IOC Report
LFfjUMuUFU.exe

loading gif

Files

File Path
Type
Category
Malicious
LFfjUMuUFU.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmpB10A.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\1235.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\456.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\AAkXVY.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\1235.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\456.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AAkXVY.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\LFfjUMuUFU.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2by1qqhr.v2o.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2dpgkpne.mwu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aj0yfvw2.fxv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cpsiy2y2.cwq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ffh2uun2.mab.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gugt5cve.car.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hzfhgg3y.0od.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ii3qv5fm.mzo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jupybj1y.ffc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lfahsoru.goy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nuosarsu.pwf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oenvilbs.svw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q30yhu3j.y4r.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qaclka2h.azz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_raxl4rxb.cvp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s3qk5ezd.ejw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sycmqwvg.i2z.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tttu44pf.e0f.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uapxnnyf.zue.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_va0kevy1.y0a.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vnfbifjy.qzl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vqoumm42.idf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vwypdu52.oc3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zf1fewl2.ll4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpE9DD.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\AAkXVY.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LFfjUMuUFU.exe
"C:\Users\user\Desktop\LFfjUMuUFU.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\LFfjUMuUFU.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AAkXVY.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AAkXVY" /XML "C:\Users\user\AppData\Local\Temp\tmpB10A.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Users\user\AppData\Roaming\AAkXVY.exe
C:\Users\user\AppData\Roaming\AAkXVY.exe
malicious
C:\Users\user\AppData\Roaming\456.exe
"C:\Users\user\AppData\Roaming\456.exe"
malicious
C:\Users\user\AppData\Roaming\1235.exe
"C:\Users\user\AppData\Roaming\1235.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\1235.exe'
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AAkXVY" /XML "C:\Users\user\AppData\Local\Temp\tmpE9DD.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Users\user\AppData\Roaming\456.exe
"C:\Users\user\AppData\Roaming\456.exe"
malicious
C:\Users\user\AppData\Roaming\1235.exe
"C:\Users\user\AppData\Roaming\1235.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '1235.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 14 hidden processes, click here to show them.

URLs

Name
IP
Malicious
beshomandotestbesnd.run.place
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
45.61.150.201
malicious
127.0.0.1
malicious
http://tempuri.org/DataSetGen.xsd
unknown
http://nuget.org/NuGet.exe
unknown
http://crl.m
unknown
http://www.micrm/pki/certs/MicR_2010-06-23.crt0
unknown
https://api.telegram.org/bot
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
http://crl.micft.cMicRosof
unknown
https://aka.ms/pscore68
unknown
http://www.nirsoft.net/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
beshomandotestbesnd.run.place
45.88.186.125
malicious
bg.microsoft.map.fastly.net
199.232.210.172
api.telegram.org
149.154.167.220
fp2e7a.wpc.phicdn.net
192.229.211.108

IPs

IP
Domain
Country
Malicious
45.61.150.201
unknown
United States
malicious
127.0.0.1
unknown
unknown
malicious
45.88.186.125
beshomandotestbesnd.run.place
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\742D0701C511376451FD
648D1D9E4AE2F0DC8C47BA685FB1523F0B37AA06CE6AA7F4D08C04AD7F0B55D4

Memdumps

Base Address
Regiontype
Protect
Malicious
342F000
trusted library allocation
page read and write
malicious
E12000
unkown
page readonly
malicious
67F0000
trusted library section
page read and write
malicious
31C1000
trusted library allocation
page read and write
malicious
9A2000
unkown
page readonly
malicious
2551000
trusted library allocation
page read and write
malicious
7340000
trusted library section
page read and write
malicious
3031000
trusted library allocation
page read and write
malicious
2D61000
trusted library allocation
page read and write
malicious
7300000
trusted library section
page read and write
malicious
3D61000
trusted library allocation
page read and write
malicious
2E91000
trusted library allocation
page read and write
malicious
27BF000
trusted library allocation
page read and write
malicious
15B3AC6D000
heap
page read and write
1B555E10000
trusted library allocation
page read and write
BD0000
heap
page read and write
7FF848D10000
trusted library allocation
page execute and read and write
7FF848F90000
trusted library allocation
page read and write
A6EE000
stack
page read and write
4B253D000
stack
page read and write
4B2379000
stack
page read and write
1B57000A000
heap
page read and write
16D70937000
heap
page read and write
A36E000
stack
page read and write
1180000
heap
page read and write
15BC000
stack
page read and write
716D000
stack
page read and write
5689000
stack
page read and write
15B209E7000
heap
page read and write
1B558C99000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
4B2436000
stack
page read and write
1B70F4CA000
trusted library allocation
page read and write
57CE000
stack
page read and write
1330000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page read and write
6C0000
heap
page read and write
1B727A40000
heap
page read and write
247F000
stack
page read and write
1290000
trusted library allocation
page read and write
1B70D8EF000
heap
page read and write
16D01906000
trusted library allocation
page read and write
4B20F9000
stack
page read and write
7FF848D80000
trusted library allocation
page read and write
7FF848F5C000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page read and write
7FF848DD0000
trusted library allocation
page read and write
1B71047F000
trusted library allocation
page read and write
4B1DDE000
stack
page read and write
87A000
stack
page read and write
1B567A5D000
trusted library allocation
page read and write
780000
trusted library allocation
page execute and read and write
1266000
trusted library allocation
page execute and read and write
1560000
heap
page read and write
2F5E000
stack
page read and write
16D70D9D000
heap
page read and write
7FF848D50000
trusted library allocation
page read and write
62000
unkown
page readonly
1B70D991000
heap
page read and write
1B727C40000
trusted library allocation
page read and write
A4AD000
stack
page read and write
4B6E000
stack
page read and write
7FF848E37000
trusted library allocation
page read and write
16D70D25000
heap
page read and write
31337F9000
stack
page read and write
7FF848BEC000
trusted library allocation
page execute and read and write
7FF848E74000
trusted library allocation
page read and write
1B727AB8000
heap
page read and write
1BC8E000
stack
page read and write
16D6EAE0000
heap
page read and write
5A90000
heap
page read and write
1B555CB3000
heap
page read and write
7FF848B50000
trusted library allocation
page read and write
3347000
trusted library allocation
page read and write
12F7000
stack
page read and write
7326000
trusted library allocation
page read and write
1197000
trusted library allocation
page execute and read and write
1B557EBD000
trusted library allocation
page read and write
15B23DC2000
trusted library allocation
page read and write
130E000
heap
page read and write
16D70CF0000
heap
page read and write
C5C000
stack
page read and write
A5EE000
stack
page read and write
6B0000
heap
page read and write
5A78000
trusted library allocation
page read and write
2B0A000
heap
page read and write
1B567A00000
trusted library allocation
page read and write
DF0000
heap
page read and write
14E0000
heap
page read and write
16D70E47000
heap
page read and write
15B23500000
trusted library allocation
page read and write
14B2000
trusted library allocation
page read and write
1140000
trusted library allocation
page read and write
26CC000
trusted library allocation
page read and write
114F000
stack
page read and write
6E0000
trusted library allocation
page read and write
5215000
trusted library allocation
page read and write
1270000
trusted library allocation
page read and write
6F0000
trusted library allocation
page read and write
7FF848CE0000
trusted library allocation
page read and write
15B3A860000
heap
page read and write
7FF848C0C000
trusted library allocation
page execute and read and write
15B20950000
trusted library allocation
page read and write
9BC000
heap
page read and write
4B25BE000
stack
page read and write
16D6E8DB000
heap
page read and write
12A0000
trusted library allocation
page read and write
7FF848E79000
trusted library allocation
page read and write
15B22F22000
trusted library allocation
page read and write
104E000
stack
page read and write
16D01401000
trusted library allocation
page read and write
7FF848D28000
trusted library allocation
page read and write
7AA000
heap
page read and write
1180000
trusted library allocation
page read and write
7FF848C00000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page read and write
491053E000
stack
page read and write
3551000
trusted library allocation
page read and write
835E000
stack
page read and write
5696000
trusted library allocation
page read and write
4B21FE000
stack
page read and write
E6A000
heap
page read and write
2D5E000
stack
page read and write
A98E000
stack
page read and write
FB0000
heap
page read and write
1527000
trusted library allocation
page execute and read and write
318E000
stack
page read and write
72AE000
stack
page read and write
7540000
trusted library allocation
page read and write
1B56FED5000
heap
page read and write
15B20A2E000
heap
page read and write
1B5592E5000
trusted library allocation
page read and write
12C0000
trusted library allocation
page read and write
1B5578EC000
heap
page read and write
A69E000
stack
page read and write
1B5579F1000
trusted library allocation
page read and write
6E4000
trusted library allocation
page read and write
7FF848BF6000
trusted library allocation
page read and write
2E4E000
stack
page read and write
4B24B8000
stack
page read and write
7FF848F99000
trusted library allocation
page read and write
50FA74C000
stack
page read and write
50F967F000
stack
page read and write
7FF848EA8000
trusted library allocation
page read and write
535B000
stack
page read and write
7FF848B40000
trusted library allocation
page read and write
1B559344000
trusted library allocation
page read and write
5A40000
trusted library allocation
page execute and read and write
1340000
heap
page read and write
71AE000
stack
page read and write
6E3000
trusted library allocation
page execute and read and write
49102F9000
stack
page read and write
1480000
trusted library allocation
page read and write
1B567A11000
trusted library allocation
page read and write
FC0000
heap
page read and write
1B56FF4A000
heap
page read and write
E48000
heap
page read and write
16D102DF000
trusted library allocation
page read and write
15B2099B000
heap
page read and write
313347D000
stack
page read and write
7FF848F50000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page read and write
1B5700F0000
heap
page read and write
E75000
heap
page read and write
7520000
trusted library allocation
page read and write
15B2299D000
trusted library allocation
page read and write
15B20A23000
heap
page read and write
126C1000
trusted library allocation
page read and write
58FE000
stack
page read and write
7FF848EB0000
trusted library allocation
page read and write
1B72786D000
heap
page read and write
16D70D61000
heap
page read and write
1B70D8C2000
heap
page read and write
1105000
heap
page read and write
7FF848D50000
trusted library allocation
page read and write
15B327C5000
trusted library allocation
page read and write
6DAE000
stack
page read and write
16D6EA70000
heap
page readonly
15B20960000
heap
page read and write
A4E000
heap
page read and write
16C0000
trusted library allocation
page read and write
1B70D9A5000
heap
page read and write
6ACB000
trusted library allocation
page read and write
15B3AC53000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
1B710453000
trusted library allocation
page read and write
16D6E973000
heap
page read and write
569E000
trusted library allocation
page read and write
1B56FEB3000
heap
page read and write
1B7277C9000
heap
page read and write
4B1D53000
stack
page read and write
7FF848D40000
trusted library allocation
page read and write
16D6EA80000
trusted library allocation
page read and write
56B1000
trusted library allocation
page read and write
153C000
stack
page read and write
136E000
heap
page read and write
44E6000
trusted library allocation
page read and write
7FF848BDF000
trusted library allocation
page execute and read and write
1B555C81000
heap
page read and write
49C0000
trusted library allocation
page execute and read and write
7FF848D20000
trusted library allocation
page read and write
1B70FEA1000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page read and write
59EC000
stack
page read and write
1B555E40000
trusted library allocation
page read and write
1B69C000
stack
page read and write
25D8000
trusted library allocation
page read and write
7650000
trusted library allocation
page execute and read and write
7FF848CD1000
trusted library allocation
page read and write
1B727873000
heap
page read and write
5B3E000
stack
page read and write
7FF848ED0000
trusted library allocation
page read and write
7FF848B8C000
trusted library allocation
page execute and read and write
7FF848CE1000
trusted library allocation
page read and write
1550000
trusted library allocation
page read and write
551E000
stack
page read and write
7DF4B6400000
trusted library allocation
page execute and read and write
15B2346D000
trusted library allocation
page read and write
1B5597F5000
trusted library allocation
page read and write
1190000
trusted library allocation
page read and write
1560000
trusted library allocation
page read and write
1B56FF20000
heap
page read and write
1B558A22000
trusted library allocation
page read and write
1B7278C0000
heap
page execute and read and write
A0DF000
stack
page read and write
1B555CB5000
heap
page read and write
1B70D934000
heap
page read and write
1B56FF0C000
heap
page read and write
1B70F290000
trusted library allocation
page read and write
16D6E8DE000
heap
page read and write
16D6EA30000
trusted library allocation
page read and write
5A80000
trusted library allocation
page read and write
920000
heap
page read and write
632E000
stack
page read and write
7FF848D20000
trusted library allocation
page execute and read and write
16D6EA50000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
249E000
trusted library allocation
page read and write
15B3AC77000
heap
page read and write
15B3AE10000
heap
page read and write
7FF848E80000
trusted library allocation
page read and write
F80000
heap
page read and write
83A000
heap
page read and write
16D70430000
heap
page read and write
32F7000
trusted library allocation
page read and write
7FF848D90000
trusted library allocation
page read and write
1B56FEB8000
heap
page read and write
76D0000
trusted library allocation
page execute and read and write
16D709D6000
heap
page read and write
16D1030D000
trusted library allocation
page read and write
1B557883000
heap
page read and write
1B555D54000
heap
page read and write
1B558765000
trusted library allocation
page read and write
652E000
stack
page read and write
12E3000
heap
page read and write
1382000
heap
page read and write
16D70290000
trusted library allocation
page read and write
7FF848E53000
trusted library allocation
page read and write
4B85000
heap
page read and write
115D000
trusted library allocation
page execute and read and write
98DE000
stack
page read and write
4DD0000
heap
page read and write
15B20A60000
heap
page readonly
1B558CFA000
trusted library allocation
page read and write
1624000
heap
page read and write
1B70D9B0000
trusted library section
page read and write
56EF000
trusted library allocation
page read and write
1393000
heap
page read and write
1610000
heap
page read and write
1B71F471000
trusted library allocation
page read and write
2DA5000
trusted library allocation
page read and write
7FF848B24000
trusted library allocation
page read and write
7FF848B54000
trusted library allocation
page read and write
9B9000
heap
page read and write
7FF848CC2000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
1550000
trusted library allocation
page read and write
1B727973000
heap
page read and write
14E7000
heap
page read and write
56F0000
trusted library allocation
page read and write
7FF848E70000
trusted library allocation
page read and write
7FF848E80000
trusted library allocation
page read and write
7FF848E84000
trusted library allocation
page read and write
2F70000
heap
page read and write
16D01430000
trusted library allocation
page read and write
7FF848E50000
trusted library allocation
page read and write
1B56FF24000
heap
page read and write
7FF848D40000
trusted library allocation
page read and write
1B727790000
heap
page read and write
662E000
stack
page read and write
7FF848B40000
trusted library allocation
page read and write
16D708F6000
heap
page execute and read and write
1B70F451000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page read and write
16D102E4000
trusted library allocation
page read and write
5F0000
heap
page read and write
6B0000
heap
page read and write
7FF848CF0000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
24B2000
trusted library allocation
page read and write
FC0000
heap
page read and write
16D70957000
heap
page read and write
15E0000
heap
page read and write
2B00000
heap
page read and write
1284000
trusted library allocation
page read and write
8F1000
stack
page read and write
5443000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
5750000
trusted library allocation
page read and write
313367E000
stack
page read and write
7FF848B43000
trusted library allocation
page execute and read and write
15B23D39000
trusted library allocation
page read and write
FD0000
heap
page read and write
136A000
heap
page read and write
600000
heap
page read and write
7FF848E70000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page read and write
15B224A0000
trusted library allocation
page read and write
137F000
heap
page read and write
1B56FFBA000
heap
page read and write
15B236A9000
trusted library allocation
page read and write
56CD000
trusted library allocation
page read and write
679C000
heap
page read and write
7FF848B60000
trusted library allocation
page read and write
4DA0000
heap
page read and write
16D01348000
trusted library allocation
page read and write
1B727B72000
heap
page read and write
1B710056000
trusted library allocation
page read and write
4B22FD000
stack
page read and write
119B000
trusted library allocation
page execute and read and write
16D6EA55000
heap
page read and write
1192000
trusted library allocation
page read and write
4B217E000
stack
page read and write
1B5579E0000
heap
page read and write
1B557980000
heap
page execute and read and write
16D709EF000
heap
page read and write
7FF848B4D000
trusted library allocation
page execute and read and write
15B3A8A6000
heap
page read and write
5A9E000
stack
page read and write
3195000
trusted library allocation
page read and write
4576000
trusted library allocation
page read and write
3345000
trusted library allocation
page read and write
7FF848CE0000
trusted library allocation
page execute and read and write
7FF848F90000
trusted library allocation
page read and write
1B71122C000
trusted library allocation
page read and write
1B567CE3000
trusted library allocation
page read and write
ED0000
heap
page read and write
2DA0000
trusted library allocation
page read and write
3FD000
stack
page read and write
1B71062A000
trusted library allocation
page read and write
9C20000
heap
page read and write
1B567CDB000
trusted library allocation
page read and write
1A1E000
stack
page read and write
7FF848B23000
trusted library allocation
page execute and read and write
5D0000
heap
page read and write
116D000
trusted library allocation
page execute and read and write
3111000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
52FB000
stack
page read and write
4B3287000
stack
page read and write
3121000
trusted library allocation
page read and write
A35F000
stack
page read and write
7FF848B4D000
trusted library allocation
page execute and read and write
1182000
trusted library allocation
page read and write
12C8000
heap
page read and write
12AB000
trusted library allocation
page execute and read and write
60000
unkown
page readonly
7FF848DE0000
trusted library allocation
page read and write
30BE000
stack
page read and write
400000
remote allocation
page execute and read and write
1710000
heap
page read and write
1B5586FF000
trusted library allocation
page read and write
7FF848BE0000
trusted library allocation
page execute and read and write
E35000
heap
page read and write
13AC000
heap
page read and write
9D30000
trusted library allocation
page execute and read and write
1B555EB5000
heap
page read and write
491073B000
stack
page read and write
490FCC3000
stack
page read and write
7FF848E20000
trusted library allocation
page read and write
D75000
heap
page read and write
7FF848CDA000
trusted library allocation
page read and write
7FF848B70000
trusted library allocation
page read and write
15B20999000
heap
page read and write
1640000
trusted library allocation
page execute and read and write
14B0000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
7581000
trusted library allocation
page read and write
1B56FF18000
heap
page read and write
1B555EB0000
heap
page read and write
15B3AC25000
heap
page read and write
2500000
trusted library allocation
page read and write
DB0000
heap
page read and write
7FF848C40000
trusted library allocation
page execute and read and write
15B23111000
trusted library allocation
page read and write
6750000
heap
page read and write
7DF42C7C0000
trusted library allocation
page execute and read and write
4B273B000
stack
page read and write
3349000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
900000
heap
page read and write
16D70CD0000
heap
page read and write
1B5597D0000
trusted library allocation
page read and write
B7E000
stack
page read and write
7FF848F50000
trusted library allocation
page read and write
7330000
trusted library allocation
page execute and read and write
7FF848EAC000
trusted library allocation
page read and write
1B567CE5000
trusted library allocation
page read and write
7FF848DE0000
trusted library allocation
page read and write
9AF000
heap
page read and write
1B710DA0000
trusted library allocation
page read and write
2540000
heap
page execute and read and write
7550000
trusted library allocation
page read and write
16D6E961000
heap
page read and write
16D70DF6000
heap
page read and write
7FF848BE0000
trusted library allocation
page read and write
15B242F7000
trusted library allocation
page read and write
12D0000
trusted library allocation
page execute and read and write
31B0000
heap
page read and write
15B242F2000
trusted library allocation
page read and write
31331F2000
stack
page read and write
7FF848F76000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page execute and read and write
16D01263000
trusted library allocation
page read and write
4DB0000
heap
page read and write
16D708F0000
heap
page execute and read and write
4B310E000
stack
page read and write
A4B000
heap
page read and write
7FF848F23000
trusted library allocation
page read and write
1195000
trusted library allocation
page execute and read and write
16D6EA60000
trusted library allocation
page read and write
12D0000
heap
page read and write
BBC000
stack
page read and write
7FF848B33000
trusted library allocation
page execute and read and write
15B209E4000
heap
page read and write
1661000
heap
page read and write
1B710571000
trusted library allocation
page read and write
6BED000
stack
page read and write
7E7000
heap
page read and write
7FF848D38000
trusted library allocation
page read and write
1B5577C0000
heap
page execute and read and write
7FF848F50000
trusted library allocation
page read and write
15B20A25000
heap
page read and write
12A7000
trusted library allocation
page execute and read and write
15B22557000
trusted library allocation
page read and write
1B71F738000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page execute and read and write
126C8000
trusted library allocation
page read and write
751E000
stack
page read and write
1260000
trusted library allocation
page read and write
A52000
heap
page read and write
9D7D000
stack
page read and write
153B000
trusted library allocation
page execute and read and write
1153000
trusted library allocation
page execute and read and write
63A000
stack
page read and write
16D70E27000
heap
page read and write
1B555C70000
heap
page read and write
14A6000
trusted library allocation
page execute and read and write
1B71F740000
trusted library allocation
page read and write
7FF848EA2000
trusted library allocation
page read and write
7FF848C36000
trusted library allocation
page execute and read and write
7FF848E30000
trusted library allocation
page read and write
1B711252000
trusted library allocation
page read and write
7FF848CF0000
trusted library allocation
page execute and read and write
6D0000
heap
page read and write
7FF848D22000
trusted library allocation
page read and write
15B32501000
trusted library allocation
page read and write
3351000
trusted library allocation
page read and write
1B727960000
heap
page read and write
1B555CFA000
heap
page read and write
7620000
trusted library allocation
page execute and read and write
31A0000
trusted library allocation
page read and write
56BD000
trusted library allocation
page read and write
9AE000
stack
page read and write
120F000
stack
page read and write
2ECC000
trusted library allocation
page read and write
1B558C06000
trusted library allocation
page read and write
7FF848B3D000
trusted library allocation
page execute and read and write
7FF848C06000
trusted library allocation
page read and write
7FF848E50000
trusted library allocation
page read and write
2B88000
trusted library allocation
page read and write
7FF848B42000
trusted library allocation
page read and write
1B71F751000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
1170000
heap
page read and write
ED5000
heap
page read and write
2F31000
trusted library allocation
page read and write
1B555C50000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
99F000
heap
page read and write
57AE000
stack
page read and write
1B0F0000
heap
page read and write
7FF848D30000
trusted library allocation
page execute and read and write
3671000
trusted library allocation
page read and write
50FA64E000
stack
page read and write
1B70D840000
heap
page read and write
58AE000
stack
page read and write
49D0000
trusted library allocation
page read and write
7FF848E15000
trusted library allocation
page read and write
569B000
trusted library allocation
page read and write
1537000
trusted library allocation
page execute and read and write
52B0000
heap
page execute and read and write
5C7D000
stack
page read and write
960000
heap
page read and write
1560000
heap
page read and write
1B727B34000
heap
page read and write
706000
trusted library allocation
page execute and read and write
3559000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
831000
heap
page read and write
5210000
trusted library allocation
page read and write
24D5000
trusted library allocation
page read and write
A39C000
stack
page read and write
3DC6000
trusted library allocation
page read and write
1B70D8A0000
trusted library section
page read and write
56AB000
trusted library allocation
page read and write
16D00001000
trusted library allocation
page read and write
16D70DDB000
heap
page read and write
1B727D00000
heap
page read and write
7FF848B24000
trusted library allocation
page read and write
6380000
trusted library allocation
page read and write
15B224D1000
trusted library allocation
page read and write
50F91FE000
stack
page read and write
5A30000
heap
page read and write
15B3AC81000
heap
page read and write
7FF848D02000
trusted library allocation
page read and write
867000
heap
page read and write
ADE000
stack
page read and write
7FF848E63000
trusted library allocation
page read and write
7FF848B30000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
1690000
heap
page read and write
F50000
heap
page read and write
1B55866F000
trusted library allocation
page read and write
1B70D820000
heap
page read and write
7FF848D70000
trusted library allocation
page read and write
1B57004B000
heap
page read and write
1110000
heap
page read and write
7FF848F70000
trusted library allocation
page execute and read and write
7FF848B50000
trusted library allocation
page read and write
1B557970000
heap
page execute and read and write
1B5578C9000
heap
page read and write
71B000
trusted library allocation
page execute and read and write
15B3A9A0000
heap
page execute and read and write
1650000
trusted library allocation
page read and write
E30000
heap
page read and write
7FF848DC0000
trusted library allocation
page read and write
12B0000
heap
page read and write
16D7090C000
heap
page read and write
50FA6C9000
stack
page read and write
7FF848DA0000
trusted library allocation
page read and write
1B559282000
trusted library allocation
page read and write
5860000
heap
page read and write
D70000
heap
page read and write
A88E000
stack
page read and write
7FF848E10000
trusted library allocation
page read and write
83D000
heap
page read and write
15B22470000
heap
page read and write
7FF848BE6000
trusted library allocation
page read and write
7FF848C16000
trusted library allocation
page execute and read and write
15B20890000
heap
page read and write
7FF848BFC000
trusted library allocation
page execute and read and write
490FD4F000
stack
page read and write
1B555D90000
heap
page read and write
15B23891000
trusted library allocation
page read and write
AAD0000
trusted library allocation
page execute and read and write
5A3E000
stack
page read and write
3133938000
stack
page read and write
127D000
trusted library allocation
page execute and read and write
402000
remote allocation
page execute and read and write
7040000
trusted library section
page read and write
3875000
trusted library allocation
page read and write
1B727B32000
heap
page read and write
7FF848DA0000
trusted library allocation
page read and write
1540000
heap
page read and write
7FF848EBC000
trusted library allocation
page read and write
7FF848DB0000
trusted library allocation
page read and write
83D000
stack
page read and write
16D70928000
heap
page read and write
AC5E000
stack
page read and write
1186000
trusted library allocation
page execute and read and write
15B324F1000
trusted library allocation
page read and write
15B20B20000
heap
page execute and read and write
7FF848F60000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
6730000
heap
page read and write
1563000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
7FF848E82000
trusted library allocation
page read and write
1B7277C7000
heap
page read and write
7FF848EA9000
trusted library allocation
page read and write
1B7106A0000
trusted library allocation
page read and write
1B555D62000
heap
page read and write
558A000
stack
page read and write
E40000
heap
page read and write
15B23E20000
trusted library allocation
page read and write
5270000
heap
page read and write
F59000
stack
page read and write
7FF848B5D000
trusted library allocation
page execute and read and write
1163000
trusted library allocation
page execute and read and write
1B557823000
heap
page read and write
7FF848E40000
trusted library allocation
page read and write
15B23D5F000
trusted library allocation
page read and write
12F0000
heap
page read and write
E10000
unkown
page readonly
16D6EAE5000
heap
page read and write
1B5578D7000
heap
page read and write
7FF848B3D000
trusted library allocation
page execute and read and write
7FF848CE2000
trusted library allocation
page read and write
5873000
heap
page read and write
3020000
heap
page read and write
7FF848C50000
trusted library allocation
page execute and read and write
15B23775000
trusted library allocation
page read and write
5BB0000
heap
page read and write
464C000
stack
page read and write
7F760000
trusted library allocation
page execute and read and write
1410000
heap
page read and write
50F91B3000
stack
page read and write
15B20968000
heap
page read and write
1B727ACE000
heap
page read and write
15B3A958000
heap
page read and write
7FF848BDC000
trusted library allocation
page execute and read and write
7FF848B7C000
trusted library allocation
page execute and read and write
56A2000
trusted library allocation
page read and write
7FF848C16000
trusted library allocation
page execute and read and write
7FF848C60000
trusted library allocation
page execute and read and write
5AF0000
heap
page read and write
15B20910000
trusted library section
page read and write
311C000
trusted library allocation
page read and write
313488E000
stack
page read and write
16D0136F000
trusted library allocation
page read and write
7FF848E50000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
1B5585EB000
trusted library allocation
page read and write
5A73000
trusted library allocation
page read and write
1B710CDF000
trusted library allocation
page read and write
16D6E9A0000
heap
page read and write
1B555C98000
heap
page read and write
1B555CBD000
heap
page read and write
491128C000
stack
page read and write
1244000
trusted library allocation
page read and write
109E000
stack
page read and write
15B20B60000
heap
page read and write
6761000
heap
page read and write
131A000
heap
page read and write
7FF848B44000
trusted library allocation
page read and write
5850000
trusted library section
page readonly
7FF848FC0000
trusted library allocation
page read and write
4B318C000
stack
page read and write
1B7278C6000
heap
page execute and read and write
50F9B7B000
stack
page read and write
15B3AB20000
heap
page read and write
7530000
trusted library allocation
page read and write
9E7000
heap
page read and write
7FF848B2D000
trusted library allocation
page execute and read and write
696E000
stack
page read and write
6A6E000
stack
page read and write
3D89000
trusted library allocation
page read and write
15F0000
heap
page read and write
16D102E6000
trusted library allocation
page read and write
A59F000
stack
page read and write
50F957E000
stack
page read and write
7FF848EC0000
trusted library allocation
page read and write
7FF848E98000
trusted library allocation
page read and write
1B56FFE3000
heap
page read and write
56BE000
trusted library allocation
page read and write
1B5578AD000
heap
page read and write
3134789000
stack
page read and write
2F1E000
stack
page read and write
7FF848BAC000
trusted library allocation
page execute and read and write
F7A000
heap
page read and write
554C000
stack
page read and write
7FF848EB0000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF848D50000
trusted library allocation
page read and write
2B7F000
stack
page read and write
2FF0000
heap
page execute and read and write
334F000
trusted library allocation
page read and write
1B08F000
stack
page read and write
12A0000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
15B208B0000
heap
page read and write
1150000
heap
page read and write
7FF848C26000
trusted library allocation
page execute and read and write
B50000
trusted library allocation
page read and write
1B70D8B8000
heap
page read and write
D8B000
stack
page read and write
1150000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
110E000
stack
page read and write
4B0B000
stack
page read and write
31338B8000
stack
page read and write
64F0000
heap
page read and write
56F0000
heap
page read and write
7FF848E9C000
trusted library allocation
page read and write
1B1FF000
stack
page read and write
7FF848CF1000
trusted library allocation
page read and write
313468A000
stack
page read and write
1B7105AC000
trusted library allocation
page read and write
1B71075D000
trusted library allocation
page read and write
56C2000
trusted library allocation
page read and write
7FF848EE0000
trusted library allocation
page read and write
56C6000
trusted library allocation
page read and write
2DAA000
trusted library allocation
page read and write
1041000
heap
page read and write
7FF848BE0000
trusted library allocation
page read and write
5C2E000
stack
page read and write
2B1C000
heap
page read and write
B36000
trusted library allocation
page read and write
7FF848DC0000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page read and write
AD5F000
stack
page read and write
1B5589F6000
trusted library allocation
page read and write
16D00D54000
trusted library allocation
page read and write
7FF848C50000
trusted library allocation
page execute and read and write
7FF848F30000
trusted library allocation
page read and write
7FF848B60000
trusted library allocation
page read and write
7FF848BD0000
trusted library allocation
page read and write
16D70900000
heap
page read and write
4B2279000
stack
page read and write
760000
heap
page read and write
12F0000
heap
page read and write
7FF848E50000
trusted library allocation
page read and write
15B209E2000
heap
page read and write
1B56FF1C000
heap
page read and write
50FA7CE000
stack
page read and write
16D70D35000
heap
page read and write
5870000
heap
page read and write
1B56FEAB000
heap
page read and write
7FF848B50000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
6711000
heap
page read and write
1B727B04000
heap
page read and write
1530000
heap
page read and write
605000
heap
page read and write
491027D000
stack
page read and write
5A5E000
stack
page read and write
7FF848E60000
trusted library allocation
page read and write
1327000
heap
page read and write
7FF848CC0000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
A4B0000
heap
page read and write
10CE000
stack
page read and write
7FF848CFA000
trusted library allocation
page read and write
7650000
heap
page read and write
9A0000
unkown
page readonly
99E000
stack
page read and write
4B23BE000
stack
page read and write
1B70D90D000
heap
page read and write
16D70D6E000
heap
page read and write
1B557800000
heap
page read and write
7FF848B32000
trusted library allocation
page read and write
1632000
heap
page read and write
7FF848E30000
trusted library allocation
page read and write
26C1000
trusted library allocation
page read and write
91F000
unkown
page read and write
1B70DAB0000
heap
page read and write
741E000
stack
page read and write
773000
heap
page read and write
1B70F260000
trusted library allocation
page read and write
5B2E000
stack
page read and write
16D10001000
trusted library allocation
page read and write
15B3AA40000
heap
page read and write
15FE000
heap
page read and write
1B56FF10000
heap
page read and write
15B20A70000
trusted library allocation
page read and write
15B207B0000
heap
page read and write
A9E000
stack
page read and write
1B7103EF000
trusted library allocation
page read and write
1B711276000
trusted library allocation
page read and write
64E000
stack
page read and write
15B20AA0000
trusted library allocation
page read and write
1687000
heap
page read and write
16D70E2E000
heap
page read and write
F1E000
stack
page read and write
7FF848E73000
trusted library allocation
page read and write
15B22440000
heap
page execute and read and write
7520000
trusted library allocation
page execute and read and write
49104BB000
stack
page read and write
1495000
heap
page read and write
671A000
heap
page read and write
15D4000
trusted library allocation
page read and write
15D6000
trusted library allocation
page read and write
712000
trusted library allocation
page read and write
1BB80000
heap
page read and write
844000
heap
page read and write
7DF42C7D0000
trusted library allocation
page execute and read and write
16D70E4D000
heap
page read and write
AB1D000
stack
page read and write
7FF848EC0000
trusted library allocation
page read and write
15B2362D000
trusted library allocation
page read and write
15B20A29000
heap
page read and write
6774000
heap
page read and write
1B70D8EC000
heap
page read and write
16D00073000
trusted library allocation
page read and write
7FF848D40000
trusted library allocation
page execute and read and write
15B327D6000
trusted library allocation
page read and write
7F330000
trusted library allocation
page execute and read and write
988000
heap
page read and write
1B727823000
heap
page read and write
49B0000
trusted library allocation
page read and write
7FF848E70000
trusted library allocation
page read and write
1254000
trusted library allocation
page read and write
1B70F91D000
trusted library allocation
page read and write
8C0000
heap
page read and write
57F0000
heap
page execute and read and write
16D6E8A8000
heap
page read and write
1B55876E000
trusted library allocation
page read and write
1B567A21000
trusted library allocation
page read and write
44AA000
trusted library allocation
page read and write
62EE000
stack
page read and write
99F000
stack
page read and write
16D6E7B0000
heap
page read and write
3190000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page read and write
3248000
trusted library allocation
page read and write
261E000
stack
page read and write
1B70D8B0000
heap
page read and write
7FF848FA3000
trusted library allocation
page read and write
15B3253F000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page read and write
4B320D000
stack
page read and write
502E000
stack
page read and write
1615000
heap
page read and write
BC0000
trusted library allocation
page read and write
7FF848E40000
trusted library allocation
page read and write
66EE000
stack
page read and write
96DE000
stack
page read and write
7FF848F70000
trusted library allocation
page read and write
9DBE000
stack
page read and write
1B71F733000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
700000
trusted library allocation
page read and write
66F0000
heap
page read and write
15B237D6000
trusted library allocation
page read and write
5C0000
heap
page read and write
1B5585F7000
trusted library allocation
page read and write
7DF4B07A0000
trusted library allocation
page execute and read and write
1B7101CD000
trusted library allocation
page read and write
13118000
trusted library allocation
page read and write
7FF848C06000
trusted library allocation
page execute and read and write
980000
heap
page read and write
16A3000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
1B70D740000
heap
page read and write
90E000
unkown
page read and write
15B224C5000
heap
page read and write
7FF848DB0000
trusted library allocation
page read and write
49101F6000
stack
page read and write
10F7000
stack
page read and write
7FF848B2D000
trusted library allocation
page execute and read and write
6ED000
trusted library allocation
page execute and read and write
7FF848B50000
trusted library allocation
page read and write
129C000
stack
page read and write
15B234D4000
trusted library allocation
page read and write
566E000
stack
page read and write
135F000
heap
page read and write
1B557C19000
trusted library allocation
page read and write
49106BE000
stack
page read and write
1B710817000
trusted library allocation
page read and write
12E9000
heap
page read and write
7FF848D04000
trusted library allocation
page read and write
5752000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
50F947E000
stack
page read and write
E00000
heap
page read and write
24C0000
trusted library allocation
page read and write
1B555DF0000
trusted library allocation
page read and write
7FF848D0A000
trusted library allocation
page read and write
EA0000
heap
page read and write
1280000
trusted library allocation
page read and write
15B3AA65000
heap
page read and write
6AEC000
stack
page read and write
1290000
trusted library allocation
page read and write
1B727B25000
heap
page read and write
1154000
trusted library allocation
page read and write
313357F000
stack
page read and write
383A000
trusted library allocation
page read and write
12C0000
heap
page read and write
1B3CE000
stack
page read and write
3133B3E000
stack
page read and write
16D702C0000
trusted library allocation
page read and write
E3B000
stack
page read and write
1B555E80000
trusted library allocation
page read and write
1250000
trusted library allocation
page read and write
15B230BB000
trusted library allocation
page read and write
16D01901000
trusted library allocation
page read and write
1B70D9F0000
heap
page readonly
1B7106F8000
trusted library allocation
page read and write
4D9D000
stack
page read and write
971E000
stack
page read and write
334B000
trusted library allocation
page read and write
6CAC000
stack
page read and write
5840000
trusted library allocation
page read and write
7FB30000
trusted library allocation
page execute and read and write
1C02E000
stack
page read and write
1B557976000
heap
page execute and read and write
F86000
heap
page read and write
1B70DAB5000
heap
page read and write
1B55981A000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
7E2000
heap
page read and write
49105BF000
stack
page read and write
1B70F440000
heap
page execute and read and write
12A0000
trusted library allocation
page execute and read and write
12D6000
heap
page read and write
144E000
stack
page read and write
5830000
heap
page read and write
1550000
trusted library allocation
page read and write
7FF848B40000
trusted library allocation
page read and write
51D5000
heap
page read and write
56A4000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
248B000
trusted library allocation
page read and write
7FF848D70000
trusted library allocation
page read and write
E77000
heap
page read and write
6736000
heap
page read and write
7FF848EB0000
trusted library allocation
page read and write
B1E000
stack
page read and write
1140000
heap
page read and write
B20000
trusted library allocation
page read and write
152E000
stack
page read and write
1B7103F1000
trusted library allocation
page read and write
730000
trusted library allocation
page read and write
1B71072C000
trusted library allocation
page read and write
14BB000
trusted library allocation
page execute and read and write
7FF848F2C000
trusted library allocation
page read and write
313460D000
stack
page read and write
7530000
trusted library allocation
page read and write
16D101A0000
trusted library allocation
page read and write
7DF4B0790000
trusted library allocation
page execute and read and write
1B70D9C0000
trusted library allocation
page read and write
7667000
heap
page read and write
15B209A7000
heap
page read and write
56C1000
trusted library allocation
page read and write
15B208F0000
heap
page read and write
166E000
stack
page read and write
1361000
heap
page read and write
72B0000
trusted library allocation
page read and write
59FE000
stack
page read and write
1B555CCF000
heap
page read and write
1B7107D9000
trusted library allocation
page read and write
16D102FF000
trusted library allocation
page read and write
49100FA000
stack
page read and write
A16F000
stack
page read and write
1B557A6B000
trusted library allocation
page read and write
7FF848DD0000
trusted library allocation
page read and write
F61000
stack
page read and write
DFE000
stack
page read and write
6DB000
heap
page read and write
7FF848B22000
trusted library allocation
page read and write
9B1D000
stack
page read and write
152E000
stack
page read and write
7FF848BD6000
trusted library allocation
page read and write
1B555E00000
heap
page readonly
7FF848D10000
trusted library allocation
page execute and read and write
16D6E909000
heap
page read and write
1177000
heap
page read and write
7FF848B30000
trusted library allocation
page read and write
1B555C30000
heap
page read and write
15B23473000
trusted library allocation
page read and write
1530000
trusted library allocation
page read and write
7FF848B8C000
trusted library allocation
page execute and read and write
1B557815000
heap
page read and write
1B710795000
trusted library allocation
page read and write
148D000
trusted library allocation
page execute and read and write
56B6000
trusted library allocation
page read and write
7FF848D18000
trusted library allocation
page read and write
1474000
trusted library allocation
page read and write
1B555CF8000
heap
page read and write
16D6E9C0000
heap
page read and write
1B555C77000
heap
page read and write
1580000
trusted library allocation
page read and write
14EF000
stack
page read and write
F2C000
heap
page read and write
491110E000
stack
page read and write
50F95F9000
stack
page read and write
7FF848B32000
trusted library allocation
page read and write
41C1000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
11B0000
trusted library allocation
page read and write
129A000
trusted library allocation
page execute and read and write
124D000
trusted library allocation
page execute and read and write
3134707000
stack
page read and write
1490000
heap
page read and write
A25E000
stack
page read and write
1164000
trusted library allocation
page read and write
525E000
stack
page read and write
7FF848E90000
trusted library allocation
page read and write
313377E000
stack
page read and write
1296000
trusted library allocation
page execute and read and write
7FF848FB0000
trusted library allocation
page read and write
FD0000
heap
page read and write
1B55925C000
trusted library allocation
page read and write
1B567C14000
trusted library allocation
page read and write
2510000
heap
page execute and read and write
16D70840000
heap
page execute and read and write
5760000
trusted library allocation
page execute and read and write
1B710C79000
trusted library allocation
page read and write
50F9877000
stack
page read and write
1B727814000
heap
page read and write
15B3AC7B000
heap
page read and write
134C000
heap
page read and write
7FF848E90000
trusted library allocation
page read and write
7FF848DB0000
trusted library allocation
page read and write
7FF848E80000
trusted library allocation
page read and write
7FF848B40000
trusted library allocation
page read and write
4B80000
heap
page read and write
18EF000
stack
page read and write
F6D000
heap
page read and write
1B56FFFC000
heap
page read and write
126A000
trusted library allocation
page execute and read and write
717000
trusted library allocation
page execute and read and write
7FF848F50000
trusted library allocation
page read and write
A9CC000
stack
page read and write
5A70000
trusted library allocation
page read and write
5CAE000
heap
page read and write
1210000
trusted library allocation
page execute and read and write
512E000
stack
page read and write
3353000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
17EF000
stack
page read and write
7FF848D80000
trusted library allocation
page read and write
7FF848D70000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
F20000
heap
page read and write
AACC000
stack
page read and write
7E0000
heap
page read and write
4B26BE000
stack
page read and write
7FF848F4C000
trusted library allocation
page read and write
1B70F2D4000
heap
page read and write
1B70D8F1000
heap
page read and write
3F31000
trusted library allocation
page read and write
491033E000
stack
page read and write
16D708A0000
trusted library allocation
page read and write
C5C000
stack
page read and write
7FF848FA0000
trusted library allocation
page read and write
1B5679F1000
trusted library allocation
page read and write
311F000
trusted library allocation
page read and write
50F96F7000
stack
page read and write
7FF848DD0000
trusted library allocation
page read and write
7FF848D24000
trusted library allocation
page read and write
7FF848CEA000
trusted library allocation
page read and write
1B70D880000
heap
page read and write
1274000
trusted library allocation
page read and write
12F8000
heap
page read and write
8995000
trusted library allocation
page read and write
A3D000
heap
page read and write
9BE000
heap
page read and write
15B3AA54000
heap
page read and write
7976000
trusted library allocation
page read and write
576E000
stack
page read and write
2C50000
heap
page read and write
7FF848D00000
trusted library allocation
page execute and read and write
5A95000
heap
page read and write
1B70F919000
trusted library allocation
page read and write
7FF848E1E000
trusted library allocation
page read and write
1B558BCD000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
797B000
trusted library allocation
page read and write
15B3A9A7000
heap
page execute and read and write
50FA5CC000
stack
page read and write
A3AD000
stack
page read and write
1520000
trusted library allocation
page read and write
15FA000
heap
page read and write
313383E000
stack
page read and write
4BA0000
heap
page read and write
556F000
stack
page read and write
15B23246000
trusted library allocation
page read and write
7FF848D34000
trusted library allocation
page read and write
7FF848B7C000
trusted library allocation
page execute and read and write
1B555DD0000
trusted library allocation
page read and write
4A20000
heap
page read and write
32E2000
trusted library allocation
page read and write
5200000
trusted library allocation
page read and write
F84000
heap
page read and write
49103B7000
stack
page read and write
4A10000
heap
page read and write
15B3ABCC000
heap
page read and write
7FF848D40000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page read and write
1473000
trusted library allocation
page execute and read and write
54D0000
heap
page read and write
5B9D000
stack
page read and write
50F977D000
stack
page read and write
7FF848FA0000
trusted library allocation
page read and write
16D10066000
trusted library allocation
page read and write
5720000
heap
page read and write
16D709E6000
heap
page read and write
15B20AE0000
trusted library allocation
page read and write
7FF848EA4000
trusted library allocation
page read and write
7FF848BD0000
trusted library allocation
page read and write
7FF848B53000
trusted library allocation
page execute and read and write
51FE000
stack
page read and write
10EE000
stack
page read and write
334D000
trusted library allocation
page read and write
1B55766B000
heap
page read and write
15B242AD000
trusted library allocation
page read and write
A26F000
stack
page read and write
24E0000
trusted library allocation
page read and write
740000
heap
page read and write
7C8000
heap
page read and write
7DF4B63F0000
trusted library allocation
page execute and read and write
420000
remote allocation
page execute and read and write
9C1D000
stack
page read and write
15D0000
trusted library allocation
page read and write
42B3000
trusted library allocation
page read and write
4B263E000
stack
page read and write
15B2099D000
heap
page read and write
790000
trusted library allocation
page read and write
4B90000
trusted library allocation
page read and write
7FF848DE0000
trusted library allocation
page read and write
702000
trusted library allocation
page read and write
16D6E8A0000
heap
page read and write
1B557810000
heap
page read and write
9ADE000
stack
page read and write
4489000
trusted library allocation
page read and write
1B56FDC0000
heap
page read and write
15B209A1000
heap
page read and write
7FF848CC0000
trusted library allocation
page read and write
6AC0000
trusted library allocation
page read and write
7FF848B23000
trusted library allocation
page execute and read and write
E90000
heap
page read and write
1B70D8F9000
heap
page read and write
7FF848E30000
trusted library allocation
page read and write
5BA0000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
15B2231F000
heap
page read and write
DB0000
heap
page read and write
14D0000
trusted library allocation
page read and write
5CA0000
heap
page read and write
7590000
trusted library allocation
page execute and read and write
7FF848B4B000
trusted library allocation
page read and write
1B70D939000
heap
page read and write
11C0000
heap
page execute and read and write
50F97F9000
stack
page read and write
24D0000
trusted library allocation
page read and write
15B2099F000
heap
page read and write
7FF848B3B000
trusted library allocation
page read and write
116D000
trusted library allocation
page execute and read and write
152A000
trusted library allocation
page execute and read and write
AC1F000
stack
page read and write
1B555CB9000
heap
page read and write
5AEC000
stack
page read and write
5278000
heap
page read and write
15B2358F000
trusted library allocation
page read and write
1100000
heap
page read and write
7FF848B9C000
trusted library allocation
page execute and read and write
313458E000
stack
page read and write
16AD000
stack
page read and write
15B209BB000
heap
page read and write
1570000
heap
page read and write
7FF848D60000
trusted library allocation
page read and write
510000
heap
page read and write
1B71F451000
trusted library allocation
page read and write
35A7000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page read and write
7FF848E94000
trusted library allocation
page read and write
15B20B65000
heap
page read and write
578E000
stack
page read and write
1BE2E000
stack
page read and write
1B71F481000
trusted library allocation
page read and write
7FF848C06000
trusted library allocation
page execute and read and write
13113000
trusted library allocation
page read and write
7FF848DA0000
trusted library allocation
page read and write
7FF848D90000
trusted library allocation
page read and write
770000
heap
page read and write
7FF848CD0000
trusted library allocation
page read and write
15B3A906000
heap
page read and write
491118E000
stack
page read and write
7FF848E00000
trusted library allocation
page read and write
7FF848D10000
trusted library allocation
page execute and read and write
1B56FF14000
heap
page read and write
13111000
trusted library allocation
page read and write
12F5000
heap
page read and write
E1E000
unkown
page readonly
70A000
trusted library allocation
page execute and read and write
7A0000
heap
page read and write
7FF848E60000
trusted library allocation
page read and write
1273000
trusted library allocation
page execute and read and write
7FF848DC0000
trusted library allocation
page read and write
7970000
trusted library allocation
page read and write
1B70F420000
heap
page execute and read and write
50F94FE000
stack
page read and write
1B558A87000
trusted library allocation
page read and write
35F5000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
9A7000
heap
page read and write
4B10000
trusted library allocation
page execute and read and write
4B330D000
stack
page read and write
1460000
trusted library allocation
page read and write
7FF848B3D000
trusted library allocation
page execute and read and write
136F000
heap
page read and write
706C000
stack
page read and write
7FF848DF0000
trusted library allocation
page read and write
7FF848B34000
trusted library allocation
page read and write
191E000
stack
page read and write
5E10000
trusted library allocation
page execute and read and write
2E00000
heap
page read and write
15B327BD000
trusted library allocation
page read and write
313480C000
stack
page read and write
7DF47C960000
trusted library allocation
page execute and read and write
7FF848E10000
trusted library allocation
page read and write
31339B9000
stack
page read and write
7FF848DE0000
trusted library allocation
page read and write
1B558443000
trusted library allocation
page read and write
16D6E8E0000
heap
page read and write
6755000
heap
page read and write
4F30000
trusted library allocation
page execute and read and write
56D0000
trusted library allocation
page read and write
50F98FA000
stack
page read and write
7FF848E40000
trusted library allocation
page read and write
15B209A3000
heap
page read and write
1B727B4A000
heap
page read and write
140E000
stack
page read and write
5B7C000
stack
page read and write
1B559177000
trusted library allocation
page read and write
3133ABE000
stack
page read and write
1550000
heap
page read and write
1170000
trusted library allocation
page read and write
1B56FEC9000
heap
page read and write
7FF848C40000
trusted library allocation
page execute and read and write
5CBE000
stack
page read and write
1B5CF000
stack
page read and write
1313000
heap
page read and write
16D018BC000
trusted library allocation
page read and write
31335F9000
stack
page read and write
1B710CB8000
trusted library allocation
page read and write
51A0000
heap
page read and write
D59000
stack
page read and write
1155000
heap
page read and write
16D70D4D000
heap
page read and write
16D6E9F0000
heap
page read and write
15B20920000
trusted library section
page read and write
15C0000
trusted library allocation
page read and write
7FF848D90000
trusted library allocation
page read and write
1660000
heap
page execute and read and write
9F9E000
stack
page read and write
7FF848B34000
trusted library allocation
page read and write
F37000
stack
page read and write
1B727966000
heap
page read and write
950000
heap
page read and write
53FD000
stack
page read and write
16D70DAF000
heap
page read and write
64FE000
heap
page read and write
7DF4B63E0000
trusted library allocation
page execute and read and write
8DE000
unkown
page read and write
1B567CF5000
trusted library allocation
page read and write
138C000
heap
page read and write
2C10000
heap
page read and write
108E000
stack
page read and write
333D000
trusted library allocation
page read and write
12D0000
heap
page read and write
1B555B50000
heap
page read and write
6EAE000
stack
page read and write
3100000
heap
page execute and read and write
13B6000
heap
page read and write
1B57002C000
heap
page read and write
127B000
trusted library allocation
page execute and read and write
1B1F000
stack
page read and write
14AA000
trusted library allocation
page execute and read and write
5420000
heap
page execute and read and write
1B70F67A000
trusted library allocation
page read and write
439E000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page read and write
4B70000
trusted library section
page read and write
1B56FF82000
heap
page read and write
D59000
stack
page read and write
7FF848EB8000
trusted library allocation
page read and write
8C0F000
stack
page read and write
68E000
stack
page read and write
16D102EC000
trusted library allocation
page read and write
1BB40000
heap
page execute and read and write
16D10505000
trusted library allocation
page read and write
14FE000
stack
page read and write
41C9000
trusted library allocation
page read and write
543E000
stack
page read and write
10A0000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
1277000
trusted library allocation
page execute and read and write
15B242D2000
trusted library allocation
page read and write
491007E000
stack
page read and write
26B0000
heap
page execute and read and write
7FF848BF0000
trusted library allocation
page execute and read and write
7FF848D08000
trusted library allocation
page read and write
7FF848B5B000
trusted library allocation
page read and write
BD0000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
1B71F460000
trusted library allocation
page read and write
7FF848BF0000
trusted library allocation
page read and write
15B231DF000
trusted library allocation
page read and write
1B70D8F3000
heap
page read and write
7FF848B52000
trusted library allocation
page read and write
16D016B4000
trusted library allocation
page read and write
16D6EAB0000
heap
page execute and read and write
1B57004E000
heap
page read and write
1BADD000
stack
page read and write
1B56FEA0000
heap
page read and write
7FF848E83000
trusted library allocation
page read and write
7FF848DC0000
trusted library allocation
page read and write
15E0000
trusted library allocation
page read and write
15B3AC1C000
heap
page read and write
7FF848B40000
trusted library allocation
page read and write
7FF848CD0000
trusted library allocation
page read and write
1B70DA20000
heap
page read and write
7FF848EC0000
trusted library allocation
page read and write
491063C000
stack
page read and write
16D018E2000
trusted library allocation
page read and write
1B727B84000
heap
page read and write
7FF848B33000
trusted library allocation
page execute and read and write
16D7030D000
heap
page read and write
7FF848D80000
trusted library allocation
page read and write
7DF47C950000
trusted library allocation
page execute and read and write
1B2C0000
heap
page execute and read and write
1C130000
heap
page read and write
181F000
stack
page read and write
16D6E8C4000
heap
page read and write
13AA000
heap
page read and write
16D70E18000
heap
page read and write
1B570045000
heap
page read and write
7FF848D01000
trusted library allocation
page read and write
5820000
trusted library allocation
page execute and read and write
1B555CAF000
heap
page read and write
372E000
trusted library allocation
page read and write
849000
heap
page read and write
7FF848CF0000
trusted library allocation
page execute and read and write
1B70DA00000
trusted library allocation
page read and write
3343000
trusted library allocation
page read and write
6702000
heap
page read and write
7FF848E88000
trusted library allocation
page read and write
49B2000
trusted library allocation
page read and write
3E91000
trusted library allocation
page read and write
16D00A2C000
trusted library allocation
page read and write
5740000
heap
page read and write
15B226F9000
trusted library allocation
page read and write
15B324D1000
trusted library allocation
page read and write
9E9E000
stack
page read and write
7FF848DF0000
trusted library allocation
page read and write
7FF848B44000
trusted library allocation
page read and write
1BF2E000
stack
page read and write
6370000
heap
page read and write
50F9AFE000
stack
page read and write
14BF000
stack
page read and write
672E000
stack
page read and write
15B3ABC0000
heap
page read and write
7FF46EE40000
trusted library allocation
page execute and read and write
1B56FF5D000
heap
page read and write
1B557832000
heap
page read and write
15B224C0000
heap
page read and write
7FF848D14000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page read and write
1363000
heap
page read and write
7FF848DB0000
trusted library allocation
page read and write
1B70D9E0000
trusted library allocation
page read and write
A49C000
stack
page read and write
50F9979000
stack
page read and write
7FF848D90000
trusted library allocation
page read and write
1230000
trusted library allocation
page read and write
15B327B8000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
490FDCE000
stack
page read and write
5DBE000
stack
page read and write
7FF848E4D000
trusted library allocation
page read and write
7FF848EB2000
trusted library allocation
page read and write
BD5000
heap
page read and write
7FF848E40000
trusted library allocation
page read and write
5ADE000
stack
page read and write
1B567CD6000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
7FF848DA0000
trusted library allocation
page read and write
1243000
trusted library allocation
page execute and read and write
7FF848D20000
trusted library allocation
page execute and read and write
7FF848D12000
trusted library allocation
page read and write
1B711271000
trusted library allocation
page read and write
1B557960000
trusted library allocation
page read and write
120E000
stack
page read and write
9FDD000
stack
page read and write
9EF000
stack
page read and write
15A0000
heap
page read and write
680000
heap
page read and write
1B70DA45000
heap
page read and write
3133A3E000
stack
page read and write
7FF848D30000
trusted library allocation
page read and write
2C44000
trusted library allocation
page read and write
1B71050F000
trusted library allocation
page read and write
1B4CE000
stack
page read and write
9B2000
unkown
page readonly
1B70DA40000
heap
page read and write
16D6E90E000
heap
page read and write
1373000
heap
page read and write
1B558B16000
trusted library allocation
page read and write
9F6E000
stack
page read and write
5690000
trusted library allocation
page read and write
9FAE000
stack
page read and write
49A0000
heap
page read and write
1630000
heap
page read and write
1A9000
stack
page read and write
5440000
heap
page read and write
1530000
trusted library allocation
page execute and read and write
59AB000
stack
page read and write
14B7000
trusted library allocation
page execute and read and write
50FA54E000
stack
page read and write
4A00000
trusted library section
page readonly
15B235F2000
trusted library allocation
page read and write
1AC4D000
stack
page read and write
1B555CB1000
heap
page read and write
16D6E8BE000
heap
page read and write
95E000
stack
page read and write
7FF848E89000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
1B71F4BA000
trusted library allocation
page read and write
7FF848C70000
trusted library allocation
page execute and read and write
1160000
trusted library allocation
page read and write
1B7104E3000
trusted library allocation
page read and write
1540000
heap
page execute and read and write
7FF848FB0000
trusted library allocation
page read and write
7FF848D50000
trusted library allocation
page read and write
16D00227000
trusted library allocation
page read and write
118A000
trusted library allocation
page execute and read and write
3643000
trusted library allocation
page read and write
6778000
heap
page read and write
15B23C53000
trusted library allocation
page read and write
7FF848B42000
trusted library allocation
page read and write
1B567CDD000
trusted library allocation
page read and write
7FF848E99000
trusted library allocation
page read and write
15B3AC33000
heap
page read and write
1B727B76000
heap
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
7FF848CF2000
trusted library allocation
page read and write
1B557805000
heap
page read and write
1342000
heap
page read and write
4E5E000
stack
page read and write
4B207E000
stack
page read and write
FC5000
heap
page read and write
4031000
trusted library allocation
page read and write
16D00AD6000
trusted library allocation
page read and write
15B23564000
trusted library allocation
page read and write
14A2000
trusted library allocation
page read and write
12C0000
trusted library allocation
page read and write
7FF848D00000
trusted library allocation
page execute and read and write
1B558AB3000
trusted library allocation
page read and write
80D6000
trusted library allocation
page read and write
31334FE000
stack
page read and write
6FD000
trusted library allocation
page execute and read and write
960000
trusted library allocation
page read and write
24AD000
trusted library allocation
page read and write
1470000
trusted library allocation
page read and write
520000
unkown
page readonly
56AE000
trusted library allocation
page read and write
1B558DB5000
trusted library allocation
page read and write
4F7000
stack
page read and write
CDF000
stack
page read and write
4911209000
stack
page read and write
9C1000
heap
page read and write
2E80000
heap
page execute and read and write
16D01309000
trusted library allocation
page read and write
BD7000
heap
page read and write
16D10010000
trusted library allocation
page read and write
491017F000
stack
page read and write
4B338E000
stack
page read and write
16D0191E000
trusted library allocation
page read and write
16D70CE5000
heap
page read and write
159E000
stack
page read and write
6800000
trusted library allocation
page execute and read and write
7FF848D30000
trusted library allocation
page read and write
B60000
heap
page read and write
7FF848D32000
trusted library allocation
page read and write
2480000
trusted library allocation
page read and write
1174000
trusted library allocation
page read and write
16D00BE0000
trusted library allocation
page read and write
31336FB000
stack
page read and write
5770000
heap
page execute and read and write
16D70A20000
heap
page read and write
1B710BD3000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page read and write
16D70CE0000
heap
page read and write
50F99FE000
stack
page read and write
6D0000
trusted library allocation
page read and write
24A6000
trusted library allocation
page read and write
7AE000
heap
page read and write
561E000
stack
page read and write
6BF2000
trusted library allocation
page read and write
94F000
unkown
page read and write
7FF848E8C000
trusted library allocation
page read and write
5880000
heap
page read and write
3133BBB000
stack
page read and write
7FF848DD0000
trusted library allocation
page read and write
7FF848B30000
trusted library allocation
page read and write
24A1000
trusted library allocation
page read and write
99DE000
stack
page read and write
113E000
stack
page read and write
491130E000
stack
page read and write
1B559815000
trusted library allocation
page read and write
50F9A7E000
stack
page read and write
4419000
trusted library allocation
page read and write
7FF848B20000
trusted library allocation
page read and write
7FF848B6B000
trusted library allocation
page read and write
636D000
stack
page read and write
126C3000
trusted library allocation
page read and write
15B20930000
trusted library allocation
page read and write
7FF848D70000
trusted library allocation
page read and write
7FF848E60000
trusted library allocation
page read and write
5620000
heap
page execute and read and write
147D000
trusted library allocation
page execute and read and write
4910439000
stack
page read and write
There are 1501 hidden memdumps, click here to show them.