IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_4e41abbb74886152b6742da3591b45a7624070_864df792_8b3b7b8c-6914-4035-a91c-8ed313a4e407\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\userAAKKKEBFCG.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\RoamingIJEGHJECFC.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
malicious
C:\ProgramData\CFCBKKKJJJKKEBGDAFIDAAAEHD
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\CFIJEBFCGDAAKFHIDBFI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CFIJEBFCGDAAKFHIDBFIDBKFHJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\ECGDBFCB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\FBGIDHCAAKEBAKFIIIEBAAEGCG
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\FHDHCAAKECFIDHIEBAKFCGCFCB
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GHJDGDBF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\IECFBKFHCAEHJJKEGDGH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KFCFBAAEHCFHJJKEHJKJ
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_9fa327eb6c.exe_4989181adf3d1e0c32470a268396c5d8c8829f2_edf01a57_0daf4495-35f8-4d2e-a9ff-2955f93be9cb\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_9fa327eb6c.exe_4989181adf3d1e0c32470a268396c5d8c8829f2_edf01a57_555010e2-04ae-4347-8f51-8406f158f572\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_9fa327eb6c.exe_4989181adf3d1e0c32470a268396c5d8c8829f2_edf01a57_eb609ebf-a46c-4b21-b757-60c1c8ffd909\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2B0C.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Jul 27 10:02:07 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2BE7.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2C17.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5BE0.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Jul 27 10:02:20 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5C4E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5C6E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER870B.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Jul 27 10:01:25 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8874.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER88C3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9D6D.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Jul 27 10:02:36 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9E0A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9E3A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\compatibility.ini
Windows WIN.INI
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Windows\Tasks\axplong.job
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 45 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\RoamingIJEGHJECFC.exe"
malicious
C:\Users\user\AppData\RoamingIJEGHJECFC.exe
"C:\Users\user\AppData\RoamingIJEGHJECFC.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\userAAKKKEBFCG.exe"
malicious
C:\Users\userAAKKKEBFCG.exe
"C:\Users\userAAKKKEBFCG.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
"C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\1000016001\9fa327eb6c.exe
"C:\Users\user\AppData\Local\Temp\1000016001\9fa327eb6c.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000017001\8e8f4571c5.exe
"C:\Users\user\AppData\Local\Temp\1000017001\8e8f4571c5.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000016001\9fa327eb6c.exe
"C:\Users\user\AppData\Local\Temp\1000016001\9fa327eb6c.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000017001\8e8f4571c5.exe
"C:\Users\user\AppData\Local\Temp\1000017001\8e8f4571c5.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000016001\9fa327eb6c.exe
"C:\Users\user\AppData\Local\Temp\1000016001\9fa327eb6c.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6720 -s 2376
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7968 -s 1332
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4744 -s 1292
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2260 -parentBuildID 20230927232528 -prefsHandle 2204 -prefMapHandle 2196 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {37ba41c5-ee86-4e0d-ae50-58ce2311310d} 3712 "\\.\pipe\gecko-crash-server-pipe.3712" 1b10486e910 socket
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 1036
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2200 -parentBuildID 20230927232528 -prefsHandle 2136 -prefMapHandle 2128 -prefsLen 25350 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9f4ac7dc-960f-42f4-ad8d-3d9c0af60b93} 2940 "\\.\pipe\gecko-crash-server-pipe.2940" 193b946bd10 socket
There are 19 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://85.28.47.31/8405906461a5200c/vcruntime140.dll
85.28.47.31
malicious
http://185.215.113.16/a=t
unknown
malicious
http://185.215.113.19/Vi9leo/index.php
185.215.113.19
malicious
http://185.215.113.19/Vi9leo/index.phpOb
unknown
malicious
http://85.28.47.31/8405906461a5200c/softokn3.dll
85.28.47.31
malicious
http://185.215.113.19/Vi9leo/index.php/b3
unknown
malicious
http://185.215.113.19/Vi9leo/index.phpOe
unknown
malicious
http://85.28.47.31/8405906461a5200c/nss3.dll
85.28.47.31
malicious
http://185.215.113.19/Vi9leo/index.php_b#
unknown
malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://firefox.settings.services.allizom.org/v1/buckets/main/collections/search-config/records
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://spocs.getpocket.com/spocs
unknown
https://screenshots.firefox.com
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://profiler.firefox.com/
unknown
https://github.com/mozilla-services/screenshots
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCaptureRequest
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/switching-devices?utm_source=panel-def
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncoded
unknown
http://85.28.47.31/8405906461a5200c/freebl3.dllO
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsing
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://ok.ru/
unknown
https://support.mozilla.org/kb/fix-video-audio-problems-firefox-windowsThe
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://www.ecosia.org/newtab/
unknown
http://85.28.47.31/8405906461a5200c/freebl3.dllc
unknown
https://www.youtube.com/accountMOZ_CRASHRE
unknown
https://poczta.interia.pl/mh/?mailto=%sunavailable:FEATURE_FAILURE_DCOMP_NOT_ANGLEgetOriginAttribute
unknown
https://www.bbc.co.uk/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://www.youtube.com/accountC:
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
http://85.28.47.31yd
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
http://85.28.47.31/;1
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
http://85.28.47.31/5499d72b3a3e55be.php/1
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://profiler.firefox.comprofilerRecordingButtonCreated
unknown
http://185.215.113.16/Jo89Ku7d/index.phpzRm4SJjISZA3JNjZ64n0LR=
unknown
https://monitor.firefox.com/about
unknown
https://developer.mozilla.org/docs/Web/API/Push_API/Using_the_Push_API#Encryptiondocument.requestSto
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/f0f51715-7f5e-48de-839
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://www.ebay.de/U.
unknown
https://www.youtube.com/accounthttps://www.youtube.com/account
unknown
http://85.28.47.31/=1
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://firefox-source-docs.mozilla.org/remote/Security.html
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://vk.com/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingTrying
unknown
https://www.olx.pl/
unknown
http://185.215.113.16/soka/random.exeb3
unknown
https://xhr.spec.whatwg.org/#sync-warningThe
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-4
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-2
unknown
https://github.com/google/closure-compiler/issues/3177
unknown
http://85.28.47.31/5499d72b3a3e55be.phposition:
unknown
https://www.google.com/complete/
unknown
https://webextensions.settings.services.mozilla.com/v1
unknown
https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query-all.ts
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/firefox-relay-integration
unknown
http://185.215.113.16/stealc/random.exe-
unknown
https://addons.mozilla.org/%LOCALE%/firefox/
unknown
http://185.215.113.16/stealc/random.exe/
unknown
https://www.avito.ru/
unknown
http://185.215.113.16/Jo89Ku7d/index.php%
unknown
http://85.28.47.31/5499d72b3a3e55be.php3
unknown
http://developer.mozilla.org/en/docs/DOM:element.removeEventListener
unknown
https://spocs.getpocket.com
unknown
https://developers.google.com/safe-browsing/v4/advisory
unknown
https://hg.mozilla.org/releases/mozilla-release/rev/68e4c357d26c5a1f075a1ec0c696d4fe684ed881
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
spocs.getpocket.com
unknown
malicious
detectportal.firefox.com
unknown
malicious
content-signature-2.cdn.mozilla.net
unknown
malicious
support.mozilla.org
unknown
malicious
push.services.mozilla.com
unknown
malicious
shavar.services.mozilla.com
unknown
malicious
www.youtube.com
unknown
malicious
example.org
93.184.215.14
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
youtube-ui.l.google.com
142.250.186.46
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
contile.services.mozilla.com
34.117.188.166
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
There are 7 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
85.28.47.31
unknown
Russian Federation
malicious
185.215.113.19
unknown
Portugal
malicious
185.215.113.16
unknown
Portugal
malicious
142.250.186.46
youtube-ui.l.google.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
prod.ads.prod.webservices.mozgcp.net
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{ece86917-5629-1c6b-603c-4bdeb0007264}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
malicious
\REGISTRY\A\{ece86917-5629-1c6b-603c-4bdeb0007264}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
malicious
\REGISTRY\A\{ece86917-5629-1c6b-603c-4bdeb0007264}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
malicious
\REGISTRY\A\{ece86917-5629-1c6b-603c-4bdeb0007264}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
malicious
\REGISTRY\A\{ece86917-5629-1c6b-603c-4bdeb0007264}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
malicious
\REGISTRY\A\{ece86917-5629-1c6b-603c-4bdeb0007264}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
malicious
\REGISTRY\A\{ece86917-5629-1c6b-603c-4bdeb0007264}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
malicious
\REGISTRY\A\{ece86917-5629-1c6b-603c-4bdeb0007264}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
malicious
\REGISTRY\A\{ece86917-5629-1c6b-603c-4bdeb0007264}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
malicious
\REGISTRY\A\{ece86917-5629-1c6b-603c-4bdeb0007264}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
malicious
\REGISTRY\A\{ece86917-5629-1c6b-603c-4bdeb0007264}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
malicious
\REGISTRY\A\{ece86917-5629-1c6b-603c-4bdeb0007264}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
malicious
\REGISTRY\A\{ece86917-5629-1c6b-603c-4bdeb0007264}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
malicious
\REGISTRY\A\{ece86917-5629-1c6b-603c-4bdeb0007264}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
malicious
\REGISTRY\A\{ece86917-5629-1c6b-603c-4bdeb0007264}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
malicious
\REGISTRY\A\{ece86917-5629-1c6b-603c-4bdeb0007264}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
malicious
\REGISTRY\A\{ece86917-5629-1c6b-603c-4bdeb0007264}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
malicious
\REGISTRY\A\{ece86917-5629-1c6b-603c-4bdeb0007264}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
malicious
\REGISTRY\A\{ece86917-5629-1c6b-603c-4bdeb0007264}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
9fa327eb6c.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
8e8f4571c5.exe
malicious
\REGISTRY\A\{00d1d700-0236-8db0-a51e-79c76f2f6fa1}\Root\InventoryApplicationFile\9fa327eb6c.exe|15125af88a7938b9
ProgramId
\REGISTRY\A\{00d1d700-0236-8db0-a51e-79c76f2f6fa1}\Root\InventoryApplicationFile\9fa327eb6c.exe|15125af88a7938b9
FileId
\REGISTRY\A\{00d1d700-0236-8db0-a51e-79c76f2f6fa1}\Root\InventoryApplicationFile\9fa327eb6c.exe|15125af88a7938b9
LowerCaseLongPath
\REGISTRY\A\{00d1d700-0236-8db0-a51e-79c76f2f6fa1}\Root\InventoryApplicationFile\9fa327eb6c.exe|15125af88a7938b9
LongPathHash
\REGISTRY\A\{00d1d700-0236-8db0-a51e-79c76f2f6fa1}\Root\InventoryApplicationFile\9fa327eb6c.exe|15125af88a7938b9
Name
\REGISTRY\A\{00d1d700-0236-8db0-a51e-79c76f2f6fa1}\Root\InventoryApplicationFile\9fa327eb6c.exe|15125af88a7938b9
OriginalFileName
\REGISTRY\A\{00d1d700-0236-8db0-a51e-79c76f2f6fa1}\Root\InventoryApplicationFile\9fa327eb6c.exe|15125af88a7938b9
Publisher
\REGISTRY\A\{00d1d700-0236-8db0-a51e-79c76f2f6fa1}\Root\InventoryApplicationFile\9fa327eb6c.exe|15125af88a7938b9
Version
\REGISTRY\A\{00d1d700-0236-8db0-a51e-79c76f2f6fa1}\Root\InventoryApplicationFile\9fa327eb6c.exe|15125af88a7938b9
BinFileVersion
\REGISTRY\A\{00d1d700-0236-8db0-a51e-79c76f2f6fa1}\Root\InventoryApplicationFile\9fa327eb6c.exe|15125af88a7938b9
BinaryType
\REGISTRY\A\{00d1d700-0236-8db0-a51e-79c76f2f6fa1}\Root\InventoryApplicationFile\9fa327eb6c.exe|15125af88a7938b9
ProductName
\REGISTRY\A\{00d1d700-0236-8db0-a51e-79c76f2f6fa1}\Root\InventoryApplicationFile\9fa327eb6c.exe|15125af88a7938b9
ProductVersion
\REGISTRY\A\{00d1d700-0236-8db0-a51e-79c76f2f6fa1}\Root\InventoryApplicationFile\9fa327eb6c.exe|15125af88a7938b9
LinkDate
\REGISTRY\A\{00d1d700-0236-8db0-a51e-79c76f2f6fa1}\Root\InventoryApplicationFile\9fa327eb6c.exe|15125af88a7938b9
BinProductVersion
\REGISTRY\A\{00d1d700-0236-8db0-a51e-79c76f2f6fa1}\Root\InventoryApplicationFile\9fa327eb6c.exe|15125af88a7938b9
AppxPackageFullName
\REGISTRY\A\{00d1d700-0236-8db0-a51e-79c76f2f6fa1}\Root\InventoryApplicationFile\9fa327eb6c.exe|15125af88a7938b9
AppxPackageRelativeId
\REGISTRY\A\{00d1d700-0236-8db0-a51e-79c76f2f6fa1}\Root\InventoryApplicationFile\9fa327eb6c.exe|15125af88a7938b9
Size
\REGISTRY\A\{00d1d700-0236-8db0-a51e-79c76f2f6fa1}\Root\InventoryApplicationFile\9fa327eb6c.exe|15125af88a7938b9
Language
\REGISTRY\A\{00d1d700-0236-8db0-a51e-79c76f2f6fa1}\Root\InventoryApplicationFile\9fa327eb6c.exe|15125af88a7938b9
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
001800100CB64507
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Maximized
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
There are 48 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
270B000
heap
page read and write
malicious
5060000
direct allocation
page read and write
malicious
3D1000
unkown
page execute and read and write
malicious
52E0000
direct allocation
page read and write
malicious
3D1000
unkown
page execute and read and write
malicious
2757000
heap
page read and write
malicious
5A1000
unkown
page execute and read and write
malicious
5A1000
unkown
page execute and read and write
malicious
4C30000
direct allocation
page read and write
malicious
4BD0000
direct allocation
page read and write
malicious
50C0000
direct allocation
page read and write
malicious
4E20000
direct allocation
page read and write
malicious
2567000
heap
page read and write
malicious
4AA0000
direct allocation
page read and write
malicious
5A1000
unkown
page execute and read and write
malicious
341000
unkown
page execute and read and write
malicious
4BA0000
direct allocation
page read and write
malicious
3D1000
unkown
page execute and read and write
malicious
263A000
heap
page read and write
malicious
21000
unkown
page execute and read and write
malicious
193C955E000
trusted library allocation
page read and write
1380000
heap
page read and write
193D3A33000
trusted library allocation
page read and write
1145A3D000
stack
page read and write
193CC2D3000
trusted library allocation
page read and write
4701000
heap
page read and write
1FD7000
heap
page read and write
2E7EEB524000
trusted library allocation
page read and write
193CACC1000
trusted library allocation
page read and write
1B11D600000
trusted library allocation
page read and write
193BC0F4000
heap
page read and write
193BB5DA000
trusted library allocation
page read and write
1B11BB22000
trusted library allocation
page read and write
1B11C458000
trusted library allocation
page read and write
1B111AD5000
trusted library allocation
page read and write
22C75000
heap
page read and write
53DF000
stack
page read and write
1B111BCA000
trusted library allocation
page read and write
67E1000
heap
page read and write
30BF000
stack
page read and write
6831000
heap
page read and write
1B1175FD000
trusted library allocation
page read and write
6831000
heap
page read and write
67E1000
heap
page read and write
E25000
unkown
page execute and read and write
1B11685C000
trusted library allocation
page read and write
1345000
heap
page read and write
193BC0F5000
heap
page read and write
193BC0E8000
heap
page read and write
383F000
stack
page read and write
1354000
heap
page read and write
193D129E000
trusted library allocation
page read and write
193C8C14000
trusted library allocation
page read and write
67E1000
heap
page read and write
193C698F000
trusted library allocation
page read and write
67E1000
heap
page read and write
27D0000
direct allocation
page read and write
1B113676000
trusted library allocation
page read and write
1B1065DD000
unclassified section
page read and write
193CAF68000
trusted library allocation
page read and write
1B1155CA000
trusted library allocation
page read and write
67E1000
heap
page read and write
193C9639000
heap
page read and write
1B11658B000
trusted library allocation
page read and write
1B111ADF000
trusted library allocation
page read and write
193CAAC8000
trusted library allocation
page read and write
4013000
heap
page read and write
1C5DF000
stack
page read and write
193D12C3000
trusted library allocation
page read and write
193D10D8000
trusted library allocation
page read and write
1B112E52000
trusted library allocation
page read and write
119E000
stack
page read and write
44CE000
stack
page read and write
4D30000
direct allocation
page execute and read and write
193BC0FA000
heap
page read and write
5121000
direct allocation
page read and write
67E1000
heap
page read and write
1B1152CC000
trusted library allocation
page read and write
4D10000
direct allocation
page execute and read and write
4BEE000
stack
page read and write
470F000
stack
page read and write
6831000
heap
page read and write
193C9470000
trusted library allocation
page read and write
1B112C80000
trusted library allocation
page read and write
193C9AD2000
trusted library allocation
page read and write
2557000
heap
page read and write
193CA9EE000
trusted library allocation
page read and write
193CAF72000
trusted library allocation
page read and write
193D3CCB000
trusted library allocation
page read and write
9EC2AF1000
trusted library allocation
page execute read
9C000
stack
page read and write
1B11D400000
trusted library allocation
page read and write
193C945D000
trusted library allocation
page read and write
193BC0DE000
heap
page read and write
193C9AE2000
trusted library allocation
page read and write
193D849B000
trusted library allocation
page read and write
6831000
heap
page read and write
1D60000
heap
page read and write
193BC0D4000
heap
page read and write
1B112C00000
trusted library allocation
page read and write
6831000
heap
page read and write
1B114D2C000
trusted library allocation
page read and write
193CA96E000
trusted library allocation
page read and write
193D84E5000
trusted library allocation
page read and write
193C5BA3000
trusted library allocation
page read and write
257B000
heap
page read and write
1B116B65000
trusted library allocation
page read and write
193C7A95000
trusted library allocation
page read and write
1044000
heap
page read and write
4B01000
direct allocation
page read and write
1B106716000
trusted library allocation
page read and write
1B11E0F7000
trusted library allocation
page read and write
1B118B28000
trusted library allocation
page read and write
193CA979000
trusted library allocation
page read and write
1174000
heap
page read and write
1B107465000
heap
page read and write
6831000
heap
page read and write
193D8A7B000
trusted library allocation
page read and write
2E70000
heap
page read and write
1044000
heap
page read and write
193D4204000
trusted library allocation
page read and write
FF4000
heap
page read and write
1174000
heap
page read and write
8FAF87B000
stack
page read and write
353F000
stack
page read and write
580D000
stack
page read and write
193C95DE000
trusted library allocation
page read and write
141A000
heap
page read and write
FF4000
heap
page read and write
1B11BB9E000
trusted library allocation
page read and write
52A1C3D000
stack
page read and write
193CAFB3000
trusted library allocation
page read and write
1B112E9B000
trusted library allocation
page read and write
193C9870000
trusted library allocation
page read and write
1D64000
heap
page read and write
533000
unkown
page execute and read and write
1B11BF15000
trusted library allocation
page read and write
1B1155D3000
trusted library allocation
page read and write
1B114E69000
trusted library allocation
page read and write
193BC0FF000
heap
page read and write
193C96AE000
heap
page read and write
1B11BF1A000
trusted library allocation
page read and write
8B1F000
stack
page read and write
B3A000
stack
page read and write
193D1013000
trusted library allocation
page read and write
193D8450000
trusted library allocation
page read and write
1B118B02000
trusted library allocation
page read and write
1B11773C000
trusted library allocation
page read and write
193CAAF7000
trusted library allocation
page read and write
67E1000
heap
page read and write
193CAF9E000
trusted library allocation
page read and write
193D4215000
trusted library allocation
page read and write
193C6314000
trusted library allocation
page read and write
67E1000
heap
page read and write
193D4497000
trusted library allocation
page read and write
1B40003F000
trusted library allocation
page read and write
193CAF9A000
trusted library allocation
page read and write
193D10D2000
trusted library allocation
page read and write
28CC0000
heap
page read and write
193D44DF000
trusted library allocation
page read and write
1B11142F000
trusted library allocation
page read and write
6831000
heap
page read and write
1B10689B000
trusted library allocation
page read and write
1B106BB0000
trusted library allocation
page read and write
67E1000
heap
page read and write
193CAF2A000
trusted library allocation
page read and write
193C9CA9000
trusted library allocation
page read and write
193BC0CD000
heap
page read and write
193BC0EA000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
1B10750A000
heap
page read and write
6831000
heap
page read and write
193D84F6000
trusted library allocation
page read and write
1B1045A0000
heap
page read and write
18A479BF000
heap
page read and write
6831000
heap
page read and write
193BC0CA000
heap
page read and write
6831000
heap
page read and write
1B106858000
trusted library allocation
page read and write
1B1165B9000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
1B11573A000
trusted library allocation
page read and write
4D70000
direct allocation
page execute and read and write
1B116881000
trusted library allocation
page read and write
193CAFA0000
trusted library allocation
page read and write
193C9878000
trusted library allocation
page read and write
4F20000
direct allocation
page execute and read and write
529ACFE000
stack
page read and write
1174000
heap
page read and write
193BC0EA000
heap
page read and write
193CA249000
trusted library allocation
page read and write
1B11D4A1000
trusted library allocation
page read and write
193BB5A2000
trusted library allocation
page read and write
193CA4C4000
trusted library allocation
page read and write
1B111503000
trusted library allocation
page read and write
1B1074F1000
heap
page read and write
193BC0D7000
heap
page read and write
59E000
stack
page read and write
1B106908000
trusted library allocation
page read and write
193CAAF7000
trusted library allocation
page read and write
193CB319000
trusted library allocation
page read and write
3F7E000
stack
page read and write
6831000
heap
page read and write
193D84EB000
trusted library allocation
page read and write
193D3A5B000
trusted library allocation
page read and write
193D3C8C000
trusted library allocation
page read and write
1143E3E000
stack
page read and write
193BC0F0000
heap
page read and write
193BC0D4000
heap
page read and write
C94000
heap
page read and write
3E7F000
stack
page read and write
193D3A79000
trusted library allocation
page read and write
193C9556000
trusted library allocation
page read and write
4B90000
direct allocation
page read and write
28D59000
heap
page read and write
1D90000
heap
page read and write
193D8A52000
trusted library allocation
page read and write
1B114F73000
trusted library allocation
page read and write
40A0000
direct allocation
page execute and read and write
1B104830000
trusted library allocation
page read and write
35FE000
stack
page read and write
18A47A00000
trusted library allocation
page read and write
1B113508000
trusted library allocation
page read and write
193C6246000
trusted library allocation
page read and write
529C233000
stack
page read and write
193BC0D4000
heap
page read and write
8B8000
unkown
page execute and write copy
699C000
heap
page read and write
424E000
stack
page read and write
193D3A2F000
trusted library allocation
page read and write
193C9AD2000
trusted library allocation
page read and write
4991000
heap
page read and write
8EC000
stack
page read and write
67E1000
heap
page read and write
541F000
stack
page read and write
1174000
heap
page read and write
4C20000
direct allocation
page execute and read and write
67E1000
heap
page read and write
1B11C368000
trusted library allocation
page read and write
1B114F5E000
trusted library allocation
page read and write
1B1074EE000
heap
page read and write
67E1000
heap
page read and write
193C9087000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B11DF53000
trusted library allocation
page read and write
1B1152CE000
trusted library allocation
page read and write
193BC0F5000
heap
page read and write
193C9EC3000
trusted library allocation
page read and write
1174000
heap
page read and write
111B000
heap
page read and write
193D10E9000
trusted library allocation
page read and write
193BC0A7000
heap
page read and write
2131000
heap
page read and write
67E1000
heap
page read and write
1B106874000
trusted library allocation
page read and write
27D0000
direct allocation
page read and write
358E000
stack
page read and write
193BC0B6000
heap
page read and write
193CA765000
trusted library allocation
page read and write
1B115BED000
trusted library allocation
page read and write
193CA63C000
trusted library allocation
page read and write
1B118911000
trusted library allocation
page read and write
193BC0CD000
heap
page read and write
514F000
stack
page read and write
22C93000
heap
page read and write
1E3DAE00000
trusted library allocation
page read and write
15A1A066000
trusted library allocation
page read and write
193C6E21000
trusted library allocation
page read and write
18A479A0000
heap
page read and write
4991000
heap
page read and write
18A47B07000
trusted library allocation
page read and write
193BB27D000
unclassified section
page read and write
193C5ACA000
trusted library allocation
page read and write
193CAF2A000
trusted library allocation
page read and write
193D474C000
trusted library allocation
page read and write
1174000
heap
page read and write
1B107486000
heap
page read and write
1B112E9B000
trusted library allocation
page read and write
193D44D1000
trusted library allocation
page read and write
193BAE33000
heap
page read and write
193CAFB5000
trusted library allocation
page read and write
682F000
stack
page read and write
193C7604000
trusted library allocation
page read and write
193C988B000
trusted library allocation
page read and write
18A479AD000
heap
page read and write
67E1000
heap
page read and write
1B115BE1000
trusted library allocation
page read and write
6831000
heap
page read and write
3F7F000
stack
page read and write
193D3AE4000
trusted library allocation
page read and write
1FE1000
heap
page read and write
9EC2A61000
trusted library allocation
page execute read
193BB401000
trusted library allocation
page read and write
193D849D000
trusted library allocation
page read and write
1B106652000
trusted library allocation
page read and write
22C75000
heap
page read and write
193BB73F000
heap
page read and write
193CA99A000
trusted library allocation
page read and write
51E0000
direct allocation
page execute and read and write
51F0000
direct allocation
page execute and read and write
193C8C43000
trusted library allocation
page read and write
6831000
heap
page read and write
50822DE3000
trusted library allocation
page read and write
67E1000
heap
page read and write
C94000
heap
page read and write
1B11E096000
trusted library allocation
page read and write
193C62F9000
trusted library allocation
page read and write
193D3661000
trusted library allocation
page read and write
193D84EB000
trusted library allocation
page read and write
6831000
heap
page read and write
1B11C1D4000
trusted library allocation
page read and write
1B1169CA000
trusted library allocation
page read and write
1174000
heap
page read and write
193CAF91000
trusted library allocation
page read and write
193C6305000
trusted library allocation
page read and write
1B111526000
trusted library allocation
page read and write
4DA0000
direct allocation
page execute and read and write
193CAF82000
trusted library allocation
page read and write
193BC104000
heap
page read and write
C15000
heap
page read and write
4C20000
heap
page read and write
1B11DFC4000
trusted library allocation
page read and write
193D8462000
trusted library allocation
page read and write
193C95B4000
trusted library allocation
page read and write
1174000
heap
page read and write
193D3A26000
trusted library allocation
page read and write
193C95B4000
trusted library allocation
page read and write
31BF000
stack
page read and write
193D3AFA000
trusted library allocation
page read and write
24617940000
heap
page read and write
114747B000
stack
page read and write
67E1000
heap
page read and write
297E000
stack
page read and write
4E30000
heap
page read and write
193D8AC3000
trusted library allocation
page read and write
193CA798000
trusted library allocation
page read and write
193C6B08000
trusted library allocation
page read and write
5280000
direct allocation
page execute and read and write
4991000
heap
page read and write
4CC0000
trusted library allocation
page read and write
193C9CC6000
trusted library allocation
page read and write
193D10C7000
trusted library allocation
page read and write
193D3AD5000
trusted library allocation
page read and write
4701000
heap
page read and write
1B11EB19000
trusted library allocation
page read and write
193D47DC000
trusted library allocation
page read and write
208E000
heap
page read and write
1B1073F0000
heap
page read and write
193BC0F4000
heap
page read and write
1B112603000
trusted library allocation
page read and write
193CAF63000
trusted library allocation
page read and write
193C5B07000
trusted library allocation
page read and write
6831000
heap
page read and write
36FE000
stack
page read and write
193C5B80000
trusted library allocation
page read and write
1B11772B000
trusted library allocation
page read and write
1B114D13000
trusted library allocation
page read and write
1B116851000
trusted library allocation
page read and write
67E1000
heap
page read and write
67E1000
heap
page read and write
1B11D67F000
trusted library allocation
page read and write
3BBF000
stack
page read and write
193CA343000
trusted library allocation
page read and write
FA0000
heap
page read and write
6831000
heap
page read and write
2620000
heap
page execute and read and write
31FE000
stack
page read and write
1B106950000
trusted library allocation
page read and write
4E30000
direct allocation
page read and write
1B113008000
trusted library allocation
page read and write
193CA976000
trusted library allocation
page read and write
4D20000
direct allocation
page execute and read and write
193C5ADF000
trusted library allocation
page read and write
6831000
heap
page read and write
1B1066ED000
trusted library allocation
page read and write
52A2A3E000
stack
page read and write
1B111A6B000
trusted library allocation
page read and write
4DA0000
direct allocation
page execute and read and write
193D845C000
trusted library allocation
page read and write
1E3DACE0000
heap
page read and write
1B116B97000
trusted library allocation
page read and write
193BC0D4000
heap
page read and write
193CA91C000
trusted library allocation
page read and write
193CAFB0000
trusted library allocation
page read and write
1B1177D4000
trusted library allocation
page read and write
423E000
stack
page read and write
4370000
heap
page read and write
C94000
heap
page read and write
1B111915000
heap
page read and write
193C8ED2000
trusted library allocation
page read and write
1B1175D7000
trusted library allocation
page read and write
1B1168B7000
trusted library allocation
page read and write
1B115254000
trusted library allocation
page read and write
1B11C4BC000
trusted library allocation
page read and write
193CA0AA000
trusted library allocation
page read and write
193BB4CF000
trusted library allocation
page read and write
46F0000
direct allocation
page read and write
6831000
heap
page read and write
1174000
heap
page read and write
193BC0FE000
heap
page read and write
4991000
heap
page read and write
193C5A9E000
trusted library allocation
page read and write
1B1129B0000
heap
page read and write
193C5E6A000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
193D435D000
trusted library allocation
page read and write
193D43F5000
trusted library allocation
page read and write
1174000
heap
page read and write
193C8CC0000
trusted library allocation
page read and write
193BC0DD000
heap
page read and write
1B11BBEB000
trusted library allocation
page read and write
193C9688000
heap
page read and write
1B11C39F000
trusted library allocation
page read and write
1B116A3E000
trusted library allocation
page read and write
193BC0DE000
heap
page read and write
1B11D503000
trusted library allocation
page read and write
193CAFCA000
trusted library allocation
page read and write
51A4000
direct allocation
page execute and read and write
22C77000
heap
page read and write
4701000
heap
page read and write
1B114E80000
trusted library allocation
page read and write
1B114ECD000
trusted library allocation
page read and write
1B1165BF000
trusted library allocation
page read and write
6831000
heap
page read and write
52A34FB000
stack
page read and write
50A0000
heap
page read and write
1B112B8F000
trusted library allocation
page read and write
4143000
heap
page read and write
193D8F8C000
trusted library allocation
page read and write
1B114EBE000
trusted library allocation
page read and write
1174000
heap
page read and write
193C91E3000
trusted library allocation
page read and write
1B11559D000
trusted library allocation
page read and write
6831000
heap
page read and write
C94000
heap
page read and write
2F7B000
stack
page read and write
500000
unkown
page execute and read and write
193BC0F9000
heap
page read and write
6831000
heap
page read and write
C0E000
heap
page read and write
1B112C65000
trusted library allocation
page read and write
1B10663A000
trusted library allocation
page read and write
B60000
heap
page read and write
44BF000
stack
page read and write
1B115251000
trusted library allocation
page read and write
529B1BB000
stack
page read and write
89D000
unkown
page execute and read and write
193C9C03000
trusted library allocation
page read and write
193D128D000
trusted library allocation
page read and write
193D844E000
trusted library allocation
page read and write
193D35AB000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
193C5EA4000
trusted library allocation
page read and write
1B11EB3B000
trusted library allocation
page read and write
193D3A71000
trusted library allocation
page read and write
193D8A25000
trusted library allocation
page read and write
1B11C2FD000
trusted library allocation
page read and write
65F5000
heap
page read and write
1B11E00C000
trusted library allocation
page read and write
1B117730000
trusted library allocation
page read and write
193C5BAD000
trusted library allocation
page read and write
1B111600000
trusted library allocation
page read and write
193D848D000
trusted library allocation
page read and write
9A4000
heap
page read and write
1B11280A000
trusted library allocation
page read and write
193BC0D4000
heap
page read and write
4AAE000
stack
page read and write
113E6BB000
stack
page read and write
4701000
heap
page read and write
473F000
stack
page read and write
193D8E28000
trusted library allocation
page read and write
1B116551000
trusted library allocation
page read and write
1B1074E5000
heap
page read and write
193CA9F0000
trusted library allocation
page read and write
1B1136D7000
trusted library allocation
page read and write
22D58000
heap
page read and write
193D3130000
trusted library allocation
page read and write
6831000
heap
page read and write
1B1152A4000
trusted library allocation
page read and write
8FB09FE000
unkown
page readonly
193C6100000
trusted library allocation
page read and write
193C7200000
trusted library allocation
page read and write
1B11C344000
trusted library allocation
page read and write
193CAF72000
trusted library allocation
page read and write
1B116728000
trusted library allocation
page read and write
1B1074E4000
heap
page read and write
1B111BA0000
trusted library allocation
page read and write
193BB313000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
1B114EA7000
trusted library allocation
page read and write
C94000
heap
page read and write
193C9EB1000
trusted library allocation
page read and write
4F20000
direct allocation
page execute and read and write
7E0000
unkown
page execute and read and write
193C6316000
trusted library allocation
page read and write
193C95D5000
trusted library allocation
page read and write
136A000
heap
page read and write
67E1000
heap
page read and write
193C9036000
trusted library allocation
page read and write
193C73F2000
trusted library allocation
page read and write
193D4232000
trusted library allocation
page read and write
1B1151DD000
trusted library allocation
page read and write
193BB74F000
heap
page read and write
1B113108000
trusted library allocation
page read and write
2461735B000
trusted library allocation
page read and write
1B113200000
trusted library allocation
page read and write
113E07C000
stack
page read and write
193C9638000
heap
page read and write
193D46FF000
trusted library allocation
page read and write
4701000
heap
page read and write
11414BB000
stack
page read and write
5F55000
heap
page read and write
5154000
direct allocation
page execute and read and write
6831000
heap
page read and write
6831000
heap
page read and write
6F8000
unkown
page execute and write copy
193CAF88000
trusted library allocation
page read and write
193BC0F0000
heap
page read and write
2FBE000
stack
page read and write
5230000
direct allocation
page execute and read and write
1146A7F000
stack
page read and write
413E000
stack
page read and write
193D449B000
trusted library allocation
page read and write
67E1000
heap
page read and write
5090000
heap
page read and write
C1B000
heap
page read and write
193BC0FA000
heap
page read and write
4701000
heap
page read and write
1B114E6F000
trusted library allocation
page read and write
1D98000
heap
page read and write
8371000
heap
page read and write
1175000
heap
page read and write
1B11694C000
trusted library allocation
page read and write
193D849B000
trusted library allocation
page read and write
193C9000000
trusted library allocation
page read and write
22C75000
heap
page read and write
193C5CFB000
trusted library allocation
page read and write
193CA903000
trusted library allocation
page read and write
193D7236000
trusted library allocation
page read and write
663E000
stack
page read and write
1174000
heap
page read and write
2630000
heap
page read and write
4D6E000
stack
page read and write
2E5B7FE000
stack
page read and write
193D8482000
trusted library allocation
page read and write
1B115403000
trusted library allocation
page read and write
1B115D80000
trusted library allocation
page read and write
193BC0FE000
heap
page read and write
5A0000
unkown
page read and write
3F6E000
stack
page read and write
193D359B000
trusted library allocation
page read and write
1B11C10B000
trusted library allocation
page read and write
193BC0F4000
heap
page read and write
67E1000
heap
page read and write
193D10DB000
trusted library allocation
page read and write
22C77000
heap
page read and write
4ECB000
stack
page read and write
193C618D000
trusted library allocation
page read and write
193BB6FD000
heap
page read and write
1B118B04000
trusted library allocation
page read and write
113E47F000
stack
page read and write
1B11D913000
trusted library allocation
page read and write
29FF000
stack
page read and write
1B11EB15000
trusted library allocation
page read and write
193C91EF000
trusted library allocation
page read and write
6831000
heap
page read and write
7FDE000
stack
page read and write
3FBF000
stack
page read and write
8FADFD8000
stack
page read and write
1B10690E000
trusted library allocation
page read and write
1174000
heap
page read and write
1B119C04000
trusted library allocation
page read and write
193C94C3000
trusted library allocation
page read and write
4741000
heap
page read and write
193D3CF7000
trusted library allocation
page read and write
67E1000
heap
page read and write
193C9680000
heap
page read and write
67E1000
heap
page read and write
193C8C46000
trusted library allocation
page read and write
C94000
heap
page read and write
93C000
stack
page read and write
193D1270000
trusted library allocation
page read and write
193C9EC3000
trusted library allocation
page read and write
1B112900000
trusted library section
page readonly
1B11BFB9000
trusted library allocation
page read and write
4701000
heap
page read and write
67E1000
heap
page read and write
193C9562000
trusted library allocation
page read and write
193BC0A8000
heap
page read and write
1B111AED000
trusted library allocation
page read and write
6831000
heap
page read and write
193C9638000
heap
page read and write
483E000
stack
page read and write
1B10479A000
heap
page read and write
67E1000
heap
page read and write
6831000
heap
page read and write
1B115500000
trusted library allocation
page read and write
6831000
heap
page read and write
1B1152C2000
trusted library allocation
page read and write
1B1167A2000
trusted library allocation
page read and write
1B115796000
trusted library allocation
page read and write
6831000
heap
page read and write
193BC0F4000
heap
page read and write
1174000
heap
page read and write
1322000
heap
page read and write
6831000
heap
page read and write
22C73000
heap
page read and write
5020000
trusted library allocation
page read and write
193BC0F4000
heap
page read and write
447E000
stack
page read and write
193C6411000
trusted library allocation
page read and write
193D3AAD000
trusted library allocation
page read and write
193CA7B0000
trusted library allocation
page read and write
24616FB0000
unclassified section
page readonly
362F000
stack
page read and write
1BE37DE000
stack
page read and write
193C9F33000
trusted library allocation
page read and write
193D47A9000
trusted library allocation
page read and write
51B9000
direct allocation
page execute and read and write
11A0000
heap
page read and write
6831000
heap
page read and write
193C6AF0000
trusted library section
page readonly
6831000
heap
page read and write
193C5A67000
trusted library allocation
page read and write
193BC0F0000
heap
page read and write
193D85F4000
trusted library allocation
page read and write
1B115257000
trusted library allocation
page read and write
193D846F000
trusted library allocation
page read and write
1B111A03000
trusted library allocation
page read and write
1B115431000
trusted library allocation
page read and write
1B10694E000
trusted library allocation
page read and write
383F000
stack
page read and write
193BB3C2000
trusted library allocation
page read and write
193CA99A000
trusted library allocation
page read and write
6831000
heap
page read and write
193CAAC6000
trusted library allocation
page read and write
C94000
heap
page read and write
1B117503000
trusted library allocation
page read and write
193CA33D000
trusted library allocation
page read and write
1B119C14000
trusted library allocation
page read and write
193C6E6E000
trusted library allocation
page read and write
50F0000
heap
page read and write
193D77AD000
trusted library allocation
page read and write
3A7E000
stack
page read and write
1B1169E3000
trusted library allocation
page read and write
1B114EA5000
trusted library allocation
page read and write
C60000
heap
page read and write
49F000
unkown
page execute and read and write
4701000
heap
page read and write
49F000
unkown
page execute and read and write
36BF000
stack
page read and write
1B114EA7000
trusted library allocation
page read and write
1B114EE6000
trusted library allocation
page read and write
22C84000
heap
page read and write
1B110FDE000
trusted library allocation
page read and write
68D000
unkown
page readonly
193CA9D4000
trusted library allocation
page read and write
4740000
heap
page read and write
67E1000
heap
page read and write
193D3A41000
trusted library allocation
page read and write
4D50000
direct allocation
page execute and read and write
1F5FF110000
heap
page read and write
6831000
heap
page read and write
193CAF23000
trusted library allocation
page read and write
352F000
stack
page read and write
1174000
heap
page read and write
193D4471000
trusted library allocation
page read and write
193C6D0A000
trusted library allocation
page read and write
45CF000
stack
page read and write
1B116B36000
trusted library allocation
page read and write
193CAFE6000
trusted library allocation
page read and write
193CA972000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
22C7D000
heap
page read and write
193CAF91000
trusted library allocation
page read and write
1B1152BE000
trusted library allocation
page read and write
193D1000000
trusted library allocation
page read and write
193BC0AE000
heap
page read and write
1B113500000
trusted library allocation
page read and write
193BC0CD000
heap
page read and write
193BC0F4000
heap
page read and write
193C9C7D000
trusted library allocation
page read and write
22C77000
heap
page read and write
41E6000
heap
page read and write
D50000
heap
page read and write
1B113B44000
trusted library allocation
page read and write
193D8499000
trusted library allocation
page read and write
193BC0F5000
heap
page read and write
67E1000
heap
page read and write
C94000
heap
page read and write
18A479C8000
heap
page read and write
193BC0BF000
heap
page read and write
193BC0EA000
heap
page read and write
193C5EB6000
trusted library allocation
page read and write
193D47AF000
trusted library allocation
page read and write
69C0000
heap
page read and write
1174000
heap
page read and write
193D8E30000
trusted library allocation
page read and write
4E30000
direct allocation
page read and write
3120000
heap
page read and write
193D47C6000
trusted library allocation
page read and write
193BC0FF000
heap
page read and write
67E1000
heap
page read and write
193C9A19000
trusted library allocation
page read and write
193C689B000
trusted library allocation
page read and write
1B11DF44000
trusted library allocation
page read and write
529B0FA000
stack
page read and write
41AE000
stack
page read and write
1B1152BE000
trusted library allocation
page read and write
4140000
heap
page read and write
1B106915000
trusted library allocation
page read and write
193C5E4D000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
42AF000
stack
page read and write
1148305000
stack
page read and write
1B1074E5000
heap
page read and write
67E1000
heap
page read and write
A3B000
stack
page read and write
1B114EAE000
trusted library allocation
page read and write
518E000
stack
page read and write
193C90D3000
trusted library allocation
page read and write
6831000
heap
page read and write
1B1161E5000
trusted library allocation
page read and write
1B110F83000
trusted library allocation
page read and write
1B1074E6000
heap
page read and write
193D8551000
trusted library allocation
page read and write
193BB533000
trusted library allocation
page read and write
3A9000
unkown
page write copy
193CA391000
trusted library allocation
page read and write
193CA9F0000
trusted library allocation
page read and write
15A1A0AD000
trusted library allocation
page read and write
28D04000
heap
page read and write
193BC0C4000
heap
page read and write
193BC0AD000
heap
page read and write
193CA99A000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B107486000
heap
page read and write
193CAFB3000
trusted library allocation
page read and write
193C5B40000
trusted library allocation
page read and write
193BC0E8000
heap
page read and write
193C9AE6000
trusted library allocation
page read and write
1B115765000
trusted library allocation
page read and write
3FB0000
direct allocation
page read and write
193D47D7000
trusted library allocation
page read and write
1B115020000
trusted library allocation
page read and write
6831000
heap
page read and write
193D358B000
trusted library allocation
page read and write
193C6B00000
trusted library allocation
page read and write
5A1000
unkown
page execute and write copy
193C95C2000
trusted library allocation
page read and write
280E000
stack
page read and write
400000
unkown
page readonly
193BC0EA000
heap
page read and write
67E1000
heap
page read and write
193C5EA4000
trusted library allocation
page read and write
193CA35E000
trusted library allocation
page read and write
1B11C32B000
trusted library allocation
page read and write
1B113300000
trusted library allocation
page read and write
28D21000
heap
page read and write
193D8499000
trusted library allocation
page read and write
6831000
heap
page read and write
193BC0A8000
heap
page read and write
6831000
heap
page read and write
15A1A05B000
trusted library allocation
page read and write
193D10EC000
trusted library allocation
page read and write
2461751E000
trusted library allocation
page read and write
27D0000
direct allocation
page read and write
193C8C24000
trusted library allocation
page read and write
1174000
heap
page read and write
1B114ECD000
trusted library allocation
page read and write
393E000
stack
page read and write
FD0000
direct allocation
page read and write
6831000
heap
page read and write
22C6A000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
1B115D33000
trusted library allocation
page read and write
1BCE000
stack
page read and write
1B11C44A000
trusted library allocation
page read and write
193D44FA000
trusted library allocation
page read and write
67E1000
heap
page read and write
6831000
heap
page read and write
193D8A23000
trusted library allocation
page read and write
13D4000
heap
page read and write
193C73B5000
trusted library allocation
page read and write
193BC0C0000
heap
page read and write
193C8F04000
trusted library allocation
page read and write
1B11E01B000
trusted library allocation
page read and write
1044000
heap
page read and write
6831000
heap
page read and write
193BC0E6000
heap
page read and write
6831000
heap
page read and write
193CA9E1000
trusted library allocation
page read and write
193D44F4000
trusted library allocation
page read and write
193D4430000
trusted library allocation
page read and write
C94000
heap
page read and write
193CAFCA000
trusted library allocation
page read and write
193C9A58000
trusted library allocation
page read and write
529AC3A000
stack
page read and write
1150000
heap
page read and write
1BFF000
stack
page read and write
1B106621000
trusted library allocation
page read and write
6831000
heap
page read and write
67E1000
heap
page read and write
530000
heap
page read and write
1B116400000
trusted library allocation
page read and write
1144A2F000
stack
page read and write
67E1000
heap
page read and write
114583D000
stack
page read and write
193C9A4F000
trusted library allocation
page read and write
193D8ACA000
trusted library allocation
page read and write
193D8464000
trusted library allocation
page read and write
4C70000
direct allocation
page execute and read and write
193BB3FD000
trusted library allocation
page read and write
193CAE42000
trusted library allocation
page read and write
193C6E64000
trusted library allocation
page read and write
834E000
stack
page read and write
1B1152F1000
trusted library allocation
page read and write
1B11659D000
trusted library allocation
page read and write
193BC0AC000
heap
page read and write
1B106949000
trusted library allocation
page read and write
193D7800000
trusted library allocation
page read and write
193D4424000
trusted library allocation
page read and write
2CFF000
stack
page read and write
193BC0F5000
heap
page read and write
193CAF2A000
trusted library allocation
page read and write
67E1000
heap
page read and write
C94000
heap
page read and write
67E1000
heap
page read and write
193D10D2000
trusted library allocation
page read and write
1B11BF55000
trusted library allocation
page read and write
193D898A000
trusted library allocation
page read and write
1B10686C000
trusted library allocation
page read and write
1B114D7A000
trusted library allocation
page read and write
53CE000
stack
page read and write
6831000
heap
page read and write
193D3128000
trusted library allocation
page read and write
498F000
stack
page read and write
193D44CD000
trusted library allocation
page read and write
67E1000
heap
page read and write
193BC0DE000
heap
page read and write
193CA97C000
trusted library allocation
page read and write
193C61AE000
trusted library allocation
page read and write
193CAFB0000
trusted library allocation
page read and write
1174000
heap
page read and write
28B7000
heap
page read and write
7900000
heap
page read and write
193BB670000
heap
page read and write
193CAF68000
trusted library allocation
page read and write
193CA03C000
trusted library allocation
page read and write
193C6E86000
trusted library allocation
page read and write
4D0F000
stack
page read and write
193BB528000
trusted library allocation
page read and write
193C9363000
trusted library allocation
page read and write
1E3DAD69000
heap
page read and write
193CAFB3000
trusted library allocation
page read and write
193C9624000
heap
page read and write
67E1000
heap
page read and write
67E1000
heap
page read and write
193CAEC3000
trusted library allocation
page read and write
5421000
heap
page read and write
C94000
heap
page read and write
192000
stack
page read and write
193BC0FA000
heap
page read and write
1294000
heap
page read and write
1B115A24000
trusted library allocation
page read and write
193CA803000
trusted library allocation
page read and write
2E59FFE000
stack
page read and write
67E1000
heap
page read and write
18A479B2000
heap
page read and write
193C62D7000
trusted library allocation
page read and write
2920000
direct allocation
page read and write
3CEE000
stack
page read and write
22C85000
heap
page read and write
529AA3E000
stack
page read and write
193CC038000
trusted library allocation
page read and write
4701000
heap
page read and write
6A54000
heap
page read and write
193BC0F0000
heap
page read and write
193BC0EA000
heap
page read and write
529A9D8000
stack
page read and write
193BC0F5000
heap
page read and write
193D10B6000
trusted library allocation
page read and write
4D50000
direct allocation
page execute and read and write
193D84FC000
trusted library allocation
page read and write
1B11C274000
trusted library allocation
page read and write
348000
unkown
page execute and write copy
1B11BB78000
trusted library allocation
page read and write
1B1069A6000
trusted library allocation
page read and write
1B117790000
trusted library allocation
page read and write
193C5A81000
trusted library allocation
page read and write
46F0000
direct allocation
page read and write
193D8492000
trusted library allocation
page read and write
3D0000
unkown
page read and write
193CAF47000
trusted library allocation
page read and write
367F000
stack
page read and write
246171C0000
heap
page read and write
131E000
heap
page read and write
4C40000
heap
page read and write
5160000
direct allocation
page execute and read and write
6831000
heap
page read and write
193B9403000
trusted library allocation
page read and write
1B115C01000
trusted library allocation
page read and write
1174000
heap
page read and write
1B11525A000
trusted library allocation
page read and write
4701000
heap
page read and write
193CA99A000
trusted library allocation
page read and write
515C000
direct allocation
page execute and read and write
193BC0FE000
heap
page read and write
6831000
heap
page read and write
193D849D000
trusted library allocation
page read and write
193CAA91000
trusted library allocation
page read and write
4701000
heap
page read and write
193CAF88000
trusted library allocation
page read and write
6F7000
unkown
page execute and read and write
89F000
unkown
page execute and write copy
193CA9DA000
trusted library allocation
page read and write
1B115CFD000
trusted library allocation
page read and write
4991000
heap
page read and write
1BE6ABE000
unkown
page readonly
193CA0F5000
trusted library allocation
page read and write
46F0000
direct allocation
page read and write
67E1000
heap
page read and write
67E1000
heap
page read and write
193D12B1000
trusted library allocation
page read and write
193BC0BA000
heap
page read and write
1B111AB7000
trusted library allocation
page read and write
193D8464000
trusted library allocation
page read and write
193CC2B5000
trusted library allocation
page read and write
193C6EE3000
trusted library allocation
page read and write
22C6D000
heap
page read and write
67E1000
heap
page read and write
21000
unkown
page execute and write copy
193BC0E8000
heap
page read and write
1B1074F1000
heap
page read and write
1B116703000
trusted library allocation
page read and write
67E1000
heap
page read and write
193CA6FC000
trusted library allocation
page read and write
193C6143000
trusted library allocation
page read and write
1B114EBE000
trusted library allocation
page read and write
193D43C7000
trusted library allocation
page read and write
193CAFB3000
trusted library allocation
page read and write
193BC0F4000
heap
page read and write
193BC0CA000
heap
page read and write
193CAEDC000
trusted library allocation
page read and write
1174000
heap
page read and write
67E1000
heap
page read and write
193D44D0000
trusted library allocation
page read and write
193CAFBF000
trusted library allocation
page read and write
67E1000
heap
page read and write
5154000
direct allocation
page execute and read and write
193C5B6B000
trusted library allocation
page read and write
193C9A0F000
trusted library allocation
page read and write
6831000
heap
page read and write
1B114ECD000
trusted library allocation
page read and write
1174000
heap
page read and write
193C9EAE000
trusted library allocation
page read and write
193CA74D000
trusted library allocation
page read and write
6831000
heap
page read and write
4D20000
direct allocation
page execute and read and write
5470000
direct allocation
page execute and read and write
1B117640000
trusted library allocation
page read and write
5030000
direct allocation
page execute and read and write
4701000
heap
page read and write
67E1000
heap
page read and write
4C10000
direct allocation
page read and write
1B104600000
trusted library allocation
page read and write
4CB0000
direct allocation
page execute and read and write
6831000
heap
page read and write
6831000
heap
page read and write
193D4236000
trusted library allocation
page read and write
193CA500000
trusted library allocation
page read and write
1B114EE6000
trusted library allocation
page read and write
6831000
heap
page read and write
2ABE000
stack
page read and write
4701000
heap
page read and write
193BC0CA000
heap
page read and write
193BB43F000
trusted library allocation
page read and write
1B10486B000
trusted library allocation
page read and write
1172000
heap
page read and write
193D849D000
trusted library allocation
page read and write
67E1000
heap
page read and write
67E1000
heap
page read and write
193BC0FA000
heap
page read and write
131E000
heap
page read and write
193CAFC3000
trusted library allocation
page read and write
26F2000
heap
page execute and read and write
67E1000
heap
page read and write
193C6EDF000
trusted library allocation
page read and write
1B107501000
heap
page read and write
1B115370000
trusted library section
page read and write
1B106252000
unclassified section
page read and write
193C95D5000
trusted library allocation
page read and write
442E000
stack
page read and write
1B1152B2000
trusted library allocation
page read and write
193C6272000
trusted library allocation
page read and write
2420000
heap
page read and write
193CA7BD000
trusted library allocation
page read and write
52A5B3A000
stack
page read and write
54D0000
direct allocation
page execute and read and write
193CA9DA000
trusted library allocation
page read and write
193C91EF000
trusted library allocation
page read and write
602000
unkown
page execute and read and write
1044000
heap
page read and write
193BC0DE000
heap
page read and write
3D0000
unkown
page readonly
42EF000
stack
page read and write
193BC0FA000
heap
page read and write
193C8C00000
trusted library allocation
page read and write
193D4200000
trusted library allocation
page read and write
67E1000
heap
page read and write
6831000
heap
page read and write
1B11BBF1000
trusted library allocation
page read and write
6831000
heap
page read and write
193C6253000
trusted library allocation
page read and write
8A9000
unkown
page execute and read and write
1B1155DC000
trusted library allocation
page read and write
193BC0E0000
heap
page read and write
193C5A85000
trusted library allocation
page read and write
193BC0EF000
heap
page read and write
67E1000
heap
page read and write
1B11C4D9000
trusted library allocation
page read and write
193D423C000
trusted library allocation
page read and write
193D1289000
trusted library allocation
page read and write
193C8C3D000
trusted library allocation
page read and write
1B11C25D000
trusted library allocation
page read and write
1B11C2B7000
trusted library allocation
page read and write
C94000
heap
page read and write
4220000
heap
page read and write
67E1000
heap
page read and write
602000
unkown
page execute and read and write
244C000
unkown
page readonly
193CA9A8000
trusted library allocation
page read and write
193D47E9000
trusted library allocation
page read and write
1B11C366000
trusted library allocation
page read and write
47EF000
stack
page read and write
1B11D9A1000
trusted library allocation
page read and write
193CA9E4000
trusted library allocation
page read and write
1B112C63000
trusted library allocation
page read and write
125C000
stack
page read and write
193C9EAC000
trusted library allocation
page read and write
67E1000
heap
page read and write
1140ABB000
stack
page read and write
6831000
heap
page read and write
193D4232000
trusted library allocation
page read and write
1B1169D4000
trusted library allocation
page read and write
193C9EF3000
trusted library allocation
page read and write
193C9C9D000
trusted library allocation
page read and write
193CA48B000
trusted library allocation
page read and write
4DE0000
direct allocation
page execute and read and write
114463B000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
193D8482000
trusted library allocation
page read and write
34FBC000
stack
page read and write
193C7396000
trusted library allocation
page read and write
439000
unkown
page read and write
24617312000
trusted library allocation
page read and write
6831000
heap
page read and write
1174000
heap
page read and write
193D10AD000
trusted library allocation
page read and write
43B000
unkown
page execute and read and write
6831000
heap
page read and write
1B1152B2000
trusted library allocation
page read and write
1B1151EE000
trusted library allocation
page read and write
3A2F000
stack
page read and write
1147CFE000
stack
page read and write
69CE000
heap
page read and write
1174000
heap
page read and write
193CAE92000
trusted library allocation
page read and write
9A4000
heap
page read and write
193D4795000
trusted library allocation
page read and write
6831000
heap
page read and write
193D7711000
trusted library allocation
page read and write
529AD7F000
stack
page read and write
24617160000
heap
page read and write
193BC0DE000
heap
page read and write
C94000
heap
page read and write
6A26000
heap
page read and write
358F000
stack
page read and write
1BDD000
stack
page read and write
193D4492000
trusted library allocation
page read and write
193CAF2C000
trusted library allocation
page read and write
193CA76D000
trusted library allocation
page read and write
1B10684F000
trusted library allocation
page read and write
1B1175B9000
trusted library allocation
page read and write
193D44DF000
trusted library allocation
page read and write
3A9000
unkown
page read and write
2920000
direct allocation
page read and write
193C70EA000
trusted library allocation
page read and write
193C8D75000
trusted library allocation
page read and write
193CA9E4000
trusted library allocation
page read and write
1B1166E7000
trusted library allocation
page read and write
15A19DC0000
unclassified section
page read and write
1B11E080000
trusted library allocation
page read and write
1B111B7B000
trusted library allocation
page read and write
1174000
heap
page read and write
6831000
heap
page read and write
193D846F000
trusted library allocation
page read and write
1B113B00000
trusted library allocation
page read and write
1B1162E1000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
67E1000
heap
page read and write
310E000
stack
page read and write
4D20000
direct allocation
page execute and read and write
193C9A7A000
trusted library allocation
page read and write
52A1E3D000
stack
page read and write
1044000
heap
page read and write
193BC0FA000
heap
page read and write
193C699F000
trusted library allocation
page read and write
193D445F000
trusted library allocation
page read and write
2FEF000
stack
page read and write
193D1243000
trusted library allocation
page read and write
4D70000
direct allocation
page execute and read and write
193C9EFA000
trusted library allocation
page read and write
193C924D000
trusted library allocation
page read and write
1B1068C9000
trusted library allocation
page read and write
193CAA43000
trusted library allocation
page read and write
134A000
heap
page read and write
357E000
stack
page read and write
1B11C419000
trusted library allocation
page read and write
1B112EA1000
trusted library allocation
page read and write
193BB306000
trusted library allocation
page read and write
1B10689B000
trusted library allocation
page read and write
4701000
heap
page read and write
1B114EB8000
trusted library allocation
page read and write
1B1177A5000
trusted library allocation
page read and write
1B104490000
heap
page read and write
193CA203000
trusted library allocation
page read and write
193B92D0000
heap
page read and write
4240000
heap
page read and write
193BC0B3000
heap
page read and write
193D44CD000
trusted library allocation
page read and write
193BC117000
heap
page read and write
2BBF000
stack
page read and write
193CAF26000
trusted library allocation
page read and write
BBE000
stack
page read and write
193C5F00000
trusted library allocation
page read and write
193C9E4B000
trusted library allocation
page read and write
193C6365000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
1B11BF3D000
trusted library allocation
page read and write
1174000
heap
page read and write
6831000
heap
page read and write
4602000
heap
page read and write
193C73C1000
trusted library allocation
page read and write
1B110E9E000
trusted library allocation
page read and write
6831000
heap
page read and write
2D8E000
stack
page read and write
30FE000
stack
page read and write
193CA97D000
trusted library allocation
page read and write
6E9000
unkown
page execute and read and write
3D1000
unkown
page execute and write copy
1B114EE6000
trusted library allocation
page read and write
193D84E5000
trusted library allocation
page read and write
15A1A047000
trusted library allocation
page read and write
193D8AC5000
trusted library allocation
page read and write
52A37BB000
stack
page read and write
6831000
heap
page read and write
1B114EC9000
trusted library allocation
page read and write
193D7215000
trusted library allocation
page read and write
193D847C000
trusted library allocation
page read and write
67E1000
heap
page read and write
193D3A61000
trusted library allocation
page read and write
24617200000
trusted library allocation
page read and write
193CB336000
trusted library allocation
page read and write
193CA972000
trusted library allocation
page read and write
193C9EF3000
trusted library allocation
page read and write
1100000
direct allocation
page read and write
193C9A00000
trusted library allocation
page read and write
C0F000
heap
page read and write
6831000
heap
page read and write
193C9800000
trusted library allocation
page read and write
1B1073DA000
heap
page read and write
6831000
heap
page read and write
529ABFE000
stack
page read and write
1C8CD000
stack
page read and write
193D849B000
trusted library allocation
page read and write
1B115789000
trusted library allocation
page read and write
193CA35E000
trusted library allocation
page read and write
1B115003000
trusted library allocation
page read and write
193D44DB000
trusted library allocation
page read and write
193D8482000
trusted library allocation
page read and write
5460000
heap
page read and write
6831000
heap
page read and write
4E30000
direct allocation
page read and write
4E30000
direct allocation
page read and write
4701000
heap
page read and write
193C8E55000
trusted library allocation
page read and write
4C21000
heap
page read and write
1B110F03000
trusted library allocation
page read and write
1B110EB3000
trusted library allocation
page read and write
193CA6F8000
trusted library allocation
page read and write
67E1000
heap
page read and write
C94000
heap
page read and write
193C6E99000
trusted library allocation
page read and write
1174000
heap
page read and write
6831000
heap
page read and write
193D848B000
trusted library allocation
page read and write
1B112600000
trusted library allocation
page read and write
1B1152B2000
trusted library allocation
page read and write
C94000
heap
page read and write
193BB75C000
heap
page read and write
1B11573E000
trusted library allocation
page read and write
6831000
heap
page read and write
193BC0D4000
heap
page read and write
5F56000
heap
page read and write
1B11657A000
trusted library allocation
page read and write
193D8492000
trusted library allocation
page read and write
193BB5B0000
trusted library allocation
page read and write
11A0000
heap
page read and write
7760000
heap
page read and write
1B104599000
heap
page read and write
193C5AC7000
trusted library allocation
page read and write
6831000
heap
page read and write
193CA364000
trusted library allocation
page read and write
1B11DF86000
trusted library allocation
page read and write
193C8C43000
trusted library allocation
page read and write
193CA612000
trusted library allocation
page read and write
193D44F2000
trusted library allocation
page read and write
2588000
heap
page read and write
193BC0D4000
heap
page read and write
1BE3717000
stack
page read and write
1B115A72000
trusted library allocation
page read and write
2B7E000
stack
page read and write
1B116B9D000
trusted library allocation
page read and write
67E1000
heap
page read and write
193C902A000
trusted library allocation
page read and write
50822D04000
trusted library allocation
page read and write
1B1175C5000
trusted library allocation
page read and write
193B95B5000
heap
page read and write
4991000
heap
page read and write
193CAFA9000
trusted library allocation
page read and write
193D3A9A000
trusted library allocation
page read and write
193C5AC6000
trusted library allocation
page read and write
566D000
stack
page read and write
193C5A85000
trusted library allocation
page read and write
193CA725000
trusted library allocation
page read and write
193BC112000
heap
page read and write
1B1162CF000
trusted library allocation
page read and write
2DAF000
stack
page read and write
1B112F0A000
trusted library allocation
page read and write
1B1165E1000
trusted library allocation
page read and write
1044000
heap
page read and write
193D1094000
trusted library allocation
page read and write
15A1A02E000
trusted library allocation
page read and write
246171CA000
heap
page read and write
193BC0FC000
heap
page read and write
2589000
heap
page read and write
1D97000
heap
page read and write
193D12D4000
trusted library allocation
page read and write
193D4449000
trusted library allocation
page read and write
67E1000
heap
page read and write
317F000
stack
page read and write
1B11A100000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
401000
unkown
page execute read
193D8A2A000
trusted library allocation
page read and write
1B114E98000
trusted library allocation
page read and write
193D47D0000
trusted library allocation
page read and write
193BC0C3000
heap
page read and write
5460000
direct allocation
page execute and read and write
3A2000
unkown
page execute and read and write
67E1000
heap
page read and write
193C6966000
trusted library allocation
page read and write
22C77000
heap
page read and write
1294000
heap
page read and write
1B114EF1000
trusted library allocation
page read and write
4991000
heap
page read and write
193D10D3000
trusted library allocation
page read and write
22B0000
heap
page read and write
193BC0D7000
heap
page read and write
4991000
heap
page read and write
1174000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
6831000
heap
page read and write
113A000
stack
page read and write
193CA9E4000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
193D849B000
trusted library allocation
page read and write
CCF000
heap
page read and write
1B106876000
trusted library allocation
page read and write
193BC0A7000
heap
page read and write
193BC0DD000
heap
page read and write
1B117780000
trusted library allocation
page read and write
15A1A00D000
trusted library allocation
page read and write
1B118B2C000
trusted library allocation
page read and write
61E01000
direct allocation
page execute read
6831000
heap
page read and write
27D0000
direct allocation
page read and write
1174000
heap
page read and write
4601000
heap
page read and write
1B111403000
trusted library allocation
page read and write
1174000
heap
page read and write
193BC0B4000
heap
page read and write
5240000
direct allocation
page execute and read and write
193CA9D0000
trusted library allocation
page read and write
1B115765000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B114EE2000
trusted library allocation
page read and write
1B110F67000
trusted library allocation
page read and write
4991000
heap
page read and write
1B1074E5000
heap
page read and write
6831000
heap
page read and write
193CAE83000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
4701000
heap
page read and write
202D000
heap
page read and write
67E1000
heap
page read and write
193D442B000
trusted library allocation
page read and write
9EC2991000
trusted library allocation
page execute read
193D848D000
trusted library allocation
page read and write
1B11C200000
trusted library allocation
page read and write
193BC117000
heap
page read and write
FF4000
heap
page read and write
193CA3B4000
trusted library allocation
page read and write
193D84E5000
trusted library allocation
page read and write
4ED000
unkown
page execute and read and write
1322000
heap
page read and write
193D1276000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
1B11A608000
trusted library allocation
page read and write
193C7A43000
trusted library allocation
page read and write
1C78E000
stack
page read and write
19E000
stack
page read and write
193D8492000
trusted library allocation
page read and write
6831000
heap
page read and write
1B11C278000
trusted library allocation
page read and write
3E7F000
stack
page read and write
2910000
heap
page read and write
1174000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
193D84F8000
trusted library allocation
page read and write
193D101E000
trusted library allocation
page read and write
193CAF82000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
193CA990000
trusted library allocation
page read and write
268E000
stack
page read and write
1B1153F0000
trusted library section
page readonly
193D3656000
trusted library allocation
page read and write
25CE000
stack
page read and write
1B1200E7000
trusted library allocation
page read and write
6831000
heap
page read and write
6831000
heap
page read and write
193C6199000
trusted library allocation
page read and write
193D44A6000
trusted library allocation
page read and write
207A000
heap
page read and write
193D1287000
trusted library allocation
page read and write
1B115B6A000
trusted library allocation
page read and write
1146A3F000
stack
page read and write
67E1000
heap
page read and write
1044000
heap
page read and write
193D8A94000
trusted library allocation
page read and write
1B11C260000
trusted library allocation
page read and write
613000
unkown
page execute and read and write
43B000
unkown
page execute and read and write
193C5C15000
trusted library allocation
page read and write
5A1000
unkown
page execute and write copy
1B114EA7000
trusted library allocation
page read and write
2067000
heap
page read and write
1B115D21000
trusted library allocation
page read and write
193CAF91000
trusted library allocation
page read and write
1B111010000
trusted library allocation
page read and write
3FBF000
stack
page read and write
193CAAC6000
trusted library allocation
page read and write
1B1176D2000
trusted library allocation
page read and write
193D848D000
trusted library allocation
page read and write
6831000
heap
page read and write
1B115BB5000
trusted library allocation
page read and write
193D10B4000
trusted library allocation
page read and write
6831000
heap
page read and write
193D8100000
trusted library allocation
page read and write
193D7204000
trusted library allocation
page read and write
C94000
heap
page read and write
193BC0F5000
heap
page read and write
193D44D1000
trusted library allocation
page read and write
C94000
heap
page read and write
67E1000
heap
page read and write
1B112780000
trusted library allocation
page read and write
193BC0B2000
heap
page read and write
1C91E000
stack
page read and write
193D44A3000
trusted library allocation
page read and write
193D430B000
trusted library allocation
page read and write
193D3AF0000
trusted library allocation
page read and write
193C987A000
trusted library allocation
page read and write
1B116903000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
193CAF9A000
trusted library allocation
page read and write
193D84E5000
trusted library allocation
page read and write
1B110E4A000
trusted library allocation
page read and write
15A1A200000
trusted library allocation
page read and write
193CA26C000
trusted library allocation
page read and write
343E000
stack
page read and write
67E1000
heap
page read and write
6831000
heap
page read and write
41FD000
stack
page read and write
67E1000
heap
page read and write
1B114EB1000
trusted library allocation
page read and write
193BC0DD000
heap
page read and write
6831000
heap
page read and write
193CA72D000
trusted library allocation
page read and write
496E000
stack
page read and write
193D3C98000
trusted library allocation
page read and write
193BC0AF000
heap
page read and write
1044000
heap
page read and write
4F0E000
stack
page read and write
193C6ED4000
trusted library allocation
page read and write
1158000
heap
page read and write
1174000
heap
page read and write
1B11E09E000
trusted library allocation
page read and write
1B116940000
trusted library allocation
page read and write
1B111AE6000
trusted library allocation
page read and write
133D000
heap
page read and write
67E1000
heap
page read and write
193D44A9000
trusted library allocation
page read and write
193D84FC000
trusted library allocation
page read and write
1B11D4CA000
trusted library allocation
page read and write
193BC0CA000
heap
page read and write
193CC0A0000
trusted library allocation
page read and write
1B112EA1000
trusted library allocation
page read and write
193D848B000
trusted library allocation
page read and write
193BB506000
trusted library allocation
page read and write
1B107504000
heap
page read and write
6831000
heap
page read and write
67E1000
heap
page read and write
193D44BD000
trusted library allocation
page read and write
273D000
heap
page execute and read and write
6831000
heap
page read and write
1B107500000
heap
page read and write
1B117720000
trusted library allocation
page read and write
4C21000
heap
page read and write
67E1000
heap
page read and write
416F000
stack
page read and write
193D7200000
trusted library allocation
page read and write
6A12000
heap
page read and write
193BC0F0000
heap
page read and write
193CA6FC000
trusted library allocation
page read and write
193CAE63000
trusted library allocation
page read and write
5A0000
unkown
page readonly
4701000
heap
page read and write
6831000
heap
page read and write
1B1160E0000
trusted library section
page read and write
193CA7BE000
trusted library allocation
page read and write
C90000
heap
page read and write
1140B7D000
stack
page read and write
67E1000
heap
page read and write
22C5A000
heap
page read and write
6831000
heap
page read and write
4701000
heap
page read and write
193CA9F9000
trusted library allocation
page read and write
1B1074E3000
heap
page read and write
193BB69B000
heap
page read and write
1B116629000
trusted library allocation
page read and write
6831000
heap
page read and write
67E1000
heap
page read and write
2920000
direct allocation
page read and write
5FDF000
stack
page read and write
1B118B0E000
trusted library allocation
page read and write
6831000
heap
page read and write
1B11E0F7000
trusted library allocation
page read and write
6831000
heap
page read and write
1B11C252000
trusted library allocation
page read and write
193BB3DF000
trusted library allocation
page read and write
1174000
heap
page read and write
67E1000
heap
page read and write
1B1074E7000
heap
page read and write
22C84000
heap
page read and write
41BF000
stack
page read and write
193BC0DE000
heap
page read and write
15A1A156000
heap
page read and write
193C5EBA000
trusted library allocation
page read and write
31BE000
stack
page read and write
1174000
heap
page read and write
5050000
direct allocation
page read and write
439000
unkown
page write copy
193CA9D4000
trusted library allocation
page read and write
677E000
stack
page read and write
C18000
heap
page read and write
1B11C424000
trusted library allocation
page read and write
193C9C89000
trusted library allocation
page read and write
193D3CE2000
trusted library allocation
page read and write
5169000
direct allocation
page execute and read and write
4040000
heap
page read and write
193BC0F2000
heap
page read and write
4701000
heap
page read and write
1B116700000
trusted library allocation
page read and write
193BC0A8000
heap
page read and write
193D3AFE000
trusted library allocation
page read and write
1B1074FA000
heap
page read and write
193BC0EA000
heap
page read and write
6831000
heap
page read and write
193C9874000
trusted library allocation
page read and write
15A19C10000
heap
page read and write
193D44F2000
trusted library allocation
page read and write
6831000
heap
page read and write
1B107511000
heap
page read and write
1B10688E000
trusted library allocation
page read and write
5110000
direct allocation
page execute and read and write
1B11E0F9000
trusted library allocation
page read and write
5060000
trusted library allocation
page read and write
4C10000
direct allocation
page read and write
9A0000
heap
page read and write
45AE000
stack
page read and write
C94000
heap
page read and write
193BB74F000
heap
page read and write
67E1000
heap
page read and write
1B117682000
trusted library allocation
page read and write
193C6EFB000
trusted library allocation
page read and write
193C91F2000
trusted library allocation
page read and write
193D902E000
trusted library allocation
page read and write
193CA0EA000
trusted library allocation
page read and write
6831000
heap
page read and write
4F90000
direct allocation
page execute and read and write
193C90E2000
trusted library allocation
page read and write
1B11542B000
trusted library allocation
page read and write
193C59F0000
unclassified section
page read and write
54F0000
direct allocation
page execute and read and write
1B116860000
trusted library allocation
page read and write
393E000
stack
page read and write
193C6AA0000
trusted library section
page readonly
561000
unkown
page execute and read and write
1B1165B3000
trusted library allocation
page read and write
22C7D000
heap
page read and write
193CAA8E000
trusted library allocation
page read and write
1174000
heap
page read and write
193CA8EC000
trusted library allocation
page read and write
1B11BF71000
trusted library allocation
page read and write
193CAAE9000
trusted library allocation
page read and write
193C9E66000
trusted library allocation
page read and write
193CA5EF000
trusted library allocation
page read and write
193D44B6000
trusted library allocation
page read and write
193D8458000
trusted library allocation
page read and write
193BC101000
heap
page read and write
193D8492000
trusted library allocation
page read and write
67E1000
heap
page read and write
193BC0F5000
heap
page read and write
8B8000
unkown
page execute and write copy
193C7409000
trusted library allocation
page read and write
193CB003000
trusted library allocation
page read and write
6831000
heap
page read and write
193D3A5B000
trusted library allocation
page read and write
193D2A28000
trusted library allocation
page read and write
22C67000
heap
page read and write
193C739C000
trusted library allocation
page read and write
1B115310000
trusted library section
page read and write
1044000
heap
page read and write
C94000
heap
page read and write
193D12AD000
trusted library allocation
page read and write
193BC0FC000
heap
page read and write
193BC0F5000
heap
page read and write
193CAAC8000
trusted library allocation
page read and write
193C6E4B000
trusted library allocation
page read and write
193D4471000
trusted library allocation
page read and write
193D84F8000
trusted library allocation
page read and write
26E0000
direct allocation
page execute and read and write
193D4461000
trusted library allocation
page read and write
529B17F000
stack
page read and write
193D3A2F000
trusted library allocation
page read and write
193C8EDD000
trusted library allocation
page read and write
12B6000
heap
page read and write
401000
unkown
page execute read
193C6EA3000
trusted library allocation
page read and write
5460000
direct allocation
page execute and read and write
1D64000
heap
page read and write
193BC0E8000
heap
page read and write
C94000
heap
page read and write
193BC0B9000
heap
page read and write
193D84F5000
trusted library allocation
page read and write
1B1152C2000
trusted library allocation
page read and write
1B11777B000
trusted library allocation
page read and write
1BCF000
stack
page read and write
193C7A60000
trusted library allocation
page read and write
52A373E000
stack
page read and write
424E000
stack
page read and write
4C10000
direct allocation
page execute and read and write
193D8490000
trusted library allocation
page read and write
1030000
heap
page read and write
193CAFCA000
trusted library allocation
page read and write
193C943C000
trusted library allocation
page read and write
193BC0E0000
heap
page read and write
1CA6D000
stack
page read and write
6E1000
unkown
page execute and read and write
24617300000
trusted library allocation
page read and write
193CAF1D000
trusted library allocation
page read and write
193D8482000
trusted library allocation
page read and write
6831000
heap
page read and write
193C95F9000
trusted library allocation
page read and write
193BC0CD000
heap
page read and write
193BC0EF000
heap
page read and write
22C9D000
heap
page read and write
193D43CA000
trusted library allocation
page read and write
193D3AFE000
trusted library allocation
page read and write
1174000
heap
page read and write
193CAF9A000
trusted library allocation
page read and write
1B114EA5000
trusted library allocation
page read and write
193C6AE0000
trusted library section
page readonly
193BC0F0000
heap
page read and write
2461750C000
trusted library allocation
page read and write
1B11C256000
trusted library allocation
page read and write
434F000
stack
page read and write
6831000
heap
page read and write
1174000
heap
page read and write
C2D000
heap
page read and write
2920000
direct allocation
page read and write
193D90FC000
trusted library allocation
page read and write
15A1A0B7000
trusted library allocation
page read and write
193BC0FF000
heap
page read and write
1B112DCB000
trusted library allocation
page read and write
43BE000
stack
page read and write
C94000
heap
page read and write
1B115350000
trusted library section
page read and write
1B10683F000
trusted library allocation
page read and write
193CAF9A000
trusted library allocation
page read and write
193D44B9000
trusted library allocation
page read and write
1044000
heap
page read and write
193D10CE000
trusted library allocation
page read and write
1B118902000
trusted library allocation
page read and write
193D44F4000
trusted library allocation
page read and write
1B117533000
trusted library allocation
page read and write
193CA800000
trusted library allocation
page read and write
193BC0CD000
heap
page read and write
1B11107F000
trusted library allocation
page read and write
193D85D8000
trusted library allocation
page read and write
193C961B000
heap
page read and write
67E1000
heap
page read and write
193D7828000
trusted library allocation
page read and write
52A122E000
stack
page read and write
193C6AB0000
trusted library section
page readonly
193C92AE000
trusted library allocation
page read and write
6831000
heap
page read and write
1BBE000
stack
page read and write
193C918D000
trusted library allocation
page read and write
193D44F2000
trusted library allocation
page read and write
1044000
heap
page read and write
193CAB55000
trusted library allocation
page read and write
6831000
heap
page read and write
387E000
stack
page read and write
6B1C000
stack
page read and write
560000
unkown
page readonly
1B115669000
trusted library allocation
page read and write
1B11755B000
trusted library allocation
page read and write
1B112ECA000
trusted library allocation
page read and write
193D3AD5000
trusted library allocation
page read and write
4DE0000
direct allocation
page execute and read and write
193C6600000
trusted library allocation
page read and write
1B115BC6000
trusted library allocation
page read and write
193CAAA8000
trusted library allocation
page read and write
193D772D000
trusted library allocation
page read and write
1B1152DF000
trusted library allocation
page read and write
1140BBB000
stack
page read and write
193BC0DE000
heap
page read and write
193CACEF000
trusted library allocation
page read and write
24617519000
trusted library allocation
page read and write
1B1074E5000
heap
page read and write
1B114F9B000
trusted library allocation
page read and write
24617422000
unclassified section
page read and write
1174000
heap
page read and write
7E0000
unkown
page execute and read and write
193BC0AE000
heap
page read and write
1B1074E5000
heap
page read and write
193BC0AE000
heap
page read and write
193C7AFA000
trusted library allocation
page read and write
1100000
direct allocation
page read and write
22C77000
heap
page read and write
193C63A4000
trusted library allocation
page read and write
22C73000
heap
page read and write
193CAEC9000
trusted library allocation
page read and write
69D0000
heap
page read and write
67E1000
heap
page read and write
193D4795000
trusted library allocation
page read and write
1B11D4D2000
trusted library allocation
page read and write
193CA3CC000
trusted library allocation
page read and write
193CA98D000
trusted library allocation
page read and write
C94000
heap
page read and write
500F000
stack
page read and write
193CAEDC000
trusted library allocation
page read and write
1F0000
heap
page read and write
2E60000
direct allocation
page read and write
1B1152B2000
trusted library allocation
page read and write
193D4458000
trusted library allocation
page read and write
193CA3C2000
trusted library allocation
page read and write
22C70000
heap
page read and write
4991000
heap
page read and write
193D1090000
trusted library allocation
page read and write
1B115DE7000
trusted library allocation
page read and write
193C6EBF000
trusted library allocation
page read and write
193CAD29000
trusted library allocation
page read and write
193CA98B000
trusted library allocation
page read and write
1174000
heap
page read and write
133253604000
trusted library allocation
page read and write
1B116600000
trusted library allocation
page read and write
C94000
heap
page read and write
27C5000
heap
page read and write
1174000
heap
page read and write
193D3AD3000
trusted library allocation
page read and write
43BE000
stack
page read and write
193D7100000
trusted library allocation
page read and write
6840000
heap
page read and write
6E0C000
stack
page read and write
1B1152DF000
trusted library allocation
page read and write
4701000
heap
page read and write
1B115A47000
trusted library allocation
page read and write
193C63FD000
trusted library allocation
page read and write
1B11C4C7000
trusted library allocation
page read and write
193D44FD000
trusted library allocation
page read and write
1B11C373000
trusted library allocation
page read and write
1B106988000
trusted library allocation
page read and write
1B115900000
trusted library allocation
page read and write
67E1000
heap
page read and write
193BC0F0000
heap
page read and write
67E1000
heap
page read and write
193CB794000
trusted library allocation
page read and write
1B10752E000
heap
page read and write
193C5B5F000
trusted library allocation
page read and write
4701000
heap
page read and write
193CB7AE000
trusted library allocation
page read and write
193CA9E1000
trusted library allocation
page read and write
529ADCE000
stack
page read and write
193CAD0D000
trusted library allocation
page read and write
193BB50E000
trusted library allocation
page read and write
193D8DEB000
trusted library allocation
page read and write
67E1000
heap
page read and write
89000
unkown
page write copy
4E30000
direct allocation
page read and write
193C95D3000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
193BC0FA000
heap
page read and write
193CA7BD000
trusted library allocation
page read and write
193BC0F2000
heap
page read and write
193C964E000
heap
page read and write
1044000
heap
page read and write
193CAEBE000
trusted library allocation
page read and write
C94000
heap
page read and write
193CB304000
trusted library allocation
page read and write
193D84F1000
trusted library allocation
page read and write
193BC10F000
heap
page read and write
193C5E7D000
trusted library allocation
page read and write
193CB31C000
trusted library allocation
page read and write
50822DCE000
trusted library allocation
page read and write
67E1000
heap
page read and write
193BC0B2000
heap
page read and write
193BC0F5000
heap
page read and write
1B11D463000
trusted library allocation
page read and write
1B1152FE000
trusted library allocation
page read and write
3A6E000
stack
page read and write
1B104400000
unclassified section
page readonly
5260000
direct allocation
page execute and read and write
67E1000
heap
page read and write
193D3829000
trusted library allocation
page read and write
67E1000
heap
page read and write
C94000
heap
page read and write
8A9000
unkown
page execute and read and write
193BC0EA000
heap
page read and write
C94000
heap
page read and write
1B1066BE000
trusted library allocation
page read and write
193C9A03000
trusted library allocation
page read and write
193C704B000
trusted library allocation
page read and write
2D3E000
stack
page read and write
193C5B3B000
trusted library allocation
page read and write
1174000
heap
page read and write
4CC000
stack
page read and write
193BC0D4000
heap
page read and write
1B11DF96000
trusted library allocation
page read and write
22C93000
heap
page read and write
1B116B81000
trusted library allocation
page read and write
1044000
heap
page read and write
2EAF000
stack
page read and write
193D4204000
trusted library allocation
page read and write
193BB73F000
heap
page read and write
6831000
heap
page read and write
8FB11FE000
stack
page read and write
193D84FC000
trusted library allocation
page read and write
193BB3ED000
trusted library allocation
page read and write
34BE000
stack
page read and write
1B114EC7000
trusted library allocation
page read and write
1B1074FB000
heap
page read and write
C70000
heap
page read and write
1B114E69000
trusted library allocation
page read and write
193C8C51000
trusted library allocation
page read and write
6831000
heap
page read and write
193D47D7000
trusted library allocation
page read and write
193D3570000
trusted library allocation
page read and write
1B11C1BC000
trusted library allocation
page read and write
193D8499000
trusted library allocation
page read and write
535A000
heap
page read and write
193D8464000
trusted library allocation
page read and write
24617180000
heap
page read and write
2CAF000
stack
page read and write
193BC0D7000
heap
page read and write
24617391000
trusted library allocation
page read and write
1B1074EB000
heap
page read and write
193D1094000
trusted library allocation
page read and write
1B115D70000
trusted library allocation
page read and write
1174000
heap
page read and write
1B114EA5000
trusted library allocation
page read and write
193C7B20000
trusted library section
page read and write
193D4743000
trusted library allocation
page read and write
1B11C361000
trusted library allocation
page read and write
6831000
heap
page read and write
6831000
heap
page read and write
193C73E8000
trusted library allocation
page read and write
193C8C0E000
trusted library allocation
page read and write
193CAAF7000
trusted library allocation
page read and write
6831000
heap
page read and write
193D44CD000
trusted library allocation
page read and write
51C0000
direct allocation
page execute and read and write
1B1115B6000
trusted library allocation
page read and write
22C70000
heap
page read and write
193D8DFC000
trusted library allocation
page read and write
1174000
heap
page read and write
1B114EE2000
trusted library allocation
page read and write
193D3AFE000
trusted library allocation
page read and write
193C9B13000
trusted library allocation
page read and write
6831000
heap
page read and write
4D80000
direct allocation
page execute and read and write
193C5A6B000
trusted library allocation
page read and write
67E1000
heap
page read and write
6831000
heap
page read and write
193CAF7C000
trusted library allocation
page read and write
193C68A1000
trusted library allocation
page read and write
1B1068D3000
trusted library allocation
page read and write
1B113611000
trusted library allocation
page read and write
2EEE000
stack
page read and write
1B106712000
trusted library allocation
page read and write
193C6265000
trusted library allocation
page read and write
2B8B000
heap
page read and write
9EC29D1000
trusted library allocation
page execute read
4C4000
unkown
page execute and read and write
193D47D0000
trusted library allocation
page read and write
2F3F000
stack
page read and write
60B000
unkown
page execute and read and write
1B11616F000
trusted library allocation
page read and write
432000
unkown
page execute and read and write
C07000
heap
page read and write
193CA729000
trusted library allocation
page read and write
193CAA59000
trusted library allocation
page read and write
193BC0D4000
heap
page read and write
193BC0CD000
heap
page read and write
193BC0DE000
heap
page read and write
193CAF45000
trusted library allocation
page read and write
193D47C7000
trusted library allocation
page read and write
257E000
stack
page read and write
22C77000
heap
page read and write
5388000
heap
page read and write
1146BFC000
stack
page read and write
193D47DC000
trusted library allocation
page read and write
193C9AD2000
trusted library allocation
page read and write
193BB59B000
trusted library allocation
page read and write
22C77000
heap
page read and write
1BE69FE000
unkown
page readonly
2389000
heap
page read and write
193BC0FF000
heap
page read and write
1B1068C0000
trusted library allocation
page read and write
1B1066E8000
trusted library allocation
page read and write
193C73F1000
trusted library allocation
page read and write
51A4000
direct allocation
page execute and read and write
6831000
heap
page read and write
1B115248000
trusted library allocation
page read and write
193C9EC3000
trusted library allocation
page read and write
2F7F000
stack
page read and write
22C93000
heap
page read and write
67E1000
heap
page read and write
6831000
heap
page read and write
4F70000
direct allocation
page execute and read and write
6831000
heap
page read and write
4701000
heap
page read and write
114503B000
stack
page read and write
6831000
heap
page read and write
1B11EB35000
trusted library allocation
page read and write
193BC0F9000
heap
page read and write
D3E000
stack
page read and write
67E1000
heap
page read and write
193D900B000
trusted library allocation
page read and write
1B114EC7000
trusted library allocation
page read and write
78F1000
heap
page read and write
193C619F000
trusted library allocation
page read and write
1C4DF000
stack
page read and write
193BC0F0000
heap
page read and write
C94000
heap
page read and write
1B107504000
heap
page read and write
193D43A4000
trusted library allocation
page read and write
193C63A4000
trusted library allocation
page read and write
1B116539000
trusted library allocation
page read and write
529CA3E000
stack
page read and write
1E3DAF0A000
trusted library allocation
page read and write
5299FDF000
stack
page read and write
1B11C80D000
trusted library allocation
page read and write
1C63F000
stack
page read and write
C94000
heap
page read and write
1B11361E000
trusted library allocation
page read and write
193BC0B6000
heap
page read and write
193BC0D7000
heap
page read and write
193D44B9000
trusted library allocation
page read and write
5169000
direct allocation
page execute and read and write
193CA9FD000
trusted library allocation
page read and write
193BC0F5000
heap
page read and write
1B116405000
trusted library allocation
page read and write
4D90000
direct allocation
page execute and read and write
193CAFC3000
trusted library allocation
page read and write
552D000
stack
page read and write
C94000
heap
page read and write
8B8000
unkown
page execute and read and write
193C9650000
heap
page read and write
1B11EB0D000
trusted library allocation
page read and write
193C8C3D000
trusted library allocation
page read and write
259B000
heap
page read and write
193CA970000
trusted library allocation
page read and write
193C5D2F000
trusted library allocation
page read and write
193C90B2000
trusted library allocation
page read and write
1B11523B000
trusted library allocation
page read and write
1B11EB3D000
trusted library allocation
page read and write
13D4000
heap
page read and write
193CA976000
trusted library allocation
page read and write
193D8492000
trusted library allocation
page read and write
6831000
heap
page read and write
67E1000
heap
page read and write
193BC113000
heap
page read and write
2461731A000
trusted library allocation
page read and write
1B115B03000
trusted library allocation
page read and write
193D3AE8000
trusted library allocation
page read and write
193C8F0D000
trusted library allocation
page read and write
193C9599000
trusted library allocation
page read and write
193CAF06000
trusted library allocation
page read and write
1B11577A000
trusted library allocation
page read and write
1BDB000
stack
page read and write
2E60000
direct allocation
page read and write
1B11EB37000
trusted library allocation
page read and write
193D8DDE000
trusted library allocation
page read and write
67E1000
heap
page read and write
6831000
heap
page read and write
193C5A98000
trusted library allocation
page read and write
18A49549000
heap
page read and write
193D3A94000
trusted library allocation
page read and write
1F90000
heap
page read and write
193CA80C000
trusted library allocation
page read and write
1B11C394000
trusted library allocation
page read and write
24617504000
trusted library allocation
page read and write
3E3E000
stack
page read and write
2E60000
direct allocation
page read and write
1B1068A0000
trusted library allocation
page read and write
1B1074C1000
heap
page read and write
1B116030000
trusted library section
page readonly
193D4435000
trusted library allocation
page read and write
1F5FECF0000
heap
page read and write
22C77000
heap
page read and write
193C9373000
trusted library allocation
page read and write
193C5EEA000
trusted library allocation
page read and write
193C7AC1000
trusted library allocation
page read and write
67E1000
heap
page read and write
193CA9A5000
trusted library allocation
page read and write
49CE000
stack
page read and write
203F000
heap
page read and write
1B117583000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
193C6ED7000
trusted library allocation
page read and write
193D4410000
trusted library allocation
page read and write
1B116BFD000
trusted library allocation
page read and write
1B1127AC000
trusted library allocation
page read and write
6831000
heap
page read and write
193CAF26000
trusted library allocation
page read and write
1146C3E000
stack
page read and write
1B11BB39000
trusted library allocation
page read and write
193CB32C000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
22FD000
heap
page read and write
193C9A7A000
trusted library allocation
page read and write
1B11C344000
trusted library allocation
page read and write
1B1068B9000
trusted library allocation
page read and write
6831000
heap
page read and write
1174000
heap
page read and write
6831000
heap
page read and write
1B11BFE7000
trusted library allocation
page read and write
193D3CFB000
trusted library allocation
page read and write
6831000
heap
page read and write
C94000
heap
page read and write
1B1157EF000
trusted library allocation
page read and write
6831000
heap
page read and write
1B11D95F000
trusted library allocation
page read and write
1B112C6C000
trusted library allocation
page read and write
4FA0000
direct allocation
page execute and read and write
193C9CAD000
trusted library allocation
page read and write
193C9209000
trusted library allocation
page read and write
609000
unkown
page write copy
193C73CC000
trusted library allocation
page read and write
193D10D8000
trusted library allocation
page read and write
4701000
heap
page read and write
492F000
stack
page read and write
15A1A012000
trusted library allocation
page read and write
4E30000
direct allocation
page read and write
193C5A81000
trusted library allocation
page read and write
4701000
heap
page read and write
67E1000
heap
page read and write
3F2E000
stack
page read and write
8D91000
heap
page read and write
193BADF0000
trusted library section
page readonly
193C6103000
trusted library allocation
page read and write
193B91E0000
trusted library allocation
page read and write
1100000
direct allocation
page read and write
193D3CF3000
trusted library allocation
page read and write
FCF000
stack
page read and write
193CA6E7000
trusted library allocation
page read and write
193BB598000
trusted library allocation
page read and write
193D1024000
trusted library allocation
page read and write
1B1155BE000
trusted library allocation
page read and write
193C6530000
heap
page read and write
193C6262000
trusted library allocation
page read and write
67E1000
heap
page read and write
193BC0FF000
heap
page read and write
1C8DD000
stack
page read and write
1294000
heap
page read and write
193D8DFB000
trusted library allocation
page read and write
4A7F000
stack
page read and write
337E000
stack
page read and write
3A7F000
stack
page read and write
193C6C6A000
trusted library allocation
page read and write
2521BF251000
trusted library allocation
page read and write
67E1000
heap
page read and write
193D4773000
trusted library allocation
page read and write
37AF000
stack
page read and write
246173B6000
trusted library allocation
page read and write
61EB4000
direct allocation
page read and write
193BC0B6000
heap
page read and write
6831000
heap
page read and write
1294000
heap
page read and write
1B106700000
trusted library allocation
page read and write
1B10697E000
trusted library allocation
page read and write
193C90DE000
trusted library allocation
page read and write
67E1000
heap
page read and write
6831000
heap
page read and write
67E1000
heap
page read and write
193CACAF000
trusted library allocation
page read and write
1B106889000
trusted library allocation
page read and write
193D475F000
trusted library allocation
page read and write
67E1000
heap
page read and write
193CA3AF000
trusted library allocation
page read and write
193CA79B000
trusted library allocation
page read and write
10F0000
heap
page read and write
193C5E75000
trusted library allocation
page read and write
1C68E000
stack
page read and write
15A19DCF000
unclassified section
page read and write
1B1161E8000
trusted library allocation
page read and write
193D10FB000
trusted library allocation
page read and write
1B115DB9000
trusted library allocation
page read and write
6831000
heap
page read and write
193D3AAD000
trusted library allocation
page read and write
1B110E03000
trusted library allocation
page read and write
193CB333000
trusted library allocation
page read and write
1FEA000
heap
page read and write
560000
unkown
page readonly
114B000
heap
page read and write
6831000
heap
page read and write
193CAF9C000
trusted library allocation
page read and write
193D84F8000
trusted library allocation
page read and write
193BB3CD000
trusted library allocation
page read and write
1B11BB16000
trusted library allocation
page read and write
193C6C44000
trusted library allocation
page read and write
1B11C003000
trusted library allocation
page read and write
193CA976000
trusted library allocation
page read and write
1B10750A000
heap
page read and write
193D47E9000
trusted library allocation
page read and write
2273000
heap
page read and write
19E000
stack
page read and write
8392000
heap
page read and write
1174000
heap
page read and write
1B1136C2000
trusted library allocation
page read and write
193CAD00000
trusted library allocation
page read and write
C94000
heap
page read and write
193C92D6000
trusted library allocation
page read and write
6831000
heap
page read and write
4E40000
direct allocation
page execute and read and write
5410000
heap
page read and write
193BC0FA000
heap
page read and write
6831000
heap
page read and write
1294000
heap
page read and write
1174000
heap
page read and write
4FD000
unkown
page execute and read and write
1174000
heap
page read and write
1174000
heap
page read and write
193D7111000
trusted library allocation
page read and write
1B112610000
trusted library allocation
page read and write
13D4000
heap
page read and write
193C61E7000
trusted library allocation
page read and write
5A1000
unkown
page execute and write copy
193C9872000
trusted library allocation
page read and write
6831000
heap
page read and write
1B11BBE7000
trusted library allocation
page read and write
6831000
heap
page read and write
67E1000
heap
page read and write
67E1000
heap
page read and write
23A6000
heap
page read and write
193C639A000
trusted library allocation
page read and write
1174000
heap
page read and write
39BE000
stack
page read and write
10D9000
stack
page read and write
134D000
heap
page read and write
86F000
unkown
page execute and read and write
1B11C1B2000
trusted library allocation
page read and write
658000
unkown
page execute and write copy
1174000
heap
page read and write
193D47C1000
trusted library allocation
page read and write
1B116624000
trusted library allocation
page read and write
193C5A81000
trusted library allocation
page read and write
1C69E000
stack
page read and write
1B11E0F6000
trusted library allocation
page read and write
1B1152BC000
trusted library allocation
page read and write
193CA990000
trusted library allocation
page read and write
27D0000
direct allocation
page read and write
423000
unkown
page readonly
6831000
heap
page read and write
54E0000
direct allocation
page execute and read and write
67E1000
heap
page read and write
193C8F17000
trusted library allocation
page read and write
339000
unkown
page execute and read and write
193CA9F0000
trusted library allocation
page read and write
67E1000
heap
page read and write
1174000
heap
page read and write
193C9503000
trusted library allocation
page read and write
9A4000
heap
page read and write
193CAFCA000
trusted library allocation
page read and write
6831000
heap
page read and write
4991000
heap
page read and write
303F000
stack
page read and write
67F0000
heap
page read and write
1B11524E000
trusted library allocation
page read and write
193CA6BB000
trusted library allocation
page read and write
15A1A154000
heap
page read and write
67E1000
heap
page read and write
1B11756D000
trusted library allocation
page read and write
1B117598000
trusted library allocation
page read and write
6831000
heap
page read and write
193BC0FA000
heap
page read and write
25D7000
heap
page read and write
2BA0000
heap
page read and write
1B11C39F000
trusted library allocation
page read and write
1044000
heap
page read and write
1B11593C000
trusted library allocation
page read and write
438E000
stack
page read and write
193C90D9000
trusted library allocation
page read and write
78F0000
heap
page read and write
67E1000
heap
page read and write
193C7A83000
trusted library allocation
page read and write
529AA7B000
stack
page read and write
4991000
heap
page read and write
1D64000
heap
page read and write
32BF000
stack
page read and write
193CAACB000
trusted library allocation
page read and write
1B116100000
trusted library allocation
page read and write
1B11C4ED000
trusted library allocation
page read and write
36FF000
stack
page read and write
529E23F000
stack
page read and write
1B106920000
trusted library allocation
page read and write
193C7053000
trusted library allocation
page read and write
1B112B19000
trusted library allocation
page read and write
193CAF63000
trusted library allocation
page read and write
1B1068B4000
trusted library allocation
page read and write
193C5E79000
trusted library allocation
page read and write
193BC0BA000
heap
page read and write
193C6AD0000
trusted library section
page readonly
193D8479000
trusted library allocation
page read and write
8FB09BE000
stack
page read and write
1B117677000
trusted library allocation
page read and write
193BC0D4000
heap
page read and write
67E1000
heap
page read and write
193BC0C7000
heap
page read and write
86F000
unkown
page execute and read and write
4D30000
direct allocation
page execute and read and write
1B1074E5000
heap
page read and write
529F430000
unkown
page read and write
1147D0F000
stack
page read and write
193D856B000
trusted library allocation
page read and write
193D47BA000
trusted library allocation
page read and write
306000
unkown
page execute and read and write
1B111810000
heap
page read and write
193BC0D4000
heap
page read and write
15A1A079000
trusted library allocation
page read and write
193D4458000
trusted library allocation
page read and write
6831000
heap
page read and write
1B114E69000
trusted library allocation
page read and write
1B115203000
trusted library allocation
page read and write
193BC0DE000
heap
page read and write
C94000
heap
page read and write
193BC0AF000
heap
page read and write
696000
unkown
page execute and write copy
193D1026000
trusted library allocation
page read and write
8FAD5FE000
unkown
page readonly
6831000
heap
page read and write
C94000
heap
page read and write
193D43EF000
trusted library allocation
page read and write
52A063E000
stack
page read and write
20A4000
heap
page read and write
193D4764000
trusted library allocation
page read and write
18A49520000
heap
page read and write
1B114F03000
trusted library allocation
page read and write
193D3A89000
trusted library allocation
page read and write
1E3DABF0000
heap
page read and write
193D47C3000
trusted library allocation
page read and write
50C1000
direct allocation
page read and write
1044000
heap
page read and write
1B111526000
trusted library allocation
page read and write
1B11D4C0000
trusted library allocation
page read and write
443F000
stack
page read and write
1B1068AD000
trusted library allocation
page read and write
193CAAAE000
trusted library allocation
page read and write
1B114E6F000
trusted library allocation
page read and write
22C77000
heap
page read and write
1B111938000
heap
page read and write
2920000
direct allocation
page read and write
2F7F000
stack
page read and write
193BC0BE000
heap
page read and write
193C5E75000
trusted library allocation
page read and write
1B11366C000
trusted library allocation
page read and write
221B000
heap
page read and write
27D0000
direct allocation
page read and write
193CAAF2000
trusted library allocation
page read and write
350BC000
stack
page read and write
193CC0EB000
trusted library allocation
page read and write
193BC0E8000
heap
page read and write
6831000
heap
page read and write
193CA98D000
trusted library allocation
page read and write
1144000
heap
page read and write
193BC0CD000
heap
page read and write
193D846B000
trusted library allocation
page read and write
193D8DFB000
trusted library allocation
page read and write
1B11D94C000
trusted library allocation
page read and write
6831000
heap
page read and write
193C9EAE000
trusted library allocation
page read and write
1B1073C7000
heap
page read and write
2461739B000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B114EA0000
trusted library allocation
page read and write
193D84E5000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B1074EB000
heap
page read and write
67E1000
heap
page read and write
1044000
heap
page read and write
C94000
heap
page read and write
6831000
heap
page read and write
1B1151D7000
trusted library allocation
page read and write
1B106900000
trusted library allocation
page read and write
1B114EB8000
trusted library allocation
page read and write
193CAADA000
trusted library allocation
page read and write
113E43E000
stack
page read and write
193C61BD000
trusted library allocation
page read and write
C94000
heap
page read and write
193CA7C3000
trusted library allocation
page read and write
BA5000
heap
page read and write
193CAF7C000
trusted library allocation
page read and write
1044000
heap
page read and write
6831000
heap
page read and write
1F5FECE0000
heap
page read and write
6831000
heap
page read and write
2E60000
direct allocation
page read and write
1B112E7F000
trusted library allocation
page read and write
1B115AB9000
trusted library allocation
page read and write
1B117563000
trusted library allocation
page read and write
1B112E52000
trusted library allocation
page read and write
1B1074E5000
heap
page read and write
1B114E18000
trusted library allocation
page read and write
193CAFB3000
trusted library allocation
page read and write
67E1000
heap
page read and write
4B80000
trusted library allocation
page read and write
193D8DE5000
trusted library allocation
page read and write
1B11E058000
trusted library allocation
page read and write
193CAF68000
trusted library allocation
page read and write
2521BF204000
trusted library allocation
page read and write
193D84FC000
trusted library allocation
page read and write
193CA972000
trusted library allocation
page read and write
193D1099000
trusted library allocation
page read and write
193BB58A000
trusted library allocation
page read and write
193D3A9E000
trusted library allocation
page read and write
1B104700000
heap
page read and write
1B111B27000
trusted library allocation
page read and write
1B1069B5000
trusted library allocation
page read and write
193D4223000
trusted library allocation
page read and write
1B112E1C000
trusted library allocation
page read and write
6831000
heap
page read and write
6831000
heap
page read and write
193C5C00000
trusted library allocation
page read and write
1B11EB11000
trusted library allocation
page read and write
4991000
heap
page read and write
15A19DC2000
unclassified section
page read and write
2206000
heap
page read and write
1B11D627000
trusted library allocation
page read and write
193C6C88000
trusted library allocation
page read and write
639F000
stack
page read and write
193BC0D4000
heap
page read and write
193CA600000
trusted library allocation
page read and write
67E1000
heap
page read and write
21D6000
heap
page read and write
1B112C78000
trusted library allocation
page read and write
2182000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
1B114FA8000
trusted library allocation
page read and write
193CAF95000
trusted library allocation
page read and write
4C10000
direct allocation
page read and write
1B11C26D000
trusted library allocation
page read and write
4701000
heap
page read and write
658000
unkown
page execute and read and write
C94000
heap
page read and write
67E1000
heap
page read and write
193BC0AE000
heap
page read and write
67E1000
heap
page read and write
193CA998000
trusted library allocation
page read and write
193CAFC0000
trusted library allocation
page read and write
2299000
heap
page read and write
193C640E000
trusted library allocation
page read and write
193D7775000
trusted library allocation
page read and write
4701000
heap
page read and write
193BC0FA000
heap
page read and write
61ED0000
direct allocation
page read and write
193D47FC000
trusted library allocation
page read and write
5280000
trusted library allocation
page read and write
4720000
heap
page read and write
1174000
heap
page read and write
1B10751C000
heap
page read and write
193CA85E000
trusted library allocation
page read and write
193BB681000
heap
page read and write
119C000
heap
page read and write
6831000
heap
page read and write
1B115380000
trusted library section
page read and write
1B1074E7000
heap
page read and write
193D849B000
trusted library allocation
page read and write
67E1000
heap
page read and write
9EC29A1000
trusted library allocation
page execute read
C94000
heap
page read and write
193BC0EA000
heap
page read and write
8FB097E000
unkown
page readonly
4250000
heap
page read and write
193D3A2C000
trusted library allocation
page read and write
383E000
stack
page read and write
C94000
heap
page read and write
193BC0F4000
heap
page read and write
1B1166FD000
trusted library allocation
page read and write
253A000
heap
page read and write
15A1A232000
trusted library allocation
page read and write
1B1136F2000
trusted library allocation
page read and write
193CAC00000
trusted library allocation
page read and write
45BE000
stack
page read and write
53C4000
heap
page read and write
A57000
unkown
page execute and read and write
193CA54B000
trusted library allocation
page read and write
8FAD5BD000
stack
page read and write
193BC0A8000
heap
page read and write
C0F000
heap
page read and write
67E1000
heap
page read and write
193BC0EA000
heap
page read and write
C94000
heap
page read and write
193C5AC3000
trusted library allocation
page read and write
193CB2FE000
trusted library allocation
page read and write
1B1153B0000
trusted library section
page readonly
1B115AE3000
trusted library allocation
page read and write
1174000
heap
page read and write
8B9000
unkown
page execute and write copy
193CAFE6000
trusted library allocation
page read and write
193C6A90000
trusted library section
page readonly
1B107508000
heap
page read and write
1B114ECD000
trusted library allocation
page read and write
696000
unkown
page execute and read and write
437F000
stack
page read and write
2209000
heap
page read and write
1B112E00000
trusted library allocation
page read and write
193D35DF000
trusted library allocation
page read and write
1B113609000
trusted library allocation
page read and write
67E1000
heap
page read and write
423000
unkown
page readonly
62C000
unkown
page execute and read and write
1155000
heap
page read and write
67E1000
heap
page read and write
4110000
heap
page read and write
193CA976000
trusted library allocation
page read and write
4D20000
direct allocation
page execute and read and write
1B1048ED000
trusted library allocation
page read and write
193D127C000
trusted library allocation
page read and write
193C9D78000
trusted library allocation
page read and write
1B1069FA000
trusted library allocation
page read and write
193CA921000
trusted library allocation
page read and write
423E000
stack
page read and write
4600000
heap
page read and write
333E000
stack
page read and write
67E1000
heap
page read and write
22C77000
heap
page read and write
193CAF45000
trusted library allocation
page read and write
194000
stack
page read and write
529B1FC000
stack
page read and write
67E1000
heap
page read and write
193D3AD5000
trusted library allocation
page read and write
1170000
heap
page read and write
193D84F6000
trusted library allocation
page read and write
1B11BF4F000
trusted library allocation
page read and write
1B115163000
trusted library allocation
page read and write
193CA9CC000
trusted library allocation
page read and write
193C6800000
trusted library allocation
page read and write
6831000
heap
page read and write
ECE000
stack
page read and write
4C50000
direct allocation
page execute and read and write
1B116893000
trusted library allocation
page read and write
193BC0A5000
heap
page read and write
193C7071000
trusted library allocation
page read and write
51E0000
direct allocation
page execute and read and write
13DE000
stack
page read and write
529DA3F000
stack
page read and write
67E1000
heap
page read and write
6831000
heap
page read and write
1B106703000
trusted library allocation
page read and write
1B11753C000
trusted library allocation
page read and write
193D36E2000
trusted library allocation
page read and write
12FF000
heap
page read and write
193C8C03000
trusted library allocation
page read and write
2530000
heap
page read and write
193C9E4B000
trusted library allocation
page read and write
1B11DF03000
trusted library allocation
page read and write
1F33000
heap
page read and write
6831000
heap
page read and write
15A1A0C8000
trusted library allocation
page read and write
435000
unkown
page read and write
193D84F8000
trusted library allocation
page read and write
193C8E35000
trusted library allocation
page read and write
C94000
heap
page read and write
1174000
heap
page read and write
67E1000
heap
page read and write
1B116580000
trusted library allocation
page read and write
193C9837000
trusted library allocation
page read and write
193BC0FC000
heap
page read and write
1B1175A4000
trusted library allocation
page read and write
193CA097000
trusted library allocation
page read and write
1B11D900000
trusted library allocation
page read and write
1B111A9F000
trusted library allocation
page read and write
1B11C220000
trusted library allocation
page read and write
6831000
heap
page read and write
1B111A09000
trusted library allocation
page read and write
5260000
direct allocation
page execute and read and write
5290000
direct allocation
page execute and read and write
1174000
heap
page read and write
3A7E000
stack
page read and write
193BC0CF000
heap
page read and write
193BC0F0000
heap
page read and write
1B1155FC000
trusted library allocation
page read and write
193CAF82000
trusted library allocation
page read and write
193C61EE000
trusted library allocation
page read and write
1B10750E000
heap
page read and write
193BC0B6000
heap
page read and write
67E1000
heap
page read and write
193D8DC3000
trusted library allocation
page read and write
193BB6B3000
heap
page read and write
8FB00FE000
stack
page read and write
193D479F000
trusted library allocation
page read and write
4BAF000
stack
page read and write
67E1000
heap
page read and write
C95000
heap
page read and write
BD6000
heap
page read and write
2E4E000
stack
page read and write
193B94DC000
trusted library allocation
page read and write
193C70FA000
trusted library allocation
page read and write
193BB5F2000
trusted library allocation
page read and write
2920000
direct allocation
page read and write
1B11554F000
trusted library allocation
page read and write
5000000
direct allocation
page execute and read and write
18A47CA0000
heap
page read and write
193C68A3000
trusted library allocation
page read and write
193D8492000
trusted library allocation
page read and write
113E000
stack
page read and write
1B115703000
trusted library allocation
page read and write
9B0000
heap
page read and write
193C5E82000
trusted library allocation
page read and write
45BE000
stack
page read and write
68BE000
stack
page read and write
193BC0F0000
heap
page read and write
2E50000
heap
page read and write
193C984E000
trusted library allocation
page read and write
193CAB64000
trusted library allocation
page read and write
1100000
direct allocation
page read and write
4E10000
direct allocation
page read and write
193C955E000
trusted library allocation
page read and write
193BC0DD000
heap
page read and write
193D479F000
trusted library allocation
page read and write
1B118915000
trusted library allocation
page read and write
193C695E000
trusted library allocation
page read and write
1B116A7E000
trusted library allocation
page read and write
193CA98B000
trusted library allocation
page read and write
1B11662F000
trusted library allocation
page read and write
1044000
heap
page read and write
193D8468000
trusted library allocation
page read and write
193BC0DD000
heap
page read and write
193CA9FD000
trusted library allocation
page read and write
1B1073B0000
heap
page read and write
1174000
heap
page read and write
4991000
heap
page read and write
193CA976000
trusted library allocation
page read and write
193BC0F4000
heap
page read and write
67E1000
heap
page read and write
C94000
heap
page read and write
193C9EAE000
trusted library allocation
page read and write
193C9548000
trusted library allocation
page read and write
3FC0000
direct allocation
page read and write
1B110F2B000
trusted library allocation
page read and write
193D44D1000
trusted library allocation
page read and write
193BC0B3000
heap
page read and write
1B1073D9000
heap
page read and write
67E1000
heap
page read and write
1B11275E000
trusted library allocation
page read and write
2640000
heap
page read and write
193BC0CE000
heap
page read and write
193CA9FD000
trusted library allocation
page read and write
193D841C000
trusted library allocation
page read and write
519F000
stack
page read and write
1B1073E1000
heap
page read and write
67E1000
heap
page read and write
193BC0EA000
heap
page read and write
1130000
heap
page read and write
6831000
heap
page read and write
193D44CD000
trusted library allocation
page read and write
193C63CF000
trusted library allocation
page read and write
4701000
heap
page read and write
1B115603000
trusted library allocation
page read and write
6831000
heap
page read and write
2B6E000
stack
page read and write
193C5ADF000
trusted library allocation
page read and write
193CA60C000
trusted library allocation
page read and write
4701000
heap
page read and write
193D84A4000
trusted library allocation
page read and write
193BC0F5000
heap
page read and write
350C1000
heap
page read and write
1B112CC2000
trusted library allocation
page read and write
193CA3CC000
trusted library allocation
page read and write
CB8000
heap
page read and write
193CA0D0000
trusted library allocation
page read and write
225D000
heap
page read and write
193BC0F0000
heap
page read and write
1174000
heap
page read and write
1B11C373000
trusted library allocation
page read and write
1B115903000
trusted library allocation
page read and write
5A0000
unkown
page readonly
193BB5B0000
trusted library allocation
page read and write
1B1074E3000
heap
page read and write
1B11C11A000
trusted library allocation
page read and write
2ADF000
stack
page read and write
1E84000
heap
page read and write
280F000
stack
page read and write
22C73000
heap
page read and write
1B1176CE000
trusted library allocation
page read and write
221F000
heap
page read and write
193BC0DE000
heap
page read and write
1B11C3A2000
trusted library allocation
page read and write
193D3100000
trusted library allocation
page read and write
1B11C40C000
trusted library allocation
page read and write
193D84F8000
trusted library allocation
page read and write
1174000
heap
page read and write
193CAFB8000
trusted library allocation
page read and write
21F000
unkown
page execute and read and write
193BC0CD000
heap
page read and write
193CAF0B000
trusted library allocation
page read and write
193DA000000
trusted library allocation
page read and write
193D858A000
trusted library allocation
page read and write
10EE000
stack
page read and write
529BCBB000
stack
page read and write
4E10000
direct allocation
page read and write
193D10DF000
trusted library allocation
page read and write
193C5C1A000
trusted library allocation
page read and write
193D442B000
trusted library allocation
page read and write
4991000
heap
page read and write
193D447A000
trusted library allocation
page read and write
193BB750000
heap
page read and write
193D12FE000
trusted library allocation
page read and write
193C92A6000
trusted library allocation
page read and write
193D12F5000
trusted library allocation
page read and write
193CA725000
trusted library allocation
page read and write
37FF000
stack
page read and write
6831000
heap
page read and write
6831000
heap
page read and write
193CAAC3000
trusted library allocation
page read and write
4991000
heap
page read and write
1B106812000
trusted library allocation
page read and write
1B115B8A000
trusted library allocation
page read and write
6831000
heap
page read and write
1B112C03000
trusted library allocation
page read and write
4DF0000
direct allocation
page execute and read and write
193C985E000
trusted library allocation
page read and write
1B112E56000
trusted library allocation
page read and write
193C95F7000
trusted library allocation
page read and write
193D846B000
trusted library allocation
page read and write
1B116080000
trusted library section
page read and write
1B110F08000
trusted library allocation
page read and write
1F03000
heap
page read and write
8373000
heap
page read and write
67E1000
heap
page read and write
1B113669000
trusted library allocation
page read and write
193CA98B000
trusted library allocation
page read and write
193BC0E0000
heap
page read and write
3D4E000
stack
page read and write
C7B000
heap
page read and write
193C8D00000
trusted library allocation
page read and write
193D8DDC000
trusted library allocation
page read and write
C12000
heap
page read and write
1B1153C0000
trusted library section
page readonly
15A1A203000
trusted library allocation
page read and write
27DC000
heap
page read and write
1B115A81000
trusted library allocation
page read and write
4701000
heap
page read and write
193BC0BE000
heap
page read and write
193CC046000
trusted library allocation
page read and write
6831000
heap
page read and write
193BC0B9000
heap
page read and write
24617020000
remote allocation
page read and write
C94000
heap
page read and write
52DE000
stack
page read and write
193C7622000
trusted library allocation
page read and write
193CA9E4000
trusted library allocation
page read and write
1B1074F0000
heap
page read and write
1B11BF36000
trusted library allocation
page read and write
193D1289000
trusted library allocation
page read and write
193BB870000
trusted library allocation
page read and write
1174000
heap
page read and write
193B95A0000
trusted library section
page readonly
1B1176E2000
trusted library allocation
page read and write
1B1161D7000
trusted library allocation
page read and write
1B1169EA000
trusted library allocation
page read and write
1B113400000
trusted library allocation
page read and write
1B114EE2000
trusted library allocation
page read and write
1B116A2A000
trusted library allocation
page read and write
193CA9F0000
trusted library allocation
page read and write
193C5A98000
trusted library allocation
page read and write
1B104868000
trusted library allocation
page read and write
4D60000
direct allocation
page execute and read and write
9EC2AF1000
trusted library allocation
page execute read
193C9562000
trusted library allocation
page read and write
1B1161A0000
trusted library allocation
page read and write
3BB6401000
trusted library allocation
page execute read
193CAB03000
trusted library allocation
page read and write
6831000
heap
page read and write
193C6327000
trusted library allocation
page read and write
C94000
heap
page read and write
193C9C27000
trusted library allocation
page read and write
1B11D62F000
trusted library allocation
page read and write
1B11EB0F000
trusted library allocation
page read and write
193D44A8000
trusted library allocation
page read and write
193D4770000
trusted library allocation
page read and write
193D123A000
trusted library allocation
page read and write
193D849D000
trusted library allocation
page read and write
22C77000
heap
page read and write
193DA2B3000
trusted library allocation
page read and write
193D47DC000
trusted library allocation
page read and write
1B115E1C000
trusted library allocation
page read and write
1B111A00000
trusted library allocation
page read and write
193C93AF000
trusted library allocation
page read and write
1B114EC7000
trusted library allocation
page read and write
6831000
heap
page read and write
6831000
heap
page read and write
193BC0DD000
heap
page read and write
1174000
heap
page read and write
13D4000
heap
page read and write
36AE000
stack
page read and write
193CAF2C000
trusted library allocation
page read and write
307E000
stack
page read and write
193C9D53000
trusted library allocation
page read and write
193D47C6000
trusted library allocation
page read and write
3FCE000
stack
page read and write
193D3CFE000
trusted library allocation
page read and write
50FE000
stack
page read and write
193CA961000
trusted library allocation
page read and write
118D000
heap
page read and write
193BC0E8000
heap
page read and write
1B11D485000
trusted library allocation
page read and write
5200000
direct allocation
page execute and read and write
193D849B000
trusted library allocation
page read and write
2461753D000
trusted library allocation
page read and write
5250000
direct allocation
page execute and read and write
1B1161EB000
trusted library allocation
page read and write
6831000
heap
page read and write
1B106952000
trusted library allocation
page read and write
1B11C303000
trusted library allocation
page read and write
4D70000
direct allocation
page execute and read and write
193D3AFA000
trusted library allocation
page read and write
193CAE63000
trusted library allocation
page read and write
37BF000
stack
page read and write
67E1000
heap
page read and write
193D4461000
trusted library allocation
page read and write
253A000
heap
page read and write
1B1068CD000
trusted library allocation
page read and write
193CA97B000
trusted library allocation
page read and write
1141AFE000
stack
page read and write
67E1000
heap
page read and write
193CAAAE000
trusted library allocation
page read and write
1100000
direct allocation
page read and write
400000
unkown
page readonly
193CAA91000
trusted library allocation
page read and write
193D7739000
trusted library allocation
page read and write
193BC0D5000
heap
page read and write
1B11C234000
trusted library allocation
page read and write
193BC0CA000
heap
page read and write
193CA756000
trusted library allocation
page read and write
6831000
heap
page read and write
1B114EF1000
trusted library allocation
page read and write
1174000
heap
page read and write
193CAACB000
trusted library allocation
page read and write
193D4360000
trusted library allocation
page read and write
1B116B06000
trusted library allocation
page read and write
1B1154BE000
trusted library allocation
page read and write
193D7B23000
trusted library allocation
page read and write
1BE379E000
unkown
page readonly
193CAF68000
trusted library allocation
page read and write
193D43C1000
trusted library allocation
page read and write
6831000
heap
page read and write
193C7069000
trusted library allocation
page read and write
193BC0F4000
heap
page read and write
193CAFB7000
trusted library allocation
page read and write
4E30000
direct allocation
page read and write
342F000
stack
page read and write
6831000
heap
page read and write
1D20000
heap
page read and write
1B111BDD000
trusted library allocation
page read and write
1B107465000
heap
page read and write
193CB2C3000
trusted library allocation
page read and write
193D4215000
trusted library allocation
page read and write
3AFE000
stack
page read and write
193CA90E000
trusted library allocation
page read and write
1B11524D000
trusted library allocation
page read and write
193D8128000
trusted library allocation
page read and write
114243F000
stack
page read and write
193BC0FC000
heap
page read and write
193C8DCB000
trusted library allocation
page read and write
193BC0F0000
heap
page read and write
193C5A7E000
trusted library allocation
page read and write
115C000
heap
page read and write
4D50000
direct allocation
page execute and read and write
67E1000
heap
page read and write
6831000
heap
page read and write
1B1068A0000
trusted library allocation
page read and write
193C9E21000
trusted library allocation
page read and write
1B11E099000
trusted library allocation
page read and write
4FAC000
stack
page read and write
1B1175CC000
trusted library allocation
page read and write
5CC0000
heap
page read and write
193D7223000
trusted library allocation
page read and write
1044000
heap
page read and write
193BC0F5000
heap
page read and write
3BCF000
stack
page read and write
193D848D000
trusted library allocation
page read and write
20E3000
heap
page read and write
1B1074F1000
heap
page read and write
272E000
heap
page read and write
193BC0DD000
heap
page read and write
488E000
stack
page read and write
114023F000
stack
page read and write
193D10C7000
trusted library allocation
page read and write
1C53E000
stack
page read and write
4BDF000
stack
page read and write
1174000
heap
page read and write
1B112B00000
trusted library allocation
page read and write
193BC0CA000
heap
page read and write
193C90C8000
trusted library allocation
page read and write
193CAFA8000
trusted library allocation
page read and write
193C90E2000
trusted library allocation
page read and write
193D10AF000
trusted library allocation
page read and write
193CB31F000
trusted library allocation
page read and write
C94000
heap
page read and write
1C2FF000
stack
page read and write
1B114EC9000
trusted library allocation
page read and write
15A19E70000
heap
page read and write
193CAE92000
trusted library allocation
page read and write
67E1000
heap
page read and write
4C20000
direct allocation
page execute and read and write
193CA15F000
trusted library allocation
page read and write
C94000
heap
page read and write
67E1000
heap
page read and write
67E1000
heap
page read and write
193CA633000
trusted library allocation
page read and write
51A4000
direct allocation
page execute and read and write
2EDFF000
heap
page read and write
1B114E95000
trusted library allocation
page read and write
27D0000
direct allocation
page read and write
4C10000
direct allocation
page read and write
1E3DAD60000
heap
page read and write
211F000
heap
page read and write
1B1152DA000
trusted library allocation
page read and write
193C8C24000
trusted library allocation
page read and write
2CFF000
stack
page read and write
193BC0F0000
heap
page read and write
1B11E066000
trusted library allocation
page read and write
6831000
heap
page read and write
193BC0F5000
heap
page read and write
193C6400000
trusted library allocation
page read and write
24617500000
trusted library allocation
page read and write
433F000
stack
page read and write
6831000
heap
page read and write
6831000
heap
page read and write
46EE000
stack
page read and write
4C21000
heap
page read and write
1CF6000
heap
page read and write
1C96E000
stack
page read and write
193D84FC000
trusted library allocation
page read and write
1B11763D000
trusted library allocation
page read and write
193CA97D000
trusted library allocation
page read and write
193CAFB7000
trusted library allocation
page read and write
6831000
heap
page read and write
27CF000
heap
page read and write
1B1066E2000
trusted library allocation
page read and write
4BC0000
direct allocation
page read and write
B8C000
stack
page read and write
193BC0F0000
heap
page read and write
40CF000
stack
page read and write
1174000
heap
page read and write
1B11C1AD000
trusted library allocation
page read and write
193D47E8000
trusted library allocation
page read and write
193BC0FE000
heap
page read and write
193BC0DE000
heap
page read and write
1B11523B000
trusted library allocation
page read and write
4991000
heap
page read and write
67E1000
heap
page read and write
193D4427000
trusted library allocation
page read and write
193C6EAB000
trusted library allocation
page read and write
67E1000
heap
page read and write
193CA038000
trusted library allocation
page read and write
6C955000
unkown
page readonly
5210000
direct allocation
page execute and read and write
193BC0F2000
heap
page read and write
135A000
heap
page read and write
1B1115BC000
trusted library allocation
page read and write
193CA63C000
trusted library allocation
page read and write
24617397000
trusted library allocation
page read and write
C15000
heap
page read and write
67E1000
heap
page read and write
193BC0A9000
heap
page read and write
193D3CA7000
trusted library allocation
page read and write
6831000
heap
page read and write
22C61000
heap
page read and write
C20000
heap
page read and write
463E000
stack
page read and write
193C61B5000
trusted library allocation
page read and write
193C9040000
trusted library allocation
page read and write
193CAAAD000
trusted library allocation
page read and write
193CAF47000
trusted library allocation
page read and write
193B9050000
unclassified section
page readonly
9EC000
stack
page read and write
B82000
unkown
page execute and read and write
193CA005000
trusted library allocation
page read and write
193CAF45000
trusted library allocation
page read and write
193C8CE5000
trusted library allocation
page read and write
1B11BBE9000
trusted library allocation
page read and write
113E4BB000
stack
page read and write
6831000
heap
page read and write
2DBF000
stack
page read and write
5020000
trusted library allocation
page read and write
1B111510000
trusted library allocation
page read and write
193D4492000
trusted library allocation
page read and write
27D6000
heap
page read and write
2B8D000
heap
page read and write
193C6369000
trusted library allocation
page read and write
3D0000
unkown
page read and write
413E000
stack
page read and write
BE0000
direct allocation
page read and write
193BC0F2000
heap
page read and write
1B11758D000
trusted library allocation
page read and write
67E1000
heap
page read and write
193CA9FD000
trusted library allocation
page read and write
67E1000
heap
page read and write
4991000
heap
page read and write
193BC0F4000
heap
page read and write
1174000
heap
page read and write
2C7F000
stack
page read and write
1B11BF77000
trusted library allocation
page read and write
46F0000
direct allocation
page read and write
193BC0FA000
heap
page read and write
193D4430000
trusted library allocation
page read and write
1B1068BF000
trusted library allocation
page read and write
9A4000
heap
page read and write
331000
unkown
page execute and read and write
1C7DE000
stack
page read and write
1174000
heap
page read and write
6831000
heap
page read and write
193C9ADA000
trusted library allocation
page read and write
193D8A7D000
trusted library allocation
page read and write
193D84A4000
trusted library allocation
page read and write
67E1000
heap
page read and write
193D8D43000
trusted library allocation
page read and write
193CA9CC000
trusted library allocation
page read and write
193BC0B6000
heap
page read and write
67E1000
heap
page read and write
193CAFC5000
trusted library allocation
page read and write
103B000
stack
page read and write
193C9EAE000
trusted library allocation
page read and write
4DD0000
direct allocation
page execute and read and write
407F000
stack
page read and write
4701000
heap
page read and write
193CB720000
trusted library allocation
page read and write
6831000
heap
page read and write
24617303000
trusted library allocation
page read and write
529AABB000
stack
page read and write
1B11524E000
trusted library allocation
page read and write
193C99F3000
trusted library allocation
page read and write
1B11DD03000
trusted library allocation
page read and write
67E1000
heap
page read and write
193C964F000
heap
page read and write
193CA103000
trusted library allocation
page read and write
1B11C276000
trusted library allocation
page read and write
4991000
heap
page read and write
1B11EB1B000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
193D8DD5000
trusted library allocation
page read and write
193BC0D7000
heap
page read and write
193D3A77000
trusted library allocation
page read and write
193D1000000
trusted library allocation
page read and write
32FE000
stack
page read and write
193CAFE6000
trusted library allocation
page read and write
2E30000
heap
page read and write
1B106723000
trusted library allocation
page read and write
193D4223000
trusted library allocation
page read and write
290F000
stack
page read and write
6831000
heap
page read and write
5143000
direct allocation
page execute and read and write
1B117734000
trusted library allocation
page read and write
1B11BF7A000
trusted library allocation
page read and write
1B114DB5000
trusted library allocation
page read and write
67E1000
heap
page read and write
193D849B000
trusted library allocation
page read and write
5240000
direct allocation
page execute and read and write
193D848B000
trusted library allocation
page read and write
193CAC03000
trusted library allocation
page read and write
1B1162E7000
trusted library allocation
page read and write
1B11C2DA000
trusted library allocation
page read and write
1B11C2FB000
trusted library allocation
page read and write
24617364000
trusted library allocation
page read and write
193BC0E8000
heap
page read and write
193CA972000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
193C9E66000
trusted library allocation
page read and write
C94000
heap
page read and write
C94000
heap
page read and write
193BC0F0000
heap
page read and write
1C78E000
stack
page read and write
3A3F000
stack
page read and write
1B11759D000
trusted library allocation
page read and write
4991000
heap
page read and write
193BC0D4000
heap
page read and write
6831000
heap
page read and write
193CAFAE000
trusted library allocation
page read and write
1174000
heap
page read and write
1B106851000
trusted library allocation
page read and write
C94000
heap
page read and write
53C4000
heap
page read and write
193B9270000
heap
page readonly
193BC0EA000
heap
page read and write
193D101C000
trusted library allocation
page read and write
1B11BB35000
trusted library allocation
page read and write
1174000
heap
page read and write
FF4000
heap
page read and write
1B112CC2000
trusted library allocation
page read and write
193C9646000
heap
page read and write
44BF000
stack
page read and write
1B11C2B9000
trusted library allocation
page read and write
C94000
heap
page read and write
193D44C2000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B11D4CF000
trusted library allocation
page read and write
1B1169D8000
trusted library allocation
page read and write
193D3AE8000
trusted library allocation
page read and write
193CAF26000
trusted library allocation
page read and write
67E1000
heap
page read and write
193C9EFA000
trusted library allocation
page read and write
1B11193A000
heap
page read and write
193C5CB0000
trusted library allocation
page read and write
3D0000
unkown
page readonly
193BC0F9000
heap
page read and write
15A1A218000
trusted library allocation
page read and write
1B10692F000
trusted library allocation
page read and write
1B116BA7000
trusted library allocation
page read and write
793000
unkown
page execute and read and write
9EC2A41000
trusted library allocation
page execute read
193C9913000
trusted library allocation
page read and write
67E1000
heap
page read and write
193BC105000
heap
page read and write
193BC0E6000
heap
page read and write
1B11BF3B000
trusted library allocation
page read and write
193BC0BF000
heap
page read and write
1B1152B8000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
1F02000
heap
page read and write
1B115E0D000
trusted library allocation
page read and write
193BC0F4000
heap
page read and write
6831000
heap
page read and write
1B1177BE000
trusted library allocation
page read and write
254D000
heap
page execute and read and write
193CA603000
trusted library allocation
page read and write
193D44A8000
trusted library allocation
page read and write
6831000
heap
page read and write
22C9D000
heap
page read and write
24617380000
trusted library allocation
page read and write
193D44AB000
trusted library allocation
page read and write
615F000
stack
page read and write
1BBF000
stack
page read and write
C94000
heap
page read and write
1B106657000
trusted library allocation
page read and write
6831000
heap
page read and write
193C73F1000
trusted library allocation
page read and write
2416000
heap
page read and write
1B1127A8000
trusted library allocation
page read and write
193D8492000
trusted library allocation
page read and write
1B115D36000
trusted library allocation
page read and write
1174000
heap
page read and write
67E1000
heap
page read and write
67E1000
heap
page read and write
1E03000
heap
page read and write
1C6DF000
stack
page read and write
1B104580000
trusted library allocation
page read and write
6831000
heap
page read and write
1B11DF00000
trusted library allocation
page read and write
2564000
heap
page read and write
1B110EDF000
trusted library allocation
page read and write
4E30000
direct allocation
page read and write
193B92F0000
trusted library allocation
page execute read
1B1118EF000
heap
page read and write
1B1153E0000
trusted library section
page readonly
1B118B06000
trusted library allocation
page read and write
4701000
heap
page read and write
193BB5DA000
trusted library allocation
page read and write
193C9FFA000
trusted library allocation
page read and write
1B1047A0000
heap
page read and write
193D44FD000
trusted library allocation
page read and write
1B114D03000
trusted library allocation
page read and write
1B11E09C000
trusted library allocation
page read and write
193D84EB000
trusted library allocation
page read and write
322F000
stack
page read and write
193CAE59000
trusted library allocation
page read and write
28BD000
heap
page read and write
193CA79C000
trusted library allocation
page read and write
6831000
heap
page read and write
1174000
heap
page read and write
1294000
heap
page read and write
34F50000
heap
page read and write
52A44FF000
stack
page read and write
51D0000
direct allocation
page execute and read and write
6831000
heap
page read and write
1174000
heap
page read and write
193BC0EA000
heap
page read and write
193BC104000
heap
page read and write
193D47ED000
trusted library allocation
page read and write
1044000
heap
page read and write
1B107454000
heap
page read and write
6831000
heap
page read and write
136A000
heap
page read and write
46F0000
direct allocation
page read and write
6831000
heap
page read and write
8B000
unkown
page execute and read and write
1B11E0A8000
trusted library allocation
page read and write
22C73000
heap
page read and write
193BC0FA000
heap
page read and write
40FE000
stack
page read and write
4E40000
heap
page read and write
193D3813000
trusted library allocation
page read and write
330F000
stack
page read and write
193D123E000
trusted library allocation
page read and write
193C8C18000
trusted library allocation
page read and write
50E0000
heap
page read and write
2D8E000
stack
page read and write
1B1176A9000
trusted library allocation
page read and write
89D000
unkown
page execute and read and write
193BB70F000
heap
page read and write
193CAFCA000
trusted library allocation
page read and write
28D57000
heap
page read and write
193CA9F4000
trusted library allocation
page read and write
1B11C3A4000
trusted library allocation
page read and write
3F7E000
stack
page read and write
1B114F7D000
trusted library allocation
page read and write
347E000
stack
page read and write
356E000
stack
page read and write
193D7787000
trusted library allocation
page read and write
67E1000
heap
page read and write
193C9E00000
trusted library allocation
page read and write
1B114EC9000
trusted library allocation
page read and write
193C9600000
heap
page read and write
529AE0C000
stack
page read and write
67E1000
heap
page read and write
193C62A9000
trusted library allocation
page read and write
193CA97C000
trusted library allocation
page read and write
67E1000
heap
page read and write
2461735D000
trusted library allocation
page read and write
213C000
heap
page read and write
2920000
direct allocation
page read and write
529D23E000
stack
page read and write
1B111AA1000
trusted library allocation
page read and write
1B11E09E000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B1161DF000
trusted library allocation
page read and write
6831000
heap
page read and write
BE0000
direct allocation
page read and write
1C640000
heap
page read and write
193C696F000
trusted library allocation
page read and write
C94000
heap
page read and write
193D8DC3000
trusted library allocation
page read and write
193BC0DE000
heap
page read and write
1B115824000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
9A4000
heap
page read and write
1044000
heap
page read and write
193CAF7A000
trusted library allocation
page read and write
67DF000
stack
page read and write
1BEF000
stack
page read and write
113E33E000
stack
page read and write
193BC0D5000
heap
page read and write
193BC104000
heap
page read and write
6831000
heap
page read and write
1B114E91000
trusted library allocation
page read and write
C94000
heap
page read and write
3D0000
unkown
page read and write
1B11BF65000
trusted library allocation
page read and write
193D47AF000
trusted library allocation
page read and write
4701000
heap
page read and write
1B11C2E2000
trusted library allocation
page read and write
1B116B2D000
trusted library allocation
page read and write
193D3A61000
trusted library allocation
page read and write
4991000
heap
page read and write
BAF000
heap
page read and write
193C8C51000
trusted library allocation
page read and write
1B115724000
trusted library allocation
page read and write
193C5EBA000
trusted library allocation
page read and write
6831000
heap
page read and write
193D44FA000
trusted library allocation
page read and write
193BC0F4000
heap
page read and write
193BC0F9000
heap
page read and write
1B11C110000
trusted library allocation
page read and write
1B11BF7C000
trusted library allocation
page read and write
193D44B9000
trusted library allocation
page read and write
1B1074EA000
heap
page read and write
193CA776000
trusted library allocation
page read and write
193D10E9000
trusted library allocation
page read and write
193CA9D7000
trusted library allocation
page read and write
193C8DCB000
trusted library allocation
page read and write
193D84FC000
trusted library allocation
page read and write
1174000
heap
page read and write
8B5B000
stack
page read and write
1B107454000
heap
page read and write
4CDF000
stack
page read and write
1C3FF000
stack
page read and write
193BC0AB000
heap
page read and write
13D4000
heap
page read and write
5A0000
unkown
page read and write
1174000
heap
page read and write
6831000
heap
page read and write
1B11364D000
trusted library allocation
page read and write
193CA9FD000
trusted library allocation
page read and write
193D84F8000
trusted library allocation
page read and write
193D4424000
trusted library allocation
page read and write
1B1151FD000
trusted library allocation
page read and write
1B11C236000
trusted library allocation
page read and write
1B114E62000
trusted library allocation
page read and write
1B117603000
trusted library allocation
page read and write
4D50000
direct allocation
page execute and read and write
1110000
heap
page read and write
1B112ECA000
trusted library allocation
page read and write
1100000
direct allocation
page read and write
1B114E12000
trusted library allocation
page read and write
67E1000
heap
page read and write
193C6912000
trusted library allocation
page read and write
4701000
heap
page read and write
193D849D000
trusted library allocation
page read and write
114623E000
stack
page read and write
1B1136B3000
trusted library allocation
page read and write
193D723C000
trusted library allocation
page read and write
1B115E00000
trusted library allocation
page read and write
193BC0E8000
heap
page read and write
1B111575000
trusted library allocation
page read and write
1B1151F2000
trusted library allocation
page read and write
193CC0CB000
trusted library allocation
page read and write
193BC0F4000
heap
page read and write
193C9300000
trusted library allocation
page read and write
4701000
heap
page read and write
50B0000
direct allocation
page read and write
1174000
heap
page read and write
193CAF7A000
trusted library allocation
page read and write
193C5A90000
trusted library allocation
page read and write
1B11DA14000
trusted library allocation
page read and write
7F7000
unkown
page execute and read and write
193C9565000
trusted library allocation
page read and write
1174000
heap
page read and write
193BC0F5000
heap
page read and write
4701000
heap
page read and write
69C1000
heap
page read and write
6831000
heap
page read and write
C94000
heap
page read and write
193D846F000
trusted library allocation
page read and write
673F000
stack
page read and write
89000
unkown
page read and write
1B1127A8000
trusted library allocation
page read and write
6831000
heap
page read and write
193BC0CD000
heap
page read and write
193C6A70000
trusted library section
page readonly
20000
unkown
page readonly
193C6A10000
trusted library section
page read and write
6C94E000
unkown
page read and write
193D438F000
trusted library allocation
page read and write
1B11D623000
trusted library allocation
page read and write
1B106800000
trusted library allocation
page read and write
218C000
heap
page read and write
193C63CF000
trusted library allocation
page read and write
22C77000
heap
page read and write
427000
unkown
page write copy
4E30000
direct allocation
page read and write
193C5B3D000
trusted library allocation
page read and write
1B106630000
trusted library allocation
page read and write
1BE371B000
stack
page read and write
6831000
heap
page read and write
193BB5C6000
trusted library allocation
page read and write
193C6916000
trusted library allocation
page read and write
4701000
heap
page read and write
77C5FA04000
trusted library allocation
page read and write
193D84F1000
trusted library allocation
page read and write
193C5E7D000
trusted library allocation
page read and write
193C9E93000
trusted library allocation
page read and write
493F000
stack
page read and write
1B11C103000
trusted library allocation
page read and write
9E0000
heap
page read and write
6831000
heap
page read and write
193C5B45000
trusted library allocation
page read and write
193BC0F0000
heap
page read and write
193DA2DD000
trusted library allocation
page read and write
3A8F000
stack
page read and write
67E1000
heap
page read and write
1B1066CB000
trusted library allocation
page read and write
193C62C3000
trusted library allocation
page read and write
20000
unkown
page read and write
4E30000
direct allocation
page read and write
193CACC1000
trusted library allocation
page read and write
5050000
direct allocation
page read and write
193BB4ED000
trusted library allocation
page read and write
C94000
heap
page read and write
1B11C100000
trusted library allocation
page read and write
2D3E000
stack
page read and write
193D1032000
trusted library allocation
page read and write
67E1000
heap
page read and write
193C6EFE000
trusted library allocation
page read and write
193D47A9000
trusted library allocation
page read and write
67E1000
heap
page read and write
193BC0F2000
heap
page read and write
1B106740000
trusted library allocation
page read and write
4E30000
direct allocation
page read and write
1B114E98000
trusted library allocation
page read and write
193BC0E0000
heap
page read and write
193BC0EA000
heap
page read and write
347000
unkown
page execute and write copy
6831000
heap
page read and write
193CA82C000
trusted library allocation
page read and write
67E1000
heap
page read and write
114003F000
stack
page read and write
6831000
heap
page read and write
529C035000
stack
page read and write
629E000
stack
page read and write
193CB34E000
trusted library allocation
page read and write
1146BBE000
stack
page read and write
193BC0F4000
heap
page read and write
6831000
heap
page read and write
193BC104000
heap
page read and write
5460000
direct allocation
page execute and read and write
193C6185000
trusted library allocation
page read and write
22C7D000
heap
page read and write
52A4AF7000
stack
page read and write
193CA7A8000
trusted library allocation
page read and write
1B11C19E000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
193D7B3C000
trusted library allocation
page read and write
4E10000
direct allocation
page execute and read and write
1044000
heap
page read and write
1CAA0000
heap
page read and write
193D4495000
trusted library allocation
page read and write
A57000
unkown
page execute and read and write
1044000
heap
page read and write
193D8DF0000
trusted library allocation
page read and write
193C6409000
trusted library allocation
page read and write
1B11C38F000
trusted library allocation
page read and write
193C8DEB000
trusted library allocation
page read and write
1044000
heap
page read and write
193D848D000
trusted library allocation
page read and write
193BC0B0000
heap
page read and write
1B115300000
unclassified section
page read and write
1B1074EB000
heap
page read and write
1B11C222000
trusted library allocation
page read and write
6831000
heap
page read and write
193C5C0A000
trusted library allocation
page read and write
193CB3F7000
trusted library allocation
page read and write
193CA9E1000
trusted library allocation
page read and write
193CAFE6000
trusted library allocation
page read and write
1B11BFA1000
trusted library allocation
page read and write
C1B000
heap
page read and write
52A0E3B000
stack
page read and write
193C94EE000
trusted library allocation
page read and write
193BC0F2000
heap
page read and write
4701000
heap
page read and write
193CAF82000
trusted library allocation
page read and write
193D3AA9000
trusted library allocation
page read and write
1174000
heap
page read and write
4701000
heap
page read and write
4ACF000
stack
page read and write
193BB6FD000
heap
page read and write
1044000
heap
page read and write
1BE59FE000
unkown
page readonly
550F000
stack
page read and write
51E0000
direct allocation
page execute and read and write
193BC0AD000
heap
page read and write
193C988B000
trusted library allocation
page read and write
193BB3E3000
trusted library allocation
page read and write
1B1155FC000
trusted library allocation
page read and write
C94000
heap
page read and write
1410000
heap
page read and write
7D60000
heap
page read and write
193C5DFE000
trusted library allocation
page read and write
193CB043000
trusted library allocation
page read and write
193BB280000
trusted library section
page readonly
193C9C9D000
trusted library allocation
page read and write
67E1000
heap
page read and write
2E551AD00000
trusted library allocation
page read and write
2920000
direct allocation
page read and write
193CAAAE000
trusted library allocation
page read and write
6831000
heap
page read and write
1BE6A3E000
unkown
page readonly
193C8DEB000
trusted library allocation
page read and write
C94000
heap
page read and write
193C5E6A000
trusted library allocation
page read and write
193CAE6C000
trusted library allocation
page read and write
193BC0E8000
heap
page read and write
193BC0AF000
heap
page read and write
193BC0F9000
heap
page read and write
1174000
heap
page read and write
27F0000
heap
page read and write
6831000
heap
page read and write
193D10AA000
trusted library allocation
page read and write
1B11697F000
trusted library allocation
page read and write
193C9ADA000
trusted library allocation
page read and write
4991000
heap
page read and write
193CA9DA000
trusted library allocation
page read and write
193BC0B9000
heap
page read and write
1B110EA6000
trusted library allocation
page read and write
193B9400000
trusted library allocation
page read and write
193BB35F000
trusted library allocation
page read and write
40BE000
stack
page read and write
C94000
heap
page read and write
1174000
heap
page read and write
193D44FA000
trusted library allocation
page read and write
1174000
heap
page read and write
193CC244000
trusted library allocation
page read and write
1174000
heap
page read and write
FF4000
heap
page read and write
171F000
stack
page read and write
443F000
stack
page read and write
193BC0EF000
heap
page read and write
6831000
heap
page read and write
1B115A9B000
trusted library allocation
page read and write
193CAF88000
trusted library allocation
page read and write
193D3CA9000
trusted library allocation
page read and write
193BC0DD000
heap
page read and write
62C000
unkown
page execute and read and write
118E000
stack
page read and write
82000
unkown
page execute and read and write
193CA200000
trusted library allocation
page read and write
1B1074F0000
heap
page read and write
1C4FF000
stack
page read and write
193D12F2000
trusted library allocation
page read and write
193C9627000
heap
page read and write
67E1000
heap
page read and write
193C9EB5000
trusted library allocation
page read and write
4C4000
unkown
page execute and read and write
193D8473000
trusted library allocation
page read and write
6831000
heap
page read and write
136D000
heap
page read and write
193D849E000
trusted library allocation
page read and write
1174000
heap
page read and write
22C5B000
heap
page read and write
193D447A000
trusted library allocation
page read and write
1B1152CC000
trusted library allocation
page read and write
67E1000
heap
page read and write
52A143A000
stack
page read and write
193CA99C000
trusted library allocation
page read and write
2C4DF0F04000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
1044000
heap
page read and write
1B1074FB000
heap
page read and write
193CA990000
trusted library allocation
page read and write
193C63CF000
trusted library allocation
page read and write
193CAE8D000
trusted library allocation
page read and write
193D1276000
trusted library allocation
page read and write
1B115CE6000
trusted library allocation
page read and write
193D47EA000
trusted library allocation
page read and write
193C62C1000
trusted library allocation
page read and write
6831000
heap
page read and write
1B115200000
trusted library allocation
page read and write
2461732E000
trusted library allocation
page read and write
67E1000
heap
page read and write
3BBE000
stack
page read and write
4701000
heap
page read and write
193BC0F0000
heap
page read and write
BE0000
direct allocation
page read and write
6831000
heap
page read and write
193C8C0E000
trusted library allocation
page read and write
193BC0F0000
heap
page read and write
193D128D000
trusted library allocation
page read and write
1B11C2B1000
trusted library allocation
page read and write
193C91C3000
trusted library allocation
page read and write
193C9ABB000
trusted library allocation
page read and write
1174000
heap
page read and write
193C5C17000
trusted library allocation
page read and write
193CAFC3000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
193D84E5000
trusted library allocation
page read and write
1B111500000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
1B11E008000
trusted library allocation
page read and write
193BC0A8000
heap
page read and write
193CAFCA000
trusted library allocation
page read and write
6831000
heap
page read and write
1B116B45000
trusted library allocation
page read and write
193CB2FC000
trusted library allocation
page read and write
1B11C44C000
trusted library allocation
page read and write
193D3AE4000
trusted library allocation
page read and write
223B000
heap
page read and write
193C8C14000
trusted library allocation
page read and write
193B9250000
trusted library allocation
page read and write
193CAAA8000
trusted library allocation
page read and write
6831000
heap
page read and write
1B1074E3000
heap
page read and write
2EDF1000
heap
page read and write
67E1000
heap
page read and write
193CA9A5000
trusted library allocation
page read and write
193CAFC3000
trusted library allocation
page read and write
46AF000
stack
page read and write
1F5FEE30000
heap
page read and write
193C6525000
heap
page read and write
36CF000
stack
page read and write
67E1000
heap
page read and write
1B114FF5000
trusted library allocation
page read and write
193C5A00000
trusted library allocation
page read and write
193BB74F000
heap
page read and write
1B1074EC000
heap
page read and write
49F000
unkown
page execute and read and write
1B11C114000
trusted library allocation
page read and write
320E000
stack
page read and write
1B11C387000
trusted library allocation
page read and write
1B116B03000
trusted library allocation
page read and write
193BC0DD000
heap
page read and write
4991000
heap
page read and write
193CAEC3000
trusted library allocation
page read and write
193CAAB3000
trusted library allocation
page read and write
4741000
heap
page read and write
36BE000
stack
page read and write
1B112E7F000
trusted library allocation
page read and write
1B114E33000
trusted library allocation
page read and write
1B1074E5000
heap
page read and write
C94000
heap
page read and write
6831000
heap
page read and write
193D2A00000
trusted library allocation
page read and write
1B11181B000
heap
page read and write
5194000
direct allocation
page execute and read and write
1141AB3000
stack
page read and write
353F000
stack
page read and write
193D12FE000
trusted library allocation
page read and write
1B1152A4000
trusted library allocation
page read and write
128A000
heap
page read and write
193CAF2F000
trusted library allocation
page read and write
193D849B000
trusted library allocation
page read and write
193C5CAB000
trusted library allocation
page read and write
1B116BC8000
trusted library allocation
page read and write
193CA983000
trusted library allocation
page read and write
4C10000
direct allocation
page read and write
1B111826000
heap
page read and write
193BC0AF000
heap
page read and write
193C7A5B000
trusted library allocation
page read and write
193BC0F0000
heap
page read and write
1B116203000
trusted library allocation
page read and write
15A1A096000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
6831000
heap
page read and write
193C8C3D000
trusted library allocation
page read and write
8B8000
unkown
page execute and write copy
193CAFE6000
trusted library allocation
page read and write
193BC0AE000
heap
page read and write
1F72000
heap
page read and write
1B11C2E4000
trusted library allocation
page read and write
560000
unkown
page readonly
193BC0B6000
heap
page read and write
6831000
heap
page read and write
2F7F000
stack
page read and write
1B11578D000
trusted library allocation
page read and write
400000
unkown
page readonly
193D4430000
trusted library allocation
page read and write
1174000
heap
page read and write
193D3AE4000
trusted library allocation
page read and write
193CA627000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
40FF000
stack
page read and write
193C5EE2000
trusted library allocation
page read and write
1B1068C9000
trusted library allocation
page read and write
6A1B000
stack
page read and write
5240000
direct allocation
page execute and read and write
193B9447000
trusted library allocation
page read and write
1B111BC2000
trusted library allocation
page read and write
6E1000
unkown
page execute and read and write
38AF000
stack
page read and write
193D10DB000
trusted library allocation
page read and write
193CAFC3000
trusted library allocation
page read and write
47B1000
heap
page read and write
1B107465000
heap
page read and write
1B11B700000
trusted library allocation
page read and write
5270000
direct allocation
page execute and read and write
1B1074E4000
heap
page read and write
193C6F00000
trusted library allocation
page read and write
193C5E10000
trusted library allocation
page read and write
1B111930000
heap
page read and write
193D47DC000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
1B116310000
trusted library allocation
page read and write
1B11A114000
trusted library allocation
page read and write
193BC0DD000
heap
page read and write
193C9816000
trusted library allocation
page read and write
246173B2000
trusted library allocation
page read and write
193CA9C9000
trusted library allocation
page read and write
1B104800000
trusted library allocation
page read and write
193BC0B9000
heap
page read and write
1C7DE000
stack
page read and write
22C7C000
heap
page read and write
1C8DD000
stack
page read and write
9A4000
heap
page read and write
6831000
heap
page read and write
1B1068B6000
trusted library allocation
page read and write
1B118B0A000
trusted library allocation
page read and write
193CAFCA000
trusted library allocation
page read and write
193C6F0A000
trusted library allocation
page read and write
193C5BDB000
trusted library allocation
page read and write
6E9000
unkown
page execute and read and write
193D4381000
trusted library allocation
page read and write
22C6A000
heap
page read and write
22C69000
heap
page read and write
6831000
heap
page read and write
15A1A081000
trusted library allocation
page read and write
193D3AF0000
trusted library allocation
page read and write
1144000
heap
page read and write
1B104803000
trusted library allocation
page read and write
193BC0CE000
heap
page read and write
1B11E003000
trusted library allocation
page read and write
67E1000
heap
page read and write
193CAF2C000
trusted library allocation
page read and write
193D109E000
trusted library allocation
page read and write
193C6E26000
trusted library allocation
page read and write
6831000
heap
page read and write
B50000
heap
page read and write
113E27E000
stack
page read and write
193D47D0000
trusted library allocation
page read and write
5490000
direct allocation
page execute and read and write
193CA7AD000
trusted library allocation
page read and write
193D43C5000
trusted library allocation
page read and write
135A000
heap
page read and write
1B1066D5000
trusted library allocation
page read and write
67E1000
heap
page read and write
2920000
direct allocation
page read and write
193CAEEB000
trusted library allocation
page read and write
193BB5C6000
trusted library allocation
page read and write
C94000
heap
page read and write
22C85000
heap
page read and write
1044000
heap
page read and write
22C85000
heap
page read and write
193BC0EB000
heap
page read and write
3D3E000
stack
page read and write
4701000
heap
page read and write
21000
unkown
page execute and write copy
432E000
stack
page read and write
15A19BF0000
unclassified section
page readonly
C94000
heap
page read and write
1B11DF49000
trusted library allocation
page read and write
193C6EFE000
trusted library allocation
page read and write
2D8F000
stack
page read and write
193D8548000
trusted library allocation
page read and write
4991000
heap
page read and write
193D12AC000
trusted library allocation
page read and write
4D50000
direct allocation
page execute and read and write
6831000
heap
page read and write
193C9FBE000
trusted library allocation
page read and write
1B114EF1000
trusted library allocation
page read and write
193BC0DE000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
193BC0FA000
heap
page read and write
6831000
heap
page read and write
67E1000
heap
page read and write
22C66000
heap
page read and write
193CA998000
trusted library allocation
page read and write
193BB315000
trusted library allocation
page read and write
193CA95F000
trusted library allocation
page read and write
4701000
heap
page read and write
52A3478000
stack
page read and write
20AE000
heap
page read and write
113D5FE000
stack
page read and write
2E7EEB51E000
trusted library allocation
page read and write
193D47DC000
trusted library allocation
page read and write
193BC0F9000
heap
page read and write
193C9EB6000
trusted library allocation
page read and write
193D8493000
trusted library allocation
page read and write
1F44000
heap
page read and write
193BC0CD000
heap
page read and write
67E1000
heap
page read and write
67E1000
heap
page read and write
1044000
heap
page read and write
193CA400000
trusted library allocation
page read and write
1B116AC4000
trusted library allocation
page read and write
826C000
stack
page read and write
1B110EC6000
trusted library allocation
page read and write
67E1000
heap
page read and write
193D8DF7000
trusted library allocation
page read and write
193C95D3000
trusted library allocation
page read and write
193C9612000
heap
page read and write
4701000
heap
page read and write
193C5E13000
trusted library allocation
page read and write
B5E000
heap
page read and write
67E1000
heap
page read and write
C94000
heap
page read and write
193D44A3000
trusted library allocation
page read and write
1B11151A000
trusted library allocation
page read and write
397F000
stack
page read and write
6831000
heap
page read and write
4991000
heap
page read and write
193D4417000
trusted library allocation
page read and write
4991000
heap
page read and write
67E1000
heap
page read and write
C94000
heap
page read and write
1B112B3F000
trusted library allocation
page read and write
1B112C98000
trusted library allocation
page read and write
193D47D0000
trusted library allocation
page read and write
193D8130000
trusted library allocation
page read and write
1B11BBB7000
trusted library allocation
page read and write
193C68BE000
trusted library allocation
page read and write
1B110E98000
trusted library allocation
page read and write
193BB4A6000
trusted library allocation
page read and write
193CA9F9000
trusted library allocation
page read and write
193C908E000
trusted library allocation
page read and write
6831000
heap
page read and write
193D44DF000
trusted library allocation
page read and write
193D3AA9000
trusted library allocation
page read and write
1B1074F1000
heap
page read and write
32FF000
stack
page read and write
193CAEEB000
trusted library allocation
page read and write
12D1000
heap
page read and write
4701000
heap
page read and write
193C6EEB000
trusted library allocation
page read and write
1B1152BC000
trusted library allocation
page read and write
1B1177F1000
trusted library allocation
page read and write
193D9600000
trusted library allocation
page read and write
C94000
heap
page read and write
1B116A71000
trusted library allocation
page read and write
6831000
heap
page read and write
193D848D000
trusted library allocation
page read and write
4991000
heap
page read and write
1B11C006000
trusted library allocation
page read and write
193D2E77000
trusted library allocation
page read and write
2617000
heap
page read and write
193D4441000
trusted library allocation
page read and write
42EE000
stack
page read and write
1B11C1DB000
trusted library allocation
page read and write
6831000
heap
page read and write
193D47D0000
trusted library allocation
page read and write
5480000
direct allocation
page execute and read and write
193BC104000
heap
page read and write
193BC0F5000
heap
page read and write
6800000
heap
page read and write
193BC0FA000
heap
page read and write
193D3AD5000
trusted library allocation
page read and write
193D1232000
trusted library allocation
page read and write
1174000
heap
page read and write
193CA30C000
trusted library allocation
page read and write
1B114EC7000
trusted library allocation
page read and write
1B10750E000
heap
page read and write
1B11E062000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B115CFA000
trusted library allocation
page read and write
3FBE000
stack
page read and write
193D77C7000
trusted library allocation
page read and write
193D8480000
trusted library allocation
page read and write
193BC0B9000
heap
page read and write
1140000
heap
page read and write
1B111913000
heap
page read and write
193CAF91000
trusted library allocation
page read and write
193C6A60000
trusted library section
page readonly
53B2000
heap
page read and write
1B112703000
trusted library allocation
page read and write
28D18000
heap
page read and write
C94000
heap
page read and write
193CA778000
trusted library allocation
page read and write
4A54000
heap
page read and write
193C61A7000
trusted library allocation
page read and write
33EE000
stack
page read and write
193C5E17000
trusted library allocation
page read and write
193C7AE2000
trusted library allocation
page read and write
193CAE50000
trusted library allocation
page read and write
1B11C36E000
trusted library allocation
page read and write
193D35AB000
trusted library allocation
page read and write
193C9A54000
trusted library allocation
page read and write
193CA67B000
trusted library allocation
page read and write
52A2B3C000
stack
page read and write
116A10F04000
trusted library allocation
page read and write
1B11D61B000
trusted library allocation
page read and write
193D3ADF000
trusted library allocation
page read and write
1100000
direct allocation
page read and write
15A1A061000
trusted library allocation
page read and write
6831000
heap
page read and write
22C75000
heap
page read and write
193C5AB3000
trusted library allocation
page read and write
4BC0000
heap
page read and write
1B117528000
trusted library allocation
page read and write
1B1118DB000
heap
page read and write
C94000
heap
page read and write
193C8E3F000
trusted library allocation
page read and write
1B118B26000
trusted library allocation
page read and write
52A1A37000
stack
page read and write
193BC0A9000
heap
page read and write
193C9A9F000
trusted library allocation
page read and write
193BC0D4000
heap
page read and write
193C9D72000
trusted library allocation
page read and write
1E65000
heap
page read and write
1B1162D2000
trusted library allocation
page read and write
1B111B54000
trusted library allocation
page read and write
193CAAEF000
trusted library allocation
page read and write
193BC0D6000
heap
page read and write
67E1000
heap
page read and write
193D3AFE000
trusted library allocation
page read and write
2580000
heap
page read and write
193C8C0B000
trusted library allocation
page read and write
1B111ABA000
trusted library allocation
page read and write
6831000
heap
page read and write
1044000
heap
page read and write
193C7300000
trusted library allocation
page read and write
246174A6000
heap
page read and write
622000
unkown
page execute and read and write
6831000
heap
page read and write
193D107D000
trusted library allocation
page read and write
4D40000
direct allocation
page execute and read and write
4E41000
heap
page read and write
4F80000
direct allocation
page execute and read and write
193D849B000
trusted library allocation
page read and write
1B111003000
trusted library allocation
page read and write
193D848B000
trusted library allocation
page read and write
1B1074EA000
heap
page read and write
6831000
heap
page read and write
193CA798000
trusted library allocation
page read and write
1B11C38D000
trusted library allocation
page read and write
22C52000
heap
page read and write
1294000
heap
page read and write
193C8D40000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B11E0A8000
trusted library allocation
page read and write
6831000
heap
page read and write
1B11D91B000
trusted library allocation
page read and write
4E13000
heap
page read and write
1B1074EB000
heap
page read and write
4D20000
direct allocation
page execute and read and write
52A333F000
stack
page read and write
193CAFC3000
trusted library allocation
page read and write
1B1155BE000
trusted library allocation
page read and write
67E1000
heap
page read and write
193B91F9000
heap
page read and write
1B11C3B4000
trusted library allocation
page read and write
11416B5000
stack
page read and write
4991000
heap
page read and write
193CAFBD000
trusted library allocation
page read and write
67E1000
heap
page read and write
5500000
direct allocation
page execute and read and write
193C62FC000
trusted library allocation
page read and write
67E1000
heap
page read and write
193D44C3000
trusted library allocation
page read and write
4C31000
direct allocation
page read and write
193D47ED000
trusted library allocation
page read and write
1B11582A000
trusted library allocation
page read and write
52E0000
direct allocation
page execute and read and write
193CA983000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
67E1000
heap
page read and write
1B10683D000
trusted library allocation
page read and write
1B11157D000
trusted library allocation
page read and write
193BC0DD000
heap
page read and write
193CA089000
trusted library allocation
page read and write
4FA0000
direct allocation
page execute and read and write
4E00000
direct allocation
page execute and read and write
1B11552E000
trusted library allocation
page read and write
193CAC8B000
trusted library allocation
page read and write
1B114DC5000
trusted library allocation
page read and write
193C70E1000
trusted library allocation
page read and write
193C6873000
trusted library allocation
page read and write
63E000
unkown
page execute and read and write
1175000
heap
page read and write
1B1074EA000
heap
page read and write
193C6387000
trusted library allocation
page read and write
1B112D03000
trusted library allocation
page read and write
1B11BF2C000
trusted library allocation
page read and write
193CA93C000
trusted library allocation
page read and write
193B946B000
trusted library allocation
page read and write
114563D000
stack
page read and write
433E000
stack
page read and write
6831000
heap
page read and write
2ED60000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
4BDB000
stack
page read and write
193D3A94000
trusted library allocation
page read and write
193BC0E8000
heap
page read and write
326F000
stack
page read and write
C94000
heap
page read and write
193C6299000
trusted library allocation
page read and write
529BC3E000
stack
page read and write
193D449F000
trusted library allocation
page read and write
1B11E0F9000
trusted library allocation
page read and write
193D84A4000
trusted library allocation
page read and write
193CA03A000
trusted library allocation
page read and write
193D4381000
trusted library allocation
page read and write
193BB303000
trusted library allocation
page read and write
5F50000
heap
page read and write
193BC0D4000
heap
page read and write
193CA700000
trusted library allocation
page read and write
1B115A1A000
trusted library allocation
page read and write
4E50000
heap
page read and write
193C5E26000
trusted library allocation
page read and write
2378000
heap
page read and write
1174000
heap
page read and write
193D44CD000
trusted library allocation
page read and write
C94000
heap
page read and write
193C9559000
trusted library allocation
page read and write
1B11361B000
trusted library allocation
page read and write
193D47D7000
trusted library allocation
page read and write
4BC1000
heap
page read and write
2BFE000
stack
page read and write
33FF000
stack
page read and write
2645000
heap
page read and write
193D444B000
trusted library allocation
page read and write
193BC0F2000
heap
page read and write
1B1069A4000
trusted library allocation
page read and write
1C8E0000
heap
page read and write
5250000
direct allocation
page execute and read and write
193CA003000
trusted library allocation
page read and write
193CA78D000
trusted library allocation
page read and write
193D777B000
trusted library allocation
page read and write
193C6CAB000
trusted library allocation
page read and write
193BC0D0000
heap
page read and write
6831000
heap
page read and write
1174000
heap
page read and write
1B11A612000
trusted library allocation
page read and write
51A0000
direct allocation
page execute and read and write
193C964B000
heap
page read and write
1B117600000
trusted library allocation
page read and write
1B11D438000
trusted library allocation
page read and write
38EF000
stack
page read and write
193C7303000
trusted library allocation
page read and write
193C904E000
trusted library allocation
page read and write
1B106240000
trusted library section
page readonly
193CA98D000
trusted library allocation
page read and write
28D1E000
heap
page read and write
193CA968000
trusted library allocation
page read and write
193D8482000
trusted library allocation
page read and write
1B11BB3C000
trusted library allocation
page read and write
193C6855000
trusted library allocation
page read and write
2A7F000
stack
page read and write
47AF000
stack
page read and write
6831000
heap
page read and write
193D47D9000
trusted library allocation
page read and write
193C9878000
trusted library allocation
page read and write
193D84F8000
trusted library allocation
page read and write
193CAAC5000
trusted library allocation
page read and write
3CBF000
stack
page read and write
1174000
heap
page read and write
193BB443000
trusted library allocation
page read and write
1CA3E000
stack
page read and write
67E1000
heap
page read and write
52D0000
direct allocation
page read and write
1B115DD3000
trusted library allocation
page read and write
1EC5000
heap
page read and write
67E1000
heap
page read and write
4991000
heap
page read and write
1BE61FE000
stack
page read and write
6831000
heap
page read and write
193C7509000
trusted library allocation
page read and write
193CAF68000
trusted library allocation
page read and write
2461742F000
unclassified section
page read and write
3FFE000
stack
page read and write
5299FFE000
stack
page read and write
6831000
heap
page read and write
456E000
stack
page read and write
6A00000
heap
page read and write
193D84F6000
trusted library allocation
page read and write
193BB5A2000
trusted library allocation
page read and write
474E000
stack
page read and write
1B1074EA000
heap
page read and write
193D84E5000
trusted library allocation
page read and write
193D4495000
trusted library allocation
page read and write
193CAA65000
trusted library allocation
page read and write
253D000
heap
page read and write
78FE000
heap
page read and write
1174000
heap
page read and write
1B114EDE000
trusted library allocation
page read and write
193D44FD000
trusted library allocation
page read and write
1B11762A000
trusted library allocation
page read and write
193D3AFE000
trusted library allocation
page read and write
193BC0F4000
heap
page read and write
67E1000
heap
page read and write
8B9000
unkown
page execute and write copy
193C5B85000
trusted library allocation
page read and write
193D380A000
trusted library allocation
page read and write
1174000
heap
page read and write
283E000
stack
page read and write
1174000
heap
page read and write
193BC0FE000
heap
page read and write
193C691A000
trusted library allocation
page read and write
1B112E37000
trusted library allocation
page read and write
8A2000
unkown
page execute and read and write
1B115600000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
67E1000
heap
page read and write
62C000
unkown
page execute and read and write
9A4000
heap
page read and write
1B1066BB000
trusted library allocation
page read and write
193D10A5000
trusted library allocation
page read and write
6831000
heap
page read and write
52A383C000
stack
page read and write
193CA96E000
trusted library allocation
page read and write
193D47E8000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
1B11C368000
trusted library allocation
page read and write
1174000
heap
page read and write
193BC0E8000
heap
page read and write
2DFE000
stack
page read and write
193C9A0A000
trusted library allocation
page read and write
1174000
heap
page read and write
1B112B26000
trusted library allocation
page read and write
C94000
heap
page read and write
67E0000
heap
page read and write
E22000
unkown
page execute and write copy
4701000
heap
page read and write
193D84EB000
trusted library allocation
page read and write
1C79E000
stack
page read and write
6831000
heap
page read and write
193D479F000
trusted library allocation
page read and write
42EF000
stack
page read and write
2E58FFF000
stack
page read and write
193D4365000
trusted library allocation
page read and write
193D845C000
trusted library allocation
page read and write
1B111B48000
trusted library allocation
page read and write
193D44D0000
trusted library allocation
page read and write
193CA966000
trusted library allocation
page read and write
193D84F8000
trusted library allocation
page read and write
193CAADA000
trusted library allocation
page read and write
67E1000
heap
page read and write
22C67000
heap
page read and write
1B117738000
trusted library allocation
page read and write
4D80000
direct allocation
page execute and read and write
C94000
heap
page read and write
193D3AF5000
trusted library allocation
page read and write
5450000
direct allocation
page execute and read and write
1B11E0F2000
trusted library allocation
page read and write
380F000
stack
page read and write
1B1110A7000
trusted library allocation
page read and write
4A90000
direct allocation
page read and write
193C6EDC000
trusted library allocation
page read and write
193D4471000
trusted library allocation
page read and write
193BC0A8000
heap
page read and write
193D3A7F000
trusted library allocation
page read and write
367F000
stack
page read and write
193BC0F0000
heap
page read and write
193BC0D4000
heap
page read and write
193CAF88000
trusted library allocation
page read and write
193BB5A2000
trusted library allocation
page read and write
193D47FC000
trusted library allocation
page read and write
18A47970000
heap
page read and write
193CAA8E000
trusted library allocation
page read and write
15A19D50000
heap
page read and write
193D84FC000
trusted library allocation
page read and write
193D84E5000
trusted library allocation
page read and write
193D10E1000
trusted library allocation
page read and write
1B112EA1000
trusted library allocation
page read and write
529BD7C000
stack
page read and write
1B114EB1000
trusted library allocation
page read and write
1B11BBB2000
trusted library allocation
page read and write
6831000
heap
page read and write
1322000
heap
page read and write
193C5C0F000
trusted library allocation
page read and write
1B107511000
heap
page read and write
1044000
heap
page read and write
15A19C4A000
heap
page read and write
52B0000
direct allocation
page execute and read and write
4C30000
direct allocation
page execute and read and write
1B11E0F7000
trusted library allocation
page read and write
4601000
heap
page read and write
193CAFA8000
trusted library allocation
page read and write
1B1045F0000
trusted library allocation
page read and write
193CAF7C000
trusted library allocation
page read and write
1174000
heap
page read and write
1B1074EB000
heap
page read and write
61EB7000
direct allocation
page readonly
1B10689A000
trusted library allocation
page read and write
26B0000
direct allocation
page execute and read and write
67E1000
heap
page read and write
2E37000
heap
page read and write
348E000
stack
page read and write
193D3A89000
trusted library allocation
page read and write
6831000
heap
page read and write
193D4449000
trusted library allocation
page read and write
1B112B44000
trusted library allocation
page read and write
6831000
heap
page read and write
529BDBC000
stack
page read and write
193C9804000
trusted library allocation
page read and write
18A47950000
heap
page read and write
1B11689F000
trusted library allocation
page read and write
509E000
stack
page read and write
193D12F2000
trusted library allocation
page read and write
193C9163000
trusted library allocation
page read and write
193CB000000
trusted library allocation
page read and write
193CA972000
trusted library allocation
page read and write
193CC031000
trusted library allocation
page read and write
193D84EB000
trusted library allocation
page read and write
1B112C08000
trusted library allocation
page read and write
193BC0B9000
heap
page read and write
366E000
stack
page read and write
67E1000
heap
page read and write
193BC0AF000
heap
page read and write
1B110E81000
trusted library allocation
page read and write
18A47990000
heap
page read and write
30CE000
stack
page read and write
24617060000
heap
page read and write
193D8573000
trusted library allocation
page read and write
193CA403000
trusted library allocation
page read and write
51E0000
direct allocation
page execute and read and write
194000
stack
page read and write
1174000
heap
page read and write
193C6A20000
trusted library section
page read and write
1B116409000
trusted library allocation
page read and write
193D4357000
trusted library allocation
page read and write
3D0F000
stack
page read and write
2E2E000
stack
page read and write
193D108C000
trusted library allocation
page read and write
193BC0BF000
heap
page read and write
22C7D000
heap
page read and write
193C9A16000
trusted library allocation
page read and write
1044000
heap
page read and write
63E000
unkown
page execute and read and write
1B106625000
trusted library allocation
page read and write
67E1000
heap
page read and write
193BC0C3000
heap
page read and write
67E1000
heap
page read and write
67E1000
heap
page read and write
193BC0FA000
heap
page read and write
6F7000
unkown
page execute and write copy
56CD000
stack
page read and write
67E1000
heap
page read and write
193C9ACA000
trusted library allocation
page read and write
193D4236000
trusted library allocation
page read and write
4D50000
direct allocation
page execute and read and write
6831000
heap
page read and write
67E1000
heap
page read and write
24617310000
trusted library allocation
page read and write
1B1069DA000
trusted library allocation
page read and write
4E53000
heap
page read and write
193D8482000
trusted library allocation
page read and write
22C77000
heap
page read and write
1322000
heap
page read and write
8D8C000
stack
page read and write
1B11524E000
trusted library allocation
page read and write
1B112C74000
trusted library allocation
page read and write
1B115289000
trusted library allocation
page read and write
3E3E000
stack
page read and write
193C7100000
trusted library allocation
page read and write
3ABF000
stack
page read and write
253E000
heap
page read and write
193BC0FE000
heap
page read and write
4DB0000
trusted library allocation
page read and write
193C9D43000
trusted library allocation
page read and write
12CB000
heap
page read and write
193BC0CD000
heap
page read and write
1B114F65000
trusted library allocation
page read and write
193CA0D9000
trusted library allocation
page read and write
193D43F7000
trusted library allocation
page read and write
6831000
heap
page read and write
1174000
heap
page read and write
193D2A30000
trusted library allocation
page read and write
529EA3E000
stack
page read and write
1B113680000
trusted library allocation
page read and write
193BC0CA000
heap
page read and write
193CB243000
trusted library allocation
page read and write
4B0E000
stack
page read and write
1B112EA1000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
FFA00000
direct allocation
page execute and read and write
193C9C97000
trusted library allocation
page read and write
3E9C36B3A000
trusted library allocation
page read and write
1B10625F000
unclassified section
page read and write
1174000
heap
page read and write
3CFE000
stack
page read and write
529BDFE000
stack
page read and write
257E000
stack
page read and write
193BB58A000
trusted library allocation
page read and write
6831000
heap
page read and write
457F000
stack
page read and write
FF4000
heap
page read and write
C94000
heap
page read and write
6831000
heap
page read and write
2E7E000
stack
page read and write
114143E000
stack
page read and write
61ED3000
direct allocation
page read and write
414F000
stack
page read and write
1B11BF61000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B112E5F000
trusted library allocation
page read and write
1B11BB18000
trusted library allocation
page read and write
6831000
heap
page read and write
131E000
heap
page read and write
1B1074E3000
heap
page read and write
1D64000
heap
page read and write
193BADB0000
trusted library section
page read and write
4D20000
direct allocation
page execute and read and write
1B1074EB000
heap
page read and write
1B10751C000
heap
page read and write
246173C8000
trusted library allocation
page read and write
193CA73D000
trusted library allocation
page read and write
193BB5B0000
trusted library allocation
page read and write
1B11653C000
trusted library allocation
page read and write
4601000
heap
page read and write
193BC107000
heap
page read and write
193C5E26000
trusted library allocation
page read and write
193DA2A3000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
6831000
heap
page read and write
1B11BFBC000
trusted library allocation
page read and write
1BE41D8000
stack
page read and write
1B115D13000
trusted library allocation
page read and write
193C6365000
trusted library allocation
page read and write
625F000
stack
page read and write
193D47A9000
trusted library allocation
page read and write
193D4393000
trusted library allocation
page read and write
24617344000
trusted library allocation
page read and write
5220000
direct allocation
page execute and read and write
193D8492000
trusted library allocation
page read and write
193DA299000
trusted library allocation
page read and write
193D127C000
trusted library allocation
page read and write
1174000
heap
page read and write
193BC0AE000
heap
page read and write
193BC0F2000
heap
page read and write
3B2F000
stack
page read and write
6831000
heap
page read and write
1B116974000
trusted library allocation
page read and write
52A343B000
stack
page read and write
BE0000
direct allocation
page read and write
1B115700000
trusted library allocation
page read and write
6831000
heap
page read and write
193D3AAD000
trusted library allocation
page read and write
52A34BC000
stack
page read and write
193BB3EA000
trusted library allocation
page read and write
1B107486000
heap
page read and write
609000
unkown
page write copy
193D100F000
trusted library allocation
page read and write
193D85DD000
trusted library allocation
page read and write
193D849D000
trusted library allocation
page read and write
193C90B2000
trusted library allocation
page read and write
193D3AF0000
trusted library allocation
page read and write
4DC0000
direct allocation
page execute and read and write
193BC104000
heap
page read and write
9A4000
heap
page read and write
1B11C4BF000
trusted library allocation
page read and write
193CA5ED000
trusted library allocation
page read and write
193BC0E0000
heap
page read and write
2E7E000
stack
page read and write
52A353E000
stack
page read and write
193C8D41000
trusted library allocation
page read and write
1E67000
heap
page read and write
193D7B32000
trusted library allocation
page read and write
193BC0CD000
heap
page read and write
193D4236000
trusted library allocation
page read and write
48B0000
trusted library allocation
page read and write
1B113698000
trusted library allocation
page read and write
193C9085000
trusted library allocation
page read and write
1B111000000
trusted library allocation
page read and write
1B113B03000
trusted library allocation
page read and write
1B106842000
trusted library allocation
page read and write
193BC0CD000
heap
page read and write
193BC0F0000
heap
page read and write
193BC0FE000
heap
page read and write
50B0000
direct allocation
page read and write
193BC0F0000
heap
page read and write
67E1000
heap
page read and write
1B115D31000
trusted library allocation
page read and write
1B1074F1000
heap
page read and write
67E1000
heap
page read and write
1146ABC000
stack
page read and write
8FAEFFE000
stack
page read and write
67E1000
heap
page read and write
529AC7A000
stack
page read and write
193CAE54000
trusted library allocation
page read and write
193CAF03000
trusted library allocation
page read and write
590C000
stack
page read and write
193C5C8F000
trusted library allocation
page read and write
193BC0FC000
heap
page read and write
47B1000
heap
page read and write
622000
unkown
page execute and read and write
1044000
heap
page read and write
193CC040000
trusted library allocation
page read and write
193D47FC000
trusted library allocation
page read and write
28D41000
heap
page read and write
13D4000
heap
page read and write
21F000
unkown
page execute and read and write
193CABEE000
trusted library allocation
page read and write
193CB3C3000
trusted library allocation
page read and write
15A19C77000
heap
page read and write
22C77000
heap
page read and write
1B11BF20000
trusted library allocation
page read and write
193C90D9000
trusted library allocation
page read and write
193D848D000
trusted library allocation
page read and write
193D125E000
trusted library allocation
page read and write
6831000
heap
page read and write
193CA976000
trusted library allocation
page read and write
DCE000
stack
page read and write
193D7B36000
trusted library allocation
page read and write
4C10000
direct allocation
page read and write
60B000
unkown
page execute and read and write
1B1175AC000
trusted library allocation
page read and write
193BB547000
trusted library allocation
page read and write
435F000
stack
page read and write
1B1118FD000
heap
page read and write
1B116B32000
trusted library allocation
page read and write
6831000
heap
page read and write
193BC0EA000
heap
page read and write
193D3AFA000
trusted library allocation
page read and write
193C9500000
trusted library allocation
page read and write
193D1269000
trusted library allocation
page read and write
193D8DE4000
trusted library allocation
page read and write
193BC0D4000
heap
page read and write
1B116803000
trusted library allocation
page read and write
65F0000
heap
page read and write
5460000
direct allocation
page execute and read and write
6831000
heap
page read and write
193D437F000
trusted library allocation
page read and write
89F000
unkown
page execute and write copy
5154000
direct allocation
page execute and read and write
4A90000
direct allocation
page read and write
67E1000
heap
page read and write
1B1074EA000
heap
page read and write
41EE000
stack
page read and write
193D8492000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
1B104470000
unclassified section
page readonly
193BB590000
trusted library allocation
page read and write
6831000
heap
page read and write
193CAA4B000
trusted library allocation
page read and write
13FE000
heap
page read and write
1B1155B9000
trusted library allocation
page read and write
6C94F000
unkown
page write copy
193C9484000
trusted library allocation
page read and write
1B114DDC000
trusted library allocation
page read and write
1B107465000
heap
page read and write
1E1C000
heap
page read and write
1B106605000
trusted library allocation
page read and write
2F8F000
stack
page read and write
1B314C70000
trusted library section
page readonly
2461737D000
trusted library allocation
page read and write
1B106803000
trusted library allocation
page read and write
6831000
heap
page read and write
1B115302000
unclassified section
page read and write
1B114EF0000
trusted library allocation
page read and write
193BB354000
trusted library allocation
page read and write
1B115BA1000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
193CA627000
trusted library allocation
page read and write
6831000
heap
page read and write
193B91C0000
heap
page read and write
193D8488000
trusted library allocation
page read and write
1174000
heap
page read and write
6A50000
heap
page read and write
46F0000
direct allocation
page read and write
193D7B15000
trusted library allocation
page read and write
193C61F0000
trusted library allocation
page read and write
193CB2C3000
trusted library allocation
page read and write
1B11C38D000
trusted library allocation
page read and write
1B114F73000
trusted library allocation
page read and write
1174000
heap
page read and write
193D849B000
trusted library allocation
page read and write
1146B3D000
stack
page read and write
3F3F000
stack
page read and write
6831000
heap
page read and write
2E77000
heap
page read and write
193D44D1000
trusted library allocation
page read and write
1B114EC9000
trusted library allocation
page read and write
193BC0DE000
heap
page read and write
193D47D7000
trusted library allocation
page read and write
337E000
stack
page read and write
193BC0F0000
heap
page read and write
193C8B70000
trusted library section
page readonly
6B5E000
stack
page read and write
1B11751E000
trusted library allocation
page read and write
193D3A26000
trusted library allocation
page read and write
193BC108000
heap
page read and write
193BC0F9000
heap
page read and write
1B11522C000
trusted library allocation
page read and write
193D44C9000
trusted library allocation
page read and write
6831000
heap
page read and write
193CAB3E000
trusted library allocation
page read and write
1174000
heap
page read and write
193CA9FD000
trusted library allocation
page read and write
67E1000
heap
page read and write
193D3A41000
trusted library allocation
page read and write
193CA7B8000
trusted library allocation
page read and write
596D000
stack
page read and write
113F83F000
stack
page read and write
1B115597000
trusted library allocation
page read and write
193BC0F2000
heap
page read and write
1B110F4D000
trusted library allocation
page read and write
67E1000
heap
page read and write
67E1000
heap
page read and write
67E1000
heap
page read and write
193CA6F8000
trusted library allocation
page read and write
456E000
stack
page read and write
1B116ABA000
trusted library allocation
page read and write
193BC0E5000
heap
page read and write
1B11579D000
trusted library allocation
page read and write
6831000
heap
page read and write
193CAA7A000
trusted library allocation
page read and write
1B111575000
trusted library allocation
page read and write
193BB59B000
trusted library allocation
page read and write
193D9800000
trusted library allocation
page read and write
1B104795000
heap
page read and write
1B107502000
heap
page read and write
193CA9E4000
trusted library allocation
page read and write
67E1000
heap
page read and write
193D44FA000
trusted library allocation
page read and write
193CA7C3000
trusted library allocation
page read and write
FF4000
heap
page read and write
193D848B000
trusted library allocation
page read and write
193DA2E4000
trusted library allocation
page read and write
1B11187B000
heap
page read and write
193D128B000
trusted library allocation
page read and write
193D43C8000
trusted library allocation
page read and write
2560000
heap
page read and write
716E000
stack
page read and write
1B115789000
trusted library allocation
page read and write
1B1110E5000
trusted library allocation
page read and write
935C000
stack
page read and write
2434000
heap
page read and write
67E1000
heap
page read and write
1B11646C000
trusted library allocation
page read and write
12F8000
heap
page read and write
BF0000
heap
page read and write
193CC09D000
trusted library allocation
page read and write
193CA584000
trusted library allocation
page read and write
49B0000
heap
page read and write
1B11C37C000
trusted library allocation
page read and write
6831000
heap
page read and write
67E1000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
193CA9DA000
trusted library allocation
page read and write
193CA9CC000
trusted library allocation
page read and write
1B107504000
heap
page read and write
1B11C1D8000
trusted library allocation
page read and write
1B110F24000
trusted library allocation
page read and write
1B11618F000
trusted library allocation
page read and write
67E1000
heap
page read and write
22C5D000
heap
page read and write
193BC0CF000
heap
page read and write
1B115E03000
trusted library allocation
page read and write
6982000
heap
page read and write
46F0000
direct allocation
page read and write
831E000
stack
page read and write
67E1000
heap
page read and write
193BC0E8000
heap
page read and write
1B110E90000
trusted library allocation
page read and write
1B1066FD000
trusted library allocation
page read and write
1B11DF51000
trusted library allocation
page read and write
1B118B08000
trusted library allocation
page read and write
24617410000
heap
page readonly
4991000
heap
page read and write
6831000
heap
page read and write
457F000
stack
page read and write
30FE000
stack
page read and write
193BC0F9000
heap
page read and write
193D84A2000
trusted library allocation
page read and write
1B112E9B000
trusted library allocation
page read and write
18654903000
trusted library allocation
page read and write
193C6A03000
trusted library section
page read and write
1B1175D3000
trusted library allocation
page read and write
193CA610000
trusted library allocation
page read and write
1B11EB00000
trusted library allocation
page read and write
696000
unkown
page execute and write copy
193C5C79000
trusted library allocation
page read and write
193D4492000
trusted library allocation
page read and write
52A3CFE000
stack
page read and write
193D10D8000
trusted library allocation
page read and write
193C6300000
trusted library allocation
page read and write
193D384E000
trusted library allocation
page read and write
1B11D4C2000
trusted library allocation
page read and write
1B115408000
trusted library allocation
page read and write
1B1074EA000
heap
page read and write
193CAF7A000
trusted library allocation
page read and write
193B94D6000
trusted library allocation
page read and write
22C77000
heap
page read and write
193C91F9000
trusted library allocation
page read and write
1044000
heap
page read and write
193BC0BF000
heap
page read and write
193C617F000
trusted library allocation
page read and write
BEE000
heap
page read and write
1B11C284000
trusted library allocation
page read and write
6831000
heap
page read and write
1B11C2C8000
trusted library allocation
page read and write
193D4798000
trusted library allocation
page read and write
67E1000
heap
page read and write
67E1000
heap
page read and write
1B114EA5000
trusted library allocation
page read and write
193D3A41000
trusted library allocation
page read and write
307F000
stack
page read and write
193C8CC0000
trusted library allocation
page read and write
1B116B2A000
trusted library allocation
page read and write
193CAFBA000
trusted library allocation
page read and write
193C5E46000
trusted library allocation
page read and write
6831000
heap
page read and write
1B1168E5000
trusted library allocation
page read and write
1B11BBE5000
trusted library allocation
page read and write
193D848B000
trusted library allocation
page read and write
B82000
unkown
page execute and read and write
193C63E8000
trusted library allocation
page read and write
CB01CC04000
trusted library allocation
page read and write
C94000
heap
page read and write
193BB5F6000
trusted library allocation
page read and write
4480000
heap
page read and write
1B11C3A4000
trusted library allocation
page read and write
1B11266C000
trusted library allocation
page read and write
4701000
heap
page read and write
193C909B000
trusted library allocation
page read and write
193C6155000
trusted library allocation
page read and write
1BE51FE000
stack
page read and write
193BC0E8000
heap
page read and write
193C61EB000
trusted library allocation
page read and write
1044000
heap
page read and write
193CAFB0000
trusted library allocation
page read and write
193CA593000
trusted library allocation
page read and write
6831000
heap
page read and write
67E1000
heap
page read and write
C94000
heap
page read and write
2E0E000
stack
page read and write
C94000
heap
page read and write
193D47FC000
trusted library allocation
page read and write
634000
unkown
page execute and write copy
193C5E59000
trusted library allocation
page read and write
36BE000
stack
page read and write
193C5EE2000
trusted library allocation
page read and write
193D10D9000
trusted library allocation
page read and write
1B1114FE000
trusted library allocation
page read and write
1B1074E5000
heap
page read and write
1B11C4DF000
trusted library allocation
page read and write
5150000
direct allocation
page execute and read and write
1B106861000
trusted library allocation
page read and write
193D77A0000
trusted library allocation
page read and write
1144000
heap
page read and write
4701000
heap
page read and write
1B115DA4000
trusted library allocation
page read and write
35BF000
stack
page read and write
6831000
heap
page read and write
193D35D9000
trusted library allocation
page read and write
C94000
heap
page read and write
60B000
unkown
page execute and read and write
6831000
heap
page read and write
193D8DF0000
trusted library allocation
page read and write
2102000
heap
page read and write
193D44D1000
trusted library allocation
page read and write
193CA7A6000
trusted library allocation
page read and write
193BB6A4000
heap
page read and write
193D849D000
trusted library allocation
page read and write
1174000
heap
page read and write
1B1074ED000
heap
page read and write
193CA9CC000
trusted library allocation
page read and write
193D4232000
trusted library allocation
page read and write
193CAE59000
trusted library allocation
page read and write
1B1074EA000
heap
page read and write
4DF0000
heap
page read and write
5160000
direct allocation
page execute and read and write
1B1152B8000
trusted library allocation
page read and write
6831000
heap
page read and write
1F68000
heap
page read and write
1140000
heap
page read and write
C94000
heap
page read and write
1B11C800000
trusted library allocation
page read and write
1B1165ED000
trusted library allocation
page read and write
193CAAD5000
trusted library allocation
page read and write
193BB75C000
heap
page read and write
1B10683F000
trusted library allocation
page read and write
22C85000
heap
page read and write
2481000
heap
page read and write
193D848B000
trusted library allocation
page read and write
193C7B10000
trusted library section
page read and write
F5E0BFE000
stack
page read and write
4701000
heap
page read and write
193C5B66000
trusted library allocation
page read and write
193C9872000
trusted library allocation
page read and write
193D47D0000
trusted library allocation
page read and write
5350000
heap
page read and write
6831000
heap
page read and write
67E1000
heap
page read and write
193BC0E6000
heap
page read and write
1B114E95000
trusted library allocation
page read and write
1174000
heap
page read and write
1B11557E000
trusted library allocation
page read and write
2E3E000
heap
page read and write
67E1000
heap
page read and write
15A19BE1000
remote allocation
page execute read
C94000
heap
page read and write
193BC0DE000
heap
page read and write
193D84EB000
trusted library allocation
page read and write
6831000
heap
page read and write
193BC0F4000
heap
page read and write
193D8464000
trusted library allocation
page read and write
1B11BF85000
trusted library allocation
page read and write
193D8473000
trusted library allocation
page read and write
1B114EB8000
trusted library allocation
page read and write
1B1162ED000
trusted library allocation
page read and write
246173E6000
trusted library allocation
page read and write
193BB403000
trusted library allocation
page read and write
193D84F1000
trusted library allocation
page read and write
193D9C02000
trusted library allocation
page read and write
1294000
heap
page read and write
1B10750E000
heap
page read and write
193CAFB0000
trusted library allocation
page read and write
193C8C36000
trusted library allocation
page read and write
193D44A6000
trusted library allocation
page read and write
193CAFE6000
trusted library allocation
page read and write
1B117692000
trusted library allocation
page read and write
193CAFB8000
trusted library allocation
page read and write
4D2E000
stack
page read and write
9EC2B01000
trusted library allocation
page execute read
1B11C286000
trusted library allocation
page read and write
193D449F000
trusted library allocation
page read and write
1B1160A0000
trusted library section
page read and write
81AE000
stack
page read and write
193C9ADA000
trusted library allocation
page read and write
193C5E26000
trusted library allocation
page read and write
193BC0F2000
heap
page read and write
193C9646000
heap
page read and write
BE0000
direct allocation
page read and write
67E1000
heap
page read and write
193C7A00000
trusted library allocation
page read and write
1B11C327000
trusted library allocation
page read and write
67E1000
heap
page read and write
5FC000
unkown
page execute and write copy
244C000
unkown
page readonly
193D44DF000
trusted library allocation
page read and write
193CAFC3000
trusted library allocation
page read and write
193C9811000
trusted library allocation
page read and write
4DB0000
direct allocation
page execute and read and write
193C7A03000
trusted library allocation
page read and write
1B11C254000
trusted library allocation
page read and write
193C9559000
trusted library allocation
page read and write
193D848B000
trusted library allocation
page read and write
4991000
heap
page read and write
193C9837000
trusted library allocation
page read and write
193D44CF000
trusted library allocation
page read and write
193D44F2000
trusted library allocation
page read and write
5A6D000
stack
page read and write
193CA3AF000
trusted library allocation
page read and write
193D442B000
trusted library allocation
page read and write
1B104590000
heap
page read and write
1B116303000
trusted library allocation
page read and write
D6B000
heap
page read and write
FF4000
heap
page read and write
1B11EB0B000
trusted library allocation
page read and write
1B11D609000
trusted library allocation
page read and write
6831000
heap
page read and write
1B116A00000
trusted library allocation
page read and write
193D47E8000
trusted library allocation
page read and write
1140BFE000
stack
page read and write
5A0000
unkown
page readonly
1B1166F7000
trusted library allocation
page read and write
6831000
heap
page read and write
193D8FD7000
trusted library allocation
page read and write
C94000
heap
page read and write
67E1000
heap
page read and write
15A1A07B000
trusted library allocation
page read and write
26E7000
heap
page read and write
193BC0E5000
heap
page read and write
333F000
stack
page read and write
1142E32000
stack
page read and write
1B1074EB000
heap
page read and write
10FD000
stack
page read and write
1354000
heap
page read and write
C94000
heap
page read and write
193CA3C2000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
193D47C3000
trusted library allocation
page read and write
1144000
heap
page read and write
1B1068A5000
trusted library allocation
page read and write
1B113667000
trusted library allocation
page read and write
272E000
heap
page read and write
193BC0FA000
heap
page read and write
1353000
heap
page read and write
1B118B22000
trusted library allocation
page read and write
67E1000
heap
page read and write
193BC0DE000
heap
page read and write
52A46FA000
stack
page read and write
1B107486000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
308F000
stack
page read and write
193C9A5C000
trusted library allocation
page read and write
193CA871000
trusted library allocation
page read and write
67E1000
heap
page read and write
193CAE00000
trusted library allocation
page read and write
193CACF7000
trusted library allocation
page read and write
193CAF82000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B11A61A000
trusted library allocation
page read and write
1B114E62000
trusted library allocation
page read and write
392E000
stack
page read and write
2A7F000
stack
page read and write
193BC0EF000
heap
page read and write
193CA303000
trusted library allocation
page read and write
193CA990000
trusted library allocation
page read and write
1B115687000
trusted library allocation
page read and write
193BC0D4000
heap
page read and write
193BB6BC000
heap
page read and write
602000
unkown
page execute and read and write
3BFF000
stack
page read and write
6831000
heap
page read and write
193C9303000
trusted library allocation
page read and write
22BB4000
heap
page read and write
1E3DAD00000
heap
page read and write
2930000
heap
page read and write
1B10689B000
trusted library allocation
page read and write
193D128D000
trusted library allocation
page read and write
193CA9C9000
trusted library allocation
page read and write
1B106660000
trusted library allocation
page read and write
193CAF9A000
trusted library allocation
page read and write
52A5B7B000
stack
page read and write
193CA05C000
trusted library allocation
page read and write
427000
unkown
page write copy
193D10FD000
trusted library allocation
page read and write
1140A3E000
stack
page read and write
6831000
heap
page read and write
193D3A38000
trusted library allocation
page read and write
193CAD03000
trusted library allocation
page read and write
7900000
heap
page read and write
52A183A000
stack
page read and write
1B11BF95000
trusted library allocation
page read and write
193C62A1000
trusted library allocation
page read and write
6831000
heap
page read and write
193BC0F0000
heap
page read and write
27CA000
heap
page read and write
193D76FC000
trusted library allocation
page read and write
193D8488000
trusted library allocation
page read and write
62C000
unkown
page execute and write copy
6831000
heap
page read and write
193D3AAD000
trusted library allocation
page read and write
193C9331000
trusted library allocation
page read and write
1BD9000
stack
page read and write
1B11E04B000
trusted library allocation
page read and write
51A4000
direct allocation
page execute and read and write
4C01000
direct allocation
page read and write
193CAF1D000
trusted library allocation
page read and write
1B116942000
trusted library allocation
page read and write
193C9878000
trusted library allocation
page read and write
1B10662B000
trusted library allocation
page read and write
1B1114FB000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
193BC0B7000
heap
page read and write
542D000
stack
page read and write
1B11C4A8000
trusted library allocation
page read and write
193CAAAD000
trusted library allocation
page read and write
18A4799A000
heap
page read and write
2BBF000
stack
page read and write
4991000
heap
page read and write
1B1074FC000
heap
page read and write
4701000
heap
page read and write
67E1000
heap
page read and write
193C6E33000
trusted library allocation
page read and write
193BC0CA000
heap
page read and write
1B1069AB000
trusted library allocation
page read and write
1B107506000
heap
page read and write
193C9653000
heap
page read and write
1B114E91000
trusted library allocation
page read and write
193CA9E1000
trusted library allocation
page read and write
193CA786000
trusted library allocation
page read and write
193BB5F6000
trusted library allocation
page read and write
193C705D000
trusted library allocation
page read and write
1B1074F0000
heap
page read and write
193C984E000
trusted library allocation
page read and write
1B1074E3000
heap
page read and write
193CA74D000
trusted library allocation
page read and write
193C9100000
trusted library allocation
page read and write
193CAA59000
trusted library allocation
page read and write
4991000
heap
page read and write
6831000
heap
page read and write
2E5A7FF000
stack
page read and write
193BC0BA000
heap
page read and write
193C98EE000
trusted library allocation
page read and write
C94000
heap
page read and write
2146000
heap
page read and write
67E1000
heap
page read and write
1C7CE000
stack
page read and write
1B11D682000
trusted library allocation
page read and write
193CA5B4000
trusted library allocation
page read and write
2BA7000
heap
page read and write
1044000
heap
page read and write
350C0000
heap
page read and write
22C7D000
heap
page read and write
193D8415000
trusted library allocation
page read and write
193C6EFB000
trusted library allocation
page read and write
193CA74B000
trusted library allocation
page read and write
193CAFE6000
trusted library allocation
page read and write
193CAE20000
trusted library allocation
page read and write
193CC031000
trusted library allocation
page read and write
52D0000
direct allocation
page read and write
193D8E00000
trusted library allocation
page read and write
193D7128000
trusted library allocation
page read and write
6831000
heap
page read and write
193C5A90000
trusted library allocation
page read and write
193CAE66000
trusted library allocation
page read and write
67E1000
heap
page read and write
4701000
heap
page read and write
11474BB000
stack
page read and write
30CE000
stack
page read and write
1141C3C000
stack
page read and write
89F000
unkown
page execute and write copy
244C000
unkown
page readonly
1B11BFAE000
trusted library allocation
page read and write
1B1151DD000
trusted library allocation
page read and write
193C6858000
trusted library allocation
page read and write
1B1169E8000
trusted library allocation
page read and write
193CA53B000
trusted library allocation
page read and write
193C6C03000
trusted library allocation
page read and write
560000
unkown
page readonly
193D12F5000
trusted library allocation
page read and write
6C771000
unkown
page execute read
193D4439000
trusted library allocation
page read and write
1B114EAE000
trusted library allocation
page read and write
8D90000
heap
page read and write
193B95BA000
heap
page read and write
193CA98D000
trusted library allocation
page read and write
67E1000
heap
page read and write
193D107F000
trusted library allocation
page read and write
1B1074E5000
heap
page read and write
46F0000
direct allocation
page read and write
46FE000
stack
page read and write
9A4000
heap
page read and write
1B106A00000
trusted library section
page readonly
C94000
heap
page read and write
193D4200000
trusted library allocation
page read and write
67E1000
heap
page read and write
1C31F000
stack
page read and write
1174000
heap
page read and write
1B1115E3000
trusted library allocation
page read and write
1044000
heap
page read and write
BE0000
direct allocation
page read and write
3CAF000
stack
page read and write
423000
unkown
page readonly
193C9EF3000
trusted library allocation
page read and write
1100000
direct allocation
page read and write
5D301FE000
stack
page read and write
198000
stack
page read and write
193CAAE0000
trusted library allocation
page read and write
1B1073DD000
heap
page read and write
193CAF47000
trusted library allocation
page read and write
1174000
heap
page read and write
5F1E000
stack
page read and write
6831000
heap
page read and write
193CAF88000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B1065D0000
unclassified section
page read and write
193C6E74000
trusted library allocation
page read and write
193CA979000
trusted library allocation
page read and write
1B110E98000
trusted library allocation
page read and write
1B11E0F2000
trusted library allocation
page read and write
193D3A61000
trusted library allocation
page read and write
41BF000
stack
page read and write
1B1136AC000
trusted library allocation
page read and write
193D4492000
trusted library allocation
page read and write
1B1161BF000
trusted library allocation
page read and write
193C6E37000
trusted library allocation
page read and write
1B115103000
trusted library allocation
page read and write
193CAFB7000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B107414000
heap
page read and write
193D44EA000
trusted library allocation
page read and write
193CA9DA000
trusted library allocation
page read and write
1C54F000
stack
page read and write
2920000
direct allocation
page read and write
6831000
heap
page read and write
418E000
stack
page read and write
4701000
heap
page read and write
193C5BA9000
trusted library allocation
page read and write
1044000
heap
page read and write
1B11D9E9000
trusted library allocation
page read and write
193D8488000
trusted library allocation
page read and write
193BC0B2000
heap
page read and write
2720000
heap
page read and write
6831000
heap
page read and write
193C5A98000
trusted library allocation
page read and write
25DE000
stack
page read and write
1B115245000
trusted library allocation
page read and write
193D846F000
trusted library allocation
page read and write
193D8459000
trusted library allocation
page read and write
193D778E000
trusted library allocation
page read and write
6E1000
unkown
page execute and read and write
556E000
stack
page read and write
1B1047C0000
trusted library allocation
page execute read
21FB000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
1B1136B3000
trusted library allocation
page read and write
193C9878000
trusted library allocation
page read and write
193BC0D4000
heap
page read and write
1B1068C9000
trusted library allocation
page read and write
114743B000
stack
page read and write
4BC1000
heap
page read and write
41FF000
stack
page read and write
46F0000
direct allocation
page read and write
24C1000
heap
page read and write
6831000
heap
page read and write
193D84EB000
trusted library allocation
page read and write
193CAAC5000
trusted library allocation
page read and write
193C9A58000
trusted library allocation
page read and write
1B11BF83000
trusted library allocation
page read and write
18A479C3000
heap
page read and write
1174000
heap
page read and write
193D4200000
trusted library allocation
page read and write
6831000
heap
page read and write
4C4000
unkown
page execute and read and write
193D3CA5000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B111910000
heap
page read and write
1F5FF00A000
trusted library allocation
page read and write
193D77F2000
trusted library allocation
page read and write
193D3AE4000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B1153D0000
trusted library section
page readonly
193CA9F0000
trusted library allocation
page read and write
1B11C43C000
trusted library allocation
page read and write
1210000
heap
page read and write
193D35C6000
trusted library allocation
page read and write
193D8E11000
trusted library allocation
page read and write
193CAFE6000
trusted library allocation
page read and write
193BC0C3000
heap
page read and write
1B112E3D000
trusted library allocation
page read and write
1B115796000
trusted library allocation
page read and write
67E1000
heap
page read and write
193CAFFA000
trusted library allocation
page read and write
52A33BF000
stack
page read and write
BCF000
heap
page read and write
51A4000
direct allocation
page execute and read and write
FD0000
direct allocation
page read and write
67E1000
heap
page read and write
67E1000
heap
page read and write
1B115D3B000
trusted library allocation
page read and write
193CA9A5000
trusted library allocation
page read and write
1B1136C2000
trusted library allocation
page read and write
67E1000
heap
page read and write
529AD3E000
stack
page read and write
193C9C93000
trusted library allocation
page read and write
193D3AF0000
trusted library allocation
page read and write
69BF000
stack
page read and write
4C10000
direct allocation
page read and write
193CA4CF000
trusted library allocation
page read and write
193C926C000
trusted library allocation
page read and write
4701000
heap
page read and write
193D44C2000
trusted library allocation
page read and write
4C10000
direct allocation
page read and write
193D8985000
trusted library allocation
page read and write
1B1067BB000
trusted library allocation
page read and write
1B1162DD000
trusted library allocation
page read and write
2530000
heap
page read and write
193C8CC0000
trusted library allocation
page read and write
343E000
stack
page read and write
22C77000
heap
page read and write
136A000
heap
page read and write
193B9040000
unclassified section
page readonly
4C4000
unkown
page execute and read and write
193CAF95000
trusted library allocation
page read and write
1B112E9B000
trusted library allocation
page read and write
398E000
stack
page read and write
6831000
heap
page read and write
1B11362C000
trusted library allocation
page read and write
193CA9CC000
trusted library allocation
page read and write
1294000
heap
page read and write
6831000
heap
page read and write
193CA000000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
193C63B2000
trusted library allocation
page read and write
193D3805000
trusted library allocation
page read and write
67E1000
heap
page read and write
27D0000
direct allocation
page read and write
6831000
heap
page read and write
193BB30F000
trusted library allocation
page read and write
193CA959000
trusted library allocation
page read and write
193D109E000
trusted library allocation
page read and write
193C9A9F000
trusted library allocation
page read and write
6831000
heap
page read and write
193CA98D000
trusted library allocation
page read and write
1B11D9D1000
trusted library allocation
page read and write
193C6173000
trusted library allocation
page read and write
193C9638000
heap
page read and write
193BB754000
heap
page read and write
1F0E000
heap
page read and write
1B117770000
trusted library allocation
page read and write
1B116182000
trusted library allocation
page read and write
193CB30A000
trusted library allocation
page read and write
540E000
stack
page read and write
418E000
stack
page read and write
193C9663000
heap
page read and write
1B111B63000
trusted library allocation
page read and write
4991000
heap
page read and write
C94000
heap
page read and write
1B114D41000
trusted library allocation
page read and write
1175000
heap
page read and write
244C000
unkown
page readonly
1B116300000
trusted library allocation
page read and write
4B7C000
stack
page read and write
193D3A7D000
trusted library allocation
page read and write
51E0000
direct allocation
page execute and read and write
8B4F000
stack
page read and write
317F000
stack
page read and write
193D84F1000
trusted library allocation
page read and write
68D000
unkown
page readonly
193D12F2000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
634000
unkown
page execute and write copy
193B91F0000
heap
page read and write
6831000
heap
page read and write
1B11BF24000
trusted library allocation
page read and write
193CAB1A000
trusted library allocation
page read and write
193D3CDD000
trusted library allocation
page read and write
193C8D11000
trusted library allocation
page read and write
1CF0000
heap
page read and write
C94000
heap
page read and write
193D44FA000
trusted library allocation
page read and write
193C9AD2000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
193C9403000
trusted library allocation
page read and write
193C9B72000
trusted library allocation
page read and write
1B11BF26000
trusted library allocation
page read and write
1174000
heap
page read and write
193D3A71000
trusted library allocation
page read and write
193C6203000
trusted library allocation
page read and write
35CE000
stack
page read and write
193BB6BF000
heap
page read and write
193C5BD8000
trusted library allocation
page read and write
1B11E000000
trusted library allocation
page read and write
1B11C34B000
trusted library allocation
page read and write
193C95C2000
trusted library allocation
page read and write
6831000
heap
page read and write
6831000
heap
page read and write
1B11C3AD000
trusted library allocation
page read and write
193C68B3000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
1B11363C000
trusted library allocation
page read and write
1B115D07000
trusted library allocation
page read and write
3BFF000
stack
page read and write
193BC0F0000
heap
page read and write
416E000
stack
page read and write
46F0000
direct allocation
page read and write
49A2000
heap
page read and write
F5DFBFF000
stack
page read and write
193CA760000
trusted library allocation
page read and write
11418B4000
stack
page read and write
193CA5C2000
trusted library allocation
page read and write
18A479C1000
heap
page read and write
4701000
heap
page read and write
193D1244000
trusted library allocation
page read and write
193CA5D7000
trusted library allocation
page read and write
1B11BF4D000
trusted library allocation
page read and write
193BB757000
heap
page read and write
2F3E000
stack
page read and write
6831000
heap
page read and write
193BC0D4000
heap
page read and write
193D12B4000
trusted library allocation
page read and write
53BD000
stack
page read and write
FF4000
heap
page read and write
C94000
heap
page read and write
432E000
stack
page read and write
3CAE000
stack
page read and write
1B112D00000
trusted library allocation
page read and write
1174000
heap
page read and write
1B1151EE000
trusted library allocation
page read and write
6831000
heap
page read and write
1B114EE6000
trusted library allocation
page read and write
67E1000
heap
page read and write
5460000
direct allocation
page execute and read and write
193D3AB6000
trusted library allocation
page read and write
193D4787000
trusted library allocation
page read and write
4701000
heap
page read and write
193D10EC000
trusted library allocation
page read and write
4701000
heap
page read and write
193CA9C9000
trusted library allocation
page read and write
193CAF2C000
trusted library allocation
page read and write
193C61C5000
trusted library allocation
page read and write
3B6E000
stack
page read and write
1B112C78000
trusted library allocation
page read and write
193BC0F0000
heap
page read and write
C94000
heap
page read and write
35FE000
stack
page read and write
1B1068B6000
trusted library allocation
page read and write
15A1A003000
trusted library allocation
page read and write
15A1A06E000
trusted library allocation
page read and write
6831000
heap
page read and write
193C70D1000
trusted library allocation
page read and write
193D4434000
trusted library allocation
page read and write
3DEE000
stack
page read and write
193C62FC000
trusted library allocation
page read and write
2115000
heap
page read and write
67E1000
heap
page read and write
193C95F9000
trusted library allocation
page read and write
193C9631000
heap
page read and write
5280000
direct allocation
page execute and read and write
193C9903000
trusted library allocation
page read and write
1B11BF5A000
trusted library allocation
page read and write
4E5B000
stack
page read and write
1B110EF9000
trusted library allocation
page read and write
1B116040000
trusted library section
page readonly
7F9C000
stack
page read and write
4991000
heap
page read and write
1B107501000
heap
page read and write
193C9C89000
trusted library allocation
page read and write
193CC24F000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
193CAF22000
trusted library allocation
page read and write
1B106736000
trusted library allocation
page read and write
193BC0DD000
heap
page read and write
46F0000
direct allocation
page read and write
193CAAE9000
trusted library allocation
page read and write
235E000
heap
page read and write
193D12B8000
trusted library allocation
page read and write
4991000
heap
page read and write
193C96BA000
heap
page read and write
4D80000
direct allocation
page execute and read and write
40C0000
direct allocation
page read and write
1B110F22000
trusted library allocation
page read and write
193CAF68000
trusted library allocation
page read and write
DCC000
stack
page read and write
1B11C36E000
trusted library allocation
page read and write
437E000
stack
page read and write
136B000
heap
page read and write
400000
unkown
page readonly
193CACF7000
trusted library allocation
page read and write
1CAA1000
heap
page read and write
1B1161B7000
trusted library allocation
page read and write
193BC0F0000
heap
page read and write
52A37FC000
stack
page read and write
193BC0F0000
heap
page read and write
193D123C000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
5144000
direct allocation
page execute and read and write
193C9CAF000
trusted library allocation
page read and write
1B106250000
unclassified section
page read and write
22C69000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
193C682A000
trusted library allocation
page read and write
1175000
heap
page read and write
193C6E13000
trusted library allocation
page read and write
193D4497000
trusted library allocation
page read and write
22C5D000
heap
page read and write
2068000
heap
page read and write
6C75E000
unkown
page read and write
193BC0F4000
heap
page read and write
193BC0F0000
heap
page read and write
C94000
heap
page read and write
193BC0FF000
heap
page read and write
193BC108000
heap
page read and write
193BC0F5000
heap
page read and write
193C9EB5000
trusted library allocation
page read and write
1D20000
heap
page read and write
341000
unkown
page execute and write copy
193CA95C000
trusted library allocation
page read and write
1B106263000
heap
page read and write
C18000
heap
page read and write
529B13E000
stack
page read and write
67E1000
heap
page read and write
C94000
heap
page read and write
1174000
heap
page read and write
1174000
heap
page read and write
67E1000
heap
page read and write
1B117576000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
C94000
heap
page read and write
193D47FC000
trusted library allocation
page read and write
193C59FF000
unclassified section
page read and write
1B116500000
trusted library allocation
page read and write
193CA998000
trusted library allocation
page read and write
193CB3ED000
trusted library allocation
page read and write
11ED000
stack
page read and write
193C685B000
trusted library allocation
page read and write
193D8479000
trusted library allocation
page read and write
63C000
unkown
page execute and read and write
41FE000
stack
page read and write
193BC0FA000
heap
page read and write
1B1074E3000
heap
page read and write
22C75000
heap
page read and write
4E30000
direct allocation
page read and write
193C9E33000
trusted library allocation
page read and write
1B11C250000
trusted library allocation
page read and write
193BC0F5000
heap
page read and write
193C95F9000
trusted library allocation
page read and write
1B114E8D000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
193C6A80000
trusted library section
page readonly
193BB525000
trusted library allocation
page read and write
193CAFA8000
trusted library allocation
page read and write
193D43ED000
trusted library allocation
page read and write
193BC107000
heap
page read and write
193D4763000
trusted library allocation
page read and write
193D8482000
trusted library allocation
page read and write
193C6962000
trusted library allocation
page read and write
193D10E1000
trusted library allocation
page read and write
27A8000
heap
page read and write
52A48FF000
stack
page read and write
1B10681B000
trusted library allocation
page read and write
5220000
direct allocation
page execute and read and write
173E000
stack
page read and write
3BBE000
stack
page read and write
193BC0D7000
heap
page read and write
193BC0C9000
heap
page read and write
1B1068A0000
trusted library allocation
page read and write
193D3AFE000
trusted library allocation
page read and write
1B1074F3000
heap
page read and write
193D8464000
trusted library allocation
page read and write
1B1068B6000
trusted library allocation
page read and write
529ABBC000
stack
page read and write
1B114D06000
trusted library allocation
page read and write
4090000
heap
page read and write
193C5A7E000
trusted library allocation
page read and write
43AE000
stack
page read and write
1174000
heap
page read and write
193BB272000
unclassified section
page read and write
6AC0000
heap
page read and write
1B11C400000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
15A19DB0000
heap
page readonly
41CE000
stack
page read and write
193C5ECA000
trusted library allocation
page read and write
193CAF2F000
trusted library allocation
page read and write
193CB353000
trusted library allocation
page read and write
193BC0D6000
heap
page read and write
193D3A71000
trusted library allocation
page read and write
67E1000
heap
page read and write
FEDE0000
direct allocation
page execute and read and write
193BC0DE000
heap
page read and write
1B107454000
heap
page read and write
193CAAF8000
trusted library allocation
page read and write
193CAF2A000
trusted library allocation
page read and write
193C6AC0000
trusted library section
page readonly
193CAF26000
trusted library allocation
page read and write
22C77000
heap
page read and write
C94000
heap
page read and write
1B117552000
trusted library allocation
page read and write
2FBE000
stack
page read and write
51B9000
direct allocation
page execute and read and write
1B112C87000
trusted library allocation
page read and write
193CA98D000
trusted library allocation
page read and write
193C6EC6000
trusted library allocation
page read and write
13EE000
stack
page read and write
31FF000
stack
page read and write
1EDE000
heap
page read and write
4A90000
trusted library allocation
page read and write
193D44C8000
trusted library allocation
page read and write
193CAF91000
trusted library allocation
page read and write
193BC0C4000
heap
page read and write
1B115CE3000
trusted library allocation
page read and write
193CACF9000
trusted library allocation
page read and write
193D38D6000
trusted library allocation
page read and write
193D1287000
trusted library allocation
page read and write
C94000
heap
page read and write
67E1000
heap
page read and write
504E000
stack
page read and write
2257000
heap
page read and write
67E1000
heap
page read and write
193CAFC3000
trusted library allocation
page read and write
193D47FA000
trusted library allocation
page read and write
213B000
heap
page read and write
E22000
unkown
page execute and write copy
193CAB00000
trusted library allocation
page read and write
193D12F5000
trusted library allocation
page read and write
193D47D7000
trusted library allocation
page read and write
4010000
heap
page read and write
1B114F70000
trusted library allocation
page read and write
31CF000
stack
page read and write
193C92AA000
trusted library allocation
page read and write
67E1000
heap
page read and write
193BC0BA000
heap
page read and write
193CA5DF000
trusted library allocation
page read and write
C94000
heap
page read and write
609000
unkown
page read and write
193D124C000
trusted library allocation
page read and write
1B11E096000
trusted library allocation
page read and write
1B11525C000
trusted library allocation
page read and write
193BC0F9000
heap
page read and write
193BC0B6000
heap
page read and write
8B8000
unkown
page execute and read and write
278B000
heap
page read and write
193C73BD000
trusted library allocation
page read and write
6C762000
unkown
page readonly
193C73E8000
trusted library allocation
page read and write
193C918F000
trusted library allocation
page read and write
193D846F000
trusted library allocation
page read and write
2308000
heap
page read and write
6831000
heap
page read and write
1C51F000
stack
page read and write
193CAFA9000
trusted library allocation
page read and write
1B104847000
trusted library allocation
page read and write
4E30000
direct allocation
page read and write
193C908B000
trusted library allocation
page read and write
193D8A98000
trusted library allocation
page read and write
46D0000
heap
page read and write
3F8F000
stack
page read and write
193BC0BF000
heap
page read and write
1B106891000
trusted library allocation
page read and write
5440000
direct allocation
page execute and read and write
193CA14E000
trusted library allocation
page read and write
2BFE000
stack
page read and write
193BC0BE000
heap
page read and write
193D1017000
trusted library allocation
page read and write
193D8111000
trusted library allocation
page read and write
67E1000
heap
page read and write
193D44C8000
trusted library allocation
page read and write
46C0000
heap
page read and write
1290000
heap
page read and write
254F000
heap
page read and write
193CA9C9000
trusted library allocation
page read and write
193C8D15000
trusted library allocation
page read and write
193D3A5B000
trusted library allocation
page read and write
CE9000
heap
page read and write
193C9938000
trusted library allocation
page read and write
4DA0000
direct allocation
page execute and read and write
5240000
direct allocation
page execute and read and write
1044000
heap
page read and write
193C63E8000
trusted library allocation
page read and write
1B1152D6000
trusted library allocation
page read and write
1174000
heap
page read and write
6831000
heap
page read and write
6831000
heap
page read and write
376F000
stack
page read and write
1B11E099000
trusted library allocation
page read and write
1B116503000
trusted library allocation
page read and write
193C9A13000
trusted library allocation
page read and write
193D848D000
trusted library allocation
page read and write
193BC0AA000
heap
page read and write
1B11C33C000
trusted library allocation
page read and write
193D7830000
trusted library allocation
page read and write
193D1099000
trusted library allocation
page read and write
4991000
heap
page read and write
193C9DF9000
trusted library allocation
page read and write
193CA35B000
trusted library allocation
page read and write
6831000
heap
page read and write
193C8C43000
trusted library allocation
page read and write
67E1000
heap
page read and write
4991000
heap
page read and write
193C98E5000
trusted library allocation
page read and write
193D380E000
trusted library allocation
page read and write
1B11D9C9000
trusted library allocation
page read and write
1B115AAE000
trusted library allocation
page read and write
1B115D03000
trusted library allocation
page read and write
193D3111000
trusted library allocation
page read and write
67E1000
heap
page read and write
4991000
heap
page read and write
193C5A89000
trusted library allocation
page read and write
15A1A150000
heap
page read and write
43C000
unkown
page execute and read and write
561000
unkown
page execute and read and write
193BC0E8000
heap
page read and write
193CA03F000
trusted library allocation
page read and write
1B1152BE000
trusted library allocation
page read and write
193C6227000
trusted library allocation
page read and write
1B113209000
trusted library allocation
page read and write
67E1000
heap
page read and write
193D43E1000
trusted library allocation
page read and write
1B112C98000
trusted library allocation
page read and write
193BC104000
heap
page read and write
27DE000
heap
page read and write
62C000
unkown
page execute and read and write
1B11C4D0000
trusted library allocation
page read and write
6831000
heap
page read and write
193CAF6E000
trusted library allocation
page read and write
193D44FD000
trusted library allocation
page read and write
193BC0F9000
heap
page read and write
193D3674000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B1074F1000
heap
page read and write
1044000
heap
page read and write
193C9A5C000
trusted library allocation
page read and write
1B111517000
trusted library allocation
page read and write
1B117784000
trusted library allocation
page read and write
6831000
heap
page read and write
193BC0F9000
heap
page read and write
1B116620000
trusted library allocation
page read and write
687F000
stack
page read and write
1B11578D000
trusted library allocation
page read and write
193D3539000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
193CB33F000
trusted library allocation
page read and write
5460000
direct allocation
page execute and read and write
193CB323000
trusted library allocation
page read and write
193CB039000
trusted library allocation
page read and write
4701000
heap
page read and write
193D4427000
trusted library allocation
page read and write
1B11C3AA000
trusted library allocation
page read and write
193D7750000
trusted library allocation
page read and write
193D3A2F000
trusted library allocation
page read and write
67E1000
heap
page read and write
6831000
heap
page read and write
67E1000
heap
page read and write
193C63FD000
trusted library allocation
page read and write
3E2E000
stack
page read and write
193CAFC0000
trusted library allocation
page read and write
1353000
heap
page read and write
193CA9D7000
trusted library allocation
page read and write
6E9000
unkown
page execute and read and write
1B11109F000
trusted library allocation
page read and write
4991000
heap
page read and write
193C9599000
trusted library allocation
page read and write
1174000
heap
page read and write
193DA2C9000
trusted library allocation
page read and write
193C5B89000
trusted library allocation
page read and write
193BC0D4000
heap
page read and write
193BC0F2000
heap
page read and write
193CA906000
trusted library allocation
page read and write
1B11C398000
trusted library allocation
page read and write
193BC0C4000
heap
page read and write
193C7B00000
trusted library section
page readonly
52A5BBB000
stack
page read and write
193D44E8000
trusted library allocation
page read and write
1B11D4E6000
trusted library allocation
page read and write
193C9A63000
trusted library allocation
page read and write
5240000
direct allocation
page execute and read and write
193D1032000
trusted library allocation
page read and write
193C5A34000
trusted library allocation
page read and write
67E1000
heap
page read and write
529BD3A000
stack
page read and write
141E000
heap
page read and write
193C9EFA000
trusted library allocation
page read and write
1B116603000
trusted library allocation
page read and write
193BC0D4000
heap
page read and write
6831000
heap
page read and write
193D849D000
trusted library allocation
page read and write
1B11C2F9000
trusted library allocation
page read and write
40D0000
direct allocation
page read and write
C94000
heap
page read and write
6831000
heap
page read and write
193D3A94000
trusted library allocation
page read and write
1B115750000
trusted library allocation
page read and write
1174000
heap
page read and write
63C000
unkown
page execute and read and write
6831000
heap
page read and write
1B1069A1000
trusted library allocation
page read and write
193D84A6000
trusted library allocation
page read and write
67E1000
heap
page read and write
6831000
heap
page read and write
1B115101000
trusted library allocation
page read and write
1B10686F000
trusted library allocation
page read and write
33FF000
stack
page read and write
5CF000
unkown
page execute and read and write
193CAA63000
trusted library allocation
page read and write
193BC10D000
heap
page read and write
1B116946000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B106905000
trusted library allocation
page read and write
193C9A5F000
trusted library allocation
page read and write
402F000
stack
page read and write
1B112F00000
trusted library allocation
page read and write
5D2F9FC000
stack
page read and write
193C90B2000
trusted library allocation
page read and write
4BC1000
heap
page read and write
67E1000
heap
page read and write
193C9B03000
trusted library allocation
page read and write
6831000
heap
page read and write
193CAFCA000
trusted library allocation
page read and write
193C907D000
trusted library allocation
page read and write
293F000
stack
page read and write
5270000
direct allocation
page execute and read and write
193D4495000
trusted library allocation
page read and write
1B1152F5000
trusted library allocation
page read and write
4710000
heap
page read and write
193BB53B000
trusted library allocation
page read and write
3DFF000
stack
page read and write
9C000
stack
page read and write
1B115022000
trusted library allocation
page read and write
22C5B000
heap
page read and write
193D8499000
trusted library allocation
page read and write
193BC0E5000
heap
page read and write
67EC000
heap
page read and write
873000
unkown
page execute and read and write
51A4000
direct allocation
page execute and read and write
26AF000
stack
page read and write
193CAFC3000
trusted library allocation
page read and write
2B3F000
stack
page read and write
193D8DEB000
trusted library allocation
page read and write
1B1162F8000
trusted library allocation
page read and write
1B1074EB000
heap
page read and write
6831000
heap
page read and write
9EC29F1000
trusted library allocation
page execute read
193BC0F2000
heap
page read and write
6831000
heap
page read and write
1C61F000
stack
page read and write
193D8488000
trusted library allocation
page read and write
1B1069B9000
trusted library allocation
page read and write
24617378000
trusted library allocation
page read and write
193CAFB3000
trusted library allocation
page read and write
1B11A606000
trusted library allocation
page read and write
193D10EC000
trusted library allocation
page read and write
67E1000
heap
page read and write
193D47FC000
trusted library allocation
page read and write
193D4204000
trusted library allocation
page read and write
193C63CF000
trusted library allocation
page read and write
193CA3F8000
trusted library allocation
page read and write
193C5BE4000
trusted library allocation
page read and write
439000
unkown
page write copy
1B113100000
trusted library allocation
page read and write
193BC0F4000
heap
page read and write
193C62D9000
trusted library allocation
page read and write
1B112E9B000
trusted library allocation
page read and write
4A6F000
stack
page read and write
193D8433000
trusted library allocation
page read and write
1B1074E3000
heap
page read and write
193CAFA9000
trusted library allocation
page read and write
1B116417000
trusted library allocation
page read and write
1174000
heap
page read and write
193D848D000
trusted library allocation
page read and write
1B115BF2000
trusted library allocation
page read and write
193BC0DF000
heap
page read and write
193CA0F5000
trusted library allocation
page read and write
1B112ECA000
trusted library allocation
page read and write
193BC0FC000
heap
page read and write
3BAE000
stack
page read and write
37FE000
stack
page read and write
1B1152E3000
trusted library allocation
page read and write
1B106190000
trusted library section
page read and write
6831000
heap
page read and write
9390000
heap
page read and write
67E1000
heap
page read and write
4DAE000
stack
page read and write
193D4215000
trusted library allocation
page read and write
67E1000
heap
page read and write
193BB563000
trusted library allocation
page read and write
1B1151DD000
trusted library allocation
page read and write
FF4000
heap
page read and write
529AB7A000
stack
page read and write
1B1074EC000
heap
page read and write
128E000
heap
page read and write
6831000
heap
page read and write
193BC0F2000
heap
page read and write
193BC0A8000
heap
page read and write
67E1000
heap
page read and write
493000
unkown
page execute and read and write
193CA25C000
trusted library allocation
page read and write
4991000
heap
page read and write
4C00000
direct allocation
page execute and read and write
20EE000
heap
page read and write
1C630000
heap
page read and write
193C5AA8000
trusted library allocation
page read and write
193BC0FE000
heap
page read and write
193C94CC000
trusted library allocation
page read and write
1B111803000
heap
page read and write
1B118B00000
trusted library allocation
page read and write
8A9000
unkown
page execute and read and write
193C8E00000
trusted library allocation
page read and write
C95000
heap
page read and write
24617040000
unclassified section
page readonly
2245000
heap
page read and write
439000
unkown
page read and write
193D84E5000
trusted library allocation
page read and write
193BC0F0000
heap
page read and write
6831000
heap
page read and write
4700000
heap
page read and write
1B1074F0000
heap
page read and write
43EE000
stack
page read and write
F5E03FD000
stack
page read and write
1B114F92000
trusted library allocation
page read and write
8FB08FE000
unkown
page readonly
4E20000
direct allocation
page execute and read and write
193C9ABB000
trusted library allocation
page read and write
193CA7BE000
trusted library allocation
page read and write
193D3ABC000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1B115BF9000
trusted library allocation
page read and write
406E000
stack
page read and write
1B1068C9000
trusted library allocation
page read and write
193CAF3C000
trusted library allocation
page read and write
193D44FD000
trusted library allocation
page read and write
347F000
stack
page read and write
1B111AB2000
trusted library allocation
page read and write
1B11D48E000
trusted library allocation
page read and write
8FB093E000
stack
page read and write
1B11D903000
trusted library allocation
page read and write
1B114EC7000
trusted library allocation
page read and write
1174000
heap
page read and write
193C9A5F000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B11694A000
trusted library allocation
page read and write
22F3000
heap
page read and write
323E000
stack
page read and write
193D8499000
trusted library allocation
page read and write
193C5EDD000
trusted library allocation
page read and write
193D44F2000
trusted library allocation
page read and write
C94000
heap
page read and write
193C7A9E000
trusted library allocation
page read and write
1B117703000
trusted library allocation
page read and write
1B115D0D000
trusted library allocation
page read and write
3BFE000
stack
page read and write
67E1000
heap
page read and write
39EF000
stack
page read and write
373E000
stack
page read and write
C94000
heap
page read and write
15A1A0A0000
trusted library allocation
page read and write
193CB023000
trusted library allocation
page read and write
6C770000
unkown
page readonly
193CAAF3000
trusted library allocation
page read and write
193CAF91000
trusted library allocation
page read and write
6831000
heap
page read and write
7C6000
unkown
page execute and read and write
2530000
heap
page read and write
1B114EA5000
trusted library allocation
page read and write
193C6312000
trusted library allocation
page read and write
193CA645000
trusted library allocation
page read and write
102F000
stack
page read and write
1B11BF81000
trusted library allocation
page read and write
561000
unkown
page execute and write copy
193D4752000
trusted library allocation
page read and write
1B11C37C000
trusted library allocation
page read and write
22C61000
heap
page read and write
193CA9D4000
trusted library allocation
page read and write
41AF000
stack
page read and write
1B1074F1000
heap
page read and write
1B11BB33000
trusted library allocation
page read and write
22C6A000
heap
page read and write
193CA97C000
trusted library allocation
page read and write
2E60000
direct allocation
page read and write
193D84E5000
trusted library allocation
page read and write
193CA9F0000
trusted library allocation
page read and write
13D4000
heap
page read and write
1B111566000
trusted library allocation
page read and write
4701000
heap
page read and write
5050000
direct allocation
page read and write
193D84E5000
trusted library allocation
page read and write
529BD37000
stack
page read and write
1B114E03000
trusted library allocation
page read and write
1B1169EC000
trusted library allocation
page read and write
1B11C2B5000
trusted library allocation
page read and write
2571000
heap
page read and write
1D64000
heap
page read and write
193BC0CA000
heap
page read and write
6831000
heap
page read and write
193D10CE000
trusted library allocation
page read and write
4701000
heap
page read and write
1B11E014000
trusted library allocation
page read and write
2670000
heap
page read and write
193C63A4000
trusted library allocation
page read and write
1E08000
heap
page read and write
5CF000
unkown
page execute and read and write
193CA900000
trusted library allocation
page read and write
193D8473000
trusted library allocation
page read and write
193D8568000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B11277A000
trusted library allocation
page read and write
1B11DD00000
trusted library allocation
page read and write
4E2F000
stack
page read and write
193BC0EA000
heap
page read and write
193D4417000
trusted library allocation
page read and write
67E1000
heap
page read and write
193BC0B6000
heap
page read and write
193C73BF000
trusted library allocation
page read and write
193D1296000
trusted library allocation
page read and write
67E1000
heap
page read and write
4741000
heap
page read and write
1B110E00000
trusted library allocation
page read and write
193D46EB000
trusted library allocation
page read and write
1B1074F1000
heap
page read and write
4700000
trusted library allocation
page read and write
446E000
stack
page read and write
1B1074EE000
heap
page read and write
1B11C394000
trusted library allocation
page read and write
193CACF7000
trusted library allocation
page read and write
193CA3C2000
trusted library allocation
page read and write
1B110E68000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B114EBE000
trusted library allocation
page read and write
1B116BAC000
trusted library allocation
page read and write
67E1000
heap
page read and write
6831000
heap
page read and write
6831000
heap
page read and write
1CBA0000
trusted library allocation
page read and write
1B11C2F5000
trusted library allocation
page read and write
6831000
heap
page read and write
193C98A0000
trusted library allocation
page read and write
2565000
heap
page read and write
193BB73F000
heap
page read and write
1B114EB8000
trusted library allocation
page read and write
3D7E000
stack
page read and write
193C91FC000
trusted library allocation
page read and write
193C9103000
trusted library allocation
page read and write
193BC0FF000
heap
page read and write
1B11BB7C000
trusted library allocation
page read and write
41EE000
stack
page read and write
113EFFE000
stack
page read and write
9EC2AC1000
trusted library allocation
page execute read
4991000
heap
page read and write
193CA9F9000
trusted library allocation
page read and write
5A0000
unkown
page read and write
1B11E0F2000
trusted library allocation
page read and write
193D76E6000
trusted library allocation
page read and write
1B1151C3000
trusted library allocation
page read and write
25D5000
heap
page read and write
15A19B70000
unclassified section
page readonly
1B117778000
trusted library allocation
page read and write
1B1073EE000
heap
page read and write
1B11C364000
trusted library allocation
page read and write
6831000
heap
page read and write
193D8499000
trusted library allocation
page read and write
193D8464000
trusted library allocation
page read and write
193CA9A5000
trusted library allocation
page read and write
2023000
heap
page read and write
1B112990000
trusted library section
page readonly
193D47C6000
trusted library allocation
page read and write
1174000
heap
page read and write
C15000
heap
page read and write
22C75000
heap
page read and write
193CB31C000
trusted library allocation
page read and write
FF4000
heap
page read and write
193C7363000
trusted library allocation
page read and write
193BC0D7000
heap
page read and write
1294000
heap
page read and write
193C9F4F000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
5EDE000
stack
page read and write
1B10740F000
heap
page read and write
3AB000
unkown
page execute and read and write
22C6E000
heap
page read and write
193CABB6000
trusted library allocation
page read and write
397F000
stack
page read and write
6831000
heap
page read and write
1B1074FE000
heap
page read and write
67E1000
heap
page read and write
C94000
heap
page read and write
193C8C18000
trusted library allocation
page read and write
4C40000
direct allocation
page execute and read and write
67E1000
heap
page read and write
1B116BF6000
trusted library allocation
page read and write
193CA99C000
trusted library allocation
page read and write
24617070000
heap
page read and write
193C6E7C000
trusted library allocation
page read and write
2CBE000
stack
page read and write
193D35CF000
trusted library allocation
page read and write
4701000
heap
page read and write
1B11C22A000
trusted library allocation
page read and write
193C6197000
trusted library allocation
page read and write
1B1151EE000
trusted library allocation
page read and write
193CAFB5000
trusted library allocation
page read and write
67E1000
heap
page read and write
2814000
heap
page read and write
193D3AAD000
trusted library allocation
page read and write
193C8EED000
trusted library allocation
page read and write
1B11C435000
trusted library allocation
page read and write
193C954A000
trusted library allocation
page read and write
193CAEC9000
trusted library allocation
page read and write
1B116BC3000
trusted library allocation
page read and write
193D47FA000
trusted library allocation
page read and write
C25000
heap
page read and write
1B114FFB000
trusted library allocation
page read and write
193C5E15000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B112CA6000
trusted library allocation
page read and write
193C9CB1000
trusted library allocation
page read and write
1BE365C000
stack
page read and write
427000
unkown
page write copy
193C90C8000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B11690F000
trusted library allocation
page read and write
C94000
heap
page read and write
32FE000
stack
page read and write
193BC104000
heap
page read and write
193CC2D5000
trusted library allocation
page read and write
529AE9E000
stack
page read and write
28D6C000
heap
page read and write
193CAF22000
trusted library allocation
page read and write
1B11C41B000
trusted library allocation
page read and write
22C77000
heap
page read and write
1146AFC000
stack
page read and write
1B1110B6000
trusted library allocation
page read and write
193D4445000
trusted library allocation
page read and write
52C0000
direct allocation
page execute and read and write
4FD0000
direct allocation
page execute and read and write
1B1177B9000
trusted library allocation
page read and write
1B1151FD000
trusted library allocation
page read and write
41E3000
heap
page read and write
1B11C371000
trusted library allocation
page read and write
193BC0B0000
heap
page read and write
246174A0000
heap
page read and write
193C8C1D000
trusted library allocation
page read and write
1B11183A000
heap
page read and write
685000
unkown
page execute and write copy
1044000
heap
page read and write
193CAA4B000
trusted library allocation
page read and write
193C985A000
trusted library allocation
page read and write
193D44FA000
trusted library allocation
page read and write
40BF000
stack
page read and write
1B114F65000
trusted library allocation
page read and write
1B1074E5000
heap
page read and write
193D10A1000
trusted library allocation
page read and write
4701000
heap
page read and write
C30000
heap
page read and write
6831000
heap
page read and write
2E60000
direct allocation
page read and write
193CA990000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B11C2B3000
trusted library allocation
page read and write
193BC0F5000
heap
page read and write
6831000
heap
page read and write
24AF000
heap
page read and write
193D9051000
trusted library allocation
page read and write
193D8467000
trusted library allocation
page read and write
193CA78A000
trusted library allocation
page read and write
1140B38000
stack
page read and write
193D7232000
trusted library allocation
page read and write
6831000
heap
page read and write
C94000
heap
page read and write
193D3AF0000
trusted library allocation
page read and write
193C9E03000
trusted library allocation
page read and write
5010000
direct allocation
page execute and read and write
6F8000
unkown
page execute and write copy
3BB6451000
trusted library allocation
page execute read
1B116B4D000
trusted library allocation
page read and write
193D84F6000
trusted library allocation
page read and write
193CAAEF000
trusted library allocation
page read and write
1B111BFC000
trusted library allocation
page read and write
193D3CB1000
trusted library allocation
page read and write
4110000
heap
page read and write
4E30000
direct allocation
page read and write
193C8E50000
trusted library allocation
page read and write
1140B3B000
stack
page read and write
4991000
heap
page read and write
3F3F000
stack
page read and write
52A1638000
stack
page read and write
27F7000
heap
page read and write
2DCE000
stack
page read and write
67E1000
heap
page read and write
193D8473000
trusted library allocation
page read and write
BEE000
heap
page read and write
1B10694A000
trusted library allocation
page read and write
193CA7BB000
trusted library allocation
page read and write
1B115CCC000
trusted library allocation
page read and write
436E000
stack
page read and write
1B116582000
trusted library allocation
page read and write
27D0000
direct allocation
page read and write
52D0000
direct allocation
page execute and read and write
193CA9D4000
trusted library allocation
page read and write
113E2FB000
stack
page read and write
C94000
heap
page read and write
67E1000
heap
page read and write
1B10480D000
trusted library allocation
page read and write
1B115360000
trusted library section
page read and write
67E1000
heap
page read and write
1B11151E000
trusted library allocation
page read and write
193CA9C9000
trusted library allocation
page read and write
193C9421000
trusted library allocation
page read and write
1B11C3AD000
trusted library allocation
page read and write
6831000
heap
page read and write
1B107500000
heap
page read and write
6831000
heap
page read and write
5193000
direct allocation
page execute and read and write
67E1000
heap
page read and write
18A47860000
heap
page read and write
193BC0E8000
heap
page read and write
4610000
heap
page read and write
193CA3AD000
trusted library allocation
page read and write
1B1073EC000
heap
page read and write
1B11C398000
trusted library allocation
page read and write
4701000
heap
page read and write
15A19D70000
heap
page read and write
6831000
heap
page read and write
4254000
heap
page read and write
1B110DF0000
trusted library section
page readonly
1B1162D5000
trusted library allocation
page read and write
4FF0000
direct allocation
page execute and read and write
67E1000
heap
page read and write
193CAF7A000
trusted library allocation
page read and write
685000
unkown
page execute and write copy
15A19DD0000
heap
page read and write
1B11656C000
trusted library allocation
page read and write
1174000
heap
page read and write
1B115800000
trusted library allocation
page read and write
89D000
unkown
page execute and read and write
24617515000
trusted library allocation
page read and write
1B110F3C000
trusted library allocation
page read and write
193C94E0000
trusted library allocation
page read and write
3E7E000
stack
page read and write
1B110F4F000
trusted library allocation
page read and write
193BC0EF000
heap
page read and write
193D43F1000
trusted library allocation
page read and write
193CA9D4000
trusted library allocation
page read and write
423000
unkown
page readonly
1B11C320000
trusted library allocation
page read and write
193D3A89000
trusted library allocation
page read and write
1141B7D000
stack
page read and write
2E58FFA000
stack
page read and write
193CA77F000
trusted library allocation
page read and write
1B113621000
trusted library allocation
page read and write
67E1000
heap
page read and write
4E30000
direct allocation
page execute and read and write
6831000
heap
page read and write
4991000
heap
page read and write
1B1074E5000
heap
page read and write
193C90D3000
trusted library allocation
page read and write
3E8E000
stack
page read and write
350C4000
heap
page read and write
193C6E1D000
trusted library allocation
page read and write
4991000
heap
page read and write
2E60000
direct allocation
page read and write
1D64000
heap
page read and write
1B11E0F2000
trusted library allocation
page read and write
1B115526000
trusted library allocation
page read and write
6831000
heap
page read and write
1B112E03000
trusted library allocation
page read and write
1B114EBE000
trusted library allocation
page read and write
49A4000
heap
page read and write
193BC0F9000
heap
page read and write
13D4000
heap
page read and write
193C6E03000
trusted library allocation
page read and write
193D84E5000
trusted library allocation
page read and write
193BC0DD000
heap
page read and write
193C5E00000
trusted library allocation
page read and write
25D0000
heap
page read and write
193D10A7000
trusted library allocation
page read and write
357F000
stack
page read and write
193CAF9A000
trusted library allocation
page read and write
193BC081000
heap
page read and write
22C61000
heap
page read and write
193CA5E2000
trusted library allocation
page read and write
4D60000
direct allocation
page execute and read and write
529BA3C000
stack
page read and write
193DA2D7000
trusted library allocation
page read and write
1B116BAA000
trusted library allocation
page read and write
407F000
stack
page read and write
1B1068C0000
trusted library allocation
page read and write
1B11C4C2000
trusted library allocation
page read and write
1B111526000
trusted library allocation
page read and write
193C639A000
trusted library allocation
page read and write
193CAAE7000
trusted library allocation
page read and write
1B115D45000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
410E000
stack
page read and write
193C690E000
trusted library allocation
page read and write
2461737A000
trusted library allocation
page read and write
4991000
heap
page read and write
1D64000
heap
page read and write
193CA6C2000
trusted library allocation
page read and write
193C61FA000
trusted library allocation
page read and write
1B10680A000
trusted library allocation
page read and write
1B106936000
trusted library allocation
page read and write
1B116900000
trusted library allocation
page read and write
6831000
heap
page read and write
C94000
heap
page read and write
6F7000
unkown
page execute and read and write
193D108C000
trusted library allocation
page read and write
193CAF23000
trusted library allocation
page read and write
193CAF23000
trusted library allocation
page read and write
FF0000
heap
page read and write
15A1A20C000
trusted library allocation
page read and write
3E3F000
stack
page read and write
6831000
heap
page read and write
C94000
heap
page read and write
4B90000
direct allocation
page read and write
193BC0DE000
heap
page read and write
6831000
heap
page read and write
193BC0FA000
heap
page read and write
193BB581000
trusted library allocation
page read and write
25D7000
heap
page read and write
6831000
heap
page read and write
4BBF000
stack
page read and write
2610000
heap
page read and write
193D47F5000
trusted library allocation
page read and write
193D47D7000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
193CB33A000
trusted library allocation
page read and write
6831000
heap
page read and write
193BC0EA000
heap
page read and write
65F6000
heap
page read and write
1B114F8B000
trusted library allocation
page read and write
1174000
heap
page read and write
67E1000
heap
page read and write
1B10751C000
heap
page read and write
4C10000
direct allocation
page read and write
1B11579A000
trusted library allocation
page read and write
1B1136AC000
trusted library allocation
page read and write
193C9F3B000
trusted library allocation
page read and write
5154000
direct allocation
page execute and read and write
C94000
heap
page read and write
193CA358000
trusted library allocation
page read and write
1174000
heap
page read and write
193C99E0000
trusted library allocation
page read and write
193BC0E6000
heap
page read and write
1B106884000
trusted library allocation
page read and write
297B000
stack
page read and write
8370000
heap
page read and write
36FF000
stack
page read and write
193D849D000
trusted library allocation
page read and write
4D40000
direct allocation
page execute and read and write
193BC0F0000
heap
page read and write
193D8473000
trusted library allocation
page read and write
67E1000
heap
page read and write
193C989C000
trusted library allocation
page read and write
193BB5F6000
trusted library allocation
page read and write
1B114D00000
trusted library allocation
page read and write
23F3000
heap
page read and write
2EE00000
heap
page read and write
193C9B65000
trusted library allocation
page read and write
6831000
heap
page read and write
193CA1C8000
trusted library allocation
page read and write
28B0000
heap
page read and write
193D77BF000
trusted library allocation
page read and write
193CA5FA000
trusted library allocation
page read and write
193CAF15000
trusted library allocation
page read and write
193C949D000
trusted library allocation
page read and write
193D3AA9000
trusted library allocation
page read and write
193CC0B6000
trusted library allocation
page read and write
2192000
heap
page read and write
69AA000
heap
page read and write
1B117728000
trusted library allocation
page read and write
193C5E66000
trusted library allocation
page read and write
24617323000
trusted library allocation
page read and write
193BC0F5000
heap
page read and write
1174000
heap
page read and write
193C8E3A000
trusted library allocation
page read and write
BAF000
heap
page read and write
193BC0D5000
heap
page read and write
43B000
unkown
page execute and read and write
193C63FD000
trusted library allocation
page read and write
193C7A59000
trusted library allocation
page read and write
8B8000
unkown
page execute and read and write
67E1000
heap
page read and write
2B9E000
stack
page read and write
4991000
heap
page read and write
193BC0AE000
heap
page read and write
15A1A23D000
trusted library allocation
page read and write
1174000
heap
page read and write
193BC0CD000
heap
page read and write
193C5B24000
trusted library allocation
page read and write
3EBE000
stack
page read and write
193D2E72000
trusted library allocation
page read and write
28D0C000
heap
page read and write
1C64F000
stack
page read and write
193CAFB3000
trusted library allocation
page read and write
193CA9D7000
trusted library allocation
page read and write
193D84A6000
trusted library allocation
page read and write
193BC0F0000
heap
page read and write
C95000
heap
page read and write
5CF000
unkown
page execute and read and write
1B1161D1000
trusted library allocation
page read and write
15A19C40000
heap
page read and write
193C6E59000
trusted library allocation
page read and write
1174000
heap
page read and write
134D000
heap
page read and write
193C9B00000
trusted library allocation
page read and write
51E0000
direct allocation
page execute and read and write
193CC270000
trusted library allocation
page read and write
1B113663000
trusted library allocation
page read and write
6970000
heap
page read and write
6831000
heap
page read and write
3110000
heap
page read and write
5D2F9FF000
stack
page read and write
4701000
heap
page read and write
193B9300000
trusted library allocation
page read and write
437F000
stack
page read and write
427E000
stack
page read and write
68D000
unkown
page readonly
193CA9DA000
trusted library allocation
page read and write
193BC10D000
heap
page read and write
193C9EC7000
trusted library allocation
page read and write
370E000
stack
page read and write
2920000
direct allocation
page read and write
193D8AEE000
trusted library allocation
page read and write
22C69000
heap
page read and write
24617366000
trusted library allocation
page read and write
244C000
unkown
page readonly
193C73BF000
trusted library allocation
page read and write
49F000
unkown
page execute and read and write
193C9A7A000
trusted library allocation
page read and write
193D8488000
trusted library allocation
page read and write
24616FC0000
unclassified section
page readonly
3D1000
unkown
page execute and write copy
193BC0E8000
heap
page read and write
2E60000
direct allocation
page read and write
C94000
heap
page read and write
193D12C3000
trusted library allocation
page read and write
193D44A6000
trusted library allocation
page read and write
193CA9D7000
trusted library allocation
page read and write
193C98EE000
trusted library allocation
page read and write
1B11BF22000
trusted library allocation
page read and write
1B111B73000
trusted library allocation
page read and write
6831000
heap
page read and write
51A4000
direct allocation
page execute and read and write
1B117538000
trusted library allocation
page read and write
67E1000
heap
page read and write
193BC0F0000
heap
page read and write
193C9FD5000
trusted library allocation
page read and write
193D8DE3000
trusted library allocation
page read and write
323E000
stack
page read and write
193C68FD000
trusted library allocation
page read and write
193BC0B9000
heap
page read and write
193D10FB000
trusted library allocation
page read and write
4991000
heap
page read and write
1174000
heap
page read and write
193D3A94000
trusted library allocation
page read and write
3B7F000
stack
page read and write
28D86000
heap
page read and write
4C90000
direct allocation
page execute and read and write
1B110F6E000
trusted library allocation
page read and write
FF4000
heap
page read and write
1044000
heap
page read and write
1B113600000
trusted library allocation
page read and write
20ED000
heap
page read and write
6831000
heap
page read and write
394F000
stack
page read and write
1B1155C7000
trusted library allocation
page read and write
497E000
stack
page read and write
2816000
heap
page read and write
193C9BFE000
trusted library allocation
page read and write
193BC0F0000
heap
page read and write
13B0000
heap
page read and write
193D4458000
trusted library allocation
page read and write
193CAF72000
trusted library allocation
page read and write
6831000
heap
page read and write
529AEFE000
stack
page read and write
6F7000
unkown
page execute and read and write
587000
unkown
page execute and read and write
1B116A03000
trusted library allocation
page read and write
193C5E44000
trusted library allocation
page read and write
1174000
heap
page read and write
1B11BFA9000
trusted library allocation
page read and write
6831000
heap
page read and write
193CA758000
trusted library allocation
page read and write
193C8C46000
trusted library allocation
page read and write
1B11BF33000
trusted library allocation
page read and write
113DFD8000
stack
page read and write
1B116A9E000
trusted library allocation
page read and write
18A47B00000
trusted library allocation
page read and write
28CE0000
heap
page read and write
193BB75C000
heap
page read and write
67E1000
heap
page read and write
1B11C444000
trusted library allocation
page read and write
6831000
heap
page read and write
1B11C1D1000
trusted library allocation
page read and write
193BC0E8000
heap
page read and write
193BC0F0000
heap
page read and write
1174000
heap
page read and write
5210000
direct allocation
page execute and read and write
1B1074F0000
heap
page read and write
4EDE000
stack
page read and write
1B1161C6000
trusted library allocation
page read and write
1B112B89000
trusted library allocation
page read and write
193D841D000
trusted library allocation
page read and write
1B1136CE000
trusted library allocation
page read and write
272A000
heap
page read and write
52A223D000
stack
page read and write
193C9B24000
trusted library allocation
page read and write
193C6852000
trusted library allocation
page read and write
67E1000
heap
page read and write
193D442D000
trusted library allocation
page read and write
6831000
heap
page read and write
193C9386000
trusted library allocation
page read and write
1174000
heap
page read and write
1FFA000
heap
page read and write
193CAAE7000
trusted library allocation
page read and write
67E1000
heap
page read and write
34EF000
stack
page read and write
1B11280D000
trusted library allocation
page read and write
357E000
stack
page read and write
113E3FF000
stack
page read and write
193D4471000
trusted library allocation
page read and write
1B115A8D000
trusted library allocation
page read and write
4991000
heap
page read and write
1B113627000
trusted library allocation
page read and write
1B11D6CF000
trusted library allocation
page read and write
193C9E21000
trusted library allocation
page read and write
1174000
heap
page read and write
1B11583C000
trusted library allocation
page read and write
175E000
stack
page read and write
193BB750000
heap
page read and write
193C6520000
heap
page read and write
4C0F000
stack
page read and write
193D127D000
trusted library allocation
page read and write
53C0000
heap
page read and write
3B6F000
stack
page read and write
6831000
heap
page read and write
193C92C6000
trusted library allocation
page read and write
67E1000
heap
page read and write
193C5D00000
trusted library allocation
page read and write
45CF000
stack
page read and write
24617430000
heap
page read and write
193CAE83000
trusted library allocation
page read and write
193D47EA000
trusted library allocation
page read and write
193C9616000
heap
page read and write
52A33FE000
stack
page read and write
1174000
heap
page read and write
193BC0FA000
heap
page read and write
41EC000
heap
page read and write
52CE000
stack
page read and write
18A47CA5000
heap
page read and write
193CA3AD000
trusted library allocation
page read and write
193CACAF000
trusted library allocation
page read and write
BD0000
heap
page read and write
1B110F6C000
trusted library allocation
page read and write
6831000
heap
page read and write
6C6D0000
unkown
page readonly
193CA956000
trusted library allocation
page read and write
67E1000
heap
page read and write
193CA98B000
trusted library allocation
page read and write
193BC0F5000
heap
page read and write
193BC0EA000
heap
page read and write
193BC0F9000
heap
page read and write
193BB5DA000
trusted library allocation
page read and write
67E1000
heap
page read and write
34BE000
stack
page read and write
4A50000
heap
page read and write
15A1A023000
trusted library allocation
page read and write
567F000
stack
page read and write
49A0000
heap
page read and write
193D4495000
trusted library allocation
page read and write
193D449F000
trusted library allocation
page read and write
193C7500000
trusted library allocation
page read and write
131E000
heap
page read and write
193BC0BF000
heap
page read and write
193D85EC000
trusted library allocation
page read and write
193D8479000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B104790000
heap
page read and write
193C5A4A000
trusted library allocation
page read and write
1B110F8A000
trusted library allocation
page read and write
529ACBD000
stack
page read and write
13FA000
heap
page read and write
193BB6FD000
heap
page read and write
1B115DBF000
trusted library allocation
page read and write
67E1000
heap
page read and write
193D4481000
trusted library allocation
page read and write
C94000
heap
page read and write
18A479C8000
heap
page read and write
1B11D47E000
trusted library allocation
page read and write
193CA047000
trusted library allocation
page read and write
67E1000
heap
page read and write
3A2E000
stack
page read and write
193D47E3000
trusted library allocation
page read and write
193CAF0E000
trusted library allocation
page read and write
193D1077000
trusted library allocation
page read and write
193CAFC3000
trusted library allocation
page read and write
397E000
stack
page read and write
1B11C415000
trusted library allocation
page read and write
193BC0AE000
heap
page read and write
193D84F1000
trusted library allocation
page read and write
1174000
heap
page read and write
1F4E000
heap
page read and write
1B1074E4000
heap
page read and write
1B11E608000
trusted library allocation
page read and write
6C950000
unkown
page read and write
193B9230000
heap
page read and write
1B114EC9000
trusted library allocation
page read and write
1B11BF9B000
trusted library allocation
page read and write
193CA98B000
trusted library allocation
page read and write
194000
stack
page read and write
13D4000
heap
page read and write
193B90B0000
unclassified section
page readonly
193CA4F6000
trusted library allocation
page read and write
193C9A9C000
trusted library allocation
page read and write
1B1067D1000
trusted library allocation
page read and write
193D8E00000
trusted library allocation
page read and write
193CA364000
trusted library allocation
page read and write
193C6171000
trusted library allocation
page read and write
1174000
heap
page read and write
1174000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
67E1000
heap
page read and write
193D3AE8000
trusted library allocation
page read and write
193D8458000
trusted library allocation
page read and write
1B114E62000
trusted library allocation
page read and write
22C75000
heap
page read and write
3FBE000
stack
page read and write
6831000
heap
page read and write
1B1065D2000
unclassified section
page read and write
1B116948000
trusted library allocation
page read and write
529BE3D000
stack
page read and write
67E1000
heap
page read and write
4991000
heap
page read and write
27D0000
direct allocation
page read and write
1B114EA7000
trusted library allocation
page read and write
1B114F98000
trusted library allocation
page read and write
1B116A4D000
trusted library allocation
page read and write
447E000
stack
page read and write
1B1155A7000
trusted library allocation
page read and write
6831000
heap
page read and write
1B106982000
trusted library allocation
page read and write
50B0000
direct allocation
page read and write
C94000
heap
page read and write
193C7A74000
trusted library allocation
page read and write
248D000
heap
page read and write
113E03E000
stack
page read and write
1B11BF93000
trusted library allocation
page read and write
3B7F000
stack
page read and write
6C74D000
unkown
page readonly
193C9200000
trusted library allocation
page read and write
22C61000
heap
page read and write
193CB33C000
trusted library allocation
page read and write
1B116B6E000
trusted library allocation
page read and write
193D3CD3000
trusted library allocation
page read and write
1B11C112000
trusted library allocation
page read and write
1B116BB7000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B118B0C000
trusted library allocation
page read and write
1B11DF92000
trusted library allocation
page read and write
193BB73F000
heap
page read and write
2D8F000
stack
page read and write
37EE000
stack
page read and write
193D9CA8000
trusted library allocation
page read and write
1B11277D000
trusted library allocation
page read and write
6831000
heap
page read and write
1B112C65000
trusted library allocation
page read and write
6831000
heap
page read and write
193CB7E0000
trusted library allocation
page read and write
193D8473000
trusted library allocation
page read and write
193BC0E8000
heap
page read and write
1B116697000
trusted library allocation
page read and write
6831000
heap
page read and write
193C73CC000
trusted library allocation
page read and write
193D8488000
trusted library allocation
page read and write
228D000
heap
page read and write
EFD000
stack
page read and write
4D20000
direct allocation
page execute and read and write
1B11B900000
trusted library allocation
page read and write
193D8492000
trusted library allocation
page read and write
193C639A000
trusted library allocation
page read and write
1B11BB7A000
trusted library allocation
page read and write
193D84FC000
trusted library allocation
page read and write
1B11583A000
trusted library allocation
page read and write
1DD5000
heap
page read and write
193C9A9F000
trusted library allocation
page read and write
6831000
heap
page read and write
1174000
heap
page read and write
193CAE03000
trusted library allocation
page read and write
9C000
stack
page read and write
6831000
heap
page read and write
4E9E000
stack
page read and write
193CAF95000
trusted library allocation
page read and write
193BB4FE000
trusted library allocation
page read and write
193CAF47000
trusted library allocation
page read and write
BCE000
heap
page read and write
6831000
heap
page read and write
1B107511000
heap
page read and write
67E1000
heap
page read and write
4D00000
direct allocation
page execute and read and write
1B1127B2000
trusted library allocation
page read and write
67E1000
heap
page read and write
193C8D03000
trusted library allocation
page read and write
193C9AE2000
trusted library allocation
page read and write
1B1161ED000
trusted library allocation
page read and write
193D44CD000
trusted library allocation
page read and write
1174000
heap
page read and write
193CA041000
trusted library allocation
page read and write
193C695A000
trusted library allocation
page read and write
193BC0FC000
heap
page read and write
1B1074E5000
heap
page read and write
193BC0CF000
heap
page read and write
1100000
direct allocation
page read and write
3DFF000
stack
page read and write
1B11E054000
trusted library allocation
page read and write
193D44C8000
trusted library allocation
page read and write
1B114FFE000
trusted library allocation
page read and write
193BC0F5000
heap
page read and write
1174000
heap
page read and write
41AE000
stack
page read and write
452F000
stack
page read and write
609000
unkown
page write copy
FF4000
heap
page read and write
C94000
heap
page read and write
1B11757A000
trusted library allocation
page read and write
193C7003000
trusted library allocation
page read and write
6831000
heap
page read and write
470F000
stack
page read and write
2B2E000
stack
page read and write
193CA9D0000
trusted library allocation
page read and write
193C6303000
trusted library allocation
page read and write
32BF000
stack
page read and write
1B114E13000
trusted library allocation
page read and write
6831000
heap
page read and write
4701000
heap
page read and write
12FB000
heap
page read and write
67E1000
heap
page read and write
BE0000
direct allocation
page read and write
696000
unkown
page execute and read and write
1B115584000
trusted library allocation
page read and write
193BC0EF000
heap
page read and write
1B116308000
trusted library allocation
page read and write
1BE6A7E000
stack
page read and write
3D1000
unkown
page execute and write copy
193CA5B8000
trusted library allocation
page read and write
22C93000
heap
page read and write
6831000
heap
page read and write
4C20000
direct allocation
page execute and read and write
193CB34E000
trusted library allocation
page read and write
193C8F00000
trusted library allocation
page read and write
1B115A03000
trusted library allocation
page read and write
193D12AB000
trusted library allocation
page read and write
1B10698B000
trusted library allocation
page read and write
193CA7B8000
trusted library allocation
page read and write
35BE000
stack
page read and write
6831000
heap
page read and write
51AC000
direct allocation
page execute and read and write
11474FE000
stack
page read and write
1B104894000
trusted library allocation
page read and write
1B1074F5000
heap
page read and write
C94000
heap
page read and write
1B11BB00000
trusted library allocation
page read and write
1B1074F1000
heap
page read and write
1B104730000
heap
page readonly
609000
unkown
page read and write
474E000
stack
page read and write
193C8D76000
trusted library allocation
page read and write
1B1152DF000
trusted library allocation
page read and write
6831000
heap
page read and write
1B11779C000
trusted library allocation
page read and write
193C9A9C000
trusted library allocation
page read and write
193D44FD000
trusted library allocation
page read and write
1B112E80000
trusted library allocation
page read and write
193CAFCA000
trusted library allocation
page read and write
193C6D00000
trusted library allocation
page read and write
193CA753000
trusted library allocation
page read and write
4C10000
direct allocation
page read and write
1B111AFC000
trusted library allocation
page read and write
4D90000
direct allocation
page execute and read and write
447F000
stack
page read and write
1B11E0F9000
trusted library allocation
page read and write
1B11BBE3000
trusted library allocation
page read and write
193CAB6E000
trusted library allocation
page read and write
193C6864000
trusted library allocation
page read and write
193D1265000
trusted library allocation
page read and write
1B116412000
trusted library allocation
page read and write
193D3A26000
trusted library allocation
page read and write
1B110DB0000
trusted library section
page read and write
161E000
stack
page read and write
193BC0DE000
heap
page read and write
193D3AFE000
trusted library allocation
page read and write
4DD0000
direct allocation
page execute and read and write
193D84FC000
trusted library allocation
page read and write
BEE000
heap
page read and write
6831000
heap
page read and write
1CA1D000
stack
page read and write
193BC0FA000
heap
page read and write
498F000
stack
page read and write
1B106932000
trusted library allocation
page read and write
1B114F61000
trusted library allocation
page read and write
193C9AE2000
trusted library allocation
page read and write
193BC0E8000
heap
page read and write
193D47EA000
trusted library allocation
page read and write
193C5A52000
trusted library allocation
page read and write
114543D000
stack
page read and write
1B118B24000
trusted library allocation
page read and write
15A19B60000
unclassified section
page readonly
193CA923000
trusted library allocation
page read and write
1174000
heap
page read and write
193C5C04000
trusted library allocation
page read and write
44CE000
stack
page read and write
193BC0E0000
heap
page read and write
193D3A9E000
trusted library allocation
page read and write
1B1074F0000
heap
page read and write
1B11BF28000
trusted library allocation
page read and write
1B111582000
trusted library allocation
page read and write
193D44A9000
trusted library allocation
page read and write
193C9C81000
trusted library allocation
page read and write
4991000
heap
page read and write
1B1074E5000
heap
page read and write
8B9000
unkown
page execute and write copy
193D44E1000
trusted library allocation
page read and write
193BB5C6000
trusted library allocation
page read and write
193D423C000
trusted library allocation
page read and write
6831000
heap
page read and write
193CAFCA000
trusted library allocation
page read and write
193C8E03000
trusted library allocation
page read and write
193C9EBA000
trusted library allocation
page read and write
193CB341000
trusted library allocation
page read and write
193D846B000
trusted library allocation
page read and write
FF4000
heap
page read and write
193D47FC000
trusted library allocation
page read and write
401000
unkown
page execute read
193D8488000
trusted library allocation
page read and write
4E20000
direct allocation
page execute and read and write
1B116060000
trusted library section
page readonly
C94000
heap
page read and write
1B107435000
heap
page read and write
1B114ECE000
trusted library allocation
page read and write
193CA96E000
trusted library allocation
page read and write
1147F0A000
stack
page read and write
4FA0000
direct allocation
page execute and read and write
1B117675000
trusted library allocation
page read and write
28D15000
heap
page read and write
1B11E084000
trusted library allocation
page read and write
11CE000
stack
page read and write
67E1000
heap
page read and write
193CA927000
trusted library allocation
page read and write
1B1152D6000
trusted library allocation
page read and write
22C92000
heap
page read and write
C94000
heap
page read and write
1B116ABF000
trusted library allocation
page read and write
193C63E8000
trusted library allocation
page read and write
193BC0AF000
heap
page read and write
193BC0CE000
heap
page read and write
1C0000
heap
page read and write
193D8482000
trusted library allocation
page read and write
193D44CD000
trusted library allocation
page read and write
193D8479000
trusted library allocation
page read and write
4C10000
direct allocation
page read and write
1B1066E6000
trusted library allocation
page read and write
193BC0F5000
heap
page read and write
4ADE000
stack
page read and write
1BE369E000
unkown
page readonly
193CA97C000
trusted library allocation
page read and write
4DA0000
direct allocation
page execute and read and write
6831000
heap
page read and write
531E000
stack
page read and write
193BC0F2000
heap
page read and write
193CA358000
trusted library allocation
page read and write
113E37E000
stack
page read and write
344F000
stack
page read and write
6831000
heap
page read and write
193D849B000
trusted library allocation
page read and write
1B115DB4000
trusted library allocation
page read and write
113F03E000
stack
page read and write
231A000
heap
page read and write
6831000
heap
page read and write
193BC0CE000
heap
page read and write
4C20000
direct allocation
page execute and read and write
193D3A9E000
trusted library allocation
page read and write
6831000
heap
page read and write
2E60000
direct allocation
page read and write
193CA5CC000
trusted library allocation
page read and write
8B000
unkown
page execute and read and write
193CC25B000
trusted library allocation
page read and write
1B10667A000
trusted library allocation
page read and write
31BE000
stack
page read and write
6831000
heap
page read and write
193D1295000
trusted library allocation
page read and write
40BF000
stack
page read and write
193BC0D1000
heap
page read and write
1B1074EB000
heap
page read and write
193C7043000
trusted library allocation
page read and write
1B1161F9000
trusted library allocation
page read and write
4707000
heap
page read and write
1B11692C000
trusted library allocation
page read and write
193C5A6B000
trusted library allocation
page read and write
193C62A4000
trusted library allocation
page read and write
193D44DF000
trusted library allocation
page read and write
193BB5F2000
trusted library allocation
page read and write
193D849B000
trusted library allocation
page read and write
193BC0A7000
heap
page read and write
193C90D7000
trusted library allocation
page read and write
50822D0B000
trusted library allocation
page read and write
1B112ECA000
trusted library allocation
page read and write
193BC0DD000
heap
page read and write
193D47ED000
trusted library allocation
page read and write
193CAF88000
trusted library allocation
page read and write
1B1155B7000
trusted library allocation
page read and write
D60000
heap
page read and write
2464000
heap
page read and write
193CAAB2000
trusted library allocation
page read and write
1F5FF007000
trusted library allocation
page read and write
1B1175BE000
trusted library allocation
page read and write
6831000
heap
page read and write
193BC104000
heap
page read and write
52A533E000
stack
page read and write
114523B000
stack
page read and write
1174000
heap
page read and write
1B107401000
heap
page read and write
15A1A000000
trusted library allocation
page read and write
44FE000
stack
page read and write
193D47AA000
trusted library allocation
page read and write
193CAF6E000
trusted library allocation
page read and write
3E9C36B00000
trusted library allocation
page read and write
193C8C46000
trusted library allocation
page read and write
193CAF65000
trusted library allocation
page read and write
1B11D96B000
trusted library allocation
page read and write
30BE000
stack
page read and write
193CAF00000
trusted library allocation
page read and write
28D01000
heap
page read and write
193BB4EB000
trusted library allocation
page read and write
18A49548000
heap
page read and write
46F0000
direct allocation
page read and write
2E60000
direct allocation
page read and write
4991000
heap
page read and write
649000
unkown
page execute and read and write
6831000
heap
page read and write
1B11615E000
trusted library allocation
page read and write
193CA912000
trusted library allocation
page read and write
1174000
heap
page read and write
193D47DC000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
193D89C7000
trusted library allocation
page read and write
193D3A94000
trusted library allocation
page read and write
193BB6FB000
heap
page read and write
6831000
heap
page read and write
6831000
heap
page read and write
193C6182000
trusted library allocation
page read and write
7E9B000
stack
page read and write
193BC0D4000
heap
page read and write
6831000
heap
page read and write
1D30000
direct allocation
page execute and read and write
193CAF65000
trusted library allocation
page read and write
1294000
heap
page read and write
529AB3A000
stack
page read and write
1280000
heap
page read and write
393F000
stack
page read and write
1174000
heap
page read and write
1B1068AD000
trusted library allocation
page read and write
193D44A3000
trusted library allocation
page read and write
6831000
heap
page read and write
1174000
heap
page read and write
193BC0D5000
heap
page read and write
40AE000
stack
page read and write
24617420000
unclassified section
page read and write
1B114EDE000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B106624000
trusted library allocation
page read and write
1B11E0F2000
trusted library allocation
page read and write
193BC0F1000
heap
page read and write
193C9ABB000
trusted library allocation
page read and write
3F7E000
stack
page read and write
22C6E000
heap
page read and write
1B11EB48000
trusted library allocation
page read and write
193CA503000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
67E1000
heap
page read and write
193CA100000
trusted library allocation
page read and write
26E0000
heap
page read and write
193BC0F1000
heap
page read and write
193D12AB000
trusted library allocation
page read and write
193BC0F0000
heap
page read and write
193DA285000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
193CA663000
trusted library allocation
page read and write
B5D000
stack
page read and write
4DB0000
direct allocation
page execute and read and write
2920000
direct allocation
page read and write
193BC0F5000
heap
page read and write
1174000
heap
page read and write
4D90000
direct allocation
page execute and read and write
439000
unkown
page read and write
1040000
heap
page read and write
193C8CE5000
trusted library allocation
page read and write
27D0000
direct allocation
page read and write
193D3AFE000
trusted library allocation
page read and write
1174000
heap
page read and write
193BC0C5000
heap
page read and write
4D50000
direct allocation
page execute and read and write
4DB0000
direct allocation
page execute and read and write
1B110E34000
trusted library allocation
page read and write
47B0000
heap
page read and write
4701000
heap
page read and write
1B1074F0000
heap
page read and write
22C5B000
heap
page read and write
22C75000
heap
page read and write
193D8479000
trusted library allocation
page read and write
193CAFA8000
trusted library allocation
page read and write
1B116557000
trusted library allocation
page read and write
193CA6F2000
trusted library allocation
page read and write
1B114E6F000
trusted library allocation
page read and write
67E1000
heap
page read and write
193D44EA000
trusted library allocation
page read and write
3FFE000
stack
page read and write
427000
unkown
page write copy
193C8C0B000
trusted library allocation
page read and write
193C9087000
trusted library allocation
page read and write
37BF000
stack
page read and write
193BC0F4000
heap
page read and write
1174000
heap
page read and write
193D44DF000
trusted library allocation
page read and write
42FF000
stack
page read and write
193CAF65000
trusted library allocation
page read and write
193D84F6000
trusted library allocation
page read and write
1B111B69000
trusted library allocation
page read and write
2920000
direct allocation
page read and write
69D0000
heap
page read and write
1E86000
heap
page read and write
4C21000
heap
page read and write
4701000
heap
page read and write
193C9EB5000
trusted library allocation
page read and write
2FC1160F2000
trusted library allocation
page read and write
54A0000
direct allocation
page execute and read and write
460E000
stack
page read and write
1B11D967000
trusted library allocation
page read and write
1B11C1A2000
trusted library allocation
page read and write
1B11BF63000
trusted library allocation
page read and write
1B11C366000
trusted library allocation
page read and write
1B1073E9000
heap
page read and write
427E000
stack
page read and write
C94000
heap
page read and write
41E0000
heap
page read and write
193DA2D1000
trusted library allocation
page read and write
1B115545000
trusted library allocation
page read and write
1F5FEF00000
trusted library allocation
page read and write
193BC0BF000
heap
page read and write
193C8C36000
trusted library allocation
page read and write
6831000
heap
page read and write
1B115503000
trusted library allocation
page read and write
6831000
heap
page read and write
52A38BB000
stack
page read and write
26DF000
stack
page read and write
193D3A9A000
trusted library allocation
page read and write
193C5E82000
trusted library allocation
page read and write
193D444F000
trusted library allocation
page read and write
1174000
heap
page read and write
1B112700000
trusted library allocation
page read and write
1B11D61F000
trusted library allocation
page read and write
1B11330A000
trusted library allocation
page read and write
25AE000
stack
page read and write
1B112B03000
trusted library allocation
page read and write
3CFF000
stack
page read and write
642000
unkown
page execute and read and write
334E000
stack
page read and write
1F4D000
heap
page read and write
193D7B04000
trusted library allocation
page read and write
67E1000
heap
page read and write
6831000
heap
page read and write
193CAF9A000
trusted library allocation
page read and write
3EEF000
stack
page read and write
2E597FE000
stack
page read and write
193D4497000
trusted library allocation
page read and write
193C90BC000
trusted library allocation
page read and write
1B11D96F000
trusted library allocation
page read and write
1B1074E3000
heap
page read and write
6831000
heap
page read and write
193BB73F000
heap
page read and write
1B11BF98000
trusted library allocation
page read and write
1B11BF57000
trusted library allocation
page read and write
193CAFB7000
trusted library allocation
page read and write
1B106603000
trusted library allocation
page read and write
28FE000
stack
page read and write
1144000
heap
page read and write
1B114FF3000
trusted library allocation
page read and write
193C91BE000
trusted library allocation
page read and write
6831000
heap
page read and write
2461736E000
trusted library allocation
page read and write
46BF000
stack
page read and write
193D8499000
trusted library allocation
page read and write
6831000
heap
page read and write
193D7811000
trusted library allocation
page read and write
193C5E5E000
trusted library allocation
page read and write
193D3AE4000
trusted library allocation
page read and write
683C000
heap
page read and write
1B11EB17000
trusted library allocation
page read and write
193CAA8A000
trusted library allocation
page read and write
18A4954D000
heap
page read and write
193C707C000
trusted library allocation
page read and write
67E1000
heap
page read and write
19E000
stack
page read and write
1100000
direct allocation
page read and write
1B115BDB000
trusted library allocation
page read and write
193BB58A000
trusted library allocation
page read and write
1F0000
heap
page read and write
1B116800000
trusted library allocation
page read and write
193BC0C0000
heap
page read and write
193D44FA000
trusted library allocation
page read and write
6831000
heap
page read and write
1B112EA1000
trusted library allocation
page read and write
6831000
heap
page read and write
2E60000
direct allocation
page read and write
193BC0E0000
heap
page read and write
C94000
heap
page read and write
193B90D0000
heap
page read and write
1B11619A000
trusted library allocation
page read and write
193CAFB7000
trusted library allocation
page read and write
193BC0E0000
heap
page read and write
1044000
heap
page read and write
67E1000
heap
page read and write
3BB6421000
trusted library allocation
page execute read
6831000
heap
page read and write
193C9CC1000
trusted library allocation
page read and write
37FE000
stack
page read and write
67E1000
heap
page read and write
1B11BB5E000
trusted library allocation
page read and write
6DB0000
heap
page read and write
5080000
heap
page read and write
193BC0F2000
heap
page read and write
C08000
heap
page read and write
1B115286000
trusted library allocation
page read and write
193CA97C000
trusted library allocation
page read and write
193CC0FC000
trusted library allocation
page read and write
193CAFA8000
trusted library allocation
page read and write
193BC0E6000
heap
page read and write
193D1084000
trusted library allocation
page read and write
1B113000000
trusted library allocation
page read and write
1B116AE7000
trusted library allocation
page read and write
4991000
heap
page read and write
193D449B000
trusted library allocation
page read and write
193D4763000
trusted library allocation
page read and write
193C639A000
trusted library allocation
page read and write
873000
unkown
page execute and read and write
1B112E8B000
trusted library allocation
page read and write
193C8E72000
trusted library allocation
page read and write
67E1000
heap
page read and write
193BC0DD000
heap
page read and write
4991000
heap
page read and write
3D3F000
stack
page read and write
4991000
heap
page read and write
11413FE000
stack
page read and write
FF4000
heap
page read and write
193C98E5000
trusted library allocation
page read and write
67E1000
heap
page read and write
C94000
heap
page read and write
193BC0F0000
heap
page read and write
67E1000
heap
page read and write
193D84F1000
trusted library allocation
page read and write
193D3A9E000
trusted library allocation
page read and write
514B000
stack
page read and write
6831000
heap
page read and write
193D4424000
trusted library allocation
page read and write
1B1066EB000
trusted library allocation
page read and write
1B11C300000
trusted library allocation
page read and write
1B11C35B000
trusted library allocation
page read and write
193CA9CC000
trusted library allocation
page read and write
6831000
heap
page read and write
193D44B9000
trusted library allocation
page read and write
268F000
heap
page read and write
193D849D000
trusted library allocation
page read and write
193BC0F2000
heap
page read and write
193C7000000
trusted library allocation
page read and write
1B1066C5000
trusted library allocation
page read and write
193BB5F2000
trusted library allocation
page read and write
193CAD32000
trusted library allocation
page read and write
193CA770000
trusted library allocation
page read and write
1BFF000
stack
page read and write
4A90000
direct allocation
page read and write
4D1000
unkown
page execute and read and write
193BC0D4000
heap
page read and write
1B116201000
trusted library allocation
page read and write
6831000
heap
page read and write
1B1155BC000
trusted library allocation
page read and write
193BC0F0000
heap
page read and write
1B106260000
heap
page read and write
1B111800000
heap
page read and write
1B114EB1000
trusted library allocation
page read and write
1B112C4D000
trusted library allocation
page read and write
18A47B0A000
trusted library allocation
page read and write
193C9E66000
trusted library allocation
page read and write
193BB6FD000
heap
page read and write
193C6EBB000
trusted library allocation
page read and write
4601000
heap
page read and write
529AE8F000
stack
page read and write
40BE000
stack
page read and write
6831000
heap
page read and write
193C5AB3000
trusted library allocation
page read and write
193C9450000
trusted library allocation
page read and write
1B114EE6000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
4701000
heap
page read and write
67E1000
heap
page read and write
114810E000
stack
page read and write
193D3512000
trusted library allocation
page read and write
1B11E096000
trusted library allocation
page read and write
1B114E9E000
trusted library allocation
page read and write
529BC7E000
stack
page read and write
193D848D000
trusted library allocation
page read and write
1B1151EE000
trusted library allocation
page read and write
C94000
heap
page read and write
193CAFB0000
trusted library allocation
page read and write
193D848B000
trusted library allocation
page read and write
4BC0000
direct allocation
page read and write
1B112C80000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B11578B000
trusted library allocation
page read and write
193D8458000
trusted library allocation
page read and write
193C73BD000
trusted library allocation
page read and write
1044000
heap
page read and write
193C5E1E000
trusted library allocation
page read and write
1174000
heap
page read and write
193BC0C3000
heap
page read and write
193CAF7A000
trusted library allocation
page read and write
22C92000
heap
page read and write
38EE000
stack
page read and write
193D3A89000
trusted library allocation
page read and write
1B111515000
trusted library allocation
page read and write
193CA9F9000
trusted library allocation
page read and write
67E1000
heap
page read and write
5430000
direct allocation
page execute and read and write
193D8A2F000
trusted library allocation
page read and write
193BC0CD000
heap
page read and write
1B116AB7000
trusted library allocation
page read and write
1B114EB1000
trusted library allocation
page read and write
193C9946000
trusted library allocation
page read and write
193CA79E000
trusted library allocation
page read and write
6831000
heap
page read and write
193CA9A5000
trusted library allocation
page read and write
193CAA7F000
trusted library allocation
page read and write
2FC116004000
trusted library allocation
page read and write
9C000
stack
page read and write
4C6E000
stack
page read and write
246173C6000
trusted library allocation
page read and write
52A38FB000
stack
page read and write
193CC268000
trusted library allocation
page read and write
193CA98D000
trusted library allocation
page read and write
193BB3B7000
trusted library allocation
page read and write
193BB5C6000
trusted library allocation
page read and write
1B118B12000
trusted library allocation
page read and write
9A4000
heap
page read and write
1B116944000
trusted library allocation
page read and write
193D442D000
trusted library allocation
page read and write
C94000
heap
page read and write
193BC0F5000
heap
page read and write
193D8DF4000
trusted library allocation
page read and write
193CA6F5000
trusted library allocation
page read and write
193C94AD000
trusted library allocation
page read and write
193D47F5000
trusted library allocation
page read and write
193D89E3000
trusted library allocation
page read and write
C94000
heap
page read and write
1B112EA1000
trusted library allocation
page read and write
193C968A000
heap
page read and write
1B1068A5000
trusted library allocation
page read and write
13D4000
heap
page read and write
18A49530000
heap
page read and write
193D8413000
trusted library allocation
page read and write
1B110FF1000
trusted library allocation
page read and write
193D849B000
trusted library allocation
page read and write
22C50000
heap
page read and write
193BC0CD000
heap
page read and write
193C7208000
trusted library allocation
page read and write
2ABE000
stack
page read and write
183E000
stack
page read and write
1B112800000
trusted library allocation
page read and write
1B1073FC000
heap
page read and write
193BC0DE000
heap
page read and write
4C10000
direct allocation
page read and write
1B115B7B000
trusted library allocation
page read and write
1D64000
heap
page read and write
1B117500000
trusted library allocation
page read and write
1B114EB1000
trusted library allocation
page read and write
20BB000
heap
page read and write
193C5E1A000
trusted library allocation
page read and write
3F2F000
stack
page read and write
4701000
heap
page read and write
193C8C51000
trusted library allocation
page read and write
193BB75C000
heap
page read and write
193D8454000
trusted library allocation
page read and write
4701000
heap
page read and write
6831000
heap
page read and write
27D0000
direct allocation
page read and write
1146B7E000
stack
page read and write
67E1000
heap
page read and write
193D449B000
trusted library allocation
page read and write
E25000
unkown
page execute and write copy
6831000
heap
page read and write
67E1000
heap
page read and write
3ABF000
stack
page read and write
193D47DA000
trusted library allocation
page read and write
67E1000
heap
page read and write
4701000
heap
page read and write
1322000
heap
page read and write
193C9EC3000
trusted library allocation
page read and write
193CB77B000
trusted library allocation
page read and write
52A2ABD000
stack
page read and write
193CAD20000
trusted library allocation
page read and write
100E000
stack
page read and write
1B11C269000
trusted library allocation
page read and write
193BC0F4000
heap
page read and write
1174000
heap
page read and write
1B11D67B000
trusted library allocation
page read and write
1B107506000
heap
page read and write
193BC0CD000
heap
page read and write
67E1000
heap
page read and write
51A4000
direct allocation
page execute and read and write
67E1000
heap
page read and write
6831000
heap
page read and write
193BB565000
trusted library allocation
page read and write
6831000
heap
page read and write
1144000
heap
page read and write
1B116070000
trusted library section
page readonly
1174000
heap
page read and write
193BC0F5000
heap
page read and write
4C30000
heap
page read and write
529F631000
unkown
page read and write
CFD000
stack
page read and write
193CAF88000
trusted library allocation
page read and write
529F23E000
stack
page read and write
193CAC47000
trusted library allocation
page read and write
1B11E0A7000
trusted library allocation
page read and write
1B11DDE6000
trusted library allocation
page read and write
244C000
unkown
page readonly
193CA610000
trusted library allocation
page read and write
466F000
stack
page read and write
6831000
heap
page read and write
6831000
heap
page read and write
1B1136DC000
trusted library allocation
page read and write
22C7D000
heap
page read and write
52A387C000
stack
page read and write
193C9AE2000
trusted library allocation
page read and write
1B110F0C000
trusted library allocation
page read and write
13D4000
heap
page read and write
67E1000
heap
page read and write
193C929E000
trusted library allocation
page read and write
358E000
stack
page read and write
193C5B4D000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B112DB5000
trusted library allocation
page read and write
193BC0D5000
heap
page read and write
C94000
heap
page read and write
C95000
heap
page read and write
366F000
stack
page read and write
80DE000
stack
page read and write
193CA36C000
trusted library allocation
page read and write
2B5E000
stack
page read and write
193CA736000
trusted library allocation
page read and write
9EC2AA1000
trusted library allocation
page execute read
5341000
direct allocation
page read and write
4D6F000
stack
page read and write
193C9695000
heap
page read and write
193C6316000
trusted library allocation
page read and write
3D7352104000
trusted library allocation
page read and write
1B116561000
trusted library allocation
page read and write
1B1200EB000
trusted library allocation
page read and write
193D7B00000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B11BB1F000
trusted library allocation
page read and write
193D779C000
trusted library allocation
page read and write
193C95F9000
trusted library allocation
page read and write
333F000
stack
page read and write
193CA983000
trusted library allocation
page read and write
2231000
heap
page read and write
193BB70F000
heap
page read and write
127E000
stack
page read and write
12FD000
heap
page read and write
47B1000
heap
page read and write
1B1174F0000
trusted library section
page read and write
193C9565000
trusted library allocation
page read and write
193BC0B4000
heap
page read and write
4BC0000
direct allocation
page read and write
1B11D403000
trusted library allocation
page read and write
193C9184000
trusted library allocation
page read and write
1B1175E9000
trusted library allocation
page read and write
6831000
heap
page read and write
6831000
heap
page read and write
193D44A6000
trusted library allocation
page read and write
1B1074F1000
heap
page read and write
442F000
stack
page read and write
6831000
heap
page read and write
193D44FD000
trusted library allocation
page read and write
4991000
heap
page read and write
67E1000
heap
page read and write
C94000
heap
page read and write
1B112C74000
trusted library allocation
page read and write
47FF000
stack
page read and write
193CA74D000
trusted library allocation
page read and write
193C961D000
heap
page read and write
4C80000
direct allocation
page execute and read and write
193D1081000
trusted library allocation
page read and write
12E0000
heap
page read and write
15A19BD0000
remote allocation
page read and write
BC9000
heap
page read and write
1B117700000
trusted library allocation
page read and write
1B116B79000
trusted library allocation
page read and write
5020000
direct allocation
page execute and read and write
193D47AF000
trusted library allocation
page read and write
193BC0F0000
heap
page read and write
193C6C00000
trusted library allocation
page read and write
193D44A3000
trusted library allocation
page read and write
1B111513000
trusted library allocation
page read and write
193C90BC000
trusted library allocation
page read and write
1CB3E000
stack
page read and write
3C6F000
stack
page read and write
10FF000
stack
page read and write
193BC0FA000
heap
page read and write
193D47E8000
trusted library allocation
page read and write
1B110FAD000
trusted library allocation
page read and write
1B11E056000
trusted library allocation
page read and write
2124000
heap
page read and write
1B11D635000
trusted library allocation
page read and write
28D06000
heap
page read and write
193D846B000
trusted library allocation
page read and write
1B116BCD000
trusted library allocation
page read and write
67E1000
heap
page read and write
20DA000
heap
page read and write
193D47F7000
trusted library allocation
page read and write
193BC0C3000
heap
page read and write
68D000
unkown
page readonly
193D8488000
trusted library allocation
page read and write
4701000
heap
page read and write
1B110E6C000
trusted library allocation
page read and write
1B11E05C000
trusted library allocation
page read and write
193D848B000
trusted library allocation
page read and write
1B11C4E4000
trusted library allocation
page read and write
2E5AFFF000
stack
page read and write
193CA908000
trusted library allocation
page read and write
193D3A61000
trusted library allocation
page read and write
1B1074B0000
heap
page read and write
193D44C8000
trusted library allocation
page read and write
6831000
heap
page read and write
1B115542000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
1B11BB5C000
trusted library allocation
page read and write
193C6803000
trusted library allocation
page read and write
193BC0F2000
heap
page read and write
193D8475000
trusted library allocation
page read and write
193C9C00000
trusted library allocation
page read and write
193C964E000
heap
page read and write
193BAE30000
heap
page read and write
193C73A4000
trusted library allocation
page read and write
193BC0B6000
heap
page read and write
1B116090000
trusted library section
page read and write
C94000
heap
page read and write
193D3A5B000
trusted library allocation
page read and write
1B11575A000
trusted library allocation
page read and write
5230000
direct allocation
page execute and read and write
193C6EB3000
trusted library allocation
page read and write
193C9933000
trusted library allocation
page read and write
193D442D000
trusted library allocation
page read and write
3C3E000
stack
page read and write
4400000
heap
page read and write
1B11758B000
trusted library allocation
page read and write
1174000
heap
page read and write
193BC0EA000
heap
page read and write
193C9556000
trusted library allocation
page read and write
6831000
heap
page read and write
1354000
heap
page read and write
193C9EC7000
trusted library allocation
page read and write
1B115B00000
trusted library allocation
page read and write
52A3AF6000
stack
page read and write
6831000
heap
page read and write
C94000
heap
page read and write
193CAFC3000
trusted library allocation
page read and write
22C69000
heap
page read and write
193CA7B2000
trusted library allocation
page read and write
67E1000
heap
page read and write
6831000
heap
page read and write
244C000
unkown
page readonly
193C6188000
trusted library allocation
page read and write
193CAFA8000
trusted library allocation
page read and write
35BF000
stack
page read and write
343F000
stack
page read and write
1B11552A000
trusted library allocation
page read and write
4E41000
heap
page read and write
4991000
heap
page read and write
1B107453000
heap
page read and write
193D44A6000
trusted library allocation
page read and write
193BC0F0000
heap
page read and write
5154000
direct allocation
page execute and read and write
8FB19FE000
unkown
page readonly
193D103C000
trusted library allocation
page read and write
193C9624000
heap
page read and write
384E000
stack
page read and write
193CAFB7000
trusted library allocation
page read and write
52A52FD000
stack
page read and write
193D10D2000
trusted library allocation
page read and write
1B11C337000
trusted library allocation
page read and write
6831000
heap
page read and write
1B11BF00000
trusted library allocation
page read and write
193CA765000
trusted library allocation
page read and write
193D4223000
trusted library allocation
page read and write
193BC0CD000
heap
page read and write
193C9BF2000
trusted library allocation
page read and write
193C684E000
trusted library allocation
page read and write
13D4000
heap
page read and write
1B11D4FC000
trusted library allocation
page read and write
193C63E8000
trusted library allocation
page read and write
193D3A71000
trusted library allocation
page read and write
6831000
heap
page read and write
193CA9C9000
trusted library allocation
page read and write
193C5BE1000
trusted library allocation
page read and write
193CABBE000
trusted library allocation
page read and write
193CA731000
trusted library allocation
page read and write
4C10000
direct allocation
page read and write
2E3F000
stack
page read and write
1CBA1000
heap
page read and write
3D0000
unkown
page readonly
193BC0C7000
heap
page read and write
1B114E1D000
trusted library allocation
page read and write
6831000
heap
page read and write
193D4489000
trusted library allocation
page read and write
793000
unkown
page execute and read and write
193D8559000
trusted library allocation
page read and write
1B1136D7000
trusted library allocation
page read and write
193CA4EC000
trusted library allocation
page read and write
4C0E000
stack
page read and write
1B110ECF000
trusted library allocation
page read and write
1B112C00000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
193C9F03000
trusted library allocation
page read and write
193CAF91000
trusted library allocation
page read and write
6831000
heap
page read and write
193CA9F9000
trusted library allocation
page read and write
193CA6F5000
trusted library allocation
page read and write
193C6295000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B116BDF000
trusted library allocation
page read and write
193C5A9E000
trusted library allocation
page read and write
22C71000
heap
page read and write
193CAA7C000
trusted library allocation
page read and write
18A479BF000
heap
page read and write
67E1000
heap
page read and write
193D43DF000
trusted library allocation
page read and write
2422000
heap
page read and write
193C628E000
trusted library allocation
page read and write
1B114EF1000
trusted library allocation
page read and write
312F000
stack
page read and write
193CAE54000
trusted library allocation
page read and write
5154000
direct allocation
page execute and read and write
193BC0DE000
heap
page read and write
193BB485000
trusted library allocation
page read and write
193BB5F2000
trusted library allocation
page read and write
6831000
heap
page read and write
193BC0C3000
heap
page read and write
31FF000
stack
page read and write
460E000
stack
page read and write
4E41000
heap
page read and write
193D848D000
trusted library allocation
page read and write
6831000
heap
page read and write
1B113618000
trusted library allocation
page read and write
1B116985000
trusted library allocation
page read and write
24617038000
remote allocation
page execute read
4C20000
direct allocation
page execute and read and write
52A337C000
stack
page read and write
193CA3F8000
trusted library allocation
page read and write
193BC0B6000
heap
page read and write
193CC25F000
trusted library allocation
page read and write
1B11157E000
trusted library allocation
page read and write
6831000
heap
page read and write
2937000
heap
page read and write
193C9F13000
trusted library allocation
page read and write
6831000
heap
page read and write
873000
unkown
page execute and read and write
1B1200FF000
trusted library allocation
page read and write
1B11C10E000
trusted library allocation
page read and write
193D10B6000
trusted library allocation
page read and write
6831000
heap
page read and write
193BC0E8000
heap
page read and write
193BC104000
heap
page read and write
193CAF95000
trusted library allocation
page read and write
193D846B000
trusted library allocation
page read and write
193BC0F0000
heap
page read and write
6831000
heap
page read and write
193BC0F2000
heap
page read and write
3DEF000
stack
page read and write
193C5D03000
trusted library allocation
page read and write
557E000
stack
page read and write
493000
unkown
page execute and read and write
67E1000
heap
page read and write
67E1000
heap
page read and write
6831000
heap
page read and write
304E000
stack
page read and write
1B106665000
trusted library allocation
page read and write
6831000
heap
page read and write
1E3DAF07000
trusted library allocation
page read and write
6831000
heap
page read and write
193C90DE000
trusted library allocation
page read and write
22C6F000
heap
page read and write
1B113B8F000
trusted library allocation
page read and write
193BC0FF000
heap
page read and write
4EF000
unkown
page execute and write copy
8A2000
unkown
page execute and read and write
4991000
heap
page read and write
193CA334000
trusted library allocation
page read and write
193BC0F4000
heap
page read and write
193C963F000
heap
page read and write
193BC0E8000
heap
page read and write
4991000
heap
page read and write
3CBF000
stack
page read and write
9390000
heap
page read and write
1B116B00000
trusted library allocation
page read and write
1B1152DF000
trusted library allocation
page read and write
1C41F000
stack
page read and write
1E388D600000
trusted library allocation
page read and write
1144E3B000
stack
page read and write
1B11C4C9000
trusted library allocation
page read and write
246174A4000
heap
page read and write
1B11E07C000
trusted library allocation
page read and write
193C9E4B000
trusted library allocation
page read and write
67E1000
heap
page read and write
4991000
heap
page read and write
22C75000
heap
page read and write
67E1000
heap
page read and write
1B115D00000
trusted library allocation
page read and write
C94000
heap
page read and write
2E3F000
stack
page read and write
193C9CA6000
trusted library allocation
page read and write
193CAFB3000
trusted library allocation
page read and write
38FF000
stack
page read and write
4F5F000
stack
page read and write
193D10CE000
trusted library allocation
page read and write
193D3CA9000
trusted library allocation
page read and write
6831000
heap
page read and write
193D44A9000
trusted library allocation
page read and write
1174000
heap
page read and write
193C9003000
trusted library allocation
page read and write
67E1000
heap
page read and write
193CAF7A000
trusted library allocation
page read and write
1B11578B000
trusted library allocation
page read and write
46F0000
direct allocation
page read and write
4991000
heap
page read and write
C15000
heap
page read and write
193C9A21000
trusted library allocation
page read and write
2FC1160EB000
trusted library allocation
page read and write
2B80000
heap
page read and write
1B114DE4000
trusted library allocation
page read and write
193CB353000
trusted library allocation
page read and write
193CA9FD000
trusted library allocation
page read and write
193BB754000
heap
page read and write
193D849D000
trusted library allocation
page read and write
193CA976000
trusted library allocation
page read and write
6831000
heap
page read and write
193BC070000
heap
page read and write
193C9900000
trusted library allocation
page read and write
193C8CE5000
trusted library allocation
page read and write
193CA9A5000
trusted library allocation
page read and write
193D84A4000
trusted library allocation
page read and write
193BC0F1000
heap
page read and write
193C7109000
trusted library allocation
page read and write
4DF0000
direct allocation
page execute and read and write
4701000
heap
page read and write
484F000
stack
page read and write
193CAFE6000
trusted library allocation
page read and write
193C5ED7000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
46F0000
direct allocation
page read and write
6F60000
trusted library allocation
page read and write
193D1276000
trusted library allocation
page read and write
1B1161AD000
trusted library allocation
page read and write
32AE000
stack
page read and write
6831000
heap
page read and write
67E1000
heap
page read and write
A57000
unkown
page execute and read and write
3C0E000
stack
page read and write
67E1000
heap
page read and write
67E1000
heap
page read and write
1B106903000
trusted library allocation
page read and write
493000
unkown
page execute and read and write
1B111AAD000
trusted library allocation
page read and write
193C699C000
trusted library allocation
page read and write
1B1069AD000
trusted library allocation
page read and write
1B11C38F000
trusted library allocation
page read and write
67E1000
heap
page read and write
193BC0FA000
heap
page read and write
193CAF95000
trusted library allocation
page read and write
193BC0B7000
heap
page read and write
1B11DA11000
trusted library allocation
page read and write
193C9C73000
trusted library allocation
page read and write
1B1152C5000
trusted library allocation
page read and write
193CA9CC000
trusted library allocation
page read and write
193BC0DE000
heap
page read and write
193CABD5000
trusted library allocation
page read and write
1B116103000
trusted library allocation
page read and write
6B6000
unkown
page execute and read and write
401000
unkown
page execute read
18A4954A000
heap
page read and write
193D10B1000
trusted library allocation
page read and write
67E1000
heap
page read and write
193CA633000
trusted library allocation
page read and write
1B106600000
trusted library allocation
page read and write
1B1074EA000
heap
page read and write
114147A000
stack
page read and write
193C61CD000
trusted library allocation
page read and write
193BC0D7000
heap
page read and write
1B10689E000
trusted library allocation
page read and write
C95000
heap
page read and write
5240000
direct allocation
page execute and read and write
193BC0E8000
heap
page read and write
193CAFCA000
trusted library allocation
page read and write
193C7400000
trusted library allocation
page read and write
193D3AF0000
trusted library allocation
page read and write
27D0000
direct allocation
page read and write
2E8F000
stack
page read and write
193CAF82000
trusted library allocation
page read and write
FD0000
direct allocation
page read and write
1B113B67000
trusted library allocation
page read and write
67E1000
heap
page read and write
4991000
heap
page read and write
1B116BBF000
trusted library allocation
page read and write
659000
unkown
page execute and write copy
1B11752F000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
1B119C00000
trusted library allocation
page read and write
193D1016000
trusted library allocation
page read and write
193BC0DE000
heap
page read and write
193BC0DE000
heap
page read and write
22C77000
heap
page read and write
1B1157F4000
trusted library allocation
page read and write
193D84F6000
trusted library allocation
page read and write
1D90000
heap
page read and write
6831000
heap
page read and write
193CAE50000
trusted library allocation
page read and write
193C6E9F000
trusted library allocation
page read and write
193D3A2C000
trusted library allocation
page read and write
4991000
heap
page read and write
518E000
stack
page read and write
193BC0FA000
heap
page read and write
193D449F000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
50822DC7000
trusted library allocation
page read and write
1140A7E000
stack
page read and write
13C0000
heap
page read and write
193BC0F5000
heap
page read and write
193D38E0000
trusted library allocation
page read and write
193BB5F6000
trusted library allocation
page read and write
193D3A77000
trusted library allocation
page read and write
37AE000
stack
page read and write
193BC0B4000
heap
page read and write
193C7B40000
trusted library section
page read and write
1B1168B1000
trusted library allocation
page read and write
18A479C8000
heap
page read and write
193D3AE8000
trusted library allocation
page read and write
193C95D5000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B11BB03000
trusted library allocation
page read and write
484F000
stack
page read and write
1044000
heap
page read and write
193D84F6000
trusted library allocation
page read and write
193CAAD5000
trusted library allocation
page read and write
1B112671000
trusted library allocation
page read and write
14EF000
stack
page read and write
1B11EB39000
trusted library allocation
page read and write
67E1000
heap
page read and write
38FF000
stack
page read and write
67E1000
heap
page read and write
193C5A98000
trusted library allocation
page read and write
52D0000
direct allocation
page read and write
44FE000
stack
page read and write
67E1000
heap
page read and write
193D3A41000
trusted library allocation
page read and write
53F6000
heap
page read and write
193CA9A5000
trusted library allocation
page read and write
193CA5AB000
trusted library allocation
page read and write
1B1177B1000
trusted library allocation
page read and write
193C61D4000
trusted library allocation
page read and write
2EFF000
stack
page read and write
1B115CEA000
trusted library allocation
page read and write
1174000
heap
page read and write
7A6E000
stack
page read and write
193D44A9000
trusted library allocation
page read and write
193D849D000
trusted library allocation
page read and write
4991000
heap
page read and write
54B0000
direct allocation
page execute and read and write
193CAF15000
trusted library allocation
page read and write
193CABAE000
trusted library allocation
page read and write
193BC0F4000
heap
page read and write
6F8000
unkown
page execute and write copy
1B112E9B000
trusted library allocation
page read and write
1174000
heap
page read and write
193C985E000
trusted library allocation
page read and write
1B1068CF000
trusted library allocation
page read and write
193C95D6000
trusted library allocation
page read and write
347F000
stack
page read and write
1B107465000
heap
page read and write
1B106714000
trusted library allocation
page read and write
193D9E00000
trusted library allocation
page read and write
1B111A66000
trusted library allocation
page read and write
1175000
heap
page read and write
6831000
heap
page read and write
1B116554000
trusted library allocation
page read and write
3CFE000
stack
page read and write
193CA9D7000
trusted library allocation
page read and write
193C9400000
trusted library allocation
page read and write
193CB724000
trusted library allocation
page read and write
193CAA7A000
trusted library allocation
page read and write
193D1081000
trusted library allocation
page read and write
1C68E000
stack
page read and write
1044000
heap
page read and write
193CAFE6000
trusted library allocation
page read and write
1B111B03000
trusted library allocation
page read and write
25E0000
direct allocation
page execute and read and write
193D8A4F000
trusted library allocation
page read and write
193C9D69000
trusted library allocation
page read and write
193B9200000
heap
page read and write
193CAFB3000
trusted library allocation
page read and write
1B110F60000
trusted library allocation
page read and write
4991000
heap
page read and write
1044000
heap
page read and write
C94000
heap
page read and write
193D423C000
trusted library allocation
page read and write
193CA9E4000
trusted library allocation
page read and write
420F000
stack
page read and write
265C000
heap
page read and write
193BC0CD000
heap
page read and write
67E1000
heap
page read and write
193D7200000
trusted library allocation
page read and write
1174000
heap
page read and write
1B114E00000
trusted library allocation
page read and write
67E1000
heap
page read and write
1174000
heap
page read and write
488E000
stack
page read and write
C94000
heap
page read and write
1B10485D000
trusted library allocation
page read and write
193D3A89000
trusted library allocation
page read and write
193BC0E6000
heap
page read and write
19C000
stack
page read and write
1B113B6A000
trusted library allocation
page read and write
193D77B6000
trusted library allocation
page read and write
1F5FEE00000
heap
page read and write
193BC0FA000
heap
page read and write
193C93A1000
trusted library allocation
page read and write
7C6000
unkown
page execute and read and write
193BC0F4000
heap
page read and write
1174000
heap
page read and write
193C9413000
trusted library allocation
page read and write
1B11C377000
trusted library allocation
page read and write
193CAFB0000
trusted library allocation
page read and write
193BB590000
trusted library allocation
page read and write
1B114EA7000
trusted library allocation
page read and write
2920000
direct allocation
page read and write
193C5A81000
trusted library allocation
page read and write
1100000
direct allocation
page read and write
193BC0DE000
heap
page read and write
1174000
heap
page read and write
67E1000
heap
page read and write
1E3DB070000
heap
page read and write
1B114EAE000
trusted library allocation
page read and write
43EF000
stack
page read and write
2E60000
direct allocation
page read and write
1174000
heap
page read and write
1B115CCB000
trusted library allocation
page read and write
185F000
stack
page read and write
11DD000
heap
page read and write
1B1177FD000
trusted library allocation
page read and write
40FF000
stack
page read and write
5403000
heap
page read and write
3ACE000
stack
page read and write
13D4000
heap
page read and write
193BC0EA000
heap
page read and write
67E1000
heap
page read and write
6831000
heap
page read and write
278F000
stack
page read and write
406F000
stack
page read and write
193D47B5000
trusted library allocation
page read and write
1B115453000
trusted library allocation
page read and write
193C6327000
trusted library allocation
page read and write
193B94ED000
trusted library allocation
page read and write
193D47D0000
trusted library allocation
page read and write
67E1000
heap
page read and write
67E1000
heap
page read and write
6831000
heap
page read and write
4C10000
direct allocation
page read and write
4991000
heap
page read and write
2188000
heap
page read and write
193D84E5000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
193C9B2C000
trusted library allocation
page read and write
193D3C9C000
trusted library allocation
page read and write
4F1000
unkown
page execute and read and write
1B10661A000
trusted library allocation
page read and write
6831000
heap
page read and write
1B1165AE000
trusted library allocation
page read and write
1B110F00000
trusted library allocation
page read and write
193CA983000
trusted library allocation
page read and write
6831000
heap
page read and write
193D1074000
trusted library allocation
page read and write
193D10A1000
trusted library allocation
page read and write
193C62F9000
trusted library allocation
page read and write
6831000
heap
page read and write
193BB6C7000
heap
page read and write
1B11692F000
trusted library allocation
page read and write
4991000
heap
page read and write
177A3E304000
trusted library allocation
page read and write
307F000
stack
page read and write
193C965B000
heap
page read and write
1B106847000
trusted library allocation
page read and write
1100000
direct allocation
page read and write
1B116545000
trusted library allocation
page read and write
193C955C000
trusted library allocation
page read and write
67E1000
heap
page read and write
193BB300000
trusted library allocation
page read and write
E25000
unkown
page execute and write copy
67E1000
heap
page read and write
529AD8E000
stack
page read and write
193D4453000
trusted library allocation
page read and write
2E60000
direct allocation
page read and write
1B11D4A7000
trusted library allocation
page read and write
193D3A77000
trusted library allocation
page read and write
193BC0FA000
heap
page read and write
67E1000
heap
page read and write
54C0000
direct allocation
page execute and read and write
3127000
heap
page read and write
529B9FE000
stack
page read and write
340000
unkown
page read and write
193D4439000
trusted library allocation
page read and write
193D12DC000
trusted library allocation
page read and write
193CA1B8000
trusted library allocation
page read and write
193C9D23000
trusted library allocation
page read and write
193D1276000
trusted library allocation
page read and write
1B11C203000
trusted library allocation
page read and write
193C629E000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B1066EF000
trusted library allocation
page read and write
1B111400000
trusted library allocation
page read and write
22C77000
heap
page read and write
193BC0EA000
heap
page read and write
1B115A58000
trusted library allocation
page read and write
193BC0DD000
heap
page read and write
193CAD27000
trusted library allocation
page read and write
193D47FD000
trusted library allocation
page read and write
193BC0F9000
heap
page read and write
193C62F3000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
67E1000
heap
page read and write
193CA9C9000
trusted library allocation
page read and write
193BB4D5000
trusted library allocation
page read and write
4701000
heap
page read and write
67E1000
heap
page read and write
193D8488000
trusted library allocation
page read and write
193C9A9C000
trusted library allocation
page read and write
5AD000
unkown
page execute and read and write
193D128C000
trusted library allocation
page read and write
193BC0F0000
heap
page read and write
193D848B000
trusted library allocation
page read and write
4991000
heap
page read and write
193CAF6E000
trusted library allocation
page read and write
39BE000
stack
page read and write
1B1074EA000
heap
page read and write
67E1000
heap
page read and write
30BF000
stack
page read and write
193C5CE5000
trusted library allocation
page read and write
28D86000
heap
page read and write
413E000
stack
page read and write
193BB270000
unclassified section
page read and write
1B11BB32000
trusted library allocation
page read and write
C80000
heap
page read and write
67E1000
heap
page read and write
67E1000
heap
page read and write
193CA990000
trusted library allocation
page read and write
193C5ACC000
trusted library allocation
page read and write
6831000
heap
page read and write
6831000
heap
page read and write
1B11A610000
trusted library allocation
page read and write
1B113722000
trusted library allocation
page read and write
4990000
heap
page read and write
193BC0CE000
heap
page read and write
193C6E00000
trusted library allocation
page read and write
1C8DF000
stack
page read and write
1294000
heap
page read and write
1B1074E3000
heap
page read and write
67E1000
heap
page read and write
1B11C21E000
trusted library allocation
page read and write
193CAFC0000
trusted library allocation
page read and write
3ABE000
stack
page read and write
193CA834000
trusted library allocation
page read and write
193C9EC7000
trusted library allocation
page read and write
193CAFCA000
trusted library allocation
page read and write
193D108C000
trusted library allocation
page read and write
15A1A072000
trusted library allocation
page read and write
1B1068A5000
trusted library allocation
page read and write
1144000
heap
page read and write
193C9697000
heap
page read and write
193CAF63000
trusted library allocation
page read and write
193BC0E8000
heap
page read and write
24617073000
heap
page read and write
193CA998000
trusted library allocation
page read and write
193C63B2000
trusted library allocation
page read and write
C94000
heap
page read and write
135D000
stack
page read and write
193C985A000
trusted library allocation
page read and write
1B11C3AA000
trusted library allocation
page read and write
1B115A00000
trusted library allocation
page read and write
1B115961000
trusted library allocation
page read and write
25B8000
heap
page read and write
193D3ACD000
trusted library allocation
page read and write
22C69000
heap
page read and write
193CAA65000
trusted library allocation
page read and write
4701000
heap
page read and write
1B1074E4000
heap
page read and write
1BEF000
stack
page read and write
316E000
stack
page read and write
2B87000
heap
page read and write
4C21000
heap
page read and write
193CA96E000
trusted library allocation
page read and write
1CAA1000
heap
page read and write
1174000
heap
page read and write
67E1000
heap
page read and write
3A3F000
stack
page read and write
4FA0000
direct allocation
page execute and read and write
67E1000
heap
page read and write
193CAF88000
trusted library allocation
page read and write
193C928E000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B107454000
heap
page read and write
193D3CD3000
trusted library allocation
page read and write
1B11663E000
trusted library allocation
page read and write
193D4445000
trusted library allocation
page read and write
1B110F86000
trusted library allocation
page read and write
1B11BB00000
trusted library allocation
page read and write
193CA983000
trusted library allocation
page read and write
193CABEA000
trusted library allocation
page read and write
193D9400000
trusted library allocation
page read and write
1B11D603000
trusted library allocation
page read and write
193D44C9000
trusted library allocation
page read and write
193BB598000
trusted library allocation
page read and write
1B11556E000
trusted library allocation
page read and write
2710000
heap
page read and write
193CA35B000
trusted library allocation
page read and write
6831000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
1174000
heap
page read and write
6831000
heap
page read and write
1044000
heap
page read and write
193C9FDA000
trusted library allocation
page read and write
193D8488000
trusted library allocation
page read and write
193D44B9000
trusted library allocation
page read and write
1B113409000
trusted library allocation
page read and write
1B1152BC000
trusted library allocation
page read and write
22C9D000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
561000
unkown
page execute and write copy
4701000
heap
page read and write
211A000
heap
page read and write
193C5DFB000
trusted library allocation
page read and write
67E1000
heap
page read and write
193CA38C000
trusted library allocation
page read and write
193BC0D8000
heap
page read and write
1B11E099000
trusted library allocation
page read and write
1B1074F5000
heap
page read and write
3E9C36B04000
trusted library allocation
page read and write
529FE3F000
stack
page read and write
193C9869000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
1353000
heap
page read and write
1DD6000
heap
page read and write
193CA9E1000
trusted library allocation
page read and write
2E5BFFF000
stack
page read and write
1B11D498000
trusted library allocation
page read and write
1B112C87000
trusted library allocation
page read and write
61E00000
direct allocation
page execute and read and write
1CA90000
heap
page read and write
193C9425000
trusted library allocation
page read and write
193D44DB000
trusted library allocation
page read and write
1B115C03000
trusted library allocation
page read and write
193CB3F3000
trusted library allocation
page read and write
193D8492000
trusted library allocation
page read and write
193D84F8000
trusted library allocation
page read and write
193CAFB3000
trusted library allocation
page read and write
193D44CD000
trusted library allocation
page read and write
1B1152E7000
trusted library allocation
page read and write
113E2BA000
stack
page read and write
4F10000
heap
page read and write
193B95B0000
heap
page read and write
193BC0B6000
heap
page read and write
193CA96E000
trusted library allocation
page read and write
1B11DF8F000
trusted library allocation
page read and write
193BB3DF000
trusted library allocation
page read and write
B5A000
heap
page read and write
193C9149000
trusted library allocation
page read and write
1D64000
heap
page read and write
2E60000
direct allocation
page read and write
15A1A0CB000
trusted library allocation
page read and write
193BC0EF000
heap
page read and write
6831000
heap
page read and write
6C90F000
unkown
page readonly
C94000
heap
page read and write
193BB70F000
heap
page read and write
C94000
heap
page read and write
193D1274000
trusted library allocation
page read and write
113E6FB000
stack
page read and write
24617450000
unclassified section
page readonly
193C91F0000
trusted library allocation
page read and write
193C8C1D000
trusted library allocation
page read and write
193CB323000
trusted library allocation
page read and write
4701000
heap
page read and write
1B11C34B000
trusted library allocation
page read and write
F0E000
stack
page read and write
4DB0000
trusted library allocation
page read and write
252A000
heap
page read and write
BE0000
direct allocation
page read and write
423F000
stack
page read and write
193CA99A000
trusted library allocation
page read and write
1F5FECF8000
heap
page read and write
4991000
heap
page read and write
1B1127C7000
trusted library allocation
page read and write
3AFE000
stack
page read and write
8FAF8FE000
unkown
page readonly
193BB69B000
heap
page read and write
193CA653000
trusted library allocation
page read and write
439000
unkown
page write copy
6831000
heap
page read and write
193D1255000
trusted library allocation
page read and write
15A19E73000
heap
page read and write
15A1A21E000
trusted library allocation
page read and write
1B113635000
trusted library allocation
page read and write
36B9D8804000
trusted library allocation
page read and write
193D84F1000
trusted library allocation
page read and write
1144C3A000
stack
page read and write
1B113698000
trusted library allocation
page read and write
1B11E08E000
trusted library allocation
page read and write
193C9A49000
trusted library allocation
page read and write
1174000
heap
page read and write
193D8482000
trusted library allocation
page read and write
193CA967000
trusted library allocation
page read and write
193D101A000
trusted library allocation
page read and write
193B9430000
trusted library allocation
page read and write
1144000
heap
page read and write
193CAF95000
trusted library allocation
page read and write
1D64000
heap
page read and write
193D10D9000
trusted library allocation
page read and write
193BC0F4000
heap
page read and write
1EAD000
heap
page read and write
67E1000
heap
page read and write
1F5FF000000
trusted library allocation
page read and write
347000
unkown
page execute and read and write
1B11BF68000
trusted library allocation
page read and write
67E1000
heap
page read and write
1140000
heap
page read and write
67E1000
heap
page read and write
193D8467000
trusted library allocation
page read and write
193C9C6D000
trusted library allocation
page read and write
193C5B00000
trusted library allocation
page read and write
193C9ADA000
trusted library allocation
page read and write
193C59F2000
unclassified section
page read and write
1B11C23A000
trusted library allocation
page read and write
CB4000
heap
page read and write
193CA9E1000
trusted library allocation
page read and write
1B115290000
trusted library allocation
page read and write
193CAE66000
trusted library allocation
page read and write
8FAF878000
stack
page read and write
3D7E000
stack
page read and write
51FF000
stack
page read and write
15A19DF0000
unclassified section
page readonly
193C9087000
trusted library allocation
page read and write
528F000
stack
page read and write
6831000
heap
page read and write
193D8482000
trusted library allocation
page read and write
67E1000
heap
page read and write
1100000
direct allocation
page read and write
67E1000
heap
page read and write
63E000
unkown
page execute and read and write
21DB000
heap
page read and write
193C63FD000
trusted library allocation
page read and write
1B1067FE000
trusted library allocation
page read and write
796E000
stack
page read and write
4ABE000
stack
page read and write
433E000
stack
page read and write
C94000
heap
page read and write
1174000
heap
page read and write
235D000
heap
page read and write
193D3AB6000
trusted library allocation
page read and write
1294000
heap
page read and write
193C8E23000
trusted library allocation
page read and write
57CE000
stack
page read and write
2A3B000
stack
page read and write
193CA738000
trusted library allocation
page read and write
6831000
heap
page read and write
193C909F000
trusted library allocation
page read and write
482E000
stack
page read and write
1B1066DC000
trusted library allocation
page read and write
193C8D78000
trusted library allocation
page read and write
193D3C83000
trusted library allocation
page read and write
13D0000
heap
page read and write
193C5E7D000
trusted library allocation
page read and write
193BC0EF000
heap
page read and write
C94000
heap
page read and write
193CB2E3000
trusted library allocation
page read and write
193D2A12000
trusted library allocation
page read and write
4991000
heap
page read and write
528E000
stack
page read and write
193BB500000
trusted library allocation
page read and write
1174000
heap
page read and write
6831000
heap
page read and write
1B1074F0000
heap
page read and write
256E000
heap
page read and write
24617347000
trusted library allocation
page read and write
193CAFE6000
trusted library allocation
page read and write
1B117542000
trusted library allocation
page read and write
1B11E096000
trusted library allocation
page read and write
1174000
heap
page read and write
6831000
heap
page read and write
6F7000
unkown
page execute and write copy
193BC0B9000
heap
page read and write
1141BBE000
stack
page read and write
193CAEBE000
trusted library allocation
page read and write
4991000
heap
page read and write
22BB000
heap
page read and write
193CAF3C000
trusted library allocation
page read and write
67E1000
heap
page read and write
51B0000
direct allocation
page execute and read and write
1B11C364000
trusted library allocation
page read and write
67E1000
heap
page read and write
193B94E9000
trusted library allocation
page read and write
1B114EBE000
trusted library allocation
page read and write
69D0000
heap
page read and write
193D8488000
trusted library allocation
page read and write
2EE08000
heap
page read and write
1B1074E4000
heap
page read and write
242B000
heap
page read and write
302E000
stack
page read and write
193D44D1000
trusted library allocation
page read and write
193CAAA2000
trusted library allocation
page read and write
193CB738000
trusted library allocation
page read and write
6F7000
unkown
page execute and write copy
193D3AA9000
trusted library allocation
page read and write
1B111818000
heap
page read and write
193BC0FA000
heap
page read and write
1B1068AD000
trusted library allocation
page read and write
193BC0E8000
heap
page read and write
2B1E000
stack
page read and write
193BC0EB000
heap
page read and write
113D5DE000
stack
page read and write
1B11D9B9000
trusted library allocation
page read and write
1B11C4D2000
trusted library allocation
page read and write
193C90D7000
trusted library allocation
page read and write
193D437E000
trusted library allocation
page read and write
193D84ED000
trusted library allocation
page read and write
1B11EB46000
trusted library allocation
page read and write
193C983E000
trusted library allocation
page read and write
193BC0E8000
heap
page read and write
1B111AF4000
trusted library allocation
page read and write
407F000
stack
page read and write
1B111476000
trusted library allocation
page read and write
193C5E75000
trusted library allocation
page read and write
193D445D000
trusted library allocation
page read and write
6831000
heap
page read and write
3DAF000
stack
page read and write
193CA9E1000
trusted library allocation
page read and write
193C6E8F000
trusted library allocation
page read and write
193D3A77000
trusted library allocation
page read and write
1B11C3AD000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
C94000
heap
page read and write
400000
unkown
page execute and read and write
193D84A6000
trusted library allocation
page read and write
6B6000
unkown
page execute and read and write
1175000
heap
page read and write
214A000
heap
page read and write
1B11C28C000
trusted library allocation
page read and write
193D12FE000
trusted library allocation
page read and write
6831000
heap
page read and write
67E1000
heap
page read and write
6831000
heap
page read and write
67E1000
heap
page read and write
193C91EF000
trusted library allocation
page read and write
193CAF9C000
trusted library allocation
page read and write
193CAA7C000
trusted library allocation
page read and write
4CEF000
stack
page read and write
4E10000
heap
page read and write
1B116889000
trusted library allocation
page read and write
1174000
heap
page read and write
352E000
stack
page read and write
193C6200000
trusted library allocation
page read and write
15A1A05D000
trusted library allocation
page read and write
C94000
heap
page read and write
1B1155DF000
trusted library allocation
page read and write
45FF000
stack
page read and write
193D44C1000
trusted library allocation
page read and write
193D8479000
trusted library allocation
page read and write
193D44FA000
trusted library allocation
page read and write
1B115340000
trusted library section
page read and write
193D127D000
trusted library allocation
page read and write
193C964B000
heap
page read and write
193CAC13000
trusted library allocation
page read and write
423F000
stack
page read and write
6831000
heap
page read and write
609000
unkown
page read and write
67E1000
heap
page read and write
493000
unkown
page execute and read and write
113E3BC000
stack
page read and write
193D103C000
trusted library allocation
page read and write
28D02000
heap
page read and write
C94000
heap
page read and write
193BC0D5000
heap
page read and write
3FF0000
heap
page read and write
332F000
stack
page read and write
1DD5000
heap
page read and write
3D3E000
stack
page read and write
6831000
heap
page read and write
1B110F81000
trusted library allocation
page read and write
6C5F000
stack
page read and write
6831000
heap
page read and write
11D0000
heap
page read and write
193CA760000
trusted library allocation
page read and write
836C000
stack
page read and write
193BC0EA000
heap
page read and write
1B115000000
trusted library allocation
page read and write
1174000
heap
page read and write
67E1000
heap
page read and write
28D61000
heap
page read and write
826E000
stack
page read and write
67E1000
heap
page read and write
193C9941000
trusted library allocation
page read and write
1B112DB8000
trusted library allocation
page read and write
193D3C94000
trusted library allocation
page read and write
193C6ED7000
trusted library allocation
page read and write
1B114EB8000
trusted library allocation
page read and write
193BC104000
heap
page read and write
67E1000
heap
page read and write
67E1000
heap
page read and write
193BC0CD000
heap
page read and write
1B116050000
trusted library section
page readonly
114363E000
stack
page read and write
193BC0C4000
heap
page read and write
46BF000
stack
page read and write
193CA98B000
trusted library allocation
page read and write
193C5A03000
trusted library allocation
page read and write
40FF000
stack
page read and write
340000
unkown
page readonly
193C9623000
heap
page read and write
6831000
heap
page read and write
193D12FA000
trusted library allocation
page read and write
4C20000
direct allocation
page execute and read and write
193CAF74000
trusted library allocation
page read and write
1B112E7D000
trusted library allocation
page read and write
46AE000
stack
page read and write
6831000
heap
page read and write
5040000
direct allocation
page execute and read and write
193C8F08000
trusted library allocation
page read and write
193D8458000
trusted library allocation
page read and write
1B118B2A000
trusted library allocation
page read and write
193BC0F0000
heap
page read and write
193D3AE4000
trusted library allocation
page read and write
1B115803000
trusted library allocation
page read and write
67E1000
heap
page read and write
1C44F000
stack
page read and write
67E1000
heap
page read and write
E25000
unkown
page execute and read and write
1B11D928000
trusted library allocation
page read and write
2EDF9000
heap
page read and write
1B106648000
trusted library allocation
page read and write
193CA998000
trusted library allocation
page read and write
6831000
heap
page read and write
6831000
heap
page read and write
1B11C387000
trusted library allocation
page read and write
193D85E7000
trusted library allocation
page read and write
193D126C000
trusted library allocation
page read and write
67E1000
heap
page read and write
3EBE000
stack
page read and write
193CA5EB000
trusted library allocation
page read and write
1B10697C000
trusted library allocation
page read and write
193CA9DB000
trusted library allocation
page read and write
1B11EB3F000
trusted library allocation
page read and write
193BC0EF000
heap
page read and write
193CAF95000
trusted library allocation
page read and write
1B1151FD000
trusted library allocation
page read and write
134D000
heap
page read and write
6831000
heap
page read and write
1D30000
direct allocation
page execute and read and write
5A7000
unkown
page execute and read and write
193C9C62000
trusted library allocation
page read and write
193D46E7000
trusted library allocation
page read and write
1B1152E7000
trusted library allocation
page read and write
193CAF6E000
trusted library allocation
page read and write
193CAF68000
trusted library allocation
page read and write
193BC0EA000
heap
page read and write
1141BFC000
stack
page read and write
193D848B000
trusted library allocation
page read and write
373E000
stack
page read and write
1C7DE000
stack
page read and write
193C63A4000
trusted library allocation
page read and write
47B1000
heap
page read and write
67E1000
heap
page read and write
6831000
heap
page read and write
193D846C000
trusted library allocation
page read and write
1B114EE2000
trusted library allocation
page read and write
193BC0F4000
heap
page read and write
1B1074EA000
heap
page read and write
193D7130000
trusted library allocation
page read and write
193CA343000
trusted library allocation
page read and write
6831000
heap
page read and write
67E1000
heap
page read and write
193B9540000
trusted library section
page read and write
1B11C4DB000
trusted library allocation
page read and write
193CA6DF000
trusted library allocation
page read and write
193BC0F0000
heap
page read and write
193D8DF7000
trusted library allocation
page read and write
12E0000
heap
page read and write
193C9D03000
trusted library allocation
page read and write
1B11E0B2000
trusted library allocation
page read and write
193D3A9E000
trusted library allocation
page read and write
6831000
heap
page read and write
5154000
direct allocation
page execute and read and write
193BC0A7000
heap
page read and write
6831000
heap
page read and write
193BC0FA000
heap
page read and write
193BB6E1000
heap
page read and write
1B111A85000
trusted library allocation
page read and write
193CAF6E000
trusted library allocation
page read and write
4991000
heap
page read and write
432000
unkown
page execute and read and write
193D10BB000
trusted library allocation
page read and write
193C5D76000
trusted library allocation
page read and write
193D8479000
trusted library allocation
page read and write
67E1000
heap
page read and write
193CABF3000
trusted library allocation
page read and write
4991000
heap
page read and write
193CACF3000
trusted library allocation
page read and write
193CAFB8000
trusted library allocation
page read and write
22C74000
heap
page read and write
193CA9A8000
trusted library allocation
page read and write
448F000
stack
page read and write
193C95E4000
trusted library allocation
page read and write
1B11C2E8000
trusted library allocation
page read and write
6831000
heap
page read and write
193BC0D4000
heap
page read and write
4991000
heap
page read and write
193CA4DA000
trusted library allocation
page read and write
6831000
heap
page read and write
1B11544C000
trusted library allocation
page read and write
4701000
heap
page read and write
193CAA7A000
trusted library allocation
page read and write
6831000
heap
page read and write
2AEC000
stack
page read and write
1174000
heap
page read and write
1B117709000
trusted library allocation
page read and write
6C6D1000
unkown
page execute read
193D4770000
trusted library allocation
page read and write
602F000
stack
page read and write
6830000
heap
page read and write
1B11BBEF000
trusted library allocation
page read and write
1B116B3E000
trusted library allocation
page read and write
1B11C1C6000
trusted library allocation
page read and write
193BC0CD000
heap
page read and write
1B11E05A000
trusted library allocation
page read and write
1304000
heap
page read and write
193CA305000
trusted library allocation
page read and write
193CA793000
trusted library allocation
page read and write
193BC0D5000
heap
page read and write
193D381E000
trusted library allocation
page read and write
1B10671A000
trusted library allocation
page read and write
193C9CB1000
trusted library allocation
page read and write
193BC0F4000
heap
page read and write
63E000
unkown
page execute and read and write
193BC0EA000
heap
page read and write
2761000
heap
page read and write
15A1A300000
heap
page read and write
1B1045D0000
heap
page read and write
193C92ED000
trusted library allocation
page read and write
1B111BB0000
trusted library allocation
page read and write
4DD0000
heap
page read and write
793000
unkown
page execute and read and write
400000
unkown
page execute and read and write
67E1000
heap
page read and write
1B107504000
heap
page read and write
193CA9E4000
trusted library allocation
page read and write
193BC0B7000
heap
page read and write
193D10BB000
trusted library allocation
page read and write
9A4000
heap
page read and write
1B112ECA000
trusted library allocation
page read and write
193CA964000
trusted library allocation
page read and write
193BC0F5000
heap
page read and write
1174000
heap
page read and write
67E1000
heap
page read and write
1174000
heap
page read and write
193BB2B0000
trusted library section
page readonly
193BC0EF000
heap
page read and write
193D3A3E000
trusted library allocation
page read and write
3C3E000
stack
page read and write
1B110F5C000
trusted library allocation
page read and write
22C7D000
heap
page read and write
193C93E8000
trusted library allocation
page read and write
1B11D62B000
trusted library allocation
page read and write
1B116613000
trusted library allocation
page read and write
1B11BB16000
trusted library allocation
page read and write
1C5000
heap
page read and write
193CB31F000
trusted library allocation
page read and write
5154000
direct allocation
page execute and read and write
5D309FE000
stack
page read and write
67E1000
heap
page read and write
1B1074E7000
heap
page read and write
193CAFE6000
trusted library allocation
page read and write
1B11C26B000
trusted library allocation
page read and write
1B11C2E6000
trusted library allocation
page read and write
1B1048F8000
trusted library allocation
page read and write
1B11C499000
trusted library allocation
page read and write
193CA9EE000
trusted library allocation
page read and write
1B1152E7000
trusted library allocation
page read and write
1B118B20000
trusted library allocation
page read and write
C1B000
heap
page read and write
193C968D000
heap
page read and write
193BC0DE000
heap
page read and write
1B116B49000
trusted library allocation
page read and write
1B1074F0000
heap
page read and write
193CA951000
trusted library allocation
page read and write
F5DFBFC000
stack
page read and write
193CA79E000
trusted library allocation
page read and write
193BC108000
heap
page read and write
1174000
heap
page read and write
C94000
heap
page read and write
1044000
heap
page read and write
193CA300000
trusted library allocation
page read and write
8DAB000
heap
page read and write
193D8482000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
24617532000
trusted library allocation
page read and write
2741000
heap
page read and write
67E1000
heap
page read and write
27D0000
direct allocation
page read and write
193CAFF7000
trusted library allocation
page read and write
67E1000
heap
page read and write
193D4417000
trusted library allocation
page read and write
193D84F1000
trusted library allocation
page read and write
1B11C431000
trusted library allocation
page read and write
22C69000
heap
page read and write
193CAFB0000
trusted library allocation
page read and write
11C9000
heap
page read and write
1B106869000
trusted library allocation
page read and write
529AE4B000
stack
page read and write
15A1A214000
trusted library allocation
page read and write
193CA3D0000
trusted library allocation
page read and write
5240000
direct allocation
page execute and read and write
45FF000
stack
page read and write
193BC0F2000
heap
page read and write
193CAA00000
trusted library allocation
page read and write
193B945E000
trusted library allocation
page read and write
193C8D78000
trusted library allocation
page read and write
1B1074F2000
heap
page read and write
139F000
stack
page read and write
193D8280000
trusted library allocation
page read and write
193D365C000
trusted library allocation
page read and write
1B115029000
trusted library allocation
page read and write
67E1000
heap
page read and write
193C6C29000
trusted library allocation
page read and write
6831000
heap
page read and write
1174000
heap
page read and write
193BC0BF000
heap
page read and write
1B11617C000
trusted library allocation
page read and write
193BC0CA000
heap
page read and write
193CA765000
trusted library allocation
page read and write
4601000
heap
page read and write
193C9203000
trusted library allocation
page read and write
1B11C3B4000
trusted library allocation
page read and write
2A1BD1A04000
trusted library allocation
page read and write
4991000
heap
page read and write
1B11644F000
trusted library allocation
page read and write
193CA391000
trusted library allocation
page read and write
4E81000
direct allocation
page read and write
67E1000
heap
page read and write
1B11684B000
trusted library allocation
page read and write
193D3AAA000
trusted library allocation
page read and write
C94000
heap
page read and write
13D4000
heap
page read and write
193CA645000
trusted library allocation
page read and write
1044000
heap
page read and write
1B1127E2000
trusted library allocation
page read and write
10DA000
stack
page read and write
193D8492000
trusted library allocation
page read and write
67E1000
heap
page read and write
2460000
heap
page read and write
4701000
heap
page read and write
1B1151E3000
trusted library allocation
page read and write
193D3AF5000
trusted library allocation
page read and write
1B11BC00000
trusted library allocation
page read and write
41AE000
stack
page read and write
8381000
heap
page read and write
193C7AB6000
trusted library allocation
page read and write
52A203D000
stack
page read and write
15A1A010000
trusted library allocation
page read and write
67E1000
heap
page read and write
193C5E03000
trusted library allocation
page read and write
6831000
heap
page read and write
D7C000
heap
page read and write
42FF000
stack
page read and write
193C9197000
trusted library allocation
page read and write
12DE000
heap
page read and write
51B0000
direct allocation
page execute and read and write
1044000
heap
page read and write
1B115276000
trusted library allocation
page read and write
2354000
heap
page read and write
432000
unkown
page execute and read and write
193D3518000
trusted library allocation
page read and write
193CA663000
trusted library allocation
page read and write
193BC0B3000
heap
page read and write
1B116BB3000
trusted library allocation
page read and write
193D84EE000
trusted library allocation
page read and write
193BB5DA000
trusted library allocation
page read and write
1B115E09000
trusted library allocation
page read and write
53FE000
stack
page read and write
193D8FC1000
trusted library allocation
page read and write
193CA878000
trusted library allocation
page read and write
193CAFED000
trusted library allocation
page read and write
193BB70F000
heap
page read and write
2478000
heap
page read and write
193CA998000
trusted library allocation
page read and write
1B113623000
trusted library allocation
page read and write
67E1000
heap
page read and write
1B112ECA000
trusted library allocation
page read and write
67E1000
heap
page read and write
193D38E3000
trusted library allocation
page read and write
193BC0CA000
heap
page read and write
4E10000
direct allocation
page read and write
193BC0E8000
heap
page read and write
193BB73F000
heap
page read and write
C95000
heap
page read and write
1100000
direct allocation
page read and write
1B1074E5000
heap
page read and write
193C8E69000
trusted library allocation
page read and write
1B106718000
trusted library allocation
page read and write
1174000
heap
page read and write
1174000
heap
page read and write
1B1152BE000
trusted library allocation
page read and write
1B1074EB000
heap
page read and write
67E1000
heap
page read and write
193D44B9000
trusted library allocation
page read and write
15A1A211000
trusted library allocation
page read and write
193BC0F9000
heap
page read and write
416E000
stack
page read and write
C2D000
heap
page read and write
22C9D000
heap
page read and write
1B11C19A000
trusted library allocation
page read and write
67E1000
heap
page read and write
1CAA1000
heap
page read and write
193D848D000
trusted library allocation
page read and write
193C9674000
heap
page read and write
4991000
heap
page read and write
244C000
unkown
page readonly
1B106844000
trusted library allocation
page read and write
1B11A604000
trusted library allocation
page read and write
529AAFE000
stack
page read and write
63A0000
heap
page read and write
193D84EB000
trusted library allocation
page read and write
21C4000
heap
page read and write
67E1000
heap
page read and write
46A000
unkown
page execute and read and write
1B1153A0000
trusted library section
page readonly
420E000
stack
page read and write
193BC0B5000
heap
page read and write
193CAAC3000
trusted library allocation
page read and write
6831000
heap
page read and write
6831000
heap
page read and write
1345000
heap
page read and write
193D44FD000
trusted library allocation
page read and write
1B1152BC000
trusted library allocation
page read and write
8A2000
unkown
page execute and read and write
1B11530D000
unclassified section
page read and write
193BC0F9000
heap
page read and write
1B115239000
trusted library allocation
page read and write
62C000
unkown
page execute and write copy
1B11C331000
trusted library allocation
page read and write
193D1030000
trusted library allocation
page read and write
1B11BFB4000
trusted library allocation
page read and write
1B112C6C000
trusted library allocation
page read and write
1294000
heap
page read and write
1B11527F000
trusted library allocation
page read and write
C17000
heap
page read and write
1F0000
heap
page read and write
1B1074F8000
heap
page read and write
193CA98B000
trusted library allocation
page read and write
4C60000
direct allocation
page execute and read and write
1B11C25A000
trusted library allocation
page read and write
6831000
heap
page read and write
8371000
heap
page read and write
6831000
heap
page read and write
1B107486000
heap
page read and write
193CA9F4000
trusted library allocation
page read and write
193C91E3000
trusted library allocation
page read and write
1B114EAE000
trusted library allocation
page read and write
24617395000
trusted library allocation
page read and write
193C73C1000
trusted library allocation
page read and write
1B106957000
trusted library allocation
page read and write
193CA998000
trusted library allocation
page read and write
1294000
heap
page read and write
193CAF7C000
trusted library allocation
page read and write
4B90000
direct allocation
page read and write
62C000
unkown
page execute and read and write
50D0000
heap
page read and write
193BC0DE000
heap
page read and write
13F0000
heap
page read and write
1B11BBED000
trusted library allocation
page read and write
1B111AD8000
trusted library allocation
page read and write
193D8DF4000
trusted library allocation
page read and write
1B11C26F000
trusted library allocation
page read and write
193D844A000
trusted library allocation
page read and write
193BC0BF000
heap
page read and write
193BC0CE000
heap
page read and write
C94000
heap
page read and write
6831000
heap
page read and write
1B11279A000
trusted library allocation
page read and write
193BC0BF000
heap
page read and write
1B11694E000
trusted library allocation
page read and write
1B112C8C000
trusted library allocation
page read and write
1B11C341000
trusted library allocation
page read and write
193D10FD000
trusted library allocation
page read and write
1B11C371000
trusted library allocation
page read and write
67E1000
heap
page read and write
193D47DC000
trusted library allocation
page read and write
193C9F00000
trusted library allocation
page read and write
33AF000
stack
page read and write
193D8FA2000
trusted library allocation
page read and write
1142C3E000
stack
page read and write
1B116ADA000
trusted library allocation
page read and write
193D8499000
trusted library allocation
page read and write
C70000
heap
page read and write
1B114EDE000
trusted library allocation
page read and write
67E1000
heap
page read and write
193CAF63000
trusted library allocation
page read and write
CA0000
heap
page read and write
193CA79B000
trusted library allocation
page read and write
4F16000
heap
page read and write
1B114E7D000
trusted library allocation
page read and write
193CACEF000
trusted library allocation
page read and write
1B11A616000
trusted library allocation
page read and write
193CA75B000
trusted library allocation
page read and write
1174000
heap
page read and write
1B114EE2000
trusted library allocation
page read and write
9A4000
heap
page read and write
6831000
heap
page read and write
193D475D000
trusted library allocation
page read and write
22C75000
heap
page read and write
308E000
stack
page read and write
13D4000
heap
page read and write
1B117589000
trusted library allocation
page read and write
193BB503000
trusted library allocation
page read and write
6831000
heap
page read and write
193CA990000
trusted library allocation
page read and write
1B104410000
unclassified section
page readonly
1B111B00000
trusted library allocation
page read and write
1B1169D0000
trusted library allocation
page read and write
193BC0B6000
heap
page read and write
1B1157A3000
trusted library allocation
page read and write
193BB3CD000
trusted library allocation
page read and write
1B1069C5000
trusted library allocation
page read and write
67E1000
heap
page read and write
6831000
heap
page read and write
193D437D000
trusted library allocation
page read and write
1B114F00000
trusted library allocation
page read and write
193CA742000
trusted library allocation
page read and write
4B40000
trusted library allocation
page read and write
246E000
heap
page read and write
C94000
heap
page read and write
193BC0DE000
heap
page read and write
193BC0D6000
heap
page read and write
193D3A2C000
trusted library allocation
page read and write
41CE000
stack
page read and write
5FC000
unkown
page execute and write copy
1B1152EF000
trusted library allocation
page read and write
22B10000
heap
page read and write
15A19F00000
trusted library allocation
page read and write
193C7A8B000
trusted library allocation
page read and write
193C96A3000
heap
page read and write
193D47D7000
trusted library allocation
page read and write
6831000
heap
page read and write
193CA97B000
trusted library allocation
page read and write
52A377B000
stack
page read and write
193D846F000
trusted library allocation
page read and write
193BC0D1000
heap
page read and write
193CA5AD000
trusted library allocation
page read and write
193CA77F000
trusted library allocation
page read and write
C94000
heap
page read and write
193D3AD5000
trusted library allocation
page read and write
193BC0E8000
heap
page read and write
4D30000
direct allocation
page execute and read and write
193BB4C6000
trusted library allocation
page read and write
1B114EAE000
trusted library allocation
page read and write
6831000
heap
page read and write
193C5B18000
trusted library allocation
page read and write
193D36FC000
trusted library allocation
page read and write
1B111934000
heap
page read and write
1B11DA1A000
trusted library allocation
page read and write
193BB5A2000
trusted library allocation
page read and write
15A1A0E9000
trusted library allocation
page read and write
1B115400000
trusted library allocation
page read and write
193BB5B0000
trusted library allocation
page read and write
1B10750E000
heap
page read and write
3E4F000
stack
page read and write
193D44E0000
trusted library allocation
page read and write
387E000
stack
page read and write
193D44C8000
trusted library allocation
page read and write
193B940D000
trusted library allocation
page read and write
6B6000
unkown
page execute and read and write
131E000
heap
page read and write
193D44C9000
trusted library allocation
page read and write
8FAF7FE000
unkown
page readonly
193BC0A7000
heap
page read and write
1B118B10000
trusted library allocation
page read and write
1B11686C000
trusted library allocation
page read and write
193D35C6000
trusted library allocation
page read and write
193D84F1000
trusted library allocation
page read and write
1E3DAF00000
trusted library allocation
page read and write
4C91000
direct allocation
page read and write
193BC0F2000
heap
page read and write
193CAA43000
trusted library allocation
page read and write
1B112C8C000
trusted library allocation
page read and write
1B1136DA000
trusted library allocation
page read and write
1144000
heap
page read and write
1B1066FB000
trusted library allocation
page read and write
52A2AFE000
stack
page read and write
C94000
heap
page read and write
193BC0AE000
heap
page read and write
193CAFC3000
trusted library allocation
page read and write
79AE000
stack
page read and write
There are 8345 hidden memdumps, click here to show them.