IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\num[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1001102001\3f779c1cca.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1001103001\994a9a760e.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1001104001\fb9fc5d370.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1001105001\num.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\4ZEE72SJX7XOQDCN6UZ4LV1NK2QYF.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\70NN9S1HRAEX9LH3L5PDFQWX9ANZ6.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\8Z5C764IBSHZ8A5U9SVRCREF.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\B7KMZCE66VGDP83M16.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\DBQJ2COS8NEE0DVFAHC8.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\HR483MUGWRQ77A8EZ5D.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\PR9MM82BT6H8ASEPAAV3FFFU6W4.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\QVVPAZNCIISWKSVDLM23B.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\QZRNZLINJW4FDHW89WOCWU0IJ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\70NN9S1HRAEX9LH3L5PDFQWX9ANZ6.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\8Z5C764IBSHZ8A5U9SVRCREF.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\compatibility.ini
Windows WIN.INI
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\extension-preferences.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\extension-preferences.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs-1.js
ASCII text, with very long lines (1717), with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.js (copy)
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 5, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\targeting.snapshot.json.tmp
JSON data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
There are 33 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\QZRNZLINJW4FDHW89WOCWU0IJ.exe
"C:\Users\user\AppData\Local\Temp\QZRNZLINJW4FDHW89WOCWU0IJ.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\B7KMZCE66VGDP83M16.exe
"C:\Users\user\AppData\Local\Temp\B7KMZCE66VGDP83M16.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001102001\3f779c1cca.exe
"C:\Users\user\AppData\Local\Temp\1001102001\3f779c1cca.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001103001\994a9a760e.exe
"C:\Users\user\AppData\Local\Temp\1001103001\994a9a760e.exe"
malicious
C:\Users\user\AppData\Local\Temp\8Z5C764IBSHZ8A5U9SVRCREF.exe
"C:\Users\user\AppData\Local\Temp\8Z5C764IBSHZ8A5U9SVRCREF.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001102001\3f779c1cca.exe
"C:\Users\user\AppData\Local\Temp\1001102001\3f779c1cca.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001104001\fb9fc5d370.exe
"C:\Users\user\AppData\Local\Temp\1001104001\fb9fc5d370.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001105001\num.exe
"C:\Users\user\AppData\Local\Temp\1001105001\num.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001103001\994a9a760e.exe
"C:\Users\user\AppData\Local\Temp\1001103001\994a9a760e.exe"
malicious
C:\Users\user\AppData\Local\Temp\DBQJ2COS8NEE0DVFAHC8.exe
"C:\Users\user\AppData\Local\Temp\DBQJ2COS8NEE0DVFAHC8.exe"
malicious
C:\Users\user\AppData\Local\Temp\4ZEE72SJX7XOQDCN6UZ4LV1NK2QYF.exe
"C:\Users\user\AppData\Local\Temp\4ZEE72SJX7XOQDCN6UZ4LV1NK2QYF.exe"
malicious
C:\Users\user\AppData\Local\Temp\70NN9S1HRAEX9LH3L5PDFQWX9ANZ6.exe
"C:\Users\user\AppData\Local\Temp\70NN9S1HRAEX9LH3L5PDFQWX9ANZ6.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001104001\fb9fc5d370.exe
"C:\Users\user\AppData\Local\Temp\1001104001\fb9fc5d370.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2308 -parentBuildID 20230927232528 -prefsHandle 2232 -prefMapHandle 2224 -prefsLen 25250 -prefMapSize 238690 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c73eb302-b62d-4664-8c1e-f311557443d0} 5232 "\\.\pipe\gecko-crash-server-pipe.5232" 2ae78e6ef10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=912 -parentBuildID 20230927232528 -prefsHandle 2792 -prefMapHandle 3796 -prefsLen 26265 -prefMapSize 238690 -appDir "C:\Program Files\Mozilla Firefox\browser" - {900b7ccc-f93b-4c39-acf6-c4309c8be80c} 5232 "\\.\pipe\gecko-crash-server-pipe.5232" 2ae0b544510 rdd
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
There are 34 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.37/J
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpn
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpm
unknown
malicious
studennotediw.store
malicious
http://185.215.113.37/e2b1563c6670f193.phps
unknown
malicious
http://185.215.113.37/z
unknown
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
eaglepawnoy.store
malicious
http://185.215.113.37/
185.215.113.37
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://duckduckgo.com/ac/?q=
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://bathdoomgaz.store:443/api
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://sergei-esenin.com/;TZ
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://sergei-esenin.com/
unknown
https://firefox.settings.services.allizom.org/v1/buckets/main/collections/search-config/records
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://youtube.commedia.gmp-gmpopenh264.visiblemedia.gmp-widevinecdm.enabledwebIsolated=https://you
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=UuGFpt56D9L4&l=
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli
unknown
https://store.steampowered.com
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://sergei-esenin.com/CCAQIYAA==e
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://sergei-esenin.com/cT
unknown
https://github.com/mozilla-services/screenshots
unknown
https://s.ytimg.com;
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
http://exslt.org/sets
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
http://src.chromium.org/viewvc/chrome/trunk/src/third_party/cld/languages/internal/languages.cc
unknown
https://www.cloudflare.com/learning/a
unknown
https://licendfilteo.site:443/api
unknown
https://youtube.com/account?=https://ac
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=W9BX
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
http://exslt.org/common
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://exslt.org/dates-and-times
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://community.cloudflare.steamstatic.com/public/css/promo
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1&
unknown
https://sergei-esenin.com/o
unknown
https://www.ecosia.org/newtab/
unknown
https://lv.queniujq.cn
unknown
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
https://www.youtube.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.cloudflare.steamstatic.com/public/javascript/webui/clientcom.js?v=qYlgdgWOD4Ng&amp
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
http://185.215.113.16/mine/random.exed
unknown
https://steamcommunity.com/?subsection=broadcaH
unknown
https://community.cloudflare.steamstatic.cV
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://sergei-esenin.com/apier
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
http://185.215.113.16/off/def.exe
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=KkhJqW2NGKiM&l=engli
unknown
https://community.cloudflare.steamstatic.co
unknown
https://sergei-esenin.com/api4T
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://sergei-esenin.com/?
unknown
https://merino.services.mozilla.com/api/v1/suggestabout
unknown
https://steamcommunity.com/mx
unknown
https://help.steampowered.com/en/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
sergei-esenin.com
104.21.53.8
malicious
steamcommunity.com
104.102.49.254
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.251.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.129
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.186.46
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.18.110
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.129.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 28 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.53.8
sergei-esenin.com
United States
malicious
185.215.113.43
unknown
Portugal
malicious
185.215.113.37
unknown
Portugal
malicious
104.102.49.254
steamcommunity.com
United States
malicious
142.250.186.46
youtube.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
185.215.113.16
unknown
Portugal
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 5 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
3f779c1cca.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
994a9a760e.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
fb9fc5d370.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
num.exe
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4EE0000
direct allocation
page read and write
malicious
5350000
direct allocation
page read and write
malicious
B71000
unkown
page execute and read and write
malicious
5D1000
unkown
page execute and read and write
malicious
4B00000
direct allocation
page read and write
malicious
109F000
heap
page read and write
malicious
4FA0000
direct allocation
page read and write
malicious
831000
unkown
page execute and read and write
malicious
4CE0000
direct allocation
page read and write
malicious
5200000
direct allocation
page read and write
malicious
5270000
direct allocation
page read and write
malicious
FD1000
unkown
page execute and write copy
malicious
5040000
direct allocation
page read and write
malicious
FD1000
unkown
page execute and write copy
malicious
831000
unkown
page execute and read and write
malicious
B71000
unkown
page execute and read and write
malicious
D2E000
heap
page read and write
malicious
127E000
heap
page read and write
malicious
14BF000
heap
page read and write
malicious
A61000
unkown
page execute and read and write
malicious
5370000
direct allocation
page read and write
malicious
B11000
unkown
page execute and read and write
malicious
157E000
heap
page read and write
malicious
6C8000
heap
page read and write
malicious
531000
unkown
page execute and read and write
malicious
13CE000
heap
page read and write
malicious
4A51000
heap
page read and write
437F000
stack
page read and write
1F810B6D000
trusted library allocation
page read and write
1550000
direct allocation
page read and write
65AC000
trusted library allocation
page read and write
494000
unkown
page readonly
B10000
unkown
page readonly
3BDF000
stack
page read and write
FD0000
heap
page read and write
1220000
heap
page read and write
15C0000
direct allocation
page read and write
6060000
trusted library allocation
page read and write
13A4000
heap
page read and write
523B000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
2AE095F4000
trusted library allocation
page read and write
1F817FF7000
trusted library allocation
page read and write
22908EA0000
heap
page read and write
1394000
heap
page read and write
526C000
trusted library allocation
page read and write
1CCFF000
stack
page read and write
59BC000
trusted library allocation
page read and write
70E000
heap
page read and write
1647000
heap
page read and write
4E30000
direct allocation
page execute and read and write
63F1000
trusted library allocation
page read and write
1A08D1BF000
heap
page read and write
1F810AD5000
trusted library allocation
page read and write
48C000
unkown
page read and write
524F000
trusted library allocation
page read and write
359F000
stack
page read and write
2AE091E9000
trusted library allocation
page read and write
4D81000
heap
page read and write
1124000
heap
page read and write
5A0A000
trusted library allocation
page read and write
4740000
direct allocation
page read and write
16D4000
heap
page read and write
63F8000
trusted library allocation
page read and write
2AE0951D000
trusted library allocation
page read and write
3ABF000
stack
page read and write
2AE0511E000
trusted library allocation
page read and write
64D2000
trusted library allocation
page read and write
860000
direct allocation
page read and write
6059000
trusted library allocation
page read and write
5246000
trusted library allocation
page read and write
5AC1000
trusted library allocation
page read and write
435E000
stack
page read and write
1F80EEF6000
trusted library allocation
page read and write
1F3C5DD0000
heap
page read and write
A50000
direct allocation
page read and write
2AE0637A000
trusted library allocation
page read and write
1F87F39E000
trusted library allocation
page read and write
56B5000
trusted library allocation
page read and write
C41DD6E000
stack
page read and write
5A0D000
trusted library allocation
page read and write
BBA000
stack
page read and write
4ABE000
stack
page read and write
5238000
trusted library allocation
page read and write
2F3E000
heap
page read and write
1F810B5E000
trusted library allocation
page read and write
564000
heap
page read and write
133E000
stack
page read and write
5AEE000
trusted library allocation
page read and write
1124000
heap
page read and write
59EC000
trusted library allocation
page read and write
1394000
heap
page read and write
1F80D56B000
trusted library allocation
page read and write
417F000
stack
page read and write
2AE0D27A000
trusted library allocation
page read and write
63F2000
trusted library allocation
page read and write
440F000
stack
page read and write
33CF000
stack
page read and write
136E000
heap
page read and write
388E000
stack
page read and write
1341000
heap
page read and write
B73000
unkown
page execute and write copy
22908212000
trusted library allocation
page read and write
576E000
trusted library allocation
page read and write
4B11000
heap
page read and write
2AE0B7D3000
trusted library allocation
page read and write
5F8D000
trusted library allocation
page read and write
564000
heap
page read and write
16B9000
heap
page read and write
461E000
stack
page read and write
352E000
stack
page read and write
8DB000
stack
page read and write
1F80F045000
trusted library allocation
page read and write
14E7000
heap
page read and write
AB4000
heap
page read and write
4BC1000
heap
page read and write
1623000
heap
page read and write
BDB000
unkown
page execute and read and write
5AB9000
trusted library allocation
page read and write
7A3000
heap
page read and write
5AEE000
trusted library allocation
page read and write
5061000
heap
page read and write
5061000
heap
page read and write
1F810AC0000
trusted library allocation
page read and write
533A000
trusted library allocation
page read and write
547000
unkown
page execute and write copy
575E000
trusted library allocation
page read and write
5F2C000
trusted library allocation
page read and write
1CE6E000
stack
page read and write
63FC000
trusted library allocation
page read and write
831000
unkown
page execute and write copy
1F810BD6000
trusted library allocation
page read and write
6BEF000
stack
page read and write
2F30000
heap
page read and write
39C1000
heap
page read and write
467F000
stack
page read and write
4EE0000
direct allocation
page read and write
7A3000
heap
page read and write
77A000
unkown
page execute and read and write
5278000
trusted library allocation
page read and write
22908E8D000
heap
page read and write
59E7000
trusted library allocation
page read and write
B00000
direct allocation
page read and write
367F000
stack
page read and write
810000
direct allocation
page read and write
10A2000
heap
page read and write
516000
unkown
page execute and read and write
1D252000
heap
page read and write
5FD8000
trusted library allocation
page read and write
22908203000
trusted library allocation
page read and write
5A11000
trusted library allocation
page read and write
4B11000
heap
page read and write
D3C000
unkown
page execute and read and write
1F80E9D8000
trusted library allocation
page read and write
4F91000
heap
page read and write
EE4000
heap
page read and write
471E000
stack
page read and write
1394000
heap
page read and write
4FA0000
direct allocation
page read and write
4F80000
direct allocation
page read and write
1F80F049000
trusted library allocation
page read and write
59BD000
trusted library allocation
page read and write
62E7000
trusted library allocation
page read and write
1124000
heap
page read and write
1F810AFA000
trusted library allocation
page read and write
65E5000
trusted library allocation
page read and write
4E40000
direct allocation
page read and write
5AEE000
trusted library allocation
page read and write
4FF000
unkown
page execute and write copy
4681000
heap
page read and write
800000
heap
page read and write
3A3F000
stack
page read and write
1030000
heap
page read and write
5350000
direct allocation
page read and write
4F80000
direct allocation
page read and write
4F1000
unkown
page execute and write copy
15C0000
direct allocation
page read and write
1F815E00000
trusted library allocation
page read and write
1F87F3C9000
trusted library allocation
page read and write
5829000
trusted library allocation
page read and write
E52000
unkown
page execute and write copy
1334000
heap
page read and write
32BE000
stack
page read and write
564000
heap
page read and write
1F816210000
trusted library allocation
page read and write
49E0000
direct allocation
page read and write
2AE08861000
trusted library allocation
page read and write
5AA7000
trusted library allocation
page read and write
4EF1000
heap
page read and write
1124000
heap
page read and write
1F87F5D7000
trusted library allocation
page read and write
5AB6000
trusted library allocation
page read and write
2AE7FCD6000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
5AEE000
trusted library allocation
page read and write
5EED000
trusted library allocation
page read and write
60B4000
trusted library allocation
page read and write
D1F000
unkown
page execute and read and write
1F80E2DD000
trusted library allocation
page read and write
310E000
stack
page read and write
13B0000
direct allocation
page read and write
13A4000
heap
page read and write
12E1000
heap
page read and write
1F87FCA1000
trusted library allocation
page read and write
120E000
heap
page read and write
355F000
stack
page read and write
22908A1C000
trusted library allocation
page read and write
C41DCAE000
unkown
page readonly
1124000
heap
page read and write
1F87FCA5000
trusted library allocation
page read and write
5F73000
trusted library allocation
page read and write
4E51000
heap
page read and write
4EF1000
heap
page read and write
13A4000
heap
page read and write
4BC1000
heap
page read and write
1F80D5ED000
trusted library allocation
page read and write
5F9A000
trusted library allocation
page read and write
2AE091E9000
trusted library allocation
page read and write
1F8160CB000
trusted library allocation
page read and write
39EF000
stack
page read and write
374E000
stack
page read and write
22908FB8000
heap
page read and write
6051000
trusted library allocation
page read and write
4BC1000
heap
page read and write
2AE091EC000
trusted library allocation
page read and write
16AC000
heap
page read and write
2DB0000
direct allocation
page read and write
B00000
direct allocation
page read and write
6260000
trusted library allocation
page read and write
22908278000
trusted library allocation
page read and write
4BC1000
heap
page read and write
57FA000
trusted library allocation
page read and write
5F6A000
trusted library allocation
page read and write
27F672D4000
heap
page read and write
43FF000
stack
page read and write
1124000
heap
page read and write
47FF000
stack
page read and write
2AE089FC000
trusted library allocation
page read and write
55ED000
trusted library allocation
page read and write
4EF1000
heap
page read and write
2AE0951B000
trusted library allocation
page read and write
2AE095ED000
trusted library allocation
page read and write
2AE091FD000
trusted library allocation
page read and write
64D0000
trusted library allocation
page read and write
5F98000
trusted library allocation
page read and write
1D0AE000
stack
page read and write
5FBE000
trusted library allocation
page read and write
30DE000
stack
page read and write
2AE7FEB3000
trusted library allocation
page read and write
F54000
heap
page read and write
2AE0D1FA000
trusted library allocation
page read and write
1292000
heap
page read and write
AC9000
unkown
page write copy
E43000
unkown
page execute and write copy
59FD000
trusted library allocation
page read and write
522F000
trusted library allocation
page read and write
1124000
heap
page read and write
5AD1000
trusted library allocation
page read and write
1124000
heap
page read and write
531A000
trusted library allocation
page read and write
5221000
trusted library allocation
page read and write
14CA000
heap
page read and write
1124000
heap
page read and write
49E0000
direct allocation
page read and write
6250000
trusted library allocation
page read and write
5277000
trusted library allocation
page read and write
22908F3C000
heap
page read and write
4EF1000
heap
page read and write
2AE089D9000
trusted library allocation
page read and write
1350000
heap
page read and write
5AEE000
trusted library allocation
page read and write
58A9000
trusted library allocation
page read and write
1F8164FB000
trusted library allocation
page read and write
2AE7A7E1000
heap
page read and write
57C4000
trusted library allocation
page read and write
6071000
trusted library allocation
page read and write
1564000
heap
page read and write
525C000
trusted library allocation
page read and write
2AE7FCD0000
heap
page read and write
109E000
stack
page read and write
2AE0916F000
trusted library allocation
page read and write
1F87F398000
trusted library allocation
page read and write
2AE05113000
trusted library allocation
page read and write
5410000
direct allocation
page execute and read and write
369F000
stack
page read and write
1124000
heap
page read and write
1F810AFA000
trusted library allocation
page read and write
5FAE000
trusted library allocation
page read and write
4681000
heap
page read and write
2AE095E6000
trusted library allocation
page read and write
4FA0000
direct allocation
page read and write
1F8110F6000
trusted library allocation
page read and write
F54000
heap
page read and write
2AE7FCD6000
heap
page read and write
524E000
trusted library allocation
page read and write
4D81000
heap
page read and write
1F810A6D000
trusted library allocation
page read and write
2AE091F0000
trusted library allocation
page read and write
8F4D7FD000
stack
page read and write
5020000
heap
page read and write
4C50000
direct allocation
page execute and read and write
9BC000
stack
page read and write
22908A00000
trusted library allocation
page read and write
4B11000
heap
page read and write
5FB3000
trusted library allocation
page read and write
4BC1000
heap
page read and write
501000
unkown
page execute and read and write
59B8000
trusted library allocation
page read and write
5AC1000
trusted library allocation
page read and write
4B11000
heap
page read and write
4BC1000
heap
page read and write
5FA4000
trusted library allocation
page read and write
1645000
heap
page read and write
5050000
direct allocation
page read and write
831000
unkown
page execute and write copy
76F0000
heap
page read and write
D60000
heap
page read and write
62F4000
trusted library allocation
page read and write
1623000
heap
page read and write
1200000
heap
page read and write
51C0000
trusted library allocation
page read and write
1F815E15000
trusted library allocation
page read and write
4681000
heap
page read and write
22907E50000
unclassified section
page readonly
55A0000
direct allocation
page execute and read and write
D73000
heap
page read and write
3280000
direct allocation
page read and write
D01000
unkown
page execute and read and write
22908070000
unclassified section
page read and write
4B3E000
stack
page read and write
639C000
trusted library allocation
page read and write
5329000
trusted library allocation
page read and write
64BD000
trusted library allocation
page read and write
F6C000
stack
page read and write
2DB0000
direct allocation
page read and write
918000
unkown
page execute and read and write
657F000
trusted library allocation
page read and write
63FE000
trusted library allocation
page read and write
610F000
trusted library allocation
page read and write
4D81000
heap
page read and write
3B0E000
stack
page read and write
56B7000
trusted library allocation
page read and write
1F87F39A000
trusted library allocation
page read and write
2AE090F9000
trusted library allocation
page read and write
4BC1000
heap
page read and write
2DB0000
direct allocation
page read and write
5F7D000
trusted library allocation
page read and write
4C50000
heap
page read and write
27F66FF3000
heap
page read and write
122A000
heap
page read and write
2AE7FCDC000
heap
page read and write
22908FAE000
heap
page read and write
1F810AB8000
trusted library allocation
page read and write
1124000
heap
page read and write
E7C000
unkown
page execute and read and write
22908F58000
heap
page read and write
303E000
stack
page read and write
4F80000
direct allocation
page read and write
49F1000
heap
page read and write
63FE000
trusted library allocation
page read and write
AB4000
heap
page read and write
63AD000
trusted library allocation
page read and write
E83000
heap
page read and write
132E000
heap
page read and write
3E5F000
stack
page read and write
4E30000
direct allocation
page execute and read and write
644000
heap
page read and write
4F91000
heap
page read and write
1F810ABA000
trusted library allocation
page read and write
67FF000
stack
page read and write
AA0000
heap
page read and write
5E4F000
trusted library allocation
page read and write
2AE7FCD6000
heap
page read and write
5AB0000
trusted library allocation
page read and write
54E0000
direct allocation
page execute and read and write
FEF000
unkown
page execute and write copy
314F000
stack
page read and write
10F5000
stack
page read and write
860000
direct allocation
page read and write
5F52000
trusted library allocation
page read and write
33FE000
stack
page read and write
2DB0000
direct allocation
page read and write
1F80AEDB000
trusted library allocation
page read and write
1124000
heap
page read and write
32FE000
stack
page read and write
157A000
heap
page read and write
2AE0889A000
trusted library allocation
page read and write
1210000
heap
page read and write
1F811032000
trusted library allocation
page read and write
6354000
trusted library allocation
page read and write
1F80E260000
trusted library allocation
page read and write
5275000
trusted library allocation
page read and write
56B5000
trusted library allocation
page read and write
5050000
direct allocation
page read and write
5AAB000
trusted library allocation
page read and write
12F5000
stack
page read and write
3F9F000
stack
page read and write
564000
heap
page read and write
4B11000
heap
page read and write
644000
heap
page read and write
3EFF000
stack
page read and write
1F3C5B90000
heap
page read and write
4EF1000
heap
page read and write
5F7B000
trusted library allocation
page read and write
13A0000
heap
page read and write
5360000
direct allocation
page execute and read and write
F2A000
unkown
page execute and write copy
22908E49000
heap
page read and write
564000
heap
page read and write
E93000
unkown
page execute and write copy
15C5000
heap
page read and write
5F8B000
trusted library allocation
page read and write
1F80D569000
trusted library allocation
page read and write
2AE11776000
trusted library allocation
page read and write
F6E000
stack
page read and write
648D000
trusted library allocation
page read and write
78E000
unkown
page execute and read and write
126E000
stack
page read and write
16D4000
heap
page read and write
1124000
heap
page read and write
4BC1000
heap
page read and write
14A4000
heap
page read and write
2F2B000
stack
page read and write
1F8160CF000
trusted library allocation
page read and write
1564000
heap
page read and write
57EA000
trusted library allocation
page read and write
2AE091EC000
trusted library allocation
page read and write
313F000
stack
page read and write
1617000
heap
page read and write
1F87FE75000
trusted library allocation
page read and write
65D0000
trusted library allocation
page read and write
2AE7FCD6000
heap
page read and write
63F7000
trusted library allocation
page read and write
4681000
heap
page read and write
6C6C000
trusted library allocation
page read and write
1F87F778000
trusted library allocation
page read and write
64A3000
trusted library allocation
page read and write
421E000
stack
page read and write
5AB0000
trusted library allocation
page read and write
1348000
heap
page read and write
59DD000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
8F4CFFF000
stack
page read and write
64AA000
trusted library allocation
page read and write
4681000
heap
page read and write
1F80F0C7000
trusted library allocation
page read and write
4B11000
heap
page read and write
36FF000
stack
page read and write
16D4000
heap
page read and write
5200000
direct allocation
page execute and read and write
30A0000
direct allocation
page read and write
62ED000
trusted library allocation
page read and write
1662000
heap
page read and write
5213000
trusted library allocation
page read and write
1124000
heap
page read and write
3E8F000
stack
page read and write
1F810A5D000
trusted library allocation
page read and write
2AE7FCD0000
heap
page read and write
A14000
heap
page read and write
59BF000
trusted library allocation
page read and write
4E51000
heap
page read and write
5F92000
trusted library allocation
page read and write
1F8160FD000
trusted library allocation
page read and write
6258000
trusted library allocation
page read and write
1653000
heap
page read and write
1550000
direct allocation
page read and write
5FB4000
trusted library allocation
page read and write
5AD4000
trusted library allocation
page read and write
1350000
heap
page read and write
EDB000
unkown
page execute and read and write
49E0000
direct allocation
page read and write
48C0000
direct allocation
page execute and read and write
12A1000
heap
page read and write
5313000
trusted library allocation
page read and write
A50000
direct allocation
page read and write
4B11000
heap
page read and write
1CF9D000
stack
page read and write
56BB000
trusted library allocation
page read and write
4BC1000
heap
page read and write
6251000
trusted library allocation
page read and write
5227000
trusted library allocation
page read and write
AB4000
heap
page read and write
3F3F000
stack
page read and write
2AE7FCDC000
heap
page read and write
54F0000
direct allocation
page execute and read and write
32AF000
stack
page read and write
C7B000
unkown
page execute and read and write
4A9F000
stack
page read and write
523A000
trusted library allocation
page read and write
1124000
heap
page read and write
1F80F016000
trusted library allocation
page read and write
14D3000
heap
page read and write
4681000
heap
page read and write
121E000
heap
page read and write
5230000
trusted library allocation
page read and write
487000
unkown
page execute and write copy
2AE0910C000
trusted library allocation
page read and write
4B11000
heap
page read and write
1A08B7D5000
heap
page read and write
2AE095F8000
trusted library allocation
page read and write
2AE09116000
trusted library allocation
page read and write
C41DDAE000
unkown
page readonly
51E0000
direct allocation
page execute and read and write
5328000
trusted library allocation
page read and write
5ABE000
trusted library allocation
page read and write
2AE09131000
trusted library allocation
page read and write
49E0000
direct allocation
page read and write
59C5000
trusted library allocation
page read and write
1124000
heap
page read and write
644000
heap
page read and write
5245000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
1F810AAF000
trusted library allocation
page read and write
2AE0D2E4000
trusted library allocation
page read and write
56B7000
trusted library allocation
page read and write
1F810BFC000
trusted library allocation
page read and write
1F810AC9000
trusted library allocation
page read and write
4861000
heap
page read and write
2F0E000
stack
page read and write
2AE095D4000
trusted library allocation
page read and write
5AC1000
trusted library allocation
page read and write
6241000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
607A000
trusted library allocation
page read and write
1D13E000
stack
page read and write
871000
unkown
page execute and write copy
1F87F3C3000
trusted library allocation
page read and write
64E7000
trusted library allocation
page read and write
1F80E9FA000
trusted library allocation
page read and write
5F51000
trusted library allocation
page read and write
D61000
unkown
page execute and read and write
29DE000
stack
page read and write
13A4000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
4B11000
heap
page read and write
2AE062F2000
trusted library allocation
page read and write
128E000
heap
page read and write
5225000
trusted library allocation
page read and write
22908F26000
heap
page read and write
8F4F7FF000
stack
page read and write
2AE1177B000
trusted library allocation
page read and write
810000
direct allocation
page read and write
1F810AD5000
trusted library allocation
page read and write
4E51000
heap
page read and write
4BC1000
heap
page read and write
5AC1000
trusted library allocation
page read and write
1F80E2E3000
trusted library allocation
page read and write
169B000
heap
page read and write
522E000
trusted library allocation
page read and write
4BC1000
heap
page read and write
644000
heap
page read and write
14D3000
heap
page read and write
63F6000
trusted library allocation
page read and write
585A000
trusted library allocation
page read and write
13B0000
direct allocation
page read and write
1350000
heap
page read and write
612000
unkown
page execute and read and write
6251000
trusted library allocation
page read and write
10B0000
heap
page read and write
4681000
heap
page read and write
5760000
trusted library allocation
page read and write
533A000
trusted library allocation
page read and write
587B000
trusted library allocation
page read and write
56B1000
trusted library allocation
page read and write
2DC0000
heap
page read and write
456E000
stack
page read and write
4EF1000
heap
page read and write
5F8D000
trusted library allocation
page read and write
564000
heap
page read and write
2AE09157000
trusted library allocation
page read and write
12FA000
heap
page read and write
AAD2FEE000
unkown
page readonly
A50000
direct allocation
page read and write
11CE000
stack
page read and write
12BE000
heap
page read and write
4BC1000
heap
page read and write
4E30000
direct allocation
page execute and read and write
10FC000
unkown
page execute and write copy
59BF000
trusted library allocation
page read and write
2AE095A9000
trusted library allocation
page read and write
2AE09538000
trusted library allocation
page read and write
22908EA9000
heap
page read and write
6060000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
4F91000
heap
page read and write
1F8160BE000
trusted library allocation
page read and write
5252000
trusted library allocation
page read and write
860000
direct allocation
page read and write
1F810ABA000
trusted library allocation
page read and write
1321000
heap
page read and write
5F78000
trusted library allocation
page read and write
4690000
heap
page read and write
5AEE000
trusted library allocation
page read and write
33FF000
stack
page read and write
302000
unkown
page execute and write copy
5450000
direct allocation
page execute and read and write
5AEE000
trusted library allocation
page read and write
5F86000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
FEE000
unkown
page readonly
4EF1000
heap
page read and write
564000
heap
page read and write
E6C000
stack
page read and write
4EF1000
heap
page read and write
525C000
trusted library allocation
page read and write
2AE091B1000
trusted library allocation
page read and write
5252000
trusted library allocation
page read and write
1AC3E000
stack
page read and write
1F80E478000
trusted library allocation
page read and write
524B000
trusted library allocation
page read and write
10AA000
heap
page read and write
8D0000
unkown
page execute and write copy
1280000
heap
page read and write
2AE09075000
trusted library allocation
page read and write
14A4000
heap
page read and write
C41DCED000
stack
page read and write
1CBFE000
stack
page read and write
1120000
heap
page read and write
2AE09AF0000
trusted library allocation
page read and write
12B0000
heap
page read and write
3280000
direct allocation
page read and write
2EEF000
stack
page read and write
43C0000
trusted library allocation
page read and write
1F80F652000
trusted library allocation
page read and write
644000
heap
page read and write
56B9000
trusted library allocation
page read and write
1215000
heap
page read and write
530000
unkown
page readonly
1D250000
heap
page read and write
1F81788B000
trusted library allocation
page read and write
5CA6000
trusted library allocation
page read and write
33BF000
stack
page read and write
14DF000
heap
page read and write
2AE7FCD0000
heap
page read and write
59BA000
trusted library allocation
page read and write
34FF000
stack
page read and write
5F97000
trusted library allocation
page read and write
48B0000
direct allocation
page execute and read and write
1F810AC9000
trusted library allocation
page read and write
1690000
heap
page read and write
1F810AAF000
trusted library allocation
page read and write
1F80D5C7000
trusted library allocation
page read and write
A40000
heap
page read and write
524E000
trusted library allocation
page read and write
30A0000
direct allocation
page read and write
22908FB8000
heap
page read and write
5F4E000
trusted library allocation
page read and write
458E000
stack
page read and write
3CBE000
stack
page read and write
1F810ADB000
trusted library allocation
page read and write
495F000
stack
page read and write
1C9D000
stack
page read and write
655E000
trusted library allocation
page read and write
4B11000
heap
page read and write
2AE095F8000
trusted library allocation
page read and write
49E0000
direct allocation
page read and write
5230000
direct allocation
page execute and read and write
4E80000
direct allocation
page read and write
522A000
trusted library allocation
page read and write
1334000
heap
page read and write
5E4B000
trusted library allocation
page read and write
1124000
heap
page read and write
354E000
stack
page read and write
4D81000
heap
page read and write
2AE091E9000
trusted library allocation
page read and write
1F811673000
trusted library allocation
page read and write
37AE000
stack
page read and write
E4C000
unkown
page execute and read and write
4B4E000
stack
page read and write
10B0000
heap
page read and write
5F65000
trusted library allocation
page read and write
2D5F000
stack
page read and write
5FC6000
trusted library allocation
page read and write
499E000
stack
page read and write
1F80F088000
trusted library allocation
page read and write
5E43000
trusted library allocation
page read and write
5265000
trusted library allocation
page read and write
4BC1000
heap
page read and write
5F85000
trusted library allocation
page read and write
81A000
unkown
page execute and read and write
35CF000
stack
page read and write
56BE000
trusted library allocation
page read and write
1124000
heap
page read and write
4D81000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
5F7F000
trusted library allocation
page read and write
AB4000
heap
page read and write
6060000
trusted library allocation
page read and write
5FA4000
trusted library allocation
page read and write
1A08B907000
trusted library allocation
page read and write
2AE06263000
trusted library allocation
page read and write
64F0000
heap
page read and write
63F1000
trusted library allocation
page read and write
188E3FF000
stack
page read and write
169A000
heap
page read and write
5000000
direct allocation
page execute and read and write
1F80F0B1000
trusted library allocation
page read and write
2DB0000
direct allocation
page read and write
27F66E70000
heap
page read and write
4681000
heap
page read and write
4EF1000
heap
page read and write
630000
heap
page read and write
4F8D000
trusted library allocation
page execute and read and write
50F0000
direct allocation
page execute and read and write
10A0000
heap
page read and write
4EF1000
heap
page read and write
1480000
heap
page read and write
1F817887000
trusted library allocation
page read and write
1F81103D000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
6351000
trusted library allocation
page read and write
EE4000
heap
page read and write
F54000
heap
page read and write
10A7000
heap
page read and write
523B000
trusted library allocation
page read and write
303F000
stack
page read and write
59BD000
trusted library allocation
page read and write
27F67310000
trusted library allocation
page read and write
A50000
direct allocation
page read and write
860000
direct allocation
page read and write
48CE000
stack
page read and write
1F8160BA000
trusted library allocation
page read and write
4681000
heap
page read and write
2AE09176000
trusted library allocation
page read and write
1F87F5DA000
trusted library allocation
page read and write
FCA000
heap
page read and write
BB0000
unkown
page readonly
27F6743D000
trusted library allocation
page read and write
6060000
trusted library allocation
page read and write
D84000
unkown
page execute and write copy
4BC1000
heap
page read and write
564000
heap
page read and write
4BC1000
heap
page read and write
5AC1000
trusted library allocation
page read and write
5370000
direct allocation
page read and write
EDB000
unkown
page execute and read and write
564000
heap
page read and write
5AEE000
trusted library allocation
page read and write
4EF1000
heap
page read and write
6240000
trusted library allocation
page read and write
3F9E000
stack
page read and write
59EC000
trusted library allocation
page read and write
42EE000
stack
page read and write
4B11000
heap
page read and write
1F87F7BA000
trusted library allocation
page read and write
5F33000
trusted library allocation
page read and write
526D000
trusted library allocation
page read and write
B11000
unkown
page execute and write copy
8D0000
unkown
page execute and write copy
5FCE000
trusted library allocation
page read and write
2AE09AF8000
trusted library allocation
page read and write
2AE091D3000
trusted library allocation
page read and write
4FA0000
direct allocation
page read and write
1124000
heap
page read and write
2AE091F7000
trusted library allocation
page read and write
5F1A000
trusted library allocation
page read and write
59E7000
trusted library allocation
page read and write
4BC1000
heap
page read and write
39CE000
stack
page read and write
1645000
heap
page read and write
4E51000
heap
page read and write
1F87F766000
trusted library allocation
page read and write
4F91000
heap
page read and write
6AEE000
stack
page read and write
3E8F000
stack
page read and write
6057000
trusted library allocation
page read and write
5AA8000
trusted library allocation
page read and write
5180000
heap
page read and write
5F64000
trusted library allocation
page read and write
1F87FBFD000
trusted library allocation
page read and write
59E7000
trusted library allocation
page read and write
1080000
heap
page read and write
1F80DAEF000
trusted library allocation
page read and write
5367000
trusted library allocation
page read and write
524C000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
121B000
heap
page read and write
1F81620A000
trusted library allocation
page read and write
1F87F381000
trusted library allocation
page read and write
748D000
stack
page read and write
644000
heap
page read and write
5F8E000
trusted library allocation
page read and write
4681000
heap
page read and write
63FA000
trusted library allocation
page read and write
4E51000
heap
page read and write
317F000
stack
page read and write
2AE091F0000
trusted library allocation
page read and write
522A000
trusted library allocation
page read and write
2AE09AFC000
trusted library allocation
page read and write
41DF000
stack
page read and write
384F000
stack
page read and write
4BC1000
heap
page read and write
AAD49FE000
stack
page read and write
5AEE000
trusted library allocation
page read and write
1124000
heap
page read and write
2AE7FCD6000
heap
page read and write
2AE091DB000
trusted library allocation
page read and write
59DB000
trusted library allocation
page read and write
5000000
direct allocation
page execute and read and write
870000
unkown
page readonly
5238000
trusted library allocation
page read and write
1F810BB1000
trusted library allocation
page read and write
EE4000
heap
page read and write
5CA8000
trusted library allocation
page read and write
1F87FBFD000
trusted library allocation
page read and write
59C3000
trusted library allocation
page read and write
1F80D9EB000
trusted library allocation
page read and write
4E40000
direct allocation
page read and write
5E41000
trusted library allocation
page read and write
30A0000
direct allocation
page read and write
5F1F000
trusted library allocation
page read and write
534F000
stack
page read and write
7F0000
heap
page read and write
5265000
trusted library allocation
page read and write
860000
direct allocation
page read and write
22908F9A000
heap
page read and write
860000
direct allocation
page read and write
4681000
heap
page read and write
123E000
stack
page read and write
1F80E271000
trusted library allocation
page read and write
AB4000
heap
page read and write
4D81000
heap
page read and write
56B6000
trusted library allocation
page read and write
58EA000
trusted library allocation
page read and write
AB4000
heap
page read and write
5CA2000
trusted library allocation
page read and write
1F80D565000
trusted library allocation
page read and write
A8E000
unkown
page execute and read and write
5FCC000
trusted library allocation
page read and write
507E000
stack
page read and write
4BC1000
heap
page read and write
6069000
trusted library allocation
page read and write
5AB9000
trusted library allocation
page read and write
54F0000
direct allocation
page execute and read and write
59D6000
trusted library allocation
page read and write
41BE000
stack
page read and write
4EF1000
heap
page read and write
63FA000
trusted library allocation
page read and write
45C000
unkown
page readonly
4681000
heap
page read and write
63F7000
trusted library allocation
page read and write
1F80DEE0000
trusted library allocation
page read and write
4AB4000
trusted library allocation
page read and write
2AE0915A000
trusted library allocation
page read and write
4BC1000
heap
page read and write
AB4000
heap
page read and write
122C000
unkown
page readonly
121B000
heap
page read and write
5061000
heap
page read and write
4EF1000
heap
page read and write
2AE7FCD6000
heap
page read and write
56BA000
trusted library allocation
page read and write
31E0000
direct allocation
page execute and read and write
1F87F76A000
trusted library allocation
page read and write
5061000
heap
page read and write
407F000
stack
page read and write
1F87FC77000
trusted library allocation
page read and write
EE4000
heap
page read and write
16A4000
heap
page read and write
4C7E000
stack
page read and write
1124000
heap
page read and write
5D71000
trusted library allocation
page read and write
1F87FBF8000
trusted library allocation
page read and write
4BC1000
heap
page read and write
5AA5000
trusted library allocation
page read and write
56B7000
trusted library allocation
page read and write
4FF000
stack
page read and write
FD0000
unkown
page readonly
5050000
direct allocation
page read and write
6051000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
1124000
heap
page read and write
14A0000
heap
page read and write
7BB000
heap
page read and write
FDF000
stack
page read and write
1F87FF96000
trusted library allocation
page read and write
1AFBF000
stack
page read and write
5AA1000
trusted library allocation
page read and write
1D2EE000
stack
page read and write
6052000
trusted library allocation
page read and write
3981000
heap
page read and write
384F000
stack
page read and write
4681000
heap
page read and write
5F63000
trusted library allocation
page read and write
2AE7FEDF000
trusted library allocation
page read and write
3280000
direct allocation
page read and write
137B000
heap
page read and write
6490000
trusted library allocation
page read and write
1F810A6D000
trusted library allocation
page read and write
5329000
trusted library allocation
page read and write
6575000
trusted library allocation
page read and write
5261000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
309F000
stack
page read and write
5560000
direct allocation
page execute and read and write
E84000
unkown
page execute and read and write
27F673EB000
trusted library allocation
page read and write
506E000
stack
page read and write
16D4000
heap
page read and write
22908F2B000
heap
page read and write
1F87F46D000
trusted library allocation
page read and write
4DF1000
heap
page read and write
6561000
trusted library allocation
page read and write
5F7F000
trusted library allocation
page read and write
5232000
trusted library allocation
page read and write
1F87F4DD000
trusted library allocation
page read and write
4B11000
heap
page read and write
F54000
heap
page read and write
418F000
stack
page read and write
1D6BD000
stack
page read and write
2AE11716000
trusted library allocation
page read and write
34CE000
stack
page read and write
5FB9000
trusted library allocation
page read and write
53D0000
direct allocation
page execute and read and write
29FC000
stack
page read and write
1CF6F000
stack
page read and write
624B000
trusted library allocation
page read and write
348F000
stack
page read and write
368E000
stack
page read and write
2AE09176000
trusted library allocation
page read and write
3C4E000
stack
page read and write
527E000
trusted library allocation
page read and write
13A4000
heap
page read and write
2AE7FECA000
trusted library allocation
page read and write
51F0000
direct allocation
page execute and read and write
5AD7000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1F87F465000
trusted library allocation
page read and write
22908F6B000
heap
page read and write
4681000
heap
page read and write
3A0F000
stack
page read and write
64CE000
trusted library allocation
page read and write
13B0000
direct allocation
page read and write
5420000
direct allocation
page read and write
644000
heap
page read and write
22908E85000
heap
page read and write
134D000
heap
page read and write
5CA5000
trusted library allocation
page read and write
1F87FFAE000
trusted library allocation
page read and write
5FBD000
trusted library allocation
page read and write
2AE09AF4000
trusted library allocation
page read and write
478E000
stack
page read and write
526F000
trusted library allocation
page read and write
5353000
trusted library allocation
page read and write
1F816214000
trusted library allocation
page read and write
14DF000
heap
page read and write
1694000
heap
page read and write
120E000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
58B6000
trusted library allocation
page read and write
B00000
direct allocation
page read and write
605D000
trusted library allocation
page read and write
56B7000
trusted library allocation
page read and write
49E0000
direct allocation
page read and write
2AE7FEC0000
trusted library allocation
page read and write
523E000
stack
page read and write
5329000
trusted library allocation
page read and write
13A4000
heap
page read and write
32DF000
stack
page read and write
4B11000
heap
page read and write
5FA9000
trusted library allocation
page read and write
492E000
stack
page read and write
4E40000
direct allocation
page read and write
27F66FF0000
heap
page read and write
2AE7FE98000
trusted library allocation
page read and write
1F80E9FD000
trusted library allocation
page read and write
4BC1000
heap
page read and write
4EF1000
heap
page read and write
188EBFF000
stack
page read and write
1212000
heap
page read and write
2AE0915A000
trusted library allocation
page read and write
1F810ADB000
trusted library allocation
page read and write
13A4000
heap
page read and write
32CE000
stack
page read and write
13A4000
heap
page read and write
58DF000
trusted library allocation
page read and write
1F80AEA4000
trusted library allocation
page read and write
160B000
heap
page read and write
3CBF000
stack
page read and write
A37000
unkown
page execute and write copy
53D0000
direct allocation
page execute and read and write
8ED000
unkown
page execute and read and write
57FB000
trusted library allocation
page read and write
1F816094000
trusted library allocation
page read and write
4681000
heap
page read and write
1380000
heap
page read and write
3C8F000
stack
page read and write
2AE7FCCF000
heap
page read and write
5AD7000
trusted library allocation
page read and write
5F92000
trusted library allocation
page read and write
4681000
heap
page read and write
1F8160C9000
trusted library allocation
page read and write
8F4FFFF000
stack
page read and write
5FBB000
trusted library allocation
page read and write
4DA000
unkown
page execute and write copy
46A0000
heap
page read and write
1124000
heap
page read and write
2AE09172000
trusted library allocation
page read and write
4D80000
heap
page read and write
65D7000
trusted library allocation
page read and write
31F7000
heap
page read and write
4D81000
heap
page read and write
121E000
heap
page read and write
120E000
stack
page read and write
64EF000
trusted library allocation
page read and write
27F67360000
trusted library allocation
page read and write
4E70000
direct allocation
page execute and read and write
653D000
trusted library allocation
page read and write
510E000
stack
page read and write
3981000
heap
page read and write
1F87F782000
trusted library allocation
page read and write
2290825F000
trusted library allocation
page read and write
2AE0D2F9000
trusted library allocation
page read and write
520000
unkown
page execute and read and write
1124000
heap
page read and write
56B2000
trusted library allocation
page read and write
353E000
stack
page read and write
77E000
heap
page read and write
53D1000
direct allocation
page read and write
4BC1000
heap
page read and write
305F000
stack
page read and write
13A4000
heap
page read and write
5FB6000
trusted library allocation
page read and write
4B11000
heap
page read and write
4681000
heap
page read and write
4681000
heap
page read and write
12F5000
heap
page read and write
1F8160FD000
trusted library allocation
page read and write
22908F28000
heap
page read and write
1D4A0000
heap
page read and write
2AE08F6D000
trusted library allocation
page read and write
1698000
heap
page read and write
1F87F7B6000
trusted library allocation
page read and write
5771000
trusted library allocation
page read and write
564000
heap
page read and write
5791000
trusted library allocation
page read and write
3180000
direct allocation
page read and write
31A7000
heap
page read and write
27F66C00000
unclassified section
page readonly
3280000
direct allocation
page read and write
6257000
trusted library allocation
page read and write
5F6F000
trusted library allocation
page read and write
1334000
heap
page read and write
4681000
heap
page read and write
5292000
trusted library allocation
page read and write
3E0E000
stack
page read and write
644000
heap
page read and write
30C0000
heap
page read and write
457F000
stack
page read and write
5223000
trusted library allocation
page read and write
2E5F000
stack
page read and write
1564000
heap
page read and write
63FE000
trusted library allocation
page read and write
5A4000
unkown
page execute and write copy
59B1000
trusted library allocation
page read and write
3981000
heap
page read and write
14D2000
heap
page read and write
3ACF000
stack
page read and write
5E47000
trusted library allocation
page read and write
57E6000
trusted library allocation
page read and write
1F87FCBD000
trusted library allocation
page read and write
DEF000
stack
page read and write
76F8000
heap
page read and write
2AE063E5000
trusted library allocation
page read and write
2AE0885F000
trusted library allocation
page read and write
59D6000
trusted library allocation
page read and write
1F87E8EF000
trusted library allocation
page read and write
5245000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
4B11000
heap
page read and write
11CE000
stack
page read and write
46CE000
stack
page read and write
644000
heap
page read and write
146F000
stack
page read and write
5AB8000
trusted library allocation
page read and write
2AE091B1000
trusted library allocation
page read and write
D1F000
unkown
page execute and read and write
5318000
trusted library allocation
page read and write
59DB000
trusted library allocation
page read and write
B70000
unkown
page read and write
27F67396000
trusted library allocation
page read and write
64BF000
trusted library allocation
page read and write
1124000
heap
page read and write
5F98000
trusted library allocation
page read and write
ABF000
unkown
page execute and read and write
11AE000
stack
page read and write
1F8164F3000
trusted library allocation
page read and write
1F810B91000
trusted library allocation
page read and write
59A5000
trusted library allocation
page read and write
4F3000
unkown
page execute and write copy
6301000
trusted library allocation
page read and write
37BE000
stack
page read and write
4FA0000
direct allocation
page read and write
1334000
heap
page read and write
56BC000
trusted library allocation
page read and write
4D81000
heap
page read and write
1F87F45F000
trusted library allocation
page read and write
27F67419000
trusted library allocation
page read and write
409F000
stack
page read and write
63FA000
trusted library allocation
page read and write
59A2000
trusted library allocation
page read and write
5232000
trusted library allocation
page read and write
AB4000
heap
page read and write
44BF000
stack
page read and write
27F66C70000
remote allocation
page read and write
11DB000
stack
page read and write
1357000
heap
page read and write
3C1E000
stack
page read and write
59D6000
trusted library allocation
page read and write
F54000
heap
page read and write
4B11000
heap
page read and write
2AE095F6000
trusted library allocation
page read and write
522E000
trusted library allocation
page read and write
E93000
unkown
page execute and read and write
3C0000
unkown
page readonly
5AA7000
trusted library allocation
page read and write
A36000
unkown
page execute and write copy
5EF6000
trusted library allocation
page read and write
1124000
heap
page read and write
5FA5000
trusted library allocation
page read and write
10CC000
stack
page read and write
3190000
direct allocation
page execute and read and write
16A4000
heap
page read and write
2AE7FCD0000
heap
page read and write
4B11000
heap
page read and write
1F810AB6000
trusted library allocation
page read and write
1F810ADB000
trusted library allocation
page read and write
1394000
heap
page read and write
5AD9000
trusted library allocation
page read and write
521000
unkown
page execute and write copy
15AE000
stack
page read and write
4D81000
heap
page read and write
6047000
trusted library allocation
page read and write
1F816099000
trusted library allocation
page read and write
3B2F000
stack
page read and write
28BE000
stack
page read and write
1124000
heap
page read and write
E33000
unkown
page execute and write copy
3FFE000
stack
page read and write
A50000
direct allocation
page read and write
2AE0D2E4000
trusted library allocation
page read and write
5F1B000
trusted library allocation
page read and write
1F80E96C000
trusted library allocation
page read and write
22908F31000
heap
page read and write
4F80000
direct allocation
page read and write
1A08B63D000
heap
page read and write
4EF1000
heap
page read and write
15E0000
heap
page read and write
1443000
heap
page read and write
3A7E000
stack
page read and write
1F80F083000
trusted library allocation
page read and write
5050000
direct allocation
page read and write
1334000
heap
page read and write
4681000
heap
page read and write
2AE0915F000
trusted library allocation
page read and write
56BD000
trusted library allocation
page read and write
463E000
stack
page read and write
2B3E000
stack
page read and write
810000
direct allocation
page read and write
22907EF0000
heap
page read and write
4F2000
unkown
page execute and read and write
3090000
heap
page read and write
27F66C10000
unclassified section
page readonly
A14000
heap
page read and write
4DF1000
heap
page read and write
1D38E000
stack
page read and write
1F87F753000
trusted library allocation
page read and write
2AE091FD000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
334F000
stack
page read and write
442D000
stack
page read and write
F54000
heap
page read and write
D61000
unkown
page execute and read and write
1F8160FB000
trusted library allocation
page read and write
5750000
trusted library allocation
page read and write
27F66C86000
remote allocation
page execute read
5E40000
trusted library allocation
page read and write
494000
unkown
page readonly
460E000
stack
page read and write
1F810BD2000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
4EF1000
heap
page read and write
2AE08963000
trusted library allocation
page read and write
1124000
heap
page read and write
644000
heap
page read and write
475E000
stack
page read and write
5550000
direct allocation
page execute and read and write
644000
heap
page read and write
4BC1000
heap
page read and write
5FAA000
trusted library allocation
page read and write
1F87F46F000
trusted library allocation
page read and write
5354000
trusted library allocation
page read and write
22908F2B000
heap
page read and write
798000
heap
page read and write
548F000
stack
page read and write
402F000
stack
page read and write
5263000
trusted library allocation
page read and write
5252000
trusted library allocation
page read and write
1550000
direct allocation
page read and write
3C1000
unkown
page execute read
1F810BF1000
trusted library allocation
page read and write
364F000
stack
page read and write
630E000
trusted library allocation
page read and write
527D000
trusted library allocation
page read and write
2AE091FD000
trusted library allocation
page read and write
1F87F4D1000
trusted library allocation
page read and write
4681000
heap
page read and write
49E0000
direct allocation
page read and write
1F80E9CE000
trusted library allocation
page read and write
16A4000
heap
page read and write
1212000
heap
page read and write
5AB9000
trusted library allocation
page read and write
5E44000
trusted library allocation
page read and write
2AE0910A000
trusted library allocation
page read and write
1F80F0AD000
trusted library allocation
page read and write
531A000
trusted library allocation
page read and write
7A7000
heap
page read and write
14A4000
heap
page read and write
5352000
trusted library allocation
page read and write
2AE7FCD0000
heap
page read and write
1B11F000
stack
page read and write
1550000
direct allocation
page read and write
5E4A000
trusted library allocation
page read and write
1F80E4C7000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
5F97000
trusted library allocation
page read and write
78D000
heap
page read and write
59C3000
trusted library allocation
page read and write
147E000
stack
page read and write
5E48000
trusted library allocation
page read and write
5F38000
trusted library allocation
page read and write
2AE7FCD6000
heap
page read and write
564000
heap
page read and write
5F5B000
trusted library allocation
page read and write
4BC1000
heap
page read and write
3584000
heap
page read and write
2AE0915E000
trusted library allocation
page read and write
522E000
trusted library allocation
page read and write
5A2000
unkown
page execute and write copy
4EF1000
heap
page read and write
1630000
heap
page read and write
1124000
heap
page read and write
5EE2000
trusted library allocation
page read and write
1F8160BE000
trusted library allocation
page read and write
1A08B5A0000
heap
page read and write
1124000
heap
page read and write
5A16000
trusted library allocation
page read and write
564000
heap
page read and write
56BC000
trusted library allocation
page read and write
AB4000
heap
page read and write
5FBB000
trusted library allocation
page read and write
27F67365000
trusted library allocation
page read and write
51A0000
direct allocation
page execute and read and write
4681000
heap
page read and write
4681000
heap
page read and write
4E51000
heap
page read and write
317F000
stack
page read and write
E24000
unkown
page execute and read and write
64DE000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
AB4000
heap
page read and write
1124000
heap
page read and write
2AE091E1000
trusted library allocation
page read and write
A4F000
unkown
page execute and write copy
5AA1000
trusted library allocation
page read and write
2AE7FEA6000
trusted library allocation
page read and write
1F8178BD000
trusted library allocation
page read and write
5279000
trusted library allocation
page read and write
E93000
unkown
page execute and write copy
30A0000
direct allocation
page read and write
1F810B8D000
trusted library allocation
page read and write
4F91000
heap
page read and write
EE4000
heap
page read and write
6AAC000
stack
page read and write
41AE000
stack
page read and write
45C000
unkown
page readonly
1F811673000
trusted library allocation
page read and write
6253000
trusted library allocation
page read and write
2AE7FEB3000
trusted library allocation
page read and write
1680000
heap
page read and write
549000
unkown
page execute and read and write
787000
heap
page read and write
4681000
heap
page read and write
2290807F000
unclassified section
page read and write
4BC1000
heap
page read and write
4681000
heap
page read and write
644000
heap
page read and write
4681000
heap
page read and write
F54000
heap
page read and write
4B11000
heap
page read and write
350F000
stack
page read and write
A50000
direct allocation
page read and write
320F000
stack
page read and write
1124000
heap
page read and write
5FCF000
trusted library allocation
page read and write
6564000
trusted library allocation
page read and write
4D81000
heap
page read and write
4BC1000
heap
page read and write
1F815E71000
trusted library allocation
page read and write
1334000
heap
page read and write
36BE000
stack
page read and write
3D4F000
stack
page read and write
64CA000
trusted library allocation
page read and write
1F87FBEB000
trusted library allocation
page read and write
59A4000
trusted library allocation
page read and write
137B000
heap
page read and write
27F6736E000
trusted library allocation
page read and write
1124000
heap
page read and write
4FF0000
trusted library allocation
page read and write
D74000
unkown
page execute and read and write
1A08B627000
heap
page read and write
55A0000
direct allocation
page execute and read and write
5F99000
trusted library allocation
page read and write
A14000
heap
page read and write
27F673C8000
trusted library allocation
page read and write
5349000
trusted library allocation
page read and write
5E48000
trusted library allocation
page read and write
4681000
heap
page read and write
5400000
direct allocation
page execute and read and write
5AC1000
trusted library allocation
page read and write
31FB000
heap
page read and write
1394000
heap
page read and write
10F0000
unkown
page execute and write copy
4B11000
heap
page read and write
7B2000
heap
page read and write
13B0000
direct allocation
page read and write
2DB0000
direct allocation
page read and write
5A17000
trusted library allocation
page read and write
8FD000
stack
page read and write
54B0000
direct allocation
page execute and read and write
53AF000
stack
page read and write
3B6E000
stack
page read and write
1DCD7BE0000
heap
page read and write
2AE0917B000
trusted library allocation
page read and write
B10000
unkown
page read and write
1F80E9A6000
trusted library allocation
page read and write
1D254000
heap
page read and write
11FE000
heap
page read and write
564000
heap
page read and write
229082C2000
trusted library allocation
page read and write
F28000
unkown
page execute and read and write
7A7000
heap
page read and write
5AC1000
trusted library allocation
page read and write
13B0000
direct allocation
page read and write
5A2F000
trusted library allocation
page read and write
2AE7FCD6000
heap
page read and write
59CE000
trusted library allocation
page read and write
F54000
heap
page read and write
59C9000
trusted library allocation
page read and write
494000
unkown
page readonly
1F80E957000
trusted library allocation
page read and write
59C3000
trusted library allocation
page read and write
4681000
heap
page read and write
2AE089DC000
trusted library allocation
page read and write
1F87E8E6000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
AB4000
heap
page read and write
1F87FBF5000
trusted library allocation
page read and write
457E000
stack
page read and write
487F000
stack
page read and write
5AEE000
trusted library allocation
page read and write
63F4000
trusted library allocation
page read and write
445F000
stack
page read and write
5500000
direct allocation
page execute and read and write
42BF000
stack
page read and write
54E0000
direct allocation
page execute and read and write
5F3C000
trusted library allocation
page read and write
1CE4F000
stack
page read and write
5AE9000
trusted library allocation
page read and write
45BE000
stack
page read and write
5130000
trusted library allocation
page read and write
1124000
heap
page read and write
2AE091B1000
trusted library allocation
page read and write
522A000
trusted library allocation
page read and write
5329000
trusted library allocation
page read and write
AB4000
heap
page read and write
229088F0000
heap
page read and write
A50000
direct allocation
page read and write
151E000
stack
page read and write
533A000
trusted library allocation
page read and write
5AB8000
trusted library allocation
page read and write
22908FB9000
heap
page read and write
4B11000
heap
page read and write
1124000
heap
page read and write
4E40000
direct allocation
page read and write
5000000
direct allocation
page execute and read and write
16AD000
heap
page read and write
5329000
trusted library allocation
page read and write
1CE9E000
stack
page read and write
4B9000
unkown
page execute and write copy
2AE09AF4000
trusted library allocation
page read and write
4861000
heap
page read and write
22908F85000
heap
page read and write
4BA000
unkown
page execute and read and write
5AA1000
trusted library allocation
page read and write
624A000
trusted library allocation
page read and write
1F80EE7E000
trusted library allocation
page read and write
122A000
heap
page read and write
4BC1000
heap
page read and write
404F000
stack
page read and write
39BE000
stack
page read and write
2AE7FCD0000
heap
page read and write
4D81000
heap
page read and write
1F80D58D000
trusted library allocation
page read and write
5AD9000
trusted library allocation
page read and write
59CE000
trusted library allocation
page read and write
2AE091AD000
trusted library allocation
page read and write
1A08B658000
heap
page read and write
5F9C000
trusted library allocation
page read and write
5590000
direct allocation
page execute and read and write
1D42E000
stack
page read and write
1F810ABE000
trusted library allocation
page read and write
1321000
heap
page read and write
1124000
heap
page read and write
8F4CFFA000
stack
page read and write
5F9C000
trusted library allocation
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
59CD000
trusted library allocation
page read and write
5AA8000
trusted library allocation
page read and write
721000
heap
page read and write
1212000
heap
page read and write
27F6735B000
trusted library allocation
page read and write
4E51000
heap
page read and write
4DEF000
stack
page read and write
4BC1000
heap
page read and write
4681000
heap
page read and write
524D000
trusted library allocation
page read and write
5AA6000
trusted library allocation
page read and write
1124000
heap
page read and write
4681000
heap
page read and write
4F90000
trusted library allocation
page read and write
F54000
heap
page read and write
593000
unkown
page execute and write copy
5351000
trusted library allocation
page read and write
3C0000
unkown
page readonly
2AE091A2000
trusted library allocation
page read and write
35DE000
stack
page read and write
50A1000
direct allocation
page read and write
1A08B800000
trusted library allocation
page read and write
4F80000
direct allocation
page read and write
644000
heap
page read and write
3A2E000
stack
page read and write
5F78000
trusted library allocation
page read and write
403F000
stack
page read and write
1394000
heap
page read and write
2AE7FCD0000
heap
page read and write
AAD623E000
stack
page read and write
3D4F000
stack
page read and write
830000
unkown
page read and write
1CFAE000
stack
page read and write
4BC1000
heap
page read and write
64BB000
trusted library allocation
page read and write
22908F40000
heap
page read and write
D83000
unkown
page execute and write copy
A60000
unkown
page read and write
6EF0000
trusted library allocation
page read and write
D83000
unkown
page execute and read and write
564000
heap
page read and write
31DE000
stack
page read and write
1F81623F000
trusted library allocation
page read and write
3E5E000
stack
page read and write
5F80000
trusted library allocation
page read and write
49F1000
heap
page read and write
2AE7FCD0000
heap
page read and write
6311000
trusted library allocation
page read and write
121E000
heap
page read and write
4D81000
heap
page read and write
22908268000
trusted library allocation
page read and write
64DE000
stack
page read and write
1A08B7D0000
heap
page read and write
5262000
trusted library allocation
page read and write
B50000
unkown
page execute and write copy
4BC1000
heap
page read and write
59D6000
trusted library allocation
page read and write
5311000
trusted library allocation
page read and write
5894000
trusted library allocation
page read and write
4681000
heap
page read and write
5460000
direct allocation
page execute and read and write
522C000
trusted library allocation
page read and write
2AE0B7E7000
trusted library allocation
page read and write
644000
heap
page read and write
2AE062AB000
trusted library allocation
page read and write
4EF1000
heap
page read and write
524C000
trusted library allocation
page read and write
16AA000
heap
page read and write
340E000
stack
page read and write
1124000
heap
page read and write
B00000
direct allocation
page read and write
307E000
stack
page read and write
5223000
trusted library allocation
page read and write
1D35C000
stack
page read and write
4E1F000
stack
page read and write
1F87F717000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
1F810BD7000
trusted library allocation
page read and write
4681000
heap
page read and write
A14000
heap
page read and write
13A4000
heap
page read and write
4EF1000
heap
page read and write
1334000
heap
page read and write
4B11000
heap
page read and write
229082BB000
trusted library allocation
page read and write
59FD000
trusted library allocation
page read and write
43BD000
stack
page read and write
1F87F7D7000
trusted library allocation
page read and write
59A7000
trusted library allocation
page read and write
59CD000
trusted library allocation
page read and write
1124000
heap
page read and write
14A4000
heap
page read and write
624A000
trusted library allocation
page read and write
63F1000
trusted library allocation
page read and write
1F80AE33000
trusted library allocation
page read and write
139C000
stack
page read and write
56BA000
trusted library allocation
page read and write
13A4000
heap
page read and write
EE4000
heap
page read and write
1211000
heap
page read and write
4F80000
direct allocation
page read and write
5F66000
trusted library allocation
page read and write
644000
heap
page read and write
810000
direct allocation
page read and write
1F80E6ED000
trusted library allocation
page read and write
1F3C5E00000
trusted library allocation
page read and write
113D000
stack
page read and write
188F3FF000
stack
page read and write
59A7000
trusted library allocation
page read and write
2AE0909A000
trusted library allocation
page read and write
1F87FFB2000
trusted library allocation
page read and write
523B000
trusted library allocation
page read and write
16B9000
heap
page read and write
EE4000
heap
page read and write
4740000
direct allocation
page read and write
2AFF000
stack
page read and write
2AE09163000
trusted library allocation
page read and write
1F80E9E0000
trusted library allocation
page read and write
53B0000
direct allocation
page execute and read and write
1F87F5B5000
trusted library allocation
page read and write
5061000
heap
page read and write
2AE095E6000
trusted library allocation
page read and write
1124000
heap
page read and write
A14000
heap
page read and write
13B0000
direct allocation
page read and write
1124000
heap
page read and write
1F87FCD5000
trusted library allocation
page read and write
A14000
heap
page read and write
5AD7000
trusted library allocation
page read and write
5793000
trusted library allocation
page read and write
331F000
stack
page read and write
127A000
heap
page read and write
5264000
trusted library allocation
page read and write
64FD000
trusted library allocation
page read and write
72B000
heap
page read and write
49F1000
heap
page read and write
64D9000
trusted library allocation
page read and write
59B8000
trusted library allocation
page read and write
1347000
heap
page read and write
2AE09133000
trusted library allocation
page read and write
482000
unkown
page readonly
4EE0000
direct allocation
page read and write
564000
heap
page read and write
6071000
trusted library allocation
page read and write
1280000
heap
page read and write
5F7C000
trusted library allocation
page read and write
5050000
direct allocation
page read and write
4EF1000
heap
page read and write
16D4000
heap
page read and write
5227000
trusted library allocation
page read and write
27F6741C000
trusted library allocation
page read and write
564000
heap
page read and write
2AE7FCD6000
heap
page read and write
55A0000
direct allocation
page execute and read and write
1F8117DB000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1F87E8DD000
trusted library allocation
page read and write
53D0000
direct allocation
page execute and read and write
522A000
trusted library allocation
page read and write
4681000
heap
page read and write
2AE095D2000
trusted library allocation
page read and write
3280000
direct allocation
page read and write
45DE000
stack
page read and write
4EF1000
heap
page read and write
A50000
direct allocation
page read and write
5AEE000
trusted library allocation
page read and write
16A4000
heap
page read and write
E10000
unkown
page readonly
2AE0D255000
trusted library allocation
page read and write
51B0000
direct allocation
page read and write
E70000
unkown
page execute and write copy
464E000
stack
page read and write
62EE000
trusted library allocation
page read and write
810000
direct allocation
page read and write
55A0000
direct allocation
page execute and read and write
13A4000
heap
page read and write
1307000
heap
page read and write
705000
heap
page read and write
2AE7FCD6000
heap
page read and write
59BF000
trusted library allocation
page read and write
4681000
heap
page read and write
6242000
trusted library allocation
page read and write
61AC000
trusted library allocation
page read and write
2DB0000
direct allocation
page read and write
4BC1000
heap
page read and write
1222000
heap
page read and write
C41DDEB000
stack
page read and write
1A08D1A0000
heap
page read and write
22908000000
heap
page read and write
1F87FC89000
trusted library allocation
page read and write
10B7000
heap
page read and write
13A4000
heap
page read and write
4FFA000
trusted library allocation
page execute and read and write
7BB000
heap
page read and write
1F80E995000
trusted library allocation
page read and write
1124000
heap
page read and write
229087B5000
unkown
page execute read
4681000
heap
page read and write
229087B1000
unkown
page execute read
5238000
trusted library allocation
page read and write
1212000
heap
page read and write
A14000
heap
page read and write
4BC1000
heap
page read and write
22907E60000
unclassified section
page readonly
54D0000
direct allocation
page execute and read and write
59BE000
trusted library allocation
page read and write
1F80E931000
trusted library allocation
page read and write
306000
unkown
page write copy
4681000
heap
page read and write
4D81000
heap
page read and write
1F815E76000
trusted library allocation
page read and write
4BC1000
heap
page read and write
2AE0916F000
trusted library allocation
page read and write
64B4000
trusted library allocation
page read and write
525E000
trusted library allocation
page read and write
1F810B8D000
trusted library allocation
page read and write
16D4000
heap
page read and write
1F80AEE6000
trusted library allocation
page read and write
5329000
trusted library allocation
page read and write
435F000
stack
page read and write
719000
heap
page read and write
2AE062FD000
trusted library allocation
page read and write
564000
heap
page read and write
1F80E6CC000
trusted library allocation
page read and write
4BD0000
heap
page read and write
A27000
unkown
page execute and read and write
1F80D64E000
trusted library allocation
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
40BE000
stack
page read and write
4681000
heap
page read and write
E94000
unkown
page execute and write copy
564000
heap
page read and write
2AE091F7000
trusted library allocation
page read and write
AB4000
heap
page read and write
30A0000
direct allocation
page read and write
1F3C5BC9000
heap
page read and write
46BF000
stack
page read and write
5F79000
trusted library allocation
page read and write
4DF1000
heap
page read and write
2AE091E1000
trusted library allocation
page read and write
4681000
heap
page read and write
4F80000
direct allocation
page read and write
27F67400000
trusted library allocation
page read and write
5050000
direct allocation
page execute and read and write
454F000
stack
page read and write
5263000
trusted library allocation
page read and write
1F87F424000
trusted library allocation
page read and write
F54000
heap
page read and write
4B11000
heap
page read and write
4D1E000
stack
page read and write
4EF1000
heap
page read and write
5F8C000
trusted library allocation
page read and write
CBC000
stack
page read and write
64E4000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
438F000
stack
page read and write
5771000
trusted library allocation
page read and write
59A1000
trusted library allocation
page read and write
4BC1000
heap
page read and write
564000
heap
page read and write
14D1000
heap
page read and write
1334000
heap
page read and write
1F87F76A000
trusted library allocation
page read and write
4EF1000
heap
page read and write
4EF1000
heap
page read and write
40DF000
stack
page read and write
2AE7FE9E000
trusted library allocation
page read and write
2AE063AC000
trusted library allocation
page read and write
49E0000
direct allocation
page read and write
16AC000
heap
page read and write
1F87F71A000
trusted library allocation
page read and write
524C000
trusted library allocation
page read and write
1F80E269000
trusted library allocation
page read and write
1F87FFA4000
trusted library allocation
page read and write
371E000
stack
page read and write
423F000
stack
page read and write
1282000
heap
page read and write
5210000
direct allocation
page execute and read and write
C41F7FE000
stack
page read and write
57D5000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
2AE0915A000
trusted library allocation
page read and write
1F87F5FD000
trusted library allocation
page read and write
5E43000
trusted library allocation
page read and write
A14000
heap
page read and write
59A3000
trusted library allocation
page read and write
4BC1000
trusted library allocation
page read and write
5F14000
trusted library allocation
page read and write
2AE095EE000
trusted library allocation
page read and write
4EF1000
heap
page read and write
360E000
stack
page read and write
5AC1000
trusted library allocation
page read and write
EE0000
heap
page read and write
5CA4000
trusted library allocation
page read and write
482000
unkown
page readonly
122B000
heap
page read and write
2AE0D29A000
trusted library allocation
page read and write
4EF1000
heap
page read and write
AB4000
heap
page read and write
13B0000
direct allocation
page read and write
2AE0882B000
trusted library allocation
page read and write
564000
heap
page read and write
2AE091E1000
trusted library allocation
page read and write
BDB000
unkown
page execute and read and write
63F8000
trusted library allocation
page read and write
4EF1000
heap
page read and write
1F80F05E000
trusted library allocation
page read and write
494000
unkown
page readonly
731000
heap
page read and write
5F19000
trusted library allocation
page read and write
13A0000
heap
page read and write
659D000
trusted library allocation
page read and write
4A6000
unkown
page execute and read and write
4EF1000
heap
page read and write
359E000
stack
page read and write
5FC8000
trusted library allocation
page read and write
63F1000
trusted library allocation
page read and write
4E51000
heap
page read and write
2AE091FD000
trusted library allocation
page read and write
B70000
unkown
page read and write
2AE095CA000
trusted library allocation
page read and write
5223000
trusted library allocation
page read and write
1550000
direct allocation
page read and write
4681000
heap
page read and write
4BB5000
trusted library allocation
page read and write
4BC1000
heap
page read and write
5AD4000
trusted library allocation
page read and write
1D10E000
stack
page read and write
527D000
trusted library allocation
page read and write
3D8E000
stack
page read and write
33EE000
stack
page read and write
3C3E000
stack
page read and write
2AE095E6000
trusted library allocation
page read and write
13A4000
heap
page read and write
229087E0000
trusted library section
page read and write
5A0C000
trusted library allocation
page read and write
38FE000
stack
page read and write
1697000
heap
page read and write
1F80AE9E000
trusted library allocation
page read and write
63F5000
trusted library allocation
page read and write
5225000
trusted library allocation
page read and write
4D81000
heap
page read and write
521B000
trusted library allocation
page read and write
5A4F000
trusted library allocation
page read and write
2AE7FEDF000
trusted library allocation
page read and write
9DA000
stack
page read and write
1124000
heap
page read and write
6250000
trusted library allocation
page read and write
388E000
stack
page read and write
22908A03000
trusted library allocation
page read and write
1F80D7B9000
trusted library allocation
page read and write
370F000
stack
page read and write
49BF000
stack
page read and write
5000000
direct allocation
page execute and read and write
5FA5000
trusted library allocation
page read and write
527D000
trusted library allocation
page read and write
BD9000
unkown
page write copy
397F000
stack
page read and write
229087D6000
unkown
page execute read
53E0000
direct allocation
page execute and read and write
1F87FFE2000
trusted library allocation
page read and write
D27000
unkown
page execute and read and write
5AA1000
trusted library allocation
page read and write
1124000
heap
page read and write
2AE7FCD6000
heap
page read and write
33FF000
stack
page read and write
137E000
stack
page read and write
103A000
unkown
page execute and write copy
5F31000
trusted library allocation
page read and write
63F1000
trusted library allocation
page read and write
58C000
unkown
page execute and write copy
5240000
heap
page execute and read and write
1550000
direct allocation
page read and write
43EF000
stack
page read and write
48C0000
direct allocation
page execute and read and write
1DCD7C49000
heap
page read and write
606F000
trusted library allocation
page read and write
5570000
direct allocation
page execute and read and write
6375000
trusted library allocation
page read and write
2AE091F7000
trusted library allocation
page read and write
63F1000
trusted library allocation
page read and write
30A0000
direct allocation
page read and write
450E000
stack
page read and write
53D0000
direct allocation
page execute and read and write
521B000
trusted library allocation
page read and write
63F5000
trusted library allocation
page read and write
1125000
heap
page read and write
164F000
stack
page read and write
1124000
heap
page read and write
37CE000
stack
page read and write
1F80AE84000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
3B3F000
stack
page read and write
6077000
trusted library allocation
page read and write
14A8000
heap
page read and write
3280000
direct allocation
page read and write
1F8160CF000
trusted library allocation
page read and write
1F80E9E0000
trusted library allocation
page read and write
5245000
trusted library allocation
page read and write
63F2000
trusted library allocation
page read and write
229082E9000
trusted library allocation
page read and write
1F87E8F1000
trusted library allocation
page read and write
1F8160C9000
trusted library allocation
page read and write
4BC1000
heap
page read and write
3D1E000
stack
page read and write
13B0000
direct allocation
page read and write
22908286000
trusted library allocation
page read and write
1F87F758000
trusted library allocation
page read and write
1124000
heap
page read and write
27F6732E000
trusted library allocation
page read and write
5F85000
trusted library allocation
page read and write
54C0000
direct allocation
page execute and read and write
1A08B620000
heap
page read and write
4EF1000
heap
page read and write
186E000
stack
page read and write
830000
unkown
page readonly
6242000
trusted library allocation
page read and write
51C0000
direct allocation
page execute and read and write
27F6730D000
trusted library allocation
page read and write
522C000
trusted library allocation
page read and write
1334000
heap
page read and write
32FF000
stack
page read and write
13A4000
heap
page read and write
69AC000
stack
page read and write
6249000
trusted library allocation
page read and write
38FF000
stack
page read and write
4BC1000
heap
page read and write
1A08D1AF000
heap
page read and write
2AE0915A000
trusted library allocation
page read and write
6071000
trusted library allocation
page read and write
5261000
trusted library allocation
page read and write
5792000
trusted library allocation
page read and write
59D6000
trusted library allocation
page read and write
5211000
trusted library allocation
page read and write
2AE0AA00000
trusted library allocation
page read and write
2AE0C8CD000
trusted library allocation
page read and write
1F810BD1000
trusted library allocation
page read and write
644000
heap
page read and write
22908E40000
heap
page read and write
1F80D5F2000
trusted library allocation
page read and write
30A0000
direct allocation
page read and write
2AE09520000
trusted library allocation
page read and write
321E000
stack
page read and write
5329000
trusted library allocation
page read and write
F54000
heap
page read and write
4D81000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
2AE091F0000
trusted library allocation
page read and write
4BC1000
heap
page read and write
56BF000
trusted library allocation
page read and write
55B8000
trusted library allocation
page read and write
4D81000
heap
page read and write
5FB1000
trusted library allocation
page read and write
1694000
heap
page read and write
1F87E8FD000
trusted library allocation
page read and write
5238000
trusted library allocation
page read and write
316000
unkown
page execute and write copy
5EE1000
trusted library allocation
page read and write
5000000
direct allocation
page execute and read and write
45FF000
stack
page read and write
644000
heap
page read and write
22907FE0000
heap
page read and write
5F7D000
trusted library allocation
page read and write
5FCD000
trusted library allocation
page read and write
4D81000
heap
page read and write
59A7000
trusted library allocation
page read and write
59D6000
trusted library allocation
page read and write
5F6F000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
2AE0909A000
trusted library allocation
page read and write
1F816093000
trusted library allocation
page read and write
15B9000
heap
page read and write
A50000
direct allocation
page read and write
408D000
stack
page read and write
4680000
heap
page read and write
4E50000
heap
page read and write
4681000
heap
page read and write
5120000
direct allocation
page execute and read and write
1B3AC000
stack
page read and write
4681000
heap
page read and write
42CF000
stack
page read and write
DDE000
stack
page read and write
524A000
trusted library allocation
page read and write
2AE05175000
trusted library allocation
page read and write
1F87F7CE000
trusted library allocation
page read and write
1124000
heap
page read and write
49E0000
direct allocation
page read and write
1124000
heap
page read and write
6071000
trusted library allocation
page read and write
5080000
direct allocation
page execute and read and write
48C000
unkown
page write copy
4EF1000
heap
page read and write
2AE095D4000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
2290829E000
trusted library allocation
page read and write
302000
unkown
page execute and read and write
4F91000
heap
page read and write
6ED69FF000
stack
page read and write
122E000
stack
page read and write
5AC1000
trusted library allocation
page read and write
CFA000
unkown
page execute and read and write
4681000
heap
page read and write
5050000
direct allocation
page read and write
5261000
trusted library allocation
page read and write
4730000
remote allocation
page read and write
1124000
heap
page read and write
2AE0900F000
trusted library allocation
page read and write
1F80B1E4000
trusted library allocation
page read and write
310E000
stack
page read and write
22908FAE000
heap
page read and write
517F000
stack
page read and write
5F95000
trusted library allocation
page read and write
1F810B8B000
trusted library allocation
page read and write
2190000
trusted library allocation
page read and write
B65000
unkown
page execute and write copy
4D81000
heap
page read and write
1F810B6A000
trusted library allocation
page read and write
4681000
heap
page read and write
912000
unkown
page execute and read and write
2AE095F4000
trusted library allocation
page read and write
764E000
stack
page read and write
5F97000
trusted library allocation
page read and write
5250000
direct allocation
page execute and read and write
56B8000
trusted library allocation
page read and write
F54000
heap
page read and write
1F810B9D000
trusted library allocation
page read and write
63F2000
trusted library allocation
page read and write
C18000
unkown
page execute and read and write
58A000
unkown
page execute and write copy
B00000
direct allocation
page read and write
654E000
trusted library allocation
page read and write
1F80E6E3000
trusted library allocation
page read and write
2AE09AFA000
trusted library allocation
page read and write
471F000
stack
page read and write
5A0A000
trusted library allocation
page read and write
1F80AEDE000
trusted library allocation
page read and write
2AE7FEC1000
trusted library allocation
page read and write
3D8E000
stack
page read and write
1124000
heap
page read and write
3A9E000
stack
page read and write
4C70000
direct allocation
page execute and read and write
16B4000
heap
page read and write
5FA7000
trusted library allocation
page read and write
5FE4000
trusted library allocation
page read and write
137E000
stack
page read and write
4EF0000
trusted library allocation
page read and write
5319000
trusted library allocation
page read and write
1F816090000
trusted library allocation
page read and write
4B11000
heap
page read and write
7890000
heap
page read and write
1F80E4B2000
trusted library allocation
page read and write
1124000
heap
page read and write
59E7000
trusted library allocation
page read and write
63F6000
trusted library allocation
page read and write
6B0000
heap
page read and write
2AE7FE90000
trusted library allocation
page read and write
58A0000
trusted library allocation
page read and write
338E000
stack
page read and write
2AE7FCD0000
heap
page read and write
EDC000
unkown
page execute and write copy
4EF1000
heap
page read and write
5D49000
trusted library allocation
page read and write
64B2000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
523A000
trusted library allocation
page read and write
799000
stack
page read and write
36DE000
stack
page read and write
5211000
trusted library allocation
page read and write
229088E0000
heap
page read and write
59BC000
trusted library allocation
page read and write
5D1000
unkown
page execute and write copy
5359000
trusted library allocation
page read and write
3C0F000
stack
page read and write
63FC000
trusted library allocation
page read and write
4E51000
heap
page read and write
229083D6000
heap
page read and write
52EA000
trusted library allocation
page read and write
D20000
heap
page read and write
2AE7FCD6000
heap
page read and write
4E60000
direct allocation
page execute and read and write
1F810AAF000
trusted library allocation
page read and write
564000
heap
page read and write
1F81104D000
trusted library allocation
page read and write
4B11000
heap
page read and write
4681000
heap
page read and write
1F80D9EB000
trusted library allocation
page read and write
FE8000
heap
page read and write
4681000
heap
page read and write
3CAE000
stack
page read and write
5A07000
trusted library allocation
page read and write
2AE095F8000
trusted library allocation
page read and write
1F80E959000
trusted library allocation
page read and write
FFB000
unkown
page write copy
1F80E259000
trusted library allocation
page read and write
63F5000
trusted library allocation
page read and write
B79000
unkown
page write copy
6D7B000
stack
page read and write
4BC1000
heap
page read and write
2190000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
6503000
trusted library allocation
page read and write
1D7BE000
stack
page read and write
5F6A000
trusted library allocation
page read and write
4EF1000
heap
page read and write
7A7000
heap
page read and write
2AE05117000
trusted library allocation
page read and write
10AE000
heap
page read and write
1A08D1BE000
heap
page read and write
62EF000
trusted library allocation
page read and write
13CA000
heap
page read and write
4BCA000
trusted library allocation
page read and write
AB4000
heap
page read and write
11FD000
heap
page read and write
1564000
heap
page read and write
5AB0000
trusted library allocation
page read and write
1038000
unkown
page execute and read and write
4B11000
heap
page read and write
27F66E62000
unclassified section
page read and write
4BC1000
heap
page read and write
4730000
remote allocation
page read and write
13A4000
heap
page read and write
1F80E9CE000
trusted library allocation
page read and write
527A000
trusted library allocation
page read and write
4B11000
heap
page read and write
AB4000
heap
page read and write
15C0000
direct allocation
page read and write
BDC000
unkown
page execute and write copy
493000
unkown
page execute and read and write
5252000
trusted library allocation
page read and write
3F2E000
stack
page read and write
410F000
stack
page read and write
5540000
direct allocation
page execute and read and write
5AB8000
trusted library allocation
page read and write
5F8B000
trusted library allocation
page read and write
5EF8000
trusted library allocation
page read and write
607F000
trusted library allocation
page read and write
524D000
trusted library allocation
page read and write
AAD2EAC000
stack
page read and write
5AB0000
trusted library allocation
page read and write
5AA8000
trusted library allocation
page read and write
2DDF000
stack
page read and write
5AEE000
trusted library allocation
page read and write
3E1F000
stack
page read and write
59C2000
trusted library allocation
page read and write
4F5000
stack
page read and write
525E000
trusted library allocation
page read and write
F54000
heap
page read and write
4BC1000
heap
page read and write
324E000
stack
page read and write
4EF1000
heap
page read and write
4EF1000
heap
page read and write
D9E000
heap
page read and write
1630000
heap
page read and write
5CA6000
trusted library allocation
page read and write
5240000
direct allocation
page execute and read and write
7B1000
heap
page read and write
4B11000
heap
page read and write
5238000
trusted library allocation
page read and write
1124000
heap
page read and write
59E7000
trusted library allocation
page read and write
4CA0000
direct allocation
page execute and read and write
1F8160DB000
trusted library allocation
page read and write
5245000
trusted library allocation
page read and write
4EF1000
heap
page read and write
4E30000
direct allocation
page execute and read and write
2AE09137000
trusted library allocation
page read and write
521B000
trusted library allocation
page read and write
2AE08F79000
trusted library allocation
page read and write
644000
heap
page read and write
4B11000
heap
page read and write
6960000
heap
page read and write
5420000
direct allocation
page read and write
4E40000
direct allocation
page read and write
31A0000
heap
page read and write
4681000
heap
page read and write
14A4000
heap
page read and write
AB4000
heap
page read and write
490E000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
4ED1000
heap
page read and write
736000
heap
page read and write
1F80DAF4000
trusted library allocation
page read and write
1F810BE9000
trusted library allocation
page read and write
4E40000
direct allocation
page read and write
29BF000
stack
page read and write
1F810BD6000
trusted library allocation
page read and write
5F97000
trusted library allocation
page read and write
4681000
heap
page read and write
2AE09133000
trusted library allocation
page read and write
5030000
direct allocation
page execute and read and write
4681000
heap
page read and write
27F66DA0000
heap
page read and write
3E7F000
stack
page read and write
5F6F000
trusted library allocation
page read and write
564000
heap
page read and write
810000
direct allocation
page read and write
309E000
stack
page read and write
5FAA000
trusted library allocation
page read and write
4A7F000
stack
page read and write
1F816235000
trusted library allocation
page read and write
56B9000
trusted library allocation
page read and write
5AC1000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
2AE095E6000
trusted library allocation
page read and write
587E000
trusted library allocation
page read and write
1F80F0BB000
trusted library allocation
page read and write
14D5000
heap
page read and write
1124000
heap
page read and write
4B11000
heap
page read and write
860000
direct allocation
page read and write
2F37000
heap
page read and write
38EE000
stack
page read and write
4681000
heap
page read and write
1B16D000
stack
page read and write
512000
unkown
page execute and read and write
2AE08F63000
trusted library allocation
page read and write
4EF1000
heap
page read and write
2AE091D6000
trusted library allocation
page read and write
4AA0000
heap
page read and write
14C3000
heap
page read and write
533C000
trusted library allocation
page read and write
5339000
trusted library allocation
page read and write
1357000
heap
page read and write
4B11000
heap
page read and write
30A0000
direct allocation
page read and write
59D4000
trusted library allocation
page read and write
6ED61FF000
stack
page read and write
4EF1000
heap
page read and write
63F9000
trusted library allocation
page read and write
38BF000
stack
page read and write
366E000
stack
page read and write
13A4000
heap
page read and write
22908F20000
heap
page read and write
4E40000
direct allocation
page read and write
508000
unkown
page execute and read and write
381E000
stack
page read and write
4D81000
heap
page read and write
1124000
heap
page read and write
1F3C5BC0000
heap
page read and write
4681000
heap
page read and write
5282000
trusted library allocation
page read and write
4B11000
heap
page read and write
2AE0D249000
trusted library allocation
page read and write
AAD59FE000
stack
page read and write
DCE000
stack
page read and write
58B000
unkown
page execute and read and write
16D4000
heap
page read and write
4B3B000
stack
page read and write
42C1000
heap
page read and write
63F5000
trusted library allocation
page read and write
10B3000
heap
page read and write
3D7E000
stack
page read and write
522D000
trusted library allocation
page read and write
4B11000
heap
page read and write
5AB9000
trusted library allocation
page read and write
4681000
heap
page read and write
1F87F778000
trusted library allocation
page read and write
3ECE000
stack
page read and write
736000
heap
page read and write
16AB000
heap
page read and write
2AE091D6000
trusted library allocation
page read and write
3F3E000
stack
page read and write
798000
heap
page read and write
649E000
stack
page read and write
1F810BC4000
trusted library allocation
page read and write
2AE0889D000
trusted library allocation
page read and write
30A0000
direct allocation
page read and write
1124000
heap
page read and write
1F817FFA000
trusted library allocation
page read and write
530000
unkown
page read and write
4EF1000
heap
page read and write
229087C0000
trusted library allocation
page read and write
5221000
trusted library allocation
page read and write
5FC3000
trusted library allocation
page read and write
DBE000
stack
page read and write
F54000
heap
page read and write
10BE000
heap
page read and write
1375000
heap
page read and write
1564000
heap
page read and write
FF0000
direct allocation
page read and write
4CEE000
stack
page read and write
5255000
trusted library allocation
page read and write
2AE7FCCF000
heap
page read and write
5282000
trusted library allocation
page read and write
E7C000
unkown
page execute and read and write
1A08D1BC000
heap
page read and write
5180000
direct allocation
page execute and read and write
4D81000
heap
page read and write
4BC1000
heap
page read and write
531A000
trusted library allocation
page read and write
1DC000
stack
page read and write
16D4000
heap
page read and write
59A7000
trusted library allocation
page read and write
2DCB000
heap
page read and write
774F000
stack
page read and write
2AE09535000
trusted library allocation
page read and write
1F87FFF8000
trusted library allocation
page read and write
42C1000
heap
page read and write
1564000
heap
page read and write
2DC7000
heap
page read and write
533F000
trusted library allocation
page read and write
F54000
heap
page read and write
5753000
trusted library allocation
page read and write
4681000
heap
page read and write
1F80F086000
trusted library allocation
page read and write
4681000
heap
page read and write
3C0000
unkown
page readonly
362F000
stack
page read and write
738C000
stack
page read and write
2AE08F7F000
trusted library allocation
page read and write
103A000
unkown
page execute and write copy
5390000
direct allocation
page execute and read and write
56BD000
trusted library allocation
page read and write
1F87E8EB000
trusted library allocation
page read and write
2AE091D3000
trusted library allocation
page read and write
2AE09AF0000
trusted library allocation
page read and write
5F95000
trusted library allocation
page read and write
5F58000
trusted library allocation
page read and write
E1C000
unkown
page execute and read and write
729000
heap
page read and write
4681000
heap
page read and write
1F87FBEA000
trusted library allocation
page read and write
320F000
stack
page read and write
4F91000
heap
page read and write
1F815E73000
trusted library allocation
page read and write
22908EAC000
heap
page read and write
1124000
heap
page read and write
120E000
heap
page read and write
4681000
heap
page read and write
1F80F6FE000
trusted library allocation
page read and write
2AE7FCD6000
heap
page read and write
FC0000
heap
page read and write
6528000
trusted library allocation
page read and write
1124000
heap
page read and write
11FA000
heap
page read and write
2A50000
heap
page read and write
E93000
unkown
page execute and read and write
2AE091DB000
trusted library allocation
page read and write
4681000
heap
page read and write
16D4000
heap
page read and write
1F87F74D000
trusted library allocation
page read and write
5FA9000
trusted library allocation
page read and write
A14000
heap
page read and write
860000
direct allocation
page read and write
3B7E000
stack
page read and write
5CA7000
trusted library allocation
page read and write
A50000
direct allocation
page read and write
4B11000
heap
page read and write
E11000
unkown
page execute and write copy
5265000
trusted library allocation
page read and write
564000
heap
page read and write
1F80DA8C000
trusted library allocation
page read and write
1F810BF1000
trusted library allocation
page read and write
522D000
trusted library allocation
page read and write
22908200000
trusted library allocation
page read and write
1124000
heap
page read and write
1F80D65A000
trusted library allocation
page read and write
5D0000
heap
page read and write
5E45000
trusted library allocation
page read and write
6069000
trusted library allocation
page read and write
1124000
heap
page read and write
38AF000
stack
page read and write
2AE090F9000
trusted library allocation
page read and write
488F000
stack
page read and write
2AE7FCDC000
heap
page read and write
2AE7FCD6000
heap
page read and write
1357000
heap
page read and write
693F000
stack
page read and write
6495000
trusted library allocation
page read and write
5AED000
trusted library allocation
page read and write
314E000
stack
page read and write
59B7000
trusted library allocation
page read and write
4B11000
heap
page read and write
4681000
heap
page read and write
2290822F000
trusted library allocation
page read and write
4D81000
heap
page read and write
1F80E4AC000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1AD7E000
stack
page read and write
564000
heap
page read and write
D36000
unkown
page execute and read and write
5238000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
1334000
heap
page read and write
1F816214000
trusted library allocation
page read and write
3EEF000
stack
page read and write
42C1000
heap
page read and write
4B11000
heap
page read and write
521F000
trusted library allocation
page read and write
39C1000
heap
page read and write
3CDF000
stack
page read and write
59D5000
trusted library allocation
page read and write
42C1000
heap
page read and write
45DF000
stack
page read and write
1F810A5D000
trusted library allocation
page read and write
1550000
direct allocation
page read and write
376F000
stack
page read and write
5FB3000
trusted library allocation
page read and write
644000
heap
page read and write
343E000
stack
page read and write
16AB000
heap
page read and write
5329000
trusted library allocation
page read and write
1D06E000
stack
page read and write
2D9E000
stack
page read and write
4EF1000
heap
page read and write
523B000
trusted library allocation
page read and write
5329000
trusted library allocation
page read and write
5F7F000
trusted library allocation
page read and write
137B000
heap
page read and write
1124000
heap
page read and write
1F87F3F8000
trusted library allocation
page read and write
6491000
trusted library allocation
page read and write
4681000
heap
page read and write
11F7000
heap
page read and write
37BF000
stack
page read and write
2290825C000
trusted library allocation
page read and write
1F817876000
trusted library allocation
page read and write
35FF000
stack
page read and write
63F5000
trusted library allocation
page read and write
485E000
stack
page read and write
A14000
heap
page read and write
1222000
heap
page read and write
49F1000
heap
page read and write
27F67416000
trusted library allocation
page read and write
5340000
heap
page read and write
1F815E7B000
trusted library allocation
page read and write
7A7000
heap
page read and write
4F80000
direct allocation
page read and write
4B11000
heap
page read and write
122C000
heap
page read and write
5329000
trusted library allocation
page read and write
5AC8000
trusted library allocation
page read and write
B79000
unkown
page write copy
1124000
heap
page read and write
2AE089FC000
trusted library allocation
page read and write
6060000
trusted library allocation
page read and write
A50000
direct allocation
page read and write
63F6000
trusted library allocation
page read and write
427E000
stack
page read and write
644000
heap
page read and write
59DB000
trusted library allocation
page read and write
1F87E8E4000
trusted library allocation
page read and write
1D52F000
stack
page read and write
2AE09137000
trusted library allocation
page read and write
3B9F000
stack
page read and write
2AE7FCDC000
heap
page read and write
4BC1000
heap
page read and write
2AE091B1000
trusted library allocation
page read and write
4EF1000
heap
page read and write
5050000
direct allocation
page read and write
5AB0000
trusted library allocation
page read and write
4E40000
direct allocation
page read and write
5AC1000
trusted library allocation
page read and write
4FA0000
direct allocation
page read and write
1124000
heap
page read and write
5F8D000
trusted library allocation
page read and write
F54000
heap
page read and write
16AF000
heap
page read and write
5238000
trusted library allocation
page read and write
140F000
heap
page read and write
2AE05126000
trusted library allocation
page read and write
860000
direct allocation
page read and write
331E000
stack
page read and write
6051000
trusted library allocation
page read and write
42AF000
stack
page read and write
10B2000
unkown
page read and write
B5C000
unkown
page execute and write copy
1F87F3B3000
trusted library allocation
page read and write
912000
unkown
page execute and read and write
1F80DA85000
trusted library allocation
page read and write
2AE09166000
trusted library allocation
page read and write
4EF1000
heap
page read and write
5190000
direct allocation
page execute and read and write
3DEE000
stack
page read and write
1F810B9D000
trusted library allocation
page read and write
4B11000
heap
page read and write
27F67000000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
1F87FE6E000
trusted library allocation
page read and write
2AE09AFA000
trusted library allocation
page read and write
4D81000
heap
page read and write
2A40000
direct allocation
page execute and read and write
1F80D7C3000
trusted library allocation
page read and write
63FA000
trusted library allocation
page read and write
5AC1000
trusted library allocation
page read and write
63F0000
trusted library allocation
page read and write
63F7000
trusted library allocation
page read and write
1F87F3DF000
trusted library allocation
page read and write
2AE7FCDC000
heap
page read and write
300000
unkown
page readonly
1F87F7E2000
trusted library allocation
page read and write
1D48F000
stack
page read and write
1124000
heap
page read and write
1F80E959000
trusted library allocation
page read and write
5050000
direct allocation
page read and write
7890000
heap
page read and write
AAD62FE000
unkown
page readonly
2AE091E9000
trusted library allocation
page read and write
2AE0517E000
trusted library allocation
page read and write
1F80E9D0000
trusted library allocation
page read and write
1415000
heap
page read and write
5245000
trusted library allocation
page read and write
30C7000
heap
page read and write
4BC1000
heap
page read and write
EE4000
heap
page read and write
413E000
stack
page read and write
56B8000
trusted library allocation
page read and write
3280000
direct allocation
page read and write
644000
heap
page read and write
5110000
direct allocation
page execute and read and write
4681000
heap
page read and write
45C000
unkown
page readonly
1D23E000
stack
page read and write
1F87F3A8000
trusted library allocation
page read and write
BBA000
unkown
page execute and write copy
7490000
trusted library allocation
page read and write
13A4000
heap
page read and write
4BC1000
heap
page read and write
4681000
heap
page read and write
5FCA000
trusted library allocation
page read and write
7BB000
heap
page read and write
652C000
trusted library allocation
page read and write
4BC1000
heap
page read and write
14A4000
heap
page read and write
5440000
direct allocation
page execute and read and write
2AE0916F000
trusted library allocation
page read and write
63FA000
trusted library allocation
page read and write
1354000
heap
page read and write
22907ED0000
unclassified section
page readonly
120E000
heap
page read and write
522A000
trusted library allocation
page read and write
1D20F000
stack
page read and write
54D0000
direct allocation
page execute and read and write
2AE0D283000
trusted library allocation
page read and write
AB4000
heap
page read and write
59C9000
trusted library allocation
page read and write
63F4000
trusted library allocation
page read and write
2AE09185000
trusted library allocation
page read and write
1F87F676000
trusted library allocation
page read and write
2AE0915A000
trusted library allocation
page read and write
121C000
heap
page read and write
4EF1000
heap
page read and write
794000
heap
page read and write
1F80AEF7000
trusted library allocation
page read and write
522E000
trusted library allocation
page read and write
5321000
trusted library allocation
page read and write
1F810A5D000
trusted library allocation
page read and write
AB4000
heap
page read and write
5F8B000
trusted library allocation
page read and write
45C000
unkown
page readonly
2AE0B7FD000
trusted library allocation
page read and write
AB4000
heap
page read and write
4C4F000
stack
page read and write
5420000
direct allocation
page execute and read and write
59CD000
trusted library allocation
page read and write
1F87F398000
trusted library allocation
page read and write
59A6000
trusted library allocation
page read and write
EE4000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
22908275000
trusted library allocation
page read and write
810000
direct allocation
page read and write
5410000
remote allocation
page read and write
3180000
direct allocation
page read and write
2AE7FEA7000
trusted library allocation
page read and write
42C1000
heap
page read and write
1F87F7A4000
trusted library allocation
page read and write
AFC000
stack
page read and write
2AE062EE000
trusted library allocation
page read and write
13A4000
heap
page read and write
5F97000
trusted library allocation
page read and write
6089000
trusted library allocation
page read and write
5090000
trusted library allocation
page read and write
2AE0B7C5000
trusted library allocation
page read and write
EC0000
heap
page read and write
428E000
stack
page read and write
59C3000
trusted library allocation
page read and write
2AE091D6000
trusted library allocation
page read and write
13A4000
heap
page read and write
6B2000
unkown
page execute and read and write
2AE08833000
trusted library allocation
page read and write
14A4000
heap
page read and write
14A4000
heap
page read and write
8D20000
heap
page read and write
353F000
stack
page read and write
51B0000
direct allocation
page execute and read and write
E4C000
unkown
page execute and read and write
5517000
trusted library allocation
page read and write
3C1000
unkown
page execute read
319F000
stack
page read and write
374E000
stack
page read and write
5E4B000
trusted library allocation
page read and write
1F80AEE8000
trusted library allocation
page read and write
4BC1000
heap
page read and write
5AEE000
trusted library allocation
page read and write
4D81000
heap
page read and write
1F8160C0000
trusted library allocation
page read and write
5E4A000
trusted library allocation
page read and write
4FD0000
direct allocation
page execute and read and write
41FE000
stack
page read and write
1340000
heap
page read and write
609B000
trusted library allocation
page read and write
1038000
unkown
page execute and read and write
443E000
stack
page read and write
421F000
stack
page read and write
1348000
heap
page read and write
1F80E9A7000
trusted library allocation
page read and write
2C5E000
stack
page read and write
4BC1000
heap
page read and write
490000
unkown
page write copy
128A000
heap
page read and write
57B4000
trusted library allocation
page read and write
59C3000
trusted library allocation
page read and write
16D4000
heap
page read and write
4D81000
heap
page read and write
4BC1000
heap
page read and write
2AE0D2F9000
trusted library allocation
page read and write
37FE000
stack
page read and write
6051000
trusted library allocation
page read and write
2FFF000
stack
page read and write
A61000
unkown
page execute and write copy
2A20000
direct allocation
page read and write
59D6000
trusted library allocation
page read and write
630B000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
1F80E967000
trusted library allocation
page read and write
D37000
unkown
page execute and write copy
4EF1000
heap
page read and write
5AC1000
trusted library allocation
page read and write
2AE091F0000
trusted library allocation
page read and write
5F78000
trusted library allocation
page read and write
1F87F390000
trusted library allocation
page read and write
2DBE000
stack
page read and write
F54000
heap
page read and write
63F5000
trusted library allocation
page read and write
63BD000
trusted library allocation
page read and write
1653000
heap
page read and write
59D6000
trusted library allocation
page read and write
27F67381000
trusted library allocation
page read and write
78F000
heap
page read and write
12DF000
heap
page read and write
5AEE000
trusted library allocation
page read and write
1350000
heap
page read and write
564000
heap
page read and write
13A4000
heap
page read and write
5344000
trusted library allocation
page read and write
57EB000
trusted library allocation
page read and write
5ACB000
trusted library allocation
page read and write
2AE0887A000
trusted library allocation
page read and write
4D8F000
stack
page read and write
11FE000
heap
page read and write
1430000
heap
page read and write
1334000
heap
page read and write
1218000
heap
page read and write
16AD000
heap
page read and write
1394000
heap
page read and write
4960000
trusted library allocation
page read and write
BD9000
unkown
page write copy
64D3000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
160F000
heap
page read and write
5FBD000
trusted library allocation
page read and write
F30000
heap
page read and write
1F80E9A6000
trusted library allocation
page read and write
6279000
trusted library allocation
page read and write
4EF1000
heap
page read and write
1F80E6F6000
trusted library allocation
page read and write
5511000
trusted library allocation
page read and write
64AC000
trusted library allocation
page read and write
1F80D763000
trusted library allocation
page read and write
5F6F000
trusted library allocation
page read and write
22908210000
trusted library allocation
page read and write
1550000
direct allocation
page read and write
5000000
heap
page read and write
1F80F0A0000
trusted library allocation
page read and write
1CE2F000
stack
page read and write
810000
direct allocation
page read and write
187F000
stack
page read and write
4EF1000
heap
page read and write
3B64000
heap
page read and write
4DF1000
heap
page read and write
4B11000
heap
page read and write
59A5000
trusted library allocation
page read and write
C41E7D8000
stack
page read and write
5F6B000
trusted library allocation
page read and write
51E9000
trusted library allocation
page read and write
1F3C5A80000
heap
page read and write
1F87F4A3000
trusted library allocation
page read and write
3280000
direct allocation
page read and write
5AEE000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
B00000
direct allocation
page read and write
5FCF000
trusted library allocation
page read and write
1218000
heap
page read and write
533A000
trusted library allocation
page read and write
59BF000
trusted library allocation
page read and write
5F43000
trusted library allocation
page read and write
AAD39D8000
stack
page read and write
1F810B96000
trusted library allocation
page read and write
27F67410000
trusted library allocation
page read and write
121B000
heap
page read and write
2AE0D2F7000
trusted library allocation
page read and write
788E000
heap
page read and write
51B0000
direct allocation
page execute and read and write
1124000
heap
page read and write
5AD0000
trusted library allocation
page read and write
1F87E8F4000
trusted library allocation
page read and write
1124000
heap
page read and write
59A4000
trusted library allocation
page read and write
1088000
heap
page read and write
4F80000
direct allocation
page read and write
1212000
heap
page read and write
39C0000
heap
page read and write
27F66DC0000
heap
page read and write
16D4000
heap
page read and write
2D5E000
stack
page read and write
5F79000
trusted library allocation
page read and write
D36000
unkown
page execute and write copy
64AF000
trusted library allocation
page read and write
521B000
trusted library allocation
page read and write
4DB000
unkown
page execute and read and write
64DA000
trusted library allocation
page read and write
1F8160C6000
trusted library allocation
page read and write
22908E6E000
heap
page read and write
CFE000
stack
page read and write
1DCD7F0A000
trusted library allocation
page read and write
468F000
stack
page read and write
14C3000
heap
page read and write
1F80F09B000
trusted library allocation
page read and write
39CE000
stack
page read and write
4A0E000
stack
page read and write
5F5F000
trusted library allocation
page read and write
27F6740C000
trusted library allocation
page read and write
4EF1000
heap
page read and write
5110000
trusted library allocation
page read and write
1F87F77D000
trusted library allocation
page read and write
5328000
trusted library allocation
page read and write
2AE0B7EB000
trusted library allocation
page read and write
7B1000
heap
page read and write
1428000
heap
page read and write
4E70000
remote allocation
page read and write
14BE000
stack
page read and write
3A3E000
stack
page read and write
16D4000
heap
page read and write
5275000
trusted library allocation
page read and write
4681000
heap
page read and write
4D81000
heap
page read and write
474F000
stack
page read and write
1F87F5B7000
trusted library allocation
page read and write
31F0000
heap
page read and write
30A000
unkown
page execute and read and write
5350000
direct allocation
page read and write
16AA000
heap
page read and write
1F810BF3000
trusted library allocation
page read and write
E6E000
stack
page read and write
6FB000
heap
page read and write
4EF1000
heap
page read and write
49E0000
direct allocation
page read and write
1212000
heap
page read and write
B65000
unkown
page execute and write copy
F54000
heap
page read and write
4EF1000
heap
page read and write
502000
unkown
page execute and write copy
466F000
stack
page read and write
593000
unkown
page execute and write copy
3F7E000
stack
page read and write
4E30000
direct allocation
page execute and read and write
5F74000
trusted library allocation
page read and write
59B7000
trusted library allocation
page read and write
4EF1000
heap
page read and write
2AE091E1000
trusted library allocation
page read and write
2AE091F7000
trusted library allocation
page read and write
480E000
stack
page read and write
644000
heap
page read and write
5AEA000
trusted library allocation
page read and write
13A4000
heap
page read and write
1124000
heap
page read and write
6058000
trusted library allocation
page read and write
4BC1000
heap
page read and write
7AB000
heap
page read and write
370F000
stack
page read and write
7880000
heap
page read and write
1F8116FD000
trusted library allocation
page read and write
1D16F000
stack
page read and write
53D0000
direct allocation
page execute and read and write
487000
unkown
page execute and read and write
16D4000
heap
page read and write
27F672D6000
heap
page read and write
59CD000
trusted library allocation
page read and write
5272000
trusted library allocation
page read and write
523B000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
63F4000
trusted library allocation
page read and write
5275000
trusted library allocation
page read and write
1F87F411000
trusted library allocation
page read and write
22908080000
trusted library allocation
page read and write
1F80D652000
trusted library allocation
page read and write
1F80E986000
trusted library allocation
page read and write
1394000
heap
page read and write
C42003E000
unkown
page readonly
FEE000
unkown
page readonly
526D000
trusted library allocation
page read and write
4D81000
heap
page read and write
1F810BC6000
trusted library allocation
page read and write
4B11000
heap
page read and write
7B7000
heap
page read and write
27F66E20000
heap
page read and write
1F815E80000
trusted library allocation
page read and write
CFA000
unkown
page execute and read and write
4AFF000
stack
page read and write
2AE7FCCF000
heap
page read and write
1F87F4DA000
trusted library allocation
page read and write
59CF000
trusted library allocation
page read and write
1F87FBF0000
trusted library allocation
page read and write
4681000
heap
page read and write
136C000
heap
page read and write
F8E000
stack
page read and write
51B0000
direct allocation
page execute and read and write
15C0000
heap
page read and write
5AEE000
trusted library allocation
page read and write
4681000
heap
page read and write
5AC1000
trusted library allocation
page read and write
6058000
trusted library allocation
page read and write
10AC000
heap
page read and write
3280000
direct allocation
page read and write
64C7000
trusted library allocation
page read and write
644000
heap
page read and write
49F1000
heap
page read and write
3CFE000
stack
page read and write
1222000
heap
page read and write
49E0000
direct allocation
page read and write
64E2000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
14A4000
heap
page read and write
7B8000
heap
page read and write
1F810AB6000
trusted library allocation
page read and write
13A4000
heap
page read and write
530000
heap
page read and write
4BC1000
heap
page read and write
12C4000
heap
page read and write
56B5000
trusted library allocation
page read and write
5783000
trusted library allocation
page read and write
5791000
trusted library allocation
page read and write
14A4000
heap
page read and write
16D4000
heap
page read and write
10FE000
stack
page read and write
449E000
stack
page read and write
188E3FC000
stack
page read and write
2AE09AF8000
trusted library allocation
page read and write
5E47000
trusted library allocation
page read and write
22908F31000
heap
page read and write
65DA000
trusted library allocation
page read and write
11CD000
stack
page read and write
1A08B5D0000
heap
page read and write
1B26E000
stack
page read and write
5330000
direct allocation
page execute and read and write
1F87F4D7000
trusted library allocation
page read and write
34EF000
stack
page read and write
5AC1000
trusted library allocation
page read and write
564000
heap
page read and write
2AE091F7000
trusted library allocation
page read and write
1124000
heap
page read and write
2AE7FCD0000
heap
page read and write
810000
direct allocation
page read and write
5F2A000
trusted library allocation
page read and write
385E000
stack
page read and write
5364000
trusted library allocation
page read and write
120A000
heap
page read and write
2AE0B7F3000
trusted library allocation
page read and write
27F67312000
trusted library allocation
page read and write
229083D0000
heap
page read and write
4B11000
heap
page read and write
FE6000
heap
page read and write
1F80E4B5000
trusted library allocation
page read and write
5180000
trusted library allocation
page execute and read and write
16AD000
heap
page read and write
57AD000
trusted library allocation
page read and write
1A08B900000
trusted library allocation
page read and write
4EF1000
heap
page read and write
22908F26000
heap
page read and write
5AEE000
trusted library allocation
page read and write
121B000
heap
page read and write
5680000
trusted library allocation
page read and write
2AE08833000
trusted library allocation
page read and write
A14000
heap
page read and write
27F673B8000
trusted library allocation
page read and write
490F000
stack
page read and write
13A4000
heap
page read and write
5252000
trusted library allocation
page read and write
788E000
stack
page read and write
5785000
trusted library allocation
page read and write
AC2000
unkown
page execute and read and write
4B11000
heap
page read and write
644000
heap
page read and write
2AE09137000
trusted library allocation
page read and write
4681000
heap
page read and write
5AA8000
trusted library allocation
page read and write
1F87FCF4000
trusted library allocation
page read and write
5FA7000
trusted library allocation
page read and write
2AE095F8000
trusted library allocation
page read and write
4D81000
heap
page read and write
5225000
trusted library allocation
page read and write
5A02000
trusted library allocation
page read and write
1334000
heap
page read and write
4B11000
heap
page read and write
10DE000
stack
page read and write
22908F62000
heap
page read and write
1F80D9C8000
trusted library allocation
page read and write
229082C7000
trusted library allocation
page read and write
533A000
trusted library allocation
page read and write
5050000
direct allocation
page read and write
4E20000
heap
page read and write
4E80000
direct allocation
page execute and read and write
3DBE000
stack
page read and write
6C4000
heap
page read and write
54D0000
direct allocation
page execute and read and write
F54000
heap
page read and write
5050000
direct allocation
page read and write
533A000
trusted library allocation
page read and write
31CE000
stack
page read and write
5FA1000
trusted library allocation
page read and write
A14000
heap
page read and write
644000
heap
page read and write
4681000
heap
page read and write
5318000
trusted library allocation
page read and write
10B6000
heap
page read and write
54F0000
direct allocation
page execute and read and write
56BE000
trusted library allocation
page read and write
5120000
direct allocation
page execute and read and write
1F810BC8000
trusted library allocation
page read and write
2AE7FCD6000
heap
page read and write
4B11000
heap
page read and write
1124000
heap
page read and write
155E000
stack
page read and write
1A08D1B7000
heap
page read and write
2AE090F9000
trusted library allocation
page read and write
1F87F3C8000
trusted library allocation
page read and write
59E7000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
4F91000
heap
page read and write
58B5000
trusted library allocation
page read and write
2AE089D2000
trusted library allocation
page read and write
7B1000
heap
page read and write
30A0000
direct allocation
page read and write
13A4000
heap
page read and write
5F6F000
trusted library allocation
page read and write
1F817897000
trusted library allocation
page read and write
4EF1000
heap
page read and write
2AE7FEA2000
trusted library allocation
page read and write
22908072000
unclassified section
page read and write
5F92000
trusted library allocation
page read and write
2AE09176000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
4EF1000
heap
page read and write
27F673A3000
trusted library allocation
page read and write
1F87FC99000
trusted library allocation
page read and write
7AB000
heap
page read and write
4681000
heap
page read and write
592E000
trusted library allocation
page read and write
49F1000
heap
page read and write
524D000
trusted library allocation
page read and write
1222000
heap
page read and write
13A4000
heap
page read and write
F6E000
stack
page read and write
1550000
direct allocation
page read and write
3B8E000
stack
page read and write
4681000
heap
page read and write
E93000
unkown
page execute and write copy
2AE08F73000
trusted library allocation
page read and write
13A4000
heap
page read and write
493F000
stack
page read and write
399E000
stack
page read and write
683E000
stack
page read and write
A60000
unkown
page readonly
1F80F0AA000
trusted library allocation
page read and write
522A000
trusted library allocation
page read and write
5276000
trusted library allocation
page read and write
2DB0000
direct allocation
page read and write
2AE7FCD6000
heap
page read and write
2AE7FCD0000
heap
page read and write
4D81000
heap
page read and write
5230000
trusted library allocation
page read and write
B71000
unkown
page execute and write copy
30A0000
direct allocation
page read and write
2AE0918E000
trusted library allocation
page read and write
4BC1000
heap
page read and write
2AE09138000
trusted library allocation
page read and write
2DB0000
direct allocation
page read and write
3E3E000
stack
page read and write
5AEE000
trusted library allocation
page read and write
5AA5000
trusted library allocation
page read and write
4681000
heap
page read and write
3280000
direct allocation
page read and write
407E000
stack
page read and write
564000
heap
page read and write
13A4000
heap
page read and write
4681000
heap
page read and write
78F000
heap
page read and write
2AE08818000
trusted library allocation
page read and write
11F0000
heap
page read and write
564000
heap
page read and write
5AD9000
trusted library allocation
page read and write
644000
heap
page read and write
1AEBE000
stack
page read and write
4F70000
trusted library allocation
page read and write
4D81000
heap
page read and write
30A0000
direct allocation
page read and write
ACB000
unkown
page execute and read and write
5AC1000
trusted library allocation
page read and write
453F000
stack
page read and write
FAE000
stack
page read and write
2AE09075000
trusted library allocation
page read and write
2AE09075000
trusted library allocation
page read and write
644000
heap
page read and write
4BC1000
heap
page read and write
4A4F000
stack
page read and write
27F6737A000
trusted library allocation
page read and write
16A2000
heap
page read and write
59AD000
trusted library allocation
page read and write
49CF000
stack
page read and write
5F74000
trusted library allocation
page read and write
4EF1000
heap
page read and write
51D0000
direct allocation
page execute and read and write
4D81000
heap
page read and write
14C7000
heap
page read and write
468000
unkown
page execute and write copy
13B0000
direct allocation
page read and write
2AE08FA8000
trusted library allocation
page read and write
52AE000
stack
page read and write
6089000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
6301000
trusted library allocation
page read and write
357E000
stack
page read and write
5AEE000
trusted library allocation
page read and write
4ED1000
heap
page read and write
5D0000
unkown
page read and write
1240000
heap
page read and write
51B0000
direct allocation
page execute and read and write
4EA000
unkown
page execute and read and write
65B8000
trusted library allocation
page read and write
5E44000
trusted library allocation
page read and write
590F000
trusted library allocation
page read and write
3C7F000
stack
page read and write
1550000
direct allocation
page read and write
12DF000
heap
page read and write
5130000
direct allocation
page execute and read and write
17DF000
stack
page read and write
48C0000
direct allocation
page execute and read and write
22908F99000
heap
page read and write
AB4000
heap
page read and write
AAD51FE000
unkown
page readonly
44CF000
stack
page read and write
1564000
heap
page read and write
AAD2F6B000
stack
page read and write
124E000
heap
page read and write
1334000
heap
page read and write
300000
unkown
page read and write
15EE000
heap
page read and write
11FE000
heap
page read and write
27F66ED0000
heap
page read and write
AB4000
heap
page read and write
AB4000
heap
page read and write
5F9C000
trusted library allocation
page read and write
D36000
unkown
page execute and write copy
522A000
trusted library allocation
page read and write
55E8000
trusted library allocation
page read and write
13A4000
heap
page read and write
2AE0511A000
trusted library allocation
page read and write
2CDF000
stack
page read and write
30CF000
stack
page read and write
1081000
unkown
page read and write
5EED000
trusted library allocation
page read and write
52FF000
trusted library allocation
page read and write
5246000
trusted library allocation
page read and write
4A5000
unkown
page execute and write copy
5F76000
trusted library allocation
page read and write
14A4000
heap
page read and write
1394000
heap
page read and write
5EE8000
trusted library allocation
page read and write
1D57D000
stack
page read and write
1D3EE000
stack
page read and write
13B0000
direct allocation
page read and write
57CA000
trusted library allocation
page read and write
660D000
trusted library allocation
page read and write
395E000
stack
page read and write
51B0000
direct allocation
page read and write
36DF000
stack
page read and write
22908810000
trusted library section
page read and write
14CD000
heap
page read and write
1212000
heap
page read and write
7AB000
heap
page read and write
2A1E000
stack
page read and write
56B0000
trusted library allocation
page read and write
4C3000
unkown
page execute and write copy
452F000
stack
page read and write
FE0000
heap
page read and write
14C8000
heap
page read and write
807000
heap
page read and write
1227000
heap
page read and write
564000
heap
page read and write
5050000
direct allocation
page read and write
1F810AC0000
trusted library allocation
page read and write
6291000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
4D81000
heap
page read and write
57BD000
trusted library allocation
page read and write
1140000
heap
page read and write
6057000
trusted library allocation
page read and write
4860000
heap
page read and write
1334000
heap
page read and write
163C000
heap
page read and write
55A0000
direct allocation
page execute and read and write
2AE7FCD0000
heap
page read and write
F54000
heap
page read and write
12D2000
heap
page read and write
1F80F041000
trusted library allocation
page read and write
5FC3000
trusted library allocation
page read and write
1A08B658000
heap
page read and write
5FA1000
trusted library allocation
page read and write
2EFE000
stack
page read and write
4E51000
heap
page read and write
5ACD000
trusted library allocation
page read and write
5F92000
trusted library allocation
page read and write
5AD9000
trusted library allocation
page read and write
1DCD7C4F000
heap
page read and write
4F80000
direct allocation
page read and write
4681000
heap
page read and write
5420000
direct allocation
page read and write
1F810AFA000
trusted library allocation
page read and write
1F80AEA6000
trusted library allocation
page read and write
2AE09052000
trusted library allocation
page read and write
1F8110F3000
trusted library allocation
page read and write
22908E44000
heap
page read and write
2AE7FEC7000
trusted library allocation
page read and write
1348000
heap
page read and write
B00000
direct allocation
page read and write
4B11000
heap
page read and write
1124000
heap
page read and write
6081000
trusted library allocation
page read and write
5253000
trusted library allocation
page read and write
14DF000
heap
page read and write
5E48000
trusted library allocation
page read and write
3B60000
heap
page read and write
1564000
heap
page read and write
1F815E1C000
trusted library allocation
page read and write
1124000
heap
page read and write
22908FB8000
heap
page read and write
2D9B000
stack
page read and write
5FA5000
trusted library allocation
page read and write
14DF000
heap
page read and write
5F99000
trusted library allocation
page read and write
62E9000
trusted library allocation
page read and write
31D0000
direct allocation
page read and write
108D000
unkown
page read and write
578B000
trusted library allocation
page read and write
BB6000
unkown
page write copy
2DB0000
direct allocation
page read and write
522F000
trusted library allocation
page read and write
524D000
trusted library allocation
page read and write
830000
unkown
page read and write
860000
direct allocation
page read and write
5339000
trusted library allocation
page read and write
1F80D9C2000
trusted library allocation
page read and write
4B11000
heap
page read and write
30A0000
direct allocation
page read and write
310F000
stack
page read and write
406E000
stack
page read and write
1617000
heap
page read and write
55C000
stack
page read and write
14A4000
heap
page read and write
38CF000
stack
page read and write
1F80B1AE000
trusted library allocation
page read and write
27F67372000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
4B11000
heap
page read and write
229080A0000
heap
page read and write
B71000
unkown
page execute and write copy
27F67403000
trusted library allocation
page read and write
D90000
heap
page read and write
D37000
unkown
page execute and write copy
63F4000
trusted library allocation
page read and write
2C5F000
stack
page read and write
2AE091FD000
trusted library allocation
page read and write
4D81000
heap
page read and write
466000
unkown
page execute and read and write
3280000
direct allocation
page read and write
5A4000
unkown
page execute and write copy
5E40000
trusted library allocation
page read and write
82E000
unkown
page execute and read and write
2AE089CF000
trusted library allocation
page read and write
4B0F000
stack
page read and write
4ECF000
stack
page read and write
5CD9000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
B5C000
unkown
page execute and write copy
22908E9C000
heap
page read and write
648F000
trusted library allocation
page read and write
5AA7000
trusted library allocation
page read and write
433E000
stack
page read and write
6ED59FF000
stack
page read and write
C4230BD000
stack
page read and write
1DCD7BC0000
heap
page read and write
533A000
trusted library allocation
page read and write
2DC7000
heap
page read and write
2AE11780000
trusted library allocation
page read and write
27F66E2A000
heap
page read and write
4BC1000
heap
page read and write
59A7000
trusted library allocation
page read and write
523B000
trusted library allocation
page read and write
EE4000
heap
page read and write
5E46000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
6060000
trusted library allocation
page read and write
4BC0000
heap
page read and write
649A000
trusted library allocation
page read and write
53C0000
direct allocation
page execute and read and write
1F80E6E8000
trusted library allocation
page read and write
2AE08F75000
trusted library allocation
page read and write
A50000
direct allocation
page read and write
5070000
direct allocation
page execute and read and write
7AB000
heap
page read and write
506000
unkown
page execute and write copy
44DE000
stack
page read and write
59CB000
trusted library allocation
page read and write
2AE09131000
trusted library allocation
page read and write
AB4000
heap
page read and write
5510000
direct allocation
page execute and read and write
57B9000
trusted library allocation
page read and write
2AE0C8CD000
trusted library allocation
page read and write
7B1000
heap
page read and write
4BC1000
heap
page read and write
11FE000
heap
page read and write
1F811047000
trusted library allocation
page read and write
8ED000
unkown
page execute and read and write
3280000
direct allocation
page read and write
4B11000
heap
page read and write
5F8E000
trusted library allocation
page read and write
860000
direct allocation
page read and write
B71000
unkown
page execute and write copy
6058000
trusted library allocation
page read and write
1564000
heap
page read and write
F54000
heap
page read and write
1218000
heap
page read and write
1F87E8F6000
trusted library allocation
page read and write
137B000
heap
page read and write
810000
direct allocation
page read and write
4EF1000
heap
page read and write
1124000
heap
page read and write
2AE089EA000
trusted library allocation
page read and write
4EF1000
heap
page read and write
1CA7F000
stack
page read and write
1394000
heap
page read and write
2AE0C8D3000
trusted library allocation
page read and write
624E000
trusted library allocation
page read and write
42FE000
stack
page read and write
F54000
heap
page read and write
4B11000
heap
page read and write
5E4C000
trusted library allocation
page read and write
49F1000
heap
page read and write
513000
unkown
page execute and write copy
5FC5000
trusted library allocation
page read and write
1560000
heap
page read and write
3B7F000
stack
page read and write
27F67300000
trusted library allocation
page read and write
564000
heap
page read and write
59BF000
trusted library allocation
page read and write
4EF1000
heap
page read and write
B73000
unkown
page execute and write copy
1F87E8DB000
trusted library allocation
page read and write
4681000
heap
page read and write
DEC000
unkown
page execute and read and write
449F000
stack
page read and write
122C000
unkown
page readonly
F54000
heap
page read and write
5273000
trusted library allocation
page read and write
1647000
heap
page read and write
4FDC000
stack
page read and write
1F80D63E000
trusted library allocation
page read and write
1F80E9D8000
trusted library allocation
page read and write
2AE05166000
trusted library allocation
page read and write
59CA000
trusted library allocation
page read and write
4E40000
direct allocation
page read and write
AB4000
heap
page read and write
3A5F000
stack
page read and write
E20000
heap
page read and write
625A000
trusted library allocation
page read and write
4E51000
heap
page read and write
124A000
heap
page read and write
4B11000
heap
page read and write
16B2000
heap
page read and write
AB4000
heap
page read and write
2AE09177000
trusted library allocation
page read and write
5580000
direct allocation
page execute and read and write
142D000
heap
page read and write
653F000
trusted library allocation
page read and write
304E000
stack
page read and write
1124000
heap
page read and write
373E000
stack
page read and write
1219000
heap
page read and write
AB4000
heap
page read and write
5CC1000
trusted library allocation
page read and write
5000000
direct allocation
page execute and read and write
1F87FFCE000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
22908EA9000
heap
page read and write
27F67432000
trusted library allocation
page read and write
22908E83000
heap
page read and write
383F000
stack
page read and write
5D79000
trusted library allocation
page read and write
1F80DA89000
trusted library allocation
page read and write
1212000
heap
page read and write
349E000
stack
page read and write
BD9000
unkown
page write copy
63FC000
trusted library allocation
page read and write
48C000
unkown
page read and write
2C7E000
stack
page read and write
F65000
stack
page read and write
564000
heap
page read and write
A14000
heap
page read and write
1F815E32000
trusted library allocation
page read and write
63F4000
trusted library allocation
page read and write
1F810ABE000
trusted library allocation
page read and write
5F5E000
trusted library allocation
page read and write
606A000
trusted library allocation
page read and write
13A4000
heap
page read and write
2AE0D2F1000
trusted library allocation
page read and write
5F29000
trusted library allocation
page read and write
5F98000
trusted library allocation
page read and write
3CCE000
stack
page read and write
5AD7000
trusted library allocation
page read and write
1369000
heap
page read and write
4E80000
direct allocation
page read and write
644000
heap
page read and write
63F6000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
524F000
trusted library allocation
page read and write
13A4000
heap
page read and write
59BA000
trusted library allocation
page read and write
523B000
trusted library allocation
page read and write
5255000
trusted library allocation
page read and write
5A16000
trusted library allocation
page read and write
2AE09170000
trusted library allocation
page read and write
1F810B6B000
trusted library allocation
page read and write
1209000
heap
page read and write
1394000
heap
page read and write
603F000
trusted library allocation
page read and write
4681000
heap
page read and write
2DB0000
direct allocation
page read and write
4D81000
heap
page read and write
1124000
heap
page read and write
2AE09158000
trusted library allocation
page read and write
1F87F381000
trusted library allocation
page read and write
657B000
trusted library allocation
page read and write
5EEA000
trusted library allocation
page read and write
431F000
stack
page read and write
5E4D000
trusted library allocation
page read and write
B70000
unkown
page readonly
AAD627E000
unkown
page readonly
4EF1000
heap
page read and write
1F810AB8000
trusted library allocation
page read and write
42C1000
heap
page read and write
1F8110FE000
trusted library allocation
page read and write
120E000
heap
page read and write
1F816210000
trusted library allocation
page read and write
4D81000
heap
page read and write
338E000
stack
page read and write
A40000
heap
page read and write
1030000
trusted library allocation
page read and write
1DCD7F00000
trusted library allocation
page read and write
13A4000
heap
page read and write
1F810AC0000
trusted library allocation
page read and write
2AE09133000
trusted library allocation
page read and write
D2A000
heap
page read and write
1F80AEBB000
trusted library allocation
page read and write
4BC1000
heap
page read and write
5FC5000
trusted library allocation
page read and write
AAD61FE000
unkown
page readonly
5AD8000
trusted library allocation
page read and write
3C4E000
stack
page read and write
5E40000
trusted library allocation
page read and write
2AE7FCD0000
heap
page read and write
1F87F5EC000
trusted library allocation
page read and write
5F85000
trusted library allocation
page read and write
640000
heap
page read and write
5F97000
trusted library allocation
page read and write
447E000
stack
page read and write
49F1000
heap
page read and write
A50000
heap
page read and write
4BC1000
heap
page read and write
22908223000
trusted library allocation
page read and write
5E4C000
trusted library allocation
page read and write
564000
heap
page read and write
AB4000
heap
page read and write
16A6000
heap
page read and write
2AE08F67000
trusted library allocation
page read and write
5219000
trusted library allocation
page read and write
AB4000
heap
page read and write
4EF1000
heap
page read and write
810000
direct allocation
page read and write
5340000
direct allocation
page execute and read and write
3280000
direct allocation
page read and write
5262000
trusted library allocation
page read and write
63F1000
trusted library allocation
page read and write
1A08B90A000
trusted library allocation
page read and write
4E20000
direct allocation
page execute and read and write
1F80E9FA000
trusted library allocation
page read and write
64B0000
trusted library allocation
page read and write
5F3E000
trusted library allocation
page read and write
3580000
heap
page read and write
5E4B000
trusted library allocation
page read and write
4890000
direct allocation
page execute and read and write
D70000
heap
page read and write
564000
heap
page read and write
5060000
direct allocation
page execute and read and write
54F0000
direct allocation
page execute and read and write
63FF000
trusted library allocation
page read and write
27F66E6F000
unclassified section
page read and write
4EF1000
heap
page read and write
48C000
unkown
page write copy
4B11000
heap
page read and write
5FB0000
trusted library allocation
page read and write
AD7000
unkown
page execute and write copy
5A2000
unkown
page execute and read and write
578F000
trusted library allocation
page read and write
334F000
stack
page read and write
3280000
direct allocation
page read and write
1D1AE000
stack
page read and write
57DE000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
527E000
trusted library allocation
page read and write
400E000
stack
page read and write
5A0C000
trusted library allocation
page read and write
4681000
heap
page read and write
5AEE000
trusted library allocation
page read and write
1F87F5AC000
trusted library allocation
page read and write
C41FFFE000
unkown
page readonly
1A08B653000
heap
page read and write
1F80F0A1000
trusted library allocation
page read and write
5AB9000
trusted library allocation
page read and write
1F80F0B2000
trusted library allocation
page read and write
1124000
heap
page read and write
1354000
heap
page read and write
EDC000
unkown
page execute and write copy
411E000
stack
page read and write
63F6000
trusted library allocation
page read and write
4EF1000
heap
page read and write
1334000
heap
page read and write
4D81000
heap
page read and write
5360000
direct allocation
page execute and read and write
1F810BB1000
trusted library allocation
page read and write
64E6000
trusted library allocation
page read and write
27F66E60000
unclassified section
page read and write
324E000
stack
page read and write
63F9000
trusted library allocation
page read and write
483E000
stack
page read and write
299E000
stack
page read and write
229080F0000
trusted library allocation
page read and write
13A4000
heap
page read and write
F2E000
stack
page read and write
4BC1000
heap
page read and write
2DA0000
heap
page read and write
AD6000
unkown
page execute and write copy
12E1000
heap
page read and write
56B6000
trusted library allocation
page read and write
1F8160C0000
trusted library allocation
page read and write
523B000
trusted library allocation
page read and write
1609000
heap
page read and write
3B0E000
stack
page read and write
64A2000
trusted library allocation
page read and write
522E000
trusted library allocation
page read and write
2AE091FD000
trusted library allocation
page read and write
22908262000
trusted library allocation
page read and write
4E40000
direct allocation
page read and write
5E43000
trusted library allocation
page read and write
4CAF000
stack
page read and write
649F000
trusted library allocation
page read and write
1F80E6D9000
trusted library allocation
page read and write
7A3000
heap
page read and write
64A6000
trusted library allocation
page read and write
2AE088FD000
trusted library allocation
page read and write
1DCD7E00000
trusted library allocation
page read and write
16D4000
heap
page read and write
DDB000
stack
page read and write
5280000
trusted library allocation
page read and write
4E00000
direct allocation
page read and write
2AE09137000
trusted library allocation
page read and write
4D81000
heap
page read and write
644000
heap
page read and write
1F87F41F000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
59C1000
trusted library allocation
page read and write
1124000
heap
page read and write
66FF000
stack
page read and write
1F810AD5000
trusted library allocation
page read and write
1F80F0BF000
trusted library allocation
page read and write
1F810A22000
trusted library allocation
page read and write
64AD000
trusted library allocation
page read and write
5F77000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
5F98000
trusted library allocation
page read and write
1F80F082000
trusted library allocation
page read and write
62E6000
trusted library allocation
page read and write
1F80F658000
trusted library allocation
page read and write
1F87F5E5000
trusted library allocation
page read and write
5311000
trusted library allocation
page read and write
1F80F65D000
trusted library allocation
page read and write
5AED000
trusted library allocation
page read and write
2AE0D2FE000
trusted library allocation
page read and write
5329000
trusted library allocation
page read and write
5514000
trusted library allocation
page read and write
4EF1000
heap
page read and write
27F66CB0000
heap
page read and write
318E000
stack
page read and write
4681000
heap
page read and write
63F8000
trusted library allocation
page read and write
4E70000
remote allocation
page read and write
348F000
stack
page read and write
16B7000
heap
page read and write
1F87F4AD000
trusted library allocation
page read and write
22908800000
heap
page read and write
5F92000
trusted library allocation
page read and write
1550000
direct allocation
page read and write
71D000
heap
page read and write
56BA000
trusted library allocation
page read and write
176F000
stack
page read and write
798000
heap
page read and write
530C000
trusted library allocation
page read and write
1124000
heap
page read and write
C42323E000
unkown
page readonly
6243000
trusted library allocation
page read and write
C4231BD000
stack
page read and write
14FC000
stack
page read and write
6071000
trusted library allocation
page read and write
4BC1000
heap
page read and write
12D8000
heap
page read and write
5838000
trusted library allocation
page read and write
5F6A000
trusted library allocation
page read and write
4D8000
unkown
page execute and read and write
3FCF000
stack
page read and write
AAD62BE000
stack
page read and write
42C1000
heap
page read and write
1D2AF000
stack
page read and write
523B000
trusted library allocation
page read and write
46AE000
stack
page read and write
2AE088FD000
trusted library allocation
page read and write
4A51000
heap
page read and write
4B11000
heap
page read and write
1F80F0C9000
trusted library allocation
page read and write
5F9F000
trusted library allocation
page read and write
F54000
heap
page read and write
522A000
trusted library allocation
page read and write
378F000
stack
page read and write
1F87F472000
trusted library allocation
page read and write
377F000
stack
page read and write
4681000
heap
page read and write
6567000
trusted library allocation
page read and write
1105000
unkown
page execute and write copy
64AC000
trusted library allocation
page read and write
13A4000
heap
page read and write
11FD000
heap
page read and write
5AD4000
trusted library allocation
page read and write
27F66C90000
unclassified section
page readonly
8E1000
unkown
page execute and read and write
15C0000
direct allocation
page read and write
1F80AEB3000
trusted library allocation
page read and write
533A000
trusted library allocation
page read and write
FD0000
unkown
page readonly
18DF000
stack
page read and write
5EE9000
trusted library allocation
page read and write
5238000
trusted library allocation
page read and write
1124000
heap
page read and write
5E41000
trusted library allocation
page read and write
390E000
stack
page read and write
5230000
trusted library allocation
page read and write
533A000
trusted library allocation
page read and write
48C0000
direct allocation
page execute and read and write
B60000
heap
page read and write
64AE000
trusted library allocation
page read and write
6089000
trusted library allocation
page read and write
4ED1000
heap
page read and write
2AE091B1000
trusted library allocation
page read and write
C18000
unkown
page execute and read and write
2AE7FCD0000
heap
page read and write
3EBE000
stack
page read and write
1F8160D2000
trusted library allocation
page read and write
778000
heap
page read and write
5261000
trusted library allocation
page read and write
59D6000
trusted library allocation
page read and write
525E000
trusted library allocation
page read and write
3ADE000
stack
page read and write
1F87FEDA000
trusted library allocation
page read and write
B00000
direct allocation
page read and write
532A000
trusted library allocation
page read and write
2AE1181E000
trusted library allocation
page read and write
1564000
heap
page read and write
317E000
stack
page read and write
59CD000
trusted library allocation
page read and write
477E000
stack
page read and write
2AE095EA000
trusted library allocation
page read and write
1F80E9D6000
trusted library allocation
page read and write
2AE0911E000
trusted library allocation
page read and write
2AE0D2E4000
trusted library allocation
page read and write
4B00000
direct allocation
page read and write
15C0000
direct allocation
page read and write
1F87F71E000
trusted library allocation
page read and write
63F9000
trusted library allocation
page read and write
48EF000
stack
page read and write
59BF000
trusted library allocation
page read and write
4681000
heap
page read and write
4EF1000
heap
page read and write
6017000
trusted library allocation
page read and write
1F815E16000
trusted library allocation
page read and write
1F87E8E8000
trusted library allocation
page read and write
5A47000
trusted library allocation
page read and write
FFB000
unkown
page write copy
4D81000
heap
page read and write
7AB000
heap
page read and write
4EF1000
heap
page read and write
5F72000
trusted library allocation
page read and write
1020000
heap
page read and write
1F80E9E0000
trusted library allocation
page read and write
16AD000
heap
page read and write
27F673A8000
trusted library allocation
page read and write
1F810AC9000
trusted library allocation
page read and write
3E9E000
stack
page read and write
B00000
direct allocation
page read and write
AB4000
heap
page read and write
345E000
stack
page read and write
2AE11700000
trusted library allocation
page read and write
5FA7000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1662000
heap
page read and write
2AE09AF4000
trusted library allocation
page read and write
1F87FE7F000
trusted library allocation
page read and write
BB2000
unkown
page execute and write copy
5A1E000
trusted library allocation
page read and write
5222000
trusted library allocation
page read and write
D37000
unkown
page execute and write copy
7A7000
heap
page read and write
2AE7FCD0000
heap
page read and write
5F5F000
trusted library allocation
page read and write
27F672D0000
heap
page read and write
2AE7FCD6000
heap
page read and write
830000
unkown
page readonly
4EF1000
heap
page read and write
C51000
unkown
page execute and read and write
22908FAE000
heap
page read and write
4681000
heap
page read and write
328F000
stack
page read and write
1F817891000
trusted library allocation
page read and write
5F7B000
trusted library allocation
page read and write
510000
unkown
page execute and write copy
1222000
heap
page read and write
564000
heap
page read and write
2AE09176000
trusted library allocation
page read and write
1F80F0B7000
trusted library allocation
page read and write
4D81000
heap
page read and write
528B000
trusted library allocation
page read and write
A1F000
unkown
page execute and read and write
5043000
trusted library allocation
page read and write
4D91000
heap
page read and write
A9A000
unkown
page execute and read and write
63FC000
trusted library allocation
page read and write
135E000
stack
page read and write
644000
heap
page read and write
1D39D000
stack
page read and write
1124000
heap
page read and write
5117000
trusted library allocation
page execute and read and write
4C60000
direct allocation
page execute and read and write
1A08B590000
heap
page read and write
8D1C000
stack
page read and write
4D81000
heap
page read and write
5928000
trusted library allocation
page read and write
FC0000
heap
page read and write
4ED1000
heap
page read and write
AB4000
heap
page read and write
5090000
direct allocation
page execute and read and write
4A6E000
stack
page read and write
5AB0000
trusted library allocation
page read and write
5228000
trusted library allocation
page read and write
341F000
stack
page read and write
22908F20000
heap
page read and write
122B000
heap
page read and write
5E49000
trusted library allocation
page read and write
1F810ABA000
trusted library allocation
page read and write
4B11000
heap
page read and write
4CB000
unkown
page execute and read and write
13C0000
heap
page read and write
1F815E3C000
trusted library allocation
page read and write
34FF000
stack
page read and write
575F000
trusted library allocation
page read and write
5E4A000
trusted library allocation
page read and write
57EE000
trusted library allocation
page read and write
63F2000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
54F0000
direct allocation
page execute and read and write
121C000
heap
page read and write
1F80EEDE000
trusted library allocation
page read and write
59BE000
trusted library allocation
page read and write
5311000
trusted library allocation
page read and write
2AE7FCD6000
heap
page read and write
2AE0906D000
trusted library allocation
page read and write
1F80F0C9000
trusted library allocation
page read and write
27F67383000
trusted library allocation
page read and write
64E7000
trusted library allocation
page read and write
56B8000
trusted library allocation
page read and write
59C2000
trusted library allocation
page read and write
2290826F000
trusted library allocation
page read and write
2EBF000
stack
page read and write
5258000
trusted library allocation
page read and write
FDF000
heap
page read and write
624E000
trusted library allocation
page read and write
53B1000
direct allocation
page read and write
1F87F6FE000
trusted library allocation
page read and write
4D81000
heap
page read and write
110E000
stack
page read and write
4D81000
heap
page read and write
4681000
heap
page read and write
656A000
trusted library allocation
page read and write
4C8E000
stack
page read and write
1124000
heap
page read and write
1F816099000
trusted library allocation
page read and write
1F87F77E000
trusted library allocation
page read and write
1F80AED8000
trusted library allocation
page read and write
11BE000
stack
page read and write
4A51000
heap
page read and write
2A30000
direct allocation
page execute and read and write
501F000
stack
page read and write
5245000
trusted library allocation
page read and write
2F7E000
stack
page read and write
5F90000
trusted library allocation
page read and write
2AE7FEC5000
trusted library allocation
page read and write
D27000
unkown
page execute and read and write
1F810A6D000
trusted library allocation
page read and write
42FE000
stack
page read and write
63F8000
trusted library allocation
page read and write
FC0000
heap
page read and write
15EA000
heap
page read and write
1F810B89000
trusted library allocation
page read and write
A7A000
unkown
page execute and read and write
6254000
trusted library allocation
page read and write
4E9000
unkown
page execute and write copy
1F80F062000
trusted library allocation
page read and write
56BA000
trusted library allocation
page read and write
538E000
stack
page read and write
4C80000
direct allocation
page execute and read and write
644000
heap
page read and write
F54000
heap
page read and write
1F87F390000
trusted library allocation
page read and write
2AE09180000
trusted library allocation
page read and write
EE4000
heap
page read and write
1124000
heap
page read and write
4BC1000
heap
page read and write
644000
heap
page read and write
121B000
heap
page read and write
5FBC000
trusted library allocation
page read and write
1369000
heap
page read and write
2AE0916F000
trusted library allocation
page read and write
2AE09511000
trusted library allocation
page read and write
4BC1000
heap
page read and write
229087B7000
unkown
page execute read
4861000
heap
page read and write
FD8000
unkown
page execute and read and write
5AAC000
trusted library allocation
page read and write
AC9000
unkown
page write copy
6254000
trusted library allocation
page read and write
68D000
unkown
page execute and read and write
5FCF000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
4BC1000
heap
page read and write
439E000
stack
page read and write
5220000
direct allocation
page execute and read and write
5AEE000
trusted library allocation
page read and write
53F0000
direct allocation
page execute and read and write
798000
heap
page read and write
3B4F000
stack
page read and write
11FD000
heap
page read and write
2AE09AF0000
trusted library allocation
page read and write
2AE1173C000
trusted library allocation
page read and write
5AE8000
trusted library allocation
page read and write
1AD3F000
stack
page read and write
2AE089DE000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
1307000
heap
page read and write
16D4000
heap
page read and write
22907EC6000
remote allocation
page execute read
5470000
direct allocation
page execute and read and write
2AE0885F000
trusted library allocation
page read and write
4B11000
heap
page read and write
48BE000
stack
page read and write
4F91000
heap
page read and write
3BDE000
stack
page read and write
1CFDD000
stack
page read and write
3FDE000
stack
page read and write
59FC000
trusted library allocation
page read and write
2AE0D2EB000
trusted library allocation
page read and write
1F8160FB000
trusted library allocation
page read and write
5254000
trusted library allocation
page read and write
1F3C5BCF000
heap
page read and write
4B11000
heap
page read and write
16D4000
heap
page read and write
1F87E8FB000
trusted library allocation
page read and write
6331000
trusted library allocation
page read and write
4BC1000
heap
page read and write
7A3000
heap
page read and write
4D81000
heap
page read and write
2F5F000
stack
page read and write
131F000
stack
page read and write
63F9000
trusted library allocation
page read and write
4B11000
heap
page read and write
1357000
heap
page read and write
4681000
heap
page read and write
16D4000
heap
page read and write
6051000
trusted library allocation
page read and write
1124000
heap
page read and write
4B11000
heap
page read and write
2AE7FEF8000
trusted library allocation
page read and write
3F5F000
stack
page read and write
5ED000
unkown
page execute and read and write
1540000
heap
page read and write
494E000
stack
page read and write
1F87FF84000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
300F000
stack
page read and write
1334000
heap
page read and write
BDB000
unkown
page execute and read and write
482000
unkown
page readonly
4BC1000
heap
page read and write
1AE7F000
stack
page read and write
1212000
heap
page read and write
1550000
direct allocation
page read and write
387E000
stack
page read and write
2C3F000
stack
page read and write
1F80E48F000
trusted library allocation
page read and write
5F25000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
5329000
trusted library allocation
page read and write
AB4000
heap
page read and write
2AE0C8D3000
trusted library allocation
page read and write
49E0000
direct allocation
page read and write
4BC1000
heap
page read and write
1F87FFD1000
trusted library allocation
page read and write
10AF000
heap
page read and write
59CF000
trusted library allocation
page read and write
606D000
trusted library allocation
page read and write
13A4000
heap
page read and write
5430000
direct allocation
page execute and read and write
64C7000
trusted library allocation
page read and write
2E1C000
stack
page read and write
59EC000
trusted library allocation
page read and write
444E000
stack
page read and write
5F90000
trusted library allocation
page read and write
2AE091DB000
trusted library allocation
page read and write
33AF000
stack
page read and write
5F6F000
trusted library allocation
page read and write
1212000
heap
page read and write
2A57000
heap
page read and write
4B11000
heap
page read and write
1F87FFF0000
trusted library allocation
page read and write
6060000
trusted library allocation
page read and write
3A4E000
stack
page read and write
5F7D000
trusted library allocation
page read and write
1F8117EB000
trusted library allocation
page read and write
564000
heap
page read and write
56BB000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1270000
heap
page read and write
AB4000
heap
page read and write
5C0000
heap
page read and write
4F50000
trusted library allocation
page read and write
1F810BCB000
trusted library allocation
page read and write
1F81620A000
trusted library allocation
page read and write
5F6F000
trusted library allocation
page read and write
4861000
heap
page read and write
4B11000
heap
page read and write
1113000
unkown
page execute and write copy
22908F23000
heap
page read and write
2AE088DC000
trusted library allocation
page read and write
564000
heap
page read and write
5F58000
trusted library allocation
page read and write
8F4DFFE000
stack
page read and write
7B1000
heap
page read and write
5221000
trusted library allocation
page read and write
27F67303000
trusted library allocation
page read and write
2AE7FE81000
trusted library allocation
page read and write
1F87F5CD000
trusted library allocation
page read and write
64AA000
trusted library allocation
page read and write
810000
direct allocation
page read and write
5F20000
trusted library allocation
page read and write
3C6F000
stack
page read and write
3C1000
unkown
page execute read
63F8000
trusted library allocation
page read and write
54F0000
direct allocation
page execute and read and write
7881000
heap
page read and write
5AA8000
trusted library allocation
page read and write
63F4000
trusted library allocation
page read and write
525C000
trusted library allocation
page read and write
66B3000
trusted library allocation
page read and write
4681000
heap
page read and write
1124000
heap
page read and write
5100000
direct allocation
page execute and read and write
1F80F074000
trusted library allocation
page read and write
5AA8000
trusted library allocation
page read and write
2ECF000
stack
page read and write
4BC1000
heap
page read and write
120E000
heap
page read and write
1F815E6C000
trusted library allocation
page read and write
5513000
trusted library allocation
page read and write
5223000
trusted library allocation
page read and write
644000
heap
page read and write
5270000
trusted library allocation
page read and write
4681000
heap
page read and write
2AE095F4000
trusted library allocation
page read and write
533A000
trusted library allocation
page read and write
4BAE000
stack
page read and write
5530000
direct allocation
page execute and read and write
5AD0000
trusted library allocation
page read and write
1F87F5D5000
trusted library allocation
page read and write
425E000
stack
page read and write
4E30000
direct allocation
page execute and read and write
47C000
unkown
page execute and read and write
3F0F000
stack
page read and write
505000
unkown
page execute and read and write
360E000
stack
page read and write
4C3F000
stack
page read and write
B72000
unkown
page execute and read and write
564000
heap
page read and write
5FA5000
trusted library allocation
page read and write
40DE000
stack
page read and write
37DF000
stack
page read and write
4681000
heap
page read and write
4E70000
remote allocation
page read and write
13B0000
direct allocation
page read and write
4B11000
heap
page read and write
6071000
trusted library allocation
page read and write
533A000
trusted library allocation
page read and write
149E000
stack
page read and write
1B50E000
stack
page read and write
14A0000
heap
page read and write
22908EA4000
heap
page read and write
4EF1000
heap
page read and write
2AE089F9000
trusted library allocation
page read and write
2AE7FCD0000
heap
page read and write
564000
heap
page read and write
1564000
heap
page read and write
5E42000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
5225000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
1F8160D2000
trusted library allocation
page read and write
10BE000
heap
page read and write
AB4000
heap
page read and write
4D6000
unkown
page execute and write copy
1124000
heap
page read and write
2AE0906D000
trusted library allocation
page read and write
56B0000
trusted library allocation
page read and write
1F87F782000
trusted library allocation
page read and write
E94000
unkown
page execute and write copy
1F80F0CD000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
2F1F000
stack
page read and write
743000
heap
page read and write
2AE095E6000
trusted library allocation
page read and write
649A000
trusted library allocation
page read and write
4B11000
heap
page read and write
DFD000
stack
page read and write
5245000
trusted library allocation
page read and write
2AE7FCD6000
heap
page read and write
5AA1000
trusted library allocation
page read and write
59D8000
trusted library allocation
page read and write
4681000
heap
page read and write
1F8160C0000
trusted library allocation
page read and write
5259000
trusted library allocation
page read and write
13B0000
direct allocation
page read and write
4B11000
heap
page read and write
778E000
stack
page read and write
5280000
trusted library allocation
page read and write
32BF000
stack
page read and write
1D25E000
stack
page read and write
1D49E000
stack
page read and write
5F85000
trusted library allocation
page read and write
327F000
stack
page read and write
318E000
stack
page read and write
5F78000
trusted library allocation
page read and write
5797000
trusted library allocation
page read and write
AFE000
stack
page read and write
788000
heap
page read and write
2AE091B1000
trusted library allocation
page read and write
4C90000
direct allocation
page execute and read and write
13A4000
heap
page read and write
5548000
trusted library allocation
page read and write
22908F6B000
heap
page read and write
15C0000
direct allocation
page read and write
48A0000
direct allocation
page execute and read and write
1F80DA8F000
trusted library allocation
page read and write
47EE000
stack
page read and write
35CF000
stack
page read and write
2AE7FCD0000
heap
page read and write
1390000
heap
page read and write
5245000
trusted library allocation
page read and write
74DE000
stack
page read and write
8F4EFFE000
stack
page read and write
7B1000
heap
page read and write
2AE05126000
trusted library allocation
page read and write
22908F7C000
heap
page read and write
1F80E4BC000
trusted library allocation
page read and write
485F000
stack
page read and write
5A0D000
trusted library allocation
page read and write
4681000
heap
page read and write
4D81000
heap
page read and write
5FC4000
trusted library allocation
page read and write
4740000
direct allocation
page read and write
2AE091F0000
trusted library allocation
page read and write
1F80AE49000
trusted library allocation
page read and write
1020000
heap
page read and write
56B5000
trusted library allocation
page read and write
5289000
trusted library allocation
page read and write
2AE7FCDC000
heap
page read and write
3BFF000
stack
page read and write
B00000
direct allocation
page read and write
11FF000
heap
page read and write
4681000
heap
page read and write
4F80000
direct allocation
page read and write
398F000
stack
page read and write
1F80B195000
trusted library allocation
page read and write
5F8D000
trusted library allocation
page read and write
64F5000
heap
page read and write
860000
direct allocation
page read and write
524F000
trusted library allocation
page read and write
5EE8000
trusted library allocation
page read and write
2AE09531000
trusted library allocation
page read and write
1124000
heap
page read and write
64C3000
trusted library allocation
page read and write
AB0000
heap
page read and write
2AE7FE9A000
trusted library allocation
page read and write
B00000
direct allocation
page read and write
5F7E000
trusted library allocation
page read and write
7A3000
heap
page read and write
675C000
trusted library allocation
page read and write
564000
heap
page read and write
4681000
heap
page read and write
59DB000
trusted library allocation
page read and write
736000
heap
page read and write
B7B000
unkown
page execute and read and write
1223000
heap
page read and write
1A08B658000
heap
page read and write
391F000
stack
page read and write
2DB0000
direct allocation
page read and write
4BC1000
heap
page read and write
5F03000
trusted library allocation
page read and write
1F80F64C000
trusted library allocation
page read and write
4681000
heap
page read and write
576F000
trusted library allocation
page read and write
AB4000
heap
page read and write
63FC000
trusted library allocation
page read and write
5050000
direct allocation
page read and write
1F80E9F1000
trusted library allocation
page read and write
5222000
trusted library allocation
page read and write
40FF000
stack
page read and write
1F87F4E3000
trusted library allocation
page read and write
2F9E000
stack
page read and write
4F80000
direct allocation
page read and write
59B1000
trusted library allocation
page read and write
4BC1000
heap
page read and write
7540000
heap
page execute and read and write
4730000
remote allocation
page read and write
5FB0000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
1212000
heap
page read and write
B00000
direct allocation
page read and write
1F3C5C00000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
132F000
heap
page read and write
5FAE000
trusted library allocation
page read and write
3C0000
unkown
page readonly
526B000
trusted library allocation
page read and write
54D0000
direct allocation
page execute and read and write
22908100000
trusted library allocation
page read and write
4BC1000
heap
page read and write
1124000
heap
page read and write
5AC1000
trusted library allocation
page read and write
1F87F3B3000
trusted library allocation
page read and write
1F80D56E000
trusted library allocation
page read and write
6FF000
heap
page read and write
523A000
trusted library allocation
page read and write
11FE000
heap
page read and write
4B11000
heap
page read and write
5238000
trusted library allocation
page read and write
27F67323000
trusted library allocation
page read and write
1F80E6C0000
trusted library allocation
page read and write
2AE7FCD6000
heap
page read and write
5024000
heap
page read and write
5AB9000
trusted library allocation
page read and write
6240000
trusted library allocation
page read and write
4681000
heap
page read and write
363F000
stack
page read and write
4D81000
heap
page read and write
2AE09024000
trusted library allocation
page read and write
5F9C000
trusted library allocation
page read and write
2AE7FEAA000
trusted library allocation
page read and write
EE4000
heap
page read and write
5AEE000
trusted library allocation
page read and write
1F80E9F1000
trusted library allocation
page read and write
4EF1000
heap
page read and write
8E1000
unkown
page execute and read and write
4E40000
direct allocation
page read and write
810000
direct allocation
page read and write
AB4000
heap
page read and write
2AE09AF8000
trusted library allocation
page read and write
1F80D57C000
trusted library allocation
page read and write
1F87F75C000
trusted library allocation
page read and write
3DFE000
stack
page read and write
6254000
trusted library allocation
page read and write
1F80E952000
trusted library allocation
page read and write
64EB000
trusted library allocation
page read and write
6071000
trusted library allocation
page read and write
4E40000
direct allocation
page read and write
4AC0000
trusted library allocation
page read and write
5FAE000
trusted library allocation
page read and write
47AF000
stack
page read and write
459F000
stack
page read and write
48C0000
direct allocation
page execute and read and write
1F81788F000
trusted library allocation
page read and write
4E40000
direct allocation
page read and write
2A20000
direct allocation
page read and write
56B8000
trusted library allocation
page read and write
64F7000
trusted library allocation
page read and write
5EF2000
trusted library allocation
page read and write
A7A000
unkown
page execute and read and write
14DF000
heap
page read and write
64AF000
trusted library allocation
page read and write
22908770000
trusted library section
page readonly
9B8000
unkown
page execute and read and write
54D0000
direct allocation
page execute and read and write
564000
heap
page read and write
22908F62000
heap
page read and write
209E000
stack
page read and write
443F000
stack
page read and write
564000
heap
page read and write
4EF1000
heap
page read and write
2AE09167000
trusted library allocation
page read and write
AB4000
heap
page read and write
120E000
heap
page read and write
22908F99000
heap
page read and write
521A000
trusted library allocation
page read and write
5E45000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
649D000
trusted library allocation
page read and write
13B0000
direct allocation
page read and write
B70000
unkown
page readonly
2DB0000
direct allocation
page read and write
167F000
stack
page read and write
57B3000
trusted library allocation
page read and write
31D0000
direct allocation
page read and write
511B000
trusted library allocation
page execute and read and write
1F810B67000
trusted library allocation
page read and write
5050000
direct allocation
page read and write
2AE089C3000
trusted library allocation
page read and write
1F816231000
trusted library allocation
page read and write
5278000
trusted library allocation
page read and write
13A4000
heap
page read and write
B70000
unkown
page readonly
1F80D561000
trusted library allocation
page read and write
22908F7C000
heap
page read and write
517E000
stack
page read and write
4681000
heap
page read and write
5339000
trusted library allocation
page read and write
644000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
4EF1000
heap
page read and write
1F87F487000
trusted library allocation
page read and write
5339000
trusted library allocation
page read and write
21D0000
heap
page read and write
1C97E000
stack
page read and write
59C9000
trusted library allocation
page read and write
EC5000
heap
page read and write
3ACF000
stack
page read and write
E84000
unkown
page execute and read and write
4B00000
direct allocation
page read and write
14CF000
heap
page read and write
3FBF000
stack
page read and write
4BC1000
heap
page read and write
1F87F46A000
trusted library allocation
page read and write
64AE000
trusted library allocation
page read and write
56BC000
trusted library allocation
page read and write
1F810BF5000
trusted library allocation
page read and write
4F84000
trusted library allocation
page read and write
5AA8000
trusted library allocation
page read and write
4EB0000
direct allocation
page execute and read and write
3980000
heap
page read and write
1DCD7BA0000
heap
page read and write
16B5000
heap
page read and write
1289000
heap
page read and write
13A4000
heap
page read and write
27F6735D000
trusted library allocation
page read and write
1F3C5B70000
heap
page read and write
15C0000
direct allocation
page read and write
2AE063DC000
trusted library allocation
page read and write
2AE11773000
trusted library allocation
page read and write
5410000
remote allocation
page read and write
B50000
unkown
page execute and write copy
2AE0B7F8000
trusted library allocation
page read and write
1F87F462000
trusted library allocation
page read and write
2AE088FD000
trusted library allocation
page read and write
51B0000
direct allocation
page execute and read and write
1124000
heap
page read and write
1394000
heap
page read and write
2AE095EE000
trusted library allocation
page read and write
52D1000
direct allocation
page read and write
5E46000
trusted library allocation
page read and write
306000
unkown
page write copy
5370000
direct allocation
page execute and read and write
4BC1000
heap
page read and write
4D81000
heap
page read and write
16D4000
heap
page read and write
644000
heap
page read and write
4D7F000
stack
page read and write
10A6000
heap
page read and write
BD9000
unkown
page write copy
5285000
trusted library allocation
page read and write
4BC1000
heap
page read and write
4EF1000
heap
page read and write
4BBF000
stack
page read and write
59C4000
trusted library allocation
page read and write
5AC9000
trusted library allocation
page read and write
48C0000
direct allocation
page execute and read and write
27F67412000
trusted library allocation
page read and write
15F4000
heap
page read and write
649F000
trusted library allocation
page read and write
31BE000
stack
page read and write
4681000
heap
page read and write
523B000
trusted library allocation
page read and write
5ACF000
trusted library allocation
page read and write
4681000
heap
page read and write
22908F3C000
heap
page read and write
4EF1000
heap
page read and write
4B11000
heap
page read and write
6071000
trusted library allocation
page read and write
860000
direct allocation
page read and write
644000
heap
page read and write
4D81000
heap
page read and write
5F77000
trusted library allocation
page read and write
49E0000
direct allocation
page read and write
11BF000
stack
page read and write
2AE7FEFD000
trusted library allocation
page read and write
34CE000
stack
page read and write
41CE000
stack
page read and write
5570000
direct allocation
page execute and read and write
1F87F443000
trusted library allocation
page read and write
521C000
trusted library allocation
page read and write
2DB0000
direct allocation
page read and write
41BF000
stack
page read and write
533A000
trusted library allocation
page read and write
4BC1000
heap
page read and write
8D21000
heap
page read and write
1F87F726000
trusted library allocation
page read and write
1F87F6FB000
trusted library allocation
page read and write
16A4000
heap
page read and write
1A08B642000
heap
page read and write
1394000
heap
page read and write
AAD2F67000
stack
page read and write
644000
heap
page read and write
2AE7FE9E000
trusted library allocation
page read and write
522A000
trusted library allocation
page read and write
16B5000
heap
page read and write
1F80AEEC000
trusted library allocation
page read and write
1F8160BA000
trusted library allocation
page read and write
2AE05182000
trusted library allocation
page read and write
59EC000
trusted library allocation
page read and write
BD2000
unkown
page execute and read and write
5269000
trusted library allocation
page read and write
416F000
stack
page read and write
FA0000
heap
page read and write
1647000
heap
page read and write
533A000
trusted library allocation
page read and write
534000
unkown
page execute and read and write
59D6000
trusted library allocation
page read and write
1F816099000
trusted library allocation
page read and write
577E000
trusted library allocation
page read and write
4681000
heap
page read and write
1F80E9FD000
trusted library allocation
page read and write
56B6000
trusted library allocation
page read and write
1F80AEF9000
trusted library allocation
page read and write
1F87F48A000
trusted library allocation
page read and write
1F80E9E0000
trusted library allocation
page read and write
27F66E90000
unclassified section
page readonly
2D7F000
stack
page read and write
4B11000
heap
page read and write
5F7E000
trusted library allocation
page read and write
1F80E960000
trusted library allocation
page read and write
56B7000
trusted library allocation
page read and write
121B000
heap
page read and write
63FD000
trusted library allocation
page read and write
A36000
unkown
page execute and read and write
C42313E000
unkown
page readonly
5AB0000
trusted library allocation
page read and write
44FE000
stack
page read and write
6ED59FC000
stack
page read and write
2AE7FCD6000
heap
page read and write
4F94000
trusted library allocation
page read and write
1662000
heap
page read and write
2AE7FCDC000
heap
page read and write
5060000
direct allocation
page execute and read and write
6060000
trusted library allocation
page read and write
1F816239000
trusted library allocation
page read and write
6329000
trusted library allocation
page read and write
229082EF000
trusted library allocation
page read and write
4EF1000
heap
page read and write
2AE0D1DE000
trusted library allocation
page read and write
4E80000
direct allocation
page read and write
1124000
heap
page read and write
5350000
direct allocation
page execute and read and write
1F80F078000
trusted library allocation
page read and write
2AE09131000
trusted library allocation
page read and write
4C80000
direct allocation
page execute and read and write
137B000
heap
page read and write
4BC1000
heap
page read and write
13B0000
direct allocation
page read and write
22908050000
heap
page readonly
5CA8000
trusted library allocation
page read and write
229083D4000
heap
page read and write
63F1000
trusted library allocation
page read and write
59B1000
trusted library allocation
page read and write
59BC000
trusted library allocation
page read and write
5E1000
unkown
page execute and read and write
127E000
stack
page read and write
2AE0915E000
trusted library allocation
page read and write
5F9F000
trusted library allocation
page read and write
5238000
trusted library allocation
page read and write
2AE091AD000
trusted library allocation
page read and write
1F80F096000
trusted library allocation
page read and write
1F87F726000
trusted library allocation
page read and write
1564000
heap
page read and write
4FF0000
trusted library allocation
page read and write
1334000
heap
page read and write
1F810AB6000
trusted library allocation
page read and write
64AC000
trusted library allocation
page read and write
59BC000
trusted library allocation
page read and write
3C1000
unkown
page execute read
D0C000
stack
page read and write
5D0000
unkown
page readonly
1F80F097000
trusted library allocation
page read and write
1124000
heap
page read and write
63F7000
trusted library allocation
page read and write
E33000
unkown
page execute and read and write
5AA1000
trusted library allocation
page read and write
1F80D5F6000
trusted library allocation
page read and write
5190000
heap
page read and write
5AD9000
trusted library allocation
page read and write
5A0C000
trusted library allocation
page read and write
1124000
heap
page read and write
4BC1000
heap
page read and write
521B000
trusted library allocation
page read and write
481F000
stack
page read and write
1F810BB3000
trusted library allocation
page read and write
5F9E000
trusted library allocation
page read and write
78F000
heap
page read and write
4DF0000
heap
page read and write
1F87FF73000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
5F7D000
trusted library allocation
page read and write
57E8000
trusted library allocation
page read and write
2ECF000
stack
page read and write
5225000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
5040000
direct allocation
page execute and read and write
1F80F077000
trusted library allocation
page read and write
2DC0000
heap
page read and write
4A51000
heap
page read and write
644000
heap
page read and write
4BC1000
heap
page read and write
522C000
trusted library allocation
page read and write
1A08D1AE000
heap
page read and write
1B01E000
stack
page read and write
5F8A000
trusted library allocation
page read and write
2AE0909A000
trusted library allocation
page read and write
54C0000
direct allocation
page execute and read and write
1F810A59000
trusted library allocation
page read and write
14A4000
heap
page read and write
A8E000
unkown
page execute and read and write
5FAA000
trusted library allocation
page read and write
16D4000
heap
page read and write
A14000
heap
page read and write
1350000
heap
page read and write
4681000
heap
page read and write
49FE000
stack
page read and write
524C000
trusted library allocation
page read and write
4DCE000
stack
page read and write
393E000
stack
page read and write
5E4F000
trusted library allocation
page read and write
5252000
trusted library allocation
page read and write
1124000
heap
page read and write
22908F85000
heap
page read and write
63F0000
trusted library allocation
page read and write
4BC1000
heap
page read and write
644000
heap
page read and write
4BC1000
heap
page read and write
4E51000
heap
page read and write
551C000
trusted library allocation
page read and write
5AD5000
trusted library allocation
page read and write
1124000
heap
page read and write
2AE08F7D000
trusted library allocation
page read and write
3DFF000
stack
page read and write
5050000
direct allocation
page read and write
4EF1000
heap
page read and write
810000
direct allocation
page read and write
59B4000
trusted library allocation
page read and write
1550000
direct allocation
page read and write
1334000
heap
page read and write
22908281000
trusted library allocation
page read and write
5F58000
trusted library allocation
page read and write
4BC1000
heap
page read and write
751E000
stack
page read and write
4681000
heap
page read and write
E54000
unkown
page execute and write copy
47CF000
stack
page read and write
1CBBF000
stack
page read and write
D6C000
unkown
page execute and read and write
2AE095F4000
trusted library allocation
page read and write
1F810BCF000
trusted library allocation
page read and write
AB4000
heap
page read and write
3C0F000
stack
page read and write
1124000
heap
page read and write
54D0000
direct allocation
page execute and read and write
4681000
heap
page read and write
5ACA000
trusted library allocation
page read and write
4E90000
direct allocation
page execute and read and write
1F81649A000
trusted library allocation
page read and write
5AD4000
trusted library allocation
page read and write
1F87FBE6000
trusted library allocation
page read and write
1F80F0CD000
trusted library allocation
page read and write
59CA000
trusted library allocation
page read and write
59BC000
trusted library allocation
page read and write
4B11000
heap
page read and write
4B11000
heap
page read and write
A10000
heap
page read and write
AD6000
unkown
page execute and read and write
62F0000
trusted library allocation
page read and write
4BC1000
heap
page read and write
C7C000
unkown
page execute and write copy
3DCF000
stack
page read and write
1A08B651000
heap
page read and write
AB4000
heap
page read and write
1F8160BA000
trusted library allocation
page read and write
414E000
stack
page read and write
4E51000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
16AC000
heap
page read and write
4B11000
heap
page read and write
120E000
heap
page read and write
1DCD7C40000
heap
page read and write
8F4E7FE000
stack
page read and write
530000
unkown
page execute and write copy
1F815E13000
trusted library allocation
page read and write
EE4000
heap
page read and write
DB9000
stack
page read and write
2AE0C8D6000
trusted library allocation
page read and write
5329000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
4BC1000
heap
page read and write
395F000
stack
page read and write
4B11000
heap
page read and write
27F66E10000
heap
page readonly
4E40000
direct allocation
page read and write
1F87F775000
trusted library allocation
page read and write
AB4000
heap
page read and write
59CD000
trusted library allocation
page read and write
1B40E000
stack
page read and write
473F000
stack
page read and write
602C000
trusted library allocation
page read and write
9FA000
unkown
page execute and read and write
644000
heap
page read and write
1F80F0BF000
trusted library allocation
page read and write
4B11000
heap
page read and write
1CABE000
stack
page read and write
16B8000
heap
page read and write
4E50000
direct allocation
page execute and read and write
122B000
heap
page read and write
2AE091F7000
trusted library allocation
page read and write
14CB000
heap
page read and write
12C4000
heap
page read and write
2AE0885F000
trusted library allocation
page read and write
5F7A000
trusted library allocation
page read and write
1564000
heap
page read and write
6060000
trusted library allocation
page read and write
430E000
stack
page read and write
2AE0882D000
trusted library allocation
page read and write
4ED0000
heap
page read and write
490000
unkown
page write copy
1B2AE000
stack
page read and write
64CD000
trusted library allocation
page read and write
22908EAC000
heap
page read and write
5F5D000
trusted library allocation
page read and write
4D81000
heap
page read and write
160F000
heap
page read and write
59BF000
trusted library allocation
page read and write
123E000
stack
page read and write
5F7B000
trusted library allocation
page read and write
55A0000
direct allocation
page execute and read and write
51F000
unkown
page execute and write copy
1F87E8F8000
trusted library allocation
page read and write
5F9D000
trusted library allocation
page read and write
482000
unkown
page readonly
4681000
heap
page read and write
2AE088FD000
trusted library allocation
page read and write
564000
heap
page read and write
5520000
direct allocation
page execute and read and write
1F8178B3000
trusted library allocation
page read and write
22908F23000
heap
page read and write
63FF000
trusted library allocation
page read and write
121A000
unkown
page read and write
63F4000
trusted library allocation
page read and write
4EF1000
heap
page read and write
5F76000
trusted library allocation
page read and write
644000
heap
page read and write
5AA1000
trusted library allocation
page read and write
4D81000
heap
page read and write
6052000
trusted library allocation
page read and write
16D4000
heap
page read and write
42C1000
heap
page read and write
644000
heap
page read and write
4681000
heap
page read and write
1F80E6FD000
trusted library allocation
page read and write
2AE091D3000
trusted library allocation
page read and write
4BC1000
heap
page read and write
76FA000
heap
page read and write
5245000
trusted library allocation
page read and write
4D81000
heap
page read and write
22908F28000
heap
page read and write
345F000
stack
page read and write
1F80AE8E000
trusted library allocation
page read and write
1F3C5E0A000
trusted library allocation
page read and write
52AB000
trusted library allocation
page read and write
1321000
heap
page read and write
FF0000
direct allocation
page read and write
4EF1000
heap
page read and write
1124000
heap
page read and write
31DF000
stack
page read and write
46DF000
stack
page read and write
C41DD2E000
unkown
page readonly
589E000
trusted library allocation
page read and write
522D000
trusted library allocation
page read and write
63C9000
trusted library allocation
page read and write
4BC1000
heap
page read and write
3D3F000
stack
page read and write
6087000
trusted library allocation
page read and write
497E000
stack
page read and write
798000
heap
page read and write
1124000
heap
page read and write
1653000
heap
page read and write
1F80D572000
trusted library allocation
page read and write
2AE08833000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
624D000
trusted library allocation
page read and write
11FE000
stack
page read and write
63FA000
trusted library allocation
page read and write
D36000
unkown
page execute and read and write
5E4D000
trusted library allocation
page read and write
6339000
trusted library allocation
page read and write
5370000
direct allocation
page read and write
49E0000
direct allocation
page read and write
16AD000
heap
page read and write
3AFE000
stack
page read and write
5260000
trusted library allocation
page read and write
5F84000
trusted library allocation
page read and write
10BE000
heap
page read and write
5380000
direct allocation
page execute and read and write
6060000
trusted library allocation
page read and write
2D5F000
stack
page read and write
B00000
direct allocation
page read and write
D7B000
heap
page read and write
2AE091FB000
trusted library allocation
page read and write
46FE000
stack
page read and write
522C000
trusted library allocation
page read and write
564000
heap
page read and write
4CC0000
trusted library allocation
page read and write
1F80AE96000
trusted library allocation
page read and write
229087B9000
unkown
page execute read
2AE0915E000
trusted library allocation
page read and write
B00000
direct allocation
page read and write
4C3F000
stack
page read and write
1F810B6D000
trusted library allocation
page read and write
1124000
heap
page read and write
16D4000
heap
page read and write
4E40000
direct allocation
page execute and read and write
1D0DC000
stack
page read and write
1F810ABE000
trusted library allocation
page read and write
3F4E000
stack
page read and write
4BC1000
heap
page read and write
5FA9000
trusted library allocation
page read and write
5AEA000
trusted library allocation
page read and write
1F810BE9000
trusted library allocation
page read and write
1F87F3A4000
trusted library allocation
page read and write
39FF000
stack
page read and write
492000
unkown
page execute and write copy
1223000
heap
page read and write
120E000
heap
page read and write
5F59000
trusted library allocation
page read and write
2FCF000
stack
page read and write
1F817FF3000
trusted library allocation
page read and write
30A0000
direct allocation
page read and write
6BB000
heap
page read and write
AAD2EEE000
unkown
page readonly
4D81000
heap
page read and write
4F80000
direct allocation
page read and write
5ABE000
trusted library allocation
page read and write
1F80D5EF000
trusted library allocation
page read and write
30A000
unkown
page execute and write copy
1F87F713000
trusted library allocation
page read and write
2F5E000
stack
page read and write
1F81608C000
trusted library allocation
page read and write
1570000
heap
page read and write
1F87E8ED000
trusted library allocation
page read and write
AB4000
heap
page read and write
533A000
trusted library allocation
page read and write
5410000
remote allocation
page read and write
11EE000
stack
page read and write
16AF000
heap
page read and write
4EF1000
heap
page read and write
1645000
heap
page read and write
5FA4000
trusted library allocation
page read and write
1F810A41000
trusted library allocation
page read and write
5F78000
trusted library allocation
page read and write
4F83000
trusted library allocation
page execute and read and write
1F80E96C000
trusted library allocation
page read and write
14A4000
heap
page read and write
1CD4E000
stack
page read and write
4681000
heap
page read and write
531000
unkown
page execute and write copy
2AE09172000
trusted library allocation
page read and write
2AE0915F000
trusted library allocation
page read and write
1F3C5E07000
trusted library allocation
page read and write
1124000
heap
page read and write
1124000
heap
page read and write
143F000
stack
page read and write
4BC1000
heap
page read and write
51B0000
direct allocation
page read and write
1DCD8060000
heap
page read and write
68E000
stack
page read and write
5A07000
trusted library allocation
page read and write
4D81000
heap
page read and write
5352000
trusted library allocation
page read and write
4B6F000
stack
page read and write
341F000
stack
page read and write
14A4000
heap
page read and write
2AE0914D000
trusted library allocation
page read and write
575A000
trusted library allocation
page read and write
FDA000
unkown
page execute and write copy
22908215000
trusted library allocation
page read and write
860000
direct allocation
page read and write
3A9F000
stack
page read and write
870000
unkown
page readonly
1564000
heap
page read and write
11EF000
stack
page read and write
133E000
stack
page read and write
14CE000
heap
page read and write
4F8000
unkown
page execute and read and write
59BA000
trusted library allocation
page read and write
533F000
stack
page read and write
AB4000
heap
page read and write
3D1F000
stack
page read and write
16D4000
heap
page read and write
51B0000
direct allocation
page execute and read and write
52F6000
trusted library allocation
page read and write
CF5000
stack
page read and write
BD9000
unkown
page write copy
13A4000
heap
page read and write
3DAF000
stack
page read and write
1F87FCF4000
trusted library allocation
page read and write
3BBE000
stack
page read and write
3D5E000
stack
page read and write
307F000
stack
page read and write
2AE11732000
trusted library allocation
page read and write
5E4B000
trusted library allocation
page read and write
644000
heap
page read and write
681000
unkown
page execute and read and write
1F80D9F8000
trusted library allocation
page read and write
39C1000
heap
page read and write
22908265000
trusted library allocation
page read and write
AC7000
unkown
page execute and read and write
2AE09AFC000
trusted library allocation
page read and write
22908248000
trusted library allocation
page read and write
229080AA000
heap
page read and write
4EF1000
heap
page read and write
2AE091F0000
trusted library allocation
page read and write
526D000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
A4F000
unkown
page execute and write copy
1DCD7F07000
trusted library allocation
page read and write
63F9000
trusted library allocation
page read and write
43CE000
stack
page read and write
4B11000
heap
page read and write
13A4000
heap
page read and write
7ED000
stack
page read and write
1124000
heap
page read and write
63FE000
trusted library allocation
page read and write
1F80E97A000
trusted library allocation
page read and write
137E000
stack
page read and write
1212000
heap
page read and write
2AE09120000
trusted library allocation
page read and write
5263000
trusted library allocation
page read and write
1124000
heap
page read and write
56B7000
trusted library allocation
page read and write
C41DC6B000
stack
page read and write
5FBE000
trusted library allocation
page read and write
54D0000
direct allocation
page execute and read and write
A50000
direct allocation
page read and write
5F9E000
trusted library allocation
page read and write
64A2000
trusted library allocation
page read and write
63FB000
trusted library allocation
page read and write
523B000
trusted library allocation
page read and write
2AE0906D000
trusted library allocation
page read and write
335E000
stack
page read and write
5AD9000
trusted library allocation
page read and write
4BC1000
heap
page read and write
4681000
heap
page read and write
42C1000
heap
page read and write
1F810AB8000
trusted library allocation
page read and write
1F80F031000
trusted library allocation
page read and write
12FC000
heap
page read and write
5FB8000
trusted library allocation
page read and write
4D81000
heap
page read and write
4EF1000
heap
page read and write
15D8000
heap
page read and write
2AE09AF4000
trusted library allocation
page read and write
12FE000
stack
page read and write
121C000
heap
page read and write
1F87F39E000
trusted library allocation
page read and write
D5E000
heap
page read and write
5220000
trusted library allocation
page read and write
2AE091A2000
trusted library allocation
page read and write
529000
unkown
page execute and read and write
54A0000
direct allocation
page execute and read and write
4BC1000
heap
page read and write
64B7000
trusted library allocation
page read and write
4D81000
heap
page read and write
5F86000
trusted library allocation
page read and write
5F6A000
trusted library allocation
page read and write
59D5000
trusted library allocation
page read and write
54F0000
direct allocation
page execute and read and write
120E000
heap
page read and write
367E000
stack
page read and write
14DF000
heap
page read and write
4FD0000
trusted library allocation
page read and write
1550000
direct allocation
page read and write
1F80F057000
trusted library allocation
page read and write
2AE09AF0000
trusted library allocation
page read and write
1227000
heap
page read and write
424F000
stack
page read and write
E00000
heap
page read and write
1F87F3DF000
trusted library allocation
page read and write
1564000
heap
page read and write
55E0000
trusted library allocation
page read and write
1A08B7B0000
heap
page read and write
16D4000
heap
page read and write
E34000
unkown
page execute and write copy
4F80000
direct allocation
page read and write
1F810BF5000
trusted library allocation
page read and write
10C8000
heap
page read and write
49F1000
heap
page read and write
871000
unkown
page execute and write copy
644000
heap
page read and write
5D81000
trusted library allocation
page read and write
64C8000
trusted library allocation
page read and write
64F6000
heap
page read and write
2DA0000
heap
page read and write
1F80E4B9000
trusted library allocation
page read and write
60B9000
trusted library allocation
page read and write
2AE08E00000
trusted library allocation
page read and write
27F67347000
trusted library allocation
page read and write
8D39000
heap
page read and write
1124000
heap
page read and write
D10000
heap
page read and write
1325000
heap
page read and write
15B0000
heap
page read and write
FCE000
heap
page read and write
53D0000
direct allocation
page execute and read and write
2AE09031000
trusted library allocation
page read and write
13A4000
heap
page read and write
1227000
heap
page read and write
4BD7000
trusted library allocation
page read and write
57CC000
trusted library allocation
page read and write
64FF000
trusted library allocation
page read and write
16D4000
heap
page read and write
1F80B1DF000
trusted library allocation
page read and write
564000
heap
page read and write
4BC1000
heap
page read and write
5AAD000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
523A000
trusted library allocation
page read and write
153E000
stack
page read and write
5238000
trusted library allocation
page read and write
1D67C000
stack
page read and write
4D81000
heap
page read and write
1124000
heap
page read and write
121F000
heap
page read and write
5300000
direct allocation
page execute and read and write
5FFC000
trusted library allocation
page read and write
133E000
stack
page read and write
2B5F000
stack
page read and write
1F8160DB000
trusted library allocation
page read and write
5E43000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
5272000
trusted library allocation
page read and write
154E000
stack
page read and write
BD2000
unkown
page execute and read and write
398F000
stack
page read and write
A50000
direct allocation
page read and write
1124000
heap
page read and write
1F87F426000
trusted library allocation
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
E80000
heap
page read and write
4D41000
direct allocation
page read and write
1699000
heap
page read and write
644000
heap
page read and write
4BC1000
heap
page read and write
381F000
stack
page read and write
56B7000
trusted library allocation
page read and write
2AE091AB000
trusted library allocation
page read and write
2AE091D3000
trusted library allocation
page read and write
4A2F000
stack
page read and write
2AE0882D000
trusted library allocation
page read and write
1124000
heap
page read and write
4F1E000
stack
page read and write
4BC1000
heap
page read and write
6242000
trusted library allocation
page read and write
5F95000
trusted library allocation
page read and write
4B11000
heap
page read and write
533A000
trusted library allocation
page read and write
A14000
heap
page read and write
533A000
trusted library allocation
page read and write
649C000
trusted library allocation
page read and write
1F811030000
trusted library allocation
page read and write
2AE0511E000
trusted library allocation
page read and write
63FF000
trusted library allocation
page read and write
2AE0D28A000
trusted library allocation
page read and write
A0E000
stack
page read and write
15C0000
direct allocation
page read and write
There are 4752 hidden memdumps, click here to show them.