IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_4e41abbb74886152b6742da3591b45a7624070_864df792_aad6efb5-37c6-4a06-bdb1-fc70e8f605f5\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\userAKKKFBGDHJ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\RoamingCFCGIIEHIE.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AAAAKJKJEBGHJKFHIDGCFCBAKK
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\AFHJJEHIEBKKFIDHDGHJDHIIDB
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\CAKKKFBFIDGDBFHJJEHIDHDAAF
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DAEBKKKEHDHDGDGCFBKJEBGIEC
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\FHCGCFHDHIIIDGCAAEGD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GCBKFIEBGCAAFIEBFCAE
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\GIJEBKECBAKFBGDGCBGD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HCAEBFBK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HCGDGIDG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_624f4d727e.exe_cad736d7a7cf8c04f5e973b8cf9ea4a3ed5b1dc_a03a600a_bc1fa693-5f75-4c93-b8a1-f4d49f94dab6\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_624f4d727e.exe_cad736d7a7cf8c04f5e973b8cf9ea4a3ed5b1dc_a03a600a_ceb39eb5-eb64-4ae7-b638-d370555f3b2e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_624f4d727e.exe_cad736d7a7cf8c04f5e973b8cf9ea4a3ed5b1dc_a03a600a_db95536d-1e91-44d8-b9b1-258778918527\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER256E.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Jul 27 07:25:16 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER27E0.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2810.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2913.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Jul 27 07:26:22 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER29DF.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2A0F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER67B2.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Jul 27 07:26:38 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6850.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6870.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF159.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Jul 27 07:26:08 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF1C8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF1F8.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\compatibility.ini
Windows WIN.INI
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 7, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 7
modified
C:\Windows\Tasks\axplong.job
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 46 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\RoamingCFCGIIEHIE.exe"
malicious
C:\Users\user\AppData\RoamingCFCGIIEHIE.exe
"C:\Users\user\AppData\RoamingCFCGIIEHIE.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\userAKKKFBGDHJ.exe"
malicious
C:\Users\userAKKKFBGDHJ.exe
"C:\Users\userAKKKFBGDHJ.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
"C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\1000016001\624f4d727e.exe
"C:\Users\user\AppData\Local\Temp\1000016001\624f4d727e.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000017001\bdb44f72d9.exe
"C:\Users\user\AppData\Local\Temp\1000017001\bdb44f72d9.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000016001\624f4d727e.exe
"C:\Users\user\AppData\Local\Temp\1000016001\624f4d727e.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000017001\bdb44f72d9.exe
"C:\Users\user\AppData\Local\Temp\1000017001\bdb44f72d9.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000016001\624f4d727e.exe
"C:\Users\user\AppData\Local\Temp\1000016001\624f4d727e.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 2376
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 8016 -s 1048
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6648 -s 1040
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2260 -parentBuildID 20230927232528 -prefsHandle 2208 -prefMapHandle 2200 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {02178454-e4c2-415f-b68b-05bee77a99df} 5256 "\\.\pipe\gecko-crash-server-pipe.5256" 270c9b6d510 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1316 -parentBuildID 20230927232528 -prefsHandle 4188 -prefMapHandle 4184 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {289cd873-04d9-4964-ab61-b0224a3875ef} 5256 "\\.\pipe\gecko-crash-server-pipe.5256" 270dcbf3310 rdd
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 1028
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2192 -parentBuildID 20230927232528 -prefsHandle 2136 -prefMapHandle 2128 -prefsLen 25350 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8056b53a-6eb2-4492-b78e-15b0c58ed1fc} 6396 "\\.\pipe\gecko-crash-server-pipe.6396" 2773686c110 socket
There are 19 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://85.28.47.31/8405906461a5200c/vcruntime140.dll
85.28.47.31
malicious
http://185.215.113.19/15.113.19/
unknown
malicious
http://185.215.113.19/Vi9leo/index.php
185.215.113.19
malicious
http://85.28.47.31/8405906461a5200c/softokn3.dll
85.28.47.31
malicious
http://85.28.47.31/8405906461a5200c/nss3.dll
85.28.47.31
malicious
http://85.28.47.31/8405906461a5200c/vcruntime140.dllRZT
unknown
malicious
http://185.215.113.19/Vi9leo/index.phpwb
unknown
malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://firefox.settings.services.allizom.org/v1/buckets/main/collections/search-config/records
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://screenshots.firefox.com
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
http://85.28.47.31/8405906461a5200c/softokn3.dll/
unknown
http://85.28.47.31/5499d72b3a3e55be.phpvWn
unknown
https://github.com/mozilla-services/screenshots
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCaptureRequest
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncoded
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
http://exslt.org/common
unknown
https://ok.ru/
unknown
https://support.mozilla.org/kb/fix-video-audio-problems-firefox-windowsThe
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://www.ecosia.org/newtab/
unknown
https://www.bbc.co.uk/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
https://mitmdetection.services.mozilla.com/
unknown
http://185.215.113.19/ferences.SourceAumid1
unknown
https://www.youtube.com/accountC:
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
http://85.28.47.31/AppData
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://profiler.firefox.comprofilerRecordingButtonCreatedMOZ_BROWSER_TOOLBOX_BINARYisPopupFeatureFl
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://www.youtu.c
unknown
https://www.youtube.com/account_shouldViewDownloadInternallygetCombined/overrideFnArray
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://www.amazon.com/Z
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://www.tsn.caZ
unknown
http://185.215.113.16/Jo89Ku7d/index.phpzRm4SJjISZA3JNjZ64n0LR=
unknown
https://monitor.firefox.com/about
unknown
https://login.microsoftonline.com
unknown
https://developer.mozilla.org/docs/Web/API/Push_API/Using_the_Push_API#Encryptiondocument.requestSto
unknown
https://getpocket.com/firefox/new_tab_learn_morediscoverystream.spocs-endpoint-query
unknown
http://85.28.47.315TJS
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
http://185.215.113.16/Jo89Ku7d/index.php2?
unknown
http://compose.mail.yahoo.co.jp/ym/Compose?To=%shttps://poczta.interia.pl/mh/?mailto=%shttp://win.ma
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://www.wykop.pl/
unknown
https://vk.com/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingTrying
unknown
https://www.olx.pl/
unknown
http://185.215.113.19/ons
unknown
https://mail.google.com/mail/?extsrc=mailto&url=%sFailed
unknown
https://xhr.spec.whatwg.org/#sync-warningThe
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-4
unknown
http://85.28.47.31lyF
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-2
unknown
https://github.com/google/closure-compiler/issues/3177
unknown
http://85.28.47.31/5499d72b3a3e55be.phposition:
unknown
https://www.google.com/complete/
unknown
https://ac.duckduckgo.com/ac/INHIBIT_PERSISTENT_CACHINGLOAD_ANONYMOUS_ALLOW_CLIENT_CERTget
unknown
https://webextensions.settings.services.mozilla.com/v1
unknown
http://185.215.113.16/Jo89Ku7d/index.phpv?
unknown
https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query-all.ts
unknown
https://account.bellmedia.cagetLocalizedFragment/partIndex
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/firefox-relay-integration
unknown
http://85.28.47.31/5499d72b3a3e55be.php;
unknown
https://addons.mozilla.org/%LOCALE%/firefox/
unknown
https://www.avito.ru/
unknown
http://185.215.113.16/Jo89Ku7d/index.php#
unknown
https://spocs.getpocket.com
unknown
https://developers.google.com/safe-browsing/v4/advisory
unknown
http://185.215.113.16/Jo89Ku7d/index.phpn?
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
spocs.getpocket.com
unknown
malicious
detectportal.firefox.com
unknown
malicious
content-signature-2.cdn.mozilla.net
unknown
malicious
www.youtube.com
unknown
malicious
example.org
93.184.215.14
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
youtube-ui.l.google.com
142.250.184.238
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
contile.services.mozilla.com
34.117.188.166
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
There are 3 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
85.28.47.31
unknown
Russian Federation
malicious
185.215.113.19
unknown
Portugal
malicious
185.215.113.16
unknown
Portugal
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
prod.ads.prod.webservices.mozgcp.net
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
142.250.184.238
youtube-ui.l.google.com
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{0c7c6eba-b171-4797-923e-9693f70f8886}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
malicious
\REGISTRY\A\{0c7c6eba-b171-4797-923e-9693f70f8886}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
malicious
\REGISTRY\A\{0c7c6eba-b171-4797-923e-9693f70f8886}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
malicious
\REGISTRY\A\{0c7c6eba-b171-4797-923e-9693f70f8886}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
malicious
\REGISTRY\A\{0c7c6eba-b171-4797-923e-9693f70f8886}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
malicious
\REGISTRY\A\{0c7c6eba-b171-4797-923e-9693f70f8886}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
malicious
\REGISTRY\A\{0c7c6eba-b171-4797-923e-9693f70f8886}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
malicious
\REGISTRY\A\{0c7c6eba-b171-4797-923e-9693f70f8886}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
malicious
\REGISTRY\A\{0c7c6eba-b171-4797-923e-9693f70f8886}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
malicious
\REGISTRY\A\{0c7c6eba-b171-4797-923e-9693f70f8886}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
malicious
\REGISTRY\A\{0c7c6eba-b171-4797-923e-9693f70f8886}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
malicious
\REGISTRY\A\{0c7c6eba-b171-4797-923e-9693f70f8886}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
malicious
\REGISTRY\A\{0c7c6eba-b171-4797-923e-9693f70f8886}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
malicious
\REGISTRY\A\{0c7c6eba-b171-4797-923e-9693f70f8886}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
malicious
\REGISTRY\A\{0c7c6eba-b171-4797-923e-9693f70f8886}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
malicious
\REGISTRY\A\{0c7c6eba-b171-4797-923e-9693f70f8886}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
malicious
\REGISTRY\A\{0c7c6eba-b171-4797-923e-9693f70f8886}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
malicious
\REGISTRY\A\{0c7c6eba-b171-4797-923e-9693f70f8886}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
malicious
\REGISTRY\A\{0c7c6eba-b171-4797-923e-9693f70f8886}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
624f4d727e.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
bdb44f72d9.exe
malicious
\REGISTRY\A\{39761025-3c02-d3fd-3e46-14c719d000bf}\Root\InventoryApplicationFile\624f4d727e.exe|b950e2a31fc96dd6
ProgramId
\REGISTRY\A\{39761025-3c02-d3fd-3e46-14c719d000bf}\Root\InventoryApplicationFile\624f4d727e.exe|b950e2a31fc96dd6
FileId
\REGISTRY\A\{39761025-3c02-d3fd-3e46-14c719d000bf}\Root\InventoryApplicationFile\624f4d727e.exe|b950e2a31fc96dd6
LowerCaseLongPath
\REGISTRY\A\{39761025-3c02-d3fd-3e46-14c719d000bf}\Root\InventoryApplicationFile\624f4d727e.exe|b950e2a31fc96dd6
LongPathHash
\REGISTRY\A\{39761025-3c02-d3fd-3e46-14c719d000bf}\Root\InventoryApplicationFile\624f4d727e.exe|b950e2a31fc96dd6
Name
\REGISTRY\A\{39761025-3c02-d3fd-3e46-14c719d000bf}\Root\InventoryApplicationFile\624f4d727e.exe|b950e2a31fc96dd6
OriginalFileName
\REGISTRY\A\{39761025-3c02-d3fd-3e46-14c719d000bf}\Root\InventoryApplicationFile\624f4d727e.exe|b950e2a31fc96dd6
Publisher
\REGISTRY\A\{39761025-3c02-d3fd-3e46-14c719d000bf}\Root\InventoryApplicationFile\624f4d727e.exe|b950e2a31fc96dd6
Version
\REGISTRY\A\{39761025-3c02-d3fd-3e46-14c719d000bf}\Root\InventoryApplicationFile\624f4d727e.exe|b950e2a31fc96dd6
BinFileVersion
\REGISTRY\A\{39761025-3c02-d3fd-3e46-14c719d000bf}\Root\InventoryApplicationFile\624f4d727e.exe|b950e2a31fc96dd6
BinaryType
\REGISTRY\A\{39761025-3c02-d3fd-3e46-14c719d000bf}\Root\InventoryApplicationFile\624f4d727e.exe|b950e2a31fc96dd6
ProductName
\REGISTRY\A\{39761025-3c02-d3fd-3e46-14c719d000bf}\Root\InventoryApplicationFile\624f4d727e.exe|b950e2a31fc96dd6
ProductVersion
\REGISTRY\A\{39761025-3c02-d3fd-3e46-14c719d000bf}\Root\InventoryApplicationFile\624f4d727e.exe|b950e2a31fc96dd6
LinkDate
\REGISTRY\A\{39761025-3c02-d3fd-3e46-14c719d000bf}\Root\InventoryApplicationFile\624f4d727e.exe|b950e2a31fc96dd6
BinProductVersion
\REGISTRY\A\{39761025-3c02-d3fd-3e46-14c719d000bf}\Root\InventoryApplicationFile\624f4d727e.exe|b950e2a31fc96dd6
AppxPackageFullName
\REGISTRY\A\{39761025-3c02-d3fd-3e46-14c719d000bf}\Root\InventoryApplicationFile\624f4d727e.exe|b950e2a31fc96dd6
AppxPackageRelativeId
\REGISTRY\A\{39761025-3c02-d3fd-3e46-14c719d000bf}\Root\InventoryApplicationFile\624f4d727e.exe|b950e2a31fc96dd6
Size
\REGISTRY\A\{39761025-3c02-d3fd-3e46-14c719d000bf}\Root\InventoryApplicationFile\624f4d727e.exe|b950e2a31fc96dd6
Language
\REGISTRY\A\{39761025-3c02-d3fd-3e46-14c719d000bf}\Root\InventoryApplicationFile\624f4d727e.exe|b950e2a31fc96dd6
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00EC7383FBB
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
There are 47 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4810000
direct allocation
page read and write
malicious
41000
unkown
page execute and read and write
malicious
4B00000
direct allocation
page read and write
malicious
3A1000
unkown
page execute and read and write
malicious
4FC0000
direct allocation
page read and write
malicious
25CA000
heap
page read and write
malicious
25EB000
heap
page read and write
malicious
4B20000
direct allocation
page read and write
malicious
4980000
direct allocation
page read and write
malicious
5130000
direct allocation
page read and write
malicious
24A7000
heap
page read and write
malicious
361000
unkown
page execute and read and write
malicious
3A1000
unkown
page execute and read and write
malicious
3A1000
unkown
page execute and read and write
malicious
2536000
heap
page read and write
malicious
7F1000
unkown
page execute and read and write
malicious
7F1000
unkown
page execute and read and write
malicious
51B0000
direct allocation
page read and write
malicious
65DD000
stack
page read and write
270DCB5D000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
4970000
direct allocation
page execute and read and write
270E45CC000
trusted library allocation
page read and write
270CC71B000
heap
page read and write
27742E52000
trusted library allocation
page read and write
A14000
heap
page read and write
270E3F2C000
trusted library allocation
page read and write
270E4B18000
trusted library allocation
page read and write
270E4303000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
7060000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
27746D9C000
trusted library allocation
page read and write
A14000
heap
page read and write
23837A40000
heap
page read and write
277476D1000
trusted library allocation
page read and write
A14000
heap
page read and write
1580000
direct allocation
page read and write
270DC770000
trusted library allocation
page read and write
64A1000
heap
page read and write
270CC65D000
heap
page read and write
990000
heap
page read and write
64A1000
heap
page read and write
2255000
heap
page read and write
1C21F000
stack
page read and write
16BBE912000
unclassified section
page read and write
446E000
stack
page read and write
270E5C76000
trusted library allocation
page read and write
1B03000
heap
page read and write
270E4120000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
263FF990000
heap
page read and write
64A1000
heap
page read and write
B1A02FE000
stack
page read and write
3C4E000
stack
page read and write
4600000
trusted library allocation
page read and write
8410000
heap
page read and write
4B37000
heap
page read and write
A14000
heap
page read and write
466F000
stack
page read and write
277394C1000
heap
page read and write
52F0000
direct allocation
page execute and read and write
4D31000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
27746A03000
trusted library allocation
page read and write
27746374000
trusted library allocation
page read and write
A14000
heap
page read and write
270D8500000
trusted library allocation
page read and write
64A1000
heap
page read and write
1F10000
heap
page read and write
27747FD6000
trusted library allocation
page read and write
515C000
stack
page read and write
3BEE000
stack
page read and write
270E4092000
trusted library allocation
page read and write
DC1C83E000
stack
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270E22E5000
trusted library allocation
page read and write
27747CBC000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DA5E1000
trusted library allocation
page read and write
A15000
heap
page read and write
270CC702000
heap
page read and write
64A1000
heap
page read and write
CA4000
heap
page read and write
270DC7D4000
trusted library allocation
page read and write
478E000
stack
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
DC1CB7C000
stack
page read and write
2D7F000
stack
page read and write
270DB0B6000
trusted library allocation
page read and write
337F000
stack
page read and write
12CD024D1000
trusted library allocation
page read and write
277471AC000
trusted library allocation
page read and write
9930000
heap
page read and write
270DB470000
trusted library section
page read and write
A14000
heap
page read and write
DB4000
heap
page read and write
560000
heap
page read and write
193E000
stack
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
4B31000
heap
page read and write
A15000
heap
page read and write
23837D9F000
trusted library allocation
page read and write
B1A6FFB000
stack
page read and write
3D6E000
stack
page read and write
270DA67D000
trusted library allocation
page read and write
270CC5D0000
heap
page read and write
270E40A4000
trusted library allocation
page read and write
270DAD14000
trusted library allocation
page read and write
DCE000
stack
page read and write
270E2B00000
trusted library allocation
page read and write
277E8E30000
heap
page read and write
CA4000
heap
page read and write
270E416D000
trusted library allocation
page read and write
270E4179000
trusted library allocation
page read and write
372000
unkown
page execute and read and write
270D61DD000
trusted library allocation
page read and write
B1A120F000
stack
page read and write
270E230D000
trusted library allocation
page read and write
4CB0000
direct allocation
page execute and read and write
DB4000
heap
page read and write
238389A0000
heap
page read and write
64A1000
heap
page read and write
2A30000
direct allocation
page read and write
691733E000
stack
page read and write
64A1000
heap
page read and write
DC19D3E000
stack
page read and write
270D6C9F000
trusted library allocation
page read and write
27747A20000
trusted library allocation
page read and write
277471F3000
trusted library allocation
page read and write
2773894C000
trusted library allocation
page read and write
1DA2000
heap
page read and write
64A1000
heap
page read and write
27743C03000
trusted library allocation
page read and write
277476D1000
trusted library allocation
page read and write
270DB861000
trusted library allocation
page read and write
A14000
heap
page read and write
270D8C22000
trusted library allocation
page read and write
A14000
heap
page read and write
27746D9F000
trusted library allocation
page read and write
64A1000
heap
page read and write
27743861000
trusted library allocation
page read and write
27743FD0000
unclassified section
page read and write
A14000
heap
page read and write
493000
unkown
page execute and read and write
238378A0000
unclassified section
page readonly
27746100000
trusted library allocation
page read and write
27747B83000
trusted library allocation
page read and write
B1A77FD000
stack
page read and write
450E000
stack
page read and write
16BBEB61000
trusted library allocation
page read and write
440E000
stack
page read and write
27743568000
heap
page read and write
270DC957000
trusted library allocation
page read and write
270D7C99000
trusted library allocation
page read and write
277479F3000
trusted library allocation
page read and write
4B31000
heap
page read and write
A14000
heap
page read and write
277E8D5D000
trusted library allocation
page read and write
270D671B000
trusted library allocation
page read and write
270DA891000
trusted library allocation
page read and write
270DB103000
trusted library allocation
page read and write
270DA771000
trusted library allocation
page read and write
A14000
heap
page read and write
A15000
heap
page read and write
270E4092000
trusted library allocation
page read and write
270E0B30000
trusted library allocation
page read and write
6AD000
unkown
page execute and read and write
64A1000
heap
page read and write
578E000
stack
page read and write
A14000
heap
page read and write
270C9B6B000
trusted library allocation
page read and write
64A7000
heap
page read and write
270D7A90000
trusted library section
page readonly
1C68E000
stack
page read and write
64A1000
heap
page read and write
277480F9000
trusted library allocation
page read and write
B1A11FF000
stack
page read and write
A14000
heap
page read and write
DB4000
heap
page read and write
A14000
heap
page read and write
270E41FB000
trusted library allocation
page read and write
64A1000
heap
page read and write
27747CF7000
trusted library allocation
page read and write
DC1ADFF000
stack
page read and write
16BBED03000
trusted library allocation
page read and write
27745ED2000
trusted library allocation
page read and write
4B31000
heap
page read and write
270E4585000
trusted library allocation
page read and write
270DB503000
trusted library allocation
page read and write
A15000
heap
page read and write
A14000
heap
page read and write
4C1E000
stack
page read and write
270DCBBC000
trusted library allocation
page read and write
72949FF000
stack
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
CA7000
unkown
page execute and read and write
64A1000
heap
page read and write
270DF004000
trusted library allocation
page read and write
4AE0000
direct allocation
page execute and read and write
27746355000
trusted library allocation
page read and write
277E8D0D000
trusted library allocation
page read and write
270DDCB5000
trusted library allocation
page read and write
A14000
heap
page read and write
27746DE2000
trusted library allocation
page read and write
27747ABA000
trusted library allocation
page read and write
270E2321000
trusted library allocation
page read and write
277513F3000
trusted library allocation
page read and write
270DC2C4000
trusted library allocation
page read and write
270DB7CF000
trusted library allocation
page read and write
270DA2B1000
trusted library allocation
page read and write
270E404A000
trusted library allocation
page read and write
270E2059000
trusted library allocation
page read and write
1EDD000
heap
page read and write
64A1000
heap
page read and write
270D65EF000
unclassified section
page read and write
270DC847000
trusted library allocation
page read and write
270E21B3000
trusted library allocation
page read and write
270DAF00000
trusted library allocation
page read and write
27746DDA000
trusted library allocation
page read and write
270DB848000
trusted library allocation
page read and write
3AFF000
stack
page read and write
64A1000
heap
page read and write
2774E43C000
trusted library allocation
page read and write
64A1000
heap
page read and write
4691000
heap
page read and write
3E8F000
stack
page read and write
64A1000
heap
page read and write
244C000
unkown
page readonly
A14000
heap
page read and write
64A1000
heap
page read and write
270DA2B1000
trusted library allocation
page read and write
CA4000
heap
page read and write
27746DB6000
trusted library allocation
page read and write
2774327D000
trusted library allocation
page read and write
277476EB000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270E4012000
trusted library allocation
page read and write
64A1000
heap
page read and write
27747F68000
trusted library allocation
page read and write
270CC717000
heap
page read and write
64A1000
heap
page read and write
4F54000
direct allocation
page execute and read and write
270DAC23000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270DB5D9000
trusted library allocation
page read and write
238389EA000
heap
page read and write
A14000
heap
page read and write
270E4B1E000
trusted library allocation
page read and write
A14000
heap
page read and write
270E40E4000
trusted library allocation
page read and write
270DC2CA000
trusted library allocation
page read and write
13D4000
heap
page read and write
270E204F000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
27743800000
trusted library allocation
page read and write
270DCB97000
trusted library allocation
page read and write
270DAC0F000
trusted library allocation
page read and write
27748244000
trusted library allocation
page read and write
A14000
heap
page read and write
CA4000
heap
page read and write
564000
heap
page read and write
2F50000
direct allocation
page read and write
277480D8000
trusted library allocation
page read and write
270E21B1000
trusted library allocation
page read and write
270DA2F1000
trusted library allocation
page read and write
277478AF000
trusted library allocation
page read and write
270DC8C4000
trusted library allocation
page read and write
270DBF19000
trusted library allocation
page read and write
270DA66B000
trusted library allocation
page read and write
2774385E000
trusted library allocation
page read and write
270DAC00000
trusted library allocation
page read and write
4B31000
heap
page read and write
27747C79000
trusted library allocation
page read and write
2730000
heap
page read and write
64A1000
heap
page read and write
DC1AF3B000
stack
page read and write
277472EE000
trusted library allocation
page read and write
23838A2F000
heap
page read and write
270E4503000
trusted library allocation
page read and write
A15000
heap
page read and write
27736740000
heap
page readonly
270E45DE000
trusted library allocation
page read and write
23C09FD000
stack
page read and write
2774E423000
trusted library allocation
page read and write
270C9910000
heap
page readonly
28D1F000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270D6715000
trusted library allocation
page read and write
64A1000
heap
page read and write
27746A48000
trusted library allocation
page read and write
4370000
direct allocation
page read and write
270DA2DE000
trusted library allocation
page read and write
270E0B0A000
trusted library allocation
page read and write
277462EB000
trusted library allocation
page read and write
270E4590000
trusted library allocation
page read and write
66E3000
heap
page read and write
A14000
heap
page read and write
270E405C000
trusted library allocation
page read and write
270DC80F000
trusted library allocation
page read and write
A14000
heap
page read and write
270CC70B000
heap
page read and write
27747B92000
trusted library allocation
page read and write
19C4000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
270DC8AA000
trusted library allocation
page read and write
27744000000
trusted library allocation
page read and write
270DC2F5000
trusted library allocation
page read and write
4D31000
heap
page read and write
270E4380000
trusted library allocation
page read and write
A15000
heap
page read and write
270E0B06000
trusted library allocation
page read and write
4AB4000
heap
page read and write
B7A000
heap
page read and write
23837D5F000
trusted library allocation
page read and write
270D8110000
trusted library section
page read and write
A15000
heap
page read and write
49A0000
direct allocation
page execute and read and write
270E42B9000
trusted library allocation
page read and write
27750AEA000
trusted library allocation
page read and write
270D6939000
heap
page read and write
3DEE000
stack
page read and write
9DE000
unkown
page execute and read and write
64A1000
heap
page read and write
A15000
heap
page read and write
642F000
stack
page read and write
A14000
heap
page read and write
B1A883F000
stack
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
30CF000
stack
page read and write
158A7AFB000
heap
page read and write
270E2187000
trusted library allocation
page read and write
2774E43C000
trusted library allocation
page read and write
277439CF000
trusted library allocation
page read and write
400000
unkown
page readonly
64A1000
heap
page read and write
270DA58F000
trusted library allocation
page read and write
DC19CFA000
stack
page read and write
2774325A000
trusted library allocation
page read and write
270DC94C000
trusted library allocation
page read and write
64A1000
heap
page read and write
27744608000
trusted library allocation
page read and write
270DBC03000
trusted library allocation
page read and write
22C74000
heap
page read and write
270DB84E000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DAC19000
trusted library allocation
page read and write
22C93000
heap
page read and write
A14000
heap
page read and write
2084000
heap
page read and write
4B20000
direct allocation
page read and write
EEE000
heap
page read and write
270D609E000
trusted library allocation
page read and write
270D66FE000
trusted library allocation
page read and write
270E22D0000
trusted library allocation
page read and write
270E45A1000
trusted library allocation
page read and write
A14000
heap
page read and write
CA4000
heap
page read and write
27745EFB000
trusted library allocation
page read and write
A7E000
heap
page read and write
4D31000
heap
page read and write
3A2E000
stack
page read and write
27743079000
trusted library allocation
page read and write
A14000
heap
page read and write
4C40000
direct allocation
page execute and read and write
A14000
heap
page read and write
27747923000
trusted library allocation
page read and write
27746AF8000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
482F000
stack
page read and write
270E23BC000
trusted library allocation
page read and write
270E4B0E000
trusted library allocation
page read and write
64A1000
heap
page read and write
4B31000
heap
page read and write
277E8C00000
trusted library allocation
page read and write
27747B92000
trusted library allocation
page read and write
B1A023E000
stack
page read and write
270CC702000
heap
page read and write
7E0000
direct allocation
page read and write
2530000
heap
page read and write
F8A447E000
stack
page read and write
64A1000
heap
page read and write
16BBEBB9000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
270E3F00000
trusted library allocation
page read and write
23837B8C000
unkown
page execute read
270DBF63000
trusted library allocation
page read and write
270DA69B000
trusted library allocation
page read and write
270DDAE0000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270E4166000
trusted library allocation
page read and write
27747CF4000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
27743DDA000
trusted library allocation
page read and write
270E40F2000
trusted library allocation
page read and write
270E4133000
trusted library allocation
page read and write
270CC70F000
heap
page read and write
270DC7A4000
trusted library allocation
page read and write
27736790000
heap
page read and write
270DB853000
trusted library allocation
page read and write
DB4000
heap
page read and write
64A1000
heap
page read and write
7E0000
direct allocation
page read and write
39AE000
stack
page read and write
27747065000
trusted library allocation
page read and write
41000
unkown
page execute and write copy
27747A3A000
trusted library allocation
page read and write
64A1000
heap
page read and write
4F1000
unkown
page execute and read and write
B1A8C7B000
stack
page read and write
64A1000
heap
page read and write
23C29FF000
stack
page read and write
27747A76000
trusted library allocation
page read and write
270D7E5B000
trusted library allocation
page read and write
3A0000
unkown
page readonly
A14000
heap
page read and write
39E679900000
trusted library allocation
page read and write
270DB8AD000
trusted library allocation
page read and write
4D31000
heap
page read and write
64A1000
heap
page read and write
270D62A8000
trusted library allocation
page read and write
50D0000
heap
page read and write
27746CDF000
trusted library allocation
page read and write
A14000
heap
page read and write
277E8D00000
trusted library allocation
page read and write
DC1B1C4000
stack
page read and write
1954000
heap
page read and write
27743F10000
trusted library section
page readonly
1580000
direct allocation
page read and write
409000
unkown
page read and write
4B31000
heap
page read and write
3C8F000
stack
page read and write
43CF000
stack
page read and write
64A1000
heap
page read and write
AE4000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
277E8A80000
unclassified section
page read and write
277432BA000
trusted library allocation
page read and write
27747E3E000
trusted library allocation
page read and write
270D60CA000
trusted library allocation
page read and write
27747A4E000
trusted library allocation
page read and write
64A1000
heap
page read and write
22C93000
heap
page read and write
270C9B0D000
trusted library allocation
page read and write
277E8D12000
trusted library allocation
page read and write
22C73000
heap
page read and write
270E41AC000
trusted library allocation
page read and write
64A1000
heap
page read and write
1AFE000
stack
page read and write
27742FAD000
trusted library allocation
page read and write
27746404000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270D8300000
trusted library allocation
page read and write
27747FFC000
trusted library allocation
page read and write
270D8C04000
trusted library allocation
page read and write
270DC573000
trusted library allocation
page read and write
27748216000
trusted library allocation
page read and write
27743803000
trusted library allocation
page read and write
23838A28000
heap
page read and write
845000
unkown
page execute and read and write
3B2F000
stack
page read and write
270DBF52000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
31963FF000
stack
page read and write
13D4000
heap
page read and write
270E45BA000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E22E3000
trusted library allocation
page read and write
4AE0000
direct allocation
page execute and read and write
A14000
heap
page read and write
1580000
direct allocation
page read and write
4D31000
heap
page read and write
270E21E4000
trusted library allocation
page read and write
1FAC000
heap
page read and write
27747B8D000
trusted library allocation
page read and write
24E0000
heap
page read and write
270DC863000
trusted library allocation
page read and write
270DB2EB000
trusted library allocation
page read and write
27746DE6000
trusted library allocation
page read and write
270E5C95000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
277E89B0000
unclassified section
page readonly
B1A0FFE000
stack
page read and write
64A1000
heap
page read and write
27742F87000
trusted library allocation
page read and write
35200000
heap
page read and write
64A1000
heap
page read and write
4470000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
270DA2E2000
trusted library allocation
page read and write
A14000
heap
page read and write
270E0B18000
trusted library allocation
page read and write
B84000
unkown
page execute and write copy
27747B67000
trusted library allocation
page read and write
16BBEB03000
trusted library allocation
page read and write
270DA2C9000
trusted library allocation
page read and write
5320000
direct allocation
page execute and read and write
270DB107000
trusted library allocation
page read and write
1400000
heap
page read and write
219E000
heap
page read and write
DB4000
heap
page read and write
27747166000
trusted library allocation
page read and write
270E0B32000
trusted library allocation
page read and write
64A1000
heap
page read and write
368E000
stack
page read and write
4B31000
heap
page read and write
270DA65A000
trusted library allocation
page read and write
270DF026000
trusted library allocation
page read and write
270CC709000
heap
page read and write
270DDB69000
trusted library allocation
page read and write
27747BC5000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270DC2AD000
trusted library allocation
page read and write
A15000
heap
page read and write
4E24000
direct allocation
page execute and read and write
43BF000
stack
page read and write
64A1000
heap
page read and write
A15000
heap
page read and write
D10000
direct allocation
page read and write
270DCB93000
trusted library allocation
page read and write
270E44CF000
trusted library allocation
page read and write
270DCABA000
trusted library allocation
page read and write
A14000
heap
page read and write
27747943000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
238389A9000
heap
page read and write
226F000
heap
page read and write
382E000
stack
page read and write
270E23D1000
trusted library allocation
page read and write
270E45EC000
trusted library allocation
page read and write
38EE000
stack
page read and write
2773949F000
heap
page read and write
270DA6CA000
trusted library allocation
page read and write
64A1000
heap
page read and write
277E8A8F000
unclassified section
page read and write
27745E10000
trusted library allocation
page read and write
27743867000
trusted library allocation
page read and write
2A30000
direct allocation
page read and write
270DA77D000
trusted library allocation
page read and write
A14000
heap
page read and write
8DC000
unkown
page execute and read and write
27747AA4000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DA8F5000
trusted library allocation
page read and write
158A7C00000
trusted library allocation
page read and write
270D860A000
trusted library allocation
page read and write
A14000
heap
page read and write
270DB70B000
trusted library allocation
page read and write
47EE000
stack
page read and write
27743BDF000
trusted library allocation
page read and write
CA4000
heap
page read and write
270E3A1B000
trusted library allocation
page read and write
27747403000
trusted library allocation
page read and write
4D31000
heap
page read and write
270D8B6F000
trusted library allocation
page read and write
270DA8A7000
trusted library allocation
page read and write
2774763D000
trusted library allocation
page read and write
23838A2F000
heap
page read and write
42BE000
stack
page read and write
A14000
heap
page read and write
23F82331000
trusted library allocation
page execute read
A14000
heap
page read and write
CA4000
heap
page read and write
62C000
unkown
page execute and read and write
4B50000
heap
page read and write
64A1000
heap
page read and write
1954000
heap
page read and write
270DC2A8000
trusted library allocation
page read and write
64A1000
heap
page read and write
DB4000
heap
page read and write
270E3FB6000
trusted library allocation
page read and write
27743210000
trusted library allocation
page read and write
2774733F000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270D7C5F000
trusted library allocation
page read and write
181B000
stack
page read and write
64A1000
heap
page read and write
27742F23000
trusted library allocation
page read and write
B84000
unkown
page execute and write copy
270DA652000
trusted library allocation
page read and write
27738903000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E4040000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
A15000
heap
page read and write
270DC269000
trusted library allocation
page read and write
DEF000
stack
page read and write
270DB774000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
270E2287000
trusted library allocation
page read and write
A14000
heap
page read and write
244C000
unkown
page readonly
64A1000
heap
page read and write
27742E4A000
trusted library allocation
page read and write
CA4000
heap
page read and write
270D6100000
trusted library allocation
page read and write
49A0000
direct allocation
page execute and read and write
1954000
heap
page read and write
27747B10000
trusted library allocation
page read and write
A14000
heap
page read and write
1C48F000
stack
page read and write
22C70000
heap
page read and write
A14000
heap
page read and write
270DC8E0000
trusted library allocation
page read and write
387F000
stack
page read and write
270DB864000
trusted library allocation
page read and write
277365C9000
heap
page read and write
35A000
unkown
page execute and read and write
270C9BF1000
trusted library allocation
page read and write
A14000
heap
page read and write
3DD000
unkown
page readonly
64A1000
heap
page read and write
1E45000
heap
page read and write
270DADB7000
trusted library allocation
page read and write
DC1913E000
stack
page read and write
B4E000
heap
page read and write
1294000
heap
page read and write
DC2343B000
stack
page read and write
2637000
heap
page read and write
46EF000
stack
page read and write
D80000
direct allocation
page read and write
A14000
heap
page read and write
277478C9000
trusted library allocation
page read and write
A15000
heap
page read and write
270DB1E9000
trusted library allocation
page read and write
270DAB00000
trusted library allocation
page read and write
CA4000
heap
page read and write
4D31000
heap
page read and write
396F000
stack
page read and write
DB4000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
270E213C000
trusted library allocation
page read and write
270DC9A9000
trusted library allocation
page read and write
270DB6C9000
trusted library allocation
page read and write
23838514000
trusted library allocation
page read and write
270DB751000
trusted library allocation
page read and write
4F54000
direct allocation
page execute and read and write
7E0000
direct allocation
page read and write
270D6220000
trusted library allocation
page read and write
270D80F0000
trusted library section
page read and write
27743CA9000
trusted library allocation
page read and write
4280000
heap
page read and write
23838A61000
heap
page read and write
27746C3B000
trusted library allocation
page read and write
158A7AF3000
heap
page read and write
270E20D6000
trusted library allocation
page read and write
270E41B2000
trusted library allocation
page read and write
400000
unkown
page readonly
270D8B3C000
trusted library allocation
page read and write
A14000
heap
page read and write
270DAC07000
trusted library allocation
page read and write
270E5C9B000
trusted library allocation
page read and write
27743275000
trusted library allocation
page read and write
23838AB7000
heap
page read and write
A14000
heap
page read and write
4E24000
direct allocation
page execute and read and write
64A1000
heap
page read and write
270DBF9E000
trusted library allocation
page read and write
27745D70000
trusted library section
page readonly
270D881B000
trusted library allocation
page read and write
27746A62000
trusted library allocation
page read and write
27736410000
unclassified section
page readonly
1954000
heap
page read and write
CA4000
heap
page read and write
A14000
heap
page read and write
2383790E000
remote allocation
page execute read
A14000
heap
page read and write
19C4000
heap
page read and write
4B31000
heap
page read and write
64A1000
heap
page read and write
22C77000
heap
page read and write
4B20000
direct allocation
page read and write
25A0000
heap
page read and write
270E448A000
trusted library allocation
page read and write
A14000
heap
page read and write
270CC70A000
heap
page read and write
807E000
stack
page read and write
A14000
heap
page read and write
27746215000
trusted library allocation
page read and write
270C98C0000
heap
page read and write
27747CA4000
trusted library allocation
page read and write
A14000
heap
page read and write
270D79A8000
trusted library allocation
page read and write
64A1000
heap
page read and write
16BBED21000
trusted library allocation
page read and write
1643000
heap
page read and write
58C000
unkown
page execute and read and write
C7E000
stack
page read and write
270D79B2000
trusted library allocation
page read and write
22C67000
heap
page read and write
270D7EF4000
trusted library allocation
page read and write
270E4024000
trusted library allocation
page read and write
40B000
unkown
page execute and read and write
A14000
heap
page read and write
270E3FF0000
trusted library allocation
page read and write
270DB77A000
trusted library allocation
page read and write
23838A31000
heap
page read and write
277E8D5B000
trusted library allocation
page read and write
158A7C07000
trusted library allocation
page read and write
277E8D14000
trusted library allocation
page read and write
297F000
stack
page read and write
27747B96000
trusted library allocation
page read and write
CA4000
heap
page read and write
887F000
stack
page read and write
64A1000
heap
page read and write
632E000
stack
page read and write
270DCA28000
trusted library allocation
page read and write
A14000
heap
page read and write
1954000
heap
page read and write
CA4000
heap
page read and write
DC1B3EE000
stack
page read and write
270D7803000
trusted library allocation
page read and write
270D809D000
unclassified section
page read and write
27750F11000
trusted library allocation
page read and write
270DA2AE000
trusted library allocation
page read and write
A14000
heap
page read and write
270DBF75000
trusted library allocation
page read and write
829BFFE000
stack
page read and write
27743FD2000
unclassified section
page read and write
27746897000
trusted library allocation
page read and write
A15000
heap
page read and write
277482AA000
trusted library allocation
page read and write
A14000
heap
page read and write
575A5904000
trusted library allocation
page read and write
64A1000
heap
page read and write
27747BDA000
trusted library allocation
page read and write
4C4000
unkown
page execute and read and write
A15000
heap
page read and write
270D7903000
trusted library allocation
page read and write
64A1000
heap
page read and write
27746DD2000
trusted library allocation
page read and write
D10000
direct allocation
page read and write
A14000
heap
page read and write
194000
stack
page read and write
270DAEE4000
trusted library allocation
page read and write
432F000
stack
page read and write
2774FF12000
trusted library allocation
page read and write
27743DF2000
trusted library allocation
page read and write
3196BFD000
stack
page read and write
16BBE91F000
unclassified section
page read and write
270D6127000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270DA8E2000
trusted library allocation
page read and write
35AE000
stack
page read and write
27744700000
trusted library allocation
page read and write
277432E2000
trusted library allocation
page read and write
2C3E000
stack
page read and write
B1A37FE000
stack
page read and write
1954000
heap
page read and write
64A1000
heap
page read and write
B19F50B000
stack
page read and write
A14000
heap
page read and write
277479C3000
trusted library allocation
page read and write
D10000
direct allocation
page read and write
CA4000
heap
page read and write
270DB236000
trusted library allocation
page read and write
DB4000
heap
page read and write
2774791B000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DC500000
trusted library allocation
page read and write
277E89D0000
heap
page read and write
27747D92000
unclassified section
page read and write
16BBEB10000
trusted library allocation
page read and write
183F000
stack
page read and write
64A1000
heap
page read and write
2774FF28000
trusted library allocation
page read and write
3DD000
unkown
page readonly
DC1C3FE000
stack
page read and write
270D6D7B000
trusted library allocation
page read and write
4CB0000
direct allocation
page execute and read and write
25CE000
stack
page read and write
27743AD0000
trusted library section
page readonly
270DC2DE000
trusted library allocation
page read and write
64A1000
heap
page read and write
51D0000
direct allocation
page execute and read and write
3CCE000
stack
page read and write
5A7000
unkown
page execute and read and write
A14000
heap
page read and write
270E1C00000
trusted library allocation
page read and write
270DA595000
trusted library allocation
page read and write
270E0B26000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
270DA79E000
trusted library allocation
page read and write
270DB8B4000
trusted library allocation
page read and write
270E2238000
trusted library allocation
page read and write
A14000
heap
page read and write
D0E000
stack
page read and write
2383899F000
heap
page read and write
B67000
heap
page read and write
F0A000
heap
page read and write
1B88000
heap
page read and write
13D4000
heap
page read and write
270C9939000
heap
page read and write
1819000
stack
page read and write
5120000
direct allocation
page execute and read and write
CA4000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
270DDB00000
trusted library allocation
page read and write
B2F000
heap
page read and write
2774654E000
trusted library allocation
page read and write
CA4000
heap
page read and write
270DB700000
trusted library allocation
page read and write
27746300000
trusted library allocation
page read and write
A14000
heap
page read and write
1410000
direct allocation
page read and write
22C70000
heap
page read and write
DB4000
heap
page read and write
629C000
stack
page read and write
42AE000
stack
page read and write
270E23B0000
trusted library allocation
page read and write
2EF31000
heap
page read and write
270CC685000
heap
page read and write
A14000
heap
page read and write
270D7E41000
trusted library allocation
page read and write
A14000
heap
page read and write
3CEF000
stack
page read and write
A14000
heap
page read and write
24FD000
heap
page read and write
19C4000
heap
page read and write
34AE000
stack
page read and write
270DCBB5000
trusted library allocation
page read and write
B0A000
heap
page read and write
270D799B000
trusted library allocation
page read and write
27746F00000
trusted library allocation
page read and write
64A1000
heap
page read and write
27745EB5000
trusted library allocation
page read and write
27747603000
trusted library allocation
page read and write
581F000
stack
page read and write
6ECA000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
47AF000
stack
page read and write
2774743E000
trusted library allocation
page read and write
263FFB00000
heap
page read and write
64A1000
heap
page read and write
859000
unkown
page read and write
A14000
heap
page read and write
16BBE7B0000
heap
page read and write
4B70000
direct allocation
page execute and read and write
64A1000
heap
page read and write
277513C0000
trusted library allocation
page read and write
158A7D80000
heap
page read and write
27743275000
trusted library allocation
page read and write
A14000
heap
page read and write
2773686B000
trusted library allocation
page read and write
27747B03000
trusted library allocation
page read and write
277462CB000
trusted library allocation
page read and write
A14000
heap
page read and write
7051000
heap
page read and write
1F3E000
heap
page read and write
2774829C000
trusted library allocation
page read and write
656000
unkown
page execute and read and write
270DDA58000
trusted library allocation
page read and write
270DC7F3000
trusted library allocation
page read and write
270D60A4000
trusted library allocation
page read and write
27742EDF000
trusted library allocation
page read and write
A15000
heap
page read and write
516E000
stack
page read and write
B1A12BE000
stack
page read and write
A14000
heap
page read and write
5CAE000
stack
page read and write
4B20000
direct allocation
page read and write
27743D28000
trusted library allocation
page read and write
64A1000
heap
page read and write
22C7D000
heap
page read and write
32BE000
stack
page read and write
6677000
heap
page read and write
6917BBE000
unkown
page readonly
6C632000
unkown
page readonly
64A1000
heap
page read and write
64A1000
heap
page read and write
270DDA93000
trusted library allocation
page read and write
27746B3D000
trusted library allocation
page read and write
27747A36000
trusted library allocation
page read and write
270DCA40000
trusted library allocation
page read and write
270DA6A1000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E406C000
trusted library allocation
page read and write
89B000
stack
page read and write
277466EF000
trusted library allocation
page read and write
270DC7F3000
trusted library allocation
page read and write
64A1000
heap
page read and write
2EE8F000
stack
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270DA76C000
trusted library allocation
page read and write
A14000
heap
page read and write
27746C5F000
trusted library allocation
page read and write
DC1D3FF000
stack
page read and write
CA4000
heap
page read and write
DB4000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
270E2187000
trusted library allocation
page read and write
A14000
heap
page read and write
4FD000
unkown
page execute and read and write
16BBED00000
trusted library allocation
page read and write
270C99E0000
trusted library allocation
page execute read
A15000
heap
page read and write
A14000
heap
page read and write
27747C80000
trusted library allocation
page read and write
A14000
heap
page read and write
27747A7A000
trusted library allocation
page read and write
27745F53000
trusted library allocation
page read and write
EEF000
heap
page read and write
277466E5000
trusted library allocation
page read and write
270CC70E000
heap
page read and write
CA4000
heap
page read and write
270DC2D6000
trusted library allocation
page read and write
A14000
heap
page read and write
270DAF1B000
trusted library allocation
page read and write
1954000
heap
page read and write
270DA8BC000
trusted library allocation
page read and write
1FE8000
heap
page read and write
22C77000
heap
page read and write
27747B83000
trusted library allocation
page read and write
27743E03000
trusted library allocation
page read and write
5390000
direct allocation
page execute and read and write
A14000
heap
page read and write
4810000
direct allocation
page read and write
A14000
heap
page read and write
158A9548000
heap
page read and write
12FD000
stack
page read and write
277439E8000
trusted library allocation
page read and write
64A1000
heap
page read and write
270C98F0000
trusted library allocation
page read and write
CA4000
heap
page read and write
270CC70F000
heap
page read and write
23838A84000
heap
page read and write
270DDB25000
trusted library allocation
page read and write
277478DC000
trusted library allocation
page read and write
277471C3000
trusted library allocation
page read and write
2ABF000
stack
page read and write
64A1000
heap
page read and write
270DC900000
trusted library allocation
page read and write
27747A9F000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
564000
heap
page read and write
3F2E000
stack
page read and write
270DA8B4000
trusted library allocation
page read and write
270E4493000
trusted library allocation
page read and write
27747BA3000
trusted library allocation
page read and write
A14000
heap
page read and write
DB4000
heap
page read and write
22E000
unkown
page execute and read and write
270DA8D6000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
27747BDA000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
27745E7C000
trusted library allocation
page read and write
27742F28000
trusted library allocation
page read and write
27747B7B000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
22C5B000
heap
page read and write
27744C2D000
trusted library allocation
page read and write
270DC20A000
trusted library allocation
page read and write
27743B11000
trusted library allocation
page read and write
270DA8DC000
trusted library allocation
page read and write
279F000
stack
page read and write
64A1000
heap
page read and write
270DA400000
trusted library allocation
page read and write
27747FDC000
trusted library allocation
page read and write
27747C80000
trusted library allocation
page read and write
2774670C000
trusted library allocation
page read and write
270DC2D2000
trusted library allocation
page read and write
2774826C000
trusted library allocation
page read and write
4B31000
heap
page read and write
27747B17000
trusted library allocation
page read and write
2EF42000
heap
page read and write
4871000
direct allocation
page read and write
DC1B3C3000
stack
page read and write
277438C5000
trusted library allocation
page read and write
A14000
heap
page read and write
27747B8B000
trusted library allocation
page read and write
2774825B000
trusted library allocation
page read and write
49A0000
direct allocation
page execute and read and write
238389E1000
heap
page read and write
5A4D000
stack
page read and write
270DA700000
trusted library allocation
page read and write
5380000
direct allocation
page execute and read and write
CA4000
heap
page read and write
332F000
stack
page read and write
64A1000
heap
page read and write
270DC76D000
trusted library allocation
page read and write
270DC7FC000
trusted library allocation
page read and write
1CAA9000
heap
page read and write
348F000
stack
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
49A0000
direct allocation
page execute and read and write
401000
unkown
page execute read
A14000
heap
page read and write
DC236FE000
stack
page read and write
270DB2AE000
trusted library allocation
page read and write
270DAEE8000
trusted library allocation
page read and write
CA4000
heap
page read and write
2774326A000
trusted library allocation
page read and write
270E21EC000
trusted library allocation
page read and write
23838A98000
heap
page read and write
16BBE7F0000
heap
page readonly
13D4000
heap
page read and write
A14000
heap
page read and write
B1A887E000
stack
page read and write
64A1000
heap
page read and write
270D6C0D000
trusted library allocation
page read and write
270DA316000
trusted library allocation
page read and write
DC1A13C000
stack
page read and write
B1A71FD000
stack
page read and write
A14000
heap
page read and write
48CE000
stack
page read and write
270DBE49000
trusted library allocation
page read and write
27747600000
trusted library allocation
page read and write
270D8900000
trusted library allocation
page read and write
A14000
heap
page read and write
158A7AE3000
heap
page read and write
270E45E2000
trusted library allocation
page read and write
27746060000
trusted library allocation
page read and write
270E4186000
trusted library allocation
page read and write
2774399A000
trusted library allocation
page read and write
22C61000
heap
page read and write
27743EBB000
trusted library allocation
page read and write
270DDABA000
trusted library allocation
page read and write
270E45C3000
trusted library allocation
page read and write
A14000
heap
page read and write
277438A7000
trusted library allocation
page read and write
42B4000
heap
page read and write
244C000
unkown
page readonly
CA4000
heap
page read and write
3E6F000
stack
page read and write
64A1000
heap
page read and write
859000
unkown
page write copy
4D31000
heap
page read and write
270DA178000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DA762000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E22DD000
trusted library allocation
page read and write
A14000
heap
page read and write
27743D9B000
trusted library allocation
page read and write
396E000
stack
page read and write
22C75000
heap
page read and write
270CC71B000
heap
page read and write
27747933000
trusted library allocation
page read and write
270DB430000
trusted library section
page read and write
845000
unkown
page execute and read and write
27743903000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E4200000
trusted library allocation
page read and write
2621000
heap
page read and write
270DC65B000
trusted library allocation
page read and write
270CC702000
heap
page read and write
270DB2AC000
trusted library allocation
page read and write
270DB883000
trusted library allocation
page read and write
270DC278000
trusted library allocation
page read and write
27747900000
trusted library allocation
page read and write
CA4000
heap
page read and write
A14000
heap
page read and write
277479CB000
trusted library allocation
page read and write
4D31000
heap
page read and write
270DDBA9000
trusted library allocation
page read and write
140F000
stack
page read and write
277430D4000
trusted library allocation
page read and write
64A1000
heap
page read and write
27746C1B000
trusted library allocation
page read and write
64A1000
heap
page read and write
270D62A4000
trusted library allocation
page read and write
277367D0000
trusted library allocation
page execute read
27747CE9000
trusted library allocation
page read and write
6B60000
heap
page read and write
4A0E000
stack
page read and write
13D4000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
CA4000
heap
page read and write
4D31000
heap
page read and write
270E4371000
trusted library allocation
page read and write
270DA8E0000
trusted library allocation
page read and write
7E0000
direct allocation
page read and write
27743BED000
trusted library allocation
page read and write
3B4F000
stack
page read and write
270D60B3000
trusted library allocation
page read and write
64A1000
heap
page read and write
27743300000
trusted library allocation
page read and write
27743217000
trusted library allocation
page read and write
3B8E000
stack
page read and write
DB4000
heap
page read and write
A14000
heap
page read and write
270DA61C000
trusted library allocation
page read and write
270DC281000
trusted library allocation
page read and write
A14000
heap
page read and write
3F3E000
stack
page read and write
64A1000
heap
page read and write
F8A29FE000
unkown
page readonly
377F27704000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
277476E9000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E401F000
trusted library allocation
page read and write
19C4000
heap
page read and write
A14000
heap
page read and write
270E40C7000
trusted library allocation
page read and write
64A1000
heap
page read and write
DB4000
heap
page read and write
4B31000
heap
page read and write
27743DA2000
trusted library allocation
page read and write
277478FC000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DB8ED000
trusted library allocation
page read and write
A14000
heap
page read and write
1A176F100000
trusted library allocation
page read and write
270DC274000
trusted library allocation
page read and write
27743EE8000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E0B02000
trusted library allocation
page read and write
CA5000
heap
page read and write
27747116000
trusted library allocation
page read and write
1D32000
heap
page read and write
270DA8F8000
trusted library allocation
page read and write
B0A000
unkown
page execute and read and write
270E3FB2000
trusted library allocation
page read and write
B1A02BE000
stack
page read and write
27746803000
trusted library allocation
page read and write
27746B64000
trusted library allocation
page read and write
36AF000
stack
page read and write
A14000
heap
page read and write
270E4B16000
trusted library allocation
page read and write
22C75000
heap
page read and write
277479CB000
trusted library allocation
page read and write
64A1000
heap
page read and write
409000
unkown
page write copy
270D6775000
trusted library allocation
page read and write
270DDAF7000
trusted library allocation
page read and write
270E21EE000
trusted library allocation
page read and write
2774399A000
trusted library allocation
page read and write
ECF000
heap
page read and write
2641000
heap
page read and write
64A1000
heap
page read and write
23838A31000
heap
page read and write
27746CB7000
trusted library allocation
page read and write
CA4000
heap
page read and write
2EC0000
direct allocation
page read and write
270CC721000
heap
page read and write
2EBE000
stack
page read and write
A14000
heap
page read and write
4B81000
direct allocation
page read and write
27743500000
heap
page read and write
4DB0000
trusted library allocation
page read and write
4C60000
direct allocation
page execute and read and write
270E232B000
trusted library allocation
page read and write
88BB000
stack
page read and write
2A30000
direct allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
27747200000
trusted library allocation
page read and write
2126000
heap
page read and write
27742EC3000
trusted library allocation
page read and write
B15000
heap
page read and write
A14000
heap
page read and write
9A0000
heap
page read and write
A15000
heap
page read and write
23838A32000
heap
page read and write
CA4000
heap
page read and write
2F3E000
stack
page read and write
E5A000
heap
page read and write
270CC601000
heap
page read and write
270E5C5D000
trusted library allocation
page read and write
270D616C000
trusted library allocation
page read and write
9D0000
heap
page read and write
DC1A1BC000
stack
page read and write
277466F2000
trusted library allocation
page read and write
4C30000
trusted library allocation
page read and write
F8A2A7E000
unkown
page readonly
270E4009000
trusted library allocation
page read and write
27747C75000
trusted library allocation
page read and write
A14000
heap
page read and write
270D6766000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
27748244000
trusted library allocation
page read and write
270DA682000
trusted library allocation
page read and write
270DC21B000
trusted library allocation
page read and write
270E0B1E000
trusted library allocation
page read and write
A14000
heap
page read and write
23C11FE000
stack
page read and write
270DA73B000
trusted library allocation
page read and write
4B40000
direct allocation
page execute and read and write
A14000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
661E000
stack
page read and write
A14000
heap
page read and write
2F67000
heap
page read and write
64A1000
heap
page read and write
270DB501000
trusted library allocation
page read and write
270DBDB5000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
27743D06000
trusted library allocation
page read and write
270DB930000
trusted library allocation
page read and write
A14000
heap
page read and write
218C000
heap
page read and write
277476CC000
trusted library allocation
page read and write
1580000
direct allocation
page read and write
CA4000
heap
page read and write
27742FD8000
trusted library allocation
page read and write
A14000
heap
page read and write
13D4000
heap
page read and write
A14000
heap
page read and write
270DAD8F000
trusted library allocation
page read and write
270E21B1000
trusted library allocation
page read and write
270DC974000
trusted library allocation
page read and write
4692000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
27743D80000
trusted library allocation
page read and write
443E000
stack
page read and write
270DA8B4000
trusted library allocation
page read and write
49F000
unkown
page execute and read and write
270DA8E0000
trusted library allocation
page read and write
16BBED1F000
trusted library allocation
page read and write
18F0000
heap
page read and write
7E0000
direct allocation
page read and write
CA5000
heap
page read and write
1CBD000
heap
page read and write
270D7CFB000
trusted library allocation
page read and write
54C000
unkown
page execute and read and write
158A7A70000
heap
page read and write
270DB7F2000
trusted library allocation
page read and write
270DA891000
trusted library allocation
page read and write
270E218F000
trusted library allocation
page read and write
277430A2000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
DB4000
heap
page read and write
A14000
heap
page read and write
270E4040000
trusted library allocation
page read and write
364F000
stack
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
7E0000
direct allocation
page read and write
A14000
heap
page read and write
2A2E000
stack
page read and write
2BFF000
stack
page read and write
27747C59000
trusted library allocation
page read and write
A15000
heap
page read and write
27746627000
trusted library allocation
page read and write
A14000
heap
page read and write
52F0000
direct allocation
page execute and read and write
4370000
direct allocation
page read and write
22C9D000
heap
page read and write
DC22FFB000
stack
page read and write
A15000
heap
page read and write
3BAF000
stack
page read and write
27743539000
heap
page read and write
64A1000
heap
page read and write
1954000
heap
page read and write
27746400000
trusted library allocation
page read and write
270E45A1000
trusted library allocation
page read and write
23837D77000
trusted library allocation
page read and write
277E8F3E000
trusted library allocation
page read and write
22C9D000
heap
page read and write
A14000
heap
page read and write
277471B5000
trusted library allocation
page read and write
270DC82E000
trusted library allocation
page read and write
27747B8B000
trusted library allocation
page read and write
A14000
heap
page read and write
270CC71A000
heap
page read and write
270DBF11000
trusted library allocation
page read and write
270DDAC2000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
270DA897000
trusted library allocation
page read and write
A14000
heap
page read and write
DB4000
heap
page read and write
3DBF000
stack
page read and write
4C3F000
stack
page read and write
270DC21A000
trusted library allocation
page read and write
2383898D000
heap
page read and write
CA4000
heap
page read and write
270DBF7E000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270CC70E000
heap
page read and write
4D1000
unkown
page execute and read and write
270C9890000
heap
page read and write
270DDB82000
trusted library allocation
page read and write
64A1000
heap
page read and write
4CB1000
heap
page read and write
2B4F000
stack
page read and write
27747C96000
trusted library allocation
page read and write
27747AA6000
trusted library allocation
page read and write
270DB460000
trusted library section
page read and write
A14000
heap
page read and write
27746B3D000
trusted library allocation
page read and write
64A1000
heap
page read and write
270CC621000
heap
page read and write
22C84000
heap
page read and write
270DCAE7000
trusted library allocation
page read and write
16BBED38000
trusted library allocation
page read and write
1294000
heap
page read and write
277461E5000
trusted library allocation
page read and write
33FE000
stack
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
4BEF000
stack
page read and write
27743B15000
trusted library allocation
page read and write
270DAEF3000
trusted library allocation
page read and write
277432D7000
trusted library allocation
page read and write
CA4000
heap
page read and write
270CC702000
heap
page read and write
A14000
heap
page read and write
270DA000000
trusted library allocation
page read and write
A14000
heap
page read and write
277437F1000
trusted library allocation
page read and write
270DA1D7000
trusted library allocation
page read and write
336E000
stack
page read and write
807000
unkown
page execute and write copy
27747223000
trusted library allocation
page read and write
270E401C000
trusted library allocation
page read and write
DB4000
heap
page read and write
270E6E6F000
trusted library allocation
page read and write
270E45C3000
trusted library allocation
page read and write
270E3FD5000
trusted library allocation
page read and write
64A1000
heap
page read and write
13D4000
heap
page read and write
B63000
heap
page read and write
270E227C000
trusted library allocation
page read and write
270DF02A000
trusted library allocation
page read and write
270D6726000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
440F000
stack
page read and write
2EAE000
stack
page read and write
27743743000
trusted library allocation
page read and write
1580000
direct allocation
page read and write
270DA762000
trusted library allocation
page read and write
A14000
heap
page read and write
270D68E1000
heap
page read and write
27748000000
trusted library allocation
page read and write
A14000
heap
page read and write
1C8CE000
stack
page read and write
270E22D9000
trusted library allocation
page read and write
270DCBB5000
trusted library allocation
page read and write
27743DA2000
trusted library allocation
page read and write
270D7C65000
trusted library allocation
page read and write
270E4B2C000
trusted library allocation
page read and write
CA4000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
270D7CFE000
trusted library allocation
page read and write
49A0000
direct allocation
page execute and read and write
270E4129000
trusted library allocation
page read and write
244C000
unkown
page readonly
270DB883000
trusted library allocation
page read and write
238389A0000
heap
page read and write
1954000
heap
page read and write
270D6D73000
trusted library allocation
page read and write
35AF000
stack
page read and write
27747B9B000
trusted library allocation
page read and write
A15000
heap
page read and write
27745E57000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
63E000
unkown
page execute and read and write
A14000
heap
page read and write
41CE000
stack
page read and write
2EED000
heap
page read and write
2774308C000
trusted library allocation
page read and write
277E8D10000
trusted library allocation
page read and write
22C75000
heap
page read and write
564000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
27748213000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
19C4000
heap
page read and write
270DCF00000
trusted library allocation
page read and write
27747BFD000
trusted library allocation
page read and write
27747DE0000
trusted library section
page read and write
33EE000
stack
page read and write
CA4000
heap
page read and write
1FFA000
heap
page read and write
27743176000
trusted library allocation
page read and write
270E4488000
trusted library allocation
page read and write
A14000
heap
page read and write
270DA8CB000
trusted library allocation
page read and write
A14000
heap
page read and write
270DBF8A000
trusted library allocation
page read and write
270D8B35000
trusted library allocation
page read and write
27742ECB000
trusted library allocation
page read and write
4AAF000
stack
page read and write
27747A3B000
trusted library allocation
page read and write
A14000
heap
page read and write
5180000
direct allocation
page execute and read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
1A1E000
stack
page read and write
A15000
heap
page read and write
CA4000
heap
page read and write
270DBE03000
trusted library allocation
page read and write
270DB6EC000
trusted library allocation
page read and write
64A1000
heap
page read and write
27747C83000
trusted library allocation
page read and write
27746240000
trusted library allocation
page read and write
270DAF13000
trusted library allocation
page read and write
270E2100000
trusted library allocation
page read and write
DC191BB000
stack
page read and write
A14000
heap
page read and write
27747CF4000
trusted library allocation
page read and write
B72000
heap
page read and write
270E23A2000
trusted library allocation
page read and write
64A1000
heap
page read and write
DC211FD000
stack
page read and write
A14000
heap
page read and write
1954000
heap
page read and write
4E24000
direct allocation
page execute and read and write
64A1000
heap
page read and write
4370000
direct allocation
page read and write
2383899C000
heap
page read and write
64A1000
heap
page read and write
270DB601000
trusted library allocation
page read and write
27746FA9000
trusted library allocation
page read and write
66D000
unkown
page execute and read and write
27748233000
trusted library allocation
page read and write
270DCBA0000
trusted library allocation
page read and write
27747103000
trusted library allocation
page read and write
270E3A12000
trusted library allocation
page read and write
7050000
heap
page read and write
1410000
direct allocation
page read and write
64A1000
heap
page read and write
423000
unkown
page readonly
3D2F000
stack
page read and write
270DB85A000
trusted library allocation
page read and write
27747A9F000
trusted library allocation
page read and write
270E45EC000
trusted library allocation
page read and write
4B30000
direct allocation
page execute and read and write
64A1000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
22C77000
heap
page read and write
270DA003000
trusted library allocation
page read and write
277368D7000
trusted library allocation
page read and write
277513C9000
trusted library allocation
page read and write
3DAF000
stack
page read and write
27748222000
trusted library allocation
page read and write
270D6580000
trusted library section
page read and write
27746F03000
trusted library allocation
page read and write
42CF000
stack
page read and write
A15000
heap
page read and write
270C99C0000
heap
page read and write
270E412F000
trusted library allocation
page read and write
333E000
stack
page read and write
27742F67000
trusted library allocation
page read and write
27747BDF000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
A14000
heap
page read and write
27743BFD000
trusted library allocation
page read and write
27746114000
trusted library allocation
page read and write
251D000
heap
page execute and read and write
F12000
heap
page read and write
64A1000
heap
page read and write
B1A05FE000
stack
page read and write
277381B0000
trusted library section
page read and write
270CC70E000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270CC721000
heap
page read and write
401000
unkown
page execute read
27748028000
trusted library allocation
page read and write
270DA982000
trusted library allocation
page read and write
270DA8D6000
trusted library allocation
page read and write
64A1000
heap
page read and write
270D7EC3000
trusted library allocation
page read and write
23F82311000
trusted library allocation
page execute read
270DA6A1000
trusted library allocation
page read and write
27744822000
trusted library allocation
page read and write
270CC6E1000
heap
page read and write
270E3F3C000
trusted library allocation
page read and write
64A1000
heap
page read and write
270D6CD8000
trusted library allocation
page read and write
564000
heap
page read and write
27747F51000
trusted library allocation
page read and write
270DBDB9000
trusted library allocation
page read and write
A15000
heap
page read and write
277389AB000
trusted library allocation
page read and write
27747BCC000
trusted library allocation
page read and write
A14000
heap
page read and write
27747B8D000
trusted library allocation
page read and write
27746E51000
trusted library allocation
page read and write
AEF000
heap
page read and write
64A1000
heap
page read and write
270DBF58000
trusted library allocation
page read and write
270D61DF000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DA600000
trusted library allocation
page read and write
64A1000
heap
page read and write
27746D7A000
trusted library allocation
page read and write
CA4000
heap
page read and write
64A1000
heap
page read and write
270DF000000
trusted library allocation
page read and write
270E0B2E000
trusted library allocation
page read and write
270E45AE000
trusted library allocation
page read and write
B1A2FFE000
stack
page read and write
16BBE80A000
heap
page read and write
23838A2F000
heap
page read and write
27747B8D000
trusted library allocation
page read and write
277E8A10000
heap
page read and write
4D31000
heap
page read and write
362F000
stack
page read and write
1F3F000
heap
page read and write
1954000
heap
page read and write
277466EF000
trusted library allocation
page read and write
270DA9EF000
trusted library allocation
page read and write
5A0000
heap
page read and write
378F000
stack
page read and write
23837D68000
trusted library allocation
page read and write
272DA100000
trusted library section
page readonly
DB4000
heap
page read and write
2F50000
direct allocation
page read and write
13D4000
heap
page read and write
23837930000
heap
page read and write
4D31000
heap
page read and write
270E4047000
trusted library allocation
page read and write
4B31000
heap
page read and write
270CC70F000
heap
page read and write
270DF00C000
trusted library allocation
page read and write
5320000
direct allocation
page execute and read and write
270E4061000
trusted library allocation
page read and write
13D4000
heap
page read and write
3A6F000
stack
page read and write
27747C80000
trusted library allocation
page read and write
64A1000
heap
page read and write
6A61000
heap
page read and write
22C7D000
heap
page read and write
270E4500000
trusted library allocation
page read and write
A14000
heap
page read and write
270D81B0000
trusted library section
page readonly
238389DC000
heap
page read and write
4B20000
direct allocation
page read and write
B57000
heap
page read and write
12CD02404000
trusted library allocation
page read and write
270DCBD1000
trusted library allocation
page read and write
2774714B000
trusted library allocation
page read and write
38C000
unkown
page execute and read and write
277471FA000
trusted library allocation
page read and write
69147DE000
stack
page read and write
546E000
stack
page read and write
270DC84D000
trusted library allocation
page read and write
270E233A000
trusted library allocation
page read and write
64A1000
heap
page read and write
22C5B000
heap
page read and write
16BBEB66000
trusted library allocation
page read and write
270DA865000
trusted library allocation
page read and write
64A1000
heap
page read and write
5150000
direct allocation
page execute and read and write
270E2372000
trusted library allocation
page read and write
270E3FAB000
trusted library allocation
page read and write
A14000
heap
page read and write
51C0000
direct allocation
page execute and read and write
270E4537000
trusted library allocation
page read and write
DB4000
heap
page read and write
4D31000
heap
page read and write
270DA5D4000
trusted library allocation
page read and write
37BE000
stack
page read and write
A14000
heap
page read and write
23837B00000
heap
page read and write
270DDB0C000
trusted library allocation
page read and write
A14000
heap
page read and write
270DB861000
trusted library allocation
page read and write
A14000
heap
page read and write
270DA15F000
trusted library allocation
page read and write
22C50000
heap
page read and write
D10000
direct allocation
page read and write
270DB024000
trusted library allocation
page read and write
A14000
heap
page read and write
2545000
heap
page read and write
A14000
heap
page read and write
27748224000
trusted library allocation
page read and write
270DBF4C000
trusted library allocation
page read and write
DC1A30C000
stack
page read and write
270DC7F8000
trusted library allocation
page read and write
182F000
stack
page read and write
526F000
stack
page read and write
A14000
heap
page read and write
27748100000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270D7C73000
trusted library allocation
page read and write
27750ADA000
trusted library allocation
page read and write
A14000
heap
page read and write
270DBF97000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270DDB42000
trusted library allocation
page read and write
22C69000
heap
page read and write
270DB6CE000
trusted library allocation
page read and write
27738948000
trusted library allocation
page read and write
27742EDF000
trusted library allocation
page read and write
64A1000
heap
page read and write
7E0000
direct allocation
page read and write
270DA593000
trusted library allocation
page read and write
EC0000
direct allocation
page execute and read and write
CA4000
heap
page read and write
270DDA9D000
trusted library allocation
page read and write
327F000
stack
page read and write
270DA2BE000
trusted library allocation
page read and write
58B000
stack
page read and write
270DC835000
trusted library allocation
page read and write
439F000
stack
page read and write
64A1000
heap
page read and write
27748203000
trusted library allocation
page read and write
277388F4000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
27747BA5000
trusted library allocation
page read and write
270DC56B000
trusted library allocation
page read and write
4B20000
direct allocation
page read and write
277E8A70000
heap
page readonly
270E21BB000
trusted library allocation
page read and write
270D6034000
trusted library allocation
page read and write
64A1000
heap
page read and write
CA4000
heap
page read and write
270E44FD000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DC8CD000
trusted library allocation
page read and write
373F000
stack
page read and write
64A1000
heap
page read and write
E3B000
stack
page read and write
4D31000
heap
page read and write
270DA2A8000
trusted library allocation
page read and write
27743BE8000
trusted library allocation
page read and write
277470F8000
trusted library allocation
page read and write
66E000
unkown
page execute and write copy
270DA2CD000
trusted library allocation
page read and write
27746951000
trusted library allocation
page read and write
13D4000
heap
page read and write
270DBFB2000
trusted library allocation
page read and write
28CC0000
heap
page read and write
6C5A0000
unkown
page readonly
A14000
heap
page read and write
A14000
heap
page read and write
B1A87FE000
stack
page read and write
353E000
stack
page read and write
270DB234000
trusted library allocation
page read and write
270DC8AA000
trusted library allocation
page read and write
270DCB99000
trusted library allocation
page read and write
13D4000
heap
page read and write
64A1000
heap
page read and write
23838A3C000
heap
page read and write
1954000
heap
page read and write
270DB5FB000
trusted library allocation
page read and write
392F000
stack
page read and write
27747B6D000
trusted library allocation
page read and write
64A1000
heap
page read and write
27747953000
trusted library allocation
page read and write
1954000
heap
page read and write
27748244000
trusted library allocation
page read and write
2E21BBD04000
trusted library allocation
page read and write
4F10000
direct allocation
page execute and read and write
4D31000
heap
page read and write
270DA8D6000
trusted library allocation
page read and write
13D4000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
30E187A04000
trusted library allocation
page read and write
27747B51000
trusted library allocation
page read and write
27747303000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
346F000
stack
page read and write
A14000
heap
page read and write
270E23AD000
trusted library allocation
page read and write
360E000
stack
page read and write
64A1000
heap
page read and write
270E45DB000
trusted library allocation
page read and write
277E8D23000
trusted library allocation
page read and write
270DC60C000
trusted library allocation
page read and write
27747B9B000
trusted library allocation
page read and write
1D82000
heap
page read and write
64A1000
heap
page read and write
270E4332000
trusted library allocation
page read and write
10FD000
stack
page read and write
27747BC5000
trusted library allocation
page read and write
B1A893F000
stack
page read and write
A14000
heap
page read and write
4C90000
direct allocation
page execute and read and write
64A1000
heap
page read and write
23838A28000
heap
page read and write
270DC4FD000
unclassified section
page read and write
270DA5BB000
trusted library allocation
page read and write
23837BA2000
unkown
page execute read
64A1000
heap
page read and write
270D618A000
trusted library allocation
page read and write
27742E03000
trusted library allocation
page read and write
A14000
heap
page read and write
6065000
heap
page read and write
A14000
heap
page read and write
270E44FD000
trusted library allocation
page read and write
334F000
stack
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
270DC81C000
trusted library allocation
page read and write
270DDA03000
trusted library allocation
page read and write
64A1000
heap
page read and write
270D8B00000
trusted library allocation
page read and write
34CE000
stack
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
4D31000
heap
page read and write
270E45DA000
trusted library allocation
page read and write
277460BB000
trusted library allocation
page read and write
64A1000
heap
page read and write
A15000
heap
page read and write
27745EDA000
trusted library allocation
page read and write
270E22DB000
trusted library allocation
page read and write
DB4000
heap
page read and write
27747A3B000
trusted library allocation
page read and write
270DB08F000
trusted library allocation
page read and write
27743CC9000
trusted library allocation
page read and write
270CC70E000
heap
page read and write
CA4000
heap
page read and write
64A1000
heap
page read and write
65E000
unkown
page execute and read and write
270DB2B0000
trusted library allocation
page read and write
277471AE000
trusted library allocation
page read and write
277476DF000
trusted library allocation
page read and write
A15000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
4B20000
direct allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
277474F9000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270DCBBC000
trusted library allocation
page read and write
270DCB22000
trusted library allocation
page read and write
270D8B21000
trusted library allocation
page read and write
4D31000
heap
page read and write
64A1000
heap
page read and write
4B31000
heap
page read and write
270DA584000
trusted library allocation
page read and write
2774652A000
trusted library allocation
page read and write
27743DB0000
trusted library allocation
page read and write
27748285000
trusted library allocation
page read and write
A14000
heap
page read and write
270DA5E7000
trusted library allocation
page read and write
A15000
heap
page read and write
495F000
stack
page read and write
2774797B000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
28D0E000
heap
page read and write
A15000
heap
page read and write
64A1000
heap
page read and write
19C4000
heap
page read and write
270DBF63000
trusted library allocation
page read and write
A14000
heap
page read and write
19C4000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
11DB000
heap
page read and write
A15000
heap
page read and write
270DA73B000
trusted library allocation
page read and write
A14000
heap
page read and write
4B31000
heap
page read and write
23838A3C000
heap
page read and write
A14000
heap
page read and write
27742F5A000
trusted library allocation
page read and write
A14000
heap
page read and write
4B31000
heap
page read and write
27747FC5000
trusted library allocation
page read and write
5370000
direct allocation
page execute and read and write
270DDAF0000
trusted library allocation
page read and write
158A7AF2000
heap
page read and write
270DA900000
trusted library allocation
page read and write
4D31000
heap
page read and write
270DDAC7000
trusted library allocation
page read and write
64A1000
heap
page read and write
27747EC9000
trusted library allocation
page read and write
A14000
heap
page read and write
277E8E40000
unclassified section
page readonly
64A1000
heap
page read and write
A14000
heap
page read and write
43FF000
stack
page read and write
27747EBE000
trusted library allocation
page read and write
4B31000
heap
page read and write
27747AC0000
trusted library allocation
page read and write
270E235D000
trusted library allocation
page read and write
2EE7000
heap
page read and write
270C98B0000
heap
page read and write
64A1000
heap
page read and write
270E22DF000
trusted library allocation
page read and write
D80000
direct allocation
page read and write
27748224000
trusted library allocation
page read and write
270E4116000
trusted library allocation
page read and write
A14000
heap
page read and write
270DDAAA000
trusted library allocation
page read and write
A14000
heap
page read and write
2C8E000
stack
page read and write
23838AB9000
heap
page read and write
16BBE790000
heap
page read and write
2774693C000
trusted library allocation
page read and write
4D31000
heap
page read and write
22C7C000
heap
page read and write
270D7C8B000
trusted library allocation
page read and write
158A953F000
heap
page read and write
277E8AEA000
heap
page read and write
277E8F19000
trusted library allocation
page read and write
277438A0000
trusted library allocation
page read and write
270DB87E000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
5AD000
unkown
page execute and read and write
B4E000
heap
page read and write
270E45D9000
trusted library allocation
page read and write
2774611E000
trusted library allocation
page read and write
DC1E3FE000
stack
page read and write
5350000
direct allocation
page execute and read and write
27746903000
trusted library allocation
page read and write
270CC721000
heap
page read and write
63E000
unkown
page execute and read and write
27743EBF000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
2773890B000
trusted library allocation
page read and write
64A1000
heap
page read and write
30E187A3A000
trusted library allocation
page read and write
270D8BD9000
trusted library allocation
page read and write
64A1000
heap
page read and write
4501000
heap
page read and write
DC1C5F3000
stack
page read and write
270CC5E7000
heap
page read and write
CA0000
heap
page read and write
14A6E167000
heap
page read and write
311000
unkown
page execute and read and write
270C98E0000
trusted library allocation
page read and write
A15000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
6916AFE000
unkown
page readonly
270DBF2D000
trusted library allocation
page read and write
27747F78000
trusted library allocation
page read and write
43C000
stack
page read and write
270CC70A000
heap
page read and write
270E1E00000
trusted library allocation
page read and write
7F2E000
stack
page read and write
270DC5B8000
trusted library allocation
page read and write
4CB0000
direct allocation
page execute and read and write
35201000
heap
page read and write
270E45F1000
trusted library allocation
page read and write
64A1000
heap
page read and write
27748303000
trusted library allocation
page read and write
23837EC4000
heap
page read and write
270DA8BC000
trusted library allocation
page read and write
27743969000
trusted library allocation
page read and write
5340000
direct allocation
page execute and read and write
64A1000
heap
page read and write
270D66FB000
trusted library allocation
page read and write
270D840D000
trusted library allocation
page read and write
64A1000
heap
page read and write
59AD000
stack
page read and write
64A1000
heap
page read and write
270E2200000
trusted library allocation
page read and write
270D66F8000
trusted library allocation
page read and write
270E5CCB000
trusted library allocation
page read and write
4CD0000
direct allocation
page execute and read and write
2AFE000
stack
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
1590000
heap
page read and write
270DA12A000
trusted library allocation
page read and write
A14000
heap
page read and write
270C97A0000
heap
page read and write
A14000
heap
page read and write
3AEE000
stack
page read and write
270E5C8B000
trusted library allocation
page read and write
270E4491000
trusted library allocation
page read and write
CA4000
heap
page read and write
270E0100000
trusted library allocation
page read and write
270E3FF4000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
27743CD8000
trusted library allocation
page read and write
270D68D5000
heap
page read and write
16BBEB6E000
trusted library allocation
page read and write
4370000
direct allocation
page read and write
6AE000
unkown
page execute and write copy
27743279000
trusted library allocation
page read and write
422F000
stack
page read and write
270E23C8000
trusted library allocation
page read and write
A14000
heap
page read and write
25C7000
heap
page read and write
22C75000
heap
page read and write
5320000
direct allocation
page execute and read and write
270CC718000
heap
page read and write
C00000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
16BBEB81000
trusted library allocation
page read and write
A14000
heap
page read and write
27746700000
trusted library allocation
page read and write
64A1000
heap
page read and write
27743C41000
trusted library allocation
page read and write
27747AA8000
trusted library allocation
page read and write
263FFD0A000
trusted library allocation
page read and write
270E3DCD000
trusted library allocation
page read and write
2774768C000
trusted library allocation
page read and write
CA4000
heap
page read and write
4B00000
direct allocation
page execute and read and write
27746E13000
trusted library allocation
page read and write
27738263000
heap
page read and write
270DBF75000
trusted library allocation
page read and write
270DBF00000
trusted library allocation
page read and write
287E000
stack
page read and write
64A1000
heap
page read and write
270E45AE000
trusted library allocation
page read and write
49D0000
direct allocation
page execute and read and write
270D6703000
trusted library allocation
page read and write
3A0000
unkown
page readonly
A14000
heap
page read and write
DB4000
heap
page read and write
55AE000
stack
page read and write
418F000
stack
page read and write
64A1000
heap
page read and write
27746DE2000
trusted library allocation
page read and write
27748077000
trusted library allocation
page read and write
2243000
heap
page read and write
64A1000
heap
page read and write
CA4000
heap
page read and write
14A6E140000
heap
page read and write
4D31000
heap
page read and write
270E22E1000
trusted library allocation
page read and write
270DB0F4000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
5050000
trusted library allocation
page read and write
A14000
heap
page read and write
CA4000
heap
page read and write
A14000
heap
page read and write
27746A00000
trusted library allocation
page read and write
A14000
heap
page read and write
16BBEBC8000
trusted library allocation
page read and write
64A1000
heap
page read and write
27746600000
trusted library allocation
page read and write
27746900000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DA8D6000
trusted library allocation
page read and write
27747B72000
trusted library allocation
page read and write
2013000
heap
page read and write
4A6E000
stack
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
270DA8CB000
trusted library allocation
page read and write
72939FC000
stack
page read and write
64A1000
heap
page read and write
270E239B000
trusted library allocation
page read and write
A14000
heap
page read and write
270D8B2E000
trusted library allocation
page read and write
270E22A5000
trusted library allocation
page read and write
270CC64E000
heap
page read and write
27742EB3000
trusted library allocation
page read and write
1950000
heap
page read and write
270DA88F000
trusted library allocation
page read and write
1C92E000
stack
page read and write
27743864000
trusted library allocation
page read and write
DC203FB000
stack
page read and write
40D0000
direct allocation
page read and write
27744C6A000
trusted library allocation
page read and write
270E4182000
trusted library allocation
page read and write
A14000
heap
page read and write
1C630000
heap
page read and write
27747B72000
trusted library allocation
page read and write
847000
unkown
page execute and write copy
DC1A34E000
stack
page read and write
270DBF63000
trusted library allocation
page read and write
DC1A17D000
stack
page read and write
A14000
heap
page read and write
270DC87E000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
40B000
unkown
page execute and read and write
A5E000
stack
page read and write
64A1000
heap
page read and write
72941FF000
stack
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
158A7AC0000
heap
page read and write
27747B72000
trusted library allocation
page read and write
4CA0000
direct allocation
page execute and read and write
64A1000
heap
page read and write
270DA6CA000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
1294000
heap
page read and write
64A1000
heap
page read and write
270E232E000
trusted library allocation
page read and write
23837BD0000
heap
page read and write
19D0000
heap
page read and write
270E20DE000
trusted library allocation
page read and write
270DA636000
trusted library allocation
page read and write
27748285000
trusted library allocation
page read and write
270E3FFB000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E45D9000
trusted library allocation
page read and write
9F0000
heap
page read and write
277432A4000
trusted library allocation
page read and write
270DA8C4000
trusted library allocation
page read and write
ADA000
heap
page read and write
64A1000
heap
page read and write
22C7D000
heap
page read and write
A14000
heap
page read and write
27747040000
trusted library allocation
page read and write
27746B9F000
trusted library allocation
page read and write
4D31000
heap
page read and write
16BBE940000
unclassified section
page readonly
270E5C03000
trusted library allocation
page read and write
DC1CA3B000
stack
page read and write
829AFD8000
stack
page read and write
1CAA0000
heap
page read and write
A14000
heap
page read and write
270DC2F1000
trusted library allocation
page read and write
13D4000
heap
page read and write
AEF000
heap
page read and write
1954000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
27746241000
trusted library allocation
page read and write
270DB5FE000
trusted library allocation
page read and write
270DA516000
trusted library allocation
page read and write
A14000
heap
page read and write
270D6C09000
trusted library allocation
page read and write
6AD000
unkown
page execute and read and write
270DA66D000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DC7DA000
trusted library allocation
page read and write
27745DB0000
trusted library section
page readonly
270DA874000
trusted library allocation
page read and write
A14000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
A14000
heap
page read and write
27747193000
trusted library allocation
page read and write
4B30000
heap
page read and write
4CB1000
heap
page read and write
27743251000
trusted library allocation
page read and write
19C000
stack
page read and write
27742E90000
trusted library allocation
page read and write
270D7900000
trusted library allocation
page read and write
270C9930000
heap
page read and write
426E000
stack
page read and write
23838516000
trusted library allocation
page read and write
A14000
heap
page read and write
500C000
stack
page read and write
270DC75C000
trusted library allocation
page read and write
A15000
heap
page read and write
270DC805000
trusted library allocation
page read and write
27747A73000
trusted library allocation
page read and write
A14000
heap
page read and write
27743282000
trusted library allocation
page read and write
4BAE000
stack
page read and write
270DA739000
trusted library allocation
page read and write
DC20FFD000
stack
page read and write
64A1000
heap
page read and write
270E2033000
trusted library allocation
page read and write
270DDC03000
trusted library allocation
page read and write
270DBF14000
trusted library allocation
page read and write
270DA762000
trusted library allocation
page read and write
DC215FD000
stack
page read and write
A14000
heap
page read and write
270E234C000
trusted library allocation
page read and write
270DB707000
trusted library allocation
page read and write
270DB09F000
trusted library allocation
page read and write
A15000
heap
page read and write
6916A77000
stack
page read and write
A14000
heap
page read and write
7E04000
heap
page read and write
F1B000
heap
page read and write
B1A1FFE000
stack
page read and write
27745FFA000
trusted library allocation
page read and write
27746B7B000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
1C91E000
stack
page read and write
270DA6A1000
trusted library allocation
page read and write
2720000
direct allocation
page read and write
270DC960000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270DDBA5000
trusted library allocation
page read and write
270DA603000
trusted library allocation
page read and write
270E41AA000
trusted library allocation
page read and write
27746FAF000
trusted library allocation
page read and write
270E41EB000
trusted library allocation
page read and write
270E459F000
trusted library allocation
page read and write
22D9000
heap
page read and write
B1A7FFE000
stack
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270E440E000
trusted library allocation
page read and write
4D31000
heap
page read and write
64A1000
heap
page read and write
42EE000
stack
page read and write
A14000
heap
page read and write
270D6186000
trusted library allocation
page read and write
270D6700000
trusted library allocation
page read and write
A14000
heap
page read and write
270DBF03000
trusted library allocation
page read and write
12CD0241E000
trusted library allocation
page read and write
270CC6A3000
heap
page read and write
DC1DBFE000
stack
page read and write
B1A88FC000
stack
page read and write
270E4511000
trusted library allocation
page read and write
F31000
heap
page read and write
CA4000
heap
page read and write
270E405C000
trusted library allocation
page read and write
277E8A90000
heap
page read and write
277476C6000
trusted library allocation
page read and write
4CE0000
direct allocation
page execute and read and write
A14000
heap
page read and write
27736800000
trusted library allocation
page read and write
4D31000
heap
page read and write
14A6E280000
heap
page read and write
270CC70A000
heap
page read and write
1294000
heap
page read and write
A14000
heap
page read and write
27744C03000
trusted library allocation
page read and write
4C30000
heap
page read and write
270E5CCB000
trusted library allocation
page read and write
4FC0000
direct allocation
page read and write
DC1EBFF000
stack
page read and write
270DB803000
trusted library allocation
page read and write
A14000
heap
page read and write
4F9000
unkown
page execute and write copy
1124EA00000
trusted library allocation
page read and write
CA4000
heap
page read and write
270E4183000
trusted library allocation
page read and write
417F000
stack
page read and write
4B31000
heap
page read and write
4C4000
unkown
page execute and read and write
27747523000
trusted library allocation
page read and write
27746B7B000
trusted library allocation
page read and write
A14000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
270E4B20000
trusted library allocation
page read and write
270E4186000
trusted library allocation
page read and write
270DADC2000
trusted library allocation
page read and write
18EE000
stack
page read and write
23838A3C000
heap
page read and write
A14000
heap
page read and write
27743C45000
trusted library allocation
page read and write
238389AC000
heap
page read and write
64A1000
heap
page read and write
270E40DA000
trusted library allocation
page read and write
3D4F000
stack
page read and write
D10000
direct allocation
page read and write
277385C0000
trusted library section
page read and write
64A1000
heap
page read and write
2774312F000
trusted library allocation
page read and write
2E6C000
stack
page read and write
270DA8BC000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
23837D61000
trusted library allocation
page read and write
A14000
heap
page read and write
270DCB97000
trusted library allocation
page read and write
27742F81000
trusted library allocation
page read and write
A14000
heap
page read and write
270E2316000
trusted library allocation
page read and write
277364A0000
heap
page read and write
27746340000
trusted library allocation
page read and write
277480A5000
trusted library allocation
page read and write
829A5CB000
stack
page read and write
A14000
heap
page read and write
27747634000
trusted library allocation
page read and write
66AA000
heap
page read and write
27746BEE000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270DB7C7000
trusted library allocation
page read and write
27743215000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
270E3F03000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
F70000
heap
page read and write
64A1000
heap
page read and write
270DB000000
trusted library allocation
page read and write
27746B00000
trusted library allocation
page read and write
B79000
heap
page read and write
A14000
heap
page read and write
270DA2C9000
trusted library allocation
page read and write
A14000
heap
page read and write
6917B7E000
stack
page read and write
1C64F000
stack
page read and write
270DA5AE000
trusted library allocation
page read and write
A14000
heap
page read and write
2774812B000
trusted library allocation
page read and write
F8A3C7E000
unkown
page readonly
270DCBBF000
trusted library allocation
page read and write
AF4000
unkown
page execute and read and write
23838A2F000
heap
page read and write
261C000
heap
page read and write
DC1CBBF000
stack
page read and write
270DC61F000
trusted library allocation
page read and write
263FFCB0000
heap
page read and write
64A1000
heap
page read and write
27745EC9000
trusted library allocation
page read and write
270E21F0000
trusted library allocation
page read and write
64A1000
heap
page read and write
270CC703000
heap
page read and write
A14000
heap
page read and write
277476D8000
trusted library allocation
page read and write
A15000
heap
page read and write
270D7EDC000
trusted library allocation
page read and write
B1A8B3A000
stack
page read and write
270DAC31000
trusted library allocation
page read and write
270DB289000
trusted library allocation
page read and write
DC1A03E000
stack
page read and write
6AE000
unkown
page execute and write copy
270DB203000
trusted library allocation
page read and write
64A1000
heap
page read and write
27747CF7000
trusted library allocation
page read and write
A14000
heap
page read and write
CA4000
heap
page read and write
1410000
direct allocation
page read and write
27746503000
trusted library allocation
page read and write
27747BDA000
trusted library allocation
page read and write
270DC4F2000
unclassified section
page read and write
270D7EDE000
trusted library allocation
page read and write
270C9940000
heap
page read and write
270E441E000
trusted library allocation
page read and write
23F822E1000
trusted library allocation
page execute read
4B31000
heap
page read and write
64A1000
heap
page read and write
27747F00000
trusted library allocation
page read and write
277E89F0000
heap
page read and write
27743FE0000
trusted library section
page readonly
35FF000
stack
page read and write
142B000
heap
page read and write
3AAE000
stack
page read and write
277513BF000
trusted library allocation
page read and write
A14000
heap
page read and write
270D8B69000
trusted library allocation
page read and write
B71000
heap
page read and write
A14000
heap
page read and write
D3C000
stack
page read and write
270E2141000
trusted library allocation
page read and write
2774FF00000
trusted library allocation
page read and write
27744100000
trusted library allocation
page read and write
48EF000
stack
page read and write
270DA5D6000
trusted library allocation
page read and write
27745E19000
trusted library allocation
page read and write
270E4B32000
trusted library allocation
page read and write
270DC2F5000
trusted library allocation
page read and write
16BBEB23000
trusted library allocation
page read and write
CA4000
heap
page read and write
5CD0000
heap
page read and write
277439FD000
trusted library allocation
page read and write
5320000
direct allocation
page execute and read and write
270DDA33000
trusted library allocation
page read and write
27750F00000
trusted library allocation
page read and write
270C98B5000
heap
page read and write
A15000
heap
page read and write
2A30000
direct allocation
page read and write
3A0000
unkown
page read and write
413F000
stack
page read and write
6CE000
heap
page read and write
34BF000
stack
page read and write
A14000
heap
page read and write
F1A000
heap
page read and write
A14000
heap
page read and write
23838AB7000
heap
page read and write
270E239C000
trusted library allocation
page read and write
270E21B6000
trusted library allocation
page read and write
1C35F000
stack
page read and write
270CC70F000
heap
page read and write
A14000
heap
page read and write
270DA69B000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DCB53000
trusted library allocation
page read and write
270E22E7000
trusted library allocation
page read and write
DB4000
heap
page read and write
64A1000
heap
page read and write
270E417F000
trusted library allocation
page read and write
CA4000
heap
page read and write
A14000
heap
page read and write
1410000
direct allocation
page read and write
23838A6A000
heap
page read and write
40AE000
stack
page read and write
64A1000
heap
page read and write
28D28000
heap
page read and write
402F000
stack
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270DBF7C000
trusted library allocation
page read and write
4B31000
heap
page read and write
2566000
heap
page read and write
64A1000
heap
page read and write
19C4000
heap
page read and write
270DC8CD000
trusted library allocation
page read and write
4D40000
heap
page read and write
64A1000
heap
page read and write
270CC727000
heap
page read and write
571E000
stack
page read and write
382F000
stack
page read and write
A14000
heap
page read and write
270D7C7B000
trusted library allocation
page read and write
270DC29E000
trusted library allocation
page read and write
350F000
stack
page read and write
A14000
heap
page read and write
516000
unkown
page execute and read and write
4B31000
heap
page read and write
33BF000
stack
page read and write
442E000
stack
page read and write
A14000
heap
page read and write
277388E5000
trusted library allocation
page read and write
277368EE000
trusted library allocation
page read and write
409000
unkown
page read and write
CA4000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
A14000
heap
page read and write
64A1000
heap
page read and write
122F000
heap
page read and write
64A1000
heap
page read and write
270E5C43000
trusted library allocation
page read and write
16BBF140000
heap
page read and write
22C61000
heap
page read and write
194000
stack
page read and write
27748400000
trusted library allocation
page read and write
27742F0C000
trusted library allocation
page read and write
A14000
heap
page read and write
13AE000
stack
page read and write
1E58000
heap
page read and write
A14000
heap
page read and write
277E8D95000
trusted library allocation
page read and write
64A1000
heap
page read and write
27736480000
unclassified section
page readonly
E50000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
277483D7000
trusted library allocation
page read and write
270E20E6000
trusted library allocation
page read and write
A14000
heap
page read and write
B79000
heap
page read and write
270E6E7A000
trusted library allocation
page read and write
49E1000
direct allocation
page read and write
1C17000
heap
page read and write
290F000
stack
page read and write
270E0B00000
trusted library allocation
page read and write
270CC716000
heap
page read and write
27742F2B000
trusted library allocation
page read and write
19C4000
heap
page read and write
270E4332000
trusted library allocation
page read and write
270D7EDE000
trusted library allocation
page read and write
486E000
stack
page read and write
4CB0000
direct allocation
page execute and read and write
64A1000
heap
page read and write
1570000
heap
page read and write
270D7B00000
heap
page read and write
270DC2B3000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DC26C000
trusted library allocation
page read and write
2774636B000
trusted library allocation
page read and write
270D6C68000
trusted library allocation
page read and write
270E456C000
trusted library allocation
page read and write
270DA766000
trusted library allocation
page read and write
64A1000
heap
page read and write
3E0E000
stack
page read and write
270E4B26000
trusted library allocation
page read and write
64A1000
heap
page read and write
27743103000
trusted library allocation
page read and write
B1A5FFE000
stack
page read and write
13D4000
heap
page read and write
270E21B3000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
270DCBC9000
trusted library allocation
page read and write
270DA7C4000
trusted library allocation
page read and write
4370000
direct allocation
page read and write
270D68D9000
heap
page read and write
270E5C92000
trusted library allocation
page read and write
270DB038000
trusted library allocation
page read and write
270DA8CB000
trusted library allocation
page read and write
27747BA8000
trusted library allocation
page read and write
16BBEBA4000
trusted library allocation
page read and write
27742ECB000
trusted library allocation
page read and write
270DC77B000
trusted library allocation
page read and write
B1A47EE000
stack
page read and write
270C9990000
heap
page read and write
277E8D03000
trusted library allocation
page read and write
30FF000
stack
page read and write
423000
unkown
page readonly
270DA67D000
trusted library allocation
page read and write
DC1C7F3000
stack
page read and write
270E0104000
trusted library allocation
page read and write
64A1000
heap
page read and write
7F0000
unkown
page read and write
B84000
unkown
page execute and read and write
4E24000
direct allocation
page execute and read and write
270E22DD000
trusted library allocation
page read and write
270D7BB0000
trusted library section
page readonly
B19F588000
stack
page read and write
492E000
stack
page read and write
270DA69B000
trusted library allocation
page read and write
270DB23A000
trusted library allocation
page read and write
270E416D000
trusted library allocation
page read and write
270DA897000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270E5CF7000
trusted library allocation
page read and write
4C20000
trusted library allocation
page read and write
3FCF000
stack
page read and write
6678000
heap
page read and write
270E22E1000
trusted library allocation
page read and write
64A1000
heap
page read and write
64B0000
heap
page read and write
4B31000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270DB0AA000
trusted library allocation
page read and write
270DCBD4000
trusted library allocation
page read and write
B84000
unkown
page execute and read and write
A14000
heap
page read and write
40C0000
direct allocation
page execute and read and write
A14000
heap
page read and write
27738916000
trusted library allocation
page read and write
277476C6000
trusted library allocation
page read and write
277388DB000
trusted library allocation
page read and write
27745ED9000
trusted library allocation
page read and write
270DB7D6000
trusted library allocation
page read and write
270E6E09000
trusted library allocation
page read and write
270DB851000
trusted library allocation
page read and write
A14000
heap
page read and write
27747CF7000
trusted library allocation
page read and write
401000
unkown
page execute read
2774695E000
trusted library allocation
page read and write
270E2198000
trusted library allocation
page read and write
270DB928000
trusted library allocation
page read and write
270DC266000
trusted library allocation
page read and write
A14000
heap
page read and write
27742E6B000
trusted library allocation
page read and write
270DA5DA000
trusted library allocation
page read and write
1C78E000
stack
page read and write
270E4075000
trusted library allocation
page read and write
A14000
heap
page read and write
27742F41000
trusted library allocation
page read and write
64A1000
heap
page read and write
B0A000
unkown
page execute and write copy
270CC717000
heap
page read and write
270DBF65000
trusted library allocation
page read and write
A14000
heap
page read and write
27746C23000
trusted library allocation
page read and write
16BBEB5B000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
2ECF000
stack
page read and write
B1A177E000
stack
page read and write
B67000
heap
page read and write
270DC2EC000
trusted library allocation
page read and write
27747C7C000
trusted library allocation
page read and write
270DA780000
trusted library allocation
page read and write
270DA1C0000
trusted library allocation
page read and write
277460F8000
trusted library allocation
page read and write
23838940000
heap
page read and write
2774733C000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E2132000
trusted library allocation
page read and write
23837D6F000
trusted library allocation
page read and write
A14000
heap
page read and write
270E40DA000
trusted library allocation
page read and write
270DDC00000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
270CC685000
heap
page read and write
270CC70E000
heap
page read and write
27742E34000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
270DAD5E000
trusted library allocation
page read and write
27742DF0000
trusted library section
page readonly
270DA6CA000
trusted library allocation
page read and write
3D5000
unkown
page execute and write copy
277482D7000
trusted library allocation
page read and write
A14000
heap
page read and write
270CC70E000
heap
page read and write
27743557000
heap
page read and write
27747B83000
trusted library allocation
page read and write
A14000
heap
page read and write
4B31000
heap
page read and write
2EF40000
heap
page read and write
DB4000
heap
page read and write
158A7990000
heap
page read and write
277E8D80000
trusted library allocation
page read and write
277479DB000
trusted library allocation
page read and write
64A1000
heap
page read and write
27745E35000
trusted library allocation
page read and write
270D7C00000
trusted library allocation
page read and write
A14000
heap
page read and write
CA4000
heap
page read and write
25A7000
heap
page read and write
270E41A1000
trusted library allocation
page read and write
2460000
heap
page read and write
270DC78F000
trusted library allocation
page read and write
64A1000
heap
page read and write
8FA000
stack
page read and write
270DC7E7000
trusted library allocation
page read and write
64A1000
heap
page read and write
CA4000
heap
page read and write
277437F3000
trusted library allocation
page read and write
270DB916000
trusted library allocation
page read and write
401000
unkown
page execute read
64A1000
heap
page read and write
45EE000
stack
page read and write
270E44B1000
trusted library allocation
page read and write
22C73000
heap
page read and write
270D7C03000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
496F000
stack
page read and write
16BBEB47000
trusted library allocation
page read and write
22C75000
heap
page read and write
A14000
heap
page read and write
4A10000
direct allocation
page execute and read and write
270E452F000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DCBC1000
trusted library allocation
page read and write
27743246000
trusted library allocation
page read and write
270D8BA2000
trusted library allocation
page read and write
366E000
stack
page read and write
A14000
heap
page read and write
270DDC6F000
trusted library allocation
page read and write
27746E5F000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
58C000
unkown
page execute and read and write
270DBF90000
trusted library allocation
page read and write
A14000
heap
page read and write
27747389000
trusted library allocation
page read and write
270E44DA000
trusted library allocation
page read and write
CA4000
heap
page read and write
27746B7B000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
244C000
unkown
page readonly
338E000
stack
page read and write
270E21E3000
trusted library allocation
page read and write
64A1000
heap
page read and write
27747003000
trusted library allocation
page read and write
CA4000
heap
page read and write
27748271000
trusted library allocation
page read and write
430E000
stack
page read and write
270CC685000
heap
page read and write
27747B96000
trusted library allocation
page read and write
A14000
heap
page read and write
2034000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
27743D63000
trusted library allocation
page read and write
CA4000
heap
page read and write
277E8D66000
trusted library allocation
page read and write
270CC70E000
heap
page read and write
1DBE000
heap
page read and write
69151D8000
stack
page read and write
4283000
heap
page read and write
270DDAC0000
trusted library allocation
page read and write
270E6E28000
trusted library allocation
page read and write
270E4483000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
A15000
heap
page read and write
64A1000
heap
page read and write
4381000
heap
page read and write
27743993000
trusted library allocation
page read and write
2ED8E000
stack
page read and write
277388F0000
trusted library allocation
page read and write
270DA76C000
trusted library allocation
page read and write
270E0B22000
trusted library allocation
page read and write
40E0000
direct allocation
page read and write
270D6D63000
trusted library allocation
page read and write
19C4000
heap
page read and write
27743DB0000
trusted library allocation
page read and write
270DB97C000
trusted library allocation
page read and write
6060000
heap
page read and write
5290000
direct allocation
page execute and read and write
270D65E2000
unclassified section
page read and write
A14000
heap
page read and write
27747B90000
trusted library allocation
page read and write
27747B7B000
trusted library allocation
page read and write
277439A4000
trusted library allocation
page read and write
270DA8D6000
trusted library allocation
page read and write
A14000
heap
page read and write
1E62000
heap
page read and write
270DC000000
trusted library allocation
page read and write
CA4000
heap
page read and write
3DBE000
stack
page read and write
4370000
direct allocation
page read and write
27747BCC000
trusted library allocation
page read and write
6A70000
heap
page read and write
277439CF000
trusted library allocation
page read and write
277471FA000
trusted library allocation
page read and write
27747B72000
trusted library allocation
page read and write
22C58000
heap
page read and write
A14000
heap
page read and write
270E3E03000
trusted library allocation
page read and write
277480B9000
trusted library allocation
page read and write
326B34604000
trusted library allocation
page read and write
270E41B5000
trusted library allocation
page read and write
1294000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
3EBF000
stack
page read and write
270E4583000
trusted library allocation
page read and write
270D8092000
unclassified section
page read and write
270DAF10000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270E4269000
trusted library allocation
page read and write
74D6461000
trusted library allocation
page execute read
2D87000
heap
page read and write
270DCBD1000
trusted library allocation
page read and write
270E4061000
trusted library allocation
page read and write
CA4000
heap
page read and write
40EF000
stack
page read and write
49A0000
direct allocation
page execute and read and write
27743DB0000
trusted library allocation
page read and write
A14000
heap
page read and write
277432EA000
trusted library allocation
page read and write
13D4000
heap
page read and write
270E4072000
trusted library allocation
page read and write
DB4000
heap
page read and write
A14000
heap
page read and write
16BBECC4000
heap
page read and write
270DA186000
trusted library allocation
page read and write
277462EB000
trusted library allocation
page read and write
A14000
heap
page read and write
270DA5A5000
trusted library allocation
page read and write
DC1CABD000
stack
page read and write
270E4488000
trusted library allocation
page read and write
22C77000
heap
page read and write
64A1000
heap
page read and write
270DB864000
trusted library allocation
page read and write
2774327D000
trusted library allocation
page read and write
27747B8B000
trusted library allocation
page read and write
270E4590000
trusted library allocation
page read and write
270E44C9000
trusted library allocation
page read and write
27747BDF000
trusted library allocation
page read and write
238389A3000
heap
page read and write
A15000
heap
page read and write
34C000
unkown
page execute and write copy
238389CA000
heap
page read and write
270DCC28000
trusted library allocation
page read and write
5170000
direct allocation
page execute and read and write
A14000
heap
page read and write
2774605C000
trusted library allocation
page read and write
270DADB4000
trusted library allocation
page read and write
1CA1D000
stack
page read and write
A14000
heap
page read and write
31EF000
stack
page read and write
32EF000
stack
page read and write
2FFE000
stack
page read and write
1608000
heap
page read and write
4D31000
heap
page read and write
27748244000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270E2160000
trusted library allocation
page read and write
64A1000
heap
page read and write
192000
stack
page read and write
16BBE800000
heap
page read and write
270DDBBD000
trusted library allocation
page read and write
270DBEEE000
trusted library allocation
page read and write
A14000
heap
page read and write
27747CF8000
trusted library allocation
page read and write
27747BD0000
trusted library allocation
page read and write
363E000
stack
page read and write
64A1000
heap
page read and write
270E6E3C000
trusted library allocation
page read and write
A14000
heap
page read and write
270CC709000
heap
page read and write
4B31000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270CC727000
heap
page read and write
27743D9B000
trusted library allocation
page read and write
2773685E000
trusted library allocation
page read and write
277471F3000
trusted library allocation
page read and write
1954000
heap
page read and write
64A1000
heap
page read and write
270E2342000
trusted library allocation
page read and write
530000
unkown
page execute and read and write
4D31000
heap
page read and write
27743DF6000
trusted library allocation
page read and write
270E4463000
trusted library allocation
page read and write
270DC7DA000
trusted library allocation
page read and write
277E8F09000
trusted library allocation
page read and write
EEEADD04000
trusted library allocation
page read and write
A15000
heap
page read and write
64A1000
heap
page read and write
25C0000
heap
page read and write
A14000
heap
page read and write
264F000
heap
page read and write
402000
unkown
page execute and read and write
1D2E000
heap
page read and write
436F000
stack
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
238389CD000
heap
page read and write
270DA8EA000
trusted library allocation
page read and write
8411000
heap
page read and write
270DA8A3000
trusted library allocation
page read and write
277479E3000
trusted library allocation
page read and write
270E4B28000
trusted library allocation
page read and write
277393C7000
heap
page read and write
270DCA80000
trusted library allocation
page read and write
A14000
heap
page read and write
32AE000
stack
page read and write
270DB6EC000
trusted library allocation
page read and write
E9C000
stack
page read and write
4470000
heap
page read and write
60AE000
stack
page read and write
1F0000
heap
page read and write
6C81E000
unkown
page read and write
27742EF8000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
DC1A0BE000
stack
page read and write
A14000
heap
page read and write
21CB000
heap
page read and write
1C68F000
stack
page read and write
270E41B5000
trusted library allocation
page read and write
CA4000
heap
page read and write
270DB2B6000
trusted library allocation
page read and write
35B000
unkown
page execute and write copy
270CC70E000
heap
page read and write
691479E000
unkown
page readonly
64A1000
heap
page read and write
270D6210000
trusted library allocation
page read and write
A14000
heap
page read and write
27747FF4000
trusted library allocation
page read and write
43FE000
stack
page read and write
270C9780000
unclassified section
page readonly
DB4000
heap
page read and write
64A1000
heap
page read and write
B1A9F7E000
stack
page read and write
270DA881000
trusted library allocation
page read and write
27745FD9000
trusted library allocation
page read and write
270CC709000
heap
page read and write
63E000
unkown
page execute and read and write
270D6947000
heap
page read and write
94D000
stack
page read and write
270DC800000
trusted library allocation
page read and write
A14000
heap
page read and write
350FC000
stack
page read and write
444E000
stack
page read and write
270E23D1000
trusted library allocation
page read and write
27746DE2000
trusted library allocation
page read and write
A14000
heap
page read and write
16BBED32000
trusted library allocation
page read and write
817F000
stack
page read and write
A14000
heap
page read and write
27745E21000
trusted library allocation
page read and write
A14000
heap
page read and write
3FB0000
heap
page read and write
270DBEE4000
trusted library allocation
page read and write
27748301000
trusted library allocation
page read and write
A14000
heap
page read and write
3D2E000
stack
page read and write
27746A50000
trusted library allocation
page read and write
27743844000
trusted library allocation
page read and write
B19FFD8000
stack
page read and write
277365C0000
heap
page read and write
7F1000
unkown
page execute and write copy
AC1000
unkown
page execute and read and write
270E3D7A000
trusted library allocation
page read and write
270C9BEE000
trusted library allocation
page read and write
27746587000
trusted library allocation
page read and write
277463EE000
trusted library allocation
page read and write
270E4186000
trusted library allocation
page read and write
A14000
heap
page read and write
2774326A000
trusted library allocation
page read and write
27746F81000
trusted library allocation
page read and write
270CC704000
heap
page read and write
270DA771000
trusted library allocation
page read and write
A15000
heap
page read and write
2730003F000
trusted library allocation
page read and write
4B31000
heap
page read and write
13D4000
heap
page read and write
27747C64000
trusted library allocation
page read and write
22C77000
heap
page read and write
416E000
stack
page read and write
1F35000
heap
page read and write
270D6A00000
trusted library allocation
page read and write
64A1000
heap
page read and write
457E000
stack
page read and write
4980000
direct allocation
page execute and read and write
6440000
heap
page read and write
2774762F000
trusted library allocation
page read and write
A14000
heap
page read and write
3CAE000
stack
page read and write
270DB6F9000
trusted library allocation
page read and write
22C77000
heap
page read and write
277E8D2E000
trusted library allocation
page read and write
1410000
direct allocation
page read and write
270D8803000
trusted library allocation
page read and write
36EE000
stack
page read and write
4290000
heap
page read and write
DC213FD000
stack
page read and write
270E45BD000
trusted library allocation
page read and write
2FEF000
stack
page read and write
270DDC8A000
trusted library allocation
page read and write
4810000
direct allocation
page read and write
270DC7E7000
trusted library allocation
page read and write
31EF000
stack
page read and write
64A1000
heap
page read and write
CA4000
heap
page read and write
270CC71F000
heap
page read and write
270DA8D6000
trusted library allocation
page read and write
2D8F000
stack
page read and write
270DBF79000
trusted library allocation
page read and write
270DBF8A000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
270D8BBC000
trusted library allocation
page read and write
1C53000
heap
page read and write
277389A3000
trusted library allocation
page read and write
DB4000
heap
page read and write
27746056000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DA26F000
trusted library allocation
page read and write
4691000
heap
page read and write
641F000
stack
page read and write
270D65FD000
unclassified section
page read and write
313F000
stack
page read and write
69E000
unkown
page execute and read and write
277476DC000
trusted library allocation
page read and write
9C000
stack
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
27743244000
trusted library allocation
page read and write
A14000
heap
page read and write
270CC6A3000
heap
page read and write
2774782E000
trusted library allocation
page read and write
270E2247000
trusted library allocation
page read and write
64A1000
heap
page read and write
19C4000
heap
page read and write
270DDBFE000
trusted library allocation
page read and write
270DEE15000
trusted library allocation
page read and write
B1A75FD000
stack
page read and write
64A1000
heap
page read and write
270DB6EC000
trusted library allocation
page read and write
27746FC6000
trusted library allocation
page read and write
64A1000
heap
page read and write
DA0000
heap
page read and write
270DA8EC000
trusted library allocation
page read and write
22C75000
heap
page read and write
3F9E000
stack
page read and write
270D88A6000
trusted library allocation
page read and write
277439E8000
trusted library allocation
page read and write
27747B90000
trusted library allocation
page read and write
270D620A000
trusted library allocation
page read and write
27739403000
heap
page read and write
270D8400000
trusted library allocation
page read and write
270E4B2E000
trusted library allocation
page read and write
66D8000
heap
page read and write
27743891000
trusted library allocation
page read and write
4B31000
heap
page read and write
A14000
heap
page read and write
158A9540000
heap
page read and write
22A1000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
23837D73000
trusted library allocation
page read and write
270DA5B4000
trusted library allocation
page read and write
74D6451000
trusted library allocation
page execute read
23C01FA000
stack
page read and write
270DA662000
trusted library allocation
page read and write
270DB742000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
270CC610000
heap
page read and write
27747B8D000
trusted library allocation
page read and write
27736720000
trusted library allocation
page read and write
A14000
heap
page read and write
270DBC09000
trusted library allocation
page read and write
27747ECC000
trusted library allocation
page read and write
2A30000
direct allocation
page read and write
270E5C85000
trusted library allocation
page read and write
2A30000
direct allocation
page read and write
270DA800000
trusted library allocation
page read and write
270DB0CE000
trusted library allocation
page read and write
270DC285000
trusted library allocation
page read and write
2BEE000
stack
page read and write
3E6000
unkown
page execute and read and write
270DA77D000
trusted library allocation
page read and write
F12000
heap
page read and write
4D31000
heap
page read and write
270CC70F000
heap
page read and write
27743FC0000
trusted library section
page readonly
A15000
heap
page read and write
277439A4000
trusted library allocation
page read and write
64A1000
heap
page read and write
B1A01FC000
stack
page read and write
1580000
direct allocation
page read and write
270E4B0A000
trusted library allocation
page read and write
277438BD000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
5130000
direct allocation
page execute and read and write
27745EE6000
trusted library allocation
page read and write
270E2000000
trusted library allocation
page read and write
A14000
heap
page read and write
19C4000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
277480A1000
trusted library allocation
page read and write
4140000
heap
page read and write
270D79E2000
trusted library allocation
page read and write
270E2B12000
trusted library allocation
page read and write
270E20F6000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
52A0000
direct allocation
page execute and read and write
A14000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
31963FC000
stack
page read and write
22C77000
heap
page read and write
A14000
heap
page read and write
270DA8BC000
trusted library allocation
page read and write
27746043000
trusted library allocation
page read and write
270C9A00000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270DAA00000
trusted library allocation
page read and write
64A1000
heap
page read and write
27747E9A000
trusted library allocation
page read and write
270DA2B8000
trusted library allocation
page read and write
27743825000
trusted library allocation
page read and write
270DA8C4000
trusted library allocation
page read and write
1954000
heap
page read and write
A14000
heap
page read and write
CA4000
heap
page read and write
25FF000
heap
page read and write
B52000
heap
page read and write
27746C6F000
trusted library allocation
page read and write
270DB6F7000
trusted library allocation
page read and write
4B20000
direct allocation
page read and write
270D7D21000
trusted library allocation
page read and write
270DB1F7000
trusted library allocation
page read and write
19C4000
heap
page read and write
27747EB4000
trusted library allocation
page read and write
B5C000
heap
page read and write
4EA0000
heap
page read and write
19C4000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
27747A3F000
trusted library allocation
page read and write
270E2344000
trusted library allocation
page read and write
2774399A000
trusted library allocation
page read and write
4CD0000
direct allocation
page execute and read and write
2A30000
direct allocation
page read and write
4E90000
heap
page read and write
27747C77000
trusted library allocation
page read and write
DC19D7E000
stack
page read and write
A14000
heap
page read and write
270DDAB4000
trusted library allocation
page read and write
27747B25000
trusted library allocation
page read and write
7E0000
direct allocation
page read and write
A14000
heap
page read and write
270E3A15000
trusted library allocation
page read and write
A14000
heap
page read and write
27747203000
trusted library allocation
page read and write
4E80000
heap
page read and write
270DA5DA000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
27745E65000
trusted library allocation
page read and write
A14000
heap
page read and write
270DB70F000
trusted library allocation
page read and write
90F0000
heap
page read and write
6AE000
unkown
page execute and write copy
27747B6D000
trusted library allocation
page read and write
277389A7000
trusted library allocation
page read and write
27745E47000
trusted library allocation
page read and write
270CC70A000
heap
page read and write
27745EF3000
trusted library allocation
page read and write
64A1000
heap
page read and write
372000
unkown
page execute and read and write
27750ADD000
trusted library allocation
page read and write
22C9D000
heap
page read and write
19C4000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
27742FDB000
trusted library allocation
page read and write
27747903000
trusted library allocation
page read and write
270E4300000
trusted library allocation
page read and write
247A000
heap
page read and write
270CC70E000
heap
page read and write
27747CB8000
trusted library allocation
page read and write
270DB912000
trusted library allocation
page read and write
27743D63000
trusted library allocation
page read and write
277482A7000
trusted library allocation
page read and write
280E000
stack
page read and write
A14000
heap
page read and write
2F8F000
stack
page read and write
64A0000
heap
page read and write
A14000
heap
page read and write
300F000
stack
page read and write
27746E00000
trusted library allocation
page read and write
64A1000
heap
page read and write
CA4000
heap
page read and write
2774FF30000
trusted library allocation
page read and write
A14000
heap
page read and write
15DA000
heap
page read and write
277480F9000
trusted library allocation
page read and write
270E20E6000
trusted library allocation
page read and write
CA5000
heap
page read and write
130E000
stack
page read and write
4F54000
direct allocation
page execute and read and write
4B00000
direct allocation
page execute and read and write
CA4000
heap
page read and write
277476D6000
trusted library allocation
page read and write
270D8B94000
trusted library allocation
page read and write
4C80000
heap
page read and write
270DBC2E000
trusted library allocation
page read and write
270E41EB000
trusted library allocation
page read and write
5350000
direct allocation
page execute and read and write
27743527000
heap
page read and write
3EAE000
stack
page read and write
23838AB7000
heap
page read and write
270D6203000
trusted library allocation
page read and write
A14000
heap
page read and write
27747B9B000
trusted library allocation
page read and write
270DBF52000
trusted library allocation
page read and write
58C000
unkown
page execute and read and write
24D0000
heap
page read and write
1C8EF000
stack
page read and write
270E3FB0000
trusted library allocation
page read and write
64A1000
heap
page read and write
D30000
heap
page read and write
27747B72000
trusted library allocation
page read and write
270C9B30000
trusted library allocation
page read and write
D37000
heap
page read and write
852000
unkown
page execute and read and write
DC20DFB000
stack
page read and write
27743786000
trusted library allocation
page read and write
CA4000
heap
page read and write
63A1000
heap
page read and write
277E8D97000
trusted library allocation
page read and write
270DC903000
trusted library allocation
page read and write
270DBF65000
trusted library allocation
page read and write
A14000
heap
page read and write
27747F82000
trusted library allocation
page read and write
DC19C3A000
stack
page read and write
270CC70A000
heap
page read and write
270D79AC000
trusted library allocation
page read and write
270D80D0000
trusted library section
page read and write
2EBF000
stack
page read and write
270D8B4C000
trusted library allocation
page read and write
4D31000
heap
page read and write
270E4608000
trusted library allocation
page read and write
277479B7000
trusted library allocation
page read and write
65DD000
stack
page read and write
270DBF40000
trusted library allocation
page read and write
270CC704000
heap
page read and write
A14000
heap
page read and write
2383899F000
heap
page read and write
4B31000
heap
page read and write
270E0B28000
trusted library allocation
page read and write
27743754000
trusted library allocation
page read and write
426E000
stack
page read and write
C10000
heap
page read and write
277E8DE6000
trusted library allocation
page read and write
A14000
heap
page read and write
270DC8B2000
trusted library allocation
page read and write
277479EB000
trusted library allocation
page read and write
27747AC4000
trusted library allocation
page read and write
64A1000
heap
page read and write
CA4000
heap
page read and write
270DAC04000
trusted library allocation
page read and write
DBE000
stack
page read and write
19C4000
heap
page read and write
270E41BE000
trusted library allocation
page read and write
270DCBE5000
trusted library allocation
page read and write
A14000
heap
page read and write
27736803000
trusted library allocation
page read and write
270D7871000
trusted library allocation
page read and write
64A1000
heap
page read and write
27742F60000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
27746AE0000
trusted library allocation
page read and write
27743872000
trusted library allocation
page read and write
277465C8000
trusted library allocation
page read and write
2774824F000
trusted library allocation
page read and write
332E000
stack
page read and write
64A1000
heap
page read and write
270DA08A000
trusted library allocation
page read and write
44AE000
stack
page read and write
158A7AFB000
heap
page read and write
270DB993000
trusted library allocation
page read and write
27742E00000
trusted library allocation
page read and write
270E45C5000
trusted library allocation
page read and write
64A1000
heap
page read and write
4E20000
heap
page read and write
22C52000
heap
page read and write
A14000
heap
page read and write
23837AB2000
unclassified section
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270DA897000
trusted library allocation
page read and write
270E23B3000
trusted library allocation
page read and write
1B0B000
heap
page read and write
A14000
heap
page read and write
270DB079000
trusted library allocation
page read and write
20E0000
heap
page read and write
A15000
heap
page read and write
64A1000
heap
page read and write
270DBF55000
trusted library allocation
page read and write
A14000
heap
page read and write
270D6200000
trusted library allocation
page read and write
270E4133000
trusted library allocation
page read and write
158A7AC7000
heap
page read and write
A14000
heap
page read and write
4D20000
direct allocation
page execute and read and write
CA4000
heap
page read and write
DB4000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
27746709000
trusted library allocation
page read and write
2774620A000
trusted library allocation
page read and write
270E40A4000
trusted library allocation
page read and write
270DC9C6000
trusted library allocation
page read and write
A14000
heap
page read and write
270DA8BC000
trusted library allocation
page read and write
277389BA000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DAD00000
trusted library allocation
page read and write
277513DB000
trusted library allocation
page read and write
270DB285000
trusted library allocation
page read and write
A15000
heap
page read and write
27738977000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E4118000
trusted library allocation
page read and write
A14000
heap
page read and write
270E5C74000
trusted library allocation
page read and write
40B000
unkown
page execute and read and write
F31000
heap
page read and write
467F000
stack
page read and write
270DC214000
trusted library allocation
page read and write
1580000
direct allocation
page read and write
23F822A1000
trusted library allocation
page execute read
27747B90000
trusted library allocation
page read and write
A14000
heap
page read and write
CA4000
heap
page read and write
270DA8C4000
trusted library allocation
page read and write
64A1000
heap
page read and write
1A86000
heap
page read and write
270DB73B000
trusted library allocation
page read and write
270D786C000
trusted library allocation
page read and write
270DA8DC000
trusted library allocation
page read and write
27746D0D000
trusted library allocation
page read and write
A15000
heap
page read and write
A14000
heap
page read and write
270DB8B5000
trusted library allocation
page read and write
270DA1D3000
trusted library allocation
page read and write
270DA269000
trusted library allocation
page read and write
3A1000
unkown
page execute and write copy
27747341000
trusted library allocation
page read and write
A14000
heap
page read and write
270DA2AE000
trusted library allocation
page read and write
270DC6DC000
trusted library allocation
page read and write
270DB268000
trusted library allocation
page read and write
270D6003000
trusted library allocation
page read and write
270CC71B000
heap
page read and write
270E214D000
trusted library allocation
page read and write
4B20000
direct allocation
page read and write
64A1000
heap
page read and write
270E40FD000
trusted library allocation
page read and write
270D7E34000
trusted library allocation
page read and write
ED0000
direct allocation
page execute and read and write
64A1000
heap
page read and write
2500000
heap
page read and write
270DAB20000
trusted library allocation
page read and write
270E21BB000
trusted library allocation
page read and write
A14000
heap
page read and write
270D613C000
trusted library allocation
page read and write
270D6DDE000
trusted library allocation
page read and write
1F0000
heap
page read and write
277482A1000
trusted library allocation
page read and write
64A1000
heap
page read and write
270D7EDE000
trusted library allocation
page read and write
270DC80F000
trusted library allocation
page read and write
16BBEBCB000
trusted library allocation
page read and write
2F0E000
stack
page read and write
1FFF000
heap
page read and write
A14000
heap
page read and write
27747A03000
trusted library allocation
page read and write
1CBA7000
heap
page read and write
27747B7B000
trusted library allocation
page read and write
422F000
stack
page read and write
CA4000
heap
page read and write
270DC2F1000
trusted library allocation
page read and write
564E000
stack
page read and write
270E2E0D000
trusted library allocation
page read and write
270DA665000
trusted library allocation
page read and write
64AE000
heap
page read and write
270CC5FD000
heap
page read and write
270DB85F000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E218F000
trusted library allocation
page read and write
27742E81000
trusted library allocation
page read and write
27747BE3000
trusted library allocation
page read and write
F8A4C7E000
unkown
page readonly
270E41FB000
trusted library allocation
page read and write
5150000
direct allocation
page execute and read and write
270CC702000
heap
page read and write
35A000
unkown
page execute and write copy
A14000
heap
page read and write
27743D3B000
trusted library allocation
page read and write
696000
unkown
page execute and read and write
A14000
heap
page read and write
22C6A000
heap
page read and write
270DA591000
trusted library allocation
page read and write
27736420000
unclassified section
page readonly
A14000
heap
page read and write
277437ED000
trusted library allocation
page read and write
270DA5CE000
trusted library allocation
page read and write
270E40E4000
trusted library allocation
page read and write
4D31000
heap
page read and write
244C000
unkown
page readonly
27747A62000
trusted library allocation
page read and write
64A1000
heap
page read and write
270D7800000
trusted library allocation
page read and write
270DB4E0000
trusted library section
page read and write
27742F52000
trusted library allocation
page read and write
270E4179000
trusted library allocation
page read and write
314F000
stack
page read and write
DC1A3CE000
stack
page read and write
277468E8000
trusted library allocation
page read and write
277437D0000
trusted library allocation
page read and write
270DA100000
trusted library allocation
page read and write
4B31000
heap
page read and write
27746AC6000
trusted library allocation
page read and write
43EF000
stack
page read and write
270D62E9000
trusted library allocation
page read and write
4B3E000
stack
page read and write
19C4000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
270E235D000
trusted library allocation
page read and write
4A30000
direct allocation
page execute and read and write
4B20000
direct allocation
page read and write
A15000
heap
page read and write
270E3DAB000
trusted library allocation
page read and write
277478BE000
trusted library allocation
page read and write
270E417D000
trusted library allocation
page read and write
A14000
heap
page read and write
23838A84000
heap
page read and write
270DBC25000
trusted library allocation
page read and write
27747C73000
trusted library allocation
page read and write
64A1000
heap
page read and write
27738803000
trusted library allocation
page read and write
270E449E000
trusted library allocation
page read and write
23838A84000
heap
page read and write
5F0000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
1E4E000
heap
page read and write
7F3B000
stack
page read and write
27747B49000
trusted library allocation
page read and write
22C73000
heap
page read and write
270DBF75000
trusted library allocation
page read and write
A14000
heap
page read and write
27744309000
trusted library allocation
page read and write
277483F8000
trusted library allocation
page read and write
16BBEB79000
trusted library allocation
page read and write
DB4000
heap
page read and write
A14000
heap
page read and write
16BBECC0000
heap
page read and write
270DB1EF000
trusted library allocation
page read and write
270DC795000
trusted library allocation
page read and write
A14000
heap
page read and write
270E4B0C000
trusted library allocation
page read and write
22C77000
heap
page read and write
A14000
heap
page read and write
4B31000
heap
page read and write
27748127000
trusted library allocation
page read and write
428C000
heap
page read and write
4C70000
direct allocation
page execute and read and write
270DC7ED000
trusted library allocation
page read and write
19C4000
heap
page read and write
64A1000
heap
page read and write
400000
unkown
page execute and read and write
64A1000
heap
page read and write
367E000
stack
page read and write
27746D00000
trusted library allocation
page read and write
A14000
heap
page read and write
EB2000
heap
page read and write
2B0000
unkown
page readonly
270E4B02000
trusted library allocation
page read and write
270DBF2F000
trusted library allocation
page read and write
270DA6CA000
trusted library allocation
page read and write
270DBE5B000
trusted library allocation
page read and write
27748291000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270DA6CA000
trusted library allocation
page read and write
27747BA5000
trusted library allocation
page read and write
180F000
stack
page read and write
3C7F000
stack
page read and write
277393E2000
heap
page read and write
A14000
heap
page read and write
22BB3000
heap
page read and write
3E6000
unkown
page execute and read and write
270DA200000
trusted library allocation
page read and write
27743DC6000
trusted library allocation
page read and write
27746616000
trusted library allocation
page read and write
8433000
heap
page read and write
270D6079000
trusted library allocation
page read and write
270E5C8B000
trusted library allocation
page read and write
A14000
heap
page read and write
1580000
direct allocation
page read and write
1CA6D000
stack
page read and write
270E2300000
trusted library allocation
page read and write
CA4000
heap
page read and write
270DA683000
trusted library allocation
page read and write
64A1000
heap
page read and write
277467AB000
trusted library allocation
page read and write
49F000
unkown
page execute and read and write
1954000
heap
page read and write
F8A2B7E000
unkown
page readonly
35D4A8604000
trusted library allocation
page read and write
A14000
heap
page read and write
B0A000
unkown
page execute and read and write
A14000
heap
page read and write
DC2347F000
stack
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
16BBEB5D000
trusted library allocation
page read and write
B1A43F3000
stack
page read and write
A14000
heap
page read and write
277439E8000
trusted library allocation
page read and write
A14000
heap
page read and write
277437C8000
trusted library allocation
page read and write
270DB4B0000
unclassified section
page read and write
270D8A00000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
DB4000
heap
page read and write
A14000
heap
page read and write
270E232B000
trusted library allocation
page read and write
270DB739000
trusted library allocation
page read and write
A15000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
23838AB7000
heap
page read and write
4B31000
heap
page read and write
352E000
stack
page read and write
270D8B11000
trusted library allocation
page read and write
27746B68000
trusted library allocation
page read and write
270E4009000
trusted library allocation
page read and write
27747FE9000
trusted library allocation
page read and write
270CC71A000
heap
page read and write
27747B6D000
trusted library allocation
page read and write
27745F4B000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
1294000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
23837D2F000
trusted library allocation
page read and write
4B80000
direct allocation
page execute and read and write
27747A36000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270E4B24000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DB79C000
trusted library allocation
page read and write
A14000
heap
page read and write
270DB858000
trusted library allocation
page read and write
4F54000
direct allocation
page execute and read and write
27747A70000
trusted library allocation
page read and write
A14000
heap
page read and write
2774768C000
trusted library allocation
page read and write
DB4000
heap
page read and write
64A1000
heap
page read and write
6AD000
unkown
page execute and write copy
277389A9000
trusted library allocation
page read and write
A14000
heap
page read and write
270E4133000
trusted library allocation
page read and write
27744600000
trusted library allocation
page read and write
270CC70F000
heap
page read and write
23C01FF000
stack
page read and write
270DB97A000
trusted library allocation
page read and write
23837AB0000
unclassified section
page read and write
270E4B06000
trusted library allocation
page read and write
A14000
heap
page read and write
270DB78A000
trusted library allocation
page read and write
A14000
heap
page read and write
270D79A8000
trusted library allocation
page read and write
270CC704000
heap
page read and write
64A1000
heap
page read and write
270DC852000
trusted library allocation
page read and write
DC242F5000
stack
page read and write
277509C8000
trusted library allocation
page read and write
A14000
heap
page read and write
27747BE3000
trusted library allocation
page read and write
270E6E9B000
trusted library allocation
page read and write
27743AE0000
trusted library section
page readonly
A15000
heap
page read and write
CA4000
heap
page read and write
D10000
direct allocation
page read and write
13D4000
heap
page read and write
270D6CF4000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270E4B34000
trusted library allocation
page read and write
18A0000
heap
page read and write
270DDAD2000
trusted library allocation
page read and write
270E5C6C000
trusted library allocation
page read and write
27747B83000
trusted library allocation
page read and write
270E2336000
trusted library allocation
page read and write
A14000
heap
page read and write
270E44B1000
trusted library allocation
page read and write
468F000
stack
page read and write
270E41DF000
trusted library allocation
page read and write
A15000
heap
page read and write
28D23000
heap
page read and write
4F5C000
direct allocation
page execute and read and write
270DC668000
trusted library allocation
page read and write
270DCBBF000
trusted library allocation
page read and write
25D2000
heap
page execute and read and write
64A1000
heap
page read and write
400E000
stack
page read and write
270DB7E0000
trusted library allocation
page read and write
3C7E000
stack
page read and write
64A1000
heap
page read and write
A15000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270DA8F5000
trusted library allocation
page read and write
4370000
direct allocation
page read and write
270DB84A000
trusted library allocation
page read and write
23837AC0000
trusted library section
page readonly
27747C9B000
trusted library allocation
page read and write
64A1000
heap
page read and write
A90000
heap
page read and write
64A1000
heap
page read and write
1954000
heap
page read and write
1294000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
27748120000
trusted library allocation
page read and write
CA4000
heap
page read and write
35201000
heap
page read and write
270DA766000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
4370000
direct allocation
page read and write
27746E1B000
trusted library allocation
page read and write
270E44AC000
trusted library allocation
page read and write
4691000
heap
page read and write
772E000
stack
page read and write
277E8B17000
heap
page read and write
A14000
heap
page read and write
238389A4000
heap
page read and write
564000
heap
page read and write
4B31000
heap
page read and write
270DA2AE000
trusted library allocation
page read and write
270D677D000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270DA897000
trusted library allocation
page read and write
277513D9000
trusted library allocation
page read and write
270DDAA3000
trusted library allocation
page read and write
27747605000
trusted library allocation
page read and write
277465B2000
trusted library allocation
page read and write
CA4000
heap
page read and write
13D4000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270DCB9B000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
4381000
heap
page read and write
A14000
heap
page read and write
19C4000
heap
page read and write
270E23D7000
trusted library allocation
page read and write
64A1000
heap
page read and write
23837DC7000
trusted library allocation
page read and write
64A1000
heap
page read and write
A15000
heap
page read and write
A14000
heap
page read and write
5C1F000
stack
page read and write
842B000
stack
page read and write
27742F3C000
trusted library allocation
page read and write
270E223F000
trusted library allocation
page read and write
277437B8000
trusted library allocation
page read and write
277471BB000
trusted library allocation
page read and write
270E21F2000
trusted library allocation
page read and write
64C0000
heap
page read and write
64A1000
heap
page read and write
807E000
stack
page read and write
28CE0000
heap
page read and write
DC21DFE000
stack
page read and write
64A1000
heap
page read and write
27742EAA000
trusted library allocation
page read and write
64A1000
heap
page read and write
532C000
stack
page read and write
406E000
stack
page read and write
4B00000
direct allocation
page execute and read and write
A14000
heap
page read and write
270E45CD000
trusted library allocation
page read and write
A14000
heap
page read and write
270E3FB4000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270E44DA000
trusted library allocation
page read and write
DC1CBFC000
stack
page read and write
564000
heap
page read and write
2E2F000
stack
page read and write
2774702F000
trusted library allocation
page read and write
64A1000
heap
page read and write
408E000
stack
page read and write
270E4054000
trusted library allocation
page read and write
270E2065000
trusted library allocation
page read and write
40EE000
stack
page read and write
270D62FB000
trusted library allocation
page read and write
27745E9D000
trusted library allocation
page read and write
A14000
heap
page read and write
23837B40000
trusted library allocation
page read and write
CA4000
heap
page read and write
27745D90000
trusted library section
page readonly
158A9670000
heap
page read and write
270DB8F3000
trusted library allocation
page read and write
27747BEF000
trusted library allocation
page read and write
1CA2E000
stack
page read and write
277431FE000
trusted library allocation
page read and write
F1E000
heap
page read and write
270E0B24000
trusted library allocation
page read and write
270DA6A1000
trusted library allocation
page read and write
485C000
stack
page read and write
2309000
heap
page read and write
1200000
heap
page read and write
270E4166000
trusted library allocation
page read and write
296E000
stack
page read and write
A14000
heap
page read and write
27747B8B000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270E41EF000
trusted library allocation
page read and write
277476DC000
trusted library allocation
page read and write
CA4000
heap
page read and write
64A1000
heap
page read and write
270DA5BB000
trusted library allocation
page read and write
27750F28000
trusted library allocation
page read and write
27739468000
heap
page read and write
A14000
heap
page read and write
A15000
heap
page read and write
A14000
heap
page read and write
270DA8BC000
trusted library allocation
page read and write
270DBF29000
trusted library allocation
page read and write
27747A70000
trusted library allocation
page read and write
270E4B22000
trusted library allocation
page read and write
18A0000
heap
page read and write
64A1000
heap
page read and write
27746F97000
trusted library allocation
page read and write
270DA69B000
trusted library allocation
page read and write
28D01000
heap
page read and write
13D4000
heap
page read and write
270E22E7000
trusted library allocation
page read and write
4F69000
direct allocation
page execute and read and write
27744300000
trusted library allocation
page read and write
390E000
stack
page read and write
A14000
heap
page read and write
270DBF79000
trusted library allocation
page read and write
27743D03000
trusted library allocation
page read and write
270E5CF9000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
270DA5B2000
trusted library allocation
page read and write
270DCBB9000
trusted library allocation
page read and write
270DF012000
trusted library allocation
page read and write
277385E0000
trusted library section
page read and write
A14000
heap
page read and write
51B0000
direct allocation
page execute and read and write
270CC704000
heap
page read and write
270DF008000
trusted library allocation
page read and write
270DB705000
trusted library allocation
page read and write
27746833000
trusted library allocation
page read and write
23837A20000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
DB4000
heap
page read and write
A14000
heap
page read and write
24E5000
heap
page read and write
A14000
heap
page read and write
270DBF8C000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DB70D000
trusted library allocation
page read and write
64A1000
heap
page read and write
270D6CD6000
trusted library allocation
page read and write
691475E000
stack
page read and write
270DDB12000
trusted library allocation
page read and write
103A000
stack
page read and write
A14000
heap
page read and write
270D797A000
trusted library allocation
page read and write
270E45EC000
trusted library allocation
page read and write
270DBF94000
trusted library allocation
page read and write
13D4000
heap
page read and write
4B31000
heap
page read and write
4F54000
direct allocation
page execute and read and write
22C7D000
heap
page read and write
2B3E000
stack
page read and write
270DDAF4000
trusted library allocation
page read and write
270DA2A0000
trusted library allocation
page read and write
D10000
direct allocation
page read and write
277482F2000
trusted library allocation
page read and write
B19F5CD000
stack
page read and write
270D6CFC000
trusted library allocation
page read and write
27747B6D000
trusted library allocation
page read and write
22C5A000
heap
page read and write
A14000
heap
page read and write
244C000
unkown
page readonly
564000
heap
page read and write
270DA8A3000
trusted library allocation
page read and write
64A0000
heap
page read and write
64A1000
heap
page read and write
3C6F000
stack
page read and write
64A1000
heap
page read and write
41EF000
stack
page read and write
564000
heap
page read and write
270DCA03000
trusted library allocation
page read and write
27746650000
trusted library allocation
page read and write
249E000
stack
page read and write
27747CE2000
trusted library allocation
page read and write
27743774000
trusted library allocation
page read and write
27747B9B000
trusted library allocation
page read and write
2720000
direct allocation
page read and write
DB4000
heap
page read and write
CA4000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
27746873000
trusted library allocation
page read and write
270DA2A5000
trusted library allocation
page read and write
A14000
heap
page read and write
4D31000
heap
page read and write
270E4493000
trusted library allocation
page read and write
B1A6DFD000
stack
page read and write
64A1000
heap
page read and write
27747E95000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
72939FF000
stack
page read and write
27744C00000
trusted library allocation
page read and write
270D6D03000
trusted library allocation
page read and write
270E6E32000
trusted library allocation
page read and write
64A1000
heap
page read and write
270D8208000
trusted library allocation
page read and write
22C69000
heap
page read and write
A14000
heap
page read and write
1D6C000
heap
page read and write
DB4000
heap
page read and write
2B0000
unkown
page readonly
277432CD000
trusted library allocation
page read and write
1CA0000
heap
page read and write
277480D8000
trusted library allocation
page read and write
B1A8B7F000
stack
page read and write
1ED3000
heap
page read and write
F0B000
heap
page read and write
27747BA5000
trusted library allocation
page read and write
410F000
stack
page read and write
1C7CE000
stack
page read and write
270E23AD000
trusted library allocation
page read and write
277480B6000
trusted library allocation
page read and write
27746003000
trusted library allocation
page read and write
64A1000
heap
page read and write
27747AC5000
trusted library allocation
page read and write
2383899C000
heap
page read and write
27747E89000
trusted library allocation
page read and write
64A1000
heap
page read and write
27747803000
trusted library allocation
page read and write
4B31000
heap
page read and write
270D6D27000
trusted library allocation
page read and write
A14000
heap
page read and write
270CC721000
heap
page read and write
43CE000
stack
page read and write
270DA766000
trusted library allocation
page read and write
270E41D3000
trusted library allocation
page read and write
270DA300000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E42C5000
trusted library allocation
page read and write
2104000
heap
page read and write
A14000
heap
page read and write
B1A06BE000
stack
page read and write
CA4000
heap
page read and write
A15000
heap
page read and write
270DB7A2000
trusted library allocation
page read and write
64A1000
heap
page read and write
23837D23000
trusted library allocation
page read and write
412E000
stack
page read and write
CA4000
heap
page read and write
5320000
direct allocation
page execute and read and write
23837D81000
trusted library allocation
page read and write
270DA8DC000
trusted library allocation
page read and write
1248000
heap
page read and write
22C5D000
heap
page read and write
5050000
heap
page read and write
27745E43000
trusted library allocation
page read and write
DC209FA000
stack
page read and write
270D8B23000
trusted library allocation
page read and write
270DC827000
trusted library allocation
page read and write
A15000
heap
page read and write
64A1000
heap
page read and write
270DB28B000
trusted library allocation
page read and write
270DC8B9000
trusted library allocation
page read and write
22C69000
heap
page read and write
4D31000
heap
page read and write
4501000
heap
page read and write
40BF000
stack
page read and write
52EF000
stack
page read and write
270D8B83000
trusted library allocation
page read and write
270E420F000
trusted library allocation
page read and write
556F000
stack
page read and write
270DA7F0000
trusted library allocation
page read and write
270DA5A5000
trusted library allocation
page read and write
270E45D2000
trusted library allocation
page read and write
277460DF000
trusted library allocation
page read and write
493000
unkown
page execute and read and write
270DB6FE000
trusted library allocation
page read and write
270E22D0000
trusted library allocation
page read and write
270DAD49000
trusted library allocation
page read and write
270C9993000
heap
page read and write
A14000
heap
page read and write
2B1000
unkown
page execute and read and write
27746ACC000
trusted library allocation
page read and write
270DC99B000
trusted library allocation
page read and write
CA4000
heap
page read and write
64A1000
heap
page read and write
270D6726000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
CA4000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270DB018000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
A2000
unkown
page execute and read and write
27746926000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
3F0F000
stack
page read and write
27747300000
trusted library allocation
page read and write
270DA7A2000
trusted library allocation
page read and write
A14000
heap
page read and write
277E8920000
unclassified section
page readonly
270E2336000
trusted library allocation
page read and write
12CD024B5000
trusted library allocation
page read and write
270DF028000
trusted library allocation
page read and write
277365D0000
heap
page read and write
270DC2CE000
trusted library allocation
page read and write
27743D33000
trusted library allocation
page read and write
1C8CE000
stack
page read and write
16BBED1B000
trusted library allocation
page read and write
A14000
heap
page read and write
A15000
heap
page read and write
270CC711000
heap
page read and write
6916B3E000
unkown
page readonly
53D000
stack
page read and write
64A1000
heap
page read and write
B1A17BB000
stack
page read and write
270E201E000
trusted library allocation
page read and write
3D7F000
stack
page read and write
4220000
heap
page read and write
27748271000
trusted library allocation
page read and write
270E3FEE000
trusted library allocation
page read and write
29BF000
stack
page read and write
270CC704000
heap
page read and write
270DA66B000
trusted library allocation
page read and write
3E6000
unkown
page execute and write copy
64A1000
heap
page read and write
69E000
unkown
page execute and read and write
A14000
heap
page read and write
A14000
heap
page read and write
270DC2E2000
trusted library allocation
page read and write
270CC704000
heap
page read and write
27750F30000
trusted library allocation
page read and write
DC234BE000
stack
page read and write
4B31000
heap
page read and write
A14000
heap
page read and write
270D6CE6000
trusted library allocation
page read and write
A14000
heap
page read and write
28D6D000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
3A0F000
stack
page read and write
27746F27000
trusted library allocation
page read and write
23838AAB000
heap
page read and write
4BE0000
heap
page read and write
1954000
heap
page read and write
64A1000
heap
page read and write
270DA8A2000
trusted library allocation
page read and write
270DA5B4000
trusted library allocation
page read and write
64A1000
heap
page read and write
A15000
heap
page read and write
270E6E00000
trusted library allocation
page read and write
327E000
stack
page read and write
64A1000
heap
page read and write
270E21EE000
trusted library allocation
page read and write
DB4000
heap
page read and write
22D57000
heap
page read and write
4D31000
heap
page read and write
64A1000
heap
page read and write
23837D10000
trusted library allocation
page read and write
25AE000
stack
page read and write
27743BE3000
trusted library allocation
page read and write
5C9F000
stack
page read and write
23838A20000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
4D31000
heap
page read and write
270DA32E000
trusted library allocation
page read and write
270DA891000
trusted library allocation
page read and write
27747503000
trusted library allocation
page read and write
270DA215000
trusted library allocation
page read and write
4450000
heap
page read and write
61E00000
direct allocation
page execute and read and write
64A1000
heap
page read and write
DC1FBFE000
stack
page read and write
22C92000
heap
page read and write
64A1000
heap
page read and write
27743CEE000
trusted library allocation
page read and write
31973FF000
stack
page read and write
4B31000
heap
page read and write
CA4000
heap
page read and write
25AE000
stack
page read and write
F31000
heap
page read and write
270DA2B8000
trusted library allocation
page read and write
270E4493000
trusted library allocation
page read and write
4E24000
heap
page read and write
A14000
heap
page read and write
4B31000
heap
page read and write
F1E000
heap
page read and write
4B20000
direct allocation
page read and write
270E4B3F000
trusted library allocation
page read and write
1C99000
heap
page read and write
270D681D000
heap
page read and write
2774674D000
trusted library allocation
page read and write
2EF39000
heap
page read and write
270CC674000
heap
page read and write
54CB000
stack
page read and write
B4E000
heap
page read and write
A14000
heap
page read and write
24D5000
heap
page read and write
A14000
heap
page read and write
270E44FD000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270CC70A000
heap
page read and write
1580000
direct allocation
page read and write
27746625000
trusted library allocation
page read and write
27747BDF000
trusted library allocation
page read and write
270DA232000
trusted library allocation
page read and write
27747BE3000
trusted library allocation
page read and write
270D6819000
heap
page read and write
27747895000
trusted library allocation
page read and write
270E2226000
trusted library allocation
page read and write
49BE000
stack
page read and write
64A1000
heap
page read and write
4B31000
heap
page read and write
27746DE8000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
27745EA7000
trusted library allocation
page read and write
A14000
heap
page read and write
EB3000
heap
page read and write
2F6F000
stack
page read and write
2638000
heap
page read and write
4B31000
heap
page read and write
270DB5E9000
trusted library allocation
page read and write
A14000
heap
page read and write
270DBDCD000
trusted library allocation
page read and write
5150000
direct allocation
page execute and read and write
A14000
heap
page read and write
A14000
heap
page read and write
27746151000
trusted library allocation
page read and write
270DC600000
trusted library allocation
page read and write
A15000
heap
page read and write
64A1000
heap
page read and write
28D8B000
heap
page read and write
270DC82E000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270DA8E0000
trusted library allocation
page read and write
270E432E000
trusted library allocation
page read and write
414E000
stack
page read and write
A14000
heap
page read and write
270DA69B000
trusted library allocation
page read and write
3FFF000
stack
page read and write
270DEE02000
trusted library allocation
page read and write
A15000
heap
page read and write
4680000
heap
page read and write
277480D8000
trusted library allocation
page read and write
270E6E16000
trusted library allocation
page read and write
270D6C03000
trusted library allocation
page read and write
270DB0D1000
trusted library allocation
page read and write
270DB771000
trusted library allocation
page read and write
A14000
heap
page read and write
DC1A0FC000
stack
page read and write
5300000
direct allocation
page execute and read and write
A14000
heap
page read and write
270DC200000
trusted library allocation
page read and write
A14000
heap
page read and write
6A60000
heap
page read and write
ECE000
heap
page read and write
270E41DF000
trusted library allocation
page read and write
270DA85A000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
27744408000
trusted library allocation
page read and write
493000
unkown
page execute and read and write
27747AC2000
trusted library allocation
page read and write
270DAC1E000
trusted library allocation
page read and write
64A1000
heap
page read and write
4990000
direct allocation
page execute and read and write
36EF000
stack
page read and write
27747B96000
trusted library allocation
page read and write
270E23C8000
trusted library allocation
page read and write
270DCBD1000
trusted library allocation
page read and write
23838AB7000
heap
page read and write
2774723B000
trusted library allocation
page read and write
A14000
heap
page read and write
23838AAB000
heap
page read and write
4D31000
heap
page read and write
1F23000
heap
page read and write
62C000
unkown
page execute and read and write
388E000
stack
page read and write
1AA5000
heap
page read and write
23838AAB000
heap
page read and write
27747BFD000
trusted library allocation
page read and write
A14000
heap
page read and write
2FFF000
stack
page read and write
270CC704000
heap
page read and write
27747A80000
trusted library allocation
page read and write
2774810D000
trusted library allocation
page read and write
A14000
heap
page read and write
B1A41F4000
stack
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
270DCB03000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E4570000
trusted library allocation
page read and write
B58000
heap
page read and write
23837DE9000
trusted library allocation
page read and write
4381000
heap
page read and write
EE0000
heap
page read and write
DC1CAFE000
stack
page read and write
A14000
heap
page read and write
3B7E000
stack
page read and write
13D4000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
2774795B000
trusted library allocation
page read and write
27748273000
trusted library allocation
page read and write
13D4000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
27747B3E000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
A15000
heap
page read and write
64A1000
heap
page read and write
27736590000
heap
page read and write
23838A31000
heap
page read and write
2774351B000
heap
page read and write
270DC693000
trusted library allocation
page read and write
4110000
heap
page read and write
A14000
heap
page read and write
1C96E000
stack
page read and write
402000
unkown
page execute and read and write
A14000
heap
page read and write
DB4000
heap
page read and write
20C0000
heap
page read and write
270DA2A5000
trusted library allocation
page read and write
64A1000
heap
page read and write
28D0C000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
277393BD000
heap
page read and write
1CD1000
heap
page read and write
1C38000
heap
page read and write
16BBEB12000
trusted library allocation
page read and write
B1A06FE000
stack
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
27738BB0000
trusted library allocation
page read and write
27747B8D000
trusted library allocation
page read and write
270E5C6A000
trusted library allocation
page read and write
277471AE000
trusted library allocation
page read and write
CA4000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
27743DF6000
trusted library allocation
page read and write
A14000
heap
page read and write
277E8D91000
trusted library allocation
page read and write
3C3E000
stack
page read and write
23837B81000
unkown
page execute read
270E441D000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
4B00000
direct allocation
page execute and read and write
270D7980000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
26AF000
stack
page read and write
27746D9C000
trusted library allocation
page read and write
270DA233000
trusted library allocation
page read and write
270E4182000
trusted library allocation
page read and write
27746F6D000
trusted library allocation
page read and write
1C19000
heap
page read and write
27746D7A000
trusted library allocation
page read and write
277482BE000
trusted library allocation
page read and write
64A1000
heap
page read and write
62C000
unkown
page execute and read and write
EBF000
stack
page read and write
270DA903000
trusted library allocation
page read and write
532E000
stack
page read and write
4D30000
direct allocation
page execute and read and write
A14000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270DAA08000
trusted library allocation
page read and write
DC1AE78000
stack
page read and write
4370000
direct allocation
page read and write
A14000
heap
page read and write
277E8DC8000
trusted library allocation
page read and write
370F000
stack
page read and write
A14000
heap
page read and write
8414000
heap
page read and write
27743AC0000
heap
page read and write
A14000
heap
page read and write
35CF000
stack
page read and write
4810000
direct allocation
page read and write
A15000
heap
page read and write
270DB6F7000
trusted library allocation
page read and write
13D4000
heap
page read and write
270E45F6000
trusted library allocation
page read and write
64A1000
heap
page read and write
13D4000
heap
page read and write
2B1000
unkown
page execute and write copy
270DAF67000
trusted library allocation
page read and write
270DB100000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
2587000
heap
page read and write
64A1000
heap
page read and write
270DA2BE000
trusted library allocation
page read and write
4120000
heap
page read and write
270DA6A1000
trusted library allocation
page read and write
27738925000
trusted library allocation
page read and write
A14000
heap
page read and write
22C6F000
heap
page read and write
63A3000
heap
page read and write
CA4000
heap
page read and write
A15000
heap
page read and write
27747A45000
trusted library allocation
page read and write
277474B7000
trusted library allocation
page read and write
270E0B14000
trusted library allocation
page read and write
2773949F000
heap
page read and write
270E4463000
trusted library allocation
page read and write
847000
unkown
page execute and write copy
270DBF94000
trusted library allocation
page read and write
859000
unkown
page read and write
270CC70F000
heap
page read and write
A14000
heap
page read and write
23838A28000
heap
page read and write
270E0B10000
trusted library allocation
page read and write
B1A00FC000
stack
page read and write
270DDC87000
trusted library allocation
page read and write
27746C07000
trusted library allocation
page read and write
270E45F4000
trusted library allocation
page read and write
277432B6000
trusted library allocation
page read and write
27745F03000
trusted library allocation
page read and write
4B31000
heap
page read and write
270CC70E000
heap
page read and write
64A1000
heap
page read and write
42AF000
stack
page read and write
22C7D000
heap
page read and write
27746CCF000
trusted library allocation
page read and write
270E441A000
trusted library allocation
page read and write
64A1000
heap
page read and write
452F000
stack
page read and write
27743EF1000
trusted library allocation
page read and write
A14000
heap
page read and write
52B0000
direct allocation
page execute and read and write
A14000
heap
page read and write
27743E9C000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
2637000
heap
page read and write
270CC70E000
heap
page read and write
27736795000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
23838A21000
heap
page read and write
27747BCC000
trusted library allocation
page read and write
1C78D000
stack
page read and write
F16000
heap
page read and write
27746500000
trusted library allocation
page read and write
27747B6D000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
27746663000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
270D6600000
trusted library allocation
page read and write
270D6CDF000
trusted library allocation
page read and write
270E4024000
trusted library allocation
page read and write
270E2B28000
trusted library allocation
page read and write
277439A4000
trusted library allocation
page read and write
64A1000
heap
page read and write
270D6C85000
trusted library allocation
page read and write
4E2C000
direct allocation
page execute and read and write
27743B9E000
trusted library allocation
page read and write
64A1000
heap
page read and write
2774660D000
trusted library allocation
page read and write
A15000
heap
page read and write
27743758000
trusted library allocation
page read and write
27750AF0000
trusted library allocation
page read and write
2A6F000
stack
page read and write
2774356C000
heap
page read and write
22C6E000
heap
page read and write
64A1000
heap
page read and write
27742DB0000
trusted library section
page read and write
51A0000
direct allocation
page execute and read and write
270E5C59000
trusted library allocation
page read and write
27746A99000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
CA4000
heap
page read and write
270D7E04000
trusted library allocation
page read and write
64A1000
heap
page read and write
27747B8D000
trusted library allocation
page read and write
270E22E5000
trusted library allocation
page read and write
696000
unkown
page execute and read and write
270E0600000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DDA08000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
27743100000
trusted library allocation
page read and write
DE0000
heap
page read and write
270D6CB3000
trusted library allocation
page read and write
3FAE000
stack
page read and write
4C20000
trusted library allocation
page read and write
270E40FD000
trusted library allocation
page read and write
B0B000
unkown
page execute and write copy
4B20000
direct allocation
page read and write
270DDB5C000
trusted library allocation
page read and write
13D4000
heap
page read and write
64A1000
heap
page read and write
42BF000
stack
page read and write
B1A07BC000
stack
page read and write
41BE000
stack
page read and write
1F34000
heap
page read and write
46AE000
stack
page read and write
277E8F1D000
trusted library allocation
page read and write
270CC621000
heap
page read and write
27742E9E000
trusted library allocation
page read and write
270E2121000
trusted library allocation
page read and write
3DFE000
stack
page read and write
64A1000
heap
page read and write
1954000
heap
page read and write
64A1000
heap
page read and write
DC1A38A000
stack
page read and write
64A1000
heap
page read and write
A80000
heap
page read and write
4D30000
heap
page read and write
4681000
heap
page read and write
27746211000
trusted library allocation
page read and write
DB4000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270DB6FD000
trusted library allocation
page read and write
23838A98000
heap
page read and write
27747B7B000
trusted library allocation
page read and write
27743BCD000
trusted library allocation
page read and write
23837DBA000
trusted library allocation
page read and write
B1A3FFE000
stack
page read and write
4B31000
heap
page read and write
270DB95D000
trusted library allocation
page read and write
270C9B03000
trusted library allocation
page read and write
270DCBEC000
trusted library allocation
page read and write
64A1000
heap
page read and write
270D6DA5000
trusted library allocation
page read and write
DC207EE000
stack
page read and write
277E8DAB000
trusted library allocation
page read and write
A14000
heap
page read and write
13D4000
heap
page read and write
270E44DC000
trusted library allocation
page read and write
270D6CA2000
trusted library allocation
page read and write
270D8508000
trusted library allocation
page read and write
64A1000
heap
page read and write
B0E000
heap
page read and write
270DA329000
trusted library allocation
page read and write
A14000
heap
page read and write
270DC763000
trusted library allocation
page read and write
4B31000
heap
page read and write
247E000
heap
page read and write
A14000
heap
page read and write
277482A4000
trusted library allocation
page read and write
4B31000
heap
page read and write
2071000
heap
page read and write
64A1000
heap
page read and write
B1A27FE000
stack
page read and write
DB4000
heap
page read and write
A9000
unkown
page write copy
270D6726000
trusted library allocation
page read and write
270E6E93000
trusted library allocation
page read and write
270DDABC000
trusted library allocation
page read and write
2383899F000
heap
page read and write
277393B0000
heap
page read and write
27744209000
trusted library allocation
page read and write
7E0000
direct allocation
page read and write
4CA0000
direct allocation
page execute and read and write
64A1000
heap
page read and write
277E9349000
heap
page read and write
2383899C000
heap
page read and write
A14000
heap
page read and write
270CC70A000
heap
page read and write
CA4000
heap
page read and write
6702000
heap
page read and write
64A1000
heap
page read and write
22C67000
heap
page read and write
A14000
heap
page read and write
270DAD1C000
trusted library allocation
page read and write
280F000
stack
page read and write
27747A7A000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
270D8120000
trusted library section
page readonly
64A1000
heap
page read and write
CA4000
heap
page read and write
AC1000
unkown
page execute and read and write
A14000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
270DA891000
trusted library allocation
page read and write
270E0B0E000
trusted library allocation
page read and write
3E2F000
stack
page read and write
27747537000
trusted library allocation
page read and write
27747BDA000
trusted library allocation
page read and write
1410000
direct allocation
page read and write
4B50000
direct allocation
page execute and read and write
5050000
trusted library allocation
page read and write
64A1000
heap
page read and write
277385D0000
trusted library section
page read and write
44CF000
stack
page read and write
A14000
heap
page read and write
270DA6A1000
trusted library allocation
page read and write
270DB8ED000
trusted library allocation
page read and write
15EF000
heap
page read and write
270E44ED000
trusted library allocation
page read and write
5340000
direct allocation
page execute and read and write
A14000
heap
page read and write
5021000
direct allocation
page read and write
D10000
direct allocation
page read and write
DB4000
heap
page read and write
DB4000
heap
page read and write
A14000
heap
page read and write
2774420F000
trusted library allocation
page read and write
277472CD000
trusted library allocation
page read and write
1954000
heap
page read and write
A14000
heap
page read and write
42FE000
stack
page read and write
A14000
heap
page read and write
1954000
heap
page read and write
A14000
heap
page read and write
AE1000
heap
page read and write
270DA8B4000
trusted library allocation
page read and write
409000
unkown
page write copy
270E4012000
trusted library allocation
page read and write
B1A8BBF000
stack
page read and write
126E000
stack
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
270CC709000
heap
page read and write
4D50000
heap
page read and write
A14000
heap
page read and write
27748289000
trusted library allocation
page read and write
A14000
heap
page read and write
A15000
heap
page read and write
B1A8BFE000
stack
page read and write
4C2E000
stack
page read and write
270DA885000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
27746B33000
trusted library allocation
page read and write
64A1000
heap
page read and write
9C000
stack
page read and write
852000
unkown
page execute and read and write
19B8000
heap
page read and write
64A1000
heap
page read and write
CA4000
heap
page read and write
2C4F000
stack
page read and write
270DDB18000
trusted library allocation
page read and write
270DA1FA000
trusted library allocation
page read and write
2774609E000
trusted library allocation
page read and write
270D67E3000
trusted library allocation
page read and write
2F50000
direct allocation
page read and write
2774E432000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
270E20C6000
trusted library allocation
page read and write
360000
unkown
page readonly
27750AF3000
trusted library allocation
page read and write
A14000
heap
page read and write
26CF000
stack
page read and write
22C77000
heap
page read and write
DC23EFE000
stack
page read and write
11D0000
heap
page read and write
D10000
direct allocation
page read and write
64A1000
heap
page read and write
158A7B00000
trusted library allocation
page read and write
1B47000
heap
page read and write
A14000
heap
page read and write
238389BF000
heap
page read and write
270E3F22000
trusted library allocation
page read and write
8DC000
unkown
page execute and read and write
A14000
heap
page read and write
427000
unkown
page write copy
DFE000
stack
page read and write
847000
unkown
page execute and write copy
270DA7EE000
trusted library allocation
page read and write
64A1000
heap
page read and write
4B31000
heap
page read and write
27747992000
trusted library allocation
page read and write
64A1000
heap
page read and write
23838A98000
heap
page read and write
27747BC5000
trusted library allocation
page read and write
A9E000
heap
page read and write
49E0000
direct allocation
page execute and read and write
270DB76D000
trusted library allocation
page read and write
40F0000
heap
page read and write
270DBC13000
trusted library allocation
page read and write
270DBE64000
trusted library allocation
page read and write
45AF000
stack
page read and write
64A1000
heap
page read and write
270D6713000
trusted library allocation
page read and write
A14000
heap
page read and write
4C86000
heap
page read and write
4B31000
heap
page read and write
27743D90000
trusted library allocation
page read and write
500000
unkown
page execute and read and write
2A47000
heap
page read and write
277438DA000
trusted library allocation
page read and write
DB4000
heap
page read and write
270DA10B000
trusted library allocation
page read and write
356F000
stack
page read and write
1410000
direct allocation
page read and write
64A1000
heap
page read and write
A15000
heap
page read and write
27747B90000
trusted library allocation
page read and write
270CC704000
heap
page read and write
19C4000
heap
page read and write
41AE000
stack
page read and write
270DB74F000
trusted library allocation
page read and write
B81000
unkown
page execute and write copy
2040000
heap
page read and write
22C77000
heap
page read and write
DA0000
direct allocation
page execute and read and write
270DB8E2000
trusted library allocation
page read and write
270E4B04000
trusted library allocation
page read and write
6060000
heap
page read and write
64A1000
heap
page read and write
277513CA000
trusted library allocation
page read and write
A14000
heap
page read and write
B1A17FC000
stack
page read and write
A14000
heap
page read and write
1954000
heap
page read and write
270CC674000
heap
page read and write
270DC85A000
trusted library allocation
page read and write
1294000
heap
page read and write
270E219F000
trusted library allocation
page read and write
4681000
heap
page read and write
A14000
heap
page read and write
22C69000
heap
page read and write
270D6D9D000
trusted library allocation
page read and write
23837910000
unclassified section
page readonly
A14000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
62B000
unkown
page execute and read and write
27736700000
heap
page read and write
A14000
heap
page read and write
4B31000
heap
page read and write
270DA8CB000
trusted library allocation
page read and write
2014000
heap
page read and write
270DA69B000
trusted library allocation
page read and write
64A1000
heap
page read and write
2774E432000
trusted library allocation
page read and write
270D662F000
trusted library allocation
page read and write
27743DC6000
trusted library allocation
page read and write
4B31000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
5330000
direct allocation
page execute and read and write
2774324D000
trusted library allocation
page read and write
16BBED0C000
trusted library allocation
page read and write
5330000
direct allocation
page execute and read and write
13D0000
heap
page read and write
270D7C92000
trusted library allocation
page read and write
270DAD0A000
trusted library allocation
page read and write
270E4B14000
trusted library allocation
page read and write
23838941000
heap
page read and write
A14000
heap
page read and write
A15000
heap
page read and write
64A1000
heap
page read and write
23838AB7000
heap
page read and write
64A1000
heap
page read and write
4E30000
trusted library allocation
page read and write
3F4E000
stack
page read and write
277388C7000
trusted library allocation
page read and write
4B20000
direct allocation
page read and write
64A1000
heap
page read and write
27744200000
trusted library allocation
page read and write
A14000
heap
page read and write
27746E03000
trusted library allocation
page read and write
1CBA0000
trusted library allocation
page read and write
13D4000
heap
page read and write
270DA756000
trusted library allocation
page read and write
52EB000
stack
page read and write
64A1000
heap
page read and write
270DC7ED000
trusted library allocation
page read and write
270DDC56000
trusted library allocation
page read and write
270CC610000
heap
page read and write
A14000
heap
page read and write
27746F89000
trusted library allocation
page read and write
7F0000
unkown
page read and write
2009000
heap
page read and write
270DBF55000
trusted library allocation
page read and write
2A40000
heap
page read and write
64A1000
heap
page read and write
5B8D000
stack
page read and write
DB4000
heap
page read and write
270DDA7B000
trusted library allocation
page read and write
23837B70000
trusted library allocation
page read and write
4370000
direct allocation
page read and write
11FF000
heap
page read and write
270DA513000
trusted library allocation
page read and write
228F000
heap
page read and write
39EF000
stack
page read and write
270DCBE5000
trusted library allocation
page read and write
270DA5A8000
trusted library allocation
page read and write
270D8B09000
trusted library allocation
page read and write
27747F03000
trusted library allocation
page read and write
270DC2C2000
trusted library allocation
page read and write
248D000
heap
page execute and read and write
270E4120000
trusted library allocation
page read and write
270DB4C0000
trusted library section
page read and write
4D31000
heap
page read and write
DC19F8A000
stack
page read and write
4F54000
direct allocation
page execute and read and write
CA4000
heap
page read and write
270D60DF000
trusted library allocation
page read and write
270E2059000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270D8B1B000
trusted library allocation
page read and write
CA4000
heap
page read and write
277432BA000
trusted library allocation
page read and write
4C40000
direct allocation
page execute and read and write
27743D2A000
trusted library allocation
page read and write
270E454F000
trusted library allocation
page read and write
64A1000
heap
page read and write
27743B03000
trusted library allocation
page read and write
151E000
stack
page read and write
270DBF65000
trusted library allocation
page read and write
1252B73FE000
trusted library allocation
page read and write
270DA865000
trusted library allocation
page read and write
27743FDF000
unclassified section
page read and write
2EFE000
stack
page read and write
20AE000
heap
page read and write
27747A67000
trusted library allocation
page read and write
64A1000
heap
page read and write
550E000
stack
page read and write
270DCB9B000
trusted library allocation
page read and write
27750ADF000
trusted library allocation
page read and write
A15000
heap
page read and write
64A1000
heap
page read and write
4D31000
heap
page read and write
270E4100000
trusted library allocation
page read and write
27747BDF000
trusted library allocation
page read and write
27746203000
trusted library allocation
page read and write
158A7ADE000
heap
page read and write
A14000
heap
page read and write
4286000
heap
page read and write
277465B2000
trusted library allocation
page read and write
2DBE000
stack
page read and write
A14000
heap
page read and write
19C4000
heap
page read and write
270D7E00000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
4BE6000
heap
page read and write
A14000
heap
page read and write
27743700000
trusted library allocation
page read and write
A14000
heap
page read and write
7060000
heap
page read and write
74D6481000
trusted library allocation
page execute read
F8A33FE000
stack
page read and write
A14000
heap
page read and write
2774806B000
trusted library allocation
page read and write
22C85000
heap
page read and write
270DA9F4000
trusted library allocation
page read and write
A15000
heap
page read and write
4C50000
heap
page read and write
270D6924000
heap
page read and write
270E0B20000
trusted library allocation
page read and write
270E5C8E000
trusted library allocation
page read and write
270E4577000
trusted library allocation
page read and write
270E45DB000
trusted library allocation
page read and write
277479AB000
trusted library allocation
page read and write
DC1AEFE000
stack
page read and write
27747C63000
trusted library allocation
page read and write
64A1000
heap
page read and write
270D8700000
trusted library allocation
page read and write
64A1000
heap
page read and write
270CC71B000
heap
page read and write
27744C88000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
277462CB000
trusted library allocation
page read and write
270DC7F8000
trusted library allocation
page read and write
1B40000
heap
page read and write
270D6775000
trusted library allocation
page read and write
270DB8D7000
trusted library allocation
page read and write
277438F2000
trusted library allocation
page read and write
16BBE910000
unclassified section
page read and write
E40000
heap
page read and write
4D31000
heap
page read and write
270D6CB7000
trusted library allocation
page read and write
322E000
stack
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
1E3B000
heap
page read and write
27742E98000
trusted library allocation
page read and write
270CC70F000
heap
page read and write
27748235000
trusted library allocation
page read and write
A14000
heap
page read and write
1252B7304000
trusted library allocation
page read and write
A14000
heap
page read and write
1F62000
heap
page read and write
20CCD0A04000
trusted library allocation
page read and write
270C9B00000
trusted library allocation
page read and write
270E44DA000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
270DA5B5000
trusted library allocation
page read and write
4A00000
direct allocation
page execute and read and write
270DC4F0000
unclassified section
page read and write
16BBEBB4000
trusted library allocation
page read and write
27743A80000
trusted library section
page readonly
270DEE11000
trusted library allocation
page read and write
270DDB03000
trusted library allocation
page read and write
277E8DB5000
trusted library allocation
page read and write
27750AE5000
trusted library allocation
page read and write
4D31000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
33CF000
stack
page read and write
A14000
heap
page read and write
270D8090000
unclassified section
page read and write
270CC71A000
heap
page read and write
A14000
heap
page read and write
27747BEF000
trusted library allocation
page read and write
313E000
stack
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
A15000
heap
page read and write
2134000
heap
page read and write
270DC70C000
trusted library allocation
page read and write
270E41DF000
trusted library allocation
page read and write
270D8600000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
510F000
stack
page read and write
270E0114000
trusted library allocation
page read and write
277437C0000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
5CD5000
heap
page read and write
88BC000
stack
page read and write
64A1000
heap
page read and write
270DB11A000
trusted library allocation
page read and write
A14000
heap
page read and write
2A30000
direct allocation
page read and write
270E2037000
trusted library allocation
page read and write
A14000
heap
page read and write
270DA1B0000
trusted library allocation
page read and write
270D6800000
heap
page read and write
6A6E000
heap
page read and write
277469AA000
trusted library allocation
page read and write
4B31000
heap
page read and write
27747E03000
trusted library allocation
page read and write
270DB003000
trusted library allocation
page read and write
4AF0000
direct allocation
page execute and read and write
270DF010000
trusted library allocation
page read and write
270E2312000
trusted library allocation
page read and write
27742F71000
trusted library allocation
page read and write
270DDAEB000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270E0B04000
trusted library allocation
page read and write
2773892D000
trusted library allocation
page read and write
5DEE000
stack
page read and write
270DAED7000
trusted library allocation
page read and write
4C90000
direct allocation
page execute and read and write
A14000
heap
page read and write
270DC29A000
trusted library allocation
page read and write
270CC674000
heap
page read and write
27750AD2000
trusted library allocation
page read and write
277E8A82000
unclassified section
page read and write
270E22DB000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E2173000
trusted library allocation
page read and write
270DB06C000
trusted library allocation
page read and write
270DAECC000
trusted library allocation
page read and write
DC234FF000
stack
page read and write
64A1000
heap
page read and write
270DB259000
trusted library allocation
page read and write
A14000
heap
page read and write
27747B96000
trusted library allocation
page read and write
270E226E000
trusted library allocation
page read and write
270DA400000
trusted library allocation
page read and write
A14000
heap
page read and write
1FA6000
heap
page read and write
1954000
heap
page read and write
270E23A2000
trusted library allocation
page read and write
23837B88000
unkown
page execute read
CA9000
unkown
page execute and write copy
1EA3000
heap
page read and write
27743EC1000
trusted library allocation
page read and write
2DCE000
stack
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
14DE000
stack
page read and write
22C5B000
heap
page read and write
351FC000
stack
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
263FF9C9000
heap
page read and write
2774733A000
trusted library allocation
page read and write
270DA2B1000
trusted library allocation
page read and write
270DC87E000
trusted library allocation
page read and write
270DB7DA000
trusted library allocation
page read and write
270D7E63000
trusted library allocation
page read and write
27743776000
trusted library allocation
page read and write
5CED000
stack
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
27742E81000
trusted library allocation
page read and write
A14000
heap
page read and write
3B0E000
stack
page read and write
270E2221000
trusted library allocation
page read and write
256B000
heap
page read and write
90BC000
stack
page read and write
64A1000
heap
page read and write
270DBF69000
trusted library allocation
page read and write
277465BC000
trusted library allocation
page read and write
270D67BF000
trusted library allocation
page read and write
A14000
heap
page read and write
27743BB1000
trusted library allocation
page read and write
270D7EEF000
trusted library allocation
page read and write
27746B6B000
trusted library allocation
page read and write
A14000
heap
page read and write
270DCBEC000
trusted library allocation
page read and write
270DC847000
trusted library allocation
page read and write
270DA6CA000
trusted library allocation
page read and write
A14000
heap
page read and write
270DCBEC000
trusted library allocation
page read and write
270DDC6A000
trusted library allocation
page read and write
19C4000
heap
page read and write
2774827D000
trusted library allocation
page read and write
4A20000
direct allocation
page execute and read and write
27746B77000
trusted library allocation
page read and write
27745DA0000
trusted library section
page readonly
270E417B000
trusted library allocation
page read and write
27747BE3000
trusted library allocation
page read and write
27746303000
trusted library allocation
page read and write
27747BA5000
trusted library allocation
page read and write
27748230000
trusted library allocation
page read and write
270CC70E000
heap
page read and write
270E4105000
trusted library allocation
page read and write
1F49000
heap
page read and write
270DADB1000
trusted library allocation
page read and write
270CC728000
heap
page read and write
270E20F6000
trusted library allocation
page read and write
27746336000
trusted library allocation
page read and write
277482E8000
trusted library allocation
page read and write
27747305000
trusted library allocation
page read and write
2773943D000
heap
page read and write
A14000
heap
page read and write
270E448A000
trusted library allocation
page read and write
4D31000
heap
page read and write
7F0000
unkown
page readonly
64A1000
heap
page read and write
270E3F9D000
trusted library allocation
page read and write
A14000
heap
page read and write
277470E6000
trusted library allocation
page read and write
27747BEF000
trusted library allocation
page read and write
270C9BE7000
trusted library allocation
page read and write
A14000
heap
page read and write
270DA673000
trusted library allocation
page read and write
22C92000
heap
page read and write
64A1000
heap
page read and write
270DA5F9000
trusted library allocation
page read and write
277513B9000
trusted library allocation
page read and write
4B31000
heap
page read and write
27745E00000
trusted library allocation
page read and write
FF2A0000
direct allocation
page execute and read and write
64A1000
heap
page read and write
27743BDF000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E45A6000
trusted library allocation
page read and write
161F000
stack
page read and write
DB4000
heap
page read and write
270DA5CF000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DB82F000
trusted library allocation
page read and write
270E45CD000
trusted library allocation
page read and write
270DF022000
trusted library allocation
page read and write
158A954B000
heap
page read and write
277467ED000
trusted library allocation
page read and write
A14000
heap
page read and write
270E44AC000
trusted library allocation
page read and write
277E8F32000
trusted library allocation
page read and write
2773896A000
trusted library allocation
page read and write
27747BDA000
trusted library allocation
page read and write
AFB000
unkown
page execute and read and write
A14000
heap
page read and write
13D4000
heap
page read and write
64A1000
heap
page read and write
270DCB99000
trusted library allocation
page read and write
464E000
stack
page read and write
277467D7000
trusted library allocation
page read and write
270DB932000
trusted library allocation
page read and write
270DC7D4000
trusted library allocation
page read and write
27742EC6000
trusted library allocation
page read and write
270D7C73000
trusted library allocation
page read and write
270E4B12000
trusted library allocation
page read and write
270DAF08000
trusted library allocation
page read and write
4CB1000
heap
page read and write
270DF00A000
trusted library allocation
page read and write
27739401000
heap
page read and write
3C2E000
stack
page read and write
27747B7B000
trusted library allocation
page read and write
270DB923000
trusted library allocation
page read and write
26098CD04000
trusted library allocation
page read and write
270DA2BE000
trusted library allocation
page read and write
270DC835000
trusted library allocation
page read and write
1294000
heap
page read and write
427000
unkown
page write copy
270DBF8C000
trusted library allocation
page read and write
B63000
heap
page read and write
1C39000
heap
page read and write
270DA14A000
trusted library allocation
page read and write
4B40000
heap
page read and write
270D6CD4000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270D79D9000
trusted library allocation
page read and write
21B8000
heap
page read and write
6066000
heap
page read and write
277439FD000
trusted library allocation
page read and write
270E239C000
trusted library allocation
page read and write
CA4000
heap
page read and write
270E4380000
trusted library allocation
page read and write
270E0B1C000
trusted library allocation
page read and write
27747500000
trusted library allocation
page read and write
27747B8B000
trusted library allocation
page read and write
270DB041000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
A15000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
270E45AE000
trusted library allocation
page read and write
270DA2A8000
trusted library allocation
page read and write
270DA8B4000
trusted library allocation
page read and write
64A1000
heap
page read and write
27742FE2000
trusted library allocation
page read and write
270CC702000
heap
page read and write
27743C88000
trusted library allocation
page read and write
27747C82000
trusted library allocation
page read and write
34FE000
stack
page read and write
270CC70E000
heap
page read and write
270E41A1000
trusted library allocation
page read and write
A14000
heap
page read and write
1D27000
heap
page read and write
27746D9F000
trusted library allocation
page read and write
4B31000
heap
page read and write
270E2520000
trusted library section
page read and write
27746BE5000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
27746536000
trusted library allocation
page read and write
4501000
heap
page read and write
D10000
direct allocation
page read and write
27747B0D000
trusted library allocation
page read and write
27743DA2000
trusted library allocation
page read and write
27746407000
trusted library allocation
page read and write
270E4B2A000
trusted library allocation
page read and write
64A1000
heap
page read and write
6630000
heap
page read and write
27743783000
trusted library allocation
page read and write
27745F00000
trusted library allocation
page read and write
A15000
heap
page read and write
270DA595000
trusted library allocation
page read and write
27747BEE000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DB05D000
trusted library allocation
page read and write
2383899F000
heap
page read and write
270DCBB9000
trusted library allocation
page read and write
270DAE01000
trusted library allocation
page read and write
270DC9F0000
trusted library allocation
page read and write
A14000
heap
page read and write
22C6A000
heap
page read and write
270DBF36000
trusted library allocation
page read and write
DB4000
heap
page read and write
CA4000
heap
page read and write
2108000
heap
page read and write
23838A31000
heap
page read and write
23838A99000
heap
page read and write
27747A97000
trusted library allocation
page read and write
DC240FF000
stack
page read and write
A14000
heap
page read and write
270D6603000
trusted library allocation
page read and write
22C85000
heap
page read and write
215A000
heap
page read and write
27743D8A000
trusted library allocation
page read and write
6C640000
unkown
page readonly
270DB603000
trusted library allocation
page read and write
A14000
heap
page read and write
27BF000
stack
page read and write
27738260000
heap
page read and write
270DAD50000
trusted library allocation
page read and write
27748132000
trusted library allocation
page read and write
A14000
heap
page read and write
27743203000
trusted library allocation
page read and write
27747A83000
trusted library allocation
page read and write
27743EF2000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
270DC27E000
trusted library allocation
page read and write
270D6710000
trusted library allocation
page read and write
270DC6D2000
trusted library allocation
page read and write
412E000
stack
page read and write
6C7DF000
unkown
page readonly
23838A61000
heap
page read and write
27746C33000
trusted library allocation
page read and write
1EE9000
heap
page read and write
64A1000
heap
page read and write
4B0F000
stack
page read and write
27745D80000
trusted library section
page readonly
270E45F4000
trusted library allocation
page read and write
64A1000
heap
page read and write
5050000
trusted library allocation
page read and write
25FE000
stack
page read and write
2C7E000
stack
page read and write
A15000
heap
page read and write
27743ECC000
trusted library allocation
page read and write
27743DF6000
trusted library allocation
page read and write
2774658B000
trusted library allocation
page read and write
4370000
direct allocation
page read and write
64A1000
heap
page read and write
23838AB7000
heap
page read and write
4C50000
direct allocation
page execute and read and write
16BBEBEB000
trusted library allocation
page read and write
270E41BC000
trusted library allocation
page read and write
27747B55000
trusted library allocation
page read and write
B1A8F7B000
stack
page read and write
64A1000
heap
page read and write
270D870A000
trusted library allocation
page read and write
4B31000
heap
page read and write
346E000
stack
page read and write
277367B0000
heap
page read and write
1954000
heap
page read and write
4D31000
heap
page read and write
270DC28D000
trusted library allocation
page read and write
16BBE780000
heap
page read and write
270DCC09000
trusted library allocation
page read and write
27736830000
trusted library allocation
page read and write
270E41EB000
trusted library allocation
page read and write
4B31000
heap
page read and write
6EC0000
heap
page read and write
27746A4A000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DC6BF000
trusted library allocation
page read and write
270D677D000
trusted library allocation
page read and write
A14000
heap
page read and write
52B0000
direct allocation
page execute and read and write
B1A67FB000
stack
page read and write
27747BA5000
trusted library allocation
page read and write
27748273000
trusted library allocation
page read and write
B2F000
heap
page read and write
270E3FC5000
trusted library allocation
page read and write
69169FE000
unkown
page readonly
4D31000
heap
page read and write
270DCBCC000
trusted library allocation
page read and write
270DA5AC000
trusted library allocation
page read and write
4C80000
direct allocation
page execute and read and write
61AF000
stack
page read and write
277389A0000
trusted library allocation
page read and write
CA4000
heap
page read and write
270D6D57000
trusted library allocation
page read and write
27739453000
heap
page read and write
23838A28000
heap
page read and write
27746103000
trusted library allocation
page read and write
A15000
heap
page read and write
270DB0A5000
trusted library allocation
page read and write
27747B9B000
trusted library allocation
page read and write
270E40C7000
trusted library allocation
page read and write
22C84000
heap
page read and write
23838A7B000
heap
page read and write
270DA8A9000
trusted library allocation
page read and write
277469BF000
trusted library allocation
page read and write
B1A73FD000
stack
page read and write
2774E400000
trusted library allocation
page read and write
63A0000
heap
page read and write
27746703000
trusted library allocation
page read and write
407E000
stack
page read and write
270DBF3A000
trusted library allocation
page read and write
64A1000
heap
page read and write
2A30000
direct allocation
page read and write
64A1000
heap
page read and write
354E000
stack
page read and write
3CB000
unkown
page execute and read and write
2AAE000
stack
page read and write
270DB2CB000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
27739468000
heap
page read and write
829A50E000
unkown
page readonly
270DA2F1000
trusted library allocation
page read and write
270D621E000
trusted library allocation
page read and write
13D4000
heap
page read and write
A14000
heap
page read and write
277476E9000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
27747AA3000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
27746DE4000
trusted library allocation
page read and write
1F4E000
heap
page read and write
64A1000
heap
page read and write
829A4CD000
stack
page read and write
443E000
stack
page read and write
5170000
heap
page read and write
19C4000
heap
page read and write
238389AC000
heap
page read and write
22C71000
heap
page read and write
270DB7BB000
trusted library allocation
page read and write
A14000
heap
page read and write
B1A977F000
unkown
page read and write
270DA77D000
trusted library allocation
page read and write
270E44FA000
trusted library allocation
page read and write
2D80000
heap
page read and write
27747631000
trusted library allocation
page read and write
1410000
direct allocation
page read and write
CA4000
heap
page read and write
22C77000
heap
page read and write
38FE000
stack
page read and write
270DA69B000
trusted library allocation
page read and write
A14000
heap
page read and write
270CC6A2000
heap
page read and write
27736892000
trusted library allocation
page read and write
A14000
heap
page read and write
1C54F000
stack
page read and write
27747BDF000
trusted library allocation
page read and write
270DB0E4000
trusted library allocation
page read and write
270E0B0C000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
2561000
heap
page read and write
270DB270000
trusted library allocation
page read and write
B1A003B000
stack
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
66B000
unkown
page execute and read and write
3F50000
heap
page read and write
277513CC000
trusted library allocation
page read and write
22C93000
heap
page read and write
270DDBC1000
trusted library allocation
page read and write
19A3000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
5150000
direct allocation
page execute and read and write
2A30000
direct allocation
page read and write
270E3F4E000
trusted library allocation
page read and write
FED60000
direct allocation
page execute and read and write
270DA891000
trusted library allocation
page read and write
B1A8EBF000
stack
page read and write
1C49F000
stack
page read and write
270DADFB000
trusted library allocation
page read and write
639C000
stack
page read and write
270E45BA000
trusted library allocation
page read and write
F8A11D8000
stack
page read and write
A14000
heap
page read and write
27743B63000
trusted library allocation
page read and write
270DC264000
trusted library allocation
page read and write
270DB4BF000
unclassified section
page read and write
27743FB0000
trusted library section
page readonly
270D671E000
trusted library allocation
page read and write
A14000
heap
page read and write
27743790000
trusted library allocation
page read and write
1CAA1000
heap
page read and write
64A1000
heap
page read and write
F8A2AFB000
stack
page read and write
13D4000
heap
page read and write
27746DD2000
trusted library allocation
page read and write
A14000
heap
page read and write
22C77000
heap
page read and write
270D61F1000
trusted library allocation
page read and write
270DC29E000
trusted library allocation
page read and write
270E42FC000
trusted library allocation
page read and write
A14000
heap
page read and write
27736847000
trusted library allocation
page read and write
24E4000
heap
page read and write
A14000
heap
page read and write
270E44AD000
trusted library allocation
page read and write
27743B0F000
trusted library allocation
page read and write
2A30000
direct allocation
page read and write
270D8BE9000
trusted library allocation
page read and write
22C7D000
heap
page read and write
270E5C9B000
trusted library allocation
page read and write
27746664000
trusted library allocation
page read and write
270E3D00000
trusted library allocation
page read and write
1C64F000
stack
page read and write
B0A000
unkown
page execute and write copy
DC1AF8E000
stack
page read and write
64A1000
heap
page read and write
277431FB000
trusted library allocation
page read and write
270CC71B000
heap
page read and write
1B88000
heap
page read and write
A14000
heap
page read and write
DC1AE7A000
stack
page read and write
27747B9B000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
5190000
direct allocation
page execute and read and write
270E44DC000
trusted library allocation
page read and write
A14000
heap
page read and write
270E4054000
trusted library allocation
page read and write
64A1000
heap
page read and write
27747166000
trusted library allocation
page read and write
4D31000
heap
page read and write
A14000
heap
page read and write
2D8B000
heap
page read and write
27738951000
trusted library allocation
page read and write
4F54000
direct allocation
page execute and read and write
270DB96F000
trusted library allocation
page read and write
22C85000
heap
page read and write
64A1000
heap
page read and write
277480F9000
trusted library allocation
page read and write
3A4E000
stack
page read and write
64A1000
heap
page read and write
270DB27D000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
263FF8A0000
heap
page read and write
270D61E4000
trusted library allocation
page read and write
270E41B2000
trusted library allocation
page read and write
64A1000
heap
page read and write
270CC718000
heap
page read and write
270C9B68000
trusted library allocation
page read and write
6AD000
unkown
page execute and write copy
2774787C000
trusted library allocation
page read and write
13D4000
heap
page read and write
4CB0000
heap
page read and write
27746FC1000
trusted library allocation
page read and write
A15000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270CC704000
heap
page read and write
A14000
heap
page read and write
4D31000
heap
page read and write
3DD000
unkown
page readonly
270CC704000
heap
page read and write
270DA810000
trusted library allocation
page read and write
53A0000
direct allocation
page execute and read and write
27738900000
trusted library allocation
page read and write
270DCB55000
trusted library allocation
page read and write
27747B5E000
trusted library allocation
page read and write
A14000
heap
page read and write
13D4000
heap
page read and write
270DA72C000
trusted library allocation
page read and write
27747983000
trusted library allocation
page read and write
27744709000
trusted library allocation
page read and write
270DA262000
trusted library allocation
page read and write
270D8909000
trusted library allocation
page read and write
270DA5E7000
trusted library allocation
page read and write
4B31000
heap
page read and write
90BC000
stack
page read and write
277393F5000
heap
page read and write
270DAA1D000
trusted library allocation
page read and write
66CD000
heap
page read and write
CA7000
unkown
page execute and read and write
27747529000
trusted library allocation
page read and write
270DC74B000
trusted library allocation
page read and write
270E41CB000
trusted library allocation
page read and write
19C4000
heap
page read and write
2600000
heap
page read and write
30EF000
stack
page read and write
27746F9D000
trusted library allocation
page read and write
398F000
stack
page read and write
23C21FE000
stack
page read and write
64A1000
heap
page read and write
27747BCC000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DCA70000
trusted library allocation
page read and write
A14000
heap
page read and write
27747BCC000
trusted library allocation
page read and write
23837B0A000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
1954000
heap
page read and write
270DDB27000
trusted library allocation
page read and write
22C9D000
heap
page read and write
27747BC5000
trusted library allocation
page read and write
13D4000
heap
page read and write
27738965000
trusted library allocation
page read and write
270DC2DA000
trusted library allocation
page read and write
A14000
heap
page read and write
CA4000
heap
page read and write
277E8990000
remote allocation
page read and write
64A1000
heap
page read and write
27747DD0000
trusted library section
page read and write
270DCA13000
trusted library allocation
page read and write
27743DDA000
trusted library allocation
page read and write
27742E98000
trusted library allocation
page read and write
22C75000
heap
page read and write
4ABF000
stack
page read and write
A14000
heap
page read and write
270E5C70000
trusted library allocation
page read and write
1BE6000
heap
page read and write
270D80A0000
trusted library section
page read and write
27742E81000
trusted library allocation
page read and write
270E41CB000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
B1A173D000
stack
page read and write
A14000
heap
page read and write
A15000
heap
page read and write
DB4000
heap
page read and write
456E000
stack
page read and write
270DA881000
trusted library allocation
page read and write
64A1000
heap
page read and write
4381000
heap
page read and write
1270000
heap
page read and write
5310000
direct allocation
page execute and read and write
1C7EE000
stack
page read and write
27742E9E000
trusted library allocation
page read and write
27743EA4000
trusted library allocation
page read and write
B1A073E000
stack
page read and write
1C25E000
stack
page read and write
A14000
heap
page read and write
CA4000
heap
page read and write
270DF00E000
trusted library allocation
page read and write
270E41AC000
trusted library allocation
page read and write
27746F93000
trusted library allocation
page read and write
52E0000
direct allocation
page execute and read and write
AB000
unkown
page execute and read and write
CA4000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
4500000
heap
page read and write
A14000
heap
page read and write
277471AE000
trusted library allocation
page read and write
270DA956000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
1D62000
heap
page read and write
270D627F000
trusted library allocation
page read and write
4A2F000
stack
page read and write
A14000
heap
page read and write
270DAD47000
trusted library allocation
page read and write
23838948000
heap
page read and write
423000
unkown
page readonly
A14000
heap
page read and write
270DB75C000
trusted library allocation
page read and write
27746FB1000
trusted library allocation
page read and write
27747347000
trusted library allocation
page read and write
A14000
heap
page read and write
829A44B000
stack
page read and write
28D72000
heap
page read and write
DB4000
heap
page read and write
270DDB63000
trusted library allocation
page read and write
A14000
heap
page read and write
270DA8CB000
trusted library allocation
page read and write
400000
unkown
page readonly
564000
heap
page read and write
27747397000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DDACF000
trusted library allocation
page read and write
270DC2E2000
trusted library allocation
page read and write
270D7CA8000
trusted library allocation
page read and write
2324000
heap
page read and write
270D6DAD000
trusted library allocation
page read and write
64A1000
heap
page read and write
AF1000
heap
page read and write
270CC70D000
heap
page read and write
DC19D8F000
stack
page read and write
458E000
stack
page read and write
2774325D000
trusted library allocation
page read and write
27745E13000
trusted library allocation
page read and write
2774825B000
trusted library allocation
page read and write
270E4517000
trusted library allocation
page read and write
4B31000
heap
page read and write
A14000
heap
page read and write
62EF000
stack
page read and write
409F000
stack
page read and write
A14000
heap
page read and write
238389A9000
heap
page read and write
99A000
stack
page read and write
14A6E130000
heap
page read and write
A14000
heap
page read and write
B19F5FE000
stack
page read and write
1AD8000
heap
page read and write
16BBEB69000
trusted library allocation
page read and write
270CC703000
heap
page read and write
A14000
heap
page read and write
A15000
heap
page read and write
27747BCC000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DA18F000
trusted library allocation
page read and write
270E4250000
trusted library allocation
page read and write
49CF000
stack
page read and write
28D11000
heap
page read and write
560F000
stack
page read and write
803C000
stack
page read and write
270E3F56000
trusted library allocation
page read and write
270DC544000
trusted library allocation
page read and write
A14000
heap
page read and write
6CA000
heap
page read and write
4370000
direct allocation
page read and write
A14000
heap
page read and write
23837D03000
trusted library allocation
page read and write
9C000
stack
page read and write
270E41AA000
trusted library allocation
page read and write
27742F00000
trusted library allocation
page read and write
A14000
heap
page read and write
52B0000
direct allocation
page execute and read and write
64A1000
heap
page read and write
270E3F27000
trusted library allocation
page read and write
A14000
heap
page read and write
270E4491000
trusted library allocation
page read and write
3C2000
unkown
page execute and read and write
270DCB59000
trusted library allocation
page read and write
A14000
heap
page read and write
270E203F000
trusted library allocation
page read and write
180E000
stack
page read and write
3F6F000
stack
page read and write
B1A057F000
stack
page read and write
64A1000
heap
page read and write
270CC702000
heap
page read and write
A14000
heap
page read and write
DC226FE000
stack
page read and write
6C62E000
unkown
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
40000
unkown
page readonly
A15000
heap
page read and write
27743533000
heap
page read and write
270E2203000
trusted library allocation
page read and write
27746000000
trusted library allocation
page read and write
270D6DE7000
trusted library allocation
page read and write
270E459E000
trusted library allocation
page read and write
303E000
stack
page read and write
23837DBC000
trusted library allocation
page read and write
1410000
direct allocation
page read and write
270CC721000
heap
page read and write
A14000
heap
page read and write
829C83E000
unkown
page readonly
27746C00000
trusted library allocation
page read and write
277478BA000
trusted library allocation
page read and write
4C4000
unkown
page execute and read and write
64A1000
heap
page read and write
B1A69FA000
stack
page read and write
A14000
heap
page read and write
B1A16B5000
stack
page read and write
270DA971000
trusted library allocation
page read and write
64A1000
heap
page read and write
46A000
unkown
page execute and read and write
4B90000
direct allocation
page execute and read and write
277466FC000
trusted library allocation
page read and write
270DA2E6000
trusted library allocation
page read and write
A14000
heap
page read and write
277467A7000
trusted library allocation
page read and write
270D6098000
trusted library allocation
page read and write
270DBE0D000
trusted library allocation
page read and write
270DA6A1000
trusted library allocation
page read and write
2774657D000
trusted library allocation
page read and write
270DC6A2000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
270DBE59000
trusted library allocation
page read and write
6C825000
unkown
page readonly
A14000
heap
page read and write
270DA772000
trusted library allocation
page read and write
1290000
heap
page read and write
A14000
heap
page read and write
270DB777000
trusted library allocation
page read and write
270DAF67000
trusted library allocation
page read and write
270DC2E0000
trusted library allocation
page read and write
CA4000
heap
page read and write
2737000
heap
page read and write
27743927000
trusted library allocation
page read and write
270DDBB1000
trusted library allocation
page read and write
270DA2A5000
trusted library allocation
page read and write
270D65F0000
unclassified section
page read and write
22C75000
heap
page read and write
2774780E000
trusted library allocation
page read and write
270E41EF000
trusted library allocation
page read and write
F1E000
heap
page read and write
488F000
stack
page read and write
A14000
heap
page read and write
4B20000
direct allocation
page read and write
27743537000
heap
page read and write
64A1000
heap
page read and write
807E000
stack
page read and write
270DAECF000
trusted library allocation
page read and write
22C93000
heap
page read and write
5211000
direct allocation
page read and write
270DDA00000
trusted library allocation
page read and write
270E0B34000
trusted library allocation
page read and write
64A1000
heap
page read and write
27747BFD000
trusted library allocation
page read and write
4B31000
heap
page read and write
A14000
heap
page read and write
4501000
heap
page read and write
830B000
stack
page read and write
A14000
heap
page read and write
270E23B0000
trusted library allocation
page read and write
27743FF0000
trusted library section
page readonly
3B3E000
stack
page read and write
64A1000
heap
page read and write
27746DB8000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DA745000
trusted library allocation
page read and write
27742F8A000
trusted library allocation
page read and write
277477CE000
trusted library allocation
page read and write
64A1000
heap
page read and write
4691000
heap
page read and write
A14000
heap
page read and write
A15000
heap
page read and write
27743B06000
trusted library allocation
page read and write
DB4000
heap
page read and write
30E187A00000
trusted library allocation
page read and write
23837B90000
heap
page read and write
3F9E000
stack
page read and write
27743BC2000
trusted library allocation
page read and write
270DA8C4000
trusted library allocation
page read and write
277438D7000
trusted library allocation
page read and write
1C39E000
stack
page read and write
64A1000
heap
page read and write
52B0000
direct allocation
page execute and read and write
856E000
stack
page read and write
2CEF000
stack
page read and write
A14000
heap
page read and write
2630000
heap
page read and write
2774678E000
trusted library allocation
page read and write
A14000
heap
page read and write
16BBE6B0000
unclassified section
page readonly
270E20DE000
trusted library allocation
page read and write
277432DD000
trusted library allocation
page read and write
27745FFE000
trusted library allocation
page read and write
64A1000
heap
page read and write
27747BE3000
trusted library allocation
page read and write
270D7C65000
trusted library allocation
page read and write
5AAD000
stack
page read and write
23837C00000
trusted library allocation
page read and write
13D4000
heap
page read and write
270E44B1000
trusted library allocation
page read and write
CA4000
heap
page read and write
B1A007A000
stack
page read and write
4D31000
heap
page read and write
270D6081000
trusted library allocation
page read and write
2774768C000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
17FE000
stack
page read and write
270E2398000
trusted library allocation
page read and write
270DC7EF000
trusted library allocation
page read and write
64A1000
heap
page read and write
27747A30000
trusted library allocation
page read and write
27747E00000
trusted library allocation
page read and write
4CB0000
direct allocation
page execute and read and write
A15000
heap
page read and write
270E2132000
trusted library allocation
page read and write
64A1000
heap
page read and write
4D31000
heap
page read and write
A14000
heap
page read and write
270E23BC000
trusted library allocation
page read and write
270E212B000
trusted library allocation
page read and write
A14000
heap
page read and write
238389AC000
heap
page read and write
270E200E000
trusted library allocation
page read and write
270E4000000
trusted library allocation
page read and write
DC1AEBB000
stack
page read and write
30AF000
stack
page read and write
270E0B2A000
trusted library allocation
page read and write
27747CA2000
trusted library allocation
page read and write
19C4000
heap
page read and write
A14000
heap
page read and write
277483DB000
trusted library allocation
page read and write
27745FE2000
trusted library allocation
page read and write
A14000
heap
page read and write
1CFA000
heap
page read and write
2774826C000
trusted library allocation
page read and write
A14000
heap
page read and write
270DCBA0000
trusted library allocation
page read and write
19C4000
heap
page read and write
270DC7B2000
trusted library allocation
page read and write
270DC815000
trusted library allocation
page read and write
270DC7B2000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E44F1000
trusted library allocation
page read and write
27746F7D000
trusted library allocation
page read and write
B1A07FE000
stack
page read and write
270D7D03000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
1C61F000
stack
page read and write
A14000
heap
page read and write
270DA46A000
trusted library allocation
page read and write
A14000
heap
page read and write
277473AA000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
277471C7000
trusted library allocation
page read and write
2D7E000
stack
page read and write
27747634000
trusted library allocation
page read and write
B0B000
unkown
page execute and write copy
B1A033E000
stack
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
27745F43000
trusted library allocation
page read and write
A14000
heap
page read and write
417E000
stack
page read and write
A14000
heap
page read and write
CA4000
heap
page read and write
27743912000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DB93C000
trusted library allocation
page read and write
CA4000
heap
page read and write
A14000
heap
page read and write
270E204F000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E0B12000
trusted library allocation
page read and write
270DCBBF000
trusted library allocation
page read and write
61E01000
direct allocation
page execute read
A14000
heap
page read and write
27743CD2000
trusted library allocation
page read and write
277E8F10000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
4D31000
heap
page read and write
2EE0000
heap
page read and write
304E000
stack
page read and write
27746540000
trusted library allocation
page read and write
64A1000
heap
page read and write
23838A6A000
heap
page read and write
64A1000
heap
page read and write
37EF000
stack
page read and write
64A1000
heap
page read and write
A15000
heap
page read and write
A14000
heap
page read and write
2774798A000
trusted library allocation
page read and write
27743DDA000
trusted library allocation
page read and write
277473D9000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E44DC000
trusted library allocation
page read and write
270DA8C4000
trusted library allocation
page read and write
270DADAA000
trusted library allocation
page read and write
64A1000
heap
page read and write
277476DF000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E2289000
trusted library allocation
page read and write
4380000
heap
page read and write
2774E41E000
trusted library allocation
page read and write
4CAF000
stack
page read and write
27747B4B000
trusted library allocation
page read and write
270E417D000
trusted library allocation
page read and write
A14000
heap
page read and write
4D00000
direct allocation
page execute and read and write
270DB2DE000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
CA4000
heap
page read and write
27746200000
trusted library allocation
page read and write
4D31000
heap
page read and write
277478FC000
trusted library allocation
page read and write
CA4000
heap
page read and write
27746082000
trusted library allocation
page read and write
25CE3300000
trusted library allocation
page read and write
A14000
heap
page read and write
270D8A0A000
trusted library allocation
page read and write
5C6E000
stack
page read and write
A14000
heap
page read and write
27747BC5000
trusted library allocation
page read and write
6C61D000
unkown
page readonly
270E401C000
trusted library allocation
page read and write
27747A30000
trusted library allocation
page read and write
270DA66D000
trusted library allocation
page read and write
6C0000
heap
page read and write
270DB733000
trusted library allocation
page read and write
27746C03000
trusted library allocation
page read and write
27747BE3000
trusted library allocation
page read and write
27743905000
trusted library allocation
page read and write
A14000
heap
page read and write
270DC218000
trusted library allocation
page read and write
270CC727000
heap
page read and write
270DBF58000
trusted library allocation
page read and write
270E23B3000
trusted library allocation
page read and write
58FE000
stack
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
61EE000
stack
page read and write
64A1000
heap
page read and write
B19F48E000
stack
page read and write
2774676C000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
27743D8A000
trusted library allocation
page read and write
23837D66000
trusted library allocation
page read and write
27743789000
trusted library allocation
page read and write
A15000
heap
page read and write
270DB703000
trusted library allocation
page read and write
23838AAB000
heap
page read and write
2D8D000
heap
page read and write
270DBF8A000
trusted library allocation
page read and write
27745E70000
trusted library allocation
page read and write
16BBEA00000
trusted library allocation
page read and write
270E4B1A000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
49AE000
stack
page read and write
64A1000
heap
page read and write
27747B96000
trusted library allocation
page read and write
1294000
heap
page read and write
16BBEB97000
trusted library allocation
page read and write
277438FA000
trusted library allocation
page read and write
270D7CF3000
trusted library allocation
page read and write
64A1000
heap
page read and write
27747B90000
trusted library allocation
page read and write
277476EB000
trusted library allocation
page read and write
64A1000
heap
page read and write
DB0000
heap
page read and write
270E2344000
trusted library allocation
page read and write
24AE000
stack
page read and write
A14000
heap
page read and write
F16000
heap
page read and write
64A1000
heap
page read and write
270C98BA000
heap
page read and write
438F000
stack
page read and write
1420000
heap
page read and write
39FF000
stack
page read and write
AF4000
unkown
page execute and read and write
A14000
heap
page read and write
5150000
direct allocation
page execute and read and write
270DA500000
trusted library allocation
page read and write
277438A4000
trusted library allocation
page read and write
19C4000
heap
page read and write
A14000
heap
page read and write
4370000
direct allocation
page read and write
23F82271000
trusted library allocation
page execute read
424F000
stack
page read and write
270DB0CB000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
4370000
direct allocation
page read and write
27745EA2000
trusted library allocation
page read and write
A14000
heap
page read and write
270D68DE000
heap
page read and write
27743266000
trusted library allocation
page read and write
277437FD000
trusted library allocation
page read and write
1954000
heap
page read and write
38C000
unkown
page execute and read and write
16BBED14000
trusted library allocation
page read and write
27747E9A000
trusted library allocation
page read and write
270E4403000
trusted library allocation
page read and write
27747B96000
trusted library allocation
page read and write
42CE000
stack
page read and write
A14000
heap
page read and write
270DA26F000
trusted library allocation
page read and write
277466EF000
trusted library allocation
page read and write
13FE000
stack
page read and write
270CC722000
heap
page read and write
2774E416000
trusted library allocation
page read and write
A14000
heap
page read and write
27747B92000
trusted library allocation
page read and write
B1A88BC000
stack
page read and write
360000
unkown
page read and write
A15000
heap
page read and write
A14000
heap
page read and write
270CC613000
heap
page read and write
270DA5DE000
trusted library allocation
page read and write
64A1000
heap
page read and write
19E000
stack
page read and write
6916A7B000
stack
page read and write
270DA8A9000
trusted library allocation
page read and write
158A953A000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
3A0000
unkown
page read and write
400000
unkown
page readonly
A9A000
heap
page read and write
270DA203000
trusted library allocation
page read and write
64A1000
heap
page read and write
4D31000
heap
page read and write
22C85000
heap
page read and write
2774378B000
trusted library allocation
page read and write
2B0000
unkown
page readonly
4E24000
direct allocation
page execute and read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
270E450C000
trusted library allocation
page read and write
270D6DC3000
trusted library allocation
page read and write
CA4000
heap
page read and write
270E4166000
trusted library allocation
page read and write
CA4000
heap
page read and write
D7E000
stack
page read and write
270DA76C000
trusted library allocation
page read and write
277438A9000
trusted library allocation
page read and write
270DB83C000
trusted library allocation
page read and write
A14000
heap
page read and write
270E4B10000
trusted library allocation
page read and write
4B20000
direct allocation
page read and write
270E4338000
trusted library allocation
page read and write
27747C94000
trusted library allocation
page read and write
2774321B000
trusted library allocation
page read and write
277E9340000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
27747BC5000
trusted library allocation
page read and write
270CC6D0000
heap
page read and write
B2B000
heap
page read and write
270D6D00000
trusted library allocation
page read and write
270D61AD000
trusted library allocation
page read and write
51EB000
stack
page read and write
2774792B000
trusted library allocation
page read and write
38BE000
stack
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
27747B5A000
trusted library allocation
page read and write
270E45F1000
trusted library allocation
page read and write
287E000
stack
page read and write
27747B57000
trusted library allocation
page read and write
64A1000
heap
page read and write
1954000
heap
page read and write
4B20000
direct allocation
page read and write
4C6F000
stack
page read and write
27747133000
trusted library allocation
page read and write
270DA2E2000
trusted library allocation
page read and write
270E4105000
trusted library allocation
page read and write
277432E2000
trusted library allocation
page read and write
270DBF90000
trusted library allocation
page read and write
A14000
heap
page read and write
2EF3A000
heap
page read and write
64A1000
heap
page read and write
2BEE000
stack
page read and write
277388D8000
trusted library allocation
page read and write
27746DDA000
trusted library allocation
page read and write
2774825B000
trusted library allocation
page read and write
A14000
heap
page read and write
4B31000
heap
page read and write
CA4000
heap
page read and write
A15000
heap
page read and write
27743899000
trusted library allocation
page read and write
13D4000
heap
page read and write
27746863000
trusted library allocation
page read and write
A14000
heap
page read and write
270DCB5F000
trusted library allocation
page read and write
182F000
stack
page read and write
64A1000
heap
page read and write
FDE000
stack
page read and write
DC191FD000
stack
page read and write
27743D26000
trusted library allocation
page read and write
1F0000
heap
page read and write
F8A3BFE000
unkown
page readonly
270DCBA0000
trusted library allocation
page read and write
270D8B6C000
trusted library allocation
page read and write
27746B03000
trusted library allocation
page read and write
270DCB00000
trusted library allocation
page read and write
B1A4FFD000
stack
page read and write
52B0000
direct allocation
page execute and read and write
270E417B000
trusted library allocation
page read and write
27747B8B000
trusted library allocation
page read and write
270DB6ED000
trusted library allocation
page read and write
52B0000
direct allocation
page execute and read and write
270DBF82000
trusted library allocation
page read and write
27748213000
trusted library allocation
page read and write
5300000
direct allocation
page execute and read and write
EA2000
heap
page read and write
2C3F000
stack
page read and write
2774659B000
trusted library allocation
page read and write
27747B90000
trusted library allocation
page read and write
270D6717000
trusted library allocation
page read and write
CA4000
heap
page read and write
2FAE000
stack
page read and write
A14000
heap
page read and write
402000
unkown
page execute and read and write
277437A2000
trusted library allocation
page read and write
143C000
heap
page read and write
23838A29000
heap
page read and write
64A1000
heap
page read and write
270E3FE6000
trusted library allocation
page read and write
270DC2EC000
trusted library allocation
page read and write
7F2E000
stack
page read and write
A14000
heap
page read and write
27746F62000
trusted library allocation
page read and write
270DC755000
trusted library allocation
page read and write
CA5000
heap
page read and write
27747C4A000
trusted library allocation
page read and write
270D65E0000
unclassified section
page read and write
1C68E000
stack
page read and write
270D7CF5000
trusted library allocation
page read and write
270CC721000
heap
page read and write
1294000
heap
page read and write
283F000
stack
page read and write
CA4000
heap
page read and write
13D4000
heap
page read and write
4E13000
direct allocation
page execute and read and write
A14000
heap
page read and write
270DB82B000
trusted library allocation
page read and write
CA4000
heap
page read and write
270DBF7C000
trusted library allocation
page read and write
64A1000
heap
page read and write
277E8E34000
heap
page read and write
270DA403000
trusted library allocation
page read and write
277513D1000
trusted library allocation
page read and write
4E30000
direct allocation
page execute and read and write
64A1000
heap
page read and write
270DB295000
trusted library allocation
page read and write
4293000
heap
page read and write
344000
unkown
page execute and read and write
51E0000
direct allocation
page execute and read and write
A14000
heap
page read and write
CA4000
heap
page read and write
A14000
heap
page read and write
27747D90000
unclassified section
page read and write
B2F000
heap
page read and write
FE0000
heap
page read and write
270E2103000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270E458D000
trusted library allocation
page read and write
270DA466000
trusted library allocation
page read and write
270DA6A1000
trusted library allocation
page read and write
270DC251000
trusted library allocation
page read and write
A14000
heap
page read and write
403F000
stack
page read and write
37C000
unkown
page execute and read and write
A14000
heap
page read and write
270DC85A000
trusted library allocation
page read and write
A15000
heap
page read and write
A14000
heap
page read and write
2774385A000
trusted library allocation
page read and write
277471C7000
trusted library allocation
page read and write
270DCBBC000
trusted library allocation
page read and write
270DB8D7000
trusted library allocation
page read and write
270DC98A000
trusted library allocation
page read and write
64A1000
heap
page read and write
4F70000
heap
page read and write
CA4000
heap
page read and write
270E3FD9000
trusted library allocation
page read and write
277388FB000
trusted library allocation
page read and write
27746587000
trusted library allocation
page read and write
270E2065000
trusted library allocation
page read and write
2774788E000
trusted library allocation
page read and write
4F43000
direct allocation
page execute and read and write
27742EC8000
trusted library allocation
page read and write
A14000
heap
page read and write
27747A67000
trusted library allocation
page read and write
64A1000
heap
page read and write
270D81D0000
trusted library section
page read and write
64A1000
heap
page read and write
270DB5D3000
trusted library allocation
page read and write
270DB709000
trusted library allocation
page read and write
64A1000
heap
page read and write
A15000
heap
page read and write
270E401F000
trusted library allocation
page read and write
270E2316000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DF006000
trusted library allocation
page read and write
270DDB4E000
trusted library allocation
page read and write
AF0000
heap
page read and write
64A1000
heap
page read and write
258E000
stack
page read and write
574F000
stack
page read and write
270DAC13000
trusted library allocation
page read and write
27743896000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E440C000
trusted library allocation
page read and write
270D612B000
trusted library allocation
page read and write
4E14000
direct allocation
page execute and read and write
270DCB9D000
trusted library allocation
page read and write
2773680D000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E3FD0000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
270E2116000
trusted library allocation
page read and write
270D65F2000
unclassified section
page read and write
270DB8B0000
trusted library allocation
page read and write
27747AA8000
trusted library allocation
page read and write
270D8B77000
trusted library allocation
page read and write
27743E96000
trusted library allocation
page read and write
A14000
heap
page read and write
4D31000
heap
page read and write
A14000
heap
page read and write
277479A3000
trusted library allocation
page read and write
270DAE03000
trusted library allocation
page read and write
27744500000
trusted library allocation
page read and write
270E238A000
trusted library allocation
page read and write
4D31000
heap
page read and write
2774798B000
trusted library allocation
page read and write
270CC715000
heap
page read and write
270DA766000
trusted library allocation
page read and write
27748200000
trusted library allocation
page read and write
238389F8000
heap
page read and write
384000
unkown
page execute and write copy
270DA8F8000
trusted library allocation
page read and write
2B0000
unkown
page readonly
64A1000
heap
page read and write
23837ABF000
unclassified section
page read and write
270DB0C5000
trusted library allocation
page read and write
6C5A1000
unkown
page execute read
64A1000
heap
page read and write
270C9720000
unclassified section
page readonly
270E2321000
trusted library allocation
page read and write
270DC815000
trusted library allocation
page read and write
CA4000
heap
page read and write
64A1000
heap
page read and write
22C7D000
heap
page read and write
270DA8DC000
trusted library allocation
page read and write
22C69000
heap
page read and write
270DA8EE000
trusted library allocation
page read and write
64A1000
heap
page read and write
270D6D68000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
1B8C000
heap
page read and write
270D6D9A000
trusted library allocation
page read and write
270DC827000
trusted library allocation
page read and write
270DC991000
trusted library allocation
page read and write
4B10000
heap
page read and write
19E000
stack
page read and write
4D31000
heap
page read and write
A14000
heap
page read and write
4E24000
direct allocation
page execute and read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
270DA5DA000
trusted library allocation
page read and write
64A1000
heap
page read and write
F8A2BFE000
unkown
page readonly
A14000
heap
page read and write
2774722B000
trusted library allocation
page read and write
270E4129000
trusted library allocation
page read and write
270E22DF000
trusted library allocation
page read and write
270E23A3000
trusted library allocation
page read and write
A14000
heap
page read and write
859000
unkown
page write copy
DC22EFB000
stack
page read and write
4F69000
direct allocation
page execute and read and write
59FF000
stack
page read and write
27745E25000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DB4B2000
unclassified section
page read and write
CA4000
heap
page read and write
27743900000
trusted library allocation
page read and write
270E41B2000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
27747B6D000
trusted library allocation
page read and write
270DA269000
trusted library allocation
page read and write
270DDBC5000
trusted library allocation
page read and write
64A1000
heap
page read and write
3B6E000
stack
page read and write
1EA7000
heap
page read and write
64A1000
heap
page read and write
2470000
heap
page read and write
64A1000
heap
page read and write
270DA9ED000
trusted library allocation
page read and write
CA4000
heap
page read and write
270CC704000
heap
page read and write
64A1000
heap
page read and write
270E41BC000
trusted library allocation
page read and write
64A1000
heap
page read and write
3D8E000
stack
page read and write
277476D6000
trusted library allocation
page read and write
270DC94A000
trusted library allocation
page read and write
19C4000
heap
page read and write
38CF000
stack
page read and write
27748284000
trusted library allocation
page read and write
270DBF55000
trusted library allocation
page read and write
564000
heap
page read and write
19C4000
heap
page read and write
4B00000
direct allocation
page execute and read and write
270DBF58000
trusted library allocation
page read and write
270DA871000
trusted library allocation
page read and write
270E41F3000
trusted library allocation
page read and write
270DCB86000
trusted library allocation
page read and write
23C19FF000
stack
page read and write
A14000
heap
page read and write
DB4000
heap
page read and write
B1A053E000
stack
page read and write
270DA703000
trusted library allocation
page read and write
69161FE000
stack
page read and write
6AD000
unkown
page execute and write copy
A14000
heap
page read and write
27745EBE000
trusted library allocation
page read and write
214F000
heap
page read and write
270DDBB9000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
DB4000
heap
page read and write
270E417F000
trusted library allocation
page read and write
A14000
heap
page read and write
386E000
stack
page read and write
270DA856000
trusted library allocation
page read and write
4C80000
direct allocation
page execute and read and write
27746122000
trusted library allocation
page read and write
887F000
stack
page read and write
270DC8B9000
trusted library allocation
page read and write
D10000
direct allocation
page read and write
A14000
heap
page read and write
772E000
stack
page read and write
34C000
unkown
page execute and write copy
270CC71A000
heap
page read and write
64A1000
heap
page read and write
270E45F6000
trusted library allocation
page read and write
270E2027000
trusted library allocation
page read and write
CA4000
heap
page read and write
27745EE2000
trusted library allocation
page read and write
27748103000
trusted library allocation
page read and write
64A1000
heap
page read and write
DB4000
heap
page read and write
27746AE9000
trusted library allocation
page read and write
22C75000
heap
page read and write
474F000
stack
page read and write
CA4000
heap
page read and write
1954000
heap
page read and write
A14000
heap
page read and write
270E2012000
trusted library allocation
page read and write
DC19CBC000
stack
page read and write
866F000
stack
page read and write
416E000
stack
page read and write
270E4B08000
trusted library allocation
page read and write
23838AAB000
heap
page read and write
270E459F000
trusted library allocation
page read and write
27747B7B000
trusted library allocation
page read and write
270DBF9E000
trusted library allocation
page read and write
270D8200000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
270D797D000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
23838A98000
heap
page read and write
27746AFE000
trusted library allocation
page read and write
3CBD000
stack
page read and write
27746B2E000
trusted library allocation
page read and write
270DB6F9000
trusted library allocation
page read and write
270E44B1000
trusted library allocation
page read and write
270E412F000
trusted library allocation
page read and write
4CF0000
direct allocation
page execute and read and write
D10000
direct allocation
page read and write
A15000
heap
page read and write
DC1917E000
stack
page read and write
2774321E000
trusted library allocation
page read and write
270DCA00000
trusted library allocation
page read and write
A14000
heap
page read and write
B1A01BB000
stack
page read and write
564000
heap
page read and write
277465D5000
trusted library allocation
page read and write
27745E80000
trusted library allocation
page read and write
23838A98000
heap
page read and write
4D31000
heap
page read and write
805000
unkown
page execute and read and write
270D8308000
trusted library allocation
page read and write
270E41B5000
trusted library allocation
page read and write
A15000
heap
page read and write
277513FD000
trusted library allocation
page read and write
64A1000
heap
page read and write
CA4000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
4E39000
direct allocation
page execute and read and write
4CE0000
direct allocation
page execute and read and write
27747BEF000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E0B1A000
trusted library allocation
page read and write
A14000
heap
page read and write
1CA90000
heap
page read and write
404F000
stack
page read and write
5BF000
unkown
page execute and read and write
270DC703000
trusted library allocation
page read and write
64A1000
heap
page read and write
23837890000
unclassified section
page readonly
A14000
heap
page read and write
270D6098000
trusted library allocation
page read and write
4B31000
heap
page read and write
64A1000
heap
page read and write
586D000
stack
page read and write
270E41CB000
trusted library allocation
page read and write
DB4000
heap
page read and write
270E5C00000
trusted library allocation
page read and write
A14000
heap
page read and write
2720000
direct allocation
page read and write
270E42A8000
trusted library allocation
page read and write
1580000
direct allocation
page read and write
4B40000
direct allocation
page execute and read and write
277471B5000
trusted library allocation
page read and write
4D40000
direct allocation
page execute and read and write
270D81C3000
trusted library section
page read and write
A14000
heap
page read and write
270E234C000
trusted library allocation
page read and write
4D31000
heap
page read and write
436D000
stack
page read and write
829A54E000
stack
page read and write
A14000
heap
page read and write
5C8C000
stack
page read and write
277478FC000
trusted library allocation
page read and write
270DB900000
trusted library allocation
page read and write
23838A6A000
heap
page read and write
27743282000
trusted library allocation
page read and write
27747C83000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
EEF000
heap
page read and write
A14000
heap
page read and write
270E2182000
trusted library allocation
page read and write
27746D63000
trusted library allocation
page read and write
912E000
stack
page read and write
41AE000
stack
page read and write
270DBF25000
trusted library allocation
page read and write
4C40000
direct allocation
page execute and read and write
270DC558000
trusted library allocation
page read and write
B1A00BE000
stack
page read and write
270DBFA1000
trusted library allocation
page read and write
270DC700000
trusted library allocation
page read and write
2E7F000
stack
page read and write
4B6E000
stack
page read and write
A14000
heap
page read and write
27747B90000
trusted library allocation
page read and write
4D2F000
stack
page read and write
270DC863000
trusted library allocation
page read and write
158A9530000
heap
page read and write
19C0000
heap
page read and write
19F5000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
27746603000
trusted library allocation
page read and write
27747B7B000
trusted library allocation
page read and write
85B000
unkown
page execute and read and write
AE3000
heap
page read and write
B1A14B3000
stack
page read and write
26EC000
stack
page read and write
27747A60000
trusted library allocation
page read and write
A14000
heap
page read and write
2087000
heap
page read and write
238389CA000
heap
page read and write
1410000
direct allocation
page read and write
270D6DBF000
trusted library allocation
page read and write
270E415B000
trusted library allocation
page read and write
270E416D000
trusted library allocation
page read and write
277477FA000
trusted library allocation
page read and write
270CC70A000
heap
page read and write
64A1000
heap
page read and write
5320000
direct allocation
page execute and read and write
2774410A000
trusted library allocation
page read and write
270DCA57000
trusted library allocation
page read and write
270DB11C000
trusted library allocation
page read and write
A15000
heap
page read and write
270DC564000
trusted library allocation
page read and write
A14000
heap
page read and write
270DDB7C000
trusted library allocation
page read and write
B1A067E000
stack
page read and write
270DB6C9000
trusted library allocation
page read and write
27748251000
trusted library allocation
page read and write
403E000
stack
page read and write
270DBF3B000
trusted library allocation
page read and write
277482F7000
trusted library allocation
page read and write
426F000
stack
page read and write
A14000
heap
page read and write
22C77000
heap
page read and write
270E20D6000
trusted library allocation
page read and write
2FBF000
stack
page read and write
4D10000
direct allocation
page execute and read and write
238389A0000
heap
page read and write
270E4285000
trusted library allocation
page read and write
A14000
heap
page read and write
270DA8CB000
trusted library allocation
page read and write
270DCB77000
trusted library allocation
page read and write
270DDA89000
trusted library allocation
page read and write
270D6676000
trusted library allocation
page read and write
A14000
heap
page read and write
158A7AFB000
heap
page read and write
270E2372000
trusted library allocation
page read and write
6666000
heap
page read and write
27746AE2000
trusted library allocation
page read and write
270E4036000
trusted library allocation
page read and write
270DA2C7000
trusted library allocation
page read and write
A14000
heap
page read and write
270DC84D000
trusted library allocation
page read and write
270DC822000
trusted library allocation
page read and write
19BE000
stack
page read and write
64A1000
heap
page read and write
2EC0000
direct allocation
page read and write
23F82281000
trusted library allocation
page execute read
64A1000
heap
page read and write
4D31000
heap
page read and write
3C9000
unkown
page read and write
270CC717000
heap
page read and write
27742F6C000
trusted library allocation
page read and write
270DA2E2000
trusted library allocation
page read and write
B4E000
heap
page read and write
270DB6CC000
trusted library allocation
page read and write
64A1000
heap
page read and write
27747AC5000
trusted library allocation
page read and write
270DB244000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
5160000
direct allocation
page execute and read and write
19C4000
heap
page read and write
270DA69B000
trusted library allocation
page read and write
64A1000
heap
page read and write
270D6DA7000
trusted library allocation
page read and write
1D43000
heap
page read and write
2774705F000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
270DA650000
trusted library allocation
page read and write
270DBF8C000
trusted library allocation
page read and write
49F000
unkown
page execute and read and write
7F1000
unkown
page execute and write copy
A14000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
23838A98000
heap
page read and write
270DA262000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
27746143000
trusted library allocation
page read and write
64A1000
heap
page read and write
27747962000
trusted library allocation
page read and write
270E6E23000
trusted library allocation
page read and write
16BBEB00000
trusted library allocation
page read and write
270CC685000
heap
page read and write
CA4000
heap
page read and write
DB4000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270E3F99000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
22C77000
heap
page read and write
1648000
heap
page read and write
13D4000
heap
page read and write
CA9000
unkown
page execute and write copy
64A1000
heap
page read and write
270DA8C4000
trusted library allocation
page read and write
27747BC5000
trusted library allocation
page read and write
7F0000
unkown
page readonly
DC1CB3C000
stack
page read and write
23838A20000
heap
page read and write
270E4203000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DBE5D000
trusted library allocation
page read and write
270E4179000
trusted library allocation
page read and write
4E24000
direct allocation
page execute and read and write
27746351000
trusted library allocation
page read and write
23838A20000
heap
page read and write
A15000
heap
page read and write
663A000
heap
page read and write
27747813000
trusted library allocation
page read and write
270DC79B000
trusted library allocation
page read and write
A14000
heap
page read and write
23838500000
trusted library allocation
page read and write
277479CB000
trusted library allocation
page read and write
64A1000
heap
page read and write
4D31000
heap
page read and write
270E406C000
trusted library allocation
page read and write
64A1000
heap
page read and write
37C000
unkown
page execute and write copy
A15000
heap
page read and write
64A1000
heap
page read and write
2774633C000
trusted library allocation
page read and write
B1A05BB000
stack
page read and write
16BBE710000
remote allocation
page read and write
34B000
unkown
page execute and read and write
64A1000
heap
page read and write
3C9000
unkown
page write copy
270DA884000
trusted library allocation
page read and write
270E2500000
trusted library section
page read and write
27745E9A000
trusted library allocation
page read and write
64A1000
heap
page read and write
277439FD000
trusted library allocation
page read and write
270E41D3000
trusted library allocation
page read and write
829A48E000
unkown
page readonly
DC20BFB000
stack
page read and write
270DA7A2000
trusted library allocation
page read and write
270DC200000
trusted library allocation
page read and write
270CC727000
heap
page read and write
A14000
heap
page read and write
4B00000
direct allocation
page execute and read and write
64A1000
heap
page read and write
4B31000
heap
page read and write
277482DC000
trusted library allocation
page read and write
270E43DE000
trusted library allocation
page read and write
27746B8B000
trusted library allocation
page read and write
27747BDF000
trusted library allocation
page read and write
64A1000
heap
page read and write
211A000
heap
page read and write
270DBF6C000
trusted library allocation
page read and write
27743DC6000
trusted library allocation
page read and write
27746275000
trusted library allocation
page read and write
13D4000
heap
page read and write
270E2342000
trusted library allocation
page read and write
840C000
stack
page read and write
A14000
heap
page read and write
27747EC4000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E44BD000
trusted library allocation
page read and write
B1A127E000
stack
page read and write
A14000
heap
page read and write
270E41C3000
trusted library allocation
page read and write
1410000
direct allocation
page read and write
CA4000
heap
page read and write
270E0B08000
trusted library allocation
page read and write
158A7AA0000
heap
page read and write
A14000
heap
page read and write
270DA5A8000
trusted library allocation
page read and write
7E0000
direct allocation
page read and write
27746800000
trusted library allocation
page read and write
270E000
stack
page read and write
27745DC0000
trusted library section
page readonly
64A1000
heap
page read and write
40000
unkown
page read and write
27743987000
trusted library allocation
page read and write
270E2198000
trusted library allocation
page read and write
2773940C000
heap
page read and write
270DB924000
trusted library allocation
page read and write
A15000
heap
page read and write
CA4000
heap
page read and write
23838A31000
heap
page read and write
A14000
heap
page read and write
4480000
trusted library allocation
page read and write
4FC0000
direct allocation
page read and write
270C9710000
unclassified section
page readonly
49F000
unkown
page execute and read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270DA5E7000
trusted library allocation
page read and write
A15000
heap
page read and write
219F000
heap
page read and write
270E2006000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E45C0000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
270CC70E000
heap
page read and write
F33000
heap
page read and write
64A1000
heap
page read and write
270D6CBA000
trusted library allocation
page read and write
270DCA68000
trusted library allocation
page read and write
27738801000
trusted library allocation
page read and write
270DBF40000
trusted library allocation
page read and write
4100000
heap
page read and write
6630000
heap
page read and write
4B31000
heap
page read and write
270D6CAE000
trusted library allocation
page read and write
40F3000
heap
page read and write
A14000
heap
page read and write
2774822B000
trusted library allocation
page read and write
1C78D000
stack
page read and write
4E24000
direct allocation
page execute and read and write
CA4000
heap
page read and write
64A1000
heap
page read and write
27743DF2000
trusted library allocation
page read and write
A14000
heap
page read and write
270E41FB000
trusted library allocation
page read and write
A14000
heap
page read and write
427F000
stack
page read and write
64A1000
heap
page read and write
6917B3E000
unkown
page readonly
64A1000
heap
page read and write
A14000
heap
page read and write
22C77000
heap
page read and write
256C000
heap
page read and write
34FF000
stack
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
F16000
heap
page read and write
A15000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
23838A40000
heap
page read and write
270DB800000
trusted library allocation
page read and write
270D7B80000
trusted library section
page readonly
270E4400000
trusted library allocation
page read and write
27748235000
trusted library allocation
page read and write
A14000
heap
page read and write
270E417B000
trusted library allocation
page read and write
DC2263D000
stack
page read and write
23838A7B000
heap
page read and write
4D31000
heap
page read and write
270CC702000
heap
page read and write
270DB975000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270DB842000
trusted library allocation
page read and write
A15000
heap
page read and write
263FFD00000
trusted library allocation
page read and write
64A1000
heap
page read and write
277E8D69000
trusted library allocation
page read and write
3EFE000
stack
page read and write
1A80000
heap
page read and write
270E5CF9000
trusted library allocation
page read and write
1C58F000
stack
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
13D4000
heap
page read and write
4D31000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
1C54F000
stack
page read and write
5140000
direct allocation
page execute and read and write
A14000
heap
page read and write
270DAD33000
trusted library allocation
page read and write
409000
unkown
page read and write
64A1000
heap
page read and write
270DCBB5000
trusted library allocation
page read and write
159B000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
460F000
stack
page read and write
2774794B000
trusted library allocation
page read and write
27747EA8000
trusted library allocation
page read and write
22C77000
heap
page read and write
64A1000
heap
page read and write
270DA75D000
trusted library allocation
page read and write
270CC5F8000
heap
page read and write
CA4000
heap
page read and write
270E42A5000
trusted library allocation
page read and write
270CC70E000
heap
page read and write
270DC4E0000
trusted library section
page read and write
1C8CE000
stack
page read and write
4D31000
heap
page read and write
4B61000
direct allocation
page read and write
27747BFD000
trusted library allocation
page read and write
270E4B30000
trusted library allocation
page read and write
A14000
heap
page read and write
22C77000
heap
page read and write
27746DDA000
trusted library allocation
page read and write
270DA8EA000
trusted library allocation
page read and write
1DAC000
heap
page read and write
40F0000
direct allocation
page read and write
F1B000
heap
page read and write
270DF002000
trusted library allocation
page read and write
40B0000
direct allocation
page execute and read and write
2774610E000
trusted library allocation
page read and write
40B0000
direct allocation
page execute and read and write
3A1000
unkown
page execute and write copy
5191000
direct allocation
page read and write
CA4000
heap
page read and write
64A1000
heap
page read and write
13D4000
heap
page read and write
270E4371000
trusted library allocation
page read and write
4681000
heap
page read and write
3EEF000
stack
page read and write
2774763D000
trusted library allocation
page read and write
2774300A000
trusted library allocation
page read and write
270DCB5B000
trusted library allocation
page read and write
64A1000
heap
page read and write
CEE000
stack
page read and write
64A1000
heap
page read and write
6A70000
heap
page read and write
37AE000
stack
page read and write
27747BDF000
trusted library allocation
page read and write
F8A2AF8000
stack
page read and write
1954000
heap
page read and write
4A40000
direct allocation
page execute and read and write
DB4000
heap
page read and write
992F000
stack
page read and write
661E000
stack
page read and write
27747BDA000
trusted library allocation
page read and write
270D7EFC000
trusted library allocation
page read and write
27748087000
trusted library allocation
page read and write
6C641000
unkown
page execute read
A14000
heap
page read and write
270CC704000
heap
page read and write
2460000
heap
page read and write
270E441A000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
CCE000
stack
page read and write
852C000
stack
page read and write
27747A57000
trusted library allocation
page read and write
5360000
direct allocation
page execute and read and write
270DB74D000
trusted library allocation
page read and write
454F000
stack
page read and write
B1A6BFB000
stack
page read and write
270DCF00000
trusted library allocation
page read and write
2A30000
direct allocation
page read and write
27747BE3000
trusted library allocation
page read and write
27743DF2000
trusted library allocation
page read and write
270DA2C9000
trusted library allocation
page read and write
829C7FE000
unkown
page readonly
2F60000
heap
page read and write
A14000
heap
page read and write
1410000
direct allocation
page read and write
277E8A13000
heap
page read and write
270DC8B2000
trusted library allocation
page read and write
244C000
unkown
page readonly
A14000
heap
page read and write
A14000
heap
page read and write
270DA309000
trusted library allocation
page read and write
27747B83000
trusted library allocation
page read and write
270DA330000
trusted library allocation
page read and write
1294000
heap
page read and write
270DA5C5000
trusted library allocation
page read and write
DB4000
heap
page read and write
270C9B94000
trusted library allocation
page read and write
3AAF000
stack
page read and write
EC9000
heap
page read and write
CA4000
heap
page read and write
19A0000
heap
page read and write
270E22D9000
trusted library allocation
page read and write
27738956000
trusted library allocation
page read and write
A14000
heap
page read and write
270CC6A3000
heap
page read and write
377E000
stack
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
277471B9000
trusted library allocation
page read and write
9C000
stack
page read and write
F13000
heap
page read and write
A14000
heap
page read and write
23837BB0000
trusted library allocation
page read and write
270E011C000
trusted library allocation
page read and write
277394B0000
heap
page read and write
38BF000
stack
page read and write
2D7B000
stack
page read and write
15D4000
heap
page read and write
64A1000
heap
page read and write
4D31000
heap
page read and write
B0D000
heap
page read and write
A14000
heap
page read and write
4B20000
direct allocation
page read and write
277E8AE0000
heap
page read and write
270DA503000
trusted library allocation
page read and write
277E8F3C000
trusted library allocation
page read and write
2774379A000
trusted library allocation
page read and write
270CC721000
heap
page read and write
A14000
heap
page read and write
27744400000
trusted library allocation
page read and write
A14000
heap
page read and write
829A58E000
unkown
page readonly
270DC9BF000
trusted library allocation
page read and write
270DA3AB000
trusted library allocation
page read and write
6699000
heap
page read and write
DB4000
heap
page read and write
27746D56000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270DC7A1000
trusted library allocation
page read and write
B19F5DF000
stack
page read and write
27747100000
trusted library allocation
page read and write
A14000
heap
page read and write
22C69000
heap
page read and write
27742F07000
trusted library allocation
page read and write
A14000
heap
page read and write
27746CEE000
trusted library allocation
page read and write
16BBEB2E000
trusted library allocation
page read and write
13D4000
heap
page read and write
277E8A20000
heap
page read and write
27747B00000
trusted library allocation
page read and write
14A6E300000
trusted library allocation
page read and write
3ACF000
stack
page read and write
A14000
heap
page read and write
270DBF7C000
trusted library allocation
page read and write
4D31000
heap
page read and write
C8E000
stack
page read and write
A14000
heap
page read and write
2A30000
direct allocation
page read and write
270DBF7E000
trusted library allocation
page read and write
277437D7000
trusted library allocation
page read and write
270DC7EF000
trusted library allocation
page read and write
270DA6CA000
trusted library allocation
page read and write
27743D90000
trusted library allocation
page read and write
270D629F000
trusted library allocation
page read and write
F9D000
stack
page read and write
4F54000
direct allocation
page execute and read and write
277473F5000
trusted library allocation
page read and write
564000
heap
page read and write
A14000
heap
page read and write
B19F4CE000
stack
page read and write
270DB7EE000
trusted library allocation
page read and write
270C9B47000
trusted library allocation
page read and write
277471B6000
trusted library allocation
page read and write
64A1000
heap
page read and write
6AD000
unkown
page execute and read and write
2774744D000
trusted library allocation
page read and write
4D31000
heap
page read and write
23838A2F000
heap
page read and write
4C4000
unkown
page execute and read and write
2EBF000
stack
page read and write
270DAB08000
trusted library allocation
page read and write
64A1000
heap
page read and write
9DE000
unkown
page execute and read and write
64A1000
heap
page read and write
B4F000
heap
page read and write
277479D3000
trusted library allocation
page read and write
2EFE000
stack
page read and write
A14000
heap
page read and write
270E404A000
trusted library allocation
page read and write
27747023000
trusted library allocation
page read and write
270DA665000
trusted library allocation
page read and write
27746275000
trusted library allocation
page read and write
342F000
stack
page read and write
27743213000
trusted library allocation
page read and write
A14000
heap
page read and write
587000
unkown
page execute and read and write
DC1BBFF000
stack
page read and write
27738910000
trusted library allocation
page read and write
270DA8E6000
trusted library allocation
page read and write
270DCB61000
trusted library allocation
page read and write
5150000
direct allocation
page execute and read and write
277437B1000
trusted library allocation
page read and write
270DA031000
trusted library allocation
page read and write
74D64A1000
trusted library allocation
page execute read
3DD000
unkown
page readonly
27747A84000
trusted library allocation
page read and write
16BBE6A0000
unclassified section
page readonly
27744508000
trusted library allocation
page read and write
4B10000
direct allocation
page execute and read and write
270DBF6C000
trusted library allocation
page read and write
EEB000
heap
page read and write
A14000
heap
page read and write
16BBE726000
remote allocation
page execute read
270DBF3E000
trusted library allocation
page read and write
A14000
heap
page read and write
27750ADA000
trusted library allocation
page read and write
F8A2BBE000
stack
page read and write
2E8F000
stack
page read and write
A14000
heap
page read and write
27747A30000
trusted library allocation
page read and write
52C0000
direct allocation
page execute and read and write
27747BF7000
trusted library allocation
page read and write
27745FEA000
trusted library allocation
page read and write
27746913000
trusted library allocation
page read and write
A14000
heap
page read and write
4D31000
heap
page read and write
1C78D000
stack
page read and write
4B31000
heap
page read and write
64A1000
heap
page read and write
27747B92000
trusted library allocation
page read and write
4FC0000
direct allocation
page read and write
27747B92000
trusted library allocation
page read and write
DC19C7A000
stack
page read and write
7E0000
direct allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
277365B0000
trusted library allocation
page read and write
64A1000
heap
page read and write
27743B13000
trusted library allocation
page read and write
277469C7000
trusted library allocation
page read and write
27738600000
trusted library allocation
page read and write
270DC9EA000
trusted library allocation
page read and write
270E4116000
trusted library allocation
page read and write
27746094000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270E43DE000
trusted library allocation
page read and write
277E8D62000
trusted library allocation
page read and write
A14000
heap
page read and write
270E5CC1000
trusted library allocation
page read and write
270DB0BB000
trusted library allocation
page read and write
282E000
stack
page read and write
64A1000
heap
page read and write
542F000
stack
page read and write
23837D48000
trusted library allocation
page read and write
17FF000
stack
page read and write
32CE000
stack
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
27747EBC000
trusted library allocation
page read and write
270DF02C000
trusted library allocation
page read and write
16BBE730000
unclassified section
page readonly
A14000
heap
page read and write
27743C01000
trusted library allocation
page read and write
270DBEFB000
trusted library allocation
page read and write
270DA773000
trusted library allocation
page read and write
270E4523000
trusted library allocation
page read and write
27747C00000
trusted library allocation
page read and write
277437EA000
trusted library allocation
page read and write
DB4000
heap
page read and write
696000
unkown
page execute and read and write
270DA9F1000
trusted library allocation
page read and write
64A1000
heap
page read and write
292F000
stack
page read and write
384F000
stack
page read and write
270D60C2000
trusted library allocation
page read and write
4D35000
heap
page read and write
270DADD3000
trusted library allocation
page read and write
27745E04000
trusted library allocation
page read and write
453F000
stack
page read and write
64A1000
heap
page read and write
4E39000
direct allocation
page execute and read and write
27743703000
trusted library allocation
page read and write
3A3E000
stack
page read and write
27747BEE000
trusted library allocation
page read and write
DC1F3FF000
stack
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
27738883000
trusted library allocation
page read and write
270CC64B000
heap
page read and write
27747700000
trusted library allocation
page read and write
270DAF03000
trusted library allocation
page read and write
4B31000
heap
page read and write
27EF000
stack
page read and write
4B31000
heap
page read and write
277E8F0C000
trusted library allocation
page read and write
39FE000
stack
page read and write
74D64E1000
trusted library allocation
page execute read
12CD02409000
trusted library allocation
page read and write
27746F9D000
trusted library allocation
page read and write
270E417F000
trusted library allocation
page read and write
A14000
heap
page read and write
270DA5B2000
trusted library allocation
page read and write
64A1000
heap
page read and write
277466E5000
trusted library allocation
page read and write
CA4000
heap
page read and write
270E4036000
trusted library allocation
page read and write
270DB6F7000
trusted library allocation
page read and write
4C40000
direct allocation
page execute and read and write
270DA637000
trusted library allocation
page read and write
A15000
heap
page read and write
1410000
direct allocation
page read and write
64B0000
heap
page read and write
27742EB3000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
A15000
heap
page read and write
277E8D9B000
trusted library allocation
page read and write
A14000
heap
page read and write
4D31000
heap
page read and write
A14000
heap
page read and write
1294000
heap
page read and write
27742E90000
trusted library allocation
page read and write
270E44FE000
trusted library allocation
page read and write
4B31000
heap
page read and write
23838A62000
heap
page read and write
270E5C95000
trusted library allocation
page read and write
601E000
stack
page read and write
270E5CC1000
trusted library allocation
page read and write
A14000
heap
page read and write
1C68E000
stack
page read and write
13D4000
heap
page read and write
277477FC000
trusted library allocation
page read and write
1954000
heap
page read and write
A14000
heap
page read and write
270DBF84000
trusted library allocation
page read and write
845000
unkown
page execute and read and write
270DAB11000
trusted library allocation
page read and write
270DDB31000
trusted library allocation
page read and write
270DCAD3000
trusted library allocation
page read and write
250A000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
27746629000
trusted library allocation
page read and write
4D50000
direct allocation
page execute and read and write
270E3D43000
trusted library allocation
page read and write
A14000
heap
page read and write
270DCB17000
trusted library allocation
page read and write
270DA7E5000
trusted library allocation
page read and write
EEF000
heap
page read and write
13D4000
heap
page read and write
27746146000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
27747CB4000
trusted library allocation
page read and write
19B0000
heap
page read and write
270DCA33000
trusted library allocation
page read and write
183F000
stack
page read and write
64A1000
heap
page read and write
4D31000
heap
page read and write
A9000
unkown
page read and write
270CC702000
heap
page read and write
64A1000
heap
page read and write
277468AF000
trusted library allocation
page read and write
270E219F000
trusted library allocation
page read and write
25B0000
heap
page execute and read and write
516000
unkown
page execute and read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
270DA685000
trusted library allocation
page read and write
19C4000
heap
page read and write
A14000
heap
page read and write
277468A1000
trusted library allocation
page read and write
19F5000
heap
page read and write
A14000
heap
page read and write
23837EC0000
heap
page read and write
F1B000
heap
page read and write
2774777E000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
DB4000
heap
page read and write
64A1000
heap
page read and write
CA4000
heap
page read and write
270DA519000
trusted library allocation
page read and write
27747B8B000
trusted library allocation
page read and write
270DC852000
trusted library allocation
page read and write
270DC603000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
250E000
heap
page read and write
1410000
direct allocation
page read and write
D10000
direct allocation
page read and write
CA4000
heap
page read and write
270DB440000
trusted library section
page read and write
277393EF000
heap
page read and write
4B31000
heap
page read and write
270DADAC000
trusted library allocation
page read and write
4D31000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
DC225FF000
stack
page read and write
27746B36000
trusted library allocation
page read and write
2774714B000
trusted library allocation
page read and write
A14000
heap
page read and write
27747CF4000
trusted library allocation
page read and write
64A1000
heap
page read and write
2774799B000
trusted library allocation
page read and write
27748289000
trusted library allocation
page read and write
270E4423000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DB85F000
trusted library allocation
page read and write
2774E41A000
trusted library allocation
page read and write
270C9BD7000
trusted library allocation
page read and write
A14000
heap
page read and write
270DA5DE000
trusted library allocation
page read and write
270DB2D0000
trusted library allocation
page read and write
270DA8A7000
trusted library allocation
page read and write
A14000
heap
page read and write
37C000
unkown
page execute and write copy
53B0000
direct allocation
page execute and read and write
52D0000
direct allocation
page execute and read and write
27746324000
trusted library allocation
page read and write
1A90000
direct allocation
page execute and read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
27747BA5000
trusted library allocation
page read and write
4D31000
heap
page read and write
A14000
heap
page read and write
270CC685000
heap
page read and write
1F2A000
heap
page read and write
270DC6B4000
trusted library allocation
page read and write
277E8D47000
trusted library allocation
page read and write
3FAF000
stack
page read and write
ADC000
heap
page read and write
270DA8DC000
trusted library allocation
page read and write
B1AA177000
stack
page read and write
27738975000
trusted library allocation
page read and write
270DA6CA000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270DC27C000
trusted library allocation
page read and write
270D6000000
trusted library allocation
page read and write
64A1000
heap
page read and write
27743D8A000
trusted library allocation
page read and write
270DB87E000
trusted library allocation
page read and write
A70000
heap
page read and write
27746FB1000
trusted library allocation
page read and write
CA4000
heap
page read and write
22CB000
heap
page read and write
270E0B2C000
trusted library allocation
page read and write
14A6E407000
trusted library allocation
page read and write
CA4000
heap
page read and write
2A7F000
stack
page read and write
324E000
stack
page read and write
1954000
heap
page read and write
270DA8AF000
trusted library allocation
page read and write
3A1000
unkown
page execute and write copy
270E42AD000
trusted library allocation
page read and write
43DE000
stack
page read and write
A14000
heap
page read and write
29FB000
stack
page read and write
A14000
heap
page read and write
DC19BD8000
stack
page read and write
270E4120000
trusted library allocation
page read and write
27746F89000
trusted library allocation
page read and write
270E4129000
trusted library allocation
page read and write
CA4000
heap
page read and write
270D840A000
trusted library allocation
page read and write
270E5CF7000
trusted library allocation
page read and write
27739443000
heap
page read and write
4B31000
heap
page read and write
DB4000
heap
page read and write
22C66000
heap
page read and write
64A1000
heap
page read and write
270E3FDD000
trusted library allocation
page read and write
27743D2D000
trusted library allocation
page read and write
16BBEB72000
trusted library allocation
page read and write
64A1000
heap
page read and write
270DB76F000
trusted library allocation
page read and write
64A1000
heap
page read and write
27747B05000
trusted library allocation
page read and write
270DB6FE000
trusted library allocation
page read and write
2CEF000
stack
page read and write
1B00000
heap
page read and write
27746AE9000
trusted library allocation
page read and write
63A8000
heap
page read and write
69E000
unkown
page execute and read and write
CA4000
heap
page read and write
4681000
heap
page read and write
64A1000
heap
page read and write
DB4000
heap
page read and write
27747A00000
trusted library allocation
page read and write
3DCE000
stack
page read and write
27746DB6000
trusted library allocation
page read and write
270D79C7000
trusted library allocation
page read and write
27747338000
trusted library allocation
page read and write
270E239D000
trusted library allocation
page read and write
27746DD2000
trusted library allocation
page read and write
270DBF6C000
trusted library allocation
page read and write
EA8000
heap
page read and write
270CC602000
heap
page read and write
27746685000
trusted library allocation
page read and write
270DA7BD000
trusted library allocation
page read and write
A14000
heap
page read and write
270E2117000
trusted library allocation
page read and write
277E8F00000
trusted library allocation
page read and write
A14000
heap
page read and write
CA4000
heap
page read and write
23837D12000
trusted library allocation
page read and write
270DCC00000
trusted library allocation
page read and write
13D4000
heap
page read and write
A15000
heap
page read and write
F8A21FE000
stack
page read and write
270DA8B4000
trusted library allocation
page read and write
1EF6000
heap
page read and write
27746B77000
trusted library allocation
page read and write
8415000
heap
page read and write
270DDA4B000
trusted library allocation
page read and write
5280000
direct allocation
page execute and read and write
64A1000
heap
page read and write
A14000
heap
page read and write
23838A6D000
heap
page read and write
4A20000
direct allocation
page execute and read and write
277509E0000
trusted library allocation
page read and write
B1A077E000
stack
page read and write
4D31000
heap
page read and write
13D4000
heap
page read and write
64A1000
heap
page read and write
270DA685000
trusted library allocation
page read and write
277467AF000
trusted library allocation
page read and write
270D60F7000
trusted library allocation
page read and write
270E3D03000
trusted library allocation
page read and write
2774659F000
trusted library allocation
page read and write
310E000
stack
page read and write
ED6000
heap
page read and write
270E42C0000
trusted library allocation
page read and write
13D4000
heap
page read and write
1954000
heap
page read and write
A14000
heap
page read and write
DC22F3D000
stack
page read and write
A14000
heap
page read and write
27747631000
trusted library allocation
page read and write
2773899B000
trusted library allocation
page read and write
64A1000
heap
page read and write
27747A75000
trusted library allocation
page read and write
2774663F000
trusted library allocation
page read and write
270DB99B000
trusted library allocation
page read and write
A14000
heap
page read and write
DB4000
heap
page read and write
270E4072000
trusted library allocation
page read and write
DC1AF4F000
stack
page read and write
64A1000
heap
page read and write
CA4000
heap
page read and write
270DC2A8000
trusted library allocation
page read and write
22C77000
heap
page read and write
27747BA5000
trusted library allocation
page read and write
596D000
stack
page read and write
DB4000
heap
page read and write
A14000
heap
page read and write
270E232E000
trusted library allocation
page read and write
270DBE00000
trusted library allocation
page read and write
27747C81000
trusted library allocation
page read and write
DC1ABFE000
stack
page read and write
A14000
heap
page read and write
340E000
stack
page read and write
270D6782000
trusted library allocation
page read and write
27746A59000
trusted library allocation
page read and write
A14000
heap
page read and write
49F0000
direct allocation
page execute and read and write
270DCA6A000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
238389BD000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
201D000
heap
page read and write
B1A063E000
stack
page read and write
4B31000
heap
page read and write
270DA2DE000
trusted library allocation
page read and write
270DB2BC000
trusted library allocation
page read and write
270DCBCC000
trusted library allocation
page read and write
27747B83000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E4047000
trusted library allocation
page read and write
4C90000
direct allocation
page execute and read and write
27747B67000
trusted library allocation
page read and write
2D2E000
stack
page read and write
DB4000
heap
page read and write
27747B92000
trusted library allocation
page read and write
1F7D000
heap
page read and write
27748233000
trusted library allocation
page read and write
27745E8A000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
F0C000
stack
page read and write
320F000
stack
page read and write
4B20000
direct allocation
page execute and read and write
64A1000
heap
page read and write
277389A5000
trusted library allocation
page read and write
4C40000
direct allocation
page execute and read and write
277467C7000
trusted library allocation
page read and write
270DCA68000
trusted library allocation
page read and write
270DC757000
trusted library allocation
page read and write
270DA884000
trusted library allocation
page read and write
27743CF0000
trusted library allocation
page read and write
27742ECF000
trusted library allocation
page read and write
1F8A000
heap
page read and write
3E6E000
stack
page read and write
64A1000
heap
page read and write
270DDBF9000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
4F44000
direct allocation
page execute and read and write
277E8E36000
heap
page read and write
64A1000
heap
page read and write
37C000
stack
page read and write
270DAD2C000
trusted library allocation
page read and write
277E8D79000
trusted library allocation
page read and write
1A3B000
heap
page read and write
A15000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270D67AF000
trusted library allocation
page read and write
270DCBC1000
trusted library allocation
page read and write
A14000
heap
page read and write
270DCB57000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
27743D00000
trusted library allocation
page read and write
270E42C7000
trusted library allocation
page read and write
AFB000
unkown
page execute and read and write
64A1000
heap
page read and write
4BAE000
stack
page read and write
13D4000
heap
page read and write
F16000
heap
page read and write
5FDF000
stack
page read and write
270D6867000
heap
page read and write
D10000
direct allocation
page read and write
270DC8C4000
trusted library allocation
page read and write
4B31000
heap
page read and write
4D31000
heap
page read and write
270D7E61000
trusted library allocation
page read and write
B1A8C3E000
stack
page read and write
2145000
heap
page read and write
23838A23000
heap
page read and write
2774608C000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
114E000
stack
page read and write
270D6160000
trusted library allocation
page read and write
A14000
heap
page read and write
277471C3000
trusted library allocation
page read and write
270CC702000
heap
page read and write
270DC255000
trusted library allocation
page read and write
2B1000
unkown
page execute and write copy
270E2166000
trusted library allocation
page read and write
27747993000
trusted library allocation
page read and write
22C6D000
heap
page read and write
270DA06A000
trusted library allocation
page read and write
64A1000
heap
page read and write
306F000
stack
page read and write
270DA8EE000
trusted library allocation
page read and write
3E6000
unkown
page execute and write copy
23837D1B000
trusted library allocation
page read and write
270DCA43000
trusted library allocation
page read and write
A14000
heap
page read and write
270DAF76000
trusted library allocation
page read and write
16BBE783000
heap
page read and write
2E6E000
stack
page read and write
64A1000
heap
page read and write
1F19000
heap
page read and write
64A1000
heap
page read and write
23837D64000
trusted library allocation
page read and write
238389A9000
heap
page read and write
27747B6D000
trusted library allocation
page read and write
270DBEF7000
trusted library allocation
page read and write
2BAF000
stack
page read and write
409000
unkown
page write copy
270DC81C000
trusted library allocation
page read and write
33AF000
stack
page read and write
39CE000
stack
page read and write
F8A3C3E000
stack
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270DA2E6000
trusted library allocation
page read and write
270CBDD0000
trusted library allocation
page read and write
44FF000
stack
page read and write
7E0000
direct allocation
page read and write
374E000
stack
page read and write
64A1000
heap
page read and write
4F7000
unkown
page execute and read and write
A14000
heap
page read and write
277388C3000
trusted library allocation
page read and write
27743E00000
trusted library allocation
page read and write
A15000
heap
page read and write
270E5C85000
trusted library allocation
page read and write
270DCBC1000
trusted library allocation
page read and write
23837DEF000
trusted library allocation
page read and write
270CC70E000
heap
page read and write
A15000
heap
page read and write
30EE000
stack
page read and write
27747AB8000
trusted library allocation
page read and write
3EFF000
stack
page read and write
270DBF43000
trusted library allocation
page read and write
64A1000
heap
page read and write
27745EC2000
trusted library allocation
page read and write
A14000
heap
page read and write
270E4B1C000
trusted library allocation
page read and write
E5E000
heap
page read and write
5CD6000
heap
page read and write
270DC503000
trusted library allocation
page read and write
B1A8E7E000
stack
page read and write
22C77000
heap
page read and write
14A6E40A000
trusted library allocation
page read and write
270DB8E2000
trusted library allocation
page read and write
1954000
heap
page read and write
27743D0E000
trusted library allocation
page read and write
270DB0AD000
trusted library allocation
page read and write
270E4003000
trusted library allocation
page read and write
27745EAF000
trusted library allocation
page read and write
277E8930000
unclassified section
page readonly
270CC70E000
heap
page read and write
270CC674000
heap
page read and write
7E0000
direct allocation
page read and write
A14000
heap
page read and write
13D4000
heap
page read and write
A14000
heap
page read and write
1580000
direct allocation
page read and write
27738990000
trusted library allocation
page read and write
270DC805000
trusted library allocation
page read and write
277460B0000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E0118000
trusted library allocation
page read and write
2635000
heap
page read and write
6C81F000
unkown
page write copy
CA4000
heap
page read and write
CA4000
heap
page read and write
445E000
stack
page read and write
1580000
direct allocation
page read and write
4B31000
heap
page read and write
323F000
stack
page read and write
270E41D3000
trusted library allocation
page read and write
3ECE000
stack
page read and write
270E44FD000
trusted library allocation
page read and write
DC2267B000
stack
page read and write
270DA897000
trusted library allocation
page read and write
198000
stack
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
270D8800000
trusted library allocation
page read and write
27746AED000
trusted library allocation
page read and write
64A1000
heap
page read and write
27742ECF000
trusted library allocation
page read and write
A14000
heap
page read and write
33BE000
stack
page read and write
CA4000
heap
page read and write
422E000
stack
page read and write
263FF9C0000
heap
page read and write
64A1000
heap
page read and write
27743BEA000
trusted library allocation
page read and write
4B31000
heap
page read and write
270DA8B4000
trusted library allocation
page read and write
A15000
heap
page read and write
22C77000
heap
page read and write
277471C3000
trusted library allocation
page read and write
3C0F000
stack
page read and write
A14000
heap
page read and write
27743D9B000
trusted library allocation
page read and write
27747B8D000
trusted library allocation
page read and write
270E3F2F000
trusted library allocation
page read and write
EEA000
heap
page read and write
4C20000
trusted library allocation
page read and write
238389A9000
heap
page read and write
270D6C00000
trusted library allocation
page read and write
270D7C6F000
trusted library allocation
page read and write
428E000
stack
page read and write
270CC70A000
heap
page read and write
16BBECC6000
heap
page read and write
270DC25A000
trusted library allocation
page read and write
DB4000
heap
page read and write
23837D86000
trusted library allocation
page read and write
64A1000
heap
page read and write
2B3E000
stack
page read and write
B1A013A000
stack
page read and write
A14000
heap
page read and write
27743916000
trusted library allocation
page read and write
384000
unkown
page execute and write copy
A14000
heap
page read and write
F8A2A3E000
stack
page read and write
A14000
heap
page read and write
14A6E400000
trusted library allocation
page read and write
270E5CA1000
trusted library allocation
page read and write
2EEA0000
trusted library allocation
page read and write
F11000
heap
page read and write
270E4075000
trusted library allocation
page read and write
270DA782000
trusted library allocation
page read and write
270D6090000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
27746B19000
trusted library allocation
page read and write
A14000
heap
page read and write
27747907000
trusted library allocation
page read and write
270E6E75000
trusted library allocation
page read and write
A14000
heap
page read and write
277466F0000
trusted library allocation
page read and write
4CB1000
heap
page read and write
5310000
direct allocation
page execute and read and write
27747B23000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
1954000
heap
page read and write
328F000
stack
page read and write
A14000
heap
page read and write
270DDA20000
trusted library allocation
page read and write
23837A90000
heap
page readonly
22C61000
heap
page read and write
27743586000
heap
page read and write
1D90000
heap
page read and write
705E000
heap
page read and write
64A1000
heap
page read and write
3FEE000
stack
page read and write
4C2E000
stack
page read and write
270D8100000
trusted library section
page read and write
423000
unkown
page readonly
A14000
heap
page read and write
64A1000
heap
page read and write
270DCBE5000
trusted library allocation
page read and write
24DC000
heap
page read and write
270DAED2000
trusted library allocation
page read and write
27747B4F000
trusted library allocation
page read and write
38AF000
stack
page read and write
A15000
heap
page read and write
270D614F000
trusted library allocation
page read and write
34EF000
stack
page read and write
270DB5EE000
trusted library allocation
page read and write
22C61000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
2AFF000
stack
page read and write
4AEE000
stack
page read and write
28BE000
stack
page read and write
4D31000
heap
page read and write
27743E61000
trusted library allocation
page read and write
CA4000
heap
page read and write
D80000
direct allocation
page read and write
CA4000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
22C75000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
1CAA1000
heap
page read and write
270DB450000
trusted library section
page read and write
270DDA43000
trusted library allocation
page read and write
CA4000
heap
page read and write
270E458D000
trusted library allocation
page read and write
270E4233000
trusted library allocation
page read and write
270DA65D000
trusted library allocation
page read and write
270CC70F000
heap
page read and write
277509B8000
trusted library allocation
page read and write
270DDCB0000
trusted library allocation
page read and write
15F5000
heap
page read and write
238389E8000
heap
page read and write
680000
heap
page read and write
27747D9D000
unclassified section
page read and write
A14000
heap
page read and write
4C60000
heap
page read and write
64A1000
heap
page read and write
27748071000
trusted library allocation
page read and write
40A0000
direct allocation
page execute and read and write
43C000
unkown
page execute and read and write
317E000
stack
page read and write
A14000
heap
page read and write
27748230000
trusted library allocation
page read and write
39BF000
stack
page read and write
4F50000
direct allocation
page execute and read and write
42B0000
heap
page read and write
27743200000
trusted library allocation
page read and write
12CD024BC000
trusted library allocation
page read and write
277439CF000
trusted library allocation
page read and write
277463DE000
trusted library allocation
page read and write
270E2169000
trusted library allocation
page read and write
270DC28D000
trusted library allocation
page read and write
588E000
stack
page read and write
2774613C000
trusted library allocation
page read and write
64A1000
heap
page read and write
277388D0000
trusted library allocation
page read and write
270E449E000
trusted library allocation
page read and write
A15000
heap
page read and write
23838A2F000
heap
page read and write
277465D9000
trusted library allocation
page read and write
270DA4CA000
trusted library allocation
page read and write
A14000
heap
page read and write
85B000
unkown
page execute and read and write
380106304000
trusted library allocation
page read and write
4C40000
direct allocation
page execute and read and write
A14000
heap
page read and write
270E202B000
trusted library allocation
page read and write
270E45E2000
trusted library allocation
page read and write
27746921000
trusted library allocation
page read and write
1580000
direct allocation
page read and write
1C38F000
stack
page read and write
427000
unkown
page write copy
6130000
heap
page read and write
A14000
heap
page read and write
27747C03000
trusted library allocation
page read and write
27747D00000
trusted library section
page readonly
1E86000
heap
page read and write
270E310C000
trusted library allocation
page read and write
CA4000
heap
page read and write
270D8B9A000
trusted library allocation
page read and write
27746EDF000
trusted library allocation
page read and write
270DC682000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
270DB900000
trusted library allocation
page read and write
CA4000
heap
page read and write
2774389E000
trusted library allocation
page read and write
270E226C000
trusted library allocation
page read and write
23837B83000
unkown
page execute read
270DA803000
trusted library allocation
page read and write
23838AAB000
heap
page read and write
270DF020000
trusted library allocation
page read and write
564000
heap
page read and write
270DDC0E000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
1C7CE000
stack
page read and write
270DC6AC000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
4D31000
heap
page read and write
4B31000
heap
page read and write
CA5000
heap
page read and write
158A7D85000
heap
page read and write
270D65D0000
trusted library section
page readonly
4B31000
heap
page read and write
27747BDA000
trusted library allocation
page read and write
270E42AD000
trusted library allocation
page read and write
A14000
heap
page read and write
270DA5AF000
trusted library allocation
page read and write
16BBE920000
heap
page read and write
277473D0000
trusted library allocation
page read and write
27750ADA000
trusted library allocation
page read and write
7D0000
heap
page read and write
270E5C81000
trusted library allocation
page read and write
270DC8E0000
trusted library allocation
page read and write
270DC822000
trusted library allocation
page read and write
13D4000
heap
page read and write
2A30000
direct allocation
page read and write
27746FA5000
trusted library allocation
page read and write
66B000
unkown
page execute and read and write
A14000
heap
page read and write
27746F73000
trusted library allocation
page read and write
64A1000
heap
page read and write
277476CC000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
326F000
stack
page read and write
56AF000
stack
page read and write
EEF000
heap
page read and write
564000
heap
page read and write
270E4423000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270E22E3000
trusted library allocation
page read and write
270DCBC9000
trusted library allocation
page read and write
A14000
heap
page read and write
7E00000
heap
page read and write
416F000
stack
page read and write
A14000
heap
page read and write
270D6168000
trusted library allocation
page read and write
270E412F000
trusted library allocation
page read and write
16BBE750000
heap
page read and write
23837BF0000
trusted library section
page read and write
27747800000
trusted library allocation
page read and write
4CC0000
direct allocation
page execute and read and write
277388C9000
trusted library allocation
page read and write
4B31000
heap
page read and write
277482DB000
trusted library allocation
page read and write
4B6F000
stack
page read and write
4D31000
heap
page read and write
156E000
stack
page read and write
64A1000
heap
page read and write
270DA8E0000
trusted library allocation
page read and write
74D64C1000
trusted library allocation
page execute read
270CC709000
heap
page read and write
4B30000
heap
page read and write
40E0000
direct allocation
page read and write
270CC709000
heap
page read and write
A14000
heap
page read and write
270D610B000
trusted library allocation
page read and write
277E89AF000
remote allocation
page execute read
2774679E000
trusted library allocation
page read and write
270D7810000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
4B31000
heap
page read and write
27747C91000
trusted library allocation
page read and write
19C4000
heap
page read and write
16BBEB7B000
trusted library allocation
page read and write
A14000
heap
page read and write
13D4000
heap
page read and write
327E000
stack
page read and write
4B31000
heap
page read and write
270E5C92000
trusted library allocation
page read and write
24A0000
heap
page read and write
64A1000
heap
page read and write
270DBF85000
trusted library allocation
page read and write
27747B11000
trusted library allocation
page read and write
64A1000
heap
page read and write
361000
unkown
page execute and write copy
A14000
heap
page read and write
270E4338000
trusted library allocation
page read and write
277E8D6E000
trusted library allocation
page read and write
29BE000
stack
page read and write
64A1000
heap
page read and write
2540000
heap
page read and write
DC226BB000
stack
page read and write
64A1000
heap
page read and write
27744C67000
trusted library allocation
page read and write
270E42FE000
trusted library allocation
page read and write
263FFA00000
trusted library allocation
page read and write
270CC713000
heap
page read and write
2774669D000
trusted library allocation
page read and write
413E000
stack
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
CA4000
heap
page read and write
A14000
heap
page read and write
1F87000
heap
page read and write
472E000
stack
page read and write
35EE000
stack
page read and write
66B000
unkown
page execute and read and write
27747BCC000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
4B31000
heap
page read and write
A14000
heap
page read and write
270E21F1000
trusted library allocation
page read and write
2383899F000
heap
page read and write
27745E92000
trusted library allocation
page read and write
270DB780000
trusted library allocation
page read and write
270DADFD000
trusted library allocation
page read and write
1C51E000
stack
page read and write
16BBEB64000
trusted library allocation
page read and write
64A1000
heap
page read and write
A15000
heap
page read and write
277461C0000
trusted library allocation
page read and write
A14000
heap
page read and write
3A0000
unkown
page readonly
270CC704000
heap
page read and write
270E5C79000
trusted library allocation
page read and write
A14000
heap
page read and write
4F60000
direct allocation
page execute and read and write
A14000
heap
page read and write
270DC7FC000
trusted library allocation
page read and write
A14000
heap
page read and write
2774400A000
trusted library allocation
page read and write
270D604A000
trusted library allocation
page read and write
270DB0E6000
trusted library allocation
page read and write
27743097000
trusted library allocation
page read and write
4C70000
heap
page read and write
238389BD000
heap
page read and write
27743B00000
trusted library allocation
page read and write
270DA336000
trusted library allocation
page read and write
27747B9B000
trusted library allocation
page read and write
3D5000
unkown
page execute and write copy
2EF3F000
heap
page read and write
2FCE000
stack
page read and write
1205000
heap
page read and write
104E000
stack
page read and write
CA4000
heap
page read and write
270E2510000
trusted library section
page read and write
270DBF79000
trusted library allocation
page read and write
27744C44000
trusted library allocation
page read and write
A14000
heap
page read and write
270E2310000
trusted library allocation
page read and write
23838A84000
heap
page read and write
1C7CE000
stack
page read and write
27747BFD000
trusted library allocation
page read and write
270DDA96000
trusted library allocation
page read and write
27743226000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
4AB0000
heap
page read and write
4D31000
heap
page read and write
270DBF73000
trusted library allocation
page read and write
27742E7E000
trusted library allocation
page read and write
A15000
heap
page read and write
1294000
heap
page read and write
277E8F14000
trusted library allocation
page read and write
A14000
heap
page read and write
27747B96000
trusted library allocation
page read and write
270DA2F0000
trusted library allocation
page read and write
27747C62000
trusted library allocation
page read and write
270D6769000
trusted library allocation
page read and write
27746A65000
trusted library allocation
page read and write
16BBED17000
trusted library allocation
page read and write
A14000
heap
page read and write
27747B36000
trusted library allocation
page read and write
A14000
heap
page read and write
29EF000
stack
page read and write
270DB200000
trusted library allocation
page read and write
22C6A000
heap
page read and write
23838A31000
heap
page read and write
27CF000
stack
page read and write
270E417D000
trusted library allocation
page read and write
14A6E160000
heap
page read and write
DB0000
heap
page read and write
22C6E000
heap
page read and write
A14000
heap
page read and write
270CC714000
heap
page read and write
270D795F000
trusted library allocation
page read and write
5BF000
unkown
page execute and read and write
A14000
heap
page read and write
270D6181000
trusted library allocation
page read and write
A14000
heap
page read and write
277438F4000
trusted library allocation
page read and write
1FD6000
heap
page read and write
64A1000
heap
page read and write
270CC6A3000
heap
page read and write
64A1000
heap
page read and write
270CC71A000
heap
page read and write
B1A017B000
stack
page read and write
270E222D000
trusted library allocation
page read and write
66D000
unkown
page execute and write copy
530000
unkown
page execute and read and write
1954000
heap
page read and write
270E45AE000
trusted library allocation
page read and write
270D8BA6000
trusted library allocation
page read and write
1954000
heap
page read and write
A14000
heap
page read and write
270DC539000
trusted library allocation
page read and write
2773679A000
heap
page read and write
64A1000
heap
page read and write
564000
heap
page read and write
27748216000
trusted library allocation
page read and write
27747703000
trusted library allocation
page read and write
270DBF3E000
trusted library allocation
page read and write
2EC0000
direct allocation
page read and write
270C9B5D000
trusted library allocation
page read and write
23838330000
heap
page read and write
377F000
stack
page read and write
19E000
stack
page read and write
19C4000
heap
page read and write
27746D03000
trusted library allocation
page read and write
270DB6CE000
trusted library allocation
page read and write
270E3105000
trusted library allocation
page read and write
27743D47000
trusted library allocation
page read and write
270D60AA000
trusted library allocation
page read and write
64A1000
heap
page read and write
B81000
unkown
page execute and write copy
121A000
heap
page read and write
270DA2CD000
trusted library allocation
page read and write
270E41A1000
trusted library allocation
page read and write
27743BA8000
trusted library allocation
page read and write
27743000000
trusted library allocation
page read and write
270DB0BD000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E451A000
trusted library allocation
page read and write
270DA660000
trusted library allocation
page read and write
4B20000
direct allocation
page read and write
A14000
heap
page read and write
23838A23000
heap
page read and write
277432A4000
trusted library allocation
page read and write
4D31000
heap
page read and write
4D31000
heap
page read and write
270E42E4000
trusted library allocation
page read and write
158A9539000
heap
page read and write
27745EFE000
trusted library allocation
page read and write
1FBB000
heap
page read and write
27736600000
trusted library allocation
page read and write
270E0614000
trusted library allocation
page read and write
270DC73D000
trusted library allocation
page read and write
DB4000
heap
page read and write
2B1000
unkown
page execute and read and write
270E5CA1000
trusted library allocation
page read and write
270E2398000
trusted library allocation
page read and write
270D6DA1000
trusted library allocation
page read and write
1294000
heap
page read and write
270DA2CD000
trusted library allocation
page read and write
23838A7B000
heap
page read and write
103A000
stack
page read and write
277466C3000
trusted library allocation
page read and write
649F000
stack
page read and write
B19F58B000
stack
page read and write
4691000
heap
page read and write
A14000
heap
page read and write
3A0000
unkown
page read and write
3BEF000
stack
page read and write
2774327D000
trusted library allocation
page read and write
27743275000
trusted library allocation
page read and write
270D7E4C000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E40F2000
trusted library allocation
page read and write
64A1000
heap
page read and write
23838350000
heap
page read and write
27747CF4000
trusted library allocation
page read and write
27743D90000
trusted library allocation
page read and write
270DA8DC000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270DBF94000
trusted library allocation
page read and write
A14000
heap
page read and write
316F000
stack
page read and write
27747B92000
trusted library allocation
page read and write
270DCBCC000
trusted library allocation
page read and write
270E42A8000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
27747686000
trusted library allocation
page read and write
1F0000
heap
page read and write
277474A3000
trusted library allocation
page read and write
27747677000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
277466FA000
trusted library allocation
page read and write
270E4264000
trusted library allocation
page read and write
263FFD07000
trusted library allocation
page read and write
20FF0F604000
trusted library allocation
page read and write
270E5C65000
trusted library allocation
page read and write
A14000
heap
page read and write
270DBF7E000
trusted library allocation
page read and write
270E5CCD000
trusted library allocation
page read and write
27742EC8000
trusted library allocation
page read and write
270E21B6000
trusted library allocation
page read and write
270CC709000
heap
page read and write
A14000
heap
page read and write
5320000
direct allocation
page execute and read and write
41EE000
stack
page read and write
A15000
heap
page read and write
270DBF5B000
trusted library allocation
page read and write
1954000
heap
page read and write
27747BEF000
trusted library allocation
page read and write
27747CF7000
trusted library allocation
page read and write
270E45E5000
trusted library allocation
page read and write
270DA20F000
trusted library allocation
page read and write
A14000
heap
page read and write
13D4000
heap
page read and write
270DB763000
trusted library allocation
page read and write
22B13000
heap
page read and write
49C0000
direct allocation
page execute and read and write
23837D00000
trusted library allocation
page read and write
37C000
unkown
page execute and read and write
49B0000
direct allocation
page execute and read and write
4C60000
heap
page read and write
277438FE000
trusted library allocation
page read and write
363F000
stack
page read and write
5EDF000
stack
page read and write
27747A43000
trusted library allocation
page read and write
23838A29000
heap
page read and write
63AA000
heap
page read and write
427000
unkown
page write copy
27743226000
trusted library allocation
page read and write
4B31000
heap
page read and write
DC19FCE000
stack
page read and write
4D31000
heap
page read and write
A15000
heap
page read and write
CA4000
heap
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
270D68C8000
heap
page read and write
3B3F000
stack
page read and write
270DA2A8000
trusted library allocation
page read and write
270CC70E000
heap
page read and write
270E20C6000
trusted library allocation
page read and write
27742E98000
trusted library allocation
page read and write
16BBED10000
trusted library allocation
page read and write
270E2100000
trusted library allocation
page read and write
5B4D000
stack
page read and write
53C0000
direct allocation
page execute and read and write
270D8B1E000
trusted library allocation
page read and write
270DB134000
trusted library allocation
page read and write
22C73000
heap
page read and write
277437AA000
trusted library allocation
page read and write
CA4000
heap
page read and write
270CC70F000
heap
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
493000
unkown
page execute and read and write
64A1000
heap
page read and write
270DA046000
trusted library allocation
page read and write
270D8B18000
trusted library allocation
page read and write
376F000
stack
page read and write
4B31000
heap
page read and write
B2F000
heap
page read and write
194000
stack
page read and write
27746AF0000
trusted library allocation
page read and write
1AFE000
heap
page read and write
270E23D7000
trusted library allocation
page read and write
270E4B00000
trusted library allocation
page read and write
27746072000
trusted library allocation
page read and write
270DC258000
trusted library allocation
page read and write
6C820000
unkown
page read and write
277389B0000
trusted library allocation
page read and write
A14000
heap
page read and write
63E000
unkown
page execute and read and write
A14000
heap
page read and write
61EB4000
direct allocation
page read and write
A14000
heap
page read and write
27747400000
trusted library allocation
page read and write
27748003000
trusted library allocation
page read and write
64A1000
heap
page read and write
318E000
stack
page read and write
270D7C55000
trusted library allocation
page read and write
270D7A50000
trusted library section
page read and write
611F000
stack
page read and write
A77000
heap
page read and write
270DB8F3000
trusted library allocation
page read and write
270DA7B8000
trusted library allocation
page read and write
270E5C8E000
trusted library allocation
page read and write
2774379C000
trusted library allocation
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
2D3F000
stack
page read and write
14A6E5D0000
heap
page read and write
277472C8000
trusted library allocation
page read and write
2774823C000
trusted library allocation
page read and write
270DA2B8000
trusted library allocation
page read and write
27747A96000
trusted library allocation
page read and write
27746D5A000
trusted library allocation
page read and write
64A1000
heap
page read and write
270E3FB8000
trusted library allocation
page read and write
270DA8E0000
trusted library allocation
page read and write
A15000
heap
page read and write
DC1A07E000
stack
page read and write
CA4000
heap
page read and write
37CE000
stack
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
27747A83000
trusted library allocation
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
270E2B30000
trusted library allocation
page read and write
426E000
stack
page read and write
1580000
direct allocation
page read and write
4B31000
heap
page read and write
28D17000
heap
page read and write
27743520000
heap
page read and write
270DA4A5000
trusted library allocation
page read and write
2773896C000
trusted library allocation
page read and write
64A1000
heap
page read and write
B1A57FE000
stack
page read and write
A14000
heap
page read and write
A14000
heap
page read and write
4D31000
heap
page read and write
A14000
heap
page read and write
270E0B16000
trusted library allocation
page read and write
A14000
heap
page read and write
A10000
heap
page read and write
270E233A000
trusted library allocation
page read and write
277388FB000
trusted library allocation
page read and write
DB4000
heap
page read and write
27747057000
trusted library allocation
page read and write
4D31000
heap
page read and write
64A1000
heap
page read and write
64A1000
heap
page read and write
2D3E000
stack
page read and write
270D6CED000
trusted library allocation
page read and write
40AF000
stack
page read and write
270DA5C1000
trusted library allocation
page read and write
270DCA6A000
trusted library allocation
page read and write
4B60000
direct allocation
page execute and read and write
27747A5C000
trusted library allocation
page read and write
7E0000
direct allocation
page read and write
277480AF000
trusted library allocation
page read and write
270DBF0E000
trusted library allocation
page read and write
5050000
trusted library allocation
page read and write
27743226000
trusted library allocation
page read and write
23837D5C000
trusted library allocation
page read and write
A14000
heap
page read and write
64A1000
heap
page read and write
270DA2E6000
trusted library allocation
page read and write
A14000
heap
page read and write
A15000
heap
page read and write
22C5D000
heap
page read and write
A15000
heap
page read and write
4E20000
direct allocation
page execute and read and write
270DF024000
trusted library allocation
page read and write
64A1000
heap
page read and write
A14000
heap
page read and write
372E000
stack
page read and write
2774E400000
trusted library allocation
page read and write
There are 7816 hidden memdumps, click here to show them.