IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\num[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1001066001\2ffb915ad7.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1001068001\3cfbb3a6fb.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1001069001\num.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\7X9P2VGBRHETX32KDN8MJ2HFVKS2ST.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\D9O67IRBWGRZW0D1WOATN0GX8KUC.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\DIKGVVY9JNEBJRBXL.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\KOVSL46NUOT22BPKOXPHV6NAC5.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\RIHOEX26J337XMDAUSF1C246W.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\VU8MX8J5A37EO7MMQ3BQL.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
malicious
C:\ProgramData\DAKFCGIJKJKFHIDHIIIEBGCBFB
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EHJDGHJDBFIJKECAECAFBAKKEG
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\FBGHIIJD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\FCBFBGDB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\FIJDGIJJKEGIEBGCGDHCFIDAAE
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\GCBKECAKFBGCAKECGIEH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JEBKKEGDBFIIEBFHIEHC
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\KJJKEBGHJKFIDGCAAFCAFCBAKF
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\D9O67IRBWGRZW0D1WOATN0GX8KUC.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DIKGVVY9JNEBJRBXL.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Windows\Tasks\skotes.job
data
dropped
There are 40 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\RIHOEX26J337XMDAUSF1C246W.exe
"C:\Users\user\AppData\Local\Temp\RIHOEX26J337XMDAUSF1C246W.exe"
malicious
C:\Users\user\AppData\Local\Temp\7X9P2VGBRHETX32KDN8MJ2HFVKS2ST.exe
"C:\Users\user\AppData\Local\Temp\7X9P2VGBRHETX32KDN8MJ2HFVKS2ST.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\DIKGVVY9JNEBJRBXL.exe
"C:\Users\user\AppData\Local\Temp\DIKGVVY9JNEBJRBXL.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1001066001\2ffb915ad7.exe
"C:\Users\user\AppData\Local\Temp\1001066001\2ffb915ad7.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001066001\2ffb915ad7.exe
"C:\Users\user\AppData\Local\Temp\1001066001\2ffb915ad7.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001068001\3cfbb3a6fb.exe
"C:\Users\user\AppData\Local\Temp\1001068001\3cfbb3a6fb.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001069001\num.exe
"C:\Users\user\AppData\Local\Temp\1001069001\num.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001066001\2ffb915ad7.exe
"C:\Users\user\AppData\Local\Temp\1001066001\2ffb915ad7.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001068001\3cfbb3a6fb.exe
"C:\Users\user\AppData\Local\Temp\1001068001\3cfbb3a6fb.exe"
malicious
C:\Users\user\AppData\Local\Temp\VU8MX8J5A37EO7MMQ3BQL.exe
"C:\Users\user\AppData\Local\Temp\VU8MX8J5A37EO7MMQ3BQL.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001069001\num.exe
"C:\Users\user\AppData\Local\Temp\1001069001\num.exe"
malicious
C:\Users\user\AppData\Local\Temp\KOVSL46NUOT22BPKOXPHV6NAC5.exe
"C:\Users\user\AppData\Local\Temp\KOVSL46NUOT22BPKOXPHV6NAC5.exe"
malicious
C:\Users\user\AppData\Local\Temp\D9O67IRBWGRZW0D1WOATN0GX8KUC.exe
"C:\Users\user\AppData\Local\Temp\D9O67IRBWGRZW0D1WOATN0GX8KUC.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2180 -parentBuildID 20230927232528 -prefsHandle 2072 -prefMapHandle 2068 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b4faddb-860d-4b71-a829-afd66ea2d4d8} 7308 "\\.\pipe\gecko-crash-server-pipe.7308" 1ee1ea6df10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4224 -parentBuildID 20230927232528 -prefsHandle 3972 -prefMapHandle 4020 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c6cd9aed-375f-4196-afd9-d6d064195543} 7308 "\\.\pipe\gecko-crash-server-pipe.7308" 1ee31012010 rdd
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 24 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.37/0d60be0de163924d/nss3.dll
185.215.113.37
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
http://detectportal.firefox.com/
unknown
http://185.215.113.37/0d60be0de163924d/vcruntime140.dllmGI
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://sergei-esenin.com/
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=UuGFpt56D9L4&l=
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli
unknown
https://spocs.getpocket.com/spocs
unknown
https://screenshots.firefox.com
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://profiler.firefox.com/
unknown
https://sergei-esenin.com/api2a
unknown
http://185.215.113.37/e2b1563c6670f193.phpfGb
unknown
https://github.com/mozilla-services/screenshots
unknown
http://185.215.113.37/e2b1563c6670f193.phpRb2
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCaptureRequest
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
http://185.215.113.37/e2b1563c6670f193.php3cb
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://ok.ru/
unknown
https://support.mozilla.org/kb/fix-video-audio-problems-firefox-windowsThe
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1&
unknown
https://www.ecosia.org/newtab/
unknown
https://lv.queniujq.cn
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.cloudflare.steamstatic.com/public/javascript/webui/clientcom.js?v=qYlgdgWOD4Ng&amp
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.bbc.co.uk/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://checkout.steampowered.com/
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
http://185.215.113.16/off/def.exe
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=KkhJqW2NGKiM&l=engli
unknown
https://sergei-esenin.com/apiNT
unknown
https://sergei-esenin.com/.of
unknown
https://sergei-esenin.com/apiaNT
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://help.steampowered.com/en/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://185.215.113.16/off/def.exeSerq
unknown
http://185.215.113.16/steam/random.exen
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
http://185.215.113.16/steam/random.exet
unknown
https://monitor.firefox.com/about
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&l=englis
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://developer.mozilla.org/docs/Web/API/Push_API/Using_the_Push_API#Encryptiondocument.requestSto
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://185.215.113.37e2b1563c6670f193.phption:
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://steamcommunity.com/workshop/
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://bathdoomgaz.store:443/api/a
unknown
https://spirittunek.store:443/apiJ
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/profilev2.css?v=gNE3gksLVEVa&l=en
unknown
https://www.google.com/complete/searchc1a6845f-015e-4e67-bc64-6e39a843643f9e73a342-4e27-4e9f-8a29-be
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
http://mozilla.org/Q
unknown
https://www.wykop.pl/
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=e
unknown
https://vk.com/
unknown
https://steamcommunity.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Ff_1prscqzeu&
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingTrying
unknown
https://mobbipenju.store:443/api
unknown
https://www.olx.pl/
unknown
http://185.215.113.16/steam/random.exe5
unknown
https://xhr.spec.whatwg.org/#sync-warningThe
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
104.21.53.8
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious
example.org
93.184.215.14
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.238
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
detectportal.firefox.com
unknown
shavar.services.mozilla.com
unknown
There are 15 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.53.8
sergei-esenin.com
United States
malicious
185.215.113.43
unknown
Portugal
malicious
185.215.113.37
unknown
Portugal
malicious
104.102.49.254
steamcommunity.com
United States
malicious
185.215.113.16
unknown
Portugal
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
142.250.181.238
youtube.com
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
prod.ads.prod.webservices.mozgcp.net
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
2ffb915ad7.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
3cfbb3a6fb.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
num.exe
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
251000
unkown
page execute and read and write
malicious
531000
unkown
page execute and read and write
malicious
5040000
direct allocation
page read and write
malicious
4A50000
direct allocation
page read and write
malicious
251000
unkown
page execute and read and write
malicious
48C0000
direct allocation
page read and write
malicious
CE1000
unkown
page execute and read and write
malicious
8B1000
unkown
page execute and write copy
malicious
145E000
heap
page read and write
malicious
1137000
heap
page read and write
malicious
8B1000
unkown
page execute and write copy
malicious
4EE0000
direct allocation
page read and write
malicious
531000
unkown
page execute and read and write
malicious
12CE000
heap
page read and write
malicious
8B1000
unkown
page execute and write copy
malicious
4A50000
direct allocation
page read and write
malicious
5070000
direct allocation
page read and write
malicious
8B1000
unkown
page execute and write copy
malicious
5020000
direct allocation
page read and write
malicious
4B40000
trusted library allocation
page read and write
1EE36C80000
trusted library allocation
page read and write
1EE25793000
heap
page read and write
367F000
stack
page read and write
1EE2A143000
trusted library allocation
page read and write
1EE25793000
heap
page read and write
23AB0D0A000
trusted library allocation
page read and write
1EE30E00000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1EE3077F000
trusted library allocation
page read and write
347E000
stack
page read and write
13CE000
stack
page read and write
1D524000
heap
page read and write
1EE311A7000
trusted library allocation
page read and write
1EE310D2000
trusted library allocation
page read and write
1621000
heap
page read and write
11AB000
heap
page read and write
4441000
heap
page read and write
1EE369F8000
trusted library allocation
page read and write
93B000
unkown
page execute and write copy
1EE313C6000
trusted library allocation
page read and write
AF9E9FE000
stack
page read and write
12B0000
heap
page read and write
1EE30996000
trusted library allocation
page read and write
D37000
heap
page read and write
1EE309A4000
trusted library allocation
page read and write
1EE301AB000
trusted library allocation
page read and write
403F000
stack
page read and write
4451000
heap
page read and write
260AA423000
heap
page read and write
57C000
unkown
page execute and read and write
1EE36C8B000
trusted library allocation
page read and write
602000
heap
page read and write
624000
heap
page read and write
260A9CE0000
heap
page read and write
1EE30103000
trusted library allocation
page read and write
1EE30A9B000
trusted library allocation
page read and write
1EE2574F000
heap
page read and write
5EB8000
trusted library allocation
page read and write
1EE36B03000
trusted library allocation
page read and write
2B49AA31000
trusted library allocation
page execute read
260A93D0000
unclassified section
page readonly
45C1000
heap
page read and write
1EE30BD2000
trusted library allocation
page read and write
4441000
heap
page read and write
615000
heap
page read and write
599000
unkown
page write copy
1EE38C00000
trusted library allocation
page read and write
1EE313EE000
trusted library allocation
page read and write
528F000
trusted library allocation
page read and write
17F37C66000
trusted library allocation
page read and write
961000
unkown
page read and write
4441000
heap
page read and write
1EE2DC03000
trusted library allocation
page read and write
992000
unkown
page read and write
C2C000
unkown
page execute and write copy
5589000
trusted library allocation
page read and write
50A0000
direct allocation
page execute and read and write
5B3B000
trusted library allocation
page read and write
1454000
heap
page read and write
1EE2EC57000
trusted library allocation
page read and write
1EE2E5CD000
trusted library allocation
page read and write
5355000
trusted library allocation
page read and write
511140E000
stack
page read and write
5AF7000
trusted library allocation
page read and write
3CEE000
stack
page read and write
379F000
stack
page read and write
1454000
heap
page read and write
1EE2DAB7000
trusted library allocation
page read and write
1EE25736000
heap
page read and write
3DBF000
stack
page read and write
1EE33608000
trusted library allocation
page read and write
5611000
trusted library allocation
page read and write
52B7000
trusted library allocation
page read and write
7B80000
heap
page read and write
1EE30AF0000
trusted library allocation
page read and write
1EE2DAB4000
trusted library allocation
page read and write
293E000
stack
page read and write
29697000
heap
page read and write
1EE2BB37000
trusted library allocation
page read and write
A90000
unkown
page readonly
493E000
stack
page read and write
BD4000
heap
page read and write
4BC1000
heap
page read and write
1EE300CB000
trusted library allocation
page read and write
45B0000
direct allocation
page read and write
1EE3687C000
trusted library allocation
page read and write
1EE2BAB2000
trusted library allocation
page read and write
5615000
trusted library allocation
page read and write
1EE30144000
trusted library allocation
page read and write
4FCE000
stack
page read and write
1EE302E4000
trusted library allocation
page read and write
1EE30BEC000
trusted library allocation
page read and write
1EE309A0000
trusted library allocation
page read and write
1EE30A20000
trusted library allocation
page read and write
5B46000
trusted library allocation
page read and write
23AB0B00000
trusted library allocation
page read and write
D14000
heap
page read and write
1EE38C78000
trusted library allocation
page read and write
4E01000
heap
page read and write
3991000
heap
page read and write
1EE30BCF000
trusted library allocation
page read and write
1EE31285000
trusted library allocation
page read and write
17F37946000
heap
page read and write
1EE2579E000
heap
page read and write
271000
unkown
page execute and write copy
2B49A9C1000
trusted library allocation
page execute read
1134000
heap
page read and write
1EE3174C000
trusted library allocation
page read and write
1EE2578F000
heap
page read and write
452000
unkown
page execute and read and write
1D54C000
heap
page read and write
1EE36C7B000
trusted library allocation
page read and write
1EE305EB000
trusted library allocation
page read and write
1EE2F3F3000
trusted library allocation
page read and write
38EF000
stack
page read and write
6002000
trusted library allocation
page read and write
1340000
heap
page read and write
1034000
heap
page read and write
5283000
trusted library allocation
page read and write
437E000
stack
page read and write
1EE305F6000
trusted library allocation
page read and write
1EE32110000
trusted library allocation
page read and write
1EE2F3B8000
trusted library allocation
page read and write
1EE306AF000
trusted library allocation
page read and write
BD4000
heap
page read and write
52B1000
trusted library allocation
page read and write
1D524000
heap
page read and write
52C9000
trusted library allocation
page read and write
1EE310CC000
trusted library allocation
page read and write
5118A3F000
stack
page read and write
52BB000
trusted library allocation
page read and write
4F60000
direct allocation
page execute and read and write
1EE2FFB8000
trusted library allocation
page read and write
270000
unkown
page readonly
5365000
trusted library allocation
page read and write
1EE2F614000
trusted library allocation
page read and write
52FA000
trusted library allocation
page read and write
5BB0000
trusted library allocation
page read and write
56BB000
trusted library allocation
page read and write
4F67000
trusted library allocation
page execute and read and write
17F37794000
remote allocation
page execute read
260AA4A7000
heap
page read and write
A74000
heap
page read and write
1EE368E8000
trusted library allocation
page read and write
1EE3095F000
trusted library allocation
page read and write
1643000
heap
page read and write
1EE30BD2000
trusted library allocation
page read and write
550000
direct allocation
page read and write
5587000
trusted library allocation
page read and write
2C50000
heap
page read and write
101B000
heap
page read and write
1EE2DAF9000
trusted library allocation
page read and write
115C000
heap
page read and write
1EE203B0000
heap
page read and write
1EE257A6000
heap
page read and write
4C1000
unkown
page execute and read and write
1410000
heap
page read and write
306E000
stack
page read and write
1EE30860000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1EE25750000
heap
page read and write
1EE2A71E000
trusted library allocation
page read and write
DB117FF000
stack
page read and write
4441000
heap
page read and write
1EE30C1F000
trusted library allocation
page read and write
5DE5000
trusted library allocation
page read and write
F90000
heap
page read and write
5693000
trusted library allocation
page read and write
1EE2F903000
trusted library allocation
page read and write
6F8DD000
unkown
page readonly
1B65D000
stack
page read and write
98E000
unkown
page execute and write copy
5BDE000
trusted library allocation
page read and write
5AD7000
trusted library allocation
page read and write
1920000
trusted library allocation
page read and write
127E000
stack
page read and write
4F80000
trusted library allocation
page read and write
260A9712000
trusted library allocation
page read and write
260AA498000
heap
page read and write
3DFE000
stack
page read and write
5355000
trusted library allocation
page read and write
1EE368B5000
trusted library allocation
page read and write
5190000
direct allocation
page execute and read and write
1EE2F424000
trusted library allocation
page read and write
1D53E000
heap
page read and write
1050000
heap
page read and write
52D1000
trusted library allocation
page read and write
548D000
stack
page read and write
5EBC000
trusted library allocation
page read and write
1EE2A7B9000
trusted library allocation
page read and write
1EE3688C000
trusted library allocation
page read and write
3B8E000
stack
page read and write
52D3000
trusted library allocation
page read and write
1EE2A098000
trusted library allocation
page read and write
BD4000
heap
page read and write
4DA0000
direct allocation
page read and write
1EE2A003000
trusted library allocation
page read and write
1EE38B88000
trusted library allocation
page read and write
1EE2F403000
trusted library allocation
page read and write
51A0000
direct allocation
page execute and read and write
646000
heap
page read and write
2D1E000
stack
page read and write
7AA000
unkown
page execute and write copy
1027000
heap
page read and write
41EE000
stack
page read and write
260A97C6000
trusted library allocation
page read and write
1EE309F0000
trusted library allocation
page read and write
260A9F00000
trusted library allocation
page read and write
1EE368E4000
trusted library allocation
page read and write
3B3F000
stack
page read and write
1EE2E61F000
trusted library allocation
page read and write
5080000
direct allocation
page execute and read and write
4BF000
unkown
page execute and write copy
1EE2F3AA000
trusted library allocation
page read and write
2CC0000
direct allocation
page read and write
4E1000
unkown
page execute and write copy
260AA431000
heap
page read and write
529B000
trusted library allocation
page read and write
FCB000
heap
page read and write
1EE2F9DE000
trusted library allocation
page read and write
1EE3130F000
trusted library allocation
page read and write
1EE31228000
trusted library allocation
page read and write
1EE25741000
heap
page read and write
15D0000
direct allocation
page read and write
368E000
stack
page read and write
3E44D5D000
stack
page read and write
1EE2DAE0000
trusted library allocation
page read and write
1EE2575B000
heap
page read and write
1EE317D5000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1D502000
heap
page read and write
1EE3136C000
trusted library allocation
page read and write
EFD000
stack
page read and write
4FF0000
heap
page execute and read and write
4A00000
trusted library allocation
page read and write
5AD7000
trusted library allocation
page read and write
1EE1EAF0000
trusted library allocation
page read and write
1EE3360A000
trusted library allocation
page read and write
5DB4000
trusted library allocation
page read and write
1EE36918000
trusted library allocation
page read and write
1EE25787000
heap
page read and write
BD4000
heap
page read and write
1EE30CA7000
trusted library allocation
page read and write
3CBE000
stack
page read and write
3CBF000
stack
page read and write
5BB0000
trusted library allocation
page read and write
2D30000
heap
page read and write
52AC000
trusted library allocation
page read and write
1BA3F000
stack
page read and write
1EE309FC000
trusted library allocation
page read and write
5354000
trusted library allocation
page read and write
573000
unkown
page execute and write copy
1EE30887000
trusted library allocation
page read and write
BD4000
heap
page read and write
1EE3098F000
trusted library allocation
page read and write
1EE321E6000
trusted library allocation
page read and write
6C800000
unkown
page read and write
1EE2F662000
trusted library allocation
page read and write
52D000
unkown
page execute and write copy
1EE38B64000
trusted library allocation
page read and write
FA4000
heap
page read and write
1EE30AAF000
trusted library allocation
page read and write
1EE25765000
heap
page read and write
BD0000
heap
page read and write
60FF000
trusted library allocation
page read and write
5EB3000
trusted library allocation
page read and write
260A9C70000
trusted library allocation
page read and write
6231000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
1EE30733000
trusted library allocation
page read and write
853000
unkown
page execute and write copy
1EE30AA0000
trusted library allocation
page read and write
2ED0000
direct allocation
page read and write
FA7000
heap
page read and write
5365000
trusted library allocation
page read and write
4EE3000
trusted library allocation
page execute and read and write
5630000
trusted library allocation
page read and write
1EE36C10000
trusted library allocation
page read and write
1EE31223000
trusted library allocation
page read and write
569B000
trusted library allocation
page read and write
1EE2F2F0000
trusted library allocation
page read and write
313F000
stack
page read and write
1099000
heap
page read and write
5381000
trusted library allocation
page read and write
1EE36878000
trusted library allocation
page read and write
4A51000
heap
page read and write
1EE1EA5E000
trusted library allocation
page read and write
1D52B000
heap
page read and write
1EE30B6B000
trusted library allocation
page read and write
BD4000
heap
page read and write
4EE0000
direct allocation
page read and write
38CF000
stack
page read and write
58F0000
trusted library allocation
page read and write
1EE2E6F9000
trusted library allocation
page read and write
1EE2BC04000
trusted library allocation
page read and write
1EE2ECE5000
trusted library allocation
page read and write
5270000
direct allocation
page execute and read and write
1EE33604000
trusted library allocation
page read and write
53C9000
trusted library allocation
page read and write
1EE36976000
trusted library allocation
page read and write
BD4000
heap
page read and write
1EE30F97000
trusted library allocation
page read and write
A74000
heap
page read and write
5C7C000
trusted library allocation
page read and write
1234000
heap
page read and write
1EE2E49C000
trusted library allocation
page read and write
1EE30B8B000
trusted library allocation
page read and write
1EE38BB0000
trusted library allocation
page read and write
1EE30AB5000
trusted library allocation
page read and write
45C1000
heap
page read and write
1EE36948000
trusted library allocation
page read and write
1EE36A08000
trusted library allocation
page read and write
4441000
heap
page read and write
5EB7000
trusted library allocation
page read and write
4DA0000
direct allocation
page read and write
1EE2C408000
trusted library allocation
page read and write
1EE30BA5000
trusted library allocation
page read and write
1EE30BA7000
trusted library allocation
page read and write
1EE2A169000
trusted library allocation
page read and write
1EE30BCF000
trusted library allocation
page read and write
45C1000
heap
page read and write
43FF000
stack
page read and write
550000
direct allocation
page read and write
1B79E000
stack
page read and write
5585000
trusted library allocation
page read and write
BD4000
heap
page read and write
15D0000
direct allocation
page read and write
1EE2E5A7000
trusted library allocation
page read and write
260AA431000
heap
page read and write
5693000
trusted library allocation
page read and write
1EE2E8A9000
trusted library allocation
page read and write
7EFF000
stack
page read and write
5B38000
trusted library allocation
page read and write
1EE36880000
trusted library allocation
page read and write
1EE2579D000
heap
page read and write
1EE2BBD6000
trusted library allocation
page read and write
1EE305E6000
trusted library allocation
page read and write
260AA484000
heap
page read and write
50D0000
direct allocation
page execute and read and write
1EE2578F000
heap
page read and write
1EE36ACD000
trusted library allocation
page read and write
1EE30A9E000
trusted library allocation
page read and write
1034000
heap
page read and write
7CBC000
stack
page read and write
1EE30003000
trusted library allocation
page read and write
1EE30A97000
trusted library allocation
page read and write
62A4000
trusted library allocation
page read and write
1EE36A1C000
trusted library allocation
page read and write
1CD0000
trusted library allocation
page read and write
1A0000
heap
page read and write
393E000
stack
page read and write
1EE304BB000
trusted library allocation
page read and write
BD4000
heap
page read and write
1EE30162000
trusted library allocation
page read and write
2C77000
heap
page read and write
17F37C47000
trusted library allocation
page read and write
D10000
heap
page read and write
5B42000
trusted library allocation
page read and write
FA4000
heap
page read and write
1EE2B920000
trusted library section
page readonly
5400000
direct allocation
page execute and read and write
17F3798F000
unclassified section
page read and write
28B7000
heap
page read and write
1EE366EA000
trusted library allocation
page read and write
5BD7000
trusted library allocation
page read and write
1EE36C00000
trusted library allocation
page read and write
260AA3A4000
heap
page read and write
1EE304B1000
trusted library allocation
page read and write
260A9E90000
heap
page read and write
17F37780000
remote allocation
page read and write
17F37C00000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1EE30875000
trusted library allocation
page read and write
47DF000
stack
page read and write
1EE2A100000
trusted library allocation
page read and write
1920000
trusted library allocation
page read and write
11A2000
heap
page read and write
1EE309C8000
trusted library allocation
page read and write
45AE000
stack
page read and write
1EE36A83000
trusted library allocation
page read and write
478000
unkown
page execute and write copy
4441000
heap
page read and write
1EE30AF2000
trusted library allocation
page read and write
4BE0000
heap
page read and write
5EB3000
trusted library allocation
page read and write
1EE309BF000
trusted library allocation
page read and write
1EE257A5000
heap
page read and write
4BC1000
heap
page read and write
1EE2F9FD000
trusted library allocation
page read and write
1EE2F2C8000
trusted library allocation
page read and write
1D528000
heap
page read and write
1D53E000
heap
page read and write
1EE257AA000
heap
page read and write
260AA461000
heap
page read and write
5685000
trusted library allocation
page read and write
1EE2EC90000
trusted library allocation
page read and write
1EE3681F000
trusted library allocation
page read and write
A5F000
unkown
page execute and write copy
4441000
heap
page read and write
2FD0000
direct allocation
page read and write
5EBC000
trusted library allocation
page read and write
1EE367BF000
trusted library allocation
page read and write
3B5F000
stack
page read and write
5284000
trusted library allocation
page read and write
39FF000
stack
page read and write
1D525000
heap
page read and write
5EBE000
trusted library allocation
page read and write
1EE2E4A2000
trusted library allocation
page read and write
2F2E000
stack
page read and write
BD4000
heap
page read and write
5310000
trusted library allocation
page read and write
1EE313D8000
trusted library allocation
page read and write
1EE32300000
trusted library allocation
page read and write
1EE2DA9C000
trusted library allocation
page read and write
250000
unkown
page readonly
569F000
trusted library allocation
page read and write
1EE3095F000
trusted library allocation
page read and write
17F379B0000
unclassified section
page readonly
1EE34C04000
trusted library allocation
page read and write
260A9CB3000
unkown
page execute read
479000
unkown
page execute and read and write
2CC0000
direct allocation
page read and write
5365000
trusted library allocation
page read and write
2D0000
unkown
page execute and write copy
754000
heap
page read and write
4F50000
direct allocation
page execute and read and write
1134000
heap
page read and write
1EE2F200000
trusted library allocation
page read and write
27E0000
direct allocation
page read and write
1EE36AF1000
trusted library allocation
page read and write
4DA0000
direct allocation
page read and write
1311000
heap
page read and write
1EE36C98000
trusted library allocation
page read and write
1EE309E0000
trusted library allocation
page read and write
4441000
heap
page read and write
1EE2579C000
heap
page read and write
1EE36960000
trusted library allocation
page read and write
5B3F000
trusted library allocation
page read and write
45C1000
heap
page read and write
1EE32228000
trusted library allocation
page read and write
1D52C000
heap
page read and write
1EE2E41D000
trusted library allocation
page read and write
52D000
unkown
page execute and read and write
61ED3000
direct allocation
page read and write
1EE309C8000
trusted library allocation
page read and write
52FB000
trusted library allocation
page read and write
260AA3E1000
heap
page read and write
260AA46A000
heap
page read and write
260AA4A9000
heap
page read and write
5AA4000
trusted library allocation
page read and write
1EE320D6000
trusted library allocation
page read and write
260A9745000
trusted library allocation
page read and write
25786F304000
trusted library allocation
page read and write
136A000
heap
page read and write
45C1000
heap
page read and write
4F2000
unkown
page execute and write copy
1454000
heap
page read and write
1D530000
heap
page read and write
443F000
stack
page read and write
4BC1000
heap
page read and write
1165000
heap
page read and write
B64000
unkown
page readonly
4A30000
direct allocation
page read and write
5355000
trusted library allocation
page read and write
4BC2000
heap
page read and write
1EE36C7C000
trusted library allocation
page read and write
1EE36C4B000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1EE36CB6000
trusted library allocation
page read and write
383E000
stack
page read and write
1EE30A9B000
trusted library allocation
page read and write
492F000
stack
page read and write
1EE30BFA000
trusted library allocation
page read and write
1EE25750000
heap
page read and write
1EE31069000
trusted library allocation
page read and write
1EE309BF000
trusted library allocation
page read and write
1EE2E9C3000
trusted library allocation
page read and write
D3D000
heap
page read and write
52B3000
trusted library allocation
page read and write
1EE3666F000
trusted library allocation
page read and write
4AC1000
heap
page read and write
52F9000
trusted library allocation
page read and write
1EE303F6000
trusted library allocation
page read and write
1EE25796000
heap
page read and write
466000
unkown
page execute and write copy
1EE2E4A2000
trusted library allocation
page read and write
26F0000
direct allocation
page read and write
408E000
stack
page read and write
17F378F0000
heap
page read and write
BD4000
heap
page read and write
1EE2FF05000
trusted library allocation
page read and write
1EE30CDF000
trusted library allocation
page read and write
1D530000
heap
page read and write
52BB000
trusted library allocation
page read and write
8DB000
unkown
page write copy
5589000
trusted library allocation
page read and write
567A000
trusted library allocation
page read and write
1EE307C7000
trusted library allocation
page read and write
1EE38BFB000
trusted library allocation
page read and write
3A3E000
stack
page read and write
1EE3222E000
trusted library allocation
page read and write
1EE309E0000
trusted library allocation
page read and write
CB9000
heap
page read and write
1EE30AE7000
trusted library allocation
page read and write
6C4000
heap
page read and write
4920000
direct allocation
page execute and read and write
1EE2573B000
heap
page read and write
1193000
heap
page read and write
4790000
remote allocation
page read and write
4920000
direct allocation
page execute and read and write
5000000
trusted library allocation
page execute and read and write
1EE2EED0000
trusted library section
page read and write
1EE2E5AE000
trusted library allocation
page read and write
47A0000
direct allocation
page read and write
FA4000
heap
page read and write
1EE30A38000
trusted library allocation
page read and write
102C000
heap
page read and write
45C1000
heap
page read and write
260A93CB000
remote allocation
page execute read
5AA4000
trusted library allocation
page read and write
2B49A931000
trusted library allocation
page execute read
2B49A971000
trusted library allocation
page execute read
45BF000
stack
page read and write
3CFF000
stack
page read and write
45C1000
heap
page read and write
8B0000
unkown
page readonly
1087000
heap
page read and write
931000
unkown
page execute and write copy
1EE306C0000
trusted library allocation
page read and write
1EE30519000
trusted library allocation
page read and write
1EE2BB30000
trusted library allocation
page read and write
5260000
direct allocation
page execute and read and write
5190000
direct allocation
page execute and read and write
1EE2DB32000
trusted library allocation
page read and write
4BC1000
heap
page read and write
BD4000
heap
page read and write
1EE2E4A2000
trusted library allocation
page read and write
447E000
stack
page read and write
1EE2F31C000
trusted library allocation
page read and write
2ED0000
direct allocation
page read and write
FB0000
direct allocation
page read and write
1EE2E47A000
trusted library allocation
page read and write
1EE2AA00000
trusted library allocation
page read and write
1EE2FC50000
trusted library section
page read and write
602000
heap
page read and write
56DF000
trusted library allocation
page read and write
4BC0000
direct allocation
page execute and read and write
AF9F27B000
stack
page read and write
E0E000
heap
page read and write
5E55000
trusted library allocation
page read and write
511180C000
stack
page read and write
1EE25762000
heap
page read and write
45C1000
heap
page read and write
1EE36968000
trusted library allocation
page read and write
1EE31103000
trusted library allocation
page read and write
2ED0000
direct allocation
page read and write
1EE1E910000
heap
page read and write
279F000
stack
page read and write
1EE30956000
trusted library allocation
page read and write
1EE2ECBC000
trusted library allocation
page read and write
260AA3AC000
heap
page read and write
1400000
direct allocation
page read and write
5588000
trusted library allocation
page read and write
1EE309A6000
trusted library allocation
page read and write
5354000
trusted library allocation
page read and write
1D62E000
heap
page read and write
1EE2E56F000
trusted library allocation
page read and write
102D000
heap
page read and write
1EE2578F000
heap
page read and write
4F8A000
trusted library allocation
page read and write
4DC0000
direct allocation
page read and write
1EE25796000
heap
page read and write
5683000
trusted library allocation
page read and write
171F000
stack
page read and write
566000
unkown
page execute and write copy
529B000
trusted library allocation
page read and write
353F000
stack
page read and write
5B3F000
trusted library allocation
page read and write
5584000
trusted library allocation
page read and write
1EE2FE96000
trusted library allocation
page read and write
1EE2E52A000
trusted library allocation
page read and write
4AC1000
heap
page read and write
1EE2FF3F000
trusted library allocation
page read and write
C60000
heap
page read and write
343F000
stack
page read and write
1D54B000
heap
page read and write
1EE3687C000
trusted library allocation
page read and write
5284000
trusted library allocation
page read and write
1EE2C117000
trusted library allocation
page read and write
28FF000
stack
page read and write
4FC000
unkown
page execute and write copy
1EE2F37D000
trusted library allocation
page read and write
5581000
trusted library allocation
page read and write
1EE30C1F000
trusted library allocation
page read and write
5AFD000
trusted library allocation
page read and write
9C0000
unkown
page execute and read and write
1EE30A9B000
trusted library allocation
page read and write
45C1000
heap
page read and write
6145000
trusted library allocation
page read and write
56D000
unkown
page execute and write copy
1EE30887000
trusted library allocation
page read and write
1EE25755000
heap
page read and write
511AD7C000
stack
page read and write
29FF000
stack
page read and write
3CDE000
stack
page read and write
1B7FD000
stack
page read and write
1EE322BE000
trusted library allocation
page read and write
1EE2E5C7000
trusted library allocation
page read and write
529A000
trusted library allocation
page read and write
1D53E000
heap
page read and write
303E000
stack
page read and write
1EE25757000
heap
page read and write
45B0000
direct allocation
page read and write
5EBC000
trusted library allocation
page read and write
406F000
stack
page read and write
1EE257A2000
heap
page read and write
45C1000
heap
page read and write
333E000
stack
page read and write
1EE302C9000
trusted library allocation
page read and write
4931000
heap
page read and write
67EE000
heap
page read and write
1EE25754000
heap
page read and write
45C1000
heap
page read and write
6045000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
5B3F000
trusted library allocation
page read and write
511783D000
stack
page read and write
1D52F000
heap
page read and write
260AA4A7000
heap
page read and write
4BC1000
heap
page read and write
1EE310AC000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
1EE25793000
heap
page read and write
D19000
heap
page read and write
1EE30F79000
trusted library allocation
page read and write
52CE000
trusted library allocation
page read and write
1454000
heap
page read and write
4F00000
direct allocation
page read and write
1E083BB8000
heap
page read and write
5365000
trusted library allocation
page read and write
1D52B000
heap
page read and write
260AA42C000
heap
page read and write
4C30000
direct allocation
page execute and read and write
1D527000
heap
page read and write
3A7E000
stack
page read and write
1EE36703000
trusted library allocation
page read and write
1EE309BA000
trusted library allocation
page read and write
1EE3039C000
trusted library allocation
page read and write
45C1000
heap
page read and write
5B50000
trusted library allocation
page read and write
1EE2B671000
trusted library allocation
page read and write
AD21504000
trusted library allocation
page read and write
61EB4000
direct allocation
page read and write
1EE25796000
heap
page read and write
782000
unkown
page execute and write copy
27E0000
direct allocation
page read and write
6C4000
heap
page read and write
1664000
heap
page read and write
565E000
trusted library allocation
page read and write
45B0000
direct allocation
page read and write
1EE30D23000
trusted library allocation
page read and write
11E0000
direct allocation
page read and write
7A0000
unkown
page read and write
1D514000
heap
page read and write
1EE306B5000
trusted library allocation
page read and write
1EE302C3000
trusted library allocation
page read and write
6F861000
unkown
page execute read
1EE30AE9000
trusted library allocation
page read and write
1EE36971000
trusted library allocation
page read and write
4A30000
direct allocation
page read and write
5280000
direct allocation
page execute and read and write
511563F000
stack
page read and write
15D0000
direct allocation
page read and write
1EE309D2000
trusted library allocation
page read and write
58F6000
trusted library allocation
page read and write
11E0000
direct allocation
page read and write
47FE000
stack
page read and write
1EE2EC9C000
trusted library allocation
page read and write
1EE30CF7000
trusted library allocation
page read and write
45C1000
heap
page read and write
5284000
trusted library allocation
page read and write
1EE309D7000
trusted library allocation
page read and write
1EE31481000
trusted library allocation
page read and write
1EE2575B000
heap
page read and write
4BA1000
heap
page read and write
17F377A0000
unclassified section
page readonly
1EE30AA0000
trusted library allocation
page read and write
1EE304F4000
trusted library allocation
page read and write
1EE257AF000
heap
page read and write
5B44000
trusted library allocation
page read and write
56AC000
trusted library allocation
page read and write
1EE304A8000
trusted library allocation
page read and write
1B34D000
stack
page read and write
1EE36973000
trusted library allocation
page read and write
511AABE000
stack
page read and write
1EE30FC5000
trusted library allocation
page read and write
D17000
heap
page read and write
251000
unkown
page execute and write copy
1EE309B3000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
1EE2578D000
heap
page read and write
1EE3023D000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1EE308E7000
trusted library allocation
page read and write
4EE4000
trusted library allocation
page read and write
1EE2EAB1000
trusted library allocation
page read and write
992000
unkown
page read and write
1EE30887000
trusted library allocation
page read and write
1EE203B4000
heap
page read and write
1EE2BBFB000
trusted library allocation
page read and write
4A3F000
stack
page read and write
1AF9E000
stack
page read and write
1400000
direct allocation
page read and write
1EE2A800000
trusted library allocation
page read and write
1EE309F0000
trusted library allocation
page read and write
99D000
unkown
page execute and write copy
6C4000
heap
page read and write
1EE2C303000
trusted library allocation
page read and write
3A1F000
stack
page read and write
525C000
trusted library allocation
page read and write
1EE30875000
trusted library allocation
page read and write
1EE2F3EE000
trusted library allocation
page read and write
1EE2FE06000
trusted library allocation
page read and write
1EE305EB000
trusted library allocation
page read and write
1EE2E5DE000
trusted library allocation
page read and write
2B49AA01000
trusted library allocation
page execute read
1EE36A2C000
trusted library allocation
page read and write
5AF3000
trusted library allocation
page read and write
4321000
heap
page read and write
1EE305FC000
trusted library allocation
page read and write
1EE2C20A000
trusted library allocation
page read and write
1454000
heap
page read and write
5365000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
1EE30A26000
trusted library allocation
page read and write
5BA1000
trusted library allocation
page read and write
1EE2E600000
trusted library allocation
page read and write
1EE257AF000
heap
page read and write
55B000
unkown
page execute and read and write
1EE36C2D000
trusted library allocation
page read and write
45C1000
heap
page read and write
1EE3061A000
trusted library allocation
page read and write
11E0000
direct allocation
page read and write
1EE367FA000
trusted library allocation
page read and write
1EE25749000
heap
page read and write
4E3000
unkown
page execute and read and write
1EE2A775000
trusted library allocation
page read and write
1EE30763000
trusted library allocation
page read and write
5BA1000
trusted library allocation
page read and write
1EE30B93000
trusted library allocation
page read and write
260AA420000
heap
page read and write
FF4000
unkown
page execute and read and write
52AC000
trusted library allocation
page read and write
B44000
heap
page read and write
1EE3097A000
trusted library allocation
page read and write
56B9000
trusted library allocation
page read and write
397E000
stack
page read and write
1EE30166000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
A74000
heap
page read and write
1D52F000
heap
page read and write
354E000
stack
page read and write
4ED0000
trusted library allocation
page read and write
1EE2A5E0000
unclassified section
page read and write
1400000
direct allocation
page read and write
1EE30203000
trusted library allocation
page read and write
45C1000
heap
page read and write
1EE2A710000
trusted library allocation
page read and write
1EE2F82A000
trusted library allocation
page read and write
1D53E000
heap
page read and write
5EB4000
trusted library allocation
page read and write
1EE25755000
heap
page read and write
1D535000
heap
page read and write
1B2AE000
stack
page read and write
107D000
heap
page read and write
45B0000
direct allocation
page read and write
2C70000
heap
page read and write
1EE2F303000
trusted library allocation
page read and write
260A95BF000
unclassified section
page read and write
1EE302BB000
trusted library allocation
page read and write
1EE305FB000
trusted library allocation
page read and write
1EE30842000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
2EFE000
stack
page read and write
1EE2FF1A000
trusted library allocation
page read and write
1EE2EC7C000
trusted library allocation
page read and write
4DA0000
direct allocation
page read and write
6C4000
heap
page read and write
260AA429000
heap
page read and write
260AA484000
heap
page read and write
1EE2F0F9000
trusted library allocation
page read and write
1234000
heap
page read and write
5354000
trusted library allocation
page read and write
A74000
heap
page read and write
440F000
stack
page read and write
1EE30AA2000
trusted library allocation
page read and write
1EE30951000
trusted library allocation
page read and write
1EE2EC7C000
trusted library allocation
page read and write
11B2000
heap
page read and write
1EE2ABCD000
trusted library allocation
page read and write
1EE317DD000
trusted library allocation
page read and write
11A4000
unkown
page execute and read and write
5285000
trusted library allocation
page read and write
40BF000
stack
page read and write
1EE308CB000
trusted library allocation
page read and write
1EE2573A000
heap
page read and write
6C4000
heap
page read and write
5355000
trusted library allocation
page read and write
1EE30A9B000
trusted library allocation
page read and write
260AA3E8000
heap
page read and write
5B34000
trusted library allocation
page read and write
1EE2A2A2000
trusted library allocation
page read and write
3B7E000
stack
page read and write
1EE2574A000
heap
page read and write
4920000
direct allocation
page execute and read and write
1EE3688C000
trusted library allocation
page read and write
1EE25744000
heap
page read and write
4441000
heap
page read and write
1EE366A8000
trusted library allocation
page read and write
50D0000
direct allocation
page execute and read and write
4441000
heap
page read and write
17F37C2E000
trusted library allocation
page read and write
1EE2EA8E000
trusted library allocation
page read and write
1D52F000
heap
page read and write
1EE25793000
heap
page read and write
570B000
trusted library allocation
page read and write
5584000
trusted library allocation
page read and write
5119B7E000
stack
page read and write
1EE38BF9000
trusted library allocation
page read and write
1EE367BC000
trusted library allocation
page read and write
52DE000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page read and write
377F000
stack
page read and write
1EE3683D000
trusted library allocation
page read and write
1EE307A8000
trusted library allocation
page read and write
1EE30842000
trusted library allocation
page read and write
1EE30EA3000
trusted library allocation
page read and write
754000
heap
page read and write
1EE2E4CB000
trusted library allocation
page read and write
1EE3687A000
trusted library allocation
page read and write
57C000
unkown
page execute and read and write
5B33000
trusted library allocation
page read and write
1EE2E5F1000
trusted library allocation
page read and write
35BE000
stack
page read and write
52CC000
trusted library allocation
page read and write
4BB0000
heap
page read and write
5EB4000
trusted library allocation
page read and write
5288000
trusted library allocation
page read and write
1EE2575D000
heap
page read and write
5881000
trusted library allocation
page read and write
1EE2C11A000
trusted library allocation
page read and write
567000
unkown
page execute and write copy
4441000
heap
page read and write
1EE2575F000
heap
page read and write
53E0000
direct allocation
page execute and read and write
4DA0000
direct allocation
page read and write
1EE31209000
trusted library allocation
page read and write
7A2000
unkown
page execute and read and write
45C000
unkown
page execute and write copy
433E000
stack
page read and write
4BC1000
heap
page read and write
5B34000
trusted library allocation
page read and write
1EE30AF2000
trusted library allocation
page read and write
260AA47B000
heap
page read and write
5090000
direct allocation
page execute and read and write
5119DBB000
stack
page read and write
357E000
stack
page read and write
49E000
unkown
page execute and read and write
1EE317FE000
trusted library allocation
page read and write
1EE2FFB2000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
1EE2EC03000
trusted library allocation
page read and write
260A97BC000
trusted library allocation
page read and write
11AB000
heap
page read and write
1EE30528000
trusted library allocation
page read and write
271000
unkown
page execute and write copy
550000
direct allocation
page read and write
1E0857A7000
heap
page read and write
AF9D9D8000
stack
page read and write
3F7E000
stack
page read and write
1EE2579C000
heap
page read and write
51F0000
direct allocation
page execute and read and write
1EE310E3000
trusted library allocation
page read and write
635000
heap
page read and write
76BF000
stack
page read and write
1EE1E950000
heap
page readonly
1EE2A140000
trusted library allocation
page read and write
2F97000
heap
page read and write
2B2000
unkown
page execute and read and write
528F000
trusted library allocation
page read and write
4BC2000
heap
page read and write
1EE2ECB0000
trusted library allocation
page read and write
260AA3A0000
heap
page read and write
1EE30703000
trusted library allocation
page read and write
1EE3697A000
trusted library allocation
page read and write
3D3E000
stack
page read and write
495E000
stack
page read and write
51B0000
direct allocation
page execute and read and write
33FE000
stack
page read and write
48F0000
direct allocation
page execute and read and write
1EE3097C000
trusted library allocation
page read and write
1629000
heap
page read and write
4A41000
heap
page read and write
1EE305CE000
trusted library allocation
page read and write
237DE8D04000
trusted library allocation
page read and write
47FF000
stack
page read and write
1EE30A9B000
trusted library allocation
page read and write
1EE38C83000
trusted library allocation
page read and write
1EE2E9E0000
trusted library allocation
page read and write
4441000
heap
page read and write
260A9781000
trusted library allocation
page read and write
1EE303E3000
trusted library allocation
page read and write
5585000
trusted library allocation
page read and write
8DB000
unkown
page write copy
11B1000
heap
page read and write
1D524000
heap
page read and write
D10000
heap
page read and write
9E0000
unkown
page execute and read and write
1EE30B93000
trusted library allocation
page read and write
1EE2FCB0000
unclassified section
page read and write
FA4000
heap
page read and write
1EE2F678000
trusted library allocation
page read and write
60CA000
trusted library allocation
page read and write
5355000
trusted library allocation
page read and write
1EE305EB000
trusted library allocation
page read and write
1EE34714000
trusted library allocation
page read and write
433E000
stack
page read and write
52BC000
trusted library allocation
page read and write
47BF000
stack
page read and write
5240000
direct allocation
page execute and read and write
1EE36AF3000
trusted library allocation
page read and write
1EE3098F000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
1EE367AC000
trusted library allocation
page read and write
1EE2ABB0000
trusted library allocation
page read and write
1EE36AFA000
trusted library allocation
page read and write
1EE3660E000
trusted library allocation
page read and write
4441000
heap
page read and write
260AA499000
heap
page read and write
5119E3E000
stack
page read and write
3E4813E000
unkown
page readonly
531000
unkown
page execute and write copy
3C7F000
stack
page read and write
17F37CB2000
trusted library allocation
page read and write
5B3D000
trusted library allocation
page read and write
6C4000
heap
page read and write
1EE36A59000
trusted library allocation
page read and write
42BF000
stack
page read and write
1EE32194000
trusted library allocation
page read and write
1037000
heap
page read and write
2ED0000
direct allocation
page read and write
5BC1000
trusted library allocation
page read and write
304F000
stack
page read and write
BDE000
stack
page read and write
1EE36D03000
trusted library allocation
page read and write
4441000
heap
page read and write
1EE305E2000
trusted library allocation
page read and write
2CC0000
direct allocation
page read and write
5EBD000
trusted library allocation
page read and write
251000
unkown
page execute and write copy
260AA3A0000
heap
page read and write
2D0000
unkown
page execute and read and write
1EE32153000
trusted library allocation
page read and write
15EE000
heap
page read and write
1EE36833000
trusted library allocation
page read and write
1091000
heap
page read and write
11F0000
heap
page read and write
1EE2EE80000
trusted library section
page read and write
5FDB000
trusted library allocation
page read and write
1EE2C013000
trusted library allocation
page read and write
67E0000
heap
page read and write
1EE1E7B0000
trusted library allocation
page read and write
1EE36612000
trusted library allocation
page read and write
77FF000
stack
page read and write
1EE30BFE000
trusted library allocation
page read and write
32DE000
stack
page read and write
4BB0000
direct allocation
page execute and read and write
4441000
heap
page read and write
1D52F000
heap
page read and write
5365000
trusted library allocation
page read and write
11A9000
heap
page read and write
478000
unkown
page execute and write copy
51AF000
stack
page read and write
911000
unkown
page execute and write copy
1EE30977000
trusted library allocation
page read and write
D36000
heap
page read and write
353F000
stack
page read and write
2B7E000
stack
page read and write
1EE2E5BE000
trusted library allocation
page read and write
4441000
heap
page read and write
A74000
heap
page read and write
1EE303C3000
trusted library allocation
page read and write
A74000
heap
page read and write
1EE31303000
trusted library allocation
page read and write
7A6000
unkown
page write copy
716000
unkown
page execute and write copy
38FF000
stack
page read and write
A74000
heap
page read and write
1EE30C37000
trusted library allocation
page read and write
1EE308E4000
trusted library allocation
page read and write
D1A000
heap
page read and write
1EE2A2E6000
trusted library allocation
page read and write
42CF000
stack
page read and write
1EE30860000
trusted library allocation
page read and write
270000
unkown
page readonly
1003000
unkown
page execute and write copy
1EE2BAC6000
trusted library allocation
page read and write
1EE30538000
trusted library allocation
page read and write
52AC000
trusted library allocation
page read and write
1EE31300000
trusted library allocation
page read and write
1EE3098A000
trusted library allocation
page read and write
1EE30BCF000
trusted library allocation
page read and write
FA4000
heap
page read and write
1EE2579D000
heap
page read and write
11B1000
heap
page read and write
52C0000
trusted library allocation
page read and write
5301000
trusted library allocation
page read and write
2CC0000
direct allocation
page read and write
4BC1000
heap
page read and write
1EE306AE000
trusted library allocation
page read and write
C5E000
stack
page read and write
1920000
trusted library allocation
page read and write
1EE30996000
trusted library allocation
page read and write
1234000
heap
page read and write
6C7FE000
unkown
page read and write
1359000
heap
page read and write
1EE2575B000
heap
page read and write
123C000
stack
page read and write
6C0000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
1EE368A8000
trusted library allocation
page read and write
1EE305E2000
trusted library allocation
page read and write
1EE36738000
trusted library allocation
page read and write
5AA4000
trusted library allocation
page read and write
391E000
stack
page read and write
4EE0000
direct allocation
page read and write
5365000
trusted library allocation
page read and write
730C000
stack
page read and write
260AA3A0000
heap
page read and write
1EE25757000
heap
page read and write
5BB9000
trusted library allocation
page read and write
561C000
trusted library allocation
page read and write
260A93F0000
heap
page read and write
1EE3027D000
trusted library allocation
page read and write
1EE36874000
trusted library allocation
page read and write
5BCA000
trusted library allocation
page read and write
260AA420000
heap
page read and write
1EE202A0000
heap
page read and write
1EE2A703000
trusted library allocation
page read and write
D2A000
heap
page read and write
1EE257A6000
heap
page read and write
4440000
heap
page read and write
1EE321C3000
trusted library allocation
page read and write
4F40000
direct allocation
page execute and read and write
1EE31400000
trusted library allocation
page read and write
1EE30B43000
trusted library allocation
page read and write
4790000
remote allocation
page read and write
48FE000
stack
page read and write
17F378B0000
heap
page read and write
27E0000
direct allocation
page read and write
646000
heap
page read and write
A74000
heap
page read and write
1EE2DA00000
trusted library allocation
page read and write
2DFE000
stack
page read and write
5FC4000
trusted library allocation
page read and write
47FE000
stack
page read and write
296EB000
heap
page read and write
4BC1000
heap
page read and write
5B8000
unkown
page execute and read and write
5EB5000
trusted library allocation
page read and write
5F7D000
trusted library allocation
page read and write
1EE3097A000
trusted library allocation
page read and write
5AFB000
trusted library allocation
page read and write
4E3000
unkown
page execute and read and write
1EE368BB000
trusted library allocation
page read and write
AF9F2BE000
unkown
page readonly
5E40000
heap
page read and write
5DB000
heap
page read and write
F59000
stack
page read and write
11AD000
heap
page read and write
BD4000
heap
page read and write
1EE33602000
trusted library allocation
page read and write
26F0000
direct allocation
page read and write
FBD000
unkown
page execute and read and write
1EE2EA00000
trusted library allocation
page read and write
1EE30BFE000
trusted library allocation
page read and write
17F37D1A000
trusted library allocation
page read and write
513D000
trusted library allocation
page read and write
1B09F000
stack
page read and write
2D37000
heap
page read and write
4BC1000
heap
page read and write
1EE2A0DF000
trusted library allocation
page read and write
550000
direct allocation
page read and write
1EE2F3BB000
trusted library allocation
page read and write
1EE2579C000
heap
page read and write
1120000
heap
page read and write
260A9510000
heap
page read and write
1EE2F18C000
trusted library allocation
page read and write
5B33000
trusted library allocation
page read and write
50BE000
stack
page read and write
4A30000
direct allocation
page execute and read and write
4BC1000
heap
page read and write
3BBF000
stack
page read and write
1EE25753000
heap
page read and write
60DD000
trusted library allocation
page read and write
260AA340000
heap
page read and write
1EE38CDF000
trusted library allocation
page read and write
45C1000
heap
page read and write
1EE25789000
heap
page read and write
1EE36961000
trusted library allocation
page read and write
2E1E000
stack
page read and write
1EE305FB000
trusted library allocation
page read and write
5585000
trusted library allocation
page read and write
1EE3686A000
trusted library allocation
page read and write
1EE32100000
trusted library allocation
page read and write
5FBE000
trusted library allocation
page read and write
3E3E000
stack
page read and write
5387000
trusted library allocation
page read and write
260A9F07000
trusted library allocation
page read and write
58F3000
trusted library allocation
page read and write
1EE305E6000
trusted library allocation
page read and write
5AAF000
trusted library allocation
page read and write
1E083BC1000
heap
page read and write
BB4000
unkown
page execute and write copy
1EE257A1000
heap
page read and write
1E083BC3000
heap
page read and write
17F37C10000
trusted library allocation
page read and write
1EE25755000
heap
page read and write
11A2000
heap
page read and write
1075000
heap
page read and write
1EE2F8B2000
trusted library allocation
page read and write
393E000
stack
page read and write
4441000
heap
page read and write
45C1000
heap
page read and write
60DE000
trusted library allocation
page read and write
17F37C81000
trusted library allocation
page read and write
1920000
trusted library allocation
page read and write
1EE2BBA0000
trusted library allocation
page read and write
1EE2EC85000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
5B50000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1EE2F803000
trusted library allocation
page read and write
BD4000
heap
page read and write
11B2000
heap
page read and write
B44000
heap
page read and write
2ED0000
direct allocation
page read and write
1EE2ECBC000
trusted library allocation
page read and write
1EE309FD000
trusted library allocation
page read and write
A74000
heap
page read and write
1EE38B0B000
trusted library allocation
page read and write
1EE2F991000
trusted library allocation
page read and write
1D52F000
heap
page read and write
1EE30AE7000
trusted library allocation
page read and write
501F000
stack
page read and write
61E000
heap
page read and write
1EE31440000
trusted library allocation
page read and write
1EE313E3000
trusted library allocation
page read and write
1EE30C4F000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
52E2000
trusted library allocation
page read and write
1EE36CFE000
trusted library allocation
page read and write
6C4000
heap
page read and write
10FE000
stack
page read and write
260AA3BD000
heap
page read and write
969000
unkown
page execute and read and write
1EE2AAAD000
trusted library allocation
page read and write
1EE2F32F000
trusted library allocation
page read and write
17F37C61000
trusted library allocation
page read and write
1EE306CF000
trusted library allocation
page read and write
1EE309F0000
trusted library allocation
page read and write
3E2E000
stack
page read and write
5FE2000
trusted library allocation
page read and write
1EE32209000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
4F10000
direct allocation
page execute and read and write
4BC2000
heap
page read and write
45B0000
direct allocation
page read and write
1EE2578B000
heap
page read and write
1454000
heap
page read and write
4FD000
unkown
page execute and read and write
1EE36A03000
trusted library allocation
page read and write
94E000
unkown
page execute and write copy
1400000
direct allocation
page read and write
1EE2E8FC000
trusted library allocation
page read and write
1EE2D9B0000
trusted library section
page readonly
1EE25753000
heap
page read and write
1EE2F3B0000
trusted library allocation
page read and write
51107D8000
stack
page read and write
FB0000
direct allocation
page read and write
1EE302F1000
trusted library allocation
page read and write
1EE30AE7000
trusted library allocation
page read and write
1EE30859000
trusted library allocation
page read and write
443E000
stack
page read and write
1EE2574A000
heap
page read and write
41FE000
stack
page read and write
1EE2EC3B000
trusted library allocation
page read and write
B0C000
unkown
page readonly
250000
unkown
page read and write
4BC1000
heap
page read and write
11B2000
heap
page read and write
1EE30AE0000
trusted library allocation
page read and write
4441000
heap
page read and write
2B49AA11000
trusted library allocation
page execute read
1EE3010A000
trusted library allocation
page read and write
5BB9000
trusted library allocation
page read and write
558E000
trusted library allocation
page read and write
1EE305C9000
trusted library allocation
page read and write
1EE25789000
heap
page read and write
4A70000
direct allocation
page execute and read and write
926000
unkown
page execute and read and write
6C4000
heap
page read and write
1EE30AE9000
trusted library allocation
page read and write
1EE36AB8000
trusted library allocation
page read and write
1EE2F703000
trusted library allocation
page read and write
1EE30BEF000
trusted library allocation
page read and write
3E4707B000
stack
page read and write
D3D000
heap
page read and write
1D54C000
heap
page read and write
1EE2C200000
trusted library allocation
page read and write
F3F000
stack
page read and write
1EE30A2E000
trusted library allocation
page read and write
1EE25744000
heap
page read and write
5433000
trusted library allocation
page read and write
1EE306A4000
trusted library allocation
page read and write
1EE36716000
trusted library allocation
page read and write
47A0000
direct allocation
page read and write
1EE2FFA8000
trusted library allocation
page read and write
45C1000
heap
page read and write
57B9000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
11A2000
heap
page read and write
7BE000
stack
page read and write
1EE2E0A2000
heap
page read and write
D32000
heap
page read and write
1EE2F331000
trusted library allocation
page read and write
4A41000
heap
page read and write
1EE36732000
trusted library allocation
page read and write
17F37C79000
trusted library allocation
page read and write
1EE30517000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1EE3174A000
trusted library allocation
page read and write
260AA3CA000
heap
page read and write
4C1000
unkown
page execute and read and write
511B1FE000
stack
page read and write
615000
heap
page read and write
1EE25753000
heap
page read and write
1EE257AA000
heap
page read and write
4441000
heap
page read and write
1EE36971000
trusted library allocation
page read and write
530000
unkown
page readonly
FA4000
heap
page read and write
1EE30A82000
trusted library allocation
page read and write
33CF000
stack
page read and write
1EE2E5AE000
trusted library allocation
page read and write
45C1000
heap
page read and write
4DA0000
direct allocation
page read and write
B5C000
unkown
page write copy
4A51000
heap
page read and write
1EE25760000
heap
page read and write
1EE305CF000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1EE25796000
heap
page read and write
1EE2EA7F000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1EE2575A000
heap
page read and write
3E470FE000
unkown
page readonly
FFD000
heap
page read and write
3991000
heap
page read and write
1EE30AA4000
trusted library allocation
page read and write
1EE32222000
trusted library allocation
page read and write
4CBF000
stack
page read and write
1EE3094E000
trusted library allocation
page read and write
1EE369F8000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
1EE308E7000
trusted library allocation
page read and write
1EE30BB7000
trusted library allocation
page read and write
B64000
unkown
page readonly
1EE368D8000
trusted library allocation
page read and write
1EE366C6000
trusted library allocation
page read and write
6C4000
heap
page read and write
1EE305E9000
trusted library allocation
page read and write
6C4000
heap
page read and write
1CE2F000
stack
page read and write
27DE000
stack
page read and write
1EE1E980000
trusted library allocation
page execute read
1EE2F73D000
trusted library allocation
page read and write
4441000
heap
page read and write
7410000
trusted library allocation
page read and write
1EE2FA1D000
trusted library allocation
page read and write
1EE2E572000
trusted library allocation
page read and write
529B000
trusted library allocation
page read and write
141E000
heap
page read and write
1EE2DD24000
trusted library allocation
page read and write
11A2000
heap
page read and write
5580000
trusted library allocation
page read and write
1072000
heap
page read and write
1180000
heap
page read and write
43C000
unkown
page execute and read and write
33FE000
stack
page read and write
1EE30AFA000
trusted library allocation
page read and write
64B000
unkown
page execute and read and write
4321000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
1EE2EC67000
trusted library allocation
page read and write
1D52F000
heap
page read and write
29685000
heap
page read and write
1EE2BAA8000
trusted library allocation
page read and write
1EE257A1000
heap
page read and write
1134000
heap
page read and write
3F4E000
stack
page read and write
5675000
trusted library allocation
page read and write
1354000
heap
page read and write
1EE32038000
trusted library allocation
page read and write
1EE25754000
heap
page read and write
1EE2EEE0000
trusted library section
page read and write
BD4000
heap
page read and write
1EE302EA000
trusted library allocation
page read and write
1EE2F8E6000
trusted library allocation
page read and write
1EE3060D000
trusted library allocation
page read and write
1EE2FE67000
trusted library allocation
page read and write
1EE2EC57000
trusted library allocation
page read and write
2CBF000
stack
page read and write
31FE000
stack
page read and write
162E000
heap
page read and write
1EE2EC5A000
trusted library allocation
page read and write
1EE30119000
trusted library allocation
page read and write
6FB000
unkown
page execute and read and write
1EE30E8A000
trusted library allocation
page read and write
1EE2F0C4000
trusted library allocation
page read and write
5D99000
trusted library allocation
page read and write
1EE2E569000
trusted library allocation
page read and write
1D540000
heap
page read and write
4DFF000
stack
page read and write
1EE2573A000
heap
page read and write
3A5E000
stack
page read and write
14BF000
stack
page read and write
1EE321C1000
trusted library allocation
page read and write
1EE36AC3000
trusted library allocation
page read and write
A74000
heap
page read and write
1EE36C79000
trusted library allocation
page read and write
1EE2E01F000
heap
page read and write
49E000
unkown
page execute and read and write
47BF000
stack
page read and write
78E000
unkown
page execute and read and write
4441000
heap
page read and write
1D52A000
heap
page read and write
5ED000
unkown
page execute and read and write
911000
unkown
page execute and write copy
1EE367DD000
trusted library allocation
page read and write
1EE25740000
heap
page read and write
511763D000
stack
page read and write
1EE2F0A4000
trusted library allocation
page read and write
45C1000
heap
page read and write
1EE2BA79000
trusted library allocation
page read and write
27E0000
direct allocation
page read and write
1EE2F23B000
trusted library allocation
page read and write
1EE36A11000
trusted library allocation
page read and write
1EE2BA80000
trusted library allocation
page read and write
1EE2DAAF000
trusted library allocation
page read and write
1EE36900000
trusted library allocation
page read and write
56D9000
trusted library allocation
page read and write
1EE25766000
heap
page read and write
529B000
trusted library allocation
page read and write
1EE2578B000
heap
page read and write
5EB6000
trusted library allocation
page read and write
3A3E000
stack
page read and write
1EE30BCC000
trusted library allocation
page read and write
45C1000
heap
page read and write
2B6E000
stack
page read and write
5AAA000
trusted library allocation
page read and write
260AA42C000
heap
page read and write
1EE309DA000
trusted library allocation
page read and write
1454000
heap
page read and write
1EE2C008000
trusted library allocation
page read and write
1EE25786000
heap
page read and write
1EE306AA000
trusted library allocation
page read and write
1EE3127F000
trusted library allocation
page read and write
5BD000
heap
page read and write
15D0000
direct allocation
page read and write
4FD000
unkown
page execute and read and write
1EE3214A000
trusted library allocation
page read and write
5AC7000
trusted library allocation
page read and write
1134000
heap
page read and write
1EE2EC7F000
trusted library allocation
page read and write
565C000
trusted library allocation
page read and write
1EE25744000
heap
page read and write
4BC1000
heap
page read and write
423E000
stack
page read and write
45C1000
heap
page read and write
1EE30BEC000
trusted library allocation
page read and write
407F000
stack
page read and write
1EE303CE000
trusted library allocation
page read and write
4D70000
heap
page read and write
567000
unkown
page execute and write copy
63F000
heap
page read and write
307E000
stack
page read and write
550000
direct allocation
page read and write
2B9000
unkown
page write copy
1EE30BCF000
trusted library allocation
page read and write
1354000
heap
page read and write
1EE2A1ED000
trusted library allocation
page read and write
1234000
heap
page read and write
11AB000
heap
page read and write
1EE368D8000
trusted library allocation
page read and write
1D524000
heap
page read and write
1EE321D8000
trusted library allocation
page read and write
4AC1000
heap
page read and write
52A8000
trusted library allocation
page read and write
4F4D000
stack
page read and write
2B7F000
stack
page read and write
1EE2E5A7000
trusted library allocation
page read and write
1EE2C003000
trusted library allocation
page read and write
5F6C000
trusted library allocation
page read and write
8B0000
unkown
page readonly
B10000
heap
page read and write
296E8000
heap
page read and write
53E000
stack
page read and write
1EE31270000
trusted library allocation
page read and write
AF9CF5D000
stack
page read and write
1EE2575B000
heap
page read and write
1EE2A76D000
trusted library allocation
page read and write
9BF000
unkown
page execute and write copy
1EE2F3B8000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
1EE1EA11000
trusted library allocation
page read and write
4BD0000
direct allocation
page execute and read and write
1EE30AE7000
trusted library allocation
page read and write
52A2000
trusted library allocation
page read and write
608F000
stack
page read and write
5ACE000
trusted library allocation
page read and write
1134000
heap
page read and write
5580000
trusted library allocation
page read and write
4A00000
trusted library allocation
page read and write
490F000
stack
page read and write
1EE2A124000
trusted library allocation
page read and write
1EE2A10E000
trusted library allocation
page read and write
1EE30CA7000
trusted library allocation
page read and write
D13000
heap
page read and write
1EE2EC5A000
trusted library allocation
page read and write
1EE36AFA000
trusted library allocation
page read and write
4441000
heap
page read and write
511178E000
stack
page read and write
2B49A9F1000
trusted library allocation
page execute read
4441000
heap
page read and write
DB10FFE000
stack
page read and write
1EE2AA61000
trusted library allocation
page read and write
D3D000
heap
page read and write
558E000
trusted library allocation
page read and write
47A0000
direct allocation
page read and write
5F4F000
stack
page read and write
754000
heap
page read and write
5B1000
heap
page read and write
4441000
heap
page read and write
4BC1000
heap
page read and write
4441000
heap
page read and write
1EE2DB1C000
trusted library allocation
page read and write
1EE257A0000
heap
page read and write
1EE367BC000
trusted library allocation
page read and write
319F000
stack
page read and write
1EE2575B000
heap
page read and write
511383F000
stack
page read and write
624000
heap
page read and write
343E000
stack
page read and write
1EE30BA5000
trusted library allocation
page read and write
1EE2574F000
heap
page read and write
1EE30839000
trusted library allocation
page read and write
1454000
heap
page read and write
BD4000
heap
page read and write
5634000
trusted library allocation
page read and write
1EE2F933000
trusted library allocation
page read and write
5170000
direct allocation
page execute and read and write
1D530000
heap
page read and write
41BE000
stack
page read and write
43C000
unkown
page execute and read and write
557000
unkown
page execute and write copy
114D000
heap
page read and write
2F90000
heap
page read and write
11AD000
heap
page read and write
1EE3049F000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
1EE309D4000
trusted library allocation
page read and write
113A000
heap
page read and write
3C7F000
stack
page read and write
1EE30AA9000
trusted library allocation
page read and write
1EE2EC2C000
trusted library allocation
page read and write
1100000
heap
page read and write
4441000
heap
page read and write
3A7E000
stack
page read and write
1454000
heap
page read and write
1CFAE000
stack
page read and write
1EE36992000
trusted library allocation
page read and write
56C7000
trusted library allocation
page read and write
576C000
trusted library allocation
page read and write
4441000
heap
page read and write
51E0000
direct allocation
page execute and read and write
141A000
heap
page read and write
1EE304DE000
trusted library allocation
page read and write
4441000
heap
page read and write
42BF000
stack
page read and write
1EE2A5D0000
trusted library section
page readonly
260AA498000
heap
page read and write
1EE301FE000
trusted library allocation
page read and write
4321000
heap
page read and write
540000
heap
page read and write
1EE322B3000
trusted library allocation
page read and write
53C7000
trusted library allocation
page read and write
1EE2E800000
trusted library allocation
page read and write
4A50000
direct allocation
page read and write
51F0000
direct allocation
page execute and read and write
1B55E000
stack
page read and write
5AD6000
trusted library allocation
page read and write
1EE2578D000
heap
page read and write
1920000
trusted library allocation
page read and write
1EE25796000
heap
page read and write
1EE2EC98000
trusted library allocation
page read and write
17F377C0000
heap
page read and write
4441000
heap
page read and write
1EE3107A000
trusted library allocation
page read and write
1D52F000
heap
page read and write
1EE3691E000
trusted library allocation
page read and write
1EE30600000
trusted library allocation
page read and write
1EE300E4000
trusted library allocation
page read and write
260AA46A000
heap
page read and write
27E0000
direct allocation
page read and write
BD4000
heap
page read and write
1EE2BB0C000
trusted library allocation
page read and write
1EE2E5A5000
trusted library allocation
page read and write
1EE3027A000
trusted library allocation
page read and write
5EB2000
trusted library allocation
page read and write
260AA3A9000
heap
page read and write
56EF000
stack
page read and write
1EE2578F000
heap
page read and write
1EE322F3000
trusted library allocation
page read and write
4DB0000
remote allocation
page read and write
1EE32007000
trusted library allocation
page read and write
1920000
trusted library allocation
page read and write
46BE000
stack
page read and write
2CC0000
direct allocation
page read and write
5355000
trusted library allocation
page read and write
A74000
heap
page read and write
1150000
direct allocation
page read and write
1EE307C9000
trusted library allocation
page read and write
2DAF000
stack
page read and write
1EE2E901000
trusted library allocation
page read and write
5EB5000
trusted library allocation
page read and write
1EE38B64000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
1EE2A1E5000
trusted library allocation
page read and write
A4C000
unkown
page execute and write copy
557000
unkown
page execute and write copy
9AB000
unkown
page execute and read and write
1EE257AA000
heap
page read and write
754000
heap
page read and write
260AA4A7000
heap
page read and write
1EE33600000
trusted library allocation
page read and write
3A4E000
stack
page read and write
56C7000
trusted library allocation
page read and write
3DFF000
stack
page read and write
5BE8000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
10C0000
heap
page read and write
1EE25754000
heap
page read and write
6C4000
heap
page read and write
1019000
heap
page read and write
5354000
trusted library allocation
page read and write
4C33000
trusted library allocation
page read and write
B44000
heap
page read and write
1EE25750000
heap
page read and write
1EE2EB03000
trusted library allocation
page read and write
1EE2AAEE000
trusted library allocation
page read and write
1EE2578B000
heap
page read and write
1EE2DD7B000
trusted library allocation
page read and write
1EE368B5000
trusted library allocation
page read and write
F50000
heap
page read and write
1EE309D3000
trusted library allocation
page read and write
5AD1000
trusted library allocation
page read and write
1EE303B3000
trusted library allocation
page read and write
2F7E000
stack
page read and write
1EE2E5A5000
trusted library allocation
page read and write
3BAE000
stack
page read and write
1EE2E5A5000
trusted library allocation
page read and write
1EE2575B000
heap
page read and write
4F00000
trusted library allocation
page read and write
1EE36944000
trusted library allocation
page read and write
4442000
heap
page read and write
1EE2A2EF000
trusted library allocation
page read and write
1EE300C7000
trusted library allocation
page read and write
1EE30A1A000
trusted library allocation
page read and write
5B3D000
trusted library allocation
page read and write
1EE309B3000
trusted library allocation
page read and write
4B8F000
stack
page read and write
1EE32119000
trusted library allocation
page read and write
3E478FE000
stack
page read and write
1EE3049F000
trusted library allocation
page read and write
3CCE000
stack
page read and write
5BB0000
trusted library allocation
page read and write
1EE30B43000
trusted library allocation
page read and write
1EE2FF87000
trusted library allocation
page read and write
4BD0000
direct allocation
page execute and read and write
11BB000
heap
page read and write
40AE000
stack
page read and write
4BD0000
direct allocation
page execute and read and write
1EE2E437000
trusted library allocation
page read and write
2FF0000
heap
page read and write
5EB5000
trusted library allocation
page read and write
1EE2DF70000
heap
page read and write
1EE317AC000
trusted library allocation
page read and write
26F0000
direct allocation
page read and write
1EE3686E000
trusted library allocation
page read and write
1EE368DC000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
11AB000
heap
page read and write
1EE32161000
trusted library allocation
page read and write
529C000
trusted library allocation
page read and write
2F6E000
stack
page read and write
1EE3695B000
trusted library allocation
page read and write
1EE367D4000
trusted library allocation
page read and write
1EE2F378000
trusted library allocation
page read and write
2E3E000
stack
page read and write
1EE2A775000
trusted library allocation
page read and write
1EE2AA9B000
trusted library allocation
page read and write
1EE2F635000
trusted library allocation
page read and write
5236000
trusted library allocation
page read and write
CD3000
heap
page read and write
1EE2578B000
heap
page read and write
5283000
trusted library allocation
page read and write
558E000
trusted library allocation
page read and write
6C4000
heap
page read and write
48FF000
stack
page read and write
4441000
heap
page read and write
F6F000
stack
page read and write
1EE36700000
trusted library allocation
page read and write
1EE2A200000
trusted library allocation
page read and write
806C000
stack
page read and write
4AC1000
heap
page read and write
5E0000
heap
page read and write
1EE313EA000
trusted library allocation
page read and write
565E000
trusted library allocation
page read and write
1B69D000
stack
page read and write
45C0000
heap
page read and write
4E00000
heap
page read and write
52D7000
trusted library allocation
page read and write
4F50000
direct allocation
page read and write
1EE3028E000
trusted library allocation
page read and write
1EE3093A000
trusted library allocation
page read and write
1EE2E523000
trusted library allocation
page read and write
1EE322B0000
trusted library allocation
page read and write
33EF000
stack
page read and write
1EE30798000
trusted library allocation
page read and write
1EE2E4CB000
trusted library allocation
page read and write
1EE3688A000
trusted library allocation
page read and write
367E000
stack
page read and write
56D000
unkown
page execute and write copy
443E000
stack
page read and write
1EE2E5E6000
trusted library allocation
page read and write
53E0000
direct allocation
page execute and read and write
1EE25746000
heap
page read and write
4C5000
unkown
page execute and read and write
1EE2F501000
trusted library allocation
page read and write
732000
unkown
page execute and read and write
11E0000
direct allocation
page read and write
1B8FC000
stack
page read and write
43E000
unkown
page execute and write copy
1EE3661A000
trusted library allocation
page read and write
4441000
heap
page read and write
1EE30BCC000
trusted library allocation
page read and write
B64000
unkown
page readonly
1EE309E0000
trusted library allocation
page read and write
1EE2DABE000
trusted library allocation
page read and write
1EE2DAA3000
trusted library allocation
page read and write
4441000
heap
page read and write
1EE3688A000
trusted library allocation
page read and write
1D52F000
heap
page read and write
5BA1000
trusted library allocation
page read and write
4BC2000
heap
page read and write
1EE36AE7000
trusted library allocation
page read and write
770000
heap
page read and write
1EE25753000
heap
page read and write
42FE000
stack
page read and write
1EE305E9000
trusted library allocation
page read and write
1EE2F000000
trusted library allocation
page read and write
5FFD000
trusted library allocation
page read and write
17F378E6000
heap
page read and write
4BC2000
heap
page read and write
E3C000
stack
page read and write
56DE000
stack
page read and write
1EE2F6AD000
trusted library allocation
page read and write
1EE2C300000
trusted library allocation
page read and write
1EE2EA8E000
trusted library allocation
page read and write
1EE36AFC000
trusted library allocation
page read and write
1EE2575F000
heap
page read and write
260AA43C000
heap
page read and write
FA4000
heap
page read and write
1EE36833000
trusted library allocation
page read and write
C99000
heap
page read and write
1EE368F3000
trusted library allocation
page read and write
17F37CB7000
trusted library allocation
page read and write
1E083CD0000
heap
page read and write
1134000
heap
page read and write
1EE31374000
trusted library allocation
page read and write
260AA440000
heap
page read and write
1080000
heap
page read and write
524E000
trusted library allocation
page read and write
4441000
heap
page read and write
1EE3686C000
trusted library allocation
page read and write
511B43A000
stack
page read and write
260AA4A7000
heap
page read and write
1EE1EA03000
trusted library allocation
page read and write
4441000
heap
page read and write
1EE2E703000
trusted library allocation
page read and write
1EE36890000
trusted library allocation
page read and write
1EE25754000
heap
page read and write
2FE0000
direct allocation
page execute and read and write
1C4E000
stack
page read and write
1EE30877000
trusted library allocation
page read and write
6C4000
heap
page read and write
1EE30E5E000
trusted library allocation
page read and write
1EE36ADB000
trusted library allocation
page read and write
1130000
heap
page read and write
1091000
heap
page read and write
1656000
heap
page read and write
1EE3683F000
trusted library allocation
page read and write
1EE25746000
heap
page read and write
5ABF000
trusted library allocation
page read and write
1EE2AAD2000
trusted library allocation
page read and write
4BC1000
heap
page read and write
A74000
heap
page read and write
1450000
heap
page read and write
5BB0000
trusted library allocation
page read and write
11A9000
heap
page read and write
67F0000
heap
page read and write
1EE305E6000
trusted library allocation
page read and write
1EE202B3000
heap
page read and write
2D0000
unkown
page execute and write copy
A74000
heap
page read and write
1EE2578F000
heap
page read and write
1EE36CE1000
trusted library allocation
page read and write
1EE25730000
heap
page read and write
5589000
trusted library allocation
page read and write
1EE322EF000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
1EE33612000
trusted library allocation
page read and write
1EE30BEF000
trusted library allocation
page read and write
A74000
heap
page read and write
56E000
heap
page read and write
5BA8000
trusted library allocation
page read and write
511A03E000
stack
page read and write
1EE2A034000
trusted library allocation
page read and write
1EE30837000
trusted library allocation
page read and write
1EE2F0B0000
trusted library allocation
page read and write
12FD000
stack
page read and write
601F000
trusted library allocation
page read and write
1EE2C10F000
trusted library allocation
page read and write
5308000
trusted library allocation
page read and write
1EE36957000
trusted library allocation
page read and write
5280000
direct allocation
page read and write
2CC0000
direct allocation
page read and write
15E0000
heap
page read and write
60AD000
trusted library allocation
page read and write
5355000
trusted library allocation
page read and write
1EE2AAE0000
trusted library allocation
page read and write
2CC0000
direct allocation
page read and write
1EE3093F000
trusted library allocation
page read and write
1EE305CB000
trusted library allocation
page read and write
250000
unkown
page read and write
B44000
heap
page read and write
56A7000
trusted library allocation
page read and write
1EE1EAD7000
trusted library allocation
page read and write
1EE25753000
heap
page read and write
9D3000
unkown
page execute and write copy
4E01000
heap
page read and write
1EE2575B000
heap
page read and write
1EE2DAA1000
trusted library allocation
page read and write
5200000
direct allocation
page execute and read and write
4A10000
direct allocation
page execute and read and write
4441000
heap
page read and write
1EE30654000
trusted library allocation
page read and write
4441000
heap
page read and write
1EE36870000
trusted library allocation
page read and write
1EE303C4000
trusted library allocation
page read and write
1EE2F8BC000
trusted library allocation
page read and write
390E000
stack
page read and write
5355000
trusted library allocation
page read and write
1EE2E903000
trusted library allocation
page read and write
1EE30AE0000
trusted library allocation
page read and write
458E000
stack
page read and write
1EE368F6000
trusted library allocation
page read and write
A20000
unkown
page execute and write copy
4A50000
direct allocation
page read and write
D19000
heap
page read and write
2EEF000
stack
page read and write
AFA000
unkown
page read and write
38FE000
stack
page read and write
1234000
heap
page read and write
5020000
direct allocation
page read and write
1EE36B05000
trusted library allocation
page read and write
1134000
heap
page read and write
5C0000
heap
page read and write
1EE30AA4000
trusted library allocation
page read and write
1EE320E2000
trusted library allocation
page read and write
1EE314ED000
trusted library allocation
page read and write
5AC3000
trusted library allocation
page read and write
A74000
heap
page read and write
1EE2E9D7000
trusted library allocation
page read and write
5B4A000
trusted library allocation
page read and write
1EE2F05F000
trusted library allocation
page read and write
5EBC000
trusted library allocation
page read and write
1EE2575B000
heap
page read and write
1EE30100000
trusted library allocation
page read and write
A74000
heap
page read and write
1EE2F362000
trusted library allocation
page read and write
1EE30CDF000
trusted library allocation
page read and write
18FF000
stack
page read and write
A74000
heap
page read and write
1EE2E43E000
trusted library allocation
page read and write
260A9700000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
54FB000
trusted library allocation
page read and write
646000
heap
page read and write
1B0000
heap
page read and write
1EE36AD6000
trusted library allocation
page read and write
511A27E000
stack
page read and write
1D543000
heap
page read and write
1EE2BAD5000
trusted library allocation
page read and write
4F80000
direct allocation
page execute and read and write
1EE2F989000
trusted library allocation
page read and write
BD4000
heap
page read and write
4A51000
heap
page read and write
BD4000
heap
page read and write
44BE000
stack
page read and write
1EE31773000
trusted library allocation
page read and write
1EE2DDEC000
trusted library allocation
page read and write
1EE305CE000
trusted library allocation
page read and write
1EE2FF0D000
trusted library allocation
page read and write
1316000
heap
page read and write
5BC1000
trusted library allocation
page read and write
5355000
trusted library allocation
page read and write
DCC000
stack
page read and write
5EBB000
trusted library allocation
page read and write
1920000
trusted library allocation
page read and write
1EE2EC69000
trusted library allocation
page read and write
1920000
trusted library allocation
page read and write
4441000
heap
page read and write
17EE000
stack
page read and write
3F3F000
stack
page read and write
1EE305C8000
trusted library allocation
page read and write
5AA4000
trusted library allocation
page read and write
2DEE000
stack
page read and write
11A6000
heap
page read and write
1EE2BAAB000
trusted library allocation
page read and write
4321000
heap
page read and write
17F37D21000
trusted library allocation
page read and write
1EE3681D000
trusted library allocation
page read and write
1EE2EC6A000
trusted library allocation
page read and write
19BB45504000
trusted library allocation
page read and write
56FC000
trusted library allocation
page read and write
1363000
heap
page read and write
1EE2F39B000
trusted library allocation
page read and write
4321000
heap
page read and write
1EE30BFE000
trusted library allocation
page read and write
1EE3051C000
trusted library allocation
page read and write
5230000
direct allocation
page execute and read and write
1EE303D0000
trusted library allocation
page read and write
3F0F000
stack
page read and write
602000
heap
page read and write
1EE2575B000
heap
page read and write
592000
unkown
page execute and read and write
1EE25744000
heap
page read and write
511127E000
stack
page read and write
1EE2F924000
trusted library allocation
page read and write
17F4000
heap
page read and write
D14000
heap
page read and write
1EE30400000
trusted library allocation
page read and write
506E000
stack
page read and write
260AA4A7000
heap
page read and write
17F37C23000
trusted library allocation
page read and write
1D54C000
heap
page read and write
1EE3225A000
trusted library allocation
page read and write
1EE25757000
heap
page read and write
4B7F000
stack
page read and write
1EE30903000
trusted library allocation
page read and write
1EE36960000
trusted library allocation
page read and write
1D10000
heap
page read and write
52F000
unkown
page execute and read and write
1EE305C6000
trusted library allocation
page read and write
1EE2EC47000
trusted library allocation
page read and write
45C1000
heap
page read and write
1EE25750000
heap
page read and write
1EE2E64C000
trusted library allocation
page read and write
1EE38CD0000
trusted library allocation
page read and write
1EE30617000
trusted library allocation
page read and write
1EE2AAF6000
trusted library allocation
page read and write
456F000
stack
page read and write
260A9D11000
heap
page read and write
1EE30700000
trusted library allocation
page read and write
36BE000
stack
page read and write
29640000
heap
page read and write
529B000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
1EE3669B000
trusted library allocation
page read and write
1EE30956000
trusted library allocation
page read and write
635000
heap
page read and write
5354000
trusted library allocation
page read and write
1D52B000
heap
page read and write
1EE2EC4B000
trusted library allocation
page read and write
1EE36876000
trusted library allocation
page read and write
5583000
trusted library allocation
page read and write
52C5000
trusted library allocation
page read and write
1EE302F5000
trusted library allocation
page read and write
15C0000
heap
page read and write
1EE302E2000
trusted library allocation
page read and write
1EE2575B000
heap
page read and write
D42000
unkown
page execute and read and write
1EE30435000
trusted library allocation
page read and write
1EE3050E000
trusted library allocation
page read and write
3F6D000
stack
page read and write
550000
direct allocation
page read and write
67B2000
trusted library allocation
page read and write
17F37C0D000
trusted library allocation
page read and write
419F000
stack
page read and write
59B000
unkown
page execute and read and write
5B41000
trusted library allocation
page read and write
1EE30AA0000
trusted library allocation
page read and write
1EE2E334000
trusted library allocation
page read and write
1EE30A9B000
trusted library allocation
page read and write
260AA498000
heap
page read and write
529B000
trusted library allocation
page read and write
1EE304E8000
trusted library allocation
page read and write
550000
direct allocation
page read and write
1EE257B4000
heap
page read and write
4890000
heap
page read and write
1EE2EFA1000
trusted library allocation
page read and write
1400000
direct allocation
page read and write
4F3C000
stack
page read and write
5118B4F000
stack
page read and write
1EE2575B000
heap
page read and write
1EE2030E000
heap
page read and write
53E0000
direct allocation
page execute and read and write
1EE2E337000
trusted library allocation
page read and write
5EB4000
trusted library allocation
page read and write
52DC000
trusted library allocation
page read and write
CD5000
heap
page read and write
9D6000
unkown
page execute and read and write
457F000
stack
page read and write
1EE32180000
trusted library allocation
page read and write
2FDF56B04000
trusted library allocation
page read and write
1EE30AFA000
trusted library allocation
page read and write
2ED0000
direct allocation
page read and write
530000
unkown
page read and write
260A9CB5000
unkown
page execute read
CD3000
heap
page read and write
4DA0000
direct allocation
page read and write
6C4000
heap
page read and write
1EE36AC8000
trusted library allocation
page read and write
40FE000
stack
page read and write
5BDF000
trusted library allocation
page read and write
560000
heap
page read and write
BD4000
heap
page read and write
32FE000
stack
page read and write
11B7000
heap
page read and write
52A2000
trusted library allocation
page read and write
2BB000
unkown
page execute and read and write
1EE2575A000
heap
page read and write
1EE30A11000
trusted library allocation
page read and write
5355000
trusted library allocation
page read and write
4A41000
heap
page read and write
4441000
heap
page read and write
2DBB000
stack
page read and write
5BB9000
trusted library allocation
page read and write
F5D000
stack
page read and write
5AF5000
trusted library allocation
page read and write
1EE2A084000
trusted library allocation
page read and write
5638000
trusted library allocation
page read and write
1EE2E5DE000
trusted library allocation
page read and write
5B3D000
trusted library allocation
page read and write
1EE3696F000
trusted library allocation
page read and write
1EE30AE4000
trusted library allocation
page read and write
1EE2575A000
heap
page read and write
1EE2FC60000
trusted library section
page read and write
52D9000
trusted library allocation
page read and write
4A10000
direct allocation
page execute and read and write
5AA5000
trusted library allocation
page read and write
236DB000
heap
page read and write
1166000
heap
page read and write
1EE30875000
trusted library allocation
page read and write
1EE303F7000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
1EE308F0000
trusted library allocation
page read and write
1EE2E05D000
heap
page read and write
1EE30A3E000
trusted library allocation
page read and write
145A000
heap
page read and write
1EE2E47F000
trusted library allocation
page read and write
1EE2F3AE000
trusted library allocation
page read and write
5020000
direct allocation
page read and write
1EE368F6000
trusted library allocation
page read and write
1EE25742000
heap
page read and write
26F0000
direct allocation
page read and write
D13000
heap
page read and write
1EE3088A000
trusted library allocation
page read and write
1EE2E475000
trusted library allocation
page read and write
1EE2E453000
trusted library allocation
page read and write
4BA0000
heap
page read and write
1EE30303000
trusted library allocation
page read and write
4A60000
direct allocation
page execute and read and write
A36000
unkown
page execute and write copy
1EE2EC98000
trusted library allocation
page read and write
1EE2E8F6000
trusted library allocation
page read and write
96D000
unkown
page read and write
595D000
stack
page read and write
1EE2575F000
heap
page read and write
1EE3115F000
trusted library allocation
page read and write
45C1000
heap
page read and write
B0C000
unkown
page execute and write copy
1EE308C1000
trusted library allocation
page read and write
1EE2ECF6000
trusted library allocation
page read and write
52C2000
trusted library allocation
page read and write
4C22000
trusted library allocation
page read and write
FA4000
heap
page read and write
1920000
trusted library allocation
page read and write
4DC0000
direct allocation
page read and write
511B837000
stack
page read and write
1EE2575B000
heap
page read and write
1EE2C60B000
trusted library allocation
page read and write
1EE30AFA000
trusted library allocation
page read and write
5F70000
trusted library allocation
page read and write
364F000
stack
page read and write
5BED000
trusted library allocation
page read and write
260AA43C000
heap
page read and write
3ABE000
stack
page read and write
1EE3118A000
trusted library allocation
page read and write
4441000
heap
page read and write
1400000
direct allocation
page read and write
9C1000
unkown
page execute and write copy
1EE38B03000
trusted library allocation
page read and write
1EE30421000
trusted library allocation
page read and write
1EE2E478000
trusted library allocation
page read and write
260AA428000
heap
page read and write
1EE30C1F000
trusted library allocation
page read and write
58FC000
trusted library allocation
page read and write
7DBC000
stack
page read and write
1EE3106F000
trusted library allocation
page read and write
564000
unkown
page execute and read and write
1EE302A0000
trusted library allocation
page read and write
52C4000
trusted library allocation
page read and write
4BC1000
heap
page read and write
52F0000
trusted library allocation
page read and write
5BA1000
trusted library allocation
page read and write
1E083BCA000
heap
page read and write
11E0000
direct allocation
page read and write
5AB4000
trusted library allocation
page read and write
5682000
trusted library allocation
page read and write
1EE2A676000
trusted library allocation
page read and write
33FF000
stack
page read and write
45C1000
heap
page read and write
1EE2576E000
heap
page read and write
1EE30800000
trusted library allocation
page read and write
3E3E000
stack
page read and write
4F60000
trusted library allocation
page read and write
1134000
heap
page read and write
1234000
heap
page read and write
52D3000
trusted library allocation
page read and write
5B34000
trusted library allocation
page read and write
51A0000
direct allocation
page execute and read and write
4931000
heap
page read and write
1EE2EA6B000
trusted library allocation
page read and write
1EE2C00D000
trusted library allocation
page read and write
430E000
stack
page read and write
1EE3097C000
trusted library allocation
page read and write
1EE30AE9000
trusted library allocation
page read and write
1EE36700000
trusted library allocation
page read and write
1EE3096D000
trusted library allocation
page read and write
52D2000
trusted library allocation
page read and write
893C1FC000
stack
page read and write
8DB000
unkown
page write copy
521E000
stack
page read and write
6F8F2000
unkown
page readonly
32FE000
stack
page read and write
146E000
stack
page read and write
67E1000
heap
page read and write
B5C000
unkown
page write copy
1EE2EC51000
trusted library allocation
page read and write
BD4000
heap
page read and write
459E000
stack
page read and write
D1B000
heap
page read and write
1EE30993000
trusted library allocation
page read and write
1EE309D1000
trusted library allocation
page read and write
5BD9000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
1400000
direct allocation
page read and write
1EE2579C000
heap
page read and write
1EE2FF18000
trusted library allocation
page read and write
7DFE000
stack
page read and write
5118B3E000
stack
page read and write
1EE2BB3A000
trusted library allocation
page read and write
1EE305BE000
trusted library allocation
page read and write
46CE000
stack
page read and write
1EE304C0000
trusted library allocation
page read and write
6C4000
heap
page read and write
1EE322B6000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
56EC000
trusted library allocation
page read and write
1EE30993000
trusted library allocation
page read and write
9DE000
unkown
page execute and write copy
1EE3683F000
trusted library allocation
page read and write
50D0000
direct allocation
page execute and read and write
2F78B000
heap
page read and write
4AB1000
direct allocation
page read and write
FB0000
direct allocation
page read and write
1EE2E525000
trusted library allocation
page read and write
1234000
heap
page read and write
F74D977B000
trusted library allocation
page read and write
1EE25753000
heap
page read and write
45C1000
heap
page read and write
1EE36A2F000
trusted library allocation
page read and write
4A9E000
stack
page read and write
1EE36C9C000
trusted library allocation
page read and write
1EE2FF76000
trusted library allocation
page read and write
33FF000
stack
page read and write
5BB0000
trusted library allocation
page read and write
1117000
heap
page read and write
1150000
direct allocation
page read and write
1EE2E892000
trusted library allocation
page read and write
2B49A951000
trusted library allocation
page execute read
1134000
heap
page read and write
2A3E000
stack
page read and write
1EE36746000
trusted library allocation
page read and write
1EE3088C000
trusted library allocation
page read and write
11B1000
heap
page read and write
1EE2A2F6000
trusted library allocation
page read and write
2ED0000
direct allocation
page read and write
1EE2B960000
heap
page read and write
317E000
stack
page read and write
1EE3044F000
trusted library allocation
page read and write
1EE301A3000
trusted library allocation
page read and write
A07000
unkown
page execute and read and write
45C1000
heap
page read and write
5EB6000
trusted library allocation
page read and write
278C000
stack
page read and write
1EE25756000
heap
page read and write
1EE30AD1000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1400000
direct allocation
page read and write
1EE30A13000
trusted library allocation
page read and write
1EE25752000
heap
page read and write
45B0000
direct allocation
page read and write
3991000
heap
page read and write
1EE36803000
trusted library allocation
page read and write
1EE2A77D000
trusted library allocation
page read and write
1EE30AB5000
trusted library allocation
page read and write
5647000
trusted library allocation
page read and write
5210000
direct allocation
page execute and read and write
15D0000
direct allocation
page read and write
1D546000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
52A7000
trusted library allocation
page read and write
23AB08F0000
heap
page read and write
1EE25754000
heap
page read and write
5656000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
1B24E000
stack
page read and write
128E000
stack
page read and write
1EE2BA5F000
trusted library allocation
page read and write
1193000
heap
page read and write
1134000
heap
page read and write
51F0000
direct allocation
page execute and read and write
BD4000
heap
page read and write
5588000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
3DEF000
stack
page read and write
45C1000
heap
page read and write
4BC1000
heap
page read and write
11A6000
heap
page read and write
8B0000
unkown
page readonly
5B45000
trusted library allocation
page read and write
1EE30A1E000
trusted library allocation
page read and write
1EE1E6A0000
heap
page read and write
1EE2E49C000
trusted library allocation
page read and write
1EE38832000
trusted library allocation
page read and write
45C1000
heap
page read and write
4F40000
direct allocation
page execute and read and write
5365000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
4441000
heap
page read and write
A74000
heap
page read and write
1EE3133B000
trusted library allocation
page read and write
A74000
heap
page read and write
1EE3116B000
trusted library allocation
page read and write
1380000
heap
page read and write
4AC1000
heap
page read and write
1D54C000
heap
page read and write
931000
unkown
page execute and read and write
4C20000
direct allocation
page execute and read and write
260A9CC0000
unkown
page execute read
1D54C000
heap
page read and write
581E000
stack
page read and write
4930000
heap
page read and write
BD4000
heap
page read and write
569D000
stack
page read and write
1EE2EC5A000
trusted library allocation
page read and write
353E000
stack
page read and write
1EE36C51000
trusted library allocation
page read and write
1EE368DC000
trusted library allocation
page read and write
1EE2FF39000
trusted library allocation
page read and write
573000
unkown
page execute and write copy
A74000
heap
page read and write
1EE2F900000
trusted library allocation
page read and write
1EE36CCD000
trusted library allocation
page read and write
2B4E0B404000
trusted library allocation
page read and write
1EE31709000
trusted library allocation
page read and write
53C3000
trusted library allocation
page read and write
260A97F5000
trusted library allocation
page read and write
5FD8000
trusted library allocation
page read and write
5B34000
trusted library allocation
page read and write
1EE36A8C000
trusted library allocation
page read and write
BD4000
heap
page read and write
4AC1000
heap
page read and write
1EE2ECBC000
trusted library allocation
page read and write
1EE2BAA8000
trusted library allocation
page read and write
2F6E0000
trusted library allocation
page read and write
716000
unkown
page execute and write copy
1EE2575B000
heap
page read and write
4441000
heap
page read and write
4DB0000
heap
page read and write
1EE2EC60000
trusted library allocation
page read and write
32AF000
stack
page read and write
1134000
heap
page read and write
4E01000
heap
page read and write
1EE38B00000
trusted library allocation
page read and write
1123000
heap
page read and write
5E1000
unkown
page execute and read and write
DB0FFFE000
stack
page read and write
740D000
stack
page read and write
36AE000
stack
page read and write
B44000
heap
page read and write
1EE2579C000
heap
page read and write
1EE31287000
trusted library allocation
page read and write
1EE2FA03000
trusted library allocation
page read and write
5611000
trusted library allocation
page read and write
1EE30BFE000
trusted library allocation
page read and write
1EE309BF000
trusted library allocation
page read and write
5355000
trusted library allocation
page read and write
1EE2F3C3000
trusted library allocation
page read and write
5119FFB000
stack
page read and write
4BC1000
heap
page read and write
4F40000
direct allocation
page execute and read and write
11A6000
unkown
page execute and write copy
260AA3F9000
heap
page read and write
1920000
trusted library allocation
page read and write
340E000
stack
page read and write
1EE36AFE000
trusted library allocation
page read and write
45C1000
heap
page read and write
1EE30BDD000
trusted library allocation
page read and write
1234000
heap
page read and write
1EE2573B000
heap
page read and write
624000
heap
page read and write
51D0000
direct allocation
page execute and read and write
4BD0000
direct allocation
page execute and read and write
1D530000
heap
page read and write
786000
unkown
page write copy
4EF0000
trusted library allocation
page read and write
4BBE000
stack
page read and write
4A7E000
stack
page read and write
F74D970C000
trusted library allocation
page read and write
5E1E000
stack
page read and write
1EE36CD4000
trusted library allocation
page read and write
41DD000
stack
page read and write
4441000
heap
page read and write
23AB0D00000
trusted library allocation
page read and write
4E01000
heap
page read and write
1EE30483000
trusted library allocation
page read and write
1EE2F2DB000
trusted library allocation
page read and write
5E2000
heap
page read and write
1D526000
heap
page read and write
5587000
trusted library allocation
page read and write
1E083BCA000
heap
page read and write
260A9786000
trusted library allocation
page read and write
27F7000
heap
page read and write
1EE36878000
trusted library allocation
page read and write
1EE36815000
trusted library allocation
page read and write
8B0000
unkown
page readonly
1454000
heap
page read and write
1EE2BB7C000
trusted library allocation
page read and write
1EE2E628000
trusted library allocation
page read and write
1EE25750000
heap
page read and write
1EE2C708000
trusted library allocation
page read and write
1EE30BCF000
trusted library allocation
page read and write
27E0000
direct allocation
page read and write
1F02D970000
trusted library section
page readonly
511AAFE000
stack
page read and write
4DB1000
heap
page read and write
2A3F000
stack
page read and write
1EE305A6000
trusted library allocation
page read and write
52D000
unkown
page execute and write copy
CDF000
stack
page read and write
45D000
unkown
page execute and read and write
1EE307AB000
trusted library allocation
page read and write
115F000
heap
page read and write
1EE2F78F000
trusted library allocation
page read and write
5E8D000
trusted library allocation
page read and write
45C1000
heap
page read and write
4BC1000
heap
page read and write
1EE2F400000
trusted library allocation
page read and write
260A9767000
trusted library allocation
page read and write
1EE257AA000
heap
page read and write
1EE30B6B000
trusted library allocation
page read and write
1EE2DAE0000
trusted library allocation
page read and write
1EE32103000
trusted library allocation
page read and write
B0C000
unkown
page readonly
1EE2F1A9000
trusted library allocation
page read and write
1400000
direct allocation
page read and write
1EE2A090000
trusted library allocation
page read and write
1234000
heap
page read and write
1EE30AE4000
trusted library allocation
page read and write
1EE36909000
trusted library allocation
page read and write
23AB0C90000
heap
page read and write
5F79000
trusted library allocation
page read and write
1EE30AF8000
trusted library allocation
page read and write
1EE1EA6B000
trusted library allocation
page read and write
1134000
heap
page read and write
1EE2EA99000
trusted library allocation
page read and write
441F000
stack
page read and write
1166000
heap
page read and write
5286000
trusted library allocation
page read and write
4BC1000
heap
page read and write
17F37D17000
trusted library allocation
page read and write
52F000
unkown
page execute and read and write
132F000
stack
page read and write
1D53E000
heap
page read and write
5294000
trusted library allocation
page read and write
2CAB000
stack
page read and write
1327000
heap
page read and write
1EE25794000
heap
page read and write
1D52F000
heap
page read and write
5344000
trusted library allocation
page read and write
1EE2ED00000
trusted library section
page readonly
61E00000
direct allocation
page execute and read and write
529B000
trusted library allocation
page read and write
BD4000
heap
page read and write
1EE3683D000
trusted library allocation
page read and write
1EE309FC000
trusted library allocation
page read and write
25786F317000
trusted library allocation
page read and write
5BD9000
trusted library allocation
page read and write
1EE306FD000
trusted library allocation
page read and write
41FF000
stack
page read and write
5116E39000
stack
page read and write
1D524000
heap
page read and write
1EE25787000
heap
page read and write
1EE303E3000
trusted library allocation
page read and write
1EE2E5C9000
trusted library allocation
page read and write
1EE30BE0000
trusted library allocation
page read and write
D16000
heap
page read and write
D0F000
heap
page read and write
1EE25760000
heap
page read and write
1D530000
heap
page read and write
1EE30419000
trusted library allocation
page read and write
1EE3103E000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1EE2DAA9000
trusted library allocation
page read and write
5410000
direct allocation
page execute and read and write
51B0000
direct allocation
page execute and read and write
1EE308E4000
trusted library allocation
page read and write
27F0000
heap
page read and write
5AFE000
trusted library allocation
page read and write
5582000
trusted library allocation
page read and write
1EE30937000
trusted library allocation
page read and write
3B7F000
stack
page read and write
4F40000
direct allocation
page execute and read and write
7420000
trusted library allocation
page read and write
5648000
trusted library allocation
page read and write
4BD0000
direct allocation
page execute and read and write
1EE3687A000
trusted library allocation
page read and write
4BC1000
heap
page read and write
5294000
trusted library allocation
page read and write
5BA3000
trusted library allocation
page read and write
CAC000
heap
page read and write
1EE38B36000
trusted library allocation
page read and write
1EE25787000
heap
page read and write
B44000
heap
page read and write
42FF000
stack
page read and write
41BF000
stack
page read and write
1EE2F799000
trusted library allocation
page read and write
1EE2AB03000
trusted library allocation
page read and write
23AB0A49000
heap
page read and write
1EE317E4000
trusted library allocation
page read and write
1EE30A3B000
trusted library allocation
page read and write
1EE2AAD0000
trusted library allocation
page read and write
5C01000
trusted library allocation
page read and write
1EE2F3AA000
trusted library allocation
page read and write
1EE2DAEE000
trusted library allocation
page read and write
5355000
trusted library allocation
page read and write
1EE25749000
heap
page read and write
1EE30C1F000
trusted library allocation
page read and write
1EE2A203000
trusted library allocation
page read and write
1E083BB7000
heap
page read and write
1EE2E489000
trusted library allocation
page read and write
31BE000
stack
page read and write
4441000
heap
page read and write
4BC1000
heap
page read and write
4FC000
unkown
page execute and write copy
1EE313F3000
trusted library allocation
page read and write
1E083BAD000
heap
page read and write
4BC1000
heap
page read and write
4A30000
direct allocation
page read and write
1EE31325000
trusted library allocation
page read and write
1EE2AAB4000
trusted library allocation
page read and write
562B000
trusted library allocation
page read and write
1040000
heap
page read and write
260A9778000
trusted library allocation
page read and write
1EE2BB65000
trusted library allocation
page read and write
117C000
heap
page read and write
1EE2DA52000
trusted library allocation
page read and write
1234000
heap
page read and write
4BC1000
heap
page read and write
142E000
stack
page read and write
1E083BCA000
heap
page read and write
3E44D9E000
unkown
page readonly
2F3F000
stack
page read and write
B60000
unkown
page write copy
5EBA000
trusted library allocation
page read and write
466000
unkown
page execute and write copy
1EE309C8000
trusted library allocation
page read and write
1EE25750000
heap
page read and write
1EE25753000
heap
page read and write
1EE30AA9000
trusted library allocation
page read and write
5EB4000
trusted library allocation
page read and write
1EE2DD29000
trusted library allocation
page read and write
5ABC000
trusted library allocation
page read and write
5355000
trusted library allocation
page read and write
1D520000
heap
page read and write
1EE2DDBE000
trusted library allocation
page read and write
1EE2BB2B000
trusted library allocation
page read and write
3F3F000
stack
page read and write
4BD0000
direct allocation
page execute and read and write
26F0000
direct allocation
page read and write
5355000
trusted library allocation
page read and write
52D3000
trusted library allocation
page read and write
1EE2DD99000
trusted library allocation
page read and write
1EE2D97D000
unclassified section
page read and write
1B26F000
stack
page read and write
11BE000
heap
page read and write
1EE31274000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
4931000
heap
page read and write
11A9000
heap
page read and write
530000
unkown
page readonly
5285000
trusted library allocation
page read and write
1EE304C3000
trusted library allocation
page read and write
56A1000
trusted library allocation
page read and write
1EE2DDE8000
trusted library allocation
page read and write
A90000
unkown
page readonly
5116A2E000
stack
page read and write
1EE30A00000
trusted library allocation
page read and write
1EE2579C000
heap
page read and write
A90000
unkown
page readonly
1EE2F352000
trusted library allocation
page read and write
1EE30B9C000
trusted library allocation
page read and write
2D9C000
stack
page read and write
1EE368C9000
trusted library allocation
page read and write
CAC000
heap
page read and write
260AA47B000
heap
page read and write
1EE2DAF4000
trusted library allocation
page read and write
1EE30A97000
trusted library allocation
page read and write
42FF000
stack
page read and write
1EE309DA000
trusted library allocation
page read and write
50B0000
direct allocation
page execute and read and write
1EE34700000
trusted library allocation
page read and write
DB11FFE000
stack
page read and write
5583000
trusted library allocation
page read and write
511148E000
stack
page read and write
17F37A23000
heap
page read and write
1EE3221B000
trusted library allocation
page read and write
454F000
stack
page read and write
1EE2F0E1000
trusted library allocation
page read and write
D27000
heap
page read and write
4E01000
heap
page read and write
1EE2575A000
heap
page read and write
271000
unkown
page execute and read and write
1EE303DB000
trusted library allocation
page read and write
1085000
heap
page read and write
1EE2EC00000
trusted library allocation
page read and write
1EE25799000
heap
page read and write
4A10000
direct allocation
page execute and read and write
1EE3093F000
trusted library allocation
page read and write
5EB8000
trusted library allocation
page read and write
45C1000
heap
page read and write
1EE2F8C7000
trusted library allocation
page read and write
1EE2EA7F000
trusted library allocation
page read and write
1EE2E569000
trusted library allocation
page read and write
1EE30283000
trusted library allocation
page read and write
15D0000
direct allocation
page read and write
1EE305E9000
trusted library allocation
page read and write
260AA431000
heap
page read and write
17F37982000
unclassified section
page read and write
1EE36948000
trusted library allocation
page read and write
42FE000
stack
page read and write
FA4000
heap
page read and write
1EE2DB41000
trusted library allocation
page read and write
CE0000
unkown
page readonly
1EE2F9F9000
trusted library allocation
page read and write
1EE2DDEA000
trusted library allocation
page read and write
4441000
heap
page read and write
1EE36CC1000
trusted library allocation
page read and write
2CC0000
direct allocation
page read and write
5B3D000
trusted library allocation
page read and write
1EE2DD93000
trusted library allocation
page read and write
1EE3686E000
trusted library allocation
page read and write
8CE000
unkown
page readonly
1EE30851000
trusted library allocation
page read and write
1EE2EC81000
trusted library allocation
page read and write
5BB6000
trusted library allocation
page read and write
1EE25739000
heap
page read and write
1EE32284000
trusted library allocation
page read and write
1EE30C0B000
trusted library allocation
page read and write
4420000
trusted library allocation
page read and write
58F2000
trusted library allocation
page read and write
45C1000
heap
page read and write
FB0000
direct allocation
page read and write
1EE1E790000
heap
page read and write
4DA0000
direct allocation
page read and write
14C0000
heap
page read and write
1EE2E46D000
trusted library allocation
page read and write
529A000
trusted library allocation
page read and write
6060000
trusted library allocation
page read and write
5ACC000
trusted library allocation
page read and write
53A000
unkown
page execute and read and write
1EE2E722000
trusted library allocation
page read and write
260AA38D000
heap
page read and write
1EE36CFE000
trusted library allocation
page read and write
4441000
heap
page read and write
1EE3097F000
trusted library allocation
page read and write
1130000
heap
page read and write
F7E000
stack
page read and write
58A000
unkown
page execute and read and write
1E083F07000
trusted library allocation
page read and write
BD4000
heap
page read and write
1EE368F8000
trusted library allocation
page read and write
303E000
stack
page read and write
47CF000
stack
page read and write
1EE2F3A6000
trusted library allocation
page read and write
11B2000
heap
page read and write
1081000
heap
page read and write
1EE305FC000
trusted library allocation
page read and write
1EE25796000
heap
page read and write
5BCF000
trusted library allocation
page read and write
1EE30AA4000
trusted library allocation
page read and write
1EE302F5000
trusted library allocation
page read and write
1EE2E865000
trusted library allocation
page read and write
450000
unkown
page execute and read and write
1450000
heap
page read and write
4441000
heap
page read and write
1B1EC000
stack
page read and write
5589000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
64E000
unkown
page execute and read and write
1EE30AA9000
trusted library allocation
page read and write
1EE2A726000
trusted library allocation
page read and write
149E000
stack
page read and write
A3B000
unkown
page execute and write copy
1EE300ED000
trusted library allocation
page read and write
1EE2EC4E000
trusted library allocation
page read and write
113A000
heap
page read and write
6C4000
heap
page read and write
1EE310C2000
trusted library allocation
page read and write
1EE368A8000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1EE32000000
trusted library allocation
page read and write
1EE25744000
heap
page read and write
1D54C000
heap
page read and write
1EE2DD00000
trusted library allocation
page read and write
4441000
heap
page read and write
1351000
heap
page read and write
1EE2DD70000
trusted library allocation
page read and write
1EE30958000
trusted library allocation
page read and write
1EE3085D000
trusted library allocation
page read and write
5624000
trusted library allocation
page read and write
4C70000
direct allocation
page execute and read and write
1EE2DD3C000
trusted library allocation
page read and write
1EE30A9B000
trusted library allocation
page read and write
1EE30A1A000
trusted library allocation
page read and write
1EE3098A000
trusted library allocation
page read and write
1EE2FFAF000
trusted library allocation
page read and write
1EE2E4CB000
trusted library allocation
page read and write
1EE30AE7000
trusted library allocation
page read and write
558D000
stack
page read and write
4EB000
unkown
page execute and read and write
519000
unkown
page execute and write copy
519000
unkown
page execute and write copy
4921000
direct allocation
page read and write
2B9000
unkown
page write copy
5114A31000
unkown
page read and write
6C621000
unkown
page execute read
452000
unkown
page execute and read and write
5DAE000
trusted library allocation
page read and write
1EE36870000
trusted library allocation
page read and write
5E7D000
trusted library allocation
page read and write
6234000
trusted library allocation
page read and write
494E000
stack
page read and write
75BE000
stack
page read and write
11E0000
direct allocation
page read and write
41FD000
stack
page read and write
511133A000
stack
page read and write
1EE1EAEC000
trusted library allocation
page read and write
1EE2575B000
heap
page read and write
377F000
stack
page read and write
5EB4000
trusted library allocation
page read and write
351F000
stack
page read and write
457E000
stack
page read and write
4BC1000
heap
page read and write
1EE305E2000
trusted library allocation
page read and write
E00000
heap
page read and write
1D522000
heap
page read and write
5AF7000
trusted library allocation
page read and write
AF9CEDB000
stack
page read and write
B2C000
unkown
page readonly
260A97EB000
trusted library allocation
page read and write
1EE36968000
trusted library allocation
page read and write
3CFE000
stack
page read and write
260AA3CA000
heap
page read and write
4920000
direct allocation
page execute and read and write
1037000
heap
page read and write
528F000
trusted library allocation
page read and write
4AC1000
heap
page read and write
2CDE000
stack
page read and write
1EE2F3B0000
trusted library allocation
page read and write
4441000
heap
page read and write
1D53D000
heap
page read and write
1EE2EB00000
trusted library allocation
page read and write
EF5000
stack
page read and write
1EE2EC98000
trusted library allocation
page read and write
5AA6000
trusted library allocation
page read and write
45C1000
heap
page read and write
6B0000
direct allocation
page read and write
26F0000
direct allocation
page read and write
1EE368CF000
trusted library allocation
page read and write
5114E33000
unkown
page read and write
1EE36A9D000
trusted library allocation
page read and write
4E4000
unkown
page execute and write copy
17F37C12000
trusted library allocation
page read and write
5AC8000
trusted library allocation
page read and write
1EE25754000
heap
page read and write
4931000
heap
page read and write
37EE000
stack
page read and write
1EE2DA03000
trusted library allocation
page read and write
5FA2000
trusted library allocation
page read and write
260A9765000
trusted library allocation
page read and write
1EE2E484000
trusted library allocation
page read and write
1EE2EF18000
trusted library allocation
page read and write
1EE2E316000
trusted library allocation
page read and write
1EE300CD000
trusted library allocation
page read and write
1177000
heap
page read and write
3B3F000
stack
page read and write
5C4E000
trusted library allocation
page read and write
1EE3097F000
trusted library allocation
page read and write
B44000
heap
page read and write
1EE30C00000
trusted library allocation
page read and write
1EE2575B000
heap
page read and write
5648000
trusted library allocation
page read and write
546B000
trusted library allocation
page read and write
1EE3121E000
trusted library allocation
page read and write
317F000
stack
page read and write
3B7F000
stack
page read and write
52A8000
trusted library allocation
page read and write
4AC1000
heap
page read and write
1EE305F2000
trusted library allocation
page read and write
567F000
trusted library allocation
page read and write
1EE3095B000
trusted library allocation
page read and write
1EE31100000
trusted library allocation
page read and write
1EE2A21D000
trusted library allocation
page read and write
564D000
trusted library allocation
page read and write
45C1000
heap
page read and write
1EE30E03000
trusted library allocation
page read and write
1EE30BE3000
trusted library allocation
page read and write
432E000
stack
page read and write
528F000
trusted library allocation
page read and write
5F56000
trusted library allocation
page read and write
1EE2BB46000
trusted library allocation
page read and write
5AC0000
trusted library allocation
page read and write
4441000
heap
page read and write
1EE2BB19000
trusted library allocation
page read and write
1EE25740000
heap
page read and write
1EE3140C000
trusted library allocation
page read and write
1CE6D000
stack
page read and write
41CE000
stack
page read and write
1EE32092000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
BD4000
heap
page read and write
260A94E0000
heap
page read and write
43E000
unkown
page execute and write copy
1EE36ACD000
trusted library allocation
page read and write
1EE305FC000
trusted library allocation
page read and write
1EE2FF03000
trusted library allocation
page read and write
9D1000
unkown
page execute and read and write
1EE25753000
heap
page read and write
1EE2EBC6000
trusted library allocation
page read and write
1EE2AB25000
trusted library allocation
page read and write
4931000
heap
page read and write
1EE30AA0000
trusted library allocation
page read and write
1EE30430000
trusted library allocation
page read and write
45B0000
direct allocation
page read and write
260A9F1C000
trusted library allocation
page read and write
5285000
trusted library allocation
page read and write
1EE3680D000
trusted library allocation
page read and write
41BF000
stack
page read and write
4BC2000
heap
page read and write
511403E000
stack
page read and write
51A000
unkown
page execute and read and write
1EE309F0000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
5BB9000
trusted library allocation
page read and write
B4C000
stack
page read and write
6F860000
unkown
page readonly
1234000
heap
page read and write
A74000
heap
page read and write
1EE257A3000
heap
page read and write
28B0000
heap
page read and write
2ED0000
direct allocation
page read and write
4C48000
trusted library allocation
page read and write
4BD0000
direct allocation
page execute and read and write
17F37990000
heap
page read and write
357E000
stack
page read and write
3BBE000
stack
page read and write
2D20000
heap
page read and write
976000
unkown
page execute and write copy
2E4B000
heap
page read and write
6C4000
heap
page read and write
5B3B000
trusted library allocation
page read and write
1EE2FD00000
trusted library allocation
page read and write
450000
unkown
page execute and read and write
3DFE000
stack
page read and write
1EE30A24000
trusted library allocation
page read and write
33BF000
stack
page read and write
1EE36890000
trusted library allocation
page read and write
5230000
direct allocation
page execute and read and write
3CBE000
stack
page read and write
1EE2D972000
unclassified section
page read and write
58F7000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
2B9000
unkown
page write copy
1EE309D7000
trusted library allocation
page read and write
1EE3055E000
trusted library allocation
page read and write
5EB5000
trusted library allocation
page read and write
1D54C000
heap
page read and write
E5C000
stack
page read and write
C9B000
heap
page read and write
5585000
trusted library allocation
page read and write
31AE000
stack
page read and write
1165000
heap
page read and write
1EE2E08B000
heap
page read and write
3E4817E000
stack
page read and write
5220000
heap
page read and write
1EE3686C000
trusted library allocation
page read and write
1EE302BD000
trusted library allocation
page read and write
1EE3097F000
trusted library allocation
page read and write
1EE38BB7000
trusted library allocation
page read and write
1EE3104F000
trusted library allocation
page read and write
4441000
heap
page read and write
5AF5000
trusted library allocation
page read and write
56B1000
trusted library allocation
page read and write
1EE30BCA000
trusted library allocation
page read and write
32FEDA403000
trusted library allocation
page read and write
3F1F000
stack
page read and write
2F4F000
stack
page read and write
1EE368B5000
trusted library allocation
page read and write
1EE2C800000
trusted library allocation
page read and write
1EE2575F000
heap
page read and write
4441000
heap
page read and write
1EE36AFC000
trusted library allocation
page read and write
11E0000
direct allocation
page read and write
1EE30809000
trusted library allocation
page read and write
6C7FF000
unkown
page write copy
1EE3049F000
trusted library allocation
page read and write
9E7000
unkown
page execute and read and write
A91000
unkown
page execute read
1EE25753000
heap
page read and write
1EE2A726000
trusted library allocation
page read and write
4A10000
direct allocation
page execute and read and write
1EE2B603000
trusted library allocation
page read and write
1EE305E2000
trusted library allocation
page read and write
1EE31370000
trusted library allocation
page read and write
1EE2F603000
trusted library allocation
page read and write
15D0000
direct allocation
page read and write
A74000
heap
page read and write
1EE25754000
heap
page read and write
45C1000
heap
page read and write
5FA7000
trusted library allocation
page read and write
A10000
unkown
page execute and read and write
5F8A000
trusted library allocation
page read and write
1EE2BB1C000
trusted library allocation
page read and write
52D3000
trusted library allocation
page read and write
1EE25753000
heap
page read and write
D17000
heap
page read and write
6C4000
heap
page read and write
3E3F000
stack
page read and write
1EE2E481000
trusted library allocation
page read and write
1EE2C015000
trusted library allocation
page read and write
1EE2A580000
trusted library section
page read and write
52AE000
trusted library allocation
page read and write
5ABA000
trusted library allocation
page read and write
1EE36200000
trusted library allocation
page read and write
260A975C000
trusted library allocation
page read and write
5622000
trusted library allocation
page read and write
1EE2574A000
heap
page read and write
1EE36850000
trusted library allocation
page read and write
260A9748000
trusted library allocation
page read and write
1EE305F9000
trusted library allocation
page read and write
1167000
heap
page read and write
1EE2F9DE000
trusted library allocation
page read and write
1EE30A09000
trusted library allocation
page read and write
1EE305FE000
trusted library allocation
page read and write
1EE36CC1000
trusted library allocation
page read and write
1EE2574A000
heap
page read and write
1EE25775000
heap
page read and write
1357000
heap
page read and write
4A7F000
stack
page read and write
260AA428000
heap
page read and write
1335000
stack
page read and write
1EE36AC3000
trusted library allocation
page read and write
62A000
heap
page read and write
52A9000
trusted library allocation
page read and write
1058000
heap
page read and write
515F000
stack
page read and write
1EE36CB6000
trusted library allocation
page read and write
67F0000
heap
page read and write
5AAB000
trusted library allocation
page read and write
5EBC000
trusted library allocation
page read and write
1619000
heap
page read and write
1EE30833000
trusted library allocation
page read and write
1454000
heap
page read and write
4C24000
trusted library allocation
page read and write
1EE3027D000
trusted library allocation
page read and write
260A95B0000
unclassified section
page read and write
5584000
trusted library allocation
page read and write
1EE309F0000
trusted library allocation
page read and write
1EE302F1000
trusted library allocation
page read and write
1EE2575B000
heap
page read and write
1EE2FF0B000
trusted library allocation
page read and write
1EE31751000
trusted library allocation
page read and write
1EE33401000
trusted library allocation
page read and write
1454000
heap
page read and write
1EE2E309000
trusted library allocation
page read and write
1EE321E0000
trusted library allocation
page read and write
1D49D000
stack
page read and write
1D516000
heap
page read and write
1EE2F300000
trusted library allocation
page read and write
5AC4000
trusted library allocation
page read and write
1EE3142B000
trusted library allocation
page read and write
1EE36CD4000
trusted library allocation
page read and write
4F6B000
trusted library allocation
page execute and read and write
45B0000
direct allocation
page read and write
B2C000
unkown
page readonly
1005000
heap
page read and write
1EE2E5B8000
trusted library allocation
page read and write
D4B000
unkown
page execute and read and write
1140000
heap
page read and write
52BE000
stack
page read and write
5F77000
trusted library allocation
page read and write
1EE25750000
heap
page read and write
1EE30AFA000
trusted library allocation
page read and write
1EE2576E000
heap
page read and write
AF9CF1E000
unkown
page readonly
5111338000
stack
page read and write
1EE304A8000
trusted library allocation
page read and write
52A9000
trusted library allocation
page read and write
1EE305E2000
trusted library allocation
page read and write
511283D000
stack
page read and write
56D8000
trusted library allocation
page read and write
3E46FFE000
unkown
page readonly
1454000
heap
page read and write
1EE2E5A0000
trusted library allocation
page read and write
D28000
heap
page read and write
1EE36AEC000
trusted library allocation
page read and write
1EE30BE0000
trusted library allocation
page read and write
1EE30A13000
trusted library allocation
page read and write
318E000
stack
page read and write
48B000
unkown
page execute and write copy
45C1000
heap
page read and write
1EE36866000
trusted library allocation
page read and write
5285000
trusted library allocation
page read and write
4BC2000
heap
page read and write
1EE30851000
trusted library allocation
page read and write
5AA8000
trusted library allocation
page read and write
45C000
unkown
page execute and write copy
4BC1000
heap
page read and write
1EE309DA000
trusted library allocation
page read and write
1EE308CB000
trusted library allocation
page read and write
4FE0000
trusted library allocation
page read and write
1EE2F3E6000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
1EE2F103000
trusted library allocation
page read and write
4BC1000
heap
page read and write
260A97C0000
trusted library allocation
page read and write
8170000
heap
page read and write
4D80000
direct allocation
page read and write
7430000
heap
page execute and read and write
1EE322DF000
trusted library allocation
page read and write
2EFF000
stack
page read and write
34FF000
stack
page read and write
1EE304C0000
trusted library allocation
page read and write
1EE257B4000
heap
page read and write
1EE31700000
trusted library allocation
page read and write
357F000
stack
page read and write
1EE30C0D000
trusted library allocation
page read and write
1EE2C10D000
trusted library allocation
page read and write
1EE1EAF4000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
1EE36876000
trusted library allocation
page read and write
17F37910000
heap
page read and write
511174D000
stack
page read and write
B2C000
unkown
page readonly
51F0000
direct allocation
page execute and read and write
980000
unkown
page execute and write copy
1EE2EC7C000
trusted library allocation
page read and write
363F000
stack
page read and write
1EE303C9000
trusted library allocation
page read and write
1EE2F65B000
trusted library allocation
page read and write
1EE309A6000
trusted library allocation
page read and write
4DB1000
heap
page read and write
1EE25742000
heap
page read and write
11E0000
direct allocation
page read and write
17F37944000
heap
page read and write
5365000
trusted library allocation
page read and write
1EE2E9E9000
trusted library allocation
page read and write
4A4F000
stack
page read and write
1EE2574A000
heap
page read and write
1EE2F39B000
trusted library allocation
page read and write
5EB2000
trusted library allocation
page read and write
350F000
stack
page read and write
1EE2EC81000
trusted library allocation
page read and write
5638000
trusted library allocation
page read and write
15D0000
direct allocation
page read and write
511F000
stack
page read and write
B52000
unkown
page readonly
1EE2E5E2000
trusted library allocation
page read and write
747E000
stack
page read and write
1E083E15000
heap
page read and write
564A000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
1920000
trusted library allocation
page read and write
1EE36821000
trusted library allocation
page read and write
5EBA000
trusted library allocation
page read and write
1D525000
heap
page read and write
1EE2DAE6000
trusted library allocation
page read and write
1EE31000000
trusted library allocation
page read and write
1EE3058C000
trusted library allocation
page read and write
1EE2ECB7000
trusted library allocation
page read and write
45C1000
heap
page read and write
1EE2578D000
heap
page read and write
1EE36A8A000
trusted library allocation
page read and write
1EE2F0B0000
trusted library allocation
page read and write
1EE25746000
heap
page read and write
260AA484000
heap
page read and write
457E000
stack
page read and write
52C9000
trusted library allocation
page read and write
1EE25789000
heap
page read and write
5355000
trusted library allocation
page read and write
4441000
heap
page read and write
12C0000
heap
page read and write
4BC1000
heap
page read and write
1D52F000
heap
page read and write
4441000
heap
page read and write
1EE313FB000
trusted library allocation
page read and write
32CE000
stack
page read and write
32BF000
stack
page read and write
EE2000
unkown
page execute and read and write
4BC1000
heap
page read and write
51113FE000
stack
page read and write
1EE25789000
heap
page read and write
1EE30B83000
trusted library allocation
page read and write
5250000
direct allocation
page execute and read and write
1400000
direct allocation
page read and write
1EE306A0000
trusted library allocation
page read and write
529B000
trusted library allocation
page read and write
453F000
stack
page read and write
1EE30AF2000
trusted library allocation
page read and write
1EE2ECC7000
trusted library allocation
page read and write
5E46000
heap
page read and write
1EE2E6C0000
trusted library allocation
page read and write
1EE36833000
trusted library allocation
page read and write
1EE25796000
heap
page read and write
403F000
stack
page read and write
260AA431000
heap
page read and write
B44000
heap
page read and write
15D0000
direct allocation
page read and write
1EE2F387000
trusted library allocation
page read and write
1EE2E5DE000
trusted library allocation
page read and write
529B000
trusted library allocation
page read and write
1EE36400000
trusted library allocation
page read and write
1E0857AA000
heap
page read and write
1EE309DA000
trusted library allocation
page read and write
45B0000
direct allocation
page read and write
14A2000
heap
page read and write
1EE303DB000
trusted library allocation
page read and write
EFE000
stack
page read and write
5070000
direct allocation
page read and write
5354000
trusted library allocation
page read and write
1EE2E855000
trusted library allocation
page read and write
1EE2F8C9000
trusted library allocation
page read and write
5EBF000
trusted library allocation
page read and write
56CB000
trusted library allocation
page read and write
1EE30C0F000
trusted library allocation
page read and write
1EE30AE4000
trusted library allocation
page read and write
7AA000
unkown
page execute and read and write
1EE2A726000
trusted library allocation
page read and write
1EE30859000
trusted library allocation
page read and write
56BD000
trusted library allocation
page read and write
1EE2DAEE000
trusted library allocation
page read and write
5354000
trusted library allocation
page read and write
CB9000
heap
page read and write
1080000
heap
page read and write
1EE25753000
heap
page read and write
FF3000
heap
page read and write
1EE2F3B0000
trusted library allocation
page read and write
1920000
trusted library allocation
page read and write
1EE2BAE2000
trusted library allocation
page read and write
329F000
stack
page read and write
4F50000
direct allocation
page read and write
1EE36A42000
trusted library allocation
page read and write
1134000
heap
page read and write
1EE2EA99000
trusted library allocation
page read and write
1EE2F760000
trusted library allocation
page read and write
1EE2A098000
trusted library allocation
page read and write
1358000
heap
page read and write
1EE2DABE000
trusted library allocation
page read and write
1EE25747000
heap
page read and write
118C000
heap
page read and write
601F000
trusted library allocation
page read and write
1EE305E9000
trusted library allocation
page read and write
5FF6000
trusted library allocation
page read and write
13B000
stack
page read and write
55A0000
remote allocation
page read and write
1EE36944000
trusted library allocation
page read and write
45C1000
heap
page read and write
51116CE000
stack
page read and write
1EE2ECCF000
trusted library allocation
page read and write
1EE302E6000
trusted library allocation
page read and write
5B3C000
trusted library allocation
page read and write
714000
unkown
page execute and read and write
1EE2F8F5000
trusted library allocation
page read and write
1EE36600000
trusted library allocation
page read and write
5355000
trusted library allocation
page read and write
1EE25752000
heap
page read and write
45C1000
heap
page read and write
1EE2E533000
trusted library allocation
page read and write
4E01000
heap
page read and write
FEA000
heap
page read and write
6255000
trusted library allocation
page read and write
1134000
heap
page read and write
1EE301D0000
trusted library allocation
page read and write
1EE313CF000
trusted library allocation
page read and write
1EE2DD86000
trusted library allocation
page read and write
D37000
heap
page read and write
57D4000
trusted library allocation
page read and write
5AC7000
trusted library allocation
page read and write
533E000
stack
page read and write
36BF000
stack
page read and write
1EE2A6FE000
trusted library allocation
page read and write
5F76000
trusted library allocation
page read and write
1EE30BCC000
trusted library allocation
page read and write
5ADC000
trusted library allocation
page read and write
45BE000
stack
page read and write
356E000
stack
page read and write
4BC1000
heap
page read and write
260AA3A9000
heap
page read and write
1EE2FE61000
trusted library allocation
page read and write
1EE2BBB5000
trusted library allocation
page read and write
1EE303F7000
trusted library allocation
page read and write
1EE2C500000
trusted library allocation
page read and write
1EE36874000
trusted library allocation
page read and write
26F0000
direct allocation
page read and write
1EE30BFE000
trusted library allocation
page read and write
1EE2F2A9000
trusted library allocation
page read and write
2F2E000
stack
page read and write
1EE2575A000
heap
page read and write
1EE2AA81000
trusted library allocation
page read and write
1EE31778000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
1EE30ADA000
trusted library allocation
page read and write
260A972F000
trusted library allocation
page read and write
1EE36960000
trusted library allocation
page read and write
57821204000
trusted library allocation
page read and write
317B000
stack
page read and write
1EE38816000
trusted library allocation
page read and write
1EE2DDD4000
trusted library allocation
page read and write
1EE2E5E2000
trusted library allocation
page read and write
26F0000
direct allocation
page read and write
55EE000
stack
page read and write
1454000
heap
page read and write
4A30000
direct allocation
page read and write
1EE25787000
heap
page read and write
1003000
unkown
page execute and read and write
4BC1000
heap
page read and write
29680000
heap
page read and write
4BC1000
heap
page read and write
1079000
heap
page read and write
1234000
heap
page read and write
1EE2E963000
trusted library allocation
page read and write
FA4000
heap
page read and write
1EE3136A000
trusted library allocation
page read and write
1EE30383000
trusted library allocation
page read and write
4C3A000
trusted library allocation
page read and write
1EE2E5F0000
trusted library allocation
page read and write
1EE2BB13000
trusted library allocation
page read and write
1EE2F65D000
trusted library allocation
page read and write
1EE2C86A000
trusted library allocation
page read and write
1EE2F909000
trusted library allocation
page read and write
5AAF000
trusted library allocation
page read and write
D1B000
heap
page read and write
52AF000
trusted library allocation
page read and write
45C1000
heap
page read and write
2CC0000
direct allocation
page read and write
BD4000
heap
page read and write
1EE30A1A000
trusted library allocation
page read and write
314F000
stack
page read and write
96A000
unkown
page execute and write copy
50C0000
direct allocation
page execute and read and write
1EE2E5E6000
trusted library allocation
page read and write
1EE2DAE6000
trusted library allocation
page read and write
1EE2F8F1000
trusted library allocation
page read and write
1EE2C017000
trusted library allocation
page read and write
4441000
heap
page read and write
1EE309D1000
trusted library allocation
page read and write
B44000
heap
page read and write
260AA39F000
heap
page read and write
5AF6000
trusted library allocation
page read and write
1234000
heap
page read and write
45C1000
heap
page read and write
250000
unkown
page readonly
5C2000
unkown
page execute and read and write
57C000
unkown
page execute and write copy
BD4000
heap
page read and write
1EE302AC000
trusted library allocation
page read and write
1EE30AD9000
trusted library allocation
page read and write
1EE2F100000
trusted library allocation
page read and write
4A50000
direct allocation
page read and write
CB9000
heap
page read and write
483E000
stack
page read and write
5F9B000
trusted library allocation
page read and write
17F378BA000
heap
page read and write
11A8000
heap
page read and write
4441000
heap
page read and write
7A0000
unkown
page readonly
15FC4E1E000
trusted library allocation
page read and write
5355000
trusted library allocation
page read and write
1D527000
heap
page read and write
1EE305E9000
trusted library allocation
page read and write
5119C3E000
stack
page read and write
4BC1000
heap
page read and write
1EE30AF2000
trusted library allocation
page read and write
3CAF000
stack
page read and write
45C1000
heap
page read and write
29683000
heap
page read and write
1EE367AC000
trusted library allocation
page read and write
5F95000
trusted library allocation
page read and write
1EE305EB000
trusted library allocation
page read and write
1EE2ABDE000
trusted library allocation
page read and write
5119EFD000
stack
page read and write
260A979F000
trusted library allocation
page read and write
4441000
heap
page read and write
1EE2BA03000
trusted library allocation
page read and write
5119C7A000
stack
page read and write
1EE308F0000
trusted library allocation
page read and write
1EE2ECCF000
trusted library allocation
page read and write
1EE2A6FB000
trusted library allocation
page read and write
1470000
heap
page read and write
1167000
heap
page read and write
4DB1000
heap
page read and write
2C9E000
stack
page read and write
1EE2E5B8000
trusted library allocation
page read and write
1EE2FCB2000
unclassified section
page read and write
1EE36CA9000
trusted library allocation
page read and write
1EE2F3B0000
trusted library allocation
page read and write
1EE2DA28000
trusted library allocation
page read and write
1EE36C80000
trusted library allocation
page read and write
52B3000
trusted library allocation
page read and write
1EE30B00000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
1EE2EA00000
trusted library allocation
page read and write
1EE30BEF000
trusted library allocation
page read and write
4BBF000
stack
page read and write
DE0000
heap
page read and write
1EE317EA000
trusted library allocation
page read and write
1EE367F6000
trusted library allocation
page read and write
1EE36850000
trusted library allocation
page read and write
296A0000
heap
page read and write
4A30000
direct allocation
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
1152000
heap
page read and write
1EE36CCD000
trusted library allocation
page read and write
1EE32273000
trusted library allocation
page read and write
7A2000
unkown
page execute and write copy
1EE2037A000
heap
page read and write
1EE30222000
trusted library allocation
page read and write
BD4000
heap
page read and write
1EE2DF7A000
heap
page read and write
511B17B000
stack
page read and write
1EE30BCC000
trusted library allocation
page read and write
1EE2DAA7000
trusted library allocation
page read and write
1EE306D2000
trusted library allocation
page read and write
1EE2A0CC000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
5B33000
trusted library allocation
page read and write
1EE2E400000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
1EE305C2000
trusted library allocation
page read and write
966000
unkown
page execute and write copy
F74D9797000
trusted library allocation
page read and write
2968E000
heap
page read and write
4BC2000
heap
page read and write
45C1000
heap
page read and write
558E000
trusted library allocation
page read and write
51F0000
direct allocation
page execute and read and write
5B3E000
trusted library allocation
page read and write
52CF000
trusted library allocation
page read and write
5B46000
trusted library allocation
page read and write
1EE2F657000
trusted library allocation
page read and write
1EE311DE000
trusted library allocation
page read and write
260AA3AC000
heap
page read and write
260AA43C000
heap
page read and write
4441000
heap
page read and write
A91000
unkown
page execute read
1EE2575B000
heap
page read and write
1EE31764000
trusted library allocation
page read and write
453F000
stack
page read and write
A74000
heap
page read and write
1EE257A6000
heap
page read and write
BD4000
heap
page read and write
1EE31489000
trusted library allocation
page read and write
270000
unkown
page read and write
260AA349000
heap
page read and write
1D52E000
heap
page read and write
4931000
heap
page read and write
53D8000
trusted library allocation
page read and write
1EE3093A000
trusted library allocation
page read and write
5BB0000
trusted library allocation
page read and write
37FF000
stack
page read and write
1EE30C0C000
trusted library allocation
page read and write
1EE30AE9000
trusted library allocation
page read and write
5285000
trusted library allocation
page read and write
1EE2F055000
trusted library allocation
page read and write
5B4C000
trusted library allocation
page read and write
260AA3BF000
heap
page read and write
38DF000
stack
page read and write
4A3F000
stack
page read and write
12CA000
heap
page read and write
1004000
unkown
page execute and write copy
1EE36717000
trusted library allocation
page read and write
1EE2DDA3000
trusted library allocation
page read and write
52BC000
trusted library allocation
page read and write
6C4000
heap
page read and write
1D52F000
heap
page read and write
4BC1000
heap
page read and write
34FF000
stack
page read and write
1EE33622000
trusted library allocation
page read and write
479000
unkown
page execute and read and write
1EE314E3000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
2969A000
heap
page read and write
1EE2A210000
trusted library allocation
page read and write
1EE25750000
heap
page read and write
1EE2E300000
trusted library allocation
page read and write
1EE30503000
trusted library allocation
page read and write
1EE32127000
trusted library allocation
page read and write
3E44DDE000
stack
page read and write
1EE2F3B6000
trusted library allocation
page read and write
1EE2E4A2000
trusted library allocation
page read and write
132F000
stack
page read and write
17F0000
heap
page read and write
1EE30D53000
trusted library allocation
page read and write
97C000
unkown
page execute and read and write
76FE000
stack
page read and write
1EE302CC000
trusted library allocation
page read and write
1EE2A713000
trusted library allocation
page read and write
A91000
unkown
page execute read
1EE30AF8000
trusted library allocation
page read and write
E0A000
heap
page read and write
4C2000
unkown
page execute and write copy
BAC000
stack
page read and write
3B4F000
stack
page read and write
1EE2E5F1000
trusted library allocation
page read and write
101D000
heap
page read and write
5AC0000
trusted library allocation
page read and write
4931000
heap
page read and write
1EE306B2000
trusted library allocation
page read and write
1EE30AE4000
trusted library allocation
page read and write
605000
heap
page read and write
1EE2F800000
trusted library allocation
page read and write
260A9550000
heap
page read and write
1EE2C700000
trusted library allocation
page read and write
FC0000
heap
page read and write
F53000
stack
page read and write
5EB9000
trusted library allocation
page read and write
1EE25762000
heap
page read and write
4AC1000
heap
page read and write
1EE3687C000
trusted library allocation
page read and write
555E000
stack
page read and write
5B34000
trusted library allocation
page read and write
559D000
stack
page read and write
5BA8000
trusted library allocation
page read and write
1EE1E680000
unclassified section
page readonly
1134000
heap
page read and write
1EE366E6000
trusted library allocation
page read and write
4BF000
unkown
page execute and write copy
51A0000
direct allocation
page execute and read and write
642000
heap
page read and write
1EE2573A000
heap
page read and write
1EE2F75E000
trusted library allocation
page read and write
1EE30977000
trusted library allocation
page read and write
56C8000
trusted library allocation
page read and write
5EB9000
trusted library allocation
page read and write
1EE30AD1000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
1EE257A5000
heap
page read and write
1EE2A2FE000
trusted library allocation
page read and write
5119F7B000
stack
page read and write
F39000
stack
page read and write
1EE30BE3000
trusted library allocation
page read and write
260AA428000
heap
page read and write
5FE5000
trusted library allocation
page read and write
96D000
unkown
page read and write
1EE306B7000
trusted library allocation
page read and write
615000
heap
page read and write
57BC000
trusted library allocation
page read and write
1EE30141000
trusted library allocation
page read and write
511B1BE000
stack
page read and write
1EE30851000
trusted library allocation
page read and write
511303E000
stack
page read and write
1EE2F379000
trusted library allocation
page read and write
4A30000
direct allocation
page read and write
1EE2574A000
heap
page read and write
1EE30AAF000
trusted library allocation
page read and write
570000
unkown
page readonly
1EE30BCA000
trusted library allocation
page read and write
5040000
direct allocation
page execute and read and write
45C1000
heap
page read and write
1EE38B62000
trusted library allocation
page read and write
1EE25746000
heap
page read and write
15EA000
heap
page read and write
1EE2575B000
heap
page read and write
4441000
heap
page read and write
260AA429000
heap
page read and write
C85000
heap
page read and write
6C4000
heap
page read and write
3A0F000
stack
page read and write
58F6000
trusted library allocation
page read and write
1EE25753000
heap
page read and write
1EE2575A000
heap
page read and write
1EE2EA03000
trusted library allocation
page read and write
15D0000
direct allocation
page read and write
6D5000
unkown
page execute and read and write
988000
unkown
page execute and write copy
1EE310DE000
trusted library allocation
page read and write
1EE2E4CB000
trusted library allocation
page read and write
4441000
heap
page read and write
1EE2A27F000
trusted library allocation
page read and write
7B83000
heap
page read and write
5B4A000
trusted library allocation
page read and write
1EE30134000
trusted library allocation
page read and write
531000
unkown
page execute and write copy
1920000
trusted library allocation
page read and write
5BB9000
trusted library allocation
page read and write
5646000
trusted library allocation
page read and write
1EE25786000
heap
page read and write
3640000
heap
page read and write
1EE317CB000
trusted library allocation
page read and write
4F5A000
trusted library allocation
page execute and read and write
6FA000
stack
page read and write
1D531000
heap
page read and write
1EE367F2000
trusted library allocation
page read and write
1400000
direct allocation
page read and write
1EE303DB000
trusted library allocation
page read and write
309F000
stack
page read and write
D19000
heap
page read and write
1EE38800000
trusted library allocation
page read and write
1040000
heap
page read and write
4441000
heap
page read and write
5117A3D000
stack
page read and write
6C4000
heap
page read and write
45B0000
direct allocation
page read and write
1EE36866000
trusted library allocation
page read and write
5247000
trusted library allocation
page read and write
1EE30A2A000
trusted library allocation
page read and write
1EE36A49000
trusted library allocation
page read and write
B52000
unkown
page readonly
1EE305FA000
trusted library allocation
page read and write
37DE000
stack
page read and write
1EE30A9B000
trusted library allocation
page read and write
1EE2FD09000
trusted library allocation
page read and write
1EE36813000
trusted library allocation
page read and write
45C1000
heap
page read and write
58F4000
trusted library allocation
page read and write
1EE30A37000
trusted library allocation
page read and write
4441000
heap
page read and write
8171000
heap
page read and write
5AE5000
trusted library allocation
page read and write
1EE322B9000
trusted library allocation
page read and write
4E1000
unkown
page execute and write copy
13E5000
heap
page read and write
4441000
heap
page read and write
469F000
stack
page read and write
4441000
heap
page read and write
1EE2E09F000
heap
page read and write
52E3000
trusted library allocation
page read and write
A74000
heap
page read and write
4A40000
direct allocation
page execute and read and write
1EE301BC000
trusted library allocation
page read and write
1EE30AE9000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page read and write
45C1000
heap
page read and write
313F000
stack
page read and write
1EE25749000
heap
page read and write
4A90000
direct allocation
page execute and read and write
1EE2F616000
trusted library allocation
page read and write
1454000
heap
page read and write
1EE3012C000
trusted library allocation
page read and write
7AC000
stack
page read and write
2E20000
heap
page read and write
17F37C68000
trusted library allocation
page read and write
6C4000
heap
page read and write
1EE2E5BE000
trusted library allocation
page read and write
1EE368F6000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
1EE30FF4000
trusted library allocation
page read and write
1D52B000
heap
page read and write
5238000
trusted library allocation
page read and write
1EE2AAB1000
trusted library allocation
page read and write
6105000
trusted library allocation
page read and write
1EE305E9000
trusted library allocation
page read and write
1EE2F3B3000
trusted library allocation
page read and write
363F000
stack
page read and write
260A975F000
trusted library allocation
page read and write
1EE2030B000
heap
page read and write
58F3000
trusted library allocation
page read and write
53E0000
direct allocation
page execute and read and write
528F000
trusted library allocation
page read and write
4A30000
direct allocation
page read and write
1EE2574F000
heap
page read and write
1EE2C867000
trusted library allocation
page read and write
2D0000
unkown
page execute and write copy
57DF000
stack
page read and write
602000
heap
page read and write
4EB0000
trusted library allocation
page read and write
DD0000
heap
page read and write
1EE2EC81000
trusted library allocation
page read and write
23593000
heap
page read and write
2CC0000
direct allocation
page read and write
36FE000
stack
page read and write
1EE30977000
trusted library allocation
page read and write
1185000
heap
page read and write
378F000
stack
page read and write
975000
unkown
page execute and read and write
1EE3688E000
trusted library allocation
page read and write
53E0000
direct allocation
page execute and read and write
1EE2F503000
trusted library allocation
page read and write
1EE30ADA000
trusted library allocation
page read and write
5344000
trusted library allocation
page read and write
443F000
stack
page read and write
57C000
unkown
page execute and write copy
393F000
stack
page read and write
9CD000
unkown
page execute and write copy
BD4000
heap
page read and write
1134000
heap
page read and write
1EE305F6000
trusted library allocation
page read and write
1EE2A161000
trusted library allocation
page read and write
4DFE000
stack
page read and write
447F000
stack
page read and write
FA4000
heap
page read and write
1EE368D4000
trusted library allocation
page read and write
4A80000
direct allocation
page execute and read and write
1EE309BA000
trusted library allocation
page read and write
1EE25750000
heap
page read and write
17F37720000
unclassified section
page readonly
A74000
heap
page read and write
1EE2F0E7000
trusted library allocation
page read and write
1400000
direct allocation
page read and write
355E000
stack
page read and write
573000
unkown
page execute and write copy
6C4000
heap
page read and write
1EE2F366000
trusted library allocation
page read and write
1920000
trusted library allocation
page read and write
11E0000
direct allocation
page read and write
4BC0000
heap
page read and write
1EE2E533000
trusted library allocation
page read and write
1EE32260000
trusted library allocation
page read and write
5FAF000
trusted library allocation
page read and write
53BF000
stack
page read and write
1EE25750000
heap
page read and write
1EE25753000
heap
page read and write
260AA498000
heap
page read and write
260A9710000
trusted library allocation
page read and write
4BC1000
heap
page read and write
F76F4703000
trusted library allocation
page read and write
1EE36C77000
trusted library allocation
page read and write
1EE3223E000
trusted library allocation
page read and write
5BDF000
trusted library allocation
page read and write
1EE2F3B6000
trusted library allocation
page read and write
14BF000
stack
page read and write
1EE38B0D000
trusted library allocation
page read and write
17F37E00000
heap
page read and write
5220000
direct allocation
page execute and read and write
4BC1000
heap
page read and write
45C1000
heap
page read and write
1EE2FF78000
trusted library allocation
page read and write
1EE31703000
trusted library allocation
page read and write
260AA46A000
heap
page read and write
5365000
trusted library allocation
page read and write
1EE30AD5000
trusted library allocation
page read and write
1EE2E5BE000
trusted library allocation
page read and write
5FFF000
trusted library allocation
page read and write
AFA000
unkown
page read and write
1EE2BB1E000
trusted library allocation
page read and write
53F0000
direct allocation
page execute and read and write
260AA484000
heap
page read and write
D3A000
heap
page read and write
5F5D000
trusted library allocation
page read and write
4BA1000
heap
page read and write
5588000
trusted library allocation
page read and write
1EE2A0B3000
trusted library allocation
page read and write
528F000
trusted library allocation
page read and write
5381000
trusted library allocation
page read and write
1EE2575B000
heap
page read and write
11CE000
stack
page read and write
1EE2F91A000
trusted library allocation
page read and write
61E01000
direct allocation
page execute read
45C1000
heap
page read and write
1EE30958000
trusted library allocation
page read and write
4FD0000
heap
page read and write
714000
unkown
page execute and read and write
37AF000
stack
page read and write
624000
heap
page read and write
4F1B000
stack
page read and write
1EE30AD1000
trusted library allocation
page read and write
4F50000
direct allocation
page read and write
4BC1000
heap
page read and write
4BA1000
heap
page read and write
1454000
heap
page read and write
1027000
heap
page read and write
1920000
trusted library allocation
page read and write
3FBE000
stack
page read and write
1EE2A715000
trusted library allocation
page read and write
52BA000
trusted library allocation
page read and write
5060000
direct allocation
page execute and read and write
1EE31283000
trusted library allocation
page read and write
1040000
heap
page read and write
1EE36AC8000
trusted library allocation
page read and write
4BC1000
heap
page read and write
D49000
unkown
page write copy
1199000
heap
page read and write
56D000
unkown
page execute and write copy
38BF000
stack
page read and write
1EE2AB73000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
1EE30CAF000
trusted library allocation
page read and write
1EE2FE03000
trusted library allocation
page read and write
1EE25753000
heap
page read and write
1EE2E5A7000
trusted library allocation
page read and write
1EE2D970000
unclassified section
page read and write
467F000
stack
page read and write
1EE3691E000
trusted library allocation
page read and write
D1B000
heap
page read and write
1EE2BA9A000
trusted library allocation
page read and write
911000
unkown
page execute and read and write
1EE2EC45000
trusted library allocation
page read and write
1EE25744000
heap
page read and write
FEF000
heap
page read and write
3E467FE000
stack
page read and write
1037000
heap
page read and write
1EE3016D000
trusted library allocation
page read and write
5588000
trusted library allocation
page read and write
1EE257A1000
heap
page read and write
7B6000
unkown
page execute and write copy
1EE321FA000
trusted library allocation
page read and write
DB0F7FA000
stack
page read and write
17F37A20000
heap
page read and write
1454000
heap
page read and write
5B3D000
trusted library allocation
page read and write
1EE309BA000
trusted library allocation
page read and write
5345000
trusted library allocation
page read and write
4BC2000
heap
page read and write
1EE2E5A7000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1EE311D7000
trusted library allocation
page read and write
1234000
heap
page read and write
493F000
stack
page read and write
260AA3BD000
heap
page read and write
1EE30A82000
trusted library allocation
page read and write
A0E000
unkown
page execute and read and write
1EE2ABA2000
trusted library allocation
page read and write
1EE2E6AE000
trusted library allocation
page read and write
5284000
trusted library allocation
page read and write
4321000
heap
page read and write
5581000
trusted library allocation
page read and write
1EE366D0000
trusted library allocation
page read and write
1230000
heap
page read and write
1EE309DD000
trusted library allocation
page read and write
990000
unkown
page execute and write copy
1EE30FBA000
trusted library allocation
page read and write
1EE308E5000
trusted library allocation
page read and write
1EE367F6000
trusted library allocation
page read and write
1134000
heap
page read and write
303F000
stack
page read and write
138F000
stack
page read and write
1EE36ABD000
trusted library allocation
page read and write
1EE3686C000
trusted library allocation
page read and write
5798000
trusted library allocation
page read and write
17F37D32000
trusted library allocation
page read and write
1090000
heap
page read and write
1EE25744000
heap
page read and write
5355000
trusted library allocation
page read and write
1EE2573C000
heap
page read and write
1134000
heap
page read and write
5B1E000
trusted library allocation
page read and write
11BB000
heap
page read and write
1EE2A782000
trusted library allocation
page read and write
1EE2F9F9000
trusted library allocation
page read and write
1EE2EC54000
trusted library allocation
page read and write
4C00000
direct allocation
page execute and read and write
1EE30B93000
trusted library allocation
page read and write
5EBB000
trusted library allocation
page read and write
1EE36A25000
trusted library allocation
page read and write
29660000
heap
page read and write
1134000
heap
page read and write
FA4000
heap
page read and write
1EE30BD2000
trusted library allocation
page read and write
4C50000
direct allocation
page execute and read and write
5BF000
unkown
page execute and read and write
1EE3141C000
trusted library allocation
page read and write
558C000
trusted library allocation
page read and write
C07000
unkown
page execute and write copy
2ED0000
direct allocation
page read and write
260A95B2000
unclassified section
page read and write
1EE38BFB000
trusted library allocation
page read and write
52F4000
trusted library allocation
page read and write
4BC1000
heap
page read and write
260AA462000
heap
page read and write
1EE31439000
trusted library allocation
page read and write
2F77D000
heap
page read and write
1EE3078E000
trusted library allocation
page read and write
46BE000
stack
page read and write
1EE2ECCF000
trusted library allocation
page read and write
1EE2579A000
heap
page read and write
5BA1000
trusted library allocation
page read and write
4BC1000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
5050000
direct allocation
page execute and read and write
5354000
trusted library allocation
page read and write
1E0857B5000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
352F000
stack
page read and write
58FF000
trusted library allocation
page read and write
550000
direct allocation
page read and write
1EE30A37000
trusted library allocation
page read and write
1EE2575B000
heap
page read and write
260AA431000
heap
page read and write
1EE36A0B000
trusted library allocation
page read and write
5F7A000
trusted library allocation
page read and write
1EE3123C000
trusted library allocation
page read and write
5040000
direct allocation
page read and write
1040000
heap
page read and write
529F000
trusted library allocation
page read and write
1D530000
heap
page read and write
13BE000
stack
page read and write
1EE25740000
heap
page read and write
BB3000
unkown
page execute and read and write
1EE2574A000
heap
page read and write
1EE30AF8000
trusted library allocation
page read and write
750000
heap
page read and write
1EE2A068000
trusted library allocation
page read and write
4AC1000
heap
page read and write
116D000
heap
page read and write
113E000
heap
page read and write
4BC2000
heap
page read and write
1EE25700000
heap
page read and write
BF0000
heap
page read and write
45C1000
heap
page read and write
58F0000
trusted library allocation
page read and write
1EE36A43000
trusted library allocation
page read and write
7B5000
unkown
page execute and read and write
1EE30860000
trusted library allocation
page read and write
1EE3686A000
trusted library allocation
page read and write
617000
heap
page read and write
1EE2E403000
trusted library allocation
page read and write
1EE1E920000
heap
page read and write
5285000
trusted library allocation
page read and write
260AA426000
heap
page read and write
1658000
heap
page read and write
52B2000
trusted library allocation
page read and write
11A2000
heap
page read and write
1EE2F295000
trusted library allocation
page read and write
6C805000
unkown
page readonly
32BE000
stack
page read and write
1EE1E800000
trusted library allocation
page read and write
17F37C5D000
trusted library allocation
page read and write
1134000
heap
page read and write
1EE2574A000
heap
page read and write
1EE30E70000
trusted library allocation
page read and write
1EE2AB00000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page read and write
1EE2EC81000
trusted library allocation
page read and write
1134000
heap
page read and write
568D000
trusted library allocation
page read and write
1EE2A77E000
trusted library allocation
page read and write
D17000
heap
page read and write
1454000
heap
page read and write
1EE322FE000
trusted library allocation
page read and write
1EE36AAE000
trusted library allocation
page read and write
1EE25762000
heap
page read and write
A74000
heap
page read and write
1EE257AA000
heap
page read and write
1EE30AF2000
trusted library allocation
page read and write
4BE0000
direct allocation
page execute and read and write
4BC1000
heap
page read and write
1EE322E7000
trusted library allocation
page read and write
1EE2E9FB000
trusted library allocation
page read and write
1EE2A600000
trusted library allocation
page read and write
11A6000
heap
page read and write
B44000
heap
page read and write
4E01000
heap
page read and write
5365000
trusted library allocation
page read and write
1EE2A7C4000
trusted library allocation
page read and write
1EE2F3F0000
trusted library allocation
page read and write
1EE2A08A000
trusted library allocation
page read and write
1EE2E460000
trusted library allocation
page read and write
5BB0000
trusted library allocation
page read and write
C05000
unkown
page execute and write copy
1EE25750000
heap
page read and write
1EE30993000
trusted library allocation
page read and write
511103E000
stack
page read and write
1EE25752000
heap
page read and write
558A000
trusted library allocation
page read and write
1EE257B4000
heap
page read and write
32BF000
stack
page read and write
1EE2F3BB000
trusted library allocation
page read and write
2ED0000
direct allocation
page read and write
1EE2F42A000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1EE2E4CB000
trusted library allocation
page read and write
5285000
trusted library allocation
page read and write
108E000
stack
page read and write
5B49000
trusted library allocation
page read and write
1EE2BB00000
trusted library allocation
page read and write
5119CFD000
stack
page read and write
CE1000
unkown
page execute and write copy
4BC1000
heap
page read and write
1EE38B20000
trusted library allocation
page read and write
1D500000
heap
page read and write
1EE30F51000
trusted library allocation
page read and write
1EE257A2000
heap
page read and write
1EE2EC91000
trusted library allocation
page read and write
6C4000
heap
page read and write
29688000
heap
page read and write
5B3F000
trusted library allocation
page read and write
51FE000
stack
page read and write
1EE313BA000
trusted library allocation
page read and write
45C1000
heap
page read and write
624000
heap
page read and write
BD4000
heap
page read and write
1D536000
heap
page read and write
1EE302E6000
trusted library allocation
page read and write
1E0857A0000
heap
page read and write
4B90000
direct allocation
page read and write
3E7E000
stack
page read and write
4BC1000
heap
page read and write
1EE30AE4000
trusted library allocation
page read and write
45C1000
heap
page read and write
1EE36A3F000
trusted library allocation
page read and write
5BED000
trusted library allocation
page read and write
1EE2E392000
trusted library allocation
page read and write
511723A000
stack
page read and write
1EE2E9E0000
trusted library allocation
page read and write
3A7F000
stack
page read and write
1EE3050A000
trusted library allocation
page read and write
1EE30AE3000
trusted library allocation
page read and write
1EE2A700000
trusted library allocation
page read and write
5F66000
trusted library allocation
page read and write
1EE3011B000
trusted library allocation
page read and write
5284000
trusted library allocation
page read and write
4A30000
direct allocation
page read and write
1EE25753000
heap
page read and write
45C1000
heap
page read and write
1EE2578A000
heap
page read and write
FEF000
heap
page read and write
5AD7000
trusted library allocation
page read and write
511ADFE000
stack
page read and write
1EE311A1000
trusted library allocation
page read and write
1EE305EB000
trusted library allocation
page read and write
A00000
heap
page read and write
51A0000
direct allocation
page execute and read and write
577E000
trusted library allocation
page read and write
1EE304B1000
trusted library allocation
page read and write
1EE38CCD000
trusted library allocation
page read and write
1EE313C0000
trusted library allocation
page read and write
4BC1000
heap
page read and write
110E000
heap
page read and write
511182E000
stack
page read and write
1EE3117F000
trusted library allocation
page read and write
1454000
heap
page read and write
1EE30509000
trusted library allocation
page read and write
433F000
stack
page read and write
1920000
trusted library allocation
page read and write
392E000
stack
page read and write
1EE30471000
trusted library allocation
page read and write
12AE000
stack
page read and write
1EE3883C000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
1EE309D3000
trusted library allocation
page read and write
4ABE000
stack
page read and write
48FF000
stack
page read and write
1EE3683F000
trusted library allocation
page read and write
1EE30FE5000
trusted library allocation
page read and write
4AC1000
heap
page read and write
2DC000
unkown
page execute and write copy
1EE2AAD8000
trusted library allocation
page read and write
1EE30A03000
trusted library allocation
page read and write
1EE25755000
heap
page read and write
5F97000
trusted library allocation
page read and write
1EE36663000
trusted library allocation
page read and write
1EE2BB04000
trusted library allocation
page read and write
3F3E000
stack
page read and write
CE0000
unkown
page read and write
1EE30F47000
trusted library allocation
page read and write
38FE000
stack
page read and write
1EE302EF000
trusted library allocation
page read and write
3EFF000
stack
page read and write
1454000
heap
page read and write
3E480FE000
unkown
page readonly
1EE3170D000
trusted library allocation
page read and write
1EE367F6000
trusted library allocation
page read and write
5260000
remote allocation
page read and write
1EE2F040000
trusted library allocation
page read and write
6C620000
unkown
page readonly
1EE36948000
trusted library allocation
page read and write
1EE30A20000
trusted library allocation
page read and write
511AA7E000
stack
page read and write
10ED000
stack
page read and write
1EE2575B000
heap
page read and write
107A000
heap
page read and write
51C0000
direct allocation
page execute and read and write
1EE2FC70000
trusted library section
page read and write
5289000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
1EE31009000
trusted library allocation
page read and write
573000
unkown
page execute and read and write
33DF000
stack
page read and write
63F000
heap
page read and write
550000
direct allocation
page read and write
1EE2E5CD000
trusted library allocation
page read and write
1E083F0A000
trusted library allocation
page read and write
5F8E000
stack
page read and write
1EE3125F000
trusted library allocation
page read and write
1EE2EA87000
trusted library allocation
page read and write
B44000
heap
page read and write
37FE000
stack
page read and write
1664000
heap
page read and write
1EE36CFE000
trusted library allocation
page read and write
5AD2000
trusted library allocation
page read and write
D00000
heap
page read and write
1EE2C213000
trusted library allocation
page read and write
1EE308C1000
trusted library allocation
page read and write
1EE1E915000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
1EE2A1DE000
trusted library allocation
page read and write
1EE3085D000
trusted library allocation
page read and write
1EE368FC000
trusted library allocation
page read and write
3A3F000
stack
page read and write
A74000
heap
page read and write
1EE309A0000
trusted library allocation
page read and write
1EE257A6000
heap
page read and write
1EE2EC9E000
trusted library allocation
page read and write
1EE320A6000
trusted library allocation
page read and write
1EE322FC000
trusted library allocation
page read and write
1005000
heap
page read and write
52C0000
trusted library allocation
page read and write
1EE30A82000
trusted library allocation
page read and write
260A9CA0000
trusted library allocation
page read and write
5ADC000
trusted library allocation
page read and write
1EE2F0E7000
trusted library allocation
page read and write
1160000
heap
page read and write
4A00000
direct allocation
page execute and read and write
16A3000
heap
page read and write
1EE30BE0000
trusted library allocation
page read and write
1EE2E5AE000
trusted library allocation
page read and write
45C1000
heap
page read and write
1454000
heap
page read and write
1EE2E4CB000
trusted library allocation
page read and write
1EE30BA7000
trusted library allocation
page read and write
563B000
trusted library allocation
page read and write
1B4CF000
stack
page read and write
5B5000
unkown
page execute and read and write
1EE309D4000
trusted library allocation
page read and write
1EE25750000
heap
page read and write
2D5F000
stack
page read and write
4931000
heap
page read and write
307E000
stack
page read and write
1134000
heap
page read and write
1EE30258000
trusted library allocation
page read and write
260AA3F2000
heap
page read and write
4441000
heap
page read and write
1EE302E8000
trusted library allocation
page read and write
6C4000
heap
page read and write
A3B000
unkown
page execute and write copy
5FAB000
trusted library allocation
page read and write
1EE30A97000
trusted library allocation
page read and write
1EE2DA0D000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1EE2F9FD000
trusted library allocation
page read and write
57D000
unkown
page execute and write copy
754000
heap
page read and write
260A9789000
trusted library allocation
page read and write
1EE30AE7000
trusted library allocation
page read and write
1EE2EBF7000
trusted library allocation
page read and write
550000
direct allocation
page read and write
1EE3177C000
trusted library allocation
page read and write
600A000
trusted library allocation
page read and write
1EE2C100000
trusted library allocation
page read and write
4A30000
direct allocation
page read and write
11B3000
heap
page read and write
1EE3094E000
trusted library allocation
page read and write
4AC1000
heap
page read and write
4441000
heap
page read and write
1EE25742000
heap
page read and write
5582000
trusted library allocation
page read and write
574F000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
1EE30CAF000
trusted library allocation
page read and write
4880000
trusted library allocation
page read and write
4441000
heap
page read and write
1EE36A81000
trusted library allocation
page read and write
1EE36968000
trusted library allocation
page read and write
4441000
heap
page read and write
5ABA000
trusted library allocation
page read and write
5BDF000
trusted library allocation
page read and write
566000
unkown
page execute and read and write
5116C39000
stack
page read and write
FB0000
heap
page read and write
58F9000
trusted library allocation
page read and write
1EE25743000
heap
page read and write
1EE2E569000
trusted library allocation
page read and write
A2C000
unkown
page execute and write copy
1EE30206000
trusted library allocation
page read and write
1EE302C1000
trusted library allocation
page read and write
635000
heap
page read and write
6C4000
heap
page read and write
5283000
trusted library allocation
page read and write
1EE2EBE6000
trusted library allocation
page read and write
F74D9705000
trusted library allocation
page read and write
27E0000
direct allocation
page read and write
1234000
heap
page read and write
1EE2F8A2000
trusted library allocation
page read and write
4BC1000
heap
page read and write
4A30000
direct allocation
page read and write
CBD000
heap
page read and write
1EE3087B000
trusted library allocation
page read and write
11AD000
heap
page read and write
FB0000
direct allocation
page read and write
FB0000
direct allocation
page read and write
993000
unkown
page execute and read and write
26F0000
direct allocation
page read and write
4BC1000
heap
page read and write
1EE2575E000
heap
page read and write
1EE2E9E0000
trusted library allocation
page read and write
1B93E000
stack
page read and write
4790000
remote allocation
page read and write
1EE2C309000
trusted library allocation
page read and write
3B9E000
stack
page read and write
616000
heap
page read and write
52A1000
trusted library allocation
page read and write
1ADEF000
stack
page read and write
1EE2575B000
heap
page read and write
1EE305F4000
trusted library allocation
page read and write
260AA46D000
heap
page read and write
5C0000
heap
page read and write
52EB000
trusted library allocation
page read and write
1EE36CE1000
trusted library allocation
page read and write
1EE2EBB5000
trusted library allocation
page read and write
260AA3F9000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
11E0000
heap
page read and write
1EE30448000
trusted library allocation
page read and write
1EE2EF03000
trusted library allocation
page read and write
10FD000
stack
page read and write
635000
heap
page read and write
4C5000
unkown
page execute and read and write
1EE38B31000
trusted library allocation
page read and write
1EE2E453000
trusted library allocation
page read and write
405F000
stack
page read and write
52B3000
trusted library allocation
page read and write
1EE257A1000
heap
page read and write
45C1000
heap
page read and write
260A9703000
trusted library allocation
page read and write
1EE30AA4000
trusted library allocation
page read and write
1EE3686E000
trusted library allocation
page read and write
528F000
trusted library allocation
page read and write
1EE2ABE2000
trusted library allocation
page read and write
5EB2000
trusted library allocation
page read and write
11B3000
heap
page read and write
1EE2C203000
trusted library allocation
page read and write
1EE3075F000
trusted library allocation
page read and write
566000
unkown
page execute and write copy
D00000
heap
page read and write
511937B000
stack
page read and write
1EE2F67C000
trusted library allocation
page read and write
1EE30ED4000
trusted library allocation
page read and write
5589000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
1EE305EB000
trusted library allocation
page read and write
1EE2575B000
heap
page read and write
45C1000
heap
page read and write
1134000
heap
page read and write
B5C000
unkown
page read and write
1EE2EC7D000
trusted library allocation
page read and write
1EE30993000
trusted library allocation
page read and write
1EE306B4000
trusted library allocation
page read and write
260AA39C000
heap
page read and write
605E000
trusted library allocation
page read and write
AFD000
stack
page read and write
1EE302C6000
trusted library allocation
page read and write
1EE2E5C9000
trusted library allocation
page read and write
1EE313EC000
trusted library allocation
page read and write
1EE38BB5000
trusted library allocation
page read and write
1EE257A1000
heap
page read and write
1EE25754000
heap
page read and write
4BC2000
heap
page read and write
1EE30197000
trusted library allocation
page read and write
1EE36C98000
trusted library allocation
page read and write
4A30000
direct allocation
page read and write
5240000
direct allocation
page execute and read and write
5B41000
trusted library allocation
page read and write
D3D000
heap
page read and write
D49000
unkown
page write copy
1037000
heap
page read and write
1EE2F836000
trusted library allocation
page read and write
1EE3048D000
trusted library allocation
page read and write
37BE000
stack
page read and write
431E000
stack
page read and write
2F786000
heap
page read and write
1EE38C03000
trusted library allocation
page read and write
5119D3C000
stack
page read and write
1EE30BE3000
trusted library allocation
page read and write
1EE2ECC7000
trusted library allocation
page read and write
45C1000
heap
page read and write
1EE2E37E000
trusted library allocation
page read and write
1EE36ADE000
trusted library allocation
page read and write
5584000
trusted library allocation
page read and write
1EE2E4A2000
trusted library allocation
page read and write
1EE257A6000
heap
page read and write
51C0000
direct allocation
page execute and read and write
1EE368F8000
trusted library allocation
page read and write
754000
heap
page read and write
260A97BA000
trusted library allocation
page read and write
FA4000
heap
page read and write
119C000
heap
page read and write
5B50000
trusted library allocation
page read and write
2F3E000
stack
page read and write
260A9590000
heap
page readonly
302F000
stack
page read and write
893C9FD000
stack
page read and write
37BF000
stack
page read and write
1234000
heap
page read and write
1EE2EC54000
trusted library allocation
page read and write
1EE307AE000
trusted library allocation
page read and write
1EE2DFBA000
heap
page read and write
9A2000
unkown
page execute and write copy
1B3AF000
stack
page read and write
1EE2AAFD000
trusted library allocation
page read and write
9C4000
unkown
page execute and read and write
52D3000
trusted library allocation
page read and write
4441000
heap
page read and write
51117CB000
stack
page read and write
2B49A911000
trusted library allocation
page execute read
2C4E000
stack
page read and write
51C0000
direct allocation
page execute and read and write
467000
unkown
page execute and read and write
1EE1EA94000
trusted library allocation
page read and write
1D532000
heap
page read and write
1EE30839000
trusted library allocation
page read and write
27E0000
direct allocation
page read and write
1EE3683D000
trusted library allocation
page read and write
1EE303DB000
trusted library allocation
page read and write
1EE2EC90000
trusted library allocation
page read and write
1EE2EC9C000
trusted library allocation
page read and write
1EE36866000
trusted library allocation
page read and write
4441000
heap
page read and write
1EE312C4000
trusted library allocation
page read and write
1EE368F8000
trusted library allocation
page read and write
1EE2E49C000
trusted library allocation
page read and write
4A51000
heap
page read and write
1EE30BCC000
trusted library allocation
page read and write
535C000
trusted library allocation
page read and write
126E000
stack
page read and write
5B50000
trusted library allocation
page read and write
2CC0000
direct allocation
page read and write
1EE305E6000
trusted library allocation
page read and write
1EE30AB5000
trusted library allocation
page read and write
1EE2ABAB000
trusted library allocation
page read and write
4441000
heap
page read and write
13B3000
heap
page read and write
1EE2B600000
trusted library allocation
page read and write
D1D000
heap
page read and write
4BC1000
heap
page read and write
1EE25775000
heap
page read and write
1EE30AE9000
trusted library allocation
page read and write
D3C000
heap
page read and write
1EE30C87000
trusted library allocation
page read and write
1EE2A186000
trusted library allocation
page read and write
1EE2ECBC000
trusted library allocation
page read and write
1EE31274000
trusted library allocation
page read and write
3644000
heap
page read and write
90F000
unkown
page execute and read and write
13AC000
heap
page read and write
5C1000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
260AA426000
heap
page read and write
45C1000
heap
page read and write
1EE32200000
trusted library allocation
page read and write
51A0000
direct allocation
page execute and read and write
1EE314DE000
trusted library allocation
page read and write
42DF000
stack
page read and write
45C1000
heap
page read and write
1AE2E000
stack
page read and write
52D000
unkown
page execute and read and write
4CE000
unkown
page execute and read and write
1EE30945000
trusted library allocation
page read and write
4BC1000
heap
page read and write
5AB0000
trusted library allocation
page read and write
5ACA000
trusted library allocation
page read and write
1920000
trusted library allocation
page read and write
1EE30BCA000
trusted library allocation
page read and write
1EE302E4000
trusted library allocation
page read and write
1EE3085D000
trusted library allocation
page read and write
1193000
heap
page read and write
5B50000
trusted library allocation
page read and write
1400000
direct allocation
page read and write
1EE3075D000
trusted library allocation
page read and write
757F000
stack
page read and write
C7F000
heap
page read and write
260A9CBD000
unkown
page execute read
1EE2ECA1000
trusted library allocation
page read and write
1EE202C1000
heap
page read and write
B0C000
unkown
page readonly
1027000
heap
page read and write
531B000
trusted library allocation
page read and write
1EE2AAA9000
trusted library allocation
page read and write
23AB0A40000
heap
page read and write
BD4000
heap
page read and write
51C0000
direct allocation
page execute and read and write
1EE30AD1000
trusted library allocation
page read and write
1EE30D33000
trusted library allocation
page read and write
1EE257B2000
heap
page read and write
1EE36918000
trusted library allocation
page read and write
5288000
trusted library allocation
page read and write
5EBA000
trusted library allocation
page read and write
2D7F000
stack
page read and write
1D53E000
heap
page read and write
5625000
trusted library allocation
page read and write
250000
unkown
page readonly
1EE2F3C3000
trusted library allocation
page read and write
1EE2575B000
heap
page read and write
135E000
heap
page read and write
4441000
heap
page read and write
511703B000
stack
page read and write
1EE2A1AD000
trusted library allocation
page read and write
58FF000
trusted library allocation
page read and write
1EE30859000
trusted library allocation
page read and write
5F1D000
trusted library allocation
page read and write
1EE2C000000
trusted library allocation
page read and write
30BE000
stack
page read and write
1EE30A82000
trusted library allocation
page read and write
1150000
heap
page read and write
260A98D6000
heap
page read and write
1EE2ECC0000
trusted library allocation
page read and write
511123E000
stack
page read and write
45C1000
heap
page read and write
555000
unkown
page execute and write copy
5BB0000
trusted library allocation
page read and write
17F37D0E000
trusted library allocation
page read and write
1EE368F9000
trusted library allocation
page read and write
56BC000
trusted library allocation
page read and write
1EE30B00000
trusted library allocation
page read and write
52D3000
trusted library allocation
page read and write
1EE368D8000
trusted library allocation
page read and write
1EE303FB000
trusted library allocation
page read and write
5210000
direct allocation
page execute and read and write
120A000
heap
page read and write
4AB1000
direct allocation
page read and write
1EE2E5C9000
trusted library allocation
page read and write
1EE3360E000
trusted library allocation
page read and write
1108000
heap
page read and write
1EE2BB8A000
trusted library allocation
page read and write
1EE2E85F000
trusted library allocation
page read and write
1EE257A2000
heap
page read and write
1D25D000
stack
page read and write
1EE257AC000
heap
page read and write
4A8E000
stack
page read and write
1D527000
heap
page read and write
5B33000
trusted library allocation
page read and write
BD4000
heap
page read and write
1EE3088C000
trusted library allocation
page read and write
B44000
heap
page read and write
816C000
stack
page read and write
5260000
remote allocation
page read and write
1EE30511000
trusted library allocation
page read and write
260A98D4000
heap
page read and write
1EE368E6000
trusted library allocation
page read and write
1EE366BE000
trusted library allocation
page read and write
58F6000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
D1D000
heap
page read and write
4DA0000
direct allocation
page read and write
1EE30869000
trusted library allocation
page read and write
6C4000
heap
page read and write
1234000
heap
page read and write
1EE2F98D000
trusted library allocation
page read and write
1EE36C7E000
trusted library allocation
page read and write
1EE31486000
trusted library allocation
page read and write
45B0000
direct allocation
page read and write
260AA420000
heap
page read and write
4BC1000
heap
page read and write
4441000
heap
page read and write
5F65000
trusted library allocation
page read and write
529A000
trusted library allocation
page read and write
1EE2F378000
trusted library allocation
page read and write
5A9E000
stack
page read and write
602E000
trusted library allocation
page read and write
1EE30B6B000
trusted library allocation
page read and write
1EE2DA0F000
trusted library allocation
page read and write
4EFF000
stack
page read and write
5585000
trusted library allocation
page read and write
1EE314DB000
trusted library allocation
page read and write
1EE25745000
heap
page read and write
1EE305E6000
trusted library allocation
page read and write
1EE38CDD000
trusted library allocation
page read and write
1370000
heap
page read and write
5354000
trusted library allocation
page read and write
56D000
unkown
page execute and write copy
1EE38EA3000
trusted library allocation
page read and write
3E0E000
stack
page read and write
1EE309FD000
trusted library allocation
page read and write
1EE36C9C000
trusted library allocation
page read and write
3E457D8000
stack
page read and write
11E0000
direct allocation
page read and write
1EE36880000
trusted library allocation
page read and write
1EE2DA64000
trusted library allocation
page read and write
1EE31200000
trusted library allocation
page read and write
4441000
heap
page read and write
45C1000
heap
page read and write
1EE300FC000
trusted library allocation
page read and write
1EE2A000000
trusted library allocation
page read and write
28FE000
stack
page read and write
1EE2EA63000
trusted library allocation
page read and write
1EE3124B000
trusted library allocation
page read and write
4C2000
unkown
page execute and write copy
3F2F000
stack
page read and write
5392000
trusted library allocation
page read and write
5EB3000
trusted library allocation
page read and write
1EE2575E000
heap
page read and write
4F4000
unkown
page execute and read and write
1EE309C8000
trusted library allocation
page read and write
1EE2578D000
heap
page read and write
1EE2A12D000
trusted library allocation
page read and write
1D525000
heap
page read and write
1624000
heap
page read and write
1EE30533000
trusted library allocation
page read and write
1EE310F5000
trusted library allocation
page read and write
45B0000
direct allocation
page read and write
1EE3050F000
trusted library allocation
page read and write
1EE309DA000
trusted library allocation
page read and write
1EE2A081000
trusted library allocation
page read and write
1EE2FCBF000
unclassified section
page read and write
1EE25750000
heap
page read and write
D86FE904000
trusted library allocation
page read and write
3E47078000
stack
page read and write
307F000
stack
page read and write
5070000
direct allocation
page execute and read and write
4321000
heap
page read and write
1EE2DAF9000
trusted library allocation
page read and write
32BE000
stack
page read and write
3BBE000
stack
page read and write
1EE305F2000
trusted library allocation
page read and write
56D6000
trusted library allocation
page read and write
2FD0000
direct allocation
page read and write
4EED000
trusted library allocation
page execute and read and write
1EE30AB0000
trusted library allocation
page read and write
1EE2E5B8000
trusted library allocation
page read and write
5310000
trusted library allocation
page read and write
2EBE000
stack
page read and write
D3B000
heap
page read and write
A4A000
unkown
page execute and read and write
1EE2575D000
heap
page read and write
1EE322A9000
trusted library allocation
page read and write
BD4000
heap
page read and write
17F37C03000
trusted library allocation
page read and write
1EE2F6B2000
trusted library allocation
page read and write
1EE367FE000
trusted library allocation
page read and write
27E0000
direct allocation
page read and write
3DDF000
stack
page read and write
1920000
trusted library allocation
page read and write
893D1FE000
stack
page read and write
343E000
stack
page read and write
5111681000
stack
page read and write
1EE2FF00000
trusted library allocation
page read and write
4321000
heap
page read and write
1EE3073A000
trusted library allocation
page read and write
550000
direct allocation
page read and write
5AC6000
trusted library allocation
page read and write
DB107FE000
stack
page read and write
37BF000
stack
page read and write
5365000
trusted library allocation
page read and write
1134000
heap
page read and write
1EE30F00000
trusted library allocation
page read and write
4DC0000
direct allocation
page read and write
57C000
unkown
page execute and write copy
52DA000
trusted library allocation
page read and write
1EE2E5CD000
trusted library allocation
page read and write
A1B000
unkown
page execute and write copy
2A7E000
stack
page read and write
445E000
stack
page read and write
1EE3029B000
trusted library allocation
page read and write
4CFE000
stack
page read and write
4BC1000
heap
page read and write
45C1000
heap
page read and write
BD4000
heap
page read and write
1EE2E5C7000
trusted library allocation
page read and write
1B40E000
stack
page read and write
4321000
heap
page read and write
1EE2C113000
trusted library allocation
page read and write
F5B000
stack
page read and write
1EE30BE0000
trusted library allocation
page read and write
58FD000
trusted library allocation
page read and write
4BC1000
heap
page read and write
4920000
direct allocation
page execute and read and write
5355000
trusted library allocation
page read and write
260AA3A0000
heap
page read and write
1EE2E500000
trusted library allocation
page read and write
5118ABC000
stack
page read and write
1EE36ADC000
trusted library allocation
page read and write
4F70000
direct allocation
page execute and read and write
1EE31372000
trusted library allocation
page read and write
A4A000
unkown
page execute and write copy
1134000
heap
page read and write
270000
unkown
page read and write
5EB0000
trusted library allocation
page read and write
1EE301CC000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
2F70000
heap
page read and write
1EE2DDD2000
trusted library allocation
page read and write
1D51B000
heap
page read and write
545D000
stack
page read and write
1EE367BC000
trusted library allocation
page read and write
574000
unkown
page execute and write copy
1EE30D96000
trusted library allocation
page read and write
51A0000
direct allocation
page execute and read and write
1EE30993000
trusted library allocation
page read and write
1E083BB2000
heap
page read and write
260A95C0000
trusted library section
page readonly
1EE303E3000
trusted library allocation
page read and write
1EE30AAF000
trusted library allocation
page read and write
260A9715000
trusted library allocation
page read and write
5ACC000
trusted library allocation
page read and write
1EE2E870000
trusted library allocation
page read and write
1EE30B9C000
trusted library allocation
page read and write
1EE36CE1000
trusted library allocation
page read and write
4BD0000
direct allocation
page execute and read and write
1EE30869000
trusted library allocation
page read and write
1EE3688E000
trusted library allocation
page read and write
4CE000
unkown
page execute and read and write
574000
unkown
page execute and write copy
1EE308C1000
trusted library allocation
page read and write
2890000
direct allocation
page execute and read and write
1EE36821000
trusted library allocation
page read and write
260A9600000
trusted library allocation
page read and write
11A3000
heap
page read and write
1EE25752000
heap
page read and write
1EE25746000
heap
page read and write
1EE2EC60000
trusted library allocation
page read and write
45C1000
heap
page read and write
1EE30AA1000
trusted library allocation
page read and write
1EE2B66C000
trusted library allocation
page read and write
A74000
heap
page read and write
27E0000
direct allocation
page read and write
1730000
heap
page read and write
52B3000
trusted library allocation
page read and write
1EE2E562000
trusted library allocation
page read and write
1EE1E7C9000
heap
page read and write
404F000
stack
page read and write
1EE34718000
trusted library allocation
page read and write
1EE2FFBA000
trusted library allocation
page read and write
1454000
heap
page read and write
5EB8000
trusted library allocation
page read and write
159F000
stack
page read and write
1EE304C0000
trusted library allocation
page read and write
1EE2E5C9000
trusted library allocation
page read and write
4976000
trusted library allocation
page read and write
566B000
trusted library allocation
page read and write
1EE367F2000
trusted library allocation
page read and write
5285000
trusted library allocation
page read and write
4A30000
trusted library allocation
page read and write
1ACEF000
stack
page read and write
4B9F000
stack
page read and write
921000
unkown
page execute and write copy
1EE30200000
trusted library allocation
page read and write
FA4000
heap
page read and write
1EE25755000
heap
page read and write
1EE2E88B000
trusted library allocation
page read and write
1EE3362A000
trusted library allocation
page read and write
2B2000
unkown
page execute and read and write
1EE309FC000
trusted library allocation
page read and write
1EE2DAAB000
trusted library allocation
page read and write
1EE25742000
heap
page read and write
260A9774000
trusted library allocation
page read and write
D6F000
stack
page read and write
1EE30C37000
trusted library allocation
page read and write
1EE2579C000
heap
page read and write
1EE2C509000
trusted library allocation
page read and write
1D522000
heap
page read and write
1EE36976000
trusted library allocation
page read and write
52AF000
trusted library allocation
page read and write
1EE308F0000
trusted library allocation
page read and write
1EE30BDD000
trusted library allocation
page read and write
1EE30BEC000
trusted library allocation
page read and write
5E8000
heap
page read and write
5365000
trusted library allocation
page read and write
780000
unkown
page readonly
1EE25743000
heap
page read and write
1EE38CBD000
trusted library allocation
page read and write
1EE302EA000
trusted library allocation
page read and write
5631000
trusted library allocation
page read and write
45C1000
heap
page read and write
45C1000
heap
page read and write
493E000
stack
page read and write
624000
heap
page read and write
1EE30BE0000
trusted library allocation
page read and write
260AA3EA000
heap
page read and write
1EE2E803000
trusted library allocation
page read and write
1EE2FE0B000
trusted library allocation
page read and write
562D000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
93C000
unkown
page execute and read and write
1EE25750000
heap
page read and write
1EE2B910000
heap
page read and write
1EE309BA000
trusted library allocation
page read and write
53DF000
trusted library allocation
page read and write
27E0000
direct allocation
page read and write
11AF000
heap
page read and write
1EE2F2D3000
trusted library allocation
page read and write
1EE2FF47000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
1EE3072D000
trusted library allocation
page read and write
52A4000
trusted library allocation
page read and write
4BC1000
heap
page read and write
A74000
heap
page read and write
4A10000
direct allocation
page execute and read and write
251000
unkown
page execute and write copy
46AF000
stack
page read and write
4AC1000
heap
page read and write
1134000
heap
page read and write
51112BB000
stack
page read and write
1EE30E99000
trusted library allocation
page read and write
61D000
heap
page read and write
1EE30BD2000
trusted library allocation
page read and write
1134000
heap
page read and write
17F37D12000
trusted library allocation
page read and write
1EE3687A000
trusted library allocation
page read and write
1EE2E49C000
trusted library allocation
page read and write
1EE36A00000
trusted library allocation
page read and write
1D53E000
heap
page read and write
1EE367AC000
trusted library allocation
page read and write
A74000
heap
page read and write
1160000
heap
page read and write
133F000
stack
page read and write
621000
heap
page read and write
1EE31745000
trusted library allocation
page read and write
1EE2E89F000
trusted library allocation
page read and write
33BF000
stack
page read and write
260AA432000
heap
page read and write
5BA7000
trusted library allocation
page read and write
3BFD000
stack
page read and write
1134000
heap
page read and write
5ACF000
trusted library allocation
page read and write
1EE2DD5A000
trusted library allocation
page read and write
1EE2DD11000
trusted library allocation
page read and write
1EE314E7000
trusted library allocation
page read and write
1EE30A27000
trusted library allocation
page read and write
17F37CA4000
trusted library allocation
page read and write
56BE000
trusted library allocation
page read and write
3A2F000
stack
page read and write
1EE3098E000
trusted library allocation
page read and write
5119BBB000
stack
page read and write
1EE33626000
trusted library allocation
page read and write
11A6000
heap
page read and write
1EE2EC3B000
trusted library allocation
page read and write
1EE2575B000
heap
page read and write
4BC1000
heap
page read and write
4441000
heap
page read and write
F74D9721000
trusted library allocation
page read and write
52BE000
trusted library allocation
page read and write
1EE2EA0E000
trusted library allocation
page read and write
628000
heap
page read and write
17F37940000
heap
page read and write
1EE3212B000
trusted library allocation
page read and write
1EE3051C000
trusted library allocation
page read and write
5EB3000
trusted library allocation
page read and write
1EE2E8F4000
trusted library allocation
page read and write
45C1000
heap
page read and write
1EE30427000
trusted library allocation
page read and write
1EE2F676000
trusted library allocation
page read and write
5EB1000
trusted library allocation
page read and write
1EE31398000
trusted library allocation
page read and write
1EE2579C000
heap
page read and write
1EE2DB6E000
trusted library allocation
page read and write
260A9723000
trusted library allocation
page read and write
13FE000
stack
page read and write
260AA42C000
heap
page read and write
3DBF000
stack
page read and write
511B000
trusted library allocation
page read and write
11E0000
direct allocation
page read and write
1EE2AAB7000
trusted library allocation
page read and write
1EE32122000
trusted library allocation
page read and write
6C4000
heap
page read and write
1EE32003000
trusted library allocation
page read and write
1EE31075000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1EE321EB000
trusted library allocation
page read and write
1EE30F03000
trusted library allocation
page read and write
1EE30300000
trusted library allocation
page read and write
1EE30ADA000
trusted library allocation
page read and write
1EE2F3C3000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1EE30970000
trusted library allocation
page read and write
1EE257A5000
heap
page read and write
CBD000
heap
page read and write
C65000
heap
page read and write
1EE309D2000
trusted library allocation
page read and write
B0C000
unkown
page readonly
4441000
heap
page read and write
F7E000
stack
page read and write
5284000
trusted library allocation
page read and write
52C9000
trusted library allocation
page read and write
2F3F000
stack
page read and write
39FF000
stack
page read and write
1EE302E6000
trusted library allocation
page read and write
5AC4000
trusted library allocation
page read and write
1019000
heap
page read and write
11FB000
heap
page read and write
1EE30A3B000
trusted library allocation
page read and write
1EE30A42000
trusted library allocation
page read and write
1EE301AF000
trusted library allocation
page read and write
5B38000
trusted library allocation
page read and write
3F7F000
stack
page read and write
1EE33606000
trusted library allocation
page read and write
A1F000
unkown
page execute and write copy
1EE2A2FA000
trusted library allocation
page read and write
5F89000
trusted library allocation
page read and write
1EE2F61D000
trusted library allocation
page read and write
1EE2A16D000
trusted library allocation
page read and write
1D525000
heap
page read and write
5180000
direct allocation
page execute and read and write
1EE32203000
trusted library allocation
page read and write
1D530000
heap
page read and write
15FC4E24000
trusted library allocation
page read and write
1134000
heap
page read and write
1340000
heap
page read and write
1EE2C600000
trusted library allocation
page read and write
1EE3098A000
trusted library allocation
page read and write
1EE3686A000
trusted library allocation
page read and write
1EE2F921000
trusted library allocation
page read and write
49FF000
stack
page read and write
94F000
unkown
page execute and read and write
52A2000
trusted library allocation
page read and write
1EE30BFA000
trusted library allocation
page read and write
4441000
heap
page read and write
31BF000
stack
page read and write
5B3B000
trusted library allocation
page read and write
45B0000
direct allocation
page read and write
467F000
stack
page read and write
56D5000
trusted library allocation
page read and write
558F000
trusted library allocation
page read and write
BD4000
heap
page read and write
1EE30BEF000
trusted library allocation
page read and write
2CC0000
direct allocation
page read and write
1EE2EC69000
trusted library allocation
page read and write
26F0000
direct allocation
page read and write
1EE2F6BF000
trusted library allocation
page read and write
1EE2FF93000
trusted library allocation
page read and write
4DA0000
direct allocation
page read and write
F65000
heap
page read and write
2CFE000
stack
page read and write
45C1000
heap
page read and write
38BF000
stack
page read and write
136F000
heap
page read and write
1EE368A8000
trusted library allocation
page read and write
11BB000
heap
page read and write
1EE30BFA000
trusted library allocation
page read and write
1EE30C37000
trusted library allocation
page read and write
3CFE000
stack
page read and write
1EE2575B000
heap
page read and write
1EE2574A000
heap
page read and write
1EE2AB54000
trusted library allocation
page read and write
571000
unkown
page execute and write copy
1EE30522000
trusted library allocation
page read and write
4BC1000
heap
page read and write
4AC1000
heap
page read and write
58F6000
trusted library allocation
page read and write
1EE2C910000
trusted library section
page readonly
4AC1000
heap
page read and write
5354000
trusted library allocation
page read and write
1EE3695D000
trusted library allocation
page read and write
1EE257A1000
heap
page read and write
56CF000
trusted library allocation
page read and write
1EE3095B000
trusted library allocation
page read and write
1EE3088A000
trusted library allocation
page read and write
1EE2A09E000
trusted library allocation
page read and write
1D10E000
stack
page read and write
511AB3E000
stack
page read and write
1EE32142000
trusted library allocation
page read and write
1EE311C0000
trusted library allocation
page read and write
1EE36673000
trusted library allocation
page read and write
1EE2FFA2000
trusted library allocation
page read and write
4BC2000
heap
page read and write
4BC2000
heap
page read and write
7FE000
stack
page read and write
1EE30224000
trusted library allocation
page read and write
52C0000
trusted library allocation
page read and write
1920000
trusted library allocation
page read and write
511A07B000
stack
page read and write
615000
heap
page read and write
260AA43C000
heap
page read and write
1EE25762000
heap
page read and write
45C1000
heap
page read and write
1EE30A1E000
trusted library allocation
page read and write
1EE30BDD000
trusted library allocation
page read and write
1EE2F352000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1EE30AA1000
trusted library allocation
page read and write
1E0857B9000
heap
page read and write
5C21000
trusted library allocation
page read and write
260A98D0000
heap
page read and write
17F37CE7000
trusted library allocation
page read and write
1EE30511000
trusted library allocation
page read and write
41AF000
stack
page read and write
1EE305E3000
trusted library allocation
page read and write
4DA0000
direct allocation
page read and write
52DA000
trusted library allocation
page read and write
1EE30CDF000
trusted library allocation
page read and write
1EE25775000
heap
page read and write
1EE36A85000
trusted library allocation
page read and write
1EE30BCA000
trusted library allocation
page read and write
5313000
trusted library allocation
page read and write
2ED0000
direct allocation
page read and write
4BF0000
direct allocation
page execute and read and write
1474000
heap
page read and write
1920000
trusted library allocation
page read and write
260A970C000
trusted library allocation
page read and write
54BF000
trusted library allocation
page read and write
1EE1EA00000
trusted library allocation
page read and write
1EE2FCC0000
trusted library section
page read and write
1EE2E5A5000
trusted library allocation
page read and write
1EE38E03000
trusted library allocation
page read and write
5B34000
trusted library allocation
page read and write
6F5000
unkown
page execute and read and write
4A30000
direct allocation
page read and write
6C4000
heap
page read and write
1EE2E5C7000
trusted library allocation
page read and write
920000
unkown
page readonly
1EE2A0C1000
trusted library allocation
page read and write
1E083B90000
heap
page read and write
407E000
stack
page read and write
2DBF000
stack
page read and write
F00000
heap
page read and write
1EE2A718000
trusted library allocation
page read and write
89F000
stack
page read and write
2CD15EB00000
trusted library allocation
page read and write
1EE2DAB9000
trusted library allocation
page read and write
5BB0000
trusted library allocation
page read and write
2DC000
unkown
page execute and write copy
58F1000
trusted library allocation
page read and write
1EE308CB000
trusted library allocation
page read and write
328F000
stack
page read and write
1EE30BEF000
trusted library allocation
page read and write
1EE2EAB1000
trusted library allocation
page read and write
1EE2C400000
trusted library allocation
page read and write
1EE33610000
trusted library allocation
page read and write
1EE30996000
trusted library allocation
page read and write
4EF4000
trusted library allocation
page read and write
1EE304BD000
trusted library allocation
page read and write
260A9CD0000
trusted library allocation
page read and write
52B6000
trusted library allocation
page read and write
529A000
trusted library allocation
page read and write
5119EBC000
stack
page read and write
1EE30BE3000
trusted library allocation
page read and write
1EE3054D000
trusted library allocation
page read and write
4AC1000
heap
page read and write
1EE36800000
trusted library allocation
page read and write
5EB7000
trusted library allocation
page read and write
B44000
heap
page read and write
511743D000
stack
page read and write
1EE2F331000
trusted library allocation
page read and write
5FBC000
trusted library allocation
page read and write
51E0000
direct allocation
page execute and read and write
5589000
trusted library allocation
page read and write
BD4000
heap
page read and write
1EE3676A000
trusted library allocation
page read and write
53C0000
direct allocation
page execute and read and write
1EE302EF000
trusted library allocation
page read and write
1EE257AC000
heap
page read and write
1EE30A97000
trusted library allocation
page read and write
53E3000
trusted library allocation
page read and write
1EE30AF0000
trusted library allocation
page read and write
581C000
trusted library allocation
page read and write
1EE31042000
trusted library allocation
page read and write
1EE2A20A000
trusted library allocation
page read and write
1EE30BFA000
trusted library allocation
page read and write
FA4000
heap
page read and write
4F00000
direct allocation
page read and write
1034000
heap
page read and write
1EE367F2000
trusted library allocation
page read and write
1EE2FF25000
trusted library allocation
page read and write
1EE2EC57000
trusted library allocation
page read and write
1EE2C30D000
trusted library allocation
page read and write
142E000
stack
page read and write
4BC2000
heap
page read and write
1EE2EC55000
trusted library allocation
page read and write
13E0000
heap
page read and write
1EE30BE0000
trusted library allocation
page read and write
296C3000
heap
page read and write
442F000
stack
page read and write
5585000
trusted library allocation
page read and write
1EE2E9E3000
trusted library allocation
page read and write
446E000
stack
page read and write
1EE368FA000
trusted library allocation
page read and write
1EE30B9C000
trusted library allocation
page read and write
4441000
heap
page read and write
1EE32302000
trusted library allocation
page read and write
558B000
trusted library allocation
page read and write
5AFC000
trusted library allocation
page read and write
1EE3688E000
trusted library allocation
page read and write
566000
unkown
page execute and read and write
1EE2ECAC000
trusted library allocation
page read and write
4DB0000
remote allocation
page read and write
5BA8000
trusted library allocation
page read and write
1EE30AF2000
trusted library allocation
page read and write
1EE2E0B0000
heap
page read and write
46BF000
stack
page read and write
1EE30477000
trusted library allocation
page read and write
1EE304B1000
trusted library allocation
page read and write
1EE30474000
trusted library allocation
page read and write
1640000
heap
page read and write
1134000
heap
page read and write
1EE2A15D000
trusted library allocation
page read and write
1EE25746000
heap
page read and write
1EE2BA7C000
trusted library allocation
page read and write
1EE36606000
trusted library allocation
page read and write
51F0000
direct allocation
page execute and read and write
1EE2F24A000
trusted library allocation
page read and write
45C1000
heap
page read and write
7B4000
unkown
page execute and write copy
52CA000
trusted library allocation
page read and write
A74000
heap
page read and write
1EE2F67A000
trusted library allocation
page read and write
1EE303DB000
trusted library allocation
page read and write
1EE30BEF000
trusted library allocation
page read and write
FF3000
heap
page read and write
5AD4000
trusted library allocation
page read and write
1EE368E2000
trusted library allocation
page read and write
1EE2A603000
trusted library allocation
page read and write
1EE2E6D7000
trusted library allocation
page read and write
573D000
trusted library allocation
page read and write
1EE25740000
heap
page read and write
5AEB000
trusted library allocation
page read and write
3C9F000
stack
page read and write
53D0000
direct allocation
page execute and read and write
51BD000
stack
page read and write
A70000
heap
page read and write
1EE2E609000
trusted library allocation
page read and write
5119F3C000
stack
page read and write
1EE302E4000
trusted library allocation
page read and write
4441000
heap
page read and write
4941000
heap
page read and write
1EE305E6000
trusted library allocation
page read and write
1EE2F274000
trusted library allocation
page read and write
51D0000
direct allocation
page execute and read and write
853000
unkown
page execute and read and write
1EE30970000
trusted library allocation
page read and write
1EE2E5AE000
trusted library allocation
page read and write
5EB5000
trusted library allocation
page read and write
1EE1E610000
unclassified section
page readonly
1EE30BDD000
trusted library allocation
page read and write
1EE30ADD000
trusted library allocation
page read and write
1EE2F0BF000
trusted library allocation
page read and write
1EE36850000
trusted library allocation
page read and write
2E4E000
heap
page read and write
1EE2EC72000
trusted library allocation
page read and write
1EE33620000
trusted library allocation
page read and write
61D000
heap
page read and write
1EE31203000
trusted library allocation
page read and write
1EE30869000
trusted library allocation
page read and write
A74000
heap
page read and write
5634000
trusted library allocation
page read and write
1D50B000
heap
page read and write
418F000
stack
page read and write
2B9000
unkown
page write copy
5365000
trusted library allocation
page read and write
52A2000
trusted library allocation
page read and write
A74000
heap
page read and write
1D54C000
heap
page read and write
D1B000
heap
page read and write
45C1000
heap
page read and write
2363A000
heap
page read and write
260A9CBB000
unkown
page execute read
558B000
trusted library allocation
page read and write
5BA1000
trusted library allocation
page read and write
1194000
heap
page read and write
1EE36750000
trusted library allocation
page read and write
1EE2F003000
trusted library allocation
page read and write
1EE367FE000
trusted library allocation
page read and write
1D0AE000
stack
page read and write
1EE2A04A000
trusted library allocation
page read and write
607B000
trusted library allocation
page read and write
1EE2F0E1000
trusted library allocation
page read and write
4C10000
direct allocation
page execute and read and write
1EE302AE000
trusted library allocation
page read and write
37BE000
stack
page read and write
4441000
heap
page read and write
1EE30AA4000
trusted library allocation
page read and write
288F000
stack
page read and write
1EE2EFD4000
trusted library allocation
page read and write
52A3000
trusted library allocation
page read and write
D32000
heap
page read and write
1EE3219D000
trusted library allocation
page read and write
1EE2DAFC000
trusted library allocation
page read and write
52A4000
trusted library allocation
page read and write
1EE36CA9000
trusted library allocation
page read and write
99F000
stack
page read and write
1EE2E4A2000
trusted library allocation
page read and write
6C4000
heap
page read and write
5BD000
heap
page read and write
558F000
trusted library allocation
page read and write
3A6E000
stack
page read and write
1EE30517000
trusted library allocation
page read and write
1EE25740000
heap
page read and write
5355000
trusted library allocation
page read and write
1EE36C98000
trusted library allocation
page read and write
1EE304BB000
trusted library allocation
page read and write
260A951A000
heap
page read and write
5284000
trusted library allocation
page read and write
1EE3012A000
trusted library allocation
page read and write
1920000
trusted library allocation
page read and write
162E000
heap
page read and write
1EE36874000
trusted library allocation
page read and write
52B3000
trusted library allocation
page read and write
1EE36A55000
trusted library allocation
page read and write
1EE322EB000
trusted library allocation
page read and write
4DA0000
direct allocation
page read and write
260A9762000
trusted library allocation
page read and write
1D535000
heap
page read and write
754000
heap
page read and write
482E000
stack
page read and write
1EE36712000
trusted library allocation
page read and write
1EE30753000
trusted library allocation
page read and write
4AC1000
heap
page read and write
5115E3E000
stack
page read and write
1EE306C3000
trusted library allocation
page read and write
45C1000
heap
page read and write
51113BB000
stack
page read and write
26F0000
direct allocation
page read and write
1EE30AA4000
trusted library allocation
page read and write
1EE2AA03000
trusted library allocation
page read and write
2FBF000
stack
page read and write
8CE000
unkown
page readonly
3CBF000
stack
page read and write
1454000
heap
page read and write
571B000
trusted library allocation
page read and write
5E30000
heap
page read and write
1EE30679000
trusted library allocation
page read and write
5240000
heap
page read and write
5110FFE000
stack
page read and write
55A0000
remote allocation
page read and write
1EE2573B000
heap
page read and write
5582000
trusted library allocation
page read and write
1EE30AD6000
trusted library allocation
page read and write
1EE30842000
trusted library allocation
page read and write
1EE2F3A6000
trusted library allocation
page read and write
1EE2F03B000
trusted library allocation
page read and write
558D000
trusted library allocation
page read and write
1EE36ACD000
trusted library allocation
page read and write
2EAF000
stack
page read and write
1EE302F1000
trusted library allocation
page read and write
1EE306A8000
trusted library allocation
page read and write
45B0000
direct allocation
page read and write
D1A000
heap
page read and write
5010000
heap
page read and write
1EE33628000
trusted library allocation
page read and write
1EE302EF000
trusted library allocation
page read and write
6C4000
heap
page read and write
1EE2F387000
trusted library allocation
page read and write
4C40000
direct allocation
page execute and read and write
1EE38BB0000
trusted library allocation
page read and write
1EE2DB03000
trusted library allocation
page read and write
854000
unkown
page execute and write copy
1EE2EC77000
trusted library allocation
page read and write
1EE307B5000
trusted library allocation
page read and write
1EE30713000
trusted library allocation
page read and write
1E083BE0000
heap
page read and write
1EE2BB16000
trusted library allocation
page read and write
1EE2FC30000
trusted library section
page read and write
1EE30AD1000
trusted library allocation
page read and write
1EE304A8000
trusted library allocation
page read and write
1EE2F8E0000
trusted library allocation
page read and write
1EE32156000
trusted library allocation
page read and write
1EE2F03E000
trusted library allocation
page read and write
1EE2EC60000
trusted library allocation
page read and write
468F000
stack
page read and write
1EE36AC7000
trusted library allocation
page read and write
1EE3213B000
trusted library allocation
page read and write
1EE36CCD000
trusted library allocation
page read and write
1EE30E1F000
trusted library allocation
page read and write
1EE3665B000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
17F37CBA000
trusted library allocation
page read and write
1EE30AA4000
trusted library allocation
page read and write
4A41000
heap
page read and write
4DA0000
direct allocation
page read and write
1EE2EE90000
trusted library section
page read and write
1EE36A32000
trusted library allocation
page read and write
1D516000
heap
page read and write
A74000
heap
page read and write
1EE2575B000
heap
page read and write
1091000
heap
page read and write
4900000
direct allocation
page execute and read and write
6C4000
heap
page read and write
2E40000
heap
page read and write
542E000
trusted library allocation
page read and write
28A0000
direct allocation
page execute and read and write
52C4000
trusted library allocation
page read and write
1EE36A37000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
1EE2BBD2000
trusted library allocation
page read and write
1034000
heap
page read and write
1EE30446000
trusted library allocation
page read and write
1EE3092E000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
56CC000
trusted library allocation
page read and write
5283000
trusted library allocation
page read and write
1EE30C37000
trusted library allocation
page read and write
9A1000
unkown
page execute and read and write
564000
unkown
page execute and read and write
5355000
trusted library allocation
page read and write
1EE2E49C000
trusted library allocation
page read and write
4441000
heap
page read and write
2EEE000
stack
page read and write
5365000
trusted library allocation
page read and write
62A000
heap
page read and write
5AE3000
trusted library allocation
page read and write
5220000
direct allocation
page execute and read and write
4DA0000
direct allocation
page read and write
1D515000
heap
page read and write
1234000
heap
page read and write
1EE30BCA000
trusted library allocation
page read and write
17F37D1F000
trusted library allocation
page read and write
5FF3000
trusted library allocation
page read and write
4DC1000
heap
page read and write
2B49AA51000
trusted library allocation
page execute read
599000
unkown
page write copy
AF9F1FE000
unkown
page readonly
13A8000
heap
page read and write
530000
unkown
page read and write
2C6F000
stack
page read and write
5FC0000
trusted library allocation
page read and write
1EE36C7C000
trusted library allocation
page read and write
1EE3136E000
trusted library allocation
page read and write
4DB0000
remote allocation
page read and write
5BD9000
trusted library allocation
page read and write
2B49AA11000
trusted library allocation
page execute read
1EE3041D000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
80D000
unkown
page execute and read and write
1EE30BEC000
trusted library allocation
page read and write
1EE2F2B5000
trusted library allocation
page read and write
11E0000
direct allocation
page read and write
45C1000
heap
page read and write
1EE30EC9000
trusted library allocation
page read and write
52A9000
trusted library allocation
page read and write
1EE30A1E000
trusted library allocation
page read and write
1EE305E2000
trusted library allocation
page read and write
646000
heap
page read and write
1EE30AA4000
trusted library allocation
page read and write
4441000
heap
page read and write
417F000
stack
page read and write
1EE2BC22000
trusted library allocation
page read and write
1EE30AF8000
trusted library allocation
page read and write
270000
unkown
page readonly
4441000
heap
page read and write
BD4000
heap
page read and write
1EE25750000
heap
page read and write
4441000
heap
page read and write
17F37B00000
trusted library allocation
page read and write
1EE36903000
trusted library allocation
page read and write
2BBE000
stack
page read and write
1EE20351000
heap
page read and write
5284000
trusted library allocation
page read and write
52BB000
trusted library allocation
page read and write
2F785000
heap
page read and write
316F000
stack
page read and write
3F5E000
stack
page read and write
1EE309F0000
trusted library allocation
page read and write
1EE30C6F000
trusted library allocation
page read and write
558F000
trusted library allocation
page read and write
A0D000
unkown
page execute and write copy
1EE2A16F000
trusted library allocation
page read and write
52BD000
trusted library allocation
page read and write
9F4000
unkown
page execute and read and write
5285000
trusted library allocation
page read and write
4BC2000
heap
page read and write
1EE36C8B000
trusted library allocation
page read and write
1EE303FB000
trusted library allocation
page read and write
1EE2FFD8000
trusted library allocation
page read and write
17F37C6E000
trusted library allocation
page read and write
1EE257AF000
heap
page read and write
1EE30BA7000
trusted library allocation
page read and write
491F000
stack
page read and write
4BD0000
direct allocation
page execute and read and write
2B0E000
stack
page read and write
1EE3362C000
trusted library allocation
page read and write
C99000
heap
page read and write
17F37CC7000
trusted library allocation
page read and write
4321000
heap
page read and write
1920000
trusted library allocation
page read and write
511B63E000
stack
page read and write
5118AFC000
stack
page read and write
1EE2F32C000
trusted library allocation
page read and write
1EE30609000
trusted library allocation
page read and write
5ADC000
trusted library allocation
page read and write
260AA3A0000
heap
page read and write
1EE25753000
heap
page read and write
41BE000
stack
page read and write
1EE3098A000
trusted library allocation
page read and write
5303000
trusted library allocation
page read and write
1EE25750000
heap
page read and write
612000
unkown
page execute and read and write
17F37C7B000
trusted library allocation
page read and write
550000
direct allocation
page read and write
57F4000
trusted library allocation
page read and write
1EE31738000
trusted library allocation
page read and write
23AB0A00000
heap
page read and write
1EE30AD1000
trusted library allocation
page read and write
1EE32013000
trusted library allocation
page read and write
566000
unkown
page execute and write copy
1EE2EA6B000
trusted library allocation
page read and write
98F000
unkown
page execute and read and write
45C1000
heap
page read and write
1134000
heap
page read and write
1EE2E562000
trusted library allocation
page read and write
1EE30805000
trusted library allocation
page read and write
260A9360000
unclassified section
page readonly
511B23F000
stack
page read and write
5C19000
trusted library allocation
page read and write
1EE2EC85000
trusted library allocation
page read and write
1EE2E56F000
trusted library allocation
page read and write
5B05000
trusted library allocation
page read and write
528F000
trusted library allocation
page read and write
1EE25750000
heap
page read and write
1EE2E5E6000
trusted library allocation
page read and write
2C7F000
stack
page read and write
1EE2579D000
heap
page read and write
1EE2ECF9000
trusted library allocation
page read and write
353E000
stack
page read and write
1EE30001000
trusted library allocation
page read and write
1EE3088C000
trusted library allocation
page read and write
1EE257AF000
heap
page read and write
1EE257AF000
heap
page read and write
1EE2A62F000
trusted library allocation
page read and write
1EE30A20000
trusted library allocation
page read and write
6C4000
heap
page read and write
591E000
stack
page read and write
F3E000
stack
page read and write
754000
heap
page read and write
327F000
stack
page read and write
4441000
heap
page read and write
4F40000
direct allocation
page execute and read and write
C54000
heap
page read and write
1EE32040000
trusted library allocation
page read and write
17F37D03000
trusted library allocation
page read and write
45C1000
heap
page read and write
5BB0000
trusted library allocation
page read and write
3DFF000
stack
page read and write
1EE309B0000
trusted library allocation
page read and write
1EE30500000
trusted library allocation
page read and write
1EE2C20D000
trusted library allocation
page read and write
137F000
stack
page read and write
1EE2DACA000
trusted library allocation
page read and write
1D52F000
heap
page read and write
1EE30ADA000
trusted library allocation
page read and write
5288000
trusted library allocation
page read and write
4BB4000
heap
page read and write
5FEF000
trusted library allocation
page read and write
260AA47B000
heap
page read and write
5355000
trusted library allocation
page read and write
40BE000
stack
page read and write
260AA461000
heap
page read and write
5BAE000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
A74000
heap
page read and write
A74000
heap
page read and write
5616000
trusted library allocation
page read and write
1EE2575B000
heap
page read and write
455F000
stack
page read and write
1EE257A1000
heap
page read and write
1EE30996000
trusted library allocation
page read and write
260AA42C000
heap
page read and write
69E000
stack
page read and write
1EE2E6D3000
trusted library allocation
page read and write
55B000
unkown
page execute and read and write
17F37C72000
trusted library allocation
page read and write
1E083F00000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
3B6F000
stack
page read and write
1EE30A42000
trusted library allocation
page read and write
1EE2F0F2000
trusted library allocation
page read and write
4F50000
direct allocation
page execute and read and write
3B7E000
stack
page read and write
5ADA000
trusted library allocation
page read and write
1EE2575A000
heap
page read and write
5AAB000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page read and write
58F7000
trusted library allocation
page read and write
1EE38C47000
trusted library allocation
page read and write
17F37980000
unclassified section
page read and write
1EE2EEF0000
trusted library section
page read and write
1EE309D6000
trusted library allocation
page read and write
1EE31248000
trusted library allocation
page read and write
38FF000
stack
page read and write
1134000
heap
page read and write
1EE257A1000
heap
page read and write
1EE2E51E000
trusted library allocation
page read and write
52B6000
trusted library allocation
page read and write
1EE303B8000
trusted library allocation
page read and write
1EE36870000
trusted library allocation
page read and write
A1F000
unkown
page execute and read and write
26F0000
direct allocation
page read and write
1EE2E0C4000
heap
page read and write
5BA8000
trusted library allocation
page read and write
A74000
heap
page read and write
1EE2BB61000
trusted library allocation
page read and write
27E0000
direct allocation
page read and write
1EE2DB00000
trusted library allocation
page read and write
11B5000
heap
page read and write
15D0000
direct allocation
page read and write
A74000
heap
page read and write
D3D000
heap
page read and write
45C1000
heap
page read and write
D07000
heap
page read and write
4BC1000
heap
page read and write
1EE36AC8000
trusted library allocation
page read and write
160F000
stack
page read and write
1EE30530000
trusted library allocation
page read and write
1B16F000
stack
page read and write
1EE306AF000
trusted library allocation
page read and write
5B1C000
trusted library allocation
page read and write
1EE2E5E2000
trusted library allocation
page read and write
5BDF000
trusted library allocation
page read and write
9F6000
unkown
page execute and write copy
1EE3048D000
trusted library allocation
page read and write
A4C000
unkown
page execute and write copy
5EB7000
trusted library allocation
page read and write
45C1000
heap
page read and write
1627000
heap
page read and write
5B40000
trusted library allocation
page read and write
45C1000
heap
page read and write
4E01000
heap
page read and write
1EE2C103000
trusted library allocation
page read and write
5FDC000
trusted library allocation
page read and write
1EE30A6A000
trusted library allocation
page read and write
5AAF000
trusted library allocation
page read and write
1EE25750000
heap
page read and write
260AA3A9000
heap
page read and write
1EE2A18A000
trusted library allocation
page read and write
5AE7000
trusted library allocation
page read and write
1EE310A6000
trusted library allocation
page read and write
1EE257A5000
heap
page read and write
D19000
heap
page read and write
4F4000
unkown
page execute and read and write
1B3CE000
stack
page read and write
1EE25746000
heap
page read and write
1EE2C313000
trusted library allocation
page read and write
1EE2AB64000
trusted library allocation
page read and write
6C4000
heap
page read and write
26F0000
direct allocation
page read and write
5AB4000
trusted library allocation
page read and write
369E000
stack
page read and write
5EBC000
trusted library allocation
page read and write
45C1000
heap
page read and write
365F000
stack
page read and write
4E4000
unkown
page execute and write copy
45D000
unkown
page execute and read and write
3E1E000
stack
page read and write
1EE2E9E9000
trusted library allocation
page read and write
1EE30FFA000
trusted library allocation
page read and write
754000
heap
page read and write
1EE30996000
trusted library allocation
page read and write
1EE30C27000
trusted library allocation
page read and write
1EE36909000
trusted library allocation
page read and write
1EE1E7C0000
heap
page read and write
4441000
heap
page read and write
1150000
direct allocation
page read and write
26F0000
direct allocation
page read and write
260AA421000
heap
page read and write
1EE25755000
heap
page read and write
1EE31148000
trusted library allocation
page read and write
1EE313E1000
trusted library allocation
page read and write
1EE306C6000
trusted library allocation
page read and write
1EE2574A000
heap
page read and write
1454000
heap
page read and write
51A0000
direct allocation
page execute and read and write
1EE30FFA000
trusted library allocation
page read and write
1EE2A7E3000
trusted library allocation
page read and write
1134000
heap
page read and write
DBE000
stack
page read and write
4EB000
unkown
page execute and read and write
1EE2F2BB000
trusted library allocation
page read and write
5081000
direct allocation
page read and write
1EE2F66A000
trusted library allocation
page read and write
4BC1000
heap
page read and write
409E000
stack
page read and write
4BC1000
heap
page read and write
1EE30AA4000
trusted library allocation
page read and write
63F000
unkown
page execute and read and write
1EE2E5E2000
trusted library allocation
page read and write
5651000
trusted library allocation
page read and write
45C000
unkown
page execute and write copy
5114C30000
unkown
page read and write
9A6000
unkown
page execute and read and write
1EE31484000
trusted library allocation
page read and write
45C1000
heap
page read and write
1EE2ABA5000
trusted library allocation
page read and write
1EE25796000
heap
page read and write
B44000
heap
page read and write
4BC1000
heap
page read and write
2DDE000
stack
page read and write
37FE000
stack
page read and write
1EE36CB6000
trusted library allocation
page read and write
844000
unkown
page execute and read and write
1D54C000
heap
page read and write
4A50000
direct allocation
page execute and read and write
1EE30484000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
1EE2FC40000
trusted library section
page read and write
1EE2A061000
trusted library allocation
page read and write
558A000
trusted library allocation
page read and write
1EE2A0C5000
trusted library allocation
page read and write
D37000
heap
page read and write
1EE2A139000
trusted library allocation
page read and write
4441000
heap
page read and write
5B33000
trusted library allocation
page read and write
1D543000
heap
page read and write
5F50000
trusted library allocation
page read and write
1EE2FA0D000
trusted library allocation
page read and write
1D515000
heap
page read and write
48B000
unkown
page execute and write copy
11B9000
heap
page read and write
555000
unkown
page execute and write copy
1EE30BA7000
trusted library allocation
page read and write
511483F000
stack
page read and write
1134000
heap
page read and write
17F37D0C000
trusted library allocation
page read and write
6C4000
heap
page read and write
1EE38C1B000
trusted library allocation
page read and write
1EE3105A000
trusted library allocation
page read and write
4931000
heap
page read and write
5AB7000
trusted library allocation
page read and write
1B0ED000
stack
page read and write
1EE30BEC000
trusted library allocation
page read and write
1EE36758000
trusted library allocation
page read and write
32EE000
stack
page read and write
1EE368F6000
trusted library allocation
page read and write
1EE3096E000
trusted library allocation
page read and write
444E000
stack
page read and write
271000
unkown
page execute and read and write
5C74000
trusted library allocation
page read and write
1EE30A42000
trusted library allocation
page read and write
555000
unkown
page execute and write copy
1EE31262000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
4441000
heap
page read and write
1EE313CC000
trusted library allocation
page read and write
1EE3676A000
trusted library allocation
page read and write
6B0000
direct allocation
page read and write
1EE38B88000
trusted library allocation
page read and write
260AA423000
heap
page read and write
1EE36CC1000
trusted library allocation
page read and write
1EE2E49C000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page read and write
5355000
trusted library allocation
page read and write
61E000
heap
page read and write
4BC1000
heap
page read and write
1EE36C7E000
trusted library allocation
page read and write
1EE303D0000
trusted library allocation
page read and write
1EE30BCF000
trusted library allocation
page read and write
D0F000
heap
page read and write
1EE2E389000
trusted library allocation
page read and write
1EE2F9F1000
trusted library allocation
page read and write
6C4000
heap
page read and write
1EE20349000
heap
page read and write
1EE2EC72000
trusted library allocation
page read and write
1134000
heap
page read and write
1EE36992000
trusted library allocation
page read and write
A74000
heap
page read and write
1EE32217000
trusted library allocation
page read and write
4BA0000
direct allocation
page execute and read and write
D37000
heap
page read and write
497E000
stack
page read and write
1EE36CA9000
trusted library allocation
page read and write
5355000
trusted library allocation
page read and write
648000
heap
page read and write
260A9CF0000
heap
page read and write
1EE36992000
trusted library allocation
page read and write
1EE312DB000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
C7F000
heap
page read and write
4920000
direct allocation
page execute and read and write
1EE25750000
heap
page read and write
2EBF000
stack
page read and write
FA4000
heap
page read and write
27E0000
direct allocation
page read and write
1EE36876000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1134000
heap
page read and write
5E85000
trusted library allocation
page read and write
1EE2E49C000
trusted library allocation
page read and write
FEC000
stack
page read and write
1EE30A97000
trusted library allocation
page read and write
1EE3098F000
trusted library allocation
page read and write
5BF0000
trusted library allocation
page read and write
1EE2A148000
trusted library allocation
page read and write
BD4000
heap
page read and write
1234000
heap
page read and write
52DC000
trusted library allocation
page read and write
4441000
heap
page read and write
5674000
trusted library allocation
page read and write
5654000
trusted library allocation
page read and write
615000
heap
page read and write
184E000
stack
page read and write
260AA42C000
heap
page read and write
5119CBA000
stack
page read and write
1EE38C61000
trusted library allocation
page read and write
4A5F000
stack
page read and write
1E083E10000
heap
page read and write
1EE30EB6000
trusted library allocation
page read and write
116F000
heap
page read and write
1EE36992000
trusted library allocation
page read and write
5582000
trusted library allocation
page read and write
1D620000
trusted library allocation
page read and write
2FF7000
heap
page read and write
1EE32245000
trusted library allocation
page read and write
4E01000
heap
page read and write
511663B000
stack
page read and write
1EE2E9E9000
trusted library allocation
page read and write
1EE2DDA7000
trusted library allocation
page read and write
1EE30A9D000
trusted library allocation
page read and write
1EE38B61000
trusted library allocation
page read and write
4A30000
direct allocation
page read and write
1EE30AF8000
trusted library allocation
page read and write
1EE3218F000
trusted library allocation
page read and write
1EE2C831000
trusted library allocation
page read and write
1EE257A1000
heap
page read and write
1EE309DA000
trusted library allocation
page read and write
50D0000
direct allocation
page execute and read and write
45C1000
heap
page read and write
5EB2000
trusted library allocation
page read and write
1EE2A5F0000
trusted library section
page readonly
4CC0000
trusted library allocation
page read and write
1EE2ECCB000
trusted library allocation
page read and write
52AF000
trusted library allocation
page read and write
1EE2F2E2000
trusted library allocation
page read and write
4AC1000
heap
page read and write
1EE320C8000
trusted library allocation
page read and write
1EE30BCA000
trusted library allocation
page read and write
5ABC000
trusted library allocation
page read and write
52AA000
trusted library allocation
page read and write
55DD000
trusted library allocation
page read and write
D3C000
heap
page read and write
5AE0000
trusted library allocation
page read and write
1EE3014F000
trusted library allocation
page read and write
4F20000
direct allocation
page execute and read and write
1EE2575B000
heap
page read and write
1EE2F08C000
trusted library allocation
page read and write
1EE36AFE000
trusted library allocation
page read and write
17A900104000
trusted library allocation
page read and write
582F000
trusted library allocation
page read and write
4A50000
direct allocation
page read and write
1EE309BF000
trusted library allocation
page read and write
557000
unkown
page execute and write copy
5365000
trusted library allocation
page read and write
511144B000
stack
page read and write
4A50000
heap
page read and write
52D3000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1EE2574F000
heap
page read and write
5BC1000
trusted library allocation
page read and write
4931000
heap
page read and write
550000
direct allocation
page read and write
1EE1E900000
trusted library allocation
page read and write
558B000
trusted library allocation
page read and write
1EE2E5C7000
trusted library allocation
page read and write
6C4000
heap
page read and write
FB0000
direct allocation
page read and write
1134000
heap
page read and write
52DF000
trusted library allocation
page read and write
4BC1000
heap
page read and write
53AB000
trusted library allocation
page read and write
1EE30AFA000
trusted library allocation
page read and write
1EE30527000
trusted library allocation
page read and write
511137C000
stack
page read and write
1EE2EA87000
trusted library allocation
page read and write
1EE2574A000
heap
page read and write
1EE30945000
trusted library allocation
page read and write
1134000
heap
page read and write
1EE36A98000
trusted library allocation
page read and write
1EE2DADB000
trusted library allocation
page read and write
1EE36968000
trusted library allocation
page read and write
1EE30523000
trusted library allocation
page read and write
1920000
trusted library allocation
page read and write
1EE3204E000
trusted library allocation
page read and write
4F30000
direct allocation
page execute and read and write
2ED0000
direct allocation
page read and write
1EE2E074000
heap
page read and write
61CF000
stack
page read and write
4BC1000
heap
page read and write
1EE367F6000
trusted library allocation
page read and write
407D000
stack
page read and write
4BC1000
heap
page read and write
260A9350000
unclassified section
page readonly
1EE2EBB3000
trusted library allocation
page read and write
5040000
direct allocation
page read and write
1EE305E6000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
1643000
heap
page read and write
635000
heap
page read and write
6C4000
heap
page read and write
1EE36AD6000
trusted library allocation
page read and write
1CF6F000
stack
page read and write
5B43000
trusted library allocation
page read and write
407F000
stack
page read and write
57D000
unkown
page execute and write copy
1EE31270000
trusted library allocation
page read and write
1091000
heap
page read and write
4BC1000
heap
page read and write
5BAA000
trusted library allocation
page read and write
17AE000
stack
page read and write
17F37D00000
trusted library allocation
page read and write
11BB000
heap
page read and write
CBD000
heap
page read and write
1EE2EC77000
trusted library allocation
page read and write
2B9000
unkown
page write copy
F60000
heap
page read and write
5119E7E000
stack
page read and write
1EE2DD42000
trusted library allocation
page read and write
50D1000
direct allocation
page read and write
1EE305EB000
trusted library allocation
page read and write
1EE2F6C7000
trusted library allocation
page read and write
53E0000
direct allocation
page execute and read and write
5EBD000
trusted library allocation
page read and write
1EE30724000
trusted library allocation
page read and write
1EE30BFA000
trusted library allocation
page read and write
260AA3A0000
heap
page read and write
480E000
stack
page read and write
5365000
trusted library allocation
page read and write
17F37970000
heap
page readonly
1EE310DB000
trusted library allocation
page read and write
50D0000
direct allocation
page execute and read and write
1EE2573B000
heap
page read and write
1EE36C9C000
trusted library allocation
page read and write
1EE30F6C000
trusted library allocation
page read and write
5EB8000
trusted library allocation
page read and write
1EE25752000
heap
page read and write
52FE000
stack
page read and write
1920000
trusted library allocation
page read and write
1EE320CB000
trusted library allocation
page read and write
5584000
trusted library allocation
page read and write
1EE3688C000
trusted library allocation
page read and write
1EE25789000
heap
page read and write
6C7BF000
unkown
page readonly
1EE3667B000
trusted library allocation
page read and write
FEB000
unkown
page execute and read and write
1EE30AF8000
trusted library allocation
page read and write
4BC1000
heap
page read and write
4C6000
unkown
page execute and write copy
1EE30877000
trusted library allocation
page read and write
1EE36ADF000
trusted library allocation
page read and write
27E0000
direct allocation
page read and write
1EE30BDD000
trusted library allocation
page read and write
1EE304BB000
trusted library allocation
page read and write
5119D7C000
stack
page read and write
1EE2EC39000
trusted library allocation
page read and write
3990000
heap
page read and write
3EFF000
stack
page read and write
4A10000
direct allocation
page execute and read and write
52EB000
trusted library allocation
page read and write
1EE30AB5000
trusted library allocation
page read and write
754000
heap
page read and write
1EE2575D000
heap
page read and write
46FE000
stack
page read and write
5E45000
heap
page read and write
1EE257A1000
heap
page read and write
1E083E80000
heap
page read and write
1EE2A0F9000
trusted library allocation
page read and write
55A0000
remote allocation
page read and write
8DB000
unkown
page write copy
1EE2F29C000
trusted library allocation
page read and write
5463000
trusted library allocation
page read and write
FA4000
heap
page read and write
1EE30236000
trusted library allocation
page read and write
5B3D000
trusted library allocation
page read and write
1EE2F700000
trusted library allocation
page read and write
1EE2BB6E000
trusted library allocation
page read and write
260AA4A7000
heap
page read and write
C1D000
unkown
page execute and write copy
1EE2E562000
trusted library allocation
page read and write
5B3D000
trusted library allocation
page read and write
1EE303E3000
trusted library allocation
page read and write
1EE38CDF000
trusted library allocation
page read and write
260AA431000
heap
page read and write
1D20F000
stack
page read and write
1D35C000
stack
page read and write
6F8EE000
unkown
page read and write
1EE309DD000
trusted library allocation
page read and write
1EE2DADA000
trusted library allocation
page read and write
1EE2E513000
trusted library allocation
page read and write
1EE2A71A000
trusted library allocation
page read and write
1EE30CA7000
trusted library allocation
page read and write
1EE30C0F000
trusted library allocation
page read and write
1EE30AE4000
trusted library allocation
page read and write
1EE36890000
trusted library allocation
page read and write
98C000
unkown
page execute and read and write
1EE2E5B8000
trusted library allocation
page read and write
5FB3000
trusted library allocation
page read and write
5B54000
trusted library allocation
page read and write
11E0000
direct allocation
page read and write
1EE30BEC000
trusted library allocation
page read and write
50D0000
direct allocation
page execute and read and write
8CE000
unkown
page readonly
5060000
direct allocation
page execute and read and write
5354000
trusted library allocation
page read and write
1EE36C80000
trusted library allocation
page read and write
11B1000
heap
page read and write
1EE309D3000
trusted library allocation
page read and write
1D52A000
heap
page read and write
1EE30A42000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
37CE000
stack
page read and write
FA0000
heap
page read and write
542A000
trusted library allocation
page read and write
56EE000
trusted library allocation
page read and write
46EE000
stack
page read and write
5FAF000
trusted library allocation
page read and write
1EE38CDF000
trusted library allocation
page read and write
1EE2F095000
trusted library allocation
page read and write
1EE2E5E6000
trusted library allocation
page read and write
FA4000
heap
page read and write
1EE31368000
trusted library allocation
page read and write
1EE2E700000
trusted library allocation
page read and write
40BE000
stack
page read and write
1EE3225C000
trusted library allocation
page read and write
1EE2DD6B000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
52DA000
trusted library allocation
page read and write
893C1FF000
stack
page read and write
11AB000
heap
page read and write
4B50000
trusted library allocation
page read and write
1EE3048C000
trusted library allocation
page read and write
1EE2F27A000
trusted library allocation
page read and write
1EE38CDD000
trusted library allocation
page read and write
1EE368FA000
trusted library allocation
page read and write
60CE000
stack
page read and write
1EE2BA00000
trusted library allocation
page read and write
5E3000
heap
page read and write
5EB6000
trusted library allocation
page read and write
5AD1000
trusted library allocation
page read and write
45C1000
heap
page read and write
4B90000
direct allocation
page read and write
5A6000
heap
page read and write
1EE30A42000
trusted library allocation
page read and write
1D522000
heap
page read and write
5AC7000
trusted library allocation
page read and write
511203F000
stack
page read and write
15D0000
direct allocation
page read and write
4BC2000
heap
page read and write
AF9F23E000
unkown
page readonly
1EE30BE3000
trusted library allocation
page read and write
1178000
heap
page read and write
1EE2F3E6000
trusted library allocation
page read and write
1EE3688A000
trusted library allocation
page read and write
1EE2DAF4000
trusted library allocation
page read and write
1EE30A97000
trusted library allocation
page read and write
5BA1000
trusted library allocation
page read and write
1EE2F96A000
trusted library allocation
page read and write
1EE2E47F000
trusted library allocation
page read and write
1EE257A1000
heap
page read and write
1EE30471000
trusted library allocation
page read and write
1EE2C109000
trusted library allocation
page read and write
F4F000
stack
page read and write
1CD0000
trusted library allocation
page read and write
4BC1000
heap
page read and write
17F37710000
unclassified section
page readonly
538C000
trusted library allocation
page read and write
1EE366D3000
trusted library allocation
page read and write
529A000
trusted library allocation
page read and write
1EE31400000
trusted library allocation
page read and write
1EE309D7000
trusted library allocation
page read and write
6001000
trusted library allocation
page read and write
1EE2AA0B000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
754000
heap
page read and write
1EE2A111000
trusted library allocation
page read and write
341E000
stack
page read and write
1EE30A82000
trusted library allocation
page read and write
1EE2DD67000
trusted library allocation
page read and write
1EE31272000
trusted library allocation
page read and write
1E083D00000
trusted library allocation
page read and write
1920000
trusted library allocation
page read and write
51A000
unkown
page execute and read and write
2E3F000
stack
page read and write
4910000
direct allocation
page execute and read and write
1134000
heap
page read and write
4441000
heap
page read and write
5288000
trusted library allocation
page read and write
1086000
heap
page read and write
1EE30ABB000
trusted library allocation
page read and write
5ACC000
trusted library allocation
page read and write
1EE30C0D000
trusted library allocation
page read and write
1EE2A165000
trusted library allocation
page read and write
1EE31295000
trusted library allocation
page read and write
1234000
heap
page read and write
1EE36616000
trusted library allocation
page read and write
5231000
trusted library allocation
page read and write
1EE30A62000
trusted library allocation
page read and write
303F000
stack
page read and write
260AA39C000
heap
page read and write
2F78E000
heap
page read and write
1EE2E861000
trusted library allocation
page read and write
1EE31403000
trusted library allocation
page read and write
1EE30A9B000
trusted library allocation
page read and write
6C4000
heap
page read and write
1EE30BDD000
trusted library allocation
page read and write
1EE2DD03000
trusted library allocation
page read and write
56A000
heap
page read and write
1134000
heap
page read and write
367F000
stack
page read and write
53A000
unkown
page execute and read and write
1EE25746000
heap
page read and write
5B4A000
trusted library allocation
page read and write
5BEE000
trusted library allocation
page read and write
1EE308E4000
trusted library allocation
page read and write
1EE3041B000
trusted library allocation
page read and write
1EE2575F000
heap
page read and write
42EF000
stack
page read and write
1EE2A220000
trusted library allocation
page read and write
1EE2F3B3000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1EE2E38D000
trusted library allocation
page read and write
135D000
heap
page read and write
5A5D000
stack
page read and write
FA0000
heap
page read and write
45C1000
heap
page read and write
22F09F800000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1EE30515000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EE257A0000
heap
page read and write
1EE2E56F000
trusted library allocation
page read and write
1EE367BC000
trusted library allocation
page read and write
237DE8D00000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
260AA3AC000
heap
page read and write
5B50000
trusted library allocation
page read and write
B44000
heap
page read and write
FB0000
direct allocation
page read and write
1EE2EC77000
trusted library allocation
page read and write
366F000
stack
page read and write
1EE309D1000
trusted library allocation
page read and write
1EE2C844000
trusted library allocation
page read and write
1EE2ECD7000
trusted library allocation
page read and write
754000
heap
page read and write
FA4000
heap
page read and write
1EE2A154000
trusted library allocation
page read and write
2BB000
unkown
page execute and read and write
1EE2F051000
trusted library allocation
page read and write
A2A000
unkown
page execute and write copy
50AE000
stack
page read and write
1EE36C8B000
trusted library allocation
page read and write
4441000
heap
page read and write
15D0000
direct allocation
page read and write
1EE308E7000
trusted library allocation
page read and write
271000
unkown
page execute and write copy
5118A7E000
stack
page read and write
1EE30BCC000
trusted library allocation
page read and write
DB0F7FF000
stack
page read and write
1EE30877000
trusted library allocation
page read and write
1EE2DB6A000
trusted library allocation
page read and write
2C0F000
stack
page read and write
1EE1E620000
unclassified section
page readonly
23AB0D07000
trusted library allocation
page read and write
D26000
heap
page read and write
52BB000
trusted library allocation
page read and write
1EE3039C000
trusted library allocation
page read and write
573000
unkown
page execute and read and write
1EE314F8000
trusted library allocation
page read and write
1EE304C6000
trusted library allocation
page read and write
52A2000
trusted library allocation
page read and write
1EE25740000
heap
page read and write
17F37C92000
trusted library allocation
page read and write
1EE2C803000
trusted library allocation
page read and write
52A3000
trusted library allocation
page read and write
543F000
stack
page read and write
1EE2FE17000
trusted library allocation
page read and write
342E000
stack
page read and write
1EE30AE9000
trusted library allocation
page read and write
11BB000
heap
page read and write
1D39E000
stack
page read and write
1EE30519000
trusted library allocation
page read and write
61E000
heap
page read and write
1EE36C7E000
trusted library allocation
page read and write
1D53E000
heap
page read and write
1130000
heap
page read and write
78A000
unkown
page execute and write copy
2CC0000
direct allocation
page read and write
4441000
heap
page read and write
17F37C5B000
trusted library allocation
page read and write
B44000
heap
page read and write
A74000
heap
page read and write
A74000
heap
page read and write
4B90000
direct allocation
page read and write
3551000
heap
page read and write
1B50F000
stack
page read and write
58FC000
trusted library allocation
page read and write
260AA428000
heap
page read and write
1EE2F8F3000
trusted library allocation
page read and write
52A3000
trusted library allocation
page read and write
1EE30C0F000
trusted library allocation
page read and write
1E083B9A000
heap
page read and write
1EE305CB000
trusted library allocation
page read and write
1EE1EAE8000
trusted library allocation
page read and write
3DCF000
stack
page read and write
5345000
trusted library allocation
page read and write
1EE31366000
trusted library allocation
page read and write
4F40000
direct allocation
page execute and read and write
1EE30AE7000
trusted library allocation
page read and write
32FF000
stack
page read and write
1EE309FC000
trusted library allocation
page read and write
1EE30AB5000
trusted library allocation
page read and write
10FD000
stack
page read and write
1EE2E5F1000
trusted library allocation
page read and write
1EE30CAF000
trusted library allocation
page read and write
1EE30AB9000
trusted library allocation
page read and write
1EE302EA000
trusted library allocation
page read and write
1EE2E01A000
heap
page read and write
1EE30900000
trusted library allocation
page read and write
1EE313BE000
trusted library allocation
page read and write
317F000
stack
page read and write
1D54C000
heap
page read and write
1EE313DE000
trusted library allocation
page read and write
5345000
trusted library allocation
page read and write
11E0000
direct allocation
page read and write
1EE1EA47000
trusted library allocation
page read and write
AF9CFDE000
stack
page read and write
1EE30AFA000
trusted library allocation
page read and write
1EE30B8B000
trusted library allocation
page read and write
1EE369FB000
trusted library allocation
page read and write
260AA498000
heap
page read and write
1EE25710000
heap
page read and write
5284000
trusted library allocation
page read and write
1EE2EC72000
trusted library allocation
page read and write
4C60000
direct allocation
page execute and read and write
3C8F000
stack
page read and write
1EE30BD2000
trusted library allocation
page read and write
1EE2ECFA000
trusted library allocation
page read and write
5070000
direct allocation
page read and write
FFB000
heap
page read and write
1EE3088A000
trusted library allocation
page read and write
4441000
heap
page read and write
1EE2573F000
heap
page read and write
1EE305F6000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
1EE303B2000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
1EE2DB0D000
trusted library allocation
page read and write
1EE302E2000
trusted library allocation
page read and write
1EE2AAE7000
trusted library allocation
page read and write
5030000
direct allocation
page execute and read and write
D1A000
heap
page read and write
1EE38B09000
trusted library allocation
page read and write
52C5000
trusted library allocation
page read and write
2DFF000
stack
page read and write
1EE30425000
trusted library allocation
page read and write
A74000
heap
page read and write
5E05000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1EE2574F000
heap
page read and write
46DE000
stack
page read and write
260AA43C000
heap
page read and write
1EE25749000
heap
page read and write
52DA000
trusted library allocation
page read and write
AF9CF9E000
unkown
page readonly
5294000
trusted library allocation
page read and write
1EE2FE10000
trusted library allocation
page read and write
1EE2573F000
heap
page read and write
1EE2A5E2000
unclassified section
page read and write
1EE313E8000
trusted library allocation
page read and write
1D53E000
heap
page read and write
3F7E000
stack
page read and write
1EE3100F000
trusted library allocation
page read and write
562E000
trusted library allocation
page read and write
1EE30668000
trusted library allocation
page read and write
FFD000
heap
page read and write
8CE000
unkown
page readonly
1EE2E5BE000
trusted library allocation
page read and write
646000
heap
page read and write
1EE2FE7A000
trusted library allocation
page read and write
1EE36763000
trusted library allocation
page read and write
260AA3A3000
heap
page read and write
FFB000
heap
page read and write
1EE3056A000
trusted library allocation
page read and write
B60000
unkown
page write copy
61F000
unkown
page execute and read and write
1EE38BF9000
trusted library allocation
page read and write
5FB5000
trusted library allocation
page read and write
1EE2F0E1000
trusted library allocation
page read and write
D1B000
heap
page read and write
FA4000
heap
page read and write
F4E000
stack
page read and write
467000
unkown
page execute and read and write
2ED0000
direct allocation
page read and write
1EE2E52A000
trusted library allocation
page read and write
260AA39C000
heap
page read and write
52A5000
trusted library allocation
page read and write
1EE36653000
trusted library allocation
page read and write
1420000
heap
page read and write
1EE2E865000
trusted library allocation
page read and write
56D000
unkown
page execute and write copy
5283000
trusted library allocation
page read and write
112E000
stack
page read and write
1EE20375000
heap
page read and write
1EE1EA30000
trusted library allocation
page read and write
1EE368FA000
trusted library allocation
page read and write
1EE305E9000
trusted library allocation
page read and write
17F37D3C000
trusted library allocation
page read and write
2ED0000
direct allocation
page read and write
260A976F000
trusted library allocation
page read and write
545B000
trusted library allocation
page read and write
1EE30668000
trusted library allocation
page read and write
BE0000
heap
page read and write
BD4000
heap
page read and write
260AA3A9000
heap
page read and write
1EE2FE00000
trusted library allocation
page read and write
4B29000
trusted library allocation
page read and write
63F000
heap
page read and write
1EE257A5000
heap
page read and write
1EE309DE000
trusted library allocation
page read and write
1EE30951000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
A74000
heap
page read and write
1400000
direct allocation
page read and write
4AC1000
heap
page read and write
4441000
heap
page read and write
1EE2B840000
trusted library section
page read and write
260AA498000
heap
page read and write
1EE367ED000
trusted library allocation
page read and write
1EE2578F000
heap
page read and write
1EE31096000
trusted library allocation
page read and write
B44000
heap
page read and write
FA4000
heap
page read and write
1AF2F000
stack
page read and write
1EE2F0FE000
trusted library allocation
page read and write
1EE2E4A2000
trusted library allocation
page read and write
1134000
heap
page read and write
550000
direct allocation
page read and write
417F000
stack
page read and write
C85000
heap
page read and write
1E083E20000
heap
page read and write
52FF000
trusted library allocation
page read and write
5B9F000
stack
page read and write
6C4000
heap
page read and write
1EE2E4CB000
trusted library allocation
page read and write
5119DFB000
stack
page read and write
1EE2A5EF000
unclassified section
page read and write
1EE2F387000
trusted library allocation
page read and write
961000
unkown
page read and write
367E000
stack
page read and write
260AA42C000
heap
page read and write
6C4000
heap
page read and write
1EE36880000
trusted library allocation
page read and write
1EE368DC000
trusted library allocation
page read and write
4BD0000
direct allocation
page execute and read and write
1EE3043E000
trusted library allocation
page read and write
5260000
remote allocation
page read and write
1EE31003000
trusted library allocation
page read and write
111E000
stack
page read and write
4441000
heap
page read and write
9A7000
unkown
page execute and write copy
5DCD000
trusted library allocation
page read and write
1EE2F600000
trusted library allocation
page read and write
B44000
heap
page read and write
17F37C94000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
2E47000
heap
page read and write
1EE31459000
trusted library allocation
page read and write
1EE2575B000
heap
page read and write
1EE30283000
trusted library allocation
page read and write
5119BFE000
stack
page read and write
1EE25794000
heap
page read and write
1EE36C03000
trusted library allocation
page read and write
BD4000
heap
page read and write
83B000
unkown
page execute and read and write
1EE2ABA0000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1EE311B3000
trusted library allocation
page read and write
3E481BE000
unkown
page readonly
1EE30FF4000
trusted library allocation
page read and write
BA0000
heap
page read and write
481E000
stack
page read and write
6119000
trusted library allocation
page read and write
1EE31016000
trusted library allocation
page read and write
1EE2FF07000
trusted library allocation
page read and write
754000
heap
page read and write
1EE2A215000
trusted library allocation
page read and write
1EE2B610000
trusted library allocation
page read and write
CAC000
heap
page read and write
31BE000
stack
page read and write
2FFF000
stack
page read and write
5580000
trusted library allocation
page read and write
17F37C63000
trusted library allocation
page read and write
1EE2FA00000
trusted library allocation
page read and write
11B1000
heap
page read and write
1EE309D4000
trusted library allocation
page read and write
4A30000
direct allocation
page read and write
1EE2E503000
trusted library allocation
page read and write
2D0000
unkown
page execute and read and write
1EE2FF35000
trusted library allocation
page read and write
4C10000
direct allocation
page execute and read and write
4C6000
unkown
page execute and write copy
2CC0000
direct allocation
page read and write
1EE33624000
trusted library allocation
page read and write
11A9000
heap
page read and write
C16000
unkown
page execute and write copy
36BE000
stack
page read and write
BD4000
heap
page read and write
1EE305BE000
trusted library allocation
page read and write
2CBE000
stack
page read and write
4441000
heap
page read and write
646000
heap
page read and write
1EE2E090000
heap
page read and write
1EE30AD1000
trusted library allocation
page read and write
43FF000
stack
page read and write
505E000
stack
page read and write
1640000
heap
page read and write
5345000
trusted library allocation
page read and write
5EB2000
trusted library allocation
page read and write
1EE36944000
trusted library allocation
page read and write
3A3F000
stack
page read and write
4A41000
heap
page read and write
1EE3360C000
trusted library allocation
page read and write
1EE30403000
trusted library allocation
page read and write
1EE2E9E9000
trusted library allocation
page read and write
1EE2EF00000
trusted library allocation
page read and write
1EE3695F000
trusted library allocation
page read and write
D9C000
stack
page read and write
4441000
heap
page read and write
4A20000
direct allocation
page execute and read and write
1EE30BD2000
trusted library allocation
page read and write
511823E000
stack
page read and write
1EE32131000
trusted library allocation
page read and write
327F000
stack
page read and write
B52000
unkown
page readonly
6C4000
heap
page read and write
1EE38ED7000
trusted library allocation
page read and write
1EE38C7D000
trusted library allocation
page read and write
7A6000
unkown
page write copy
47EF000
stack
page read and write
1EE30A30000
trusted library allocation
page read and write
1EE2FA18000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
1EE305CE000
trusted library allocation
page read and write
1EE2A766000
trusted library allocation
page read and write
A74000
heap
page read and write
23AB09E0000
heap
page read and write
1EE36878000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
4FA000
stack
page read and write
1EE30603000
trusted library allocation
page read and write
4BE1000
heap
page read and write
1EE30483000
trusted library allocation
page read and write
3F3E000
stack
page read and write
52F4000
trusted library allocation
page read and write
5ACB000
trusted library allocation
page read and write
1EE2F0C1000
trusted library allocation
page read and write
51F0000
direct allocation
page execute and read and write
15D0000
direct allocation
page read and write
1EE2F203000
trusted library allocation
page read and write
1EE2F674000
trusted library allocation
page read and write
5200000
direct allocation
page execute and read and write
5760000
trusted library allocation
page read and write
1D524000
heap
page read and write
1F10003F000
trusted library allocation
page read and write
507E000
stack
page read and write
FA0000
heap
page read and write
1EE38E01000
trusted library allocation
page read and write
4F2000
unkown
page execute and write copy
4441000
heap
page read and write
1454000
heap
page read and write
1EE30BE3000
trusted library allocation
page read and write
2B3F000
stack
page read and write
4F00000
direct allocation
page read and write
5BA7000
trusted library allocation
page read and write
There are 6025 hidden memdumps, click here to show them.