IOC Report
IM3OLcx7li.exe

loading gif

Files

File Path
Type
Category
Malicious
IM3OLcx7li.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\IM3OLcx7li.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Roaming\Bootstrapper.exe
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\FluxusV1.2
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\XClient.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
\Device\ConDrv
ISO-8859 text, with CRLF, LF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Bootstrapper.exe_f8ecbb689c8f1a18ba1322c93213c0dd24b0ed4d_47e6ae6e_a7aaad88-62f4-4fc9-8dc2-7a2a9a462b64\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBD56.tmp.dmp
Mini DuMP crash report, 16 streams, Thu Oct 31 18:46:14 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBF2C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBF6B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FluxusV1.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Oct 31 17:46:08 2024, mtime=Thu Oct 31 17:46:08 2024, atime=Thu Oct 31 17:46:08 2024, length=75264, window=hide
dropped
C:\Users\user\Desktop\DISCORD
JSON data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\IM3OLcx7li.exe
"C:\Users\user\Desktop\IM3OLcx7li.exe"
malicious
C:\Users\user\AppData\Roaming\XClient.exe
"C:\Users\user\AppData\Roaming\XClient.exe"
malicious
C:\Users\user\AppData\Roaming\Bootstrapper.exe
"C:\Users\user\AppData\Roaming\Bootstrapper.exe"
malicious
C:\Windows\System32\cmd.exe
"cmd" /c ipconfig /all
malicious
C:\Windows\System32\ipconfig.exe
ipconfig /all
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "FluxusV1" /tr "C:\Users\user\AppData\Roaming\FluxusV1.2"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe "C:\Users\user\AppData\Roaming\FluxusV1.2"
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7616 -s 2192
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe "C:\Users\user\AppData\Roaming\FluxusV1.2"
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe "C:\Users\user\AppData\Roaming\FluxusV1.2"
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe "C:\Users\user\AppData\Roaming\FluxusV1.2"
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe "C:\Users\user\AppData\Roaming\FluxusV1.2"
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
nohicsq.localto.net
malicious
http://127.0.0.1:6463
unknown
http://127.0.0.1:64632E
unknown
http://www.nodejs.org
unknown
https://discord.com
unknown
https://096e98d9.solaraweb-alj.pages.dev/download/static/files/Bootstrapper.exe
unknown
https://ncs.roblox.com/upload
unknown
https://www.nodejs.org
unknown
https://getsolara.dev/asset/discord.json
172.67.203.125
http://upx.sf.net
unknown
https://gist.githubusercontent.com/typeshi12/072784a0d3a602ed441a435d04c943b6/raw
unknown
http://james.newtonking.com/projects/json
unknown
https://096e98d9.solaraweb-alj.pages.dev/download/static/files/Solara.Dir.zip
unknown
http://edge-term4-fra4.roblox.com
unknown
http://getsolara.dev
unknown
https://discord.com;http://127.0.0.1:6463/rpc?v=11
unknown
https://clientsettings.roblox.com/v2/client-version/WindowsPlayer/channel/live
128.116.44.4
https://aka.ms/vs/17/release/vc_redist.x64.exe
unknown
https://getsolara.dev
unknown
https://getsolara.dev/api/endpoint.json
172.67.203.125
https://www.newtonsoft.com/jsonschema
unknown
https://www.nodejs.org/dist/v18.16.0/node-v18.16.0-x64.msi
104.20.22.46
https://www.nuget.org/packages/Newtonsoft.Json.Bson
unknown
https://gist.githubusercontent.com/typeshi12/29ef3a44a19235b08aaf229631c024d8/raw
unknown
http://127.0.0.1:6463/rpc?v=1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://clientsettings.roblox.com
unknown
https://nodejs.org/dist/v18.16.0/node-v18.16.0-x64.msi
unknown
https://pastebin.com/raw/pjseRvyK
unknown
https://clientsettings.roblox.com
unknown
https://gist.githubusercontent.com/typeshi12/072784a0d3a602ed441a435d04c943b6/rawChttps://pastebin.c
unknown
There are 21 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
nohicsq.localto.net
185.141.35.22
malicious
edge-term4-fra4.roblox.com
128.116.44.4
getsolara.dev
172.67.203.125
www.nodejs.org
104.20.22.46
clientsettings.roblox.com
unknown

IPs

IP
Domain
Country
Malicious
185.141.35.22
nohicsq.localto.net
Turkey
malicious
172.67.203.125
getsolara.dev
United States
128.116.44.4
edge-term4-fra4.roblox.com
United States
104.20.22.46
www.nodejs.org
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
FluxusV1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
FileDirectory
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
ProgramId
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
FileId
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
LowerCaseLongPath
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
LongPathHash
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
Name
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
OriginalFileName
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
Publisher
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
Version
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
BinFileVersion
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
BinaryType
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
ProductName
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
ProductVersion
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
LinkDate
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
BinProductVersion
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
AppxPackageFullName
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
AppxPackageRelativeId
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
Size
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
Language
\REGISTRY\A\{d1d5ba51-0e6f-5c6b-52ad-bfa9d106474d}\Root\InventoryApplicationFile\bootstrapper.exe|ba3b8bdfeba82a16
Usn
There are 43 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3091000
trusted library allocation
page read and write
malicious
452000
unkown
page readonly
malicious
1904B2AC000
heap
page read and write
20923D4D000
heap
page read and write
2B41BFF000
unkown
page read and write
2144FA64000
heap
page read and write
19357F21000
heap
page read and write
1904B3C8000
heap
page read and write
25E30498000
heap
page read and write
1935607B000
heap
page read and write
25E302C0000
heap
page read and write
3B13BFB000
stack
page read and write
19357F17000
heap
page read and write
25E302DC000
heap
page read and write
2D38BBEF000
heap
page read and write
19357F1C000
heap
page read and write
20925E99000
heap
page read and write
2144DAB4000
heap
page read and write
2D38BC01000
heap
page read and write
207CD64F000
heap
page read and write
20923D93000
heap
page read and write
1C121A94000
heap
page read and write
25E302F4000
heap
page read and write
1904B3BD000
heap
page read and write
1904B284000
heap
page read and write
20925CCB000
heap
page read and write
207CD7C3000
heap
page read and write
207CB84D000
heap
page read and write
2144FBDD000
heap
page read and write
1904B284000
heap
page read and write
2D38BAE3000
heap
page read and write
E12927B000
stack
page read and write
25E3046A000
heap
page read and write
207CD759000
heap
page read and write
1904AC90000
heap
page read and write
19357F20000
heap
page read and write
2144DAC6000
heap
page read and write
2D389AC2000
heap
page read and write
1904B28F000
heap
page read and write
20925DC2000
heap
page read and write
1935793A000
heap
page read and write
19357F26000
heap
page read and write
25E2FE60000
heap
page read and write
2144DB0E000
heap
page read and write
1904B414000
heap
page read and write
19358079000
heap
page read and write
2D38BC6C000
heap
page read and write
2144FB3A000
heap
page read and write
2D389AE0000
heap
page read and write
207CD817000
heap
page read and write
19358033000
heap
page read and write
7FFB4B140000
trusted library allocation
page execute and read and write
2D38BAF0000
heap
page read and write
1C121B70000
heap
page read and write
2144FA7C000
heap
page read and write
25E2FE7E000
heap
page read and write
26C241B2000
unkown
page readonly
7FFB4B0C0000
trusted library allocation
page read and write
20925CD6000
heap
page read and write
25E3045D000
heap
page read and write
20925CBF000
heap
page read and write
193560A7000
heap
page read and write
2144FB54000
heap
page read and write
BA11CF2000
stack
page read and write
20925CC7000
heap
page read and write
2144FBE0000
heap
page read and write
19049303000
heap
page read and write
207CD64C000
heap
page read and write
25E2E3A5000
heap
page read and write
2D38BBC2000
heap
page read and write
2D38B420000
heap
page read and write
193560A6000
heap
page read and write
26C2442D000
heap
page read and write
2D389B08000
heap
page read and write
193580DE000
heap
page read and write
26C26259000
trusted library allocation
page read and write
1695000
heap
page read and write
193560DD000
heap
page read and write
7FFB4AF34000
trusted library allocation
page read and write
1904DAF7000
heap
page read and write
1904B3B8000
heap
page read and write
207CD807000
heap
page read and write
1904B29B000
heap
page read and write
2D38BAE2000
heap
page read and write
2D38BC23000
heap
page read and write
2144FA72000
heap
page read and write
2D38BAEB000
heap
page read and write
1935A982000
heap
page read and write
1B150000
heap
page read and write
20925DBC000
heap
page read and write
1904B383000
heap
page read and write
1904B260000
heap
page read and write
25E303EE000
heap
page read and write
2144FA89000
heap
page read and write
2D38BADC000
heap
page read and write
7FFB4AF40000
trusted library allocation
page read and write
20923D2D000
heap
page read and write
7FFB4AF23000
trusted library allocation
page execute and read and write
2D389B1A000
heap
page read and write
1690000
heap
page read and write
207CD15D000
heap
page read and write
207CB87E000
heap
page read and write
25E3043D000
heap
page read and write
19356087000
heap
page read and write
2144FB52000
heap
page read and write
2144FBE0000
heap
page read and write
207CD64F000
heap
page read and write
1904B28D000
heap
page read and write
20925DBE000
heap
page read and write
19356089000
heap
page read and write
25E30493000
heap
page read and write
2144FC29000
heap
page read and write
2144FC2B000
heap
page read and write
1BBE4000
stack
page read and write
1904B276000
heap
page read and write
207CD7A8000
heap
page read and write
207CD791000
heap
page read and write
26C261BA000
trusted library allocation
page read and write
25E302EF000
heap
page read and write
2D38BAE2000
heap
page read and write
207CD660000
heap
page read and write
19357F1C000
heap
page read and write
1904B2AD000
heap
page read and write
2144FB84000
heap
page read and write
20925E86000
heap
page read and write
207CB600000
heap
page read and write
2D38BBBF000
heap
page read and write
1904B286000
heap
page read and write
19358089000
heap
page read and write
207CD7FA000
heap
page read and write
25E302EA000
heap
page read and write
20925DAA000
heap
page read and write
1904ACAE000
heap
page read and write
193560E7000
heap
page read and write
8F0000
heap
page read and write
2144DABD000
heap
page read and write
25E3046A000
heap
page read and write
D55000
heap
page read and write
1904B40F000
heap
page read and write
E1291FF000
stack
page read and write
5A4267E000
stack
page read and write
21452300000
heap
page read and write
25E2E396000
heap
page read and write
2D389AEA000
heap
page read and write
207CD64B000
heap
page read and write
207CD807000
heap
page read and write
25E3047A000
heap
page read and write
DD4000
stack
page read and write
2144DACE000
heap
page read and write
207CB83A000
heap
page read and write
7FFB4B000000
trusted library allocation
page execute and read and write
26C3E970000
heap
page read and write
1904B29F000
heap
page read and write
207CD655000
heap
page read and write
20925CCB000
heap
page read and write
193560ED000
heap
page read and write
2144FA72000
heap
page read and write
19358066000
heap
page read and write
2144FB52000
heap
page read and write
19358011000
heap
page read and write
2D38BC98000
heap
page read and write
7FFB4AF60000
trusted library allocation
page read and write
1904B431000
heap
page read and write
19357F31000
heap
page read and write
2D389B27000
heap
page read and write
25E2FE7A000
heap
page read and write
1904B40F000
heap
page read and write
13091000
trusted library allocation
page read and write
2D38BC88000
heap
page read and write
1904B284000
heap
page read and write
207CD749000
heap
page read and write
2D38BC6C000
heap
page read and write
1935606C000
heap
page read and write
25E303C2000
heap
page read and write
2D38BAF0000
heap
page read and write
2144DA10000
heap
page read and write
2D38BAD7000
heap
page read and write
1904B2A9000
heap
page read and write
207CD639000
heap
page read and write
2144DACE000
heap
page read and write
19356072000
heap
page read and write
25E2E399000
heap
page read and write
25E30493000
heap
page read and write
2D389B07000
heap
page read and write
1C121CB0000
heap
page read and write
2D389C40000
heap
page read and write
C5B89FC000
stack
page read and write
214522FA000
heap
page read and write
1904B389000
heap
page read and write
19357EF0000
heap
page read and write
19049338000
heap
page read and write
2144D950000
heap
page read and write
1B742000
heap
page read and write
1904B387000
heap
page read and write
2144FA5E000
heap
page read and write
20925CD5000
heap
page read and write
19356064000
heap
page read and write
7FFB4AFFC000
trusted library allocation
page execute and read and write
19357F20000
heap
page read and write
1904B3B1000
heap
page read and write
1904DAD1000
heap
page read and write
2144DAAB000
heap
page read and write
6705F7E000
stack
page read and write
193560EE000
heap
page read and write
BA119AE000
stack
page read and write
2144DAAA000
heap
page read and write
193560A0000
heap
page read and write
2D38BAD4000
heap
page read and write
19356069000
heap
page read and write
1935609B000
heap
page read and write
193560B5000
heap
page read and write
207CD810000
heap
page read and write
2F80000
heap
page read and write
19357F3A000
heap
page read and write
19049302000
heap
page read and write
20923D90000
heap
page read and write
20925DDC000
heap
page read and write
2144FA5E000
heap
page read and write
207CD7A3000
heap
page read and write
7FFB4B190000
trusted library allocation
page read and write
25E30444000
heap
page read and write
26C26165000
trusted library allocation
page read and write
207CB7F6000
heap
page read and write
21454192000
trusted library allocation
page read and write
2144FA5B000
heap
page read and write
25E2E384000
heap
page read and write
2D389AF6000
heap
page read and write
C5B887E000
stack
page read and write
26C260D0000
heap
page execute and read and write
2D389B01000
heap
page read and write
20925DCF000
heap
page read and write
207CD659000
heap
page read and write
2D38BAEB000
heap
page read and write
25E2E38A000
heap
page read and write
3B13AFD000
stack
page read and write
207CD155000
heap
page read and write
1904B287000
heap
page read and write
2D38B55E000
heap
page read and write
2D389B14000
heap
page read and write
BA121FE000
stack
page read and write
20925CCC000
heap
page read and write
1904B40F000
heap
page read and write
19049332000
heap
page read and write
19357F16000
heap
page read and write
25E302DC000
heap
page read and write
25E2E3C7000
heap
page read and write
9B0000
heap
page read and write
25E302DC000
heap
page read and write
D98D77F000
stack
page read and write
207CB87E000
heap
page read and write
1195000
heap
page read and write
25E2E387000
heap
page read and write
25E30490000
heap
page read and write
1904B29C000
heap
page read and write
20928720000
heap
page read and write
BA128FE000
stack
page read and write
20925DC4000
heap
page read and write
7FFB4AF30000
trusted library allocation
page read and write
7FFB4B110000
trusted library allocation
page read and write
5A422D8000
stack
page read and write
2D38BAD0000
heap
page read and write
25E302EA000
heap
page read and write
2D38E530000
trusted library allocation
page read and write
25E2E290000
heap
page read and write
1904DAC0000
heap
page read and write
2144FA5E000
heap
page read and write
1B773000
heap
page read and write
25E302D6000
heap
page read and write
2144FA47000
heap
page read and write
20925DA0000
heap
page read and write
2D38BAF5000
heap
page read and write
25E302D7000
heap
page read and write
19356064000
heap
page read and write
1904B2AC000
heap
page read and write
26C24690000
heap
page read and write
2144FB7C000
heap
page read and write
25E302F4000
heap
page read and write
207CD7C4000
heap
page read and write
20928737000
heap
page read and write
1904B389000
heap
page read and write
7FFB4B0D4000
trusted library allocation
page read and write
207CD7C3000
heap
page read and write
193580A4000
heap
page read and write
25E303EA000
heap
page read and write
207CB841000
heap
page read and write
25E2E38C000
heap
page read and write
2D38BBE5000
heap
page read and write
2144FC24000
heap
page read and write
25E30490000
heap
page read and write
670627D000
stack
page read and write
20923DAB000
heap
page read and write
2D38BBBF000
heap
page read and write
20923D4A000
heap
page read and write
1904B3B1000
heap
page read and write
2144DA65000
heap
page read and write
25E302E6000
heap
page read and write
20925750000
heap
page read and write
2D389B2A000
heap
page read and write
19357F34000
heap
page read and write
20925CCF000
heap
page read and write
25E303CB000
heap
page read and write
25E2E3C7000
heap
page read and write
2D38BBDC000
heap
page read and write
1904B3C6000
heap
page read and write
25E302C9000
heap
page read and write
2144FBC7000
heap
page read and write
7FFB4B0D7000
trusted library allocation
page read and write
2144FB3A000
heap
page read and write
1935AC40000
heap
page read and write
19356028000
heap
page read and write
207CB80E000
heap
page read and write
25E303C7000
heap
page read and write
2D38BAF0000
heap
page read and write
2D38BAC0000
heap
page read and write
193580A0000
heap
page read and write
20928735000
heap
page read and write
207CB720000
heap
page read and write
2144FA48000
heap
page read and write
E12947B000
stack
page read and write
207CB876000
heap
page read and write
26C261B6000
trusted library allocation
page read and write
193560A8000
heap
page read and write
2D38BC06000
heap
page read and write
20923CE8000
heap
page read and write
207CB837000
heap
page read and write
20923D3B000
heap
page read and write
19357F11000
heap
page read and write
19357F1C000
heap
page read and write
207CD7C8000
heap
page read and write
25E30466000
heap
page read and write
207CB848000
heap
page read and write
2144FA72000
heap
page read and write
2144D940000
heap
page read and write
2144DAA6000
heap
page read and write
7FFB4B0E2000
trusted library allocation
page read and write
19356070000
heap
page read and write
1904B296000
heap
page read and write
2D38BB03000
heap
page read and write
2144DAC6000
heap
page read and write
19358099000
heap
page read and write
7FFB4AF64000
trusted library allocation
page read and write
1904B29B000
heap
page read and write
2D38BC9B000
heap
page read and write
25E302D5000
heap
page read and write
1C1219F0000
heap
page read and write
19357F2F000
heap
page read and write
19357935000
heap
page read and write
19357F34000
heap
page read and write
5A1000
stack
page read and write
21452301000
heap
page read and write
1904DB0B000
heap
page read and write
25E2E400000
heap
page read and write
CA3000
trusted library allocation
page read and write
2144DAE9000
heap
page read and write
1935A97B000
heap
page read and write
20925CDE000
heap
page read and write
207CD7C6000
heap
page read and write
26C2617D000
trusted library allocation
page read and write
2144DACD000
heap
page read and write
20925E86000
heap
page read and write
20925E28000
heap
page read and write
25E2E40C000
heap
page read and write
20923D4F000
heap
page read and write
2D38BBF3000
heap
page read and write
207CD7D5000
heap
page read and write
207CB805000
heap
page read and write
19049356000
heap
page read and write
1B3AF000
stack
page read and write
207CD664000
heap
page read and write
193560E5000
heap
page read and write
1904B296000
heap
page read and write
2144FA30000
heap
page read and write
207CD7D5000
heap
page read and write
207CB863000
heap
page read and write
207D00BC000
heap
page read and write
9DB000
heap
page read and write
207CB83A000
heap
page read and write
25E302CC000
heap
page read and write
2D38BC6C000
heap
page read and write
2144FA76000
heap
page read and write
1904B414000
heap
page read and write
207CD630000
heap
page read and write
2D38BC41000
heap
page read and write
20925CD9000
heap
page read and write
E128CC7000
stack
page read and write
C5B88FE000
stack
page read and write
19357F2F000
heap
page read and write
7FFB4AF3D000
trusted library allocation
page execute and read and write
450000
unkown
page readonly
20928744000
heap
page read and write
1904B27A000
heap
page read and write
207CD7A8000
heap
page read and write
2D38BAF0000
heap
page read and write
2144FC24000
heap
page read and write
1904931D000
heap
page read and write
2144FA64000
heap
page read and write
19049210000
heap
page read and write
2144FA76000
heap
page read and write
2144DACE000
heap
page read and write
26C247A0000
heap
page read and write
2144FB54000
heap
page read and write
25E2E393000
heap
page read and write
E6B6478000
stack
page read and write
214522DF000
heap
page read and write
20925CC5000
heap
page read and write
2144DABF000
heap
page read and write
25E303E1000
heap
page read and write
19358077000
heap
page read and write
A48000
heap
page read and write
19049319000
heap
page read and write
25E302D1000
heap
page read and write
207CD7A8000
heap
page read and write
2144FC13000
heap
page read and write
25E2E3A4000
heap
page read and write
2D389B0B000
heap
page read and write
2D38BBF3000
heap
page read and write
207CD738000
heap
page read and write
2144DA83000
heap
page read and write
25E3046A000
heap
page read and write
19356045000
heap
page read and write
25E2E384000
heap
page read and write
207CB82B000
heap
page read and write
19357F16000
heap
page read and write
1BF4F000
stack
page read and write
2D38BAD9000
heap
page read and write
7FFB4AF9C000
trusted library allocation
page execute and read and write
2144DAA5000
heap
page read and write
20925E86000
heap
page read and write
26C24695000
heap
page read and write
2D38BBE5000
heap
page read and write
193580C6000
heap
page read and write
20925CB1000
heap
page read and write
25E303BA000
heap
page read and write
25E302DC000
heap
page read and write
19357F22000
heap
page read and write
2144FA7C000
heap
page read and write
3B13E7B000
stack
page read and write
193560A1000
heap
page read and write
20925E86000
heap
page read and write
19357F34000
heap
page read and write
1904B27D000
heap
page read and write
1904B2AC000
heap
page read and write
26C3E952000
heap
page read and write
19357F17000
heap
page read and write
2D38BAD0000
heap
page read and write
207CD64F000
heap
page read and write
2144FA4B000
heap
page read and write
25E302F4000
heap
page read and write
2D38BAF4000
heap
page read and write
5A42AFE000
stack
page read and write
20925DF7000
heap
page read and write
207CD754000
heap
page read and write
3B13DFD000
stack
page read and write
20925CBA000
heap
page read and write
2D38BAF4000
heap
page read and write
20925CD1000
heap
page read and write
19358099000
heap
page read and write
20925CD5000
heap
page read and write
207CB7F6000
heap
page read and write
2144DAA2000
heap
page read and write
2144FA44000
heap
page read and write
2D38B550000
heap
page read and write
19357F26000
heap
page read and write
20923D36000
heap
page read and write
2144FA44000
heap
page read and write
25E304A7000
heap
page read and write
7FFB4AF4A000
trusted library allocation
page read and write
25E302E0000
heap
page read and write
19357F20000
heap
page read and write
20925CD9000
heap
page read and write
1935A970000
heap
page read and write
2B41AFC000
stack
page read and write
20925E91000
heap
page read and write
2D38BAF4000
heap
page read and write
207CD749000
heap
page read and write
19358089000
heap
page read and write
20923D60000
heap
page read and write
214525E0000
trusted library allocation
page read and write
1935793D000
heap
page read and write
26C260F3000
trusted library allocation
page read and write
26C26170000
trusted library allocation
page read and write
207CD159000
heap
page read and write
19357F12000
heap
page read and write
2144FBD4000
heap
page read and write
E6B65FF000
stack
page read and write
1C121A70000
heap
page read and write
97C000
heap
page read and write
27977F70000
heap
page read and write
20925E91000
heap
page read and write
1904B2A0000
heap
page read and write
20925E28000
heap
page read and write
2144FBC7000
heap
page read and write
1B61D000
stack
page read and write
25E2E3AF000
heap
page read and write
190492D4000
heap
page read and write
2144FC24000
heap
page read and write
1935A97E000
heap
page read and write
193580CA000
heap
page read and write
20925E82000
heap
page read and write
20925CBE000
heap
page read and write
25E303B6000
heap
page read and write
20925E86000
heap
page read and write
20925DC6000
heap
page read and write
2D389B13000
heap
page read and write
193580CA000
heap
page read and write
20923D13000
heap
page read and write
2D38BBB0000
heap
page read and write
1904B2A8000
heap
page read and write
19049310000
heap
page read and write
1904B276000
heap
page read and write
11435E8000
stack
page read and write
19357939000
heap
page read and write
2D38BBE9000
heap
page read and write
BA11DFE000
stack
page read and write
2D389AFA000
heap
page read and write
2D389B0B000
heap
page read and write
960000
heap
page read and write
2D38BAE3000
heap
page read and write
207CD7D5000
heap
page read and write
190492B1000
heap
page read and write
207CB7FC000
heap
page read and write
25E302D6000
heap
page read and write
207CD656000
heap
page read and write
19358099000
heap
page read and write
BB0000
unkown
page readonly
19357F20000
heap
page read and write
2D38BAD7000
heap
page read and write
26C243A0000
trusted library allocation
page read and write
20925CD2000
heap
page read and write
25E2FE75000
heap
page read and write
1904B2AD000
heap
page read and write
193580A4000
heap
page read and write
7FFB4B130000
trusted library allocation
page read and write
20925DD7000
heap
page read and write
2144FBC2000
heap
page read and write
1904B3B1000
heap
page read and write
20925CDB000
heap
page read and write
1BC40000
heap
page read and write
207CB834000
heap
page read and write
2144FA4B000
heap
page read and write
20925E9C000
heap
page read and write
1904B29B000
heap
page read and write
20925CCB000
heap
page read and write
26C2627F000
trusted library allocation
page read and write
25E2E384000
heap
page read and write
6705AC8000
stack
page read and write
207CD645000
heap
page read and write
E6B677B000
stack
page read and write
26C3E968000
heap
page read and write
2144DAD2000
heap
page read and write
207CD642000
heap
page read and write
207CB80D000
heap
page read and write
976000
heap
page read and write
2D38BAE6000
heap
page read and write
26C2621A000
trusted library allocation
page read and write
193560EE000
heap
page read and write
1904B3B1000
heap
page read and write
193580CA000
heap
page read and write
207CB80D000
heap
page read and write
2144FA69000
heap
page read and write
1219000
heap
page read and write
2D38BAC6000
heap
page read and write
2D38BBE5000
heap
page read and write
207CB87E000
heap
page read and write
25E3045D000
heap
page read and write
1904DAFF000
heap
page read and write
1904DAFF000
heap
page read and write
2D389B1E000
heap
page read and write
26C243CC000
heap
page read and write
2D38BBC3000
heap
page read and write
25E32D55000
heap
page read and write
207CD763000
heap
page read and write
25E303CD000
heap
page read and write
25E302E6000
heap
page read and write
2D38BBDE000
heap
page read and write
2144DAED000
heap
page read and write
19357F12000
heap
page read and write
20923D4D000
heap
page read and write
207CB83A000
heap
page read and write
25E302D6000
heap
page read and write
2D38BC30000
heap
page read and write
25E302E2000
heap
page read and write
1904B399000
heap
page read and write
5A426FE000
stack
page read and write
2D38BBB6000
heap
page read and write
20925DDB000
heap
page read and write
1904B36B000
heap
page read and write
214522D9000
heap
page read and write
19357F2F000
heap
page read and write
7FFB4AF32000
trusted library allocation
page read and write
1904ACA5000
heap
page read and write
207CD050000
heap
page read and write
A6B000
heap
page read and write
2D38BBCE000
heap
page read and write
1904ACA0000
heap
page read and write
25E302CD000
heap
page read and write
1904B296000
heap
page read and write
19356064000
heap
page read and write
7FFB4AF43000
trusted library allocation
page read and write
207CD7E6000
heap
page read and write
19357F01000
heap
page read and write
20925DB2000
heap
page read and write
1904B393000
heap
page read and write
207CB87E000
heap
page read and write
20925CC8000
heap
page read and write
25E302EB000
heap
page read and write
2D390610000
heap
page readonly
19358079000
heap
page read and write
25E302E0000
heap
page read and write
19358099000
heap
page read and write
190492FF000
heap
page read and write
1904B411000
heap
page read and write
11CD000
heap
page read and write
2D38BAC0000
heap
page read and write
7FFB4B150000
trusted library allocation
page read and write
207CB7F9000
heap
page read and write
25E302EF000
heap
page read and write
26C263BD000
trusted library allocation
page read and write
25E302E0000
heap
page read and write
21454630000
heap
page readonly
2144D990000
heap
page read and write
20925CD5000
heap
page read and write
2144FA6E000
heap
page read and write
1935609E000
heap
page read and write
1B1A3000
heap
page read and write
1904B284000
heap
page read and write
19357FFD000
heap
page read and write
26C261F7000
trusted library allocation
page read and write
5A4235E000
stack
page read and write
25E302C0000
heap
page read and write
5A427FB000
stack
page read and write
19357F31000
heap
page read and write
BA123FE000
stack
page read and write
19358067000
heap
page read and write
2D38BAF4000
heap
page read and write
20923D28000
heap
page read and write
1935607F000
heap
page read and write
1C121A7B000
heap
page read and write
2D38BAB0000
heap
page read and write
25E2E3C7000
heap
page read and write
2144FB54000
heap
page read and write
1935608B000
heap
page read and write
2D38BAF5000
heap
page read and write
19049301000
heap
page read and write
2092583D000
heap
page read and write
19357F1C000
heap
page read and write
20925CCF000
heap
page read and write
E6B69FB000
stack
page read and write
2D38DD00000
trusted library allocation
page read and write
19358005000
heap
page read and write
2144FB3C000
heap
page read and write
2D38BAF4000
heap
page read and write
20925E4B000
heap
page read and write
2144FB73000
heap
page read and write
BA1196E000
stack
page read and write
2D38BC06000
heap
page read and write
1904B2A7000
heap
page read and write
2092583E000
heap
page read and write
19357F16000
heap
page read and write
20925DC8000
heap
page read and write
2144FA59000
heap
page read and write
2144FA83000
heap
page read and write
2144FA72000
heap
page read and write
1904B29B000
heap
page read and write
7FFB4AFE0000
trusted library allocation
page read and write
207CD7C3000
heap
page read and write
2D389AE4000
heap
page read and write
2144FA6E000
heap
page read and write
25E32F90000
heap
page read and write
20925E32000
heap
page read and write
2D38BAD8000
heap
page read and write
1C13B000
stack
page read and write
2D38BAD4000
heap
page read and write
1904B393000
heap
page read and write
26C36101000
trusted library allocation
page read and write
7FFB4AFE0000
trusted library allocation
page execute and read and write
2144FA8C000
heap
page read and write
26C24590000
trusted library allocation
page read and write
25E303B0000
heap
page read and write
26C24402000
heap
page read and write
2D38BCAE000
heap
page read and write
2D38BADC000
heap
page read and write
19356085000
heap
page read and write
207CB844000
heap
page read and write
20928738000
heap
page read and write
2D38BB00000
heap
page read and write
20925CBA000
heap
page read and write
2144FA64000
heap
page read and write
214522C9000
heap
page read and write
20925CD9000
heap
page read and write
1143AFB000
stack
page read and write
2144F660000
trusted library allocation
page read and write
19049317000
heap
page read and write
25E302DC000
heap
page read and write
214522C0000
heap
page read and write
2144FA64000
heap
page read and write
25E302EF000
heap
page read and write
3B13B7B000
stack
page read and write
19357F15000
heap
page read and write
25E30466000
heap
page read and write
2D38BC6A000
heap
page read and write
20923D79000
heap
page read and write
20928724000
heap
page read and write
25E2E2A0000
heap
page read and write
25E303E1000
heap
page read and write
1904B434000
heap
page read and write
2D38BB00000
heap
page read and write
207CD7A8000
heap
page read and write
1935608E000
heap
page read and write
1120000
heap
page read and write
7FFB4B120000
trusted library allocation
page read and write
25E30476000
heap
page read and write
25E30493000
heap
page read and write
26C2617B000
trusted library allocation
page read and write
1BF0C000
stack
page read and write
1904B431000
heap
page read and write
20923D70000
heap
page read and write
26EE000
stack
page read and write
19356067000
heap
page read and write
2144FBD8000
heap
page read and write
1904B28A000
heap
page read and write
207CB7FF000
heap
page read and write
26C245E0000
heap
page read and write
1904B380000
heap
page read and write
25E303EF000
heap
page read and write
207CD72A000
heap
page read and write
E6B6AFE000
stack
page read and write
1904DADA000
heap
page read and write
1BD00000
heap
page read and write
2144DB0E000
heap
page read and write
1904933B000
heap
page read and write
193560EB000
heap
page read and write
2D3903D0000
heap
page read and write
207CB805000
heap
page read and write
25E3043D000
heap
page read and write
19358008000
heap
page read and write
190492F4000
heap
page read and write
19356072000
heap
page read and write
1904B296000
heap
page read and write
2D38BAD9000
heap
page read and write
1935608B000
heap
page read and write
207CD78D000
heap
page read and write
7FFB4AF5D000
trusted library allocation
page execute and read and write
26C245A3000
trusted library allocation
page read and write
19358089000
heap
page read and write
207CD65A000
heap
page read and write
25E30493000
heap
page read and write
2D38BBE5000
heap
page read and write
26C243EC000
heap
page read and write
1904B435000
heap
page read and write
2D38BAC6000
heap
page read and write
20928721000
heap
page read and write
1904B2B3000
heap
page read and write
20925CC5000
heap
page read and write
25E30402000
heap
page read and write
1904B28D000
heap
page read and write
25E302F4000
heap
page read and write
207CD7D5000
heap
page read and write
19049313000
heap
page read and write
20925DDB000
heap
page read and write
207CD645000
heap
page read and write
20925CD5000
heap
page read and write
20925CDE000
heap
page read and write
20925CB0000
heap
page read and write
2D389AF8000
heap
page read and write
19356069000
heap
page read and write
20927EF0000
trusted library allocation
page read and write
207CD630000
heap
page read and write
207CB811000
heap
page read and write
5A4277C000
stack
page read and write
193579E0000
heap
page read and write
207CD63A000
heap
page read and write
25E32D30000
heap
page read and write
3B13877000
stack
page read and write
25E302E6000
heap
page read and write
1BC3E000
stack
page read and write
2700000
heap
page execute and read and write
1935801F000
heap
page read and write
19358089000
heap
page read and write
20923D61000
heap
page read and write
2144DACA000
heap
page read and write
2144FA5E000
heap
page read and write
25E3047A000
heap
page read and write
2144DB03000
heap
page read and write
25E302E0000
heap
page read and write
20923DAA000
heap
page read and write
2D38BBC6000
heap
page read and write
214522E6000
heap
page read and write
20925DB4000
heap
page read and write
1904B3F0000
heap
page read and write
207CB828000
heap
page read and write
19049316000
heap
page read and write
2144FB73000
heap
page read and write
1935793E000
heap
page read and write
7FFB4AF50000
trusted library allocation
page read and write
26C24350000
heap
page read and write
25E302C1000
heap
page read and write
25E30498000
heap
page read and write
20923DAD000
heap
page read and write
207CD7A3000
heap
page read and write
1904DAD4000
heap
page read and write
20925CC7000
heap
page read and write
25E30435000
heap
page read and write
2D389B4E000
heap
page read and write
20925CDA000
heap
page read and write
7FFB4B100000
trusted library allocation
page execute and read and write
207CD64B000
heap
page read and write
20925CCB000
heap
page read and write
1904B2BE000
heap
page read and write
19357F2A000
heap
page read and write
1935A985000
heap
page read and write
26C261CF000
trusted library allocation
page read and write
19049313000
heap
page read and write
E6B6B7F000
stack
page read and write
20925E28000
heap
page read and write
2D38BBD3000
heap
page read and write
2144DB06000
heap
page read and write
20925CD5000
heap
page read and write
19356094000
heap
page read and write
25E30444000
heap
page read and write
26C2442B000
heap
page read and write
2D38BAC0000
heap
page read and write
2D38BADC000
heap
page read and write
1904B292000
heap
page read and write
207CB7E4000
heap
page read and write
2D38BAC4000
heap
page read and write
20925CCF000
heap
page read and write
2144FB58000
heap
page read and write
25E303C9000
heap
page read and write
1904B2BB000
heap
page read and write
1935806E000
heap
page read and write
2D38BC84000
heap
page read and write
1904DAD0000
heap
page read and write
20923D59000
heap
page read and write
1904B29B000
heap
page read and write
1904DAFE000
heap
page read and write
1904B441000
heap
page read and write
E6B657E000
stack
page read and write
19357890000
heap
page read and write
26C260F0000
trusted library allocation
page read and write
1935800A000
heap
page read and write
20923CB0000
heap
page read and write
1904B393000
heap
page read and write
1904930A000
heap
page read and write
7FFB4AF53000
trusted library allocation
page read and write
1904B292000
heap
page read and write
1904B2A8000
heap
page read and write
19357F09000
heap
page read and write
2144FA72000
heap
page read and write
1904B399000
heap
page read and write
2144DAB9000
heap
page read and write
19357F00000
heap
page read and write
207CB7E2000
heap
page read and write
2D38BAF0000
heap
page read and write
27978046000
heap
page read and write
1904B29B000
heap
page read and write
25E3043D000
heap
page read and write
2144DA91000
heap
page read and write
2D38BAE6000
heap
page read and write
BA125FD000
stack
page read and write
1904B297000
heap
page read and write
7FFB4B050000
trusted library allocation
page execute and read and write
26C26255000
trusted library allocation
page read and write
1904B389000
heap
page read and write
2144DB03000
heap
page read and write
2D38BAFB000
heap
page read and write
1904B40F000
heap
page read and write
25E2E3AC000
heap
page read and write
19049302000
heap
page read and write
20925E81000
heap
page read and write
193560AC000
heap
page read and write
1904B292000
heap
page read and write
207CD655000
heap
page read and write
2D38E5B0000
heap
page read and write
120F000
heap
page read and write
CA0000
trusted library allocation
page read and write
1C121910000
heap
page read and write
6705EFC000
stack
page read and write
214522F0000
heap
page read and write
20925E91000
heap
page read and write
25E30490000
heap
page read and write
1904DFA0000
heap
page read and write
2797804A000
heap
page read and write
19049353000
heap
page read and write
193560A1000
heap
page read and write
25E302E6000
heap
page read and write
1BAFD000
stack
page read and write
20923D28000
heap
page read and write
1100000
heap
page read and write
11439FE000
stack
page read and write
1904B2A6000
heap
page read and write
2144FA64000
heap
page read and write
20923D5E000
heap
page read and write
2D38BAC8000
heap
page read and write
3B139FF000
stack
page read and write
20923D2D000
heap
page read and write
207CB804000
heap
page read and write
BA11FFE000
stack
page read and write
190492F8000
heap
page read and write
19049313000
heap
page read and write
20925CD9000
heap
page read and write
20925DCF000
heap
page read and write
1904ACAD000
heap
page read and write
207CD645000
heap
page read and write
7FFB4B0E0000
trusted library allocation
page read and write
7FFB4B160000
trusted library allocation
page read and write
207CB7F6000
heap
page read and write
2D38BC41000
heap
page read and write
214522FA000
heap
page read and write
C70000
trusted library allocation
page read and write
1BF3E000
stack
page read and write
2D38BC31000
heap
page read and write
20925DF4000
heap
page read and write
19357F20000
heap
page read and write
2144FA64000
heap
page read and write
7FFB4AF32000
trusted library allocation
page read and write
2D38BBE5000
heap
page read and write
19357F26000
heap
page read and write
20925835000
heap
page read and write
25E302E0000
heap
page read and write
25E2E3BD000
heap
page read and write
20925CE4000
heap
page read and write
19355FF0000
heap
page read and write
2144FA40000
heap
page read and write
E1290FC000
stack
page read and write
2D38BAF5000
heap
page read and write
19049337000
heap
page read and write
2144FA69000
heap
page read and write
2D38BAEB000
heap
page read and write
2144DAC1000
heap
page read and write
1904ACAE000
heap
page read and write
207CD65E000
heap
page read and write
20925CE4000
heap
page read and write
7FFB4AF6D000
trusted library allocation
page execute and read and write
2144FBC7000
heap
page read and write
2144FA6F000
heap
page read and write
207CD65E000
heap
page read and write
1904B2AE000
heap
page read and write
7FFB4B006000
trusted library allocation
page execute and read and write
2D38BBDC000
heap
page read and write
2144DACA000
heap
page read and write
2144FA69000
heap
page read and write
25E3045D000
heap
page read and write
2D38BBBF000
heap
page read and write
25E2E39D000
heap
page read and write
2144DAAB000
heap
page read and write
126B000
heap
page read and write
25E2E2E0000
heap
page read and write
1A740000
trusted library allocation
page read and write
1904B29B000
heap
page read and write
207CD659000
heap
page read and write
1904B297000
heap
page read and write
19357F00000
heap
page read and write
BB0000
unkown
page readonly
20923D43000
heap
page read and write
2144DAC5000
heap
page read and write
207CD64F000
heap
page read and write
E6B64FE000
stack
page read and write
20925CC5000
heap
page read and write
2D389B02000
heap
page read and write
1904B298000
heap
page read and write
1904ABD0000
heap
page read and write
26C260E1000
trusted library allocation
page read and write
193560C4000
heap
page read and write
207CB85F000
heap
page read and write
1B6B0000
heap
page read and write
20925CE0000
heap
page read and write
207CD659000
heap
page read and write
2144FBD4000
heap
page read and write
2D389B11000
heap
page read and write
26C241B0000
unkown
page readonly
20923D15000
heap
page read and write
2D389AF7000
heap
page read and write
25E2E3C8000
heap
page read and write
1B78E000
heap
page read and write
1C18A000
stack
page read and write
2144FC24000
heap
page read and write
2144DAC2000
heap
page read and write
67063FE000
stack
page read and write
7FFB4B154000
trusted library allocation
page read and write
207CD63E000
heap
page read and write
2144DAAC000
heap
page read and write
25E302D2000
heap
page read and write
25E302EA000
heap
page read and write
1904B297000
heap
page read and write
27977F80000
heap
page read and write
2D38BACD000
heap
page read and write
19357F34000
heap
page read and write
19356081000
heap
page read and write
19358011000
heap
page read and write
7FFB4AF4D000
trusted library allocation
page execute and read and write
207CB829000
heap
page read and write
207CB7FC000
heap
page read and write
1904B3B1000
heap
page read and write
1904B393000
heap
page read and write
25E2E400000
heap
page read and write
1904B3F2000
heap
page read and write
207D00AF000
heap
page read and write
27977FA0000
heap
page read and write
1904B28D000
heap
page read and write
193560D0000
heap
page read and write
19358078000
heap
page read and write
25E3045D000
heap
page read and write
1904B393000
heap
page read and write
1904B399000
heap
page read and write
25E2E395000
heap
page read and write
25E3043D000
heap
page read and write
1904DB05000
heap
page read and write
25E302D5000
heap
page read and write
25E302D8000
heap
page read and write
2144FB47000
heap
page read and write
207CD64F000
heap
page read and write
20925E91000
heap
page read and write
25E30444000
heap
page read and write
19049220000
heap
page read and write
970000
heap
page read and write
25E2E310000
heap
page read and write
5A429FB000
stack
page read and write
2144DA88000
heap
page read and write
1904B270000
heap
page read and write
2D38BAF0000
heap
page read and write
2D389AF9000
heap
page read and write
2D38BAEB000
heap
page read and write
207CD63C000
heap
page read and write
E6B667C000
stack
page read and write
2144FA69000
heap
page read and write
450000
unkown
page readonly
2144DAA2000
heap
page read and write
25E2E401000
heap
page read and write
1904B3B8000
heap
page read and write
1904DAD4000
heap
page read and write
2144FC24000
heap
page read and write
1904B3D0000
heap
page read and write
2D38BC9D000
heap
page read and write
19356089000
heap
page read and write
25E2E3BC000
heap
page read and write
2144FA64000
heap
page read and write
20925E32000
heap
page read and write
1935801B000
heap
page read and write
1904DAE0000
heap
page read and write
20925DC8000
heap
page read and write
25E303DD000
heap
page read and write
20923D5E000
heap
page read and write
25E30422000
heap
page read and write
2144FA6E000
heap
page read and write
21452660000
heap
page read and write
207CD72F000
heap
page read and write
7FFB4B0D0000
trusted library allocation
page read and write
C5B85A8000
stack
page read and write
25E302EA000
heap
page read and write
20923D76000
heap
page read and write
1904B2A8000
heap
page read and write
19049314000
heap
page read and write
214522F2000
heap
page read and write
25E2E3C0000
heap
page read and write
20925CCF000
heap
page read and write
25E302E0000
heap
page read and write
207CD7A3000
heap
page read and write
2144FA52000
heap
page read and write
207CB805000
heap
page read and write
2D38BAEB000
heap
page read and write
25E30466000
heap
page read and write
25E302D0000
heap
page read and write
1904930D000
heap
page read and write
25E302FA000
heap
page read and write
2D38BC42000
heap
page read and write
12718000
trusted library allocation
page read and write
19358077000
heap
page read and write
25E2E393000
heap
page read and write
20925DC6000
heap
page read and write
207CD645000
heap
page read and write
1904DAE7000
heap
page read and write
7FFB4B060000
trusted library allocation
page execute and read and write
193560AC000
heap
page read and write
193560ED000
heap
page read and write
207D00A0000
heap
page read and write
2D38BAF0000
heap
page read and write
25E2E3EA000
heap
page read and write
2144F51D000
heap
page read and write
20923D80000
heap
page read and write
2D38BAF1000
heap
page read and write
25E302EA000
heap
page read and write
1C23E000
stack
page read and write
20923D4F000
heap
page read and write
19356072000
heap
page read and write
25E302F4000
heap
page read and write
2144DAAB000
heap
page read and write
20925CD9000
heap
page read and write
1935800A000
heap
page read and write
1904B278000
heap
page read and write
20928A00000
heap
page read and write
25E30435000
heap
page read and write
1904DAE0000
heap
page read and write
2144FBE0000
heap
page read and write
207CD807000
heap
page read and write
2D38BBD8000
heap
page read and write
207CD64B000
heap
page read and write
207CD66A000
heap
page read and write
2D38BAF4000
heap
page read and write
2144FA43000
heap
page read and write
207CB837000
heap
page read and write
19355FB0000
heap
page read and write
1904B2A2000
heap
page read and write
27978365000
heap
page read and write
25E30493000
heap
page read and write
1904B2B3000
heap
page read and write
20923DAE000
heap
page read and write
25E2E3C9000
heap
page read and write
BA120FD000
stack
page read and write
25E302D2000
heap
page read and write
2D389B60000
heap
page read and write
207CD659000
heap
page read and write
5F0000
heap
page read and write
26C24330000
heap
page read and write
3B138FF000
stack
page read and write
207CD813000
heap
page read and write
2D38BAE2000
heap
page read and write
20925E4A000
heap
page read and write
D98D6FE000
unkown
page read and write
193580A4000
heap
page read and write
7FFB4AF33000
trusted library allocation
page execute and read and write
1904DAFF000
heap
page read and write
1143CFC000
stack
page read and write
19357F0F000
heap
page read and write
25E30490000
heap
page read and write
25E2E394000
heap
page read and write
2D38BC6C000
heap
page read and write
25E30490000
heap
page read and write
19049320000
heap
page read and write
2144FA60000
heap
page read and write
207CB812000
heap
page read and write
1C08C000
stack
page read and write
207CB826000
heap
page read and write
193560A0000
heap
page read and write
1935A98D000
heap
page read and write
2711000
trusted library allocation
page read and write
2144DABB000
heap
page read and write
20923D28000
heap
page read and write
190492D4000
heap
page read and write
214522F1000
heap
page read and write
26C261B2000
trusted library allocation
page read and write
214522FA000
heap
page read and write
D50000
heap
page read and write
25E30498000
heap
page read and write
207CD642000
heap
page read and write
20925CB9000
heap
page read and write
11E5000
heap
page read and write
25E2E3AA000
heap
page read and write
2144FB84000
heap
page read and write
3B1397E000
stack
page read and write
25E3046A000
heap
page read and write
20925CC5000
heap
page read and write
20925CD9000
heap
page read and write
2144FB52000
heap
page read and write
207CD7AF000
heap
page read and write
19356077000
heap
page read and write
20923D6C000
heap
page read and write
20925CD6000
heap
page read and write
20925CEA000
heap
page read and write
2144FA72000
heap
page read and write
19049311000
heap
page read and write
2D38BB03000
heap
page read and write
20923D2B000
heap
page read and write
E128D4E000
stack
page read and write
25E32D45000
heap
page read and write
7FFB4AFF0000
trusted library allocation
page execute and read and write
7DF4F9D51000
trusted library allocation
page execute read
2D38BAF4000
heap
page read and write
207CD659000
heap
page read and write
2D38BAE6000
heap
page read and write
2D38BCA1000
heap
page read and write
207CD807000
heap
page read and write
2D38BAF0000
heap
page read and write
20923D75000
heap
page read and write
193560BB000
heap
page read and write
207CD65E000
heap
page read and write
207CD64C000
heap
page read and write
1904B410000
heap
page read and write
207CB6E0000
heap
page read and write
1904B29B000
heap
page read and write
207CD645000
heap
page read and write
2144FA83000
heap
page read and write
9B2000
heap
page read and write
2144F51E000
heap
page read and write
1BF8F000
stack
page read and write
2144DAA5000
heap
page read and write
207CB818000
heap
page read and write
15A0000
trusted library allocation
page read and write
207CD73E000
heap
page read and write
26C26195000
trusted library allocation
page read and write
11A0000
heap
page read and write
25E302E0000
heap
page read and write
2D38BBD6000
heap
page read and write
2144FA6A000
heap
page read and write
207CD7A3000
heap
page read and write
2D38BBD6000
heap
page read and write
25E2E400000
heap
page read and write
2144FA40000
heap
page read and write
2D38BC6C000
heap
page read and write
2D38BC22000
heap
page read and write
1904D4B0000
trusted library allocation
page read and write
19357F2A000
heap
page read and write
1904B2B4000
heap
page read and write
25E32D48000
heap
page read and write
207CD7A8000
heap
page read and write
C5B8DFE000
stack
page read and write
25E30425000
heap
page read and write
193580DD000
heap
page read and write
1904B2A2000
heap
page read and write
2D38BAC6000
heap
page read and write
25E302CA000
heap
page read and write
1904B277000
heap
page read and write
193580CA000
heap
page read and write
2D38BAEB000
heap
page read and write
207D00AC000
heap
page read and write
19357F2A000
heap
page read and write
207CB84F000
heap
page read and write
27978360000
heap
page read and write
2D389AE4000
heap
page read and write
1904B270000
heap
page read and write
67061FF000
stack
page read and write
1904B274000
heap
page read and write
19357F34000
heap
page read and write
25E2E3A9000
heap
page read and write
7FFB4AF34000
trusted library allocation
page read and write
26C24730000
heap
page execute and read and write
2D38BC41000
heap
page read and write
2144FA44000
heap
page read and write
1904B389000
heap
page read and write
2144FB7C000
heap
page read and write
2D38BAEC000
heap
page read and write
2D38B555000
heap
page read and write
207CD64F000
heap
page read and write
207CD7AF000
heap
page read and write
25E303D4000
heap
page read and write
2D38BBDE000
heap
page read and write
26C24310000
heap
page read and write
2144DB0E000
heap
page read and write
26C3E91A000
heap
page read and write
25E2E3C3000
heap
page read and write
1904B2A2000
heap
page read and write
2D38BCAE000
heap
page read and write
214522DA000
heap
page read and write
2144FA8B000
heap
page read and write
26C3E8E0000
heap
page read and write
6705E7E000
stack
page read and write
2D38BC41000
heap
page read and write
207CD664000
heap
page read and write
1904B297000
heap
page read and write
1904B2A4000
heap
page read and write
C5B8CFB000
stack
page read and write
25E2E3C1000
heap
page read and write
20923D5E000
heap
page read and write
20923D7C000
heap
page read and write
1904934E000
heap
page read and write
7FFB4AF8C000
trusted library allocation
page execute and read and write
207D02F0000
heap
page read and write
26C360E1000
trusted library allocation
page read and write
26C243C0000
heap
page read and write
2144DAC9000
heap
page read and write
207CD645000
heap
page read and write
20923D71000
heap
page read and write
E6B66FE000
stack
page read and write
7FFB4AF44000
trusted library allocation
page read and write
BA126FD000
stack
page read and write
2D389B10000
heap
page read and write
1904B287000
heap
page read and write
7FFB4B026000
trusted library allocation
page execute and read and write
BA11EFF000
stack
page read and write
1904ACAB000
heap
page read and write
2144FA64000
heap
page read and write
1AC9D000
stack
page read and write
2D38BAE6000
heap
page read and write
25E303E1000
heap
page read and write
207CD72B000
heap
page read and write
207CB835000
heap
page read and write
2D38BBDA000
heap
page read and write
193580C7000
heap
page read and write
7FFB4AFF6000
trusted library allocation
page read and write
207CD15E000
heap
page read and write
207CD655000
heap
page read and write
2144FA7C000
heap
page read and write
2144FA6E000
heap
page read and write
2D38BAF5000
heap
page read and write
2D389AF7000
heap
page read and write
7DF475A21000
trusted library allocation
page execute read
214522D0000
heap
page read and write
1935801F000
heap
page read and write
1904B443000
heap
page read and write
20925CD9000
heap
page read and write
25E30435000
heap
page read and write
19358000000
heap
page read and write
1B9E5000
stack
page read and write
2144DB03000
heap
page read and write
20923D43000
heap
page read and write
19357F2A000
heap
page read and write
1B728000
heap
page read and write
2D38BBDC000
heap
page read and write
20925CC5000
heap
page read and write
20925E91000
heap
page read and write
2144DAC5000
heap
page read and write
1904B2B3000
heap
page read and write
26C261A7000
trusted library allocation
page read and write
7FFB4AF7C000
trusted library allocation
page execute and read and write
19049319000
heap
page read and write
C5B8AFB000
stack
page read and write
193580E2000
heap
page read and write
2D38BBD3000
heap
page read and write
1935801F000
heap
page read and write
20925E86000
heap
page read and write
25E2E3F6000
heap
page read and write
1904B27B000
heap
page read and write
20925E32000
heap
page read and write
2144FA76000
heap
page read and write
19357F2A000
heap
page read and write
20925E49000
heap
page read and write
2D389B1C000
heap
page read and write
19358011000
heap
page read and write
1904B2A2000
heap
page read and write
2D38BB00000
heap
page read and write
7FFB4AF4D000
trusted library allocation
page execute and read and write
207CD659000
heap
page read and write
26C24400000
heap
page read and write
1904B3CF000
heap
page read and write
11438FE000
stack
page read and write
1904B399000
heap
page read and write
1904B2A7000
heap
page read and write
2144FB73000
heap
page read and write
25E30479000
heap
page read and write
7FFB4AFF0000
trusted library allocation
page read and write
2144FA6E000
heap
page read and write
1904ACAA000
heap
page read and write
207CD73A000
heap
page read and write
25E3048B000
heap
page read and write
A2E000
heap
page read and write
7FFB4AF5B000
trusted library allocation
page execute and read and write
2092583A000
heap
page read and write
2D389B3E000
heap
page read and write
1904DAFA000
heap
page read and write
159E000
stack
page read and write
7FFB4AF24000
trusted library allocation
page read and write
20925CCF000
heap
page read and write
193560DC000
heap
page read and write
7FFB4AF54000
trusted library allocation
page read and write
2144FA5E000
heap
page read and write
1904B2A7000
heap
page read and write
7FFB4AFDC000
trusted library allocation
page execute and read and write
19357F15000
heap
page read and write
26C2618A000
trusted library allocation
page read and write
2D38BAFB000
heap
page read and write
2144DABE000
heap
page read and write
7FFB4AF40000
trusted library allocation
page read and write
25E30444000
heap
page read and write
2144DA91000
heap
page read and write
19049312000
heap
page read and write
20925839000
heap
page read and write
11CF000
heap
page read and write
25E2E3A1000
heap
page read and write
207CD656000
heap
page read and write
2144FA73000
heap
page read and write
207CD631000
heap
page read and write
D98D679000
stack
page read and write
1904B286000
heap
page read and write
207CD720000
heap
page read and write
E6B697C000
stack
page read and write
2D38B55E000
heap
page read and write
19049338000
heap
page read and write
25E304A8000
heap
page read and write
2D38BCAE000
heap
page read and write
1904B2B2000
heap
page read and write
1935806E000
heap
page read and write
207CD792000
heap
page read and write
20923D05000
heap
page read and write
1904B380000
heap
page read and write
2D38BBF3000
heap
page read and write
207CD65B000
heap
page read and write
207CD652000
heap
page read and write
25E3048C000
heap
page read and write
207CD7D5000
heap
page read and write
2D38BCA3000
heap
page read and write
1904B29B000
heap
page read and write
25E30493000
heap
page read and write
E12917E000
stack
page read and write
19357F2A000
heap
page read and write
25E302D7000
heap
page read and write
2D38BAF5000
heap
page read and write
2D38BC06000
heap
page read and write
2D389AED000
heap
page read and write
207CB826000
heap
page read and write
207D00B4000
heap
page read and write
20925CDA000
heap
page read and write
2144FB84000
heap
page read and write
7FFB4AF43000
trusted library allocation
page execute and read and write
26C2626F000
trusted library allocation
page read and write
2144FA7C000
heap
page read and write
2D389B02000
heap
page read and write
207CB7D8000
heap
page read and write
214522EE000
heap
page read and write
193560A8000
heap
page read and write
2144F6E0000
heap
page read and write
2144DA83000
heap
page read and write
7FFB4AF5D000
trusted library allocation
page execute and read and write
1020000
heap
page read and write
2D38BAF4000
heap
page read and write
1904B2B1000
heap
page read and write
2D38BC6A000
heap
page read and write
1BC48000
heap
page read and write
20925E4B000
heap
page read and write
20925E91000
heap
page read and write
C90000
unkown
page readonly
207CB83E000
heap
page read and write
26C360ED000
trusted library allocation
page read and write
1904B378000
heap
page read and write
25E32D49000
heap
page read and write
2144FC13000
heap
page read and write
207CD63A000
heap
page read and write
25E2FE7D000
heap
page read and write
2D38BAE6000
heap
page read and write
2144FA7F000
heap
page read and write
2D38B55D000
heap
page read and write
1904B441000
heap
page read and write
207CD7E9000
heap
page read and write
7FFB4B170000
trusted library allocation
page read and write
2144F510000
heap
page read and write
25E2E40D000
heap
page read and write
25E2FE79000
heap
page read and write
BA127FF000
stack
page read and write
1140000
heap
page read and write
1904B3BD000
heap
page read and write
7FFB4B0F0000
trusted library allocation
page read and write
2D389A8F000
heap
page read and write
25E2E3AD000
heap
page read and write
20925CDE000
heap
page read and write
1904B2A2000
heap
page read and write
25E302E0000
heap
page read and write
207CD7A3000
heap
page read and write
207CD7AF000
heap
page read and write
193560A8000
heap
page read and write
1904B385000
heap
page read and write
1935806E000
heap
page read and write
7FFB4B016000
trusted library allocation
page execute and read and write
BA12AFD000
stack
page read and write
19357F20000
heap
page read and write
25E2E3DB000
heap
page read and write
1935609C000
heap
page read and write
2D38BC98000
heap
page read and write
20925E49000
heap
page read and write
19049338000
heap
page read and write
5A423DE000
stack
page read and write
25E303D4000
heap
page read and write
2D38BACA000
heap
page read and write
1C121A10000
heap
page read and write
2144FB4B000
heap
page read and write
25E30435000
heap
page read and write
1904B393000
heap
page read and write
20925DD0000
heap
page read and write
1904B2AC000
heap
page read and write
207D00AF000
heap
page read and write
25E302D5000
heap
page read and write
2D389B4E000
heap
page read and write
25E302EF000
heap
page read and write
1935A140000
trusted library allocation
page read and write
2144FA7C000
heap
page read and write
1904B399000
heap
page read and write
20923D5E000
heap
page read and write
207CD807000
heap
page read and write
1143A7C000
stack
page read and write
2D38BAD5000
heap
page read and write
207CD740000
heap
page read and write
207CD736000
heap
page read and write
1BC4F000
heap
page read and write
207CD651000
heap
page read and write
25E302CF000
heap
page read and write
2144FB40000
heap
page read and write
25E302E6000
heap
page read and write
2D389AEA000
heap
page read and write
1935608E000
heap
page read and write
2D38BC96000
heap
page read and write
20925DE7000
heap
page read and write
207CB806000
heap
page read and write
25E302B0000
heap
page read and write
2144FA79000
heap
page read and write
25E30498000
heap
page read and write
20925CE4000
heap
page read and write
2D389B3A000
heap
page read and write
2144FA72000
heap
page read and write
1620000
heap
page execute and read and write
2144FB30000
heap
page read and write
2D38BAEB000
heap
page read and write
1904B3B1000
heap
page read and write
2144FA51000
heap
page read and write
2D389AF9000
heap
page read and write
19356083000
heap
page read and write
25E302EA000
heap
page read and write
1904B27E000
heap
page read and write
207CD758000
heap
page read and write
20925CD5000
heap
page read and write
2144FA5B000
heap
page read and write
207CD648000
heap
page read and write
2144FB49000
heap
page read and write
2D38BAEB000
heap
page read and write
214522FA000
heap
page read and write
12711000
trusted library allocation
page read and write
25E30473000
heap
page read and write
25E0000
heap
page read and write
2D38BAE6000
heap
page read and write
15C0000
trusted library allocation
page read and write
25E30498000
heap
page read and write
20925CC2000
heap
page read and write
1904B27F000
heap
page read and write
1904B431000
heap
page read and write
1935801F000
heap
page read and write
7FFB4AFEC000
trusted library allocation
page execute and read and write
25E30444000
heap
page read and write
207CD659000
heap
page read and write
BA122FE000
stack
page read and write
20925DC0000
heap
page read and write
20923C90000
heap
page read and write
2D38BC3A000
heap
page read and write
1B1A0000
heap
page read and write
2144FA66000
heap
page read and write
1BB30000
heap
page read and write
19049305000
heap
page read and write
1935A97C000
heap
page read and write
2144FB4D000
heap
page read and write
13098000
trusted library allocation
page read and write
1904B360000
heap
page read and write
20925DB8000
heap
page read and write
2D38BAE6000
heap
page read and write
207CD65A000
heap
page read and write
207CD7AF000
heap
page read and write
7FFB4B100000
trusted library allocation
page execute and read and write
207CB87E000
heap
page read and write
965000
heap
page read and write
2144DAC1000
heap
page read and write
7FFB4AF2D000
trusted library allocation
page execute and read and write
1904B399000
heap
page read and write
2D38BAF4000
heap
page read and write
207CD7C8000
heap
page read and write
2144FA69000
heap
page read and write
67062FB000
stack
page read and write
193580CA000
heap
page read and write
1904B2B3000
heap
page read and write
2144FA76000
heap
page read and write
19357FFA000
heap
page read and write
2D38BC02000
heap
page read and write
19357F0A000
heap
page read and write
25E2E3B0000
heap
page read and write
2D389B1F000
heap
page read and write
2144DA88000
heap
page read and write
207CD64B000
heap
page read and write
1935607B000
heap
page read and write
2D38BAD4000
heap
page read and write
2D389A50000
heap
page read and write
20923D35000
heap
page read and write
1904B414000
heap
page read and write
1904B414000
heap
page read and write
19358099000
heap
page read and write
1BE3E000
stack
page read and write
7FFB4AF30000
trusted library allocation
page read and write
19357F26000
heap
page read and write
207CD655000
heap
page read and write
2D389AFB000
heap
page read and write
2144DAAA000
heap
page read and write
20925CC2000
heap
page read and write
2D38BAF0000
heap
page read and write
20925E32000
heap
page read and write
26C247A5000
heap
page read and write
193560E9000
heap
page read and write
1904B3F6000
heap
page read and write
1904DADA000
heap
page read and write
20923D97000
heap
page read and write
207CD150000
heap
page read and write
2D38BAE6000
heap
page read and write
2D38BAC7000
heap
page read and write
2D38BBDA000
heap
page read and write
2144FBBF000
heap
page read and write
2D38BBDE000
heap
page read and write
20923D5D000
heap
page read and write
2D389B10000
heap
page read and write
20925E6B000
heap
page read and write
20925CDE000
heap
page read and write
2D389AEE000
heap
page read and write
19049333000
heap
page read and write
25E302EA000
heap
page read and write
2D38BAEB000
heap
page read and write
2D38BACB000
heap
page read and write
2D38BAFB000
heap
page read and write
207CD64B000
heap
page read and write
2144FB4D000
heap
page read and write
2D389B07000
heap
page read and write
20925CE4000
heap
page read and write
20925E68000
heap
page read and write
2144FA7C000
heap
page read and write
1904B284000
heap
page read and write
139E000
stack
page read and write
2144FA4A000
heap
page read and write
20925CC7000
heap
page read and write
25E2FE70000
heap
page read and write
2144FA5F000
heap
page read and write
20923D28000
heap
page read and write
190492F9000
heap
page read and write
E12907E000
stack
page read and write
20923D34000
heap
page read and write
149E000
stack
page read and write
19049356000
heap
page read and write
207CD758000
heap
page read and write
207CD666000
heap
page read and write
19358077000
heap
page read and write
1904B270000
heap
page read and write
7FFB4B0F0000
trusted library allocation
page execute and read and write
25E302F4000
heap
page read and write
12721000
trusted library allocation
page read and write
193560AB000
heap
page read and write
25E302FA000
heap
page read and write
8D0000
heap
page read and write
207CD78E000
heap
page read and write
25E303EB000
heap
page read and write
26C2625D000
trusted library allocation
page read and write
2144FBD4000
heap
page read and write
2144DA83000
heap
page read and write
193560C1000
heap
page read and write
2D389AE4000
heap
page read and write
7FFB4AF50000
trusted library allocation
page read and write
2144DAF4000
heap
page read and write
1143D7B000
stack
page read and write
20925CBC000
heap
page read and write
25E30435000
heap
page read and write
1904DAFF000
heap
page read and write
1904B387000
heap
page read and write
19358089000
heap
page read and write
2144DAB2000
heap
page read and write
1904B280000
heap
page read and write
207CB808000
heap
page read and write
20925E28000
heap
page read and write
207CD7FB000
heap
page read and write
1C28C000
stack
page read and write
2D38BBF4000
heap
page read and write
20923D4E000
heap
page read and write
2144FC13000
heap
page read and write
1143E7E000
stack
page read and write
25E30466000
heap
page read and write
2144FBC7000
heap
page read and write
25E2E39A000
heap
page read and write
2D389AEA000
heap
page read and write
1904B293000
heap
page read and write
1904B40F000
heap
page read and write
20925E49000
heap
page read and write
2D38BADC000
heap
page read and write
207CD647000
heap
page read and write
7FFB4B0E6000
trusted library allocation
page read and write
7FFB4B040000
trusted library allocation
page execute and read and write
2144FB58000
heap
page read and write
2D38BADF000
heap
page read and write
19357F2A000
heap
page read and write
207CD647000
heap
page read and write
20923D8B000
heap
page read and write
2D38BBF3000
heap
page read and write
1904B40F000
heap
page read and write
1904B380000
heap
page read and write
11D7000
heap
page read and write
19357F10000
heap
page read and write
1904B374000
heap
page read and write
2D38BC8E000
heap
page read and write
2D38BADC000
heap
page read and write
2144DB05000
heap
page read and write
207CB780000
heap
page read and write
25E2E391000
heap
page read and write
25E302F4000
heap
page read and write
207CD655000
heap
page read and write
2D38B55E000
heap
page read and write
20925DC0000
heap
page read and write
7FFB4AF3D000
trusted library allocation
page execute and read and write
2D38BAE2000
heap
page read and write
1904B2BE000
heap
page read and write
190492FF000
heap
page read and write
19357930000
heap
page read and write
E128DCE000
stack
page read and write
C5B897E000
stack
page read and write
2D389B45000
heap
page read and write
19049260000
heap
page read and write
2144FA72000
heap
page read and write
25E3045D000
heap
page read and write
7FFB4AFE6000
trusted library allocation
page read and write
2144FBD4000
heap
page read and write
25E302EA000
heap
page read and write
1190000
heap
page read and write
20923D50000
heap
page read and write
1904931A000
heap
page read and write
19358020000
heap
page read and write
2144FC13000
heap
page read and write
26C261DF000
trusted library allocation
page read and write
20925DBC000
heap
page read and write
26C245A0000
trusted library allocation
page read and write
207CD73C000
heap
page read and write
2D38BC86000
heap
page read and write
C5B8A7E000
stack
page read and write
3B13A7E000
stack
page read and write
19355ED0000
heap
page read and write
2144F515000
heap
page read and write
19358036000
heap
page read and write
25E302D6000
heap
page read and write
2144DB0E000
heap
page read and write
20925CC5000
heap
page read and write
1904B40F000
heap
page read and write
2D389AEF000
heap
page read and write
2144FA5E000
heap
page read and write
2D38BC6A000
heap
page read and write
193580A4000
heap
page read and write
25E32500000
trusted library allocation
page read and write
1904B3F5000
heap
page read and write
114397F000
stack
page read and write
2144DAA0000
heap
page read and write
25E32D48000
heap
page read and write
2D38BBD4000
heap
page read and write
20925CB0000
heap
page read and write
2D38BAD5000
heap
page read and write
1C03F000
stack
page read and write
C90000
trusted library allocation
page read and write
25E2E364000
heap
page read and write
207CD15A000
heap
page read and write
26C2621D000
trusted library allocation
page read and write
1935607C000
heap
page read and write
25E30490000
heap
page read and write
2144FA72000
heap
page read and write
20925640000
heap
page read and write
25E302E0000
heap
page read and write
25E2E3A0000
heap
page read and write
2144FA7C000
heap
page read and write
20923C80000
heap
page read and write
2144DA86000
heap
page read and write
20923D46000
heap
page read and write
20925CDE000
heap
page read and write
1904B361000
heap
page read and write
1904B2B9000
heap
page read and write
25E3047C000
heap
page read and write
207CD7C3000
heap
page read and write
1904B3BD000
heap
page read and write
190492FF000
heap
page read and write
1904B292000
heap
page read and write
207CB844000
heap
page read and write
B6E000
stack
page read and write
2144FA83000
heap
page read and write
20925CE6000
heap
page read and write
2D38BACF000
heap
page read and write
BA124FE000
stack
page read and write
207CD749000
heap
page read and write
20923D70000
heap
page read and write
6705B4E000
stack
page read and write
19357F2B000
heap
page read and write
1904B28D000
heap
page read and write
2D38BC6A000
heap
page read and write
25E302EA000
heap
page read and write
25E3043D000
heap
page read and write
2D38BAFD000
heap
page read and write
2D38BAE2000
heap
page read and write
2D38BB00000
heap
page read and write
26C3E918000
heap
page read and write
1904B29B000
heap
page read and write
26C24300000
heap
page read and write
2144FA6F000
heap
page read and write
2D38BBF3000
heap
page read and write
308E000
stack
page read and write
193560EB000
heap
page read and write
11A6000
heap
page read and write
20925DC4000
heap
page read and write
26C263BA000
trusted library allocation
page read and write
13093000
trusted library allocation
page read and write
2144FA61000
heap
page read and write
A23000
heap
page read and write
207CD7AF000
heap
page read and write
20925DD0000
heap
page read and write
910000
heap
page read and write
1904B443000
heap
page read and write
2144FA6E000
heap
page read and write
20923D47000
heap
page read and write
19357F2A000
heap
page read and write
1904B3BD000
heap
page read and write
25E30498000
heap
page read and write
25E30466000
heap
page read and write
2144DB05000
heap
page read and write
2D38BC6A000
heap
page read and write
207CD647000
heap
page read and write
20925CCF000
heap
page read and write
6705FFB000
stack
page read and write
25E2E404000
heap
page read and write
2144DA90000
heap
page read and write
20925DC2000
heap
page read and write
1904FD12000
trusted library allocation
page read and write
207CD664000
heap
page read and write
2D38BBCE000
heap
page read and write
1904B28D000
heap
page read and write
20925CA0000
heap
page read and write
25E3047D000
heap
page read and write
1C290000
heap
page read and write
20923D61000
heap
page read and write
207CD742000
heap
page read and write
2D38BBD8000
heap
page read and write
BA129FE000
stack
page read and write
2144FA6E000
heap
page read and write
1BAEA000
stack
page read and write
6705BCE000
stack
page read and write
2144FA57000
heap
page read and write
190492F8000
heap
page read and write
1904B3B8000
heap
page read and write
207CB845000
heap
page read and write
1B784000
heap
page read and write
1904B2AD000
heap
page read and write
25E303D4000
heap
page read and write
2F20000
heap
page execute and read and write
25E303FF000
heap
page read and write
7FFB4B180000
trusted library allocation
page execute and read and write
C6E000
stack
page read and write
25E2E400000
heap
page read and write
1904B431000
heap
page read and write
1904DAF8000
heap
page read and write
25E2E38A000
heap
page read and write
7FF4358B0000
trusted library allocation
page execute and read and write
20925830000
heap
page read and write
193580A4000
heap
page read and write
20925DE6000
heap
page read and write
2D38BAF4000
heap
page read and write
207CD655000
heap
page read and write
2144FBD9000
heap
page read and write
207CF870000
trusted library allocation
page read and write
207CD63F000
heap
page read and write
2144DAFB000
heap
page read and write
27978040000
heap
page read and write
2D389B23000
heap
page read and write
2144DA8A000
heap
page read and write
19357F16000
heap
page read and write
207CD65E000
heap
page read and write
BB2000
unkown
page readonly
2144FB58000
heap
page read and write
207CD764000
heap
page read and write
25E3046A000
heap
page read and write
1904B28D000
heap
page read and write
25E303C5000
heap
page read and write
2D389AEA000
heap
page read and write
19357FF0000
heap
page read and write
2D38B4E0000
heap
page read and write
2B41CFF000
stack
page read and write
2144DA9E000
heap
page read and write
2144FC13000
heap
page read and write
114387D000
stack
page read and write
207CD7C3000
heap
page read and write
7FFB4AFD0000
trusted library allocation
page read and write
193580CA000
heap
page read and write
1904B276000
heap
page read and write
11E2000
heap
page read and write
1B140000
heap
page execute and read and write
207CD620000
heap
page read and write
1904ACAE000
heap
page read and write
190492B0000
heap
page read and write
There are 1844 hidden memdumps, click here to show them.