IOC Report
kQyd2z80gD.exe

loading gif

Files

File Path
Type
Category
Malicious
kQyd2z80gD.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Recovery\SearchApp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\SearchApp.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Recovery\WmiPrvSE.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\WmiPrvSE.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\Default\dLErkomWRcaRguaKAMtYMnt.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\kQyd2z80gD.exe.log
CSV text
dropped
malicious
C:\Recovery\24dbde2999530e
ASCII text, with no line terminators
dropped
C:\Recovery\38384e6a620884
ASCII text, with no line terminators
dropped
C:\Recovery\5140eeb670c7f4
ASCII text, with very long lines (832), with no line terminators
dropped
C:\Users\Default\5140eeb670c7f4
ASCII text, with no line terminators
dropped
C:\Users\Default\dLErkomWRcaRguaKAMtYMnt.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SearchApp.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\WmiPrvSE.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dLErkomWRcaRguaKAMtYMnt.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0fwor1wx.sqb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0s1pqnbe.dro.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0zfw33pi.hzt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1jzb5ry3.l4o.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1tgbpsph.yho.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eb5jkhpc.cst.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ebn3tgjf.xpx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hytc305s.t01.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ixmyw4u4.hbg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l40pauoc.v4p.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_luv5tkbn.ewm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lv0vjlew.ztr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ohpy4g53.bcq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qveabrb0.4l4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rzbxldse.urg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t2qthjvs.xei.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u2fesw54.zhj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uuvthf2h.bfo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x3daqyfy.rfn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xoixnhwg.ctr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xrmagh1x.23p.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ykzlaqfc.url.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zbjifgl4.kjf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zuijph1w.1xc.psm1
ASCII text, with no line terminators
dropped
There are 32 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\kQyd2z80gD.exe
"C:\Users\user\Desktop\kQyd2z80gD.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\kQyd2z80gD.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\dLErkomWRcaRguaKAMtYMnt.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WmiPrvSE.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\SearchApp.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe'
malicious
C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe
"C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe"
malicious
C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe
C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe
malicious
C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe
C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe
malicious
C:\Recovery\SearchApp.exe
C:\Recovery\SearchApp.exe
malicious
C:\Recovery\SearchApp.exe
C:\Recovery\SearchApp.exe
malicious
C:\Recovery\WmiPrvSE.exe
C:\Recovery\WmiPrvSE.exe
malicious
C:\Recovery\WmiPrvSE.exe
C:\Recovery\WmiPrvSE.exe
malicious
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
malicious
C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe
"C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe"
malicious
C:\Recovery\WmiPrvSE.exe
"C:\Recovery\WmiPrvSE.exe"
malicious
C:\Recovery\SearchApp.exe
"C:\Recovery\SearchApp.exe"
malicious
C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe
"C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe"
malicious
C:\Recovery\WmiPrvSE.exe
"C:\Recovery\WmiPrvSE.exe"
malicious
C:\Recovery\SearchApp.exe
"C:\Recovery\SearchApp.exe"
malicious
C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe
"C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe"
malicious
C:\Recovery\WmiPrvSE.exe
"C:\Recovery\WmiPrvSE.exe"
malicious
C:\Recovery\SearchApp.exe
"C:\Recovery\SearchApp.exe"
malicious
C:\Users\Default\dLErkomWRcaRguaKAMtYMnt.exe
"C:\Users\Default\dLErkomWRcaRguaKAMtYMnt.exe"
malicious
C:\Recovery\WmiPrvSE.exe
"C:\Recovery\WmiPrvSE.exe"
malicious
C:\Recovery\SearchApp.exe
"C:\Recovery\SearchApp.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 23 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://cm36861.tw1.ru/@=M2MiBTN3ImM
malicious
http://cm36861.tw1.ru
unknown
malicious
http://cm36861.tw1.ru/
unknown
malicious
http://cm36861.tw1.ru/2b750b3c.php?Htuc=04FW5e1D7gwHOLZmIUeH86Hd8X1BJW&6Y=n1I1G72yRqMJwlPc9ZQ&3b482a1504ac77c5c43f7e15a2187b43=9f54798b89eb404995a9b7978336a5b8&c3f24358aa290547facbfb1d35d51e12=gN5QDZjZzMmJGZ0Y2NjFTZihjMxcTYmNTNkRDO4IWZlRGOwE2YyIDO&Htuc=04FW5e1D7gwHOLZmIUeH86Hd8X1BJW&6Y=n1I1G72yRqMJwlPc9ZQ
92.53.106.114
malicious
http://cm36861.tw1.ru/2b750b3c.php?BOimVJiSbQd8wpL0XV611LUdQZ=qOeuq0hdwOOBcu2OM9RBx&c4b18150f245d528
unknown
https://ipinfo.io/missingauth
unknown
http://nuget.org/NuGet.exe
unknown
http://www.microsoft.coG
unknown
https://ipinfo.io/json8
unknown
http://ns.ad0/g/imj
unknown
https://t.me/vavaaffBOT
unknown
https://api.telegram.org
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://api.telegram.org/bot
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://.AppV.UG
unknown
http://ipinfo.io
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://api.telegram.org/bot7362674374:AAHc4bvqtak0iH1wK9oJ4m5BCQ5eSxckDy4/sendPhoto?chat_id=https://t.me/vavaaffBOT&caption=%E2%9D%95%20User%20connected%20%E2%9D%95%0A%E2%80%A2%20ID%3A%20c81b040e0acd70ade6f5665d2ebc227f233d835d%0A%E2%80%A2%20Comment%3A%20%0A%0A%E2%80%A2%20User%20Name%3A%20user%0A%E2%80%A2%20PC%20Name%3A%20040965%0A%E2%80%A2%20OS%20Info%3A%20Windows%2010%20Pro%0A%0A%E2%80%A2%20IP%3A%20173.254.250.71%0A%E2%80%A2%20GEO%3A%20US%20%2F%20Dallas%0A%0A%E2%80%A2%20Working%20Directory%3A%20C%3A%5CRecovery%5CdLErkomWRcaRguaKAMtYMnt.exe
149.154.167.220
http://ns.adobt/pg/j
unknown
https://t.me/vavaaffBOT&caption=%E2%9D%95%20User%20connected%20%E2%9D%95%0A%E2%80%A2%20ID%3A%20c81b0
unknown
https://github.com/Pester/Pester
unknown
https://ipinfo.io
unknown
https://go.microsof
unknown
http://crl.microso
unknown
http://ns.photo/j
unknown
https://api.telegram.org/bot7362674374:AAHc4bvqtak0iH1wK9oJ4m5BCQ5eSxckDy4/sendPhoto?chat_id=https:/
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://ipinfo.io/json
34.117.59.81
https://ipinfo.io/miss
unknown
https://aka.ms/pscore68
unknown
https://ipinfo.i
unknown
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ns.a1.0/auj
unknown
https://ipinfo.ioC5wbmc=
unknown
There are 30 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cm36861.tw1.ru
92.53.106.114
malicious
api.telegram.org
149.154.167.220
malicious
ipinfo.io
34.117.59.81

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
92.53.106.114
cm36861.tw1.ru
Russian Federation
malicious
34.117.59.81
ipinfo.io
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
dLErkomWRcaRguaKAMtYMnt
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
WmiPrvSE
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
WmiPrvSE
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SearchApp
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SearchApp
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
dLErkomWRcaRguaKAMtYMnt
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
dLErkomWRcaRguaKAMtYMnt
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\8f966bcf19df1d58bc3e30f28530c4d40fe273f0
2f88fddd33fa6c66561a330d34cd490fedc6dd9b
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\2099399cff359239b667274efa68133f
2099399cff359239b667274efa68133f
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2CB1000
trusted library allocation
page read and write
malicious
2C21000
trusted library allocation
page read and write
malicious
24E1000
trusted library allocation
page read and write
malicious
2821000
trusted library allocation
page read and write
malicious
2BA1000
trusted library allocation
page read and write
malicious
26D1000
trusted library allocation
page read and write
malicious
3441000
trusted library allocation
page read and write
malicious
2C30000
trusted library allocation
page read and write
malicious
28A6000
trusted library allocation
page read and write
malicious
2BDD000
trusted library allocation
page read and write
malicious
319D000
trusted library allocation
page read and write
malicious
2B2000
unkown
page readonly
malicious
3200000
trusted library allocation
page read and write
malicious
2431000
trusted library allocation
page read and write
malicious
2BB0000
trusted library allocation
page read and write
malicious
28C1000
trusted library allocation
page read and write
malicious
30B0000
trusted library allocation
page read and write
malicious
2631000
trusted library allocation
page read and write
malicious
2872000
trusted library allocation
page read and write
malicious
2764000
trusted library allocation
page read and write
malicious
31F1000
trusted library allocation
page read and write
malicious
2811000
trusted library allocation
page read and write
malicious
259D000
trusted library allocation
page read and write
malicious
27A1000
trusted library allocation
page read and write
malicious
2820000
trusted library allocation
page read and write
malicious
2691000
trusted library allocation
page read and write
malicious
26C3000
trusted library allocation
page read and write
malicious
2A01000
trusted library allocation
page read and write
malicious
2561000
trusted library allocation
page read and write
malicious
2A71000
trusted library allocation
page read and write
malicious
3181000
trusted library allocation
page read and write
malicious
30A1000
trusted library allocation
page read and write
malicious
3190000
trusted library allocation
page read and write
malicious
27CB000
trusted library allocation
page read and write
malicious
24F1000
trusted library allocation
page read and write
malicious
2A81000
trusted library allocation
page read and write
malicious
24E0000
trusted library allocation
page read and write
malicious
2CED000
trusted library allocation
page read and write
malicious
24D1000
trusted library allocation
page read and write
malicious
7FF848FB2000
trusted library allocation
page read and write
BA8000
heap
page read and write
20690347000
trusted library allocation
page read and write
E50000
heap
page read and write
7FF848DF4000
trusted library allocation
page read and write
B70000
heap
page read and write
20570151000
heap
page read and write
20690365000
trusted library allocation
page read and write
1DB19E35000
heap
page read and write
10EF000
stack
page read and write
20556134000
heap
page read and write
7FF848E04000
trusted library allocation
page read and write
2596000
trusted library allocation
page read and write
7FF848EA6000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
1B14F004000
heap
page read and write
205680CF000
trusted library allocation
page read and write
1DB32504000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
1B0D0000
trusted library allocation
page read and write
E65000
heap
page read and write
14F5000
heap
page read and write
2069022E000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
556000
stack
page read and write
DCD000
heap
page read and write
20568007000
trusted library allocation
page read and write
2C3C000
trusted library allocation
page read and write
2A2C911F000
trusted library allocation
page read and write
28E665A0000
heap
page read and write
94D000
heap
page read and write
B50000
trusted library allocation
page read and write
205681DF000
trusted library allocation
page read and write
2A2C9162000
trusted library allocation
page read and write
7FF849270000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
20556177000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
2A2C9168000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
9E8F83F000
stack
page read and write
1DB32290000
heap
page read and write
8C0000
heap
page read and write
2A2C9350000
trusted library allocation
page read and write
3232000
trusted library allocation
page read and write
96B000
heap
page read and write
AF0000
heap
page read and write
7FF8490CA000
trusted library allocation
page read and write
7FF849172000
trusted library allocation
page read and write
1710000
heap
page read and write
2A2C8F91000
trusted library allocation
page read and write
1765000
heap
page read and write
9E9040C000
stack
page read and write
1B6EE000
stack
page read and write
7FF848E2B000
trusted library allocation
page read and write
1DB1AD6E000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
7FF848FC2000
trusted library allocation
page read and write
206ED605000
heap
page read and write
3B0000
heap
page read and write
206903DD000
trusted library allocation
page read and write
7FF848DE0000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF84924D000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
28E4E336000
trusted library allocation
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
8B6000
heap
page read and write
7FF848FD2000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
206904A4000
trusted library allocation
page read and write
2A2C9438000
trusted library allocation
page read and write
20568176000
trusted library allocation
page read and write
7FF84921E000
trusted library allocation
page read and write
A65000
heap
page read and write
CC4C0BE000
stack
page read and write
1B26F000
stack
page read and write
13D5000
heap
page read and write
1B134FA0000
heap
page read and write
7FF848EB0000
trusted library allocation
page read and write
C5359F9000
stack
page read and write
7FF849202000
trusted library allocation
page read and write
1A9AF000
stack
page read and write
2056FF79000
heap
page read and write
932000
heap
page read and write
C86000
heap
page read and write
1DB19E10000
heap
page read and write
7FF848E02000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
124F3000
trusted library allocation
page read and write
9E8F8BC000
stack
page read and write
12A83000
trusted library allocation
page read and write
25FA000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
1DB2A4E4000
trusted library allocation
page read and write
28E4E0F0000
heap
page readonly
6E8000
heap
page read and write
28CE000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
2A2C93AE000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
1BDCE000
stack
page read and write
320B000
trusted library allocation
page read and write
124F8000
trusted library allocation
page read and write
7FF848F97000
trusted library allocation
page read and write
ACD000
heap
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
1B134ED0000
heap
page read and write
24B0000
heap
page execute and read and write
7FF8490D0000
trusted library allocation
page read and write
2A2B7060000
heap
page read and write
205682D3000
trusted library allocation
page read and write
3D0000
heap
page read and write
1B146F28000
trusted library allocation
page read and write
1250000
trusted library allocation
page read and write
C96A63C000
stack
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
7FF848E03000
trusted library allocation
page execute and read and write
8B8000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
1DB2A1F0000
trusted library allocation
page read and write
6DF000
heap
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
7FF848FB1000
trusted library allocation
page read and write
1B6EE000
stack
page read and write
20556050000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
928000
heap
page read and write
205683D9000
trusted library allocation
page read and write
20570453000
heap
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
1B146E31000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
126E1000
trusted library allocation
page read and write
CC4BB7F000
stack
page read and write
1B137EF3000
trusted library allocation
page read and write
1BC4E000
stack
page read and write
7FF848E03000
trusted library allocation
page read and write
7B0000
heap
page read and write
24D0000
heap
page execute and read and write
7FF848E12000
trusted library allocation
page read and write
7FF8491FA000
trusted library allocation
page read and write
12BA8000
trusted library allocation
page read and write
1263D000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
28E4F2B2000
trusted library allocation
page read and write
8CB000
heap
page read and write
1370000
trusted library allocation
page read and write
1B5BE000
stack
page read and write
1B3CE000
stack
page read and write
26CF000
trusted library allocation
page read and write
28E66406000
heap
page read and write
F78000
heap
page read and write
205704A2000
heap
page read and write
1344D000
trusted library allocation
page read and write
9E8F5BA000
stack
page read and write
960000
heap
page read and write
7FF848E14000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
20690371000
trusted library allocation
page read and write
2055612C000
heap
page read and write
20690298000
trusted library allocation
page read and write
28E4E2A0000
heap
page read and write
7FF848FB0000
trusted library allocation
page read and write
206ED500000
heap
page read and write
2A2C9123000
trusted library allocation
page read and write
205680D9000
trusted library allocation
page read and write
329C000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
7DF494200000
trusted library allocation
page execute and read and write
1B146E2C000
trusted library allocation
page read and write
15C0000
trusted library allocation
page read and write
2A2B70E6000
heap
page read and write
C50000
heap
page read and write
1C113000
stack
page read and write
1B137DC6000
trusted library allocation
page read and write
1B62F000
stack
page read and write
1BA6E000
stack
page read and write
7FF848F87000
trusted library allocation
page read and write
14FF000
heap
page read and write
1B33E000
stack
page read and write
9E8F6BE000
stack
page read and write
B50000
trusted library allocation
page read and write
1BB6F000
stack
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
8B5000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
2599000
trusted library allocation
page read and write
20567FA0000
trusted library allocation
page read and write
7FF849240000
trusted library allocation
page execute and read and write
BDD000
heap
page read and write
20568100000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
1780000
trusted library allocation
page read and write
2D63000
trusted library allocation
page read and write
2D68000
trusted library allocation
page read and write
88A000
heap
page read and write
20690245000
trusted library allocation
page read and write
2600000
trusted library section
page read and write
2A2B70A7000
heap
page read and write
2743000
trusted library allocation
page read and write
1B7AC000
heap
page read and write
1B146EB9000
trusted library allocation
page read and write
1BEC3000
stack
page read and write
28E5008C000
trusted library allocation
page read and write
2056819D000
trusted library allocation
page read and write
1B146E63000
trusted library allocation
page read and write
7FF8490AC000
trusted library allocation
page read and write
1B86E000
stack
page read and write
7FF848E23000
trusted library allocation
page read and write
206ED64F000
heap
page read and write
1AEE0000
heap
page read and write
7FF848E1B000
trusted library allocation
page read and write
322C000
trusted library allocation
page read and write
20555F50000
heap
page read and write
C96A4BD000
stack
page read and write
10A5000
heap
page read and write
7FF849260000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page read and write
16F0000
heap
page read and write
86F000
heap
page read and write
7FF848EB6000
trusted library allocation
page read and write
7FF84902C000
trusted library allocation
page read and write
7FF849178000
trusted library allocation
page read and write
7FF848DF6000
trusted library allocation
page read and write
1C81E000
heap
page read and write
9E8F478000
stack
page read and write
12438000
trusted library allocation
page read and write
2A2B6FD0000
heap
page read and write
1C420000
heap
page read and write
1B146F38000
trusted library allocation
page read and write
1A510000
trusted library allocation
page read and write
12CB3000
trusted library allocation
page read and write
205681B4000
trusted library allocation
page read and write
1B62D000
stack
page read and write
7FF848FC7000
trusted library allocation
page read and write
B80000
heap
page read and write
27B0000
heap
page execute and read and write
7FF848F99000
trusted library allocation
page read and write
5B0000
heap
page read and write
2A2873F000
stack
page read and write
7FF849030000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page execute and read and write
7FF849140000
trusted library allocation
page read and write
28E666F1000
heap
page read and write
20690259000
trusted library allocation
page read and write
1DB1B182000
trusted library allocation
page read and write
1B146EF7000
trusted library allocation
page read and write
2A2C9148000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
7FF848F87000
trusted library allocation
page read and write
D6F000
stack
page read and write
3149000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
1B72E000
stack
page read and write
7FF849050000
trusted library allocation
page read and write
C96A53E000
stack
page read and write
2A28B3B000
stack
page read and write
20680001000
trusted library allocation
page read and write
FAA000
heap
page read and write
1DB3257D000
heap
page read and write
7FF849240000
trusted library allocation
page read and write
20690467000
trusted library allocation
page read and write
BCB000
heap
page read and write
82B000
heap
page read and write
2A2C93D5000
trusted library allocation
page read and write
C40000
heap
page execute and read and write
206904A8000
trusted library allocation
page read and write
F9D000
heap
page read and write
1B146C23000
trusted library allocation
page read and write
2069028E000
trusted library allocation
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
7FF848FD8000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
2A2C923A000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
1B14704F000
trusted library allocation
page read and write
2A2C9326000
trusted library allocation
page read and write
3238000
trusted library allocation
page read and write
2069035E000
trusted library allocation
page read and write
B50000
heap
page read and write
206813C0000
trusted library allocation
page read and write
B8F000
stack
page read and write
2A2BA8E1000
trusted library allocation
page read and write
10E5000
heap
page read and write
7FF848ED0000
trusted library allocation
page execute and read and write
206EB293000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
1B714000
heap
page read and write
1DB325A3000
heap
page read and write
1B146FCC000
trusted library allocation
page read and write
C96B28D000
stack
page read and write
141A000
heap
page read and write
F05000
heap
page read and write
7FF848FC9000
trusted library allocation
page read and write
7FF849047000
trusted library allocation
page read and write
3E5000
heap
page read and write
9A8000
heap
page read and write
206EB218000
heap
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
206903F4000
trusted library allocation
page read and write
205682E0000
trusted library allocation
page read and write
2A2C907E000
trusted library allocation
page read and write
1460000
heap
page read and write
1BCFE000
stack
page read and write
7FF848FA7000
trusted library allocation
page read and write
B10000
heap
page read and write
3C0000
heap
page read and write
14C0000
trusted library allocation
page read and write
7FF8491F0000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page read and write
1C1CF000
stack
page read and write
96B000
heap
page read and write
285E000
trusted library allocation
page read and write
E4F000
heap
page read and write
1BE3E000
stack
page read and write
206811D8000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page read and write
2B6E000
stack
page read and write
205680E1000
trusted library allocation
page read and write
20568185000
trusted library allocation
page read and write
1B136AD0000
trusted library allocation
page read and write
2A2B72B0000
trusted library allocation
page read and write
1C399000
stack
page read and write
2A2C93FE000
trusted library allocation
page read and write
7FF848E2B000
trusted library allocation
page read and write
2A2B6FF0000
heap
page read and write
8AF000
heap
page read and write
12A8D000
trusted library allocation
page read and write
1B146E9C000
trusted library allocation
page read and write
20568377000
trusted library allocation
page read and write
7FF84920A000
trusted library allocation
page read and write
7FF849220000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
7FF848DFB000
trusted library allocation
page read and write
7FF848E1B000
trusted library allocation
page execute and read and write
20568317000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page read and write
973000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
7FF848E08000
trusted library allocation
page read and write
2EB0000
heap
page execute and read and write
2A2B70E4000
heap
page read and write
7FF8490F1000
trusted library allocation
page read and write
20568268000
trusted library allocation
page read and write
1C24E000
stack
page read and write
7FF848FAE000
trusted library allocation
page read and write
205680FD000
trusted library allocation
page read and write
1C41E000
stack
page read and write
710000
trusted library allocation
page read and write
206EB1E0000
heap
page read and write
20568103000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
C53577E000
stack
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
FEE6B36000
stack
page read and write
124F1000
trusted library allocation
page read and write
2056830D000
trusted library allocation
page read and write
88C000
heap
page read and write
206903CF000
trusted library allocation
page read and write
B10000
trusted library section
page read and write
1BC7E000
stack
page read and write
7FF848E20000
trusted library allocation
page read and write
1DB1AD80000
trusted library allocation
page read and write
1555000
heap
page read and write
205683DB000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
1CC19000
heap
page read and write
825000
heap
page read and write
206ECC40000
heap
page readonly
2A2C924F000
trusted library allocation
page read and write
31E0000
heap
page execute and read and write
28E663EA000
heap
page read and write
7FF848F35000
trusted library allocation
page execute and read and write
205681D9000
trusted library allocation
page read and write
206901DE000
trusted library allocation
page read and write
1B73C000
heap
page read and write
780000
heap
page read and write
20570430000
heap
page read and write
D70000
heap
page read and write
2550000
heap
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
313F000
stack
page read and write
7FF848E96000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
2A2C92C9000
trusted library allocation
page read and write
1482000
heap
page read and write
7FF848E0B000
trusted library allocation
page read and write
3146000
trusted library allocation
page read and write
1B746000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
2069034F000
trusted library allocation
page read and write
969000
heap
page read and write
1B146FA5000
trusted library allocation
page read and write
2A2C913A000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
20556030000
heap
page read and write
1DB32328000
heap
page read and write
C5357F9000
stack
page read and write
1B6EF000
stack
page read and write
C969D7F000
unkown
page read and write
7FF848F25000
trusted library allocation
page execute and read and write
2A2C9253000
trusted library allocation
page read and write
1B14F121000
heap
page read and write
2A2C8FC3000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
2A2C9244000
trusted library allocation
page read and write
7FF848FA7000
trusted library allocation
page read and write
1B146F80000
trusted library allocation
page read and write
1DB1B902000
trusted library allocation
page read and write
2A2C93BF000
trusted library allocation
page read and write
28E500D1000
trusted library allocation
page read and write
2900000
heap
page read and write
205680C0000
trusted library allocation
page read and write
7FF848E16000
trusted library allocation
page read and write
2890000
trusted library allocation
page read and write
C535BFE000
stack
page read and write
20559234000
trusted library allocation
page read and write
106F000
stack
page read and write
1AFFF000
stack
page read and write
1940000
heap
page read and write
28E4C508000
heap
page read and write
7FF848F8E000
trusted library allocation
page read and write
206ED300000
heap
page read and write
20559798000
trusted library allocation
page read and write
1B23E000
stack
page read and write
1B380000
heap
page execute and read and write
1B726000
heap
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
17F0000
heap
page read and write
7E0000
heap
page read and write
206EB24C000
heap
page read and write
B20000
trusted library allocation
page read and write
1DB32187000
heap
page read and write
2A2C9055000
trusted library allocation
page read and write
2F90000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
1B0BE000
stack
page read and write
635000
heap
page read and write
1B146E7F000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page execute and read and write
7FF849170000
trusted library allocation
page read and write
20556090000
heap
page read and write
124FD000
trusted library allocation
page read and write
124D8000
trusted library allocation
page read and write
206ECD70000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
7FF84925B000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
1AC50000
trusted library allocation
page read and write
205704F7000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
D40000
heap
page read and write
CC4CD8E000
stack
page read and write
1B14F187000
heap
page read and write
20568107000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
1B8DB000
heap
page read and write
7FF848DE2000
trusted library allocation
page read and write
20570568000
heap
page read and write
14A1000
heap
page read and write
1B5F3000
stack
page read and write
2A2C9346000
trusted library allocation
page read and write
1B8E6000
heap
page read and write
1DB183F0000
trusted library allocation
page read and write
2A2C930E000
trusted library allocation
page read and write
206904B2000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
1DB32614000
heap
page read and write
2A2B709D000
heap
page read and write
7FF848E12000
trusted library allocation
page read and write
14A4000
heap
page read and write
1B137C81000
trusted library allocation
page read and write
20690282000
trusted library allocation
page read and write
7FF848F92000
trusted library allocation
page read and write
2A2C924D000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
7FF8490F8000
trusted library allocation
page read and write
2A2C9126000
trusted library allocation
page read and write
2A2950E000
stack
page read and write
BF1000
heap
page read and write
1281D000
trusted library allocation
page read and write
2A2C9324000
trusted library allocation
page read and write
1B4BC000
stack
page read and write
DB0000
trusted library allocation
page read and write
2056801F000
trusted library allocation
page read and write
28BA000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page execute and read and write
1B146E82000
trusted library allocation
page read and write
5FB000
heap
page read and write
A70000
heap
page read and write
1330000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
2A2D1178000
heap
page read and write
1430000
heap
page read and write
205583FD000
trusted library allocation
page read and write
1DB2A487000
trusted library allocation
page read and write
1B146FF0000
trusted library allocation
page read and write
ACF000
heap
page read and write
7FF848DF6000
trusted library allocation
page read and write
EB0000
heap
page read and write
A3E000
stack
page read and write
940000
heap
page read and write
1DB1B38F000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
28E4E100000
trusted library allocation
page read and write
1DB322C5000
heap
page read and write
E00000
trusted library allocation
page read and write
2A2D14D3000
heap
page read and write
20570444000
heap
page read and write
1B680000
heap
page read and write
7FF849178000
trusted library allocation
page read and write
18FE000
stack
page read and write
1AE9E000
stack
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
2069043D000
trusted library allocation
page read and write
7FF848DE6000
trusted library allocation
page read and write
7FF848FA2000
trusted library allocation
page read and write
7FF848FF4000
trusted library allocation
page read and write
20559D51000
trusted library allocation
page read and write
206ED508000
heap
page read and write
34FE000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
1B693000
stack
page read and write
1B8A7000
heap
page read and write
20568365000
trusted library allocation
page read and write
2055913F000
trusted library allocation
page read and write
7FF848FB2000
trusted library allocation
page read and write
2A2C9222000
trusted library allocation
page read and write
B15000
heap
page read and write
206ED2F0000
heap
page execute and read and write
8F8000
heap
page read and write
2069038C000
trusted library allocation
page read and write
2A2C93A6000
trusted library allocation
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
7FF849250000
trusted library allocation
page read and write
2A2C9213000
trusted library allocation
page read and write
1DB1BA0E000
trusted library allocation
page read and write
7FF848FB7000
trusted library allocation
page read and write
7FF848FAE000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
2AE3000
trusted library allocation
page read and write
2A2C9285000
trusted library allocation
page read and write
1B684000
stack
page read and write
B40000
trusted library allocation
page read and write
E20000
heap
page read and write
1B70D000
stack
page read and write
CE0000
heap
page read and write
1B480000
heap
page execute and read and write
20690422000
trusted library allocation
page read and write
17F0000
heap
page read and write
BB0000
trusted library allocation
page read and write
B33000
trusted library allocation
page read and write
2069046E000
trusted library allocation
page read and write
2056818B000
trusted library allocation
page read and write
2A2C91EC000
trusted library allocation
page read and write
7FF848FE2000
trusted library allocation
page read and write
1243D000
trusted library allocation
page read and write
7FF848DE4000
trusted library allocation
page read and write
20568025000
trusted library allocation
page read and write
1515000
heap
page read and write
7DF4447E0000
trusted library allocation
page execute and read and write
1B25E000
stack
page read and write
2748000
trusted library allocation
page read and write
1DB18410000
trusted library allocation
page read and write
1DB18500000
heap
page read and write
81D000
heap
page read and write
128C1000
trusted library allocation
page read and write
1B736000
heap
page read and write
1B146FF5000
trusted library allocation
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
2A2C93D9000
trusted library allocation
page read and write
2069038F000
trusted library allocation
page read and write
7FF849250000
trusted library allocation
page read and write
1B82F000
stack
page read and write
DF0000
heap
page read and write
2A2C91F9000
trusted library allocation
page read and write
2476000
trusted library allocation
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
2A2B945D000
trusted library allocation
page read and write
2A2C90E5000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
206903C3000
trusted library allocation
page read and write
1B2AE000
stack
page read and write
2056813F000
trusted library allocation
page read and write
7FF848F97000
trusted library allocation
page read and write
1DB2A1B1000
trusted library allocation
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
7FF849040000
trusted library allocation
page read and write
1AAED000
stack
page read and write
7FF848FF2000
trusted library allocation
page read and write
2C1F000
trusted library allocation
page read and write
205682B6000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page read and write
205682CA000
trusted library allocation
page read and write
1B14F01C000
heap
page read and write
7FF848F15000
trusted library allocation
page execute and read and write
C96A07F000
stack
page read and write
7FF848E10000
trusted library allocation
page read and write
20568174000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
AB0000
trusted library allocation
page read and write
222E000
stack
page read and write
20568073000
trusted library allocation
page read and write
151D000
heap
page read and write
7FF848F92000
trusted library allocation
page read and write
2800000
heap
page execute and read and write
1B7A5000
heap
page read and write
A20000
heap
page read and write
1B3FF000
stack
page read and write
28E667A0000
heap
page read and write
20690469000
trusted library allocation
page read and write
BE1000
heap
page read and write
1B14F00C000
heap
page read and write
1280000
heap
page execute and read and write
2A2C9332000
trusted library allocation
page read and write
1B14F049000
heap
page read and write
7FF849240000
trusted library allocation
page read and write
CC4BDFD000
stack
page read and write
F8D000
heap
page read and write
7FF848FD5000
trusted library allocation
page read and write
90C000
heap
page read and write
1B146F3E000
trusted library allocation
page read and write
7FF849112000
trusted library allocation
page read and write
2745000
trusted library allocation
page read and write
7FF848E2B000
trusted library allocation
page execute and read and write
7FF848DF4000
trusted library allocation
page read and write
28E6675E000
heap
page read and write
7FF848FA9000
trusted library allocation
page read and write
2A2C933C000
trusted library allocation
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
1630000
trusted library allocation
page read and write
A8F000
stack
page read and write
1B678000
heap
page read and write
1090000
heap
page read and write
1DB322C3000
heap
page read and write
28E4FBA1000
trusted library allocation
page read and write
630000
heap
page read and write
206EB5B0000
heap
page read and write
CC4BF37000
stack
page read and write
13448000
trusted library allocation
page read and write
1B147058000
trusted library allocation
page read and write
C05000
heap
page read and write
2610000
heap
page read and write
7FF848FB2000
trusted library allocation
page read and write
20568001000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
12CB8000
trusted library allocation
page read and write
B90000
heap
page read and write
7FF848E3B000
trusted library allocation
page read and write
7FF848FAE000
trusted library allocation
page read and write
13183000
trusted library allocation
page read and write
131F1000
trusted library allocation
page read and write
7FF84917C000
trusted library allocation
page read and write
20681093000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
F0D000
heap
page read and write
1B14F042000
heap
page read and write
106F000
stack
page read and write
940000
heap
page read and write
7FF848FAA000
trusted library allocation
page read and write
2A2C9194000
trusted library allocation
page read and write
1B1BE000
stack
page read and write
1B14ED95000
heap
page read and write
C535DFB000
stack
page read and write
2A2BAD84000
trusted library allocation
page read and write
206902C1000
trusted library allocation
page read and write
7FF848E2B000
trusted library allocation
page execute and read and write
12524000
trusted library allocation
page read and write
C53694D000
stack
page read and write
1AF8C000
stack
page read and write
25D0000
trusted library allocation
page read and write
205681CE000
trusted library allocation
page read and write
206903D5000
trusted library allocation
page read and write
205681C5000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
7FF849159000
trusted library allocation
page read and write
1B136AA0000
trusted library allocation
page read and write
2A2C9145000
trusted library allocation
page read and write
1BC2E000
stack
page read and write
28B0000
trusted library allocation
page read and write
31EF000
stack
page read and write
1410000
heap
page read and write
1B10F000
stack
page read and write
7FF849260000
trusted library allocation
page read and write
205683E5000
trusted library allocation
page read and write
2056814E000
trusted library allocation
page read and write
E20000
heap
page execute and read and write
28E4EEE2000
trusted library allocation
page read and write
1B2DE000
stack
page read and write
1B14EE80000
trusted library allocation
page read and write
2069047E000
trusted library allocation
page read and write
CC4CC8E000
stack
page read and write
2A2867D000
stack
page read and write
28E6672B000
heap
page read and write
20680229000
trusted library allocation
page read and write
1AD9D000
stack
page read and write
15AF000
stack
page read and write
C55000
heap
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
1B136C76000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
B60000
trusted library allocation
page read and write
B20000
trusted library section
page read and write
7FF8491A0000
trusted library allocation
page read and write
C96A438000
stack
page read and write
1B66E000
stack
page read and write
1C830000
heap
page read and write
7FF848FB2000
trusted library allocation
page read and write
1A8AD000
stack
page read and write
2A2D1217000
heap
page execute and read and write
7FF848E2B000
trusted library allocation
page read and write
7FF8491E0000
trusted library allocation
page read and write
1B1470A1000
trusted library allocation
page read and write
87F000
heap
page read and write
1A660000
trusted library allocation
page read and write
1B864000
heap
page read and write
78C000
heap
page read and write
2520000
heap
page execute and read and write
B1F000
stack
page read and write
261F000
stack
page read and write
1B72E000
heap
page read and write
20568263000
trusted library allocation
page read and write
7FF84917C000
trusted library allocation
page read and write
2056819A000
trusted library allocation
page read and write
2A2D1120000
heap
page read and write
7FF848FF8000
trusted library allocation
page read and write
7FF849280000
trusted library allocation
page read and write
205682DD000
trusted library allocation
page read and write
7FF848FCA000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
205560D0000
trusted library allocation
page read and write
2A2B8F91000
trusted library allocation
page read and write
20567FF6000
trusted library allocation
page read and write
7FF848E18000
trusted library allocation
page read and write
CC4C23E000
stack
page read and write
205683CD000
trusted library allocation
page read and write
DDA000
heap
page read and write
7FF8490CF000
trusted library allocation
page read and write
A90000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page read and write
1B05E000
stack
page read and write
2056808E000
trusted library allocation
page read and write
EB0000
heap
page read and write
AC5000
heap
page read and write
EE8000
heap
page read and write
C5369CE000
stack
page read and write
28E4F3D0000
trusted library allocation
page read and write
205680C2000
trusted library allocation
page read and write
370000
heap
page read and write
7FF848E1B000
trusted library allocation
page read and write
7FF848E28000
trusted library allocation
page read and write
3E0000
heap
page read and write
20690404000
trusted library allocation
page read and write
B55000
heap
page read and write
230F000
stack
page read and write
14CB000
heap
page read and write
2A2BA294000
trusted library allocation
page read and write
206ED68A000
heap
page read and write
1B533000
stack
page read and write
2C5E000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
2056818E000
trusted library allocation
page read and write
7FF848DF4000
trusted library allocation
page read and write
898000
heap
page read and write
2977000
trusted library allocation
page read and write
2A2C9334000
trusted library allocation
page read and write
205562C0000
heap
page read and write
1DB32551000
heap
page read and write
1536000
heap
page read and write
7FF848E13000
trusted library allocation
page read and write
1B146F54000
trusted library allocation
page read and write
2056831F000
trusted library allocation
page read and write
206903F6000
trusted library allocation
page read and write
28BF000
stack
page read and write
1BC6E000
stack
page read and write
2057002D000
heap
page read and write
13D3000
heap
page read and write
7FF848E2B000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
7FF848F20000
trusted library allocation
page execute and read and write
BA0000
trusted library allocation
page read and write
75E000
heap
page read and write
2056FF7B000
heap
page read and write
8A0000
heap
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
2057047B000
heap
page read and write
2A2C943A000
trusted library allocation
page read and write
1B134D90000
heap
page read and write
28E66817000
heap
page read and write
D36000
stack
page read and write
2A2C93DD000
trusted library allocation
page read and write
FEE6879000
stack
page read and write
2A2C93D0000
trusted library allocation
page read and write
206EB297000
heap
page read and write
2A2C92A2000
trusted library allocation
page read and write
1466000
heap
page read and write
20680087000
trusted library allocation
page read and write
20570420000
heap
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
7FF848DED000
trusted library allocation
page execute and read and write
2056824D000
trusted library allocation
page read and write
1DB2A476000
trusted library allocation
page read and write
1B146F35000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page execute and read and write
97F000
stack
page read and write
2056835E000
trusted library allocation
page read and write
7FF848E1B000
trusted library allocation
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
2A281EF000
stack
page read and write
206EB5B5000
heap
page read and write
1DB325CD000
heap
page read and write
7FF848FC1000
trusted library allocation
page read and write
7FF848DE3000
trusted library allocation
page execute and read and write
7FF848E1D000
trusted library allocation
page execute and read and write
8BD000
heap
page read and write
28E4ED02000
trusted library allocation
page read and write
1200000
heap
page read and write
CC4BAFF000
unkown
page read and write
F95000
heap
page read and write
2C4F000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
16B5000
heap
page read and write
1B2EF000
stack
page read and write
28E667F4000
heap
page read and write
ADA000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
7FF848FB7000
trusted library allocation
page read and write
1B146F5A000
trusted library allocation
page read and write
9E90307000
stack
page read and write
205597BE000
trusted library allocation
page read and write
7DF491610000
trusted library allocation
page execute and read and write
CC4BA73000
stack
page read and write
1B0B0000
heap
page execute and read and write
11D0000
heap
page read and write
6EC000
heap
page read and write
2A2D14CF000
heap
page read and write
7FF849000000
trusted library allocation
page execute and read and write
7FF848DF3000
trusted library allocation
page execute and read and write
279E000
stack
page read and write
2A2C9341000
trusted library allocation
page read and write
8F3000
heap
page read and write
7FF848FB2000
trusted library allocation
page read and write
1B130000
heap
page read and write
2200000
heap
page read and write
7FF849054000
trusted library allocation
page read and write
1B1B0000
trusted library allocation
page read and write
1A6C0000
trusted library allocation
page read and write
205560F8000
heap
page read and write
7DF491600000
trusted library allocation
page execute and read and write
2A2C9080000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page read and write
7FF8490C1000
trusted library allocation
page read and write
7FF848E06000
trusted library allocation
page read and write
1B1AD000
stack
page read and write
28E4F029000
trusted library allocation
page read and write
9E8F379000
stack
page read and write
7FF848EC6000
trusted library allocation
page read and write
1DB324D0000
heap
page read and write
20690470000
trusted library allocation
page read and write
7FF849164000
trusted library allocation
page read and write
1ABBD000
stack
page read and write
1B1370BC000
trusted library allocation
page read and write
2A2C9159000
trusted library allocation
page read and write
7FF84910F000
trusted library allocation
page read and write
2A2C9201000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
7FF848FC2000
trusted library allocation
page read and write
CC4BE79000
stack
page read and write
2A2C91EA000
trusted library allocation
page read and write
1B8FF000
heap
page read and write
1B14EE90000
heap
page read and write
7FF848FA9000
trusted library allocation
page read and write
C90000
heap
page read and write
880000
trusted library allocation
page read and write
20570020000
heap
page read and write
2A2D1174000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
FD5000
heap
page read and write
1B146E28000
trusted library allocation
page read and write
7FF848FE8000
trusted library allocation
page read and write
C86000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
28E4F36D000
trusted library allocation
page read and write
20681305000
trusted library allocation
page read and write
1B146E19000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
1B670000
heap
page read and write
1DB18317000
heap
page read and write
2A2B99E1000
trusted library allocation
page read and write
20568213000
trusted library allocation
page read and write
246F000
stack
page read and write
206ED608000
heap
page read and write
1256D000
trusted library allocation
page read and write
7FF848FCA000
trusted library allocation
page read and write
206ED448000
heap
page read and write
1B137D4A000
trusted library allocation
page read and write
1B12D000
stack
page read and write
820000
heap
page read and write
28E665E7000
heap
page read and write
7FF849240000
trusted library allocation
page read and write
7FF8490D1000
trusted library allocation
page read and write
1BA9B000
heap
page read and write
2A2C927D000
trusted library allocation
page read and write
1B2B3000
stack
page read and write
1B146F61000
trusted library allocation
page read and write
5E5000
heap
page read and write
205682B2000
trusted library allocation
page read and write
2069045D000
trusted library allocation
page read and write
1B14F008000
heap
page read and write
9E8F2FF000
stack
page read and write
7FF849280000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
7FF848DF2000
trusted library allocation
page read and write
C1B000
heap
page read and write
1B6D4000
heap
page read and write
7FF84915A000
trusted library allocation
page read and write
28E667D2000
heap
page read and write
1B14702A000
trusted library allocation
page read and write
1BBE0000
heap
page read and write
7FF848FCA000
trusted library allocation
page read and write
1B98E000
stack
page read and write
1B14F0EF000
heap
page read and write
1BA90000
heap
page read and write
FAC000
heap
page read and write
1760000
heap
page read and write
92D000
heap
page read and write
2A2C92BD000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
2A2C9076000
trusted library allocation
page read and write
24CF000
stack
page read and write
205681B8000
trusted library allocation
page read and write
1BA83000
stack
page read and write
2069029B000
trusted library allocation
page read and write
2069041C000
trusted library allocation
page read and write
20567FE0000
trusted library allocation
page read and write
570000
heap
page read and write
1DB325DD000
heap
page read and write
2A2BA34F000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
1B98E000
stack
page read and write
7FF849169000
trusted library allocation
page read and write
205682ED000
trusted library allocation
page read and write
205681E2000
trusted library allocation
page read and write
1A840000
trusted library allocation
page read and write
20568244000
trusted library allocation
page read and write
7FF848EA6000
trusted library allocation
page read and write
7FF848E0B000
trusted library allocation
page read and write
FEE69FD000
stack
page read and write
206ECD85000
heap
page read and write
7FF849260000
trusted library allocation
page read and write
16B0000
heap
page read and write
20690437000
trusted library allocation
page read and write
7FF848E1B000
trusted library allocation
page read and write
2A2C9060000
trusted library allocation
page read and write
B0A000
heap
page read and write
1B39F000
stack
page read and write
20690439000
trusted library allocation
page read and write
6DA000
heap
page read and write
206ECCA0000
heap
page execute and read and write
14A0000
trusted library allocation
page read and write
205682C1000
trusted library allocation
page read and write
12A03000
trusted library allocation
page read and write
14D0000
heap
page read and write
2B0000
unkown
page readonly
7FF849180000
trusted library allocation
page read and write
A6F000
stack
page read and write
20681DDC000
trusted library allocation
page read and write
1B8C7000
heap
page read and write
12433000
trusted library allocation
page read and write
855000
heap
page read and write
13441000
trusted library allocation
page read and write
7FF848EA6000
trusted library allocation
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
2A2C9320000
trusted library allocation
page read and write
2A2C9297000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
B00000
trusted library allocation
page read and write
2A2C903C000
trusted library allocation
page read and write
1B146F9C000
trusted library allocation
page read and write
14D8000
heap
page read and write
1B1BE000
stack
page read and write
D8F000
stack
page read and write
FEE68FE000
stack
page read and write
1B748000
heap
page read and write
CC4C13E000
stack
page read and write
28E4C54A000
heap
page read and write
1578000
heap
page read and write
A30000
heap
page read and write
7FF848E08000
trusted library allocation
page read and write
7FF848DF2000
trusted library allocation
page read and write
7AB000
heap
page read and write
7FF848FA2000
trusted library allocation
page read and write
1B137CAD000
trusted library allocation
page read and write
7C0000
heap
page read and write
2A2C9110000
trusted library allocation
page read and write
2AFF000
stack
page read and write
7FF848DF0000
trusted library allocation
page read and write
C21000
heap
page read and write
FEE66FF000
stack
page read and write
150F000
heap
page read and write
7FF848FAE000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
20570156000
heap
page read and write
206EB306000
heap
page read and write
7FF848DE3000
trusted library allocation
page execute and read and write
1CC00000
heap
page read and write
1B134E58000
heap
page read and write
2A2C904E000
trusted library allocation
page read and write
205683B4000
trusted library allocation
page read and write
BBE000
heap
page read and write
9F7000
heap
page read and write
2A2C915F000
trusted library allocation
page read and write
205680BE000
trusted library allocation
page read and write
1C14E000
stack
page read and write
1B78B000
stack
page read and write
2670000
heap
page execute and read and write
7FF848E0D000
trusted library allocation
page execute and read and write
D60000
heap
page read and write
2A2C9236000
trusted library allocation
page read and write
CC4BBFE000
stack
page read and write
1067000
heap
page read and write
2056826A000
trusted library allocation
page read and write
1B14F010000
heap
page read and write
28E4C55E000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
28E4F486000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
206ED67F000
heap
page read and write
2A2C91C6000
trusted library allocation
page read and write
2A2C9310000
trusted library allocation
page read and write
205682C8000
trusted library allocation
page read and write
1B6CB000
heap
page read and write
7FF848FE2000
trusted library allocation
page read and write
1528000
heap
page read and write
26DA000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
7FF848FD2000
trusted library allocation
page read and write
1B14ED42000
heap
page read and write
2A2C9064000
trusted library allocation
page read and write
2A28ABE000
stack
page read and write
7FF8490C0000
trusted library allocation
page read and write
28E4C5FC000
heap
page read and write
2A2C9135000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
7FF848F97000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
1BBBF000
stack
page read and write
28E4F341000
trusted library allocation
page read and write
8B0000
heap
page read and write
EB5000
heap
page read and write
2A2C9433000
trusted library allocation
page read and write
2A2C902C000
trusted library allocation
page read and write
205681A2000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
205682D5000
trusted library allocation
page read and write
7FF848E96000
trusted library allocation
page read and write
7FF848FAE000
trusted library allocation
page read and write
9AB000
heap
page read and write
7FF848EC6000
trusted library allocation
page read and write
20568321000
trusted library allocation
page read and write
12BA1000
trusted library allocation
page read and write
28E5E5A7000
trusted library allocation
page read and write
C5356FF000
stack
page read and write
1B5E0000
heap
page read and write
1750000
trusted library allocation
page read and write
7FF848DF4000
trusted library allocation
page read and write
20558FC1000
trusted library allocation
page read and write
206902ED000
trusted library allocation
page read and write
1DB19DC0000
heap
page execute and read and write
16CF000
stack
page read and write
7FF849050000
trusted library allocation
page read and write
260B000
trusted library allocation
page read and write
1B146EA2000
trusted library allocation
page read and write
3C0000
heap
page read and write
2057057A000
heap
page read and write
1DB2A469000
trusted library allocation
page read and write
20559D0C000
trusted library allocation
page read and write
32A5000
trusted library allocation
page read and write
7FF848E04000
trusted library allocation
page read and write
7FF8490E8000
trusted library allocation
page read and write
2A2C91D3000
trusted library allocation
page read and write
7FF84915C000
trusted library allocation
page read and write
26CD000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
2A289BF000
stack
page read and write
20690021000
trusted library allocation
page read and write
12563000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page read and write
ADC000
heap
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
20570440000
heap
page read and write
1730000
trusted library allocation
page read and write
7FF848E3C000
trusted library allocation
page execute and read and write
7FF848EE6000
trusted library allocation
page execute and read and write
205704C7000
heap
page read and write
28E5E2B1000
trusted library allocation
page read and write
1B146F7D000
trusted library allocation
page read and write
7FF849085000
trusted library allocation
page read and write
E60000
heap
page read and write
1DB18430000
trusted library allocation
page read and write
590000
heap
page read and write
758000
heap
page read and write
2681000
trusted library allocation
page read and write
1B8B9000
heap
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
1B3BE000
stack
page read and write
7FF848F90000
trusted library allocation
page read and write
1B134C90000
heap
page read and write
1495000
heap
page read and write
2A2C9121000
trusted library allocation
page read and write
1A460000
trusted library allocation
page read and write
1B134E0D000
heap
page read and write
2A2C9078000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
1AF5E000
stack
page read and write
1B78E000
stack
page read and write
7FF848FA9000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page read and write
1B14EBF1000
heap
page read and write
BC0000
heap
page read and write
7FF8490F0000
trusted library allocation
page read and write
7FF848FBA000
trusted library allocation
page read and write
12568000
trusted library allocation
page read and write
1B14707D000
trusted library allocation
page read and write
1415000
heap
page read and write
366000
stack
page read and write
205682B4000
trusted library allocation
page read and write
2A2B91B8000
trusted library allocation
page read and write
2A2C91CC000
trusted library allocation
page read and write
2A2C9315000
trusted library allocation
page read and write
1B136BE0000
heap
page execute and read and write
1DB183B0000
heap
page read and write
1B000000
heap
page read and write
12E0000
heap
page read and write
12CBD000
trusted library allocation
page read and write
1B146EDD000
trusted library allocation
page read and write
7FF848FF8000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
2A2BAD92000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
1B13847D000
trusted library allocation
page read and write
95F000
stack
page read and write
2A2C911D000
trusted library allocation
page read and write
322F000
trusted library allocation
page read and write
205562B0000
heap
page execute and read and write
28E4EEAE000
trusted library allocation
page read and write
1DB18250000
heap
page read and write
2A280E3000
stack
page read and write
7FF848ED0000
trusted library allocation
page read and write
7FF849200000
trusted library allocation
page read and write
1B146E8A000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
20568367000
trusted library allocation
page read and write
CC4C03B000
stack
page read and write
7AD000
heap
page read and write
28E4F246000
trusted library allocation
page read and write
31FE000
trusted library allocation
page read and write
20568133000
trusted library allocation
page read and write
128C8000
trusted library allocation
page read and write
2A2B9FBE000
trusted library allocation
page read and write
14F3000
heap
page read and write
1A500000
trusted library allocation
page read and write
3227000
trusted library allocation
page read and write
1508000
heap
page read and write
7FF848FB2000
trusted library allocation
page read and write
1DB3238C000
heap
page read and write
281F000
stack
page read and write
28E4EEA6000
trusted library allocation
page read and write
28E666E2000
heap
page read and write
6EA000
heap
page read and write
28E5E5B7000
trusted library allocation
page read and write
20690221000
trusted library allocation
page read and write
1B147070000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
1B760000
heap
page execute and read and write
640000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
1B0EF000
stack
page read and write
9E8F1FF000
stack
page read and write
11C0000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
206ECD60000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
2608000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
2A2B9016000
trusted library allocation
page read and write
1B137961000
trusted library allocation
page read and write
1B146DF7000
trusted library allocation
page read and write
7FF848E02000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
7FF848FD4000
trusted library allocation
page read and write
1C13E000
stack
page read and write
1B364000
stack
page read and write
AAE000
stack
page read and write
20567FFD000
trusted library allocation
page read and write
5EF000
heap
page read and write
20570167000
heap
page read and write
820000
trusted library allocation
page read and write
2069027C000
trusted library allocation
page read and write
7FF848FA2000
trusted library allocation
page read and write
172F000
stack
page read and write
7FF848F45000
trusted library allocation
page execute and read and write
7FF849175000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
20568324000
trusted library allocation
page read and write
28E4E170000
trusted library allocation
page read and write
7FF849164000
trusted library allocation
page read and write
2A2D1168000
heap
page read and write
1B134E19000
heap
page read and write
CAF000
stack
page read and write
CC4BFB8000
stack
page read and write
2A2C91E8000
trusted library allocation
page read and write
2A2C93A3000
trusted library allocation
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
2A2C91DE000
trusted library allocation
page read and write
7DF4CBEB0000
trusted library allocation
page execute and read and write
7FF8490D0000
trusted library allocation
page read and write
CC4C2BB000
stack
page read and write
1B68F000
stack
page read and write
13DA000
heap
page read and write
2A2C91AA000
trusted library allocation
page read and write
2A2B7240000
trusted library allocation
page read and write
1B146EFF000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page read and write
206ED420000
heap
page read and write
945000
heap
page read and write
7FF849178000
trusted library allocation
page read and write
205682EF000
trusted library allocation
page read and write
2A2BADB2000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
206EB233000
heap
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
145D000
heap
page read and write
1B146F9A000
trusted library allocation
page read and write
62B000
heap
page read and write
1B146F82000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
1B00D000
stack
page read and write
7FF8490A0000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
920000
heap
page read and write
2A2C9224000
trusted library allocation
page read and write
2A2C909D000
trusted library allocation
page read and write
28E4C58A000
heap
page read and write
7FF848E28000
trusted library allocation
page read and write
20690228000
trusted library allocation
page read and write
1DB2A181000
trusted library allocation
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
7FF848E1D000
trusted library allocation
page execute and read and write
1B146E34000
trusted library allocation
page read and write
1B88E000
stack
page read and write
7FF849050000
trusted library allocation
page read and write
8F0000
heap
page read and write
FEE6D3E000
stack
page read and write
1B220000
trusted library allocation
page read and write
7FF848E3B000
trusted library allocation
page execute and read and write
2A288B8000
stack
page read and write
1510000
heap
page read and write
205682BB000
trusted library allocation
page read and write
1B147003000
trusted library allocation
page read and write
2B26000
trusted library allocation
page read and write
8F0000
heap
page read and write
1C707000
stack
page read and write
C3F000
heap
page read and write
20690316000
trusted library allocation
page read and write
5DB000
heap
page read and write
1AE50000
heap
page read and write
206ED58D000
heap
page read and write
2A2C911A000
trusted library allocation
page read and write
360000
heap
page read and write
2A2C931E000
trusted library allocation
page read and write
334000
unkown
page readonly
C8C000
heap
page read and write
205682C3000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
262E000
stack
page read and write
B30000
trusted library allocation
page read and write
206903B3000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
925000
heap
page read and write
2A2968E000
stack
page read and write
8D0000
heap
page read and write
9E9038C000
stack
page read and write
922000
heap
page read and write
20557BE5000
heap
page read and write
1269D000
trusted library allocation
page read and write
1B160000
heap
page execute and read and write
1B635000
stack
page read and write
BED000
heap
page read and write
1BF43000
stack
page read and write
7FF848FD2000
trusted library allocation
page read and write
6F6000
stack
page read and write
12C23000
trusted library allocation
page read and write
7FF848F89000
trusted library allocation
page read and write
7DF4691A0000
trusted library allocation
page execute and read and write
AF6000
stack
page read and write
93F000
heap
page read and write
13443000
trusted library allocation
page read and write
7FF848FF8000
trusted library allocation
page read and write
1B146FA0000
trusted library allocation
page read and write
2055610D000
heap
page read and write
965000
heap
page read and write
20690242000
trusted library allocation
page read and write
9E8F073000
stack
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
206818F1000
trusted library allocation
page read and write
7FF849280000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page read and write
1B146E92000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
BCF000
stack
page read and write
2A2C914C000
trusted library allocation
page read and write
2A2C91FE000
trusted library allocation
page read and write
7FF848E22000
trusted library allocation
page read and write
1BDDE000
stack
page read and write
EF6000
stack
page read and write
1070000
heap
page read and write
7E0000
heap
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
1B0AE000
stack
page read and write
2056805E000
trusted library allocation
page read and write
246F000
stack
page read and write
1B134F40000
heap
page read and write
8F4000
heap
page read and write
26C0000
heap
page read and write
1A520000
trusted library allocation
page read and write
2A2C933F000
trusted library allocation
page read and write
7FF848DFB000
trusted library allocation
page read and write
1B147015000
trusted library allocation
page read and write
1B5C0000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
1B146F08000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
20556200000
heap
page readonly
CF0000
trusted library allocation
page read and write
2A2D10EE000
heap
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
2C49000
trusted library allocation
page read and write
1B05F000
stack
page read and write
2250000
heap
page read and write
C96B207000
stack
page read and write
2A2D1370000
heap
page read and write
205680BC000
trusted library allocation
page read and write
970000
heap
page read and write
7FF848EC0000
trusted library allocation
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
C53567F000
unkown
page read and write
7FF848F35000
trusted library allocation
page execute and read and write
2A2D143A000
heap
page read and write
7FF848E28000
trusted library allocation
page read and write
923000
heap
page read and write
850000
trusted library allocation
page read and write
740000
heap
page read and write
1C21E000
stack
page read and write
1B146F03000
trusted library allocation
page read and write
2A2B7270000
heap
page readonly
2A2C91B1000
trusted library allocation
page read and write
1DB1A64D000
trusted library allocation
page read and write
2A2960D000
stack
page read and write
7A5000
heap
page read and write
1B14F16F000
heap
page read and write
2055614C000
heap
page read and write
1B14F053000
heap
page read and write
2A2C93ED000
trusted library allocation
page read and write
20690285000
trusted library allocation
page read and write
1B784000
stack
page read and write
7FF849040000
trusted library allocation
page read and write
FEE677F000
stack
page read and write
3D0000
heap
page read and write
1B130000
heap
page execute and read and write
12C2D000
trusted library allocation
page read and write
1DB182EC000
heap
page read and write
1700000
trusted library allocation
page read and write
1B146E4D000
trusted library allocation
page read and write
AA8000
heap
page read and write
1DB18313000
heap
page read and write
7FF849170000
trusted library allocation
page read and write
2A2C91D7000
trusted library allocation
page read and write
FEE7A0C000
stack
page read and write
12693000
trusted library allocation
page read and write
1DB1B23D000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
2A2BADB7000
trusted library allocation
page read and write
20567F31000
trusted library allocation
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
13DF000
heap
page read and write
C96A2F9000
stack
page read and write
7FF849120000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
28E66795000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
2A2B9D08000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
206ED0D7000
heap
page read and write
1B59E000
stack
page read and write
1DB1BF5C000
trusted library allocation
page read and write
1B137641000
trusted library allocation
page read and write
1B146E7D000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
1ADAF000
stack
page read and write
1DB3252F000
heap
page read and write
14FA000
heap
page read and write
264E000
stack
page read and write
1B138A10000
trusted library allocation
page read and write
1B146FAB000
trusted library allocation
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
1B146FC2000
trusted library allocation
page read and write
B98000
heap
page read and write
1B58E000
stack
page read and write
1BD6E000
stack
page read and write
7FF849230000
trusted library allocation
page read and write
28E4C53E000
heap
page read and write
251A000
trusted library allocation
page read and write
7D0000
trusted library allocation
page read and write
28E66590000
heap
page execute and read and write
7FF8490B0000
trusted library allocation
page read and write
6A0000
trusted library allocation
page read and write
F70000
heap
page read and write
1B146DE7000
trusted library allocation
page read and write
205683B0000
trusted library allocation
page read and write
2A2C926F000
trusted library allocation
page read and write
20568086000
trusted library allocation
page read and write
12CB1000
trusted library allocation
page read and write
C5358F9000
stack
page read and write
206EB22D000
heap
page read and write
7FF848FC7000
trusted library allocation
page read and write
87A000
heap
page read and write
1DB322E0000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
206ED800000
heap
page read and write
8BA000
heap
page read and write
7FF848FB9000
trusted library allocation
page read and write
1507000
heap
page read and write
7FF849182000
trusted library allocation
page read and write
205683D5000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
BBC000
heap
page read and write
754000
heap
page read and write
2A2C90BD000
trusted library allocation
page read and write
C96A3B7000
stack
page read and write
7FF848FF4000
trusted library allocation
page read and write
2A2B7030000
heap
page read and write
DA0000
heap
page read and write
2A2C9287000
trusted library allocation
page read and write
1B05F000
stack
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
7FF848FD0000
trusted library allocation
page execute and read and write
7FF849143000
trusted library allocation
page read and write
2069027F000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
7FF848F25000
trusted library allocation
page execute and read and write
7FF8490F0000
trusted library allocation
page read and write
15BE000
heap
page read and write
12821000
trusted library allocation
page read and write
1BA97000
heap
page read and write
1715000
heap
page read and write
12BAD000
trusted library allocation
page read and write
1B146F8F000
trusted library allocation
page read and write
7FF848F15000
trusted library allocation
page execute and read and write
2A2C9140000
trusted library allocation
page read and write
1B3BE000
stack
page read and write
AF6000
stack
page read and write
1B147097000
trusted library allocation
page read and write
1B147041000
trusted library allocation
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
C535B7A000
stack
page read and write
24EF000
stack
page read and write
28E66793000
heap
page read and write
5C8000
heap
page read and write
2A2D1154000
heap
page read and write
181F000
stack
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
20570110000
heap
page execute and read and write
7FF848ED6000
trusted library allocation
page execute and read and write
2A2C9336000
trusted library allocation
page read and write
24F8000
trusted library allocation
page read and write
7FF848E04000
trusted library allocation
page read and write
2A2C92C4000
trusted library allocation
page read and write
CC4CE8E000
stack
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
1B146FE5000
trusted library allocation
page read and write
28E4FB3E000
trusted library allocation
page read and write
20690420000
trusted library allocation
page read and write
20567FC6000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
1B14700B000
trusted library allocation
page read and write
2056839D000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
206EB250000
heap
page read and write
DC5000
heap
page read and write
7FF848FBE000
trusted library allocation
page read and write
1A8F0000
trusted library allocation
page read and write
20690295000
trusted library allocation
page read and write
7FF848FD2000
trusted library allocation
page read and write
28E4E2B1000
trusted library allocation
page read and write
FEE63F3000
stack
page read and write
7FF849110000
trusted library allocation
page read and write
FEE790E000
stack
page read and write
20568105000
trusted library allocation
page read and write
B70000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
F1F000
heap
page read and write
7FF848FA7000
trusted library allocation
page read and write
23E0000
heap
page execute and read and write
1B8BD000
stack
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
7FF848EA0000
trusted library allocation
page read and write
1DB1B422000
trusted library allocation
page read and write
205680ED000
trusted library allocation
page read and write
626000
heap
page read and write
1250000
heap
page read and write
1B468000
heap
page read and write
28E662BA000
heap
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
790000
heap
page read and write
C96A27D000
stack
page read and write
2A2C92B8000
trusted library allocation
page read and write
2056803C000
trusted library allocation
page read and write
13EA000
heap
page read and write
7FF8491FC000
trusted library allocation
page read and write
13DD000
heap
page read and write
7FF84916C000
trusted library allocation
page read and write
FA0000
heap
page read and write
205561F0000
trusted library allocation
page read and write
7DF4941F0000
trusted library allocation
page execute and read and write
C5353EE000
stack
page read and write
7FF848F9E000
trusted library allocation
page read and write
1DB1B356000
trusted library allocation
page read and write
12799000
trusted library allocation
page read and write
B55000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
B95000
heap
page read and write
FC0000
heap
page read and write
2069043B000
trusted library allocation
page read and write
1B77D000
stack
page read and write
7FF84917A000
trusted library allocation
page read and write
1DB32627000
heap
page read and write
20556173000
heap
page read and write
2A2C93FC000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page read and write
28E5E599000
trusted library allocation
page read and write
1B146FBC000
trusted library allocation
page read and write
B30000
heap
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
20690426000
trusted library allocation
page read and write
14F8000
heap
page read and write
205560F0000
heap
page read and write
1B2B3000
stack
page read and write
7FF848E33000
trusted library allocation
page read and write
2710000
heap
page execute and read and write
1CC12000
heap
page read and write
7FF848EA6000
trusted library allocation
page read and write
1B4BF000
stack
page read and write
7FF848F25000
trusted library allocation
page execute and read and write
126D8000
trusted library allocation
page read and write
7FF848FB2000
trusted library allocation
page read and write
20690291000
trusted library allocation
page read and write
7FF848FB7000
trusted library allocation
page read and write
1B6A0000
heap
page read and write
2A2C9436000
trusted library allocation
page read and write
2140000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
7FF848EB6000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
123F000
stack
page read and write
1B1389F0000
trusted library allocation
page read and write
28E665C0000
heap
page read and write
7FF848FC2000
trusted library allocation
page read and write
1B134DD0000
heap
page read and write
1B14F0CF000
heap
page read and write
FEE6979000
stack
page read and write
7FF848EE0000
trusted library allocation
page execute and read and write
20690393000
trusted library allocation
page read and write
32AB000
trusted library allocation
page read and write
1AA5D000
stack
page read and write
205704C2000
heap
page read and write
DA8000
heap
page read and write
B60000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
205682E2000
trusted library allocation
page read and write
7FF848E1B000
trusted library allocation
page read and write
20558981000
trusted library allocation
page read and write
2A2BA8EE000
trusted library allocation
page read and write
1580000
heap
page read and write
2A2C934E000
trusted library allocation
page read and write
2056836E000
trusted library allocation
page read and write
BA0000
heap
page read and write
2A2D1220000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
25CC000
trusted library allocation
page read and write
858000
heap
page read and write
906000
heap
page read and write
1B72F000
stack
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
1DB1B4BC000
trusted library allocation
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
2A2C9068000
trusted library allocation
page read and write
1DB3259D000
heap
page read and write
20570140000
heap
page read and write
1B146E90000
trusted library allocation
page read and write
1B86E000
stack
page read and write
1B14EDF3000
heap
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
7FF849020000
trusted library allocation
page read and write
750000
heap
page read and write
10F0000
heap
page read and write
7FF848E0B000
trusted library allocation
page execute and read and write
1B147054000
trusted library allocation
page read and write
5C0000
heap
page read and write
576000
stack
page read and write
FD7000
heap
page read and write
BD9000
heap
page read and write
7DF465DE0000
trusted library allocation
page execute and read and write
7FF848F35000
trusted library allocation
page execute and read and write
AD0000
heap
page read and write
2068102F000
trusted library allocation
page read and write
7FF848FA1000
trusted library allocation
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
7DF469190000
trusted library allocation
page execute and read and write
1DB182D2000
heap
page read and write
20690239000
trusted library allocation
page read and write
7FF848F99000
trusted library allocation
page read and write
1640000
heap
page read and write
1B89E000
heap
page read and write
2A2C90ED000
trusted library allocation
page read and write
1B684000
stack
page read and write
2A2C93CB000
trusted library allocation
page read and write
BB6000
heap
page read and write
C08000
heap
page read and write
C60000
heap
page read and write
1B146E78000
trusted library allocation
page read and write
7B0000
heap
page read and write
C5353A3000
stack
page read and write
20568005000
trusted library allocation
page read and write
BCF000
heap
page read and write
FEE6DBD000
stack
page read and write
900000
heap
page read and write
1B146F2C000
trusted library allocation
page read and write
260E000
trusted library allocation
page read and write
205680C9000
trusted library allocation
page read and write
2A2B70A3000
heap
page read and write
2A2C9086000
trusted library allocation
page read and write
1C80E000
stack
page read and write
28E5E2FB000
trusted library allocation
page read and write
7FF849133000
trusted library allocation
page read and write
309E000
stack
page read and write
5E0000
heap
page read and write
20690001000
trusted library allocation
page read and write
1492000
heap
page read and write
BF8000
heap
page read and write
7FF848F97000
trusted library allocation
page read and write
20568289000
trusted library allocation
page read and write
770000
heap
page read and write
CC4BD7B000
stack
page read and write
1B146BF1000
trusted library allocation
page read and write
20681E26000
trusted library allocation
page read and write
2056816A000
trusted library allocation
page read and write
1186000
stack
page read and write
206ED585000
heap
page read and write
7FF848F35000
trusted library allocation
page execute and read and write
1DB32390000
heap
page execute and read and write
7FF849160000
trusted library allocation
page read and write
890000
heap
page read and write
1B8CA000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
20568009000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
1BD30000
heap
page execute and read and write
2069029F000
trusted library allocation
page read and write
2A2C8FC1000
trusted library allocation
page read and write
14FD000
heap
page read and write
205681C1000
trusted library allocation
page read and write
20557BE0000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
20690406000
trusted library allocation
page read and write
127A7000
trusted library allocation
page read and write
206EB1F0000
heap
page read and write
20568013000
trusted library allocation
page read and write
BDC000
heap
page read and write
BCA000
heap
page read and write
320D000
trusted library allocation
page read and write
7DF4CBEA0000
trusted library allocation
page execute and read and write
C5367CE000
stack
page read and write
3297000
trusted library allocation
page read and write
1B14701A000
trusted library allocation
page read and write
1B060000
heap
page read and write
2490000
trusted library allocation
page read and write
1B137D0F000
trusted library allocation
page read and write
2AB7000
trusted library allocation
page read and write
2A2B70AB000
heap
page read and write
2606000
trusted library allocation
page read and write
1B6B8000
heap
page read and write
2B38000
trusted library allocation
page read and write
1B134D70000
heap
page read and write
7FF848E3B000
trusted library allocation
page read and write
1B645000
heap
page read and write
7FF848FAE000
trusted library allocation
page read and write
1B146FD0000
trusted library allocation
page read and write
7FF848FC1000
trusted library allocation
page read and write
1DB2A46D000
trusted library allocation
page read and write
E30000
heap
page read and write
BBB000
heap
page read and write
1B8CD000
heap
page read and write
5C0000
heap
page read and write
2A2D1395000
heap
page read and write
987000
heap
page read and write
17F5000
heap
page read and write
1B462000
heap
page read and write
7FF848FC2000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
DF5000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
2A2816F000
unkown
page read and write
2A2B6FC0000
heap
page read and write
AC0000
heap
page read and write
284E000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
3235000
trusted library allocation
page read and write
20558FED000
trusted library allocation
page read and write
2420000
heap
page execute and read and write
1145000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
2A2C907C000
trusted library allocation
page read and write
102B000
heap
page read and write
FEE788E000
stack
page read and write
148A000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
5E0000
heap
page read and write
2056817B000
trusted library allocation
page read and write
BCE000
heap
page read and write
1B147013000
trusted library allocation
page read and write
1AFA0000
heap
page read and write
BBB000
heap
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
1B671000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
28E667CC000
heap
page read and write
7FF849093000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
2832000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page execute and read and write
2056833A000
trusted library allocation
page read and write
7FF848E2B000
trusted library allocation
page read and write
1B6CF000
heap
page read and write
CC4BCFF000
stack
page read and write
7FF849060000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
7E5000
heap
page read and write
1DB18170000
heap
page read and write
1B56E000
stack
page read and write
2BBB000
trusted library allocation
page read and write
7FF848FA9000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
20690293000
trusted library allocation
page read and write
2A2B72F0000
heap
page execute and read and write
28B7000
trusted library allocation
page read and write
2B32000
trusted library allocation
page read and write
1B147056000
trusted library allocation
page read and write
7FF848FF2000
trusted library allocation
page read and write
2A2C9173000
trusted library allocation
page read and write
7D0000
heap
page read and write
14F0000
heap
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
7FF848EC6000
trusted library allocation
page execute and read and write
7FF848E2B000
trusted library allocation
page read and write
7FF848F25000
trusted library allocation
page execute and read and write
7FF848E2D000
trusted library allocation
page execute and read and write
126DD000
trusted library allocation
page read and write
2056FFCD000
heap
page read and write
1BB6E000
stack
page read and write
1B5EF000
stack
page read and write
7FF849092000
trusted library allocation
page read and write
2056801B000
trusted library allocation
page read and write
2069020A000
trusted library allocation
page read and write
7FF848FAA000
trusted library allocation
page read and write
206EB254000
heap
page read and write
C50000
heap
page read and write
7FF848FEA000
trusted library allocation
page read and write
1DB1B211000
trusted library allocation
page read and write
D50000
heap
page read and write
7FF848E0B000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
1BE4F000
stack
page read and write
2A2C9112000
trusted library allocation
page read and write
7FF848E04000
trusted library allocation
page read and write
2A2B7335000
heap
page read and write
28E4F5B4000
trusted library allocation
page read and write
2A2B8C30000
trusted library allocation
page read and write
CC4BC7A000
stack
page read and write
20558F32000
trusted library allocation
page read and write
1B137FAE000
trusted library allocation
page read and write
2057014A000
heap
page read and write
2A2C90A1000
trusted library allocation
page read and write
259C000
trusted library allocation
page read and write
C96B18E000
stack
page read and write
28E500D6000
trusted library allocation
page read and write
7FF849210000
trusted library allocation
page read and write
2A2C930A000
trusted library allocation
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
1B146DF9000
trusted library allocation
page read and write
20690349000
trusted library allocation
page read and write
790000
heap
page read and write
7FF849030000
trusted library allocation
page execute and read and write
FEE6A78000
stack
page read and write
7FF848EB6000
trusted library allocation
page read and write
91E000
heap
page read and write
7FF848FD2000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
1AE4D000
stack
page read and write
2A2C906A000
trusted library allocation
page read and write
1DB18270000
heap
page read and write
7FF8490B1000
trusted library allocation
page read and write
20568250000
trusted library allocation
page read and write
14D0000
heap
page read and write
2056838E000
trusted library allocation
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
206ED695000
heap
page read and write
7FF84908F000
trusted library allocation
page read and write
20556290000
trusted library allocation
page read and write
CE5000
heap
page read and write
2A2893E000
stack
page read and write
7FF849256000
trusted library allocation
page read and write
20690391000
trusted library allocation
page read and write
28E4F2DD000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
1DB18420000
heap
page readonly
206902CA000
trusted library allocation
page read and write
7FF84920C000
trusted library allocation
page read and write
2A29587000
stack
page read and write
20568255000
trusted library allocation
page read and write
BE0000
heap
page read and write
7FF848FD8000
trusted library allocation
page read and write
7C0000
heap
page read and write
20556250000
trusted library allocation
page read and write
6F6000
stack
page read and write
7FF849162000
trusted library allocation
page read and write
7FF84926D000
trusted library allocation
page read and write
7FF848FA1000
trusted library allocation
page read and write
2ABA000
trusted library allocation
page read and write
7FF849270000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
1B136E18000
trusted library allocation
page read and write
2055612E000
heap
page read and write
20557A7B000
heap
page read and write
28E4C4E0000
trusted library allocation
page read and write
28E4C500000
heap
page read and write
205681EC000
trusted library allocation
page read and write
C5368C7000
stack
page read and write
2056FF40000
heap
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
7FF84901A000
trusted library allocation
page read and write
1B7FE000
stack
page read and write
2560000
heap
page read and write
20568172000
trusted library allocation
page read and write
1AAB0000
trusted library allocation
page read and write
205681F0000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
28E66454000
heap
page read and write
2A2C91E0000
trusted library allocation
page read and write
1B740000
heap
page read and write
7FF849170000
trusted library allocation
page read and write
2A2C909F000
trusted library allocation
page read and write
28E4E130000
trusted library allocation
page read and write
205682DB000
trusted library allocation
page read and write
206903A0000
trusted library allocation
page read and write
1B1389CB000
trusted library allocation
page read and write
7FF848F25000
trusted library allocation
page execute and read and write
1B14F18F000
heap
page read and write
2680000
heap
page read and write
7FF848E18000
trusted library allocation
page read and write
3209000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
1890000
heap
page read and write
7E6000
stack
page read and write
329F000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
1B46B000
stack
page read and write
1B146C11000
trusted library allocation
page read and write
C53597D000
stack
page read and write
93A000
heap
page read and write
1650000
trusted library allocation
page read and write
CC4BEBE000
stack
page read and write
264D000
trusted library allocation
page read and write
FEE6C39000
stack
page read and write
7FF849000000
trusted library allocation
page execute and read and write
3A0000
heap
page read and write
20570116000
heap
page execute and read and write
6B8000
heap
page read and write
20690357000
trusted library allocation
page read and write
E70000
heap
page read and write
7FF849143000
trusted library allocation
page read and write
7FF849267000
trusted library allocation
page read and write
C96A5BE000
stack
page read and write
34ED000
trusted library allocation
page read and write
206903D1000
trusted library allocation
page read and write
1B14F17E000
heap
page read and write
2BF0000
heap
page execute and read and write
2B29000
trusted library allocation
page read and write
1B44F000
stack
page read and write
28E66709000
heap
page read and write
1AEAD000
stack
page read and write
1B146DD1000
trusted library allocation
page read and write
7FF848FB3000
trusted library allocation
page read and write
9E9028E000
stack
page read and write
20558C9B000
trusted library allocation
page read and write
2A2C9210000
trusted library allocation
page read and write
7E0000
trusted library allocation
page read and write
1DB3235D000
heap
page read and write
2A2D1240000
heap
page read and write
C53684E000
stack
page read and write
7FF849154000
trusted library allocation
page read and write
13188000
trusted library allocation
page read and write
7FF84908D000
trusted library allocation
page read and write
AA0000
heap
page read and write
20681003000
trusted library allocation
page read and write
1450000
heap
page read and write
7FF84908A000
trusted library allocation
page read and write
1BFCF000
stack
page read and write
20690031000
trusted library allocation
page read and write
20690449000
trusted library allocation
page read and write
2A2C90F6000
trusted library allocation
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
7FF848FF2000
trusted library allocation
page read and write
1BEDB000
stack
page read and write
2C10000
heap
page read and write
9FB000
heap
page read and write
8CD000
heap
page read and write
7E0000
trusted library allocation
page read and write
1A700000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
319B000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
7FF8490B0000
trusted library allocation
page read and write
1945000
heap
page read and write
7FF849158000
trusted library allocation
page read and write
EF0000
heap
page read and write
7FF8491F0000
trusted library allocation
page read and write
205591D2000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
1B23E000
stack
page read and write
7FF849290000
trusted library allocation
page read and write
206ED5B7000
heap
page read and write
1DB1BA71000
trusted library allocation
page read and write
7FF848FA7000
trusted library allocation
page read and write
205682BF000
trusted library allocation
page read and write
1B729000
heap
page read and write
2A2B9F92000
trusted library allocation
page read and write
2A2C91D5000
trusted library allocation
page read and write
7FF848FE2000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
7FF848F99000
trusted library allocation
page read and write
1B7A0000
heap
page read and write
7FF848F9E000
trusted library allocation
page read and write
F1C000
heap
page read and write
206901FB000
trusted library allocation
page read and write
5A0000
heap
page read and write
7FF848EC0000
trusted library allocation
page read and write
206903AB000
trusted library allocation
page read and write
20570526000
heap
page read and write
2A2C9099000
trusted library allocation
page read and write
28E6645C000
heap
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
7FF849010000
trusted library allocation
page read and write
130A3000
trusted library allocation
page read and write
B90000
heap
page read and write
1B146E04000
trusted library allocation
page read and write
28E5E59E000
trusted library allocation
page read and write
28E4C480000
heap
page read and write
20568348000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
8B5000
heap
page read and write
7DF465DF0000
trusted library allocation
page execute and read and write
7FF849060000
trusted library allocation
page read and write
1DB1AD88000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
206EB25C000
heap
page read and write
7FF848FA9000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
9D2000
heap
page read and write
7FF848E18000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
2615000
trusted library allocation
page read and write
2068188E000
trusted library allocation
page read and write
14D1000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
C535AF8000
stack
page read and write
314C000
trusted library allocation
page read and write
1B146DBB000
trusted library allocation
page read and write
87D000
heap
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
7A0000
heap
page read and write
1B88E000
heap
page read and write
2A2C905A000
trusted library allocation
page read and write
20568109000
trusted library allocation
page read and write
7FF84921B000
trusted library allocation
page read and write
1B138457000
trusted library allocation
page read and write
10A0000
heap
page read and write
7FF848FD2000
trusted library allocation
page read and write
1B146FA2000
trusted library allocation
page read and write
2A2BA713000
trusted library allocation
page read and write
2A2D13E5000
heap
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
12A08000
trusted library allocation
page read and write
1AA7D000
stack
page read and write
1B138371000
trusted library allocation
page read and write
28E4C490000
heap
page read and write
1DB32355000
heap
page read and write
20558CA4000
trusted library allocation
page read and write
873000
heap
page read and write
1B845000
heap
page read and write
206804CC000
trusted library allocation
page read and write
1B434000
stack
page read and write
BEF000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
EF5000
heap
page read and write
7FF848FBE000
trusted library allocation
page read and write
668000
heap
page read and write
28E4C485000
heap
page read and write
1B5BE000
stack
page read and write
7FF848FDA000
trusted library allocation
page read and write
7FF84920C000
trusted library allocation
page read and write
B45000
heap
page read and write
C96B10E000
stack
page read and write
7FF848E1B000
trusted library allocation
page execute and read and write
1B146EBD000
trusted library allocation
page read and write
FEE6BB9000
stack
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
28E663C0000
heap
page read and write
7FF849200000
trusted library allocation
page read and write
7FF84915C000
trusted library allocation
page read and write
20690240000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF848EB6000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
1B146E94000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
2C46000
trusted library allocation
page read and write
205592EE000
trusted library allocation
page read and write
7FF848E2B000
trusted library allocation
page read and write
1B14700D000
trusted library allocation
page read and write
206902D1000
trusted library allocation
page read and write
2A2D11A6000
heap
page read and write
1B134F30000
trusted library allocation
page read and write
2A2C9215000
trusted library allocation
page read and write
1B4FE000
stack
page read and write
7FF849220000
trusted library allocation
page read and write
1BB70000
heap
page read and write
28E664E0000
heap
page execute and read and write
1B1AE000
stack
page read and write
25D0000
heap
page execute and read and write
7FF848E20000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
7FF848FA9000
trusted library allocation
page read and write
28E4F66E000
trusted library allocation
page read and write
7FF848DF8000
trusted library allocation
page read and write
820000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
2057055F000
heap
page read and write
1BCEE000
stack
page read and write
1B48E000
stack
page read and write
314F000
trusted library allocation
page read and write
1DB1BF81000
trusted library allocation
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
20568160000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
7FF848FCE000
trusted library allocation
page read and write
2B2F000
trusted library allocation
page read and write
11EE000
stack
page read and write
1B14F179000
heap
page read and write
2A2C943E000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
1B146E23000
trusted library allocation
page read and write
560000
heap
page read and write
7DF4CBE90000
trusted library allocation
page execute and read and write
1B090000
heap
page execute and read and write
7FF849130000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
1B146F3A000
trusted library allocation
page read and write
2A2C921E000
trusted library allocation
page read and write
2A2857E000
stack
page read and write
7FF848E02000
trusted library allocation
page read and write
2A2C9329000
trusted library allocation
page read and write
875000
heap
page read and write
168D000
stack
page read and write
88F000
heap
page read and write
1B14709F000
trusted library allocation
page read and write
205683D7000
trusted library allocation
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
7FF849246000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page read and write
12561000
trusted library allocation
page read and write
206EB258000
heap
page read and write
7FF849123000
trusted library allocation
page read and write
1B63E000
stack
page read and write
2A2C91DC000
trusted library allocation
page read and write
2056810E000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
7FF848E9C000
trusted library allocation
page execute and read and write
92D000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
205562C5000
heap
page read and write
206ECD80000
heap
page read and write
1BF1F000
stack
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
20557FA5000
trusted library allocation
page read and write
1282D000
trusted library allocation
page read and write
2A2D1437000
heap
page read and write
1B14F046000
heap
page read and write
FEE67FF000
stack
page read and write
2A2C93BD000
trusted library allocation
page read and write
7FF8490B6000
trusted library allocation
page read and write
7FF848E08000
trusted library allocation
page read and write
1BD10000
heap
page read and write
1B146E5C000
trusted library allocation
page read and write
1C04E000
stack
page read and write
7FF849149000
trusted library allocation
page read and write
28E4C4D5000
heap
page read and write
28E66759000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
1255000
heap
page read and write
2A2B7120000
heap
page read and write
1B43B000
stack
page read and write
2A2BA04D000
trusted library allocation
page read and write
28CB000
trusted library allocation
page read and write
20567F40000
trusted library allocation
page read and write
7FF848E38000
trusted library allocation
page read and write
2A2BA7F9000
trusted library allocation
page read and write
2A2C9228000
trusted library allocation
page read and write
20559D31000
trusted library allocation
page read and write
FD0000
heap
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
7FF848E3C000
trusted library allocation
page execute and read and write
206901F1000
trusted library allocation
page read and write
2A2C92C7000
trusted library allocation
page read and write
9C4000
heap
page read and write
28E4FB18000
trusted library allocation
page read and write
7FF84917A000
trusted library allocation
page read and write
7FF849143000
trusted library allocation
page read and write
20690401000
trusted library allocation
page read and write
1B890000
heap
page read and write
940000
heap
page read and write
28E666B0000
heap
page read and write
20680A51000
trusted library allocation
page read and write
7FF8491FE000
trusted library allocation
page read and write
2A2C9279000
trusted library allocation
page read and write
20690319000
trusted library allocation
page read and write
205683E1000
trusted library allocation
page read and write
20681E01000
trusted library allocation
page read and write
1B146D89000
trusted library allocation
page read and write
7FF849200000
trusted library allocation
page read and write
7FF848FA2000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
32A8000
trusted library allocation
page read and write
1B48F000
stack
page read and write
151A000
heap
page read and write
1B134F50000
heap
page readonly
1DB1AE34000
trusted library allocation
page read and write
7FF849266000
trusted library allocation
page read and write
7FF849216000
trusted library allocation
page read and write
2C4C000
trusted library allocation
page read and write
206902BE000
trusted library allocation
page read and write
323B000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page read and write
205700F0000
heap
page execute and read and write
1B137C1D000
trusted library allocation
page read and write
20690460000
trusted library allocation
page read and write
206ED514000
heap
page read and write
C2D000
heap
page read and write
1BD70000
heap
page read and write
205680C4000
trusted library allocation
page read and write
2069034D000
trusted library allocation
page read and write
810000
heap
page read and write
96D000
heap
page read and write
7FF848EA6000
trusted library allocation
page read and write
BA0000
heap
page read and write
7FF848FA7000
trusted library allocation
page read and write
6D3000
heap
page read and write
20690312000
trusted library allocation
page read and write
7FF849280000
trusted library allocation
page read and write
20559106000
trusted library allocation
page read and write
9E8F537000
stack
page read and write
5D6000
stack
page read and write
2A2C9263000
trusted library allocation
page read and write
1AA30000
trusted library allocation
page read and write
C3B000
heap
page read and write
7FF849160000
trusted library allocation
page read and write
91B000
heap
page read and write
1B14EE30000
heap
page execute and read and write
2A2BAD6D000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
1B146FC0000
trusted library allocation
page read and write
7FF848FC1000
trusted library allocation
page read and write
1DB1BFA1000
trusted library allocation
page read and write
7FF848FA9000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
28E4C440000
heap
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
2A2D1210000
heap
page execute and read and write
1130000
trusted library allocation
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
1BCC0000
heap
page execute and read and write
D4E000
stack
page read and write
2A2C92AF000
trusted library allocation
page read and write
7E7000
heap
page read and write
28E6681F000
heap
page read and write
205682AF000
trusted library allocation
page read and write
2A2C91E2000
trusted library allocation
page read and write
206902E9000
trusted library allocation
page read and write
206902AF000
trusted library allocation
page read and write
1CBF0000
heap
page read and write
1DB19E00000
trusted library allocation
page read and write
20567F51000
trusted library allocation
page read and write
205682D9000
trusted library allocation
page read and write
C1E000
heap
page read and write
28E665CC000
heap
page read and write
1B14ED00000
heap
page read and write
2A2C91FB000
trusted library allocation
page read and write
2A2C90C1000
trusted library allocation
page read and write
7BA000
heap
page read and write
1B134FB0000
heap
page read and write
2A2C90E0000
trusted library allocation
page read and write
20690463000
trusted library allocation
page read and write
2A2D13C3000
heap
page read and write
3267000
trusted library allocation
page read and write
1B75E000
heap
page read and write
1B14EEF6000
heap
page execute and read and write
7FF848FC5000
trusted library allocation
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
536000
stack
page read and write
7BC000
heap
page read and write
297A000
trusted library allocation
page read and write
206ED50C000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
C535C7E000
stack
page read and write
718000
heap
page read and write
1C31F000
stack
page read and write
2BB9000
trusted library allocation
page read and write
2A2B9B94000
trusted library allocation
page read and write
23C0000
heap
page execute and read and write
7FF848E03000
trusted library allocation
page execute and read and write
1DB19D40000
heap
page execute and read and write
1B86D000
heap
page read and write
2A2D1320000
heap
page read and write
206903B8000
trusted library allocation
page read and write
7FF848E4D000
trusted library allocation
page execute and read and write
1BB2E000
stack
page read and write
148D000
heap
page read and write
1B146EB0000
trusted library allocation
page read and write
7FF84925D000
trusted library allocation
page read and write
C96A33F000
stack
page read and write
28E4C5F1000
heap
page read and write
131F8000
trusted library allocation
page read and write
2A2C9301000
trusted library allocation
page read and write
205681F2000
trusted library allocation
page read and write
7FF8491E3000
trusted library allocation
page read and write
1B146FA9000
trusted library allocation
page read and write
7FF848E18000
trusted library allocation
page read and write
2A2C931C000
trusted library allocation
page read and write
2ADF000
trusted library allocation
page read and write
205683CF000
trusted library allocation
page read and write
7FF848E40000
trusted library allocation
page read and write
2056808C000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
2A2C90E9000
trusted library allocation
page read and write
1B28E000
stack
page read and write
2056817D000
trusted library allocation
page read and write
20690070000
trusted library allocation
page read and write
20681121000
trusted library allocation
page read and write
206ECC50000
trusted library allocation
page read and write
2A2C92B4000
trusted library allocation
page read and write
C00000
heap
page read and write
2A2C9166000
trusted library allocation
page read and write
7FF849149000
trusted library allocation
page read and write
150C000
heap
page read and write
25BE000
trusted library allocation
page read and write
1B13853E000
trusted library allocation
page read and write
7FF848DED000
trusted library allocation
page execute and read and write
7FF848FA0000
trusted library allocation
page read and write
206ED2A0000
heap
page execute and read and write
1680000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
206ED3EC000
heap
page read and write
B05000
heap
page read and write
2A2C9074000
trusted library allocation
page read and write
2A2C931A000
trusted library allocation
page read and write
20568237000
trusted library allocation
page read and write
23C0000
heap
page execute and read and write
92F000
heap
page read and write
313A000
trusted library allocation
page read and write
2C17000
trusted library allocation
page read and write
2A2BA0B0000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
7FF848EB6000
trusted library allocation
page read and write
2A0E000
stack
page read and write
2A2D117C000
heap
page read and write
1740000
heap
page read and write
7FF848E33000
trusted library allocation
page read and write
941000
heap
page read and write
830000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
1DB184A0000
trusted library allocation
page read and write
20556210000
heap
page read and write
2A2C9082000
trusted library allocation
page read and write
7FF849152000
trusted library allocation
page read and write
665000
heap
page read and write
1B14F14E000
heap
page read and write
1DB325CB000
heap
page read and write
7FF848E13000
trusted library allocation
page read and write
20681782000
trusted library allocation
page read and write
C4E000
stack
page read and write
2056829D000
trusted library allocation
page read and write
205680B1000
trusted library allocation
page read and write
1B760000
heap
page read and write
10DF000
stack
page read and write
20568219000
trusted library allocation
page read and write
28E4C420000
heap
page read and write
28E4E1F0000
heap
page execute and read and write
2056821D000
trusted library allocation
page read and write
2068115C000
trusted library allocation
page read and write
1DB1B53E000
trusted library allocation
page read and write
7FF848FE2000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
9A7000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
2A2C9299000
trusted library allocation
page read and write
20680D71000
trusted library allocation
page read and write
28C8000
trusted library allocation
page read and write
25EF000
stack
page read and write
2A2C922F000
trusted library allocation
page read and write
390000
heap
page read and write
1B14702C000
trusted library allocation
page read and write
206902F7000
trusted library allocation
page read and write
95B000
heap
page read and write
12818000
trusted library allocation
page read and write
7FF848FC2000
trusted library allocation
page read and write
6B0000
heap
page read and write
7FF848FBE000
trusted library allocation
page read and write
1B14F0AC000
heap
page read and write
131F3000
trusted library allocation
page read and write
12811000
trusted library allocation
page read and write
29EF000
stack
page read and write
12828000
trusted library allocation
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
20558B2E000
trusted library allocation
page read and write
26AE000
trusted library allocation
page read and write
2A2B8C45000
heap
page read and write
7FF849175000
trusted library allocation
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
7FF849144000
trusted library allocation
page read and write
B70000
trusted library allocation
page read and write
1DB2A1A1000
trusted library allocation
page read and write
1B146F0C000
trusted library allocation
page read and write
2069031E000
trusted library allocation
page read and write
2A2D145B000
heap
page read and write
7FF849000000
trusted library allocation
page execute and read and write
C18000
heap
page read and write
F45000
heap
page read and write
1B190000
heap
page execute and read and write
2A2B8C40000
heap
page read and write
205704B9000
heap
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
2069034B000
trusted library allocation
page read and write
7FF849220000
trusted library allocation
page read and write
1B84E000
heap
page read and write
1ADEF000
stack
page read and write
1B96F000
stack
page read and write
7FF848F00000
trusted library allocation
page execute and read and write
7FF848E23000
trusted library allocation
page execute and read and write
7FF848E06000
trusted library allocation
page read and write
1DB323C0000
heap
page read and write
206904B0000
trusted library allocation
page read and write
7FF8490D7000
trusted library allocation
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
2056832B000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
20568260000
trusted library allocation
page read and write
FEE6EBC000
stack
page read and write
1B83D000
stack
page read and write
206903D3000
trusted library allocation
page read and write
C96A0F9000
stack
page read and write
1AF53000
heap
page read and write
FC6000
stack
page read and write
F6E000
stack
page read and write
1C05E000
stack
page read and write
7FF848FA6000
trusted library allocation
page read and write
8E2000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
2B90000
heap
page execute and read and write
1B146E39000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
7FF848E00000
trusted library allocation
page read and write
11F0000
heap
page read and write
FEE6CBE000
stack
page read and write
1B1DF000
stack
page read and write
20559050000
trusted library allocation
page read and write
D80000
heap
page read and write
7FF849220000
trusted library allocation
page read and write
206ED2F7000
heap
page execute and read and write
7FF848F10000
trusted library allocation
page execute and read and write
2A2C91E6000
trusted library allocation
page read and write
2A2C90EF000
trusted library allocation
page read and write
2A2B7330000
heap
page read and write
1DB2A62B000
trusted library allocation
page read and write
13B0000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
2A2C92E3000
trusted library allocation
page read and write
2A2BA021000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
7FF848DE4000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
7FF849152000
trusted library allocation
page read and write
C96A1FB000
stack
page read and write
1B6E6000
heap
page read and write
2A284FA000
stack
page read and write
2A2D1428000
heap
page read and write
C535CFD000
stack
page read and write
2866000
trusted library allocation
page read and write
1B706000
heap
page read and write
17F5000
heap
page read and write
AC5000
heap
page read and write
2056838B000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
C969CF3000
stack
page read and write
D75000
heap
page read and write
7FF8490D0000
trusted library allocation
page read and write
9E8F63B000
stack
page read and write
760000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
7FF848E13000
trusted library allocation
page execute and read and write
1BF33000
stack
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
7FF848F15000
trusted library allocation
page execute and read and write
5A6000
stack
page read and write
1B6BE000
stack
page read and write
9E8F3FE000
stack
page read and write
206ED510000
heap
page read and write
2A2C91D1000
trusted library allocation
page read and write
28E4C51E000
heap
page read and write
F0A000
heap
page read and write
20568178000
trusted library allocation
page read and write
1B146F40000
trusted library allocation
page read and write
2A2C91E4000
trusted library allocation
page read and write
2055926C000
trusted library allocation
page read and write
2A2D1170000
heap
page read and write
7FF849190000
trusted library allocation
page read and write
1C01E000
stack
page read and write
1DB184B0000
heap
page read and write
1B146E15000
trusted library allocation
page read and write
2530000
trusted library allocation
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
20557F31000
trusted library allocation
page read and write
1B146E8C000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
7FF848E0B000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
2A2C9251000
trusted library allocation
page read and write
1B87E000
heap
page read and write
14CE000
stack
page read and write
206ED33C000
heap
page read and write
7FF848FD2000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
7FF8491ED000
trusted library allocation
page read and write
1B146F4D000
trusted library allocation
page read and write
906000
heap
page read and write
151F000
heap
page read and write
CC4CD07000
stack
page read and write
2A2C93F5000
trusted library allocation
page read and write
28E4C585000
heap
page read and write
E25000
heap
page read and write
1B134E54000
heap
page read and write
20681339000
trusted library allocation
page read and write
2A286F9000
stack
page read and write
7FF848E14000
trusted library allocation
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
1DB1A3A8000
trusted library allocation
page read and write
2056819F000
trusted library allocation
page read and write
1B460000
heap
page read and write
152C000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
20568253000
trusted library allocation
page read and write
2A2C90EB000
trusted library allocation
page read and write
13E8000
heap
page read and write
2FB0000
heap
page read and write
7FF849257000
trusted library allocation
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
28E4F4BF000
trusted library allocation
page read and write
154F000
heap
page read and write
C48000
heap
page read and write
206ED341000
heap
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
1B520000
heap
page read and write
20690424000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page read and write
130A8000
trusted library allocation
page read and write
BC5000
heap
page read and write
20681868000
trusted library allocation
page read and write
1B14705B000
trusted library allocation
page read and write
2604000
trusted library allocation
page read and write
28E5E2D1000
trusted library allocation
page read and write
7FF849270000
trusted library allocation
page read and write
206ECC30000
trusted library allocation
page read and write
C535A76000
stack
page read and write
1B14F014000
heap
page read and write
C0A000
heap
page read and write
2056803A000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
7FF848ED6000
trusted library allocation
page read and write
8BC000
heap
page read and write
943000
heap
page read and write
155A000
heap
page read and write
189F000
stack
page read and write
28E5E2E1000
trusted library allocation
page read and write
206ED561000
heap
page read and write
2A2C92C2000
trusted library allocation
page read and write
2A2BA882000
trusted library allocation
page read and write
1B134F60000
trusted library allocation
page read and write
1C23E000
stack
page read and write
2A2C942E000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
78A000
heap
page read and write
1BA2E000
stack
page read and write
2A2C943C000
trusted library allocation
page read and write
7FF849270000
trusted library allocation
page read and write
D55000
heap
page read and write
7FF848EB6000
trusted library allocation
page read and write
2A2C9272000
trusted library allocation
page read and write
2069025E000
trusted library allocation
page read and write
7FF84917C000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
FDA000
heap
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
EE0000
heap
page read and write
20681E21000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
7FF848FC0000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
1BFFB000
stack
page read and write
30EE000
stack
page read and write
205683DF000
trusted library allocation
page read and write
2056820A000
trusted library allocation
page read and write
12BA3000
trusted library allocation
page read and write
206ED67C000
heap
page read and write
2A2C92CB000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
7FF848F25000
trusted library allocation
page execute and read and write
20568340000
trusted library allocation
page read and write
1BCDD000
stack
page read and write
124DD000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
206ED68D000
heap
page read and write
95D000
heap
page read and write
7FF84911F000
trusted library allocation
page read and write
7FF849168000
trusted library allocation
page read and write
2A2C9107000
trusted library allocation
page read and write
1B138A15000
trusted library allocation
page read and write
9E8F17F000
stack
page read and write
DDC000
heap
page read and write
2056807E000
trusted library allocation
page read and write
1420000
heap
page read and write
1DB1AEF3000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page execute and read and write
7FF848F94000
trusted library allocation
page read and write
28E4F5E7000
trusted library allocation
page read and write
1B8F2000
heap
page read and write
1B6FF000
heap
page read and write
1B147036000
trusted library allocation
page read and write
20556132000
heap
page read and write
7FF848FF2000
trusted library allocation
page read and write
1B146F74000
trusted library allocation
page read and write
28E667BC000
heap
page read and write
7FF848E18000
trusted library allocation
page read and write
1538000
heap
page read and write
12C5000
heap
page read and write
1B6FE000
stack
page read and write
7FF848FB0000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
7FF849155000
trusted library allocation
page read and write
24D0000
heap
page read and write
1B14EEF0000
heap
page execute and read and write
28E4E77C000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
259F000
trusted library allocation
page read and write
1BA63000
stack
page read and write
1B5EE000
stack
page read and write
2069030C000
trusted library allocation
page read and write
26B2000
trusted library allocation
page read and write
1DB182D0000
heap
page read and write
20568187000
trusted library allocation
page read and write
1B58F000
stack
page read and write
F1A000
heap
page read and write
7FF849190000
trusted library allocation
page read and write
C96B38E000
stack
page read and write
28E4FA33000
trusted library allocation
page read and write
2056801D000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
2A2C93C6000
trusted library allocation
page read and write
20568139000
trusted library allocation
page read and write
2B2C000
trusted library allocation
page read and write
20570591000
heap
page read and write
E7F000
stack
page read and write
1B79C000
heap
page read and write
3B0000
heap
page read and write
2A2C92AA000
trusted library allocation
page read and write
28E665D9000
heap
page read and write
13EF000
heap
page read and write
7FF848FF2000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page read and write
1CB0D000
stack
page read and write
7FF849158000
trusted library allocation
page read and write
7FF848F05000
trusted library allocation
page execute and read and write
20568396000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
3299000
trusted library allocation
page read and write
12638000
trusted library allocation
page read and write
716000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
12431000
trusted library allocation
page read and write
1DB1B9E8000
trusted library allocation
page read and write
2A2883B000
stack
page read and write
12A54000
trusted library allocation
page read and write
146C000
heap
page read and write
2A2B8BD0000
heap
page read and write
7FF8490E6000
trusted library allocation
page read and write
20558F5E000
trusted library allocation
page read and write
20568259000
trusted library allocation
page read and write
12A81000
trusted library allocation
page read and write
20568040000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page read and write
205681BD000
trusted library allocation
page read and write
2A70000
heap
page execute and read and write
206812A4000
trusted library allocation
page read and write
1895000
heap
page read and write
7FF848E13000
trusted library allocation
page read and write
1B146E84000
trusted library allocation
page read and write
1B8A2000
heap
page read and write
20568017000
trusted library allocation
page read and write
1C500000
heap
page read and write
1B134FA5000
heap
page read and write
1DB32397000
heap
page execute and read and write
7FF848DF4000
trusted library allocation
page read and write
28BD000
trusted library allocation
page read and write
20690465000
trusted library allocation
page read and write
20568225000
trusted library allocation
page read and write
1B494000
stack
page read and write
124D3000
trusted library allocation
page read and write
205680E7000
trusted library allocation
page read and write
AC3000
heap
page read and write
7FF848EC0000
trusted library allocation
page read and write
7FF848EB6000
trusted library allocation
page read and write
1B146E87000
trusted library allocation
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
7FF849123000
trusted library allocation
page read and write
205681F8000
trusted library allocation
page read and write
28E666A0000
heap
page read and write
12698000
trusted library allocation
page read and write
1C03E000
stack
page read and write
2608000
trusted library allocation
page read and write
131FD000
trusted library allocation
page read and write
AFF000
stack
page read and write
1B134E2D000
heap
page read and write
1B137E92000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
12C28000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
1BE1E000
stack
page read and write
13B8000
heap
page read and write
2ACC000
trusted library allocation
page read and write
9E8F4BE000
stack
page read and write
CC4CE0C000
stack
page read and write
850000
heap
page read and write
2A2C9257000
trusted library allocation
page read and write
28E4FC00000
trusted library allocation
page read and write
1B1377ED000
trusted library allocation
page read and write
1B146EAD000
trusted library allocation
page read and write
788000
heap
page read and write
10E0000
trusted library allocation
page read and write
124D1000
trusted library allocation
page read and write
206EB26C000
heap
page read and write
7FF848FA7000
trusted library allocation
page read and write
2A28A3D000
stack
page read and write
28E4F552000
trusted library allocation
page read and write
7FF849250000
trusted library allocation
page read and write
1B29E000
stack
page read and write
2627000
trusted library allocation
page read and write
20559D56000
trusted library allocation
page read and write
152A000
heap
page read and write
20559880000
trusted library allocation
page read and write
2A2B70BD000
heap
page read and write
C969DFF000
stack
page read and write
1AF2F000
stack
page read and write
2A2C92B2000
trusted library allocation
page read and write
776000
stack
page read and write
20568332000
trusted library allocation
page read and write
1B146E6D000
trusted library allocation
page read and write
20568038000
trusted library allocation
page read and write
2056808A000
trusted library allocation
page read and write
20690208000
trusted library allocation
page read and write
730000
trusted library allocation
page read and write
7FF849256000
trusted library allocation
page read and write
20690272000
trusted library allocation
page read and write
1B146EE7000
trusted library allocation
page read and write
28E5E320000
trusted library allocation
page read and write
1B1377F5000
trusted library allocation
page read and write
7FF848FB9000
trusted library allocation
page read and write
1B147028000
trusted library allocation
page read and write
A60000
heap
page read and write
1AC1D000
stack
page read and write
7FF848FD2000
trusted library allocation
page read and write
3430000
heap
page execute and read and write
7FF848E13000
trusted library allocation
page read and write
1ABD0000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
2A2B709F000
heap
page read and write
2057058B000
heap
page read and write
1B146FF3000
trusted library allocation
page read and write
C96B30D000
stack
page read and write
1BDFC000
stack
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
12F6000
stack
page read and write
1B640000
heap
page read and write
12C0000
heap
page read and write
C96A17E000
stack
page read and write
2510000
heap
page execute and read and write
205681D2000
trusted library allocation
page read and write
5E0000
heap
page read and write
20570586000
heap
page read and write
7FF848FA7000
trusted library allocation
page read and write
2A2D148E000
heap
page read and write
231E000
stack
page read and write
7FF848FC2000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
25FC000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
1B136BF1000
trusted library allocation
page read and write
7FF848FB2000
trusted library allocation
page read and write
206903AD000
trusted library allocation
page read and write
1DB32517000
heap
page read and write
2A2C938A000
trusted library allocation
page read and write
1A850000
trusted library allocation
page read and write
9E8F0FD000
unkown
page read and write
7FF8490DF000
trusted library allocation
page read and write
2A2C937E000
trusted library allocation
page read and write
2056826C000
trusted library allocation
page read and write
206901E3000
trusted library allocation
page read and write
2A2C942C000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
7FF848FB2000
trusted library allocation
page read and write
7FF848FB7000
trusted library allocation
page read and write
1B4B0000
heap
page execute and read and write
7FF848F90000
trusted library allocation
page read and write
7FF849169000
trusted library allocation
page read and write
206ED400000
heap
page read and write
7FF848F92000
trusted library allocation
page read and write
FEE667E000
unkown
page read and write
7FF8490B4000
trusted library allocation
page read and write
2A2C909B000
trusted library allocation
page read and write
790000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
7FF84924D000
trusted library allocation
page read and write
1DB1A205000
trusted library allocation
page read and write
206902B4000
trusted library allocation
page read and write
205682BD000
trusted library allocation
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
BCD000
heap
page read and write
8F6000
heap
page read and write
1B88E000
stack
page read and write
1DB324E7000
heap
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
20570541000
heap
page read and write
7FF848FD2000
trusted library allocation
page read and write
BDB000
heap
page read and write
1B134FB5000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
7FF849252000
trusted library allocation
page read and write
2A2C91C9000
trusted library allocation
page read and write
FEE6E3E000
stack
page read and write
90C000
heap
page read and write
7FF84910F000
trusted library allocation
page read and write
20556220000
trusted library allocation
page read and write
205680B5000
trusted library allocation
page read and write
2A2D13E8000
heap
page read and write
20568181000
trusted library allocation
page read and write
1B134F10000
trusted library allocation
page read and write
2A2C8FB1000
trusted library allocation
page read and write
1B14F04C000
heap
page read and write
2510000
heap
page execute and read and write
29F0000
heap
page read and write
2AD3000
trusted library allocation
page read and write
28B4000
trusted library allocation
page read and write
206903B1000
trusted library allocation
page read and write
2A2B7260000
trusted library allocation
page read and write
1DB18460000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
2A2C8FDB000
trusted library allocation
page read and write
1B14705F000
trusted library allocation
page read and write
5FE000
heap
page read and write
DC0000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
12ACB000
trusted library allocation
page read and write
2A2C916A000
trusted library allocation
page read and write
206902A1000
trusted library allocation
page read and write
AD8000
heap
page read and write
1B733000
stack
page read and write
1DB1BAD0000
trusted library allocation
page read and write
B20000
heap
page read and write
A20000
heap
page read and write
1AFEE000
stack
page read and write
2A2C90DC000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
20567FD3000
trusted library allocation
page read and write
124E1000
trusted library allocation
page read and write
20570250000
trusted library allocation
page read and write
7FF849206000
trusted library allocation
page read and write
28E4E0E0000
trusted library allocation
page read and write
1B563000
stack
page read and write
20570120000
heap
page read and write
C535D7E000
stack
page read and write
1B6BB000
heap
page read and write
206ECCE0000
trusted library allocation
page read and write
7FF848FE6000
trusted library allocation
page read and write
1B6C4000
heap
page read and write
205683DD000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
20568211000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
900000
heap
page read and write
20567FFF000
trusted library allocation
page read and write
12631000
trusted library allocation
page read and write
20568183000
trusted library allocation
page read and write
1B963000
stack
page read and write
2A2C918B000
trusted library allocation
page read and write
BE4000
heap
page read and write
A50000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
7FF848F9E000
trusted library allocation
page read and write
B50000
heap
page read and write
1AC5C000
stack
page read and write
9E9048E000
stack
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
1BCF0000
heap
page execute and read and write
1BB4F000
stack
page read and write
2A2C938E000
trusted library allocation
page read and write
7FF848FF4000
trusted library allocation
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
C53587E000
stack
page read and write
2A2C9380000
trusted library allocation
page read and write
126D1000
trusted library allocation
page read and write
205681F6000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
660000
heap
page read and write
1300000
heap
page read and write
7FF849170000
trusted library allocation
page read and write
1B14ED25000
heap
page read and write
1DB18290000
heap
page read and write
1140000
heap
page read and write
7FF848FFA000
trusted library allocation
page read and write
C95000
heap
page read and write
7FF849270000
trusted library allocation
page read and write
2A99000
trusted library allocation
page read and write
2A2C9313000
trusted library allocation
page read and write
2A2C9066000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
13181000
trusted library allocation
page read and write
7FF849250000
trusted library allocation
page read and write
8FD000
heap
page read and write
28E4C4D0000
heap
page read and write
2A2C929F000
trusted library allocation
page read and write
206ED542000
heap
page read and write
386000
stack
page read and write
1DB1B1AE000
trusted library allocation
page read and write
FEE6ABE000
stack
page read and write
7FF849210000
trusted library allocation
page read and write
1B14F000000
heap
page read and write
7FF848E1B000
trusted library allocation
page read and write
BE5000
heap
page read and write
1B146C21000
trusted library allocation
page read and write
15F0000
heap
page read and write
1B7A8000
heap
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
206ED51C000
heap
page read and write
8DA000
heap
page read and write
205681C3000
trusted library allocation
page read and write
1318D000
trusted library allocation
page read and write
206ED504000
heap
page read and write
7FF848FC2000
trusted library allocation
page read and write
1AF50000
heap
page read and write
128C3000
trusted library allocation
page read and write
2A2D10F0000
heap
page read and write
7FF848FB0000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
28E4C340000
heap
page read and write
7FF849200000
trusted library allocation
page read and write
2069023D000
trusted library allocation
page read and write
7FF848EB6000
trusted library allocation
page read and write
2A2C9000000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page read and write
2B0000
unkown
page readonly
2A2BA166000
trusted library allocation
page read and write
E05000
heap
page read and write
7FF848FCA000
trusted library allocation
page read and write
10E0000
heap
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
1B33E000
stack
page read and write
7FF848FC0000
trusted library allocation
page read and write
1DB325ED000
heap
page read and write
205704BE000
heap
page read and write
206903BA000
trusted library allocation
page read and write
28E500B1000
trusted library allocation
page read and write
7FF848FF6000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
F18000
heap
page read and write
1B14F084000
heap
page read and write
206810BF000
trusted library allocation
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
FEE7A8E000
stack
page read and write
2AA2000
trusted library allocation
page read and write
CAC000
heap
page read and write
2A2C933A000
trusted library allocation
page read and write
9E8F7BC000
stack
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
20568097000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page read and write
5ED000
heap
page read and write
271E000
stack
page read and write
1B146E2F000
trusted library allocation
page read and write
5C0000
heap
page read and write
1B6C0000
heap
page read and write
205680AB000
trusted library allocation
page read and write
20568081000
trusted library allocation
page read and write
1B35F000
stack
page read and write
1DB1ABD1000
trusted library allocation
page read and write
32A2000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
7FF43B520000
trusted library allocation
page execute and read and write
20568015000
trusted library allocation
page read and write
2A285F9000
stack
page read and write
1645000
heap
page read and write
20568189000
trusted library allocation
page read and write
1B146F05000
trusted library allocation
page read and write
2A2C9399000
trusted library allocation
page read and write
9EF000
heap
page read and write
7FF848E4B000
trusted library allocation
page execute and read and write
7FF849230000
trusted library allocation
page read and write
2056825C000
trusted library allocation
page read and write
2056823E000
trusted library allocation
page read and write
2056817F000
trusted library allocation
page read and write
7FF849169000
trusted library allocation
page read and write
12823000
trusted library allocation
page read and write
F0F000
heap
page read and write
20568168000
trusted library allocation
page read and write
1B5B5000
stack
page read and write
3199000
trusted library allocation
page read and write
BA5000
heap
page read and write
2A2C919D000
trusted library allocation
page read and write
7FF8490A5000
trusted library allocation
page read and write
3260000
heap
page read and write
1B85C000
heap
page read and write
5EA000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
7FF848F25000
trusted library allocation
page execute and read and write
B00000
trusted library section
page read and write
7FF848EC6000
trusted library allocation
page execute and read and write
7FF8490E0000
trusted library allocation
page read and write
1B4EE000
stack
page read and write
205682CC000
trusted library allocation
page read and write
12F6000
stack
page read and write
31F7000
trusted library allocation
page read and write
1B147052000
trusted library allocation
page read and write
DD8000
heap
page read and write
92A000
heap
page read and write
2A2D10B0000
heap
page read and write
7FF848EB6000
trusted library allocation
page read and write
7FF848E0B000
trusted library allocation
page read and write
206ECC10000
trusted library allocation
page read and write
2A2C939F000
trusted library allocation
page read and write
20558158000
trusted library allocation
page read and write
CC4C1BC000
stack
page read and write
1B14EF20000
heap
page read and write
150A000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
1B136C02000
trusted library allocation
page read and write
7FF848E1B000
trusted library allocation
page read and write
1B470000
trusted library allocation
page read and write
2A2D13AB000
heap
page read and write
7FF849200000
trusted library allocation
page read and write
149E000
heap
page read and write
7FF849220000
trusted library allocation
page execute and read and write
28E4C546000
heap
page read and write
1B6A4000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
12584000
trusted library allocation
page read and write
20568240000
trusted library allocation
page read and write
8D0000
heap
page read and write
F03000
heap
page read and write
15D6000
heap
page read and write
1B146E71000
trusted library allocation
page read and write
2A2C9382000
trusted library allocation
page read and write
92C000
heap
page read and write
DCA000
heap
page read and write
7FF848FD0000
trusted library allocation
page read and write
20690314000
trusted library allocation
page read and write
1B134E13000
heap
page read and write
1B990000
heap
page read and write
1B137BF1000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
2A287B6000
stack
page read and write
1B2F0000
heap
page execute and read and write
7FF848FE2000
trusted library allocation
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
2A2D14D8000
heap
page read and write
1B684000
heap
page read and write
12691000
trusted library allocation
page read and write
7FF84926D000
trusted library allocation
page read and write
1B147011000
trusted library allocation
page read and write
9E8F27A000
stack
page read and write
FC7000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
2A2BA233000
trusted library allocation
page read and write
12A88000
trusted library allocation
page read and write
28E66530000
trusted library allocation
page read and write
2D65000
trusted library allocation
page read and write
128CD000
trusted library allocation
page read and write
1B14F018000
heap
page read and write
FEE7987000
stack
page read and write
1DB1B2A0000
trusted library allocation
page read and write
12A0D000
trusted library allocation
page read and write
590000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
20690307000
trusted library allocation
page read and write
20567F61000
trusted library allocation
page read and write
B40000
heap
page read and write
1B8FF000
stack
page read and write
205681EE000
trusted library allocation
page read and write
326F000
trusted library allocation
page read and write
1018000
heap
page read and write
1B146F3C000
trusted library allocation
page read and write
2A2C9322000
trusted library allocation
page read and write
12813000
trusted library allocation
page read and write
C96A73B000
stack
page read and write
7FF849144000
trusted library allocation
page read and write
130AD000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
7FF848FD4000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
1595000
heap
page read and write
850000
heap
page read and write
2FE0000
heap
page read and write
888000
heap
page read and write
12633000
trusted library allocation
page read and write
13EC000
heap
page read and write
1B849000
heap
page read and write
266D000
trusted library allocation
page read and write
A40000
heap
page read and write
7FF848E1B000
trusted library allocation
page read and write
206EB210000
heap
page read and write
F30000
trusted library allocation
page read and write
1B146ED4000
trusted library allocation
page read and write
3170000
heap
page execute and read and write
20568372000
trusted library allocation
page read and write
2B3B000
trusted library allocation
page read and write
1023000
heap
page read and write
143B000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
28D1000
trusted library allocation
page read and write
7FF849240000
trusted library allocation
page read and write
1AFBE000
stack
page read and write
E0A000
heap
page read and write
680000
trusted library allocation
page read and write
20568093000
trusted library allocation
page read and write
130A1000
trusted library allocation
page read and write
205682AD000
trusted library allocation
page read and write
7FF848FB2000
trusted library allocation
page read and write
28E4E4D8000
trusted library allocation
page read and write
7FF848FD2000
trusted library allocation
page read and write
2A2C92EA000
trusted library allocation
page read and write
1B14F18A000
heap
page read and write
1B4BE000
stack
page read and write
20690235000
trusted library allocation
page read and write
28E4F5EC000
trusted library allocation
page read and write
1B146ED9000
trusted library allocation
page read and write
1DB1A181000
trusted library allocation
page read and write
F00000
heap
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
6DD000
heap
page read and write
20568281000
trusted library allocation
page read and write
20558B20000
trusted library allocation
page read and write
7FF848E18000
trusted library allocation
page read and write
7FF848FE4000
trusted library allocation
page read and write
1DB19E30000
heap
page read and write
1B0B0000
heap
page execute and read and write
7FF848E1D000
trusted library allocation
page execute and read and write
DCF000
heap
page read and write
12A01000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
1C0CE000
stack
page read and write
7FF849130000
trusted library allocation
page read and write
205680DF000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
1B6EA000
heap
page read and write
7FF84904D000
trusted library allocation
page read and write
2A2B8C00000
heap
page execute and read and write
206EB3E0000
heap
page read and write
1B79F000
stack
page read and write
1AEB0000
heap
page read and write
1320000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
1400000
heap
page read and write
93B000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
6D5000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
206ECBD0000
heap
page read and write
206ED394000
heap
page read and write
1BB6E000
stack
page read and write
7EB000
heap
page read and write
2A2C9443000
trusted library allocation
page read and write
20568021000
trusted library allocation
page read and write
2A2C92BA000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
600000
heap
page read and write
2A2C9274000
trusted library allocation
page read and write
1B146C60000
trusted library allocation
page read and write
1B923000
stack
page read and write
7FF849210000
trusted library allocation
page read and write
7FF84921F000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
7FF849246000
trusted library allocation
page read and write
205681B1000
trusted library allocation
page read and write
1B146E74000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
7FF849270000
trusted library allocation
page read and write
3E0000
heap
page read and write
20568227000
trusted library allocation
page read and write
28E66597000
heap
page execute and read and write
206ED336000
heap
page read and write
2A2B7072000
heap
page read and write
1A865000
heap
page read and write
7FF848E0B000
trusted library allocation
page read and write
7FF849164000
trusted library allocation
page read and write
2A2847E000
stack
page read and write
1B53E000
stack
page read and write
1B3A3000
stack
page read and write
7FF848FA7000
trusted library allocation
page read and write
2A2C91D9000
trusted library allocation
page read and write
C96A6BF000
stack
page read and write
1DB1B484000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
3229000
trusted library allocation
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
2A2B70E9000
heap
page read and write
1DB182CC000
heap
page read and write
1B146F91000
trusted library allocation
page read and write
28E66560000
heap
page read and write
7FF848FA4000
trusted library allocation
page read and write
1BC6E000
stack
page read and write
2056805A000
trusted library allocation
page read and write
934000
heap
page read and write
205596B2000
trusted library allocation
page read and write
7FF848FB9000
trusted library allocation
page read and write
20568350000
trusted library allocation
page read and write
205682C5000
trusted library allocation
page read and write
2056816E000
trusted library allocation
page read and write
1B153000
stack
page read and write
1730000
heap
page execute and read and write
2A2C9164000
trusted library allocation
page read and write
20567FEF000
trusted library allocation
page read and write
D16000
stack
page read and write
2A2C905E000
trusted library allocation
page read and write
1B3B3000
stack
page read and write
7F0000
trusted library allocation
page read and write
28E4C544000
heap
page read and write
12C21000
trusted library allocation
page read and write
BB0000
heap
page read and write
2A2BA19F000
trusted library allocation
page read and write
2A2BA81F000
trusted library allocation
page read and write
1B583000
stack
page read and write
1B38E000
stack
page read and write
6D0000
heap
page read and write
1B45E000
stack
page read and write
2611000
trusted library allocation
page read and write
205680EA000
trusted library allocation
page read and write
1AA6D000
stack
page read and write
206902A3000
trusted library allocation
page read and write
128B5000
trusted library allocation
page read and write
1B146FE7000
trusted library allocation
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
7FF848E23000
trusted library allocation
page read and write
2A2B7300000
trusted library allocation
page read and write
1A590000
trusted library allocation
page read and write
7DF4447F0000
trusted library allocation
page execute and read and write
ACA000
heap
page read and write
20690339000
trusted library allocation
page read and write
F9B000
heap
page read and write
1DB18505000
heap
page read and write
2BBD000
trusted library allocation
page read and write
9D6000
heap
page read and write
7FF848E14000
trusted library allocation
page read and write
206902AB000
trusted library allocation
page read and write
2056803E000
trusted library allocation
page read and write
2AD1000
trusted library allocation
page read and write
2068194F000
trusted library allocation
page read and write
206EB252000
heap
page read and write
1DB182DA000
heap
page read and write
206903F8000
trusted library allocation
page read and write
1DB3260F000
heap
page read and write
1B883000
stack
page read and write
7FF848FAE000
trusted library allocation
page read and write
B90000
heap
page read and write
206ED640000
heap
page read and write
322E000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
1C810000
heap
page read and write
7FF848FD2000
trusted library allocation
page read and write
1B840000
heap
page read and write
7FF848EA6000
trusted library allocation
page read and write
20568165000
trusted library allocation
page read and write
20690205000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
3B0000
heap
page read and write
7FF849172000
trusted library allocation
page read and write
1B09E000
stack
page read and write
1B1470A5000
trusted library allocation
page read and write
206903A6000
trusted library allocation
page read and write
1B1384E0000
trusted library allocation
page read and write
20568265000
trusted library allocation
page read and write
20559821000
trusted library allocation
page read and write
1BD4F000
stack
page read and write
C45000
heap
page read and write
BB6000
heap
page read and write
7FF848F94000
trusted library allocation
page read and write
2A2C932B000
trusted library allocation
page read and write
9E8F73F000
stack
page read and write
F93000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
1B134E17000
heap
page read and write
B45000
heap
page read and write
2A2D1610000
heap
page read and write
1AE90000
heap
page execute and read and write
7FF848FE0000
trusted library allocation
page execute and read and write
2A2C9440000
trusted library allocation
page read and write
1513000
heap
page read and write
1B146FC4000
trusted library allocation
page read and write
BB0000
heap
page read and write
2A2D0F9F000
heap
page read and write
28E4F020000
trusted library allocation
page read and write
1BAFE000
stack
page read and write
1DB1BFA6000
trusted library allocation
page read and write
1B1BE000
stack
page read and write
2A2C91C4000
trusted library allocation
page read and write
There are 3300 hidden memdumps, click here to show them.