IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\num[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1001090001\8138ba21a1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1001091001\bd214fbd32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1001092001\136916b3ff.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1001093001\num.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\3BW8PCDTI0L77ZRRJ1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\5VHE3T5UQF0Q17ZEPUURN3ZOS.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\G4X9C8XP66LPZY0PX2HHB5N.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\H8LKYZRGA2T6H9I76LLUOB7IB07Z.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\J2IWSCR5FJAMGGW2VC4ET4.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\3BW8PCDTI0L77ZRRJ1.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs-1.js
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs.js (copy)
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\G4X9C8XP66LPZY0PX2HHB5N.exe
"C:\Users\user~1\AppData\Local\Temp\G4X9C8XP66LPZY0PX2HHB5N.exe"
malicious
C:\Users\user\AppData\Local\Temp\J2IWSCR5FJAMGGW2VC4ET4.exe
"C:\Users\user~1\AppData\Local\Temp\J2IWSCR5FJAMGGW2VC4ET4.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user~1\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\3BW8PCDTI0L77ZRRJ1.exe
"C:\Users\user~1\AppData\Local\Temp\3BW8PCDTI0L77ZRRJ1.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user~1\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user~1\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1001090001\8138ba21a1.exe
"C:\Users\user~1\AppData\Local\Temp\1001090001\8138ba21a1.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001091001\bd214fbd32.exe
"C:\Users\user~1\AppData\Local\Temp\1001091001\bd214fbd32.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001092001\136916b3ff.exe
"C:\Users\user~1\AppData\Local\Temp\1001092001\136916b3ff.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
malicious
C:\Users\user\AppData\Local\Temp\1001090001\8138ba21a1.exe
"C:\Users\user~1\AppData\Local\Temp\1001090001\8138ba21a1.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
malicious
C:\Users\user\AppData\Local\Temp\1001093001\num.exe
"C:\Users\user~1\AppData\Local\Temp\1001093001\num.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001091001\bd214fbd32.exe
"C:\Users\user~1\AppData\Local\Temp\1001091001\bd214fbd32.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001092001\136916b3ff.exe
"C:\Users\user~1\AppData\Local\Temp\1001092001\136916b3ff.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
malicious
C:\Users\user\AppData\Local\Temp\1001093001\num.exe
"C:\Users\user~1\AppData\Local\Temp\1001093001\num.exe"
malicious
C:\Users\user\AppData\Local\Temp\5VHE3T5UQF0Q17ZEPUURN3ZOS.exe
"C:\Users\user~1\AppData\Local\Temp\5VHE3T5UQF0Q17ZEPUURN3ZOS.exe"
malicious
C:\Users\user\AppData\Local\Temp\H8LKYZRGA2T6H9I76LLUOB7IB07Z.exe
"C:\Users\user~1\AppData\Local\Temp\H8LKYZRGA2T6H9I76LLUOB7IB07Z.exe"
malicious
C:\Users\user\AppData\Local\Temp\GVMUIWZ4K51WM0HUSRJ8R.exe
"C:\Users\user~1\AppData\Local\Temp\GVMUIWZ4K51WM0HUSRJ8R.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001090001\8138ba21a1.exe
"C:\Users\user~1\AppData\Local\Temp\1001090001\8138ba21a1.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user~1\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2288 -parentBuildID 20230927232528 -prefsHandle 2228 -prefMapHandle 2220 -prefsLen 25302 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6c059e01-df08-4ea7-99e7-8e52a0f774f0} 6000 "\\.\pipe\gecko-crash-server-pipe.6000" 1c95726dd10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4580 -parentBuildID 20230927232528 -prefsHandle 4572 -prefMapHandle 4480 -prefsLen 26317 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d66d859a-061e-466f-93a3-e7567ce2edce} 6000 "\\.\pipe\gecko-crash-server-pipe.6000" 1c968370810 rdd
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 30 hidden processes, click here to show them.

URLs

Name
IP
Malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
http://mozilla.org/#/properties/bucketConfig/properties/totalhttp://mozilla.org/#/properties/userFac
unknown
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://www.cloudflare.com/learning/acces
unknown
http://mozilla.org/#/properties/schemaVersion
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
http://mozilla.org/#/properties/branches/anyOf/1/items/properties/feature/properties/value
unknown
https://sergei-esenin.com/
unknown
https://firefox.settings.services.allizom.org/v1/buckets/main/collections/search-config/records
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=UuGFpt56D9L4&l=
unknown
http://mozilla.o
unknown
http://mozilla.org/#/properties/disableGreaseOnFallback
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://screenshots.firefox.com
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
http://mozilla.org/#/properties/branches
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
http://185.215.113.37/e2b1563c6670f193.phpz
unknown
http://mozilla.org/#/properties/userFacingName
unknown
http://mozilla.org/#/properties/branches/anyOf/1/items/properties/features/items/properties/valuehtt
unknown
http://185.215.113.16:80/mine/random.exeages
unknown
https://github.com/mozilla-services/screenshots
unknown
http://mozilla.org/#/properties/featureIds/itemshttp://mozilla.org/#/properties/branches/anyOf/0http
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
http://mozilla.org/#/properties/outcomes/items
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsing
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
https://ok.ru/
unknown
https://getpocket.com/firefox/new_tab_learn_morediscoverystream.personalization.override
unknown
http://mozilla.org/#/properties/branches/anyOf/0/items/properties/feature
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1&
unknown
https://www.ecosia.org/newtab/
unknown
https://lv.queniujq.cn
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.cloudflare.steamstatic.com/public/javascript/webui/clientcom.js?v=qYlgdgWOD4Ng&amp
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://checkout.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
http://185.215.113.16/off/def.exe
unknown
https://spocs.getpocket.com/
unknown
https://www.iqiyi.com/
unknown
http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features/items/properties/featureI
unknown
https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=KkhJqW2NGKiM&l=engli
unknown
https://community.cloudflare
unknown
https://sergei-esenin.com/apiD3l
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://help.steampowered.com/en/
unknown
http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features/itemshttp://mozilla.org/#
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
https://login.steam
unknown
https://sergei-esenin.com/apipV
unknown
http://mozilla.org/#/properties/bucketConfig/properties/randomizationUnithttp://mozilla.org/#/proper
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&l=englis
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://sergei-esenin.com/apiKAa
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://steamcommunity.com/J
unknown
http://185.215.113.37/e2b1563c6670f193.phpWindows
unknown
http://mozilla.org/#/properties/outcomes
unknown
https://steamcommunity.com/workshop/
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://mozilla.org/#/properties/isRollouthttp://mozilla.org/#/properties/bucketConfigUnique
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/profilev2.css?v=gNE3gksLVEVa&l=en
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://screenshots.firefox.com/
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://firefox-source-docs.mozilla.org/remote/Security.html
unknown
http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features/items/properties/value/ad
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
http://185.215.113.16/steam/random.exe2
unknown
https://www.wykop.pl/
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=e
unknown
https://vk.com/
unknown
https://steamcommunity.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Ff_1prscqzeu&
unknown
https://www.olx.pl/
unknown
http://mozilla.org/#/properties/dnsMaxAnyPriorityThreads
unknown
http://mozilla.org/#/properties/branches/anyOf/0/items/properties/ratio
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-4
unknown
https://clearancek.site:443/apii
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-2
unknown
http://mozilla.org/#/properties/appId
unknown
https://api.steampowered.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
sergei-esenin.com
104.21.53.8
malicious
steamcommunity.com
104.102.49.254
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious
example.org
93.184.215.14
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.1.91
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.184.238
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
normandy-cdn.services.mozilla.com
35.201.103.21
spocs.getpocket.com
unknown
time.windows.com
unknown
content-signature-2.cdn.mozilla.net
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
There are 17 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.53.8
sergei-esenin.com
United States
malicious
185.215.113.43
unknown
Portugal
malicious
185.215.113.37
unknown
Portugal
malicious
104.102.49.254
steamcommunity.com
United States
malicious
185.215.113.16
unknown
Portugal
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
142.250.184.238
youtube.com
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
8138ba21a1.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
bd214fbd32.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
136916b3ff.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
num.exe
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4D30000
direct allocation
page read and write
malicious
5C1000
unkown
page execute and read and write
malicious
E1B000
heap
page read and write
malicious
F81000
unkown
page execute and read and write
malicious
361000
unkown
page execute and write copy
malicious
361000
unkown
page execute and write copy
malicious
291000
unkown
page execute and read and write
malicious
4A20000
direct allocation
page read and write
malicious
4A20000
direct allocation
page read and write
malicious
4E50000
direct allocation
page read and write
malicious
F87000
heap
page read and write
malicious
4BB0000
direct allocation
page read and write
malicious
471000
unkown
page execute and read and write
malicious
5C1000
unkown
page execute and read and write
malicious
111E000
heap
page read and write
malicious
361000
unkown
page execute and write copy
malicious
5340000
direct allocation
page read and write
malicious
112E000
heap
page read and write
malicious
D2E000
heap
page read and write
malicious
5120000
direct allocation
page read and write
malicious
51000
unkown
page execute and read and write
malicious
361000
unkown
page execute and write copy
malicious
4CE0000
direct allocation
page read and write
malicious
51000
unkown
page execute and read and write
malicious
591000
unkown
page execute and read and write
malicious
4D90000
direct allocation
page read and write
malicious
3F2F000
stack
page read and write
1C96FCB0000
trusted library allocation
page read and write
F74000
heap
page read and write
32FE000
stack
page read and write
3BBE000
stack
page read and write
1C967DDF000
trusted library allocation
page read and write
1C9679DE000
trusted library allocation
page read and write
1C967552000
trusted library allocation
page read and write
48B1000
heap
page read and write
1C96A9A0000
trusted library allocation
page read and write
204F096D000
heap
page read and write
B44000
heap
page read and write
984000
heap
page read and write
48B1000
heap
page read and write
1C963F29000
trusted library allocation
page read and write
4D50000
direct allocation
page execute and read and write
48B1000
heap
page read and write
1C968658000
trusted library allocation
page read and write
11B4000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
1187000
heap
page read and write
1C9642BE000
trusted library allocation
page read and write
5CA8000
trusted library allocation
page read and write
61A000
unkown
page execute and read and write
4591000
heap
page read and write
5B01000
trusted library allocation
page read and write
5A18000
trusted library allocation
page read and write
2F1E000
stack
page read and write
1C96A67E000
trusted library allocation
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
1C96845E000
trusted library allocation
page read and write
1C9686CA000
trusted library allocation
page read and write
59BC000
trusted library allocation
page read and write
C34000
heap
page read and write
1C9649D7000
trusted library allocation
page read and write
1C9684A1000
trusted library allocation
page read and write
4591000
heap
page read and write
1C966F7F000
trusted library allocation
page read and write
4591000
heap
page read and write
1C968476000
trusted library allocation
page read and write
1C96703F000
trusted library allocation
page read and write
1C96F71B000
trusted library allocation
page read and write
1C9684B5000
trusted library allocation
page read and write
4C91000
heap
page read and write
711000
unkown
page execute and write copy
FB4000
heap
page read and write
5D54000
trusted library allocation
page read and write
1109000
heap
page read and write
1C971625000
trusted library allocation
page read and write
1263000
heap
page read and write
6E5000
unkown
page execute and read and write
4861000
heap
page read and write
1C96F708000
trusted library allocation
page read and write
1C968F00000
trusted library allocation
page read and write
1C96C000000
trusted library allocation
page read and write
59CB000
trusted library allocation
page read and write
4861000
heap
page read and write
BE0000
direct allocation
page read and write
1C964098000
trusted library allocation
page read and write
1120000
heap
page read and write
59A1000
trusted library allocation
page read and write
5DCC000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
5CA3000
trusted library allocation
page read and write
4861000
heap
page read and write
FB4000
heap
page read and write
5A01000
trusted library allocation
page read and write
1C96760F000
trusted library allocation
page read and write
1C96897C000
trusted library allocation
page read and write
1C967DEA000
trusted library allocation
page read and write
7AC000
stack
page read and write
5A01000
trusted library allocation
page read and write
1C96FCAC000
trusted library allocation
page read and write
1C96892C000
trusted library allocation
page read and write
1C967637000
trusted library allocation
page read and write
59A2000
trusted library allocation
page read and write
FB4000
heap
page read and write
314F000
stack
page read and write
1C97163A000
trusted library allocation
page read and write
1A4000
heap
page read and write
1C968469000
trusted library allocation
page read and write
1C962A6D000
trusted library allocation
page read and write
59B7000
trusted library allocation
page read and write
A3F000
unkown
page execute and write copy
1275000
heap
page read and write
984000
heap
page read and write
4E8C000
stack
page read and write
1C967496000
trusted library allocation
page read and write
5988000
trusted library allocation
page read and write
1104000
heap
page read and write
1C967DF5000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C96770A000
trusted library allocation
page read and write
1C966900000
trusted library allocation
page read and write
FB4000
heap
page read and write
FB4000
heap
page read and write
A73000
heap
page read and write
59C4000
trusted library allocation
page read and write
1C9570D0000
heap
page readonly
382F000
stack
page read and write
33FF000
stack
page read and write
4591000
heap
page read and write
984000
heap
page read and write
1C96F4C9000
trusted library allocation
page read and write
4861000
heap
page read and write
1C96429D000
trusted library allocation
page read and write
728000
unkown
page execute and write copy
576000
unkown
page execute and read and write
C34000
heap
page read and write
669B000
trusted library allocation
page read and write
1C966FD6000
trusted library allocation
page read and write
B44000
heap
page read and write
4591000
heap
page read and write
1C963000000
trusted library allocation
page read and write
1C968769000
trusted library allocation
page read and write
CD6000
unkown
page execute and write copy
5E23000
trusted library allocation
page read and write
1C96869F000
trusted library allocation
page read and write
4ECF000
stack
page read and write
2BEF000
stack
page read and write
1C966C3E000
trusted library allocation
page read and write
1C968CFB000
trusted library allocation
page read and write
1254000
heap
page read and write
5F2B000
trusted library allocation
page read and write
4591000
heap
page read and write
1C95FF62000
heap
page read and write
374E000
stack
page read and write
1C963066000
trusted library allocation
page read and write
49D1000
heap
page read and write
59D8000
trusted library allocation
page read and write
126C000
heap
page read and write
1C96F186000
trusted library allocation
page read and write
48B1000
heap
page read and write
204EFEA2000
remote allocation
page execute read
1C96847B000
trusted library allocation
page read and write
1C968665000
trusted library allocation
page read and write
4591000
heap
page read and write
FB4000
heap
page read and write
4590000
heap
page read and write
1C962981000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
D17000
heap
page read and write
59B9000
trusted library allocation
page read and write
1254000
heap
page read and write
1C968A17000
trusted library allocation
page read and write
1C9657F7000
trusted library allocation
page read and write
42F1000
heap
page read and write
685000
unkown
page execute and read and write
5E22000
trusted library allocation
page read and write
1C969003000
trusted library allocation
page read and write
59C8000
trusted library allocation
page read and write
1C9689EF000
trusted library allocation
page read and write
4861000
heap
page read and write
1C966903000
trusted library allocation
page read and write
49D0000
trusted library allocation
page read and write
5DD7000
trusted library allocation
page read and write
5E6000
unkown
page execute and write copy
4591000
heap
page read and write
1C9689E2000
trusted library allocation
page read and write
FB4000
heap
page read and write
1A079FC000
stack
page read and write
1C968922000
trusted library allocation
page read and write
1C96F0B7000
trusted library allocation
page read and write
1C964153000
trusted library allocation
page read and write
40AE000
stack
page read and write
1CAAE000
stack
page read and write
6A191FE000
stack
page read and write
940000
direct allocation
page read and write
C7E000
stack
page read and write
1C96A912000
trusted library allocation
page read and write
4BD0000
direct allocation
page execute and read and write
E94000
heap
page read and write
4D60000
direct allocation
page execute and read and write
392E000
stack
page read and write
37AF000
stack
page read and write
5A91000
trusted library allocation
page read and write
37E000
unkown
page readonly
204F0203000
trusted library allocation
page read and write
1C966B4A000
heap
page read and write
1C96ACF7000
trusted library allocation
page read and write
3BA9563000
stack
page read and write
1C968671000
trusted library allocation
page read and write
1C96F4C9000
trusted library allocation
page read and write
4861000
heap
page read and write
1C9634A3000
trusted library allocation
page read and write
1C96F3D2000
trusted library allocation
page read and write
11FD000
heap
page read and write
E94000
heap
page read and write
F74000
heap
page read and write
15B0000
direct allocation
page read and write
5AC6000
trusted library allocation
page read and write
1805CA00000
trusted library allocation
page read and write
1C968983000
trusted library allocation
page read and write
5354000
trusted library allocation
page read and write
11AF000
heap
page read and write
7565BEB000
stack
page read and write
1C96426C000
trusted library allocation
page read and write
1C9670D8000
trusted library allocation
page read and write
10D5000
heap
page read and write
4850000
direct allocation
page execute and read and write
1C9647DB000
trusted library allocation
page read and write
4A4B000
stack
page read and write
1C96939D000
trusted library allocation
page read and write
1C962B19000
trusted library allocation
page read and write
48B1000
heap
page read and write
438F000
stack
page read and write
33EF000
stack
page read and write
1C962A68000
trusted library allocation
page read and write
204F0949000
heap
page read and write
1C968473000
trusted library allocation
page read and write
50BF000
stack
page read and write
1C96899D000
trusted library allocation
page read and write
FE9000
unkown
page write copy
1C9684B7000
trusted library allocation
page read and write
BDE000
stack
page read and write
1C966F8B000
trusted library allocation
page read and write
1A4000
heap
page read and write
1C9689E4000
trusted library allocation
page read and write
36EF000
stack
page read and write
1C96708C000
trusted library allocation
page read and write
59CF000
trusted library allocation
page read and write
1C96F718000
trusted library allocation
page read and write
32EE000
stack
page read and write
204F09C1000
heap
page read and write
1C966AB8000
heap
page read and write
1C968A00000
trusted library allocation
page read and write
4D51000
trusted library allocation
page read and write
CBE000
stack
page read and write
1C9642F6000
trusted library allocation
page read and write
1C96791C000
trusted library allocation
page read and write
984000
heap
page read and write
3BAB03E000
stack
page read and write
30DFD691000
trusted library allocation
page execute read
FB4000
heap
page read and write
1C9683E3000
trusted library allocation
page read and write
436F000
stack
page read and write
5DD0000
trusted library allocation
page read and write
1C96761A000
trusted library allocation
page read and write
FB5000
heap
page read and write
552000
unkown
page execute and read and write
1C969352000
trusted library allocation
page read and write
608000
unkown
page execute and read and write
5CAC000
trusted library allocation
page read and write
1C96751D000
trusted library allocation
page read and write
48B1000
heap
page read and write
718000
unkown
page execute and read and write
FB4000
heap
page read and write
4F70000
direct allocation
page execute and read and write
1C966AB3000
heap
page read and write
1C96896B000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C967D43000
trusted library allocation
page read and write
5CA7000
trusted library allocation
page read and write
5F2000
unkown
page execute and read and write
1805CB03000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C968100000
trusted library allocation
page read and write
1C9683BD000
trusted library allocation
page read and write
1C96F50D000
trusted library allocation
page read and write
1C967634000
trusted library allocation
page read and write
1C95FF6A000
heap
page read and write
59D8000
trusted library allocation
page read and write
1C96F40E000
trusted library allocation
page read and write
4DBE000
stack
page read and write
C7C000
unkown
page execute and read and write
1C9683B9000
trusted library allocation
page read and write
1C9686C4000
trusted library allocation
page read and write
1C966FA0000
trusted library allocation
page read and write
1C966E98000
trusted library allocation
page read and write
FB4000
heap
page read and write
59A5000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
5CA0000
trusted library allocation
page read and write
3B4F000
stack
page read and write
433E000
stack
page read and write
2960000
direct allocation
page read and write
1C966E5D000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C95FF62000
heap
page read and write
C34000
heap
page read and write
3BB21FB000
stack
page read and write
60CD000
stack
page read and write
1C968402000
trusted library allocation
page read and write
48B1000
heap
page read and write
13E4000
heap
page read and write
FB0000
direct allocation
page read and write
357E000
stack
page read and write
463F000
stack
page read and write
1C96771C000
trusted library allocation
page read and write
1C966E73000
trusted library allocation
page read and write
28FB000
stack
page read and write
42F1000
heap
page read and write
1C96F3C5000
trusted library allocation
page read and write
410000
unkown
page readonly
1C96F736000
trusted library allocation
page read and write
1C964295000
trusted library allocation
page read and write
4591000
heap
page read and write
FB4000
heap
page read and write
1C96AC8D000
trusted library allocation
page read and write
1C967FF9000
trusted library allocation
page read and write
4861000
heap
page read and write
B00000
unkown
page readonly
1C962F2F000
trusted library allocation
page read and write
B44000
heap
page read and write
4591000
heap
page read and write
5ED9000
trusted library allocation
page read and write
204F0090000
heap
page read and write
44FF000
stack
page read and write
311F000
stack
page read and write
1C96401F000
trusted library allocation
page read and write
1C96766F000
trusted library allocation
page read and write
FB4000
heap
page read and write
4BAE000
stack
page read and write
1C95FF64000
heap
page read and write
1C96FCB0000
trusted library allocation
page read and write
1C968ACF000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
1C967662000
trusted library allocation
page read and write
5D68000
trusted library allocation
page read and write
1C9670B0000
trusted library allocation
page read and write
1C968003000
trusted library allocation
page read and write
A00000
direct allocation
page read and write
3E6F000
stack
page read and write
1C968BF0000
trusted library allocation
page read and write
35AF000
stack
page read and write
1C96F43C000
trusted library allocation
page read and write
4591000
heap
page read and write
B44000
heap
page read and write
FB4000
heap
page read and write
59AB000
trusted library allocation
page read and write
59D8000
trusted library allocation
page read and write
59AD000
trusted library allocation
page read and write
1C9657BE000
trusted library allocation
page read and write
1C966E00000
trusted library allocation
page read and write
45B0000
heap
page read and write
4F10000
direct allocation
page execute and read and write
37CE000
stack
page read and write
7AC000
stack
page read and write
1C968C1E000
trusted library allocation
page read and write
4591000
heap
page read and write
400E000
stack
page read and write
1C96765F000
trusted library allocation
page read and write
1C96708D000
trusted library allocation
page read and write
1C968473000
trusted library allocation
page read and write
4EE0000
direct allocation
page execute and read and write
1C968A36000
trusted library allocation
page read and write
1C966E86000
trusted library allocation
page read and write
1C9670D3000
trusted library allocation
page read and write
1200000
heap
page read and write
5036000
trusted library allocation
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
FB4000
heap
page read and write
5F7D000
trusted library allocation
page read and write
1C96F3A0000
trusted library allocation
page read and write
1D2BC000
stack
page read and write
5A18000
trusted library allocation
page read and write
117B000
heap
page read and write
1C96F3D1000
trusted library allocation
page read and write
5C80000
trusted library allocation
page read and write
3FB000
stack
page read and write
FB4000
heap
page read and write
5030000
remote allocation
page read and write
1C968934000
trusted library allocation
page read and write
204F0F44000
heap
page read and write
1C95726D000
trusted library allocation
page read and write
3D4F000
stack
page read and write
2EEF000
stack
page read and write
204F09DD000
heap
page read and write
1C967DC7000
trusted library allocation
page read and write
1C9686C4000
trusted library allocation
page read and write
1C968466000
trusted library allocation
page read and write
1C968E13000
trusted library allocation
page read and write
1C968F3A000
trusted library allocation
page read and write
1C9686CB000
trusted library allocation
page read and write
204F0F2D000
heap
page read and write
A00000
direct allocation
page read and write
4F10000
direct allocation
page execute and read and write
FB4000
heap
page read and write
FB4000
heap
page read and write
6045000
trusted library allocation
page read and write
204F08E9000
heap
page read and write
48B1000
heap
page read and write
59D3000
trusted library allocation
page read and write
2DAF000
stack
page read and write
1C956F30000
heap
page read and write
1193000
heap
page read and write
1C9689ED000
trusted library allocation
page read and write
1C96F110000
trusted library allocation
page read and write
E6F000
heap
page read and write
599E000
trusted library allocation
page read and write
1024000
heap
page read and write
3BAF43D000
stack
page read and write
598F000
trusted library allocation
page read and write
1C968F8E000
trusted library allocation
page read and write
1C96F30A000
trusted library allocation
page read and write
1C9647D2000
trusted library allocation
page read and write
39BF000
stack
page read and write
1C96C02A000
trusted library allocation
page read and write
1C9682FB000
trusted library allocation
page read and write
1C96767B000
trusted library allocation
page read and write
1C96F404000
trusted library allocation
page read and write
1C964003000
trusted library allocation
page read and write
49E1000
heap
page read and write
5CAB000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C96703D000
trusted library allocation
page read and write
59F2000
trusted library allocation
page read and write
1C9684AB000
trusted library allocation
page read and write
1C967000000
trusted library allocation
page read and write
4BA0000
direct allocation
page execute and read and write
59DA000
trusted library allocation
page read and write
599E000
trusted library allocation
page read and write
1C96F3D1000
trusted library allocation
page read and write
1C96409F000
trusted library allocation
page read and write
1C9672F9000
trusted library allocation
page read and write
1C96F0AB000
trusted library allocation
page read and write
1C9647DB000
trusted library allocation
page read and write
1C96F463000
trusted library allocation
page read and write
1C969218000
trusted library allocation
page read and write
1C968A7C000
trusted library allocation
page read and write
2035123E000
heap
page read and write
1C968979000
trusted library allocation
page read and write
1C9683C3000
trusted library allocation
page read and write
15B0000
direct allocation
page read and write
59B8000
trusted library allocation
page read and write
10F0000
direct allocation
page read and write
1C968DF8000
trusted library allocation
page read and write
1C96726A000
trusted library allocation
page read and write
1273000
heap
page read and write
5A05000
trusted library allocation
page read and write
4FB0000
direct allocation
page execute and read and write
C34000
heap
page read and write
1C968441000
trusted library allocation
page read and write
1054000
heap
page read and write
1C9640C2000
trusted library allocation
page read and write
A00000
direct allocation
page read and write
1C967DB4000
trusted library allocation
page read and write
1C967FF3000
trusted library allocation
page read and write
59D9000
trusted library allocation
page read and write
1C9677A5000
trusted library allocation
page read and write
F74000
heap
page read and write
1C968600000
trusted library allocation
page read and write
1C96845E000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
1C968828000
trusted library allocation
page read and write
4861000
heap
page read and write
4591000
heap
page read and write
1C9676A3000
trusted library allocation
page read and write
1C967DB1000
trusted library allocation
page read and write
337F000
stack
page read and write
FB4000
heap
page read and write
1C96F3DE000
trusted library allocation
page read and write
1C9682E9000
trusted library allocation
page read and write
3B6F000
stack
page read and write
343E000
stack
page read and write
1C966C16000
trusted library allocation
page read and write
31AE000
stack
page read and write
1C968A0F000
trusted library allocation
page read and write
408E000
stack
page read and write
1C9692BD000
trusted library allocation
page read and write
598B000
trusted library allocation
page read and write
300E000
stack
page read and write
1C967FED000
trusted library allocation
page read and write
CFE000
stack
page read and write
578000
unkown
page execute and write copy
204F0277000
trusted library allocation
page read and write
204F0790000
heap
page read and write
5120000
direct allocation
page read and write
1C96F22D000
trusted library allocation
page read and write
5A81000
trusted library allocation
page read and write
5E1B000
trusted library allocation
page read and write
984000
heap
page read and write
5AA1000
trusted library allocation
page read and write
FE2000
unkown
page execute and read and write
676000
unkown
page execute and write copy
E94000
heap
page read and write
204F00E8000
unkown
page execute read
1A4000
heap
page read and write
BF4000
heap
page read and write
1040000
direct allocation
page read and write
1C96898B000
trusted library allocation
page read and write
51EE000
trusted library allocation
page read and write
4861000
heap
page read and write
D49000
unkown
page execute and read and write
4861000
heap
page read and write
FB4000
heap
page read and write
5290000
direct allocation
page execute and read and write
940000
direct allocation
page read and write
F74000
heap
page read and write
1C96892C000
trusted library allocation
page read and write
2ECF000
stack
page read and write
204F0050000
unclassified section
page read and write
5D60000
trusted library allocation
page read and write
1C96F70D000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
82D000
stack
page read and write
1805C550000
remote allocation
page read and write
1C96F1ED000
trusted library allocation
page read and write
FB4000
heap
page read and write
41CE000
stack
page read and write
E94000
heap
page read and write
629000
unkown
page write copy
1805CB0D000
trusted library allocation
page read and write
1C96763A000
trusted library allocation
page read and write
1C968AFD000
trusted library allocation
page read and write
1C96A917000
trusted library allocation
page read and write
59AB000
trusted library allocation
page read and write
1C96891C000
trusted library allocation
page read and write
1C96840D000
trusted library allocation
page read and write
3F2F000
stack
page read and write
1C964984000
trusted library allocation
page read and write
F74000
heap
page read and write
59E4000
trusted library allocation
page read and write
FB4000
heap
page read and write
F23000
heap
page read and write
54A0000
direct allocation
page execute and read and write
4E80000
direct allocation
page execute and read and write
1C96338A000
trusted library allocation
page read and write
1C9674FE000
trusted library allocation
page read and write
1C9647D5000
trusted library allocation
page read and write
1C968678000
trusted library allocation
page read and write
5D5D000
trusted library allocation
page read and write
4D90000
direct allocation
page read and write
1C9684A1000
trusted library allocation
page read and write
1C95FF70000
heap
page read and write
5E2C000
trusted library allocation
page read and write
4FA000
stack
page read and write
FB4000
heap
page read and write
FB4000
heap
page read and write
1C9717D0000
trusted library allocation
page read and write
A1C000
unkown
page write copy
1C966E65000
trusted library allocation
page read and write
1C96F786000
trusted library allocation
page read and write
1C96FCBA000
trusted library allocation
page read and write
48B1000
heap
page read and write
B44000
heap
page read and write
F65000
stack
page read and write
1190000
heap
page read and write
1C96F54B000
trusted library allocation
page read and write
11BE000
stack
page read and write
FB4000
heap
page read and write
5AA1000
trusted library allocation
page read and write
1C96934D000
trusted library allocation
page read and write
1CD8F000
stack
page read and write
1C966D5A000
trusted library allocation
page read and write
4591000
heap
page read and write
A51000
heap
page read and write
F74000
heap
page read and write
1C96A9A5000
trusted library allocation
page read and write
1C9696CF000
trusted library allocation
page read and write
5DA3000
trusted library allocation
page read and write
5DAB000
trusted library allocation
page read and write
734000
heap
page read and write
1C95FF6A000
heap
page read and write
3A0F000
stack
page read and write
1CFDE000
stack
page read and write
B44000
heap
page read and write
59D9000
trusted library allocation
page read and write
5F57000
trusted library allocation
page read and write
39C0000
heap
page read and write
C34000
heap
page read and write
79A000
unkown
page execute and read and write
5F6B000
trusted library allocation
page read and write
6A189FE000
stack
page read and write
5CAF000
trusted library allocation
page read and write
450E000
stack
page read and write
5F18000
trusted library allocation
page read and write
1C96706C000
trusted library allocation
page read and write
1C964233000
trusted library allocation
page read and write
1C96ACFB000
trusted library allocation
page read and write
11CE000
stack
page read and write
FB4000
heap
page read and write
1C9688EA000
trusted library allocation
page read and write
4861000
heap
page read and write
325F000
stack
page read and write
1C968895000
trusted library allocation
page read and write
124E000
heap
page read and write
1C96F221000
trusted library allocation
page read and write
950000
unkown
page readonly
B44000
heap
page read and write
1C967D99000
trusted library allocation
page read and write
A12000
unkown
page readonly
1C966E73000
trusted library allocation
page read and write
1C96F737000
trusted library allocation
page read and write
1C96867B000
trusted library allocation
page read and write
59D4000
trusted library allocation
page read and write
1C9647D2000
trusted library allocation
page read and write
9EC000
unkown
page readonly
FB5000
heap
page read and write
1C95FF62000
heap
page read and write
FB4000
heap
page read and write
603D000
trusted library allocation
page read and write
42FF000
stack
page read and write
718000
unkown
page execute and read and write
FB4000
heap
page read and write
1C96424E000
trusted library allocation
page read and write
2C90000
direct allocation
page execute and read and write
603000
unkown
page execute and write copy
5ED8000
trusted library allocation
page read and write
1C967CA0000
trusted library section
page read and write
1C96299E000
trusted library allocation
page read and write
1C96AC03000
trusted library allocation
page read and write
59A1000
trusted library allocation
page read and write
1CAAE000
stack
page read and write
1C966D03000
trusted library allocation
page read and write
AF5000
stack
page read and write
1C9572D8000
trusted library allocation
page read and write
204F0F58000
heap
page read and write
1B448000
heap
page read and write
1171000
heap
page read and write
1C96F189000
trusted library allocation
page read and write
1C965322000
trusted library allocation
page read and write
1175000
heap
page read and write
1C958BC4000
heap
page read and write
4731000
heap
page read and write
5E27000
trusted library allocation
page read and write
1C96F1FD000
trusted library allocation
page read and write
616000
unkown
page execute and write copy
44BF000
stack
page read and write
1C96869C000
trusted library allocation
page read and write
440F000
stack
page read and write
5CA2000
trusted library allocation
page read and write
1C96F3E2000
trusted library allocation
page read and write
940000
direct allocation
page read and write
1A4000
heap
page read and write
32CE000
stack
page read and write
1C96F7F6000
trusted library allocation
page read and write
1C967300000
trusted library allocation
page read and write
473F000
stack
page read and write
1C971733000
trusted library allocation
page read and write
59D4000
trusted library allocation
page read and write
12CC000
stack
page read and write
1269000
heap
page read and write
1C9717D0000
trusted library allocation
page read and write
4850000
direct allocation
page execute and read and write
2EFF000
stack
page read and write
5C83000
trusted library allocation
page read and write
1C968445000
trusted library allocation
page read and write
FB4000
heap
page read and write
3BAEC3B000
stack
page read and write
5D9000
unkown
page execute and write copy
FB4000
heap
page read and write
1254000
heap
page read and write
1C95FF6A000
heap
page read and write
1C9684BA000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
34BF000
stack
page read and write
1C96EC00000
trusted library allocation
page read and write
48B1000
heap
page read and write
4EF0000
direct allocation
page read and write
5CA0000
trusted library allocation
page read and write
CF3000
unkown
page execute and write copy
2DB0000
trusted library allocation
page read and write
1C968FA0000
trusted library allocation
page read and write
1C964969000
trusted library allocation
page read and write
2B80000
heap
page read and write
1C968665000
trusted library allocation
page read and write
1C9670B0000
trusted library allocation
page read and write
BF4000
heap
page read and write
204F09D2000
heap
page read and write
1360000
direct allocation
page read and write
4861000
heap
page read and write
4580000
direct allocation
page read and write
4271000
heap
page read and write
1C96869C000
trusted library allocation
page read and write
1C969230000
trusted library allocation
page read and write
1C95FF6A000
heap
page read and write
1C9689DD000
trusted library allocation
page read and write
1C967253000
trusted library allocation
page read and write
27AE000
stack
page read and write
411000
unkown
page execute and write copy
719000
unkown
page execute and write copy
28AF000
stack
page read and write
FB4000
heap
page read and write
59EC000
trusted library allocation
page read and write
5985000
trusted library allocation
page read and write
1C96F3BB000
trusted library allocation
page read and write
1C963303000
trusted library allocation
page read and write
1204000
heap
page read and write
5C8D000
trusted library allocation
page read and write
FB4000
heap
page read and write
1A4000
heap
page read and write
1C96F2A0000
trusted library allocation
page read and write
1C96F803000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
1C968C5F000
trusted library allocation
page read and write
490E000
stack
page read and write
1C9642DE000
trusted library allocation
page read and write
48B1000
heap
page read and write
1054000
heap
page read and write
4591000
heap
page read and write
119B000
heap
page read and write
5CA4000
trusted library allocation
page read and write
1A4000
heap
page read and write
11A0000
heap
page read and write
1C966FA7000
trusted library allocation
page read and write
5AA000
unkown
page read and write
5D51000
trusted library allocation
page read and write
360000
unkown
page readonly
1C966FA7000
trusted library allocation
page read and write
940000
direct allocation
page read and write
703000
unkown
page execute and write copy
1C9686D1000
trusted library allocation
page read and write
1C96F782000
trusted library allocation
page read and write
1C9642A6000
trusted library allocation
page read and write
1C96899D000
trusted library allocation
page read and write
13E4000
heap
page read and write
1C95FF70000
heap
page read and write
1C96FC65000
trusted library allocation
page read and write
1C96935F000
trusted library allocation
page read and write
352F000
stack
page read and write
204F0F22000
heap
page read and write
1C96F463000
trusted library allocation
page read and write
40BE000
stack
page read and write
3BA8EBB000
stack
page read and write
1C96706A000
trusted library allocation
page read and write
1C967DC2000
trusted library allocation
page read and write
1C9642F6000
trusted library allocation
page read and write
1C96F399000
trusted library allocation
page read and write
1C968D01000
trusted library allocation
page read and write
3E2E000
stack
page read and write
204F09DD000
heap
page read and write
1C9640EC000
trusted library allocation
page read and write
117D000
heap
page read and write
B44000
heap
page read and write
4591000
heap
page read and write
1C96F42E000
trusted library allocation
page read and write
4A10000
direct allocation
page read and write
12CE000
heap
page read and write
59BE000
trusted library allocation
page read and write
4591000
heap
page read and write
3BACA2F000
stack
page read and write
3BB1BBE000
stack
page read and write
1C967675000
trusted library allocation
page read and write
4D40000
heap
page execute and read and write
A00000
direct allocation
page read and write
1C964E00000
trusted library allocation
page read and write
5CB7000
trusted library allocation
page read and write
1360000
direct allocation
page read and write
D12000
unkown
page execute and read and write
5A90000
trusted library allocation
page read and write
1C967625000
trusted library allocation
page read and write
2B4E000
stack
page read and write
BF0000
heap
page read and write
1C96F4C9000
trusted library allocation
page read and write
C23000
heap
page read and write
C34000
heap
page read and write
1C967927000
trusted library allocation
page read and write
5989000
trusted library allocation
page read and write
5BC000
unkown
page readonly
598F000
trusted library allocation
page read and write
4B5F000
stack
page read and write
1C96897C000
trusted library allocation
page read and write
3ACF000
stack
page read and write
1C966F7F000
trusted library allocation
page read and write
B44000
heap
page read and write
5AA1000
trusted library allocation
page read and write
59B3000
trusted library allocation
page read and write
1C968643000
trusted library allocation
page read and write
1C968466000
trusted library allocation
page read and write
1C9629C6000
trusted library allocation
page read and write
1C968F15000
trusted library allocation
page read and write
1A4000
heap
page read and write
1C9687E0000
trusted library allocation
page read and write
F74000
heap
page read and write
1C966E5D000
trusted library allocation
page read and write
1C967DC2000
trusted library allocation
page read and write
1A4000
heap
page read and write
1C9640FD000
trusted library allocation
page read and write
1C967DC7000
trusted library allocation
page read and write
1805CB10000
trusted library allocation
page read and write
FB4000
heap
page read and write
4861000
heap
page read and write
734000
heap
page read and write
1C96A9FB000
trusted library allocation
page read and write
1C967725000
trusted library allocation
page read and write
5A90000
trusted library allocation
page read and write
FB4000
heap
page read and write
C34000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
A00000
direct allocation
page read and write
989000
unkown
page execute and read and write
52A0000
direct allocation
page execute and read and write
1C96A917000
trusted library allocation
page read and write
630000
unkown
page execute and read and write
1CECF000
stack
page read and write
1C9657DB000
trusted library allocation
page read and write
1C968634000
trusted library allocation
page read and write
1C96811A000
trusted library allocation
page read and write
320F000
stack
page read and write
FB4000
heap
page read and write
B00000
unkown
page read and write
B44000
heap
page read and write
A5F000
heap
page read and write
1805CC13000
trusted library allocation
page read and write
173A000
heap
page read and write
2DB0000
trusted library allocation
page read and write
2960000
direct allocation
page read and write
1A8F000
stack
page read and write
F90000
direct allocation
page execute and read and write
59E9000
trusted library allocation
page read and write
3BA95EE000
stack
page read and write
B44000
heap
page read and write
1C9674CD000
trusted library allocation
page read and write
1C97178B000
trusted library allocation
page read and write
40FF000
stack
page read and write
6A199FE000
stack
page read and write
FB4000
heap
page read and write
5CA7000
trusted library allocation
page read and write
20351236000
heap
page read and write
204F095F000
heap
page read and write
59E1000
trusted library allocation
page read and write
1C96F76E000
trusted library allocation
page read and write
1C968A3B000
trusted library allocation
page read and write
1C962969000
trusted library allocation
page read and write
FB4000
heap
page read and write
398F000
stack
page read and write
11B4000
heap
page read and write
11B4000
heap
page read and write
1C967DA2000
trusted library allocation
page read and write
3BB1F3B000
stack
page read and write
1347000
heap
page read and write
52FC000
trusted library allocation
page read and write
1805C790000
unclassified section
page readonly
1C967CF2000
unclassified section
page read and write
1C9AE000
stack
page read and write
2DFE000
stack
page read and write
1C969A00000
trusted library allocation
page read and write
1054000
heap
page read and write
E5B000
heap
page read and write
2980000
direct allocation
page read and write
1C968614000
trusted library allocation
page read and write
940000
direct allocation
page read and write
1C96346B000
trusted library allocation
page read and write
12B7000
heap
page read and write
1C968A39000
trusted library allocation
page read and write
5E51000
trusted library allocation
page read and write
1054000
heap
page read and write
13AE000
stack
page read and write
1C96F0D0000
trusted library allocation
page read and write
1C9670B6000
trusted library allocation
page read and write
2AEF000
stack
page read and write
5DCE000
trusted library allocation
page read and write
4BEE000
stack
page read and write
1C96962B000
trusted library allocation
page read and write
1C96F000
stack
page read and write
3F3F000
stack
page read and write
1C966967000
trusted library allocation
page read and write
FEF000
stack
page read and write
1C96F000000
trusted library allocation
page read and write
3DEF000
stack
page read and write
1C967DDF000
trusted library allocation
page read and write
1C96890C000
trusted library allocation
page read and write
984000
heap
page read and write
1C9689A9000
trusted library allocation
page read and write
2034F64F000
heap
page read and write
5DF4000
trusted library allocation
page read and write
1C966F57000
trusted library allocation
page read and write
1054000
heap
page read and write
1C962BF0000
trusted library allocation
page read and write
B44000
heap
page read and write
4E50000
direct allocation
page execute and read and write
204F07B0000
heap
page read and write
547F000
stack
page read and write
1C96F109000
trusted library allocation
page read and write
66EC000
stack
page read and write
F74000
heap
page read and write
1B43B000
heap
page read and write
1040000
direct allocation
page read and write
1C967A40000
trusted library section
page read and write
1C96F705000
trusted library allocation
page read and write
4861000
heap
page read and write
1C96928C000
trusted library allocation
page read and write
1C967625000
trusted library allocation
page read and write
59FB000
trusted library allocation
page read and write
FB5000
heap
page read and write
1C9693A9000
trusted library allocation
page read and write
1C96705C000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
1C95FF64000
heap
page read and write
1254000
heap
page read and write
B0A000
unkown
page execute and read and write
1CD4F000
stack
page read and write
4591000
heap
page read and write
1C96F4CE000
trusted library allocation
page read and write
1024000
heap
page read and write
59BC000
trusted library allocation
page read and write
3590000
trusted library allocation
page read and write
5E22000
trusted library allocation
page read and write
FB4000
heap
page read and write
5D5F000
trusted library allocation
page read and write
2B60000
direct allocation
page read and write
4A71000
heap
page read and write
1C967243000
trusted library allocation
page read and write
1C968DFC000
trusted library allocation
page read and write
1126000
heap
page read and write
1C966C37000
trusted library allocation
page read and write
1C96F100000
trusted library allocation
page read and write
1C96919F000
trusted library allocation
page read and write
1C968E03000
trusted library allocation
page read and write
387E000
stack
page read and write
457F000
stack
page read and write
59E9000
trusted library allocation
page read and write
5C1000
unkown
page execute and write copy
FB4000
heap
page read and write
2C70000
direct allocation
page execute and read and write
1C96BE02000
trusted library allocation
page read and write
30EE000
stack
page read and write
4E60000
remote allocation
page read and write
48B1000
heap
page read and write
4861000
heap
page read and write
1C957300000
trusted library allocation
page execute read
59AC000
trusted library allocation
page read and write
D1F000
unkown
page execute and write copy
F74000
heap
page read and write
4591000
heap
page read and write
48B1000
heap
page read and write
1C9670D8000
trusted library allocation
page read and write
204F09C3000
heap
page read and write
59D8000
trusted library allocation
page read and write
1C96935C000
trusted library allocation
page read and write
E94000
heap
page read and write
1C96869F000
trusted library allocation
page read and write
1C96296D000
trusted library allocation
page read and write
1C968969000
trusted library allocation
page read and write
1C96A69A000
trusted library allocation
page read and write
204F09D1000
heap
page read and write
59BC000
trusted library allocation
page read and write
1C964100000
trusted library allocation
page read and write
4591000
heap
page read and write
FB0000
direct allocation
page read and write
4910000
direct allocation
page execute and read and write
FB4000
heap
page read and write
1C964321000
trusted library allocation
page read and write
1C96F561000
trusted library allocation
page read and write
984000
heap
page read and write
1C966ED6000
trusted library allocation
page read and write
204F0248000
trusted library allocation
page read and write
454F000
stack
page read and write
59BB000
trusted library allocation
page read and write
5E26000
trusted library allocation
page read and write
1C96A912000
trusted library allocation
page read and write
C87000
unkown
page execute and write copy
4E50000
direct allocation
page execute and read and write
1290000
unkown
page execute and write copy
FB4000
heap
page read and write
F74000
heap
page read and write
984000
heap
page read and write
306E000
stack
page read and write
A10000
heap
page read and write
48B1000
heap
page read and write
204F025F000
trusted library allocation
page read and write
1158000
heap
page read and write
48B1000
heap
page read and write
59D6000
trusted library allocation
page read and write
FB5000
heap
page read and write
4C07000
trusted library allocation
page read and write
1C96C008000
trusted library allocation
page read and write
378F000
stack
page read and write
48B1000
heap
page read and write
59CA000
trusted library allocation
page read and write
1C967C00000
trusted library section
page readonly
5CA2000
trusted library allocation
page read and write
1C962B9C000
trusted library allocation
page read and write
315E000
stack
page read and write
59F4000
trusted library allocation
page read and write
1805CC00000
trusted library allocation
page read and write
4A71000
heap
page read and write
1C9670D8000
trusted library allocation
page read and write
3BB1B3B000
stack
page read and write
1C9629C4000
trusted library allocation
page read and write
1D1BD000
stack
page read and write
1C965706000
trusted library allocation
page read and write
2960000
direct allocation
page read and write
1C9684AB000
trusted library allocation
page read and write
FB4000
heap
page read and write
163F000
stack
page read and write
5A91000
trusted library allocation
page read and write
10CE000
stack
page read and write
5CA4000
trusted library allocation
page read and write
1C968991000
trusted library allocation
page read and write
5530000
direct allocation
page execute and read and write
F74000
heap
page read and write
35FF000
stack
page read and write
1C968991000
trusted library allocation
page read and write
1C96780A000
trusted library allocation
page read and write
204F0F77000
heap
page read and write
204F094C000
heap
page read and write
42BE000
stack
page read and write
60BE000
trusted library allocation
page read and write
1C9670C9000
trusted library allocation
page read and write
5490000
direct allocation
page execute and read and write
1C9694CE000
trusted library allocation
page read and write
1C968658000
trusted library allocation
page read and write
2034F907000
trusted library allocation
page read and write
5C0000
unkown
page readonly
616000
unkown
page execute and write copy
4861000
heap
page read and write
FF0000
direct allocation
page read and write
59E9000
trusted library allocation
page read and write
1C96891F000
trusted library allocation
page read and write
1C9640C0000
trusted library allocation
page read and write
5982000
trusted library allocation
page read and write
1C967C40000
trusted library section
page readonly
F74000
heap
page read and write
1C96723C000
trusted library allocation
page read and write
1C971790000
trusted library allocation
page read and write
590000
unkown
page readonly
4CF0000
trusted library allocation
page read and write
48B1000
heap
page read and write
1C95FF62000
heap
page read and write
5E27000
trusted library allocation
page read and write
4EEC000
stack
page read and write
472F000
stack
page read and write
1195000
heap
page read and write
1C968648000
trusted library allocation
page read and write
1C9676BD000
trusted library allocation
page read and write
204F0940000
heap
page read and write
CB9000
unkown
page execute and write copy
3CEE000
stack
page read and write
1C964200000
trusted library allocation
page read and write
1C9682E9000
trusted library allocation
page read and write
1C966E03000
trusted library allocation
page read and write
4FE0000
direct allocation
page read and write
1C96F75F000
trusted library allocation
page read and write
1C968000000
trusted library allocation
page read and write
1C971790000
trusted library allocation
page read and write
1C9717D1000
trusted library allocation
page read and write
FB4000
heap
page read and write
B44000
heap
page read and write
1C966FD6000
trusted library allocation
page read and write
1C96895B000
trusted library allocation
page read and write
940000
direct allocation
page read and write
1C96890F000
trusted library allocation
page read and write
39C1000
heap
page read and write
F74000
heap
page read and write
1C96F3AD000
trusted library allocation
page read and write
13BF000
heap
page read and write
6A1A9FE000
stack
page read and write
2DB0000
trusted library allocation
page read and write
1C966FD6000
trusted library allocation
page read and write
BF4000
heap
page read and write
4591000
heap
page read and write
532D000
trusted library allocation
page read and write
204F0F77000
heap
page read and write
5AA1000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
1C958B81000
heap
page read and write
1C96AB6B000
trusted library allocation
page read and write
A4A000
heap
page read and write
FB4000
heap
page read and write
5C19000
trusted library allocation
page read and write
1C967DDF000
trusted library allocation
page read and write
3BB3C0E000
stack
page read and write
1254000
heap
page read and write
59E9000
trusted library allocation
page read and write
1198000
heap
page read and write
2F1F000
stack
page read and write
48B0000
direct allocation
page read and write
4DA000
unkown
page execute and read and write
7567DFE000
unkown
page readonly
4940000
direct allocation
page execute and read and write
1C9640D4000
trusted library allocation
page read and write
1C96F1ED000
trusted library allocation
page read and write
5F02000
trusted library allocation
page read and write
1CB66A00000
trusted library section
page readonly
1A4000
heap
page read and write
1C95FF64000
heap
page read and write
33EF000
stack
page read and write
59D3000
trusted library allocation
page read and write
2034F900000
trusted library allocation
page read and write
1054000
heap
page read and write
B02000
unkown
page execute and read and write
5CA5000
trusted library allocation
page read and write
1C9682E4000
trusted library allocation
page read and write
5D5D000
trusted library allocation
page read and write
1C9689AB000
trusted library allocation
page read and write
1C9670BC000
trusted library allocation
page read and write
3BADC3E000
stack
page read and write
FB0000
direct allocation
page read and write
5990000
trusted library allocation
page read and write
1C9696C5000
trusted library allocation
page read and write
59D8000
trusted library allocation
page read and write
1C96FCAC000
trusted library allocation
page read and write
132000
unkown
page execute and read and write
37AF000
stack
page read and write
15B0000
direct allocation
page read and write
20351220000
heap
page read and write
5D53000
trusted library allocation
page read and write
598A000
trusted library allocation
page read and write
4591000
heap
page read and write
FB5000
heap
page read and write
4861000
heap
page read and write
1C968671000
trusted library allocation
page read and write
1C9677C9000
trusted library allocation
page read and write
1C9690CA000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
4591000
heap
page read and write
5D64000
trusted library allocation
page read and write
4591000
heap
page read and write
59C7000
trusted library allocation
page read and write
1C96F435000
trusted library allocation
page read and write
59EB000
trusted library allocation
page read and write
1C963100000
trusted library allocation
page read and write
368E000
stack
page read and write
1C96F0C3000
trusted library allocation
page read and write
48B1000
heap
page read and write
1C9640B1000
trusted library allocation
page read and write
F74000
heap
page read and write
FB5000
heap
page read and write
37E000
unkown
page readonly
1C96426C000
trusted library allocation
page read and write
1360000
direct allocation
page read and write
1C969585000
trusted library allocation
page read and write
1C967069000
trusted library allocation
page read and write
204F0F67000
heap
page read and write
A4E000
heap
page read and write
204F0F59000
heap
page read and write
1C96F3DE000
trusted library allocation
page read and write
5F03000
trusted library allocation
page read and write
204F03F4000
heap
page read and write
1C96F503000
trusted library allocation
page read and write
1C968479000
trusted library allocation
page read and write
1C96F3A8000
trusted library allocation
page read and write
48B1000
heap
page read and write
CF5000
stack
page read and write
1C967D3B000
trusted library allocation
page read and write
5A12000
trusted library allocation
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
FB4000
heap
page read and write
1C966D5C000
trusted library allocation
page read and write
1C963F3F000
trusted library allocation
page read and write
1C96F50B000
trusted library allocation
page read and write
4B4E000
stack
page read and write
48B0000
direct allocation
page read and write
1291000
unkown
page execute and write copy
3BB3C8E000
stack
page read and write
204F02BA000
trusted library allocation
page read and write
1C96C024000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
665000
unkown
page execute and read and write
B44000
heap
page read and write
1805CB00000
trusted library allocation
page read and write
1C9647D5000
trusted library allocation
page read and write
1C963443000
trusted library allocation
page read and write
1C96964B000
trusted library allocation
page read and write
1C962B0C000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
2CBE000
stack
page read and write
1C968F85000
trusted library allocation
page read and write
1C9705B3000
trusted library allocation
page read and write
1C96F1EF000
trusted library allocation
page read and write
4861000
heap
page read and write
59D8000
trusted library allocation
page read and write
1C96AA03000
trusted library allocation
page read and write
3AFE000
stack
page read and write
59AB000
trusted library allocation
page read and write
142F000
unkown
page execute and write copy
DA2000
unkown
page execute and read and write
1D3FE000
stack
page read and write
49FE000
stack
page read and write
76E000
unkown
page execute and read and write
1C969357000
trusted library allocation
page read and write
2ECF000
stack
page read and write
59CA000
trusted library allocation
page read and write
4271000
heap
page read and write
1C9670AE000
trusted library allocation
page read and write
2B6E000
stack
page read and write
2034F790000
heap
page read and write
60B5000
trusted library allocation
page read and write
1C966944000
trusted library allocation
page read and write
1C9AE000
stack
page read and write
1C96F2B6000
trusted library allocation
page read and write
1C96836A000
trusted library allocation
page read and write
474A000
heap
page read and write
48B0000
direct allocation
page read and write
59D9000
trusted library allocation
page read and write
1C967100000
trusted library allocation
page read and write
5A59000
trusted library allocation
page read and write
4591000
heap
page read and write
1C96958B000
trusted library allocation
page read and write
4BC0000
direct allocation
page execute and read and write
5A11000
trusted library allocation
page read and write
403E000
stack
page read and write
1C96761C000
trusted library allocation
page read and write
2034F65D000
heap
page read and write
442000
unkown
page read and write
1C9647BC000
trusted library allocation
page read and write
698000
unkown
page execute and read and write
1C96F4E4000
trusted library allocation
page read and write
204F0F21000
heap
page read and write
1C9647F6000
trusted library allocation
page read and write
3BB3CCE000
stack
page read and write
5AAA000
trusted library allocation
page read and write
119E000
heap
page read and write
1C967F00000
trusted library allocation
page read and write
1C968399000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C95FF62000
heap
page read and write
1C9684BA000
trusted library allocation
page read and write
1C965700000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
940000
direct allocation
page read and write
5F62000
trusted library allocation
page read and write
629000
unkown
page write copy
11B4000
heap
page read and write
1C966E7A000
trusted library allocation
page read and write
1C95FF6A000
heap
page read and write
D8A000
unkown
page execute and write copy
D29000
unkown
page execute and read and write
1CAEE000
stack
page read and write
FB5000
heap
page read and write
1C966E94000
trusted library allocation
page read and write
1C96868D000
trusted library allocation
page read and write
59BC000
trusted library allocation
page read and write
1C9696C9000
trusted library allocation
page read and write
59B7000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
5CAD000
trusted library allocation
page read and write
E94000
heap
page read and write
5CA8000
trusted library allocation
page read and write
204F0F67000
heap
page read and write
A24000
unkown
page readonly
59D4000
trusted library allocation
page read and write
1C969052000
trusted library allocation
page read and write
3BAC83E000
stack
page read and write
5181000
direct allocation
page read and write
1C968996000
trusted library allocation
page read and write
412E000
stack
page read and write
48B0000
direct allocation
page read and write
5EDC000
trusted library allocation
page read and write
A19000
heap
page read and write
59EB000
trusted library allocation
page read and write
1C967D46000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
367F000
stack
page read and write
29FF000
stack
page read and write
1C9629C2000
trusted library allocation
page read and write
644000
unkown
page execute and read and write
204F0212000
trusted library allocation
page read and write
1C968BF0000
trusted library allocation
page read and write
1C96F7B9000
trusted library allocation
page read and write
1C968614000
trusted library allocation
page read and write
5C9F000
trusted library allocation
page read and write
B44000
heap
page read and write
1C9675E3000
trusted library allocation
page read and write
4C90000
heap
page read and write
F74000
heap
page read and write
4DEE000
stack
page read and write
1C968C3C000
trusted library allocation
page read and write
5A1A000
trusted library allocation
page read and write
1CEBD000
stack
page read and write
1C966F79000
trusted library allocation
page read and write
4861000
heap
page read and write
1C96849C000
trusted library allocation
page read and write
342E000
stack
page read and write
D06000
unkown
page execute and write copy
10F0000
direct allocation
page read and write
1C966FA0000
trusted library allocation
page read and write
1C964D09000
trusted library allocation
page read and write
59D9000
trusted library allocation
page read and write
1C967DC3000
trusted library allocation
page read and write
204F09C8000
heap
page read and write
48B1000
heap
page read and write
1C96708C000
trusted library allocation
page read and write
10F0000
direct allocation
page read and write
5490000
direct allocation
page execute and read and write
4FA0000
trusted library allocation
page read and write
106E000
stack
page read and write
1C968643000
trusted library allocation
page read and write
1A4000
heap
page read and write
1C967049000
trusted library allocation
page read and write
1C96F4EE000
trusted library allocation
page read and write
59EA000
trusted library allocation
page read and write
1C968FEF000
trusted library allocation
page read and write
48B1000
heap
page read and write
24EF000
stack
page read and write
FB4000
heap
page read and write
5D4F000
trusted library allocation
page read and write
B44000
heap
page read and write
4A3E000
stack
page read and write
487F000
stack
page read and write
1C966F71000
trusted library allocation
page read and write
52C0000
direct allocation
page execute and read and write
1C9683FE000
trusted library allocation
page read and write
A8F000
heap
page read and write
1C964949000
trusted library allocation
page read and write
1C9717E2000
trusted library allocation
page read and write
C31000
unkown
page execute and write copy
204F097C000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
1805CB68000
trusted library allocation
page read and write
4861000
heap
page read and write
1C968CC5000
trusted library allocation
page read and write
4FA0000
direct allocation
page execute and read and write
F74000
heap
page read and write
59D8000
trusted library allocation
page read and write
4861000
heap
page read and write
1C967730000
trusted library allocation
page read and write
1C969243000
trusted library allocation
page read and write
727000
unkown
page execute and read and write
1C96F1AB000
trusted library allocation
page read and write
1C963357000
trusted library allocation
page read and write
1254000
heap
page read and write
1C9672C4000
trusted library allocation
page read and write
E94000
heap
page read and write
1C967FC1000
trusted library allocation
page read and write
1C96A958000
trusted library allocation
page read and write
5DCB000
trusted library allocation
page read and write
3B3E000
stack
page read and write
1C9688D6000
trusted library allocation
page read and write
1C9642C1000
trusted library allocation
page read and write
1C967637000
trusted library allocation
page read and write
1C96F416000
trusted library allocation
page read and write
1C96762C000
trusted library allocation
page read and write
1C968425000
trusted library allocation
page read and write
984000
heap
page read and write
59F0000
trusted library allocation
page read and write
1C9693FB000
trusted library allocation
page read and write
629000
unkown
page write copy
730000
heap
page read and write
1C969654000
trusted library allocation
page read and write
32BF000
stack
page read and write
1AA4F000
stack
page read and write
CCB000
unkown
page execute and read and write
41FE000
stack
page read and write
39CE000
stack
page read and write
3E8F000
stack
page read and write
A6D000
unkown
page execute and read and write
5A91000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
1C9647F6000
trusted library allocation
page read and write
1C967DF5000
trusted library allocation
page read and write
1C96761A000
trusted library allocation
page read and write
59EA000
trusted library allocation
page read and write
6A80000
heap
page read and write
4591000
heap
page read and write
48CE000
stack
page read and write
411000
unkown
page execute and write copy
2DB0000
trusted library allocation
page read and write
59E9000
trusted library allocation
page read and write
FB4000
heap
page read and write
59C7000
trusted library allocation
page read and write
5F9000
unkown
page write copy
48B1000
heap
page read and write
F74000
heap
page read and write
4591000
heap
page read and write
FB4000
heap
page read and write
F3E000
stack
page read and write
48B1000
heap
page read and write
8D0000
unkown
page execute and write copy
11E7000
heap
page read and write
34DF000
stack
page read and write
1254000
heap
page read and write
1C9686D1000
trusted library allocation
page read and write
1C9689ED000
trusted library allocation
page read and write
48B0000
direct allocation
page read and write
F74000
heap
page read and write
35FE000
stack
page read and write
1C9641B3000
trusted library allocation
page read and write
1C966F58000
trusted library allocation
page read and write
49D0000
direct allocation
page read and write
4861000
heap
page read and write
515E000
stack
page read and write
2DEE000
stack
page read and write
11B2000
heap
page read and write
697000
unkown
page execute and write copy
1C9657A8000
trusted library allocation
page read and write
48B1000
heap
page read and write
20351237000
heap
page read and write
460F000
stack
page read and write
97A000
unkown
page execute and read and write
65C000
unkown
page execute and write copy
8B9000
unkown
page execute and read and write
1C96F46E000
trusted library allocation
page read and write
2034F680000
heap
page read and write
E94000
heap
page read and write
2B3F000
stack
page read and write
5CA3000
trusted library allocation
page read and write
1C9683B5000
trusted library allocation
page read and write
30DFD791000
trusted library allocation
page execute read
1C969403000
trusted library allocation
page read and write
1CEFD000
stack
page read and write
1C96F753000
trusted library allocation
page read and write
1C96F5CC000
trusted library allocation
page read and write
1C968831000
trusted library allocation
page read and write
1C96F186000
trusted library allocation
page read and write
4591000
heap
page read and write
A4A000
heap
page read and write
F74000
heap
page read and write
3BA8DFE000
stack
page read and write
31EF000
stack
page read and write
3BB24FE000
stack
page read and write
2034F662000
heap
page read and write
5AB9000
trusted library allocation
page read and write
5A91000
trusted library allocation
page read and write
F74000
heap
page read and write
1C9675EF000
trusted library allocation
page read and write
1C96F3E0000
trusted library allocation
page read and write
1C96F3E0000
trusted library allocation
page read and write
1C9683BF000
trusted library allocation
page read and write
406F000
stack
page read and write
204F09D1000
heap
page read and write
1C971635000
trusted library allocation
page read and write
5A39000
trusted library allocation
page read and write
107B000
heap
page read and write
4591000
heap
page read and write
1C96A9BD000
trusted library allocation
page read and write
5A24000
trusted library allocation
page read and write
1C96ABF3000
trusted library allocation
page read and write
4E60000
remote allocation
page read and write
410000
unkown
page readonly
3DBE000
stack
page read and write
2F3E000
stack
page read and write
1C963473000
trusted library allocation
page read and write
1C967DB8000
trusted library allocation
page read and write
1C96F5D2000
trusted library allocation
page read and write
1190000
heap
page read and write
FB0000
direct allocation
page read and write
1C9693FB000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
1C967119000
trusted library allocation
page read and write
B39000
unkown
page execute and write copy
252E000
stack
page read and write
204F0940000
heap
page read and write
1C96844F000
trusted library allocation
page read and write
59AB000
trusted library allocation
page read and write
5A87000
trusted library allocation
page read and write
1C96A9B4000
trusted library allocation
page read and write
1C96790A000
trusted library allocation
page read and write
51000
unkown
page execute and write copy
15C4000
heap
page read and write
1C96868D000
trusted library allocation
page read and write
1C964010000
trusted library allocation
page read and write
1C958B7D000
heap
page read and write
1A4000
heap
page read and write
4861000
heap
page read and write
3BAF03C000
stack
page read and write
4861000
heap
page read and write
1C9684BA000
trusted library allocation
page read and write
1C9717FB000
trusted library allocation
page read and write
FB4000
heap
page read and write
3A7E000
stack
page read and write
41A000
unkown
page execute and write copy
1C96A657000
trusted library allocation
page read and write
1C967664000
trusted library allocation
page read and write
411000
unkown
page execute and read and write
5AA1000
trusted library allocation
page read and write
F74000
heap
page read and write
11F0000
heap
page read and write
59E6000
trusted library allocation
page read and write
1C963F00000
trusted library allocation
page read and write
FB4000
heap
page read and write
B44000
heap
page read and write
1C9679BD000
trusted library allocation
page read and write
1B22F000
stack
page read and write
FE9000
unkown
page write copy
792000
unkown
page execute and read and write
1C962B1C000
trusted library allocation
page read and write
FEB000
unkown
page execute and read and write
C22000
heap
page read and write
59BC000
trusted library allocation
page read and write
1C968CA3000
trusted library allocation
page read and write
1360000
direct allocation
page read and write
62F000
unkown
page execute and write copy
F74000
heap
page read and write
D21000
unkown
page execute and write copy
1C9689C3000
trusted library allocation
page read and write
4861000
heap
page read and write
5DBC000
trusted library allocation
page read and write
615000
unkown
page execute and read and write
1C968623000
trusted library allocation
page read and write
1C968103000
trusted library allocation
page read and write
1C962BDE000
trusted library allocation
page read and write
59AE000
trusted library allocation
page read and write
1C971700000
trusted library allocation
page read and write
59CB000
trusted library allocation
page read and write
5A91000
trusted library allocation
page read and write
1C958C10000
trusted library section
page read and write
719000
unkown
page execute and write copy
1C9689E4000
trusted library allocation
page read and write
1C962B11000
trusted library allocation
page read and write
410E000
stack
page read and write
49FF000
stack
page read and write
7B0000
heap
page read and write
59AB000
trusted library allocation
page read and write
1054000
heap
page read and write
818F000
stack
page read and write
1C967243000
trusted library allocation
page read and write
3BAEE3B000
stack
page read and write
59B2000
trusted library allocation
page read and write
4591000
heap
page read and write
59E9000
trusted library allocation
page read and write
A3D000
unkown
page execute and read and write
1254000
heap
page read and write
1C968617000
trusted library allocation
page read and write
59AB000
trusted library allocation
page read and write
FB4000
heap
page read and write
1054000
heap
page read and write
1040000
direct allocation
page read and write
204F0F58000
heap
page read and write
1C9717D0000
trusted library allocation
page read and write
1C96F468000
trusted library allocation
page read and write
1C968FC8000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
1C9675F6000
trusted library allocation
page read and write
1C9693CF000
trusted library allocation
page read and write
1C96F3C0000
trusted library allocation
page read and write
41D000
unkown
page read and write
2B7E000
stack
page read and write
6A70000
heap
page read and write
E94000
heap
page read and write
1C96840A000
trusted library allocation
page read and write
1A4000
heap
page read and write
727000
unkown
page execute and write copy
59AE000
trusted library allocation
page read and write
1C966D6D000
trusted library allocation
page read and write
3F0F000
stack
page read and write
5B89000
trusted library allocation
page read and write
2CBE000
stack
page read and write
5E24000
trusted library allocation
page read and write
629000
unkown
page write copy
59E6000
trusted library allocation
page read and write
11B0000
heap
page read and write
1C96F303000
trusted library allocation
page read and write
1C96836D000
trusted library allocation
page read and write
1C968A22000
trusted library allocation
page read and write
2A3E000
stack
page read and write
59A6000
trusted library allocation
page read and write
1C957294000
trusted library allocation
page read and write
1C96F443000
trusted library allocation
page read and write
1C96F009000
trusted library allocation
page read and write
CFE000
stack
page read and write
1805CB2E000
trusted library allocation
page read and write
1C964092000
trusted library allocation
page read and write
1C96330B000
trusted library allocation
page read and write
48B1000
heap
page read and write
1C966FA0000
trusted library allocation
page read and write
1C9642C1000
trusted library allocation
page read and write
1C96F3E0000
trusted library allocation
page read and write
59AE000
trusted library allocation
page read and write
70F000
unkown
page execute and write copy
FB4000
heap
page read and write
5CA1000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C967561000
trusted library allocation
page read and write
59D9000
trusted library allocation
page read and write
4B46000
trusted library allocation
page read and write
204F0943000
heap
page read and write
1C962BFE000
trusted library allocation
page read and write
1C96706C000
trusted library allocation
page read and write
F74000
heap
page read and write
1C968661000
trusted library allocation
page read and write
1C96750C000
trusted library allocation
page read and write
E94000
heap
page read and write
48B1000
heap
page read and write
1C968918000
trusted library allocation
page read and write
36BE000
stack
page read and write
2A6F000
stack
page read and write
3BB113B000
stack
page read and write
FB4000
heap
page read and write
1119000
heap
page read and write
1C968645000
trusted library allocation
page read and write
4861000
heap
page read and write
3D8E000
stack
page read and write
1C95FF64000
heap
page read and write
204F0F77000
heap
page read and write
1C9676F5000
trusted library allocation
page read and write
2B3F000
stack
page read and write
49D0000
direct allocation
page read and write
5AA1000
trusted library allocation
page read and write
1C9682E9000
trusted library allocation
page read and write
1C9689A5000
trusted library allocation
page read and write
2580000
direct allocation
page read and write
1C967D97000
trusted library allocation
page read and write
FB4000
heap
page read and write
59C8000
trusted library allocation
page read and write
1C9642C7000
trusted library allocation
page read and write
1805C70F000
unclassified section
page read and write
5DDC000
trusted library allocation
page read and write
B0C000
stack
page read and write
1298000
heap
page read and write
FB4000
heap
page read and write
1805C75A000
heap
page read and write
1C96A6ED000
trusted library allocation
page read and write
9F0000
heap
page read and write
59BC000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
1C967194000
trusted library allocation
page read and write
5D55000
trusted library allocation
page read and write
4EA0000
heap
page read and write
CF0000
heap
page read and write
1C968AB7000
trusted library allocation
page read and write
1C97178B000
trusted library allocation
page read and write
1C967DEA000
trusted library allocation
page read and write
49F4000
trusted library allocation
page read and write
FB4000
heap
page read and write
11BA000
heap
page read and write
1C966AB5000
heap
page read and write
1C967680000
trusted library allocation
page read and write
1C96ACB5000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
B44000
heap
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
1C968634000
trusted library allocation
page read and write
1C96F5C6000
trusted library allocation
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
1C964299000
trusted library allocation
page read and write
1C967654000
trusted library allocation
page read and write
11F8000
heap
page read and write
4591000
heap
page read and write
5510000
direct allocation
page execute and read and write
F74000
heap
page read and write
62B000
unkown
page execute and read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
1C968C36000
trusted library allocation
page read and write
4591000
heap
page read and write
622000
unkown
page execute and read and write
1C968F7E000
trusted library allocation
page read and write
48B1000
heap
page read and write
1C9689E2000
trusted library allocation
page read and write
1A4000
heap
page read and write
204F0286000
trusted library allocation
page read and write
42FF000
stack
page read and write
204F0F3B000
heap
page read and write
1D2FE000
stack
page read and write
5D57000
trusted library allocation
page read and write
FB4000
heap
page read and write
2F5E000
stack
page read and write
5030000
remote allocation
page read and write
5994000
trusted library allocation
page read and write
1C96C004000
trusted library allocation
page read and write
4EC1000
heap
page read and write
426E000
stack
page read and write
1C9678CF000
trusted library allocation
page read and write
4FBE000
stack
page read and write
94C000
stack
page read and write
1C96F3C5000
trusted library allocation
page read and write
6FF000
unkown
page execute and write copy
4B6A000
trusted library allocation
page execute and read and write
1204000
heap
page read and write
930000
heap
page read and write
FB4000
heap
page read and write
1C956F70000
heap
page read and write
1C967346000
trusted library allocation
page read and write
1C966FD6000
trusted library allocation
page read and write
4C10000
trusted library allocation
page execute and read and write
42F1000
heap
page read and write
1C968C00000
trusted library allocation
page read and write
2B60000
direct allocation
page read and write
48B1000
heap
page read and write
1C95FF62000
heap
page read and write
1C9646E0000
trusted library section
page readonly
1C966C29000
trusted library allocation
page read and write
1C968621000
trusted library allocation
page read and write
204F09C0000
heap
page read and write
68F000
unkown
page execute and read and write
42F1000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
734000
heap
page read and write
1C968991000
trusted library allocation
page read and write
49D0000
direct allocation
page read and write
1C96F73B000
trusted library allocation
page read and write
1C967DC7000
trusted library allocation
page read and write
F74000
heap
page read and write
4591000
heap
page read and write
1C968B65000
trusted library allocation
page read and write
719000
unkown
page execute and write copy
48B1000
heap
page read and write
4BA8000
stack
page read and write
25449D8000
stack
page read and write
1C96895D000
trusted library allocation
page read and write
49D1000
heap
page read and write
FB4000
heap
page read and write
3BB24BE000
stack
page read and write
59AB000
trusted library allocation
page read and write
FB4000
heap
page read and write
1040000
direct allocation
page read and write
411000
unkown
page read and write
6D9000
stack
page read and write
1C967261000
trusted library allocation
page read and write
645000
unkown
page execute and write copy
FB4000
heap
page read and write
1C967DBE000
trusted library allocation
page read and write
1C964707000
trusted library allocation
page read and write
4591000
heap
page read and write
1C966FA7000
trusted library allocation
page read and write
317F000
stack
page read and write
FB4000
heap
page read and write
1C968658000
trusted library allocation
page read and write
4C17000
trusted library allocation
page read and write
1C966D00000
trusted library allocation
page read and write
1C96AC1C000
trusted library allocation
page read and write
10F7000
heap
page read and write
5E7B000
trusted library allocation
page read and write
4271000
heap
page read and write
613000
unkown
page execute and write copy
D01000
unkown
page execute and read and write
1C966FA0000
trusted library allocation
page read and write
1C964197000
trusted library allocation
page read and write
59D4000
trusted library allocation
page read and write
59AD000
trusted library allocation
page read and write
1C9683EB000
trusted library allocation
page read and write
59E5000
trusted library allocation
page read and write
5030000
direct allocation
page execute and read and write
FB4000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
FB4000
heap
page read and write
1C968407000
trusted library allocation
page read and write
54F0000
direct allocation
page execute and read and write
2034F640000
heap
page read and write
1C968BBD000
trusted library allocation
page read and write
48B1000
heap
page read and write
4A20000
direct allocation
page read and write
59BC000
trusted library allocation
page read and write
B44000
heap
page read and write
706F000
stack
page read and write
42CF000
stack
page read and write
1C968441000
trusted library allocation
page read and write
2E1F000
stack
page read and write
1C96A63B000
trusted library allocation
page read and write
1B0DC000
stack
page read and write
4E6B000
stack
page read and write
357E000
stack
page read and write
4C7E000
stack
page read and write
5D39000
trusted library allocation
page read and write
1C96C020000
trusted library allocation
page read and write
1054000
heap
page read and write
1C96A6F0000
trusted library allocation
page read and write
59D8000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
5DCC000
trusted library allocation
page read and write
1C967096000
trusted library allocation
page read and write
1C96850D000
unclassified section
page read and write
1C968952000
trusted library allocation
page read and write
A5F000
heap
page read and write
59D9000
trusted library allocation
page read and write
1C96867B000
trusted library allocation
page read and write
204F09C8000
heap
page read and write
45EF000
stack
page read and write
317F000
stack
page read and write
56A000
unkown
page execute and write copy
C5E000
stack
page read and write
48B0000
direct allocation
page read and write
48F0000
direct allocation
page execute and read and write
2BEE000
stack
page read and write
5E21000
trusted library allocation
page read and write
1024000
heap
page read and write
1C968AC5000
trusted library allocation
page read and write
599E000
trusted library allocation
page read and write
FB5000
heap
page read and write
1C967503000
trusted library allocation
page read and write
1054000
heap
page read and write
EFF000
stack
page read and write
11FD000
stack
page read and write
54C0000
direct allocation
page execute and read and write
1C966F71000
trusted library allocation
page read and write
37FE000
stack
page read and write
B44000
heap
page read and write
1C9717E2000
trusted library allocation
page read and write
5E28000
trusted library allocation
page read and write
C34000
heap
page read and write
5CA1000
trusted library allocation
page read and write
11F4000
heap
page read and write
30CF000
stack
page read and write
4591000
heap
page read and write
1C967680000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C968400000
trusted library allocation
page read and write
5DDE000
trusted library allocation
page read and write
C34000
heap
page read and write
1C96841C000
trusted library allocation
page read and write
59D8000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
59EB000
trusted library allocation
page read and write
11B4000
heap
page read and write
27F7000
heap
page read and write
42F1000
heap
page read and write
15C4000
heap
page read and write
1C96AC6C000
trusted library allocation
page read and write
AD6000
heap
page read and write
1C964243000
trusted library allocation
page read and write
1C96935F000
trusted library allocation
page read and write
1360000
direct allocation
page read and write
1054000
heap
page read and write
4591000
heap
page read and write
35BF000
stack
page read and write
1C969673000
trusted library allocation
page read and write
1C964727000
trusted library allocation
page read and write
3BB26FF000
stack
page read and write
1C958B89000
heap
page read and write
2867000
heap
page read and write
5D49000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
5F21000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
1C967D77000
trusted library allocation
page read and write
A69000
heap
page read and write
59D9000
trusted library allocation
page read and write
36AE000
stack
page read and write
4591000
heap
page read and write
1805CB72000
trusted library allocation
page read and write
3674000
heap
page read and write
49D0000
direct allocation
page read and write
B44000
heap
page read and write
598F000
trusted library allocation
page read and write
1C9695B1000
trusted library allocation
page read and write
C34000
heap
page read and write
1C967257000
trusted library allocation
page read and write
3E3E000
stack
page read and write
39FE000
stack
page read and write
1C964332000
trusted library allocation
page read and write
1C967E19000
trusted library allocation
page read and write
48B1000
heap
page read and write
1C95FF62000
heap
page read and write
1C962903000
trusted library allocation
page read and write
2AE000
unkown
page execute and read and write
3CCE000
stack
page read and write
1C964F00000
trusted library allocation
page read and write
1A4000
heap
page read and write
1C96ACF1000
trusted library allocation
page read and write
1C96898B000
trusted library allocation
page read and write
5989000
trusted library allocation
page read and write
5A31000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C964781000
trusted library allocation
page read and write
FB4000
heap
page read and write
15C4000
heap
page read and write
1C966F60000
trusted library allocation
page read and write
4861000
heap
page read and write
2DCE000
stack
page read and write
48B0000
direct allocation
page read and write
59C7000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C9695B5000
trusted library allocation
page read and write
1C964903000
trusted library allocation
page read and write
4EE000
unkown
page execute and read and write
1C96F40E000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
3BB08FE000
stack
page read and write
1C966F8B000
trusted library allocation
page read and write
304E000
stack
page read and write
433E000
stack
page read and write
1C9641AB000
trusted library allocation
page read and write
5CAD000
trusted library allocation
page read and write
59E9000
trusted library allocation
page read and write
15B0000
direct allocation
page read and write
3BAF63D000
stack
page read and write
C34000
heap
page read and write
59CF000
trusted library allocation
page read and write
5A28000
trusted library allocation
page read and write
5C0000
unkown
page readonly
11A9000
heap
page read and write
1C96703F000
trusted library allocation
page read and write
1C9684B7000
trusted library allocation
page read and write
334F000
stack
page read and write
4861000
heap
page read and write
1C963F03000
trusted library allocation
page read and write
1269000
heap
page read and write
F74000
heap
page read and write
5A91000
trusted library allocation
page read and write
1C96F4AD000
trusted library allocation
page read and write
1C96A92B000
trusted library allocation
page read and write
5CAF000
trusted library allocation
page read and write
F74000
heap
page read and write
B44000
heap
page read and write
1C967403000
trusted library allocation
page read and write
4900000
direct allocation
page execute and read and write
622000
unkown
page execute and read and write
1C9672ED000
trusted library allocation
page read and write
FB4000
heap
page read and write
5A91000
trusted library allocation
page read and write
1C968A7C000
trusted library allocation
page read and write
1054000
heap
page read and write
2DBF000
stack
page read and write
1C9689E4000
trusted library allocation
page read and write
477F000
stack
page read and write
1A4000
heap
page read and write
204F098A000
heap
page read and write
1024000
heap
page read and write
393E000
stack
page read and write
2DB0000
trusted library allocation
page read and write
3670000
heap
page read and write
1C96764F000
trusted library allocation
page read and write
2CC7000
heap
page read and write
48B1000
heap
page read and write
4591000
heap
page read and write
4F8F000
stack
page read and write
4580000
direct allocation
page read and write
1054000
heap
page read and write
5E2C000
trusted library allocation
page read and write
1054000
heap
page read and write
1AD3E000
stack
page read and write
F74000
heap
page read and write
3C3E000
stack
page read and write
FB4000
heap
page read and write
1C9669A1000
trusted library allocation
page read and write
1C968782000
trusted library allocation
page read and write
1C96849C000
trusted library allocation
page read and write
4E00000
remote allocation
page read and write
9EC000
unkown
page readonly
E94000
heap
page read and write
1C96A6C9000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
5AE1000
trusted library allocation
page read and write
470000
unkown
page execute and write copy
629000
unkown
page write copy
1C967625000
trusted library allocation
page read and write
1191000
heap
page read and write
59D9000
trusted library allocation
page read and write
11B4000
heap
page read and write
1C968A1D000
trusted library allocation
page read and write
1C9670A1000
trusted library allocation
page read and write
1C968469000
trusted library allocation
page read and write
1C9689F4000
trusted library allocation
page read and write
1C966ED6000
trusted library allocation
page read and write
6B2000
unkown
page execute and read and write
1C9682E7000
trusted library allocation
page read and write
1C9670D8000
trusted library allocation
page read and write
1C96AB49000
trusted library allocation
page read and write
59DB000
trusted library allocation
page read and write
1C969645000
trusted library allocation
page read and write
29FF000
stack
page read and write
FB4000
heap
page read and write
1A4000
heap
page read and write
1C9687D5000
trusted library allocation
page read and write
4EA1000
heap
page read and write
1C96C022000
trusted library allocation
page read and write
FB4000
heap
page read and write
F81000
unkown
page execute and write copy
1C968665000
trusted library allocation
page read and write
1C9644E0000
heap
page read and write
1C96723A000
trusted library allocation
page read and write
5A90000
trusted library allocation
page read and write
1C968BC4000
trusted library allocation
page read and write
442F000
stack
page read and write
BF4000
heap
page read and write
59D6000
trusted library allocation
page read and write
5EBF000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C96FCC1000
trusted library allocation
page read and write
4A71000
heap
page read and write
10F0000
direct allocation
page read and write
1C956FA0000
trusted library allocation
page read and write
1C96F437000
trusted library allocation
page read and write
1C967C80000
trusted library section
page read and write
59C9000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
5F49000
trusted library allocation
page read and write
1C96F74A000
trusted library allocation
page read and write
204F0268000
trusted library allocation
page read and write
15B0000
direct allocation
page read and write
F74000
heap
page read and write
1C96ACFD000
trusted library allocation
page read and write
1C967DF5000
trusted library allocation
page read and write
1C956F10000
unclassified section
page readonly
1B12E000
stack
page read and write
34CE000
stack
page read and write
48B1000
heap
page read and write
1A4000
heap
page read and write
69A000
unkown
page execute and write copy
F74000
heap
page read and write
1360000
direct allocation
page read and write
1C968476000
trusted library allocation
page read and write
1C9682E0000
trusted library allocation
page read and write
1C9684A6000
trusted library allocation
page read and write
48B0000
direct allocation
page read and write
FB4000
heap
page read and write
2DB0000
trusted library allocation
page read and write
1C9670E3000
trusted library allocation
page read and write
B44000
heap
page read and write
4B60000
direct allocation
page execute and read and write
1C968969000
trusted library allocation
page read and write
1C968952000
trusted library allocation
page read and write
1C96709D000
trusted library allocation
page read and write
4591000
heap
page read and write
1C964700000
trusted library allocation
page read and write
5E2F000
trusted library allocation
page read and write
B44000
heap
page read and write
1C966FA0000
trusted library allocation
page read and write
204F08E1000
heap
page read and write
1C968300000
trusted library allocation
page read and write
4861000
heap
page read and write
1C9686B3000
trusted library allocation
page read and write
1254000
heap
page read and write
1C967422000
trusted library allocation
page read and write
41BF000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
410000
unkown
page read and write
B44000
heap
page read and write
1CC6E000
stack
page read and write
1C96C02C000
trusted library allocation
page read and write
1C96307E000
trusted library allocation
page read and write
1C970380000
trusted library allocation
page read and write
9EC000
unkown
page readonly
1C9689A9000
trusted library allocation
page read and write
46CE000
stack
page read and write
3BB354A000
stack
page read and write
49D0000
direct allocation
page read and write
1C96F777000
trusted library allocation
page read and write
1C9670AC000
trusted library allocation
page read and write
11F8000
heap
page read and write
1C967600000
trusted library allocation
page read and write
1805C4F0000
unclassified section
page readonly
5D30000
trusted library allocation
page read and write
48BF000
stack
page read and write
1C968F4E000
trusted library allocation
page read and write
1C958B39000
heap
page read and write
2F0E000
stack
page read and write
2B60000
direct allocation
page read and write
3D3F000
stack
page read and write
52E0000
direct allocation
page execute and read and write
5998000
trusted library allocation
page read and write
254723E000
unkown
page readonly
BBE000
stack
page read and write
1C96D114000
trusted library allocation
page read and write
1C964D00000
trusted library allocation
page read and write
1805CC19000
trusted library allocation
page read and write
41D000
unkown
page read and write
537E000
stack
page read and write
1C9696C7000
trusted library allocation
page read and write
1C968E65000
trusted library allocation
page read and write
5CA0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
1805CB83000
trusted library allocation
page read and write
59A2000
trusted library allocation
page read and write
1C966E7A000
trusted library allocation
page read and write
1805C700000
unclassified section
page read and write
1C963300000
trusted library allocation
page read and write
1C95FF6A000
heap
page read and write
1C96892C000
trusted library allocation
page read and write
1C966C09000
trusted library allocation
page read and write
1C9717FB000
trusted library allocation
page read and write
1C96837F000
trusted library allocation
page read and write
303F000
stack
page read and write
1192000
heap
page read and write
59D9000
trusted library allocation
page read and write
1290000
heap
page read and write
1C968A03000
trusted library allocation
page read and write
1C968C11000
trusted library allocation
page read and write
1C96F416000
trusted library allocation
page read and write
392E000
stack
page read and write
37FE000
stack
page read and write
2DB0000
trusted library allocation
page read and write
FB4000
heap
page read and write
4591000
heap
page read and write
2EEF000
stack
page read and write
1C968425000
trusted library allocation
page read and write
49E1000
heap
page read and write
C30000
heap
page read and write
1C9693F0000
trusted library allocation
page read and write
1C957211000
trusted library allocation
page read and write
4900000
direct allocation
page execute and read and write
204F020A000
trusted library allocation
page read and write
11B4000
heap
page read and write
1C969595000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
59E9000
trusted library allocation
page read and write
48B1000
heap
page read and write
FB4000
heap
page read and write
1D400000
heap
page read and write
6A179FB000
stack
page read and write
4B60000
trusted library allocation
page read and write
FB4000
heap
page read and write
940000
direct allocation
page read and write
5CAA000
trusted library allocation
page read and write
48B1000
heap
page read and write
984000
heap
page read and write
94E000
unkown
page execute and read and write
48B1000
heap
page read and write
1C9677AE000
trusted library allocation
page read and write
437F000
stack
page read and write
119C000
heap
page read and write
11F8000
heap
page read and write
F74000
heap
page read and write
1C96847B000
trusted library allocation
page read and write
727000
unkown
page execute and write copy
4591000
heap
page read and write
1C9678EC000
trusted library allocation
page read and write
1C9675B8000
trusted library allocation
page read and write
FB4000
heap
page read and write
48B1000
heap
page read and write
1C968C03000
trusted library allocation
page read and write
FB4000
heap
page read and write
5F2C000
trusted library allocation
page read and write
117A000
heap
page read and write
1805CB5B000
trusted library allocation
page read and write
5D38000
trusted library allocation
page read and write
1C96F3F8000
trusted library allocation
page read and write
1024000
heap
page read and write
59C4000
trusted library allocation
page read and write
1C9640B6000
trusted library allocation
page read and write
30AF000
stack
page read and write
111A000
heap
page read and write
C34000
heap
page read and write
5A20000
trusted library allocation
page read and write
FA0000
direct allocation
page execute and read and write
1A4000
heap
page read and write
1C9634DF000
trusted library allocation
page read and write
1C968473000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
1C9717CE000
trusted library allocation
page read and write
5CA1000
trusted library allocation
page read and write
1C967A10000
trusted library section
page read and write
4C80000
direct allocation
page read and write
5998000
trusted library allocation
page read and write
5FB000
unkown
page execute and read and write
1C964297000
trusted library allocation
page read and write
1340000
heap
page read and write
1C968AB7000
trusted library allocation
page read and write
B44000
heap
page read and write
1805C680000
heap
page read and write
1A94E000
stack
page read and write
1C968996000
trusted library allocation
page read and write
11B4000
heap
page read and write
1805CB6A000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C96938A000
trusted library allocation
page read and write
CFF000
unkown
page execute and write copy
5E2D000
trusted library allocation
page read and write
1254000
heap
page read and write
1C968F2F000
trusted library allocation
page read and write
13C60500000
trusted library allocation
page read and write
204F096A000
heap
page read and write
1C964095000
trusted library allocation
page read and write
F74000
heap
page read and write
1A4000
heap
page read and write
5FBA000
trusted library allocation
page read and write
F74000
heap
page read and write
5D7000
unkown
page execute and read and write
49E1000
heap
page read and write
AE0000
heap
page read and write
618000
unkown
page execute and read and write
59D1000
trusted library allocation
page read and write
5C1000
unkown
page execute and write copy
1805CBA2000
trusted library allocation
page read and write
2C8F000
stack
page read and write
1C968462000
trusted library allocation
page read and write
1C967C90000
trusted library section
page read and write
865000
unkown
page execute and read and write
FC0000
heap
page read and write
49E1000
heap
page read and write
59C7000
trusted library allocation
page read and write
1C966FA7000
trusted library allocation
page read and write
F74000
heap
page read and write
1C9647C3000
trusted library allocation
page read and write
5A91000
trusted library allocation
page read and write
2034F648000
heap
page read and write
C0F000
stack
page read and write
FB0000
heap
page read and write
1C9689EF000
trusted library allocation
page read and write
FB4000
heap
page read and write
E8A000
heap
page read and write
FB4000
heap
page read and write
E94000
heap
page read and write
570000
heap
page read and write
1C963400000
trusted library allocation
page read and write
136F000
stack
page read and write
1A8F0000
heap
page read and write
1C968BD0000
trusted library allocation
page read and write
48B1000
heap
page read and write
5FF6000
trusted library allocation
page read and write
1A4000
heap
page read and write
1C9642C7000
trusted library allocation
page read and write
1C963078000
trusted library allocation
page read and write
204F02E9000
trusted library allocation
page read and write
1C9647C0000
trusted library allocation
page read and write
1C971603000
trusted library allocation
page read and write
4BD0000
direct allocation
page execute and read and write
29A000
unkown
page execute and read and write
15B0000
direct allocation
page read and write
1C968E00000
trusted library allocation
page read and write
1C967DEA000
trusted library allocation
page read and write
F74000
heap
page read and write
1C9717E6000
trusted library allocation
page read and write
FB4000
heap
page read and write
4E60000
remote allocation
page read and write
1C96755F000
trusted library allocation
page read and write
B44000
heap
page read and write
12CE000
heap
page read and write
1C96939D000
trusted library allocation
page read and write
10C0000
heap
page read and write
4592000
heap
page read and write
1C96AC85000
trusted library allocation
page read and write
120A000
heap
page read and write
C34000
heap
page read and write
1C96C026000
trusted library allocation
page read and write
6711000
heap
page read and write
254727E000
stack
page read and write
27EB000
stack
page read and write
5AA1000
trusted library allocation
page read and write
59E9000
trusted library allocation
page read and write
B10000
heap
page read and write
59C7000
trusted library allocation
page read and write
302F000
stack
page read and write
1C964785000
trusted library allocation
page read and write
1C9672B3000
trusted library allocation
page read and write
2B6F000
stack
page read and write
1C968979000
trusted library allocation
page read and write
4850000
direct allocation
page execute and read and write
1C9686AE000
trusted library allocation
page read and write
2AE000
unkown
page execute and read and write
10F0000
direct allocation
page read and write
4BAE000
stack
page read and write
1A4000
heap
page read and write
1C95FF64000
heap
page read and write
5CA9000
trusted library allocation
page read and write
734000
heap
page read and write
F74000
heap
page read and write
7565B2E000
unkown
page readonly
1C967200000
trusted library allocation
page read and write
3BAE82E000
stack
page read and write
FB4000
heap
page read and write
FB4000
heap
page read and write
1C968703000
trusted library allocation
page read and write
1C968924000
trusted library allocation
page read and write
60A000
unkown
page execute and write copy
2960000
direct allocation
page read and write
BF4000
heap
page read and write
1C9641D6000
trusted library allocation
page read and write
1805CB60000
trusted library allocation
page read and write
940000
direct allocation
page read and write
59D8000
trusted library allocation
page read and write
59DD000
trusted library allocation
page read and write
5520000
direct allocation
page execute and read and write
1C96F762000
trusted library allocation
page read and write
360E000
stack
page read and write
59C7000
trusted library allocation
page read and write
1C9629A4000
trusted library allocation
page read and write
47C000
unkown
page execute and write copy
1C96767B000
trusted library allocation
page read and write
F74000
heap
page read and write
1C966FA0000
trusted library allocation
page read and write
52D000
unkown
page execute and read and write
B44000
heap
page read and write
3BA8E7E000
stack
page read and write
5A87000
trusted library allocation
page read and write
1C96899D000
trusted library allocation
page read and write
4591000
heap
page read and write
48B1000
heap
page read and write
B44000
heap
page read and write
1C968C97000
trusted library allocation
page read and write
FB4000
heap
page read and write
59BC000
trusted library allocation
page read and write
1054000
heap
page read and write
1C966F00000
trusted library allocation
page read and write
42EF000
stack
page read and write
1C967680000
trusted library allocation
page read and write
1C9689AB000
trusted library allocation
page read and write
C34000
heap
page read and write
4861000
heap
page read and write
3BB093C000
stack
page read and write
6B2000
unkown
page execute and write copy
1040000
direct allocation
page read and write
59B7000
trusted library allocation
page read and write
5EA000
unkown
page execute and write copy
1C968710000
trusted library allocation
page read and write
1C9686D7000
trusted library allocation
page read and write
FB4000
heap
page read and write
5EC4000
trusted library allocation
page read and write
FB4000
heap
page read and write
11B4000
heap
page read and write
4731000
heap
page read and write
1C96ACA5000
trusted library allocation
page read and write
601000
unkown
page execute and read and write
D05000
unkown
page execute and read and write
1C96426E000
trusted library allocation
page read and write
1C963082000
trusted library allocation
page read and write
1C96767B000
trusted library allocation
page read and write
B44000
heap
page read and write
204F094C000
heap
page read and write
F47000
unkown
page execute and write copy
1805CB64000
trusted library allocation
page read and write
175F000
heap
page read and write
85A000
unkown
page execute and read and write
1C96F739000
trusted library allocation
page read and write
D1B000
heap
page read and write
5997000
trusted library allocation
page read and write
DF0000
heap
page read and write
59B7000
trusted library allocation
page read and write
5A90000
trusted library allocation
page read and write
1C96895D000
trusted library allocation
page read and write
1C967675000
trusted library allocation
page read and write
5CAA000
trusted library allocation
page read and write
B44000
heap
page read and write
4590000
heap
page read and write
204F0949000
heap
page read and write
A00000
direct allocation
page read and write
1C96307D000
trusted library allocation
page read and write
1C967253000
trusted library allocation
page read and write
F74000
heap
page read and write
49C0000
trusted library allocation
page read and write
B44000
heap
page read and write
15B0000
direct allocation
page read and write
4E70000
direct allocation
page execute and read and write
59AB000
trusted library allocation
page read and write
59AB000
trusted library allocation
page read and write
1C967DF5000
trusted library allocation
page read and write
5E2B000
trusted library allocation
page read and write
11B4000
heap
page read and write
4E61000
heap
page read and write
5C1000
unkown
page execute and write copy
1054000
heap
page read and write
59AD000
trusted library allocation
page read and write
4B90000
direct allocation
page execute and read and write
2543F2B000
stack
page read and write
F74000
heap
page read and write
4580000
direct allocation
page read and write
1C9672D7000
trusted library allocation
page read and write
5E3D000
trusted library allocation
page read and write
59C7000
trusted library allocation
page read and write
48B1000
heap
page read and write
1C9684F1000
trusted library allocation
page read and write
1C965200000
trusted library allocation
page read and write
1254000
heap
page read and write
1C962A54000
trusted library allocation
page read and write
3BAA83D000
stack
page read and write
1C96429D000
trusted library allocation
page read and write
CF1000
unkown
page execute and write copy
70F000
unkown
page execute and write copy
1C968983000
trusted library allocation
page read and write
1C96AC81000
trusted library allocation
page read and write
59B7000
trusted library allocation
page read and write
3BEF000
stack
page read and write
4580000
direct allocation
page read and write
1C962ED0000
trusted library section
page readonly
5981000
trusted library allocation
page read and write
1C9670D0000
trusted library allocation
page read and write
D13000
unkown
page execute and write copy
4D90000
direct allocation
page read and write
1C964733000
trusted library allocation
page read and write
1C966F88000
trusted library allocation
page read and write
5F6F000
trusted library allocation
page read and write
59C7000
trusted library allocation
page read and write
1C95FF6A000
heap
page read and write
1C968E72000
trusted library allocation
page read and write
1C9679F0000
trusted library allocation
page read and write
1C966AA0000
heap
page read and write
FB4000
heap
page read and write
F74000
heap
page read and write
1C956FC9000
heap
page read and write
1805CBC8000
trusted library allocation
page read and write
5EC4000
trusted library allocation
page read and write
4591000
heap
page read and write
360000
unkown
page readonly
1C96F4BD000
trusted library allocation
page read and write
3BB197D000
stack
page read and write
1C967798000
trusted library allocation
page read and write
144B000
heap
page read and write
4E30000
direct allocation
page execute and read and write
1C957230000
trusted library allocation
page read and write
F74000
heap
page read and write
1C96F200000
trusted library allocation
page read and write
1AEFE000
stack
page read and write
FB4000
heap
page read and write
1C967990000
trusted library allocation
page read and write
38BE000
stack
page read and write
7AA000
unkown
page execute and write copy
5D8E000
trusted library allocation
page read and write
1C96F407000
trusted library allocation
page read and write
4B70000
direct allocation
page execute and read and write
1C967DA2000
trusted library allocation
page read and write
4271000
heap
page read and write
49CF000
stack
page read and write
FB4000
heap
page read and write
3BA962E000
stack
page read and write
1C96A603000
trusted library allocation
page read and write
1C965703000
trusted library allocation
page read and write
B44000
heap
page read and write
59C8000
trusted library allocation
page read and write
4591000
heap
page read and write
11A0000
heap
page read and write
E94000
heap
page read and write
1C9686A9000
trusted library allocation
page read and write
1C967DDF000
trusted library allocation
page read and write
4EC0000
heap
page read and write
C34000
heap
page read and write
1C968CF0000
trusted library allocation
page read and write
1C9634C9000
trusted library allocation
page read and write
1C9642F3000
trusted library allocation
page read and write
1C969540000
trusted library allocation
page read and write
5A88000
trusted library allocation
page read and write
1C96F1F0000
trusted library allocation
page read and write
598F000
trusted library allocation
page read and write
1C96F4D0000
trusted library allocation
page read and write
5DF8000
trusted library allocation
page read and write
204F00EF000
unkown
page execute read
4EA1000
heap
page read and write
FB4000
heap
page read and write
1C968CC2000
trusted library allocation
page read and write
1C96706C000
trusted library allocation
page read and write
1C9670D4000
trusted library allocation
page read and write
1054000
heap
page read and write
1C96728F000
trusted library allocation
page read and write
1C967DF5000
trusted library allocation
page read and write
4B80000
direct allocation
page execute and read and write
5CAB000
trusted library allocation
page read and write
204F0261000
trusted library allocation
page read and write
5CAD000
trusted library allocation
page read and write
1C9684EB000
trusted library allocation
page read and write
1C96F57A000
trusted library allocation
page read and write
4B3F000
stack
page read and write
3BA904F000
stack
page read and write
1C964267000
trusted library allocation
page read and write
1271000
heap
page read and write
59AD000
trusted library allocation
page read and write
59C5000
trusted library allocation
page read and write
BF4000
heap
page read and write
2F6F000
stack
page read and write
8D0000
unkown
page execute and read and write
31BE000
stack
page read and write
423F000
stack
page read and write
1C9689F1000
trusted library allocation
page read and write
1054000
heap
page read and write
1805C6F0000
heap
page readonly
1C968303000
trusted library allocation
page read and write
1C96F280000
trusted library allocation
page read and write
204F09D1000
heap
page read and write
604000
unkown
page execute and write copy
2AE000
unkown
page execute and read and write
360000
unkown
page readonly
59D9000
trusted library allocation
page read and write
1C968C85000
trusted library allocation
page read and write
59AE000
trusted library allocation
page read and write
1C96F390000
trusted library allocation
page read and write
29EF000
stack
page read and write
4F10000
direct allocation
page execute and read and write
1C96944B000
trusted library allocation
page read and write
2035122E000
heap
page read and write
1C967764000
trusted library allocation
page read and write
6B4000
unkown
page execute and write copy
FB4000
heap
page read and write
4A04000
trusted library allocation
page read and write
5B51000
trusted library allocation
page read and write
1C96863C000
trusted library allocation
page read and write
13C60250000
heap
page read and write
46D0000
remote allocation
page read and write
470000
unkown
page execute and read and write
1C96F2B4000
trusted library allocation
page read and write
1C96F4FA000
trusted library allocation
page read and write
1805CC0C000
trusted library allocation
page read and write
1C964800000
trusted library section
page readonly
C34000
heap
page read and write
5A08000
trusted library allocation
page read and write
1C96F711000
trusted library allocation
page read and write
1C9689E2000
trusted library allocation
page read and write
1C967749000
trusted library allocation
page read and write
204F0981000
heap
page read and write
C34000
heap
page read and write
1805CC1D000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
39BE000
stack
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
FB4000
heap
page read and write
59E0000
trusted library allocation
page read and write
1C967DC2000
trusted library allocation
page read and write
1C968943000
trusted library allocation
page read and write
1C96F1F7000
trusted library allocation
page read and write
1C96767B000
trusted library allocation
page read and write
F40000
heap
page read and write
48D0000
direct allocation
page execute and read and write
12BF000
heap
page read and write
4591000
heap
page read and write
1C9642A8000
trusted library allocation
page read and write
1D07E000
stack
page read and write
1C966B47000
heap
page read and write
FB4000
heap
page read and write
59D8000
trusted library allocation
page read and write
1024000
heap
page read and write
1C9717D5000
trusted library allocation
page read and write
FB4000
heap
page read and write
5A90000
trusted library allocation
page read and write
59E5000
trusted library allocation
page read and write
3BA8FBE000
stack
page read and write
FB0000
direct allocation
page read and write
2B60000
direct allocation
page read and write
FB4000
heap
page read and write
59D4000
trusted library allocation
page read and write
336E000
stack
page read and write
E94000
heap
page read and write
12CE000
heap
page read and write
41A000
unkown
page execute and read and write
1C969610000
trusted library allocation
page read and write
1C96961E000
trusted library allocation
page read and write
598F000
trusted library allocation
page read and write
204F0E03000
trusted library allocation
page read and write
E6C000
stack
page read and write
4F40000
direct allocation
page execute and read and write
1805CC32000
trusted library allocation
page read and write
4C80000
direct allocation
page read and write
52A0000
direct allocation
page execute and read and write
62B000
unkown
page execute and read and write
ADE000
heap
page read and write
1C9687E3000
trusted library allocation
page read and write
1CC0003F000
trusted library allocation
page read and write
31BF000
stack
page read and write
1D00F000
stack
page read and write
1C96696A000
trusted library allocation
page read and write
5E28000
trusted library allocation
page read and write
1C96897C000
trusted library allocation
page read and write
4861000
heap
page read and write
1C9693FB000
trusted library allocation
page read and write
5D40000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
4FEF000
stack
page read and write
1C96F73C000
trusted library allocation
page read and write
5994000
trusted library allocation
page read and write
FB4000
heap
page read and write
32AF000
stack
page read and write
5DEB000
trusted library allocation
page read and write
59F2000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C96946F000
trusted library allocation
page read and write
F74000
heap
page read and write
2B50000
heap
page read and write
1C9689E4000
trusted library allocation
page read and write
11E1000
heap
page read and write
C90000
unkown
page execute and write copy
C34000
heap
page read and write
1C969500000
trusted library allocation
page read and write
DA2000
unkown
page execute and write copy
FB4000
heap
page read and write
5BC000
unkown
page readonly
59C8000
trusted library allocation
page read and write
1C967469000
trusted library allocation
page read and write
1C967DB1000
trusted library allocation
page read and write
1C967752000
trusted library allocation
page read and write
1C96705D000
trusted library allocation
page read and write
FB4000
heap
page read and write
49E1000
heap
page read and write
1C96764B000
trusted library allocation
page read and write
1C967203000
trusted library allocation
page read and write
1C9640DC000
trusted library allocation
page read and write
1C9686A9000
trusted library allocation
page read and write
6B2000
unkown
page execute and write copy
3F7E000
stack
page read and write
59A4000
trusted library allocation
page read and write
F74000
heap
page read and write
FB4000
heap
page read and write
11B4000
heap
page read and write
1282000
unkown
page execute and read and write
1C95FF64000
heap
page read and write
5F3C000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
1C964300000
trusted library allocation
page read and write
1C9649D7000
trusted library allocation
page read and write
13C60507000
trusted library allocation
page read and write
BF4000
heap
page read and write
5A18000
trusted library allocation
page read and write
1C968671000
trusted library allocation
page read and write
4C80000
direct allocation
page read and write
1054000
heap
page read and write
3E3E000
stack
page read and write
1C966FA0000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
1C9689E4000
trusted library allocation
page read and write
48B1000
heap
page read and write
4B09000
trusted library allocation
page read and write
6F2D000
stack
page read and write
5AA1000
trusted library allocation
page read and write
1C968A0D000
trusted library allocation
page read and write
1C96F3A8000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
1C96959A000
trusted library allocation
page read and write
1C96A900000
trusted library allocation
page read and write
1805CB12000
trusted library allocation
page read and write
4591000
heap
page read and write
49D0000
direct allocation
page read and write
13E4000
heap
page read and write
1C9689F1000
trusted library allocation
page read and write
1C963003000
trusted library allocation
page read and write
5C82000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C9670F1000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
5D4E000
trusted library allocation
page read and write
703000
unkown
page execute and write copy
329E000
stack
page read and write
1C96868D000
trusted library allocation
page read and write
599B000
trusted library allocation
page read and write
11A0000
direct allocation
page execute and read and write
1C96761A000
trusted library allocation
page read and write
FB4000
heap
page read and write
43FE000
stack
page read and write
367F000
stack
page read and write
B44000
heap
page read and write
5AA000
unkown
page read and write
4D20000
direct allocation
page execute and read and write
44FD000
stack
page read and write
1C968CDD000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C958C70000
heap
page read and write
1C9641B0000
trusted library allocation
page read and write
984000
heap
page read and write
5340000
direct allocation
page execute and read and write
1C96F4D1000
trusted library allocation
page read and write
1C969357000
trusted library allocation
page read and write
5A91000
trusted library allocation
page read and write
20351227000
heap
page read and write
5AA1000
trusted library allocation
page read and write
5030000
direct allocation
page execute and read and write
59C2000
trusted library allocation
page read and write
E21000
unkown
page execute and write copy
3BAF83D000
stack
page read and write
1C967634000
trusted library allocation
page read and write
5300000
trusted library allocation
page read and write
FB4000
heap
page read and write
38CF000
stack
page read and write
119E000
stack
page read and write
1C96875C000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
11B4000
heap
page read and write
DBE000
stack
page read and write
5AA1000
trusted library allocation
page read and write
1A4000
heap
page read and write
1C96AC70000
trusted library allocation
page read and write
1805CB66000
trusted library allocation
page read and write
10C3000
heap
page read and write
5A99000
trusted library allocation
page read and write
1C967675000
trusted library allocation
page read and write
1C95FF62000
heap
page read and write
170E000
stack
page read and write
59E9000
trusted library allocation
page read and write
1C966C23000
trusted library allocation
page read and write
1C9689EF000
trusted library allocation
page read and write
1C9693B0000
trusted library allocation
page read and write
1C967DDF000
trusted library allocation
page read and write
E94000
heap
page read and write
B44000
heap
page read and write
734000
heap
page read and write
5C83000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
1172000
heap
page read and write
5CA7000
trusted library allocation
page read and write
1C9689A5000
trusted library allocation
page read and write
59AD000
trusted library allocation
page read and write
40BE000
stack
page read and write
59C8000
trusted library allocation
page read and write
598B000
trusted library allocation
page read and write
1024000
heap
page read and write
1A8EF000
stack
page read and write
1C968ADB000
trusted library allocation
page read and write
1C96867E000
trusted library allocation
page read and write
3EBE000
stack
page read and write
4861000
heap
page read and write
FB4000
heap
page read and write
1ACCE000
stack
page read and write
C30000
unkown
page readonly
4591000
heap
page read and write
BE0000
direct allocation
page read and write
FB4000
heap
page read and write
2034F7E0000
heap
page read and write
25459FE000
stack
page read and write
59C8000
trusted library allocation
page read and write
16CF000
stack
page read and write
1C969361000
trusted library allocation
page read and write
1C964D0F000
trusted library allocation
page read and write
5F2A000
trusted library allocation
page read and write
4F90000
direct allocation
page execute and read and write
3AFF000
stack
page read and write
59B9000
trusted library allocation
page read and write
FB4000
heap
page read and write
72FE000
stack
page read and write
4DF1000
direct allocation
page read and write
204F0940000
heap
page read and write
1C96709D000
trusted library allocation
page read and write
B44000
heap
page read and write
4D2E000
stack
page read and write
4591000
heap
page read and write
F34000
heap
page read and write
445000
unkown
page execute and read and write
59E9000
trusted library allocation
page read and write
4591000
heap
page read and write
5490000
direct allocation
page execute and read and write
E94000
heap
page read and write
2AE000
unkown
page execute and read and write
3590000
trusted library allocation
page read and write
66A000
unkown
page execute and read and write
1C967E00000
trusted library allocation
page read and write
5A18000
trusted library allocation
page read and write
984000
heap
page read and write
F74000
heap
page read and write
204F0F67000
heap
page read and write
4861000
heap
page read and write
D8C000
unkown
page execute and write copy
6A1A1FF000
stack
page read and write
1805CB9F000
trusted library allocation
page read and write
1C967051000
trusted library allocation
page read and write
1C96A92B000
trusted library allocation
page read and write
FB4000
heap
page read and write
59BE000
trusted library allocation
page read and write
4861000
heap
page read and write
1C96F46E000
trusted library allocation
page read and write
59E2000
trusted library allocation
page read and write
1C96897C000
trusted library allocation
page read and write
59C8000
trusted library allocation
page read and write
1C968996000
trusted library allocation
page read and write
10E0000
heap
page read and write
1C96F5F6000
trusted library allocation
page read and write
598F000
trusted library allocation
page read and write
1C966B27000
heap
page read and write
457F000
stack
page read and write
4591000
heap
page read and write
3DEF000
stack
page read and write
1C967DF5000
trusted library allocation
page read and write
1C96F5C4000
trusted library allocation
page read and write
332F000
stack
page read and write
59AA000
trusted library allocation
page read and write
5F38000
trusted library allocation
page read and write
4861000
heap
page read and write
5270000
direct allocation
page execute and read and write
1C966E9E000
trusted library allocation
page read and write
940000
direct allocation
page read and write
458E000
stack
page read and write
1C966E63000
trusted library allocation
page read and write
1C968643000
trusted library allocation
page read and write
1C96918B000
trusted library allocation
page read and write
1C966E7D000
trusted library allocation
page read and write
599B000
trusted library allocation
page read and write
49E1000
heap
page read and write
984000
heap
page read and write
38FF000
stack
page read and write
5E26000
trusted library allocation
page read and write
D02000
unkown
page execute and write copy
41BF000
stack
page read and write
FB4000
heap
page read and write
719000
unkown
page execute and write copy
4EC1000
heap
page read and write
59F7000
trusted library allocation
page read and write
1C968ACF000
trusted library allocation
page read and write
11A0000
direct allocation
page execute and read and write
1C962BA7000
trusted library allocation
page read and write
951000
unkown
page execute read
FB4000
heap
page read and write
1C96869B000
trusted library allocation
page read and write
59B7000
trusted library allocation
page read and write
5A90000
trusted library allocation
page read and write
1C95FF60000
heap
page read and write
4A71000
heap
page read and write
1C967677000
trusted library allocation
page read and write
4FF0000
direct allocation
page execute and read and write
1C966B45000
heap
page read and write
2DB0000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
A95000
heap
page read and write
204EFEB0000
unclassified section
page readonly
5F1E000
trusted library allocation
page read and write
1C9679A5000
trusted library allocation
page read and write
350F000
stack
page read and write
4E50000
direct allocation
page execute and read and write
33DE000
stack
page read and write
1C966E8C000
trusted library allocation
page read and write
4EF0000
direct allocation
page execute and read and write
157F000
stack
page read and write
48B1000
heap
page read and write
FB4000
heap
page read and write
1C96A673000
trusted library allocation
page read and write
1C9686D1000
trusted library allocation
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
EFF000
stack
page read and write
5306000
trusted library allocation
page read and write
4591000
heap
page read and write
FB5000
heap
page read and write
13C60610000
heap
page read and write
1C96763A000
trusted library allocation
page read and write
1C967C10000
trusted library section
page readonly
1440000
heap
page read and write
1C9673F9000
trusted library allocation
page read and write
FB4000
heap
page read and write
5A81000
trusted library allocation
page read and write
59F3000
trusted library allocation
page read and write
118F000
heap
page read and write
4591000
heap
page read and write
1C965794000
trusted library allocation
page read and write
5DB000
unkown
page execute and read and write
B44000
heap
page read and write
1C9642EF000
trusted library allocation
page read and write
1C9672ED000
trusted library allocation
page read and write
5030000
remote allocation
page read and write
1C969361000
trusted library allocation
page read and write
4BA0000
direct allocation
page execute and read and write
59CC000
trusted library allocation
page read and write
1C96758F000
trusted library allocation
page read and write
1C96895D000
trusted library allocation
page read and write
599E000
trusted library allocation
page read and write
1C96F4CE000
trusted library allocation
page read and write
1805C720000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
FB4000
heap
page read and write
5CA3000
trusted library allocation
page read and write
4861000
heap
page read and write
5CA8000
trusted library allocation
page read and write
1C9675D0000
trusted library allocation
page read and write
1805CC17000
trusted library allocation
page read and write
5A08000
trusted library allocation
page read and write
1C9674C2000
trusted library allocation
page read and write
1C96FCC1000
trusted library allocation
page read and write
11B2000
heap
page read and write
1AEBF000
stack
page read and write
59BD000
trusted library allocation
page read and write
FB4000
heap
page read and write
48B1000
heap
page read and write
1C971758000
trusted library allocation
page read and write
276F000
stack
page read and write
F74000
heap
page read and write
11B4000
heap
page read and write
204F00D0000
trusted library allocation
page read and write
FB4000
heap
page read and write
5E22000
trusted library allocation
page read and write
598E000
trusted library allocation
page read and write
59E9000
trusted library allocation
page read and write
204F0F2A000
heap
page read and write
4580000
direct allocation
page read and write
5320000
direct allocation
page execute and read and write
679000
unkown
page execute and read and write
5E2A000
trusted library allocation
page read and write
5B81000
trusted library allocation
page read and write
1C96F3AD000
trusted library allocation
page read and write
1C962ADD000
trusted library allocation
page read and write
984000
heap
page read and write
11A0000
direct allocation
page execute and read and write
1C9693CF000
trusted library allocation
page read and write
1040000
direct allocation
page read and write
1C967662000
trusted library allocation
page read and write
1C96478F000
trusted library allocation
page read and write
1C967D09000
trusted library allocation
page read and write
B44000
heap
page read and write
49D1000
heap
page read and write
5ED7000
trusted library allocation
page read and write
1C964299000
trusted library allocation
page read and write
4861000
heap
page read and write
1C9684AB000
trusted library allocation
page read and write
1C968F57000
trusted library allocation
page read and write
5E4D000
trusted library allocation
page read and write
3B6F000
stack
page read and write
1C967DC2000
trusted library allocation
page read and write
1C9696F7000
trusted library allocation
page read and write
204F093C000
heap
page read and write
1A4000
heap
page read and write
15C4000
heap
page read and write
1C96F727000
trusted library allocation
page read and write
1204000
heap
page read and write
5F58000
trusted library allocation
page read and write
4861000
heap
page read and write
5E23000
trusted library allocation
page read and write
1A4000
heap
page read and write
1C96A9A5000
trusted library allocation
page read and write
204F0940000
heap
page read and write
1C96A69C000
trusted library allocation
page read and write
1C96F4E4000
trusted library allocation
page read and write
1C968658000
trusted library allocation
page read and write
1C96F3C0000
trusted library allocation
page read and write
1C96F4EE000
trusted library allocation
page read and write
59F3000
trusted library allocation
page read and write
1C963015000
trusted library allocation
page read and write
1C96F203000
trusted library allocation
page read and write
54E0000
direct allocation
page execute and read and write
204F0100000
trusted library allocation
page read and write
1C9670E0000
trusted library allocation
page read and write
1C967C50000
trusted library section
page readonly
453E000
stack
page read and write
12B3000
heap
page read and write
11B4000
heap
page read and write
1C96297E000
trusted library allocation
page read and write
1C96F76E000
trusted library allocation
page read and write
1C966E65000
trusted library allocation
page read and write
A1C000
unkown
page read and write
2DB0000
trusted library allocation
page read and write
4FC0000
direct allocation
page execute and read and write
5A0A000
trusted library allocation
page read and write
204F0200000
trusted library allocation
page read and write
1C964963000
trusted library allocation
page read and write
3BAA03E000
stack
page read and write
30A0000
direct allocation
page execute and read and write
59AD000
trusted library allocation
page read and write
1CD9D000
stack
page read and write
1C968502000
unclassified section
page read and write
5EF7000
trusted library allocation
page read and write
108E000
stack
page read and write
11AD000
heap
page read and write
980000
heap
page read and write
1C966A40000
heap
page read and write
1C9682E9000
trusted library allocation
page read and write
1C96F38E000
trusted library allocation
page read and write
5330000
direct allocation
page execute and read and write
4780000
direct allocation
page read and write
1C965009000
trusted library allocation
page read and write
AA2000
heap
page read and write
1C968B9F000
trusted library allocation
page read and write
62F000
unkown
page execute and write copy
1C964900000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
2CEF000
stack
page read and write
1054000
heap
page read and write
1C968900000
trusted library allocation
page read and write
1C968969000
trusted library allocation
page read and write
1C966EA0000
trusted library allocation
page read and write
1C966B25000
heap
page read and write
5310000
direct allocation
page execute and read and write
1C964103000
trusted library allocation
page read and write
7565BAE000
unkown
page readonly
F7B000
stack
page read and write
1C9684B5000
trusted library allocation
page read and write
3CBE000
stack
page read and write
13C60270000
heap
page read and write
597000
unkown
page execute and read and write
1C96F432000
trusted library allocation
page read and write
B44000
heap
page read and write
59DC000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
A12000
unkown
page readonly
1C962B00000
trusted library allocation
page read and write
4591000
heap
page read and write
5CAF000
trusted library allocation
page read and write
1C95FF62000
heap
page read and write
4591000
heap
page read and write
1C968BC4000
trusted library allocation
page read and write
F74000
heap
page read and write
1C96890C000
trusted library allocation
page read and write
5ECC000
trusted library allocation
page read and write
1C968435000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
CA6000
unkown
page execute and read and write
413F000
stack
page read and write
5CA6000
trusted library allocation
page read and write
F74000
heap
page read and write
3A7E000
stack
page read and write
1C9689F4000
trusted library allocation
page read and write
1C966E7D000
trusted library allocation
page read and write
11F4000
heap
page read and write
1C96F468000
trusted library allocation
page read and write
204F0F58000
heap
page read and write
598C000
trusted library allocation
page read and write
E94000
heap
page read and write
1C96935C000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C96844E000
trusted library allocation
page read and write
2960000
direct allocation
page read and write
1C95FF62000
heap
page read and write
446E000
stack
page read and write
120D000
heap
page read and write
F80000
direct allocation
page read and write
416000
unkown
page write copy
1C9682FB000
trusted library allocation
page read and write
1C95FF62000
heap
page read and write
33BF000
stack
page read and write
1C968645000
trusted library allocation
page read and write
5C84000
trusted library allocation
page read and write
33CF000
stack
page read and write
204F0944000
heap
page read and write
5A01000
trusted library allocation
page read and write
11F0000
heap
page read and write
8D0000
unkown
page execute and read and write
5077000
trusted library allocation
page read and write
1A4000
heap
page read and write
5981000
trusted library allocation
page read and write
59BC000
trusted library allocation
page read and write
1C967A00000
trusted library section
page read and write
118E000
stack
page read and write
6016000
trusted library allocation
page read and write
1C96843E000
trusted library allocation
page read and write
1C9689AB000
trusted library allocation
page read and write
1C968661000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
B44000
heap
page read and write
49F3000
trusted library allocation
page execute and read and write
1054000
heap
page read and write
1C968445000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
1C96844F000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
59AA000
trusted library allocation
page read and write
23EE000
stack
page read and write
1C967BD0000
trusted library section
page readonly
4900000
direct allocation
page execute and read and write
204F0F2A000
heap
page read and write
FB4000
heap
page read and write
699000
unkown
page execute and write copy
1C9689ED000
trusted library allocation
page read and write
1A4000
heap
page read and write
204F094C000
heap
page read and write
59BC000
trusted library allocation
page read and write
FB5000
heap
page read and write
386E000
stack
page read and write
1C968603000
trusted library allocation
page read and write
1C96869F000
trusted library allocation
page read and write
4B7B000
trusted library allocation
page execute and read and write
422F000
stack
page read and write
59B2000
trusted library allocation
page read and write
59E1000
trusted library allocation
page read and write
4591000
heap
page read and write
1C968693000
trusted library allocation
page read and write
120A000
heap
page read and write
1C96F437000
trusted library allocation
page read and write
5E8C000
trusted library allocation
page read and write
1C967DEA000
trusted library allocation
page read and write
1C9679AB000
trusted library allocation
page read and write
1C9682F0000
trusted library allocation
page read and write
1C95FF64000
heap
page read and write
5EE3000
trusted library allocation
page read and write
1C968B03000
trusted library allocation
page read and write
13E4000
heap
page read and write
1C968AEE000
trusted library allocation
page read and write
5490000
direct allocation
page execute and read and write
1C9686B3000
trusted library allocation
page read and write
F74000
heap
page read and write
59E9000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
1C967634000
trusted library allocation
page read and write
1C96709C000
trusted library allocation
page read and write
30DFD7A1000
trusted library allocation
page execute read
327F000
stack
page read and write
1C9717E2000
trusted library allocation
page read and write
1C967DC3000
trusted library allocation
page read and write
F7E000
stack
page read and write
1C96F751000
trusted library allocation
page read and write
59BC000
trusted library allocation
page read and write
13C60299000
heap
page read and write
1A4000
heap
page read and write
FB4000
heap
page read and write
1C9674A4000
trusted library allocation
page read and write
59D9000
trusted library allocation
page read and write
1C9672DD000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
FB4000
heap
page read and write
5D75000
trusted library allocation
page read and write
1C96D100000
trusted library allocation
page read and write
1C968696000
trusted library allocation
page read and write
59D8000
trusted library allocation
page read and write
1C9679F7000
trusted library allocation
page read and write
38DE000
stack
page read and write
1C969352000
trusted library allocation
page read and write
1C969100000
trusted library allocation
page read and write
1C968A1F000
trusted library allocation
page read and write
A00000
direct allocation
page read and write
2DB0000
trusted library allocation
page read and write
2CAE000
stack
page read and write
B44000
heap
page read and write
3D7E000
stack
page read and write
15C4000
heap
page read and write
48C1000
heap
page read and write
42EF000
stack
page read and write
5EEB000
trusted library allocation
page read and write
5E2E000
trusted library allocation
page read and write
5C0000
unkown
page read and write
27BE000
stack
page read and write
FB4000
heap
page read and write
1C96C002000
trusted library allocation
page read and write
1720000
direct allocation
page read and write
1C968923000
trusted library allocation
page read and write
1193000
heap
page read and write
FB4000
heap
page read and write
3BAE000
stack
page read and write
48FE000
stack
page read and write
59A2000
trusted library allocation
page read and write
1C96F4F2000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
1C9686A9000
trusted library allocation
page read and write
5A03000
trusted library allocation
page read and write
59F1000
trusted library allocation
page read and write
1C96A9AB000
trusted library allocation
page read and write
F74000
heap
page read and write
204F0F44000
heap
page read and write
1805C7D0000
heap
page read and write
5FBB000
trusted library allocation
page read and write
D8A000
heap
page read and write
1C9670E6000
trusted library allocation
page read and write
1C964762000
trusted library allocation
page read and write
1C968A00000
trusted library allocation
page read and write
59B7000
trusted library allocation
page read and write
CDB000
unkown
page execute and read and write
69B000
unkown
page execute and read and write
48B1000
heap
page read and write
1195000
heap
page read and write
363E000
stack
page read and write
1805CBA9000
trusted library allocation
page read and write
1CD6F000
stack
page read and write
1C962981000
trusted library allocation
page read and write
1C96F4F2000
trusted library allocation
page read and write
DA4000
unkown
page execute and write copy
1C95FF70000
heap
page read and write
5AA1000
trusted library allocation
page read and write
FB5000
heap
page read and write
FB4000
heap
page read and write
1C9641A2000
trusted library allocation
page read and write
F74000
heap
page read and write
4A71000
heap
page read and write
1C96F1B9000
trusted library allocation
page read and write
1C96F786000
trusted library allocation
page read and write
1C96A9FB000
trusted library allocation
page read and write
48B1000
heap
page read and write
5A90000
trusted library allocation
page read and write
FB4000
heap
page read and write
59C7000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
1C96F109000
trusted library allocation
page read and write
1C96743A000
trusted library allocation
page read and write
F74000
heap
page read and write
A00000
direct allocation
page read and write
B44000
heap
page read and write
CFE000
heap
page read and write
4861000
heap
page read and write
C34000
heap
page read and write
710000
unkown
page execute and read and write
1C964789000
trusted library allocation
page read and write
4591000
heap
page read and write
1AFDE000
stack
page read and write
1A4000
heap
page read and write
1C96F76A000
trusted library allocation
page read and write
FE3000
heap
page read and write
4861000
heap
page read and write
1054000
heap
page read and write
1C96A661000
trusted library allocation
page read and write
1C96845E000
trusted library allocation
page read and write
4F90000
direct allocation
page execute and read and write
59C8000
trusted library allocation
page read and write
32BF000
stack
page read and write
1C96F7E4000
trusted library allocation
page read and write
2FCF000
stack
page read and write
1C968700000
trusted library allocation
page read and write
15C4000
heap
page read and write
50000
unkown
page read and write
F74000
heap
page read and write
48B1000
heap
page read and write
1C967DF5000
trusted library allocation
page read and write
1C9694C6000
trusted library allocation
page read and write
59AB000
trusted library allocation
page read and write
950000
unkown
page readonly
2F2E000
stack
page read and write
1C9684B0000
trusted library allocation
page read and write
11B4000
heap
page read and write
59A2000
trusted library allocation
page read and write
FB5000
heap
page read and write
1C967659000
trusted library allocation
page read and write
1C96ACE9000
trusted library allocation
page read and write
1459000
heap
page read and write
1C968441000
trusted library allocation
page read and write
5E4F000
trusted library allocation
page read and write
32AF000
stack
page read and write
1C96891A000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
1C96F103000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C966AFD000
heap
page read and write
1C9572E9000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
1C967814000
trusted library allocation
page read and write
3BB00FB000
stack
page read and write
1805CC3D000
trusted library allocation
page read and write
5120000
direct allocation
page read and write
1C958BFB000
heap
page read and write
4861000
heap
page read and write
1C968B2B000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C9682E7000
trusted library allocation
page read and write
1C9684B7000
trusted library allocation
page read and write
1C95726A000
trusted library allocation
page read and write
13E4000
heap
page read and write
4580000
direct allocation
page read and write
1805CBEB000
trusted library allocation
page read and write
1C968439000
trusted library allocation
page read and write
4A4C000
stack
page read and write
B44000
heap
page read and write
1C968462000
trusted library allocation
page read and write
12B8000
heap
page read and write
2DB0000
trusted library allocation
page read and write
41EE000
stack
page read and write
3C2E000
stack
page read and write
BE0000
direct allocation
page read and write
1C95FF64000
heap
page read and write
1110000
heap
page read and write
1C9670D8000
trusted library allocation
page read and write
FB4000
heap
page read and write
411000
unkown
page read and write
1C968CEC000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C966E24000
trusted library allocation
page read and write
45A0000
heap
page read and write
2960000
direct allocation
page read and write
2DB0000
trusted library allocation
page read and write
1C966B23000
heap
page read and write
204F09C9000
heap
page read and write
204F0A20000
heap
page read and write
FB4000
heap
page read and write
5981000
trusted library allocation
page read and write
FB4000
heap
page read and write
59D3000
trusted library allocation
page read and write
1C968BBA000
trusted library allocation
page read and write
727000
unkown
page execute and write copy
569000
unkown
page execute and write copy
1CDCE000
stack
page read and write
59E9000
trusted library allocation
page read and write
59EC000
trusted library allocation
page read and write
1C967D77000
trusted library allocation
page read and write
300F000
stack
page read and write
1C966F09000
trusted library allocation
page read and write
1C966E8C000
trusted library allocation
page read and write
59C1000
trusted library allocation
page read and write
204F09DD000
heap
page read and write
1720000
direct allocation
page read and write
FB5000
heap
page read and write
324E000
stack
page read and write
EFD000
stack
page read and write
59E9000
trusted library allocation
page read and write
1C964797000
trusted library allocation
page read and write
1C96F4CE000
trusted library allocation
page read and write
984000
heap
page read and write
1C967DEA000
trusted library allocation
page read and write
296F000
stack
page read and write
CA5000
unkown
page execute and write copy
1C96F703000
trusted library allocation
page read and write
1C9689E4000
trusted library allocation
page read and write
48B1000
heap
page read and write
120B000
heap
page read and write
3CAF000
stack
page read and write
4861000
heap
page read and write
1254000
heap
page read and write
1C964733000
trusted library allocation
page read and write
3BB117B000
stack
page read and write
59AA000
trusted library allocation
page read and write
1C96F088000
trusted library allocation
page read and write
204F025C000
trusted library allocation
page read and write
1C96939E000
trusted library allocation
page read and write
A9B000
heap
page read and write
1C95FF6A000
heap
page read and write
1C9674AF000
trusted library allocation
page read and write
49FD000
trusted library allocation
page execute and read and write
470000
unkown
page execute and write copy
FB4000
heap
page read and write
1C963026000
trusted library allocation
page read and write
1C97179C000
trusted library allocation
page read and write
1C9689AB000
trusted library allocation
page read and write
1C963F51000
trusted library allocation
page read and write
1C96A652000
trusted library allocation
page read and write
FB4000
heap
page read and write
48B1000
heap
page read and write
52A0000
direct allocation
page execute and read and write
8B9000
unkown
page execute and read and write
1C968AFD000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C968453000
trusted library allocation
page read and write
6A3000
unkown
page execute and write copy
E94000
heap
page read and write
1C95FF64000
heap
page read and write
4591000
heap
page read and write
1C967637000
trusted library allocation
page read and write
3CEE000
stack
page read and write
5A2000
unkown
page execute and write copy
C93000
unkown
page execute and read and write
1C962990000
trusted library allocation
page read and write
4E70000
direct allocation
page read and write
1C9682EB000
trusted library allocation
page read and write
1C969496000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C9642C1000
trusted library allocation
page read and write
88A000
unkown
page execute and read and write
FB4000
heap
page read and write
B44000
heap
page read and write
1C968CF5000
trusted library allocation
page read and write
1C9684EF000
trusted library allocation
page read and write
1C96F110000
trusted library allocation
page read and write
940000
direct allocation
page read and write
5CAA000
trusted library allocation
page read and write
49D0000
direct allocation
page read and write
688000
unkown
page execute and read and write
204F0030000
heap
page readonly
1C96726D000
trusted library allocation
page read and write
1C96F42C000
trusted library allocation
page read and write
1C967622000
trusted library allocation
page read and write
1C962AAD000
trusted library allocation
page read and write
617000
unkown
page execute and read and write
127F000
heap
page read and write
5030000
direct allocation
page execute and read and write
4591000
heap
page read and write
1C962FFB000
trusted library allocation
page read and write
C34000
heap
page read and write
1C9686CA000
trusted library allocation
page read and write
4861000
heap
page read and write
1C96A903000
trusted library allocation
page read and write
870000
heap
page read and write
CF8000
unkown
page execute and read and write
1C9716E2000
trusted library allocation
page read and write
1C968CD6000
trusted library allocation
page read and write
4F60000
direct allocation
page execute and read and write
1C9689E4000
trusted library allocation
page read and write
4271000
heap
page read and write
1C968991000
trusted library allocation
page read and write
1C96F42C000
trusted library allocation
page read and write
48B1000
heap
page read and write
1C966FD6000
trusted library allocation
page read and write
1C96F748000
trusted library allocation
page read and write
3BA8F37000
stack
page read and write
11B4000
heap
page read and write
1C963026000
trusted library allocation
page read and write
5EC8000
trusted library allocation
page read and write
204F09C8000
heap
page read and write
4EA4000
heap
page read and write
5F3000
unkown
page execute and read and write
569000
unkown
page execute and read and write
10F0000
direct allocation
page read and write
1C967D1C000
trusted library allocation
page read and write
1C969300000
trusted library allocation
page read and write
1805CC03000
trusted library allocation
page read and write
F74000
heap
page read and write
59AE000
trusted library allocation
page read and write
11B4000
heap
page read and write
5E2C000
trusted library allocation
page read and write
5F9000
unkown
page execute and write copy
F74000
heap
page read and write
5E21000
trusted library allocation
page read and write
1C968AE0000
trusted library allocation
page read and write
33BE000
stack
page read and write
10D0000
heap
page read and write
204F005F000
unclassified section
page read and write
4861000
heap
page read and write
353F000
stack
page read and write
3E0E000
stack
page read and write
1C95FF64000
heap
page read and write
3E7F000
stack
page read and write
F74000
heap
page read and write
1C968FA3000
trusted library allocation
page read and write
A20000
unkown
page write copy
4591000
heap
page read and write
1C9670F1000
trusted library allocation
page read and write
1C968A15000
trusted library allocation
page read and write
396F000
stack
page read and write
598C000
trusted library allocation
page read and write
1360000
direct allocation
page read and write
5DEA000
trusted library allocation
page read and write
1A4000
heap
page read and write
3CBE000
stack
page read and write
3B7F000
stack
page read and write
204F0F58000
heap
page read and write
15B0000
direct allocation
page read and write
1C967069000
trusted library allocation
page read and write
4911000
heap
page read and write
FB4000
heap
page read and write
1C9670A4000
trusted library allocation
page read and write
B44000
heap
page read and write
1C964327000
trusted library allocation
page read and write
3A4E000
stack
page read and write
1805C973000
heap
page read and write
32BF000
stack
page read and write
FB4000
heap
page read and write
1C9689A5000
trusted library allocation
page read and write
1170000
heap
page read and write
1C968B00000
trusted library allocation
page read and write
2CCB000
heap
page read and write
41EE000
stack
page read and write
1C96F47D000
trusted library allocation
page read and write
522F000
trusted library allocation
page read and write
A6C000
stack
page read and write
1C966F21000
trusted library allocation
page read and write
59DD000
trusted library allocation
page read and write
1C96F00D000
trusted library allocation
page read and write
1C964283000
trusted library allocation
page read and write
5CAD000
trusted library allocation
page read and write
2F70000
heap
page read and write
1C9670C4000
trusted library allocation
page read and write
1C9634AF000
trusted library allocation
page read and write
631000
unkown
page execute and write copy
351E000
stack
page read and write
1C967E20000
trusted library allocation
page read and write
1C9672F3000
trusted library allocation
page read and write
1C96FCAC000
trusted library allocation
page read and write
F74000
heap
page read and write
1C968617000
trusted library allocation
page read and write
27AE000
stack
page read and write
63A000
unkown
page execute and write copy
136E000
stack
page read and write
12CE000
heap
page read and write
5AA1000
trusted library allocation
page read and write
44EE000
stack
page read and write
59CF000
trusted library allocation
page read and write
2B60000
direct allocation
page read and write
2543EAE000
unkown
page readonly
5CA2000
trusted library allocation
page read and write
3F6E000
stack
page read and write
37EE000
stack
page read and write
1C96F1EA000
trusted library allocation
page read and write
4861000
heap
page read and write
59E3000
trusted library allocation
page read and write
366F000
stack
page read and write
11A8000
heap
page read and write
11F8000
heap
page read and write
11B0000
heap
page read and write
1C962A0B000
trusted library allocation
page read and write
1C966E3C000
trusted library allocation
page read and write
1C96F124000
trusted library allocation
page read and write
4591000
heap
page read and write
2543FEE000
stack
page read and write
1C96755D000
trusted library allocation
page read and write
3BB1F7C000
stack
page read and write
1C95FF62000
heap
page read and write
1C962B9E000
trusted library allocation
page read and write
49D0000
trusted library allocation
page read and write
1B05E000
stack
page read and write
3BACC31000
stack
page read and write
972000
unkown
page execute and read and write
2DB0000
trusted library allocation
page read and write
1290000
unkown
page execute and read and write
3BB247F000
stack
page read and write
AF9000
stack
page read and write
FB4000
heap
page read and write
1C96F1A8000
trusted library allocation
page read and write
48B1000
heap
page read and write
FB5000
heap
page read and write
11B4000
heap
page read and write
1C96426E000
trusted library allocation
page read and write
60B000
unkown
page execute and read and write
1C95FF64000
heap
page read and write
B44000
heap
page read and write
1C96A91F000
trusted library allocation
page read and write
1C967700000
trusted library allocation
page read and write
1C967DB1000
trusted library allocation
page read and write
FB4000
heap
page read and write
FB4000
heap
page read and write
10FD000
heap
page read and write
5F35000
trusted library allocation
page read and write
15B0000
direct allocation
page read and write
5AB0000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
1C95FF6A000
heap
page read and write
1C957100000
trusted library allocation
page read and write
1C968405000
trusted library allocation
page read and write
1C95FF62000
heap
page read and write
1805CBCB000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C96A65D000
trusted library allocation
page read and write
1C96F3D4000
trusted library allocation
page read and write
FB4000
heap
page read and write
4580000
direct allocation
page read and write
4861000
heap
page read and write
424F000
stack
page read and write
2035122D000
heap
page read and write
D10000
unkown
page execute and write copy
1C969607000
trusted library allocation
page read and write
59AB000
trusted library allocation
page read and write
1C96762F000
trusted library allocation
page read and write
284E000
stack
page read and write
1C9686AE000
trusted library allocation
page read and write
204F0F77000
heap
page read and write
5CAC000
trusted library allocation
page read and write
1C966E9E000
trusted library allocation
page read and write
1275000
heap
page read and write
1C968ADB000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
1054000
heap
page read and write
1C96891C000
trusted library allocation
page read and write
C66000
unkown
page execute and read and write
1C96744A000
trusted library allocation
page read and write
1C9640FA000
trusted library allocation
page read and write
46D0000
remote allocation
page read and write
59CA000
trusted library allocation
page read and write
1C968CA7000
trusted library allocation
page read and write
4900000
direct allocation
page execute and read and write
951000
unkown
page execute read
6E2C000
stack
page read and write
1040000
direct allocation
page read and write
1C968ACA000
trusted library allocation
page read and write
2A3E000
stack
page read and write
128D000
heap
page read and write
1A4000
heap
page read and write
1C956F90000
trusted library allocation
page read and write
1C96F4CB000
trusted library allocation
page read and write
1C964C0A000
trusted library allocation
page read and write
B44000
heap
page read and write
204F0060000
trusted library allocation
page read and write
687000
unkown
page execute and write copy
4E20000
direct allocation
page execute and read and write
1C9684A6000
trusted library allocation
page read and write
5A81000
trusted library allocation
page read and write
15C4000
heap
page read and write
620000
unkown
page execute and write copy
204F0890000
trusted library section
page readonly
1C9684AE000
trusted library allocation
page read and write
1C962F03000
trusted library allocation
page read and write
1C9679A7000
trusted library allocation
page read and write
290000
unkown
page readonly
8A0000
unkown
page execute and read and write
1C96897C000
trusted library allocation
page read and write
1C96FCC1000
trusted library allocation
page read and write
F74000
heap
page read and write
1C968130000
trusted library allocation
page read and write
FB4000
heap
page read and write
4A10000
direct allocation
page read and write
D2A000
heap
page read and write
1C965109000
trusted library allocation
page read and write
5D4D000
trusted library allocation
page read and write
49D0000
direct allocation
page read and write
1C962A8A000
trusted library allocation
page read and write
29E7000
heap
page read and write
1C968991000
trusted library allocation
page read and write
308E000
stack
page read and write
1C96844E000
trusted library allocation
page read and write
1C968634000
trusted library allocation
page read and write
1C96837B000
trusted library allocation
page read and write
416000
unkown
page write copy
D72000
heap
page read and write
7AA000
unkown
page execute and read and write
1C968455000
trusted library allocation
page read and write
1C962F00000
trusted library allocation
page read and write
1C967D9C000
trusted library allocation
page read and write
1126000
heap
page read and write
64B5000
trusted library allocation
page read and write
48B1000
heap
page read and write
1C96A9E5000
trusted library allocation
page read and write
1C966AE7000
heap
page read and write
59AB000
trusted library allocation
page read and write
59AC000
trusted library allocation
page read and write
204F095D000
heap
page read and write
3D2F000
stack
page read and write
FB4000
heap
page read and write
13C6029F000
heap
page read and write
5E28000
trusted library allocation
page read and write
204F0F21000
heap
page read and write
1C96F226000
trusted library allocation
page read and write
1C96F7B3000
trusted library allocation
page read and write
2B60000
direct allocation
page read and write
1C96AC20000
trusted library allocation
page read and write
1C9694A7000
trusted library allocation
page read and write
1C9686A9000
trusted library allocation
page read and write
59EA000
trusted library allocation
page read and write
1C968991000
trusted library allocation
page read and write
1C95FF6A000
heap
page read and write
1805C570000
unclassified section
page readonly
1C9676A0000
trusted library allocation
page read and write
1C968F78000
trusted library allocation
page read and write
5997000
trusted library allocation
page read and write
1054000
heap
page read and write
417E000
stack
page read and write
5D9D000
trusted library allocation
page read and write
412000
unkown
page execute and write copy
38B000
unkown
page write copy
A45000
heap
page read and write
1C96A6A2000
trusted library allocation
page read and write
3BAD43E000
stack
page read and write
4B56000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C968803000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
1054000
heap
page read and write
1C968201000
trusted library allocation
page read and write
471000
unkown
page execute and write copy
EF5000
stack
page read and write
4C3F000
stack
page read and write
1C96F03C000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
15B0000
direct allocation
page read and write
1C96871F000
trusted library allocation
page read and write
48B1000
heap
page read and write
204F09C3000
heap
page read and write
1C9674E2000
trusted library allocation
page read and write
1C96F3E9000
trusted library allocation
page read and write
1C96294A000
trusted library allocation
page read and write
5D9D000
trusted library allocation
page read and write
B02000
unkown
page execute and write copy
1C9689DA000
trusted library allocation
page read and write
1C968BBD000
trusted library allocation
page read and write
5E25000
trusted library allocation
page read and write
5DAE000
trusted library allocation
page read and write
1C96F4EE000
trusted library allocation
page read and write
1C95FF6A000
heap
page read and write
1C969595000
trusted library allocation
page read and write
F1E000
stack
page read and write
1C967DCE000
trusted library allocation
page read and write
1C967D38000
trusted library allocation
page read and write
5A91000
trusted library allocation
page read and write
1C9689A5000
trusted library allocation
page read and write
FB4000
heap
page read and write
FB4000
heap
page read and write
FB4000
heap
page read and write
C34000
heap
page read and write
703000
unkown
page execute and write copy
1C967FA3000
trusted library allocation
page read and write
1805CB7A000
trusted library allocation
page read and write
59F8000
trusted library allocation
page read and write
1CEDD000
stack
page read and write
1730000
heap
page read and write
599E000
trusted library allocation
page read and write
5D75000
trusted library allocation
page read and write
110E000
heap
page read and write
59B7000
trusted library allocation
page read and write
6FF000
unkown
page execute and write copy
4850000
direct allocation
page execute and read and write
365E000
stack
page read and write
984000
heap
page read and write
3BA903B000
stack
page read and write
390E000
stack
page read and write
BF4000
heap
page read and write
303F000
stack
page read and write
48B1000
heap
page read and write
4780000
direct allocation
page read and write
C34000
heap
page read and write
5EF6000
trusted library allocation
page read and write
4861000
heap
page read and write
1C9640F3000
trusted library allocation
page read and write
1CDBE000
stack
page read and write
5981000
trusted library allocation
page read and write
FB4000
heap
page read and write
B44000
heap
page read and write
343E000
stack
page read and write
1C967649000
trusted library allocation
page read and write
A73000
heap
page read and write
1C96301E000
trusted library allocation
page read and write
48B1000
heap
page read and write
618B000
trusted library allocation
page read and write
1C967F60000
trusted library allocation
page read and write
1805CB6E000
trusted library allocation
page read and write
1C968FCB000
trusted library allocation
page read and write
59D9000
trusted library allocation
page read and write
1C9642BE000
trusted library allocation
page read and write
75665D8000
stack
page read and write
B44000
heap
page read and write
59EE000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C96A87C000
trusted library allocation
page read and write
1C9679BA000
trusted library allocation
page read and write
1C96F722000
trusted library allocation
page read and write
1C96F24D000
trusted library allocation
page read and write
1C9679EB000
trusted library allocation
page read and write
FB4000
heap
page read and write
11B4000
heap
page read and write
1C9684FD000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
4731000
heap
page read and write
1C96871B000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
2DAF000
stack
page read and write
204F08D0000
heap
page read and write
4591000
heap
page read and write
5FA000
unkown
page execute and read and write
FB4000
heap
page read and write
1C957200000
trusted library allocation
page read and write
59E9000
trusted library allocation
page read and write
1C96F5C8000
trusted library allocation
page read and write
48B1000
heap
page read and write
C34000
heap
page read and write
B44000
heap
page read and write
1C95FF6A000
heap
page read and write
52B0000
direct allocation
page execute and read and write
1024000
heap
page read and write
5A91000
trusted library allocation
page read and write
1C968A11000
trusted library allocation
page read and write
1263000
heap
page read and write
1119000
heap
page read and write
2DBF000
stack
page read and write
10F0000
direct allocation
page read and write
48B1000
heap
page read and write
5A91000
trusted library allocation
page read and write
1C966C1C000
trusted library allocation
page read and write
1C9686A9000
trusted library allocation
page read and write
4900000
direct allocation
page execute and read and write
569000
unkown
page execute and read and write
1A4000
heap
page read and write
FB4000
heap
page read and write
1C967D41000
trusted library allocation
page read and write
30B7000
heap
page read and write
1C968979000
trusted library allocation
page read and write
59F7000
trusted library allocation
page read and write
1C96869B000
trusted library allocation
page read and write
1C968956000
trusted library allocation
page read and write
1C967DD3000
trusted library allocation
page read and write
1C966E7A000
trusted library allocation
page read and write
1C9683EF000
trusted library allocation
page read and write
3BFF000
stack
page read and write
46F0000
direct allocation
page read and write
6A181FE000
stack
page read and write
5C0000
unkown
page readonly
FB5000
heap
page read and write
1C968915000
trusted library allocation
page read and write
CFA000
heap
page read and write
5CAA000
trusted library allocation
page read and write
4A71000
heap
page read and write
4C80000
direct allocation
page read and write
1C96F394000
trusted library allocation
page read and write
13C60400000
trusted library allocation
page read and write
1C96C028000
trusted library allocation
page read and write
59DC000
trusted library allocation
page read and write
FB4000
heap
page read and write
4920000
direct allocation
page execute and read and write
1C9689ED000
trusted library allocation
page read and write
1C963013000
trusted library allocation
page read and write
1B2AD000
stack
page read and write
1054000
heap
page read and write
FB4000
heap
page read and write
1C96761C000
trusted library allocation
page read and write
1254000
heap
page read and write
4B6D000
trusted library allocation
page read and write
1C96F407000
trusted library allocation
page read and write
BF4000
heap
page read and write
1C967645000
trusted library allocation
page read and write
11BE000
heap
page read and write
1C968435000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
5AB1000
trusted library allocation
page read and write
4C7F000
stack
page read and write
A8F000
heap
page read and write
5E27000
trusted library allocation
page read and write
1C9689AB000
trusted library allocation
page read and write
1C963FA6000
trusted library allocation
page read and write
560000
heap
page read and write
4591000
heap
page read and write
20351240000
heap
page read and write
1C9676AF000
trusted library allocation
page read and write
59C7000
trusted library allocation
page read and write
1C962B7B000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
5A90000
trusted library allocation
page read and write
1C968476000
trusted library allocation
page read and write
1C96F758000
trusted library allocation
page read and write
38B000
unkown
page write copy
1C9670F1000
trusted library allocation
page read and write
F74000
heap
page read and write
1C96F511000
trusted library allocation
page read and write
599E000
trusted library allocation
page read and write
1C968916000
trusted library allocation
page read and write
5CA1000
trusted library allocation
page read and write
C7E000
stack
page read and write
55A000
unkown
page execute and read and write
1C967A80000
trusted library section
page read and write
1C964211000
trusted library allocation
page read and write
FB4000
heap
page read and write
59A5000
trusted library allocation
page read and write
1C968C05000
trusted library allocation
page read and write
1C968469000
trusted library allocation
page read and write
5ECE000
trusted library allocation
page read and write
48B1000
heap
page read and write
FB4000
heap
page read and write
1C966E7D000
trusted library allocation
page read and write
FB4000
heap
page read and write
2C6E000
stack
page read and write
1ABCE000
stack
page read and write
1CFFC000
stack
page read and write
1C968693000
trusted library allocation
page read and write
FB4000
heap
page read and write
1191000
heap
page read and write
1C9683C3000
trusted library allocation
page read and write
1A4000
heap
page read and write
2B7E000
stack
page read and write
1C966E80000
trusted library allocation
page read and write
AA1000
heap
page read and write
1C969524000
trusted library allocation
page read and write
5E2F000
trusted library allocation
page read and write
1C96F47D000
trusted library allocation
page read and write
1C96831E000
trusted library allocation
page read and write
1C967625000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C96892C000
trusted library allocation
page read and write
1C9686FB000
trusted library allocation
page read and write
1C966E65000
trusted library allocation
page read and write
154E000
stack
page read and write
59AE000
trusted library allocation
page read and write
1C9670E0000
trusted library allocation
page read and write
48B1000
heap
page read and write
1C9689ED000
trusted library allocation
page read and write
59E6000
trusted library allocation
page read and write
F74000
heap
page read and write
1C9689E0000
trusted library allocation
page read and write
1C966F7F000
trusted library allocation
page read and write
48B1000
heap
page read and write
135E000
stack
page read and write
1C96708A000
trusted library allocation
page read and write
9CE000
stack
page read and write
4E70000
direct allocation
page read and write
951000
unkown
page execute read
4591000
heap
page read and write
204F09C0000
heap
page read and write
B70000
heap
page read and write
1C96F21F000
trusted library allocation
page read and write
FB4000
heap
page read and write
11B0000
heap
page read and write
FB4000
heap
page read and write
5D7A000
trusted library allocation
page read and write
1C968ACA000
trusted library allocation
page read and write
1205000
heap
page read and write
1C967063000
trusted library allocation
page read and write
413E000
stack
page read and write
1C968915000
trusted library allocation
page read and write
599B000
trusted library allocation
page read and write
A1C000
unkown
page write copy
E94000
heap
page read and write
59BC000
trusted library allocation
page read and write
5CA000
unkown
page execute and read and write
29BF000
stack
page read and write
8D0000
unkown
page execute and write copy
5F4F000
trusted library allocation
page read and write
59BA000
trusted library allocation
page read and write
5A0C000
trusted library allocation
page read and write
FB4000
heap
page read and write
4861000
heap
page read and write
1271000
heap
page read and write
1C962AA3000
trusted library allocation
page read and write
5CA1000
trusted library allocation
page read and write
11A6000
heap
page read and write
1C966FD6000
trusted library allocation
page read and write
FB4000
heap
page read and write
468F000
stack
page read and write
1C968956000
trusted library allocation
page read and write
1C962A00000
trusted library allocation
page read and write
4861000
heap
page read and write
1C95725D000
trusted library allocation
page read and write
1C968447000
trusted library allocation
page read and write
1C9684F1000
trusted library allocation
page read and write
59C7000
trusted library allocation
page read and write
1C966E86000
trusted library allocation
page read and write
118B000
heap
page read and write
9D7000
heap
page read and write
2CAE000
stack
page read and write
5A20000
trusted library allocation
page read and write
32FE000
stack
page read and write
4F20000
direct allocation
page execute and read and write
48B1000
heap
page read and write
FB4000
heap
page read and write
4BF0000
heap
page read and write
4B4A000
trusted library allocation
page read and write
E94000
heap
page read and write
F74000
heap
page read and write
36AE000
stack
page read and write
5EBB000
trusted library allocation
page read and write
2960000
direct allocation
page read and write
4591000
heap
page read and write
1C9670C2000
trusted library allocation
page read and write
4A00000
trusted library allocation
page read and write
3BB1CBC000
unkown
page read and write
B44000
heap
page read and write
1C95FF62000
heap
page read and write
3BAE000
stack
page read and write
4861000
heap
page read and write
5F6C000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
7C0000
heap
page read and write
1C968429000
trusted library allocation
page read and write
59A2000
trusted library allocation
page read and write
5E8000
unkown
page execute and read and write
71FF000
stack
page read and write
304E000
stack
page read and write
10F9000
stack
page read and write
59F3000
trusted library allocation
page read and write
204F00E0000
unkown
page execute read
4C80000
direct allocation
page read and write
5AA1000
trusted library allocation
page read and write
1040000
direct allocation
page read and write
59C7000
trusted library allocation
page read and write
4591000
heap
page read and write
4A20000
direct allocation
page read and write
F74000
heap
page read and write
1C968D03000
trusted library allocation
page read and write
478E000
stack
page read and write
CF2000
unkown
page execute and read and write
5D71000
trusted library allocation
page read and write
1C96F48E000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
734000
heap
page read and write
1C96F46F000
trusted library allocation
page read and write
1CE9D000
stack
page read and write
FB4000
heap
page read and write
372E000
stack
page read and write
E10000
heap
page read and write
B38000
unkown
page execute and read and write
1C96959A000
trusted library allocation
page read and write
59C8000
trusted library allocation
page read and write
1C964203000
trusted library allocation
page read and write
4591000
heap
page read and write
4A48000
trusted library allocation
page read and write
43AE000
stack
page read and write
204F0F77000
heap
page read and write
622000
unkown
page execute and read and write
A69000
heap
page read and write
1C968F29000
trusted library allocation
page read and write
204F0210000
trusted library allocation
page read and write
11A5000
heap
page read and write
477E000
stack
page read and write
75675FE000
stack
page read and write
1C968B58000
trusted library allocation
page read and write
11B4000
heap
page read and write
1054000
heap
page read and write
1C968500000
unclassified section
page read and write
1C96F116000
trusted library allocation
page read and write
1C96810D000
trusted library allocation
page read and write
1C96895A000
trusted library allocation
page read and write
1C968AAD000
trusted library allocation
page read and write
4B5F000
stack
page read and write
1360000
direct allocation
page read and write
1C96F50F000
trusted library allocation
page read and write
1C96F5D0000
trusted library allocation
page read and write
3BB22FB000
stack
page read and write
4580000
direct allocation
page read and write
5D31000
trusted library allocation
page read and write
1C96FCAC000
trusted library allocation
page read and write
1C968CB0000
trusted library allocation
page read and write
407F000
stack
page read and write
1C96F3F8000
trusted library allocation
page read and write
7AA000
unkown
page execute and read and write
11A0000
direct allocation
page execute and read and write
5A8A000
trusted library allocation
page read and write
1C962A86000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C967DEF000
trusted library allocation
page read and write
1C96967B000
trusted library allocation
page read and write
204F09D1000
heap
page read and write
13C7000
heap
page read and write
1C967607000
trusted library allocation
page read and write
2B2F000
stack
page read and write
1C9689EF000
trusted library allocation
page read and write
F74000
heap
page read and write
FB0000
direct allocation
page read and write
1C96F131000
trusted library allocation
page read and write
1C9682E7000
trusted library allocation
page read and write
1C9689E2000
trusted library allocation
page read and write
2F60000
heap
page read and write
59E9000
trusted library allocation
page read and write
1C96C010000
trusted library allocation
page read and write
1C95FF62000
heap
page read and write
4F00000
direct allocation
page execute and read and write
5D60000
trusted library allocation
page read and write
E9C000
stack
page read and write
860000
heap
page read and write
3BB23BE000
stack
page read and write
1C967603000
trusted library allocation
page read and write
1C96417F000
trusted library allocation
page read and write
7565AAE000
unkown
page readonly
5A55000
trusted library allocation
page read and write
12C1000
heap
page read and write
1C9670E6000
trusted library allocation
page read and write
59C7000
trusted library allocation
page read and write
620E000
stack
page read and write
FB4000
heap
page read and write
BF4000
heap
page read and write
3BAB83F000
stack
page read and write
910000
heap
page read and write
644000
unkown
page execute and read and write
6A7E000
heap
page read and write
45FF000
stack
page read and write
E94000
heap
page read and write
1C964241000
trusted library allocation
page read and write
C34000
heap
page read and write
127F000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
1C96897C000
trusted library allocation
page read and write
623000
unkown
page execute and write copy
1C964738000
trusted library allocation
page read and write
127F000
heap
page read and write
1C96F3D7000
trusted library allocation
page read and write
1C968381000
trusted library allocation
page read and write
13FE000
stack
page read and write
59F1000
trusted library allocation
page read and write
1C96898B000
trusted library allocation
page read and write
1C968922000
trusted library allocation
page read and write
5F02000
trusted library allocation
page read and write
1C9676AA000
trusted library allocation
page read and write
1C96F4DC000
trusted library allocation
page read and write
40EF000
stack
page read and write
5A3000
unkown
page execute and read and write
1C964989000
trusted library allocation
page read and write
5E28000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
1C96A6A7000
trusted library allocation
page read and write
1C9670D2000
trusted library allocation
page read and write
118E000
heap
page read and write
E94000
heap
page read and write
1209000
heap
page read and write
48B1000
heap
page read and write
59E1000
trusted library allocation
page read and write
F74000
heap
page read and write
D4E000
heap
page read and write
1C967C60000
trusted library section
page readonly
48B1000
heap
page read and write
5D7F000
trusted library allocation
page read and write
37EE000
stack
page read and write
1A4000
heap
page read and write
1C9683FE000
trusted library allocation
page read and write
3BB237B000
stack
page read and write
1C966E49000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
1024000
heap
page read and write
EFD000
stack
page read and write
1054000
heap
page read and write
48B1000
heap
page read and write
1C9672F9000
trusted library allocation
page read and write
4FF0000
direct allocation
page execute and read and write
1C968125000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
3BB233B000
stack
page read and write
59AE000
trusted library allocation
page read and write
10B0000
direct allocation
page read and write
1C96F120000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
5997000
trusted library allocation
page read and write
5CAB000
trusted library allocation
page read and write
4E90000
direct allocation
page execute and read and write
1C96AB4F000
trusted library allocation
page read and write
B44000
heap
page read and write
1C968643000
trusted library allocation
page read and write
608000
unkown
page execute and read and write
1C9717E2000
trusted library allocation
page read and write
1C96F784000
trusted library allocation
page read and write
1C9640B9000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
599E000
trusted library allocation
page read and write
3DFF000
stack
page read and write
4591000
heap
page read and write
11FE000
heap
page read and write
984000
heap
page read and write
59D2000
trusted library allocation
page read and write
1805C970000
heap
page read and write
1C964789000
trusted library allocation
page read and write
48B1000
heap
page read and write
5997000
trusted library allocation
page read and write
4A71000
heap
page read and write
B44000
heap
page read and write
3BA912C000
stack
page read and write
4591000
heap
page read and write
59DB000
trusted library allocation
page read and write
1C9640E4000
trusted library allocation
page read and write
29D0000
direct allocation
page execute and read and write
1C96A600000
trusted library allocation
page read and write
59A6000
trusted library allocation
page read and write
C34000
heap
page read and write
1070000
heap
page read and write
FB4000
heap
page read and write
F74000
heap
page read and write
1C964C00000
trusted library allocation
page read and write
4861000
heap
page read and write
70F0000
heap
page execute and read and write
1C9633F4000
trusted library allocation
page read and write
1C968996000
trusted library allocation
page read and write
5D5D000
trusted library allocation
page read and write
1C964000000
trusted library allocation
page read and write
8C2000
unkown
page execute and read and write
5AA1000
trusted library allocation
page read and write
5CA7000
trusted library allocation
page read and write
410000
unkown
page readonly
388E000
stack
page read and write
4EA1000
heap
page read and write
4861000
heap
page read and write
1C96F08A000
trusted library allocation
page read and write
5A03000
trusted library allocation
page read and write
552000
unkown
page execute and read and write
4D00000
direct allocation
page execute and read and write
1C967C30000
trusted library section
page readonly
204F09C9000
heap
page read and write
5A4A000
trusted library allocation
page read and write
1C96F016000
trusted library allocation
page read and write
3BB1C3C000
unkown
page read and write
5A91000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
1054000
heap
page read and write
59E9000
trusted library allocation
page read and write
C34000
heap
page read and write
A00000
direct allocation
page read and write
4951000
trusted library allocation
page read and write
1C967565000
trusted library allocation
page read and write
E94000
heap
page read and write
204F0244000
trusted library allocation
page read and write
F74000
heap
page read and write
1C967DC7000
trusted library allocation
page read and write
13C60290000
heap
page read and write
1C967F03000
trusted library allocation
page read and write
4C91000
heap
page read and write
1C96899F000
trusted library allocation
page read and write
59D8000
trusted library allocation
page read and write
F74000
heap
page read and write
1C96A8F9000
trusted library allocation
page read and write
E94000
heap
page read and write
4CEE000
stack
page read and write
2543F27000
stack
page read and write
5A01000
trusted library allocation
page read and write
1C968AC5000
trusted library allocation
page read and write
1C96F74E000
trusted library allocation
page read and write
5DA5000
trusted library allocation
page read and write
BF4000
heap
page read and write
59D8000
trusted library allocation
page read and write
1C968E09000
trusted library allocation
page read and write
2960000
direct allocation
page read and write
FB4000
heap
page read and write
1C966FA7000
trusted library allocation
page read and write
266C000
stack
page read and write
1C967796000
trusted library allocation
page read and write
27CC000
stack
page read and write
1A089FF000
stack
page read and write
4C80000
direct allocation
page read and write
317F000
stack
page read and write
A8C000
heap
page read and write
4861000
heap
page read and write
1C967FF7000
trusted library allocation
page read and write
48B1000
heap
page read and write
291000
unkown
page execute and write copy
A00000
direct allocation
page read and write
1C96F1BB000
trusted library allocation
page read and write
1C969303000
trusted library allocation
page read and write
443F000
stack
page read and write
418E000
stack
page read and write
1C967DA2000
trusted library allocation
page read and write
1805C710000
heap
page read and write
204F0275000
trusted library allocation
page read and write
5AB7000
trusted library allocation
page read and write
1C96741E000
trusted library allocation
page read and write
4591000
heap
page read and write
1C96898B000
trusted library allocation
page read and write
1024000
heap
page read and write
59C1000
trusted library allocation
page read and write
5F53000
trusted library allocation
page read and write
629000
unkown
page write copy
48B1000
heap
page read and write
5F7E000
trusted library allocation
page read and write
59C8000
trusted library allocation
page read and write
5DE3000
trusted library allocation
page read and write
307E000
stack
page read and write
5F6E000
trusted library allocation
page read and write
11E1000
heap
page read and write
1C96941D000
trusted library allocation
page read and write
3BB1A7C000
stack
page read and write
5A90000
trusted library allocation
page read and write
1C96894B000
trusted library allocation
page read and write
1C9649FA000
trusted library allocation
page read and write
1C96F4BD000
trusted library allocation
page read and write
1A4000
heap
page read and write
1C967DF5000
trusted library allocation
page read and write
2B60000
direct allocation
page read and write
5A87000
trusted library allocation
page read and write
1AB8F000
stack
page read and write
1C9670E3000
trusted library allocation
page read and write
4FB0000
direct allocation
page execute and read and write
BD0000
heap
page read and write
1C969603000
trusted library allocation
page read and write
1C968CD2000
trusted library allocation
page read and write
5F9000
unkown
page write copy
1C967FBD000
trusted library allocation
page read and write
F80000
unkown
page readonly
59FF000
trusted library allocation
page read and write
1C95FF64000
heap
page read and write
4591000
heap
page read and write
4861000
heap
page read and write
1C966FA0000
trusted library allocation
page read and write
1C9717D0000
trusted library allocation
page read and write
1805CB23000
trusted library allocation
page read and write
1C967500000
trusted library allocation
page read and write
1C9689A9000
trusted library allocation
page read and write
59A6000
trusted library allocation
page read and write
984000
heap
page read and write
3BB3947000
stack
page read and write
49D1000
heap
page read and write
1C968671000
trusted library allocation
page read and write
1C9642A5000
trusted library allocation
page read and write
59E9000
trusted library allocation
page read and write
1C963075000
trusted library allocation
page read and write
5D6A000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
59D8000
trusted library allocation
page read and write
1C96F435000
trusted library allocation
page read and write
950000
unkown
page readonly
1C96F09C000
trusted library allocation
page read and write
1054000
heap
page read and write
1C96F400000
trusted library allocation
page read and write
1C968E5E000
trusted library allocation
page read and write
11DB000
stack
page read and write
3BB00BD000
stack
page read and write
375F000
stack
page read and write
1C9686E3000
trusted library allocation
page read and write
1C96A8BE000
trusted library allocation
page read and write
2B60000
direct allocation
page read and write
1C96894B000
trusted library allocation
page read and write
F80000
heap
page read and write
37BF000
stack
page read and write
59E6000
trusted library allocation
page read and write
59AD000
trusted library allocation
page read and write
5A20000
trusted library allocation
page read and write
1C96F205000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
5EE9000
trusted library allocation
page read and write
1C96892C000
trusted library allocation
page read and write
1C9634AA000
trusted library allocation
page read and write
11EF000
stack
page read and write
6B4000
unkown
page execute and read and write
1C964791000
trusted library allocation
page read and write
FB4000
heap
page read and write
322E000
stack
page read and write
1C95FF62000
heap
page read and write
48B1000
heap
page read and write
1C96AB00000
trusted library allocation
page read and write
1C9686C4000
trusted library allocation
page read and write
1C968CCD000
trusted library allocation
page read and write
BCC000
stack
page read and write
4861000
heap
page read and write
4591000
heap
page read and write
A94000
heap
page read and write
1C957203000
trusted library allocation
page read and write
60F000
unkown
page execute and write copy
1C96A9A0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C967624000
trusted library allocation
page read and write
48B1000
heap
page read and write
E94000
heap
page read and write
1C967659000
trusted library allocation
page read and write
1C96F1A1000
trusted library allocation
page read and write
1C96F3B4000
trusted library allocation
page read and write
204F02F2000
trusted library allocation
page read and write
1C967FE7000
trusted library allocation
page read and write
204F0F44000
heap
page read and write
1C968A7A000
trusted library allocation
page read and write
5D44000
trusted library allocation
page read and write
4271000
heap
page read and write
7565A6B000
stack
page read and write
307E000
stack
page read and write
1C9672F5000
trusted library allocation
page read and write
59AE000
trusted library allocation
page read and write
1C9689EF000
trusted library allocation
page read and write
615000
unkown
page execute and read and write
FB4000
heap
page read and write
1CFE0000
heap
page read and write
1C96837D000
trusted library allocation
page read and write
48B1000
heap
page read and write
3EBF000
stack
page read and write
49E1000
heap
page read and write
1C96F42E000
trusted library allocation
page read and write
5A8D000
trusted library allocation
page read and write
1C9689EA000
trusted library allocation
page read and write
1C966E3F000
trusted library allocation
page read and write
F74000
heap
page read and write
1C96F716000
trusted library allocation
page read and write
4A71000
heap
page read and write
734000
heap
page read and write
1C96759F000
trusted library allocation
page read and write
59E6000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C96F172000
trusted library allocation
page read and write
1C96881B000
trusted library allocation
page read and write
1C96409B000
trusted library allocation
page read and write
48B1000
heap
page read and write
1C964267000
trusted library allocation
page read and write
1C967445000
trusted library allocation
page read and write
1C95FF6A000
heap
page read and write
5CA4000
trusted library allocation
page read and write
5EE5000
trusted library allocation
page read and write
E94000
heap
page read and write
F74000
heap
page read and write
59DC000
trusted library allocation
page read and write
59CB000
trusted library allocation
page read and write
F39000
unkown
page execute and write copy
FB4000
heap
page read and write
49E0000
trusted library allocation
page read and write
1254000
heap
page read and write
5B5000
unkown
page execute and write copy
10F0000
direct allocation
page read and write
B44000
heap
page read and write
1C96763E000
trusted library allocation
page read and write
1380000
heap
page read and write
1C967D35000
trusted library allocation
page read and write
462E000
stack
page read and write
1C962900000
trusted library allocation
page read and write
1C96C006000
trusted library allocation
page read and write
1C967FBB000
trusted library allocation
page read and write
1C968693000
trusted library allocation
page read and write
E94000
heap
page read and write
48B1000
heap
page read and write
1B66F000
stack
page read and write
11F5000
heap
page read and write
10F0000
direct allocation
page read and write
1C966C00000
trusted library allocation
page read and write
59AB000
trusted library allocation
page read and write
639000
unkown
page execute and read and write
B0A000
unkown
page execute and write copy
5E2B000
trusted library allocation
page read and write
1C96F468000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
5D66000
trusted library allocation
page read and write
1C967E0D000
trusted library allocation
page read and write
1C96AB70000
trusted library allocation
page read and write
1C96F5CA000
trusted library allocation
page read and write
59D1000
trusted library allocation
page read and write
B00000
heap
page read and write
1C96F780000
trusted library allocation
page read and write
1C9670D8000
trusted library allocation
page read and write
1CAEE000
stack
page read and write
1C96884F000
trusted library allocation
page read and write
1C956EB0000
unclassified section
page readonly
4BB0000
direct allocation
page execute and read and write
1C9690B0000
trusted library allocation
page read and write
1C9633E1000
trusted library allocation
page read and write
1C96F429000
trusted library allocation
page read and write
D74000
heap
page read and write
59C7000
trusted library allocation
page read and write
4D30000
direct allocation
page execute and read and write
1C9689E2000
trusted library allocation
page read and write
130F000
stack
page read and write
316F000
stack
page read and write
5FFA000
trusted library allocation
page read and write
204F0F77000
heap
page read and write
4861000
heap
page read and write
5A01000
trusted library allocation
page read and write
1279000
unkown
page execute and read and write
4591000
heap
page read and write
204EFE30000
unclassified section
page readonly
5E28000
trusted library allocation
page read and write
1C9629B3000
trusted library allocation
page read and write
11B4000
heap
page read and write
1C9684A6000
trusted library allocation
page read and write
5A91000
trusted library allocation
page read and write
1C969400000
trusted library allocation
page read and write
1C96FCB0000
trusted library allocation
page read and write
F74000
heap
page read and write
1C963392000
trusted library allocation
page read and write
59E9000
trusted library allocation
page read and write
1C9689AB000
trusted library allocation
page read and write
599E000
trusted library allocation
page read and write
1C968BC9000
trusted library allocation
page read and write
1C96AB03000
trusted library allocation
page read and write
4591000
heap
page read and write
F70000
heap
page read and write
7565AED000
stack
page read and write
52EC000
trusted library allocation
page read and write
1C967DEC000
trusted library allocation
page read and write
639000
unkown
page execute and read and write
59BC000
trusted library allocation
page read and write
4B50000
heap
page read and write
1C968A49000
trusted library allocation
page read and write
5997000
trusted library allocation
page read and write
FB4000
heap
page read and write
F74000
heap
page read and write
5CA2000
trusted library allocation
page read and write
1805C750000
heap
page read and write
1C968E93000
trusted library allocation
page read and write
CE0000
heap
page read and write
59B8000
trusted library allocation
page read and write
F74000
heap
page read and write
1C96A606000
trusted library allocation
page read and write
FB4000
heap
page read and write
F74000
heap
page read and write
1C9647DA000
trusted library allocation
page read and write
1C968E10000
trusted library allocation
page read and write
204F0F3B000
heap
page read and write
1805CB5D000
trusted library allocation
page read and write
1C962EEF000
unclassified section
page read and write
8A0000
unkown
page execute and write copy
142D000
unkown
page execute and read and write
1C966F7F000
trusted library allocation
page read and write
5280000
direct allocation
page execute and read and write
1C963010000
trusted library allocation
page read and write
58C000
unkown
page execute and read and write
4591000
heap
page read and write
E94000
heap
page read and write
379E000
stack
page read and write
48B1000
heap
page read and write
59D4000
trusted library allocation
page read and write
1C9675D6000
trusted library allocation
page read and write
1C9676AF000
trusted library allocation
page read and write
5EE5000
trusted library allocation
page read and write
1054000
heap
page read and write
FB4000
heap
page read and write
3BB1C7E000
unkown
page read and write
101000
unkown
page execute and read and write
3A3F000
stack
page read and write
59C8000
trusted library allocation
page read and write
5E0F000
trusted library allocation
page read and write
601000
unkown
page execute and write copy
1C9688AD000
trusted library allocation
page read and write
1C967E03000
trusted library allocation
page read and write
5A0C000
trusted library allocation
page read and write
1A4000
heap
page read and write
1201000
heap
page read and write
2CAE000
stack
page read and write
15B0000
direct allocation
page read and write
1C96FC03000
trusted library allocation
page read and write
3FBF000
stack
page read and write
1360000
direct allocation
page read and write
1C965782000
trusted library allocation
page read and write
5D57000
trusted library allocation
page read and write
1B15F000
stack
page read and write
2B60000
direct allocation
page read and write
1C9642A1000
trusted library allocation
page read and write
1C96892C000
trusted library allocation
page read and write
11A5000
heap
page read and write
1C96F4DC000
trusted library allocation
page read and write
1C96F000000
trusted library allocation
page read and write
FB5000
heap
page read and write
10D000
unkown
page execute and read and write
1C9689E2000
trusted library allocation
page read and write
1109000
heap
page read and write
B44000
heap
page read and write
59C7000
trusted library allocation
page read and write
4861000
heap
page read and write
48C1000
heap
page read and write
601000
unkown
page execute and write copy
5A0A000
trusted library allocation
page read and write
27FB000
heap
page read and write
1C96F18D000
trusted library allocation
page read and write
FB4000
heap
page read and write
630000
unkown
page execute and read and write
BE0000
direct allocation
page read and write
1C96F306000
trusted library allocation
page read and write
54B0000
direct allocation
page execute and read and write
130E000
stack
page read and write
1C968996000
trusted library allocation
page read and write
3BA90CC000
stack
page read and write
138A000
heap
page read and write
1CBEF000
stack
page read and write
CDA000
unkown
page execute and write copy
4591000
heap
page read and write
A9B000
heap
page read and write
984000
heap
page read and write
328F000
stack
page read and write
F74000
heap
page read and write
1C9647F6000
trusted library allocation
page read and write
48BE000
stack
page read and write
FB4000
heap
page read and write
1C96A9A3000
trusted library allocation
page read and write
1040000
direct allocation
page read and write
1C966E9E000
trusted library allocation
page read and write
5EB000
unkown
page execute and read and write
1C96883C000
trusted library allocation
page read and write
1C967FC3000
trusted library allocation
page read and write
1C9689DA000
trusted library allocation
page read and write
370F000
stack
page read and write
3090000
direct allocation
page execute and read and write
597000
unkown
page execute and write copy
FB4000
heap
page read and write
1C96A9EB000
trusted library allocation
page read and write
1C96F116000
trusted library allocation
page read and write
BCC000
stack
page read and write
1C967D42000
trusted library allocation
page read and write
FB4000
heap
page read and write
59FD000
trusted library allocation
page read and write
1C966FD6000
trusted library allocation
page read and write
E94000
heap
page read and write
1C967D3F000
trusted library allocation
page read and write
C34000
heap
page read and write
B44000
heap
page read and write
1C96F12D000
trusted library allocation
page read and write
B44000
heap
page read and write
204F022F000
trusted library allocation
page read and write
30B0000
heap
page read and write
4861000
heap
page read and write
1C968405000
trusted library allocation
page read and write
5C81000
trusted library allocation
page read and write
F74000
heap
page read and write
1C96F74E000
trusted library allocation
page read and write
808E000
stack
page read and write
5AA1000
trusted library allocation
page read and write
1AFFF000
stack
page read and write
3BB19FE000
stack
page read and write
FB4000
heap
page read and write
A6F000
unkown
page execute and write copy
1C963461000
trusted library allocation
page read and write
B44000
heap
page read and write
1C9572EF000
trusted library allocation
page read and write
5DFA000
trusted library allocation
page read and write
7A9000
unkown
page execute and read and write
BF4000
heap
page read and write
BE0000
direct allocation
page read and write
2980000
direct allocation
page read and write
12CE000
heap
page read and write
204F03D5000
unkown
page execute read
10D000
unkown
page execute and read and write
1C9642DC000
trusted library allocation
page read and write
C34000
heap
page read and write
5DD3000
trusted library allocation
page read and write
59F4000
trusted library allocation
page read and write
B06000
unkown
page write copy
1C96306A000
trusted library allocation
page read and write
1C968116000
trusted library allocation
page read and write
38B000
unkown
page write copy
1C96A9AB000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C968A3B000
trusted library allocation
page read and write
F74000
heap
page read and write
2034FA75000
heap
page read and write
1C96F0CA000
trusted library allocation
page read and write
1C9693F5000
trusted library allocation
page read and write
5F4B000
stack
page read and write
1C9642BC000
trusted library allocation
page read and write
2CB1000
heap
page read and write
F74000
heap
page read and write
1C96728F000
trusted library allocation
page read and write
FB4000
heap
page read and write
411000
unkown
page execute and write copy
4A71000
heap
page read and write
5E21000
trusted library allocation
page read and write
1C96F131000
trusted library allocation
page read and write
38B000
unkown
page write copy
1C9647F6000
trusted library allocation
page read and write
3F4E000
stack
page read and write
1C967DF5000
trusted library allocation
page read and write
1C968AEE000
trusted library allocation
page read and write
1C96F120000
trusted library allocation
page read and write
4A5B000
stack
page read and write
5A29000
trusted library allocation
page read and write
1C968743000
trusted library allocation
page read and write
1040000
direct allocation
page read and write
C34000
heap
page read and write
C87000
unkown
page execute and read and write
1054000
heap
page read and write
4E4D000
stack
page read and write
6A179FF000
stack
page read and write
1C967DB8000
trusted library allocation
page read and write
1C96767B000
trusted library allocation
page read and write
5CA1000
trusted library allocation
page read and write
1C967734000
trusted library allocation
page read and write
1C968C0B000
trusted library allocation
page read and write
1C96A96B000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C9716D9000
trusted library allocation
page read and write
59E3000
trusted library allocation
page read and write
11F4000
heap
page read and write
8D1000
unkown
page execute and write copy
1C967D03000
trusted library allocation
page read and write
1C968784000
trusted library allocation
page read and write
FB4000
heap
page read and write
A24000
unkown
page readonly
11FE000
heap
page read and write
1C96764F000
trusted library allocation
page read and write
59D8000
trusted library allocation
page read and write
1C96F468000
trusted library allocation
page read and write
1054000
heap
page read and write
1C96AB4D000
trusted library allocation
page read and write
204F08E0000
heap
page read and write
119A000
heap
page read and write
4861000
heap
page read and write
3BA9E3F000
stack
page read and write
204F020C000
trusted library allocation
page read and write
F9D000
stack
page read and write
1C968CCB000
trusted library allocation
page read and write
59E5000
trusted library allocation
page read and write
4CAF000
stack
page read and write
2C6F000
stack
page read and write
FB4000
heap
page read and write
4861000
heap
page read and write
1C9677D2000
trusted library allocation
page read and write
1C96F000
stack
page read and write
4D30000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
1C9673F3000
trusted library allocation
page read and write
1C9686CE000
trusted library allocation
page read and write
4F50000
direct allocation
page execute and read and write
1C956FC0000
heap
page read and write
204F0F58000
heap
page read and write
373E000
stack
page read and write
1C963424000
trusted library allocation
page read and write
4A20000
direct allocation
page read and write
4591000
heap
page read and write
1C96F12D000
trusted library allocation
page read and write
1C9647BC000
trusted library allocation
page read and write
1C96892C000
trusted library allocation
page read and write
39C1000
heap
page read and write
4580000
direct allocation
page read and write
FB4000
heap
page read and write
5FC5000
heap
page read and write
1C96861B000
trusted library allocation
page read and write
383F000
stack
page read and write
2590000
direct allocation
page execute and read and write
8C2000
unkown
page execute and read and write
599B000
trusted library allocation
page read and write
C17000
heap
page read and write
4591000
heap
page read and write
1C9670BC000
trusted library allocation
page read and write
644F000
stack
page read and write
1C9717E2000
trusted library allocation
page read and write
5E20000
trusted library allocation
page read and write
4BAE000
stack
page read and write
10F0000
direct allocation
page read and write
598E000
trusted library allocation
page read and write
F30000
heap
page read and write
59BC000
trusted library allocation
page read and write
2CB0000
direct allocation
page read and write
2960000
direct allocation
page read and write
4861000
heap
page read and write
5E2F000
trusted library allocation
page read and write
1C969503000
trusted library allocation
page read and write
41FE000
stack
page read and write
1C967681000
trusted library allocation
page read and write
1C9676A3000
trusted library allocation
page read and write
4DCE000
stack
page read and write
1C967D12000
trusted library allocation
page read and write
5CAD000
trusted library allocation
page read and write
BE0000
heap
page read and write
FB4000
heap
page read and write
52E000
unkown
page execute and read and write
1C963390000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C96767B000
trusted library allocation
page read and write
1C968ABD000
trusted library allocation
page read and write
3FFF000
stack
page read and write
1C9682E5000
trusted library allocation
page read and write
12C0000
heap
page read and write
48B1000
heap
page read and write
1C95FF6A000
heap
page read and write
1C968422000
trusted library allocation
page read and write
5CAD000
trusted library allocation
page read and write
1C969600000
trusted library allocation
page read and write
4BB0000
direct allocation
page execute and read and write
FB5000
heap
page read and write
3BA8FFE000
stack
page read and write
1C96F7E6000
trusted library allocation
page read and write
F74000
heap
page read and write
5990000
trusted library allocation
page read and write
B44000
heap
page read and write
59C7000
trusted library allocation
page read and write
1C96F0C6000
trusted library allocation
page read and write
1C968BBA000
trusted library allocation
page read and write
5500000
direct allocation
page execute and read and write
1C967BC0000
trusted library section
page readonly
D32000
heap
page read and write
1C96F1F9000
trusted library allocation
page read and write
1054000
heap
page read and write
4861000
heap
page read and write
48B0000
direct allocation
page read and write
1360000
direct allocation
page read and write
5060000
direct allocation
page execute and read and write
1C9689EF000
trusted library allocation
page read and write
1C96AB38000
trusted library allocation
page read and write
5A08000
trusted library allocation
page read and write
B44000
heap
page read and write
1C968A49000
trusted library allocation
page read and write
59D9000
trusted library allocation
page read and write
598C000
trusted library allocation
page read and write
1167000
heap
page read and write
1C96F003000
trusted library allocation
page read and write
1C96F73F000
trusted library allocation
page read and write
F74000
heap
page read and write
1C967563000
trusted library allocation
page read and write
1C96427F000
trusted library allocation
page read and write
F74000
heap
page read and write
1AF8E000
stack
page read and write
1C97176E000
trusted library allocation
page read and write
1805C714000
heap
page read and write
1C9642A5000
trusted library allocation
page read and write
1C967CFF000
unclassified section
page read and write
1C96F0C8000
trusted library allocation
page read and write
F74000
heap
page read and write
D34000
unkown
page execute and read and write
204F02C5000
trusted library allocation
page read and write
59BC000
trusted library allocation
page read and write
3D7F000
stack
page read and write
15C4000
heap
page read and write
FB4000
heap
page read and write
427F000
stack
page read and write
48B1000
heap
page read and write
1C96953A000
trusted library allocation
page read and write
11AB000
heap
page read and write
51000
unkown
page execute and write copy
1C967DEF000
trusted library allocation
page read and write
1C957350000
heap
page read and write
2543FAE000
unkown
page readonly
342E000
stack
page read and write
1C9686D1000
trusted library allocation
page read and write
1252000
heap
page read and write
F74000
heap
page read and write
5999000
trusted library allocation
page read and write
AFE000
stack
page read and write
204F092D000
heap
page read and write
D20000
unkown
page execute and read and write
126B000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
1C966E80000
trusted library allocation
page read and write
101000
unkown
page execute and read and write
59D3000
trusted library allocation
page read and write
3AEE000
stack
page read and write
DF5000
heap
page read and write
4C91000
heap
page read and write
1C968671000
trusted library allocation
page read and write
A51000
heap
page read and write
1C9695B5000
trusted library allocation
page read and write
59EB000
trusted library allocation
page read and write
28FF000
stack
page read and write
88A000
unkown
page execute and read and write
1C966F88000
trusted library allocation
page read and write
1C9690E6000
trusted library allocation
page read and write
CAD000
stack
page read and write
1C9642E4000
trusted library allocation
page read and write
464E000
stack
page read and write
1C964241000
trusted library allocation
page read and write
1C9649FA000
trusted library allocation
page read and write
1C96769E000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C967622000
trusted library allocation
page read and write
11A0000
heap
page read and write
1C96495C000
trusted library allocation
page read and write
2FAE000
stack
page read and write
E94000
heap
page read and write
1C968FAD000
trusted library allocation
page read and write
4861000
heap
page read and write
474F000
stack
page read and write
B44000
heap
page read and write
1C96755B000
trusted library allocation
page read and write
5EE9000
trusted library allocation
page read and write
2960000
direct allocation
page read and write
1805CB96000
trusted library allocation
page read and write
1054000
heap
page read and write
5A17000
trusted library allocation
page read and write
1C9633A8000
trusted library allocation
page read and write
1C9679B3000
trusted library allocation
page read and write
1C95FF64000
heap
page read and write
1C968952000
trusted library allocation
page read and write
1C96C012000
trusted library allocation
page read and write
719000
unkown
page execute and write copy
204F093C000
heap
page read and write
1C9670DC000
trusted library allocation
page read and write
70EE000
stack
page read and write
59AE000
trusted library allocation
page read and write
CBA000
unkown
page execute and read and write
1C96868D000
trusted library allocation
page read and write
5BC000
unkown
page readonly
5F23000
trusted library allocation
page read and write
204F0F67000
heap
page read and write
E94000
heap
page read and write
1C96F0A9000
trusted library allocation
page read and write
1C96891A000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
1C968455000
trusted library allocation
page read and write
310E000
stack
page read and write
1C963465000
trusted library allocation
page read and write
D47000
unkown
page execute and write copy
637000
unkown
page execute and write copy
2E6E000
stack
page read and write
1A4000
heap
page read and write
204F009A000
heap
page read and write
1C967A70000
trusted library section
page read and write
1C96F399000
trusted library allocation
page read and write
1C967DB8000
trusted library allocation
page read and write
1C962998000
trusted library allocation
page read and write
59BC000
trusted library allocation
page read and write
48B1000
heap
page read and write
5988000
trusted library allocation
page read and write
1C962934000
trusted library allocation
page read and write
892000
unkown
page execute and read and write
CD0000
direct allocation
page read and write
48B1000
heap
page read and write
1C964295000
trusted library allocation
page read and write
C34000
heap
page read and write
5F05000
trusted library allocation
page read and write
59B1000
trusted library allocation
page read and write
204F09D1000
heap
page read and write
59AA000
trusted library allocation
page read and write
2B87000
heap
page read and write
59D8000
trusted library allocation
page read and write
B44000
heap
page read and write
F74000
heap
page read and write
F23000
unkown
page execute and write copy
1C968F8C000
trusted library allocation
page read and write
940000
heap
page read and write
377E000
stack
page read and write
4591000
heap
page read and write
49D0000
direct allocation
page read and write
1054000
heap
page read and write
414E000
stack
page read and write
204F0999000
heap
page read and write
1040000
direct allocation
page read and write
59AA000
trusted library allocation
page read and write
FB4000
heap
page read and write
1B2FD000
stack
page read and write
5A04000
trusted library allocation
page read and write
4B3E000
stack
page read and write
59C8000
trusted library allocation
page read and write
1C9696F0000
trusted library allocation
page read and write
1C9688D2000
trusted library allocation
page read and write
B44000
heap
page read and write
1C9670FC000
trusted library allocation
page read and write
59B5000
trusted library allocation
page read and write
C3E000
stack
page read and write
4591000
heap
page read and write
59D9000
trusted library allocation
page read and write
1C9687CE000
trusted library allocation
page read and write
FB4000
heap
page read and write
131F000
stack
page read and write
13C603A0000
heap
page read and write
5ED7000
trusted library allocation
page read and write
1C967257000
trusted library allocation
page read and write
37E000
unkown
page readonly
4EA1000
heap
page read and write
59A2000
trusted library allocation
page read and write
59C7000
trusted library allocation
page read and write
1C9648D0000
heap
page read and write
34FE000
stack
page read and write
45A7000
heap
page read and write
1C967C20000
trusted library section
page readonly
4591000
heap
page read and write
E94000
heap
page read and write
4A20000
direct allocation
page read and write
FB4000
heap
page read and write
1C964293000
trusted library allocation
page read and write
2034F800000
trusted library allocation
page read and write
4271000
heap
page read and write
5F9F000
trusted library allocation
page read and write
36FF000
stack
page read and write
4591000
heap
page read and write
F80000
direct allocation
page read and write
D39000
heap
page read and write
734000
heap
page read and write
3BB1ABA000
stack
page read and write
1C96471D000
trusted library allocation
page read and write
1C966DFE000
trusted library allocation
page read and write
1C962A26000
trusted library allocation
page read and write
59DE000
trusted library allocation
page read and write
B44000
heap
page read and write
3BA85D8000
stack
page read and write
E94000
heap
page read and write
59E7000
trusted library allocation
page read and write
5B6000
unkown
page execute and read and write
1C96F73F000
trusted library allocation
page read and write
5030000
direct allocation
page execute and read and write
B44000
heap
page read and write
4A71000
heap
page read and write
59C8000
trusted library allocation
page read and write
1C9682FB000
trusted library allocation
page read and write
204F0281000
trusted library allocation
page read and write
FB4000
heap
page read and write
FB4000
heap
page read and write
1C96349E000
trusted library allocation
page read and write
1C968466000
trusted library allocation
page read and write
590000
unkown
page read and write
3A6E000
stack
page read and write
5DEF000
trusted library allocation
page read and write
B44000
heap
page read and write
5CAF000
trusted library allocation
page read and write
1C96579A000
trusted library allocation
page read and write
59B5000
trusted library allocation
page read and write
302F000
stack
page read and write
1C95FF6A000
heap
page read and write
3BB23FC000
stack
page read and write
1C96A685000
trusted library allocation
page read and write
3CAF000
stack
page read and write
1C969229000
trusted library allocation
page read and write
734000
heap
page read and write
1C968E1B000
trusted library allocation
page read and write
1C9642BE000
trusted library allocation
page read and write
5A10000
trusted library allocation
page read and write
E94000
heap
page read and write
1C968969000
trusted library allocation
page read and write
2C2C000
stack
page read and write
6A3000
unkown
page execute and write copy
FB4000
heap
page read and write
5F3C000
trusted library allocation
page read and write
5C0000
unkown
page readonly
1C967CF0000
unclassified section
page read and write
5331000
trusted library allocation
page read and write
48B1000
heap
page read and write
1C96F4AD000
trusted library allocation
page read and write
1C96F4F9000
trusted library allocation
page read and write
4591000
heap
page read and write
1A4000
heap
page read and write
1C96498D000
trusted library allocation
page read and write
2960000
direct allocation
page read and write
A56000
heap
page read and write
1C96F43E000
trusted library allocation
page read and write
1C95FF70000
heap
page read and write
F30000
heap
page read and write
FB4000
heap
page read and write
1C968943000
trusted library allocation
page read and write
463E000
stack
page read and write
889000
unkown
page execute and read and write
1C96A801000
trusted library allocation
page read and write
1C968009000
trusted library allocation
page read and write
4FF0000
direct allocation
page execute and read and write
1C966E8C000
trusted library allocation
page read and write
59B7000
trusted library allocation
page read and write
AFE000
stack
page read and write
4591000
heap
page read and write
1C96404D000
trusted library allocation
page read and write
B44000
heap
page read and write
15B0000
direct allocation
page read and write
4B70000
direct allocation
page execute and read and write
59C4000
trusted library allocation
page read and write
59AA000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
41AF000
stack
page read and write
1C96896B000
trusted library allocation
page read and write
1C967DDF000
trusted library allocation
page read and write
5E2B000
trusted library allocation
page read and write
1C968A39000
trusted library allocation
page read and write
1C966FA0000
trusted library allocation
page read and write
5A90000
trusted library allocation
page read and write
FB4000
heap
page read and write
3EAE000
stack
page read and write
B44000
heap
page read and write
470000
unkown
page execute and write copy
48B1000
heap
page read and write
1C96A8F6000
trusted library allocation
page read and write
48B1000
heap
page read and write
1C966F8B000
trusted library allocation
page read and write
4C80000
direct allocation
page read and write
1C96F5CE000
trusted library allocation
page read and write
6B4000
unkown
page execute and write copy
5D7E000
trusted library allocation
page read and write
4AFF000
stack
page read and write
1805C6A0000
heap
page read and write
1C967FF5000
trusted library allocation
page read and write
1C96F032000
trusted library allocation
page read and write
447E000
stack
page read and write
5C9000
unkown
page execute and write copy
59C8000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C966FD6000
trusted library allocation
page read and write
4F10000
direct allocation
page execute and read and write
445000
unkown
page execute and read and write
48B1000
heap
page read and write
1C967003000
trusted library allocation
page read and write
1C9640CD000
trusted library allocation
page read and write
FB4000
heap
page read and write
48B0000
direct allocation
page read and write
1054000
heap
page read and write
4580000
direct allocation
page read and write
373F000
stack
page read and write
F74000
heap
page read and write
1C964762000
trusted library allocation
page read and write
1C96FCBA000
trusted library allocation
page read and write
30DFD661000
trusted library allocation
page execute read
1C966FA7000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
1190000
direct allocation
page execute and read and write
FB4000
heap
page read and write
59E9000
trusted library allocation
page read and write
989000
unkown
page execute and write copy
FC7000
heap
page read and write
5E2F000
trusted library allocation
page read and write
3B0E000
stack
page read and write
8BE000
stack
page read and write
5A91000
trusted library allocation
page read and write
1C96843E000
trusted library allocation
page read and write
36BE000
stack
page read and write
1C966F86000
trusted library allocation
page read and write
1C967FB9000
trusted library allocation
page read and write
1C95FF6A000
heap
page read and write
59C7000
trusted library allocation
page read and write
1C967677000
trusted library allocation
page read and write
1C967607000
trusted library allocation
page read and write
1C96F43A000
trusted library allocation
page read and write
5986000
trusted library allocation
page read and write
34BF000
stack
page read and write
1C967A50000
trusted library section
page read and write
55A000
unkown
page execute and read and write
1C9686CA000
trusted library allocation
page read and write
B44000
heap
page read and write
B44000
heap
page read and write
1C9693FE000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
1C96FC00000
trusted library allocation
page read and write
1C966E6C000
trusted library allocation
page read and write
FB4000
heap
page read and write
F74000
heap
page read and write
1805CB47000
trusted library allocation
page read and write
4370000
trusted library allocation
page read and write
B16000
unkown
page execute and write copy
30DFD6B1000
trusted library allocation
page execute read
B44000
heap
page read and write
20351228000
heap
page read and write
2DB0000
trusted library allocation
page read and write
59CF000
trusted library allocation
page read and write
F74000
heap
page read and write
B44000
heap
page read and write
15C4000
heap
page read and write
59E1000
trusted library allocation
page read and write
B44000
heap
page read and write
1C96F1D6000
trusted library allocation
page read and write
1C967900000
trusted library allocation
page read and write
1C962F76000
trusted library allocation
page read and write
E00000
heap
page read and write
F74000
heap
page read and write
2860000
heap
page read and write
3BA908E000
stack
page read and write
48B1000
heap
page read and write
1C96F4FA000
trusted library allocation
page read and write
1C96F124000
trusted library allocation
page read and write
B44000
heap
page read and write
15C4000
heap
page read and write
5A81000
trusted library allocation
page read and write
5A91000
trusted library allocation
page read and write
1C9683D9000
trusted library allocation
page read and write
1C968447000
trusted library allocation
page read and write
1AE8E000
stack
page read and write
BF4000
heap
page read and write
11B4000
heap
page read and write
5E20000
trusted library allocation
page read and write
FB5000
heap
page read and write
1C96A60B000
trusted library allocation
page read and write
1C967FDF000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
1805C716000
heap
page read and write
1C95FF40000
heap
page read and write
FF0000
direct allocation
page read and write
1C969460000
trusted library allocation
page read and write
5AB9000
trusted library allocation
page read and write
1C964303000
trusted library allocation
page read and write
467E000
stack
page read and write
1360000
direct allocation
page read and write
3BAEA3B000
stack
page read and write
3BB1AFB000
stack
page read and write
BE0000
direct allocation
page read and write
1C965100000
trusted library allocation
page read and write
D10000
heap
page read and write
1C96A6EA000
trusted library allocation
page read and write
1C962BEC000
trusted library allocation
page read and write
1C9689AB000
trusted library allocation
page read and write
1C967030000
trusted library allocation
page read and write
1C968800000
trusted library allocation
page read and write
5A05000
trusted library allocation
page read and write
1C96F3DE000
trusted library allocation
page read and write
1C96F516000
trusted library allocation
page read and write
59BE000
trusted library allocation
page read and write
1C967677000
trusted library allocation
page read and write
48E0000
direct allocation
page execute and read and write
5AC9000
trusted library allocation
page read and write
9F0000
heap
page read and write
1C96FCBA000
trusted library allocation
page read and write
4B90000
direct allocation
page execute and read and write
1C968648000
trusted library allocation
page read and write
1C9686CE000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
4F80000
direct allocation
page execute and read and write
5CD7000
trusted library allocation
page read and write
F74000
heap
page read and write
316F000
stack
page read and write
1C9670C4000
trusted library allocation
page read and write
1C968621000
trusted library allocation
page read and write
FB4000
heap
page read and write
1054000
heap
page read and write
11B4000
heap
page read and write
204F093F000
heap
page read and write
1C96520A000
trusted library allocation
page read and write
59C7000
trusted library allocation
page read and write
2DEE000
stack
page read and write
5EDA000
trusted library allocation
page read and write
F74000
heap
page read and write
5490000
direct allocation
page execute and read and write
940000
direct allocation
page read and write
619000
unkown
page execute and write copy
1C966FA7000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C967F96000
trusted library allocation
page read and write
59AB000
trusted library allocation
page read and write
50000
unkown
page readonly
1C96762C000
trusted library allocation
page read and write
1C96799B000
trusted library allocation
page read and write
115D000
heap
page read and write
C25000
heap
page read and write
5CA1000
trusted library allocation
page read and write
626000
unkown
page execute and read and write
39AE000
stack
page read and write
1C96FCBA000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
74C000
stack
page read and write
43CE000
stack
page read and write
FB4000
heap
page read and write
1C96843E000
trusted library allocation
page read and write
659000
unkown
page execute and read and write
1054000
heap
page read and write
F30000
heap
page read and write
1C96AC64000
trusted library allocation
page read and write
3F7E000
stack
page read and write
1AC7E000
stack
page read and write
1C9670D2000
trusted library allocation
page read and write
1C968CE5000
trusted library allocation
page read and write
6CE000
unkown
page execute and read and write
4BA0000
trusted library allocation
page read and write
1C9647F6000
trusted library allocation
page read and write
1C966F7F000
trusted library allocation
page read and write
FB4000
heap
page read and write
BE0000
direct allocation
page read and write
1C968C7A000
trusted library allocation
page read and write
1C95FF64000
heap
page read and write
4861000
heap
page read and write
59A4000
trusted library allocation
page read and write
A6F000
unkown
page execute and write copy
1C968983000
trusted library allocation
page read and write
4861000
heap
page read and write
53A1000
direct allocation
page read and write
1C96F432000
trusted library allocation
page read and write
1C96F3E2000
trusted library allocation
page read and write
1C9647F6000
trusted library allocation
page read and write
C34000
heap
page read and write
1C96F0A3000
trusted library allocation
page read and write
1C96F0CE000
trusted library allocation
page read and write
1C96894B000
trusted library allocation
page read and write
1C96AC99000
trusted library allocation
page read and write
1254000
heap
page read and write
1C965721000
trusted library allocation
page read and write
1C963395000
trusted library allocation
page read and write
FB4000
heap
page read and write
984000
heap
page read and write
4B7E000
stack
page read and write
1C95FF62000
heap
page read and write
5E2E000
trusted library allocation
page read and write
FB4000
heap
page read and write
11B4000
heap
page read and write
4861000
heap
page read and write
1C96F3C9000
trusted library allocation
page read and write
1C968453000
trusted library allocation
page read and write
3A6E000
stack
page read and write
608E000
trusted library allocation
page read and write
B44000
heap
page read and write
15C0000
heap
page read and write
204F0949000
heap
page read and write
1C962998000
trusted library allocation
page read and write
1024000
heap
page read and write
FB4000
heap
page read and write
112A000
heap
page read and write
3ECE000
stack
page read and write
2543E6E000
stack
page read and write
4850000
direct allocation
page execute and read and write
1C967DC7000
trusted library allocation
page read and write
59E9000
trusted library allocation
page read and write
59E1000
trusted library allocation
page read and write
1C96ACE5000
trusted library allocation
page read and write
490F000
stack
page read and write
1054000
heap
page read and write
C34000
heap
page read and write
F74000
heap
page read and write
F80000
unkown
page read and write
1C96ACED000
trusted library allocation
page read and write
204F0F67000
heap
page read and write
4591000
heap
page read and write
4861000
heap
page read and write
15C4000
heap
page read and write
1C967D9B000
trusted library allocation
page read and write
15C4000
heap
page read and write
3ABF000
stack
page read and write
1C96F23C000
trusted library allocation
page read and write
1210000
heap
page read and write
59C1000
trusted library allocation
page read and write
1C9689ED000
trusted library allocation
page read and write
4591000
heap
page read and write
4E90000
direct allocation
page execute and read and write
204F0223000
trusted library allocation
page read and write
ADE000
heap
page read and write
1193000
heap
page read and write
262F000
stack
page read and write
1250000
heap
page read and write
49D0000
direct allocation
page read and write
3B7F000
stack
page read and write
FB4000
heap
page read and write
48B0000
direct allocation
page read and write
1024000
heap
page read and write
DFE000
stack
page read and write
734000
heap
page read and write
1C9683CF000
trusted library allocation
page read and write
D30000
unkown
page execute and write copy
338E000
stack
page read and write
FB4000
heap
page read and write
31BE000
stack
page read and write
BE4000
heap
page read and write
D30000
heap
page read and write
119B000
heap
page read and write
1C967664000
trusted library allocation
page read and write
5991000
trusted library allocation
page read and write
1C96F3B4000
trusted library allocation
page read and write
11B4000
heap
page read and write
5AA1000
trusted library allocation
page read and write
59BC000
trusted library allocation
page read and write
F74000
heap
page read and write
1C96576A000
trusted library allocation
page read and write
1C967633000
trusted library allocation
page read and write
1C96936B000
trusted library allocation
page read and write
4CF0000
direct allocation
page execute and read and write
1805C702000
unclassified section
page read and write
1C96AB78000
trusted library allocation
page read and write
1C963386000
trusted library allocation
page read and write
1C968331000
trusted library allocation
page read and write
1C964243000
trusted library allocation
page read and write
FB4000
heap
page read and write
A1E000
heap
page read and write
59AD000
trusted library allocation
page read and write
37E000
unkown
page readonly
1C9670FC000
trusted library allocation
page read and write
4861000
heap
page read and write
984000
heap
page read and write
1C96A9DF000
trusted library allocation
page read and write
1054000
heap
page read and write
FB5000
heap
page read and write
1C96A958000
trusted library allocation
page read and write
1C96767B000
trusted library allocation
page read and write
5D71000
trusted library allocation
page read and write
1C967D00000
trusted library allocation
page read and write
FB4000
heap
page read and write
FB4000
heap
page read and write
1C967DDF000
trusted library allocation
page read and write
126E000
heap
page read and write
5F8E000
stack
page read and write
1C9642A1000
trusted library allocation
page read and write
5C1000
unkown
page execute and write copy
118D000
heap
page read and write
2034F66F000
heap
page read and write
1A4000
heap
page read and write
204F026F000
trusted library allocation
page read and write
59D4000
trusted library allocation
page read and write
1C969436000
trusted library allocation
page read and write
1D17F000
stack
page read and write
1C96F258000
trusted library allocation
page read and write
59BC000
trusted library allocation
page read and write
3F6E000
stack
page read and write
1C95FF64000
heap
page read and write
1196000
heap
page read and write
13E4000
heap
page read and write
804C000
stack
page read and write
2DB0000
trusted library allocation
page read and write
1C96763A000
trusted library allocation
page read and write
5DB9000
trusted library allocation
page read and write
FB4000
heap
page read and write
4C11000
direct allocation
page read and write
69C000
unkown
page execute and write copy
59FE000
trusted library allocation
page read and write
1C966F8B000
trusted library allocation
page read and write
204F03F0000
heap
page read and write
1C969000000
trusted library allocation
page read and write
CC3000
unkown
page execute and write copy
59E5000
trusted library allocation
page read and write
2B60000
direct allocation
page read and write
1C966ED6000
trusted library allocation
page read and write
4591000
heap
page read and write
1C96F71C000
trusted library allocation
page read and write
4591000
heap
page read and write
404F000
stack
page read and write
599B000
trusted library allocation
page read and write
59B1000
trusted library allocation
page read and write
1204000
heap
page read and write
1C96868D000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
1C967E16000
trusted library allocation
page read and write
1B430000
heap
page read and write
1C9682F0000
trusted library allocation
page read and write
35EE000
stack
page read and write
86E000
stack
page read and write
1C9689DD000
trusted library allocation
page read and write
BF4000
heap
page read and write
59F8000
trusted library allocation
page read and write
1C96872B000
trusted library allocation
page read and write
5DCF000
trusted library allocation
page read and write
407F000
stack
page read and write
1C966FA7000
trusted library allocation
page read and write
E94000
heap
page read and write
1C9642AA000
trusted library allocation
page read and write
1C9686E3000
trusted library allocation
page read and write
1C968425000
trusted library allocation
page read and write
1C9670A4000
trusted library allocation
page read and write
4780000
direct allocation
page read and write
D08000
unkown
page execute and read and write
1C95FF62000
heap
page read and write
1805C590000
heap
page read and write
59D8000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
5F0F000
trusted library allocation
page read and write
1C96965D000
trusted library allocation
page read and write
4591000
heap
page read and write
5A29000
trusted library allocation
page read and write
48B1000
heap
page read and write
2F3E000
stack
page read and write
50000
unkown
page readonly
B44000
heap
page read and write
1C95FF62000
heap
page read and write
4580000
direct allocation
page read and write
49D0000
direct allocation
page read and write
1C956F50000
heap
page read and write
3BA9361000
stack
page read and write
1C968634000
trusted library allocation
page read and write
533D000
trusted library allocation
page read and write
173E000
heap
page read and write
2F2E000
stack
page read and write
59D8000
trusted library allocation
page read and write
447E000
stack
page read and write
59E6000
trusted library allocation
page read and write
4EA1000
heap
page read and write
4D40000
direct allocation
page execute and read and write
5A09000
trusted library allocation
page read and write
13DC000
heap
page read and write
E94000
heap
page read and write
3AAF000
stack
page read and write
1C95FF6A000
heap
page read and write
4591000
heap
page read and write
59EB000
trusted library allocation
page read and write
1C971703000
trusted library allocation
page read and write
476D000
stack
page read and write
426000
unkown
page execute and write copy
1AC20000
heap
page read and write
6BA000
unkown
page execute and read and write
34D000
unkown
page execute and read and write
1C969585000
trusted library allocation
page read and write
6F6E000
stack
page read and write
2D8F000
stack
page read and write
1C96958B000
trusted library allocation
page read and write
356E000
stack
page read and write
C34000
heap
page read and write
9A0000
heap
page read and write
657000
unkown
page execute and write copy
1C96F4D1000
trusted library allocation
page read and write
11AA000
heap
page read and write
BF4000
heap
page read and write
59FA000
trusted library allocation
page read and write
341000
unkown
page execute and read and write
3C4E000
stack
page read and write
1C9693F5000
trusted library allocation
page read and write
427E000
stack
page read and write
1C957355000
heap
page read and write
B44000
heap
page read and write
364F000
stack
page read and write
FB4000
heap
page read and write
4591000
heap
page read and write
5AC6000
trusted library allocation
page read and write
1C96F3A0000
trusted library allocation
page read and write
E94000
heap
page read and write
48B1000
heap
page read and write
1C9672B0000
trusted library allocation
page read and write
4861000
heap
page read and write
1C96F43E000
trusted library allocation
page read and write
1C96F1F0000
trusted library allocation
page read and write
5E24000
trusted library allocation
page read and write
1C968922000
trusted library allocation
page read and write
630F000
stack
page read and write
4A10000
direct allocation
page read and write
FB4000
heap
page read and write
C92000
unkown
page execute and write copy
1C9696EE000
trusted library allocation
page read and write
1C967D30000
trusted library allocation
page read and write
59BC000
trusted library allocation
page read and write
647000
unkown
page execute and read and write
119C000
heap
page read and write
4271000
heap
page read and write
5E26000
trusted library allocation
page read and write
204F02C7000
trusted library allocation
page read and write
59E9000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
D20000
heap
page read and write
5E2E000
trusted library allocation
page read and write
1C9670B3000
trusted library allocation
page read and write
1C9686C4000
trusted library allocation
page read and write
28BF000
stack
page read and write
DA4000
unkown
page execute and write copy
FB4000
heap
page read and write
1C968714000
trusted library allocation
page read and write
301F000
stack
page read and write
1C966E80000
trusted library allocation
page read and write
FB4000
heap
page read and write
11A0000
direct allocation
page execute and read and write
5D37000
trusted library allocation
page read and write
5CA6000
trusted library allocation
page read and write
2960000
direct allocation
page read and write
1C963FF0000
trusted library allocation
page read and write
1C9572FE000
trusted library allocation
page read and write
4890000
trusted library allocation
page read and write
1C96763A000
trusted library allocation
page read and write
1A079FF000
stack
page read and write
15C4000
heap
page read and write
204F09C0000
heap
page read and write
1C96F595000
trusted library allocation
page read and write
2DCF000
stack
page read and write
1C96A96B000
trusted library allocation
page read and write
C34000
heap
page read and write
1C9647FE000
trusted library allocation
page read and write
1C967232000
trusted library allocation
page read and write
3170000
direct allocation
page read and write
59C8000
trusted library allocation
page read and write
1C968B9F000
trusted library allocation
page read and write
59CB000
trusted library allocation
page read and write
FB4000
heap
page read and write
2E2F000
stack
page read and write
5E2B000
trusted library allocation
page read and write
1C967677000
trusted library allocation
page read and write
1C963403000
trusted library allocation
page read and write
1C96F500000
trusted library allocation
page read and write
FB4000
heap
page read and write
5A81000
trusted library allocation
page read and write
143E000
stack
page read and write
1C96F4E4000
trusted library allocation
page read and write
1C96C00E000
trusted library allocation
page read and write
4FE0000
direct allocation
page read and write
43BE000
stack
page read and write
11FF000
heap
page read and write
FB4000
heap
page read and write
430E000
stack
page read and write
1C9693BA000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
8D0000
unkown
page execute and write copy
204F09D1000
heap
page read and write
1C968918000
trusted library allocation
page read and write
984000
heap
page read and write
5E26000
trusted library allocation
page read and write
5A81000
trusted library allocation
page read and write
611000
unkown
page execute and read and write
B44000
heap
page read and write
E94000
heap
page read and write
1C968658000
trusted library allocation
page read and write
1C9642DC000
trusted library allocation
page read and write
1C9684AE000
trusted library allocation
page read and write
1C96A9E5000
trusted library allocation
page read and write
1054000
heap
page read and write
39DF000
stack
page read and write
44CF000
stack
page read and write
48B1000
heap
page read and write
B44000
heap
page read and write
FB4000
heap
page read and write
59E9000
trusted library allocation
page read and write
5F6E000
trusted library allocation
page read and write
B44000
heap
page read and write
59A4000
trusted library allocation
page read and write
FB5000
heap
page read and write
4B77000
trusted library allocation
page execute and read and write
1A4000
heap
page read and write
1C966F40000
trusted library allocation
page read and write
1C9688BA000
trusted library allocation
page read and write
FB4000
heap
page read and write
2C7F000
stack
page read and write
59E9000
trusted library allocation
page read and write
2C6F000
stack
page read and write
552000
unkown
page execute and read and write
5FC7000
trusted library allocation
page read and write
1C96863C000
trusted library allocation
page read and write
3C0F000
stack
page read and write
49BF000
stack
page read and write
5E2C000
trusted library allocation
page read and write
5F6A000
trusted library allocation
page read and write
1C957247000
trusted library allocation
page read and write
1C96F700000
trusted library allocation
page read and write
1C9642C7000
trusted library allocation
page read and write
B44000
heap
page read and write
1C96F4F2000
trusted library allocation
page read and write
5ECB000
trusted library allocation
page read and write
1330000
direct allocation
page read and write
1C96FCC1000
trusted library allocation
page read and write
4FF0000
direct allocation
page execute and read and write
52E000
unkown
page execute and read and write
5C86000
trusted library allocation
page read and write
1C9634C0000
trusted library allocation
page read and write
4FD0000
direct allocation
page execute and read and write
D93000
unkown
page execute and write copy
1054000
heap
page read and write
1C968C52000
trusted library allocation
page read and write
1805CBB9000
trusted library allocation
page read and write
5D3000
unkown
page execute and write copy
1C96889A000
trusted library allocation
page read and write
5A1D000
trusted library allocation
page read and write
673000
unkown
page execute and write copy
FB4000
heap
page read and write
3E2E000
stack
page read and write
1C96A9B4000
trusted library allocation
page read and write
1C96939A000
trusted library allocation
page read and write
1C968661000
trusted library allocation
page read and write
39C1000
heap
page read and write
1C96A9E8000
trusted library allocation
page read and write
1C964400000
trusted library section
page read and write
1C96574E000
trusted library allocation
page read and write
204F0940000
heap
page read and write
1C9717E0000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
318E000
stack
page read and write
1C9717E4000
trusted library allocation
page read and write
984000
heap
page read and write
11F4000
heap
page read and write
8690000
trusted library allocation
page read and write
2F77000
heap
page read and write
204F0052000
unclassified section
page read and write
FB4000
heap
page read and write
1C968A13000
trusted library allocation
page read and write
734000
heap
page read and write
1C968645000
trusted library allocation
page read and write
1C966E6C000
trusted library allocation
page read and write
6A1000
unkown
page execute and read and write
47B000
unkown
page execute and read and write
C34000
heap
page read and write
B44000
heap
page read and write
1C95FF70000
heap
page read and write
2960000
direct allocation
page read and write
1C9693C6000
trusted library allocation
page read and write
1C96895D000
trusted library allocation
page read and write
5030000
direct allocation
page execute and read and write
3FFE000
stack
page read and write
1C96F585000
trusted library allocation
page read and write
1C968F81000
trusted library allocation
page read and write
1C9689DA000
trusted library allocation
page read and write
77A000
unkown
page execute and read and write
352F000
stack
page read and write
4FCE000
stack
page read and write
3BB1CFD000
unkown
page read and write
569000
unkown
page execute and write copy
5A04000
trusted library allocation
page read and write
5E2E000
trusted library allocation
page read and write
1C9629DF000
trusted library allocation
page read and write
1C96F468000
trusted library allocation
page read and write
5E2C000
trusted library allocation
page read and write
1C967DB8000
trusted library allocation
page read and write
1C9696CB000
trusted library allocation
page read and write
4D10000
direct allocation
page execute and read and write
4911000
heap
page read and write
3D6E000
stack
page read and write
C34000
heap
page read and write
306E000
stack
page read and write
1C96863A000
trusted library allocation
page read and write
3BBE000
stack
page read and write
15C4000
heap
page read and write
7E18000
heap
page read and write
456F000
stack
page read and write
FB4000
heap
page read and write
1C96847B000
trusted library allocation
page read and write
1C9647BC000
trusted library allocation
page read and write
7F4C000
stack
page read and write
1C967103000
trusted library allocation
page read and write
1C96F30C000
trusted library allocation
page read and write
1C96AC14000
trusted library allocation
page read and write
1C96861D000
trusted library allocation
page read and write
1AE3F000
stack
page read and write
1C96943F000
trusted library allocation
page read and write
1C96AC74000
trusted library allocation
page read and write
48B1000
heap
page read and write
FB4000
heap
page read and write
5DFD000
trusted library allocation
page read and write
4E00000
remote allocation
page read and write
1C96839D000
trusted library allocation
page read and write
1C95FF6A000
heap
page read and write
FB4000
heap
page read and write
1C9670F1000
trusted library allocation
page read and write
204F0F58000
heap
page read and write
59AB000
trusted library allocation
page read and write
F74000
heap
page read and write
1C9641E9000
trusted library allocation
page read and write
1C9683F1000
trusted library allocation
page read and write
B06000
unkown
page write copy
6078000
trusted library allocation
page read and write
1C967DD3000
trusted library allocation
page read and write
47CF000
stack
page read and write
1C95FF70000
heap
page read and write
1C96894B000
trusted library allocation
page read and write
1C95FF62000
heap
page read and write
1C967A60000
trusted library section
page read and write
1C963F44000
trusted library allocation
page read and write
5D47000
trusted library allocation
page read and write
59E8000
trusted library allocation
page read and write
984000
heap
page read and write
5A91000
trusted library allocation
page read and write
1B3FE000
stack
page read and write
BF4000
heap
page read and write
F74000
heap
page read and write
340E000
stack
page read and write
59BC000
trusted library allocation
page read and write
F74000
heap
page read and write
B44000
heap
page read and write
59AC000
trusted library allocation
page read and write
4591000
heap
page read and write
B44000
heap
page read and write
59D9000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
119B000
heap
page read and write
1C967094000
trusted library allocation
page read and write
13E4000
heap
page read and write
1C96A9E8000
trusted library allocation
page read and write
5E2E000
trusted library allocation
page read and write
48B1000
heap
page read and write
5981000
trusted library allocation
page read and write
2546A3E000
stack
page read and write
1C966925000
trusted library allocation
page read and write
1C9642F6000
trusted library allocation
page read and write
1C971677000
trusted library allocation
page read and write
4731000
heap
page read and write
59C8000
trusted library allocation
page read and write
7565B6E000
stack
page read and write
1805C56F000
remote allocation
page execute read
602000
unkown
page execute and read and write
1C9670E0000
trusted library allocation
page read and write
15A0000
heap
page read and write
4861000
heap
page read and write
1C966E63000
trusted library allocation
page read and write
48B1000
heap
page read and write
389F000
stack
page read and write
5EEA000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C96A9CA000
trusted library allocation
page read and write
5A91000
trusted library allocation
page read and write
1C96347B000
trusted library allocation
page read and write
FB4000
heap
page read and write
4591000
heap
page read and write
F1F000
unkown
page execute and write copy
1186000
heap
page read and write
204EFFC0000
heap
page read and write
4E10000
trusted library allocation
page read and write
5A05000
trusted library allocation
page read and write
1C9696DB000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
1C96F3E2000
trusted library allocation
page read and write
1054000
heap
page read and write
114E000
stack
page read and write
1C962FFE000
trusted library allocation
page read and write
719000
unkown
page execute and write copy
1C958BDA000
heap
page read and write
5AAF000
trusted library allocation
page read and write
FB4000
heap
page read and write
525F000
stack
page read and write
1C95FF70000
heap
page read and write
1C964969000
trusted library allocation
page read and write
5A99000
trusted library allocation
page read and write
128B000
heap
page read and write
1199000
heap
page read and write
70F000
unkown
page execute and write copy
1C968388000
trusted library allocation
page read and write
48B1000
heap
page read and write
2DB0000
trusted library allocation
page read and write
25461FE000
unkown
page readonly
52F0000
direct allocation
page execute and read and write
11F3000
heap
page read and write
FB4000
heap
page read and write
1AA8E000
stack
page read and write
1C96F251000
trusted library allocation
page read and write
116A000
unkown
page execute and read and write
3DCF000
stack
page read and write
1C967933000
trusted library allocation
page read and write
10B0000
direct allocation
page read and write
5ED8000
trusted library allocation
page read and write
3BAC03F000
stack
page read and write
48B1000
heap
page read and write
4EBF000
stack
page read and write
A12000
unkown
page readonly
1C95FF70000
heap
page read and write
52A0000
direct allocation
page execute and read and write
1C967DEA000
trusted library allocation
page read and write
204F0F79000
heap
page read and write
673F000
heap
page read and write
29E0000
heap
page read and write
598E000
trusted library allocation
page read and write
5AAA000
trusted library allocation
page read and write
4FE0000
direct allocation
page read and write
10F0000
direct allocation
page read and write
1C95FF6A000
heap
page read and write
5480000
direct allocation
page execute and read and write
1C9670E0000
trusted library allocation
page read and write
B40000
heap
page read and write
1C967D32000
trusted library allocation
page read and write
372000
unkown
page execute and read and write
1C968FFA000
trusted library allocation
page read and write
1C96A9CF000
trusted library allocation
page read and write
B44000
heap
page read and write
360000
unkown
page readonly
1C964E0B000
trusted library allocation
page read and write
49E1000
heap
page read and write
10F7000
heap
page read and write
48C1000
heap
page read and write
1C95FF64000
heap
page read and write
393E000
stack
page read and write
1C96896B000
trusted library allocation
page read and write
5CA9000
trusted library allocation
page read and write
1C967FBF000
trusted library allocation
page read and write
1CF0E000
stack
page read and write
1C96725D000
trusted library allocation
page read and write
59B7000
trusted library allocation
page read and write
3BA8F7C000
stack
page read and write
1C971789000
trusted library allocation
page read and write
FB4000
heap
page read and write
48B0000
direct allocation
page read and write
1A4000
heap
page read and write
346F000
stack
page read and write
AF5000
stack
page read and write
7567E3E000
unkown
page readonly
126F000
stack
page read and write
1C967400000
trusted library allocation
page read and write
1C968A23000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
1C964762000
trusted library allocation
page read and write
1C968FAB000
trusted library allocation
page read and write
1C968661000
trusted library allocation
page read and write
254623E000
unkown
page readonly
5AAF000
trusted library allocation
page read and write
397F000
stack
page read and write
F74000
heap
page read and write
5AA1000
trusted library allocation
page read and write
31AE000
stack
page read and write
FB4000
heap
page read and write
984000
heap
page read and write
FB4000
heap
page read and write
1C9689A9000
trusted library allocation
page read and write
2CC0000
heap
page read and write
4850000
direct allocation
page execute and read and write
1C9647DA000
trusted library allocation
page read and write
3BB374E000
stack
page read and write
115E000
heap
page read and write
6710000
heap
page read and write
1C966E73000
trusted library allocation
page read and write
4591000
heap
page read and write
4C2E000
trusted library allocation
page read and write
1C968396000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
5AA7000
trusted library allocation
page read and write
1110000
heap
page read and write
1C96F3BB000
trusted library allocation
page read and write
984000
heap
page read and write
FB4000
heap
page read and write
10A0000
heap
page read and write
1C9693FB000
trusted library allocation
page read and write
59AB000
trusted library allocation
page read and write
48B1000
heap
page read and write
59BA000
trusted library allocation
page read and write
B44000
heap
page read and write
CEA000
unkown
page execute and read and write
11F4000
heap
page read and write
480E000
stack
page read and write
1C968C93000
trusted library allocation
page read and write
1C9670B3000
trusted library allocation
page read and write
204F095D000
heap
page read and write
1C964B08000
trusted library allocation
page read and write
1C96429D000
trusted library allocation
page read and write
2960000
direct allocation
page read and write
1C95FF64000
heap
page read and write
E94000
heap
page read and write
11F4000
heap
page read and write
3DFF000
stack
page read and write
1A4000
heap
page read and write
1C968F51000
trusted library allocation
page read and write
B44000
heap
page read and write
1C96899D000
trusted library allocation
page read and write
48B1000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
488F000
stack
page read and write
5CA6000
trusted library allocation
page read and write
119E000
heap
page read and write
1C967D9B000
trusted library allocation
page read and write
13E4000
heap
page read and write
1C968C45000
trusted library allocation
page read and write
6FF000
unkown
page execute and write copy
1C96404F000
trusted library allocation
page read and write
1C9689DA000
trusted library allocation
page read and write
4C80000
direct allocation
page read and write
5EC8000
trusted library allocation
page read and write
1C968A1B000
trusted library allocation
page read and write
1C95FF64000
heap
page read and write
5C0000
unkown
page read and write
5BC000
unkown
page readonly
1C96869C000
trusted library allocation
page read and write
4BA0000
direct allocation
page execute and read and write
366F000
stack
page read and write
204F09C8000
heap
page read and write
1C967DEA000
trusted library allocation
page read and write
B44000
heap
page read and write
C34000
heap
page read and write
1C96948A000
trusted library allocation
page read and write
FB4000
heap
page read and write
59CC000
trusted library allocation
page read and write
3A3F000
stack
page read and write
1C96891F000
trusted library allocation
page read and write
1C96A9CF000
trusted library allocation
page read and write
1C967921000
trusted library allocation
page read and write
1C962BF7000
trusted library allocation
page read and write
3BA916B000
stack
page read and write
4911000
heap
page read and write
1C95FF30000
heap
page read and write
40AE000
stack
page read and write
7E12000
heap
page read and write
204F00F0000
trusted library allocation
page read and write
5A91000
trusted library allocation
page read and write
1C96A97C000
trusted library allocation
page read and write
204F0F2A000
heap
page read and write
4591000
heap
page read and write
9EE000
stack
page read and write
4591000
heap
page read and write
1C968462000
trusted library allocation
page read and write
5CA2000
trusted library allocation
page read and write
5A91000
trusted library allocation
page read and write
1C968DD4000
trusted library allocation
page read and write
BF4000
heap
page read and write
1C96764B000
trusted library allocation
page read and write
607C000
trusted library allocation
page read and write
1C966E49000
trusted library allocation
page read and write
1C966ED2000
trusted library allocation
page read and write
1C9672F5000
trusted library allocation
page read and write
1C96891A000
trusted library allocation
page read and write
118D000
heap
page read and write
59D9000
trusted library allocation
page read and write
8D0000
unkown
page execute and write copy
1C9684B5000
trusted library allocation
page read and write
1C967557000
trusted library allocation
page read and write
1C9679E9000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
1C964F09000
trusted library allocation
page read and write
59C4000
trusted library allocation
page read and write
1C968A7A000
trusted library allocation
page read and write
204F03F6000
heap
page read and write
4B90000
heap
page read and write
1C9689AB000
trusted library allocation
page read and write
BF4000
heap
page read and write
1C968922000
trusted library allocation
page read and write
1C9640C6000
trusted library allocation
page read and write
FB4000
heap
page read and write
3BB19BB000
stack
page read and write
2580000
direct allocation
page read and write
1204000
heap
page read and write
B44000
heap
page read and write
1C966E47000
trusted library allocation
page read and write
1C967679000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
2D2E000
stack
page read and write
A00000
direct allocation
page read and write
1C96F463000
trusted library allocation
page read and write
5A9F000
trusted library allocation
page read and write
1C966E9B000
trusted library allocation
page read and write
1C968996000
trusted library allocation
page read and write
4D7F000
stack
page read and write
48B1000
heap
page read and write
70AE000
stack
page read and write
3C7E000
stack
page read and write
1C96F462000
trusted library allocation
page read and write
111E000
stack
page read and write
1020000
heap
page read and write
1C968C54000
trusted library allocation
page read and write
132000
unkown
page execute and read and write
1C95FF64000
heap
page read and write
1C971600000
trusted library allocation
page read and write
1C96A97A000
trusted library allocation
page read and write
5994000
trusted library allocation
page read and write
2035123B000
heap
page read and write
59BC000
trusted library allocation
page read and write
59E9000
trusted library allocation
page read and write
49D0000
direct allocation
page read and write
11B4000
heap
page read and write
1C95FF6A000
heap
page read and write
59BD000
trusted library allocation
page read and write
30DFD651000
trusted library allocation
page execute read
15C4000
heap
page read and write
1C967BF0000
trusted library section
page readonly
444E000
stack
page read and write
FB4000
heap
page read and write
204F0F77000
heap
page read and write
4591000
heap
page read and write
1C967801000
trusted library allocation
page read and write
521000
unkown
page execute and read and write
1C9676F5000
trusted library allocation
page read and write
4C80000
direct allocation
page read and write
1C967559000
trusted library allocation
page read and write
B44000
heap
page read and write
4E00000
remote allocation
page read and write
1C9633C4000
trusted library allocation
page read and write
AD0000
heap
page read and write
1C968918000
trusted library allocation
page read and write
48B1000
heap
page read and write
1C96F1D3000
trusted library allocation
page read and write
3FCF000
stack
page read and write
5998000
trusted library allocation
page read and write
1C968120000
trusted library allocation
page read and write
204F0E09000
trusted library allocation
page read and write
12C7000
heap
page read and write
591000
unkown
page execute and write copy
4A71000
heap
page read and write
5A1C000
trusted library allocation
page read and write
1C9717D0000
trusted library allocation
page read and write
5F8B000
trusted library allocation
page read and write
A4E000
heap
page read and write
1C967771000
trusted library allocation
page read and write
1C967675000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
204F0F00000
heap
page read and write
1C96F1FD000
trusted library allocation
page read and write
5ED7000
trusted library allocation
page read and write
3C8F000
stack
page read and write
FB4000
heap
page read and write
4861000
heap
page read and write
47BE000
stack
page read and write
F74000
heap
page read and write
FB5000
heap
page read and write
15B0000
direct allocation
page read and write
3BB1A3E000
stack
page read and write
1C96A9CA000
trusted library allocation
page read and write
1C96F007000
trusted library allocation
page read and write
8D1000
unkown
page execute and write copy
1C9682FB000
trusted library allocation
page read and write
1C968AE0000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
1C96FC65000
trusted library allocation
page read and write
37BF000
stack
page read and write
1C967DC7000
trusted library allocation
page read and write
38EF000
stack
page read and write
1C96C00C000
trusted library allocation
page read and write
4591000
heap
page read and write
D8B000
unkown
page execute and read and write
1C96F3CE000
trusted library allocation
page read and write
3FEE000
stack
page read and write
5B79000
trusted library allocation
page read and write
1C958BC8000
heap
page read and write
1C966F7D000
trusted library allocation
page read and write
1C968723000
trusted library allocation
page read and write
984000
heap
page read and write
5D95000
trusted library allocation
page read and write
1C96898B000
trusted library allocation
page read and write
48B1000
heap
page read and write
FB4000
heap
page read and write
1230000
heap
page read and write
5A99000
trusted library allocation
page read and write
4C80000
direct allocation
page read and write
1C971789000
trusted library allocation
page read and write
B44000
heap
page read and write
A75000
heap
page read and write
1C96F300000
trusted library allocation
page read and write
1C9630F6000
trusted library allocation
page read and write
59C9000
trusted library allocation
page read and write
1C9717CD000
trusted library allocation
page read and write
4591000
heap
page read and write
1C964986000
trusted library allocation
page read and write
FB4000
heap
page read and write
FB4000
heap
page read and write
1C96936B000
trusted library allocation
page read and write
4B80000
direct allocation
page execute and read and write
59D8000
trusted library allocation
page read and write
5300000
direct allocation
page execute and read and write
2034F671000
heap
page read and write
12BC000
heap
page read and write
1C96896B000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
1A4000
heap
page read and write
1C962BB9000
trusted library allocation
page read and write
1040000
direct allocation
page read and write
1C967303000
trusted library allocation
page read and write
5490000
direct allocation
page execute and read and write
1C96899D000
trusted library allocation
page read and write
66F0000
heap
page read and write
1C966E47000
trusted library allocation
page read and write
27F0000
heap
page read and write
1C9630BB000
trusted library allocation
page read and write
443F000
stack
page read and write
FB4000
heap
page read and write
4A00000
heap
page read and write
1C9693E4000
trusted library allocation
page read and write
1054000
heap
page read and write
59D9000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
4900000
direct allocation
page execute and read and write
20351239000
heap
page read and write
12BE000
heap
page read and write
675000
unkown
page execute and read and write
3BA95A8000
stack
page read and write
4C21000
trusted library allocation
page read and write
3BB3C4D000
stack
page read and write
48B0000
direct allocation
page read and write
11B4000
heap
page read and write
410000
unkown
page readonly
1805C4E0000
unclassified section
page readonly
1C962EE2000
unclassified section
page read and write
3BB1B7F000
stack
page read and write
C34000
heap
page read and write
1C96897C000
trusted library allocation
page read and write
5FFF000
trusted library allocation
page read and write
59E8000
trusted library allocation
page read and write
5E0E000
trusted library allocation
page read and write
1C96F750000
trusted library allocation
page read and write
3C3F000
stack
page read and write
B44000
heap
page read and write
5AB9000
trusted library allocation
page read and write
30DFD6E1000
trusted library allocation
page execute read
59BA000
trusted library allocation
page read and write
1C96763A000
trusted library allocation
page read and write
11B4000
heap
page read and write
128B000
heap
page read and write
1187000
heap
page read and write
3CFE000
stack
page read and write
1C9641D0000
trusted library allocation
page read and write
59C7000
trusted library allocation
page read and write
442000
unkown
page read and write
470000
unkown
page readonly
59A2000
trusted library allocation
page read and write
2B60000
direct allocation
page read and write
B44000
heap
page read and write
FB5000
heap
page read and write
4B4D000
stack
page read and write
41AF000
stack
page read and write
348F000
stack
page read and write
984000
heap
page read and write
1C96EE00000
trusted library allocation
page read and write
98A000
unkown
page execute and write copy
4591000
heap
page read and write
12BA000
heap
page read and write
601000
unkown
page execute and write copy
29A000
unkown
page execute and read and write
3B8E000
stack
page read and write
2DB0000
trusted library allocation
page read and write
A6D000
unkown
page execute and read and write
FB4000
heap
page read and write
59A2000
trusted library allocation
page read and write
12CE000
heap
page read and write
1C96890B000
trusted library allocation
page read and write
307F000
stack
page read and write
C34000
heap
page read and write
5A91000
trusted library allocation
page read and write
F74000
heap
page read and write
5A0C000
trusted library allocation
page read and write
59B8000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C964279000
trusted library allocation
page read and write
1C968CB7000
trusted library allocation
page read and write
FB5000
heap
page read and write
5997000
trusted library allocation
page read and write
1C9670A1000
trusted library allocation
page read and write
1C96722B000
trusted library allocation
page read and write
A24000
unkown
page readonly
25472BE000
unkown
page readonly
52A0000
direct allocation
page execute and read and write
59BD000
trusted library allocation
page read and write
59FA000
trusted library allocation
page read and write
FB4000
heap
page read and write
B00000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
1C9670AC000
trusted library allocation
page read and write
1C96495C000
trusted library allocation
page read and write
F2F000
unkown
page execute and write copy
A20000
unkown
page write copy
1C967063000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
1C96F343000
trusted library allocation
page read and write
49D0000
direct allocation
page read and write
1C968623000
trusted library allocation
page read and write
138E000
heap
page read and write
10F0000
direct allocation
page read and write
5A91000
trusted library allocation
page read and write
1C966ED2000
trusted library allocation
page read and write
59EB000
trusted library allocation
page read and write
1C964762000
trusted library allocation
page read and write
1C956EA0000
unclassified section
page readonly
3BB2EFF000
stack
page read and write
34AE000
stack
page read and write
11ED000
heap
page read and write
B6D000
stack
page read and write
1C968AD6000
trusted library allocation
page read and write
1C9693CF000
trusted library allocation
page read and write
FB4000
heap
page read and write
BE0000
direct allocation
page read and write
15C4000
heap
page read and write
1C968C89000
trusted library allocation
page read and write
339F000
stack
page read and write
4930000
direct allocation
page execute and read and write
1C966C19000
trusted library allocation
page read and write
1C96F463000
trusted library allocation
page read and write
EEF000
stack
page read and write
1C967659000
trusted library allocation
page read and write
59D9000
trusted library allocation
page read and write
1C969257000
trusted library allocation
page read and write
412000
unkown
page execute and read and write
5CA3000
trusted library allocation
page read and write
48B1000
heap
page read and write
C34000
heap
page read and write
1C968979000
trusted library allocation
page read and write
1C966F5F000
trusted library allocation
page read and write
48B1000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
1C9670B6000
trusted library allocation
page read and write
2EFF000
stack
page read and write
1C96890F000
trusted library allocation
page read and write
1C96894B000
trusted library allocation
page read and write
353F000
stack
page read and write
A8C000
heap
page read and write
204F09C6000
heap
page read and write
4591000
heap
page read and write
1C958B44000
heap
page read and write
1189000
heap
page read and write
B44000
heap
page read and write
4C20000
heap
page read and write
33FF000
stack
page read and write
FB4000
heap
page read and write
3BB1BFC000
unkown
page read and write
1C96764F000
trusted library allocation
page read and write
B44000
heap
page read and write
4591000
heap
page read and write
4C80000
direct allocation
page read and write
4F30000
direct allocation
page execute and read and write
1C966D00000
trusted library allocation
page read and write
FB4000
heap
page read and write
59A1000
trusted library allocation
page read and write
7A9000
unkown
page execute and write copy
5EEB000
trusted library allocation
page read and write
1C96899D000
trusted library allocation
page read and write
38FF000
stack
page read and write
1C968983000
trusted library allocation
page read and write
3A2E000
stack
page read and write
1C968A91000
trusted library allocation
page read and write
1C962A5E000
trusted library allocation
page read and write
1C96A803000
trusted library allocation
page read and write
1C968983000
trusted library allocation
page read and write
3A2F000
stack
page read and write
4591000
heap
page read and write
1C96F03C000
trusted library allocation
page read and write
204F0988000
heap
page read and write
612000
unkown
page execute and write copy
12AF000
heap
page read and write
1E8F000
stack
page read and write
204F0218000
trusted library allocation
page read and write
D16000
unkown
page execute and read and write
59A3000
trusted library allocation
page read and write
1C96F444000
trusted library allocation
page read and write
61CF000
stack
page read and write
5A88000
trusted library allocation
page read and write
940000
direct allocation
page read and write
4BEE000
stack
page read and write
1C96AB45000
trusted library allocation
page read and write
204F0949000
heap
page read and write
59AB000
trusted library allocation
page read and write
FB4000
heap
page read and write
4271000
heap
page read and write
C34000
heap
page read and write
406F000
stack
page read and write
356E000
stack
page read and write
5E23000
trusted library allocation
page read and write
1C96869F000
trusted library allocation
page read and write
1C967DC2000
trusted library allocation
page read and write
361F000
stack
page read and write
CD8000
unkown
page execute and read and write
FB4000
heap
page read and write
48B1000
heap
page read and write
2CB0000
direct allocation
page read and write
65EC000
stack
page read and write
1C9686FB000
trusted library allocation
page read and write
FB4000
heap
page read and write
59D8000
trusted library allocation
page read and write
4731000
heap
page read and write
E94000
heap
page read and write
1C967664000
trusted library allocation
page read and write
D41000
heap
page read and write
46D0000
remote allocation
page read and write
3BB334F000
stack
page read and write
FB4000
heap
page read and write
1ADBE000
stack
page read and write
1C966F3D000
trusted library allocation
page read and write
1C96F3E0000
trusted library allocation
page read and write
1C9716C6000
trusted library allocation
page read and write
1C96A621000
trusted library allocation
page read and write
5E23000
trusted library allocation
page read and write
5A35000
trusted library allocation
page read and write
2A2E000
stack
page read and write
11A6000
heap
page read and write
1C96C00A000
trusted library allocation
page read and write
280E000
stack
page read and write
1C963026000
trusted library allocation
page read and write
4EA1000
heap
page read and write
4D41000
direct allocation
page read and write
1C9672C7000
trusted library allocation
page read and write
1C95FF64000
heap
page read and write
59E0000
trusted library allocation
page read and write
3EFE000
stack
page read and write
1C9672F3000
trusted library allocation
page read and write
D93000
unkown
page execute and write copy
48B1000
heap
page read and write
59A1000
trusted library allocation
page read and write
5995000
trusted library allocation
page read and write
1C95FF6A000
heap
page read and write
387F000
stack
page read and write
FB4000
heap
page read and write
C34000
heap
page read and write
1C96938A000
trusted library allocation
page read and write
49E1000
heap
page read and write
5998000
trusted library allocation
page read and write
1C96F286000
trusted library allocation
page read and write
48B1000
heap
page read and write
599B000
trusted library allocation
page read and write
4830000
direct allocation
page execute and read and write
1C968C6E000
trusted library allocation
page read and write
1C967516000
trusted library allocation
page read and write
5DF8000
trusted library allocation
page read and write
A00000
direct allocation
page read and write
3BAF23D000
stack
page read and write
5C82000
trusted library allocation
page read and write
4CEF000
stack
page read and write
1C96703D000
trusted library allocation
page read and write
1C9689E0000
trusted library allocation
page read and write
59F9000
trusted library allocation
page read and write
5030000
direct allocation
page execute and read and write
48B1000
heap
page read and write
1C967677000
trusted library allocation
page read and write
1040000
direct allocation
page read and write
1C968956000
trusted library allocation
page read and write
4F10000
direct allocation
page execute and read and write
10F0000
direct allocation
page read and write
1C96301B000
trusted library allocation
page read and write
2C80000
direct allocation
page execute and read and write
1C958C74000
heap
page read and write
5D87000
trusted library allocation
page read and write
1C96F805000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C96704C000
trusted library allocation
page read and write
47A000
unkown
page execute and write copy
1C96781B000
trusted library allocation
page read and write
1262000
heap
page read and write
5C85000
trusted library allocation
page read and write
1C966E3F000
trusted library allocation
page read and write
666000
unkown
page execute and write copy
1C96723A000
trusted library allocation
page read and write
5347000
trusted library allocation
page read and write
4591000
heap
page read and write
2B60000
direct allocation
page read and write
734000
heap
page read and write
1C967677000
trusted library allocation
page read and write
BF4000
heap
page read and write
1C968F03000
trusted library allocation
page read and write
1C96861B000
trusted library allocation
page read and write
1C958C50000
trusted library section
page readonly
1198000
heap
page read and write
1C968678000
trusted library allocation
page read and write
470000
unkown
page read and write
1C967914000
trusted library allocation
page read and write
734000
heap
page read and write
59B7000
trusted library allocation
page read and write
1A4000
heap
page read and write
1C96F1DC000
trusted library allocation
page read and write
204EFE40000
unclassified section
page readonly
59C7000
trusted library allocation
page read and write
5CAB000
trusted library allocation
page read and write
3A1E000
stack
page read and write
4580000
direct allocation
page read and write
59C8000
trusted library allocation
page read and write
C34000
heap
page read and write
1C96849C000
trusted library allocation
page read and write
1C9689E2000
trusted library allocation
page read and write
1C95FF6A000
heap
page read and write
59BA000
trusted library allocation
page read and write
1C966D77000
trusted library allocation
page read and write
59D2000
trusted library allocation
page read and write
1C966E86000
trusted library allocation
page read and write
1040000
direct allocation
page read and write
634E000
stack
page read and write
204F09C6000
heap
page read and write
1C9633A3000
trusted library allocation
page read and write
1C9686CA000
trusted library allocation
page read and write
599B000
trusted library allocation
page read and write
28EE000
stack
page read and write
2DFE000
stack
page read and write
204F096A000
heap
page read and write
4A5E000
stack
page read and write
2B60000
direct allocation
page read and write
1C96760F000
trusted library allocation
page read and write
204F093C000
heap
page read and write
5AA1000
trusted library allocation
page read and write
1C967D97000
trusted library allocation
page read and write
59E9000
trusted library allocation
page read and write
11A0000
direct allocation
page execute and read and write
15C4000
heap
page read and write
4B60000
trusted library allocation
page read and write
1C96A9DF000
trusted library allocation
page read and write
C34000
heap
page read and write
4F4E000
stack
page read and write
11B4000
heap
page read and write
FB4000
heap
page read and write
1C968661000
trusted library allocation
page read and write
FB4000
heap
page read and write
204F0F3B000
heap
page read and write
1C967675000
trusted library allocation
page read and write
FB4000
heap
page read and write
1360000
direct allocation
page read and write
1C96A6AD000
trusted library allocation
page read and write
1C96878E000
trusted library allocation
page read and write
4861000
heap
page read and write
59D6000
trusted library allocation
page read and write
1C96878A000
trusted library allocation
page read and write
1C964957000
trusted library allocation
page read and write
1C968391000
trusted library allocation
page read and write
204F0E00000
trusted library allocation
page read and write
432E000
stack
page read and write
204F0940000
heap
page read and write
4C80000
direct allocation
page read and write
158E000
stack
page read and write
1C969447000
trusted library allocation
page read and write
1360000
direct allocation
page read and write
E94000
heap
page read and write
1C96573D000
trusted library allocation
page read and write
1C9684AE000
trusted library allocation
page read and write
FB4000
heap
page read and write
EFF000
stack
page read and write
5AA1000
trusted library allocation
page read and write
FB4000
heap
page read and write
1EC000
stack
page read and write
599A000
trusted library allocation
page read and write
FB4000
heap
page read and write
4580000
direct allocation
page read and write
5A91000
trusted library allocation
page read and write
4271000
heap
page read and write
3BA8F3A000
stack
page read and write
48B0000
direct allocation
page read and write
5CAB000
trusted library allocation
page read and write
984000
heap
page read and write
1C96AC00000
trusted library allocation
page read and write
15C4000
heap
page read and write
1C967DEA000
trusted library allocation
page read and write
1C9717E2000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
47BE000
stack
page read and write
689000
unkown
page execute and write copy
1000000
direct allocation
page execute and read and write
1C967493000
trusted library allocation
page read and write
4591000
heap
page read and write
4E70000
direct allocation
page read and write
FB4000
heap
page read and write
1C969262000
trusted library allocation
page read and write
4EC1000
heap
page read and write
FB4000
heap
page read and write
4910000
heap
page read and write
2034FA70000
heap
page read and write
1C958B00000
heap
page read and write
5D27000
trusted library allocation
page read and write
48B1000
heap
page read and write
B44000
heap
page read and write
1C967677000
trusted library allocation
page read and write
4C80000
direct allocation
page read and write
13C6050A000
trusted library allocation
page read and write
59C8000
trusted library allocation
page read and write
10F0000
direct allocation
page read and write
2C7F000
stack
page read and write
1C968F5F000
trusted library allocation
page read and write
4591000
heap
page read and write
5E2A000
trusted library allocation
page read and write
1C96F427000
trusted library allocation
page read and write
1C966FA7000
trusted library allocation
page read and write
4C0B000
trusted library allocation
page read and write
1C96F172000
trusted library allocation
page read and write
1C963017000
trusted library allocation
page read and write
1C96A6D8000
trusted library allocation
page read and write
BF4000
heap
page read and write
598E000
trusted library allocation
page read and write
204F0F67000
heap
page read and write
1C9683E3000
trusted library allocation
page read and write
13D1000
heap
page read and write
5CA2000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
1271000
heap
page read and write
1190000
heap
page read and write
1C964279000
trusted library allocation
page read and write
1B56E000
stack
page read and write
FB4000
heap
page read and write
4F10000
direct allocation
page execute and read and write
4591000
heap
page read and write
B44000
heap
page read and write
1C963FE2000
trusted library allocation
page read and write
C34000
heap
page read and write
1C968418000
trusted library allocation
page read and write
1C967DC7000
trusted library allocation
page read and write
59C7000
trusted library allocation
page read and write
4861000
heap
page read and write
290000
unkown
page read and write
1C9657BC000
trusted library allocation
page read and write
2EDF000
stack
page read and write
1C9686CA000
trusted library allocation
page read and write
4861000
heap
page read and write
1C966DD5000
trusted library allocation
page read and write
59AD000
trusted library allocation
page read and write
1C9686D1000
trusted library allocation
page read and write
145F000
stack
page read and write
1C967679000
trusted library allocation
page read and write
1C969121000
trusted library allocation
page read and write
1B1AD000
stack
page read and write
A00000
direct allocation
page read and write
A76000
heap
page read and write
7E10000
heap
page read and write
1024000
heap
page read and write
1024000
heap
page read and write
1C96F1D3000
trusted library allocation
page read and write
598E000
trusted library allocation
page read and write
1C97179C000
trusted library allocation
page read and write
B44000
heap
page read and write
1AD7F000
stack
page read and write
C68000
unkown
page execute and write copy
1C9684C6000
trusted library allocation
page read and write
110E000
heap
page read and write
1C969203000
trusted library allocation
page read and write
1C9689A9000
trusted library allocation
page read and write
F74000
heap
page read and write
4C80000
direct allocation
page read and write
3CFE000
stack
page read and write
11F8000
heap
page read and write
5F46000
trusted library allocation
page read and write
1C968AD6000
trusted library allocation
page read and write
8A1000
unkown
page execute and write copy
29C0000
direct allocation
page execute and read and write
1C967DB4000
trusted library allocation
page read and write
1C968696000
trusted library allocation
page read and write
FB4000
heap
page read and write
48BF000
stack
page read and write
204EFED0000
heap
page read and write
1C969200000
trusted library allocation
page read and write
1C967366000
trusted library allocation
page read and write
1C9647D5000
trusted library allocation
page read and write
9D0000
heap
page read and write
124A000
unkown
page execute and read and write
1271000
heap
page read and write
FB4000
heap
page read and write
43BF000
stack
page read and write
100E000
stack
page read and write
1024000
heap
page read and write
3FAF000
stack
page read and write
1C966D5E000
trusted library allocation
page read and write
32EE000
stack
page read and write
1C9649FA000
trusted library allocation
page read and write
59B7000
trusted library allocation
page read and write
5E21000
trusted library allocation
page read and write
1C96765F000
trusted library allocation
page read and write
1C9684B0000
trusted library allocation
page read and write
4861000
heap
page read and write
4E50000
direct allocation
page execute and read and write
1C9695B1000
trusted library allocation
page read and write
B44000
heap
page read and write
59E9000
trusted library allocation
page read and write
2034F760000
heap
page read and write
35CF000
stack
page read and write
4861000
heap
page read and write
10FD000
heap
page read and write
FB4000
heap
page read and write
59E9000
trusted library allocation
page read and write
984000
heap
page read and write
410000
unkown
page read and write
5E2F000
trusted library allocation
page read and write
204F02CE000
trusted library allocation
page read and write
1CBEF000
stack
page read and write
50000
unkown
page read and write
1CC4E000
stack
page read and write
1C963479000
trusted library allocation
page read and write
4A71000
heap
page read and write
1C9695E7000
trusted library allocation
page read and write
1A081FF000
stack
page read and write
1C968983000
trusted library allocation
page read and write
3BA90EE000
stack
page read and write
1C968AAD000
trusted library allocation
page read and write
1C968C75000
trusted library allocation
page read and write
11F4000
heap
page read and write
15C4000
heap
page read and write
1C9689A6000
trusted library allocation
page read and write
1C96F76A000
trusted library allocation
page read and write
D00000
heap
page read and write
59E9000
trusted library allocation
page read and write
5FC0000
heap
page read and write
1C96FCB0000
trusted library allocation
page read and write
FB4000
heap
page read and write
384F000
stack
page read and write
CE9000
unkown
page execute and write copy
1C967BE0000
trusted library section
page readonly
1C96708A000
trusted library allocation
page read and write
7E14000
heap
page read and write
F74000
heap
page read and write
1C962EE0000
unclassified section
page read and write
204F0940000
heap
page read and write
1C9672D7000
trusted library allocation
page read and write
1204000
heap
page read and write
4591000
heap
page read and write
5A81000
trusted library allocation
page read and write
1C968ABD000
trusted library allocation
page read and write
1C966C2C000
trusted library allocation
page read and write
1C968979000
trusted library allocation
page read and write
1C966870000
trusted library section
page readonly
BF4000
heap
page read and write
1C968A70000
trusted library allocation
page read and write
1C9683B7000
trusted library allocation
page read and write
FB4000
heap
page read and write
C00000
heap
page read and write
1C966F06000
trusted library allocation
page read and write
640000
unkown
page execute and write copy
D7E000
stack
page read and write
1C96F1A8000
trusted library allocation
page read and write
1089000
heap
page read and write
1C96FC45000
trusted library allocation
page read and write
12BC000
heap
page read and write
1C968476000
trusted library allocation
page read and write
4840000
direct allocation
page execute and read and write
FB4000
heap
page read and write
F6F000
stack
page read and write
1C9683DB000
trusted library allocation
page read and write
52D0000
direct allocation
page execute and read and write
1C969429000
trusted library allocation
page read and write
FB4000
heap
page read and write
BF4000
heap
page read and write
C23000
heap
page read and write
5A18000
trusted library allocation
page read and write
1C96F1A7000
trusted library allocation
page read and write
1C96873B000
trusted library allocation
page read and write
4CA0000
trusted library allocation
page read and write
49D0000
direct allocation
page read and write
1C968BD0000
trusted library allocation
page read and write
E94000
heap
page read and write
1C96705C000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C96F788000
trusted library allocation
page read and write
59CF000
trusted library allocation
page read and write
5313000
trusted library allocation
page read and write
1C9670BC000
trusted library allocation
page read and write
1A4000
heap
page read and write
750000
heap
page read and write
1C96835E000
trusted library allocation
page read and write
DA3000
heap
page read and write
1C968203000
trusted library allocation
page read and write
4591000
heap
page read and write
1C96867E000
trusted library allocation
page read and write
F20000
heap
page read and write
1C95FF62000
heap
page read and write
1C96A9EB000
trusted library allocation
page read and write
1C96898B000
trusted library allocation
page read and write
BF4000
heap
page read and write
FB4000
heap
page read and write
940000
direct allocation
page read and write
48B1000
heap
page read and write
2B60000
direct allocation
page read and write
1C9647F6000
trusted library allocation
page read and write
A00000
direct allocation
page read and write
1C966FD6000
trusted library allocation
page read and write
5A91000
trusted library allocation
page read and write
1C96F427000
trusted library allocation
page read and write
59AB000
trusted library allocation
page read and write
F74000
heap
page read and write
FB4000
heap
page read and write
5CA4000
trusted library allocation
page read and write
DFE000
stack
page read and write
1C9686A9000
trusted library allocation
page read and write
204EFFE0000
heap
page read and write
12C2000
heap
page read and write
4861000
heap
page read and write
A56000
heap
page read and write
1C964982000
trusted library allocation
page read and write
354E000
stack
page read and write
1C96A9A3000
trusted library allocation
page read and write
3BB003E000
stack
page read and write
204F0F44000
heap
page read and write
3F3F000
stack
page read and write
6450000
heap
page read and write
601000
unkown
page execute and write copy
1C966E36000
trusted library allocation
page read and write
1C96F308000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
12CE000
heap
page read and write
1C96A9BD000
trusted library allocation
page read and write
15B0000
direct allocation
page read and write
5030000
direct allocation
page execute and read and write
1C964B00000
trusted library allocation
page read and write
38EF000
stack
page read and write
3BB1EF9000
stack
page read and write
1C9682F0000
trusted library allocation
page read and write
140F000
stack
page read and write
1C96835C000
trusted library allocation
page read and write
4FE0000
direct allocation
page execute and read and write
70F000
unkown
page execute and write copy
1C9684B0000
trusted library allocation
page read and write
54D0000
direct allocation
page execute and read and write
44AF000
stack
page read and write
1C967555000
trusted library allocation
page read and write
56A000
unkown
page execute and write copy
428E000
stack
page read and write
59BD000
trusted library allocation
page read and write
1360000
direct allocation
page read and write
F74000
heap
page read and write
5AA1000
trusted library allocation
page read and write
3BA8E3E000
stack
page read and write
5D8C000
trusted library allocation
page read and write
59E3000
trusted library allocation
page read and write
1C962B03000
trusted library allocation
page read and write
4591000
heap
page read and write
1C966E6C000
trusted library allocation
page read and write
1C9657E0000
trusted library allocation
page read and write
1C967D37000
trusted library allocation
page read and write
4591000
heap
page read and write
1C9642AA000
trusted library allocation
page read and write
1C96AC24000
trusted library allocation
page read and write
3BAE43B000
stack
page read and write
There are 6568 hidden memdumps, click here to show them.