IOC Report
4qIl08vrFY.exe

loading gif

Files

File Path
Type
Category
Malicious
4qIl08vrFY.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\1000115002\6b11689b40.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\num[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000113001\num.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000140041\ko.ps1
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xd651e937, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\ko[1].ps1
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2griquep.bjc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sfe5l5zb.o2z.psm1
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\SystemTemp\chrome_BITS_6968_1660607800\BIT6F62.tmp
Google Chrome extension, version 3
dropped
C:\Windows\SystemTemp\chrome_BITS_6968_1660607800\gonpemdgkjcecdgbnaabipppbmgfggbe_2024.08.10.00_all_ngbcdbf23y5deox6qfrqcyni5e.crx3 (copy)
Google Chrome extension, version 3
dropped
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6968_731799293\LICENSE
ASCII text
dropped
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6968_731799293\_metadata\verified_contents.json
JSON data
dropped
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6968_731799293\manifest.fingerprint
ASCII text, with no line terminators
dropped
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6968_731799293\manifest.json
JSON data
dropped
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6968_731799293\sets.json
JSON data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
There are 14 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\4qIl08vrFY.exe
"C:\Users\user\Desktop\4qIl08vrFY.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1000113001\num.exe
"C:\Users\user\AppData\Local\Temp\1000113001\num.exe"
malicious
C:\Users\user\1000115002\6b11689b40.exe
"C:\Users\user\1000115002\6b11689b40.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\user\AppData\Local\Temp\1000140041\ko.ps1"
malicious
C:\Users\user\1000115002\6b11689b40.exe
"C:\Users\user\1000115002\6b11689b40.exe"
malicious
C:\Users\user\1000115002\6b11689b40.exe
"C:\Users\user\1000115002\6b11689b40.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --kiosk --user-data-dir=C:\Users\user\AppData\Local\Google\Chrome\User Data
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\user\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=2256 --field-trial-handle=2024,i,122868655359159109,17278634962393556832,262144 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --user-data-dir="C:\Users\user\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=4920 --field-trial-handle=2024,i,122868655359159109,17278634962393556832,262144 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\user\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=4812 --field-trial-handle=2024,i,122868655359159109,17278634962393556832,262144 /prefetch:8
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.37/V
unknown
malicious
http://185.215.113.37/F
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpu
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpd
unknown
malicious
http://185.215.113.37/SSC:
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpmkq
unknown
malicious
https://www.google.com/coacbE
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/tools/feedback/open.js
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://apis.google.com/js/client.js
unknown
http://dl.google.com/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcji
unknown
http://185.215.113.103/test/num.exe
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icotension
unknown
http://185.215.113.43/Zu7JuNko/index.phpnu
unknown
http://dns-tunnel-check.googlezip.net/connect
unknown
https://docs.google.com/
unknown
https://assets.adobedtm.com
unknown
https://www.youtube.com/signin?action_handle_signin%253Dtrue%2526app%253Ddesktop%2526hl%253Den%2526n
unknown
https://anglebug.com/7714
unknown
https://google-ohttp-relay-join.fastly-edge.com/I
unknown
https://clients2.googleusercontent.com/crx/blobs/AY4GWKCjSWa8TD5HR0ssoNSHmv1DlGbxavvv4f4_vreCQV6o4JdgbhTns13WqVLfraA3idGD1YqVFdL1d29hUkKmBRQxeBB8OW5ZEZvDIDLLC0_H7OAK-03clOTMdE15SKgAxlKa5Za-otUDEb42n7phqLA20ygc_Y63/EFAIDNBMNNNIBPCAJPCGLCLEFINDMKAJ_24_9_1_1.crx
216.58.206.33
https://google-ohttp-relay-join.fastly-edge.com/8Q
unknown
https://accounts.youtube.com/_/AccountsDomainCookiesCheckConnectionHttp/cspreport/allowlist
unknown
https://nuget.org/nuget.exe
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
https://www.ecosia.org/newtab/3-0215-45af-87dc-538868000002
unknown
https://apis.google.com/_/scs/abc-static/_/js/55%3A1727682692218469&ddm=0eport/fine-allowlist?
unknown
http://anglebug.com/6929
unknown
https://google-ohttp-relay-query.fastly-edge.com/q8
unknown
https://www.google.com/accounts/OAuthLogin?issueuberauth=1
unknown
http://anglebug.com/5281
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://youtube.com/
unknown
https://issuetracker.google.com/255411748
unknown
http://185.215.113.43/Zu7JuNko/index.php0?
unknown
https://github.com/google/closure-library/wiki/goog.module:-an-ES6-module-like-alternative-to-goog.p
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://chrome.google.com/webstore
unknown
https://apis.google.com/js/api.js
unknown
https://drive-daily-2.corp.google.com/
unknown
https://payments.google.com/payments/v4/js/integrator.js
unknown
https://www.google.com/chromesuggestionsJK
unknown
https://apis.google.com/_/scs/abc-static/_/js/;report-uri
unknown
https://contoso.com/Icon
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://www.google.com/tools/feedback/
unknown
https://dl.google.com/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcj
unknown
https://support.google.com/chrome/?p=blockedb
unknown
https://issuetracker.google.com/161903006
unknown
http://tls-tunnel-check.googlezip.net/connect2
unknown
https://youtube.LR
unknown
https://drive-daily-1.corp.google.com/
unknown
https://www.youtube.com/
unknown
https://github.com/Pester/Pester
unknown
https://drive-daily-5.corp.google.com/
unknown
https://www.google.com/favicon.ico
142.250.185.132
https://www.google.com/images/dot2.gif
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://chrome.google.com/webstore?hl=en$
unknown
https://apis.google.com/_/scs/abc-static/_/js/55%3A1727682692218469&ddm=0eport/fine-allowlist
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://google-ohttp-relay-join.fastly-edge.com/Enabled_Consent_HoldbackARA_limited_Stable_202309268
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://www.google.com/b
unknown
https://clients2.googleusercontent.com/crx/blobs/AY4GWKDHKllS27BO_e8bCnbax_jg8ytdTG4Uzua5Kte91Msonmjt9Ssh1u4j53F3UYy-997sHknkzKEy9994XId3zBBDiju_YSunzv5QYwyL8XEx9VuF26n3JIgkmCYaLzIAxlKa5UdUDZoPCHdwU63c7rFT0JUxfsWG/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_82_1_0.crx
216.58.206.33
https://sandbox.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
https://dl.google.com/release2/chrome_component/adn3tbb2pd3we3bgvlhz7kbeqlca_2024.9.30.1/kiabhabjdbk
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
https://use.typekit.net
unknown
https://www.google.com/dl/release2/chrome_component/e6xlmsu5i2bokri3w4cyuhv4nq_2024.8.10.0/gonpemdgk
unknown
http://185.215.113.43/Zu7JuNko/index.phpW
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
https://www.google.com/images/cleardot.gif
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://www.google.com/dl/release2/chrome_component/adn3tbb2pd3we3bgvlhz7kbeqlca_2024.9.30.1/kiabhab
unknown
https://apis.google.com/_/scs/abc-static/_/js/
unknown
http://anglebug.com/5007
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
youtube-ui.l.google.com
142.250.185.142
google.com
216.58.206.46
www3.l.google.com
172.217.18.110
play.google.com
142.250.181.238
www.google.com
142.250.185.132
googlehosted.l.googleusercontent.com
216.58.206.33
youtube.com
142.250.184.238
clients2.googleusercontent.com
unknown
accounts.youtube.com
unknown
chrome.google.com
unknown
www.youtube.com
unknown
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
192.168.2.5
unknown
unknown
malicious
185.215.113.37
unknown
Portugal
malicious
142.250.185.78
unknown
United States
142.250.74.206
unknown
United States
216.58.206.33
googlehosted.l.googleusercontent.com
United States
192.168.2.16
unknown
unknown
192.168.2.6
unknown
unknown
142.250.181.238
play.google.com
United States
142.250.185.142
youtube-ui.l.google.com
United States
172.217.18.110
www3.l.google.com
United States
142.250.74.196
unknown
United States
142.250.186.78
unknown
United States
142.250.185.132
www.google.com
United States
239.255.255.250
unknown
Reserved
142.250.184.238
youtube.com
United States
185.215.113.103
unknown
Portugal
127.0.0.1
unknown
unknown
There are 8 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
6b11689b40.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName

Memdumps

Base Address
Regiontype
Protect
Malicious
4E10000
direct allocation
page read and write
malicious
6A1000
unkown
page execute read
malicious
1A6E000
heap
page read and write
malicious
141000
unkown
page execute read
malicious
51000
unkown
page execute and write copy
malicious
3ED5000
heap
page read and write
malicious
5590000
direct allocation
page read and write
malicious
BE1000
unkown
page execute and read and write
malicious
13FB000
heap
page read and write
malicious
4A60000
direct allocation
page read and write
malicious
89B000
heap
page read and write
malicious
141000
unkown
page execute read
malicious
51000
unkown
page execute and write copy
malicious
BE1000
unkown
page execute and read and write
malicious
6A1000
unkown
page execute read
malicious
141000
unkown
page execute read
malicious
BE1000
unkown
page execute and read and write
malicious
141000
unkown
page execute read
malicious
141000
unkown
page execute read
malicious
3ED5000
heap
page read and write
malicious
BBE000
heap
page read and write
malicious
141000
unkown
page execute read
malicious
3FCC038E0000
trusted library allocation
page read and write
3FCC02C84000
trusted library allocation
page read and write
8798A7B000
stack
page read and write
10E3000
unkown
page execute and read and write
713801908000
trusted library allocation
page read and write
1AD17750000
trusted library section
page readonly
20C087F8000
heap
page read and write
713800998000
trusted library allocation
page read and write
1A9000
unkown
page readonly
80C000
heap
page read and write
71380153C000
trusted library allocation
page read and write
20C087F5000
heap
page read and write
713801888000
trusted library allocation
page read and write
713800E50000
trusted library allocation
page read and write
20C087F5000
heap
page read and write
437E000
stack
page read and write
20C087F8000
heap
page read and write
190000
unkown
page readonly
3F8F000
stack
page read and write
334E000
stack
page read and write
484F000
stack
page read and write
1CEEE000
stack
page read and write
45D1000
heap
page read and write
20C08D30000
heap
page read and write
1F7C00298000
trusted library allocation
page read and write
1CE4F000
stack
page read and write
879827E000
unkown
page readonly
7138012AC000
trusted library allocation
page read and write
713801A48000
trusted library allocation
page read and write
4991000
heap
page read and write
713801B88000
trusted library allocation
page read and write
7138019F0000
trusted library allocation
page read and write
6E4000
heap
page read and write
87983FE000
stack
page read and write
713801824000
trusted library allocation
page read and write
7138012FC000
trusted library allocation
page read and write
20C087E3000
heap
page read and write
4991000
heap
page read and write
3FCC0352C000
trusted library allocation
page read and write
20C08E50000
unkown
page readonly
1F7C002F8000
trusted library allocation
page read and write
45D1000
heap
page read and write
3F7F000
stack
page read and write
71380130C000
trusted library allocation
page read and write
3FCC03F30000
trusted library allocation
page read and write
49A7000
heap
page read and write
9B077FE000
unkown
page readonly
3FCC0394C000
trusted library allocation
page read and write
3FCC03E18000
trusted library allocation
page read and write
3FCC024A0000
trusted library allocation
page read and write
713801938000
trusted library allocation
page read and write
1AD1BC00000
heap
page read and write
140000
unkown
page readonly
713801A3C000
trusted library allocation
page read and write
3FCC038CC000
trusted library allocation
page read and write
3FCC034ED000
trusted library allocation
page read and write
1AD1BC85000
heap
page read and write
20C0ACF2000
trusted library allocation
page read and write
3FCC035A0000
trusted library allocation
page read and write
45D1000
heap
page read and write
3FCC025C0000
trusted library allocation
page read and write
9C4000
heap
page read and write
3FCC033C4000
trusted library allocation
page read and write
4991000
heap
page read and write
3FCC035E8000
trusted library allocation
page read and write
A3C000
stack
page read and write
56E0000
heap
page read and write
713801964000
trusted library allocation
page read and write
713801D0C000
trusted library allocation
page read and write
20C0C2BC000
heap
page read and write
4FF0000
heap
page read and write
1894000
heap
page read and write
BB0000
heap
page read and write
3F8F000
stack
page read and write
3FCC02868000
trusted library allocation
page read and write
7138013AC000
trusted library allocation
page read and write
71380186C000
trusted library allocation
page read and write
33E0000
heap
page read and write
1CADF000
stack
page read and write
71380138C000
trusted library allocation
page read and write
88ED000
stack
page read and write
4991000
heap
page read and write
3FCC0236C000
trusted library allocation
page read and write
3FCC03998000
trusted library allocation
page read and write
7138016BC000
trusted library allocation
page read and write
1097000
heap
page read and write
71380187C000
trusted library allocation
page read and write
3FCC03510000
trusted library allocation
page read and write
7138018D0000
trusted library allocation
page read and write
20C0C2D0000
heap
page read and write
1AD1BE00000
trusted library allocation
page read and write
3FCC02418000
trusted library allocation
page read and write
20C087F0000
heap
page read and write
6E4000
heap
page read and write
1F7C002FC000
trusted library allocation
page read and write
394F000
stack
page read and write
3FCC0392C000
trusted library allocation
page read and write
20C08BC0000
trusted library section
page read and write
4991000
heap
page read and write
3FCC02868000
trusted library allocation
page read and write
5111000
heap
page read and write
9B187FE000
unkown
page readonly
20C07AE1000
unkown
page read and write
3FCC024B4000
trusted library allocation
page read and write
3FCC03510000
trusted library allocation
page read and write
7A1C000
heap
page read and write
5111000
heap
page read and write
20C05261000
heap
page read and write
3FCC025B0000
trusted library allocation
page read and write
5253000
trusted library allocation
page read and write
498F000
stack
page read and write
7138011B8000
trusted library allocation
page read and write
20C05265000
heap
page read and write
20C087E3000
heap
page read and write
20C09250000
heap
page read and write
C9D000
unkown
page execute and read and write
713801C4C000
trusted library allocation
page read and write
9C4000
heap
page read and write
20C087EA000
heap
page read and write
45D1000
heap
page read and write
3FCC024D8000
trusted library allocation
page read and write
79D0000
trusted library allocation
page read and write
1F7C00230000
trusted library allocation
page read and write
713801724000
trusted library allocation
page read and write
713801714000
trusted library allocation
page read and write
9B15FFE000
stack
page read and write
3FCC00E01000
trusted library allocation
page read and write
71380189C000
trusted library allocation
page read and write
713801160000
trusted library allocation
page read and write
3FCC03538000
trusted library allocation
page read and write
20C0C6B0000
trusted library allocation
page read and write
6E4000
heap
page read and write
474D000
stack
page read and write
3FCC03A24000
trusted library allocation
page read and write
2E3E000
stack
page read and write
3658000
trusted library allocation
page read and write
3FCC03E0C000
trusted library allocation
page read and write
3FCC03878000
trusted library allocation
page read and write
7138015E0000
trusted library allocation
page read and write
3FCC03A3C000
trusted library allocation
page read and write
20C0B9A0000
trusted library section
page read and write
3FCC0228C000
trusted library allocation
page read and write
6D0000
heap
page read and write
713800FC0000
trusted library allocation
page read and write
1D69E000
stack
page read and write
713801248000
trusted library allocation
page read and write
510F000
stack
page read and write
1283000
unkown
page execute and read and write
5120000
heap
page read and write
3FCC039B0000
trusted library allocation
page read and write
1F7C0028C000
trusted library allocation
page read and write
8797F7E000
unkown
page readonly
713801364000
trusted library allocation
page read and write
713800E80000
trusted library allocation
page read and write
32FF000
stack
page read and write
45C0000
direct allocation
page read and write
20C087F5000
heap
page read and write
9C4000
heap
page read and write
3E4F000
stack
page read and write
5111000
heap
page read and write
5111000
heap
page read and write
9C4000
heap
page read and write
4991000
heap
page read and write
20C087F5000
heap
page read and write
7138014B0000
trusted library allocation
page read and write
713801B70000
trusted library allocation
page read and write
713801570000
trusted library allocation
page read and write
3FCC0391C000
trusted library allocation
page read and write
7138009D0000
trusted library allocation
page read and write
45D1000
heap
page read and write
3FCC024A2000
trusted library allocation
page read and write
713801A14000
trusted library allocation
page read and write
7138012BC000
trusted library allocation
page read and write
9B157FE000
unkown
page readonly
4991000
heap
page read and write
71380080C000
trusted library allocation
page read and write
8A3000
heap
page read and write
20C08BC9000
trusted library section
page read and write
713801720000
trusted library allocation
page read and write
7C20000
trusted library allocation
page read and write
702000
unkown
page write copy
10E4000
unkown
page execute and write copy
7138018C8000
trusted library allocation
page read and write
50000
unkown
page readonly
713801480000
trusted library allocation
page read and write
3FCC03510000
trusted library allocation
page read and write
1AD17720000
trusted library section
page readonly
13E0000
direct allocation
page execute and read and write
3FCC03AD4000
trusted library allocation
page read and write
20C087F0000
heap
page read and write
7138018B0000
trusted library allocation
page read and write
20C087E5000
heap
page read and write
5111000
heap
page read and write
3600000
heap
page execute and read and write
3FCC03998000
trusted library allocation
page read and write
71380175C000
trusted library allocation
page read and write
713801BBC000
trusted library allocation
page read and write
3FCC03EA8000
trusted library allocation
page read and write
71380174C000
trusted library allocation
page read and write
7138019EC000
trusted library allocation
page read and write
5111000
heap
page read and write
5111000
heap
page read and write
3FCC023D4000
trusted library allocation
page read and write
7138015B0000
trusted library allocation
page read and write
DEC000
stack
page read and write
5111000
heap
page read and write
20C087C0000
heap
page read and write
3FCC023F0000
trusted library allocation
page read and write
9B7B9FE000
stack
page read and write
7138003A8000
trusted library allocation
page read and write
1894000
heap
page read and write
3D4E000
stack
page read and write
7A11000
heap
page read and write
B80000
heap
page read and write
35EE000
stack
page read and write
20C087E3000
heap
page read and write
20C087E3000
heap
page read and write
5111000
heap
page read and write
713800FC8000
trusted library allocation
page read and write
7E40000
trusted library allocation
page read and write
2CBF000
stack
page read and write
20C087F8000
heap
page read and write
20C08A30000
heap
page read and write
5FBD000
stack
page read and write
9C4000
heap
page read and write
9C4000
heap
page read and write
3FCC038EC000
trusted library allocation
page read and write
1A9000
unkown
page readonly
7C00000
trusted library allocation
page read and write
8797CFE000
stack
page read and write
20C0C315000
heap
page read and write
5111000
heap
page read and write
190000
unkown
page readonly
713801418000
trusted library allocation
page read and write
1F7C002C0000
trusted library allocation
page read and write
20C087F0000
heap
page read and write
20C08E21000
heap
page read and write
7B0000
heap
page read and write
45D1000
heap
page read and write
3FCC02C84000
trusted library allocation
page read and write
10EF000
stack
page read and write
1A1E000
stack
page read and write
7C50000
trusted library allocation
page read and write
713801A60000
trusted library allocation
page read and write
5700000
direct allocation
page execute and read and write
7138019BC000
trusted library allocation
page read and write
9B7F9FC000
stack
page read and write
3FCC025E8000
trusted library allocation
page read and write
5111000
heap
page read and write
1894000
heap
page read and write
45C0000
direct allocation
page read and write
20C087E5000
heap
page read and write
20C087E5000
heap
page read and write
4A60000
direct allocation
page read and write
713800EE0000
trusted library allocation
page read and write
713801C2C000
trusted library allocation
page read and write
7138014C0000
trusted library allocation
page read and write
71380166C000
trusted library allocation
page read and write
713801A88000
trusted library allocation
page read and write
45D1000
heap
page read and write
1AD1BD12000
heap
page read and write
4B9F000
stack
page read and write
1CE8E000
stack
page read and write
45D0000
heap
page read and write
3FCC0397C000
trusted library allocation
page read and write
3E7E000
stack
page read and write
60BE000
stack
page read and write
347E000
stack
page read and write
44BE000
stack
page read and write
3FCC03B64000
trusted library allocation
page read and write
45C0000
direct allocation
page read and write
713801334000
trusted library allocation
page read and write
3FCC025E8000
trusted library allocation
page read and write
5111000
heap
page read and write
45D1000
heap
page read and write
3FCC038E0000
trusted library allocation
page read and write
713801C68000
trusted library allocation
page read and write
713801A50000
trusted library allocation
page read and write
71380122C000
trusted library allocation
page read and write
45D1000
heap
page read and write
3FCC024B4000
trusted library allocation
page read and write
9C4000
heap
page read and write
20C09280000
unkown
page readonly
45D1000
heap
page read and write
3FCC0240C000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
4991000
heap
page read and write
5062000
trusted library allocation
page read and write
3FCC02828000
trusted library allocation
page read and write
3FCC039A8000
trusted library allocation
page read and write
3FCC0391C000
trusted library allocation
page read and write
7138018E8000
trusted library allocation
page read and write
4991000
heap
page read and write
9C4000
heap
page read and write
713801950000
trusted library allocation
page read and write
713800F48000
trusted library allocation
page read and write
7138013DC000
trusted library allocation
page read and write
20C087F0000
heap
page read and write
3FCC03934000
trusted library allocation
page read and write
3FCC035A0000
trusted library allocation
page read and write
3FCC024D8000
trusted library allocation
page read and write
20C087EB000
heap
page read and write
713801B74000
trusted library allocation
page read and write
6E4000
heap
page read and write
3487000
heap
page read and write
1AD1BEC0000
remote allocation
page read and write
279E000
stack
page read and write
1A2000
unkown
page read and write
283B000
heap
page read and write
20C087E3000
heap
page read and write
713801BAC000
trusted library allocation
page read and write
36F0000
heap
page read and write
713801C50000
trusted library allocation
page read and write
713800E98000
trusted library allocation
page read and write
8796C9B000
stack
page read and write
881000
heap
page read and write
5111000
heap
page read and write
20C087F5000
heap
page read and write
713801BD0000
trusted library allocation
page read and write
1AD1BCF0000
heap
page read and write
5111000
heap
page read and write
3FCC033C4000
trusted library allocation
page read and write
20C053C0000
trusted library allocation
page read and write
6E4000
heap
page read and write
3FCC0247C000
trusted library allocation
page read and write
3FCC02C84000
trusted library allocation
page read and write
1894000
heap
page read and write
85F000
heap
page read and write
5111000
heap
page read and write
1894000
heap
page read and write
20C05218000
heap
page read and write
1AD1BE60000
trusted library allocation
page read and write
9B03FFE000
stack
page read and write
3FCC025B0000
trusted library allocation
page read and write
3FCC03100000
trusted library allocation
page read and write
3FCC02520000
trusted library allocation
page read and write
713801150000
trusted library allocation
page read and write
702000
unkown
page read and write
1AD1BCF4000
heap
page read and write
20C087F5000
heap
page read and write
3FCC038B8000
trusted library allocation
page read and write
3A4F000
stack
page read and write
1D02D000
stack
page read and write
713800F5C000
trusted library allocation
page read and write
811000
heap
page read and write
60FB000
stack
page read and write
9B799FE000
stack
page read and write
3FCC030CC000
trusted library allocation
page read and write
4991000
heap
page read and write
3FCC03510000
trusted library allocation
page read and write
87F000
heap
page read and write
879847E000
unkown
page readonly
3FCC02868000
trusted library allocation
page read and write
20C08E1B000
heap
page read and write
713801628000
trusted library allocation
page read and write
879937E000
unkown
page readonly
1F7C00280000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
71380167C000
trusted library allocation
page read and write
BE1000
unkown
page execute and write copy
3BCF000
stack
page read and write
BE0000
unkown
page readonly
1AD16F5D000
heap
page read and write
3FCC034BC000
trusted library allocation
page read and write
1870000
direct allocation
page read and write
71380039C000
trusted library allocation
page read and write
1079000
heap
page read and write
20C087E5000
heap
page read and write
20C08D76000
heap
page read and write
9C4000
heap
page read and write
1F7C0020C000
trusted library allocation
page read and write
9B0EFFD000
stack
page read and write
3360000
trusted library allocation
page read and write
713800F24000
trusted library allocation
page read and write
713801BE8000
trusted library allocation
page read and write
20C087E3000
heap
page read and write
20C087F8000
heap
page read and write
1AD1BD19000
heap
page read and write
1AD1BB60000
trusted library allocation
page read and write
713801C94000
trusted library allocation
page read and write
3FCC02828000
trusted library allocation
page read and write
20C087E5000
heap
page read and write
3FCC03504000
trusted library allocation
page read and write
3FCC02828000
trusted library allocation
page read and write
1AD1669C000
heap
page read and write
3CF0000
heap
page read and write
9B1BFFE000
stack
page read and write
357F000
stack
page read and write
3FCC0220C000
trusted library allocation
page read and write
3FCC02828000
trusted library allocation
page read and write
45D1000
heap
page read and write
45D1000
heap
page read and write
3FCC034C8000
trusted library allocation
page read and write
8797E7E000
unkown
page readonly
3FCC02C44000
trusted library allocation
page read and write
7138003B4000
trusted library allocation
page read and write
713801198000
trusted library allocation
page read and write
5730000
direct allocation
page execute and read and write
2AC000
unkown
page readonly
20C0B1E0000
unkown
page readonly
743E000
stack
page read and write
4F8E000
stack
page read and write
45D1000
heap
page read and write
713801234000
trusted library allocation
page read and write
5111000
heap
page read and write
3FCC03108000
trusted library allocation
page read and write
20C0B1A0000
unkown
page readonly
3FCC039F0000
trusted library allocation
page read and write
737E000
stack
page read and write
9B027FE000
unkown
page readonly
767E000
stack
page read and write
713801708000
trusted library allocation
page read and write
3FCC02340000
trusted library allocation
page read and write
3FCC02434000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
20C087F8000
heap
page read and write
4EDE000
stack
page read and write
1283000
unkown
page execute and read and write
1AD1BC54000
heap
page read and write
3FCC02520000
trusted library allocation
page read and write
1AD16702000
heap
page read and write
20C087F5000
heap
page read and write
9C5000
heap
page read and write
20C087F8000
heap
page read and write
3FCC03A0C000
trusted library allocation
page read and write
3FCC034DC000
trusted library allocation
page read and write
7138003D8000
trusted library allocation
page read and write
45D1000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
20C08E1F000
heap
page read and write
46D0000
trusted library allocation
page read and write
713801090000
trusted library allocation
page read and write
3FCC024D8000
trusted library allocation
page read and write
6E4000
heap
page read and write
20C087F8000
heap
page read and write
6029000
trusted library allocation
page read and write
713801AF4000
trusted library allocation
page read and write
20C087EA000
heap
page read and write
713801A80000
trusted library allocation
page read and write
3FCC0320C000
trusted library allocation
page read and write
3FCC037E4000
trusted library allocation
page read and write
7138011C8000
trusted library allocation
page read and write
20C087F5000
heap
page read and write
1AD1BC5E000
heap
page read and write
6E4000
heap
page read and write
F90000
heap
page read and write
9C4000
heap
page read and write
3FCC02C84000
trusted library allocation
page read and write
713800E8C000
trusted library allocation
page read and write
1CC9E000
stack
page read and write
20C05187000
heap
page read and write
713801658000
trusted library allocation
page read and write
1A9000
unkown
page readonly
DC0000
heap
page read and write
713801A18000
trusted library allocation
page read and write
45D1000
heap
page read and write
713801438000
trusted library allocation
page read and write
71380091C000
trusted library allocation
page read and write
1F7C00298000
trusted library allocation
page read and write
3FCC039D0000
trusted library allocation
page read and write
20C05202000
heap
page read and write
7138003C0000
trusted library allocation
page read and write
9C4000
heap
page read and write
1AD1BBF0000
trusted library allocation
page read and write
713801550000
trusted library allocation
page read and write
3FCC03AD4000
trusted library allocation
page read and write
20C087F5000
heap
page read and write
3FCC03104000
trusted library allocation
page read and write
3FCC02430000
trusted library allocation
page read and write
20C05250000
heap
page read and write
879817B000
stack
page read and write
3FCC02334000
trusted library allocation
page read and write
3FCC02C84000
trusted library allocation
page read and write
3FCC0352C000
trusted library allocation
page read and write
1894000
heap
page read and write
50000
unkown
page readonly
71380146C000
trusted library allocation
page read and write
3FCC034C8000
trusted library allocation
page read and write
2DEB000
stack
page read and write
713801868000
trusted library allocation
page read and write
9C4000
heap
page read and write
3FCC03EFD000
trusted library allocation
page read and write
20C09177000
unclassified section
page read and write
1AD1BB20000
trusted library allocation
page read and write
1A9000
unkown
page readonly
10CB000
unkown
page execute and read and write
36CF000
stack
page read and write
45D1000
heap
page read and write
7138012A8000
trusted library allocation
page read and write
3FCC03A0C000
trusted library allocation
page read and write
3FCC035A0000
trusted library allocation
page read and write
B50000
direct allocation
page read and write
713801C0C000
trusted library allocation
page read and write
343F000
stack
page read and write
448F000
stack
page read and write
3FCC039B0000
trusted library allocation
page read and write
9B7F1FE000
unkown
page readonly
5111000
heap
page read and write
835000
heap
page read and write
3FCC02C88000
trusted library allocation
page read and write
3FCC02EC0000
trusted library allocation
page read and write
713801968000
trusted library allocation
page read and write
58B80030C000
direct allocation
page read and write
3FCC03EC8000
trusted library allocation
page read and write
1AD17710000
trusted library section
page readonly
20C087F8000
heap
page read and write
713801900000
trusted library allocation
page read and write
713800EF4000
trusted library allocation
page read and write
713800968000
trusted library allocation
page read and write
20C087EB000
heap
page read and write
5710000
direct allocation
page execute and read and write
3FCC02828000
trusted library allocation
page read and write
1870000
direct allocation
page read and write
3FCC03510000
trusted library allocation
page read and write
7138016C8000
trusted library allocation
page read and write
713800F7C000
trusted library allocation
page read and write
1AD1BC41000
heap
page read and write
5AF000
stack
page read and write
3FCC0284C000
trusted library allocation
page read and write
71380193C000
trusted library allocation
page read and write
71380104C000
trusted library allocation
page read and write
1AD1BB24000
trusted library allocation
page read and write
5111000
heap
page read and write
1DCDF000
stack
page read and write
3FCC0285C000
trusted library allocation
page read and write
3FCC0240C000
trusted library allocation
page read and write
71380063C000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
3FCC02C8E000
trusted library allocation
page read and write
3FCC023E8000
trusted library allocation
page read and write
3FCC03510000
trusted library allocation
page read and write
45D1000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
3FCC0391C000
trusted library allocation
page read and write
20C087F5000
heap
page read and write
20C087F8000
heap
page read and write
879807E000
unkown
page readonly
713800EB8000
trusted library allocation
page read and write
BCE000
stack
page read and write
71380109C000
trusted library allocation
page read and write
9C4000
heap
page read and write
1894000
heap
page read and write
3FCC02520000
trusted library allocation
page read and write
16FE000
stack
page read and write
3FCC03F10000
trusted library allocation
page read and write
713801AF8000
trusted library allocation
page read and write
5111000
heap
page read and write
3FCC02520000
trusted library allocation
page read and write
7138017A4000
trusted library allocation
page read and write
3FCC02314000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
9C4000
heap
page read and write
3ABE000
stack
page read and write
9B0FFFD000
stack
page read and write
45D1000
heap
page read and write
1894000
heap
page read and write
713800A04000
trusted library allocation
page read and write
20C087F0000
heap
page read and write
1AD1BD0A000
heap
page read and write
9C4000
heap
page read and write
3FCC025E8000
trusted library allocation
page read and write
8798D7E000
unkown
page readonly
B50000
direct allocation
page read and write
438E000
stack
page read and write
1AD17620000
trusted library allocation
page read and write
45D1000
heap
page read and write
1A5000
unkown
page read and write
1AD16643000
heap
page read and write
45C0000
direct allocation
page read and write
3FCC025E8000
trusted library allocation
page read and write
20C08EB5000
unkown
page readonly
4F70000
direct allocation
page execute and read and write
9C4000
heap
page read and write
7138010E8000
trusted library allocation
page read and write
3A8E000
stack
page read and write
20C08D6E000
heap
page read and write
BFE000
stack
page read and write
3FCC03A0C000
trusted library allocation
page read and write
3FCC02EC0000
trusted library allocation
page read and write
3FCC025B0000
trusted library allocation
page read and write
3FCC038C4000
trusted library allocation
page read and write
13EE000
stack
page read and write
3FCC0390C000
trusted library allocation
page read and write
3FCC023D8000
trusted library allocation
page read and write
7A00000
heap
page read and write
20C087E5000
heap
page read and write
9B7A1FE000
unkown
page readonly
3FCC037E4000
trusted library allocation
page read and write
9C4000
heap
page read and write
6E4000
heap
page read and write
9B127FE000
unkown
page readonly
20C087F0000
heap
page read and write
7138019A4000
trusted library allocation
page read and write
8850000
trusted library allocation
page execute and read and write
3FCC03998000
trusted library allocation
page read and write
713801560000
trusted library allocation
page read and write
3FCC03784000
trusted library allocation
page read and write
4250000
trusted library allocation
page read and write
7138014D0000
trusted library allocation
page read and write
1AD16691000
heap
page read and write
7138015E4000
trusted library allocation
page read and write
20C087EB000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
3FCC0337C000
trusted library allocation
page read and write
9B18FFD000
stack
page read and write
45D1000
heap
page read and write
713800424000
trusted library allocation
page read and write
4991000
heap
page read and write
7DE0000
trusted library allocation
page read and write
20C0B0F5000
unkown
page readonly
3D3E000
stack
page read and write
45C0000
direct allocation
page read and write
713800948000
trusted library allocation
page read and write
5111000
heap
page read and write
540000
heap
page read and write
20C087E3000
heap
page read and write
4BF0000
heap
page read and write
5111000
heap
page read and write
713801CD4000
trusted library allocation
page read and write
71380199C000
trusted library allocation
page read and write
3FCC03510000
trusted library allocation
page read and write
3FCC03904000
trusted library allocation
page read and write
713800814000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
20C087F8000
heap
page read and write
7A8E000
heap
page read and write
713801B40000
trusted library allocation
page read and write
20C087F0000
heap
page read and write
7138008B4000
trusted library allocation
page read and write
4D4F000
stack
page read and write
BBA000
heap
page read and write
20C0B3C0000
trusted library section
page read and write
713800F94000
trusted library allocation
page read and write
3FCC035A0000
trusted library allocation
page read and write
9B1AFFB000
stack
page read and write
3FCC03DA8000
trusted library allocation
page read and write
7138019D4000
trusted library allocation
page read and write
B3C000
stack
page read and write
3FCC023DC000
trusted library allocation
page read and write
3FCC034E9000
trusted library allocation
page read and write
7138018B8000
trusted library allocation
page read and write
4A90000
trusted library allocation
page read and write
20C087EA000
heap
page read and write
20C0B0F7000
unkown
page readonly
713801AD4000
trusted library allocation
page read and write
488E000
stack
page read and write
1894000
heap
page read and write
1CD9F000
stack
page read and write
3FCC02EC0000
trusted library allocation
page read and write
713801510000
trusted library allocation
page read and write
20C087EA000
heap
page read and write
3FCC03A18000
trusted library allocation
page read and write
8A10000
heap
page read and write
7138010F4000
trusted library allocation
page read and write
3FCC03D68000
trusted library allocation
page read and write
20C08D31000
heap
page read and write
713800820000
trusted library allocation
page read and write
20C05219000
heap
page read and write
940000
heap
page read and write
7F8000
heap
page read and write
20C08D82000
heap
page read and write
4BE1000
heap
page read and write
ACF000
stack
page read and write
9B02FFC000
stack
page read and write
3FCC03340000
trusted library allocation
page read and write
713801134000
trusted library allocation
page read and write
9C4000
heap
page read and write
140000
unkown
page readonly
3FCC024A0000
trusted library allocation
page read and write
71380156C000
trusted library allocation
page read and write
9C4000
heap
page read and write
20C087F5000
heap
page read and write
281B000
stack
page read and write
9B0C7FE000
unkown
page readonly
1F7C002C0000
trusted library allocation
page read and write
7E20000
trusted library allocation
page read and write
3FCC024A0000
trusted library allocation
page read and write
7138012C4000
trusted library allocation
page read and write
45C0000
direct allocation
page read and write
3FCC034CC000
trusted library allocation
page read and write
71380198C000
trusted library allocation
page read and write
2F7E000
stack
page read and write
9B167FE000
unkown
page readonly
713801698000
trusted library allocation
page read and write
6E4000
heap
page read and write
8797C7E000
unkown
page readonly
713801934000
trusted library allocation
page read and write
713800E1C000
trusted library allocation
page read and write
79C0000
heap
page execute and read and write
1AB0E000
stack
page read and write
1A4000
unkown
page write copy
713801324000
trusted library allocation
page read and write
3FCC031E8000
trusted library allocation
page read and write
3FCC02520000
trusted library allocation
page read and write
20C087E3000
heap
page read and write
713800288000
trusted library allocation
page read and write
3FCC034FC000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
713801CB0000
trusted library allocation
page read and write
397E000
stack
page read and write
713800FF8000
trusted library allocation
page read and write
9C4000
heap
page read and write
20C087E5000
heap
page read and write
99E000
stack
page read and write
20C087E5000
heap
page read and write
4991000
heap
page read and write
9C4000
heap
page read and write
1870000
direct allocation
page read and write
1894000
heap
page read and write
4991000
heap
page read and write
20C08D39000
heap
page read and write
20C08E89000
unkown
page readonly
1469000
heap
page read and write
45D1000
heap
page read and write
7DB0000
trusted library allocation
page read and write
350B000
heap
page read and write
3FCC03460000
trusted library allocation
page read and write
1AD17191000
trusted library allocation
page read and write
3FCC03864000
trusted library allocation
page read and write
713801460000
trusted library allocation
page read and write
1894000
heap
page read and write
3FCC03CF4000
trusted library allocation
page read and write
713801948000
trusted library allocation
page read and write
87988FE000
stack
page read and write
20C087F0000
heap
page read and write
C1D000
heap
page read and write
3846000
heap
page read and write
879737E000
unkown
page readonly
1894000
heap
page read and write
20C087F8000
heap
page read and write
3FCC0391C000
trusted library allocation
page read and write
9B117FE000
unkown
page readonly
45CF000
stack
page read and write
20C08E1B000
heap
page read and write
1894000
heap
page read and write
45D1000
heap
page read and write
45D1000
heap
page read and write
713800F28000
trusted library allocation
page read and write
6E4000
heap
page read and write
1C99F000
stack
page read and write
713801AE4000
trusted library allocation
page read and write
704000
unkown
page write copy
45D1000
heap
page read and write
7138014EC000
trusted library allocation
page read and write
9C4000
heap
page read and write
7138009F8000
trusted library allocation
page read and write
4991000
heap
page read and write
3FCC03510000
trusted library allocation
page read and write
34A1000
heap
page read and write
3C0E000
stack
page read and write
B70000
direct allocation
page read and write
E2A000
unkown
page execute and read and write
20C0525E000
heap
page read and write
870000
heap
page read and write
713801780000
trusted library allocation
page read and write
4AC000
stack
page read and write
1AD6F000
stack
page read and write
308F000
stack
page read and write
856000
heap
page read and write
713801244000
trusted library allocation
page read and write
9B007FE000
unkown
page readonly
3FCC02604000
trusted library allocation
page read and write
3FCC03A48000
trusted library allocation
page read and write
9C4000
heap
page read and write
9C4000
heap
page read and write
3FCC031E8000
trusted library allocation
page read and write
9C4000
heap
page read and write
5111000
heap
page read and write
20C087F0000
heap
page read and write
5710000
direct allocation
page execute and read and write
1AD1BD00000
heap
page read and write
713800FE8000
trusted library allocation
page read and write
20C0520E000
heap
page read and write
9B107FE000
unkown
page readonly
713801918000
trusted library allocation
page read and write
1F7C00298000
trusted library allocation
page read and write
1F7C00298000
trusted library allocation
page read and write
9B11FFB000
stack
page read and write
713800ED4000
trusted library allocation
page read and write
1F7C002CC000
trusted library allocation
page read and write
20C08D91000
heap
page read and write
1AD16F02000
heap
page read and write
7138009E8000
trusted library allocation
page read and write
344F000
stack
page read and write
3FCC024E1000
trusted library allocation
page read and write
1F7C002CC000
trusted library allocation
page read and write
6F0000
unkown
page readonly
713801D14000
trusted library allocation
page read and write
3FCC034CC000
trusted library allocation
page read and write
BE0000
unkown
page readonly
20C087F0000
heap
page read and write
3FCC02298000
trusted library allocation
page read and write
713801CC0000
trusted library allocation
page read and write
3FCC03AD4000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
7138014FC000
trusted library allocation
page read and write
3FCC023AC000
trusted library allocation
page read and write
4E8F000
stack
page read and write
3FCC039B0000
trusted library allocation
page read and write
1ADBD000
stack
page read and write
3FCC030CC000
trusted library allocation
page read and write
20C05464000
heap
page read and write
713801114000
trusted library allocation
page read and write
1F7C002CC000
trusted library allocation
page read and write
20C087F5000
heap
page read and write
8C2C000
stack
page read and write
1AD166BA000
heap
page read and write
9B0DFFB000
stack
page read and write
838000
heap
page read and write
1894000
heap
page read and write
7D5E000
stack
page read and write
20C087F8000
heap
page read and write
144D000
heap
page read and write
713800E40000
trusted library allocation
page read and write
3FCE000
stack
page read and write
3FCC02201000
trusted library allocation
page read and write
45D1000
heap
page read and write
713801194000
trusted library allocation
page read and write
370E000
stack
page read and write
20C087F8000
heap
page read and write
410E000
stack
page read and write
20C0C2B0000
heap
page read and write
20C087EA000
heap
page read and write
8797277000
stack
page read and write
3FCC0247C000
trusted library allocation
page read and write
3FCC03334000
trusted library allocation
page read and write
10A9000
unkown
page execute and read and write
3FCC02870000
trusted library allocation
page read and write
713801B34000
trusted library allocation
page read and write
185E000
stack
page read and write
3E8E000
stack
page read and write
1AD1BB21000
trusted library allocation
page read and write
3FCC025E8000
trusted library allocation
page read and write
1AD16F13000
heap
page read and write
3FCC03D68000
trusted library allocation
page read and write
8797EFE000
stack
page read and write
6E4000
heap
page read and write
6E4000
heap
page read and write
1AD1668C000
heap
page read and write
7138013D8000
trusted library allocation
page read and write
33A5000
trusted library allocation
page execute and read and write
20C087F8000
heap
page read and write
93E000
stack
page read and write
20C087F0000
heap
page read and write
3370000
trusted library allocation
page read and write
3FCC02FD4000
trusted library allocation
page read and write
3FCC03D00000
trusted library allocation
page read and write
3FCC00601000
trusted library allocation
page read and write
3FCC0247C000
trusted library allocation
page read and write
3FCC00001000
trusted library allocation
page read and write
3FCC02828000
trusted library allocation
page read and write
20C087D0000
heap
page read and write
20C087EA000
heap
page read and write
45D1000
heap
page read and write
3FCC03900000
trusted library allocation
page read and write
7138019CC000
trusted library allocation
page read and write
713801984000
trusted library allocation
page read and write
713800E0C000
trusted library allocation
page read and write
3FCC03A90000
trusted library allocation
page read and write
3FCC02EC0000
trusted library allocation
page read and write
5111000
heap
page read and write
20C087F8000
heap
page read and write
71380173C000
trusted library allocation
page read and write
20C05236000
heap
page read and write
1AD1BCF6000
heap
page read and write
45D1000
heap
page read and write
4FCF000
stack
page read and write
9B1E7FE000
unkown
page readonly
1AD1BB25000
trusted library allocation
page read and write
713801CFC000
trusted library allocation
page read and write
1AD1BC4E000
heap
page read and write
71380164C000
trusted library allocation
page read and write
816000
heap
page read and write
20C087F0000
heap
page read and write
6470000
heap
page read and write
3FCC0352C000
trusted library allocation
page read and write
3FCC0332C000
trusted library allocation
page read and write
838000
heap
page read and write
713801080000
trusted library allocation
page read and write
35BE000
stack
page read and write
358E000
stack
page read and write
5156000
trusted library allocation
page read and write
713801644000
trusted library allocation
page read and write
20C087E3000
heap
page read and write
3FCC0337C000
trusted library allocation
page read and write
1F7C00238000
trusted library allocation
page read and write
3FCC02C84000
trusted library allocation
page read and write
9C4000
heap
page read and write
1F7C00298000
trusted library allocation
page read and write
45D1000
heap
page read and write
3FCC02AC0000
trusted library allocation
page read and write
3FCC034BC000
trusted library allocation
page read and write
5111000
heap
page read and write
1AD16613000
heap
page read and write
4991000
heap
page read and write
20C087E5000
heap
page read and write
3FCC031D8000
trusted library allocation
page read and write
646C000
stack
page read and write
1870000
direct allocation
page read and write
DFE000
heap
page read and write
1F7C00260000
trusted library allocation
page read and write
713801170000
trusted library allocation
page read and write
3FCC02360000
trusted library allocation
page read and write
9B017FE000
unkown
page readonly
3FCC03984000
trusted library allocation
page read and write
7138013EC000
trusted library allocation
page read and write
3FCC02282000
trusted library allocation
page read and write
3FCC0332C000
trusted library allocation
page read and write
7138014DC000
trusted library allocation
page read and write
8798C79000
stack
page read and write
3FCC03AD4000
trusted library allocation
page read and write
9B7E1FE000
unkown
page readonly
713801598000
trusted library allocation
page read and write
865000
heap
page read and write
3FCC02868000
trusted library allocation
page read and write
5111000
heap
page read and write
3FCC0371C000
trusted library allocation
page read and write
3FCC03923000
trusted library allocation
page read and write
1AD1BBF0000
trusted library allocation
page read and write
FEE000
stack
page read and write
3FCC039BC000
trusted library allocation
page read and write
3FCC02488000
trusted library allocation
page read and write
713801634000
trusted library allocation
page read and write
713801CB4000
trusted library allocation
page read and write
20C08E98000
unkown
page readonly
7138013A0000
trusted library allocation
page read and write
7138018F0000
trusted library allocation
page read and write
7138009E0000
trusted library allocation
page read and write
10E9000
heap
page read and write
8797DFE000
stack
page read and write
45C0000
direct allocation
page read and write
713801330000
trusted library allocation
page read and write
7138017F8000
trusted library allocation
page read and write
3FCC034F7000
trusted library allocation
page read and write
5111000
heap
page read and write
9B147FE000
unkown
page readonly
1F7C00278000
trusted library allocation
page read and write
713801C3C000
trusted library allocation
page read and write
1AD1666B000
heap
page read and write
1AD16560000
heap
page read and write
713801AC0000
trusted library allocation
page read and write
9C4000
heap
page read and write
20C0C2B8000
heap
page read and write
71380131C000
trusted library allocation
page read and write
1AD166FD000
heap
page read and write
488E000
stack
page read and write
71380144C000
trusted library allocation
page read and write
1AD1666E000
heap
page read and write
7138015C8000
trusted library allocation
page read and write
3FCC02EC0000
trusted library allocation
page read and write
713800248000
trusted library allocation
page read and write
1AD1BB50000
trusted library allocation
page read and write
870000
heap
page read and write
20C087E3000
heap
page read and write
3FCC03398000
trusted library allocation
page read and write
20C08DDF000
heap
page read and write
3FCC03EB8000
trusted library allocation
page read and write
713801238000
trusted library allocation
page read and write
6E4000
heap
page read and write
20C08D71000
heap
page read and write
3FCC0394C000
trusted library allocation
page read and write
E3E000
unkown
page execute and read and write
44CE000
stack
page read and write
3FCC031D8000
trusted library allocation
page read and write
3FCC02488000
trusted library allocation
page read and write
9C4000
heap
page read and write
3FCC0346C000
trusted library allocation
page read and write
5111000
heap
page read and write
3FCC034BC000
trusted library allocation
page read and write
AE9000
stack
page read and write
140000
unkown
page readonly
71380094C000
trusted library allocation
page read and write
7A6B000
heap
page read and write
20C08E81000
unkown
page readonly
2554000
heap
page read and write
713801C64000
trusted library allocation
page read and write
3FCC01001000
trusted library allocation
page read and write
4991000
heap
page read and write
7138019C8000
trusted library allocation
page read and write
3FCC0394C000
trusted library allocation
page read and write
713801694000
trusted library allocation
page read and write
9C4000
heap
page read and write
3FCC0237C000
trusted library allocation
page read and write
45D1000
heap
page read and write
713800F10000
trusted library allocation
page read and write
3270000
heap
page read and write
7A0F000
heap
page read and write
20C0525E000
heap
page read and write
5110000
heap
page read and write
3FCC031E8000
trusted library allocation
page read and write
713801450000
trusted library allocation
page read and write
1DCF5000
heap
page read and write
33A0000
trusted library allocation
page read and write
36AC000
stack
page read and write
3A8F000
stack
page read and write
BE0000
unkown
page readonly
3FCC035A0000
trusted library allocation
page read and write
33D0000
heap
page read and write
3FCC02B89000
trusted library allocation
page read and write
4991000
heap
page read and write
9B057FE000
unkown
page readonly
1D51E000
stack
page read and write
5111000
heap
page read and write
9B21FFA000
stack
page read and write
1894000
heap
page read and write
45C0000
direct allocation
page read and write
45D1000
heap
page read and write
3FCC038F4000
trusted library allocation
page read and write
3FCC025B0000
trusted library allocation
page read and write
35CE000
stack
page read and write
7AD1000
heap
page read and write
713800418000
trusted library allocation
page read and write
71380155C000
trusted library allocation
page read and write
7138011AC000
trusted library allocation
page read and write
3FCC0380C000
trusted library allocation
page read and write
1894000
heap
page read and write
1AD1BEC0000
remote allocation
page read and write
1894000
heap
page read and write
20C087E4000
heap
page read and write
3FCC0310C000
trusted library allocation
page read and write
9B097FE000
unkown
page readonly
6E4000
heap
page read and write
87F000
heap
page read and write
9B7A9FE000
stack
page read and write
3FCC025E8000
trusted library allocation
page read and write
1F7C002CC000
trusted library allocation
page read and write
1870000
direct allocation
page read and write
713801C84000
trusted library allocation
page read and write
45D1000
heap
page read and write
1AD16600000
heap
page read and write
1F7C00235000
trusted library allocation
page read and write
3D0F000
stack
page read and write
56CF000
stack
page read and write
13C000
stack
page read and write
9B01FFB000
stack
page read and write
1AD16622000
heap
page read and write
71380112C000
trusted library allocation
page read and write
36EE000
stack
page read and write
9C4000
heap
page read and write
3FCC02EC0000
trusted library allocation
page read and write
7138013B8000
trusted library allocation
page read and write
9C4000
heap
page read and write
3FCC037E4000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
20C08DF6000
heap
page read and write
713800ED0000
trusted library allocation
page read and write
71380039C000
trusted library allocation
page read and write
9B1FFFA000
stack
page read and write
713801284000
trusted library allocation
page read and write
7138009C4000
trusted library allocation
page read and write
20C087F5000
heap
page read and write
3FCC03488000
trusted library allocation
page read and write
20C087F5000
heap
page read and write
20C087F5000
heap
page read and write
713800E68000
trusted library allocation
page read and write
20C087F5000
heap
page read and write
5111000
heap
page read and write
B50000
direct allocation
page read and write
713801618000
trusted library allocation
page read and write
713801B44000
trusted library allocation
page read and write
20C087F0000
heap
page read and write
E3E000
unkown
page execute and read and write
20C0517A000
heap
page read and write
7A86000
heap
page read and write
713801A10000
trusted library allocation
page read and write
2AC000
unkown
page readonly
713800E9C000
trusted library allocation
page read and write
434F000
stack
page read and write
7138016F4000
trusted library allocation
page read and write
7138008C4000
trusted library allocation
page read and write
9C4000
heap
page read and write
9B1DFFE000
stack
page read and write
3FCC024D8000
trusted library allocation
page read and write
3BFE000
stack
page read and write
4ACF000
stack
page read and write
3FCC02828000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
71380099C000
trusted library allocation
page read and write
73FE000
stack
page read and write
9C4000
heap
page read and write
B8B000
heap
page read and write
3FCC034DC000
trusted library allocation
page read and write
869000
heap
page read and write
3FCC00201000
trusted library allocation
page read and write
5590000
direct allocation
page read and write
7138010B0000
trusted library allocation
page read and write
3FCC034C8000
trusted library allocation
page read and write
1C9DE000
stack
page read and write
19DB000
stack
page read and write
20C087F5000
heap
page read and write
20C05253000
heap
page read and write
20C0526C000
heap
page read and write
3FCC038D0000
trusted library allocation
page read and write
20C087F0000
heap
page read and write
31FE000
stack
page read and write
7138014C4000
trusted library allocation
page read and write
45D1000
heap
page read and write
B50000
direct allocation
page read and write
713800408000
trusted library allocation
page read and write
3FCC0312D000
trusted library allocation
page read and write
7138017A8000
trusted library allocation
page read and write
713801524000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
3FCC02520000
trusted library allocation
page read and write
45D1000
heap
page read and write
1AD16540000
heap
page read and write
358F000
stack
page read and write
4991000
heap
page read and write
3FCC02BA0000
trusted library allocation
page read and write
8F5000
heap
page read and write
713801B0C000
trusted library allocation
page read and write
713801810000
trusted library allocation
page read and write
9C4000
heap
page read and write
20C087E5000
heap
page read and write
9C4000
heap
page read and write
7138009A0000
trusted library allocation
page read and write
1AD16DC1000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
31BF000
stack
page read and write
C91000
unkown
page execute and read and write
3FCC03A48000
trusted library allocation
page read and write
20C0B0F0000
unkown
page readonly
713800978000
trusted library allocation
page read and write
3FCC034C8000
trusted library allocation
page read and write
713801A70000
trusted library allocation
page read and write
713801814000
trusted library allocation
page read and write
3FCC03A78000
trusted library allocation
page read and write
3FCC03A4C000
trusted library allocation
page read and write
8A3000
heap
page read and write
3FCC02520000
trusted library allocation
page read and write
1A2000
unkown
page write copy
45D1000
heap
page read and write
713800EBC000
trusted library allocation
page read and write
7138015A4000
trusted library allocation
page read and write
6E4000
heap
page read and write
3FCC031E8000
trusted library allocation
page read and write
45D1000
heap
page read and write
71380129C000
trusted library allocation
page read and write
7AE7000
heap
page read and write
307F000
stack
page read and write
3300000
heap
page read and write
1F7C002CC000
trusted library allocation
page read and write
1AC6E000
stack
page read and write
71380191C000
trusted library allocation
page read and write
45D1000
heap
page read and write
20C05390000
heap
page read and write
6E4000
heap
page read and write
1A6A000
heap
page read and write
1AD1BEC0000
remote allocation
page read and write
865000
heap
page read and write
9C4000
heap
page read and write
9C4000
heap
page read and write
3FCC0355C000
trusted library allocation
page read and write
3FCC035A0000
trusted library allocation
page read and write
36DD000
stack
page read and write
61FC000
stack
page read and write
1AD17AA0000
trusted library allocation
page read and write
2CFE000
stack
page read and write
5111000
heap
page read and write
7E50000
trusted library allocation
page read and write
3FCC02C88000
trusted library allocation
page read and write
7CDE000
stack
page read and write
9C4000
heap
page read and write
20C0C2BE000
heap
page read and write
713800F04000
trusted library allocation
page read and write
E0E000
stack
page read and write
3FCC02420000
trusted library allocation
page read and write
433F000
stack
page read and write
3FCC035A0000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
20C087E3000
heap
page read and write
9C4000
heap
page read and write
20C087EB000
heap
page read and write
4991000
heap
page read and write
F0F000
stack
page read and write
78AF000
stack
page read and write
7138003CC000
trusted library allocation
page read and write
5111000
heap
page read and write
1AD17700000
trusted library section
page readonly
20C08EB0000
unkown
page readonly
3FCC034C9000
trusted library allocation
page read and write
3FCC039C8000
trusted library allocation
page read and write
3FCC0238C000
trusted library allocation
page read and write
4E4E000
stack
page read and write
1D92D000
stack
page read and write
1AD16E00000
heap
page read and write
32BE000
stack
page read and write
800000
heap
page read and write
9B7D1FE000
unkown
page readonly
713801978000
trusted library allocation
page read and write
3FCC02438000
trusted library allocation
page read and write
713800E78000
trusted library allocation
page read and write
34FF000
stack
page read and write
3FCC03138000
trusted library allocation
page read and write
1894000
heap
page read and write
6E4000
heap
page read and write
9C4000
heap
page read and write
7138015EC000
trusted library allocation
page read and write
1AD1BB93000
trusted library allocation
page read and write
9C4000
heap
page read and write
3FCC034FC000
trusted library allocation
page read and write
384E000
stack
page read and write
713801034000
trusted library allocation
page read and write
862000
heap
page read and write
36FE000
stack
page read and write
3FCC03784000
trusted library allocation
page read and write
713801514000
trusted library allocation
page read and write
9B0D7FE000
unkown
page readonly
1D39C000
stack
page read and write
1F7C00298000
trusted library allocation
page read and write
713801778000
trusted library allocation
page read and write
7138014E8000
trusted library allocation
page read and write
3FCC025B0000
trusted library allocation
page read and write
3FCC02828000
trusted library allocation
page read and write
45D1000
heap
page read and write
3FCC03A90000
trusted library allocation
page read and write
9C4000
heap
page read and write
713801B1C000
trusted library allocation
page read and write
3FCC02428000
trusted library allocation
page read and write
3FCC039A0000
trusted library allocation
page read and write
C02000
heap
page read and write
3FCC03864000
trusted library allocation
page read and write
9B1F7FE000
unkown
page readonly
1894000
heap
page read and write
C3E000
stack
page read and write
713801130000
trusted library allocation
page read and write
3FCC02268000
trusted library allocation
page read and write
C50000
heap
page read and write
3CCF000
stack
page read and write
45D1000
heap
page read and write
45D1000
heap
page read and write
460E000
stack
page read and write
4FE000
stack
page read and write
3FCC03944000
trusted library allocation
page read and write
3FCC0239C000
trusted library allocation
page read and write
498F000
stack
page read and write
9C4000
heap
page read and write
20C0C4B0000
trusted library section
page read and write
7138018BC000
trusted library allocation
page read and write
20C0522C000
heap
page read and write
20C08DCC000
heap
page read and write
447F000
stack
page read and write
713801A8C000
trusted library allocation
page read and write
5111000
heap
page read and write
3FCC02828000
trusted library allocation
page read and write
9B037FE000
unkown
page readonly
713801A28000
trusted library allocation
page read and write
20C08B70000
trusted library section
page read and write
20C0C0B0000
trusted library section
page read and write
33C0000
trusted library allocation
page read and write
460E000
stack
page read and write
6E0000
heap
page read and write
45D1000
heap
page read and write
3FCC03CCC000
trusted library allocation
page read and write
3FCC038EC000
trusted library allocation
page read and write
1F7C00254000
trusted library allocation
page read and write
713801A0C000
trusted library allocation
page read and write
713800FC4000
trusted library allocation
page read and write
20C087EF000
heap
page read and write
713800938000
trusted library allocation
page read and write
9C4000
heap
page read and write
20C0525E000
heap
page read and write
7138019B8000
trusted library allocation
page read and write
20C087EA000
heap
page read and write
20C087F8000
heap
page read and write
8D7000
heap
page read and write
20C087F8000
heap
page read and write
713801A6C000
trusted library allocation
page read and write
1F7C002B0000
trusted library allocation
page read and write
1D55E000
stack
page read and write
713801648000
trusted library allocation
page read and write
3830000
heap
page read and write
16F5000
stack
page read and write
140000
unkown
page readonly
1AD16670000
heap
page read and write
74CD000
stack
page read and write
13CE000
stack
page read and write
1AD1BE50000
trusted library allocation
page read and write
1894000
heap
page read and write
9AE000
stack
page read and write
9B0E7FE000
unkown
page readonly
420F000
stack
page read and write
713801A84000
trusted library allocation
page read and write
3FCC03E90000
trusted library allocation
page read and write
BCD000
stack
page read and write
3FCC02EC0000
trusted library allocation
page read and write
BBA000
heap
page read and write
20C05270000
heap
page read and write
713800988000
trusted library allocation
page read and write
713801588000
trusted library allocation
page read and write
6490000
heap
page read and write
3FCC03998000
trusted library allocation
page read and write
7138011CC000
trusted library allocation
page read and write
713801BD4000
trusted library allocation
page read and write
4991000
heap
page read and write
20C08D9D000
heap
page read and write
1D0EF000
stack
page read and write
3FCC02274000
trusted library allocation
page read and write
B87000
heap
page read and write
9B067FE000
unkown
page readonly
7138010D8000
trusted library allocation
page read and write
713801834000
trusted library allocation
page read and write
3FCC039DC000
trusted library allocation
page read and write
6E4000
heap
page read and write
713801668000
trusted library allocation
page read and write
3FCC02360000
trusted library allocation
page read and write
3FCC03974000
trusted library allocation
page read and write
713801BE4000
trusted library allocation
page read and write
A7C000
stack
page read and write
3FCC03334000
trusted library allocation
page read and write
20C087E5000
heap
page read and write
8995000
trusted library allocation
page read and write
9B07FFE000
stack
page read and write
713801AB0000
trusted library allocation
page read and write
3FCC03998000
trusted library allocation
page read and write
713801590000
trusted library allocation
page read and write
713801478000
trusted library allocation
page read and write
45D1000
heap
page read and write
6E4000
heap
page read and write
7A66000
heap
page read and write
71380101C000
trusted library allocation
page read and write
3FCC03510000
trusted library allocation
page read and write
3FCC03D1C000
trusted library allocation
page read and write
3FCC034BC000
trusted library allocation
page read and write
713801268000
trusted library allocation
page read and write
20C087E5000
heap
page read and write
3FCC03904000
trusted library allocation
page read and write
3FCC0394C000
trusted library allocation
page read and write
7138014E4000
trusted library allocation
page read and write
1AD1BD0C000
heap
page read and write
10A9000
unkown
page execute and read and write
71380108C000
trusted library allocation
page read and write
71380120C000
trusted library allocation
page read and write
1CFEE000
stack
page read and write
3FCC034F4000
trusted library allocation
page read and write
3FCC034BC000
trusted library allocation
page read and write
71380160C000
trusted library allocation
page read and write
713801578000
trusted library allocation
page read and write
713801174000
trusted library allocation
page read and write
3FCC024A0000
trusted library allocation
page read and write
7D9D000
stack
page read and write
7138013C0000
trusted library allocation
page read and write
3FCC025B0000
trusted library allocation
page read and write
713801CF8000
trusted library allocation
page read and write
45D1000
heap
page read and write
B50000
direct allocation
page read and write
7E60000
trusted library allocation
page read and write
1283000
unkown
page execute and read and write
E11000
heap
page read and write
3FCC02354000
trusted library allocation
page read and write
131C000
stack
page read and write
9C4000
heap
page read and write
713800F80000
trusted library allocation
page read and write
713801278000
trusted library allocation
page read and write
71380158C000
trusted library allocation
page read and write
7138019E4000
trusted library allocation
page read and write
4991000
heap
page read and write
6E4000
heap
page read and write
713801A2C000
trusted library allocation
page read and write
713801884000
trusted library allocation
page read and write
20C087EA000
heap
page read and write
9C4000
heap
page read and write
865000
heap
page read and write
45D1000
heap
page read and write
7138016A8000
trusted library allocation
page read and write
7A75000
heap
page read and write
1894000
heap
page read and write
3FCC02828000
trusted library allocation
page read and write
8C30000
trusted library allocation
page read and write
49CE000
stack
page read and write
7138002E0000
trusted library allocation
page read and write
45D1000
heap
page read and write
B50000
direct allocation
page read and write
7138002FC000
trusted library allocation
page read and write
7138017E4000
trusted library allocation
page read and write
20C087E5000
heap
page read and write
20C087F8000
heap
page read and write
9C4000
heap
page read and write
B50000
direct allocation
page read and write
1AD1BB40000
trusted library allocation
page read and write
410E000
stack
page read and write
713801B78000
trusted library allocation
page read and write
3FCC03998000
trusted library allocation
page read and write
71380060C000
trusted library allocation
page read and write
9B7C9FD000
stack
page read and write
3FCC0355C000
trusted library allocation
page read and write
20C087F5000
heap
page read and write
153B000
stack
page read and write
3FCC02494000
trusted library allocation
page read and write
35F0000
heap
page readonly
45D1000
heap
page read and write
71380197C000
trusted library allocation
page read and write
BB0000
heap
page read and write
7BA000
heap
page read and write
9C4000
heap
page read and write
879767E000
unkown
page readonly
9C4000
heap
page read and write
3FCC034FC000
trusted library allocation
page read and write
7138017E8000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
3FCC02868000
trusted library allocation
page read and write
FC6000
unkown
page execute and read and write
20C087F8000
heap
page read and write
713801BE0000
trusted library allocation
page read and write
3FCC037E0000
trusted library allocation
page read and write
45D1000
heap
page read and write
3FCC03510000
trusted library allocation
page read and write
7138015A8000
trusted library allocation
page read and write
9B0CFFA000
stack
page read and write
713800F70000
trusted library allocation
page read and write
879897E000
unkown
page readonly
20C087F5000
heap
page read and write
1894000
heap
page read and write
3FCC03EEC000
trusted library allocation
page read and write
4990000
heap
page read and write
1F7C00268000
trusted library allocation
page read and write
40CF000
stack
page read and write
20C0B117000
unclassified section
page read and write
7138019B4000
trusted library allocation
page read and write
71380107C000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
3E3F000
stack
page read and write
5B0000
heap
page read and write
45D1000
heap
page read and write
10D5000
unkown
page execute and read and write
3FCC034E8000
trusted library allocation
page read and write
20C08D33000
heap
page read and write
484F000
stack
page read and write
3FCC03510000
trusted library allocation
page read and write
3459000
heap
page read and write
713801610000
trusted library allocation
page read and write
7A89000
heap
page read and write
20C0C2B6000
heap
page read and write
45C0000
direct allocation
page read and write
45D1000
heap
page read and write
3FCC03CEC000
trusted library allocation
page read and write
20C05269000
heap
page read and write
3FCC02444000
trusted library allocation
page read and write
3FCC03900000
trusted library allocation
page read and write
713801CD8000
trusted library allocation
page read and write
3FCC03990000
trusted library allocation
page read and write
CE0000
heap
page read and write
713801558000
trusted library allocation
page read and write
FC6000
unkown
page execute and read and write
71380143C000
trusted library allocation
page read and write
20C091A0000
heap
page read and write
838000
heap
page read and write
713801494000
trusted library allocation
page read and write
713801534000
trusted library allocation
page read and write
3FCC02B61000
trusted library allocation
page read and write
4FA000
stack
page read and write
3FCC02EC0000
trusted library allocation
page read and write
3FCC035A0000
trusted library allocation
page read and write
20C087EB000
heap
page read and write
20C087F0000
heap
page read and write
20C08D40000
heap
page read and write
33D7000
heap
page read and write
1894000
heap
page read and write
20C087F0000
heap
page read and write
713801258000
trusted library allocation
page read and write
470F000
stack
page read and write
3FCC02828000
trusted library allocation
page read and write
3FCC034E8000
trusted library allocation
page read and write
245B000
stack
page read and write
20C09150000
unkown
page readonly
5A5000
stack
page read and write
3FCC02482000
trusted library allocation
page read and write
9C4000
heap
page read and write
423E000
stack
page read and write
3FCC039A0000
trusted library allocation
page read and write
8798B7E000
unkown
page readonly
7138010A0000
trusted library allocation
page read and write
713801CAC000
trusted library allocation
page read and write
10E3000
unkown
page execute and write copy
9C4000
heap
page read and write
3FCC0337C000
trusted library allocation
page read and write
45D1000
heap
page read and write
45C0000
direct allocation
page read and write
879837E000
unkown
page readonly
7138011F0000
trusted library allocation
page read and write
713801980000
trusted library allocation
page read and write
3FCC03CD8000
trusted library allocation
page read and write
713800958000
trusted library allocation
page read and write
3FCC02C8B000
trusted library allocation
page read and write
713800E34000
trusted library allocation
page read and write
713800954000
trusted library allocation
page read and write
3FCC03B64000
trusted library allocation
page read and write
3FCC034BC000
trusted library allocation
page read and write
10E3000
unkown
page execute and write copy
1AEBD000
stack
page read and write
20C087E5000
heap
page read and write
713801BEC000
trusted library allocation
page read and write
1AD1BC11000
heap
page read and write
713800F84000
trusted library allocation
page read and write
1284000
unkown
page execute and write copy
713801680000
trusted library allocation
page read and write
CC2000
unkown
page execute and read and write
13D0000
direct allocation
page execute and read and write
20C087E5000
heap
page read and write
3FCC02C84000
trusted library allocation
page read and write
20C087E2000
heap
page read and write
713801030000
trusted library allocation
page read and write
709000
unkown
page readonly
45D1000
heap
page read and write
713801988000
trusted library allocation
page read and write
7138009B4000
trusted library allocation
page read and write
73BF000
stack
page read and write
1AD1BC70000
trusted library allocation
page read and write
5111000
heap
page read and write
340B000
heap
page read and write
3FCC0350A000
trusted library allocation
page read and write
7138009D4000
trusted library allocation
page read and write
45D1000
heap
page read and write
1AD1BE70000
trusted library allocation
page read and write
45D1000
heap
page read and write
1F7C002CC000
trusted library allocation
page read and write
713801C88000
trusted library allocation
page read and write
7138012EC000
trusted library allocation
page read and write
1380000
heap
page read and write
9C4000
heap
page read and write
1A5000
unkown
page read and write
31CF000
stack
page read and write
713801748000
trusted library allocation
page read and write
3FCC031CC000
trusted library allocation
page read and write
1A9CE000
stack
page read and write
1AD166AB000
heap
page read and write
1F7C002A8000
trusted library allocation
page read and write
3FCC02868000
trusted library allocation
page read and write
71380040C000
trusted library allocation
page read and write
890000
heap
page read and write
1894000
heap
page read and write
3FCC02868000
trusted library allocation
page read and write
838000
heap
page read and write
3FCC02348000
trusted library allocation
page read and write
76BF000
stack
page read and write
4991000
heap
page read and write
B4C000
stack
page read and write
1160000
heap
page read and write
20C07043000
heap
page read and write
45D1000
heap
page read and write
713800F60000
trusted library allocation
page read and write
6E4000
heap
page read and write
474E000
stack
page read and write
BB6000
heap
page read and write
20C087EA000
heap
page read and write
20C087F8000
heap
page read and write
B0E000
stack
page read and write
7138019D0000
trusted library allocation
page read and write
5111000
heap
page read and write
20C087EA000
heap
page read and write
CC2000
unkown
page execute and read and write
1540000
heap
page read and write
3FCC03E58000
trusted library allocation
page read and write
397D000
stack
page read and write
7D1000
heap
page read and write
1894000
heap
page read and write
20C087EA000
heap
page read and write
7138012F4000
trusted library allocation
page read and write
20C087F5000
heap
page read and write
3FCC035A0000
trusted library allocation
page read and write
45D1000
heap
page read and write
7530000
heap
page execute and read and write
9C4000
heap
page read and write
713801AE8000
trusted library allocation
page read and write
3FCC03512000
trusted library allocation
page read and write
3FCC023C4000
trusted library allocation
page read and write
3FCC02868000
trusted library allocation
page read and write
3FCC038C8000
trusted library allocation
page read and write
3FCC03502000
trusted library allocation
page read and write
7138002FC000
trusted library allocation
page read and write
713801264000
trusted library allocation
page read and write
3FCC03AD4000
trusted library allocation
page read and write
3FCC034CF000
trusted library allocation
page read and write
B50000
direct allocation
page read and write
5720000
direct allocation
page execute and read and write
20C087EB000
heap
page read and write
3FCC0394C000
trusted library allocation
page read and write
20C09217000
unclassified section
page read and write
6E4000
heap
page read and write
71380126C000
trusted library allocation
page read and write
1AD1BAA0000
trusted library allocation
page read and write
3FCC0391C000
trusted library allocation
page read and write
20C087F0000
heap
page read and write
4991000
heap
page read and write
45E0000
heap
page read and write
7138011C4000
trusted library allocation
page read and write
3FCC038EC000
trusted library allocation
page read and write
1AD16F1C000
heap
page read and write
3FCC02828000
trusted library allocation
page read and write
20C087E5000
heap
page read and write
713801050000
trusted library allocation
page read and write
360F000
stack
page read and write
20C05269000
heap
page read and write
B50000
direct allocation
page read and write
9C0000
heap
page read and write
3FCC02C90000
trusted library allocation
page read and write
44CE000
stack
page read and write
20C08E9E000
unkown
page readonly
713800E7C000
trusted library allocation
page read and write
8840000
heap
page read and write
713801C4C000
trusted library allocation
page read and write
71380090C000
trusted library allocation
page read and write
4991000
heap
page read and write
5111000
heap
page read and write
20C087F8000
heap
page read and write
3310000
heap
page read and write
1AD1BB64000
trusted library allocation
page read and write
8A3000
heap
page read and write
383E000
stack
page read and write
3FCC038A0000
trusted library allocation
page read and write
6E4000
heap
page read and write
9B05FFB000
stack
page read and write
713801374000
trusted library allocation
page read and write
10E3000
unkown
page execute and write copy
1860000
heap
page read and write
1AD16F1A000
heap
page read and write
3FCC025B0000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
713801308000
trusted library allocation
page read and write
79E0000
trusted library allocation
page execute and read and write
3FCC0337C000
trusted library allocation
page read and write
7138016F8000
trusted library allocation
page read and write
1AD1662B000
heap
page read and write
713800E4C000
trusted library allocation
page read and write
2F3F000
stack
page read and write
1AD1BB20000
trusted library allocation
page read and write
713801898000
trusted library allocation
page read and write
3FCC0355C000
trusted library allocation
page read and write
4991000
heap
page read and write
1870000
direct allocation
page read and write
384E000
stack
page read and write
9C4000
heap
page read and write
45D1000
heap
page read and write
3FCC022B4000
trusted library allocation
page read and write
20C07A90000
unkown
page read and write
7138008A0000
trusted library allocation
page read and write
5590000
direct allocation
page read and write
36F9000
heap
page read and write
20C0B200000
trusted library section
page read and write
713800820000
trusted library allocation
page read and write
9B06FFE000
stack
page read and write
7DA0000
trusted library allocation
page read and write
7138017B8000
trusted library allocation
page read and write
71380169C000
trusted library allocation
page read and write
20C08D9D000
heap
page read and write
7138008B8000
trusted library allocation
page read and write
9C4000
heap
page read and write
1894000
heap
page read and write
7138019E8000
trusted library allocation
page read and write
B50000
direct allocation
page read and write
713801958000
trusted library allocation
page read and write
1CF8F000
stack
page read and write
3FCC0337C000
trusted library allocation
page read and write
4991000
heap
page read and write
1A88E000
stack
page read and write
398E000
stack
page read and write
713801A64000
trusted library allocation
page read and write
71380098C000
trusted library allocation
page read and write
F7D000
stack
page read and write
9C4000
heap
page read and write
1F7C002B0000
trusted library allocation
page read and write
3FCC0376C000
trusted library allocation
page read and write
45D1000
heap
page read and write
8797B7B000
stack
page read and write
4BF0000
heap
page read and write
1DCF0000
heap
page read and write
713801538000
trusted library allocation
page read and write
4E0E000
stack
page read and write
1A810000
heap
page read and write
9B1A7FE000
unkown
page readonly
3FCC02828000
trusted library allocation
page read and write
3FCC031BC000
trusted library allocation
page read and write
9C4000
heap
page read and write
713801614000
trusted library allocation
page read and write
20C087E5000
heap
page read and write
3FCC024B4000
trusted library allocation
page read and write
7138017A0000
trusted library allocation
page read and write
3FCC037E4000
trusted library allocation
page read and write
3FCC0310C000
trusted library allocation
page read and write
20C05460000
heap
page read and write
20C087E3000
heap
page read and write
9C4000
heap
page read and write
5111000
heap
page read and write
9B0BFFC000
stack
page read and write
9B0A7FE000
unkown
page readonly
71380196C000
trusted library allocation
page read and write
1AD1BC61000
heap
page read and write
40BF000
stack
page read and write
6E4000
heap
page read and write
1870000
direct allocation
page read and write
438E000
stack
page read and write
713801138000
trusted library allocation
page read and write
7138018A0000
trusted library allocation
page read and write
3FCC0380C000
trusted library allocation
page read and write
71380069C000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
7138014F8000
trusted library allocation
page read and write
1F7C00250000
trusted library allocation
page read and write
7138008D8000
trusted library allocation
page read and write
45D1000
heap
page read and write
713800E20000
trusted library allocation
page read and write
4F20000
trusted library allocation
page execute and read and write
1F7C00248000
trusted library allocation
page read and write
3FCC03DA8000
trusted library allocation
page read and write
713801554000
trusted library allocation
page read and write
7138008E4000
trusted library allocation
page read and write
2820000
heap
page read and write
8ED000
heap
page read and write
3FCC02520000
trusted library allocation
page read and write
45D1000
heap
page read and write
20C07AD9000
unkown
page read and write
74E000
stack
page read and write
713800EAC000
trusted library allocation
page read and write
9C4000
heap
page read and write
713801018000
trusted library allocation
page read and write
71380162C000
trusted library allocation
page read and write
BE1000
unkown
page execute and write copy
713801790000
trusted library allocation
page read and write
713800918000
trusted library allocation
page read and write
1F7C00201000
trusted library allocation
page read and write
20C07B00000
unkown
page read and write
3FCC02213000
trusted library allocation
page read and write
4F60000
direct allocation
page execute and read and write
3FCC03512000
trusted library allocation
page read and write
1CF2D000
stack
page read and write
20C05170000
heap
page read and write
3FCC034DC000
trusted library allocation
page read and write
3FCC039A0000
trusted library allocation
page read and write
5111000
heap
page read and write
3FCC022DC000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
10D000
unkown
page read and write
713801B98000
trusted library allocation
page read and write
AAF000
stack
page read and write
C9D000
unkown
page execute and read and write
3FCC024D8000
trusted library allocation
page read and write
9C4000
heap
page read and write
45D1000
heap
page read and write
10D5000
unkown
page execute and read and write
20C087EA000
heap
page read and write
713800EEC000
trusted library allocation
page read and write
3FCC034C8000
trusted library allocation
page read and write
6E4000
heap
page read and write
20C087E3000
heap
page read and write
190000
unkown
page readonly
713801A54000
trusted library allocation
page read and write
1AD16F1A000
heap
page read and write
7138003E4000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
3FCC023E0000
trusted library allocation
page read and write
7A5B000
heap
page read and write
3FCC0332C000
trusted library allocation
page read and write
9C4000
heap
page read and write
71380194C000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
3FCC00801000
trusted library allocation
page read and write
9C4000
heap
page read and write
3FCC03108000
trusted library allocation
page read and write
199E000
stack
page read and write
448F000
stack
page read and write
380F000
stack
page read and write
1AD16E15000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
713801C98000
trusted library allocation
page read and write
4A50000
heap
page read and write
45D1000
heap
page read and write
713800F58000
trusted library allocation
page read and write
9B09FFC000
stack
page read and write
71380137C000
trusted library allocation
page read and write
9C4000
heap
page read and write
870000
heap
page read and write
1A2000
unkown
page write copy
20C087F0000
heap
page read and write
BB0000
heap
page read and write
9C4000
heap
page read and write
20C0B1F3000
unkown
page readonly
10E3000
unkown
page execute and read and write
1894000
heap
page read and write
3FCC03900000
trusted library allocation
page read and write
3FCC03A24000
trusted library allocation
page read and write
713800F18000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
3FCC023EC000
trusted library allocation
page read and write
340E000
stack
page read and write
1CC1F000
stack
page read and write
20C0523B000
heap
page read and write
9C4000
heap
page read and write
20C08EA6000
unkown
page readonly
1AD1BD02000
heap
page read and write
3FCC0394C000
trusted library allocation
page read and write
45D1000
heap
page read and write
3FCC03108000
trusted library allocation
page read and write
1AFFC000
stack
page read and write
5111000
heap
page read and write
7D1E000
stack
page read and write
7138008F8000
trusted library allocation
page read and write
45D1000
heap
page read and write
1AD16729000
heap
page read and write
1DBDE000
stack
page read and write
713800E64000
trusted library allocation
page read and write
1894000
heap
page read and write
3FCC02440000
trusted library allocation
page read and write
20C05265000
heap
page read and write
20C053B0000
trusted library allocation
page read and write
3FCC02520000
trusted library allocation
page read and write
7138012F8000
trusted library allocation
page read and write
E2A000
unkown
page execute and read and write
7138019A0000
trusted library allocation
page read and write
1AD166A2000
heap
page read and write
20C0C2B2000
heap
page read and write
3FCC0376C000
trusted library allocation
page read and write
20C087E5000
heap
page read and write
3FCC039A0000
trusted library allocation
page read and write
4991000
heap
page read and write
713801924000
trusted library allocation
page read and write
20C087F5000
heap
page read and write
1284000
unkown
page execute and write copy
7138012DC000
trusted library allocation
page read and write
190000
unkown
page readonly
394F000
stack
page read and write
757E000
stack
page read and write
49B0000
heap
page read and write
3FCC022EC000
trusted library allocation
page read and write
5001000
trusted library allocation
page read and write
20C087F0000
heap
page read and write
750B000
stack
page read and write
5111000
heap
page read and write
773A000
stack
page read and write
5740000
direct allocation
page execute and read and write
420F000
stack
page read and write
85F000
heap
page read and write
1AE3000
heap
page read and write
190000
unkown
page readonly
3FCC0352C000
trusted library allocation
page read and write
2E8F000
stack
page read and write
49A0000
heap
page read and write
6E4000
heap
page read and write
3FCC02424000
trusted library allocation
page read and write
20C087F0000
heap
page read and write
9B14FFE000
stack
page read and write
20C0523A000
heap
page read and write
713801288000
trusted library allocation
page read and write
9B00FFA000
stack
page read and write
3FCC031E8000
trusted library allocation
page read and write
4C0F000
stack
page read and write
3FCC03E38000
trusted library allocation
page read and write
71380039C000
trusted library allocation
page read and write
3FCC03E94000
trusted library allocation
page read and write
45D1000
heap
page read and write
3FCC02B61000
trusted library allocation
page read and write
9B087FE000
unkown
page readonly
1A4CF000
stack
page read and write
3FCC023F4000
trusted library allocation
page read and write
1436000
heap
page read and write
10CB000
unkown
page execute and read and write
71380125C000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
3FCC03998000
trusted library allocation
page read and write
41FF000
stack
page read and write
20C087F0000
heap
page read and write
713801CD0000
trusted library allocation
page read and write
9C4000
heap
page read and write
3FCC02410000
trusted library allocation
page read and write
912000
heap
page read and write
45D1000
heap
page read and write
381D000
stack
page read and write
9B1C7FE000
unkown
page readonly
713800F98000
trusted library allocation
page read and write
4991000
heap
page read and write
20C0525E000
heap
page read and write
3FCC02604000
trusted library allocation
page read and write
713800FD4000
trusted library allocation
page read and write
8950000
trusted library allocation
page read and write
3FCC0243C000
trusted library allocation
page read and write
87992FE000
stack
page read and write
B50000
direct allocation
page read and write
713801220000
trusted library allocation
page read and write
3FCC0242C000
trusted library allocation
page read and write
3FCC02494000
trusted library allocation
page read and write
3FCC0248C000
trusted library allocation
page read and write
9C4000
heap
page read and write
713801A68000
trusted library allocation
page read and write
5111000
heap
page read and write
9C4000
heap
page read and write
4C4E000
stack
page read and write
293F000
stack
page read and write
9C4000
heap
page read and write
713801040000
trusted library allocation
page read and write
713801060000
trusted library allocation
page read and write
713800F14000
trusted library allocation
page read and write
3FCC038C8000
trusted library allocation
page read and write
3373000
trusted library allocation
page execute and read and write
1894000
heap
page read and write
20C087E3000
heap
page read and write
3FCC038FC000
trusted library allocation
page read and write
7138016AC000
trusted library allocation
page read and write
C9D000
unkown
page execute and read and write
3FCC024A0000
trusted library allocation
page read and write
3FCC02828000
trusted library allocation
page read and write
763A000
stack
page read and write
3D4E000
stack
page read and write
1A2000
unkown
page write copy
45D1000
heap
page read and write
20C08D3C000
heap
page read and write
20C087E3000
heap
page read and write
87982FE000
stack
page read and write
9C4000
heap
page read and write
1AD16570000
heap
page read and write
3FCC0379C000
trusted library allocation
page read and write
713801508000
trusted library allocation
page read and write
9C4000
heap
page read and write
101000
unkown
page read and write
6E4000
heap
page read and write
3FCC034C9000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
713801118000
trusted library allocation
page read and write
7138013D0000
trusted library allocation
page read and write
1AC0F000
stack
page read and write
3ACE000
stack
page read and write
8DB000
heap
page read and write
8930000
heap
page read and write
870000
heap
page read and write
3FCC034DC000
trusted library allocation
page read and write
1AD1BC80000
trusted library allocation
page read and write
3FCC02EC0000
trusted library allocation
page read and write
7B000
unkown
page write copy
2830000
heap
page read and write
7138011A8000
trusted library allocation
page read and write
1AD1BD12000
heap
page read and write
B75000
stack
page read and write
20C087EA000
heap
page read and write
7138011E0000
trusted library allocation
page read and write
713801344000
trusted library allocation
page read and write
3FCC02354000
trusted library allocation
page read and write
6A0000
unkown
page readonly
7138016CC000
trusted library allocation
page read and write
7138018B4000
trusted library allocation
page read and write
7138019A8000
trusted library allocation
page read and write
1F7C00298000
trusted library allocation
page read and write
7138019D8000
trusted library allocation
page read and write
B50000
direct allocation
page read and write
B70000
direct allocation
page read and write
29A000
unkown
page read and write
3FCC025B0000
trusted library allocation
page read and write
7138016F0000
trusted library allocation
page read and write
3FCC02520000
trusted library allocation
page read and write
20C05350000
heap
page readonly
713801AAC000
trusted library allocation
page read and write
3FCC0241C000
trusted library allocation
page read and write
20C087EA000
heap
page read and write
9C4000
heap
page read and write
9C4000
heap
page read and write
7A83000
heap
page read and write
20C087F5000
heap
page read and write
20C08EC5000
unkown
page readonly
713801A24000
trusted library allocation
page read and write
3E8E000
stack
page read and write
7138018D8000
trusted library allocation
page read and write
137F000
stack
page read and write
3FCC034C8000
trusted library allocation
page read and write
5B5000
heap
page read and write
20C087E3000
heap
page read and write
3FCC0379C000
trusted library allocation
page read and write
500E000
stack
page read and write
20C07040000
heap
page read and write
713801154000
trusted library allocation
page read and write
20C087EB000
heap
page read and write
9C4000
heap
page read and write
3FCC03998000
trusted library allocation
page read and write
1AD1665C000
heap
page read and write
3FCC024B4000
trusted library allocation
page read and write
1870000
direct allocation
page read and write
3FCC03A30000
trusted library allocation
page read and write
9B0AFFD000
stack
page read and write
1CB1E000
stack
page read and write
1C5E000
stack
page read and write
3FCC023C4000
trusted library allocation
page read and write
7138015F0000
trusted library allocation
page read and write
1D41E000
stack
page read and write
6001000
trusted library allocation
page read and write
20C08FC0000
unkown
page readonly
20C08C90000
trusted library section
page read and write
770000
heap
page read and write
3FCC02EC0000
trusted library allocation
page read and write
3FCC034C8000
trusted library allocation
page read and write
75BF000
stack
page read and write
713801774000
trusted library allocation
page read and write
127E000
stack
page read and write
9C4000
heap
page read and write
45D1000
heap
page read and write
1AD16F1B000
heap
page read and write
87F000
heap
page read and write
7138003B4000
trusted library allocation
page read and write
713800F44000
trusted library allocation
page read and write
3FCC0386C000
trusted library allocation
page read and write
6E4000
heap
page read and write
20C0523C000
heap
page read and write
713801C60000
trusted library allocation
page read and write
865000
heap
page read and write
3FCC035A0000
trusted library allocation
page read and write
3FCC023F8000
trusted library allocation
page read and write
713801C10000
trusted library allocation
page read and write
713801490000
trusted library allocation
page read and write
3FCC0376C000
trusted library allocation
page read and write
3FCC03B64000
trusted library allocation
page read and write
3FCC038E4000
trusted library allocation
page read and write
3FCC03984000
trusted library allocation
page read and write
F94000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
9C4000
heap
page read and write
9B12FFE000
stack
page read and write
380F000
stack
page read and write
45D1000
heap
page read and write
713801A38000
trusted library allocation
page read and write
713800248000
trusted library allocation
page read and write
3FCC039A0000
trusted library allocation
page read and write
6E4000
heap
page read and write
1AD1BD12000
heap
page read and write
20C087F5000
heap
page read and write
4991000
heap
page read and write
3FCC039B0000
trusted library allocation
page read and write
4991000
heap
page read and write
713801684000
trusted library allocation
page read and write
1F7C00300000
trusted library allocation
page read and write
713801BA4000
trusted library allocation
page read and write
71380092C000
trusted library allocation
page read and write
20C087EB000
heap
page read and write
1AD1BB90000
trusted library allocation
page read and write
4BE0000
heap
page read and write
3FCC02868000
trusted library allocation
page read and write
3FCC034EB000
trusted library allocation
page read and write
3FCC03108000
trusted library allocation
page read and write
713801AA0000
trusted library allocation
page read and write
7138011DC000
trusted library allocation
page read and write
20C08E83000
unkown
page readonly
20C087F8000
heap
page read and write
7AB9000
heap
page read and write
713800FB4000
trusted library allocation
page read and write
9B7D9F7000
stack
page read and write
713801B54000
trusted library allocation
page read and write
713801C74000
trusted library allocation
page read and write
6E4000
heap
page read and write
1894000
heap
page read and write
1870000
direct allocation
page read and write
1D65F000
stack
page read and write
3FCC039B0000
trusted library allocation
page read and write
9B7E9F9000
stack
page read and write
45D1000
heap
page read and write
4ECE000
stack
page read and write
3FCC03104000
trusted library allocation
page read and write
9B207FE000
unkown
page readonly
713801820000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
20C087E5000
heap
page read and write
3FCC02868000
trusted library allocation
page read and write
20C087E5000
heap
page read and write
713801920000
trusted library allocation
page read and write
7138016DC000
trusted library allocation
page read and write
20C087E5000
heap
page read and write
2A7E000
stack
page read and write
1F7C00298000
trusted library allocation
page read and write
2BBE000
stack
page read and write
4A9E000
stack
page read and write
20C087F0000
heap
page read and write
20C05450000
trusted library section
page readonly
45D1000
heap
page read and write
3FCC038FC000
trusted library allocation
page read and write
2FF8000
stack
page read and write
3FCC034FF000
trusted library allocation
page read and write
71380161C000
trusted library allocation
page read and write
CE5000
heap
page read and write
10D6000
heap
page read and write
713801184000
trusted library allocation
page read and write
7138013D4000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
3FCC03ED8000
trusted library allocation
page read and write
BD0000
direct allocation
page execute and read and write
713801B18000
trusted library allocation
page read and write
3FCC03510000
trusted library allocation
page read and write
3FCC03340000
trusted library allocation
page read and write
7138012F0000
trusted library allocation
page read and write
1D8DF000
stack
page read and write
713801630000
trusted library allocation
page read and write
9C4000
heap
page read and write
3FCC03A0C000
trusted library allocation
page read and write
20C087E5000
heap
page read and write
424E000
stack
page read and write
1AD1BCB1000
heap
page read and write
20C087F5000
heap
page read and write
6E4000
heap
page read and write
713800950000
trusted library allocation
page read and write
B50000
direct allocation
page read and write
330F000
stack
page read and write
7138014A4000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
20C087F0000
heap
page read and write
606B000
trusted library allocation
page read and write
20C05216000
heap
page read and write
3FCC033C4000
trusted library allocation
page read and write
3FCC03650000
trusted library allocation
page read and write
85F000
heap
page read and write
71380165C000
trusted library allocation
page read and write
1AD1BB00000
trusted library allocation
page read and write
9B0B7FE000
unkown
page readonly
4F5000
stack
page read and write
1030000
heap
page read and write
20C087F0000
heap
page read and write
713801B20000
trusted library allocation
page read and write
7DF0000
trusted library allocation
page read and write
9B16FFC000
stack
page read and write
20C08EC0000
unkown
page readonly
3507000
heap
page read and write
3FCC02C89000
trusted library allocation
page read and write
1AD165A0000
trusted library allocation
page read and write
77EE000
stack
page read and write
3FCC03CD8000
trusted library allocation
page read and write
1DF2E000
stack
page read and write
3374000
trusted library allocation
page read and write
3FCC0310C000
trusted library allocation
page read and write
713801894000
trusted library allocation
page read and write
6F0000
unkown
page readonly
3FCC034DC000
trusted library allocation
page read and write
20C087E3000
heap
page read and write
7138018FC000
trusted library allocation
page read and write
4FCF000
stack
page read and write
1AD17440000
trusted library allocation
page read and write
9C4000
heap
page read and write
713801454000
trusted library allocation
page read and write
3FCC028FB000
trusted library allocation
page read and write
1894000
heap
page read and write
4991000
heap
page read and write
3FCC03E3C000
trusted library allocation
page read and write
CD0000
heap
page read and write
80C000
heap
page read and write
3FCC02520000
trusted library allocation
page read and write
1AEFD000
stack
page read and write
3FCC035A0000
trusted library allocation
page read and write
9C4000
heap
page read and write
713801378000
trusted library allocation
page read and write
339A000
trusted library allocation
page execute and read and write
4BC0000
direct allocation
page execute and read and write
1DCF2000
heap
page read and write
713801A7C000
trusted library allocation
page read and write
4BEE000
stack
page read and write
20C08DF5000
heap
page read and write
713801954000
trusted library allocation
page read and write
3FCC03D3C000
trusted library allocation
page read and write
3FCC034C8000
trusted library allocation
page read and write
20C087F0000
heap
page read and write
20C087EA000
heap
page read and write
9B1CFFA000
stack
page read and write
CC2000
unkown
page execute and read and write
713800964000
trusted library allocation
page read and write
1894000
heap
page read and write
20C0C314000
heap
page read and write
9B08FFD000
stack
page read and write
5111000
heap
page read and write
713801794000
trusted library allocation
page read and write
713801574000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
1AD16F1C000
heap
page read and write
3FCC034CC000
trusted library allocation
page read and write
7138009E4000
trusted library allocation
page read and write
45D1000
heap
page read and write
7E30000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
1CD4E000
stack
page read and write
424E000
stack
page read and write
8BEB000
stack
page read and write
1A5E000
stack
page read and write
713800248000
trusted library allocation
page read and write
9C4000
heap
page read and write
3FCC02EC0000
trusted library allocation
page read and write
3FCC03868000
trusted library allocation
page read and write
3FCC03864000
trusted library allocation
page read and write
4C00000
direct allocation
page execute and read and write
1AD1BB26000
trusted library allocation
page read and write
9C4000
heap
page read and write
1894000
heap
page read and write
10E4000
unkown
page execute and write copy
20C087E5000
heap
page read and write
3FCC00401000
trusted library allocation
page read and write
20C08E60000
unkown
page readonly
10A9000
unkown
page execute and read and write
333E000
stack
page read and write
20C08D91000
heap
page read and write
9B10FFC000
stack
page read and write
4F50000
direct allocation
page execute and read and write
20C087EB000
heap
page read and write
713801074000
trusted library allocation
page read and write
713801C8C000
trusted library allocation
page read and write
7138002FC000
trusted library allocation
page read and write
3FCC0358C000
trusted library allocation
page read and write
6E4000
heap
page read and write
3FCC0358C000
trusted library allocation
page read and write
32FF000
stack
page read and write
3FCC03108000
trusted library allocation
page read and write
3FCC034BC000
trusted library allocation
page read and write
CEC000
stack
page read and write
7138015E8000
trusted library allocation
page read and write
75FE000
stack
page read and write
3FCC02C84000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
713801728000
trusted library allocation
page read and write
10D5000
unkown
page execute and read and write
7138008E8000
trusted library allocation
page read and write
3FCC024D8000
trusted library allocation
page read and write
713801BC0000
trusted library allocation
page read and write
713801854000
trusted library allocation
page read and write
9C4000
heap
page read and write
7138018A4000
trusted library allocation
page read and write
11F0000
heap
page read and write
3FCC0380C000
trusted library allocation
page read and write
45D1000
heap
page read and write
3FCC02B95000
trusted library allocation
page read and write
58B800238000
direct allocation
page read and write
5111000
heap
page read and write
713800EC0000
trusted library allocation
page read and write
20C087F5000
heap
page read and write
3FCC03104000
trusted library allocation
page read and write
713801858000
trusted library allocation
page read and write
2F8F000
stack
page read and write
3FCC034DC000
trusted library allocation
page read and write
9B13FFB000
stack
page read and write
3FCC0394C000
trusted library allocation
page read and write
838000
heap
page read and write
3FCC038D4000
trusted library allocation
page read and write
370F000
stack
page read and write
9C4000
heap
page read and write
713801230000
trusted library allocation
page read and write
3500000
heap
page read and write
3FCC023E4000
trusted library allocation
page read and write
3FCC0223C000
trusted library allocation
page read and write
7138010D4000
trusted library allocation
page read and write
4F50000
direct allocation
page execute and read and write
7138015D4000
trusted library allocation
page read and write
713801298000
trusted library allocation
page read and write
713801A9C000
trusted library allocation
page read and write
1AD1D000000
heap
page read and write
3FCC031AC000
trusted library allocation
page read and write
20C0520F000
heap
page read and write
1106000
heap
page read and write
713801688000
trusted library allocation
page read and write
20C087F0000
heap
page read and write
3FCC034DC000
trusted library allocation
page read and write
45C0000
direct allocation
page read and write
7138018E4000
trusted library allocation
page read and write
7138010B4000
trusted library allocation
page read and write
3FCC02604000
trusted library allocation
page read and write
132000
unkown
page read and write
7A3B000
heap
page read and write
3FCC02604000
trusted library allocation
page read and write
340E000
heap
page read and write
6A0000
unkown
page readonly
3FCC038C8000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
7138016D0000
trusted library allocation
page read and write
20C087F5000
heap
page read and write
3FCE000
stack
page read and write
1AD1BB10000
trusted library allocation
page read and write
DF0000
heap
page read and write
7138008FC000
trusted library allocation
page read and write
713801880000
trusted library allocation
page read and write
3FCC02C84000
trusted library allocation
page read and write
713801C9C000
trusted library allocation
page read and write
1038000
heap
page read and write
713801850000
trusted library allocation
page read and write
7138014A8000
trusted library allocation
page read and write
6E000
unkown
page readonly
705000
unkown
page read and write
3FCC03914000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
3FCC03500000
trusted library allocation
page read and write
1284000
unkown
page execute and write copy
180D000
stack
page read and write
45C0000
direct allocation
page read and write
45D1000
heap
page read and write
4B0E000
stack
page read and write
3FCC02EC0000
trusted library allocation
page read and write
3FCC02324000
trusted library allocation
page read and write
7138008C8000
trusted library allocation
page read and write
9C4000
heap
page read and write
1A98F000
stack
page read and write
20C087F5000
heap
page read and write
2DFF000
stack
page read and write
8797D7E000
unkown
page readonly
9B1D7FE000
unkown
page readonly
3FCC02854000
trusted library allocation
page read and write
3FCC037B8000
trusted library allocation
page read and write
20C087EB000
heap
page read and write
9B137FE000
unkown
page readonly
713801B84000
trusted library allocation
page read and write
3FCC02828000
trusted library allocation
page read and write
5111000
heap
page read and write
713801484000
trusted library allocation
page read and write
713801188000
trusted library allocation
page read and write
9B1B7FE000
unkown
page readonly
6E4000
heap
page read and write
3FCC0396C000
trusted library allocation
page read and write
713801BA8000
trusted library allocation
page read and write
85D000
heap
page read and write
45CF000
stack
page read and write
3FCC033C4000
trusted library allocation
page read and write
20C087E5000
heap
page read and write
20C087F0000
heap
page read and write
1A9000
unkown
page readonly
20C087E5000
heap
page read and write
907000
heap
page read and write
3FCC02EC0000
trusted library allocation
page read and write
1894000
heap
page read and write
3FCC02828000
trusted library allocation
page read and write
320E000
stack
page read and write
20C087EA000
heap
page read and write
3FCC03544000
trusted library allocation
page read and write
393F000
stack
page read and write
9B769F5000
stack
page read and write
45D1000
heap
page read and write
20C0B100000
unkown
page readonly
713801144000
trusted library allocation
page read and write
713800984000
trusted library allocation
page read and write
1AD16666000
heap
page read and write
1F7C002A8000
trusted library allocation
page read and write
3FCC03D38000
trusted library allocation
page read and write
7E10000
trusted library allocation
page read and write
865000
heap
page read and write
1870000
direct allocation
page read and write
10E4000
heap
page read and write
20C087F8000
heap
page read and write
713801B50000
trusted library allocation
page read and write
9B197FE000
unkown
page readonly
713801020000
trusted library allocation
page read and write
1AD1BC2E000
heap
page read and write
3FCC0337C000
trusted library allocation
page read and write
3FCC03960000
trusted library allocation
page read and write
45D1000
heap
page read and write
9B17FFB000
stack
page read and write
713800830000
trusted library allocation
page read and write
9B0000
heap
page read and write
3FCC024D8000
trusted library allocation
page read and write
9C4000
heap
page read and write
1CDED000
stack
page read and write
1D7DE000
stack
page read and write
7138012D0000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
3FCC025B0000
trusted library allocation
page read and write
45F0000
heap
page read and write
20C0B7F0000
trusted library allocation
page read and write
7138010C0000
trusted library allocation
page read and write
713801844000
trusted library allocation
page read and write
C91000
unkown
page execute and read and write
3FCC0371C000
trusted library allocation
page read and write
87978FF000
stack
page read and write
1A4000
unkown
page write copy
5111000
heap
page read and write
713801930000
trusted library allocation
page read and write
3CFF000
stack
page read and write
6E4000
heap
page read and write
3390000
trusted library allocation
page read and write
1AACF000
stack
page read and write
20C0B1B7000
unclassified section
page read and write
7DC0000
trusted library allocation
page read and write
7B11000
heap
page read and write
45D1000
heap
page read and write
713801358000
trusted library allocation
page read and write
9C4000
heap
page read and write
20C05261000
heap
page read and write
20C08D31000
heap
page read and write
3FBE000
stack
page read and write
1AC9000
heap
page read and write
3FCC024B4000
trusted library allocation
page read and write
9B047FE000
unkown
page readonly
3B8F000
stack
page read and write
7138015B4000
trusted library allocation
page read and write
3FCC032F8000
trusted library allocation
page read and write
3FCC025B0000
trusted library allocation
page read and write
45C0000
direct allocation
page read and write
3FCC0346C000
trusted library allocation
page read and write
3FCC033C4000
trusted library allocation
page read and write
7138013BC000
trusted library allocation
page read and write
14C0000
heap
page read and write
7138009C0000
trusted library allocation
page read and write
1870000
direct allocation
page read and write
20C087E5000
heap
page read and write
1894000
heap
page read and write
3FCC03A78000
trusted library allocation
page read and write
1AD16F5D000
heap
page read and write
3FCC03CDC000
trusted library allocation
page read and write
3FCC03A12000
trusted library allocation
page read and write
71380140C000
trusted library allocation
page read and write
3FCC03E7C000
trusted library allocation
page read and write
1894000
heap
page read and write
4991000
heap
page read and write
20C087F5000
heap
page read and write
879757E000
stack
page read and write
71380154C000
trusted library allocation
page read and write
1870000
direct allocation
page read and write
1150000
heap
page read and write
7138018EC000
trusted library allocation
page read and write
1AD1BB27000
trusted library allocation
page read and write
7138012C0000
trusted library allocation
page read and write
7FA000
heap
page read and write
786E000
stack
page read and write
2837000
heap
page read and write
1D25E000
stack
page read and write
434F000
stack
page read and write
7138017C8000
trusted library allocation
page read and write
3FCC035A0000
trusted library allocation
page read and write
45D1000
heap
page read and write
7138010E4000
trusted library allocation
page read and write
1AD1668A000
heap
page read and write
3FCC03A88000
trusted library allocation
page read and write
713801584000
trusted library allocation
page read and write
3FCC03334000
trusted library allocation
page read and write
3FCC03512000
trusted library allocation
page read and write
9C4000
heap
page read and write
6CE000
stack
page read and write
190000
unkown
page readonly
C91000
unkown
page execute and read and write
3ACE000
stack
page read and write
30BE000
stack
page read and write
4D8E000
stack
page read and write
1F7C002CC000
trusted library allocation
page read and write
3FCC03A24000
trusted library allocation
page read and write
713801320000
trusted library allocation
page read and write
56E0000
direct allocation
page execute and read and write
8940000
trusted library allocation
page execute and read and write
2D8F000
stack
page read and write
71380150C000
trusted library allocation
page read and write
7BE000
heap
page read and write
1DA6D000
stack
page read and write
45D1000
heap
page read and write
3FCC02EC0000
trusted library allocation
page read and write
71380177C000
trusted library allocation
page read and write
713801CDC000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
2A3F000
stack
page read and write
20C087F0000
heap
page read and write
713800EF0000
trusted library allocation
page read and write
13F0000
heap
page read and write
3CE0000
heap
page read and write
1AD1BCC2000
heap
page read and write
3D0F000
stack
page read and write
713801530000
trusted library allocation
page read and write
20C087EA000
heap
page read and write
45D1000
heap
page read and write
3FCC038D4000
trusted library allocation
page read and write
1A9000
unkown
page readonly
20C087E5000
heap
page read and write
3FCC025E8000
trusted library allocation
page read and write
71380106C000
trusted library allocation
page read and write
1DA2E000
stack
page read and write
BE0000
unkown
page read and write
10E4000
unkown
page execute and write copy
45BF000
stack
page read and write
713801108000
trusted library allocation
page read and write
3FCC038F4000
trusted library allocation
page read and write
BE1000
unkown
page execute and write copy
1AD165B0000
trusted library section
page read and write
1F7C00264000
trusted library allocation
page read and write
1AD1BB50000
trusted library allocation
page read and write
709000
unkown
page readonly
7A79000
heap
page read and write
3FCC0391C000
trusted library allocation
page read and write
45D1000
heap
page read and write
6E4000
heap
page read and write
7138015C4000
trusted library allocation
page read and write
6E4000
heap
page read and write
1AD16E02000
heap
page read and write
20C0526C000
heap
page read and write
713801A4C000
trusted library allocation
page read and write
3FCC03A9C000
trusted library allocation
page read and write
37DD000
stack
page read and write
3FCC022FC000
trusted library allocation
page read and write
3A7F000
stack
page read and write
45D1000
heap
page read and write
713801354000
trusted library allocation
page read and write
6E4000
heap
page read and write
7AC2000
heap
page read and write
3FCC03A0C000
trusted library allocation
page read and write
20C087F0000
heap
page read and write
3BCF000
stack
page read and write
1F7C002C0000
trusted library allocation
page read and write
45D1000
heap
page read and write
3FCC0337C000
trusted library allocation
page read and write
7138014B4000
trusted library allocation
page read and write
71380121C000
trusted library allocation
page read and write
20C087E3000
heap
page read and write
1AD16713000
heap
page read and write
20C087F8000
heap
page read and write
337D000
trusted library allocation
page execute and read and write
3FCC038AC000
trusted library allocation
page read and write
9C4000
heap
page read and write
713801914000
trusted library allocation
page read and write
3FCC039E8000
trusted library allocation
page read and write
3FCC02520000
trusted library allocation
page read and write
820000
heap
page read and write
140000
unkown
page readonly
3FCC024D8000
trusted library allocation
page read and write
6E4000
heap
page read and write
9B04FFD000
stack
page read and write
368F000
stack
page read and write
9C4000
heap
page read and write
4A60000
direct allocation
page read and write
3FCC039A0000
trusted library allocation
page read and write
5111000
heap
page read and write
3BBF000
stack
page read and write
71380111C000
trusted library allocation
page read and write
45D1000
heap
page read and write
3FCC03D04000
trusted library allocation
page read and write
B50000
direct allocation
page read and write
BA0000
heap
page read and write
45D1000
heap
page read and write
3FCC0394C000
trusted library allocation
page read and write
45D1000
heap
page read and write
3845000
heap
page read and write
10E3000
unkown
page execute and read and write
40FE000
stack
page read and write
4991000
heap
page read and write
3FCC02414000
trusted library allocation
page read and write
7138013E8000
trusted library allocation
page read and write
713800E60000
trusted library allocation
page read and write
7138010C4000
trusted library allocation
page read and write
45D1000
heap
page read and write
20C08DA2000
heap
page read and write
9C4000
heap
page read and write
713801070000
trusted library allocation
page read and write
813000
heap
page read and write
E3E000
unkown
page execute and read and write
14E0000
heap
page read and write
4991000
heap
page read and write
7138017E0000
trusted library allocation
page read and write
8D9000
heap
page read and write
9B0F7FE000
unkown
page readonly
713800F38000
trusted library allocation
page read and write
30CE000
stack
page read and write
7535000
heap
page execute and read and write
391C000
stack
page read and write
6E4000
heap
page read and write
9B7C1FE000
unkown
page readonly
3FCC033C4000
trusted library allocation
page read and write
9C4000
heap
page read and write
3FCC034C8000
trusted library allocation
page read and write
3FCC00C01000
trusted library allocation
page read and write
1FE000
stack
page read and write
7138014E0000
trusted library allocation
page read and write
45D1000
heap
page read and write
3FCC03100000
trusted library allocation
page read and write
3FCC0337C000
trusted library allocation
page read and write
20C087EA000
heap
page read and write
1894000
heap
page read and write
713800E30000
trusted library allocation
page read and write
713801768000
trusted library allocation
page read and write
1870000
direct allocation
page read and write
3FCC03998000
trusted library allocation
page read and write
6E000
unkown
page readonly
1B010000
heap
page read and write
398E000
stack
page read and write
1F7C002EC000
trusted library allocation
page read and write
4991000
heap
page read and write
782E000
stack
page read and write
4991000
heap
page read and write
3FCC03904000
trusted library allocation
page read and write
20C08DDD000
heap
page read and write
3FCC02C84000
trusted library allocation
page read and write
2FFD000
stack
page read and write
BE0000
unkown
page read and write
5111000
heap
page read and write
3FCC034DC000
trusted library allocation
page read and write
1DB6C000
stack
page read and write
20C087F8000
heap
page read and write
5111000
heap
page read and write
713800E5C000
trusted library allocation
page read and write
7138009B0000
trusted library allocation
page read and write
9C4000
heap
page read and write
20C087EE000
heap
page read and write
3FCC023B8000
trusted library allocation
page read and write
1AD17730000
trusted library section
page readonly
713801738000
trusted library allocation
page read and write
364F000
stack
page read and write
3FCC0391C000
trusted library allocation
page read and write
713801540000
trusted library allocation
page read and write
3FCC025B0000
trusted library allocation
page read and write
3FCC02EC0000
trusted library allocation
page read and write
4A40000
heap
page read and write
1D79E000
stack
page read and write
6E4000
heap
page read and write
3A8F000
stack
page read and write
9C4000
heap
page read and write
5111000
heap
page read and write
BE0000
unkown
page read and write
FC6000
unkown
page execute and read and write
3FCC03100000
trusted library allocation
page read and write
1CB000
stack
page read and write
20C087F8000
heap
page read and write
1A2000
unkown
page read and write
4991000
heap
page read and write
3FCC0386C000
trusted library allocation
page read and write
348E000
stack
page read and write
3FCC034FC000
trusted library allocation
page read and write
B7E000
stack
page read and write
1F7C002D0000
trusted library allocation
page read and write
7138017D4000
trusted library allocation
page read and write
3FCC03284000
trusted library allocation
page read and write
1AD17740000
trusted library section
page readonly
713801878000
trusted library allocation
page read and write
713801D08000
trusted library allocation
page read and write
3419000
heap
page read and write
713801BCC000
trusted library allocation
page read and write
3389000
trusted library allocation
page read and write
20C09140000
unkown
page readonly
20C08E85000
unkown
page readonly
1894000
heap
page read and write
45D1000
heap
page read and write
45D1000
heap
page read and write
713801430000
trusted library allocation
page read and write
9C4000
heap
page read and write
713801428000
trusted library allocation
page read and write
1D15E000
stack
page read and write
58D000
stack
page read and write
9C4000
heap
page read and write
3FCC038E0000
trusted library allocation
page read and write
10F7000
heap
page read and write
3FCC025E8000
trusted library allocation
page read and write
3FCC03884000
trusted library allocation
page read and write
1AD16F00000
heap
page read and write
7138015AC000
trusted library allocation
page read and write
350F000
stack
page read and write
37FF000
stack
page read and write
20C087F5000
heap
page read and write
6E4000
heap
page read and write
45D1000
heap
page read and write
71380147C000
trusted library allocation
page read and write
3C0E000
stack
page read and write
1A2000
unkown
page write copy
1890000
heap
page read and write
5111000
heap
page read and write
20C09253000
heap
page read and write
20C087F5000
heap
page read and write
45D1000
heap
page read and write
713801594000
trusted library allocation
page read and write
1870000
direct allocation
page read and write
3FCC0389C000
trusted library allocation
page read and write
713801904000
trusted library allocation
page read and write
45D1000
heap
page read and write
713801998000
trusted library allocation
page read and write
3FCC02C84000
trusted library allocation
page read and write
4F4F000
stack
page read and write
1A60000
heap
page read and write
20C087F8000
heap
page read and write
45D1000
heap
page read and write
140000
unkown
page readonly
5111000
heap
page read and write
20C087F8000
heap
page read and write
190000
heap
page read and write
1439000
heap
page read and write
1B000000
heap
page read and write
8890000
trusted library allocation
page read and write
27DE000
stack
page read and write
4BEE000
heap
page read and write
3FCC0352C000
trusted library allocation
page read and write
3FCC028F8000
trusted library allocation
page read and write
713801A98000
trusted library allocation
page read and write
10EE000
heap
page read and write
8797FFE000
stack
page read and write
76FD000
stack
page read and write
E2A000
unkown
page execute and read and write
5111000
heap
page read and write
3820000
heap
page read and write
3FCC02C88000
trusted library allocation
page read and write
6E4000
heap
page read and write
892E000
stack
page read and write
3FCC024A4000
trusted library allocation
page read and write
4F1F000
stack
page read and write
3FCC03544000
trusted library allocation
page read and write
20C05370000
heap
page read and write
20C087EB000
heap
page read and write
DFA000
heap
page read and write
71380100C000
trusted library allocation
page read and write
138E000
stack
page read and write
4991000
heap
page read and write
81E000
heap
page read and write
6E4000
heap
page read and write
3FCC034FC000
trusted library allocation
page read and write
3FCC03E78000
trusted library allocation
page read and write
7C49000
trusted library allocation
page read and write
9C4000
heap
page read and write
713801B64000
trusted library allocation
page read and write
1AD1BB60000
trusted library allocation
page read and write
3FCC02828000
trusted library allocation
page read and write
4991000
heap
page read and write
3C30000
heap
page read and write
3FCC0248E000
trusted library allocation
page read and write
1AD16DF0000
trusted library allocation
page read and write
713801838000
trusted library allocation
page read and write
3FCC03104000
trusted library allocation
page read and write
1F7C002C0000
trusted library allocation
page read and write
3FCC03510000
trusted library allocation
page read and write
20C087E3000
heap
page read and write
3FCC03108000
trusted library allocation
page read and write
713800F54000
trusted library allocation
page read and write
713801B08000
trusted library allocation
page read and write
9C4000
heap
page read and write
1AB3000
heap
page read and write
7B000
unkown
page write copy
9C4000
heap
page read and write
3FCC024B4000
trusted library allocation
page read and write
713801C30000
trusted library allocation
page read and write
1F7C00298000
trusted library allocation
page read and write
636C000
stack
page read and write
869000
heap
page read and write
3FCC03B64000
trusted library allocation
page read and write
20C087E3000
heap
page read and write
33A2000
trusted library allocation
page read and write
5111000
heap
page read and write
3FCC02828000
trusted library allocation
page read and write
7138016E0000
trusted library allocation
page read and write
3FCC03CD8000
trusted library allocation
page read and write
1370000
heap
page read and write
1155000
heap
page read and write
9C4000
heap
page read and write
45D1000
heap
page read and write
20C087F2000
heap
page read and write
45D1000
heap
page read and write
3FCC0352C000
trusted library allocation
page read and write
9B177FE000
unkown
page readonly
3FCC03A30000
trusted library allocation
page read and write
5111000
heap
page read and write
3FCC03CEC000
trusted library allocation
page read and write
9C4000
heap
page read and write
4991000
heap
page read and write
3FCC023C4000
trusted library allocation
page read and write
20C087F5000
heap
page read and write
1AD1BC21000
heap
page read and write
20C087EA000
heap
page read and write
1AD1BCBC000
heap
page read and write
4991000
heap
page read and write
3A7D000
stack
page read and write
2B7F000
stack
page read and write
7138014CC000
trusted library allocation
page read and write
7138014C8000
trusted library allocation
page read and write
2FBC000
stack
page read and write
1AD1BCD3000
heap
page read and write
7C40000
trusted library allocation
page read and write
55CE000
stack
page read and write
3FCC034D1000
trusted library allocation
page read and write
1894000
heap
page read and write
3FCC03104000
trusted library allocation
page read and write
7138018D4000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
713801338000
trusted library allocation
page read and write
9C4000
heap
page read and write
5111000
heap
page read and write
4991000
heap
page read and write
3FCC03110000
trusted library allocation
page read and write
5111000
heap
page read and write
45D1000
heap
page read and write
1087000
heap
page read and write
2550000
heap
page read and write
3FCC02360000
trusted library allocation
page read and write
713801380000
trusted library allocation
page read and write
45D1000
heap
page read and write
33E8000
heap
page read and write
3FCC02401000
trusted library allocation
page read and write
45D1000
heap
page read and write
20C087F0000
heap
page read and write
3840000
heap
page read and write
530000
heap
page read and write
3FCC03890000
trusted library allocation
page read and write
3FCC03C9C000
trusted library allocation
page read and write
45D1000
heap
page read and write
71380139C000
trusted library allocation
page read and write
7A94000
heap
page read and write
6E4000
heap
page read and write
3BCE000
stack
page read and write
78B0000
heap
page read and write
6E4000
heap
page read and write
3FCC038EC000
trusted library allocation
page read and write
7138014AC000
trusted library allocation
page read and write
7138010F8000
trusted library allocation
page read and write
3FCC025E8000
trusted library allocation
page read and write
1894000
heap
page read and write
20C087EA000
heap
page read and write
1894000
heap
page read and write
3E4F000
stack
page read and write
9B19FFE000
stack
page read and write
45D1000
heap
page read and write
3FCC03D10000
trusted library allocation
page read and write
9B1EFFC000
stack
page read and write
3FCC038CC000
trusted library allocation
page read and write
20C0BCE0000
trusted library section
page read and write
20C0B1F0000
unkown
page readonly
7138018CC000
trusted library allocation
page read and write
713800920000
trusted library allocation
page read and write
3FCC03E68000
trusted library allocation
page read and write
7E00000
trusted library allocation
page read and write
9B227FE000
unkown
page readonly
3FCC024A0000
trusted library allocation
page read and write
1F7C00220000
trusted library allocation
page read and write
380E000
stack
page read and write
1D100000
heap
page read and write
7138011EC000
trusted library allocation
page read and write
713801078000
trusted library allocation
page read and write
3FCC03CCC000
trusted library allocation
page read and write
1D29D000
stack
page read and write
3FCC034DC000
trusted library allocation
page read and write
1CD0F000
stack
page read and write
3FCC034BC000
trusted library allocation
page read and write
3FCC03104000
trusted library allocation
page read and write
3FCC02494000
trusted library allocation
page read and write
713800FD8000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
20C087F8000
heap
page read and write
3FCC00A01000
trusted library allocation
page read and write
3380000
trusted library allocation
page read and write
1F7C002E0000
trusted library allocation
page read and write
20C08DCD000
heap
page read and write
3FCC0394C000
trusted library allocation
page read and write
56F0000
direct allocation
page execute and read and write
71380142C000
trusted library allocation
page read and write
7A52000
heap
page read and write
1AD1BB22000
trusted library allocation
page read and write
9B7B1FE000
unkown
page readonly
470F000
stack
page read and write
45C0000
direct allocation
page read and write
36BF000
stack
page read and write
7138008F4000
trusted library allocation
page read and write
1DE2E000
stack
page read and write
713800FA4000
trusted library allocation
page read and write
45D1000
heap
page read and write
3FCC03507000
trusted library allocation
page read and write
3FCC024D8000
trusted library allocation
page read and write
713801AC4000
trusted library allocation
page read and write
10CB000
unkown
page execute and read and write
713801B30000
trusted library allocation
page read and write
40CF000
stack
page read and write
20C09130000
unkown
page readonly
There are 2848 hidden memdumps, click here to show them.