IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_a3b8183025e5d33eb444661acef6d25a49d72c_864df792_23c4ae9d-f460-4653-b232-c49d845767d1\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\userIJKFHIIEHI.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\RoamingKJEGDBKFIJ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
malicious
C:\ProgramData\BAKFBKEHDBGHJJKFIEGD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DBKEHDGDGHCBGCAKFIIIECFIIJ
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DGCBKECA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\DHDBGHCBAEGCBFHJEBFI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FIJKEHJJDAAKFHIDAKFHCBFCFB
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\GDGDHJJDGHCAAAKEHIJK
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\GHJDGDBFCBKFHJKFHCBKKFIIDG
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\HJJKJJDH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KFCFBAAEHCFHJJKEHJKJDHJDGI
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_659e6df34d.exe_d8193af9cd15a337985c9ea7932cee3b3a794dc_031307e8_0e77e3c4-7dd5-4c66-a16e-371f78b8ad43\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_659e6df34d.exe_d8193af9cd15a337985c9ea7932cee3b3a794dc_031307e8_b11cb976-de52-4509-a770-cff41b16cdd3\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_659e6df34d.exe_d8193af9cd15a337985c9ea7932cee3b3a794dc_031307e8_e9f11297-d186-4910-bcc3-efe1b8af0941\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1F09.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Jul 27 01:19:25 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2091.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER20C1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4DCA.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Jul 27 01:19:37 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4E67.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4EC6.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER81CA.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Jul 27 01:19:50 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8239.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8269.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC452.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Jul 27 01:20:07 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC51E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC54E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\compatibility.ini
Windows WIN.INI
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs-1.js
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.js (copy)
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shm
data
dropped
C:\Windows\Tasks\axplong.job
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 44 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\RoamingKJEGDBKFIJ.exe"
malicious
C:\Users\user\AppData\RoamingKJEGDBKFIJ.exe
"C:\Users\user\AppData\RoamingKJEGDBKFIJ.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\userIJKFHIIEHI.exe"
malicious
C:\Users\userIJKFHIIEHI.exe
"C:\Users\userIJKFHIIEHI.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
"C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000016001\659e6df34d.exe
"C:\Users\user\AppData\Local\Temp\1000016001\659e6df34d.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000017001\7bfd2dfdc1.exe
"C:\Users\user\AppData\Local\Temp\1000017001\7bfd2dfdc1.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000016001\659e6df34d.exe
"C:\Users\user\AppData\Local\Temp\1000016001\659e6df34d.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000017001\7bfd2dfdc1.exe
"C:\Users\user\AppData\Local\Temp\1000017001\7bfd2dfdc1.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\1000016001\659e6df34d.exe
"C:\Users\user\AppData\Local\Temp\1000016001\659e6df34d.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6880 -s 2344
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7596 -s 1344
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7856 -s 1040
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2300 -parentBuildID 20230927232528 -prefsHandle 2248 -prefMapHandle 2244 -prefsLen 25250 -prefMapSize 238690 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e2c2bbc-ae2f-4d63-ad2c-5195ac7123fd} 8164 "\\.\pipe\gecko-crash-server-pipe.8164" 25b37f6c110 socket
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 352 -s 1316
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2284 -parentBuildID 20230927232528 -prefsHandle 2224 -prefMapHandle 2164 -prefsLen 25307 -prefMapSize 239580 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a2a719b5-f369-4b52-b0ba-c60f02424b7d} 5236 "\\.\pipe\gecko-crash-server-pipe.5236" 2017196f110 socket
There are 18 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://85.28.47.31/8405906461a5200c/vcruntime140.dll
85.28.47.31
malicious
http://85.28.47.31/5499d72b3a3e55be.phpV82
unknown
malicious
http://85.28.47.31/8405906461a5200c/softokn3.dll
85.28.47.31
malicious
http://85.28.47.31/8405906461a5200c/nss3.dll
85.28.47.31
malicious
https://basket.mozilla.org/news/subscribe_sms/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://firefox.settings.services.allizom.org/v1/buckets/main/collections/search-config/records
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsusersIncIEEERootCA.cr
unknown
https://spocs.getpocket.com/spocs
unknown
https://firefox.settings.services.allizom.org/v1/buckets/main/collections/search-config/recordshttps
unknown
https://screenshots.firefox.com
unknown
http://185.215.113.19/Vi9leo/index.php
185.215.113.19
https://ads.stickyadstv.com/firefox-etp
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://profiler.firefox.com/
unknown
https://github.com/mozilla-services/screenshots
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://spocs.getpocket.com/userDISCOVERY_STREAM_CONFIG_CHANGE
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
http://exslt.org/common
unknown
https://firefox.settings.services.mozilla.com/v1i
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://ok.ru/
unknown
https://support.mozilla.org/kb/fix-video-audio-problems-firefox-windowsThe
unknown
http://185.215.113.19/Vi9leo/index.php00
unknown
http://85.28.47.31/8405906461a5200c/freebl3.dllT
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://www.google.com/policies/privacy/2
unknown
http://exslt.org/dates-and-times
unknown
https://screenshots.firefox.com/webcompat-reporter
unknown
https://youtube.comQUERY_STRIPPING_STRIP_ON_SHARE
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://www.ecosia.org/newtab/
unknown
https://getpocket.com/
unknown
https://firefox.settings.services.allizom.org/v1/buckets/main/collections/search-config/recordsmr
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://www.youtube.com/accountfingerprinting-annotationsocialtracking-annotation_isMixedActiveConte
unknown
https://www.youtube.com/accountC:
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://firefox.settings.services.mozilla.com/v1i#
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://ebay.comP
unknown
https://www.iqiyi.com/
unknown
https://poczta.interia.pl/mh/?mailto=%s_injectDefaultProtocolHandlersIfNeededCan
unknown
https://monitor.firefox.compictureinpicture.settingsbrowser.migration.versionnetwork.proxy.backup.so
unknown
http://85.28.47.31/8405906461a5200c/freebl3.dllC
unknown
http://fb.me/use-check-prop-typesG
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://fb.me/react-polyfillsP
unknown
http://detectportal.firefox.com/canonical.htmlACTIVITY_SUBTYPE_PROXY_RESPONSE_HEADERACTIVITY_SUBTYPE
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://fb.me/react-polyfillsO
unknown
https://yandex.com
unknown
https://monitor.firefox.com/about
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
http://185.215.113.19/Vi9leo/index.phpcK2
unknown
http://85.28.47.31/5499d72b3a3e55be.php~
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://firefox-source-docs.mozilla.org/remote/Security.html
unknown
https://getpocket.com/recommendationsDisplays
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://vk.com/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingTrying
unknown
https://www.olx.pl/
unknown
https://mail.google.com/mail/?extsrc=mailto&url=%sFailed
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-4
unknown
https://github.com/google/closure-compiler/issues/3177
unknown
http://185.215.113.16/stealc/random.exe395d
unknown
https://support.mozilla.org/kb/firefox-crashes-troubleshoot-prevent-and-get-help
unknown
https://webextensions.settings.services.mozilla.com/v1
unknown
https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query-all.ts
unknown
https://support.mozilla.org/1/firefox/118.0.1/WINNT/en-US/resource:///modules/UrlbarProviderTopSites
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/firefox-relay-integration
unknown
https://addons.mozilla.org/%LOCALE%/firefox/
unknown
https://www.avito.ru/
unknown
http://85.28.47.31S
unknown
http://85.28.47.31/5499d72b3a3e55be.php2
unknown
https://developers.google.com/safe-browsing/v4/advisory
unknown
https://hg.mozilla.org/releases/mozilla-release/rev/68e4c357d26c5a1f075a1ec0c696d4fe684ed881
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
http://poczta.interia.pl/mh/?mailto=%s
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.reddit.com
unknown
malicious
spocs.getpocket.com
unknown
malicious
content-signature-2.cdn.mozilla.net
unknown
malicious
support.mozilla.org
unknown
malicious
firefox.settings.services.mozilla.com
unknown
malicious
push.services.mozilla.com
unknown
malicious
www.youtube.com
unknown
malicious
www.facebook.com
unknown
malicious
detectportal.firefox.com
unknown
malicious
normandy.cdn.mozilla.net
unknown
malicious
shavar.services.mozilla.com
unknown
malicious
www.wikipedia.org
unknown
malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.252.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.1
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
143.204.215.105
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.16.142
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.193.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
There are 20 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
85.28.47.31
unknown
Russian Federation
malicious
185.215.113.16
unknown
Portugal
malicious
185.215.113.19
unknown
Portugal
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
172.217.16.142
youtube-ui.l.google.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{0e3a2c41-cbdd-6993-34a3-0e6fdd691f1f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProgramId
malicious
\REGISTRY\A\{0e3a2c41-cbdd-6993-34a3-0e6fdd691f1f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
FileId
malicious
\REGISTRY\A\{0e3a2c41-cbdd-6993-34a3-0e6fdd691f1f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LowerCaseLongPath
malicious
\REGISTRY\A\{0e3a2c41-cbdd-6993-34a3-0e6fdd691f1f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LongPathHash
malicious
\REGISTRY\A\{0e3a2c41-cbdd-6993-34a3-0e6fdd691f1f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Name
malicious
\REGISTRY\A\{0e3a2c41-cbdd-6993-34a3-0e6fdd691f1f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
OriginalFileName
malicious
\REGISTRY\A\{0e3a2c41-cbdd-6993-34a3-0e6fdd691f1f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Publisher
malicious
\REGISTRY\A\{0e3a2c41-cbdd-6993-34a3-0e6fdd691f1f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Version
malicious
\REGISTRY\A\{0e3a2c41-cbdd-6993-34a3-0e6fdd691f1f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinFileVersion
malicious
\REGISTRY\A\{0e3a2c41-cbdd-6993-34a3-0e6fdd691f1f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinaryType
malicious
\REGISTRY\A\{0e3a2c41-cbdd-6993-34a3-0e6fdd691f1f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProductName
malicious
\REGISTRY\A\{0e3a2c41-cbdd-6993-34a3-0e6fdd691f1f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProductVersion
malicious
\REGISTRY\A\{0e3a2c41-cbdd-6993-34a3-0e6fdd691f1f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LinkDate
malicious
\REGISTRY\A\{0e3a2c41-cbdd-6993-34a3-0e6fdd691f1f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinProductVersion
malicious
\REGISTRY\A\{0e3a2c41-cbdd-6993-34a3-0e6fdd691f1f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
AppxPackageFullName
malicious
\REGISTRY\A\{0e3a2c41-cbdd-6993-34a3-0e6fdd691f1f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
AppxPackageRelativeId
malicious
\REGISTRY\A\{0e3a2c41-cbdd-6993-34a3-0e6fdd691f1f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Size
malicious
\REGISTRY\A\{0e3a2c41-cbdd-6993-34a3-0e6fdd691f1f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Language
malicious
\REGISTRY\A\{0e3a2c41-cbdd-6993-34a3-0e6fdd691f1f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
659e6df34d.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
7bfd2dfdc1.exe
malicious
unknown
C:\Program Files\Mozilla Firefox\firefox.exe|ScreenX
malicious
unknown
C:\Program Files\Mozilla Firefox\firefox.exe|ScreenY
malicious
unknown
C:\Program Files\Mozilla Firefox\firefox.exe|Width
malicious
unknown
C:\Program Files\Mozilla Firefox\firefox.exe|Height
malicious
unknown
C:\Program Files\Mozilla Firefox\firefox.exe|Maximized
malicious
unknown
C:\Program Files\Mozilla Firefox\firefox.exe|Flags
malicious
unknown
C:\Program Files\Mozilla Firefox\firefox.exe|CssToDevPixelScaling
malicious
unknown
C:\Program Files\Mozilla Firefox\firefox.exe|UrlbarCSSSpan
malicious
unknown
C:\Program Files\Mozilla Firefox\firefox.exe|SearchbarCSSSpan
malicious
unknown
C:\Program Files\Mozilla Firefox\firefox.exe|SpringsCSSSpan
malicious
unknown
C:\Program Files\Mozilla Firefox\firefox.exe|ScreenX
malicious
unknown
C:\Program Files\Mozilla Firefox\firefox.exe|ScreenY
malicious
unknown
C:\Program Files\Mozilla Firefox\firefox.exe|Width
malicious
unknown
C:\Program Files\Mozilla Firefox\firefox.exe|Height
malicious
unknown
C:\Program Files\Mozilla Firefox\firefox.exe|UrlbarCSSSpan
malicious
unknown
C:\Program Files\Mozilla Firefox\firefox.exe|SpringsCSSSpan
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
\REGISTRY\A\{05ae0aa0-8fac-9b00-233d-1b07dbc759d6}\Root\InventoryApplicationFile\659e6df34d.exe|f4fe8f4d94b469cf
ProgramId
\REGISTRY\A\{05ae0aa0-8fac-9b00-233d-1b07dbc759d6}\Root\InventoryApplicationFile\659e6df34d.exe|f4fe8f4d94b469cf
FileId
\REGISTRY\A\{05ae0aa0-8fac-9b00-233d-1b07dbc759d6}\Root\InventoryApplicationFile\659e6df34d.exe|f4fe8f4d94b469cf
LowerCaseLongPath
\REGISTRY\A\{05ae0aa0-8fac-9b00-233d-1b07dbc759d6}\Root\InventoryApplicationFile\659e6df34d.exe|f4fe8f4d94b469cf
LongPathHash
\REGISTRY\A\{05ae0aa0-8fac-9b00-233d-1b07dbc759d6}\Root\InventoryApplicationFile\659e6df34d.exe|f4fe8f4d94b469cf
Name
\REGISTRY\A\{05ae0aa0-8fac-9b00-233d-1b07dbc759d6}\Root\InventoryApplicationFile\659e6df34d.exe|f4fe8f4d94b469cf
OriginalFileName
\REGISTRY\A\{05ae0aa0-8fac-9b00-233d-1b07dbc759d6}\Root\InventoryApplicationFile\659e6df34d.exe|f4fe8f4d94b469cf
Publisher
\REGISTRY\A\{05ae0aa0-8fac-9b00-233d-1b07dbc759d6}\Root\InventoryApplicationFile\659e6df34d.exe|f4fe8f4d94b469cf
Version
\REGISTRY\A\{05ae0aa0-8fac-9b00-233d-1b07dbc759d6}\Root\InventoryApplicationFile\659e6df34d.exe|f4fe8f4d94b469cf
BinFileVersion
\REGISTRY\A\{05ae0aa0-8fac-9b00-233d-1b07dbc759d6}\Root\InventoryApplicationFile\659e6df34d.exe|f4fe8f4d94b469cf
BinaryType
\REGISTRY\A\{05ae0aa0-8fac-9b00-233d-1b07dbc759d6}\Root\InventoryApplicationFile\659e6df34d.exe|f4fe8f4d94b469cf
ProductName
\REGISTRY\A\{05ae0aa0-8fac-9b00-233d-1b07dbc759d6}\Root\InventoryApplicationFile\659e6df34d.exe|f4fe8f4d94b469cf
ProductVersion
\REGISTRY\A\{05ae0aa0-8fac-9b00-233d-1b07dbc759d6}\Root\InventoryApplicationFile\659e6df34d.exe|f4fe8f4d94b469cf
LinkDate
\REGISTRY\A\{05ae0aa0-8fac-9b00-233d-1b07dbc759d6}\Root\InventoryApplicationFile\659e6df34d.exe|f4fe8f4d94b469cf
BinProductVersion
\REGISTRY\A\{05ae0aa0-8fac-9b00-233d-1b07dbc759d6}\Root\InventoryApplicationFile\659e6df34d.exe|f4fe8f4d94b469cf
AppxPackageFullName
\REGISTRY\A\{05ae0aa0-8fac-9b00-233d-1b07dbc759d6}\Root\InventoryApplicationFile\659e6df34d.exe|f4fe8f4d94b469cf
AppxPackageRelativeId
\REGISTRY\A\{05ae0aa0-8fac-9b00-233d-1b07dbc759d6}\Root\InventoryApplicationFile\659e6df34d.exe|f4fe8f4d94b469cf
Size
\REGISTRY\A\{05ae0aa0-8fac-9b00-233d-1b07dbc759d6}\Root\InventoryApplicationFile\659e6df34d.exe|f4fe8f4d94b469cf
Language
\REGISTRY\A\{05ae0aa0-8fac-9b00-233d-1b07dbc759d6}\Root\InventoryApplicationFile\659e6df34d.exe|f4fe8f4d94b469cf
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
There are 65 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A81000
unkown
page execute and read and write
malicious
26DA000
heap
page read and write
malicious
6B1000
unkown
page execute and read and write
malicious
2578000
heap
page read and write
malicious
267A000
heap
page read and write
malicious
4E50000
direct allocation
page read and write
malicious
4EC0000
direct allocation
page read and write
malicious
8B1000
unkown
page execute and read and write
malicious
8B1000
unkown
page execute and read and write
malicious
5260000
direct allocation
page read and write
malicious
571000
unkown
page execute and read and write
malicious
4840000
direct allocation
page read and write
malicious
5200000
direct allocation
page read and write
malicious
2567000
heap
page read and write
malicious
8B1000
unkown
page execute and read and write
malicious
5080000
direct allocation
page read and write
malicious
5270000
direct allocation
page read and write
malicious
6B1000
unkown
page execute and read and write
malicious
25B4994C000
trusted library allocation
page read and write
2018AFC5000
trusted library allocation
page read and write
13E4000
heap
page read and write
25B4DD16000
trusted library allocation
page read and write
2017D482000
trusted library allocation
page read and write
53C0000
direct allocation
page execute and read and write
2018C658000
trusted library allocation
page read and write
6561000
heap
page read and write
25B3ED27000
heap
page read and write
25B3ED2D000
heap
page read and write
20178753000
heap
page read and write
116E000
stack
page read and write
2018161F000
trusted library allocation
page read and write
2017D47D000
trusted library allocation
page read and write
25B45800000
trusted library allocation
page read and write
25B467DB000
trusted library allocation
page read and write
6561000
heap
page read and write
13E4000
heap
page read and write
68A1000
heap
page read and write
20180982000
trusted library allocation
page read and write
2017E1E4000
trusted library allocation
page read and write
20185196000
trusted library allocation
page read and write
1E076307000
heap
page read and write
201810A9000
trusted library allocation
page read and write
25B4804C000
trusted library allocation
page read and write
229F7000
heap
page read and write
2018BFD0000
trusted library allocation
page read and write
2018BF87000
trusted library allocation
page read and write
2018A830000
trusted library allocation
page read and write
2017FB09000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B4ADF9000
trusted library allocation
page read and write
201881FB000
trusted library allocation
page read and write
201801C0000
trusted library allocation
page read and write
2017F96D000
trusted library allocation
page read and write
20181071000
trusted library allocation
page read and write
6561000
heap
page read and write
2018183E000
trusted library allocation
page read and write
2018B678000
trusted library allocation
page read and write
2017DBF8000
trusted library allocation
page read and write
2374325B000
trusted library allocation
page read and write
201812E2000
trusted library allocation
page read and write
20180950000
trusted library allocation
page read and write
6494000
heap
page read and write
25B47F6F000
trusted library allocation
page read and write
25B444F7000
trusted library allocation
page read and write
2018818D000
trusted library allocation
page read and write
25B497D9000
trusted library allocation
page read and write
117A000
heap
page read and write
68A1000
heap
page read and write
53D0000
direct allocation
page execute and read and write
2018BFA0000
trusted library allocation
page read and write
2017FBE0000
trusted library allocation
page read and write
42A0000
heap
page read and write
5AD000
unkown
page execute and read and write
2018AFA5000
trusted library allocation
page read and write
6561000
heap
page read and write
2018C2AA000
trusted library allocation
page read and write
2018A6B3000
trusted library allocation
page read and write
2018BBB9000
trusted library allocation
page read and write
2018ABF0000
trusted library allocation
page read and write
2018A135000
trusted library allocation
page read and write
2018A7E2000
trusted library allocation
page read and write
2F2F000
stack
page read and write
201881F9000
trusted library allocation
page read and write
53E0000
direct allocation
page execute and read and write
20181664000
trusted library allocation
page read and write
25B4AA1C000
trusted library allocation
page read and write
2018BAAA000
trusted library allocation
page read and write
329E000
stack
page read and write
25B49A9B000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018A598000
trusted library allocation
page read and write
25B4AC00000
trusted library allocation
page read and write
2018BA82000
trusted library allocation
page read and write
25B48006000
trusted library allocation
page read and write
144E000
heap
page read and write
2017E5BE000
trusted library allocation
page read and write
25B3ED34000
heap
page read and write
20178722000
heap
page read and write
12F4000
heap
page read and write
25B445C4000
trusted library allocation
page read and write
6561000
heap
page read and write
2C10000
direct allocation
page read and write
2018A549000
trusted library allocation
page read and write
6E9D000
stack
page read and write
414000
heap
page read and write
25B45D00000
trusted library allocation
page read and write
6561000
heap
page read and write
25B47F2B000
trusted library allocation
page read and write
2018BCAC000
trusted library allocation
page read and write
2018A2C9000
trusted library allocation
page read and write
5260000
direct allocation
page execute and read and write
25B44110000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018A5D6000
trusted library allocation
page read and write
1430000
direct allocation
page read and write
6561000
heap
page read and write
13E4000
heap
page read and write
2018A62A000
trusted library allocation
page read and write
25B3ED35000
heap
page read and write
2018AF2B000
trusted library allocation
page read and write
6561000
heap
page read and write
25B50F43000
trusted library allocation
page read and write
2017F94E000
trusted library allocation
page read and write
2018CA36000
trusted library allocation
page read and write
25B4369E000
trusted library allocation
page read and write
12D0000
heap
page read and write
13E5000
heap
page read and write
201786E0000
heap
page read and write
25B3ED21000
heap
page read and write
2017D446000
trusted library allocation
page read and write
309000
stack
page read and write
2018860B000
trusted library allocation
page read and write
2018BCE0000
trusted library allocation
page read and write
20182D9C000
trusted library allocation
page read and write
BC2CDBE000
stack
page read and write
2409000
heap
page read and write
FFA000
unkown
page execute and read and write
2018A583000
trusted library allocation
page read and write
6561000
heap
page read and write
25B496EC000
trusted library allocation
page read and write
24F8000
heap
page read and write
20178741000
heap
page read and write
2018A6BA000
trusted library allocation
page read and write
2018AB56000
trusted library allocation
page read and write
25B496E7000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018A8B7000
trusted library allocation
page read and write
891000
unkown
page execute and write copy
3BEE000
stack
page read and write
20187FD3000
trusted library allocation
page read and write
2550000
heap
page read and write
25B467B1000
trusted library allocation
page read and write
22ADB000
heap
page read and write
25B46108000
trusted library allocation
page read and write
2018AC28000
trusted library allocation
page read and write
20178733000
heap
page read and write
2017872B000
heap
page read and write
2017E11B000
trusted library allocation
page read and write
201810AA000
trusted library allocation
page read and write
229F1000
heap
page read and write
2017FEB6000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018186E000
trusted library allocation
page read and write
25B48B90000
trusted library allocation
page read and write
6463000
heap
page read and write
2018A7EA000
trusted library allocation
page read and write
20187EB9000
trusted library allocation
page read and write
201806AA000
trusted library allocation
page read and write
27BD000
heap
page read and write
20187E3C000
trusted library allocation
page read and write
25B49AB3000
trusted library allocation
page read and write
2018BB66000
trusted library allocation
page read and write
201786F5000
heap
page read and write
2018BC77000
trusted library allocation
page read and write
25B3ED3E000
heap
page read and write
6561000
heap
page read and write
201818EB000
trusted library allocation
page read and write
2018067A000
trusted library allocation
page read and write
2018BA8E000
trusted library allocation
page read and write
2018112C000
trusted library allocation
page read and write
20190783000
trusted library allocation
page read and write
201786FD000
heap
page read and write
3D3F000
stack
page read and write
439F000
stack
page read and write
37EF000
stack
page read and write
25B3ED46000
heap
page read and write
201786F5000
heap
page read and write
25B50FD8000
trusted library allocation
page read and write
6280000
heap
page read and write
20178751000
heap
page read and write
68A1000
heap
page read and write
2017872B000
heap
page read and write
2017D960000
trusted library allocation
page read and write
25B480D7000
trusted library allocation
page read and write
338F000
stack
page read and write
25B45940000
heap
page read and write
25B49A4A000
trusted library allocation
page read and write
20183AD7000
trusted library allocation
page read and write
20181810000
trusted library allocation
page read and write
6561000
heap
page read and write
25B37E40000
heap
page read and write
912000
unkown
page execute and read and write
5220000
direct allocation
page execute and read and write
414000
heap
page read and write
2017FBD0000
trusted library allocation
page read and write
2018512C000
trusted library allocation
page read and write
25B4DD1E000
trusted library allocation
page read and write
25B488EA000
trusted library allocation
page read and write
414000
heap
page read and write
2018C836000
trusted library allocation
page read and write
68A1000
heap
page read and write
2C10000
direct allocation
page read and write
2017FC6A000
trusted library allocation
page read and write
25B453EF000
trusted library allocation
page read and write
6561000
heap
page read and write
1527000
heap
page read and write
40A0000
direct allocation
page execute and read and write
401000
unkown
page execute read
68A1000
heap
page read and write
201812E1000
trusted library allocation
page read and write
68A1000
heap
page read and write
1124000
heap
page read and write
20181815000
trusted library allocation
page read and write
13E4000
heap
page read and write
2018816A000
trusted library allocation
page read and write
20178744000
heap
page read and write
284F000
stack
page read and write
4C4000
unkown
page execute and read and write
4A40000
direct allocation
page execute and read and write
2018862B000
trusted library allocation
page read and write
2017872F000
heap
page read and write
25B480A1000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018B9D6000
trusted library allocation
page read and write
2018861B000
trusted library allocation
page read and write
51CF000
stack
page read and write
201812E6000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B49517000
trusted library allocation
page read and write
20181697000
trusted library allocation
page read and write
20187EEB000
trusted library allocation
page read and write
201786E7000
heap
page read and write
25B484C0000
trusted library section
page read and write
25B48D00000
trusted library allocation
page read and write
2017D3FE000
trusted library allocation
page read and write
2018518F000
trusted library allocation
page read and write
20181123000
trusted library allocation
page read and write
2018BAF7000
trusted library allocation
page read and write
25B3ED44000
heap
page read and write
2018AFC7000
trusted library allocation
page read and write
2017FEB2000
trusted library allocation
page read and write
2018119A000
trusted library allocation
page read and write
25B39BF8000
heap
page read and write
201786F5000
heap
page read and write
25B3ED35000
heap
page read and write
201812C9000
trusted library allocation
page read and write
201812DF000
trusted library allocation
page read and write
13E4000
heap
page read and write
2017F95D000
trusted library allocation
page read and write
2CD0000
direct allocation
page read and write
7FC000
unkown
page execute and read and write
285E000
stack
page read and write
347F000
stack
page read and write
6561000
heap
page read and write
68A1000
heap
page read and write
414000
heap
page read and write
25B3ED2A000
heap
page read and write
68A1000
heap
page read and write
25B45489000
trusted library allocation
page read and write
2018BCCE000
trusted library allocation
page read and write
25B4993F000
trusted library allocation
page read and write
22A03000
heap
page read and write
25B49A45000
trusted library allocation
page read and write
25DAEE11000
trusted library allocation
page read and write
25DAEC94000
trusted library allocation
page read and write
6561000
heap
page read and write
25B4934F000
trusted library allocation
page read and write
2017874A000
heap
page read and write
68A1000
heap
page read and write
401E000
stack
page read and write
201786F5000
heap
page read and write
13E0000
direct allocation
page read and write
25B52B75000
trusted library allocation
page read and write
1C920000
heap
page read and write
68A1000
heap
page read and write
6561000
heap
page read and write
2018BF5F000
trusted library allocation
page read and write
201786FD000
heap
page read and write
201812DC000
trusted library allocation
page read and write
20187ED4000
trusted library allocation
page read and write
43A1000
heap
page read and write
414000
heap
page read and write
1F1B000
heap
page read and write
6561000
heap
page read and write
2018B615000
trusted library allocation
page read and write
2017F8E3000
trusted library allocation
page read and write
2017F975000
trusted library allocation
page read and write
20183A79000
trusted library allocation
page read and write
2018A7FC000
trusted library allocation
page read and write
2018AFAE000
trusted library allocation
page read and write
6561000
heap
page read and write
4D81000
heap
page read and write
6561000
heap
page read and write
201881C0000
trusted library allocation
page read and write
2018117E000
trusted library allocation
page read and write
2017874B000
heap
page read and write
25DAEAAA000
heap
page read and write
201786E8000
heap
page read and write
201786F5000
heap
page read and write
2017E17E000
trusted library allocation
page read and write
6561000
heap
page read and write
2017872B000
heap
page read and write
13E4000
heap
page read and write
68A1000
heap
page read and write
6561000
heap
page read and write
8533000
heap
page read and write
25B47E03000
trusted library allocation
page read and write
20188E0C000
trusted library allocation
page read and write
25B50F47000
trusted library allocation
page read and write
25B3ED2F000
heap
page read and write
91B000
unkown
page execute and read and write
25B52B36000
trusted library allocation
page read and write
68A1000
heap
page read and write
CEF000
stack
page read and write
6E400FE000
stack
page read and write
229F2000
heap
page read and write
25B3ED50000
heap
page read and write
20185189000
trusted library allocation
page read and write
25B4ADC2000
trusted library allocation
page read and write
201880ED000
trusted library allocation
page read and write
25B441E3000
trusted library allocation
page read and write
20189B91000
trusted library allocation
page read and write
2017F877000
trusted library allocation
page read and write
20190352000
trusted library allocation
page read and write
201813FD000
trusted library allocation
page read and write
4A11000
heap
page read and write
2017FEAD000
trusted library allocation
page read and write
20187E72000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018CA9E000
trusted library allocation
page read and write
25B47F4F000
trusted library allocation
page read and write
2017FC6A000
trusted library allocation
page read and write
25B436CD000
trusted library allocation
page read and write
201816A3000
trusted library allocation
page read and write
20178725000
heap
page read and write
414000
heap
page read and write
AAC157E000
unkown
page readonly
20181160000
trusted library allocation
page read and write
2018186B000
trusted library allocation
page read and write
20178781000
heap
page read and write
2017874B000
heap
page read and write
20178724000
heap
page read and write
20182DA9000
trusted library allocation
page read and write
414000
heap
page read and write
6561000
heap
page read and write
2018181D000
trusted library allocation
page read and write
68A1000
heap
page read and write
201810E5000
trusted library allocation
page read and write
201786E7000
heap
page read and write
68A1000
heap
page read and write
5340000
direct allocation
page execute and read and write
25B48100000
trusted library allocation
page read and write
6561000
heap
page read and write
21E6000
heap
page read and write
356F000
stack
page read and write
20181154000
trusted library allocation
page read and write
25B444EA000
trusted library allocation
page read and write
25B44545000
trusted library allocation
page read and write
1C37F000
stack
page read and write
2018BC7D000
trusted library allocation
page read and write
22A03000
heap
page read and write
20178725000
heap
page read and write
2018ACF4000
trusted library allocation
page read and write
414000
heap
page read and write
20181BCF000
trusted library allocation
page read and write
2018092F000
trusted library allocation
page read and write
1CB5E000
stack
page read and write
2017D4C3000
trusted library allocation
page read and write
201851FA000
trusted library allocation
page read and write
20183756000
trusted library allocation
page read and write
25B48203000
trusted library allocation
page read and write
201818B0000
trusted library allocation
page read and write
25B441B4000
trusted library allocation
page read and write
25B49769000
trusted library allocation
page read and write
25B48099000
trusted library allocation
page read and write
98B000
unkown
page execute and read and write
414000
heap
page read and write
25B4AA03000
trusted library allocation
page read and write
117E000
heap
page read and write
414000
heap
page read and write
2F9F000
stack
page read and write
2018AF43000
trusted library allocation
page read and write
2018AFEB000
trusted library allocation
page read and write
5E00000
heap
page read and write
25B50E39000
trusted library allocation
page read and write
25B47D57000
trusted library allocation
page read and write
20178702000
heap
page read and write
25B4DD18000
trusted library allocation
page read and write
20178729000
heap
page read and write
6561000
heap
page read and write
25F3000
heap
page read and write
25B3ED44000
heap
page read and write
4BF1000
heap
page read and write
201881C3000
trusted library allocation
page read and write
6561000
heap
page read and write
229F7000
heap
page read and write
35FE000
stack
page read and write
4C9F000
stack
page read and write
1E076665000
heap
page read and write
25B43767000
trusted library allocation
page read and write
20188613000
trusted library allocation
page read and write
201851F6000
trusted library allocation
page read and write
AAC14FE000
unkown
page readonly
2017F967000
trusted library allocation
page read and write
25B50E75000
trusted library allocation
page read and write
2018ACF7000
trusted library allocation
page read and write
25B4416A000
trusted library allocation
page read and write
13E4000
heap
page read and write
25B48701000
trusted library allocation
page read and write
201811DB000
trusted library allocation
page read and write
2017D446000
trusted library allocation
page read and write
25B444E8000
trusted library allocation
page read and write
4DC1000
heap
page read and write
25B480D0000
trusted library allocation
page read and write
414000
heap
page read and write
4A60000
direct allocation
page execute and read and write
2017873C000
heap
page read and write
25B3ED2A000
heap
page read and write
2019028C000
trusted library allocation
page read and write
5B9E000
stack
page read and write
68A1000
heap
page read and write
163A000
heap
page read and write
20181038000
trusted library allocation
page read and write
4B5E000
stack
page read and write
20189C71000
trusted library allocation
page read and write
2018817C000
trusted library allocation
page read and write
13E4000
heap
page read and write
2018C62E000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B37D50000
heap
page readonly
BC2C8FE000
stack
page read and write
25B48B18000
trusted library allocation
page read and write
2018BC29000
trusted library allocation
page read and write
201786E7000
heap
page read and write
2017FE94000
trusted library allocation
page read and write
201903E4000
trusted library allocation
page read and write
2018128B000
trusted library allocation
page read and write
25B3ED44000
heap
page read and write
20187E91000
trusted library allocation
page read and write
20178702000
heap
page read and write
40EE000
stack
page read and write
1C59E000
stack
page read and write
25B4AE1F000
trusted library allocation
page read and write
6561000
heap
page read and write
BC2C7BD000
stack
page read and write
25DAEE20000
trusted library allocation
page read and write
539F000
stack
page read and write
25B52B6C000
trusted library allocation
page read and write
20189D53000
trusted library allocation
page read and write
68A1000
heap
page read and write
2017D466000
trusted library allocation
page read and write
374F000
stack
page read and write
4B5F000
stack
page read and write
2018A783000
trusted library allocation
page read and write
25B49691000
trusted library allocation
page read and write
6561000
heap
page read and write
201813B8000
trusted library allocation
page read and write
25B50ED0000
trusted library allocation
page read and write
201812E4000
trusted library allocation
page read and write
25B458CA000
trusted library allocation
page read and write
25B3ED1C000
heap
page read and write
25B52B56000
trusted library allocation
page read and write
201851DF000
trusted library allocation
page read and write
2018BCE0000
trusted library allocation
page read and write
6561000
heap
page read and write
324E000
stack
page read and write
25B47F48000
trusted library allocation
page read and write
201786E7000
heap
page read and write
6E408FE000
unkown
page readonly
25B4AD93000
trusted library allocation
page read and write
20178782000
heap
page read and write
261A000
heap
page read and write
25B499BC000
trusted library allocation
page read and write
6561000
heap
page read and write
2017D098000
trusted library allocation
page read and write
704000
heap
page read and write
2D5E000
stack
page read and write
68A1000
heap
page read and write
68A1000
heap
page read and write
6561000
heap
page read and write
20189EE8000
trusted library allocation
page read and write
13E4000
heap
page read and write
6561000
heap
page read and write
25B50E90000
trusted library allocation
page read and write
20189B88000
trusted library allocation
page read and write
229F7000
heap
page read and write
201837EA000
trusted library allocation
page read and write
25B4980A000
trusted library allocation
page read and write
6E3F7FE000
unkown
page readonly
3CEF000
stack
page read and write
2017FBD0000
trusted library allocation
page read and write
201812DF000
trusted library allocation
page read and write
13E4000
heap
page read and write
25B47F4B000
trusted library allocation
page read and write
20185159000
trusted library allocation
page read and write
66A5000
heap
page read and write
4A11000
heap
page read and write
2017D090000
trusted library allocation
page read and write
25B4417D000
trusted library allocation
page read and write
25B47F6F000
trusted library allocation
page read and write
25DAEC23000
trusted library allocation
page read and write
68A1000
heap
page read and write
378E000
stack
page read and write
201881F7000
trusted library allocation
page read and write
6B6F000
stack
page read and write
25B480D0000
trusted library allocation
page read and write
2018104D000
trusted library allocation
page read and write
5420000
direct allocation
page execute and read and write
145E000
heap
page read and write
2018A7FA000
trusted library allocation
page read and write
20187E04000
trusted library allocation
page read and write
2018819A000
trusted library allocation
page read and write
2017D32F000
trusted library allocation
page read and write
201881FA000
trusted library allocation
page read and write
20181631000
trusted library allocation
page read and write
2017872F000
heap
page read and write
6E409BE000
stack
page read and write
6561000
heap
page read and write
20180DF3000
trusted library allocation
page read and write
2C10000
direct allocation
page read and write
25B5401D000
trusted library allocation
page read and write
2018162A000
trusted library allocation
page read and write
2017FC2A000
trusted library allocation
page read and write
25B4804C000
trusted library allocation
page read and write
48DF000
stack
page read and write
20189C70000
trusted library allocation
page read and write
201881A9000
trusted library allocation
page read and write
2018A7C7000
trusted library allocation
page read and write
866000
unkown
page execute and read and write
4D81000
heap
page read and write
20178781000
heap
page read and write
414000
heap
page read and write
20185179000
trusted library allocation
page read and write
39DF000
stack
page read and write
6CA7D000
unkown
page readonly
2017E5BE000
trusted library allocation
page read and write
6561000
heap
page read and write
2018BCBE000
trusted library allocation
page read and write
2017872F000
heap
page read and write
3FDF000
stack
page read and write
BCB000
unkown
page execute and read and write
201880C1000
trusted library allocation
page read and write
25B3ED2F000
heap
page read and write
1ADDDFF000
stack
page read and write
20181097000
trusted library allocation
page read and write
2017D45E000
trusted library allocation
page read and write
201813B5000
trusted library allocation
page read and write
201881FA000
trusted library allocation
page read and write
2017FB13000
trusted library allocation
page read and write
2018118F000
trusted library allocation
page read and write
2018AC82000
trusted library allocation
page read and write
6561000
heap
page read and write
2EDE0000
heap
page read and write
13E4000
heap
page read and write
1C40E000
stack
page read and write
6561000
heap
page read and write
2018C314000
trusted library allocation
page read and write
25B47F6F000
trusted library allocation
page read and write
20183762000
trusted library allocation
page read and write
2018816A000
trusted library allocation
page read and write
2018BAAF000
trusted library allocation
page read and write
68A1000
heap
page read and write
112E000
heap
page read and write
25B445AF000
trusted library allocation
page read and write
201811A8000
trusted library allocation
page read and write
2018B9C5000
trusted library allocation
page read and write
6561000
heap
page read and write
4D81000
heap
page read and write
68A1000
heap
page read and write
201881C3000
trusted library allocation
page read and write
2018A6FB000
trusted library allocation
page read and write
487F000
stack
page read and write
2018509D000
trusted library allocation
page read and write
6561000
heap
page read and write
25B4F000000
trusted library allocation
page read and write
7190000
heap
page read and write
201786E2000
heap
page read and write
20178723000
heap
page read and write
25B4672C000
trusted library allocation
page read and write
25B49A17000
trusted library allocation
page read and write
25B480F8000
trusted library allocation
page read and write
25B437F1000
trusted library allocation
page read and write
BC2C77A000
stack
page read and write
68A1000
heap
page read and write
201786F5000
heap
page read and write
28A40000
heap
page read and write
13E4000
heap
page read and write
2017870E000
heap
page read and write
13E4000
heap
page read and write
212DEE40000
heap
page read and write
68A1000
heap
page read and write
2018ACCA000
trusted library allocation
page read and write
BC2C73B000
stack
page read and write
2017D09E000
trusted library allocation
page read and write
25B458FE000
trusted library allocation
page read and write
201818BA000
trusted library allocation
page read and write
20178723000
heap
page read and write
25B49903000
trusted library allocation
page read and write
25B480C9000
trusted library allocation
page read and write
4D81000
heap
page read and write
20178729000
heap
page read and write
25B4DD1A000
trusted library allocation
page read and write
201786E2000
heap
page read and write
25B499C4000
trusted library allocation
page read and write
68A1000
heap
page read and write
20181637000
trusted library allocation
page read and write
1A2F000
stack
page read and write
BC263FF000
stack
page read and write
20178734000
heap
page read and write
2018BBC7000
trusted library allocation
page read and write
25B51A1B000
trusted library allocation
page read and write
6561000
heap
page read and write
1E076300000
heap
page read and write
1340000
heap
page read and write
24BE000
stack
page read and write
20178725000
heap
page read and write
2018AF82000
trusted library allocation
page read and write
25DAEE17000
trusted library allocation
page read and write
20187E8B000
trusted library allocation
page read and write
25DAEC97000
trusted library allocation
page read and write
20178750000
heap
page read and write
BC245FF000
stack
page read and write
6561000
heap
page read and write
20189AE7000
trusted library allocation
page read and write
68A1000
heap
page read and write
5340000
direct allocation
page execute and read and write
25B4AD6C000
trusted library allocation
page read and write
25DAEC5D000
trusted library allocation
page read and write
25B3ED52000
heap
page read and write
2018A69E000
trusted library allocation
page read and write
1F84000
heap
page read and write
20178734000
heap
page read and write
DB000
stack
page read and write
25DAED80000
heap
page read and write
25B3ED1C000
heap
page read and write
2018BC50000
trusted library allocation
page read and write
25B458CA000
trusted library allocation
page read and write
2018BDE4000
trusted library allocation
page read and write
20178746000
heap
page read and write
2018AFDE000
trusted library allocation
page read and write
212DF00A000
trusted library allocation
page read and write
13E4000
heap
page read and write
1E077E2D000
heap
page read and write
229DB000
heap
page read and write
13E4000
heap
page read and write
229F7000
heap
page read and write
2018A5A7000
trusted library allocation
page read and write
2017E548000
trusted library allocation
page read and write
201851F6000
trusted library allocation
page read and write
2018BAE6000
trusted library allocation
page read and write
2018BD99000
trusted library allocation
page read and write
20190400000
trusted library allocation
page read and write
25B4AA05000
trusted library allocation
page read and write
6561000
heap
page read and write
25B5400C000
trusted library allocation
page read and write
4D81000
heap
page read and write
6561000
heap
page read and write
25B50C54000
trusted library allocation
page read and write
49F000
unkown
page execute and read and write
2018AF0F000
trusted library allocation
page read and write
2017872B000
heap
page read and write
1DEBC2B04000
trusted library allocation
page read and write
25B3ED50000
heap
page read and write
2017FB63000
trusted library allocation
page read and write
13E4000
heap
page read and write
25B467CB000
trusted library allocation
page read and write
25DAED86000
heap
page read and write
201811A5000
trusted library allocation
page read and write
201811E1000
trusted library allocation
page read and write
25B46747000
trusted library allocation
page read and write
20188198000
trusted library allocation
page read and write
9B8000
unkown
page execute and read and write
6561000
heap
page read and write
25B4EE00000
trusted library allocation
page read and write
13E4000
heap
page read and write
2017F96D000
trusted library allocation
page read and write
201881C0000
trusted library allocation
page read and write
25B49ACB000
trusted library allocation
page read and write
201786E0000
heap
page read and write
AE0000
direct allocation
page read and write
2018BBFC000
trusted library allocation
page read and write
25B480D3000
trusted library allocation
page read and write
2018185E000
trusted library allocation
page read and write
25B37D20000
trusted library allocation
page read and write
4D81000
heap
page read and write
2017D480000
trusted library allocation
page read and write
13E4000
heap
page read and write
2C10000
direct allocation
page read and write
25B48045000
trusted library allocation
page read and write
2017E0BD000
trusted library allocation
page read and write
201850CE000
trusted library allocation
page read and write
20187E2D000
trusted library allocation
page read and write
7D8E000
stack
page read and write
6561000
heap
page read and write
314BEC204000
trusted library allocation
page read and write
2017D4A4000
trusted library allocation
page read and write
2018AC2F000
trusted library allocation
page read and write
A35000
unkown
page execute and read and write
244C000
unkown
page readonly
201786E0000
heap
page read and write
2018A188000
trusted library allocation
page read and write
41B0000
heap
page read and write
68A1000
heap
page read and write
5040000
direct allocation
page execute and read and write
68A1000
heap
page read and write
2017FE2A000
trusted library allocation
page read and write
537C000
stack
page read and write
2017E5C7000
trusted library allocation
page read and write
2018A5DF000
trusted library allocation
page read and write
201786E1000
heap
page read and write
49C0000
direct allocation
page execute and read and write
25B48800000
trusted library allocation
page read and write
6561000
heap
page read and write
25B46769000
trusted library allocation
page read and write
B50000
heap
page read and write
201885EA000
trusted library allocation
page read and write
2017D960000
trusted library allocation
page read and write
2017DCA4000
trusted library allocation
page read and write
6561000
heap
page read and write
2018B623000
trusted library allocation
page read and write
25B3ED2A000
heap
page read and write
25DAED20000
unclassified section
page readonly
2017D4A4000
trusted library allocation
page read and write
BE8B3804000
trusted library allocation
page read and write
68A1000
heap
page read and write
20189D43000
trusted library allocation
page read and write
235E000
heap
page read and write
20181349000
trusted library allocation
page read and write
25B3ED0E000
heap
page read and write
3157000
heap
page read and write
25B453B9000
trusted library allocation
page read and write
20189AB8000
trusted library allocation
page read and write
6561000
heap
page read and write
414000
heap
page read and write
201816EC000
trusted library allocation
page read and write
414000
heap
page read and write
5BDD000
stack
page read and write
6561000
heap
page read and write
20182A30000
trusted library allocation
page read and write
201816AF000
trusted library allocation
page read and write
20178704000
heap
page read and write
2018185B000
trusted library allocation
page read and write
25B45520000
trusted library allocation
page read and write
681F000
stack
page read and write
2018114D000
trusted library allocation
page read and write
25B4A9E2000
trusted library allocation
page read and write
BC2473B000
stack
page read and write
4D81000
heap
page read and write
6561000
heap
page read and write
229F4000
heap
page read and write
201810B9000
trusted library allocation
page read and write
2017875E000
heap
page read and write
28B29000
heap
page read and write
25B48947000
trusted library allocation
page read and write
22A07000
heap
page read and write
20178723000
heap
page read and write
201786FC000
heap
page read and write
201812E6000
trusted library allocation
page read and write
2017D9BE000
trusted library allocation
page read and write
B8D000
heap
page read and write
385F000
stack
page read and write
20178704000
heap
page read and write
12F4000
heap
page read and write
6B0000
unkown
page read and write
2018BC57000
trusted library allocation
page read and write
25B47B33000
trusted library allocation
page read and write
2018BA82000
trusted library allocation
page read and write
411F000
stack
page read and write
25B436F9000
trusted library allocation
page read and write
68A1000
heap
page read and write
2374325D000
trusted library allocation
page read and write
414000
heap
page read and write
201786FC000
heap
page read and write
68A1000
heap
page read and write
13E4000
heap
page read and write
201786E0000
heap
page read and write
68A1000
heap
page read and write
2018AFE2000
trusted library allocation
page read and write
2018BD51000
trusted library allocation
page read and write
20180940000
trusted library allocation
page read and write
20187E15000
trusted library allocation
page read and write
20181091000
trusted library allocation
page read and write
25B3ED40000
heap
page read and write
2017E5C7000
trusted library allocation
page read and write
201818EB000
trusted library allocation
page read and write
2018BF87000
trusted library allocation
page read and write
4F64000
direct allocation
page execute and read and write
2017D32F000
trusted library allocation
page read and write
3B1E000
stack
page read and write
2017870E000
heap
page read and write
25B43803000
trusted library allocation
page read and write
2017E013000
trusted library allocation
page read and write
201811A5000
trusted library allocation
page read and write
1C64F000
stack
page read and write
25B437EF000
trusted library allocation
page read and write
4FF0000
direct allocation
page execute and read and write
6561000
heap
page read and write
13E4000
heap
page read and write
20185159000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018813D000
trusted library allocation
page read and write
6561000
heap
page read and write
20188153000
trusted library allocation
page read and write
2018BD6B000
trusted library allocation
page read and write
2017E5A9000
trusted library allocation
page read and write
201786EB000
heap
page read and write
2EE07000
heap
page read and write
5AAF000
stack
page read and write
2018BDA3000
trusted library allocation
page read and write
201812D5000
trusted library allocation
page read and write
2017E561000
trusted library allocation
page read and write
375E000
stack
page read and write
2018AC4A000
trusted library allocation
page read and write
68A1000
heap
page read and write
68A1000
heap
page read and write
25B47B93000
trusted library allocation
page read and write
2018C2F6000
trusted library allocation
page read and write
20189A05000
trusted library allocation
page read and write
20178727000
heap
page read and write
2205000
heap
page read and write
1430000
direct allocation
page read and write
23B6000
heap
page read and write
20181183000
trusted library allocation
page read and write
6561000
heap
page read and write
BAF000
heap
page read and write
212DED00000
heap
page read and write
13E5000
heap
page read and write
4D81000
heap
page read and write
2017E0AD000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B480D7000
trusted library allocation
page read and write
20188599000
trusted library allocation
page read and write
201812B5000
trusted library allocation
page read and write
414000
heap
page read and write
201806EF000
trusted library allocation
page read and write
25B4DD1C000
trusted library allocation
page read and write
25B458BF000
trusted library allocation
page read and write
4C4000
unkown
page execute and read and write
13E4000
heap
page read and write
704000
heap
page read and write
20183A9D000
trusted library allocation
page read and write
2017FEB6000
trusted library allocation
page read and write
6561000
heap
page read and write
414000
heap
page read and write
25B37AB0000
heap
page read and write
6E3DFD8000
stack
page read and write
704000
heap
page read and write
25B4808D000
trusted library allocation
page read and write
25B4988C000
trusted library allocation
page read and write
25B480A1000
trusted library allocation
page read and write
68A1000
heap
page read and write
201902EE000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
2018A6D9000
trusted library allocation
page read and write
201816EC000
trusted library allocation
page read and write
20178713000
heap
page read and write
254C000
heap
page read and write
B75000
unkown
page execute and read and write
68A1000
heap
page read and write
201786F5000
heap
page read and write
25B48230000
trusted library allocation
page read and write
201881C0000
trusted library allocation
page read and write
FC0000
heap
page read and write
5280000
heap
page read and write
20178741000
heap
page read and write
13E4000
heap
page read and write
2018A6A2000
trusted library allocation
page read and write
2017FEAD000
trusted library allocation
page read and write
6AB6000
heap
page read and write
2017D9BE000
trusted library allocation
page read and write
890000
unkown
page execute and write copy
1C81E000
stack
page read and write
20178722000
heap
page read and write
414000
heap
page read and write
20178725000
heap
page read and write
6561000
heap
page read and write
1C960000
heap
page read and write
2540000
heap
page read and write
25B4DD2C000
trusted library allocation
page read and write
20180160000
trusted library allocation
page read and write
2018A2EE000
trusted library allocation
page read and write
6B0000
unkown
page readonly
BC24BEF000
stack
page read and write
20178726000
heap
page read and write
2018BA5E000
trusted library allocation
page read and write
201786E9000
heap
page read and write
25DAEC7D000
trusted library allocation
page read and write
2018C5B9000
trusted library allocation
page read and write
1E0762DA000
heap
page read and write
2018BBC6000
trusted library allocation
page read and write
25DF000
heap
page read and write
20182A14000
trusted library allocation
page read and write
6561000
heap
page read and write
201881C8000
trusted library allocation
page read and write
20187E78000
trusted library allocation
page read and write
4EB0000
direct allocation
page read and write
2018C2F6000
trusted library allocation
page read and write
201786E4000
heap
page read and write
2017FE33000
trusted library allocation
page read and write
20181629000
trusted library allocation
page read and write
68A1000
heap
page read and write
45EE000
stack
page read and write
49D1000
heap
page read and write
201880B1000
trusted library allocation
page read and write
25B48B0D000
trusted library allocation
page read and write
6561000
heap
page read and write
20178739000
heap
page read and write
2EC0D000
stack
page read and write
6561000
heap
page read and write
201806B6000
trusted library allocation
page read and write
2592000
heap
page read and write
68A1000
heap
page read and write
68A1000
heap
page read and write
20178702000
heap
page read and write
4D81000
heap
page read and write
BC2CD3F000
stack
page read and write
AEB000
unkown
page execute and read and write
25B48D3C000
trusted library allocation
page read and write
25B3ED2F000
heap
page read and write
2017D46D000
trusted library allocation
page read and write
25B47F94000
trusted library allocation
page read and write
2018BC06000
trusted library allocation
page read and write
2017D9A5000
trusted library allocation
page read and write
2017873D000
heap
page read and write
2018379D000
trusted library allocation
page read and write
427000
unkown
page write copy
414000
heap
page read and write
2018B6EB000
trusted library allocation
page read and write
201811DA000
trusted library allocation
page read and write
201818E7000
trusted library allocation
page read and write
25B47FF5000
trusted library allocation
page read and write
68A1000
heap
page read and write
5250000
direct allocation
page execute and read and write
20189B7F000
trusted library allocation
page read and write
20178726000
heap
page read and write
68A1000
heap
page read and write
25B48239000
trusted library allocation
page read and write
25B3ED4A000
heap
page read and write
28A60000
heap
page read and write
2017D371000
trusted library allocation
page read and write
25B3ED26000
heap
page read and write
13E4000
heap
page read and write
2018BBF3000
trusted library allocation
page read and write
400000
unkown
page readonly
25B480A6000
trusted library allocation
page read and write
B85000
unkown
page execute and read and write
2017875F000
heap
page read and write
25DAEC92000
trusted library allocation
page read and write
20178734000
heap
page read and write
2018BC5A000
trusted library allocation
page read and write
225C000
heap
page read and write
20181191000
trusted library allocation
page read and write
876C000
stack
page read and write
20182AD4000
trusted library allocation
page read and write
201811CC000
trusted library allocation
page read and write
BC246FD000
stack
page read and write
427E000
stack
page read and write
2018AFF2000
trusted library allocation
page read and write
201903DE000
trusted library allocation
page read and write
2017E5C7000
trusted library allocation
page read and write
20189CB5000
trusted library allocation
page read and write
2018A5EB000
trusted library allocation
page read and write
6561000
heap
page read and write
25B47E66000
trusted library allocation
page read and write
151E000
heap
page read and write
4EB1000
direct allocation
page read and write
D9C000
unkown
page execute and write copy
20178726000
heap
page read and write
414000
heap
page read and write
25B44488000
trusted library allocation
page read and write
68A1000
heap
page read and write
25DAEE15000
trusted library allocation
page read and write
25B480A9000
trusted library allocation
page read and write
68A1000
heap
page read and write
25DAF240000
heap
page read and write
2017F9BC000
trusted library allocation
page read and write
2018A7E2000
trusted library allocation
page read and write
20178700000
heap
page read and write
2018A213000
trusted library allocation
page read and write
25B4373C000
trusted library allocation
page read and write
25B480E4000
trusted library allocation
page read and write
A3F000
unkown
page execute and read and write
20187ED4000
trusted library allocation
page read and write
13E4000
heap
page read and write
68A1000
heap
page read and write
229EF000
heap
page read and write
B77000
unkown
page execute and write copy
2018C2D4000
trusted library allocation
page read and write
13E4000
heap
page read and write
25B48078000
trusted library allocation
page read and write
201811C4000
trusted library allocation
page read and write
25B453E7000
trusted library allocation
page read and write
5DAE000
stack
page read and write
13E4000
heap
page read and write
20188158000
trusted library allocation
page read and write
6561000
heap
page read and write
2017873D000
heap
page read and write
2017FB66000
trusted library allocation
page read and write
4F1000
unkown
page execute and read and write
68A1000
heap
page read and write
2018C5BB000
trusted library allocation
page read and write
25B47E6A000
trusted library allocation
page read and write
68A1000
heap
page read and write
201881C3000
trusted library allocation
page read and write
4B1F000
stack
page read and write
201786E7000
heap
page read and write
2D80000
heap
page read and write
16064080000
heap
page read and write
25B489F8000
trusted library allocation
page read and write
201786E7000
heap
page read and write
6561000
heap
page read and write
2018A7D0000
trusted library allocation
page read and write
1E0762ED000
heap
page read and write
20178739000
heap
page read and write
25B48300000
trusted library allocation
page read and write
20189D37000
trusted library allocation
page read and write
2018BFA0000
trusted library allocation
page read and write
2018A5FB000
trusted library allocation
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
2018A2FE000
trusted library allocation
page read and write
919000
unkown
page read and write
2018BC8E000
trusted library allocation
page read and write
AD0000
heap
page read and write
371F000
stack
page read and write
25B482FC000
trusted library allocation
page read and write
2018C2E6000
trusted library allocation
page read and write
201837F4000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018BD48000
trusted library allocation
page read and write
20178723000
heap
page read and write
414000
heap
page read and write
201837A5000
trusted library allocation
page read and write
2017FCAC000
trusted library allocation
page read and write
20178722000
heap
page read and write
BC24BD4000
stack
page read and write
2018BF7C000
trusted library allocation
page read and write
FD0000
direct allocation
page read and write
244C000
unkown
page readonly
68A1000
heap
page read and write
1ADBDFF000
stack
page read and write
2018BADA000
trusted library allocation
page read and write
20178722000
heap
page read and write
201818E9000
trusted library allocation
page read and write
237430D3000
heap
page read and write
68A1000
heap
page read and write
13E4000
heap
page read and write
2018A28B000
trusted library allocation
page read and write
201786E7000
heap
page read and write
5210000
direct allocation
page execute and read and write
731000
unkown
page execute and write copy
BC2E9F5000
stack
page read and write
13E4000
heap
page read and write
26B0000
heap
page read and write
FFA000
unkown
page execute and write copy
2018A1E2000
trusted library allocation
page read and write
2018117C000
trusted library allocation
page read and write
2018AFB0000
trusted library allocation
page read and write
13E4000
heap
page read and write
229F0000
heap
page read and write
2018A7CB000
trusted library allocation
page read and write
5334000
direct allocation
page execute and read and write
201810A0000
trusted library allocation
page read and write
6561000
heap
page read and write
2017D4DE000
trusted library allocation
page read and write
2374327A000
trusted library allocation
page read and write
410F000
stack
page read and write
25B4927F000
trusted library allocation
page read and write
25B4FC3D000
trusted library allocation
page read and write
1C961000
heap
page read and write
AE0000
direct allocation
page read and write
1C69F000
stack
page read and write
63E000
unkown
page execute and read and write
2018BBF5000
trusted library allocation
page read and write
2018BF6A000
trusted library allocation
page read and write
1A0A000
stack
page read and write
565F000
stack
page read and write
80C000
unkown
page execute and read and write
201881E1000
trusted library allocation
page read and write
25B37A90000
unclassified section
page readonly
25B51508000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B50FE3000
trusted library allocation
page read and write
2018A52C000
trusted library allocation
page read and write
68A1000
heap
page read and write
428E000
stack
page read and write
1C54E000
stack
page read and write
25B3ED41000
heap
page read and write
201786E9000
heap
page read and write
201786F5000
heap
page read and write
25B47DAA000
trusted library allocation
page read and write
20187EDA000
trusted library allocation
page read and write
339F000
stack
page read and write
219FC4904000
trusted library allocation
page read and write
2018A8D0000
trusted library allocation
page read and write
68A1000
heap
page read and write
201786FA000
heap
page read and write
25B48008000
trusted library allocation
page read and write
20187E73000
trusted library allocation
page read and write
2C10000
direct allocation
page read and write
25B482CC000
trusted library allocation
page read and write
2018BCB5000
trusted library allocation
page read and write
201880E8000
trusted library allocation
page read and write
389E000
stack
page read and write
25B47F94000
trusted library allocation
page read and write
201786FB000
heap
page read and write
25B47F67000
trusted library allocation
page read and write
2018BC1D000
trusted library allocation
page read and write
13C7000
heap
page read and write
25B50FDD000
trusted library allocation
page read and write
20182CA9000
trusted library allocation
page read and write
25B47F46000
trusted library allocation
page read and write
323E000
stack
page read and write
5D9E000
stack
page read and write
201786E0000
heap
page read and write
414000
heap
page read and write
6561000
heap
page read and write
212F000
heap
page read and write
2017D95C000
trusted library allocation
page read and write
201813FD000
trusted library allocation
page read and write
25B467B3000
trusted library allocation
page read and write
6561000
heap
page read and write
201811D7000
trusted library allocation
page read and write
201786E1000
heap
page read and write
2018119A000
trusted library allocation
page read and write
2018BDCF000
trusted library allocation
page read and write
1507000
heap
page read and write
2017FE8D000
trusted library allocation
page read and write
25B453D5000
trusted library allocation
page read and write
25B4964D000
trusted library allocation
page read and write
2018167C000
trusted library allocation
page read and write
2C30000
direct allocation
page read and write
201812D6000
trusted library allocation
page read and write
2018816F000
trusted library allocation
page read and write
5D9000
unkown
page read and write
414000
heap
page read and write
25B4890C000
trusted library allocation
page read and write
2018BA2C000
trusted library allocation
page read and write
2018A2EA000
trusted library allocation
page read and write
1E0762F2000
heap
page read and write
FD0000
direct allocation
page read and write
4BEF000
stack
page read and write
2018518D000
trusted library allocation
page read and write
2017DCAE000
trusted library allocation
page read and write
4D81000
heap
page read and write
6561000
heap
page read and write
25B3ED27000
heap
page read and write
68A1000
heap
page read and write
2018BC06000
trusted library allocation
page read and write
13E4000
heap
page read and write
BA7000
heap
page read and write
6561000
heap
page read and write
201818AA000
trusted library allocation
page read and write
6561000
heap
page read and write
68A1000
heap
page read and write
25B48E00000
trusted library allocation
page read and write
49B0000
direct allocation
page execute and read and write
25B4AEFA000
trusted library allocation
page read and write
2018183F000
trusted library allocation
page read and write
389E000
stack
page read and write
25B480EC000
trusted library allocation
page read and write
25B453C2000
trusted library allocation
page read and write
25B45E00000
trusted library allocation
page read and write
20183A9B000
trusted library allocation
page read and write
25B48057000
trusted library allocation
page read and write
2018BCAF000
trusted library allocation
page read and write
13E0000
direct allocation
page read and write
4D81000
heap
page read and write
201880F8000
trusted library allocation
page read and write
25B48929000
trusted library allocation
page read and write
25B4AC0A000
trusted library allocation
page read and write
212DEE50000
heap
page read and write
5260000
heap
page read and write
25B47CB0000
trusted library section
page readonly
201811E1000
trusted library allocation
page read and write
20189D29000
trusted library allocation
page read and write
4FD0000
direct allocation
page execute and read and write
20187E3C000
trusted library allocation
page read and write
2374326E000
trusted library allocation
page read and write
201885CA000
trusted library allocation
page read and write
68A1000
heap
page read and write
201881BD000
trusted library allocation
page read and write
201818BE000
trusted library allocation
page read and write
2018CDC6000
trusted library allocation
page read and write
63E0000
heap
page read and write
20180961000
trusted library allocation
page read and write
3D4F000
stack
page read and write
25B43781000
trusted library allocation
page read and write
20185159000
trusted library allocation
page read and write
135B57E03000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B50EB2000
trusted library allocation
page read and write
2018508D000
trusted library allocation
page read and write
BA6000
heap
page read and write
1BB5000
heap
page read and write
20189B95000
trusted library allocation
page read and write
2018BA52000
trusted library allocation
page read and write
20178722000
heap
page read and write
2C30000
direct allocation
page read and write
2018BFD9000
trusted library allocation
page read and write
20178734000
heap
page read and write
201786F5000
heap
page read and write
25B480DE000
trusted library allocation
page read and write
455E000
stack
page read and write
98B000
unkown
page execute and read and write
22A02000
heap
page read and write
4D81000
heap
page read and write
25B496FB000
trusted library allocation
page read and write
229E9000
heap
page read and write
2018818F000
trusted library allocation
page read and write
25B49688000
trusted library allocation
page read and write
2018BCB2000
trusted library allocation
page read and write
20187E3A000
trusted library allocation
page read and write
1BF6000
heap
page read and write
20180986000
trusted library allocation
page read and write
414000
heap
page read and write
201881B5000
trusted library allocation
page read and write
5E05000
heap
page read and write
25B444E6000
trusted library allocation
page read and write
BC283FE000
stack
page read and write
2017FAC3000
trusted library allocation
page read and write
4AEE000
stack
page read and write
20189D57000
trusted library allocation
page read and write
48BE000
stack
page read and write
30BF000
stack
page read and write
2018A8EE000
trusted library allocation
page read and write
2018AF73000
trusted library allocation
page read and write
20181874000
trusted library allocation
page read and write
68A1000
heap
page read and write
2D1F000
stack
page read and write
20190377000
trusted library allocation
page read and write
20188112000
trusted library allocation
page read and write
2018BB46000
trusted library allocation
page read and write
4FD0000
direct allocation
page execute and read and write
AAC0CFE000
stack
page read and write
20178739000
heap
page read and write
2018AB7C000
trusted library allocation
page read and write
201837D3000
trusted library allocation
page read and write
4D81000
heap
page read and write
12F4000
heap
page read and write
201902F4000
trusted library allocation
page read and write
25B3ED15000
heap
page read and write
5070000
direct allocation
page execute and read and write
68A1000
heap
page read and write
1590000
direct allocation
page read and write
719000
unkown
page write copy
13E4000
heap
page read and write
2018018A000
trusted library allocation
page read and write
201809C9000
trusted library allocation
page read and write
4EFE000
stack
page read and write
4A11000
heap
page read and write
12F4000
heap
page read and write
46A000
unkown
page execute and read and write
2017E029000
trusted library allocation
page read and write
6ADC000
heap
page read and write
333F000
stack
page read and write
25B4673E000
trusted library allocation
page read and write
2018BADA000
trusted library allocation
page read and write
6561000
heap
page read and write
2869000
heap
page read and write
2017FEC8000
trusted library allocation
page read and write
D6D000
unkown
page execute and write copy
2017DC84000
trusted library allocation
page read and write
414000
heap
page read and write
25B4AC1C000
trusted library allocation
page read and write
20181807000
trusted library allocation
page read and write
9B0000
unkown
page execute and read and write
49C0000
direct allocation
page execute and read and write
D9B000
unkown
page execute and write copy
20187F84000
trusted library allocation
page read and write
25B47B00000
trusted library allocation
page read and write
201812DC000
trusted library allocation
page read and write
1525000
heap
page read and write
20AA000
heap
page read and write
5210000
direct allocation
page execute and read and write
414000
heap
page read and write
13E4000
heap
page read and write
704000
heap
page read and write
4D81000
heap
page read and write
22A08000
heap
page read and write
2698000
heap
page read and write
2018A5B4000
trusted library allocation
page read and write
35CF000
stack
page read and write
229E8000
heap
page read and write
31D060004000
trusted library allocation
page read and write
6561000
heap
page read and write
2018102F000
trusted library allocation
page read and write
350E000
stack
page read and write
201818C0000
trusted library allocation
page read and write
2017F950000
trusted library allocation
page read and write
25B480C9000
trusted library allocation
page read and write
229E0000
heap
page read and write
25B50FEF000
trusted library allocation
page read and write
1430000
direct allocation
page read and write
25B37FD7000
trusted library allocation
page read and write
571000
unkown
page execute and write copy
25B48096000
trusted library allocation
page read and write
414000
heap
page read and write
201809C9000
trusted library allocation
page read and write
229EC000
heap
page read and write
2018C314000
trusted library allocation
page read and write
25B47BF2000
trusted library allocation
page read and write
2155000
heap
page read and write
25B4FD30000
trusted library allocation
page read and write
5040000
direct allocation
page execute and read and write
25DAED84000
heap
page read and write
6561000
heap
page read and write
BC27BBE000
stack
page read and write
25B47F6F000
trusted library allocation
page read and write
20181172000
trusted library allocation
page read and write
13E4000
heap
page read and write
2018519A000
trusted library allocation
page read and write
25B47E81000
trusted library allocation
page read and write
2018BF74000
trusted library allocation
page read and write
201813A7000
trusted library allocation
page read and write
20181874000
trusted library allocation
page read and write
2017D098000
trusted library allocation
page read and write
2017D9D5000
trusted library allocation
page read and write
20188830000
trusted library allocation
page read and write
20187E2D000
trusted library allocation
page read and write
43BD000
stack
page read and write
229F7000
heap
page read and write
2018C875000
trusted library allocation
page read and write
414000
heap
page read and write
469E000
stack
page read and write
25B50EF0000
trusted library allocation
page read and write
25B4ACC5000
trusted library allocation
page read and write
25B3ED0E000
heap
page read and write
20178726000
heap
page read and write
25B48BE8000
trusted library allocation
page read and write
25DAEA40000
heap
page read and write
2018A13D000
trusted library allocation
page read and write
2018C639000
trusted library allocation
page read and write
2018186B000
trusted library allocation
page read and write
25B3ED52000
heap
page read and write
B40000
heap
page read and write
25B3ED2A000
heap
page read and write
2018181C000
trusted library allocation
page read and write
2018BFFE000
trusted library allocation
page read and write
710000
heap
page read and write
2018118D000
trusted library allocation
page read and write
181F000
stack
page read and write
20180936000
trusted library allocation
page read and write
13E4000
heap
page read and write
20188186000
trusted library allocation
page read and write
25B50E03000
trusted library allocation
page read and write
5370000
direct allocation
page execute and read and write
1C50F000
stack
page read and write
2018A2AC000
trusted library allocation
page read and write
23742EE0000
heap
page read and write
5210000
trusted library allocation
page read and write
20187EF8000
trusted library allocation
page read and write
25B4C206000
trusted library allocation
page read and write
2017E5A7000
trusted library allocation
page read and write
20181822000
trusted library allocation
page read and write
4D81000
heap
page read and write
2017FEC8000
trusted library allocation
page read and write
68A1000
heap
page read and write
201786E7000
heap
page read and write
25B47B03000
trusted library allocation
page read and write
2017FB4F000
trusted library allocation
page read and write
201881C3000
trusted library allocation
page read and write
415F000
stack
page read and write
2017FC8B000
trusted library allocation
page read and write
FD0000
direct allocation
page read and write
25B4417D000
trusted library allocation
page read and write
2018819A000
trusted library allocation
page read and write
229EC000
heap
page read and write
20178709000
heap
page read and write
25B453C8000
trusted library allocation
page read and write
719000
unkown
page read and write
20187E61000
trusted library allocation
page read and write
B6B000
heap
page read and write
2018BADA000
trusted library allocation
page read and write
20183ADC000
trusted library allocation
page read and write
20178722000
heap
page read and write
2018AFFC000
trusted library allocation
page read and write
201813B7000
trusted library allocation
page read and write
6E3F87B000
stack
page read and write
25B37A20000
unclassified section
page readonly
6561000
heap
page read and write
25B45397000
trusted library allocation
page read and write
20185123000
trusted library allocation
page read and write
2018BF5D000
trusted library allocation
page read and write
2017E01E000
trusted library allocation
page read and write
25DAECBA000
trusted library allocation
page read and write
20189CDE000
trusted library allocation
page read and write
20178725000
heap
page read and write
2018A5B4000
trusted library allocation
page read and write
25B4A900000
trusted library allocation
page read and write
25B499FE000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018CA5F000
trusted library allocation
page read and write
20178734000
heap
page read and write
A7E000
stack
page read and write
414000
heap
page read and write
1B05000
heap
page read and write
201818BE000
trusted library allocation
page read and write
20183773000
trusted library allocation
page read and write
20188174000
trusted library allocation
page read and write
2018A564000
trusted library allocation
page read and write
20181291000
trusted library allocation
page read and write
68A1000
heap
page read and write
68A1000
heap
page read and write
2018BBF7000
trusted library allocation
page read and write
6561000
heap
page read and write
2017F865000
trusted library allocation
page read and write
6561000
heap
page read and write
46EF000
stack
page read and write
201881C0000
trusted library allocation
page read and write
201903BA000
trusted library allocation
page read and write
2017FEB6000
trusted library allocation
page read and write
20189A96000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B44003000
trusted library allocation
page read and write
25B45316000
trusted library allocation
page read and write
428E000
stack
page read and write
13E4000
heap
page read and write
2018BF5F000
trusted library allocation
page read and write
6561000
heap
page read and write
2018BC5C000
trusted library allocation
page read and write
2018B67D000
trusted library allocation
page read and write
2018BF6D000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018A248000
trusted library allocation
page read and write
2018AB2C000
trusted library allocation
page read and write
20188129000
trusted library allocation
page read and write
25B48218000
trusted library allocation
page read and write
414000
heap
page read and write
44CF000
stack
page read and write
25B49254000
trusted library allocation
page read and write
6561000
heap
page read and write
2018134D000
trusted library allocation
page read and write
2018CE2E000
trusted library allocation
page read and write
58DF000
stack
page read and write
25DAEC2E000
trusted library allocation
page read and write
25B47EA6000
trusted library allocation
page read and write
201786E7000
heap
page read and write
2018BC50000
trusted library allocation
page read and write
25B49200000
trusted library allocation
page read and write
13E4000
heap
page read and write
2018A23B000
trusted library allocation
page read and write
20188192000
trusted library allocation
page read and write
13E4000
heap
page read and write
25B48903000
trusted library allocation
page read and write
2018118F000
trusted library allocation
page read and write
201786E0000
heap
page read and write
201881C3000
trusted library allocation
page read and write
40FF000
stack
page read and write
1E0763E0000
heap
page read and write
2018BDB7000
trusted library allocation
page read and write
201786F5000
heap
page read and write
25B48200000
trusted library allocation
page read and write
68A1000
heap
page read and write
20180062000
trusted library allocation
page read and write
314BEC200000
trusted library allocation
page read and write
5060000
direct allocation
page execute and read and write
25B4F216000
trusted library allocation
page read and write
253A000
heap
page read and write
25B4AD0B000
trusted library allocation
page read and write
1F84000
heap
page read and write
414000
heap
page read and write
2017870E000
heap
page read and write
414000
heap
page read and write
AAC047E000
unkown
page readonly
20188020000
trusted library allocation
page read and write
720000
direct allocation
page execute and read and write
2017D477000
trusted library allocation
page read and write
5490000
direct allocation
page execute and read and write
2018BAE3000
trusted library allocation
page read and write
20182ADC000
trusted library allocation
page read and write
68A1000
heap
page read and write
201818BE000
trusted library allocation
page read and write
13E4000
heap
page read and write
201786FC000
heap
page read and write
1F0000
heap
page read and write
2018B9C7000
trusted library allocation
page read and write
2018A28B000
trusted library allocation
page read and write
25B49993000
trusted library allocation
page read and write
2018A270000
trusted library allocation
page read and write
2017F840000
trusted library allocation
page read and write
25B52B14000
trusted library allocation
page read and write
201811DE000
trusted library allocation
page read and write
2018A1E2000
trusted library allocation
page read and write
15B0000
heap
page read and write
2018BCE0000
trusted library allocation
page read and write
2018100E000
trusted library allocation
page read and write
25B47F6F000
trusted library allocation
page read and write
2017872A000
heap
page read and write
20188166000
trusted library allocation
page read and write
2017DCB2000
trusted library allocation
page read and write
201811E1000
trusted library allocation
page read and write
201881E1000
trusted library allocation
page read and write
20185149000
trusted library allocation
page read and write
25B4AC30000
trusted library allocation
page read and write
25B50C91000
trusted library allocation
page read and write
25B47E5B000
trusted library allocation
page read and write
50A0000
direct allocation
page execute and read and write
34CF000
stack
page read and write
2018A5FD000
trusted library allocation
page read and write
3E7F000
stack
page read and write
13E4000
heap
page read and write
BC2787E000
stack
page read and write
20188828000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B50F00000
trusted library allocation
page read and write
13E0000
direct allocation
page read and write
68A1000
heap
page read and write
20189A64000
trusted library allocation
page read and write
49AE000
stack
page read and write
25B45203000
trusted library allocation
page read and write
2018DD58000
trusted library allocation
page read and write
25B47BF2000
trusted library allocation
page read and write
25B482A4000
trusted library allocation
page read and write
9D0000
unkown
page execute and write copy
6561000
heap
page read and write
25B52B7E000
trusted library allocation
page read and write
25B499F0000
trusted library allocation
page read and write
2018DD3F000
trusted library allocation
page read and write
2018C2ED000
trusted library allocation
page read and write
2018BA66000
trusted library allocation
page read and write
6561000
heap
page read and write
2018AFC3000
trusted library allocation
page read and write
2018118B000
trusted library allocation
page read and write
5450000
direct allocation
page execute and read and write
712000
unkown
page execute and read and write
25B3ED1C000
heap
page read and write
2018BA9D000
trusted library allocation
page read and write
6B70000
heap
page read and write
5360000
direct allocation
page execute and read and write
414000
heap
page read and write
2018118F000
trusted library allocation
page read and write
25B4FCFB000
trusted library allocation
page read and write
20183786000
trusted library allocation
page read and write
20187ED3000
trusted library allocation
page read and write
201818FD000
trusted library allocation
page read and write
25B3ED1C000
heap
page read and write
68A1000
heap
page read and write
49C0000
direct allocation
page execute and read and write
201811CC000
trusted library allocation
page read and write
1160000
heap
page read and write
6561000
heap
page read and write
201811A5000
trusted library allocation
page read and write
20178728000
heap
page read and write
4EB0000
heap
page read and write
31AF000
stack
page read and write
68A1000
heap
page read and write
25B497FC000
trusted library allocation
page read and write
20178723000
heap
page read and write
2018BC52000
trusted library allocation
page read and write
20187E00000
trusted library allocation
page read and write
20178726000
heap
page read and write
2018BA76000
trusted library allocation
page read and write
20189BFE000
trusted library allocation
page read and write
13E4000
heap
page read and write
2018C251000
trusted library allocation
page read and write
20187E88000
trusted library allocation
page read and write
25B3ED21000
heap
page read and write
13E4000
heap
page read and write
1540000
heap
page read and write
4143000
heap
page read and write
2018C4EF000
trusted library allocation
page read and write
23742F4A000
heap
page read and write
418E000
stack
page read and write
1124000
heap
page read and write
20178733000
heap
page read and write
2018A8FA000
trusted library allocation
page read and write
908F000
stack
page read and write
13E4000
heap
page read and write
20178734000
heap
page read and write
5D3E000
stack
page read and write
2017874B000
heap
page read and write
AAC1D7E000
stack
page read and write
414000
heap
page read and write
1E076500000
trusted library allocation
page read and write
229E7000
heap
page read and write
68A1000
heap
page read and write
2018BBF3000
trusted library allocation
page read and write
201786E7000
heap
page read and write
2017DEE8000
trusted library allocation
page read and write
2018BA8E000
trusted library allocation
page read and write
25B50E19000
trusted library allocation
page read and write
365E000
stack
page read and write
FEEE0000
direct allocation
page execute and read and write
53E0000
direct allocation
page execute and read and write
201809C2000
trusted library allocation
page read and write
6561000
heap
page read and write
201851E6000
trusted library allocation
page read and write
68A1000
heap
page read and write
20178722000
heap
page read and write
20181082000
trusted library allocation
page read and write
66A0000
heap
page read and write
25B46100000
trusted library allocation
page read and write
6E4093E000
stack
page read and write
2018B604000
trusted library allocation
page read and write
25DAEE3D000
trusted library allocation
page read and write
25B44166000
trusted library allocation
page read and write
20188167000
trusted library allocation
page read and write
20188579000
trusted library allocation
page read and write
20188184000
trusted library allocation
page read and write
201881FA000
trusted library allocation
page read and write
20178733000
heap
page read and write
2018A2C9000
trusted library allocation
page read and write
2017FBB4000
trusted library allocation
page read and write
2018AF52000
trusted library allocation
page read and write
20181617000
trusted library allocation
page read and write
2018119A000
trusted library allocation
page read and write
1D97000
heap
page read and write
25B50F74000
trusted library allocation
page read and write
20189E43000
trusted library allocation
page read and write
414000
heap
page read and write
68A1000
heap
page read and write
2017D0CA000
trusted library allocation
page read and write
25B454A8000
trusted library allocation
page read and write
405E000
stack
page read and write
68A1000
heap
page read and write
2017D0EF000
trusted library allocation
page read and write
68A1000
heap
page read and write
20185106000
trusted library allocation
page read and write
1C78D000
stack
page read and write
2017FBD8000
trusted library allocation
page read and write
20178723000
heap
page read and write
25B3ED35000
heap
page read and write
25B3ED3A000
heap
page read and write
201811C4000
trusted library allocation
page read and write
25B482BE000
trusted library allocation
page read and write
6561000
heap
page read and write
2018BCAC000
trusted library allocation
page read and write
20182A0C000
trusted library allocation
page read and write
1DEC39C6000
trusted library allocation
page execute read
3140000
direct allocation
page read and write
201818C3000
trusted library allocation
page read and write
6561000
heap
page read and write
25B4ACDE000
trusted library allocation
page read and write
20181884000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B480F8000
trusted library allocation
page read and write
2ED5F000
stack
page read and write
2018B682000
trusted library allocation
page read and write
9FF000
unkown
page execute and read and write
229E8000
heap
page read and write
201811E4000
trusted library allocation
page read and write
2017FEB6000
trusted library allocation
page read and write
20181B0B000
trusted library allocation
page read and write
25B4809C000
trusted library allocation
page read and write
201818AA000
trusted library allocation
page read and write
5070000
direct allocation
page execute and read and write
68A1000
heap
page read and write
6B1000
unkown
page execute and write copy
25B39CC8000
heap
page read and write
229EE000
heap
page read and write
6561000
heap
page read and write
2018BA36000
trusted library allocation
page read and write
15B7000
heap
page read and write
6561000
heap
page read and write
2E9E000
stack
page read and write
201851EF000
trusted library allocation
page read and write
68A1000
heap
page read and write
6561000
heap
page read and write
414000
heap
page read and write
13E4000
heap
page read and write
25B51A1F000
trusted library allocation
page read and write
6561000
heap
page read and write
325E000
stack
page read and write
2F8F000
stack
page read and write
25B45C00000
trusted library allocation
page read and write
2018B6F4000
trusted library allocation
page read and write
4AE0000
heap
page read and write
201786EF000
heap
page read and write
5010000
direct allocation
page execute and read and write
311B000
stack
page read and write
25B3ED2F000
heap
page read and write
2017FB25000
trusted library allocation
page read and write
25B43681000
trusted library allocation
page read and write
201786E0000
heap
page read and write
2018A2EA000
trusted library allocation
page read and write
25B3ED1D000
heap
page read and write
1C78E000
stack
page read and write
20178739000
heap
page read and write
2018A217000
trusted library allocation
page read and write
2017872F000
heap
page read and write
20189CED000
trusted library allocation
page read and write
2018A7FC000
trusted library allocation
page read and write
68A1000
heap
page read and write
201786E1000
heap
page read and write
13E4000
heap
page read and write
25B4ADBD000
trusted library allocation
page read and write
1F0000
heap
page read and write
2018A533000
trusted library allocation
page read and write
414000
heap
page read and write
2018A54C000
trusted library allocation
page read and write
25B4FCEA000
trusted library allocation
page read and write
20189E75000
trusted library allocation
page read and write
25B50C51000
trusted library allocation
page read and write
25B4828A000
trusted library allocation
page read and write
2EDF9000
heap
page read and write
6CC7E000
unkown
page read and write
25B4AEDD000
trusted library allocation
page read and write
25B4C20A000
trusted library allocation
page read and write
25B37D30000
trusted library allocation
page read and write
2018A2FE000
trusted library allocation
page read and write
25B48603000
trusted library allocation
page read and write
20187DFA000
trusted library allocation
page read and write
6561000
heap
page read and write
13E4000
heap
page read and write
4EB0000
direct allocation
page read and write
25B44503000
trusted library allocation
page read and write
25B45620000
trusted library allocation
page read and write
6561000
heap
page read and write
20181809000
trusted library allocation
page read and write
25B494F6000
trusted library allocation
page read and write
2018BF62000
trusted library allocation
page read and write
ABE000
stack
page read and write
719E000
heap
page read and write
201811E4000
trusted library allocation
page read and write
2018BCAF000
trusted library allocation
page read and write
3FDF000
stack
page read and write
25B43690000
trusted library allocation
page read and write
201810C1000
trusted library allocation
page read and write
25B49679000
trusted library allocation
page read and write
25B47BC4000
trusted library allocation
page read and write
414000
heap
page read and write
201818B1000
trusted library allocation
page read and write
1EE7000
heap
page read and write
201786E0000
heap
page read and write
2018BA5C000
trusted library allocation
page read and write
69A0000
trusted library allocation
page read and write
13E4000
heap
page read and write
229ED000
heap
page read and write
68A1000
heap
page read and write
804000
unkown
page execute and write copy
414000
heap
page read and write
51C0000
heap
page read and write
201818E9000
trusted library allocation
page read and write
2018CC10000
trusted library allocation
page read and write
2017DEDE000
trusted library allocation
page read and write
6561000
heap
page read and write
6561000
heap
page read and write
47DE000
stack
page read and write
2017F88F000
trusted library allocation
page read and write
493000
unkown
page execute and read and write
25B499F8000
trusted library allocation
page read and write
25B47F67000
trusted library allocation
page read and write
4F6C000
direct allocation
page execute and read and write
2018B636000
trusted library allocation
page read and write
2018A270000
trusted library allocation
page read and write
25B3ED2D000
heap
page read and write
20178739000
heap
page read and write
201851EF000
trusted library allocation
page read and write
414000
heap
page read and write
2018BC4C000
trusted library allocation
page read and write
414000
heap
page read and write
2018BA93000
trusted library allocation
page read and write
227A91D1000
trusted library allocation
page execute read
22C0000
heap
page read and write
23743260000
trusted library allocation
page read and write
2017E5A9000
trusted library allocation
page read and write
68A1000
heap
page read and write
414000
heap
page read and write
20181667000
trusted library allocation
page read and write
2018113A000
trusted library allocation
page read and write
25B4809C000
trusted library allocation
page read and write
4BF1000
heap
page read and write
62C000
unkown
page execute and read and write
201881C9000
trusted library allocation
page read and write
20187EB1000
trusted library allocation
page read and write
201811C4000
trusted library allocation
page read and write
25B44574000
trusted library allocation
page read and write
2018BC5A000
trusted library allocation
page read and write
25B49AA7000
trusted library allocation
page read and write
20180928000
trusted library allocation
page read and write
25B3ED4A000
heap
page read and write
68A1000
heap
page read and write
25B4C001000
trusted library allocation
page read and write
9570000
heap
page read and write
13E4000
heap
page read and write
1100000
heap
page read and write
25B4AD5D000
trusted library allocation
page read and write
201812A1000
trusted library allocation
page read and write
25B48B94000
trusted library allocation
page read and write
2017872B000
heap
page read and write
2017872A000
heap
page read and write
2018CDF7000
trusted library allocation
page read and write
20178722000
heap
page read and write
201786FC000
heap
page read and write
25B49900000
trusted library allocation
page read and write
AE0000
direct allocation
page read and write
201885F8000
trusted library allocation
page read and write
20187E5F000
trusted library allocation
page read and write
68A1000
heap
page read and write
20185119000
trusted library allocation
page read and write
360E000
stack
page read and write
2018AF1D000
trusted library allocation
page read and write
25B49685000
trusted library allocation
page read and write
DFC000
stack
page read and write
2018BF3C000
trusted library allocation
page read and write
25DAE880000
unclassified section
page readonly
4B04000
heap
page read and write
20187EB9000
trusted library allocation
page read and write
201881BD000
trusted library allocation
page read and write
25B482B7000
trusted library allocation
page read and write
2017DE96000
trusted library allocation
page read and write
2018113D000
trusted library allocation
page read and write
23743291000
trusted library allocation
page read and write
2017FEB6000
trusted library allocation
page read and write
2018BD56000
trusted library allocation
page read and write
1C7DE000
stack
page read and write
25B48B6D000
trusted library allocation
page read and write
2018BBB5000
trusted library allocation
page read and write
9B0000
unkown
page execute and read and write
20187E72000
trusted library allocation
page read and write
8A9000
unkown
page execute and read and write
2018ACAD000
trusted library allocation
page read and write
1F88000
heap
page read and write
13E4000
heap
page read and write
1320000
heap
page read and write
201786E1000
heap
page read and write
2017F9C0000
trusted library allocation
page read and write
25B48480000
trusted library section
page read and write
25B4C20E000
trusted library allocation
page read and write
25B48B2A000
trusted library allocation
page read and write
6561000
heap
page read and write
D8C000
unkown
page execute and read and write
2018BC29000
trusted library allocation
page read and write
20187EB9000
trusted library allocation
page read and write
2017D4D7000
trusted library allocation
page read and write
D9B000
unkown
page execute and read and write
2017D0C2000
trusted library allocation
page read and write
25B47F67000
trusted library allocation
page read and write
25B480C9000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018BC52000
trusted library allocation
page read and write
201801BE000
trusted library allocation
page read and write
414000
heap
page read and write
2017D44D000
trusted library allocation
page read and write
25B4C222000
trusted library allocation
page read and write
4D92000
heap
page read and write
20183A72000
trusted library allocation
page read and write
201786E1000
heap
page read and write
2017DBCE000
trusted library allocation
page read and write
25B480FE000
trusted library allocation
page read and write
730000
unkown
page readonly
2017D9B3000
trusted library allocation
page read and write
2018118F000
trusted library allocation
page read and write
23743840000
heap
page read and write
25B4ADF7000
trusted library allocation
page read and write
201880C1000
trusted library allocation
page read and write
2017FEF7000
trusted library allocation
page read and write
704000
heap
page read and write
25B47F37000
trusted library allocation
page read and write
201786E7000
heap
page read and write
68A1000
heap
page read and write
229EC000
heap
page read and write
6561000
heap
page read and write
6561000
heap
page read and write
4A11000
heap
page read and write
2018A7FA000
trusted library allocation
page read and write
20178729000
heap
page read and write
201809C2000
trusted library allocation
page read and write
BB8000
heap
page read and write
10FE000
stack
page read and write
2018BA74000
trusted library allocation
page read and write
5480000
direct allocation
page execute and read and write
4180000
heap
page read and write
2018A50A000
trusted library allocation
page read and write
704000
heap
page read and write
25B4AD9B000
trusted library allocation
page read and write
68A1000
heap
page read and write
68A1000
heap
page read and write
2017D917000
trusted library allocation
page read and write
201786FD000
heap
page read and write
25B3ED2F000
heap
page read and write
68A1000
heap
page read and write
201786E7000
heap
page read and write
2017D9F4000
trusted library allocation
page read and write
25B45600000
trusted library allocation
page read and write
280232D1E000
trusted library allocation
page read and write
414000
heap
page read and write
201851BC000
trusted library allocation
page read and write
25B3ED1F000
heap
page read and write
259E000
stack
page read and write
20182D1E000
trusted library allocation
page read and write
25B45613000
trusted library allocation
page read and write
20189A31000
trusted library allocation
page read and write
1C31F000
stack
page read and write
68A1000
heap
page read and write
25B4459E000
trusted library allocation
page read and write
25B4ADFC000
trusted library allocation
page read and write
53E0000
direct allocation
page execute and read and write
2018C2C5000
trusted library allocation
page read and write
1C55E000
stack
page read and write
20178723000
heap
page read and write
2018C304000
trusted library allocation
page read and write
25B3ED35000
heap
page read and write
201812FA000
trusted library allocation
page read and write
5080000
direct allocation
page read and write
2018B9BE000
trusted library allocation
page read and write
48DE000
stack
page read and write
25B45F0A000
trusted library allocation
page read and write
2018A7CB000
trusted library allocation
page read and write
25B48078000
trusted library allocation
page read and write
229FC000
heap
page read and write
2018AB2C000
trusted library allocation
page read and write
2018BA44000
trusted library allocation
page read and write
2018BCB2000
trusted library allocation
page read and write
25B4AD00000
trusted library allocation
page read and write
23743223000
trusted library allocation
page read and write
20188639000
trusted library allocation
page read and write
FD0000
direct allocation
page read and write
AAC2D7E000
stack
page read and write
6561000
heap
page read and write
416E000
stack
page read and write
20178713000
heap
page read and write
25B4376C000
trusted library allocation
page read and write
30CF000
stack
page read and write
25B47E5D000
trusted library allocation
page read and write
2017FE2A000
trusted library allocation
page read and write
2017875A000
heap
page read and write
25B3ED1C000
heap
page read and write
20178702000
heap
page read and write
201818E7000
trusted library allocation
page read and write
2018118B000
trusted library allocation
page read and write
13E4000
heap
page read and write
25B436C7000
trusted library allocation
page read and write
25B48082000
trusted library allocation
page read and write
2018A1F8000
trusted library allocation
page read and write
25B3ED53000
heap
page read and write
2018819D000
trusted library allocation
page read and write
2018CAC5000
trusted library allocation
page read and write
13E0000
direct allocation
page read and write
68A1000
heap
page read and write
201810C7000
trusted library allocation
page read and write
20181B10000
trusted library allocation
page read and write
25B488B9000
trusted library allocation
page read and write
201786FD000
heap
page read and write
68A1000
heap
page read and write
446F000
stack
page read and write
2017872E000
heap
page read and write
67AD000
stack
page read and write
2017DCD5000
trusted library allocation
page read and write
20180155000
trusted library allocation
page read and write
2017FCB1000
trusted library allocation
page read and write
25B4AA45000
trusted library allocation
page read and write
6561000
heap
page read and write
2FCF000
stack
page read and write
6E3D5CE000
unkown
page readonly
151B000
heap
page read and write
BC247DD000
stack
page read and write
20187EF8000
trusted library allocation
page read and write
20178729000
heap
page read and write
20178704000
heap
page read and write
13E4000
heap
page read and write
20178722000
heap
page read and write
20181183000
trusted library allocation
page read and write
2017872E000
heap
page read and write
488F000
stack
page read and write
432E000
stack
page read and write
201786E7000
heap
page read and write
2018BAF7000
trusted library allocation
page read and write
20188145000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018CC30000
trusted library allocation
page read and write
25B436B3000
trusted library allocation
page read and write
2018B9DB000
trusted library allocation
page read and write
6561000
heap
page read and write
6561000
heap
page read and write
8B0000
unkown
page readonly
229F4000
heap
page read and write
2018CC5C000
trusted library allocation
page read and write
229DA000
heap
page read and write
1DEF000
stack
page read and write
25B47B17000
trusted library allocation
page read and write
25B49249000
trusted library allocation
page read and write
25B52B00000
trusted library allocation
page read and write
25B3ED44000
heap
page read and write
2017FE29000
trusted library allocation
page read and write
20180162000
trusted library allocation
page read and write
2018BAC6000
trusted library allocation
page read and write
25B480D7000
trusted library allocation
page read and write
68A1000
heap
page read and write
68A1000
heap
page read and write
2C10000
direct allocation
page read and write
421E000
stack
page read and write
20182DAE000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018BBD5000
trusted library allocation
page read and write
12F4000
heap
page read and write
20187E93000
trusted library allocation
page read and write
414000
heap
page read and write
2018BFA4000
trusted library allocation
page read and write
3ACF000
stack
page read and write
25B459A0000
heap
page read and write
25B49763000
trusted library allocation
page read and write
2017E5C7000
trusted library allocation
page read and write
6561000
heap
page read and write
2018BC1B000
trusted library allocation
page read and write
2018AF80000
trusted library allocation
page read and write
4C9E000
stack
page read and write
1C58000
heap
page read and write
68A1000
heap
page read and write
2018ABF8000
trusted library allocation
page read and write
4F21000
direct allocation
page read and write
13E4000
heap
page read and write
201786E9000
heap
page read and write
25B49A56000
trusted library allocation
page read and write
25B3ED35000
heap
page read and write
1628000
heap
page read and write
412E000
stack
page read and write
229F4000
heap
page read and write
2017D4EA000
trusted library allocation
page read and write
25DAEC79000
trusted library allocation
page read and write
53D0000
direct allocation
page execute and read and write
20188145000
trusted library allocation
page read and write
25B445A9000
trusted library allocation
page read and write
6561000
heap
page read and write
12F4000
heap
page read and write
23743418000
trusted library allocation
page read and write
2018862F000
trusted library allocation
page read and write
25B4563D000
trusted library allocation
page read and write
25B48049000
trusted library allocation
page read and write
2018A6E9000
trusted library allocation
page read and write
2018AC5C000
trusted library allocation
page read and write
AABEBD8000
stack
page read and write
F80000
heap
page read and write
2017FB93000
trusted library allocation
page read and write
2018BA38000
trusted library allocation
page read and write
2018AFDA000
trusted library allocation
page read and write
20180653000
trusted library allocation
page read and write
2018A67B000
trusted library allocation
page read and write
FF0000
heap
page read and write
201837B9000
trusted library allocation
page read and write
2017F8F3000
trusted library allocation
page read and write
BC2D1BE000
stack
page read and write
AAC04FE000
unkown
page readonly
2018A6B5000
trusted library allocation
page read and write
25B4535E000
trusted library allocation
page read and write
5470000
direct allocation
page execute and read and write
3D5F000
stack
page read and write
68A1000
heap
page read and write
2018ACF3000
trusted library allocation
page read and write
2017872E000
heap
page read and write
FBC000
stack
page read and write
328E000
stack
page read and write
20181160000
trusted library allocation
page read and write
201786E1000
heap
page read and write
4D81000
heap
page read and write
4F8F000
stack
page read and write
68A1000
heap
page read and write
2018117C000
trusted library allocation
page read and write
2018BCCE000
trusted library allocation
page read and write
4FD0000
direct allocation
page execute and read and write
2018A583000
trusted library allocation
page read and write
20181BF4000
trusted library allocation
page read and write
201837AF000
trusted library allocation
page read and write
20183768000
trusted library allocation
page read and write
25B488CC000
trusted library allocation
page read and write
201816C2000
trusted library allocation
page read and write
25B3ED4A000
heap
page read and write
68A1000
heap
page read and write
2018116B000
trusted library allocation
page read and write
201812E6000
trusted library allocation
page read and write
13E4000
heap
page read and write
2018C128000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018117F000
trusted library allocation
page read and write
2018BD98000
trusted library allocation
page read and write
68A1000
heap
page read and write
201810BB000
trusted library allocation
page read and write
24E0000
heap
page read and write
201786FD000
heap
page read and write
25B48254000
trusted library allocation
page read and write
20178722000
heap
page read and write
B75000
unkown
page execute and read and write
2018BBB5000
trusted library allocation
page read and write
163C000
heap
page read and write
BC231EB000
stack
page read and write
2017D8F4000
trusted library allocation
page read and write
2018B9DB000
trusted library allocation
page read and write
13E4000
heap
page read and write
229F0000
heap
page read and write
2017FE69000
trusted library allocation
page read and write
2017FB47000
trusted library allocation
page read and write
2018BFDE000
trusted library allocation
page read and write
2017DEB3000
trusted library allocation
page read and write
25B3ED15000
heap
page read and write
201851F3000
trusted library allocation
page read and write
350B0000
heap
page read and write
2018185B000
trusted library allocation
page read and write
20189CEE000
trusted library allocation
page read and write
25B492F8000
trusted library allocation
page read and write
201786DB000
heap
page read and write
150D000
heap
page read and write
2018BCAC000
trusted library allocation
page read and write
25B3ED53000
heap
page read and write
68A1000
heap
page read and write
201786E1000
heap
page read and write
25B4A600000
trusted library allocation
page read and write
13E4000
heap
page read and write
26E1000
heap
page read and write
25B3ED15000
heap
page read and write
201786E9000
heap
page read and write
16064040000
heap
page read and write
68A1000
heap
page read and write
4EC0000
heap
page read and write
2017D081000
trusted library allocation
page read and write
39DE000
stack
page read and write
20189CD1000
trusted library allocation
page read and write
2018BA48000
trusted library allocation
page read and write
20180951000
trusted library allocation
page read and write
414000
heap
page read and write
23742F40000
heap
page read and write
2017FE8B000
trusted library allocation
page read and write
25B4F276000
trusted library allocation
page read and write
25B4884B000
trusted library allocation
page read and write
414000
heap
page read and write
25DAE920000
heap
page read and write
2018A549000
trusted library allocation
page read and write
7B5E000
stack
page read and write
13E4000
heap
page read and write
25B3ED15000
heap
page read and write
B8D000
heap
page read and write
DAE000
stack
page read and write
201812C9000
trusted library allocation
page read and write
2017FE75000
trusted library allocation
page read and write
2017E559000
trusted library allocation
page read and write
20181086000
trusted library allocation
page read and write
20187EC0000
trusted library allocation
page read and write
20181668000
trusted library allocation
page read and write
2018BA64000
trusted library allocation
page read and write
4280000
heap
page read and write
25B46757000
trusted library allocation
page read and write
43C000
unkown
page execute and read and write
62C000
unkown
page execute and read and write
25B4FC4D000
trusted library allocation
page read and write
20CE000
stack
page read and write
414000
heap
page read and write
2017E5F7000
trusted library allocation
page read and write
68A1000
heap
page read and write
20181871000
trusted library allocation
page read and write
13E4000
heap
page read and write
20187EF8000
trusted library allocation
page read and write
6FCC000
stack
page read and write
22A21000
heap
page read and write
25B47FF5000
trusted library allocation
page read and write
201851DF000
trusted library allocation
page read and write
201786E0000
heap
page read and write
201786E0000
heap
page read and write
2017FE64000
trusted library allocation
page read and write
2017D475000
trusted library allocation
page read and write
6CC80000
unkown
page read and write
6561000
heap
page read and write
68A1000
heap
page read and write
2018ABA4000
trusted library allocation
page read and write
25B4DD30000
trusted library allocation
page read and write
BC29BFB000
stack
page read and write
20187E36000
trusted library allocation
page read and write
68A1000
heap
page read and write
2017DEA4000
trusted library allocation
page read and write
2018BCBE000
trusted library allocation
page read and write
229F7000
heap
page read and write
25B48365000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018119A000
trusted library allocation
page read and write
551B000
stack
page read and write
2018518D000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018A7FB000
trusted library allocation
page read and write
2017FEB6000
trusted library allocation
page read and write
201816C0000
trusted library allocation
page read and write
13E4000
heap
page read and write
2017E1AE000
trusted library allocation
page read and write
23742EB3000
remote allocation
page execute read
13E4000
heap
page read and write
2018161F000
trusted library allocation
page read and write
25B4A603000
trusted library allocation
page read and write
25B489A3000
trusted library allocation
page read and write
1C950000
heap
page read and write
5210000
direct allocation
page execute and read and write
4F79000
direct allocation
page execute and read and write
68A1000
heap
page read and write
20189BA1000
trusted library allocation
page read and write
2017FEF4000
trusted library allocation
page read and write
201786E2000
heap
page read and write
232B000
heap
page read and write
20189D53000
trusted library allocation
page read and write
20181896000
trusted library allocation
page read and write
25B498C9000
trusted library allocation
page read and write
414000
heap
page read and write
5370000
direct allocation
page execute and read and write
25B3ED27000
heap
page read and write
20181637000
trusted library allocation
page read and write
201786F5000
heap
page read and write
2018BF5A000
trusted library allocation
page read and write
2017E5EA000
trusted library allocation
page read and write
6561000
heap
page read and write
30FF000
stack
page read and write
2018A7F1000
trusted library allocation
page read and write
414E000
stack
page read and write
2018A54E000
trusted library allocation
page read and write
25B49522000
trusted library allocation
page read and write
13E4000
heap
page read and write
68A1000
heap
page read and write
201810AF000
trusted library allocation
page read and write
201903E6000
trusted library allocation
page read and write
9D1000
unkown
page execute and write copy
2017DCAE000
trusted library allocation
page read and write
2018A7E0000
trusted library allocation
page read and write
2B2183100000
trusted library allocation
page read and write
68A1000
heap
page read and write
4D81000
heap
page read and write
20187E6C000
trusted library allocation
page read and write
20178731000
heap
page read and write
25DAEC0D000
trusted library allocation
page read and write
2018137B000
trusted library allocation
page read and write
25B4820D000
trusted library allocation
page read and write
6561000
heap
page read and write
414000
heap
page read and write
25B496C3000
trusted library allocation
page read and write
68A1000
heap
page read and write
68A1000
heap
page read and write
229F7000
heap
page read and write
4150000
heap
page read and write
2710000
heap
page read and write
2018A258000
trusted library allocation
page read and write
5334000
direct allocation
page execute and read and write
25B3ED35000
heap
page read and write
20178702000
heap
page read and write
25B49AF8000
trusted library allocation
page read and write
1124000
heap
page read and write
B8D000
heap
page read and write
2018BD6E000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018A292000
trusted library allocation
page read and write
25B49709000
trusted library allocation
page read and write
20178734000
heap
page read and write
25B47BFE000
trusted library allocation
page read and write
201851A7000
trusted library allocation
page read and write
25B4A64B000
trusted library allocation
page read and write
4D81000
heap
page read and write
20178723000
heap
page read and write
25B480EC000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B484F0000
trusted library section
page read and write
20178745000
heap
page read and write
25B4ADF0000
trusted library allocation
page read and write
20178734000
heap
page read and write
2018A7C5000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B37F5E000
trusted library allocation
page read and write
68A1000
heap
page read and write
201786E0000
heap
page read and write
BC2A5FA000
stack
page read and write
25B49A30000
trusted library allocation
page read and write
13E4000
heap
page read and write
571E000
stack
page read and write
13E0000
direct allocation
page read and write
2018A5C1000
trusted library allocation
page read and write
6561000
heap
page read and write
201818AD000
trusted library allocation
page read and write
2018BFA4000
trusted library allocation
page read and write
2474000
heap
page read and write
201786E2000
heap
page read and write
20178734000
heap
page read and write
201810F7000
trusted library allocation
page read and write
2018C82D000
trusted library allocation
page read and write
25B4AF00000
trusted library allocation
page read and write
4DE1000
heap
page read and write
1124000
heap
page read and write
2018BF92000
trusted library allocation
page read and write
20178723000
heap
page read and write
20178724000
heap
page read and write
201786F5000
heap
page read and write
2018AC00000
trusted library allocation
page read and write
201851EA000
trusted library allocation
page read and write
201801CB000
trusted library allocation
page read and write
25E0000
direct allocation
page execute and read and write
25B49403000
trusted library allocation
page read and write
25CE000
stack
page read and write
20178726000
heap
page read and write
1C91E000
stack
page read and write
20182A30000
trusted library allocation
page read and write
20187EAE000
trusted library allocation
page read and write
20181848000
trusted library allocation
page read and write
12F4000
heap
page read and write
39BE000
stack
page read and write
2018BA4C000
trusted library allocation
page read and write
237430A0000
heap
page read and write
25B3ED50000
heap
page read and write
69A0000
trusted library allocation
page read and write
25B43698000
trusted library allocation
page read and write
2018BC23000
trusted library allocation
page read and write
34BE000
stack
page read and write
201816E9000
trusted library allocation
page read and write
6561000
heap
page read and write
20187E17000
trusted library allocation
page read and write
25B47E44000
trusted library allocation
page read and write
651D000
heap
page read and write
25B4AE90000
trusted library allocation
page read and write
26CD000
heap
page read and write
201818EF000
trusted library allocation
page read and write
68A1000
heap
page read and write
160640E8000
heap
page read and write
68A1000
heap
page read and write
201786E1000
heap
page read and write
25B4AEF2000
trusted library allocation
page read and write
44AE000
stack
page read and write
13E4000
heap
page read and write
2018AF52000
trusted library allocation
page read and write
34DF000
stack
page read and write
414000
heap
page read and write
280F000
stack
page read and write
2017FE8D000
trusted library allocation
page read and write
9C000
stack
page read and write
201786E7000
heap
page read and write
20181174000
trusted library allocation
page read and write
2018BBF5000
trusted library allocation
page read and write
25B3ED2F000
heap
page read and write
25B480A1000
trusted library allocation
page read and write
201816EC000
trusted library allocation
page read and write
5670000
heap
page read and write
3AFE000
stack
page read and write
3D9E000
stack
page read and write
25B3ED15000
heap
page read and write
25B50EE8000
trusted library allocation
page read and write
2018A6DD000
trusted library allocation
page read and write
20187DDF000
trusted library allocation
page read and write
2018BF5D000
trusted library allocation
page read and write
4E50000
heap
page read and write
3ECE000
stack
page read and write
350B1000
heap
page read and write
201786FC000
heap
page read and write
20187E36000
trusted library allocation
page read and write
11E9000
heap
page read and write
25B4AC40000
trusted library allocation
page read and write
201851A1000
trusted library allocation
page read and write
201811E4000
trusted library allocation
page read and write
2018187E000
trusted library allocation
page read and write
5030000
direct allocation
page execute and read and write
53F0000
direct allocation
page execute and read and write
25B48003000
trusted library allocation
page read and write
13E4000
heap
page read and write
2018BC0A000
trusted library allocation
page read and write
2018AFAE000
trusted library allocation
page read and write
31EE000
stack
page read and write
201837C4000
trusted library allocation
page read and write
243B000
heap
page read and write
2019037F000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B4C220000
trusted library allocation
page read and write
299E000
stack
page read and write
2017D917000
trusted library allocation
page read and write
2018BCE4000
trusted library allocation
page read and write
50E1000
direct allocation
page read and write
2018C4EF000
trusted library allocation
page read and write
4DE1000
heap
page read and write
2017FBD8000
trusted library allocation
page read and write
201881C8000
trusted library allocation
page read and write
2018BB3D000
trusted library allocation
page read and write
201811DB000
trusted library allocation
page read and write
996000
unkown
page execute and read and write
201851E3000
trusted library allocation
page read and write
2017FE4E000
trusted library allocation
page read and write
25B4AD96000
trusted library allocation
page read and write
25B48051000
trusted library allocation
page read and write
2EE01000
heap
page read and write
25B4AAE8000
trusted library allocation
page read and write
2017D9A1000
trusted library allocation
page read and write
49D0000
heap
page read and write
6561000
heap
page read and write
414000
heap
page read and write
25B50E0B000
trusted library allocation
page read and write
68A1000
heap
page read and write
414000
heap
page read and write
4E8E000
stack
page read and write
704000
heap
page read and write
68A1000
heap
page read and write
2018A28B000
trusted library allocation
page read and write
2018AFE7000
trusted library allocation
page read and write
201786E1000
heap
page read and write
25B499AB000
trusted library allocation
page read and write
20188166000
trusted library allocation
page read and write
24E1000
heap
page read and write
201786FD000
heap
page read and write
201811CC000
trusted library allocation
page read and write
20178723000
heap
page read and write
30AE000
stack
page read and write
259D000
heap
page read and write
6561000
heap
page read and write
20182D91000
trusted library allocation
page read and write
2018BCBE000
trusted library allocation
page read and write
2018A8C4000
trusted library allocation
page read and write
201809C9000
trusted library allocation
page read and write
25DE000
stack
page read and write
2018861B000
trusted library allocation
page read and write
2018816F000
trusted library allocation
page read and write
23743263000
trusted library allocation
page read and write
2018BD9C000
trusted library allocation
page read and write
6561000
heap
page read and write
25B486D0000
trusted library allocation
page read and write
2018183F000
trusted library allocation
page read and write
2018AFE4000
trusted library allocation
page read and write
24E7000
heap
page read and write
201786F5000
heap
page read and write
201786F5000
heap
page read and write
201851EA000
trusted library allocation
page read and write
25B4AABA000
trusted library allocation
page read and write
25DAEE0E000
trusted library allocation
page read and write
25B4925F000
trusted library allocation
page read and write
25B3ED1C000
heap
page read and write
20178723000
heap
page read and write
2A9F000
stack
page read and write
13E4000
heap
page read and write
1F84000
heap
page read and write
2017FC5A000
trusted library allocation
page read and write
201786E3000
heap
page read and write
36AF000
stack
page read and write
2018BCBE000
trusted library allocation
page read and write
E3C000
stack
page read and write
4EA0000
heap
page read and write
20183A7E000
trusted library allocation
page read and write
735E000
stack
page read and write
25B50FD6000
trusted library allocation
page read and write
6CAA1000
unkown
page execute read
25B489B3000
trusted library allocation
page read and write
2018A7E2000
trusted library allocation
page read and write
2018C531000
trusted library allocation
page read and write
2018BB39000
trusted library allocation
page read and write
25B39CB0000
heap
page read and write
68A1000
heap
page read and write
21E6000
heap
page read and write
600F000
stack
page read and write
96B0000
heap
page read and write
25B498C0000
trusted library allocation
page read and write
22A12000
heap
page read and write
25B489EC000
trusted library allocation
page read and write
437F000
stack
page read and write
20188169000
trusted library allocation
page read and write
2018C531000
trusted library allocation
page read and write
25B47D77000
trusted library allocation
page read and write
55DC000
stack
page read and write
250A000
heap
page read and write
2018BDAC000
trusted library allocation
page read and write
25B47EBD000
trusted library allocation
page read and write
B6D000
heap
page read and write
25B50F4A000
trusted library allocation
page read and write
2018162A000
trusted library allocation
page read and write
2D87000
heap
page read and write
25B52B7E000
trusted library allocation
page read and write
25B48023000
trusted library allocation
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
25B49300000
trusted library allocation
page read and write
13E4000
heap
page read and write
68A1000
heap
page read and write
25B44119000
trusted library allocation
page read and write
25B47F07000
trusted library allocation
page read and write
13E4000
heap
page read and write
2017F9F6000
trusted library allocation
page read and write
919000
unkown
page write copy
20188810000
trusted library allocation
page read and write
20178734000
heap
page read and write
20189CB4000
trusted library allocation
page read and write
20183ACF000
trusted library allocation
page read and write
2017DEBB000
trusted library allocation
page read and write
25B3ED21000
heap
page read and write
2018118D000
trusted library allocation
page read and write
2017FB18000
trusted library allocation
page read and write
2017875E000
heap
page read and write
20187E17000
trusted library allocation
page read and write
68A1000
heap
page read and write
5440000
direct allocation
page execute and read and write
25B452C1000
trusted library allocation
page read and write
6561000
heap
page read and write
2018810D000
trusted library allocation
page read and write
5334000
direct allocation
page execute and read and write
25B49600000
trusted library allocation
page read and write
201786E7000
heap
page read and write
20181055000
trusted library allocation
page read and write
FD0000
direct allocation
page read and write
201786F5000
heap
page read and write
BC231E8000
stack
page read and write
201812EB000
trusted library allocation
page read and write
201786E7000
heap
page read and write
25B49AC0000
trusted library allocation
page read and write
FFA000
unkown
page execute and write copy
2018ABF0000
trusted library allocation
page read and write
2018CE1A000
trusted library allocation
page read and write
414000
heap
page read and write
201881C8000
trusted library allocation
page read and write
25DAEAA0000
heap
page read and write
25B49503000
trusted library allocation
page read and write
4D81000
heap
page read and write
2374341E000
trusted library allocation
page read and write
464E000
stack
page read and write
2018A5D7000
trusted library allocation
page read and write
20190367000
trusted library allocation
page read and write
13E0000
direct allocation
page read and write
414000
heap
page read and write
2018A6AE000
trusted library allocation
page read and write
41EF000
stack
page read and write
2018A56F000
trusted library allocation
page read and write
41DE000
stack
page read and write
201903C5000
trusted library allocation
page read and write
2018BC32000
trusted library allocation
page read and write
25B48099000
trusted library allocation
page read and write
19E000
stack
page read and write
2017DCD5000
trusted library allocation
page read and write
BC2467B000
stack
page read and write
20188151000
trusted library allocation
page read and write
25B39890000
heap
page read and write
2018BC75000
trusted library allocation
page read and write
201885DD000
trusted library allocation
page read and write
201812AD000
trusted library allocation
page read and write
25B4AD2C000
trusted library allocation
page read and write
2018BF9C000
trusted library allocation
page read and write
3C8E000
stack
page read and write
201818BE000
trusted library allocation
page read and write
201811E4000
trusted library allocation
page read and write
25B3ED4A000
heap
page read and write
25B482F6000
trusted library allocation
page read and write
1330000
heap
page read and write
13E4000
heap
page read and write
53D0000
direct allocation
page execute and read and write
228B000
heap
page read and write
6561000
heap
page read and write
2018854A000
trusted library allocation
page read and write
3D7E000
stack
page read and write
229F7000
heap
page read and write
3D8E000
stack
page read and write
20190436000
trusted library allocation
page read and write
25B48099000
trusted library allocation
page read and write
68A1000
heap
page read and write
229EF000
heap
page read and write
22A21000
heap
page read and write
6561000
heap
page read and write
581F000
stack
page read and write
2018A858000
trusted library allocation
page read and write
201880D6000
trusted library allocation
page read and write
68A1000
heap
page read and write
4B00000
heap
page read and write
25B52B95000
trusted library allocation
page read and write
201786F3000
heap
page read and write
25B4670C000
trusted library allocation
page read and write
2017873A000
heap
page read and write
20183793000
trusted library allocation
page read and write
13E4000
heap
page read and write
4D81000
heap
page read and write
68A1000
heap
page read and write
2018BCCB000
trusted library allocation
page read and write
201903B8000
trusted library allocation
page read and write
2018AF4D000
trusted library allocation
page read and write
2018BCD0000
trusted library allocation
page read and write
1F84000
heap
page read and write
BC2C6BC000
stack
page read and write
4C5F000
stack
page read and write
2017E1DF000
trusted library allocation
page read and write
201811DA000
trusted library allocation
page read and write
20181371000
trusted library allocation
page read and write
49C0000
direct allocation
page execute and read and write
201809D0000
trusted library allocation
page read and write
2018A5DD000
trusted library allocation
page read and write
2018BA50000
trusted library allocation
page read and write
2017870E000
heap
page read and write
400000
unkown
page readonly
6561000
heap
page read and write
25B46743000
trusted library allocation
page read and write
20183ADF000
trusted library allocation
page read and write
2018A24D000
trusted library allocation
page read and write
201812F9000
trusted library allocation
page read and write
229F4000
heap
page read and write
414000
heap
page read and write
25B47FF5000
trusted library allocation
page read and write
2017FEE6000
trusted library allocation
page read and write
20173622000
heap
page read and write
2018BFA4000
trusted library allocation
page read and write
20180066000
trusted library allocation
page read and write
2017FE4E000
trusted library allocation
page read and write
25B4AD28000
trusted library allocation
page read and write
2018108A000
trusted library allocation
page read and write
25B489DD000
trusted library allocation
page read and write
1389D6A04000
trusted library allocation
page read and write
68A1000
heap
page read and write
439F000
stack
page read and write
25B37C00000
trusted library allocation
page read and write
414000
heap
page read and write
2017DCE2000
trusted library allocation
page read and write
468E000
stack
page read and write
6561000
heap
page read and write
4D81000
heap
page read and write
20182D47000
trusted library allocation
page read and write
25B3ED21000
heap
page read and write
201786F5000
heap
page read and write
BCE000
heap
page read and write
20189E18000
trusted library allocation
page read and write
24E7000
heap
page read and write
30DF000
stack
page read and write
2017872A000
heap
page read and write
454E000
stack
page read and write
25B48B03000
trusted library allocation
page read and write
6561000
heap
page read and write
201786E1000
heap
page read and write
5330000
direct allocation
page execute and read and write
2018BF5F000
trusted library allocation
page read and write
2017F99E000
trusted library allocation
page read and write
2018103F000
trusted library allocation
page read and write
25B52B2D000
trusted library allocation
page read and write
20180D8B000
trusted library allocation
page read and write
201801BA000
trusted library allocation
page read and write
2017873D000
heap
page read and write
2018117B000
trusted library allocation
page read and write
6561000
heap
page read and write
2017F96D000
trusted library allocation
page read and write
398F000
stack
page read and write
25B43887000
trusted library allocation
page read and write
2018064D000
trusted library allocation
page read and write
2018A869000
trusted library allocation
page read and write
25B47B5F000
trusted library allocation
page read and write
A37000
unkown
page execute and write copy
FE0000
heap
page read and write
2018BC17000
trusted library allocation
page read and write
2018AF09000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B47FF5000
trusted library allocation
page read and write
2CD0000
direct allocation
page read and write
6561000
heap
page read and write
5460000
direct allocation
page execute and read and write
1E077E1A000
heap
page read and write
4A20000
direct allocation
page execute and read and write
2018BCF5000
trusted library allocation
page read and write
6561000
heap
page read and write
201812E6000
trusted library allocation
page read and write
25B52B2D000
trusted library allocation
page read and write
20188176000
trusted library allocation
page read and write
5334000
direct allocation
page execute and read and write
2017FE8B000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
1C4BF000
stack
page read and write
20189A31000
trusted library allocation
page read and write
6561000
heap
page read and write
25B50FC3000
trusted library allocation
page read and write
20178726000
heap
page read and write
1E076307000
heap
page read and write
2C3E000
stack
page read and write
2017F87B000
trusted library allocation
page read and write
68A1000
heap
page read and write
6561000
heap
page read and write
2017FE2A000
trusted library allocation
page read and write
2017D323000
trusted library allocation
page read and write
201851D5000
trusted library allocation
page read and write
25B48900000
trusted library allocation
page read and write
BC2D1FC000
stack
page read and write
68A1000
heap
page read and write
2017F96D000
trusted library allocation
page read and write
25B50C40000
trusted library allocation
page read and write
201818B0000
trusted library allocation
page read and write
201812DC000
trusted library allocation
page read and write
13E4000
heap
page read and write
25B45441000
trusted library allocation
page read and write
25B453C5000
trusted library allocation
page read and write
2018165C000
trusted library allocation
page read and write
20178741000
heap
page read and write
410C000
heap
page read and write
25B3ECE0000
heap
page read and write
229EA000
heap
page read and write
201811C4000
trusted library allocation
page read and write
2017FB4F000
trusted library allocation
page read and write
20190500000
trusted library allocation
page read and write
2017872A000
heap
page read and write
AAC257E000
unkown
page readonly
20178746000
heap
page read and write
229DB000
heap
page read and write
25B44445000
trusted library allocation
page read and write
25B480F3000
trusted library allocation
page read and write
229F5000
heap
page read and write
2017E5F2000
trusted library allocation
page read and write
12A6F7204000
trusted library allocation
page read and write
2017875F000
heap
page read and write
25B48B0B000
trusted library allocation
page read and write
1CA5E000
stack
page read and write
2018C58F000
trusted library allocation
page read and write
555E000
stack
page read and write
2017DEDB000
trusted library allocation
page read and write
25B49757000
trusted library allocation
page read and write
BC2C97B000
stack
page read and write
68A1000
heap
page read and write
25B3ED21000
heap
page read and write
20178734000
heap
page read and write
201786FD000
heap
page read and write
201811DE000
trusted library allocation
page read and write
25B47F1E000
trusted library allocation
page read and write
2017D9B3000
trusted library allocation
page read and write
13E4000
heap
page read and write
20183799000
trusted library allocation
page read and write
201812BC000
trusted library allocation
page read and write
3FCF000
stack
page read and write
338E000
stack
page read and write
25B480A9000
trusted library allocation
page read and write
BCE000
heap
page read and write
68A1000
heap
page read and write
6561000
heap
page read and write
BCB000
unkown
page execute and read and write
25B47CF0000
trusted library section
page readonly
860000
heap
page read and write
6561000
heap
page read and write
68A1000
heap
page read and write
25B49800000
trusted library allocation
page read and write
25B485CC000
trusted library allocation
page read and write
2017D475000
trusted library allocation
page read and write
2018BC0A000
trusted library allocation
page read and write
20189CF5000
trusted library allocation
page read and write
25B4F232000
trusted library allocation
page read and write
25B4C212000
trusted library allocation
page read and write
25B3ED15000
heap
page read and write
13E4000
heap
page read and write
25B45E0A000
trusted library allocation
page read and write
20182A0C000
trusted library allocation
page read and write
4140000
heap
page read and write
25B4584C000
trusted library allocation
page read and write
25B48B90000
trusted library allocation
page read and write
2018BA60000
trusted library allocation
page read and write
30FB000
stack
page read and write
2017870E000
heap
page read and write
194000
stack
page read and write
1F80000
heap
page read and write
6561000
heap
page read and write
5020000
direct allocation
page execute and read and write
20181871000
trusted library allocation
page read and write
25B4C208000
trusted library allocation
page read and write
20187E8B000
trusted library allocation
page read and write
2390000
heap
page read and write
201851EF000
trusted library allocation
page read and write
1124000
heap
page read and write
68A1000
heap
page read and write
68A1000
heap
page read and write
2018BC24000
trusted library allocation
page read and write
6E4097E000
unkown
page readonly
68A1000
heap
page read and write
20188562000
trusted library allocation
page read and write
4A0F000
stack
page read and write
68A1000
heap
page read and write
414000
heap
page read and write
2018BC4C000
trusted library allocation
page read and write
68A1000
heap
page read and write
730000
unkown
page readonly
25B43724000
trusted library allocation
page read and write
25B3ED50000
heap
page read and write
2017F93E000
trusted library allocation
page read and write
2018BC4C000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B482B4000
trusted library allocation
page read and write
1AC0000
heap
page read and write
2018A564000
trusted library allocation
page read and write
1F10000
direct allocation
page execute and read and write
2018BBF5000
trusted library allocation
page read and write
2018BDE8000
trusted library allocation
page read and write
2018AC7E000
trusted library allocation
page read and write
2610000
direct allocation
page read and write
2018BAFC000
trusted library allocation
page read and write
414000
heap
page read and write
25B482CC000
trusted library allocation
page read and write
25B4D800000
trusted library allocation
page read and write
2017872E000
heap
page read and write
2018BD9F000
trusted library allocation
page read and write
53C0000
direct allocation
page execute and read and write
20183A51000
trusted library allocation
page read and write
2110000
heap
page read and write
25B45700000
trusted library section
page readonly
68A1000
heap
page read and write
2018ACE3000
trusted library allocation
page read and write
20178709000
heap
page read and write
2018C800000
trusted library allocation
page read and write
1E64000
heap
page read and write
20183ACF000
trusted library allocation
page read and write
2017F96D000
trusted library allocation
page read and write
201812DC000
trusted library allocation
page read and write
25B482BE000
trusted library allocation
page read and write
20190290000
trusted library allocation
page read and write
25B44100000
trusted library allocation
page read and write
890000
unkown
page execute and read and write
25B458FE000
trusted library allocation
page read and write
414000
heap
page read and write
3A0E000
stack
page read and write
20182DF6000
trusted library allocation
page read and write
20181377000
trusted library allocation
page read and write
51E0000
direct allocation
page execute and read and write
20189EB1000
trusted library allocation
page read and write
2017FCC0000
trusted library allocation
page read and write
13E4000
heap
page read and write
25B3ED40000
heap
page read and write
2018BC52000
trusted library allocation
page read and write
23743412000
trusted library allocation
page read and write
201812C9000
trusted library allocation
page read and write
61E01000
direct allocation
page execute read
25B50C51000
trusted library allocation
page read and write
20189D53000
trusted library allocation
page read and write
25B48D28000
trusted library allocation
page read and write
5D5C000
stack
page read and write
2018137B000
trusted library allocation
page read and write
2018BF56000
trusted library allocation
page read and write
1BE0000
heap
page read and write
20178726000
heap
page read and write
25B3ED2F000
heap
page read and write
25B47F6F000
trusted library allocation
page read and write
25B4944E000
trusted library allocation
page read and write
201786F5000
heap
page read and write
68A1000
heap
page read and write
2018ABA4000
trusted library allocation
page read and write
2018180A000
trusted library allocation
page read and write
25B499E7000
trusted library allocation
page read and write
25B480E4000
trusted library allocation
page read and write
20181BC3000
trusted library allocation
page read and write
1A1F000
stack
page read and write
25B4ADAC000
trusted library allocation
page read and write
1C8CF000
stack
page read and write
2017FA63000
trusted library allocation
page read and write
201851E2000
trusted library allocation
page read and write
35AE000
stack
page read and write
2017DEEA000
trusted library allocation
page read and write
2018AF85000
trusted library allocation
page read and write
23742EC0000
unclassified section
page readonly
2018BF5F000
trusted library allocation
page read and write
13E4000
heap
page read and write
2017FE1E000
trusted library allocation
page read and write
313C000
stack
page read and write
5290000
direct allocation
page execute and read and write
5A395FF000
stack
page read and write
2018A2FE000
trusted library allocation
page read and write
20181191000
trusted library allocation
page read and write
4F64000
direct allocation
page execute and read and write
2018BDE4000
trusted library allocation
page read and write
20183AF5000
trusted library allocation
page read and write
2017FEAD000
trusted library allocation
page read and write
25B47900000
trusted library allocation
page read and write
25B45483000
trusted library allocation
page read and write
6561000
heap
page read and write
2018A6C0000
trusted library allocation
page read and write
25B4809A000
trusted library allocation
page read and write
2018A1B0000
trusted library allocation
page read and write
85D000
unkown
page readonly
1E077E10000
heap
page read and write
2017F869000
trusted library allocation
page read and write
20183A8B000
trusted library allocation
page read and write
20183738000
trusted library allocation
page read and write
2018817F000
trusted library allocation
page read and write
2018BCE0000
trusted library allocation
page read and write
20181068000
trusted library allocation
page read and write
13E4000
heap
page read and write
61ED4000
direct allocation
page readonly
25DAEE32000
trusted library allocation
page read and write
25B3ED1C000
heap
page read and write
25B45D08000
trusted library allocation
page read and write
3E9F000
stack
page read and write
438F000
stack
page read and write
2018118F000
trusted library allocation
page read and write
68A1000
heap
page read and write
AE0000
direct allocation
page read and write
6561000
heap
page read and write
6561000
heap
page read and write
9D1000
unkown
page execute and write copy
F3D000
stack
page read and write
2018BC54000
trusted library allocation
page read and write
25B4AC03000
trusted library allocation
page read and write
2018A7CB000
trusted library allocation
page read and write
2017FB14000
trusted library allocation
page read and write
23743280000
trusted library allocation
page read and write
2018A5FB000
trusted library allocation
page read and write
5450000
direct allocation
page execute and read and write
25B3ED26000
heap
page read and write
1430000
direct allocation
page read and write
2018A58E000
trusted library allocation
page read and write
342F000
stack
page read and write
25B51A2A000
trusted library allocation
page read and write
6561000
heap
page read and write
2018C15C000
trusted library allocation
page read and write
201818BA000
trusted library allocation
page read and write
20187E84000
trusted library allocation
page read and write
2018BCCE000
trusted library allocation
page read and write
50B0000
direct allocation
page execute and read and write
201786FD000
heap
page read and write
2018A0FE000
trusted library allocation
page read and write
6561000
heap
page read and write
20187EFC000
trusted library allocation
page read and write
6A6E000
stack
page read and write
20182A14000
trusted library allocation
page read and write
2018136E000
trusted library allocation
page read and write
6561000
heap
page read and write
320F000
stack
page read and write
24AE000
stack
page read and write
20187EAB000
trusted library allocation
page read and write
2017D418000
trusted library allocation
page read and write
BBA000
heap
page read and write
25B47F4F000
trusted library allocation
page read and write
20182A7A000
trusted library allocation
page read and write
2017D927000
trusted library allocation
page read and write
5420000
direct allocation
page execute and read and write
229F0000
heap
page read and write
9C000
stack
page read and write
2017FC6A000
trusted library allocation
page read and write
20189D23000
trusted library allocation
page read and write
6561000
heap
page read and write
2017DBDC000
trusted library allocation
page read and write
20181174000
trusted library allocation
page read and write
201786E7000
heap
page read and write
36EE000
stack
page read and write
2CD0000
direct allocation
page read and write
2018BC2F000
trusted library allocation
page read and write
68A1000
heap
page read and write
6561000
heap
page read and write
2018BD4D000
trusted library allocation
page read and write
68A1000
heap
page read and write
201810B7000
trusted library allocation
page read and write
20183AF7000
trusted library allocation
page read and write
25B3ED1B000
heap
page read and write
2017F96D000
trusted library allocation
page read and write
25B4914D000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B48ADB000
trusted library allocation
page read and write
229E7000
heap
page read and write
5200000
direct allocation
page execute and read and write
25B45303000
trusted library allocation
page read and write
11DB000
heap
page read and write
20181165000
trusted library allocation
page read and write
2017FC5A000
trusted library allocation
page read and write
201881F2000
trusted library allocation
page read and write
68A1000
heap
page read and write
6150000
heap
page read and write
25B45498000
trusted library allocation
page read and write
201786F5000
heap
page read and write
25B3ED52000
heap
page read and write
464F000
stack
page read and write
FD0000
direct allocation
page read and write
361E000
stack
page read and write
2017FEAD000
trusted library allocation
page read and write
704000
heap
page read and write
25B48B9F000
trusted library allocation
page read and write
25B45C0A000
trusted library allocation
page read and write
2018BFA4000
trusted library allocation
page read and write
2017872E000
heap
page read and write
2018BCF3000
trusted library allocation
page read and write
2017D9F4000
trusted library allocation
page read and write
25B4807A000
trusted library allocation
page read and write
20181382000
trusted library allocation
page read and write
201812C3000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018A7D0000
trusted library allocation
page read and write
2018BAE6000
trusted library allocation
page read and write
14F6000
heap
page read and write
6561000
heap
page read and write
150D000
heap
page read and write
2018A5E7000
trusted library allocation
page read and write
25DAEAEF000
unclassified section
page read and write
20178734000
heap
page read and write
68A1000
heap
page read and write
3E6E000
stack
page read and write
2575000
heap
page read and write
4140000
heap
page read and write
25B4927A000
trusted library allocation
page read and write
6561000
heap
page read and write
8CFF000
stack
page read and write
201810BE000
trusted library allocation
page read and write
25B45400000
trusted library allocation
page read and write
2017D4BA000
trusted library allocation
page read and write
6561000
heap
page read and write
25B4AB03000
trusted library allocation
page read and write
20188616000
trusted library allocation
page read and write
13E4000
heap
page read and write
2018A899000
trusted library allocation
page read and write
5E3D000
stack
page read and write
4D81000
heap
page read and write
2018BC2F000
trusted library allocation
page read and write
13E4000
heap
page read and write
2018A5EA000
trusted library allocation
page read and write
2018C50A000
trusted library allocation
page read and write
201786F5000
heap
page read and write
25B480EA000
trusted library allocation
page read and write
25B46304000
trusted library allocation
page read and write
68A1000
heap
page read and write
68A1000
heap
page read and write
47E0000
trusted library allocation
page read and write
2018815E000
trusted library allocation
page read and write
49F000
unkown
page execute and read and write
2017872B000
heap
page read and write
20183A6A000
trusted library allocation
page read and write
AABFBFE000
stack
page read and write
429E000
stack
page read and write
2018A7E2000
trusted library allocation
page read and write
25B3ED52000
heap
page read and write
32EF000
stack
page read and write
68A1000
heap
page read and write
53C0000
direct allocation
page execute and read and write
13E4000
heap
page read and write
20187EDA000
trusted library allocation
page read and write
20189D29000
trusted library allocation
page read and write
39DE000
stack
page read and write
229F0000
heap
page read and write
25B458C7000
trusted library allocation
page read and write
25B4DD28000
trusted library allocation
page read and write
4D81000
heap
page read and write
25B49AED000
trusted library allocation
page read and write
2017872A000
heap
page read and write
25B3ED50000
heap
page read and write
25B4AD53000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B4375D000
trusted library allocation
page read and write
2019033B000
trusted library allocation
page read and write
25B4821E000
trusted library allocation
page read and write
25B4ADE3000
trusted library allocation
page read and write
2018ACAA000
trusted library allocation
page read and write
20178722000
heap
page read and write
25B3ED52000
heap
page read and write
2018A564000
trusted library allocation
page read and write
25B454C7000
trusted library allocation
page read and write
2018A7CE000
trusted library allocation
page read and write
201851A7000
trusted library allocation
page read and write
12F4000
heap
page read and write
25B4A400000
trusted library allocation
page read and write
33CE000
stack
page read and write
25B46747000
trusted library allocation
page read and write
201812AB000
trusted library allocation
page read and write
42A3000
heap
page read and write
414000
heap
page read and write
2017872E000
heap
page read and write
201810D9000
trusted library allocation
page read and write
4CF0000
trusted library allocation
page read and write
2018BA46000
trusted library allocation
page read and write
25B52B40000
trusted library allocation
page read and write
2018BA8E000
trusted library allocation
page read and write
25B47B2B000
trusted library allocation
page read and write
2017873C000
heap
page read and write
6561000
heap
page read and write
2018C336000
trusted library allocation
page read and write
1C69E000
stack
page read and write
91B000
unkown
page execute and read and write
25B4C210000
trusted library allocation
page read and write
25B49A28000
trusted library allocation
page read and write
25B3ED10000
heap
page read and write
2018A270000
trusted library allocation
page read and write
490E000
stack
page read and write
2018ABBE000
trusted library allocation
page read and write
87AE000
stack
page read and write
25B48470000
trusted library section
page read and write
478E000
stack
page read and write
399F000
stack
page read and write
704000
heap
page read and write
25B50E77000
trusted library allocation
page read and write
201816C6000
trusted library allocation
page read and write
25B4FD4D000
trusted library allocation
page read and write
45FF000
stack
page read and write
25B44572000
trusted library allocation
page read and write
50CE000
stack
page read and write
68A1000
heap
page read and write
2018A5C7000
trusted library allocation
page read and write
2018ABBE000
trusted library allocation
page read and write
2018B6A3000
trusted library allocation
page read and write
2017F852000
trusted library allocation
page read and write
201811A1000
trusted library allocation
page read and write
1DEC3961000
trusted library allocation
page execute read
2017872A000
heap
page read and write
2018BAE3000
trusted library allocation
page read and write
25B3ED26000
heap
page read and write
20181882000
trusted library allocation
page read and write
2018CD55000
trusted library allocation
page read and write
25B49222000
trusted library allocation
page read and write
48A1000
direct allocation
page read and write
20178734000
heap
page read and write
20181895000
trusted library allocation
page read and write
2018A268000
trusted library allocation
page read and write
2018A5F3000
trusted library allocation
page read and write
1DEC39D0000
trusted library allocation
page execute read
201806F9000
trusted library allocation
page read and write
25B52B67000
trusted library allocation
page read and write
201810A2000
trusted library allocation
page read and write
23743090000
unclassified section
page read and write
4D81000
heap
page read and write
25B49ABD000
trusted library allocation
page read and write
6561000
heap
page read and write
8B1000
unkown
page execute and write copy
2018117F000
trusted library allocation
page read and write
201786F5000
heap
page read and write
2018816F000
trusted library allocation
page read and write
FF7000
unkown
page execute and write copy
4D1000
unkown
page execute and read and write
3ABF000
stack
page read and write
15BD000
heap
page read and write
201818B0000
trusted library allocation
page read and write
2841000
heap
page read and write
5090000
direct allocation
page execute and read and write
20178713000
heap
page read and write
201812E2000
trusted library allocation
page read and write
244C000
unkown
page readonly
4100000
heap
page read and write
25B4F200000
trusted library allocation
page read and write
25B485DD000
trusted library allocation
page read and write
20178722000
heap
page read and write
25B50E35000
trusted library allocation
page read and write
25B48B0D000
trusted library allocation
page read and write
414000
heap
page read and write
25DAEAE2000
unclassified section
page read and write
2C10000
direct allocation
page read and write
25B495ED000
trusted library allocation
page read and write
414000
heap
page read and write
2018A587000
trusted library allocation
page read and write
25B49A24000
trusted library allocation
page read and write
68A1000
heap
page read and write
52D1000
direct allocation
page read and write
6561000
heap
page read and write
B69000
heap
page read and write
212DEF00000
trusted library allocation
page read and write
68A1000
heap
page read and write
1669000
heap
page read and write
1F84000
heap
page read and write
4A11000
heap
page read and write
20178722000
heap
page read and write
2018812B000
trusted library allocation
page read and write
2017FE64000
trusted library allocation
page read and write
25B3ED23000
heap
page read and write
2017D500000
trusted library allocation
page read and write
68A1000
heap
page read and write
20181323000
trusted library allocation
page read and write
201786FD000
heap
page read and write
1320000
heap
page read and write
7B10000
heap
page read and write
2018AC23000
trusted library allocation
page read and write
2018C5FE000
trusted library allocation
page read and write
2018126E000
trusted library allocation
page read and write
13E4000
heap
page read and write
201816B9000
trusted library allocation
page read and write
25B44175000
trusted library allocation
page read and write
201786FD000
heap
page read and write
25B459B1000
heap
page read and write
20178734000
heap
page read and write
6561000
heap
page read and write
25B47F40000
trusted library allocation
page read and write
2018AFFE000
trusted library allocation
page read and write
229F4000
heap
page read and write
373E000
stack
page read and write
2017D0C2000
trusted library allocation
page read and write
3ECF000
stack
page read and write
6561000
heap
page read and write
BC275F3000
stack
page read and write
13E5000
heap
page read and write
6561000
heap
page read and write
2017D9A1000
trusted library allocation
page read and write
441D000
stack
page read and write
BC230EE000
stack
page read and write
68A1000
heap
page read and write
1F84000
heap
page read and write
68A1000
heap
page read and write
2017FBE0000
trusted library allocation
page read and write
13E4000
heap
page read and write
2018A0F5000
trusted library allocation
page read and write
2018135D000
trusted library allocation
page read and write
2017D4F5000
trusted library allocation
page read and write
2017FB70000
trusted library allocation
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
25B4922C000
trusted library allocation
page read and write
25B48503000
trusted library allocation
page read and write
25DAEA20000
heap
page read and write
D6B000
unkown
page execute and read and write
62C000
unkown
page execute and read and write
1EB6000
heap
page read and write
1E80000
heap
page read and write
2017873D000
heap
page read and write
2018BC75000
trusted library allocation
page read and write
20178709000
heap
page read and write
25B467F1000
trusted library allocation
page read and write
25B3ED2F000
heap
page read and write
3BAF000
stack
page read and write
8B1000
unkown
page execute and write copy
2018BAE6000
trusted library allocation
page read and write
2018BC15000
trusted library allocation
page read and write
201886B0000
trusted library allocation
page read and write
14A0000
heap
page read and write
6561000
heap
page read and write
201786E0000
heap
page read and write
2018BC6A000
trusted library allocation
page read and write
25B3ED26000
heap
page read and write
3ADF000
stack
page read and write
2018A59C000
trusted library allocation
page read and write
2017872B000
heap
page read and write
20178700000
heap
page read and write
6561000
heap
page read and write
2CD0000
direct allocation
page read and write
6561000
heap
page read and write
D6D000
unkown
page execute and write copy
2018A870000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
2018BC49000
trusted library allocation
page read and write
201811C4000
trusted library allocation
page read and write
2018BAC8000
trusted library allocation
page read and write
2018A7EA000
trusted library allocation
page read and write
229F7000
heap
page read and write
5280000
direct allocation
page execute and read and write
6561000
heap
page read and write
25B49A62000
trusted library allocation
page read and write
201786F3000
heap
page read and write
6561000
heap
page read and write
63DC000
stack
page read and write
25B49A00000
trusted library allocation
page read and write
13E4000
heap
page read and write
2018183F000
trusted library allocation
page read and write
25B489D2000
trusted library allocation
page read and write
4A50000
direct allocation
page execute and read and write
478F000
stack
page read and write
704000
heap
page read and write
2018A56F000
trusted library allocation
page read and write
25B3ED15000
heap
page read and write
20182DDE000
trusted library allocation
page read and write
25B480A9000
trusted library allocation
page read and write
2018C2BA000
trusted library allocation
page read and write
25B47F4F000
trusted library allocation
page read and write
6561000
heap
page read and write
2018118B000
trusted library allocation
page read and write
25B4FC03000
trusted library allocation
page read and write
4A325FC000
stack
page read and write
25B4370B000
trusted library allocation
page read and write
2018C836000
trusted library allocation
page read and write
5040000
direct allocation
page execute and read and write
2017872F000
heap
page read and write
6E3F8FE000
unkown
page readonly
6561000
heap
page read and write
201786F5000
heap
page read and write
201786FD000
heap
page read and write
13E4000
heap
page read and write
414000
heap
page read and write
201902EC000
trusted library allocation
page read and write
25B48B3F000
trusted library allocation
page read and write
25B52B00000
trusted library allocation
page read and write
4A11000
heap
page read and write
25B49A84000
trusted library allocation
page read and write
2018CA0E000
trusted library allocation
page read and write
1CA60000
trusted library allocation
page read and write
25B49887000
trusted library allocation
page read and write
FD0000
direct allocation
page read and write
20181885000
trusted library allocation
page read and write
1508000
heap
page read and write
1530000
heap
page read and write
201786FC000
heap
page read and write
1508000
heap
page read and write
415000
heap
page read and write
2018AB68000
trusted library allocation
page read and write
2018CDEE000
trusted library allocation
page read and write
2018BCAF000
trusted library allocation
page read and write
2019028E000
trusted library allocation
page read and write
912000
unkown
page execute and read and write
68A1000
heap
page read and write
13E4000
heap
page read and write
2018118D000
trusted library allocation
page read and write
2018BFBC000
trusted library allocation
page read and write
2018165D000
trusted library allocation
page read and write
2018BC49000
trusted library allocation
page read and write
2017D9BD000
trusted library allocation
page read and write
25B4A9BC000
trusted library allocation
page read and write
414000
heap
page read and write
20178734000
heap
page read and write
2018119A000
trusted library allocation
page read and write
2017DBFC000
trusted library allocation
page read and write
2018BA66000
trusted library allocation
page read and write
20187EDA000
trusted library allocation
page read and write
2017873D000
heap
page read and write
2018BA76000
trusted library allocation
page read and write
20178733000
heap
page read and write
23742E40000
unclassified section
page readonly
2017D0C6000
trusted library allocation
page read and write
5BFE000
stack
page read and write
3C0000
heap
page read and write
201903A4000
trusted library allocation
page read and write
13E4000
heap
page read and write
25B45863000
trusted library allocation
page read and write
2018AFDE000
trusted library allocation
page read and write
20187E73000
trusted library allocation
page read and write
25B45850000
trusted library allocation
page read and write
2018BCB5000
trusted library allocation
page read and write
20189E81000
trusted library allocation
page read and write
2018BCCE000
trusted library allocation
page read and write
2018AC86000
trusted library allocation
page read and write
20189D46000
trusted library allocation
page read and write
414000
heap
page read and write
20178741000
heap
page read and write
2018188E000
trusted library allocation
page read and write
25B4DD2E000
trusted library allocation
page read and write
68A1000
heap
page read and write
42DE000
stack
page read and write
20178781000
heap
page read and write
2018BB41000
trusted library allocation
page read and write
201881E1000
trusted library allocation
page read and write
201786E0000
heap
page read and write
2017FC73000
trusted library allocation
page read and write
244C000
unkown
page readonly
BC27B7D000
stack
page read and write
2018A7F6000
trusted library allocation
page read and write
2017D4F9000
trusted library allocation
page read and write
4D80000
heap
page read and write
1F84000
heap
page read and write
25B445DE000
trusted library allocation
page read and write
677E000
heap
page read and write
1F84000
heap
page read and write
25B4ADB4000
trusted library allocation
page read and write
570000
unkown
page readonly
2018A6FB000
trusted library allocation
page read and write
2018165C000
trusted library allocation
page read and write
6561000
heap
page read and write
25B46757000
trusted library allocation
page read and write
20173616000
heap
page read and write
2018BA94000
trusted library allocation
page read and write
2018BDFE000
trusted library allocation
page read and write
20185198000
trusted library allocation
page read and write
20180982000
trusted library allocation
page read and write
2018AC23000
trusted library allocation
page read and write
201786E1000
heap
page read and write
2018BC52000
trusted library allocation
page read and write
25B50F03000
trusted library allocation
page read and write
25B48D03000
trusted library allocation
page read and write
F3D000
unkown
page execute and write copy
68A1000
heap
page read and write
20185106000
trusted library allocation
page read and write
2018BF56000
trusted library allocation
page read and write
25B3ED52000
heap
page read and write
BB8000
heap
page read and write
6561000
heap
page read and write
700000
heap
page read and write
482F000
stack
page read and write
2018BF4C000
trusted library allocation
page read and write
2018B9CA000
trusted library allocation
page read and write
2018BC0E000
trusted library allocation
page read and write
2018117F000
trusted library allocation
page read and write
201812E6000
trusted library allocation
page read and write
25B4FD5C000
trusted library allocation
page read and write
201818E7000
trusted library allocation
page read and write
14F2000
heap
page read and write
25B47FF5000
trusted library allocation
page read and write
25B441B9000
trusted library allocation
page read and write
2018BCB5000
trusted library allocation
page read and write
20187FA5000
trusted library allocation
page read and write
2018165C000
trusted library allocation
page read and write
BC2475E000
stack
page read and write
13E5000
heap
page read and write
25B444B0000
trusted library allocation
page read and write
25B4ACED000
trusted library allocation
page read and write
201786FD000
heap
page read and write
25B480D7000
trusted library allocation
page read and write
2018BD82000
trusted library allocation
page read and write
25B3ED2A000
heap
page read and write
20187E88000
trusted library allocation
page read and write
20178734000
heap
page read and write
68A1000
heap
page read and write
20181154000
trusted library allocation
page read and write
2711000
heap
page read and write
25B3ED2F000
heap
page read and write
2018C2BF000
trusted library allocation
page read and write
13E4000
heap
page read and write
2017FBB4000
trusted library allocation
page read and write
2017D8FE000
trusted library allocation
page read and write
201885C1000
trusted library allocation
page read and write
2018AFC1000
trusted library allocation
page read and write
1C6DE000
stack
page read and write
25DAEC63000
trusted library allocation
page read and write
2018CE59000
trusted library allocation
page read and write
25B45353000
trusted library allocation
page read and write
2018A5E7000
trusted library allocation
page read and write
BB3000
heap
page read and write
20181832000
trusted library allocation
page read and write
1E1E000
heap
page read and write
25B3ED1F000
heap
page read and write
68A1000
heap
page read and write
2018AFB4000
trusted library allocation
page read and write
49FE000
stack
page read and write
2017DEB3000
trusted library allocation
page read and write
229E8000
heap
page read and write
2018BC0E000
trusted library allocation
page read and write
201786E0000
heap
page read and write
2018AFFC000
trusted library allocation
page read and write
2018C100000
trusted library allocation
page read and write
6561000
heap
page read and write
13E5000
heap
page read and write
2017D4A4000
trusted library allocation
page read and write
2018BF62000
trusted library allocation
page read and write
2018BC25000
trusted library allocation
page read and write
49CF000
stack
page read and write
201811A5000
trusted library allocation
page read and write
25B4803A000
trusted library allocation
page read and write
20181174000
trusted library allocation
page read and write
201786F6000
heap
page read and write
479F000
stack
page read and write
2018BAE6000
trusted library allocation
page read and write
2018BF5C000
trusted library allocation
page read and write
20181174000
trusted library allocation
page read and write
3C4E000
stack
page read and write
68A1000
heap
page read and write
25B4C011000
trusted library allocation
page read and write
25B43698000
trusted library allocation
page read and write
1E077E2A000
heap
page read and write
13E4000
heap
page read and write
13E5000
heap
page read and write
13E4000
heap
page read and write
135E000
stack
page read and write
20188167000
trusted library allocation
page read and write
2018BAC6000
trusted library allocation
page read and write
13E4000
heap
page read and write
68A1000
heap
page read and write
2E8F000
stack
page read and write
3B0F000
stack
page read and write
2018815A000
trusted library allocation
page read and write
645F000
stack
page read and write
13E4000
heap
page read and write
25B4AEA0000
trusted library allocation
page read and write
2017DEBB000
trusted library allocation
page read and write
2018A84A000
trusted library allocation
page read and write
361E000
stack
page read and write
2018BF62000
trusted library allocation
page read and write
20178759000
heap
page read and write
20187EBC000
trusted library allocation
page read and write
25B50EC8000
trusted library allocation
page read and write
2CD0000
direct allocation
page read and write
25B47903000
trusted library allocation
page read and write
22A11000
heap
page read and write
284B000
heap
page read and write
704000
heap
page read and write
25B47F33000
trusted library allocation
page read and write
201812F9000
trusted library allocation
page read and write
2018A83C000
trusted library allocation
page read and write
2018BCAC000
trusted library allocation
page read and write
25B453FE000
trusted library allocation
page read and write
20181183000
trusted library allocation
page read and write
13E4000
heap
page read and write
20178722000
heap
page read and write
614F000
stack
page read and write
25B488AB000
trusted library allocation
page read and write
201850FB000
trusted library allocation
page read and write
20185149000
trusted library allocation
page read and write
2017FE4E000
trusted library allocation
page read and write
FE6000
heap
page read and write
252E000
stack
page read and write
20180961000
trusted library allocation
page read and write
2018A645000
trusted library allocation
page read and write
5020000
direct allocation
page execute and read and write
324F000
stack
page read and write
2018188E000
trusted library allocation
page read and write
20188166000
trusted library allocation
page read and write
2017FBE0000
trusted library allocation
page read and write
244C000
unkown
page readonly
25B47F03000
trusted library allocation
page read and write
13E4000
heap
page read and write
25B49A38000
trusted library allocation
page read and write
1590000
direct allocation
page read and write
2017E5E5000
trusted library allocation
page read and write
2017872E000
heap
page read and write
201903E8000
trusted library allocation
page read and write
6561000
heap
page read and write
2DEF000
stack
page read and write
201838FB000
trusted library allocation
page read and write
BCB000
unkown
page execute and write copy
4D81000
heap
page read and write
866B000
stack
page read and write
20189DF5000
trusted library allocation
page read and write
13E4000
heap
page read and write
20188121000
trusted library allocation
page read and write
16064200000
trusted library allocation
page read and write
25B44103000
trusted library allocation
page read and write
48CE000
stack
page read and write
68A1000
heap
page read and write
25B484B0000
trusted library section
page read and write
20185179000
trusted library allocation
page read and write
5E06000
heap
page read and write
20178722000
heap
page read and write
2018816F000
trusted library allocation
page read and write
2017D323000
trusted library allocation
page read and write
6561000
heap
page read and write
1E7A000
heap
page read and write
2018516E000
trusted library allocation
page read and write
201851FA000
trusted library allocation
page read and write
2018B9D8000
trusted library allocation
page read and write
F70000
heap
page read and write
71B000
unkown
page execute and read and write
6561000
heap
page read and write
201818BA000
trusted library allocation
page read and write
201810F9000
trusted library allocation
page read and write
25B50F83000
trusted library allocation
page read and write
62C000
unkown
page execute and read and write
68A1000
heap
page read and write
2018B6A3000
trusted library allocation
page read and write
25DAEC12000
trusted library allocation
page read and write
25DAEC03000
trusted library allocation
page read and write
20178702000
heap
page read and write
68A1000
heap
page read and write
2018AFCC000
trusted library allocation
page read and write
AE9000
unkown
page write copy
2018A593000
trusted library allocation
page read and write
375E000
stack
page read and write
25B4ADB0000
trusted library allocation
page read and write
2BDF000
stack
page read and write
25B46009000
trusted library allocation
page read and write
A81000
unkown
page execute and write copy
27A8000
heap
page read and write
2018A516000
trusted library allocation
page read and write
201786E7000
heap
page read and write
2CAE000
stack
page read and write
201881E1000
trusted library allocation
page read and write
20180951000
trusted library allocation
page read and write
2018819E000
trusted library allocation
page read and write
2600000
heap
page read and write
6561000
heap
page read and write
414000
heap
page read and write
23743416000
trusted library allocation
page read and write
2018A2EA000
trusted library allocation
page read and write
BBC000
unkown
page execute and read and write
2017D479000
trusted library allocation
page read and write
25B4806B000
trusted library allocation
page read and write
201851EA000
trusted library allocation
page read and write
20182ADE000
trusted library allocation
page read and write
AABE1FE000
unkown
page readonly
43A1000
heap
page read and write
2018188E000
trusted library allocation
page read and write
6E3D58C000
stack
page read and write
2018B9DB000
trusted library allocation
page read and write
25B4417F000
trusted library allocation
page read and write
2017872B000
heap
page read and write
1F84000
heap
page read and write
279D000
heap
page read and write
2018AF1B000
trusted library allocation
page read and write
2661000
heap
page execute and read and write
1ADE5FF000
stack
page read and write
25B45803000
trusted library allocation
page read and write
B77000
unkown
page execute and write copy
2017E5A9000
trusted library allocation
page read and write
401000
unkown
page execute read
2017D969000
trusted library allocation
page read and write
53AF000
stack
page read and write
53E0000
direct allocation
page execute and read and write
25B3ED26000
heap
page read and write
25B467DD000
trusted library allocation
page read and write
201786FC000
heap
page read and write
13E0000
direct allocation
page read and write
2018AF26000
trusted library allocation
page read and write
BCC000
unkown
page execute and write copy
20178734000
heap
page read and write
68A1000
heap
page read and write
4DD0000
heap
page read and write
1530000
heap
page read and write
201881C8000
trusted library allocation
page read and write
257E000
stack
page read and write
22A01000
heap
page read and write
2017FC8B000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
25B4ACC2000
trusted library allocation
page read and write
201786FC000
heap
page read and write
25B482B7000
trusted library allocation
page read and write
2018A5C1000
trusted library allocation
page read and write
25B48ACB000
trusted library allocation
page read and write
4D81000
heap
page read and write
40D0000
direct allocation
page read and write
6561000
heap
page read and write
49D1000
heap
page read and write
3FAE000
stack
page read and write
1430000
direct allocation
page read and write
20180961000
trusted library allocation
page read and write
201786E7000
heap
page read and write
2017FC44000
trusted library allocation
page read and write
2018A856000
trusted library allocation
page read and write
BC2DBFE000
stack
page read and write
2018A8EE000
trusted library allocation
page read and write
201811D0000
trusted library allocation
page read and write
20181071000
trusted library allocation
page read and write
4D81000
heap
page read and write
6CA01000
unkown
page execute read
68A1000
heap
page read and write
6561000
heap
page read and write
13E0000
direct allocation
page read and write
68A1000
heap
page read and write
201851E6000
trusted library allocation
page read and write
25B4536C000
trusted library allocation
page read and write
FCB000
stack
page read and write
2018A6FA000
trusted library allocation
page read and write
201786E2000
heap
page read and write
68A1000
heap
page read and write
68A1000
heap
page read and write
2017F8B9000
trusted library allocation
page read and write
68A1000
heap
page read and write
201818EB000
trusted library allocation
page read and write
25B498EB000
trusted library allocation
page read and write
20187EDA000
trusted library allocation
page read and write
25B47D00000
trusted library allocation
page read and write
2018BF87000
trusted library allocation
page read and write
9900000
heap
page read and write
20178702000
heap
page read and write
68A1000
heap
page read and write
5370000
direct allocation
page execute and read and write
25B4D318000
trusted library allocation
page read and write
201786E7000
heap
page read and write
25B48490000
trusted library section
page readonly
20187E7D000
trusted library allocation
page read and write
68A1000
heap
page read and write
B66000
heap
page read and write
20185183000
trusted library allocation
page read and write
201812DC000
trusted library allocation
page read and write
68A1000
heap
page read and write
68A1000
heap
page read and write
2018AB70000
trusted library allocation
page read and write
2C10000
direct allocation
page read and write
414000
heap
page read and write
2017872F000
heap
page read and write
2017FCD0000
trusted library allocation
page read and write
25B3ED0F000
heap
page read and write
25B4AE78000
trusted library allocation
page read and write
201786E7000
heap
page read and write
2460000
heap
page read and write
2017E5F7000
trusted library allocation
page read and write
25B49303000
trusted library allocation
page read and write
201811CC000
trusted library allocation
page read and write
201811DE000
trusted library allocation
page read and write
25B50EB7000
trusted library allocation
page read and write
20189E29000
trusted library allocation
page read and write
BC2C83F000
stack
page read and write
25B45A4A000
heap
page read and write
6561000
heap
page read and write
2017E5FC000
trusted library allocation
page read and write
BC2BE3C000
stack
page read and write
2018A7D4000
trusted library allocation
page read and write
25B44113000
trusted library allocation
page read and write
212DED20000
heap
page read and write
13E4000
heap
page read and write
8538000
heap
page read and write
20180972000
trusted library allocation
page read and write
2018113D000
trusted library allocation
page read and write
13E0000
direct allocation
page read and write
68A1000
heap
page read and write
25DAE870000
unclassified section
page readonly
68A1000
heap
page read and write
2018BA93000
trusted library allocation
page read and write
2018BCB5000
trusted library allocation
page read and write
25B45A23000
heap
page read and write
1527000
heap
page read and write
20178739000
heap
page read and write
13E4000
heap
page read and write
2017FEAD000
trusted library allocation
page read and write
25B48998000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
68A1000
heap
page read and write
201812CE000
trusted library allocation
page read and write
88AF000
stack
page read and write
6561000
heap
page read and write
201880BD000
trusted library allocation
page read and write
20181381000
trusted library allocation
page read and write
2460000
heap
page read and write
229F7000
heap
page read and write
20187EFC000
trusted library allocation
page read and write
201851B6000
trusted library allocation
page read and write
2612000
heap
page read and write
25B43681000
trusted library allocation
page read and write
2017E01E000
trusted library allocation
page read and write
2018BC4C000
trusted library allocation
page read and write
20178734000
heap
page read and write
20188174000
trusted library allocation
page read and write
20182ADC000
trusted library allocation
page read and write
25B4381D000
trusted library allocation
page read and write
2017D426000
trusted library allocation
page read and write
2018AFC3000
trusted library allocation
page read and write
2017872B000
heap
page read and write
201811E4000
trusted library allocation
page read and write
8A9000
unkown
page execute and read and write
201811CC000
trusted library allocation
page read and write
13E4000
heap
page read and write
2C0F000
stack
page read and write
2018AFA3000
trusted library allocation
page read and write
2018AC88000
trusted library allocation
page read and write
25B4AC18000
trusted library allocation
page read and write
704000
heap
page read and write
25B4549D000
trusted library allocation
page read and write
40AF000
stack
page read and write
25B48049000
trusted library allocation
page read and write
2017872B000
heap
page read and write
AAC04BE000
stack
page read and write
587000
unkown
page execute and read and write
2018BFC3000
trusted library allocation
page read and write
2017F96D000
trusted library allocation
page read and write
23743080000
heap
page readonly
25B452D6000
trusted library allocation
page read and write
6561000
heap
page read and write
2018AF4C000
trusted library allocation
page read and write
2018A543000
trusted library allocation
page read and write
68A1000
heap
page read and write
201811A5000
trusted library allocation
page read and write
201786E7000
heap
page read and write
20182DBE000
trusted library allocation
page read and write
25B39BEE000
heap
page read and write
414000
heap
page read and write
2017D4BA000
trusted library allocation
page read and write
25B4402F000
trusted library allocation
page read and write
4A335FF000
stack
page read and write
20181CEF000
trusted library allocation
page read and write
20178722000
heap
page read and write
25DAEA90000
heap
page readonly
6561000
heap
page read and write
13E4000
heap
page read and write
25B37BB0000
heap
page read and write
1C51E000
stack
page read and write
25B4AE00000
trusted library allocation
page read and write
201881C8000
trusted library allocation
page read and write
25B3ED0E000
heap
page read and write
414000
heap
page read and write
15EB000
heap
page read and write
1C79E000
stack
page read and write
2017E5F2000
trusted library allocation
page read and write
25B3ED23000
heap
page read and write
68A1000
heap
page read and write
2017D960000
trusted library allocation
page read and write
25B3ED26000
heap
page read and write
2018C111000
trusted library allocation
page read and write
2018A50C000
trusted library allocation
page read and write
20178744000
heap
page read and write
201806AA000
trusted library allocation
page read and write
201812DC000
trusted library allocation
page read and write
201801E1000
trusted library allocation
page read and write
20187ED3000
trusted library allocation
page read and write
25B44408000
trusted library allocation
page read and write
62DC000
stack
page read and write
6561000
heap
page read and write
40E0000
direct allocation
page read and write
2018812D000
trusted library allocation
page read and write
25B50C76000
trusted library allocation
page read and write
49E0000
direct allocation
page execute and read and write
68A1000
heap
page read and write
2018A14F000
trusted library allocation
page read and write
201786E1000
heap
page read and write
25B3ED15000
heap
page read and write
414000
heap
page read and write
BAE000
heap
page read and write
25B498BC000
trusted library allocation
page read and write
201786E7000
heap
page read and write
3E8F000
stack
page read and write
2018BFD7000
trusted library allocation
page read and write
4FD0000
direct allocation
page execute and read and write
25B4AC7C000
trusted library allocation
page read and write
23743212000
trusted library allocation
page read and write
2018BB42000
trusted library allocation
page read and write
BC273FE000
stack
page read and write
461F000
stack
page read and write
2018A7F6000
trusted library allocation
page read and write
25B480F3000
trusted library allocation
page read and write
22A06000
heap
page read and write
68A1000
heap
page read and write
69A0000
trusted library allocation
page read and write
2018163B000
trusted library allocation
page read and write
13E4000
heap
page read and write
201851A1000
trusted library allocation
page read and write
20188571000
trusted library allocation
page read and write
2018BBA9000
trusted library allocation
page read and write
20189EC2000
trusted library allocation
page read and write
1124000
heap
page read and write
2018A7F7000
trusted library allocation
page read and write
1530000
heap
page read and write
25DAEC81000
trusted library allocation
page read and write
68A1000
heap
page read and write
12F4000
heap
page read and write
25B47F1C000
trusted library allocation
page read and write
6561000
heap
page read and write
2018C33C000
trusted library allocation
page read and write
68A1000
heap
page read and write
68A1000
heap
page read and write
6561000
heap
page read and write
20178723000
heap
page read and write
2018A5B9000
trusted library allocation
page read and write
AAC153E000
stack
page read and write
1C7CE000
stack
page read and write
2018AF4B000
trusted library allocation
page read and write
2018C867000
trusted library allocation
page read and write
25B45340000
trusted library allocation
page read and write
2017FBD0000
trusted library allocation
page read and write
13E4000
heap
page read and write
22A07000
heap
page read and write
2C10000
direct allocation
page read and write
20180173000
trusted library allocation
page read and write
20181885000
trusted library allocation
page read and write
20187E8C000
trusted library allocation
page read and write
2018BFDE000
trusted library allocation
page read and write
20181884000
trusted library allocation
page read and write
201786F5000
heap
page read and write
6561000
heap
page read and write
20190458000
trusted library allocation
page read and write
6561000
heap
page read and write
7F2000
unkown
page execute and read and write
201810D0000
trusted library allocation
page read and write
2018ABB3000
trusted library allocation
page read and write
2018BCB2000
trusted library allocation
page read and write
491E000
stack
page read and write
2018818A000
trusted library allocation
page read and write
4D81000
heap
page read and write
25DAE923000
heap
page read and write
2018BC3C000
trusted library allocation
page read and write
25B50EC1000
trusted library allocation
page read and write
6561000
heap
page read and write
360F000
stack
page read and write
2018ABB3000
trusted library allocation
page read and write
530000
heap
page read and write
2018ACD1000
trusted library allocation
page read and write
23743400000
trusted library allocation
page read and write
1C11000
heap
page read and write
25B488D7000
trusted library allocation
page read and write
2017DEEC000
trusted library allocation
page read and write
201786F5000
heap
page read and write
201885DF000
trusted library allocation
page read and write
20189DFC000
trusted library allocation
page read and write
229DA000
heap
page read and write
68A1000
heap
page read and write
20178734000
heap
page read and write
6561000
heap
page read and write
1124000
heap
page read and write
401E000
stack
page read and write
6561000
heap
page read and write
20178781000
heap
page read and write
25B47F3F000
trusted library allocation
page read and write
25B4FC00000
trusted library allocation
page read and write
400E000
stack
page read and write
25B4806A000
trusted library allocation
page read and write
68A1000
heap
page read and write
68A1000
heap
page read and write
FD0000
direct allocation
page read and write
6561000
heap
page read and write
2018BC78000
trusted library allocation
page read and write
20182A30000
trusted library allocation
page read and write
201811D7000
trusted library allocation
page read and write
201818C0000
trusted library allocation
page read and write
201786DE000
heap
page read and write
201786E0000
heap
page read and write
2018A24D000
trusted library allocation
page read and write
2018500D000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B4DD20000
trusted library allocation
page read and write
6561000
heap
page read and write
20187E78000
trusted library allocation
page read and write
2018015E000
trusted library allocation
page read and write
25B467FA000
trusted library allocation
page read and write
2017E130000
trusted library allocation
page read and write
201786FD000
heap
page read and write
2018A84F000
trusted library allocation
page read and write
20181198000
trusted library allocation
page read and write
2018BC04000
trusted library allocation
page read and write
4D81000
heap
page read and write
2018BA56000
trusted library allocation
page read and write
25B4962D000
trusted library allocation
page read and write
6561000
heap
page read and write
25B49ABA000
trusted library allocation
page read and write
201881C3000
trusted library allocation
page read and write
414000
heap
page read and write
25B50FE3000
trusted library allocation
page read and write
2017E052000
trusted library allocation
page read and write
20182D54000
trusted library allocation
page read and write
2017FBB4000
trusted library allocation
page read and write
6561000
heap
page read and write
68A1000
heap
page read and write
2018BC4C000
trusted library allocation
page read and write
2CD0000
direct allocation
page read and write
2017362A000
heap
page read and write
2018118D000
trusted library allocation
page read and write
13E4000
heap
page read and write
2017FC8B000
trusted library allocation
page read and write
25B48049000
trusted library allocation
page read and write
25B480A9000
trusted library allocation
page read and write
2018BC15000
trusted library allocation
page read and write
25B48000000
trusted library allocation
page read and write
201818A9000
trusted library allocation
page read and write
201881FD000
trusted library allocation
page read and write
25B48057000
trusted library allocation
page read and write
25B497EF000
trusted library allocation
page read and write
20178736000
heap
page read and write
20181198000
trusted library allocation
page read and write
151B000
heap
page read and write
2726000
heap
page read and write
2018A6F2000
trusted library allocation
page read and write
20181617000
trusted library allocation
page read and write
20189CFD000
trusted library allocation
page read and write
2017D9A1000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018181E000
trusted library allocation
page read and write
201786E8000
heap
page read and write
25B3ED50000
heap
page read and write
20187E64000
trusted library allocation
page read and write
25B48C09000
trusted library allocation
page read and write
2018BBFB000
trusted library allocation
page read and write
25B4670F000
trusted library allocation
page read and write
13E4000
heap
page read and write
12F0000
heap
page read and write
201786F5000
heap
page read and write
25B47870000
trusted library section
page readonly
20181047000
trusted library allocation
page read and write
84B000
unkown
page execute and read and write
253E000
heap
page read and write
201786DF000
heap
page read and write
25B4961E000
trusted library allocation
page read and write
201786F9000
heap
page read and write
68A1000
heap
page read and write
201786E7000
heap
page read and write
1DA000
stack
page read and write
414000
heap
page read and write
2018814F000
trusted library allocation
page read and write
5270000
heap
page read and write
68A1000
heap
page read and write
2018117B000
trusted library allocation
page read and write
AE0000
direct allocation
page read and write
4A30000
direct allocation
page execute and read and write
6561000
heap
page read and write
2018BF5F000
trusted library allocation
page read and write
244C000
unkown
page readonly
2018186E000
trusted library allocation
page read and write
8B0000
unkown
page read and write
704000
heap
page read and write
2018BFAC000
trusted library allocation
page read and write
4D81000
heap
page read and write
25B49765000
trusted library allocation
page read and write
14F6000
heap
page read and write
414000
heap
page read and write
20187EF3000
trusted library allocation
page read and write
414000
heap
page read and write
601F000
stack
page read and write
AE2000
unkown
page execute and read and write
201786F5000
heap
page read and write
533F000
stack
page read and write
2018118F000
trusted library allocation
page read and write
20187F9B000
trusted library allocation
page read and write
7D4C000
stack
page read and write
20187EAE000
trusted library allocation
page read and write
25B489B1000
trusted library allocation
page read and write
20188E05000
trusted library allocation
page read and write
20181882000
trusted library allocation
page read and write
25B39BE0000
heap
page read and write
13E4000
heap
page read and write
25B3ED0E000
heap
page read and write
25B3ED1C000
heap
page read and write
2018129D000
trusted library allocation
page read and write
2018BC0E000
trusted library allocation
page read and write
BC2CDFA000
stack
page read and write
42CE000
stack
page read and write
1544000
heap
page read and write
68A1000
heap
page read and write
4FD000
unkown
page execute and read and write
2018BC2D000
trusted library allocation
page read and write
201786E7000
heap
page read and write
20189AC3000
trusted library allocation
page read and write
25B44126000
trusted library allocation
page read and write
2018A5F3000
trusted library allocation
page read and write
BB3000
heap
page read and write
25B3ED50000
heap
page read and write
96AC000
stack
page read and write
4D10000
direct allocation
page execute and read and write
418E000
stack
page read and write
2606000
heap
page read and write
201786FD000
heap
page read and write
201813FD000
trusted library allocation
page read and write
25B4AD19000
trusted library allocation
page read and write
8B0000
unkown
page readonly
68A1000
heap
page read and write
414000
heap
page read and write
20178726000
heap
page read and write
6561000
heap
page read and write
20190386000
trusted library allocation
page read and write
68A1000
heap
page read and write
68A1000
heap
page read and write
2018BB3D000
trusted library allocation
page read and write
BC23BD8000
stack
page read and write
25B47F29000
trusted library allocation
page read and write
25B37F30000
trusted library allocation
page read and write
1E077E1E000
heap
page read and write
2018BFFE000
trusted library allocation
page read and write
1C4E000
heap
page read and write
2ADE000
stack
page read and write
25B49103000
trusted library allocation
page read and write
20187E69000
trusted library allocation
page read and write
BCB000
unkown
page execute and write copy
2018A858000
trusted library allocation
page read and write
3AAE000
stack
page read and write
1360000
heap
page read and write
25B45300000
trusted library allocation
page read and write
DEE000
stack
page read and write
2018A687000
trusted library allocation
page read and write
12FA000
stack
page read and write
704000
heap
page read and write
3EDF000
stack
page read and write
25B3ED0F000
heap
page read and write
68A1000
heap
page read and write
427000
unkown
page write copy
2018A2E1000
trusted library allocation
page read and write
25B498C2000
trusted library allocation
page read and write
25B49951000
trusted library allocation
page read and write
2018C593000
trusted library allocation
page read and write
201786E7000
heap
page read and write
1590000
direct allocation
page read and write
F5C000
stack
page read and write
20189A40000
trusted library allocation
page read and write
2018BC75000
trusted library allocation
page read and write
201811DB000
trusted library allocation
page read and write
25B4925A000
trusted library allocation
page read and write
2018A54C000
trusted library allocation
page read and write
1590000
direct allocation
page read and write
2C10000
direct allocation
page read and write
3D8F000
stack
page read and write
20187E71000
trusted library allocation
page read and write
13E4000
heap
page read and write
6561000
heap
page read and write
25B49AFD000
trusted library allocation
page read and write
414000
heap
page read and write
2017F9C0000
trusted library allocation
page read and write
20189EA6000
trusted library allocation
page read and write
25B495D9000
trusted library allocation
page read and write
20178723000
heap
page read and write
2017FC7F000
trusted library allocation
page read and write
2018AFAE000
trusted library allocation
page read and write
2018BCCB000
trusted library allocation
page read and write
25B3ED50000
heap
page read and write
25B49030000
trusted library section
page read and write
2018BF84000
trusted library allocation
page read and write
4D81000
heap
page read and write
25B47D82000
trusted library allocation
page read and write
25B3ED3E000
heap
page read and write
2017FCB1000
trusted library allocation
page read and write
1F0000
heap
page read and write
3DCE000
stack
page read and write
201786E1000
heap
page read and write
25B47F67000
trusted library allocation
page read and write
20187E04000
trusted library allocation
page read and write
2018A1B1000
trusted library allocation
page read and write
BC2C63B000
stack
page read and write
20180962000
trusted library allocation
page read and write
2018A278000
trusted library allocation
page read and write
23742F20000
heap
page read and write
427000
unkown
page write copy
5350000
direct allocation
page execute and read and write
25B3ED44000
heap
page read and write
201812C2000
trusted library allocation
page read and write
201818BE000
trusted library allocation
page read and write
919000
unkown
page write copy
704000
heap
page read and write
20187E7C000
trusted library allocation
page read and write
2017872A000
heap
page read and write
1430000
direct allocation
page read and write
20187E32000
trusted library allocation
page read and write
25B489CF000
trusted library allocation
page read and write
2018A56F000
trusted library allocation
page read and write
201880FC000
trusted library allocation
page read and write
2018A268000
trusted library allocation
page read and write
2017E564000
trusted library allocation
page read and write
2017E0BD000
trusted library allocation
page read and write
3FFE000
stack
page read and write
201851E3000
trusted library allocation
page read and write
68A1000
heap
page read and write
13E4000
heap
page read and write
500000
unkown
page execute and read and write
2017F9C0000
trusted library allocation
page read and write
20187DF5000
trusted library allocation
page read and write
20182DFC000
trusted library allocation
page read and write
2018A7E0000
trusted library allocation
page read and write
142E000
stack
page read and write
6561000
heap
page read and write
704000
heap
page read and write
56DF000
stack
page read and write
2017E561000
trusted library allocation
page read and write
2018816C000
trusted library allocation
page read and write
25B48092000
trusted library allocation
page read and write
25B484D0000
trusted library section
page read and write
20187E78000
trusted library allocation
page read and write
2017D475000
trusted library allocation
page read and write
1530000
heap
page read and write
AA6000
unkown
page execute and read and write
6561000
heap
page read and write
2018BBAC000
trusted library allocation
page read and write
2017E561000
trusted library allocation
page read and write
20178734000
heap
page read and write
23742E30000
unclassified section
page readonly
25B4AD65000
trusted library allocation
page read and write
25B4AA00000
trusted library allocation
page read and write
20178722000
heap
page read and write
AE9000
unkown
page read and write
25B480F8000
trusted library allocation
page read and write
2018183A000
trusted library allocation
page read and write
2017E17E000
trusted library allocation
page read and write
2018BBB5000
trusted library allocation
page read and write
6561000
heap
page read and write
1DEC39A1000
trusted library allocation
page execute read
25B4364A000
trusted library allocation
page read and write
145A000
heap
page read and write
5050000
direct allocation
page execute and read and write
1C8CE000
stack
page read and write
414000
heap
page read and write
414000
heap
page read and write
8B1000
unkown
page execute and write copy
2017FEEA000
trusted library allocation
page read and write
20187E00000
trusted library allocation
page read and write
68A1000
heap
page read and write
68A1000
heap
page read and write
25B45631000
trusted library allocation
page read and write
201851D7000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B48943000
trusted library allocation
page read and write
2D7E000
stack
page read and write
2018103C000
trusted library allocation
page read and write
25B445A3000
trusted library allocation
page read and write
25B48B05000
trusted library allocation
page read and write
2018BC3F000
trusted library allocation
page read and write
2018C5FE000
trusted library allocation
page read and write
424F000
stack
page read and write
25B4F27B000
trusted library allocation
page read and write
25B3ED2F000
heap
page read and write
2018C292000
trusted library allocation
page read and write
201786E7000
heap
page read and write
20185189000
trusted library allocation
page read and write
25B3ED50000
heap
page read and write
9C000
stack
page read and write
50E0000
direct allocation
page execute and read and write
68A1000
heap
page read and write
25B4ACE9000
trusted library allocation
page read and write
BC2E3FF000
stack
page read and write
13E4000
heap
page read and write
43CE000
stack
page read and write
25B48BC8000
trusted library allocation
page read and write
2374329F000
trusted library allocation
page read and write
20178745000
heap
page read and write
27E3000
heap
page read and write
25B436DF000
trusted library allocation
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
68A1000
heap
page read and write
6561000
heap
page read and write
4A10000
direct allocation
page execute and read and write
20178725000
heap
page read and write
25B45322000
trusted library allocation
page read and write
6561000
heap
page read and write
201806B6000
trusted library allocation
page read and write
6CA8E000
unkown
page read and write
339E000
stack
page read and write
2018CE56000
trusted library allocation
page read and write
2657000
heap
page read and write
25B48008000
trusted library allocation
page read and write
2CD0000
direct allocation
page read and write
68A1000
heap
page read and write
2018BAF7000
trusted library allocation
page read and write
6771000
heap
page read and write
20181882000
trusted library allocation
page read and write
25B3ED44000
heap
page read and write
229F7000
heap
page read and write
20181174000
trusted library allocation
page read and write
25B480F8000
trusted library allocation
page read and write
201902F6000
trusted library allocation
page read and write
2017FB0D000
trusted library allocation
page read and write
20181191000
trusted library allocation
page read and write
2017D443000
trusted library allocation
page read and write
25DAE900000
unclassified section
page readonly
1590000
direct allocation
page read and write
201786FD000
heap
page read and write
20189D43000
trusted library allocation
page read and write
2018AC7A000
trusted library allocation
page read and write
25B48051000
trusted library allocation
page read and write
13E4000
heap
page read and write
68A1000
heap
page read and write
604E000
stack
page read and write
14EE000
heap
page read and write
2018AFDE000
trusted library allocation
page read and write
2018A6E2000
trusted library allocation
page read and write
2018BBF3000
trusted library allocation
page read and write
25B48023000
trusted library allocation
page read and write
20183A92000
trusted library allocation
page read and write
2018BA62000
trusted library allocation
page read and write
25B50E2E000
trusted library allocation
page read and write
16064060000
heap
page read and write
201851B3000
trusted library allocation
page read and write
361F000
stack
page read and write
6561000
heap
page read and write
25B4AA68000
trusted library allocation
page read and write
2017FCD0000
trusted library allocation
page read and write
6561000
heap
page read and write
1C45F000
stack
page read and write
25B3ED2F000
heap
page read and write
201786E7000
heap
page read and write
2017DE97000
trusted library allocation
page read and write
13E4000
heap
page read and write
2018DD00000
trusted library allocation
page read and write
2018DD36000
trusted library allocation
page read and write
878000
unkown
page execute and read and write
201881B5000
trusted library allocation
page read and write
52C1000
direct allocation
page read and write
5080000
direct allocation
page read and write
2017875F000
heap
page read and write
201851F1000
trusted library allocation
page read and write
201786E6000
heap
page read and write
8B0000
unkown
page readonly
68A1000
heap
page read and write
25B47B10000
trusted library allocation
page read and write
20188151000
trusted library allocation
page read and write
6561000
heap
page read and write
1590000
direct allocation
page read and write
25B498BE000
trusted library allocation
page read and write
25B45366000
trusted library allocation
page read and write
2017E5BE000
trusted library allocation
page read and write
20181174000
trusted library allocation
page read and write
201786E7000
heap
page read and write
25B4FD28000
trusted library allocation
page read and write
4EB0000
direct allocation
page read and write
595F000
stack
page read and write
2018A7EA000
trusted library allocation
page read and write
201880FC000
trusted library allocation
page read and write
53F0000
direct allocation
page execute and read and write
53E0000
direct allocation
page execute and read and write
25B48B2D000
trusted library allocation
page read and write
61EB4000
direct allocation
page read and write
2017FC7D000
trusted library allocation
page read and write
23743247000
trusted library allocation
page read and write
201786F5000
heap
page read and write
AE0000
direct allocation
page read and write
2018BA9A000
trusted library allocation
page read and write
2018AF82000
trusted library allocation
page read and write
2018BC35000
trusted library allocation
page read and write
BAF000
heap
page read and write
25B48B4C000
trusted library allocation
page read and write
13E4000
heap
page read and write
20181677000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B48D22000
trusted library allocation
page read and write
2018BBFD000
trusted library allocation
page read and write
28B26000
heap
page read and write
20183A47000
trusted library allocation
page read and write
2017D0B3000
trusted library allocation
page read and write
2018A5A7000
trusted library allocation
page read and write
201786FC000
heap
page read and write
25B43700000
trusted library allocation
page read and write
13E4000
heap
page read and write
704000
heap
page read and write
414000
heap
page read and write
2018BC25000
trusted library allocation
page read and write
6561000
heap
page read and write
2017F88F000
trusted library allocation
page read and write
25B50C00000
trusted library allocation
page read and write
414000
heap
page read and write
2018BC15000
trusted library allocation
page read and write
20178741000
heap
page read and write
2017D4F5000
trusted library allocation
page read and write
2018C875000
trusted library allocation
page read and write
2018C5E7000
trusted library allocation
page read and write
201881C8000
trusted library allocation
page read and write
2017875F000
heap
page read and write
20187E30000
trusted library allocation
page read and write
25B48C12000
trusted library allocation
page read and write
6561000
heap
page read and write
20187E8B000
trusted library allocation
page read and write
6561000
heap
page read and write
2018AC2F000
trusted library allocation
page read and write
4D81000
heap
page read and write
2017FCB3000
trusted library allocation
page read and write
20187E7D000
trusted library allocation
page read and write
26CF000
stack
page read and write
68A1000
heap
page read and write
2018A2AC000
trusted library allocation
page read and write
2018AC80000
trusted library allocation
page read and write
4A33DFF000
stack
page read and write
25B45900000
heap
page read and write
194000
stack
page read and write
1533000
heap
page read and write
6561000
heap
page read and write
1F84000
heap
page read and write
2018BA54000
trusted library allocation
page read and write
25B45010000
trusted library section
page read and write
20187E15000
trusted library allocation
page read and write
19C000
stack
page read and write
25B48080000
trusted library allocation
page read and write
2018AF50000
trusted library allocation
page read and write
5AFD000
stack
page read and write
25B458C7000
trusted library allocation
page read and write
201881C3000
trusted library allocation
page read and write
25B492EC000
trusted library allocation
page read and write
201851BE000
trusted library allocation
page read and write
25B4928F000
trusted library allocation
page read and write
3D9F000
stack
page read and write
68A1000
heap
page read and write
35DF000
stack
page read and write
2018163A000
trusted library allocation
page read and write
48CF000
stack
page read and write
201786E8000
heap
page read and write
68A1000
heap
page read and write
259B000
heap
page read and write
25B49AE1000
trusted library allocation
page read and write
25B43600000
trusted library allocation
page read and write
25B49654000
trusted library allocation
page read and write
20180173000
trusted library allocation
page read and write
2017D4BA000
trusted library allocation
page read and write
13E4000
heap
page read and write
2018A1D7000
trusted library allocation
page read and write
25B37FEA000
trusted library allocation
page read and write
23743296000
trusted library allocation
page read and write
1124000
heap
page read and write
D55000
unkown
page execute and read and write
6561000
heap
page read and write
201881C3000
trusted library allocation
page read and write
8DB0000
trusted library allocation
page read and write
20182ADC000
trusted library allocation
page read and write
20178742000
heap
page read and write
2018BF6D000
trusted library allocation
page read and write
49BF000
stack
page read and write
4D81000
heap
page read and write
414000
heap
page read and write
25B3ED21000
heap
page read and write
25B50E59000
trusted library allocation
page read and write
2017FC5F000
trusted library allocation
page read and write
2018C215000
trusted library allocation
page read and write
30DF000
stack
page read and write
1D40000
heap
page read and write
20181035000
trusted library allocation
page read and write
6561000
heap
page read and write
43B0000
heap
page read and write
20181357000
trusted library allocation
page read and write
2018AC86000
trusted library allocation
page read and write
25B480EA000
trusted library allocation
page read and write
201811A5000
trusted library allocation
page read and write
5470000
direct allocation
page execute and read and write
49D1000
heap
page read and write
43A1000
heap
page read and write
201812E7000
trusted library allocation
page read and write
11CE000
stack
page read and write
20188564000
trusted library allocation
page read and write
25B4AC7E000
trusted library allocation
page read and write
6561000
heap
page read and write
201837B6000
trusted library allocation
page read and write
13E0000
direct allocation
page read and write
20187EA0000
trusted library allocation
page read and write
68A1000
heap
page read and write
704000
heap
page read and write
201811E1000
trusted library allocation
page read and write
25B437DF000
trusted library allocation
page read and write
13E4000
heap
page read and write
2017FB19000
trusted library allocation
page read and write
4D83000
heap
page read and write
13E4000
heap
page read and write
2018BF4E000
trusted library allocation
page read and write
24D1000
heap
page read and write
201886C3000
trusted library allocation
page read and write
704000
heap
page read and write
25B37EE0000
trusted library section
page readonly
4D81000
heap
page read and write
201816A3000
trusted library allocation
page read and write
20187E15000
trusted library allocation
page read and write
2017DEFB000
trusted library allocation
page read and write
2018A28D000
trusted library allocation
page read and write
201880F8000
trusted library allocation
page read and write
20187E88000
trusted library allocation
page read and write
25B49941000
trusted library allocation
page read and write
25B4889D000
trusted library allocation
page read and write
201838BC000
trusted library allocation
page read and write
25B47E00000
trusted library allocation
page read and write
20181191000
trusted library allocation
page read and write
25B37EF0000
heap
page read and write
5210000
direct allocation
page execute and read and write
13E4000
heap
page read and write
2018BCB5000
trusted library allocation
page read and write
2018BCCB000
trusted library allocation
page read and write
20187EB9000
trusted library allocation
page read and write
2018AC30000
trusted library allocation
page read and write
1E077E2A000
heap
page read and write
25B4926D000
trusted library allocation
page read and write
4DA0000
heap
page read and write
25B3ED15000
heap
page read and write
25B4ADFC000
trusted library allocation
page read and write
BC2E7FE000
stack
page read and write
68A1000
heap
page read and write
20187EB3000
trusted library allocation
page read and write
6CAA0000
unkown
page readonly
25B49500000
trusted library allocation
page read and write
6561000
heap
page read and write
25B489A9000
trusted library allocation
page read and write
25B453F7000
trusted library allocation
page read and write
2017DE8E000
trusted library allocation
page read and write
AAC043E000
stack
page read and write
33DE000
stack
page read and write
25B3ED21000
heap
page read and write
2017FC58000
trusted library allocation
page read and write
25B3ED4A000
heap
page read and write
2017E548000
trusted library allocation
page read and write
201810D9000
trusted library allocation
page read and write
25B50C7C000
trusted library allocation
page read and write
704000
heap
page read and write
6561000
heap
page read and write
533C000
direct allocation
page execute and read and write
25B495F4000
trusted library allocation
page read and write
2017D927000
trusted library allocation
page read and write
2018BDAD000
trusted library allocation
page read and write
201881EB000
trusted library allocation
page read and write
13E4000
heap
page read and write
25B4AEE5000
trusted library allocation
page read and write
4D81000
heap
page read and write
BBC000
unkown
page execute and read and write
9C1000
unkown
page execute and read and write
201812F9000
trusted library allocation
page read and write
493000
unkown
page execute and read and write
2018BCCE000
trusted library allocation
page read and write
2017DEF7000
trusted library allocation
page read and write
2018A5D5000
trusted library allocation
page read and write
68A1000
heap
page read and write
2017E5F3000
trusted library allocation
page read and write
25B50E00000
trusted library allocation
page read and write
13E4000
heap
page read and write
6561000
heap
page read and write
20178726000
heap
page read and write
5370000
direct allocation
page execute and read and write
414000
heap
page read and write
25B3ED38000
heap
page read and write
68A1000
heap
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
63E000
unkown
page execute and read and write
2018BCAC000
trusted library allocation
page read and write
450F000
stack
page read and write
352B0000
trusted library allocation
page read and write
2018A549000
trusted library allocation
page read and write
23743100000
trusted library allocation
page read and write
4D81000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
6561000
heap
page read and write
68A1000
heap
page read and write
2018006F000
trusted library allocation
page read and write
201812C9000
trusted library allocation
page read and write
2017F87F000
trusted library allocation
page read and write
5370000
direct allocation
page execute and read and write
20181061000
trusted library allocation
page read and write
20178729000
heap
page read and write
20178734000
heap
page read and write
25B50C91000
trusted library allocation
page read and write
2018814F000
trusted library allocation
page read and write
414000
heap
page read and write
25B47BDA000
trusted library allocation
page read and write
25B48B2C000
trusted library allocation
page read and write
2018AC82000
trusted library allocation
page read and write
20178713000
heap
page read and write
68A1000
heap
page read and write
25B3ED26000
heap
page read and write
20189D29000
trusted library allocation
page read and write
400F000
stack
page read and write
9FF000
unkown
page execute and read and write
2018A6F2000
trusted library allocation
page read and write
1E076307000
heap
page read and write
25B4ADF7000
trusted library allocation
page read and write
25B45808000
trusted library allocation
page read and write
2018BAC6000
trusted library allocation
page read and write
201786E1000
heap
page read and write
20181663000
trusted library allocation
page read and write
68A1000
heap
page read and write
20187E11000
trusted library allocation
page read and write
201786E1000
heap
page read and write
25B4954D000
trusted library allocation
page read and write
13E5000
heap
page read and write
2018BFBD000
trusted library allocation
page read and write
201786E0000
heap
page read and write
68A1000
heap
page read and write
13E4000
heap
page read and write
68A1000
heap
page read and write
2018AFF0000
trusted library allocation
page read and write
25B47F48000
trusted library allocation
page read and write
2017872A000
heap
page read and write
201786F5000
heap
page read and write
20181294000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018AB73000
trusted library allocation
page read and write
20178723000
heap
page read and write
6561000
heap
page read and write
2017D9B3000
trusted library allocation
page read and write
201881E1000
trusted library allocation
page read and write
20181198000
trusted library allocation
page read and write
201786F5000
heap
page read and write
2018BF4D000
trusted library allocation
page read and write
68A1000
heap
page read and write
704000
heap
page read and write
2017FC83000
trusted library allocation
page read and write
254E000
heap
page read and write
20181191000
trusted library allocation
page read and write
2018374E000
trusted library allocation
page read and write
201818E7000
trusted library allocation
page read and write
25B3ED4A000
heap
page read and write
201812C9000
trusted library allocation
page read and write
4F70000
direct allocation
page execute and read and write
40E0000
direct allocation
page read and write
A3F000
unkown
page execute and read and write
20188174000
trusted library allocation
page read and write
68A1000
heap
page read and write
414000
heap
page read and write
25B480F3000
trusted library allocation
page read and write
201851FA000
trusted library allocation
page read and write
2018A7F7000
trusted library allocation
page read and write
2CE0000
heap
page read and write
415000
heap
page read and write
201810A5000
trusted library allocation
page read and write
20178724000
heap
page read and write
25B3ED44000
heap
page read and write
2018BC52000
trusted library allocation
page read and write
201786F5000
heap
page read and write
2018C813000
trusted library allocation
page read and write
25B444C4000
trusted library allocation
page read and write
414000
heap
page read and write
20180683000
trusted library allocation
page read and write
38CE000
stack
page read and write
25B48099000
trusted library allocation
page read and write
2017E5E5000
trusted library allocation
page read and write
BC278FE000
stack
page read and write
25B4911B000
trusted library allocation
page read and write
25B3ED4A000
heap
page read and write
2018808B000
trusted library allocation
page read and write
201809C2000
trusted library allocation
page read and write
6561000
heap
page read and write
20178734000
heap
page read and write
2018A0B0000
trusted library allocation
page read and write
25B44524000
trusted library allocation
page read and write
25B49115000
trusted library allocation
page read and write
2018181E000
trusted library allocation
page read and write
497F000
stack
page read and write
68A1000
heap
page read and write
2018BFD9000
trusted library allocation
page read and write
13E4000
heap
page read and write
20178744000
heap
page read and write
5430000
direct allocation
page execute and read and write
731000
unkown
page execute and read and write
5C5D000
stack
page read and write
20178734000
heap
page read and write
2017FBB6000
trusted library allocation
page read and write
25B4808F000
trusted library allocation
page read and write
229EF000
heap
page read and write
2FDE000
stack
page read and write
2017875F000
heap
page read and write
201786E2000
heap
page read and write
474F000
stack
page read and write
68A1000
heap
page read and write
6561000
heap
page read and write
704000
heap
page read and write
25B48057000
trusted library allocation
page read and write
2017FEF4000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B3ED50000
heap
page read and write
2017FC63000
trusted library allocation
page read and write
2018BC56000
trusted library allocation
page read and write
25B4DD26000
trusted library allocation
page read and write
2017362A000
heap
page read and write
1C91E000
stack
page read and write
68A1000
heap
page read and write
1450000
heap
page read and write
20181807000
trusted library allocation
page read and write
1496000
heap
page read and write
49F000
unkown
page execute and read and write
2018A587000
trusted library allocation
page read and write
20188169000
trusted library allocation
page read and write
20187E72000
trusted library allocation
page read and write
2017F96D000
trusted library allocation
page read and write
BC2A7FD000
stack
page read and write
201786F5000
heap
page read and write
2018ABA4000
trusted library allocation
page read and write
25B49648000
trusted library allocation
page read and write
84FE000
stack
page read and write
2CC0000
heap
page read and write
2017DCB2000
trusted library allocation
page read and write
25B3ED52000
heap
page read and write
20178734000
heap
page read and write
410000
heap
page read and write
201818EB000
trusted library allocation
page read and write
43A1000
heap
page read and write
2018117C000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
7FC000
unkown
page execute and read and write
BC2ADFD000
stack
page read and write
BC2C6FF000
stack
page read and write
25B3ED26000
heap
page read and write
2017D0DF000
trusted library allocation
page read and write
255E000
heap
page execute and read and write
2018BBAD000
trusted library allocation
page read and write
25B3ED50000
heap
page read and write
2018165C000
trusted library allocation
page read and write
6CA92000
unkown
page readonly
594E000
stack
page read and write
13E4000
heap
page read and write
1124000
heap
page read and write
2017FE33000
trusted library allocation
page read and write
2018A258000
trusted library allocation
page read and write
25B4DD12000
trusted library allocation
page read and write
2017872F000
heap
page read and write
2018ACBB000
trusted library allocation
page read and write
13E0000
heap
page read and write
68A1000
heap
page read and write
6561000
heap
page read and write
20178746000
heap
page read and write
401000
unkown
page execute read
2018A292000
trusted library allocation
page read and write
704000
heap
page read and write
68A1000
heap
page read and write
61ECD000
direct allocation
page readonly
423000
unkown
page readonly
2018BAAA000
trusted library allocation
page read and write
25B454DC000
trusted library allocation
page read and write
2018C130000
trusted library allocation
page read and write
201882B5000
trusted library allocation
page read and write
237430D0000
heap
page read and write
6561000
heap
page read and write
2018C50A000
trusted library allocation
page read and write
25B494A8000
trusted library allocation
page read and write
25B480EA000
trusted library allocation
page read and write
25B39C98000
heap
page read and write
25B50C6B000
trusted library allocation
page read and write
5400000
direct allocation
page execute and read and write
412E000
stack
page read and write
212DF000000
trusted library allocation
page read and write
25B487F8000
trusted library allocation
page read and write
1DFF000
stack
page read and write
20188557000
trusted library allocation
page read and write
20181CF2000
trusted library allocation
page read and write
201818AA000
trusted library allocation
page read and write
2018104B000
trusted library allocation
page read and write
25B50E79000
trusted library allocation
page read and write
201786EE000
heap
page read and write
2017F9BC000
trusted library allocation
page read and write
2018A1C1000
trusted library allocation
page read and write
20187E23000
trusted library allocation
page read and write
20189EFA000
trusted library allocation
page read and write
25B3ED44000
heap
page read and write
68EF000
stack
page read and write
2017FB25000
trusted library allocation
page read and write
1545C4B18000
trusted library allocation
page read and write
201786E7000
heap
page read and write
12FD000
stack
page read and write
25B444FA000
trusted library allocation
page read and write
13E4000
heap
page read and write
25B48080000
trusted library allocation
page read and write
6561000
heap
page read and write
201816C6000
trusted library allocation
page read and write
175AF4004000
trusted library allocation
page read and write
1F84000
heap
page read and write
13E4000
heap
page read and write
25B4AE15000
trusted library allocation
page read and write
201880BD000
trusted library allocation
page read and write
25B3ED0F000
heap
page read and write
2017DED8000
trusted library allocation
page read and write
25B45B00000
trusted library allocation
page read and write
2018AF9C000
trusted library allocation
page read and write
20189C76000
trusted library allocation
page read and write
25B4AD5F000
trusted library allocation
page read and write
6561000
heap
page read and write
25B4FD12000
trusted library allocation
page read and write
2017875F000
heap
page read and write
20181198000
trusted library allocation
page read and write
2017FE8D000
trusted library allocation
page read and write
13E4000
heap
page read and write
BC278BE000
stack
page read and write
2017873C000
heap
page read and write
25B3ED2A000
heap
page read and write
20178753000
heap
page read and write
201838CD000
trusted library allocation
page read and write
2018515F000
trusted library allocation
page read and write
2018AC00000
trusted library allocation
page read and write
16063F50000
heap
page read and write
201818E9000
trusted library allocation
page read and write
2017E564000
trusted library allocation
page read and write
2018BAC6000
trusted library allocation
page read and write
25B49908000
trusted library allocation
page read and write
25B4F215000
trusted library allocation
page read and write
13E4000
heap
page read and write
6561000
heap
page read and write
55DE000
stack
page read and write
2018A69D000
trusted library allocation
page read and write
704000
heap
page read and write
68A1000
heap
page read and write
4C7E000
stack
page read and write
414000
heap
page read and write
2018117E000
trusted library allocation
page read and write
201786E7000
heap
page read and write
23743354000
heap
page read and write
25B489DA000
trusted library allocation
page read and write
20188633000
trusted library allocation
page read and write
12B9000
stack
page read and write
20187ECB000
trusted library allocation
page read and write
25B4AD67000
trusted library allocation
page read and write
2017DE47000
trusted library allocation
page read and write
25B4DD22000
trusted library allocation
page read and write
2017F85E000
trusted library allocation
page read and write
2018BC57000
trusted library allocation
page read and write
13E4000
heap
page read and write
68A1000
heap
page read and write
2018BB3B000
trusted library allocation
page read and write
2018BCCE000
trusted library allocation
page read and write
20187E93000
trusted library allocation
page read and write
351E000
stack
page read and write
2018BC3F000
trusted library allocation
page read and write
2018A7F7000
trusted library allocation
page read and write
2017D95C000
trusted library allocation
page read and write
20178723000
heap
page read and write
2017F96D000
trusted library allocation
page read and write
20178734000
heap
page read and write
20181191000
trusted library allocation
page read and write
2018135B000
trusted library allocation
page read and write
25B4AC47000
trusted library allocation
page read and write
2018C5E7000
trusted library allocation
page read and write
384F000
stack
page read and write
201809D5000
trusted library allocation
page read and write
2017D95C000
trusted library allocation
page read and write
20189D23000
trusted library allocation
page read and write
2017F96D000
trusted library allocation
page read and write
427000
unkown
page write copy
6460000
heap
page read and write
20183708000
trusted library allocation
page read and write
25B4AAB5000
trusted library allocation
page read and write
25B44416000
trusted library allocation
page read and write
414000
heap
page read and write
25B498F4000
trusted library allocation
page read and write
2017F8F6000
trusted library allocation
page read and write
5A385FF000
stack
page read and write
2017DEA6000
trusted library allocation
page read and write
1D0000
heap
page read and write
2018064D000
trusted library allocation
page read and write
25B4AF02000
trusted library allocation
page read and write
20183A85000
trusted library allocation
page read and write
68A1000
heap
page read and write
2017D090000
trusted library allocation
page read and write
2018A2C1000
trusted library allocation
page read and write
7FC000
unkown
page execute and write copy
2018AFBB000
trusted library allocation
page read and write
2018A2AC000
trusted library allocation
page read and write
25B49A41000
trusted library allocation
page read and write
201851BE000
trusted library allocation
page read and write
4FFF000
stack
page read and write
2018BC50000
trusted library allocation
page read and write
26B1000
heap
page read and write
25B47BF2000
trusted library allocation
page read and write
20178734000
heap
page read and write
25B50E4A000
trusted library allocation
page read and write
25B47E63000
trusted library allocation
page read and write
25B47F67000
trusted library allocation
page read and write
414000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
25B3ED23000
heap
page read and write
6561000
heap
page read and write
25B47F94000
trusted library allocation
page read and write
2018A5E4000
trusted library allocation
page read and write
25B3ED35000
heap
page read and write
201881C8000
trusted library allocation
page read and write
13E4000
heap
page read and write
6B1000
unkown
page execute and write copy
2CD0000
direct allocation
page read and write
68A1000
heap
page read and write
2018518D000
trusted library allocation
page read and write
25B438BB000
trusted library allocation
page read and write
68A1000
heap
page read and write
6561000
heap
page read and write
201811E4000
trusted library allocation
page read and write
201786FD000
heap
page read and write
2018AC88000
trusted library allocation
page read and write
7B9E000
stack
page read and write
2018376D000
trusted library allocation
page read and write
2017DEDB000
trusted library allocation
page read and write
25B49603000
trusted library allocation
page read and write
23FF000
heap
page read and write
25B3ED1C000
heap
page read and write
2018117C000
trusted library allocation
page read and write
50D0000
direct allocation
page execute and read and write
13E4000
heap
page read and write
2018A856000
trusted library allocation
page read and write
68A1000
heap
page read and write
3140000
direct allocation
page read and write
20F3000
heap
page read and write
20181198000
trusted library allocation
page read and write
6561000
heap
page read and write
FFA000
unkown
page execute and read and write
25B50FDD000
trusted library allocation
page read and write
4A00000
direct allocation
page execute and read and write
25B50FC3000
trusted library allocation
page read and write
1170000
heap
page read and write
2018007A000
trusted library allocation
page read and write
6561000
heap
page read and write
201810C7000
trusted library allocation
page read and write
20185183000
trusted library allocation
page read and write
25B44115000
trusted library allocation
page read and write
2018BD59000
trusted library allocation
page read and write
25B454F6000
trusted library allocation
page read and write
25B3ED2F000
heap
page read and write
13E4000
heap
page read and write
68A1000
heap
page read and write
25B49AA9000
trusted library allocation
page read and write
20189E04000
trusted library allocation
page read and write
20178713000
heap
page read and write
71B000
unkown
page execute and read and write
201786EC000
heap
page read and write
25B444AD000
trusted library allocation
page read and write
2017FB70000
trusted library allocation
page read and write
51F0000
direct allocation
page execute and read and write
63FF000
heap
page read and write
2018117F000
trusted library allocation
page read and write
1124000
heap
page read and write
25B43684000
trusted library allocation
page read and write
2018C58F000
trusted library allocation
page read and write
1DAD000
heap
page read and write
20189C94000
trusted library allocation
page read and write
20187EEB000
trusted library allocation
page read and write
2017FEEA000
trusted library allocation
page read and write
2018BC2A000
trusted library allocation
page read and write
201811E1000
trusted library allocation
page read and write
25DAEC5B000
trusted library allocation
page read and write
20187E7D000
trusted library allocation
page read and write
23743210000
trusted library allocation
page read and write
20187E5F000
trusted library allocation
page read and write
63FD000
heap
page read and write
2017FC60000
trusted library allocation
page read and write
6561000
heap
page read and write
25B49AC6000
trusted library allocation
page read and write
20181812000
trusted library allocation
page read and write
1590000
direct allocation
page read and write
80C000
unkown
page execute and read and write
25B50CDF000
trusted library allocation
page read and write
25B3ED17000
heap
page read and write
2018CDA0000
trusted library allocation
page read and write
201812AD000
trusted library allocation
page read and write
1F84000
heap
page read and write
6561000
heap
page read and write
25B51A00000
trusted library allocation
page read and write
20181848000
trusted library allocation
page read and write
20180179000
trusted library allocation
page read and write
2017FC8B000
trusted library allocation
page read and write
2018BF5F000
trusted library allocation
page read and write
25B454BE000
trusted library allocation
page read and write
201786E7000
heap
page read and write
201818BB000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B498C4000
trusted library allocation
page read and write
1430000
direct allocation
page read and write
25B47BF2000
trusted library allocation
page read and write
2018BFC3000
trusted library allocation
page read and write
2017D0EF000
trusted library allocation
page read and write
1365000
heap
page read and write
201786F4000
heap
page read and write
1430000
direct allocation
page read and write
2018A5F3000
trusted library allocation
page read and write
20181822000
trusted library allocation
page read and write
3B0E000
stack
page read and write
25B44076000
trusted library allocation
page read and write
1430000
direct allocation
page read and write
25B37E45000
heap
page read and write
2017D9DD000
trusted library allocation
page read and write
6561000
heap
page read and write
229F7000
heap
page read and write
2018BD7F000
trusted library allocation
page read and write
68A6000
heap
page read and write
2017872A000
heap
page read and write
201786E0000
heap
page read and write
25DAEC6E000
trusted library allocation
page read and write
25B44563000
trusted library allocation
page read and write
25B48B0D000
trusted library allocation
page read and write
20189E91000
trusted library allocation
page read and write
2018819A000
trusted library allocation
page read and write
25B49638000
trusted library allocation
page read and write
25B4411B000
trusted library allocation
page read and write
2018AF4C000
trusted library allocation
page read and write
61E00000
direct allocation
page execute and read and write
2018BFBD000
trusted library allocation
page read and write
20181179000
trusted library allocation
page read and write
2018BCCE000
trusted library allocation
page read and write
201851F1000
trusted library allocation
page read and write
2018BF8B000
trusted library allocation
page read and write
201786E0000
heap
page read and write
25B4378A000
trusted library allocation
page read and write
20178722000
heap
page read and write
201810D3000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018AB6B000
trusted library allocation
page read and write
5080000
direct allocation
page execute and read and write
20187F90000
trusted library allocation
page read and write
24E5000
heap
page read and write
2017D413000
trusted library allocation
page read and write
20181877000
trusted library allocation
page read and write
2017873C000
heap
page read and write
2018A7E0000
trusted library allocation
page read and write
25B4883D000
trusted library allocation
page read and write
20187FB5000
trusted library allocation
page read and write
2017870E000
heap
page read and write
201786E7000
heap
page read and write
61ED0000
direct allocation
page read and write
2018117C000
trusted library allocation
page read and write
1464000
heap
page read and write
201818BE000
trusted library allocation
page read and write
2018CD37000
trusted library allocation
page read and write
2017DC55000
trusted library allocation
page read and write
314E000
stack
page read and write
20181CF5000
trusted library allocation
page read and write
2017E1E4000
trusted library allocation
page read and write
2018BCCE000
trusted library allocation
page read and write
1E0762D0000
heap
page read and write
45AF000
stack
page read and write
23742F00000
heap
page read and write
50B0000
direct allocation
page execute and read and write
2018C2B7000
trusted library allocation
page read and write
9D0000
unkown
page execute and write copy
201809CC000
trusted library allocation
page read and write
25B499C0000
trusted library allocation
page read and write
201881E1000
trusted library allocation
page read and write
25B3ED0F000
heap
page read and write
2018AF4A000
trusted library allocation
page read and write
7C4B000
stack
page read and write
63E000
unkown
page execute and read and write
25B482B9000
trusted library allocation
page read and write
2017872F000
heap
page read and write
25B4ADCB000
trusted library allocation
page read and write
2017875F000
heap
page read and write
20181068000
trusted library allocation
page read and write
2018117E000
trusted library allocation
page read and write
20181167000
trusted library allocation
page read and write
D6B000
unkown
page execute and read and write
6561000
heap
page read and write
6561000
heap
page read and write
2018A6D9000
trusted library allocation
page read and write
25B47F94000
trusted library allocation
page read and write
2018ACCA000
trusted library allocation
page read and write
6561000
heap
page read and write
2018BCCE000
trusted library allocation
page read and write
68A1000
heap
page read and write
20181683000
trusted library allocation
page read and write
2017873D000
heap
page read and write
2018BCCB000
trusted library allocation
page read and write
2017E5A9000
trusted library allocation
page read and write
57DE000
stack
page read and write
3B5E000
stack
page read and write
25B3ED15000
heap
page read and write
20178724000
heap
page read and write
20181829000
trusted library allocation
page read and write
2018C5BB000
trusted library allocation
page read and write
13E4000
heap
page read and write
3C4F000
stack
page read and write
25B480EA000
trusted library allocation
page read and write
20187E78000
trusted library allocation
page read and write
13E4000
heap
page read and write
1120000
heap
page read and write
2018BC2D000
trusted library allocation
page read and write
2018BCCB000
trusted library allocation
page read and write
201811DA000
trusted library allocation
page read and write
25B47B5F000
trusted library allocation
page read and write
49D0000
direct allocation
page execute and read and write
20178729000
heap
page read and write
23743350000
heap
page read and write
2017E564000
trusted library allocation
page read and write
25B48049000
trusted library allocation
page read and write
20180951000
trusted library allocation
page read and write
2017DB82000
trusted library allocation
page read and write
13E4000
heap
page read and write
25B48B94000
trusted library allocation
page read and write
6561000
heap
page read and write
25B4544F000
trusted library allocation
page read and write
25B4981A000
trusted library allocation
page read and write
20181128000
trusted library allocation
page read and write
68A1000
heap
page read and write
4A1E000
stack
page read and write
201838BC000
trusted library allocation
page read and write
25B3ED15000
heap
page read and write
4D81000
heap
page read and write
2018BDE8000
trusted library allocation
page read and write
25AC000
heap
page read and write
68A1000
heap
page read and write
295F000
stack
page read and write
6561000
heap
page read and write
BC2A3FA000
stack
page read and write
25B48B0B000
trusted library allocation
page read and write
25B4994A000
trusted library allocation
page read and write
201881C0000
trusted library allocation
page read and write
25B48601000
trusted library allocation
page read and write
201881C3000
trusted library allocation
page read and write
201818AA000
trusted library allocation
page read and write
25B459E8000
heap
page read and write
25B47BB4000
trusted library allocation
page read and write
25B46700000
trusted library allocation
page read and write
13E4000
heap
page read and write
25B4949A000
trusted library allocation
page read and write
2018BD43000
trusted library allocation
page read and write
6561000
heap
page read and write
68A1000
heap
page read and write
2018A534000
trusted library allocation
page read and write
13E4000
heap
page read and write
AAC357E000
unkown
page readonly
2018BC57000
trusted library allocation
page read and write
2018B6EB000
trusted library allocation
page read and write
6561000
heap
page read and write
25B440FB000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018C639000
trusted library allocation
page read and write
20178725000
heap
page read and write
68A1000
heap
page read and write
6561000
heap
page read and write
25B3ED38000
heap
page read and write
25DAE8F3000
remote allocation
page execute read
BC29FEE000
stack
page read and write
13E4000
heap
page read and write
20181874000
trusted library allocation
page read and write
20180951000
trusted library allocation
page read and write
20178734000
heap
page read and write
4830000
direct allocation
page read and write
2017FE2C000
trusted library allocation
page read and write
2018DD10000
trusted library allocation
page read and write
25B50EA2000
trusted library allocation
page read and write
2018BBF9000
trusted library allocation
page read and write
201786F5000
heap
page read and write
13E4000
heap
page read and write
2018117B000
trusted library allocation
page read and write
2017D969000
trusted library allocation
page read and write
25B498C6000
trusted library allocation
page read and write
2018A2C9000
trusted library allocation
page read and write
5324000
direct allocation
page execute and read and write
2017FCD0000
trusted library allocation
page read and write
2018C304000
trusted library allocation
page read and write
2018BC5A000
trusted library allocation
page read and write
53F0000
direct allocation
page execute and read and write
25B487F4000
trusted library allocation
page read and write
25B482FC000
trusted library allocation
page read and write
2018181A000
trusted library allocation
page read and write
2018BF3C000
trusted library allocation
page read and write
2017FCA9000
trusted library allocation
page read and write
6561000
heap
page read and write
6561000
heap
page read and write
2018CAA8000
trusted library allocation
page read and write
20187E9D000
trusted library allocation
page read and write
2017F87D000
trusted library allocation
page read and write
2EE00000
heap
page read and write
68A1000
heap
page read and write
6561000
heap
page read and write
25B47F67000
trusted library allocation
page read and write
68A1000
heap
page read and write
2118000
heap
page read and write
68A1000
heap
page read and write
2018819B000
trusted library allocation
page read and write
1C68E000
stack
page read and write
2018C33C000
trusted library allocation
page read and write
2717000
heap
page read and write
2018ABBE000
trusted library allocation
page read and write
20181691000
trusted library allocation
page read and write
2018185B000
trusted library allocation
page read and write
25B48269000
trusted library allocation
page read and write
AE0000
direct allocation
page read and write
25B3ED21000
heap
page read and write
68A1000
heap
page read and write
25B4ACD5000
trusted library allocation
page read and write
201786F9000
heap
page read and write
20187EA0000
trusted library allocation
page read and write
2017E0FC000
trusted library allocation
page read and write
9D0000
unkown
page execute and read and write
20181174000
trusted library allocation
page read and write
2019043F000
trusted library allocation
page read and write
2FCE000
stack
page read and write
2018A5FB000
trusted library allocation
page read and write
25B50E8B000
trusted library allocation
page read and write
201786E7000
heap
page read and write
20187EDD000
trusted library allocation
page read and write
20189E7A000
trusted library allocation
page read and write
201811CC000
trusted library allocation
page read and write
25B46761000
trusted library allocation
page read and write
2018BA66000
trusted library allocation
page read and write
20181348000
trusted library allocation
page read and write
6561000
heap
page read and write
250E000
stack
page read and write
4B06000
heap
page read and write
25B3ED15000
heap
page read and write
2018A6E2000
trusted library allocation
page read and write
2017FEEA000
trusted library allocation
page read and write
25B497D2000
trusted library allocation
page read and write
25B45443000
trusted library allocation
page read and write
25B4821C000
trusted library allocation
page read and write
414000
heap
page read and write
AE0000
direct allocation
page read and write
68A1000
heap
page read and write
20178704000
heap
page read and write
2018BFA4000
trusted library allocation
page read and write
4D7F000
stack
page read and write
4B00000
heap
page read and write
2017F9F6000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018AC14000
trusted library allocation
page read and write
12F4000
heap
page read and write
465E000
stack
page read and write
2018BA64000
trusted library allocation
page read and write
201812E6000
trusted library allocation
page read and write
20181613000
trusted library allocation
page read and write
1DDB000
stack
page read and write
201812C6000
trusted library allocation
page read and write
12FC000
stack
page read and write
20182DD9000
trusted library allocation
page read and write
1E077E2E000
heap
page read and write
25B4AD34000
trusted library allocation
page read and write
25B451D7000
trusted library allocation
page read and write
4D81000
heap
page read and write
6561000
heap
page read and write
201786FD000
heap
page read and write
6561000
heap
page read and write
13E4000
heap
page read and write
414000
heap
page read and write
BC2316B000
stack
page read and write
13AE000
stack
page read and write
BB3000
heap
page read and write
2018186E000
trusted library allocation
page read and write
25B445BF000
trusted library allocation
page read and write
25B47B7A000
trusted library allocation
page read and write
2018BCCB000
trusted library allocation
page read and write
1FC1000
heap
page read and write
414000
heap
page read and write
25B48088000
trusted library allocation
page read and write
473F000
stack
page read and write
201818EB000
trusted library allocation
page read and write
4F54000
direct allocation
page execute and read and write
20189CC5000
trusted library allocation
page read and write
68A1000
heap
page read and write
20173615000
heap
page read and write
2018BC24000
trusted library allocation
page read and write
335F000
stack
page read and write
BD0000
heap
page read and write
2018A2A3000
trusted library allocation
page read and write
2018A52C000
trusted library allocation
page read and write
20178729000
heap
page read and write
2018BF53000
trusted library allocation
page read and write
25B4AAC3000
trusted library allocation
page read and write
6561000
heap
page read and write
5A7000
unkown
page execute and read and write
15E0000
heap
page read and write
1E07650A000
trusted library allocation
page read and write
229F7000
heap
page read and write
13E4000
heap
page read and write
6561000
heap
page read and write
1580000
heap
page read and write
2018BDFE000
trusted library allocation
page read and write
42F0000
heap
page read and write
25DAED00000
heap
page read and write
13E4000
heap
page read and write
20181158000
trusted library allocation
page read and write
20189BEC000
trusted library allocation
page read and write
20182C8E000
trusted library allocation
page read and write
20187EC3000
trusted library allocation
page read and write
25B49803000
trusted library allocation
page read and write
2018C82D000
trusted library allocation
page read and write
1D64000
heap
page read and write
2018118B000
trusted library allocation
page read and write
6561000
heap
page read and write
201810BD000
trusted library allocation
page read and write
25B48078000
trusted library allocation
page read and write
20187E84000
trusted library allocation
page read and write
20181862000
trusted library allocation
page read and write
577F000
stack
page read and write
68A1000
heap
page read and write
25B4DD10000
trusted library allocation
page read and write
1E076507000
trusted library allocation
page read and write
20189C77000
trusted library allocation
page read and write
1350000
heap
page read and write
25B485DF000
trusted library allocation
page read and write
2018BC74000
trusted library allocation
page read and write
2018AB78000
trusted library allocation
page read and write
25B4809A000
trusted library allocation
page read and write
13E4000
heap
page read and write
20181247000
trusted library allocation
page read and write
68A1000
heap
page read and write
3C1F000
stack
page read and write
2018BAE3000
trusted library allocation
page read and write
4BF0000
heap
page read and write
68A1000
heap
page read and write
229F7000
heap
page read and write
13E4000
heap
page read and write
6561000
heap
page read and write
13E4000
heap
page read and write
20187DB7000
trusted library allocation
page read and write
2018C633000
trusted library allocation
page read and write
25B50C03000
trusted library allocation
page read and write
414000
heap
page read and write
25B4AEA4000
trusted library allocation
page read and write
20187E28000
trusted library allocation
page read and write
68A1000
heap
page read and write
13E4000
heap
page read and write
20178723000
heap
page read and write
20178734000
heap
page read and write
704000
heap
page read and write
8530000
heap
page read and write
5410000
direct allocation
page execute and read and write
13E4000
heap
page read and write
25B480F3000
trusted library allocation
page read and write
201816A8000
trusted library allocation
page read and write
2017D482000
trusted library allocation
page read and write
2018C2BA000
trusted library allocation
page read and write
201811DA000
trusted library allocation
page read and write
43DF000
stack
page read and write
2018A687000
trusted library allocation
page read and write
25B482BE000
trusted library allocation
page read and write
20183AC9000
trusted library allocation
page read and write
25B3ED0E000
heap
page read and write
2018AC80000
trusted library allocation
page read and write
25B3ED21000
heap
page read and write
1590000
direct allocation
page read and write
20178734000
heap
page read and write
40EF000
stack
page read and write
49F000
unkown
page execute and read and write
25B484E0000
trusted library section
page read and write
201786F5000
heap
page read and write
2C10000
direct allocation
page read and write
20180683000
trusted library allocation
page read and write
6561000
heap
page read and write
280232D24000
trusted library allocation
page read and write
423F000
stack
page read and write
68A1000
heap
page read and write
68A1000
heap
page read and write
1F84000
heap
page read and write
25B48049000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
2018AFF0000
trusted library allocation
page read and write
25B482F6000
trusted library allocation
page read and write
414000
heap
page read and write
414000
heap
page read and write
53E9000
stack
page read and write
20188632000
trusted library allocation
page read and write
25B4A903000
trusted library allocation
page read and write
414000
heap
page read and write
68A1000
heap
page read and write
2018519A000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018819E000
trusted library allocation
page read and write
25B48500000
trusted library allocation
page read and write
20178726000
heap
page read and write
25B43800000
trusted library allocation
page read and write
13E5000
heap
page read and write
400000
unkown
page execute and read and write
272C000
heap
page read and write
20182C86000
trusted library allocation
page read and write
25B37F03000
trusted library allocation
page read and write
201786F5000
heap
page read and write
2018AFEC000
trusted library allocation
page read and write
28A80000
heap
page read and write
20181692000
trusted library allocation
page read and write
25B45603000
trusted library allocation
page read and write
20187FE6000
trusted library allocation
page read and write
25B49481000
trusted library allocation
page read and write
2018BBB5000
trusted library allocation
page read and write
20178734000
heap
page read and write
1430000
direct allocation
page read and write
43B1000
heap
page read and write
25B49498000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B45B0D000
trusted library allocation
page read and write
25B37D00000
heap
page read and write
68A1000
heap
page read and write
2018A8D5000
trusted library allocation
page read and write
68A1000
heap
page read and write
165A000
heap
page read and write
201903E0000
trusted library allocation
page read and write
2018A8FA000
trusted library allocation
page read and write
2018A543000
trusted library allocation
page read and write
1E076302000
heap
page read and write
2018C593000
trusted library allocation
page read and write
6561000
heap
page read and write
68A1000
heap
page read and write
4F53000
direct allocation
page execute and read and write
198000
stack
page read and write
2018CA12000
trusted library allocation
page read and write
2018A5AF000
trusted library allocation
page read and write
25B453A6000
trusted library allocation
page read and write
5334000
direct allocation
page execute and read and write
2017F96D000
trusted library allocation
page read and write
1F95000
heap
page read and write
20190410000
trusted library allocation
page read and write
20189E45000
trusted library allocation
page read and write
6561000
heap
page read and write
20181140000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018C2D4000
trusted library allocation
page read and write
201810AA000
trusted library allocation
page read and write
25B48051000
trusted library allocation
page read and write
68A1000
heap
page read and write
13E4000
heap
page read and write
2018A278000
trusted library allocation
page read and write
4D81000
heap
page read and write
2018BFC0000
trusted library allocation
page read and write
20178723000
heap
page read and write
400000
unkown
page execute and read and write
20182D99000
trusted library allocation
page read and write
25B3ED27000
heap
page read and write
2018BCE0000
trusted library allocation
page read and write
25B4824A000
trusted library allocation
page read and write
4DDF000
stack
page read and write
2EB0E000
stack
page read and write
2018CDC9000
trusted library allocation
page read and write
348F000
stack
page read and write
5674000
heap
page read and write
6561000
heap
page read and write
20178741000
heap
page read and write
2018AFE2000
trusted library allocation
page read and write
4830000
direct allocation
page read and write
229F0000
heap
page read and write
6CC85000
unkown
page readonly
415000
heap
page read and write
25B480D0000
trusted library allocation
page read and write
2470000
heap
page read and write
68A1000
heap
page read and write
2018CD89000
trusted library allocation
page read and write
2945C6B04000
trusted library allocation
page read and write
20178733000
heap
page read and write
414000
heap
page read and write
20181090000
trusted library allocation
page read and write
2374340C000
trusted library allocation
page read and write
2018A7EA000
trusted library allocation
page read and write
25B467E3000
trusted library allocation
page read and write
201786E7000
heap
page read and write
20188581000
trusted library allocation
page read and write
2018A7F2000
trusted library allocation
page read and write
20188639000
trusted library allocation
page read and write
585E000
stack
page read and write
36FF000
stack
page read and write
25B4C204000
trusted library allocation
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
40AF000
stack
page read and write
FEE90000
direct allocation
page execute and read and write
68A1000
heap
page read and write
25B4AE9A000
trusted library allocation
page read and write
20178704000
heap
page read and write
25B48099000
trusted library allocation
page read and write
2018B6F4000
trusted library allocation
page read and write
229F7000
heap
page read and write
731000
unkown
page execute and read and write
2017E13A000
trusted library allocation
page read and write
201786FC000
heap
page read and write
201809C9000
trusted library allocation
page read and write
25B51A19000
trusted library allocation
page read and write
2018B9FB000
trusted library allocation
page read and write
25B4AC70000
trusted library allocation
page read and write
13CC000
heap
page read and write
3F6F000
stack
page read and write
6561000
heap
page read and write
25B49400000
trusted library allocation
page read and write
201786F5000
heap
page read and write
4D81000
heap
page read and write
20181163000
trusted library allocation
page read and write
20178723000
heap
page read and write
25B4FD3A000
trusted library allocation
page read and write
2018AFA5000
trusted library allocation
page read and write
201812E6000
trusted library allocation
page read and write
5210000
direct allocation
page execute and read and write
5030000
direct allocation
page execute and read and write
5440000
direct allocation
page execute and read and write
2018816F000
trusted library allocation
page read and write
201786DC000
heap
page read and write
20182A7A000
trusted library allocation
page read and write
201902F2000
trusted library allocation
page read and write
6561000
heap
page read and write
2017E01C000
trusted library allocation
page read and write
201881E0000
trusted library allocation
page read and write
414000
heap
page read and write
704000
heap
page read and write
B85000
unkown
page execute and read and write
2017FE8D000
trusted library allocation
page read and write
171F000
stack
page read and write
2018AF4C000
trusted library allocation
page read and write
41CE000
stack
page read and write
1FF7000
heap
page read and write
414000
heap
page read and write
201786E7000
heap
page read and write
25B48215000
trusted library allocation
page read and write
6FC000
stack
page read and write
237432C6000
trusted library allocation
page read and write
68A1000
heap
page read and write
4A5E000
stack
page read and write
400000
unkown
page execute and read and write
201801AB000
trusted library allocation
page read and write
201786E1000
heap
page read and write
2018117B000
trusted library allocation
page read and write
396E000
stack
page read and write
68A1000
heap
page read and write
4AFF000
stack
page read and write
20178759000
heap
page read and write
2019033D000
trusted library allocation
page read and write
350AD000
stack
page read and write
2018857D000
trusted library allocation
page read and write
2017FC6D000
trusted library allocation
page read and write
2018BC12000
trusted library allocation
page read and write
2018AB20000
trusted library allocation
page read and write
20178709000
heap
page read and write
414000
heap
page read and write
2018A7C6000
trusted library allocation
page read and write
201881B5000
trusted library allocation
page read and write
2567000
heap
page read and write
2017DEB9000
trusted library allocation
page read and write
AE0000
direct allocation
page read and write
AFE000
heap
page read and write
6561000
heap
page read and write
20F0000
heap
page read and write
2018BA3E000
trusted library allocation
page read and write
201811A2000
trusted library allocation
page read and write
2018BCBE000
trusted library allocation
page read and write
20188122000
trusted library allocation
page read and write
20189AE3000
trusted library allocation
page read and write
2017D444000
trusted library allocation
page read and write
2017FC8B000
trusted library allocation
page read and write
201801B5000
trusted library allocation
page read and write
6561000
heap
page read and write
2017E5F2000
trusted library allocation
page read and write
2018AC0F000
trusted library allocation
page read and write
2017872A000
heap
page read and write
2018A627000
trusted library allocation
page read and write
44BF000
stack
page read and write
68A1000
heap
page read and write
2018117E000
trusted library allocation
page read and write
4D81000
heap
page read and write
2018A7E2000
trusted library allocation
page read and write
2017FC6A000
trusted library allocation
page read and write
2017FEF4000
trusted library allocation
page read and write
14CF000
stack
page read and write
25B48E08000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B50EE0000
trusted library allocation
page read and write
1C91D000
stack
page read and write
25B485EB000
trusted library allocation
page read and write
BC2D3FE000
stack
page read and write
25B48215000
trusted library allocation
page read and write
20178723000
heap
page read and write
68A1000
heap
page read and write
13E4000
heap
page read and write
25B49466000
trusted library allocation
page read and write
25B48941000
trusted library allocation
page read and write
2740000
heap
page read and write
2018182A000
trusted library allocation
page read and write
201881FA000
trusted library allocation
page read and write
13E4000
heap
page read and write
201881C0000
trusted library allocation
page read and write
2018A24B000
trusted library allocation
page read and write
25B49271000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018A268000
trusted library allocation
page read and write
BC277F3000
stack
page read and write
201812C6000
trusted library allocation
page read and write
2018118B000
trusted library allocation
page read and write
68A1000
heap
page read and write
201786E7000
heap
page read and write
20178722000
heap
page read and write
4C03000
heap
page read and write
1F7E000
stack
page read and write
2018BBAC000
trusted library allocation
page read and write
20178702000
heap
page read and write
20178759000
heap
page read and write
6561000
heap
page read and write
2018006D000
trusted library allocation
page read and write
25B47E6C000
trusted library allocation
page read and write
53E0000
direct allocation
page execute and read and write
20178734000
heap
page read and write
2018A5B6000
trusted library allocation
page read and write
20188193000
trusted library allocation
page read and write
20178753000
heap
page read and write
2018161D000
trusted library allocation
page read and write
25B4526D000
trusted library allocation
page read and write
20180951000
trusted library allocation
page read and write
270B000
stack
page read and write
2018A2E1000
trusted library allocation
page read and write
2017DBDF000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018AF9C000
trusted library allocation
page read and write
68A1000
heap
page read and write
392F000
stack
page read and write
25B37DF0000
trusted library section
page read and write
25B50E0D000
trusted library allocation
page read and write
2018AF18000
trusted library allocation
page read and write
2018111B000
trusted library allocation
page read and write
6561000
heap
page read and write
5CDC000
stack
page read and write
25B4928C000
trusted library allocation
page read and write
201786FD000
heap
page read and write
2018C2B7000
trusted library allocation
page read and write
13E4000
heap
page read and write
20187E23000
trusted library allocation
page read and write
2018BFC0000
trusted library allocation
page read and write
229EF000
heap
page read and write
201786FD000
heap
page read and write
23F3000
heap
page read and write
201786FD000
heap
page read and write
201786F5000
heap
page read and write
2018BFA4000
trusted library allocation
page read and write
2017D999000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B47F2B000
trusted library allocation
page read and write
68A1000
heap
page read and write
201885C1000
trusted library allocation
page read and write
2018BF3D000
trusted library allocation
page read and write
6561000
heap
page read and write
25B45A0C000
heap
page read and write
25B44490000
trusted library allocation
page read and write
25B47E81000
trusted library allocation
page read and write
2018A54D000
trusted library allocation
page read and write
20187E8B000
trusted library allocation
page read and write
1430000
direct allocation
page read and write
25B4C202000
trusted library allocation
page read and write
20183A85000
trusted library allocation
page read and write
25B52B75000
trusted library allocation
page read and write
4FB0000
direct allocation
page execute and read and write
25B44403000
trusted library allocation
page read and write
2018BFBC000
trusted library allocation
page read and write
25B4821E000
trusted library allocation
page read and write
2018BF53000
trusted library allocation
page read and write
4A32DFE000
stack
page read and write
414000
heap
page read and write
229F7000
heap
page read and write
13E4000
heap
page read and write
FD0000
direct allocation
page read and write
68A1000
heap
page read and write
25B3ED2D000
heap
page read and write
20181856000
trusted library allocation
page read and write
1530000
heap
page read and write
20182A19000
trusted library allocation
page read and write
425F000
stack
page read and write
2018A8C4000
trusted library allocation
page read and write
866000
unkown
page execute and write copy
2017D081000
trusted library allocation
page read and write
25B37E30000
trusted library section
page readonly
2017FEEA000
trusted library allocation
page read and write
2086000
heap
page read and write
254E000
heap
page execute and read and write
6561000
heap
page read and write
2017FE33000
trusted library allocation
page read and write
22A03000
heap
page read and write
3A1E000
stack
page read and write
3BFF000
stack
page read and write
2018A8A1000
trusted library allocation
page read and write
2018A56F000
trusted library allocation
page read and write
237432B5000
trusted library allocation
page read and write
201838A2000
trusted library allocation
page read and write
25B480DE000
trusted library allocation
page read and write
2017FC5A000
trusted library allocation
page read and write
68A1000
heap
page read and write
13E4000
heap
page read and write
68A1000
heap
page read and write
201851BE000
trusted library allocation
page read and write
2018ACAD000
trusted library allocation
page read and write
244C000
unkown
page readonly
2018A5AF000
trusted library allocation
page read and write
20178734000
heap
page read and write
13E4000
heap
page read and write
25B4457C000
trusted library allocation
page read and write
2018373A000
trusted library allocation
page read and write
20187E73000
trusted library allocation
page read and write
13E4000
heap
page read and write
68A1000
heap
page read and write
400000
unkown
page readonly
20188150000
trusted library allocation
page read and write
229F7000
heap
page read and write
FD0000
direct allocation
page read and write
13E4000
heap
page read and write
201786E7000
heap
page read and write
68A1000
heap
page read and write
13E4000
heap
page read and write
2017872F000
heap
page read and write
13E4000
heap
page read and write
730000
unkown
page readonly
6561000
heap
page read and write
26B7000
heap
page read and write
20178722000
heap
page read and write
2018BF5A000
trusted library allocation
page read and write
2018BC1D000
trusted library allocation
page read and write
20178702000
heap
page read and write
68A1000
heap
page read and write
5060000
direct allocation
page execute and read and write
25B438C9000
trusted library allocation
page read and write
414000
heap
page read and write
68A1000
heap
page read and write
1E0762B0000
heap
page read and write
2018BBB9000
trusted library allocation
page read and write
712000
unkown
page execute and read and write
2018BFF0000
trusted library allocation
page read and write
2018B200000
trusted library allocation
page read and write
25B3ED1C000
heap
page read and write
201851DA000
trusted library allocation
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
6561000
heap
page read and write
20180125000
trusted library allocation
page read and write
13E4000
heap
page read and write
20187E82000
trusted library allocation
page read and write
2017873C000
heap
page read and write
1D19000
heap
page read and write
68A1000
heap
page read and write
25B480DE000
trusted library allocation
page read and write
38DE000
stack
page read and write
2017870E000
heap
page read and write
BCB000
unkown
page execute and write copy
201881C8000
trusted library allocation
page read and write
22A12000
heap
page read and write
20181198000
trusted library allocation
page read and write
2017FEF4000
trusted library allocation
page read and write
20180DEB000
trusted library allocation
page read and write
25B4ADA3000
trusted library allocation
page read and write
20178734000
heap
page read and write
2618000
heap
page read and write
68A1000
heap
page read and write
2017D47D000
trusted library allocation
page read and write
BC243FE000
stack
page read and write
25B3ED44000
heap
page read and write
25B3ED50000
heap
page read and write
25B4803D000
trusted library allocation
page read and write
20183A9B000
trusted library allocation
page read and write
201818AD000
trusted library allocation
page read and write
201812A1000
trusted library allocation
page read and write
25B482FC000
trusted library allocation
page read and write
8B0000
unkown
page read and write
4D81000
heap
page read and write
13E4000
heap
page read and write
23743200000
trusted library allocation
page read and write
25B47F94000
trusted library allocation
page read and write
229E8000
heap
page read and write
20188566000
trusted library allocation
page read and write
20181060000
trusted library allocation
page read and write
25B37F92000
trusted library allocation
page read and write
13E4000
heap
page read and write
2018BFA0000
trusted library allocation
page read and write
414000
heap
page read and write
2017FB19000
trusted library allocation
page read and write
201786E7000
heap
page read and write
20181377000
trusted library allocation
page read and write
6561000
heap
page read and write
2018BA58000
trusted library allocation
page read and write
25B48233000
trusted library allocation
page read and write
229F7000
heap
page read and write
25B480C9000
trusted library allocation
page read and write
4D81000
heap
page read and write
20190623000
trusted library allocation
page read and write
2018BCCB000
trusted library allocation
page read and write
5400000
direct allocation
page execute and read and write
20182DA0000
trusted library allocation
page read and write
414000
heap
page read and write
866000
unkown
page execute and read and write
25B4671F000
trusted library allocation
page read and write
2018A8AA000
trusted library allocation
page read and write
2018BD9C000
trusted library allocation
page read and write
6561000
heap
page read and write
192000
stack
page read and write
4D81000
heap
page read and write
2018AFBB000
trusted library allocation
page read and write
25B482D9000
trusted library allocation
page read and write
2018C300000
trusted library allocation
page read and write
25B47BCB000
trusted library allocation
page read and write
370F000
stack
page read and write
6561000
heap
page read and write
2017872C000
heap
page read and write
201903B2000
trusted library allocation
page read and write
201851E6000
trusted library allocation
page read and write
25B3ED21000
heap
page read and write
6561000
heap
page read and write
20182A0C000
trusted library allocation
page read and write
414000
heap
page read and write
20178702000
heap
page read and write
25B3ED2A000
heap
page read and write
4D81000
heap
page read and write
13F0000
heap
page read and write
20185171000
trusted library allocation
page read and write
2017FE75000
trusted library allocation
page read and write
B4D000
heap
page read and write
2017E5C3000
trusted library allocation
page read and write
2017D0B3000
trusted library allocation
page read and write
2018BC56000
trusted library allocation
page read and write
20178725000
heap
page read and write
6561000
heap
page read and write
919000
unkown
page read and write
25B47D03000
trusted library allocation
page read and write
201818EB000
trusted library allocation
page read and write
2018188E000
trusted library allocation
page read and write
2018BC06000
trusted library allocation
page read and write
13E4000
heap
page read and write
2018A7D4000
trusted library allocation
page read and write
2017E5EF000
trusted library allocation
page read and write
201809FD000
trusted library allocation
page read and write
25B3ED35000
heap
page read and write
20178703000
heap
page read and write
2018BF74000
trusted library allocation
page read and write
1544000
heap
page read and write
25B48006000
trusted library allocation
page read and write
2018375A000
trusted library allocation
page read and write
20178725000
heap
page read and write
201811DE000
trusted library allocation
page read and write
2017D9BE000
trusted library allocation
page read and write
201851FA000
trusted library allocation
page read and write
BC2C93F000
stack
page read and write
96E2000
heap
page read and write
25B445E0000
trusted library allocation
page read and write
20178734000
heap
page read and write
25B3ED1C000
heap
page read and write
2018103F000
trusted library allocation
page read and write
6561000
heap
page read and write
2017F87B000
trusted library allocation
page read and write
2017D0CC000
trusted library allocation
page read and write
6561000
heap
page read and write
2017E5E5000
trusted library allocation
page read and write
25B3ED50000
heap
page read and write
201786FD000
heap
page read and write
25B48B9B000
trusted library allocation
page read and write
6561000
heap
page read and write
5230000
direct allocation
page execute and read and write
12F4000
heap
page read and write
4DE0000
heap
page read and write
3C5F000
stack
page read and write
2018A7EA000
trusted library allocation
page read and write
13E4000
heap
page read and write
20189D43000
trusted library allocation
page read and write
2019028A000
trusted library allocation
page read and write
4C00000
heap
page read and write
2CD0000
direct allocation
page read and write
2017E5E5000
trusted library allocation
page read and write
2018CD73000
trusted library allocation
page read and write
20178702000
heap
page read and write
25BD000
heap
page read and write
25B49229000
trusted library allocation
page read and write
2017DB74000
trusted library allocation
page read and write
201816BD000
trusted library allocation
page read and write
2018BC6E000
trusted library allocation
page read and write
5390000
direct allocation
page execute and read and write
27FF000
stack
page read and write
4F64000
direct allocation
page execute and read and write
20189D37000
trusted library allocation
page read and write
460F000
stack
page read and write
2018AC55000
trusted library allocation
page read and write
2018015E000
trusted library allocation
page read and write
201810AA000
trusted library allocation
page read and write
201880ED000
trusted library allocation
page read and write
201801AB000
trusted library allocation
page read and write
23A4000
heap
page read and write
2018BF68000
trusted library allocation
page read and write
BB5000
unkown
page execute and read and write
2C10000
direct allocation
page read and write
2C40000
heap
page read and write
201786E0000
heap
page read and write
13E4000
heap
page read and write
25B47BCF000
trusted library allocation
page read and write
AAC03FE000
unkown
page readonly
5A4F000
stack
page read and write
25DAEE1C000
trusted library allocation
page read and write
201881A9000
trusted library allocation
page read and write
1ADC5FE000
stack
page read and write
20181299000
trusted library allocation
page read and write
2018AC7A000
trusted library allocation
page read and write
25B49431000
trusted library allocation
page read and write
4F64000
direct allocation
page execute and read and write
339E000
stack
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
2018C601000
trusted library allocation
page read and write
25B453DF000
trusted library allocation
page read and write
28B2B000
heap
page read and write
7EDE000
stack
page read and write
414000
heap
page read and write
2018518D000
trusted library allocation
page read and write
20181191000
trusted library allocation
page read and write
6561000
heap
page read and write
25B4924C000
trusted library allocation
page read and write
6561000
heap
page read and write
229D3000
heap
page read and write
13E4000
heap
page read and write
2018CD8C000
trusted library allocation
page read and write
201786E1000
heap
page read and write
201811A8000
trusted library allocation
page read and write
2018BCBE000
trusted library allocation
page read and write
2018509F000
trusted library allocation
page read and write
2018BC50000
trusted library allocation
page read and write
20189A8C000
trusted library allocation
page read and write
14AF000
heap
page read and write
25B49703000
trusted library allocation
page read and write
201786F5000
heap
page read and write
201851BC000
trusted library allocation
page read and write
20189E2B000
trusted library allocation
page read and write
25B480D0000
trusted library allocation
page read and write
429E000
stack
page read and write
2018BC25000
trusted library allocation
page read and write
2018BCAF000
trusted library allocation
page read and write
201851B6000
trusted library allocation
page read and write
2018BA42000
trusted library allocation
page read and write
2018AFC5000
trusted library allocation
page read and write
25B3ED21000
heap
page read and write
C76000
unkown
page execute and read and write
25AC000
heap
page read and write
2018A576000
trusted library allocation
page read and write
1F84000
heap
page read and write
76DD000
stack
page read and write
2018C336000
trusted library allocation
page read and write
68A1000
heap
page read and write
201885EA000
trusted library allocation
page read and write
1590000
direct allocation
page read and write
68A1000
heap
page read and write
25B48B8D000
trusted library allocation
page read and write
25B47E6A000
trusted library allocation
page read and write
414000
heap
page read and write
68A1000
heap
page read and write
25B4806A000
trusted library allocation
page read and write
20187E32000
trusted library allocation
page read and write
1DA2000
heap
page read and write
9C1000
unkown
page execute and read and write
3E9F000
stack
page read and write
25B3ECF0000
heap
page read and write
5334000
direct allocation
page execute and read and write
2018AFC3000
trusted library allocation
page read and write
25B4AE82000
trusted library allocation
page read and write
201880D6000
trusted library allocation
page read and write
4D81000
heap
page read and write
68A1000
heap
page read and write
2017872D000
heap
page read and write
201818B0000
trusted library allocation
page read and write
13E4000
heap
page read and write
2018A5D5000
trusted library allocation
page read and write
6561000
heap
page read and write
21F0000
heap
page read and write
2018C21D000
trusted library allocation
page read and write
2018BDF7000
trusted library allocation
page read and write
20182D6D000
trusted library allocation
page read and write
6561000
heap
page read and write
2018CC28000
trusted library allocation
page read and write
20178723000
heap
page read and write
68A1000
heap
page read and write
201886C9000
trusted library allocation
page read and write
20182A19000
trusted library allocation
page read and write
2017874B000
heap
page read and write
2CD0000
direct allocation
page read and write
2018857C000
trusted library allocation
page read and write
20185002000
trusted library allocation
page read and write
2018C601000
trusted library allocation
page read and write
20181076000
trusted library allocation
page read and write
20185007000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B48085000
trusted library allocation
page read and write
25B48B3B000
trusted library allocation
page read and write
2017872B000
heap
page read and write
25B4AE49000
trusted library allocation
page read and write
201786FD000
heap
page read and write
68A1000
heap
page read and write
20178732000
heap
page read and write
2018518F000
trusted library allocation
page read and write
25B45200000
trusted library allocation
page read and write
20187E04000
trusted library allocation
page read and write
212DF007000
trusted library allocation
page read and write
2018BFDE000
trusted library allocation
page read and write
20185136000
trusted library allocation
page read and write
719000
unkown
page read and write
422E000
stack
page read and write
6561000
heap
page read and write
1E58000
heap
page read and write
4EE0000
trusted library allocation
page read and write
20185125000
trusted library allocation
page read and write
25B52B67000
trusted library allocation
page read and write
2017D9F4000
trusted library allocation
page read and write
2017875F000
heap
page read and write
201851E6000
trusted library allocation
page read and write
20189D63000
trusted library allocation
page read and write
2018CE60000
trusted library allocation
page read and write
2018A6D0000
trusted library allocation
page read and write
423000
unkown
page readonly
2018513D000
trusted library allocation
page read and write
4B3E000
stack
page read and write
2018BD47000
trusted library allocation
page read and write
68A1000
heap
page read and write
2CD0000
direct allocation
page read and write
20178722000
heap
page read and write
20178709000
heap
page read and write
25B4529D000
trusted library allocation
page read and write
25B44600000
unkown
page readonly
2018C598000
trusted library allocation
page read and write
212DED27000
heap
page read and write
40B0000
direct allocation
page execute and read and write
25B3ED4A000
heap
page read and write
6561000
heap
page read and write
20181896000
trusted library allocation
page read and write
201812EB000
trusted library allocation
page read and write
20178726000
heap
page read and write
25B4ADD7000
trusted library allocation
page read and write
2018BDC1000
trusted library allocation
page read and write
AE0000
direct allocation
page read and write
2018A893000
trusted library allocation
page read and write
25B37F0D000
trusted library allocation
page read and write
2017D3F6000
trusted library allocation
page read and write
25B3ED50000
heap
page read and write
BC27AFA000
stack
page read and write
2018C9BA000
trusted library allocation
page read and write
25B47B5F000
trusted library allocation
page read and write
25B52B95000
trusted library allocation
page read and write
201786F5000
heap
page read and write
25B49A3E000
trusted library allocation
page read and write
2017D4E2000
trusted library allocation
page read and write
23743203000
trusted library allocation
page read and write
25B488A2000
trusted library allocation
page read and write
2018808D000
trusted library allocation
page read and write
2018B9CC000
trusted library allocation
page read and write
20187EF9000
trusted library allocation
page read and write
414000
heap
page read and write
25B4AD7D000
trusted library allocation
page read and write
2018094D000
trusted library allocation
page read and write
4D81000
heap
page read and write
25B47B5F000
trusted library allocation
page read and write
3C5E000
stack
page read and write
25B454C1000
trusted library allocation
page read and write
3C0F000
stack
page read and write
53A0000
direct allocation
page execute and read and write
20182D79000
trusted library allocation
page read and write
20185163000
trusted library allocation
page read and write
2017E1E4000
trusted library allocation
page read and write
25B47DD9000
trusted library allocation
page read and write
201810E7000
trusted library allocation
page read and write
20178704000
heap
page read and write
25B48269000
trusted library allocation
page read and write
20181158000
trusted library allocation
page read and write
25B3ED3A000
heap
page read and write
6561000
heap
page read and write
5430000
direct allocation
page execute and read and write
25B4A672000
trusted library allocation
page read and write
25B46788000
trusted library allocation
page read and write
25B48936000
trusted library allocation
page read and write
2017D0DF000
trusted library allocation
page read and write
4D81000
heap
page read and write
2018BCD0000
trusted library allocation
page read and write
2017FEF7000
trusted library allocation
page read and write
2018816C000
trusted library allocation
page read and write
2017E5A9000
trusted library allocation
page read and write
13E4000
heap
page read and write
2017D3FB000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018A124000
trusted library allocation
page read and write
414000
heap
page read and write
2017E5CA000
trusted library allocation
page read and write
68A1000
heap
page read and write
2017FCD0000
trusted library allocation
page read and write
2017873C000
heap
page read and write
20188145000
trusted library allocation
page read and write
BC2C87E000
stack
page read and write
2018815B000
trusted library allocation
page read and write
BC2479C000
stack
page read and write
201786E0000
heap
page read and write
20185189000
trusted library allocation
page read and write
20182D5E000
trusted library allocation
page read and write
201786F4000
heap
page read and write
6561000
heap
page read and write
2018BF84000
trusted library allocation
page read and write
2018BA4E000
trusted library allocation
page read and write
25B4A652000
trusted library allocation
page read and write
25B4AC38000
trusted library allocation
page read and write
2018A7C3000
trusted library allocation
page read and write
2018AFDA000
trusted library allocation
page read and write
8B0000
unkown
page read and write
13E4000
heap
page read and write
BC2312E000
stack
page read and write
2017DE9E000
trusted library allocation
page read and write
25B4896A000
trusted library allocation
page read and write
20188380000
trusted library allocation
page read and write
20187E15000
trusted library allocation
page read and write
1CA63000
heap
page read and write
201811E6000
trusted library allocation
page read and write
25B45124000
trusted library allocation
page read and write
2017F877000
trusted library allocation
page read and write
2374322E000
trusted library allocation
page read and write
2018118B000
trusted library allocation
page read and write
3DDE000
stack
page read and write
25B48103000
trusted library allocation
page read and write
25B45403000
trusted library allocation
page read and write
13C0000
heap
page read and write
35DF000
stack
page read and write
43DE000
stack
page read and write
2018A6D9000
trusted library allocation
page read and write
25B3ED15000
heap
page read and write
20178744000
heap
page read and write
2017DEEC000
trusted library allocation
page read and write
2018C2AA000
trusted library allocation
page read and write
6CC3F000
unkown
page readonly
F3B000
unkown
page execute and read and write
68A1000
heap
page read and write
6561000
heap
page read and write
1E077FB0000
heap
page read and write
25B46200000
trusted library allocation
page read and write
25B482B9000
trusted library allocation
page read and write
2E2E000
stack
page read and write
4D81000
heap
page read and write
20181CC3000
trusted library allocation
page read and write
2018A7FE000
trusted library allocation
page read and write
2017870E000
heap
page read and write
201786E0000
heap
page read and write
25B48BAF000
trusted library allocation
page read and write
68A1000
heap
page read and write
20181881000
trusted library allocation
page read and write
25B3ED3A000
heap
page read and write
25B482F6000
trusted library allocation
page read and write
704000
heap
page read and write
2018BCAF000
trusted library allocation
page read and write
2017E5BE000
trusted library allocation
page read and write
68B0000
heap
page read and write
20178734000
heap
page read and write
13E4000
heap
page read and write
2018A55D000
trusted library allocation
page read and write
20185116000
trusted library allocation
page read and write
2018188E000
trusted library allocation
page read and write
201881C0000
trusted library allocation
page read and write
20187EEA000
trusted library allocation
page read and write
25B3ED2F000
heap
page read and write
25B47B80000
trusted library allocation
page read and write
25B37DA0000
trusted library allocation
page execute read
2018A5B6000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B48402000
unclassified section
page read and write
39CF000
stack
page read and write
201786F5000
heap
page read and write
201882B9000
trusted library allocation
page read and write
9C000
stack
page read and write
20181B10000
trusted library allocation
page read and write
2017DB71000
trusted library allocation
page read and write
68A1000
heap
page read and write
20181637000
trusted library allocation
page read and write
6561000
heap
page read and write
25B48981000
trusted library allocation
page read and write
201812E6000
trusted library allocation
page read and write
25B4AE46000
trusted library allocation
page read and write
20178724000
heap
page read and write
25B480D7000
trusted library allocation
page read and write
201881C8000
trusted library allocation
page read and write
201851A5000
trusted library allocation
page read and write
2018BC10000
trusted library allocation
page read and write
25B48014000
trusted library allocation
page read and write
420E000
stack
page read and write
201786E7000
heap
page read and write
6561000
heap
page read and write
2017E5E5000
trusted library allocation
page read and write
2019029B000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B3ED15000
heap
page read and write
49A0000
direct allocation
page execute and read and write
201786DC000
heap
page read and write
996000
unkown
page execute and read and write
704000
heap
page read and write
26F5000
heap
page read and write
704000
heap
page read and write
96B2000
heap
page read and write
2018BDA5000
trusted library allocation
page read and write
25B37F47000
trusted library allocation
page read and write
2018A5F5000
trusted library allocation
page read and write
2017FB66000
trusted library allocation
page read and write
68A1000
heap
page read and write
20178749000
heap
page read and write
229ED000
heap
page read and write
20181183000
trusted library allocation
page read and write
11D0000
heap
page read and write
6561000
heap
page read and write
6561000
heap
page read and write
25B4AD1D000
trusted library allocation
page read and write
25B46703000
trusted library allocation
page read and write
229F1000
heap
page read and write
2018AFB4000
trusted library allocation
page read and write
1F84000
heap
page read and write
201786E9000
heap
page read and write
BC2A1FB000
stack
page read and write
6561000
heap
page read and write
20181680000
trusted library allocation
page read and write
25B48703000
trusted library allocation
page read and write
2018B63C000
trusted library allocation
page read and write
2018A7CB000
trusted library allocation
page read and write
2018118D000
trusted library allocation
page read and write
25B47FF5000
trusted library allocation
page read and write
2018AFB0000
trusted library allocation
page read and write
201811E6000
trusted library allocation
page read and write
1E2A000
heap
page read and write
68A1000
heap
page read and write
201810CA000
trusted library allocation
page read and write
4AD0000
trusted library allocation
page read and write
2018ABF0000
trusted library allocation
page read and write
2018BC5F000
trusted library allocation
page read and write
22A09000
heap
page read and write
2018A24B000
trusted library allocation
page read and write
B4D000
heap
page read and write
2017F874000
trusted library allocation
page read and write
201903DC000
trusted library allocation
page read and write
2018BF9C000
trusted library allocation
page read and write
25B3ED52000
heap
page read and write
414000
heap
page read and write
68A1000
heap
page read and write
2018BD6E000
trusted library allocation
page read and write
25B4897D000
trusted library allocation
page read and write
6780000
heap
page read and write
20181848000
trusted library allocation
page read and write
20181861000
trusted library allocation
page read and write
31FF000
stack
page read and write
28AA0000
heap
page read and write
20182CF3000
trusted library allocation
page read and write
201816A3000
trusted library allocation
page read and write
25B47B5F000
trusted library allocation
page read and write
20187EF3000
trusted library allocation
page read and write
20185093000
trusted library allocation
page read and write
3150000
heap
page read and write
25B3ED41000
heap
page read and write
201812AB000
trusted library allocation
page read and write
2018185B000
trusted library allocation
page read and write
BCC000
unkown
page execute and write copy
61ED3000
direct allocation
page read and write
201851F6000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018C86C000
trusted library allocation
page read and write
20178726000
heap
page read and write
59AE000
stack
page read and write
6561000
heap
page read and write
25B49A1B000
trusted library allocation
page read and write
2018A52F000
trusted library allocation
page read and write
6A20000
heap
page read and write
20185179000
trusted library allocation
page read and write
49DF000
stack
page read and write
20178734000
heap
page read and write
2017DEE6000
trusted library allocation
page read and write
2D4F000
stack
page read and write
463E000
stack
page read and write
20180DDB000
trusted library allocation
page read and write
25B451DB000
trusted library allocation
page read and write
5334000
direct allocation
page execute and read and write
20185179000
trusted library allocation
page read and write
20188581000
trusted library allocation
page read and write
201786FF000
heap
page read and write
375F000
stack
page read and write
25B3ED1C000
heap
page read and write
423000
unkown
page readonly
2017870B000
heap
page read and write
2018AC30000
trusted library allocation
page read and write
201806FD000
trusted library allocation
page read and write
2017FCB1000
trusted library allocation
page read and write
2018ACF7000
trusted library allocation
page read and write
25B3ED4A000
heap
page read and write
BC26BFD000
stack
page read and write
2018C2E6000
trusted library allocation
page read and write
1C7DE000
stack
page read and write
20178746000
heap
page read and write
321F000
stack
page read and write
4D81000
heap
page read and write
579F000
stack
page read and write
4D9F000
stack
page read and write
25B44579000
trusted library allocation
page read and write
201850F5000
trusted library allocation
page read and write
2018A7F7000
trusted library allocation
page read and write
2018AC5C000
trusted library allocation
page read and write
25B4F280000
trusted library allocation
page read and write
5040000
direct allocation
page execute and read and write
2017D0C8000
trusted library allocation
page read and write
6561000
heap
page read and write
20181895000
trusted library allocation
page read and write
25B486D7000
trusted library allocation
page read and write
13E4000
heap
page read and write
2E8E000
stack
page read and write
2017FE4E000
trusted library allocation
page read and write
25B44126000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018BA4A000
trusted library allocation
page read and write
2017E5A9000
trusted library allocation
page read and write
201881E9000
trusted library allocation
page read and write
24BC000
heap
page read and write
414000
heap
page read and write
2018BFBB000
trusted library allocation
page read and write
2018A50A000
trusted library allocation
page read and write
25B50F4D000
trusted library allocation
page read and write
2018BFC3000
trusted library allocation
page read and write
13E4000
heap
page read and write
201838CE000
trusted library allocation
page read and write
2018CAA2000
trusted library allocation
page read and write
25B47F4F000
trusted library allocation
page read and write
201786F5000
heap
page read and write
2018BCCB000
trusted library allocation
page read and write
53B0000
direct allocation
page execute and read and write
436E000
stack
page read and write
49F0000
direct allocation
page execute and read and write
2018BF65000
trusted library allocation
page read and write
400000
unkown
page readonly
5040000
direct allocation
page execute and read and write
25B4DD14000
trusted library allocation
page read and write
20187E00000
trusted library allocation
page read and write
4C4000
unkown
page execute and read and write
201881B5000
trusted library allocation
page read and write
20178726000
heap
page read and write
3A6F000
stack
page read and write
19FF000
stack
page read and write
25B4F273000
trusted library allocation
page read and write
6561000
heap
page read and write
486E000
stack
page read and write
2018CD6B000
trusted library allocation
page read and write
201786EF000
heap
page read and write
465F000
stack
page read and write
25B485C3000
trusted library allocation
page read and write
6561000
heap
page read and write
6561000
heap
page read and write
20187EA0000
trusted library allocation
page read and write
25B4AEAC000
trusted library allocation
page read and write
2018C800000
trusted library allocation
page read and write
25B3ED4A000
heap
page read and write
68A1000
heap
page read and write
25DAECA5000
trusted library allocation
page read and write
25B457D0000
heap
page read and write
6561000
heap
page read and write
28E1000
heap
page read and write
201811E1000
trusted library allocation
page read and write
20178742000
heap
page read and write
321F000
stack
page read and write
20188174000
trusted library allocation
page read and write
201801E1000
trusted library allocation
page read and write
2017FCB1000
trusted library allocation
page read and write
25B450E0000
trusted library section
page readonly
1E076290000
heap
page read and write
440E000
stack
page read and write
68A1000
heap
page read and write
2018ACDD000
trusted library allocation
page read and write
20178722000
heap
page read and write
20182DC5000
trusted library allocation
page read and write
2018BAE3000
trusted library allocation
page read and write
25B45A1F000
heap
page read and write
20187EFA000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018C633000
trusted library allocation
page read and write
25B441FE000
trusted library allocation
page read and write
229D0000
heap
page read and write
25B4ADFC000
trusted library allocation
page read and write
20181167000
trusted library allocation
page read and write
20181020000
trusted library allocation
page read and write
2018BCB2000
trusted library allocation
page read and write
2018BFBC000
trusted library allocation
page read and write
2017FCAF000
trusted library allocation
page read and write
25B453A3000
trusted library allocation
page read and write
25B3ED1C000
heap
page read and write
49C0000
direct allocation
page execute and read and write
25B48057000
trusted library allocation
page read and write
20178724000
heap
page read and write
2018BA3C000
trusted library allocation
page read and write
68A1000
heap
page read and write
2017872A000
heap
page read and write
6780000
heap
page read and write
25B50030000
trusted library allocation
page read and write
25DAEB00000
trusted library allocation
page read and write
6561000
heap
page read and write
20187E4C000
trusted library allocation
page read and write
2018BFD7000
trusted library allocation
page read and write
2017FB2A000
trusted library allocation
page read and write
68A1000
heap
page read and write
68A1000
heap
page read and write
68A1000
heap
page read and write
25B438AB000
trusted library allocation
page read and write
20182AD5000
trusted library allocation
page read and write
2017FBD8000
trusted library allocation
page read and write
201881C8000
trusted library allocation
page read and write
20189B45000
trusted library allocation
page read and write
25B4455F000
trusted library allocation
page read and write
1430000
direct allocation
page read and write
25C7000
heap
page read and write
2018A7E0000
trusted library allocation
page read and write
19E000
stack
page read and write
6561000
heap
page read and write
201851B3000
trusted library allocation
page read and write
4D81000
heap
page read and write
25B47F94000
trusted library allocation
page read and write
2018ACE5000
trusted library allocation
page read and write
BB5000
unkown
page execute and read and write
201806F9000
trusted library allocation
page read and write
6561000
heap
page read and write
2018A533000
trusted library allocation
page read and write
2017E5BE000
trusted library allocation
page read and write
4DC0000
heap
page read and write
6561000
heap
page read and write
704000
heap
page read and write
2018A5A8000
trusted library allocation
page read and write
201786E7000
heap
page read and write
201851FA000
trusted library allocation
page read and write
25B44598000
trusted library allocation
page read and write
414000
heap
page read and write
20187E80000
trusted library allocation
page read and write
201811D7000
trusted library allocation
page read and write
2018BBF3000
trusted library allocation
page read and write
20178745000
heap
page read and write
2017FE8D000
trusted library allocation
page read and write
2018C5B9000
trusted library allocation
page read and write
25B482F6000
trusted library allocation
page read and write
4A1F000
stack
page read and write
6A2F000
stack
page read and write
2018BC3F000
trusted library allocation
page read and write
25B48027000
trusted library allocation
page read and write
388F000
stack
page read and write
B4E000
heap
page read and write
6561000
heap
page read and write
25B492AF000
trusted library allocation
page read and write
201851FB000
trusted library allocation
page read and write
6561000
heap
page read and write
2017FC58000
trusted library allocation
page read and write
227A91B1000
trusted library allocation
page execute read
25B43786000
trusted library allocation
page read and write
2017FEF7000
trusted library allocation
page read and write
20189BAC000
trusted library allocation
page read and write
2018183D000
trusted library allocation
page read and write
281F000
stack
page read and write
4D81000
heap
page read and write
13E4000
heap
page read and write
201811A8000
trusted library allocation
page read and write
201786FD000
heap
page read and write
201786F9000
heap
page read and write
2018BAF7000
trusted library allocation
page read and write
25B435E2000
unclassified section
page read and write
201816BD000
trusted library allocation
page read and write
229DA000
heap
page read and write
5240000
direct allocation
page execute and read and write
2018AFFC000
trusted library allocation
page read and write
20189CAD000
trusted library allocation
page read and write
2302000
heap
page read and write
414000
heap
page read and write
6561000
heap
page read and write
300E000
stack
page read and write
25B48B33000
trusted library allocation
page read and write
2018BA74000
trusted library allocation
page read and write
25B50C6B000
trusted library allocation
page read and write
6561000
heap
page read and write
201881C0000
trusted library allocation
page read and write
51D0000
heap
page read and write
68A1000
heap
page read and write
2018A7F7000
trusted library allocation
page read and write
2755000
heap
page read and write
28B02000
heap
page read and write
15C0000
direct allocation
page read and write
5040000
direct allocation
page execute and read and write
68A1000
heap
page read and write
2018136C000
trusted library allocation
page read and write
4D81000
heap
page read and write
25B4922E000
trusted library allocation
page read and write
4100000
heap
page read and write
68A1000
heap
page read and write
387E000
stack
page read and write
BC25BFE000
stack
page read and write
25B435E0000
unclassified section
page read and write
69A0000
trusted library allocation
page read and write
212DED31000
heap
page read and write
2018A5AC000
trusted library allocation
page read and write
269F000
stack
page read and write
201885DD000
trusted library allocation
page read and write
244C000
unkown
page readonly
472E000
stack
page read and write
25B4C20C000
trusted library allocation
page read and write
52AB000
stack
page read and write
2018511E000
trusted library allocation
page read and write
20189CED000
trusted library allocation
page read and write
2017D426000
trusted library allocation
page read and write
20178740000
heap
page read and write
25B46208000
trusted library allocation
page read and write
25B49A4E000
trusted library allocation
page read and write
201786F5000
heap
page read and write
397F000
stack
page read and write
20182AD3000
trusted library allocation
page read and write
201801BE000
trusted library allocation
page read and write
229F7000
heap
page read and write
68A1000
heap
page read and write
25B3ED2A000
heap
page read and write
2017872F000
heap
page read and write
13E0000
direct allocation
page read and write
6E3F878000
stack
page read and write
25B47E24000
trusted library allocation
page read and write
2018819E000
trusted library allocation
page read and write
5000000
direct allocation
page execute and read and write
6561000
heap
page read and write
20181874000
trusted library allocation
page read and write
229EE000
heap
page read and write
20187E84000
trusted library allocation
page read and write
25B49700000
trusted library allocation
page read and write
2018BB66000
trusted library allocation
page read and write
BBA000
heap
page read and write
2017D4EA000
trusted library allocation
page read and write
237432A1000
trusted library allocation
page read and write
20189AED000
trusted library allocation
page read and write
22A12000
heap
page read and write
20187E36000
trusted library allocation
page read and write
413E000
stack
page read and write
68A1000
heap
page read and write
2018AC11000
trusted library allocation
page read and write
53F0000
direct allocation
page execute and read and write
25B48A03000
trusted library allocation
page read and write
25B440FE000
trusted library allocation
page read and write
2017D9E6000
trusted library allocation
page read and write
20187E93000
trusted library allocation
page read and write
201811A5000
trusted library allocation
page read and write
25B48B6D000
trusted library allocation
page read and write
6561000
heap
page read and write
25B45377000
trusted library allocation
page read and write
5349000
direct allocation
page execute and read and write
201851B1000
trusted library allocation
page read and write
25B49A72000
trusted library allocation
page read and write
25B45103000
trusted library allocation
page read and write
13E4000
heap
page read and write
4D81000
heap
page read and write
415000
heap
page read and write
414000
heap
page read and write
53F0000
direct allocation
page execute and read and write
201818E7000
trusted library allocation
page read and write
2F6E000
stack
page read and write
25B48803000
trusted library allocation
page read and write
2018B9FB000
trusted library allocation
page read and write
2018015A000
trusted library allocation
page read and write
2018A2C1000
trusted library allocation
page read and write
68A1000
heap
page read and write
1F90000
direct allocation
page execute and read and write
4180000
heap
page read and write
2018BF74000
trusted library allocation
page read and write
2017FE71000
trusted library allocation
page read and write
3C5E000
stack
page read and write
414000
heap
page read and write
68A1000
heap
page read and write
25B48968000
trusted library allocation
page read and write
53F0000
direct allocation
page execute and read and write
201810B7000
trusted library allocation
page read and write
704000
heap
page read and write
25B489E9000
trusted library allocation
page read and write
388E000
stack
page read and write
201812C3000
trusted library allocation
page read and write
2018C820000
trusted library allocation
page read and write
25B3ED2A000
heap
page read and write
D55000
unkown
page execute and read and write
201811A5000
trusted library allocation
page read and write
25B480E4000
trusted library allocation
page read and write
719000
unkown
page write copy
201813A7000
trusted library allocation
page read and write
769E000
stack
page read and write
6B0000
unkown
page readonly
BB5000
unkown
page execute and read and write
25B51A21000
trusted library allocation
page read and write
25B46322000
trusted library allocation
page read and write
2017E5C8000
trusted library allocation
page read and write
1CA1F000
stack
page read and write
2017E5AC000
trusted library allocation
page read and write
25B4995C000
trusted library allocation
page read and write
229E5000
heap
page read and write
414000
heap
page read and write
2018506D000
trusted library allocation
page read and write
BC27BFC000
stack
page read and write
2018117C000
trusted library allocation
page read and write
20181895000
trusted library allocation
page read and write
25B49680000
trusted library allocation
page read and write
2017F897000
trusted library allocation
page read and write
2017DE9E000
trusted library allocation
page read and write
2018B673000
trusted library allocation
page read and write
414000
heap
page read and write
25B50FEF000
trusted library allocation
page read and write
2018C813000
trusted library allocation
page read and write
25B47F3F000
trusted library allocation
page read and write
2018ACB6000
trusted library allocation
page read and write
5261000
direct allocation
page read and write
25B4D814000
trusted library allocation
page read and write
13E4000
heap
page read and write
870000
heap
page read and write
20190399000
trusted library allocation
page read and write
25B50EF8000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B3ED35000
heap
page read and write
2018A6BA000
trusted library allocation
page read and write
BC2BDFF000
stack
page read and write
4D81000
heap
page read and write
2018C54D000
trusted library allocation
page read and write
25B48051000
trusted library allocation
page read and write
2017F87B000
trusted library allocation
page read and write
201851EA000
trusted library allocation
page read and write
25B49381000
trusted library allocation
page read and write
310E000
stack
page read and write
201786E3000
heap
page read and write
2018116B000
trusted library allocation
page read and write
2017873C000
heap
page read and write
20187DF8000
trusted library allocation
page read and write
2017F8EF000
trusted library allocation
page read and write
6561000
heap
page read and write
D55000
unkown
page execute and read and write
25DAEC47000
trusted library allocation
page read and write
201786E1000
heap
page read and write
6561000
heap
page read and write
475F000
stack
page read and write
25B452E4000
trusted library allocation
page read and write
5A9E000
stack
page read and write
2017E1AE000
trusted library allocation
page read and write
919000
unkown
page read and write
23743356000
heap
page read and write
25B43603000
trusted library allocation
page read and write
25B485F3000
trusted library allocation
page read and write
201786FB000
heap
page read and write
68A1000
heap
page read and write
1AC8000
heap
page read and write
229E8000
heap
page read and write
25B3ED1D000
heap
page read and write
63E000
unkown
page execute and read and write
3FBF000
stack
page read and write
201881FA000
trusted library allocation
page read and write
2018BC17000
trusted library allocation
page read and write
68A1000
heap
page read and write
5410000
direct allocation
page execute and read and write
2017872A000
heap
page read and write
25B4898E000
trusted library allocation
page read and write
20178782000
heap
page read and write
6561000
heap
page read and write
25B45100000
trusted library allocation
page read and write
2018C24A000
trusted library allocation
page read and write
13E4000
heap
page read and write
1CE5000
heap
page read and write
325E000
stack
page read and write
2018A2A3000
trusted library allocation
page read and write
404D000
stack
page read and write
2018519E000
trusted library allocation
page read and write
6561000
heap
page read and write
4DF1000
heap
page read and write
68A1000
heap
page read and write
201838A1000
trusted library allocation
page read and write
25B480F8000
trusted library allocation
page read and write
201786FC000
heap
page read and write
51B0000
heap
page read and write
2018BFD9000
trusted library allocation
page read and write
23742EA0000
remote allocation
page read and write
2018ABC0000
trusted library allocation
page read and write
25B49506000
trusted library allocation
page read and write
2018BDD3000
trusted library allocation
page read and write
2018A5E9000
trusted library allocation
page read and write
2017872E000
heap
page read and write
25B47B61000
trusted library allocation
page read and write
25B3ED26000
heap
page read and write
20178724000
heap
page read and write
2017FBD0000
trusted library allocation
page read and write
2017E553000
trusted library allocation
page read and write
201851DE000
trusted library allocation
page read and write
2018AF82000
trusted library allocation
page read and write
6560000
heap
page read and write
25B48013000
trusted library allocation
page read and write
2018C215000
trusted library allocation
page read and write
25B438F2000
trusted library allocation
page read and write
20178704000
heap
page read and write
414000
heap
page read and write
229F3000
heap
page read and write
2017D913000
trusted library allocation
page read and write
6561000
heap
page read and write
20190357000
trusted library allocation
page read and write
6561000
heap
page read and write
25B4818E000
trusted library allocation
page read and write
201813B8000
trusted library allocation
page read and write
704000
heap
page read and write
2017FC6A000
trusted library allocation
page read and write
20178734000
heap
page read and write
5D2000
unkown
page execute and read and write
2018189B000
trusted library allocation
page read and write
2018812B000
trusted library allocation
page read and write
855000
unkown
page execute and write copy
201881E1000
trusted library allocation
page read and write
2018163A000
trusted library allocation
page read and write
B85000
unkown
page execute and read and write
52F0000
direct allocation
page execute and read and write
20183764000
trusted library allocation
page read and write
4D81000
heap
page read and write
BC2A9FD000
stack
page read and write
201818B0000
trusted library allocation
page read and write
68A1000
heap
page read and write
2017D4E2000
trusted library allocation
page read and write
25B50FEA000
trusted library allocation
page read and write
201903DA000
trusted library allocation
page read and write
68A1000
heap
page read and write
20181637000
trusted library allocation
page read and write
20189EE3000
trusted library allocation
page read and write
1B13000
heap
page read and write
414000
heap
page read and write
1E077E25000
heap
page read and write
4D81000
heap
page read and write
68A1000
heap
page read and write
1525000
heap
page read and write
25DAEC7B000
trusted library allocation
page read and write
229F7000
heap
page read and write
2017F95A000
trusted library allocation
page read and write
20185159000
trusted library allocation
page read and write
BCC000
unkown
page execute and write copy
1DCE000
stack
page read and write
25B3ED27000
heap
page read and write
383F000
stack
page read and write
20178734000
heap
page read and write
332E000
stack
page read and write
25B47F4B000
trusted library allocation
page read and write
13E4000
heap
page read and write
25B44800000
unkown
page readonly
6561000
heap
page read and write
25B48588000
trusted library allocation
page read and write
13E4000
heap
page read and write
2017F877000
trusted library allocation
page read and write
2018CDD4000
trusted library allocation
page read and write
201902F0000
trusted library allocation
page read and write
20182D41000
trusted library allocation
page read and write
20178722000
heap
page read and write
27ED000
heap
page read and write
2115000
heap
page read and write
85D000
unkown
page readonly
B34000
heap
page read and write
2017FC44000
trusted library allocation
page read and write
2018B9CC000
trusted library allocation
page read and write
20181613000
trusted library allocation
page read and write
50C0000
direct allocation
page execute and read and write
25B48074000
trusted library allocation
page read and write
2017875E000
heap
page read and write
201786DD000
heap
page read and write
25B43812000
trusted library allocation
page read and write
2018BFC0000
trusted library allocation
page read and write
1F84000
heap
page read and write
201818BB000
trusted library allocation
page read and write
6561000
heap
page read and write
68A1000
heap
page read and write
2018BA36000
trusted library allocation
page read and write
A80000
unkown
page readonly
1120000
heap
page read and write
25B3ED2A000
heap
page read and write
68A0000
heap
page read and write
2017E5F4000
trusted library allocation
page read and write
4143000
heap
page read and write
2017D41E000
trusted library allocation
page read and write
2018A6E9000
trusted library allocation
page read and write
2018117C000
trusted library allocation
page read and write
1ADD5FE000
stack
page read and write
2018BB66000
trusted library allocation
page read and write
2018AFBB000
trusted library allocation
page read and write
414000
heap
page read and write
4F79000
direct allocation
page execute and read and write
25B48C03000
trusted library allocation
page read and write
201786E7000
heap
page read and write
2018AB20000
trusted library allocation
page read and write
2018129D000
trusted library allocation
page read and write
4D81000
heap
page read and write
2017E1DF000
trusted library allocation
page read and write
201816B8000
trusted library allocation
page read and write
2017874A000
heap
page read and write
25B50C7C000
trusted library allocation
page read and write
2018BA3E000
trusted library allocation
page read and write
2018BCCB000
trusted library allocation
page read and write
2017FEEA000
trusted library allocation
page read and write
28FB03900000
trusted library allocation
page read and write
2018103F000
trusted library allocation
page read and write
2018BF49000
trusted library allocation
page read and write
6561000
heap
page read and write
13E4000
heap
page read and write
257A000
heap
page read and write
692E000
stack
page read and write
68A1000
heap
page read and write
201837F0000
trusted library allocation
page read and write
25B48112000
trusted library allocation
page read and write
2018AFA5000
trusted library allocation
page read and write
451E000
stack
page read and write
201786E1000
heap
page read and write
570000
unkown
page read and write
AABE17B000
stack
page read and write
2FDE000
stack
page read and write
2018A5FD000
trusted library allocation
page read and write
20181605000
trusted library allocation
page read and write
25B487F1000
trusted library allocation
page read and write
4CDE000
stack
page read and write
201811D7000
trusted library allocation
page read and write
2018A7EE000
trusted library allocation
page read and write
20178734000
heap
page read and write
2018BBE0000
trusted library allocation
page read and write
25B47F4B000
trusted library allocation
page read and write
68A1000
heap
page read and write
201816AD000
trusted library allocation
page read and write
20183A4A000
trusted library allocation
page read and write
6561000
heap
page read and write
2018A2C1000
trusted library allocation
page read and write
2229000
heap
page read and write
201810AA000
trusted library allocation
page read and write
162B000
heap
page read and write
2018AFF0000
trusted library allocation
page read and write
229FD000
heap
page read and write
2018188E000
trusted library allocation
page read and write
2017870E000
heap
page read and write
201809D7000
trusted library allocation
page read and write
4BF1000
heap
page read and write
2017DEB9000
trusted library allocation
page read and write
2017FEF7000
trusted library allocation
page read and write
25B43678000
trusted library allocation
page read and write
25B3ED21000
heap
page read and write
4D81000
heap
page read and write
160640E0000
heap
page read and write
2017870E000
heap
page read and write
20180135000
trusted library allocation
page read and write
450000
heap
page read and write
346E000
stack
page read and write
25B4DD2A000
trusted library allocation
page read and write
20189ADD000
trusted library allocation
page read and write
25B3ED0F000
heap
page read and write
25B4AE03000
trusted library allocation
page read and write
2017FC5F000
trusted library allocation
page read and write
414000
heap
page read and write
2018A24B000
trusted library allocation
page read and write
25B39CAD000
heap
page read and write
2018A5E5000
trusted library allocation
page read and write
25B47D5A000
trusted library allocation
page read and write
3E2F000
stack
page read and write
2018119C000
trusted library allocation
page read and write
13E4000
heap
page read and write
414000
heap
page read and write
25B4809C000
trusted library allocation
page read and write
2017F8CA000
trusted library allocation
page read and write
2018BD47000
trusted library allocation
page read and write
2018AFB9000
trusted library allocation
page read and write
6E3EFFE000
stack
page read and write
201786DD000
heap
page read and write
145F000
stack
page read and write
25B3ED15000
heap
page read and write
2018AF24000
trusted library allocation
page read and write
311E000
stack
page read and write
2018BC75000
trusted library allocation
page read and write
68A1000
heap
page read and write
2017DCF8000
trusted library allocation
page read and write
2018C332000
trusted library allocation
page read and write
201786EB000
heap
page read and write
5260000
direct allocation
page read and write
2018117E000
trusted library allocation
page read and write
25B3ED15000
heap
page read and write
20188639000
trusted library allocation
page read and write
201786E7000
heap
page read and write
3B1E000
stack
page read and write
337E000
stack
page read and write
2018B600000
trusted library allocation
page read and write
25B39BFA000
heap
page read and write
201786F5000
heap
page read and write
13FB000
heap
page read and write
20188131000
trusted library allocation
page read and write
68A1000
heap
page read and write
6561000
heap
page read and write
4990000
direct allocation
page execute and read and write
23743092000
unclassified section
page read and write
2018BCAC000
trusted library allocation
page read and write
2017FE17000
trusted library allocation
page read and write
25B4809C000
trusted library allocation
page read and write
20178734000
heap
page read and write
2018AF52000
trusted library allocation
page read and write
379E000
stack
page read and write
2018C2C5000
trusted library allocation
page read and write
25B3ED50000
heap
page read and write
2018134D000
trusted library allocation
page read and write
414000
heap
page read and write
5349000
direct allocation
page execute and read and write
2017D477000
trusted library allocation
page read and write
25B47F48000
trusted library allocation
page read and write
254A000
heap
page read and write
201851D1000
trusted library allocation
page read and write
25D47C00000
trusted library section
page readonly
2018A7C3000
trusted library allocation
page read and write
20189B20000
trusted library allocation
page read and write
2017DEA9000
trusted library allocation
page read and write
25B48A01000
trusted library allocation
page read and write
229F4000
heap
page read and write
201786E7000
heap
page read and write
6561000
heap
page read and write
6561000
heap
page read and write
2018AC7C000
trusted library allocation
page read and write
20178734000
heap
page read and write
2018BFC3000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B48822000
trusted library allocation
page read and write
25B39BEA000
heap
page read and write
201838FB000
trusted library allocation
page read and write
3EDE000
stack
page read and write
25B48B44000
trusted library allocation
page read and write
68A1000
heap
page read and write
13E4000
heap
page read and write
16AB000
heap
page read and write
AF0000
heap
page read and write
1FED000
heap
page read and write
AE0000
direct allocation
page read and write
229F7000
heap
page read and write
401000
unkown
page execute read
2018BC1D000
trusted library allocation
page read and write
1545C4B04000
trusted library allocation
page read and write
20178734000
heap
page read and write
201881A1000
trusted library allocation
page read and write
25B499A7000
trusted library allocation
page read and write
5D9000
unkown
page write copy
68A1000
heap
page read and write
4A10000
heap
page read and write
25B4F238000
trusted library allocation
page read and write
6561000
heap
page read and write
414000
heap
page read and write
1C630000
heap
page read and write
2530000
heap
page read and write
25B482B4000
trusted library allocation
page read and write
2018CE7D000
trusted library allocation
page read and write
20178734000
heap
page read and write
6561000
heap
page read and write
20189CBB000
trusted library allocation
page read and write
5E9E000
stack
page read and write
4FD0000
direct allocation
page execute and read and write
13E4000
heap
page read and write
2018C292000
trusted library allocation
page read and write
6561000
heap
page read and write
2018132A000
trusted library allocation
page read and write
25B4367E000
trusted library allocation
page read and write
20178734000
heap
page read and write
2017E5C7000
trusted library allocation
page read and write
414000
heap
page read and write
6770000
heap
page read and write
25B49203000
trusted library allocation
page read and write
2018113C000
trusted library allocation
page read and write
BC2783C000
stack
page read and write
6561000
heap
page read and write
20181243000
trusted library allocation
page read and write
25B4A66F000
trusted library allocation
page read and write
25B492FA000
trusted library allocation
page read and write
25B4AE89000
trusted library allocation
page read and write
22EA000
heap
page read and write
25B47BF2000
trusted library allocation
page read and write
5410000
direct allocation
page execute and read and write
1ADCDFE000
stack
page read and write
2018A7F2000
trusted library allocation
page read and write
85D000
unkown
page readonly
4D81000
heap
page read and write
6561000
heap
page read and write
350B1000
heap
page read and write
423000
unkown
page readonly
201786FD000
heap
page read and write
201786FF000
heap
page read and write
25B3ED0F000
heap
page read and write
136F000
stack
page read and write
2017FEF7000
trusted library allocation
page read and write
20178741000
heap
page read and write
6561000
heap
page read and write
25B49AA1000
trusted library allocation
page read and write
4D81000
heap
page read and write
229F3000
heap
page read and write
12F4000
heap
page read and write
25B4FD00000
trusted library allocation
page read and write
2017872F000
heap
page read and write
2FFE000
stack
page read and write
201816AF000
trusted library allocation
page read and write
201885CB000
trusted library allocation
page read and write
2018BC56000
trusted library allocation
page read and write
2017FEAD000
trusted library allocation
page read and write
2018A579000
trusted library allocation
page read and write
25B48D19000
trusted library allocation
page read and write
201851D5000
trusted library allocation
page read and write
201881E1000
trusted library allocation
page read and write
20178734000
heap
page read and write
2018BC00000
trusted library allocation
page read and write
25B488F4000
trusted library allocation
page read and write
25B453CE000
trusted library allocation
page read and write
4090000
direct allocation
page execute and read and write
419E000
stack
page read and write
25B48037000
trusted library allocation
page read and write
2017E5F2000
trusted library allocation
page read and write
201786E2000
heap
page read and write
201786E0000
heap
page read and write
1545C4B2D000
trusted library allocation
page read and write
2018857A000
trusted library allocation
page read and write
2EDF8000
heap
page read and write
4DC1000
heap
page read and write
13E4000
heap
page read and write
25B486C5000
trusted library allocation
page read and write
201786E1000
heap
page read and write
25B437AD000
trusted library allocation
page read and write
25B45503000
trusted library allocation
page read and write
229F7000
heap
page read and write
68A1000
heap
page read and write
25B48097000
trusted library allocation
page read and write
9B8000
unkown
page execute and read and write
2018C658000
trusted library allocation
page read and write
53E0000
direct allocation
page execute and read and write
451E000
stack
page read and write
5DB000
unkown
page execute and read and write
25B48B17000
trusted library allocation
page read and write
2017872F000
heap
page read and write
68A1000
heap
page read and write
13E4000
heap
page read and write
428F000
stack
page read and write
6561000
heap
page read and write
201786FD000
heap
page read and write
201786E1000
heap
page read and write
25B48057000
trusted library allocation
page read and write
2018BADA000
trusted library allocation
page read and write
201837E8000
trusted library allocation
page read and write
5323000
direct allocation
page execute and read and write
25B49100000
trusted library allocation
page read and write
13E4000
heap
page read and write
25B4840D000
unclassified section
page read and write
25B47F67000
trusted library allocation
page read and write
2018C24A000
trusted library allocation
page read and write
2017D9A1000
trusted library allocation
page read and write
201810DA000
trusted library allocation
page read and write
201786E7000
heap
page read and write
20185177000
trusted library allocation
page read and write
2018A28D000
trusted library allocation
page read and write
25B48AF5000
trusted library allocation
page read and write
2018819E000
trusted library allocation
page read and write
2018BC52000
trusted library allocation
page read and write
20178726000
heap
page read and write
2018CA74000
trusted library allocation
page read and write
20187FAF000
trusted library allocation
page read and write
2017E5F2000
trusted library allocation
page read and write
201813B5000
trusted library allocation
page read and write
2017DEF6000
trusted library allocation
page read and write
25B3ED50000
heap
page read and write
25B4AE98000
trusted library allocation
page read and write
BA6000
heap
page read and write
4D81000
heap
page read and write
25B48B4A000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018C62E000
trusted library allocation
page read and write
25B4804F000
trusted library allocation
page read and write
206A000
heap
page read and write
6561000
heap
page read and write
2018BC17000
trusted library allocation
page read and write
20187E84000
trusted library allocation
page read and write
2018182A000
trusted library allocation
page read and write
20180961000
trusted library allocation
page read and write
25B47B33000
trusted library allocation
page read and write
7CC000
unkown
page execute and write copy
68A1000
heap
page read and write
20188800000
trusted library allocation
page read and write
2018A24D000
trusted library allocation
page read and write
20181851000
trusted library allocation
page read and write
25B3ED40000
heap
page read and write
25B50EC4000
trusted library allocation
page read and write
25B482FC000
trusted library allocation
page read and write
43A0000
heap
page read and write
523B000
stack
page read and write
2018A5A8000
trusted library allocation
page read and write
25B4448C000
trusted library allocation
page read and write
6561000
heap
page read and write
2018AF4C000
trusted library allocation
page read and write
25DAECE7000
trusted library allocation
page read and write
201811A2000
trusted library allocation
page read and write
2018ABF8000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B4AD76000
trusted library allocation
page read and write
20182DD5000
trusted library allocation
page read and write
20178726000
heap
page read and write
2018B9D8000
trusted library allocation
page read and write
2D3F000
stack
page read and write
4D81000
heap
page read and write
68A1000
heap
page read and write
201786E3000
heap
page read and write
25B49A03000
trusted library allocation
page read and write
25B4527B000
trusted library allocation
page read and write
201813FD000
trusted library allocation
page read and write
22A12000
heap
page read and write
13E4000
heap
page read and write
68A1000
heap
page read and write
4AAF000
stack
page read and write
382E000
stack
page read and write
201786FD000
heap
page read and write
2018A6D0000
trusted library allocation
page read and write
20178734000
heap
page read and write
25B47F6F000
trusted library allocation
page read and write
25B48238000
trusted library allocation
page read and write
25B480DE000
trusted library allocation
page read and write
25B4C226000
trusted library allocation
page read and write
201786FC000
heap
page read and write
3F8E000
stack
page read and write
2018A5F6000
trusted library allocation
page read and write
2018A2E1000
trusted library allocation
page read and write
25B3ED21000
heap
page read and write
804000
unkown
page execute and write copy
25B44500000
trusted library allocation
page read and write
22A07000
heap
page read and write
2017D4E2000
trusted library allocation
page read and write
25B4910A000
trusted library allocation
page read and write
419E000
stack
page read and write
414000
heap
page read and write
6561000
heap
page read and write
374E000
stack
page read and write
2018134D000
trusted library allocation
page read and write
2018BC0E000
trusted library allocation
page read and write
6561000
heap
page read and write
2017DEBB000
trusted library allocation
page read and write
2E4F000
stack
page read and write
25B49ADC000
trusted library allocation
page read and write
25B45F00000
trusted library allocation
page read and write
2017DE84000
trusted library allocation
page read and write
20187EC3000
trusted library allocation
page read and write
1ADBDFA000
stack
page read and write
4DE1000
heap
page read and write
25B4804F000
trusted library allocation
page read and write
6561000
heap
page read and write
201786FD000
heap
page read and write
20190341000
trusted library allocation
page read and write
414000
heap
page read and write
2018AF50000
trusted library allocation
page read and write
2CD0000
direct allocation
page read and write
2018C2F0000
trusted library allocation
page read and write
2017E5EA000
trusted library allocation
page read and write
2018AF9C000
trusted library allocation
page read and write
20182AD4000
trusted library allocation
page read and write
201851B0000
trusted library allocation
page read and write
201818E9000
trusted library allocation
page read and write
2018A6B3000
trusted library allocation
page read and write
2018C86C000
trusted library allocation
page read and write
2018BD59000
trusted library allocation
page read and write
2017E5EC000
trusted library allocation
page read and write
23CC000
heap
page read and write
2018187E000
trusted library allocation
page read and write
2017FEC8000
trusted library allocation
page read and write
2018AC7C000
trusted library allocation
page read and write
25B47F4B000
trusted library allocation
page read and write
25B3ED21000
heap
page read and write
2018BC77000
trusted library allocation
page read and write
2018BAFC000
trusted library allocation
page read and write
20189A18000
trusted library allocation
page read and write
666C000
stack
page read and write
68A1000
heap
page read and write
26C1000
heap
page execute and read and write
6561000
heap
page read and write
2018817B000
trusted library allocation
page read and write
20187DD7000
trusted library allocation
page read and write
415000
heap
page read and write
7E8E000
stack
page read and write
20187E82000
trusted library allocation
page read and write
2018BA5A000
trusted library allocation
page read and write
13E4000
heap
page read and write
2018AB5A000
trusted library allocation
page read and write
13E4000
heap
page read and write
2017FB66000
trusted library allocation
page read and write
20178741000
heap
page read and write
201881C0000
trusted library allocation
page read and write
2018BF3D000
trusted library allocation
page read and write
13E4000
heap
page read and write
25B3ED35000
heap
page read and write
2018C21D000
trusted library allocation
page read and write
25B37BA9000
heap
page read and write
2018BFC0000
trusted library allocation
page read and write
414000
heap
page read and write
5480000
direct allocation
page execute and read and write
25B49738000
trusted library allocation
page read and write
2018018A000
trusted library allocation
page read and write
201786F3000
heap
page read and write
5270000
direct allocation
page execute and read and write
22A21000
heap
page read and write
25B4C015000
trusted library allocation
page read and write
5400000
direct allocation
page execute and read and write
13E4000
heap
page read and write
20178723000
heap
page read and write
201837CB000
trusted library allocation
page read and write
2017E1DF000
trusted library allocation
page read and write
25B480EA000
trusted library allocation
page read and write
2018BC56000
trusted library allocation
page read and write
201786F5000
heap
page read and write
558B000
stack
page read and write
44FE000
stack
page read and write
4A11000
heap
page read and write
5460000
direct allocation
page execute and read and write
1DEC3981000
trusted library allocation
page execute read
34DE000
stack
page read and write
6561000
heap
page read and write
201818EB000
trusted library allocation
page read and write
1625000
heap
page read and write
2018188F000
trusted library allocation
page read and write
20178726000
heap
page read and write
839E000
stack
page read and write
2017E5A9000
trusted library allocation
page read and write
20181851000
trusted library allocation
page read and write
2017FBD8000
trusted library allocation
page read and write
25B48040000
trusted library allocation
page read and write
25B47E7F000
trusted library allocation
page read and write
2017FC94000
trusted library allocation
page read and write
569E000
stack
page read and write
6561000
heap
page read and write
2018C867000
trusted library allocation
page read and write
2018A5F6000
trusted library allocation
page read and write
20178734000
heap
page read and write
2018C9D4000
trusted library allocation
page read and write
881000
unkown
page execute and read and write
229E9000
heap
page read and write
2018BCB2000
trusted library allocation
page read and write
68A1000
heap
page read and write
1F84000
heap
page read and write
25B48236000
trusted library allocation
page read and write
2018ABF8000
trusted library allocation
page read and write
13E4000
heap
page read and write
2018BF6C000
trusted library allocation
page read and write
20178722000
heap
page read and write
20178734000
heap
page read and write
52A0000
direct allocation
page execute and read and write
2017DC53000
trusted library allocation
page read and write
25B3ED2A000
heap
page read and write
68A1000
heap
page read and write
25B50F72000
trusted library allocation
page read and write
201786F5000
heap
page read and write
6561000
heap
page read and write
2017E130000
trusted library allocation
page read and write
6561000
heap
page read and write
4D81000
heap
page read and write
25B43634000
trusted library allocation
page read and write
20188129000
trusted library allocation
page read and write
201811C4000
trusted library allocation
page read and write
AA6000
unkown
page execute and read and write
2018A7F2000
trusted library allocation
page read and write
2253000
heap
page read and write
5A385FC000
stack
page read and write
477E000
stack
page read and write
2018BDCF000
trusted library allocation
page read and write
20182D36000
trusted library allocation
page read and write
25B480EC000
trusted library allocation
page read and write
20181822000
trusted library allocation
page read and write
229F7000
heap
page read and write
414000
heap
page read and write
20181064000
trusted library allocation
page read and write
68A1000
heap
page read and write
4D81000
heap
page read and write
2018AC4A000
trusted library allocation
page read and write
25B47F94000
trusted library allocation
page read and write
BBA000
heap
page read and write
2018182A000
trusted library allocation
page read and write
2018BDF8000
trusted library allocation
page read and write
5DEE000
stack
page read and write
25B50C76000
trusted library allocation
page read and write
68A1000
heap
page read and write
13E4000
heap
page read and write
25B3ED21000
heap
page read and write
25B47F94000
trusted library allocation
page read and write
201902F8000
trusted library allocation
page read and write
2017FE64000
trusted library allocation
page read and write
2599000
heap
page read and write
25B37A30000
unclassified section
page readonly
201818BE000
trusted library allocation
page read and write
71A0000
heap
page read and write
1C41F000
stack
page read and write
25B52B6C000
trusted library allocation
page read and write
2018129C000
trusted library allocation
page read and write
2018A292000
trusted library allocation
page read and write
855000
unkown
page execute and write copy
20187E93000
trusted library allocation
page read and write
201786F2000
heap
page read and write
68A1000
heap
page read and write
201812C9000
trusted library allocation
page read and write
2018AFC1000
trusted library allocation
page read and write
68A1000
heap
page read and write
201837A8000
trusted library allocation
page read and write
2017873C000
heap
page read and write
2018BA82000
trusted library allocation
page read and write
201812A1000
trusted library allocation
page read and write
25B44117000
trusted library allocation
page read and write
201786EB000
heap
page read and write
2018BC57000
trusted library allocation
page read and write
2018162D000
trusted library allocation
page read and write
9D0000
unkown
page execute and read and write
20178723000
heap
page read and write
2018A649000
trusted library allocation
page read and write
20182A14000
trusted library allocation
page read and write
25B45627000
trusted library allocation
page read and write
2018067A000
trusted library allocation
page read and write
68A1000
heap
page read and write
2017F96D000
trusted library allocation
page read and write
389F000
stack
page read and write
6561000
heap
page read and write
2018118D000
trusted library allocation
page read and write
20183A80000
trusted library allocation
page read and write
2017DC96000
trusted library allocation
page read and write
25B480A1000
trusted library allocation
page read and write
2017872B000
heap
page read and write
25B52B14000
trusted library allocation
page read and write
20178734000
heap
page read and write
13E4000
heap
page read and write
20188542000
trusted library allocation
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
20180DE3000
trusted library allocation
page read and write
BC2CFFE000
stack
page read and write
20187E8B000
trusted library allocation
page read and write
20178726000
heap
page read and write
201786EE000
heap
page read and write
2018BFC0000
trusted library allocation
page read and write
20189C7C000
trusted library allocation
page read and write
20189D23000
trusted library allocation
page read and write
2017F9A7000
trusted library allocation
page read and write
201881FA000
trusted library allocation
page read and write
25B489E0000
trusted library allocation
page read and write
6561000
heap
page read and write
10FD000
stack
page read and write
20178733000
heap
page read and write
20182ADC000
trusted library allocation
page read and write
25B3ED2A000
heap
page read and write
25B4AD78000
trusted library allocation
page read and write
2018A5F6000
trusted library allocation
page read and write
415E000
stack
page read and write
6561000
heap
page read and write
68A1000
heap
page read and write
2017DC73000
trusted library allocation
page read and write
20187E23000
trusted library allocation
page read and write
25B497BE000
trusted library allocation
page read and write
201806E8000
trusted library allocation
page read and write
19E000
stack
page read and write
2017874B000
heap
page read and write
25B3ED15000
heap
page read and write
25B48303000
trusted library allocation
page read and write
25B48420000
trusted library section
page read and write
2018819A000
trusted library allocation
page read and write
13E0000
direct allocation
page read and write
68A1000
heap
page read and write
131F000
stack
page read and write
22A09000
heap
page read and write
25B4A643000
trusted library allocation
page read and write
2018A1C1000
trusted library allocation
page read and write
4D81000
heap
page read and write
68A1000
heap
page read and write
23743278000
trusted library allocation
page read and write
6561000
heap
page read and write
2018A52F000
trusted library allocation
page read and write
25B49070000
trusted library section
page readonly
201886BA000
trusted library allocation
page read and write
201786F5000
heap
page read and write
20187E3D000
trusted library allocation
page read and write
1F6000
heap
page read and write
2514000
heap
page read and write
68A1000
heap
page read and write
1519000
heap
page read and write
68A1000
heap
page read and write
2018C54D000
trusted library allocation
page read and write
414000
heap
page read and write
2018A258000
trusted library allocation
page read and write
414000
heap
page read and write
6561000
heap
page read and write
25B3ED40000
heap
page read and write
201838FB000
trusted library allocation
page read and write
20181B0D000
trusted library allocation
page read and write
2018C224000
trusted library allocation
page read and write
68A1000
heap
page read and write
201851E2000
trusted library allocation
page read and write
1C65F000
stack
page read and write
20185143000
trusted library allocation
page read and write
229F3000
heap
page read and write
2018A6C0000
trusted library allocation
page read and write
44DE000
stack
page read and write
13E4000
heap
page read and write
6561000
heap
page read and write
2017FEF4000
trusted library allocation
page read and write
25B4411E000
trusted library allocation
page read and write
2EC5E000
stack
page read and write
201786E7000
heap
page read and write
2018188E000
trusted library allocation
page read and write
2018AFC5000
trusted library allocation
page read and write
68A1000
heap
page read and write
20187E6C000
trusted library allocation
page read and write
25DAEC10000
trusted library allocation
page read and write
AFA000
heap
page read and write
25DAEC66000
trusted library allocation
page read and write
201880EB000
trusted library allocation
page read and write
2017F8F2000
trusted library allocation
page read and write
2018CE54000
trusted library allocation
page read and write
2018A52C000
trusted library allocation
page read and write
25B3ED0F000
heap
page read and write
2018BC57000
trusted library allocation
page read and write
20182DB9000
trusted library allocation
page read and write
2018811F000
trusted library allocation
page read and write
5C5F000
stack
page read and write
2018A564000
trusted library allocation
page read and write
20178734000
heap
page read and write
25DAE8E0000
remote allocation
page read and write
12F4000
heap
page read and write
FF7000
unkown
page execute and write copy
20178725000
heap
page read and write
25B4AD63000
trusted library allocation
page read and write
25B48B8D000
trusted library allocation
page read and write
B20000
heap
page read and write
227A9221000
trusted library allocation
page execute read
2018C250000
trusted library allocation
page read and write
20188083000
trusted library allocation
page read and write
25B4993C000
trusted library allocation
page read and write
25B438B9000
trusted library allocation
page read and write
2018BFBB000
trusted library allocation
page read and write
201786F5000
heap
page read and write
201881E1000
trusted library allocation
page read and write
20181660000
trusted library allocation
page read and write
3C3E000
stack
page read and write
2017873A000
heap
page read and write
2018BF62000
trusted library allocation
page read and write
20190300000
trusted library allocation
page read and write
4D81000
heap
page read and write
414000
heap
page read and write
2018BC29000
trusted library allocation
page read and write
229E7000
heap
page read and write
5380000
direct allocation
page execute and read and write
FD0000
direct allocation
page read and write
479E000
stack
page read and write
2017DEE4000
trusted library allocation
page read and write
25B484A0000
trusted library section
page readonly
5260000
direct allocation
page read and write
7FC000
unkown
page execute and write copy
201816AD000
trusted library allocation
page read and write
25B47926000
trusted library allocation
page read and write
25B49A05000
trusted library allocation
page read and write
524C000
stack
page read and write
2018BC82000
trusted library allocation
page read and write
2018BC2A000
trusted library allocation
page read and write
6561000
heap
page read and write
25B49AD0000
trusted library allocation
page read and write
13E4000
heap
page read and write
25B482CC000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B45B08000
trusted library allocation
page read and write
20178722000
heap
page read and write
201811D7000
trusted library allocation
page read and write
BC2E5FA000
stack
page read and write
25B482D5000
trusted library allocation
page read and write
25B4889F000
trusted library allocation
page read and write
25B481A4000
trusted library allocation
page read and write
68A1000
heap
page read and write
6561000
heap
page read and write
6561000
heap
page read and write
20178734000
heap
page read and write
2018A22A000
trusted library allocation
page read and write
2017F8ED000
trusted library allocation
page read and write
25B3ED50000
heap
page read and write
20178725000
heap
page read and write
12F4000
heap
page read and write
25B4AE6C000
trusted library allocation
page read and write
6561000
heap
page read and write
25B49838000
trusted library allocation
page read and write
2374343D000
trusted library allocation
page read and write
6561000
heap
page read and write
20178734000
heap
page read and write
2018A543000
trusted library allocation
page read and write
3EBE000
stack
page read and write
6561000
heap
page read and write
13E4000
heap
page read and write
5210000
direct allocation
page execute and read and write
201851C5000
trusted library allocation
page read and write
25B487EE000
trusted library allocation
page read and write
25B482D5000
trusted library allocation
page read and write
20187E5C000
trusted library allocation
page read and write
20189DCC000
trusted library allocation
page read and write
201837BD000
trusted library allocation
page read and write
201881B5000
trusted library allocation
page read and write
BC293FF000
stack
page read and write
20187D8E000
trusted library allocation
page read and write
25B4FC52000
trusted library allocation
page read and write
2017D0CC000
trusted library allocation
page read and write
20188599000
trusted library allocation
page read and write
2018A54E000
trusted library allocation
page read and write
414000
heap
page read and write
25B480A1000
trusted library allocation
page read and write
2017872A000
heap
page read and write
2017D46D000
trusted library allocation
page read and write
68A1000
heap
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
25B4537B000
trusted library allocation
page read and write
2017FB25000
trusted library allocation
page read and write
704000
heap
page read and write
201801E2000
trusted library allocation
page read and write
310F000
stack
page read and write
D6D000
unkown
page execute and write copy
2018BC36000
trusted library allocation
page read and write
4C3F000
stack
page read and write
2018AC60000
trusted library allocation
page read and write
68A1000
heap
page read and write
25DAEE03000
trusted library allocation
page read and write
20178741000
heap
page read and write
2018BBA9000
trusted library allocation
page read and write
25B52B36000
trusted library allocation
page read and write
2018AB56000
trusted library allocation
page read and write
6561000
heap
page read and write
2018A2A3000
trusted library allocation
page read and write
888E000
stack
page read and write
2018BDA5000
trusted library allocation
page read and write
68A1000
heap
page read and write
2017DEDD000
trusted library allocation
page read and write
2018BAAA000
trusted library allocation
page read and write
2017D0EF000
trusted library allocation
page read and write
4F60000
direct allocation
page execute and read and write
1E076660000
heap
page read and write
201786F5000
heap
page read and write
25B45863000
trusted library allocation
page read and write
201881C2000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B47F00000
trusted library allocation
page read and write
25B490A0000
trusted library section
page read and write
201812B7000
trusted library allocation
page read and write
20189AE7000
trusted library allocation
page read and write
201812AC000
trusted library allocation
page read and write
1CA1D000
stack
page read and write
3D9E000
stack
page read and write
25B3ED2A000
heap
page read and write
3B4E000
stack
page read and write
25B4AE5C000
trusted library allocation
page read and write
2018BC50000
trusted library allocation
page read and write
20182D66000
trusted library allocation
page read and write
25B453D7000
trusted library allocation
page read and write
BC2B5FE000
stack
page read and write
25B494B1000
trusted library allocation
page read and write
25B50FEA000
trusted library allocation
page read and write
25B51A1D000
trusted library allocation
page read and write
2018ACAA000
trusted library allocation
page read and write
25B50CDF000
trusted library allocation
page read and write
25B454A6000
trusted library allocation
page read and write
414000
heap
page read and write
20188122000
trusted library allocation
page read and write
2018117B000
trusted library allocation
page read and write
201812F9000
trusted library allocation
page read and write
20187E2D000
trusted library allocation
page read and write
2017D41A000
trusted library allocation
page read and write
6CC7F000
unkown
page write copy
2017E561000
trusted library allocation
page read and write
BC2463D000
stack
page read and write
DEE000
stack
page read and write
20181882000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
2018AFF7000
trusted library allocation
page read and write
6561000
heap
page read and write
6561000
heap
page read and write
25B49421000
trusted library allocation
page read and write
409F000
stack
page read and write
2018A783000
trusted library allocation
page read and write
68A1000
heap
page read and write
6561000
heap
page read and write
201816C6000
trusted library allocation
page read and write
26FD000
heap
page read and write
25B4FCE0000
trusted library allocation
page read and write
53F0000
direct allocation
page execute and read and write
2530000
heap
page read and write
5090000
heap
page read and write
201806F0000
trusted library allocation
page read and write
2017D969000
trusted library allocation
page read and write
20185143000
trusted library allocation
page read and write
6561000
heap
page read and write
25B48051000
trusted library allocation
page read and write
2018BBF7000
trusted library allocation
page read and write
25B4796A000
trusted library allocation
page read and write
25B4A9E4000
trusted library allocation
page read and write
1E077E1D000
heap
page read and write
35BF000
stack
page read and write
201812AC000
trusted library allocation
page read and write
1F00000
heap
page read and write
414000
heap
page read and write
B3A000
heap
page read and write
1430000
direct allocation
page read and write
194000
stack
page read and write
25B3ED52000
heap
page read and write
201881C3000
trusted library allocation
page read and write
2018BF58000
trusted library allocation
page read and write
2018C2E2000
trusted library allocation
page read and write
20181848000
trusted library allocation
page read and write
25B48218000
trusted library allocation
page read and write
25B3ED0F000
heap
page read and write
25DAECA2000
trusted library allocation
page read and write
25B435EF000
unclassified section
page read and write
25B4AEA8000
trusted library allocation
page read and write
25B47EBD000
trusted library allocation
page read and write
237432B3000
trusted library allocation
page read and write
25B49831000
trusted library allocation
page read and write
414000
heap
page read and write
20188154000
trusted library allocation
page read and write
20189A40000
trusted library allocation
page read and write
2018811F000
trusted library allocation
page read and write
2018A5AC000
trusted library allocation
page read and write
2017872F000
heap
page read and write
6561000
heap
page read and write
2018C2E2000
trusted library allocation
page read and write
2017FC5A000
trusted library allocation
page read and write
6561000
heap
page read and write
68A1000
heap
page read and write
20173622000
heap
page read and write
2018A697000
trusted library allocation
page read and write
25B4AC4A000
trusted library allocation
page read and write
201786E0000
heap
page read and write
1C3CF000
stack
page read and write
68A1000
heap
page read and write
201786FD000
heap
page read and write
68A1000
heap
page read and write
68A1000
heap
page read and write
6561000
heap
page read and write
201881C0000
trusted library allocation
page read and write
2017FE64000
trusted library allocation
page read and write
414000
heap
page read and write
20178739000
heap
page read and write
20187E3C000
trusted library allocation
page read and write
2018117C000
trusted library allocation
page read and write
BC2C67B000
stack
page read and write
226E000
heap
page read and write
BBC000
unkown
page execute and read and write
2018BCE0000
trusted library allocation
page read and write
19EF000
stack
page read and write
25B3ED0E000
heap
page read and write
7F2000
unkown
page execute and read and write
42BF000
stack
page read and write
BC2C7FE000
stack
page read and write
2018BA38000
trusted library allocation
page read and write
2018BCD0000
trusted library allocation
page read and write
25DAEE00000
trusted library allocation
page read and write
201812D5000
trusted library allocation
page read and write
201818E7000
trusted library allocation
page read and write
20182A19000
trusted library allocation
page read and write
201786E1000
heap
page read and write
2018AF5A000
trusted library allocation
page read and write
2018BC75000
trusted library allocation
page read and write
2017D927000
trusted library allocation
page read and write
25B47CA0000
trusted library section
page read and write
25B3ED39000
heap
page read and write
201885DF000
trusted library allocation
page read and write
68A1000
heap
page read and write
20187E91000
trusted library allocation
page read and write
2017D0BF000
trusted library allocation
page read and write
912000
unkown
page execute and read and write
2018BC73000
trusted library allocation
page read and write
20181BD3000
trusted library allocation
page read and write
2018BA32000
trusted library allocation
page read and write
2017D47D000
trusted library allocation
page read and write
20178752000
heap
page read and write
2018AFA5000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018BC49000
trusted library allocation
page read and write
6561000
heap
page read and write
2018A685000
trusted library allocation
page read and write
2018A6D0000
trusted library allocation
page read and write
FD0000
direct allocation
page read and write
1C61F000
stack
page read and write
25B480A1000
trusted library allocation
page read and write
25B47F4F000
trusted library allocation
page read and write
201786F0000
heap
page read and write
25B482B7000
trusted library allocation
page read and write
2017875E000
heap
page read and write
401F000
stack
page read and write
25B480E4000
trusted library allocation
page read and write
25B3ED47000
heap
page read and write
25B50307000
trusted library allocation
page read and write
25B47FF5000
trusted library allocation
page read and write
20178702000
heap
page read and write
6561000
heap
page read and write
2018BCCE000
trusted library allocation
page read and write
257F000
heap
page read and write
20187F8C000
trusted library allocation
page read and write
4FE0000
direct allocation
page execute and read and write
20189B53000
trusted library allocation
page read and write
25B43818000
trusted library allocation
page read and write
201812CE000
trusted library allocation
page read and write
201812DE000
trusted library allocation
page read and write
229F0000
heap
page read and write
2017872F000
heap
page read and write
20181868000
trusted library allocation
page read and write
201786E0000
heap
page read and write
25B4ADF9000
trusted library allocation
page read and write
13E4000
heap
page read and write
349F000
stack
page read and write
1C55F000
stack
page read and write
25B480DE000
trusted library allocation
page read and write
25B44569000
trusted library allocation
page read and write
2018BC4C000
trusted library allocation
page read and write
1124000
heap
page read and write
2018AFFC000
trusted library allocation
page read and write
20187E65000
trusted library allocation
page read and write
151E000
heap
page read and write
7CC000
unkown
page execute and write copy
6561000
heap
page read and write
2018BCBE000
trusted library allocation
page read and write
25B497B8000
trusted library allocation
page read and write
4A9E000
stack
page read and write
1C35F000
stack
page read and write
487B000
stack
page read and write
22A12000
heap
page read and write
489F000
stack
page read and write
40D0000
heap
page read and write
20181183000
trusted library allocation
page read and write
2017E559000
trusted library allocation
page read and write
2018A56F000
trusted library allocation
page read and write
BC253FE000
stack
page read and write
496F000
stack
page read and write
49C0000
direct allocation
page execute and read and write
25B488BF000
trusted library allocation
page read and write
2018BBFB000
trusted library allocation
page read and write
A80000
unkown
page read and write
229F0000
heap
page read and write
13E4000
heap
page read and write
6561000
heap
page read and write
731000
unkown
page execute and write copy
4B9E000
stack
page read and write
3ADF000
stack
page read and write
20181007000
trusted library allocation
page read and write
414000
heap
page read and write
2018A5C1000
trusted library allocation
page read and write
2017E564000
trusted library allocation
page read and write
68A1000
heap
page read and write
201818B0000
trusted library allocation
page read and write
68A1000
heap
page read and write
2017E13A000
trusted library allocation
page read and write
2018BCBE000
trusted library allocation
page read and write
2018AF80000
trusted library allocation
page read and write
2018BCCE000
trusted library allocation
page read and write
201816C6000
trusted library allocation
page read and write
201885F1000
trusted library allocation
page read and write
AE0000
direct allocation
page read and write
6561000
heap
page read and write
201816E7000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B495DE000
trusted library allocation
page read and write
6CC0000
heap
page read and write
1C961000
heap
page read and write
25B3ED39000
heap
page read and write
2018186B000
trusted library allocation
page read and write
25B3ED35000
heap
page read and write
1590000
direct allocation
page read and write
25B4809C000
trusted library allocation
page read and write
4A325FF000
stack
page read and write
2018CE16000
trusted library allocation
page read and write
20187EB9000
trusted library allocation
page read and write
2017FE8D000
trusted library allocation
page read and write
4F64000
direct allocation
page execute and read and write
20178726000
heap
page read and write
2460000
heap
page read and write
20181633000
trusted library allocation
page read and write
201812F9000
trusted library allocation
page read and write
2018AFF7000
trusted library allocation
page read and write
34CE000
stack
page read and write
2018186B000
trusted library allocation
page read and write
25B37FED000
trusted library allocation
page read and write
20178722000
heap
page read and write
415000
heap
page read and write
201881C3000
trusted library allocation
page read and write
4D81000
heap
page read and write
1C7CE000
stack
page read and write
5260000
direct allocation
page read and write
201786EB000
heap
page read and write
68A1000
heap
page read and write
425F000
stack
page read and write
2017D989000
trusted library allocation
page read and write
25B37F6B000
trusted library allocation
page read and write
2018801E000
trusted library allocation
page read and write
212DECF0000
heap
page read and write
20178722000
heap
page read and write
1E077E18000
heap
page read and write
2017872C000
heap
page read and write
25B4AC0D000
trusted library allocation
page read and write
25B3ED35000
heap
page read and write
2018C2FE000
trusted library allocation
page read and write
2018A278000
trusted library allocation
page read and write
25B48400000
unclassified section
page read and write
2018811D000
trusted library allocation
page read and write
25B4D300000
trusted library allocation
page read and write
2017DC96000
trusted library allocation
page read and write
6561000
heap
page read and write
6561000
heap
page read and write
6561000
heap
page read and write
2018B632000
trusted library allocation
page read and write
14A2000
heap
page read and write
6561000
heap
page read and write
3F1E000
stack
page read and write
20189B5C000
trusted library allocation
page read and write
2017F9D4000
trusted library allocation
page read and write
2017DE33000
trusted library allocation
page read and write
2018BCB0000
trusted library allocation
page read and write
201810BB000
trusted library allocation
page read and write
20180179000
trusted library allocation
page read and write
20178734000
heap
page read and write
2018AC11000
trusted library allocation
page read and write
53E0000
direct allocation
page execute and read and write
23743432000
trusted library allocation
page read and write
20181896000
trusted library allocation
page read and write
20188174000
trusted library allocation
page read and write
201811CA000
trusted library allocation
page read and write
25B497B4000
trusted library allocation
page read and write
20187E65000
trusted library allocation
page read and write
68A1000
heap
page read and write
229F7000
heap
page read and write
25B46709000
trusted library allocation
page read and write
28B17000
heap
page read and write
2017DEF0000
trusted library allocation
page read and write
2017FEEA000
trusted library allocation
page read and write
20178724000
heap
page read and write
493000
unkown
page execute and read and write
25B47F46000
trusted library allocation
page read and write
237432E6000
trusted library allocation
page read and write
2C1E000
stack
page read and write
2017872B000
heap
page read and write
2018BD6B000
trusted library allocation
page read and write
2018BF5A000
trusted library allocation
page read and write
2018A7E2000
trusted library allocation
page read and write
1C8DD000
stack
page read and write
20181191000
trusted library allocation
page read and write
6561000
heap
page read and write
20187E4E000
trusted library allocation
page read and write
2018A853000
trusted library allocation
page read and write
2E5F000
stack
page read and write
2017FC2A000
trusted library allocation
page read and write
2018A587000
trusted library allocation
page read and write
20189CDE000
trusted library allocation
page read and write
2018186E000
trusted library allocation
page read and write
39CE000
stack
page read and write
2018CC00000
trusted library allocation
page read and write
4110000
heap
page read and write
414000
heap
page read and write
364E000
stack
page read and write
25B37E50000
trusted library section
page read and write
335F000
stack
page read and write
68A1000
heap
page read and write
43CF000
stack
page read and write
6561000
heap
page read and write
25B482B9000
trusted library allocation
page read and write
25B4A700000
trusted library allocation
page read and write
85D000
unkown
page readonly
13E4000
heap
page read and write
2ECE000
stack
page read and write
1545C4B11000
trusted library allocation
page read and write
20189EBD000
trusted library allocation
page read and write
2018BC2A000
trusted library allocation
page read and write
201881BD000
trusted library allocation
page read and write
25B3ED15000
heap
page read and write
6561000
heap
page read and write
2018BC52000
trusted library allocation
page read and write
20181828000
trusted library allocation
page read and write
306F000
stack
page read and write
25B4910F000
trusted library allocation
page read and write
25B499B8000
trusted library allocation
page read and write
1124000
heap
page read and write
20183727000
trusted library allocation
page read and write
6561000
heap
page read and write
3B1E000
stack
page read and write
201902EA000
trusted library allocation
page read and write
704000
heap
page read and write
6561000
heap
page read and write
370000
heap
page read and write
2017FEAD000
trusted library allocation
page read and write
20B8000
heap
page read and write
68A1000
heap
page read and write
25B47F37000
trusted library allocation
page read and write
2017FB70000
trusted library allocation
page read and write
2FBE000
stack
page read and write
FD0000
direct allocation
page read and write
2018BA9A000
trusted library allocation
page read and write
4D81000
heap
page read and write
201881FD000
trusted library allocation
page read and write
23743300000
unclassified section
page readonly
25B487D6000
trusted library allocation
page read and write
25B49759000
trusted library allocation
page read and write
2017DCF0000
trusted library allocation
page read and write
13E4000
heap
page read and write
2018BA3A000
trusted library allocation
page read and write
3C9E000
stack
page read and write
34DE000
stack
page read and write
2018128C000
trusted library allocation
page read and write
201816AF000
trusted library allocation
page read and write
2018AB7C000
trusted library allocation
page read and write
2017E195000
trusted library allocation
page read and write
2C30000
direct allocation
page read and write
5A38DFE000
stack
page read and write
20188174000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018A6BA000
trusted library allocation
page read and write
201818E7000
trusted library allocation
page read and write
13E4000
heap
page read and write
201786E7000
heap
page read and write
3EDE000
stack
page read and write
2018A7CE000
trusted library allocation
page read and write
BC2C8BE000
stack
page read and write
25B37BE0000
heap
page read and write
13E4000
heap
page read and write
25B44200000
trusted library allocation
page read and write
414F000
stack
page read and write
411F000
stack
page read and write
201885F8000
trusted library allocation
page read and write
201786F5000
heap
page read and write
2018BAAA000
trusted library allocation
page read and write
25B44175000
trusted library allocation
page read and write
1590000
direct allocation
page read and write
414000
heap
page read and write
201810C7000
trusted library allocation
page read and write
6E409FE000
unkown
page readonly
2017D09E000
trusted library allocation
page read and write
229F0000
heap
page read and write
25B46788000
trusted library allocation
page read and write
AA6000
unkown
page execute and read and write
2017FC58000
trusted library allocation
page read and write
2018BCE0000
trusted library allocation
page read and write
6561000
heap
page read and write
201881E1000
trusted library allocation
page read and write
25B48B0B000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B49A66000
trusted library allocation
page read and write
22F4000
heap
page read and write
2018183A000
trusted library allocation
page read and write
2018115C000
trusted library allocation
page read and write
25B3ED52000
heap
page read and write
25B4C22A000
trusted library allocation
page read and write
1590000
direct allocation
page read and write
BB3000
heap
page read and write
2017873C000
heap
page read and write
20182AD4000
trusted library allocation
page read and write
25B3ED3A000
heap
page read and write
25B37F00000
trusted library allocation
page read and write
4830000
direct allocation
page read and write
5334000
direct allocation
page execute and read and write
201902B4000
trusted library allocation
page read and write
53B0000
direct allocation
page execute and read and write
25B4C228000
trusted library allocation
page read and write
20180155000
trusted library allocation
page read and write
229DB000
heap
page read and write
2018C598000
trusted library allocation
page read and write
25B47B27000
trusted library allocation
page read and write
25B480D0000
trusted library allocation
page read and write
20181357000
trusted library allocation
page read and write
385F000
stack
page read and write
2017D376000
trusted library allocation
page read and write
25B488DD000
trusted library allocation
page read and write
4D81000
heap
page read and write
20178734000
heap
page read and write
20178722000
heap
page read and write
415E000
stack
page read and write
2017E5BB000
trusted library allocation
page read and write
25B480EC000
trusted library allocation
page read and write
2C10000
direct allocation
page read and write
529E000
stack
page read and write
25B458BF000
trusted library allocation
page read and write
424E000
stack
page read and write
2018815C000
trusted library allocation
page read and write
6561000
heap
page read and write
68A1000
heap
page read and write
2018AC84000
trusted library allocation
page read and write
4F64000
direct allocation
page execute and read and write
1430000
direct allocation
page read and write
20189A16000
trusted library allocation
page read and write
67EE000
stack
page read and write
1B96000
heap
page read and write
2018860D000
trusted library allocation
page read and write
334F000
stack
page read and write
2018BBC7000
trusted library allocation
page read and write
201786F5000
heap
page read and write
B76000
heap
page read and write
20189ECF000
trusted library allocation
page read and write
1DBE000
stack
page read and write
5F0F000
stack
page read and write
2017FEC0000
trusted library allocation
page read and write
20182D2B000
trusted library allocation
page read and write
4103000
heap
page read and write
2206000
heap
page read and write
414000
heap
page read and write
20188193000
trusted library allocation
page read and write
20181057000
trusted library allocation
page read and write
201812BB000
trusted library allocation
page read and write
16064307000
trusted library allocation
page read and write
414000
heap
page read and write
2018BCB2000
trusted library allocation
page read and write
13E4000
heap
page read and write
68A1000
heap
page read and write
68A1000
heap
page read and write
25B3ED35000
heap
page read and write
4ADE000
stack
page read and write
25DAECB6000
trusted library allocation
page read and write
13E4000
heap
page read and write
919000
unkown
page write copy
25B4976D000
trusted library allocation
page read and write
52B0000
direct allocation
page execute and read and write
2018BBAD000
trusted library allocation
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
13E0000
heap
page read and write
559B000
stack
page read and write
68A1000
heap
page read and write
112A000
heap
page read and write
23743404000
trusted library allocation
page read and write
25B4C224000
trusted library allocation
page read and write
2018A7FB000
trusted library allocation
page read and write
4BF1000
heap
page read and write
2017E0E6000
trusted library allocation
page read and write
414000
heap
page read and write
201812B4000
trusted library allocation
page read and write
414000
heap
page read and write
1C3BE000
stack
page read and write
25B39C45000
heap
page read and write
1F84000
heap
page read and write
1590000
direct allocation
page read and write
42D0000
heap
page read and write
20189B49000
trusted library allocation
page read and write
2017D977000
trusted library allocation
page read and write
201786FD000
heap
page read and write
20185189000
trusted library allocation
page read and write
D85000
unkown
page execute and read and write
2017874B000
heap
page read and write
3C1F000
stack
page read and write
201786E7000
heap
page read and write
1124000
heap
page read and write
1590000
direct allocation
page read and write
6561000
heap
page read and write
2018BD9F000
trusted library allocation
page read and write
1124000
heap
page read and write
68A1000
heap
page read and write
2018A8B1000
trusted library allocation
page read and write
25B48078000
trusted library allocation
page read and write
20178726000
heap
page read and write
12F4000
heap
page read and write
20181371000
trusted library allocation
page read and write
5010000
direct allocation
page execute and read and write
2C10000
direct allocation
page read and write
6561000
heap
page read and write
BC231FF000
stack
page read and write
2017D47D000
trusted library allocation
page read and write
68A1000
heap
page read and write
3F0E000
stack
page read and write
20187E00000
trusted library allocation
page read and write
2017E5BB000
trusted library allocation
page read and write
20181BF7000
trusted library allocation
page read and write
201806E6000
trusted library allocation
page read and write
201812FE000
trusted library allocation
page read and write
201886F5000
trusted library allocation
page read and write
20185134000
trusted library allocation
page read and write
25B498CB000
trusted library allocation
page read and write
13E4000
heap
page read and write
2018A6C0000
trusted library allocation
page read and write
68A1000
heap
page read and write
201786FD000
heap
page read and write
6561000
heap
page read and write
4D81000
heap
page read and write
13E4000
heap
page read and write
2017F859000
trusted library allocation
page read and write
25B39894000
heap
page read and write
6561000
heap
page read and write
25B47CC0000
trusted library section
page readonly
BC2ABFD000
stack
page read and write
2018ACCD000
trusted library allocation
page read and write
5370000
direct allocation
page execute and read and write
414000
heap
page read and write
BB0000
heap
page read and write
22A12000
heap
page read and write
769000
unkown
page execute and read and write
6B0000
unkown
page read and write
13E4000
heap
page read and write
25B4AA4A000
trusted library allocation
page read and write
408F000
stack
page read and write
20181369000
trusted library allocation
page read and write
1D5000
heap
page read and write
2017FB2C000
trusted library allocation
page read and write
2018BC0C000
trusted library allocation
page read and write
25B47B9C000
trusted library allocation
page read and write
20183AC9000
trusted library allocation
page read and write
25B49113000
trusted library allocation
page read and write
2017E5BE000
trusted library allocation
page read and write
AABE178000
stack
page read and write
201786EB000
heap
page read and write
20178729000
heap
page read and write
25B4DD24000
trusted library allocation
page read and write
25B54018000
trusted library allocation
page read and write
2018CE5D000
trusted library allocation
page read and write
25B485D3000
trusted library allocation
page read and write
6561000
heap
page read and write
68A1000
heap
page read and write
4C10000
direct allocation
page execute and read and write
25B4AC6C000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B44126000
trusted library allocation
page read and write
1E076400000
trusted library allocation
page read and write
20181895000
trusted library allocation
page read and write
25B452B9000
trusted library allocation
page read and write
2017FC60000
trusted library allocation
page read and write
2018CE2C000
trusted library allocation
page read and write
25B48410000
trusted library section
page read and write
25B48C1E000
trusted library allocation
page read and write
2017DEF9000
trusted library allocation
page read and write
20182A7A000
trusted library allocation
page read and write
2018C97F000
trusted library allocation
page read and write
16064300000
trusted library allocation
page read and write
25B458E2000
trusted library allocation
page read and write
2018C332000
trusted library allocation
page read and write
201816C6000
trusted library allocation
page read and write
25B48C00000
trusted library allocation
page read and write
2018BC73000
trusted library allocation
page read and write
6561000
heap
page read and write
201851AD000
trusted library allocation
page read and write
20180961000
trusted library allocation
page read and write
201811DE000
trusted library allocation
page read and write
2018183A000
trusted library allocation
page read and write
68A1000
heap
page read and write
FD0000
direct allocation
page read and write
AE0000
direct allocation
page read and write
20181896000
trusted library allocation
page read and write
20178724000
heap
page read and write
2017873C000
heap
page read and write
2017F8E7000
trusted library allocation
page read and write
6561000
heap
page read and write
1606430A000
trusted library allocation
page read and write
4C4000
unkown
page execute and read and write
2018AFC1000
trusted library allocation
page read and write
25B3ED21000
heap
page read and write
2017FEC8000
trusted library allocation
page read and write
2018819E000
trusted library allocation
page read and write
20187E93000
trusted library allocation
page read and write
2018BFFB000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B47F67000
trusted library allocation
page read and write
25B3ED15000
heap
page read and write
13E4000
heap
page read and write
20181174000
trusted library allocation
page read and write
20183A7E000
trusted library allocation
page read and write
13E4000
heap
page read and write
47CE000
stack
page read and write
201810D3000
trusted library allocation
page read and write
201881C0000
trusted library allocation
page read and write
2018BDA9000
trusted library allocation
page read and write
25B4833E000
trusted library allocation
page read and write
4E90000
heap
page read and write
6561000
heap
page read and write
BC2CFBE000
stack
page read and write
20181697000
trusted library allocation
page read and write
493000
unkown
page execute and read and write
2650000
heap
page read and write
2018BDD3000
trusted library allocation
page read and write
25B488FC000
trusted library allocation
page read and write
6561000
heap
page read and write
2018AC5F000
trusted library allocation
page read and write
2018AC7E000
trusted library allocation
page read and write
201786F5000
heap
page read and write
4F64000
direct allocation
page execute and read and write
2017DC6C000
trusted library allocation
page read and write
25B47F46000
trusted library allocation
page read and write
201812EB000
trusted library allocation
page read and write
20187E32000
trusted library allocation
page read and write
2017FC8B000
trusted library allocation
page read and write
4D81000
heap
page read and write
2018A1AC000
trusted library allocation
page read and write
25B4C200000
trusted library allocation
page read and write
25B4889B000
trusted library allocation
page read and write
13E4000
heap
page read and write
25B4AD04000
trusted library allocation
page read and write
2017E1AE000
trusted library allocation
page read and write
13E4000
heap
page read and write
2555000
heap
page read and write
13E5000
heap
page read and write
13E4000
heap
page read and write
414000
heap
page read and write
201811DA000
trusted library allocation
page read and write
25B459EE000
heap
page read and write
20180082000
trusted library allocation
page read and write
4F20000
direct allocation
page execute and read and write
25DAEAE0000
unclassified section
page read and write
13E4000
heap
page read and write
20190288000
trusted library allocation
page read and write
201786E8000
heap
page read and write
25B3ED27000
heap
page read and write
2018507B000
trusted library allocation
page read and write
BCB000
unkown
page execute and read and write
13E4000
heap
page read and write
2018BC1B000
trusted library allocation
page read and write
201810DA000
trusted library allocation
page read and write
6561000
heap
page read and write
25B45467000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B3ED26000
heap
page read and write
201816C6000
trusted library allocation
page read and write
2018BC50000
trusted library allocation
page read and write
2CD0000
direct allocation
page read and write
2018B9FB000
trusted library allocation
page read and write
2018A5C1000
trusted library allocation
page read and write
201786E7000
heap
page read and write
20180162000
trusted library allocation
page read and write
2018BC4C000
trusted library allocation
page read and write
260B000
heap
page read and write
60B0000
heap
page read and write
201811DE000
trusted library allocation
page read and write
414000
heap
page read and write
2018A28D000
trusted library allocation
page read and write
7FD000
stack
page read and write
2018BC50000
trusted library allocation
page read and write
2018C300000
trusted library allocation
page read and write
201812DC000
trusted library allocation
page read and write
429F000
stack
page read and write
414000
heap
page read and write
201880B1000
trusted library allocation
page read and write
2CE7000
heap
page read and write
2017E5C1000
trusted library allocation
page read and write
2017FEF7000
trusted library allocation
page read and write
49D1000
heap
page read and write
6561000
heap
page read and write
1C68E000
stack
page read and write
25B3ED0E000
heap
page read and write
13E4000
heap
page read and write
61ECC000
direct allocation
page read and write
25B4AE58000
trusted library allocation
page read and write
4240000
heap
page read and write
2018114F000
trusted library allocation
page read and write
2017FBE0000
trusted library allocation
page read and write
2017E55B000
trusted library allocation
page read and write
25B451D2000
trusted library allocation
page read and write
212DED2B000
heap
page read and write
25B43760000
trusted library allocation
page read and write
1DEC39F1000
trusted library allocation
page execute read
25B47F37000
trusted library allocation
page read and write
2018AF73000
trusted library allocation
page read and write
4D81000
heap
page read and write
34FAC000
stack
page read and write
2017FEF4000
trusted library allocation
page read and write
13E4000
heap
page read and write
4DE1000
heap
page read and write
6561000
heap
page read and write
25B3ED52000
heap
page read and write
414000
heap
page read and write
1124000
heap
page read and write
25B48230000
trusted library allocation
page read and write
5080000
direct allocation
page read and write
25B50E48000
trusted library allocation
page read and write
2018BD33000
trusted library allocation
page read and write
13E4000
heap
page read and write
B8D000
heap
page read and write
414000
heap
page read and write
2017FEC8000
trusted library allocation
page read and write
399F000
stack
page read and write
2018A862000
trusted library allocation
page read and write
325F000
stack
page read and write
25E0003F000
trusted library allocation
page read and write
20183AF5000
trusted library allocation
page read and write
68A1000
heap
page read and write
414000
heap
page read and write
25B45641000
trusted library allocation
page read and write
25B48430000
trusted library section
page read and write
25B43667000
trusted library allocation
page read and write
2018007E000
trusted library allocation
page read and write
20188566000
trusted library allocation
page read and write
68A1000
heap
page read and write
4D81000
heap
page read and write
20187E82000
trusted library allocation
page read and write
68A1000
heap
page read and write
2018BC0E000
trusted library allocation
page read and write
20181809000
trusted library allocation
page read and write
201812BB000
trusted library allocation
page read and write
2CD0000
direct allocation
page read and write
2017FEBD000
trusted library allocation
page read and write
91B000
unkown
page execute and read and write
6ADE000
heap
page read and write
2017DC25000
trusted library allocation
page read and write
415000
heap
page read and write
BC246BE000
stack
page read and write
13D0000
heap
page read and write
13E0000
direct allocation
page read and write
2018A516000
trusted library allocation
page read and write
730000
unkown
page readonly
4FD0000
direct allocation
page execute and read and write
25B3ED26000
heap
page read and write
13E4000
heap
page read and write
25B3ED2A000
heap
page read and write
25B49A59000
trusted library allocation
page read and write
20187E17000
trusted library allocation
page read and write
25B45A21000
heap
page read and write
25B47944000
trusted library allocation
page read and write
2C47000
heap
page read and write
15C0000
direct allocation
page read and write
25B436A9000
trusted library allocation
page read and write
13E4000
heap
page read and write
1EB0000
heap
page read and write
6561000
heap
page read and write
13E4000
heap
page read and write
3D5F000
stack
page read and write
4F64000
direct allocation
page execute and read and write
2580000
heap
page read and write
25DAEC72000
trusted library allocation
page read and write
68A1000
heap
page read and write
20178734000
heap
page read and write
25B49934000
trusted library allocation
page read and write
13E4000
heap
page read and write
25B48B00000
trusted library allocation
page read and write
1C51F000
stack
page read and write
2018BCD0000
trusted library allocation
page read and write
25B49A34000
trusted library allocation
page read and write
25B4AD9E000
trusted library allocation
page read and write
371F000
stack
page read and write
227A91F1000
trusted library allocation
page execute read
25B37BA0000
heap
page read and write
20187E77000
trusted library allocation
page read and write
25DAE930000
heap
page read and write
25B47BF2000
trusted library allocation
page read and write
A140D404000
trusted library allocation
page read and write
68A1000
heap
page read and write
201810D2000
trusted library allocation
page read and write
2017FEC8000
trusted library allocation
page read and write
2018BF92000
trusted library allocation
page read and write
2018183A000
trusted library allocation
page read and write
25B4ACD2000
trusted library allocation
page read and write
201809A9000
trusted library allocation
page read and write
201816C0000
trusted library allocation
page read and write
20178725000
heap
page read and write
349F000
stack
page read and write
6561000
heap
page read and write
6561000
heap
page read and write
20188168000
trusted library allocation
page read and write
1E35000
heap
page read and write
20178723000
heap
page read and write
25B47D00000
trusted library allocation
page read and write
25B4893F000
trusted library allocation
page read and write
2018BC10000
trusted library allocation
page read and write
229F5000
heap
page read and write
1110000
heap
page read and write
25B49475000
trusted library allocation
page read and write
2018128C000
trusted library allocation
page read and write
201880EB000
trusted library allocation
page read and write
25B480E4000
trusted library allocation
page read and write
229F1000
heap
page read and write
25B50EFC000
trusted library allocation
page read and write
25B480A1000
trusted library allocation
page read and write
1ADEDFE000
stack
page read and write
13E0000
direct allocation
page read and write
25B50C54000
trusted library allocation
page read and write
2018BCBE000
trusted library allocation
page read and write
201786FC000
heap
page read and write
201806FD000
trusted library allocation
page read and write
3D2E000
stack
page read and write
2018BFBD000
trusted library allocation
page read and write
6561000
heap
page read and write
5040000
direct allocation
page execute and read and write
201786FD000
heap
page read and write
25B4809C000
trusted library allocation
page read and write
25B4ACC8000
trusted library allocation
page read and write
3140000
direct allocation
page read and write
20178724000
heap
page read and write
201882CD000
trusted library allocation
page read and write
2017DC5E000
trusted library allocation
page read and write
450E000
stack
page read and write
4D81000
heap
page read and write
2018015E000
trusted library allocation
page read and write
2017D4B6000
trusted library allocation
page read and write
2017E556000
trusted library allocation
page read and write
68A1000
heap
page read and write
25B47F4A000
trusted library allocation
page read and write
25B3ED35000
heap
page read and write
866000
unkown
page execute and write copy
2018C2BF000
trusted library allocation
page read and write
25B43703000
trusted library allocation
page read and write
1540000
heap
page read and write
13E4000
heap
page read and write
269F000
heap
page read and write
201881DE000
trusted library allocation
page read and write
229F7000
heap
page read and write
201813FD000
trusted library allocation
page read and write
20178726000
heap
page read and write
25B4913D000
trusted library allocation
page read and write
68A1000
heap
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
2017873C000
heap
page read and write
20183A3E000
trusted library allocation
page read and write
68A1000
heap
page read and write
53F0000
direct allocation
page execute and read and write
2018AC84000
trusted library allocation
page read and write
20181871000
trusted library allocation
page read and write
23743266000
trusted library allocation
page read and write
6561000
heap
page read and write
2589000
heap
page read and write
13E4000
heap
page read and write
201786FD000
heap
page read and write
2017E598000
trusted library allocation
page read and write
25B4C22C000
trusted library allocation
page read and write
20181B10000
trusted library allocation
page read and write
BC249D3000
stack
page read and write
20187D97000
trusted library allocation
page read and write
25B47FF5000
trusted library allocation
page read and write
201837EE000
trusted library allocation
page read and write
20180653000
trusted library allocation
page read and write
AE0000
direct allocation
page read and write
2018BF49000
trusted library allocation
page read and write
2018BCB5000
trusted library allocation
page read and write
143A000
heap
page read and write
201816B8000
trusted library allocation
page read and write
20181342000
trusted library allocation
page read and write
2374309F000
unclassified section
page read and write
20187ECB000
trusted library allocation
page read and write
2018BBF7000
trusted library allocation
page read and write
2018BF9C000
trusted library allocation
page read and write
4DE1000
heap
page read and write
5050000
direct allocation
page execute and read and write
13E4000
heap
page read and write
414000
heap
page read and write
1F84000
heap
page read and write
20181837000
trusted library allocation
page read and write
2018A7EA000
trusted library allocation
page read and write
2018BA76000
trusted library allocation
page read and write
68A1000
heap
page read and write
414000
heap
page read and write
25B4F200000
trusted library allocation
page read and write
13E4000
heap
page read and write
25B467ED000
trusted library allocation
page read and write
110E000
stack
page read and write
13E4000
heap
page read and write
20182ADC000
trusted library allocation
page read and write
25B4D314000
trusted library allocation
page read and write
6561000
heap
page read and write
2017D913000
trusted library allocation
page read and write
201850DA000
trusted library allocation
page read and write
2018A7D0000
trusted library allocation
page read and write
16A8000
heap
page read and write
201812EB000
trusted library allocation
page read and write
414000
heap
page read and write
2018BF8C000
trusted library allocation
page read and write
201903E2000
trusted library allocation
page read and write
20187E17000
trusted library allocation
page read and write
D6B000
unkown
page execute and read and write
20173636000
heap
page read and write
2018BFBD000
trusted library allocation
page read and write
2018A249000
trusted library allocation
page read and write
25B44000000
trusted library allocation
page read and write
2018BCB5000
trusted library allocation
page read and write
25B44400000
trusted library allocation
page read and write
25B4801A000
trusted library allocation
page read and write
201786DE000
heap
page read and write
4D81000
heap
page read and write
6561000
heap
page read and write
2018AB7C000
trusted library allocation
page read and write
2018AC28000
trusted library allocation
page read and write
25B47F6F000
trusted library allocation
page read and write
201881C8000
trusted library allocation
page read and write
68A1000
heap
page read and write
6CA00000
unkown
page readonly
20187E9D000
trusted library allocation
page read and write
20178722000
heap
page read and write
25DAEC00000
trusted library allocation
page read and write
20180961000
trusted library allocation
page read and write
25B3ED2A000
heap
page read and write
414000
heap
page read and write
2017F9D4000
trusted library allocation
page read and write
20187E4A000
trusted library allocation
page read and write
BC2CD7E000
stack
page read and write
20181140000
trusted library allocation
page read and write
2017FEB6000
trusted library allocation
page read and write
BC28BFF000
stack
page read and write
229F7000
heap
page read and write
25B48233000
trusted library allocation
page read and write
25B3ED0E000
heap
page read and write
25B44182000
trusted library allocation
page read and write
25B48081000
trusted library allocation
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
68A1000
heap
page read and write
There are 8291 hidden memdumps, click here to show them.