IOC Report
8NjcvPNvUr.exe

loading gif

Files

File Path
Type
Category
Malicious
8NjcvPNvUr.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_8ec8c5c339.exe_11f9e6f50925d59ff337ab9ea505e88f9c27f_ead0fcb4_1198fe4c-3e59-49b5-9b3d-6e0403735303\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_8ec8c5c339.exe_11f9e6f50925d59ff337ab9ea505e88f9c27f_ead0fcb4_f47d5e4c-9543-46c7-9068-4d788eb57bf1\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_8ec8c5c339.exe_96fd7593117a51ef401955134535525854013e0_ead0fcb4_265c04e2-7da8-4aeb-b407-742220e2345d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\userKFHCAEGCBF.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\1000016001\8ec8c5c339.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000017001\1c593ec106.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\RoamingHJDBKJKFIE.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AECAECFCAAEBFHIEHDGHDHCBAK
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\AEHIECAFCGDBFHIDBKFC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\EGIDHDGCBFBKECBFHCAF
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\FHDAFIIDAKJDGDHIDAKJ
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FIDAFCAF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JECAEHJJJKJKFIDGCBGIJJJEHI
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\JJJEGCGD
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KJKJJEGIDBGIDGCBAFHCGCGCGD
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER800F.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Jul 27 03:39:30 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8196.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER81C6.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER857D.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Jul 27 03:39:31 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8698.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER86D7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC10F.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Jul 27 03:39:47 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC1CC.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC1FC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\compatibility.ini
Windows WIN.INI
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Windows\Tasks\axplong.job
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 44 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\8NjcvPNvUr.exe
"C:\Users\user\Desktop\8NjcvPNvUr.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
"C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\1000016001\8ec8c5c339.exe
"C:\Users\user\AppData\Local\Temp\1000016001\8ec8c5c339.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000017001\1c593ec106.exe
"C:\Users\user\AppData\Local\Temp\1000017001\1c593ec106.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000016001\8ec8c5c339.exe
"C:\Users\user\AppData\Local\Temp\1000016001\8ec8c5c339.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000017001\1c593ec106.exe
"C:\Users\user\AppData\Local\Temp\1000017001\1c593ec106.exe"
malicious
C:\Users\user\AppData\RoamingHJDBKJKFIE.exe
"C:\Users\user\AppData\RoamingHJDBKJKFIE.exe"
malicious
C:\Users\userKFHCAEGCBF.exe
"C:\Users\userKFHCAEGCBF.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000016001\8ec8c5c339.exe
"C:\Users\user\AppData\Local\Temp\1000016001\8ec8c5c339.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000017001\1c593ec106.exe
"C:\Users\user\AppData\Local\Temp\1000017001\1c593ec106.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\RoamingHJDBKJKFIE.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\userKFHCAEGCBF.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 8052 -s 2432
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6704 -s 1312
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2336 -parentBuildID 20230927232528 -prefsHandle 2272 -prefMapHandle 2256 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fac9cc89-eaa9-45bc-9cd9-39fa408611c3} 7664 "\\.\pipe\gecko-crash-server-pipe.7664" 238e766c110 socket
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 1028
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2312 -parentBuildID 20230927232528 -prefsHandle 2256 -prefMapHandle 2240 -prefsLen 25359 -prefMapSize 238769 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {77cf4557-a063-4b0f-83a1-cb60c77939fe} 2116 "\\.\pipe\gecko-crash-server-pipe.2116" 28621a6eb10 socket
There are 18 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://85.28.47.31/Iw
unknown
malicious
http://85.28.47.31/8405906461a5200c/vcruntime140.dll
85.28.47.31
malicious
http://185.215.113.19/Vi9leo/index.php
185.215.113.19
malicious
http://85.28.47.31/8405906461a5200c/softokn3.dll
85.28.47.31
malicious
http://85.28.47.31/8405906461a5200c/nss3.dll
85.28.47.31
malicious
https://www.openh264.org//
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://duckduckgo.com/ac/?q=
unknown
https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=40249-e88c401e1b1f2242d9e4
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://screenshots.firefox.comzA8
unknown
http://85.28.47.31/5499d72b3a3e55be.phpaY
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://static.adsafeprotected.com/firefox-etp-pixelchrome://extensions/content/schemas/manifest.jso
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://screenshots.firefox.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
http://185.215.113.19/Vi9leo/index.phpM:S
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
http://185.215.113.19/Local
unknown
https://monitor.firefox.com/breach-details/
unknown
https://www.google.com/policies/privacy/mozIGeckoMediaPluginChromeService
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
http://85.28.47.31/cwx
unknown
https://firefox.settings.services.allizom.org/v1/buckets/main/collections/search-config/recordsm
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://profiler.firefox.com/
unknown
https://html.spec.whatwg.org/#the-hr-element-2
unknown
http://85.28.47.31/8405906461a5200c/softokn3.dllF
unknown
http://85.28.47.31/8405906461a5200c/freebl3.dlly
unknown
https://www.openh264.org/getActiveAddons/
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
http://exslt.org/sets
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://src.chromium.org/viewvc/chrome/trunk/src/third_party/cld/languages/internal/languages.cc
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=utf-8&mode=blended&tag=mozill
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsing
unknown
https://hg.mozilla.org/releases/mozilla-release/rev/68e4c357d26c5a1f075a1ec0c696d4fe684ed881The
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
http://exslt.org/common
unknown
https://firefox.settings.services.mozilla.com/v1i
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://fpn.firefox.com
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Ed1aWxkV
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://www.widevine.com/
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://screenshots.firefox.com/isUnderHiddenEmbedderElement
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.google.com/policies/privacy/2
unknown
http://exslt.org/dates-and-times
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://85.28.47.31/5499d72b3a3e55be.php-w6
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17mluIFdhbGxldHxmbmpobWtoaG1rYm
unknown
https://www.youtube.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://firefox.settings.services.allizom.org/v1/buckets/main/collections/search-config/recordsmr
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://amazon.com
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1238180Required
unknown
https://www.youtube.com/accountC:
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://firefox.settings.services.mozilla.com/v1i#
unknown
http://85.28.47.31/8405906461a5200c/freebl3.dll9
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://ac.ecop
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://github.com/mozilla-services/screenshotshttps://screenshots.firefox.com/
unknown
http://exslt.org/strings
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1403293
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
http://185.215.113.16/soka/random.exeN
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17WdsYWhtbmRlZHwxfDB8MHxab2hvIF
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://www.google.com/searchwikipedia
unknown
http://www.ethiopic.org/Collation/OrderedLists.html.
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
http://85.28.47.31/Qwj
unknown
http://85.28.47.31Wi
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://www.google.com/searchpictureinpicture
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
spocs.getpocket.com
unknown
malicious
detectportal.firefox.com
unknown
malicious
content-signature-2.cdn.mozilla.net
unknown
malicious
www.youtube.com
unknown
malicious
example.org
93.184.215.14
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
youtube-ui.l.google.com
142.250.184.238
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
contile.services.mozilla.com
34.117.188.166
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
There are 3 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
85.28.47.31
unknown
Russian Federation
malicious
185.215.113.19
unknown
Portugal
malicious
185.215.113.16
unknown
Portugal
malicious
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
prod.ads.prod.webservices.mozgcp.net
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
142.250.184.238
youtube-ui.l.google.com
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
8ec8c5c339.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
1c593ec106.exe
malicious
\REGISTRY\A\{b124985f-df16-f89f-89ee-34a3510b9f96}\Root\InventoryApplicationFile\8ec8c5c339.exe|6fcc48b46f6de81a
ProgramId
malicious
\REGISTRY\A\{b124985f-df16-f89f-89ee-34a3510b9f96}\Root\InventoryApplicationFile\8ec8c5c339.exe|6fcc48b46f6de81a
FileId
malicious
\REGISTRY\A\{b124985f-df16-f89f-89ee-34a3510b9f96}\Root\InventoryApplicationFile\8ec8c5c339.exe|6fcc48b46f6de81a
LowerCaseLongPath
malicious
\REGISTRY\A\{b124985f-df16-f89f-89ee-34a3510b9f96}\Root\InventoryApplicationFile\8ec8c5c339.exe|6fcc48b46f6de81a
LongPathHash
malicious
\REGISTRY\A\{b124985f-df16-f89f-89ee-34a3510b9f96}\Root\InventoryApplicationFile\8ec8c5c339.exe|6fcc48b46f6de81a
Name
malicious
\REGISTRY\A\{b124985f-df16-f89f-89ee-34a3510b9f96}\Root\InventoryApplicationFile\8ec8c5c339.exe|6fcc48b46f6de81a
OriginalFileName
malicious
\REGISTRY\A\{b124985f-df16-f89f-89ee-34a3510b9f96}\Root\InventoryApplicationFile\8ec8c5c339.exe|6fcc48b46f6de81a
Publisher
malicious
\REGISTRY\A\{b124985f-df16-f89f-89ee-34a3510b9f96}\Root\InventoryApplicationFile\8ec8c5c339.exe|6fcc48b46f6de81a
Version
malicious
\REGISTRY\A\{b124985f-df16-f89f-89ee-34a3510b9f96}\Root\InventoryApplicationFile\8ec8c5c339.exe|6fcc48b46f6de81a
BinFileVersion
malicious
\REGISTRY\A\{b124985f-df16-f89f-89ee-34a3510b9f96}\Root\InventoryApplicationFile\8ec8c5c339.exe|6fcc48b46f6de81a
BinaryType
malicious
\REGISTRY\A\{b124985f-df16-f89f-89ee-34a3510b9f96}\Root\InventoryApplicationFile\8ec8c5c339.exe|6fcc48b46f6de81a
ProductName
malicious
\REGISTRY\A\{b124985f-df16-f89f-89ee-34a3510b9f96}\Root\InventoryApplicationFile\8ec8c5c339.exe|6fcc48b46f6de81a
ProductVersion
malicious
\REGISTRY\A\{b124985f-df16-f89f-89ee-34a3510b9f96}\Root\InventoryApplicationFile\8ec8c5c339.exe|6fcc48b46f6de81a
LinkDate
malicious
\REGISTRY\A\{b124985f-df16-f89f-89ee-34a3510b9f96}\Root\InventoryApplicationFile\8ec8c5c339.exe|6fcc48b46f6de81a
BinProductVersion
malicious
\REGISTRY\A\{b124985f-df16-f89f-89ee-34a3510b9f96}\Root\InventoryApplicationFile\8ec8c5c339.exe|6fcc48b46f6de81a
AppxPackageFullName
malicious
\REGISTRY\A\{b124985f-df16-f89f-89ee-34a3510b9f96}\Root\InventoryApplicationFile\8ec8c5c339.exe|6fcc48b46f6de81a
AppxPackageRelativeId
malicious
\REGISTRY\A\{b124985f-df16-f89f-89ee-34a3510b9f96}\Root\InventoryApplicationFile\8ec8c5c339.exe|6fcc48b46f6de81a
Size
malicious
\REGISTRY\A\{b124985f-df16-f89f-89ee-34a3510b9f96}\Root\InventoryApplicationFile\8ec8c5c339.exe|6fcc48b46f6de81a
Language
malicious
\REGISTRY\A\{b124985f-df16-f89f-89ee-34a3510b9f96}\Root\InventoryApplicationFile\8ec8c5c339.exe|6fcc48b46f6de81a
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018400F283B7F5D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|ScreenX
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|ScreenY
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Width
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Height
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Maximized
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Flags
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|CssToDevPixelScaling
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|UrlbarCSSSpan
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|SearchbarCSSSpan
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|SpringsCSSSpan
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
There are 39 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
C11000
unkown
page execute and read and write
malicious
4B10000
direct allocation
page read and write
malicious
26DA000
heap
page read and write
malicious
4F80000
direct allocation
page read and write
malicious
25EA000
heap
page read and write
malicious
311000
unkown
page execute and read and write
malicious
251000
unkown
page execute and read and write
malicious
161000
unkown
page execute and read and write
malicious
C31000
unkown
page execute and read and write
malicious
4CE0000
direct allocation
page read and write
malicious
4C10000
direct allocation
page read and write
malicious
161000
unkown
page execute and read and write
malicious
4A60000
direct allocation
page read and write
malicious
5400000
direct allocation
page read and write
malicious
311000
unkown
page execute and read and write
malicious
24C7000
heap
page read and write
malicious
311000
unkown
page execute and read and write
malicious
4830000
direct allocation
page read and write
malicious
4850000
direct allocation
page read and write
malicious
E90000
direct allocation
page read and write
62C000
unkown
page execute and read and write
19E000
stack
page read and write
238F6AED000
trusted library allocation
page read and write
400000
unkown
page readonly
286321FA000
trusted library allocation
page read and write
4F61000
heap
page read and write
6471000
heap
page read and write
53F0000
direct allocation
page read and write
1CBE7950000
heap
page read and write
50F1000
heap
page read and write
45D1000
heap
page read and write
1F414379000
trusted library allocation
page read and write
E34000
heap
page read and write
286309F8000
trusted library allocation
page read and write
2570000
heap
page read and write
50F1000
heap
page read and write
2DFE000
stack
page read and write
286288D8000
heap
page read and write
ED3000
unkown
page execute and read and write
286288F3000
heap
page read and write
2862DA5C000
trusted library allocation
page read and write
28639496000
trusted library allocation
page read and write
5D4000
heap
page read and write
45D1000
heap
page read and write
300E000
stack
page read and write
49F000
unkown
page execute and read and write
4133000
heap
page read and write
286288C7000
heap
page read and write
443F000
stack
page read and write
43B6000
heap
page read and write
2862EE00000
trusted library allocation
page read and write
25C6D9C0000
heap
page read and write
6471000
heap
page read and write
310000
unkown
page read and write
286288D8000
heap
page read and write
DE1000
heap
page read and write
22A02000
heap
page read and write
2862E652000
trusted library allocation
page read and write
238F46F6000
trusted library allocation
page read and write
238E7600000
trusted library allocation
page read and write
4841000
heap
page read and write
238E760D000
trusted library allocation
page read and write
6471000
heap
page read and write
2863C23B000
trusted library allocation
page read and write
229F4000
heap
page read and write
286321DF000
trusted library allocation
page read and write
45C000
unkown
page execute and read and write
6471000
heap
page read and write
10F4000
heap
page read and write
28630FFA000
trusted library allocation
page read and write
5580000
direct allocation
page execute and read and write
2C8E000
stack
page read and write
4F24000
direct allocation
page execute and read and write
5D4000
heap
page read and write
4841000
heap
page read and write
238F43D9000
trusted library allocation
page read and write
2862ED09000
trusted library allocation
page read and write
28632F13000
trusted library allocation
page read and write
4841000
heap
page read and write
238F6C00000
trusted library allocation
page read and write
2862E803000
trusted library allocation
page read and write
2862E103000
trusted library allocation
page read and write
45D1000
heap
page read and write
2863216C000
trusted library allocation
page read and write
1B73000
heap
page read and write
2862E512000
trusted library allocation
page read and write
286288BF000
heap
page read and write
28632186000
trusted library allocation
page read and write
1E42000
heap
page read and write
238F457C000
trusted library allocation
page read and write
2863B143000
trusted library allocation
page read and write
F12000
unkown
page execute and read and write
286321CC000
trusted library allocation
page read and write
28631FC3000
trusted library allocation
page read and write
43B1000
heap
page read and write
28630AC8000
trusted library allocation
page read and write
4F61000
heap
page read and write
6471000
heap
page read and write
2862E349000
trusted library allocation
page read and write
9C000
stack
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
28632197000
trusted library allocation
page read and write
238F2E9C000
trusted library allocation
page read and write
2863C15C000
trusted library allocation
page read and write
286288CF000
heap
page read and write
28631B89000
trusted library allocation
page read and write
7E2000
unkown
page execute and read and write
1F414516000
trusted library allocation
page read and write
28630C2F000
trusted library allocation
page read and write
BA4000
heap
page read and write
28630FC6000
trusted library allocation
page read and write
50F1000
heap
page read and write
229F7000
heap
page read and write
286288BF000
heap
page read and write
6471000
heap
page read and write
2863217D000
trusted library allocation
page read and write
286288C8000
heap
page read and write
6471000
heap
page read and write
45C000
unkown
page execute and read and write
6471000
heap
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
286321A5000
trusted library allocation
page read and write
4F61000
heap
page read and write
4F61000
heap
page read and write
1603000
heap
page read and write
238F2FD2000
trusted library allocation
page read and write
D30000
direct allocation
page read and write
2862D98B000
trusted library allocation
page read and write
6471000
heap
page read and write
27AF1164000
trusted library allocation
page read and write
28630DFD000
trusted library allocation
page read and write
50F1000
heap
page read and write
28621AE3000
trusted library allocation
page read and write
238F44F3000
trusted library allocation
page read and write
45FF000
stack
page read and write
1F414190000
heap
page readonly
286288D8000
heap
page read and write
4F61000
heap
page read and write
4841000
heap
page read and write
2862D3F0000
trusted library allocation
page read and write
637000
unkown
page execute and write copy
238F2FD4000
trusted library allocation
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
286288D9000
heap
page read and write
50F1000
heap
page read and write
28631962000
trusted library allocation
page read and write
50F1000
heap
page read and write
1CC7000
heap
page read and write
29EB000
heap
page read and write
6471000
heap
page read and write
286288F6000
heap
page read and write
69F000
unkown
page execute and read and write
2862EF00000
trusted library allocation
page read and write
229F7000
heap
page read and write
50F1000
heap
page read and write
2862D418000
trusted library allocation
page read and write
57F1000
heap
page read and write
286288CD000
heap
page read and write
214A000
heap
page read and write
19BF000
stack
page read and write
2862E0DD000
trusted library allocation
page read and write
3C6E000
stack
page read and write
6471000
heap
page read and write
B84A03E000
stack
page read and write
238F52E0000
trusted library allocation
page read and write
45D1000
heap
page read and write
B8411DF000
stack
page read and write
28631C03000
trusted library allocation
page read and write
F06000
unkown
page execute and read and write
4E90000
direct allocation
page execute and read and write
50F1000
heap
page read and write
2286000
heap
page read and write
4830000
direct allocation
page read and write
22A12000
heap
page read and write
2067000
heap
page read and write
EAE000
stack
page read and write
BA4000
heap
page read and write
42CE000
stack
page read and write
2863229F000
trusted library allocation
page read and write
57F1000
heap
page read and write
28632000000
trusted library allocation
page read and write
6471000
heap
page read and write
1BFD000
heap
page read and write
2392000
heap
page read and write
964B678000
stack
page read and write
286288C1000
heap
page read and write
41AE000
stack
page read and write
671E000
heap
page read and write
2863C2F2000
trusted library allocation
page read and write
373E000
stack
page read and write
286288C1000
heap
page read and write
2038000
heap
page read and write
C72000
unkown
page execute and read and write
238F4503000
trusted library allocation
page read and write
311000
unkown
page execute and write copy
5170000
direct allocation
page execute and read and write
5020000
heap
page read and write
D30000
direct allocation
page read and write
22A13000
heap
page read and write
4E2E000
stack
page read and write
D30000
direct allocation
page read and write
B8433FF000
stack
page read and write
244C000
unkown
page readonly
2862E0DD000
trusted library allocation
page read and write
4CE0000
direct allocation
page execute and read and write
6471000
heap
page read and write
2BBE000
stack
page read and write
427000
unkown
page write copy
B84A1BB000
stack
page read and write
238E7260000
heap
page read and write
B847EFD000
stack
page read and write
27AF0F50000
heap
page read and write
1F413F90000
remote allocation
page read and write
286288BF000
heap
page read and write
28630E7D000
trusted library allocation
page read and write
50F1000
heap
page read and write
238F714E000
trusted library allocation
page read and write
28632C41000
trusted library allocation
page read and write
5140000
direct allocation
page execute and read and write
E3F000
heap
page read and write
3F6F000
stack
page read and write
2862E600000
trusted library allocation
page read and write
45D1000
heap
page read and write
412F000
stack
page read and write
4C90000
direct allocation
page execute and read and write
2BFF000
stack
page read and write
57F1000
heap
page read and write
229F7000
heap
page read and write
2272000
heap
page read and write
286288FD000
heap
page read and write
28621AEE000
trusted library allocation
page read and write
530000
heap
page read and write
4F61000
heap
page read and write
2E4000
heap
page read and write
2863203C000
trusted library allocation
page read and write
286288FC000
heap
page read and write
286329C5000
trusted library allocation
page read and write
E13000
heap
page read and write
E00000
heap
page read and write
238F3793000
trusted library allocation
page read and write
6471000
heap
page read and write
400000
unkown
page execute and read and write
2C4F000
stack
page read and write
35AE000
stack
page read and write
E4A000
heap
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
238F71A0000
trusted library allocation
page read and write
964A35E000
stack
page read and write
2F6E000
stack
page read and write
22AF000
heap
page read and write
6471000
heap
page read and write
238F7203000
trusted library allocation
page read and write
2014000
heap
page read and write
229F0000
heap
page read and write
57F1000
heap
page read and write
238F4303000
trusted library allocation
page read and write
43B1000
heap
page read and write
45D1000
heap
page read and write
28CAF000
stack
page read and write
286288CF000
heap
page read and write
6471000
heap
page read and write
4B5000
unkown
page execute and write copy
57F1000
heap
page read and write
2863BFDC000
trusted library allocation
page read and write
596E000
stack
page read and write
4F24000
direct allocation
page execute and read and write
DC6000
heap
page read and write
4990000
direct allocation
page execute and read and write
D74000
heap
page read and write
2862E1BE000
trusted library allocation
page read and write
238F5100000
trusted library allocation
page read and write
286288C1000
heap
page read and write
4F61000
heap
page read and write
38CF000
stack
page read and write
4D50000
direct allocation
page execute and read and write
286288F7000
heap
page read and write
D81FD3E000
unkown
page readonly
1BF0000
heap
page read and write
6471000
heap
page read and write
286312EC000
trusted library allocation
page read and write
238F4B03000
trusted library allocation
page read and write
50F1000
heap
page read and write
6D71000
heap
page read and write
2862DEB3000
trusted library allocation
page read and write
EF0000
direct allocation
page read and write
45D1000
heap
page read and write
2862D324000
trusted library allocation
page read and write
28630ADF000
trusted library allocation
page read and write
2862D281000
trusted library allocation
page read and write
322E000
heap
page read and write
2863C2FC000
trusted library allocation
page read and write
57F1000
heap
page read and write
50F1000
heap
page read and write
2862E900000
trusted library allocation
page read and write
238F4C0A000
trusted library allocation
page read and write
28631031000
trusted library allocation
page read and write
6470000
heap
page read and write
607000
unkown
page execute and read and write
286288CA000
heap
page read and write
4850000
direct allocation
page read and write
2047000
heap
page read and write
F34000
heap
page read and write
2863106A000
trusted library allocation
page read and write
1CA62000
heap
page read and write
6C23D000
unkown
page readonly
238E73C0000
heap
page read and write
49E0000
direct allocation
page execute and read and write
3FBF000
stack
page read and write
2ECF000
stack
page read and write
45D1000
heap
page read and write
2863C212000
trusted library allocation
page read and write
E20000
heap
page read and write
205D000
heap
page read and write
400000
unkown
page execute and read and write
50F1000
heap
page read and write
238F4400000
trusted library allocation
page read and write
50F1000
heap
page read and write
28630C62000
trusted library allocation
page read and write
2863270E000
trusted library allocation
page read and write
45D1000
heap
page read and write
4990000
direct allocation
page execute and read and write
4F61000
heap
page read and write
28631F5D000
trusted library allocation
page read and write
6471000
heap
page read and write
3B7F000
stack
page read and write
F40000
direct allocation
page read and write
40FF000
stack
page read and write
3A0E000
stack
page read and write
2460000
heap
page read and write
286288E5000
heap
page read and write
11A5000
heap
page read and write
286288D3000
heap
page read and write
2862E315000
trusted library allocation
page read and write
665B000
stack
page read and write
5740000
heap
page read and write
286288D3000
heap
page read and write
27AF1000000
trusted library allocation
page read and write
36FF000
stack
page read and write
28630A7E000
trusted library allocation
page read and write
2862DB16000
trusted library allocation
page read and write
2863BF79000
trusted library allocation
page read and write
2128000
heap
page read and write
286288FD000
heap
page read and write
50F1000
heap
page read and write
286322F1000
trusted library allocation
page read and write
6471000
heap
page read and write
57F1000
heap
page read and write
2862D95B000
trusted library allocation
page read and write
2862E65A000
trusted library allocation
page read and write
4F50000
direct allocation
page read and write
4E84000
direct allocation
page execute and read and write
45D1000
heap
page read and write
238F5268000
trusted library allocation
page read and write
6524000
heap
page read and write
BA4000
heap
page read and write
43D0000
heap
page read and write
50F1000
heap
page read and write
2862E124000
trusted library allocation
page read and write
E49000
heap
page read and write
286318B8000
trusted library allocation
page read and write
286288CE000
heap
page read and write
28630F8B000
trusted library allocation
page read and write
4F61000
heap
page read and write
238E8F46000
heap
page read and write
238F3796000
trusted library allocation
page read and write
45D1000
heap
page read and write
5180000
direct allocation
page execute and read and write
BA4000
heap
page read and write
249A000
heap
page read and write
2D3F000
stack
page read and write
4841000
heap
page read and write
286288BF000
heap
page read and write
50F1000
heap
page read and write
286288C8000
heap
page read and write
153E000
stack
page read and write
229F7000
heap
page read and write
2863BF7D000
trusted library allocation
page read and write
238E73C5000
heap
page read and write
2E4000
heap
page read and write
6471000
heap
page read and write
6471000
heap
page read and write
B7D000
stack
page read and write
2863217D000
trusted library allocation
page read and write
57F1000
heap
page read and write
45D1000
heap
page read and write
50F1000
heap
page read and write
2863BFDF000
trusted library allocation
page read and write
6471000
heap
page read and write
2863B143000
trusted library allocation
page read and write
4E73000
direct allocation
page execute and read and write
2862DB99000
trusted library allocation
page read and write
50F1000
heap
page read and write
2085000
heap
page read and write
4B5000
unkown
page execute and write copy
28621B60000
trusted library section
page read and write
6471000
heap
page read and write
238F2F00000
trusted library allocation
page read and write
45D1000
heap
page read and write
286288CC000
heap
page read and write
238F712E000
trusted library allocation
page read and write
D70000
direct allocation
page read and write
24A000
stack
page read and write
CEE000
stack
page read and write
286288F2000
heap
page read and write
50F1000
heap
page read and write
2862DAFE000
trusted library allocation
page read and write
4691000
heap
page read and write
3BAF000
stack
page read and write
2862DC00000
trusted library allocation
page read and write
F34000
heap
page read and write
6471000
heap
page read and write
4841000
heap
page read and write
45D1000
heap
page read and write
4F61000
heap
page read and write
57F1000
heap
page read and write
238F524A000
trusted library allocation
page read and write
4F61000
heap
page read and write
238F52E3000
trusted library allocation
page read and write
B8495BE000
stack
page read and write
20BE000
heap
page read and write
6471000
heap
page read and write
1C37F000
stack
page read and write
286288CE000
heap
page read and write
57F1000
heap
page read and write
28630E6A000
trusted library allocation
page read and write
8350000
heap
page read and write
4F24000
direct allocation
page execute and read and write
4B6B000
stack
page read and write
2863207E000
trusted library allocation
page read and write
427F000
stack
page read and write
229EA000
heap
page read and write
2862EE09000
trusted library allocation
page read and write
238F522A000
trusted library allocation
page read and write
647F000
heap
page read and write
43B1000
heap
page read and write
2863275B000
trusted library allocation
page read and write
4841000
heap
page read and write
57F1000
heap
page read and write
50F1000
heap
page read and write
4841000
heap
page read and write
4F61000
heap
page read and write
4841000
heap
page read and write
28631840000
trusted library allocation
page read and write
28630CCC000
trusted library allocation
page read and write
1CB000
unkown
page execute and read and write
4F61000
heap
page read and write
28631950000
trusted library allocation
page read and write
4F20000
direct allocation
page execute and read and write
4E99000
direct allocation
page execute and read and write
286288EA000
heap
page read and write
49B0000
direct allocation
page execute and read and write
6471000
heap
page read and write
2E4000
heap
page read and write
286288E5000
heap
page read and write
2862D290000
trusted library allocation
page read and write
32CE000
stack
page read and write
28630A61000
trusted library allocation
page read and write
2E4000
heap
page read and write
2863254F000
trusted library allocation
page read and write
6471000
heap
page read and write
238F5213000
trusted library allocation
page read and write
477E000
stack
page read and write
286321FD000
trusted library allocation
page read and write
286288CF000
heap
page read and write
317F000
stack
page read and write
2862E3A1000
trusted library allocation
page read and write
45D1000
heap
page read and write
5100000
direct allocation
page execute and read and write
2863219F000
trusted library allocation
page read and write
286288FB000
heap
page read and write
5A7000
unkown
page execute and read and write
304E000
stack
page read and write
50F1000
heap
page read and write
B84273E000
stack
page read and write
28631339000
heap
page read and write
238F2BF4000
heap
page read and write
286288C7000
heap
page read and write
42A0000
heap
page read and write
377E000
stack
page read and write
96527FE000
stack
page read and write
6471000
heap
page read and write
3C4F000
stack
page read and write
286288C1000
heap
page read and write
238F6A6F000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
43B1000
heap
page read and write
D74000
heap
page read and write
6471000
heap
page read and write
2862DEAE000
trusted library allocation
page read and write
50F1000
heap
page read and write
1650000
heap
page read and write
50F1000
heap
page read and write
22A02000
heap
page read and write
2B9000
unkown
page read and write
464F000
stack
page read and write
238F2FA3000
trusted library allocation
page read and write
379000
unkown
page read and write
4841000
heap
page read and write
2862E0EC000
trusted library allocation
page read and write
450000
heap
page read and write
4841000
heap
page read and write
28632262000
trusted library allocation
page read and write
50F1000
heap
page read and write
28630C03000
trusted library allocation
page read and write
50F1000
heap
page read and write
2CBE000
stack
page read and write
286321C9000
trusted library allocation
page read and write
2862F322000
trusted library allocation
page read and write
6471000
heap
page read and write
238F3747000
trusted library allocation
page read and write
B8478F9000
stack
page read and write
7DA8000
heap
page read and write
FFD000
stack
page read and write
2862EA2E000
trusted library allocation
page read and write
2862D617000
trusted library allocation
page read and write
28632181000
trusted library allocation
page read and write
57F1000
heap
page read and write
28632147000
trusted library allocation
page read and write
1030000
heap
page read and write
6471000
heap
page read and write
6471000
heap
page read and write
238F4E09000
trusted library allocation
page read and write
6AA000
heap
page read and write
50F1000
heap
page read and write
5580000
heap
page read and write
E7F000
stack
page read and write
28631CFD000
trusted library allocation
page read and write
6471000
heap
page read and write
238F3482000
trusted library allocation
page read and write
3F70000
heap
page read and write
45D1000
heap
page read and write
238E8F6F000
heap
page read and write
28AB5000
heap
page read and write
2179000
heap
page read and write
2862E0A6000
trusted library allocation
page read and write
6471000
heap
page read and write
2863BEB2000
trusted library allocation
page read and write
52C0000
heap
page read and write
BA4000
heap
page read and write
52CE000
stack
page read and write
45D1000
heap
page read and write
28630EB6000
trusted library allocation
page read and write
43B1000
heap
page read and write
286288BF000
heap
page read and write
43B1000
heap
page read and write
57F1000
heap
page read and write
28632150000
trusted library allocation
page read and write
229F0000
heap
page read and write
2862E35A000
trusted library allocation
page read and write
286325AC000
trusted library allocation
page read and write
10F4000
heap
page read and write
27AF1147000
trusted library allocation
page read and write
50F1000
heap
page read and write
3E3E000
stack
page read and write
286288BC000
heap
page read and write
2862E63E000
trusted library allocation
page read and write
2863B700000
trusted library allocation
page read and write
28632E03000
trusted library allocation
page read and write
1DC5000
heap
page read and write
B84A2FC000
stack
page read and write
2863C1B7000
trusted library allocation
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
286321FA000
trusted library allocation
page read and write
387E000
stack
page read and write
2862D349000
trusted library allocation
page read and write
2AFE000
stack
page read and write
6471000
heap
page read and write
2862D203000
trusted library allocation
page read and write
50F1000
heap
page read and write
F34000
heap
page read and write
286288C4000
heap
page read and write
4C6000
unkown
page execute and write copy
10F4000
heap
page read and write
6A0000
heap
page read and write
57F1000
heap
page read and write
57F1000
heap
page read and write
50F1000
heap
page read and write
326E000
stack
page read and write
4B4E000
stack
page read and write
1D10000
heap
page read and write
2862D290000
trusted library allocation
page read and write
26A0000
direct allocation
page read and write
964BA5F000
stack
page read and write
4F61000
heap
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
286288CF000
heap
page read and write
2862E503000
trusted library allocation
page read and write
4841000
heap
page read and write
4830000
direct allocation
page read and write
50F1000
heap
page read and write
63E000
unkown
page execute and read and write
50F1000
heap
page read and write
238F2ED3000
trusted library allocation
page read and write
964DFFE000
stack
page read and write
454E000
stack
page read and write
27AF112E000
trusted library allocation
page read and write
DF1000
heap
page read and write
6471000
heap
page read and write
DF9000
unkown
page execute and read and write
4841000
heap
page read and write
286288E6000
heap
page read and write
169B000
heap
page read and write
238F4909000
trusted library allocation
page read and write
28DE000
stack
page read and write
286288D3000
heap
page read and write
50F1000
heap
page read and write
286317D9000
trusted library allocation
page read and write
2863229B000
trusted library allocation
page read and write
238F3413000
trusted library allocation
page read and write
4830000
direct allocation
page read and write
2862DB00000
trusted library allocation
page read and write
238F2E24000
trusted library allocation
page read and write
20E6000
heap
page read and write
2862E128000
trusted library allocation
page read and write
418F000
stack
page read and write
2577000
heap
page read and write
6471000
heap
page read and write
238F522E000
trusted library allocation
page read and write
22A02000
heap
page read and write
229E7000
heap
page read and write
2863256B000
trusted library allocation
page read and write
4841000
heap
page read and write
28631538000
trusted library allocation
page read and write
4F61000
heap
page read and write
57F1000
heap
page read and write
57F1000
heap
page read and write
6471000
heap
page read and write
4841000
heap
page read and write
B84607B000
stack
page read and write
28630F91000
trusted library allocation
page read and write
286288FC000
heap
page read and write
4D80000
direct allocation
page execute and read and write
286288EB000
heap
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
2863C1CB000
trusted library allocation
page read and write
4F61000
heap
page read and write
B84A37E000
stack
page read and write
286288F8000
heap
page read and write
2E4000
heap
page read and write
486B000
stack
page read and write
6471000
heap
page read and write
286288D3000
heap
page read and write
4F61000
heap
page read and write
5644000
direct allocation
page execute and read and write
286321DF000
trusted library allocation
page read and write
2863225C000
trusted library allocation
page read and write
229F1000
heap
page read and write
286288BF000
heap
page read and write
964E7FE000
stack
page read and write
EC000
stack
page read and write
637000
unkown
page execute and read and write
6471000
heap
page read and write
50F1000
heap
page read and write
314F000
stack
page read and write
4A10000
trusted library allocation
page read and write
211B000
heap
page read and write
3227000
heap
page read and write
675C000
stack
page read and write
4FE1000
direct allocation
page read and write
50F1000
heap
page read and write
286288C1000
heap
page read and write
6471000
heap
page read and write
BA4000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
6471000
heap
page read and write
28628901000
heap
page read and write
2DBF000
stack
page read and write
2E4000
heap
page read and write
43B1000
heap
page read and write
36E000
stack
page read and write
1F41435D000
trusted library allocation
page read and write
964A31E000
stack
page read and write
286288CC000
heap
page read and write
238F2C05000
heap
page read and write
28621610000
unclassified section
page readonly
2863218A000
trusted library allocation
page read and write
27AF1172000
trusted library allocation
page read and write
2863205F000
trusted library allocation
page read and write
27AF1640000
heap
page read and write
2862D613000
trusted library allocation
page read and write
91B0000
heap
page read and write
28621770000
trusted library allocation
page read and write
4C80000
trusted library allocation
page read and write
238F3838000
trusted library allocation
page read and write
45D1000
heap
page read and write
28632EA9000
trusted library allocation
page read and write
39CF000
stack
page read and write
2862E865000
trusted library allocation
page read and write
C99000
unkown
page write copy
591E1FA000
stack
page read and write
964A39B000
stack
page read and write
50F1000
heap
page read and write
32EF000
stack
page read and write
2862E09E000
trusted library allocation
page read and write
2863217D000
trusted library allocation
page read and write
286394C0000
trusted library allocation
page read and write
57F1000
heap
page read and write
2862DBF4000
trusted library allocation
page read and write
4F61000
heap
page read and write
6471000
heap
page read and write
416F000
stack
page read and write
4F2C000
direct allocation
page execute and read and write
2A3E000
stack
page read and write
28631A71000
trusted library allocation
page read and write
668F000
stack
page read and write
50F1000
heap
page read and write
286288F1000
heap
page read and write
28BF000
stack
page read and write
2863BF70000
trusted library allocation
page read and write
45E0000
heap
page read and write
2863BFEE000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
28621AD7000
trusted library allocation
page read and write
2863250A000
trusted library allocation
page read and write
28632AF5000
trusted library allocation
page read and write
343E000
stack
page read and write
6471000
heap
page read and write
57F1000
heap
page read and write
229F7000
heap
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
3E7F000
stack
page read and write
400000
unkown
page execute and read and write
28632330000
trusted library section
page read and write
D60000
heap
page read and write
390000
unkown
page readonly
28632A01000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
28632BF6000
trusted library allocation
page read and write
238F6F00000
trusted library allocation
page read and write
2862E95C000
trusted library allocation
page read and write
2B7C000
stack
page read and write
45AF000
stack
page read and write
464000
unkown
page execute and write copy
315E000
stack
page read and write
238F4600000
trusted library allocation
page read and write
4F61000
heap
page read and write
5461000
direct allocation
page read and write
28630C00000
trusted library allocation
page read and write
28631203000
trusted library allocation
page read and write
6D92000
heap
page read and write
F28B37E000
unkown
page readonly
198000
stack
page read and write
1BC4000
heap
page read and write
4841000
heap
page read and write
57F1000
heap
page read and write
2863136A000
heap
page read and write
55E0000
direct allocation
page execute and read and write
4840000
heap
page read and write
2862DEB6000
trusted library allocation
page read and write
4E60000
direct allocation
page execute and read and write
28631E45000
trusted library allocation
page read and write
6471000
heap
page read and write
286288FD000
heap
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
286328F8000
trusted library allocation
page read and write
2863135A000
heap
page read and write
238F45DC000
trusted library allocation
page read and write
2863107C000
trusted library allocation
page read and write
43B1000
heap
page read and write
286288DC000
heap
page read and write
1F414140000
heap
page read and write
6471000
heap
page read and write
4F61000
heap
page read and write
28630EA7000
trusted library allocation
page read and write
4990000
direct allocation
page execute and read and write
43EF000
stack
page read and write
28639032000
trusted library allocation
page read and write
286288F6000
heap
page read and write
4E84000
direct allocation
page execute and read and write
96515FD000
stack
page read and write
2863208E000
trusted library allocation
page read and write
25422D304000
trusted library allocation
page read and write
372000
unkown
page execute and read and write
D74000
heap
page read and write
57F1000
heap
page read and write
45D1000
heap
page read and write
1D0A000
heap
page read and write
27AF1103000
trusted library allocation
page read and write
1BC4000
heap
page read and write
28632BDF000
trusted library allocation
page read and write
28628901000
heap
page read and write
2863216C000
trusted library allocation
page read and write
22A21000
heap
page read and write
50F1000
heap
page read and write
286313B3000
heap
page read and write
6471000
heap
page read and write
28631DAE000
trusted library allocation
page read and write
B84A54B000
stack
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
2862DF03000
trusted library allocation
page read and write
1C7C000
heap
page read and write
25D0000
heap
page execute and read and write
28632186000
trusted library allocation
page read and write
57F1000
heap
page read and write
286326C3000
trusted library allocation
page read and write
2204000
heap
page read and write
57F1000
heap
page read and write
28631247000
trusted library allocation
page read and write
4C30000
direct allocation
page execute and read and write
2862DF64000
trusted library allocation
page read and write
286288C7000
heap
page read and write
42EE000
stack
page read and write
E3303FD000
stack
page read and write
4F61000
heap
page read and write
D70000
direct allocation
page read and write
238F2BEE000
heap
page read and write
57F1000
heap
page read and write
5D4000
heap
page read and write
2E7F000
stack
page read and write
2862E357000
trusted library allocation
page read and write
CCC000
stack
page read and write
28632E49000
trusted library allocation
page read and write
57F1000
heap
page read and write
238F44BF000
trusted library allocation
page read and write
238F3873000
trusted library allocation
page read and write
286313A9000
heap
page read and write
50F1000
heap
page read and write
4F61000
heap
page read and write
286323E0000
trusted library section
page read and write
57F1000
heap
page read and write
306F000
stack
page read and write
57E0000
heap
page read and write
43B1000
heap
page read and write
2862E723000
trusted library allocation
page read and write
6471000
heap
page read and write
2862DC8B000
trusted library allocation
page read and write
51AD000
stack
page read and write
238F2FED000
trusted library allocation
page read and write
57F1000
heap
page read and write
2862D646000
trusted library allocation
page read and write
6471000
heap
page read and write
286348D6000
trusted library allocation
page read and write
4841000
heap
page read and write
28630A69000
trusted library allocation
page read and write
33EF000
stack
page read and write
43B1000
heap
page read and write
238F471F000
trusted library allocation
page read and write
45D1000
heap
page read and write
4F61000
heap
page read and write
464000
unkown
page execute and write copy
2862DCCE000
trusted library allocation
page read and write
286288F6000
heap
page read and write
286313AB000
heap
page read and write
2E4000
heap
page read and write
50F1000
heap
page read and write
286288F7000
heap
page read and write
28632801000
trusted library allocation
page read and write
2863BE9B000
trusted library allocation
page read and write
4841000
heap
page read and write
B84A8FF000
stack
page read and write
2D70000
heap
page read and write
21B4000
heap
page read and write
5030000
heap
page read and write
286288C7000
heap
page read and write
6471000
heap
page read and write
6AE000
heap
page read and write
4841000
heap
page read and write
430E000
stack
page read and write
2D77000
heap
page read and write
50F1000
heap
page read and write
2862E5B7000
trusted library allocation
page read and write
F0E000
heap
page read and write
EA4000
heap
page read and write
49E0000
direct allocation
page execute and read and write
57F1000
heap
page read and write
27AF1200000
trusted library allocation
page read and write
EA4000
heap
page read and write
4F61000
heap
page read and write
2862DE6D000
trusted library allocation
page read and write
440F000
stack
page read and write
364F000
stack
page read and write
E90000
direct allocation
page read and write
2863094C000
trusted library allocation
page read and write
45D1000
heap
page read and write
286321A7000
trusted library allocation
page read and write
28630AF9000
trusted library allocation
page read and write
286320B7000
trusted library allocation
page read and write
28621BB0000
unclassified section
page read and write
50F1000
heap
page read and write
286288C8000
heap
page read and write
2862E36C000
trusted library allocation
page read and write
BA4000
heap
page read and write
EF0000
direct allocation
page read and write
2862E641000
trusted library allocation
page read and write
286312FE000
trusted library allocation
page read and write
3FB0000
direct allocation
page execute and read and write
2863C18F000
trusted library allocation
page read and write
4841000
heap
page read and write
B84A87F000
stack
page read and write
2862E5BF000
trusted library allocation
page read and write
638000
unkown
page execute and write copy
50F1000
heap
page read and write
286321F5000
trusted library allocation
page read and write
609000
unkown
page execute and write copy
19EF000
stack
page read and write
1B30000
heap
page read and write
50F1000
heap
page read and write
28632300000
heap
page read and write
5590000
direct allocation
page execute and read and write
28AA1000
heap
page read and write
310000
unkown
page read and write
2863217B000
trusted library allocation
page read and write
125F000
stack
page read and write
50F1000
heap
page read and write
238F2D7F000
trusted library allocation
page read and write
BA4000
heap
page read and write
286288D3000
heap
page read and write
1C59F000
stack
page read and write
4F61000
heap
page read and write
2863BFD2000
trusted library allocation
page read and write
21AF000
heap
page read and write
40AF000
stack
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
286326FB000
trusted library allocation
page read and write
2862E196000
trusted library allocation
page read and write
7DA2000
heap
page read and write
286288F7000
heap
page read and write
25C6DAD0000
heap
page read and write
286288F6000
heap
page read and write
57F1000
heap
page read and write
4E2E000
stack
page read and write
28630DAD000
trusted library allocation
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
9E0000
heap
page read and write
238F385C000
trusted library allocation
page read and write
244C000
unkown
page readonly
4A10000
direct allocation
page execute and read and write
45D1000
heap
page read and write
28630A8E000
trusted library allocation
page read and write
286394F7000
trusted library allocation
page read and write
423000
unkown
page execute and read and write
B90000
heap
page read and write
B84A4BE000
stack
page read and write
28621A03000
trusted library allocation
page read and write
1F0000
heap
page read and write
50F1000
heap
page read and write
22A22000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
1DAB000
heap
page read and write
2862345F000
heap
page read and write
1C2000
unkown
page execute and read and write
1BD5000
heap
page read and write
6A7F000
stack
page read and write
4F61000
heap
page read and write
2863219D000
trusted library allocation
page read and write
238F3466000
trusted library allocation
page read and write
C31000
unkown
page execute and write copy
286288D5000
heap
page read and write
50F1000
heap
page read and write
F28C3FE000
unkown
page readonly
2863204C000
trusted library allocation
page read and write
4841000
heap
page read and write
2E4000
heap
page read and write
4AAE000
stack
page read and write
C7473FC000
stack
page read and write
286322BD000
trusted library allocation
page read and write
238F7239000
trusted library allocation
page read and write
28630A7A000
trusted library allocation
page read and write
286288FD000
heap
page read and write
4857000
heap
page read and write
F57000
unkown
page execute and write copy
E4D000
heap
page read and write
50F1000
heap
page read and write
238F37B5000
trusted library allocation
page read and write
28630CDC000
trusted library allocation
page read and write
238F3480000
trusted library allocation
page read and write
2862D615000
trusted library allocation
page read and write
C11000
unkown
page execute and write copy
286322BF000
trusted library allocation
page read and write
61EB4000
direct allocation
page read and write
367F000
stack
page read and write
286288CF000
heap
page read and write
28632B71000
trusted library allocation
page read and write
1C950000
heap
page read and write
354E000
stack
page read and write
2862DDCC000
trusted library allocation
page read and write
2E4000
heap
page read and write
2863217B000
trusted library allocation
page read and write
50F1000
heap
page read and write
286318EA000
trusted library allocation
page read and write
28631EFE000
trusted library allocation
page read and write
286321CC000
trusted library allocation
page read and write
50F1000
heap
page read and write
45D1000
heap
page read and write
229EE000
heap
page read and write
28632197000
trusted library allocation
page read and write
1D30000
heap
page read and write
50F1000
heap
page read and write
2862D67E000
trusted library allocation
page read and write
238F347D000
trusted library allocation
page read and write
2863229E000
trusted library allocation
page read and write
28632400000
trusted library allocation
page read and write
27AF1232000
trusted library allocation
page read and write
BA4000
heap
page read and write
4F61000
heap
page read and write
57F1000
heap
page read and write
6471000
heap
page read and write
28630EC0000
trusted library allocation
page read and write
6D80000
heap
page read and write
368E000
stack
page read and write
2863C21D000
trusted library allocation
page read and write
5570000
direct allocation
page execute and read and write
2863262B000
trusted library allocation
page read and write
43B1000
heap
page read and write
4BD000
unkown
page readonly
28632562000
trusted library allocation
page read and write
286288F8000
heap
page read and write
2FEE000
stack
page read and write
2862D6F5000
trusted library allocation
page read and write
238E7420000
trusted library allocation
page execute read
303F000
stack
page read and write
E80000
heap
page read and write
43B1000
heap
page read and write
286288BC000
heap
page read and write
6471000
heap
page read and write
4841000
heap
page read and write
6471000
heap
page read and write
28621A00000
trusted library allocation
page read and write
50F1000
heap
page read and write
286288D5000
heap
page read and write
28630AF5000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
EA4000
heap
page read and write
286321A7000
trusted library allocation
page read and write
286288D3000
heap
page read and write
34BE000
stack
page read and write
286288E2000
heap
page read and write
28634864000
trusted library allocation
page read and write
6471000
heap
page read and write
28632259000
trusted library allocation
page read and write
D74000
heap
page read and write
1C49000
heap
page read and write
50F1000
heap
page read and write
2862D2CC000
trusted library allocation
page read and write
1F41450C000
trusted library allocation
page read and write
4F61000
heap
page read and write
9651DFD000
stack
page read and write
43B1000
heap
page read and write
F34000
heap
page read and write
10E0000
direct allocation
page read and write
E07000
heap
page read and write
1F414303000
trusted library allocation
page read and write
2862E1FC000
trusted library allocation
page read and write
45D1000
heap
page read and write
53F0000
direct allocation
page read and write
4D1E000
stack
page read and write
50F1000
heap
page read and write
238F43C6000
trusted library allocation
page read and write
2862E08E000
trusted library allocation
page read and write
28630EC6000
trusted library allocation
page read and write
D30000
direct allocation
page read and write
4841000
heap
page read and write
45D1000
heap
page read and write
2863219D000
trusted library allocation
page read and write
5200000
direct allocation
page execute and read and write
50F1000
heap
page read and write
286288EA000
heap
page read and write
50F1000
heap
page read and write
D70000
direct allocation
page read and write
380000
heap
page read and write
2863219F000
trusted library allocation
page read and write
50F1000
heap
page read and write
286288CD000
heap
page read and write
6471000
heap
page read and write
349000
unkown
page execute and read and write
300000
heap
page read and write
6471000
heap
page read and write
1C9000
unkown
page write copy
28621AF1000
trusted library allocation
page read and write
2862D678000
trusted library allocation
page read and write
2862D6BA000
trusted library allocation
page read and write
4BF0000
direct allocation
page execute and read and write
2862D626000
trusted library allocation
page read and write
238F37EA000
trusted library allocation
page read and write
238F2D4A000
trusted library allocation
page read and write
28631F81000
trusted library allocation
page read and write
1105000
unkown
page execute and write copy
238F3751000
trusted library allocation
page read and write
28630FDC000
trusted library allocation
page read and write
238F525B000
trusted library allocation
page read and write
2862E948000
trusted library allocation
page read and write
C51000
unkown
page execute and write copy
238F2FA7000
trusted library allocation
page read and write
6471000
heap
page read and write
238F44A2000
trusted library allocation
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
40BF000
stack
page read and write
D30000
direct allocation
page read and write
229F7000
heap
page read and write
50F1000
heap
page read and write
4800000
trusted library allocation
page read and write
7E5000
unkown
page execute and write copy
57F1000
heap
page read and write
28632161000
trusted library allocation
page read and write
6471000
heap
page read and write
2862DB60000
trusted library allocation
page read and write
BA4000
heap
page read and write
C10000
unkown
page read and write
2862E0A6000
trusted library allocation
page read and write
6471000
heap
page read and write
2060000
heap
page read and write
238F2E6E000
trusted library allocation
page read and write
50F1000
heap
page read and write
B84A17E000
stack
page read and write
238F2E32000
trusted library allocation
page read and write
4F50000
direct allocation
page read and write
5744000
heap
page read and write
57F1000
heap
page read and write
2B2000
unkown
page execute and read and write
B84A2BE000
stack
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
378E000
stack
page read and write
6471000
heap
page read and write
238F34B6000
trusted library allocation
page read and write
238F7100000
trusted library allocation
page read and write
28632403000
trusted library allocation
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
2E4000
heap
page read and write
229D3000
heap
page read and write
45D1000
heap
page read and write
238E7390000
trusted library allocation
page read and write
286288D5000
heap
page read and write
29A0000
heap
page read and write
15BA000
heap
page read and write
45D1000
heap
page read and write
2862EA67000
trusted library allocation
page read and write
50F1000
heap
page read and write
238F33FE000
trusted library allocation
page read and write
50F1000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
27AF1648000
heap
page read and write
286288D5000
heap
page read and write
1F04000
heap
page read and write
286320B4000
trusted library allocation
page read and write
28632947000
trusted library allocation
page read and write
28630C2D000
trusted library allocation
page read and write
238F3410000
trusted library allocation
page read and write
37CE000
stack
page read and write
28631B65000
trusted library allocation
page read and write
2862DBF4000
trusted library allocation
page read and write
2862E7E9000
trusted library allocation
page read and write
4B71000
direct allocation
page read and write
50F1000
heap
page read and write
286288F6000
heap
page read and write
318E000
stack
page read and write
6471000
heap
page read and write
57F1000
heap
page read and write
238F52CC000
trusted library allocation
page read and write
460000
unkown
page execute and read and write
7DA3000
heap
page read and write
286288C1000
heap
page read and write
238F2FF0000
trusted library allocation
page read and write
286394B4000
trusted library allocation
page read and write
2862D2CE000
trusted library allocation
page read and write
50F1000
heap
page read and write
2862D490000
trusted library allocation
page read and write
2862F706000
trusted library allocation
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
28639016000
trusted library allocation
page read and write
D81C99E000
unkown
page readonly
57F1000
heap
page read and write
5590000
heap
page read and write
286288CD000
heap
page read and write
323F000
stack
page read and write
238F4A00000
trusted library allocation
page read and write
27AF1645000
heap
page read and write
2E4000
heap
page read and write
238F37B5000
trusted library allocation
page read and write
3B4F000
stack
page read and write
5E96000
heap
page read and write
2863BF9B000
trusted library allocation
page read and write
2863BFDF000
trusted library allocation
page read and write
238F460D000
trusted library allocation
page read and write
4841000
heap
page read and write
1D75000
heap
page read and write
2863BF63000
trusted library allocation
page read and write
28632597000
trusted library allocation
page read and write
6471000
heap
page read and write
4F00000
direct allocation
page execute and read and write
229DB000
heap
page read and write
4A20000
direct allocation
page execute and read and write
378F000
stack
page read and write
45D1000
heap
page read and write
370000
heap
page read and write
244C000
unkown
page readonly
286288C8000
heap
page read and write
5E8F000
stack
page read and write
26B7000
heap
page read and write
28632340000
trusted library section
page read and write
239C000
heap
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
286288D8000
heap
page read and write
45C000
unkown
page execute and write copy
6471000
heap
page read and write
F41000
unkown
page execute and read and write
1F41437B000
trusted library allocation
page read and write
28632197000
trusted library allocation
page read and write
28632D01000
trusted library allocation
page read and write
57F1000
heap
page read and write
28631045000
trusted library allocation
page read and write
2863C306000
trusted library allocation
page read and write
43B1000
heap
page read and write
286288C8000
heap
page read and write
22A12000
heap
page read and write
28632597000
trusted library allocation
page read and write
229F7000
heap
page read and write
2308000
heap
page read and write
28630CB0000
trusted library allocation
page read and write
3DEE000
stack
page read and write
286288CC000
heap
page read and write
2863202B000
trusted library allocation
page read and write
286288DE000
heap
page read and write
D30000
direct allocation
page read and write
4D90000
direct allocation
page execute and read and write
22A0A000
heap
page read and write
2862E5F7000
trusted library allocation
page read and write
6C43E000
unkown
page read and write
57F1000
heap
page read and write
2863208E000
trusted library allocation
page read and write
50F1000
heap
page read and write
BA4000
heap
page read and write
244C000
unkown
page readonly
E4C000
heap
page read and write
534E000
stack
page read and write
19DB000
stack
page read and write
50F1000
heap
page read and write
229EE000
heap
page read and write
4E84000
direct allocation
page execute and read and write
27AF11A5000
trusted library allocation
page read and write
2862EC00000
trusted library allocation
page read and write
45D1000
heap
page read and write
45D1000
heap
page read and write
4E00000
direct allocation
page execute and read and write
702C000
stack
page read and write
383F000
stack
page read and write
45D1000
heap
page read and write
1BC4000
heap
page read and write
6471000
heap
page read and write
6471000
heap
page read and write
238E76D1000
trusted library allocation
page read and write
2862D367000
trusted library allocation
page read and write
57F1000
heap
page read and write
1F41435B000
trusted library allocation
page read and write
6471000
heap
page read and write
4C80000
direct allocation
page execute and read and write
6471000
heap
page read and write
286288FC000
heap
page read and write
286288E5000
heap
page read and write
1C79D000
stack
page read and write
238F37B3000
trusted library allocation
page read and write
28632900000
trusted library allocation
page read and write
6471000
heap
page read and write
1DEF7F00000
heap
page read and write
286320BB000
trusted library allocation
page read and write
238F71C9000
trusted library allocation
page read and write
2863485C000
trusted library allocation
page read and write
6471000
heap
page read and write
47F0000
trusted library allocation
page read and write
4830000
direct allocation
page read and write
6471000
heap
page read and write
2862E69F000
trusted library allocation
page read and write
2863217F000
trusted library allocation
page read and write
1C3BE000
stack
page read and write
238F7199000
trusted library allocation
page read and write
286323C0000
trusted library section
page read and write
27AF121E000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
4841000
heap
page read and write
238F5223000
trusted library allocation
page read and write
50F1000
heap
page read and write
2862DC03000
trusted library allocation
page read and write
28621900000
trusted library allocation
page read and write
28630E87000
trusted library allocation
page read and write
2862E755000
trusted library allocation
page read and write
2FBF000
stack
page read and write
4841000
heap
page read and write
5633000
direct allocation
page execute and read and write
22A27000
heap
page read and write
45D1000
heap
page read and write
229F7000
heap
page read and write
1B67000
heap
page read and write
28630A7B000
trusted library allocation
page read and write
49F0000
direct allocation
page execute and read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
43B1000
heap
page read and write
2E4000
heap
page read and write
2862E9F6000
trusted library allocation
page read and write
286288D3000
heap
page read and write
DFB000
heap
page read and write
14AF000
stack
page read and write
50F1000
heap
page read and write
286327C3000
trusted library allocation
page read and write
2862DDEF000
trusted library allocation
page read and write
4BD000
unkown
page readonly
59209FE000
stack
page read and write
28630A67000
trusted library allocation
page read and write
4C50000
direct allocation
page execute and read and write
26C0000
heap
page execute and read and write
2863207E000
trusted library allocation
page read and write
3FAE000
stack
page read and write
20AC000
heap
page read and write
28632048000
trusted library allocation
page read and write
31DE000
stack
page read and write
43B1000
heap
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
2862E965000
trusted library allocation
page read and write
28D52000
heap
page read and write
286288C7000
heap
page read and write
4841000
heap
page read and write
161142804000
trusted library allocation
page read and write
6706000
heap
page read and write
66D2000
heap
page read and write
B8423FE000
stack
page read and write
43B1000
heap
page read and write
45D1000
heap
page read and write
238F3300000
trusted library allocation
page read and write
238F5289000
trusted library allocation
page read and write
1C640000
heap
page read and write
2368000
heap
page read and write
2862EA03000
trusted library allocation
page read and write
19C000
stack
page read and write
286288F6000
heap
page read and write
10E0000
direct allocation
page read and write
45D1000
heap
page read and write
1F414521000
trusted library allocation
page read and write
286288EB000
heap
page read and write
238F3724000
trusted library allocation
page read and write
4D70000
direct allocation
page execute and read and write
28631E00000
trusted library allocation
page read and write
57F1000
heap
page read and write
2863208F000
trusted library allocation
page read and write
2F031000
heap
page read and write
48BE000
stack
page read and write
39AF000
stack
page read and write
401000
unkown
page execute read
28623540000
heap
page read and write
3B4E000
stack
page read and write
4F61000
heap
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
2862D404000
trusted library allocation
page read and write
2863C112000
trusted library allocation
page read and write
286318FA000
trusted library allocation
page read and write
28631391000
heap
page read and write
57F1000
heap
page read and write
366E000
stack
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
45D1000
heap
page read and write
2862D252000
trusted library allocation
page read and write
577000
unkown
page execute and write copy
28632687000
trusted library allocation
page read and write
4F1000
unkown
page execute and read and write
286233A2000
heap
page read and write
286288DC000
heap
page read and write
27AF1181000
trusted library allocation
page read and write
4EF0000
direct allocation
page execute and read and write
229DB000
heap
page read and write
28630A8E000
trusted library allocation
page read and write
2863208E000
trusted library allocation
page read and write
452F000
stack
page read and write
43B1000
heap
page read and write
57F1000
heap
page read and write
2862DAF6000
trusted library allocation
page read and write
28632B87000
trusted library allocation
page read and write
5D4000
heap
page read and write
452000
unkown
page execute and read and write
28631707000
trusted library allocation
page read and write
229EA000
heap
page read and write
6471000
heap
page read and write
286288CD000
heap
page read and write
2863BFDC000
trusted library allocation
page read and write
28634742000
trusted library allocation
page read and write
26B0000
heap
page read and write
286288CF000
heap
page read and write
2863217F000
trusted library allocation
page read and write
347F000
stack
page read and write
6976000
heap
page read and write
6471000
heap
page read and write
E90000
direct allocation
page read and write
4A6C000
stack
page read and write
4CD0000
direct allocation
page execute and read and write
286310AB000
trusted library allocation
page read and write
57F1000
heap
page read and write
50F1000
heap
page read and write
45D1000
heap
page read and write
286288D8000
heap
page read and write
2862DD03000
trusted library allocation
page read and write
28631788000
trusted library allocation
page read and write
2125000
heap
page read and write
404E000
stack
page read and write
6D7F000
stack
page read and write
2862DDE4000
trusted library allocation
page read and write
1E07000
heap
page read and write
400000
unkown
page readonly
169B000
heap
page read and write
2B7E000
stack
page read and write
2863C278000
trusted library allocation
page read and write
3FEF000
stack
page read and write
28632670000
trusted library allocation
page read and write
28632181000
trusted library allocation
page read and write
1CA3F000
stack
page read and write
35BF000
stack
page read and write
BA4000
heap
page read and write
50F1000
heap
page read and write
45D1000
heap
page read and write
E3B000
heap
page read and write
57F1000
heap
page read and write
2E2E000
stack
page read and write
28630CD4000
trusted library allocation
page read and write
286321FA000
trusted library allocation
page read and write
286288BF000
heap
page read and write
27AF0DF2000
unclassified section
page read and write
6471000
heap
page read and write
57F1000
heap
page read and write
229F4000
heap
page read and write
28D48000
heap
page read and write
2863219F000
trusted library allocation
page read and write
50F1000
heap
page read and write
238F4314000
trusted library allocation
page read and write
F10000
unkown
page execute and read and write
2F3E000
stack
page read and write
964B67B000
stack
page read and write
57F1000
heap
page read and write
EF0000
direct allocation
page read and write
28632262000
trusted library allocation
page read and write
BA4000
heap
page read and write
28631DB0000
trusted library allocation
page read and write
2862E376000
trusted library allocation
page read and write
238F2FAE000
trusted library allocation
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
5634000
direct allocation
page execute and read and write
1F414400000
unclassified section
page readonly
1B25000
heap
page read and write
41FE000
stack
page read and write
6471000
heap
page read and write
4CAF000
stack
page read and write
4810000
heap
page read and write
4F50000
direct allocation
page read and write
3B2E000
stack
page read and write
4E30000
heap
page read and write
14FA000
stack
page read and write
30BF000
stack
page read and write
2863229E000
trusted library allocation
page read and write
1BF8000
heap
page read and write
286288BF000
heap
page read and write
2862E86B000
trusted library allocation
page read and write
D74000
heap
page read and write
2862D298000
trusted library allocation
page read and write
4F61000
heap
page read and write
4841000
heap
page read and write
3A6F000
stack
page read and write
2862DE74000
trusted library allocation
page read and write
464000
unkown
page execute and write copy
B849DFF000
stack
page read and write
286288F6000
heap
page read and write
1F414361000
trusted library allocation
page read and write
43B1000
heap
page read and write
63EF000
stack
page read and write
2862E8E8000
trusted library allocation
page read and write
337F000
stack
page read and write
238F3426000
trusted library allocation
page read and write
238F2C06000
heap
page read and write
286288CA000
heap
page read and write
2133000
heap
page read and write
43B1000
heap
page read and write
452000
unkown
page execute and read and write
238E73D0000
heap
page readonly
D74000
heap
page read and write
D8A000
heap
page read and write
238F432F000
trusted library allocation
page read and write
2863219F000
trusted library allocation
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
2BAF000
stack
page read and write
4E84000
direct allocation
page execute and read and write
26A0000
direct allocation
page read and write
6471000
heap
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
28632E7B000
trusted library allocation
page read and write
6471000
heap
page read and write
2156000
heap
page read and write
EF0000
direct allocation
page read and write
50F1000
heap
page read and write
1F414532000
trusted library allocation
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
4F61000
heap
page read and write
1F414100000
heap
page read and write
1165BDD04000
trusted library allocation
page read and write
286318F1000
trusted library allocation
page read and write
6471000
heap
page read and write
27AF1238000
trusted library allocation
page read and write
4F61000
heap
page read and write
50F1000
heap
page read and write
1C640000
heap
page read and write
164C000
heap
page read and write
28621AB8000
trusted library allocation
page read and write
360F000
stack
page read and write
2863471E000
trusted library allocation
page read and write
6471000
heap
page read and write
352F000
stack
page read and write
2862E9DE000
trusted library allocation
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
2515000
heap
page read and write
90A0000
heap
page read and write
2863229B000
trusted library allocation
page read and write
2EEE0000
heap
page read and write
1F4141A2000
unclassified section
page read and write
362F000
stack
page read and write
286394C0000
trusted library allocation
page read and write
1EEE000
heap
page read and write
162E000
heap
page read and write
50F1000
heap
page read and write
46F000
unkown
page execute and write copy
50F1000
heap
page read and write
286321CC000
trusted library allocation
page read and write
30FF000
stack
page read and write
4C6000
unkown
page execute and read and write
310000
unkown
page readonly
169D000
heap
page read and write
C30000
unkown
page readonly
4800000
heap
page read and write
45D1000
heap
page read and write
43B1000
heap
page read and write
1CBE7B75000
heap
page read and write
43B0000
heap
page read and write
2402000
heap
page read and write
160000
unkown
page read and write
238F447F000
trusted library allocation
page read and write
4C4000
unkown
page execute and read and write
19CF000
stack
page read and write
2EF2C000
stack
page read and write
44B000
unkown
page execute and read and write
45D1000
heap
page read and write
6520000
heap
page read and write
50F1000
heap
page read and write
2863208E000
trusted library allocation
page read and write
2863BF9E000
trusted library allocation
page read and write
4F61000
heap
page read and write
27AF0F1A000
heap
page read and write
2250000
heap
page read and write
28623410000
heap
page read and write
2862D36C000
trusted library allocation
page read and write
2862E54D000
trusted library allocation
page read and write
F2899D8000
stack
page read and write
28630DF5000
trusted library allocation
page read and write
637000
unkown
page execute and write copy
2862D678000
trusted library allocation
page read and write
B842BB3000
stack
page read and write
412F000
stack
page read and write
286288FC000
heap
page read and write
27AF0D70000
heap
page read and write
6471000
heap
page read and write
50D8000
heap
page read and write
433E000
stack
page read and write
238F6D00000
heap
page read and write
50F1000
heap
page read and write
2862E2FC000
trusted library allocation
page read and write
238F52C8000
trusted library allocation
page read and write
5AD000
unkown
page execute and read and write
2862DA03000
trusted library allocation
page read and write
32DE000
stack
page read and write
286288D3000
heap
page read and write
2862D495000
trusted library allocation
page read and write
4CB0000
direct allocation
page execute and read and write
F28B278000
stack
page read and write
286288CC000
heap
page read and write
286394B4000
trusted library allocation
page read and write
2862D381000
trusted library allocation
page read and write
3C8F000
stack
page read and write
2862D2F8000
trusted library allocation
page read and write
57F1000
heap
page read and write
43B1000
heap
page read and write
238F3426000
trusted library allocation
page read and write
2862DCF9000
trusted library allocation
page read and write
27AF1110000
trusted library allocation
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
286324B9000
trusted library allocation
page read and write
238F3500000
trusted library allocation
page read and write
413F000
stack
page read and write
238F7199000
trusted library allocation
page read and write
43B1000
heap
page read and write
4F61000
heap
page read and write
1C9000
unkown
page read and write
28630AF3000
trusted library allocation
page read and write
6471000
heap
page read and write
D30000
direct allocation
page read and write
28AAF000
heap
page read and write
F34000
heap
page read and write
36BE000
stack
page read and write
286326AC000
trusted library allocation
page read and write
50F1000
heap
page read and write
2863297B000
trusted library allocation
page read and write
4B01000
heap
page read and write
28630FDC000
trusted library allocation
page read and write
28630AE7000
trusted library allocation
page read and write
2862E582000
trusted library allocation
page read and write
C7473FF000
stack
page read and write
4F61000
heap
page read and write
2863226E000
trusted library allocation
page read and write
238E7630000
trusted library allocation
page read and write
518E000
stack
page read and write
42DF000
stack
page read and write
E90000
direct allocation
page read and write
2863C296000
trusted library allocation
page read and write
57F1000
heap
page read and write
EF0000
direct allocation
page read and write
238F6900000
trusted library allocation
page read and write
2862D500000
trusted library allocation
page read and write
4C4E000
stack
page read and write
B843BFE000
stack
page read and write
2862D33C000
trusted library allocation
page read and write
2862D64D000
trusted library allocation
page read and write
BA4000
heap
page read and write
4841000
heap
page read and write
238F44C8000
trusted library allocation
page read and write
46F000
unkown
page execute and write copy
C00000
heap
page read and write
49B0000
direct allocation
page execute and read and write
28632682000
trusted library allocation
page read and write
391000
unkown
page execute and read and write
238F341B000
trusted library allocation
page read and write
F34000
heap
page read and write
28621A0D000
trusted library allocation
page read and write
50F1000
heap
page read and write
45D1000
heap
page read and write
286321FD000
trusted library allocation
page read and write
2862E895000
trusted library allocation
page read and write
57F1000
heap
page read and write
4841000
heap
page read and write
50F1000
heap
page read and write
4841000
heap
page read and write
57F1000
heap
page read and write
45D1000
heap
page read and write
7E5000
unkown
page execute and write copy
2580000
heap
page read and write
6471000
heap
page read and write
34CF000
stack
page read and write
6471000
heap
page read and write
2862DE00000
trusted library allocation
page read and write
286288C7000
heap
page read and write
2863219A000
trusted library allocation
page read and write
3A7E000
stack
page read and write
4F39000
direct allocation
page execute and read and write
1F414514000
trusted library allocation
page read and write
57AE000
stack
page read and write
D74000
heap
page read and write
50F1000
heap
page read and write
401000
unkown
page execute read
57F1000
heap
page read and write
3F7E000
stack
page read and write
611E000
stack
page read and write
504E000
stack
page read and write
28632186000
trusted library allocation
page read and write
28632291000
trusted library allocation
page read and write
2325000
heap
page read and write
386F000
stack
page read and write
3D7E000
stack
page read and write
28632103000
trusted library allocation
page read and write
4BD000
unkown
page readonly
238F45AC000
trusted library allocation
page read and write
4970000
direct allocation
page execute and read and write
2862E9B4000
trusted library allocation
page read and write
27AF1112000
trusted library allocation
page read and write
2862DD00000
trusted library allocation
page read and write
D74000
heap
page read and write
2862F20A000
trusted library allocation
page read and write
3C8E000
stack
page read and write
238F2CD2000
unclassified section
page read and write
286288BF000
heap
page read and write
2862E9EF000
trusted library allocation
page read and write
6471000
heap
page read and write
27AF1213000
trusted library allocation
page read and write
229F7000
heap
page read and write
2862D2DF000
trusted library allocation
page read and write
2862D29E000
trusted library allocation
page read and write
1102000
unkown
page execute and read and write
50F1000
heap
page read and write
28630C75000
trusted library allocation
page read and write
7E5000
unkown
page execute and write copy
4841000
heap
page read and write
45D1000
heap
page read and write
2FAF000
stack
page read and write
2862DB89000
trusted library allocation
page read and write
2E4000
heap
page read and write
28631D33000
trusted library allocation
page read and write
2863BFA1000
trusted library allocation
page read and write
4791000
heap
page read and write
28631D00000
trusted library allocation
page read and write
286322BD000
trusted library allocation
page read and write
2862DBA1000
trusted library allocation
page read and write
50F1000
heap
page read and write
286288D2000
heap
page read and write
45D1000
heap
page read and write
2EFF000
stack
page read and write
238F6AB2000
trusted library allocation
page read and write
2863C100000
trusted library allocation
page read and write
238E8FC0000
heap
page read and write
6471000
heap
page read and write
D81C9DE000
stack
page read and write
10E0000
direct allocation
page read and write
423000
unkown
page execute and read and write
2863C2B5000
trusted library allocation
page read and write
57F1000
heap
page read and write
50F1000
heap
page read and write
28630A65000
trusted library allocation
page read and write
6471000
heap
page read and write
57F1000
heap
page read and write
4F50000
direct allocation
page read and write
238E8F62000
heap
page read and write
28631021000
trusted library allocation
page read and write
28623473000
heap
page read and write
2863224E000
trusted library allocation
page read and write
4D41000
direct allocation
page read and write
4F61000
heap
page read and write
43C0000
heap
page read and write
487F000
stack
page read and write
4130000
heap
page read and write
4F61000
heap
page read and write
4C90000
direct allocation
page execute and read and write
2862E800000
trusted library allocation
page read and write
50F1000
heap
page read and write
5F6000
unkown
page execute and read and write
B848DBE000
stack
page read and write
27AF11E7000
trusted library allocation
page read and write
286288CC000
heap
page read and write
6471000
heap
page read and write
238F4589000
trusted library allocation
page read and write
2862E189000
trusted library allocation
page read and write
286288CD000
heap
page read and write
238F2F9E000
trusted library allocation
page read and write
50F1000
heap
page read and write
57F1000
heap
page read and write
E49000
heap
page read and write
286288E5000
heap
page read and write
4F50000
direct allocation
page read and write
7E7E000
stack
page read and write
4C00000
direct allocation
page execute and read and write
286288CD000
heap
page read and write
767A000
stack
page read and write
1C69E000
stack
page read and write
6471000
heap
page read and write
238F2BE0000
heap
page read and write
4F61000
heap
page read and write
B8470FB000
stack
page read and write
5F6000
unkown
page execute and read and write
6471000
heap
page read and write
286288D5000
heap
page read and write
2862E0DB000
trusted library allocation
page read and write
28630A03000
trusted library allocation
page read and write
6471000
heap
page read and write
4850000
direct allocation
page read and write
2862E815000
trusted library allocation
page read and write
468F000
stack
page read and write
6471000
heap
page read and write
28631DA3000
trusted library allocation
page read and write
1C69E000
stack
page read and write
964EFFE000
stack
page read and write
27AF0D25000
remote allocation
page execute read
2863213F000
trusted library allocation
page read and write
19CE000
stack
page read and write
57F1000
heap
page read and write
229F4000
heap
page read and write
286288FD000
heap
page read and write
276D000
heap
page read and write
43B1000
heap
page read and write
286288CA000
heap
page read and write
BA4000
heap
page read and write
5C0000
heap
page read and write
22A03000
heap
page read and write
2862D29B000
trusted library allocation
page read and write
2863216C000
trusted library allocation
page read and write
2862D1F5000
heap
page read and write
1CBE7910000
heap
page read and write
50F1000
heap
page read and write
2262000
heap
page read and write
28631D03000
trusted library allocation
page read and write
D70000
direct allocation
page read and write
45D1000
heap
page read and write
286288F6000
heap
page read and write
28630C60000
trusted library allocation
page read and write
28631800000
trusted library allocation
page read and write
EA4000
heap
page read and write
238E7430000
heap
page read and write
6630000
heap
page read and write
28630FD4000
trusted library allocation
page read and write
1F41451E000
trusted library allocation
page read and write
4E1F000
stack
page read and write
2863BFCD000
trusted library allocation
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
EF0000
direct allocation
page read and write
50F1000
heap
page read and write
4C10000
direct allocation
page execute and read and write
4841000
heap
page read and write
4A00000
direct allocation
page execute and read and write
50F1000
heap
page read and write
27AF120C000
trusted library allocation
page read and write
466E000
stack
page read and write
47F0000
heap
page read and write
2862E0E8000
trusted library allocation
page read and write
229F7000
heap
page read and write
28631B86000
trusted library allocation
page read and write
1E26000
heap
page read and write
6471000
heap
page read and write
29BF000
stack
page read and write
4F61000
heap
page read and write
2863219D000
trusted library allocation
page read and write
4F61000
heap
page read and write
1FE6000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
F58000
unkown
page execute and write copy
45D1000
heap
page read and write
46C000
unkown
page execute and read and write
2862DEF4000
trusted library allocation
page read and write
2580000
heap
page read and write
1220000
heap
page read and write
238F2F9C000
trusted library allocation
page read and write
124E000
stack
page read and write
F40000
direct allocation
page read and write
BA4000
heap
page read and write
6471000
heap
page read and write
43C0000
heap
page read and write
6471000
heap
page read and write
2862E033000
trusted library allocation
page read and write
71FC000
stack
page read and write
286322C4000
trusted library allocation
page read and write
1DEF83B0000
heap
page read and write
4691000
heap
page read and write
2863BE9F000
trusted library allocation
page read and write
238F71A0000
trusted library allocation
page read and write
2863217F000
trusted library allocation
page read and write
4841000
heap
page read and write
286321CC000
trusted library allocation
page read and write
6471000
heap
page read and write
28632297000
trusted library allocation
page read and write
6471000
heap
page read and write
1650000
heap
page read and write
2862D503000
trusted library allocation
page read and write
28631E0B000
trusted library allocation
page read and write
229F7000
heap
page read and write
964B7DE000
stack
page read and write
50F1000
heap
page read and write
22A0A000
heap
page read and write
1CBE7800000
heap
page read and write
286288C1000
heap
page read and write
286288FC000
heap
page read and write
6471000
heap
page read and write
6471000
heap
page read and write
B848D7D000
stack
page read and write
27AF0E06000
heap
page read and write
9B1000
unkown
page execute and read and write
4F61000
heap
page read and write
50F1000
heap
page read and write
2862DAD4000
trusted library allocation
page read and write
1BC0000
heap
page read and write
50F1000
heap
page read and write
580E000
stack
page read and write
42AF000
stack
page read and write
3B8E000
stack
page read and write
286288D6000
heap
page read and write
45D1000
heap
page read and write
2862E8DD000
trusted library allocation
page read and write
50F1000
heap
page read and write
238F4C00000
trusted library allocation
page read and write
28628901000
heap
page read and write
50F1000
heap
page read and write
2862DF44000
trusted library allocation
page read and write
446F000
stack
page read and write
4F61000
heap
page read and write
B84A23B000
stack
page read and write
26A0000
direct allocation
page read and write
4F61000
heap
page read and write
238F3803000
trusted library allocation
page read and write
26A0000
direct allocation
page read and write
2863218A000
trusted library allocation
page read and write
43B1000
heap
page read and write
2BEF000
stack
page read and write
2863BFDC000
trusted library allocation
page read and write
45D1000
heap
page read and write
391000
unkown
page execute and write copy
337E000
stack
page read and write
4CD0000
direct allocation
page read and write
286288F7000
heap
page read and write
2863216C000
trusted library allocation
page read and write
28632B44000
trusted library allocation
page read and write
2863217B000
trusted library allocation
page read and write
286318F3000
trusted library allocation
page read and write
238F4490000
trusted library allocation
page read and write
45D1000
heap
page read and write
238F37F1000
trusted library allocation
page read and write
286288CF000
heap
page read and write
4841000
heap
page read and write
28630E27000
trusted library allocation
page read and write
1105000
unkown
page execute and write copy
28630F84000
trusted library allocation
page read and write
2862E886000
trusted library allocation
page read and write
19EF000
stack
page read and write
2B3F000
stack
page read and write
2863B711000
trusted library allocation
page read and write
4F61000
heap
page read and write
286288D8000
heap
page read and write
2863BFCD000
trusted library allocation
page read and write
286288CF000
heap
page read and write
2862D6B2000
trusted library allocation
page read and write
43B1000
heap
page read and write
4F61000
heap
page read and write
2863BFAA000
trusted library allocation
page read and write
964B77E000
stack
page read and write
5F2000
unkown
page execute and read and write
4DEF000
stack
page read and write
4EE0000
direct allocation
page execute and read and write
4F61000
heap
page read and write
2863B145000
trusted library allocation
page read and write
286288C1000
heap
page read and write
2862D682000
trusted library allocation
page read and write
4F24000
direct allocation
page execute and read and write
1BC4000
heap
page read and write
28630E00000
trusted library allocation
page read and write
1BC4000
heap
page read and write
286322A7000
trusted library allocation
page read and write
2863BF68000
trusted library allocation
page read and write
4F61000
heap
page read and write
238F2D34000
trusted library allocation
page read and write
4C60000
direct allocation
page execute and read and write
2863B756000
trusted library allocation
page read and write
2862DA5F000
trusted library allocation
page read and write
2C0000
heap
page read and write
FEAE0000
direct allocation
page execute and read and write
45D1000
heap
page read and write
28631BF8000
trusted library allocation
page read and write
238F6AD4000
trusted library allocation
page read and write
238F6C38000
trusted library allocation
page read and write
57F1000
heap
page read and write
376F000
stack
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
286288C7000
heap
page read and write
286320CA000
trusted library allocation
page read and write
F34000
heap
page read and write
964D1FF000
stack
page read and write
6EED000
stack
page read and write
167A000
heap
page read and write
F60000
heap
page read and write
D86000
heap
page read and write
6471000
heap
page read and write
286288F6000
heap
page read and write
286322A5000
trusted library allocation
page read and write
286288FC000
heap
page read and write
2862E360000
trusted library allocation
page read and write
28630F49000
trusted library allocation
page read and write
251000
unkown
page execute and write copy
1CB7000
heap
page read and write
4F61000
heap
page read and write
286288F6000
heap
page read and write
1D16000
heap
page read and write
192000
stack
page read and write
4D20000
direct allocation
page execute and read and write
286288D4000
heap
page read and write
9651BFD000
stack
page read and write
286288C7000
heap
page read and write
4841000
heap
page read and write
1F414010000
heap
page read and write
882F000
stack
page read and write
6471000
heap
page read and write
4830000
direct allocation
page read and write
2E4000
heap
page read and write
2863213B000
trusted library allocation
page read and write
E32FBFC000
stack
page read and write
390000
unkown
page readonly
229E7000
heap
page read and write
FAE000
stack
page read and write
456000
unkown
page execute and read and write
45C000
unkown
page execute and write copy
28A60000
heap
page read and write
D70000
direct allocation
page read and write
238F6A00000
trusted library allocation
page read and write
2862DE97000
trusted library allocation
page read and write
286329B8000
trusted library allocation
page read and write
569000
unkown
page execute and read and write
28632EAC000
trusted library allocation
page read and write
964BD5E000
stack
page read and write
286321C9000
trusted library allocation
page read and write
50F1000
heap
page read and write
57F1000
heap
page read and write
286288F7000
heap
page read and write
1F414013000
heap
page read and write
57F1000
heap
page read and write
43B1000
heap
page read and write
2D7E000
stack
page read and write
10F4000
heap
page read and write
50F1000
heap
page read and write
3CCE000
stack
page read and write
50F1000
heap
page read and write
57F1000
heap
page read and write
57F1000
heap
page read and write
E49000
heap
page read and write
2863BFA7000
trusted library allocation
page read and write
2863BFB9000
trusted library allocation
page read and write
2862E5E7000
trusted library allocation
page read and write
2862E084000
trusted library allocation
page read and write
28632700000
trusted library allocation
page read and write
4C90000
direct allocation
page execute and read and write
50F1000
heap
page read and write
468E000
stack
page read and write
4841000
heap
page read and write
12A0000
direct allocation
page read and write
686B000
stack
page read and write
238F526D000
trusted library allocation
page read and write
35FF000
stack
page read and write
2477000
heap
page read and write
96530BE000
stack
page read and write
49BF000
stack
page read and write
286288EB000
heap
page read and write
49C0000
direct allocation
page execute and read and write
2DEF000
stack
page read and write
28632B00000
trusted library allocation
page read and write
28631B4F000
trusted library allocation
page read and write
28630F8B000
trusted library allocation
page read and write
4F50000
direct allocation
page read and write
2862E8A7000
trusted library allocation
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
28632582000
trusted library allocation
page read and write
2862D9CB000
trusted library allocation
page read and write
28621BA0000
trusted library section
page readonly
4E20000
direct allocation
page execute and read and write
4000000
heap
page read and write
2863BF43000
trusted library allocation
page read and write
238F6C14000
trusted library allocation
page read and write
2862E203000
trusted library allocation
page read and write
286288E4000
heap
page read and write
4F61000
heap
page read and write
1F414503000
trusted library allocation
page read and write
27AF0D30000
unclassified section
page readonly
286288C1000
heap
page read and write
57F1000
heap
page read and write
286288D5000
heap
page read and write
238F349F000
trusted library allocation
page read and write
28632B03000
trusted library allocation
page read and write
45D1000
heap
page read and write
28631E84000
trusted library allocation
page read and write
4F61000
heap
page read and write
333F000
stack
page read and write
50F0000
heap
page read and write
1CBE78F0000
heap
page read and write
EF0000
direct allocation
page read and write
169B000
heap
page read and write
4E60000
direct allocation
page execute and read and write
4841000
heap
page read and write
27AF0E20000
heap
page read and write
238F3709000
trusted library allocation
page read and write
2862E545000
trusted library allocation
page read and write
6471000
heap
page read and write
2863BFB7000
trusted library allocation
page read and write
28630BDE000
trusted library allocation
page read and write
286325EB000
trusted library allocation
page read and write
BA4000
heap
page read and write
B8460FA000
stack
page read and write
2863204C000
trusted library allocation
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
28632533000
trusted library allocation
page read and write
26A0000
direct allocation
page read and write
578000
unkown
page execute and write copy
27AF11B7000
trusted library allocation
page read and write
416E000
stack
page read and write
F1E000
unkown
page execute and write copy
30A000
stack
page read and write
6471000
heap
page read and write
28632B20000
trusted library allocation
page read and write
28632903000
trusted library allocation
page read and write
4F71000
heap
page read and write
374F000
stack
page read and write
489E000
stack
page read and write
1D3F000
heap
page read and write
6C1C0000
unkown
page readonly
286288EC000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
2862DE03000
trusted library allocation
page read and write
57F1000
heap
page read and write
43B1000
heap
page read and write
4D80000
direct allocation
page execute and read and write
238F4F00000
trusted library allocation
page read and write
2862E515000
trusted library allocation
page read and write
4F61000
heap
page read and write
238E76ED000
trusted library allocation
page read and write
EA4000
heap
page read and write
533E000
stack
page read and write
57F1000
heap
page read and write
4F61000
heap
page read and write
238F4578000
trusted library allocation
page read and write
457F000
stack
page read and write
286323F0000
trusted library section
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
28631254000
trusted library allocation
page read and write
57F1000
heap
page read and write
5340000
trusted library allocation
page read and write
286315A6000
trusted library allocation
page read and write
2862E0F9000
trusted library allocation
page read and write
4841000
heap
page read and write
28630F82000
trusted library allocation
page read and write
28632262000
trusted library allocation
page read and write
238E76E6000
trusted library allocation
page read and write
3CEE000
stack
page read and write
2863219A000
trusted library allocation
page read and write
6471000
heap
page read and write
96507FF000
stack
page read and write
3F9E000
stack
page read and write
2037000
heap
page read and write
2570000
heap
page read and write
286394E8000
trusted library allocation
page read and write
43C1000
heap
page read and write
59E000
stack
page read and write
229F7000
heap
page read and write
50F1000
heap
page read and write
532000
unkown
page execute and read and write
2862E3F7000
trusted library allocation
page read and write
27AF0DF0000
unclassified section
page read and write
50F1000
heap
page read and write
295E000
stack
page read and write
2862E537000
trusted library allocation
page read and write
340E000
stack
page read and write
238F2E0C000
trusted library allocation
page read and write
6C252000
unkown
page readonly
28631F64000
trusted library allocation
page read and write
27AF117A000
trusted library allocation
page read and write
2863C2D3000
trusted library allocation
page read and write
43B1000
heap
page read and write
2863BF8A000
trusted library allocation
page read and write
444E000
stack
page read and write
22A12000
heap
page read and write
28630AF0000
trusted library allocation
page read and write
28630CB0000
trusted library allocation
page read and write
2862D6E2000
trusted library allocation
page read and write
4830000
direct allocation
page read and write
286327A5000
trusted library allocation
page read and write
19FF000
stack
page read and write
229F5000
heap
page read and write
238F2E8A000
trusted library allocation
page read and write
50F1000
heap
page read and write
2862DAA8000
trusted library allocation
page read and write
9B1000
unkown
page execute and read and write
22A02000
heap
page read and write
D74000
heap
page read and write
1F414300000
trusted library allocation
page read and write
F75000
heap
page read and write
238F2D98000
trusted library allocation
page read and write
238F441F000
trusted library allocation
page read and write
4F61000
heap
page read and write
2862E100000
trusted library allocation
page read and write
2E4000
heap
page read and write
6471000
heap
page read and write
2862D9EB000
trusted library allocation
page read and write
45D1000
heap
page read and write
238F3815000
trusted library allocation
page read and write
2862338F000
heap
page read and write
286288C7000
heap
page read and write
286324AB000
trusted library allocation
page read and write
2F7F000
stack
page read and write
402F000
stack
page read and write
229EC000
heap
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
23AF6A00000
trusted library section
page readonly
229F1000
heap
page read and write
286288CE000
heap
page read and write
391000
unkown
page execute and read and write
28628890000
heap
page read and write
357E000
stack
page read and write
2862EA88000
trusted library allocation
page read and write
4F2F000
stack
page read and write
2862D94B000
trusted library allocation
page read and write
3EBF000
stack
page read and write
286288FD000
heap
page read and write
660A000
heap
page read and write
F28B2FE000
unkown
page readonly
1F414396000
trusted library allocation
page read and write
43B1000
heap
page read and write
28632661000
trusted library allocation
page read and write
28632754000
trusted library allocation
page read and write
37B000
unkown
page execute and read and write
286288D6000
heap
page read and write
2862E0D8000
trusted library allocation
page read and write
50F1000
heap
page read and write
28632BAD000
trusted library allocation
page read and write
50F1000
heap
page read and write
28632080000
trusted library allocation
page read and write
6471000
heap
page read and write
2862EA65000
trusted library allocation
page read and write
1F32000
heap
page read and write
2863BFB5000
trusted library allocation
page read and write
50F1000
heap
page read and write
379000
unkown
page read and write
625E000
stack
page read and write
25C6DD07000
trusted library allocation
page read and write
4F61000
heap
page read and write
57F1000
heap
page read and write
6471000
heap
page read and write
265E000
stack
page read and write
286321F5000
trusted library allocation
page read and write
50F1000
heap
page read and write
286288F6000
heap
page read and write
1C2F000
heap
page read and write
12CD000
heap
page read and write
46E000
unkown
page execute and write copy
2862DCFE000
trusted library allocation
page read and write
238F4587000
trusted library allocation
page read and write
286288F7000
heap
page read and write
250000
unkown
page read and write
286288F7000
heap
page read and write
55F0000
direct allocation
page execute and read and write
4F61000
heap
page read and write
28632600000
trusted library allocation
page read and write
229F7000
heap
page read and write
229F7000
heap
page read and write
350E000
stack
page read and write
4A40000
direct allocation
page execute and read and write
EEE000
stack
page read and write
2E4000
heap
page read and write
F28C3BE000
stack
page read and write
43B1000
heap
page read and write
BA4000
heap
page read and write
2862D360000
trusted library allocation
page read and write
1CBE94BB000
heap
page read and write
28632016000
trusted library allocation
page read and write
2862E50F000
trusted library allocation
page read and write
2862DC6D000
trusted library allocation
page read and write
286288C1000
heap
page read and write
5650000
direct allocation
page execute and read and write
44FE000
stack
page read and write
238F7199000
trusted library allocation
page read and write
2572000
heap
page read and write
2862D2A4000
trusted library allocation
page read and write
D70000
direct allocation
page read and write
4D60000
direct allocation
page execute and read and write
2863C17A000
trusted library allocation
page read and write
238E7500000
trusted library allocation
page read and write
286326C9000
trusted library allocation
page read and write
D81EBFE000
unkown
page readonly
238F37B8000
trusted library allocation
page read and write
2862DA26000
trusted library allocation
page read and write
2862E047000
trusted library allocation
page read and write
22A02000
heap
page read and write
F34000
heap
page read and write
50F1000
heap
page read and write
238F7239000
trusted library allocation
page read and write
2862E3B1000
trusted library allocation
page read and write
28630FE4000
trusted library allocation
page read and write
43B1000
heap
page read and write
1CFBD0D1000
trusted library allocation
page execute read
238E76C5000
trusted library allocation
page read and write
B84B0FF000
unkown
page read and write
F60000
heap
page read and write
2862D24A000
trusted library allocation
page read and write
1629000
heap
page read and write
50F1000
heap
page read and write
2862F304000
trusted library allocation
page read and write
3EEE000
stack
page read and write
2863206C000
trusted library allocation
page read and write
76FE000
stack
page read and write
43B1000
heap
page read and write
4A30000
direct allocation
page execute and read and write
2E4000
heap
page read and write
F34000
heap
page read and write
286321A5000
trusted library allocation
page read and write
28CB0000
trusted library allocation
page read and write
E00000
heap
page read and write
1F414170000
heap
page read and write
57F1000
heap
page read and write
286288CC000
heap
page read and write
2863219D000
trusted library allocation
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
43C0000
heap
page read and write
6471000
heap
page read and write
4BD0000
trusted library allocation
page read and write
6471000
heap
page read and write
2FCF000
stack
page read and write
24B5000
heap
page read and write
272E000
heap
page read and write
2C7F000
stack
page read and write
6C24E000
unkown
page read and write
2862DC4D000
trusted library allocation
page read and write
2862D27E000
trusted library allocation
page read and write
286233F7000
heap
page read and write
3F3E000
stack
page read and write
286325E2000
trusted library allocation
page read and write
2862E700000
trusted library allocation
page read and write
286288C7000
heap
page read and write
229E7000
heap
page read and write
553F000
stack
page read and write
2863C259000
trusted library allocation
page read and write
1C43F000
stack
page read and write
28632C03000
trusted library allocation
page read and write
96538FB000
stack
page read and write
50F1000
heap
page read and write
57F1000
heap
page read and write
561000
unkown
page execute and read and write
238F523A000
trusted library allocation
page read and write
238F3303000
trusted library allocation
page read and write
160000
unkown
page readonly
41EF000
stack
page read and write
5130000
direct allocation
page execute and read and write
286288BF000
heap
page read and write
2863BFD9000
trusted library allocation
page read and write
551F000
stack
page read and write
4841000
heap
page read and write
57F1000
heap
page read and write
2862D96D000
trusted library allocation
page read and write
286288F6000
heap
page read and write
28631247000
trusted library allocation
page read and write
1F4143E9000
trusted library allocation
page read and write
338F000
stack
page read and write
45D0000
heap
page read and write
286288FC000
heap
page read and write
2862E6C1000
trusted library allocation
page read and write
4F61000
heap
page read and write
286288F7000
heap
page read and write
BA4000
heap
page read and write
B3F000
stack
page read and write
1F41439E000
trusted library allocation
page read and write
F34000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
1CBE798A000
heap
page read and write
45D1000
heap
page read and write
473F000
stack
page read and write
4C4F000
stack
page read and write
28630D8D000
trusted library allocation
page read and write
4841000
heap
page read and write
B84A47E000
stack
page read and write
1F413FB0000
unclassified section
page readonly
6471000
heap
page read and write
238F3763000
trusted library allocation
page read and write
F49000
unkown
page execute and read and write
4CEE000
stack
page read and write
238F37C0000
trusted library allocation
page read and write
57F1000
heap
page read and write
6471000
heap
page read and write
E2B000
unkown
page execute and read and write
4791000
heap
page read and write
111E000
stack
page read and write
6471000
heap
page read and write
2862D2A6000
trusted library allocation
page read and write
319B000
stack
page read and write
437F000
stack
page read and write
2862D1C0000
trusted library section
page readonly
E90000
heap
page read and write
5D4000
heap
page read and write
6471000
heap
page read and write
286321E3000
trusted library allocation
page read and write
1D38000
heap
page read and write
49E0000
direct allocation
page execute and read and write
499F000
stack
page read and write
2862EA44000
trusted library allocation
page read and write
43C1000
heap
page read and write
4F61000
heap
page read and write
41CE000
stack
page read and write
2862DDEF000
trusted library allocation
page read and write
2862D4D5000
trusted library allocation
page read and write
61E000
stack
page read and write
1BC4000
heap
page read and write
D70000
direct allocation
page read and write
286321CC000
trusted library allocation
page read and write
6471000
heap
page read and write
286288F7000
heap
page read and write
E60000
heap
page read and write
2862F820000
trusted library section
page readonly
2862D300000
trusted library allocation
page read and write
391000
unkown
page execute and write copy
6471000
heap
page read and write
51F0000
trusted library allocation
page read and write
2862DDC8000
trusted library allocation
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
1EAD000
heap
page read and write
238F4437000
trusted library allocation
page read and write
2863BF79000
trusted library allocation
page read and write
2863215D000
trusted library allocation
page read and write
238E9070000
trusted library section
page readonly
50F1000
heap
page read and write
28632271000
trusted library allocation
page read and write
4F61000
heap
page read and write
7BB000
stack
page read and write
286322C7000
trusted library allocation
page read and write
286329EE000
trusted library allocation
page read and write
2863C310000
trusted library allocation
page read and write
4BD000
unkown
page readonly
1685000
heap
page read and write
50F1000
heap
page read and write
1F4143AA000
trusted library allocation
page read and write
2862DA6F000
trusted library allocation
page read and write
50F1000
heap
page read and write
50E0000
direct allocation
page execute and read and write
1CA3E000
stack
page read and write
1CBE7979000
heap
page read and write
1685000
heap
page read and write
286288BF000
heap
page read and write
57F1000
heap
page read and write
2863102D000
trusted library allocation
page read and write
391000
unkown
page execute and write copy
4D30000
direct allocation
page execute and read and write
28630F03000
trusted library allocation
page read and write
28630C09000
trusted library allocation
page read and write
669A000
heap
page read and write
286321CC000
trusted library allocation
page read and write
4830000
direct allocation
page read and write
22A02000
heap
page read and write
57F1000
heap
page read and write
2F031000
heap
page read and write
28621740000
heap
page read and write
28631308000
heap
page read and write
6471000
heap
page read and write
57F1000
heap
page read and write
DDC000
heap
page read and write
3A4E000
stack
page read and write
25CE000
stack
page read and write
50F1000
heap
page read and write
46AE000
stack
page read and write
43B1000
heap
page read and write
286233C8000
heap
page read and write
2862DABF000
trusted library allocation
page read and write
57F1000
heap
page read and write
53A0000
heap
page read and write
456E000
stack
page read and write
6471000
heap
page read and write
1E4A000
heap
page read and write
2862E9CA000
trusted library allocation
page read and write
2863C1F4000
trusted library allocation
page read and write
50F1000
heap
page read and write
28632068000
trusted library allocation
page read and write
2862E0EC000
trusted library allocation
page read and write
FDE000
stack
page read and write
F34000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
238F52B7000
trusted library allocation
page read and write
6471000
heap
page read and write
286321E3000
trusted library allocation
page read and write
6471000
heap
page read and write
5D0000
heap
page read and write
CC0000
heap
page read and write
45D1000
heap
page read and write
2ABF000
stack
page read and write
286218B0000
trusted library section
page readonly
2863217F000
trusted library allocation
page read and write
2862D644000
trusted library allocation
page read and write
4F61000
heap
page read and write
4F61000
heap
page read and write
2863256F000
trusted library allocation
page read and write
6471000
heap
page read and write
1CB000
unkown
page execute and read and write
10F4000
heap
page read and write
4F61000
heap
page read and write
D74000
heap
page read and write
28632BA9000
trusted library allocation
page read and write
2862D9FC000
trusted library allocation
page read and write
4F61000
heap
page read and write
53F0000
direct allocation
page read and write
50B000
unkown
page execute and read and write
6471000
heap
page read and write
10F4000
heap
page read and write
2B9000
unkown
page write copy
6471000
heap
page read and write
43B1000
heap
page read and write
238F4696000
trusted library allocation
page read and write
2862EA6A000
trusted library allocation
page read and write
238F2EAD000
trusted library allocation
page read and write
28632E77000
trusted library allocation
page read and write
6471000
heap
page read and write
238F37EA000
trusted library allocation
page read and write
286215A0000
unclassified section
page readonly
2862E34A000
trusted library allocation
page read and write
3C2E000
stack
page read and write
2863BEAA000
trusted library allocation
page read and write
28632088000
trusted library allocation
page read and write
C99000
unkown
page read and write
286288CC000
heap
page read and write
2862E09E000
trusted library allocation
page read and write
2E4000
heap
page read and write
43BF000
stack
page read and write
50F1000
heap
page read and write
27AF11E5000
trusted library allocation
page read and write
286322BB000
trusted library allocation
page read and write
286321A5000
trusted library allocation
page read and write
286327AE000
trusted library allocation
page read and write
49F0000
direct allocation
page execute and read and write
6471000
heap
page read and write
4841000
heap
page read and write
23C8000
heap
page read and write
4F61000
heap
page read and write
40C0000
direct allocation
page execute and read and write
286288D4000
heap
page read and write
29E7000
heap
page read and write
6471000
heap
page read and write
22A02000
heap
page read and write
672A000
heap
page read and write
6471000
heap
page read and write
286326EB000
trusted library allocation
page read and write
28630CDC000
trusted library allocation
page read and write
F288FBD000
stack
page read and write
50F1000
heap
page read and write
431E000
stack
page read and write
33CF000
stack
page read and write
28630900000
trusted library allocation
page read and write
BA4000
heap
page read and write
286288C7000
heap
page read and write
1BC4000
heap
page read and write
37BF000
stack
page read and write
4860000
heap
page read and write
28632058000
trusted library allocation
page read and write
238F6A7E000
trusted library allocation
page read and write
2862D1B0000
trusted library section
page readonly
6471000
heap
page read and write
286288BF000
heap
page read and write
57F1000
heap
page read and write
1F414310000
trusted library allocation
page read and write
6699000
heap
page read and write
10B9000
unkown
page execute and write copy
28632582000
trusted library allocation
page read and write
28631A00000
trusted library allocation
page read and write
50F1000
heap
page read and write
34EE000
stack
page read and write
4F50000
direct allocation
page read and write
1C36000
heap
page read and write
256E000
stack
page read and write
D70000
direct allocation
page read and write
1C7FE000
stack
page read and write
43B1000
heap
page read and write
50F1000
heap
page read and write
2862DFF7000
trusted library allocation
page read and write
F40000
direct allocation
page read and write
238E8EF1000
heap
page read and write
238F457A000
trusted library allocation
page read and write
2862E707000
trusted library allocation
page read and write
1C93E000
stack
page read and write
28632186000
trusted library allocation
page read and write
B8429B3000
stack
page read and write
965287E000
stack
page read and write
57F1000
heap
page read and write
229EE000
heap
page read and write
2A4F000
stack
page read and write
50F1000
heap
page read and write
C79000
unkown
page write copy
286288D6000
heap
page read and write
673D000
heap
page read and write
57F1000
heap
page read and write
28630F24000
trusted library allocation
page read and write
45D1000
heap
page read and write
2E6F000
stack
page read and write
F34000
heap
page read and write
4F61000
heap
page read and write
286325CA000
trusted library allocation
page read and write
11A0000
heap
page read and write
CAE000
stack
page read and write
6471000
heap
page read and write
229E7000
heap
page read and write
238F5200000
trusted library allocation
page read and write
2862E56E000
trusted library allocation
page read and write
286288F1000
heap
page read and write
2862E252000
trusted library allocation
page read and write
43B1000
heap
page read and write
238F43D9000
trusted library allocation
page read and write
2863BFB0000
trusted library allocation
page read and write
230C000
heap
page read and write
2863184F000
trusted library allocation
page read and write
201B000
heap
page read and write
2863BFDF000
trusted library allocation
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
1610000
heap
page read and write
28631B87000
trusted library allocation
page read and write
286288E5000
heap
page read and write
2D60000
direct allocation
page execute and read and write
2863BFD1000
trusted library allocation
page read and write
229E9000
heap
page read and write
5160000
direct allocation
page execute and read and write
238F46A2000
trusted library allocation
page read and write
2863BFD1000
trusted library allocation
page read and write
28631E0C000
trusted library allocation
page read and write
28630AF3000
trusted library allocation
page read and write
286217E0000
heap
page read and write
238E7240000
unclassified section
page readonly
2863217D000
trusted library allocation
page read and write
286288DB000
heap
page read and write
6471000
heap
page read and write
6471000
heap
page read and write
2862E763000
trusted library allocation
page read and write
4A80000
direct allocation
page execute and read and write
BA4000
heap
page read and write
286318D4000
trusted library allocation
page read and write
4F60000
heap
page read and write
4B01000
heap
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
28631029000
trusted library allocation
page read and write
238F3796000
trusted library allocation
page read and write
2863C1AD000
trusted library allocation
page read and write
6471000
heap
page read and write
F34000
heap
page read and write
2863C13D000
trusted library allocation
page read and write
2863B736000
trusted library allocation
page read and write
45D1000
heap
page read and write
397F000
stack
page read and write
57F1000
heap
page read and write
10F4000
heap
page read and write
238F2FE8000
trusted library allocation
page read and write
DFB000
heap
page read and write
238F2BD0000
heap
page read and write
286288CE000
heap
page read and write
27AF116E000
trusted library allocation
page read and write
28630A98000
trusted library allocation
page read and write
2E4000
heap
page read and write
2862E0B3000
trusted library allocation
page read and write
77CE000
stack
page read and write
50F1000
heap
page read and write
28632A03000
trusted library allocation
page read and write
5BEF000
stack
page read and write
60DF000
stack
page read and write
DAF000
heap
page read and write
50F1000
heap
page read and write
51F0000
trusted library allocation
page read and write
286288D2000
heap
page read and write
57F1000
heap
page read and write
2863C1D6000
trusted library allocation
page read and write
157E000
stack
page read and write
2863219D000
trusted library allocation
page read and write
286288F6000
heap
page read and write
2862E3F7000
trusted library allocation
page read and write
414F000
stack
page read and write
5110000
direct allocation
page execute and read and write
4F61000
heap
page read and write
238E7350000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
2862DBF4000
trusted library allocation
page read and write
50F1000
heap
page read and write
57F1000
heap
page read and write
49A0000
direct allocation
page execute and read and write
CFD000
stack
page read and write
6471000
heap
page read and write
2199000
heap
page read and write
28631670000
trusted library section
page readonly
50F1000
heap
page read and write
4F61000
heap
page read and write
6C440000
unkown
page read and write
6471000
heap
page read and write
28631DF9000
trusted library allocation
page read and write
C7B000
unkown
page execute and read and write
4D60000
heap
page read and write
28631BCA000
trusted library allocation
page read and write
9C000
stack
page read and write
1CBE9630000
heap
page read and write
1F413F20000
unclassified section
page readonly
238F44EB000
trusted library allocation
page read and write
44BF000
stack
page read and write
2863213B000
trusted library allocation
page read and write
238F372C000
trusted library allocation
page read and write
286320E5000
trusted library allocation
page read and write
238F7144000
trusted library allocation
page read and write
286288D3000
heap
page read and write
238F45D8000
trusted library allocation
page read and write
1CBE7C07000
trusted library allocation
page read and write
238F5287000
trusted library allocation
page read and write
27AF0DFF000
unclassified section
page read and write
28632F01000
trusted library allocation
page read and write
F6E000
heap
page read and write
2862E6C1000
trusted library allocation
page read and write
286288D5000
heap
page read and write
50F1000
heap
page read and write
2862E13A000
trusted library allocation
page read and write
6D7E000
heap
page read and write
6975000
heap
page read and write
45D1000
heap
page read and write
26A0000
direct allocation
page read and write
57F1000
heap
page read and write
1F4141AF000
unclassified section
page read and write
43B1000
heap
page read and write
637000
unkown
page execute and read and write
45D1000
heap
page read and write
5E90000
heap
page read and write
28632697000
trusted library allocation
page read and write
2862D3AD000
trusted library allocation
page read and write
2863125A000
trusted library allocation
page read and write
F28C37E000
unkown
page readonly
28632181000
trusted library allocation
page read and write
B84A3FC000
stack
page read and write
1C9000
unkown
page read and write
6471000
heap
page read and write
2863BFE9000
trusted library allocation
page read and write
B8427BC000
stack
page read and write
F34000
heap
page read and write
6471000
heap
page read and write
57F1000
heap
page read and write
621000
unkown
page execute and read and write
10F4000
heap
page read and write
2862D400000
trusted library allocation
page read and write
7E5000
unkown
page execute and write copy
96519FD000
stack
page read and write
DFE000
heap
page read and write
629000
unkown
page execute and read and write
238F3482000
trusted library allocation
page read and write
2863B730000
trusted library allocation
page read and write
28631843000
trusted library allocation
page read and write
2862DDA5000
trusted library allocation
page read and write
3F2E000
stack
page read and write
4F50000
direct allocation
page read and write
418E000
stack
page read and write
286320C0000
trusted library allocation
page read and write
4F61000
heap
page read and write
65EE000
stack
page read and write
50F1000
heap
page read and write
2F2F000
stack
page read and write
6471000
heap
page read and write
4841000
heap
page read and write
238F456A000
trusted library allocation
page read and write
2862E797000
trusted library allocation
page read and write
B8426BA000
stack
page read and write
229F000
heap
page read and write
2862DA9D000
trusted library allocation
page read and write
28630F22000
trusted library allocation
page read and write
2862D52F000
trusted library allocation
page read and write
50F1000
heap
page read and write
229F7000
heap
page read and write
6471000
heap
page read and write
55B0000
direct allocation
page execute and read and write
50F1000
heap
page read and write
6471000
heap
page read and write
28630AF5000
trusted library allocation
page read and write
238F37C7000
trusted library allocation
page read and write
244C000
unkown
page readonly
286321F8000
trusted library allocation
page read and write
286288F3000
heap
page read and write
2862E7E9000
trusted library allocation
page read and write
50F1000
heap
page read and write
1BB6000
heap
page read and write
28630FE4000
trusted library allocation
page read and write
57F1000
heap
page read and write
286288D5000
heap
page read and write
286288C7000
heap
page read and write
6471000
heap
page read and write
2D8F000
stack
page read and write
43B1000
heap
page read and write
E90000
direct allocation
page read and write
2862D2B3000
trusted library allocation
page read and write
1D34000
heap
page read and write
4F61000
heap
page read and write
115F000
stack
page read and write
28632390000
trusted library section
page read and write
57F1000
heap
page read and write
238F7237000
trusted library allocation
page read and write
50F1000
heap
page read and write
F34000
heap
page read and write
2862DAA0000
trusted library allocation
page read and write
E330BFE000
stack
page read and write
590D000
stack
page read and write
5230000
heap
page read and write
296F000
stack
page read and write
57F1000
heap
page read and write
2863296F000
trusted library allocation
page read and write
28633175000
trusted library allocation
page read and write
592D000
stack
page read and write
2863BFAD000
trusted library allocation
page read and write
4830000
direct allocation
page read and write
50F1000
heap
page read and write
286288C7000
heap
page read and write
238F4413000
trusted library allocation
page read and write
22A13000
heap
page read and write
50F1000
heap
page read and write
66FC000
heap
page read and write
286288D6000
heap
page read and write
2862E64E000
trusted library allocation
page read and write
28632566000
trusted library allocation
page read and write
E90000
direct allocation
page read and write
28632E1F000
trusted library allocation
page read and write
47EE000
stack
page read and write
238F715B000
trusted library allocation
page read and write
57F1000
heap
page read and write
236D000
heap
page read and write
286321DF000
trusted library allocation
page read and write
57F1000
heap
page read and write
2E4000
heap
page read and write
5D4000
heap
page read and write
28631ECC000
trusted library allocation
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
238F2DA5000
trusted library allocation
page read and write
286288F6000
heap
page read and write
50F1000
heap
page read and write
45D1000
heap
page read and write
286326F2000
trusted library allocation
page read and write
299E000
stack
page read and write
28632C00000
trusted library allocation
page read and write
238F4374000
trusted library allocation
page read and write
286324C7000
trusted library allocation
page read and write
6471000
heap
page read and write
28631F7B000
trusted library allocation
page read and write
435E000
stack
page read and write
96530FC000
stack
page read and write
379000
unkown
page write copy
D81C95D000
stack
page read and write
32E000
stack
page read and write
50F1000
heap
page read and write
45D1000
heap
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
43B1000
heap
page read and write
6471000
heap
page read and write
25F0000
heap
page read and write
28632147000
trusted library allocation
page read and write
50F1000
heap
page read and write
45D1000
heap
page read and write
28631ADE000
trusted library allocation
page read and write
22A0A000
heap
page read and write
89F000
stack
page read and write
3ABF000
stack
page read and write
50F1000
heap
page read and write
4F61000
heap
page read and write
2862D67D000
trusted library allocation
page read and write
43B1000
heap
page read and write
50F1000
heap
page read and write
286325A3000
trusted library allocation
page read and write
E42000
heap
page read and write
6471000
heap
page read and write
286288C7000
heap
page read and write
235E000
heap
page read and write
50F1000
heap
page read and write
E90000
direct allocation
page read and write
2862DED9000
trusted library allocation
page read and write
4C40000
direct allocation
page execute and read and write
408E000
stack
page read and write
4F61000
heap
page read and write
25F5000
heap
page read and write
4841000
heap
page read and write
50F1000
heap
page read and write
BA4000
heap
page read and write
4830000
direct allocation
page read and write
286288BF000
heap
page read and write
6471000
heap
page read and write
45B0000
heap
page read and write
162B000
heap
page read and write
6471000
heap
page read and write
1E6F000
heap
page read and write
2862D2C4000
trusted library allocation
page read and write
4F39000
direct allocation
page execute and read and write
57F1000
heap
page read and write
2862D284000
trusted library allocation
page read and write
2862DEAE000
trusted library allocation
page read and write
286321FA000
trusted library allocation
page read and write
50F1000
heap
page read and write
238F44E0000
trusted library allocation
page read and write
229F4000
heap
page read and write
50F1000
heap
page read and write
4841000
heap
page read and write
286288C7000
heap
page read and write
57F1000
heap
page read and write
57F1000
heap
page read and write
EDE000
stack
page read and write
2863125A000
trusted library allocation
page read and write
313E000
stack
page read and write
1BC4000
heap
page read and write
6471000
heap
page read and write
7AA0000
heap
page read and write
50F1000
heap
page read and write
286288FD000
heap
page read and write
F28CBFE000
stack
page read and write
50F1000
heap
page read and write
2863100D000
trusted library allocation
page read and write
BA4000
heap
page read and write
6471000
heap
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
1CA60000
trusted library allocation
page read and write
372000
unkown
page execute and read and write
26EF000
stack
page read and write
4C6000
unkown
page execute and write copy
42C000
unkown
page execute and write copy
41FE000
stack
page read and write
4F61000
heap
page read and write
1F414537000
trusted library allocation
page read and write
2862E8FE000
trusted library allocation
page read and write
3FFE000
stack
page read and write
22A22000
heap
page read and write
2862E2BD000
trusted library allocation
page read and write
4841000
heap
page read and write
322F000
stack
page read and write
4841000
heap
page read and write
2862E555000
trusted library allocation
page read and write
286288CF000
heap
page read and write
50F1000
heap
page read and write
57F1000
heap
page read and write
33AE000
stack
page read and write
422E000
stack
page read and write
2862D626000
trusted library allocation
page read and write
442E000
stack
page read and write
BA4000
heap
page read and write
435000
unkown
page read and write
10E0000
direct allocation
page read and write
286321DA000
trusted library allocation
page read and write
346E000
stack
page read and write
2863218A000
trusted library allocation
page read and write
D81ECFE000
unkown
page readonly
50F1000
heap
page read and write
2862E7C3000
trusted library allocation
page read and write
2862DEAE000
trusted library allocation
page read and write
2863C282000
trusted library allocation
page read and write
238F3841000
trusted library allocation
page read and write
45D1000
heap
page read and write
33BE000
stack
page read and write
286288D0000
heap
page read and write
50F1000
heap
page read and write
1F0000
heap
page read and write
28630FFA000
trusted library allocation
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
28631302000
heap
page read and write
4A60000
direct allocation
page execute and read and write
6471000
heap
page read and write
1C93E000
stack
page read and write
712C000
stack
page read and write
238F4364000
trusted library allocation
page read and write
1C33F000
stack
page read and write
2862E83A000
trusted library allocation
page read and write
286288EA000
heap
page read and write
268F000
stack
page read and write
28632566000
trusted library allocation
page read and write
43BE000
stack
page read and write
286322F3000
trusted library allocation
page read and write
4C36000
heap
page read and write
41BF000
stack
page read and write
414E000
stack
page read and write
390000
unkown
page readonly
25C6DD0A000
trusted library allocation
page read and write
2863BFAE000
trusted library allocation
page read and write
4CD0000
direct allocation
page read and write
229EC000
heap
page read and write
238F2E86000
trusted library allocation
page read and write
59201FF000
stack
page read and write
4DF0000
direct allocation
page execute and read and write
D58000
heap
page read and write
43B1000
heap
page read and write
609000
unkown
page execute and write copy
C92000
unkown
page execute and read and write
1CE6000
heap
page read and write
50E0000
direct allocation
page execute and read and write
27AF1100000
trusted library allocation
page read and write
28632043000
trusted library allocation
page read and write
203B000
heap
page read and write
7E5000
unkown
page execute and write copy
229F7000
heap
page read and write
43B1000
heap
page read and write
28630BF6000
trusted library allocation
page read and write
238E7440000
heap
page read and write
21CA000
heap
page read and write
5580000
direct allocation
page execute and read and write
1DEF8207000
trusted library allocation
page read and write
286309AC000
trusted library allocation
page read and write
B84A0FD000
stack
page read and write
B844BFE000
stack
page read and write
4F30000
heap
page read and write
286321DA000
trusted library allocation
page read and write
2862DE56000
trusted library allocation
page read and write
238F3800000
trusted library allocation
page read and write
28632077000
trusted library allocation
page read and write
2863229E000
trusted library allocation
page read and write
E20000
heap
page read and write
50F1000
heap
page read and write
57F1000
heap
page read and write
6471000
heap
page read and write
28632799000
trusted library allocation
page read and write
28B15000
heap
page read and write
28630C45000
trusted library allocation
page read and write
4FD000
unkown
page execute and read and write
310F000
stack
page read and write
2291000
heap
page read and write
6471000
heap
page read and write
CB0000
heap
page read and write
238E73A0000
trusted library allocation
page read and write
DCD000
stack
page read and write
2930000
direct allocation
page read and write
238F44CB000
trusted library allocation
page read and write
1F4143C9000
trusted library allocation
page read and write
4F61000
heap
page read and write
22A0A000
heap
page read and write
4841000
heap
page read and write
F34000
heap
page read and write
238F347E000
trusted library allocation
page read and write
28632056000
trusted library allocation
page read and write
57F1000
heap
page read and write
392F000
stack
page read and write
19DB000
stack
page read and write
964BC5C000
stack
page read and write
57F1000
heap
page read and write
45D1000
heap
page read and write
238F2ECA000
trusted library allocation
page read and write
3BFF000
stack
page read and write
4841000
heap
page read and write
B84267A000
stack
page read and write
238F4D08000
trusted library allocation
page read and write
B84BE3B000
stack
page read and write
6FEE000
stack
page read and write
1CED000
heap
page read and write
4841000
heap
page read and write
286288F6000
heap
page read and write
50F1000
heap
page read and write
28630A2B000
trusted library allocation
page read and write
50F1000
heap
page read and write
28631DA0000
trusted library allocation
page read and write
2621000
heap
page read and write
286320FE000
trusted library allocation
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
BA4000
heap
page read and write
2862D6DE000
trusted library allocation
page read and write
28AA8000
heap
page read and write
2863C12C000
trusted library allocation
page read and write
50F1000
heap
page read and write
2947000
heap
page read and write
478F000
stack
page read and write
10E0000
direct allocation
page read and write
238F461E000
trusted library allocation
page read and write
BA4000
heap
page read and write
2862E66A000
trusted library allocation
page read and write
1F414176000
heap
page read and write
4841000
heap
page read and write
229F5000
heap
page read and write
161000
unkown
page execute and write copy
1683000
heap
page read and write
1F1B000
heap
page read and write
6471000
heap
page read and write
45D1000
heap
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
4F30000
direct allocation
page execute and read and write
286288DA000
heap
page read and write
28632640000
trusted library allocation
page read and write
238F3426000
trusted library allocation
page read and write
964ADD8000
stack
page read and write
28623500000
trusted library section
page readonly
1D3D000
heap
page read and write
229F4000
heap
page read and write
28630CB0000
trusted library allocation
page read and write
57F1000
heap
page read and write
286288FD000
heap
page read and write
43B1000
heap
page read and write
4E84000
direct allocation
page execute and read and write
6471000
heap
page read and write
291F000
stack
page read and write
2E4000
heap
page read and write
57F1000
heap
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
5D4000
heap
page read and write
49FE000
stack
page read and write
2862D386000
trusted library allocation
page read and write
4F61000
heap
page read and write
6471000
heap
page read and write
57F1000
heap
page read and write
50F1000
heap
page read and write
238F2E22000
trusted library allocation
page read and write
2862E8C9000
trusted library allocation
page read and write
2862D675000
trusted library allocation
page read and write
57F1000
heap
page read and write
238F2D81000
trusted library allocation
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
286394E5000
trusted library allocation
page read and write
6471000
heap
page read and write
286288BF000
heap
page read and write
22A0A000
heap
page read and write
286288CC000
heap
page read and write
2862DEAA000
trusted library allocation
page read and write
50F1000
heap
page read and write
229F7000
heap
page read and write
22FA000
heap
page read and write
3EEF000
stack
page read and write
1ECF000
heap
page read and write
28632559000
trusted library allocation
page read and write
4841000
heap
page read and write
2862E7E9000
trusted library allocation
page read and write
B8495FC000
stack
page read and write
28632EB4000
trusted library allocation
page read and write
286288F6000
heap
page read and write
2AAF000
stack
page read and write
D81F4FE000
stack
page read and write
2E4000
heap
page read and write
7EFE000
stack
page read and write
53A0000
trusted library allocation
page read and write
286327B4000
trusted library allocation
page read and write
45D1000
heap
page read and write
28A40000
heap
page read and write
238E9030000
trusted library section
page read and write
28630B00000
trusted library allocation
page read and write
45D1000
heap
page read and write
61E00000
direct allocation
page execute and read and write
286394C0000
trusted library allocation
page read and write
372F000
stack
page read and write
57F1000
heap
page read and write
B84110E000
stack
page read and write
6471000
heap
page read and write
238F2FDF000
trusted library allocation
page read and write
2863BFDC000
trusted library allocation
page read and write
D83000
heap
page read and write
57F1000
heap
page read and write
2863C32E000
trusted library allocation
page read and write
2863B740000
trusted library allocation
page read and write
6471000
heap
page read and write
4BAE000
stack
page read and write
286233C0000
heap
page read and write
40C0000
heap
page read and write
2863B73A000
trusted library allocation
page read and write
1F414174000
heap
page read and write
2862D5FB000
trusted library allocation
page read and write
436E000
stack
page read and write
28A80000
heap
page read and write
28632033000
trusted library allocation
page read and write
4841000
heap
page read and write
5D4000
heap
page read and write
4F61000
heap
page read and write
3D6F000
stack
page read and write
1C79E000
stack
page read and write
1AE7000
heap
page read and write
286321DA000
trusted library allocation
page read and write
2862E644000
trusted library allocation
page read and write
50F1000
heap
page read and write
43B1000
heap
page read and write
57F1000
heap
page read and write
E4D000
heap
page read and write
B8484FD000
stack
page read and write
238E8F58000
heap
page read and write
D30000
direct allocation
page read and write
5644000
direct allocation
page execute and read and write
2863256B000
trusted library allocation
page read and write
404F000
stack
page read and write
286321A5000
trusted library allocation
page read and write
1F414200000
trusted library allocation
page read and write
24AB000
heap
page read and write
6471000
heap
page read and write
286309CF000
trusted library allocation
page read and write
26A0000
direct allocation
page read and write
160000
unkown
page read and write
57F1000
heap
page read and write
238E8EA0000
heap
page read and write
2863C2BF000
trusted library allocation
page read and write
33E224400000
trusted library allocation
page read and write
D74000
heap
page read and write
286288E0000
heap
page read and write
B8482FD000
stack
page read and write
10D0000
heap
page read and write
96C000
stack
page read and write
2863BFD9000
trusted library allocation
page read and write
2863BE99000
trusted library allocation
page read and write
50F1000
heap
page read and write
3D7F000
stack
page read and write
2862E55D000
trusted library allocation
page read and write
3BED000
stack
page read and write
6471000
heap
page read and write
286324D8000
trusted library allocation
page read and write
57F1000
heap
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
3DCD000
stack
page read and write
4F61000
heap
page read and write
BA4000
heap
page read and write
2930000
direct allocation
page read and write
6471000
heap
page read and write
1F9F000
heap
page read and write
2862E33B000
trusted library allocation
page read and write
50F1000
heap
page read and write
286310E5000
trusted library allocation
page read and write
29ED000
heap
page read and write
2BEE000
stack
page read and write
27AF0E04000
heap
page read and write
2863217D000
trusted library allocation
page read and write
229F7000
heap
page read and write
286326C0000
trusted library allocation
page read and write
238F71A0000
trusted library allocation
page read and write
6471000
heap
page read and write
27AF11B9000
trusted library allocation
page read and write
286327F0000
trusted library allocation
page read and write
238E8F17000
heap
page read and write
57F1000
heap
page read and write
2863215D000
trusted library allocation
page read and write
286288F0000
heap
page read and write
238F7199000
trusted library allocation
page read and write
1F414381000
trusted library allocation
page read and write
F34000
heap
page read and write
3C3E000
stack
page read and write
6471000
heap
page read and write
286288EA000
heap
page read and write
57F1000
heap
page read and write
1686000
heap
page read and write
E61000
heap
page read and write
EC0000
heap
page read and write
10F4000
heap
page read and write
286288F7000
heap
page read and write
50F1000
heap
page read and write
229EE000
heap
page read and write
57F1000
heap
page read and write
238F71C9000
trusted library allocation
page read and write
2862D39F000
trusted library allocation
page read and write
213D000
heap
page read and write
B8443FF000
stack
page read and write
28631525000
trusted library allocation
page read and write
C6E000
stack
page read and write
2862DEB2000
trusted library allocation
page read and write
4F24000
direct allocation
page execute and read and write
28632E3D000
trusted library allocation
page read and write
286288E2000
heap
page read and write
286233FA000
heap
page read and write
28631C00000
trusted library allocation
page read and write
2862E9CC000
trusted library allocation
page read and write
28630FB2000
trusted library allocation
page read and write
50F1000
heap
page read and write
4F61000
heap
page read and write
43B1000
heap
page read and write
312E000
stack
page read and write
28631E95000
trusted library allocation
page read and write
57F1000
heap
page read and write
57F1000
heap
page read and write
2862E530000
trusted library allocation
page read and write
238F2EDA000
trusted library allocation
page read and write
6471000
heap
page read and write
286320F7000
trusted library allocation
page read and write
197F000
stack
page read and write
28621BB2000
unclassified section
page read and write
238F2E81000
trusted library allocation
page read and write
45D1000
heap
page read and write
238F3755000
trusted library allocation
page read and write
537D000
stack
page read and write
57F1000
heap
page read and write
2863C1C1000
trusted library allocation
page read and write
349000
unkown
page execute and read and write
28632EFE000
trusted library allocation
page read and write
2863BEF4000
trusted library allocation
page read and write
B20000
heap
page read and write
2863BFC1000
trusted library allocation
page read and write
3FE0000
direct allocation
page read and write
6471000
heap
page read and write
45D1000
heap
page read and write
50F1000
heap
page read and write
2863C1A3000
trusted library allocation
page read and write
1CC000
unkown
page execute and read and write
2862DB12000
trusted library allocation
page read and write
50F1000
heap
page read and write
43B1000
heap
page read and write
4A00000
direct allocation
page execute and read and write
2863BFCE000
trusted library allocation
page read and write
B84A7BA000
stack
page read and write
28632B93000
trusted library allocation
page read and write
4F61000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
897C000
stack
page read and write
2862E303000
trusted library allocation
page read and write
57F1000
heap
page read and write
28621A47000
trusted library allocation
page read and write
3EBE000
stack
page read and write
28630E6D000
trusted library allocation
page read and write
28630C75000
trusted library allocation
page read and write
4C70000
direct allocation
page execute and read and write
2862E8F5000
trusted library allocation
page read and write
50F1000
heap
page read and write
28632271000
trusted library allocation
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
57F1000
heap
page read and write
57F1000
heap
page read and write
356F000
stack
page read and write
5570000
heap
page read and write
2863151D000
trusted library allocation
page read and write
28630903000
trusted library allocation
page read and write
238F34AC000
trusted library allocation
page read and write
50F1000
heap
page read and write
28632161000
trusted library allocation
page read and write
2862F100000
trusted library allocation
page read and write
28623479000
heap
page read and write
53F0000
direct allocation
page execute and read and write
1F414323000
trusted library allocation
page read and write
42CF000
stack
page read and write
238F714E000
trusted library allocation
page read and write
5380000
heap
page read and write
FB0000
heap
page read and write
1DC6000
heap
page read and write
D74000
heap
page read and write
27AF11AF000
trusted library allocation
page read and write
57F1000
heap
page read and write
50F1000
heap
page read and write
229D0000
heap
page read and write
50F1000
heap
page read and write
28630C1F000
trusted library allocation
page read and write
2863129E000
trusted library allocation
page read and write
2863BFCB000
trusted library allocation
page read and write
24E9000
heap
page read and write
1ED000
stack
page read and write
286321DF000
trusted library allocation
page read and write
6471000
heap
page read and write
45D1000
heap
page read and write
6471000
heap
page read and write
28630CD4000
trusted library allocation
page read and write
917C000
stack
page read and write
1650000
heap
page read and write
238F44C3000
trusted library allocation
page read and write
57F1000
heap
page read and write
28632089000
trusted library allocation
page read and write
2862D9F3000
trusted library allocation
page read and write
6471000
heap
page read and write
3BBE000
stack
page read and write
28630B03000
trusted library allocation
page read and write
43B1000
heap
page read and write
1CBE94A0000
heap
page read and write
10F4000
heap
page read and write
28630EAF000
trusted library allocation
page read and write
28ABC000
heap
page read and write
28632271000
trusted library allocation
page read and write
286322B9000
trusted library allocation
page read and write
286288CF000
heap
page read and write
CB5000
heap
page read and write
D70000
direct allocation
page read and write
28621860000
trusted library section
page read and write
286288C1000
heap
page read and write
4B01000
heap
page read and write
2863C152000
trusted library allocation
page read and write
50F1000
heap
page read and write
2863BFD9000
trusted library allocation
page read and write
4D00000
direct allocation
page execute and read and write
286326BB000
trusted library allocation
page read and write
3C6F000
stack
page read and write
401000
unkown
page execute read
2862E347000
trusted library allocation
page read and write
2862E2E6000
trusted library allocation
page read and write
2862D2DF000
trusted library allocation
page read and write
D70000
direct allocation
page read and write
2C3E000
stack
page read and write
F34000
heap
page read and write
7FCE000
stack
page read and write
57F1000
heap
page read and write
4E60000
direct allocation
page execute and read and write
286288C0000
heap
page read and write
45D1000
heap
page read and write
2C2E000
stack
page read and write
43B1000
heap
page read and write
4F61000
heap
page read and write
725000
unkown
page execute and write copy
2E4000
heap
page read and write
28621820000
trusted library allocation
page execute read
2862D6B6000
trusted library allocation
page read and write
50F1000
heap
page read and write
1CBE94AE000
heap
page read and write
964B7BE000
stack
page read and write
4E60000
direct allocation
page execute and read and write
F34000
heap
page read and write
6600000
heap
page read and write
4F61000
heap
page read and write
4E80000
direct allocation
page execute and read and write
286318A6000
trusted library allocation
page read and write
4F61000
heap
page read and write
286288D3000
heap
page read and write
61ECD000
direct allocation
page readonly
6471000
heap
page read and write
10B7000
unkown
page execute and read and write
6471000
heap
page read and write
31BE000
stack
page read and write
D2E000
stack
page read and write
286288D5000
heap
page read and write
50F1000
heap
page read and write
57F1000
heap
page read and write
EF9000
stack
page read and write
4841000
heap
page read and write
42FF000
stack
page read and write
28632EE2000
trusted library allocation
page read and write
28632172000
trusted library allocation
page read and write
4C6000
unkown
page execute and read and write
6471000
heap
page read and write
229F7000
heap
page read and write
57F1000
heap
page read and write
2863214B000
trusted library allocation
page read and write
238F4A08000
trusted library allocation
page read and write
2862E0DB000
trusted library allocation
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
28631F00000
trusted library allocation
page read and write
2863267B000
trusted library allocation
page read and write
50F1000
heap
page read and write
1F413FAF000
remote allocation
page execute read
43B1000
heap
page read and write
28632684000
trusted library allocation
page read and write
4F61000
heap
page read and write
1F41437E000
trusted library allocation
page read and write
E00000
heap
page read and write
2862D6F8000
trusted library allocation
page read and write
2863B149000
trusted library allocation
page read and write
33CE000
stack
page read and write
286288CD000
heap
page read and write
35EF000
stack
page read and write
2863215D000
trusted library allocation
page read and write
238F3724000
trusted library allocation
page read and write
1683000
heap
page read and write
9650FFE000
stack
page read and write
27AF0E00000
heap
page read and write
493000
unkown
page execute and read and write
2862D1F0000
heap
page read and write
286288D5000
heap
page read and write
2863486D000
trusted library allocation
page read and write
4841000
heap
page read and write
6471000
heap
page read and write
57F1000
heap
page read and write
4A20000
direct allocation
page execute and read and write
45D1000
heap
page read and write
57F1000
heap
page read and write
6471000
heap
page read and write
426F000
stack
page read and write
50F1000
heap
page read and write
57F1000
heap
page read and write
1C961000
heap
page read and write
591F9FF000
stack
page read and write
2862E15F000
trusted library allocation
page read and write
2E4000
heap
page read and write
57F1000
heap
page read and write
24FA000
heap
page read and write
2863216C000
trusted library allocation
page read and write
1F52000
heap
page read and write
69F000
unkown
page execute and read and write
D6E000
stack
page read and write
2862E15C000
trusted library allocation
page read and write
610000
unkown
page execute and read and write
28630ADB000
trusted library allocation
page read and write
336F000
stack
page read and write
28628902000
heap
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
43B1000
heap
page read and write
286288DB000
heap
page read and write
286288F6000
heap
page read and write
4E30000
direct allocation
page execute and read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
2863277B000
trusted library allocation
page read and write
45D1000
heap
page read and write
F34000
heap
page read and write
69E000
stack
page read and write
238F4625000
trusted library allocation
page read and write
37B000
unkown
page execute and read and write
6471000
heap
page read and write
432F000
stack
page read and write
2862E171000
trusted library allocation
page read and write
286327E0000
trusted library allocation
page read and write
50F1000
heap
page read and write
2862DA64000
trusted library allocation
page read and write
28631586000
trusted library allocation
page read and write
964F7FD000
stack
page read and write
26A0000
direct allocation
page read and write
2863BFDC000
trusted library allocation
page read and write
EE0000
heap
page read and write
28D56000
heap
page read and write
28630C2A000
trusted library allocation
page read and write
238E76DD000
trusted library allocation
page read and write
2863219A000
trusted library allocation
page read and write
238F341E000
trusted library allocation
page read and write
2862E142000
trusted library allocation
page read and write
28632546000
trusted library allocation
page read and write
28623475000
heap
page read and write
238E8F5E000
heap
page read and write
6471000
heap
page read and write
28632186000
trusted library allocation
page read and write
238F4E00000
trusted library allocation
page read and write
2862E1DE000
trusted library allocation
page read and write
5D4000
heap
page read and write
EA4000
heap
page read and write
50B000
unkown
page execute and read and write
5D4000
heap
page read and write
6471000
heap
page read and write
4F61000
heap
page read and write
238F3755000
trusted library allocation
page read and write
2E4000
heap
page read and write
2862E000000
trusted library allocation
page read and write
28623544000
heap
page read and write
28632803000
trusted library allocation
page read and write
28631F83000
trusted library allocation
page read and write
57F1000
heap
page read and write
238F6C2B000
trusted library allocation
page read and write
28630F33000
trusted library allocation
page read and write
28632503000
trusted library allocation
page read and write
28631F03000
trusted library allocation
page read and write
27AF120E000
trusted library allocation
page read and write
6471000
heap
page read and write
407F000
stack
page read and write
30FE000
stack
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
3EFE000
stack
page read and write
57F1000
heap
page read and write
30AE000
stack
page read and write
50F1000
heap
page read and write
D70000
direct allocation
page read and write
4F61000
heap
page read and write
50F1000
heap
page read and write
28630C49000
trusted library allocation
page read and write
28631300000
heap
page read and write
45D1000
heap
page read and write
28632380000
trusted library section
page read and write
1BC4000
heap
page read and write
3F60000
heap
page read and write
372000
unkown
page execute and read and write
3BEF000
stack
page read and write
1C79D000
stack
page read and write
286288CC000
heap
page read and write
238F6A6B000
trusted library allocation
page read and write
4E90000
direct allocation
page execute and read and write
4BF0000
direct allocation
page execute and read and write
286288FD000
heap
page read and write
6471000
heap
page read and write
2AAF000
stack
page read and write
1B70000
heap
page read and write
57F0000
heap
page read and write
E90000
direct allocation
page read and write
45D1000
heap
page read and write
2863903C000
trusted library allocation
page read and write
E90000
direct allocation
page read and write
2862DB03000
trusted library allocation
page read and write
2862DC63000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
6471000
heap
page read and write
57F1000
heap
page read and write
7D94000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
10E0000
direct allocation
page read and write
2862DCF6000
trusted library allocation
page read and write
28630F82000
trusted library allocation
page read and write
238F3846000
trusted library allocation
page read and write
2862DAB8000
trusted library allocation
page read and write
50F1000
heap
page read and write
286288C7000
heap
page read and write
4841000
heap
page read and write
6471000
heap
page read and write
2863217B000
trusted library allocation
page read and write
238F2CD0000
unclassified section
page read and write
28632929000
trusted library allocation
page read and write
48EF000
stack
page read and write
28630A5C000
trusted library allocation
page read and write
45D1000
heap
page read and write
238F2ECE000
trusted library allocation
page read and write
2E4000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
50F1000
heap
page read and write
45D1000
heap
page read and write
D74000
heap
page read and write
27AF0D50000
heap
page read and write
2862D61E000
trusted library allocation
page read and write
2BB000
unkown
page execute and read and write
238F3712000
trusted library allocation
page read and write
1CBE7959000
heap
page read and write
6471000
heap
page read and write
3B3E000
stack
page read and write
4841000
heap
page read and write
D81EC7B000
stack
page read and write
F28A9FE000
stack
page read and write
238F43BC000
trusted library allocation
page read and write
3DCE000
stack
page read and write
4CD0000
direct allocation
page read and write
4791000
heap
page read and write
286321F5000
trusted library allocation
page read and write
6471000
heap
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
2862D1E0000
trusted library section
page readonly
6471000
heap
page read and write
F7E000
stack
page read and write
27BF000
stack
page read and write
3D3F000
stack
page read and write
6471000
heap
page read and write
2862DBBD000
trusted library allocation
page read and write
286288FD000
heap
page read and write
6471000
heap
page read and write
5610000
direct allocation
page execute and read and write
162E000
heap
page read and write
577000
unkown
page execute and read and write
4C00000
heap
page read and write
45D1000
heap
page read and write
2862D3DA000
trusted library allocation
page read and write
2863BE4F000
trusted library allocation
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
50E0000
direct allocation
page execute and read and write
28621A6B000
trusted library allocation
page read and write
28631847000
trusted library allocation
page read and write
25C6DB00000
heap
page read and write
9D0000
heap
page read and write
2862DAA3000
trusted library allocation
page read and write
28632003000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
286288CC000
heap
page read and write
964BD9E000
stack
page read and write
50F1000
heap
page read and write
62C000
unkown
page execute and read and write
229E7000
heap
page read and write
1BC4000
heap
page read and write
238F5109000
trusted library allocation
page read and write
28632BC1000
trusted library allocation
page read and write
28630AF3000
trusted library allocation
page read and write
31FF000
stack
page read and write
57F1000
heap
page read and write
27AF115B000
trusted library allocation
page read and write
50F1000
heap
page read and write
238F4408000
trusted library allocation
page read and write
19BE000
stack
page read and write
1DEF8200000
trusted library allocation
page read and write
1EE4000
heap
page read and write
E42000
heap
page read and write
57F1000
heap
page read and write
28631000000
trusted library allocation
page read and write
38FF000
stack
page read and write
2863215D000
trusted library allocation
page read and write
49E0000
direct allocation
page execute and read and write
28630AD7000
trusted library allocation
page read and write
E44000
heap
page read and write
28630C62000
trusted library allocation
page read and write
238F43DF000
trusted library allocation
page read and write
B845BFF000
stack
page read and write
50F1000
heap
page read and write
229F7000
heap
page read and write
28631CDD000
trusted library allocation
page read and write
4C6000
unkown
page execute and write copy
26B0000
heap
page read and write
27AF11CB000
trusted library allocation
page read and write
238F373E000
trusted library allocation
page read and write
286325A3000
trusted library allocation
page read and write
15B0000
heap
page read and write
28630DCD000
trusted library allocation
page read and write
12A0000
direct allocation
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
4BD000
unkown
page readonly
4891000
direct allocation
page read and write
621F000
stack
page read and write
2862DBB0000
trusted library allocation
page read and write
286288EA000
heap
page read and write
6471000
heap
page read and write
4830000
direct allocation
page read and write
323E000
stack
page read and write
2020000
heap
page read and write
2862E0BB000
trusted library allocation
page read and write
5150000
direct allocation
page execute and read and write
4F61000
heap
page read and write
50F0000
direct allocation
page execute and read and write
39BF000
stack
page read and write
BA4000
heap
page read and write
2862E390000
trusted library allocation
page read and write
4830000
direct allocation
page read and write
B84B2FF000
stack
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
286288C1000
heap
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
4F61000
heap
page read and write
96517FD000
stack
page read and write
215E000
heap
page read and write
6471000
heap
page read and write
286288D8000
heap
page read and write
2863227E000
trusted library allocation
page read and write
57F1000
heap
page read and write
BA4000
heap
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
2862E3DF000
trusted library allocation
page read and write
F34000
heap
page read and write
4C71000
direct allocation
page read and write
57F1000
heap
page read and write
BA4000
heap
page read and write
FDE000
stack
page read and write
2863215D000
trusted library allocation
page read and write
28632954000
trusted library allocation
page read and write
28630A00000
trusted library allocation
page read and write
B84A07A000
stack
page read and write
B84A7FF000
stack
page read and write
454F000
stack
page read and write
725000
unkown
page execute and write copy
4F50000
direct allocation
page read and write
5D4000
heap
page read and write
2862E825000
trusted library allocation
page read and write
286321DF000
trusted library allocation
page read and write
50E0000
direct allocation
page execute and read and write
28632E11000
trusted library allocation
page read and write
28630A7A000
trusted library allocation
page read and write
6471000
heap
page read and write
238F5800000
trusted library section
page readonly
45D1000
heap
page read and write
261F000
stack
page read and write
286321FD000
trusted library allocation
page read and write
238E76D7000
trusted library allocation
page read and write
28633187000
trusted library allocation
page read and write
6471000
heap
page read and write
286288F6000
heap
page read and write
4F61000
heap
page read and write
6471000
heap
page read and write
35FE000
stack
page read and write
2862E70D000
trusted library allocation
page read and write
4F61000
heap
page read and write
2863C324000
trusted library allocation
page read and write
2D4F000
stack
page read and write
57F1000
heap
page read and write
28632066000
trusted library allocation
page read and write
50F1000
heap
page read and write
238F37C9000
trusted library allocation
page read and write
D74000
heap
page read and write
43B1000
heap
page read and write
BA4000
heap
page read and write
56AD000
stack
page read and write
6C445000
unkown
page readonly
238F43DF000
trusted library allocation
page read and write
286217D0000
heap
page read and write
50F1000
heap
page read and write
3B2F000
stack
page read and write
1FBA000
heap
page read and write
6970000
heap
page read and write
238F4595000
trusted library allocation
page read and write
28630A4F000
trusted library allocation
page read and write
2862D2B3000
trusted library allocation
page read and write
1D7A000
heap
page read and write
1F414367000
trusted library allocation
page read and write
22A05000
heap
page read and write
4841000
heap
page read and write
2863BEE3000
trusted library allocation
page read and write
22A12000
heap
page read and write
28630F49000
trusted library allocation
page read and write
4A50000
direct allocation
page execute and read and write
6471000
heap
page read and write
41DC000
heap
page read and write
57F1000
heap
page read and write
2CAF000
stack
page read and write
4980000
direct allocation
page execute and read and write
286288F7000
heap
page read and write
1BC4000
heap
page read and write
7D80000
heap
page read and write
364E000
stack
page read and write
EA4000
heap
page read and write
42C000
unkown
page execute and write copy
2862D652000
trusted library allocation
page read and write
3F63000
heap
page read and write
286326D9000
trusted library allocation
page read and write
286288CF000
heap
page read and write
6471000
heap
page read and write
BA4000
heap
page read and write
286323D0000
trusted library section
page read and write
50F1000
heap
page read and write
34FE000
stack
page read and write
3E2F000
stack
page read and write
1671000
heap
page read and write
50F1000
heap
page read and write
2862E6A8000
trusted library allocation
page read and write
45D1000
heap
page read and write
4CAF000
stack
page read and write
28630AF0000
trusted library allocation
page read and write
45D1000
heap
page read and write
2863216C000
trusted library allocation
page read and write
50F1000
heap
page read and write
4F24000
direct allocation
page execute and read and write
5550000
direct allocation
page execute and read and write
238E8F92000
heap
page read and write
50F1000
heap
page read and write
314E000
stack
page read and write
2862DAD7000
trusted library allocation
page read and write
45D1000
heap
page read and write
238F2F03000
trusted library allocation
page read and write
286288ED000
heap
page read and write
3DFF000
stack
page read and write
9C000
stack
page read and write
286288D2000
heap
page read and write
2863BEA3000
trusted library allocation
page read and write
50F1000
heap
page read and write
D80000
heap
page read and write
50F1000
heap
page read and write
286320BE000
trusted library allocation
page read and write
50F1000
heap
page read and write
1165BDD00000
trusted library allocation
page read and write
2862E957000
trusted library allocation
page read and write
28631FB8000
trusted library allocation
page read and write
F288FFE000
unkown
page readonly
4F61000
heap
page read and write
63F0000
heap
page read and write
5600000
direct allocation
page execute and read and write
388F000
stack
page read and write
238F6D0A000
heap
page read and write
6471000
heap
page read and write
238F3769000
trusted library allocation
page read and write
D70000
direct allocation
page read and write
229EF000
heap
page read and write
50F1000
heap
page read and write
5644000
direct allocation
page execute and read and write
BA4000
heap
page read and write
50F1000
heap
page read and write
26A0000
direct allocation
page read and write
E3D000
heap
page read and write
50F1000
heap
page read and write
57F1000
heap
page read and write
2862D200000
trusted library allocation
page read and write
2862E084000
trusted library allocation
page read and write
50F1000
heap
page read and write
2863219F000
trusted library allocation
page read and write
50F1000
heap
page read and write
53CF000
stack
page read and write
2862E9DC000
trusted library allocation
page read and write
1D84000
heap
page read and write
1C76000
heap
page read and write
50F1000
heap
page read and write
57F1000
heap
page read and write
379000
unkown
page write copy
238F44F9000
trusted library allocation
page read and write
F28BB7E000
stack
page read and write
50F1000
heap
page read and write
28632C8A000
trusted library allocation
page read and write
4260000
heap
page read and write
6690000
heap
page read and write
238F5285000
trusted library allocation
page read and write
22A12000
heap
page read and write
57F1000
heap
page read and write
3B6E000
stack
page read and write
EF0000
direct allocation
page read and write
50F1000
heap
page read and write
4BC0000
trusted library allocation
page read and write
286320EE000
trusted library allocation
page read and write
28631798000
trusted library allocation
page read and write
514F000
stack
page read and write
57F1000
heap
page read and write
6471000
heap
page read and write
F2E000
stack
page read and write
238F6C18000
trusted library allocation
page read and write
458E000
stack
page read and write
45BE000
stack
page read and write
200000
heap
page read and write
492E000
stack
page read and write
964A3DD000
stack
page read and write
1DEF8100000
trusted library allocation
page read and write
6ABE000
stack
page read and write
591F1FF000
stack
page read and write
3AAE000
stack
page read and write
286288D2000
heap
page read and write
6471000
heap
page read and write
FF560000
direct allocation
page execute and read and write
28631223000
trusted library allocation
page read and write
50F1000
heap
page read and write
10E0000
direct allocation
page read and write
45C000
unkown
page execute and read and write
19CE000
stack
page read and write
B84A5BB000
stack
page read and write
63EE000
heap
page read and write
32FE000
stack
page read and write
423000
unkown
page readonly
4F61000
heap
page read and write
50F1000
heap
page read and write
2862D5FE000
trusted library allocation
page read and write
61E01000
direct allocation
page execute read
286288F7000
heap
page read and write
5600000
direct allocation
page execute and read and write
1CBE94B6000
heap
page read and write
28630AFD000
trusted library allocation
page read and write
F28B33E000
stack
page read and write
46E000
unkown
page execute and read and write
238F43B5000
trusted library allocation
page read and write
57F1000
heap
page read and write
2104000
heap
page read and write
456000
unkown
page execute and read and write
621000
unkown
page execute and read and write
2863B700000
trusted library allocation
page read and write
45D1000
heap
page read and write
BA4000
heap
page read and write
6471000
heap
page read and write
2045000
heap
page read and write
28631968000
trusted library allocation
page read and write
28632161000
trusted library allocation
page read and write
FC0000
direct allocation
page execute and read and write
57F1000
heap
page read and write
2863229E000
trusted library allocation
page read and write
C9B000
unkown
page execute and read and write
286288E0000
heap
page read and write
6471000
heap
page read and write
B84B4F6000
stack
page read and write
1F414372000
trusted library allocation
page read and write
57F1000
heap
page read and write
2863133C000
heap
page read and write
28631BC7000
trusted library allocation
page read and write
28632762000
trusted library allocation
page read and write
238F467C000
trusted library allocation
page read and write
2863BFDC000
trusted library allocation
page read and write
49E0000
direct allocation
page execute and read and write
D1E000
stack
page read and write
4D10000
direct allocation
page execute and read and write
F6A000
heap
page read and write
238F71C9000
trusted library allocation
page read and write
28630FE1000
trusted library allocation
page read and write
1CCA000
heap
page read and write
28630A3A000
trusted library allocation
page read and write
238F6AB5000
trusted library allocation
page read and write
286288E2000
heap
page read and write
834C000
stack
page read and write
2862E38D000
trusted library allocation
page read and write
286288DB000
heap
page read and write
4020000
heap
page read and write
2862DD6E000
trusted library allocation
page read and write
2862DD7B000
trusted library allocation
page read and write
6E0D000
heap
page read and write
43B1000
heap
page read and write
286324BD000
trusted library allocation
page read and write
45D1000
heap
page read and write
45D1000
heap
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
2863217F000
trusted library allocation
page read and write
238F2D00000
trusted library allocation
page read and write
587000
unkown
page execute and read and write
238F4D00000
trusted library allocation
page read and write
286288F7000
heap
page read and write
6471000
heap
page read and write
224F000
heap
page read and write
238E7667000
trusted library allocation
page read and write
286394CF000
trusted library allocation
page read and write
28631503000
trusted library allocation
page read and write
28631200000
trusted library allocation
page read and write
45D1000
heap
page read and write
2862D48A000
trusted library allocation
page read and write
47FF000
stack
page read and write
6471000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
27AF1166000
trusted library allocation
page read and write
1B40000
direct allocation
page execute and read and write
40EE000
stack
page read and write
286325E7000
trusted library allocation
page read and write
286288A0000
heap
page read and write
45D1000
heap
page read and write
57F1000
heap
page read and write
3FFF000
stack
page read and write
57F1000
heap
page read and write
6471000
heap
page read and write
286288F7000
heap
page read and write
1C969000
heap
page read and write
6471000
heap
page read and write
2862E02C000
trusted library allocation
page read and write
6471000
heap
page read and write
286320D5000
trusted library allocation
page read and write
50F1000
heap
page read and write
57F1000
heap
page read and write
B8426FE000
stack
page read and write
2863BEB2000
trusted library allocation
page read and write
2863204C000
trusted library allocation
page read and write
6471000
heap
page read and write
6471000
heap
page read and write
1BC4000
heap
page read and write
39FD000
stack
page read and write
F7E000
stack
page read and write
4F61000
heap
page read and write
2862E36A000
trusted library allocation
page read and write
50F1000
heap
page read and write
1DEF7F20000
heap
page read and write
964CFFE000
stack
page read and write
238F4500000
trusted library allocation
page read and write
6471000
heap
page read and write
452000
unkown
page execute and read and write
57F1000
heap
page read and write
E49000
heap
page read and write
25C6DC00000
trusted library allocation
page read and write
50F1000
heap
page read and write
5560000
direct allocation
page execute and read and write
964BD1E000
stack
page read and write
6471000
heap
page read and write
4E60000
direct allocation
page execute and read and write
238F4703000
trusted library allocation
page read and write
2490000
heap
page read and write
E32FBFF000
stack
page read and write
22A0A000
heap
page read and write
591E9FF000
stack
page read and write
286309E7000
trusted library allocation
page read and write
238F2D90000
trusted library allocation
page read and write
EA4000
heap
page read and write
286288F6000
heap
page read and write
238F467F000
trusted library allocation
page read and write
25C6DD00000
trusted library allocation
page read and write
43B1000
heap
page read and write
57F1000
heap
page read and write
15FD000
heap
page read and write
964FFFF000
stack
page read and write
45E1000
heap
page read and write
1BCE000
stack
page read and write
28632084000
trusted library allocation
page read and write
30EF000
stack
page read and write
229DB000
heap
page read and write
F34000
heap
page read and write
43B1000
heap
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
2862E703000
trusted library allocation
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
238F373E000
trusted library allocation
page read and write
1F414312000
trusted library allocation
page read and write
28632B18000
trusted library allocation
page read and write
238F715B000
trusted library allocation
page read and write
EF0000
direct allocation
page read and write
2862E783000
trusted library allocation
page read and write
28631BB9000
trusted library allocation
page read and write
6471000
heap
page read and write
22A04000
heap
page read and write
311000
unkown
page execute and write copy
22A02000
heap
page read and write
964C7FE000
stack
page read and write
63E1000
heap
page read and write
43B1000
heap
page read and write
2862EB0F000
trusted library allocation
page read and write
B84A8BD000
stack
page read and write
238F46EB000
trusted library allocation
page read and write
238F4652000
trusted library allocation
page read and write
447E000
stack
page read and write
28631A07000
trusted library allocation
page read and write
50F1000
heap
page read and write
187E000
stack
page read and write
50F1000
heap
page read and write
4F61000
heap
page read and write
50B000
unkown
page execute and read and write
10E0000
direct allocation
page read and write
28630E73000
trusted library allocation
page read and write
286288E5000
heap
page read and write
50F1000
heap
page read and write
1BD0000
direct allocation
page execute and read and write
238F6903000
trusted library allocation
page read and write
2930000
direct allocation
page read and write
1EDB000
heap
page read and write
6471000
heap
page read and write
28630A78000
trusted library allocation
page read and write
4841000
heap
page read and write
286288FC000
heap
page read and write
6471000
heap
page read and write
2862E0A4000
trusted library allocation
page read and write
202E000
heap
page read and write
28621BC0000
trusted library section
page readonly
50F1000
heap
page read and write
45D1000
heap
page read and write
286288BF000
heap
page read and write
238F3793000
trusted library allocation
page read and write
6471000
heap
page read and write
C54000
unkown
page execute and read and write
541E000
stack
page read and write
50BF000
stack
page read and write
28632EE6000
trusted library allocation
page read and write
160E000
heap
page read and write
50F1000
heap
page read and write
37FE000
stack
page read and write
1D76000
heap
page read and write
2863155E000
trusted library allocation
page read and write
45D1000
heap
page read and write
50F1000
heap
page read and write
286288C1000
heap
page read and write
28631058000
trusted library allocation
page read and write
1F32000
heap
page read and write
4E33000
heap
page read and write
50F1000
heap
page read and write
2862D2CB000
trusted library allocation
page read and write
238F6A90000
trusted library allocation
page read and write
57F1000
heap
page read and write
286324EB000
trusted library allocation
page read and write
4F61000
heap
page read and write
4A80000
direct allocation
page execute and read and write
28631900000
trusted library allocation
page read and write
332E000
stack
page read and write
1CFBD0F1000
trusted library allocation
page execute read
2863201F000
trusted library allocation
page read and write
10E0000
direct allocation
page read and write
1C960000
heap
page read and write
28630F18000
trusted library allocation
page read and write
6471000
heap
page read and write
28632030000
trusted library allocation
page read and write
50F1000
heap
page read and write
4AD0000
trusted library allocation
page read and write
6471000
heap
page read and write
424F000
stack
page read and write
1C2000
unkown
page execute and read and write
4F61000
heap
page read and write
2862DFC6000
trusted library allocation
page read and write
E33000
heap
page read and write
1C69F000
stack
page read and write
28632197000
trusted library allocation
page read and write
2E4000
heap
page read and write
28630BD6000
trusted library allocation
page read and write
286288CC000
heap
page read and write
28632C11000
trusted library allocation
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
238E9080000
heap
page read and write
2862E733000
trusted library allocation
page read and write
28632684000
trusted library allocation
page read and write
D30000
direct allocation
page read and write
4841000
heap
page read and write
6471000
heap
page read and write
286321F5000
trusted library allocation
page read and write
2863C227000
trusted library allocation
page read and write
50F1000
heap
page read and write
2863BF70000
trusted library allocation
page read and write
286288FD000
heap
page read and write
238F332F000
trusted library allocation
page read and write
20D7000
heap
page read and write
28631256000
trusted library allocation
page read and write
F30000
heap
page read and write
28632200000
trusted library allocation
page read and write
4E84000
direct allocation
page execute and read and write
194000
stack
page read and write
2862E3B1000
trusted library allocation
page read and write
81AF000
stack
page read and write
50F1000
heap
page read and write
2862DA00000
trusted library allocation
page read and write
238F6960000
trusted library allocation
page read and write
2862D610000
trusted library allocation
page read and write
28631286000
trusted library allocation
page read and write
286321FD000
trusted library allocation
page read and write
1679000
heap
page read and write
2862E6F8000
trusted library allocation
page read and write
276B000
heap
page read and write
2863BEF0000
trusted library allocation
page read and write
2863256F000
trusted library allocation
page read and write
310000
unkown
page readonly
28628901000
heap
page read and write
3CAE000
stack
page read and write
50F1000
heap
page read and write
2863BFBC000
trusted library allocation
page read and write
50F1000
heap
page read and write
238F71C9000
trusted library allocation
page read and write
657F000
stack
page read and write
964B85D000
stack
page read and write
286288E2000
heap
page read and write
DD8000
heap
page read and write
286324B1000
trusted library allocation
page read and write
2863C184000
trusted library allocation
page read and write
2862DC45000
trusted library allocation
page read and write
C10000
unkown
page readonly
6471000
heap
page read and write
2862DBA5000
trusted library allocation
page read and write
50F1000
heap
page read and write
E60000
heap
page read and write
B84A27E000
stack
page read and write
1FD9000
heap
page read and write
4D80000
direct allocation
page execute and read and write
5120000
direct allocation
page execute and read and write
328F000
stack
page read and write
2862DCC1000
trusted library allocation
page read and write
2862DD80000
trusted library allocation
page read and write
637000
unkown
page execute and read and write
893F000
stack
page read and write
2E7F000
stack
page read and write
1C8DE000
stack
page read and write
6471000
heap
page read and write
286288C7000
heap
page read and write
160000
unkown
page readonly
25C6DBA0000
heap
page read and write
1E74000
heap
page read and write
10F4000
heap
page read and write
286288C5000
heap
page read and write
238F2D9E000
trusted library allocation
page read and write
4841000
heap
page read and write
28632121000
trusted library allocation
page read and write
238F449F000
trusted library allocation
page read and write
47AF000
stack
page read and write
2102000
heap
page read and write
7E5000
unkown
page execute and write copy
1CBE7C00000
trusted library allocation
page read and write
F70000
direct allocation
page execute and read and write
1D8B000
heap
page read and write
4D80000
direct allocation
page execute and read and write
41D0000
heap
page read and write
286308F2000
unclassified section
page read and write
238E8F24000
heap
page read and write
2862DBD5000
trusted library allocation
page read and write
57F1000
heap
page read and write
28D5A000
heap
page read and write
286321C9000
trusted library allocation
page read and write
B84603E000
stack
page read and write
28631035000
trusted library allocation
page read and write
28639000000
trusted library allocation
page read and write
286288E8000
heap
page read and write
2863B72D000
trusted library allocation
page read and write
4841000
heap
page read and write
6471000
heap
page read and write
38AE000
stack
page read and write
4841000
heap
page read and write
57F1000
heap
page read and write
6471000
heap
page read and write
1D9F000
heap
page read and write
500000
unkown
page execute and read and write
2862D901000
trusted library allocation
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
6471000
heap
page read and write
57F1000
heap
page read and write
BA4000
heap
page read and write
2862D41A000
trusted library allocation
page read and write
1C8EE000
stack
page read and write
50F1000
heap
page read and write
10FF000
stack
page read and write
B8474EE000
stack
page read and write
50F1000
heap
page read and write
28631E2B000
trusted library allocation
page read and write
6471000
heap
page read and write
96511FD000
stack
page read and write
26A0000
direct allocation
page read and write
2379000
heap
page read and write
2E4000
heap
page read and write
2862D600000
trusted library allocation
page read and write
238F6A7C000
trusted library allocation
page read and write
50F1000
heap
page read and write
2863BFCB000
trusted library allocation
page read and write
50F1000
heap
page read and write
43B1000
heap
page read and write
27AF1170000
trusted library allocation
page read and write
57F1000
heap
page read and write
2863215D000
trusted library allocation
page read and write
19BF000
stack
page read and write
4841000
heap
page read and write
50F1000
heap
page read and write
D98000
heap
page read and write
4D70000
heap
page read and write
6D80000
heap
page read and write
2863C24F000
trusted library allocation
page read and write
2862D26B000
trusted library allocation
page read and write
2863BE4B000
trusted library allocation
page read and write
B842678000
stack
page read and write
286321F5000
trusted library allocation
page read and write
2862F200000
trusted library allocation
page read and write
2862DF01000
trusted library allocation
page read and write
28632E36000
trusted library allocation
page read and write
57F1000
heap
page read and write
D81E3FE000
stack
page read and write
4C60000
direct allocation
page execute and read and write
238F5850000
trusted library section
page readonly
B84A13C000
stack
page read and write
63E000
unkown
page execute and read and write
45D1000
heap
page read and write
4F61000
heap
page read and write
4CBC000
stack
page read and write
286323A0000
trusted library section
page read and write
4FBE000
stack
page read and write
240C000
heap
page read and write
6471000
heap
page read and write
2863BFBC000
trusted library allocation
page read and write
28632555000
trusted library allocation
page read and write
390000
unkown
page readonly
286288D5000
heap
page read and write
286288CE000
heap
page read and write
50F1000
heap
page read and write
4F50000
direct allocation
page read and write
28631701000
trusted library allocation
page read and write
964B5FE000
stack
page read and write
2862E564000
trusted library allocation
page read and write
6471000
heap
page read and write
4F61000
heap
page read and write
C54000
unkown
page execute and write copy
4F61000
heap
page read and write
5F6000
unkown
page execute and read and write
4D4F000
stack
page read and write
2862D234000
trusted library allocation
page read and write
4BF0000
direct allocation
page execute and read and write
4C6000
unkown
page execute and read and write
4F14000
direct allocation
page execute and read and write
679E000
stack
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
57F1000
heap
page read and write
B847AFA000
stack
page read and write
50F1000
heap
page read and write
2862E047000
trusted library allocation
page read and write
50F1000
heap
page read and write
B84A50F000
unkown
page read and write
2CCF000
stack
page read and write
5F2000
unkown
page execute and read and write
9B1000
unkown
page execute and read and write
229DA000
heap
page read and write
28631596000
trusted library allocation
page read and write
C51000
unkown
page execute and write copy
6471000
heap
page read and write
C54000
unkown
page execute and read and write
43B1000
heap
page read and write
5644000
direct allocation
page execute and read and write
286321DA000
trusted library allocation
page read and write
238F37F1000
trusted library allocation
page read and write
6471000
heap
page read and write
28631DFB000
trusted library allocation
page read and write
50F1000
heap
page read and write
229F7000
heap
page read and write
50F1000
heap
page read and write
286309DF000
trusted library allocation
page read and write
406E000
stack
page read and write
50F1000
heap
page read and write
28630AF5000
trusted library allocation
page read and write
286288CF000
heap
page read and write
50F1000
heap
page read and write
1CBE94AB000
heap
page read and write
28632297000
trusted library allocation
page read and write
3A0F000
stack
page read and write
45D1000
heap
page read and write
36EE000
stack
page read and write
E02000
heap
page read and write
50F1000
heap
page read and write
229683A04000
trusted library allocation
page read and write
238F341B000
trusted library allocation
page read and write
286288D8000
heap
page read and write
28632034000
trusted library allocation
page read and write
1E3F000
heap
page read and write
379000
unkown
page read and write
B849E3C000
stack
page read and write
286321E3000
trusted library allocation
page read and write
2862E08E000
trusted library allocation
page read and write
28632022000
trusted library allocation
page read and write
28630FE4000
trusted library allocation
page read and write
637000
unkown
page execute and write copy
4F6E000
stack
page read and write
28631DA9000
trusted library allocation
page read and write
28632203000
trusted library allocation
page read and write
286288D8000
heap
page read and write
E90000
direct allocation
page read and write
238F523C000
trusted library allocation
page read and write
162F000
heap
page read and write
229F4000
heap
page read and write
2862D1A0000
trusted library section
page readonly
27AF0F10000
heap
page read and write
4E50000
direct allocation
page execute and read and write
4C90000
direct allocation
page execute and read and write
28630CCC000
trusted library allocation
page read and write
4D1000
unkown
page execute and read and write
50F1000
heap
page read and write
57F1000
heap
page read and write
229F4000
heap
page read and write
28630ADF000
trusted library allocation
page read and write
50F1000
heap
page read and write
1CBE94AF000
heap
page read and write
310000
unkown
page readonly
20C4000
heap
page read and write
4830000
direct allocation
page read and write
238F45BB000
trusted library allocation
page read and write
E4D000
heap
page read and write
4F61000
heap
page read and write
50F1000
heap
page read and write
6C43F000
unkown
page write copy
2863214D000
trusted library allocation
page read and write
2862D6BA000
trusted library allocation
page read and write
28632181000
trusted library allocation
page read and write
28630ADB000
trusted library allocation
page read and write
10E0000
direct allocation
page read and write
F1F000
unkown
page execute and write copy
286329A8000
trusted library allocation
page read and write
6471000
heap
page read and write
286F000
stack
page read and write
DC7000
heap
page read and write
28623380000
heap
page read and write
57F1000
heap
page read and write
1E8C000
heap
page read and write
28632297000
trusted library allocation
page read and write
2863BFA0000
trusted library allocation
page read and write
238E7370000
heap
page read and write
6471000
heap
page read and write
42AE000
stack
page read and write
2863B74D000
trusted library allocation
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
28632997000
trusted library allocation
page read and write
238F4694000
trusted library allocation
page read and write
50F1000
heap
page read and write
EA4000
heap
page read and write
2862DEA5000
trusted library allocation
page read and write
286288FD000
heap
page read and write
4F70000
heap
page read and write
238F3826000
trusted library allocation
page read and write
4BBE000
stack
page read and write
286310D3000
trusted library allocation
page read and write
286325E2000
trusted library allocation
page read and write
2862EF09000
trusted library allocation
page read and write
50F1000
heap
page read and write
2862E65D000
trusted library allocation
page read and write
4F13000
direct allocation
page execute and read and write
286288E1000
heap
page read and write
6471000
heap
page read and write
57F1000
heap
page read and write
4F61000
heap
page read and write
7AA9000
heap
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
390000
unkown
page readonly
238F37B8000
trusted library allocation
page read and write
2E4000
heap
page read and write
463E000
stack
page read and write
4F61000
heap
page read and write
43C1000
heap
page read and write
4DEF000
stack
page read and write
2862F703000
trusted library allocation
page read and write
4E74000
direct allocation
page execute and read and write
1F4141B0000
heap
page read and write
286288D5000
heap
page read and write
286288FD000
heap
page read and write
27AF0DE0000
heap
page readonly
39EF000
stack
page read and write
7D7C000
stack
page read and write
238F37E8000
trusted library allocation
page read and write
D74000
heap
page read and write
778E000
stack
page read and write
B8411CD000
stack
page read and write
1EC6000
heap
page read and write
28631E04000
trusted library allocation
page read and write
286288C1000
heap
page read and write
2862DBA1000
trusted library allocation
page read and write
286394E2000
trusted library allocation
page read and write
F60000
heap
page read and write
26A0000
direct allocation
page read and write
28631A03000
trusted library allocation
page read and write
238F465E000
trusted library allocation
page read and write
28631DFE000
trusted library allocation
page read and write
50F1000
heap
page read and write
1E8C000
heap
page read and write
43B1000
heap
page read and write
4C90000
direct allocation
page execute and read and write
286288C7000
heap
page read and write
286325E2000
trusted library allocation
page read and write
22C3000
heap
page read and write
50F1000
heap
page read and write
2862D97B000
trusted library allocation
page read and write
25C7000
heap
page read and write
3F0F000
stack
page read and write
629000
unkown
page execute and read and write
D81D3D8000
stack
page read and write
2E4000
heap
page read and write
6471000
heap
page read and write
238F5277000
trusted library allocation
page read and write
2862D682000
trusted library allocation
page read and write
2862D67D000
trusted library allocation
page read and write
1C63F000
stack
page read and write
2862E94E000
trusted library allocation
page read and write
FB0000
heap
page read and write
BA4000
heap
page read and write
4990000
direct allocation
page execute and read and write
2862E0D8000
trusted library allocation
page read and write
1AE0000
heap
page read and write
28632ACB000
trusted library allocation
page read and write
50F1000
heap
page read and write
57F1000
heap
page read and write
8377000
heap
page read and write
2FBE000
stack
page read and write
28632960000
trusted library allocation
page read and write
6380000
heap
page read and write
BA4000
heap
page read and write
4AC1000
direct allocation
page read and write
286288D3000
heap
page read and write
50E0000
direct allocation
page execute and read and write
4830000
direct allocation
page read and write
57F1000
heap
page read and write
2863217F000
trusted library allocation
page read and write
50F1000
heap
page read and write
2862EA00000
trusted library allocation
page read and write
390000
unkown
page readonly
114B000
stack
page read and write
238F6961000
trusted library allocation
page read and write
50E0000
direct allocation
page execute and read and write
238F3747000
trusted library allocation
page read and write
50F1000
heap
page read and write
229EF000
heap
page read and write
2862E59D000
trusted library allocation
page read and write
28632792000
trusted library allocation
page read and write
4BAF000
stack
page read and write
D90000
heap
page read and write
28631903000
trusted library allocation
page read and write
45D1000
heap
page read and write
286325E0000
trusted library allocation
page read and write
4F61000
heap
page read and write
50F1000
heap
page read and write
2863C2C9000
trusted library allocation
page read and write
238F2FD9000
trusted library allocation
page read and write
3F0E000
stack
page read and write
2862338B000
heap
page read and write
2863BF90000
trusted library allocation
page read and write
2862D281000
trusted library allocation
page read and write
2863BEAA000
trusted library allocation
page read and write
3EAF000
stack
page read and write
57F1000
heap
page read and write
43B1000
heap
page read and write
28632181000
trusted library allocation
page read and write
52EE000
stack
page read and write
57F1000
heap
page read and write
4C70000
direct allocation
page execute and read and write
638000
unkown
page execute and write copy
2585000
heap
page read and write
121E000
stack
page read and write
45D1000
heap
page read and write
4F61000
heap
page read and write
6471000
heap
page read and write
6471000
heap
page read and write
28632297000
trusted library allocation
page read and write
238F3403000
trusted library allocation
page read and write
27BF000
stack
page read and write
1DEF7FD0000
heap
page read and write
6471000
heap
page read and write
286321A5000
trusted library allocation
page read and write
22A10000
heap
page read and write
2862DFD1000
trusted library allocation
page read and write
EF0000
direct allocation
page read and write
286288ED000
heap
page read and write
2157000
heap
page read and write
238F3790000
trusted library allocation
page read and write
57F1000
heap
page read and write
D70000
direct allocation
page read and write
27AF1218000
trusted library allocation
page read and write
286308FD000
unclassified section
page read and write
6471000
heap
page read and write
4F61000
heap
page read and write
286321FD000
trusted library allocation
page read and write
4F50000
direct allocation
page read and write
5580000
direct allocation
page execute and read and write
5340000
trusted library allocation
page read and write
22A12000
heap
page read and write
EF0000
direct allocation
page read and write
57F1000
heap
page read and write
964D7FE000
stack
page read and write
6471000
heap
page read and write
2863219A000
trusted library allocation
page read and write
286310C4000
trusted library allocation
page read and write
45D1000
heap
page read and write
2862E57D000
trusted library allocation
page read and write
4F61000
heap
page read and write
28628906000
heap
page read and write
4F61000
heap
page read and write
4F61000
heap
page read and write
2EAE000
stack
page read and write
50F1000
heap
page read and write
2862E850000
trusted library allocation
page read and write
5E95000
heap
page read and write
45D1000
heap
page read and write
57F3000
heap
page read and write
50F1000
heap
page read and write
1BC4000
heap
page read and write
5644000
direct allocation
page execute and read and write
65AE000
stack
page read and write
50F1000
heap
page read and write
1671000
heap
page read and write
286327B2000
trusted library allocation
page read and write
2B4F000
stack
page read and write
286394B0000
trusted library allocation
page read and write
25C0000
heap
page read and write
4F61000
heap
page read and write
E90000
direct allocation
page read and write
28630990000
trusted library allocation
page read and write
28632572000
trusted library allocation
page read and write
238F456D000
trusted library allocation
page read and write
2E4000
heap
page read and write
1CBE7971000
heap
page read and write
6471000
heap
page read and write
2862E200000
trusted library allocation
page read and write
238F5244000
trusted library allocation
page read and write
427000
unkown
page write copy
4F61000
heap
page read and write
49F000
unkown
page execute and read and write
37B000
unkown
page execute and read and write
EA0000
heap
page read and write
28630F60000
trusted library allocation
page read and write
B84A0BD000
stack
page read and write
5340000
trusted library allocation
page read and write
6471000
heap
page read and write
5580000
direct allocation
page execute and read and write
6471000
heap
page read and write
28632F03000
trusted library allocation
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
45D1000
heap
page read and write
2863219D000
trusted library allocation
page read and write
28630E87000
trusted library allocation
page read and write
2862E35C000
trusted library allocation
page read and write
28631306000
heap
page read and write
E90000
direct allocation
page read and write
2862E9FA000
trusted library allocation
page read and write
286320B9000
trusted library allocation
page read and write
629000
unkown
page execute and read and write
2863317A000
trusted library allocation
page read and write
3C7E000
stack
page read and write
28621A5E000
trusted library allocation
page read and write
286288EB000
heap
page read and write
63F0000
heap
page read and write
50F1000
heap
page read and write
2862D6A4000
trusted library allocation
page read and write
2862DC7E000
trusted library allocation
page read and write
2710000
heap
page read and write
621000
unkown
page execute and read and write
4C90000
direct allocation
page execute and read and write
57F1000
heap
page read and write
50F1000
heap
page read and write
43B1000
heap
page read and write
50F1000
heap
page read and write
57F1000
heap
page read and write
28632172000
trusted library allocation
page read and write
3A2E000
stack
page read and write
238F6976000
trusted library allocation
page read and write
413E000
stack
page read and write
4841000
heap
page read and write
BA4000
heap
page read and write
238F4374000
trusted library allocation
page read and write
2863C2E7000
trusted library allocation
page read and write
286329DB000
trusted library allocation
page read and write
2073000
heap
page read and write
28630A51000
trusted library allocation
page read and write
55A0000
direct allocation
page execute and read and write
28632E5B000
trusted library allocation
page read and write
31AF000
stack
page read and write
59B0000
heap
page read and write
B84118B000
stack
page read and write
57F1000
heap
page read and write
286321E3000
trusted library allocation
page read and write
286319CD000
trusted library allocation
page read and write
286315AE000
trusted library allocation
page read and write
4E99000
direct allocation
page execute and read and write
286288CC000
heap
page read and write
1F4141A0000
unclassified section
page read and write
50C0000
direct allocation
page execute and read and write
6471000
heap
page read and write
6471000
heap
page read and write
38BE000
stack
page read and write
6471000
heap
page read and write
28632B07000
trusted library allocation
page read and write
2862DCF1000
trusted library allocation
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
55C0000
direct allocation
page execute and read and write
4841000
heap
page read and write
B8411FE000
stack
page read and write
43B1000
heap
page read and write
D30000
direct allocation
page read and write
4691000
heap
page read and write
4F61000
heap
page read and write
1F413F30000
unclassified section
page readonly
1D0E000
stack
page read and write
635F000
stack
page read and write
2E4000
heap
page read and write
2862E300000
trusted library allocation
page read and write
19D000
stack
page read and write
10F4000
heap
page read and write
238F6C03000
trusted library allocation
page read and write
28632286000
trusted library allocation
page read and write
286320C4000
trusted library allocation
page read and write
3AFE000
stack
page read and write
D30000
direct allocation
page read and write
4F61000
heap
page read and write
2DCE000
stack
page read and write
964C5FF000
stack
page read and write
F34000
heap
page read and write
529D000
stack
page read and write
286288BF000
heap
page read and write
28632197000
trusted library allocation
page read and write
238F5234000
trusted library allocation
page read and write
28631B00000
trusted library allocation
page read and write
27AF1654000
heap
page read and write
40F0000
direct allocation
page read and write
2863202B000
trusted library allocation
page read and write
5644000
direct allocation
page execute and read and write
11C0000
heap
page read and write
1BC4000
heap
page read and write
286318B5000
trusted library allocation
page read and write
4841000
heap
page read and write
6471000
heap
page read and write
362E000
stack
page read and write
28630C18000
trusted library allocation
page read and write
46E000
unkown
page execute and write copy
2862E65A000
trusted library allocation
page read and write
2862D38A000
trusted library allocation
page read and write
238F45A5000
trusted library allocation
page read and write
249E000
heap
page read and write
22DD000
heap
page read and write
390E000
stack
page read and write
4F61000
heap
page read and write
460000
unkown
page execute and read and write
964B73B000
stack
page read and write
286288D5000
heap
page read and write
1BC4000
heap
page read and write
286325CA000
trusted library allocation
page read and write
45D1000
heap
page read and write
2862D943000
trusted library allocation
page read and write
BE0000
heap
page read and write
61ED3000
direct allocation
page read and write
238F2FB4000
trusted library allocation
page read and write
4E60000
direct allocation
page execute and read and write
48B1000
direct allocation
page read and write
C54000
unkown
page execute and read and write
493000
unkown
page execute and read and write
28631B03000
trusted library allocation
page read and write
238F44D0000
trusted library allocation
page read and write
BA4000
heap
page read and write
B84A83E000
stack
page read and write
28630D00000
trusted library allocation
page read and write
3B0F000
stack
page read and write
286288F6000
heap
page read and write
28630FC9000
trusted library allocation
page read and write
238F33FB000
trusted library allocation
page read and write
2862D30B000
trusted library allocation
page read and write
28623407000
heap
page read and write
6471000
heap
page read and write
57F1000
heap
page read and write
286322EC000
trusted library allocation
page read and write
4BF0000
direct allocation
page execute and read and write
28630FCD000
trusted library allocation
page read and write
286288F7000
heap
page read and write
238F5244000
trusted library allocation
page read and write
E5B000
heap
page read and write
5620000
direct allocation
page execute and read and write
2862D6E2000
trusted library allocation
page read and write
4B6F000
stack
page read and write
28632100000
trusted library allocation
page read and write
286321E3000
trusted library allocation
page read and write
E5C000
heap
page read and write
57F1000
heap
page read and write
2863BFB7000
trusted library allocation
page read and write
49E0000
direct allocation
page execute and read and write
6471000
heap
page read and write
5D4000
heap
page read and write
813E000
stack
page read and write
28632277000
trusted library allocation
page read and write
328E000
stack
page read and write
6471000
heap
page read and write
51ED000
stack
page read and write
E5E000
stack
page read and write
50F1000
heap
page read and write
8378000
heap
page read and write
238F2E6C000
trusted library allocation
page read and write
36AF000
stack
page read and write
57F1000
heap
page read and write
6471000
heap
page read and write
238E74A0000
trusted library section
page read and write
286321C9000
trusted library allocation
page read and write
286288FD000
heap
page read and write
6471000
heap
page read and write
28630F60000
trusted library allocation
page read and write
27AF1196000
trusted library allocation
page read and write
BA4000
heap
page read and write
6471000
heap
page read and write
4841000
heap
page read and write
28632D03000
trusted library allocation
page read and write
238F3763000
trusted library allocation
page read and write
28631EB3000
trusted library allocation
page read and write
1EF5000
heap
page read and write
286288CA000
heap
page read and write
1F414347000
trusted library allocation
page read and write
E1E000
stack
page read and write
D2C000
stack
page read and write
1C53F000
stack
page read and write
DC8000
heap
page read and write
2481000
heap
page read and write
286288F6000
heap
page read and write
6471000
heap
page read and write
238F2DDF000
trusted library allocation
page read and write
391000
unkown
page execute and read and write
4F61000
heap
page read and write
45D1000
heap
page read and write
38CE000
stack
page read and write
286288EB000
heap
page read and write
2863BFD9000
trusted library allocation
page read and write
46BF000
stack
page read and write
D50000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
400E000
stack
page read and write
28632500000
trusted library allocation
page read and write
28631BE5000
trusted library allocation
page read and write
286288C7000
heap
page read and write
43B1000
heap
page read and write
2862DE97000
trusted library allocation
page read and write
6471000
heap
page read and write
3CBF000
stack
page read and write
6471000
heap
page read and write
2862DE26000
trusted library allocation
page read and write
2863C31A000
trusted library allocation
page read and write
2BC0000
heap
page read and write
50F1000
heap
page read and write
2862E0F9000
trusted library allocation
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
28630CCC000
trusted library allocation
page read and write
2862D40A000
trusted library allocation
page read and write
2862D6EA000
trusted library allocation
page read and write
50F1000
heap
page read and write
964B6BD000
stack
page read and write
7E2000
unkown
page execute and read and write
286288F0000
heap
page read and write
286288F3000
heap
page read and write
286288ED000
heap
page read and write
286322BF000
trusted library allocation
page read and write
41BE000
stack
page read and write
D5E000
stack
page read and write
6471000
heap
page read and write
238F2F99000
trusted library allocation
page read and write
57F1000
heap
page read and write
2863213A000
trusted library allocation
page read and write
286288F7000
heap
page read and write
4F61000
heap
page read and write
217C000
heap
page read and write
964B6FE000
stack
page read and write
6471000
heap
page read and write
566D000
stack
page read and write
3AEF000
stack
page read and write
F1E000
unkown
page execute and read and write
1F7B000
heap
page read and write
4F50000
direct allocation
page read and write
2863255F000
trusted library allocation
page read and write
5580000
direct allocation
page execute and read and write
4830000
direct allocation
page read and write
28621BBF000
unclassified section
page read and write
6471000
heap
page read and write
B841BD8000
stack
page read and write
50F1000
heap
page read and write
45D1000
heap
page read and write
120E000
stack
page read and write
57F1000
heap
page read and write
B848CFE000
stack
page read and write
E5B000
heap
page read and write
57F1000
heap
page read and write
2D2F000
stack
page read and write
27AF1203000
trusted library allocation
page read and write
286215B0000
unclassified section
page readonly
49D0000
direct allocation
page execute and read and write
161000
unkown
page execute and write copy
2863C208000
trusted library allocation
page read and write
238F372C000
trusted library allocation
page read and write
286315E7000
trusted library allocation
page read and write
6471000
heap
page read and write
6471000
heap
page read and write
26A0000
direct allocation
page read and write
28630F00000
trusted library allocation
page read and write
286288D5000
heap
page read and write
4F24000
direct allocation
page execute and read and write
28621BD0000
heap
page read and write
50F1000
heap
page read and write
28630C57000
trusted library allocation
page read and write
43B1000
heap
page read and write
2BC7000
heap
page read and write
57F1000
heap
page read and write
25F7000
heap
page read and write
5F2000
unkown
page execute and read and write
6471000
heap
page read and write
F28B1FE000
unkown
page readonly
2862E0E6000
trusted library allocation
page read and write
300F000
stack
page read and write
2862DB5C000
trusted library allocation
page read and write
238F34E3000
trusted library allocation
page read and write
6BFE000
stack
page read and write
37EF000
stack
page read and write
57F1000
heap
page read and write
2862D479000
trusted library allocation
page read and write
2CEE000
stack
page read and write
286288C7000
heap
page read and write
2863C133000
trusted library allocation
page read and write
2862E9FE000
trusted library allocation
page read and write
286394A7000
trusted library allocation
page read and write
50F1000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
238F2CDF000
unclassified section
page read and write
2863C2AB000
trusted library allocation
page read and write
2863203A000
trusted library allocation
page read and write
4841000
heap
page read and write
3F4E000
stack
page read and write
286321C9000
trusted library allocation
page read and write
28630ACA000
trusted library allocation
page read and write
6471000
heap
page read and write
4C4000
unkown
page execute and read and write
57F1000
heap
page read and write
50F1000
heap
page read and write
286320E7000
trusted library allocation
page read and write
286288ED000
heap
page read and write
EF0000
direct allocation
page read and write
1CBE797F000
heap
page read and write
46E000
unkown
page execute and read and write
2862E14B000
trusted library allocation
page read and write
291E000
stack
page read and write
2863180F000
trusted library allocation
page read and write
238F37C9000
trusted library allocation
page read and write
28632255000
trusted library allocation
page read and write
28632BD1000
trusted library allocation
page read and write
A3E000
stack
page read and write
286288EA000
heap
page read and write
286217D9000
heap
page read and write
440E000
stack
page read and write
6BBF000
stack
page read and write
238F722A000
trusted library allocation
page read and write
4ED0000
direct allocation
page execute and read and write
6471000
heap
page read and write
286309F3000
trusted library allocation
page read and write
1F41436E000
trusted library allocation
page read and write
3FAE000
stack
page read and write
2E4000
heap
page read and write
BA4000
heap
page read and write
2862D903000
trusted library allocation
page read and write
286288CE000
heap
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
28632738000
trusted library allocation
page read and write
2862D2C4000
trusted library allocation
page read and write
238F6AF0000
trusted library allocation
page read and write
363E000
stack
page read and write
1671000
heap
page read and write
396E000
stack
page read and write
6471000
heap
page read and write
4F61000
heap
page read and write
28621630000
heap
page read and write
49F000
unkown
page execute and read and write
28630CD4000
trusted library allocation
page read and write
4F61000
heap
page read and write
10E0000
direct allocation
page read and write
28631EA3000
trusted library allocation
page read and write
50F1000
heap
page read and write
2862ED00000
trusted library allocation
page read and write
286288BF000
heap
page read and write
DC3000
heap
page read and write
2863BF8A000
trusted library allocation
page read and write
238E745F000
heap
page read and write
5D4000
heap
page read and write
286321E3000
trusted library allocation
page read and write
1686000
heap
page read and write
6471000
heap
page read and write
286321A5000
trusted library allocation
page read and write
55D0000
direct allocation
page execute and read and write
2863BFDF000
trusted library allocation
page read and write
28631B89000
trusted library allocation
page read and write
4E84000
direct allocation
page execute and read and write
45D1000
heap
page read and write
256E000
stack
page read and write
2EBE000
stack
page read and write
5640000
direct allocation
page execute and read and write
28630DE5000
trusted library allocation
page read and write
C79000
unkown
page read and write
6471000
heap
page read and write
286288D2000
heap
page read and write
964A3EF000
stack
page read and write
2279000
heap
page read and write
238E8F5C000
heap
page read and write
286288C8000
heap
page read and write
352F000
stack
page read and write
2862E597000
trusted library allocation
page read and write
387F000
stack
page read and write
286394C4000
trusted library allocation
page read and write
286288EA000
heap
page read and write
5659000
direct allocation
page execute and read and write
43AF000
stack
page read and write
6471000
heap
page read and write
2862E9E7000
trusted library allocation
page read and write
96513FD000
stack
page read and write
50F1000
heap
page read and write
238F4447000
trusted library allocation
page read and write
2863BFEE000
trusted library allocation
page read and write
286323B0000
trusted library section
page read and write
37AE000
stack
page read and write
10E0000
direct allocation
page read and write
2862D4FC000
trusted library allocation
page read and write
286288C7000
heap
page read and write
310000
unkown
page read and write
2862E6BD000
trusted library allocation
page read and write
238F71A0000
trusted library allocation
page read and write
2D2F000
stack
page read and write
28630AEE000
trusted library allocation
page read and write
50F1000
heap
page read and write
1F0000
heap
page read and write
2863C245000
trusted library allocation
page read and write
F34000
heap
page read and write
2862D626000
trusted library allocation
page read and write
591E1FF000
stack
page read and write
22A0A000
heap
page read and write
28632E8C000
trusted library allocation
page read and write
EC5000
heap
page read and write
45D1000
heap
page read and write
50F1000
heap
page read and write
286288D5000
heap
page read and write
57F1000
heap
page read and write
B84277E000
stack
page read and write
4C90000
direct allocation
page execute and read and write
4690000
heap
page read and write
F34000
heap
page read and write
286288E1000
heap
page read and write
22A02000
heap
page read and write
2863126F000
trusted library allocation
page read and write
286288F6000
heap
page read and write
6471000
heap
page read and write
28632292000
trusted library allocation
page read and write
EA4000
heap
page read and write
28630F84000
trusted library allocation
page read and write
221A000
heap
page read and write
286288CC000
heap
page read and write
B8468FE000
stack
page read and write
50F1000
heap
page read and write
311000
unkown
page execute and write copy
57F1000
heap
page read and write
6471000
heap
page read and write
6471000
heap
page read and write
AFA000
stack
page read and write
28621790000
heap
page readonly
45C000
unkown
page execute and write copy
1BC4000
heap
page read and write
286325E0000
trusted library allocation
page read and write
4100000
direct allocation
page read and write
4DD4000
heap
page read and write
286329F8000
trusted library allocation
page read and write
4F61000
heap
page read and write
28631703000
trusted library allocation
page read and write
BA4000
heap
page read and write
286347DE000
trusted library allocation
page read and write
1F41430D000
trusted library allocation
page read and write
2863268A000
trusted library allocation
page read and write
28632E63000
trusted library allocation
page read and write
45D1000
heap
page read and write
50F1000
heap
page read and write
373F000
stack
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
229DB000
heap
page read and write
2863BFC3000
trusted library allocation
page read and write
2730000
direct allocation
page read and write
2863C2A0000
trusted library allocation
page read and write
6471000
heap
page read and write
4841000
heap
page read and write
2863C1EA000
trusted library allocation
page read and write
4F61000
heap
page read and write
50F1000
heap
page read and write
610000
unkown
page execute and read and write
107E000
stack
page read and write
5659000
direct allocation
page execute and read and write
28630FD4000
trusted library allocation
page read and write
2862F800000
trusted library section
page readonly
208E000
heap
page read and write
29A7000
heap
page read and write
2862EB0A000
trusted library allocation
page read and write
286288D5000
heap
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
238F4608000
trusted library allocation
page read and write
6471000
heap
page read and write
500B000
stack
page read and write
C30000
unkown
page read and write
DDF000
heap
page read and write
EEE000
stack
page read and write
6471000
heap
page read and write
28630E5F000
trusted library allocation
page read and write
2863219A000
trusted library allocation
page read and write
6471000
heap
page read and write
28630D03000
trusted library allocation
page read and write
4F61000
heap
page read and write
2E4000
heap
page read and write
238F6A03000
trusted library allocation
page read and write
1DEF820A000
trusted library allocation
page read and write
45D1000
heap
page read and write
2862F109000
trusted library allocation
page read and write
50F1000
heap
page read and write
4C4000
unkown
page execute and read and write
2862D576000
trusted library allocation
page read and write
2585000
heap
page read and write
1CBE796C000
heap
page read and write
27CE000
stack
page read and write
B84BDFB000
stack
page read and write
6471000
heap
page read and write
B8476F9000
stack
page read and write
45D1000
heap
page read and write
409F000
stack
page read and write
50F1000
heap
page read and write
2862DB69000
trusted library allocation
page read and write
6471000
heap
page read and write
69F000
unkown
page execute and read and write
4EE0000
direct allocation
page execute and read and write
2862E22D000
trusted library allocation
page read and write
57F1000
heap
page read and write
6471000
heap
page read and write
1671000
heap
page read and write
63E0000
heap
page read and write
41D4000
heap
page read and write
2862E9FA000
trusted library allocation
page read and write
50F1000
heap
page read and write
3C3F000
stack
page read and write
964BCDE000
stack
page read and write
2862E8B8000
trusted library allocation
page read and write
F34000
heap
page read and write
26A0000
direct allocation
page read and write
50F1000
heap
page read and write
2940000
heap
page read and write
286321F5000
trusted library allocation
page read and write
EA4000
heap
page read and write
2E4000
heap
page read and write
EA4000
heap
page read and write
1610000
heap
page read and write
661D000
heap
page read and write
2730000
direct allocation
page read and write
286288D5000
heap
page read and write
2863108B000
trusted library allocation
page read and write
307E000
stack
page read and write
A7C000
stack
page read and write
6471000
heap
page read and write
229F7000
heap
page read and write
238F46DE000
trusted library allocation
page read and write
2863C1E0000
trusted library allocation
page read and write
28633178000
trusted library allocation
page read and write
286288F6000
heap
page read and write
238F44FC000
trusted library allocation
page read and write
F34000
heap
page read and write
1671000
heap
page read and write
B84BCFD000
stack
page read and write
2862D700000
trusted library allocation
page read and write
2863949D000
trusted library allocation
page read and write
2863BFC3000
trusted library allocation
page read and write
43B1000
heap
page read and write
2F02C000
stack
page read and write
228B000
heap
page read and write
2235000
heap
page read and write
286288FD000
heap
page read and write
2863214B000
trusted library allocation
page read and write
1E64000
heap
page read and write
96528BB000
stack
page read and write
4841000
heap
page read and write
57F1000
heap
page read and write
229F7000
heap
page read and write
28632150000
trusted library allocation
page read and write
6471000
heap
page read and write
45D1000
heap
page read and write
2DCF000
stack
page read and write
50F1000
heap
page read and write
46C000
unkown
page execute and read and write
28630F26000
trusted library allocation
page read and write
2862EC08000
trusted library allocation
page read and write
2862D281000
trusted library allocation
page read and write
286288C1000
heap
page read and write
57F1000
heap
page read and write
238E765E000
trusted library allocation
page read and write
28632181000
trusted library allocation
page read and write
238F3376000
trusted library allocation
page read and write
1F41410A000
heap
page read and write
28632706000
trusted library allocation
page read and write
2862F840000
trusted library section
page readonly
2862D3A6000
trusted library allocation
page read and write
1C7DE000
stack
page read and write
EF0000
direct allocation
page read and write
286288FC000
heap
page read and write
51F0000
trusted library allocation
page read and write
50F1000
heap
page read and write
238F2E00000
trusted library allocation
page read and write
229F7000
heap
page read and write
4790000
heap
page read and write
2862E5AD000
trusted library allocation
page read and write
28630A7A000
trusted library allocation
page read and write
C54000
unkown
page execute and write copy
3CFE000
stack
page read and write
229EA000
heap
page read and write
238F697A000
trusted library allocation
page read and write
2863240B000
trusted library allocation
page read and write
28631E8D000
trusted library allocation
page read and write
6C260000
unkown
page readonly
286288F6000
heap
page read and write
4F24000
direct allocation
page execute and read and write
28632E21000
trusted library allocation
page read and write
229F4000
heap
page read and write
238F44D3000
trusted library allocation
page read and write
EA4000
heap
page read and write
2863B145000
trusted library allocation
page read and write
28631803000
trusted library allocation
page read and write
1E7A000
heap
page read and write
C7483FF000
stack
page read and write
1C9000
unkown
page write copy
28621760000
trusted library allocation
page read and write
50F1000
heap
page read and write
423000
unkown
page readonly
45D1000
heap
page read and write
3D2E000
stack
page read and write
286288F3000
heap
page read and write
2ADF000
stack
page read and write
2863204C000
trusted library allocation
page read and write
EA4000
heap
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
F34000
heap
page read and write
50F1000
heap
page read and write
28632C07000
trusted library allocation
page read and write
2863C1FE000
trusted library allocation
page read and write
6471000
heap
page read and write
4841000
heap
page read and write
2AFF000
stack
page read and write
B84114E000
stack
page read and write
6471000
heap
page read and write
28623398000
heap
page read and write
109E000
stack
page read and write
2862DFEA000
trusted library allocation
page read and write
666A000
heap
page read and write
332F000
stack
page read and write
43B1000
heap
page read and write
2863BF90000
trusted library allocation
page read and write
2863276F000
trusted library allocation
page read and write
23AC000
heap
page read and write
45D1000
heap
page read and write
269E000
stack
page read and write
286326BB000
trusted library allocation
page read and write
607000
unkown
page execute and read and write
50F1000
heap
page read and write
194000
stack
page read and write
416E000
stack
page read and write
3E6E000
stack
page read and write
4E10000
direct allocation
page execute and read and write
2862D675000
trusted library allocation
page read and write
28631849000
trusted library allocation
page read and write
B84A1FC000
stack
page read and write
238E7692000
trusted library allocation
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
286288D2000
heap
page read and write
4F61000
heap
page read and write
229EE000
heap
page read and write
238E71E0000
unclassified section
page readonly
50F1000
heap
page read and write
15A0000
heap
page read and write
50F1000
heap
page read and write
45D1000
heap
page read and write
238F6A77000
trusted library allocation
page read and write
286288CE000
heap
page read and write
2863B149000
trusted library allocation
page read and write
2F030000
heap
page read and write
50F1000
heap
page read and write
28632968000
trusted library allocation
page read and write
50F1000
heap
page read and write
D30000
direct allocation
page read and write
2863C264000
trusted library allocation
page read and write
50F1000
heap
page read and write
4BAE000
stack
page read and write
19FF000
stack
page read and write
1F41451A000
trusted library allocation
page read and write
2862E4F0000
trusted library section
page readonly
238F526B000
trusted library allocation
page read and write
5580000
direct allocation
page execute and read and write
32BF000
stack
page read and write
2862E603000
trusted library allocation
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
45D1000
heap
page read and write
D8E000
heap
page read and write
C51000
unkown
page execute and write copy
57F1000
heap
page read and write
2863218A000
trusted library allocation
page read and write
4F61000
heap
page read and write
27AF110D000
trusted library allocation
page read and write
238F2E3D000
trusted library allocation
page read and write
543E000
stack
page read and write
286288EA000
heap
page read and write
27AF11C9000
trusted library allocation
page read and write
286288CA000
heap
page read and write
2863BFEE000
trusted library allocation
page read and write
353F000
stack
page read and write
286327C1000
trusted library allocation
page read and write
286322C9000
trusted library allocation
page read and write
238F2FF7000
trusted library allocation
page read and write
4841000
heap
page read and write
1DEF7FD9000
heap
page read and write
28630C51000
trusted library allocation
page read and write
45D1000
heap
page read and write
802E000
stack
page read and write
C54000
unkown
page execute and write copy
49C0000
direct allocation
page execute and read and write
2863219F000
trusted library allocation
page read and write
28630FDC000
trusted library allocation
page read and write
28632922000
trusted library allocation
page read and write
10F4000
heap
page read and write
F00000
heap
page read and write
382E000
stack
page read and write
2863225C000
trusted library allocation
page read and write
2760000
heap
page read and write
33FF000
stack
page read and write
43B1000
heap
page read and write
2863486A000
trusted library allocation
page read and write
F34000
heap
page read and write
2863C199000
trusted library allocation
page read and write
25C6DAA0000
heap
page read and write
1DD1000
heap
page read and write
238F7237000
trusted library allocation
page read and write
1650000
heap
page read and write
6471000
heap
page read and write
43B1000
heap
page read and write
28632062000
trusted library allocation
page read and write
28632172000
trusted library allocation
page read and write
286288C1000
heap
page read and write
2862D40F000
trusted library allocation
page read and write
238F3868000
trusted library allocation
page read and write
506F000
stack
page read and write
F34000
heap
page read and write
D81EC77000
stack
page read and write
238F37C0000
trusted library allocation
page read and write
6471000
heap
page read and write
321E000
stack
page read and write
6471000
heap
page read and write
4E70000
direct allocation
page execute and read and write
21A4000
heap
page read and write
2D6E000
stack
page read and write
50F1000
heap
page read and write
66BD000
heap
page read and write
2459000
heap
page read and write
4CEE000
stack
page read and write
D70000
heap
page read and write
2862DC83000
trusted library allocation
page read and write
6D80000
heap
page read and write
2863226E000
trusted library allocation
page read and write
57F1000
heap
page read and write
238E7439000
heap
page read and write
2862E0A4000
trusted library allocation
page read and write
2862E88D000
trusted library allocation
page read and write
4F70000
heap
page read and write
286288D9000
heap
page read and write
19FF000
stack
page read and write
45D1000
heap
page read and write
238F3475000
trusted library allocation
page read and write
27AF0E23000
heap
page read and write
28631876000
trusted library allocation
page read and write
4A2F000
stack
page read and write
10DF000
stack
page read and write
3FBE000
stack
page read and write
28631B33000
trusted library allocation
page read and write
6471000
heap
page read and write
28632572000
trusted library allocation
page read and write
238F3475000
trusted library allocation
page read and write
2863C170000
trusted library allocation
page read and write
2863214B000
trusted library allocation
page read and write
238F3415000
trusted library allocation
page read and write
6471000
heap
page read and write
28B0C000
heap
page read and write
238E76FE000
trusted library allocation
page read and write
B847CFB000
stack
page read and write
19E000
stack
page read and write
528E000
stack
page read and write
28621A30000
trusted library allocation
page read and write
6471000
heap
page read and write
229EE000
heap
page read and write
238F2DB3000
trusted library allocation
page read and write
4A60000
direct allocation
page read and write
1C7EE000
stack
page read and write
25F8000
heap
page read and write
31EE000
stack
page read and write
2862D298000
trusted library allocation
page read and write
B8425FF000
stack
page read and write
4F2F000
stack
page read and write
2639000
heap
page read and write
21BE000
heap
page read and write
2863279B000
trusted library allocation
page read and write
4AFF000
stack
page read and write
F0A000
heap
page read and write
238F4581000
trusted library allocation
page read and write
42C000
unkown
page execute and write copy
6471000
heap
page read and write
4841000
heap
page read and write
286322AC000
trusted library allocation
page read and write
2E4000
heap
page read and write
27AF0CB0000
unclassified section
page readonly
342F000
stack
page read and write
45D1000
heap
page read and write
50F1000
heap
page read and write
286288C1000
heap
page read and write
238F52A2000
trusted library allocation
page read and write
3220000
heap
page read and write
50F1000
heap
page read and write
6C261000
unkown
page execute read
286288DD000
heap
page read and write
19EF000
stack
page read and write
E42000
heap
page read and write
50F1000
heap
page read and write
238F2D03000
trusted library allocation
page read and write
423F000
stack
page read and write
286321FA000
trusted library allocation
page read and write
B842BFC000
stack
page read and write
6471000
heap
page read and write
2862E8AC000
trusted library allocation
page read and write
1DEF7F40000
heap
page read and write
F28D3FE000
unkown
page readonly
2863BFE9000
trusted library allocation
page read and write
2862DA97000
trusted library allocation
page read and write
57F1000
heap
page read and write
867E000
stack
page read and write
27AF1123000
trusted library allocation
page read and write
2863255C000
trusted library allocation
page read and write
2862DF84000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
964D3FD000
stack
page read and write
2863129A000
trusted library allocation
page read and write
5644000
direct allocation
page execute and read and write
286288CD000
heap
page read and write
379000
unkown
page write copy
10F4000
heap
page read and write
403E000
stack
page read and write
28634735000
trusted library allocation
page read and write
5FDE000
stack
page read and write
BA0000
heap
page read and write
65E000
stack
page read and write
2767000
heap
page read and write
43B1000
heap
page read and write
2862DE5F000
trusted library allocation
page read and write
C747BFF000
stack
page read and write
2862DAEC000
trusted library allocation
page read and write
28630CDC000
trusted library allocation
page read and write
28632147000
trusted library allocation
page read and write
2862E500000
trusted library allocation
page read and write
2862DDFD000
trusted library allocation
page read and write
286322BB000
trusted library allocation
page read and write
50F1000
heap
page read and write
286288D5000
heap
page read and write
722000
unkown
page execute and read and write
4841000
heap
page read and write
D88000
heap
page read and write
57F1000
heap
page read and write
21E6000
heap
page read and write
28632603000
trusted library allocation
page read and write
286288C4000
heap
page read and write
229EA000
heap
page read and write
286288E2000
heap
page read and write
238F6C1A000
trusted library allocation
page read and write
50F1000
heap
page read and write
238F2E1E000
trusted library allocation
page read and write
286288D9000
heap
page read and write
2863BEFA000
trusted library allocation
page read and write
FF530000
direct allocation
page execute and read and write
6471000
heap
page read and write
286288D9000
heap
page read and write
45D1000
heap
page read and write
1BC4000
heap
page read and write
2862E153000
trusted library allocation
page read and write
E20000
heap
page read and write
4841000
heap
page read and write
493000
unkown
page execute and read and write
1F414500000
trusted library allocation
page read and write
2863C231000
trusted library allocation
page read and write
1C4BF000
stack
page read and write
238F3703000
trusted library allocation
page read and write
2F0E000
stack
page read and write
6471000
heap
page read and write
B8453FE000
stack
page read and write
1C8FD000
stack
page read and write
4990000
direct allocation
page execute and read and write
38EE000
stack
page read and write
2862E8C5000
trusted library allocation
page read and write
28632E00000
trusted library allocation
page read and write
2862E999000
trusted library allocation
page read and write
1C52E000
stack
page read and write
E60000
heap
page read and write
4D50000
heap
page read and write
2862DB77000
trusted library allocation
page read and write
2862E096000
trusted library allocation
page read and write
6C1C1000
unkown
page execute read
286288E7000
heap
page read and write
19DB000
stack
page read and write
6471000
heap
page read and write
28631EBB000
trusted library allocation
page read and write
50F1000
heap
page read and write
4F50000
direct allocation
page read and write
4C30000
heap
page read and write
28632941000
trusted library allocation
page read and write
B845DF4000
stack
page read and write
286288E0000
heap
page read and write
238F7200000
trusted library allocation
page read and write
1673000
heap
page read and write
238F5247000
trusted library allocation
page read and write
10A0000
heap
page read and write
238F3769000
trusted library allocation
page read and write
6471000
heap
page read and write
238F71C9000
trusted library allocation
page read and write
27AF0D90000
heap
page read and write
286348D4000
trusted library allocation
page read and write
50F1000
heap
page read and write
286288D5000
heap
page read and write
238F2E60000
trusted library allocation
page read and write
1F414940000
heap
page read and write
286288BF000
heap
page read and write
2863C2DD000
trusted library allocation
page read and write
229EA000
heap
page read and write
4D80000
direct allocation
page execute and read and write
128E000
stack
page read and write
2051000
heap
page read and write
57F1000
heap
page read and write
EA4000
heap
page read and write
50F1000
heap
page read and write
E0A000
heap
page read and write
286321DF000
trusted library allocation
page read and write
4F61000
heap
page read and write
28630C75000
trusted library allocation
page read and write
57F1000
heap
page read and write
286321A7000
trusted library allocation
page read and write
6471000
heap
page read and write
28631FCD000
trusted library allocation
page read and write
B84A3BE000
stack
page read and write
376E000
stack
page read and write
27AF0CA0000
unclassified section
page readonly
286288F7000
heap
page read and write
6CFF000
stack
page read and write
50F1000
heap
page read and write
423000
unkown
page readonly
15F4000
heap
page read and write
12A0000
direct allocation
page read and write
2863BFAA000
trusted library allocation
page read and write
2862E9DC000
trusted library allocation
page read and write
4D80000
direct allocation
page execute and read and write
2863122C000
trusted library allocation
page read and write
6471000
heap
page read and write
28630B9B000
trusted library allocation
page read and write
1F413FF0000
heap
page read and write
6471000
heap
page read and write
4B5000
unkown
page execute and write copy
28632936000
trusted library allocation
page read and write
4BD000
unkown
page readonly
4E84000
direct allocation
page execute and read and write
238F3875000
trusted library allocation
page read and write
28630AF9000
trusted library allocation
page read and write
22A21000
heap
page read and write
286288E5000
heap
page read and write
F34000
heap
page read and write
4F61000
heap
page read and write
2862E0BB000
trusted library allocation
page read and write
D30000
direct allocation
page read and write
50F1000
heap
page read and write
57F1000
heap
page read and write
286288D0000
heap
page read and write
43CF000
stack
page read and write
28630F16000
trusted library allocation
page read and write
2863139F000
heap
page read and write
2863218A000
trusted library allocation
page read and write
2862DB27000
trusted library allocation
page read and write
2B0000
heap
page read and write
286288D4000
heap
page read and write
286288CE000
heap
page read and write
2862E764000
trusted library allocation
page read and write
4A60000
direct allocation
page read and write
28630FD4000
trusted library allocation
page read and write
28D50000
heap
page read and write
2862E76C000
trusted library allocation
page read and write
39EE000
stack
page read and write
26A0000
direct allocation
page read and write
72A0000
trusted library allocation
page read and write
D70000
direct allocation
page read and write
2862D666000
trusted library allocation
page read and write
1F4143B8000
trusted library allocation
page read and write
229EF000
heap
page read and write
6471000
heap
page read and write
6471000
heap
page read and write
6471000
heap
page read and write
28631E25000
trusted library allocation
page read and write
4F61000
heap
page read and write
28632172000
trusted library allocation
page read and write
22A02000
heap
page read and write
2863273A000
trusted library allocation
page read and write
50F1000
heap
page read and write
286288C7000
heap
page read and write
2862DEB2000
trusted library allocation
page read and write
238F4300000
trusted library allocation
page read and write
4F61000
heap
page read and write
28630C63000
trusted library allocation
page read and write
DD2000
heap
page read and write
286288F7000
heap
page read and write
286315DA000
trusted library allocation
page read and write
286308F0000
unclassified section
page read and write
BA4000
heap
page read and write
2862E21E000
trusted library allocation
page read and write
286321DA000
trusted library allocation
page read and write
5040000
heap
page read and write
238F387B000
trusted library allocation
page read and write
2862DE73000
trusted library allocation
page read and write
1CBE797A000
heap
page read and write
1F414398000
trusted library allocation
page read and write
4DD0000
heap
page read and write
57F1000
heap
page read and write
40BE000
stack
page read and write
4C80000
direct allocation
page execute and read and write
B8460BE000
stack
page read and write
4E8C000
direct allocation
page execute and read and write
50F1000
heap
page read and write
2863BFC3000
trusted library allocation
page read and write
28631988000
trusted library allocation
page read and write
B845FF2000
stack
page read and write
209F000
heap
page read and write
1F413FD0000
heap
page read and write
6471000
heap
page read and write
26B7000
heap
page read and write
238E7603000
trusted library allocation
page read and write
2383000
heap
page read and write
238F3400000
trusted library allocation
page read and write
50F1000
heap
page read and write
3DAF000
stack
page read and write
45D1000
heap
page read and write
6471000
heap
page read and write
4F61000
heap
page read and write
50F1000
heap
page read and write
238F460F000
trusted library allocation
page read and write
342F000
stack
page read and write
50F1000
heap
page read and write
238F4634000
trusted library allocation
page read and write
238E71D0000
unclassified section
page readonly
28630F29000
trusted library allocation
page read and write
E47000
heap
page read and write
38AF000
stack
page read and write
286317C2000
trusted library allocation
page read and write
2730000
direct allocation
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
28631EFA000
trusted library allocation
page read and write
6480000
heap
page read and write
28631E2D000
trusted library allocation
page read and write
400000
unkown
page readonly
4A60000
direct allocation
page read and write
238F69E1000
trusted library allocation
page read and write
28632CB3000
trusted library allocation
page read and write
402E000
stack
page read and write
11D0000
heap
page read and write
28631DC5000
trusted library allocation
page read and write
2862E0F7000
trusted library allocation
page read and write
50F1000
heap
page read and write
286288F7000
heap
page read and write
45D1000
heap
page read and write
964BDDE000
stack
page read and write
2862D964000
trusted library allocation
page read and write
238F7118000
trusted library allocation
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
66AD000
heap
page read and write
2863217D000
trusted library allocation
page read and write
2862D603000
trusted library allocation
page read and write
2862D298000
trusted library allocation
page read and write
E4A000
heap
page read and write
327E000
stack
page read and write
50F1000
heap
page read and write
4F61000
heap
page read and write
28632186000
trusted library allocation
page read and write
25F7000
heap
page read and write
3ECF000
stack
page read and write
66C8000
heap
page read and write
5D4000
heap
page read and write
4C20000
direct allocation
page execute and read and write
428E000
stack
page read and write
4990000
direct allocation
page execute and read and write
1CBE7B70000
heap
page read and write
2862DAEA000
trusted library allocation
page read and write
5644000
direct allocation
page execute and read and write
E43000
heap
page read and write
27AF0D10000
remote allocation
page read and write
28634866000
trusted library allocation
page read and write
2862E6D5000
trusted library allocation
page read and write
238F4674000
trusted library allocation
page read and write
6471000
heap
page read and write
3DAE000
stack
page read and write
238F33FB000
trusted library allocation
page read and write
1F41432E000
trusted library allocation
page read and write
4F50000
direct allocation
page read and write
24AD000
heap
page execute and read and write
43B1000
heap
page read and write
2862E586000
trusted library allocation
page read and write
286288F6000
heap
page read and write
50F1000
heap
page read and write
57F1000
heap
page read and write
50F1000
heap
page read and write
286324C4000
trusted library allocation
page read and write
205E000
heap
page read and write
28631C9B000
trusted library allocation
page read and write
41AE000
stack
page read and write
4BF0000
direct allocation
page execute and read and write
28630E7F000
trusted library allocation
page read and write
2862DE4C000
trusted library allocation
page read and write
2862D1D0000
trusted library section
page readonly
28632197000
trusted library allocation
page read and write
286322F1000
trusted library allocation
page read and write
9651FFD000
stack
page read and write
238F2FDC000
trusted library allocation
page read and write
250000
unkown
page readonly
E49000
heap
page read and write
E90000
direct allocation
page read and write
238F2E67000
trusted library allocation
page read and write
57F1000
heap
page read and write
3DBE000
stack
page read and write
9C000
stack
page read and write
10E0000
direct allocation
page read and write
22A05000
heap
page read and write
244C000
unkown
page readonly
49D0000
direct allocation
page execute and read and write
6471000
heap
page read and write
E90000
direct allocation
page read and write
27AF0F70000
unclassified section
page readonly
428F000
stack
page read and write
286288EB000
heap
page read and write
F34000
heap
page read and write
50F1000
heap
page read and write
4F61000
heap
page read and write
2862F830000
trusted library section
page readonly
28623448000
heap
page read and write
238F5237000
trusted library allocation
page read and write
286288F6000
heap
page read and write
50F1000
heap
page read and write
42BE000
stack
page read and write
57F1000
heap
page read and write
238F71A0000
trusted library allocation
page read and write
6471000
heap
page read and write
286317B9000
trusted library allocation
page read and write
50F1000
heap
page read and write
57F1000
heap
page read and write
4F61000
heap
page read and write
6471000
heap
page read and write
6471000
heap
page read and write
2862E53E000
trusted library allocation
page read and write
324F000
stack
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
50F1000
heap
page read and write
2380000
heap
page read and write
6D70000
heap
page read and write
57F1000
heap
page read and write
28631296000
trusted library allocation
page read and write
238F3700000
trusted library allocation
page read and write
238F2DC5000
trusted library allocation
page read and write
50F1000
heap
page read and write
61EB7000
direct allocation
page readonly
6471000
heap
page read and write
43C000
unkown
page execute and read and write
2863C166000
trusted library allocation
page read and write
4F61000
heap
page read and write
4E80000
direct allocation
page execute and read and write
45D1000
heap
page read and write
50F1000
heap
page read and write
2B3E000
stack
page read and write
2862E003000
trusted library allocation
page read and write
28AA3000
heap
page read and write
4B00000
heap
page read and write
50F1000
heap
page read and write
4F61000
heap
page read and write
2863BEA3000
trusted library allocation
page read and write
5D4000
heap
page read and write
2862E0F7000
trusted library allocation
page read and write
1CBE7A00000
trusted library allocation
page read and write
22AD2000
heap
page read and write
1F11000
heap
page read and write
6471000
heap
page read and write
6471000
heap
page read and write
393E000
stack
page read and write
229F4000
heap
page read and write
40D0000
direct allocation
page execute and read and write
57F1000
heap
page read and write
286288BF000
heap
page read and write
2863254A000
trusted library allocation
page read and write
3D8F000
stack
page read and write
43B1000
heap
page read and write
238F521B000
trusted library allocation
page read and write
272E000
stack
page read and write
50F1000
heap
page read and write
2863B728000
trusted library allocation
page read and write
638000
unkown
page execute and write copy
1C62F000
stack
page read and write
49E0000
direct allocation
page execute and read and write
50F1000
heap
page read and write
6471000
heap
page read and write
4A70000
direct allocation
page execute and read and write
427E000
stack
page read and write
E20000
heap
page read and write
23B6000
heap
page read and write
2862E3DF000
trusted library allocation
page read and write
238F2D98000
trusted library allocation
page read and write
28630C05000
trusted library allocation
page read and write
450F000
stack
page read and write
2862D6C4000
trusted library allocation
page read and write
46A000
unkown
page execute and read and write
238F7199000
trusted library allocation
page read and write
28631500000
trusted library allocation
page read and write
238F3417000
trusted library allocation
page read and write
286288CC000
heap
page read and write
2E0000
heap
page read and write
286288CE000
heap
page read and write
1672000
heap
page read and write
286321FA000
trusted library allocation
page read and write
232A000
heap
page read and write
2862DEE6000
trusted library allocation
page read and write
6471000
heap
page read and write
286288C7000
heap
page read and write
286320C8000
trusted library allocation
page read and write
2862DFD5000
trusted library allocation
page read and write
1C36000
heap
page read and write
286288F7000
heap
page read and write
39BE000
stack
page read and write
556E000
stack
page read and write
50F1000
heap
page read and write
238F469D000
trusted library allocation
page read and write
286288FD000
heap
page read and write
D30000
direct allocation
page read and write
286288C1000
heap
page read and write
238F4603000
trusted library allocation
page read and write
6471000
heap
page read and write
238F5322000
trusted library allocation
page read and write
238F2E69000
trusted library allocation
page read and write
1CBE94A9000
heap
page read and write
2863BFC1000
trusted library allocation
page read and write
286288C1000
heap
page read and write
28BAE000
stack
page read and write
43B1000
heap
page read and write
286288F7000
heap
page read and write
E09000
heap
page read and write
50F1000
heap
page read and write
C3C000
stack
page read and write
28630AE7000
trusted library allocation
page read and write
2862F008000
trusted library allocation
page read and write
25C6DB07000
heap
page read and write
1BC4000
heap
page read and write
4F61000
heap
page read and write
6C3FF000
unkown
page readonly
238F6AB0000
trusted library allocation
page read and write
2862EB00000
trusted library allocation
page read and write
2862DE85000
trusted library allocation
page read and write
50F1000
heap
page read and write
2862DA3B000
trusted library allocation
page read and write
286288C1000
heap
page read and write
43B1000
heap
page read and write
6D10000
heap
page read and write
28630E03000
trusted library allocation
page read and write
57F1000
heap
page read and write
28631003000
trusted library allocation
page read and write
D3C000
stack
page read and write
286321C9000
trusted library allocation
page read and write
286288CC000
heap
page read and write
50F1000
heap
page read and write
22A12000
heap
page read and write
50F1000
heap
page read and write
44AE000
stack
page read and write
1BBE000
stack
page read and write
424E000
stack
page read and write
F28B27B000
stack
page read and write
544C000
stack
page read and write
63E000
unkown
page execute and read and write
28621720000
heap
page read and write
50F1000
heap
page read and write
2863C26E000
trusted library allocation
page read and write
238F466B000
trusted library allocation
page read and write
15BE000
heap
page read and write
10E0000
direct allocation
page read and write
28632551000
trusted library allocation
page read and write
46C000
unkown
page execute and read and write
2863BF7B000
trusted library allocation
page read and write
28630AF9000
trusted library allocation
page read and write
28632172000
trusted library allocation
page read and write
F57000
unkown
page execute and read and write
61ED0000
direct allocation
page read and write
964B81C000
stack
page read and write
238F6A72000
trusted library allocation
page read and write
4C40000
direct allocation
page execute and read and write
7D95000
heap
page read and write
28639273000
trusted library allocation
page read and write
53A3000
heap
page read and write
28621BD5000
heap
page read and write
1638000
heap
page read and write
50F1000
heap
page read and write
2863219A000
trusted library allocation
page read and write
34AF000
stack
page read and write
1CBE7980000
heap
page read and write
50F1000
heap
page read and write
610000
unkown
page execute and read and write
45D1000
heap
page read and write
45D1000
heap
page read and write
10F4000
heap
page read and write
2862F810000
trusted library section
page readonly
2863C28C000
trusted library allocation
page read and write
DF9000
heap
page read and write
50F1000
heap
page read and write
2863BEF8000
trusted library allocation
page read and write
2862D65E000
trusted library allocation
page read and write
2863218A000
trusted library allocation
page read and write
50F1000
heap
page read and write
28630BEE000
trusted library allocation
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
12B0000
heap
page read and write
427000
unkown
page write copy
B8480FD000
stack
page read and write
3E0E000
stack
page read and write
57F1000
heap
page read and write
6471000
heap
page read and write
50F1000
heap
page read and write
238F2E56000
trusted library allocation
page read and write
6471000
heap
page read and write
28632781000
trusted library allocation
page read and write
286288F6000
heap
page read and write
4841000
heap
page read and write
238F44EE000
trusted library allocation
page read and write
50D0000
direct allocation
page execute and read and write
50F1000
heap
page read and write
6471000
heap
page read and write
4A10000
direct allocation
page execute and read and write
2ECF000
stack
page read and write
2862E903000
trusted library allocation
page read and write
2862DE97000
trusted library allocation
page read and write
350F000
stack
page read and write
2863228D000
trusted library allocation
page read and write
2862E0B3000
trusted library allocation
page read and write
50F1000
heap
page read and write
28631F51000
trusted library allocation
page read and write
2862D29E000
trusted library allocation
page read and write
6471000
heap
page read and write
28631DC2000
trusted library allocation
page read and write
2750000
direct allocation
page execute and read and write
2863B713000
trusted library allocation
page read and write
2862D2C8000
trusted library allocation
page read and write
238F2DC1000
trusted library allocation
page read and write
28631A64000
trusted library allocation
page read and write
3A3F000
stack
page read and write
50F1000
heap
page read and write
496F000
stack
page read and write
2863209A000
trusted library allocation
page read and write
229ED000
heap
page read and write
BA4000
heap
page read and write
46FE000
stack
page read and write
57F1000
heap
page read and write
B84A4FF000
stack
page read and write
286288E1000
heap
page read and write
564C000
direct allocation
page execute and read and write
1C49F000
stack
page read and write
2FFE000
stack
page read and write
4BD0000
direct allocation
page execute and read and write
50F1000
heap
page read and write
2862E0E8000
trusted library allocation
page read and write
3AFF000
stack
page read and write
6471000
heap
page read and write
238F5230000
trusted library allocation
page read and write
57F1000
heap
page read and write
50F1000
heap
page read and write
21C9000
heap
page read and write
43B1000
heap
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
50AE000
stack
page read and write
238E7647000
trusted library allocation
page read and write
286320D5000
trusted library allocation
page read and write
45D1000
heap
page read and write
28630DD5000
trusted library allocation
page read and write
238F4900000
trusted library allocation
page read and write
29E0000
heap
page read and write
238F5207000
trusted library allocation
page read and write
6471000
heap
page read and write
1C23000
heap
page read and write
4F61000
heap
page read and write
4A6E000
stack
page read and write
28631053000
trusted library allocation
page read and write
238F2F7B000
trusted library allocation
page read and write
238F3751000
trusted library allocation
page read and write
417E000
stack
page read and write
2863217B000
trusted library allocation
page read and write
50F1000
heap
page read and write
6471000
heap
page read and write
286288F6000
heap
page read and write
50F1000
heap
page read and write
238F3790000
trusted library allocation
page read and write
57F1000
heap
page read and write
694E000
stack
page read and write
50F1000
heap
page read and write
964BC9D000
stack
page read and write
286320B4000
trusted library allocation
page read and write
57F1000
heap
page read and write
4850000
direct allocation
page read and write
286288C6000
heap
page read and write
1BC4000
heap
page read and write
E20000
heap
page read and write
2862E962000
trusted library allocation
page read and write
2863217B000
trusted library allocation
page read and write
167E000
heap
page read and write
6471000
heap
page read and write
27AF115D000
trusted library allocation
page read and write
10F0000
heap
page read and write
28630AEE000
trusted library allocation
page read and write
286288FD000
heap
page read and write
50F1000
heap
page read and write
2862D6D7000
trusted library allocation
page read and write
6471000
heap
page read and write
F34000
heap
page read and write
29AE000
stack
page read and write
286288F6000
heap
page read and write
53E0000
heap
page read and write
7E2000
unkown
page execute and read and write
EF0000
direct allocation
page read and write
2862E096000
trusted library allocation
page read and write
34BF000
stack
page read and write
2AEE000
stack
page read and write
286322EC000
trusted library allocation
page read and write
57F1000
heap
page read and write
12BA000
heap
page read and write
43AE000
stack
page read and write
238F449C000
trusted library allocation
page read and write
2863BF8D000
trusted library allocation
page read and write
286288CD000
heap
page read and write
43B1000
heap
page read and write
286288FC000
heap
page read and write
2862D61A000
trusted library allocation
page read and write
B84A33C000
stack
page read and write
6471000
heap
page read and write
417E000
stack
page read and write
238F34A2000
trusted library allocation
page read and write
286321DA000
trusted library allocation
page read and write
There are 6007 hidden memdumps, click here to show them.