IOC Report
H-Output.exe

loading gif

Files

File Path
Type
Category
Malicious
H-Output.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\firefox.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\H-Output.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\firefox.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2gk1z1qe.pne.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2obfcjm1.y1z.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bogj55bi.3e2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gn0n1jdf.as5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gwwizq25.yrb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hvuzgciq.cx2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m4nxbm2o.sha.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mmwvmx1a.wbx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nx50ng1b.vae.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pabmcvnx.w40.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q5neqjnq.gho.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_shfyfakd.p2o.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_slxha2vy.p2w.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t34o4hkt.1vp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uzlfhclc.za4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_waj3bpaa.3j0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wlftl53q.o0j.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wzytpscm.dyw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x5usutq5.05g.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xvmcykht.tth.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp7F5.tmp.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped
There are 17 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\H-Output.exe
"C:\Users\user\Desktop\H-Output.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\firefox.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'firefox.exe'
malicious
C:\Users\user\AppData\Local\Temp\firefox.exe
C:\Users\user\AppData\Local\Temp\firefox.exe
malicious
C:\Users\user\AppData\Local\Temp\firefox.exe
C:\Users\user\AppData\Local\Temp\firefox.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\firefox.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'firefox.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Skype.exe'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp7F5.tmp.bat""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\timeout.exe
timeout 3
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
45.88.90.74
malicious
http://nuget.org/NuGet.exe
unknown
http://crl.m
unknown
http://crl.microso
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://ion=v4.5
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://www.micom/pkiops/Docs/ry.htm0
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
http://ip-api.com
unknown
https://contoso.com/Icon
unknown
http://crl.microsE63
unknown
http://www.microsoft.
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://crl.v
unknown
https://github.com/Pester/Pester
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://crl.micros
unknown
There are 14 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\H-Output_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
12E55000
trusted library allocation
page read and write
malicious
CC0000
trusted library section
page read and write
malicious
8D2000
unkown
page readonly
malicious
2611000
trusted library allocation
page read and write
malicious
31ED000
trusted library allocation
page read and write
7DF4BA930000
trusted library allocation
page execute and read and write
1180000
trusted library allocation
page read and write
13430580000
trusted library allocation
page read and write
22A19522000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
22A16999000
heap
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
7FFD9BBA0000
trusted library allocation
page read and write
147CDDD3000
heap
page read and write
1344258D000
trusted library allocation
page read and write
147E831F000
heap
page read and write
147D0C83000
trusted library allocation
page read and write
2B90000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
22A16A18000
heap
page read and write
147E8362000
heap
page read and write
F00000
trusted library allocation
page read and write
336D87B000
stack
page read and write
7FFD9BB70000
trusted library allocation
page read and write
3F4000
stack
page read and write
22A19E50000
trusted library allocation
page read and write
2B233B10000
heap
page read and write
F50000
heap
page read and write
F2D000
heap
page read and write
26794CE000
stack
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
7FFD9BAE0000
trusted library allocation
page read and write
25B0000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
147E7E6F000
heap
page read and write
3066000
trusted library allocation
page read and write
147D06A6000
trusted library allocation
page read and write
8D0000
unkown
page readonly
1344A64F000
heap
page read and write
336E2CD000
stack
page read and write
147DFAA1000
trusted library allocation
page read and write
7FFD9B782000
trusted library allocation
page read and write
22A288C6000
trusted library allocation
page read and write
2B219A20000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
147CDDD7000
heap
page read and write
2B21C055000
trusted library allocation
page read and write
2F3E000
trusted library allocation
page read and write
147E81F0000
heap
page read and write
13430598000
heap
page read and write
2B21C740000
trusted library allocation
page read and write
233ECDEB000
heap
page read and write
7FFD9BB20000
trusted library allocation
page read and write
23381217000
trusted library allocation
page read and write
26785FE000
stack
page read and write
233EAB59000
heap
page read and write
3251000
trusted library allocation
page read and write
233EC600000
heap
page read and write
134324C9000
trusted library allocation
page read and write
233ECC8B000
heap
page read and write
B98BDFB000
stack
page read and write
3087000
trusted library allocation
page read and write
233ECB9B000
heap
page read and write
540F7BE000
stack
page read and write
7FFD9BAE2000
trusted library allocation
page read and write
F85000
heap
page read and write
2F88000
trusted library allocation
page read and write
233ECD90000
heap
page read and write
7FFD9B942000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
3041000
trusted library allocation
page read and write
23390021000
trusted library allocation
page read and write
22A30AEA000
heap
page read and write
7FFD9BAF2000
trusted library allocation
page read and write
2F9D000
trusted library allocation
page read and write
11A0000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
1BAE2000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
2B233480000
trusted library allocation
page read and write
336D2F9000
stack
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1B5E0000
heap
page read and write
22A185C1000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
2F58000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
9A0000
heap
page read and write
13430770000
trusted library allocation
page read and write
134305EE000
heap
page read and write
2B233C1D000
heap
page read and write
D1CD70C000
stack
page read and write
2B21B440000
heap
page execute and read and write
D21000
heap
page read and write
12613000
trusted library allocation
page read and write
B98BB79000
stack
page read and write
32BC000
trusted library allocation
page read and write
22A19540000
trusted library allocation
page read and write
7FFD9BB9C000
trusted library allocation
page read and write
2F6A000
trusted library allocation
page read and write
114F000
stack
page read and write
2B22B744000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
2678AFB000
stack
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
13433335000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
336CF9E000
stack
page read and write
7FFD9BA00000
trusted library allocation
page read and write
22A16B60000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
1344A5E8000
heap
page read and write
640000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
26781DE000
stack
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
D1CC93E000
stack
page read and write
3288000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
7FFD9B816000
trusted library allocation
page read and write
233ECBD7000
heap
page execute and read and write
3102000
trusted library allocation
page read and write
147D0BC7000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
3072000
trusted library allocation
page read and write
7FFD9BAD8000
trusted library allocation
page read and write
B98BD7E000
stack
page read and write
5410D4C000
stack
page read and write
1344A5F0000
heap
page read and write
F7D000
heap
page read and write
7FFD9BAE9000
trusted library allocation
page read and write
1343347A000
trusted library allocation
page read and write
7FFD9BAB9000
trusted library allocation
page read and write
316D000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
7FFD9BBD0000
trusted library allocation
page read and write
233EC4E5000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
7FFD9BACA000
trusted library allocation
page read and write
7FFD9B932000
trusted library allocation
page read and write
13442608000
trusted library allocation
page read and write
2B219A6C000
heap
page read and write
22A30A61000
heap
page read and write
22A18580000
trusted library allocation
page read and write
7FFD9B902000
trusted library allocation
page read and write
147CFA60000
heap
page execute and read and write
7FFD9B9A0000
trusted library allocation
page read and write
2B219A7E000
heap
page read and write
22A30EFA000
heap
page read and write
13432EA6000
trusted library allocation
page read and write
2866A5E2000
heap
page read and write
147D04F3000
trusted library allocation
page read and write
2B21B330000
trusted library section
page read and write
3056000
trusted library allocation
page read and write
23380F77000
trusted library allocation
page read and write
1BB4C000
heap
page read and write
2F52000
trusted library allocation
page read and write
147D187C000
trusted library allocation
page read and write
147E7F70000
heap
page read and write
D1CCA3A000
stack
page read and write
D1CCB3F000
stack
page read and write
1BAA5000
heap
page read and write
147CDDCF000
heap
page read and write
3222000
trusted library allocation
page read and write
147E7E8F000
heap
page read and write
2BD0000
heap
page read and write
2B22B451000
trusted library allocation
page read and write
1344A5E3000
heap
page read and write
336CF1F000
stack
page read and write
336D47E000
stack
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
7FFD9BA40000
trusted library allocation
page read and write
2B21C480000
trusted library allocation
page read and write
7FFD9B968000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
1B6EF000
stack
page read and write
13430540000
heap
page read and write
1BB65000
heap
page read and write
3329000
trusted library allocation
page read and write
1343301E000
trusted library allocation
page read and write
233ECBD0000
heap
page execute and read and write
2B219A66000
heap
page read and write
233ECF07000
heap
page read and write
30B5000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
2F8B000
trusted library allocation
page read and write
31E1000
trusted library allocation
page read and write
147CDE16000
heap
page read and write
23380C0F000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
D7A29FF000
unkown
page read and write
3158000
trusted library allocation
page read and write
233EAE70000
heap
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
134422C1000
trusted library allocation
page read and write
22A168F0000
heap
page read and write
323D000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
D1CCCBB000
stack
page read and write
31FF000
trusted library allocation
page read and write
300B000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
3155000
trusted library allocation
page read and write
1344A670000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
1B790000
heap
page execute and read and write
7FFD9B9C0000
trusted library allocation
page read and write
22A19D44000
trusted library allocation
page read and write
22A185B0000
heap
page read and write
755000
heap
page read and write
22A1979C000
trusted library allocation
page read and write
1B89E000
stack
page read and write
101F000
heap
page read and write
336D7FE000
stack
page read and write
26787F8000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
30C1000
trusted library allocation
page read and write
1343061B000
heap
page read and write
2B21C819000
trusted library allocation
page read and write
13433193000
trusted library allocation
page read and write
147D0DAF000
trusted library allocation
page read and write
7FFD9BAC3000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9BACC000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9B921000
trusted library allocation
page read and write
306C000
trusted library allocation
page read and write
23381E09000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
22A305CA000
heap
page read and write
2866A5F3000
heap
page read and write
147D18C1000
trusted library allocation
page read and write
13433B0B000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
22A19012000
trusted library allocation
page read and write
147E82AA000
heap
page read and write
333B000
trusted library allocation
page read and write
1344A7EC000
heap
page read and write
7FFD9B794000
trusted library allocation
page read and write
32D1000
trusted library allocation
page read and write
F56000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1344A83B000
heap
page read and write
2B219A28000
heap
page read and write
233ECB9F000
heap
page read and write
22A196E6000
trusted library allocation
page read and write
30C4000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
2AFE000
stack
page read and write
147D1223000
trusted library allocation
page read and write
D7A2AFF000
stack
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
D1CCC3F000
stack
page read and write
303C000
trusted library allocation
page read and write
2FE5000
trusted library allocation
page read and write
22A1A3C3000
trusted library allocation
page read and write
26786FE000
stack
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
7FFD9B960000
trusted library allocation
page read and write
2F91000
trusted library allocation
page read and write
22A16B20000
heap
page read and write
313D000
trusted library allocation
page read and write
54100FB000
stack
page read and write
326A000
trusted library allocation
page read and write
F5C000
heap
page read and write
9C0000
heap
page read and write
3024000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page execute and read and write
2FD6000
trusted library allocation
page read and write
22A1953C000
trusted library allocation
page read and write
2B219A44000
heap
page read and write
147CE020000
trusted library allocation
page read and write
2866A5E0000
heap
page read and write
147D18A1000
trusted library allocation
page read and write
7DF4349C0000
trusted library allocation
page execute and read and write
3053000
trusted library allocation
page read and write
1344259C000
trusted library allocation
page read and write
1C27C000
stack
page read and write
2E29000
trusted library allocation
page read and write
317F000
trusted library allocation
page read and write
336D6FE000
stack
page read and write
12618000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
1AF63000
heap
page read and write
7FFD9B794000
trusted library allocation
page read and write
233810F3000
trusted library allocation
page read and write
147CF8BB000
heap
page read and write
147CE000000
trusted library allocation
page read and write
2B21B451000
trusted library allocation
page read and write
13442314000
trusted library allocation
page read and write
7FFD9BAB3000
trusted library allocation
page read and write
147E821B000
heap
page read and write
233ECF00000
heap
page read and write
320A000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
1344A700000
heap
page read and write
7FFD9BA8D000
trusted library allocation
page read and write
22A198CA000
trusted library allocation
page read and write
125E000
stack
page read and write
2B21C3C2000
trusted library allocation
page read and write
F8F000
heap
page read and write
2FD0000
trusted library allocation
page read and write
13433B32000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
233EAB4C000
heap
page read and write
540FAF9000
stack
page read and write
147CFCC9000
trusted library allocation
page read and write
22A285F1000
trusted library allocation
page read and write
147CDDEF000
heap
page read and write
2B233C8D000
heap
page read and write
30AE000
trusted library allocation
page read and write
22A16B90000
heap
page read and write
23FE000
stack
page read and write
233EAB6D000
heap
page read and write
5410C4D000
stack
page read and write
2FFA000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
12611000
trusted library allocation
page read and write
3029000
trusted library allocation
page read and write
2866A7C0000
heap
page read and write
233ECFB0000
trusted library allocation
page read and write
2FA0000
trusted library allocation
page read and write
7FFD9B923000
trusted library allocation
page read and write
233ECAC0000
heap
page read and write
2B219A3E000
heap
page read and write
3108000
trusted library allocation
page read and write
22A18A8D000
trusted library allocation
page read and write
7DF4349D0000
trusted library allocation
page execute and read and write
3391000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
13430780000
heap
page readonly
233ECE72000
heap
page read and write
3078000
trusted library allocation
page read and write
2866A890000
heap
page read and write
F55000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
2B21B310000
heap
page read and write
540FB7F000
stack
page read and write
3264000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
23390001000
trusted library allocation
page read and write
2B22B75E000
trusted library allocation
page read and write
2678A7E000
stack
page read and write
2866A5F1000
heap
page read and write
2B21C50F000
trusted library allocation
page read and write
336D4F9000
stack
page read and write
23381958000
trusted library allocation
page read and write
30BB000
trusted library allocation
page read and write
336E54E000
stack
page read and write
13432290000
heap
page execute and read and write
7FFD9B974000
trusted library allocation
page read and write
22A30AF0000
heap
page read and write
2B233A3E000
heap
page read and write
233EAAB0000
heap
page read and write
B98BAF9000
stack
page read and write
304D000
trusted library allocation
page read and write
32B2000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
22A191C4000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
7FFD9BA70000
trusted library allocation
page read and write
147E8330000
heap
page read and write
7FFD9B846000
trusted library allocation
page read and write
147CFA80000
trusted library allocation
page read and write
31D3000
trusted library allocation
page read and write
13432050000
heap
page execute and read and write
3362000
trusted library allocation
page read and write
2FDF000
trusted library allocation
page read and write
22A16B50000
trusted library section
page read and write
23380088000
trusted library allocation
page read and write
22A19537000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
F10000
heap
page read and write
147D0BD3000
trusted library allocation
page read and write
233818F9000
trusted library allocation
page read and write
1210000
heap
page execute and read and write
7FFD9B78B000
trusted library allocation
page read and write
6347CFF000
stack
page read and write
1AF50000
heap
page execute and read and write
147E826F000
heap
page read and write
233ECEE1000
heap
page read and write
7FFD9BAD4000
trusted library allocation
page read and write
233ECC92000
heap
page read and write
3173000
trusted library allocation
page read and write
23381E29000
trusted library allocation
page read and write
7FFD9B7AB000
trusted library allocation
page execute and read and write
22A16BC0000
heap
page execute and read and write
324B000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
7FFD9BB90000
trusted library allocation
page read and write
B98B3DF000
stack
page read and write
3011000
trusted library allocation
page read and write
2B233FD0000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
233EC520000
heap
page readonly
147CE010000
heap
page readonly
7FFD9BBF0000
trusted library allocation
page read and write
1BB22000
heap
page read and write
8E3000
trusted library allocation
page read and write
2B233940000
heap
page execute and read and write
134422D1000
trusted library allocation
page read and write
1BAE8000
heap
page read and write
2B21CDAA000
trusted library allocation
page read and write
12C08000
trusted library allocation
page read and write
1BB3B000
heap
page read and write
13433F5C000
trusted library allocation
page read and write
22A30A10000
heap
page read and write
2B233E10000
trusted library allocation
page read and write
22A16993000
heap
page read and write
CE0000
heap
page read and write
2F7C000
trusted library allocation
page read and write
7FFD9B793000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
3161000
trusted library allocation
page read and write
23380F6A000
trusted library allocation
page read and write
2F9A000
trusted library allocation
page read and write
32DD000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
22A16910000
heap
page read and write
233EABFE000
heap
page read and write
7FFD9B77B000
trusted library allocation
page read and write
22A16C15000
heap
page read and write
5410ACE000
stack
page read and write
147DFD8C000
trusted library allocation
page read and write
23381036000
trusted library allocation
page read and write
2B233D51000
heap
page read and write
22A30B3D000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7DF4349E0000
trusted library allocation
page execute and read and write
7FFD9B9B0000
trusted library allocation
page read and write
2600000
heap
page execute and read and write
D1CC9B7000
stack
page read and write
30C7000
trusted library allocation
page read and write
1BB32000
heap
page read and write
1BB5C000
heap
page read and write
2F8E000
trusted library allocation
page read and write
31A6000
trusted library allocation
page read and write
22A19E29000
trusted library allocation
page read and write
22A288AC000
trusted library allocation
page read and write
2866A5BA000
heap
page read and write
13430835000
heap
page read and write
1344A851000
heap
page read and write
147CE070000
heap
page execute and read and write
7FFD9B866000
trusted library allocation
page execute and read and write
147D13F0000
trusted library allocation
page read and write
22A30EE7000
heap
page read and write
23381254000
trusted library allocation
page read and write
7FFD9BB6E000
trusted library allocation
page read and write
1C298000
heap
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
32BF000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
7DF42B3D0000
trusted library allocation
page execute and read and write
233902F5000
trusted library allocation
page read and write
2B21B390000
trusted library allocation
page read and write
12DE1000
trusted library allocation
page read and write
22A169D8000
heap
page read and write
3326000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
302F000
trusted library allocation
page read and write
233EC4C0000
trusted library section
page read and write
540FF7E000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
23380F6E000
trusted library allocation
page read and write
1220000
heap
page read and write
147E8329000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
B98C947000
stack
page read and write
1343276D000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
31F3000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
233EAAE0000
heap
page read and write
7FFD9B978000
trusted library allocation
page read and write
2B21C7DD000
trusted library allocation
page read and write
7FFD9BAA3000
trusted library allocation
page read and write
2F33000
trusted library allocation
page read and write
30F6000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
22A30B55000
heap
page read and write
336D37E000
stack
page read and write
1C29C000
heap
page read and write
22A169AF000
heap
page read and write
13432056000
heap
page execute and read and write
3350000
trusted library allocation
page read and write
2F64000
trusted library allocation
page read and write
5410B4A000
stack
page read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
B98B6FD000
stack
page read and write
1344ABC0000
heap
page read and write
13432280000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
319A000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9BA7C000
trusted library allocation
page read and write
1B165000
stack
page read and write
134422B1000
trusted library allocation
page read and write
13430790000
trusted library allocation
page read and write
22A288AE000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page read and write
7FFD9B942000
trusted library allocation
page read and write
233EC4A0000
heap
page read and write
7FFD9B783000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
23381E2E000
trusted library allocation
page read and write
336E24E000
stack
page read and write
2FD9000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
233EAAC0000
heap
page read and write
7FFD9BA1D000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
D7A28FB000
stack
page read and write
1CD62288000
heap
page read and write
2B219A5E000
heap
page read and write
850000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
3302000
trusted library allocation
page read and write
26796CC000
stack
page read and write
7FFD9BB70000
trusted library allocation
page read and write
13432110000
heap
page read and write
2FF1000
trusted library allocation
page read and write
2B233D39000
heap
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
7FFD9B840000
trusted library allocation
page execute and read and write
22A169DC000
heap
page read and write
147E7E71000
heap
page read and write
2420000
heap
page read and write
7FFD9B79B000
trusted library allocation
page read and write
7FFD9B948000
trusted library allocation
page read and write
147E833A000
heap
page read and write
F30000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
22A1698F000
heap
page read and write
7FFD9BBD9000
trusted library allocation
page read and write
3149000
trusted library allocation
page read and write
F20000
heap
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
1B067000
stack
page read and write
D41000
heap
page read and write
233902F0000
trusted library allocation
page read and write
23381346000
trusted library allocation
page read and write
1343407F000
trusted library allocation
page read and write
1BB1E000
heap
page read and write
22A19683000
trusted library allocation
page read and write
2338178A000
trusted library allocation
page read and write
233EAE75000
heap
page read and write
147D0AD7000
trusted library allocation
page read and write
147E7E8A000
heap
page read and write
1BB83000
heap
page read and write
540F6B3000
stack
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
2DE1000
trusted library allocation
page read and write
310B000
trusted library allocation
page read and write
F30000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
7FFD9BBB6000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
7FFD9BBB6000
trusted library allocation
page read and write
147E8350000
heap
page read and write
2F16000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
7FFD9BAF8000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
2B219AA7000
heap
page read and write
3210000
trusted library allocation
page read and write
134305D6000
heap
page read and write
1BB7C000
heap
page read and write
7DF451530000
trusted library allocation
page execute and read and write
23381870000
trusted library allocation
page read and write
1BA9A000
stack
page read and write
7FFD9B954000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
7FFD9BA30000
trusted library allocation
page read and write
2866A6C0000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
540FA7E000
stack
page read and write
540FDF8000
stack
page read and write
233EAB55000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
1B99E000
stack
page read and write
2FC4000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
328B000
trusted library allocation
page read and write
2FC7000
trusted library allocation
page read and write
7FFD9B77B000
trusted library allocation
page read and write
D1CC3EE000
stack
page read and write
7FFD9BAC2000
trusted library allocation
page read and write
8E0000
trusted library allocation
page read and write
23390077000
trusted library allocation
page read and write
2B21C668000
trusted library allocation
page read and write
30EA000
trusted library allocation
page read and write
2B219A62000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B792000
trusted library allocation
page read and write
1C0DD000
stack
page read and write
22A30A5B000
heap
page read and write
2678677000
stack
page read and write
22A30ABC000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
7FFD9B920000
trusted library allocation
page read and write
13433243000
trusted library allocation
page read and write
233ECEA0000
heap
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
233EC4E0000
heap
page read and write
22A19657000
trusted library allocation
page read and write
7FFD9B902000
trusted library allocation
page read and write
32C5000
trusted library allocation
page read and write
1344A842000
heap
page read and write
7FFD9B772000
trusted library allocation
page read and write
13430800000
trusted library allocation
page read and write
336E3C7000
stack
page read and write
2B21CD9E000
trusted library allocation
page read and write
147D0AAB000
trusted library allocation
page read and write
147E81E0000
heap
page read and write
1AA8D000
stack
page read and write
337D000
trusted library allocation
page read and write
7FFD9BAC2000
trusted library allocation
page read and write
1BB9E000
stack
page read and write
3114000
trusted library allocation
page read and write
147CDD90000
heap
page read and write
22A30E31000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9BAE4000
trusted library allocation
page read and write
1BB48000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1B400000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page execute and read and write
2B21D26F000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
2F5E000
trusted library allocation
page read and write
22A30DA0000
heap
page read and write
1355000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
147D0E69000
trusted library allocation
page read and write
7FFD9B944000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
22A16BB0000
trusted library allocation
page read and write
3075000
trusted library allocation
page read and write
233EAB10000
heap
page read and write
147DFCEF000
trusted library allocation
page read and write
3179000
trusted library allocation
page read and write
2B21B380000
heap
page read and write
2DD0000
heap
page execute and read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
233ECEB3000
heap
page read and write
22A16950000
heap
page read and write
2F76000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
147DFD88000
trusted library allocation
page read and write
7FFD9B91A000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
13433549000
trusted library allocation
page read and write
2B21C460000
trusted library allocation
page read and write
5410D4E000
stack
page read and write
1B18E000
stack
page read and write
7FFD9B916000
trusted library allocation
page read and write
13432220000
heap
page execute and read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
22A191CD000
trusted library allocation
page read and write
22A1A3E3000
trusted library allocation
page read and write
23380D7B000
trusted library allocation
page read and write
2B219A6A000
heap
page read and write
147CFAB2000
trusted library allocation
page read and write
D1CD88C000
stack
page read and write
2B2334C8000
heap
page read and write
D6E000
heap
page read and write
23380A52000
trusted library allocation
page read and write
30B2000
trusted library allocation
page read and write
3285000
trusted library allocation
page read and write
2B233BF0000
heap
page read and write
3204000
trusted library allocation
page read and write
7FFD9B91A000
trusted library allocation
page read and write
1225000
heap
page read and write
233ECB0F000
heap
page read and write
339F000
trusted library allocation
page read and write
147CDD70000
heap
page read and write
22A1699D000
heap
page read and write
1BDDE000
stack
page read and write
3170000
trusted library allocation
page read and write
267897E000
stack
page read and write
147D0A33000
trusted library allocation
page read and write
13442740000
trusted library allocation
page read and write
12C01000
trusted library allocation
page read and write
7FFD9B911000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
30A8000
trusted library allocation
page read and write
2B233976000
heap
page execute and read and write
22A1A3E8000
trusted library allocation
page read and write
325E000
trusted library allocation
page read and write
134340C9000
trusted library allocation
page read and write
13433BF3000
trusted library allocation
page read and write
330E000
trusted library allocation
page read and write
22A191FD000
trusted library allocation
page read and write
2B21B67A000
trusted library allocation
page read and write
7DF42B3C0000
trusted library allocation
page execute and read and write
26788FB000
stack
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
22A30EDA000
heap
page read and write
2B233A6F000
heap
page read and write
22A19987000
trusted library allocation
page read and write
3314000
trusted library allocation
page read and write
2338130E000
trusted library allocation
page read and write
3231000
trusted library allocation
page read and write
7FFD9B772000
trusted library allocation
page read and write
2866A5F0000
heap
page read and write
32CB000
trusted library allocation
page read and write
13433A26000
trusted library allocation
page read and write
267819E000
stack
page read and write
7FFD9B91A000
trusted library allocation
page read and write
1BEDE000
stack
page read and write
2B219AA5000
heap
page read and write
2866A880000
heap
page read and write
336E4CC000
stack
page read and write
7FFD9B911000
trusted library allocation
page read and write
B98B9FD000
stack
page read and write
147D0BC3000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
22A19B7A000
trusted library allocation
page read and write
22A30E9E000
heap
page read and write
F25000
heap
page read and write
990000
heap
page read and write
233ECFD0000
heap
page read and write
D1CC77E000
stack
page read and write
7FFD9BA60000
trusted library allocation
page read and write
22A1A39E000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
233ECED1000
heap
page read and write
1AE10000
trusted library allocation
page read and write
7FFD9BBE6000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
31DA000
trusted library allocation
page read and write
1BB3F000
heap
page read and write
233EAB18000
heap
page read and write
2FC1000
trusted library allocation
page read and write
2B219A5B000
heap
page read and write
2FA6000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
2B233CA2000
heap
page read and write
233ECDA2000
heap
page read and write
32B8000
trusted library allocation
page read and write
3167000
trusted library allocation
page read and write
147CFA95000
heap
page read and write
2B219B65000
heap
page read and write
147E82F7000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
23380DE8000
trusted library allocation
page read and write
13430590000
heap
page read and write
336D57C000
stack
page read and write
D1CD90E000
stack
page read and write
2F38000
trusted library allocation
page read and write
233ECC8E000
heap
page read and write
336E34E000
stack
page read and write
2EA5000
trusted library allocation
page read and write
147E7F4C000
heap
page read and write
730000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
2F19000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
267974E000
stack
page read and write
147E834C000
heap
page read and write
7FFD9B944000
trusted library allocation
page read and write
22A16B80000
trusted library allocation
page read and write
7FFD9B93A000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
3176000
trusted library allocation
page read and write
1017000
heap
page read and write
2B80000
heap
page execute and read and write
920000
heap
page read and write
233ECB6A000
heap
page read and write
3135000
trusted library allocation
page read and write
22A16B40000
trusted library section
page read and write
B98BC7F000
stack
page read and write
D1CC87D000
stack
page read and write
2B233D6C000
heap
page read and write
3317000
trusted library allocation
page read and write
134335AC000
trusted library allocation
page read and write
7FFD9B762000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
D00000
heap
page read and write
D1CC8F8000
stack
page read and write
2B21C3C6000
trusted library allocation
page read and write
E10000
heap
page read and write
7FFD9B962000
trusted library allocation
page read and write
105F000
stack
page read and write
7FFD9BADC000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
EF0000
heap
page read and write
925000
heap
page read and write
233ECB0D000
heap
page read and write
22A30B30000
heap
page read and write
540FCF9000
stack
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
2B233C02000
heap
page read and write
2B2339F0000
heap
page read and write
22A1A0FC000
trusted library allocation
page read and write
D2C000
heap
page read and write
B98B7FF000
stack
page read and write
2B21C4E3000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
2B22B481000
trusted library allocation
page read and write
1B7FE000
stack
page read and write
F91000
heap
page read and write
2F82000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
541007E000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
11C0000
heap
page read and write
22A288B6000
trusted library allocation
page read and write
9E0000
heap
page read and write
31E7000
trusted library allocation
page read and write
7FFD9BAB9000
trusted library allocation
page read and write
22A187E9000
trusted library allocation
page read and write
22A285C1000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
309C000
trusted library allocation
page read and write
134422A1000
trusted library allocation
page read and write
2B21C3B1000
trusted library allocation
page read and write
2866A5F1000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
7FFD9B948000
trusted library allocation
page read and write
147DFAD1000
trusted library allocation
page read and write
8D0000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
1343231A000
trusted library allocation
page read and write
1B69B000
stack
page read and write
147CFB13000
trusted library allocation
page read and write
540FE7E000
stack
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
2B21C3CF000
trusted library allocation
page read and write
1C28F000
heap
page read and write
22A30AAE000
heap
page read and write
CF4000
stack
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
3047000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
D1CC36E000
stack
page read and write
D0C000
heap
page read and write
2B21C240000
trusted library allocation
page read and write
134332A5000
trusted library allocation
page read and write
30FC000
trusted library allocation
page read and write
147CDD60000
heap
page read and write
2B21B340000
trusted library allocation
page read and write
3017000
trusted library allocation
page read and write
7FFD9BAFC000
trusted library allocation
page read and write
540FEFE000
stack
page read and write
329D000
trusted library allocation
page read and write
12C05000
trusted library allocation
page read and write
1C280000
heap
page read and write
739000
heap
page read and write
7FFD9BAC8000
trusted library allocation
page read and write
22A19F11000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
1CD620B0000
heap
page read and write
2B233D46000
heap
page read and write
233EC4D0000
trusted library section
page read and write
2B22B74C000
trusted library allocation
page read and write
233ECE29000
heap
page read and write
D1CC7F7000
stack
page read and write
1C28B000
heap
page read and write
540F7FE000
stack
page read and write
22A19527000
trusted library allocation
page read and write
7FFD9B941000
trusted library allocation
page read and write
1B2E2000
heap
page read and write
3129000
trusted library allocation
page read and write
233EC61A000
heap
page read and write
310E000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
1344A626000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
147E8359000
heap
page read and write
147D132E000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
3213000
trusted library allocation
page read and write
540FFFC000
stack
page read and write
7FFD9B958000
trusted library allocation
page read and write
134334F0000
trusted library allocation
page read and write
132E000
stack
page read and write
7FFD9BB00000
trusted library allocation
page read and write
336CFDE000
stack
page read and write
233EAB51000
heap
page read and write
540FE78000
stack
page read and write
D44000
heap
page read and write
2FAC000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
13442592000
trusted library allocation
page read and write
13432CF2000
trusted library allocation
page read and write
2B233C10000
heap
page read and write
2B21C576000
trusted library allocation
page read and write
2679649000
stack
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1B6FD000
stack
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
7FFD9B770000
trusted library allocation
page read and write
233804CD000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
7FFD9BAE8000
trusted library allocation
page read and write
1344A7F2000
heap
page read and write
2B219B12000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
2B21C3BE000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
2FA3000
trusted library allocation
page read and write
2B21CCDD000
trusted library allocation
page read and write
2B22B471000
trusted library allocation
page read and write
22A185B5000
heap
page read and write
7DF455820000
trusted library allocation
page execute and read and write
321F000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
2B21D250000
trusted library allocation
page read and write
3182000
trusted library allocation
page read and write
13430500000
heap
page read and write
134305D8000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9BAB4000
trusted library allocation
page read and write
B98C9CC000
stack
page read and write
233811DE000
trusted library allocation
page read and write
2B21B370000
heap
page readonly
7FFD9B972000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
7FFD9BA00000
trusted library allocation
page read and write
233811AB000
trusted library allocation
page read and write
147DFD94000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
22A1952F000
trusted library allocation
page read and write
134322A1000
trusted library allocation
page read and write
22A19812000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
1CD62190000
heap
page read and write
32E0000
trusted library allocation
page read and write
2EA3000
trusted library allocation
page read and write
D1CD809000
stack
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
147D0B67000
trusted library allocation
page read and write
334A000
trusted library allocation
page read and write
1344A693000
heap
page read and write
7FFD9BB6C000
trusted library allocation
page read and write
1BB6A000
heap
page read and write
30D0000
trusted library allocation
page read and write
2BFF000
stack
page read and write
7FFD9BAC5000
trusted library allocation
page read and write
22A18500000
heap
page execute and read and write
23381038000
trusted library allocation
page read and write
2B22B4C7000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
243C000
heap
page read and write
B98B879000
stack
page read and write
233ECC85000
heap
page read and write
233810C1000
trusted library allocation
page read and write
147E8357000
heap
page read and write
134304E0000
heap
page read and write
3398000
trusted library allocation
page read and write
7FF4389C0000
trusted library allocation
page execute and read and write
7FFD9BA90000
trusted library allocation
page read and write
1344A844000
heap
page read and write
147CDD98000
heap
page read and write
B98C7CE000
stack
page read and write
2866A5E3000
heap
page read and write
2678112000
stack
page read and write
D1CC67E000
stack
page read and write
1344A919000
heap
page read and write
B98CA4E000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
2B219B50000
trusted library section
page read and write
7FFD9B960000
trusted library allocation
page read and write
1344A7E0000
heap
page read and write
147D1391000
trusted library allocation
page read and write
3307000
trusted library allocation
page read and write
7FFD9B922000
trusted library allocation
page read and write
2B21B3DA000
heap
page read and write
D1CC6FA000
stack
page read and write
134332D0000
trusted library allocation
page read and write
22A18646000
trusted library allocation
page read and write
267954C000
stack
page read and write
1344A8E2000
heap
page read and write
1343323D000
trusted library allocation
page read and write
1AECA000
stack
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
147CFA66000
heap
page execute and read and write
1344A8FA000
heap
page read and write
31F9000
trusted library allocation
page read and write
1B5CE000
stack
page read and write
147DFDA6000
trusted library allocation
page read and write
B98B8FE000
stack
page read and write
2B21D274000
trusted library allocation
page read and write
2B21B91D000
trusted library allocation
page read and write
7FFD9BA93000
trusted library allocation
page read and write
13430850000
heap
page read and write
2B219910000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
32A3000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9BAB4000
trusted library allocation
page read and write
13433245000
trusted library allocation
page read and write
2B21C432000
trusted library allocation
page read and write
540FD77000
stack
page read and write
267847E000
stack
page read and write
134340C4000
trusted library allocation
page read and write
233EC770000
heap
page execute and read and write
23381126000
trusted library allocation
page read and write
1344A926000
heap
page read and write
7FFD9BAC9000
trusted library allocation
page read and write
336D77E000
stack
page read and write
1344A924000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
2B233D17000
heap
page read and write
B98BBF9000
stack
page read and write
7FFD9BA20000
trusted library allocation
page read and write
134333C4000
trusted library allocation
page read and write
7FFD9B921000
trusted library allocation
page read and write
2B21C797000
trusted library allocation
page read and write
336D27E000
stack
page read and write
26784FE000
stack
page read and write
147E82E1000
heap
page read and write
1CD62240000
heap
page read and write
1261C000
trusted library allocation
page read and write
7DF451540000
trusted library allocation
page execute and read and write
233EC560000
trusted library allocation
page read and write
233EAB4F000
heap
page read and write
3093000
trusted library allocation
page read and write
147D06D3000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
7FFD9BBED000
trusted library allocation
page read and write
22A19533000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
13432FAC000
trusted library allocation
page read and write
2FB2000
trusted library allocation
page read and write
7FFD9B94A000
trusted library allocation
page read and write
1BB59000
heap
page read and write
2866A7A0000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
7FFD9BBBD000
trusted library allocation
page read and write
147CFF6D000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
2B219AAA000
heap
page read and write
320D000
trusted library allocation
page read and write
233813C9000
trusted library allocation
page read and write
233EC5A0000
trusted library allocation
page read and write
7FFD9BAD9000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
758000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
3270000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
23381095000
trusted library allocation
page read and write
332F000
trusted library allocation
page read and write
1344A8EC000
heap
page read and write
22A30DB0000
heap
page read and write
22A16997000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
147E8200000
heap
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
2B233970000
heap
page execute and read and write
7FFD9BA20000
trusted library allocation
page read and write
22A183F0000
trusted library allocation
page read and write
22A195F6000
trusted library allocation
page read and write
CE5000
heap
page read and write
2B22B74E000
trusted library allocation
page read and write
3005000
trusted library allocation
page read and write
147CFA90000
heap
page read and write
147CDE6F000
heap
page read and write
2B21B4CC000
trusted library allocation
page read and write
3117000
trusted library allocation
page read and write
76B000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
1B99E000
stack
page read and write
1CD62280000
heap
page read and write
147CDDDB000
heap
page read and write
2B21C6FD000
trusted library allocation
page read and write
2678878000
stack
page read and write
2866A5E0000
heap
page read and write
33A6000
trusted library allocation
page read and write
32AC000
trusted library allocation
page read and write
101A000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
FBD000
heap
page read and write
3282000
trusted library allocation
page read and write
12C03000
trusted library allocation
page read and write
233EAB95000
heap
page read and write
23380F62000
trusted library allocation
page read and write
1BB78000
heap
page read and write
2B21CCB6000
trusted library allocation
page read and write
D06000
heap
page read and write
336CE92000
stack
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
233ECD60000
heap
page execute and read and write
233EC4F0000
trusted library allocation
page read and write
2B233A47000
heap
page read and write
31FC000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
540FC7D000
stack
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
7FFD9BA60000
trusted library allocation
page read and write
A50000
unkown
page readonly
147E8326000
heap
page read and write
D1CCABA000
stack
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
22A285E1000
trusted library allocation
page read and write
7FFD9BAEC000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
3353000
trusted library allocation
page read and write
134305D4000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
2B22B740000
trusted library allocation
page read and write
DC5000
heap
page read and write
30A3000
trusted library allocation
page read and write
3035000
trusted library allocation
page read and write
B98BCFF000
stack
page read and write
22A288A7000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
D1CCBBE000
stack
page read and write
147CDFE0000
trusted library allocation
page read and write
2F24000
trusted library allocation
page read and write
1B2E4000
heap
page read and write
1BB71000
heap
page read and write
2FCD000
trusted library allocation
page read and write
233ECB46000
heap
page read and write
1B99E000
stack
page read and write
147CE0F0000
heap
page read and write
314F000
trusted library allocation
page read and write
3143000
trusted library allocation
page read and write
147CE100000
heap
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
B98BA77000
stack
page read and write
2B219B20000
heap
page read and write
540FBF7000
stack
page read and write
23381DE4000
trusted library allocation
page read and write
22A16958000
heap
page read and write
3320000
trusted library allocation
page read and write
315B000
trusted library allocation
page read and write
7FFD9BB8A000
trusted library allocation
page read and write
147D0813000
trusted library allocation
page read and write
31AC000
trusted library allocation
page read and write
331A000
trusted library allocation
page read and write
7FFD9BB8C000
trusted library allocation
page read and write
7FC000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
13433669000
trusted library allocation
page read and write
22A30DCC000
heap
page read and write
147CE105000
heap
page read and write
336D5F8000
stack
page read and write
75D000
heap
page read and write
8B0000
trusted library allocation
page read and write
3383000
trusted library allocation
page read and write
233EC510000
trusted library allocation
page read and write
2F44000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
1AF60000
heap
page read and write
6347C7C000
stack
page read and write
D1CD68E000
stack
page read and write
147D1308000
trusted library allocation
page read and write
FC0000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
2B219B60000
heap
page read and write
3356000
trusted library allocation
page read and write
2B21C1C7000
trusted library allocation
page read and write
3059000
trusted library allocation
page read and write
2678579000
stack
page read and write
2866A5B0000
heap
page read and write
2FD3000
trusted library allocation
page read and write
31B2000
trusted library allocation
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
2BE9000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
1B2A8000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
1261E000
trusted library allocation
page read and write
147DFB0F000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
115E000
stack
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
F50000
heap
page read and write
23380229000
trusted library allocation
page read and write
7FFD9BA93000
trusted library allocation
page read and write
147D0C0A000
trusted library allocation
page read and write
1343362B000
trusted library allocation
page read and write
327F000
trusted library allocation
page read and write
2B21C3B5000
trusted library allocation
page read and write
DF9000
heap
page read and write
2B233A2D000
heap
page read and write
7FFD9B816000
trusted library allocation
page read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
7FFD9B931000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
22A30E41000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
33AA000
trusted library allocation
page read and write
2C01000
trusted library allocation
page read and write
1BAA0000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
31DE000
trusted library allocation
page read and write
22A197D5000
trusted library allocation
page read and write
B98B77E000
stack
page read and write
147E82B1000
heap
page read and write
7FFD9B964000
trusted library allocation
page read and write
2B233CA7000
heap
page read and write
1BAA2000
heap
page read and write
7FFD9B92A000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9BAC4000
trusted library allocation
page read and write
7FFD9BAC8000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
335C000
trusted library allocation
page read and write
22A168E0000
heap
page read and write
2B219A60000
heap
page read and write
870000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
76D000
heap
page read and write
2B21C545000
trusted library allocation
page read and write
3323000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
147DFE47000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
3359000
trusted library allocation
page read and write
2678779000
stack
page read and write
22A18520000
heap
page execute and read and write
7FFD9B840000
trusted library allocation
page read and write
D75000
heap
page read and write
7DF455810000
trusted library allocation
page execute and read and write
7FFD9BAD0000
trusted library allocation
page read and write
233EAB9B000
heap
page read and write
147E7EDE000
heap
page read and write
23380F7B000
trusted library allocation
page read and write
147E7E50000
heap
page read and write
7FFD9B7AB000
trusted library allocation
page read and write
1BB76000
heap
page read and write
147E824D000
heap
page read and write
12DED000
trusted library allocation
page read and write
147D0DE7000
trusted library allocation
page read and write
2866A5F1000
heap
page read and write
22A2862E000
trusted library allocation
page read and write
2B21C6A6000
trusted library allocation
page read and write
7FFD9B760000
trusted library allocation
page read and write
1BFDD000
stack
page read and write
22A30B47000
heap
page read and write
540F73E000
stack
page read and write
7FFD9BB63000
trusted library allocation
page read and write
327C000
trusted library allocation
page read and write
1B25C000
stack
page read and write
147DFD6B000
trusted library allocation
page read and write
26795CE000
stack
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
22A30A3B000
heap
page read and write
5410CCC000
stack
page read and write
2B233A20000
heap
page read and write
798000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
2F94000
trusted library allocation
page read and write
22A1952B000
trusted library allocation
page read and write
13430855000
heap
page read and write
2B21B3D0000
heap
page read and write
13433361000
trusted library allocation
page read and write
2B21D22A000
trusted library allocation
page read and write
3276000
trusted library allocation
page read and write
2FFF000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
134304D0000
heap
page read and write
830000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
233ECC80000
heap
page read and write
147D0B3B000
trusted library allocation
page read and write
336D3F9000
stack
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
1B89E000
stack
page read and write
1CD621D0000
heap
page read and write
23380001000
trusted library allocation
page read and write
7F9000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
3060000
trusted library allocation
page read and write
1BA9F000
stack
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
D1CD78E000
stack
page read and write
233812AC000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
23381896000
trusted library allocation
page read and write
7FFD9B921000
trusted library allocation
page read and write
D1CC2E3000
stack
page read and write
6347D7F000
stack
page read and write
2339030E000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
30BE000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page read and write
1344A91F000
heap
page read and write
147DFAC1000
trusted library allocation
page read and write
3258000
trusted library allocation
page read and write
134340A4000
trusted library allocation
page read and write
2B21C75F000
trusted library allocation
page read and write
32E6000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
2B233AD2000
heap
page read and write
7FFD9BB70000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
2866A5F1000
heap
page read and write
1344A5E0000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
1C47E000
stack
page read and write
22A16C10000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
B98C84C000
stack
page read and write
7FFD9BA40000
trusted library allocation
page read and write
147CFAA1000
trusted library allocation
page read and write
13432100000
heap
page read and write
22A18EF1000
trusted library allocation
page read and write
13442594000
trusted library allocation
page read and write
147CDF60000
heap
page read and write
2B21B3D5000
heap
page read and write
147DFAB0000
trusted library allocation
page read and write
2B21C3BA000
trusted library allocation
page read and write
B98B979000
stack
page read and write
134307C0000
trusted library allocation
page read and write
1BB02000
heap
page read and write
13430615000
heap
page read and write
336E44E000
stack
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
147CFA40000
heap
page execute and read and write
7FFD9BC10000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
2B233C15000
heap
page read and write
13430830000
heap
page read and write
2B22B746000
trusted library allocation
page read and write
1A640000
trusted library allocation
page read and write
2B21C05F000
trusted library allocation
page read and write
233902FE000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1B79F000
stack
page read and write
2B21CBD1000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9BACC000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
22A16BC7000
heap
page execute and read and write
22A16BA0000
heap
page readonly
12DF1000
trusted library allocation
page read and write
147D0BCB000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
B98C8CE000
stack
page read and write
2B233ADD000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
147D0A3B000
trusted library allocation
page read and write
32D7000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
2B2199F0000
heap
page read and write
147CE080000
trusted library allocation
page read and write
22A1986A000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
147CE0B0000
trusted library allocation
page read and write
134425AC000
trusted library allocation
page read and write
233ECEEB000
heap
page read and write
1BB62000
heap
page read and write
134305CE000
heap
page read and write
147DFD96000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
147D081C000
trusted library allocation
page read and write
2B21B360000
trusted library allocation
page read and write
2B21BEA2000
trusted library allocation
page read and write
23380F66000
trusted library allocation
page read and write
1343357A000
trusted library allocation
page read and write
1350000
heap
page read and write
1B270000
heap
page read and write
147E7EA9000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
1344A890000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
BC4000
stack
page read and write
147E7ECA000
heap
page read and write
147D0D4E000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
147CDDDD000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
B98B673000
stack
page read and write
7FFD9B760000
trusted library allocation
page read and write
D70000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
147CDFA0000
heap
page read and write
5410BC9000
stack
page read and write
23390031000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
2866A5F1000
heap
page read and write
7DF4BA920000
trusted library allocation
page execute and read and write
26789FE000
stack
page read and write
2F4A000
trusted library allocation
page read and write
147D18C6000
trusted library allocation
page read and write
7FFD9B952000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
2B21C20C000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
23380F73000
trusted library allocation
page read and write
1344A869000
heap
page read and write
233ECAC6000
heap
page read and write
1CD62245000
heap
page read and write
336D67E000
stack
page read and write
2B21C62F000
trusted library allocation
page read and write
There are 1430 hidden memdumps, click here to show them.