IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\num[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000976001\976d9f40c1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000977001\606f2f6db0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000978001\2d569de7b1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000979001\num.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\7RNKVR1EZ552XQ73.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\QDDSFWH7TPMYGYIMIOWX7SBOU5.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\S14AV77TIR9DRWSCWIW0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\QDDSFWH7TPMYGYIMIOWX7SBOU5.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\compatibility.ini
Windows WIN.INI
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Windows\Tasks\skotes.job
data
dropped
There are 17 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\S14AV77TIR9DRWSCWIW0.exe
"C:\Users\user\AppData\Local\Temp\S14AV77TIR9DRWSCWIW0.exe"
malicious
C:\Users\user\AppData\Local\Temp\7RNKVR1EZ552XQ73.exe
"C:\Users\user\AppData\Local\Temp\7RNKVR1EZ552XQ73.exe"
malicious
C:\Users\user\AppData\Local\Temp\QDDSFWH7TPMYGYIMIOWX7SBOU5.exe
"C:\Users\user\AppData\Local\Temp\QDDSFWH7TPMYGYIMIOWX7SBOU5.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1000976001\976d9f40c1.exe
"C:\Users\user\AppData\Local\Temp\1000976001\976d9f40c1.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000977001\606f2f6db0.exe
"C:\Users\user\AppData\Local\Temp\1000977001\606f2f6db0.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000976001\976d9f40c1.exe
"C:\Users\user\AppData\Local\Temp\1000976001\976d9f40c1.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000978001\2d569de7b1.exe
"C:\Users\user\AppData\Local\Temp\1000978001\2d569de7b1.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000976001\976d9f40c1.exe
"C:\Users\user\AppData\Local\Temp\1000976001\976d9f40c1.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000979001\num.exe
"C:\Users\user\AppData\Local\Temp\1000979001\num.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000977001\606f2f6db0.exe
"C:\Users\user\AppData\Local\Temp\1000977001\606f2f6db0.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000978001\2d569de7b1.exe
"C:\Users\user\AppData\Local\Temp\1000978001\2d569de7b1.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000979001\num.exe
"C:\Users\user\AppData\Local\Temp\1000979001\num.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2184 -parentBuildID 20230927232528 -prefsHandle 2132 -prefMapHandle 2128 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b40077cd-dd11-4133-b7ff-87ccb7cbcf33} 7456 "\\.\pipe\gecko-crash-server-pipe.7456" 1378e86ed10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2948 -parentBuildID 20230927232528 -prefsHandle 4268 -prefMapHandle 3212 -prefsLen 30974 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0ae1ecd2-7e69-4001-87b4-63ef548d530a} 7456 "\\.\pipe\gecko-crash-server-pipe.7456" 1379e087210 rdd
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2140 -parentBuildID 20230927232528 -prefsHandle 2076 -prefMapHandle 2068 -prefsLen 26596 -prefMapSize 238335 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {02f5810b-dd2b-4de0-96e0-9800a8c8aecc} 3780 "\\.\pipe\gecko-crash-server-pipe.3780" 1a0b0b6ff10 socket
There are 33 hidden processes, click here to show them.

URLs

Name
IP
Malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
http://mozilla.org/#/properties/bestMatchBlockingEnabledhttp://mozilla.org/#/properties/merinoClient
unknown
https://youtube.com/accountservices.sync.log.logger.browserPanelUI-remotetabs-setupsyncappMenu-heade
unknown
http://mozilla.org/#/properties/proposedEnrollment
unknown
http://mozilla.org/#/properties/branches/anyOf/1http://mozilla.org/#/properties/targeting
unknown
http://mozilla.org/#/properties/networkPredictor4fb599b7-2bfe-40fa-aec3-5b51dcdef652
unknown
http://mozilla.org/#/properties/schemaVersion
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
http://mozilla.org/#/properties/branches/anyOf/1/items/properties/feature/properties/value
unknown
https://sergei-esenin.com/
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=UuGFpt56D9L4&l=
unknown
http://mozilla.org/#/properties/disableGreaseOnFallback
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli
unknown
http://mozilla.org/#/properties/originsDaysCutOff
unknown
http://mozilla.org/#/properties/quickSuggestRemoteSettingsDataType
unknown
https://spocs.getpocket.com/spocs
unknown
https://screenshots.firefox.com
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
http://mozilla.org/#/properties/addonsShowLessFrequentlyCapextension/webcompat
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
http://185.215.113.37/e2b1563c6670f193.phpz
unknown
http://185.215.113.37/e2b1563c6670f193.phpy
unknown
http://mozilla.org/#/properties/quickSuggestSponsoredEnabled
unknown
http://185.215.113.43/Zu7JuNko/index.phpcoded
unknown
http://mozilla.org/#/properties/branches/anyOf/1/items/properties/features/items/properties/valuehtt
unknown
http://185.215.113.37/e2b1563c6670f193.phpa
unknown
https://github.com/mozilla-services/screenshots
unknown
http://mozilla.org/#/properties/quickSuggestImpressionCapsNonSponsoredEnabledhttp://mozilla.org/#/pr
unknown
http://mozilla.org/#/properties/quickSuggestScoreMapExtension:RegisterContentScriptsComplete
unknown
http://mozilla.org/#/properties/outcomes/items
unknown
http://mozilla.org/#/properties/quickSuggestSponsoredIndex
unknown
http://mozilla.org/#/properties/endDatecreateContextWithTimeout/get/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
http://mozilla.org/#/properties/csvImport
unknown
http://mozilla.org/#/properties/quickSuggestAllowPositionInSuggestions
unknown
http://mozilla.org/#/properties/branches/anyOf/0/items/properties/feature
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1&
unknown
https://www.ecosia.org/newtab/
unknown
https://lv.queniujq.cn
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.cloudflare.steamstatic.com/public/javascript/webui/clientcom.js?v=qYlgdgWOD4Ng&amp
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
http://185.215.113.16/well/random.exe=b
unknown
http://mozilla.org/#/properties/enabled
unknown
http://mozilla.org/#/properties/featureIds/itemshttp://mozilla.org/#/properties/branches
unknown
http://mozilla.org/#/properties/quickSuggestImpressionCapsSponsoredEnabled
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://json-schema.org/draft-07/schema#Unique
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://checkout.steampowered.com/
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
http://mozilla.org/#/properties/appIdwebcompat
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://spocs.getpocket.com/
unknown
http://mozilla.org/#/properties/ehPreloadEnabledthis-is-included-for-desktop-pre-95-support
unknown
http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features/items/properties/featureI
unknown
http://mozilla.org/#/properties/endDate
unknown
https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=KkhJqW2NGKiM&l=engli
unknown
http://mozilla.org/#/properties/branches/anyOf/2/itemsnuo-extensions-migration-in-embedded-import-wi
unknown
http://mozilla.org/#/properties/addonsFeatureGate
unknown
http://mozilla.org/#/properties/addonsShowLessFrequentlyCap
unknown
http://mozilla.org/#/properties/autoFillAdaptiveHistoryEnabled
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://json-schema.org/draft/2019-09/schemaplaces.sqlite#1:
unknown
https://help.steampowered.com/en/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://mozilla.org/#/properties/outcomeshttp://mozilla.org/#/properties/outcomes/itemshttp://mozilla
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
https://getpocket.com/recommendationsEnable
unknown
http://mozilla.org/#/properties/quickSuggestNonSponsoredEnabledextension/webcompat
unknown
https://www.cloudflare.com/lear
unknown
http://mozilla.org/#/properties/enrollmentEndDate
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&l=englis
unknown
https://login.microsoftonline.com
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/f0f51715-7f5e-48de-839
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://mozilla.org/#/properties/forceWaitHttpsRR
unknown
http://mozilla.org/#/properties/autoFillAdaptiveHistoryMinCharsThreshold
unknown
http://mozilla.org/#/properties/branches/anyOf/0http://mozilla.org/#/properties/userFacingName
unknown
http://mozilla.org/#/properties/outcomes
unknown
https://steamcommunity.com/workshop/
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://mozilla.org/#/properties/quickSuggestSponsoredEnabledhttp://mozilla.org/#/properties/dnsMaxAn
unknown
http://185.215.113.37/Jp
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/profilev2.css?v=gNE3gksLVEVa&l=en
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://screenshots.firefox.com/
unknown
http://185.215.113.37/e2b1563c6670f193.php6-535557bcc5fa00
unknown
https://merino.services.mozilla.com/api/v1/suggestresource://gre/modules/translation/LanguageDetecto
unknown
https://gpuweb.github.io/gpuweb/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
sergei-esenin.com
172.67.206.204
malicious
steamcommunity.com
104.102.49.254
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious
example.org
93.184.215.14
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.185.142
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
detectportal.firefox.com
unknown
shavar.services.mozilla.com
unknown
There are 19 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
185.215.113.37
unknown
Portugal
malicious
172.67.206.204
sergei-esenin.com
United States
malicious
104.102.49.254
steamcommunity.com
United States
malicious
185.215.113.16
unknown
Portugal
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
142.250.185.142
youtube.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
976d9f40c1.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
606f2f6db0.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
2d569de7b1.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
num.exe
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
481000
unkown
page execute and write copy
malicious
4FF0000
direct allocation
page read and write
malicious
2D1000
unkown
page execute and read and write
malicious
53C0000
direct allocation
page read and write
malicious
FE1000
unkown
page execute and read and write
malicious
E1000
unkown
page execute and read and write
malicious
B5B000
heap
page read and write
malicious
481000
unkown
page execute and write copy
malicious
4A80000
direct allocation
page read and write
malicious
124E000
heap
page read and write
malicious
5110000
direct allocation
page read and write
malicious
4C70000
direct allocation
page read and write
malicious
481000
unkown
page execute and write copy
malicious
E1000
unkown
page execute and read and write
malicious
B2E000
heap
page read and write
malicious
1388000
heap
page read and write
malicious
481000
unkown
page execute and write copy
malicious
E0E000
heap
page read and write
malicious
D57000
heap
page read and write
malicious
FE1000
unkown
page execute and read and write
malicious
DE1000
unkown
page execute and read and write
malicious
5250000
direct allocation
page read and write
malicious
CD4000
heap
page read and write
446F000
stack
page read and write
DD0000
direct allocation
page read and write
13795516000
heap
page read and write
5A30000
trusted library allocation
page read and write
1A0BC57D000
trusted library allocation
page read and write
137A003B000
trusted library allocation
page read and write
2297506F6000
trusted library allocation
page read and write
DD4000
heap
page read and write
1379E9CB000
trusted library allocation
page read and write
17FE000
stack
page read and write
1A0BC5B1000
trusted library allocation
page read and write
1379B5B2000
trusted library allocation
page read and write
3B2000
unkown
page execute and read and write
2311D865000
trusted library allocation
page read and write
1379F000000
trusted library allocation
page read and write
137A69E4000
trusted library allocation
page read and write
3A80000
trusted library allocation
page read and write
137A91CF000
trusted library allocation
page read and write
1260000
unkown
page execute and write copy
137A011C000
trusted library allocation
page read and write
1379C49D000
trusted library allocation
page read and write
5E3A000
trusted library allocation
page read and write
6DC000
unkown
page readonly
CD4000
heap
page read and write
44AE000
stack
page read and write
1A0BC152000
trusted library allocation
page read and write
33EE000
stack
page read and write
D3B000
stack
page read and write
F30000
heap
page read and write
4CA0000
heap
page read and write
5C9E000
trusted library allocation
page read and write
EE9000
heap
page read and write
2E4D7F7000
stack
page read and write
D54000
heap
page read and write
1379BC06000
trusted library allocation
page read and write
137A0370000
trusted library allocation
page read and write
2EAF000
stack
page read and write
3F2E000
stack
page read and write
137A69D2000
trusted library allocation
page read and write
E70000
heap
page read and write
1379557A000
heap
page read and write
22612A504000
trusted library allocation
page read and write
1AECF000
stack
page read and write
137A01C4000
trusted library allocation
page read and write
137A0FDB000
trusted library allocation
page read and write
5530000
direct allocation
page execute and read and write
1A0B0810000
trusted library allocation
page read and write
1379DF4A000
trusted library allocation
page read and write
137A0058000
trusted library allocation
page read and write
137A6242000
trusted library allocation
page read and write
1379C47C000
trusted library allocation
page read and write
32E0000
direct allocation
page read and write
1379556E000
heap
page read and write
137A004B000
trusted library allocation
page read and write
137A6242000
trusted library allocation
page read and write
137A6973000
trusted library allocation
page read and write
16CF000
heap
page read and write
13795546000
heap
page read and write
2E4C0BD000
stack
page read and write
1370000
heap
page read and write
439F000
stack
page read and write
30BF000
stack
page read and write
137A66A7000
trusted library allocation
page read and write
5ECB77D000
stack
page read and write
4B5E000
stack
page read and write
1379E369000
trusted library allocation
page read and write
137A92F6000
trusted library allocation
page read and write
1379E100000
trusted library allocation
page read and write
CD5000
heap
page read and write
137A6244000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
5A48000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
1379B84F000
heap
page read and write
C8C000
unkown
page execute and write copy
1D836E5B000
trusted library allocation
page read and write
137A6913000
trusted library allocation
page read and write
1379C008000
trusted library allocation
page read and write
137A05D5000
trusted library allocation
page read and write
1379F4EE000
trusted library allocation
page read and write
2E4C1BB000
stack
page read and write
1379550F000
heap
page read and write
1A0B0660000
unclassified section
page readonly
10CB000
heap
page read and write
137A6274000
trusted library allocation
page read and write
4C81000
heap
page read and write
137A026F000
trusted library allocation
page read and write
1264000
unkown
page execute and write copy
2311E4AC000
heap
page read and write
1804BECB000
trusted library allocation
page read and write
2E5441C000
stack
page read and write
191000
unkown
page execute and read and write
10CF000
heap
page read and write
137A9188000
trusted library allocation
page read and write
293F000
stack
page read and write
DE0000
unkown
page read and write
47AF000
stack
page read and write
5AB1000
trusted library allocation
page read and write
E4E000
stack
page read and write
127D000
unkown
page execute and read and write
1378E5F0000
heap
page readonly
137A1B49000
trusted library allocation
page read and write
1170000
heap
page read and write
1A0BF54B000
trusted library allocation
page read and write
13795583000
heap
page read and write
11A4000
heap
page read and write
553E000
stack
page read and write
E04000
heap
page read and write
39DE000
stack
page read and write
1379E0AC000
trusted library allocation
page read and write
13795574000
heap
page read and write
1379ED5C000
trusted library allocation
page read and write
1A0BD709000
trusted library allocation
page read and write
3DDF000
stack
page read and write
1379E9CB000
trusted library allocation
page read and write
540E000
stack
page read and write
5AB1000
trusted library allocation
page read and write
1A0BF53C000
trusted library allocation
page read and write
137A61B6000
trusted library allocation
page read and write
C38000
unkown
page execute and write copy
1379E3C7000
trusted library allocation
page read and write
1218000
unkown
page execute and write copy
1379F2AB000
trusted library allocation
page read and write
C60000
heap
page read and write
137A11E3000
trusted library allocation
page read and write
1D30F000
stack
page read and write
1379F6D7000
trusted library allocation
page read and write
C53000
unkown
page execute and read and write
13795516000
heap
page read and write
1379F303000
trusted library allocation
page read and write
1379A8D7000
trusted library allocation
page read and write
1379FF7C000
trusted library allocation
page read and write
137A02E4000
trusted library allocation
page read and write
137A67D7000
trusted library allocation
page read and write
5EC787E000
stack
page read and write
1379555D000
heap
page read and write
3AAE000
stack
page read and write
150E000
stack
page read and write
5E3E000
trusted library allocation
page read and write
D97000
heap
page read and write
E04000
heap
page read and write
310F000
stack
page read and write
11FF000
unkown
page execute and read and write
1379F4D6000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
14A3000
unkown
page execute and read and write
13795525000
heap
page read and write
1379A0A2000
trusted library allocation
page read and write
2E568FB000
stack
page read and write
13B8000
heap
page read and write
137A63CC000
trusted library allocation
page read and write
4C81000
heap
page read and write
D24000
heap
page read and write
350E000
stack
page read and write
137A679B000
trusted library allocation
page read and write
1379E91D000
trusted library allocation
page read and write
2311E5B7000
heap
page read and write
5991000
trusted library allocation
page read and write
E83000
heap
page read and write
3007000
heap
page read and write
DD4000
heap
page read and write
1379E042000
trusted library allocation
page read and write
1379ED95000
trusted library allocation
page read and write
137A1BCB000
trusted library allocation
page read and write
2311E56A000
heap
page read and write
13795519000
heap
page read and write
137A0F5E000
trusted library allocation
page read and write
137A92DA000
trusted library allocation
page read and write
1379DF3B000
trusted library allocation
page read and write
10E8000
heap
page read and write
10D6000
heap
page read and write
137A029B000
trusted library allocation
page read and write
DD4000
heap
page read and write
13795519000
heap
page read and write
137A039B000
trusted library allocation
page read and write
16F8000
heap
page read and write
29C0000
direct allocation
page read and write
38DF000
stack
page read and write
C3C000
unkown
page execute and read and write
137A05AB000
trusted library allocation
page read and write
1379EAD7000
trusted library allocation
page read and write
BF4000
heap
page read and write
1379B7C3000
trusted library allocation
page read and write
13795516000
heap
page read and write
1263000
unkown
page execute and read and write
1379C49D000
trusted library allocation
page read and write
2E4C5B0000
stack
page read and write
137A015B000
trusted library allocation
page read and write
E04000
heap
page read and write
DD4000
heap
page read and write
3EBF000
stack
page read and write
EB5000
heap
page read and write
137A035E000
trusted library allocation
page read and write
13795565000
heap
page read and write
120F000
unkown
page execute and write copy
BC7000
unkown
page execute and write copy
137A0370000
trusted library allocation
page read and write
6675000
heap
page read and write
1379E8C0000
trusted library section
page read and write
16B0000
heap
page read and write
1A0BCAA4000
trusted library allocation
page read and write
1379EA96000
trusted library allocation
page read and write
5ACF000
trusted library allocation
page read and write
5A98000
trusted library allocation
page read and write
59BA000
trusted library allocation
page read and write
B3E000
stack
page read and write
CD4000
heap
page read and write
2311E5B7000
heap
page read and write
45A0000
direct allocation
page read and write
13795564000
heap
page read and write
59BB000
trusted library allocation
page read and write
455F000
stack
page read and write
1D836F19000
trusted library allocation
page read and write
E04000
heap
page read and write
13795510000
heap
page read and write
1379E3B1000
trusted library allocation
page read and write
137A0311000
trusted library allocation
page read and write
1A0BFC13000
trusted library allocation
page read and write
D24000
heap
page read and write
137A88F7000
trusted library allocation
page read and write
1379A3E0000
unclassified section
page read and write
139B000
heap
page read and write
1379EC43000
trusted library allocation
page read and write
59A0000
trusted library allocation
page read and write
FD0000
direct allocation
page read and write
59BE000
trusted library allocation
page read and write
5A37000
trusted library allocation
page read and write
BFE000
stack
page read and write
59AA000
trusted library allocation
page read and write
3C9F000
stack
page read and write
2311E56A000
heap
page read and write
458F000
stack
page read and write
1379A8A1000
trusted library allocation
page read and write
CD4000
heap
page read and write
137A013A000
trusted library allocation
page read and write
16E5000
heap
page read and write
4F20000
direct allocation
page read and write
1379BD19000
trusted library allocation
page read and write
13795510000
heap
page read and write
128C000
unkown
page execute and write copy
1379556E000
heap
page read and write
137904BA000
heap
page read and write
1379E7BD000
trusted library allocation
page read and write
1379552D000
heap
page read and write
DD4000
heap
page read and write
1A0B0BE7000
trusted library allocation
page read and write
FF1000
unkown
page execute and read and write
BF4000
heap
page read and write
76E000
unkown
page execute and write copy
FB0000
direct allocation
page read and write
137A0DED000
trusted library allocation
page read and write
1379556B000
heap
page read and write
48EF000
stack
page read and write
1CA0E000
stack
page read and write
373F000
stack
page read and write
2311E4CD000
heap
page read and write
11F9000
unkown
page execute and write copy
2E541DE000
stack
page read and write
137A9191000
trusted library allocation
page read and write
4700000
direct allocation
page read and write
F74000
heap
page read and write
1A9C53E000
stack
page read and write
BF4000
heap
page read and write
1379DF9B000
trusted library allocation
page read and write
1379F700000
trusted library allocation
page read and write
1A0BF3BB000
trusted library allocation
page read and write
137A63D0000
trusted library allocation
page read and write
569F000
stack
page read and write
E04000
heap
page read and write
1379DD03000
trusted library allocation
page read and write
2311D926000
unkown
page execute read
33EE000
stack
page read and write
373E000
stack
page read and write
4B71000
heap
page read and write
FAE000
stack
page read and write
5F05000
trusted library allocation
page read and write
1379ED4F000
trusted library allocation
page read and write
1379550E000
heap
page read and write
6DC000
unkown
page readonly
5F24000
trusted library allocation
page read and write
BF4000
heap
page read and write
1379DF8A000
trusted library allocation
page read and write
13795572000
heap
page read and write
442E000
stack
page read and write
4C81000
heap
page read and write
D24000
heap
page read and write
1A0BF303000
trusted library allocation
page read and write
137A69E6000
trusted library allocation
page read and write
137A10B4000
trusted library allocation
page read and write
10E5000
heap
page read and write
1379F287000
trusted library allocation
page read and write
CD4000
heap
page read and write
5ECBF7E000
stack
page read and write
137A6295000
trusted library allocation
page read and write
1379C400000
trusted library allocation
page read and write
361E000
stack
page read and write
1379FF8B000
trusted library allocation
page read and write
2F1E000
stack
page read and write
1379A3E2000
unclassified section
page read and write
3EFE000
stack
page read and write
CD4000
heap
page read and write
520000
heap
page read and write
5A40000
trusted library allocation
page read and write
1379556E000
heap
page read and write
1379556F000
heap
page read and write
3A80000
trusted library allocation
page read and write
1379556F000
heap
page read and write
4601000
heap
page read and write
137A6280000
trusted library allocation
page read and write
4C81000
heap
page read and write
2A554700000
trusted library allocation
page read and write
137A0CE8000
trusted library allocation
page read and write
2D3E000
stack
page read and write
1A0BF89E000
trusted library allocation
page read and write
137A69BA000
trusted library allocation
page read and write
EF0000
heap
page read and write
5AD3000
trusted library allocation
page read and write
3DBE000
stack
page read and write
137A92EF000
trusted library allocation
page read and write
137A10C4000
trusted library allocation
page read and write
1379DDD8000
trusted library allocation
page read and write
5E30000
trusted library allocation
page read and write
137A62A5000
trusted library allocation
page read and write
1A0B0B00000
trusted library allocation
page read and write
CD4000
heap
page read and write
137A902C000
trusted library allocation
page read and write
D3C000
unkown
page readonly
4A10000
heap
page execute and read and write
5BED000
stack
page read and write
1379A955000
trusted library allocation
page read and write
5F8A000
trusted library allocation
page read and write
59D1000
trusted library allocation
page read and write
53F0000
direct allocation
page execute and read and write
137A62C5000
trusted library allocation
page read and write
D24000
heap
page read and write
1A0BF729000
trusted library allocation
page read and write
1379FFFB000
trusted library allocation
page read and write
DD4000
heap
page read and write
5540000
direct allocation
page execute and read and write
512F000
stack
page read and write
358E000
stack
page read and write
1379EAD7000
trusted library allocation
page read and write
137A8F1F000
trusted library allocation
page read and write
5F36000
trusted library allocation
page read and write
5F87000
trusted library allocation
page read and write
2EDF000
stack
page read and write
4F20000
direct allocation
page read and write
5AD3000
trusted library allocation
page read and write
47E1000
heap
page read and write
137A61DF000
trusted library allocation
page read and write
1379557B000
heap
page read and write
1379E0DA000
trusted library allocation
page read and write
11FA000
unkown
page execute and read and write
F7F000
heap
page read and write
13795553000
heap
page read and write
4601000
heap
page read and write
1379FF76000
trusted library allocation
page read and write
4B70000
heap
page read and write
1379550E000
heap
page read and write
1381000
heap
page read and write
44FE000
stack
page read and write
352E000
stack
page read and write
7250000
heap
page read and write
35AE000
stack
page read and write
137A019B000
trusted library allocation
page read and write
1379E7B7000
trusted library allocation
page read and write
473C000
stack
page read and write
249FC200000
trusted library allocation
page read and write
3A80000
trusted library allocation
page read and write
1379E3CD000
trusted library allocation
page read and write
5E36000
trusted library allocation
page read and write
D74000
unkown
page readonly
1A0BC5B6000
trusted library allocation
page read and write
543D000
stack
page read and write
DD4000
heap
page read and write
36CE000
stack
page read and write
C52000
unkown
page execute and write copy
137A02DB000
trusted library allocation
page read and write
2311E5AE000
heap
page read and write
DD4000
heap
page read and write
D54000
heap
page read and write
CD4000
heap
page read and write
29C0000
direct allocation
page read and write
13795564000
heap
page read and write
1379FF9C000
trusted library allocation
page read and write
4C81000
heap
page read and write
33AF000
stack
page read and write
494F000
stack
page read and write
1D836D00000
trusted library allocation
page read and write
2311D430000
unclassified section
page readonly
78C000
unkown
page execute and read and write
E10000
heap
page read and write
137A3020000
trusted library allocation
page read and write
EF4000
heap
page read and write
137A11B2000
trusted library allocation
page read and write
EC9000
heap
page read and write
137A8F27000
trusted library allocation
page read and write
137A0049000
trusted library allocation
page read and write
12D0000
direct allocation
page execute and read and write
137A0393000
trusted library allocation
page read and write
1379E694000
trusted library allocation
page read and write
1A0BCA9A000
trusted library allocation
page read and write
4C81000
heap
page read and write
1379BD14000
trusted library allocation
page read and write
1379E3F1000
trusted library allocation
page read and write
13795560000
heap
page read and write
4B71000
heap
page read and write
5580000
direct allocation
page execute and read and write
5540000
direct allocation
page execute and read and write
1379F117000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
13795564000
heap
page read and write
13795516000
heap
page read and write
10F4000
heap
page read and write
1A0BF59F000
trusted library allocation
page read and write
10C9000
heap
page read and write
FC0000
heap
page read and write
5A30000
trusted library allocation
page read and write
BF4000
heap
page read and write
2E4BDFE000
stack
page read and write
9FC000
stack
page read and write
1379DC00000
trusted library allocation
page read and write
DD4000
heap
page read and write
1348000
heap
page read and write
137A0284000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
1379FE11000
trusted library allocation
page read and write
137A007F000
trusted library allocation
page read and write
B44000
heap
page read and write
1379A946000
trusted library allocation
page read and write
1379E3C7000
trusted library allocation
page read and write
4601000
heap
page read and write
13795568000
heap
page read and write
33AF000
stack
page read and write
29C0000
direct allocation
page read and write
4E60000
direct allocation
page read and write
16FE000
stack
page read and write
46B0000
heap
page read and write
137A69EC000
trusted library allocation
page read and write
1379EAE7000
trusted library allocation
page read and write
2311E529000
heap
page read and write
DC0000
heap
page read and write
4601000
heap
page read and write
A10000
direct allocation
page read and write
12EB000
unkown
page execute and write copy
4C81000
heap
page read and write
13795572000
heap
page read and write
13795537000
heap
page read and write
7251000
heap
page read and write
137A8F40000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
CD4000
heap
page read and write
1379E99C000
trusted library allocation
page read and write
137A92D2000
trusted library allocation
page read and write
1379556E000
heap
page read and write
1A6CF000
stack
page read and write
E9F000
heap
page read and write
1804B9F0000
unclassified section
page readonly
2E5449D000
stack
page read and write
1379A582000
trusted library allocation
page read and write
1379556F000
heap
page read and write
B40000
heap
page read and write
5E39000
trusted library allocation
page read and write
137A69F8000
trusted library allocation
page read and write
137A92A3000
trusted library allocation
page read and write
1379F6B6000
trusted library allocation
page read and write
137A025D000
trusted library allocation
page read and write
5A3C000
trusted library allocation
page read and write
516F000
stack
page read and write
137A8F92000
trusted library allocation
page read and write
137A05F8000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
1379F4CF000
trusted library allocation
page read and write
1379E644000
trusted library allocation
page read and write
5A91000
trusted library allocation
page read and write
10CC000
heap
page read and write
5F56000
trusted library allocation
page read and write
1379E3F1000
trusted library allocation
page read and write
480F000
stack
page read and write
137A3026000
trusted library allocation
page read and write
CD4000
heap
page read and write
11FE000
unkown
page execute and write copy
137A1BD3000
trusted library allocation
page read and write
1379EDF3000
trusted library allocation
page read and write
4C81000
heap
page read and write
1395000
heap
page read and write
1379BE1D000
trusted library allocation
page read and write
137A8FCE000
trusted library allocation
page read and write
10E8000
heap
page read and write
128C000
unkown
page execute and write copy
623B000
trusted library allocation
page read and write
3D2E000
stack
page read and write
167E000
heap
page read and write
1379EC03000
trusted library allocation
page read and write
53FE000
stack
page read and write
1379EA85000
trusted library allocation
page read and write
1A0BC95D000
trusted library allocation
page read and write
1379551E000
heap
page read and write
13795510000
heap
page read and write
1379E9CB000
trusted library allocation
page read and write
BF4000
heap
page read and write
D24000
heap
page read and write
DD4000
heap
page read and write
5AB1000
trusted library allocation
page read and write
1A0BCAFD000
trusted library allocation
page read and write
1379E965000
trusted library allocation
page read and write
1379E3B8000
trusted library allocation
page read and write
137A029B000
trusted library allocation
page read and write
1266000
unkown
page execute and write copy
1A0BCA03000
trusted library allocation
page read and write
CD4000
heap
page read and write
4601000
heap
page read and write
137A3004000
trusted library allocation
page read and write
1379F4D2000
trusted library allocation
page read and write
D54000
heap
page read and write
1804BC80000
heap
page read and write
1379B954000
heap
page read and write
5370000
trusted library allocation
page read and write
32EF000
stack
page read and write
1379DC6A000
trusted library allocation
page read and write
BD4000
unkown
page execute and read and write
1379E29A000
trusted library allocation
page read and write
12EF000
unkown
page execute and read and write
1379A517000
trusted library allocation
page read and write
13795582000
heap
page read and write
137A02C1000
trusted library allocation
page read and write
1A0BCBF0000
heap
page read and write
137A4114000
trusted library allocation
page read and write
3CAE000
stack
page read and write
137A0261000
trusted library allocation
page read and write
405F000
stack
page read and write
3A8E000
stack
page read and write
1379DF4E000
trusted library allocation
page read and write
1379556A000
heap
page read and write
50F0000
direct allocation
page execute and read and write
53D000
unkown
page read and write
137A01A1000
trusted library allocation
page read and write
13795566000
heap
page read and write
1A0BD2E6000
trusted library allocation
page read and write
2311E5B7000
heap
page read and write
5F4B000
trusted library allocation
page read and write
13795537000
heap
page read and write
4C70000
direct allocation
page read and write
B30000
heap
page read and write
1379BC12000
trusted library allocation
page read and write
2EEB000
stack
page read and write
13795526000
heap
page read and write
1379553B000
heap
page read and write
1379557A000
heap
page read and write
1273000
unkown
page execute and read and write
32E0000
direct allocation
page read and write
DD4000
heap
page read and write
137A6242000
trusted library allocation
page read and write
137A9265000
trusted library allocation
page read and write
85F0000
heap
page read and write
4B71000
heap
page read and write
377E000
stack
page read and write
1379EAB3000
trusted library allocation
page read and write
1379A9A5000
trusted library allocation
page read and write
1264000
unkown
page execute and write copy
13795568000
heap
page read and write
137A91AC000
trusted library allocation
page read and write
1379552B000
heap
page read and write
259F000
stack
page read and write
137A06EE000
trusted library allocation
page read and write
1311000
heap
page read and write
FD0000
direct allocation
page read and write
1230000
direct allocation
page execute and read and write
1379557D000
heap
page read and write
2E5431C000
stack
page read and write
2311E599000
heap
page read and write
4BBF000
stack
page read and write
1379E795000
trusted library allocation
page read and write
1379E146000
trusted library allocation
page read and write
5A98000
trusted library allocation
page read and write
13795510000
heap
page read and write
137A06EE000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
3A80000
trusted library allocation
page read and write
1804BBFA000
heap
page read and write
50BE000
stack
page read and write
4B71000
heap
page read and write
4601000
heap
page read and write
DE0000
unkown
page readonly
137A0650000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
E0000
unkown
page readonly
506F000
stack
page read and write
8B3000
unkown
page execute and write copy
1379E3A5000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
F70000
heap
page read and write
5510000
direct allocation
page execute and read and write
13795560000
heap
page read and write
137A0281000
trusted library allocation
page read and write
11EE000
stack
page read and write
1379A600000
trusted library allocation
page read and write
480000
unkown
page readonly
1D836E6E000
trusted library allocation
page read and write
DD4000
heap
page read and write
4787000
trusted library allocation
page execute and read and write
47B1000
heap
page read and write
137A02C1000
trusted library allocation
page read and write
D24000
heap
page read and write
13AA000
heap
page read and write
5DAE000
stack
page read and write
3A80000
trusted library allocation
page read and write
10D6000
heap
page read and write
1379B5A8000
trusted library allocation
page read and write
13795560000
heap
page read and write
1A0BFADF000
trusted library allocation
page read and write
137A3008000
trusted library allocation
page read and write
DD4000
heap
page read and write
13795572000
heap
page read and write
4B71000
heap
page read and write
33CE000
stack
page read and write
4B80000
heap
page read and write
13795583000
heap
page read and write
1379FF80000
trusted library allocation
page read and write
13795533000
heap
page read and write
55AE000
stack
page read and write
5EE8000
trusted library allocation
page read and write
1D836F03000
trusted library allocation
page read and write
137A61FD000
trusted library allocation
page read and write
2311E540000
heap
page read and write
137A104A000
trusted library allocation
page read and write
CD4000
heap
page read and write
11DE000
unkown
page execute and read and write
C43000
unkown
page execute and write copy
CD4000
heap
page read and write
1379E58B000
trusted library allocation
page read and write
DD0000
direct allocation
page read and write
1379550E000
heap
page read and write
1379BBA0000
trusted library section
page readonly
F5F000
heap
page read and write
BA2000
unkown
page execute and write copy
2311E4AC000
heap
page read and write
1379556A000
heap
page read and write
1379E3F0000
trusted library allocation
page read and write
B70000
heap
page read and write
137A9300000
trusted library allocation
page read and write
137A92D2000
trusted library allocation
page read and write
1314000
heap
page read and write
D54000
heap
page read and write
4DD1000
heap
page read and write
137A907E000
trusted library allocation
page read and write
13795572000
heap
page read and write
4C70000
direct allocation
page read and write
1379BD0D000
trusted library allocation
page read and write
1379F200000
trusted library allocation
page read and write
5AD3000
trusted library allocation
page read and write
1A0BEC49000
trusted library allocation
page read and write
1379A9AA000
trusted library allocation
page read and write
53CB000
trusted library allocation
page read and write
13795546000
heap
page read and write
1379F36E000
trusted library allocation
page read and write
1379EC1F000
trusted library allocation
page read and write
29C0000
direct allocation
page read and write
4601000
heap
page read and write
13799E98000
trusted library allocation
page read and write
1A0BF980000
trusted library allocation
page read and write
53D000
unkown
page read and write
1379E403000
trusted library allocation
page read and write
1379DC44000
trusted library allocation
page read and write
10F4000
heap
page read and write
5EC6078000
stack
page read and write
123E000
unkown
page execute and read and write
4C81000
heap
page read and write
137A0E8D000
trusted library allocation
page read and write
5A33000
trusted library allocation
page read and write
137A02CE000
trusted library allocation
page read and write
13795565000
heap
page read and write
DD4000
heap
page read and write
137A0370000
trusted library allocation
page read and write
5E3C000
trusted library allocation
page read and write
5160000
direct allocation
page execute and read and write
3A6F000
stack
page read and write
2D1F000
stack
page read and write
1A0BCC00000
heap
page read and write
E78000
heap
page read and write
1379555D000
heap
page read and write
137A9191000
trusted library allocation
page read and write
137A0281000
trusted library allocation
page read and write
76E000
unkown
page execute and write copy
4AB1000
heap
page read and write
1A0BD22A000
trusted library allocation
page read and write
137A01FB000
trusted library allocation
page read and write
1A0BD274000
trusted library allocation
page read and write
134E000
stack
page read and write
12F3000
unkown
page execute and write copy
137A0322000
trusted library allocation
page read and write
5B45000
trusted library allocation
page read and write
1804BEB9000
trusted library allocation
page read and write
1A0BC57E000
trusted library allocation
page read and write
1C9CF000
stack
page read and write
1379EAE3000
trusted library allocation
page read and write
4C20000
remote allocation
page read and write
1A0BF8ED000
trusted library allocation
page read and write
137A6246000
trusted library allocation
page read and write
1379550E000
heap
page read and write
1804BEA2000
trusted library allocation
page read and write
2311E531000
heap
page read and write
CD4000
heap
page read and write
5A98000
trusted library allocation
page read and write
1379DF8D000
trusted library allocation
page read and write
2B5E000
stack
page read and write
1A0BCA9A000
trusted library allocation
page read and write
4AB000
unkown
page write copy
29D0000
heap
page read and write
1A0BC254000
trusted library allocation
page read and write
137A6612000
trusted library allocation
page read and write
574000
heap
page read and write
1379FF97000
trusted library allocation
page read and write
137A1B00000
trusted library allocation
page read and write
137A0EBA000
trusted library allocation
page read and write
506E000
stack
page read and write
1379E399000
trusted library allocation
page read and write
4601000
heap
page read and write
47CE000
stack
page read and write
137A008B000
trusted library allocation
page read and write
CCE000
stack
page read and write
2311E49F000
heap
page read and write
1379FF8B000
trusted library allocation
page read and write
13795553000
heap
page read and write
CA0000
unkown
page readonly
137A8F58000
trusted library allocation
page read and write
13795529000
heap
page read and write
1379BD11000
trusted library allocation
page read and write
D54000
heap
page read and write
1379DF5F000
trusted library allocation
page read and write
11A4000
heap
page read and write
1A0BD500000
trusted library allocation
page read and write
1378E7B4000
heap
page read and write
1379EA96000
trusted library allocation
page read and write
5BB2000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
1379FFDE000
trusted library allocation
page read and write
4C81000
heap
page read and write
13795573000
heap
page read and write
D54000
heap
page read and write
531000
unkown
page read and write
162A000
heap
page read and write
5F4E000
trusted library allocation
page read and write
2E4D9F1000
stack
page read and write
137A0378000
trusted library allocation
page read and write
1A0BF9B0000
trusted library allocation
page read and write
137A10D4000
trusted library allocation
page read and write
99C000
stack
page read and write
467E000
stack
page read and write
6D7F000
stack
page read and write
1379FF80000
trusted library allocation
page read and write
1A0BC181000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
137A63B4000
trusted library allocation
page read and write
1379A8AD000
trusted library allocation
page read and write
FAA4581000
trusted library allocation
page execute read
1A0BD2C0000
trusted library allocation
page read and write
3C7E000
stack
page read and write
1A9B4FE000
unkown
page readonly
59F0000
trusted library allocation
page read and write
1379EAAB000
trusted library allocation
page read and write
50BC000
trusted library allocation
page read and write
1F4000
heap
page read and write
1379E970000
trusted library allocation
page read and write
137A633A000
trusted library allocation
page read and write
1A0BF6A6000
trusted library allocation
page read and write
5564000
heap
page read and write
D6C000
unkown
page read and write
1379A807000
trusted library allocation
page read and write
E04000
heap
page read and write
137A8F42000
trusted library allocation
page read and write
137A6073000
trusted library allocation
page read and write
1D59E000
stack
page read and write
1379A07E000
trusted library allocation
page read and write
1379E3C9000
trusted library allocation
page read and write
1379FFDE000
trusted library allocation
page read and write
137A02EC000
trusted library allocation
page read and write
32DF000
stack
page read and write
5C97000
trusted library allocation
page read and write
5ECAD7D000
stack
page read and write
DD4000
heap
page read and write
104B000
unkown
page execute and read and write
1A0BC582000
trusted library allocation
page read and write
1379556A000
heap
page read and write
137A6344000
trusted library allocation
page read and write
2311E4A9000
heap
page read and write
137A69A6000
trusted library allocation
page read and write
C3D000
unkown
page execute and write copy
137A0086000
trusted library allocation
page read and write
1379FB48000
trusted library allocation
page read and write
1A0BFCB2000
trusted library allocation
page read and write
CD4000
heap
page read and write
4C70000
direct allocation
page read and write
2311E531000
heap
page read and write
1379E362000
trusted library allocation
page read and write
D54000
heap
page read and write
1A0BC5B4000
trusted library allocation
page read and write
137A62B2000
trusted library allocation
page read and write
137A0167000
trusted library allocation
page read and write
137A8F45000
trusted library allocation
page read and write
1379F221000
trusted library allocation
page read and write
F6D000
heap
page read and write
2E4CDFF000
stack
page read and write
4E4F000
stack
page read and write
5AD8000
trusted library allocation
page read and write
5A5A000
trusted library allocation
page read and write
1379551C000
heap
page read and write
69BE000
stack
page read and write
1379EDDA000
trusted library allocation
page read and write
137A012A000
trusted library allocation
page read and write
13795510000
heap
page read and write
1379557F000
heap
page read and write
1302000
unkown
page execute and write copy
F5D000
stack
page read and write
1A0BF50C000
trusted library allocation
page read and write
EB0000
heap
page read and write
137A636E000
trusted library allocation
page read and write
1379C46B000
trusted library allocation
page read and write
229750604000
trusted library allocation
page read and write
137A01E3000
trusted library allocation
page read and write
13795537000
heap
page read and write
2311E584000
heap
page read and write
1379FF97000
trusted library allocation
page read and write
4F91000
heap
page read and write
355E000
stack
page read and write
5AB1000
trusted library allocation
page read and write
401E000
stack
page read and write
4E20000
direct allocation
page execute and read and write
1F4000
heap
page read and write
EAB000
heap
page read and write
13795537000
heap
page read and write
4C81000
heap
page read and write
CD4000
heap
page read and write
1D836A30000
heap
page read and write
2E548DE000
stack
page read and write
E90000
heap
page read and write
137A0656000
trusted library allocation
page read and write
42AF000
stack
page read and write
BF4000
heap
page read and write
5ECA77E000
stack
page read and write
29C0000
direct allocation
page read and write
137A8F45000
trusted library allocation
page read and write
1379E99C000
trusted library allocation
page read and write
AEE000
stack
page read and write
472E000
stack
page read and write
1379FFEB000
trusted library allocation
page read and write
27D0000
direct allocation
page read and write
30CE000
stack
page read and write
90E000
stack
page read and write
8AB000
unkown
page execute and write copy
1265000
unkown
page execute and read and write
4B71000
heap
page read and write
1379E3C9000
trusted library allocation
page read and write
E5C000
stack
page read and write
C7E000
unkown
page execute and write copy
1379558B000
heap
page read and write
292F5784000
heap
page read and write
13795537000
heap
page read and write
57EF000
stack
page read and write
2311E53D000
heap
page read and write
1379556B000
heap
page read and write
1379E565000
trusted library allocation
page read and write
1D836E2E000
trusted library allocation
page read and write
137A6A26000
trusted library allocation
page read and write
137A010B000
trusted library allocation
page read and write
137A03D7000
trusted library allocation
page read and write
CDD000
unkown
page execute and write copy
137A92A8000
trusted library allocation
page read and write
4601000
heap
page read and write
137A9200000
trusted library allocation
page read and write
3EA0000
heap
page read and write
1379E300000
trusted library allocation
page read and write
1379557A000
heap
page read and write
1379557B000
heap
page read and write
623C000
trusted library allocation
page read and write
492E000
stack
page read and write
137A064B000
trusted library allocation
page read and write
137A02A4000
trusted library allocation
page read and write
1379A400000
trusted library allocation
page read and write
292F5788000
heap
page read and write
137A01DF000
trusted library allocation
page read and write
5A3C000
trusted library allocation
page read and write
1A0BF84C000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
5290000
direct allocation
page execute and read and write
383F000
stack
page read and write
1379FF2C000
trusted library allocation
page read and write
1379555D000
heap
page read and write
2311E4E8000
heap
page read and write
4C81000
heap
page read and write
D24000
heap
page read and write
5AA1000
trusted library allocation
page read and write
137A9287000
trusted library allocation
page read and write
1379552D000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
2BAF000
stack
page read and write
2E5429C000
stack
page read and write
5A30000
trusted library allocation
page read and write
137A9003000
trusted library allocation
page read and write
1379B503000
trusted library allocation
page read and write
599B000
trusted library allocation
page read and write
12ED000
unkown
page execute and read and write
1D836F1B000
trusted library allocation
page read and write
CD4000
heap
page read and write
1379EAAB000
trusted library allocation
page read and write
137A4100000
trusted library allocation
page read and write
9A0000
heap
page read and write
1A0BC200000
trusted library allocation
page read and write
137A6324000
trusted library allocation
page read and write
124D000
unkown
page execute and read and write
137A0167000
trusted library allocation
page read and write
12DB000
unkown
page execute and write copy
137A02B7000
trusted library allocation
page read and write
13795537000
heap
page read and write
594E000
stack
page read and write
137A6286000
trusted library allocation
page read and write
CD4000
heap
page read and write
137A8FF5000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
430F000
stack
page read and write
137A9089000
trusted library allocation
page read and write
52FB000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
137A0590000
trusted library allocation
page read and write
DD4000
heap
page read and write
4601000
heap
page read and write
637F000
trusted library allocation
page read and write
52E0000
direct allocation
page execute and read and write
35DF000
stack
page read and write
137A6240000
trusted library allocation
page read and write
1379E426000
trusted library allocation
page read and write
2311E520000
heap
page read and write
1804BE2E000
trusted library allocation
page read and write
1F4000
heap
page read and write
1A0BCF00000
trusted library allocation
page read and write
1D1CE000
stack
page read and write
1379E399000
trusted library allocation
page read and write
137A63C3000
trusted library allocation
page read and write
137A0648000
trusted library allocation
page read and write
1A0BF469000
trusted library allocation
page read and write
1A0BC8FE000
trusted library allocation
page read and write
3E1E000
stack
page read and write
6AF0000
heap
page read and write
1260000
unkown
page execute and write copy
137A67A0000
trusted library allocation
page read and write
1379E3AE000
trusted library allocation
page read and write
CD4000
heap
page read and write
5EC335E000
stack
page read and write
52E5000
trusted library allocation
page read and write
137A91B6000
trusted library allocation
page read and write
1379E3C9000
trusted library allocation
page read and write
11A4000
heap
page read and write
137A61C3000
trusted library allocation
page read and write
2311D863000
trusted library allocation
page read and write
1379C209000
trusted library allocation
page read and write
570E000
stack
page read and write
137A92B9000
trusted library allocation
page read and write
1379F299000
trusted library allocation
page read and write
1B7E000
stack
page read and write
137A02A4000
trusted library allocation
page read and write
49DF000
stack
page read and write
CD4000
heap
page read and write
13795516000
heap
page read and write
1F4000
heap
page read and write
399F000
stack
page read and write
1A0B0BC9000
trusted library allocation
page read and write
1379FF74000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
1379DD3F000
trusted library allocation
page read and write
27D0000
direct allocation
page read and write
4B71000
heap
page read and write
4601000
heap
page read and write
13795553000
heap
page read and write
4F20000
direct allocation
page read and write
58A0000
trusted library allocation
page read and write
6DC000
unkown
page readonly
321F000
stack
page read and write
2DEF000
stack
page read and write
51FD000
stack
page read and write
1247000
unkown
page execute and write copy
45A0000
direct allocation
page read and write
5AD3000
trusted library allocation
page read and write
1379E333000
trusted library allocation
page read and write
1A0BF863000
trusted library allocation
page read and write
4780000
direct allocation
page execute and read and write
137A0143000
trusted library allocation
page read and write
387F000
stack
page read and write
415E000
stack
page read and write
137A0589000
trusted library allocation
page read and write
1379E3CD000
trusted library allocation
page read and write
53C0000
direct allocation
page read and write
292F5660000
heap
page read and write
C96000
unkown
page execute and read and write
4601000
heap
page read and write
1379E937000
trusted library allocation
page read and write
137A6903000
trusted library allocation
page read and write
137A8F3E000
trusted library allocation
page read and write
1379ED03000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
4753000
trusted library allocation
page execute and read and write
453E000
stack
page read and write
137A6395000
trusted library allocation
page read and write
2311E52F000
heap
page read and write
A46000
unkown
page execute and write copy
49C0000
direct allocation
page read and write
1379A867000
trusted library allocation
page read and write
1A0BD215000
trusted library allocation
page read and write
137A1BCB000
trusted library allocation
page read and write
CD4000
heap
page read and write
1379EF00000
trusted library allocation
page read and write
2311E003000
trusted library allocation
page read and write
5F5F000
trusted library allocation
page read and write
2311E523000
heap
page read and write
4C81000
heap
page read and write
13795566000
heap
page read and write
2311E4A0000
heap
page read and write
4AB000
unkown
page write copy
1333000
heap
page read and write
1D836EB3000
trusted library allocation
page read and write
E0A000
heap
page read and write
3CCF000
stack
page read and write
59AD000
stack
page read and write
CD4000
heap
page read and write
E04000
heap
page read and write
59DB000
trusted library allocation
page read and write
10F4000
heap
page read and write
1A0BC5E2000
trusted library allocation
page read and write
13795565000
heap
page read and write
137A6654000
trusted library allocation
page read and write
137A69CE000
trusted library allocation
page read and write
1379EDED000
trusted library allocation
page read and write
1A0BF700000
trusted library allocation
page read and write
1379EAE7000
trusted library allocation
page read and write
137A69C9000
trusted library allocation
page read and write
137A63E5000
trusted library allocation
page read and write
1379E3B8000
trusted library allocation
page read and write
13795537000
heap
page read and write
1A0BFAF2000
trusted library allocation
page read and write
5A91000
trusted library allocation
page read and write
137A6789000
trusted library allocation
page read and write
4601000
heap
page read and write
4C81000
heap
page read and write
13795536000
heap
page read and write
137A90B8000
trusted library allocation
page read and write
52B4000
trusted library allocation
page read and write
137A0098000
trusted library allocation
page read and write
5EC897E000
stack
page read and write
13795588000
heap
page read and write
137A6200000
trusted library allocation
page read and write
10E8000
heap
page read and write
55A0000
direct allocation
page execute and read and write
48CF000
stack
page read and write
1379DF46000
trusted library allocation
page read and write
137A8F33000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
5EC4DFF000
stack
page read and write
137A61FA000
trusted library allocation
page read and write
1379E3B1000
trusted library allocation
page read and write
1A0BC3D7000
trusted library allocation
page read and write
137A6715000
trusted library allocation
page read and write
1379F708000
trusted library allocation
page read and write
5A99000
trusted library allocation
page read and write
137A1BCB000
trusted library allocation
page read and write
D54000
heap
page read and write
292F7258000
heap
page read and write
161E000
stack
page read and write
137A0E03000
trusted library allocation
page read and write
382E000
stack
page read and write
4B71000
heap
page read and write
1A0B0820000
trusted library allocation
page read and write
55D0000
direct allocation
page execute and read and write
137A11BA000
trusted library allocation
page read and write
1379F6F3000
trusted library allocation
page read and write
4610000
heap
page read and write
11A4000
heap
page read and write
45A0000
direct allocation
page read and write
1379F4D2000
trusted library allocation
page read and write
1379EA5B000
trusted library allocation
page read and write
129D000
unkown
page execute and write copy
47B1000
heap
page read and write
292F7240000
heap
page read and write
E04000
heap
page read and write
32E0000
direct allocation
page read and write
1379EDD7000
trusted library allocation
page read and write
137A0388000
trusted library allocation
page read and write
137A6189000
trusted library allocation
page read and write
2311D876000
trusted library allocation
page read and write
10C3000
heap
page read and write
137A605B000
trusted library allocation
page read and write
137A62A5000
trusted library allocation
page read and write
CD4000
heap
page read and write
191000
unkown
page execute and read and write
137A1BA8000
trusted library allocation
page read and write
13795510000
heap
page read and write
1A0BC5CE000
trusted library allocation
page read and write
2311E48D000
heap
page read and write
1B3F000
stack
page read and write
107E000
heap
page read and write
137A108E000
trusted library allocation
page read and write
1379558B000
heap
page read and write
1804BF3D000
trusted library allocation
page read and write
1379A9C3000
trusted library allocation
page read and write
1A0BC800000
trusted library allocation
page read and write
1379F100000
trusted library allocation
page read and write
137A02E9000
trusted library allocation
page read and write
137A0032000
trusted library allocation
page read and write
D70000
unkown
page write copy
502D000
stack
page read and write
1238000
unkown
page execute and write copy
445E000
stack
page read and write
1379EA86000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
1CD3E000
stack
page read and write
1A0BC1DF000
trusted library allocation
page read and write
1D836E67000
trusted library allocation
page read and write
1379DF85000
trusted library allocation
page read and write
1300000
unkown
page execute and write copy
137A61B6000
trusted library allocation
page read and write
137A6954000
trusted library allocation
page read and write
1379F44B000
trusted library allocation
page read and write
1D836EEF000
trusted library allocation
page read and write
4601000
heap
page read and write
53E0000
direct allocation
page execute and read and write
1379557B000
heap
page read and write
E57000
heap
page read and write
137A9257000
trusted library allocation
page read and write
167A000
heap
page read and write
137A1BF8000
trusted library allocation
page read and write
1379555D000
heap
page read and write
4C0E000
stack
page read and write
5F58000
trusted library allocation
page read and write
BF4000
heap
page read and write
1A0BF745000
trusted library allocation
page read and write
3A80000
trusted library allocation
page read and write
1379A577000
trusted library allocation
page read and write
2A554430000
heap
page read and write
2B856EB00000
trusted library allocation
page read and write
1A0BD408000
trusted library allocation
page read and write
4B71000
heap
page read and write
5AB1000
trusted library allocation
page read and write
431E000
stack
page read and write
13795562000
heap
page read and write
137A02AE000
trusted library allocation
page read and write
1D836EC9000
trusted library allocation
page read and write
5410000
direct allocation
page read and write
45CE000
stack
page read and write
137A61ED000
trusted library allocation
page read and write
13795510000
heap
page read and write
2311D823000
trusted library allocation
page read and write
2FE0000
direct allocation
page execute and read and write
137A9026000
trusted library allocation
page read and write
1379EACE000
trusted library allocation
page read and write
172B000
heap
page read and write
82F000
stack
page read and write
31FF000
stack
page read and write
D50000
heap
page read and write
137A1BC3000
trusted library allocation
page read and write
1379551C000
heap
page read and write
1379E965000
trusted library allocation
page read and write
1A0BD29A000
trusted library allocation
page read and write
16E5000
heap
page read and write
323F000
stack
page read and write
1379E76C000
trusted library allocation
page read and write
5CA4000
trusted library allocation
page read and write
1379C474000
trusted library allocation
page read and write
5E34000
trusted library allocation
page read and write
137A026C000
trusted library allocation
page read and write
12A3000
unkown
page execute and read and write
137A623D000
trusted library allocation
page read and write
137A1003000
trusted library allocation
page read and write
1378E600000
trusted library allocation
page read and write
137A02DB000
trusted library allocation
page read and write
4601000
heap
page read and write
14A5000
unkown
page execute and write copy
BF4000
heap
page read and write
12C0000
direct allocation
page read and write
137A0B4F000
trusted library allocation
page read and write
1379C469000
trusted library allocation
page read and write
137A0D49000
trusted library allocation
page read and write
2E4ABAB000
stack
page read and write
1A0BC803000
trusted library allocation
page read and write
5E35000
trusted library allocation
page read and write
34EF000
stack
page read and write
1379E8E0000
trusted library section
page read and write
DD4000
heap
page read and write
623B000
trusted library allocation
page read and write
137A054E000
trusted library allocation
page read and write
137A01EC000
trusted library allocation
page read and write
1379F96D000
unclassified section
page read and write
4A6E000
stack
page read and write
5F7B000
trusted library allocation
page read and write
562000
unkown
page read and write
13795553000
heap
page read and write
137A058C000
trusted library allocation
page read and write
4C81000
heap
page read and write
6F5E000
stack
page read and write
4601000
heap
page read and write
7C5000
unkown
page execute and read and write
1379E99C000
trusted library allocation
page read and write
DCE000
stack
page read and write
1379F4D8000
trusted library allocation
page read and write
CD4000
heap
page read and write
1379FB19000
trusted library allocation
page read and write
D54000
heap
page read and write
BF4000
heap
page read and write
BAE000
heap
page read and write
1379EA86000
trusted library allocation
page read and write
137A60A5000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
10F4000
heap
page read and write
10C7000
heap
page read and write
1A0B0880000
heap
page read and write
1379C44D000
trusted library allocation
page read and write
1A0BC1CE000
trusted library allocation
page read and write
9756FFD000
stack
page read and write
E8A000
heap
page read and write
13795510000
heap
page read and write
137A62C9000
trusted library allocation
page read and write
1379A00F000
trusted library allocation
page read and write
10F4000
heap
page read and write
1F4000
heap
page read and write
292F56B0000
heap
page read and write
13AA000
heap
page read and write
3CAE000
stack
page read and write
137A61E3000
trusted library allocation
page read and write
16CC000
heap
page read and write
1379EAB9000
trusted library allocation
page read and write
1379A9E3000
trusted library allocation
page read and write
E49000
unkown
page write copy
4F9000
stack
page read and write
4F31000
heap
page read and write
13799F45000
trusted library allocation
page read and write
13795564000
heap
page read and write
1D836F33000
trusted library allocation
page read and write
137A1000000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
1379E785000
trusted library allocation
page read and write
E04000
heap
page read and write
1CE9E000
stack
page read and write
368F000
stack
page read and write
137A036C000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
CD4000
heap
page read and write
137A032D000
trusted library allocation
page read and write
1379E38A000
trusted library allocation
page read and write
137A0690000
trusted library allocation
page read and write
E04000
heap
page read and write
137A9080000
trusted library allocation
page read and write
CD4000
heap
page read and write
3C4F000
stack
page read and write
163C000
stack
page read and write
1379EFA7000
trusted library allocation
page read and write
F6D000
heap
page read and write
538F000
stack
page read and write
7260000
heap
page read and write
332E000
stack
page read and write
137A0394000
trusted library allocation
page read and write
4C81000
heap
page read and write
57F000
heap
page read and write
1379FED3000
trusted library allocation
page read and write
1A0BC5E2000
trusted library allocation
page read and write
5EEB000
trusted library allocation
page read and write
1100000
unkown
page execute and write copy
1B07E000
stack
page read and write
2ADE000
stack
page read and write
1379A8E3000
trusted library allocation
page read and write
1379E98A000
trusted library allocation
page read and write
46EF000
stack
page read and write
1A0BF603000
trusted library allocation
page read and write
4601000
heap
page read and write
137A8F42000
trusted library allocation
page read and write
5E31000
trusted library allocation
page read and write
A32000
unkown
page execute and write copy
1379FFB4000
trusted library allocation
page read and write
13795572000
heap
page read and write
BB3000
heap
page read and write
5EDC000
trusted library allocation
page read and write
E04000
heap
page read and write
1379E3E2000
trusted library allocation
page read and write
137A69C7000
trusted library allocation
page read and write
1379EAA0000
trusted library allocation
page read and write
5EC607B000
stack
page read and write
5CF5000
trusted library allocation
page read and write
1379FE9D000
trusted library allocation
page read and write
1B1BE000
stack
page read and write
E04000
heap
page read and write
1272000
unkown
page execute and write copy
137A0000000
trusted library allocation
page read and write
4C81000
heap
page read and write
1379BE08000
trusted library allocation
page read and write
137A0E9B000
trusted library allocation
page read and write
1379557F000
heap
page read and write
1379F4CF000
trusted library allocation
page read and write
137A623B000
trusted library allocation
page read and write
2311D560000
heap
page read and write
4C81000
heap
page read and write
1A0BC5BD000
trusted library allocation
page read and write
603C000
trusted library allocation
page read and write
4B71000
heap
page read and write
43FE000
stack
page read and write
5A30000
trusted library allocation
page read and write
FE0000
unkown
page readonly
1F4000
heap
page read and write
13795553000
heap
page read and write
137A0157000
trusted library allocation
page read and write
1379FE00000
trusted library allocation
page read and write
1379F9F0000
trusted library section
page readonly
1379550E000
heap
page read and write
1379A526000
trusted library allocation
page read and write
13795553000
heap
page read and write
1379E99C000
trusted library allocation
page read and write
59BA000
trusted library allocation
page read and write
1379F6AF000
trusted library allocation
page read and write
13795535000
heap
page read and write
5AD3000
trusted library allocation
page read and write
1A0BCAE8000
trusted library allocation
page read and write
13795553000
heap
page read and write
16BF000
heap
page read and write
5AB1000
trusted library allocation
page read and write
E2A000
heap
page read and write
137A8F45000
trusted library allocation
page read and write
1379F4E0000
trusted library allocation
page read and write
A20000
heap
page read and write
137A91A1000
trusted library allocation
page read and write
1379EFEF000
trusted library allocation
page read and write
1A0BF741000
trusted library allocation
page read and write
1379F003000
trusted library allocation
page read and write
2311E5B7000
heap
page read and write
F85000
heap
page read and write
2FBE000
stack
page read and write
13795560000
heap
page read and write
C93000
unkown
page execute and read and write
B44000
heap
page read and write
B20000
heap
page read and write
1379BF14000
trusted library allocation
page read and write
45C0000
heap
page read and write
1A0BC203000
trusted library allocation
page read and write
590E000
stack
page read and write
4DBF000
stack
page read and write
3A1F000
stack
page read and write
137A114D000
trusted library allocation
page read and write
2311E561000
heap
page read and write
1A0BC916000
trusted library allocation
page read and write
10C7000
heap
page read and write
1A0B0BD7000
trusted library allocation
page read and write
45A0000
direct allocation
page read and write
2250CC504000
trusted library allocation
page read and write
137A6A2B000
trusted library allocation
page read and write
59D4000
trusted library allocation
page read and write
3FAE000
stack
page read and write
13799E03000
trusted library allocation
page read and write
1378E8FE000
trusted library allocation
page read and write
5280000
direct allocation
page execute and read and write
CD5000
heap
page read and write
13B0000
heap
page read and write
13795525000
heap
page read and write
137A1BD3000
trusted library allocation
page read and write
137A9D00000
trusted library allocation
page read and write
E04000
heap
page read and write
1A0BFC97000
trusted library allocation
page read and write
D7E000
stack
page read and write
5E33000
trusted library allocation
page read and write
CD4000
heap
page read and write
1A0B2425000
heap
page read and write
137A62B5000
trusted library allocation
page read and write
5520000
direct allocation
page execute and read and write
5AA1000
trusted library allocation
page read and write
1379C4B9000
trusted library allocation
page read and write
137A1054000
trusted library allocation
page read and write
1A0BC227000
trusted library allocation
page read and write
137A8F3E000
trusted library allocation
page read and write
1379F10B000
trusted library allocation
page read and write
137A033B000
trusted library allocation
page read and write
1379EFA3000
trusted library allocation
page read and write
1333000
heap
page read and write
5590000
direct allocation
page execute and read and write
137A6A00000
trusted library allocation
page read and write
13795525000
heap
page read and write
1379552D000
heap
page read and write
5E38000
trusted library allocation
page read and write
13E0000
direct allocation
page execute and read and write
2311DEC9000
unkown
page execute read
CFE000
stack
page read and write
1379A0FC000
trusted library allocation
page read and write
2311E52F000
heap
page read and write
1A0B0AA2000
unclassified section
page read and write
545272D000
stack
page read and write
1379EAB0000
trusted library allocation
page read and write
2D5E000
stack
page read and write
5EC339E000
stack
page read and write
1726000
heap
page read and write
1A0BD2C8000
trusted library allocation
page read and write
137A01AD000
trusted library allocation
page read and write
1379557E000
heap
page read and write
5A30000
trusted library allocation
page read and write
2E545DD000
stack
page read and write
33BE000
stack
page read and write
59AD000
trusted library allocation
page read and write
DD4000
heap
page read and write
137A8F00000
trusted library allocation
page read and write
CEC000
unkown
page execute and write copy
137A0CF6000
trusted library allocation
page read and write
5EC77BE000
stack
page read and write
1379C489000
trusted library allocation
page read and write
45A0000
direct allocation
page read and write
137A67AD000
trusted library allocation
page read and write
137A021A000
trusted library allocation
page read and write
1379F355000
trusted library allocation
page read and write
13795537000
heap
page read and write
13A5000
heap
page read and write
2D0000
unkown
page readonly
4B71000
heap
page read and write
1A0BF5E5000
trusted library allocation
page read and write
EF4000
heap
page read and write
2311D500000
heap
page read and write
1379E12B000
trusted library allocation
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
1A0BC395000
trusted library allocation
page read and write
6E5F000
stack
page read and write
137A69FC000
trusted library allocation
page read and write
46AE000
stack
page read and write
137A0370000
trusted library allocation
page read and write
4B71000
heap
page read and write
42DF000
stack
page read and write
1A0BF9DA000
trusted library allocation
page read and write
137A1BC3000
trusted library allocation
page read and write
CD4000
heap
page read and write
DD4000
heap
page read and write
137A6663000
trusted library allocation
page read and write
414F000
stack
page read and write
5AA1000
trusted library allocation
page read and write
137A003B000
trusted library allocation
page read and write
4C81000
heap
page read and write
1379551C000
heap
page read and write
13795574000
heap
page read and write
137A62B5000
trusted library allocation
page read and write
137A69F8000
trusted library allocation
page read and write
5791000
trusted library allocation
page read and write
401E000
stack
page read and write
137A69E2000
trusted library allocation
page read and write
4C00000
direct allocation
page execute and read and write
4B71000
heap
page read and write
1379EDDC000
trusted library allocation
page read and write
137A90B2000
trusted library allocation
page read and write
DD0000
direct allocation
page read and write
1D05E000
stack
page read and write
1379FF00000
trusted library allocation
page read and write
4C81000
heap
page read and write
5AB1000
trusted library allocation
page read and write
1A0BC26D000
trusted library allocation
page read and write
DF0000
heap
page read and write
5EC797E000
stack
page read and write
D24000
heap
page read and write
D54000
heap
page read and write
5E32000
trusted library allocation
page read and write
34DE000
stack
page read and write
C10000
heap
page read and write
EA8000
heap
page read and write
1303000
unkown
page execute and write copy
4F91000
heap
page read and write
E6B61FF000
stack
page read and write
4601000
heap
page read and write
1A0B24E0000
heap
page read and write
1266000
unkown
page execute and write copy
5A68000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
13795553000
heap
page read and write
1379551C000
heap
page read and write
BF4000
heap
page read and write
3A0E000
stack
page read and write
13795566000
heap
page read and write
E6B59FF000
stack
page read and write
52A000
heap
page read and write
137A69C9000
trusted library allocation
page read and write
12F3000
unkown
page execute and write copy
59BE000
trusted library allocation
page read and write
137A0053000
trusted library allocation
page read and write
B2E000
stack
page read and write
4E50000
remote allocation
page read and write
49D1000
heap
page read and write
137A0740000
trusted library section
page readonly
32E0000
direct allocation
page read and write
137A63F4000
trusted library allocation
page read and write
5560000
heap
page read and write
1379FB43000
trusted library allocation
page read and write
5B7000
heap
page read and write
5A30000
trusted library allocation
page read and write
11A4000
heap
page read and write
4C81000
heap
page read and write
5AA9000
trusted library allocation
page read and write
4D0F000
stack
page read and write
2311D690000
trusted library section
page readonly
5E33000
trusted library allocation
page read and write
16F8000
heap
page read and write
1225000
unkown
page execute and read and write
5090000
direct allocation
page execute and read and write
137A6240000
trusted library allocation
page read and write
1379EAB6000
trusted library allocation
page read and write
1379553B000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
5E37000
trusted library allocation
page read and write
4B71000
heap
page read and write
1379E1CB000
trusted library allocation
page read and write
1379EC00000
trusted library allocation
page read and write
5ECC7DC000
stack
page read and write
6F2C000
stack
page read and write
281F000
stack
page read and write
1379558D000
heap
page read and write
137A69C7000
trusted library allocation
page read and write
137A10BF000
trusted library allocation
page read and write
14A5000
unkown
page execute and write copy
DBE000
stack
page read and write
13CE000
heap
page read and write
52D5000
trusted library allocation
page read and write
137A10B1000
trusted library allocation
page read and write
137A69E0000
trusted library allocation
page read and write
1804BBB0000
heap
page read and write
FAA4431000
trusted library allocation
page execute read
DD4000
heap
page read and write
2E50DFE000
stack
page read and write
3C6F000
stack
page read and write
2E5469B000
stack
page read and write
137A1BB1000
trusted library allocation
page read and write
137A064B000
trusted library allocation
page read and write
4DD0000
direct allocation
page execute and read and write
5A19000
trusted library allocation
page read and write
1379E99C000
trusted library allocation
page read and write
5B1000
unkown
page execute and write copy
1379EABC000
trusted library allocation
page read and write
1A0B0890000
heap
page read and write
1AC1F000
stack
page read and write
1A0BC19E000
trusted library allocation
page read and write
249FBEE3000
heap
page read and write
1379552C000
heap
page read and write
5A93000
trusted library allocation
page read and write
1A0BC100000
trusted library allocation
page read and write
5AC9000
trusted library allocation
page read and write
137A06EE000
trusted library allocation
page read and write
137A6295000
trusted library allocation
page read and write
49C0000
direct allocation
page read and write
137A6016000
trusted library allocation
page read and write
137A0CA1000
trusted library allocation
page read and write
137A055C000
trusted library allocation
page read and write
137A6700000
trusted library allocation
page read and write
1A0BD28F000
trusted library allocation
page read and write
13799F03000
trusted library allocation
page read and write
1A0BF8FD000
trusted library allocation
page read and write
CD4000
heap
page read and write
5A51000
trusted library allocation
page read and write
1A0BC1C3000
trusted library allocation
page read and write
1379556F000
heap
page read and write
4C30000
direct allocation
page read and write
1399DD00000
trusted library section
page readonly
137A8F5D000
trusted library allocation
page read and write
1D836F1D000
trusted library allocation
page read and write
137A63C3000
trusted library allocation
page read and write
120F000
unkown
page execute and write copy
1379E38C000
trusted library allocation
page read and write
4C81000
heap
page read and write
1379EAAF000
trusted library allocation
page read and write
137A013A000
trusted library allocation
page read and write
13795583000
heap
page read and write
D24000
heap
page read and write
52AE000
stack
page read and write
1379F2E1000
trusted library allocation
page read and write
1379DF23000
trusted library allocation
page read and write
5AA9000
trusted library allocation
page read and write
137A6274000
trusted library allocation
page read and write
43BF000
stack
page read and write
5F31000
trusted library allocation
page read and write
10FF000
unkown
page execute and read and write
4B71000
heap
page read and write
1A0BD300000
trusted library allocation
page read and write
DD4000
heap
page read and write
137A0204000
trusted library allocation
page read and write
137A0380000
trusted library allocation
page read and write
13795553000
heap
page read and write
137A104C000
trusted library allocation
page read and write
1D836E5D000
trusted library allocation
page read and write
1A0BC2D1000
trusted library allocation
page read and write
DD4000
heap
page read and write
29C0000
direct allocation
page read and write
137A0F03000
trusted library allocation
page read and write
1379B7FC000
trusted library allocation
page read and write
11DE000
unkown
page execute and read and write
4601000
heap
page read and write
1379DD54000
trusted library allocation
page read and write
137A10A4000
trusted library allocation
page read and write
1264000
unkown
page execute and write copy
137A02B4000
trusted library allocation
page read and write
1CBBF000
stack
page read and write
1A0BC51E000
trusted library allocation
page read and write
137A0394000
trusted library allocation
page read and write
1D836E47000
trusted library allocation
page read and write
1A0BD251000
trusted library allocation
page read and write
137A9902000
trusted library allocation
page read and write
1379C411000
trusted library allocation
page read and write
CD4000
heap
page read and write
4C70000
direct allocation
page read and write
1CF1D000
stack
page read and write
1A0BC23F000
trusted library allocation
page read and write
CEC000
unkown
page execute and read and write
137A6310000
trusted library allocation
page read and write
137A922E000
trusted library allocation
page read and write
4C81000
heap
page read and write
137A0F6E000
trusted library allocation
page read and write
2311D940000
heap
page read and write
1266000
unkown
page execute and write copy
3DAF000
stack
page read and write
137A0193000
trusted library allocation
page read and write
2E4EDFE000
stack
page read and write
137A67AD000
trusted library allocation
page read and write
137A300C000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
4A60000
heap
page read and write
1A0BF8DF000
trusted library allocation
page read and write
137A1BCF000
trusted library allocation
page read and write
4BCF000
stack
page read and write
D24000
heap
page read and write
1379B5E2000
trusted library allocation
page read and write
7AF000
unkown
page execute and read and write
38EE000
stack
page read and write
D24000
heap
page read and write
2E5415B000
stack
page read and write
1379ED46000
trusted library allocation
page read and write
32E0000
direct allocation
page read and write
1379A885000
trusted library allocation
page read and write
1379EAC3000
trusted library allocation
page read and write
1315000
heap
page read and write
137A91ED000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
1379FB03000
trusted library allocation
page read and write
FAA4421000
trusted library allocation
page execute read
249FBED7000
heap
page read and write
3B3E000
stack
page read and write
1379EE6A000
trusted library allocation
page read and write
5590000
direct allocation
page execute and read and write
2311D420000
unclassified section
page readonly
2E5445C000
stack
page read and write
1A0BC513000
trusted library allocation
page read and write
1379A403000
trusted library allocation
page read and write
4ABB000
stack
page read and write
DD4000
heap
page read and write
2311D848000
trusted library allocation
page read and write
137A63CE000
trusted library allocation
page read and write
328E000
stack
page read and write
E04000
heap
page read and write
1379E022000
trusted library allocation
page read and write
2E5381C000
stack
page read and write
137A6999000
trusted library allocation
page read and write
137A63B7000
trusted library allocation
page read and write
1A0B0B11000
trusted library allocation
page read and write
137A02E6000
trusted library allocation
page read and write
137A0B72000
trusted library allocation
page read and write
D24000
heap
page read and write
137A0FD9000
trusted library allocation
page read and write
5E33000
trusted library allocation
page read and write
FE0000
unkown
page read and write
1379E938000
trusted library allocation
page read and write
137A02B0000
trusted library allocation
page read and write
1B2BF000
stack
page read and write
4F20000
direct allocation
page read and write
1A0B23E8000
heap
page read and write
13795530000
heap
page read and write
137A92DA000
trusted library allocation
page read and write
CD4000
heap
page read and write
BF4000
heap
page read and write
13795579000
heap
page read and write
402F000
stack
page read and write
137A69E0000
trusted library allocation
page read and write
137A66D4000
trusted library allocation
page read and write
2E5385E000
stack
page read and write
71BF000
stack
page read and write
1A0BFC40000
trusted library allocation
page read and write
DA0000
heap
page read and write
1804BF00000
trusted library allocation
page read and write
1804BC50000
heap
page readonly
1F4000
heap
page read and write
2E5421F000
stack
page read and write
137A90C8000
trusted library allocation
page read and write
10D1000
heap
page read and write
1379551C000
heap
page read and write
465E000
stack
page read and write
2E561EF000
stack
page read and write
137A636B000
trusted library allocation
page read and write
137A619F000
trusted library allocation
page read and write
5110000
direct allocation
page read and write
4C8F000
stack
page read and write
137A9125000
trusted library allocation
page read and write
1A0BC8F0000
trusted library allocation
page read and write
1379EF37000
trusted library allocation
page read and write
1379E0EE000
trusted library allocation
page read and write
13795581000
heap
page read and write
D24000
heap
page read and write
137A02D3000
trusted library allocation
page read and write
1379DF48000
trusted library allocation
page read and write
D24000
heap
page read and write
1379556F000
heap
page read and write
137A8F33000
trusted library allocation
page read and write
59BC000
trusted library allocation
page read and write
47B1000
heap
page read and write
137A63D7000
trusted library allocation
page read and write
340F000
stack
page read and write
1379554E000
heap
page read and write
174E000
heap
page read and write
27D0000
direct allocation
page read and write
137A67D7000
trusted library allocation
page read and write
13799DF4000
heap
page read and write
CA1000
unkown
page execute read
3B4E000
stack
page read and write
47E1000
heap
page read and write
137A015E000
trusted library allocation
page read and write
1379DDC5000
trusted library allocation
page read and write
1050000
unkown
page execute and write copy
BF4000
heap
page read and write
CD4000
heap
page read and write
5B8D000
trusted library allocation
page read and write
13799E4A000
trusted library allocation
page read and write
137A619F000
trusted library allocation
page read and write
1379E959000
trusted library allocation
page read and write
137A61FA000
trusted library allocation
page read and write
BF4000
heap
page read and write
1379C421000
trusted library allocation
page read and write
FD0000
heap
page read and write
3EA1000
heap
page read and write
137A0394000
trusted library allocation
page read and write
4E8E000
stack
page read and write
5A2E000
trusted library allocation
page read and write
4770000
trusted library allocation
page read and write
1379ED1B000
trusted library allocation
page read and write
362F000
stack
page read and write
137A067E000
trusted library allocation
page read and write
CD4000
heap
page read and write
11A4000
heap
page read and write
137A6237000
trusted library allocation
page read and write
5B09000
trusted library allocation
page read and write
4F30000
direct allocation
page read and write
137A9157000
trusted library allocation
page read and write
1379F32E000
trusted library allocation
page read and write
4AB1000
heap
page read and write
137A6237000
trusted library allocation
page read and write
137A1015000
trusted library allocation
page read and write
5EC693E000
stack
page read and write
1CE1D000
stack
page read and write
10E2000
heap
page read and write
137A63F4000
trusted library allocation
page read and write
1379E000000
trusted library allocation
page read and write
1A0B2420000
heap
page read and write
10CB000
heap
page read and write
137A63CE000
trusted library allocation
page read and write
137A01A5000
trusted library allocation
page read and write
137A0365000
trusted library allocation
page read and write
4DE1000
heap
page read and write
137A013D000
trusted library allocation
page read and write
137A02E4000
trusted library allocation
page read and write
13795533000
heap
page read and write
1D836E96000
trusted library allocation
page read and write
2311E523000
heap
page read and write
4B71000
heap
page read and write
1A0B0870000
trusted library allocation
page execute read
9F0000
heap
page read and write
1804BE7A000
trusted library allocation
page read and write
1379F217000
trusted library allocation
page read and write
301F000
stack
page read and write
366E000
stack
page read and write
1379E577000
trusted library allocation
page read and write
49E000
unkown
page readonly
3B50000
heap
page read and write
529C000
stack
page read and write
1A0BCACF000
trusted library allocation
page read and write
1379E5F4000
trusted library allocation
page read and write
1379FD03000
trusted library allocation
page read and write
11D6000
unkown
page execute and read and write
1379EE00000
trusted library allocation
page read and write
5310000
direct allocation
page execute and read and write
59BF000
trusted library allocation
page read and write
2E568B7000
stack
page read and write
137A02CE000
trusted library allocation
page read and write
137A8F3C000
trusted library allocation
page read and write
4B7E000
stack
page read and write
5AB1000
trusted library allocation
page read and write
1379E9A2000
trusted library allocation
page read and write
53C3000
trusted library allocation
page read and write
137A61E7000
trusted library allocation
page read and write
406E000
stack
page read and write
1379B935000
heap
page read and write
124D000
unkown
page execute and read and write
1379E333000
trusted library allocation
page read and write
1804BC66000
heap
page read and write
137A6244000
trusted library allocation
page read and write
415E000
stack
page read and write
1A0BC2AD000
trusted library allocation
page read and write
1379EAE9000
trusted library allocation
page read and write
137A9062000
trusted library allocation
page read and write
CD4000
heap
page read and write
1379556A000
heap
page read and write
137A02AE000
trusted library allocation
page read and write
3B2F000
stack
page read and write
249FBE80000
heap
page read and write
11B5000
unkown
page execute and read and write
137A8F9C000
trusted library allocation
page read and write
5ED2000
trusted library allocation
page read and write
137A0D61000
trusted library allocation
page read and write
1379FF3F000
trusted library allocation
page read and write
1A0BC19E000
trusted library allocation
page read and write
117F000
stack
page read and write
4A80000
direct allocation
page read and write
CD4000
heap
page read and write
480000
unkown
page readonly
137A69E8000
trusted library allocation
page read and write
E0D000
heap
page read and write
56EE000
stack
page read and write
FB0000
direct allocation
page read and write
50B0000
direct allocation
page execute and read and write
1A0BFCA2000
trusted library allocation
page read and write
1379CA00000
heap
page read and write
3FDF000
stack
page read and write
1379557E000
heap
page read and write
556F000
stack
page read and write
4F20000
direct allocation
page read and write
1378E847000
trusted library allocation
page read and write
6C3C000
stack
page read and write
137A9028000
trusted library allocation
page read and write
4601000
heap
page read and write
137A1137000
trusted library allocation
page read and write
137A0370000
trusted library allocation
page read and write
4601000
heap
page read and write
1379EAD6000
trusted library allocation
page read and write
4601000
heap
page read and write
137A0372000
trusted library allocation
page read and write
323E000
stack
page read and write
1D8369F0000
heap
page read and write
1804BE63000
trusted library allocation
page read and write
5080000
direct allocation
page execute and read and write
4C81000
heap
page read and write
45A0000
direct allocation
page read and write
137A0EE4000
trusted library allocation
page read and write
5A98000
trusted library allocation
page read and write
1A0B246A000
heap
page read and write
122E000
stack
page read and write
CD4000
heap
page read and write
5A2F000
trusted library allocation
page read and write
5E3C000
trusted library allocation
page read and write
2DDE000
stack
page read and write
137A1052000
trusted library allocation
page read and write
5F4C000
trusted library allocation
page read and write
1379DF8D000
trusted library allocation
page read and write
4760000
trusted library allocation
page read and write
354F000
stack
page read and write
137A0E84000
trusted library allocation
page read and write
1379556A000
heap
page read and write
137A0E71000
trusted library allocation
page read and write
1303000
unkown
page execute and write copy
137A0536000
trusted library allocation
page read and write
137A0256000
trusted library allocation
page read and write
137A0191000
trusted library allocation
page read and write
137A02DB000
trusted library allocation
page read and write
1379DFFE000
trusted library allocation
page read and write
1379554F000
heap
page read and write
1379557A000
heap
page read and write
137A05F5000
trusted library allocation
page read and write
1379F263000
trusted library allocation
page read and write
1379A87C000
trusted library allocation
page read and write
137A90E7000
trusted library allocation
page read and write
1F4000
heap
page read and write
137A91FA000
trusted library allocation
page read and write
4F91000
heap
page read and write
1A0B2485000
heap
page read and write
1A0BC88D000
trusted library allocation
page read and write
E1000
unkown
page execute and write copy
EF4000
heap
page read and write
1379DF5B000
trusted library allocation
page read and write
ED7000
heap
page read and write
4B71000
heap
page read and write
1379A526000
trusted library allocation
page read and write
1379E3B8000
trusted library allocation
page read and write
2E536FE000
stack
page read and write
137A1C00000
trusted library allocation
page read and write
CD4000
heap
page read and write
1A0BF923000
trusted library allocation
page read and write
4B71000
heap
page read and write
1379DF16000
trusted library allocation
page read and write
1379FE9D000
trusted library allocation
page read and write
4A40000
trusted library allocation
page read and write
4601000
heap
page read and write
16E8000
heap
page read and write
137A0372000
trusted library allocation
page read and write
55C0000
direct allocation
page execute and read and write
137A2E02000
trusted library allocation
page read and write
BF4000
heap
page read and write
1379E799000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
1379BC0D000
trusted library allocation
page read and write
BDE000
stack
page read and write
5E3D000
trusted library allocation
page read and write
D24000
heap
page read and write
326F000
stack
page read and write
1A0BC89B000
trusted library allocation
page read and write
1379EAE2000
trusted library allocation
page read and write
2311E4EA000
heap
page read and write
C6D000
unkown
page execute and read and write
1379554F000
heap
page read and write
13795535000
heap
page read and write
13AB000
heap
page read and write
4F6E000
stack
page read and write
49D1000
heap
page read and write
137A628C000
trusted library allocation
page read and write
5ECC77E000
stack
page read and write
1AF1E000
stack
page read and write
137A0400000
trusted library allocation
page read and write
137A1BE0000
trusted library allocation
page read and write
137A6938000
trusted library allocation
page read and write
1804BB90000
heap
page read and write
4C81000
heap
page read and write
137A8F1F000
trusted library allocation
page read and write
CD4000
heap
page read and write
1379556F000
heap
page read and write
1265000
unkown
page execute and read and write
1379DB52000
unclassified section
page read and write
1379EAC5000
trusted library allocation
page read and write
1379EC07000
trusted library allocation
page read and write
1379DF03000
trusted library allocation
page read and write
1379F4EE000
trusted library allocation
page read and write
3C1F000
stack
page read and write
CD4000
heap
page read and write
97567FF000
stack
page read and write
1379557A000
heap
page read and write
BF4000
heap
page read and write
1379E362000
trusted library allocation
page read and write
1379551C000
heap
page read and write
5540000
direct allocation
page execute and read and write
1379A3EF000
unclassified section
page read and write
2E4C17E000
stack
page read and write
1D836EA7000
trusted library allocation
page read and write
F68000
heap
page read and write
137A0378000
trusted library allocation
page read and write
137A0C4E000
trusted library allocation
page read and write
4CBE000
stack
page read and write
2DAE000
stack
page read and write
E04000
heap
page read and write
137A6AE8000
trusted library allocation
page read and write
ECB000
heap
page read and write
1A0BF363000
trusted library allocation
page read and write
137A0D95000
trusted library allocation
page read and write
A3C000
stack
page read and write
1379E9A2000
trusted library allocation
page read and write
461F000
stack
page read and write
E04000
heap
page read and write
13799ECD000
trusted library allocation
page read and write
4F91000
heap
page read and write
4601000
heap
page read and write
D24000
heap
page read and write
D20000
heap
page read and write
13795583000
heap
page read and write
1379C4B3000
trusted library allocation
page read and write
337F000
stack
page read and write
5A40000
trusted library allocation
page read and write
D54000
heap
page read and write
13795510000
heap
page read and write
47A0000
trusted library allocation
page read and write
4C81000
heap
page read and write
C5E000
unkown
page execute and read and write
4DC0000
direct allocation
page execute and read and write
137A108B000
trusted library allocation
page read and write
12BB000
unkown
page execute and read and write
CD4000
heap
page read and write
137A61ED000
trusted library allocation
page read and write
5E32000
trusted library allocation
page read and write
4BD0000
direct allocation
page execute and read and write
1CF8E000
stack
page read and write
5D6000
unkown
page execute and write copy
137A62B2000
trusted library allocation
page read and write
1379557B000
heap
page read and write
5AB1000
trusted library allocation
page read and write
1379EACE000
trusted library allocation
page read and write
137A1C66000
trusted library allocation
page read and write
1379E394000
trusted library allocation
page read and write
1300000
unkown
page execute and write copy
1379BF11000
trusted library allocation
page read and write
389CD151000
trusted library allocation
page execute read
137A0153000
trusted library allocation
page read and write
137A01A8000
trusted library allocation
page read and write
5A48000
trusted library allocation
page read and write
3A2E000
stack
page read and write
1379A8BA000
trusted library allocation
page read and write
137A6783000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
F63000
heap
page read and write
1804BE72000
trusted library allocation
page read and write
E42000
unkown
page execute and read and write
4C70000
direct allocation
page read and write
E4B000
heap
page read and write
1379E55F000
trusted library allocation
page read and write
162E000
heap
page read and write
365F000
stack
page read and write
11DC000
unkown
page execute and write copy
3D8F000
stack
page read and write
1379C41E000
trusted library allocation
page read and write
2311D85C000
trusted library allocation
page read and write
137A8800000
trusted library allocation
page read and write
1379FF9C000
trusted library allocation
page read and write
137A0648000
trusted library allocation
page read and write
FB0000
heap
page read and write
137A6981000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
3E7F000
stack
page read and write
1338000
heap
page read and write
F5D000
stack
page read and write
137A6AEA000
trusted library allocation
page read and write
5ECA97D000
stack
page read and write
10F0000
heap
page read and write
2311D8F1000
trusted library allocation
page read and write
5E3D000
trusted library allocation
page read and write
13795567000
heap
page read and write
137A6947000
trusted library allocation
page read and write
2311E531000
heap
page read and write
1379F214000
trusted library allocation
page read and write
666E000
stack
page read and write
47B1000
heap
page read and write
137A004B000
trusted library allocation
page read and write
137A0032000
trusted library allocation
page read and write
12BB000
unkown
page execute and read and write
2E4ABFF000
stack
page read and write
1150000
direct allocation
page read and write
3D9E000
stack
page read and write
CD4000
heap
page read and write
4C81000
heap
page read and write
11A4000
heap
page read and write
FAA4461000
trusted library allocation
page execute read
308E000
stack
page read and write
137A6A2D000
trusted library allocation
page read and write
137A027C000
trusted library allocation
page read and write
1A0BC3CE000
trusted library allocation
page read and write
1379A973000
trusted library allocation
page read and write
9FE000
stack
page read and write
1379556F000
heap
page read and write
173E000
stack
page read and write
5EE5000
trusted library allocation
page read and write
2A7F000
stack
page read and write
137A300A000
trusted library allocation
page read and write
425F000
stack
page read and write
CD4000
heap
page read and write
11A4000
heap
page read and write
1379B91E000
heap
page read and write
137A1087000
trusted library allocation
page read and write
5FBC000
trusted library allocation
page read and write
BF4000
heap
page read and write
4B71000
heap
page read and write
1379556E000
heap
page read and write
1A0BCA92000
trusted library allocation
page read and write
137A037D000
trusted library allocation
page read and write
137A0E29000
trusted library allocation
page read and write
1379FFCC000
trusted library allocation
page read and write
1A991E7000
stack
page read and write
285E000
stack
page read and write
5AB1000
trusted library allocation
page read and write
13795572000
heap
page read and write
13795537000
heap
page read and write
1379E78E000
trusted library allocation
page read and write
2E540DC000
stack
page read and write
C2A000
unkown
page execute and read and write
137A0256000
trusted library allocation
page read and write
5A2F000
trusted library allocation
page read and write
34BF000
stack
page read and write
137A6678000
trusted library allocation
page read and write
E04000
heap
page read and write
4601000
heap
page read and write
137A1BE0000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
4C30000
direct allocation
page read and write
137A69E8000
trusted library allocation
page read and write
489F000
stack
page read and write
3B9E000
stack
page read and write
1379B7C3000
trusted library allocation
page read and write
137A612E000
trusted library allocation
page read and write
137A0153000
trusted library allocation
page read and write
1A0BD271000
trusted library allocation
page read and write
13799E98000
trusted library allocation
page read and write
1A0BCAA4000
trusted library allocation
page read and write
137A1C8B000
trusted library allocation
page read and write
1042000
unkown
page execute and read and write
D24000
heap
page read and write
2A5544E0000
heap
page read and write
2311D810000
trusted library allocation
page read and write
4601000
heap
page read and write
1D49D000
stack
page read and write
8811000
heap
page read and write
5F2D000
trusted library allocation
page read and write
5EC78FC000
stack
page read and write
1A0BC134000
trusted library allocation
page read and write
392F000
stack
page read and write
4DB0000
direct allocation
page execute and read and write
A36000
unkown
page write copy
9BC000
stack
page read and write
13795569000
heap
page read and write
1378E4B0000
trusted library allocation
page read and write
13795540000
heap
page read and write
1379B5CE000
trusted library allocation
page read and write
F6E000
heap
page read and write
4B71000
heap
page read and write
1A0BC92C000
trusted library allocation
page read and write
1379ED53000
trusted library allocation
page read and write
13795565000
heap
page read and write
C73000
unkown
page execute and write copy
2311D6E0000
trusted library allocation
page read and write
55A0000
direct allocation
page execute and read and write
3A80000
trusted library allocation
page read and write
FF0000
unkown
page read and write
137A9279000
trusted library allocation
page read and write
137A69C4000
trusted library allocation
page read and write
137A0383000
trusted library allocation
page read and write
137A91E3000
trusted library allocation
page read and write
D54000
heap
page read and write
1804BEC8000
trusted library allocation
page read and write
1A0BF45F000
trusted library allocation
page read and write
1379FF83000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
137A064B000
trusted library allocation
page read and write
1050000
unkown
page execute and read and write
1379FF9C000
trusted library allocation
page read and write
137A1079000
trusted library allocation
page read and write
1379553E000
heap
page read and write
1A0BF5C0000
trusted library allocation
page read and write
5A98000
trusted library allocation
page read and write
1379E974000
trusted library allocation
page read and write
371F000
stack
page read and write
5C8000
unkown
page execute and read and write
5EDB000
trusted library allocation
page read and write
1379EEFE000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
1A0BF403000
trusted library allocation
page read and write
1A0B23E0000
heap
page read and write
1379DF74000
trusted library allocation
page read and write
137A0372000
trusted library allocation
page read and write
137A69EC000
trusted library allocation
page read and write
2311D700000
trusted library allocation
page read and write
1D836E12000
trusted library allocation
page read and write
1A0BF98A000
trusted library allocation
page read and write
D24000
heap
page read and write
4F91000
heap
page read and write
E7B000
heap
page read and write
137A69FA000
trusted library allocation
page read and write
1379EAEC000
trusted library allocation
page read and write
1379DD23000
trusted library allocation
page read and write
5CD5000
trusted library allocation
page read and write
137A018E000
trusted library allocation
page read and write
1379F362000
trusted library allocation
page read and write
34BE000
stack
page read and write
45B0000
heap
page read and write
1804BF13000
trusted library allocation
page read and write
137A0193000
trusted library allocation
page read and write
292F590A000
trusted library allocation
page read and write
50C0000
heap
page read and write
137A0394000
trusted library allocation
page read and write
5E33000
trusted library allocation
page read and write
1A0BD26E000
trusted library allocation
page read and write
1379E110000
trusted library allocation
page read and write
137A027C000
trusted library allocation
page read and write
1379E9A2000
trusted library allocation
page read and write
606D000
trusted library allocation
page read and write
3B1E000
stack
page read and write
1379E503000
trusted library allocation
page read and write
59AE000
trusted library allocation
page read and write
4601000
heap
page read and write
3A80000
trusted library allocation
page read and write
13799F8A000
trusted library allocation
page read and write
4601000
heap
page read and write
1A0BCA00000
trusted library allocation
page read and write
1379FF55000
trusted library allocation
page read and write
1379EAA0000
trusted library allocation
page read and write
137A015B000
trusted library allocation
page read and write
13795588000
heap
page read and write
2311D944000
heap
page read and write
1A0BF8F4000
trusted library allocation
page read and write
11A4000
heap
page read and write
1379EA7B000
trusted library allocation
page read and write
1379A56A000
trusted library allocation
page read and write
9DC000
stack
page read and write
13795572000
heap
page read and write
10D6000
heap
page read and write
1379E060000
trusted library allocation
page read and write
D2DB3FD000
stack
page read and write
5A51000
trusted library allocation
page read and write
137A0DAB000
trusted library allocation
page read and write
5FAE000
trusted library allocation
page read and write
1A0BFC2A000
trusted library allocation
page read and write
59E3000
trusted library allocation
page read and write
5101000
trusted library allocation
page read and write
E21047E000
unkown
page readonly
1A0B23A0000
heap
page read and write
137A63DC000
trusted library allocation
page read and write
3A80000
trusted library allocation
page read and write
10C6000
heap
page read and write
1379F21F000
trusted library allocation
page read and write
1379E99C000
trusted library allocation
page read and write
1379E500000
trusted library allocation
page read and write
1379C9C0000
trusted library section
page readonly
5AB1000
trusted library allocation
page read and write
2E4DDEE000
stack
page read and write
1A0B24E4000
heap
page read and write
137A648E000
trusted library allocation
page read and write
1A9C57E000
unkown
page readonly
2311D886000
trusted library allocation
page read and write
1379E979000
trusted library allocation
page read and write
1379EA39000
trusted library allocation
page read and write
1379F4D6000
trusted library allocation
page read and write
4C90000
heap
page read and write
5A40000
trusted library allocation
page read and write
1379FEE9000
trusted library allocation
page read and write
1218000
unkown
page execute and write copy
E0D000
heap
page read and write
1379F2A0000
trusted library allocation
page read and write
BE4000
unkown
page execute and read and write
13799E00000
trusted library allocation
page read and write
137A6A03000
trusted library allocation
page read and write
10D6000
heap
page read and write
1379E3AE000
trusted library allocation
page read and write
4B71000
heap
page read and write
4DD0000
heap
page read and write
137A0C7B000
trusted library allocation
page read and write
523D000
stack
page read and write
137A63A3000
trusted library allocation
page read and write
FE1000
unkown
page execute and write copy
1A0B0B60000
trusted library allocation
page read and write
30F0000
heap
page read and write
5C1E000
stack
page read and write
181F000
stack
page read and write
5AA0000
trusted library allocation
page read and write
13795516000
heap
page read and write
5290000
direct allocation
page execute and read and write
137A04EC000
trusted library allocation
page read and write
13795573000
heap
page read and write
120F000
stack
page read and write
137A11D3000
trusted library allocation
page read and write
1379556E000
heap
page read and write
137A0800000
trusted library allocation
page read and write
1379E3AE000
trusted library allocation
page read and write
3A80000
trusted library allocation
page read and write
33E000
unkown
page execute and read and write
137A6AF0000
trusted library allocation
page read and write
2311E57B000
heap
page read and write
137A00C7000
trusted library allocation
page read and write
137A693E000
trusted library allocation
page read and write
137A0641000
trusted library allocation
page read and write
1379EAB3000
trusted library allocation
page read and write
1A0BD24C000
trusted library allocation
page read and write
137A69F8000
trusted library allocation
page read and write
4C81000
heap
page read and write
1379556A000
heap
page read and write
2E543DC000
stack
page read and write
1804BBF0000
heap
page read and write
1A0BC190000
trusted library allocation
page read and write
10AF000
stack
page read and write
376F000
stack
page read and write
137A663B000
trusted library allocation
page read and write
1378E8EC000
trusted library allocation
page read and write
137A0056000
trusted library allocation
page read and write
59C4000
trusted library allocation
page read and write
319E000
stack
page read and write
EC9000
heap
page read and write
D24000
heap
page read and write
1211000
unkown
page execute and read and write
137A69FA000
trusted library allocation
page read and write
123E000
unkown
page execute and read and write
DD4000
heap
page read and write
1A0BC559000
trusted library allocation
page read and write
292F726B000
heap
page read and write
12EB000
unkown
page execute and write copy
1379E573000
trusted library allocation
page read and write
137A6237000
trusted library allocation
page read and write
13799FAD000
trusted library allocation
page read and write
137A036C000
trusted library allocation
page read and write
1379BF0D000
trusted library allocation
page read and write
1379E6C8000
trusted library allocation
page read and write
1A0B0889000
heap
page read and write
4F91000
heap
page read and write
D54000
heap
page read and write
599B000
trusted library allocation
page read and write
4FE0000
direct allocation
page execute and read and write
5EC78BC000
stack
page read and write
137A61F7000
trusted library allocation
page read and write
114F000
stack
page read and write
32E0000
direct allocation
page read and write
137A63D1000
trusted library allocation
page read and write
466F000
stack
page read and write
1379DB5D000
unclassified section
page read and write
4601000
heap
page read and write
137A0650000
trusted library allocation
page read and write
6CA000
unkown
page read and write
137A053A000
trusted library allocation
page read and write
1AA8C000
stack
page read and write
3A80000
trusted library allocation
page read and write
C75000
unkown
page execute and read and write
1379A510000
trusted library allocation
page read and write
137A0F5E000
trusted library allocation
page read and write
C29000
unkown
page execute and write copy
138E000
stack
page read and write
137A1156000
trusted library allocation
page read and write
1AC5E000
stack
page read and write
137A88F4000
trusted library allocation
page read and write
1379BE0D000
trusted library allocation
page read and write
1379E791000
trusted library allocation
page read and write
1379F104000
trusted library allocation
page read and write
DD4000
heap
page read and write
2311E5AE000
heap
page read and write
5AA1000
trusted library allocation
page read and write
10CD000
heap
page read and write
D54000
heap
page read and write
1379DDDC000
trusted library allocation
page read and write
5E34000
trusted library allocation
page read and write
13795562000
heap
page read and write
137A0CA7000
trusted library allocation
page read and write
55B0000
direct allocation
page execute and read and write
13795510000
heap
page read and write
10F4000
heap
page read and write
2E517FA000
stack
page read and write
1D836F3C000
trusted library allocation
page read and write
DD4000
heap
page read and write
137A91D3000
trusted library allocation
page read and write
13795529000
heap
page read and write
1A0BF9F2000
trusted library allocation
page read and write
DD4000
heap
page read and write
1379EAE5000
trusted library allocation
page read and write
5BF000
unkown
page execute and read and write
E2103FE000
unkown
page readonly
DD4000
heap
page read and write
1378E830000
trusted library allocation
page read and write
E6B51FC000
stack
page read and write
4C20000
trusted library allocation
page read and write
1379E1BC000
trusted library allocation
page read and write
59CB000
trusted library allocation
page read and write
1ABDE000
stack
page read and write
137A619B000
trusted library allocation
page read and write
4601000
heap
page read and write
5A2E000
trusted library allocation
page read and write
1379E7DE000
trusted library allocation
page read and write
1079000
heap
page read and write
1D08F000
stack
page read and write
137A69F5000
trusted library allocation
page read and write
137A0316000
trusted library allocation
page read and write
137A69FC000
trusted library allocation
page read and write
13795564000
heap
page read and write
562000
unkown
page read and write
137A9110000
trusted library allocation
page read and write
1379553B000
heap
page read and write
1379DF4A000
trusted library allocation
page read and write
CD4000
heap
page read and write
76D000
unkown
page execute and read and write
1A0B0B6B000
trusted library allocation
page read and write
1379555D000
heap
page read and write
1379556F000
heap
page read and write
1670000
heap
page read and write
137A907A000
trusted library allocation
page read and write
1379F37D000
trusted library allocation
page read and write
1379E187000
trusted library allocation
page read and write
137A0223000
trusted library allocation
page read and write
2C9E000
stack
page read and write
F7F000
heap
page read and write
1272000
unkown
page execute and write copy
E90000
trusted library allocation
page read and write
1379ED37000
trusted library allocation
page read and write
49C0000
direct allocation
page read and write
13795529000
heap
page read and write
2311D82F000
trusted library allocation
page read and write
1A70E000
stack
page read and write
137A6996000
trusted library allocation
page read and write
13795529000
heap
page read and write
D6C000
unkown
page read and write
1A0BC922000
trusted library allocation
page read and write
3B0F000
stack
page read and write
137A92D5000
trusted library allocation
page read and write
1A0BF543000
trusted library allocation
page read and write
396E000
stack
page read and write
11A4000
heap
page read and write
C6DD8E04000
trusted library allocation
page read and write
2311E520000
heap
page read and write
137A0207000
trusted library allocation
page read and write
1379EB03000
trusted library allocation
page read and write
2311E4A4000
heap
page read and write
137A7A00000
trusted library allocation
page read and write
2E54B1F000
stack
page read and write
FE1000
unkown
page execute and write copy
4601000
heap
page read and write
13795533000
heap
page read and write
137A0C62000
trusted library allocation
page read and write
E9F000
heap
page read and write
1379E369000
trusted library allocation
page read and write
13795553000
heap
page read and write
2311E531000
heap
page read and write
10C6000
heap
page read and write
13795575000
heap
page read and write
1F4000
heap
page read and write
1A0BCACF000
trusted library allocation
page read and write
5E34000
trusted library allocation
page read and write
11A4000
heap
page read and write
2311E5B7000
heap
page read and write
137A02CE000
trusted library allocation
page read and write
13B0000
heap
page read and write
F31000
heap
page read and write
137A019C000
trusted library allocation
page read and write
DD4000
heap
page read and write
33DF000
stack
page read and write
2E52E7D000
stack
page read and write
D54000
heap
page read and write
5A30000
trusted library allocation
page read and write
137A02AE000
trusted library allocation
page read and write
4EED000
stack
page read and write
12EB000
unkown
page execute and write copy
5AAD000
stack
page read and write
A36000
unkown
page write copy
13795553000
heap
page read and write
1A0BC1CE000
trusted library allocation
page read and write
38CE000
stack
page read and write
1A0BF990000
trusted library allocation
page read and write
137A61DF000
trusted library allocation
page read and write
CA0000
unkown
page readonly
137A0B3F000
trusted library allocation
page read and write
DD4000
heap
page read and write
DD4000
heap
page read and write
13AA000
heap
page read and write
13BB000
heap
page read and write
1700000
heap
page read and write
1378E4C0000
trusted library allocation
page read and write
11A4000
heap
page read and write
10C7000
heap
page read and write
BF4000
heap
page read and write
1379FF8B000
trusted library allocation
page read and write
13795542000
heap
page read and write
1379E3E2000
trusted library allocation
page read and write
1379E9A2000
trusted library allocation
page read and write
1379ED22000
trusted library allocation
page read and write
DD4000
heap
page read and write
1379FE90000
trusted library allocation
page read and write
608C000
trusted library allocation
page read and write
2311D8FB000
trusted library allocation
page read and write
137A01AD000
trusted library allocation
page read and write
1379ED22000
trusted library allocation
page read and write
1379EA45000
trusted library allocation
page read and write
13795546000
heap
page read and write
1378E7B0000
heap
page read and write
137A02E9000
trusted library allocation
page read and write
292F7250000
heap
page read and write
55C0000
direct allocation
page execute and read and write
2E2C000
stack
page read and write
137A013D000
trusted library allocation
page read and write
13795574000
heap
page read and write
1A0BC282000
trusted library allocation
page read and write
FD0000
direct allocation
page read and write
1379ED5C000
trusted library allocation
page read and write
4601000
heap
page read and write
137A90A9000
trusted library allocation
page read and write
D24000
heap
page read and write
2311E57B000
heap
page read and write
11F9000
unkown
page execute and write copy
DD4000
heap
page read and write
1A0BF6FB000
trusted library allocation
page read and write
DD4000
heap
page read and write
59A3000
trusted library allocation
page read and write
295F000
stack
page read and write
10E8000
heap
page read and write
5270000
direct allocation
page execute and read and write
1A9B47E000
unkown
page readonly
66B6000
trusted library allocation
page read and write
1A0BF75B000
trusted library allocation
page read and write
1379A51B000
trusted library allocation
page read and write
D54000
heap
page read and write
12FF000
unkown
page execute and read and write
137A69E0000
trusted library allocation
page read and write
13795533000
heap
page read and write
1A0BF9A2000
trusted library allocation
page read and write
4601000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
137A63BD000
trusted library allocation
page read and write
1CB0F000
stack
page read and write
A3A000
unkown
page execute and read and write
1D35D000
stack
page read and write
1A0BF9C6000
trusted library allocation
page read and write
4B71000
heap
page read and write
DD4000
heap
page read and write
11A4000
heap
page read and write
39EF000
stack
page read and write
1A0BF6A3000
trusted library allocation
page read and write
10F4000
heap
page read and write
1379E02A000
trusted library allocation
page read and write
1379C4B3000
trusted library allocation
page read and write
1D0CE000
stack
page read and write
5A51000
trusted library allocation
page read and write
D24000
heap
page read and write
4B21000
trusted library allocation
page read and write
13795572000
heap
page read and write
1379FF03000
trusted library allocation
page read and write
1379DF46000
trusted library allocation
page read and write
5EC55FE000
stack
page read and write
374F000
stack
page read and write
1302000
unkown
page execute and read and write
DD4000
heap
page read and write
10BB000
unkown
page execute and read and write
47E1000
heap
page read and write
5EC937E000
stack
page read and write
53B5000
trusted library allocation
page read and write
13795537000
heap
page read and write
4EF0000
heap
page read and write
1379BE03000
trusted library allocation
page read and write
4C20000
direct allocation
page execute and read and write
10F4000
heap
page read and write
5E33000
trusted library allocation
page read and write
13795565000
heap
page read and write
137A1C03000
trusted library allocation
page read and write
36FF000
stack
page read and write
137A63CC000
trusted library allocation
page read and write
CD4000
heap
page read and write
2E542DB000
stack
page read and write
137A1CF6000
trusted library allocation
page read and write
CF5000
stack
page read and write
1CE4E000
stack
page read and write
55BF000
stack
page read and write
137A0261000
trusted library allocation
page read and write
137A0195000
trusted library allocation
page read and write
1379FF24000
trusted library allocation
page read and write
45B1000
heap
page read and write
13795537000
heap
page read and write
1379555D000
heap
page read and write
137A699B000
trusted library allocation
page read and write
1379EAF8000
trusted library allocation
page read and write
3A80000
trusted library allocation
page read and write
32E0000
direct allocation
page read and write
137A0281000
trusted library allocation
page read and write
137A3006000
trusted library allocation
page read and write
DD4000
heap
page read and write
137A61CD000
trusted library allocation
page read and write
1333000
heap
page read and write
137A0013000
trusted library allocation
page read and write
4AB0000
heap
page read and write
137A009C000
trusted library allocation
page read and write
137A7A00000
trusted library allocation
page read and write
D54000
heap
page read and write
137A62A5000
trusted library allocation
page read and write
BF4000
heap
page read and write
1379E3BE000
trusted library allocation
page read and write
2E52EBE000
stack
page read and write
1379556A000
heap
page read and write
1379FFFB000
trusted library allocation
page read and write
1378E3C0000
unclassified section
page readonly
47EE000
stack
page read and write
E04000
heap
page read and write
1379A3F0000
trusted library section
page readonly
1378E7D0000
heap
page read and write
1379EAEC000
trusted library allocation
page read and write
137A639A000
trusted library allocation
page read and write
FAA4541000
trusted library allocation
page execute read
CD4000
heap
page read and write
1273000
unkown
page execute and read and write
1379E77F000
trusted library allocation
page read and write
137A8F47000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
3C393C000000
trusted library allocation
page read and write
2E4AB6E000
stack
page read and write
1273000
unkown
page execute and read and write
137A0106000
trusted library allocation
page read and write
2BBF000
stack
page read and write
137A0544000
trusted library allocation
page read and write
13799E9E000
trusted library allocation
page read and write
137A69D2000
trusted library allocation
page read and write
C4A000
unkown
page execute and read and write
1379FFFE000
trusted library allocation
page read and write
137A6AEA000
trusted library allocation
page read and write
137A6300000
trusted library allocation
page read and write
1379C434000
trusted library allocation
page read and write
4F20000
direct allocation
page read and write
4BB000
unkown
page execute and read and write
137A90FA000
trusted library allocation
page read and write
5FD5000
trusted library allocation
page read and write
CFE000
stack
page read and write
1379557D000
heap
page read and write
1A0BF552000
trusted library allocation
page read and write
BCF000
stack
page read and write
1316000
heap
page read and write
2311E5AE000
heap
page read and write
137A6286000
trusted library allocation
page read and write
DD4000
heap
page read and write
137A6AEE000
trusted library allocation
page read and write
4601000
heap
page read and write
1379E7B2000
trusted library allocation
page read and write
30F7000
heap
page read and write
E4B000
heap
page read and write
DD4000
heap
page read and write
5EC60BD000
stack
page read and write
13790477000
heap
page read and write
4C81000
heap
page read and write
137A63BD000
trusted library allocation
page read and write
137A8F3E000
trusted library allocation
page read and write
137A1BFC000
trusted library allocation
page read and write
1379E78E000
trusted library allocation
page read and write
137A0F00000
trusted library allocation
page read and write
351F000
stack
page read and write
5140000
direct allocation
page execute and read and write
2311E528000
heap
page read and write
1379C418000
trusted library allocation
page read and write
1A0BC5B2000
trusted library allocation
page read and write
13795530000
heap
page read and write
E38000
heap
page read and write
1379FF97000
trusted library allocation
page read and write
137A10BC000
trusted library allocation
page read and write
137A6274000
trusted library allocation
page read and write
137A031B000
trusted library allocation
page read and write
107B000
heap
page read and write
544E000
stack
page read and write
FE0000
unkown
page read and write
4F20000
direct allocation
page read and write
2311D80C000
trusted library allocation
page read and write
35DF000
stack
page read and write
1337000
heap
page read and write
5AA1000
trusted library allocation
page read and write
137A63F9000
trusted library allocation
page read and write
137A6063000
trusted library allocation
page read and write
1379B5A8000
trusted library allocation
page read and write
1379FF34000
trusted library allocation
page read and write
10C9000
heap
page read and write
1379B8AF000
heap
page read and write
DD4000
heap
page read and write
72E000
stack
page read and write
C7E000
stack
page read and write
5F7F000
trusted library allocation
page read and write
137A118D000
trusted library allocation
page read and write
137A02C1000
trusted library allocation
page read and write
137A67B4000
trusted library allocation
page read and write
1A0BF9DA000
trusted library allocation
page read and write
FAA44B1000
trusted library allocation
page execute read
1379556F000
heap
page read and write
137A61EB000
trusted library allocation
page read and write
4C30000
direct allocation
page execute and read and write
137A0E2B000
trusted library allocation
page read and write
1379C431000
trusted library allocation
page read and write
1A0BCA16000
trusted library allocation
page read and write
5B21000
trusted library allocation
page read and write
1379ED17000
trusted library allocation
page read and write
1379B958000
heap
page read and write
137A9039000
trusted library allocation
page read and write
3A80000
trusted library allocation
page read and write
1379F3EE000
trusted library allocation
page read and write
CD4000
heap
page read and write
1379E639000
trusted library allocation
page read and write
1379555D000
heap
page read and write
1379556A000
heap
page read and write
7B8000
unkown
page execute and read and write
137A633F000
trusted library allocation
page read and write
E90000
trusted library allocation
page read and write
533D000
stack
page read and write
2311E49C000
heap
page read and write
1379556A000
heap
page read and write
4B1E000
stack
page read and write
137A1BF8000
trusted library allocation
page read and write
1D8369CC000
remote allocation
page execute read
13795572000
heap
page read and write
27D0000
direct allocation
page read and write
137A025D000
trusted library allocation
page read and write
4601000
heap
page read and write
DD4000
heap
page read and write
137A03F7000
trusted library allocation
page read and write
1379B59A000
trusted library allocation
page read and write
137A8F03000
trusted library allocation
page read and write
1A9912E000
stack
page read and write
D62000
unkown
page readonly
1379E096000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
2311E4E1000
heap
page read and write
137A7A3C000
trusted library allocation
page read and write
13795560000
heap
page read and write
1379DFDF000
trusted library allocation
page read and write
59AA000
trusted library allocation
page read and write
1379EA66000
trusted library allocation
page read and write
13799E90000
trusted library allocation
page read and write
2E5411B000
stack
page read and write
356F000
stack
page read and write
1209F4C0F000
trusted library allocation
page read and write
4C81000
heap
page read and write
1379A8EE000
trusted library allocation
page read and write
1379EAE3000
trusted library allocation
page read and write
6C5D000
stack
page read and write
1720000
heap
page read and write
1379EAD9000
trusted library allocation
page read and write
137A00FC000
trusted library allocation
page read and write
174E000
heap
page read and write
D54000
heap
page read and write
CD4000
heap
page read and write
13795527000
heap
page read and write
1379E99C000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
299E000
stack
page read and write
137A6AF3000
trusted library allocation
page read and write
389E000
stack
page read and write
59BF000
trusted library allocation
page read and write
137A0CE3000
trusted library allocation
page read and write
DDB000
heap
page read and write
137A69A8000
trusted library allocation
page read and write
2E54B9E000
stack
page read and write
4FE0000
direct allocation
page execute and read and write
1379BC03000
trusted library allocation
page read and write
2311E528000
heap
page read and write
4D80000
direct allocation
page execute and read and write
4601000
heap
page read and write
FF1000
unkown
page execute and write copy
1379DFD0000
trusted library allocation
page read and write
1379E200000
trusted library allocation
page read and write
45B1000
heap
page read and write
1A0BFC83000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
1A0BF756000
trusted library allocation
page read and write
5F77000
trusted library allocation
page read and write
13795565000
heap
page read and write
DD4000
heap
page read and write
37DE000
stack
page read and write
1A0B0BCE000
trusted library allocation
page read and write
13795565000
heap
page read and write
5580000
direct allocation
page execute and read and write
5AA0000
trusted library allocation
page read and write
4B71000
heap
page read and write
1379F342000
trusted library allocation
page read and write
599B000
trusted library allocation
page read and write
1A0BC42F000
trusted library allocation
page read and write
1379A9B0000
trusted library allocation
page read and write
137A61E7000
trusted library allocation
page read and write
1A0BCDC0000
heap
page read and write
53B0000
direct allocation
page execute and read and write
1379F4EB000
trusted library allocation
page read and write
13795583000
heap
page read and write
325E000
stack
page read and write
13795530000
heap
page read and write
137A1072000
trusted library allocation
page read and write
137A01A5000
trusted library allocation
page read and write
4601000
heap
page read and write
1380000
heap
page read and write
137A9287000
trusted library allocation
page read and write
1A0BF4E6000
trusted library allocation
page read and write
137A01F3000
trusted library allocation
page read and write
FC0000
heap
page read and write
137A6103000
trusted library allocation
page read and write
137A00C9000
trusted library allocation
page read and write
13795535000
heap
page read and write
EF4000
heap
page read and write
12FF000
unkown
page execute and write copy
1393000
heap
page read and write
1804BE66000
trusted library allocation
page read and write
13795584000
heap
page read and write
59EB000
trusted library allocation
page read and write
1379BE16000
trusted library allocation
page read and write
1A0BC526000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
27D0000
direct allocation
page read and write
137A302C000
trusted library allocation
page read and write
3B6E000
stack
page read and write
5AB9000
trusted library allocation
page read and write
1379C409000
trusted library allocation
page read and write
5AC9000
trusted library allocation
page read and write
47B1000
heap
page read and write
137A015E000
trusted library allocation
page read and write
13795516000
heap
page read and write
137A00F5000
trusted library allocation
page read and write
51D6000
trusted library allocation
page read and write
1379F4F1000
trusted library allocation
page read and write
1379E400000
trusted library allocation
page read and write
4C81000
heap
page read and write
127D000
unkown
page execute and read and write
5AF1000
trusted library allocation
page read and write
13795533000
heap
page read and write
137A1B03000
trusted library allocation
page read and write
5A60000
remote allocation
page read and write
1379B500000
trusted library allocation
page read and write
BF4000
heap
page read and write
137A0193000
trusted library allocation
page read and write
389CD171000
trusted library allocation
page execute read
2E4B5D8000
stack
page read and write
1379A89F000
trusted library allocation
page read and write
CD4000
heap
page read and write
137A026F000
trusted library allocation
page read and write
1379E800000
trusted library section
page readonly
11FA000
unkown
page execute and read and write
1379B55F000
trusted library allocation
page read and write
48DE000
stack
page read and write
5290000
direct allocation
page execute and read and write
EE9000
heap
page read and write
1379E79B000
trusted library allocation
page read and write
1379DF48000
trusted library allocation
page read and write
45A0000
direct allocation
page read and write
137A91ED000
trusted library allocation
page read and write
4B71000
heap
page read and write
306F000
stack
page read and write
CD4000
heap
page read and write
D24000
heap
page read and write
5D6D000
trusted library allocation
page read and write
411F000
stack
page read and write
D24000
heap
page read and write
1379E3E2000
trusted library allocation
page read and write
C90000
unkown
page execute and write copy
1379EACE000
trusted library allocation
page read and write
137A8F47000
trusted library allocation
page read and write
41DE000
stack
page read and write
15DE000
stack
page read and write
137A69C4000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
137A0BCB000
trusted library allocation
page read and write
1A0BC579000
trusted library allocation
page read and write
13795553000
heap
page read and write
39FE000
stack
page read and write
1379EA7B000
trusted library allocation
page read and write
137A909A000
trusted library allocation
page read and write
1379B46C000
trusted library allocation
page read and write
249FC1D0000
heap
page read and write
599B000
trusted library allocation
page read and write
1A0BC26A000
trusted library allocation
page read and write
5454A7E000
unkown
page readonly
D54000
heap
page read and write
4C81000
heap
page read and write
1379E369000
trusted library allocation
page read and write
1379FF89000
trusted library allocation
page read and write
1A0BF8DF000
trusted library allocation
page read and write
5A36000
trusted library allocation
page read and write
E9A000
heap
page read and write
1A0BF4C1000
trusted library allocation
page read and write
1124000
heap
page read and write
1379F108000
trusted library allocation
page read and write
FF1000
unkown
page execute and write copy
50A0000
direct allocation
page execute and read and write
1379553B000
heap
page read and write
1A0BD287000
trusted library allocation
page read and write
5A34000
trusted library allocation
page read and write
1379E203000
trusted library allocation
page read and write
54BE000
stack
page read and write
137A91F5000
trusted library allocation
page read and write
BD2000
unkown
page execute and write copy
137A0157000
trusted library allocation
page read and write
13795572000
heap
page read and write
1379FEB8000
trusted library allocation
page read and write
5C8000
unkown
page execute and read and write
4601000
heap
page read and write
3EEF000
stack
page read and write
1225000
unkown
page execute and read and write
1379BF03000
trusted library allocation
page read and write
1A0BEC01000
trusted library allocation
page read and write
1379BE20000
trusted library allocation
page read and write
1A0BFC7D000
trusted library allocation
page read and write
137A0696000
trusted library allocation
page read and write
1379A0F7000
trusted library allocation
page read and write
3FDF000
stack
page read and write
CD4000
heap
page read and write
1316000
heap
page read and write
1379EEC7000
trusted library allocation
page read and write
341E000
stack
page read and write
45B1000
heap
page read and write
1379FA01000
trusted library allocation
page read and write
2C5F000
stack
page read and write
62380D00000
trusted library allocation
page read and write
14A3000
unkown
page execute and read and write
1379E325000
trusted library allocation
page read and write
137A698C000
trusted library allocation
page read and write
CD4000
heap
page read and write
137A6295000
trusted library allocation
page read and write
1AADD000
stack
page read and write
2E5455A000
stack
page read and write
4601000
heap
page read and write
1A0BC293000
trusted library allocation
page read and write
1379A503000
trusted library allocation
page read and write
4C81000
heap
page read and write
6D1E000
stack
page read and write
47248503000
trusted library allocation
page read and write
1A0BF98A000
trusted library allocation
page read and write
137A6A24000
trusted library allocation
page read and write
4601000
heap
page read and write
5AA1000
trusted library allocation
page read and write
1A0BF51E000
trusted library allocation
page read and write
137A8F81000
trusted library allocation
page read and write
137A69CE000
trusted library allocation
page read and write
137A9203000
trusted library allocation
page read and write
1379A0B1000
trusted library allocation
page read and write
D74000
unkown
page readonly
1379E890000
trusted library section
page read and write
2EAF000
stack
page read and write
1379F4DD000
trusted library allocation
page read and write
13795524000
heap
page read and write
E00000
heap
page read and write
53D9000
trusted library allocation
page read and write
137A003B000
trusted library allocation
page read and write
4C81000
heap
page read and write
2A554890000
heap
page read and write
D62000
unkown
page readonly
137A3024000
trusted library allocation
page read and write
137A6337000
trusted library allocation
page read and write
137A11C5000
trusted library allocation
page read and write
137A6239000
trusted library allocation
page read and write
1379A8FD000
trusted library allocation
page read and write
3A80000
trusted library allocation
page read and write
1A0BFC23000
trusted library allocation
page read and write
E04000
heap
page read and write
BF4000
heap
page read and write
1379EA94000
trusted library allocation
page read and write
1379B400000
trusted library allocation
page read and write
5455A7E000
unkown
page readonly
1A0BC286000
trusted library allocation
page read and write
2311E5AE000
heap
page read and write
463E000
stack
page read and write
1804BEA4000
trusted library allocation
page read and write
13795549000
heap
page read and write
13795560000
heap
page read and write
137A63BA000
trusted library allocation
page read and write
1379EA94000
trusted library allocation
page read and write
1379A000000
trusted library allocation
page read and write
137A107C000
trusted library allocation
page read and write
10F4000
heap
page read and write
BBF000
stack
page read and write
1263000
unkown
page execute and read and write
44DF000
stack
page read and write
442E000
stack
page read and write
5A40000
trusted library allocation
page read and write
1378E811000
trusted library allocation
page read and write
1D836F00000
trusted library allocation
page read and write
DD4000
heap
page read and write
1379F4F1000
trusted library allocation
page read and write
E04000
heap
page read and write
4F20000
direct allocation
page read and write
137A10C7000
trusted library allocation
page read and write
292F5788000
heap
page read and write
1379F376000
trusted library allocation
page read and write
137A6A37000
trusted library allocation
page read and write
47B0000
heap
page read and write
129F000
unkown
page execute and read and write
137A9177000
trusted library allocation
page read and write
1A9ABFE000
stack
page read and write
5AA9000
trusted library allocation
page read and write
13795529000
heap
page read and write
1379E303000
trusted library allocation
page read and write
137A3002000
trusted library allocation
page read and write
54541FE000
stack
page read and write
FB0000
direct allocation
page read and write
1379FF51000
trusted library allocation
page read and write
C12000
unkown
page execute and read and write
13795575000
heap
page read and write
13795566000
heap
page read and write
E5C000
stack
page read and write
137A030F000
trusted library allocation
page read and write
1A0B247D000
heap
page read and write
2311E584000
heap
page read and write
137A018B000
trusted library allocation
page read and write
1379EFF2000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
4B71000
heap
page read and write
137A8F25000
trusted library allocation
page read and write
4B71000
heap
page read and write
1379557A000
heap
page read and write
4601000
heap
page read and write
137A90FC000
trusted library allocation
page read and write
5249000
stack
page read and write
416F000
stack
page read and write
E04000
heap
page read and write
1D836C20000
unclassified section
page readonly
5EC783F000
stack
page read and write
B44000
heap
page read and write
EF4000
heap
page read and write
DD4000
heap
page read and write
137A69A3000
trusted library allocation
page read and write
137A0410000
trusted library allocation
page read and write
137A69E2000
trusted library allocation
page read and write
1804BE0D000
trusted library allocation
page read and write
1379EF9D000
trusted library allocation
page read and write
13795516000
heap
page read and write
137A9103000
trusted library allocation
page read and write
1A0BC892000
trusted library allocation
page read and write
3A4F000
stack
page read and write
2E4C078000
stack
page read and write
11FA000
unkown
page execute and read and write
1379A51E000
trusted library allocation
page read and write
CD4000
heap
page read and write
137A026F000
trusted library allocation
page read and write
1379E77F000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
1A0BC300000
trusted library allocation
page read and write
6C7D000
stack
page read and write
2311D946000
heap
page read and write
137A62C9000
trusted library allocation
page read and write
4BF0000
trusted library allocation
page read and write
5A98000
trusted library allocation
page read and write
DD4000
heap
page read and write
1A09DB100000
trusted library allocation
page read and write
13795537000
heap
page read and write
1379B471000
trusted library allocation
page read and write
1379DD70000
trusted library allocation
page read and write
1379EF03000
trusted library allocation
page read and write
5CBD000
trusted library allocation
page read and write
3AFE000
stack
page read and write
CD5000
heap
page read and write
5F02000
trusted library allocation
page read and write
542B000
stack
page read and write
4F20000
remote allocation
page read and write
1C2000
unkown
page execute and read and write
545527E000
stack
page read and write
1379EADC000
trusted library allocation
page read and write
137A623D000
trusted library allocation
page read and write
4DB0000
direct allocation
page execute and read and write
137A0227000
trusted library allocation
page read and write
46CE000
stack
page read and write
DD4000
heap
page read and write
305E000
stack
page read and write
D24000
heap
page read and write
1A0BF9B0000
trusted library allocation
page read and write
1379E423000
trusted library allocation
page read and write
1F4000
heap
page read and write
137A0F4B000
trusted library allocation
page read and write
137A611E000
trusted library allocation
page read and write
4C70000
direct allocation
page read and write
13795540000
heap
page read and write
137A02B4000
trusted library allocation
page read and write
137A6125000
trusted library allocation
page read and write
477F000
stack
page read and write
137A6975000
trusted library allocation
page read and write
E38000
heap
page read and write
4F20000
direct allocation
page read and write
3A80000
trusted library allocation
page read and write
6B3C000
stack
page read and write
CD4000
heap
page read and write
32DF000
stack
page read and write
1A0B0AA0000
unclassified section
page read and write
137A0279000
trusted library allocation
page read and write
10F4000
heap
page read and write
59F9000
trusted library allocation
page read and write
5F6E000
trusted library allocation
page read and write
FD0000
direct allocation
page read and write
37AE000
stack
page read and write
7E5000
stack
page read and write
E04000
heap
page read and write
1379550E000
heap
page read and write
5B0000
unkown
page readonly
137A1B3E000
trusted library allocation
page read and write
1A0BF811000
trusted library allocation
page read and write
11A4000
heap
page read and write
4C81000
heap
page read and write
11A4000
heap
page read and write
1A0BCA87000
trusted library allocation
page read and write
CD4000
heap
page read and write
CD4000
heap
page read and write
3300000
heap
page read and write
137A91C1000
trusted library allocation
page read and write
5550000
direct allocation
page execute and read and write
1379557D000
heap
page read and write
1A0BC25C000
trusted library allocation
page read and write
A3A000
unkown
page execute and write copy
1379E9CB000
trusted library allocation
page read and write
D60000
heap
page read and write
1379BF09000
trusted library allocation
page read and write
137A01ED000
trusted library allocation
page read and write
4F91000
heap
page read and write
1A65F000
stack
page read and write
2F2F000
stack
page read and write
4764000
trusted library allocation
page read and write
448E000
stack
page read and write
514C000
stack
page read and write
5E3A000
trusted library allocation
page read and write
1804BC70000
unclassified section
page read and write
1A0BF59B000
trusted library allocation
page read and write
1379555D000
heap
page read and write
172B000
heap
page read and write
137A032E000
trusted library allocation
page read and write
1D836C10000
heap
page read and write
1379F2DE000
trusted library allocation
page read and write
BDE000
unkown
page execute and write copy
4ACE000
stack
page read and write
1804BE23000
trusted library allocation
page read and write
F6B000
heap
page read and write
1379E3F1000
trusted library allocation
page read and write
13799E34000
trusted library allocation
page read and write
12DD000
unkown
page execute and write copy
11B7000
unkown
page execute and write copy
4F91000
heap
page read and write
137A62C5000
trusted library allocation
page read and write
137A8FFD000
trusted library allocation
page read and write
137A636B000
trusted library allocation
page read and write
137A7A00000
trusted library allocation
page read and write
1804BE98000
trusted library allocation
page read and write
2311D8BC000
trusted library allocation
page read and write
41EF000
stack
page read and write
1379FB9E000
trusted library allocation
page read and write
13795566000
heap
page read and write
1A58F000
stack
page read and write
4C81000
heap
page read and write
137A6286000
trusted library allocation
page read and write
1379FE6E000
trusted library allocation
page read and write
4C81000
heap
page read and write
137A0378000
trusted library allocation
page read and write
1379E616000
trusted library allocation
page read and write
3740000
heap
page read and write
494E000
stack
page read and write
1379A925000
trusted library allocation
page read and write
2311E5B7000
heap
page read and write
2311E598000
heap
page read and write
1D836EAE000
trusted library allocation
page read and write
1379557D000
heap
page read and write
CD4000
heap
page read and write
1A0BF813000
trusted library allocation
page read and write
59D3000
trusted library allocation
page read and write
47F0000
heap
page read and write
1804BF17000
trusted library allocation
page read and write
A9B000
stack
page read and write
1A0BC5C3000
trusted library allocation
page read and write
55B0000
direct allocation
page execute and read and write
10F4000
heap
page read and write
1378E8EF000
trusted library allocation
page read and write
1A0BC8DA000
trusted library allocation
page read and write
CD4000
heap
page read and write
1379557F000
heap
page read and write
1A0BD822000
trusted library allocation
page read and write
1379E3A7000
trusted library allocation
page read and write
11FF000
unkown
page execute and read and write
1379557A000
heap
page read and write
137A02C1000
trusted library allocation
page read and write
5410000
direct allocation
page read and write
B8E000
stack
page read and write
2C1E000
stack
page read and write
137A0120000
trusted library allocation
page read and write
381000
unkown
page execute and read and write
E0000
unkown
page readonly
4601000
heap
page read and write
13795562000
heap
page read and write
1379F6DA000
trusted library allocation
page read and write
4B71000
heap
page read and write
4601000
heap
page read and write
32DE000
stack
page read and write
1379E18D000
trusted library allocation
page read and write
1379B7C9000
trusted library allocation
page read and write
13795553000
heap
page read and write
1379EF76000
trusted library allocation
page read and write
6B5C000
stack
page read and write
DD4000
heap
page read and write
1150000
direct allocation
page read and write
1272000
unkown
page execute and write copy
137A63DC000
trusted library allocation
page read and write
13795562000
heap
page read and write
1379E609000
trusted library allocation
page read and write
13795537000
heap
page read and write
FD0000
direct allocation
page read and write
1247000
unkown
page execute and write copy
137A6AFD000
trusted library allocation
page read and write
1379E7DE000
trusted library allocation
page read and write
3C1F000
stack
page read and write
1379E3BE000
trusted library allocation
page read and write
413F000
stack
page read and write
5590000
direct allocation
page execute and read and write
B90000
heap
page read and write
D3C000
unkown
page readonly
1379F335000
trusted library allocation
page read and write
29D7000
heap
page read and write
137A0098000
trusted library allocation
page read and write
1A2BEC00000
trusted library section
page readonly
3D9E000
stack
page read and write
1D836BBF000
unclassified section
page read and write
1379E7BD000
trusted library allocation
page read and write
1379F4EB000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
5A3B000
trusted library allocation
page read and write
137A6053000
trusted library allocation
page read and write
2311E4BF000
heap
page read and write
441F000
stack
page read and write
2311E4A0000
heap
page read and write
4E10000
direct allocation
page execute and read and write
53C0000
direct allocation
page execute and read and write
697F000
stack
page read and write
CD4000
heap
page read and write
2311E4A9000
heap
page read and write
D24000
heap
page read and write
361E000
stack
page read and write
427E000
stack
page read and write
5A30000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
B3E000
stack
page read and write
137A0800000
trusted library allocation
page read and write
1379556F000
heap
page read and write
87F1000
heap
page read and write
3A80000
trusted library allocation
page read and write
4700000
direct allocation
page read and write
13AA000
heap
page read and write
D2DBBFF000
stack
page read and write
137A69A3000
trusted library allocation
page read and write
5A5D000
trusted library allocation
page read and write
2F7F000
stack
page read and write
137A91B3000
trusted library allocation
page read and write
137A90C5000
trusted library allocation
page read and write
59C9000
trusted library allocation
page read and write
11A4000
heap
page read and write
1379E3A5000
trusted library allocation
page read and write
1379BD09000
trusted library allocation
page read and write
2FF0000
direct allocation
page execute and read and write
1379E3A7000
trusted library allocation
page read and write
137A0053000
trusted library allocation
page read and write
137A0412000
trusted library allocation
page read and write
4F20000
direct allocation
page read and write
137A0383000
trusted library allocation
page read and write
5AC7000
trusted library allocation
page read and write
1379550E000
heap
page read and write
2E564BA000
stack
page read and write
1A0BF44C000
trusted library allocation
page read and write
1379E3F1000
trusted library allocation
page read and write
13795533000
heap
page read and write
32A000
unkown
page execute and read and write
430000
heap
page read and write
1A0BC600000
trusted library allocation
page read and write
5A39000
trusted library allocation
page read and write
1D836F13000
trusted library allocation
page read and write
137A61D5000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
428F000
stack
page read and write
DD4000
heap
page read and write
4601000
heap
page read and write
1A0BC261000
trusted library allocation
page read and write
79C000
unkown
page execute and write copy
1379E620000
trusted library allocation
page read and write
13795572000
heap
page read and write
137A0720000
trusted library section
page readonly
1A0BCA69000
trusted library allocation
page read and write
5590000
direct allocation
page execute and read and write
13795516000
heap
page read and write
4C81000
heap
page read and write
BF4000
heap
page read and write
137A8F94000
trusted library allocation
page read and write
5A2E000
trusted library allocation
page read and write
1804BE03000
trusted library allocation
page read and write
13795516000
heap
page read and write
DD4000
heap
page read and write
29DB000
heap
page read and write
1A0BD28C000
trusted library allocation
page read and write
3B54000
heap
page read and write
547E000
stack
page read and write
CD4000
heap
page read and write
BE7000
heap
page read and write
1379FFFB000
trusted library allocation
page read and write
1A0BF9F6000
trusted library allocation
page read and write
137A8F4C000
trusted library allocation
page read and write
1378E85E000
trusted library allocation
page read and write
1379DC8F000
trusted library allocation
page read and write
4601000
heap
page read and write
137A00A5000
trusted library allocation
page read and write
DD4000
heap
page read and write
137A0569000
trusted library allocation
page read and write
2E5435E000
stack
page read and write
10C6000
heap
page read and write
13795560000
heap
page read and write
137A91D3000
trusted library allocation
page read and write
1A0BD600000
trusted library allocation
page read and write
DD4000
heap
page read and write
4C81000
heap
page read and write
37EF000
stack
page read and write
137A0E7B000
trusted library allocation
page read and write
137A00A5000
trusted library allocation
page read and write
1379F600000
trusted library allocation
page read and write
4FE0000
direct allocation
page execute and read and write
137A919A000
trusted library allocation
page read and write
1379FF4A000
trusted library allocation
page read and write
1D12D000
stack
page read and write
1379ED22000
trusted library allocation
page read and write
1A0BC22D000
trusted library allocation
page read and write
11A4000
heap
page read and write
1379FE03000
trusted library allocation
page read and write
1379F3A7000
trusted library allocation
page read and write
1379555D000
heap
page read and write
137A63F4000
trusted library allocation
page read and write
D4C000
stack
page read and write
137A905E000
trusted library allocation
page read and write
137A0F35000
trusted library allocation
page read and write
1A0BC55E000
trusted library allocation
page read and write
CD4000
heap
page read and write
3A2E000
stack
page read and write
5590000
direct allocation
page execute and read and write
13AB000
heap
page read and write
292F5750000
heap
page read and write
1177000
heap
page read and write
40FF000
stack
page read and write
1379E98B000
trusted library allocation
page read and write
1A0BFC87000
trusted library allocation
page read and write
3D0E000
stack
page read and write
124A000
heap
page read and write
B8E000
stack
page read and write
1379F403000
trusted library allocation
page read and write
4C81000
heap
page read and write
137A623B000
trusted library allocation
page read and write
137A01A1000
trusted library allocation
page read and write
CD5000
heap
page read and write
137A9B00000
trusted library allocation
page read and write
1379E9CB000
trusted library allocation
page read and write
1379F38B000
trusted library allocation
page read and write
2E5E000
stack
page read and write
5F0E000
trusted library allocation
page read and write
1379F23D000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
1379EAB3000
trusted library allocation
page read and write
1D836BB0000
unclassified section
page read and write
CD4000
heap
page read and write
59DB000
trusted library allocation
page read and write
3CDE000
stack
page read and write
1378E4D9000
heap
page read and write
10F4000
heap
page read and write
388643424000
trusted library allocation
page read and write
137A6803000
trusted library allocation
page read and write
1804BE83000
trusted library allocation
page read and write
F73000
heap
page read and write
137A6703000
trusted library allocation
page read and write
2311E5B9000
heap
page read and write
1211000
unkown
page execute and read and write
423F000
stack
page read and write
FB0000
direct allocation
page read and write
137A619B000
trusted library allocation
page read and write
10F4000
heap
page read and write
126A000
unkown
page execute and read and write
172B000
heap
page read and write
137A01B0000
trusted library allocation
page read and write
5EC8B7E000
stack
page read and write
1379DF95000
trusted library allocation
page read and write
1A0BF8A8000
trusted library allocation
page read and write
62D8000
trusted library allocation
page read and write
FD6000
unkown
page execute and read and write
137A0357000
trusted library allocation
page read and write
1379EAA8000
trusted library allocation
page read and write
5400000
direct allocation
page execute and read and write
137A0650000
trusted library allocation
page read and write
2311E4CA000
heap
page read and write
DFF000
heap
page read and write
13B8000
heap
page read and write
137A038F000
trusted library allocation
page read and write
1379F6F5000
trusted library allocation
page read and write
490E000
stack
page read and write
137A6374000
trusted library allocation
page read and write
4C81000
heap
page read and write
1263000
unkown
page execute and read and write
16B6000
heap
page read and write
137A003B000
trusted library allocation
page read and write
1A0BC5CC000
trusted library allocation
page read and write
4DD0000
direct allocation
page execute and read and write
4F91000
heap
page read and write
137A9285000
trusted library allocation
page read and write
1379E3B8000
trusted library allocation
page read and write
1A0BF9A2000
trusted library allocation
page read and write
50B0000
direct allocation
page execute and read and write
1379E983000
trusted library allocation
page read and write
1379E700000
trusted library allocation
page read and write
B50000
heap
page read and write
586F000
stack
page read and write
3741000
heap
page read and write
3307000
heap
page read and write
2311E56A000
heap
page read and write
5A30000
trusted library allocation
page read and write
5A40000
trusted library allocation
page read and write
1A0BC181000
trusted library allocation
page read and write
1A0B0AB5000
heap
page read and write
1C2000
unkown
page execute and read and write
1D0000
heap
page read and write
1A0BF7E2000
trusted library allocation
page read and write
1A0BC500000
trusted library allocation
page read and write
1379EAB9000
trusted library allocation
page read and write
E0A000
heap
page read and write
944000
heap
page read and write
137A01A1000
trusted library allocation
page read and write
1A0BC883000
trusted library allocation
page read and write
137A0180000
trusted library allocation
page read and write
1379E148000
trusted library allocation
page read and write
1379E1A5000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
1379EA59000
trusted library allocation
page read and write
E3FE0E00000
trusted library allocation
page read and write
1379DBC0000
trusted library section
page read and write
1379B7FC000
trusted library allocation
page read and write
CD4000
heap
page read and write
1D8369D0000
unclassified section
page readonly
13795553000
heap
page read and write
32A000
unkown
page execute and read and write
6670000
heap
page read and write
1379DD4B000
trusted library allocation
page read and write
360F000
stack
page read and write
137A0013000
trusted library allocation
page read and write
1A0BCA27000
trusted library allocation
page read and write
1A0B0B30000
trusted library allocation
page read and write
137A0372000
trusted library allocation
page read and write
137A0053000
trusted library allocation
page read and write
5ECC79E000
stack
page read and write
FF0000
unkown
page readonly
4C0E000
stack
page read and write
137A6379000
trusted library allocation
page read and write
610000
unkown
page execute and write copy
1A0BFA01000
trusted library allocation
page read and write
137A0B90000
trusted library allocation
page read and write
2E3F000
stack
page read and write
CD7000
unkown
page execute and write copy
1A0BC925000
trusted library allocation
page read and write
137A065E000
trusted library allocation
page read and write
5D45000
trusted library allocation
page read and write
13795569000
heap
page read and write
1379E592000
trusted library allocation
page read and write
1379E0B0000
trusted library allocation
page read and write
137A8F2F000
trusted library allocation
page read and write
1379B7C9000
trusted library allocation
page read and write
5A2F000
trusted library allocation
page read and write
10D1000
heap
page read and write
1379E0BB000
trusted library allocation
page read and write
137A0149000
trusted library allocation
page read and write
13795567000
heap
page read and write
1F4000
heap
page read and write
45A0000
direct allocation
page read and write
1A0BFC0D000
trusted library allocation
page read and write
1379556E000
heap
page read and write
1379A5E3000
trusted library allocation
page read and write
411F000
stack
page read and write
137A8F3E000
trusted library allocation
page read and write
5ECB17D000
stack
page read and write
1AB1E000
stack
page read and write
32E0000
direct allocation
page read and write
19D000
unkown
page execute and read and write
3D7E000
stack
page read and write
E70000
heap
page read and write
137A69FA000
trusted library allocation
page read and write
13795572000
heap
page read and write
137A11A3000
trusted library allocation
page read and write
137A3010000
trusted library allocation
page read and write
1A0BF9A2000
trusted library allocation
page read and write
47D0000
trusted library allocation
page read and write
137A037D000
trusted library allocation
page read and write
13795585000
heap
page read and write
9A5000
heap
page read and write
1379EAB9000
trusted library allocation
page read and write
BF4000
heap
page read and write
1343000
heap
page read and write
385F000
stack
page read and write
1A0BF92A000
trusted library allocation
page read and write
11B7000
unkown
page execute and write copy
54549FE000
unkown
page readonly
4E60000
direct allocation
page read and write
CD4000
heap
page read and write
4B90000
heap
page read and write
BF4000
heap
page read and write
137A0327000
trusted library allocation
page read and write
137A6212000
trusted library allocation
page read and write
CD4000
heap
page read and write
5A53000
trusted library allocation
page read and write
A30000
unkown
page read and write
6676000
heap
page read and write
2F9F000
stack
page read and write
5AC7000
trusted library allocation
page read and write
4C81000
heap
page read and write
137A6100000
trusted library allocation
page read and write
4AB1000
heap
page read and write
13795583000
heap
page read and write
4B71000
heap
page read and write
137A7A00000
trusted library allocation
page read and write
2311D68F000
unclassified section
page read and write
4EFF000
stack
page read and write
137A6AFD000
trusted library allocation
page read and write
137A6334000
trusted library allocation
page read and write
CD4000
heap
page read and write
585E000
stack
page read and write
CD4000
heap
page read and write
137A8F62000
trusted library allocation
page read and write
137A9188000
trusted library allocation
page read and write
1379BC09000
trusted library allocation
page read and write
1379FE2F000
trusted library allocation
page read and write
45A0000
direct allocation
page read and write
432F000
stack
page read and write
1A0BC389000
trusted library allocation
page read and write
32E0000
direct allocation
page read and write
47E000
stack
page read and write
FAA4501000
trusted library allocation
page execute read
595F000
stack
page read and write
D54000
heap
page read and write
13795572000
heap
page read and write
137A9285000
trusted library allocation
page read and write
3E9F000
stack
page read and write
1225000
unkown
page execute and read and write
F66000
heap
page read and write
1A0BC8B4000
trusted library allocation
page read and write
5170000
direct allocation
page execute and read and write
38EE000
stack
page read and write
1A0BF933000
trusted library allocation
page read and write
129F000
unkown
page execute and read and write
2E54B5E000
stack
page read and write
137A628C000
trusted library allocation
page read and write
478F000
stack
page read and write
5290000
direct allocation
page execute and read and write
2311E5AE000
heap
page read and write
1379BE00000
trusted library allocation
page read and write
F88000
heap
page read and write
1150000
direct allocation
page read and write
137A1B5E000
trusted library allocation
page read and write
1A0BEC17000
trusted library allocation
page read and write
1379E3CE000
trusted library allocation
page read and write
1379EFA3000
trusted library allocation
page read and write
1D836A26000
heap
page read and write
58B6000
trusted library allocation
page read and write
1379E3DE000
trusted library allocation
page read and write
1379E3C9000
trusted library allocation
page read and write
1379EA03000
trusted library allocation
page read and write
10DE000
stack
page read and write
608F000
trusted library allocation
page read and write
1379E7B7000
trusted library allocation
page read and write
E04000
heap
page read and write
FD0000
heap
page read and write
E2A000
heap
page read and write
13795516000
heap
page read and write
619F000
trusted library allocation
page read and write
59C7000
trusted library allocation
page read and write
1379ED1F000
trusted library allocation
page read and write
59C1000
trusted library allocation
page read and write
137A026C000
trusted library allocation
page read and write
4C81000
heap
page read and write
E04000
heap
page read and write
1A0BF900000
trusted library allocation
page read and write
1379FF36000
trusted library allocation
page read and write
137A1BB1000
trusted library allocation
page read and write
FE0000
unkown
page readonly
4601000
heap
page read and write
13795560000
heap
page read and write
137A63F4000
trusted library allocation
page read and write
DD0000
direct allocation
page read and write
AAF000
stack
page read and write
137A6ACD000
trusted library allocation
page read and write
137A6190000
trusted library allocation
page read and write
F7F000
heap
page read and write
129D000
unkown
page execute and write copy
1379E3E6000
trusted library allocation
page read and write
1A5CE000
stack
page read and write
137A61FE000
trusted library allocation
page read and write
1A0BF443000
trusted library allocation
page read and write
1A84E000
stack
page read and write
137A065E000
trusted library allocation
page read and write
13795516000
heap
page read and write
2E4C3B5000
stack
page read and write
2311E52F000
heap
page read and write
4601000
heap
page read and write
1379556E000
heap
page read and write
137A8F27000
trusted library allocation
page read and write
2E537DC000
stack
page read and write
52B0000
direct allocation
page execute and read and write
10CF000
heap
page read and write
4601000
heap
page read and write
1379B7FC000
trusted library allocation
page read and write
5AC9000
trusted library allocation
page read and write
5E36000
trusted library allocation
page read and write
DD4000
heap
page read and write
5AA1000
trusted library allocation
page read and write
1379A014000
trusted library allocation
page read and write
BF0000
heap
page read and write
4601000
heap
page read and write
2311E598000
heap
page read and write
137A61F7000
trusted library allocation
page read and write
1379552D000
heap
page read and write
BF4000
heap
page read and write
1379E19E000
trusted library allocation
page read and write
1379E8B0000
trusted library section
page read and write
4601000
heap
page read and write
1A0BF99B000
trusted library allocation
page read and write
1379A9BF000
trusted library allocation
page read and write
1379A4FB000
trusted library allocation
page read and write
137A0239000
trusted library allocation
page read and write
137A1046000
trusted library allocation
page read and write
1247000
unkown
page execute and write copy
10F4000
heap
page read and write
2E4ABED000
stack
page read and write
137A009C000
trusted library allocation
page read and write
4601000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
3ADF000
stack
page read and write
480000
unkown
page readonly
137A8F47000
trusted library allocation
page read and write
1379F4CF000
trusted library allocation
page read and write
52D0000
direct allocation
page execute and read and write
940000
heap
page read and write
10D1000
heap
page read and write
4601000
heap
page read and write
137A0F3D000
trusted library allocation
page read and write
137A01CE000
trusted library allocation
page read and write
137A8F45000
trusted library allocation
page read and write
4DFE000
stack
page read and write
2FE0000
direct allocation
page execute and read and write
434E000
stack
page read and write
1379E9CB000
trusted library allocation
page read and write
1379FD43000
trusted library allocation
page read and write
3A5E000
stack
page read and write
137A6A05000
trusted library allocation
page read and write
DD4000
heap
page read and write
1700000
heap
page read and write
4A4E000
stack
page read and write
1379556E000
heap
page read and write
2E5439C000
stack
page read and write
13799F43000
trusted library allocation
page read and write
1A0BD60B000
trusted library allocation
page read and write
1379E3BE000
trusted library allocation
page read and write
CD4000
heap
page read and write
292F576F000
heap
page read and write
417E000
stack
page read and write
1379E36F000
trusted library allocation
page read and write
1379EDA4000
trusted library allocation
page read and write
5410000
direct allocation
page read and write
4B71000
heap
page read and write
13795537000
heap
page read and write
13795537000
heap
page read and write
137A9263000
trusted library allocation
page read and write
1379E7F0000
trusted library allocation
page read and write
1379556F000
heap
page read and write
137A69DC000
trusted library allocation
page read and write
1379E3E6000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
5A91000
trusted library allocation
page read and write
11A4000
heap
page read and write
DD0000
direct allocation
page read and write
13A3000
heap
page read and write
11DC000
unkown
page execute and write copy
D2DABFF000
stack
page read and write
4601000
heap
page read and write
4D6F000
stack
page read and write
137A00A5000
trusted library allocation
page read and write
DD4000
heap
page read and write
4601000
heap
page read and write
89B000
unkown
page execute and write copy
1050000
unkown
page execute and read and write
13795516000
heap
page read and write
2BDF000
stack
page read and write
D24000
heap
page read and write
11A4000
heap
page read and write
59C1000
trusted library allocation
page read and write
13795562000
heap
page read and write
137A637F000
trusted library allocation
page read and write
1379E953000
trusted library allocation
page read and write
249FBE40000
heap
page read and write
137A1048000
trusted library allocation
page read and write
1A0BD103000
trusted library allocation
page read and write
13795574000
heap
page read and write
1A0BC859000
trusted library allocation
page read and write
29C0000
direct allocation
page read and write
5A30000
trusted library allocation
page read and write
292F5782000
heap
page read and write
1379E96F000
trusted library allocation
page read and write
292F56A0000
heap
page read and write
1379A8D9000
trusted library allocation
page read and write
137A0186000
trusted library allocation
page read and write
1379F25D000
trusted library allocation
page read and write
4B71000
heap
page read and write
5EC33DB000
stack
page read and write
2E4FDFE000
stack
page read and write
1A0BF8CD000
trusted library allocation
page read and write
1379EAB3000
trusted library allocation
page read and write
57CE000
stack
page read and write
BF4000
heap
page read and write
2311E521000
heap
page read and write
1804BBC0000
heap
page read and write
137A1107000
trusted library allocation
page read and write
137A61B6000
trusted library allocation
page read and write
3B1E000
stack
page read and write
352E000
stack
page read and write
1379DD00000
trusted library allocation
page read and write
52FD000
stack
page read and write
2E505FE000
stack
page read and write
B2A000
heap
page read and write
1A0B0A10000
trusted library section
page read and write
10E8000
heap
page read and write
BDE000
stack
page read and write
486E000
stack
page read and write
376F000
stack
page read and write
5A51000
trusted library allocation
page read and write
13795572000
heap
page read and write
2311E4A0000
heap
page read and write
2E5373C000
stack
page read and write
5E35000
trusted library allocation
page read and write
2A1E000
stack
page read and write
1AD2E000
stack
page read and write
1379FC00000
trusted library allocation
page read and write
580000
heap
page read and write
9758FFF000
stack
page read and write
CD4000
heap
page read and write
89D000
unkown
page execute and write copy
1379E12F000
trusted library allocation
page read and write
4F00000
heap
page read and write
108C000
heap
page read and write
4C20000
remote allocation
page read and write
1379FF5D000
trusted library allocation
page read and write
12C2000
heap
page read and write
FB0000
heap
page read and write
48BF000
stack
page read and write
137A1B5F000
trusted library allocation
page read and write
1D230000
heap
page read and write
1379557D000
heap
page read and write
1150000
direct allocation
page read and write
4F20000
remote allocation
page read and write
137A69D2000
trusted library allocation
page read and write
7F0000
heap
page read and write
4C81000
heap
page read and write
2311E000000
trusted library allocation
page read and write
15EE000
stack
page read and write
1A0BFC76000
trusted library allocation
page read and write
13795516000
heap
page read and write
1150000
direct allocation
page read and write
4620000
heap
page read and write
1379E158000
trusted library allocation
page read and write
137A61F0000
trusted library allocation
page read and write
13795567000
heap
page read and write
4C81000
heap
page read and write
4B71000
heap
page read and write
11A4000
heap
page read and write
4B71000
heap
page read and write
1A0BD211000
trusted library allocation
page read and write
CD4000
heap
page read and write
1379EAE7000
trusted library allocation
page read and write
32E0000
direct allocation
page read and write
3DEE000
stack
page read and write
1A0BF300000
trusted library allocation
page read and write
1379555D000
heap
page read and write
5EC9B7E000
stack
page read and write
FCF000
stack
page read and write
22D7D7A04000
trusted library allocation
page read and write
13795575000
heap
page read and write
1379555D000
heap
page read and write
1A0BF49C000
trusted library allocation
page read and write
137A0CB3000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
3A80000
trusted library allocation
page read and write
3B2F000
stack
page read and write
137A02D0000
trusted library allocation
page read and write
137A8F35000
trusted library allocation
page read and write
1379E3B1000
trusted library allocation
page read and write
32E0000
direct allocation
page read and write
137A0096000
trusted library allocation
page read and write
440E000
stack
page read and write
BF4000
heap
page read and write
4DF0000
direct allocation
page execute and read and write
137A02F8000
trusted library allocation
page read and write
137A8F3C000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
137A8F42000
trusted library allocation
page read and write
1A0B0BAA000
trusted library allocation
page read and write
137A8F5B000
trusted library allocation
page read and write
CD5000
heap
page read and write
1D836940000
unclassified section
page readonly
5A53000
trusted library allocation
page read and write
5A43000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
CD4000
heap
page read and write
5AB1000
trusted library allocation
page read and write
1379DBD0000
heap
page read and write
1379A9CD000
trusted library allocation
page read and write
13795516000
heap
page read and write
EF4000
heap
page read and write
4FA1000
heap
page read and write
1379DD95000
trusted library allocation
page read and write
128C000
unkown
page execute and write copy
1381000
heap
page read and write
1379ED46000
trusted library allocation
page read and write
137A0153000
trusted library allocation
page read and write
137A6961000
trusted library allocation
page read and write
13799F6D000
trusted library allocation
page read and write
137A6497000
trusted library allocation
page read and write
1A0BCE08000
trusted library allocation
page read and write
559D000
stack
page read and write
4601000
heap
page read and write
1379E573000
trusted library allocation
page read and write
1A99BD8000
stack
page read and write
4C70000
direct allocation
page read and write
FD0000
direct allocation
page read and write
59AA000
trusted library allocation
page read and write
CD4000
heap
page read and write
EF4000
heap
page read and write
62DA000
trusted library allocation
page read and write
41AE000
stack
page read and write
1379E698000
trusted library allocation
page read and write
4F20000
direct allocation
page read and write
FD0000
direct allocation
page read and write
5A2E000
trusted library allocation
page read and write
1379BE11000
trusted library allocation
page read and write
107B000
heap
page read and write
2FE0000
direct allocation
page execute and read and write
137A110B000
trusted library allocation
page read and write
137A00C9000
trusted library allocation
page read and write
1804BC64000
heap
page read and write
1A0BFB03000
trusted library allocation
page read and write
13795510000
heap
page read and write
1A0BF464000
trusted library allocation
page read and write
3BFF000
stack
page read and write
137A0261000
trusted library allocation
page read and write
5F01000
trusted library allocation
page read and write
32E0000
direct allocation
page read and write
59B4000
trusted library allocation
page read and write
1379E987000
trusted library allocation
page read and write
137A0363000
trusted library allocation
page read and write
1379BD16000
trusted library allocation
page read and write
1A3F000
stack
page read and write
1A0BF99B000
trusted library allocation
page read and write
1379554E000
heap
page read and write
1379FD58000
trusted library allocation
page read and write
DD0000
direct allocation
page read and write
137A6464000
trusted library allocation
page read and write
1A0BF923000
trusted library allocation
page read and write
13795553000
heap
page read and write
5AB1000
trusted library allocation
page read and write
333F000
stack
page read and write
1A0BCAFD000
trusted library allocation
page read and write
BF4000
heap
page read and write
1379556A000
heap
page read and write
16FC000
heap
page read and write
5AA0000
trusted library allocation
page read and write
137A61D5000
trusted library allocation
page read and write
5A53000
trusted library allocation
page read and write
1379FFE8000
trusted library allocation
page read and write
1A0BC8FC000
trusted library allocation
page read and write
2311D682000
unclassified section
page read and write
4DD1000
heap
page read and write
2E4BFFE000
stack
page read and write
1A0BF50E000
trusted library allocation
page read and write
137A63F9000
trusted library allocation
page read and write
1CF4F000
stack
page read and write
CD4000
heap
page read and write
1379C4B9000
trusted library allocation
page read and write
25DC000
stack
page read and write
292F7267000
heap
page read and write
137A9176000
trusted library allocation
page read and write
5F2D000
trusted library allocation
page read and write
2E519FA000
stack
page read and write
54531D8000
stack
page read and write
1A0BC3DB000
trusted library allocation
page read and write
DD4000
heap
page read and write
27F0000
heap
page read and write
1379A01C000
trusted library allocation
page read and write
5E0D000
trusted library allocation
page read and write
2311E584000
heap
page read and write
292F5800000
trusted library allocation
page read and write
1379550E000
heap
page read and write
2FE0000
direct allocation
page execute and read and write
DD4000
heap
page read and write
2A9F000
stack
page read and write
1379E3BE000
trusted library allocation
page read and write
329F000
stack
page read and write
1A0BC886000
trusted library allocation
page read and write
13795510000
heap
page read and write
137A008B000
trusted library allocation
page read and write
1A0BF600000
trusted library allocation
page read and write
137A6AF0000
trusted library allocation
page read and write
45A0000
direct allocation
page read and write
4CCE000
stack
page read and write
1379EAEC000
trusted library allocation
page read and write
CA1000
unkown
page execute read
D6C000
unkown
page write copy
1379B763000
trusted library allocation
page read and write
D54000
heap
page read and write
16F8000
heap
page read and write
12BC000
unkown
page execute and read and write
4C70000
direct allocation
page read and write
CD4000
heap
page read and write
CD4000
heap
page read and write
13795579000
heap
page read and write
4C81000
heap
page read and write
FF0000
unkown
page readonly
59A3000
trusted library allocation
page read and write
1379F20B000
trusted library allocation
page read and write
4601000
heap
page read and write
128F000
unkown
page execute and read and write
1379F4CF000
trusted library allocation
page read and write
46AE000
stack
page read and write
477A000
trusted library allocation
page execute and read and write
10D1000
heap
page read and write
5B9D000
trusted library allocation
page read and write
E69000
heap
page read and write
BF4000
heap
page read and write
2E566BE000
stack
page read and write
1379ED1F000
trusted library allocation
page read and write
13795537000
heap
page read and write
1379F4EB000
trusted library allocation
page read and write
1A0BC546000
trusted library allocation
page read and write
BF4000
heap
page read and write
E04000
heap
page read and write
FB0000
heap
page read and write
623D000
trusted library allocation
page read and write
4B71000
heap
page read and write
137A619F000
trusted library allocation
page read and write
302E000
stack
page read and write
EF4000
heap
page read and write
3FFF000
stack
page read and write
137A0F64000
trusted library allocation
page read and write
7EF000
stack
page read and write
58A8000
trusted library allocation
page read and write
1650000
heap
page read and write
550B000
stack
page read and write
2E4C0FE000
stack
page read and write
11A4000
heap
page read and write
E38000
heap
page read and write
137A1C5A000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
137A91C0000
trusted library allocation
page read and write
456E000
stack
page read and write
1A0BF3C1000
trusted library allocation
page read and write
1379EAE7000
trusted library allocation
page read and write
137A6000000
trusted library allocation
page read and write
1D836F23000
trusted library allocation
page read and write
1F4000
heap
page read and write
27D0000
direct allocation
page read and write
1804BF32000
trusted library allocation
page read and write
2E5409B000
stack
page read and write
4C81000
heap
page read and write
1A0BC198000
trusted library allocation
page read and write
DD4000
heap
page read and write
4DF2000
trusted library allocation
page read and write
13795562000
heap
page read and write
1A0BFC87000
trusted library allocation
page read and write
52E000
unkown
page execute and read and write
13795583000
heap
page read and write
137A69E6000
trusted library allocation
page read and write
42EE000
stack
page read and write
45EE000
stack
page read and write
1379556A000
heap
page read and write
FD0000
direct allocation
page read and write
1379A9DE000
trusted library allocation
page read and write
C5B000
unkown
page execute and write copy
4F20000
direct allocation
page read and write
137A8F45000
trusted library allocation
page read and write
D54000
heap
page read and write
137A61F7000
trusted library allocation
page read and write
137A63D1000
trusted library allocation
page read and write
327E000
stack
page read and write
5421000
direct allocation
page read and write
137A02BB000
trusted library allocation
page read and write
137A6370000
trusted library allocation
page read and write
1A98E000
stack
page read and write
CD4000
heap
page read and write
137A8F27000
trusted library allocation
page read and write
59F2000
trusted library allocation
page read and write
4DD1000
heap
page read and write
2311D8A7000
trusted library allocation
page read and write
3C3F000
stack
page read and write
137A02CE000
trusted library allocation
page read and write
1379556F000
heap
page read and write
1D836BC0000
heap
page read and write
137A0CF4000
trusted library allocation
page read and write
137A63E8000
trusted library allocation
page read and write
137A699D000
trusted library allocation
page read and write
5ECB57D000
stack
page read and write
1379F4EB000
trusted library allocation
page read and write
59D4000
trusted library allocation
page read and write
11DE000
unkown
page execute and read and write
13795564000
heap
page read and write
369E000
stack
page read and write
129F000
unkown
page execute and read and write
1A0BC400000
trusted library allocation
page read and write
DD4000
heap
page read and write
137A1BE0000
trusted library allocation
page read and write
1A0BC880000
trusted library allocation
page read and write
1A0BC900000
trusted library allocation
page read and write
4FC0000
direct allocation
page execute and read and write
1F0000
heap
page read and write
137A6246000
trusted library allocation
page read and write
1379A5DB000
trusted library allocation
page read and write
1A0BF8EA000
trusted library allocation
page read and write
2CAF000
stack
page read and write
1A0BF8E3000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
116B000
stack
page read and write
2311D874000
trusted library allocation
page read and write
1260000
unkown
page execute and write copy
137A0353000
trusted library allocation
page read and write
4B71000
heap
page read and write
5A40000
trusted library allocation
page read and write
137A69A8000
trusted library allocation
page read and write
11A4000
heap
page read and write
1A0BF8C2000
trusted library allocation
page read and write
47E0000
heap
page read and write
1379C423000
trusted library allocation
page read and write
5C90000
trusted library allocation
page read and write
59D2000
trusted library allocation
page read and write
1379F4EE000
trusted library allocation
page read and write
128F000
unkown
page execute and read and write
4B71000
heap
page read and write
137A8F06000
trusted library allocation
page read and write
10C3000
heap
page read and write
137A1BA8000
trusted library allocation
page read and write
4750000
direct allocation
page execute and read and write
D74000
unkown
page readonly
1744000
heap
page read and write
1379A476000
trusted library allocation
page read and write
1A0BC225000
trusted library allocation
page read and write
1379FF5D000
trusted library allocation
page read and write
13795524000
heap
page read and write
137A1BEC000
trusted library allocation
page read and write
137A69C4000
trusted library allocation
page read and write
1302000
unkown
page execute and write copy
DD4000
heap
page read and write
1379552D000
heap
page read and write
1379E074000
trusted library allocation
page read and write
1379E5F7000
trusted library allocation
page read and write
137A6503000
trusted library allocation
page read and write
1379C4D7000
trusted library allocation
page read and write
482F000
stack
page read and write
5A30000
trusted library allocation
page read and write
4600000
heap
page read and write
137A6132000
trusted library allocation
page read and write
ED7000
heap
page read and write
BF4000
heap
page read and write
1379E32A000
trusted library allocation
page read and write
137A63AC000
trusted library allocation
page read and write
2311DF80000
heap
page read and write
1379A0E9000
trusted library allocation
page read and write
1379557D000
heap
page read and write
12EF000
unkown
page execute and read and write
1A0BCCF0000
heap
page read and write
59CC000
trusted library allocation
page read and write
C25000
unkown
page execute and read and write
FF0000
unkown
page read and write
1379ED53000
trusted library allocation
page read and write
137A026F000
trusted library allocation
page read and write
137A02B4000
trusted library allocation
page read and write
126A000
unkown
page execute and read and write
13799F54000
trusted library allocation
page read and write
4A0F000
stack
page read and write
315F000
stack
page read and write
32AE000
stack
page read and write
137A014A000
trusted library allocation
page read and write
1A0BC57D000
trusted library allocation
page read and write
137A02AE000
trusted library allocation
page read and write
137A067E000
trusted library allocation
page read and write
1379E565000
trusted library allocation
page read and write
1379B80F000
heap
page read and write
2CEE000
stack
page read and write
2311E598000
heap
page read and write
478B000
trusted library allocation
page execute and read and write
CD4000
heap
page read and write
1A0BCACF000
trusted library allocation
page read and write
59BD000
trusted library allocation
page read and write
DD0000
direct allocation
page read and write
CD4000
heap
page read and write
4A1E000
stack
page read and write
DD4000
heap
page read and write
137A0191000
trusted library allocation
page read and write
1A0BC5EA000
trusted library allocation
page read and write
600C000
trusted library allocation
page read and write
D50000
heap
page read and write
11B7000
unkown
page execute and write copy
137A0159000
trusted library allocation
page read and write
13795553000
heap
page read and write
1379EA7B000
trusted library allocation
page read and write
38AF000
stack
page read and write
2311E531000
heap
page read and write
4C5F000
stack
page read and write
3ECF000
stack
page read and write
1218000
unkown
page execute and write copy
1379FEB8000
trusted library allocation
page read and write
54FF000
stack
page read and write
1379B5D5000
trusted library allocation
page read and write
1A0BFC03000
trusted library allocation
page read and write
4C70000
direct allocation
page read and write
D20000
heap
page read and write
1379552D000
heap
page read and write
1378E8D8000
trusted library allocation
page read and write
137A6119000
trusted library allocation
page read and write
2311D85F000
trusted library allocation
page read and write
3A80000
trusted library allocation
page read and write
1379E903000
trusted library allocation
page read and write
4C70000
direct allocation
page read and write
2311D934000
unkown
page execute read
3C3E000
stack
page read and write
1A0BF907000
trusted library allocation
page read and write
3C5E000
stack
page read and write
DD4000
heap
page read and write
13795562000
heap
page read and write
1180000
direct allocation
page read and write
13A0000
heap
page read and write
FD5000
heap
page read and write
137A6207000
trusted library allocation
page read and write
137A06FD000
trusted library allocation
page read and write
137A9100000
trusted library allocation
page read and write
137A69CE000
trusted library allocation
page read and write
1A0B24A0000
trusted library section
page readonly
137A7A16000
trusted library allocation
page read and write
1D836E83000
trusted library allocation
page read and write
5BAD000
stack
page read and write
1379FF83000
trusted library allocation
page read and write
4C81000
heap
page read and write
1A0BF3A4000
trusted library allocation
page read and write
2311D56A000
heap
page read and write
137A035E000
trusted library allocation
page read and write
427F000
stack
page read and write
97587FF000
stack
page read and write
CEE000
unkown
page execute and write copy
2A55470A000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
27C0000
heap
page read and write
1A0BC386000
trusted library allocation
page read and write
5ECA37E000
stack
page read and write
137A0137000
trusted library allocation
page read and write
12EE000
unkown
page execute and write copy
13799EDF000
trusted library allocation
page read and write
13795529000
heap
page read and write
C7F000
unkown
page execute and read and write
137A8FDC000
trusted library allocation
page read and write
1379DD2A000
trusted library allocation
page read and write
5EEB000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
4DAF000
stack
page read and write
D24000
heap
page read and write
137A0F7A000
trusted library allocation
page read and write
13795553000
heap
page read and write
D54000
heap
page read and write
1D45C000
stack
page read and write
13795574000
heap
page read and write
1804BF03000
trusted library allocation
page read and write
137A91F9000
trusted library allocation
page read and write
137A01B9000
trusted library allocation
page read and write
CD4000
heap
page read and write
37AE000
stack
page read and write
137A1B13000
trusted library allocation
page read and write
12A5000
unkown
page execute and write copy
249FC000000
trusted library allocation
page read and write
29B0000
heap
page read and write
4B71000
heap
page read and write
137A005B000
trusted library allocation
page read and write
12EE000
unkown
page execute and write copy
1A0BF990000
trusted library allocation
page read and write
137A02B0000
trusted library allocation
page read and write
13795565000
heap
page read and write
137A009C000
trusted library allocation
page read and write
137A6AD9000
trusted library allocation
page read and write
137A67A1000
trusted library allocation
page read and write
137A8FCE000
trusted library allocation
page read and write
4601000
heap
page read and write
1379FF80000
trusted library allocation
page read and write
5ED2000
trusted library allocation
page read and write
3F5E000
stack
page read and write
2311E5B7000
heap
page read and write
137A915A000
trusted library allocation
page read and write
4B71000
heap
page read and write
5A3E000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
12ED000
unkown
page execute and read and write
2E4C5FD000
stack
page read and write
ED7000
heap
page read and write
249FC207000
trusted library allocation
page read and write
70BE000
stack
page read and write
137A9157000
trusted library allocation
page read and write
6ABF000
stack
page read and write
1A0BD25A000
trusted library allocation
page read and write
378E000
stack
page read and write
137A009C000
trusted library allocation
page read and write
13799EB3000
trusted library allocation
page read and write
137A0730000
trusted library section
page read and write
2311E4BD000
heap
page read and write
1379E3A5000
trusted library allocation
page read and write
1379DF12000
trusted library allocation
page read and write
CFD000
stack
page read and write
F73000
heap
page read and write
53D0000
direct allocation
page execute and read and write
CD4000
heap
page read and write
137A1BC3000
trusted library allocation
page read and write
5EEC000
trusted library allocation
page read and write
4601000
heap
page read and write
4C81000
heap
page read and write
1379E32A000
trusted library allocation
page read and write
137A0F5C000
trusted library allocation
page read and write
137A0193000
trusted library allocation
page read and write
4DC0000
direct allocation
page execute and read and write
1A0BF928000
trusted library allocation
page read and write
13C1000
heap
page read and write
2E4E5FE000
stack
page read and write
137A0CEC000
trusted library allocation
page read and write
524F000
stack
page read and write
2B1F000
stack
page read and write
312F000
stack
page read and write
1379E3C7000
trusted library allocation
page read and write
137A033B000
trusted library allocation
page read and write
137A1C3F000
trusted library allocation
page read and write
E15000
heap
page read and write
13FE000
stack
page read and write
1A0BD2D0000
trusted library allocation
page read and write
5ABF000
trusted library allocation
page read and write
1379EAB6000
trusted library allocation
page read and write
29C0000
direct allocation
page read and write
137A02F4000
trusted library allocation
page read and write
FF0000
unkown
page read and write
137A6759000
trusted library allocation
page read and write
1379557A000
heap
page read and write
1379550E000
heap
page read and write
D24000
heap
page read and write
5C9B000
trusted library allocation
page read and write
49C0000
direct allocation
page read and write
5E31000
trusted library allocation
page read and write
1379E900000
trusted library allocation
page read and write
5C92000
trusted library allocation
page read and write
137A6193000
trusted library allocation
page read and write
42BE000
stack
page read and write
29C0000
direct allocation
page read and write
4601000
heap
page read and write
10F4000
heap
page read and write
137A1B98000
trusted library allocation
page read and write
13795537000
heap
page read and write
47B1000
heap
page read and write
60BB000
trusted library allocation
page read and write
13795537000
heap
page read and write
4601000
heap
page read and write
1379FFE3000
trusted library allocation
page read and write
137A0D91000
trusted library allocation
page read and write
5A40000
trusted library allocation
page read and write
1A0BF803000
trusted library allocation
page read and write
371F000
stack
page read and write
1379551C000
heap
page read and write
49E000
unkown
page readonly
1379B92F000
heap
page read and write
13795583000
heap
page read and write
4601000
heap
page read and write
137A0357000
trusted library allocation
page read and write
4601000
heap
page read and write
4C81000
heap
page read and write
BBC000
unkown
page execute and read and write
62D7000
trusted library allocation
page read and write
1379DF70000
trusted library allocation
page read and write
137A62BA000
trusted library allocation
page read and write
1050000
unkown
page execute and read and write
1A0BF4FE000
trusted library allocation
page read and write
137A001F000
trusted library allocation
page read and write
B44000
heap
page read and write
43DE000
stack
page read and write
137A8FE4000
trusted library allocation
page read and write
1379F4F1000
trusted library allocation
page read and write
DD4000
heap
page read and write
110E000
stack
page read and write
13795530000
heap
page read and write
1A0B0BDF000
trusted library allocation
page read and write
1A9916E000
unkown
page readonly
1CE3E000
stack
page read and write
4B3F000
stack
page read and write
137A0279000
trusted library allocation
page read and write
59AA000
trusted library allocation
page read and write
4F91000
heap
page read and write
1379E762000
trusted library allocation
page read and write
1379F4CB000
trusted library allocation
page read and write
CD4000
heap
page read and write
5023000
trusted library allocation
page read and write
4FE0000
direct allocation
page execute and read and write
2311E562000
heap
page read and write
2311E4A0000
heap
page read and write
50A4000
trusted library allocation
page read and write
137A9047000
trusted library allocation
page read and write
137A0281000
trusted library allocation
page read and write
137A0FB4000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
4601000
heap
page read and write
1379F34E000
trusted library allocation
page read and write
137A0278000
trusted library allocation
page read and write
1A0BF9F6000
trusted library allocation
page read and write
113E000
stack
page read and write
4B71000
heap
page read and write
1379F289000
trusted library allocation
page read and write
1379F4D6000
trusted library allocation
page read and write
59D1000
trusted library allocation
page read and write
1379E3DE000
trusted library allocation
page read and write
10E2000
heap
page read and write
5AA1000
trusted library allocation
page read and write
97567FA000
stack
page read and write
1379DD3C000
trusted library allocation
page read and write
13795516000
heap
page read and write
13A8000
heap
page read and write
1379E31C000
trusted library allocation
page read and write
337E000
stack
page read and write
4B71000
heap
page read and write
11FF000
unkown
page execute and read and write
E04000
heap
page read and write
8FE0D704000
trusted library allocation
page read and write
5590000
direct allocation
page execute and read and write
2D0000
unkown
page read and write
490E000
stack
page read and write
13795588000
heap
page read and write
1379E962000
trusted library allocation
page read and write
1379F28C000
trusted library allocation
page read and write
4601000
heap
page read and write
12DD000
unkown
page execute and write copy
137A8FFD000
trusted library allocation
page read and write
2E4D5FE000
stack
page read and write
36EE000
stack
page read and write
137A6303000
trusted library allocation
page read and write
1294000
heap
page read and write
3A80000
trusted library allocation
page read and write
5E31000
trusted library allocation
page read and write
13795553000
heap
page read and write
137A035E000
trusted library allocation
page read and write
1379FDC8000
trusted library allocation
page read and write
1379557E000
heap
page read and write
137A63D6000
trusted library allocation
page read and write
2311DEB0000
trusted library allocation
page read and write
1A0BC552000
trusted library allocation
page read and write
1379EACE000
trusted library allocation
page read and write
F86000
heap
page read and write
1379DC67000
trusted library allocation
page read and write
3BCE000
stack
page read and write
137A61E7000
trusted library allocation
page read and write
137A904D000
trusted library allocation
page read and write
304E000
stack
page read and write
1379DF26000
trusted library allocation
page read and write
CDD000
unkown
page execute and write copy
137A0288000
trusted library allocation
page read and write
1379EF9D000
trusted library allocation
page read and write
DD0000
direct allocation
page read and write
DD0000
heap
page read and write
1379557E000
heap
page read and write
D54000
heap
page read and write
CD5000
heap
page read and write
1A0BF9F2000
trusted library allocation
page read and write
2311E02E000
trusted library allocation
page read and write
1A0B06E0000
heap
page read and write
1379F020000
trusted library allocation
page read and write
E57000
heap
page read and write
1379E98B000
trusted library allocation
page read and write
4B71000
heap
page read and write
D6C000
unkown
page write copy
1A0B0BF0000
trusted library allocation
page read and write
41AD000
stack
page read and write
1A0BC1AB000
trusted library allocation
page read and write
DD4000
heap
page read and write
137A6AD4000
trusted library allocation
page read and write
137A0370000
trusted library allocation
page read and write
1378E8E6000
trusted library allocation
page read and write
1A0BF9C6000
trusted library allocation
page read and write
2311E4A0000
heap
page read and write
137A05A3000
trusted library allocation
page read and write
4B4F000
stack
page read and write
137A1BCF000
trusted library allocation
page read and write
C26000
unkown
page execute and write copy
1379DC03000
trusted library allocation
page read and write
137A91FA000
trusted library allocation
page read and write
1379EAA3000
trusted library allocation
page read and write
137A8F3E000
trusted library allocation
page read and write
599E000
trusted library allocation
page read and write
1A0BC8F3000
trusted library allocation
page read and write
137A0288000
trusted library allocation
page read and write
3EDE000
stack
page read and write
1379A8E7000
trusted library allocation
page read and write
5AC4000
trusted library allocation
page read and write
B97000
heap
page read and write
1379A003000
trusted library allocation
page read and write
1A0BFC6E000
trusted library allocation
page read and write
3AFF000
stack
page read and write
137A91B1000
trusted library allocation
page read and write
C94000
unkown
page execute and write copy
10D1000
heap
page read and write
CD0000
heap
page read and write
5AA9000
trusted library allocation
page read and write
1379BB00000
trusted library section
page readonly
A32000
unkown
page execute and read and write
1379E362000
trusted library allocation
page read and write
2D9F000
stack
page read and write
1A0BC937000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
EF4000
heap
page read and write
137A67B4000
trusted library allocation
page read and write
496F000
stack
page read and write
137A623B000
trusted library allocation
page read and write
1340000
heap
page read and write
13795574000
heap
page read and write
137A91E3000
trusted library allocation
page read and write
137A8F47000
trusted library allocation
page read and write
D54000
heap
page read and write
1378E894000
trusted library allocation
page read and write
E04000
heap
page read and write
4E10000
trusted library allocation
page read and write
16BF000
heap
page read and write
13795540000
heap
page read and write
1302000
unkown
page execute and read and write
335F000
stack
page read and write
1CCFF000
stack
page read and write
1075000
heap
page read and write
1A0BC575000
trusted library allocation
page read and write
49C0000
direct allocation
page read and write
4DB0000
direct allocation
page execute and read and write
1379E3E2000
trusted library allocation
page read and write
CFF000
stack
page read and write
1379550E000
heap
page read and write
D54000
heap
page read and write
1A0BC2E4000
trusted library allocation
page read and write
1379A86C000
trusted library allocation
page read and write
13795572000
heap
page read and write
1379555E000
heap
page read and write
137A925C000
trusted library allocation
page read and write
1A0BF3BF000
trusted library allocation
page read and write
13795562000
heap
page read and write
D54000
heap
page read and write
12C0000
direct allocation
page read and write
1379EADC000
trusted library allocation
page read and write
1E0000
heap
page read and write
1379DF92000
trusted library allocation
page read and write
2311E4A0000
heap
page read and write
137A0558000
trusted library allocation
page read and write
50C0000
direct allocation
page execute and read and write
5B24000
trusted library allocation
page read and write
5A43000
trusted library allocation
page read and write
1D836E00000
trusted library allocation
page read and write
137A0B00000
trusted library allocation
page read and write
137A91A0000
trusted library allocation
page read and write
4601000
heap
page read and write
1A0BECEC000
trusted library allocation
page read and write
468E000
stack
page read and write
1379552E000
heap
page read and write
5A30000
trusted library allocation
page read and write
1379DF00000
trusted library allocation
page read and write
137A0250000
trusted library allocation
page read and write
137A021A000
trusted library allocation
page read and write
1379DF54000
trusted library allocation
page read and write
3741000
heap
page read and write
13795546000
heap
page read and write
1A0BC476000
trusted library allocation
page read and write
1A0B0900000
trusted library allocation
page read and write
10E8000
heap
page read and write
5A55000
trusted library allocation
page read and write
1379A5FE000
trusted library allocation
page read and write
137A02D0000
trusted library allocation
page read and write
1A0BF39C000
trusted library allocation
page read and write
DD0000
direct allocation
page read and write
1378E800000
trusted library allocation
page read and write
DD0000
heap
page read and write
137A90DE000
trusted library allocation
page read and write
F7F000
heap
page read and write
1379C499000
trusted library allocation
page read and write
1379EAA2000
trusted library allocation
page read and write
498E000
stack
page read and write
1379556F000
heap
page read and write
3C8E000
stack
page read and write
1379EAB0000
trusted library allocation
page read and write
137A1B90000
trusted library allocation
page read and write
137A9096000
trusted library allocation
page read and write
F7F000
heap
page read and write
10D6000
heap
page read and write
4F91000
heap
page read and write
1A0B0B5D000
trusted library allocation
page read and write
1379558F000
heap
page read and write
6D80000
heap
page read and write
137A92F6000
trusted library allocation
page read and write
13795592000
heap
page read and write
137A0195000
trusted library allocation
page read and write
137A02A4000
trusted library allocation
page read and write
1379555D000
heap
page read and write
13795572000
heap
page read and write
1CF9F000
stack
page read and write
1379EFF9000
trusted library allocation
page read and write
1190000
direct allocation
page execute and read and write
1379F390000
trusted library allocation
page read and write
CD4000
heap
page read and write
DD4000
heap
page read and write
137A63B9000
trusted library allocation
page read and write
E04000
heap
page read and write
BF4000
heap
page read and write
D54000
heap
page read and write
137A632B000
trusted library allocation
page read and write
1379E3B8000
trusted library allocation
page read and write
29C0000
direct allocation
page read and write
1379E3A5000
trusted library allocation
page read and write
137A0058000
trusted library allocation
page read and write
CD4000
heap
page read and write
1349000
heap
page read and write
1D836E03000
trusted library allocation
page read and write
B44000
heap
page read and write
1379E9CB000
trusted library allocation
page read and write
502E000
stack
page read and write
2250CC500000
trusted library allocation
page read and write
55E0000
direct allocation
page execute and read and write
137A037D000
trusted library allocation
page read and write
1379E795000
trusted library allocation
page read and write
13799F72000
trusted library allocation
page read and write
52D7000
trusted library allocation
page read and write
1379550E000
heap
page read and write
1379BD00000
trusted library allocation
page read and write
1379557E000
heap
page read and write
1379A9A1000
trusted library allocation
page read and write
49C0000
direct allocation
page read and write
CD4000
heap
page read and write
13795553000
heap
page read and write
2311D4A0000
unclassified section
page readonly
1379EA94000
trusted library allocation
page read and write
10E7000
heap
page read and write
42CE000
stack
page read and write
5A53000
trusted library allocation
page read and write
1A991EB000
stack
page read and write
1CDCF000
stack
page read and write
5EC75BE000
stack
page read and write
45B1000
heap
page read and write
D54000
heap
page read and write
137A676A000
trusted library allocation
page read and write
387E000
stack
page read and write
137A698F000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
11D1000
unkown
page execute and read and write
137A69E6000
trusted library allocation
page read and write
4C00000
direct allocation
page execute and read and write
4A80000
direct allocation
page read and write
5AA0000
trusted library allocation
page read and write
2311E5AE000
heap
page read and write
1303000
unkown
page execute and write copy
1379A900000
trusted library allocation
page read and write
2DAF000
stack
page read and write
1050000
unkown
page execute and write copy
346E000
stack
page read and write
390F000
stack
page read and write
452F000
stack
page read and write
1A0BC503000
trusted library allocation
page read and write
50B4000
trusted library allocation
page read and write
13795564000
heap
page read and write
59C1000
trusted library allocation
page read and write
1379FFAE000
trusted library allocation
page read and write
1A0BFD03000
trusted library allocation
page read and write
EF4000
heap
page read and write
79D000
stack
page read and write
1379F980000
unclassified section
page read and write
1A0BF48A000
trusted library allocation
page read and write
137A0D03000
trusted library allocation
page read and write
CD4000
heap
page read and write
1A0BC3C9000
trusted library allocation
page read and write
D24000
heap
page read and write
1804BA60000
remote allocation
page read and write
5C91000
trusted library allocation
page read and write
1379FFEB000
trusted library allocation
page read and write
13795516000
heap
page read and write
49D1000
heap
page read and write
5A30000
trusted library allocation
page read and write
13B0000
heap
page read and write
6DC000
unkown
page readonly
4F91000
heap
page read and write
1D836E60000
trusted library allocation
page read and write
137A0195000
trusted library allocation
page read and write
1379DF4C000
trusted library allocation
page read and write
BF4000
heap
page read and write
1379A3D0000
trusted library section
page readonly
1A0BC515000
trusted library allocation
page read and write
4AC1000
heap
page read and write
137A0159000
trusted library allocation
page read and write
EFE000
stack
page read and write
D24000
heap
page read and write
249FBE50000
heap
page read and write
137A6941000
trusted library allocation
page read and write
123E000
unkown
page execute and read and write
5F7E000
trusted library allocation
page read and write
137A0120000
trusted library allocation
page read and write
1A0BF522000
trusted library allocation
page read and write
4F90000
heap
page read and write
1A0BF9F6000
trusted library allocation
page read and write
2311D878000
trusted library allocation
page read and write
2311E4A9000
heap
page read and write
4A2F000
stack
page read and write
13795516000
heap
page read and write
1379E7F8000
trusted library allocation
page read and write
137A06FD000
trusted library allocation
page read and write
1379E3B1000
trusted library allocation
page read and write
4601000
heap
page read and write
13799EF9000
trusted library allocation
page read and write
5EC57FF000
stack
page read and write
5455AFE000
unkown
page readonly
1379EAEC000
trusted library allocation
page read and write
E15000
heap
page read and write
4601000
heap
page read and write
1A0BC198000
trusted library allocation
page read and write
FD7000
heap
page read and write
1379E98B000
trusted library allocation
page read and write
1379E9A2000
trusted library allocation
page read and write
34DF000
stack
page read and write
137A619B000
trusted library allocation
page read and write
13795525000
heap
page read and write
4AAF000
stack
page read and write
1379E700000
trusted library allocation
page read and write
137A6397000
trusted library allocation
page read and write
2E525FD000
stack
page read and write
1379EAB6000
trusted library allocation
page read and write
1379E177000
trusted library allocation
page read and write
1379FAE6000
trusted library allocation
page read and write
13795519000
heap
page read and write
54527E7000
stack
page read and write
F40000
heap
page read and write
1D22D000
stack
page read and write
E04000
heap
page read and write
1379A57D000
trusted library allocation
page read and write
362F000
stack
page read and write
BF4000
heap
page read and write
137A0383000
trusted library allocation
page read and write
53A0000
direct allocation
page execute and read and write
13795569000
heap
page read and write
13795569000
heap
page read and write
1A0B0AAF000
unclassified section
page read and write
137A0381000
trusted library allocation
page read and write
CD4000
heap
page read and write
137A0258000
trusted library allocation
page read and write
399F000
stack
page read and write
5A30000
trusted library allocation
page read and write
59CF000
trusted library allocation
page read and write
E8E000
stack
page read and write
D54000
heap
page read and write
1379C100000
trusted library allocation
page read and write
137A5C00000
trusted library allocation
page read and write
127C000
unkown
page execute and write copy
1378E4D0000
heap
page read and write
13795592000
heap
page read and write
137A1C6A000
trusted library allocation
page read and write
5E34000
trusted library allocation
page read and write
397F000
stack
page read and write
5A5E000
trusted library allocation
page read and write
124D000
unkown
page execute and read and write
4FA5000
trusted library allocation
page read and write
1A0BC5BA000
trusted library allocation
page read and write
1379FF78000
trusted library allocation
page read and write
59D2000
trusted library allocation
page read and write
1379C4DA000
trusted library allocation
page read and write
1379FAE6000
trusted library allocation
page read and write
5150000
direct allocation
page execute and read and write
1A0BD23F000
trusted library allocation
page read and write
12FF000
unkown
page execute and write copy
137A0261000
trusted library allocation
page read and write
DD0000
direct allocation
page read and write
FFF000
stack
page read and write
30AE000
stack
page read and write
13799F68000
trusted library allocation
page read and write
137A1BEC000
trusted library allocation
page read and write
2ABE000
stack
page read and write
137A02EC000
trusted library allocation
page read and write
1379555D000
heap
page read and write
D24000
heap
page read and write
1A0BF800000
trusted library allocation
page read and write
137A02CE000
trusted library allocation
page read and write
5F49000
trusted library allocation
page read and write
5AD3000
trusted library allocation
page read and write
1379E421000
trusted library allocation
page read and write
2A554320000
heap
page read and write
BF4000
heap
page read and write
D54000
heap
page read and write
2311D800000
trusted library allocation
page read and write
137A6143000
trusted library allocation
page read and write
5A40000
trusted library allocation
page read and write
6013000
trusted library allocation
page read and write
1379550E000
heap
page read and write
5A39000
trusted library allocation
page read and write
1379E1F1000
trusted library allocation
page read and write
1379ED5F000
trusted library allocation
page read and write
1379556F000
heap
page read and write
1379DDB4000
trusted library allocation
page read and write
419F000
stack
page read and write
4F91000
heap
page read and write
4DFE000
stack
page read and write
137A0EF9000
trusted library allocation
page read and write
B9A000
heap
page read and write
1379EA5B000
trusted library allocation
page read and write
1379A4FE000
trusted library allocation
page read and write
3E4E000
stack
page read and write
1379550E000
heap
page read and write
137A0FF5000
trusted library allocation
page read and write
249FBED0000
heap
page read and write
49C0000
direct allocation
page read and write
52F0000
direct allocation
page execute and read and write
16B5000
heap
page read and write
3A80000
trusted library allocation
page read and write
137A0288000
trusted library allocation
page read and write
1379FFE5000
trusted library allocation
page read and write
137A6A45000
trusted library allocation
page read and write
CD4000
heap
page read and write
137A8F3E000
trusted library allocation
page read and write
2311D4E0000
heap
page read and write
13795537000
heap
page read and write
4601000
heap
page read and write
4D90000
direct allocation
page execute and read and write
59D1000
trusted library allocation
page read and write
105C000
unkown
page execute and write copy
1D836E89000
trusted library allocation
page read and write
2311E526000
heap
page read and write
4601000
heap
page read and write
162C000
stack
page read and write
137A1BD3000
trusted library allocation
page read and write
13790400000
heap
page read and write
137A0548000
trusted library allocation
page read and write
137A6931000
trusted library allocation
page read and write
1A0BC1A7000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
FD0000
direct allocation
page read and write
344E000
stack
page read and write
2311D921000
unkown
page execute read
CD4000
heap
page read and write
1A0BC878000
trusted library allocation
page read and write
1379BC15000
trusted library allocation
page read and write
1D836E85000
trusted library allocation
page read and write
137904D8000
heap
page read and write
13795516000
heap
page read and write
363E000
stack
page read and write
3F1E000
stack
page read and write
DB1000
heap
page read and write
2FEF000
stack
page read and write
1379557D000
heap
page read and write
4BF0000
heap
page read and write
137A001B000
trusted library allocation
page read and write
1379FF78000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
137A0113000
trusted library allocation
page read and write
137904B7000
heap
page read and write
5A33000
trusted library allocation
page read and write
1379E3E2000
trusted library allocation
page read and write
E20E0EE000
unkown
page readonly
DD4000
heap
page read and write
FD0000
direct allocation
page read and write
137A7A32000
trusted library allocation
page read and write
4AB1000
heap
page read and write
137A63EB000
trusted library allocation
page read and write
D24000
heap
page read and write
1379EABD000
trusted library allocation
page read and write
1A0BF9C6000
trusted library allocation
page read and write
137A02D0000
trusted library allocation
page read and write
1379EA3B000
trusted library allocation
page read and write
2311D81B000
trusted library allocation
page read and write
1379FE64000
trusted library allocation
page read and write
52B1000
direct allocation
page read and write
26DF000
stack
page read and write
1379556F000
heap
page read and write
1379FFFB000
trusted library allocation
page read and write
1A0B0840000
heap
page readonly
1379FE44000
trusted library allocation
page read and write
DD4000
heap
page read and write
CD4000
heap
page read and write
2E562BF000
stack
page read and write
29C0000
direct allocation
page read and write
1379551C000
heap
page read and write
1379A903000
trusted library allocation
page read and write
3F2E000
stack
page read and write
CD4000
heap
page read and write
1379FB21000
trusted library allocation
page read and write
1804BA7A000
remote allocation
page execute read
16BC000
heap
page read and write
16EB000
heap
page read and write
BF4000
heap
page read and write
CA1000
unkown
page execute read
137A026C000
trusted library allocation
page read and write
137A0137000
trusted library allocation
page read and write
2CAF000
stack
page read and write
59BB000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
1379EA96000
trusted library allocation
page read and write
137A9300000
trusted library allocation
page read and write
16F9000
heap
page read and write
5EC73BC000
stack
page read and write
1F4000
heap
page read and write
E2C000
heap
page read and write
137A6012000
trusted library allocation
page read and write
137A631B000
trusted library allocation
page read and write
2E523FD000
stack
page read and write
137A699D000
trusted library allocation
page read and write
2311D87F000
trusted library allocation
page read and write
137A02F4000
trusted library allocation
page read and write
420000
heap
page read and write
2E521FD000
stack
page read and write
1A0B06C0000
unclassified section
page readonly
137A3022000
trusted library allocation
page read and write
137A6AF3000
trusted library allocation
page read and write
4601000
heap
page read and write
4C81000
heap
page read and write
27D0000
direct allocation
page read and write
1379552D000
heap
page read and write
137A8FE1000
trusted library allocation
page read and write
1379E983000
trusted library allocation
page read and write
1804BCA0000
unclassified section
page readonly
5F52000
trusted library allocation
page read and write
CD4000
heap
page read and write
10C7000
heap
page read and write
1379EAE7000
trusted library allocation
page read and write
137A0378000
trusted library allocation
page read and write
300F000
stack
page read and write
1379E799000
trusted library allocation
page read and write
1A0BFC73000
trusted library allocation
page read and write
E21043B000
stack
page read and write
12F3000
unkown
page execute and write copy
1A0BC54D000
trusted library allocation
page read and write
416F000
stack
page read and write
5A30000
trusted library allocation
page read and write
137A92B9000
trusted library allocation
page read and write
CD4000
heap
page read and write
59C000
unkown
page execute and read and write
316E000
stack
page read and write
137A8F33000
trusted library allocation
page read and write
1379EAFA000
trusted library allocation
page read and write
5171000
direct allocation
page read and write
1379550E000
heap
page read and write
55DE000
trusted library allocation
page read and write
1379F4CB000
trusted library allocation
page read and write
1379E3DE000
trusted library allocation
page read and write
425F000
stack
page read and write
1379558D000
heap
page read and write
5140000
direct allocation
page execute and read and write
49D1000
heap
page read and write
CD4000
heap
page read and write
1379E2DB000
trusted library allocation
page read and write
35BF000
stack
page read and write
10F4000
heap
page read and write
49D1000
heap
page read and write
137A009C000
trusted library allocation
page read and write
1379FFE8000
trusted library allocation
page read and write
1379E3C7000
trusted library allocation
page read and write
4DB0000
direct allocation
page execute and read and write
1A0BCA05000
trusted library allocation
page read and write
50B0000
direct allocation
page execute and read and write
1379ED5F000
trusted library allocation
page read and write
137A0149000
trusted library allocation
page read and write
126A000
unkown
page execute and read and write
2311D8C6000
trusted library allocation
page read and write
2311E4A0000
heap
page read and write
137A02CE000
trusted library allocation
page read and write
1804BEAF000
trusted library allocation
page read and write
3F8E000
stack
page read and write
406E000
stack
page read and write
137A01F3000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
27F7000
heap
page read and write
137A009C000
trusted library allocation
page read and write
5A60000
remote allocation
page read and write
137A11DB000
trusted library allocation
page read and write
1F4000
heap
page read and write
137A8F40000
trusted library allocation
page read and write
D24000
heap
page read and write
CD4000
heap
page read and write
11A4000
heap
page read and write
137A02EC000
trusted library allocation
page read and write
39BE000
stack
page read and write
4E00000
direct allocation
page execute and read and write
137A61C3000
trusted library allocation
page read and write
1A0BF76F000
trusted library allocation
page read and write
1379E3CD000
trusted library allocation
page read and write
137A300E000
trusted library allocation
page read and write
5EC33EE000
stack
page read and write
49D1000
heap
page read and write
1379F4EE000
trusted library allocation
page read and write
31DF000
stack
page read and write
5EC717E000
stack
page read and write
1379E570000
trusted library allocation
page read and write
1379E3E2000
trusted library allocation
page read and write
1379E263000
trusted library allocation
page read and write
137A0153000
trusted library allocation
page read and write
137A1BB9000
trusted library allocation
page read and write
13795560000
heap
page read and write
CD4000
heap
page read and write
1379ED5C000
trusted library allocation
page read and write
137A0372000
trusted library allocation
page read and write
137A63C3000
trusted library allocation
page read and write
137A8F42000
trusted library allocation
page read and write
1379F6E4000
trusted library allocation
page read and write
13795562000
heap
page read and write
137A9176000
trusted library allocation
page read and write
137A911E000
trusted library allocation
page read and write
22A293A04000
trusted library allocation
page read and write
137A1181000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
5A60000
remote allocation
page read and write
1A0BF806000
trusted library allocation
page read and write
4CAE000
stack
page read and write
B44000
heap
page read and write
CD4000
heap
page read and write
454E000
stack
page read and write
11D1000
unkown
page execute and read and write
FD0000
direct allocation
page read and write
56B000
heap
page read and write
1379A963000
trusted library allocation
page read and write
49C0000
direct allocation
page read and write
705E000
stack
page read and write
12BC000
unkown
page execute and read and write
137A61F0000
trusted library allocation
page read and write
1A0BD204000
trusted library allocation
page read and write
CD4000
heap
page read and write
51AE000
stack
page read and write
12EA000
heap
page read and write
137A69AE000
trusted library allocation
page read and write
137A02E6000
trusted library allocation
page read and write
FD0000
direct allocation
page read and write
11A4000
heap
page read and write
13795530000
heap
page read and write
29C0000
direct allocation
page read and write
137A69DC000
trusted library allocation
page read and write
1A0BC847000
trusted library allocation
page read and write
1381000
heap
page read and write
13795560000
heap
page read and write
137A0086000
trusted library allocation
page read and write
1804BEEB000
trusted library allocation
page read and write
1A0B2446000
heap
page read and write
3E0F000
stack
page read and write
13795512000
heap
page read and write
6C9E000
stack
page read and write
10CF000
stack
page read and write
13795567000
heap
page read and write
10D1000
heap
page read and write
2A5544E9000
heap
page read and write
137A0B03000
trusted library allocation
page read and write
4B71000
heap
page read and write
137A92A5000
trusted library allocation
page read and write
1A0BF400000
trusted library allocation
page read and write
137A90F7000
trusted library allocation
page read and write
4800000
heap
page read and write
10FE000
stack
page read and write
292F725B000
heap
page read and write
2297506EF000
trusted library allocation
page read and write
4601000
heap
page read and write
137A63F9000
trusted library allocation
page read and write
137A8FA3000
trusted library allocation
page read and write
137A01D5000
trusted library allocation
page read and write
137A8FFA000
trusted library allocation
page read and write
57E000
stack
page read and write
D24000
heap
page read and write
96F000
stack
page read and write
1379A8D5000
trusted library allocation
page read and write
1379E0A7000
trusted library allocation
page read and write
137A0656000
trusted library allocation
page read and write
4F91000
heap
page read and write
137A0383000
trusted library allocation
page read and write
13799F00000
trusted library allocation
page read and write
1AC2E000
stack
page read and write
10F4000
heap
page read and write
FB0000
direct allocation
page read and write
375E000
stack
page read and write
4B71000
heap
page read and write
E04000
heap
page read and write
4C81000
heap
page read and write
1378E86B000
trusted library allocation
page read and write
137A63EB000
trusted library allocation
page read and write
137A029B000
trusted library allocation
page read and write
59EC000
trusted library allocation
page read and write
1379C41B000
trusted library allocation
page read and write
13795574000
heap
page read and write
1D836BA0000
heap
page readonly
49C0000
direct allocation
page read and write
DFF000
heap
page read and write
1804BAA0000
heap
page read and write
DD4000
heap
page read and write
5A3C000
trusted library allocation
page read and write
1379E5A9000
trusted library allocation
page read and write
13795574000
heap
page read and write
5110000
direct allocation
page read and write
1A0BC526000
trusted library allocation
page read and write
137A69E8000
trusted library allocation
page read and write
1379FF3A000
trusted library allocation
page read and write
1379E3AE000
trusted library allocation
page read and write
137A6977000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
4601000
heap
page read and write
137A8FA3000
trusted library allocation
page read and write
3DCE000
stack
page read and write
5130000
direct allocation
page execute and read and write
1700000
heap
page read and write
DD4000
heap
page read and write
1379E3E6000
trusted library allocation
page read and write
137A0303000
trusted library allocation
page read and write
137A1174000
trusted library allocation
page read and write
1302000
unkown
page execute and read and write
1379550E000
heap
page read and write
2E4C07A000
stack
page read and write
137A0EF0000
trusted library allocation
page read and write
CD4000
heap
page read and write
1A0B0B47000
trusted library allocation
page read and write
5AA9000
trusted library allocation
page read and write
13795510000
heap
page read and write
4601000
heap
page read and write
5A53000
trusted library allocation
page read and write
13795560000
heap
page read and write
13795575000
heap
page read and write
137A011C000
trusted library allocation
page read and write
137A0641000
trusted library allocation
page read and write
545276E000
unkown
page readonly
FAA4551000
trusted library allocation
page execute read
13799F1B000
trusted library allocation
page read and write
F72000
heap
page read and write
137A92F1000
trusted library allocation
page read and write
CD4000
heap
page read and write
1379A009000
trusted library allocation
page read and write
11A4000
heap
page read and write
1379C4BC000
trusted library allocation
page read and write
137A6765000
trusted library allocation
page read and write
137A8F88000
trusted library allocation
page read and write
13C0000
heap
page read and write
4AB1000
heap
page read and write
27D0000
direct allocation
page read and write
338F000
stack
page read and write
13795583000
heap
page read and write
1A0BF963000
trusted library allocation
page read and write
12E0000
heap
page read and write
4601000
heap
page read and write
1379E3E6000
trusted library allocation
page read and write
34EF000
stack
page read and write
4DE0000
heap
page read and write
1379551C000
heap
page read and write
10C1000
heap
page read and write
137A8F3C000
trusted library allocation
page read and write
137A0164000
trusted library allocation
page read and write
1265000
unkown
page execute and read and write
27D0000
direct allocation
page read and write
1A0BFC36000
trusted library allocation
page read and write
D54000
heap
page read and write
4B71000
heap
page read and write
1A0BF479000
trusted library allocation
page read and write
5E34000
trusted library allocation
page read and write
137A0047000
trusted library allocation
page read and write
137A0279000
trusted library allocation
page read and write
1A0B0BFE000
trusted library allocation
page read and write
13795510000
heap
page read and write
137A6280000
trusted library allocation
page read and write
CD4000
heap
page read and write
1379EABD000
trusted library allocation
page read and write
1A0BF8B1000
trusted library allocation
page read and write
49C0000
direct allocation
page read and write
5890000
trusted library allocation
page read and write
1379C300000
trusted library allocation
page read and write
1A0B0B68000
trusted library allocation
page read and write
137A91BD000
trusted library allocation
page read and write
1D836C13000
heap
page read and write
BD3C8A04000
trusted library allocation
page read and write
1379F4CB000
trusted library allocation
page read and write
5ECC81D000
stack
page read and write
2311D4C0000
heap
page read and write
1A0BF8E8000
trusted library allocation
page read and write
CD4000
heap
page read and write
13795516000
heap
page read and write
35FF000
stack
page read and write
4AB000
unkown
page write copy
30DC000
heap
page read and write
137A8F42000
trusted library allocation
page read and write
137A6246000
trusted library allocation
page read and write
475D000
trusted library allocation
page execute and read and write
4E50000
remote allocation
page read and write
1A0BC198000
trusted library allocation
page read and write
5ECC85F000
stack
page read and write
137A0023000
trusted library allocation
page read and write
137A3028000
trusted library allocation
page read and write
4C81000
heap
page read and write
10C6000
heap
page read and write
FB0000
direct allocation
page read and write
D24000
heap
page read and write
1379E952000
trusted library allocation
page read and write
BF4000
heap
page read and write
137A0086000
trusted library allocation
page read and write
137A1B1D000
trusted library allocation
page read and write
302E000
stack
page read and write
2311E52F000
heap
page read and write
13795530000
heap
page read and write
137A0372000
trusted library allocation
page read and write
CD4000
heap
page read and write
166E000
stack
page read and write
5570000
direct allocation
page execute and read and write
2311E49C000
heap
page read and write
12E8000
unkown
page execute and read and write
2311E441000
heap
page read and write
137A628C000
trusted library allocation
page read and write
CD4000
heap
page read and write
4C60000
heap
page read and write
1379C30B000
trusted library allocation
page read and write
137A019F000
trusted library allocation
page read and write
1379E3C7000
trusted library allocation
page read and write
137A632D000
trusted library allocation
page read and write
1379FF4E000
trusted library allocation
page read and write
4C70000
direct allocation
page read and write
137A69C9000
trusted library allocation
page read and write
1379FF30000
trusted library allocation
page read and write
1379EA50000
trusted library allocation
page read and write
13795553000
heap
page read and write
4C81000
heap
page read and write
1379555D000
heap
page read and write
137A6091000
trusted library allocation
page read and write
135B000
heap
page read and write
4C81000
heap
page read and write
1379B7C9000
trusted library allocation
page read and write
137A0058000
trusted library allocation
page read and write
8C2000
unkown
page execute and write copy
1A0BF615000
trusted library allocation
page read and write
13795533000
heap
page read and write
1A0BEC1F000
trusted library allocation
page read and write
137A01AD000
trusted library allocation
page read and write
4C81000
heap
page read and write
137A9147000
trusted library allocation
page read and write
137A9169000
trusted library allocation
page read and write
1700000
heap
page read and write
1A0BF99B000
trusted library allocation
page read and write
5320000
direct allocation
page execute and read and write
2A554600000
trusted library allocation
page read and write
45A0000
direct allocation
page read and write
1379F960000
unclassified section
page read and write
4F2E000
stack
page read and write
3BEE000
stack
page read and write
4601000
heap
page read and write
137A0F38000
trusted library allocation
page read and write
CD4000
heap
page read and write
5AA1000
trusted library allocation
page read and write
560D000
stack
page read and write
E04000
heap
page read and write
1AD5E000
stack
page read and write
10E2000
heap
page read and write
137A6343000
trusted library allocation
page read and write
137A92F1000
trusted library allocation
page read and write
137A88D2000
trusted library allocation
page read and write
662E000
stack
page read and write
137A0A00000
trusted library allocation
page read and write
4601000
heap
page read and write
314C000
stack
page read and write
30FE000
stack
page read and write
137A92EF000
trusted library allocation
page read and write
11A4000
heap
page read and write
135E000
heap
page read and write
1A0BD700000
trusted library allocation
page read and write
137A8F3C000
trusted library allocation
page read and write
283E000
stack
page read and write
1A0BC243000
trusted library allocation
page read and write
1302000
unkown
page execute and write copy
6027000
trusted library allocation
page read and write
4DCF000
stack
page read and write
4BF0000
direct allocation
page execute and read and write
59A7000
trusted library allocation
page read and write
137A029B000
trusted library allocation
page read and write
4601000
heap
page read and write
DD0000
direct allocation
page read and write
137A9071000
trusted library allocation
page read and write
1379C4DE000
trusted library allocation
page read and write
4C81000
heap
page read and write
11A4000
heap
page read and write
137A0700000
trusted library section
page readonly
1A0BC3C6000
trusted library allocation
page read and write
40CE000
stack
page read and write
379F000
stack
page read and write
1042000
unkown
page execute and read and write
4B71000
heap
page read and write
137A104E000
trusted library allocation
page read and write
139C000
heap
page read and write
2311D680000
unclassified section
page read and write
BC8000
heap
page read and write
137A0362000
trusted library allocation
page read and write
1A0BF6CB000
trusted library allocation
page read and write
137A1B68000
trusted library allocation
page read and write
1379556A000
heap
page read and write
C5F000
unkown
page execute and write copy
5E3E000
trusted library allocation
page read and write
12F3000
unkown
page execute and write copy
13795553000
heap
page read and write
D54000
heap
page read and write
137A69AE000
trusted library allocation
page read and write
34FE000
stack
page read and write
5A5E000
trusted library allocation
page read and write
408F000
stack
page read and write
105C000
unkown
page execute and write copy
249FC20A000
trusted library allocation
page read and write
4C81000
heap
page read and write
3A80000
trusted library allocation
page read and write
EF4000
heap
page read and write
1379EABD000
trusted library allocation
page read and write
2F6E000
stack
page read and write
5390000
direct allocation
page execute and read and write
2E5425B000
stack
page read and write
1A0B0AB0000
heap
page read and write
5A30000
trusted library allocation
page read and write
4B71000
heap
page read and write
137A0222000
trusted library allocation
page read and write
13799E81000
trusted library allocation
page read and write
1D20E000
stack
page read and write
BE0000
heap
page read and write
47C0000
trusted library allocation
page read and write
13795537000
heap
page read and write
4601000
heap
page read and write
13795536000
heap
page read and write
1A0BC3EC000
trusted library allocation
page read and write
5560000
direct allocation
page execute and read and write
137A03BF000
trusted library allocation
page read and write
127C000
unkown
page execute and write copy
1640000
heap
page read and write
3C6F000
stack
page read and write
137A8F3C000
trusted library allocation
page read and write
1379EB00000
trusted library allocation
page read and write
1379B5AB000
trusted library allocation
page read and write
4601000
heap
page read and write
1804BF22000
trusted library allocation
page read and write
CD4000
heap
page read and write
3D5F000
stack
page read and write
2311E529000
heap
page read and write
137A8F3C000
trusted library allocation
page read and write
2BFE000
stack
page read and write
30D0000
heap
page read and write
13795537000
heap
page read and write
4601000
heap
page read and write
E20EBD8000
stack
page read and write
CD4000
heap
page read and write
950000
heap
page read and write
5AB1000
trusted library allocation
page read and write
1D836E63000
trusted library allocation
page read and write
137A69FC000
trusted library allocation
page read and write
85F3000
heap
page read and write
1049000
unkown
page write copy
13795562000
heap
page read and write
137A63D0000
trusted library allocation
page read and write
13795560000
heap
page read and write
13790432000
heap
page read and write
1379E703000
trusted library allocation
page read and write
54527EB000
stack
page read and write
1379ED13000
trusted library allocation
page read and write
1379ED8C000
trusted library allocation
page read and write
3FBF000
stack
page read and write
1140000
heap
page read and write
385F000
stack
page read and write
1A0BECB5000
trusted library allocation
page read and write
27D0000
direct allocation
page read and write
1379E791000
trusted library allocation
page read and write
1379555D000
heap
page read and write
1F7F000
stack
page read and write
1670000
heap
page read and write
137A0633000
trusted library allocation
page read and write
1379557A000
heap
page read and write
1379A01F000
trusted library allocation
page read and write
CD4000
heap
page read and write
1379C200000
trusted library allocation
page read and write
1379FED3000
trusted library allocation
page read and write
1A94F000
stack
page read and write
5AB1000
trusted library allocation
page read and write
EA8000
heap
page read and write
1A0BD218000
trusted library allocation
page read and write
1379B403000
trusted library allocation
page read and write
1A0BECF8000
trusted library allocation
page read and write
13795520000
heap
page read and write
2311D550000
heap
page readonly
4C81000
heap
page read and write
45AF000
stack
page read and write
5A30000
trusted library allocation
page read and write
CD4000
heap
page read and write
5FDB000
trusted library allocation
page read and write
1A0BF6EB000
trusted library allocation
page read and write
1379E5FC000
trusted library allocation
page read and write
1379DFA7000
trusted library allocation
page read and write
4DA0000
direct allocation
page execute and read and write
1379EAD9000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
1202D8100000
trusted library allocation
page read and write
1379F962000
unclassified section
page read and write
47E1000
heap
page read and write
1804BF11000
trusted library allocation
page read and write
5D1F000
stack
page read and write
13795510000
heap
page read and write
137A6743000
trusted library allocation
page read and write
CD4000
heap
page read and write
49D1000
heap
page read and write
1379B8D2000
heap
page read and write
137A61ED000
trusted library allocation
page read and write
5E37000
trusted library allocation
page read and write
DD4000
heap
page read and write
7BA000
stack
page read and write
1379556A000
heap
page read and write
13795520000
heap
page read and write
3CEF000
stack
page read and write
59A3000
trusted library allocation
page read and write
2E5379E000
stack
page read and write
137A01B7000
trusted library allocation
page read and write
6D50000
heap
page execute and read and write
1379557B000
heap
page read and write
1379E600000
trusted library allocation
page read and write
5A2F000
trusted library allocation
page read and write
1A9BCFE000
stack
page read and write
D62000
unkown
page readonly
1379555D000
heap
page read and write
1804BE00000
trusted library allocation
page read and write
137A02F4000
trusted library allocation
page read and write
1CFED000
stack
page read and write
1240000
heap
page read and write
5590000
direct allocation
page execute and read and write
13795560000
heap
page read and write
12DB000
unkown
page execute and write copy
4F31000
heap
page read and write
137A8F17000
trusted library allocation
page read and write
DD4000
heap
page read and write
1A0BECC6000
trusted library allocation
page read and write
466F000
stack
page read and write
13795529000
heap
page read and write
1D836E23000
trusted library allocation
page read and write
1A0BC8AD000
trusted library allocation
page read and write
137A3012000
trusted library allocation
page read and write
1379557A000
heap
page read and write
1A0BFC07000
trusted library allocation
page read and write
13795572000
heap
page read and write
1381000
heap
page read and write
1379EA85000
trusted library allocation
page read and write
1A0BCA12000
trusted library allocation
page read and write
B44000
heap
page read and write
13795562000
heap
page read and write
13795574000
heap
page read and write
12BC000
unkown
page execute and read and write
1A0BD2E2000
trusted library allocation
page read and write
1379556E000
heap
page read and write
2311E49C000
heap
page read and write
1379E74D000
trusted library allocation
page read and write
95D000
unkown
page execute and read and write
1A0B0650000
unclassified section
page readonly
33DF000
stack
page read and write
1A0B0A90000
trusted library section
page readonly
13BB000
heap
page read and write
5E34000
trusted library allocation
page read and write
4601000
heap
page read and write
137A1B1A000
trusted library allocation
page read and write
CD4000
heap
page read and write
117B000
heap
page read and write
EDE000
heap
page read and write
59A3000
trusted library allocation
page read and write
297C000
stack
page read and write
137A0C8C000
trusted library allocation
page read and write
4754000
trusted library allocation
page read and write
27D0000
direct allocation
page read and write
13795574000
heap
page read and write
137A0EB4000
trusted library allocation
page read and write
137A031E000
trusted library allocation
page read and write
137A01B9000
trusted library allocation
page read and write
404E000
stack
page read and write
137A8F42000
trusted library allocation
page read and write
292F5761000
heap
page read and write
51A000
unkown
page execute and read and write
1379E99C000
trusted library allocation
page read and write
137A0F91000
trusted library allocation
page read and write
D24000
heap
page read and write
38AF000
stack
page read and write
137A0C03000
trusted library allocation
page read and write
3C5E000
stack
page read and write
137A029B000
trusted library allocation
page read and write
1379556A000
heap
page read and write
69C000
stack
page read and write
1379FAFC000
trusted library allocation
page read and write
191F000
stack
page read and write
4A8F000
stack
page read and write
CBE000
stack
page read and write
1804BE5B000
trusted library allocation
page read and write
1A0BFC9F000
trusted library allocation
page read and write
2311E526000
heap
page read and write
2311E52F000
heap
page read and write
1379EAE9000
trusted library allocation
page read and write
137A03F7000
trusted library allocation
page read and write
1379E154000
trusted library allocation
page read and write
1A80F000
stack
page read and write
137A0DA2000
trusted library allocation
page read and write
13795566000
heap
page read and write
5A30000
trusted library allocation
page read and write
1379E790000
trusted library allocation
page read and write
13795575000
heap
page read and write
97577FE000
stack
page read and write
5A53000
trusted library allocation
page read and write
5A5E000
trusted library allocation
page read and write
42EE000
stack
page read and write
137A613C000
trusted library allocation
page read and write
FF1000
unkown
page execute and read and write
4D4E000
stack
page read and write
1379FB0E000
trusted library allocation
page read and write
10E2000
heap
page read and write
31EE000
stack
page read and write
1379E163000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
2311E57B000
heap
page read and write
4F20000
direct allocation
page read and write
1379EAFA000
trusted library allocation
page read and write
13795564000
heap
page read and write
59E2000
trusted library allocation
page read and write
137A8F92000
trusted library allocation
page read and write
13799F3A000
trusted library allocation
page read and write
1379DFBC000
trusted library allocation
page read and write
4C80000
heap
page read and write
5A5E000
trusted library allocation
page read and write
4C70000
direct allocation
page read and write
420E000
stack
page read and write
CA0000
unkown
page readonly
1379E765000
trusted library allocation
page read and write
1379E103000
trusted library allocation
page read and write
5F13000
trusted library allocation
page read and write
1620000
heap
page read and write
1804BA00000
unclassified section
page readonly
1A0BC575000
trusted library allocation
page read and write
137A9700000
trusted library allocation
page read and write
1379E3A5000
trusted library allocation
page read and write
1379A566000
trusted library allocation
page read and write
1A0BC1DF000
trusted library allocation
page read and write
DE1000
unkown
page execute and write copy
1A0BF98A000
trusted library allocation
page read and write
1344000
heap
page read and write
D54000
heap
page read and write
5F85000
trusted library allocation
page read and write
5D5000
unkown
page execute and read and write
137A1BFC000
trusted library allocation
page read and write
1379FF13000
trusted library allocation
page read and write
D30000
heap
page read and write
1A0BC51B000
trusted library allocation
page read and write
1A0BFC9F000
trusted library allocation
page read and write
1379E95D000
trusted library allocation
page read and write
172B000
heap
page read and write
418E000
stack
page read and write
1379F677000
trusted library allocation
page read and write
4DBD000
stack
page read and write
137A0362000
trusted library allocation
page read and write
1379FEE9000
trusted library allocation
page read and write
1379A8B2000
trusted library allocation
page read and write
137A02B7000
trusted library allocation
page read and write
DD4000
heap
page read and write
4601000
heap
page read and write
5CAD000
stack
page read and write
1379556A000
heap
page read and write
389E000
stack
page read and write
375E000
stack
page read and write
4C20000
remote allocation
page read and write
1379F040000
trusted library allocation
page read and write
1A0BC8BB000
trusted library allocation
page read and write
13795560000
heap
page read and write
1379E394000
trusted library allocation
page read and write
13795510000
heap
page read and write
1379FFAE000
trusted library allocation
page read and write
137A63B4000
trusted library allocation
page read and write
EB5000
heap
page read and write
137A91EF000
trusted library allocation
page read and write
39DE000
stack
page read and write
1A0BD400000
trusted library allocation
page read and write
13C2000
heap
page read and write
10D1000
heap
page read and write
5AAD000
stack
page read and write
1379DF4E000
trusted library allocation
page read and write
5D5000
unkown
page execute and write copy
1379F98F000
unclassified section
page read and write
1A0BFC00000
trusted library allocation
page read and write
1379552C000
heap
page read and write
59CF000
trusted library allocation
page read and write
C62000
unkown
page execute and read and write
137A0D2A000
trusted library allocation
page read and write
E49000
unkown
page write copy
1A0B243D000
heap
page read and write
1378E720000
trusted library allocation
page execute read
13795530000
heap
page read and write
1379FCAC000
trusted library allocation
page read and write
DD4000
heap
page read and write
1A0BFAF9000
trusted library allocation
page read and write
E0000
unkown
page read and write
1049000
unkown
page write copy
137A025D000
trusted library allocation
page read and write
137A113E000
trusted library allocation
page read and write
5A93000
trusted library allocation
page read and write
137A630B000
trusted library allocation
page read and write
1379FBA1000
trusted library allocation
page read and write
1379B7C3000
trusted library allocation
page read and write
2311E520000
heap
page read and write
1A0BF9B0000
trusted library allocation
page read and write
16CC000
heap
page read and write
60C6000
trusted library allocation
page read and write
1CC4F000
stack
page read and write
5AB1000
trusted library allocation
page read and write
1379556A000
heap
page read and write
1378E770000
trusted library section
page read and write
1379ED17000
trusted library allocation
page read and write
479E000
stack
page read and write
4B72000
heap
page read and write
1379FEE9000
trusted library allocation
page read and write
5ECAF7D000
stack
page read and write
CD4000
heap
page read and write
3D5F000
stack
page read and write
5A97000
trusted library allocation
page read and write
10C9000
heap
page read and write
9757FFE000
stack
page read and write
1379EAFA000
trusted library allocation
page read and write
27FB000
heap
page read and write
1379550E000
heap
page read and write
BFF000
unkown
page execute and write copy
137A02F4000
trusted library allocation
page read and write
137A6600000
trusted library allocation
page read and write
1A0BF9F2000
trusted library allocation
page read and write
1379EFF2000
trusted library allocation
page read and write
E20E0AB000
stack
page read and write
1379B579000
trusted library allocation
page read and write
1A0BECFD000
trusted library allocation
page read and write
137A69E2000
trusted library allocation
page read and write
1379EACE000
trusted library allocation
page read and write
1804BE47000
trusted library allocation
page read and write
1A0BF4A4000
trusted library allocation
page read and write
137A92B1000
trusted library allocation
page read and write
1A0BFC9B000
trusted library allocation
page read and write
137A0103000
trusted library allocation
page read and write
1379F3CE000
trusted library allocation
page read and write
10F4000
heap
page read and write
1379ED22000
trusted library allocation
page read and write
1379557A000
heap
page read and write
FB0000
direct allocation
page read and write
137A6207000
trusted library allocation
page read and write
4C81000
heap
page read and write
137A6919000
trusted library allocation
page read and write
BF4000
heap
page read and write
C23000
unkown
page execute and write copy
5E3B000
trusted library allocation
page read and write
4B71000
heap
page read and write
5F06000
trusted library allocation
page read and write
13BB000
heap
page read and write
137A0250000
trusted library allocation
page read and write
1379A800000
trusted library allocation
page read and write
43EF000
stack
page read and write
5EC793E000
stack
page read and write
1A0BC17E000
trusted library allocation
page read and write
5EC45FE000
stack
page read and write
3000000
heap
page read and write
137A8F42000
trusted library allocation
page read and write
137A63B2000
trusted library allocation
page read and write
11A4000
heap
page read and write
1379EA85000
trusted library allocation
page read and write
137A6130000
trusted library allocation
page read and write
137A61E7000
trusted library allocation
page read and write
2311E598000
heap
page read and write
29C0000
direct allocation
page read and write
559E000
stack
page read and write
13799DF0000
heap
page read and write
313E000
stack
page read and write
1A0BFC91000
trusted library allocation
page read and write
137A0322000
trusted library allocation
page read and write
1379FC03000
trusted library allocation
page read and write
311E000
stack
page read and write
1A0BC38F000
trusted library allocation
page read and write
3EEF000
stack
page read and write
13795547000
heap
page read and write
1D836B84000
heap
page read and write
37CF000
stack
page read and write
10D6000
heap
page read and write
10F4000
heap
page read and write
137A00F5000
trusted library allocation
page read and write
1379EAEF000
trusted library allocation
page read and write
E04000
heap
page read and write
326F000
stack
page read and write
CD4000
heap
page read and write
2E52EFC000
stack
page read and write
2311E449000
heap
page read and write
FB0000
direct allocation
page read and write
13795575000
heap
page read and write
2311E561000
heap
page read and write
13795588000
heap
page read and write
1A0BC89F000
trusted library allocation
page read and write
3D3E000
stack
page read and write
137A040A000
trusted library allocation
page read and write
137A112B000
trusted library allocation
page read and write
137A0250000
trusted library allocation
page read and write
137A10A8000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
D54000
heap
page read and write
30DF000
stack
page read and write
56AF000
stack
page read and write
5EC613F000
stack
page read and write
137A8F8F000
trusted library allocation
page read and write
1379F03D000
trusted library allocation
page read and write
1A0B0BCC000
trusted library allocation
page read and write
1379DB90000
trusted library section
page read and write
1379DF3B000
trusted library allocation
page read and write
46B0000
trusted library allocation
page read and write
413E000
stack
page read and write
53C0000
direct allocation
page read and write
10E2000
heap
page read and write
137A92EA000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
1CBFE000
stack
page read and write
1A0BD30A000
trusted library allocation
page read and write
193E000
stack
page read and write
5C9C000
trusted library allocation
page read and write
11D6000
unkown
page execute and read and write
137A018E000
trusted library allocation
page read and write
4C81000
heap
page read and write
5A37000
trusted library allocation
page read and write
137A906D000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
1D836BB2000
unclassified section
page read and write
137A0388000
trusted library allocation
page read and write
DD4000
heap
page read and write
CD4000
heap
page read and write
50B0000
direct allocation
page execute and read and write
2311E584000
heap
page read and write
137A1B98000
trusted library allocation
page read and write
2E5419F000
stack
page read and write
1378E7D5000
heap
page read and write
FF1000
unkown
page execute and read and write
137A0200000
trusted library allocation
page read and write
469F000
stack
page read and write
1804BE6E000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
2311E4BD000
heap
page read and write
C28000
unkown
page execute and read and write
137A0383000
trusted library allocation
page read and write
13795547000
heap
page read and write
1A0BC544000
trusted library allocation
page read and write
137A5E00000
trusted library allocation
page read and write
12DB000
unkown
page execute and write copy
137A002B000
trusted library allocation
page read and write
4DD1000
heap
page read and write
CD4000
heap
page read and write
1379E131000
trusted library allocation
page read and write
CD4000
heap
page read and write
1379F509000
trusted library allocation
page read and write
339E000
stack
page read and write
1A0BF494000
trusted library allocation
page read and write
D24000
heap
page read and write
5A53000
trusted library allocation
page read and write
137A6659000
trusted library allocation
page read and write
137A8F7D000
trusted library allocation
page read and write
137A0258000
trusted library allocation
page read and write
CD4000
heap
page read and write
1378E803000
trusted library allocation
page read and write
1049000
unkown
page write copy
E0000
unkown
page read and write
137A61AC000
trusted library allocation
page read and write
1379F6C5000
trusted library allocation
page read and write
137A6979000
trusted library allocation
page read and write
1A0BC566000
trusted library allocation
page read and write
1379E3E6000
trusted library allocation
page read and write
CA0000
unkown
page readonly
1A0BF778000
trusted library allocation
page read and write
5E3D000
trusted library allocation
page read and write
43EE000
stack
page read and write
39EF000
stack
page read and write
576E000
stack
page read and write
470E000
stack
page read and write
1A0B0B03000
trusted library allocation
page read and write
137A01B0000
trusted library allocation
page read and write
16B9000
heap
page read and write
137A6212000
trusted library allocation
page read and write
1379BE18000
trusted library allocation
page read and write
1D8369B0000
remote allocation
page read and write
1A0BC379000
trusted library allocation
page read and write
B44000
heap
page read and write
1379B956000
heap
page read and write
1A9B3FE000
unkown
page readonly
1D836E72000
trusted library allocation
page read and write
C42000
unkown
page execute and read and write
5A43000
trusted library allocation
page read and write
5D7D000
trusted library allocation
page read and write
B44000
heap
page read and write
1379FFE5000
trusted library allocation
page read and write
13795537000
heap
page read and write
5AB1000
trusted library allocation
page read and write
137A03F7000
trusted library allocation
page read and write
137A6996000
trusted library allocation
page read and write
EDF000
heap
page read and write
1379555E000
heap
page read and write
137A030F000
trusted library allocation
page read and write
580E000
stack
page read and write
137A0120000
trusted library allocation
page read and write
5540000
direct allocation
page execute and read and write
D54000
heap
page read and write
1A0BC14A000
trusted library allocation
page read and write
1D8369FA000
heap
page read and write
137A60FE000
trusted library allocation
page read and write
C00000
heap
page read and write
C8F000
unkown
page execute and read and write
3EA1000
heap
page read and write
137A026C000
trusted library allocation
page read and write
1379E96F000
trusted library allocation
page read and write
137A8F47000
trusted library allocation
page read and write
13795534000
heap
page read and write
1379556F000
heap
page read and write
1379F3F0000
trusted library allocation
page read and write
173D000
heap
page read and write
1379F204000
trusted library allocation
page read and write
1379B8E5000
heap
page read and write
5EC5FFE000
stack
page read and write
13795525000
heap
page read and write
D24000
heap
page read and write
137A8F3E000
trusted library allocation
page read and write
137A6999000
trusted library allocation
page read and write
137A01A8000
trusted library allocation
page read and write
1A0BC2D3000
trusted library allocation
page read and write
D54000
heap
page read and write
5CE000
stack
page read and write
1A0BC5A4000
trusted library allocation
page read and write
20A39DB03000
trusted library allocation
page read and write
11A0000
heap
page read and write
19D000
unkown
page execute and read and write
1804BE5D000
trusted library allocation
page read and write
342F000
stack
page read and write
48FE000
stack
page read and write
13795540000
heap
page read and write
137A8F73000
trusted library allocation
page read and write
EE9000
heap
page read and write
1379FDE1000
trusted library allocation
page read and write
1A0BF990000
trusted library allocation
page read and write
292F5907000
trusted library allocation
page read and write
9B7000
heap
page read and write
2E4AB2E000
stack
page read and write
D54000
heap
page read and write
137A0143000
trusted library allocation
page read and write
1379DF70000
trusted library allocation
page read and write
104B000
unkown
page execute and read and write
1A0BF514000
trusted library allocation
page read and write
1379B57C000
trusted library allocation
page read and write
A97B4D04000
trusted library allocation
page read and write
1379C4AB000
trusted library allocation
page read and write
298DB9204000
trusted library allocation
page read and write
1379BF00000
trusted library allocation
page read and write
D24000
heap
page read and write
137A0096000
trusted library allocation
page read and write
1379F030000
trusted library allocation
page read and write
137A02B0000
trusted library allocation
page read and write
1A0BC94B000
trusted library allocation
page read and write
1379EF84000
trusted library allocation
page read and write
1379EA5B000
trusted library allocation
page read and write
2E5491C000
stack
page read and write
137A1B23000
trusted library allocation
page read and write
271E000
stack
page read and write
1D836EE7000
trusted library allocation
page read and write
475F000
stack
page read and write
2311E4A3000
heap
page read and write
1379DB50000
unclassified section
page read and write
444F000
stack
page read and write
137A01A5000
trusted library allocation
page read and write
137A69BA000
trusted library allocation
page read and write
EB5000
heap
page read and write
1D836E0D000
trusted library allocation
page read and write
5996000
trusted library allocation
page read and write
13795537000
heap
page read and write
1A0BC22A000
trusted library allocation
page read and write
137A0690000
trusted library allocation
page read and write
137A623D000
trusted library allocation
page read and write
6CA000
unkown
page read and write
44BF000
stack
page read and write
4DE0000
direct allocation
page execute and read and write
137A1BCF000
trusted library allocation
page read and write
450E000
stack
page read and write
5A30000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
D54000
heap
page read and write
33F0000
heap
page read and write
137A6ADC000
trusted library allocation
page read and write
D24000
heap
page read and write
1A0BC8C3000
trusted library allocation
page read and write
105C000
unkown
page execute and write copy
1A0BD200000
trusted library allocation
page read and write
59CC000
trusted library allocation
page read and write
4A3E000
stack
page read and write
4F31000
heap
page read and write
459E000
stack
page read and write
2311E4A9000
heap
page read and write
13795560000
heap
page read and write
137A1B62000
trusted library allocation
page read and write
1A0BF92D000
trusted library allocation
page read and write
1050000
unkown
page execute and write copy
5E36000
trusted library allocation
page read and write
3741000
heap
page read and write
1379ED6E000
trusted library allocation
page read and write
137A92EA000
trusted library allocation
page read and write
137A6A05000
trusted library allocation
page read and write
2E546DB000
stack
page read and write
5A30000
trusted library allocation
page read and write
324F000
stack
page read and write
4601000
heap
page read and write
137A0353000
trusted library allocation
page read and write
137A91D3000
trusted library allocation
page read and write
2E51FFD000
stack
page read and write
1379550F000
heap
page read and write
DD4000
heap
page read and write
137A699B000
trusted library allocation
page read and write
137A02B0000
trusted library allocation
page read and write
13795510000
heap
page read and write
4601000
heap
page read and write
13795516000
heap
page read and write
137A0383000
trusted library allocation
page read and write
1379DF5F000
trusted library allocation
page read and write
1379C108000
trusted library allocation
page read and write
27D0000
direct allocation
page read and write
F48000
heap
page read and write
2311E440000
heap
page read and write
1379F4D2000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
1A0BC28A000
trusted library allocation
page read and write
CD4000
heap
page read and write
EF4000
heap
page read and write
11FE000
unkown
page execute and write copy
4E50000
remote allocation
page read and write
1A0BC843000
trusted library allocation
page read and write
4AB1000
heap
page read and write
1379E14B000
trusted library allocation
page read and write
1379550E000
heap
page read and write
1D836B20000
heap
page read and write
DD4000
heap
page read and write
137A8F4F000
trusted library allocation
page read and write
2311D812000
trusted library allocation
page read and write
137A8F47000
trusted library allocation
page read and write
1379DF87000
trusted library allocation
page read and write
11A4000
heap
page read and write
5A37000
trusted library allocation
page read and write
1079000
heap
page read and write
E04000
heap
page read and write
1A0BC526000
trusted library allocation
page read and write
5A2F000
trusted library allocation
page read and write
2E544DC000
stack
page read and write
5D6000
unkown
page execute and write copy
4700000
direct allocation
page read and write
5A30000
trusted library allocation
page read and write
FC0000
heap
page read and write
1A0BEC03000
trusted library allocation
page read and write
D74000
unkown
page readonly
137A63BF000
trusted library allocation
page read and write
1379F6B8000
trusted library allocation
page read and write
13799F2D000
trusted library allocation
page read and write
13795553000
heap
page read and write
2311D92D000
unkown
page execute read
1379EAE3000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
E0E000
heap
page read and write
1CC000
stack
page read and write
5F40000
trusted library allocation
page read and write
2311D80A000
trusted library allocation
page read and write
12EB000
unkown
page execute and write copy
137A0DCF000
trusted library allocation
page read and write
1A0BEC8A000
trusted library allocation
page read and write
1A0BC518000
trusted library allocation
page read and write
137A91E3000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
CD4000
heap
page read and write
137A62B2000
trusted library allocation
page read and write
137A64F6000
trusted library allocation
page read and write
4AB1000
heap
page read and write
1379C500000
trusted library section
page read and write
1D837000000
heap
page read and write
1150000
direct allocation
page read and write
59DB000
trusted library allocation
page read and write
531000
unkown
page read and write
429D000
stack
page read and write
292F56A5000
heap
page read and write
10CB000
heap
page read and write
1379E3C9000
trusted library allocation
page read and write
33F4000
heap
page read and write
D3C000
unkown
page readonly
137A0255000
trusted library allocation
page read and write
137A69E4000
trusted library allocation
page read and write
1379F4D2000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
137A037D000
trusted library allocation
page read and write
1379EA3B000
trusted library allocation
page read and write
137A0B9B000
trusted library allocation
page read and write
137A01E3000
trusted library allocation
page read and write
4C9000
stack
page read and write
13795560000
heap
page read and write
1A0BC8F5000
trusted library allocation
page read and write
1379ED4F000
trusted library allocation
page read and write
1379FAC3000
trusted library allocation
page read and write
137A6212000
trusted library allocation
page read and write
E04000
heap
page read and write
10E2000
heap
page read and write
1379E06F000
trusted library allocation
page read and write
137A1B65000
trusted library allocation
page read and write
12E8000
unkown
page execute and read and write
2EEE000
stack
page read and write
1A0BD226000
trusted library allocation
page read and write
49E000
unkown
page readonly
1379556F000
heap
page read and write
13795537000
heap
page read and write
13795566000
heap
page read and write
D62000
unkown
page readonly
13795553000
heap
page read and write
1379F603000
trusted library allocation
page read and write
4601000
heap
page read and write
1379FD00000
trusted library allocation
page read and write
1379556F000
heap
page read and write
10C4000
heap
page read and write
CD4000
heap
page read and write
137A025D000
trusted library allocation
page read and write
137A02A4000
trusted library allocation
page read and write
1379EA2C000
trusted library allocation
page read and write
D54000
heap
page read and write
1379555D000
heap
page read and write
537E000
stack
page read and write
47E0000
heap
page read and write
137A6481000
trusted library allocation
page read and write
13795510000
heap
page read and write
4B8E000
stack
page read and write
1379F500000
trusted library allocation
page read and write
137A02F4000
trusted library allocation
page read and write
1CCCE000
stack
page read and write
59C000
unkown
page execute and read and write
FAA4571000
trusted library allocation
page execute read
5ABC000
trusted library allocation
page read and write
1A0BCAE8000
trusted library allocation
page read and write
1379F694000
trusted library allocation
page read and write
5F2F000
trusted library allocation
page read and write
87F0000
heap
page read and write
11A4000
heap
page read and write
137A0300000
trusted library allocation
page read and write
1379B800000
heap
page read and write
CD4000
heap
page read and write
108F000
stack
page read and write
137A0387000
trusted library allocation
page read and write
4C81000
heap
page read and write
4602000
heap
page read and write
137A8F45000
trusted library allocation
page read and write
E04000
heap
page read and write
1379558D000
heap
page read and write
1A0BD264000
trusted library allocation
page read and write
137A6900000
trusted library allocation
page read and write
2E4C13E000
stack
page read and write
EE9000
heap
page read and write
137A0056000
trusted library allocation
page read and write
1A0BD2AC000
trusted library allocation
page read and write
4601000
heap
page read and write
137A0710000
trusted library section
page readonly
137A6AEE000
trusted library allocation
page read and write
137A0353000
trusted library allocation
page read and write
35FE000
stack
page read and write
137A0B7D000
trusted library allocation
page read and write
3DEE000
stack
page read and write
137A06BE000
trusted library allocation
page read and write
2D1000
unkown
page execute and write copy
5D5000
unkown
page execute and read and write
137A1178000
trusted library allocation
page read and write
1A0BC25F000
trusted library allocation
page read and write
1A0BF503000
trusted library allocation
page read and write
4F30000
heap
page read and write
349F000
stack
page read and write
2E5377E000
stack
page read and write
1A0BC582000
trusted library allocation
page read and write
1379A8B7000
trusted library allocation
page read and write
1AADF000
stack
page read and write
1A0BEC0B000
trusted library allocation
page read and write
13795549000
heap
page read and write
687F000
stack
page read and write
13795510000
heap
page read and write
11A4000
heap
page read and write
137A8F3C000
trusted library allocation
page read and write
1A0BF536000
trusted library allocation
page read and write
137A6100000
trusted library allocation
page read and write
1A0BD222000
trusted library allocation
page read and write
137A63E8000
trusted library allocation
page read and write
50D0000
direct allocation
page execute and read and write
E6B51FF000
stack
page read and write
FF1000
unkown
page execute and write copy
40EE000
stack
page read and write
1379E76A000
trusted library allocation
page read and write
1379DD5B000
trusted library allocation
page read and write
DC0000
heap
page read and write
1379E3E6000
trusted library allocation
page read and write
137A11AE000
trusted library allocation
page read and write
56CC000
stack
page read and write
3EBE000
stack
page read and write
1A0BC393000
trusted library allocation
page read and write
137A8F33000
trusted library allocation
page read and write
1379F4E2000
trusted library allocation
page read and write
1379556F000
heap
page read and write
5B82000
trusted library allocation
page read and write
13795574000
heap
page read and write
13CF000
heap
page read and write
1A0BF80F000
trusted library allocation
page read and write
4F91000
heap
page read and write
1A0BC889000
trusted library allocation
page read and write
5F1F000
trusted library allocation
page read and write
1379E962000
trusted library allocation
page read and write
137A3000000
trusted library allocation
page read and write
4B71000
heap
page read and write
49FF000
stack
page read and write
1F4000
heap
page read and write
1379E3B1000
trusted library allocation
page read and write
60AB000
trusted library allocation
page read and write
436E000
stack
page read and write
4C6B000
stack
page read and write
13795560000
heap
page read and write
50A6000
trusted library allocation
page read and write
53FE000
stack
page read and write
10D1000
heap
page read and write
2E515FB000
stack
page read and write
137A606B000
trusted library allocation
page read and write
12EB000
unkown
page execute and write copy
1F4000
heap
page read and write
137A69B0000
trusted library allocation
page read and write
1D836B86000
heap
page read and write
5AB1000
trusted library allocation
page read and write
1CE0000
heap
page read and write
137A669A000
trusted library allocation
page read and write
3B6E000
stack
page read and write
137A1B62000
trusted library allocation
page read and write
237E000
stack
page read and write
1379556F000
heap
page read and write
1A0BC8E9000
trusted library allocation
page read and write
137A8FF5000
trusted library allocation
page read and write
1379A575000
trusted library allocation
page read and write
4C10000
direct allocation
page execute and read and write
1379F6FB000
trusted library allocation
page read and write
13795553000
heap
page read and write
1A0BC89D000
trusted library allocation
page read and write
137A61C3000
trusted library allocation
page read and write
41CF000
stack
page read and write
1804BC7F000
unclassified section
page read and write
13F0000
direct allocation
page execute and read and write
1D836950000
unclassified section
page readonly
1A0BC1C9000
trusted library allocation
page read and write
137A6190000
trusted library allocation
page read and write
11B5000
unkown
page execute and read and write
4BB000
unkown
page execute and read and write
1379556A000
heap
page read and write
4601000
heap
page read and write
13795546000
heap
page read and write
1379E3A7000
trusted library allocation
page read and write
32E0000
direct allocation
page read and write
5AA1000
trusted library allocation
page read and write
BC7000
unkown
page execute and read and write
137A6308000
trusted library allocation
page read and write
10F4000
heap
page read and write
F92B5563000
trusted library allocation
page read and write
1379E785000
trusted library allocation
page read and write
1804BBB3000
heap
page read and write
1379C489000
trusted library allocation
page read and write
5F60000
heap
page read and write
3EDE000
stack
page read and write
137A69C7000
trusted library allocation
page read and write
4F91000
heap
page read and write
5EF5000
trusted library allocation
page read and write
13795510000
heap
page read and write
4B71000
heap
page read and write
1B17D000
stack
page read and write
3B5F000
stack
page read and write
2311D803000
trusted library allocation
page read and write
2311D86F000
trusted library allocation
page read and write
1379555D000
heap
page read and write
137A6089000
trusted library allocation
page read and write
137A69DC000
trusted library allocation
page read and write
16C000
stack
page read and write
E1000
unkown
page execute and write copy
1379E3BE000
trusted library allocation
page read and write
16FD000
heap
page read and write
1379E36F000
trusted library allocation
page read and write
47B1000
heap
page read and write
5A2E000
trusted library allocation
page read and write
137A99A8000
trusted library allocation
page read and write
137A11CA000
trusted library allocation
page read and write
DD4000
heap
page read and write
1A0BECCA000
trusted library allocation
page read and write
3F4F000
stack
page read and write
1379EA00000
trusted library allocation
page read and write
1A0BC1B3000
trusted library allocation
page read and write
10F4000
heap
page read and write
312F000
stack
page read and write
127C000
unkown
page execute and write copy
137A63E5000
trusted library allocation
page read and write
38BE000
stack
page read and write
F92B5547000
trusted library allocation
page read and write
1379E9A2000
trusted library allocation
page read and write
1379ED41000
trusted library allocation
page read and write
13795588000
heap
page read and write
137A0C00000
trusted library allocation
page read and write
47DF000
stack
page read and write
5A48000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
1A0BD2B0000
trusted library allocation
page read and write
13AB000
heap
page read and write
30E0000
heap
page read and write
E20E1EE000
unkown
page readonly
1A0BC16B000
trusted library allocation
page read and write
1379A515000
trusted library allocation
page read and write
292F5900000
trusted library allocation
page read and write
10F5000
stack
page read and write
137A91AC000
trusted library allocation
page read and write
E04000
heap
page read and write
12F3000
unkown
page execute and write copy
4B71000
heap
page read and write
137A1C0C000
trusted library allocation
page read and write
5EC71BE000
stack
page read and write
137A0374000
trusted library allocation
page read and write
1A0BF703000
trusted library allocation
page read and write
1A0BC190000
trusted library allocation
page read and write
137A91AE000
trusted library allocation
page read and write
1379FFFE000
trusted library allocation
page read and write
1A0BD262000
trusted library allocation
page read and write
2311E53D000
heap
page read and write
137A1B11000
trusted library allocation
page read and write
1379E3A7000
trusted library allocation
page read and write
137A001B000
trusted library allocation
page read and write
CD4000
heap
page read and write
47B0000
trusted library allocation
page execute and read and write
5ECB37D000
stack
page read and write
10FF000
unkown
page execute and write copy
1804BC72000
unclassified section
page read and write
1804BA80000
unclassified section
page readonly
C6E000
unkown
page execute and write copy
D54000
heap
page read and write
4DD1000
heap
page read and write
1379DF57000
trusted library allocation
page read and write
1379F9B0000
trusted library section
page readonly
EAB000
heap
page read and write
137A90A1000
trusted library allocation
page read and write
2311D491000
remote allocation
page execute read
1804BD00000
trusted library allocation
page read and write
4C81000
heap
page read and write
13B8000
heap
page read and write
5ECAB7D000
stack
page read and write
137A64EA000
trusted library allocation
page read and write
1379E8A0000
trusted library section
page read and write
45A0000
direct allocation
page read and write
4F91000
heap
page read and write
137A61D5000
trusted library allocation
page read and write
137A0641000
trusted library allocation
page read and write
13795572000
heap
page read and write
DD4000
heap
page read and write
4601000
heap
page read and write
59A8000
trusted library allocation
page read and write
11A4000
heap
page read and write
13795510000
heap
page read and write
137A6244000
trusted library allocation
page read and write
1379BC00000
trusted library allocation
page read and write
4F8F000
stack
page read and write
137A697C000
trusted library allocation
page read and write
2311D867000
trusted library allocation
page read and write
1379DFD1000
trusted library allocation
page read and write
118F000
stack
page read and write
1A0BC510000
trusted library allocation
page read and write
1379551E000
heap
page read and write
5A2F000
trusted library allocation
page read and write
12F3000
unkown
page execute and write copy
137A1C82000
trusted library allocation
page read and write
1379FBAD000
trusted library allocation
page read and write
5A2F000
trusted library allocation
page read and write
1379C4A9000
trusted library allocation
page read and write
1A0BF396000
trusted library allocation
page read and write
CD4000
heap
page read and write
1379FEB8000
trusted library allocation
page read and write
137A0013000
trusted library allocation
page read and write
137A053E000
trusted library allocation
page read and write
1202D8104000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
137A6006000
trusted library allocation
page read and write
D54000
heap
page read and write
292F5580000
heap
page read and write
1379A500000
trusted library allocation
page read and write
13795516000
heap
page read and write
DD4000
heap
page read and write
5A2E000
trusted library allocation
page read and write
137A02D1000
trusted library allocation
page read and write
137A02F4000
trusted library allocation
page read and write
2E7E000
stack
page read and write
137A61AC000
trusted library allocation
page read and write
CD4000
heap
page read and write
E90000
heap
page read and write
137A9147000
trusted library allocation
page read and write
2311E598000
heap
page read and write
137A906F000
trusted library allocation
page read and write
137A6400000
trusted library allocation
page read and write
1A0BCF08000
trusted library allocation
page read and write
137A6203000
trusted library allocation
page read and write
1379EABD000
trusted library allocation
page read and write
1379555D000
heap
page read and write
1379E0A3000
trusted library allocation
page read and write
D40000
heap
page read and write
2E5459D000
stack
page read and write
2FE0000
direct allocation
page execute and read and write
137A01B7000
trusted library allocation
page read and write
2FDE000
stack
page read and write
1238000
unkown
page execute and write copy
10D5000
heap
page read and write
11A4000
heap
page read and write
59E8000
trusted library allocation
page read and write
2FE0000
direct allocation
page execute and read and write
D24000
heap
page read and write
4C81000
heap
page read and write
1A0BC575000
trusted library allocation
page read and write
1379EAFA000
trusted library allocation
page read and write
456E000
stack
page read and write
1A0BFA7F000
trusted library allocation
page read and write
D2DABFC000
stack
page read and write
13795573000
heap
page read and write
1211000
unkown
page execute and read and write
DD4000
heap
page read and write
D24000
heap
page read and write
45FF000
stack
page read and write
1379FFE3000
trusted library allocation
page read and write
1A0BC903000
trusted library allocation
page read and write
50CA000
trusted library allocation
page read and write
137A0383000
trusted library allocation
page read and write
13799F2A000
trusted library allocation
page read and write
2311E528000
heap
page read and write
4F20000
remote allocation
page read and write
137A11EB000
trusted library allocation
page read and write
4FE0000
direct allocation
page execute and read and write
4C30000
direct allocation
page read and write
137A6505000
trusted library allocation
page read and write
49C0000
direct allocation
page read and write
1804C340000
heap
page read and write
120F000
unkown
page execute and write copy
137A01D5000
trusted library allocation
page read and write
1A0BC2DF000
trusted library allocation
page read and write
30D7000
heap
page read and write
480000
unkown
page readonly
1379EE87000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
1379C5C4000
trusted library allocation
page read and write
CD4000
heap
page read and write
137A1BF8000
trusted library allocation
page read and write
137A0E3C000
trusted library allocation
page read and write
2E51BF9000
stack
page read and write
1D836E10000
trusted library allocation
page read and write
1804BE96000
trusted library allocation
page read and write
2E52DFE000
stack
page read and write
1379BE14000
trusted library allocation
page read and write
137A110F000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
1379E150000
trusted library allocation
page read and write
13795560000
heap
page read and write
27D0000
direct allocation
page read and write
1A0BC233000
trusted library allocation
page read and write
137A1BFC000
trusted library allocation
page read and write
5F11000
trusted library allocation
page read and write
1D836F21000
trusted library allocation
page read and write
CFD000
stack
page read and write
1379FF89000
trusted library allocation
page read and write
1A0BF4B6000
trusted library allocation
page read and write
CD4000
heap
page read and write
127D000
unkown
page execute and read and write
137A6239000
trusted library allocation
page read and write
366E000
stack
page read and write
1379F2BE000
trusted library allocation
page read and write
11A4000
heap
page read and write
59BA000
trusted library allocation
page read and write
1379F4F1000
trusted library allocation
page read and write
137A678F000
trusted library allocation
page read and write
11A4000
heap
page read and write
137A1BEC000
trusted library allocation
page read and write
1379E3A7000
trusted library allocation
page read and write
DD4000
heap
page read and write
1B01D000
stack
page read and write
1378E3D0000
unclassified section
page readonly
12EB000
unkown
page execute and write copy
25020A804000
trusted library allocation
page read and write
137A9500000
trusted library allocation
page read and write
137A0263000
trusted library allocation
page read and write
F7F000
heap
page read and write
E57000
heap
page read and write
BF4000
heap
page read and write
137A02DB000
trusted library allocation
page read and write
1379552D000
heap
page read and write
1379B5C6000
trusted library allocation
page read and write
9B0000
heap
page read and write
292F5757000
heap
page read and write
1379EE03000
trusted library allocation
page read and write
B44000
heap
page read and write
2311E4AC000
heap
page read and write
4AB000
unkown
page write copy
137A02B0000
trusted library allocation
page read and write
137A69A6000
trusted library allocation
page read and write
137A0B27000
trusted library allocation
page read and write
1A0BD2FC000
trusted library allocation
page read and write
137A1103000
trusted library allocation
page read and write
452F000
stack
page read and write
1A0BC4FE000
trusted library allocation
page read and write
137A01A8000
trusted library allocation
page read and write
5290000
direct allocation
page execute and read and write
DD4000
heap
page read and write
137A0B6C000
trusted library allocation
page read and write
CA1000
unkown
page execute read
FF0000
unkown
page readonly
1379FF6F000
trusted library allocation
page read and write
1379E59C000
trusted library allocation
page read and write
1A0BC8CB000
trusted library allocation
page read and write
1379ED00000
trusted library allocation
page read and write
316E000
stack
page read and write
13799F86000
trusted library allocation
page read and write
11A4000
heap
page read and write
49D1000
heap
page read and write
1379FE7D000
trusted library allocation
page read and write
16E9000
heap
page read and write
4601000
heap
page read and write
4B71000
heap
page read and write
137A8F27000
trusted library allocation
page read and write
E04000
heap
page read and write
1D836EA3000
trusted library allocation
page read and write
1379A8F5000
trusted library allocation
page read and write
167B000
heap
page read and write
CD4000
heap
page read and write
137A0500000
trusted library allocation
page read and write
ECD000
heap
page read and write
5892000
trusted library allocation
page read and write
5BF000
unkown
page execute and read and write
4C81000
heap
page read and write
3F0E000
stack
page read and write
2A554410000
heap
page read and write
137A903B000
trusted library allocation
page read and write
1379FF83000
trusted library allocation
page read and write
292F5774000
heap
page read and write
FAA4481000
trusted library allocation
page execute read
12FF000
unkown
page execute and read and write
1A0BC181000
trusted library allocation
page read and write
1A0BCAFD000
trusted library allocation
page read and write
137A001B000
trusted library allocation
page read and write
53B3000
trusted library allocation
page read and write
1A0BF963000
trusted library allocation
page read and write
1A0BC3C1000
trusted library allocation
page read and write
1379E790000
trusted library allocation
page read and write
4C7F000
stack
page read and write
5A43000
trusted library allocation
page read and write
5BCD000
trusted library allocation
page read and write
59CB000
trusted library allocation
page read and write
137A0F67000
trusted library allocation
page read and write
137A00C7000
trusted library allocation
page read and write
394E000
stack
page read and write
564000
heap
page read and write
137A1050000
trusted library allocation
page read and write
46DE000
stack
page read and write
1A0BF73C000
trusted library allocation
page read and write
1A0BF9DA000
trusted library allocation
page read and write
2E9E000
stack
page read and write
137A10F6000
trusted library allocation
page read and write
50B0000
direct allocation
page execute and read and write
10CD000
heap
page read and write
49E000
unkown
page readonly
1379E15D000
trusted library allocation
page read and write
EF4000
heap
page read and write
292F725F000
heap
page read and write
1A0BFC7C000
trusted library allocation
page read and write
192DA0C00000
trusted library allocation
page read and write
2E5389E000
stack
page read and write
137A600E000
trusted library allocation
page read and write
137A0D00000
trusted library allocation
page read and write
1379F3D4000
trusted library allocation
page read and write
137A8F45000
trusted library allocation
page read and write
1379FE1F000
trusted library allocation
page read and write
422E000
stack
page read and write
DD4000
heap
page read and write
137A6183000
trusted library allocation
page read and write
5C91000
trusted library allocation
page read and write
E04000
heap
page read and write
4601000
heap
page read and write
1A0BC103000
trusted library allocation
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
13795566000
heap
page read and write
137A02C1000
trusted library allocation
page read and write
1A0BFABF000
trusted library allocation
page read and write
3ADF000
stack
page read and write
137A8852000
trusted library allocation
page read and write
DD4000
heap
page read and write
5A91000
trusted library allocation
page read and write
38D000
unkown
page execute and read and write
1378E490000
heap
page read and write
5540000
direct allocation
page execute and read and write
27D0000
direct allocation
page read and write
1180000
direct allocation
page read and write
380E000
stack
page read and write
13795522000
heap
page read and write
4E60000
direct allocation
page read and write
D24000
heap
page read and write
11DC000
unkown
page execute and write copy
137A01A1000
trusted library allocation
page read and write
1379DC2E000
trusted library allocation
page read and write
D54000
heap
page read and write
1379E3F1000
trusted library allocation
page read and write
5AED000
stack
page read and write
E04000
heap
page read and write
1379556E000
heap
page read and write
137A9053000
trusted library allocation
page read and write
1A0BCAE8000
trusted library allocation
page read and write
12ED000
unkown
page execute and read and write
530000
heap
page read and write
D9B000
heap
page read and write
5E36000
trusted library allocation
page read and write
5560000
direct allocation
page execute and read and write
CD4000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
137A69E4000
trusted library allocation
page read and write
54562FE000
stack
page read and write
1379B580000
trusted library allocation
page read and write
1379E3AE000
trusted library allocation
page read and write
3D7F000
stack
page read and write
2FDE000
stack
page read and write
137A02B4000
trusted library allocation
page read and write
13795568000
heap
page read and write
4601000
heap
page read and write
137A91B1000
trusted library allocation
page read and write
137A8F5B000
trusted library allocation
page read and write
1379557A000
heap
page read and write
4F31000
heap
page read and write
1379ED13000
trusted library allocation
page read and write
5455ABE000
stack
page read and write
3E6E000
stack
page read and write
DD4000
heap
page read and write
4C81000
heap
page read and write
4C70000
direct allocation
page read and write
137A60BC000
trusted library allocation
page read and write
1A0BCA9A000
trusted library allocation
page read and write
137A02A4000
trusted library allocation
page read and write
36AF000
stack
page read and write
1379EAFC000
trusted library allocation
page read and write
5290000
direct allocation
page execute and read and write
137A61F7000
trusted library allocation
page read and write
1379A57E000
trusted library allocation
page read and write
CEE000
unkown
page execute and write copy
2311E598000
heap
page read and write
E04000
heap
page read and write
4C81000
heap
page read and write
137A027B000
trusted library allocation
page read and write
1A0BFC9B000
trusted library allocation
page read and write
1378E430000
unclassified section
page readonly
137A1171000
trusted library allocation
page read and write
1379A513000
trusted library allocation
page read and write
137A60F6000
trusted library allocation
page read and write
403E000
stack
page read and write
137903E0000
heap
page read and write
4C81000
heap
page read and write
1379F300000
trusted library allocation
page read and write
DD4000
heap
page read and write
F92B5504000
trusted library allocation
page read and write
4B71000
heap
page read and write
5F75000
trusted library allocation
page read and write
137A6AD7000
trusted library allocation
page read and write
1379FF5B000
trusted library allocation
page read and write
50E0000
direct allocation
page execute and read and write
1A0BFC4F000
trusted library allocation
page read and write
5EC697E000
stack
page read and write
4C81000
heap
page read and write
5EC60FC000
stack
page read and write
11A4000
heap
page read and write
CD4000
heap
page read and write
11FE000
unkown
page execute and write copy
364E000
stack
page read and write
DD0000
direct allocation
page read and write
5A9A000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
32E0000
direct allocation
page read and write
137A61FE000
trusted library allocation
page read and write
5AA9000
trusted library allocation
page read and write
16D3000
heap
page read and write
D24000
heap
page read and write
DFA000
heap
page read and write
B9A000
stack
page read and write
1120000
heap
page read and write
137A0311000
trusted library allocation
page read and write
4F30000
direct allocation
page read and write
5AA1000
trusted library allocation
page read and write
137A9005000
trusted library allocation
page read and write
CD4000
heap
page read and write
5300000
direct allocation
page execute and read and write
1A9DE000
stack
page read and write
42AF000
stack
page read and write
47BE000
stack
page read and write
1379555D000
heap
page read and write
DB0000
heap
page read and write
4F30000
direct allocation
page read and write
137A0110000
trusted library allocation
page read and write
3B8F000
stack
page read and write
11F9000
unkown
page execute and write copy
137A91C1000
trusted library allocation
page read and write
1379A526000
trusted library allocation
page read and write
45B1000
heap
page read and write
137A666B000
trusted library allocation
page read and write
5A5D000
trusted library allocation
page read and write
B44000
heap
page read and write
FD0000
direct allocation
page read and write
7260000
heap
page read and write
DD4000
heap
page read and write
1804BF0F000
trusted library allocation
page read and write
4DB0000
direct allocation
page execute and read and write
1379C47E000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
137A91ED000
trusted library allocation
page read and write
1379EAE9000
trusted library allocation
page read and write
1A0BC8E5000
trusted library allocation
page read and write
10E2000
heap
page read and write
2FEF000
stack
page read and write
13795589000
heap
page read and write
1379FED3000
trusted library allocation
page read and write
4AB1000
heap
page read and write
1379E8D0000
trusted library section
page read and write
DD4000
heap
page read and write
13799E6D000
trusted library allocation
page read and write
1A9B4BE000
stack
page read and write
451E000
stack
page read and write
1F208FE00000
trusted library allocation
page read and write
546E000
stack
page read and write
13AA000
heap
page read and write
13A0003F000
trusted library allocation
page read and write
1379E7F6000
trusted library allocation
page read and write
12DD000
unkown
page execute and write copy
137A0378000
trusted library allocation
page read and write
137A0258000
trusted library allocation
page read and write
137A90AD000
trusted library allocation
page read and write
137A6A22000
trusted library allocation
page read and write
137A63F9000
trusted library allocation
page read and write
49C0000
direct allocation
page read and write
137A0600000
trusted library allocation
page read and write
2311E4DC000
heap
page read and write
5260000
direct allocation
page execute and read and write
C70000
unkown
page execute and read and write
E04000
heap
page read and write
CD4000
heap
page read and write
13795537000
heap
page read and write
137A1CB5000
trusted library allocation
page read and write
1379A9E1000
trusted library allocation
page read and write
137A6313000
trusted library allocation
page read and write
4B1F000
stack
page read and write
E04000
heap
page read and write
11B5000
unkown
page execute and read and write
137A6AF5000
trusted library allocation
page read and write
137A302A000
trusted library allocation
page read and write
137A009C000
trusted library allocation
page read and write
137A1B47000
trusted library allocation
page read and write
4C81000
heap
page read and write
137A8803000
trusted library allocation
page read and write
DD4000
heap
page read and write
2311DDB0000
heap
page read and write
464F000
stack
page read and write
1379E09A000
trusted library allocation
page read and write
4601000
heap
page read and write
402F000
stack
page read and write
137A0256000
trusted library allocation
page read and write
DD4000
heap
page read and write
13795566000
heap
page read and write
52ED000
trusted library allocation
page read and write
5F2F000
trusted library allocation
page read and write
5540000
direct allocation
page execute and read and write
CD4000
heap
page read and write
115F000
stack
page read and write
137A9000000
trusted library allocation
page read and write
137A02D3000
trusted library allocation
page read and write
CD4000
heap
page read and write
137A62C9000
trusted library allocation
page read and write
4DB0000
direct allocation
page execute and read and write
137A6116000
trusted library allocation
page read and write
2E54BDE000
stack
page read and write
E04000
heap
page read and write
1A9C4FE000
unkown
page readonly
4601000
heap
page read and write
1379E3A0000
trusted library allocation
page read and write
137A02AE000
trusted library allocation
page read and write
5A40000
trusted library allocation
page read and write
1A0B07F0000
heap
page read and write
137A92D5000
trusted library allocation
page read and write
13795566000
heap
page read and write
5A51000
trusted library allocation
page read and write
34CF000
stack
page read and write
E54000
heap
page read and write
10F4000
heap
page read and write
137A9191000
trusted library allocation
page read and write
137A0E4E000
trusted library allocation
page read and write
108F000
heap
page read and write
137954F0000
heap
page read and write
1379DF09000
trusted library allocation
page read and write
3ABF000
stack
page read and write
137A0053000
trusted library allocation
page read and write
128F000
unkown
page execute and read and write
2311D910000
trusted library allocation
page read and write
4F31000
heap
page read and write
10EF000
unkown
page execute and read and write
137A1BA8000
trusted library allocation
page read and write
1379BD21000
trusted library allocation
page read and write
1379EA96000
trusted library allocation
page read and write
49C0000
direct allocation
page read and write
1238000
unkown
page execute and write copy
1379E3CE000
trusted library allocation
page read and write
47B1000
heap
page read and write
1D836E81000
trusted library allocation
page read and write
D10000
heap
page read and write
E20E1AE000
stack
page read and write
1379DF4C000
trusted library allocation
page read and write
4B71000
heap
page read and write
1378E470000
heap
page read and write
2CFF000
stack
page read and write
1A0B2462000
heap
page read and write
137A02EC000
trusted library allocation
page read and write
32AE000
stack
page read and write
5A39000
trusted library allocation
page read and write
5D5000
unkown
page execute and write copy
50B0000
direct allocation
page execute and read and write
1379E3CD000
trusted library allocation
page read and write
137A0503000
trusted library allocation
page read and write
1379F4D6000
trusted library allocation
page read and write
1378E450000
heap
page read and write
1A0BC1B3000
trusted library allocation
page read and write
1379E9A2000
trusted library allocation
page read and write
13795553000
heap
page read and write
11D1000
unkown
page execute and read and write
1A0BC1C7000
trusted library allocation
page read and write
1379DB60000
trusted library section
page read and write
1379E380000
trusted library allocation
page read and write
13C1000
heap
page read and write
1804BC60000
heap
page read and write
49D1000
heap
page read and write
D3C000
unkown
page readonly
CD4000
heap
page read and write
DD4000
heap
page read and write
1CF5D000
stack
page read and write
137A0100000
trusted library allocation
page read and write
59C4000
trusted library allocation
page read and write
1379FFEB000
trusted library allocation
page read and write
1A0B0AC0000
trusted library section
page read and write
1379DF92000
trusted library allocation
page read and write
BF4000
heap
page read and write
2311E4CA000
heap
page read and write
137A0561000
trusted library allocation
page read and write
13795569000
heap
page read and write
1A0BCE00000
trusted library allocation
page read and write
1A0BC947000
trusted library allocation
page read and write
137A00FC000
trusted library allocation
page read and write
1379BF17000
trusted library allocation
page read and write
47AF000
stack
page read and write
137A916A000
trusted library allocation
page read and write
E20FBFE000
stack
page read and write
86E000
stack
page read and write
137A637B000
trusted library allocation
page read and write
1379E7FB000
trusted library allocation
page read and write
5AC9000
trusted library allocation
page read and write
CD4000
heap
page read and write
6AB000
unkown
page execute and read and write
3E9F000
stack
page read and write
B8D000
heap
page read and write
4C81000
heap
page read and write
DD4000
heap
page read and write
1379E9A2000
trusted library allocation
page read and write
2A554707000
trusted library allocation
page read and write
A30000
unkown
page readonly
7C6000
unkown
page execute and write copy
1379EAA3000
trusted library allocation
page read and write
1A0BC8ED000
trusted library allocation
page read and write
2E4F5FE000
stack
page read and write
1379FB00000
trusted library allocation
page read and write
16A8000
heap
page read and write
3A80000
trusted library allocation
page read and write
4601000
heap
page read and write
11A4000
heap
page read and write
E0A000
heap
page read and write
5A30000
trusted library allocation
page read and write
13C1000
heap
page read and write
F6A000
heap
page read and write
1D836E0B000
trusted library allocation
page read and write
5EC3DD8000
stack
page read and write
1379E962000
trusted library allocation
page read and write
33E000
unkown
page execute and read and write
4F31000
heap
page read and write
1379556F000
heap
page read and write
13795537000
heap
page read and write
3E2F000
stack
page read and write
CD4000
heap
page read and write
2311E56D000
heap
page read and write
1379B701000
trusted library allocation
page read and write
1049000
unkown
page write copy
1379F6EF000
trusted library allocation
page read and write
4F20000
direct allocation
page read and write
292F725E000
heap
page read and write
13795574000
heap
page read and write
3F6F000
stack
page read and write
137A6193000
trusted library allocation
page read and write
1379E003000
trusted library allocation
page read and write
13795547000
heap
page read and write
1150000
direct allocation
page read and write
13795553000
heap
page read and write
1804BF1C000
trusted library allocation
page read and write
13795537000
heap
page read and write
137A8F4F000
trusted library allocation
page read and write
2311D6D0000
heap
page read and write
1379B7FC000
trusted library allocation
page read and write
95E000
unkown
page execute and write copy
45A0000
direct allocation
page read and write
5AB1000
trusted library allocation
page read and write
1379EAA3000
trusted library allocation
page read and write
4601000
heap
page read and write
13795567000
heap
page read and write
44FF000
stack
page read and write
1379042A000
heap
page read and write
140F000
stack
page read and write
31AF000
stack
page read and write
13795537000
heap
page read and write
5AA1000
trusted library allocation
page read and write
10F4000
heap
page read and write
1ADCE000
stack
page read and write
1A0BC8D3000
trusted library allocation
page read and write
11A4000
heap
page read and write
43BE000
stack
page read and write
DD4000
heap
page read and write
137A1BB1000
trusted library allocation
page read and write
45A0000
direct allocation
page read and write
4C81000
heap
page read and write
1A0BFCB2000
trusted library allocation
page read and write
1D836B80000
heap
page read and write
12EE000
heap
page read and write
137A6280000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
4DF0000
direct allocation
page execute and read and write
5570000
direct allocation
page execute and read and write
137954E0000
heap
page read and write
347F000
stack
page read and write
1379EAB9000
trusted library allocation
page read and write
4F91000
heap
page read and write
D54000
heap
page read and write
137A88D5000
trusted library allocation
page read and write
39BF000
stack
page read and write
137A0362000
trusted library allocation
page read and write
CF5000
stack
page read and write
1A0BD213000
trusted library allocation
page read and write
137A0E5E000
trusted library allocation
page read and write
CD4000
heap
page read and write
1379FDE1000
trusted library allocation
page read and write
76D000
unkown
page execute and read and write
137A0570000
trusted library allocation
page read and write
1A0BC4FB000
trusted library allocation
page read and write
1379C5E2000
trusted library allocation
page read and write
1379E9CB000
trusted library allocation
page read and write
1379FF6D000
trusted library allocation
page read and write
13795553000
heap
page read and write
1CB4E000
stack
page read and write
1379DD73000
trusted library allocation
page read and write
5D75000
trusted library allocation
page read and write
13799E42000
trusted library allocation
page read and write
BF4000
heap
page read and write
D24000
heap
page read and write
1379EAB0000
trusted library allocation
page read and write
13799FEF000
trusted library allocation
page read and write
1379F10E000
trusted library allocation
page read and write
1379C4D7000
trusted library allocation
page read and write
137A8F47000
trusted library allocation
page read and write
13799FE3000
trusted library allocation
page read and write
137A00A5000
trusted library allocation
page read and write
6CDE000
stack
page read and write
391E000
stack
page read and write
1379F6C1000
trusted library allocation
page read and write
10F4000
heap
page read and write
52C0000
direct allocation
page execute and read and write
1379FF7C000
trusted library allocation
page read and write
B35000
stack
page read and write
4C70000
direct allocation
page read and write
5AB1000
trusted library allocation
page read and write
16BB000
heap
page read and write
1A0BF928000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
137A01A1000
trusted library allocation
page read and write
2311E53D000
heap
page read and write
137A01B0000
trusted library allocation
page read and write
D54000
heap
page read and write
1804BE10000
trusted library allocation
page read and write
1A0B07D0000
heap
page read and write
137A8813000
trusted library allocation
page read and write
1A0BD27E000
trusted library allocation
page read and write
5A4F000
stack
page read and write
CD4000
heap
page read and write
5E3C000
trusted library allocation
page read and write
E00000
heap
page read and write
5A53000
trusted library allocation
page read and write
2311E531000
heap
page read and write
87EC000
stack
page read and write
2E553DF000
stack
page read and write
137A11A7000
trusted library allocation
page read and write
1379EA4C000
trusted library allocation
page read and write
137A06CE000
trusted library allocation
page read and write
137A6603000
trusted library allocation
page read and write
1A0BC403000
trusted library allocation
page read and write
2E51DFA000
stack
page read and write
4C81000
heap
page read and write
484E000
stack
page read and write
1379C43C000
trusted library allocation
page read and write
1209F4C04000
trusted library allocation
page read and write
1379FE53000
trusted library allocation
page read and write
1379FFC9000
trusted library allocation
page read and write
5456AFE000
unkown
page readonly
137A66A4000
trusted library allocation
page read and write
10D8000
heap
page read and write
137A0E00000
trusted library allocation
page read and write
1379FAC3000
trusted library allocation
page read and write
1379C474000
trusted library allocation
page read and write
BA0000
unkown
page execute and read and write
129D000
unkown
page execute and write copy
137A6403000
trusted library allocation
page read and write
137A0388000
trusted library allocation
page read and write
5A48000
trusted library allocation
page read and write
39CF000
stack
page read and write
1379E974000
trusted library allocation
page read and write
1379F3D2000
trusted library allocation
page read and write
E04000
heap
page read and write
59BB000
trusted library allocation
page read and write
1A0BC5D7000
trusted library allocation
page read and write
137A003B000
trusted library allocation
page read and write
5EC817E000
stack
page read and write
CD4000
heap
page read and write
2311E528000
heap
page read and write
1367000
heap
page read and write
1A0BC39F000
trusted library allocation
page read and write
1D0EE000
stack
page read and write
5ECC89E000
stack
page read and write
1066000
heap
page read and write
3DAF000
stack
page read and write
DD4000
heap
page read and write
13799EC7000
trusted library allocation
page read and write
4C70000
direct allocation
page read and write
1A0BC5C9000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
40AF000
stack
page read and write
137A0187000
trusted library allocation
page read and write
1379551C000
heap
page read and write
D70000
unkown
page write copy
1379EA8F000
trusted library allocation
page read and write
5A97000
trusted library allocation
page read and write
1379FAFC000
trusted library allocation
page read and write
13795530000
heap
page read and write
4C81000
heap
page read and write
10D6000
heap
page read and write
137A62C5000
trusted library allocation
page read and write
137A9260000
trusted library allocation
page read and write
29C0000
direct allocation
page read and write
49AE000
stack
page read and write
137A6240000
trusted library allocation
page read and write
D0E000
stack
page read and write
4601000
heap
page read and write
10E8000
unkown
page execute and read and write
1379552E000
heap
page read and write
5E39000
trusted library allocation
page read and write
4B71000
heap
page read and write
5B11000
trusted library allocation
page read and write
137A9188000
trusted library allocation
page read and write
52E000
heap
page read and write
1379557A000
heap
page read and write
1379EA85000
trusted library allocation
page read and write
1F4000
heap
page read and write
1379FDCD000
trusted library allocation
page read and write
4FD0000
heap
page read and write
137A0193000
trusted library allocation
page read and write
388F000
stack
page read and write
13795560000
heap
page read and write
E20E12D000
stack
page read and write
3BAF000
stack
page read and write
437F000
stack
page read and write
1379557D000
heap
page read and write
1A0BF815000
trusted library allocation
page read and write
137A8F5B000
trusted library allocation
page read and write
DD0000
direct allocation
page read and write
4C70000
direct allocation
page read and write
1A0BF675000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
E4B000
heap
page read and write
38864341E000
trusted library allocation
page read and write
BDB000
stack
page read and write
12A6000
heap
page read and write
D54000
heap
page read and write
11A4000
heap
page read and write
5B33000
trusted library allocation
page read and write
FD0000
direct allocation
page read and write
137A6239000
trusted library allocation
page read and write
DD0000
direct allocation
page read and write
D54000
heap
page read and write
1379DBB0000
trusted library section
page read and write
CD4000
heap
page read and write
1379F982000
unclassified section
page read and write
528C000
stack
page read and write
1360000
heap
page read and write
1379BD03000
trusted library allocation
page read and write
C6A000
unkown
page execute and write copy
137A62B5000
trusted library allocation
page read and write
E2D000
heap
page read and write
1A0BF500000
trusted library allocation
page read and write
13795569000
heap
page read and write
1379EAA8000
trusted library allocation
page read and write
5E30000
trusted library allocation
page read and write
137A1B98000
trusted library allocation
page read and write
2311E52F000
heap
page read and write
1379E10E000
trusted library allocation
page read and write
59C3000
trusted library allocation
page read and write
49C0000
direct allocation
page read and write
409E000
stack
page read and write
2311E4F9000
heap
page read and write
E4B000
unkown
page execute and read and write
725E000
heap
page read and write
1D836B40000
heap
page read and write
13795583000
heap
page read and write
5A40000
trusted library allocation
page read and write
1A0BEC26000
trusted library allocation
page read and write
137A9194000
trusted library allocation
page read and write
554F000
stack
page read and write
137A02B4000
trusted library allocation
page read and write
137A6A46000
trusted library allocation
page read and write
4B71000
heap
page read and write
E20E16E000
unkown
page readonly
5E36000
trusted library allocation
page read and write
7C5000
unkown
page execute and write copy
1348000
heap
page read and write
1379FCD9000
trusted library allocation
page read and write
E04000
heap
page read and write
2311E532000
heap
page read and write
400F000
stack
page read and write
10D1000
heap
page read and write
137A6197000
trusted library allocation
page read and write
1379F2B8000
trusted library allocation
page read and write
D50000
heap
page read and write
137A1100000
trusted library allocation
page read and write
2311DDD1000
heap
page read and write
13795574000
heap
page read and write
BF4000
heap
page read and write
137A61ED000
trusted library allocation
page read and write
137A69B0000
trusted library allocation
page read and write
1A0BCAA4000
trusted library allocation
page read and write
3FFE000
stack
page read and write
1379E36F000
trusted library allocation
page read and write
990000
heap
page read and write
1379F401000
trusted library allocation
page read and write
137A1095000
trusted library allocation
page read and write
12EE000
unkown
page execute and write copy
1804BE12000
trusted library allocation
page read and write
11A4000
heap
page read and write
1379B7C9000
trusted library allocation
page read and write
43CF000
stack
page read and write
CD4000
heap
page read and write
137A0F5C000
trusted library allocation
page read and write
10F4000
heap
page read and write
5A40000
trusted library allocation
page read and write
1379A42F000
trusted library allocation
page read and write
D54000
heap
page read and write
1F4000
heap
page read and write
4B6F000
stack
page read and write
4601000
heap
page read and write
16D3000
heap
page read and write
137A61D5000
trusted library allocation
page read and write
1A0BC1C2000
trusted library allocation
page read and write
BEF000
stack
page read and write
There are 6901 hidden memdumps, click here to show them.