Windows Portable Devices\dEhCbXEAIUCUplvbdoWVtmGx.exe
"C:\Program Files\Windows Portable Devices\dEhCbXEAIUCUplvbdoWVtmGx.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES34F8.tmp" "c:\Program Files (x86)\Microsoft\Edge\Application\CSC13EEC4598AE74082ADE16A1F2183AE80.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES38D0.tmp" "c:\Windows\System32\CSC8295EB2BCC8D4700AEF6D1253A133871.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\V10Cviyryl.bat"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 25 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://aka.ms/pscore68
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://github.com/Pester/Pester
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://www.micom/pkiops/Docs/ry.htm0
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
sihost
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
dEhCbXEAIUCUplvbdoWVtmGx
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
dEhCbXEAIUCUplvbdoWVtmGx
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RuntimeBroker
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RuntimeBroker
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
fdsN8iw6WG
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
fdsN8iw6WG
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
dEhCbXEAIUCUplvbdoWVtmGx
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
dEhCbXEAIUCUplvbdoWVtmGx
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
dEhCbXEAIUCUplvbdoWVtmGx
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
B52000
unkown
page readonly
malicious
1306D000
trusted library allocation
page read and write
malicious
132B7000
trusted library allocation
page read and write
142D000
heap
page read and write
7FF848D58000
trusted library allocation
page read and write
284C8810000
trusted library allocation
page read and write
132BAFFC000
heap
page read and write
2EA0000
unkown
page readonly
F1BCE3E000
stack
page read and write
7FF848DF0000
trusted library allocation
page read and write
132BC959000
direct allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
1354000
heap
page read and write
2A85000
trusted library allocation
page read and write
12F5000
heap
page read and write
40867BF000
stack
page read and write
C8133FF000
stack
page read and write
7FF848F52000
trusted library allocation
page read and write
322B000
trusted library allocation
page read and write
20500F6B000
trusted library allocation
page read and write
12737000
trusted library allocation
page read and write
1C0BF000
stack
page read and write
30C4000
trusted library allocation
page read and write
333F000
trusted library allocation
page read and write
132BAFEC000
heap
page read and write
936310E000
stack
page read and write
B50000
unkown
page readonly
31FB000
trusted library allocation
page read and write
3828000
trusted library allocation
page read and write
F62000
heap
page read and write
7FF848E26000
trusted library allocation
page execute and read and write
7FF848D94000
trusted library allocation
page read and write
2B5B000
trusted library allocation
page read and write
1BBFF000
stack
page read and write
2090D0B8000
trusted library allocation
page read and write
29BB000
trusted library allocation
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
7FF848DBC000
trusted library allocation
page execute and read and write
2090BF5B000
trusted library allocation
page read and write
342B000
trusted library allocation
page read and write
2739000
trusted library allocation
page read and write
1BD4E000
stack
page read and write
132B1000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page execute and read and write
387A000
trusted library allocation
page read and write
7FF848F74000
trusted library allocation
page read and write
276F000
trusted library allocation
page read and write
284C8860000
trusted library allocation
page read and write
12A31000
trusted library allocation
page read and write
2090CE75000
trusted library allocation
page read and write
1C102000
heap
page execute and read and write
7FF848D84000
trusted library allocation
page read and write
E39834E000
stack
page read and write
7FF848F2A000
trusted library allocation
page read and write
E3974FD000
stack
page read and write
936263C000
stack
page read and write
1B6A0000
heap
page read and write
1FB4863F000
heap
page read and write
7FF849250000
trusted library allocation
page read and write
4086CF8000
stack
page read and write
1290000
trusted library allocation
page read and write
256812A4000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page read and write
2B17000
trusted library allocation
page read and write
27A3000
trusted library allocation
page read and write
21885549000
trusted library allocation
page read and write
1580000
heap
page read and write
2477000
trusted library allocation
page read and write
398600E000
stack
page read and write
161F000
stack
page read and write
85E000
heap
page read and write
256813C0000
trusted library allocation
page read and write
2090D66B000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
7FF848E90000
trusted library allocation
page execute and read and write
274F000
trusted library allocation
page read and write
12D51000
trusted library allocation
page read and write
1D056000
heap
page read and write
1496000
heap
page read and write
1B302000
heap
page read and write
1418A9EF000
trusted library allocation
page read and write
7FF848F1A000
trusted library allocation
page read and write
1B928000
heap
page read and write
25680F82000
trusted library allocation
page read and write
2CD3000
trusted library allocation
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
7FF848D58000
trusted library allocation
page read and write
132BB03C000
heap
page read and write
132BC98B000
direct allocation
page read and write
3804000
trusted library allocation
page read and write
18D9DE70000
heap
page read and write
335A000
trusted library allocation
page read and write
E3975F6000
stack
page read and write
3327000
trusted library allocation
page read and write
E3983CC000
stack
page read and write
7FF848F64000
trusted library allocation
page read and write
284C6B0C000
heap
page read and write
2F4B000
trusted library allocation
page read and write
284C8440000
heap
page read and write
DB0000
heap
page read and write
7FF848D64000
trusted library allocation
page read and write
284C6C00000
heap
page read and write
3E0000
heap
page read and write
326E000
trusted library allocation
page read and write
284C8A51000
trusted library allocation
page read and write
284C6A54000
heap
page read and write
2C47000
trusted library allocation
page read and write
2D23000
trusted library allocation
page read and write
1418A9F3000
trusted library allocation
page read and write
323B000
trusted library allocation
page read and write
1418B2FB000
trusted library allocation
page read and write
7FF848F18000
trusted library allocation
page read and write
132BAF50000
heap
page read and write
3251000
trusted library allocation
page read and write
1C3A5000
heap
page read and write
F36000
heap
page read and write
20500F67000
trusted library allocation
page read and write
17F0000
heap
page read and write
1DCF674A000
heap
page read and write
325B000
trusted library allocation
page read and write
132BDA70000
direct allocation
page read and write
7FF848EF7000
trusted library allocation
page read and write
147A000
heap
page read and write
3116000
trusted library allocation
page read and write
936217F000
stack
page read and write
17E0000
trusted library allocation
page read and write
6484239000
stack
page read and write
340000
heap
page read and write
7FF848D44000
trusted library allocation
page read and write
7FF848F4C000
trusted library allocation
page read and write
2620000
heap
page read and write
A4C000
heap
page read and write
33FE000
trusted library allocation
page read and write
3E0000
trusted library allocation
page read and write
1B77E000
stack
page read and write
2C6B000
trusted library allocation
page read and write
15A0000
heap
page read and write
7FF848E90000
trusted library allocation
page execute and read and write
1C3B6000
heap
page read and write
3119000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page read and write
1C002000
heap
page read and write
341E000
trusted library allocation
page read and write
25680C06000
trusted library allocation
page read and write
936207E000
stack
page read and write
7FF848E90000
trusted library allocation
page execute and read and write
1428000
heap
page read and write
2090A170000
heap
page read and write
7FF848F50000
trusted library allocation
page read and write
171F000
stack
page read and write
7FF848EFA000
trusted library allocation
page read and write
18D9E1E0000
heap
page read and write
BED87B000
stack
page read and write
132BAFFA000
heap
page read and write
7FF848EF6000
trusted library allocation
page read and write
1FB4A133000
direct allocation
page read and write
383A000
trusted library allocation
page read and write
12831000
trusted library allocation
page read and write
F1BD0BE000
stack
page read and write
259C000
trusted library allocation
page read and write
1FB485EE000
heap
page read and write
37F2000
trusted library allocation
page read and write
127A000
heap
page read and write
132BB014000
heap
page read and write
E397477000
stack
page read and write
21884F60000
heap
page read and write
25AB000
trusted library allocation
page read and write
1C3DA000
heap
page read and write
1BEFF000
stack
page read and write
7FF848F8D000
trusted library allocation
page read and write
2AA0000
heap
page read and write
12F81000
trusted library allocation
page read and write
3069000
heap
page read and write
1FB487F9000
direct allocation
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
1FB485EA000
heap
page read and write
93626BE000
stack
page read and write
31A9000
trusted library allocation
page read and write
21884F90000
heap
page execute and read and write
2C49000
trusted library allocation
page read and write
27D6000
trusted library allocation
page read and write
1418AAA9000
trusted library allocation
page read and write
1DCF6650000
heap
page read and write
1B2CF000
stack
page read and write
34E0000
trusted library allocation
page read and write
20500F74000
trusted library allocation
page read and write
321F000
trusted library allocation
page read and write
132BDA53000
direct allocation
page read and write
E00000
heap
page read and write
7FF848F80000
trusted library allocation
page execute and read and write
132BCA70000
direct allocation
page read and write
28A2000
trusted library allocation
page read and write
1DCF6740000
heap
page read and write
7FF848F2C000
trusted library allocation
page read and write
7FF848DE0000
trusted library allocation
page read and write
7FF848F8D000
trusted library allocation
page read and write
7FF848D74000
trusted library allocation
page read and write
F1BCCFB000
stack
page read and write
1131000
stack
page read and write
1FB485F9000
heap
page read and write
7FF848F0C000
trusted library allocation
page read and write
31AC000
trusted library allocation
page read and write
1FB48646000
heap
page read and write
3985139000
stack
page read and write
12451000
trusted library allocation
page read and write
327F000
trusted library allocation
page read and write
334D000
trusted library allocation
page read and write
20501792000
trusted library allocation
page read and write
B2F000
stack
page read and write
1C0FB000
stack
page read and write
272C000
trusted library allocation
page read and write
1452000
heap
page read and write
7FF848D6B000
trusted library allocation
page execute and read and write
284C87A0000
trusted library allocation
page read and write
7FF848D5D000
trusted library allocation
page execute and read and write
7FF848F74000
trusted library allocation
page read and write
936330E000
stack
page read and write
4086EFE000
stack
page read and write
25680F93000
trusted library allocation
page read and write
590000
heap
page read and write
1C400000
heap
page read and write
1B8C1000
heap
page read and write
31A4000
trusted library allocation
page read and write
1BFBF000
stack
page read and write
7FF848F1A000
trusted library allocation
page read and write
1FB48645000
heap
page read and write
2090D7DA000
trusted library allocation
page read and write
2090D777000
trusted library allocation
page read and write
245B000
trusted library allocation
page read and write
323D000
trusted library allocation
page read and write
2EA2000
unkown
page readonly
31E9000
trusted library allocation
page read and write
12851000
trusted library allocation
page read and write
14187BD0000
heap
page read and write
6EC000
heap
page read and write
7FF84926A000
trusted library allocation
page read and write
287A000
trusted library allocation
page read and write
21883642000
heap
page read and write
1332C000
trusted library allocation
page read and write
1FB4862B000
heap
page read and write
1418AA85000
trusted library allocation
page read and write
7FF848D84000
trusted library allocation
page read and write
D20000
heap
page read and write
6483FFD000
stack
page read and write
1F5ACEE0000
heap
page read and write
F1BDC0E000
stack
page read and write
13461000
trusted library allocation
page read and write
1BAD2000
unkown
page readonly
7FF848D73000
trusted library allocation
page execute and read and write
7FF848D7D000
trusted library allocation
page execute and read and write
7FF848F90000
trusted library allocation
page read and write
2090D03C000
trusted library allocation
page read and write
1C423000
heap
page read and write
1B0CE000
stack
page read and write
7FF848F4C000
trusted library allocation
page read and write
1C37C000
stack
page read and write
7FF848FE0000
trusted library allocation
page read and write
27EE000
trusted library allocation
page read and write
398543C000
stack
page read and write
7FF848F23000
trusted library allocation
page read and write
DF0000
heap
page read and write
2B9D000
trusted library allocation
page read and write
E20000
heap
page read and write
1913000
heap
page read and write
2F1C000
trusted library allocation
page read and write
284C8C7A000
trusted library allocation
page read and write
269E000
stack
page read and write
2769000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
218835F0000
heap
page readonly
7FF848F5D000
trusted library allocation
page read and write
3985E0E000
stack
page read and write
7FF848D90000
trusted library allocation
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
275C000
trusted library allocation
page read and write
2729000
trusted library allocation
page read and write
7FF848E2C000
trusted library allocation
page execute and read and write
7FF848E90000
trusted library allocation
page execute and read and write
7FF848F1A000
trusted library allocation
page read and write
2589000
trusted library allocation
page read and write
13221000
trusted library allocation
page read and write
20500C00000
trusted library allocation
page read and write
2090D184000
trusted library allocation
page read and write
889000
heap
page read and write
848000
heap
page read and write
3250000
trusted library allocation
page read and write
1775000
heap
page read and write
3984CFF000
stack
page read and write
327F000
trusted library allocation
page read and write
20500D7E000
trusted library allocation
page read and write
7FF848F87000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page read and write
31E1000
trusted library allocation
page read and write
12DD7000
trusted library allocation
page read and write
7FF848D9B000
trusted library allocation
page execute and read and write
2050007A000
trusted library allocation
page read and write
F15000
heap
page read and write
2188539A000
trusted library allocation
page read and write
218835E0000
trusted library allocation
page read and write
1CB1E000
stack
page read and write
1FB48648000
heap
page read and write
7FF848F5C000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page execute and read and write
26A1000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page read and write
7FF848E2C000
trusted library allocation
page execute and read and write
7FF848D64000
trusted library allocation
page read and write
7FF848E16000
trusted library allocation
page read and write
25681161000
trusted library allocation
page read and write
132BB03D000
heap
page read and write
1FB4A070000
direct allocation
page read and write
284C9A14000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
1BBBE000
stack
page read and write
7FF848F37000
trusted library allocation
page read and write
6484136000
stack
page read and write
13391000
trusted library allocation
page read and write
218862B1000
trusted library allocation
page read and write
1418A792000
trusted library allocation
page read and write
7FF849280000
trusted library allocation
page read and write
7FF848F0C000
trusted library allocation
page read and write
21883644000
heap
page read and write
25680F7E000
trusted library allocation
page read and write
2568007F000
trusted library allocation
page read and write
2EE4000
trusted library allocation
page read and write
F5D000
heap
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
7FF848D8D000
trusted library allocation
page execute and read and write
7FF848F63000
trusted library allocation
page read and write
7FF848F27000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page execute and read and write
2F8E000
stack
page read and write
541000
stack
page read and write
143E000
heap
page read and write
F1BDC8D000
stack
page read and write
14189640000
trusted library allocation
page read and write
1447000
heap
page read and write
24FB000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page execute and read and write
7FF848D4D000
trusted library allocation
page execute and read and write
7FF848F33000
trusted library allocation
page read and write
C7333FC000
stack
page read and write
284C99E6000
trusted library allocation
page read and write
148B000
heap
page read and write
2090CF9F000
trusted library allocation
page read and write
7FF848F27000
trusted library allocation
page read and write
32C8000
trusted library allocation
page read and write
32FB000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
6A0000
heap
page read and write
7FF848D63000
trusted library allocation
page execute and read and write
7FF848D88000
trusted library allocation
page read and write
7FF848E1C000
trusted library allocation
page execute and read and write
1FB48890000
direct allocation
page read and write
20500F70000
trusted library allocation
page read and write
2EF3000
trusted library allocation
page read and write
2568178B000
trusted library allocation
page read and write
12F0000
heap
page read and write
7FF848D9D000
trusted library allocation
page execute and read and write
8B8000
heap
page read and write
7FF849260000
trusted library allocation
page read and write
3206000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
284C6C60000
heap
page read and write
342F000
trusted library allocation
page read and write
C812FBB000
stack
page read and write
2721000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
1321000
heap
page read and write
D60000
heap
page read and write
25CB000
trusted library allocation
page read and write
11A0000
heap
page read and write
2C03000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page execute and read and write
1AEC0000
heap
page read and write
7FF849310000
trusted library allocation
page read and write
7FF848EF8000
trusted library allocation
page read and write
1BDBE000
stack
page read and write
27EA000
trusted library allocation
page read and write
290D000
trusted library allocation
page read and write
B30000
heap
page read and write
133A9000
trusted library allocation
page read and write
14189AE5000
trusted library allocation
page read and write
7FF848D44000
trusted library allocation
page read and write
31E9000
heap
page read and write
279F000
trusted library allocation
page read and write
1BAFE000
stack
page read and write
284C8AD5000
trusted library allocation
page read and write
7FF848F16000
trusted library allocation
page read and write
B80000
heap
page read and write
2090CE6C000
trusted library allocation
page read and write
1FB48590000
heap
page read and write
2090A135000
heap
page read and write
31B6000
trusted library allocation
page read and write
12C61000
trusted library allocation
page read and write
E3978FE000
stack
page read and write
3310000
trusted library allocation
page read and write
21883510000
heap
page read and write
2450000
heap
page read and write
5E0000
heap
page read and write
1418AB82000
trusted library allocation
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
14187C6C000
heap
page read and write
14187BF0000
trusted library section
page read and write
25680C2A000
trusted library allocation
page read and write
1FB485FD000
heap
page read and write
7FF848F03000
trusted library allocation
page read and write
1285000
heap
page read and write
1B901000
heap
page read and write
21883683000
heap
page read and write
1C443000
heap
page read and write
3221000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
127D000
heap
page read and write
14187C98000
heap
page read and write
132BB045000
heap
page read and write
1469000
heap
page read and write
2C91000
trusted library allocation
page read and write
780000
heap
page read and write
3984C7F000
unkown
page read and write
1FB4861B000
heap
page read and write
7FF848F07000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
2736000
trusted library allocation
page read and write
1BEBE000
stack
page read and write
2090A178000
heap
page read and write
7FF848D54000
trusted library allocation
page read and write
7FF848DE6000
trusted library allocation
page read and write
331A000
trusted library allocation
page read and write
284C6A5E000
heap
page read and write
2090A0B0000
heap
page read and write
7FF848F4C000
trusted library allocation
page read and write
284C8857000
heap
page execute and read and write
1D044000
heap
page read and write
132BC977000
direct allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
8EB000
heap
page read and write
2C60000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page read and write
132BCA10000
direct allocation
page read and write
7FF848F8E000
trusted library allocation
page read and write
3079000
trusted library allocation
page read and write
1AF8E000
stack
page read and write
7FF848F64000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page execute and read and write
2090CC0B000
trusted library allocation
page read and write
2F93000
trusted library allocation
page read and write
6484F0D000
stack
page read and write
141895B0000
trusted library allocation
page read and write
1D054000
heap
page read and write
1BF6F000
stack
page read and write
2576000
trusted library allocation
page read and write
398523E000
stack
page read and write
21886366000
trusted library allocation
page read and write
2A21000
trusted library allocation
page read and write
335E000
trusted library allocation
page read and write
1280000
heap
page read and write
7FF848F8D000
trusted library allocation
page read and write
13101000
trusted library allocation
page read and write
1F5ACF60000
heap
page read and write
132BDA30000
direct allocation
page read and write
31BA000
trusted library allocation
page read and write
7FF848F94000
trusted library allocation
page read and write
1BB10000
unkown
page readonly
2B20000
trusted library allocation
page read and write
7FF848F18000
trusted library allocation
page read and write
1802000
heap
page read and write
25681958000
trusted library allocation
page read and write
2F2D000
trusted library allocation
page read and write
2F51000
trusted library allocation
page read and write
2740000
trusted library allocation
page read and write
7FF848DBC000
trusted library allocation
page execute and read and write
126D1000
trusted library allocation
page read and write
27EC000
trusted library allocation
page read and write
1BBB3000
heap
page execute and read and write
27E6000
trusted library allocation
page read and write
1AFAD000
stack
page read and write
132BAFF9000
heap
page read and write
2B79000
trusted library allocation
page read and write
7FF848F82000
trusted library allocation
page read and write
359D000
trusted library allocation
page read and write
EC0000
heap
page read and write
7FF848ED0000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
2DFD000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
25681306000
trusted library allocation
page read and write
7FF848D32000
trusted library allocation
page read and write
1B2F0000
heap
page read and write
2C5E000
stack
page read and write
12457000
trusted library allocation
page read and write
130E000
heap
page read and write
311B000
trusted library allocation
page read and write
21AACC00000
heap
page read and write
1418A9FC000
trusted library allocation
page read and write
1FB48610000
heap
page read and write
7FF848F37000
trusted library allocation
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
1BB20000
heap
page execute and read and write
7FF848F90000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page read and write
950D8FC000
stack
page read and write
280A000
trusted library allocation
page read and write
7FF848F74000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
2E40000
heap
page read and write
7FF848F30000
trusted library allocation
page read and write
3697000
trusted library allocation
page read and write
1B976000
heap
page read and write
7FF848F30000
trusted library allocation
page read and write
3985F8C000
stack
page read and write
7FF848F94000
trusted library allocation
page read and write
E3972FE000
stack
page read and write
7FF848D4D000
trusted library allocation
page execute and read and write
33E7000
trusted library allocation
page read and write
E396F13000
stack
page read and write
1F5ACDC0000
heap
page read and write
4087CCC000
stack
page read and write
1B890000
heap
page read and write
284C978E000
trusted library allocation
page read and write
1540000
trusted library allocation
page read and write
21883570000
heap
page read and write
7FF848F50000
trusted library allocation
page read and write
1FB485FA000
heap
page read and write
7FF848D73000
trusted library allocation
page read and write
3150000
heap
page execute and read and write
2090CE60000
trusted library allocation
page read and write
2F2F000
trusted library allocation
page read and write
336F000
trusted library allocation
page read and write
2090CEE5000
trusted library allocation
page read and write
14189D9C000
trusted library allocation
page read and write
7FF849290000
trusted library allocation
page execute and read and write
7FF848F30000
trusted library allocation
page read and write
284C6C20000
heap
page read and write
1AD6E189000
heap
page read and write
37A7000
trusted library allocation
page read and write
7FF848F83000
trusted library allocation
page read and write
64844BB000
stack
page read and write
7FF848F84000
trusted library allocation
page read and write
1005000
heap
page read and write
287B000
trusted library allocation
page read and write
2783000
trusted library allocation
page read and write
2B19000
trusted library allocation
page read and write
C73367F000
stack
page read and write
1435000
heap
page read and write
2188365C000
heap
page read and write
437BAFE000
stack
page read and write
25680B19000
trusted library allocation
page read and write
887000
heap
page read and write
7FF848F5E000
trusted library allocation
page read and write
7FF848E80000
trusted library allocation
page execute and read and write
1B97E000
stack
page read and write
7FF848D60000
trusted library allocation
page read and write
1902000
heap
page read and write
146D000
heap
page read and write
7FF848FA4000
trusted library allocation
page read and write
1CA0B000
stack
page read and write
7FF848F44000
trusted library allocation
page read and write
2747000
trusted library allocation
page read and write
7FF848F28000
trusted library allocation
page read and write
3872000
trusted library allocation
page read and write
20500F63000
trusted library allocation
page read and write
3790000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
7FF848D83000
trusted library allocation
page read and write
27C3000
trusted library allocation
page read and write
284C6A56000
heap
page read and write
2808000
trusted library allocation
page read and write
20500001000
trusted library allocation
page read and write
1488000
heap
page read and write
B39000
heap
page read and write
C7E000
stack
page read and write
2050195F000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
1FB4864E000
heap
page read and write
218860FA000
trusted library allocation
page read and write
132D1000
trusted library allocation
page read and write
1ADD0000
heap
page read and write
276D000
trusted library allocation
page read and write
7FF848F5D000
trusted library allocation
page read and write
132BB015000
heap
page read and write
2457000
trusted library allocation
page read and write
3984DF9000
stack
page read and write
33EB000
trusted library allocation
page read and write
1BBC3000
heap
page read and write
307BFF000
stack
page read and write
B40000
trusted library allocation
page read and write
218866E1000
trusted library allocation
page read and write
7FF848D8C000
trusted library allocation
page execute and read and write
2C4D000
trusted library allocation
page read and write
31E0000
heap
page read and write
21886659000
trusted library allocation
page read and write
1BCFF000
stack
page read and write
7FF848F80000
trusted library allocation
page execute and read and write
2B7B000
trusted library allocation
page read and write
284C9A0C000
trusted library allocation
page read and write
284C88B0000
heap
page read and write
35CD000
trusted library allocation
page read and write
33DA000
trusted library allocation
page read and write
1685000
heap
page read and write
7FF848E16000
trusted library allocation
page execute and read and write
24A4000
trusted library allocation
page read and write
13341000
trusted library allocation
page read and write
2861000
trusted library allocation
page read and write
1445000
heap
page read and write
3420000
trusted library allocation
page read and write
284C6A6C000
heap
page read and write
7FF848D64000
trusted library allocation
page read and write
32BB000
trusted library allocation
page read and write
1FB4A135000
direct allocation
page read and write
1502000
heap
page read and write
7FF848F8E000
trusted library allocation
page read and write
1C40C000
heap
page read and write
101F000
heap
page read and write
E3984CC000
stack
page read and write
284C8850000
heap
page execute and read and write
3786000
trusted library allocation
page read and write
2090A1F7000
heap
page read and write
7FF848F70000
trusted library allocation
page read and write
1C6FE000
stack
page read and write
284C9C29000
trusted library allocation
page read and write
15F0000
heap
page execute and read and write
218835A0000
trusted library section
page read and write
33FA000
trusted library allocation
page read and write
28A0000
trusted library allocation
page read and write
2644000
trusted library allocation
page read and write
2B1B000
trusted library allocation
page read and write
132BDA50000
direct allocation
page read and write
2188631D000
trusted library allocation
page read and write
18D9DEA9000
heap
page read and write
1418A6C2000
trusted library allocation
page read and write
388D000
trusted library allocation
page read and write
7FF848D64000
trusted library allocation
page read and write
284C8410000
heap
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
7FF848D5D000
trusted library allocation
page execute and read and write
39851BC000
stack
page read and write
24F9000
trusted library allocation
page read and write
1265000
heap
page read and write
1DCF6570000
heap
page read and write
7FF848E80000
trusted library allocation
page execute and read and write
1418AC39000
trusted library allocation
page read and write
101B000
heap
page read and write
D02000
heap
page read and write
7FF848F26000
trusted library allocation
page read and write
340B000
trusted library allocation
page read and write
1085000
heap
page read and write
2090BE80000
heap
page read and write
B52000
unkown
page readonly
7FF848D94000
trusted library allocation
page read and write
1BC40000
heap
page read and write
1418A9E3000
trusted library allocation
page read and write
2090A155000
heap
page read and write
132BC990000
direct allocation
page read and write
21883600000
heap
page read and write
2861000
trusted library allocation
page read and write
EE1000
stack
page read and write
21883648000
heap
page read and write
DF9000
heap
page read and write
1B341000
heap
page read and write
3000000
heap
page execute and read and write
12DD1000
trusted library allocation
page read and write
7FF848F82000
trusted library allocation
page read and write
7FF848D9C000
trusted library allocation
page execute and read and write
5C0000
heap
page read and write
1240000
heap
page read and write
384E000
trusted library allocation
page read and write
7FF848D84000
trusted library allocation
page read and write
128E1000
trusted library allocation
page read and write
27FD000
trusted library allocation
page read and write
7FF848E16000
trusted library allocation
page read and write
28AD000
trusted library allocation
page read and write
2590000
heap
page read and write
1B65E000
stack
page read and write
4086A7E000
stack
page read and write
7FF848DEC000
trusted library allocation
page execute and read and write
7FF848D83000
trusted library allocation
page read and write
2581000
trusted library allocation
page read and write
2C41000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page execute and read and write
1AFF0000
trusted library allocation
page read and write
218862A0000
trusted library allocation
page read and write
7FF848F09000
trusted library allocation
page read and write
2090D1E5000
trusted library allocation
page read and write
1C545000
heap
page read and write
218835B5000
heap
page read and write
B85000
unkown
page readonly
2FBE000
stack
page read and write
7FF848EE6000
trusted library allocation
page read and write
7FF848F3D000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page read and write
132BB057000
heap
page read and write
4086BF9000
stack
page read and write
7FF848F7D000
trusted library allocation
page read and write
6483C73000
stack
page read and write
1FB485FB000
heap
page read and write
3231000
trusted library allocation
page read and write
7FF848F28000
trusted library allocation
page read and write
2867000
trusted library allocation
page read and write
1220000
heap
page read and write
37EA000
trusted library allocation
page read and write
260B000
trusted library allocation
page read and write
FA1000
heap
page read and write
13201000
trusted library allocation
page read and write
93625BF000
stack
page read and write
7FF848F50000
trusted library allocation
page read and write
BED9FF000
stack
page read and write
14189710000
heap
page read and write
20500C3D000
trusted library allocation
page read and write
1510000
heap
page read and write
5A0000
heap
page read and write
3814000
trusted library allocation
page read and write
1DCF6785000
heap
page read and write
1AD6E520000
heap
page read and write
25680F8F000
trusted library allocation
page read and write
1340000
heap
page read and write
F1F000
heap
page read and write
E3976F8000
stack
page read and write
4086C7D000
stack
page read and write
2737000
trusted library allocation
page read and write
C7336FF000
stack
page read and write
2B0E000
stack
page read and write
284C96B6000
trusted library allocation
page read and write
8C043F5000
stack
page read and write
1418AA79000
trusted library allocation
page read and write
3077F4000
stack
page read and write
21886B50000
trusted library allocation
page read and write
670000
trusted library allocation
page read and write
10E1000
stack
page read and write
1FB48606000
heap
page read and write
25F7000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
7FF848F2C000
trusted library allocation
page read and write
7FF848F83000
trusted library allocation
page read and write
936320D000
stack
page read and write
7FF848E16000
trusted library allocation
page read and write
1220000
heap
page read and write
126A1000
trusted library allocation
page read and write
256810BF000
trusted library allocation
page read and write
284C96A8000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page read and write
F1BDE0E000
stack
page read and write
4086F7F000
stack
page read and write
1418B2D5000
trusted library allocation
page read and write
336D000
trusted library allocation
page read and write
284C99E2000
trusted library allocation
page read and write
20500C05000
trusted library allocation
page read and write
37FC000
trusted library allocation
page read and write
370000
heap
page read and write
1240000
heap
page read and write
CE1000
stack
page read and write
648433E000
stack
page read and write
1FB4A210000
heap
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
DF0000
heap
page read and write
1C1FB000
stack
page read and write
2460000
trusted library allocation
page read and write
31DA000
trusted library allocation
page read and write
284C9D8C000
trusted library allocation
page read and write
21AACA18000
heap
page read and write
12FC1000
trusted library allocation
page read and write
31EF000
trusted library allocation
page read and write
7FF848D5D000
trusted library allocation
page execute and read and write
28AF000
trusted library allocation
page read and write
284C87E0000
trusted library allocation
page read and write
2090BE60000
trusted library allocation
page read and write
284C8445000
heap
page read and write
DC0000
heap
page read and write
2050189E000
trusted library allocation
page read and write
132BAF10000
heap
page read and write
2880000
trusted library allocation
page read and write
1C433000
heap
page read and write
1428000
heap
page read and write
2090CB09000
trusted library allocation
page read and write
7FF848F28000
trusted library allocation
page read and write
341C000
trusted library allocation
page read and write
13B0000
trusted library allocation
page read and write
1BB46000
heap
page read and write
1BA20000
heap
page read and write
132BB055000
heap
page read and write
21885D71000
trusted library allocation
page read and write
13151000
trusted library allocation
page read and write
12601000
trusted library allocation
page read and write
14187C10000
heap
page read and write
289C000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
E397379000
stack
page read and write
32C1000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
7FF848F77000
trusted library allocation
page read and write
7FF848D9C000
trusted library allocation
page execute and read and write
27D9000
trusted library allocation
page read and write
280E000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
284C9E16000
trusted library allocation
page read and write
7FF848F0C000
trusted library allocation
page read and write
7FF848D72000
trusted library allocation
page read and write
7FF848E50000
trusted library allocation
page execute and read and write
1FB485F1000
heap
page read and write
12B11000
trusted library allocation
page read and write
7FF848F9D000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page read and write
1AEC0000
heap
page execute and read and write
1A9DD000
stack
page read and write
1DCF6670000
heap
page read and write
1C48D000
heap
page read and write
2B59000
trusted library allocation
page read and write
1FB48610000
heap
page read and write
6B0000
heap
page read and write
14187C93000
heap
page read and write
25680A53000
trusted library allocation
page read and write
31CB000
trusted library allocation
page read and write
2A7B000
trusted library allocation
page read and write
127A1000
trusted library allocation
page read and write
408673F000
unkown
page read and write
7FF848F74000
trusted library allocation
page read and write
2EF6000
trusted library allocation
page read and write
F90000
heap
page read and write
18B0000
heap
page read and write
1B67E000
stack
page read and write
1BE4F000
stack
page read and write
2B8E000
trusted library allocation
page read and write
A20000
heap
page read and write
F70000
heap
page read and write
7FF848D40000
trusted library allocation
page read and write
F80000
heap
page read and write
20501038000
trusted library allocation
page read and write
335C000
trusted library allocation
page read and write
7FF848F37000
trusted library allocation
page read and write
1FB485F0000
heap
page read and write
273A000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
7FF848E46000
trusted library allocation
page execute and read and write
64841BC000
stack
page read and write
21AACDD5000
heap
page read and write
12461000
trusted library allocation
page read and write
7FF848F33000
trusted library allocation
page read and write
3060000
heap
page read and write
2716000
trusted library allocation
page read and write
1FB48813000
direct allocation
page read and write
1FB4A110000
direct allocation
page read and write
DF5000
heap
page read and write
218863DF000
trusted library allocation
page read and write
1585000
heap
page read and write
1B87E000
stack
page read and write
7FF849320000
trusted library allocation
page read and write
284C88CE000
heap
page read and write
7FF848FA0000
trusted library allocation
page execute and read and write
1B6C8000
heap
page read and write
7FF848EFA000
trusted library allocation
page read and write
2C7E000
trusted library allocation
page read and write
7FF848F84000
trusted library allocation
page read and write
3077000
trusted library allocation
page read and write
132BCAB0000
heap
page read and write
132BC930000
direct allocation
page read and write
1B570000
heap
page execute and read and write
133AC000
trusted library allocation
page read and write
14189650000
heap
page execute and read and write
21886C77000
trusted library allocation
page read and write
BFF000
stack
page read and write
1C3BC000
heap
page read and write
1900000
heap
page read and write
7FF848F40000
trusted library allocation
page read and write
21886B8F000
trusted library allocation
page read and write
30EF000
trusted library allocation
page read and write
288D000
trusted library allocation
page read and write
281D000
trusted library allocation
page read and write
7FF848F74000
trusted library allocation
page read and write
1120000
heap
page read and write
7FF848D73000
trusted library allocation
page read and write
6483E79000
stack
page read and write
132BAFFC000
heap
page read and write
284C9A80000
trusted library allocation
page read and write
1B961000
heap
page read and write
7FF848F44000
trusted library allocation
page read and write
6484078000
stack
page read and write
7FF848F7E000
trusted library allocation
page read and write
13F0000
trusted library allocation
page read and write
C8132FF000
unkown
page read and write
3261000
trusted library allocation
page read and write
1418AAF2000
trusted library allocation
page read and write
1FB4A0BD000
direct allocation
page read and write
1418A68C000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
8C045FE000
stack
page read and write
218835B0000
heap
page read and write
1418B35E000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
F00000
heap
page read and write
5E0000
heap
page read and write
2B9F000
trusted library allocation
page read and write
2090D219000
trusted library allocation
page read and write
1300000
heap
page read and write
14189600000
trusted library allocation
page read and write
7FF848D78000
trusted library allocation
page read and write
284C967E000
trusted library allocation
page read and write
21883590000
trusted library section
page read and write
7FF848F6D000
trusted library allocation
page read and write
3473000
trusted library allocation
page read and write
320B000
trusted library allocation
page read and write
2E49000
heap
page read and write
218860BF000
trusted library allocation
page read and write
18EF000
stack
page read and write
25A7000
trusted library allocation
page read and write
1FB48608000
heap
page read and write
284C87D0000
heap
page readonly
3687000
trusted library allocation
page read and write
2F29000
trusted library allocation
page read and write
14187B60000
heap
page read and write
3299000
trusted library allocation
page read and write
7FF848F27000
trusted library allocation
page read and write
7FF848D4D000
trusted library allocation
page execute and read and write
7FF848F3C000
trusted library allocation
page read and write
7FF848EF8000
trusted library allocation
page read and write
284C94A2000
trusted library allocation
page read and write
7FF848F6D000
trusted library allocation
page read and write
1445000
heap
page read and write
2090BED0000
heap
page execute and read and write
25680F8B000
trusted library allocation
page read and write
3296000
trusted library allocation
page read and write
2188665E000
trusted library allocation
page read and write
246B000
trusted library allocation
page read and write
3259000
trusted library allocation
page read and write
1200000
heap
page read and write
398600C000
stack
page read and write
13081000
trusted library allocation
page read and write
360000
heap
page read and write
3110000
trusted library allocation
page read and write
132BB047000
heap
page read and write
1660000
heap
page read and write
2090D839000
trusted library allocation
page read and write
64842BE000
stack
page read and write
7FF848D9B000
trusted library allocation
page execute and read and write
7FF848D4D000
trusted library allocation
page execute and read and write
7FF848F87000
trusted library allocation
page read and write
15E5000
heap
page read and write
1D43F000
stack
page read and write
2F2B000
trusted library allocation
page read and write
1DCF6781000
heap
page read and write
284C9AAD000
trusted library allocation
page read and write
7FF848D5B000
trusted library allocation
page execute and read and write
132BAF40000
heap
page read and write
3810000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page read and write
7FF848F1C000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page read and write
3984EF9000
stack
page read and write
132BAFEC000
heap
page read and write
3196000
trusted library allocation
page read and write
2738000
trusted library allocation
page read and write
7FF848D73000
trusted library allocation
page read and write
284C9671000
trusted library allocation
page read and write
7FF848D74000
trusted library allocation
page read and write
21884FD5000
heap
page read and write
1D000000
heap
page read and write
2090A110000
heap
page read and write
93622F8000
stack
page read and write
218835C0000
trusted library allocation
page read and write
2BE1000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
18D9DEA0000
heap
page read and write
9361D5F000
unkown
page read and write
3866000
trusted library allocation
page read and write
AE1000
stack
page read and write
1336A000
trusted library allocation
page read and write
132BB00F000
heap
page read and write
F1D000
heap
page read and write
10DE000
stack
page read and write
7FF848D43000
trusted library allocation
page execute and read and write
825000
heap
page read and write
12CC1000
trusted library allocation
page read and write
311F000
stack
page read and write
2B6A000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page read and write
286B000
trusted library allocation
page read and write
132B1000
trusted library allocation
page read and write
F1BCF38000
stack
page read and write
145E000
heap
page read and write
F1BDE8E000
stack
page read and write
7FF849220000
trusted library allocation
page read and write
332D000
trusted library allocation
page read and write
7FF848F54000
trusted library allocation
page read and write
24C0000
heap
page read and write
6483F77000
stack
page read and write
12A6000
heap
page read and write
1200000
heap
page read and write
1FB488C0000
heap
page read and write
7FF848E20000
trusted library allocation
page execute and read and write
7FF848F80000
trusted library allocation
page read and write
2090A1BB000
heap
page read and write
7FF848DCC000
trusted library allocation
page execute and read and write
1230000
heap
page execute and read and write
2090A150000
heap
page read and write
2B7D000
trusted library allocation
page read and write
3826000
trusted library allocation
page read and write
31ED000
trusted library allocation
page read and write
BA0000
heap
page read and write
1610000
heap
page read and write
2F3A000
trusted library allocation
page read and write
12EE000
heap
page read and write
2B68000
trusted library allocation
page read and write
10EE000
stack
page read and write
144A000
heap
page read and write
132BAFC8000
heap
page read and write
B85000
heap
page read and write
126B1000
trusted library allocation
page read and write
1FB48657000
heap
page read and write
11FF000
stack
page read and write
132BC9F0000
direct allocation
page read and write
3F0000
heap
page read and write
6B8000
heap
page read and write
132BB008000
heap
page read and write
7FF848F54000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page read and write
7FF848DBC000
trusted library allocation
page execute and read and write
7FF4387D0000
trusted library allocation
page execute and read and write
7FF848D74000
trusted library allocation
page read and write
12811000
trusted library allocation
page read and write
24F6000
trusted library allocation
page read and write
7FF849330000
trusted library allocation
page read and write
15E0000
heap
page read and write
7FF848E30000
trusted library allocation
page execute and read and write
7FF848F74000
trusted library allocation
page read and write
2C36000
trusted library allocation
page read and write
7FF848F23000
trusted library allocation
page read and write
2B59000
heap
page read and write
7FF848D70000
trusted library allocation
page read and write
3858000
trusted library allocation
page read and write
1339E000
trusted library allocation
page read and write
132BB03E000
heap
page read and write
34E4000
trusted library allocation
page read and write
7FF848F5D000
trusted library allocation
page read and write
2B8C000
trusted library allocation
page read and write
1418AA11000
trusted library allocation
page read and write
132BCA5D000
direct allocation
page read and write
83E000
heap
page read and write
2891000
trusted library allocation
page read and write
11B0000
heap
page read and write
25CF000
trusted library allocation
page read and write
ED9000
heap
page read and write
1BBB0000
heap
page execute and read and write
1418AD66000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page execute and read and write
1260000
heap
page read and write
258C000
trusted library allocation
page read and write
F1BD13D000
stack
page read and write
386E000
trusted library allocation
page read and write
39852BF000
stack
page read and write
284C87C0000
trusted library allocation
page read and write
2B7F000
trusted library allocation
page read and write
FD0000
heap
page read and write
284C9B10000
trusted library allocation
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
2F09000
trusted library allocation
page read and write
7FF848E26000
trusted library allocation
page read and write
284C6A2D000
heap
page read and write
EFC000
heap
page read and write
32B9000
trusted library allocation
page read and write
3409000
trusted library allocation
page read and write
3794000
trusted library allocation
page read and write
2090A1AB000
heap
page read and write
2C82000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
1FB4A090000
direct allocation
page read and write
1B3E2000
heap
page read and write
3985E8C000
stack
page read and write
1ACBD000
stack
page read and write
1B9C0000
heap
page read and write
134F1000
trusted library allocation
page read and write
341E000
trusted library allocation
page read and write
11F0000
trusted library allocation
page read and write
1FB4A130000
direct allocation
page read and write
2090BE40000
trusted library allocation
page read and write
7FF849200000
trusted library allocation
page read and write
7FF848D63000
trusted library allocation
page execute and read and write
2731000
trusted library allocation
page read and write
132BB058000
heap
page read and write
28F1000
trusted library allocation
page read and write
7FF848D73000
trusted library allocation
page execute and read and write
7FF849270000
trusted library allocation
page read and write
33B1000
trusted library allocation
page read and write
1B78C000
stack
page read and write
7FF848F64000
trusted library allocation
page read and write
7FF848DBC000
trusted library allocation
page execute and read and write
7FF848F3D000
trusted library allocation
page read and write
25A0000
heap
page read and write
1B318000
heap
page read and write
7FF848E90000
trusted library allocation
page execute and read and write
2BB6000
trusted library allocation
page read and write
845000
heap
page read and write
845000
heap
page read and write
3693000
trusted library allocation
page read and write
7FF848E70000
trusted library allocation
page execute and read and write
143F000
heap
page read and write
7FF848D30000
trusted library allocation
page read and write
7FF848D48000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page execute and read and write
2090CE68000
trusted library allocation
page read and write
7FF848D5D000
trusted library allocation
page execute and read and write
1FB485EE000
heap
page read and write
284C9A03000
trusted library allocation
page read and write
648443E000
stack
page read and write
21AACA1A000
heap
page read and write
13107000
trusted library allocation
page read and write
377A000
trusted library allocation
page read and write
1DCF6A10000
heap
page read and write
27AF000
trusted library allocation
page read and write
902000
heap
page read and write
1410000
trusted library allocation
page read and write
325F000
trusted library allocation
page read and write
F1BCB7E000
stack
page read and write
284C99D9000
trusted library allocation
page read and write
14B5000
heap
page read and write
2910000
heap
page execute and read and write
7FF848E60000
trusted library allocation
page execute and read and write
14189A61000
trusted library allocation
page read and write
1418A9DF000
trusted library allocation
page read and write
21883687000
heap
page read and write
1615000
heap
page read and write
3984E7F000
stack
page read and write
2188364A000
heap
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
7FF848D9D000
trusted library allocation
page execute and read and write
7FF848F50000
trusted library allocation
page execute and read and write
2C6F000
trusted library allocation
page read and write
25680001000
trusted library allocation
page read and write
21883530000
heap
page read and write
20500F78000
trusted library allocation
page read and write
12E0000
heap
page read and write
7FF848F3C000
trusted library allocation
page read and write
7FF848F26000
trusted library allocation
page read and write
1C443000
heap
page read and write
2540000
heap
page execute and read and write
1FB485EB000
heap
page read and write
281F000
trusted library allocation
page read and write
324D000
trusted library allocation
page read and write
20500C3F000
trusted library allocation
page read and write
25680DA2000
trusted library allocation
page read and write
8E1000
stack
page read and write
284C6A4C000
heap
page read and write
7FF848EE0000
trusted library allocation
page read and write
378A000
trusted library allocation
page read and write
326C000
trusted library allocation
page read and write
7FF848E26000
trusted library allocation
page read and write
7FF848D83000
trusted library allocation
page read and write
132BB00F000
heap
page read and write
F1BCEB7000
stack
page read and write
7FF848F5E000
trusted library allocation
page read and write
7FF848F83000
trusted library allocation
page read and write
7FF848F64000
trusted library allocation
page read and write
2FC1000
trusted library allocation
page read and write
1FB4A0F0000
direct allocation
page read and write
31A1000
trusted library allocation
page read and write
7FF848D8D000
trusted library allocation
page execute and read and write
2C30000
trusted library allocation
page read and write
7FF848D74000
trusted library allocation
page read and write
27B1000
trusted library allocation
page read and write
138A000
heap
page read and write
F31000
heap
page read and write
13077000
trusted library allocation
page read and write
1B72D000
stack
page read and write
168E000
stack
page read and write
E39727F000
stack
page read and write
7FF848F5D000
trusted library allocation
page read and write
7FF848F54000
trusted library allocation
page read and write
7FF848F3C000
trusted library allocation
page read and write
37E6000
trusted library allocation
page read and write
7FF848D3D000
trusted library allocation
page execute and read and write
319A000
trusted library allocation
page read and write
1FB48610000
heap
page read and write
1AED6000
heap
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
7FF848E16000
trusted library allocation
page read and write
25CD000
trusted library allocation
page read and write
1C33F000
stack
page read and write
2DCF000
stack
page read and write
286D000
trusted library allocation
page read and write
18E5000
heap
page read and write
3304000
trusted library allocation
page read and write
256818FA000
trusted library allocation
page read and write
F1BCFBC000
stack
page read and write
35D5000
trusted library allocation
page read and write
D13000
heap
page read and write
4087D4E000
stack
page read and write
30F7000
trusted library allocation
page read and write
1B0BE000
stack
page read and write
398533A000
stack
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
2699000
trusted library allocation
page read and write
F1BDD8C000
stack
page read and write
83B000
heap
page read and write
1418A682000
trusted library allocation
page read and write
7FF848E56000
trusted library allocation
page execute and read and write
132BB040000
heap
page read and write
1418AA70000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page read and write
2A7E000
trusted library allocation
page read and write
3762000
trusted library allocation
page read and write
6484E8E000
stack
page read and write
1F5ACDC9000
heap
page read and write
1DCF6770000
heap
page read and write
4086FFC000
stack
page read and write
347B000
trusted library allocation
page read and write
1C4ED000
heap
page read and write
1DCF6781000
heap
page read and write
7FF848E26000
trusted library allocation
page read and write
18D9DE50000
heap
page read and write
31F9000
trusted library allocation
page read and write
31CD000
trusted library allocation
page read and write
132BAFF9000
heap
page read and write
21886531000
trusted library allocation
page read and write
7FF848F07000
trusted library allocation
page read and write
7FF848D73000
trusted library allocation
page execute and read and write
340D000
trusted library allocation
page read and write
284C97F4000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
275A000
trusted library allocation
page read and write
1BB32000
unkown
page readonly
39849E3000
stack
page read and write
1400000
heap
page read and write
284C9B73000
trusted library allocation
page read and write
3984FF8000
stack
page read and write
3237000
trusted library allocation
page read and write
DD0000
heap
page read and write
33A1000
trusted library allocation
page read and write
12E1000
stack
page read and write
284C6B20000
heap
page read and write
7FF848D43000
trusted library allocation
page execute and read and write
2B6C000
trusted library allocation
page read and write
27AB000
trusted library allocation
page read and write
B65000
heap
page read and write
1B401000
heap
page read and write
266F000
trusted library allocation
page read and write
7FF848D58000
trusted library allocation
page read and write
3363000
trusted library allocation
page read and write
800000
heap
page read and write
2090CE79000
trusted library allocation
page read and write
1C51C000
heap
page read and write
1B98E000
heap
page read and write
25FB000
trusted library allocation
page read and write
829000
heap
page read and write
1FB48570000
heap
page read and write
2451000
trusted library allocation
page read and write
1C573000
heap
page read and write
1BBB0000
heap
page execute and read and write
4087B4C000
stack
page read and write
1268000
heap
page read and write
20501305000
trusted library allocation
page read and write
1FB4860E000
heap
page read and write
1DCF6840000
heap
page read and write
12EB1000
trusted library allocation
page read and write
1418A9E7000
trusted library allocation
page read and write
289A000
trusted library allocation
page read and write
7FF848F9D000
trusted library allocation
page read and write
2611000
trusted library allocation
page read and write
7FF848F3C000
trusted library allocation
page read and write
1418A667000
trusted library allocation
page read and write
132BC970000
direct allocation
page read and write
132BB049000
heap
page read and write
2E70000
heap
page read and write
31CF000
trusted library allocation
page read and write
12B17000
trusted library allocation
page read and write
7FF848F14000
trusted library allocation
page read and write
32CB000
trusted library allocation
page read and write
132BB057000
heap
page read and write
1C3F6000
heap
page read and write
27E8000
trusted library allocation
page read and write
1DCF6780000
heap
page read and write
32D7000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page execute and read and write
1BAF2000
unkown
page readonly
31F7000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
398503E000
stack
page read and write
25B8000
trusted library allocation
page read and write
2B92000
trusted library allocation
page read and write
1441000
heap
page read and write
1AEF1000
heap
page read and write
1418AA7D000
trusted library allocation
page read and write
2B11000
trusted library allocation
page read and write
39850B6000
stack
page read and write
288B000
trusted library allocation
page read and write
20501877000
trusted library allocation
page read and write
E3973FE000
stack
page read and write
7FF848F50000
trusted library allocation
page read and write
1080000
heap
page read and write
835000
heap
page read and write
1AD6E0E0000
heap
page read and write
7FF848E00000
trusted library allocation
page execute and read and write
F1BC7E3000
stack
page read and write
1FB48870000
direct allocation
page read and write
1C3D2000
heap
page read and write
9D0000
heap
page read and write
132C1000
trusted library allocation
page read and write
7FF848D88000
trusted library allocation
page read and write
21885321000
trusted library allocation
page read and write
2090A1CB000
heap
page read and write
25681122000
trusted library allocation
page read and write
284C6A97000
heap
page read and write
284CA3AD000
trusted library allocation
page read and write
7FF848E60000
trusted library allocation
page execute and read and write
8C047FE000
stack
page read and write
3864000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
1C395000
heap
page read and write
843000
heap
page read and write
BA0000
heap
page read and write
BF0000
heap
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
E40000
heap
page read and write
2090CF73000
trusted library allocation
page read and write
2090A1F2000
heap
page read and write
6483D7F000
stack
page read and write
2188363C000
heap
page read and write
339F000
trusted library allocation
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
21884FD0000
heap
page read and write
820000
heap
page read and write
1413000
heap
page read and write
1C501000
heap
page read and write
1FB4A0BB000
direct allocation
page read and write
2568104D000
trusted library allocation
page read and write
1C390000
heap
page read and write
2090A266000
heap
page read and write
1560000
trusted library allocation
page read and write
1BB12000
unkown
page readonly
144F000
heap
page read and write
218863B3000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
2856000
trusted library allocation
page read and write
F1BD03E000
stack
page read and write
7FF848F07000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
1BB30000
heap
page read and write
12E1000
stack
page read and write
2F38000
trusted library allocation
page read and write
1C49E000
heap
page read and write
1B9B2000
unkown
page readonly
648500E000
stack
page read and write
3359000
trusted library allocation
page read and write
4086D76000
stack
page read and write
7FF848E90000
trusted library allocation
page execute and read and write
25C9000
trusted library allocation
page read and write
7FF848E56000
trusted library allocation
page execute and read and write
25A9000
trusted library allocation
page read and write
31F1000
trusted library allocation
page read and write
3844000
trusted library allocation
page read and write
1FB48560000
heap
page read and write
F34000
heap
page read and write
1C3AE000
heap
page read and write
2090BE50000
heap
page readonly
275E000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page execute and read and write
2F0C000
trusted library allocation
page read and write
1FB4A0B0000
direct allocation
page read and write
132BDA55000
direct allocation
page read and write
7FF848F72000
trusted library allocation
page read and write
2C3A000
trusted library allocation
page read and write
2090CAFF000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page read and write
25F1000
trusted library allocation
page read and write
1FB48636000
heap
page read and write
7FF848F34000
trusted library allocation
page read and write
132BCA50000
direct allocation
page read and write
1AB1D000
stack
page read and write
7FF848F23000
trusted library allocation
page read and write
11EF000
stack
page read and write
1B021000
heap
page read and write
7FF848F84000
trusted library allocation
page read and write
31B8000
trusted library allocation
page read and write
4086B7E000
stack
page read and write
1FB485E4000
heap
page read and write
A38000
heap
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
2B14000
trusted library allocation
page read and write
F9A000
heap
page read and write
132BB049000
heap
page read and write
1FB48656000
heap
page read and write
2B70000
trusted library allocation
page read and write
2188363E000
heap
page read and write
A10000
heap
page read and write
1420000
heap
page read and write
27D7000
trusted library allocation
page read and write
132BAFF7000
heap
page read and write
1FB48616000
heap
page read and write
12691000
trusted library allocation
page read and write
1FB4861B000
heap
page read and write
64843BD000
stack
page read and write
1418AA68000
trusted library allocation
page read and write
936233E000
stack
page read and write
2C58000
trusted library allocation
page read and write
7FF848DF6000
trusted library allocation
page read and write
284C99EA000
trusted library allocation
page read and write
1DCF6781000
heap
page read and write
822000
heap
page read and write
4087BC7000
stack
page read and write
6483CFE000
unkown
page read and write
AA1000
heap
page read and write
F0F000
stack
page read and write
3321000
trusted library allocation
page read and write
37FE000
trusted library allocation
page read and write
8F6000
heap
page read and write
7FF848D63000
trusted library allocation
page execute and read and write
1AED0000
heap
page read and write
132BCA6F000
direct allocation
page read and write
1FB4882B000
direct allocation
page read and write
284C6A10000
heap
page read and write
28DF000
trusted library allocation
page read and write
1B3EE000
stack
page read and write
299E000
trusted library allocation
page read and write
1D53E000
stack
page read and write
B50000
unkown
page readonly
324A000
trusted library allocation
page read and write
21AACA10000
heap
page read and write
AEF000
stack
page read and write
7FF848DCC000
trusted library allocation
page execute and read and write
284C99EE000
trusted library allocation
page read and write
7FF848E80000
trusted library allocation
page execute and read and write
7FF848F64000
trusted library allocation
page read and write
130C000
heap
page read and write
1C4B6000
heap
page read and write
2C8F000
trusted library allocation
page read and write
EF0000
heap
page read and write
B75000
heap
page read and write
6D8000
heap
page read and write
25680C21000
trusted library allocation
page read and write
14187B70000
heap
page read and write
27CD000
trusted library allocation
page read and write
AFF000
stack
page read and write
284C6C65000
heap
page read and write
7FF848F44000
trusted library allocation
page read and write
7FF848EF0000
trusted library allocation
page read and write
1FB48654000
heap
page read and write
1770000
heap
page read and write
7E0000
heap
page read and write
7FF848D42000
trusted library allocation
page read and write
2090CF30000
trusted library allocation
page read and write
3340000
trusted library allocation
page read and write
1B96A000
heap
page read and write
2823000
trusted library allocation
page read and write
7FF848D8D000
trusted library allocation
page execute and read and write
1FB485EE000
heap
page read and write
2090C3AD000
trusted library allocation
page read and write
437B7CC000
stack
page read and write
30FF000
trusted library allocation
page read and write
14187C4E000
heap
page read and write
32AE000
stack
page read and write
1C449000
heap
page read and write
31D8000
trusted library allocation
page read and write
3984D7F000
stack
page read and write
2C80000
trusted library allocation
page read and write
125F1000
trusted library allocation
page read and write
1DCF68B4000
heap
page read and write
2090CE5C000
trusted library allocation
page read and write
20500A51000
trusted library allocation
page read and write
131F1000
trusted library allocation
page read and write
7FF848F3C000
trusted library allocation
page read and write
132BB035000
heap
page read and write
272E000
stack
page read and write
1B25E000
stack
page read and write
1BBE8000
heap
page read and write
B70000
heap
page read and write
2DD1000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page read and write
7FF848F93000
trusted library allocation
page read and write
269B000
trusted library allocation
page read and write
3338000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
E396F9F000
unkown
page read and write
3832000
trusted library allocation
page read and write
27F9000
trusted library allocation
page read and write
7FF848F2C000
trusted library allocation
page read and write
1FB487D0000
direct allocation
page read and write
1B450000
heap
page execute and read and write
1BAE2000
unkown
page readonly
7FF848D43000
trusted library allocation
page execute and read and write
7FF848F30000
trusted library allocation
page read and write
437BBFF000
stack
page read and write
93623B6000
stack
page read and write
325D000
trusted library allocation
page read and write
333C000
trusted library allocation
page read and write
205013C1000
trusted library allocation
page read and write
21883608000
heap
page read and write
1248000
heap
page read and write
2090D2A1000
trusted library allocation
page read and write
2090BE20000
trusted library allocation
page read and write
398608E000
stack
page read and write
14187C4C000
heap
page read and write
1B54B000
stack
page read and write
7FF848F80000
trusted library allocation
page read and write
132BC9D0000
direct allocation
page read and write
BED8FE000
stack
page read and write
FB0000
heap
page read and write
100F000
stack
page read and write
244E000
stack
page read and write
936253E000
stack
page read and write
2AF0000
heap
page read and write
7FF848F40000
trusted library allocation
page read and write
5D0000
heap
page read and write
7FF848E26000
trusted library allocation
page read and write
2F27000
trusted library allocation
page read and write
1324000
heap
page read and write
9F0000
heap
page read and write
25BA000
trusted library allocation
page read and write
1B4EE000
stack
page read and write
2FF0000
heap
page read and write
2B50000
heap
page read and write
6483EFE000
stack
page read and write
1418B3BC000
trusted library allocation
page read and write
21AACDD0000
heap
page read and write
1FB48610000
heap
page read and write
1680000
heap
page read and write
327D000
trusted library allocation
page read and write
133A1000
trusted library allocation
page read and write
7D0000
heap
page read and write
1BDFF000
stack
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF848E46000
trusted library allocation
page execute and read and write
20500228000
trusted library allocation
page read and write
381A000
trusted library allocation
page read and write
271A000
trusted library allocation
page read and write
31EB000
trusted library allocation
page read and write
273B000
trusted library allocation
page read and write
2F41000
trusted library allocation
page read and write
1FB4860D000
heap
page read and write
93624BA000
stack
page read and write
7FF848F72000
trusted library allocation
page read and write
2F90000
heap
page read and write
7FF848F03000
trusted library allocation
page read and write
284C9AE4000
trusted library allocation
page read and write
BD6000
heap
page read and write
1C44E000
heap
page read and write
1B8D3000
heap
page read and write
1BD02000
heap
page execute and read and write
257A000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page read and write
1C46B000
heap
page read and write
F72000
heap
page read and write
1B990000
heap
page execute and read and write
32B7000
trusted library allocation
page read and write
27A1000
trusted library allocation
page read and write
21886442000
trusted library allocation
page read and write
9362439000
stack
page read and write
6EE000
heap
page read and write
2A1E000
stack
page read and write
2188629C000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
6483DFE000
stack
page read and write
40870FC000
stack
page read and write
284C99DD000
trusted library allocation
page read and write
259A000
trusted library allocation
page read and write
3848000
trusted library allocation
page read and write
1B150000
heap
page execute and read and write
13F5000
heap
page read and write
380A000
trusted library allocation
page read and write
AA5000
heap
page read and write
E05000
heap
page read and write
31C7000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page read and write
7FF848EF6000
trusted library allocation
page read and write
2C4B000
trusted library allocation
page read and write
4086E7A000
stack
page read and write
132BCA30000
direct allocation
page read and write
2ADE000
trusted library allocation
page read and write
2902000
trusted library allocation
page read and write
205004CD000
trusted library allocation
page read and write
7FF848F63000
trusted library allocation
page read and write
ED0000
heap
page read and write
1418AAB5000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
1AD6E0B0000
heap
page read and write
24DF000
trusted library allocation
page read and write
1BEBE000
stack
page read and write
131F7000
trusted library allocation
page read and write
3984F7D000
stack
page read and write
1BC02000
heap
page read and write
35D0000
trusted library allocation
page read and write
7FF848D8B000
trusted library allocation
page execute and read and write
2C5C000
trusted library allocation
page read and write
D7F000
stack
page read and write
3272000
trusted library allocation
page read and write
7FF848F33000
trusted library allocation
page read and write
3239000
trusted library allocation
page read and write
7FF848F74000
trusted library allocation
page read and write
1FB48830000
direct allocation
page read and write
1DCF68B0000
heap
page read and write
7FF848F7E000
trusted library allocation
page read and write
33C2000
trusted library allocation
page read and write
B78000
heap
page read and write
B8F000
heap
page read and write
2629000
heap
page read and write
B20000
trusted library allocation
page read and write
BAD000
heap
page read and write
1C3D4000
heap
page read and write
E39844B000
stack
page read and write
7FF848F80000
trusted library allocation
page read and write
28EB000
trusted library allocation
page read and write
27BF000
trusted library allocation
page read and write
26B0000
trusted library allocation
page read and write
7FF848E46000
trusted library allocation
page execute and read and write
E39854E000
stack
page read and write
218864F8000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page read and write
7FF848F64000
trusted library allocation
page read and write
21884EA0000
trusted library allocation
page read and write
284CA2C5000
trusted library allocation
page read and write
7FF848D94000
trusted library allocation
page read and write
31C9000
trusted library allocation
page read and write
1418A9EB000
trusted library allocation
page read and write
1190000
heap
page read and write
13E0000
heap
page read and write
27DB000
trusted library allocation
page read and write
146B000
heap
page read and write
25EE000
stack
page read and write
132BCA5B000
direct allocation
page read and write
F1BDE0C000
stack
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
1AD6E180000
heap
page read and write
33F6000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page execute and read and write
4086AF9000
stack
page read and write
7FF848F6D000
trusted library allocation
page read and write
2090A0D0000
heap
page read and write
21886372000
trusted library allocation
page read and write
274D000
trusted library allocation
page read and write
2A24000
trusted library allocation
page read and write
1418AA26000
trusted library allocation
page read and write
A4E000
heap
page read and write
132AD000
trusted library allocation
page read and write
132BB006000
heap
page read and write
141895D0000
trusted library allocation
page read and write
27F7000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
1B55E000
stack
page read and write
256804CE000
trusted library allocation
page read and write
12741000
trusted library allocation
page read and write
132BAFE9000
heap
page read and write
7FF848E56000
trusted library allocation
page execute and read and write
7FF848F70000
trusted library allocation
page read and write
132BAFFC000
heap
page read and write
7FF849210000
trusted library allocation
page read and write
719000
heap
page read and write
132BC973000
direct allocation
page read and write
284C9DD6000
trusted library allocation
page read and write
7FF848F4D000
trusted library allocation
page read and write
2B5D000
trusted library allocation
page read and write
39853BF000
stack
page read and write
7FF848F50000
trusted library allocation
page read and write
14187B90000
heap
page read and write
F1BDD07000
stack
page read and write
1BBD0000
heap
page read and write
B70000
heap
page read and write
334B000
trusted library allocation
page read and write
7FF848E56000
trusted library allocation
page execute and read and write
1B3CE000
stack
page read and write
7FF848F70000
trusted library allocation
page read and write
7FF848EF6000
trusted library allocation
page read and write
7FF848F72000
trusted library allocation
page read and write
1FB48810000
direct allocation
page read and write
2090D001000
trusted library allocation
page read and write
145B000
heap
page read and write
33E9000
trusted library allocation
page read and write
1B57F000
stack
page read and write
218862AD000
trusted library allocation
page read and write
E00000
heap
page read and write
F1BCA7F000
unkown
page read and write
BED97F000
stack
page read and write
7FF848D8D000
trusted library allocation
page execute and read and write
1BACE000
stack
page read and write
1BAD0000
unkown
page readonly
1BB08000
unkown
page readonly
4087ACE000
stack
page read and write
21886AAA000
trusted library allocation
page read and write
1B1CE000
stack
page read and write
2B63000
trusted library allocation
page read and write
27FB000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page read and write
7FF848F52000
trusted library allocation
page read and write
950D9FF000
stack
page read and write
33A3000
trusted library allocation
page read and write
2869000
trusted library allocation
page read and write
284C8A40000
heap
page execute and read and write
B92000
unkown
page readonly
1FB4862D000
heap
page read and write
7FF848FA0000
trusted library allocation
page execute and read and write
2090CCB9000
trusted library allocation
page read and write
1BAF0000
unkown
page readonly
1438000
heap
page read and write
7FF848D53000
trusted library allocation
page read and write
BA5000
heap
page read and write
128E1000
trusted library allocation
page read and write
1BDBF000
stack
page read and write
1C230000
heap
page execute and read and write
13E0000
heap
page read and write
7B0000
heap
page read and write
89B000
heap
page read and write
28E1000
trusted library allocation
page read and write
7FF848F57000
trusted library allocation
page read and write
7FF848D94000
trusted library allocation
page read and write
21886BB6000
trusted library allocation
page read and write
82D000
heap
page read and write
2FC9000
trusted library allocation
page read and write
2090CE71000
trusted library allocation
page read and write
379E000
trusted library allocation
page read and write
1B9FE000
stack
page read and write
3200000
trusted library allocation
page read and write
273C000
trusted library allocation
page read and write
2BE8000
trusted library allocation
page read and write
7FF848F53000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page read and write
7FF848D63000
trusted library allocation
page execute and read and write
7FF848F74000
trusted library allocation
page read and write
218857ED000
trusted library allocation
page read and write
936227D000
stack
page read and write
1B2EE000
stack
page read and write
7FF848F50000
trusted library allocation
page read and write
760000
heap
page read and write
3243000
trusted library allocation
page read and write
1D2FF000
stack
page read and write
6A9000
heap
page read and write
93620F9000
stack
page read and write
141896E0000
heap
page read and write
1BB30000
unkown
page readonly
21886626000
trusted library allocation
page read and write
25681897000
trusted library allocation
page read and write
13F0000
heap
page read and write
1B75F000
stack
page read and write
20501121000
trusted library allocation
page read and write
1B9F0000
heap
page execute and read and write
12531000
trusted library allocation
page read and write
7FF848F6D000
trusted library allocation
page read and write
3418000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page read and write
12781000
trusted library allocation
page read and write
132BAF20000
heap
page read and write
1418A9F8000
trusted library allocation
page read and write
2C6D000
trusted library allocation
page read and write
7FF848E60000
trusted library allocation
page execute and read and write
1B8F0000
heap
page execute and read and write
1FB48656000
heap
page read and write
1570000
trusted library allocation
page read and write
7FF848F34000
trusted library allocation
page read and write
284C9D25000
trusted library allocation
page read and write
2090C932000
trusted library allocation
page read and write
12E6000
heap
page read and write
7FF848F30000
trusted library allocation
page read and write
7FF848D78000
trusted library allocation
page read and write
307B000
trusted library allocation
page read and write
13071000
trusted library allocation
page read and write
2F1E000
trusted library allocation
page read and write
132BB00F000
heap
page read and write
7FF848F60000
trusted library allocation
page read and write
F1BD1BE000
stack
page read and write
7FF848F83000
trusted library allocation
page read and write
7FF848D70000
trusted library allocation
page read and write
284C6A93000
heap
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
2C5E000
trusted library allocation
page read and write
A00000
heap
page execute and read and write
7FF848D83000
trusted library allocation
page read and write
3C0000
heap
page read and write
2090D751000
trusted library allocation
page read and write
1C474000
heap
page read and write
218862BA000
trusted library allocation
page read and write
E397579000
stack
page read and write
1260000
trusted library allocation
page read and write
284C9CF5000
trusted library allocation
page read and write
7FF848D88000
trusted library allocation
page read and write
14189C89000
trusted library allocation
page read and write
132BB029000
heap
page read and write
1B09C000
stack
page read and write
1F5ACCD0000
heap
page read and write
132BB01A000
heap
page read and write
1BA00000
heap
page read and write
21885F41000
trusted library allocation
page read and write
1FB48817000
direct allocation
page read and write
33FC000
trusted library allocation
page read and write
301F000
stack
page read and write
132BAFD7000
heap
page read and write
7FF848DCC000
trusted library allocation
page execute and read and write
1457000
heap
page read and write
2520000
trusted library allocation
page read and write
149A000
heap
page read and write
1AB7D000
stack
page read and write
7FF848F60000
trusted library allocation
page read and write
7FF848F1C000
trusted library allocation
page read and write
14189F2E000
trusted library allocation
page read and write
7FF849247000
trusted library allocation
page read and write
7FF848DCC000
trusted library allocation
page execute and read and write
3079FF000
stack
page read and write
3349000
trusted library allocation
page read and write
E396FDE000
stack
page read and write
274B000
trusted library allocation
page read and write
7FF848DF6000
trusted library allocation
page read and write
7FF848D73000
trusted library allocation
page read and write
D00000
heap
page read and write
B96000
unkown
page readonly
7FF848F50000
trusted library allocation
page read and write
361000
stack
page read and write
1C405000
heap
page read and write
32E3000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
7FF848F54000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
24CF000
trusted library allocation
page read and write
6EA000
heap
page read and write
31DC000
trusted library allocation
page read and write
14187C05000
heap
page read and write
F1BCBFA000
stack
page read and write
7FF848D53000
trusted library allocation
page read and write
9363187000
stack
page read and write
7FF848F54000
trusted library allocation
page read and write
2B8F000
trusted library allocation
page read and write
F1BCDF9000
stack
page read and write
205012A4000
trusted library allocation
page read and write
2BB9000
trusted library allocation
page read and write
93621F9000
stack
page read and write
2B9F000
trusted library allocation
page read and write
2A75000
trusted library allocation
page read and write
2617000
trusted library allocation
page read and write
7FF848D43000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
7FF848E70000
trusted library allocation
page execute and read and write
1418AB1E000
trusted library allocation
page read and write
1B1E0000
heap
page execute and read and write
790000
heap
page read and write
1BA4A000
heap
page read and write
9361CD3000
stack
page read and write
C02000
heap
page read and write
1F5ACDD7000
heap
page read and write
7FF848D53000
trusted library allocation
page read and write
7FF848D64000
trusted library allocation
page read and write
7FF848F16000
trusted library allocation
page read and write
334F000
trusted library allocation
page read and write
85B000
heap
page read and write
813000
heap
page read and write
F1BCD7D000
stack
page read and write
1B35D000
stack
page read and write
1C4A6000
heap
page read and write
1B77D000
stack
page read and write
7FF848F80000
trusted library allocation
page read and write
7FF848F6D000
trusted library allocation
page read and write
1C445000
heap
page read and write
E90000
trusted library allocation
page read and write
33F8000
trusted library allocation
page read and write
7FF848D8D000
trusted library allocation
page execute and read and write
1BA70000
heap
page read and write
2F3E000
trusted library allocation
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
13011000
trusted library allocation
page read and write
284C9D59000
trusted library allocation
page read and write
284C6A50000
heap
page read and write
2090CE64000
trusted library allocation
page read and write
1418B1EF000
trusted library allocation
page read and write
2E04000
trusted library allocation
page read and write
285A000
trusted library allocation
page read and write
1FB485C0000
heap
page read and write
3400000
trusted library allocation
page read and write
2090CAE6000
trusted library allocation
page read and write
1BBFE000
stack
page read and write
2FF9000
heap
page read and write
CAF000
stack
page read and write
2598000
trusted library allocation
page read and write
7FF848F63000
trusted library allocation
page read and write
3B0000
heap
page read and write
7FF848D90000
trusted library allocation
page read and write
408707F000
stack
page read and write
7FF848FA0000
trusted library allocation
page read and write
141895C0000
heap
page readonly
14189580000
trusted library section
page read and write
20500F85000
trusted library allocation
page read and write
AAF000
heap
page read and write
1FB4A0D0000
direct allocation
page read and write
E39797C000
stack
page read and write
12DE1000
trusted library allocation
page read and write
324C000
trusted library allocation
page read and write
1FB4A0CF000
direct allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
950DAFE000
stack
page read and write
333A000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
284C8F1E000
trusted library allocation
page read and write
7FF848F8E000
trusted library allocation
page read and write
1BBC0000
heap
page read and write
33D6000
trusted library allocation
page read and write
7FF848D88000
trusted library allocation
page read and write
205011D8000
trusted library allocation
page read and write
2696000
trusted library allocation
page read and write
1350000
heap
page read and write
3097000
trusted library allocation
page read and write
33AB000
trusted library allocation
page read and write
F1BD23B000
stack
page read and write
F1BCAFE000
stack
page read and write
7FF8490A0000
trusted library allocation
page read and write
7FF848F18000
trusted library allocation
page read and write
7FF848F3C000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page read and write
21884FC0000
trusted library allocation
page read and write
341A000
trusted library allocation
page read and write
2761000
trusted library allocation
page read and write
1418AD05000
trusted library allocation
page read and write
BAB000
heap
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
1486000
heap
page read and write
126A7000
trusted library allocation
page read and write
280C000
trusted library allocation
page read and write
7FF848D50000
trusted library allocation
page read and write
7FF848F93000
trusted library allocation
page read and write
7FF848F7E000
trusted library allocation
page read and write
7FF848D78000
trusted library allocation
page read and write
1B92C000
heap
page read and write
3410000
trusted library allocation
page read and write
21AACA00000
heap
page read and write
7FF848F2A000
trusted library allocation
page read and write
1425000
heap
page read and write
3356000
trusted library allocation
page read and write
132BAFE3000
heap
page read and write
385C000
trusted library allocation
page read and write
284CA2EC000
trusted library allocation
page read and write
1C41E000
heap
page read and write
2568022A000
trusted library allocation
page read and write
E39787C000
stack
page read and write
7FF848FA0000
trusted library allocation
page execute and read and write
132BB02E000
heap
page read and write
2090A0A0000
heap
page read and write
287C000
trusted library allocation
page read and write
2B57000
trusted library allocation
page read and write
7FF848E26000
trusted library allocation
page execute and read and write
2B0E000
trusted library allocation
page read and write
132BDA10000
direct allocation
page read and write
387C000
trusted library allocation
page read and write
2090C7B5000
trusted library allocation
page read and write
1418A4B3000
trusted library allocation
page read and write
1200000
heap
page read and write
20501032000
trusted library allocation
page read and write
6E1000
stack
page read and write
2CC0000
heap
page execute and read and write
12BD1000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
25680D99000
trusted library allocation
page read and write
F9C000
heap
page read and write
368D000
trusted library allocation
page read and write
2B10000
trusted library allocation
page read and write
12B01000
trusted library allocation
page read and write
12A21000
trusted library allocation
page read and write
284CA1E0000
trusted library allocation
page read and write
7FF848F2C000
trusted library allocation
page read and write
21883430000
heap
page read and write
1BAE0000
unkown
page readonly
2F4F000
trusted library allocation
page read and write
E39777E000
stack
page read and write
33A3000
trusted library allocation
page read and write
3316000
trusted library allocation
page read and write
288F000
trusted library allocation
page read and write
18E0000
heap
page read and write
134E000
heap
page read and write
218862A5000
trusted library allocation
page read and write
650000
trusted library allocation
page read and write
31BC000
trusted library allocation
page read and write
31A0000
heap
page execute and read and write
2878000
trusted library allocation
page read and write
218865C4000
trusted library allocation
page read and write
2A30000
trusted library allocation
page read and write
B60000
heap
page read and write
3407000
trusted library allocation
page read and write
9A0000
heap
page read and write
1170000
heap
page read and write
308B000
trusted library allocation
page read and write
2C71000
trusted library allocation
page read and write
25680FA0000
trusted library allocation
page read and write
1B89E000
stack
page read and write
1AD6E0C0000
heap
page read and write
2889000
trusted library allocation
page read and write
3329000
trusted library allocation
page read and write
6484F89000
stack
page read and write
7FF848F77000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page read and write
936328C000
stack
page read and write
28E3000
trusted library allocation
page read and write
1C459000
heap
page read and write
1C43A000
heap
page read and write
936273B000
stack
page read and write
7FF848F3C000
trusted library allocation
page read and write
2758000
trusted library allocation
page read and write
7FF848E46000
trusted library allocation
page execute and read and write
1B9B0000
unkown
page readonly
1C402000
heap
page read and write
7FF848F34000
trusted library allocation
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
1B35F000
stack
page read and write
EC5000
heap
page read and write
25C1000
trusted library allocation
page read and write
21AACBE0000
heap
page read and write
2090A1AF000
heap
page read and write
A25000
heap
page read and write
14189715000
heap
page read and write
132BAFEC000
heap
page read and write
2596000
trusted library allocation
page read and write
25681093000
trusted library allocation
page read and write
F1BCC7F000
stack
page read and write
3071000
trusted library allocation
page read and write
1FB48648000
heap
page read and write
32B1000
trusted library allocation
page read and write
284C6A4E000
heap
page read and write
14FF000
stack
page read and write
7FF848F70000
trusted library allocation
page read and write
3101000
trusted library allocation
page read and write
7FF848DFC000
trusted library allocation
page execute and read and write
876000
heap
page read and write
13111000
trusted library allocation
page read and write
7FF848D78000
trusted library allocation
page read and write
1B5FD000
stack
page read and write
37F4000
trusted library allocation
page read and write
332B000
trusted library allocation
page read and write
1C7BE000
stack
page read and write
12CE000
stack
page read and write
33E1000
trusted library allocation
page read and write
600000
heap
page read and write
12601000
trusted library allocation
page read and write
20501092000
trusted library allocation
page read and write
2EB0000
heap
page execute and read and write
7FF848F94000
trusted library allocation
page read and write
7FF848DF6000
trusted library allocation
page read and write
7FF848F77000
trusted library allocation
page read and write
2050115C000
trusted library allocation
page read and write
B97000
heap
page read and write
1B980000
heap
page read and write
3243000
trusted library allocation
page read and write
1C6BE000
stack
page read and write
7FF848D9C000
trusted library allocation
page execute and read and write
E39767D000
stack
page read and write
33CD000
trusted library allocation
page read and write
380000
heap
page read and write
9361DDF000
stack
page read and write
14187C00000
heap
page read and write
1DCF6771000
heap
page read and write
1C518000
heap
page read and write
7FF848D73000
trusted library allocation
page execute and read and write
F3C000
heap
page read and write
1BCBE000
stack
page read and write
27D9000
trusted library allocation
page read and write
284C9BB2000
trusted library allocation
page read and write
18D9DE40000
heap
page read and write
2C69000
trusted library allocation
page read and write
7FF848F57000
trusted library allocation
page read and write
1BF4F000
stack
page read and write
EF6000
heap
page read and write
1C4E4000
heap
page read and write
132BB040000
heap
page read and write
7FF848D64000
trusted library allocation
page read and write
17CF000
stack
page read and write
21884EF0000
heap
page execute and read and write
7FF848D7D000
trusted library allocation
page execute and read and write
E3977FE000
stack
page read and write
F30000
heap
page read and write
7FF848F93000
trusted library allocation
page read and write
A76000
heap
page read and write
3C0000
trusted library allocation
page read and write
7FF848D64000
trusted library allocation
page read and write
7FF848D44000
trusted library allocation
page read and write
1400000
heap
page read and write
64840BE000
stack
page read and write
12971000
trusted library allocation
page read and write
132BB04E000
heap
page read and write
7FF848F74000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
14FE000
stack
page read and write
7FF848F10000
trusted library allocation
page read and write
1B3E0000
heap
page read and write
1BA0A000
heap
page read and write
40866B3000
stack
page read and write
BA5000
heap
page read and write
3223000
trusted library allocation
page read and write
132BB02B000
heap
page read and write
7FF848E26000
trusted library allocation
page execute and read and write
7FF848F50000
trusted library allocation
page execute and read and write
25680F86000
trusted library allocation
page read and write
1500000
heap
page read and write
1FB48657000
heap
page read and write
1FB48850000
heap
page read and write
7FF848F18000
trusted library allocation
page read and write
1530000
heap
page read and write
14DC000
heap
page read and write
34DE000
trusted library allocation
page read and write
12B21000
trusted library allocation
page read and write
3985F07000
stack
page read and write
1FB48600000
heap
page read and write
97F000
stack
page read and write
14187C18000
heap
page read and write
2749000
trusted library allocation
page read and write
2459000
trusted library allocation
page read and write
132BC9B0000
heap
page read and write
1BE60000
heap
page execute and read and write
1FB4863D000
heap
page read and write
132BB040000
heap
page read and write
2F16000
trusted library allocation
page read and write
40867FE000
stack
page read and write
274B000
trusted library allocation
page read and write
335B000
trusted library allocation
page read and write
381C000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page read and write
1DCF6781000
heap
page read and write
332F000
trusted library allocation
page read and write
936328E000
stack
page read and write
2090C107000
trusted library allocation
page read and write
132BB014000
heap
page read and write
326F000
trusted library allocation
page read and write
25681339000
trusted library allocation
page read and write
3830000
trusted library allocation
page read and write
3270000
trusted library allocation
page read and write
20500C0F000
trusted library allocation
page read and write
2808000
trusted library allocation
page read and write
12731000
trusted library allocation
page read and write
7FF848F27000
trusted library allocation
page read and write
132BB000000
heap
page read and write
3351000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page execute and read and write
12A27000
trusted library allocation
page read and write
132BB014000
heap
page read and write
EB0000
trusted library allocation
page read and write
2F1A000
trusted library allocation
page read and write
7FF848FA4000
trusted library allocation
page read and write
1BB24000
unkown
page readonly
A18000
heap
page read and write
1F5ACEC0000
heap
page read and write
3248000
trusted library allocation
page read and write
1C4CE000
heap
page read and write
284C6A18000
heap
page read and write
1B2FD000
heap
page read and write
2090BEE1000
trusted library allocation
page read and write
7FF848F87000
trusted library allocation
page read and write
2090A130000
heap
page read and write
30FE000
stack
page read and write
7FF848F93000
trusted library allocation
page read and write
267F000
trusted library allocation
page read and write
2C5A000
trusted library allocation
page read and write
7FF848F16000
trusted library allocation
page read and write
256811D8000
trusted library allocation
page read and write
F5C000
heap
page read and write
7FF848D33000
trusted library allocation
page execute and read and write
132BAFC0000
heap
page read and write
7FF848E80000
trusted library allocation
page execute and read and write
2600000
trusted library allocation
page read and write
3852000
trusted library allocation
page read and write
125F7000
trusted library allocation
page read and write
7FF848D84000
trusted library allocation
page read and write
28B0000
trusted library allocation
page read and write
1DCF6780000
heap
page read and write
12BF1000
trusted library allocation
page read and write
133A3000
trusted library allocation
page read and write
218862A9000
trusted library allocation
page read and write
4087C4C000
stack
page read and write
25681871000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page read and write
205010BE000
trusted library allocation
page read and write
383C000
trusted library allocation
page read and write
25BC000
trusted library allocation
page read and write
13431000
trusted library allocation
page read and write
7FF849092000
trusted library allocation
page read and write
4086DFB000
stack
page read and write
24E0000
heap
page execute and read and write
3431000
trusted library allocation
page read and write
2B81000
trusted library allocation
page read and write
1430000
heap
page read and write
25F9000
trusted library allocation
page read and write
7FF848F9D000
trusted library allocation
page read and write
1418AE22000
trusted library allocation
page read and write
1B000000
heap
page read and write
25AF000
trusted library allocation
page read and write
2B2B000
trusted library allocation
page read and write
1FB4A150000
direct allocation
page read and write
2F18000
trusted library allocation
page read and write
13392000
trusted library allocation
page read and write
7FF848D62000
trusted library allocation
page read and write
2B8A000
trusted library allocation
page read and write
7FF848F26000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page read and write
1418ABBD000
trusted library allocation
page read and write
1B8FC000
heap
page read and write
14189590000
trusted library allocation
page read and write
7D0000
heap
page execute and read and write
1DCF6782000
heap
page read and write
7FF848D34000
trusted library allocation
page read and write
25AD000
trusted library allocation
page read and write
There are 2178 hidden memdumps, click here to show them.