IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
Chrome Cache Entry: 57
ASCII text, with very long lines (806)
downloaded
Chrome Cache Entry: 58
ASCII text, with very long lines (2586)
downloaded
Chrome Cache Entry: 59
ASCII text
downloaded
Chrome Cache Entry: 60
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 61
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 62
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 63
ASCII text, with very long lines (1302)
downloaded

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 --field-trial-handle=2316,i,6816261580910516305,6036598587685662932,262144 /prefetch:8
malicious

URLs

Name
IP
Malicious
.1.1home.fvtekk5pn.top
malicious
llowfvtekk5pn.top
malicious
https://dl.google.com/release2/chrome_component/acbk3qzfwhzj3ij3hxeo5shqbiyq_3051/jflookgnkcckhobagl
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
http://anglebug.com/4633
unknown
http://www.google.com/dl/release2/chrome_component/ad3skwo2srs5xchyxzz6ujgnedha_9.52.0/gcmjkmgdlgnkk
unknown
https://anglebug.com/7382
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
http://www.google.com/dl/release2/chrome_component/cpx7rw4q3nwu7emczqf2w6cu7y_2023.3.30.1305/cocncan
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
http://anglebug.com/6929
unknown
https://www.google.com/dl/release2/chrome_component/acccxbt6wwsvpxzpob4hojndwkqq_4.10.2830.0/oimompe
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
http://dl.google.com/release2/chrome_component/j2hxfei2occ5siitujtlwgp6xi_3/ojhpjlocmbogdgmfpkhlaaea
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://dl.google.com/release2/chrome_component/V3P1l2hLvLw_7/7_all_sslErrorAssistant.crx3
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://dl.google.com/release2/chrome_component/AMpg5-cnrANo_2018.8.8.0/2018.8.8.0_win64_win_third_pa
unknown
https://ogs.goog
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://www.google.com/dl/release2/chrome_component/acy4uco6fk3ffech36mcvhbh7gyq_1138/efniojlnjndmcbi
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
34.116.198.130
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
http://html4/loose.dtd
unknown
https://www.google.com/dl/release2/chrome_component/ac6mhlwypzipnufijdvfyhdgvt4q_67/khaoiebndkojlmpp
unknown
http://unisolated.invalid/a
unknown
analforeverlovyu.top
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://dl.google.com/release2/chrome_component/cxxqn654fg7hzrcrrnqcniqqye_2024.10.11.1/kiabhabjdbkj
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347libgcc_s_dw2-1.dll__register_frame_info__der
unknown
http://anglebug.com/3970
unknown
https://apis.google.com
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://labs.google.com/search?source=ntp
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
http://dl.google.com/release2/chrome_component/adm5fg7myczym5ugfpmw2lireirq_2024.11.8.0/gonpemdgkjce
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
https://anglebug.com/7161
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
http://dl.google.com/release2/chrome_component/dvn6tjyuqqxdoyobslkdwn7pvi_2024.4.15.1148/ggkkehgbnfj
unknown
http://anglebug.com/4937
unknown
http://dl.google.com/release2/chrome_component/glrp3iosgzhorafatuxaf2eate_476/lmelglejhemejginpboagd
unknown
https://issuetracker.google.com/166809097
unknown
https://lens.google.com/v3/upload
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.181.68
http://anglebug.com/3832
unknown
https://drive-daily-0.corp.google.com/
unknown
https://lens.google.com/upload
unknown
https://docs.google.com/document/?usp=installed_webapp
unknown
http://anglebug.com/6651
unknown
https://anglebug.com/4830
unknown
https://www.youtube.com/:
unknown
https://myaccount.google.com/shielded-email2B
unknown
https://csp.withgoogle.com/csp/report-to/gws/cdt1
unknown
https://www.google.com/tools/feedback/chrome/__submit
unknown
http://www.google.com/dl/release2/chrome_component/cxxqn654fg7hzrcrrnqcniqqye_2024.10.11.1/kiabhabjd
unknown
http://anglebug.com/2162
unknown
https://curl.se/docs/hsts.html
unknown
http://anglebug.com/5430
unknown
https://chrome.google.com/webstore206E5
unknown
https://www.google.com/dl/release2/chrome_component/j2hxfei2occ5siitujtlwgp6xi_3/ojhpjlocmbogdgmfpkh
unknown
https://www.google.com/dl/release2/chrome_component/V3P1l2hLvLw_7/7_all_sslErrorAssistant.crx3splaye
unknown
http://anglebug.com/3498
unknown
http://www.google.com/dl/release2/chrome_component/AMpg5-cnrANo_2018.8.8.0/2018.8.8.0_win64_win_thir
unknown
https://csp.withgoogle.com/csp/download-dt/1
unknown
https://ch.search.yahoo.com/favicon.icofrom_play_api
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.181.68
https://www.youtube.com/s/notifications/manifest/cr_install.html
unknown
https://anglebug.com/4966
unknown
http://dl.google.com/release2/chrome_component/adrga7eefaxjfdmmgfkiaxjg4yjq_2024.7.12.235938/eeigpng
unknown
https://www.youtube.com/J
unknown
https://bluoomly.com/update.php?compName=
unknown
http://anglebug.com/5421
unknown
home.fvtekk5pn.top
https://myaccount.google.com/?utm_source=ga-chrome-actions&utm_medium=manageGA
unknown
https://dl.google.com/release2/chrome_component/cpx7rw4q3nwu7emczqf2w6cu7y_2023.3.30.1305/cocncanlea
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fvtekk5pn.top
34.116.198.130
plus.l.google.com
172.217.17.78
play.google.com
172.217.19.206
www.google.com
142.250.181.68
fvtekk5pn.top
34.116.198.130
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
malicious
172.217.19.206
play.google.com
United States
172.217.17.78
plus.l.google.com
United States
239.255.255.250
unknown
Reserved
34.116.198.130
home.fvtekk5pn.top
United States
142.250.181.68
www.google.com
United States
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
14B0000
heap
page read and write
malicious
14B0000
heap
page read and write
malicious
14AC000
heap
page read and write
malicious
14B1000
heap
page read and write
malicious
14AC000
heap
page read and write
59BC0033C000
trusted library allocation
page read and write
6801000
heap
page read and write
1E29D00F000
heap
page read and write
1D4002900000
trusted library allocation
page read and write
1E29D5A7000
heap
page read and write
59BC007D0000
trusted library allocation
page read and write
1D40014AC000
trusted library allocation
page read and write
1E2A2CBD000
heap
page read and write
C01A7FE000
unkown
page readonly
6801000
heap
page read and write
14AF000
heap
page read and write
1D40028DD000
trusted library allocation
page read and write
1D4001874000
trusted library allocation
page read and write
1D400284C000
trusted library allocation
page read and write
1E29D56E000
heap
page read and write
1E29D00F000
heap
page read and write
1D4001A0C000
trusted library allocation
page read and write
1D40028DF000
trusted library allocation
page read and write
1E29CFF8000
heap
page read and write
14AB000
heap
page read and write
17F5000
heap
page read and write
1E299A33000
heap
page read and write
1D4001A6C000
trusted library allocation
page read and write
6F20000
direct allocation
page execute and read and write
6801000
heap
page read and write
59BC00288000
trusted library allocation
page read and write
59BC00758000
trusted library allocation
page read and write
1D4001C50000
trusted library allocation
page read and write
6801000
heap
page read and write
1D400099F000
trusted library allocation
page read and write
1D4002907000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4002874000
trusted library allocation
page read and write
1D4000840000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1D4001DE8000
trusted library allocation
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
1D400162C000
trusted library allocation
page read and write
1E29CFF2000
heap
page read and write
1D40000D0000
trusted library allocation
page read and write
1E29C1E0000
unkown
page read and write
1D40028C3000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1E29D5FB000
heap
page read and write
1D4002868000
trusted library allocation
page read and write
1D4000294000
trusted library allocation
page read and write
1E29CFF8000
heap
page read and write
1D40014AC000
trusted library allocation
page read and write
1E29D002000
heap
page read and write
1D4002876000
trusted library allocation
page read and write
1D4001798000
trusted library allocation
page read and write
1D4001DBC000
trusted library allocation
page read and write
1D400100C000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1D4002900000
trusted library allocation
page read and write
1E29CFFE000
heap
page read and write
1D4001B30000
trusted library allocation
page read and write
1E2A2C9D000
heap
page read and write
75DF000
heap
page read and write
59BC002B0000
trusted library allocation
page read and write
33A0000
direct allocation
page read and write
75C7000
heap
page read and write
1D4002928000
trusted library allocation
page read and write
1D400175C000
trusted library allocation
page read and write
6801000
heap
page read and write
1D40018B4000
trusted library allocation
page read and write
1E2A32E3000
trusted library section
page read and write
1D4000218000
trusted library allocation
page read and write
6801000
heap
page read and write
59BC00374000
trusted library allocation
page read and write
1D4000001000
trusted library allocation
page read and write
1D400009E000
trusted library allocation
page read and write
75CF000
heap
page read and write
59BC006B4000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1D4002938000
trusted library allocation
page read and write
1D400131C000
trusted library allocation
page read and write
1D400033C000
trusted library allocation
page read and write
1D40005D8000
trusted library allocation
page read and write
1D4000336000
trusted library allocation
page read and write
1E29D561000
heap
page read and write
1D40016BC000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1D4001AD0000
trusted library allocation
page read and write
6801000
heap
page read and write
59BC00390000
trusted library allocation
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
1D4001378000
trusted library allocation
page read and write
1D4000B00000
trusted library allocation
page read and write
1E29D02B000
heap
page read and write
1D4001720000
trusted library allocation
page read and write
6801000
heap
page read and write
1D40028DD000
trusted library allocation
page read and write
1D4001DD5000
trusted library allocation
page read and write
1D4001DE8000
trusted library allocation
page read and write
59BC003EC000
trusted library allocation
page read and write
1E29CFFE000
heap
page read and write
1D4001BF0000
trusted library allocation
page read and write
1D4001A4C000
trusted library allocation
page read and write
1D4001C2C000
trusted library allocation
page read and write
1D400074A000
trusted library allocation
page read and write
1D4001648000
trusted library allocation
page read and write
6C90000
direct allocation
page read and write
1D4002900000
trusted library allocation
page read and write
C00EFFE000
stack
page read and write
1D4002890000
trusted library allocation
page read and write
7F4F000
stack
page read and write
6801000
heap
page read and write
1D4001C2C000
trusted library allocation
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
1D4000A14000
trusted library allocation
page read and write
1E29D5DB000
heap
page read and write
759E000
heap
page read and write
1D4001DA9000
trusted library allocation
page read and write
6801000
heap
page read and write
6AE800238000
trusted library allocation
page read and write
1D4001DE8000
trusted library allocation
page read and write
1D4000CFC000
trusted library allocation
page read and write
1D4000CA8000
trusted library allocation
page read and write
1D4001485000
trusted library allocation
page read and write
1D4001B54000
trusted library allocation
page read and write
1D4000F3C000
trusted library allocation
page read and write
6EF0000
direct allocation
page execute and read and write
1E2A3E6E000
trusted library section
page read and write
1D40013EC000
trusted library allocation
page read and write
1D4001DE8000
trusted library allocation
page read and write
1E29CFF8000
heap
page read and write
59BC00610000
trusted library allocation
page read and write
1D40001AC000
trusted library allocation
page read and write
1D4001A28000
trusted library allocation
page read and write
1D4000350000
trusted library allocation
page read and write
1E29D00C000
heap
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
1D4001D9F000
trusted library allocation
page read and write
1D40015D8000
trusted library allocation
page read and write
1D4001D95000
trusted library allocation
page read and write
1D4000BA0000
trusted library allocation
page read and write
32CE000
stack
page read and write
59BC006D4000
trusted library allocation
page read and write
1E2A3EC1000
trusted library section
page read and write
1D4000310000
trusted library allocation
page read and write
1D4000ABC000
trusted library allocation
page read and write
1D400033C000
trusted library allocation
page read and write
1D40010D4000
trusted library allocation
page read and write
1E29CFF8000
heap
page read and write
765E000
heap
page read and write
1D400071C000
trusted library allocation
page read and write
67FF000
stack
page read and write
1D4002907000
trusted library allocation
page read and write
1D400284E000
trusted library allocation
page read and write
6801000
heap
page read and write
1E2A46B0000
trusted library allocation
page read and write
1D40028C6000
trusted library allocation
page read and write
6A6F3000
direct allocation
page read and write
1E2A2C8D000
heap
page read and write
1D40001AC000
trusted library allocation
page read and write
1D4000DCC000
trusted library allocation
page read and write
1D4001DD0000
trusted library allocation
page read and write
6801000
heap
page read and write
188E000
stack
page read and write
1D400000C000
trusted library allocation
page read and write
1E29D002000
heap
page read and write
C0765FE000
unkown
page readonly
1D4000A96000
trusted library allocation
page read and write
1D4000454000
trusted library allocation
page read and write
1E29CFFB000
heap
page read and write
59BC002FC000
trusted library allocation
page read and write
1E29CFEB000
heap
page read and write
1E29D00F000
heap
page read and write
59BC006E0000
trusted library allocation
page read and write
7308000
heap
page read and write
6801000
heap
page read and write
74F9000
heap
page read and write
5CFE000
stack
page read and write
1E29CFE9000
heap
page read and write
74F1000
heap
page read and write
1D40005B4000
trusted library allocation
page read and write
6801000
heap
page read and write
15880023C000
direct allocation
page read and write
59BC00201000
trusted library allocation
page read and write
1D4001BF0000
trusted library allocation
page read and write
1D4001020000
trusted library allocation
page read and write
6F10000
direct allocation
page execute and read and write
1D4002900000
trusted library allocation
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
14D3000
heap
page read and write
1D4001DE8000
trusted library allocation
page read and write
1D4001A70000
trusted library allocation
page read and write
158800260000
direct allocation
page read and write
C0187FE000
unkown
page readonly
6801000
heap
page read and write
C00FFFE000
stack
page read and write
1D4001D95000
trusted library allocation
page read and write
1D4002876000
trusted library allocation
page read and write
6AE8002BC000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1D40028DD000
trusted library allocation
page read and write
6801000
heap
page read and write
1E29D002000
heap
page read and write
1D40003B0000
trusted library allocation
page read and write
6801000
heap
page read and write
6AE8002A0000
trusted library allocation
page read and write
1E29CFF8000
heap
page read and write
1E29CFFE000
heap
page read and write
1D400076C000
trusted library allocation
page read and write
1D4002890000
trusted library allocation
page read and write
6801000
heap
page read and write
1E2A3EA0000
trusted library section
page read and write
C0735FE000
unkown
page readonly
1E29CFFE000
heap
page read and write
1D40012D4000
trusted library allocation
page read and write
1D4001788000
trusted library allocation
page read and write
33A0000
direct allocation
page read and write
1E29D00F000
heap
page read and write
1D4000F3C000
trusted library allocation
page read and write
1D4000BF8000
trusted library allocation
page read and write
1D4002907000
trusted library allocation
page read and write
1D4001A84000
trusted library allocation
page read and write
1D4001A3C000
trusted library allocation
page read and write
1D4001C2C000
trusted library allocation
page read and write
1E2A3327000
unclassified section
page read and write
1D40028DD000
trusted library allocation
page read and write
1D40012A1000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
14D2000
heap
page read and write
1D4002900000
trusted library allocation
page read and write
74FC000
heap
page read and write
75AB000
heap
page read and write
1E29D00F000
heap
page read and write
1D40028DD000
trusted library allocation
page read and write
6801000
heap
page read and write
1E299A00000
trusted library allocation
page read and write
1D4002C01000
trusted library allocation
page read and write
1E29D5E4000
heap
page read and write
1D4002890000
trusted library allocation
page read and write
1D40007C4000
trusted library allocation
page read and write
1E29D002000
heap
page read and write
59BC00330000
trusted library allocation
page read and write
C0197FE000
unkown
page readonly
6801000
heap
page read and write
1D4000D40000
trusted library allocation
page read and write
6AE8002FD000
trusted library allocation
page read and write
1D4002204000
trusted library allocation
page read and write
6801000
heap
page read and write
C0167FE000
unkown
page readonly
1D400033C000
trusted library allocation
page read and write
1D40028C3000
trusted library allocation
page read and write
6801000
heap
page read and write
1D400284E000
trusted library allocation
page read and write
6801000
heap
page read and write
1E29D02B000
heap
page read and write
1D4001DBC000
trusted library allocation
page read and write
1D4000350000
trusted library allocation
page read and write
6801000
heap
page read and write
1D40012A3000
trusted library allocation
page read and write
6A31B000
direct allocation
page read and write
6801000
heap
page read and write
1D4002868000
trusted library allocation
page read and write
1D40015D0000
trusted library allocation
page read and write
1D400006C000
trusted library allocation
page read and write
1D40028DF000
trusted library allocation
page read and write
6AE8002C0000
trusted library allocation
page read and write
1D4001080000
trusted library allocation
page read and write
1D4001401000
trusted library allocation
page read and write
6801000
heap
page read and write
1D40028DD000
trusted library allocation
page read and write
33A0000
direct allocation
page read and write
1D4001DD5000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4001710000
trusted library allocation
page read and write
6CCB000
stack
page read and write
1D40028C3000
trusted library allocation
page read and write
1D4002C0C000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4000304000
trusted library allocation
page read and write
1E29CFF6000
heap
page read and write
1D400142C000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1D4000F3C000
trusted library allocation
page read and write
14AC000
heap
page read and write
74F1000
heap
page read and write
6801000
heap
page read and write
1D40009A8000
trusted library allocation
page read and write
1D4001DD0000
trusted library allocation
page read and write
1E29CFE9000
heap
page read and write
1D40019A0000
trusted library allocation
page read and write
1D4001DD0000
trusted library allocation
page read and write
C019FFE000
stack
page read and write
1D4002876000
trusted library allocation
page read and write
1E29CFF8000
heap
page read and write
1D4002EF4000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
517F000
stack
page read and write
1E29CFF3000
heap
page read and write
1D40001B4000
trusted library allocation
page read and write
1D4001168000
trusted library allocation
page read and write
1D4002EDC000
trusted library allocation
page read and write
6801000
heap
page read and write
1E29CFFE000
heap
page read and write
6801000
heap
page read and write
C0725FE000
unkown
page readonly
43FF000
stack
page read and write
1D4002928000
trusted library allocation
page read and write
158800217000
direct allocation
page read and write
1D4001980000
trusted library allocation
page read and write
716C000
heap
page read and write
1D4001D9F000
trusted library allocation
page read and write
1E29D002000
heap
page read and write
6801000
heap
page read and write
1D4001A18000
trusted library allocation
page read and write
1D4002928000
trusted library allocation
page read and write
1D4002874000
trusted library allocation
page read and write
6801000
heap
page read and write
1D40001AC000
trusted library allocation
page read and write
15880020C000
direct allocation
page read and write
6801000
heap
page read and write
1D4000304000
trusted library allocation
page read and write
1E29D002000
heap
page read and write
1E29CFFE000
heap
page read and write
1D4002938000
trusted library allocation
page read and write
1D4000350000
trusted library allocation
page read and write
1D4000E94000
trusted library allocation
page read and write
F74000
heap
page read and write
1D4002868000
trusted library allocation
page read and write
1D4001398000
trusted library allocation
page read and write
1D4000890000
trusted library allocation
page read and write
6AE800264000
trusted library allocation
page read and write
C00BFFB000
stack
page read and write
33A0000
direct allocation
page read and write
1E29C219000
unkown
page read and write
6801000
heap
page read and write
1D4001754000
trusted library allocation
page read and write
1E29D01A000
heap
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
1D4000F3C000
trusted library allocation
page read and write
1D4001D9F000
trusted library allocation
page read and write
158800303000
direct allocation
page read and write
1D4001DD0000
trusted library allocation
page read and write
1D4000B7C000
trusted library allocation
page read and write
1D4001365000
trusted library allocation
page read and write
C07D5FE000
unkown
page readonly
1D400284E000
trusted library allocation
page read and write
1D400284E000
trusted library allocation
page read and write
1D4002928000
trusted library allocation
page read and write
75AD000
heap
page read and write
74F0000
heap
page read and write
1E29CFF2000
heap
page read and write
33A0000
direct allocation
page read and write
1D4000F48000
trusted library allocation
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
6F10000
direct allocation
page execute and read and write
3BBF000
stack
page read and write
6801000
heap
page read and write
5F3E000
stack
page read and write
6801000
heap
page read and write
1D40013EC000
trusted library allocation
page read and write
1D400072C000
trusted library allocation
page read and write
1D4000601000
trusted library allocation
page read and write
1E29D002000
heap
page read and write
1E29D600000
trusted library section
page read and write
C07CDFA000
stack
page read and write
1D400016C000
trusted library allocation
page read and write
1D400033C000
trusted library allocation
page read and write
715C000
heap
page read and write
C017FFD000
stack
page read and write
1D4000A34000
trusted library allocation
page read and write
1E29CFEE000
heap
page read and write
1E29D00F000
heap
page read and write
14D5000
heap
page read and write
1D4001469000
trusted library allocation
page read and write
1E29D002000
heap
page read and write
1E2A3E30000
trusted library section
page read and write
C077DFC000
stack
page read and write
1E29D002000
heap
page read and write
1E29CFF8000
heap
page read and write
75A5000
heap
page read and write
74F4000
heap
page read and write
1D4000078000
trusted library allocation
page read and write
1D4002876000
trusted library allocation
page read and write
1D40013CC000
trusted library allocation
page read and write
1E2A2C88000
heap
page read and write
1D4000394000
trusted library allocation
page read and write
1E299A5F000
heap
page read and write
1E29CFFE000
heap
page read and write
6AE800294000
trusted library allocation
page read and write
6801000
heap
page read and write
F80000
heap
page read and write
1E29CFFB000
heap
page read and write
1D4000A14000
trusted library allocation
page read and write
3FBF000
stack
page read and write
1E29CFFE000
heap
page read and write
1D4000880000
trusted library allocation
page read and write
1D4000ECC000
trusted library allocation
page read and write
5EFF000
stack
page read and write
1D400104C000
trusted library allocation
page read and write
C0097FD000
stack
page read and write
1D40006CC000
trusted library allocation
page read and write
C00CFFE000
stack
page read and write
1D40012D4000
trusted library allocation
page read and write
74F7000
heap
page read and write
1D4000C64000
trusted library allocation
page read and write
1D4001C38000
trusted library allocation
page read and write
1D400120C000
trusted library allocation
page read and write
1D400089C000
trusted library allocation
page read and write
6AE8002B0000
trusted library allocation
page read and write
59BC00250000
trusted library allocation
page read and write
1E29D57B000
heap
page read and write
1D4001AF8000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4000D15000
trusted library allocation
page read and write
59BC00601000
trusted library allocation
page read and write
1E29D013000
heap
page read and write
1E29D00E000
heap
page read and write
6801000
heap
page read and write
1E29D54E000
heap
page read and write
1D4002928000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
14D0000
heap
page read and write
6801000
heap
page read and write
1D4000CA8000
trusted library allocation
page read and write
C07ADFE000
stack
page read and write
1D4001620000
trusted library allocation
page read and write
1D4000B6C000
trusted library allocation
page read and write
1D40017F4000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1D4000F3C000
trusted library allocation
page read and write
1D4001DBC000
trusted library allocation
page read and write
1E29CFF8000
heap
page read and write
1D4001DA9000
trusted library allocation
page read and write
6801000
heap
page read and write
1D40016B8000
trusted library allocation
page read and write
1D4001BB4000
trusted library allocation
page read and write
1D4001980000
trusted library allocation
page read and write
59BC0020C000
trusted library allocation
page read and write
1D40013CC000
trusted library allocation
page read and write
1D40006E4000
trusted library allocation
page read and write
1E29CFF8000
heap
page read and write
710A000
heap
page read and write
6FB0000
direct allocation
page execute and read and write
1E29D01A000
heap
page read and write
1D40028C3000
trusted library allocation
page read and write
6AE8002A0000
trusted library allocation
page read and write
1E29D012000
heap
page read and write
59BC00220000
trusted library allocation
page read and write
1D4000401000
trusted library allocation
page read and write
1E29CFF8000
heap
page read and write
74F4000
heap
page read and write
C0007FE000
unkown
page readonly
1D4001DE8000
trusted library allocation
page read and write
74FD000
heap
page read and write
1D40017D0000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4001DE8000
trusted library allocation
page read and write
1D40019D0000
trusted library allocation
page read and write
1D4001644000
trusted library allocation
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
1D4001AE0000
trusted library allocation
page read and write
1E29D002000
heap
page read and write
1E29CFFE000
heap
page read and write
1D4001168000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4001BF0000
trusted library allocation
page read and write
1D40028DF000
trusted library allocation
page read and write
1D400040C000
trusted library allocation
page read and write
7580000
heap
page read and write
59BC00734000
trusted library allocation
page read and write
231000
unkown
page execute and write copy
1D40015A8000
trusted library allocation
page read and write
1D4002876000
trusted library allocation
page read and write
1D40013BC000
trusted library allocation
page read and write
41BF000
stack
page read and write
6AE8002B0000
trusted library allocation
page read and write
1E299B18000
heap
page read and write
6801000
heap
page read and write
1D4000F3C000
trusted library allocation
page read and write
59BC002A4000
trusted library allocation
page read and write
6801000
heap
page read and write
1D40005C4000
trusted library allocation
page read and write
1E29CFF6000
heap
page read and write
1D40001F4000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4001A78000
trusted library allocation
page read and write
1D40001F0000
trusted library allocation
page read and write
59BC00364000
trusted library allocation
page read and write
1E29D00A000
heap
page read and write
143D000
heap
page read and write
59BC00744000
trusted library allocation
page read and write
1E29CFFE000
heap
page read and write
1D400146C000
trusted library allocation
page read and write
1D4000A14000
trusted library allocation
page read and write
75CB000
heap
page read and write
1D4002938000
trusted library allocation
page read and write
1D4001278000
trusted library allocation
page read and write
1E29F900000
trusted library allocation
page read and write
1D4000F64000
trusted library allocation
page read and write
1D4001BEC000
trusted library allocation
page read and write
1D40000A8000
trusted library allocation
page read and write
6AE800260000
trusted library allocation
page read and write
6AE8002BC000
trusted library allocation
page read and write
1D4000E34000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1D4001DBC000
trusted library allocation
page read and write
1D4002890000
trusted library allocation
page read and write
1D400040C000
trusted library allocation
page read and write
1D40028DF000
trusted library allocation
page read and write
75BE000
heap
page read and write
6801000
heap
page read and write
1D400284E000
trusted library allocation
page read and write
C0755FE000
unkown
page readonly
6801000
heap
page read and write
1D4000F3C000
trusted library allocation
page read and write
1E29D002000
heap
page read and write
1D4001BB4000
trusted library allocation
page read and write
6801000
heap
page read and write
8DF3000
heap
page read and write
1D400033C000
trusted library allocation
page read and write
1D400171C000
trusted library allocation
page read and write
1D40002C0000
trusted library allocation
page read and write
6801000
heap
page read and write
1E29CFEB000
heap
page read and write
6A321000
direct allocation
page read and write
75C1000
heap
page read and write
1D4001BBF000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1E29CFF7000
heap
page read and write
6801000
heap
page read and write
736C000
heap
page read and write
1E29D00F000
heap
page read and write
C07BDFE000
unkown
page readonly
1920000
heap
page read and write
1D4000F80000
trusted library allocation
page read and write
6F10000
direct allocation
page execute and read and write
1D4001DA9000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1D40006F8000
trusted library allocation
page read and write
6801000
heap
page read and write
1E29D002000
heap
page read and write
1D4001168000
trusted library allocation
page read and write
1D4000978000
trusted library allocation
page read and write
1D4001438000
trusted library allocation
page read and write
1D4000E7C000
trusted library allocation
page read and write
59BC007C8000
trusted library allocation
page read and write
1D4001724000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4002876000
trusted library allocation
page read and write
C002FFB000
stack
page read and write
76A4000
heap
page read and write
59BC002C4000
trusted library allocation
page read and write
75CB000
heap
page read and write
6FD0000
direct allocation
page execute and read and write
1E299A91000
heap
page read and write
6801000
heap
page read and write
1D4000328000
trusted library allocation
page read and write
1D4001989000
trusted library allocation
page read and write
6AE800270000
trusted library allocation
page read and write
145F000
heap
page read and write
1D4001C3C000
trusted library allocation
page read and write
1D4001DA9000
trusted library allocation
page read and write
1D4002832000
trusted library allocation
page read and write
59BC00354000
trusted library allocation
page read and write
14D0000
heap
page read and write
1D4001768000
trusted library allocation
page read and write
C07E5FE000
unkown
page readonly
59BC00238000
trusted library allocation
page read and write
184E000
stack
page read and write
1D4001DE8000
trusted library allocation
page read and write
6AE8002BC000
trusted library allocation
page read and write
1E299B00000
heap
page read and write
1D4000F3C000
trusted library allocation
page read and write
1D4000DC0000
trusted library allocation
page read and write
1D4001B60000
trusted library allocation
page read and write
1D400159C000
trusted library allocation
page read and write
1D4001E04000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
6801000
heap
page read and write
8451000
heap
page read and write
59BC00380000
trusted library allocation
page read and write
1D4002928000
trusted library allocation
page read and write
1D4000FE4000
trusted library allocation
page read and write
59BC00664000
trusted library allocation
page read and write
59BC00654000
trusted library allocation
page read and write
C07DDFE000
stack
page read and write
1D40001DC000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4000330000
trusted library allocation
page read and write
1D40028DF000
trusted library allocation
page read and write
1D4001DBC000
trusted library allocation
page read and write
1D4000BF8000
trusted library allocation
page read and write
1D40028C3000
trusted library allocation
page read and write
6AE8002F4000
trusted library allocation
page read and write
74F4000
heap
page read and write
6F00000
direct allocation
page execute and read and write
1D4000FA8000
trusted library allocation
page read and write
1D4001CE0000
trusted library allocation
page read and write
1D4000758000
trusted library allocation
page read and write
59BC00750000
trusted library allocation
page read and write
1D4001D95000
trusted library allocation
page read and write
6A5BE000
direct allocation
page read and write
1D4002829000
trusted library allocation
page read and write
1E29D002000
heap
page read and write
6801000
heap
page read and write
76DB000
heap
page read and write
1D4001574000
trusted library allocation
page read and write
C0795FE000
stack
page read and write
14AA000
heap
page read and write
1D4002874000
trusted library allocation
page read and write
59BC00694000
trusted library allocation
page read and write
158800230000
direct allocation
page read and write
1E29CFFE000
heap
page read and write
1D4001340000
trusted library allocation
page read and write
1E29D572000
heap
page read and write
1D4001C2C000
trusted library allocation
page read and write
6A6F8000
direct allocation
page read and write
140A000
heap
page read and write
6801000
heap
page read and write
1E29CFF6000
heap
page read and write
1D4001844000
trusted library allocation
page read and write
59BC00788000
trusted library allocation
page read and write
1E29CFF2000
heap
page read and write
1E29D5FB000
heap
page read and write
1D40014AC000
trusted library allocation
page read and write
6801000
heap
page read and write
1E29CFFB000
heap
page read and write
7182000
heap
page read and write
6C90000
direct allocation
page read and write
C074DFC000
stack
page read and write
6FE0000
direct allocation
page execute and read and write
33B7000
heap
page read and write
1E29CFFE000
heap
page read and write
6801000
heap
page read and write
59BC00404000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
6AE8002B0000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
6A6EE000
direct allocation
page read and write
1D40007B0000
trusted library allocation
page read and write
158800270000
direct allocation
page read and write
1D4002832000
trusted library allocation
page read and write
59BC006E8000
trusted library allocation
page read and write
1E29CFFF000
heap
page read and write
1D4001878000
trusted library allocation
page read and write
59BC006E4000
trusted library allocation
page read and write
443E000
stack
page read and write
1D4000F3C000
trusted library allocation
page read and write
1D4000E78000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4001ACC000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1E2A2C6D000
heap
page read and write
1D40016A8000
trusted library allocation
page read and write
1D400100C000
trusted library allocation
page read and write
158800274000
direct allocation
page read and write
1D4001DD5000
trusted library allocation
page read and write
14D8000
heap
page read and write
1E29D00F000
heap
page read and write
6F10000
direct allocation
page execute and read and write
1D400170C000
trusted library allocation
page read and write
59BC0069C000
trusted library allocation
page read and write
1D400104C000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4000708000
trusted library allocation
page read and write
1D40012D4000
trusted library allocation
page read and write
74F9000
heap
page read and write
1D400000C000
trusted library allocation
page read and write
6F10000
direct allocation
page execute and read and write
1E29CFF5000
heap
page read and write
6801000
heap
page read and write
1D400284C000
trusted library allocation
page read and write
1E29CFFE000
heap
page read and write
1E29D57B000
heap
page read and write
1E29CFF8000
heap
page read and write
1D40002B4000
trusted library allocation
page read and write
1D4000304000
trusted library allocation
page read and write
1D4001DE8000
trusted library allocation
page read and write
231000
unkown
page execute and write copy
1D4001B24000
trusted library allocation
page read and write
1D4000194000
trusted library allocation
page read and write
1D4001BE2000
trusted library allocation
page read and write
1D4001C2C000
trusted library allocation
page read and write
1D4000454000
trusted library allocation
page read and write
1E29CFF6000
heap
page read and write
1D4000CB8000
trusted library allocation
page read and write
C0017FE000
unkown
page readonly
1D4001BC0000
trusted library allocation
page read and write
1D4001BC0000
trusted library allocation
page read and write
1E29D553000
heap
page read and write
1D4002E01000
trusted library allocation
page read and write
1D4000CD0000
trusted library allocation
page read and write
1E29CFF8000
heap
page read and write
1D4001444000
trusted library allocation
page read and write
1D4000F20000
trusted library allocation
page read and write
1D4001A5C000
trusted library allocation
page read and write
59BC0035C000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4001D9F000
trusted library allocation
page read and write
93A000
unkown
page execute and read and write
6F40000
direct allocation
page execute and read and write
59BC00698000
trusted library allocation
page read and write
1D4000A14000
trusted library allocation
page read and write
1E299CB0000
heap
page read and write
69CC1000
direct allocation
page execute read
1D40028C3000
trusted library allocation
page read and write
736C000
heap
page read and write
1D4001B64000
trusted library allocation
page read and write
C008FFE000
unkown
page readonly
6801000
heap
page read and write
6AE8002BC000
trusted library allocation
page read and write
75C1000
heap
page read and write
1D4000C3C000
trusted library allocation
page read and write
14D0000
heap
page read and write
1D4000E40000
trusted library allocation
page read and write
1D400198B000
trusted library allocation
page read and write
1D400020C000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1E29CFF8000
heap
page read and write
C00DFFE000
stack
page read and write
1D40015D4000
trusted library allocation
page read and write
158800294000
direct allocation
page read and write
1E2A2C96000
heap
page read and write
1588002AC000
direct allocation
page read and write
6AE8002E4000
trusted library allocation
page read and write
13ED000
stack
page read and write
1D40009C4000
trusted library allocation
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
1E29CFFE000
heap
page read and write
33A0000
direct allocation
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
1D4001DA9000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4000F3C000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1E29D002000
heap
page read and write
6801000
heap
page read and write
14AF000
heap
page read and write
1D400183C000
trusted library allocation
page read and write
330E000
stack
page read and write
1E29D002000
heap
page read and write
1D40028C6000
trusted library allocation
page read and write
14DC000
heap
page read and write
1D400284C000
trusted library allocation
page read and write
C078DFE000
stack
page read and write
6801000
heap
page read and write
1D4000CC0000
trusted library allocation
page read and write
1E29CFF2000
heap
page read and write
1E29CFF3000
heap
page read and write
1D40028C6000
trusted library allocation
page read and write
1D400131C000
trusted library allocation
page read and write
1D40002F0000
trusted library allocation
page read and write
6AE800288000
trusted library allocation
page read and write
1D4001DD0000
trusted library allocation
page read and write
1E29CFE9000
heap
page read and write
1E29CFFE000
heap
page read and write
1D4000870000
trusted library allocation
page read and write
59BC00718000
trusted library allocation
page read and write
1E29CFF8000
heap
page read and write
1D4002874000
trusted library allocation
page read and write
158800210000
direct allocation
page read and write
71F0000
heap
page read and write
1D4001A10000
trusted library allocation
page read and write
74F7000
heap
page read and write
1D4001DBC000
trusted library allocation
page read and write
14D3000
heap
page read and write
1D40028C3000
trusted library allocation
page read and write
158800215000
direct allocation
page read and write
1E29CFF2000
heap
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
1D4001C44000
trusted library allocation
page read and write
59BC00784000
trusted library allocation
page read and write
33A0000
direct allocation
page read and write
1D4001C2C000
trusted library allocation
page read and write
1D40014AC000
trusted library allocation
page read and write
1E29CFF8000
heap
page read and write
6801000
heap
page read and write
1D4000201000
trusted library allocation
page read and write
6801000
heap
page read and write
1D40017D4000
trusted library allocation
page read and write
6AE8002BC000
trusted library allocation
page read and write
1D40028C6000
trusted library allocation
page read and write
1D4001DD5000
trusted library allocation
page read and write
1D4001B44000
trusted library allocation
page read and write
14AF000
heap
page read and write
1D4000344000
trusted library allocation
page read and write
14B3000
heap
page read and write
1D4001DBC000
trusted library allocation
page read and write
F70000
heap
page read and write
1D4000298000
trusted library allocation
page read and write
14D3000
heap
page read and write
145A000
heap
page read and write
1E29D002000
heap
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
1D4000344000
trusted library allocation
page read and write
1D40014AC000
trusted library allocation
page read and write
1D4000766000
trusted library allocation
page read and write
1D4000A88000
trusted library allocation
page read and write
1D4001DD5000
trusted library allocation
page read and write
48BE000
stack
page read and write
1D40002A4000
trusted library allocation
page read and write
6801000
heap
page read and write
C003FFD000
stack
page read and write
1D40028DF000
trusted library allocation
page read and write
1D4001DBC000
trusted library allocation
page read and write
1D4000A14000
trusted library allocation
page read and write
1D4001D28000
trusted library allocation
page read and write
1D40028C6000
trusted library allocation
page read and write
59BC0075C000
trusted library allocation
page read and write
1D400158C000
trusted library allocation
page read and write
75D5000
heap
page read and write
1D400014C000
trusted library allocation
page read and write
1D40001C8000
trusted library allocation
page read and write
1D400080C000
trusted library allocation
page read and write
1D4001DE8000
trusted library allocation
page read and write
1D4001830000
trusted library allocation
page read and write
5CBF000
stack
page read and write
6801000
heap
page read and write
1D4000AAC000
trusted library allocation
page read and write
766B000
heap
page read and write
1E29D009000
heap
page read and write
1D40028C6000
trusted library allocation
page read and write
6801000
heap
page read and write
33A0000
direct allocation
page read and write
1E29CFF8000
heap
page read and write
74F6000
heap
page read and write
1D40009F4000
trusted library allocation
page read and write
1D400284C000
trusted library allocation
page read and write
59BC00760000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4000B98000
trusted library allocation
page read and write
1D4001640000
trusted library allocation
page read and write
1D4002900000
trusted library allocation
page read and write
1D4001B00000
trusted library allocation
page read and write
1D40018D0000
trusted library allocation
page read and write
1D40017CC000
trusted library allocation
page read and write
1D4000D9C000
trusted library allocation
page read and write
13F1000
stack
page read and write
1D4002928000
trusted library allocation
page read and write
334E000
stack
page read and write
1D400081C000
trusted library allocation
page read and write
716B000
heap
page read and write
5ABE000
stack
page read and write
1E29D589000
heap
page read and write
6801000
heap
page read and write
1D4001DD5000
trusted library allocation
page read and write
74F0000
heap
page read and write
1D400180C000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4002868000
trusted library allocation
page read and write
74F6000
heap
page read and write
1D400033C000
trusted library allocation
page read and write
33A0000
direct allocation
page read and write
1D4001DD0000
trusted library allocation
page read and write
6801000
heap
page read and write
1D40028DD000
trusted library allocation
page read and write
74FA000
heap
page read and write
BE1000
unkown
page execute and read and write
59BC002DC000
trusted library allocation
page read and write
6801000
heap
page read and write
6AE8002C0000
trusted library allocation
page read and write
1E29CFFA000
heap
page read and write
14D5000
heap
page read and write
5A7F000
stack
page read and write
1D4002874000
trusted library allocation
page read and write
1D4001490000
trusted library allocation
page read and write
59BC00354000
trusted library allocation
page read and write
1D4001860000
trusted library allocation
page read and write
1D4000228000
trusted library allocation
page read and write
1499000
heap
page read and write
1D4000670000
trusted library allocation
page read and write
1D40028C3000
trusted library allocation
page read and write
14AF000
heap
page read and write
1D4001D95000
trusted library allocation
page read and write
1D40028DF000
trusted library allocation
page read and write
6801000
heap
page read and write
1D40016F4000
trusted library allocation
page read and write
1D40007E8000
trusted library allocation
page read and write
6F10000
direct allocation
page execute and read and write
1D4002900000
trusted library allocation
page read and write
1D4000D90000
trusted library allocation
page read and write
6A629000
direct allocation
page readonly
1E29D00F000
heap
page read and write
1E29CFFE000
heap
page read and write
1E29D230000
heap
page read and write
1D40012F8000
trusted library allocation
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
F90000
heap
page read and write
1D4000220000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4001250000
trusted library allocation
page read and write
14D0000
heap
page read and write
74F0000
heap
page read and write
6801000
heap
page read and write
C00E7FE000
unkown
page readonly
1D4002907000
trusted library allocation
page read and write
6AE8002D8000
trusted library allocation
page read and write
1D40016C8000
trusted library allocation
page read and write
1D4001DD5000
trusted library allocation
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
1D4002F7C000
trusted library allocation
page read and write
1D4001DA9000
trusted library allocation
page read and write
1D4000294000
trusted library allocation
page read and write
1D40028DF000
trusted library allocation
page read and write
6801000
heap
page read and write
1D400033C000
trusted library allocation
page read and write
6F10000
direct allocation
page execute and read and write
1D4000A14000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4000347000
trusted library allocation
page read and write
1D40012F8000
trusted library allocation
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
1E299A40000
heap
page read and write
1D4000294000
trusted library allocation
page read and write
1D4001620000
trusted library allocation
page read and write
1D4002900000
trusted library allocation
page read and write
1D400033C000
trusted library allocation
page read and write
1D4001480000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1E299980000
heap
page read and write
1D4000529000
trusted library allocation
page read and write
F74000
heap
page read and write
1D40013D4000
trusted library allocation
page read and write
1D40014AC000
trusted library allocation
page read and write
6801000
heap
page read and write
59BC00700000
trusted library allocation
page read and write
59BC00320000
trusted library allocation
page read and write
6AE80020C000
trusted library allocation
page read and write
1E29D5E3000
heap
page read and write
75C6000
heap
page read and write
1D4002928000
trusted library allocation
page read and write
1D4002F7C000
trusted library allocation
page read and write
1D4002907000
trusted library allocation
page read and write
14AF000
heap
page read and write
1D4001984000
trusted library allocation
page read and write
1E2A32C6000
trusted library section
page read and write
6F10000
direct allocation
page execute and read and write
1D40004A0000
trusted library allocation
page read and write
1D400109C000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1D40012D4000
trusted library allocation
page read and write
1D4001088000
trusted library allocation
page read and write
6801000
heap
page read and write
F74000
heap
page read and write
1D4002900000
trusted library allocation
page read and write
1E29CFEE000
heap
page read and write
C0177FE000
unkown
page readonly
1D4002874000
trusted library allocation
page read and write
1D4002890000
trusted library allocation
page read and write
1D40028DD000
trusted library allocation
page read and write
1D4000984000
trusted library allocation
page read and write
1E2A3F92000
trusted library section
page read and write
1D4000350000
trusted library allocation
page read and write
1D4000FA8000
trusted library allocation
page read and write
CC8000
unkown
page execute and write copy
1D4000524000
trusted library allocation
page read and write
1E29D500000
heap
page read and write
1D4000454000
trusted library allocation
page read and write
1D4001278000
trusted library allocation
page read and write
1D4000380000
trusted library allocation
page read and write
6ECF000
stack
page read and write
6801000
heap
page read and write
941000
unkown
page execute and read and write
1D4002907000
trusted library allocation
page read and write
1E29CFF8000
heap
page read and write
6801000
heap
page read and write
14B0000
heap
page read and write
75E3000
heap
page read and write
6801000
heap
page read and write
1D4002938000
trusted library allocation
page read and write
1D4000C6C000
trusted library allocation
page read and write
1D400160C000
trusted library allocation
page read and write
C01D7FE000
unkown
page readonly
6801000
heap
page read and write
1E29CFEE000
heap
page read and write
74F1000
heap
page read and write
1E29D00E000
heap
page read and write
6801000
heap
page read and write
1D4001438000
trusted library allocation
page read and write
1D4001DA9000
trusted library allocation
page read and write
72F2000
heap
page read and write
1E29CFF2000
heap
page read and write
6801000
heap
page read and write
1D4001BF0000
trusted library allocation
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
6F10000
direct allocation
page execute and read and write
1E29D00F000
heap
page read and write
1D400284E000
trusted library allocation
page read and write
1D4000B84000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4000304000
trusted library allocation
page read and write
74F3000
heap
page read and write
1D4000F3C000
trusted library allocation
page read and write
1D4000454000
trusted library allocation
page read and write
1D4000480000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4001C0C000
trusted library allocation
page read and write
6801000
heap
page read and write
1D400284E000
trusted library allocation
page read and write
1D4002F9C000
trusted library allocation
page read and write
1D4001AC8000
trusted library allocation
page read and write
1E2A2CCD000
heap
page read and write
72F1000
heap
page read and write
C000FFC000
stack
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
6F10000
direct allocation
page execute and read and write
1D40028C6000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4001D95000
trusted library allocation
page read and write
6AE800230000
trusted library allocation
page read and write
1D4000290000
trusted library allocation
page read and write
1D4001A74000
trusted library allocation
page read and write
6801000
heap
page read and write
1D40017D8000
trusted library allocation
page read and write
1D4000C0C000
trusted library allocation
page read and write
1D4001DA9000
trusted library allocation
page read and write
1E2A2CAD000
heap
page read and write
1D400184C000
trusted library allocation
page read and write
763F000
heap
page read and write
75BD000
heap
page read and write
1D4001980000
trusted library allocation
page read and write
AC9000
unkown
page execute and read and write
1D40028DD000
trusted library allocation
page read and write
1D4002874000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1D400189C000
trusted library allocation
page read and write
C0785FE000
unkown
page readonly
59BC0039C000
trusted library allocation
page read and write
1E2A3FD0000
trusted library section
page read and write
1453000
heap
page read and write
17CF000
stack
page read and write
1D4001758000
trusted library allocation
page read and write
1E29D506000
heap
page read and write
1D4001DD0000
trusted library allocation
page read and write
1D4000E64000
trusted library allocation
page read and write
1D4000AEC000
trusted library allocation
page read and write
1D4000904000
trusted library allocation
page read and write
1E29D02B000
heap
page read and write
1D4002868000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1D4000F3C000
trusted library allocation
page read and write
467E000
stack
page read and write
59BC00754000
trusted library allocation
page read and write
59BC00248000
trusted library allocation
page read and write
F74000
heap
page read and write
1E29D5A0000
heap
page read and write
1E29CFFE000
heap
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
1D4002900000
trusted library allocation
page read and write
1D400073C000
trusted library allocation
page read and write
6801000
heap
page read and write
324C000
stack
page read and write
1D4002928000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1E29D002000
heap
page read and write
6FC0000
direct allocation
page execute and read and write
1D4000EA0000
trusted library allocation
page read and write
1D40012F8000
trusted library allocation
page read and write
1D4000A14000
trusted library allocation
page read and write
F74000
heap
page read and write
6801000
heap
page read and write
1D4001438000
trusted library allocation
page read and write
1D40006DC000
trusted library allocation
page read and write
1D40007AC000
trusted library allocation
page read and write
1D4000958000
trusted library allocation
page read and write
59BC00320000
trusted library allocation
page read and write
1E29D002000
heap
page read and write
1D400022C000
trusted library allocation
page read and write
1D4000A01000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4000BDC000
trusted library allocation
page read and write
1D4000801000
trusted library allocation
page read and write
1D4001DD0000
trusted library allocation
page read and write
1E299A30000
heap
page read and write
1E29D002000
heap
page read and write
1D40028DF000
trusted library allocation
page read and write
1D4001D95000
trusted library allocation
page read and write
1D400284E000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4002E0C000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4000EF8000
trusted library allocation
page read and write
1D4000F2C000
trusted library allocation
page read and write
1D4000C01000
trusted library allocation
page read and write
1D4000454000
trusted library allocation
page read and write
1D4002868000
trusted library allocation
page read and write
1D4000EB0000
trusted library allocation
page read and write
65BF000
stack
page read and write
C00F7FE000
unkown
page readonly
1D4001DD5000
trusted library allocation
page read and write
1D400142C000
trusted library allocation
page read and write
1D4001DD0000
trusted library allocation
page read and write
1E29D557000
heap
page read and write
1D4002832000
trusted library allocation
page read and write
1E29D002000
heap
page read and write
1D4000654000
trusted library allocation
page read and write
63BE000
stack
page read and write
6F60000
direct allocation
page execute and read and write
1E29CFF8000
heap
page read and write
1D40009E4000
trusted library allocation
page read and write
1D4001D9F000
trusted library allocation
page read and write
1E29CFFE000
heap
page read and write
1D400284E000
trusted library allocation
page read and write
1E29CFFE000
heap
page read and write
14D3000
heap
page read and write
F74000
heap
page read and write
6801000
heap
page read and write
33A0000
direct allocation
page read and write
1D4000AD8000
trusted library allocation
page read and write
1D400140C000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4000D10000
trusted library allocation
page read and write
1D40017A8000
trusted library allocation
page read and write
1D40014AC000
trusted library allocation
page read and write
1D4000304000
trusted library allocation
page read and write
1E29D009000
heap
page read and write
59BC00770000
trusted library allocation
page read and write
1E29CFEE000
heap
page read and write
1D400244F000
trusted library allocation
page read and write
1D40028C6000
trusted library allocation
page read and write
1D400136C000
trusted library allocation
page read and write
1E29D460000
trusted library section
page read and write
1D4002928000
trusted library allocation
page read and write
1D4002907000
trusted library allocation
page read and write
1E29CFF8000
heap
page read and write
6801000
heap
page read and write
1D4001168000
trusted library allocation
page read and write
1D4000D78000
trusted library allocation
page read and write
6801000
heap
page read and write
1E29CFF2000
heap
page read and write
1D400284C000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1D40028C6000
trusted library allocation
page read and write
1E299990000
heap
page readonly
1D4000350000
trusted library allocation
page read and write
1D4000E34000
trusted library allocation
page read and write
1D400033C000
trusted library allocation
page read and write
1D4002868000
trusted library allocation
page read and write
1D4000BF8000
trusted library allocation
page read and write
1D4001468000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
6801000
heap
page read and write
1D4001A98000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4001DE8000
trusted library allocation
page read and write
1D4001DA9000
trusted library allocation
page read and write
1E299A49000
heap
page read and write
1D4001801000
trusted library allocation
page read and write
1E29CFF7000
heap
page read and write
1E29D00F000
heap
page read and write
1D4002868000
trusted library allocation
page read and write
1E299C70000
trusted library section
page readonly
1D4002890000
trusted library allocation
page read and write
33BE000
heap
page read and write
14DC000
heap
page read and write
1D4000AC8000
trusted library allocation
page read and write
1E29CFE9000
heap
page read and write
1D4001229000
trusted library allocation
page read and write
1D4001D95000
trusted library allocation
page read and write
1D4001228000
trusted library allocation
page read and write
1D4000CA8000
trusted library allocation
page read and write
1D4002829000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4000C80000
trusted library allocation
page read and write
1D40008F8000
trusted library allocation
page read and write
6AE8002C0000
trusted library allocation
page read and write
59BC002F0000
trusted library allocation
page read and write
6801000
heap
page read and write
1E2A30F7000
unclassified section
page read and write
1E2A2C89000
heap
page read and write
1E29D002000
heap
page read and write
1D4002890000
trusted library allocation
page read and write
51BE000
stack
page read and write
1D40028C3000
trusted library allocation
page read and write
1D4001274000
trusted library allocation
page read and write
1D40019D8000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
140E000
heap
page read and write
1D4000BF8000
trusted library allocation
page read and write
1D40028C3000
trusted library allocation
page read and write
6F10000
direct allocation
page execute and read and write
1D4000680000
trusted library allocation
page read and write
1D4002004000
trusted library allocation
page read and write
1D4000098000
trusted library allocation
page read and write
1E29D004000
heap
page read and write
144C000
heap
page read and write
1D40008E8000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1D40015E8000
trusted library allocation
page read and write
1D4000A8B000
trusted library allocation
page read and write
1D4000EDC000
trusted library allocation
page read and write
1D40007B0000
trusted library allocation
page read and write
1E29CFFE000
heap
page read and write
1D400135C000
trusted library allocation
page read and write
1D400131C000
trusted library allocation
page read and write
1D40012D4000
trusted library allocation
page read and write
59BC0035C000
trusted library allocation
page read and write
1D40028C6000
trusted library allocation
page read and write
1D4002874000
trusted library allocation
page read and write
33A0000
direct allocation
page read and write
1E29D00F000
heap
page read and write
1D4001DD0000
trusted library allocation
page read and write
1D40012F8000
trusted library allocation
page read and write
338E000
stack
page read and write
1D4002EE0000
trusted library allocation
page read and write
1E29D004000
heap
page read and write
1D4001D95000
trusted library allocation
page read and write
1D40013DC000
trusted library allocation
page read and write
59BC00330000
trusted library allocation
page read and write
14AA000
heap
page read and write
59BC00320000
trusted library allocation
page read and write
1D4000EAC000
trusted library allocation
page read and write
1D4001AC4000
trusted library allocation
page read and write
1D4001BF0000
trusted library allocation
page read and write
1D4001364000
trusted library allocation
page read and write
6801000
heap
page read and write
1E29D00F000
heap
page read and write
6801000
heap
page read and write
1E29D00F000
heap
page read and write
1E29CFF6000
heap
page read and write
C07C5FE000
unkown
page readonly
14DA000
heap
page read and write
1D4001BF0000
trusted library allocation
page read and write
1D4001BD0000
trusted library allocation
page read and write
1D400140C000
trusted library allocation
page read and write
1E29CFC0000
heap
page read and write
1D4001340000
trusted library allocation
page read and write
1D4000F3C000
trusted library allocation
page read and write
1D4002928000
trusted library allocation
page read and write
59BC00714000
trusted library allocation
page read and write
1D40001B4000
trusted library allocation
page read and write
1D4000AA0000
trusted library allocation
page read and write
1E2A3190000
heap
page read and write
1D4000F3C000
trusted library allocation
page read and write
6801000
heap
page read and write
F74000
heap
page read and write
1E29D570000
heap
page read and write
6AE800274000
trusted library allocation
page read and write
1D4002876000
trusted library allocation
page read and write
1D40019CC000
trusted library allocation
page read and write
1E29D002000
heap
page read and write
1E29D00F000
heap
page read and write
1D4000CDC000
trusted library allocation
page read and write
6801000
heap
page read and write
1E2A2CAD000
heap
page read and write
92B8000
heap
page read and write
1D4000BD4000
trusted library allocation
page read and write
59BC00658000
trusted library allocation
page read and write
59BC002CC000
trusted library allocation
page read and write
1D4002829000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1E2A2C40000
heap
page read and write
1D4000F3C000
trusted library allocation
page read and write
C07FDFE000
stack
page read and write
14AF000
heap
page read and write
1D4000E1C000
trusted library allocation
page read and write
6801000
heap
page read and write
53FE000
stack
page read and write
1E2A35F0000
trusted library section
page read and write
1E29D002000
heap
page read and write
1D4001DBC000
trusted library allocation
page read and write
1E29CFFE000
heap
page read and write
1D4002938000
trusted library allocation
page read and write
1D4001BF0000
trusted library allocation
page read and write
1D40028C3000
trusted library allocation
page read and write
1E29D002000
heap
page read and write
1D40014AC000
trusted library allocation
page read and write
76DF000
heap
page read and write
1D40001B4000
trusted library allocation
page read and write
1D400161C000
trusted library allocation
page read and write
59BC00310000
trusted library allocation
page read and write
C073DF9000
stack
page read and write
1442000
heap
page read and write
1D4000224000
trusted library allocation
page read and write
59BC0027C000
trusted library allocation
page read and write
C00C7FE000
unkown
page readonly
1E29D02B000
heap
page read and write
1E29D00F000
heap
page read and write
1D4001858000
trusted library allocation
page read and write
6AE8002C0000
trusted library allocation
page read and write
74F3000
heap
page read and write
1E29D00F000
heap
page read and write
1D40003A9000
trusted library allocation
page read and write
75E4000
heap
page read and write
1D4001AC0000
trusted library allocation
page read and write
6801000
heap
page read and write
1D400186C000
trusted library allocation
page read and write
1D4001A64000
trusted library allocation
page read and write
1D4001DE8000
trusted library allocation
page read and write
1D4002868000
trusted library allocation
page read and write
1D4001BD0000
trusted library allocation
page read and write
59BC002B8000
trusted library allocation
page read and write
1E29D012000
heap
page read and write
230000
unkown
page read and write
1D4000C9C000
trusted library allocation
page read and write
1D4001658000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1588002E4000
direct allocation
page read and write
6A0BA000
direct allocation
page read and write
55FF000
stack
page read and write
1E2A1324000
trusted library allocation
page read and write
758B000
heap
page read and write
1D40028DD000
trusted library allocation
page read and write
1D40006E2000
trusted library allocation
page read and write
1E29CFFE000
heap
page read and write
6F10000
direct allocation
page execute and read and write
1D4002928000
trusted library allocation
page read and write
1E29CFF8000
heap
page read and write
1D4001820000
trusted library allocation
page read and write
1D4000634000
trusted library allocation
page read and write
1D4001D30000
trusted library allocation
page read and write
1D4002890000
trusted library allocation
page read and write
1D4002890000
trusted library allocation
page read and write
1D4001568000
trusted library allocation
page read and write
59BC0025C000
trusted library allocation
page read and write
1D4000590000
trusted library allocation
page read and write
1E29D56E000
heap
page read and write
1D4001284000
trusted library allocation
page read and write
1D4001444000
trusted library allocation
page read and write
14DC000
heap
page read and write
1D4000F80000
trusted library allocation
page read and write
1D4002EF0000
trusted library allocation
page read and write
6801000
heap
page read and write
1D40019D4000
trusted library allocation
page read and write
1D400188C000
trusted library allocation
page read and write
1D40013EC000
trusted library allocation
page read and write
1D40004B8000
trusted library allocation
page read and write
6801000
heap
page read and write
767F000
heap
page read and write
1D40028DF000
trusted library allocation
page read and write
C00B7FE000
unkown
page readonly
1D4002938000
trusted library allocation
page read and write
1D4002874000
trusted library allocation
page read and write
1D40014AC000
trusted library allocation
page read and write
59BC007B4000
trusted library allocation
page read and write
1D4001D9F000
trusted library allocation
page read and write
1D4000E48000
trusted library allocation
page read and write
1E2A3203000
heap
page read and write
74FA000
heap
page read and write
1D4000230000
trusted library allocation
page read and write
1D400157C000
trusted library allocation
page read and write
587E000
stack
page read and write
C01BFFD000
stack
page read and write
1D400018C000
trusted library allocation
page read and write
1D4000300000
trusted library allocation
page read and write
6801000
heap
page read and write
1D40028DD000
trusted library allocation
page read and write
1D400035C000
trusted library allocation
page read and write
1E29D561000
heap
page read and write
6801000
heap
page read and write
1D4001BBD000
trusted library allocation
page read and write
1E29CFFE000
heap
page read and write
1D4002907000
trusted library allocation
page read and write
1D4002890000
trusted library allocation
page read and write
59BC00688000
trusted library allocation
page read and write
7585000
heap
page read and write
1D4002938000
trusted library allocation
page read and write
1D4000BF8000
trusted library allocation
page read and write
1D4001980000
trusted library allocation
page read and write
C0157FE000
unkown
page readonly
1D4002829000
trusted library allocation
page read and write
1D4001AA8000
trusted library allocation
page read and write
14D5000
heap
page read and write
C0715FE000
unkown
page readonly
617E000
stack
page read and write
1D4002EE8000
trusted library allocation
page read and write
7399000
direct allocation
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
14DA000
heap
page read and write
1E29D01A000
heap
page read and write
1D4001DA9000
trusted library allocation
page read and write
1D4000350000
trusted library allocation
page read and write
C07EDFE000
stack
page read and write
1D40003B0000
trusted library allocation
page read and write
1E29D557000
heap
page read and write
6A0F9000
direct allocation
page read and write
1E29D00F000
heap
page read and write
1E29D02B000
heap
page read and write
1E29D00F000
heap
page read and write
6801000
heap
page read and write
72F0000
heap
page read and write
6AE8002A0000
trusted library allocation
page read and write
C0057FE000
unkown
page readonly
1E29CFEE000
heap
page read and write
CB9000
unkown
page execute and read and write
1D4000294000
trusted library allocation
page read and write
14AF000
heap
page read and write
1E29D00F000
heap
page read and write
37BF000
stack
page read and write
1E29CFF5000
heap
page read and write
6AE8002F8000
trusted library allocation
page read and write
1E29CFFE000
heap
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
4AFE000
stack
page read and write
6801000
heap
page read and write
1D4000294000
trusted library allocation
page read and write
59BC00418000
trusted library allocation
page read and write
1D400284E000
trusted library allocation
page read and write
59BC006B8000
trusted library allocation
page read and write
C014FFE000
stack
page read and write
1D4001B28000
trusted library allocation
page read and write
1D40028DD000
trusted library allocation
page read and write
1D4001578000
trusted library allocation
page read and write
75CA000
heap
page read and write
4CFF000
stack
page read and write
1E29CFFE000
heap
page read and write
1E29CFFE000
heap
page read and write
1E29D003000
heap
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
1D4002890000
trusted library allocation
page read and write
1E29D02B000
heap
page read and write
1E29D5A7000
heap
page read and write
1D4001DBC000
trusted library allocation
page read and write
1D40012F8000
trusted library allocation
page read and write
F74000
heap
page read and write
1E2A3350000
trusted library section
page read and write
1D4000BF8000
trusted library allocation
page read and write
14CE000
heap
page read and write
6801000
heap
page read and write
1D40015DC000
trusted library allocation
page read and write
6801000
heap
page read and write
1D40016E0000
trusted library allocation
page read and write
1D4000E4C000
trusted library allocation
page read and write
1D40019E8000
trusted library allocation
page read and write
1D4001708000
trusted library allocation
page read and write
1E2A3087000
unclassified section
page read and write
1D4001B18000
trusted library allocation
page read and write
1D40028C6000
trusted library allocation
page read and write
1D4001D95000
trusted library allocation
page read and write
75C2000
heap
page read and write
1D4000A0C000
trusted library allocation
page read and write
1D4000D54000
trusted library allocation
page read and write
6801000
heap
page read and write
1D40028C3000
trusted library allocation
page read and write
1D40010C0000
trusted library allocation
page read and write
1D4001218000
trusted library allocation
page read and write
1D4000F3C000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4001298000
trusted library allocation
page read and write
74F3000
heap
page read and write
75E6000
heap
page read and write
1D40028C6000
trusted library allocation
page read and write
1D4002CDC000
trusted library allocation
page read and write
1E29CFF8000
heap
page read and write
1D4000F48000
trusted library allocation
page read and write
1D4001764000
trusted library allocation
page read and write
59BC00678000
trusted library allocation
page read and write
1E29CFF5000
heap
page read and write
7599000
heap
page read and write
6801000
heap
page read and write
1D4001248000
trusted library allocation
page read and write
6801000
heap
page read and write
1D400050C000
trusted library allocation
page read and write
1D4001A40000
trusted library allocation
page read and write
1D4002876000
trusted library allocation
page read and write
1D4001CF8000
trusted library allocation
page read and write
75A4000
heap
page read and write
1D4001030000
trusted library allocation
page read and write
6A2BE000
direct allocation
page read and write
74F1000
heap
page read and write
14AC000
heap
page read and write
76D8000
heap
page read and write
1E29D00F000
heap
page read and write
6C90000
direct allocation
page read and write
C001FFA000
stack
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
1D4000BB8000
trusted library allocation
page read and write
1D40001A0000
trusted library allocation
page read and write
74F7000
heap
page read and write
6801000
heap
page read and write
1D4002938000
trusted library allocation
page read and write
1D4001BD0000
trusted library allocation
page read and write
89BB000
heap
page read and write
1D4000370000
trusted library allocation
page read and write
6AE800278000
trusted library allocation
page read and write
1D400176C000
trusted library allocation
page read and write
1D4000214000
trusted library allocation
page read and write
E7E000
unkown
page execute and read and write
1D4000350000
trusted library allocation
page read and write
1D4000F7C000
trusted library allocation
page read and write
C0067FE000
unkown
page readonly
1E29CFE5000
heap
page read and write
1D4000F58000
trusted library allocation
page read and write
1D400029C000
trusted library allocation
page read and write
1D4001D9F000
trusted library allocation
page read and write
1E29D7C0000
trusted library section
page read and write
1E2A3BE0000
unkown
page readonly
1D400027C000
trusted library allocation
page read and write
1D4001DE8000
trusted library allocation
page read and write
14A2000
heap
page read and write
1D40003B0000
trusted library allocation
page read and write
6801000
heap
page read and write
6F10000
direct allocation
page execute and read and write
1E29CFF6000
heap
page read and write
613F000
stack
page read and write
1D4001278000
trusted library allocation
page read and write
1D40016A4000
trusted library allocation
page read and write
6801000
heap
page read and write
C06FDFE000
stack
page read and write
715B000
heap
page read and write
59BC006AC000
trusted library allocation
page read and write
1D4000134000
trusted library allocation
page read and write
1E29D589000
heap
page read and write
1E29D000000
heap
page read and write
6A310000
direct allocation
page read and write
1D4001168000
trusted library allocation
page read and write
75D4000
heap
page read and write
1D4000CDC000
trusted library allocation
page read and write
1D4001DBC000
trusted library allocation
page read and write
1D40016DC000
trusted library allocation
page read and write
1D400099B000
trusted library allocation
page read and write
1E29CFFF000
heap
page read and write
1E29D00F000
heap
page read and write
1D400131C000
trusted library allocation
page read and write
1D4001D95000
trusted library allocation
page read and write
59BC00430000
trusted library allocation
page read and write
14DC000
heap
page read and write
1D4000CDC000
trusted library allocation
page read and write
1D4002204000
trusted library allocation
page read and write
1E29CFFE000
heap
page read and write
1453000
heap
page read and write
1E29D002000
heap
page read and write
C0745FE000
unkown
page readonly
145F000
heap
page read and write
1E29D009000
heap
page read and write
1D4001688000
trusted library allocation
page read and write
6801000
heap
page read and write
7591000
heap
page read and write
1D4001D9F000
trusted library allocation
page read and write
1E29D003000
heap
page read and write
1D400179C000
trusted library allocation
page read and write
1D40028DF000
trusted library allocation
page read and write
1E2A2C95000
heap
page read and write
1D4001B10000
trusted library allocation
page read and write
1E2A3F9D000
trusted library section
page read and write
6801000
heap
page read and write
1D4001201000
trusted library allocation
page read and write
14D5000
heap
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
1D4001DD0000
trusted library allocation
page read and write
6801000
heap
page read and write
1457000
heap
page read and write
1D4001860000
trusted library allocation
page read and write
1D4002890000
trusted library allocation
page read and write
74FF000
heap
page read and write
1D400145C000
trusted library allocation
page read and write
74F9000
heap
page read and write
1D4000D6C000
trusted library allocation
page read and write
1E2A2CCD000
heap
page read and write
1D4000CA8000
trusted library allocation
page read and write
6801000
heap
page read and write
1E29CFFE000
heap
page read and write
C012FFE000
stack
page read and write
768C000
heap
page read and write
1E29D54E000
heap
page read and write
C01AFFE000
stack
page read and write
6801000
heap
page read and write
7F50000
heap
page read and write
3DBF000
stack
page read and write
1D4001D95000
trusted library allocation
page read and write
144D000
heap
page read and write
C004FFB000
stack
page read and write
14A9000
heap
page read and write
1D4000CCA000
trusted library allocation
page read and write
1D4002876000
trusted library allocation
page read and write
637F000
stack
page read and write
6801000
heap
page read and write
1D4001C24000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
C006FFB000
stack
page read and write
1D40004D8000
trusted library allocation
page read and write
1D4001880000
trusted library allocation
page read and write
1D40007B0000
trusted library allocation
page read and write
6AE8002C8000
trusted library allocation
page read and write
14DC000
heap
page read and write
6801000
heap
page read and write
1D4001C0C000
trusted library allocation
page read and write
1D4002874000
trusted library allocation
page read and write
74F0000
heap
page read and write
74F4000
heap
page read and write
C01DFF9000
stack
page read and write
6801000
heap
page read and write
1D4000794000
trusted library allocation
page read and write
1D4002829000
trusted library allocation
page read and write
1D4001750000
trusted library allocation
page read and write
6801000
heap
page read and write
14D0000
heap
page read and write
1D40015C0000
trusted library allocation
page read and write
1D4001475000
trusted library allocation
page read and write
1D4001A74000
trusted library allocation
page read and write
1D4001234000
trusted library allocation
page read and write
1D4001278000
trusted library allocation
page read and write
6801000
heap
page read and write
74F8000
heap
page read and write
1D400181C000
trusted library allocation
page read and write
1D40004C4000
trusted library allocation
page read and write
1D4001DD5000
trusted library allocation
page read and write
1E29CFFE000
heap
page read and write
1E29D00F000
heap
page read and write
1E29D002000
heap
page read and write
1D40015B0000
trusted library allocation
page read and write
1E29CFFE000
heap
page read and write
1D400131C000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
75D8000
heap
page read and write
7242000
direct allocation
page read and write
C072DFB000
stack
page read and write
1D400166C000
trusted library allocation
page read and write
463F000
stack
page read and write
1D40014AC000
trusted library allocation
page read and write
1D4001A7C000
trusted library allocation
page read and write
1D4000093000
trusted library allocation
page read and write
1D400060C000
trusted library allocation
page read and write
1E2A47B0000
unkown
page readonly
1D4000E30000
trusted library allocation
page read and write
1D400033C000
trusted library allocation
page read and write
1D4002832000
trusted library allocation
page read and write
1D4001DA9000
trusted library allocation
page read and write
1D4002A01000
trusted library allocation
page read and write
1D4000F3C000
trusted library allocation
page read and write
14A9000
heap
page read and write
14B3000
heap
page read and write
1D4002907000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4000FA8000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1D4000304000
trusted library allocation
page read and write
F74000
heap
page read and write
6C40000
heap
page read and write
C00A7FE000
unkown
page readonly
1E29D572000
heap
page read and write
1D400129C000
trusted library allocation
page read and write
1D4002832000
trusted library allocation
page read and write
6AE8002F0000
trusted library allocation
page read and write
1E2A3200000
heap
page read and write
F74000
heap
page read and write
1D4002874000
trusted library allocation
page read and write
1D4000CB8000
trusted library allocation
page read and write
1D400029A000
trusted library allocation
page read and write
1E2999D0000
heap
page read and write
1D4000380000
trusted library allocation
page read and write
59BC006FC000
trusted library allocation
page read and write
1D40019A4000
trusted library allocation
page read and write
1D4000F14000
trusted library allocation
page read and write
1D400131C000
trusted library allocation
page read and write
1D40013A8000
trusted library allocation
page read and write
1E299ADD000
heap
page read and write
14D8000
heap
page read and write
1D4000380000
trusted library allocation
page read and write
59BC00320000
trusted library allocation
page read and write
1D4001890000
trusted library allocation
page read and write
1D4001D9F000
trusted library allocation
page read and write
74F8000
heap
page read and write
74F0000
heap
page read and write
6F90000
direct allocation
page execute and read and write
1E2A49FB000
unkown
page readonly
1E29D00F000
heap
page read and write
1D4002907000
trusted library allocation
page read and write
1D400173C000
trusted library allocation
page read and write
14D0000
heap
page read and write
1E29D00F000
heap
page read and write
1D400167C000
trusted library allocation
page read and write
1D4001030000
trusted library allocation
page read and write
1D400172C000
trusted library allocation
page read and write
33A0000
direct allocation
page read and write
1D400033C000
trusted library allocation
page read and write
C009FFE000
unkown
page readonly
1D4003004000
trusted library allocation
page read and write
1D400040C000
trusted library allocation
page read and write
1D40017B8000
trusted library allocation
page read and write
158800250000
direct allocation
page read and write
1D40001D8000
trusted library allocation
page read and write
76BC000
heap
page read and write
1454000
heap
page read and write
6801000
heap
page read and write
1D400033C000
trusted library allocation
page read and write
14DA000
heap
page read and write
1D40019BC000
trusted library allocation
page read and write
59BC0033C000
trusted library allocation
page read and write
75BD000
heap
page read and write
1D4001284000
trusted library allocation
page read and write
1D4002829000
trusted library allocation
page read and write
1D4000B6C000
trusted library allocation
page read and write
1E29D01A000
heap
page read and write
C06F5FE000
unkown
page readonly
1D4002890000
trusted library allocation
page read and write
1D40028C6000
trusted library allocation
page read and write
1E29D002000
heap
page read and write
1D4001998000
trusted library allocation
page read and write
320E000
stack
page read and write
1D4002907000
trusted library allocation
page read and write
70F0000
heap
page read and write
1D400284E000
trusted library allocation
page read and write
1E2A37F0000
trusted library section
page read and write
1D40028C3000
trusted library allocation
page read and write
1D400284C000
trusted library allocation
page read and write
1D4002832000
trusted library allocation
page read and write
1D4002938000
trusted library allocation
page read and write
1D4001D9F000
trusted library allocation
page read and write
1D40007A0000
trusted library allocation
page read and write
1D400284C000
trusted library allocation
page read and write
1D4002907000
trusted library allocation
page read and write
6801000
heap
page read and write
14DA000
heap
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
1D4002868000
trusted library allocation
page read and write
1D40017F0000
trusted library allocation
page read and write
1D4000344000
trusted library allocation
page read and write
1D4000F6C000
trusted library allocation
page read and write
6801000
heap
page read and write
59BC00644000
trusted library allocation
page read and write
1E29D00E000
heap
page read and write
6801000
heap
page read and write
1D4000F80000
trusted library allocation
page read and write
8950000
heap
page read and write
1D4002900000
trusted library allocation
page read and write
6801000
heap
page read and write
158800201000
direct allocation
page read and write
1D4002890000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1E299AD9000
heap
page read and write
1D4002868000
trusted library allocation
page read and write
59BC0040C000
trusted library allocation
page read and write
1D4002801000
trusted library allocation
page read and write
1D4001BB4000
trusted library allocation
page read and write
6A326000
direct allocation
page read and write
6C40000
trusted library allocation
page read and write
6801000
heap
page read and write
6F10000
direct allocation
page execute and read and write
6A309000
direct allocation
page read and write
1D4001DBC000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1D400187C000
trusted library allocation
page read and write
1E2A2CBD000
heap
page read and write
1D400168C000
trusted library allocation
page read and write
1E29CFFE000
heap
page read and write
1D4001AA4000
trusted library allocation
page read and write
1D4001C50000
trusted library allocation
page read and write
1D4002938000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1D400020C000
trusted library allocation
page read and write
1D400284C000
trusted library allocation
page read and write
1D40002FB000
trusted library allocation
page read and write
158800220000
direct allocation
page read and write
1D4001568000
trusted library allocation
page read and write
59BC00624000
trusted library allocation
page read and write
1D4001AAC000
trusted library allocation
page read and write
1D4001BF0000
trusted library allocation
page read and write
1D4001BF0000
trusted library allocation
page read and write
1E29CFF8000
heap
page read and write
1E29D00F000
heap
page read and write
1D4001760000
trusted library allocation
page read and write
1D4001DD0000
trusted library allocation
page read and write
1E2A1342000
trusted library allocation
page read and write
1D4000040000
trusted library allocation
page read and write
1D40016E4000
trusted library allocation
page read and write
1D40028DF000
trusted library allocation
page read and write
144C000
heap
page read and write
1D40015AC000
trusted library allocation
page read and write
759F000
heap
page read and write
6801000
heap
page read and write
7770000
heap
page read and write
1D4000BD8000
trusted library allocation
page read and write
33B0000
heap
page read and write
14CE000
heap
page read and write
739B000
direct allocation
page read and write
74FC000
heap
page read and write
1D4001794000
trusted library allocation
page read and write
75AD000
heap
page read and write
1E299AE6000
heap
page read and write
1D4000C44000
trusted library allocation
page read and write
1E29D570000
heap
page read and write
1D4002907000
trusted library allocation
page read and write
1D40010F4000
trusted library allocation
page read and write
1D4000C1C000
trusted library allocation
page read and write
1D4000948000
trusted library allocation
page read and write
6801000
heap
page read and write
158800280000
direct allocation
page read and write
1D4002890000
trusted library allocation
page read and write
1D4000454000
trusted library allocation
page read and write
1D4002938000
trusted library allocation
page read and write
C0705FE000
unkown
page readonly
6801000
heap
page read and write
1D40001D4000
trusted library allocation
page read and write
6A27F000
direct allocation
page read and write
1D400143C000
trusted library allocation
page read and write
1E29D553000
heap
page read and write
1E29CFFE000
heap
page read and write
1D4001C50000
trusted library allocation
page read and write
6AE800220000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4001DD5000
trusted library allocation
page read and write
6801000
heap
page read and write
1E2A3E41000
trusted library section
page read and write
74F4000
heap
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
1D4000294000
trusted library allocation
page read and write
59BC00424000
trusted library allocation
page read and write
1E29CFF8000
heap
page read and write
1D4002829000
trusted library allocation
page read and write
59BC002F4000
trusted library allocation
page read and write
1D4000E01000
trusted library allocation
page read and write
1E299CB5000
heap
page read and write
328E000
stack
page read and write
71F1000
heap
page read and write
6801000
heap
page read and write
7587000
heap
page read and write
1D4002907000
trusted library allocation
page read and write
59BC0080C000
trusted library allocation
page read and write
9410000
unclassified section
page read and write
1E29CFFE000
heap
page read and write
14D3000
heap
page read and write
1D40001F8000
trusted library allocation
page read and write
1D4000344000
trusted library allocation
page read and write
1E29CFF6000
heap
page read and write
14A1000
heap
page read and write
1D4000CB8000
trusted library allocation
page read and write
7E3000
unkown
page execute and read and write
C0137FE000
unkown
page readonly
1D40001EC000
trusted library allocation
page read and write
1E29D002000
heap
page read and write
1E29D002000
heap
page read and write
1D4000BF8000
trusted library allocation
page read and write
1D400017C000
trusted library allocation
page read and write
1D4000C20000
trusted library allocation
page read and write
1E29CFF8000
heap
page read and write
1E29D5C9000
heap
page read and write
6801000
heap
page read and write
1E29D002000
heap
page read and write
59BC00614000
trusted library allocation
page read and write
C079DFE000
stack
page read and write
1D400033C000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1D40028DF000
trusted library allocation
page read and write
1D4002900000
trusted library allocation
page read and write
1D4001A34000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4001001000
trusted library allocation
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
1D4002900000
trusted library allocation
page read and write
1D4001DA9000
trusted library allocation
page read and write
70F1000
heap
page read and write
1D4000304000
trusted library allocation
page read and write
1D4001BC0000
trusted library allocation
page read and write
1D4001A84000
trusted library allocation
page read and write
1D4001C18000
trusted library allocation
page read and write
74F1000
heap
page read and write
1D4001C2C000
trusted library allocation
page read and write
1D4002829000
trusted library allocation
page read and write
6801000
heap
page read and write
1D400164C000
trusted library allocation
page read and write
1D4000FA8000
trusted library allocation
page read and write
1E29CFF8000
heap
page read and write
6AE800201000
trusted library allocation
page read and write
1D4001A60000
trusted library allocation
page read and write
14D5000
heap
page read and write
1E29CFF8000
heap
page read and write
1D40013DC000
trusted library allocation
page read and write
BD6000
unkown
page execute and read and write
1E29CFFE000
heap
page read and write
14AC000
heap
page read and write
1D400131C000
trusted library allocation
page read and write
1D4000344000
trusted library allocation
page read and write
1D4001601000
trusted library allocation
page read and write
1E29CFF8000
heap
page read and write
6801000
heap
page read and write
59BC006EC000
trusted library allocation
page read and write
6F10000
direct allocation
page execute and read and write
75E7000
heap
page read and write
1D4001AE4000
trusted library allocation
page read and write
1D400122E000
trusted library allocation
page read and write
1D4001AE8000
trusted library allocation
page read and write
59BC006C4000
trusted library allocation
page read and write
1D40000F0000
trusted library allocation
page read and write
1D40016B4000
trusted library allocation
page read and write
1D40006EC000
trusted library allocation
page read and write
6801000
heap
page read and write
F74000
heap
page read and write
1E29D002000
heap
page read and write
6801000
heap
page read and write
1D40016F0000
trusted library allocation
page read and write
1D400136C000
trusted library allocation
page read and write
1D4001770000
trusted library allocation
page read and write
563D000
stack
page read and write
1E29D5C9000
heap
page read and write
1D40003A4000
trusted library allocation
page read and write
1D4001DD5000
trusted library allocation
page read and write
1D4001438000
trusted library allocation
page read and write
1D400021C000
trusted library allocation
page read and write
1E29D002000
heap
page read and write
1D4000F3C000
trusted library allocation
page read and write
6801000
heap
page read and write
1D400185C000
trusted library allocation
page read and write
93C000
unkown
page execute and read and write
1D40028C3000
trusted library allocation
page read and write
14CE000
heap
page read and write
6EE0000
direct allocation
page execute and read and write
59BC00401000
trusted library allocation
page read and write
6801000
heap
page read and write
1E29D002000
heap
page read and write
14D3000
heap
page read and write
14CE000
heap
page read and write
6801000
heap
page read and write
1E29D00A000
heap
page read and write
1D40002B4000
trusted library allocation
page read and write
1D40017DC000
trusted library allocation
page read and write
1D4001324000
trusted library allocation
page read and write
1D4001DD0000
trusted library allocation
page read and write
1D4000368000
trusted library allocation
page read and write
6801000
heap
page read and write
75DF000
heap
page read and write
59BC006C8000
trusted library allocation
page read and write
1E29CFF8000
heap
page read and write
149A000
heap
page read and write
59BC00230000
trusted library allocation
page read and write
1D4000298000
trusted library allocation
page read and write
158800290000
direct allocation
page read and write
59BC00248000
trusted library allocation
page read and write
1D400284C000
trusted library allocation
page read and write
1D4002890000
trusted library allocation
page read and write
59BC006CC000
trusted library allocation
page read and write
59BC00620000
trusted library allocation
page read and write
74F5000
heap
page read and write
1D4000B30000
trusted library allocation
page read and write
C013FFE000
stack
page read and write
1D40012F8000
trusted library allocation
page read and write
76CB000
heap
page read and write
230000
unkown
page readonly
1D4002928000
trusted library allocation
page read and write
CC7000
unkown
page execute and write copy
487F000
stack
page read and write
7627000
heap
page read and write
1D40001D0000
trusted library allocation
page read and write
1D4002F8C000
trusted library allocation
page read and write
1D4001C28000
trusted library allocation
page read and write
1D4001840000
trusted library allocation
page read and write
1D40028DD000
trusted library allocation
page read and write
59BC006B0000
trusted library allocation
page read and write
1D40013DC000
trusted library allocation
page read and write
1D40028C6000
trusted library allocation
page read and write
6F10000
direct allocation
page execute and read and write
1D40006F2000
trusted library allocation
page read and write
1D4000F72000
trusted library allocation
page read and write
1D4000D7C000
trusted library allocation
page read and write
1D4001DE8000
trusted library allocation
page read and write
7171000
heap
page read and write
C0027FE000
unkown
page readonly
6F30000
direct allocation
page execute and read and write
1588002A8000
direct allocation
page read and write
6AE800235000
trusted library allocation
page read and write
1D4002900000
trusted library allocation
page read and write
1D4001298000
trusted library allocation
page read and write
1D4000761000
trusted library allocation
page read and write
6F10000
direct allocation
page execute and read and write
1E29D002000
heap
page read and write
1D40002B0000
trusted library allocation
page read and write
1D4000030000
trusted library allocation
page read and write
6801000
heap
page read and write
1E29D002000
heap
page read and write
1E29D00F000
heap
page read and write
6800000
heap
page read and write
C018FFD000
stack
page read and write
6801000
heap
page read and write
1D4000298000
trusted library allocation
page read and write
158800284000
direct allocation
page read and write
1D4001DD5000
trusted library allocation
page read and write
1E29D574000
heap
page read and write
53BF000
stack
page read and write
33A0000
direct allocation
page read and write
1D4001D9F000
trusted library allocation
page read and write
758A000
heap
page read and write
1D4000BD4000
trusted library allocation
page read and write
1E29D583000
heap
page read and write
1D4002832000
trusted library allocation
page read and write
1D4001590000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
6801000
heap
page read and write
69FB4000
direct allocation
page read and write
C00D7FE000
unkown
page readonly
14A2000
heap
page read and write
1D4001A38000
trusted library allocation
page read and write
1D4000614000
trusted library allocation
page read and write
1D4001994000
trusted library allocation
page read and write
1D40016F8000
trusted library allocation
page read and write
194A000
heap
page read and write
6801000
heap
page read and write
1D40016A0000
trusted library allocation
page read and write
59BC0078C000
trusted library allocation
page read and write
1D4002F7C000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4002832000
trusted library allocation
page read and write
1E29D002000
heap
page read and write
1D4000C8C000
trusted library allocation
page read and write
1D40010E4000
trusted library allocation
page read and write
1D40028C3000
trusted library allocation
page read and write
1E29D000000
heap
page read and write
1D40013D4000
trusted library allocation
page read and write
1D4001DBC000
trusted library allocation
page read and write
1D4002890000
trusted library allocation
page read and write
1D4001830000
trusted library allocation
page read and write
1D40007B0000
trusted library allocation
page read and write
1E29D02B000
heap
page read and write
1D4001A94000
trusted library allocation
page read and write
1E29CFFF000
heap
page read and write
59BC00684000
trusted library allocation
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
C005FFC000
stack
page read and write
1D400244F000
trusted library allocation
page read and write
6FA0000
direct allocation
page execute and read and write
1D4001A14000
trusted library allocation
page read and write
1D4001020000
trusted library allocation
page read and write
583F000
stack
page read and write
1D4000FCC000
trusted library allocation
page read and write
1D40028C3000
trusted library allocation
page read and write
1D4000CEC000
trusted library allocation
page read and write
74F9000
heap
page read and write
59BC00368000
trusted library allocation
page read and write
1D4001DD5000
trusted library allocation
page read and write
39BF000
stack
page read and write
1E2999A0000
heap
page read and write
1D4002876000
trusted library allocation
page read and write
1D4000A20000
trusted library allocation
page read and write
14DA000
heap
page read and write
1E29D002000
heap
page read and write
1D4002876000
trusted library allocation
page read and write
1D4000454000
trusted library allocation
page read and write
1D4001DE8000
trusted library allocation
page read and write
14AF000
heap
page read and write
796F000
stack
page read and write
76A8000
heap
page read and write
1D4000D2C000
trusted library allocation
page read and write
1D4001B40000
trusted library allocation
page read and write
33BA000
heap
page read and write
1D4000350000
trusted library allocation
page read and write
1E29CFD0000
heap
page read and write
1D400149C000
trusted library allocation
page read and write
1D40002E0000
trusted library allocation
page read and write
1E29CFF8000
heap
page read and write
6801000
heap
page read and write
59BC0060C000
trusted library allocation
page read and write
6F10000
direct allocation
page execute and read and write
6801000
heap
page read and write
1D4001824000
trusted library allocation
page read and write
6801000
heap
page read and write
6F10000
direct allocation
page execute and read and write
1D4000304000
trusted library allocation
page read and write
1D4001DD0000
trusted library allocation
page read and write
1D4000CB8000
trusted library allocation
page read and write
1D4001260000
trusted library allocation
page read and write
1D40003C0000
trusted library allocation
page read and write
1D40013EC000
trusted library allocation
page read and write
14D3000
heap
page read and write
1D400031C000
trusted library allocation
page read and write
1D4001168000
trusted library allocation
page read and write
1D4002890000
trusted library allocation
page read and write
1D4000E28000
trusted library allocation
page read and write
7586000
heap
page read and write
1E29D00E000
heap
page read and write
1D4000E70000
trusted library allocation
page read and write
1D4001BF0000
trusted library allocation
page read and write
1D4001C50000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4001A80000
trusted library allocation
page read and write
59BC00730000
trusted library allocation
page read and write
74F8000
heap
page read and write
6801000
heap
page read and write
1D400284C000
trusted library allocation
page read and write
1D400142C000
trusted library allocation
page read and write
3390000
heap
page read and write
1D4000CDC000
trusted library allocation
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
1D4001104000
trusted library allocation
page read and write
1E2A3E62000
trusted library section
page read and write
1E29D009000
heap
page read and write
1D4001228000
trusted library allocation
page read and write
1D4001DD5000
trusted library allocation
page read and write
F74000
heap
page read and write
4ABF000
stack
page read and write
1D4001DD5000
trusted library allocation
page read and write
6F80000
direct allocation
page execute and read and write
6AE800250000
trusted library allocation
page read and write
15880024C000
direct allocation
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
1D4001A01000
trusted library allocation
page read and write
C0077FE000
unkown
page readonly
1D4002938000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4001DE8000
trusted library allocation
page read and write
1D40028C6000
trusted library allocation
page read and write
59BC00668000
trusted library allocation
page read and write
1D4000128000
trusted library allocation
page read and write
1D4001ABC000
trusted library allocation
page read and write
1D4000F2C000
trusted library allocation
page read and write
1D4000350000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4001B14000
trusted library allocation
page read and write
1D40001E8000
trusted library allocation
page read and write
1D40008D4000
trusted library allocation
page read and write
71F1000
heap
page read and write
75BD000
heap
page read and write
59BC006D0000
trusted library allocation
page read and write
1D400284E000
trusted library allocation
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
FFE000
stack
page read and write
1D4001980000
trusted library allocation
page read and write
1D400052B000
trusted library allocation
page read and write
149A000
heap
page read and write
C076DFB000
stack
page read and write
1D40012A4000
trusted library allocation
page read and write
6801000
heap
page read and write
C0775FE000
unkown
page readonly
6801000
heap
page read and write
1D40014A1000
trusted library allocation
page read and write
1D4001DD5000
trusted library allocation
page read and write
CB1000
unkown
page execute and read and write
1D4001DBC000
trusted library allocation
page read and write
1E29D002000
heap
page read and write
1E29D002000
heap
page read and write
1D40001E4000
trusted library allocation
page read and write
1D4002907000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1D4000310000
trusted library allocation
page read and write
1D4000DF4000
trusted library allocation
page read and write
14DC000
heap
page read and write
6F10000
direct allocation
page execute and read and write
1D40019B0000
trusted library allocation
page read and write
1D4001C01000
trusted library allocation
page read and write
1D400033C000
trusted library allocation
page read and write
1D40002BC000
trusted library allocation
page read and write
7593000
heap
page read and write
1D40015F8000
trusted library allocation
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
76EF000
unkown
page read and write
6801000
heap
page read and write
1400000
heap
page read and write
1D4001660000
trusted library allocation
page read and write
1D40013B4000
trusted library allocation
page read and write
6801000
heap
page read and write
1D40000E0000
trusted library allocation
page read and write
1D4001740000
trusted library allocation
page read and write
1D4000C4C000
trusted library allocation
page read and write
75A7000
heap
page read and write
1D40028DF000
trusted library allocation
page read and write
1D4001784000
trusted library allocation
page read and write
1D4001DE8000
trusted library allocation
page read and write
1D40016CC000
trusted library allocation
page read and write
1D4001DD0000
trusted library allocation
page read and write
1D4001AFC000
trusted library allocation
page read and write
1E29CFEE000
heap
page read and write
1E29D00F000
heap
page read and write
C01E7FE000
unkown
page readonly
1D4000D5C000
trusted library allocation
page read and write
1D40005A0000
trusted library allocation
page read and write
1D4000380000
trusted library allocation
page read and write
1D4000F3C000
trusted library allocation
page read and write
1D4000118000
trusted library allocation
page read and write
1D4000D34000
trusted library allocation
page read and write
6F50000
direct allocation
page execute and read and write
1D4001278000
trusted library allocation
page read and write
1D4002876000
trusted library allocation
page read and write
1D4001618000
trusted library allocation
page read and write
1D40017BC000
trusted library allocation
page read and write
F74000
heap
page read and write
1E29CFFE000
heap
page read and write
1461000
heap
page read and write
1D40013EC000
trusted library allocation
page read and write
1D4001110000
trusted library allocation
page read and write
1E29CFFE000
heap
page read and write
1E29CFFE000
heap
page read and write
C0047FE000
unkown
page readonly
1D40002A4000
trusted library allocation
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
1D4000854000
trusted library allocation
page read and write
1D400204F000
trusted library allocation
page read and write
1D40018B8000
trusted library allocation
page read and write
1D400015C000
trusted library allocation
page read and write
7596000
heap
page read and write
1D4001728000
trusted library allocation
page read and write
6801000
heap
page read and write
59BC00408000
trusted library allocation
page read and write
C06BDEF000
stack
page read and write
F74000
heap
page read and write
1D4002EFC000
trusted library allocation
page read and write
1588002EC000
direct allocation
page read and write
1E29D00F000
heap
page read and write
1E29CFF8000
heap
page read and write
74F4000
heap
page read and write
1E29CFF2000
heap
page read and write
C071DFD000
stack
page read and write
231000
unkown
page execute and read and write
74F8000
heap
page read and write
1D4001390000
trusted library allocation
page read and write
6801000
heap
page read and write
4F7E000
stack
page read and write
1D4000350000
trusted library allocation
page read and write
158800234000
direct allocation
page read and write
1D4001680000
trusted library allocation
page read and write
1D4001CE0000
trusted library allocation
page read and write
1D400091C000
trusted library allocation
page read and write
1E29CFEE000
heap
page read and write
1E29D5DB000
heap
page read and write
1D40001E0000
trusted library allocation
page read and write
1588002D0000
direct allocation
page read and write
1D4001A90000
trusted library allocation
page read and write
1D4000D08000
trusted library allocation
page read and write
59BC00348000
trusted library allocation
page read and write
1D4000A14000
trusted library allocation
page read and write
1D4000CA8000
trusted library allocation
page read and write
4D3E000
stack
page read and write
C011FFC000
stack
page read and write
6AE8002C0000
trusted library allocation
page read and write
1D40028C3000
trusted library allocation
page read and write
6801000
heap
page read and write
1D40004FC000
trusted library allocation
page read and write
1D40012F8000
trusted library allocation
page read and write
1D40002F0000
trusted library allocation
page read and write
14AD000
heap
page read and write
1D4000AE0000
trusted library allocation
page read and write
1D40028C6000
trusted library allocation
page read and write
C0147FE000
unkown
page readonly
6F70000
direct allocation
page execute and read and write
1D4000D1C000
trusted library allocation
page read and write
1D4002876000
trusted library allocation
page read and write
6801000
heap
page read and write
59BC007CC000
trusted library allocation
page read and write
1D4000CA8000
trusted library allocation
page read and write
1D4002890000
trusted library allocation
page read and write
6801000
heap
page read and write
1E29D02B000
heap
page read and write
C00AFFD000
stack
page read and write
1D40018B0000
trusted library allocation
page read and write
1D400008E000
trusted library allocation
page read and write
6801000
heap
page read and write
59BC00704000
trusted library allocation
page read and write
59BC00210000
trusted library allocation
page read and write
1D4001DBC000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4000BAC000
trusted library allocation
page read and write
75D6000
heap
page read and write
1D4002868000
trusted library allocation
page read and write
1D4001A74000
trusted library allocation
page read and write
1D4001A7C000
trusted library allocation
page read and write
75EC000
heap
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
1D4000FE4000
trusted library allocation
page read and write
1D4000344000
trusted library allocation
page read and write
14CE000
heap
page read and write
1D4000FA8000
trusted library allocation
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
1D4001BB8000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4001DD0000
trusted library allocation
page read and write
1E29CFEE000
heap
page read and write
1E29D002000
heap
page read and write
6801000
heap
page read and write
1E29D003000
heap
page read and write
1D4001253000
trusted library allocation
page read and write
1D4000CA8000
trusted library allocation
page read and write
1D4001DD0000
trusted library allocation
page read and write
1D4002868000
trusted library allocation
page read and write
1D4001C50000
trusted library allocation
page read and write
1D400284C000
trusted library allocation
page read and write
1E29D574000
heap
page read and write
1D40028DD000
trusted library allocation
page read and write
1E29D004000
heap
page read and write
59BC00310000
trusted library allocation
page read and write
1D4000690000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1D4000E54000
trusted library allocation
page read and write
6AE8002BC000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4000330000
trusted library allocation
page read and write
1D4000454000
trusted library allocation
page read and write
6AE8002C0000
trusted library allocation
page read and write
1940000
heap
page read and write
69CC0000
direct allocation
page read and write
1D40028DF000
trusted library allocation
page read and write
41FE000
stack
page read and write
E80000
unkown
page execute and write copy
1D4000294000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1E29D02B000
heap
page read and write
59BC00724000
trusted library allocation
page read and write
1D40005EC000
trusted library allocation
page read and write
1D4000FA8000
trusted library allocation
page read and write
1D40019EC000
trusted library allocation
page read and write
14CE000
heap
page read and write
1E29D00F000
heap
page read and write
6801000
heap
page read and write
1E29CFEE000
heap
page read and write
1D4001298000
trusted library allocation
page read and write
14D8000
heap
page read and write
C01C7FE000
unkown
page readonly
14D5000
heap
page read and write
1D4000BB4000
trusted library allocation
page read and write
1D4001DA9000
trusted library allocation
page read and write
1D4001DBC000
trusted library allocation
page read and write
1D4000294000
trusted library allocation
page read and write
1D4002B44000
trusted library allocation
page read and write
1E2A3EB0000
trusted library section
page read and write
1D4000F2C000
trusted library allocation
page read and write
6AE800248000
trusted library allocation
page read and write
C016FFE000
stack
page read and write
1D40014B8000
trusted library allocation
page read and write
1D40028C6000
trusted library allocation
page read and write
1D4000A58000
trusted library allocation
page read and write
14D3000
heap
page read and write
1D4002900000
trusted library allocation
page read and write
1D4001D95000
trusted library allocation
page read and write
C0037FE000
unkown
page readonly
1D40028C6000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4001450000
trusted library allocation
page read and write
C015FFA000
stack
page read and write
1D4001BC0000
trusted library allocation
page read and write
C01CFFB000
stack
page read and write
1D400040C000
trusted library allocation
page read and write
6801000
heap
page read and write
1588002DC000
direct allocation
page read and write
1D4001324000
trusted library allocation
page read and write
6801000
heap
page read and write
59BC006F0000
trusted library allocation
page read and write
1D4001340000
trusted library allocation
page read and write
14AB000
heap
page read and write
33A0000
direct allocation
page read and write
1D4000F3C000
trusted library allocation
page read and write
1D4000C44000
trusted library allocation
page read and write
1D400284C000
trusted library allocation
page read and write
1D4001690000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4000D90000
trusted library allocation
page read and write
1D40017EC000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1D4000E88000
trusted library allocation
page read and write
1D4002938000
trusted library allocation
page read and write
763D000
heap
page read and write
1D4002874000
trusted library allocation
page read and write
1D40028DD000
trusted library allocation
page read and write
1D4001080000
trusted library allocation
page read and write
6801000
heap
page read and write
1E29CFF8000
heap
page read and write
14A1000
heap
page read and write
6801000
heap
page read and write
1D4001168000
trusted library allocation
page read and write
C0127FE000
unkown
page readonly
C01B7FE000
unkown
page readonly
1E29CFF8000
heap
page read and write
6801000
heap
page read and write
59BC00640000
trusted library allocation
page read and write
1D4000454000
trusted library allocation
page read and write
1E29CFF8000
heap
page read and write
1E29CFFE000
heap
page read and write
1E29CFF8000
heap
page read and write
6801000
heap
page read and write
1E29D00F000
heap
page read and write
1D40006A4000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1E29D5A0000
heap
page read and write
1D4001870000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
65FE000
stack
page read and write
1E29D00F000
heap
page read and write
74F0000
heap
page read and write
1D4002876000
trusted library allocation
page read and write
6801000
heap
page read and write
1E29D00F000
heap
page read and write
6801000
heap
page read and write
1D4000A14000
trusted library allocation
page read and write
C0087FC000
stack
page read and write
1D4000E0C000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
75D4000
heap
page read and write
1D4001B2C000
trusted library allocation
page read and write
1D40018A0000
trusted library allocation
page read and write
776E000
stack
page read and write
1D40028DF000
trusted library allocation
page read and write
1E29CFEE000
heap
page read and write
1D400165C000
trusted library allocation
page read and write
1D4000F3C000
trusted library allocation
page read and write
14D3000
heap
page read and write
1E29CFF2000
heap
page read and write
1D4000E54000
trusted library allocation
page read and write
1D40008C0000
trusted library allocation
page read and write
C06EDFE000
stack
page read and write
1D4000060000
trusted library allocation
page read and write
C0107FE000
unkown
page readonly
1D4001744000
trusted library allocation
page read and write
C007FFD000
stack
page read and write
1D4001C28000
trusted library allocation
page read and write
C07B5FE000
unkown
page readonly
1D4000FA8000
trusted library allocation
page read and write
1E29D004000
heap
page read and write
1D4001DA9000
trusted library allocation
page read and write
6801000
heap
page read and write
1D4000752000
trusted library allocation
page read and write
C070DFE000
stack
page read and write
1D4001440000
trusted library allocation
page read and write
1D40002A4000
trusted library allocation
page read and write
1D4000BF8000
trusted library allocation
page read and write
1D40028DD000
trusted library allocation
page read and write
1D4001D9F000
trusted library allocation
page read and write
6AE8002A0000
trusted library allocation
page read and write
59BC00330000
trusted library allocation
page read and write
1D4002874000
trusted library allocation
page read and write
1D4000210000
trusted library allocation
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
74F4000
heap
page read and write
1D4000294000
trusted library allocation
page read and write
1D4000EF0000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
74F1000
heap
page read and write
6801000
heap
page read and write
1D400142C000
trusted library allocation
page read and write
1E29CFF2000
heap
page read and write
C075DFB000
stack
page read and write
1E29D02B000
heap
page read and write
6801000
heap
page read and write
1D40014AC000
trusted library allocation
page read and write
6801000
heap
page read and write
1D40028C3000
trusted library allocation
page read and write
1D4000D84000
trusted library allocation
page read and write
1D400199C000
trusted library allocation
page read and write
6801000
heap
page read and write
C07F5FE000
unkown
page readonly
74F3000
heap
page read and write
1E29D00F000
heap
page read and write
1D4002868000
trusted library allocation
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
14AC000
heap
page read and write
1D4001AF4000
trusted library allocation
page read and write
14D5000
heap
page read and write
1D4001298000
trusted library allocation
page read and write
1D4001DE8000
trusted library allocation
page read and write
1D4002938000
trusted library allocation
page read and write
1E29D583000
heap
page read and write
CC7000
unkown
page execute and read and write
14DC000
heap
page read and write
14A5000
heap
page read and write
1D4002874000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1D4002928000
trusted library allocation
page read and write
1D4001DE8000
trusted library allocation
page read and write
1E29CFF2000
heap
page read and write
1D4002874000
trusted library allocation
page read and write
1D4000530000
trusted library allocation
page read and write
1D40017B4000
trusted library allocation
page read and write
1D4000FCC000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
1E29D005000
heap
page read and write
1D40007B0000
trusted library allocation
page read and write
1D4001D2C000
trusted library allocation
page read and write
1D4002876000
trusted library allocation
page read and write
4F3F000
stack
page read and write
6801000
heap
page read and write
1E29CFFE000
heap
page read and write
1E29D00F000
heap
page read and write
35BF000
stack
page read and write
1D4001D9F000
trusted library allocation
page read and write
1D400184C000
trusted library allocation
page read and write
1D4001DD5000
trusted library allocation
page read and write
1D40001C4000
trusted library allocation
page read and write
6A2FF000
direct allocation
page read and write
1D4001780000
trusted library allocation
page read and write
1D4000D68000
trusted library allocation
page read and write
1D4001E04000
trusted library allocation
page read and write
1D40029AC000
trusted library allocation
page read and write
1D4000DD4000
trusted library allocation
page read and write
1D40018CC000
trusted library allocation
page read and write
6AE8002BC000
trusted library allocation
page read and write
C07A5FE000
unkown
page readonly
14D8000
heap
page read and write
6801000
heap
page read and write
1E29CFFE000
heap
page read and write
59BC00630000
trusted library allocation
page read and write
1D4001438000
trusted library allocation
page read and write
1D4000EBC000
trusted library allocation
page read and write
F74000
heap
page read and write
70F1000
heap
page read and write
1D4001684000
trusted library allocation
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
59BC002ED000
trusted library allocation
page read and write
1D4001848000
trusted library allocation
page read and write
1E2999F0000
trusted library allocation
page read and write
1D4001630000
trusted library allocation
page read and write
F1B000
stack
page read and write
1D4000380000
trusted library allocation
page read and write
1E29D00F000
heap
page read and write
6801000
heap
page read and write
6801000
heap
page read and write
There are 2524 hidden memdumps, click here to show them.