IOC Report
g4Cyr2T5jq.exe

loading gif

Files

File Path
Type
Category
Malicious
g4Cyr2T5jq.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\num[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1001134001\f84005b97f.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1001135001\7e96f85771.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1001136001\88edf6a100.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1001137001\num.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
malicious
C:\ProgramData\AEHDAKFIJJKKEBGDBAAKKJJKEH
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BAFIEGIECGCBKFIEBGCAAFIEBF
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\CBAKEBGIIDAFIDHIIECFCFIEGH
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\DHCAAEBK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\FIJKEHJJDAAKFHIDAKFH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IEHDBGDH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IEHDBGDHDAECBGDHJKFI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IJKJJKFHIJKKFHJJECBA
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\KKKEBKJJDGHCBGCAAKEHDBAEGH
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\compatibility.ini
Windows WIN.INI
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extension-preferences.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extension-preferences.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 8, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 8
dropped
C:\Windows\Tasks\skotes.job
data
dropped
There are 37 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\g4Cyr2T5jq.exe
"C:\Users\user\Desktop\g4Cyr2T5jq.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1001134001\f84005b97f.exe
"C:\Users\user\AppData\Local\Temp\1001134001\f84005b97f.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001135001\7e96f85771.exe
"C:\Users\user\AppData\Local\Temp\1001135001\7e96f85771.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001134001\f84005b97f.exe
"C:\Users\user\AppData\Local\Temp\1001134001\f84005b97f.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001136001\88edf6a100.exe
"C:\Users\user\AppData\Local\Temp\1001136001\88edf6a100.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001135001\7e96f85771.exe
"C:\Users\user\AppData\Local\Temp\1001135001\7e96f85771.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001137001\num.exe
"C:\Users\user\AppData\Local\Temp\1001137001\num.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001136001\88edf6a100.exe
"C:\Users\user\AppData\Local\Temp\1001136001\88edf6a100.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001137001\num.exe
"C:\Users\user\AppData\Local\Temp\1001137001\num.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001134001\f84005b97f.exe
"C:\Users\user\AppData\Local\Temp\1001134001\f84005b97f.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001135001\7e96f85771.exe
"C:\Users\user\AppData\Local\Temp\1001135001\7e96f85771.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2172 -parentBuildID 20230927232528 -prefsHandle 2120 -prefMapHandle 2112 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e8f79fb1-7992-418d-8066-e9420ef7e2ed} 5040 "\\.\pipe\gecko-crash-server-pipe.5040" 2881366dd10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3408 -parentBuildID 20230927232528 -prefsHandle 1796 -prefMapHandle 3296 -prefsLen 26395 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {225d9705-84ed-4a26-82df-72d52f28abca} 5040 "\\.\pipe\gecko-crash-server-pipe.5040" 28823e5ac10 rdd
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2136 -parentBuildID 20230927232528 -prefsHandle 2072 -prefMapHandle 2064 -prefsLen 25350 -prefMapSize 238051 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {64e16daa-e3c5-4180-ad1c-d8059eba0827} 6768 "\\.\pipe\gecko-crash-server-pipe.6768" 1eeea770d10 socket
There are 32 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.37/0d60be0de163924d/nss3.dll
185.215.113.37
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
http://detectportal.firefox.com/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
http://mozilla.org/#/properties/branches/anyOf/1/items/properties/feature/properties/value
unknown
https://sergei-esenin.com/
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://detectportal.firefox.com/canonical.htmlACTIVITY_SUBTYPE_CONNECTION_CREATEDLOAD_MEDIA_SNIFFER_
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=UuGFpt56D9L4&l=
unknown
http://mozilla.org/#/properties/disableGreaseOnFallback
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli
unknown
https://screenshots.firefox.com/#
unknown
http://mozilla.org/#/properties/quickSuggestRemoteSettingsDataType
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://screenshots.firefox.com
unknown
http://mozilla.org/#/properties/insecureFallback
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
http://mozilla.org/#/properties/quickSuggestSponsoredEnabled
unknown
http://185.215.113.43/Zu7JuNko/index.phpcoded
unknown
http://185.215.113.37/e2b1563c6670f193.phpla
unknown
https://github.com/mozilla-services/screenshots
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCaptureRequest
unknown
http://mozilla.org/#/properties/quickSuggestSponsoredIndex
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
https://spocs.getpocket.com/userDISCOVERY_STREAM_CONFIG_CHANGE
unknown
http://exslt.org/common
unknown
https://ok.ru/
unknown
https://support.mozilla.org/kb/fix-video-audio-problems-firefox-windowsThe
unknown
http://mozilla.org/#/properties/branches/anyOf/1/items/properties/features/itemsmoz-extension://987b
unknown
http://exslt.org/dates-and-times
unknown
http://mozilla.org/#/properties/csvImport
unknown
http://mozilla.org/#/properties/quickSuggestAllowPositionInSuggestions
unknown
http://mozilla.org/#/properties/branches/anyOf/0/items/properties/feature
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1&
unknown
https://www.ecosia.org/newtab/
unknown
https://lv.queniujq.cn
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.cloudflare.steamstatic.com/public/javascript/webui/clientcom.js?v=qYlgdgWOD4Ng&amp
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.bbc.co.uk/
unknown
http://mozilla.org/#/properties/quickSuggestImpressionCapsSponsoredEnabled
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://detectportal.firefox.comP
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://checkout.steampowered.com/
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://spocs.getpocket.com/
unknown
https://ebay.comP
unknown
https://www.iqiyi.com/
unknown
http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features/items/properties/featureI
unknown
https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=KkhJqW2NGKiM&l=engli
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://help.steampowered.com/en/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://yandex.com
unknown
http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features/itemsEndpoint
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
https://steamcommunity.co
unknown
https://account.bellmedia.c
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&l=englis
unknown
https://login.microsoftonline.com
unknown
http://185.215.113.43/lfons
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://developer.mozilla.org/docs/Web/API/Push_API/Using_the_Push_API#Encryptiondocument.requestSto
unknown
http://185.215.113.16/steam/random.exe4#
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/f0f51715-7f5e-48de-839
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://185.215.113.37e2b1563c6670f193.phption:
unknown
http://mozilla.org/#/properties/forceWaitHttpsRR
unknown
http://mozilla.org/#/properties/autoFillAdaptiveHistoryMinCharsThreshold
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://steamcommunity.com/workshop/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/profilev2.css?v=gNE3gksLVEVa&l=en
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://screenshots.firefox.com/
unknown
https://gpuweb.github.io/gpuweb/
unknown
http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features/items/properties/value/ad
unknown
http://json-schema.org/draft-07/schema#-
unknown
https://www.wykop.pl/
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=e
unknown
https://vk.com/
unknown
https://steamcommunity.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Ff_1prscqzeu&
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingTrying
unknown
https://spocs.getpocket.com/Endpoint
unknown
https://www.olx.pl/
unknown
http://mozilla.org/#/properties/dnsMaxAnyPriorityThreads
unknown
http://mozilla.org/#/properties/branches/anyOf/0/items/properties/ratio
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
sergei-esenin.com
104.21.53.8
malicious
steamcommunity.com
104.102.49.254
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious
example.org
93.184.215.14
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.184.238
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
detectportal.firefox.com
unknown
shavar.services.mozilla.com
unknown
There are 19 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
104.21.53.8
sergei-esenin.com
United States
malicious
185.215.113.37
unknown
Portugal
malicious
104.102.49.254
steamcommunity.com
United States
malicious
185.215.113.16
unknown
Portugal
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
142.250.184.238
youtube.com
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
f84005b97f.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
7e96f85771.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
88edf6a100.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
num.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
41000
unkown
page execute and write copy
malicious
811000
unkown
page execute and read and write
malicious
4BF0000
direct allocation
page read and write
malicious
1160000
heap
page read and write
malicious
51B0000
direct allocation
page read and write
malicious
4E1000
unkown
page execute and read and write
malicious
E81000
unkown
page execute and read and write
malicious
41000
unkown
page execute and write copy
malicious
811000
unkown
page execute and read and write
malicious
4C40000
direct allocation
page read and write
malicious
1447000
heap
page read and write
malicious
B6E000
heap
page read and write
malicious
E81000
unkown
page execute and read and write
malicious
167B000
heap
page read and write
malicious
4CD0000
direct allocation
page read and write
malicious
5340000
direct allocation
page read and write
malicious
41000
unkown
page execute and write copy
malicious
140E000
heap
page read and write
malicious
E81000
unkown
page execute and read and write
malicious
DBF000
heap
page read and write
malicious
52A0000
direct allocation
page read and write
malicious
41000
unkown
page execute and write copy
malicious
28823684000
trusted library allocation
page read and write
A38000
unkown
page execute and write copy
28825EC8000
trusted library allocation
page read and write
1EEFCAF3000
trusted library allocation
page read and write
5B4000
heap
page read and write
1EEFAEE3000
trusted library allocation
page read and write
5B4000
heap
page read and write
28824201000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
4D31000
heap
page read and write
28824020000
trusted library allocation
page read and write
1EEF66A4000
trusted library allocation
page read and write
13E4000
heap
page read and write
1EEF9BAD000
trusted library allocation
page read and write
2882B1E8000
trusted library allocation
page read and write
1EEF66FD000
trusted library allocation
page read and write
1EEF607D000
trusted library allocation
page read and write
1EF0435B000
trusted library allocation
page read and write
28823AB0000
trusted library section
page read and write
1EF05234000
trusted library allocation
page read and write
1EF024DC000
trusted library allocation
page read and write
1453000
heap
page read and write
4850000
heap
page read and write
28826075000
trusted library allocation
page read and write
11AE000
unkown
page execute and read and write
EAD000
unkown
page execute and write copy
2882364D000
trusted library allocation
page read and write
5B4000
heap
page read and write
1EEFAB69000
trusted library allocation
page read and write
28822B76000
trusted library allocation
page read and write
1EEF9AC3000
trusted library allocation
page read and write
1481000
heap
page read and write
1762CD7A000
trusted library allocation
page read and write
2881C30F000
heap
page read and write
14E0000
heap
page read and write
13E4000
heap
page read and write
1EF052DF000
trusted library allocation
page read and write
4EB0000
direct allocation
page execute and read and write
1EEFA5C2000
trusted library allocation
page read and write
2881EE26000
trusted library allocation
page read and write
1640000
heap
page read and write
2882D10A000
trusted library allocation
page read and write
3CCE000
stack
page read and write
1EEF9300000
trusted library allocation
page read and write
2881F8DF000
trusted library allocation
page read and write
1EF050B8000
trusted library allocation
page read and write
2882E0B0000
trusted library allocation
page read and write
2881C31E000
heap
page read and write
2882138F000
trusted library allocation
page read and write
1EEF99DC000
trusted library allocation
page read and write
1EF0232B000
trusted library allocation
page read and write
1EF027C0000
trusted library allocation
page read and write
1EEFED0E000
trusted library allocation
page read and write
1762DA2F000
heap
page read and write
11AE000
unkown
page execute and read and write
1EF01D03000
trusted library allocation
page read and write
2882130C000
trusted library allocation
page read and write
811000
unkown
page execute and write copy
1EF03760000
trusted library allocation
page read and write
E8E000
stack
page read and write
1EEFA18B000
heap
page read and write
F5B000
heap
page read and write
EAD000
unkown
page execute and write copy
2882E12B000
trusted library allocation
page read and write
54B0000
direct allocation
page execute and read and write
1524000
heap
page read and write
267D000
heap
page read and write
2882B71A000
trusted library allocation
page read and write
1EF0522D000
trusted library allocation
page read and write
1EEFB180000
trusted library section
page readonly
28824E02000
trusted library allocation
page read and write
2882601C000
trusted library allocation
page read and write
3FBF000
stack
page read and write
2FDE000
stack
page read and write
C5B000
stack
page read and write
1EEFC40A000
trusted library allocation
page read and write
28824AB7000
trusted library allocation
page read and write
1EEFD600000
trusted library allocation
page read and write
4C2E000
stack
page read and write
9D0000
heap
page read and write
1EEF7803000
trusted library allocation
page read and write
288238C3000
trusted library allocation
page read and write
1EEFA813000
trusted library allocation
page read and write
1F6B7C79000
trusted library allocation
page read and write
3EFF000
stack
page read and write
15D4000
heap
page read and write
28826AF0000
trusted library allocation
page read and write
288231F1000
trusted library allocation
page read and write
1F6B7750000
unclassified section
page readonly
1EEFB04C000
trusted library allocation
page read and write
4E11000
heap
page read and write
1762DA20000
heap
page read and write
1EEFD5D4000
trusted library allocation
page read and write
E81000
unkown
page execute and write copy
4E0000
unkown
page read and write
1D827000
heap
page read and write
2882E13A000
trusted library allocation
page read and write
54B000
unkown
page execute and read and write
1EF020FA000
trusted library allocation
page read and write
4841000
heap
page read and write
B4B339D000
stack
page read and write
1EEFB3E5000
trusted library allocation
page read and write
2882374C000
trusted library allocation
page read and write
4E1000
unkown
page execute and write copy
1EF052C5000
trusted library allocation
page read and write
1EEFB346000
trusted library allocation
page read and write
2882B722000
trusted library allocation
page read and write
1D819000
heap
page read and write
4740000
direct allocation
page read and write
1EEEC323000
heap
page read and write
4D31000
heap
page read and write
35BF000
stack
page read and write
1EEF69A0000
trusted library section
page readonly
CF4000
unkown
page execute and read and write
2882B7D5000
trusted library allocation
page read and write
1EEFC28D000
trusted library allocation
page read and write
1EEF9A03000
trusted library allocation
page read and write
288231E2000
trusted library allocation
page read and write
26344D22000
trusted library allocation
page read and write
D12000
unkown
page execute and write copy
1EEF9BB1000
trusted library allocation
page read and write
288236CE000
trusted library allocation
page read and write
4761000
heap
page read and write
E0ABFC000
stack
page read and write
2882BABE000
trusted library allocation
page read and write
4E11000
heap
page read and write
964000
heap
page read and write
4AEF000
stack
page read and write
1EF050FE000
trusted library allocation
page read and write
95B000
heap
page read and write
1EEFB55A000
trusted library allocation
page read and write
288208F9000
heap
page read and write
CF3F11E000
stack
page read and write
28823650000
trusted library allocation
page read and write
3B5A93A03000
trusted library allocation
page read and write
1EEF8F78000
trusted library allocation
page read and write
2881C315000
heap
page read and write
1F6B7943000
heap
page read and write
1EEF60E2000
trusted library allocation
page read and write
9B8000
unkown
page execute and read and write
CF3535E000
stack
page read and write
1EEFD616000
trusted library allocation
page read and write
1EF04183000
trusted library allocation
page read and write
1762D9BD000
heap
page read and write
28813647000
trusted library allocation
page read and write
1EEFA307000
trusted library allocation
page read and write
D4F000
heap
page read and write
1EF0523D000
trusted library allocation
page read and write
54A0000
direct allocation
page execute and read and write
40000
unkown
page readonly
CF3AAFF000
stack
page read and write
F46000
heap
page read and write
2882D0A3000
trusted library allocation
page read and write
1524000
heap
page read and write
1EEF60DE000
trusted library allocation
page read and write
2882447F000
trusted library allocation
page read and write
1EF04313000
trusted library allocation
page read and write
13E4000
heap
page read and write
40000
unkown
page readonly
3050000
direct allocation
page read and write
ADC000
unkown
page execute and write copy
2882BA24000
trusted library allocation
page read and write
4D60000
direct allocation
page execute and read and write
1EEFB0B3000
trusted library allocation
page read and write
1524000
heap
page read and write
9E8000
unkown
page execute and write copy
2DDF000
stack
page read and write
FF0000
direct allocation
page read and write
532000
unkown
page readonly
1EEF90AB000
trusted library allocation
page read and write
1EEF9C04000
trusted library allocation
page read and write
28824300000
trusted library allocation
page read and write
2882132B000
trusted library allocation
page read and write
1EEFAACF000
trusted library allocation
page read and write
4E11000
heap
page read and write
124E000
stack
page read and write
1EEFD694000
trusted library allocation
page read and write
2882D1C9000
trusted library allocation
page read and write
184F000
stack
page read and write
F26000
heap
page read and write
2882E2D9000
trusted library allocation
page read and write
1D806000
heap
page read and write
5B4000
heap
page read and write
A30000
direct allocation
page read and write
4E10000
heap
page read and write
7D1000
unkown
page execute and read and write
B6A000
heap
page read and write
1EEF9C7C000
trusted library allocation
page read and write
1EEF9375000
trusted library allocation
page read and write
1EEFED02000
trusted library allocation
page read and write
1EEFB47D000
trusted library allocation
page read and write
DA4000
heap
page read and write
1EEFB33E000
trusted library allocation
page read and write
4760000
heap
page read and write
2DBE000
stack
page read and write
288231F1000
trusted library allocation
page read and write
26344840000
heap
page read and write
288132B9000
heap
page read and write
288231E6000
trusted library allocation
page read and write
354E000
stack
page read and write
53F0000
heap
page read and write
1762DA23000
heap
page read and write
1EF01D32000
trusted library allocation
page read and write
28822B6A000
trusted library allocation
page read and write
DA4000
heap
page read and write
1EEF7A96000
trusted library allocation
page read and write
1F6B7C03000
trusted library allocation
page read and write
2882317B000
trusted library allocation
page read and write
28823786000
trusted library allocation
page read and write
1EEFABBC000
trusted library allocation
page read and write
4841000
heap
page read and write
4761000
heap
page read and write
1428000
heap
page read and write
1EF050A8000
trusted library allocation
page read and write
1EF01F97000
trusted library allocation
page read and write
2882BAC2000
trusted library allocation
page read and write
EB0000
direct allocation
page read and write
54B0000
direct allocation
page execute and read and write
308F000
stack
page read and write
3D7D000
stack
page read and write
1EEFA3B1000
trusted library allocation
page read and write
3D1E000
stack
page read and write
1EEFD50C000
trusted library allocation
page read and write
28823652000
trusted library allocation
page read and write
1EF02103000
trusted library allocation
page read and write
1167000
heap
page read and write
2882BA6C000
trusted library allocation
page read and write
7C4000
heap
page read and write
2882B3F0000
trusted library allocation
page read and write
1762CDBA000
trusted library allocation
page read and write
4C51000
heap
page read and write
1EEFC52F000
trusted library allocation
page read and write
2882DF68000
trusted library allocation
page read and write
3F9E000
stack
page read and write
1EEF9203000
trusted library allocation
page read and write
37F85FC000
stack
page read and write
28825700000
trusted library allocation
page read and write
B4B2D6E000
unkown
page read and write
1EF01E4D000
trusted library allocation
page read and write
288242F5000
trusted library allocation
page read and write
1EEFB38A000
trusted library allocation
page read and write
28823421000
trusted library allocation
page read and write
7C4000
heap
page read and write
2881C368000
heap
page read and write
1EEF5E04000
trusted library allocation
page read and write
2882B742000
trusted library allocation
page read and write
2881EFE8000
trusted library allocation
page read and write
1EEFABCC000
trusted library allocation
page read and write
1EF02114000
trusted library allocation
page read and write
2882B1B3000
trusted library allocation
page read and write
E00000
heap
page read and write
18163D07000
trusted library allocation
page read and write
2882B717000
trusted library allocation
page read and write
1EF022FC000
trusted library allocation
page read and write
133F000
stack
page read and write
2882DF9C000
trusted library allocation
page read and write
6CB20000
unkown
page read and write
4841000
heap
page read and write
504E000
stack
page read and write
1EEF9EFD000
trusted library allocation
page read and write
5B4000
heap
page read and write
10EA05C1000
heap
page read and write
2881EE58000
trusted library allocation
page read and write
2882B395000
trusted library allocation
page read and write
28826CAA000
trusted library allocation
page read and write
3EFF000
stack
page read and write
1EEF64B0000
trusted library allocation
page read and write
7C4000
heap
page read and write
288134A0000
heap
page read and write
B5C93BE000
stack
page read and write
2882E2E7000
trusted library allocation
page read and write
2882BAB0000
trusted library allocation
page read and write
B4B1F3E000
stack
page read and write
28826A48000
trusted library allocation
page read and write
1762DA23000
heap
page read and write
4E11000
heap
page read and write
1EEFA7DE000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EEFCC00000
trusted library allocation
page read and write
1EEFB39B000
trusted library allocation
page read and write
1D801000
heap
page read and write
28821304000
trusted library allocation
page read and write
1EEF6569000
trusted library allocation
page read and write
4D31000
heap
page read and write
28823365000
trusted library allocation
page read and write
28824594000
trusted library allocation
page read and write
13E0000
heap
page read and write
1EF05103000
trusted library allocation
page read and write
FEE000
heap
page read and write
2882BA06000
trusted library allocation
page read and write
1EF01E65000
trusted library allocation
page read and write
2882B66A000
trusted library allocation
page read and write
28823E00000
trusted library allocation
page read and write
92B000
unkown
page execute and read and write
D00000
trusted library allocation
page read and write
1EEFB3CF000
trusted library allocation
page read and write
1EEFA0E8000
trusted library allocation
page read and write
2882D00A000
trusted library allocation
page read and write
7D0000
unkown
page readonly
2882364D000
trusted library allocation
page read and write
1EEFAB44000
trusted library allocation
page read and write
28825F92000
trusted library allocation
page read and write
2882B700000
trusted library allocation
page read and write
4F0B000
stack
page read and write
6C941000
unkown
page execute read
28825BEB000
trusted library allocation
page read and write
1EEFD820000
trusted library section
page read and write
1EEFB380000
trusted library allocation
page read and write
288249BD000
unclassified section
page read and write
FEF000
heap
page read and write
2881C32E000
heap
page read and write
15C0000
direct allocation
page read and write
1EEF9ADD000
trusted library allocation
page read and write
FF0000
direct allocation
page read and write
E50000
direct allocation
page read and write
2882B225000
trusted library allocation
page read and write
2882433B000
trusted library allocation
page read and write
1EEFB528000
trusted library allocation
page read and write
2881EF00000
trusted library allocation
page read and write
1EEFB94B000
trusted library allocation
page read and write
45EE000
stack
page read and write
1B3BE000
stack
page read and write
28813440000
trusted library allocation
page read and write
B4B2B9C000
stack
page read and write
1EF0433F000
trusted library allocation
page read and write
1EF039A1000
trusted library allocation
page read and write
1524000
heap
page read and write
2882BA9B000
trusted library allocation
page read and write
2881C340000
heap
page read and write
2882D10D000
trusted library allocation
page read and write
4C8E000
stack
page read and write
28823E71000
trusted library allocation
page read and write
4C51000
direct allocation
page read and write
1B7AE000
stack
page read and write
1EEFAE4D000
trusted library allocation
page read and write
3B4000
heap
page read and write
4841000
heap
page read and write
980000
heap
page read and write
288237CB000
trusted library allocation
page read and write
BCC000
stack
page read and write
1EF020F8000
trusted library allocation
page read and write
4E11000
heap
page read and write
2882B391000
trusted library allocation
page read and write
CF9000
unkown
page execute and read and write
1762CBF0000
unkown
page execute read
4EE0000
direct allocation
page execute and read and write
2FBB7000
heap
page read and write
371527A03000
trusted library allocation
page read and write
1F6B7770000
heap
page read and write
28828006000
trusted library allocation
page read and write
1EF05453000
trusted library allocation
page read and write
964000
heap
page read and write
2881C33C000
heap
page read and write
4D31000
heap
page read and write
B4B335C000
stack
page read and write
2882B7D9000
trusted library allocation
page read and write
3856FCE000
stack
page read and write
40FF000
stack
page read and write
3CEF000
stack
page read and write
53C000
unkown
page write copy
1762C9D0000
heap
page read and write
1EEF78B0000
trusted library allocation
page read and write
28A22B00000
trusted library section
page readonly
2881C305000
heap
page read and write
5430000
direct allocation
page execute and read and write
1EF052D6000
trusted library allocation
page read and write
F1000
unkown
page read and write
2882375D000
trusted library allocation
page read and write
1EEFB380000
trusted library allocation
page read and write
10EA03D0000
heap
page read and write
6B000
unkown
page write copy
143E000
heap
page read and write
412E000
stack
page read and write
1EF05082000
trusted library allocation
page read and write
F52D1004000
trusted library allocation
page read and write
115B000
stack
page read and write
FAF000
heap
page read and write
7C4000
heap
page read and write
28825FD7000
trusted library allocation
page read and write
2881C327000
heap
page read and write
28825174000
trusted library allocation
page read and write
28824B16000
trusted library allocation
page read and write
1F6B7D03000
trusted library allocation
page read and write
263447B2000
remote allocation
page execute read
4C30000
direct allocation
page execute and read and write
4A4F000
stack
page read and write
28825205000
trusted library allocation
page read and write
1F6B77E6000
heap
page read and write
2881C355000
heap
page read and write
CF3E99A000
stack
page read and write
1EEFA66F000
trusted library allocation
page read and write
2882E1B3000
trusted library allocation
page read and write
1EEFC9D2000
trusted library allocation
page read and write
4AA0000
remote allocation
page read and write
1EF037F4000
trusted library allocation
page read and write
4761000
heap
page read and write
2882B7D7000
trusted library allocation
page read and write
4890000
direct allocation
page execute and read and write
ED4000
heap
page read and write
33FE000
stack
page read and write
2882B37D000
trusted library allocation
page read and write
377F000
stack
page read and write
29BF000
stack
page read and write
1EEFAE03000
trusted library allocation
page read and write
4830000
direct allocation
page read and write
28823748000
trusted library allocation
page read and write
2881F89E000
trusted library allocation
page read and write
B4AFB3E000
stack
page read and write
1EEFB4E0000
trusted library allocation
page read and write
1EEFC994000
trusted library allocation
page read and write
18163C00000
trusted library allocation
page read and write
4DD0000
direct allocation
page execute and read and write
13FA000
heap
page read and write
1EF050B0000
trusted library allocation
page read and write
28824583000
trusted library allocation
page read and write
28825231000
trusted library allocation
page read and write
1EEFB572000
trusted library allocation
page read and write
F00000
heap
page read and write
2882E800000
heap
page read and write
1EEEA730000
trusted library allocation
page read and write
2882E053000
trusted library allocation
page read and write
28826A28000
trusted library allocation
page read and write
28820A70000
trusted library section
page readonly
1EEF8E87000
trusted library allocation
page read and write
1DC0000
trusted library allocation
page read and write
1EF023F6000
trusted library allocation
page read and write
4761000
heap
page read and write
2882379C000
trusted library allocation
page read and write
1EEFB0B7000
trusted library allocation
page read and write
1F6B7C96000
trusted library allocation
page read and write
984000
heap
page read and write
4841000
heap
page read and write
3A5F000
stack
page read and write
9D5000
unkown
page execute and read and write
288244D3000
trusted library allocation
page read and write
1EF05085000
trusted library allocation
page read and write
387E000
stack
page read and write
2882D0F1000
trusted library allocation
page read and write
1187000
heap
page read and write
2881C30C000
heap
page read and write
6E3000
unkown
page execute and read and write
28825C57000
trusted library allocation
page read and write
41BE000
stack
page read and write
1EEFB37B000
trusted library allocation
page read and write
2882376F000
trusted library allocation
page read and write
28826BBF000
trusted library allocation
page read and write
2882B7C8000
trusted library allocation
page read and write
321F000
stack
page read and write
28823698000
trusted library allocation
page read and write
2881F8DB000
trusted library allocation
page read and write
1D82D000
heap
page read and write
1EEF9C00000
trusted library allocation
page read and write
2882B3D0000
trusted library allocation
page read and write
2881ED34000
trusted library allocation
page read and write
288237A2000
trusted library allocation
page read and write
CF36874000
stack
page read and write
1EEFB60F000
trusted library allocation
page read and write
4D31000
heap
page read and write
2882BAAE000
trusted library allocation
page read and write
6B000
unkown
page write copy
50CD000
stack
page read and write
2882E1BB000
trusted library allocation
page read and write
BDE000
stack
page read and write
2881F79B000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
1EEF9F2E000
trusted library allocation
page read and write
ADB000
unkown
page execute and read and write
1EF01E1F000
trusted library allocation
page read and write
36EF000
stack
page read and write
288237A2000
trusted library allocation
page read and write
4841000
heap
page read and write
13E4000
heap
page read and write
1EF01E72000
trusted library allocation
page read and write
2882E2AC000
trusted library allocation
page read and write
1EEFA03F000
trusted library allocation
page read and write
28824A94000
trusted library allocation
page read and write
2882D0D4000
trusted library allocation
page read and write
2881F4B0000
trusted library allocation
page read and write
28824A8F000
trusted library allocation
page read and write
4841000
heap
page read and write
28820500000
trusted library allocation
page read and write
1EEFB3E1000
trusted library allocation
page read and write
28822D7F000
trusted library allocation
page read and write
1EF050B6000
trusted library allocation
page read and write
2881C326000
heap
page read and write
339E000
stack
page read and write
28823503000
trusted library allocation
page read and write
1EF01D98000
trusted library allocation
page read and write
4621000
heap
page read and write
1EEF9603000
trusted library allocation
page read and write
1524000
heap
page read and write
9D1000
unkown
page execute and write copy
1EEFCB53000
trusted library allocation
page read and write
1EEFB0AA000
trusted library allocation
page read and write
1EEFB50A000
trusted library allocation
page read and write
26344730000
unclassified section
page readonly
1EEFA503000
trusted library allocation
page read and write
28823690000
trusted library allocation
page read and write
E0BBFF000
stack
page read and write
1EEFBC6F000
trusted library allocation
page read and write
1EEFBFE9000
trusted library allocation
page read and write
28825E00000
trusted library allocation
page read and write
1EEF9C1C000
trusted library allocation
page read and write
288245C4000
trusted library allocation
page read and write
4761000
heap
page read and write
4841000
heap
page read and write
1EEFB4FC000
trusted library allocation
page read and write
2882E135000
trusted library allocation
page read and write
1EF0436B000
trusted library allocation
page read and write
4F4E000
stack
page read and write
28824A5B000
trusted library allocation
page read and write
CF36DFC000
stack
page read and write
1EEFC48E000
trusted library allocation
page read and write
38592BE000
unkown
page readonly
1EEFD559000
trusted library allocation
page read and write
26344BC9000
trusted library allocation
page read and write
288206C9000
trusted library allocation
page read and write
982000
heap
page read and write
288245BC000
trusted library allocation
page read and write
2882E17E000
trusted library allocation
page read and write
1EF054F7000
trusted library allocation
page read and write
2882CD3C000
trusted library allocation
page read and write
28823E65000
trusted library allocation
page read and write
F6B000
heap
page read and write
CF3C8FD000
stack
page read and write
1196000
unkown
page execute and read and write
1EEFD6FB000
trusted library allocation
page read and write
288236A0000
trusted library allocation
page read and write
2882D097000
trusted library allocation
page read and write
1EF05500000
trusted library allocation
page read and write
1762DAB9000
heap
page read and write
1EEFB3A7000
trusted library allocation
page read and write
4D7F000
stack
page read and write
4880000
direct allocation
page execute and read and write
1EEFD9A9000
trusted library allocation
page read and write
174E000
stack
page read and write
1EF050FE000
trusted library allocation
page read and write
28825DE2000
trusted library allocation
page read and write
28823D48000
trusted library allocation
page read and write
1EEF6572000
trusted library allocation
page read and write
1EEFAE6B000
trusted library allocation
page read and write
CF36D7E000
stack
page read and write
2882B894000
trusted library allocation
page read and write
41BE000
stack
page read and write
680000
heap
page read and write
1EEFD5E3000
trusted library allocation
page read and write
1173000
heap
page read and write
2882E17E000
trusted library allocation
page read and write
1D828000
heap
page read and write
12F3000
stack
page read and write
FBF000
stack
page read and write
13D0000
heap
page read and write
28825F26000
trusted library allocation
page read and write
1EF042C1000
trusted library allocation
page read and write
1EEFABF1000
trusted library allocation
page read and write
1EEF9C0C000
trusted library allocation
page read and write
FF0000
direct allocation
page read and write
28825F88000
trusted library allocation
page read and write
5B4000
heap
page read and write
28822D3F000
trusted library allocation
page read and write
1D810000
heap
page read and write
4E11000
heap
page read and write
1EEFB3DB000
trusted library allocation
page read and write
B4B2ADB000
stack
page read and write
28824A88000
trusted library allocation
page read and write
1EEF6075000
trusted library allocation
page read and write
43DE000
stack
page read and write
4D31000
heap
page read and write
1EEFA34B000
trusted library allocation
page read and write
A6E000
unkown
page execute and read and write
1EEFB39D000
trusted library allocation
page read and write
2882379C000
trusted library allocation
page read and write
1EEFA137000
heap
page read and write
1EEFBC85000
trusted library allocation
page read and write
2882E133000
trusted library allocation
page read and write
1EEFC550000
trusted library allocation
page read and write
28814EA0000
heap
page read and write
2882E1DF000
trusted library allocation
page read and write
2882E1B9000
trusted library allocation
page read and write
1EEFB3AA000
trusted library allocation
page read and write
EE9000
unkown
page write copy
1EEF6503000
trusted library allocation
page read and write
28823F03000
trusted library allocation
page read and write
1524000
heap
page read and write
1EEFB062000
trusted library allocation
page read and write
E30000
heap
page read and write
1EEFC57E000
trusted library allocation
page read and write
28824AB2000
trusted library allocation
page read and write
2882DF2A000
trusted library allocation
page read and write
2882D0BB000
trusted library allocation
page read and write
4C51000
heap
page read and write
4F3E000
stack
page read and write
1762D941000
heap
page read and write
1B24D000
stack
page read and write
1D83B000
heap
page read and write
288213CC000
trusted library allocation
page read and write
1EEFB1B0000
trusted library section
page read and write
1EEFC608000
trusted library allocation
page read and write
1EEEA7EF000
trusted library allocation
page read and write
1EEFD951000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
31EE000
stack
page read and write
28823F00000
trusted library allocation
page read and write
2881F70C000
trusted library allocation
page read and write
1EF01DF1000
trusted library allocation
page read and write
167D000
stack
page read and write
2882DFEE000
trusted library allocation
page read and write
EC0000
heap
page read and write
4D31000
heap
page read and write
4830000
direct allocation
page read and write
147C000
heap
page read and write
2C3F000
stack
page read and write
2F9F000
stack
page read and write
1EEFAA03000
trusted library allocation
page read and write
A30000
direct allocation
page read and write
1EEF9215000
trusted library allocation
page read and write
2881F413000
trusted library allocation
page read and write
1EEFB7E7000
trusted library allocation
page read and write
422F000
stack
page read and write
1EEFAF28000
trusted library allocation
page read and write
1EEEA4E0000
trusted library allocation
page read and write
2882364D000
trusted library allocation
page read and write
28825D1C000
trusted library allocation
page read and write
6C30000
heap
page read and write
A1A000
unkown
page execute and write copy
288237CB000
trusted library allocation
page read and write
1100000
heap
page read and write
28820303000
trusted library allocation
page read and write
1EEEA6F0000
heap
page read and write
CF3E85B000
stack
page read and write
1762DA2F000
heap
page read and write
39FF000
stack
page read and write
964000
heap
page read and write
5530000
direct allocation
page execute and read and write
28823403000
trusted library allocation
page read and write
2882B196000
trusted library allocation
page read and write
159F000
stack
page read and write
1BA0E000
stack
page read and write
CF9000
unkown
page execute and read and write
35AF000
stack
page read and write
DA4000
heap
page read and write
28813430000
trusted library allocation
page read and write
2882E19E000
trusted library allocation
page read and write
1EEFB9C2000
trusted library allocation
page read and write
2882B3AA000
trusted library allocation
page read and write
14CE000
heap
page read and write
1EF0238E000
trusted library allocation
page read and write
DA4000
heap
page read and write
375E000
stack
page read and write
1762DA26000
heap
page read and write
1EEFD655000
trusted library allocation
page read and write
28821373000
trusted library allocation
page read and write
B4B072E000
stack
page read and write
1EF01DE6000
trusted library allocation
page read and write
A30000
direct allocation
page read and write
2B3E000
stack
page read and write
1EF02203000
trusted library allocation
page read and write
28825F8C000
trusted library allocation
page read and write
1EEFA02F000
trusted library allocation
page read and write
1F6B7C2E000
trusted library allocation
page read and write
28820371000
trusted library allocation
page read and write
28825F8E000
trusted library allocation
page read and write
1EEFC17C000
trusted library allocation
page read and write
3E7F000
stack
page read and write
4CD0000
direct allocation
page read and write
2882D198000
trusted library allocation
page read and write
1EF05070000
trusted library allocation
page read and write
984000
heap
page read and write
28820E0D000
trusted library allocation
page read and write
28823684000
trusted library allocation
page read and write
1EEFD5B3000
trusted library allocation
page read and write
1EEFB3A7000
trusted library allocation
page read and write
1EF0212F000
trusted library allocation
page read and write
446F000
stack
page read and write
2882510F000
trusted library allocation
page read and write
1EEFB3A1000
trusted library allocation
page read and write
2882B027000
trusted library allocation
page read and write
993000
unkown
page execute and write copy
28822D03000
trusted library allocation
page read and write
1EEF9AEA000
trusted library allocation
page read and write
4C4F000
stack
page read and write
A1A000
unkown
page execute and write copy
2882E151000
trusted library allocation
page read and write
CDB000
heap
page read and write
5B4000
heap
page read and write
1EEF91F3000
trusted library allocation
page read and write
28825DE0000
trusted library allocation
page read and write
1EEF7C68000
trusted library allocation
page read and write
A30000
direct allocation
page read and write
1EF03A1C000
trusted library allocation
page read and write
DC8000
heap
page read and write
50C000
unkown
page readonly
BDFFA7E000
unkown
page readonly
1EEF9217000
trusted library allocation
page read and write
1EF04111000
trusted library allocation
page read and write
1EEFACB9000
trusted library allocation
page read and write
1196000
unkown
page execute and read and write
1EEF9E66000
trusted library allocation
page read and write
4761000
heap
page read and write
50E0000
direct allocation
page read and write
2882B1A1000
trusted library allocation
page read and write
415E000
stack
page read and write
4B9E000
trusted library allocation
page read and write
10EA0540000
heap
page read and write
4D31000
heap
page read and write
1EF022C3000
trusted library allocation
page read and write
1EEF9E9A000
trusted library allocation
page read and write
DCA000
heap
page read and write
1762D9BF000
heap
page read and write
4E11000
heap
page read and write
28824500000
trusted library allocation
page read and write
3A6F000
stack
page read and write
984000
heap
page read and write
BBE000
stack
page read and write
162E000
stack
page read and write
F40000
heap
page read and write
4C51000
heap
page read and write
ADB000
unkown
page execute and write copy
1EEFB3E5000
trusted library allocation
page read and write
1EEF65D8000
trusted library allocation
page read and write
288245FD000
trusted library allocation
page read and write
2882D15C000
trusted library allocation
page read and write
9AA000
unkown
page execute and read and write
1EEF9D03000
trusted library allocation
page read and write
B4B281E000
stack
page read and write
45DE000
stack
page read and write
28823690000
trusted library allocation
page read and write
5310000
direct allocation
page execute and read and write
382F000
stack
page read and write
1EEFB39B000
trusted library allocation
page read and write
1EF02141000
trusted library allocation
page read and write
28826C98000
trusted library allocation
page read and write
2BBF000
stack
page read and write
2882388C000
trusted library allocation
page read and write
1EEF9BCE000
trusted library allocation
page read and write
2882607D000
trusted library allocation
page read and write
1EEF5C90000
trusted library allocation
page read and write
288231B3000
trusted library allocation
page read and write
1EF02389000
trusted library allocation
page read and write
2882368B000
trusted library allocation
page read and write
AC4000
unkown
page execute and write copy
5540000
direct allocation
page execute and read and write
2881C2FE000
heap
page read and write
4E11000
heap
page read and write
2882BAE7000
trusted library allocation
page read and write
1EEF601E000
trusted library allocation
page read and write
4C00000
direct allocation
page execute and read and write
47BF000
stack
page read and write
2BDF000
stack
page read and write
1EEFB0AF000
trusted library allocation
page read and write
D11000
unkown
page execute and read and write
28825F8A000
trusted library allocation
page read and write
445F000
stack
page read and write
4FC0000
trusted library allocation
page read and write
5B4000
heap
page read and write
28822D61000
trusted library allocation
page read and write
4761000
heap
page read and write
28823114000
trusted library allocation
page read and write
29950000
heap
page read and write
1EEEA76B000
trusted library allocation
page read and write
1D815000
heap
page read and write
1EEFA77C000
trusted library allocation
page read and write
B4B421F000
stack
page read and write
1EEFB4FE000
trusted library allocation
page read and write
1EEF74ED000
trusted library allocation
page read and write
4EBF000
stack
page read and write
4761000
heap
page read and write
2882B6EF000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
4D31000
heap
page read and write
4D0E000
stack
page read and write
15C0000
direct allocation
page read and write
B5C827B000
stack
page read and write
1F6B77B0000
heap
page read and write
28825DD7000
trusted library allocation
page read and write
65EF061000
trusted library allocation
page execute read
1EEFA774000
trusted library allocation
page read and write
1EEFB075000
trusted library allocation
page read and write
306F000
stack
page read and write
4E11000
heap
page read and write
1EEF5D0B000
trusted library allocation
page read and write
1EEFAC5B000
trusted library allocation
page read and write
1F0F9000000
trusted library section
page readonly
43BE000
stack
page read and write
4830000
direct allocation
page read and write
145E000
heap
page read and write
16309FD04000
trusted library allocation
page read and write
28825A03000
trusted library allocation
page read and write
1EEFC203000
trusted library allocation
page read and write
E0B3FF000
stack
page read and write
28825EA2000
trusted library allocation
page read and write
1EEFD949000
trusted library allocation
page read and write
1EEFCACD000
trusted library allocation
page read and write
26344A00000
trusted library allocation
page read and write
1EF02019000
trusted library allocation
page read and write
4841000
heap
page read and write
1EEFB120000
trusted library section
page readonly
EB0000
direct allocation
page read and write
1EEFB6CC000
trusted library allocation
page read and write
1EEFB354000
trusted library allocation
page read and write
1EEFD56D000
trusted library allocation
page read and write
28823A80000
trusted library section
page read and write
13E4000
heap
page read and write
1D81E000
heap
page read and write
1EEFB568000
trusted library allocation
page read and write
7D1000
unkown
page execute and read and write
1EEFB3CB000
trusted library allocation
page read and write
28814F64000
heap
page read and write
28824003000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
1EF01D37000
trusted library allocation
page read and write
1EEFD71A000
trusted library allocation
page read and write
186F000
stack
page read and write
2882D129000
trusted library allocation
page read and write
5420000
direct allocation
page execute and read and write
2882D180000
trusted library allocation
page read and write
2882BAF6000
trusted library allocation
page read and write
1EEF78B0000
trusted library allocation
page read and write
1EEF9F62000
trusted library allocation
page read and write
288239DD000
unclassified section
page read and write
1487000
heap
page read and write
1EF02381000
trusted library allocation
page read and write
1EEEA75D000
trusted library allocation
page read and write
288231C9000
trusted library allocation
page read and write
1EEF66CF000
trusted library allocation
page read and write
1F6B7C98000
trusted library allocation
page read and write
15D4000
heap
page read and write
2B8C000
stack
page read and write
28823400000
trusted library allocation
page read and write
2881C315000
heap
page read and write
1D820000
heap
page read and write
991000
unkown
page execute and read and write
1EF02378000
trusted library allocation
page read and write
28826B7E000
trusted library allocation
page read and write
1EEFA77C000
trusted library allocation
page read and write
5300000
direct allocation
page execute and read and write
B4AB5FC000
stack
page read and write
1EF02440000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EF052C3000
trusted library allocation
page read and write
288231CD000
trusted library allocation
page read and write
1EEFB403000
trusted library allocation
page read and write
2882D0B8000
trusted library allocation
page read and write
1EEFB303000
trusted library allocation
page read and write
28825E75000
trusted library allocation
page read and write
1EEF93F2000
trusted library allocation
page read and write
1EEFB3E1000
trusted library allocation
page read and write
1EEF7708000
trusted library allocation
page read and write
1A40E000
stack
page read and write
4E11000
heap
page read and write
28823781000
trusted library allocation
page read and write
2881F426000
trusted library allocation
page read and write
1EEF9AF8000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EEF6890000
trusted library section
page readonly
28826A0F000
trusted library allocation
page read and write
48DA000
trusted library allocation
page read and write
2881C32C000
heap
page read and write
288239D0000
unclassified section
page read and write
2A7B000
heap
page read and write
D11000
unkown
page execute and read and write
28824030000
trusted library allocation
page read and write
288238FC000
trusted library allocation
page read and write
1EEF6687000
trusted library allocation
page read and write
36FF000
stack
page read and write
E0449704000
trusted library allocation
page read and write
2881C35F000
heap
page read and write
4761000
heap
page read and write
4E11000
heap
page read and write
3E0E000
stack
page read and write
163E000
stack
page read and write
2882D12B000
trusted library allocation
page read and write
1EEFB3EF000
trusted library allocation
page read and write
1EEF6493000
trusted library allocation
page read and write
1EEF6079000
trusted library allocation
page read and write
2881C334000
heap
page read and write
2882B725000
trusted library allocation
page read and write
1EEFB372000
trusted library allocation
page read and write
51264A1E000
trusted library allocation
page read and write
1EEF5DA7000
trusted library allocation
page read and write
1EF0547B000
trusted library allocation
page read and write
288238C3000
trusted library allocation
page read and write
4D31000
heap
page read and write
4C30000
heap
page read and write
1EF05469000
trusted library allocation
page read and write
1EEF7C7C000
trusted library allocation
page read and write
1EF023D5000
trusted library allocation
page read and write
28813611000
trusted library allocation
page read and write
1EEF5C9E000
trusted library allocation
page read and write
4E12000
heap
page read and write
26344BE9000
trusted library allocation
page read and write
2882BAB0000
trusted library allocation
page read and write
4621000
heap
page read and write
1EEFB1F0000
trusted library section
page read and write
1EF050A3000
trusted library allocation
page read and write
1EF02375000
trusted library allocation
page read and write
1EEF7406000
trusted library allocation
page read and write
1EEF9D00000
trusted library allocation
page read and write
1EF0423C000
trusted library allocation
page read and write
28821316000
trusted library allocation
page read and write
1EF050FE000
trusted library allocation
page read and write
2882E0E4000
trusted library allocation
page read and write
5360000
direct allocation
page execute and read and write
1EF05544000
trusted library allocation
page read and write
4841000
heap
page read and write
1EF05303000
trusted library allocation
page read and write
359E000
stack
page read and write
1EEFB3CB000
trusted library allocation
page read and write
DA4000
heap
page read and write
1EEFB032000
trusted library allocation
page read and write
288206D4000
trusted library allocation
page read and write
1EF0528B000
trusted library allocation
page read and write
1EEFED06000
trusted library allocation
page read and write
1EEFB55B000
trusted library allocation
page read and write
4DA0000
direct allocation
page execute and read and write
5730000
remote allocation
page read and write
288236CE000
trusted library allocation
page read and write
1EF043D7000
trusted library allocation
page read and write
319F000
stack
page read and write
28822A00000
trusted library allocation
page read and write
EFA000
heap
page read and write
2882B3FC000
trusted library allocation
page read and write
425F000
stack
page read and write
1EEFB39B000
trusted library allocation
page read and write
2882B45D000
trusted library allocation
page read and write
B4AB5BF000
stack
page read and write
1EF01F15000
trusted library allocation
page read and write
4E11000
heap
page read and write
2882E25D000
trusted library allocation
page read and write
1EEF789B000
trusted library allocation
page read and write
13E4000
heap
page read and write
2882E047000
trusted library allocation
page read and write
1EF052D9000
trusted library allocation
page read and write
4761000
heap
page read and write
1EEF9E51000
trusted library allocation
page read and write
28826ACB000
trusted library allocation
page read and write
4761000
heap
page read and write
2881EF15000
trusted library allocation
page read and write
A5A000
unkown
page execute and read and write
26344B5B000
trusted library allocation
page read and write
1EEFB075000
trusted library allocation
page read and write
28823D67000
trusted library allocation
page read and write
9CE000
stack
page read and write
1EEFC8B5000
trusted library allocation
page read and write
2881C32E000
heap
page read and write
28824A96000
trusted library allocation
page read and write
1EF01DA8000
trusted library allocation
page read and write
2882384D000
trusted library allocation
page read and write
1EEFAEBB000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EEF5E0A000
trusted library allocation
page read and write
28823628000
trusted library allocation
page read and write
1EEF9ED1000
trusted library allocation
page read and write
1EF0508E000
trusted library allocation
page read and write
2882524B000
trusted library allocation
page read and write
1EEF9FA6000
trusted library allocation
page read and write
28825F90000
trusted library allocation
page read and write
B4B133D000
stack
page read and write
3856F8E000
unkown
page readonly
1EEFC3F0000
trusted library section
page read and write
16B8000
heap
page read and write
2882B64C000
trusted library allocation
page read and write
1762DA98000
heap
page read and write
1EF052A3000
trusted library allocation
page read and write
28824585000
trusted library allocation
page read and write
1EEFEB01000
trusted library allocation
page read and write
28825B51000
trusted library allocation
page read and write
2881C334000
heap
page read and write
1EF01F00000
trusted library allocation
page read and write
1EEF998D000
trusted library allocation
page read and write
1AEDE000
stack
page read and write
288260F2000
trusted library allocation
page read and write
1650000
direct allocation
page read and write
1EEF8F0D000
trusted library allocation
page read and write
1EEFB486000
trusted library allocation
page read and write
2882B006000
trusted library allocation
page read and write
2882B4BD000
trusted library allocation
page read and write
1EEFB3CF000
trusted library allocation
page read and write
2882E11C000
trusted library allocation
page read and write
1EEF69E0000
heap
page read and write
2881F376000
trusted library allocation
page read and write
2882D0C2000
trusted library allocation
page read and write
28820B0D000
trusted library allocation
page read and write
28825B03000
trusted library allocation
page read and write
2882B750000
trusted library allocation
page read and write
1EEFB4F7000
trusted library allocation
page read and write
BDFEEFE000
stack
page read and write
898000
unkown
page execute and read and write
2882316F000
trusted library allocation
page read and write
1EEF8FDB000
trusted library allocation
page read and write
1EEF9D27000
trusted library allocation
page read and write
1EEF74C2000
trusted library allocation
page read and write
810000
unkown
page read and write
1EEFAF34000
trusted library allocation
page read and write
1D804000
heap
page read and write
1EF021DC000
trusted library allocation
page read and write
1EEFB3A7000
trusted library allocation
page read and write
1EF03971000
trusted library allocation
page read and write
28822D53000
trusted library allocation
page read and write
28824400000
trusted library allocation
page read and write
1EEF9641000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EEF763F000
trusted library allocation
page read and write
3A0F000
stack
page read and write
1EEF9ECE000
trusted library allocation
page read and write
1762D512000
trusted library allocation
page read and write
2882B377000
trusted library allocation
page read and write
1EEFBD2A000
trusted library allocation
page read and write
2882B118000
trusted library allocation
page read and write
1EEFD6F9000
trusted library allocation
page read and write
7C4000
heap
page read and write
13E4000
heap
page read and write
288231E6000
trusted library allocation
page read and write
1EEFA8F9000
trusted library allocation
page read and write
A02B7B00000
trusted library allocation
page read and write
1EEF65DA000
trusted library allocation
page read and write
1EEF9211000
trusted library allocation
page read and write
2882B795000
trusted library allocation
page read and write
2882B782000
trusted library allocation
page read and write
473F000
stack
page read and write
1EF01FA8000
trusted library allocation
page read and write
1EEF8F5C000
trusted library allocation
page read and write
4E11000
heap
page read and write
288231C9000
trusted library allocation
page read and write
1EEFED20000
trusted library allocation
page read and write
15D4000
heap
page read and write
33BF000
stack
page read and write
288260DF000
trusted library allocation
page read and write
26344940000
heap
page read and write
28825FF5000
trusted library allocation
page read and write
1D82B000
heap
page read and write
2882B40A000
trusted library allocation
page read and write
15D4000
heap
page read and write
1EEFD781000
trusted library allocation
page read and write
1EEFB37B000
trusted library allocation
page read and write
1762DA31000
heap
page read and write
6C20000
heap
page read and write
1EEFCAFD000
trusted library allocation
page read and write
A5E000
heap
page read and write
2882528A000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
381E000
stack
page read and write
28820AA0000
trusted library section
page readonly
49C30704000
trusted library allocation
page read and write
1EF050A8000
trusted library allocation
page read and write
288231AE000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
1EEFB49C000
trusted library allocation
page read and write
30BF000
stack
page read and write
E80000
unkown
page readonly
83B000
unkown
page execute and read and write
288231B1000
trusted library allocation
page read and write
288245AA000
trusted library allocation
page read and write
FEF000
stack
page read and write
2B4F000
stack
page read and write
288244CD000
trusted library allocation
page read and write
F7C000
heap
page read and write
1EEFA803000
trusted library allocation
page read and write
1EF02003000
trusted library allocation
page read and write
2882470A000
trusted library allocation
page read and write
1EEF9313000
trusted library allocation
page read and write
28825CB4000
trusted library allocation
page read and write
39BE000
stack
page read and write
1762DA98000
heap
page read and write
54B0000
direct allocation
page execute and read and write
1B65E000
stack
page read and write
28825B2A000
trusted library allocation
page read and write
1EEFC9AD000
trusted library allocation
page read and write
2881C324000
heap
page read and write
51AF000
stack
page read and write
29930000
heap
page read and write
1EEFBA5A000
trusted library allocation
page read and write
4D31000
heap
page read and write
333F000
stack
page read and write
28824473000
trusted library allocation
page read and write
1EEF5CDF000
trusted library allocation
page read and write
2882516E000
trusted library allocation
page read and write
2882B761000
trusted library allocation
page read and write
4761000
heap
page read and write
1EF050FB000
trusted library allocation
page read and write
28825FF3000
trusted library allocation
page read and write
1D3E000
stack
page read and write
1EF0434B000
trusted library allocation
page read and write
2881C322000
heap
page read and write
2881C2FF000
heap
page read and write
4E11000
heap
page read and write
2882B4AB000
trusted library allocation
page read and write
26344B03000
trusted library allocation
page read and write
1EEFB5C7000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
895000
unkown
page execute and read and write
3F2979C4C000
trusted library allocation
page read and write
1EEFB7AA000
trusted library allocation
page read and write
2881F7D1000
trusted library allocation
page read and write
2882E167000
trusted library allocation
page read and write
1EEF64E0000
trusted library allocation
page read and write
28826C3B000
trusted library allocation
page read and write
28823E17000
trusted library allocation
page read and write
1EEFC562000
trusted library allocation
page read and write
6C932000
unkown
page readonly
1EEFBFC9000
trusted library allocation
page read and write
1EEF669A000
trusted library allocation
page read and write
1EEFB3DB000
trusted library allocation
page read and write
1EEF6026000
trusted library allocation
page read and write
1EF01E3E000
trusted library allocation
page read and write
288231A0000
trusted library allocation
page read and write
28823DEC000
trusted library allocation
page read and write
2882B735000
trusted library allocation
page read and write
1EEFA56A000
trusted library allocation
page read and write
964000
heap
page read and write
327F000
stack
page read and write
1EEF93CA000
trusted library allocation
page read and write
CF388FE000
stack
page read and write
1AE8E000
stack
page read and write
3A81000
heap
page read and write
1EEFA3E5000
trusted library allocation
page read and write
4890000
direct allocation
page execute and read and write
1762C96F000
remote allocation
page execute read
4C51000
heap
page read and write
2882E151000
trusted library allocation
page read and write
1EF03721000
trusted library allocation
page read and write
54D0000
direct allocation
page execute and read and write
DA4000
heap
page read and write
361E000
stack
page read and write
4841000
heap
page read and write
4E11000
heap
page read and write
2882E194000
trusted library allocation
page read and write
336F000
stack
page read and write
1EEFA598000
trusted library allocation
page read and write
288206C9000
trusted library allocation
page read and write
1EEF9E5A000
trusted library allocation
page read and write
890000
heap
page read and write
1524000
heap
page read and write
2881C2FF000
heap
page read and write
1EF037E5000
trusted library allocation
page read and write
1EF04323000
trusted library allocation
page read and write
28826AB3000
trusted library allocation
page read and write
1524000
heap
page read and write
1EEEA7FE000
trusted library allocation
page read and write
31DE000
stack
page read and write
B4AC87A000
stack
page read and write
E50000
direct allocation
page read and write
1EEFB043000
trusted library allocation
page read and write
4BEF000
stack
page read and write
42C1000
heap
page read and write
1EF0541C000
trusted library allocation
page read and write
1EEFAFAC000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
288242EB000
trusted library allocation
page read and write
2882E2B1000
trusted library allocation
page read and write
2F6E000
heap
page read and write
DA4000
heap
page read and write
CF38077000
stack
page read and write
CFA000
heap
page read and write
1EEFD679000
trusted library allocation
page read and write
2882369B000
trusted library allocation
page read and write
4841000
heap
page read and write
3B4000
heap
page read and write
1EEFC5D2000
trusted library allocation
page read and write
2881F7A9000
trusted library allocation
page read and write
1EEFA303000
trusted library allocation
page read and write
1EF021B5000
trusted library allocation
page read and write
1EEFB067000
trusted library allocation
page read and write
1EEF9FF1000
trusted library allocation
page read and write
1EEF9C6C000
trusted library allocation
page read and write
2E7E000
stack
page read and write
1D833000
heap
page read and write
1EEF7400000
trusted library allocation
page read and write
1EF053C3000
trusted library allocation
page read and write
1EEFD955000
trusted library allocation
page read and write
2882D875000
trusted library allocation
page read and write
2881EDAA000
trusted library allocation
page read and write
4761000
heap
page read and write
2FBBF000
heap
page read and write
1EEFB38A000
trusted library allocation
page read and write
15D4000
heap
page read and write
28824AC7000
trusted library allocation
page read and write
2882B8D1000
trusted library allocation
page read and write
1EEFC4AE000
trusted library allocation
page read and write
1EF022F1000
trusted library allocation
page read and write
2882B3CE000
trusted library allocation
page read and write
4841000
heap
page read and write
1EEF5DAD000
trusted library allocation
page read and write
288244F9000
trusted library allocation
page read and write
288238FC000
trusted library allocation
page read and write
28821347000
trusted library allocation
page read and write
1524000
heap
page read and write
1C7FFF000
stack
page read and write
288244F9000
trusted library allocation
page read and write
2882385E000
trusted library allocation
page read and write
2881C2FF000
heap
page read and write
1EF0204D000
trusted library allocation
page read and write
1EF0507D000
trusted library allocation
page read and write
2882D1C9000
trusted library allocation
page read and write
1EEFB380000
trusted library allocation
page read and write
2881ED84000
trusted library allocation
page read and write
1EEFB352000
trusted library allocation
page read and write
1EEFADBE000
trusted library allocation
page read and write
4841000
heap
page read and write
16CD000
heap
page read and write
1EEFD9BA000
trusted library allocation
page read and write
28823179000
trusted library allocation
page read and write
1EF01D2B000
trusted library allocation
page read and write
2881C328000
heap
page read and write
28814EEF000
heap
page read and write
1762DA84000
heap
page read and write
288233A0000
trusted library allocation
page read and write
1EF05406000
trusted library allocation
page read and write
B5C933E000
stack
page read and write
1762C970000
unclassified section
page readonly
1EEF782E000
trusted library allocation
page read and write
1EEFAB3C000
trusted library allocation
page read and write
13F0000
heap
page read and write
1EEFB323000
trusted library allocation
page read and write
2882E11C000
trusted library allocation
page read and write
2881C327000
heap
page read and write
1EF050BA000
trusted library allocation
page read and write
1EF05088000
trusted library allocation
page read and write
3EBE000
stack
page read and write
2881C2FE000
heap
page read and write
288244E0000
trusted library allocation
page read and write
A6E000
unkown
page execute and read and write
D12000
unkown
page execute and write copy
4841000
heap
page read and write
288256D6000
trusted library allocation
page read and write
1D81C000
heap
page read and write
1D3BE000
stack
page read and write
2881C327000
heap
page read and write
1EF020E3000
trusted library allocation
page read and write
1EEFC4AB000
trusted library allocation
page read and write
B4AC8FE000
stack
page read and write
37F85FF000
stack
page read and write
1EF02381000
trusted library allocation
page read and write
288238C3000
trusted library allocation
page read and write
FBC000
stack
page read and write
5E000
unkown
page readonly
1EEFB3E5000
trusted library allocation
page read and write
1EF052DF000
trusted library allocation
page read and write
1EEFBD9D000
trusted library allocation
page read and write
DDE000
heap
page read and write
CF36DBC000
stack
page read and write
288231B1000
trusted library allocation
page read and write
A13000
unkown
page execute and write copy
1EEEA7EC000
trusted library allocation
page read and write
2882D190000
trusted library allocation
page read and write
7C4000
heap
page read and write
1EEFD91F000
trusted library allocation
page read and write
DA4000
heap
page read and write
1EF052C6000
trusted library allocation
page read and write
1EEF9274000
trusted library allocation
page read and write
1EF05300000
trusted library allocation
page read and write
1EEF9215000
trusted library allocation
page read and write
1EEF8F23000
trusted library allocation
page read and write
2882D811000
trusted library allocation
page read and write
1EF05526000
trusted library allocation
page read and write
FFE000
stack
page read and write
1EEFD5FE000
trusted library allocation
page read and write
2882B84B000
trusted library allocation
page read and write
1EEF9940000
trusted library allocation
page read and write
1EF0211C000
trusted library allocation
page read and write
AC4000
unkown
page execute and write copy
1D82C000
heap
page read and write
1EF0444A000
trusted library allocation
page read and write
D75000
heap
page read and write
288231A7000
trusted library allocation
page read and write
5280000
direct allocation
page execute and read and write
1EEFBA49000
trusted library allocation
page read and write
FC3000
heap
page read and write
2882B743000
trusted library allocation
page read and write
5330000
direct allocation
page execute and read and write
1EEF6682000
trusted library allocation
page read and write
9F9000
unkown
page execute and write copy
65EF191000
trusted library allocation
page execute read
532000
unkown
page readonly
1EEF9BDE000
trusted library allocation
page read and write
1EF044BE000
trusted library allocation
page read and write
28822A29000
trusted library allocation
page read and write
2882B11E000
trusted library allocation
page read and write
78F000
stack
page read and write
28826C46000
trusted library allocation
page read and write
2882E229000
trusted library allocation
page read and write
1EF03985000
trusted library allocation
page read and write
1EEFB39F000
trusted library allocation
page read and write
984000
heap
page read and write
2FBE000
stack
page read and write
1EEF980B000
trusted library allocation
page read and write
28825F8E000
trusted library allocation
page read and write
2882B100000
trusted library allocation
page read and write
2881F475000
trusted library allocation
page read and write
1650000
direct allocation
page read and write
1EF0507B000
trusted library allocation
page read and write
1EEFED2A000
trusted library allocation
page read and write
2FBBC000
heap
page read and write
1EEF9032000
trusted library allocation
page read and write
1EEFD9A5000
trusted library allocation
page read and write
1EEFA403000
trusted library allocation
page read and write
1762D99C000
heap
page read and write
4D70000
direct allocation
page execute and read and write
2882BAF4000
trusted library allocation
page read and write
110F000
stack
page read and write
1471000
heap
page read and write
6215000
heap
page read and write
486E000
stack
page read and write
1EF02389000
trusted library allocation
page read and write
5260000
direct allocation
page execute and read and write
E70000
direct allocation
page read and write
28826ADF000
trusted library allocation
page read and write
1D820000
heap
page read and write
28822CF2000
unclassified section
page read and write
2882B4A6000
trusted library allocation
page read and write
39AE000
stack
page read and write
1EF022A6000
trusted library allocation
page read and write
2882D0D9000
trusted library allocation
page read and write
1EEF9FE5000
trusted library allocation
page read and write
1EF052C5000
trusted library allocation
page read and write
10F0000
heap
page read and write
288260A3000
trusted library allocation
page read and write
1EEF66E8000
trusted library allocation
page read and write
1524000
heap
page read and write
1EF050A5000
trusted library allocation
page read and write
28825C60000
trusted library allocation
page read and write
B4ABDFF000
stack
page read and write
94A000
heap
page read and write
EEB000
unkown
page execute and read and write
3B7E000
stack
page read and write
1EEFB067000
trusted library allocation
page read and write
1EF01E44000
trusted library allocation
page read and write
5400000
direct allocation
page execute and read and write
1EF03A03000
trusted library allocation
page read and write
1EEFD69C000
trusted library allocation
page read and write
1EF04100000
trusted library allocation
page read and write
2882D168000
trusted library allocation
page read and write
44FE000
stack
page read and write
477C000
stack
page read and write
288239D2000
unclassified section
page read and write
1EEFBA41000
trusted library allocation
page read and write
1EF04151000
trusted library allocation
page read and write
DA4000
heap
page read and write
1EF041C0000
trusted library allocation
page read and write
532000
unkown
page readonly
28826C61000
trusted library allocation
page read and write
1EEF65BF000
trusted library allocation
page read and write
2882366A000
trusted library allocation
page read and write
4D2F000
stack
page read and write
1EF04127000
trusted library allocation
page read and write
1EEF7840000
trusted library allocation
page read and write
28823C33000
trusted library allocation
page read and write
26345140000
heap
page read and write
1EEFBA8F000
trusted library allocation
page read and write
E80000
unkown
page readonly
1D820000
heap
page read and write
288231A0000
trusted library allocation
page read and write
28820F0A000
trusted library allocation
page read and write
544000
unkown
page readonly
2882600A000
trusted library allocation
page read and write
28825119000
trusted library allocation
page read and write
2882E0B9000
trusted library allocation
page read and write
1EEFAB34000
trusted library allocation
page read and write
DDE000
heap
page read and write
28815010000
heap
page read and write
2388A000
heap
page read and write
4761000
heap
page read and write
288231E6000
trusted library allocation
page read and write
2881C2FF000
heap
page read and write
28822D9B000
trusted library allocation
page read and write
2882E163000
trusted library allocation
page read and write
1D81A000
heap
page read and write
B4B301A000
stack
page read and write
1EF03805000
trusted library allocation
page read and write
1EEF9806000
trusted library allocation
page read and write
9E0000
heap
page read and write
939D371000
trusted library allocation
page execute read
8F2000
unkown
page execute and read and write
1EF0230F000
trusted library allocation
page read and write
65EF101000
trusted library allocation
page execute read
4841000
heap
page read and write
1EF024B1000
trusted library allocation
page read and write
1EF01E1B000
trusted library allocation
page read and write
2882378C000
trusted library allocation
page read and write
1EF0217C000
trusted library allocation
page read and write
4841000
heap
page read and write
5320000
direct allocation
page execute and read and write
B5C79FE000
stack
page read and write
28823890000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EEFC500000
trusted library allocation
page read and write
2882B3AC000
trusted library allocation
page read and write
CF3CEFD000
stack
page read and write
1EF023F9000
trusted library allocation
page read and write
2881C30F000
heap
page read and write
28826ADC000
trusted library allocation
page read and write
28826C42000
trusted library allocation
page read and write
1762D9A9000
heap
page read and write
8C1000
unkown
page execute and read and write
34FF000
stack
page read and write
1D806000
heap
page read and write
1EEF96EB000
trusted library allocation
page read and write
28823E10000
trusted library allocation
page read and write
1762CC00000
trusted library allocation
page read and write
1EF05273000
trusted library allocation
page read and write
2882D703000
trusted library allocation
page read and write
28825FD7000
trusted library allocation
page read and write
2881C327000
heap
page read and write
480E000
stack
page read and write
1EF05512000
trusted library allocation
page read and write
1EEFB3E1000
trusted library allocation
page read and write
3A3E000
stack
page read and write
4CCF000
stack
page read and write
1EEFA913000
trusted library allocation
page read and write
880000
heap
page read and write
1ABEF000
stack
page read and write
2882B300000
trusted library allocation
page read and write
1EF052C5000
trusted library allocation
page read and write
7C4000
heap
page read and write
288231C9000
trusted library allocation
page read and write
1EF023FC000
trusted library allocation
page read and write
1D49F000
stack
page read and write
288238B3000
trusted library allocation
page read and write
4D90000
direct allocation
page execute and read and write
2881F7AD000
trusted library allocation
page read and write
288231F1000
trusted library allocation
page read and write
2882D190000
trusted library allocation
page read and write
2882D09C000
trusted library allocation
page read and write
A30000
direct allocation
page read and write
3DFE000
stack
page read and write
13E4000
heap
page read and write
1EEFABC9000
trusted library allocation
page read and write
1EEFABDA000
trusted library allocation
page read and write
EFA000
heap
page read and write
BFE000
unkown
page execute and read and write
28823E78000
trusted library allocation
page read and write
2882E2CD000
trusted library allocation
page read and write
BDFFABE000
unkown
page readonly
2882BAB6000
trusted library allocation
page read and write
ADC000
unkown
page execute and write copy
288231DE000
trusted library allocation
page read and write
2881EDC1000
trusted library allocation
page read and write
9BD000
stack
page read and write
1EEFC2D6000
trusted library allocation
page read and write
133D000
stack
page read and write
288136F0000
trusted library allocation
page read and write
1EEFBFE0000
trusted library allocation
page read and write
28826063000
trusted library allocation
page read and write
2882BA1C000
trusted library allocation
page read and write
1B4BF000
stack
page read and write
1EEFB3A1000
trusted library allocation
page read and write
1EEF9075000
trusted library allocation
page read and write
2881C30D000
heap
page read and write
28826C81000
trusted library allocation
page read and write
4D31000
heap
page read and write
1EEFB3CF000
trusted library allocation
page read and write
50C000
unkown
page readonly
7B0000
direct allocation
page read and write
47C1000
heap
page read and write
28823839000
trusted library allocation
page read and write
462E000
stack
page read and write
5410000
direct allocation
page execute and read and write
28824AC0000
trusted library allocation
page read and write
1762DA99000
heap
page read and write
1EEFC8F3000
trusted library allocation
page read and write
2882DFEC000
trusted library allocation
page read and write
2882E03C000
trusted library allocation
page read and write
F6B000
heap
page read and write
2882131C000
trusted library allocation
page read and write
1EEFB079000
trusted library allocation
page read and write
2882D08E000
trusted library allocation
page read and write
1EEFB05F000
trusted library allocation
page read and write
1EEF5C7E000
trusted library allocation
page read and write
4E11000
heap
page read and write
4D31000
heap
page read and write
1D83B000
heap
page read and write
299C000
stack
page read and write
2882BA9D000
trusted library allocation
page read and write
449E000
stack
page read and write
5B4000
heap
page read and write
28825CDA000
trusted library allocation
page read and write
3BEF000
stack
page read and write
28825FBB000
trusted library allocation
page read and write
1EEFB479000
trusted library allocation
page read and write
1D815000
heap
page read and write
1EEF7848000
trusted library allocation
page read and write
288260A9000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EEF9EFD000
trusted library allocation
page read and write
2882E143000
trusted library allocation
page read and write
1650000
direct allocation
page read and write
28823169000
trusted library allocation
page read and write
1EEF9BA5000
trusted library allocation
page read and write
7C4000
heap
page read and write
2882383B000
trusted library allocation
page read and write
28824930000
trusted library section
page read and write
1EEF6443000
trusted library allocation
page read and write
7D0000
unkown
page read and write
1EEEC2E0000
heap
page read and write
2882B0D9000
trusted library allocation
page read and write
467F000
stack
page read and write
288260DF000
trusted library allocation
page read and write
2882B44D000
trusted library allocation
page read and write
1C5FFB000
stack
page read and write
37DF000
stack
page read and write
145E000
heap
page read and write
288132B0000
heap
page read and write
D00000
trusted library allocation
page read and write
EB0000
direct allocation
page read and write
4761000
heap
page read and write
A19000
unkown
page execute and read and write
28828024000
trusted library allocation
page read and write
1EEFB374000
trusted library allocation
page read and write
4D31000
heap
page read and write
4761000
heap
page read and write
1EEFCCC4000
trusted library allocation
page read and write
4E11000
heap
page read and write
2882D1E7000
trusted library allocation
page read and write
A47000
unkown
page execute and write copy
549000
unkown
page write copy
2882B1E1000
trusted library allocation
page read and write
2882D0ED000
trusted library allocation
page read and write
4761000
heap
page read and write
1EEF9B03000
trusted library allocation
page read and write
2882E1B3000
trusted library allocation
page read and write
1EEFBFC5000
trusted library allocation
page read and write
28813240000
unclassified section
page readonly
1EEFB07F000
trusted library allocation
page read and write
B4B28DB000
stack
page read and write
40EF000
stack
page read and write
2882B749000
trusted library allocation
page read and write
4E11000
heap
page read and write
1360000
heap
page read and write
512E000
stack
page read and write
3D2E000
stack
page read and write
1EF054A3000
trusted library allocation
page read and write
7C4000
heap
page read and write
984000
heap
page read and write
1EEFD78A000
trusted library allocation
page read and write
4841000
heap
page read and write
B4AE13E000
stack
page read and write
1EEFA772000
trusted library allocation
page read and write
1EF0525A000
trusted library allocation
page read and write
1EEFBD03000
trusted library allocation
page read and write
18163B10000
heap
page read and write
1EEFBF01000
trusted library allocation
page read and write
1EEF8FEE000
trusted library allocation
page read and write
2881C32E000
heap
page read and write
299B1000
heap
page read and write
CF6000
unkown
page execute and read and write
12316BF74000
trusted library allocation
page read and write
1EEF5CC4000
trusted library allocation
page read and write
2882D8CB000
trusted library allocation
page read and write
2882B057000
trusted library allocation
page read and write
FF0000
direct allocation
page read and write
7C4000
heap
page read and write
2881C30D000
heap
page read and write
13E4000
heap
page read and write
1EEFAF3B000
trusted library allocation
page read and write
2881C30F000
heap
page read and write
1EEFB3E1000
trusted library allocation
page read and write
A3E000
unkown
page execute and read and write
2882D8B5000
trusted library allocation
page read and write
84AC000
stack
page read and write
1AFDC000
stack
page read and write
1EEFED28000
trusted library allocation
page read and write
1EF022BA000
trusted library allocation
page read and write
1EEF76D5000
trusted library allocation
page read and write
2881ECF0000
trusted library section
page readonly
1EEFCA4D000
trusted library allocation
page read and write
2882524E000
trusted library allocation
page read and write
1EEF9676000
trusted library allocation
page read and write
4D31000
heap
page read and write
4890000
direct allocation
page execute and read and write
1EEF7309000
trusted library allocation
page read and write
28826000000
trusted library allocation
page read and write
28825AF2000
trusted library allocation
page read and write
4E11000
heap
page read and write
123C000
stack
page read and write
2882B747000
trusted library allocation
page read and write
39BE000
stack
page read and write
50C000
unkown
page readonly
1EEFBC50000
trusted library allocation
page read and write
1B5BD260000
heap
page read and write
3B3F000
stack
page read and write
1EEFC2FC000
trusted library allocation
page read and write
1EF02243000
trusted library allocation
page read and write
1EEFCB03000
trusted library allocation
page read and write
28820300000
trusted library allocation
page read and write
1EEFB3A1000
trusted library allocation
page read and write
1EEFCA5C000
trusted library allocation
page read and write
28823373000
trusted library allocation
page read and write
14CE000
heap
page read and write
3D7E000
stack
page read and write
2881C305000
heap
page read and write
35FE000
stack
page read and write
1EEFB6F4000
trusted library allocation
page read and write
1F6B7CAE000
trusted library allocation
page read and write
1EF05062000
trusted library allocation
page read and write
2881C321000
heap
page read and write
1EEFC612000
trusted library allocation
page read and write
9B7000
unkown
page execute and write copy
2881C324000
heap
page read and write
1EEF7300000
trusted library allocation
page read and write
E80000
unkown
page readonly
2882BAD5000
trusted library allocation
page read and write
526E000
stack
page read and write
1EEFA933000
trusted library allocation
page read and write
1EF050D3000
trusted library allocation
page read and write
28824327000
trusted library allocation
page read and write
1EEFC9EF000
trusted library allocation
page read and write
28825700000
trusted library allocation
page read and write
1D5EF000
stack
page read and write
28BE000
stack
page read and write
288136FE000
trusted library allocation
page read and write
28813500000
trusted library allocation
page read and write
FC0000
heap
page read and write
4E11000
heap
page read and write
1762D500000
trusted library allocation
page read and write
CF3F31B000
stack
page read and write
9B8000
unkown
page execute and read and write
9EC000
unkown
page execute and write copy
1EF052CD000
trusted library allocation
page read and write
28823500000
trusted library allocation
page read and write
2882E05B000
trusted library allocation
page read and write
B4B325C000
stack
page read and write
15D4000
heap
page read and write
151A000
heap
page read and write
28826075000
trusted library allocation
page read and write
1EEF7C00000
trusted library allocation
page read and write
2881F7EF000
trusted library allocation
page read and write
B4B291C000
stack
page read and write
28825BA0000
trusted library allocation
page read and write
CF35DD8000
stack
page read and write
28823223000
trusted library allocation
page read and write
1EEFA594000
trusted library allocation
page read and write
288231BE000
trusted library allocation
page read and write
7C4000
heap
page read and write
1EEFB150000
trusted library section
page readonly
33CF000
stack
page read and write
28825DD7000
trusted library allocation
page read and write
13E4000
heap
page read and write
1EEFD7AF000
trusted library allocation
page read and write
1D818000
heap
page read and write
1EF03AFB000
trusted library allocation
page read and write
DA4000
heap
page read and write
1EEF78B0000
trusted library allocation
page read and write
2881C30C000
heap
page read and write
1EEF6970000
heap
page read and write
4E11000
heap
page read and write
28826A03000
trusted library allocation
page read and write
1EF01EFE000
trusted library allocation
page read and write
1524000
heap
page read and write
E4F000
stack
page read and write
1EF0428F000
trusted library allocation
page read and write
30AC000
stack
page read and write
2882D1A2000
trusted library allocation
page read and write
5572000
trusted library allocation
page read and write
2882E09A000
trusted library allocation
page read and write
3BFF000
stack
page read and write
2881F8AF000
trusted library allocation
page read and write
1EEFB55A000
trusted library allocation
page read and write
426E000
stack
page read and write
1D812000
heap
page read and write
1524000
heap
page read and write
1EEFAC49000
trusted library allocation
page read and write
1762D509000
trusted library allocation
page read and write
396E000
stack
page read and write
2882E161000
trusted library allocation
page read and write
1EF0235E000
trusted library allocation
page read and write
7C4000
heap
page read and write
451E000
stack
page read and write
1EEFA889000
trusted library allocation
page read and write
5B4000
heap
page read and write
28824E05000
trusted library allocation
page read and write
2881F7E1000
trusted library allocation
page read and write
1EEF6595000
trusted library allocation
page read and write
2882BAD1000
trusted library allocation
page read and write
1EEFED0A000
trusted library allocation
page read and write
1EEFB380000
trusted library allocation
page read and write
1EF05540000
trusted library allocation
page read and write
2882D8C7000
trusted library allocation
page read and write
1EEF9C3C000
trusted library allocation
page read and write
1EEF700B000
trusted library allocation
page read and write
B30000
heap
page read and write
288244F9000
trusted library allocation
page read and write
1EF04200000
trusted library allocation
page read and write
28823CE8000
trusted library allocation
page read and write
1EEEC32F000
heap
page read and write
1EEFB8E0000
trusted library section
page read and write
1EEF9AE7000
trusted library allocation
page read and write
4841000
heap
page read and write
17AF000
stack
page read and write
54B0000
direct allocation
page execute and read and write
2881EF10000
trusted library allocation
page read and write
1EEF74E8000
trusted library allocation
page read and write
1EF0203C000
trusted library allocation
page read and write
1EEFD67E000
trusted library allocation
page read and write
4EF0000
direct allocation
page execute and read and write
1EF05223000
trusted library allocation
page read and write
2882E1B9000
trusted library allocation
page read and write
2882B600000
trusted library allocation
page read and write
2881EF7F000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EEF7854000
trusted library allocation
page read and write
28823001000
trusted library allocation
page read and write
1EEF9551000
trusted library allocation
page read and write
288244EA000
trusted library allocation
page read and write
28825E95000
trusted library allocation
page read and write
28823D03000
trusted library allocation
page read and write
1EEF5CC8000
trusted library allocation
page read and write
1EEFB3F2000
trusted library allocation
page read and write
28825F5D000
trusted library allocation
page read and write
1EEF9500000
trusted library allocation
page read and write
A38000
unkown
page execute and write copy
1EEF6300000
heap
page read and write
2881F46A000
trusted library allocation
page read and write
288233F6000
trusted library allocation
page read and write
E70000
direct allocation
page read and write
1EF03803000
trusted library allocation
page read and write
F8C000
heap
page read and write
FF0000
direct allocation
page read and write
2881C30A000
heap
page read and write
1F6B7CB9000
trusted library allocation
page read and write
5E000
unkown
page readonly
2881C345000
heap
page read and write
1EF024C9000
trusted library allocation
page read and write
10F4000
heap
page read and write
1EF05409000
trusted library allocation
page read and write
1EEFBC00000
trusted library allocation
page read and write
28825C00000
trusted library allocation
page read and write
2882E2D0000
trusted library allocation
page read and write
5B4000
heap
page read and write
1EEF96CB000
trusted library allocation
page read and write
1762D98D000
heap
page read and write
28823786000
trusted library allocation
page read and write
1EEF64F5000
trusted library allocation
page read and write
4D50000
heap
page read and write
2881ECD0000
unclassified section
page read and write
1EEFB3A7000
trusted library allocation
page read and write
1F6B7C66000
trusted library allocation
page read and write
43FF000
stack
page read and write
1EEFB391000
trusted library allocation
page read and write
1EEF6046000
trusted library allocation
page read and write
28823C2F000
trusted library allocation
page read and write
1894000
heap
page read and write
CF3DF9C000
stack
page read and write
2882B01B000
trusted library allocation
page read and write
2881C32E000
heap
page read and write
939D411000
trusted library allocation
page execute read
C5C000
stack
page read and write
28822D53000
trusted library allocation
page read and write
1762CA26000
heap
page read and write
1EF020F2000
trusted library allocation
page read and write
2881C359000
heap
page read and write
2882E07D000
trusted library allocation
page read and write
28823760000
trusted library allocation
page read and write
1EEF8FCA000
trusted library allocation
page read and write
3C1F000
stack
page read and write
D03000
unkown
page execute and read and write
2D7F000
stack
page read and write
1EF03945000
trusted library allocation
page read and write
1EEF9209000
trusted library allocation
page read and write
1EEF78A2000
trusted library allocation
page read and write
1EEFC032000
trusted library allocation
page read and write
4841000
heap
page read and write
10EA1FA0000
heap
page read and write
1EEF6075000
trusted library allocation
page read and write
2882E07D000
trusted library allocation
page read and write
2881C30B000
heap
page read and write
18163B30000
heap
page read and write
1EF01D4C000
trusted library allocation
page read and write
1EEFCBFB000
trusted library allocation
page read and write
1EEF90E9000
trusted library allocation
page read and write
9D1000
unkown
page execute and write copy
1EF044BE000
trusted library allocation
page read and write
2881ECC0000
trusted library section
page readonly
649F000
stack
page read and write
F6D000
heap
page read and write
2882E090000
trusted library allocation
page read and write
89F000
unkown
page execute and read and write
FAF000
heap
page read and write
50AE000
stack
page read and write
ECE000
stack
page read and write
508E000
stack
page read and write
2882D1CD000
trusted library allocation
page read and write
38CF000
stack
page read and write
28825F94000
trusted library allocation
page read and write
1EEF66CF000
trusted library allocation
page read and write
2881C340000
heap
page read and write
28826069000
trusted library allocation
page read and write
4E11000
heap
page read and write
2881C300000
heap
page read and write
1EF01D21000
trusted library allocation
page read and write
2881C334000
heap
page read and write
CF4076C000
stack
page read and write
440F000
stack
page read and write
1EEFAF03000
trusted library allocation
page read and write
1EF024ED000
trusted library allocation
page read and write
288231E2000
trusted library allocation
page read and write
2882BAFD000
trusted library allocation
page read and write
1D8DE000
stack
page read and write
15C0000
direct allocation
page read and write
1EEFBE01000
trusted library allocation
page read and write
1B50D000
stack
page read and write
2882800E000
trusted library allocation
page read and write
1EEFB462000
trusted library allocation
page read and write
1EEF6026000
trusted library allocation
page read and write
DA4000
heap
page read and write
26344B5D000
trusted library allocation
page read and write
1EEFD62B000
trusted library allocation
page read and write
1762DA31000
heap
page read and write
1EF02122000
trusted library allocation
page read and write
1D819000
heap
page read and write
2882367E000
trusted library allocation
page read and write
2DEC7F800000
trusted library allocation
page read and write
2881C30C000
heap
page read and write
2882369B000
trusted library allocation
page read and write
1EEFB71C000
trusted library allocation
page read and write
A27000
unkown
page execute and read and write
385F000
stack
page read and write
1EEF764F000
trusted library allocation
page read and write
28826B6D000
trusted library allocation
page read and write
2882B0C4000
trusted library allocation
page read and write
28823303000
trusted library allocation
page read and write
2882D0B1000
trusted library allocation
page read and write
1EEF9403000
trusted library allocation
page read and write
1EF02387000
trusted library allocation
page read and write
5B4000
heap
page read and write
28826005000
trusted library allocation
page read and write
153E000
stack
page read and write
CF36CBC000
stack
page read and write
F91000
heap
page read and write
28824396000
trusted library allocation
page read and write
316F000
stack
page read and write
1D35F000
stack
page read and write
1EEFA027000
trusted library allocation
page read and write
1EF0503B000
trusted library allocation
page read and write
1EEFA5ED000
trusted library allocation
page read and write
4C30000
direct allocation
page execute and read and write
389E000
stack
page read and write
1F6B7950000
heap
page read and write
2881C32E000
heap
page read and write
BD817FE000
unkown
page readonly
B4AEB33000
stack
page read and write
4F42000
trusted library allocation
page read and write
2882DF8E000
trusted library allocation
page read and write
AC3000
unkown
page execute and read and write
CF3807A000
stack
page read and write
1EEF78F6000
trusted library allocation
page read and write
1EEFBC03000
trusted library allocation
page read and write
DD0000
heap
page read and write
1EEFA903000
trusted library allocation
page read and write
1EF05425000
trusted library allocation
page read and write
1EEFD5B8000
trusted library allocation
page read and write
482F000
stack
page read and write
4D50000
trusted library allocation
page read and write
143E000
heap
page read and write
1EF02703000
trusted library allocation
page read and write
1EF0434F000
trusted library allocation
page read and write
1EEF5D54000
trusted library allocation
page read and write
1410000
heap
page read and write
28820C17000
trusted library allocation
page read and write
1EF0373A000
trusted library allocation
page read and write
4841000
heap
page read and write
4E11000
heap
page read and write
3B4000
heap
page read and write
544000
unkown
page readonly
4E50000
direct allocation
page execute and read and write
1EF02319000
trusted library allocation
page read and write
2882434B000
trusted library allocation
page read and write
22DAD3C04000
trusted library allocation
page read and write
1EEF7AE0000
trusted library allocation
page read and write
288231AE000
trusted library allocation
page read and write
2882E003000
trusted library allocation
page read and write
2882B03F000
trusted library allocation
page read and write
15D4000
heap
page read and write
288238B9000
trusted library allocation
page read and write
2882D148000
trusted library allocation
page read and write
10EA1FBE000
heap
page read and write
2882E1BE000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
1EEF5D6F000
trusted library allocation
page read and write
1524000
heap
page read and write
1EEEA490000
heap
page read and write
28820E08000
trusted library allocation
page read and write
1D820000
heap
page read and write
1EEF78F6000
trusted library allocation
page read and write
1EEF788A000
trusted library allocation
page read and write
1EEFA891000
trusted library allocation
page read and write
1EF0270F000
trusted library allocation
page read and write
28828026000
trusted library allocation
page read and write
2882B3D0000
trusted library allocation
page read and write
41CE000
stack
page read and write
1EEFB39B000
trusted library allocation
page read and write
10EA1FAB000
heap
page read and write
4841000
heap
page read and write
35BF000
stack
page read and write
380000
heap
page read and write
1431000
heap
page read and write
B4B32DE000
stack
page read and write
1EEFA73A000
trusted library allocation
page read and write
1EF050A8000
trusted library allocation
page read and write
1EF05243000
trusted library allocation
page read and write
1EF023F4000
trusted library allocation
page read and write
5E0000
heap
page read and write
2882B8DF000
trusted library allocation
page read and write
4DF0000
direct allocation
page execute and read and write
4C10000
direct allocation
page execute and read and write
A30000
direct allocation
page read and write
A1F000
unkown
page execute and read and write
1EF039A3000
trusted library allocation
page read and write
1EEFA952000
trusted library allocation
page read and write
1AD8E000
stack
page read and write
2882DFA0000
trusted library allocation
page read and write
2882D15D000
trusted library allocation
page read and write
2882B4D0000
trusted library allocation
page read and write
1EEF60EA000
trusted library allocation
page read and write
5B4000
heap
page read and write
1D835000
heap
page read and write
4841000
heap
page read and write
2882E21F000
trusted library allocation
page read and write
2882B8A8000
trusted library allocation
page read and write
4B2E000
stack
page read and write
3C5D000
stack
page read and write
28825F94000
trusted library allocation
page read and write
CF398FF000
stack
page read and write
28825DF4000
trusted library allocation
page read and write
1EF022EA000
trusted library allocation
page read and write
1EF04162000
trusted library allocation
page read and write
1EEF7A00000
trusted library allocation
page read and write
413E000
stack
page read and write
147D000
heap
page read and write
4841000
heap
page read and write
EB0000
direct allocation
page read and write
28825FFD000
trusted library allocation
page read and write
1EF023DD000
trusted library allocation
page read and write
2882B3FA000
trusted library allocation
page read and write
2882B39E000
trusted library allocation
page read and write
2881C2FF000
heap
page read and write
B4AC7FE000
stack
page read and write
28823C00000
trusted library allocation
page read and write
1EEF9E5F000
trusted library allocation
page read and write
15BE000
stack
page read and write
1EEFD517000
trusted library allocation
page read and write
1EF01F7E000
trusted library allocation
page read and write
1EEFAF00000
trusted library allocation
page read and write
9BA000
unkown
page execute and read and write
1EEFB35E000
trusted library allocation
page read and write
4841000
heap
page read and write
1EEF6013000
trusted library allocation
page read and write
4830000
direct allocation
page read and write
1EEF9A8B000
trusted library allocation
page read and write
1EEFB3CB000
trusted library allocation
page read and write
46BE000
stack
page read and write
1D812000
heap
page read and write
2882D7CF000
trusted library allocation
page read and write
1D83B000
heap
page read and write
2881C30C000
heap
page read and write
1EEF7000000
trusted library allocation
page read and write
1EEF6990000
unclassified section
page read and write
2882E053000
trusted library allocation
page read and write
2881ED4A000
trusted library allocation
page read and write
28823654000
trusted library allocation
page read and write
7B0000
direct allocation
page read and write
1EEFC60F000
trusted library allocation
page read and write
1437000
heap
page read and write
1EEFB38A000
trusted library allocation
page read and write
2881ED00000
trusted library allocation
page read and write
26344B66000
trusted library allocation
page read and write
1EEFAEFB000
trusted library allocation
page read and write
28820AF0000
trusted library section
page readonly
1EF0371F000
trusted library allocation
page read and write
1EF050D7000
trusted library allocation
page read and write
1166000
unkown
page execute and read and write
1EEFABF1000
trusted library allocation
page read and write
1EEFC476000
trusted library allocation
page read and write
1EEFA6FD000
trusted library allocation
page read and write
28823690000
trusted library allocation
page read and write
1EF03943000
trusted library allocation
page read and write
544000
unkown
page readonly
28825212000
trusted library allocation
page read and write
1762DA61000
heap
page read and write
28821209000
trusted library allocation
page read and write
1EEF5D26000
trusted library allocation
page read and write
1EEF65B9000
trusted library allocation
page read and write
3A80000
heap
page read and write
1EEFC709000
trusted library allocation
page read and write
1F6B7790000
heap
page read and write
1166000
unkown
page execute and read and write
1EEF91B3000
trusted library allocation
page read and write
2882800C000
trusted library allocation
page read and write
28823500000
trusted library allocation
page read and write
28826C78000
trusted library allocation
page read and write
1EEFB8C0000
trusted library section
page read and write
263447E0000
heap
page read and write
A77000
unkown
page execute and read and write
2882D1A2000
trusted library allocation
page read and write
1EF050EB000
trusted library allocation
page read and write
1EEF7100000
trusted library allocation
page read and write
1EEF5CA5000
trusted library allocation
page read and write
2882307C000
trusted library allocation
page read and write
1EEF99B2000
trusted library allocation
page read and write
6C2E000
heap
page read and write
4761000
heap
page read and write
1EEFBC9E000
trusted library allocation
page read and write
1EEFC600000
trusted library allocation
page read and write
2881EE8A000
trusted library allocation
page read and write
1EF022AE000
trusted library allocation
page read and write
4761000
heap
page read and write
5B4000
heap
page read and write
28821300000
trusted library allocation
page read and write
1EEFB032000
trusted library allocation
page read and write
1D815000
heap
page read and write
1762D9A0000
heap
page read and write
10EA05B7000
heap
page read and write
1EF041B4000
trusted library allocation
page read and write
1EEFA869000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
2881C305000
heap
page read and write
ACD000
unkown
page execute and write copy
288244F2000
trusted library allocation
page read and write
10EA070A000
trusted library allocation
page read and write
3D9E000
stack
page read and write
CF3F5DF000
stack
page read and write
2882E1D8000
trusted library allocation
page read and write
1EEF64C7000
trusted library allocation
page read and write
2882451F000
trusted library allocation
page read and write
2882BAC9000
trusted library allocation
page read and write
28823E5D000
trusted library allocation
page read and write
EAC000
unkown
page execute and read and write
4E11000
heap
page read and write
2881C354000
heap
page read and write
288244F2000
trusted library allocation
page read and write
ECB000
heap
page read and write
2882369B000
trusted library allocation
page read and write
28826AA3000
trusted library allocation
page read and write
1F6B77BA000
heap
page read and write
1EEFB059000
trusted library allocation
page read and write
4D31000
heap
page read and write
3A0380604000
trusted library allocation
page read and write
1EF02041000
trusted library allocation
page read and write
2882D1CD000
trusted library allocation
page read and write
2882B39A000
trusted library allocation
page read and write
1EEFB3F2000
trusted library allocation
page read and write
44EE000
stack
page read and write
9F9000
unkown
page execute and write copy
4D31000
heap
page read and write
1762CB40000
heap
page readonly
1EEF9F78000
trusted library allocation
page read and write
2882DF85000
trusted library allocation
page read and write
5B4000
heap
page read and write
15C0000
direct allocation
page read and write
BDFEFBB000
stack
page read and write
39FF000
stack
page read and write
1EEFB391000
trusted library allocation
page read and write
FAF000
heap
page read and write
2881F41E000
trusted library allocation
page read and write
346E000
stack
page read and write
1EEFD999000
trusted library allocation
page read and write
28825F92000
trusted library allocation
page read and write
4761000
heap
page read and write
1EEFAD00000
trusted library allocation
page read and write
1F6B7910000
heap
page readonly
1762D940000
heap
page read and write
2881C357000
heap
page read and write
2881C30C000
heap
page read and write
1EEFA74B000
trusted library allocation
page read and write
1EF02228000
trusted library allocation
page read and write
378F000
stack
page read and write
180E000
stack
page read and write
B4B285B000
stack
page read and write
1EEF7C4D000
trusted library allocation
page read and write
407E000
stack
page read and write
FEE000
heap
page read and write
1EEFB354000
trusted library allocation
page read and write
28814F5C000
heap
page read and write
1EEF8F41000
trusted library allocation
page read and write
2881C359000
heap
page read and write
1510000
heap
page read and write
4A88000
trusted library allocation
page read and write
1EEFABD5000
trusted library allocation
page read and write
A13000
unkown
page execute and write copy
1EEF920D000
trusted library allocation
page read and write
830000
unkown
page execute and write copy
1EF02768000
trusted library allocation
page read and write
1EEF5D11000
trusted library allocation
page read and write
1EF0535D000
trusted library allocation
page read and write
1EEFA536000
trusted library allocation
page read and write
1EF05503000
trusted library allocation
page read and write
FD000
unkown
page read and write
1EEF5EEC000
trusted library allocation
page read and write
2882DFCE000
trusted library allocation
page read and write
DA4000
heap
page read and write
2882E0B9000
trusted library allocation
page read and write
F18000
heap
page read and write
1EF0234C000
trusted library allocation
page read and write
1EF05223000
trusted library allocation
page read and write
4830000
direct allocation
page read and write
2882D852000
trusted library allocation
page read and write
2881F8C1000
trusted library allocation
page read and write
1D833000
heap
page read and write
193E000
stack
page read and write
2881C315000
heap
page read and write
1EEFD586000
trusted library allocation
page read and write
28825D77000
trusted library allocation
page read and write
CF3CCFD000
stack
page read and write
1EF027E1000
trusted library allocation
page read and write
28823760000
trusted library allocation
page read and write
2882525D000
trusted library allocation
page read and write
4841000
heap
page read and write
350F000
stack
page read and write
9C0000
unkown
page execute and read and write
1EEFC700000
trusted library allocation
page read and write
2882D8C0000
trusted library allocation
page read and write
28820D0F000
trusted library allocation
page read and write
28823E61000
trusted library allocation
page read and write
2882E1D4000
trusted library allocation
page read and write
1762CD6F000
trusted library allocation
page read and write
CF4001E000
stack
page read and write
2A7D000
heap
page read and write
9F8000
unkown
page execute and read and write
1EEF5D5C000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EEF7833000
trusted library allocation
page read and write
1173000
heap
page read and write
1EEF9514000
trusted library allocation
page read and write
1EF01E72000
trusted library allocation
page read and write
1EF0528B000
trusted library allocation
page read and write
1EEFB3DB000
trusted library allocation
page read and write
2F6B000
heap
page read and write
F1B000
heap
page read and write
939D391000
trusted library allocation
page execute read
40FF000
stack
page read and write
4EC1000
heap
page read and write
37AF92204000
trusted library allocation
page read and write
28823990000
trusted library section
page readonly
494E000
stack
page read and write
288236CE000
trusted library allocation
page read and write
1EF0221A000
trusted library allocation
page read and write
1762DA21000
heap
page read and write
2881C305000
heap
page read and write
1762CD2F000
trusted library allocation
page read and write
2882B2A2000
trusted library allocation
page read and write
2882E10E000
trusted library allocation
page read and write
1EEFCB01000
trusted library allocation
page read and write
CF353EF000
stack
page read and write
2882E2E7000
trusted library allocation
page read and write
1EEFC223000
trusted library allocation
page read and write
964000
heap
page read and write
1EEFB4BC000
trusted library allocation
page read and write
2881C334000
heap
page read and write
1762CD78000
trusted library allocation
page read and write
1EF01EFE000
trusted library allocation
page read and write
28826C03000
trusted library allocation
page read and write
1EF024BB000
trusted library allocation
page read and write
4E20000
heap
page read and write
28823662000
trusted library allocation
page read and write
1EEFB4CB000
trusted library allocation
page read and write
26344B10000
trusted library allocation
page read and write
2882B100000
trusted library allocation
page read and write
1D820000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
28825DC4000
trusted library allocation
page read and write
1D7F2000
heap
page read and write
7D0000
unkown
page read and write
65EF0A1000
trusted library allocation
page execute read
37F95FE000
stack
page read and write
1EF0219A000
trusted library allocation
page read and write
939D431000
trusted library allocation
page execute read
2882B343000
trusted library allocation
page read and write
1170000
heap
page read and write
B4AB033000
stack
page read and write
2881F898000
trusted library allocation
page read and write
28823A90000
trusted library section
page read and write
2881ED98000
trusted library allocation
page read and write
F8A000
heap
page read and write
1EEF9AEA000
trusted library allocation
page read and write
4841000
heap
page read and write
2881F415000
trusted library allocation
page read and write
2882BA93000
trusted library allocation
page read and write
799DF003000
trusted library allocation
page read and write
2882B7FC000
trusted library allocation
page read and write
511C000
stack
page read and write
1EEFCB23000
trusted library allocation
page read and write
1EEFC190000
trusted library allocation
page read and write
1F6B7D0C000
trusted library allocation
page read and write
1EEF9E03000
trusted library allocation
page read and write
1EF04403000
trusted library allocation
page read and write
2881F700000
trusted library allocation
page read and write
1EEF9143000
trusted library allocation
page read and write
1EEFB300000
trusted library allocation
page read and write
28A000
unkown
page read and write
28820601000
trusted library allocation
page read and write
1EEFBA49000
trusted library allocation
page read and write
288236CE000
trusted library allocation
page read and write
2881C31D000
heap
page read and write
1EEF9B56000
trusted library allocation
page read and write
1EEFC556000
trusted library allocation
page read and write
28825FCA000
trusted library allocation
page read and write
2882E1EA000
trusted library allocation
page read and write
1EF02189000
trusted library allocation
page read and write
2882E12D000
trusted library allocation
page read and write
5B4000
heap
page read and write
28822CF0000
unclassified section
page read and write
1EF024C7000
trusted library allocation
page read and write
2882B752000
trusted library allocation
page read and write
1DCA4C713000
trusted library allocation
page read and write
28813300000
heap
page read and write
1EEFD9C6000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EEFAE08000
trusted library allocation
page read and write
7B0000
direct allocation
page read and write
635F000
stack
page read and write
2882E13C000
trusted library allocation
page read and write
1EEFB3A7000
trusted library allocation
page read and write
E70000
direct allocation
page read and write
4841000
heap
page read and write
1D82B000
heap
page read and write
2882E12D000
trusted library allocation
page read and write
2882B8E1000
trusted library allocation
page read and write
28823658000
trusted library allocation
page read and write
1EF023FE000
trusted library allocation
page read and write
28826B11000
trusted library allocation
page read and write
457E000
stack
page read and write
2882E1B3000
trusted library allocation
page read and write
1EEF7013000
trusted library allocation
page read and write
1EEFDA00000
trusted library allocation
page read and write
4D70000
direct allocation
page execute and read and write
28825CF7000
trusted library allocation
page read and write
1AD3D000
stack
page read and write
4841000
heap
page read and write
2882385B000
trusted library allocation
page read and write
2882B04F000
trusted library allocation
page read and write
1762DA7B000
heap
page read and write
2881C30F000
heap
page read and write
28825D00000
trusted library allocation
page read and write
28825203000
trusted library allocation
page read and write
1EEFAD03000
trusted library allocation
page read and write
1EEF9F9F000
trusted library allocation
page read and write
28825FBB000
trusted library allocation
page read and write
1D82B000
heap
page read and write
1EEFB4C3000
trusted library allocation
page read and write
1EF05047000
trusted library allocation
page read and write
28821009000
trusted library allocation
page read and write
50E0000
direct allocation
page read and write
2881C315000
heap
page read and write
13E4000
heap
page read and write
1762CA20000
heap
page read and write
1EEFB3A1000
trusted library allocation
page read and write
349F000
stack
page read and write
1EEFC495000
trusted library allocation
page read and write
1762CB70000
trusted library section
page readonly
964000
heap
page read and write
28826A82000
trusted library allocation
page read and write
1EEFAFE7000
trusted library allocation
page read and write
29C000
unkown
page readonly
1EEFA4F5000
trusted library allocation
page read and write
997000
heap
page read and write
1EF050BA000
trusted library allocation
page read and write
15D4000
heap
page read and write
4841000
heap
page read and write
1EEFA5B4000
trusted library allocation
page read and write
1EF01FC9000
trusted library allocation
page read and write
1EEFAE63000
trusted library allocation
page read and write
2882E1D8000
trusted library allocation
page read and write
1EF04203000
trusted library allocation
page read and write
1EF0247B000
trusted library allocation
page read and write
1EEFB3F2000
trusted library allocation
page read and write
28823575000
trusted library allocation
page read and write
3B7E000
stack
page read and write
28820810000
heap
page read and write
2882BAAC000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EEFB160000
trusted library section
page readonly
288241C8000
trusted library allocation
page read and write
91F000
unkown
page execute and read and write
1EF04107000
trusted library allocation
page read and write
1D820000
heap
page read and write
1D7FB000
heap
page read and write
4761000
heap
page read and write
1762D99C000
heap
page read and write
288238AD000
trusted library allocation
page read and write
DA4000
heap
page read and write
1762DA31000
heap
page read and write
1EF05003000
trusted library allocation
page read and write
EFE000
heap
page read and write
1762C9B0000
heap
page read and write
1F10003F000
trusted library allocation
page read and write
28824940000
trusted library section
page read and write
1EEFAED1000
trusted library allocation
page read and write
1EEF90FB000
trusted library allocation
page read and write
CF37FFD000
stack
page read and write
470000
unkown
page readonly
1EEEA794000
trusted library allocation
page read and write
3FFE000
stack
page read and write
2882E1D8000
trusted library allocation
page read and write
13E4000
heap
page read and write
28823365000
trusted library allocation
page read and write
1EEF9546000
trusted library allocation
page read and write
5490000
direct allocation
page execute and read and write
2882B391000
trusted library allocation
page read and write
1EEFED04000
trusted library allocation
page read and write
1EF01EF9000
trusted library allocation
page read and write
48AE000
stack
page read and write
2882452A000
trusted library allocation
page read and write
1EEFB3E5000
trusted library allocation
page read and write
28826AA9000
trusted library allocation
page read and write
1EEFB37B000
trusted library allocation
page read and write
53BD000
stack
page read and write
B4AB433000
stack
page read and write
53C000
unkown
page read and write
2882E0D4000
trusted library allocation
page read and write
1EEF9817000
trusted library allocation
page read and write
2882E163000
trusted library allocation
page read and write
28824A27000
trusted library allocation
page read and write
1762CD48000
trusted library allocation
page read and write
28814EED000
heap
page read and write
4D31000
heap
page read and write
2882DF96000
trusted library allocation
page read and write
4830000
direct allocation
page read and write
1EEFC5FA000
trusted library allocation
page read and write
1D833000
heap
page read and write
34DE000
stack
page read and write
4ECE000
stack
page read and write
288231AE000
trusted library allocation
page read and write
E70000
direct allocation
page read and write
28825105000
trusted library allocation
page read and write
2881C31D000
heap
page read and write
4F35000
trusted library allocation
page read and write
28826B00000
trusted library allocation
page read and write
28825DE3000
trusted library allocation
page read and write
3BDE000
stack
page read and write
1EF05000000
trusted library allocation
page read and write
4841000
heap
page read and write
1EF01D00000
trusted library allocation
page read and write
1762DA84000
heap
page read and write
1EEEA7D7000
trusted library allocation
page read and write
7C4000
heap
page read and write
2881C322000
heap
page read and write
2881F3FE000
trusted library allocation
page read and write
2882E1A8000
trusted library allocation
page read and write
1EF050A3000
trusted library allocation
page read and write
288134A5000
heap
page read and write
1EF052FE000
trusted library allocation
page read and write
319000
stack
page read and write
5B4000
heap
page read and write
2882B3D4000
trusted library allocation
page read and write
28823690000
trusted library allocation
page read and write
28825FF3000
trusted library allocation
page read and write
28823654000
trusted library allocation
page read and write
28823133000
trusted library allocation
page read and write
EE9000
unkown
page write copy
1EEFD5EF000
trusted library allocation
page read and write
2882B6E3000
trusted library allocation
page read and write
1EEFBF03000
trusted library allocation
page read and write
4841000
heap
page read and write
52DB000
stack
page read and write
A3B000
unkown
page execute and write copy
4841000
heap
page read and write
2882D1AB000
trusted library allocation
page read and write
2881C305000
heap
page read and write
EEA000
heap
page read and write
52C000
stack
page read and write
7C4000
heap
page read and write
9EC000
unkown
page execute and write copy
1EEF9F27000
trusted library allocation
page read and write
1EF05043000
trusted library allocation
page read and write
1EEF78F2000
trusted library allocation
page read and write
1EF050B6000
trusted library allocation
page read and write
3B7745424000
trusted library allocation
page read and write
1EEFB4FC000
trusted library allocation
page read and write
1EEF6920000
trusted library section
page readonly
1EF0551B000
trusted library allocation
page read and write
2882D1E7000
trusted library allocation
page read and write
9E8000
unkown
page execute and write copy
470000
unkown
page readonly
1EF05075000
trusted library allocation
page read and write
4E11000
heap
page read and write
4D31000
heap
page read and write
28825FCA000
trusted library allocation
page read and write
2882E1AB000
trusted library allocation
page read and write
1EF042E7000
trusted library allocation
page read and write
14C5000
heap
page read and write
2882BA9D000
trusted library allocation
page read and write
49EE000
stack
page read and write
1EEFB503000
trusted library allocation
page read and write
1EEFB3CF000
trusted library allocation
page read and write
1EEF64BF000
trusted library allocation
page read and write
ACD000
unkown
page execute and write copy
1EF02222000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
2881C327000
heap
page read and write
65EF0E1000
trusted library allocation
page execute read
4D31000
heap
page read and write
1EEFCA00000
trusted library allocation
page read and write
2882D119000
trusted library allocation
page read and write
2881C315000
heap
page read and write
2A9F000
stack
page read and write
2882367E000
trusted library allocation
page read and write
1EF039E8000
trusted library allocation
page read and write
2882B7C3000
trusted library allocation
page read and write
4C51000
heap
page read and write
3050000
direct allocation
page read and write
1EEF789B000
trusted library allocation
page read and write
1524000
heap
page read and write
E70000
direct allocation
page read and write
1762DA6A000
heap
page read and write
288236A0000
trusted library allocation
page read and write
52EF000
stack
page read and write
4841000
heap
page read and write
37CE000
stack
page read and write
B4A9BFF000
stack
page read and write
4CA1000
direct allocation
page read and write
2881EFEC000
trusted library allocation
page read and write
DD0000
heap
page read and write
1D815000
heap
page read and write
288252A5000
trusted library allocation
page read and write
2882458F000
trusted library allocation
page read and write
2882368B000
trusted library allocation
page read and write
55AD000
stack
page read and write
EB0000
direct allocation
page read and write
1EEFC400000
trusted library allocation
page read and write
28822D0E000
trusted library allocation
page read and write
1D805000
heap
page read and write
1EF02230000
trusted library allocation
page read and write
1762DA3D000
heap
page read and write
148B000
heap
page read and write
1EF0239A000
trusted library allocation
page read and write
2881C327000
heap
page read and write
1D9E4000
heap
page read and write
1EF044D8000
trusted library allocation
page read and write
2882B00A000
trusted library allocation
page read and write
1EF0449C000
trusted library allocation
page read and write
DE8000
heap
page read and write
554E000
trusted library allocation
page read and write
1EF0218B000
trusted library allocation
page read and write
1EEF9FDA000
trusted library allocation
page read and write
288206FC000
trusted library allocation
page read and write
51EB000
stack
page read and write
288231B1000
trusted library allocation
page read and write
1EF050B3000
trusted library allocation
page read and write
28820A80000
trusted library section
page readonly
4C2C000
stack
page read and write
1EEFC4CE000
trusted library allocation
page read and write
1EEFB4CF000
trusted library allocation
page read and write
1EF0228E000
trusted library allocation
page read and write
1762DAAC000
heap
page read and write
2882B184000
trusted library allocation
page read and write
2882E07A000
trusted library allocation
page read and write
3ABF000
stack
page read and write
4761000
heap
page read and write
2881F803000
trusted library allocation
page read and write
B4AD93E000
stack
page read and write
1762D9E8000
heap
page read and write
1EEFA9C3000
trusted library allocation
page read and write
1762CD5C000
trusted library allocation
page read and write
1D820000
heap
page read and write
4761000
heap
page read and write
1EEFBCD5000
trusted library allocation
page read and write
2881C2FF000
heap
page read and write
2E193A004000
trusted library allocation
page read and write
1EEFC982000
trusted library allocation
page read and write
1524000
heap
page read and write
2882D198000
trusted library allocation
page read and write
2882601C000
trusted library allocation
page read and write
1EEF60A9000
trusted library allocation
page read and write
1EF04105000
trusted library allocation
page read and write
2EFE000
stack
page read and write
42BF000
stack
page read and write
288231CE000
trusted library allocation
page read and write
28826C49000
trusted library allocation
page read and write
1EEF8FAA000
trusted library allocation
page read and write
42C1000
heap
page read and write
28823414000
trusted library allocation
page read and write
2882367E000
trusted library allocation
page read and write
263447A0000
remote allocation
page read and write
1EEF78C6000
trusted library allocation
page read and write
939D3E1000
trusted library allocation
page execute read
3BEE000
stack
page read and write
1EEFB7FC000
trusted library allocation
page read and write
239C1000
heap
page read and write
1EF0279A000
trusted library allocation
page read and write
964000
heap
page read and write
AC4000
unkown
page execute and write copy
28822B1A000
trusted library allocation
page read and write
1EEFC450000
trusted library allocation
page read and write
2882B43A000
trusted library allocation
page read and write
13E4000
heap
page read and write
1EEF5C98000
trusted library allocation
page read and write
2881C324000
heap
page read and write
28825208000
trusted library allocation
page read and write
EAC000
unkown
page execute and read and write
1EF052C5000
trusted library allocation
page read and write
2881C307000
heap
page read and write
288237A2000
trusted library allocation
page read and write
42C0000
heap
page read and write
1EF04300000
trusted library allocation
page read and write
F05000
heap
page read and write
288231BE000
trusted library allocation
page read and write
1EEF9B00000
trusted library allocation
page read and write
B4A9B6E000
stack
page read and write
61EB7000
direct allocation
page readonly
28824566000
trusted library allocation
page read and write
234190F04000
trusted library allocation
page read and write
1EEFD810000
trusted library section
page read and write
BD837FE000
unkown
page readonly
14D5000
heap
page read and write
1D820000
heap
page read and write
830000
unkown
page execute and read and write
2882367E000
trusted library allocation
page read and write
28823786000
trusted library allocation
page read and write
2882D1E9000
trusted library allocation
page read and write
1D817000
heap
page read and write
2881C324000
heap
page read and write
28824AC2000
trusted library allocation
page read and write
184E000
stack
page read and write
1EEFC1E6000
trusted library allocation
page read and write
28824A85000
trusted library allocation
page read and write
1EF024F4000
trusted library allocation
page read and write
2881C359000
heap
page read and write
930000
heap
page read and write
2881C32E000
heap
page read and write
3FDF000
stack
page read and write
1EEFA433000
trusted library allocation
page read and write
1B90E000
stack
page read and write
28822B03000
trusted library allocation
page read and write
3EDE000
stack
page read and write
F95000
heap
page read and write
7EE000
stack
page read and write
4830000
direct allocation
page read and write
1EEF9EF7000
trusted library allocation
page read and write
5330000
direct allocation
page execute and read and write
1EEF6500000
trusted library allocation
page read and write
2881F426000
trusted library allocation
page read and write
288214A2000
trusted library allocation
page read and write
13E4000
heap
page read and write
48C0000
trusted library allocation
page read and write
1EF052D9000
trusted library allocation
page read and write
DA4000
heap
page read and write
4C61000
heap
page read and write
2882E1D4000
trusted library allocation
page read and write
1EF022EE000
trusted library allocation
page read and write
1EF051A5000
trusted library allocation
page read and write
1EF05242000
trusted library allocation
page read and write
1EEFC156000
trusted library allocation
page read and write
2882E20B000
trusted library allocation
page read and write
BD82FFE000
stack
page read and write
1EEF9DF1000
trusted library allocation
page read and write
65EF041000
trusted library allocation
page execute read
95E000
stack
page read and write
2882E1AB000
trusted library allocation
page read and write
1EF0500A000
trusted library allocation
page read and write
1EEF8E8F000
trusted library allocation
page read and write
28A000
unkown
page read and write
2881C316000
heap
page read and write
DA4000
heap
page read and write
1EEFB721000
trusted library allocation
page read and write
332E000
stack
page read and write
1EEF9218000
trusted library allocation
page read and write
28824A8F000
trusted library allocation
page read and write
2882DF9A000
trusted library allocation
page read and write
1EF05234000
trusted library allocation
page read and write
E80000
unkown
page read and write
2882344F000
trusted library allocation
page read and write
FAF000
heap
page read and write
1EEFB4BC000
trusted library allocation
page read and write
1EF023ED000
trusted library allocation
page read and write
28825FF0000
trusted library allocation
page read and write
1EF052D4000
trusted library allocation
page read and write
1EEF60BA000
trusted library allocation
page read and write
1F6B7920000
unclassified section
page read and write
1EEF5E18000
trusted library allocation
page read and write
2882B450000
trusted library allocation
page read and write
1EEF5C81000
trusted library allocation
page read and write
44AF000
stack
page read and write
1EEEA350000
unclassified section
page readonly
4D31000
heap
page read and write
1C87FF000
stack
page read and write
303E000
stack
page read and write
EB0000
direct allocation
page read and write
2882CA00000
trusted library allocation
page read and write
1EEFBA20000
trusted library allocation
page read and write
1EEF92DB000
trusted library allocation
page read and write
28826069000
trusted library allocation
page read and write
2882E12B000
trusted library allocation
page read and write
CF3E95B000
stack
page read and write
2882B108000
trusted library allocation
page read and write
288231A7000
trusted library allocation
page read and write
4D90000
direct allocation
page execute and read and write
2882B203000
trusted library allocation
page read and write
436E000
stack
page read and write
2882367E000
trusted library allocation
page read and write
547F000
stack
page read and write
2882B0E1000
trusted library allocation
page read and write
1EF050A5000
trusted library allocation
page read and write
2882E155000
trusted library allocation
page read and write
28820A10000
trusted library section
page readonly
1EEF5D43000
trusted library allocation
page read and write
1EEFA703000
trusted library allocation
page read and write
4E11000
heap
page read and write
A1F000
unkown
page execute and read and write
1EF052D6000
trusted library allocation
page read and write
1EEFB043000
trusted library allocation
page read and write
28823162000
trusted library allocation
page read and write
3B4000
heap
page read and write
2882E000000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EF01D8F000
trusted library allocation
page read and write
1EEFC000000
trusted library allocation
page read and write
4761000
heap
page read and write
1EEF74EA000
trusted library allocation
page read and write
1EF0415E000
trusted library allocation
page read and write
5B4000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
1D54E000
stack
page read and write
1EEF9AF8000
trusted library allocation
page read and write
2882D0C9000
trusted library allocation
page read and write
4841000
heap
page read and write
28826AAB000
trusted library allocation
page read and write
33FE000
stack
page read and write
51264A9F000
trusted library allocation
page read and write
2882B1F4000
trusted library allocation
page read and write
1EEFC2B1000
trusted library allocation
page read and write
28823370000
trusted library allocation
page read and write
5440000
direct allocation
page execute and read and write
1EF044AE000
trusted library allocation
page read and write
5730000
remote allocation
page read and write
371F000
stack
page read and write
1EEFAF1D000
trusted library allocation
page read and write
A19000
unkown
page execute and read and write
28826A1B000
trusted library allocation
page read and write
1EEF6B00000
trusted library allocation
page read and write
7D1000
unkown
page execute and read and write
1B8AE000
stack
page read and write
3D3F000
stack
page read and write
28825C93000
trusted library allocation
page read and write
4761000
heap
page read and write
1EEFCB73000
trusted library allocation
page read and write
135A000
unkown
page execute and read and write
2882E1DB000
trusted library allocation
page read and write
2881F400000
trusted library allocation
page read and write
1762CDEB000
trusted library allocation
page read and write
984000
heap
page read and write
4D31000
heap
page read and write
B4B27DC000
stack
page read and write
317E000
stack
page read and write
4FB000
stack
page read and write
1EEFB4C0000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EEFC263000
trusted library allocation
page read and write
1650000
direct allocation
page read and write
1EEFB0C1000
trusted library allocation
page read and write
4890000
direct allocation
page execute and read and write
1EEFCB83000
trusted library allocation
page read and write
939D361000
trusted library allocation
page execute read
28826CB2000
trusted library allocation
page read and write
1EEFC287000
trusted library allocation
page read and write
1EF051A1000
trusted library allocation
page read and write
2882B7FC000
trusted library allocation
page read and write
407E000
stack
page read and write
F39000
heap
page read and write
288237A2000
trusted library allocation
page read and write
1EF02264000
trusted library allocation
page read and write
1524000
heap
page read and write
95E000
stack
page read and write
CF3531E000
stack
page read and write
28825F54000
trusted library allocation
page read and write
1EEFD641000
trusted library allocation
page read and write
E81000
unkown
page execute and write copy
1EEFFE00000
trusted library allocation
page read and write
1EF01E00000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EF0223D000
trusted library allocation
page read and write
4DA0000
direct allocation
page execute and read and write
1EEFB39D000
trusted library allocation
page read and write
28825E44000
trusted library allocation
page read and write
26344D06000
trusted library allocation
page read and write
28826A00000
trusted library allocation
page read and write
8F0000
heap
page read and write
4E11000
heap
page read and write
5E000
unkown
page readonly
1EEF6100000
trusted library allocation
page read and write
CF3C4FA000
stack
page read and write
2882D198000
trusted library allocation
page read and write
10EA05DA000
heap
page read and write
28823E95000
trusted library allocation
page read and write
2660000
direct allocation
page execute and read and write
CAB000
heap
page read and write
28823698000
trusted library allocation
page read and write
288233A9000
trusted library allocation
page read and write
1EEFB4FC000
trusted library allocation
page read and write
1EF03955000
trusted library allocation
page read and write
28825FD7000
trusted library allocation
page read and write
1EEFCB6B000
trusted library allocation
page read and write
1EF02158000
trusted library allocation
page read and write
625E000
stack
page read and write
A30000
direct allocation
page read and write
2882D00C000
trusted library allocation
page read and write
1EEFABC9000
trusted library allocation
page read and write
4B0D000
stack
page read and write
1EEFA05B000
trusted library allocation
page read and write
B4B2DAE000
stack
page read and write
1EEF9017000
trusted library allocation
page read and write
28824E0A000
trusted library allocation
page read and write
1D833000
heap
page read and write
5260000
direct allocation
page execute and read and write
28822D7A000
trusted library allocation
page read and write
A75000
unkown
page execute and write copy
DDE000
heap
page read and write
1EEF5C34000
trusted library allocation
page read and write
2881F466000
trusted library allocation
page read and write
28824A03000
trusted library allocation
page read and write
28827E02000
trusted library allocation
page read and write
85AC000
stack
page read and write
4761000
heap
page read and write
135A000
unkown
page execute and read and write
BFE000
stack
page read and write
1EF05056000
trusted library allocation
page read and write
1EEFC5CF000
trusted library allocation
page read and write
1EEFB700000
trusted library allocation
page read and write
2881F4E3000
trusted library allocation
page read and write
2881F403000
trusted library allocation
page read and write
28824AB1000
trusted library allocation
page read and write
1EF053AA000
trusted library allocation
page read and write
A5A000
unkown
page execute and read and write
1EF022E2000
trusted library allocation
page read and write
28823CBE000
trusted library allocation
page read and write
2882D0FE000
trusted library allocation
page read and write
10EA2100000
heap
page read and write
2881F703000
trusted library allocation
page read and write
1EEF6600000
trusted library allocation
page read and write
1EEFD500000
trusted library allocation
page read and write
306D000
heap
page read and write
80F000
unkown
page execute and write copy
1EEFB376000
trusted library allocation
page read and write
2882B8EA000
trusted library allocation
page read and write
2882E1D4000
trusted library allocation
page read and write
1EEF9F62000
trusted library allocation
page read and write
13E4000
heap
page read and write
DA0000
heap
page read and write
830000
unkown
page execute and write copy
1EF044E9000
trusted library allocation
page read and write
5B4000
heap
page read and write
1EEFB3CF000
trusted library allocation
page read and write
2882367E000
trusted library allocation
page read and write
5B4000
heap
page read and write
3C7F000
stack
page read and write
11AE000
unkown
page execute and write copy
1EF050D3000
trusted library allocation
page read and write
459F000
stack
page read and write
2882B890000
trusted library allocation
page read and write
4C51000
heap
page read and write
392F000
stack
page read and write
28825CA2000
trusted library allocation
page read and write
1524000
heap
page read and write
1EEFCAAE000
trusted library allocation
page read and write
2882B39B000
trusted library allocation
page read and write
2F60000
heap
page read and write
1F6B7D14000
trusted library allocation
page read and write
2882802A000
trusted library allocation
page read and write
28823684000
trusted library allocation
page read and write
50C000
unkown
page readonly
4E40000
direct allocation
page execute and read and write
4761000
heap
page read and write
1EEF8F9A000
trusted library allocation
page read and write
468F000
stack
page read and write
1762DA6D000
heap
page read and write
1EEF601B000
trusted library allocation
page read and write
28828028000
trusted library allocation
page read and write
1EEFCBD8000
trusted library allocation
page read and write
288260F7000
trusted library allocation
page read and write
28823884000
trusted library allocation
page read and write
1762CBF4000
unkown
page execute read
1EEF99B2000
trusted library allocation
page read and write
4841000
heap
page read and write
577D000
stack
page read and write
4D31000
heap
page read and write
4761000
heap
page read and write
1762DA3D000
heap
page read and write
28822D28000
trusted library allocation
page read and write
B5C69D8000
stack
page read and write
28823786000
trusted library allocation
page read and write
2882D120000
trusted library allocation
page read and write
1EEFB485000
trusted library allocation
page read and write
1762D280000
heap
page read and write
1EF0226C000
trusted library allocation
page read and write
4D40000
direct allocation
page execute and read and write
1EEF5E1A000
trusted library allocation
page read and write
2882D8C0000
trusted library allocation
page read and write
1EEFED10000
trusted library allocation
page read and write
1EEF99E7000
trusted library allocation
page read and write
1EEFB39B000
trusted library allocation
page read and write
28828004000
trusted library allocation
page read and write
28825FE6000
trusted library allocation
page read and write
1762D9A3000
heap
page read and write
964000
heap
page read and write
47CF000
stack
page read and write
1EF0403C000
trusted library allocation
page read and write
263449A2000
unclassified section
page read and write
1EEF790F000
trusted library allocation
page read and write
B74AA404000
trusted library allocation
page read and write
2882DFA6000
trusted library allocation
page read and write
28825D85000
trusted library allocation
page read and write
4761000
heap
page read and write
2882D0A9000
trusted library allocation
page read and write
1EF052A3000
trusted library allocation
page read and write
288237CB000
trusted library allocation
page read and write
4761000
heap
page read and write
288132A0000
unclassified section
page readonly
4D70000
direct allocation
page execute and read and write
28821324000
trusted library allocation
page read and write
4C7E000
stack
page read and write
2882131E000
trusted library allocation
page read and write
1EF054AD000
trusted library allocation
page read and write
1EEFB3EF000
trusted library allocation
page read and write
28825F86000
trusted library allocation
page read and write
5BFF000
stack
page read and write
31FF000
stack
page read and write
288260F7000
trusted library allocation
page read and write
1EEFB028000
trusted library allocation
page read and write
3FAE000
stack
page read and write
288235D7000
trusted library allocation
page read and write
1EEF5E90000
trusted library allocation
page read and write
288236CE000
trusted library allocation
page read and write
26344B17000
trusted library allocation
page read and write
28823AF0000
trusted library section
page read and write
1EEFA7FB000
trusted library allocation
page read and write
1D82C000
heap
page read and write
28824950000
trusted library section
page read and write
1EEFA7A7000
trusted library allocation
page read and write
2882D1A2000
trusted library allocation
page read and write
1EEF992A000
trusted library allocation
page read and write
1EEFC97A000
trusted library allocation
page read and write
28822D1F000
trusted library allocation
page read and write
4CD0000
direct allocation
page read and write
2882CA32000
trusted library allocation
page read and write
35EE000
stack
page read and write
7C6000
unkown
page execute and read and write
4830000
direct allocation
page read and write
2882D1C6000
trusted library allocation
page read and write
1EF01F03000
trusted library allocation
page read and write
2881C335000
heap
page read and write
314F000
stack
page read and write
9C0000
unkown
page execute and read and write
8F2000
unkown
page execute and read and write
D67000
heap
page read and write
2882E13C000
trusted library allocation
page read and write
1EEFA603000
trusted library allocation
page read and write
2882B177000
trusted library allocation
page read and write
1EEFA3A5000
trusted library allocation
page read and write
1EEFBA63000
trusted library allocation
page read and write
28826091000
trusted library allocation
page read and write
2882E200000
trusted library allocation
page read and write
1EEFA772000
trusted library allocation
page read and write
32EF000
stack
page read and write
2882DF1F000
trusted library allocation
page read and write
4D31000
heap
page read and write
1524000
heap
page read and write
2882BA93000
trusted library allocation
page read and write
5510000
direct allocation
page execute and read and write
1EEFA56B000
trusted library allocation
page read and write
28822D53000
trusted library allocation
page read and write
CF3DFDD000
stack
page read and write
1EEFD892000
unclassified section
page read and write
28826C00000
trusted library allocation
page read and write
1EEFB478000
trusted library allocation
page read and write
1F6B7BF4000
heap
page read and write
1762CD15000
trusted library allocation
page read and write
4DF0000
direct allocation
page execute and read and write
299D1000
heap
page read and write
1EEFA93B000
trusted library allocation
page read and write
10EA05CE000
heap
page read and write
2881ED9E000
trusted library allocation
page read and write
288238D1000
trusted library allocation
page read and write
5B4000
heap
page read and write
1F6B7D38000
trusted library allocation
page read and write
472E000
stack
page read and write
1EEFA50B000
trusted library allocation
page read and write
288237A2000
trusted library allocation
page read and write
CF3667B000
stack
page read and write
28823786000
trusted library allocation
page read and write
1EF050C0000
trusted library allocation
page read and write
14DA000
heap
page read and write
13E4000
heap
page read and write
288236CE000
trusted library allocation
page read and write
1D836000
heap
page read and write
1762CBE0000
trusted library allocation
page read and write
B4A9BAB000
stack
page read and write
CF36A73000
stack
page read and write
4841000
heap
page read and write
FCE000
stack
page read and write
1EEFB4CF000
trusted library allocation
page read and write
4940000
trusted library allocation
page read and write
1762DAB7000
heap
page read and write
FD8000
heap
page read and write
1EEFCA4F000
trusted library allocation
page read and write
28825200000
trusted library allocation
page read and write
1EEF6499000
trusted library allocation
page read and write
1EEF9B58000
trusted library allocation
page read and write
28824203000
trusted library allocation
page read and write
473F000
stack
page read and write
2882B360000
trusted library allocation
page read and write
65EF0C1000
trusted library allocation
page execute read
1EEFB0D9000
trusted library allocation
page read and write
3D5F000
stack
page read and write
40EE000
stack
page read and write
2CDF000
stack
page read and write
28823361000
trusted library allocation
page read and write
1EEFB37B000
trusted library allocation
page read and write
1EF020A9000
trusted library allocation
page read and write
1F6B7BF0000
heap
page read and write
28824A29000
trusted library allocation
page read and write
28820C09000
trusted library allocation
page read and write
D11000
unkown
page execute and read and write
288231BE000
trusted library allocation
page read and write
FC2000
heap
page read and write
2881365D000
trusted library allocation
page read and write
38FE000
stack
page read and write
477E000
stack
page read and write
F39000
heap
page read and write
2882B6B3000
trusted library allocation
page read and write
28826A14000
trusted library allocation
page read and write
1290000
heap
page read and write
288242ED000
trusted library allocation
page read and write
1EF0410F000
trusted library allocation
page read and write
28823C2B000
trusted library allocation
page read and write
1762D371000
unkown
page execute read
2882E029000
trusted library allocation
page read and write
29FE000
stack
page read and write
288238BB000
trusted library allocation
page read and write
2882D860000
trusted library allocation
page read and write
DCD000
heap
page read and write
3581000
heap
page read and write
B4B2A1B000
stack
page read and write
4761000
heap
page read and write
1EEFB33C000
trusted library allocation
page read and write
FD8000
heap
page read and write
28823786000
trusted library allocation
page read and write
2882457D000
trusted library allocation
page read and write
1EF050D3000
trusted library allocation
page read and write
1EEFA15D000
heap
page read and write
DC2000
heap
page read and write
DA4000
heap
page read and write
1EEFB341000
trusted library allocation
page read and write
4830000
direct allocation
page read and write
2881C314000
heap
page read and write
1EF03735000
trusted library allocation
page read and write
4620000
heap
page read and write
1D81C000
heap
page read and write
1EEFCA41000
trusted library allocation
page read and write
29C000
unkown
page readonly
28824A97000
trusted library allocation
page read and write
3B1E000
stack
page read and write
13E4000
heap
page read and write
1EEEA2E0000
unclassified section
page readonly
1EEFA114000
heap
page read and write
28825B00000
trusted library allocation
page read and write
B4AD13F000
stack
page read and write
13E5000
heap
page read and write
2881EE68000
trusted library allocation
page read and write
48A0000
direct allocation
page execute and read and write
28824609000
trusted library allocation
page read and write
1EF03A29000
trusted library allocation
page read and write
15D4000
heap
page read and write
28825F8A000
trusted library allocation
page read and write
99A000
heap
page read and write
1EF02473000
trusted library allocation
page read and write
2881EE49000
trusted library allocation
page read and write
2882E1ED000
trusted library allocation
page read and write
28825F88000
trusted library allocation
page read and write
1EEFC58D000
trusted library allocation
page read and write
2881EE72000
trusted library allocation
page read and write
B4AADFE000
stack
page read and write
1D4FF000
stack
page read and write
1EEF669A000
trusted library allocation
page read and write
28825D74000
trusted library allocation
page read and write
2882B103000
trusted library allocation
page read and write
288260CC000
trusted library allocation
page read and write
28825E6F000
trusted library allocation
page read and write
1EF01FE9000
trusted library allocation
page read and write
4761000
heap
page read and write
2881C329000
heap
page read and write
1EEFA7FE000
trusted library allocation
page read and write
2882B12D000
trusted library allocation
page read and write
2882D1AB000
trusted library allocation
page read and write
2882E090000
trusted library allocation
page read and write
1EEFB341000
trusted library allocation
page read and write
1EEFD527000
trusted library allocation
page read and write
4E20000
direct allocation
page execute and read and write
1762D9E1000
heap
page read and write
D1A000
heap
page read and write
1EEF65F5000
trusted library allocation
page read and write
1EEF9F6F000
trusted library allocation
page read and write
1EEEA4F0000
trusted library allocation
page read and write
1EEF9F03000
trusted library allocation
page read and write
3581000
heap
page read and write
1762D9AC000
heap
page read and write
9D1000
unkown
page execute and write copy
1762D260000
heap
page read and write
1EF022C9000
trusted library allocation
page read and write
1EF0442F000
trusted library allocation
page read and write
6CB1F000
unkown
page write copy
1EEFD9D2000
trusted library allocation
page read and write
2881C305000
heap
page read and write
26344D18000
trusted library allocation
page read and write
1EEF951E000
trusted library allocation
page read and write
1AC3E000
stack
page read and write
28825C80000
trusted library allocation
page read and write
12316BF00000
trusted library allocation
page read and write
2882E194000
trusted library allocation
page read and write
1EEFBE03000
trusted library allocation
page read and write
1EF03A00000
trusted library allocation
page read and write
288238AB000
trusted library allocation
page read and write
2881C30D000
heap
page read and write
1EEFBABD000
trusted library allocation
page read and write
1762D9CA000
heap
page read and write
1EEF7CE8000
trusted library allocation
page read and write
810000
unkown
page readonly
325E000
stack
page read and write
1EEFAA62000
trusted library allocation
page read and write
BDFF9D8000
stack
page read and write
54F0000
direct allocation
page execute and read and write
1EEFA800000
trusted library allocation
page read and write
32BE000
stack
page read and write
CF3F81C000
stack
page read and write
1EEFB482000
trusted library allocation
page read and write
2881F7BF000
trusted library allocation
page read and write
47C0000
heap
page read and write
288231C7000
trusted library allocation
page read and write
1EEF7890000
trusted library allocation
page read and write
1D820000
heap
page read and write
42BF000
stack
page read and write
2882375D000
trusted library allocation
page read and write
1EEF9676000
trusted library allocation
page read and write
FCC000
heap
page read and write
B5C92FE000
unkown
page readonly
E4E000
stack
page read and write
28826C89000
trusted library allocation
page read and write
2882B362000
trusted library allocation
page read and write
2882B6E7000
trusted library allocation
page read and write
2882D156000
trusted library allocation
page read and write
4EEE000
stack
page read and write
7C4000
heap
page read and write
1EF041CA000
trusted library allocation
page read and write
3B0000
heap
page read and write
9BC000
unkown
page execute and write copy
1EEF6026000
trusted library allocation
page read and write
1EEF7B08000
trusted library allocation
page read and write
7C4000
heap
page read and write
28824A63000
trusted library allocation
page read and write
2882B3CE000
trusted library allocation
page read and write
4841000
heap
page read and write
2882B170000
trusted library allocation
page read and write
6EC000
stack
page read and write
2882DF50000
trusted library allocation
page read and write
2882526E000
trusted library allocation
page read and write
1524000
heap
page read and write
2882379C000
trusted library allocation
page read and write
1D21F000
stack
page read and write
2882E2AC000
trusted library allocation
page read and write
CF3CAFD000
stack
page read and write
1EEF788A000
trusted library allocation
page read and write
1D83B000
heap
page read and write
7B0000
direct allocation
page read and write
1EEF9FE5000
trusted library allocation
page read and write
1EF02217000
trusted library allocation
page read and write
313F000
stack
page read and write
EE9000
unkown
page write copy
12F9000
stack
page read and write
2A6F000
stack
page read and write
FDC000
heap
page read and write
28822B33000
trusted library allocation
page read and write
DA4000
heap
page read and write
28824467000
trusted library allocation
page read and write
30A0000
direct allocation
page read and write
1EEF74CD000
trusted library allocation
page read and write
1EEFB007000
trusted library allocation
page read and write
2882B0C0000
trusted library allocation
page read and write
1762D9A0000
heap
page read and write
1EEEA6F5000
heap
page read and write
490F000
stack
page read and write
18163AD0000
heap
page read and write
28823200000
trusted library allocation
page read and write
2882B399000
trusted library allocation
page read and write
9FE000
unkown
page execute and read and write
1EEFABCC000
trusted library allocation
page read and write
1DE6AD404000
trusted library allocation
page read and write
1762CD12000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
1EF01F27000
trusted library allocation
page read and write
1EEFB95B000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
1EEF7C63000
trusted library allocation
page read and write
288236C9000
trusted library allocation
page read and write
1EEFBA8F000
trusted library allocation
page read and write
1762DAAC000
heap
page read and write
4A60000
heap
page read and write
B5C5FCE000
unkown
page readonly
5B4000
heap
page read and write
2882E1B7000
trusted library allocation
page read and write
1762CD75000
trusted library allocation
page read and write
363F000
stack
page read and write
1762D360000
trusted library allocation
page read and write
28826B03000
trusted library allocation
page read and write
2882B132000
trusted library allocation
page read and write
587E000
stack
page read and write
1EEF78DA000
trusted library allocation
page read and write
28824A27000
trusted library allocation
page read and write
E70000
direct allocation
page read and write
1EEFB39D000
trusted library allocation
page read and write
1762DA29000
heap
page read and write
1EEF9FF1000
trusted library allocation
page read and write
1F6B7C00000
trusted library allocation
page read and write
4D31000
heap
page read and write
4C7E000
stack
page read and write
1EEFBA03000
trusted library allocation
page read and write
28824AB6000
trusted library allocation
page read and write
1EEFA77C000
trusted library allocation
page read and write
1EEF9D2B000
trusted library allocation
page read and write
9AA000
unkown
page execute and read and write
1524000
heap
page read and write
3A3E000
stack
page read and write
4E0F000
stack
page read and write
4A8E000
stack
page read and write
2881C335000
heap
page read and write
2882E1A8000
trusted library allocation
page read and write
4E11000
heap
page read and write
2882B3F0000
trusted library allocation
page read and write
1EF02477000
trusted library allocation
page read and write
1EF0508E000
trusted library allocation
page read and write
1EF02090000
trusted library allocation
page read and write
1762DA62000
heap
page read and write
5CFE000
stack
page read and write
1EEF644C000
trusted library allocation
page read and write
2882E0FD000
trusted library allocation
page read and write
7FC4000
heap
page read and write
4E1F000
trusted library allocation
page read and write
288205E2000
trusted library allocation
page read and write
A13000
unkown
page execute and write copy
28824B24000
trusted library allocation
page read and write
28813230000
unclassified section
page readonly
2882379C000
trusted library allocation
page read and write
28824A29000
trusted library allocation
page read and write
1EEF74E3000
trusted library allocation
page read and write
1EF01E4B000
trusted library allocation
page read and write
28820B00000
trusted library allocation
page read and write
1EEFA5C2000
trusted library allocation
page read and write
1EEFCB8B000
trusted library allocation
page read and write
1EF02387000
trusted library allocation
page read and write
1EF051FC000
trusted library allocation
page read and write
1EEF6082000
trusted library allocation
page read and write
295F000
stack
page read and write
B4AB4BD000
stack
page read and write
5B4000
heap
page read and write
4E11000
heap
page read and write
2882E143000
trusted library allocation
page read and write
1EEF7890000
trusted library allocation
page read and write
1EEFA9DC000
trusted library allocation
page read and write
14FE000
stack
page read and write
1EEFCA17000
trusted library allocation
page read and write
3C3E000
stack
page read and write
288231C7000
trusted library allocation
page read and write
7D0000
heap
page read and write
1EEFC8A4000
trusted library allocation
page read and write
7C4000
heap
page read and write
133E000
stack
page read and write
2882382C000
trusted library allocation
page read and write
ADB000
unkown
page execute and read and write
1EEFB9B3000
trusted library allocation
page read and write
2882B0CA000
trusted library allocation
page read and write
1EF05253000
trusted library allocation
page read and write
4C50000
direct allocation
page execute and read and write
1EEF7C03000
trusted library allocation
page read and write
1EEF9800000
trusted library allocation
page read and write
1EEFB49C000
trusted library allocation
page read and write
984000
heap
page read and write
28823650000
trusted library allocation
page read and write
2882369B000
trusted library allocation
page read and write
1EEFD5AA000
trusted library allocation
page read and write
1EEF99E0000
trusted library allocation
page read and write
2882335E000
trusted library allocation
page read and write
A27000
unkown
page execute and read and write
35FE000
stack
page read and write
1EF020E0000
trusted library allocation
page read and write
470000
unkown
page readonly
1EF05085000
trusted library allocation
page read and write
1EEF7700000
trusted library allocation
page read and write
4C51000
heap
page read and write
2882B791000
trusted library allocation
page read and write
369F000
stack
page read and write
1C5FFF000
stack
page read and write
1EF042DE000
trusted library allocation
page read and write
B4B2E1E000
stack
page read and write
B4B173D000
stack
page read and write
26344B12000
trusted library allocation
page read and write
1EEFC803000
trusted library allocation
page read and write
2882369A000
trusted library allocation
page read and write
288231E2000
trusted library allocation
page read and write
1EEFB052000
trusted library allocation
page read and write
2882369B000
trusted library allocation
page read and write
A77000
unkown
page execute and read and write
1EEF7AF2000
trusted library allocation
page read and write
4761000
heap
page read and write
10EA1FB3000
heap
page read and write
A40000
heap
page read and write
13E4000
heap
page read and write
1EEF7ABB000
trusted library allocation
page read and write
1EEFB391000
trusted library allocation
page read and write
1EEFB3CB000
trusted library allocation
page read and write
3A81000
heap
page read and write
CF3BAFB000
stack
page read and write
4841000
heap
page read and write
143E000
heap
page read and write
1EEF6669000
trusted library allocation
page read and write
1EEF5CC3000
trusted library allocation
page read and write
2882379C000
trusted library allocation
page read and write
1EEF9FD9000
trusted library allocation
page read and write
2882B810000
trusted library allocation
page read and write
9A3000
heap
page read and write
399F000
stack
page read and write
1EEFC516000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EF0214C000
trusted library allocation
page read and write
1EEF740F000
trusted library allocation
page read and write
5B4000
heap
page read and write
4E11000
heap
page read and write
1762DA32000
heap
page read and write
1D82D000
heap
page read and write
1EF04327000
trusted library allocation
page read and write
2882606D000
trusted library allocation
page read and write
408E000
stack
page read and write
2882E0D7000
trusted library allocation
page read and write
32BE000
stack
page read and write
7BE000
stack
page read and write
3D2F000
stack
page read and write
4FEF000
stack
page read and write
1EEFB3A7000
trusted library allocation
page read and write
1B5BD2B0000
heap
page read and write
1EEF7909000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
4D31000
heap
page read and write
1EF01DFC000
trusted library allocation
page read and write
1EF02471000
trusted library allocation
page read and write
1EEF5D9D000
trusted library allocation
page read and write
1EEFB380000
trusted library allocation
page read and write
7B0000
direct allocation
page read and write
1EEFB3CF000
trusted library allocation
page read and write
A1A000
unkown
page execute and write copy
288260B2000
trusted library allocation
page read and write
1EEEA747000
trusted library allocation
page read and write
1EEFB37B000
trusted library allocation
page read and write
4761000
heap
page read and write
1EEFA9D7000
trusted library allocation
page read and write
1295000
heap
page read and write
4E11000
heap
page read and write
3B4000
heap
page read and write
1EEFBFEE000
trusted library allocation
page read and write
463E000
stack
page read and write
539D000
stack
page read and write
45FE000
stack
page read and write
1EEF65A6000
trusted library allocation
page read and write
1EEFD509000
trusted library allocation
page read and write
1762DA20000
heap
page read and write
FF0000
direct allocation
page read and write
2882E163000
trusted library allocation
page read and write
2881C305000
heap
page read and write
117F000
heap
page read and write
A30000
direct allocation
page read and write
385927B000
stack
page read and write
1EF0507B000
trusted library allocation
page read and write
4E11000
heap
page read and write
28823690000
trusted library allocation
page read and write
9E7000
heap
page read and write
288231BE000
trusted library allocation
page read and write
12316BF80000
trusted library allocation
page read and write
1EEFC26C000
trusted library allocation
page read and write
1EF039EE000
trusted library allocation
page read and write
28823FE4000
trusted library allocation
page read and write
1EEF78F6000
trusted library allocation
page read and write
1762DAB7000
heap
page read and write
4841000
heap
page read and write
52A0000
direct allocation
page read and write
15D4000
heap
page read and write
1EF01FB0000
trusted library allocation
page read and write
7FC0000
heap
page read and write
10EA05B0000
heap
page read and write
28822D12000
trusted library allocation
page read and write
1EEFBA8C000
trusted library allocation
page read and write
28823392000
trusted library allocation
page read and write
4630000
heap
page read and write
1762DA20000
heap
page read and write
1EF020A1000
trusted library allocation
page read and write
263447C0000
unclassified section
page readonly
2882DFC9000
trusted library allocation
page read and write
28825B63000
trusted library allocation
page read and write
2882E161000
trusted library allocation
page read and write
C9E000
stack
page read and write
2E3F000
stack
page read and write
1EEF5E00000
trusted library allocation
page read and write
2882B83C000
trusted library allocation
page read and write
28823658000
trusted library allocation
page read and write
1EEFB4DE000
trusted library allocation
page read and write
1EEFC9E5000
trusted library allocation
page read and write
303E000
stack
page read and write
1EEFB0FA000
trusted library allocation
page read and write
40000
unkown
page readonly
2882B800000
trusted library allocation
page read and write
1EEF5C52000
trusted library allocation
page read and write
288230C3000
trusted library allocation
page read and write
2881EFDE000
trusted library allocation
page read and write
5B4000
heap
page read and write
1762CD6B000
trusted library allocation
page read and write
1EEFAB00000
trusted library allocation
page read and write
51CE000
stack
page read and write
CE5000
heap
page read and write
1EF044E2000
trusted library allocation
page read and write
4E11000
heap
page read and write
1D73E000
stack
page read and write
38591FE000
unkown
page readonly
4621000
heap
page read and write
1EEFB391000
trusted library allocation
page read and write
CF40627000
stack
page read and write
28828012000
trusted library allocation
page read and write
1EEF9903000
trusted library allocation
page read and write
28815014000
heap
page read and write
2882B74B000
trusted library allocation
page read and write
1EF020D9000
trusted library allocation
page read and write
2882BA30000
trusted library allocation
page read and write
28825603000
trusted library allocation
page read and write
2882366A000
trusted library allocation
page read and write
1EEFBBDC000
trusted library allocation
page read and write
1EEFAC03000
trusted library allocation
page read and write
6CADF000
unkown
page readonly
1EEFBAC7000
trusted library allocation
page read and write
1EEFB343000
trusted library allocation
page read and write
28824E07000
trusted library allocation
page read and write
1EEF8E00000
trusted library allocation
page read and write
800000
unkown
page execute and read and write
1EEFC200000
trusted library allocation
page read and write
2882B8F6000
trusted library allocation
page read and write
DA4000
heap
page read and write
5230000
direct allocation
page execute and read and write
1EF022C7000
trusted library allocation
page read and write
4C51000
heap
page read and write
1EEF6A00000
trusted library allocation
page read and write
28828008000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
1EEFC29A000
trusted library allocation
page read and write
1EEF6612000
trusted library allocation
page read and write
1EEFBA53000
trusted library allocation
page read and write
1EEFAA00000
trusted library allocation
page read and write
1EEFA513000
trusted library allocation
page read and write
10EA0700000
trusted library allocation
page read and write
A30000
direct allocation
page read and write
1D83B000
heap
page read and write
3DBF000
stack
page read and write
1D818000
heap
page read and write
2CFF000
stack
page read and write
288231C9000
trusted library allocation
page read and write
1F6B7C47000
trusted library allocation
page read and write
353E000
stack
page read and write
CF377FE000
stack
page read and write
1EF02162000
trusted library allocation
page read and write
CF2000
unkown
page execute and read and write
28823373000
trusted library allocation
page read and write
2882369B000
trusted library allocation
page read and write
2882B34F000
trusted library allocation
page read and write
1EEF915C000
trusted library allocation
page read and write
2C7E000
stack
page read and write
28828000000
trusted library allocation
page read and write
4BF0000
direct allocation
page read and write
1F6B7922000
unclassified section
page read and write
6CB1E000
unkown
page read and write
4C51000
heap
page read and write
396F000
stack
page read and write
61ECD000
direct allocation
page readonly
1EF020D9000
trusted library allocation
page read and write
1EEF6082000
trusted library allocation
page read and write
1EEF60E2000
trusted library allocation
page read and write
1EEF7840000
trusted library allocation
page read and write
28825D90000
trusted library allocation
page read and write
4E11000
heap
page read and write
44FD000
stack
page read and write
2882B385000
trusted library allocation
page read and write
288213A0000
trusted library allocation
page read and write
288236CE000
trusted library allocation
page read and write
4E11000
heap
page read and write
471000
unkown
page execute read
7D0000
unkown
page read and write
DA4000
heap
page read and write
2882366A000
trusted library allocation
page read and write
1762DA98000
heap
page read and write
1F6B792F000
unclassified section
page read and write
1762DA3D000
heap
page read and write
1EEFC9DC000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EEFC615000
trusted library allocation
page read and write
3581000
heap
page read and write
188E000
stack
page read and write
1EEFB3E5000
trusted library allocation
page read and write
3A4E000
stack
page read and write
1EF03989000
trusted library allocation
page read and write
3AEE000
stack
page read and write
810000
heap
page read and write
1EEFB3A1000
trusted library allocation
page read and write
28825FF3000
trusted library allocation
page read and write
288249B0000
unclassified section
page read and write
1EF042EF000
trusted library allocation
page read and write
4C51000
heap
page read and write
1EEFBA65000
trusted library allocation
page read and write
1EEF6000000
trusted library allocation
page read and write
1EEFB4A9000
trusted library allocation
page read and write
1EF02475000
trusted library allocation
page read and write
5B4000
heap
page read and write
1EEF5CB3000
trusted library allocation
page read and write
3E9F000
stack
page read and write
1EEFB376000
trusted library allocation
page read and write
28825FFD000
trusted library allocation
page read and write
2882CA16000
trusted library allocation
page read and write
1EEFBC65000
trusted library allocation
page read and write
1EEF7AC1000
trusted library allocation
page read and write
1EEEC317000
heap
page read and write
38BF000
stack
page read and write
1EF01D65000
trusted library allocation
page read and write
1762D9CA000
heap
page read and write
2882608C000
trusted library allocation
page read and write
2882E100000
trusted library allocation
page read and write
2882BACD000
trusted library allocation
page read and write
2881EFF7000
trusted library allocation
page read and write
1EEF9158000
trusted library allocation
page read and write
1EEF6616000
trusted library allocation
page read and write
1650000
direct allocation
page read and write
1EF0397A000
trusted library allocation
page read and write
1B75D000
stack
page read and write
288249B2000
unclassified section
page read and write
1EEFD900000
trusted library allocation
page read and write
1EEEC31D000
heap
page read and write
13E4000
heap
page read and write
1EF039EC000
trusted library allocation
page read and write
1EEFB53A000
trusted library allocation
page read and write
2881C32E000
heap
page read and write
1EEF788A000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
1EF020A1000
trusted library allocation
page read and write
1F6B7A00000
trusted library allocation
page read and write
B4AF33F000
stack
page read and write
288205D7000
trusted library allocation
page read and write
288238B5000
trusted library allocation
page read and write
285E000
stack
page read and write
1EF05382000
trusted library allocation
page read and write
2882D106000
trusted library allocation
page read and write
2881EF0A000
trusted library allocation
page read and write
1EEF9F2A000
trusted library allocation
page read and write
1EEFD5D8000
trusted library allocation
page read and write
1EF023C1000
trusted library allocation
page read and write
2882DFAF000
trusted library allocation
page read and write
1762CDC7000
trusted library allocation
page read and write
5260000
direct allocation
page execute and read and write
66C000
stack
page read and write
288243DD000
trusted library allocation
page read and write
28826C8C000
trusted library allocation
page read and write
28823FF9000
trusted library allocation
page read and write
5B4000
heap
page read and write
EB0000
direct allocation
page read and write
DDE000
heap
page read and write
1EEF93F0000
trusted library allocation
page read and write
404F000
stack
page read and write
1EEF78A2000
trusted library allocation
page read and write
28822D37000
trusted library allocation
page read and write
288231A7000
trusted library allocation
page read and write
A75000
unkown
page execute and write copy
CE0000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
4841000
heap
page read and write
2882D827000
trusted library allocation
page read and write
1EEFC447000
trusted library allocation
page read and write
2881C305000
heap
page read and write
1EEFD739000
trusted library allocation
page read and write
4DC0000
direct allocation
page execute and read and write
181639D0000
heap
page read and write
26344B23000
trusted library allocation
page read and write
1EEFBCAC000
trusted library allocation
page read and write
3E6F000
stack
page read and write
1EEF8FC6000
trusted library allocation
page read and write
1443000
heap
page read and write
2882DF08000
trusted library allocation
page read and write
1EEFB31B000
trusted library allocation
page read and write
28826C23000
trusted library allocation
page read and write
1762DA6A000
heap
page read and write
1EEFD5BF000
trusted library allocation
page read and write
1EEF78DA000
trusted library allocation
page read and write
1EEFC61E000
trusted library allocation
page read and write
2882D0F1000
trusted library allocation
page read and write
2882B7BA000
trusted library allocation
page read and write
2882369B000
trusted library allocation
page read and write
1EF05286000
trusted library allocation
page read and write
2882388A000
trusted library allocation
page read and write
CF3E91C000
stack
page read and write
2A70000
heap
page read and write
1D83B000
heap
page read and write
1EF02745000
trusted library allocation
page read and write
28826A91000
trusted library allocation
page read and write
2882B78A000
trusted library allocation
page read and write
26344920000
heap
page read and write
34BE000
stack
page read and write
1EEFBFDC000
trusted library allocation
page read and write
395E000
stack
page read and write
28825DF4000
trusted library allocation
page read and write
1EF022B6000
trusted library allocation
page read and write
1443000
heap
page read and write
28825600000
trusted library allocation
page read and write
1EF023AD000
trusted library allocation
page read and write
DA4000
heap
page read and write
28826A8D000
trusted library allocation
page read and write
2882BACD000
trusted library allocation
page read and write
1762CD65000
trusted library allocation
page read and write
409F000
stack
page read and write
1EF02120000
trusted library allocation
page read and write
2882B219000
trusted library allocation
page read and write
1EEFB476000
trusted library allocation
page read and write
1EEF9D65000
trusted library allocation
page read and write
2882E02D000
trusted library allocation
page read and write
1EEFABCC000
trusted library allocation
page read and write
810000
unkown
page readonly
4830000
direct allocation
page read and write
4AB0000
direct allocation
page read and write
5A4E000
stack
page read and write
1EF02766000
trusted library allocation
page read and write
1EEFA8EC000
trusted library allocation
page read and write
9EB000
unkown
page execute and read and write
1EEF669A000
trusted library allocation
page read and write
1EEF66FD000
trusted library allocation
page read and write
1EF01E4B000
trusted library allocation
page read and write
28825DFC000
trusted library allocation
page read and write
B4B3817000
stack
page read and write
B4B2BDA000
stack
page read and write
1EEEA500000
trusted library allocation
page read and write
1EEF8F00000
trusted library allocation
page read and write
4D31000
heap
page read and write
1EEFD515000
trusted library allocation
page read and write
2881ECE5000
heap
page read and write
984000
heap
page read and write
1EEF8F27000
trusted library allocation
page read and write
2881C2FF000
heap
page read and write
1EEFAD6E000
trusted library allocation
page read and write
1EEF97F5000
trusted library allocation
page read and write
1EEFC462000
trusted library allocation
page read and write
7C4000
heap
page read and write
3F3E000
stack
page read and write
1EEFB391000
trusted library allocation
page read and write
BE0000
heap
page read and write
2881EDF9000
trusted library allocation
page read and write
1380000
heap
page read and write
386E000
stack
page read and write
1EEFC603000
trusted library allocation
page read and write
1EEF926A000
trusted library allocation
page read and write
1EEF7881000
trusted library allocation
page read and write
11A0000
unkown
page execute and read and write
CF3F1DB000
stack
page read and write
2882DF26000
trusted library allocation
page read and write
1EEF9F27000
trusted library allocation
page read and write
EB0000
direct allocation
page read and write
28822B0E000
trusted library allocation
page read and write
4D31000
heap
page read and write
28822D53000
trusted library allocation
page read and write
14CE000
heap
page read and write
1EF0271D000
trusted library allocation
page read and write
A27000
unkown
page execute and read and write
28823662000
trusted library allocation
page read and write
AC3000
unkown
page execute and write copy
CF375FF000
stack
page read and write
145E000
heap
page read and write
1EEF9503000
trusted library allocation
page read and write
1EEFAB34000
trusted library allocation
page read and write
430E000
stack
page read and write
1D836000
heap
page read and write
42C1000
heap
page read and write
1762DA6A000
heap
page read and write
D00000
trusted library allocation
page read and write
1EEFC020000
trusted library allocation
page read and write
13E4000
heap
page read and write
28823169000
trusted library allocation
page read and write
1762DA7B000
heap
page read and write
4E11000
heap
page read and write
2881F41B000
trusted library allocation
page read and write
1EEFB3CB000
trusted library allocation
page read and write
1EF01E14000
trusted library allocation
page read and write
1EEF6400000
trusted library allocation
page read and write
1762D9A0000
heap
page read and write
4AFF000
stack
page read and write
147D000
heap
page read and write
2882E155000
trusted library allocation
page read and write
2882D103000
trusted library allocation
page read and write
2882E2B2000
trusted library allocation
page read and write
1EF04400000
trusted library allocation
page read and write
4E11000
heap
page read and write
A5A000
unkown
page execute and read and write
1EF0505A000
trusted library allocation
page read and write
4AB0000
direct allocation
page read and write
383F000
stack
page read and write
FC1000
heap
page read and write
1EEFA36C000
trusted library allocation
page read and write
7D1000
unkown
page execute and write copy
28822A66000
trusted library allocation
page read and write
1EF0370E000
trusted library allocation
page read and write
3F0F000
stack
page read and write
28826A33000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EEFB0A6000
trusted library allocation
page read and write
288238DC000
trusted library allocation
page read and write
2881F7B7000
trusted library allocation
page read and write
1EEFA047000
trusted library allocation
page read and write
1EEFC8B3000
trusted library allocation
page read and write
1EEFA067000
trusted library allocation
page read and write
1EF039FC000
trusted library allocation
page read and write
1EEFA356000
trusted library allocation
page read and write
1EF0230C000
trusted library allocation
page read and write
1EF03900000
trusted library allocation
page read and write
4D90000
direct allocation
page execute and read and write
28820503000
trusted library allocation
page read and write
99D000
heap
page read and write
1EF04303000
trusted library allocation
page read and write
B4AE93E000
stack
page read and write
1F6B8140000
heap
page read and write
2882B4FC000
trusted library allocation
page read and write
28824A1A000
trusted library allocation
page read and write
1EEF9522000
trusted library allocation
page read and write
9FE000
unkown
page execute and read and write
1EEF9F35000
trusted library allocation
page read and write
4B4E000
stack
page read and write
1EEF8F1B000
trusted library allocation
page read and write
1D820000
heap
page read and write
26344D0C000
trusted library allocation
page read and write
FF0000
direct allocation
page read and write
28820580000
trusted library allocation
page read and write
105B000
stack
page read and write
1EEFD55F000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
1762DAB7000
heap
page read and write
288231A5000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EF043DF000
trusted library allocation
page read and write
11AF000
unkown
page execute and write copy
1EEF8DF0000
trusted library section
page readonly
2882E1E3000
trusted library allocation
page read and write
288244EA000
trusted library allocation
page read and write
288231C9000
trusted library allocation
page read and write
5500000
direct allocation
page execute and read and write
288236A0000
trusted library allocation
page read and write
28824A00000
trusted library allocation
page read and write
4761000
heap
page read and write
CF3A2FE000
unkown
page read and write
1EEF99BC000
trusted library allocation
page read and write
E80000
unkown
page read and write
2FBC4000
heap
page read and write
1EEFB0DB000
trusted library allocation
page read and write
122000
unkown
page read and write
2882364D000
trusted library allocation
page read and write
2882B382000
trusted library allocation
page read and write
1EEFB38A000
trusted library allocation
page read and write
CF36D3D000
stack
page read and write
3C2E000
stack
page read and write
1EEFC258000
trusted library allocation
page read and write
1EEF8E6A000
trusted library allocation
page read and write
2881C2FE000
heap
page read and write
1EEF8F6F000
trusted library allocation
page read and write
288233F4000
trusted library allocation
page read and write
1762D9A4000
heap
page read and write
1EEFA677000
trusted library allocation
page read and write
2881C315000
heap
page read and write
5B4000
heap
page read and write
CF3E01E000
stack
page read and write
2881F280000
trusted library section
page read and write
3E2F000
stack
page read and write
1EF037F1000
trusted library allocation
page read and write
4841000
heap
page read and write
1390000
heap
page read and write
5565000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
2881C2FF000
heap
page read and write
1EEF7463000
trusted library allocation
page read and write
2881C305000
heap
page read and write
D12000
unkown
page execute and write copy
1B34F000
stack
page read and write
2881F2C0000
trusted library section
page readonly
1EEF9F62000
trusted library allocation
page read and write
135C000
unkown
page execute and write copy
4E11000
heap
page read and write
1EEF5E79000
trusted library allocation
page read and write
1EF05121000
trusted library allocation
page read and write
288205A8000
trusted library allocation
page read and write
AB6000
unkown
page execute and write copy
1EF05263000
trusted library allocation
page read and write
7B0000
direct allocation
page read and write
1762D99C000
heap
page read and write
1EEFC59A000
trusted library allocation
page read and write
1EF01EF7000
trusted library allocation
page read and write
1EEF7890000
trusted library allocation
page read and write
2C3F000
stack
page read and write
D00000
trusted library allocation
page read and write
28826003000
trusted library allocation
page read and write
F39000
heap
page read and write
1EF052FE000
trusted library allocation
page read and write
1762DA98000
heap
page read and write
E70000
direct allocation
page read and write
4E10000
direct allocation
page execute and read and write
4E11000
heap
page read and write
1EEFABDF000
trusted library allocation
page read and write
288260EB000
trusted library allocation
page read and write
1F100081000
trusted library allocation
page read and write
1EEFC100000
trusted library allocation
page read and write
1EF05403000
trusted library allocation
page read and write
1EEF78DA000
trusted library allocation
page read and write
1EEFD58B000
trusted library allocation
page read and write
1D25E000
stack
page read and write
454F000
stack
page read and write
42CF000
stack
page read and write
1EF04000000
trusted library allocation
page read and write
1EEF994E000
trusted library allocation
page read and write
DA4000
heap
page read and write
2882B8F4000
trusted library allocation
page read and write
413E000
stack
page read and write
1524000
heap
page read and write
1EEFCBCE000
trusted library allocation
page read and write
1EEFAE7C000
trusted library allocation
page read and write
288231BE000
trusted library allocation
page read and write
288260C7000
trusted library allocation
page read and write
1EEF7C46000
trusted library allocation
page read and write
4841000
heap
page read and write
571E000
stack
page read and write
2882B06E000
trusted library allocation
page read and write
BD81FFE000
stack
page read and write
1EF044A1000
trusted library allocation
page read and write
1EF02343000
trusted library allocation
page read and write
1EF05101000
trusted library allocation
page read and write
2882B303000
trusted library allocation
page read and write
2E5F000
stack
page read and write
28823100000
trusted library allocation
page read and write
2882D0B4000
trusted library allocation
page read and write
496F000
stack
page read and write
7C4000
heap
page read and write
3F2979C04000
trusted library allocation
page read and write
1EEFB391000
trusted library allocation
page read and write
1EF039AE000
trusted library allocation
page read and write
10EA1FBC000
heap
page read and write
1EEFB0D6000
trusted library allocation
page read and write
288136D8000
trusted library allocation
page read and write
1EEF9ECA000
trusted library allocation
page read and write
28826079000
trusted library allocation
page read and write
1EF03700000
trusted library allocation
page read and write
1EF0526B000
trusted library allocation
page read and write
1EF053C3000
trusted library allocation
page read and write
CF4042F000
stack
page read and write
4D31000
heap
page read and write
1EEF76B5000
trusted library allocation
page read and write
1762CA3A000
heap
page read and write
1EF052C3000
trusted library allocation
page read and write
2882DF9E000
trusted library allocation
page read and write
A45000
heap
page read and write
28825AFC000
trusted library allocation
page read and write
DA4000
heap
page read and write
7B0000
direct allocation
page read and write
288231B8000
trusted library allocation
page read and write
305F000
stack
page read and write
47C1000
heap
page read and write
13E4000
heap
page read and write
2882D899000
trusted library allocation
page read and write
1EEFED12000
trusted library allocation
page read and write
4E11000
heap
page read and write
4740000
heap
page read and write
4D30000
heap
page read and write
1F6B7D17000
trusted library allocation
page read and write
288213E2000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
1EEFA469000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EEF74B1000
trusted library allocation
page read and write
1173000
heap
page read and write
1EEFBB03000
trusted library allocation
page read and write
1EEFD59B000
trusted library allocation
page read and write
1EF02173000
trusted library allocation
page read and write
1EEFD607000
trusted library allocation
page read and write
13E4000
heap
page read and write
28823C79000
trusted library allocation
page read and write
1EEFC103000
trusted library allocation
page read and write
1EF00304000
trusted library allocation
page read and write
9AA000
unkown
page execute and read and write
2882D1AB000
trusted library allocation
page read and write
2881F7F7000
trusted library allocation
page read and write
1EEFB47D000
trusted library allocation
page read and write
1EEFC9A6000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
5B4000
heap
page read and write
2882E19E000
trusted library allocation
page read and write
1EF02403000
trusted library allocation
page read and write
5B4000
heap
page read and write
1EF02118000
trusted library allocation
page read and write
1EF051A9000
trusted library allocation
page read and write
D08000
heap
page read and write
1EEFBCE3000
trusted library allocation
page read and write
7C4000
heap
page read and write
2881C30C000
heap
page read and write
46E0000
heap
page read and write
1EF02317000
trusted library allocation
page read and write
1EEFB110000
trusted library section
page readonly
1EF050D3000
trusted library allocation
page read and write
28823AC0000
trusted library section
page read and write
811000
unkown
page execute and write copy
4BCE000
stack
page read and write
2882B71D000
trusted library allocation
page read and write
4BDC000
stack
page read and write
4841000
heap
page read and write
1EEFBAD6000
trusted library allocation
page read and write
122000
unkown
page read and write
5ABE000
stack
page read and write
A47000
unkown
page execute and write copy
F6F000
heap
page read and write
48B0000
direct allocation
page execute and read and write
28826AC5000
trusted library allocation
page read and write
1762CD00000
trusted library allocation
page read and write
1EEFB3EF000
trusted library allocation
page read and write
AB6000
unkown
page execute and write copy
28825FE6000
trusted library allocation
page read and write
28823C58000
trusted library allocation
page read and write
1EEF6403000
trusted library allocation
page read and write
28826C75000
trusted library allocation
page read and write
2881ED90000
trusted library allocation
page read and write
2882BAAA000
trusted library allocation
page read and write
1EF01D70000
trusted library allocation
page read and write
83A000
unkown
page execute and write copy
2882B1DA000
trusted library allocation
page read and write
1EEFB3DB000
trusted library allocation
page read and write
1EF02381000
trusted library allocation
page read and write
1EEFB5F9000
trusted library allocation
page read and write
1EEFA15F000
heap
page read and write
1EEFAD49000
trusted library allocation
page read and write
1EF051A3000
trusted library allocation
page read and write
2882B8F8000
trusted library allocation
page read and write
2881C334000
heap
page read and write
1D82C000
heap
page read and write
1EF01EF9000
trusted library allocation
page read and write
2881C30B000
heap
page read and write
28826A9A000
trusted library allocation
page read and write
1EEF789B000
trusted library allocation
page read and write
1762DA31000
heap
page read and write
1E0000
heap
page read and write
EB0000
direct allocation
page read and write
9EC000
unkown
page execute and write copy
4EAD000
stack
page read and write
3050000
direct allocation
page read and write
B4B273E000
stack
page read and write
4C40000
direct allocation
page execute and read and write
4C50000
heap
page read and write
1EEF645C000
trusted library allocation
page read and write
28823658000
trusted library allocation
page read and write
1EEF78B0000
trusted library allocation
page read and write
4841000
heap
page read and write
2881C2FF000
heap
page read and write
1EEFB486000
trusted library allocation
page read and write
549000
unkown
page write copy
3050000
direct allocation
page read and write
4D70000
direct allocation
page execute and read and write
4E50000
direct allocation
page execute and read and write
2882E036000
trusted library allocation
page read and write
288237A2000
trusted library allocation
page read and write
2882B8F2000
trusted library allocation
page read and write
1F6B7BF6000
heap
page read and write
53C000
unkown
page write copy
28823203000
trusted library allocation
page read and write
288245E2000
trusted library allocation
page read and write
2882E263000
trusted library allocation
page read and write
1EEF9EB5000
trusted library allocation
page read and write
5064000
heap
page read and write
2F5E000
stack
page read and write
50E0000
direct allocation
page read and write
28825F94000
trusted library allocation
page read and write
28820603000
trusted library allocation
page read and write
11AF000
unkown
page execute and write copy
1EF050ED000
trusted library allocation
page read and write
1524000
heap
page read and write
1EF0203D000
trusted library allocation
page read and write
427E000
stack
page read and write
4E11000
heap
page read and write
4C2F000
stack
page read and write
1EF052DB000
trusted library allocation
page read and write
1EEFA400000
trusted library allocation
page read and write
11AE000
unkown
page execute and write copy
2882B892000
trusted library allocation
page read and write
4B8F000
stack
page read and write
471000
unkown
page execute read
26344B00000
trusted library allocation
page read and write
1EEF9E63000
trusted library allocation
page read and write
B4AB235000
stack
page read and write
432F000
stack
page read and write
2881EE86000
trusted library allocation
page read and write
1EF024D6000
trusted library allocation
page read and write
2882E1D4000
trusted library allocation
page read and write
436E000
stack
page read and write
1EF0395F000
trusted library allocation
page read and write
28825F5D000
trusted library allocation
page read and write
1EEFB39F000
trusted library allocation
page read and write
1EEFD6BE000
trusted library allocation
page read and write
CF3EB1C000
stack
page read and write
1C6FFE000
stack
page read and write
2882B78F000
trusted library allocation
page read and write
2882D12B000
trusted library allocation
page read and write
2882B153000
trusted library allocation
page read and write
1EEFB4C7000
trusted library allocation
page read and write
2882D800000
trusted library allocation
page read and write
DA4000
heap
page read and write
2882E194000
trusted library allocation
page read and write
1EEF65A1000
trusted library allocation
page read and write
1EEFA643000
trusted library allocation
page read and write
1EEFBA65000
trusted library allocation
page read and write
1EF0528B000
trusted library allocation
page read and write
2882D100000
trusted library allocation
page read and write
BD80FFE000
stack
page read and write
1EEF74DF000
trusted library allocation
page read and write
28826A88000
trusted library allocation
page read and write
435E000
stack
page read and write
1EEFC478000
trusted library allocation
page read and write
1A84F000
stack
page read and write
3E1F000
stack
page read and write
4C51000
heap
page read and write
1EEF64B7000
trusted library allocation
page read and write
28823703000
trusted library allocation
page read and write
1EEF9543000
trusted library allocation
page read and write
1EEFBCBD000
trusted library allocation
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
1EF02044000
trusted library allocation
page read and write
28825D03000
trusted library allocation
page read and write
4C30000
direct allocation
page execute and read and write
367E000
stack
page read and write
1EF022C9000
trusted library allocation
page read and write
1EF02097000
trusted library allocation
page read and write
2881C305000
heap
page read and write
4761000
heap
page read and write
28823896000
trusted library allocation
page read and write
1F6B7D00000
trusted library allocation
page read and write
1EEFB38A000
trusted library allocation
page read and write
2882059A000
trusted library allocation
page read and write
1EEFC45D000
trusted library allocation
page read and write
47C1000
heap
page read and write
28823003000
trusted library allocation
page read and write
1D13F000
stack
page read and write
288236A0000
trusted library allocation
page read and write
42C1000
heap
page read and write
1762D9A0000
heap
page read and write
E70000
direct allocation
page read and write
1EEFB9FC000
trusted library allocation
page read and write
4D31000
heap
page read and write
4BF0000
direct allocation
page read and write
1EEFD939000
trusted library allocation
page read and write
1EEF9CE8000
trusted library allocation
page read and write
215301C00000
trusted library allocation
page read and write
4D31000
heap
page read and write
49AF000
stack
page read and write
28828022000
trusted library allocation
page read and write
117F000
heap
page read and write
7C4000
heap
page read and write
1EEF66E8000
trusted library allocation
page read and write
2A77000
heap
page read and write
26344B2E000
trusted library allocation
page read and write
288231A7000
trusted library allocation
page read and write
4761000
heap
page read and write
B4B2A9E000
stack
page read and write
A47000
unkown
page execute and write copy
B4AB4FE000
stack
page read and write
2882E167000
trusted library allocation
page read and write
1EEFB0D1000
trusted library allocation
page read and write
2882E1DF000
trusted library allocation
page read and write
2881C305000
heap
page read and write
288206C9000
trusted library allocation
page read and write
26344C00000
unclassified section
page readonly
1EEF74A8000
trusted library allocation
page read and write
1EF01F5E000
trusted library allocation
page read and write
80E000
unkown
page execute and write copy
1EEFCCB9000
trusted library allocation
page read and write
1524000
heap
page read and write
1EEF76FB000
trusted library allocation
page read and write
1EEF99E7000
trusted library allocation
page read and write
1EEFB3EC000
trusted library allocation
page read and write
5730000
remote allocation
page read and write
2882E194000
trusted library allocation
page read and write
28825F5D000
trusted library allocation
page read and write
288205AB000
trusted library allocation
page read and write
1EEF5D68000
trusted library allocation
page read and write
2882D138000
trusted library allocation
page read and write
1F6B7C83000
trusted library allocation
page read and write
2881C2D0000
heap
page read and write
28823684000
trusted library allocation
page read and write
1EEFA88C000
trusted library allocation
page read and write
2882D10C000
trusted library allocation
page read and write
1EEFA72D000
trusted library allocation
page read and write
13E4000
heap
page read and write
2882B358000
trusted library allocation
page read and write
28823EB3000
trusted library allocation
page read and write
3EAE000
stack
page read and write
42D0000
heap
page read and write
2882E09A000
trusted library allocation
page read and write
2882BAE2000
trusted library allocation
page read and write
4E11000
heap
page read and write
2882B475000
trusted library allocation
page read and write
CF3E89B000
stack
page read and write
43E000
stack
page read and write
502D000
stack
page read and write
52A0000
direct allocation
page read and write
E70000
direct allocation
page read and write
B4B2C1C000
stack
page read and write
DA4000
heap
page read and write
2882B3A3000
trusted library allocation
page read and write
2882B160000
trusted library allocation
page read and write
2881F784000
trusted library allocation
page read and write
1EEF7850000
trusted library allocation
page read and write
3B4F000
stack
page read and write
28823B90000
trusted library allocation
page read and write
1EEFA57A000
trusted library allocation
page read and write
28823CFB000
trusted library allocation
page read and write
1EEF9F68000
trusted library allocation
page read and write
903000
heap
page read and write
13E4000
heap
page read and write
3CBE000
stack
page read and write
26344B79000
trusted library allocation
page read and write
A3E000
unkown
page execute and read and write
4761000
heap
page read and write
1F6B7D11000
trusted library allocation
page read and write
2882B0B0000
trusted library allocation
page read and write
1EF05461000
trusted library allocation
page read and write
1EEF9A00000
trusted library allocation
page read and write
4761000
heap
page read and write
2882B7BF000
trusted library allocation
page read and write
263F000
stack
page read and write
288260E7000
trusted library allocation
page read and write
28824B14000
trusted library allocation
page read and write
37BE000
stack
page read and write
423F000
stack
page read and write
4621000
heap
page read and write
A95000
unkown
page execute and read and write
1EEFA65B000
trusted library allocation
page read and write
1762DA28000
heap
page read and write
4DAE000
stack
page read and write
1EEF7ABF000
trusted library allocation
page read and write
13E4000
heap
page read and write
4E11000
heap
page read and write
1524000
heap
page read and write
1EEFAE73000
trusted library allocation
page read and write
1EEF9CAF000
trusted library allocation
page read and write
CF406AF000
stack
page read and write
1D817000
heap
page read and write
4B87000
trusted library allocation
page read and write
BFE000
unkown
page execute and read and write
1EEFAC00000
trusted library allocation
page read and write
1EF05283000
trusted library allocation
page read and write
1EEFA73A000
trusted library allocation
page read and write
28825C16000
trusted library allocation
page read and write
4841000
heap
page read and write
1EEF70EB000
trusted library allocation
page read and write
D4F000
stack
page read and write
4AEE000
stack
page read and write
1A94F000
stack
page read and write
1EF052F8000
trusted library allocation
page read and write
541F000
stack
page read and write
2882E1ED000
trusted library allocation
page read and write
1EEFB558000
trusted library allocation
page read and write
1EEFB496000
trusted library allocation
page read and write
1762CA30000
heap
page read and write
28823658000
trusted library allocation
page read and write
A30000
direct allocation
page read and write
1EF050C0000
trusted library allocation
page read and write
13E4000
heap
page read and write
4F1E000
trusted library allocation
page read and write
542000
unkown
page execute and read and write
1EEFFE14000
trusted library allocation
page read and write
1F6B7CE7000
trusted library allocation
page read and write
309E000
stack
page read and write
1EEFCA2B000
trusted library allocation
page read and write
1EEFC869000
trusted library allocation
page read and write
288238BB000
trusted library allocation
page read and write
2882B788000
trusted library allocation
page read and write
3CBE000
stack
page read and write
1EF05334000
trusted library allocation
page read and write
DA4000
heap
page read and write
1EF0273D000
trusted library allocation
page read and write
28825DFC000
trusted library allocation
page read and write
1EEF788A000
trusted library allocation
page read and write
28825165000
trusted library allocation
page read and write
2882E2C9000
trusted library allocation
page read and write
28824A66000
trusted library allocation
page read and write
1F6B7C7B000
trusted library allocation
page read and write
11AE000
unkown
page execute and read and write
3060000
heap
page read and write
B4B295E000
stack
page read and write
1EF039A5000
trusted library allocation
page read and write
13E4000
heap
page read and write
DA4000
heap
page read and write
1F6B7747000
remote allocation
page execute read
1EF01F11000
trusted library allocation
page read and write
1EEF647A000
trusted library allocation
page read and write
1EF0247F000
trusted library allocation
page read and write
431F000
stack
page read and write
28820AB0000
trusted library section
page readonly
1EEFABEE000
trusted library allocation
page read and write
1EEFB090000
trusted library allocation
page read and write
61E00000
direct allocation
page execute and read and write
2881C30B000
heap
page read and write
B4B033B000
stack
page read and write
B4A9B2E000
stack
page read and write
28823EB8000
trusted library allocation
page read and write
4841000
heap
page read and write
FC2000
heap
page read and write
54B0000
direct allocation
page execute and read and write
1762DAB7000
heap
page read and write
28826AD1000
trusted library allocation
page read and write
2882338B000
trusted library allocation
page read and write
1EF04196000
trusted library allocation
page read and write
7B0000
direct allocation
page read and write
1EEFAF6E000
trusted library allocation
page read and write
30FE000
stack
page read and write
1D826000
heap
page read and write
2882B704000
trusted library allocation
page read and write
28823619000
trusted library allocation
page read and write
2882E090000
trusted library allocation
page read and write
28820911000
heap
page read and write
28823D46000
trusted library allocation
page read and write
288238C6000
trusted library allocation
page read and write
ADB000
unkown
page execute and write copy
1EF0509B000
trusted library allocation
page read and write
4830000
direct allocation
page read and write
518F000
stack
page read and write
1EEFB3CF000
trusted library allocation
page read and write
1EEF6C22000
trusted library allocation
page read and write
397F000
stack
page read and write
2882E1E3000
trusted library allocation
page read and write
2881C345000
heap
page read and write
307B45B04000
trusted library allocation
page read and write
F3C000
stack
page read and write
28823D00000
trusted library allocation
page read and write
4841000
heap
page read and write
1B5BD170000
heap
page read and write
2882D1E7000
trusted library allocation
page read and write
1EEF607D000
trusted library allocation
page read and write
2882D0D7000
trusted library allocation
page read and write
1EEF9A63000
trusted library allocation
page read and write
33BF000
stack
page read and write
F0E000
stack
page read and write
2881C32A000
heap
page read and write
347F000
stack
page read and write
1EEF78C6000
trusted library allocation
page read and write
326F000
stack
page read and write
28824319000
trusted library allocation
page read and write
1EEF5FFE000
trusted library allocation
page read and write
1A98E000
stack
page read and write
1762CB62000
unclassified section
page read and write
2882D716000
trusted library allocation
page read and write
2882B276000
trusted library allocation
page read and write
FCB000
heap
page read and write
28825F86000
trusted library allocation
page read and write
28824346000
trusted library allocation
page read and write
1762CD86000
trusted library allocation
page read and write
1EF0228B000
trusted library allocation
page read and write
1EEF7A03000
trusted library allocation
page read and write
1D81D000
heap
page read and write
34FF000
stack
page read and write
1EEF7003000
trusted library allocation
page read and write
28825E79000
trusted library allocation
page read and write
4841000
heap
page read and write
1EF04140000
trusted library allocation
page read and write
2881C31A000
heap
page read and write
1EEF9713000
trusted library allocation
page read and write
1EEF7601000
trusted library allocation
page read and write
288245B2000
trusted library allocation
page read and write
1EEFB30D000
trusted library allocation
page read and write
1D804000
heap
page read and write
1EEFB36D000
trusted library allocation
page read and write
4D6D000
stack
page read and write
2882E0E0000
trusted library allocation
page read and write
1EF05085000
trusted library allocation
page read and write
1762C990000
heap
page read and write
1EF04217000
trusted library allocation
page read and write
28825FF0000
trusted library allocation
page read and write
1EF022FE000
trusted library allocation
page read and write
1B5BD2B9000
heap
page read and write
2881C327000
heap
page read and write
1EEF6478000
trusted library allocation
page read and write
2881C2E0000
heap
page read and write
E81000
unkown
page execute and write copy
2882E1EA000
trusted library allocation
page read and write
2882366A000
trusted library allocation
page read and write
1EEFB507000
trusted library allocation
page read and write
1EF01E75000
trusted library allocation
page read and write
2882B374000
trusted library allocation
page read and write
1EEF65ED000
trusted library allocation
page read and write
2882B85E000
trusted library allocation
page read and write
37F8DFE000
stack
page read and write
1762C8F0000
unclassified section
page readonly
288243BF000
trusted library allocation
page read and write
4761000
heap
page read and write
1EEF9B12000
trusted library allocation
page read and write
135A000
unkown
page execute and read and write
4841000
heap
page read and write
34BE000
stack
page read and write
2F67000
heap
page read and write
1EEFD6F6000
trusted library allocation
page read and write
9EB000
unkown
page execute and read and write
2881EDDF000
trusted library allocation
page read and write
15D4000
heap
page read and write
2D3E000
stack
page read and write
1EEF76E1000
trusted library allocation
page read and write
1EEF5CDF000
trusted library allocation
page read and write
13E0000
heap
page read and write
EB0000
direct allocation
page read and write
2881F85D000
trusted library allocation
page read and write
DCC000
heap
page read and write
2882437B000
trusted library allocation
page read and write
2881EDB3000
trusted library allocation
page read and write
1EEFED22000
trusted library allocation
page read and write
411F000
stack
page read and write
28825FF5000
trusted library allocation
page read and write
1762DA28000
heap
page read and write
B4B3A1E000
stack
page read and write
1EEFB60C000
trusted library allocation
page read and write
1EEEA480000
heap
page read and write
1762D9F9000
heap
page read and write
140A000
heap
page read and write
1EEFA9FC000
trusted library allocation
page read and write
4761000
heap
page read and write
28822D5B000
trusted library allocation
page read and write
2882B4FC000
trusted library allocation
page read and write
4D31000
heap
page read and write
E80000
unkown
page read and write
1650000
direct allocation
page read and write
8A2000
unkown
page execute and read and write
199F000
stack
page read and write
28825BBC000
trusted library allocation
page read and write
1762D9A0000
heap
page read and write
2882B384000
trusted library allocation
page read and write
302647500000
trusted library allocation
page read and write
1EEFC828000
trusted library allocation
page read and write
4841000
heap
page read and write
288231B1000
trusted library allocation
page read and write
1D820000
heap
page read and write
1EF05255000
trusted library allocation
page read and write
2881EEA3000
trusted library allocation
page read and write
1EEFA561000
trusted library allocation
page read and write
3D3F000
stack
page read and write
EFD000
heap
page read and write
1D83B000
heap
page read and write
3120000
heap
page read and write
1EEF78A2000
trusted library allocation
page read and write
383F000
stack
page read and write
CF3EA5E000
stack
page read and write
51264A04000
trusted library allocation
page read and write
1EF0410D000
trusted library allocation
page read and write
2881EE03000
trusted library allocation
page read and write
6B000
unkown
page write copy
4B3E000
stack
page read and write
1EEEA703000
trusted library allocation
page read and write
28825F8A000
trusted library allocation
page read and write
1F6B7C6E000
trusted library allocation
page read and write
2882D0D7000
trusted library allocation
page read and write
1EEF6603000
trusted library allocation
page read and write
2670000
heap
page read and write
1F6B78C0000
heap
page read and write
A50000
heap
page read and write
2882DFF4000
trusted library allocation
page read and write
28824AA4000
trusted library allocation
page read and write
1EEFA003000
trusted library allocation
page read and write
2881C327000
heap
page read and write
2882E02D000
trusted library allocation
page read and write
288238BE000
trusted library allocation
page read and write
B4B299B000
stack
page read and write
1EF03783000
trusted library allocation
page read and write
D5A000
stack
page read and write
1EEFC027000
trusted library allocation
page read and write
1EEFC41C000
trusted library allocation
page read and write
2882B685000
trusted library allocation
page read and write
1EF04117000
trusted library allocation
page read and write
2882384D000
trusted library allocation
page read and write
1EEF60A4000
trusted library allocation
page read and write
1EEF648A000
trusted library allocation
page read and write
28823654000
trusted library allocation
page read and write
1EEF95E5000
trusted library allocation
page read and write
2882BAF6000
trusted library allocation
page read and write
3FC97C804000
trusted library allocation
page read and write
1EEF9232000
trusted library allocation
page read and write
1EF02392000
trusted library allocation
page read and write
288241D1000
trusted library allocation
page read and write
1EF027AA000
trusted library allocation
page read and write
288231B8000
trusted library allocation
page read and write
1D81C000
heap
page read and write
52BE000
stack
page read and write
28825DA1000
trusted library allocation
page read and write
1EEF9987000
trusted library allocation
page read and write
1EEF7695000
trusted library allocation
page read and write
2882CA3C000
trusted library allocation
page read and write
910000
heap
page read and write
1EEF6490000
trusted library allocation
page read and write
2882D0CF000
trusted library allocation
page read and write
1EEFC8B1000
trusted library allocation
page read and write
2650000
direct allocation
page execute and read and write
1EEF999B000
trusted library allocation
page read and write
2882371D000
trusted library allocation
page read and write
422E000
stack
page read and write
1762D99F000
heap
page read and write
2882B145000
trusted library allocation
page read and write
1EEFC473000
trusted library allocation
page read and write
28823654000
trusted library allocation
page read and write
1EEFB37B000
trusted library allocation
page read and write
1EEF6A09000
trusted library allocation
page read and write
1EEFB354000
trusted library allocation
page read and write
1EEFED00000
trusted library allocation
page read and write
1EEFED2C000
trusted library allocation
page read and write
1EEF9D13000
trusted library allocation
page read and write
2882800A000
trusted library allocation
page read and write
28825F8C000
trusted library allocation
page read and write
2882D1F8000
trusted library allocation
page read and write
28824AA2000
trusted library allocation
page read and write
1EEFAF13000
trusted library allocation
page read and write
28825E6D000
trusted library allocation
page read and write
1EEFABA4000
trusted library allocation
page read and write
1EEFB4A0000
trusted library allocation
page read and write
2882E130000
trusted library allocation
page read and write
984000
heap
page read and write
28823777000
trusted library allocation
page read and write
2881C318000
heap
page read and write
3DCF000
stack
page read and write
9D2000
unkown
page execute and read and write
3A81000
heap
page read and write
3DFE000
stack
page read and write
1EEF9C03000
trusted library allocation
page read and write
4C30000
direct allocation
page execute and read and write
4EC1000
heap
page read and write
540000
unkown
page write copy
3C3E000
stack
page read and write
1762DAAC000
heap
page read and write
1EF04492000
trusted library allocation
page read and write
1EEFB3CF000
trusted library allocation
page read and write
1EEFD51A000
trusted library allocation
page read and write
2882E2D5000
trusted library allocation
page read and write
CF3F2DD000
stack
page read and write
9C0000
unkown
page execute and read and write
1EEF9D58000
trusted library allocation
page read and write
4621000
heap
page read and write
823E000
stack
page read and write
1EEF5ED5000
trusted library allocation
page read and write
28823B19000
trusted library allocation
page read and write
1EEFD6D0000
trusted library allocation
page read and write
ACD000
unkown
page execute and write copy
2882B3E4000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EEF5C81000
trusted library allocation
page read and write
1EEFB02D000
trusted library allocation
page read and write
288205B2000
trusted library allocation
page read and write
1EF02100000
trusted library allocation
page read and write
1EEF659C000
trusted library allocation
page read and write
FC3000
heap
page read and write
4EC1000
heap
page read and write
B4B2A5E000
stack
page read and write
2882E17E000
trusted library allocation
page read and write
F49000
heap
page read and write
2882D161000
trusted library allocation
page read and write
1F6B7C5B000
trusted library allocation
page read and write
1EEF93DB000
trusted library allocation
page read and write
2392A000
heap
page read and write
1EEFBA67000
trusted library allocation
page read and write
28824101000
trusted library allocation
page read and write
28821880000
heap
page read and write
1EEF9D44000
trusted library allocation
page read and write
340E000
stack
page read and write
28820C14000
trusted library allocation
page read and write
1D832000
heap
page read and write
4D31000
heap
page read and write
5AF0000
heap
page read and write
1EEFB3A7000
trusted library allocation
page read and write
1EEF9E49000
trusted library allocation
page read and write
1EEFABE4000
trusted library allocation
page read and write
1EEF6579000
trusted library allocation
page read and write
1EF024A4000
trusted library allocation
page read and write
1F6B7C64000
trusted library allocation
page read and write
1524000
heap
page read and write
1EEF97E5000
trusted library allocation
page read and write
1EEFAC8D000
trusted library allocation
page read and write
28824471000
trusted library allocation
page read and write
1EF020A9000
trusted library allocation
page read and write
1EF052DB000
trusted library allocation
page read and write
1762CA24000
heap
page read and write
1454000
heap
page read and write
B4B093A000
stack
page read and write
2882055F000
trusted library allocation
page read and write
2882D1C9000
trusted library allocation
page read and write
288231C7000
trusted library allocation
page read and write
2882B3F3000
trusted library allocation
page read and write
2882B39F000
trusted library allocation
page read and write
1EEFCC14000
trusted library allocation
page read and write
288231B1000
trusted library allocation
page read and write
1EEFA711000
trusted library allocation
page read and write
1EEFA16B000
heap
page read and write
984000
heap
page read and write
2882B4F0000
trusted library allocation
page read and write
4D70000
direct allocation
page execute and read and write
28822D40000
trusted library allocation
page read and write
1EEFCAAB000
trusted library allocation
page read and write
61E01000
direct allocation
page execute read
2881F303000
trusted library allocation
page read and write
29991000
heap
page read and write
4D31000
heap
page read and write
1EEF5C00000
trusted library allocation
page read and write
1EEF5C03000
trusted library allocation
page read and write
1EEFB366000
trusted library allocation
page read and write
28823900000
trusted library section
page readonly
1EEFC29E000
trusted library allocation
page read and write
1EF0247D000
trusted library allocation
page read and write
1EEF9F62000
trusted library allocation
page read and write
1EEFA598000
trusted library allocation
page read and write
300E000
stack
page read and write
2E1E000
stack
page read and write
1EEFD503000
trusted library allocation
page read and write
1762CD89000
trusted library allocation
page read and write
1D820000
heap
page read and write
1EEFD5F5000
trusted library allocation
page read and write
1524000
heap
page read and write
6210000
heap
page read and write
2EFE000
stack
page read and write
1EF052F5000
trusted library allocation
page read and write
2882B88C000
trusted library allocation
page read and write
1EEFC8B9000
trusted library allocation
page read and write
7B0000
direct allocation
page read and write
1EEF6015000
trusted library allocation
page read and write
3050000
direct allocation
page read and write
1EEF6B08000
trusted library allocation
page read and write
ADC000
unkown
page execute and write copy
83C000
unkown
page execute and write copy
4C71000
trusted library allocation
page read and write
28823738000
trusted library allocation
page read and write
288136E5000
trusted library allocation
page read and write
4830000
direct allocation
page read and write
2881C318000
heap
page read and write
4761000
heap
page read and write
401E000
stack
page read and write
28814FA0000
trusted library section
page read and write
2882E1F5000
trusted library allocation
page read and write
1EEF66A4000
trusted library allocation
page read and write
288213D6000
trusted library allocation
page read and write
BDF000
stack
page read and write
28826079000
trusted library allocation
page read and write
810000
unkown
page read and write
5B4000
heap
page read and write
1EEFB8F0000
trusted library section
page read and write
28823861000
trusted library allocation
page read and write
1EEFCADD000
trusted library allocation
page read and write
1EEF7C96000
trusted library allocation
page read and write
A4F000
unkown
page execute and read and write
28820A40000
trusted library section
page readonly
28814F9C000
heap
page read and write
2882BAD5000
trusted library allocation
page read and write
2882110A000
trusted library allocation
page read and write
5420000
direct allocation
page execute and read and write
1EEFC54E000
trusted library allocation
page read and write
2882DF14000
trusted library allocation
page read and write
83C000
unkown
page execute and write copy
1EF01B00000
trusted library allocation
page read and write
30B7000
heap
page read and write
1EEFA866000
trusted library allocation
page read and write
4D31000
heap
page read and write
1D82B000
heap
page read and write
3A9E000
stack
page read and write
3D6E000
stack
page read and write
2882BAFD000
trusted library allocation
page read and write
263449F0000
heap
page read and write
28825F86000
trusted library allocation
page read and write
288231B1000
trusted library allocation
page read and write
1D804000
heap
page read and write
16EF000
stack
page read and write
28825EEE000
trusted library allocation
page read and write
28826CB6000
trusted library allocation
page read and write
2650000
heap
page read and write
1EEF93B7000
trusted library allocation
page read and write
28823845000
trusted library allocation
page read and write
B4B0D3D000
stack
page read and write
472E000
stack
page read and write
4E11000
heap
page read and write
1D910000
trusted library allocation
page read and write
2882368B000
trusted library allocation
page read and write
A3A000
unkown
page execute and read and write
32DF000
stack
page read and write
2882E1AB000
trusted library allocation
page read and write
1EEFB39D000
trusted library allocation
page read and write
1EEFCA10000
trusted library allocation
page read and write
1EEF9072000
trusted library allocation
page read and write
1EF0414E000
trusted library allocation
page read and write
1EEFB0DB000
trusted library allocation
page read and write
4761000
heap
page read and write
1EEFC8B7000
trusted library allocation
page read and write
26344B83000
trusted library allocation
page read and write
288244D3000
trusted library allocation
page read and write
B4AC877000
stack
page read and write
4E11000
heap
page read and write
1EEFC8FD000
trusted library allocation
page read and write
30A0000
direct allocation
page read and write
1EEFB46C000
trusted library allocation
page read and write
1EF022A3000
trusted library allocation
page read and write
2D1F000
stack
page read and write
1EEF7850000
trusted library allocation
page read and write
1EEEA650000
trusted library allocation
page execute read
E70000
direct allocation
page execute and read and write
26344B7B000
trusted library allocation
page read and write
13E4000
heap
page read and write
1EF0370C000
trusted library allocation
page read and write
1EEF8F4B000
trusted library allocation
page read and write
2881EF03000
trusted library allocation
page read and write
1EF02300000
trusted library allocation
page read and write
1167000
heap
page read and write
28825CF9000
trusted library allocation
page read and write
4D31000
heap
page read and write
1B5BD280000
heap
page read and write
4D50000
direct allocation
page execute and read and write
3C8F000
stack
page read and write
1EEFB8D0000
trusted library section
page read and write
4761000
heap
page read and write
1EEFB4BE000
trusted library allocation
page read and write
32CE000
stack
page read and write
1D11E000
stack
page read and write
1EEF9220000
trusted library allocation
page read and write
1762DA28000
heap
page read and write
1EEFC8E4000
trusted library allocation
page read and write
28825F92000
trusted library allocation
page read and write
4780000
heap
page read and write
28824380000
trusted library allocation
page read and write
1EEFA7C6000
trusted library allocation
page read and write
2882452D000
trusted library allocation
page read and write
1762D9AC000
heap
page read and write
28823698000
trusted library allocation
page read and write
28823CEE000
trusted library allocation
page read and write
4841000
heap
page read and write
9D2000
unkown
page execute and read and write
4E11000
heap
page read and write
1EEFED08000
trusted library allocation
page read and write
2882BAD1000
trusted library allocation
page read and write
288206C3000
trusted library allocation
page read and write
1EF02243000
trusted library allocation
page read and write
288231F0000
trusted library allocation
page read and write
28823684000
trusted library allocation
page read and write
1EEF750A000
trusted library allocation
page read and write
2882E1AB000
trusted library allocation
page read and write
970000
heap
page read and write
2882802C000
trusted library allocation
page read and write
28825BC3000
trusted library allocation
page read and write
2882432A000
trusted library allocation
page read and write
1EEF7603000
trusted library allocation
page read and write
2882E2FE000
trusted library allocation
page read and write
1EEFC1C5000
trusted library allocation
page read and write
DC0000
heap
page read and write
1EF050EB000
trusted library allocation
page read and write
333F000
stack
page read and write
356F000
stack
page read and write
10EA05D3000
heap
page read and write
1762CDC1000
trusted library allocation
page read and write
1762CD0A000
trusted library allocation
page read and write
1EEFA772000
trusted library allocation
page read and write
1EEFCCFC000
trusted library allocation
page read and write
1EF024F8000
trusted library allocation
page read and write
28823698000
trusted library allocation
page read and write
1EEFD53A000
trusted library allocation
page read and write
1083000
unkown
page execute and read and write
2882030D000
trusted library allocation
page read and write
2882D72A000
trusted library allocation
page read and write
263449F6000
heap
page read and write
28823C03000
trusted library allocation
page read and write
1EEF64CF000
trusted library allocation
page read and write
2882B896000
trusted library allocation
page read and write
53A1000
direct allocation
page read and write
2882B4E7000
trusted library allocation
page read and write
1EF050ED000
trusted library allocation
page read and write
1EF05286000
trusted library allocation
page read and write
CF3F35C000
stack
page read and write
4E11000
heap
page read and write
2881F410000
trusted library allocation
page read and write
1EF0422C000
trusted library allocation
page read and write
1EF022C3000
trusted library allocation
page read and write
1EEFD9DE000
trusted library allocation
page read and write
1EF052F5000
trusted library allocation
page read and write
288231A5000
trusted library allocation
page read and write
1EF0410B000
trusted library allocation
page read and write
A3A000
unkown
page execute and read and write
2882E07D000
trusted library allocation
page read and write
1D81C000
heap
page read and write
1EEF789B000
trusted library allocation
page read and write
1EF024DE000
trusted library allocation
page read and write
1EEFA7A7000
trusted library allocation
page read and write
2882B4B1000
trusted library allocation
page read and write
1EEF9DC4000
trusted library allocation
page read and write
1EEF95C0000
trusted library allocation
page read and write
1762DA2F000
heap
page read and write
28820B12000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
288260C7000
trusted library allocation
page read and write
1EEFA51B000
trusted library allocation
page read and write
277F000
stack
page read and write
1EEF8E44000
trusted library allocation
page read and write
DCE000
heap
page read and write
1EEF6075000
trusted library allocation
page read and write
1EEFA300000
trusted library allocation
page read and write
28823737000
trusted library allocation
page read and write
1EF05498000
trusted library allocation
page read and write
1EEFB590000
trusted library allocation
page read and write
1F6B7CB7000
trusted library allocation
page read and write
28820F00000
trusted library allocation
page read and write
2882607D000
trusted library allocation
page read and write
1EEFC5B8000
trusted library allocation
page read and write
1EEFB39F000
trusted library allocation
page read and write
1EF03912000
trusted library allocation
page read and write
A2E000
stack
page read and write
7D1000
unkown
page execute and write copy
1EEFD903000
trusted library allocation
page read and write
28822BBF000
trusted library allocation
page read and write
1EEFA7A7000
trusted library allocation
page read and write
4841000
heap
page read and write
1762CDB8000
trusted library allocation
page read and write
DCD000
heap
page read and write
2882B3D1000
trusted library allocation
page read and write
2882B88A000
trusted library allocation
page read and write
473E000
stack
page read and write
1B5BD400000
trusted library allocation
page read and write
4D31000
heap
page read and write
1EEFB39D000
trusted library allocation
page read and write
10EA04E0000
heap
page read and write
28826B81000
trusted library allocation
page read and write
2882E2CD000
trusted library allocation
page read and write
4AEE000
stack
page read and write
8CD000
unkown
page execute and read and write
7C4000
heap
page read and write
1EEFA100000
heap
page read and write
1EEFA88F000
trusted library allocation
page read and write
1EEF9200000
trusted library allocation
page read and write
1EF03A91000
trusted library allocation
page read and write
4890000
direct allocation
page execute and read and write
4E11000
heap
page read and write
4761000
heap
page read and write
CF3EADF000
stack
page read and write
2640000
direct allocation
page read and write
2882BAAE000
trusted library allocation
page read and write
1EEFA00E000
trusted library allocation
page read and write
EE2000
unkown
page execute and read and write
2881EE6D000
trusted library allocation
page read and write
26344BB9000
trusted library allocation
page read and write
1EEF975D000
trusted library allocation
page read and write
28824A09000
trusted library allocation
page read and write
1EEFB3EF000
trusted library allocation
page read and write
28824A4B000
trusted library allocation
page read and write
62D000
stack
page read and write
1EEFA821000
trusted library allocation
page read and write
2881C32E000
heap
page read and write
2882D11F000
trusted library allocation
page read and write
1EEFAB96000
trusted library allocation
page read and write
964000
heap
page read and write
2882E194000
trusted library allocation
page read and write
B5C8AFE000
stack
page read and write
28824303000
trusted library allocation
page read and write
28826AD7000
trusted library allocation
page read and write
2882D0C9000
trusted library allocation
page read and write
13E4000
heap
page read and write
28822D7A000
trusted library allocation
page read and write
B4B29DC000
stack
page read and write
1EEFD9AD000
trusted library allocation
page read and write
2881C2FF000
heap
page read and write
1EEFB0EB000
trusted library allocation
page read and write
28813460000
heap
page readonly
1EEFAB03000
trusted library allocation
page read and write
4761000
heap
page read and write
31FF000
stack
page read and write
8C0000
heap
page read and write
28823658000
trusted library allocation
page read and write
28823700000
trusted library allocation
page read and write
28824AB2000
trusted library allocation
page read and write
4761000
heap
page read and write
2882E2F9000
trusted library allocation
page read and write
2882D8CE000
trusted library allocation
page read and write
1EF050B8000
trusted library allocation
page read and write
4841000
heap
page read and write
13FE000
stack
page read and write
2882379C000
trusted library allocation
page read and write
B4B331E000
stack
page read and write
263449B0000
heap
page read and write
13E4000
heap
page read and write
4D7F000
stack
page read and write
28825E80000
trusted library allocation
page read and write
1EEFAE00000
trusted library allocation
page read and write
26344820000
heap
page read and write
2882B603000
trusted library allocation
page read and write
BCE000
stack
page read and write
49BF000
stack
page read and write
1EEFC56C000
trusted library allocation
page read and write
1EEFB4BE000
trusted library allocation
page read and write
2882D1AA000
trusted library allocation
page read and write
A5A000
unkown
page execute and read and write
2881C30C000
heap
page read and write
28823ECD000
trusted library allocation
page read and write
2882D1C6000
trusted library allocation
page read and write
2882B39F000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
BFE000
unkown
page execute and read and write
28826C5D000
trusted library allocation
page read and write
2881C2FE000
heap
page read and write
288244EA000
trusted library allocation
page read and write
1524000
heap
page read and write
288237CB000
trusted library allocation
page read and write
28826B88000
trusted library allocation
page read and write
80E000
unkown
page execute and read and write
DA4000
heap
page read and write
E70000
direct allocation
page read and write
1EEFB4FC000
trusted library allocation
page read and write
1EF04347000
trusted library allocation
page read and write
2882E1F5000
trusted library allocation
page read and write
2881F475000
trusted library allocation
page read and write
6C8A1000
unkown
page execute read
2881C30D000
heap
page read and write
429E000
stack
page read and write
CF380BB000
stack
page read and write
4841000
heap
page read and write
28824356000
trusted library allocation
page read and write
1EEFC003000
trusted library allocation
page read and write
4761000
heap
page read and write
2C4CD504000
trusted library allocation
page read and write
9F9000
unkown
page execute and write copy
1D836000
heap
page read and write
1EEFD5AF000
trusted library allocation
page read and write
288206FC000
trusted library allocation
page read and write
346F000
stack
page read and write
288244D3000
trusted library allocation
page read and write
7C4000
heap
page read and write
2882B7D9000
trusted library allocation
page read and write
B4B321F000
unkown
page read and write
1EF054EE000
trusted library allocation
page read and write
28822B4C000
trusted library allocation
page read and write
2882DF05000
trusted library allocation
page read and write
EFD000
heap
page read and write
2F8F000
stack
page read and write
1EEFB130000
trusted library section
page readonly
1EF0528B000
trusted library allocation
page read and write
2881F32F000
trusted library allocation
page read and write
1EEFB071000
trusted library allocation
page read and write
1EEFB4CB000
trusted library allocation
page read and write
1EF0200B000
trusted library allocation
page read and write
2881C308000
heap
page read and write
2882BAE2000
trusted library allocation
page read and write
DEE000
stack
page read and write
939D451000
trusted library allocation
page execute read
15D4000
heap
page read and write
1D9E0000
heap
page read and write
13DE000
stack
page read and write
1EEFC5B0000
trusted library allocation
page read and write
288244F2000
trusted library allocation
page read and write
1EEFD639000
trusted library allocation
page read and write
2ABB000
stack
page read and write
B4B0B3D000
stack
page read and write
364F000
stack
page read and write
2882D1EB000
trusted library allocation
page read and write
28823103000
trusted library allocation
page read and write
EA4A8C04000
trusted library allocation
page read and write
1EEF9264000
trusted library allocation
page read and write
6C8A0000
unkown
page readonly
1EEFCC03000
trusted library allocation
page read and write
1EEFBAF3000
trusted library allocation
page read and write
28823781000
trusted library allocation
page read and write
28820E00000
trusted library allocation
page read and write
1EEFD5CE000
trusted library allocation
page read and write
1EEF91C3000
trusted library allocation
page read and write
F62000
heap
page read and write
1EF01E38000
trusted library allocation
page read and write
1EEF64A9000
trusted library allocation
page read and write
28814EE8000
heap
page read and write
427E000
stack
page read and write
2882457F000
trusted library allocation
page read and write
1F6B7C12000
trusted library allocation
page read and write
13E4000
heap
page read and write
B4AC93C000
stack
page read and write
2882BAC2000
trusted library allocation
page read and write
4D31000
heap
page read and write
4E11000
heap
page read and write
1EEFD52C000
trusted library allocation
page read and write
1EF0232F000
trusted library allocation
page read and write
1B5BD407000
trusted library allocation
page read and write
1524000
heap
page read and write
28823357000
trusted library allocation
page read and write
2FB0E000
stack
page read and write
288238B2000
trusted library allocation
page read and write
29C000
unkown
page readonly
28825A86000
trusted library allocation
page read and write
1EF04016000
trusted library allocation
page read and write
5B4000
heap
page read and write
1EEFD55B000
trusted library allocation
page read and write
2882036C000
trusted library allocation
page read and write
363F000
stack
page read and write
30B0000
heap
page read and write
2882057C000
trusted library allocation
page read and write
1EEFABE2000
trusted library allocation
page read and write
28829114000
trusted library allocation
page read and write
CF3663D000
stack
page read and write
1EEFD538000
trusted library allocation
page read and write
34AE000
stack
page read and write
2881EDA4000
trusted library allocation
page read and write
CF3D6FE000
stack
page read and write
2882526C000
trusted library allocation
page read and write
1EF05253000
trusted library allocation
page read and write
D03000
unkown
page execute and read and write
1EEFB3E1000
trusted library allocation
page read and write
18163D00000
trusted library allocation
page read and write
2881C305000
heap
page read and write
28822BE1000
trusted library allocation
page read and write
2881C2FE000
heap
page read and write
26344B72000
trusted library allocation
page read and write
1EEFBAA0000
trusted library allocation
page read and write
1D78C000
stack
page read and write
28826BBD000
trusted library allocation
page read and write
FCF000
heap
page read and write
1EEF66CF000
trusted library allocation
page read and write
2882D8E5000
trusted library allocation
page read and write
1EF050B0000
trusted library allocation
page read and write
3B4000
heap
page read and write
B5C8277000
stack
page read and write
1EEFC8BD000
trusted library allocation
page read and write
1EF05421000
trusted library allocation
page read and write
28822D43000
trusted library allocation
page read and write
28826A9E000
trusted library allocation
page read and write
4841000
heap
page read and write
345C76E4D000
trusted library allocation
page read and write
B4AA5D8000
stack
page read and write
1EF022C7000
trusted library allocation
page read and write
2ADE000
stack
page read and write
1EEFC903000
trusted library allocation
page read and write
A57000
unkown
page execute and write copy
4D90000
direct allocation
page execute and read and write
2882368B000
trusted library allocation
page read and write
28823694000
trusted library allocation
page read and write
1762CB60000
unclassified section
page read and write
28825FCA000
trusted library allocation
page read and write
3AAE000
stack
page read and write
288231AE000
trusted library allocation
page read and write
2882E163000
trusted library allocation
page read and write
1EF02400000
trusted library allocation
page read and write
F6D000
heap
page read and write
2882B644000
trusted library allocation
page read and write
546D000
stack
page read and write
26344D32000
trusted library allocation
page read and write
2881C2FE000
heap
page read and write
1D819000
heap
page read and write
444D000
stack
page read and write
A5A000
heap
page read and write
2882379C000
trusted library allocation
page read and write
28823AD0000
trusted library section
page read and write
1EF042D4000
trusted library allocation
page read and write
1EF02479000
trusted library allocation
page read and write
1481000
heap
page read and write
2881C305000
heap
page read and write
4E50000
direct allocation
page execute and read and write
1EEF5DDD000
trusted library allocation
page read and write
6216000
heap
page read and write
28823753000
trusted library allocation
page read and write
1EEF9991000
trusted library allocation
page read and write
7C4000
heap
page read and write
FC5000
heap
page read and write
2882E1B5000
trusted library allocation
page read and write
F1E000
heap
page read and write
2882B8FC000
trusted library allocation
page read and write
2882E21F000
trusted library allocation
page read and write
39DE000
stack
page read and write
28825F26000
trusted library allocation
page read and write
1EF0505C000
trusted library allocation
page read and write
1EEF6960000
unclassified section
page read and write
345E000
stack
page read and write
1EEFA5B0000
trusted library allocation
page read and write
1B20F000
stack
page read and write
2882B503000
trusted library allocation
page read and write
2881C30F000
heap
page read and write
833E000
stack
page read and write
28826C67000
trusted library allocation
page read and write
1EEFAB2B000
trusted library allocation
page read and write
28822D5B000
trusted library allocation
page read and write
23F979304000
trusted library allocation
page read and write
28822B00000
trusted library allocation
page read and write
2882606D000
trusted library allocation
page read and write
1EF0201D000
trusted library allocation
page read and write
42C1000
heap
page read and write
288260A9000
trusted library allocation
page read and write
994000
heap
page read and write
28823F94000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
906000
heap
page read and write
1EEFB0EC000
trusted library allocation
page read and write
2882B70A000
trusted library allocation
page read and write
43BE000
stack
page read and write
46CE000
stack
page read and write
E70000
direct allocation
page read and write
2882B39B000
trusted library allocation
page read and write
F26000
heap
page read and write
1EF039FE000
trusted library allocation
page read and write
FC3000
heap
page read and write
1EEFB39B000
trusted library allocation
page read and write
984000
heap
page read and write
1EF023A3000
trusted library allocation
page read and write
1524000
heap
page read and write
5B4000
heap
page read and write
288252F5000
trusted library allocation
page read and write
28823E04000
trusted library allocation
page read and write
2882B05F000
trusted library allocation
page read and write
3050000
direct allocation
page read and write
1EEF7633000
trusted library allocation
page read and write
1EF037F8000
trusted library allocation
page read and write
2882B903000
trusted library allocation
page read and write
4841000
heap
page read and write
5B4000
heap
page read and write
5B4000
heap
page read and write
1482000
heap
page read and write
4841000
heap
page read and write
1EEFB0D6000
trusted library allocation
page read and write
2882BA00000
trusted library allocation
page read and write
288206FC000
trusted library allocation
page read and write
1EF05263000
trusted library allocation
page read and write
1B5BD300000
trusted library allocation
page read and write
4D0C000
stack
page read and write
CF4022A000
stack
page read and write
C0DCD504000
trusted library allocation
page read and write
1EEEA489000
heap
page read and write
4841000
heap
page read and write
15C0000
direct allocation
page read and write
1F6B7970000
unclassified section
page readonly
2882E07A000
trusted library allocation
page read and write
1EEF9B95000
trusted library allocation
page read and write
2882B033000
trusted library allocation
page read and write
1EF024EB000
trusted library allocation
page read and write
3050000
direct allocation
page read and write
2882D10A000
trusted library allocation
page read and write
DA8000
heap
page read and write
1762DAAC000
heap
page read and write
313F000
stack
page read and write
28825E5A000
trusted library allocation
page read and write
1EEF9771000
trusted library allocation
page read and write
1EF04175000
trusted library allocation
page read and write
2882D1E2000
trusted library allocation
page read and write
1EEF7B00000
trusted library allocation
page read and write
1428000
heap
page read and write
2882E135000
trusted library allocation
page read and write
531E000
stack
page read and write
2882B447000
trusted library allocation
page read and write
377F000
stack
page read and write
28821338000
trusted library allocation
page read and write
1EEFAF2B000
trusted library allocation
page read and write
1EEFD565000
trusted library allocation
page read and write
7C4000
heap
page read and write
1EEF7411000
trusted library allocation
page read and write
2640000
direct allocation
page read and write
2882D18B000
trusted library allocation
page read and write
28820A90000
trusted library section
page readonly
28826091000
trusted library allocation
page read and write
CF3E05D000
stack
page read and write
2881C31E000
heap
page read and write
2881C305000
heap
page read and write
2881C308000
heap
page read and write
4761000
heap
page read and write
1D805000
heap
page read and write
FF0000
direct allocation
page read and write
A4F000
unkown
page execute and read and write
1EEF5CA8000
trusted library allocation
page read and write
4E11000
heap
page read and write
13E4000
heap
page read and write
EEF000
heap
page read and write
1EEFB489000
trusted library allocation
page read and write
1EF02094000
trusted library allocation
page read and write
1169000
heap
page read and write
28822D14000
trusted library allocation
page read and write
1524000
heap
page read and write
CF3E8DE000
stack
page read and write
7C4000
heap
page read and write
A02B7B04000
trusted library allocation
page read and write
1EF04421000
trusted library allocation
page read and write
2677000
heap
page read and write
51B0000
direct allocation
page read and write
D9F000
stack
page read and write
1EEFB800000
trusted library section
page readonly
288231CD000
trusted library allocation
page read and write
1EEFB100000
trusted library section
page readonly
EEB000
unkown
page execute and read and write
2882E0D7000
trusted library allocation
page read and write
1EEFB170000
trusted library section
page readonly
1EF0528B000
trusted library allocation
page read and write
28823803000
trusted library allocation
page read and write
1EEF9D9B000
trusted library allocation
page read and write
1EF05080000
trusted library allocation
page read and write
437F000
stack
page read and write
2881C354000
heap
page read and write
CF3A0FD000
stack
page read and write
1EEF9987000
trusted library allocation
page read and write
1EEF6992000
unclassified section
page read and write
1EEFC8BB000
trusted library allocation
page read and write
1EEFC12A000
trusted library allocation
page read and write
288231A5000
trusted library allocation
page read and write
1EEFD959000
trusted library allocation
page read and write
A4F000
unkown
page execute and read and write
26344B6E000
trusted library allocation
page read and write
28813603000
trusted library allocation
page read and write
1EEF5FFB000
trusted library allocation
page read and write
347F000
stack
page read and write
28825100000
trusted library allocation
page read and write
1EEFD5C2000
trusted library allocation
page read and write
2F5E000
stack
page read and write
28821322000
trusted library allocation
page read and write
1EEFB38A000
trusted library allocation
page read and write
4841000
heap
page read and write
1EEFA120000
heap
page read and write
1EEFC4D0000
trusted library allocation
page read and write
288236A0000
trusted library allocation
page read and write
A3B000
unkown
page execute and write copy
A19000
unkown
page execute and read and write
2882B8EC000
trusted library allocation
page read and write
1EEF9F00000
trusted library allocation
page read and write
28826C35000
trusted library allocation
page read and write
CF3DF5E000
stack
page read and write
288219D0000
trusted library section
page readonly
CF353DD000
stack
page read and write
1EEFC4E2000
trusted library allocation
page read and write
1EA0000
heap
page read and write
1EF0432C000
trusted library allocation
page read and write
B4B153D000
stack
page read and write
1EEF78A2000
trusted library allocation
page read and write
2882B07B000
trusted library allocation
page read and write
1EEFBA44000
trusted library allocation
page read and write
288231C7000
trusted library allocation
page read and write
288233FC000
trusted library allocation
page read and write
1EEFB44F000
trusted library allocation
page read and write
288236A0000
trusted library allocation
page read and write
288231A7000
trusted library allocation
page read and write
AC3000
unkown
page execute and write copy
41EF000
stack
page read and write
4D31000
heap
page read and write
4E60000
direct allocation
page execute and read and write
4C60000
direct allocation
page execute and read and write
2881EFA2000
trusted library allocation
page read and write
28824AF7000
trusted library allocation
page read and write
2882E19E000
trusted library allocation
page read and write
1EF02792000
trusted library allocation
page read and write
ADB000
unkown
page execute and write copy
1440000
heap
page read and write
D71000
heap
page read and write
2882D1A2000
trusted library allocation
page read and write
2882D190000
trusted library allocation
page read and write
BCD000
heap
page read and write
B5C937E000
unkown
page readonly
1EF022EB000
trusted library allocation
page read and write
28826C56000
trusted library allocation
page read and write
4761000
heap
page read and write
4621000
heap
page read and write
2882E0CD000
trusted library allocation
page read and write
2882456E000
trusted library allocation
page read and write
1F6B7CC7000
trusted library allocation
page read and write
28829100000
trusted library allocation
page read and write
4841000
heap
page read and write
D11000
unkown
page execute and write copy
1EEF8F6B000
trusted library allocation
page read and write
47C1000
heap
page read and write
1EF01D0B000
trusted library allocation
page read and write
1EEFC423000
trusted library allocation
page read and write
2882DF59000
trusted library allocation
page read and write
1EF01D16000
trusted library allocation
page read and write
984000
heap
page read and write
1EEF6962000
unclassified section
page read and write
28820B08000
trusted library allocation
page read and write
8D0000
heap
page read and write
1400000
heap
page read and write
1EEFA897000
trusted library allocation
page read and write
1EF05006000
trusted library allocation
page read and write
2881C315000
heap
page read and write
337E000
stack
page read and write
EE9000
unkown
page write copy
418F000
stack
page read and write
2882E1AF000
trusted library allocation
page read and write
3050000
direct allocation
page read and write
9BB000
unkown
page execute and write copy
135C000
unkown
page execute and write copy
2882E0DD000
trusted library allocation
page read and write
4841000
heap
page read and write
1EEFB391000
trusted library allocation
page read and write
A95000
unkown
page execute and read and write
2882445D000
trusted library allocation
page read and write
F18000
heap
page read and write
1EF0505A000
trusted library allocation
page read and write
1EEF999F000
trusted library allocation
page read and write
2881C324000
heap
page read and write
1EEFD545000
trusted library allocation
page read and write
4E11000
heap
page read and write
28824A63000
trusted library allocation
page read and write
1EEFA13D000
heap
page read and write
28825A00000
trusted library allocation
page read and write
2882E1F0000
trusted library allocation
page read and write
1EEFA3E8000
trusted library allocation
page read and write
B4B275E000
stack
page read and write
2882DF03000
trusted library allocation
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
1EF02756000
trusted library allocation
page read and write
2881F8A2000
trusted library allocation
page read and write
810000
unkown
page readonly
2881C30D000
heap
page read and write
1EF05015000
trusted library allocation
page read and write
1400000
heap
page read and write
1EEFC9B5000
trusted library allocation
page read and write
28823572000
trusted library allocation
page read and write
2882E2DF000
trusted library allocation
page read and write
54E0000
direct allocation
page execute and read and write
CF3F15E000
stack
page read and write
1EF04113000
trusted library allocation
page read and write
2882BA1F000
trusted library allocation
page read and write
1EEFD7EA000
trusted library allocation
page read and write
3FFE000
stack
page read and write
1EEF9C1C000
trusted library allocation
page read and write
4860000
trusted library allocation
page read and write
28824563000
trusted library allocation
page read and write
1EEFD703000
trusted library allocation
page read and write
4841000
heap
page read and write
960000
heap
page read and write
2882B859000
trusted library allocation
page read and write
458E000
stack
page read and write
2882B906000
trusted library allocation
page read and write
1EF0500D000
trusted library allocation
page read and write
28826B19000
trusted library allocation
page read and write
1EEFB3A7000
trusted library allocation
page read and write
7C4000
heap
page read and write
14D1000
heap
page read and write
4D2F000
stack
page read and write
28823690000
trusted library allocation
page read and write
7C0000
heap
page read and write
2881EE65000
trusted library allocation
page read and write
1EEFCBBE000
trusted library allocation
page read and write
1EEFC00D000
trusted library allocation
page read and write
1EEFA500000
trusted library allocation
page read and write
1EEF6560000
trusted library allocation
page read and write
DC6000
heap
page read and write
288213E6000
trusted library allocation
page read and write
6C940000
unkown
page readonly
1EEFD54B000
trusted library allocation
page read and write
1EF041D1000
trusted library allocation
page read and write
1EEFB3EF000
trusted library allocation
page read and write
288243D2000
trusted library allocation
page read and write
1EEF936C000
trusted library allocation
page read and write
1EEF9003000
trusted library allocation
page read and write
1B10F000
stack
page read and write
2881C32E000
heap
page read and write
B4B2B1E000
stack
page read and write
1A90000
heap
page read and write
1EEF6693000
trusted library allocation
page read and write
54C0000
direct allocation
page execute and read and write
1D68D000
stack
page read and write
1EF02090000
trusted library allocation
page read and write
1EEFBA61000
trusted library allocation
page read and write
1EF022D1000
trusted library allocation
page read and write
28823650000
trusted library allocation
page read and write
28823176000
trusted library allocation
page read and write
1EEF7A61000
trusted library allocation
page read and write
4BEF000
stack
page read and write
1EEF5D37000
trusted library allocation
page read and write
28825FBB000
trusted library allocation
page read and write
1EF02354000
trusted library allocation
page read and write
1EEFB3EF000
trusted library allocation
page read and write
1EF02276000
trusted library allocation
page read and write
1EEF65EF000
trusted library allocation
page read and write
2882B3FD000
trusted library allocation
page read and write
EE9000
unkown
page write copy
28825F54000
trusted library allocation
page read and write
2F8E000
stack
page read and write
1EF050EF000
trusted library allocation
page read and write
5B4000
heap
page read and write
1EEFB6C5000
trusted library allocation
page read and write
1EEFCA03000
trusted library allocation
page read and write
2882E13A000
trusted library allocation
page read and write
DA4000
heap
page read and write
FDB000
stack
page read and write
28820850000
heap
page read and write
28823B03000
trusted library allocation
page read and write
28823162000
trusted library allocation
page read and write
4E30000
heap
page read and write
2882318C000
trusted library allocation
page read and write
1EEF648D000
trusted library allocation
page read and write
263449F4000
heap
page read and write
1EEFAB41000
trusted library allocation
page read and write
DA4000
heap
page read and write
28825C03000
trusted library allocation
page read and write
1762D9A0000
heap
page read and write
1EEF9123000
trusted library allocation
page read and write
CF36C73000
stack
page read and write
3AFE000
stack
page read and write
2882E2FE000
trusted library allocation
page read and write
4841000
heap
page read and write
288238BE000
trusted library allocation
page read and write
2882B3D4000
trusted library allocation
page read and write
26344BB2000
trusted library allocation
page read and write
1EF052C5000
trusted library allocation
page read and write
DA4000
heap
page read and write
CF4072E000
stack
page read and write
CF9000
unkown
page execute and read and write
2882528C000
trusted library allocation
page read and write
1EF050D7000
trusted library allocation
page read and write
3856F4D000
stack
page read and write
4E11000
heap
page read and write
2882BACB000
trusted library allocation
page read and write
1EEF9E00000
trusted library allocation
page read and write
1EEF6044000
trusted library allocation
page read and write
4C30000
direct allocation
page execute and read and write
1D83A000
heap
page read and write
1EEFB39B000
trusted library allocation
page read and write
46EF000
stack
page read and write
2882E19E000
trusted library allocation
page read and write
1EEF6525000
trusted library allocation
page read and write
810000
unkown
page readonly
1524000
heap
page read and write
28824A7B000
trusted library allocation
page read and write
1EF02042000
trusted library allocation
page read and write
1EEF604D000
trusted library allocation
page read and write
1EF021AA000
trusted library allocation
page read and write
4761000
heap
page read and write
51264A25000
trusted library allocation
page read and write
1EEFB58D000
trusted library allocation
page read and write
1452000
heap
page read and write
1D804000
heap
page read and write
421E000
stack
page read and write
2881C315000
heap
page read and write
B60000
heap
page read and write
1EEF7019000
trusted library allocation
page read and write
1EF050A5000
trusted library allocation
page read and write
2881C305000
heap
page read and write
2882B047000
trusted library allocation
page read and write
1762CBB0000
trusted library allocation
page read and write
830000
unkown
page execute and write copy
1B60D000
stack
page read and write
1EEFA900000
trusted library allocation
page read and write
2882B279000
trusted library allocation
page read and write
11A0000
unkown
page execute and read and write
1EEEA630000
heap
page read and write
2EBF000
stack
page read and write
1EEF7CC3000
trusted library allocation
page read and write
28823654000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EF052C3000
trusted library allocation
page read and write
4761000
heap
page read and write
1173000
heap
page read and write
1EEFB03B000
trusted library allocation
page read and write
28823690000
trusted library allocation
page read and write
288260B2000
trusted library allocation
page read and write
1EEFED26000
trusted library allocation
page read and write
2AB6B1200000
trusted library allocation
page read and write
1EEFA700000
trusted library allocation
page read and write
5060000
heap
page read and write
4841000
heap
page read and write
4E80000
direct allocation
page execute and read and write
1EF05047000
trusted library allocation
page read and write
2882B17D000
trusted library allocation
page read and write
2882319E000
trusted library allocation
page read and write
1C77FE000
stack
page read and write
F82000
heap
page read and write
26344BEB000
trusted library allocation
page read and write
2881ECE0000
heap
page read and write
4AB0000
direct allocation
page read and write
2882E1ED000
trusted library allocation
page read and write
4D40000
heap
page read and write
1D809000
heap
page read and write
4841000
heap
page read and write
2882E1E3000
trusted library allocation
page read and write
4841000
heap
page read and write
A20000
unkown
page execute and write copy
1EEFC8E8000
trusted library allocation
page read and write
28823662000
trusted library allocation
page read and write
964000
heap
page read and write
1EEF9744000
trusted library allocation
page read and write
1EF0226A000
trusted library allocation
page read and write
B4B2CDE000
stack
page read and write
2881C30F000
heap
page read and write
2882BA10000
trusted library allocation
page read and write
51B0000
direct allocation
page read and write
1EEFB3DB000
trusted library allocation
page read and write
1524000
heap
page read and write
2882B8C5000
trusted library allocation
page read and write
2882B6BA000
trusted library allocation
page read and write
1EEFD56B000
trusted library allocation
page read and write
10EA1FB2000
heap
page read and write
36FF000
stack
page read and write
586D000
stack
page read and write
1EEF9700000
trusted library allocation
page read and write
1EEFB3E5000
trusted library allocation
page read and write
2882E167000
trusted library allocation
page read and write
1500000
heap
page read and write
1C67FD000
stack
page read and write
37BE000
stack
page read and write
D11000
unkown
page execute and write copy
2882D0F1000
trusted library allocation
page read and write
3F5F000
stack
page read and write
1762D9A9000
heap
page read and write
BB0000
heap
page read and write
1EEFB308000
trusted library allocation
page read and write
2881C326000
heap
page read and write
1762D949000
heap
page read and write
1EEF5E89000
trusted library allocation
page read and write
26344D20000
trusted library allocation
page read and write
1EF0276E000
trusted library allocation
page read and write
1EEFCB93000
trusted library allocation
page read and write
2881C318000
heap
page read and write
1EEF60BA000
trusted library allocation
page read and write
1EF03ACC000
trusted library allocation
page read and write
1EEFAEE0000
trusted library allocation
page read and write
10EA05E3000
heap
page read and write
2881F482000
trusted library allocation
page read and write
1471000
heap
page read and write
403F000
stack
page read and write
B4B2D1C000
stack
page read and write
1762CD10000
trusted library allocation
page read and write
1452000
heap
page read and write
287F000
stack
page read and write
5240000
direct allocation
page execute and read and write
1EEFD633000
trusted library allocation
page read and write
1AA8F000
stack
page read and write
1423000
heap
page read and write
E60000
direct allocation
page execute and read and write
2881C30D000
heap
page read and write
811000
unkown
page execute and write copy
1EF02491000
trusted library allocation
page read and write
1EEFC4FD000
trusted library allocation
page read and write
1EF04119000
trusted library allocation
page read and write
2882379C000
trusted library allocation
page read and write
1EEFAB98000
trusted library allocation
page read and write
561E000
stack
page read and write
1EF02303000
trusted library allocation
page read and write
CF3BEEE000
stack
page read and write
1EF050D1000
trusted library allocation
page read and write
1EEF9303000
trusted library allocation
page read and write
1EEFABDF000
trusted library allocation
page read and write
4890000
remote allocation
page read and write
1762D430000
heap
page read and write
28825DDE000
trusted library allocation
page read and write
1EEFB190000
trusted library section
page readonly
3EBE000
stack
page read and write
4761000
heap
page read and write
1EEFC5D9000
trusted library allocation
page read and write
4830000
direct allocation
page read and write
1EEFB39F000
trusted library allocation
page read and write
9F8000
unkown
page execute and read and write
1762DA2F000
heap
page read and write
58EE000
stack
page read and write
4D70000
direct allocation
page execute and read and write
1EEFAB31000
trusted library allocation
page read and write
CF390FE000
stack
page read and write
1EEFB3CB000
trusted library allocation
page read and write
2881C33C000
heap
page read and write
4841000
heap
page read and write
28824568000
trusted library allocation
page read and write
5E4000
heap
page read and write
1EEFB36D000
trusted library allocation
page read and write
2882B13C000
trusted library allocation
page read and write
4D31000
heap
page read and write
26344D00000
trusted library allocation
page read and write
28825294000
trusted library allocation
page read and write
1310000
heap
page read and write
28824B03000
trusted library allocation
page read and write
2882E10B000
trusted library allocation
page read and write
288260A3000
trusted library allocation
page read and write
288238BB000
trusted library allocation
page read and write
28823786000
trusted library allocation
page read and write
2882E2AC000
trusted library allocation
page read and write
2882B7C8000
trusted library allocation
page read and write
1EEF9AFB000
trusted library allocation
page read and write
4841000
heap
page read and write
1EEF60D7000
trusted library allocation
page read and write
64DE000
stack
page read and write
2882B3F3000
trusted library allocation
page read and write
1EEF950E000
trusted library allocation
page read and write
8CD000
unkown
page execute and read and write
2881C316000
heap
page read and write
83C000
unkown
page execute and write copy
1EEF7A9C000
trusted library allocation
page read and write
1EEFB786000
trusted library allocation
page read and write
2881EEE6000
trusted library allocation
page read and write
4621000
heap
page read and write
4D31000
heap
page read and write
76D000
stack
page read and write
1EEFB0AD000
trusted library allocation
page read and write
4DBE000
stack
page read and write
2882B88E000
trusted library allocation
page read and write
1EEEA4C0000
heap
page read and write
1EEF5C90000
trusted library allocation
page read and write
38589FE000
stack
page read and write
2882D87A000
trusted library allocation
page read and write
1EEF977A000
trusted library allocation
page read and write
1DCA4C705000
trusted library allocation
page read and write
2882BAE7000
trusted library allocation
page read and write
2882E1D4000
trusted library allocation
page read and write
1EEFBD72000
trusted library allocation
page read and write
28821200000
trusted library allocation
page read and write
323E000
stack
page read and write
2881C32A000
heap
page read and write
1EEFB953000
trusted library allocation
page read and write
2882B776000
trusted library allocation
page read and write
28825AE2000
trusted library allocation
page read and write
1EEFB7E5000
trusted library allocation
page read and write
2882B11A000
trusted library allocation
page read and write
1EEEA700000
trusted library allocation
page read and write
1EEF7042000
trusted library allocation
page read and write
2882B3D1000
trusted library allocation
page read and write
1EEFD922000
trusted library allocation
page read and write
4761000
heap
page read and write
1EEFC270000
trusted library allocation
page read and write
1D63E000
stack
page read and write
2881F756000
trusted library allocation
page read and write
1EEFBA53000
trusted library allocation
page read and write
1480000
heap
page read and write
D00000
trusted library allocation
page read and write
288236A0000
trusted library allocation
page read and write
526E000
stack
page read and write
1EEEC396000
heap
page read and write
1EF02090000
trusted library allocation
page read and write
FD000
unkown
page read and write
83B000
unkown
page execute and read and write
1148000
heap
page read and write
1EEFB589000
trusted library allocation
page read and write
2882E1B3000
trusted library allocation
page read and write
1EF02274000
trusted library allocation
page read and write
EB0000
direct allocation
page read and write
1EF02191000
trusted library allocation
page read and write
2881C305000
heap
page read and write
44DF000
stack
page read and write
993000
unkown
page execute and write copy
2882B666000
trusted library allocation
page read and write
FDC000
heap
page read and write
28823300000
trusted library allocation
page read and write
ED0000
heap
page read and write
1EEFAB98000
trusted library allocation
page read and write
1EF023A4000
trusted library allocation
page read and write
1EF03AC9000
trusted library allocation
page read and write
4E0F000
stack
page read and write
2881F3FB000
trusted library allocation
page read and write
1650000
direct allocation
page read and write
28823AE0000
trusted library section
page read and write
3856F0E000
unkown
page readonly
288237CB000
trusted library allocation
page read and write
1EEF78F2000
trusted library allocation
page read and write
439F000
stack
page read and write
2882B4CC000
trusted library allocation
page read and write
3B4000
heap
page read and write
288231E6000
trusted library allocation
page read and write
1F6B76D0000
unclassified section
page readonly
AB6000
unkown
page execute and write copy
1EF0524C000
trusted library allocation
page read and write
1EEF74FD000
trusted library allocation
page read and write
B4B2D5F000
stack
page read and write
1EEF8FE7000
trusted library allocation
page read and write
28823654000
trusted library allocation
page read and write
1EEFC1D8000
trusted library allocation
page read and write
2882E07A000
trusted library allocation
page read and write
1EEF99E2000
trusted library allocation
page read and write
28821100000
trusted library allocation
page read and write
1EEF9F30000
trusted library allocation
page read and write
1EEFD860000
trusted library section
page read and write
4841000
heap
page read and write
1EEF9703000
trusted library allocation
page read and write
4E11000
heap
page read and write
DA4000
heap
page read and write
1EEFA576000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
1EEFA475000
trusted library allocation
page read and write
1EF05382000
trusted library allocation
page read and write
1EEF70F3000
trusted library allocation
page read and write
1DCA4C70A000
trusted library allocation
page read and write
1EEF78C6000
trusted library allocation
page read and write
A30000
direct allocation
page read and write
A57000
unkown
page execute and write copy
DA4000
heap
page read and write
1EEFB380000
trusted library allocation
page read and write
CF3539A000
stack
page read and write
939D411000
trusted library allocation
page execute read
337E000
stack
page read and write
D00000
trusted library allocation
page read and write
DA4000
heap
page read and write
CF3EA1D000
stack
page read and write
4AAF000
stack
page read and write
28823690000
trusted library allocation
page read and write
328F000
stack
page read and write
2882D187000
trusted library allocation
page read and write
28825DE3000
trusted library allocation
page read and write
4E20000
heap
page read and write
1EF039F2000
trusted library allocation
page read and write
4761000
heap
page read and write
2882B000000
trusted library allocation
page read and write
1EEFC24B000
trusted library allocation
page read and write
2882383B000
trusted library allocation
page read and write
1EEFB37B000
trusted library allocation
page read and write
342F000
stack
page read and write
3BAF000
stack
page read and write
2882E163000
trusted library allocation
page read and write
4761000
heap
page read and write
2882D7E4000
trusted library allocation
page read and write
1EEF933B000
trusted library allocation
page read and write
117F000
heap
page read and write
4E11000
heap
page read and write
1EEF7CB8000
trusted library allocation
page read and write
1762D9AC000
heap
page read and write
2881F47D000
trusted library allocation
page read and write
1EEF6850000
trusted library section
page read and write
288260F4000
trusted library allocation
page read and write
1EEFB3E5000
trusted library allocation
page read and write
2881C305000
heap
page read and write
1EEFC2AB000
trusted library allocation
page read and write
2882600E000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EF050BC000
trusted library allocation
page read and write
2881C31D000
heap
page read and write
7C4000
heap
page read and write
10EA05DA000
heap
page read and write
1EEFAB38000
trusted library allocation
page read and write
1EEFB341000
trusted library allocation
page read and write
EE9000
unkown
page write copy
28821313000
trusted library allocation
page read and write
1EEF78C6000
trusted library allocation
page read and write
1471000
heap
page read and write
28823600000
trusted library allocation
page read and write
1D77D000
stack
page read and write
53DF000
stack
page read and write
28820C00000
trusted library allocation
page read and write
4841000
heap
page read and write
1EEFC243000
trusted library allocation
page read and write
3ABF000
stack
page read and write
2882E0B0000
trusted library allocation
page read and write
4E70000
direct allocation
page execute and read and write
2881F418000
trusted library allocation
page read and write
1EEFAD83000
trusted library allocation
page read and write
1EEFB703000
trusted library allocation
page read and write
288238FC000
trusted library allocation
page read and write
28824A4C000
trusted library allocation
page read and write
DA4000
heap
page read and write
EB0000
direct allocation
page read and write
1647000
heap
page read and write
1EEF6066000
trusted library allocation
page read and write
2882B706000
trusted library allocation
page read and write
2882385B000
trusted library allocation
page read and write
1EEFA826000
trusted library allocation
page read and write
26344B7F000
trusted library allocation
page read and write
1EEF920D000
trusted library allocation
page read and write
1175000
heap
page read and write
1EEFD659000
trusted library allocation
page read and write
830000
unkown
page execute and read and write
28824B19000
trusted library allocation
page read and write
1EEFB090000
trusted library allocation
page read and write
1EEFC10D000
trusted library allocation
page read and write
2881C345000
heap
page read and write
2882B8E8000
trusted library allocation
page read and write
26344990000
heap
page readonly
28826C9C000
trusted library allocation
page read and write
1EEFC50B000
trusted library allocation
page read and write
1EEFC503000
trusted library allocation
page read and write
CF406EE000
stack
page read and write
1EEFB4D5000
trusted library allocation
page read and write
2882D149000
trusted library allocation
page read and write
993000
unkown
page execute and write copy
28825CC3000
trusted library allocation
page read and write
1EEF699D000
unclassified section
page read and write
DA4000
heap
page read and write
1762DA98000
heap
page read and write
F1A000
heap
page read and write
1EEF69D0000
trusted library section
page readonly
1EF023BE000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
984000
heap
page read and write
2881C335000
heap
page read and write
F10000
heap
page read and write
1EEF70FB000
trusted library allocation
page read and write
1EEFB02F000
trusted library allocation
page read and write
28822D7B000
trusted library allocation
page read and write
28823CCB000
trusted library allocation
page read and write
28824B00000
trusted library allocation
page read and write
123C000
stack
page read and write
288242F2000
trusted library allocation
page read and write
2882B7D5000
trusted library allocation
page read and write
639E000
stack
page read and write
ACD000
unkown
page execute and write copy
36EE000
stack
page read and write
1435000
heap
page read and write
1EEFC414000
trusted library allocation
page read and write
1EF0419F000
trusted library allocation
page read and write
D11000
unkown
page execute and write copy
2882DFA2000
trusted library allocation
page read and write
28823658000
trusted library allocation
page read and write
1EF01E03000
trusted library allocation
page read and write
1EF02278000
trusted library allocation
page read and write
1EEF5DDF000
trusted library allocation
page read and write
2881C305000
heap
page read and write
288237CB000
trusted library allocation
page read and write
28823F32000
trusted library allocation
page read and write
1EEEC320000
heap
page read and write
1EEF9B73000
trusted library allocation
page read and write
CF3F25B000
stack
page read and write
1EEF7C43000
trusted library allocation
page read and write
1EEFD890000
unclassified section
page read and write
1762CD5F000
trusted library allocation
page read and write
1EF024BD000
trusted library allocation
page read and write
28825A96000
trusted library allocation
page read and write
6C91D000
unkown
page readonly
964000
heap
page read and write
2882510C000
trusted library allocation
page read and write
1EEFB745000
trusted library allocation
page read and write
13E4000
heap
page read and write
61ED3000
direct allocation
page read and write
1EEFB3F2000
trusted library allocation
page read and write
1EEF5CC0000
trusted library allocation
page read and write
11A0000
heap
page read and write
1435000
heap
page read and write
62F0E900000
trusted library allocation
page read and write
1EF04343000
trusted library allocation
page read and write
345C76E54000
trusted library allocation
page read and write
5B4000
heap
page read and write
4E11000
heap
page read and write
4D31000
heap
page read and write
2881F873000
trusted library allocation
page read and write
2881EF1E000
trusted library allocation
page read and write
1EEFDA02000
trusted library allocation
page read and write
2881F300000
trusted library allocation
page read and write
288244E0000
trusted library allocation
page read and write
CF3F29B000
stack
page read and write
1EF02200000
trusted library allocation
page read and write
1EF01E60000
trusted library allocation
page read and write
EE2000
unkown
page execute and read and write
1EEFA157000
heap
page read and write
2882BA2B000
trusted library allocation
page read and write
4E90000
direct allocation
page execute and read and write
4EC1000
heap
page read and write
1EEFB3DB000
trusted library allocation
page read and write
28813694000
trusted library allocation
page read and write
1EEF9900000
trusted library allocation
page read and write
D64000
heap
page read and write
1EEFA774000
trusted library allocation
page read and write
288208C7000
heap
page read and write
2882D817000
trusted library allocation
page read and write
2882D1CD000
trusted library allocation
page read and write
1EF024E2000
trusted library allocation
page read and write
DA4000
heap
page read and write
1D3FE000
stack
page read and write
D03000
unkown
page execute and read and write
2881F47D000
trusted library allocation
page read and write
4C51000
heap
page read and write
28823C50000
trusted library allocation
page read and write
1EEF5C98000
trusted library allocation
page read and write
2882B1D1000
trusted library allocation
page read and write
1EEFB000000
trusted library allocation
page read and write
E10000
heap
page read and write
2882B0DD000
trusted library allocation
page read and write
288231B8000
trusted library allocation
page read and write
2882DFA4000
trusted library allocation
page read and write
F52D10DE000
trusted library allocation
page read and write
15D4000
heap
page read and write
1EEFA5AD000
trusted library allocation
page read and write
1D801000
heap
page read and write
1762DAAC000
heap
page read and write
2882366A000
trusted library allocation
page read and write
2882BAC9000
trusted library allocation
page read and write
1EEF5F76000
trusted library allocation
page read and write
28826C37000
trusted library allocation
page read and write
2882B39F000
trusted library allocation
page read and write
DA0000
heap
page read and write
2882D1AB000
trusted library allocation
page read and write
28823763000
trusted library allocation
page read and write
1EEFD89D000
unclassified section
page read and write
1EEF5D6D000
trusted library allocation
page read and write
2882385B000
trusted library allocation
page read and write
1EF02000000
trusted library allocation
page read and write
ACD000
unkown
page execute and write copy
288241CB000
trusted library allocation
page read and write
2882E263000
trusted library allocation
page read and write
135C000
unkown
page execute and write copy
4E11000
heap
page read and write
2881F500000
trusted library allocation
page read and write
F90000
heap
page read and write
1524000
heap
page read and write
2882B00E000
trusted library allocation
page read and write
1EEFB372000
trusted library allocation
page read and write
1762CD0C000
trusted library allocation
page read and write
1EEF9247000
trusted library allocation
page read and write
28823855000
trusted library allocation
page read and write
1762DAB7000
heap
page read and write
1EEFCC8F000
trusted library allocation
page read and write
1D9DE000
stack
page read and write
28823698000
trusted library allocation
page read and write
1EF0429E000
trusted library allocation
page read and write
3050000
direct allocation
page read and write
5260000
direct allocation
page execute and read and write
EEF000
heap
page read and write
F26000
heap
page read and write
1EEF9747000
trusted library allocation
page read and write
DCD000
heap
page read and write
2882D000000
trusted library allocation
page read and write
DC2000
heap
page read and write
1524000
heap
page read and write
4E11000
heap
page read and write
B4B289E000
stack
page read and write
42C1000
heap
page read and write
28824B12000
trusted library allocation
page read and write
2881C334000
heap
page read and write
13E4000
heap
page read and write
9F8000
unkown
page execute and read and write
2882378A000
trusted library allocation
page read and write
1EEFC8AF000
trusted library allocation
page read and write
B4B0F3B000
stack
page read and write
288231A5000
trusted library allocation
page read and write
48C0000
direct allocation
page execute and read and write
1EF01E44000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
7C4000
heap
page read and write
2FB10000
trusted library allocation
page read and write
28824042000
trusted library allocation
page read and write
6CB25000
unkown
page readonly
13E0000
heap
page read and write
1650000
direct allocation
page read and write
28828010000
trusted library allocation
page read and write
4841000
heap
page read and write
1762D9BD000
heap
page read and write
5B4000
heap
page read and write
2882E1A8000
trusted library allocation
page read and write
1EEFCA24000
trusted library allocation
page read and write
1EEFB4C7000
trusted library allocation
page read and write
7C4000
heap
page read and write
E0ABFF000
stack
page read and write
4765000
heap
page read and write
355F000
stack
page read and write
1EEFA423000
trusted library allocation
page read and write
28814F35000
heap
page read and write
3DBF000
stack
page read and write
EB0000
direct allocation
page read and write
4840000
heap
page read and write
4841000
heap
page read and write
FF0000
direct allocation
page read and write
DA4000
heap
page read and write
335F000
stack
page read and write
46DF000
stack
page read and write
1EEFAD92000
trusted library allocation
page read and write
4761000
heap
page read and write
1EEF9A92000
trusted library allocation
page read and write
1762DA29000
heap
page read and write
1EEF5E0F000
trusted library allocation
page read and write
1EEFCA31000
trusted library allocation
page read and write
28B0003F000
trusted library allocation
page read and write
5270000
direct allocation
page execute and read and write
1EEFA55A000
trusted library allocation
page read and write
1EEFABFE000
trusted library allocation
page read and write
1EF024F2000
trusted library allocation
page read and write
1EEFC96B000
trusted library allocation
page read and write
4AC000
stack
page read and write
288238CD000
trusted library allocation
page read and write
2882D700000
trusted library allocation
page read and write
DDE000
heap
page read and write
2882B188000
trusted library allocation
page read and write
1EEFA7E9000
trusted library allocation
page read and write
288231AE000
trusted library allocation
page read and write
1EEF973E000
trusted library allocation
page read and write
2FFF000
stack
page read and write
2882B403000
trusted library allocation
page read and write
5B4000
heap
page read and write
1EEFA774000
trusted library allocation
page read and write
CF4002E000
stack
page read and write
1EF0211E000
trusted library allocation
page read and write
1EEFB9CF000
trusted library allocation
page read and write
1EEFBBD3000
trusted library allocation
page read and write
A1F000
unkown
page execute and read and write
4A0D000
stack
page read and write
1650000
direct allocation
page read and write
4E11000
heap
page read and write
28823EC8000
trusted library allocation
page read and write
2882E05B000
trusted library allocation
page read and write
43AE000
stack
page read and write
2882B82B000
trusted library allocation
page read and write
4C51000
heap
page read and write
4BAB000
trusted library allocation
page read and write
1EEFB070000
trusted library allocation
page read and write
41DF000
stack
page read and write
2882BAF8000
trusted library allocation
page read and write
A6E000
unkown
page execute and read and write
1EEFA725000
trusted library allocation
page read and write
DA4000
heap
page read and write
1EF0221D000
trusted library allocation
page read and write
28823800000
trusted library allocation
page read and write
EEB000
unkown
page execute and read and write
1EEFABDA000
trusted library allocation
page read and write
288231A5000
trusted library allocation
page read and write
1DC0000
trusted library allocation
page read and write
4C51000
heap
page read and write
10EA04B0000
heap
page read and write
1EEF9C13000
trusted library allocation
page read and write
28825FFD000
trusted library allocation
page read and write
4C51000
heap
page read and write
288231CD000
trusted library allocation
page read and write
6C30000
heap
page read and write
2881C30F000
heap
page read and write
1EEFAEF3000
trusted library allocation
page read and write
28825255000
trusted library allocation
page read and write
2881C32E000
heap
page read and write
327F000
stack
page read and write
1EEEA610000
heap
page readonly
2881C355000
heap
page read and write
9B8000
unkown
page execute and read and write
1EEF78F2000
trusted library allocation
page read and write
2881C305000
heap
page read and write
28824A94000
trusted library allocation
page read and write
1EF0509B000
trusted library allocation
page read and write
28825286000
trusted library allocation
page read and write
1EEF6627000
trusted library allocation
page read and write
1EEF9C13000
trusted library allocation
page read and write
3C7F000
stack
page read and write
1EEF5F00000
trusted library allocation
page read and write
51264ABB000
trusted library allocation
page read and write
4621000
heap
page read and write
1EEFC42F000
trusted library allocation
page read and write
9FE000
unkown
page execute and read and write
1EF050B0000
trusted library allocation
page read and write
1EEF6310000
heap
page read and write
28820663000
trusted library allocation
page read and write
1EEFADAB000
trusted library allocation
page read and write
7E5000
stack
page read and write
1EF01D32000
trusted library allocation
page read and write
2882AE00000
trusted library allocation
page read and write
487F000
stack
page read and write
B4B359D000
stack
page read and write
5350000
direct allocation
page execute and read and write
4E11000
heap
page read and write
2882445B000
trusted library allocation
page read and write
1EEF7415000
trusted library allocation
page read and write
1EF022D1000
trusted library allocation
page read and write
2881EF20000
trusted library allocation
page read and write
28822BCF000
trusted library allocation
page read and write
1F6B7C7D000
trusted library allocation
page read and write
288213E4000
trusted library allocation
page read and write
2881F825000
trusted library allocation
page read and write
2882364D000
trusted library allocation
page read and write
403F000
stack
page read and write
1EF052A3000
trusted library allocation
page read and write
CF3C0FB000
stack
page read and write
3FBF000
stack
page read and write
2882BA03000
trusted library allocation
page read and write
288205C6000
trusted library allocation
page read and write
1EEFFE18000
trusted library allocation
page read and write
503F000
stack
page read and write
2882B3BD000
trusted library allocation
page read and write
1EF01DCE000
trusted library allocation
page read and write
2882B398000
trusted library allocation
page read and write
4C51000
heap
page read and write
2881F4D7000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
482F000
stack
page read and write
288237A2000
trusted library allocation
page read and write
1EEFC277000
trusted library allocation
page read and write
2882D7DB000
trusted library allocation
page read and write
13DB000
stack
page read and write
1EF05203000
trusted library allocation
page read and write
5060000
heap
page read and write
2881F426000
trusted library allocation
page read and write
3050000
direct allocation
page read and write
1F6B7D1B000
trusted library allocation
page read and write
368E000
stack
page read and write
2882D008000
trusted library allocation
page read and write
1EF03AB1000
trusted library allocation
page read and write
1F6B7C72000
trusted library allocation
page read and write
2882E047000
trusted library allocation
page read and write
28823650000
trusted library allocation
page read and write
2881C2FE000
heap
page read and write
2882CD16000
trusted library allocation
page read and write
BDFEFB8000
stack
page read and write
4761000
heap
page read and write
8C1000
unkown
page execute and read and write
1EEFB39D000
trusted library allocation
page read and write
2882D113000
trusted library allocation
page read and write
2881C305000
heap
page read and write
1EEFB3DB000
trusted library allocation
page read and write
1EEEC39A000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
B5C81FE000
unkown
page readonly
2882D1EB000
trusted library allocation
page read and write
1EF02427000
trusted library allocation
page read and write
1EEF7890000
trusted library allocation
page read and write
1EEF7653000
trusted library allocation
page read and write
5170000
trusted library allocation
page read and write
288231B8000
trusted library allocation
page read and write
F49000
heap
page read and write
1EEFC900000
trusted library allocation
page read and write
2882B3A6000
trusted library allocation
page read and write
3B79F8F04000
trusted library allocation
page read and write
28821327000
trusted library allocation
page read and write
4770000
heap
page read and write
9D2000
unkown
page execute and read and write
1EEFB0F2000
trusted library allocation
page read and write
2B3E000
stack
page read and write
52A1000
trusted library allocation
page read and write
28823C54000
trusted library allocation
page read and write
1EEEA634000
heap
page read and write
2882387D000
trusted library allocation
page read and write
397F000
stack
page read and write
5E000
unkown
page readonly
3AAF000
stack
page read and write
2D7F000
stack
page read and write
2882E052000
trusted library allocation
page read and write
331E000
stack
page read and write
54B0000
direct allocation
page execute and read and write
2882B263000
trusted library allocation
page read and write
1EF054A0000
trusted library allocation
page read and write
1524000
heap
page read and write
1EEFC123000
trusted library allocation
page read and write
28821319000
trusted library allocation
page read and write
2881F800000
trusted library allocation
page read and write
1D83B000
heap
page read and write
B4B329F000
stack
page read and write
ADB000
unkown
page execute and read and write
1EEFB486000
trusted library allocation
page read and write
2882CD32000
trusted library allocation
page read and write
1762DA98000
heap
page read and write
1F6B7D32000
trusted library allocation
page read and write
1EEFB48B000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EF01FDA000
trusted library allocation
page read and write
2882368B000
trusted library allocation
page read and write
7C4000
heap
page read and write
4841000
heap
page read and write
1EEFA5BA000
trusted library allocation
page read and write
28825F03000
trusted library allocation
page read and write
1EEF76E6000
trusted library allocation
page read and write
E70000
direct allocation
page read and write
15D4000
heap
page read and write
1EEF93D3000
trusted library allocation
page read and write
1EEFCB9F000
trusted library allocation
page read and write
1EEF66A4000
trusted library allocation
page read and write
4761000
heap
page read and write
B4A9BEC000
stack
page read and write
2882B61F000
trusted library allocation
page read and write
CF3F3DC000
stack
page read and write
4D31000
heap
page read and write
1D806000
heap
page read and write
139E000
stack
page read and write
9B7000
unkown
page execute and write copy
2882D107000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
2881C30E000
heap
page read and write
CF3EB5E000
stack
page read and write
2882DF00000
trusted library allocation
page read and write
3B4000
heap
page read and write
1762DA84000
heap
page read and write
1EEF9804000
trusted library allocation
page read and write
1524000
heap
page read and write
1D87C000
stack
page read and write
984000
heap
page read and write
1EEF5D8A000
trusted library allocation
page read and write
28825FF5000
trusted library allocation
page read and write
2882B3AD000
trusted library allocation
page read and write
2882E25D000
trusted library allocation
page read and write
5520000
direct allocation
page execute and read and write
49CD000
stack
page read and write
18163AD9000
heap
page read and write
CF3E9DC000
stack
page read and write
1762DA31000
heap
page read and write
1EEF8E03000
trusted library allocation
page read and write
1EEFBA8F000
trusted library allocation
page read and write
1EF050FE000
trusted library allocation
page read and write
116A000
heap
page read and write
1083000
unkown
page execute and read and write
2882B8BD000
trusted library allocation
page read and write
1D912000
heap
page read and write
4E11000
heap
page read and write
2882B39B000
trusted library allocation
page read and write
2C67BAC04000
trusted library allocation
page read and write
4D31000
heap
page read and write
83A000
unkown
page execute and write copy
964000
heap
page read and write
F5F000
heap
page read and write
2882D0C2000
trusted library allocation
page read and write
1EEF9733000
trusted library allocation
page read and write
5250000
direct allocation
page execute and read and write
13FE000
heap
page read and write
556D000
stack
page read and write
288219C0000
trusted library section
page readonly
2882D0C0000
trusted library allocation
page read and write
7C4000
heap
page read and write
2882B37F000
trusted library allocation
page read and write
28825113000
trusted library allocation
page read and write
1EF01E4D000
trusted library allocation
page read and write
2AFF000
stack
page read and write
541E000
stack
page read and write
4E0000
unkown
page readonly
28826007000
trusted library allocation
page read and write
1EEFB39F000
trusted library allocation
page read and write
1524000
heap
page read and write
1EEF6003000
trusted library allocation
page read and write
4D31000
heap
page read and write
2882384A000
trusted library allocation
page read and write
1EF044EC000
trusted library allocation
page read and write
1EEFB599000
trusted library allocation
page read and write
42C1000
heap
page read and write
1EEFB78A000
trusted library allocation
page read and write
2DBE000
stack
page read and write
3050000
direct allocation
page read and write
CCF000
heap
page read and write
1EEFC8E1000
trusted library allocation
page read and write
4E11000
heap
page read and write
1762DA40000
heap
page read and write
1EEFD6AD000
trusted library allocation
page read and write
3AFE000
stack
page read and write
14C8000
heap
page read and write
44AE000
stack
page read and write
1EF01D00000
trusted library allocation
page read and write
1EEFBA65000
trusted library allocation
page read and write
3050000
direct allocation
page read and write
1EF039E1000
trusted library allocation
page read and write
304E000
stack
page read and write
1D807000
heap
page read and write
2882E02B000
trusted library allocation
page read and write
1140000
heap
page read and write
1D81E000
heap
page read and write
D6C000
heap
page read and write
1EF03703000
trusted library allocation
page read and write
28824A51000
trusted library allocation
page read and write
5550000
direct allocation
page execute and read and write
28825F90000
trusted library allocation
page read and write
2881ED81000
trusted library allocation
page read and write
2A4E000
stack
page read and write
2881F7D3000
trusted library allocation
page read and write
4761000
heap
page read and write
1EEF5CC8000
trusted library allocation
page read and write
B5C93FE000
unkown
page readonly
12FD000
stack
page read and write
373E000
stack
page read and write
4C3F000
stack
page read and write
1EF05410000
trusted library allocation
page read and write
1EEFB482000
trusted library allocation
page read and write
4761000
heap
page read and write
4621000
heap
page read and write
3050000
direct allocation
page read and write
2882E0B9000
trusted library allocation
page read and write
1650000
direct allocation
page read and write
1EF052FE000
trusted library allocation
page read and write
83B000
unkown
page execute and read and write
1EEFD9A1000
trusted library allocation
page read and write
1762CD61000
trusted library allocation
page read and write
4841000
heap
page read and write
2882B3FD000
trusted library allocation
page read and write
1EEF9100000
trusted library allocation
page read and write
1EF020A9000
trusted library allocation
page read and write
311E000
stack
page read and write
1EF01FEE000
trusted library allocation
page read and write
7B0000
direct allocation
page read and write
28813600000
trusted library allocation
page read and write
288242F5000
trusted library allocation
page read and write
28826081000
trusted library allocation
page read and write
2882D1A2000
trusted library allocation
page read and write
1EF01F99000
trusted library allocation
page read and write
1EEFB39B000
trusted library allocation
page read and write
3FAF000
stack
page read and write
4841000
heap
page read and write
18B000
stack
page read and write
D00000
trusted library allocation
page read and write
1EEFC48C000
trusted library allocation
page read and write
1EEF7C9E000
trusted library allocation
page read and write
2882E161000
trusted library allocation
page read and write
2882BAAC000
trusted library allocation
page read and write
CD5000
unkown
page execute and read and write
A38000
unkown
page execute and write copy
3F2979C68000
trusted library allocation
page read and write
288205A8000
trusted library allocation
page read and write
5290000
direct allocation
page execute and read and write
1EEF7AA4000
trusted library allocation
page read and write
45EF000
stack
page read and write
1EEF5F2F000
trusted library allocation
page read and write
1EF052C3000
trusted library allocation
page read and write
1524000
heap
page read and write
4890000
remote allocation
page read and write
B5C5F8D000
stack
page read and write
1EEF64E3000
trusted library allocation
page read and write
55DE000
stack
page read and write
1EEFB37B000
trusted library allocation
page read and write
2882D1E9000
trusted library allocation
page read and write
E07000
heap
page read and write
1EEF7C8C000
trusted library allocation
page read and write
35DF000
stack
page read and write
2881C33C000
heap
page read and write
1EEF96CB000
trusted library allocation
page read and write
4E11000
heap
page read and write
59EF000
stack
page read and write
49FE000
stack
page read and write
1EEFBAEE000
trusted library allocation
page read and write
BDB000
stack
page read and write
85B0000
heap
page read and write
36AF000
stack
page read and write
28820D0D000
trusted library allocation
page read and write
4761000
heap
page read and write
1EEFB39F000
trusted library allocation
page read and write
26344BA2000
trusted library allocation
page read and write
5340000
direct allocation
page execute and read and write
2882D0D4000
trusted library allocation
page read and write
9E8000
unkown
page execute and write copy
288231C7000
trusted library allocation
page read and write
1762DA84000
heap
page read and write
437F000
stack
page read and write
4EC0000
heap
page read and write
1083000
unkown
page execute and read and write
1762D9EA000
heap
page read and write
1EEF78DA000
trusted library allocation
page read and write
2882E167000
trusted library allocation
page read and write
28824341000
trusted library allocation
page read and write
DA4000
heap
page read and write
1EEFC9C3000
trusted library allocation
page read and write
2881ECD2000
unclassified section
page read and write
1EF02375000
trusted library allocation
page read and write
1D83D000
heap
page read and write
4841000
heap
page read and write
28826CBA000
trusted library allocation
page read and write
2881C32A000
heap
page read and write
4AA0000
remote allocation
page read and write
2881EFBD000
trusted library allocation
page read and write
F61000
heap
page read and write
1EEFAD4B000
trusted library allocation
page read and write
4761000
heap
page read and write
28826ABF000
trusted library allocation
page read and write
1EEF91DA000
trusted library allocation
page read and write
10EA0600000
trusted library allocation
page read and write
1EF02782000
trusted library allocation
page read and write
DA4000
heap
page read and write
1EEF8F05000
trusted library allocation
page read and write
6600000
heap
page read and write
2882AC00000
trusted library allocation
page read and write
28814F94000
heap
page read and write
4AA0000
remote allocation
page read and write
443E000
stack
page read and write
1762CB6F000
unclassified section
page read and write
288244CD000
trusted library allocation
page read and write
1EEF8F53000
trusted library allocation
page read and write
1EF0509D000
trusted library allocation
page read and write
3CDF000
stack
page read and write
1EEFB3A1000
trusted library allocation
page read and write
49AE000
stack
page read and write
1EF052C5000
trusted library allocation
page read and write
2882DFFD000
trusted library allocation
page read and write
4761000
heap
page read and write
1762D3F0000
heap
page read and write
4761000
heap
page read and write
2882E177000
trusted library allocation
page read and write
1EF024AD000
trusted library allocation
page read and write
8FF000
unkown
page execute and read and write
1EEFD5A8000
trusted library allocation
page read and write
4E11000
heap
page read and write
1762CD81000
trusted library allocation
page read and write
1EEF9BB5000
trusted library allocation
page read and write
28813630000
trusted library allocation
page read and write
1D809000
heap
page read and write
1EEFC247000
trusted library allocation
page read and write
1EEF64A1000
trusted library allocation
page read and write
CF3F21B000
stack
page read and write
2D5E000
stack
page read and write
1EEF8E2A000
trusted library allocation
page read and write
2882368B000
trusted library allocation
page read and write
2882368B000
trusted library allocation
page read and write
9BB000
unkown
page execute and write copy
288237CB000
trusted library allocation
page read and write
1EEF7809000
trusted library allocation
page read and write
1EF04246000
trusted library allocation
page read and write
1EF05253000
trusted library allocation
page read and write
F1A000
heap
page read and write
391F000
stack
page read and write
40000
unkown
page readonly
549D000
stack
page read and write
1EEFC029000
trusted library allocation
page read and write
1EEF7848000
trusted library allocation
page read and write
28823650000
trusted library allocation
page read and write
1650000
direct allocation
page read and write
38BF000
stack
page read and write
2881C305000
heap
page read and write
56AC000
stack
page read and write
CA0000
heap
page read and write
13E4000
heap
page read and write
1EEFB9D8000
trusted library allocation
page read and write
288237A2000
trusted library allocation
page read and write
7D0000
unkown
page readonly
1EEFC2EF000
trusted library allocation
page read and write
C9E000
stack
page read and write
1EEFC591000
trusted library allocation
page read and write
5260000
direct allocation
page execute and read and write
2881EE00000
trusted library allocation
page read and write
288237CB000
trusted library allocation
page read and write
1EEFA592000
trusted library allocation
page read and write
28820941000
heap
page read and write
ACD000
unkown
page execute and write copy
4DD0000
direct allocation
page execute and read and write
4761000
heap
page read and write
3E7F000
stack
page read and write
2882E161000
trusted library allocation
page read and write
4D31000
heap
page read and write
1EF0399D000
trusted library allocation
page read and write
1EEF605C000
trusted library allocation
page read and write
2881C32C000
heap
page read and write
1163000
heap
page read and write
288208B0000
heap
page read and write
2882B4D9000
trusted library allocation
page read and write
28823B00000
trusted library allocation
page read and write
45FF000
stack
page read and write
1EF01F46000
trusted library allocation
page read and write
2881F47F000
trusted library allocation
page read and write
11A0000
unkown
page execute and read and write
1762DAB7000
heap
page read and write
A3A000
unkown
page execute and read and write
28825DF4000
trusted library allocation
page read and write
1EEF96EB000
trusted library allocation
page read and write
1EEF65AD000
trusted library allocation
page read and write
1EF051A7000
trusted library allocation
page read and write
372E000
stack
page read and write
1EEFA67D000
trusted library allocation
page read and write
1EEFB0BA000
trusted library allocation
page read and write
1EF020B9000
trusted library allocation
page read and write
1F6B76C0000
unclassified section
page readonly
8A9000
stack
page read and write
A95000
unkown
page execute and read and write
28824103000
trusted library allocation
page read and write
1EEF9A5C000
trusted library allocation
page read and write
2882DFB7000
trusted library allocation
page read and write
1EEF70AB000
trusted library allocation
page read and write
A20000
unkown
page execute and write copy
288231C9000
trusted library allocation
page read and write
44BF000
stack
page read and write
BD827FE000
unkown
page readonly
1D838000
heap
page read and write
1EF04339000
trusted library allocation
page read and write
1B5BD500000
heap
page read and write
1EF024A9000
trusted library allocation
page read and write
1EF04237000
trusted library allocation
page read and write
1EF01FFB000
trusted library allocation
page read and write
65EF141000
trusted library allocation
page execute read
1EEF6010000
trusted library allocation
page read and write
1EF023EB000
trusted library allocation
page read and write
1EEF99A2000
trusted library allocation
page read and write
BDFFAFE000
stack
page read and write
4841000
heap
page read and write
28814F61000
heap
page read and write
2881C362000
heap
page read and write
1EF05077000
trusted library allocation
page read and write
1EEFCBA5000
trusted library allocation
page read and write
5480000
direct allocation
page execute and read and write
4E00000
direct allocation
page execute and read and write
53F0000
direct allocation
page execute and read and write
4890000
remote allocation
page read and write
28823603000
trusted library allocation
page read and write
1EEFAECF000
trusted library allocation
page read and write
A3B000
unkown
page execute and write copy
18163ED0000
heap
page read and write
2881F7FE000
trusted library allocation
page read and write
28825F90000
trusted library allocation
page read and write
28823F3B000
trusted library allocation
page read and write
3F4E000
stack
page read and write
1EEF7AC8000
trusted library allocation
page read and write
FF0000
direct allocation
page read and write
1EF020C5000
trusted library allocation
page read and write
1762CD23000
trusted library allocation
page read and write
2882B387000
trusted library allocation
page read and write
1EF05056000
trusted library allocation
page read and write
1EEFD800000
trusted library section
page read and write
288260F4000
trusted library allocation
page read and write
423F000
stack
page read and write
390000
heap
page read and write
1EEF70A2000
trusted library allocation
page read and write
1D814000
heap
page read and write
1EF0204C000
trusted library allocation
page read and write
4621000
heap
page read and write
487F000
stack
page read and write
385923E000
unkown
page readonly
1EF02210000
trusted library allocation
page read and write
35AE000
stack
page read and write
4761000
heap
page read and write
28822D43000
trusted library allocation
page read and write
EE2000
unkown
page execute and read and write
2882B4EB000
trusted library allocation
page read and write
1EEF9DB3000
trusted library allocation
page read and write
1EEFB3A1000
trusted library allocation
page read and write
A20000
unkown
page execute and write copy
1EEF66FD000
trusted library allocation
page read and write
1EF039B7000
trusted library allocation
page read and write
2882362C000
trusted library allocation
page read and write
472F000
stack
page read and write
537E000
stack
page read and write
1EEFB445000
trusted library allocation
page read and write
1F6B7940000
heap
page read and write
1EEFB343000
trusted library allocation
page read and write
1EF01D38000
trusted library allocation
page read and write
1EF051DC000
trusted library allocation
page read and write
2C1E000
stack
page read and write
288237CB000
trusted library allocation
page read and write
92E000
unkown
page execute and read and write
7C4000
heap
page read and write
28823C4D000
trusted library allocation
page read and write
7C4000
heap
page read and write
FC3000
heap
page read and write
42FE000
stack
page read and write
1EEF9EE3000
trusted library allocation
page read and write
15D0000
heap
page read and write
1EEF8F13000
trusted library allocation
page read and write
2881C315000
heap
page read and write
288238B6000
trusted library allocation
page read and write
7B0000
direct allocation
page read and write
5B50000
heap
page read and write
4841000
heap
page read and write
2882B164000
trusted library allocation
page read and write
1D809000
heap
page read and write
1762DA31000
heap
page read and write
1EEFB3E1000
trusted library allocation
page read and write
1EF0374A000
trusted library allocation
page read and write
1EEF9611000
trusted library allocation
page read and write
1EF022C3000
trusted library allocation
page read and write
2882BAF4000
trusted library allocation
page read and write
2E9E000
stack
page read and write
1EF037E9000
trusted library allocation
page read and write
2881EEA9000
trusted library allocation
page read and write
A57000
unkown
page execute and write copy
263447EA000
heap
page read and write
1EEF5C4A000
trusted library allocation
page read and write
2881ED03000
trusted library allocation
page read and write
1EEFC5ED000
trusted library allocation
page read and write
1EEFB36D000
trusted library allocation
page read and write
2882BA9B000
trusted library allocation
page read and write
1F6B7730000
remote allocation
page read and write
2882E1F1000
trusted library allocation
page read and write
26344B61000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EEF7403000
trusted library allocation
page read and write
2882CD00000
trusted library allocation
page read and write
1D83D000
heap
page read and write
4830000
direct allocation
page read and write
2881C2FF000
heap
page read and write
2881366A000
trusted library allocation
page read and write
4841000
heap
page read and write
1EEF9ABC000
trusted library allocation
page read and write
28823662000
trusted library allocation
page read and write
1EF020D9000
trusted library allocation
page read and write
4D31000
direct allocation
page read and write
1EEFD932000
trusted library allocation
page read and write
318C000
stack
page read and write
3F3E000
stack
page read and write
2881C316000
heap
page read and write
288238BE000
trusted library allocation
page read and write
29971000
heap
page read and write
2882138C000
trusted library allocation
page read and write
1D83D000
heap
page read and write
1EF01F13000
trusted library allocation
page read and write
1EEFA124000
heap
page read and write
382E000
stack
page read and write
28828020000
trusted library allocation
page read and write
1762CD03000
trusted library allocation
page read and write
2882378A000
trusted library allocation
page read and write
1EF050E8000
trusted library allocation
page read and write
1EF01E2D000
trusted library allocation
page read and write
2882B6AD000
trusted library allocation
page read and write
7C4000
heap
page read and write
1EF04149000
trusted library allocation
page read and write
4841000
heap
page read and write
1EEF9F3D000
trusted library allocation
page read and write
CD5000
unkown
page execute and read and write
1EEF607D000
trusted library allocation
page read and write
AC3000
unkown
page execute and read and write
14C7000
heap
page read and write
1EEFED24000
trusted library allocation
page read and write
1EF01E23000
trusted library allocation
page read and write
1890000
heap
page read and write
4D31000
heap
page read and write
1EF05263000
trusted library allocation
page read and write
2881C321000
heap
page read and write
1F6B7C10000
trusted library allocation
page read and write
1D83B000
heap
page read and write
471000
unkown
page execute read
1EEF924E000
trusted library allocation
page read and write
2882D0F3000
trusted library allocation
page read and write
1470000
heap
page read and write
1EEF9359000
trusted library allocation
page read and write
3B9F000
stack
page read and write
2882B803000
trusted library allocation
page read and write
26344843000
heap
page read and write
2882DF64000
trusted library allocation
page read and write
1524000
heap
page read and write
FA0000
heap
page read and write
1EEF997D000
trusted library allocation
page read and write
2881366D000
trusted library allocation
page read and write
B4B2C5D000
stack
page read and write
1660000
heap
page read and write
13E4000
heap
page read and write
2881C30D000
heap
page read and write
145D000
stack
page read and write
1EEFABE2000
trusted library allocation
page read and write
2882E177000
trusted library allocation
page read and write
1EEF953C000
trusted library allocation
page read and write
1EEF9103000
trusted library allocation
page read and write
11AF000
unkown
page execute and write copy
1EEFA119000
heap
page read and write
1EF05234000
trusted library allocation
page read and write
1EEF74DF000
trusted library allocation
page read and write
1EEF99DF000
trusted library allocation
page read and write
2881C30D000
heap
page read and write
1EEFB335000
trusted library allocation
page read and write
2882E1EA000
trusted library allocation
page read and write
2882445D000
trusted library allocation
page read and write
288231DE000
trusted library allocation
page read and write
1EEFB39D000
trusted library allocation
page read and write
2882BA6A000
trusted library allocation
page read and write
28823890000
trusted library allocation
page read and write
1EEF9165000
trusted library allocation
page read and write
3F6F000
stack
page read and write
28822A44000
trusted library allocation
page read and write
551F000
stack
page read and write
576D000
stack
page read and write
3050000
direct allocation
page read and write
1EEFC192000
trusted library allocation
page read and write
1EEFB07C000
trusted library allocation
page read and write
1EEF5C81000
trusted library allocation
page read and write
1EF03923000
trusted library allocation
page read and write
4841000
heap
page read and write
476E000
stack
page read and write
2882E103000
trusted library allocation
page read and write
1468000
heap
page read and write
28826A57000
trusted library allocation
page read and write
1EEFC1D5000
trusted library allocation
page read and write
42C1000
heap
page read and write
4E11000
heap
page read and write
1EEFAABC000
trusted library allocation
page read and write
2881F87B000
trusted library allocation
page read and write
2882B7E6000
trusted library allocation
page read and write
83A000
unkown
page execute and write copy
4841000
heap
page read and write
12F5000
stack
page read and write
2881C30B000
heap
page read and write
26344B96000
trusted library allocation
page read and write
1EEFB471000
trusted library allocation
page read and write
2882385E000
trusted library allocation
page read and write
DA4000
heap
page read and write
1EEFD722000
trusted library allocation
page read and write
991000
unkown
page execute and read and write
85B1000
heap
page read and write
1EF05483000
trusted library allocation
page read and write
1EF023A4000
trusted library allocation
page read and write
1EEF9EEE000
trusted library allocation
page read and write
288238A3000
trusted library allocation
page read and write
26344740000
unclassified section
page readonly
1EEF9C0C000
trusted library allocation
page read and write
1EEF60C6000
trusted library allocation
page read and write
1EEFABD5000
trusted library allocation
page read and write
1EEFB39F000
trusted library allocation
page read and write
4EC0000
direct allocation
page execute and read and write
4D90000
direct allocation
page execute and read and write
288245C2000
trusted library allocation
page read and write
1D817000
heap
page read and write
2882DF77000
trusted library allocation
page read and write
B5C82FE000
unkown
page readonly
1D806000
heap
page read and write
1D39E000
stack
page read and write
1EEF9E4B000
trusted library allocation
page read and write
4E30000
direct allocation
page execute and read and write
29C000
unkown
page readonly
1EF039C0000
trusted library allocation
page read and write
2882523B000
trusted library allocation
page read and write
11AE000
unkown
page execute and write copy
2882D803000
trusted library allocation
page read and write
1EEF649B000
trusted library allocation
page read and write
2881C2FE000
heap
page read and write
1EEFA3C1000
trusted library allocation
page read and write
4890000
direct allocation
page execute and read and write
1EF022DE000
trusted library allocation
page read and write
CF3C6FB000
stack
page read and write
1EEFB003000
trusted library allocation
page read and write
28823FD9000
trusted library allocation
page read and write
1D82D000
heap
page read and write
28826A5E000
trusted library allocation
page read and write
7C4000
heap
page read and write
3BFF000
stack
page read and write
1EEF749E000
trusted library allocation
page read and write
288231A5000
trusted library allocation
page read and write
1D820000
heap
page read and write
2881C30F000
heap
page read and write
1EEFB05F000
trusted library allocation
page read and write
2882D0CF000
trusted library allocation
page read and write
4C30000
direct allocation
page execute and read and write
288237CB000
trusted library allocation
page read and write
1EF05070000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EEFD5C9000
trusted library allocation
page read and write
1EEF9000000
trusted library allocation
page read and write
1EEFBB01000
trusted library allocation
page read and write
1EEF9BF3000
trusted library allocation
page read and write
B4AC8BB000
stack
page read and write
2882D0F3000
trusted library allocation
page read and write
1EEFB3CB000
trusted library allocation
page read and write
2881C30C000
heap
page read and write
65EF081000
trusted library allocation
page execute read
28824ABD000
trusted library allocation
page read and write
DA4000
heap
page read and write
28822D43000
trusted library allocation
page read and write
470000
unkown
page readonly
1EF050B3000
trusted library allocation
page read and write
1EEFBC89000
trusted library allocation
page read and write
28825F00000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EEFB4B9000
trusted library allocation
page read and write
28823EF1000
trusted library allocation
page read and write
1EF053AA000
trusted library allocation
page read and write
1EF02392000
trusted library allocation
page read and write
3ADF000
stack
page read and write
3580000
heap
page read and write
1762C900000
unclassified section
page readonly
323E000
stack
page read and write
2881C368000
heap
page read and write
1EEF5D00000
trusted library allocation
page read and write
1EEFD5DF000
trusted library allocation
page read and write
288244E0000
trusted library allocation
page read and write
1EF044E6000
trusted library allocation
page read and write
1EF024AB000
trusted library allocation
page read and write
1EEF9DFC000
trusted library allocation
page read and write
4D80000
direct allocation
page execute and read and write
1EEFD567000
trusted library allocation
page read and write
367E000
stack
page read and write
1EF023AF000
trusted library allocation
page read and write
28824503000
trusted library allocation
page read and write
417F000
stack
page read and write
2882B3CE000
trusted library allocation
page read and write
1EEF7900000
trusted library allocation
page read and write
1670000
heap
page read and write
10EA1FAC000
heap
page read and write
28822A03000
trusted library allocation
page read and write
1EEF99DF000
trusted library allocation
page read and write
4E11000
heap
page read and write
1EEFABCC000
trusted library allocation
page read and write
2881C334000
heap
page read and write
4841000
heap
page read and write
1EF022FA000
trusted library allocation
page read and write
1EEFB465000
trusted library allocation
page read and write
984000
heap
page read and write
1EF05082000
trusted library allocation
page read and write
1EEFC5F2000
trusted library allocation
page read and write
4E11000
heap
page read and write
885000
heap
page read and write
1762D9A0000
heap
page read and write
28822BE6000
trusted library allocation
page read and write
2882E0B0000
trusted library allocation
page read and write
1EF05400000
trusted library allocation
page read and write
1EEFB4F2000
trusted library allocation
page read and write
7A0000
heap
page read and write
4841000
heap
page read and write
1EF0505C000
trusted library allocation
page read and write
1EEF9ADD000
trusted library allocation
page read and write
1EEF7108000
trusted library allocation
page read and write
116C000
heap
page read and write
2882BAF8000
trusted library allocation
page read and write
4D8E000
stack
page read and write
CF380FE000
stack
page read and write
1EF051CC000
trusted library allocation
page read and write
353E000
stack
page read and write
4841000
heap
page read and write
CF3EA9E000
stack
page read and write
4F2B000
trusted library allocation
page read and write
2882379C000
trusted library allocation
page read and write
2881C334000
heap
page read and write
417F000
stack
page read and write
1EEF5EFB000
trusted library allocation
page read and write
1EEFB391000
trusted library allocation
page read and write
1EEFAF2F000
trusted library allocation
page read and write
B4ABFFE000
stack
page read and write
3E6E000
stack
page read and write
1EEFCA6B000
trusted library allocation
page read and write
2882E047000
trusted library allocation
page read and write
AC3000
unkown
page execute and write copy
288230EC000
trusted library allocation
page read and write
1EF052C5000
trusted library allocation
page read and write
28826CFA000
trusted library allocation
page read and write
1EEFB0F8000
trusted library allocation
page read and write
10EA0707000
trusted library allocation
page read and write
65EF171000
trusted library allocation
page execute read
42C1000
heap
page read and write
4C51000
heap
page read and write
1EF05200000
trusted library allocation
page read and write
1EF05356000
trusted library allocation
page read and write
1EF050C9000
trusted library allocation
page read and write
1EF01E65000
trusted library allocation
page read and write
38FE000
stack
page read and write
81FC000
stack
page read and write
1EF02387000
trusted library allocation
page read and write
1D17E000
stack
page read and write
28824000000
trusted library allocation
page read and write
28825271000
trusted library allocation
page read and write
1EEFB900000
trusted library allocation
page read and write
540000
unkown
page write copy
544F000
trusted library allocation
page read and write
13E4000
heap
page read and write
1762DAAC000
heap
page read and write
954000
heap
page read and write
B4B279C000
stack
page read and write
9DB000
unkown
page execute and read and write
F49000
heap
page read and write
37EF000
stack
page read and write
1280000
heap
page read and write
1D27F000
stack
page read and write
1524000
heap
page read and write
65DF000
stack
page read and write
12FF000
stack
page read and write
F05000
heap
page read and write
28821361000
trusted library allocation
page read and write
1D4EE000
stack
page read and write
4761000
heap
page read and write
1EEF66E8000
trusted library allocation
page read and write
146E000
heap
page read and write
1EEEC385000
heap
page read and write
1EEF9F78000
trusted library allocation
page read and write
28822B7E000
trusted library allocation
page read and write
1EF0204D000
trusted library allocation
page read and write
1EF0447A000
trusted library allocation
page read and write
2BD0000
heap
page read and write
2F1F000
stack
page read and write
1452000
heap
page read and write
4C20000
direct allocation
page execute and read and write
486F000
stack
page read and write
1EEFB3E5000
trusted library allocation
page read and write
1EEF9936000
trusted library allocation
page read and write
45AF000
stack
page read and write
7C4000
heap
page read and write
453F000
stack
page read and write
A50000
heap
page read and write
2882B4AF000
trusted library allocation
page read and write
53C000
unkown
page read and write
1EEFB4FC000
trusted library allocation
page read and write
1650000
direct allocation
page read and write
1EEFB374000
trusted library allocation
page read and write
4DCD000
stack
page read and write
4841000
heap
page read and write
1EF05264000
trusted library allocation
page read and write
1EF021FC000
trusted library allocation
page read and write
2FFF000
stack
page read and write
2882379C000
trusted library allocation
page read and write
2881ED98000
trusted library allocation
page read and write
991000
unkown
page execute and read and write
36DE000
stack
page read and write
4841000
heap
page read and write
2882D003000
trusted library allocation
page read and write
1EEFA64B000
trusted library allocation
page read and write
288231A7000
trusted library allocation
page read and write
2882DFB3000
trusted library allocation
page read and write
288260F2000
trusted library allocation
page read and write
13E4000
heap
page read and write
1EF02700000
trusted library allocation
page read and write
1EEFC87D000
trusted library allocation
page read and write
28822D7F000
trusted library allocation
page read and write
7D0000
unkown
page readonly
28825BB0000
trusted library allocation
page read and write
28825267000
trusted library allocation
page read and write
40AF000
stack
page read and write
28823662000
trusted library allocation
page read and write
18163D0A000
trusted library allocation
page read and write
1EEFB4BC000
trusted library allocation
page read and write
2882E1F5000
trusted library allocation
page read and write
1650000
direct allocation
page read and write
7D1000
unkown
page execute and write copy
28825176000
trusted library allocation
page read and write
2882B200000
trusted library allocation
page read and write
30DF000
stack
page read and write
1EEF78F2000
trusted library allocation
page read and write
4D31000
heap
page read and write
85CB000
heap
page read and write
2FA0E000
stack
page read and write
3B4000
heap
page read and write
2882B0B7000
trusted library allocation
page read and write
4C51000
heap
page read and write
313066F04000
trusted library allocation
page read and write
28826081000
trusted library allocation
page read and write
1EEFC1DB000
trusted library allocation
page read and write
1EEFABFE000
trusted library allocation
page read and write
5B0000
heap
page read and write
2882BACB000
trusted library allocation
page read and write
28823DE0000
trusted library allocation
page read and write
14A1000
heap
page read and write
288231B8000
trusted library allocation
page read and write
1762D9A9000
heap
page read and write
1EEFB39D000
trusted library allocation
page read and write
2881C334000
heap
page read and write
15D4000
heap
page read and write
1EEFB3CB000
trusted library allocation
page read and write
288237A2000
trusted library allocation
page read and write
1EEFB4DB000
trusted library allocation
page read and write
1EEFB4E2000
trusted library allocation
page read and write
1EEF5F03000
trusted library allocation
page read and write
1EEF65DD000
trusted library allocation
page read and write
BEF000
stack
page read and write
964000
heap
page read and write
135E000
stack
page read and write
2882B400000
trusted library allocation
page read and write
2882B3BD000
trusted library allocation
page read and write
1EF024DA000
trusted library allocation
page read and write
4E11000
heap
page read and write
28828002000
trusted library allocation
page read and write
2882D190000
trusted library allocation
page read and write
288260E7000
trusted library allocation
page read and write
30FE000
stack
page read and write
1EEFB00F000
trusted library allocation
page read and write
2882B4AD000
trusted library allocation
page read and write
1EEF65AA000
trusted library allocation
page read and write
1EF03AA5000
trusted library allocation
page read and write
7B0000
direct allocation
page read and write
461F000
stack
page read and write
F54000
heap
page read and write
8D8000
heap
page read and write
2882E117000
trusted library allocation
page read and write
1EEFB3A1000
trusted library allocation
page read and write
2882D873000
trusted library allocation
page read and write
28825BCD000
trusted library allocation
page read and write
1EF041ED000
trusted library allocation
page read and write
1EF04429000
trusted library allocation
page read and write
1EEFC4A9000
trusted library allocation
page read and write
1EEF780B000
trusted library allocation
page read and write
1EF044E6000
trusted library allocation
page read and write
1EEFC969000
trusted library allocation
page read and write
1650000
direct allocation
page read and write
4D31000
heap
page read and write
28820579000
trusted library allocation
page read and write
28825F8C000
trusted library allocation
page read and write
61EB4000
direct allocation
page read and write
1EEFB4FE000
trusted library allocation
page read and write
1EEFC505000
trusted library allocation
page read and write
387E000
stack
page read and write
2882D0BB000
trusted library allocation
page read and write
CF365FE000
stack
page read and write
2882D7F2000
trusted library allocation
page read and write
1EF05234000
trusted library allocation
page read and write
5B4000
heap
page read and write
4E00000
direct allocation
page execute and read and write
2881C316000
heap
page read and write
28825E6B000
trusted library allocation
page read and write
2882D1C9000
trusted library allocation
page read and write
12FE000
stack
page read and write
2EBF000
stack
page read and write
B4AB57C000
stack
page read and write
CF3C2F9000
stack
page read and write
2882B0BD000
trusted library allocation
page read and write
2881C362000
heap
page read and write
3067000
heap
page read and write
1EEFABDC000
trusted library allocation
page read and write
2881ECDF000
unclassified section
page read and write
1F6B7C23000
trusted library allocation
page read and write
2882E2FC000
trusted library allocation
page read and write
1EEF8F64000
trusted library allocation
page read and write
7B0000
direct allocation
page read and write
177E000
stack
page read and write
E70000
direct allocation
page read and write
28825CCF000
trusted library allocation
page read and write
1EEFCCA5000
trusted library allocation
page read and write
2881F7E8000
trusted library allocation
page read and write
1762D9CD000
heap
page read and write
1EEFABBC000
trusted library allocation
page read and write
2882D7F3000
trusted library allocation
page read and write
28825E47000
trusted library allocation
page read and write
1EEEC39D000
heap
page read and write
52CF000
stack
page read and write
390E000
stack
page read and write
1EF022D6000
trusted library allocation
page read and write
1D818000
heap
page read and write
2881EE43000
trusted library allocation
page read and write
1EF04032000
trusted library allocation
page read and write
1EF027FC000
trusted library allocation
page read and write
555B000
trusted library allocation
page read and write
26344D16000
trusted library allocation
page read and write
54E000
stack
page read and write
4E11000
heap
page read and write
4B94000
trusted library allocation
page read and write
28824ABD000
trusted library allocation
page read and write
CF3F19E000
stack
page read and write
2881C32C000
heap
page read and write
146E000
heap
page read and write
2F7F000
stack
page read and write
28823221000
trusted library allocation
page read and write
5B4000
heap
page read and write
28825FF0000
trusted library allocation
page read and write
1EF050BA000
trusted library allocation
page read and write
1EF05062000
trusted library allocation
page read and write
1EF0239C000
trusted library allocation
page read and write
1EEF8F03000
trusted library allocation
page read and write
2882366A000
trusted library allocation
page read and write
2882B3AD000
trusted library allocation
page read and write
1EEFD95D000
trusted library allocation
page read and write
1EEFB490000
trusted library allocation
page read and write
1EF052A3000
trusted library allocation
page read and write
1EF01F0F000
trusted library allocation
page read and write
1EF020A1000
trusted library allocation
page read and write
1EEF5C9E000
trusted library allocation
page read and write
A77000
unkown
page execute and read and write
1EEFACC7000
trusted library allocation
page read and write
31AF000
stack
page read and write
2882E1A8000
trusted library allocation
page read and write
1D7F0000
heap
page read and write
341F000
stack
page read and write
1EEF7800000
trusted library allocation
page read and write
2882B235000
trusted library allocation
page read and write
1D812000
heap
page read and write
28825DFC000
trusted library allocation
page read and write
DA4000
heap
page read and write
1EEFA377000
trusted library allocation
page read and write
1EEF9173000
trusted library allocation
page read and write
1EF01E59000
trusted library allocation
page read and write
2882B387000
trusted library allocation
page read and write
51264A3A000
trusted library allocation
page read and write
1EEFA623000
trusted library allocation
page read and write
2881C334000
heap
page read and write
1EEFC560000
trusted library allocation
page read and write
2881EDC5000
trusted library allocation
page read and write
288260EB000
trusted library allocation
page read and write
48BE000
stack
page read and write
26344D1C000
trusted library allocation
page read and write
1EEF7863000
trusted library allocation
page read and write
28813490000
trusted library allocation
page execute read
4761000
heap
page read and write
2881C30F000
heap
page read and write
4E11000
heap
page read and write
CF3F39D000
stack
page read and write
2882B1B8000
trusted library allocation
page read and write
2882E167000
trusted library allocation
page read and write
A75000
unkown
page execute and write copy
1EEFB315000
trusted library allocation
page read and write
1EEFB687000
trusted library allocation
page read and write
CF3DEFE000
stack
page read and write
288237A2000
trusted library allocation
page read and write
2881EFC2000
trusted library allocation
page read and write
2882D161000
trusted library allocation
page read and write
2881C35F000
heap
page read and write
4761000
heap
page read and write
1EEF65FD000
trusted library allocation
page read and write
2882B740000
trusted library allocation
page read and write
1D83B000
heap
page read and write
C4F000
stack
page read and write
1EEFB38A000
trusted library allocation
page read and write
1762DA26000
heap
page read and write
1EEFD700000
trusted library allocation
page read and write
13E4000
heap
page read and write
1EEFAB41000
trusted library allocation
page read and write
28813410000
heap
page read and write
1EEFBA00000
trusted library allocation
page read and write
1EEF78F6000
trusted library allocation
page read and write
4E11000
heap
page read and write
28823684000
trusted library allocation
page read and write
1EEF5D61000
trusted library allocation
page read and write
28825BE0000
trusted library allocation
page read and write
1EF01FA0000
trusted library allocation
page read and write
4841000
heap
page read and write
DDE000
heap
page read and write
1EEFB4A3000
trusted library allocation
page read and write
1762DA61000
heap
page read and write
1EEEA6A0000
trusted library section
page read and write
28823698000
trusted library allocation
page read and write
1EEF8FFE000
trusted library allocation
page read and write
3B4000
heap
page read and write
28825E6B000
trusted library allocation
page read and write
202124D00000
trusted library allocation
page read and write
2882BA78000
trusted library allocation
page read and write
2882E04D000
trusted library allocation
page read and write
830000
unkown
page execute and read and write
2882E1E3000
trusted library allocation
page read and write
14CE000
heap
page read and write
1EEFD603000
trusted library allocation
page read and write
2882D1C9000
trusted library allocation
page read and write
EAC000
unkown
page execute and read and write
F6D000
heap
page read and write
2882E1C3000
trusted library allocation
page read and write
3B8E000
stack
page read and write
1EF041F2000
trusted library allocation
page read and write
9BB000
unkown
page execute and write copy
2882403C000
trusted library allocation
page read and write
1EEF5D03000
trusted library allocation
page read and write
1EEFB312000
trusted library allocation
page read and write
1D820000
heap
page read and write
2882367E000
trusted library allocation
page read and write
1EF023B5000
trusted library allocation
page read and write
A30000
direct allocation
page read and write
288213B0000
trusted library allocation
page read and write
28823C5A000
trusted library allocation
page read and write
170F000
stack
page read and write
38579D8000
stack
page read and write
1EEFB39F000
trusted library allocation
page read and write
1196000
unkown
page execute and read and write
1EEF6017000
trusted library allocation
page read and write
288256C5000
trusted library allocation
page read and write
3E5E000
stack
page read and write
1EEFAB0F000
trusted library allocation
page read and write
FF0000
direct allocation
page read and write
1EF042F5000
trusted library allocation
page read and write
2882B710000
trusted library allocation
page read and write
1EEF924C000
trusted library allocation
page read and write
1EF01F83000
trusted library allocation
page read and write
BDFEFFE000
stack
page read and write
4761000
heap
page read and write
3B774541E000
trusted library allocation
page read and write
4E11000
heap
page read and write
2882E1F0000
trusted library allocation
page read and write
26344B68000
trusted library allocation
page read and write
2882D0F5000
trusted library allocation
page read and write
FC3000
heap
page read and write
544000
unkown
page readonly
FC2000
heap
page read and write
590000
heap
page read and write
28823620000
trusted library allocation
page read and write
2882B7D3000
trusted library allocation
page read and write
DDE000
heap
page read and write
CF3B2FE000
stack
page read and write
2882E1AB000
trusted library allocation
page read and write
1EF04103000
trusted library allocation
page read and write
1EEFA000000
trusted library allocation
page read and write
A30000
direct allocation
page read and write
10EA0545000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
2881C35F000
heap
page read and write
2881C30C000
heap
page read and write
7C4000
heap
page read and write
4D31000
heap
page read and write
288245B6000
trusted library allocation
page read and write
2882B8C8000
trusted library allocation
page read and write
3B4000
heap
page read and write
28826A86000
trusted library allocation
page read and write
4841000
heap
page read and write
E6E000
stack
page read and write
1EF05260000
trusted library allocation
page read and write
4D90000
direct allocation
page execute and read and write
28823698000
trusted library allocation
page read and write
1EF024C5000
trusted library allocation
page read and write
471000
unkown
page execute read
114D000
stack
page read and write
2882D8E7000
trusted library allocation
page read and write
2882D7D2000
trusted library allocation
page read and write
E9E000
stack
page read and write
13E4000
heap
page read and write
1EEFAEC3000
trusted library allocation
page read and write
1EEFED0C000
trusted library allocation
page read and write
1EEEA711000
trusted library allocation
page read and write
1EEF5CB3000
trusted library allocation
page read and write
1B5BD40A000
trusted library allocation
page read and write
28822CFF000
unclassified section
page read and write
345C76E04000
trusted library allocation
page read and write
1EF020CD000
trusted library allocation
page read and write
2882608C000
trusted library allocation
page read and write
1EF051BE000
trusted library allocation
page read and write
3B4000
heap
page read and write
28826C16000
trusted library allocation
page read and write
5B4000
heap
page read and write
28823E3B000
trusted library allocation
page read and write
28822D00000
trusted library allocation
page read and write
28824403000
trusted library allocation
page read and write
1EEFB6A3000
trusted library allocation
page read and write
1524000
heap
page read and write
1EEFB0E2000
trusted library allocation
page read and write
1EEFBBDA000
trusted library allocation
page read and write
4761000
heap
page read and write
2882B4A8000
trusted library allocation
page read and write
1EEFAB3C000
trusted library allocation
page read and write
2882E1DD000
trusted library allocation
page read and write
1EEF6605000
trusted library allocation
page read and write
1EEFAC9D000
trusted library allocation
page read and write
1EEFB38A000
trusted library allocation
page read and write
B4AAE3C000
stack
page read and write
2882D8BE000
trusted library allocation
page read and write
1EEF5CCB000
trusted library allocation
page read and write
4D90000
direct allocation
page execute and read and write
1EEF6487000
trusted library allocation
page read and write
1EF05348000
trusted library allocation
page read and write
1EEFB352000
trusted library allocation
page read and write
1EEFB903000
trusted library allocation
page read and write
28825F88000
trusted library allocation
page read and write
4841000
heap
page read and write
B4B113D000
stack
page read and write
1EEFAB31000
trusted library allocation
page read and write
1762DA7B000
heap
page read and write
D00000
trusted library allocation
page read and write
1EEFB400000
trusted library allocation
page read and write
EA0000
heap
page read and write
288231C7000
trusted library allocation
page read and write
7C4000
heap
page read and write
2882366A000
trusted library allocation
page read and write
1EEF9758000
trusted library allocation
page read and write
1EF024CB000
trusted library allocation
page read and write
1EF0235B000
trusted library allocation
page read and write
2881C2FF000
heap
page read and write
1EF04131000
trusted library allocation
page read and write
7C4000
heap
page read and write
2882E229000
trusted library allocation
page read and write
2882D120000
trusted library allocation
page read and write
1EEFB556000
trusted library allocation
page read and write
2882E1F5000
trusted library allocation
page read and write
16E7000
heap
page read and write
FF0000
direct allocation
page read and write
1EF054AF000
trusted library allocation
page read and write
1EF02349000
trusted library allocation
page read and write
1EF020B4000
trusted library allocation
page read and write
1EF0521B000
trusted library allocation
page read and write
2882E1A8000
trusted library allocation
page read and write
28824ABD000
trusted library allocation
page read and write
1EEF5CCB000
trusted library allocation
page read and write
1EEFBD00000
trusted library allocation
page read and write
1EF01DD2000
trusted library allocation
page read and write
304E000
stack
page read and write
4D80000
direct allocation
page execute and read and write
1EF04437000
trusted library allocation
page read and write
28824532000
trusted library allocation
page read and write
1EEF7806000
trusted library allocation
page read and write
1EF04115000
trusted library allocation
page read and write
288231B8000
trusted library allocation
page read and write
1EEFC518000
trusted library allocation
page read and write
373E000
stack
page read and write
2FCE000
stack
page read and write
28823663000
trusted library allocation
page read and write
2882445B000
trusted library allocation
page read and write
4ED0000
direct allocation
page execute and read and write
1EEF64D6000
trusted library allocation
page read and write
28825E03000
trusted library allocation
page read and write
16D7000
heap
page read and write
4E11000
heap
page read and write
6B000
unkown
page write copy
EB0000
direct allocation
page read and write
1EEF696F000
unclassified section
page read and write
5B4000
heap
page read and write
7B0000
direct allocation
page read and write
1762D9A9000
heap
page read and write
2882B7C3000
trusted library allocation
page read and write
4761000
heap
page read and write
4841000
heap
page read and write
4E20000
direct allocation
page execute and read and write
13E4000
heap
page read and write
1EEF64DD000
trusted library allocation
page read and write
1762DAB7000
heap
page read and write
5300000
heap
page read and write
14BE000
stack
page read and write
28826063000
trusted library allocation
page read and write
F1000
unkown
page read and write
288231BE000
trusted library allocation
page read and write
345C76E69000
trusted library allocation
page read and write
A3E000
unkown
page execute and read and write
1EF039F0000
trusted library allocation
page read and write
811000
unkown
page execute and write copy
317E000
stack
page read and write
7C4000
heap
page read and write
2882BAA4000
trusted library allocation
page read and write
4E11000
heap
page read and write
2882B3DF000
trusted library allocation
page read and write
1EEF9615000
trusted library allocation
page read and write
58E000
stack
page read and write
1EEFB600000
trusted library allocation
page read and write
7F6000
unkown
page execute and read and write
1524000
heap
page read and write
1EF052C3000
trusted library allocation
page read and write
28823772000
trusted library allocation
page read and write
54DE000
stack
page read and write
2BD7000
heap
page read and write
2882E19E000
trusted library allocation
page read and write
3856ECB000
stack
page read and write
5260000
direct allocation
page execute and read and write
5B4000
heap
page read and write
2882E03C000
trusted library allocation
page read and write
7C4000
heap
page read and write
1EF02312000
trusted library allocation
page read and write
2882E1C3000
trusted library allocation
page read and write
28825F54000
trusted library allocation
page read and write
DD1000
heap
page read and write
2882B168000
trusted library allocation
page read and write
1481000
heap
page read and write
86A000
unkown
page execute and read and write
1166000
unkown
page execute and read and write
F97000
heap
page read and write
28825F8E000
trusted library allocation
page read and write
1EEFCB33000
trusted library allocation
page read and write
1EEF9600000
trusted library allocation
page read and write
1EEFA57F000
trusted library allocation
page read and write
AC3000
unkown
page execute and read and write
1EEEA370000
heap
page read and write
2882E1F0000
trusted library allocation
page read and write
EAD000
unkown
page execute and write copy
28823FDF000
trusted library allocation
page read and write
2882B7DB000
trusted library allocation
page read and write
B4B2B5B000
stack
page read and write
1EF01900000
trusted library allocation
page read and write
2882B898000
trusted library allocation
page read and write
4841000
heap
page read and write
263449A0000
unclassified section
page read and write
1EEFB4F9000
trusted library allocation
page read and write
1EEF9FB8000
trusted library allocation
page read and write
44BF000
stack
page read and write
80FC000
stack
page read and write
2882E17E000
trusted library allocation
page read and write
1524000
heap
page read and write
1EF050C9000
trusted library allocation
page read and write
1EF020F3000
trusted library allocation
page read and write
3FEE000
stack
page read and write
1EEFB500000
trusted library allocation
page read and write
463E000
stack
page read and write
2882E1FA000
trusted library allocation
page read and write
1EEFB4A7000
trusted library allocation
page read and write
1EF023DA000
trusted library allocation
page read and write
2881F4DB000
trusted library allocation
page read and write
1EEF9F90000
trusted library allocation
page read and write
1EEEA2F0000
unclassified section
page readonly
1524000
heap
page read and write
1EEFB03B000
trusted library allocation
page read and write
1EF020A9000
trusted library allocation
page read and write
1EF024E4000
trusted library allocation
page read and write
FF0000
direct allocation
page read and write
2882B6C1000
trusted library allocation
page read and write
307B45B00000
trusted library allocation
page read and write
288238B9000
trusted library allocation
page read and write
263449AF000
unclassified section
page read and write
1EEF5D86000
trusted library allocation
page read and write
1D2BE000
stack
page read and write
28823684000
trusted library allocation
page read and write
3B4000
heap
page read and write
9B5000
unkown
page execute and read and write
1EEEA768000
trusted library allocation
page read and write
4D31000
heap
page read and write
2881EFD8000
trusted library allocation
page read and write
5AD000
stack
page read and write
1EEF5E94000
trusted library allocation
page read and write
1EF043F7000
trusted library allocation
page read and write
28824A4B000
trusted library allocation
page read and write
1762DA2F000
heap
page read and write
288133F0000
heap
page read and write
26344B47000
trusted library allocation
page read and write
1D80B000
heap
page read and write
40DE000
stack
page read and write
9EB000
unkown
page execute and read and write
2881F863000
trusted library allocation
page read and write
2881EEAD000
trusted library allocation
page read and write
2882D0D9000
trusted library allocation
page read and write
2882BA74000
trusted library allocation
page read and write
3B3F000
stack
page read and write
532000
unkown
page readonly
1EF02097000
trusted library allocation
page read and write
28825FE6000
trusted library allocation
page read and write
1EEFA8C5000
trusted library allocation
page read and write
2C7E000
stack
page read and write
2BCE000
stack
page read and write
521F000
stack
page read and write
4841000
heap
page read and write
10EA05E2000
heap
page read and write
1D64D000
stack
page read and write
1431000
heap
page read and write
1AAEE000
stack
page read and write
1335000
stack
page read and write
1EEF60B6000
trusted library allocation
page read and write
288229F0000
trusted library section
page readonly
2882E17E000
trusted library allocation
page read and write
1EEFB799000
trusted library allocation
page read and write
288238CA000
trusted library allocation
page read and write
15EE000
stack
page read and write
2881C305000
heap
page read and write
1520000
heap
page read and write
1F6B7C5D000
trusted library allocation
page read and write
28822A6A000
trusted library allocation
page read and write
28826A66000
trusted library allocation
page read and write
2882E09A000
trusted library allocation
page read and write
1EEFBAB6000
trusted library allocation
page read and write
1EEFA019000
trusted library allocation
page read and write
FF0000
direct allocation
page read and write
4761000
heap
page read and write
2E3323604000
trusted library allocation
page read and write
1EEEA460000
heap
page read and write
1EEFBCF3000
trusted library allocation
page read and write
1762CD9F000
trusted library allocation
page read and write
1EEF5C98000
trusted library allocation
page read and write
2881C30C000
heap
page read and write
28825DCA000
trusted library allocation
page read and write
1EF01D74000
trusted library allocation
page read and write
2882D0F3000
trusted library allocation
page read and write
DA4000
heap
page read and write
1EEFB140000
trusted library section
page readonly
2881C324000
heap
page read and write
E60000
heap
page read and write
1EF05536000
trusted library allocation
page read and write
6C92E000
unkown
page read and write
2882523D000
trusted library allocation
page read and write
28821484000
trusted library allocation
page read and write
7C4000
heap
page read and write
1762D9DC000
heap
page read and write
1762DA28000
heap
page read and write
1524000
heap
page read and write
4D31000
heap
page read and write
939D3C1000
trusted library allocation
page execute read
1EEF8E67000
trusted library allocation
page read and write
1EF03712000
trusted library allocation
page read and write
CF3DF3F000
stack
page read and write
1EEF5C6B000
trusted library allocation
page read and write
288136DB000
trusted library allocation
page read and write
28824A97000
trusted library allocation
page read and write
2882364D000
trusted library allocation
page read and write
BDFEF3E000
unkown
page readonly
9B7000
unkown
page execute and write copy
2881F7B4000
trusted library allocation
page read and write
2882D726000
trusted library allocation
page read and write
4761000
heap
page read and write
1EEFCCCF000
trusted library allocation
page read and write
4841000
heap
page read and write
288231AE000
trusted library allocation
page read and write
288219E0000
trusted library section
page readonly
1EF01EF7000
trusted library allocation
page read and write
2881C33C000
heap
page read and write
13E4000
heap
page read and write
7C4000
heap
page read and write
42C1000
heap
page read and write
2882E2D0000
trusted library allocation
page read and write
1762DA2F000
heap
page read and write
12E639E04000
trusted library allocation
page read and write
E70000
direct allocation
page read and write
2882D0C0000
trusted library allocation
page read and write
1EF023B3000
trusted library allocation
page read and write
BDFFB3E000
unkown
page readonly
28825E6D000
trusted library allocation
page read and write
1EEFD6D8000
trusted library allocation
page read and write
170F000
stack
page read and write
1EF04335000
trusted library allocation
page read and write
1EEFBA99000
trusted library allocation
page read and write
288260CC000
trusted library allocation
page read and write
1EEFD622000
trusted library allocation
page read and write
4D31000
heap
page read and write
1EEF7CA7000
trusted library allocation
page read and write
4D31000
heap
page read and write
4C3D000
stack
page read and write
1524000
heap
page read and write
28820D00000
trusted library allocation
page read and write
28821330000
trusted library allocation
page read and write
516D000
stack
page read and write
1D03E000
stack
page read and write
FAF000
heap
page read and write
3FE000
stack
page read and write
1EEFABDC000
trusted library allocation
page read and write
2882B7D3000
trusted library allocation
page read and write
1EEFC800000
trusted library allocation
page read and write
1EEFB9A4000
trusted library allocation
page read and write
2882B4C8000
trusted library allocation
page read and write
2FBCA000
heap
page read and write
1EEF9F3A000
trusted library allocation
page read and write
1EEFB3E1000
trusted library allocation
page read and write
288243C5000
trusted library allocation
page read and write
C1E000
stack
page read and write
28824527000
trusted library allocation
page read and write
EA0000
heap
page read and write
A30000
direct allocation
page read and write
1EEEC3C8000
heap
page read and write
2882BA71000
trusted library allocation
page read and write
1EEF7500000
trusted library allocation
page read and write
1EEF9244000
trusted library allocation
page read and write
4EA0000
direct allocation
page execute and read and write
2882E1B3000
trusted library allocation
page read and write
B4B2C9E000
stack
page read and write
1762CDF5000
trusted library allocation
page read and write
2882B8F0000
trusted library allocation
page read and write
DA4000
heap
page read and write
2BFE000
stack
page read and write
B4AB53C000
stack
page read and write
6C21000
heap
page read and write
1D82D000
heap
page read and write
There are 7260 hidden memdumps, click here to show them.