IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\1000026002\cee706a53f.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000023001\8a145ab7b3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x9dd9266c, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\1000032042\ko.ps1
ASCII text, with CRLF line terminators
dropped
C:\Users\user\1000033142\so.ps1
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NCK9WNDU\ko[1].ps1
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q4M8ZOMH\so[1].ps1
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_01cvxrcc.42a.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3cfhqx4x.ubu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ol0f2wpe.fja.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x24zye3f.dlr.psm1
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1000023001\8a145ab7b3.exe
"C:\Users\user\AppData\Local\Temp\1000023001\8a145ab7b3.exe"
malicious
C:\Users\user\1000026002\cee706a53f.exe
"C:\Users\user\1000026002\cee706a53f.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000023001\8a145ab7b3.exe
"C:\Users\user\AppData\Local\Temp\1000023001\8a145ab7b3.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\1000026002\cee706a53f.exe
"C:\Users\user\1000026002\cee706a53f.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000023001\8a145ab7b3.exe
"C:\Users\user\AppData\Local\Temp\1000023001\8a145ab7b3.exe"
malicious
C:\Users\user\1000026002\cee706a53f.exe
"C:\Users\user\1000026002\cee706a53f.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\user\1000032042\ko.ps1"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --kiosk --user-data-dir=C:\Users\user\AppData\Local\Google\Chrome\User Data
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\user\1000033142\so.ps1"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --kiosk --user-data-dir=C:\Users\user\AppData\Local\Google\Chrome\User Data
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\user\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=2632 --field-trial-handle=2032,i,16315345913979309898,3304916234650839714,262144 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\user\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=2060 --field-trial-handle=2044,i,13926108917370873368,3944536468102768891,262144 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --user-data-dir="C:\Users\user\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=5736 --field-trial-handle=2032,i,16315345913979309898,3304916234650839714,262144 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\user\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=5760 --field-trial-handle=2032,i,16315345913979309898,3304916234650839714,262144 /prefetch:8
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://www.google.com/coacbE
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com
unknown
https://anglebug.com/7714
unknown
https://google-ohttp-relay-join.fastly-edge.com/Enabled_Consent_HoldbackARA_limited_Stable_20230926l
unknown
https://google-ohttp-relay-join.fastly-edge.com/I
unknown
http://185.215.113.103/steam/random.exeC:
unknown
http://185.215.113.37/e2b1563c6670f193.phpk
unknown
https://google-ohttp-relay-join.fastly-edge.com/(L
unknown
https://clients2.googleusercontent.com/crx/blobs/AY4GWKCjSWa8TD5HR0ssoNSHmv1DlGbxavvv4f4_vreCQV6o4JdgbhTns13WqVLfraA3idGD1YqVFdL1d29hUkKmBRQxeBB8OW5ZEZvDIDLLC0_H7OAK-03clOTMdE15SKgAxlKa5Za-otUDEb42n7phqLA20ygc_Y63/EFAIDNBMNNNIBPCAJPCGLCLEFINDMKAJ_24_9_1_1.crx
142.250.185.129
https://google-ohttp-relay-join.fastly-edge.com/8Q
unknown
http://185.215.113.37/e2b1563c6670f193.phps
unknown
https://chrome.google.com/webstore?hl=enahh
unknown
https://nuget.org/nuget.exe
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://185.215.113.37/e2b1563c6670f193.phpc
unknown
https://issuetracker.google.com/255411748
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://chrome.google.com/webstore
unknown
https://www.google.com/chromesuggestionsJK
unknown
https://contoso.com/Icon
unknown
http://185.215.113.103/steam/random.exe395d7
unknown
https://support.google.com/chrome/?p=blockedb
unknown
https://issuetracker.google.com/161903006
unknown
http://tls-tunnel-check.googlezip.net/connect2
unknown
https://google-ohttp-relay-join.fastly-edge.com/~F
unknown
https://youtube.LR
unknown
https://github.com/Pester/Pester
unknown
https://www.google.com/favicon.ico
216.58.206.68
https://duckduckgo.com/favicon.ico
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
http://anglebug.com/7556
unknown
http://185.215.113.43/Zu7JuNko/index.phpded
unknown
https://google-ohttp-relay-join.fastly-edge.com/;L
unknown
https://google-ohttp-relay-join.fastly-edge.com/LB
unknown
https://www.google.com/b
unknown
https://clients2.googleusercontent.com/crx/blobs/AY4GWKDHKllS27BO_e8bCnbax_jg8ytdTG4Uzua5Kte91Msonmjt9Ssh1u4j53F3UYy-997sHknkzKEy9994XId3zBBDiju_YSunzv5QYwyL8XEx9VuF26n3JIgkmCYaLzIAxlKa5UdUDZoPCHdwU63c7rFT0JUxfsWG/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_82_1_0.crx
142.250.185.129
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
https://google-ohttp-relay-join.fastly-edge.com/%L
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
http://185.215.113.43/Zu7JuNko/index.php$v8
unknown
https://google-ohttp-relay-join.fastly-edge.com/FB
unknown
http://anglebug.com/5007
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://google-ohttp-relay-join.fastly-edge.com/xJ
unknown
http://185.215.113.43/Zu7JuNko/index.phpD
unknown
http://185.215.113.37:
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://google-ohttp-relay-safebrowsing.fastly-edge.com/https://google-ohttp-relay-safebrowsing.fast
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview29
unknown
https://google-ohttp-relay-join.fastly-edge.com/xB
unknown
http://185.215.113.43/Zu7JuNko/index.phpL
unknown
https://google-ohttp-relay-join.fastly-edge.com/6B
unknown
https://google-ohttp-relay-join.fastly-edge.com/Control_Notice_MPArch_M1_XS_Delay_GA4Kids_Beta_20230
unknown
http://185.215.113.43/Zu7JuNko/index.php1.0
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
http://185.215.113.103/test/so.ps1t
unknown
https://apis.google.com
unknown
https://google-ohttp-relay-join.fastly-edge.com/5L
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://nonexistent.googlezip.net/
unknown
http://185.215.113.43/Zu7JuNko/index.php0
unknown
https://google-ohttp-relay-join.fastly-edge.com/https://google-ohttp-relay-join.fastly-edge.com/I
unknown
https://google-ohttp-relay-join.fastly-edge.com/iI
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
http://anglebug.com/5901
unknown
https://google-ohttp-relay-join.fastly-edge.com/iB
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://www.google.com/search
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
youtube-ui.l.google.com
172.217.18.14
google.com
142.250.185.206
www3.l.google.com
142.250.186.78
play.google.com
142.250.185.174
www.google.com
216.58.206.68
googlehosted.l.googleusercontent.com
142.250.185.129
youtube.com
142.250.186.46
clients2.googleusercontent.com
unknown
accounts.youtube.com
unknown
chrome.google.com
unknown
www.youtube.com
unknown
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
185.215.113.37
unknown
Portugal
malicious
192.168.2.8
unknown
unknown
malicious
142.250.186.46
youtube.com
United States
142.250.186.78
www3.l.google.com
United States
142.250.185.129
googlehosted.l.googleusercontent.com
United States
172.217.16.206
unknown
United States
172.217.18.14
youtube-ui.l.google.com
United States
216.58.206.68
www.google.com
United States
239.255.255.250
unknown
Reserved
142.250.185.174
play.google.com
United States
185.215.113.103
unknown
Portugal
127.0.0.1
unknown
unknown
There are 3 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
8a145ab7b3.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
cee706a53f.exe
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName

Memdumps

Base Address
Regiontype
Protect
Malicious
4E00000
direct allocation
page read and write
malicious
1AA3000
heap
page read and write
malicious
5660000
direct allocation
page read and write
malicious
4F30000
direct allocation
page read and write
malicious
54E0000
direct allocation
page read and write
malicious
52B0000
direct allocation
page read and write
malicious
19ED000
heap
page read and write
malicious
4F00000
direct allocation
page read and write
malicious
751000
unkown
page execute and read and write
malicious
D81000
unkown
page execute and read and write
malicious
F7B000
heap
page read and write
malicious
9FB000
heap
page read and write
malicious
4820000
direct allocation
page read and write
malicious
50F0000
direct allocation
page read and write
malicious
D81000
unkown
page execute and read and write
malicious
177B000
heap
page read and write
malicious
D81000
unkown
page execute and read and write
malicious
121B000
heap
page read and write
malicious
D81000
unkown
page execute and read and write
malicious
4D10000
direct allocation
page read and write
malicious
401000
remote allocation
page execute and read and write
malicious
4EE0000
direct allocation
page read and write
malicious
12DE000
heap
page read and write
malicious
751000
unkown
page execute and read and write
malicious
4E70000
direct allocation
page read and write
malicious
D81000
unkown
page execute and read and write
malicious
D81000
unkown
page execute and read and write
malicious
751000
unkown
page execute and read and write
malicious
631000
unkown
page execute and read and write
malicious
5CB801B08000
trusted library allocation
page read and write
7608002E4000
direct allocation
page read and write
40AF000
stack
page read and write
5CB8011C4000
trusted library allocation
page read and write
3DBC00160000
trusted library allocation
page read and write
19AF4960000
heap
page read and write
49A0000
direct allocation
page execute and read and write
5B49000
trusted library allocation
page read and write
19BE000
stack
page read and write
4C71000
heap
page read and write
C9F000
heap
page read and write
BFE000
stack
page read and write
50C0000
direct allocation
page execute and read and write
1D0BE000
stack
page read and write
5C6C02190000
trusted library allocation
page read and write
246FD350000
trusted library allocation
page read and write
784E000
stack
page read and write
724000
heap
page read and write
D04000
heap
page read and write
4961000
heap
page read and write
4881000
heap
page read and write
5051E7E000
stack
page read and write
B6C00918000
trusted library allocation
page read and write
4A81000
heap
page read and write
3DBC00060000
trusted library allocation
page read and write
51E1000
heap
page read and write
5C6C0245C000
trusted library allocation
page read and write
3B5F000
stack
page read and write
1DD84000
heap
page read and write
141A000
unkown
page execute and read and write
4961000
heap
page read and write
724000
heap
page read and write
342F000
stack
page read and write
B6C01BAC000
trusted library allocation
page read and write
2F00000
direct allocation
page read and write
4881000
heap
page read and write
4C40000
heap
page read and write
B6C010C0000
trusted library allocation
page read and write
4391000
heap
page read and write
724000
heap
page read and write
4810000
direct allocation
page read and write
760800254000
direct allocation
page read and write
5C6C014F0000
trusted library allocation
page read and write
466E000
stack
page read and write
483E000
stack
page read and write
1CD9F000
stack
page read and write
11D4000
heap
page read and write
3DBC001F4000
trusted library allocation
page read and write
33AE000
stack
page read and write
4C71000
heap
page read and write
5C6C024AC000
trusted library allocation
page read and write
4391000
heap
page read and write
357E000
stack
page read and write
7D2C000
stack
page read and write
B6C01820000
trusted library allocation
page read and write
832000
unkown
page execute and read and write
6FA0000
trusted library allocation
page execute and read and write
561F000
stack
page read and write
5C6C02D6C000
trusted library allocation
page read and write
15F0000
direct allocation
page read and write
5C6C01C0C000
trusted library allocation
page read and write
3F5E000
stack
page read and write
43AF000
stack
page read and write
5C6C01DE0000
trusted library allocation
page read and write
17CF000
heap
page read and write
5B2000298000
trusted library allocation
page read and write
B38000
unkown
page execute and read and write
5C6C01F44000
trusted library allocation
page read and write
5CB8003A8000
trusted library allocation
page read and write
45FF000
stack
page read and write
801000
unkown
page execute and read and write
5640000
heap
page read and write
4391000
heap
page read and write
5C6C01E6C000
trusted library allocation
page read and write
4898000
heap
page read and write
5CB8010D4000
trusted library allocation
page read and write
246FD4C8000
heap
page read and write
4391000
heap
page read and write
D04000
heap
page read and write
5CB801B30000
trusted library allocation
page read and write
5CB80138C000
trusted library allocation
page read and write
B6C01538000
trusted library allocation
page read and write
5C6C01A64000
trusted library allocation
page read and write
40DE000
stack
page read and write
5CB8012AC000
trusted library allocation
page read and write
387E000
stack
page read and write
246FCB40000
trusted library allocation
page read and write
246FD462000
heap
page read and write
246FD260000
trusted library allocation
page read and write
B6C01A88000
trusted library allocation
page read and write
19AF48D2000
heap
page read and write
29AC00298000
trusted library allocation
page read and write
19A000
stack
page read and write
99A000
unkown
page execute and read and write
B6C01B44000
trusted library allocation
page read and write
3DBC00154000
trusted library allocation
page read and write
5B2000298000
trusted library allocation
page read and write
B6C01540000
trusted library allocation
page read and write
CBC000
heap
page read and write
3DBC006C0000
trusted library allocation
page read and write
724000
heap
page read and write
5CB801378000
trusted library allocation
page read and write
5CB801358000
trusted library allocation
page read and write
4E21000
heap
page read and write
DE9000
unkown
page read and write
CD4000
heap
page read and write
365F000
stack
page read and write
1839EE88000
heap
page read and write
5CB8014E0000
trusted library allocation
page read and write
3FFE000
stack
page read and write
5CB801998000
trusted library allocation
page read and write
4391000
heap
page read and write
5CB80153C000
trusted library allocation
page read and write
4AB1000
heap
page read and write
7650000
heap
page read and write
610000
heap
page read and write
B6C01268000
trusted library allocation
page read and write
5CB800290000
trusted library allocation
page read and write
4961000
heap
page read and write
1CEBF000
stack
page read and write
5CB801774000
trusted library allocation
page read and write
5CB8013D8000
trusted library allocation
page read and write
5C6C0127C000
trusted library allocation
page read and write
246FD2A0000
trusted library allocation
page read and write
11D4000
heap
page read and write
5C6C021C4000
trusted library allocation
page read and write
4E21000
heap
page read and write
B6C00E40000
trusted library allocation
page read and write
3DBC001C4000
trusted library allocation
page read and write
151F000
stack
page read and write
5C6C0240C000
trusted library allocation
page read and write
5C6C00154000
trusted library allocation
page read and write
934000
heap
page read and write
CD4000
heap
page read and write
3DBC00330000
trusted library allocation
page read and write
5CB801080000
trusted library allocation
page read and write
432F000
stack
page read and write
724000
heap
page read and write
4391000
heap
page read and write
B6C0098C000
trusted library allocation
page read and write
4AB1000
heap
page read and write
5C6C0028C000
trusted library allocation
page read and write
B6C018FC000
trusted library allocation
page read and write
B6C0125C000
trusted library allocation
page read and write
5CB8018E8000
trusted library allocation
page read and write
C4E000
unkown
page execute and write copy
3DBC00240000
trusted library allocation
page read and write
5C6C021B4000
trusted library allocation
page read and write
5C6C01FF0000
trusted library allocation
page read and write
5061000
heap
page read and write
5CB80040C000
trusted library allocation
page read and write
B6C018C8000
trusted library allocation
page read and write
5C6C022EC000
trusted library allocation
page read and write
5C6C01E5C000
trusted library allocation
page read and write
50523FB000
stack
page read and write
5CB8019A4000
trusted library allocation
page read and write
B6C016AC000
trusted library allocation
page read and write
94D000
unkown
page execute and read and write
B6C01C10000
trusted library allocation
page read and write
19A4000
heap
page read and write
B6C01418000
trusted library allocation
page read and write
109D000
unkown
page execute and write copy
724000
heap
page read and write
3DBC002E8000
trusted library allocation
page read and write
2F00000
direct allocation
page read and write
5CB801908000
trusted library allocation
page read and write
419F000
stack
page read and write
D04000
heap
page read and write
B6C01A60000
trusted library allocation
page read and write
5C6C02284000
trusted library allocation
page read and write
724000
heap
page read and write
5620000
direct allocation
page execute and read and write
1243000
unkown
page execute and read and write
B6C01668000
trusted library allocation
page read and write
B6C01810000
trusted library allocation
page read and write
5CB801CB4000
trusted library allocation
page read and write
4E10000
direct allocation
page read and write
315F000
stack
page read and write
D04000
heap
page read and write
C00000
direct allocation
page read and write
B6C01258000
trusted library allocation
page read and write
5CB801A28000
trusted library allocation
page read and write
1D6FE000
stack
page read and write
246FBE41000
heap
page read and write
3570000
direct allocation
page read and write
4E21000
heap
page read and write
B6C012D0000
trusted library allocation
page read and write
246FD4F6000
heap
page read and write
82B000
unkown
page execute and read and write
5C6C01F24000
trusted library allocation
page read and write
5CB8014C8000
trusted library allocation
page read and write
5CB80187C000
trusted library allocation
page read and write
30D0000
heap
page read and write
5CB8010A0000
trusted library allocation
page read and write
5C6C01A24000
trusted library allocation
page read and write
4C71000
heap
page read and write
5C6C00FE4000
trusted library allocation
page read and write
51E1000
heap
page read and write
5040000
direct allocation
page execute and read and write
5CB8017F8000
trusted library allocation
page read and write
15F0000
direct allocation
page read and write
724000
heap
page read and write
5CB801248000
trusted library allocation
page read and write
5CB800601000
trusted library allocation
page read and write
5C6C02224000
trusted library allocation
page read and write
51E1000
heap
page read and write
4961000
heap
page read and write
1CE9F000
stack
page read and write
934000
heap
page read and write
3F9E000
stack
page read and write
611F000
stack
page read and write
1D11F000
stack
page read and write
B6C0167C000
trusted library allocation
page read and write
CA0000
heap
page read and write
156E000
stack
page read and write
11D4000
heap
page read and write
B6C0199C000
trusted library allocation
page read and write
D80000
unkown
page readonly
684E000
stack
page read and write
4A81000
heap
page read and write
B6C01634000
trusted library allocation
page read and write
5C6C0066C000
trusted library allocation
page read and write
B6C012DC000
trusted library allocation
page read and write
50E0000
direct allocation
page execute and read and write
B6C01AD4000
trusted library allocation
page read and write
51E1000
heap
page read and write
5C6C022D4000
trusted library allocation
page read and write
B6C0109C000
trusted library allocation
page read and write
2DEE000
stack
page read and write
578D000
stack
page read and write
760800278000
direct allocation
page read and write
457F000
stack
page read and write
5C6C01DA0000
trusted library allocation
page read and write
57A0000
direct allocation
page execute and read and write
3DBC002E8000
trusted library allocation
page read and write
5CB800EB8000
trusted library allocation
page read and write
CD4000
heap
page read and write
5C6C00228000
trusted library allocation
page read and write
33CF000
stack
page read and write
B6C016BC000
trusted library allocation
page read and write
43EE000
stack
page read and write
5CB800404000
trusted library allocation
page read and write
5C6C01DD0000
trusted library allocation
page read and write
3DBC003C0000
trusted library allocation
page read and write
246FBEFF000
heap
page read and write
5C6C00F2C000
trusted library allocation
page read and write
51E1000
heap
page read and write
4AB1000
heap
page read and write
50510FE000
unkown
page readonly
3DBC0024C000
trusted library allocation
page read and write
5C6C02424000
trusted library allocation
page read and write
5CB801AAC000
trusted library allocation
page read and write
4E21000
heap
page read and write
4C71000
heap
page read and write
5C6C01C20000
trusted library allocation
page read and write
5061000
heap
page read and write
5CB8018E4000
trusted library allocation
page read and write
5C6C02478000
trusted library allocation
page read and write
B6C01C4C000
trusted library allocation
page read and write
4E10000
direct allocation
page read and write
4990000
heap
page read and write
C00000
direct allocation
page read and write
5060000
heap
page read and write
B6C014D0000
trusted library allocation
page read and write
5061000
heap
page read and write
4880000
heap
page read and write
5051DFE000
unkown
page readonly
3DBC006E0000
trusted library allocation
page read and write
5C6C001DC000
trusted library allocation
page read and write
4C71000
heap
page read and write
C4F000
unkown
page execute and write copy
4AB1000
heap
page read and write
5C6C00F18000
trusted library allocation
page read and write
4961000
heap
page read and write
3E7F000
stack
page read and write
C6B000
heap
page read and write
724000
heap
page read and write
4391000
heap
page read and write
1640000
heap
page read and write
51E1000
heap
page read and write
3B9E000
stack
page read and write
5061000
heap
page read and write
4961000
heap
page read and write
CD4000
heap
page read and write
50513FB000
stack
page read and write
5CB8003B4000
trusted library allocation
page read and write
370F000
stack
page read and write
4C71000
heap
page read and write
4E3C000
stack
page read and write
5CB80147C000
trusted library allocation
page read and write
11D4000
heap
page read and write
5C6C01F4C000
trusted library allocation
page read and write
F7B000
unkown
page execute and read and write
934000
heap
page read and write
376E000
stack
page read and write
4A81000
heap
page read and write
934000
heap
page read and write
B6C00ED0000
trusted library allocation
page read and write
B6C01934000
trusted library allocation
page read and write
B6C01A84000
trusted library allocation
page read and write
5C6C00240000
trusted library allocation
page read and write
29AC002A8000
trusted library allocation
page read and write
49F1000
heap
page read and write
5CB801644000
trusted library allocation
page read and write
724000
heap
page read and write
630000
unkown
page read and write
3C9F000
stack
page read and write
5CB8015B0000
trusted library allocation
page read and write
5061000
heap
page read and write
5CB801630000
trusted library allocation
page read and write
1241000
unkown
page execute and read and write
5B2000298000
trusted library allocation
page read and write
5C6C01DD8000
trusted library allocation
page read and write
B6C015EC000
trusted library allocation
page read and write
5B69000
trusted library allocation
page read and write
51E1000
heap
page read and write
19AF48D1000
heap
page read and write
4C71000
heap
page read and write
469F000
stack
page read and write
CD4000
heap
page read and write
19A4000
heap
page read and write
5CB80108C000
trusted library allocation
page read and write
FBB000
heap
page read and write
3DBC003E8000
trusted library allocation
page read and write
5CB800948000
trusted library allocation
page read and write
4A00000
direct allocation
page execute and read and write
B6C0039C000
trusted library allocation
page read and write
760800274000
direct allocation
page read and write
5C6C00674000
trusted library allocation
page read and write
CD4000
heap
page read and write
B6C01A48000
trusted library allocation
page read and write
B6C01614000
trusted library allocation
page read and write
80D000
unkown
page execute and read and write
5C6C021F4000
trusted library allocation
page read and write
5CB8008B4000
trusted library allocation
page read and write
5C6C001D8000
trusted library allocation
page read and write
2F8F000
stack
page read and write
1DB1D000
stack
page read and write
5061000
heap
page read and write
CD4000
heap
page read and write
246FBE5B000
heap
page read and write
3155000
trusted library allocation
page execute and read and write
2C6E000
stack
page read and write
3C6E000
stack
page read and write
B6C016A8000
trusted library allocation
page read and write
5061000
heap
page read and write
709E000
stack
page read and write
87007FE000
stack
page read and write
7B60000
heap
page read and write
246FD350000
trusted library allocation
page read and write
C7B000
heap
page read and write
1D1FE000
stack
page read and write
3DBC003C0000
trusted library allocation
page read and write
127F000
unkown
page execute and write copy
1839EE84000
heap
page read and write
8700FFE000
unkown
page readonly
4881000
heap
page read and write
328F000
stack
page read and write
19A4000
heap
page read and write
4A8E000
stack
page read and write
B6C010A0000
trusted library allocation
page read and write
5CB8017B8000
trusted library allocation
page read and write
43A0000
heap
page execute and read and write
4C71000
heap
page read and write
11D4000
heap
page read and write
12DA000
heap
page read and write
680E000
stack
page read and write
DE9000
unkown
page write copy
B6C009E0000
trusted library allocation
page read and write
5CB8002F0000
trusted library allocation
page read and write
5B20002C0000
trusted library allocation
page read and write
15F0000
direct allocation
page read and write
5C6C02344000
trusted library allocation
page read and write
441F000
stack
page read and write
45AF000
stack
page read and write
5C6C01D14000
trusted library allocation
page read and write
183A2380000
heap
page read and write
5B2000264000
trusted library allocation
page read and write
53EF000
stack
page read and write
2F00000
direct allocation
page read and write
4A30000
direct allocation
page execute and read and write
3DBC001AC000
trusted library allocation
page read and write
5CB800E20000
trusted library allocation
page read and write
B6C01B74000
trusted library allocation
page read and write
BE4000
heap
page read and write
1839EE86000
heap
page read and write
1990000
direct allocation
page read and write
1243000
unkown
page execute and read and write
3DBC002E8000
trusted library allocation
page read and write
D04000
heap
page read and write
3DBC00330000
trusted library allocation
page read and write
B6C01480000
trusted library allocation
page read and write
37FE000
stack
page read and write
B6C014F8000
trusted library allocation
page read and write
B6C018A4000
trusted library allocation
page read and write
5CB8002FC000
trusted library allocation
page read and write
5061000
heap
page read and write
B6C01338000
trusted library allocation
page read and write
4C71000
heap
page read and write
4391000
heap
page read and write
94D000
unkown
page execute and write copy
5080000
direct allocation
page execute and read and write
51E1000
heap
page read and write
294E000
stack
page read and write
D2E000
heap
page read and write
2F98000
heap
page read and write
4391000
heap
page read and write
5CB800F28000
trusted library allocation
page read and write
3DBC0063C000
trusted library allocation
page read and write
D81000
unkown
page execute and write copy
6760000
heap
page read and write
5CB801018000
trusted library allocation
page read and write
495F000
stack
page read and write
246FBE13000
heap
page read and write
3DBC00124000
trusted library allocation
page read and write
538F000
stack
page read and write
5B20002B0000
trusted library allocation
page read and write
B6C01358000
trusted library allocation
page read and write
B6C010D4000
trusted library allocation
page read and write
B6C01904000
trusted library allocation
page read and write
5C6C022BC000
trusted library allocation
page read and write
5C6C01E60000
trusted library allocation
page read and write
5200000
heap
page read and write
1D4BE000
stack
page read and write
5C16000
heap
page read and write
B6C018E4000
trusted library allocation
page read and write
303F000
stack
page read and write
80D000
unkown
page execute and read and write
5C6C01E2C000
trusted library allocation
page read and write
4E21000
heap
page read and write
4961000
heap
page read and write
51E1000
heap
page read and write
1D2BD000
stack
page read and write
4881000
heap
page read and write
64A000
remote allocation
page execute and read and write
1DA8E000
stack
page read and write
5C6C00218000
trusted library allocation
page read and write
5CB801D08000
trusted library allocation
page read and write
B6C019A0000
trusted library allocation
page read and write
25D8000
trusted library allocation
page read and write
3DBC002A4000
trusted library allocation
page read and write
5CB801BCC000
trusted library allocation
page read and write
183A28B5000
heap
page read and write
5C6C021DC000
trusted library allocation
page read and write
19A83510000
heap
page read and write
2490000
heap
page read and write
38DF000
stack
page read and write
5CB801914000
trusted library allocation
page read and write
B6C00920000
trusted library allocation
page read and write
5C6C01514000
trusted library allocation
page read and write
5C6C01B64000
trusted library allocation
page read and write
19AF4902000
heap
page read and write
C3F000
unkown
page execute and read and write
DF0000
direct allocation
page read and write
4315000
heap
page execute and read and write
C2A000
heap
page read and write
5C6C02128000
trusted library allocation
page read and write
5C6C01FE0000
trusted library allocation
page read and write
51E1000
heap
page read and write
5C6C01D80000
trusted library allocation
page read and write
3DBC00154000
trusted library allocation
page read and write
5CB8015C4000
trusted library allocation
page read and write
19EE000
stack
page read and write
1CF4E000
stack
page read and write
E62000
unkown
page execute and read and write
688A000
stack
page read and write
5C6C02220000
trusted library allocation
page read and write
934000
heap
page read and write
13D0000
heap
page read and write
B6C0158C000
trusted library allocation
page read and write
5CB8009B0000
trusted library allocation
page read and write
2CEF000
stack
page read and write
362E000
stack
page read and write
32CE000
stack
page read and write
5CB801584000
trusted library allocation
page read and write
B6C012F8000
trusted library allocation
page read and write
5CB0000
heap
page read and write
724000
heap
page read and write
330000
heap
page read and write
3DBC00668000
trusted library allocation
page read and write
724000
heap
page read and write
4E40000
heap
page read and write
B6C013C0000
trusted library allocation
page read and write
449E000
stack
page read and write
934000
heap
page read and write
1D2FC000
stack
page read and write
B6C01320000
trusted library allocation
page read and write
5CB800F5C000
trusted library allocation
page read and write
1CFDF000
stack
page read and write
1D1BD000
stack
page read and write
5061000
heap
page read and write
4E21000
heap
page read and write
1D51D000
stack
page read and write
B6C01380000
trusted library allocation
page read and write
50B0000
direct allocation
page execute and read and write
4810000
direct allocation
page read and write
870A7FE000
stack
page read and write
5C6C01C68000
trusted library allocation
page read and write
5C6C023BC000
trusted library allocation
page read and write
50A0000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
3120000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
1409000
heap
page read and write
471E000
stack
page read and write
1210000
heap
page read and write
F7B000
unkown
page execute and read and write
B6C019A4000
trusted library allocation
page read and write
3DBC003D4000
trusted library allocation
page read and write
934000
heap
page read and write
724000
heap
page read and write
5061000
heap
page read and write
3450000
heap
page read and write
2BB0000
heap
page read and write
5CB801510000
trusted library allocation
page read and write
5CB8009F8000
trusted library allocation
page read and write
5C10000
heap
page read and write
4881000
heap
page read and write
1D5EF000
stack
page read and write
51E1000
heap
page read and write
750000
unkown
page readonly
5CB801078000
trusted library allocation
page read and write
4C71000
heap
page read and write
4391000
heap
page read and write
4391000
heap
page read and write
750000
unkown
page read and write
B6C00F80000
trusted library allocation
page read and write
934000
heap
page read and write
639C000
stack
page read and write
5CB8002B0000
trusted library allocation
page read and write
5C6C0023C000
trusted library allocation
page read and write
692000
unkown
page execute and read and write
4CDE000
stack
page read and write
4391000
heap
page read and write
487F000
stack
page read and write
5CB801634000
trusted library allocation
page read and write
5C6C02070000
trusted library allocation
page read and write
246FBE2B000
heap
page read and write
5C6C0222C000
trusted library allocation
page read and write
6F7E000
stack
page read and write
5077000
heap
page read and write
50A0000
direct allocation
page execute and read and write
5CB801278000
trusted library allocation
page read and write
B6C01090000
trusted library allocation
page read and write
B6C015E4000
trusted library allocation
page read and write
5C6C01C78000
trusted library allocation
page read and write
5CB801734000
trusted library allocation
page read and write
CD4000
heap
page read and write
B6C01324000
trusted library allocation
page read and write
5060000
direct allocation
page execute and read and write
35FE000
stack
page read and write
B6C00958000
trusted library allocation
page read and write
B6C01AF4000
trusted library allocation
page read and write
246FD4D3000
heap
page read and write
4E21000
heap
page read and write
5CB8014E4000
trusted library allocation
page read and write
109D000
unkown
page execute and read and write
4391000
heap
page read and write
19A4000
heap
page read and write
5C6C01CF4000
trusted library allocation
page read and write
2A60000
direct allocation
page read and write
51E1000
heap
page read and write
5C6C002B0000
trusted library allocation
page read and write
7050000
trusted library allocation
page read and write
5CB801850000
trusted library allocation
page read and write
5FDF000
stack
page read and write
724000
heap
page read and write
B6C00F44000
trusted library allocation
page read and write
4391000
heap
page read and write
4E21000
heap
page read and write
5CB8018CC000
trusted library allocation
page read and write
C13000
unkown
page execute and read and write
724000
heap
page read and write
2E6E000
stack
page read and write
5061000
heap
page read and write
7DFB000
stack
page read and write
5B20002CC000
trusted library allocation
page read and write
B6C01130000
trusted library allocation
page read and write
4391000
heap
page read and write
5EDE000
stack
page read and write
51E1000
heap
page read and write
B6C0039C000
trusted library allocation
page read and write
148F000
stack
page read and write
8E5000
remote allocation
page execute and read and write
4E10000
direct allocation
page read and write
5C6C02324000
trusted library allocation
page read and write
550E000
stack
page read and write
421E000
stack
page read and write
C60000
heap
page read and write
24D0000
trusted library allocation
page read and write
5061000
heap
page read and write
51E1000
heap
page read and write
4E10000
direct allocation
page read and write
391E000
stack
page read and write
50520FE000
unkown
page readonly
B6C014DC000
trusted library allocation
page read and write
3F6F000
stack
page read and write
C4E000
unkown
page execute and read and write
B6C014FC000
trusted library allocation
page read and write
B6C01950000
trusted library allocation
page read and write
19A823C0000
unkown
page read and write
B6C01588000
trusted library allocation
page read and write
50524FE000
unkown
page readonly
5C6C01CCC000
trusted library allocation
page read and write
1085000
unkown
page execute and read and write
3DBC000FC000
trusted library allocation
page read and write
486E000
stack
page read and write
3DBC00228000
trusted library allocation
page read and write
DF0000
direct allocation
page read and write
B6C00248000
trusted library allocation
page read and write
246FD441000
heap
page read and write
42FF000
stack
page read and write
3DBC002C4000
trusted library allocation
page read and write
B6C01914000
trusted library allocation
page read and write
B6C00830000
trusted library allocation
page read and write
51E1000
heap
page read and write
476F000
stack
page read and write
4881000
heap
page read and write
5CB801B54000
trusted library allocation
page read and write
4AB1000
heap
page read and write
15EC000
stack
page read and write
5CB8011F0000
trusted library allocation
page read and write
326E000
stack
page read and write
12AE000
stack
page read and write
51E1000
heap
page read and write
30BF000
stack
page read and write
5C6C0021C000
trusted library allocation
page read and write
5C6C01C90000
trusted library allocation
page read and write
51E1000
heap
page read and write
28C0000
heap
page read and write
183A28B3000
heap
page read and write
19A4000
heap
page read and write
452E000
stack
page read and write
934000
heap
page read and write
4C71000
heap
page read and write
D60000
heap
page read and write
4391000
heap
page read and write
B6C019C8000
trusted library allocation
page read and write
4961000
heap
page read and write
24680000000
trusted library allocation
page read and write
3AAE000
stack
page read and write
5C6C01F98000
trusted library allocation
page read and write
17BC000
heap
page read and write
3A0F000
stack
page read and write
322F000
stack
page read and write
76A3000
heap
page read and write
B6C014C8000
trusted library allocation
page read and write
5CB801AF8000
trusted library allocation
page read and write
B6C01A3C000
trusted library allocation
page read and write
4E90000
direct allocation
page execute and read and write
4881000
heap
page read and write
5B2000298000
trusted library allocation
page read and write
B6C00E7C000
trusted library allocation
page read and write
B6C01160000
trusted library allocation
page read and write
34AF000
stack
page read and write
4961000
heap
page read and write
5C6C008FC000
trusted library allocation
page read and write
5CB801838000
trusted library allocation
page read and write
5CB801401000
trusted library allocation
page read and write
4E10000
direct allocation
page read and write
5C6C01AB4000
trusted library allocation
page read and write
5CB80081C000
trusted library allocation
page read and write
5CB801C98000
trusted library allocation
page read and write
5CB801724000
trusted library allocation
page read and write
4881000
heap
page read and write
CA0000
direct allocation
page read and write
183A2373000
heap
page read and write
5CB800F18000
trusted library allocation
page read and write
5C6C01D00000
trusted library allocation
page read and write
B6C0137C000
trusted library allocation
page read and write
5C6C00E34000
trusted library allocation
page read and write
5CB800248000
trusted library allocation
page read and write
724000
heap
page read and write
1418000
heap
page read and write
5061000
heap
page read and write
CE2000
heap
page read and write
4E21000
heap
page read and write
1DAED000
stack
page read and write
5CB8008FC000
trusted library allocation
page read and write
4391000
heap
page read and write
5CB800E68000
trusted library allocation
page read and write
2A5C000
heap
page read and write
FE5000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
4961000
heap
page read and write
19AF48D9000
heap
page read and write
5CB801A64000
trusted library allocation
page read and write
7A60000
trusted library allocation
page execute and read and write
934000
heap
page read and write
B6C015E0000
trusted library allocation
page read and write
B6C0143C000
trusted library allocation
page read and write
50F0000
direct allocation
page read and write
5CB8016F0000
trusted library allocation
page read and write
5CB801598000
trusted library allocation
page read and write
99A000
unkown
page execute and read and write
69B000
unkown
page execute and read and write
5060000
direct allocation
page execute and read and write
355E000
stack
page read and write
B6C0193C000
trusted library allocation
page read and write
724000
heap
page read and write
5CB80166C000
trusted library allocation
page read and write
5CB801954000
trusted library allocation
page read and write
29AC002CC000
trusted library allocation
page read and write
5CB801144000
trusted library allocation
page read and write
49AE000
stack
page read and write
3DBC0016C000
trusted library allocation
page read and write
B6C011C4000
trusted library allocation
page read and write
5CB8013BC000
trusted library allocation
page read and write
5C6C00220000
trusted library allocation
page read and write
7608002B0000
direct allocation
page read and write
B6C018B8000
trusted library allocation
page read and write
50B0000
direct allocation
page execute and read and write
4E21000
heap
page read and write
4B2F000
stack
page read and write
5CB801A2C000
trusted library allocation
page read and write
934000
heap
page read and write
183A237A000
heap
page read and write
4961000
heap
page read and write
4961000
heap
page read and write
31A8000
heap
page read and write
5CB80091C000
trusted library allocation
page read and write
4961000
heap
page read and write
B6C01494000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
1A70000
heap
page read and write
B38000
unkown
page execute and read and write
B6C01BCC000
trusted library allocation
page read and write
2F3F000
stack
page read and write
58CD000
stack
page read and write
5CB8013E8000
trusted library allocation
page read and write
4961000
heap
page read and write
5CB80098C000
trusted library allocation
page read and write
335000
heap
page read and write
3F1F000
stack
page read and write
3DFF000
stack
page read and write
4961000
heap
page read and write
5C6C01ED4000
trusted library allocation
page read and write
B6C01264000
trusted library allocation
page read and write
6EBE000
stack
page read and write
5C6C0020C000
trusted library allocation
page read and write
B6C01A98000
trusted library allocation
page read and write
3DBC00114000
trusted library allocation
page read and write
5C6C00680000
trusted library allocation
page read and write
3DBC002B0000
trusted library allocation
page read and write
5061000
heap
page read and write
87711F7000
stack
page read and write
4DA0000
heap
page read and write
4A81000
heap
page read and write
B6C019B8000
trusted library allocation
page read and write
314F000
stack
page read and write
750000
unkown
page readonly
5030000
direct allocation
page execute and read and write
3DBC00224000
trusted library allocation
page read and write
3DBC00020000
trusted library allocation
page read and write
B6C012FC000
trusted library allocation
page read and write
B6C018A0000
trusted library allocation
page read and write
569C000
stack
page read and write
B6C0106C000
trusted library allocation
page read and write
440F000
stack
page read and write
5C6C02474000
trusted library allocation
page read and write
39AF000
stack
page read and write
49D0000
direct allocation
page execute and read and write
1D6FE000
stack
page read and write
51E1000
heap
page read and write
183A237A000
heap
page read and write
5C6C023A8000
trusted library allocation
page read and write
4391000
heap
page read and write
4AB1000
heap
page read and write
B6C017A4000
trusted library allocation
page read and write
D04000
heap
page read and write
5C6C00921000
trusted library allocation
page read and write
7608002EC000
direct allocation
page read and write
7D6E000
stack
page read and write
336F000
stack
page read and write
4A81000
heap
page read and write
34BE000
stack
page read and write
B6C01BA4000
trusted library allocation
page read and write
3DBC001F0000
trusted library allocation
page read and write
37F000
stack
page read and write
760800284000
direct allocation
page read and write
1D2FF000
stack
page read and write
6DA6000
heap
page read and write
CD4000
heap
page read and write
5C6C00238000
trusted library allocation
page read and write
4391000
heap
page read and write
5CB8012C4000
trusted library allocation
page read and write
1D94E000
stack
page read and write
D04000
heap
page read and write
19A4000
heap
page read and write
5CB801894000
trusted library allocation
page read and write
5051AFE000
unkown
page readonly
B6C01570000
trusted library allocation
page read and write
4961000
heap
page read and write
B6C01CD8000
trusted library allocation
page read and write
4391000
heap
page read and write
1839EE78000
heap
page read and write
5CB8015C8000
trusted library allocation
page read and write
5C6C014CD000
trusted library allocation
page read and write
D04000
heap
page read and write
437F000
stack
page read and write
19A4000
heap
page read and write
19AF4940000
heap
page read and write
743E000
stack
page read and write
5C6C01C34000
trusted library allocation
page read and write
4881000
heap
page read and write
B6C01824000
trusted library allocation
page read and write
5C6C0064C000
trusted library allocation
page read and write
5CB8011CC000
trusted library allocation
page read and write
5CB8010D8000
trusted library allocation
page read and write
B6C00E1C000
trusted library allocation
page read and write
376E000
stack
page read and write
CA0000
direct allocation
page read and write
CBD000
heap
page read and write
4A81000
heap
page read and write
B6C01558000
trusted library allocation
page read and write
4AB1000
heap
page read and write
5CB8014B0000
trusted library allocation
page read and write
5C6C01B1C000
trusted library allocation
page read and write
5050000
direct allocation
page execute and read and write
5C6C00688000
trusted library allocation
page read and write
4A81000
heap
page read and write
3DBC00210000
trusted library allocation
page read and write
524B000
stack
page read and write
351F000
stack
page read and write
2BAC000
stack
page read and write
877D9FE000
unkown
page readonly
4C71000
heap
page read and write
1DC04000
heap
page read and write
48DF000
stack
page read and write
CA0000
direct allocation
page read and write
4C71000
heap
page read and write
5CB8009B4000
trusted library allocation
page read and write
2BFB000
stack
page read and write
5C6C02074000
trusted library allocation
page read and write
1D0BE000
stack
page read and write
19A4000
heap
page read and write
400E000
stack
page read and write
934000
heap
page read and write
724000
heap
page read and write
3DBC0020C000
trusted library allocation
page read and write
1243000
unkown
page execute and read and write
5CB801320000
trusted library allocation
page read and write
447E000
stack
page read and write
5CB80196C000
trusted library allocation
page read and write
B6C01A38000
trusted library allocation
page read and write
5CB80180C000
trusted library allocation
page read and write
5C6C00F2C000
trusted library allocation
page read and write
49E0000
direct allocation
page execute and read and write
B6C01034000
trusted library allocation
page read and write
51E1000
heap
page read and write
C35000
unkown
page execute and read and write
5CB801CA0000
trusted library allocation
page read and write
B6C0161C000
trusted library allocation
page read and write
246FBF13000
heap
page read and write
B6C0156C000
trusted library allocation
page read and write
5450000
direct allocation
page execute and read and write
B6C01BBC000
trusted library allocation
page read and write
5C6C02054000
trusted library allocation
page read and write
1243000
unkown
page execute and read and write
34EE000
stack
page read and write
427E000
stack
page read and write
1CEDF000
stack
page read and write
4390000
heap
page read and write
4391000
heap
page read and write
1466000
heap
page read and write
844D000
stack
page read and write
51E1000
heap
page read and write
49F1000
heap
page read and write
6D30000
heap
page read and write
5C6C01E78000
trusted library allocation
page read and write
4E21000
heap
page read and write
5C6C01CA4000
trusted library allocation
page read and write
5CB8019A8000
trusted library allocation
page read and write
C00000
direct allocation
page read and write
5CB8011AC000
trusted library allocation
page read and write
2ACE000
stack
page read and write
4C96000
trusted library allocation
page read and write
50514FE000
unkown
page readonly
5C6C0028C000
trusted library allocation
page read and write
5CB8009E0000
trusted library allocation
page read and write
5CB80122C000
trusted library allocation
page read and write
5CB801B70000
trusted library allocation
page read and write
D60000
direct allocation
page read and write
3DBC00330000
trusted library allocation
page read and write
5CB80173C000
trusted library allocation
page read and write
1265000
unkown
page execute and read and write
246FD48C000
heap
page read and write
3BEE000
stack
page read and write
51E1000
heap
page read and write
3DBC00690000
trusted library allocation
page read and write
19A4000
heap
page read and write
4391000
heap
page read and write
52B0000
direct allocation
page read and write
7030000
trusted library allocation
page read and write
5CB80139C000
trusted library allocation
page read and write
6751000
heap
page read and write
2F00000
direct allocation
page read and write
4AAF000
stack
page read and write
4391000
heap
page read and write
43EE000
stack
page read and write
246FD281000
trusted library allocation
page read and write
5C6C01CD0000
trusted library allocation
page read and write
760800220000
direct allocation
page read and write
43BE000
stack
page read and write
5CB801BC0000
trusted library allocation
page read and write
183A237A000
heap
page read and write
5C6C024CC000
trusted library allocation
page read and write
36AF000
stack
page read and write
19A4000
heap
page read and write
B6C015E8000
trusted library allocation
page read and write
724000
heap
page read and write
B6C012BC000
trusted library allocation
page read and write
5C6C01244000
trusted library allocation
page read and write
1D3BE000
stack
page read and write
13AB000
heap
page read and write
29AC00298000
trusted library allocation
page read and write
3DBC00248000
trusted library allocation
page read and write
DF0000
direct allocation
page read and write
B6C01CC0000
trusted library allocation
page read and write
5061000
heap
page read and write
51E1000
heap
page read and write
AF2000
unkown
page execute and write copy
490F000
stack
page read and write
2CD000
stack
page read and write
4C71000
heap
page read and write
934000
heap
page read and write
51E1000
heap
page read and write
32EF000
stack
page read and write
B6C00E60000
trusted library allocation
page read and write
5C6C02440000
trusted library allocation
page read and write
1D33E000
stack
page read and write
3DBC0067C000
trusted library allocation
page read and write
4391000
heap
page read and write
4D10000
direct allocation
page read and write
5CB800E8C000
trusted library allocation
page read and write
D80000
unkown
page read and write
4E21000
heap
page read and write
5CB800418000
trusted library allocation
page read and write
5061000
heap
page read and write
5C6C02068000
trusted library allocation
page read and write
4E21000
heap
page read and write
B6C01A6C000
trusted library allocation
page read and write
2EEE000
stack
page read and write
5CB80080C000
trusted library allocation
page read and write
419F000
stack
page read and write
4E21000
heap
page read and write
246FD360000
trusted library allocation
page read and write
760800240000
direct allocation
page read and write
4391000
heap
page read and write
46DF000
stack
page read and write
A40000
heap
page read and write
C4E000
unkown
page execute and read and write
724000
heap
page read and write
1265000
unkown
page execute and read and write
D80000
unkown
page readonly
CC0000
heap
page read and write
2660000
direct allocation
page read and write
B6C015C8000
trusted library allocation
page read and write
5CB801020000
trusted library allocation
page read and write
5CB800ED0000
trusted library allocation
page read and write
5C6C020B8000
trusted library allocation
page read and write
1057000
unkown
page execute and read and write
724000
heap
page read and write
5C6C020DC000
trusted library allocation
page read and write
B6C01658000
trusted library allocation
page read and write
15F0000
direct allocation
page read and write
5C6C00FEC000
trusted library allocation
page read and write
4C71000
heap
page read and write
458E000
stack
page read and write
5CB8018B8000
trusted library allocation
page read and write
4E21000
heap
page read and write
402D000
stack
page read and write
1288000
heap
page read and write
5C6C01E48000
trusted library allocation
page read and write
246FD2E9000
trusted library allocation
page read and write
5CB8016E0000
trusted library allocation
page read and write
4391000
heap
page read and write
D2C000
stack
page read and write
5C6C00214000
trusted library allocation
page read and write
29AC002EC000
trusted library allocation
page read and write
5C6C01D94000
trusted library allocation
page read and write
B6C01A4C000
trusted library allocation
page read and write
5CB8016F4000
trusted library allocation
page read and write
6F3E000
stack
page read and write
3C6E000
stack
page read and write
1647000
heap
page read and write
418F000
stack
page read and write
3AEF000
stack
page read and write
4881000
heap
page read and write
5CB801540000
trusted library allocation
page read and write
2660000
direct allocation
page read and write
D0E000
heap
page read and write
5C6C01C5C000
trusted library allocation
page read and write
70DF000
stack
page read and write
543E000
stack
page read and write
B6C01C4C000
trusted library allocation
page read and write
3EDF000
stack
page read and write
5CB801184000
trusted library allocation
page read and write
934000
heap
page read and write
183A28E0000
heap
page read and write
5CB80154C000
trusted library allocation
page read and write
B6C018E8000
trusted library allocation
page read and write
C86000
heap
page read and write
51E1000
heap
page read and write
127E000
unkown
page execute and write copy
7DD000
stack
page read and write
4961000
heap
page read and write
B6C01B34000
trusted library allocation
page read and write
51E1000
heap
page read and write
5051CFD000
stack
page read and write
127E000
unkown
page execute and write copy
5CB801B34000
trusted library allocation
page read and write
4C71000
heap
page read and write
5CB800830000
trusted library allocation
page read and write
CCD000
heap
page read and write
1A6B000
stack
page read and write
4E2000
remote allocation
page execute and read and write
B6C014C4000
trusted library allocation
page read and write
934000
heap
page read and write
5CB800278000
trusted library allocation
page read and write
B6C00E64000
trusted library allocation
page read and write
7630000
heap
page execute and read and write
4C71000
heap
page read and write
505207E000
stack
page read and write
5C6C021D0000
trusted library allocation
page read and write
5C6C023D8000
trusted library allocation
page read and write
4E21000
heap
page read and write
5CB800E80000
trusted library allocation
page read and write
30AE000
stack
page read and write
4391000
heap
page read and write
34EE000
stack
page read and write
D80000
unkown
page readonly
44EF000
stack
page read and write
B6C01920000
trusted library allocation
page read and write
B6C00F84000
trusted library allocation
page read and write
CC5000
heap
page read and write
185E000
stack
page read and write
5B2000298000
trusted library allocation
page read and write
50511F9000
stack
page read and write
5B20002FC000
trusted library allocation
page read and write
5C6C014E3000
trusted library allocation
page read and write
38CF000
stack
page read and write
934000
heap
page read and write
B6C014B4000
trusted library allocation
page read and write
246FCCA0000
trusted library section
page readonly
5CB801778000
trusted library allocation
page read and write
BD0000
heap
page read and write
5CB801801000
trusted library allocation
page read and write
4E21000
heap
page read and write
2E8E000
stack
page read and write
5C6C01F68000
trusted library allocation
page read and write
B6C013B8000
trusted library allocation
page read and write
431F000
stack
page read and write
19A4000
heap
page read and write
5CB801810000
trusted library allocation
page read and write
FCA000
unkown
page execute and read and write
78E0000
trusted library allocation
page read and write
4FC0000
direct allocation
page execute and read and write
555000
heap
page read and write
5050000
direct allocation
page execute and read and write
19A4000
heap
page read and write
246FD42C000
heap
page read and write
3580000
direct allocation
page execute and read and write
934000
heap
page read and write
B6C00950000
trusted library allocation
page read and write
2530000
trusted library allocation
page read and write
5090000
direct allocation
page execute and read and write
4960000
heap
page read and write
B6C00FF8000
trusted library allocation
page read and write
4391000
heap
page read and write
5CB8002D4000
trusted library allocation
page read and write
5CB801B18000
trusted library allocation
page read and write
3ACE000
stack
page read and write
5CB800FD8000
trusted library allocation
page read and write
30CE000
stack
page read and write
48EE000
stack
page read and write
877A9FE000
unkown
page readonly
DF0000
direct allocation
page read and write
385F000
stack
page read and write
4C71000
heap
page read and write
4961000
heap
page read and write
307E000
stack
page read and write
4961000
heap
page read and write
5CB8009A0000
trusted library allocation
page read and write
3DBC00154000
trusted library allocation
page read and write
40ED000
stack
page read and write
B6C017E4000
trusted library allocation
page read and write
2F00000
direct allocation
page read and write
246FD2B0000
trusted library allocation
page read and write
5CB801A48000
trusted library allocation
page read and write
690B000
stack
page read and write
5C6C00CB4000
trusted library allocation
page read and write
37BF000
stack
page read and write
5B20002CC000
trusted library allocation
page read and write
4A81000
heap
page read and write
3170000
trusted library allocation
page read and write
934000
heap
page read and write
C2E000
heap
page read and write
4AB1000
heap
page read and write
49F0000
direct allocation
page execute and read and write
4E21000
heap
page read and write
50D0000
direct allocation
page execute and read and write
4810000
direct allocation
page read and write
11D4000
heap
page read and write
4AB1000
heap
page read and write
934000
heap
page read and write
4A3C000
stack
page read and write
4881000
heap
page read and write
5CB801BA8000
trusted library allocation
page read and write
B6C01930000
trusted library allocation
page read and write
49A0000
direct allocation
page execute and read and write
935000
heap
page read and write
3A5F000
stack
page read and write
1340000
heap
page read and write
5CB80177C000
trusted library allocation
page read and write
5C6C01D3C000
trusted library allocation
page read and write
4F5F000
stack
page read and write
B6C01330000
trusted library allocation
page read and write
934000
heap
page read and write
2D3E000
stack
page read and write
87731FF000
stack
page read and write
246FD2F1000
trusted library allocation
page read and write
5CB8015EC000
trusted library allocation
page read and write
B6C01998000
trusted library allocation
page read and write
4A81000
heap
page read and write
5C6C01A95000
trusted library allocation
page read and write
934000
heap
page read and write
4E00000
direct allocation
page read and write
B6C019EC000
trusted library allocation
page read and write
310000
heap
page read and write
5CB800230000
trusted library allocation
page read and write
B6C01A7C000
trusted library allocation
page read and write
934000
heap
page read and write
6F7D000
stack
page read and write
BE4000
heap
page read and write
CD4000
heap
page read and write
5CB800814000
trusted library allocation
page read and write
24E8000
heap
page read and write
1273000
heap
page read and write
4980000
heap
page read and write
DEB000
unkown
page execute and read and write
109E000
unkown
page execute and write copy
51E1000
heap
page read and write
6760000
heap
page read and write
4AF0000
trusted library allocation
page read and write
5CB801590000
trusted library allocation
page read and write
5CB800248000
trusted library allocation
page read and write
5CB801298000
trusted library allocation
page read and write
9F0000
heap
page read and write
127E000
unkown
page execute and read and write
BE4000
heap
page read and write
5CB800F84000
trusted library allocation
page read and write
DF0000
direct allocation
page read and write
5CB80194C000
trusted library allocation
page read and write
5240000
direct allocation
page execute and read and write
4E21000
heap
page read and write
5C6C01B90000
trusted library allocation
page read and write
452E000
stack
page read and write
5C6C01FC0000
trusted library allocation
page read and write
5CB800ED4000
trusted library allocation
page read and write
B6C01A70000
trusted library allocation
page read and write
5CB801CAC000
trusted library allocation
page read and write
5CB801560000
trusted library allocation
page read and write
3DBC0028C000
trusted library allocation
page read and write
5CB8012BC000
trusted library allocation
page read and write
3C5F000
stack
page read and write
3DBC0008C000
trusted library allocation
page read and write
5CB800F38000
trusted library allocation
page read and write
5C6C0118C000
trusted library allocation
page read and write
197E000
stack
page read and write
416E000
stack
page read and write
42DE000
stack
page read and write
183A2375000
heap
page read and write
94E000
unkown
page execute and write copy
4A81000
heap
page read and write
3F1F000
stack
page read and write
5C6C01F18000
trusted library allocation
page read and write
B6C015F0000
trusted library allocation
page read and write
2687000
heap
page read and write
5CB801844000
trusted library allocation
page read and write
3D6F000
stack
page read and write
4FE0000
direct allocation
page execute and read and write
49F1000
heap
page read and write
5CB801C10000
trusted library allocation
page read and write
5CB8018D4000
trusted library allocation
page read and write
B6C014E0000
trusted library allocation
page read and write
B6C019D0000
trusted library allocation
page read and write
4E21000
heap
page read and write
5CB800F58000
trusted library allocation
page read and write
FB9000
heap
page read and write
5061000
heap
page read and write
2F27000
heap
page read and write
C50000
direct allocation
page read and write
29AC002CC000
trusted library allocation
page read and write
3DBC00154000
trusted library allocation
page read and write
FCA000
unkown
page execute and read and write
B6C011A8000
trusted library allocation
page read and write
4E21000
heap
page read and write
5C6C002B0000
trusted library allocation
page read and write
29AC002CC000
trusted library allocation
page read and write
35EF000
stack
page read and write
4391000
heap
page read and write
51E1000
heap
page read and write
5C6C023EC000
trusted library allocation
page read and write
B6C013D8000
trusted library allocation
page read and write
5CB80100C000
trusted library allocation
page read and write
1990000
direct allocation
page read and write
5C6C02368000
trusted library allocation
page read and write
40BE000
stack
page read and write
50518FE000
unkown
page readonly
B6C01CF8000
trusted library allocation
page read and write
5CB80143C000
trusted library allocation
page read and write
29AC00298000
trusted library allocation
page read and write
3DBC002C4000
trusted library allocation
page read and write
5CB801BAC000
trusted library allocation
page read and write
4391000
heap
page read and write
5CB8012C0000
trusted library allocation
page read and write
4961000
heap
page read and write
5C6C02444000
trusted library allocation
page read and write
506F000
stack
page read and write
87077FE000
stack
page read and write
4F60000
direct allocation
page execute and read and write
B6C00F94000
trusted library allocation
page read and write
B6C01D0C000
trusted library allocation
page read and write
C35000
unkown
page execute and read and write
724000
heap
page read and write
B6C01BEC000
trusted library allocation
page read and write
5CB8003B4000
trusted library allocation
page read and write
B6C016DC000
trusted library allocation
page read and write
724000
heap
page read and write
B6C01888000
trusted library allocation
page read and write
2A60000
direct allocation
page read and write
29EA000
heap
page read and write
4391000
heap
page read and write
5C6C01F48000
trusted library allocation
page read and write
5CB801918000
trusted library allocation
page read and write
5040000
direct allocation
page execute and read and write
5C6C01BC8000
trusted library allocation
page read and write
5CB801880000
trusted library allocation
page read and write
5C6C02448000
trusted library allocation
page read and write
384F000
stack
page read and write
324E000
stack
page read and write
4961000
heap
page read and write
4C71000
heap
page read and write
19A4000
heap
page read and write
32DF000
stack
page read and write
19AF490E000
heap
page read and write
5C6C0108C000
trusted library allocation
page read and write
83A0000
heap
page read and write
960000
heap
page read and write
870AFFE000
unkown
page readonly
5050000
direct allocation
page execute and read and write
6EBE000
stack
page read and write
934000
heap
page read and write
144F000
stack
page read and write
405E000
stack
page read and write
378F000
stack
page read and write
9D0000
heap
page read and write
4961000
heap
page read and write
B6C00E4C000
trusted library allocation
page read and write
50522FE000
unkown
page readonly
B6C01708000
trusted library allocation
page read and write
108F000
unkown
page execute and read and write
724000
heap
page read and write
4881000
heap
page read and write
83F0000
trusted library allocation
page read and write
4961000
heap
page read and write
E3E000
stack
page read and write
4A5E000
stack
page read and write
BCE000
stack
page read and write
5C6C01D40000
trusted library allocation
page read and write
3B2E000
stack
page read and write
B6C01924000
trusted library allocation
page read and write
4881000
heap
page read and write
5FDC00238000
direct allocation
page read and write
5CB800E01000
trusted library allocation
page read and write
138E000
stack
page read and write
5060000
direct allocation
page execute and read and write
5C6C002A4000
trusted library allocation
page read and write
5061000
heap
page read and write
8EF000
remote allocation
page execute and read and write
87761FE000
stack
page read and write
3DBC006D0000
trusted library allocation
page read and write
AFD000
stack
page read and write
5CB801C8C000
trusted library allocation
page read and write
B6C00E9C000
trusted library allocation
page read and write
934000
heap
page read and write
4A81000
heap
page read and write
5CB8019E4000
trusted library allocation
page read and write
934000
heap
page read and write
5CB8009E4000
trusted library allocation
page read and write
751000
unkown
page execute and write copy
3ABF000
stack
page read and write
3DBC00330000
trusted library allocation
page read and write
5CB801B84000
trusted library allocation
page read and write
3DBC00218000
trusted library allocation
page read and write
353F000
stack
page read and write
4961000
heap
page read and write
588E000
stack
page read and write
5CB801C68000
trusted library allocation
page read and write
5C6C024C4000
trusted library allocation
page read and write
5C6C01D60000
trusted library allocation
page read and write
4A90000
heap
page read and write
724000
heap
page read and write
934000
heap
page read and write
3012000
heap
page read and write
6DE9000
heap
page read and write
4881000
heap
page read and write
D0F000
heap
page read and write
B6C01198000
trusted library allocation
page read and write
497E000
stack
page read and write
5C6C02150000
trusted library allocation
page read and write
246FD454000
heap
page read and write
5C6C01EBC000
trusted library allocation
page read and write
3F5E000
stack
page read and write
B6C01778000
trusted library allocation
page read and write
5C6C02124000
trusted library allocation
page read and write
5FE000
stack
page read and write
5C5000
stack
page read and write
CD4000
heap
page read and write
431E000
stack
page read and write
5C6C00640000
trusted library allocation
page read and write
5050CFE000
unkown
page readonly
B6C01984000
trusted library allocation
page read and write
B6C01850000
trusted library allocation
page read and write
5C6C01D38000
trusted library allocation
page read and write
5CB800E40000
trusted library allocation
page read and write
E62000
unkown
page execute and read and write
5CB801C9C000
trusted library allocation
page read and write
5CB8015D4000
trusted library allocation
page read and write
870BFFE000
unkown
page readonly
414E000
stack
page read and write
51E1000
heap
page read and write
5C6C0206C000
trusted library allocation
page read and write
B6C01238000
trusted library allocation
page read and write
59CC000
stack
page read and write
870FFFE000
unkown
page readonly
5C6C01F30000
trusted library allocation
page read and write
D25000
heap
page read and write
B6C019BC000
trusted library allocation
page read and write
5C6C020E8000
trusted library allocation
page read and write
5C6C01DA4000
trusted library allocation
page read and write
19A4000
heap
page read and write
3DBC00040000
trusted library allocation
page read and write
D0F000
heap
page read and write
19AF48CA000
heap
page read and write
265E000
stack
page read and write
343E000
stack
page read and write
B6C014EC000
trusted library allocation
page read and write
5CB80198C000
trusted library allocation
page read and write
246FD513000
heap
page read and write
5C6C02468000
trusted library allocation
page read and write
4C6F000
stack
page read and write
50525FC000
stack
page read and write
5C6C01214000
trusted library allocation
page read and write
870C7FE000
stack
page read and write
1839EE6C000
heap
page read and write
5CB801BD4000
trusted library allocation
page read and write
341E000
stack
page read and write
4961000
heap
page read and write
50F0000
direct allocation
page execute and read and write
C50000
direct allocation
page read and write
5CB801B1C000
trusted library allocation
page read and write
5CB801BE4000
trusted library allocation
page read and write
4C71000
heap
page read and write
D04000
heap
page read and write
19A4000
heap
page read and write
4D4C000
stack
page read and write
3DBC000A0000
trusted library allocation
page read and write
6DD0000
heap
page read and write
51E1000
heap
page read and write
5CB8019E8000
trusted library allocation
page read and write
5051BFE000
unkown
page readonly
4C71000
heap
page read and write
5CB801C74000
trusted library allocation
page read and write
B6C01334000
trusted library allocation
page read and write
5C6C0022C000
trusted library allocation
page read and write
19A4000
heap
page read and write
7970000
trusted library allocation
page read and write
870CFFE000
unkown
page readonly
5C6C02228000
trusted library allocation
page read and write
4391000
heap
page read and write
49A0000
direct allocation
page execute and read and write
4B60000
trusted library allocation
page read and write
4391000
heap
page read and write
724000
heap
page read and write
5C6C001F4000
trusted library allocation
page read and write
5C6C01D50000
trusted library allocation
page read and write
5434000
trusted library allocation
page read and write
7020000
trusted library allocation
page read and write
5CB8017C8000
trusted library allocation
page read and write
B6C00F58000
trusted library allocation
page read and write
7B3F000
stack
page read and write
5CB8016F8000
trusted library allocation
page read and write
5CB8015B4000
trusted library allocation
page read and write
5CB801050000
trusted library allocation
page read and write
5B20002A8000
trusted library allocation
page read and write
372F000
stack
page read and write
39AF000
stack
page read and write
12CE000
stack
page read and write
51E1000
heap
page read and write
724000
heap
page read and write
51E1000
heap
page read and write
3BDE000
stack
page read and write
444E000
stack
page read and write
5C6C019D0000
trusted library allocation
page read and write
246FD280000
trusted library allocation
page read and write
11D4000
heap
page read and write
B6C01CB0000
trusted library allocation
page read and write
5C6C022F0000
trusted library allocation
page read and write
4881000
heap
page read and write
19A4000
heap
page read and write
7940000
trusted library allocation
page read and write
B6C0189C000
trusted library allocation
page read and write
109D000
unkown
page execute and write copy
4C71000
heap
page read and write
51E1000
heap
page read and write
4E21000
heap
page read and write
B6C01508000
trusted library allocation
page read and write
4E21000
heap
page read and write
5061000
heap
page read and write
74C000
stack
page read and write
5CB8014DC000
trusted library allocation
page read and write
1CC7E000
stack
page read and write
4C71000
heap
page read and write
2BD0000
heap
page read and write
4A81000
heap
page read and write
8706FFE000
unkown
page readonly
5B2000298000
trusted library allocation
page read and write
302F000
stack
page read and write
934000
heap
page read and write
5CB801334000
trusted library allocation
page read and write
CD4000
heap
page read and write
5CB8011B8000
trusted library allocation
page read and write
A67000
heap
page read and write
409E000
stack
page read and write
B6C00E30000
trusted library allocation
page read and write
5CB801950000
trusted library allocation
page read and write
1990000
direct allocation
page read and write
4FF0000
direct allocation
page execute and read and write
278F000
stack
page read and write
724000
heap
page read and write
174E000
stack
page read and write
11D4000
heap
page read and write
5C6C0231C000
trusted library allocation
page read and write
B6C01BE8000
trusted library allocation
page read and write
5B2000260000
trusted library allocation
page read and write
D04000
heap
page read and write
1A8B000
heap
page read and write
6D60000
heap
page read and write
3DDF000
stack
page read and write
B6C01080000
trusted library allocation
page read and write
495E000
stack
page read and write
141B000
unkown
page execute and write copy
5C6C02058000
trusted library allocation
page read and write
87037FE000
stack
page read and write
724000
heap
page read and write
E62000
unkown
page execute and read and write
C00000
direct allocation
page read and write
5CB800E98000
trusted library allocation
page read and write
5C6C00F90000
trusted library allocation
page read and write
2F0E000
stack
page read and write
5C6C02184000
trusted library allocation
page read and write
3DBC001E0000
trusted library allocation
page read and write
5070000
direct allocation
page execute and read and write
B6C01C74000
trusted library allocation
page read and write
4C71000
heap
page read and write
1D77D000
stack
page read and write
724000
heap
page read and write
8FE000
remote allocation
page execute and read and write
5C6C01F64000
trusted library allocation
page read and write
50519FE000
unkown
page readonly
B6C0198C000
trusted library allocation
page read and write
109D000
unkown
page execute and write copy
5CB800F7C000
trusted library allocation
page read and write
D0F000
heap
page read and write
4C71000
heap
page read and write
5C6C003D8000
trusted library allocation
page read and write
4C71000
heap
page read and write
246FCDE0000
trusted library allocation
page read and write
298E000
heap
page read and write
2E17000
heap
page read and write
8707FFE000
unkown
page readonly
5CB801594000
trusted library allocation
page read and write
574F000
stack
page read and write
51E1000
heap
page read and write
D0F000
heap
page read and write
CA5000
stack
page read and write
5C6C01C58000
trusted library allocation
page read and write
5CB801450000
trusted library allocation
page read and write
3DBC006A8000
trusted library allocation
page read and write
C50000
direct allocation
page read and write
108F000
unkown
page execute and read and write
4A81000
heap
page read and write
5CB80167C000
trusted library allocation
page read and write
CD4000
heap
page read and write
B6C00FB4000
trusted library allocation
page read and write
DEA000
unkown
page execute and read and write
49B0000
direct allocation
page execute and read and write
CD4000
heap
page read and write
5CB800220000
trusted library allocation
page read and write
877B1FC000
stack
page read and write
B38000
unkown
page execute and read and write
19A4000
heap
page read and write
B6C016CC000
trusted library allocation
page read and write
2D27000
heap
page read and write
5CB8003C0000
trusted library allocation
page read and write
B6C00948000
trusted library allocation
page read and write
6BFE000
stack
page read and write
5C6C024E0000
trusted library allocation
page read and write
4AB1000
heap
page read and write
5CB801430000
trusted library allocation
page read and write
246FC700000
heap
page read and write
19A818D0000
trusted library section
page readonly
5C6C02E0C000
trusted library allocation
page read and write
5C6C01D84000
trusted library allocation
page read and write
2D40000
direct allocation
page read and write
B6C00EF0000
trusted library allocation
page read and write
1390000
direct allocation
page execute and read and write
4C71000
heap
page read and write
19AF4820000
heap
page read and write
3DBC003C0000
trusted library allocation
page read and write
B6C008F8000
trusted library allocation
page read and write
3C3E000
stack
page read and write
4CDF000
stack
page read and write
934000
heap
page read and write
386F000
stack
page read and write
750000
unkown
page read and write
1D49D000
stack
page read and write
4961000
heap
page read and write
4391000
heap
page read and write
D60000
direct allocation
page read and write
2A60000
direct allocation
page read and write
3DBC003C0000
trusted library allocation
page read and write
870F7FE000
stack
page read and write
5C6C02364000
trusted library allocation
page read and write
445E000
stack
page read and write
3EAF000
stack
page read and write
5C6C00F30000
trusted library allocation
page read and write
2EAE000
stack
page read and write
246FBE96000
heap
page read and write
4B2F000
stack
page read and write
5CB80092C000
trusted library allocation
page read and write
5C6C020FC000
trusted library allocation
page read and write
5CB801A38000
trusted library allocation
page read and write
4AB1000
heap
page read and write
5CB8017A0000
trusted library allocation
page read and write
13A0000
heap
page read and write
51E1000
heap
page read and write
B6C0187C000
trusted library allocation
page read and write
5CB80121C000
trusted library allocation
page read and write
B6C0174C000
trusted library allocation
page read and write
5CB80186C000
trusted library allocation
page read and write
B6C0194C000
trusted library allocation
page read and write
1C7E000
stack
page read and write
CA0000
direct allocation
page read and write
246FBCC0000
heap
page read and write
B6C0162C000
trusted library allocation
page read and write
1839EE7F000
heap
page read and write
5CB801D18000
trusted library allocation
page read and write
4391000
heap
page read and write
5C6C01FBC000
trusted library allocation
page read and write
4C44000
heap
page read and write
C00000
direct allocation
page read and write
5C6C01B68000
trusted library allocation
page read and write
4391000
heap
page read and write
4AB1000
heap
page read and write
5C6C01534000
trusted library allocation
page read and write
2D50000
direct allocation
page execute and read and write
375F000
stack
page read and write
B6C01838000
trusted library allocation
page read and write
5051A7F000
stack
page read and write
4961000
heap
page read and write
724000
heap
page read and write
78F0000
trusted library allocation
page execute and read and write
B6C013D0000
trusted library allocation
page read and write
D04000
heap
page read and write
398F000
stack
page read and write
44FE000
stack
page read and write
5CB801900000
trusted library allocation
page read and write
B6C009D4000
trusted library allocation
page read and write
B6C01B54000
trusted library allocation
page read and write
934000
heap
page read and write
724000
heap
page read and write
5C6C00F5C000
trusted library allocation
page read and write
2DAE000
stack
page read and write
B6C016F8000
trusted library allocation
page read and write
5030000
direct allocation
page execute and read and write
4391000
heap
page read and write
A4C000
heap
page read and write
5430000
direct allocation
page execute and read and write
801000
unkown
page execute and read and write
5CB8009D4000
trusted library allocation
page read and write
4881000
heap
page read and write
B6C003A8000
trusted library allocation
page read and write
B6C0140C000
trusted library allocation
page read and write
5061000
heap
page read and write
D80000
unkown
page readonly
11D4000
heap
page read and write
5CB801C88000
trusted library allocation
page read and write
5CB801530000
trusted library allocation
page read and write
B6C00978000
trusted library allocation
page read and write
B6C01A68000
trusted library allocation
page read and write
B6C0150C000
trusted library allocation
page read and write
86D0000
trusted library allocation
page read and write
126E000
heap
page read and write
5C6C01C54000
trusted library allocation
page read and write
B6C01954000
trusted library allocation
page read and write
51E1000
heap
page read and write
5CB801338000
trusted library allocation
page read and write
93F000
unkown
page execute and read and write
5C6C020E0000
trusted library allocation
page read and write
4881000
heap
page read and write
3BFF000
stack
page read and write
127F000
unkown
page execute and write copy
4C71000
heap
page read and write
B6C011CC000
trusted library allocation
page read and write
5CB80169C000
trusted library allocation
page read and write
934000
heap
page read and write
5CB8010B0000
trusted library allocation
page read and write
5CB80130C000
trusted library allocation
page read and write
5C6C01F0C000
trusted library allocation
page read and write
5CB8011DC000
trusted library allocation
page read and write
934000
heap
page read and write
3CCE000
stack
page read and write
B6C012EC000
trusted library allocation
page read and write
5CB800801000
trusted library allocation
page read and write
2D00000
direct allocation
page read and write
19A4000
heap
page read and write
367F000
stack
page read and write
B6C01550000
trusted library allocation
page read and write
5CB801C20000
trusted library allocation
page read and write
4EC0000
direct allocation
page execute and read and write
5CB801428000
trusted library allocation
page read and write
5C6C021D8000
trusted library allocation
page read and write
11D4000
heap
page read and write
4A81000
heap
page read and write
4A1F000
stack
page read and write
3EEE000
stack
page read and write
6995000
heap
page read and write
3DBC00214000
trusted library allocation
page read and write
5CB80161C000
trusted library allocation
page read and write
B6C01288000
trusted library allocation
page read and write
345E000
stack
page read and write
3DBC002B0000
trusted library allocation
page read and write
6DA3000
heap
page read and write
4391000
heap
page read and write
934000
heap
page read and write
D04000
heap
page read and write
934000
heap
page read and write
19A4000
heap
page read and write
141B000
unkown
page execute and write copy
B6C00984000
trusted library allocation
page read and write
907000
unkown
page execute and read and write
4391000
heap
page read and write
724000
heap
page read and write
B6C00E5C000
trusted library allocation
page read and write
11D4000
heap
page read and write
3BE000
stack
page read and write
5060000
direct allocation
page execute and read and write
1D480000
heap
page read and write
B6C01A2C000
trusted library allocation
page read and write
5000000
direct allocation
page execute and read and write
4A7D000
stack
page read and write
427F000
stack
page read and write
3DBC006B0000
trusted library allocation
page read and write
5CB801A01000
trusted library allocation
page read and write
B6C016D0000
trusted library allocation
page read and write
B6C010F8000
trusted library allocation
page read and write
4E21000
heap
page read and write
5C6C01BD8000
trusted library allocation
page read and write
B6C002FC000
trusted library allocation
page read and write
5CB8011EC000
trusted library allocation
page read and write
31EE000
stack
page read and write
1D54E000
stack
page read and write
1D98E000
stack
page read and write
4A40000
direct allocation
page execute and read and write
4F80000
direct allocation
page execute and read and write
5061000
heap
page read and write
5C6C00640000
trusted library allocation
page read and write
1CDDE000
stack
page read and write
D60000
direct allocation
page read and write
5C6C00FE4000
trusted library allocation
page read and write
B6C01490000
trusted library allocation
page read and write
5C6C00FB8000
trusted library allocation
page read and write
5051FFE000
unkown
page readonly
472E000
stack
page read and write
5640000
direct allocation
page execute and read and write
5C6C00F3F000
trusted library allocation
page read and write
7532000
heap
page read and write
5CB8012F4000
trusted library allocation
page read and write
5CB8014CC000
trusted library allocation
page read and write
724000
heap
page read and write
5CB801A68000
trusted library allocation
page read and write
5CB801714000
trusted library allocation
page read and write
5CB801684000
trusted library allocation
page read and write
34AF000
stack
page read and write
5C6C020CC000
trusted library allocation
page read and write
30CF000
stack
page read and write
B6C018D4000
trusted library allocation
page read and write
724000
heap
page read and write
BE4000
heap
page read and write
1839EE64000
heap
page read and write
3FAE000
stack
page read and write
877B9FE000
unkown
page readonly
B6C01790000
trusted library allocation
page read and write
1D15E000
stack
page read and write
5CB8019F0000
trusted library allocation
page read and write
5061000
heap
page read and write
1520000
heap
page read and write
B7E000
stack
page read and write
B6C01AE8000
trusted library allocation
page read and write
5B2000238000
trusted library allocation
page read and write
5CB801CD8000
trusted library allocation
page read and write
49A0000
direct allocation
page execute and read and write
D60000
direct allocation
page read and write
49A0000
direct allocation
page execute and read and write
3124000
trusted library allocation
page read and write
BE4000
heap
page read and write
2BE0000
heap
page read and write
4E21000
heap
page read and write
724000
heap
page read and write
B6C01364000
trusted library allocation
page read and write
5CB800964000
trusted library allocation
page read and write
35EF000
stack
page read and write
261E000
stack
page read and write
50B0000
trusted library allocation
page read and write
5B20002C0000
trusted library allocation
page read and write
D10000
heap
page read and write
485E000
stack
page read and write
51E1000
heap
page read and write
5C6C02358000
trusted library allocation
page read and write
5CB8008C8000
trusted library allocation
page read and write
5CB801794000
trusted library allocation
page read and write
B6C015A8000
trusted library allocation
page read and write
4AA0000
heap
page read and write
4C71000
heap
page read and write
B6C00ED4000
trusted library allocation
page read and write
473F000
stack
page read and write
724000
heap
page read and write
D60000
direct allocation
page read and write
183A28C3000
heap
page read and write
5CB80107C000
trusted library allocation
page read and write
1CC5F000
stack
page read and write
4A81000
heap
page read and write
1990000
direct allocation
page read and write
5C6C00154000
trusted library allocation
page read and write
29AC002CC000
trusted library allocation
page read and write
4EAE000
stack
page read and write
11D4000
heap
page read and write
4391000
heap
page read and write
1DBEC000
stack
page read and write
4E21000
heap
page read and write
724000
heap
page read and write
B6C018CC000
trusted library allocation
page read and write
934000
heap
page read and write
19A4000
heap
page read and write
4A81000
heap
page read and write
4961000
heap
page read and write
5C6C0218C000
trusted library allocation
page read and write
4E10000
direct allocation
page read and write
5CB800968000
trusted library allocation
page read and write
B6C01688000
trusted library allocation
page read and write
C00000
direct allocation
page read and write
3DBC0018C000
trusted library allocation
page read and write
109E000
unkown
page execute and write copy
3DBC00160000
trusted library allocation
page read and write
B6C002E0000
trusted library allocation
page read and write
5CB800938000
trusted library allocation
page read and write
5C6C00330000
trusted library allocation
page read and write
183A2375000
heap
page read and write
B6C014A8000
trusted library allocation
page read and write
3DBC0006C000
trusted library allocation
page read and write
5CB800EAC000
trusted library allocation
page read and write
298B000
heap
page read and write
373E000
stack
page read and write
4961000
heap
page read and write
720000
heap
page read and write
30E000
stack
page read and write
6F5000
stack
page read and write
11D4000
heap
page read and write
4C71000
heap
page read and write
4E21000
heap
page read and write
3DBC003E8000
trusted library allocation
page read and write
482F000
stack
page read and write
5CB80024C000
trusted library allocation
page read and write
9AE000
unkown
page execute and read and write
51E1000
heap
page read and write
4E26000
heap
page read and write
D4E000
stack
page read and write
4391000
heap
page read and write
5B2000248000
trusted library allocation
page read and write
49F1000
heap
page read and write
D60000
direct allocation
page read and write
5CB8015AC000
trusted library allocation
page read and write
2968000
heap
page read and write
320F000
stack
page read and write
3D8E000
stack
page read and write
DF0000
direct allocation
page read and write
183A2373000
heap
page read and write
5CB800954000
trusted library allocation
page read and write
5CB800F48000
trusted library allocation
page read and write
5CB801C01000
trusted library allocation
page read and write
B6C01430000
trusted library allocation
page read and write
5CB80197C000
trusted library allocation
page read and write
125A000
heap
page read and write
5CB801904000
trusted library allocation
page read and write
5051B7E000
stack
page read and write
B6C0060C000
trusted library allocation
page read and write
B6C0063C000
trusted library allocation
page read and write
C35000
unkown
page execute and read and write
5C6C023A4000
trusted library allocation
page read and write
4A81000
heap
page read and write
5CB80111C000
trusted library allocation
page read and write
B6C01684000
trusted library allocation
page read and write
5CB801130000
trusted library allocation
page read and write
4961000
heap
page read and write
CD4000
heap
page read and write
379F000
stack
page read and write
CA0000
direct allocation
page read and write
4E21000
heap
page read and write
5CB8008F8000
trusted library allocation
page read and write
4A81000
heap
page read and write
5C6C022C0000
trusted library allocation
page read and write
934000
heap
page read and write
4C71000
heap
page read and write
3DBC00660000
trusted library allocation
page read and write
2660000
direct allocation
page read and write
5C6C02484000
trusted library allocation
page read and write
5C6C01D68000
trusted library allocation
page read and write
5CB801198000
trusted library allocation
page read and write
D04000
heap
page read and write
4B37000
heap
page read and write
5CB801AD4000
trusted library allocation
page read and write
B6C01898000
trusted library allocation
page read and write
415F000
stack
page read and write
63A0000
heap
page read and write
5C6C0028C000
trusted library allocation
page read and write
3A4E000
stack
page read and write
5CB8016BC000
trusted library allocation
page read and write
407F000
stack
page read and write
4391000
heap
page read and write
5C6C01B64000
trusted library allocation
page read and write
C3C000
stack
page read and write
3EBD000
stack
page read and write
B6C00F7C000
trusted library allocation
page read and write
4A81000
heap
page read and write
41EF000
stack
page read and write
B6C01644000
trusted library allocation
page read and write
B6C01374000
trusted library allocation
page read and write
50D0000
direct allocation
page execute and read and write
19AF4920000
heap
page readonly
934000
heap
page read and write
4961000
heap
page read and write
5CB8012EC000
trusted library allocation
page read and write
B6C019E8000
trusted library allocation
page read and write
4E21000
heap
page read and write
4391000
heap
page read and write
4E10000
direct allocation
page read and write
5CB80126C000
trusted library allocation
page read and write
323E000
stack
page read and write
5CB8003D8000
trusted library allocation
page read and write
B6C00F38000
trusted library allocation
page read and write
5CB801C50000
trusted library allocation
page read and write
6E30000
trusted library allocation
page read and write
1CEFD000
stack
page read and write
7950000
trusted library allocation
page read and write
CD4000
heap
page read and write
5C6C02390000
trusted library allocation
page read and write
B6C009E8000
trusted library allocation
page read and write
2E6F000
stack
page read and write
AF1000
unkown
page execute and read and write
410F000
stack
page read and write
4961000
heap
page read and write
13B0000
heap
page read and write
4C71000
heap
page read and write
5C6C01D24000
trusted library allocation
page read and write
246FC5F0000
trusted library allocation
page read and write
4E0000
heap
page read and write
C13000
unkown
page execute and read and write
455F000
stack
page read and write
B6C01A64000
trusted library allocation
page read and write
B6C01344000
trusted library allocation
page read and write
3FBF000
stack
page read and write
429F000
stack
page read and write
3DBC00298000
trusted library allocation
page read and write
D00000
heap
page read and write
D00000
heap
page read and write
5CB800EBC000
trusted library allocation
page read and write
57B0000
direct allocation
page execute and read and write
47DF000
stack
page read and write
D04000
heap
page read and write
491F000
stack
page read and write
1D04F000
stack
page read and write
5CB801238000
trusted library allocation
page read and write
46CE000
stack
page read and write
5CB801C30000
trusted library allocation
page read and write
CD4000
heap
page read and write
B6C01AA0000
trusted library allocation
page read and write
5CB800EE0000
trusted library allocation
page read and write
4C71000
heap
page read and write
934000
heap
page read and write
248F000
stack
page read and write
D25000
heap
page read and write
51E1000
heap
page read and write
5C6C00160000
trusted library allocation
page read and write
B6C01894000
trusted library allocation
page read and write
5C6C01DB8000
trusted library allocation
page read and write
51E0000
heap
page read and write
4A90000
heap
page execute and read and write
5C6C01E58000
trusted library allocation
page read and write
4E21000
heap
page read and write
1D4FC000
stack
page read and write
17E9000
heap
page read and write
4A5F000
stack
page read and write
4C71000
heap
page read and write
37CE000
stack
page read and write
724000
heap
page read and write
138E000
stack
page read and write
4391000
heap
page read and write
5CB800920000
trusted library allocation
page read and write
5C6C0226C000
trusted library allocation
page read and write
369E000
stack
page read and write
B6C00998000
trusted library allocation
page read and write
2A60000
direct allocation
page read and write
306F000
stack
page read and write
319E000
stack
page read and write
DEA000
unkown
page execute and read and write
B6C00288000
trusted library allocation
page read and write
250A000
trusted library allocation
page execute and read and write
3C8F000
stack
page read and write
29AC002E0000
trusted library allocation
page read and write
51E1000
heap
page read and write
2A60000
direct allocation
page read and write
4C71000
heap
page read and write
934000
heap
page read and write
5CB800814000
trusted library allocation
page read and write
5CB8016CC000
trusted library allocation
page read and write
11D4000
heap
page read and write
3DBC00404000
trusted library allocation
page read and write
5C6C01EFC000
trusted library allocation
page read and write
934000
heap
page read and write
5C6C022DC000
trusted library allocation
page read and write
4391000
heap
page read and write
C00000
direct allocation
page read and write
5061000
heap
page read and write
5060000
direct allocation
page execute and read and write
400000
heap
page read and write
5CB800E34000
trusted library allocation
page read and write
5C6C019E4000
trusted library allocation
page read and write
50512FE000
unkown
page readonly
41FE000
stack
page read and write
3DBC000B4000
trusted library allocation
page read and write
5CB801538000
trusted library allocation
page read and write
B6C014AC000
trusted library allocation
page read and write
DF0000
direct allocation
page read and write
4391000
heap
page read and write
D0F000
heap
page read and write
3F7E000
stack
page read and write
4FE0000
direct allocation
page execute and read and write
4961000
heap
page read and write
5C6C0213C000
trusted library allocation
page read and write
5CB801A18000
trusted library allocation
page read and write
4FB0000
direct allocation
page execute and read and write
4FE0000
direct allocation
page execute and read and write
934000
heap
page read and write
B6C0039C000
trusted library allocation
page read and write
246FD620000
remote allocation
page read and write
4E21000
heap
page read and write
5CB8012F0000
trusted library allocation
page read and write
4391000
heap
page read and write
3B0E000
stack
page read and write
B6C00EAC000
trusted library allocation
page read and write
5C6C01F10000
trusted library allocation
page read and write
B6C01A14000
trusted library allocation
page read and write
5C6C02308000
trusted library allocation
page read and write
5C6C00160000
trusted library allocation
page read and write
5C6C01A4C000
trusted library allocation
page read and write
1D060000
heap
page read and write
1ADE000
heap
page read and write
5CB801230000
trusted library allocation
page read and write
4A60000
heap
page read and write
5C6C008C8000
trusted library allocation
page read and write
505197E000
stack
page read and write
4961000
heap
page read and write
4A20000
direct allocation
page execute and read and write
B6C011B8000
trusted library allocation
page read and write
51E1000
heap
page read and write
5CB8017A4000
trusted library allocation
page read and write
2F5E000
stack
page read and write
CD4000
heap
page read and write
5CB800E7C000
trusted library allocation
page read and write
441E000
stack
page read and write
5CB8013D0000
trusted library allocation
page read and write
4A9E000
stack
page read and write
246FCCB0000
trusted library section
page readonly
5CB80144C000
trusted library allocation
page read and write
11D4000
heap
page read and write
B6C01170000
trusted library allocation
page read and write
934000
heap
page read and write
5CB8003CC000
trusted library allocation
page read and write
3B2E000
stack
page read and write
7780000
trusted library allocation
page read and write
5050A7E000
stack
page read and write
183A28A8000
heap
page read and write
5C6C0200C000
trusted library allocation
page read and write
29AC00298000
trusted library allocation
page read and write
B6C01020000
trusted library allocation
page read and write
11D4000
heap
page read and write
402E000
stack
page read and write
BE4000
heap
page read and write
341F000
stack
page read and write
3B7F000
stack
page read and write
183A28E6000
heap
page read and write
934000
heap
page read and write
4A4F000
stack
page read and write
3FEF000
stack
page read and write
5061000
heap
page read and write
5C6C01BB0000
trusted library allocation
page read and write
1839EE7F000
heap
page read and write
5C6C01C98000
trusted library allocation
page read and write
7910000
trusted library allocation
page read and write
1D43F000
stack
page read and write
246FBEB5000
heap
page read and write
724000
heap
page read and write
4AB1000
heap
page read and write
D04000
heap
page read and write
5C6C01BD4000
trusted library allocation
page read and write
D81000
unkown
page execute and write copy
5CB801194000
trusted library allocation
page read and write
4C71000
heap
page read and write
496F000
stack
page read and write
5CB801748000
trusted library allocation
page read and write
5CB801354000
trusted library allocation
page read and write
934000
heap
page read and write
1990000
direct allocation
page read and write
5CB801694000
trusted library allocation
page read and write
699000
unkown
page read and write
7AFE000
stack
page read and write
51E1000
heap
page read and write
246FCCC0000
trusted library section
page readonly
CA0000
direct allocation
page read and write
183A2373000
heap
page read and write
5CB801A70000
trusted library allocation
page read and write
5CB80109C000
trusted library allocation
page read and write
2660000
direct allocation
page read and write
B6C0169C000
trusted library allocation
page read and write
E31000
unkown
page execute and read and write
B6C0100C000
trusted library allocation
page read and write
5CB801438000
trusted library allocation
page read and write
5660000
direct allocation
page execute and read and write
4A81000
heap
page read and write
B6C01884000
trusted library allocation
page read and write
D04000
heap
page read and write
877E1FE000
stack
page read and write
386F000
stack
page read and write
29AC002C0000
trusted library allocation
page read and write
501F000
stack
page read and write
65E000
remote allocation
page execute and read and write
5620000
trusted library allocation
page read and write
3CBF000
stack
page read and write
1D260000
heap
page read and write
5CB8013A0000
trusted library allocation
page read and write
7060000
trusted library allocation
page read and write
2F1F000
stack
page read and write
5CB800918000
trusted library allocation
page read and write
A54000
heap
page read and write
B6C009B4000
trusted library allocation
page read and write
33AE000
stack
page read and write
B6C00F98000
trusted library allocation
page read and write
4391000
heap
page read and write
365F000
stack
page read and write
5061000
heap
page read and write
5050EFE000
unkown
page readonly
B6C008E8000
trusted library allocation
page read and write
D04000
heap
page read and write
5C6C02034000
trusted library allocation
page read and write
4F70000
direct allocation
page execute and read and write
4961000
heap
page read and write
4E21000
heap
page read and write
4881000
heap
page read and write
409E000
stack
page read and write
1A80000
heap
page read and write
3DBC0026C000
trusted library allocation
page read and write
6C12000
heap
page read and write
5C6C01A40000
trusted library allocation
page read and write
715A000
stack
page read and write
2A60000
direct allocation
page read and write
5CB8008E4000
trusted library allocation
page read and write
5CB8014B4000
trusted library allocation
page read and write
B6C015B4000
trusted library allocation
page read and write
B6C0101C000
trusted library allocation
page read and write
5C6C022E0000
trusted library allocation
page read and write
7AF2000
heap
page read and write
5C6C001E0000
trusted library allocation
page read and write
4C71000
heap
page read and write
3DBC001D4000
trusted library allocation
page read and write
B6C018D0000
trusted library allocation
page read and write
3F3F000
stack
page read and write
1A13000
heap
page read and write
8702FFE000
unkown
page readonly
126F000
unkown
page execute and read and write
B6C01554000
trusted library allocation
page read and write
5030000
direct allocation
page execute and read and write
5CB801030000
trusted library allocation
page read and write
B6C01968000
trusted library allocation
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
87087FD000
stack
page read and write
43A1000
heap
page read and write
B6C01B70000
trusted library allocation
page read and write
15F0000
direct allocation
page read and write
51E1000
heap
page read and write
B6C01510000
trusted library allocation
page read and write
5CB801D20000
trusted library allocation
page read and write
305E000
stack
page read and write
4961000
heap
page read and write
5C6C02434000
trusted library allocation
page read and write
B6C0130C000
trusted library allocation
page read and write
4C71000
heap
page read and write
5C6C01DC0000
trusted library allocation
page read and write
5C6C0225C000
trusted library allocation
page read and write
5CB801234000
trusted library allocation
page read and write
1D98F000
stack
page read and write
D26000
heap
page read and write
134E000
stack
page read and write
4A81000
heap
page read and write
5C6C02144000
trusted library allocation
page read and write
724000
heap
page read and write
DEB000
unkown
page execute and write copy
310E000
stack
page read and write
1D485000
heap
page read and write
4C71000
heap
page read and write
D04000
heap
page read and write
1A2E000
stack
page read and write
183A237B000
heap
page read and write
5CB8010E4000
trusted library allocation
page read and write
19CA000
heap
page read and write
436E000
stack
page read and write
B6C01AC0000
trusted library allocation
page read and write
87781FB000
stack
page read and write
4881000
heap
page read and write
B6C01724000
trusted library allocation
page read and write
5C6C0247C000
trusted library allocation
page read and write
F70000
heap
page read and write
3DBC001DC000
trusted library allocation
page read and write
246FBEA8000
heap
page read and write
34CE000
stack
page read and write
724000
heap
page read and write
6BBE000
stack
page read and write
6F90000
trusted library allocation
page read and write
5B20002C0000
trusted library allocation
page read and write
934000
heap
page read and write
5CB8014F8000
trusted library allocation
page read and write
369F000
stack
page read and write
DE9000
unkown
page write copy
183A237F000
heap
page read and write
5CB80142C000
trusted library allocation
page read and write
2A60000
direct allocation
page read and write
DEB000
unkown
page execute and write copy
1750000
heap
page read and write
CD4000
heap
page read and write
3A7E000
stack
page read and write
CA0000
direct allocation
page read and write
5C6C02094000
trusted library allocation
page read and write
2D00000
direct allocation
page read and write
5CB8015A8000
trusted library allocation
page read and write
5CB801138000
trusted library allocation
page read and write
5C6C00F2C000
trusted library allocation
page read and write
FDE000
unkown
page execute and read and write
4A81000
heap
page read and write
5C6C0211C000
trusted library allocation
page read and write
B6C015C4000
trusted library allocation
page read and write
DE9000
unkown
page write copy
4C71000
heap
page read and write
505187E000
stack
page read and write
B6C01078000
trusted library allocation
page read and write
C00000
direct allocation
page read and write
5C6C01BDC000
trusted library allocation
page read and write
4A81000
heap
page read and write
5CB801698000
trusted library allocation
page read and write
4EB0000
direct allocation
page execute and read and write
5CB800F10000
trusted library allocation
page read and write
5CB80106C000
trusted library allocation
page read and write
724000
heap
page read and write
2CFF000
stack
page read and write
5CB801628000
trusted library allocation
page read and write
5CB8014A8000
trusted library allocation
page read and write
711E000
stack
page read and write
183A28C9000
heap
page read and write
934000
heap
page read and write
5C6C01BEC000
trusted library allocation
page read and write
4E21000
heap
page read and write
5C6C02298000
trusted library allocation
page read and write
5CB801154000
trusted library allocation
page read and write
3F4E000
stack
page read and write
747E000
stack
page read and write
19A4000
heap
page read and write
183A28A5000
heap
page read and write
51E1000
heap
page read and write
305F000
stack
page read and write
1D27D000
stack
page read and write
445F000
stack
page read and write
5C6C02E74000
trusted library allocation
page read and write
4391000
heap
page read and write
698B000
stack
page read and write
934000
heap
page read and write
51E1000
heap
page read and write
141A000
unkown
page execute and read and write
878C000
stack
page read and write
5CB8012DC000
trusted library allocation
page read and write
2660000
direct allocation
page read and write
5CB8010C4000
trusted library allocation
page read and write
3DBC00404000
trusted library allocation
page read and write
1D57F000
stack
page read and write
5C6C023C8000
trusted library allocation
page read and write
2A7B000
heap
page read and write
131F000
heap
page read and write
51E1000
heap
page read and write
5CB801AC4000
trusted library allocation
page read and write
3017000
heap
page read and write
5CB8013DC000
trusted library allocation
page read and write
246FD511000
heap
page read and write
5CB800EF4000
trusted library allocation
page read and write
4961000
heap
page read and write
B6C003E4000
trusted library allocation
page read and write
3DBC006D0000
trusted library allocation
page read and write
2DDF000
stack
page read and write
1D33F000
stack
page read and write
4961000
heap
page read and write
51E1000
heap
page read and write
5CB801484000
trusted library allocation
page read and write
3D9F000
stack
page read and write
5C6C01514000
trusted library allocation
page read and write
C3F000
unkown
page execute and read and write
5CB801A84000
trusted library allocation
page read and write
FDE000
unkown
page execute and read and write
4881000
direct allocation
page read and write
4A81000
heap
page read and write
2660000
direct allocation
page read and write
5C6C02464000
trusted library allocation
page read and write
B6C0039C000
trusted library allocation
page read and write
1D73C000
stack
page read and write
B6C01618000
trusted library allocation
page read and write
5B20002E0000
trusted library allocation
page read and write
4A81000
heap
page read and write
5CB801074000
trusted library allocation
page read and write
312D000
trusted library allocation
page execute and read and write
5CB801CE8000
trusted library allocation
page read and write
2E00000
direct allocation
page execute and read and write
481E000
stack
page read and write
2F8E000
stack
page read and write
5CB8009C4000
trusted library allocation
page read and write
4391000
heap
page read and write
5CB8013EC000
trusted library allocation
page read and write
B6C01694000
trusted library allocation
page read and write
3FC000
stack
page read and write
5CB801934000
trusted library allocation
page read and write
5061000
heap
page read and write
2FBE000
stack
page read and write
934000
heap
page read and write
4B9F000
stack
page read and write
D20000
heap
page read and write
5C6C01B70000
trusted library allocation
page read and write
3DBC00601000
trusted library allocation
page read and write
B6C0147C000
trusted library allocation
page read and write
4881000
heap
page read and write
246FBE7D000
heap
page read and write
5B2000298000
trusted library allocation
page read and write
5CB800E4C000
trusted library allocation
page read and write
B6C01AB0000
trusted library allocation
page read and write
4FE0000
direct allocation
page execute and read and write
4A81000
heap
page read and write
D04000
heap
page read and write
B3C000
stack
page read and write
1D35E000
stack
page read and write
3DBC002E8000
trusted library allocation
page read and write
4391000
heap
page read and write
19A4000
heap
page read and write
B6C013DC000
trusted library allocation
page read and write
C94000
heap
page read and write
7640000
trusted library allocation
page read and write
4F3F000
stack
page read and write
3DBC001E4000
trusted library allocation
page read and write
25BE000
stack
page read and write
DE2000
unkown
page execute and read and write
D04000
heap
page read and write
5CB801610000
trusted library allocation
page read and write
C4E000
unkown
page execute and write copy
11D4000
heap
page read and write
1243000
unkown
page execute and read and write
5420000
direct allocation
page execute and read and write
134F000
stack
page read and write
5050AFE000
unkown
page readonly
724000
heap
page read and write
5CB8016C8000
trusted library allocation
page read and write
3B9E000
stack
page read and write
5C6C02394000
trusted library allocation
page read and write
724000
heap
page read and write
451F000
stack
page read and write
934000
heap
page read and write
19AF48FA000
heap
page read and write
485E000
stack
page read and write
B6C00F24000
trusted library allocation
page read and write
246FC602000
heap
page read and write
7010000
trusted library allocation
page read and write
BAC000
stack
page read and write
35BF000
stack
page read and write
B6C0146C000
trusted library allocation
page read and write
5C6C00640000
trusted library allocation
page read and write
5CB8019BC000
trusted library allocation
page read and write
183A28A9000
heap
page read and write
7608002C8000
direct allocation
page read and write
C50000
direct allocation
page read and write
4881000
heap
page read and write
29AC002D0000
trusted library allocation
page read and write
4961000
heap
page read and write
50DE000
stack
page read and write
4B8F000
stack
page read and write
B6C013D4000
trusted library allocation
page read and write
5CB8017E4000
trusted library allocation
page read and write
3DBC003C0000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
1D47F000
stack
page read and write
4E21000
heap
page read and write
3A1F000
stack
page read and write
CD4000
heap
page read and write
934000
heap
page read and write
4A81000
heap
page read and write
5B2000268000
trusted library allocation
page read and write
2F90000
heap
page read and write
934000
heap
page read and write
5CB801A4C000
trusted library allocation
page read and write
B6C008C4000
trusted library allocation
page read and write
4C71000
heap
page read and write
4881000
heap
page read and write
1CD9E000
stack
page read and write
49F0000
heap
page read and write
C50000
direct allocation
page read and write
3DBC003D8000
trusted library allocation
page read and write
D04000
heap
page read and write
3DBC00670000
trusted library allocation
page read and write
C50000
direct allocation
page read and write
19A4000
heap
page read and write
127E000
unkown
page execute and write copy
4881000
heap
page read and write
B6C01B1C000
trusted library allocation
page read and write
11D4000
heap
page read and write
B6C00E34000
trusted library allocation
page read and write
5C6C001E4000
trusted library allocation
page read and write
319F000
stack
page read and write
6D87000
heap
page read and write
5070000
direct allocation
page execute and read and write
B6C015AC000
trusted library allocation
page read and write
108F000
unkown
page execute and read and write
4391000
heap
page read and write
5CB8015E8000
trusted library allocation
page read and write
C92000
heap
page read and write
4C71000
heap
page read and write
B6C01814000
trusted library allocation
page read and write
BE4000
heap
page read and write
CFF000
heap
page read and write
5030000
direct allocation
page execute and read and write
127E000
unkown
page execute and read and write
4B9E000
stack
page read and write
3D7E000
stack
page read and write
934000
heap
page read and write
5C6C01EE4000
trusted library allocation
page read and write
246FCCE0000
trusted library section
page readonly
3A5F000
stack
page read and write
B6C01964000
trusted library allocation
page read and write
B6C01454000
trusted library allocation
page read and write
5CB801898000
trusted library allocation
page read and write
4B6E000
stack
page read and write
5C6C01DF0000
trusted library allocation
page read and write
B6C0104C000
trusted library allocation
page read and write
1D5BF000
stack
page read and write
7AF0000
heap
page read and write
5CB80101C000
trusted library allocation
page read and write
B6C00248000
trusted library allocation
page read and write
183A2375000
heap
page read and write
5C6C01E7C000
trusted library allocation
page read and write
3DBC006DC000
trusted library allocation
page read and write
5CB8008B8000
trusted library allocation
page read and write
B6C01184000
trusted library allocation
page read and write
C3F000
unkown
page execute and read and write
4AB1000
heap
page read and write
4E10000
direct allocation
page read and write
CD4000
heap
page read and write
183A237F000
heap
page read and write
5CB801964000
trusted library allocation
page read and write
38FF000
stack
page read and write
CE2000
heap
page read and write
B6C019CC000
trusted library allocation
page read and write
5080000
direct allocation
page execute and read and write
934000
heap
page read and write
3152000
trusted library allocation
page read and write
4C71000
heap
page read and write
51E1000
heap
page read and write
5CB800FD4000
trusted library allocation
page read and write
5CB801790000
trusted library allocation
page read and write
724000
heap
page read and write
4C71000
heap
page read and write
4EC0000
heap
page read and write
4C71000
heap
page read and write
5C6C0062F000
trusted library allocation
page read and write
44BF000
stack
page read and write
3DBC00254000
trusted library allocation
page read and write
5CB8015F0000
trusted library allocation
page read and write
B6C019F0000
trusted library allocation
page read and write
5C6C00640000
trusted library allocation
page read and write
750000
unkown
page read and write
5061000
heap
page read and write
B6C01868000
trusted library allocation
page read and write
13FF000
heap
page read and write
FD0000
heap
page read and write
D04000
heap
page read and write
5C6C001F8000
trusted library allocation
page read and write
5CB8003A8000
trusted library allocation
page read and write
24DD000
trusted library allocation
page execute and read and write
87027FD000
stack
page read and write
51E1000
heap
page read and write
4C71000
heap
page read and write
5C6C01F7C000
trusted library allocation
page read and write
934000
heap
page read and write
CD4000
heap
page read and write
5CB801B88000
trusted library allocation
page read and write
5440000
direct allocation
page execute and read and write
4C71000
heap
page read and write
1D5BE000
stack
page read and write
934000
heap
page read and write
1990000
direct allocation
page read and write
B6C0142C000
trusted library allocation
page read and write
5C6C02174000
trusted library allocation
page read and write
4A81000
heap
page read and write
1D84E000
stack
page read and write
5C6C02084000
trusted library allocation
page read and write
318C000
stack
page read and write
5CB801868000
trusted library allocation
page read and write
7B70000
trusted library allocation
page read and write
B6C009C0000
trusted library allocation
page read and write
404F000
stack
page read and write
4AB1000
heap
page read and write
11D4000
heap
page read and write
4A81000
heap
page read and write
5CB801C90000
trusted library allocation
page read and write
54CF000
stack
page read and write
4E21000
heap
page read and write
109D000
unkown
page execute and read and write
B6C013BC000
trusted library allocation
page read and write
2660000
direct allocation
page read and write
4391000
heap
page read and write
3CEF000
stack
page read and write
B6C01040000
trusted library allocation
page read and write
B6C01AF8000
trusted library allocation
page read and write
340E000
stack
page read and write
6EFE000
stack
page read and write
5CB8019B4000
trusted library allocation
page read and write
35CF000
stack
page read and write
4C71000
heap
page read and write
4961000
heap
page read and write
D5E000
stack
page read and write
246FBE91000
heap
page read and write
9CE000
stack
page read and write
5C6C01D28000
trusted library allocation
page read and write
877D1FC000
stack
page read and write
934000
heap
page read and write
5C6C00FE4000
trusted library allocation
page read and write
5CB80075C000
trusted library allocation
page read and write
CE2000
heap
page read and write
5CB800201000
trusted library allocation
page read and write
4A81000
heap
page read and write
3DBC00284000
trusted library allocation
page read and write
B6C01594000
trusted library allocation
page read and write
724000
heap
page read and write
423E000
stack
page read and write
5C6C01C7C000
trusted library allocation
page read and write
5CB801B50000
trusted library allocation
page read and write
246FBE8D000
heap
page read and write
1990000
direct allocation
page read and write
5C6C0242C000
trusted library allocation
page read and write
5CB8018B0000
trusted library allocation
page read and write
5CB801AC0000
trusted library allocation
page read and write
724000
heap
page read and write
4E21000
heap
page read and write
3430000
direct allocation
page read and write
4A88000
heap
page read and write
4990000
direct allocation
page execute and read and write
B6C00408000
trusted library allocation
page read and write
4C71000
heap
page read and write
5CB8019D4000
trusted library allocation
page read and write
5C6C022B8000
trusted library allocation
page read and write
5460000
direct allocation
page execute and read and write
C3E000
stack
page read and write
1D64F000
stack
page read and write
C00000
direct allocation
page read and write
5CB8019EC000
trusted library allocation
page read and write
3DBC000EC000
trusted library allocation
page read and write
B6C01478000
trusted library allocation
page read and write
870DFFE000
unkown
page readonly
11D4000
heap
page read and write
6D52000
heap
page read and write
B6C01CDC000
trusted library allocation
page read and write
2CDF000
stack
page read and write
D80000
unkown
page readonly
B6C008E4000
trusted library allocation
page read and write
4E21000
heap
page read and write
5C6C01F50000
trusted library allocation
page read and write
395F000
stack
page read and write
5CB8017E8000
trusted library allocation
page read and write
5D9E000
stack
page read and write
4391000
heap
page read and write
3DBC00001000
trusted library allocation
page read and write
B6C01714000
trusted library allocation
page read and write
724000
heap
page read and write
5CB801554000
trusted library allocation
page read and write
2BC0000
heap
page read and write
514B000
stack
page read and write
4961000
heap
page read and write
183A2375000
heap
page read and write
3DBC002A4000
trusted library allocation
page read and write
B6C01484000
trusted library allocation
page read and write
B6C009B0000
trusted library allocation
page read and write
724000
heap
page read and write
B6C00F14000
trusted library allocation
page read and write
11D4000
heap
page read and write
4961000
heap
page read and write
B6C01220000
trusted library allocation
page read and write
8525000
trusted library allocation
page read and write
4A81000
heap
page read and write
3C9F000
stack
page read and write
43D1000
trusted library allocation
page read and write
3457000
heap
page read and write
3DBC0069C000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
51F7000
heap
page read and write
3CDE000
stack
page read and write
5C6C01AB4000
trusted library allocation
page read and write
5C6C01D78000
trusted library allocation
page read and write
4AB1000
heap
page read and write
B6C00E0C000
trusted library allocation
page read and write
CD4000
heap
page read and write
CD4000
heap
page read and write
5CB801888000
trusted library allocation
page read and write
724000
heap
page read and write
7BB5000
trusted library allocation
page read and write
5CB8019B8000
trusted library allocation
page read and write
4A81000
heap
page read and write
CD4000
heap
page read and write
1D87E000
stack
page read and write
4A10000
direct allocation
page execute and read and write
5CB801330000
trusted library allocation
page read and write
5C6C02504000
trusted library allocation
page read and write
5CB80158C000
trusted library allocation
page read and write
723E000
stack
page read and write
B6C00EF4000
trusted library allocation
page read and write
51E1000
heap
page read and write
7A50000
heap
page read and write
5CB8003B4000
trusted library allocation
page read and write
5C6C02188000
trusted library allocation
page read and write
498E000
stack
page read and write
5CB801258000
trusted library allocation
page read and write
B6C01B20000
trusted library allocation
page read and write
934000
heap
page read and write
4E21000
heap
page read and write
5280000
direct allocation
page execute and read and write
43B0000
trusted library allocation
page read and write
AF4000
unkown
page execute and write copy
5C6C01920000
trusted library allocation
page read and write
724000
heap
page read and write
5CB801288000
trusted library allocation
page read and write
D04000
heap
page read and write
5061000
heap
page read and write
87097FE000
stack
page read and write
5C6C021EC000
trusted library allocation
page read and write
19A81970000
heap
page read and write
5051EFE000
unkown
page readonly
4C71000
heap
page read and write
5CB800E78000
trusted library allocation
page read and write
DE9000
unkown
page read and write
6E00000
trusted library allocation
page read and write
49F1000
heap
page read and write
F8000
stack
page read and write
505097E000
stack
page read and write
15F0000
direct allocation
page read and write
5C6C01EF4000
trusted library allocation
page read and write
283C000
stack
page read and write
331E000
stack
page read and write
B6C017A0000
trusted library allocation
page read and write
5C6C01B6C000
trusted library allocation
page read and write
5CB8014C0000
trusted library allocation
page read and write
D80000
unkown
page readonly
3DBC0021C000
trusted library allocation
page read and write
5CB800430000
trusted library allocation
page read and write
11D4000
heap
page read and write
5B2000230000
trusted library allocation
page read and write
6B3E000
stack
page read and write
246FD3C0000
trusted library allocation
page read and write
435E000
stack
page read and write
5C6C00F3C000
trusted library allocation
page read and write
4E21000
heap
page read and write
3DBC0023C000
trusted library allocation
page read and write
3D4F000
stack
page read and write
B6C01938000
trusted library allocation
page read and write
24D3000
trusted library allocation
page execute and read and write
5270000
direct allocation
page execute and read and write
11D4000
heap
page read and write
B6C00968000
trusted library allocation
page read and write
4C70000
heap
page read and write
B6C01B64000
trusted library allocation
page read and write
51E1000
heap
page read and write
33DE000
stack
page read and write
19A4000
heap
page read and write
246FD500000
heap
page read and write
724000
heap
page read and write
BE4000
heap
page read and write
4881000
heap
page read and write
5CB801614000
trusted library allocation
page read and write
83B0000
trusted library allocation
page execute and read and write
4AB1000
heap
page read and write
CD4000
heap
page read and write
3DBC00078000
trusted library allocation
page read and write
5C6C01428000
trusted library allocation
page read and write
DEB000
unkown
page execute and read and write
FCA000
unkown
page execute and read and write
5C6C01ED8000
trusted library allocation
page read and write
5CB801680000
trusted library allocation
page read and write
5C6C01160000
trusted library allocation
page read and write
5B20002C0000
trusted library allocation
page read and write
5061000
heap
page read and write
B6C01530000
trusted library allocation
page read and write
5070000
heap
page read and write
409F000
stack
page read and write
B6C012C4000
trusted library allocation
page read and write
42CF000
stack
page read and write
5C6C020B4000
trusted library allocation
page read and write
4A81000
heap
page read and write
4E10000
direct allocation
page read and write
1DC7E000
stack
page read and write
5CB801984000
trusted library allocation
page read and write
54E000
stack
page read and write
24C0000
trusted library allocation
page read and write
183A237F000
heap
page read and write
4881000
heap
page read and write
4E21000
heap
page read and write
4E30000
heap
page read and write
B6C01138000
trusted library allocation
page read and write
5CB80020C000
trusted library allocation
page read and write
459E000
stack
page read and write
1D01E000
stack
page read and write
5240000
heap
page read and write
724000
heap
page read and write
F7B000
unkown
page execute and read and write
36DE000
stack
page read and write
B6C015D4000
trusted library allocation
page read and write
B6C014CC000
trusted library allocation
page read and write
47DF000
stack
page read and write
29AC00298000
trusted library allocation
page read and write
290E000
stack
page read and write
454F000
stack
page read and write
760800264000
direct allocation
page read and write
5CB8002FC000
trusted library allocation
page read and write
5050BF7000
stack
page read and write
5B20002CC000
trusted library allocation
page read and write
934000
heap
page read and write
4391000
heap
page read and write
109D000
unkown
page execute and read and write
4E21000
heap
page read and write
4C71000
heap
page read and write
B6C01BC0000
trusted library allocation
page read and write
4E21000
heap
page read and write
B6C008D8000
trusted library allocation
page read and write
C40000
heap
page read and write
446F000
stack
page read and write
4E21000
heap
page read and write
CD4000
heap
page read and write
4AB1000
heap
page read and write
D04000
heap
page read and write
4961000
heap
page read and write
724000
heap
page read and write
D60000
direct allocation
page read and write
19A4000
heap
page read and write
CD4000
heap
page read and write
5CB8012A8000
trusted library allocation
page read and write
4391000
heap
page read and write
5CB8018EC000
trusted library allocation
page read and write
B6C01450000
trusted library allocation
page read and write
4A81000
heap
page read and write
5C6C01EF0000
trusted library allocation
page read and write
5CB80060C000
trusted library allocation
page read and write
4C71000
heap
page read and write
D60000
direct allocation
page read and write
5C6C0236C000
trusted library allocation
page read and write
4AB1000
heap
page read and write
5C6C01214000
trusted library allocation
page read and write
5C6C01CF8000
trusted library allocation
page read and write
11D4000
heap
page read and write
3FCF000
stack
page read and write
5C6C02014000
trusted library allocation
page read and write
3DBC00618000
trusted library allocation
page read and write
5CB801268000
trusted library allocation
page read and write
3DBC00298000
trusted library allocation
page read and write
528E000
stack
page read and write
1D73E000
stack
page read and write
5C6C01C38000
trusted library allocation
page read and write
4C71000
heap
page read and write
3DBC00330000
trusted library allocation
page read and write
B6C01108000
trusted library allocation
page read and write
7779000
trusted library allocation
page read and write
5C6C00330000
trusted library allocation
page read and write
11D0000
heap
page read and write
7000000
trusted library allocation
page read and write
4A2E000
stack
page read and write
5C6C00FE4000
trusted library allocation
page read and write
5C6C02380000
trusted library allocation
page read and write
246FD620000
remote allocation
page read and write
D50000
heap
page read and write
87057FE000
stack
page read and write
4E21000
heap
page read and write
4391000
heap
page read and write
5CB8014FC000
trusted library allocation
page read and write
51E1000
heap
page read and write
4C71000
heap
page read and write
3B9F000
stack
page read and write
11D4000
heap
page read and write
442A000
trusted library allocation
page read and write
4C71000
heap
page read and write
B6C01680000
trusted library allocation
page read and write
5CB801768000
trusted library allocation
page read and write
4C71000
heap
page read and write
5C6C02238000
trusted library allocation
page read and write
445E000
stack
page read and write
5061000
heap
page read and write
87791FC000
stack
page read and write
E31000
unkown
page execute and read and write
B6C014E4000
trusted library allocation
page read and write
116E000
stack
page read and write
724000
heap
page read and write
5CB801884000
trusted library allocation
page read and write
564E000
stack
page read and write
B6C0126C000
trusted library allocation
page read and write
4C71000
heap
page read and write
934000
heap
page read and write
760800288000
direct allocation
page read and write
1DD7F000
stack
page read and write
359E000
stack
page read and write
4391000
heap
page read and write
4C71000
heap
page read and write
5CB801418000
trusted library allocation
page read and write
246FC702000
heap
page read and write
183A237F000
heap
page read and write
C8F000
heap
page read and write
4ED1000
direct allocation
page read and write
B6C01524000
trusted library allocation
page read and write
2B37000
stack
page read and write
59E000
stack
page read and write
B6C01748000
trusted library allocation
page read and write
5C6C01B64000
trusted library allocation
page read and write
B6C014C0000
trusted library allocation
page read and write
4391000
heap
page read and write
51E1000
heap
page read and write
4AB1000
heap
page read and write
51E1000
heap
page read and write
1D3BE000
stack
page read and write
B6C0153C000
trusted library allocation
page read and write
751000
unkown
page execute and write copy
5B2000298000
trusted library allocation
page read and write
126F000
unkown
page execute and read and write
5C6C02460000
trusted library allocation
page read and write
5CB8009D0000
trusted library allocation
page read and write
B6C01A28000
trusted library allocation
page read and write
B6C01B08000
trusted library allocation
page read and write
4961000
heap
page read and write
51E1000
heap
page read and write
5C6C02480000
trusted library allocation
page read and write
87769FE000
unkown
page readonly
934000
heap
page read and write
4961000
heap
page read and write
80D000
unkown
page execute and read and write
5CB801AE8000
trusted library allocation
page read and write
5CB8002FC000
trusted library allocation
page read and write
4E21000
heap
page read and write
B6C01234000
trusted library allocation
page read and write
B6C010C4000
trusted library allocation
page read and write
4A61000
heap
page read and write
4D10000
direct allocation
page read and write
B6C00F10000
trusted library allocation
page read and write
4391000
heap
page read and write
314A000
trusted library allocation
page execute and read and write
48AF000
stack
page read and write
5C6C022A4000
trusted library allocation
page read and write
4C71000
heap
page read and write
B6C00814000
trusted library allocation
page read and write
6FB0000
trusted library allocation
page read and write
5080000
direct allocation
page execute and read and write
5C6C01F88000
trusted library allocation
page read and write
5B20002A8000
trusted library allocation
page read and write
1D37E000
stack
page read and write
117F000
stack
page read and write
A39000
heap
page read and write
4AB1000
heap
page read and write
4C80000
heap
page read and write
12AE000
stack
page read and write
5CB801A80000
trusted library allocation
page read and write
4AB1000
heap
page read and write
3ECE000
stack
page read and write
42DF000
stack
page read and write
19A4000
heap
page read and write
934000
heap
page read and write
D0F000
heap
page read and write
3130000
trusted library allocation
page read and write
5270000
direct allocation
page execute and read and write
3078000
heap
page read and write
2E3F000
stack
page read and write
4AB1000
heap
page read and write
11D4000
heap
page read and write
4391000
heap
page read and write
B6C0090C000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
5C6C01514000
trusted library allocation
page read and write
5CB801A8C000
trusted library allocation
page read and write
5CB801708000
trusted library allocation
page read and write
5CB800EC0000
trusted library allocation
page read and write
4A81000
heap
page read and write
5061000
heap
page read and write
4391000
heap
page read and write
44AE000
stack
page read and write
3E2F000
stack
page read and write
50516FE000
unkown
page readonly
877E9FE000
unkown
page readonly
3C4E000
stack
page read and write
5C6C020A4000
trusted library allocation
page read and write
38AE000
stack
page read and write
4E21000
heap
page read and write
1D88E000
stack
page read and write
522F000
stack
page read and write
5CB801264000
trusted library allocation
page read and write
3DAE000
stack
page read and write
4961000
heap
page read and write
5CB8013D4000
trusted library allocation
page read and write
87017FE000
stack
page read and write
5C6C024BC000
trusted library allocation
page read and write
5CB801B44000
trusted library allocation
page read and write
51E1000
heap
page read and write
312E000
stack
page read and write
1242000
unkown
page execute and write copy
4391000
heap
page read and write
B6C0092C000
trusted library allocation
page read and write
1D4EE000
stack
page read and write
1D45F000
stack
page read and write
B6C01018000
trusted library allocation
page read and write
AFD000
stack
page read and write
4A81000
heap
page read and write
5CB8017E0000
trusted library allocation
page read and write
870D7FE000
stack
page read and write
5290000
direct allocation
page execute and read and write
11D4000
heap
page read and write
337E000
stack
page read and write
5CB801CD4000
trusted library allocation
page read and write
4391000
heap
page read and write
8705FFE000
unkown
page readonly
B6C0091C000
trusted library allocation
page read and write
934000
heap
page read and write
4E21000
heap
page read and write
6D19000
heap
page read and write
704B000
stack
page read and write
934000
heap
page read and write
24F0000
trusted library allocation
page read and write
246FD280000
trusted library allocation
page read and write
491E000
stack
page read and write
801000
unkown
page execute and read and write
CD4000
heap
page read and write
19A4000
heap
page read and write
CE2000
heap
page read and write
4E5E000
stack
page read and write
6E29000
trusted library allocation
page read and write
2500000
trusted library allocation
page read and write
B6C01768000
trusted library allocation
page read and write
5CB801508000
trusted library allocation
page read and write
11C5000
heap
page read and write
5CB801B0C000
trusted library allocation
page read and write
4C71000
heap
page read and write
4391000
heap
page read and write
5CB8014D0000
trusted library allocation
page read and write
183A28B3000
heap
page read and write
BE4000
heap
page read and write
5C6C01B1C000
trusted library allocation
page read and write
246FBF29000
heap
page read and write
3DBC002E8000
trusted library allocation
page read and write
109E000
unkown
page execute and write copy
1839EE7F000
heap
page read and write
5C6C00680000
trusted library allocation
page read and write
3DBC00628000
trusted library allocation
page read and write
CD0000
heap
page read and write
246FD3D0000
trusted library allocation
page read and write
D60000
direct allocation
page read and write
724000
heap
page read and write
760800201000
direct allocation
page read and write
2ABE000
stack
page read and write
CD4000
heap
page read and write
1168000
unkown
page execute and read and write
51E1000
heap
page read and write
3F5F000
stack
page read and write
2512000
trusted library allocation
page read and write
4C71000
heap
page read and write
2CFB000
stack
page read and write
4961000
heap
page read and write
B6C01880000
trusted library allocation
page read and write
5CB801001000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
5C6C02108000
trusted library allocation
page read and write
4C71000
heap
page read and write
674D000
stack
page read and write
B6C01CAC000
trusted library allocation
page read and write
DE9000
unkown
page read and write
5061000
heap
page read and write
CFE000
stack
page read and write
B6C01A24000
trusted library allocation
page read and write
63CA000
heap
page read and write
5C6C02430000
trusted library allocation
page read and write
5C6C01B74000
trusted library allocation
page read and write
B6C008B4000
trusted library allocation
page read and write
84B0000
trusted library allocation
page read and write
5CB800424000
trusted library allocation
page read and write
B6C01598000
trusted library allocation
page read and write
934000
heap
page read and write
B6C0094C000
trusted library allocation
page read and write
B6C003C0000
trusted library allocation
page read and write
930000
heap
page read and write
5052AFE000
unkown
page readonly
5CB801A3C000
trusted library allocation
page read and write
51E1000
heap
page read and write
5CB8016DC000
trusted library allocation
page read and write
B6C0122C000
trusted library allocation
page read and write
5C6C0212C000
trusted library allocation
page read and write
B6C01918000
trusted library allocation
page read and write
4391000
heap
page read and write
5C6C01FAC000
trusted library allocation
page read and write
3DBC00244000
trusted library allocation
page read and write
B6C01298000
trusted library allocation
page read and write
5061000
heap
page read and write
B6C019E4000
trusted library allocation
page read and write
CD4000
heap
page read and write
4D0E000
stack
page read and write
7E0000
heap
page read and write
355F000
stack
page read and write
D81000
unkown
page execute and write copy
4E21000
heap
page read and write
724000
heap
page read and write
4391000
heap
page read and write
5C6C002C4000
trusted library allocation
page read and write
4E21000
heap
page read and write
1CC9E000
stack
page read and write
5CB801720000
trusted library allocation
page read and write
1839EE7F000
heap
page read and write
4A81000
heap
page read and write
339E000
stack
page read and write
4C71000
heap
page read and write
7E6E000
stack
page read and write
3DBC00234000
trusted library allocation
page read and write
934000
heap
page read and write
4C71000
heap
page read and write
5CB8010F8000
trusted library allocation
page read and write
1242000
unkown
page execute and write copy
B6C00E50000
trusted library allocation
page read and write
5CB801460000
trusted library allocation
page read and write
4391000
heap
page read and write
4C9F000
stack
page read and write
4A81000
heap
page read and write
4391000
heap
page read and write
5C6C021D4000
trusted library allocation
page read and write
5C6C023D4000
trusted library allocation
page read and write
3D3F000
stack
page read and write
5CB801070000
trusted library allocation
page read and write
5CB800E5C000
trusted library allocation
page read and write
4A81000
heap
page read and write
B6C00988000
trusted library allocation
page read and write
3DBC00288000
trusted library allocation
page read and write
4961000
heap
page read and write
CD4000
heap
page read and write
5CB8014AC000
trusted library allocation
page read and write
438F000
stack
page read and write
5C6C02378000
trusted library allocation
page read and write
503F000
stack
page read and write
3590000
heap
page read and write
5C6C01C1C000
trusted library allocation
page read and write
5CB801D0C000
trusted library allocation
page read and write
4A7F000
stack
page read and write
4391000
heap
page read and write
934000
heap
page read and write
5C6C01A20000
trusted library allocation
page read and write
3F0F000
stack
page read and write
141B000
unkown
page execute and write copy
5B2000250000
trusted library allocation
page read and write
3A9E000
stack
page read and write
1D6DC000
stack
page read and write
183A2375000
heap
page read and write
3DBC00230000
trusted library allocation
page read and write
760800230000
direct allocation
page read and write
1839EE88000
heap
page read and write
D60000
direct allocation
page read and write
43C0000
heap
page read and write
CD4000
heap
page read and write
2E10000
heap
page read and write
3DBC00330000
trusted library allocation
page read and write
2A60000
direct allocation
page read and write
31AF000
stack
page read and write
50517FE000
unkown
page readonly
11D4000
heap
page read and write
4B5F000
stack
page read and write
3DBC0028C000
trusted library allocation
page read and write
47CF000
stack
page read and write
19A4000
heap
page read and write
19A81973000
heap
page read and write
5C6C01BAC000
trusted library allocation
page read and write
38DF000
stack
page read and write
5CB801364000
trusted library allocation
page read and write
11D4000
heap
page read and write
5C6C01AB4000
trusted library allocation
page read and write
5C6C01B9C000
trusted library allocation
page read and write
4391000
heap
page read and write
51E1000
heap
page read and write
3B5F000
stack
page read and write
D04000
heap
page read and write
B6C01844000
trusted library allocation
page read and write
CC9000
heap
page read and write
391F000
stack
page read and write
4961000
heap
page read and write
5B200028C000
trusted library allocation
page read and write
5C6C020EC000
trusted library allocation
page read and write
B6C01B30000
trusted library allocation
page read and write
832000
unkown
page execute and read and write
724000
heap
page read and write
246FD400000
heap
page read and write
3DCF000
stack
page read and write
5CB8002E0000
trusted library allocation
page read and write
6D00000
heap
page read and write
5061000
heap
page read and write
B6C0099C000
trusted library allocation
page read and write
428E000
stack
page read and write
B6C00F28000
trusted library allocation
page read and write
CD4000
heap
page read and write
1770000
heap
page read and write
5CB801AF4000
trusted library allocation
page read and write
5060000
direct allocation
page execute and read and write
5CB801601000
trusted library allocation
page read and write
41BE000
stack
page read and write
3B5F000
stack
page read and write
737B000
stack
page read and write
5CB800401000
trusted library allocation
page read and write
5C6C02304000
trusted library allocation
page read and write
76F6000
heap
page read and write
B6C0175C000
trusted library allocation
page read and write
5CB800950000
trusted library allocation
page read and write
5090000
direct allocation
page execute and read and write
B6C019A8000
trusted library allocation
page read and write
5CB8010F4000
trusted library allocation
page read and write
934000
heap
page read and write
368E000
stack
page read and write
5C6C01D2C000
trusted library allocation
page read and write
934000
heap
page read and write
3DBC00148000
trusted library allocation
page read and write
5C6C019D0000
trusted library allocation
page read and write
B6C003D8000
trusted library allocation
page read and write
459F000
stack
page read and write
45EE000
stack
page read and write
8C3000
remote allocation
page execute and read and write
750000
unkown
page readonly
396E000
stack
page read and write
3FEF000
stack
page read and write
494E000
stack
page read and write
3DBC00201000
trusted library allocation
page read and write
4881000
heap
page read and write
B6C010E8000
trusted library allocation
page read and write
2F4F000
stack
page read and write
5C6C01CD8000
trusted library allocation
page read and write
5CB8010B4000
trusted library allocation
page read and write
B6C01114000
trusted library allocation
page read and write
2E6F000
stack
page read and write
D60000
direct allocation
page read and write
246FE000000
heap
page read and write
BE4000
heap
page read and write
4391000
heap
page read and write
76C6000
heap
page read and write
5C6C01B80000
trusted library allocation
page read and write
B6C019D8000
trusted library allocation
page read and write
3DBC00054000
trusted library allocation
page read and write
D81000
unkown
page execute and write copy
5CB801040000
trusted library allocation
page read and write
5C6C02240000
trusted library allocation
page read and write
4881000
heap
page read and write
4C71000
heap
page read and write
934000
heap
page read and write
3DBC001EC000
trusted library allocation
page read and write
1168000
unkown
page execute and read and write
4961000
heap
page read and write
934000
heap
page read and write
5CB801478000
trusted library allocation
page read and write
6FE000
stack
page read and write
B6C008FC000
trusted library allocation
page read and write
5CB801118000
trusted library allocation
page read and write
4E21000
heap
page read and write
152E000
stack
page read and write
50C0000
direct allocation
page execute and read and write
5C6C00FD4000
trusted library allocation
page read and write
369F000
stack
page read and write
5CB801834000
trusted library allocation
page read and write
4961000
heap
page read and write
351F000
stack
page read and write
76FF000
heap
page read and write
579F000
stack
page read and write
5400000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
5C6C024A8000
trusted library allocation
page read and write
430E000
stack
page read and write
B6C01154000
trusted library allocation
page read and write
3DBC000DC000
trusted library allocation
page read and write
3DBC00654000
trusted library allocation
page read and write
B6C00820000
trusted library allocation
page read and write
51E1000
heap
page read and write
2F00000
direct allocation
page read and write
4C71000
heap
page read and write
5CB800F94000
trusted library allocation
page read and write
B6C010B4000
trusted library allocation
page read and write
5C6C01E1C000
trusted library allocation
page read and write
5CB801D1C000
trusted library allocation
page read and write
4881000
heap
page read and write
2A70000
heap
page read and write
5C6C00640000
trusted library allocation
page read and write
5CB8015E4000
trusted library allocation
page read and write
B6C013E8000
trusted library allocation
page read and write
246FD2C0000
trusted library allocation
page read and write
B6C01854000
trusted library allocation
page read and write
D60000
direct allocation
page read and write
F3E000
stack
page read and write
B6C017D4000
trusted library allocation
page read and write
B6C01284000
trusted library allocation
page read and write
5C6C020F0000
trusted library allocation
page read and write
4391000
heap
page read and write
391E000
stack
page read and write
5C6C01ED0000
trusted library allocation
page read and write
3DBC003EC000
trusted library allocation
page read and write
5080000
heap
page read and write
B6C01194000
trusted library allocation
page read and write
4AB0000
heap
page read and write
2D67000
heap
page read and write
246FC5C1000
trusted library allocation
page read and write
4E21000
heap
page read and write
2F20000
heap
page read and write
630000
unkown
page readonly
46DE000
stack
page read and write
3BAF000
stack
page read and write
870EFFE000
unkown
page readonly
4C77000
heap
page read and write
C50000
direct allocation
page read and write
4AB1000
heap
page read and write
4C71000
heap
page read and write
724000
heap
page read and write
4A81000
heap
page read and write
5C6C01B00000
trusted library allocation
page read and write
724000
heap
page read and write
4490000
trusted library allocation
page read and write
1D524000
heap
page read and write
1A43000
heap
page read and write
5061000
heap
page read and write
5C6C02300000
trusted library allocation
page read and write
1D34E000
stack
page read and write
3E5E000
stack
page read and write
5C6C023AC000
trusted library allocation
page read and write
D2E000
heap
page read and write
2515000
trusted library allocation
page execute and read and write
3DBC0027C000
trusted library allocation
page read and write
B6C017F8000
trusted library allocation
page read and write
5CB801034000
trusted library allocation
page read and write
4391000
heap
page read and write
4881000
heap
page read and write
5C6C02090000
trusted library allocation
page read and write
5CB801AE4000
trusted library allocation
page read and write
495F000
stack
page read and write
C00000
direct allocation
page read and write
5CB80039C000
trusted library allocation
page read and write
5C6C01EB8000
trusted library allocation
page read and write
3DBC001D8000
trusted library allocation
page read and write
724000
heap
page read and write
5020000
direct allocation
page execute and read and write
4E80000
direct allocation
page execute and read and write
355F000
stack
page read and write
5C6C01E30000
trusted library allocation
page read and write
724000
heap
page read and write
1243000
unkown
page execute and read and write
246FD4E8000
heap
page read and write
5C6C00664000
trusted library allocation
page read and write
2A8F000
stack
page read and write
3D2E000
stack
page read and write
5CB8016A8000
trusted library allocation
page read and write
C4F000
unkown
page execute and write copy
3DBC00404000
trusted library allocation
page read and write
19A4000
heap
page read and write
6FC0000
trusted library allocation
page read and write
4E4F000
stack
page read and write
724000
heap
page read and write
3CFE000
stack
page read and write
141A000
unkown
page execute and read and write
50B0000
direct allocation
page execute and read and write
4CC000
stack
page read and write
301F000
stack
page read and write
4A81000
heap
page read and write
1990000
direct allocation
page read and write
550000
heap
page read and write
2F2B000
heap
page read and write
1CFFF000
stack
page read and write
462F000
stack
page read and write
B6C0138C000
trusted library allocation
page read and write
5CB800984000
trusted library allocation
page read and write
4391000
heap
page read and write
4A81000
heap
page read and write
5E49000
heap
page read and write
5CB8011E0000
trusted library allocation
page read and write
31DE000
stack
page read and write
5CB801CB0000
trusted library allocation
page read and write
5CB800988000
trusted library allocation
page read and write
5CB801B40000
trusted library allocation
page read and write
5C6C023C4000
trusted library allocation
page read and write
3DBC0019C000
trusted library allocation
page read and write
C40000
heap
page read and write
422E000
stack
page read and write
934000
heap
page read and write
3DBC00280000
trusted library allocation
page read and write
5C6C0202C000
trusted library allocation
page read and write
99A000
unkown
page execute and read and write
3B4F000
stack
page read and write
5CB8014EC000
trusted library allocation
page read and write
5C6C02044000
trusted library allocation
page read and write
4AB1000
heap
page read and write
B6C01A54000
trusted library allocation
page read and write
935000
unkown
page execute and read and write
2F00000
direct allocation
page read and write
360E000
stack
page read and write
2F00000
direct allocation
page read and write
19A4000
heap
page read and write
11D4000
heap
page read and write
724000
heap
page read and write
3DBC00160000
trusted library allocation
page read and write
3A5E000
stack
page read and write
DF0000
direct allocation
page read and write
D04000
heap
page read and write
5CB801B74000
trusted library allocation
page read and write
5C6C00CB4000
trusted library allocation
page read and write
5C6C02258000
trusted library allocation
page read and write
5C6C01F54000
trusted library allocation
page read and write
5CB800978000
trusted library allocation
page read and write
3DBC001F8000
trusted library allocation
page read and write
D0E000
heap
page read and write
B6C013A0000
trusted library allocation
page read and write
B6C01428000
trusted library allocation
page read and write
B6C0173C000
trusted library allocation
page read and write
7608002B4000
direct allocation
page read and write
51E1000
heap
page read and write
2660000
direct allocation
page read and write
1168000
unkown
page execute and read and write
3B8E000
stack
page read and write
5C6C01D7C000
trusted library allocation
page read and write
1990000
direct allocation
page read and write
51E1000
heap
page read and write
724000
heap
page read and write
934000
heap
page read and write
5CB8019D8000
trusted library allocation
page read and write
5090000
direct allocation
page execute and read and write
79B0000
trusted library allocation
page read and write
CBE000
heap
page read and write
B6C002FC000
trusted library allocation
page read and write
4A61000
heap
page read and write
1D03E000
stack
page read and write
4C71000
heap
page read and write
5C6C023C0000
trusted library allocation
page read and write
2F00000
direct allocation
page read and write
4C71000
heap
page read and write
5B2000201000
trusted library allocation
page read and write
1D660000
heap
page read and write
5C6C02318000
trusted library allocation
page read and write
5CB801374000
trusted library allocation
page read and write
D60000
direct allocation
page read and write
11D4000
heap
page read and write
19A4000
heap
page read and write
287E000
stack
page read and write
33FF000
stack
page read and write
724000
heap
page read and write
4391000
heap
page read and write
1D664000
heap
page read and write
B6C01534000
trusted library allocation
page read and write
6FE0000
trusted library allocation
page read and write
B6C0166C000
trusted library allocation
page read and write
5CB8013AC000
trusted library allocation
page read and write
48EE000
stack
page read and write
5CB800E9C000
trusted library allocation
page read and write
5CB800408000
trusted library allocation
page read and write
934000
heap
page read and write
5C6C02274000
trusted library allocation
page read and write
354E000
stack
page read and write
934000
heap
page read and write
CA0000
direct allocation
page read and write
724000
heap
page read and write
C50000
direct allocation
page read and write
6E20000
trusted library allocation
page read and write
B6C01C64000
trusted library allocation
page read and write
5CB801C94000
trusted library allocation
page read and write
5CB800F80000
trusted library allocation
page read and write
4A81000
heap
page read and write
4A61000
heap
page read and write
5CB80160C000
trusted library allocation
page read and write
D0F000
heap
page read and write
5C6C00640000
trusted library allocation
page read and write
B6C009F8000
trusted library allocation
page read and write
4391000
heap
page read and write
246FBDE0000
trusted library section
page read and write
C00000
direct allocation
page read and write
5CB801B98000
trusted library allocation
page read and write
3DBC0000C000
trusted library allocation
page read and write
B6C011DC000
trusted library allocation
page read and write
29AC00248000
trusted library allocation
page read and write
3180000
heap
page readonly
3123000
trusted library allocation
page execute and read and write
5061000
heap
page read and write
155E000
stack
page read and write
5C6C0215C000
trusted library allocation
page read and write
D80000
unkown
page read and write
423F000
stack
page read and write
2A50000
heap
page read and write
B6C0108C000
trusted library allocation
page read and write
426F000
stack
page read and write
B6C01630000
trusted library allocation
page read and write
2A60000
direct allocation
page read and write
C00000
direct allocation
page read and write
42AE000
stack
page read and write
B6C00E78000
trusted library allocation
page read and write
788E000
stack
page read and write
505F000
stack
page read and write
3E1E000
stack
page read and write
5C6C020BC000
trusted library allocation
page read and write
4391000
heap
page read and write
5030000
direct allocation
page execute and read and write
CD4000
heap
page read and write
BE4000
heap
page read and write
32FE000
stack
page read and write
397F000
stack
page read and write
1AF9000
heap
page read and write
934000
heap
page read and write
4391000
heap
page read and write
49EF000
stack
page read and write
355E000
stack
page read and write
4F5E000
stack
page read and write
B6C0111C000
trusted library allocation
page read and write
7669000
heap
page read and write
B6C01354000
trusted library allocation
page read and write
246FC71A000
heap
page read and write
5B20002CC000
trusted library allocation
page read and write
52B0000
direct allocation
page read and write
4391000
heap
page read and write
5CB801924000
trusted library allocation
page read and write
B6C00EBC000
trusted library allocation
page read and write
5CB800F70000
trusted library allocation
page read and write
5061000
heap
page read and write
600000
heap
page read and write
724000
heap
page read and write
B6C012F4000
trusted library allocation
page read and write
B6C0120C000
trusted library allocation
page read and write
724000
heap
page read and write
5C6C01C94000
trusted library allocation
page read and write
41DE000
stack
page read and write
4E10000
direct allocation
page read and write
B6C01A9C000
trusted library allocation
page read and write
F40000
heap
page read and write
19A83100000
heap
page read and write
4A81000
heap
page read and write
D04000
heap
page read and write
5CB8016AC000
trusted library allocation
page read and write
5C6C02288000
trusted library allocation
page read and write
5CB801090000
trusted library allocation
page read and write
5CB801550000
trusted library allocation
page read and write
5CB800958000
trusted library allocation
page read and write
426F000
stack
page read and write
3DBC0017C000
trusted library allocation
page read and write
4DAC000
trusted library allocation
page read and write
C50000
direct allocation
page read and write
5C6C0241C000
trusted library allocation
page read and write
463E000
stack
page read and write
51E1000
heap
page read and write
28E000
stack
page read and write
5CB80162C000
trusted library allocation
page read and write
392F000
stack
page read and write
5C6C00F30000
trusted library allocation
page read and write
4391000
heap
page read and write
15F0000
direct allocation
page read and write
5C6C02420000
trusted library allocation
page read and write
DE9000
unkown
page write copy
11D4000
heap
page read and write
5C6C002E8000
trusted library allocation
page read and write
19A4000
heap
page read and write
CF7000
heap
page read and write
5630000
direct allocation
page execute and read and write
5C6C00680000
trusted library allocation
page read and write
B6C01648000
trusted library allocation
page read and write
76CE000
heap
page read and write
B6C01278000
trusted library allocation
page read and write
4A81000
heap
page read and write
13D5000
heap
page read and write
5CB801668000
trusted library allocation
page read and write
71FE000
stack
page read and write
4C90000
heap
page read and write
5B2000280000
trusted library allocation
page read and write
4A81000
heap
page read and write
5C6C00640000
trusted library allocation
page read and write
5C6C01EB0000
trusted library allocation
page read and write
4961000
heap
page read and write
5CB801BBC000
trusted library allocation
page read and write
5C6C0246C000
trusted library allocation
page read and write
B6C01C9C000
trusted library allocation
page read and write
5061000
heap
page read and write
3DDF000
stack
page read and write
B6C011C8000
trusted library allocation
page read and write
B6C00EB8000
trusted library allocation
page read and write
5CB801854000
trusted library allocation
page read and write
4391000
heap
page read and write
412E000
stack
page read and write
D80000
unkown
page read and write
BE4000
heap
page read and write
5C6C00F30000
trusted library allocation
page read and write
5C6C024D0000
trusted library allocation
page read and write
141E000
stack
page read and write
5C6C02248000
trusted library allocation
page read and write
1990000
direct allocation
page read and write
4C71000
heap
page read and write
4391000
heap
page read and write
2E1E000
stack
page read and write
5CB800237000
trusted library allocation
page read and write
D60000
direct allocation
page read and write
1D520000
heap
page read and write
393E000
stack
page read and write
4C71000
heap
page read and write
183A2373000
heap
page read and write
6D8C000
heap
page read and write
246FBEB0000
heap
page read and write
3DBC000D0000
trusted library allocation
page read and write
4E21000
heap
page read and write
B6C00E8C000
trusted library allocation
page read and write
5CB801648000
trusted library allocation
page read and write
B6C012A8000
trusted library allocation
page read and write
4A81000
heap
page read and write
D81000
unkown
page execute and write copy
19AF48AA000
heap
page read and write
433E000
stack
page read and write
3430000
direct allocation
page read and write
4E21000
heap
page read and write
3DBC00108000
trusted library allocation
page read and write
19A830F0000
heap
page read and write
67CE000
stack
page read and write
11D4000
heap
page read and write
356F000
stack
page read and write
3DBC003C4000
trusted library allocation
page read and write
1325000
heap
page read and write
19CE000
heap
page read and write
51E1000
heap
page read and write
B6C00FC4000
trusted library allocation
page read and write
CA0000
heap
page read and write
5CB801958000
trusted library allocation
page read and write
725000
heap
page read and write
145C000
heap
page read and write
7E8000
remote allocation
page execute and read and write
5CB8018FC000
trusted library allocation
page read and write
B6C01774000
trusted library allocation
page read and write
5C6C02244000
trusted library allocation
page read and write
5CB801480000
trusted library allocation
page read and write
B6C01BD4000
trusted library allocation
page read and write
724000
heap
page read and write
B6C015B0000
trusted library allocation
page read and write
1D6BE000
stack
page read and write
CD4000
heap
page read and write
246FBE74000
heap
page read and write
934000
heap
page read and write
19AF4909000
heap
page read and write
5060000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
B80000
heap
page read and write
3140000
trusted library allocation
page read and write
4A80000
heap
page read and write
5CB8019D0000
trusted library allocation
page read and write
5CB80131C000
trusted library allocation
page read and write
B6C0075C000
trusted library allocation
page read and write
C50000
direct allocation
page read and write
5CB801201000
trusted library allocation
page read and write
13F0000
heap
page read and write
7E3C000
stack
page read and write
5CB8010C0000
trusted library allocation
page read and write
B6C00F5C000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
5040000
direct allocation
page execute and read and write
312F000
stack
page read and write
468F000
stack
page read and write
42DF000
stack
page read and write
CAE000
stack
page read and write
401F000
stack
page read and write
84A0000
trusted library allocation
page execute and read and write
5CB801BA4000
trusted library allocation
page read and write
5061000
heap
page read and write
B6C012F0000
trusted library allocation
page read and write
5C6C01F9C000
trusted library allocation
page read and write
48AF000
stack
page read and write
934000
heap
page read and write
B6C0069C000
trusted library allocation
page read and write
2999000
heap
page read and write
19A83300000
heap
page read and write
5CB80164C000
trusted library allocation
page read and write
4CC0000
trusted library allocation
page read and write
11D4000
heap
page read and write
5C6C023F0000
trusted library allocation
page read and write
42AE000
stack
page read and write
3DBC0062B000
trusted library allocation
page read and write
19AF4A74000
heap
page read and write
32BF000
stack
page read and write
760800250000
direct allocation
page read and write
2660000
direct allocation
page read and write
B6C00EC0000
trusted library allocation
page read and write
2A21000
heap
page read and write
2F00000
direct allocation
page read and write
4AB1000
heap
page read and write
5CB801878000
trusted library allocation
page read and write
246FD200000
trusted library allocation
page read and write
5C6C00F3C000
trusted library allocation
page read and write
481D000
stack
page read and write
5CB801820000
trusted library allocation
page read and write
5C6C02164000
trusted library allocation
page read and write
15F0000
direct allocation
page read and write
441F000
stack
page read and write
4DDF000
stack
page read and write
39CE000
stack
page read and write
47FF000
stack
page read and write
19A4000
heap
page read and write
5CB801A24000
trusted library allocation
page read and write
5C6C01BA8000
trusted library allocation
page read and write
4C71000
heap
page read and write
5C6C02140000
trusted library allocation
page read and write
D04000
heap
page read and write
B6C01574000
trusted library allocation
page read and write
246FD270000
trusted library allocation
page read and write
4A81000
heap
page read and write
5260000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
4391000
heap
page read and write
2F00000
direct allocation
page read and write
5CB8002C0000
trusted library allocation
page read and write
5CB800288000
trusted library allocation
page read and write
B6C01794000
trusted library allocation
page read and write
2EAC000
stack
page read and write
B6C01150000
trusted library allocation
page read and write
5CB801C64000
trusted library allocation
page read and write
4391000
heap
page read and write
51E1000
heap
page read and write
5C6C01BC4000
trusted library allocation
page read and write
477E000
stack
page read and write
4C71000
heap
page read and write
B6C00FC0000
trusted library allocation
page read and write
5C6C02270000
trusted library allocation
page read and write
3DBC00093000
trusted library allocation
page read and write
3DBC00648000
trusted library allocation
page read and write
51E1000
heap
page read and write
5CB800F54000
trusted library allocation
page read and write
5C6C00939000
trusted library allocation
page read and write
B6C01D14000
trusted library allocation
page read and write
B6C0186C000
trusted library allocation
page read and write
479E000
stack
page read and write
D60000
direct allocation
page read and write
7960000
trusted library allocation
page read and write
5CB801814000
trusted library allocation
page read and write
B6C017E0000
trusted library allocation
page read and write
1960000
heap
page read and write
43DF000
stack
page read and write
246FD2B0000
trusted library allocation
page read and write
3E3E000
stack
page read and write
B6C018D8000
trusted library allocation
page read and write
4A81000
heap
page read and write
24F9000
trusted library allocation
page read and write
42FE000
stack
page read and write
6D4D000
heap
page read and write
466E000
stack
page read and write
5C6C02470000
trusted library allocation
page read and write
5C6C01EC0000
trusted library allocation
page read and write
B6C01C0C000
trusted library allocation
page read and write
724000
heap
page read and write
51E1000
heap
page read and write
4C71000
heap
page read and write
4310000
heap
page execute and read and write
780E000
stack
page read and write
4F3B000
stack
page read and write
4A81000
heap
page read and write
57D0000
direct allocation
page execute and read and write
4A80000
trusted library allocation
page read and write
5CB801D14000
trusted library allocation
page read and write
B6C00F60000
trusted library allocation
page read and write
B6C014A4000
trusted library allocation
page read and write
C4E000
unkown
page execute and read and write
350F000
stack
page read and write
934000
heap
page read and write
374E000
stack
page read and write
3E1E000
stack
page read and write
2BE5000
heap
page read and write
5CB80039C000
trusted library allocation
page read and write
4C71000
heap
page read and write
1990000
direct allocation
page read and write
E3D000
unkown
page execute and read and write
1265000
unkown
page execute and read and write
5CB801A88000
trusted library allocation
page read and write
5CB801980000
trusted library allocation
page read and write
183A237A000
heap
page read and write
5CB8003CC000
trusted library allocation
page read and write
706D000
trusted library allocation
page read and write
CD4000
heap
page read and write
5C6C01E28000
trusted library allocation
page read and write
5C6C003D8000
trusted library allocation
page read and write
5C6C01C88000
trusted library allocation
page read and write
5C6C01E9C000
trusted library allocation
page read and write
B6C018BC000
trusted library allocation
page read and write
1057000
unkown
page execute and read and write
3DBC00154000
trusted library allocation
page read and write
4391000
heap
page read and write
5C6C02314000
trusted library allocation
page read and write
41CE000
stack
page read and write
4E10000
direct allocation
page read and write
5C6C01FE4000
trusted library allocation
page read and write
5C6C016BC000
trusted library allocation
page read and write
1DADD000
stack
page read and write
419E000
stack
page read and write
51E1000
heap
page read and write
D80000
unkown
page read and write
5B20002EC000
trusted library allocation
page read and write
6D7A000
heap
page read and write
D04000
heap
page read and write
4961000
heap
page read and write
348F000
stack
page read and write
5CB801114000
trusted library allocation
page read and write
2F00000
direct allocation
page read and write
5C6C009B4000
trusted library allocation
page read and write
B6C00E80000
trusted library allocation
page read and write
724000
heap
page read and write
724000
heap
page read and write
2A60000
direct allocation
page read and write
5C6C01D04000
trusted library allocation
page read and write
42BE000
stack
page read and write
5C6C01BE0000
trusted library allocation
page read and write
5CB800E50000
trusted library allocation
page read and write
5650000
direct allocation
page execute and read and write
B6C017E8000
trusted library allocation
page read and write
4961000
heap
page read and write
724000
heap
page read and write
7B40000
heap
page read and write
B6C0144C000
trusted library allocation
page read and write
5CB801344000
trusted library allocation
page read and write
D04000
heap
page read and write
1D59D000
stack
page read and write
724000
heap
page read and write
934000
heap
page read and write
15F0000
direct allocation
page read and write
B6C01C60000
trusted library allocation
page read and write
5CB8012FC000
trusted library allocation
page read and write
246FD4C5000
heap
page read and write
4391000
heap
page read and write
724000
heap
page read and write
5CB801A98000
trusted library allocation
page read and write
5CB8003E4000
trusted library allocation
page read and write
5C6C00FEC000
trusted library allocation
page read and write
D04000
heap
page read and write
7990000
trusted library allocation
page read and write
3A3F000
stack
page read and write
19A4000
heap
page read and write
51E1000
heap
page read and write
B6C01308000
trusted library allocation
page read and write
5FC000
stack
page read and write
19C0000
heap
page read and write
B6C00F04000
trusted library allocation
page read and write
5250000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
5C6C001EC000
trusted library allocation
page read and write
724000
heap
page read and write
1D25F000
stack
page read and write
19AF4902000
heap
page read and write
DEB000
unkown
page execute and write copy
5CB800E1C000
trusted library allocation
page read and write
5CB801220000
trusted library allocation
page read and write
37DE000
stack
page read and write
5C6C02E04000
trusted library allocation
page read and write
51E1000
heap
page read and write
B6C01B40000
trusted library allocation
page read and write
4961000
heap
page read and write
6750000
heap
page read and write
29AC002B0000
trusted library allocation
page read and write
1839EE6C000
heap
page read and write
B6C00820000
trusted library allocation
page read and write
37EF000
stack
page read and write
5CB80155C000
trusted library allocation
page read and write
37DE000
stack
page read and write
11BE000
stack
page read and write
DF0000
direct allocation
page read and write
5061000
heap
page read and write
3D6F000
stack
page read and write
5CB801324000
trusted library allocation
page read and write
D81000
unkown
page execute and write copy
19AF4837000
heap
page read and write
5410000
direct allocation
page execute and read and write
5C6C01F6C000
trusted library allocation
page read and write
76B4000
heap
page read and write
151F000
stack
page read and write
455F000
stack
page read and write
11D4000
heap
page read and write
246FBF02000
heap
page read and write
51E1000
heap
page read and write
7AB0000
trusted library allocation
page read and write
C4F000
unkown
page execute and write copy
87799FE000
unkown
page readonly
5CB801A50000
trusted library allocation
page read and write
5C6C022D8000
trusted library allocation
page read and write
5C6C01235000
trusted library allocation
page read and write
246FD506000
heap
page read and write
51E1000
heap
page read and write
4E21000
heap
page read and write
51E1000
heap
page read and write
4391000
heap
page read and write
9B000
stack
page read and write
4961000
heap
page read and write
B6C011EC000
trusted library allocation
page read and write
362E000
stack
page read and write
4391000
heap
page read and write
5CB801570000
trusted library allocation
page read and write
6DB6000
heap
page read and write
4961000
heap
page read and write
2A60000
direct allocation
page read and write
5CB8019CC000
trusted library allocation
page read and write
5C6C016D0000
trusted library allocation
page read and write
443F000
stack
page read and write
5C6C02030000
trusted library allocation
page read and write
11D4000
heap
page read and write
7070000
trusted library allocation
page read and write
4C71000
heap
page read and write
B6C00E20000
trusted library allocation
page read and write
5061000
heap
page read and write
68CE000
stack
page read and write
3F1E000
stack
page read and write
19AF4740000
heap
page read and write
4E00000
direct allocation
page read and write
5CB8018D0000
trusted library allocation
page read and write
48A0000
heap
page read and write
5CB801618000
trusted library allocation
page read and write
B6C018B0000
trusted library allocation
page read and write
53D9000
trusted library allocation
page read and write
5C6C01DE4000
trusted library allocation
page read and write
5BA4000
trusted library allocation
page read and write
CD4000
heap
page read and write
B6C01CD4000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page read and write
87789FE000
unkown
page readonly
B6C0112C000
trusted library allocation
page read and write
4391000
heap
page read and write
49EA000
trusted library allocation
page read and write
B6C003B4000
trusted library allocation
page read and write
7608002A4000
direct allocation
page read and write
699000
unkown
page write copy
5CB801170000
trusted library allocation
page read and write
4E21000
heap
page read and write
246FC600000
heap
page read and write
4391000
heap
page read and write
3C0F000
stack
page read and write
B6C01610000
trusted library allocation
page read and write
3C2F000
stack
page read and write
4881000
heap
page read and write
934000
heap
page read and write
195E000
stack
page read and write
382E000
stack
page read and write
4AC0000
heap
page read and write
724000
heap
page read and write
5061000
heap
page read and write
5CB800FB4000
trusted library allocation
page read and write
934000
heap
page read and write
7900000
trusted library allocation
page read and write
2FAF000
stack
page read and write
5CB800EF0000
trusted library allocation
page read and write
B6C017B8000
trusted library allocation
page read and write
B6C010D8000
trusted library allocation
page read and write
934000
heap
page read and write
5C6C00CB4000
trusted library allocation
page read and write
4A81000
heap
page read and write
B6C01C8C000
trusted library allocation
page read and write
4C71000
heap
page read and write
5CB801C3C000
trusted library allocation
page read and write
495E000
stack
page read and write
5C6C002E8000
trusted library allocation
page read and write
51E1000
heap
page read and write
19AF48D9000
heap
page read and write
C35000
stack
page read and write
4391000
heap
page read and write
D0F000
heap
page read and write
8490000
heap
page read and write
4C71000
heap
page read and write
5C6C0244C000
trusted library allocation
page read and write
2A77000
heap
page read and write
5C6C01F14000
trusted library allocation
page read and write
4F1E000
stack
page read and write
B6C008B8000
trusted library allocation
page read and write
4C71000
heap
page read and write
4391000
heap
page read and write
49EF000
stack
page read and write
CD4000
heap
page read and write
D0C000
heap
page read and write
B6C0131C000
trusted library allocation
page read and write
4A81000
heap
page read and write
D5C000
stack
page read and write
5CB8010E8000
trusted library allocation
page read and write
1242000
unkown
page execute and write copy
C50000
direct allocation
page read and write
30EF000
stack
page read and write
B6C003CC000
trusted library allocation
page read and write
4AB1000
heap
page read and write
4391000
heap
page read and write
4FAF000
stack
page read and write
5CB801160000
trusted library allocation
page read and write
5CB801574000
trusted library allocation
page read and write
D0F000
heap
page read and write
2680000
heap
page read and write
32DE000
stack
page read and write
B6C0139C000
trusted library allocation
page read and write
B6C01720000
trusted library allocation
page read and write
5C6C01CD4000
trusted library allocation
page read and write
4881000
heap
page read and write
2A60000
direct allocation
page read and write
5CB801C60000
trusted library allocation
page read and write
934000
heap
page read and write
4BCE000
stack
page read and write
3DAE000
stack
page read and write
DE2000
unkown
page execute and read and write
4AB1000
heap
page read and write
5C6C00CE4000
trusted library allocation
page read and write
724000
heap
page read and write
4881000
heap
page read and write
760800238000
direct allocation
page read and write
341E000
stack
page read and write
36BE000
stack
page read and write
5CB800FE8000
trusted library allocation
page read and write
B6C0121C000
trusted library allocation
page read and write
B6C019D4000
trusted library allocation
page read and write
19A4000
heap
page read and write
5C6C01D64000
trusted library allocation
page read and write
B6C01738000
trusted library allocation
page read and write
183A237F000
heap
page read and write
C90000
heap
page read and write
7760000
trusted library allocation
page read and write
CFB000
heap
page read and write
5CB80174C000
trusted library allocation
page read and write
4391000
heap
page read and write
47DE000
stack
page read and write
629C000
stack
page read and write
5CB801780000
trusted library allocation
page read and write
CFF000
heap
page read and write
B6C01BA8000
trusted library allocation
page read and write
4E21000
heap
page read and write
5C6C024A4000
trusted library allocation
page read and write
5C6C02268000
trusted library allocation
page read and write
1D5DE000
stack
page read and write
5C6C00680000
trusted library allocation
page read and write
4A81000
heap
page read and write
5CB801738000
trusted library allocation
page read and write
5CB8018B4000
trusted library allocation
page read and write
4A81000
heap
page read and write
5CB80063C000
trusted library allocation
page read and write
49DF000
stack
page read and write
5CB800A04000
trusted library allocation
page read and write
4E60000
direct allocation
page execute and read and write
50509FE000
unkown
page readonly
B6C01460000
trusted library allocation
page read and write
17BA000
heap
page read and write
5CB80150C000
trusted library allocation
page read and write
5C6C01E80000
trusted library allocation
page read and write
5CB800F14000
trusted library allocation
page read and write
B6C01438000
trusted library allocation
page read and write
19AF48A5000
heap
page read and write
DF0000
direct allocation
page read and write
183A237A000
heap
page read and write
4F80000
direct allocation
page execute and read and write
493F000
stack
page read and write
7750000
trusted library allocation
page read and write
51E1000
heap
page read and write
4961000
heap
page read and write
4AB1000
heap
page read and write
5CB80137C000
trusted library allocation
page read and write
183A28B5000
heap
page read and write
51E1000
heap
page read and write
1990000
direct allocation
page read and write
336F000
stack
page read and write
3440000
direct allocation
page execute and read and write
551E000
stack
page read and write
5C6C02118000
trusted library allocation
page read and write
317F000
stack
page read and write
5CB800FC8000
trusted library allocation
page read and write
D04000
heap
page read and write
B6C01C2C000
trusted library allocation
page read and write
51DF000
stack
page read and write
5100000
direct allocation
page execute and read and write
5C6C00658000
trusted library allocation
page read and write
2D60000
heap
page read and write
4B9A000
trusted library allocation
page read and write
B6C01B88000
trusted library allocation
page read and write
7B50000
trusted library allocation
page execute and read and write
8400000
trusted library allocation
page read and write
107C000
stack
page read and write
B6C01978000
trusted library allocation
page read and write
C50000
direct allocation
page read and write
760800234000
direct allocation
page read and write
D80000
unkown
page read and write
B6C01050000
trusted library allocation
page read and write
183A237F000
heap
page read and write
5C6C01178000
trusted library allocation
page read and write
3597000
heap
page read and write
183A2373000
heap
page read and write
246FBDA0000
heap
page read and write
19A4000
heap
page read and write
4C71000
heap
page read and write
408E000
stack
page read and write
113F000
stack
page read and write
B6C01B0C000
trusted library allocation
page read and write
25C0000
heap
page readonly
4C71000
heap
page read and write
934000
heap
page read and write
B6C013EC000
trusted library allocation
page read and write
246FC713000
heap
page read and write
CBF000
stack
page read and write
4391000
heap
page read and write
BF0000
heap
page read and write
3DBC002C4000
trusted library allocation
page read and write
C20000
heap
page read and write
246FBE00000
heap
page read and write
1D1FF000
stack
page read and write
246FBDD0000
trusted library allocation
page read and write
1660000
heap
page read and write
5CB8013C0000
trusted library allocation
page read and write
5CB8008E8000
trusted library allocation
page read and write
19A4000
heap
page read and write
B6C01C88000
trusted library allocation
page read and write
934000
heap
page read and write
5C6C001F0000
trusted library allocation
page read and write
5B20002D0000
trusted library allocation
page read and write
4961000
heap
page read and write
5CB8016D0000
trusted library allocation
page read and write
15F0000
direct allocation
page read and write
4961000
heap
page read and write
5CB8009C0000
trusted library allocation
page read and write
147D000
heap
page read and write
694E000
stack
page read and write
183A2375000
heap
page read and write
724000
heap
page read and write
1A0D000
heap
page read and write
3190000
trusted library allocation
page execute and read and write
CD4000
heap
page read and write
C60000
heap
page read and write
5CB8008D8000
trusted library allocation
page read and write
465F000
stack
page read and write
724000
heap
page read and write
246FCCD0000
trusted library section
page readonly
5CB8002E0000
trusted library allocation
page read and write
B6C01C84000
trusted library allocation
page read and write
631000
unkown
page execute and write copy
C13000
unkown
page execute and read and write
5CB80191C000
trusted library allocation
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
1D17E000
stack
page read and write
5CB8013B8000
trusted library allocation
page read and write
D00000
heap
page read and write
4F6B000
stack
page read and write
5C6C00210000
trusted library allocation
page read and write
C00000
direct allocation
page read and write
724000
heap
page read and write
5C6C022AC000
trusted library allocation
page read and write
5CB801CF8000
trusted library allocation
page read and write
13E7000
heap
page read and write
4C71000
heap
page read and write
5C6C01BC0000
trusted library allocation
page read and write
5CB8015A4000
trusted library allocation
page read and write
4E70000
direct allocation
page execute and read and write
469E000
stack
page read and write
5C6C01C24000
trusted library allocation
page read and write
2660000
direct allocation
page read and write
3DBC00684000
trusted library allocation
page read and write
11D4000
heap
page read and write
5CB8017A8000
trusted library allocation
page read and write
5CB800E30000
trusted library allocation
page read and write
5CB801A54000
trusted library allocation
page read and write
5C6C01B40000
trusted library allocation
page read and write
38AE000
stack
page read and write
246FD41F000
heap
page read and write
79A0000
trusted library allocation
page read and write
3DBC00228000
trusted library allocation
page read and write
B6C01248000
trusted library allocation
page read and write
400000
remote allocation
page read and write
B6C00FC8000
trusted library allocation
page read and write
D04000
heap
page read and write
246FC615000
heap
page read and write
183A2375000
heap
page read and write
5CB800820000
trusted library allocation
page read and write
5CB8014E8000
trusted library allocation
page read and write
4961000
heap
page read and write
4961000
heap
page read and write
5CB80069C000
trusted library allocation
page read and write
4A81000
heap
page read and write
338E000
stack
page read and write
15F0000
direct allocation
page read and write
5C6C003D8000
trusted library allocation
page read and write
1244000
unkown
page execute and write copy
19A4000
heap
page read and write
4AEE000
stack
page read and write
B6C0196C000
trusted library allocation
page read and write
4E21000
heap
page read and write
4961000
heap
page read and write
CD4000
heap
page read and write
BE4000
heap
page read and write
E3D000
unkown
page execute and read and write
4961000
heap
page read and write
87067FE000
stack
page read and write
29AC002CC000
trusted library allocation
page read and write
50521FE000
stack
page read and write
934000
heap
page read and write
4E10000
direct allocation
page read and write
5C6C00E71000
trusted library allocation
page read and write
DE9000
unkown
page write copy
5C6C00224000
trusted library allocation
page read and write
5C6C01FB0000
trusted library allocation
page read and write
934000
heap
page read and write
381E000
stack
page read and write
29AC00298000
trusted library allocation
page read and write
1BBF000
stack
page read and write
46FE000
stack
page read and write
B6C01060000
trusted library allocation
page read and write
4391000
heap
page read and write
49A0000
direct allocation
page execute and read and write
B6C01878000
trusted library allocation
page read and write
1990000
direct allocation
page read and write
B6C011AC000
trusted library allocation
page read and write
51E1000
heap
page read and write
2D4E000
stack
page read and write
5CB800FA4000
trusted library allocation
page read and write
4AD0000
heap
page read and write
B6C016C8000
trusted library allocation
page read and write
4A81000
heap
page read and write
2AFC000
stack
page read and write
D04000
heap
page read and write
B6C00938000
trusted library allocation
page read and write
5C6C01E0C000
trusted library allocation
page read and write
4E21000
heap
page read and write
5061000
heap
page read and write
5E9F000
stack
page read and write
1479000
heap
page read and write
4391000
heap
page read and write
11D4000
heap
page read and write
5C6C00244000
trusted library allocation
page read and write
4A81000
heap
page read and write
D1E000
stack
page read and write
4391000
heap
page read and write
18FF000
stack
page read and write
B6C009E4000
trusted library allocation
page read and write
4391000
heap
page read and write
4C71000
heap
page read and write
5CB801174000
trusted library allocation
page read and write
246FBEA1000
heap
page read and write
B6C01728000
trusted library allocation
page read and write
D04000
heap
page read and write
D80000
unkown
page readonly
5CB800EEC000
trusted library allocation
page read and write
5C6C02010000
trusted library allocation
page read and write
5C6C01A20000
trusted library allocation
page read and write
4881000
heap
page read and write
413E000
stack
page read and write
2CBE000
stack
page read and write
1515000
stack
page read and write
1355000
heap
page read and write
724000
heap
page read and write
D04000
heap
page read and write
2880000
trusted library allocation
page read and write
5C6C00F3C000
trusted library allocation
page read and write
B6C01144000
trusted library allocation
page read and write
246FD2C4000
trusted library allocation
page read and write
B6C009D0000
trusted library allocation
page read and write
3DBC00238000
trusted library allocation
page read and write
4E9E000
stack
page read and write
4A5F000
stack
page read and write
51E1000
heap
page read and write
5C6C00CB4000
trusted library allocation
page read and write
126F000
unkown
page execute and read and write
41DE000
stack
page read and write
5C6C021F8000
trusted library allocation
page read and write
19AF4990000
trusted library allocation
page read and write
329F000
stack
page read and write
3DBC00250000
trusted library allocation
page read and write
5CB801948000
trusted library allocation
page read and write
346E000
stack
page read and write
3DBC00330000
trusted library allocation
page read and write
5C6C01F40000
trusted library allocation
page read and write
5C6C001E8000
trusted library allocation
page read and write
B6C01230000
trusted library allocation
page read and write
724000
heap
page read and write
25F0000
trusted library allocation
page execute and read and write
5CB800F24000
trusted library allocation
page read and write
2A60000
direct allocation
page read and write
4881000
heap
page read and write
4C71000
heap
page read and write
3DBC00260000
trusted library allocation
page read and write
1D44F000
stack
page read and write
B6C0080C000
trusted library allocation
page read and write
246FC71A000
heap
page read and write
1D13F000
stack
page read and write
2D0F000
stack
page read and write
5030000
direct allocation
page execute and read and write
B6C01B78000
trusted library allocation
page read and write
870B7FC000
stack
page read and write
934000
heap
page read and write
B6C017A8000
trusted library allocation
page read and write
5C6C01EB4000
trusted library allocation
page read and write
5C6C021F0000
trusted library allocation
page read and write
5070000
direct allocation
page execute and read and write
832000
unkown
page execute and read and write
5CB801514000
trusted library allocation
page read and write
B6C00EEC000
trusted library allocation
page read and write
29AC00298000
trusted library allocation
page read and write
B6C01980000
trusted library allocation
page read and write
4E21000
heap
page read and write
3DDE000
stack
page read and write
193E000
stack
page read and write
4A81000
heap
page read and write
5CB801AA0000
trusted library allocation
page read and write
2FEE000
stack
page read and write
5C6C00160000
trusted library allocation
page read and write
2FCE000
stack
page read and write
347F000
stack
page read and write
B6C0191C000
trusted library allocation
page read and write
31FF000
stack
page read and write
3071000
heap
page read and write
51E1000
heap
page read and write
5640000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
B6C01B98000
trusted library allocation
page read and write
5CB800E60000
trusted library allocation
page read and write
5CB800F04000
trusted library allocation
page read and write
4A81000
heap
page read and write
7C2B000
stack
page read and write
480E000
stack
page read and write
DF0000
direct allocation
page read and write
29AC002C0000
trusted library allocation
page read and write
B6C011F0000
trusted library allocation
page read and write
5CB801A6C000
trusted library allocation
page read and write
5CB801938000
trusted library allocation
page read and write
B6C00F54000
trusted library allocation
page read and write
770B000
heap
page read and write
11D4000
heap
page read and write
5CB800820000
trusted library allocation
page read and write
5061000
heap
page read and write
5052A7E000
stack
page read and write
49F1000
heap
page read and write
19AF4A70000
heap
page read and write
4961000
heap
page read and write
12D0000
heap
page read and write
183A237A000
heap
page read and write
724000
heap
page read and write
4391000
heap
page read and write
5060000
direct allocation
page execute and read and write
5CB801244000
trusted library allocation
page read and write
724000
heap
page read and write
462F000
stack
page read and write
4C71000
heap
page read and write
53D1000
trusted library allocation
page read and write
11D4000
heap
page read and write
39EE000
stack
page read and write
76E8000
heap
page read and write
3150000
trusted library allocation
page read and write
B6C0197C000
trusted library allocation
page read and write
5C6C018A4000
trusted library allocation
page read and write
5C6C01E44000
trusted library allocation
page read and write
109D000
unkown
page execute and write copy
2D40000
direct allocation
page read and write
5C6C021A8000
trusted library allocation
page read and write
B6C01A18000
trusted library allocation
page read and write
40FF000
stack
page read and write
2660000
direct allocation
page read and write
5CB80120C000
trusted library allocation
page read and write
5CB8011A8000
trusted library allocation
page read and write
D60000
direct allocation
page read and write
5C6C01D10000
trusted library allocation
page read and write
B6C01C50000
trusted library allocation
page read and write
724000
heap
page read and write
51E1000
heap
page read and write
5CB801824000
trusted library allocation
page read and write
4A81000
heap
page read and write
6990000
heap
page read and write
379F000
stack
page read and write
1CD7F000
stack
page read and write
3009000
heap
page read and write
4F1F000
stack
page read and write
5061000
heap
page read and write
934000
heap
page read and write
4961000
heap
page read and write
724000
heap
page read and write
5C6C024DC000
trusted library allocation
page read and write
5CB800998000
trusted library allocation
page read and write
5C6C0223C000
trusted library allocation
page read and write
5C6C01FD0000
trusted library allocation
page read and write
505087B000
stack
page read and write
183A237A000
heap
page read and write
3DBC001B8000
trusted library allocation
page read and write
127F000
unkown
page execute and write copy
5CB800FC0000
trusted library allocation
page read and write
B6C0107C000
trusted library allocation
page read and write
4391000
heap
page read and write
7770000
trusted library allocation
page read and write
5CB801380000
trusted library allocation
page read and write
B6C0154C000
trusted library allocation
page read and write
B6C018EC000
trusted library allocation
page read and write
4A81000
heap
page read and write
13AF000
stack
page read and write
C3E000
stack
page read and write
2EF0000
heap
page read and write
5CB8018D8000
trusted library allocation
page read and write
B6C01188000
trusted library allocation
page read and write
5061000
heap
page read and write
4881000
heap
page read and write
B6C00A04000
trusted library allocation
page read and write
4E21000
heap
page read and write
5061000
heap
page read and write
B6C01900000
trusted library allocation
page read and write
4A81000
heap
page read and write
3DBC002E8000
trusted library allocation
page read and write
3CDE000
stack
page read and write
1460000
heap
page read and write
B6C00F70000
trusted library allocation
page read and write
3DBC00258000
trusted library allocation
page read and write
109D000
unkown
page execute and write copy
3DBC000AC000
trusted library allocation
page read and write
DE2000
unkown
page execute and read and write
5CB80189C000
trusted library allocation
page read and write
5CB8003C0000
trusted library allocation
page read and write
5CB801988000
trusted library allocation
page read and write
39EE000
stack
page read and write
1085000
unkown
page execute and read and write
D80000
unkown
page readonly
3DBC002B0000
trusted library allocation
page read and write
5050DFE000
stack
page read and write
46BF000
stack
page read and write
11E0000
heap
page read and write
5C6C00FEC000
trusted library allocation
page read and write
5CE000
stack
page read and write
5CB800F98000
trusted library allocation
page read and write
B6C008A0000
trusted library allocation
page read and write
5C6C00F3C000
trusted library allocation
page read and write
B6C00954000
trusted library allocation
page read and write
2C0E000
stack
page read and write
5CB80129C000
trusted library allocation
page read and write
3DBC00220000
trusted library allocation
page read and write
455E000
stack
page read and write
3DBC00160000
trusted library allocation
page read and write
3EAF000
stack
page read and write
B6C010F4000
trusted library allocation
page read and write
934000
heap
page read and write
6FF0000
trusted library allocation
page read and write
246FD44E000
heap
page read and write
5C6C019D4000
trusted library allocation
page read and write
B6C01560000
trusted library allocation
page read and write
4526000
trusted library allocation
page read and write
5CB801A0C000
trusted library allocation
page read and write
11D4000
heap
page read and write
3DBC00268000
trusted library allocation
page read and write
4BDE000
stack
page read and write
D60000
direct allocation
page read and write
5CB8012F8000
trusted library allocation
page read and write
724000
heap
page read and write
4C71000
heap
page read and write
934000
heap
page read and write
246FD620000
remote allocation
page read and write
B6C01244000
trusted library allocation
page read and write
5C6C00404000
trusted library allocation
page read and write
5CB80156C000
trusted library allocation
page read and write
5C6C00F3C000
trusted library allocation
page read and write
4391000
heap
page read and write
E3D000
unkown
page execute and read and write
6DC8000
heap
page read and write
87721FE000
unkown
page read and write
5430000
direct allocation
page execute and read and write
51E1000
heap
page read and write
4F61000
direct allocation
page read and write
1DC1C000
stack
page read and write
B6C01698000
trusted library allocation
page read and write
B6C01030000
trusted library allocation
page read and write
51E1000
heap
page read and write
5B2000210000
trusted library allocation
page read and write
3C9E000
stack
page read and write
4881000
heap
page read and write
B6C01C98000
trusted library allocation
page read and write
D81000
unkown
page execute and write copy
5CB801524000
trusted library allocation
page read and write
322F000
stack
page read and write
326E000
stack
page read and write
4391000
heap
page read and write
5C6C02278000
trusted library allocation
page read and write
724000
heap
page read and write
4C71000
heap
page read and write
4391000
heap
page read and write
620000
heap
page read and write
3570000
direct allocation
page read and write
B6C009A0000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
4A81000
heap
page read and write
5CB80146C000
trusted library allocation
page read and write
B6C01834000
trusted library allocation
page read and write
5C6C0201C000
trusted library allocation
page read and write
1D1BF000
stack
page read and write
5CB80104C000
trusted library allocation
page read and write
5C6C02160000
trusted library allocation
page read and write
4961000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
5CB801AB0000
trusted library allocation
page read and write
B6C01CD0000
trusted library allocation
page read and write
5CB8017D4000
trusted library allocation
page read and write
C4E000
unkown
page execute and write copy
3A1F000
stack
page read and write
D04000
heap
page read and write
5061000
heap
page read and write
724000
heap
page read and write
7B0000
heap
page read and write
45BE000
stack
page read and write
5CB8018C8000
trusted library allocation
page read and write
246FD50A000
heap
page read and write
5CB801490000
trusted library allocation
page read and write
934000
heap
page read and write
246FCCF0000
trusted library section
page readonly
4E10000
direct allocation
page read and write
5CB801060000
trusted library allocation
page read and write
5061000
heap
page read and write
B6C01A50000
trusted library allocation
page read and write
4E0F000
stack
page read and write
5CB801A10000
trusted library allocation
page read and write
5CB801978000
trusted library allocation
page read and write
4AB1000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
39BE000
stack
page read and write
B6C012AC000
trusted library allocation
page read and write
B6C0160C000
trusted library allocation
page read and write
5CB801534000
trusted library allocation
page read and write
7930000
trusted library allocation
page read and write
5C6C01B94000
trusted library allocation
page read and write
5CB801578000
trusted library allocation
page read and write
B6C012C0000
trusted library allocation
page read and write
B6C01590000
trusted library allocation
page read and write
2660000
direct allocation
page read and write
B6C015A4000
trusted library allocation
page read and write
50A0000
direct allocation
page execute and read and write
11D4000
heap
page read and write
BC000
stack
page read and write
37DF000
stack
page read and write
5C6C01520000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
3DBC0028C000
trusted library allocation
page read and write
3DBC0022C000
trusted library allocation
page read and write
117E000
stack
page read and write
1D9DD000
stack
page read and write
B6C00E68000
trusted library allocation
page read and write
4E1E000
stack
page read and write
5CB80140C000
trusted library allocation
page read and write
B6C01578000
trusted library allocation
page read and write
3E1F000
stack
page read and write
3C2F000
stack
page read and write
8703FFE000
unkown
page readonly
5C6C00230000
trusted library allocation
page read and write
5C6C021A4000
trusted library allocation
page read and write
4AB1000
heap
page read and write
4340000
heap
page execute and read and write
5C6C01B98000
trusted library allocation
page read and write
4391000
heap
page read and write
4A81000
heap
page read and write
B6C00F48000
trusted library allocation
page read and write
B6C01BD0000
trusted library allocation
page read and write
1839EE86000
heap
page read and write
509F000
stack
page read and write
5CB80125C000
trusted library allocation
page read and write
3DBC00160000
trusted library allocation
page read and write
4A81000
heap
page read and write
5B2000278000
trusted library allocation
page read and write
5CB800E0C000
trusted library allocation
page read and write
724000
heap
page read and write
5CB801E04000
trusted library allocation
page read and write
30FE000
stack
page read and write
1175000
stack
page read and write
5030000
direct allocation
page execute and read and write
5C15000
heap
page read and write
6E10000
trusted library allocation
page read and write
424F000
stack
page read and write
52EB000
stack
page read and write
246FD3B0000
trusted library allocation
page read and write
2D3E000
stack
page read and write
4961000
heap
page read and write
36FF000
stack
page read and write
183A237F000
heap
page read and write
724000
heap
page read and write
15F0000
direct allocation
page read and write
11D4000
heap
page read and write
8708FFE000
unkown
page readonly
BE4000
heap
page read and write
2BD7000
heap
page read and write
4CCF000
stack
page read and write
4961000
heap
page read and write
5C6C00234000
trusted library allocation
page read and write
4C71000
heap
page read and write
B6C010E4000
trusted library allocation
page read and write
2E3F000
stack
page read and write
B6C0164C000
trusted library allocation
page read and write
3EEE000
stack
page read and write
C50000
direct allocation
page read and write
5CB801B20000
trusted library allocation
page read and write
FDE000
unkown
page execute and read and write
4961000
heap
page read and write
934000
heap
page read and write
29AC002CC000
trusted library allocation
page read and write
B6C01C3C000
trusted library allocation
page read and write
481F000
stack
page read and write
4E1F000
stack
page read and write
183A237F000
heap
page read and write
1D3FD000
stack
page read and write
3139000
trusted library allocation
page read and write
5CB80175C000
trusted library allocation
page read and write
D04000
heap
page read and write
5CB801188000
trusted library allocation
page read and write
724000
heap
page read and write
3E0E000
stack
page read and write
5061000
heap
page read and write
B6C008C8000
trusted library allocation
page read and write
934000
heap
page read and write
4391000
heap
page read and write
5B41000
trusted library allocation
page read and write
5CB801454000
trusted library allocation
page read and write
5CB8014A4000
trusted library allocation
page read and write
24D4000
trusted library allocation
page read and write
4C71000
heap
page read and write
7920000
trusted library allocation
page read and write
CD4000
heap
page read and write
1D5BE000
stack
page read and write
B6C00964000
trusted library allocation
page read and write
870E7FE000
stack
page read and write
724000
heap
page read and write
B6C017C8000
trusted library allocation
page read and write
332E000
stack
page read and write
5B20002CC000
trusted library allocation
page read and write
B6C0155C000
trusted library allocation
page read and write
46EF000
stack
page read and write
B6C003B4000
trusted library allocation
page read and write
5CB801658000
trusted library allocation
page read and write
5CB801108000
trusted library allocation
page read and write
15F0000
direct allocation
page read and write
5090000
direct allocation
page execute and read and write
B6C01A0C000
trusted library allocation
page read and write
388E000
stack
page read and write
416E000
stack
page read and write
50515FB000
stack
page read and write
5CB801134000
trusted library allocation
page read and write
5B2000235000
trusted library allocation
page read and write
B6C013AC000
trusted library allocation
page read and write
1CF7E000
stack
page read and write
51E1000
heap
page read and write
B6C0177C000
trusted library allocation
page read and write
46DE000
stack
page read and write
51E1000
heap
page read and write
412F000
stack
page read and write
6DC000
stack
page read and write
CA0000
direct allocation
page read and write
49E8000
trusted library allocation
page read and write
19AF48CE000
heap
page read and write
43AF000
stack
page read and write
3DBC00298000
trusted library allocation
page read and write
5CB801588000
trusted library allocation
page read and write
512C000
stack
page read and write
B6C014E8000
trusted library allocation
page read and write
47AE000
stack
page read and write
3AEF000
stack
page read and write
CD4000
heap
page read and write
B6C00FD4000
trusted library allocation
page read and write
4A61000
heap
page read and write
5C6C02320000
trusted library allocation
page read and write
D60000
direct allocation
page read and write
CD4000
heap
page read and write
5C6C00911000
trusted library allocation
page read and write
5CB801308000
trusted library allocation
page read and write
5C6C001C4000
trusted library allocation
page read and write
B6C00F18000
trusted library allocation
page read and write
5CB801968000
trusted library allocation
page read and write
5CB8015E0000
trusted library allocation
page read and write
364F000
stack
page read and write
47AE000
stack
page read and write
B6C01378000
trusted library allocation
page read and write
5CB801BEC000
trusted library allocation
page read and write
5CB801930000
trusted library allocation
page read and write
5C6C01CE8000
trusted library allocation
page read and write
1D83F000
stack
page read and write
15F0000
direct allocation
page read and write
491E000
stack
page read and write
5CB801BE8000
trusted library allocation
page read and write
B6C01948000
trusted library allocation
page read and write
246FD3E0000
trusted library allocation
page read and write
29AC00298000
trusted library allocation
page read and write
4AB1000
heap
page read and write
560F000
stack
page read and write
3DBC0025C000
trusted library allocation
page read and write
5CB801D10000
trusted library allocation
page read and write
D80000
unkown
page read and write
2F00000
direct allocation
page read and write
CD4000
heap
page read and write
51E1000
heap
page read and write
B6C01958000
trusted library allocation
page read and write
DF0000
direct allocation
page read and write
1DD80000
heap
page read and write
B6C008F4000
trusted library allocation
page read and write
4B41000
trusted library allocation
page read and write
3DBC002A4000
trusted library allocation
page read and write
B6C01AAC000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
4E21000
heap
page read and write
3DBC00140000
trusted library allocation
page read and write
5C6C019E4000
trusted library allocation
page read and write
B6C0165C000
trusted library allocation
page read and write
1D47E000
stack
page read and write
D70000
heap
page read and write
49C0000
direct allocation
page execute and read and write
4890000
heap
page read and write
5C6C01A95000
trusted library allocation
page read and write
4C71000
heap
page read and write
5C6C02050000
trusted library allocation
page read and write
5CB801150000
trusted library allocation
page read and write
3DBC00264000
trusted library allocation
page read and write
4E21000
heap
page read and write
19A4000
heap
page read and write
B6C01780000
trusted library allocation
page read and write
B6C010B0000
trusted library allocation
page read and write
3A6F000
stack
page read and write
934000
heap
page read and write
5020000
direct allocation
page execute and read and write
5B2000298000
trusted library allocation
page read and write
7C0000
heap
page read and write
5C6C020E4000
trusted library allocation
page read and write
5CB801C1C000
trusted library allocation
page read and write
4B80000
trusted library allocation
page read and write
4391000
heap
page read and write
19AF4905000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
E31000
unkown
page execute and read and write
AF3000
unkown
page execute and read and write
B6C01D08000
trusted library allocation
page read and write
19A4000
heap
page read and write
33DF000
stack
page read and write
4C71000
heap
page read and write
D60000
direct allocation
page read and write
476F000
stack
page read and write
D00000
heap
page read and write
B6C01070000
trusted library allocation
page read and write
51E1000
heap
page read and write
36EE000
stack
page read and write
183A2375000
heap
page read and write
6B7E000
stack
page read and write
246FBE7A000
heap
page read and write
1839EE81000
heap
page read and write
7D80000
trusted library allocation
page read and write
5C6C01AE4000
trusted library allocation
page read and write
4F9E000
stack
page read and write
4A81000
heap
page read and write
76AF000
heap
page read and write
2FCA000
heap
page read and write
4A81000
heap
page read and write
5C6C01CA8000
trusted library allocation
page read and write
5CB800E64000
trusted library allocation
page read and write
B6C011E0000
trusted library allocation
page read and write
11D4000
heap
page read and write
4E90000
direct allocation
page execute and read and write
5CB801C0C000
trusted library allocation
page read and write
390E000
stack
page read and write
5CB8011C8000
trusted library allocation
page read and write
B6C019B4000
trusted library allocation
page read and write
B6C01514000
trusted library allocation
page read and write
1D7FF000
stack
page read and write
5C6C01E34000
trusted library allocation
page read and write
874B000
stack
page read and write
5620000
heap
page read and write
4E21000
heap
page read and write
5C6C02038000
trusted library allocation
page read and write
4BF8000
trusted library allocation
page read and write
5C6C0062C000
trusted library allocation
page read and write
B6C01CB4000
trusted library allocation
page read and write
3DBC001C4000
trusted library allocation
page read and write
5C6C01F78000
trusted library allocation
page read and write
4AB1000
heap
page read and write
7AA0000
trusted library allocation
page read and write
164B000
heap
page read and write
B6C01908000
trusted library allocation
page read and write
183A237A000
heap
page read and write
5CB8008A0000
trusted library allocation
page read and write
1085000
unkown
page execute and read and write
B6C01BE0000
trusted library allocation
page read and write
B6C01B18000
trusted library allocation
page read and write
246FC75A000
heap
page read and write
300C000
heap
page read and write
7050000
heap
page execute and read and write
5E49000
heap
page read and write
D0F000
heap
page read and write
74FE000
stack
page read and write
724000
heap
page read and write
395E000
stack
page read and write
257E000
stack
page read and write
5CB8014C4000
trusted library allocation
page read and write
678B000
stack
page read and write
B85000
heap
page read and write
B6C01584000
trusted library allocation
page read and write
5C6C001C4000
trusted library allocation
page read and write
246FD3D0000
trusted library allocation
page read and write
5CB8009E8000
trusted library allocation
page read and write
333F000
stack
page read and write
246FD4E3000
heap
page read and write
B6C016F4000
trusted library allocation
page read and write
6F3E000
stack
page read and write
4970000
direct allocation
page execute and read and write
5CB801284000
trusted library allocation
page read and write
B6C009C4000
trusted library allocation
page read and write
724000
heap
page read and write
4980000
direct allocation
page execute and read and write
1CEDE000
stack
page read and write
5CB80039C000
trusted library allocation
page read and write
2DF0000
direct allocation
page execute and read and write
2F7F000
stack
page read and write
2A60000
direct allocation
page read and write
5B20002CC000
trusted library allocation
page read and write
3AFE000
stack
page read and write
5061000
heap
page read and write
5C6C01E8C000
trusted library allocation
page read and write
DF0000
direct allocation
page read and write
35AE000
stack
page read and write
7240000
heap
page read and write
5C6C01C8C000
trusted library allocation
page read and write
3DBC0060C000
trusted library allocation
page read and write
4C71000
heap
page read and write
4881000
heap
page read and write
45DE000
stack
page read and write
5CB800F60000
trusted library allocation
page read and write
5CB801858000
trusted library allocation
page read and write
5CB801CFC000
trusted library allocation
page read and write
469F000
stack
page read and write
103E000
stack
page read and write
51E1000
heap
page read and write
5CB800FC4000
trusted library allocation
page read and write
51F0000
heap
page read and write
D04000
heap
page read and write
3E8F000
stack
page read and write
B6C01B84000
trusted library allocation
page read and write
3E6E000
stack
page read and write
3CDF000
stack
page read and write
3BBE000
stack
page read and write
1D5FE000
stack
page read and write
19A4000
heap
page read and write
74BE000
stack
page read and write
B6C00E98000
trusted library allocation
page read and write
5C6C01A95000
trusted library allocation
page read and write
2660000
direct allocation
page read and write
5C6C01DDC000
trusted library allocation
page read and write
1839EE84000
heap
page read and write
5061000
heap
page read and write
79C0000
trusted library allocation
page read and write
B6C01B50000
trusted library allocation
page read and write
3DBC00670000
trusted library allocation
page read and write
19A0000
heap
page read and write
B6C00FA4000
trusted library allocation
page read and write
50526FE000
unkown
page readonly
C00000
direct allocation
page read and write
B6C01988000
trusted library allocation
page read and write
51E1000
heap
page read and write
4AB1000
heap
page read and write
7055000
heap
page execute and read and write
11D4000
heap
page read and write
4881000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
4B30000
heap
page read and write
B6C01858000
trusted library allocation
page read and write
298F000
stack
page read and write
CC7000
heap
page read and write
3DBC003C0000
trusted library allocation
page read and write
700000
heap
page read and write
29AC002C0000
trusted library allocation
page read and write
4391000
heap
page read and write
4A81000
heap
page read and write
1D07F000
stack
page read and write
5CB801C84000
trusted library allocation
page read and write
5CB80165C000
trusted library allocation
page read and write
5C6C021A0000
trusted library allocation
page read and write
C50000
direct allocation
page read and write
246FBCA0000
heap
page read and write
5CB801A14000
trusted library allocation
page read and write
170000
heap
page read and write
19A4000
heap
page read and write
1A27000
heap
page read and write
459E000
stack
page read and write
4C71000
heap
page read and write
51E1000
heap
page read and write
2BBF000
stack
page read and write
1241000
unkown
page execute and read and write
2510000
trusted library allocation
page read and write
246FC891000
trusted library allocation
page read and write
53CE000
stack
page read and write
3D1E000
stack
page read and write
5CB80193C000
trusted library allocation
page read and write
13E4000
heap
page read and write
84E0000
heap
page read and write
5CB8019C8000
trusted library allocation
page read and write
4A81000
heap
page read and write
4881000
heap
page read and write
5CB8002F8000
trusted library allocation
page read and write
B6C018B4000
trusted library allocation
page read and write
5CB801B64000
trusted library allocation
page read and write
DEB000
unkown
page execute and read and write
19AF4875000
heap
page read and write
B6C01628000
trusted library allocation
page read and write
29D8000
heap
page read and write
4A81000
heap
page read and write
4E20000
heap
page read and write
5C6C02428000
trusted library allocation
page read and write
5050FFC000
stack
page read and write
3DBC0028C000
trusted library allocation
page read and write
4E21000
heap
page read and write
4F90000
direct allocation
page execute and read and write
5C6C01DAC000
trusted library allocation
page read and write
127E000
unkown
page execute and read and write
934000
heap
page read and write
B6C00FE8000
trusted library allocation
page read and write
B6C01A10000
trusted library allocation
page read and write
19A4000
heap
page read and write
B6C01C94000
trusted library allocation
page read and write
5CB80199C000
trusted library allocation
page read and write
934000
heap
page read and write
31A0000
heap
page read and write
4391000
heap
page read and write
50C0000
direct allocation
page execute and read and write
B6C00FD8000
trusted library allocation
page read and write
B6C01BE4000
trusted library allocation
page read and write
CD4000
heap
page read and write
5C6C01FB4000
trusted library allocation
page read and write
4E21000
heap
page read and write
5CB801B78000
trusted library allocation
page read and write
2D20000
heap
page read and write
405F000
stack
page read and write
B6C00418000
trusted library allocation
page read and write
1339000
heap
page read and write
5C6C01DD4000
trusted library allocation
page read and write
2F6F000
stack
page read and write
5CB801558000
trusted library allocation
page read and write
43C7000
heap
page read and write
760800294000
direct allocation
page read and write
B6C01AC4000
trusted library allocation
page read and write
4F41000
direct allocation
page read and write
B6C002FC000
trusted library allocation
page read and write
C4E000
heap
page read and write
51E1000
heap
page read and write
304E000
stack
page read and write
334F000
stack
page read and write
B6C01C68000
trusted library allocation
page read and write
2BB0000
heap
page read and write
CD4000
heap
page read and write
5CB801BE0000
trusted library allocation
page read and write
4391000
heap
page read and write
1ACA000
heap
page read and write
934000
heap
page read and write
19A4000
heap
page read and write
5B20002F8000
trusted library allocation
page read and write
4C71000
heap
page read and write
B6C01118000
trusted library allocation
page read and write
4D1E000
stack
page read and write
2D00000
direct allocation
page read and write
4A81000
heap
page read and write
B6C01AE4000
trusted library allocation
page read and write
BE0000
heap
page read and write
D04000
heap
page read and write
934000
heap
page read and write
4E21000
heap
page read and write
5C6C01D74000
trusted library allocation
page read and write
4FA0000
direct allocation
page execute and read and write
5CB801C4C000
trusted library allocation
page read and write
31BE000
stack
page read and write
1244000
unkown
page execute and write copy
5B20002B0000
trusted library allocation
page read and write
4AB1000
heap
page read and write
4BD000
remote allocation
page execute and read and write
505177E000
stack
page read and write
53F9000
trusted library allocation
page read and write
934000
heap
page read and write
B6C016E0000
trusted library allocation
page read and write
5CB801CDC000
trusted library allocation
page read and write
5CB8012D0000
trusted library allocation
page read and write
D25000
heap
page read and write
724000
heap
page read and write
B6C014B0000
trusted library allocation
page read and write
5C6C0219C000
trusted library allocation
page read and write
B6C0129C000
trusted library allocation
page read and write
B6C016F0000
trusted library allocation
page read and write
5C6C00680000
trusted library allocation
page read and write
309E000
stack
page read and write
246FD502000
heap
page read and write
5C6C01B40000
trusted library allocation
page read and write
4391000
heap
page read and write
1D41E000
stack
page read and write
4AB1000
heap
page read and write
4B1000
remote allocation
page execute and read and write
5CB8018A0000
trusted library allocation
page read and write
19AF482B000
heap
page read and write
1D1FE000
stack
page read and write
4961000
heap
page read and write
44EF000
stack
page read and write
41DF000
stack
page read and write
2BCF000
stack
page read and write
163D000
stack
page read and write
5C6C00FD4000
trusted library allocation
page read and write
5CB8008C4000
trusted library allocation
page read and write
5CB80112C000
trusted library allocation
page read and write
5B20002CC000
trusted library allocation
page read and write
51E1000
heap
page read and write
B6C01074000
trusted library allocation
page read and write
29AC002A8000
trusted library allocation
page read and write
5CB80099C000
trusted library allocation
page read and write
5CB801BD0000
trusted library allocation
page read and write
C4A000
heap
page read and write
B6C00EE0000
trusted library allocation
page read and write
372F000
stack
page read and write
E00000
heap
page read and write
7040000
trusted library allocation
page read and write
DF0000
direct allocation
page read and write
2D6F000
stack
page read and write
5C6C022C4000
trusted library allocation
page read and write
1D6BE000
stack
page read and write
5C6C01DA8000
trusted library allocation
page read and write
57C0000
direct allocation
page execute and read and write
4C71000
heap
page read and write
50F0000
direct allocation
page read and write
431E000
stack
page read and write
19A4000
heap
page read and write
751000
unkown
page execute and write copy
700D000
stack
page read and write
5C6C024C0000
trusted library allocation
page read and write
B6C01CFC000
trusted library allocation
page read and write
5C6C01FB8000
trusted library allocation
page read and write
760800210000
direct allocation
page read and write
1D63D000
stack
page read and write
5C6C00154000
trusted library allocation
page read and write
4E21000
heap
page read and write
5CB8018F0000
trusted library allocation
page read and write
57E0000
direct allocation
page execute and read and write
5C6C00298000
trusted library allocation
page read and write
5CB801A9C000
trusted library allocation
page read and write
5CB8018A4000
trusted library allocation
page read and write
5080000
direct allocation
page execute and read and write
BE4000
heap
page read and write
78CD000
stack
page read and write
934000
heap
page read and write
877A1FE000
stack
page read and write
4A81000
heap
page read and write
4C71000
heap
page read and write
3DBC00134000
trusted library allocation
page read and write
5C6C02098000
trusted library allocation
page read and write
C1E000
stack
page read and write
77C000
stack
page read and write
2F00000
direct allocation
page read and write
288F000
stack
page read and write
1057000
unkown
page execute and read and write
1241000
unkown
page execute and read and write
5C6C008FC000
trusted library allocation
page read and write
405F000
stack
page read and write
B6C00424000
trusted library allocation
page read and write
165E000
stack
page read and write
DEA000
unkown
page execute and read and write
5CB801CD0000
trusted library allocation
page read and write
5C6C02120000
trusted library allocation
page read and write
24E0000
heap
page read and write
B6C01134000
trusted library allocation
page read and write
5CB801A60000
trusted library allocation
page read and write
5C6C01CC8000
trusted library allocation
page read and write
5C6C0221C000
trusted library allocation
page read and write
134F000
stack
page read and write
B6C018F0000
trusted library allocation
page read and write
D81000
unkown
page execute and write copy
5C6C02018000
trusted library allocation
page read and write
1D2BD000
stack
page read and write
5CB801920000
trusted library allocation
page read and write
1839EE7D000
heap
page read and write
4F50000
direct allocation
page execute and read and write
3A5E000
stack
page read and write
5CB8008F4000
trusted library allocation
page read and write
4AB7000
heap
page read and write
4A81000
heap
page read and write
2F1F000
stack
page read and write
5CB80094C000
trusted library allocation
page read and write
4970000
heap
page read and write
5C6C00CB4000
trusted library allocation
page read and write
5061000
heap
page read and write
601E000
stack
page read and write
5CB80090C000
trusted library allocation
page read and write
71BE000
stack
page read and write
11AE000
stack
page read and write
8709FFE000
unkown
page readonly
2960000
heap
page read and write
8F5000
stack
page read and write
9AE000
unkown
page execute and read and write
5B2000254000
trusted library allocation
page read and write
5C6C01EF8000
trusted library allocation
page read and write
13E1000
heap
page read and write
6130000
heap
page read and write
4881000
heap
page read and write
1990000
direct allocation
page read and write
5C6C003D8000
trusted library allocation
page read and write
5CB801688000
trusted library allocation
page read and write
724000
heap
page read and write
4A81000
heap
page read and write
51E1000
heap
page read and write
2D6E000
stack
page read and write
4881000
heap
page read and write
15AE000
stack
page read and write
5CB8019A0000
trusted library allocation
page read and write
848E000
stack
page read and write
2660000
direct allocation
page read and write
D60000
direct allocation
page read and write
5B2000220000
trusted library allocation
page read and write
5C6C0220C000
trusted library allocation
page read and write
2E7E000
stack
page read and write
1D23E000
stack
page read and write
51E1000
heap
page read and write
1CDBE000
stack
page read and write
1DC00000
heap
page read and write
B6C01C30000
trusted library allocation
page read and write
5CB800FF8000
trusted library allocation
page read and write
5C6C022A8000
trusted library allocation
page read and write
51E1000
heap
page read and write
5C6C01D4C000
trusted library allocation
page read and write
B6C01174000
trusted library allocation
page read and write
4391000
heap
page read and write
5C6C020B0000
trusted library allocation
page read and write
183A2375000
heap
page read and write
5260000
direct allocation
page execute and read and write
76C9000
heap
page read and write
5CB801CC0000
trusted library allocation
page read and write
383F000
stack
page read and write
3DBC00244000
trusted library allocation
page read and write
675E000
heap
page read and write
6EFF000
stack
page read and write
2E4F000
stack
page read and write
4A81000
heap
page read and write
4A81000
heap
page read and write
D04000
heap
page read and write
4391000
heap
page read and write
5CB8008B0000
trusted library allocation
page read and write
4E10000
direct allocation
page read and write
51E1000
heap
page read and write
5CB800F44000
trusted library allocation
page read and write
5CB801494000
trusted library allocation
page read and write
5CB801A7C000
trusted library allocation
page read and write
8FF000
stack
page read and write
B6C01A8C000
trusted library allocation
page read and write
5C6C01A0C000
trusted library allocation
page read and write
11C0000
heap
page read and write
51E1000
heap
page read and write
B6C01A80000
trusted library allocation
page read and write
3DBC001E8000
trusted library allocation
page read and write
5C6C024C8000
trusted library allocation
page read and write
8701FFE000
unkown
page readonly
5CB8018BC000
trusted library allocation
page read and write
5051F7E000
stack
page read and write
CD4000
heap
page read and write
934000
heap
page read and write
724000
heap
page read and write
5CB801D30000
trusted library allocation
page read and write
9AE000
unkown
page execute and read and write
5070000
direct allocation
page execute and read and write
57C0000
direct allocation
page execute and read and write
4C71000
heap
page read and write
1244000
unkown
page execute and write copy
5010000
direct allocation
page execute and read and write
B6C0040C000
trusted library allocation
page read and write
5061000
heap
page read and write
C95000
heap
page read and write
There are 5006 hidden memdumps, click here to show them.