IOC Report
EPTMAcgvNZ.exe

loading gif

Files

File Path
Type
Category
Malicious
EPTMAcgvNZ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\Public\Cobsfhiy.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Cobsfhiy.PIF">), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\Public\Libraries\Cobsfhiy
data
dropped
malicious
C:\Users\Public\Libraries\Cobsfhiy.PIF
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\yihfsboC.pif
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\PNO
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Libraries\yihfsboC.cmd
DOS batch file, Unicode text, UTF-8 text, with very long lines (324), with CRLF line terminators
dropped
C:\Users\Public\alpha.pif
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\Public\xpha.pif
PE32 executable (console) Intel 80386, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped
\Device\Null
ASCII text, with CRLF, CR line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\EPTMAcgvNZ.exe
"C:\Users\user\Desktop\EPTMAcgvNZ.exe"
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl.exe /y C:\Users\user\Desktop\EPTMAcgvNZ.exe /d C:\\Users\\Public\\Libraries\\Cobsfhiy.PIF /o
malicious
C:\Users\Public\Libraries\yihfsboC.pif
C:\Users\Public\Libraries\yihfsboC.pif
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10
malicious
C:\Users\Public\xpha.pif
C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10
malicious
C:\Users\Public\Libraries\Cobsfhiy.PIF
"C:\Users\Public\Libraries\Cobsfhiy.PIF"
malicious
C:\Users\Public\Libraries\yihfsboC.pif
C:\Users\Public\Libraries\yihfsboC.pif
malicious
C:\Users\Public\Libraries\Cobsfhiy.PIF
"C:\Users\Public\Libraries\Cobsfhiy.PIF"
malicious
C:\Users\Public\Libraries\yihfsboC.pif
C:\Users\Public\Libraries\yihfsboC.pif
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c del "C:\Users\Public\xpha.pif"
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \SysWOW64
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\yihfsboC.cmd" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
unknown
https://bitbucket.org/
unknown
https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net
unknown
https://sectigo.com/CPS0
unknown
https://bbuseruploads.s3.amazonaws.com/e427e629-62a6-4ecd-bf22-56e4d6ea083f/downloads/d4025bf5-bb79-
unknown
https://api.telegram.org
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://api.telegram.org/bot
unknown
http://microsoft.co
unknown
https://web-security-reports.services.atlassian.com/csp-report/bb-website
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/
unknown
http://checkip.dyndns.org
unknown
https://bitbucket.org/ntim1478/gpmaw/dow
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net
unknown
https://dz8aopenkvv6s.cloudfront.net
unknown
https://bitbucket.org/ntim1478/gpmaw/downloads/240_Cobsfhiygmx
185.166.143.48
http://www.microsoft.co~eE
unknown
http://checkip.dyndns.org/h
unknown
http://checkip.dyndns.org/
132.226.8.169
https://api.telegram.orgpj
unknown
https://remote-app-switcher.prod-east.frontend.public.atl-paas.net
unknown
https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net
unknown
http://checkip.dyndns.org/p
unknown
https://cdn.cookielaw.org/
unknown
http://crl.microsoft.c
unknown
https://aui-cdn.atlassian.com/
unknown
https://bbuseruploads.s3.amazonaws.com/;
unknown
https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/;
unknown
https://bbuseruploads.s3.amazonaws.com:443/e427e629-62a6-4ecd-bf22-56e4d6ea083f/downloads/d4025bf5-b
unknown
https://bbc-frontbucket-canary.prod-east.f
unknown
https://remote-app-switcher.stg-east.frontend.public.atl-paas.net
unknown
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.pmail.com
unknown
http://ocsp.sectigo.com0C
unknown
http://crl.micros
unknown
http://www.microsoft.cfdm
unknown
There are 30 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s3-w.us-east-1.amazonaws.com
16.182.70.225
bitbucket.org
185.166.143.48
api.telegram.org
149.154.167.220
checkip.dyndns.com
132.226.8.169
bbuseruploads.s3.amazonaws.com
unknown
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
132.226.8.169
checkip.dyndns.com
United States
149.154.167.220
api.telegram.org
United Kingdom
185.166.143.48
bitbucket.org
Germany
16.182.70.225
s3-w.us-east-1.amazonaws.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Cobsfhiy
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yihfsboC_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yihfsboC_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yihfsboC_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yihfsboC_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yihfsboC_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yihfsboC_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yihfsboC_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yihfsboC_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yihfsboC_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yihfsboC_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yihfsboC_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yihfsboC_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yihfsboC_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yihfsboC_RASMANCS
FileDirectory
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
34860000
trusted library section
page read and write
malicious
327BE000
heap
page read and write
malicious
24219000
heap
page read and write
malicious
27061000
trusted library allocation
page read and write
malicious
289FA000
trusted library allocation
page read and write
malicious
2859B000
heap
page read and write
malicious
29911000
trusted library allocation
page read and write
malicious
28911000
trusted library allocation
page read and write
malicious
260EC000
trusted library allocation
page read and write
malicious
262D0000
trusted library allocation
page read and write
malicious
26535000
trusted library allocation
page read and write
malicious
2615E000
trusted library allocation
page read and write
malicious
28A96000
trusted library allocation
page read and write
malicious
28B11000
trusted library allocation
page read and write
malicious
34951000
trusted library allocation
page read and write
malicious
26276000
trusted library allocation
page read and write
malicious
25D2B000
heap
page read and write
malicious
3429B000
heap
page read and write
malicious
34A3E000
trusted library allocation
page read and write
malicious
28BE0000
trusted library section
page read and write
malicious
34C23000
trusted library allocation
page read and write
malicious
34B53000
trusted library allocation
page read and write
malicious
2B4C0000
trusted library section
page read and write
malicious
263C5000
trusted library allocation
page read and write
malicious
268CE000
heap
page read and write
malicious
28AB0000
trusted library allocation
page read and write
malicious
34AF4000
trusted library allocation
page read and write
malicious
285A0000
trusted library section
page read and write
malicious
28BDF000
trusted library allocation
page read and write
malicious
35951000
trusted library allocation
page read and write
malicious
34690000
trusted library section
page read and write
malicious
26061000
trusted library allocation
page read and write
malicious
2AE90000
trusted library section
page read and write
malicious
28A32000
trusted library allocation
page read and write
malicious
34A76000
trusted library allocation
page read and write
malicious
260FA000
trusted library allocation
page read and write
malicious
34ADA000
trusted library allocation
page read and write
malicious
401000
unkown
page execute read
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2E83000
heap
page read and write
2C260000
trusted library allocation
page read and write
2EAF000
heap
page read and write
37410000
trusted library allocation
page read and write
28DE0000
trusted library allocation
page read and write
267E000
stack
page read and write
326A0000
heap
page read and write
2E9F000
heap
page read and write
2B634000
trusted library allocation
page read and write
20840000
direct allocation
page read and write
36DA0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
29D4000
heap
page read and write
2B5C0000
trusted library allocation
page read and write
2B740000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
83B000
heap
page read and write
29920000
trusted library allocation
page read and write
2EAF000
heap
page read and write
7F460000
direct allocation
page read and write
2E9F000
heap
page read and write
28BA6000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
2EAF000
heap
page read and write
28CBA000
heap
page read and write
28F06000
trusted library allocation
page read and write
2C460000
trusted library allocation
page read and write
7ED40000
direct allocation
page read and write
20E000
stack
page read and write
24266000
heap
page read and write
390000
unkown
page readonly
2C460000
trusted library allocation
page read and write
2181C000
heap
page read and write
348A0000
trusted library allocation
page read and write
38030000
trusted library allocation
page read and write
374C0000
trusted library allocation
page read and write
345D0000
trusted library allocation
page read and write
2E86000
heap
page read and write
2C220000
trusted library allocation
page read and write
2E87000
heap
page read and write
2C220000
trusted library allocation
page read and write
28D60000
trusted library allocation
page read and write
261EC000
trusted library allocation
page read and write
2EAF000
heap
page read and write
209FE000
stack
page execute and read and write
20CAE000
stack
page read and write
2E9F000
heap
page read and write
29CA0000
trusted library allocation
page read and write
531D000
heap
page read and write
2C220000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2C530000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2C520000
trusted library allocation
page read and write
2145D000
stack
page read and write
4A0000
unkown
page execute and read and write
36DCD000
trusted library allocation
page read and write
22D1000
direct allocation
page read and write
2B5E0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
2623A000
trusted library allocation
page read and write
2EAF000
heap
page read and write
7D0000
heap
page read and write
5540000
heap
page read and write
37FE6000
trusted library allocation
page read and write
29B60000
trusted library allocation
page read and write
2B9D000
stack
page read and write
416000
unkown
page readonly
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
240D0000
trusted library section
page read and write
2EAF000
heap
page read and write
9A000
stack
page read and write
20A3E000
stack
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
26115000
trusted library allocation
page read and write
56A0000
heap
page read and write
2EAF000
heap
page read and write
346F1000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
3DE000
unkown
page readonly
29C60000
heap
page read and write
2C0E000
stack
page read and write
2EAF000
heap
page read and write
2B601000
heap
page read and write
2B6F0000
trusted library allocation
page read and write
381F0000
trusted library allocation
page read and write
2C230000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
217CE000
heap
page read and write
29920000
trusted library allocation
page read and write
28EE0000
trusted library allocation
page read and write
2E87000
heap
page read and write
37450000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
56C5000
heap
page read and write
29C50000
trusted library allocation
page read and write
400000
unkown
page readonly
2C220000
trusted library allocation
page read and write
28B9B000
trusted library allocation
page read and write
2E86000
heap
page read and write
3286D000
heap
page read and write
2C690000
trusted library allocation
page read and write
2C690000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
2E9F000
heap
page read and write
531B000
heap
page read and write
2EAF000
heap
page read and write
29920000
trusted library allocation
page read and write
2E9F000
heap
page read and write
547F000
stack
page read and write
2955F000
stack
page read and write
2C560000
heap
page read and write
24103000
trusted library allocation
page execute and read and write
2E85000
heap
page read and write
283E2000
trusted library allocation
page read and write
28993000
trusted library allocation
page read and write
2EAF000
heap
page read and write
4E8D000
heap
page read and write
37FE0000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
3280D000
heap
page read and write
34740000
trusted library allocation
page read and write
38000000
trusted library allocation
page read and write
28DE0000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
2C11E000
stack
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
401000
unkown
page execute read
2EAF000
heap
page read and write
4A0000
remote allocation
page execute and read and write
29960000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
2E86000
heap
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
382B0000
trusted library allocation
page read and write
208C6000
direct allocation
page read and write
28D80000
trusted library allocation
page read and write
3750C000
heap
page read and write
2EAF000
heap
page read and write
29960000
remote allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
25CFC000
stack
page read and write
A28000
direct allocation
page read and write
533C000
heap
page read and write
29B60000
trusted library allocation
page read and write
34A31000
trusted library allocation
page read and write
2104D000
stack
page read and write
29920000
trusted library allocation
page read and write
269D0000
heap
page read and write
24206000
heap
page read and write
34BA000
heap
page read and write
2EAF000
heap
page read and write
29920000
trusted library allocation
page read and write
7FAA0000
direct allocation
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
2C260000
trusted library allocation
page read and write
6C0000
heap
page read and write
2E83000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
36DA0000
trusted library allocation
page read and write
2C0E000
stack
page read and write
382A0000
trusted library allocation
page read and write
2B690000
trusted library allocation
page read and write
2EAF000
heap
page read and write
24267000
heap
page read and write
2C260000
trusted library allocation
page read and write
381F0000
trusted library allocation
page read and write
54D0000
heap
page read and write
2E86000
heap
page read and write
20B2F000
stack
page read and write
261F5000
trusted library allocation
page read and write
29C80000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2E85000
heap
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
2E86000
heap
page read and write
28BC6000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
401000
unkown
page execute read
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2697A000
heap
page read and write
2E87000
heap
page read and write
2EAF000
heap
page read and write
AF6000
heap
page read and write
2C220000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
83B000
heap
page read and write
2C220000
trusted library allocation
page read and write
28E30000
trusted library allocation
page read and write
2E87000
heap
page read and write
70436000
unkown
page readonly
2E86000
heap
page read and write
2C220000
trusted library allocation
page read and write
2E86000
heap
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
29B60000
trusted library allocation
page read and write
28BC1000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2C530000
trusted library allocation
page read and write
28BD7000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
208EA000
direct allocation
page read and write
383E0000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
26FD000
stack
page read and write
20DAF000
stack
page read and write
2EAF000
heap
page read and write
1F0000
heap
page read and write
29C30000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2B720000
trusted library allocation
page read and write
390000
unkown
page readonly
26919000
heap
page read and write
2E9F000
heap
page read and write
36DC0000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
2EAF000
heap
page read and write
20B7E000
stack
page read and write
2E87000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
24249000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
29A0B000
trusted library allocation
page read and write
2104E000
stack
page read and write
2E85000
heap
page read and write
56DB000
heap
page read and write
21861000
heap
page read and write
296DE000
stack
page read and write
346F6000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
2EAF000
heap
page read and write
2B5E0000
trusted library allocation
page read and write
34C07000
trusted library allocation
page read and write
51AF000
stack
page read and write
2E86000
heap
page read and write
2716A000
trusted library allocation
page read and write
327E8000
heap
page read and write
37FE0000
trusted library allocation
page read and write
390000
unkown
page readonly
2EAF000
heap
page read and write
2EAF000
heap
page read and write
209DE000
stack
page execute and read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
36DD0000
heap
page execute and read and write
2C220000
trusted library allocation
page read and write
2EAF000
heap
page read and write
29920000
trusted library allocation
page read and write
38420000
trusted library allocation
page read and write
8C0000
remote allocation
page execute and read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2B734000
heap
page read and write
4E6A000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
450000
unkown
page execute and read and write
2EAF000
heap
page read and write
2921000
direct allocation
page read and write
2EAF000
heap
page read and write
59E000
stack
page read and write
2EAF000
heap
page read and write
29966000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
26040000
trusted library allocation
page read and write
2E86000
heap
page read and write
32859000
heap
page read and write
289A6000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2C460000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
21BAF000
trusted library allocation
page read and write
40D000
unkown
page write copy
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2B700000
trusted library allocation
page read and write
70A000
heap
page read and write
29F7F000
stack
page read and write
36DC0000
trusted library allocation
page read and write
3453C000
stack
page read and write
2C220000
trusted library allocation
page read and write
2EAF000
heap
page read and write
269D5000
heap
page read and write
29920000
trusted library allocation
page read and write
24262000
heap
page read and write
56BA000
heap
page read and write
2C260000
trusted library allocation
page read and write
390000
unkown
page readonly
2EAF000
heap
page read and write
211A0000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
2E9F000
heap
page read and write
29920000
trusted library allocation
page read and write
34550000
trusted library allocation
page read and write
29AA000
heap
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
36EF000
stack
page read and write
28DD0000
trusted library allocation
page read and write
4DAB000
stack
page read and write
2C22D000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
29920000
trusted library allocation
page read and write
400000
unkown
page readonly
2EAF000
heap
page read and write
28E34000
trusted library allocation
page read and write
2B5E0000
trusted library allocation
page read and write
24104000
trusted library allocation
page read and write
29960000
trusted library allocation
page read and write
37510000
trusted library allocation
page read and write
2C570000
trusted library allocation
page read and write
2AFE000
stack
page read and write
3300000
heap
page read and write
2E9F000
heap
page read and write
28988000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
29C30000
trusted library allocation
page read and write
20F0F000
stack
page read and write
36DC0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
29C00000
trusted library allocation
page read and write
346EA000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
2C270000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
5130000
heap
page read and write
36DC0000
trusted library allocation
page read and write
20928000
direct allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
373F0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
36DC6000
trusted library allocation
page read and write
7ED98000
direct allocation
page read and write
52BB000
stack
page read and write
2EAF000
heap
page read and write
2282000
direct allocation
page read and write
3BE000
unkown
page write copy
2E87000
heap
page read and write
29920000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
32817000
heap
page read and write
26399000
trusted library allocation
page read and write
20F4E000
stack
page read and write
2EAF000
heap
page read and write
2B551000
trusted library allocation
page read and write
533B000
heap
page read and write
2E9F000
heap
page read and write
28DE0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
28E40000
trusted library allocation
page read and write
2E87000
heap
page read and write
2E87000
heap
page read and write
36DA0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
34ABE000
trusted library allocation
page read and write
260E4000
trusted library allocation
page read and write
287E000
stack
page read and write
382A0000
trusted library allocation
page read and write
24286000
heap
page read and write
28DE0000
trusted library allocation
page read and write
22F0000
heap
page read and write
7EBE0000
direct allocation
page read and write
34B0000
heap
page read and write
34223000
trusted library allocation
page execute and read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
29920000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2B3E000
direct allocation
page read and write
2E86000
heap
page read and write
36DC0000
trusted library allocation
page read and write
28C20000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
4F0000
unkown
page execute and read and write
2E87000
heap
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2B610000
trusted library allocation
page read and write
29C30000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
294F000
stack
page read and write
2EAF000
heap
page read and write
37490000
trusted library allocation
page read and write
2B670000
trusted library allocation
page read and write
384000
unkown
page write copy
382A0000
trusted library allocation
page read and write
260DC000
trusted library allocation
page read and write
7F1B0000
direct allocation
page read and write
32843000
heap
page read and write
2691A000
heap
page read and write
28DE0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
34A33000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
26888000
heap
page read and write
29920000
trusted library allocation
page read and write
37FF9000
trusted library allocation
page read and write
416000
unkown
page readonly
36DC0000
trusted library allocation
page read and write
20A1E000
stack
page read and write
93A000
stack
page read and write
28C70000
trusted library allocation
page read and write
382B0000
trusted library allocation
page read and write
326C0000
heap
page read and write
2B730000
trusted library allocation
page read and write
2EAF000
heap
page read and write
291A000
direct allocation
page read and write
28C4A000
heap
page read and write
36DC0000
trusted library allocation
page read and write
20904000
direct allocation
page read and write
36DC0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
56BA000
heap
page read and write
22CA000
direct allocation
page read and write
2C220000
trusted library allocation
page read and write
2E87000
heap
page read and write
37AAF000
stack
page read and write
2C220000
trusted library allocation
page read and write
441000
unkown
page execute and read and write
3753B000
heap
page read and write
2E86000
heap
page read and write
2E87000
heap
page read and write
2A7D000
heap
page read and write
83C000
heap
page read and write
34560000
heap
page read and write
384000
unkown
page read and write
2E86000
heap
page read and write
26916000
heap
page read and write
2EAF000
heap
page read and write
32826000
heap
page read and write
1200000
unkown
page execute and read and write
34BE7000
trusted library allocation
page read and write
381E0000
trusted library allocation
page read and write
37FE0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
2375000
direct allocation
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
70E000
heap
page read and write
3730000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
7F1D0000
direct allocation
page read and write
2B762000
heap
page read and write
2B5E0000
trusted library allocation
page read and write
2B700000
trusted library allocation
page read and write
9D2000
direct allocation
page read and write
297DF000
stack
page read and write
483000
unkown
page read and write
36DC0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
28BCD000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2E86000
heap
page read and write
2C220000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2C520000
trusted library allocation
page read and write
28E36000
trusted library allocation
page read and write
2B5E0000
trusted library allocation
page read and write
74C000
heap
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
492000
unkown
page read and write
2E9F000
heap
page read and write
56C5000
heap
page read and write
289ED000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2B5E0000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2840000
heap
page read and write
29920000
trusted library allocation
page read and write
256000
heap
page read and write
2EAF000
heap
page read and write
4E8D000
heap
page read and write
36DA0000
trusted library allocation
page read and write
343D0000
trusted library allocation
page execute and read and write
348B0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EB3000
heap
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
28F00000
trusted library allocation
page read and write
390000
unkown
page readonly
2E86000
heap
page read and write
24263000
heap
page read and write
2AAD000
stack
page read and write
2E9F000
heap
page read and write
380000
heap
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
34AB6000
trusted library allocation
page read and write
26957000
heap
page read and write
2EAF000
heap
page read and write
2C520000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
2E86000
heap
page read and write
9A000
stack
page read and write
5650000
direct allocation
page read and write
34224000
trusted library allocation
page read and write
2E87000
heap
page read and write
2C470000
trusted library allocation
page read and write
A46000
heap
page read and write
29E3F000
stack
page read and write
2EAF000
heap
page read and write
28F00000
trusted library allocation
page read and write
5337000
heap
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
3BE000
unkown
page read and write
56D6000
heap
page read and write
29920000
trusted library allocation
page read and write
28CA0000
trusted library allocation
page read and write
2E9F000
heap
page read and write
24140000
heap
page read and write
37FC0000
trusted library allocation
page read and write
4A0000
unkown
page execute and read and write
283E0000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2C230000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2B700000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
9E0000
direct allocation
page read and write
28F10000
trusted library allocation
page read and write
A1A000
direct allocation
page read and write
28DE0000
trusted library allocation
page read and write
2B690000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
29C90000
trusted library allocation
page read and write
2EAF000
heap
page read and write
34255000
trusted library allocation
page execute and read and write
1F0000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
29990000
trusted library allocation
page read and write
29970000
trusted library allocation
page read and write
349EF000
trusted library allocation
page read and write
54BE000
stack
page read and write
34AB2000
trusted library allocation
page read and write
2EAF000
heap
page read and write
208FD000
direct allocation
page read and write
2C490000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
26226000
trusted library allocation
page read and write
2C5B000
direct allocation
page execute and read and write
37577000
heap
page read and write
29920000
trusted library allocation
page read and write
2F9F000
stack
page read and write
2E9F000
heap
page read and write
390000
unkown
page readonly
2C220000
trusted library allocation
page read and write
2EAF000
heap
page read and write
37FE0000
trusted library allocation
page read and write
382B0000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
2E86000
heap
page read and write
3DE000
unkown
page readonly
382B0000
trusted library allocation
page read and write
29D4000
heap
page read and write
208DC000
direct allocation
page read and write
2800000
heap
page read and write
2EAF000
heap
page read and write
346EE000
trusted library allocation
page read and write
2E86000
heap
page read and write
26431000
trusted library allocation
page read and write
2EAF000
heap
page read and write
5000000
heap
page read and write
2B5E0000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
29B70000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2B4C0000
trusted library allocation
page read and write
382A0000
trusted library allocation
page read and write
7D5000
heap
page read and write
2E9F000
heap
page read and write
29920000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
25EE0000
heap
page read and write
382A0000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2C690000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
373B2000
trusted library allocation
page read and write
2E87000
heap
page read and write
2E9F000
heap
page read and write
2E9F000
heap
page read and write
36DC0000
trusted library allocation
page read and write
23B0000
heap
page read and write
36DC0000
trusted library allocation
page read and write
7F200000
direct allocation
page read and write
20C7F000
stack
page read and write
3DE000
unkown
page readonly
2EAF000
heap
page read and write
5325000
heap
page read and write
2EAF000
heap
page read and write
37400000
trusted library allocation
page read and write
37FD0000
trusted library allocation
page read and write
5010000
heap
page read and write
2E86000
heap
page read and write
2EAF000
heap
page read and write
2E87000
heap
page read and write
2E87000
heap
page read and write
2EAF000
heap
page read and write
2179D000
heap
page read and write
2EAF000
heap
page read and write
29920000
trusted library allocation
page read and write
11D000
stack
page read and write
2EAF000
heap
page read and write
5B5000
heap
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
283E7000
trusted library allocation
page execute and read and write
2EAF000
heap
page read and write
382A0000
trusted library allocation
page read and write
29930000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
28A8E000
trusted library allocation
page read and write
483000
unkown
page write copy
2E85000
heap
page read and write
24277000
heap
page read and write
2815E000
stack
page read and write
2EAF000
heap
page read and write
2EB0000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
215C8000
heap
page read and write
20C9E000
stack
page read and write
2B710000
trusted library allocation
page read and write
2C74E000
stack
page read and write
28A4B000
trusted library allocation
page read and write
3DA000
unkown
page readonly
2EAF000
heap
page read and write
36DA0000
trusted library allocation
page read and write
5335000
heap
page read and write
2C260000
remote allocation
page read and write
2EAF000
heap
page read and write
36DA0000
trusted library allocation
page read and write
2C530000
trusted library allocation
page read and write
3BE000
unkown
page read and write
36DC0000
trusted library allocation
page read and write
28E70000
trusted library allocation
page read and write
2C270000
trusted library allocation
page read and write
2C520000
trusted library allocation
page read and write
260E8000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
2EAF000
heap
page read and write
26266000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2B584000
trusted library allocation
page read and write
2969F000
stack
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
20921000
direct allocation
page read and write
344FF000
stack
page read and write
2EAF000
heap
page read and write
28E8000
direct allocation
page read and write
37EAE000
stack
page read and write
37490000
trusted library allocation
page read and write
1F0000
heap
page read and write
29C30000
trusted library allocation
page read and write
26420000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2426A000
heap
page read and write
2E87000
heap
page read and write
2EAF000
heap
page read and write
2C270000
trusted library allocation
page read and write
390000
unkown
page readonly
2E9F000
heap
page read and write
2EAF000
heap
page read and write
28F20000
trusted library allocation
page read and write
527D000
stack
page read and write
2E86000
heap
page read and write
2C220000
trusted library allocation
page read and write
268B0000
heap
page read and write
41C000
unkown
page execute and read and write
2E9F000
heap
page read and write
287F0000
trusted library allocation
page read and write
2B5E0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2533000
heap
page read and write
2EAF000
heap
page read and write
32803000
heap
page read and write
2EAF000
heap
page read and write
2B5E0000
trusted library allocation
page read and write
28EB0000
trusted library allocation
page read and write
531A000
heap
page read and write
38410000
trusted library allocation
page read and write
29D00000
heap
page read and write
2E85000
heap
page read and write
37FF0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
29C20000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
211D0000
remote allocation
page read and write
37FE0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
7043F000
unkown
page readonly
870000
remote allocation
page execute and read and write
37420000
trusted library allocation
page read and write
2B506000
trusted library allocation
page read and write
400000
unkown
page readonly
483000
unkown
page read and write
28A50000
trusted library allocation
page read and write
3DA000
unkown
page readonly
2EAF000
heap
page read and write
34C1B000
trusted library allocation
page read and write
28A55000
trusted library allocation
page read and write
241B0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2B6E0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
A40000
heap
page read and write
2FA0000
heap
page read and write
2EAF000
heap
page read and write
26216000
trusted library allocation
page read and write
2B5E0000
trusted library allocation
page read and write
290C000
direct allocation
page read and write
2E87000
heap
page read and write
3BE000
unkown
page write copy
2E86000
heap
page read and write
2E87000
heap
page read and write
2B5E0000
trusted library allocation
page read and write
327CC000
heap
page read and write
2EAF000
heap
page read and write
28ED0000
trusted library allocation
page read and write
28CD4000
trusted library allocation
page read and write
2E9F000
heap
page read and write
28DF0000
trusted library allocation
page execute and read and write
2621E000
trusted library allocation
page read and write
26FD000
stack
page read and write
2C220000
trusted library allocation
page read and write
2E9F000
heap
page read and write
32823000
heap
page read and write
38410000
trusted library allocation
page read and write
2715E000
trusted library allocation
page read and write
382A0000
trusted library allocation
page read and write
70421000
unkown
page execute read
2EAF000
heap
page read and write
1C0000
heap
page read and write
940000
direct allocation
page execute and read and write
2E87000
heap
page read and write
25EE3000
heap
page read and write
28DE0000
trusted library allocation
page read and write
2BC1E000
stack
page read and write
2B600000
heap
page read and write
2C220000
trusted library allocation
page read and write
2C260000
trusted library allocation
page read and write
37FE0000
trusted library allocation
page read and write
27EE000
stack
page read and write
29960000
trusted library allocation
page read and write
2624A000
trusted library allocation
page read and write
37FE0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2E9F000
heap
page read and write
2090C000
direct allocation
page read and write
29920000
trusted library allocation
page read and write
283D6000
trusted library allocation
page execute and read and write
29B60000
trusted library allocation
page read and write
374B4000
heap
page read and write
2E86000
heap
page read and write
381E0000
trusted library allocation
page read and write
36DA0000
trusted library allocation
page read and write
34726000
trusted library allocation
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
2E9F000
heap
page read and write
24020000
heap
page read and write
2E9F000
heap
page read and write
2C260000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
273D000
stack
page read and write
2EAF000
heap
page read and write
5AB0000
trusted library allocation
page read and write
2C260000
trusted library allocation
page read and write
2426B000
heap
page read and write
21CCE000
heap
page read and write
2EAF000
heap
page read and write
37BEF000
stack
page read and write
34ABA000
trusted library allocation
page read and write
2E9F000
heap
page read and write
827000
heap
page read and write
56BD000
heap
page read and write
4B2E000
stack
page read and write
2E9F000
heap
page read and write
2C60000
heap
page read and write
4E8D000
heap
page read and write
28B97000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
2E86000
heap
page read and write
24130000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
214EF000
heap
page read and write
34ACA000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
34AC2000
trusted library allocation
page read and write
35A43000
trusted library allocation
page read and write
2B650000
trusted library allocation
page read and write
2EAF000
heap
page read and write
29960000
remote allocation
page read and write
29950000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
29920000
trusted library allocation
page read and write
1020000
remote allocation
page execute and read and write
2EAF000
heap
page read and write
34BFF000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2E9F000
heap
page read and write
391000
unkown
page execute read
32836000
heap
page read and write
28F00000
trusted library allocation
page read and write
2615A000
trusted library allocation
page read and write
28DA0000
trusted library allocation
page read and write
25EB0000
heap
page read and write
29920000
trusted library allocation
page read and write
76A000
heap
page read and write
2EAF000
heap
page read and write
9A000
stack
page read and write
28DE0000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
2EAF000
heap
page read and write
28A2E000
trusted library allocation
page read and write
2EAF000
heap
page read and write
4E85000
heap
page read and write
284F000
stack
page read and write
3BE000
unkown
page read and write
346DE000
trusted library allocation
page read and write
7F0000
heap
page read and write
2B6B0000
trusted library allocation
page read and write
37FE0000
remote allocation
page read and write
2DA0000
heap
page read and write
37460000
trusted library allocation
page read and write
29CD000
heap
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
2E9F000
heap
page read and write
36DC0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
38000000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
29C30000
trusted library allocation
page read and write
2C10000
heap
page read and write
208F6000
direct allocation
page read and write
26916000
heap
page read and write
3060000
heap
page read and write
2EAF000
heap
page read and write
4E74000
heap
page read and write
373B4000
trusted library allocation
page read and write
37399000
trusted library allocation
page read and write
2EAF000
heap
page read and write
28BB7000
trusted library allocation
page read and write
1160000
remote allocation
page execute and read and write
2991E000
stack
page read and write
24126000
trusted library allocation
page execute and read and write
2EAF000
heap
page read and write
2EB2000
heap
page read and write
29920000
trusted library allocation
page read and write
7F1B0000
direct allocation
page read and write
2E86000
heap
page read and write
2E9F000
heap
page read and write
373C0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
700000
heap
page read and write
2E9F000
heap
page read and write
29920000
trusted library allocation
page read and write
2E86000
heap
page read and write
29920000
trusted library allocation
page read and write
24270000
heap
page read and write
2E85000
heap
page read and write
29920000
trusted library allocation
page read and write
2EAF000
heap
page read and write
28D32000
trusted library allocation
page read and write
2EAF000
heap
page read and write
36D8F000
stack
page read and write
2E9F000
heap
page read and write
381E0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
28F00000
trusted library allocation
page read and write
2EAF000
heap
page read and write
391000
unkown
page execute read
209FF000
stack
page read and write
2E86000
heap
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2E9F000
heap
page read and write
2BAC000
stack
page read and write
700000
heap
page read and write
2EAF000
heap
page read and write
34720000
trusted library allocation
page read and write
4E6C000
heap
page read and write
2B700000
trusted library allocation
page read and write
26924000
heap
page read and write
37FE0000
trusted library allocation
page read and write
2410D000
trusted library allocation
page execute and read and write
19C000
stack
page read and write
2C220000
trusted library allocation
page read and write
2E9F000
heap
page read and write
283B3000
trusted library allocation
page execute and read and write
2C290000
trusted library allocation
page read and write
2EA1000
heap
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2E9F000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
283D0000
trusted library allocation
page read and write
28F00000
trusted library allocation
page read and write
2B600000
trusted library allocation
page read and write
348F4000
trusted library allocation
page read and write
2EAF000
heap
page read and write
289E7000
trusted library allocation
page read and write
2E9F000
heap
page read and write
37FE0000
trusted library allocation
page read and write
2FFF000
stack
page read and write
2C270000
trusted library allocation
page read and write
2B632000
trusted library allocation
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
38200000
trusted library allocation
page read and write
26036000
trusted library allocation
page read and write
2E87000
heap
page read and write
2F50000
heap
page read and write
2E9F000
heap
page read and write
240E0000
heap
page read and write
28DE0000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
37410000
trusted library allocation
page read and write
2B97000
direct allocation
page execute and read and write
2EAF000
heap
page read and write
216C7000
heap
page read and write
2E9F000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2B7CC000
heap
page read and write
2EAF000
heap
page read and write
2EFF000
stack
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
7FBAF000
direct allocation
page read and write
2EAF000
heap
page read and write
386000
unkown
page readonly
2EAF000
heap
page read and write
28E10000
trusted library allocation
page read and write
28BC7000
trusted library allocation
page read and write
2CA0F000
stack
page read and write
2C21E000
stack
page read and write
2928000
direct allocation
page read and write
2B636000
trusted library allocation
page read and write
1160000
unkown
page execute and read and write
2C220000
trusted library allocation
page read and write
3283C000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
29920000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
28CF6000
heap
page read and write
9F6000
heap
page read and write
2E86000
heap
page read and write
400000
unkown
page readonly
217F6000
heap
page read and write
2EAF000
heap
page read and write
2B530000
trusted library allocation
page read and write
2EAF000
heap
page read and write
261D8000
trusted library allocation
page read and write
28E50000
trusted library allocation
page read and write
2E9F000
heap
page read and write
208DC000
stack
page read and write
240AF000
stack
page read and write
401000
unkown
page execute read
36D90000
trusted library allocation
page read and write
2EAF000
heap
page read and write
29920000
trusted library allocation
page read and write
34BCF000
trusted library allocation
page read and write
512E000
stack
page read and write
208E8000
direct allocation
page read and write
7F240000
direct allocation
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
38410000
trusted library allocation
page read and write
2E9F000
heap
page read and write
7F1FA000
direct allocation
page read and write
2B640000
trusted library allocation
page read and write
2B480000
trusted library allocation
page read and write
38010000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
374A0000
trusted library allocation
page read and write
7F960000
direct allocation
page read and write
20C5F000
stack
page read and write
2EAF000
heap
page read and write
2626A000
trusted library allocation
page read and write
23BC000
direct allocation
page read and write
2E9F000
heap
page read and write
124F000
unkown
page execute and read and write
2B5E0000
trusted library allocation
page read and write
36DA0000
trusted library allocation
page read and write
2EA1000
heap
page read and write
241A0000
heap
page execute and read and write
29C20000
trusted library allocation
page read and write
26272000
trusted library allocation
page read and write
29B90000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
383F0000
trusted library allocation
page read and write
2E86000
heap
page read and write
36DC0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
34AC6000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
28460000
heap
page read and write
2EFE000
stack
page read and write
382A0000
trusted library allocation
page read and write
34A63000
trusted library allocation
page read and write
2B650000
trusted library allocation
page read and write
2E87000
heap
page read and write
8C0000
unkown
page execute and read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
29920000
trusted library allocation
page read and write
2E9F000
heap
page read and write
28DE0000
trusted library allocation
page read and write
2E86000
heap
page read and write
11AF000
unkown
page execute and read and write
2C690000
trusted library allocation
page read and write
37E6F000
stack
page read and write
2C43000
direct allocation
page read and write
29BB000
heap
page read and write
38280000
trusted library allocation
page read and write
37FE0000
trusted library allocation
page read and write
36D94000
trusted library allocation
page read and write
25CB0000
heap
page read and write
2C220000
trusted library allocation
page read and write
3DE000
unkown
page readonly
3860E000
stack
page read and write
2B5B0000
trusted library allocation
page read and write
38400000
trusted library allocation
page read and write
34BDB000
trusted library allocation
page read and write
2131F000
stack
page read and write
373C0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
29A02000
trusted library allocation
page read and write
2E9F000
heap
page read and write
241C0000
heap
page read and write
2E9F000
heap
page read and write
38420000
trusted library allocation
page read and write
34A65000
trusted library allocation
page read and write
2EAF000
heap
page read and write
241FB000
heap
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2F70000
heap
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2C220000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
2E87000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
29920000
trusted library allocation
page read and write
27CE000
stack
page read and write
34900000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
2E85000
heap
page read and write
2E86000
heap
page read and write
2EAF000
heap
page read and write
34B85000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2626E000
trusted library allocation
page read and write
2E86000
heap
page read and write
26030000
trusted library allocation
page read and write
346D0000
trusted library allocation
page read and write
2121E000
stack
page read and write
2E87000
heap
page read and write
2E86000
heap
page read and write
29920000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
870000
unkown
page execute and read and write
29920000
trusted library allocation
page read and write
26923000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2614A000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2390000
direct allocation
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
385CF000
stack
page read and write
2EAF000
heap
page read and write
382C0000
trusted library allocation
page execute and read and write
7E1000
heap
page read and write
349D7000
trusted library allocation
page read and write
345F8000
trusted library allocation
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
37FD0000
trusted library allocation
page execute and read and write
2E9F000
heap
page read and write
29920000
trusted library allocation
page read and write
28C84000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
264F8000
trusted library allocation
page read and write
20F0F000
stack
page read and write
6C3000
heap
page read and write
2B728000
heap
page read and write
7FCA0000
direct allocation
page read and write
283EB000
trusted library allocation
page execute and read and write
28BA7000
trusted library allocation
page read and write
24261000
heap
page read and write
29920000
trusted library allocation
page read and write
7043F000
unkown
page readonly
2992D000
trusted library allocation
page read and write
2625A000
trusted library allocation
page read and write
26242000
trusted library allocation
page read and write
24269000
heap
page read and write
2B49A000
trusted library allocation
page read and write
390000
unkown
page readonly
2EAF000
heap
page read and write
29960000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2B486000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
2E85000
heap
page read and write
217FB000
heap
page read and write
2EAF000
heap
page read and write
2E60000
heap
page read and write
7F320000
direct allocation
page read and write
2E86000
heap
page read and write
37FD0000
trusted library allocation
page read and write
29980000
trusted library allocation
page read and write
2EAF000
heap
page read and write
28BAE000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2B510000
trusted library allocation
page read and write
2E9F000
heap
page read and write
36DC0000
trusted library allocation
page read and write
7EDE0000
direct allocation
page read and write
28DE0000
trusted library allocation
page read and write
2E86000
heap
page read and write
2B5E0000
trusted library allocation
page read and write
7043F000
unkown
page readonly
242F000
stack
page read and write
24100000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2E87000
heap
page read and write
5290000
direct allocation
page read and write
2E9F000
heap
page read and write
26136000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2B63000
direct allocation
page read and write
36E000
stack
page read and write
2E86000
heap
page read and write
36DA0000
trusted library allocation
page read and write
2135E000
stack
page read and write
2E86000
heap
page read and write
34A8D000
trusted library allocation
page read and write
28E80000
trusted library allocation
page read and write
2E83000
heap
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
2981E000
stack
page read and write
382D0000
trusted library allocation
page read and write
2E86000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
3756C000
heap
page read and write
34BEF000
trusted library allocation
page read and write
2C520000
trusted library allocation
page read and write
7EC70000
direct allocation
page read and write
29920000
trusted library allocation
page read and write
37FE0000
trusted library allocation
page read and write
7B0000
remote allocation
page execute and read and write
2EAF000
heap
page read and write
20C6F000
stack
page read and write
285E0000
heap
page execute and read and write
29920000
trusted library allocation
page read and write
7ED90000
direct allocation
page read and write
2B520000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2B590000
trusted library allocation
page read and write
450000
remote allocation
page execute and read and write
2C6A0000
trusted library allocation
page read and write
2E87000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2C690000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2E9F000
heap
page read and write
7FCEF000
direct allocation
page read and write
4E8B000
heap
page read and write
2E5E000
unkown
page read and write
2EAF000
heap
page read and write
2C590000
heap
page read and write
2EAF000
heap
page read and write
450000
unkown
page execute and read and write
4E8B000
heap
page read and write
2E9F000
heap
page read and write
2C260000
trusted library allocation
page read and write
950000
unkown
page execute and read and write
211D0000
remote allocation
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
24160000
trusted library allocation
page read and write
2B5D0000
trusted library allocation
page read and write
2E9F000
heap
page read and write
24113000
trusted library allocation
page read and write
20CBE000
stack
page read and write
2EAF000
heap
page read and write
6F0000
heap
page read and write
28F6000
direct allocation
page read and write
36DC0000
trusted library allocation
page read and write
34257000
trusted library allocation
page execute and read and write
34B95000
trusted library allocation
page read and write
2EAF000
heap
page read and write
5325000
heap
page read and write
2C690000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2B670000
trusted library allocation
page read and write
2EAF000
heap
page read and write
299A0000
trusted library allocation
page read and write
32750000
trusted library section
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
24135000
trusted library allocation
page execute and read and write
217EE000
heap
page read and write
37FE0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
3BE000
unkown
page write copy
3000000
heap
page read and write
28A8A000
trusted library allocation
page read and write
2E87000
heap
page read and write
2EBD000
stack
page read and write
2A03E000
stack
page read and write
34A6E000
trusted library allocation
page read and write
32778000
heap
page read and write
36DC0000
trusted library allocation
page read and write
4E6C000
heap
page read and write
349F3000
trusted library allocation
page read and write
29CA0000
trusted library allocation
page read and write
7B6000
heap
page read and write
2B6C0000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2B5E0000
trusted library allocation
page read and write
28440000
heap
page execute and read and write
2E9F000
heap
page read and write
2C260000
trusted library allocation
page read and write
283B4000
trusted library allocation
page read and write
374F0000
trusted library allocation
page read and write
2C530000
trusted library allocation
page read and write
2EAF000
heap
page read and write
27F0000
heap
page read and write
2C480000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2C260000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
5B0000
heap
page read and write
36DA0000
trusted library allocation
page read and write
34ACE000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
28DE0000
trusted library allocation
page read and write
28CC0000
trusted library allocation
page read and write
2B700000
trusted library allocation
page read and write
2EC1000
heap
page read and write
2613A000
trusted library allocation
page read and write
56DB000
heap
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
2B6A0000
trusted library allocation
page read and write
124F000
remote allocation
page execute and read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
20B5E000
stack
page read and write
2E9F000
heap
page read and write
283BD000
trusted library allocation
page execute and read and write
2EAF000
heap
page read and write
7EE80000
direct allocation
page read and write
2E86000
heap
page read and write
610000
heap
page read and write
2B5F0000
trusted library allocation
page read and write
2E87000
heap
page read and write
2EAF000
heap
page read and write
348E0000
trusted library allocation
page read and write
250000
heap
page read and write
2EAF000
heap
page read and write
7FD07000
direct allocation
page read and write
28DE0000
trusted library allocation
page read and write
2E86000
heap
page read and write
2EAF000
heap
page read and write
2AA0000
heap
page read and write
2622E000
trusted library allocation
page read and write
22FF000
trusted library allocation
page read and write
2EAF000
heap
page read and write
3DE000
unkown
page readonly
7FBD0000
direct allocation
page read and write
29B50000
trusted library allocation
page execute and read and write
19C000
stack
page read and write
28CB3000
heap
page read and write
381E0000
trusted library allocation
page read and write
24283000
heap
page read and write
2E87000
heap
page read and write
29960000
trusted library allocation
page read and write
2E9F000
heap
page read and write
28E20000
trusted library allocation
page read and write
2EAF000
heap
page read and write
299B0000
trusted library allocation
page read and write
28B55000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
2EAF000
heap
page read and write
26946000
heap
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
29920000
trusted library allocation
page read and write
28A82000
trusted library allocation
page read and write
2EAF000
heap
page read and write
416000
unkown
page readonly
26252000
trusted library allocation
page read and write
348D0000
trusted library allocation
page read and write
28A76000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2EA1000
heap
page read and write
400000
remote allocation
page execute and read and write
286C8000
trusted library allocation
page read and write
269C0000
trusted library section
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2C6CE000
stack
page read and write
2E86000
heap
page read and write
2B6B0000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
2B5E0000
trusted library allocation
page read and write
2613E000
trusted library allocation
page read and write
242C0000
heap
page read and write
7FDB0000
direct allocation
page read and write
29C70000
trusted library allocation
page read and write
2EAF000
heap
page read and write
29920000
trusted library allocation
page read and write
208EF000
direct allocation
page read and write
51EE000
stack
page read and write
37500000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
28A6E000
trusted library allocation
page read and write
2B5A0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2B11000
direct allocation
page execute read
2C220000
trusted library allocation
page read and write
760000
heap
page read and write
29920000
trusted library allocation
page read and write
2E86000
heap
page read and write
38290000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2879E000
stack
page read and write
2E9F000
heap
page read and write
326F000
stack
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2179C000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
1200000
remote allocation
page execute and read and write
2EAF000
heap
page read and write
383C0000
heap
page read and write
2E9F000
heap
page read and write
2B600000
trusted library allocation
page read and write
36DA0000
trusted library allocation
page read and write
383F0000
trusted library allocation
page read and write
28410000
trusted library allocation
page execute and read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
34250000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
28F00000
trusted library allocation
page read and write
3422D000
trusted library allocation
page execute and read and write
2B6D1000
trusted library allocation
page read and write
70436000
unkown
page readonly
28B4B000
trusted library allocation
page read and write
2BE5F000
stack
page read and write
2E9F000
heap
page read and write
37430000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
28EC0000
trusted library allocation
page read and write
2C460000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
343F0000
heap
page read and write
2E86000
heap
page read and write
21BA6000
heap
page read and write
28DE0000
trusted library allocation
page read and write
2B660000
trusted library allocation
page read and write
29960000
trusted library allocation
page read and write
37FE0000
remote allocation
page read and write
24228000
heap
page read and write
2E86000
heap
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
2EAF000
heap
page read and write
38410000
trusted library allocation
page read and write
268D9000
heap
page read and write
2EAF000
heap
page read and write
2899D000
trusted library allocation
page read and write
21190000
heap
page read and write
2B5E0000
trusted library allocation
page read and write
2C8CF000
stack
page read and write
3868E000
stack
page read and write
15D000
stack
page read and write
2EAF000
heap
page read and write
390000
unkown
page readonly
4E74000
heap
page read and write
2EAF000
heap
page read and write
2423F000
heap
page read and write
2E86000
heap
page read and write
2EAF000
heap
page read and write
2C6A0000
trusted library allocation
page read and write
680000
heap
page read and write
2EAF000
heap
page read and write
A04000
direct allocation
page read and write
2C220000
trusted library allocation
page read and write
2E86000
heap
page read and write
36DA0000
trusted library allocation
page read and write
2C460000
trusted library allocation
page read and write
2C27E000
trusted library allocation
page read and write
4E58000
heap
page read and write
29920000
trusted library allocation
page read and write
34A8F000
trusted library allocation
page read and write
2B7E4000
heap
page read and write
2EAF000
heap
page read and write
2429D000
heap
page read and write
2C220000
trusted library allocation
page read and write
2EAF000
heap
page read and write
28BAB000
trusted library allocation
page read and write
34710000
trusted library allocation
page read and write
37FF0000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
345E0000
heap
page read and write
2E86000
heap
page read and write
28470000
heap
page read and write
2884000
heap
page read and write
2C220000
trusted library allocation
page read and write
3720000
heap
page read and write
2290000
direct allocation
page read and write
828000
heap
page read and write
2EAF000
heap
page read and write
441000
remote allocation
page execute and read and write
32F0000
heap
page read and write
29960000
trusted library allocation
page read and write
2E86000
heap
page read and write
34910000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
288A000
heap
page read and write
28E70000
trusted library allocation
page read and write
2E9F000
heap
page read and write
7F8000
heap
page read and write
4A0000
remote allocation
page execute and read and write
2EAF000
heap
page read and write
28EA0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
56C5000
heap
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
2E9F000
heap
page read and write
A0C000
direct allocation
page read and write
20F4E000
stack
page read and write
2B520000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EA1000
heap
page read and write
2830000
heap
page read and write
40D000
unkown
page write copy
241CA000
heap
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
217C3000
heap
page read and write
2EAF000
heap
page read and write
7EE30000
direct allocation
page read and write
2E86000
heap
page read and write
27A0000
heap
page read and write
2D3F000
stack
page read and write
2C220000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
25D00000
heap
page read and write
95F000
stack
page read and write
32BF000
stack
page read and write
2622A000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E87000
heap
page read and write
36DC0000
trusted library allocation
page read and write
3420000
heap
page read and write
21762000
heap
page read and write
2B680000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
349E1000
trusted library allocation
page read and write
24283000
heap
page read and write
2E9F000
heap
page read and write
391000
unkown
page execute read
2931E000
stack
page read and write
2EAF000
heap
page read and write
22EF000
stack
page read and write
2E87000
heap
page read and write
29920000
trusted library allocation
page read and write
26870000
trusted library section
page read and write
381E0000
trusted library allocation
page read and write
29AA000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
37FE0000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
34A99000
trusted library allocation
page read and write
287A0000
heap
page execute and read and write
72D000
heap
page read and write
2E87000
heap
page read and write
2B706000
trusted library allocation
page read and write
269F000
heap
page read and write
29920000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
28BBA000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
2E9F000
heap
page read and write
26262000
trusted library allocation
page read and write
2EAF000
heap
page read and write
197000
stack
page read and write
277D000
stack
page read and write
390000
unkown
page readonly
2BC1000
direct allocation
page execute read
26918000
heap
page read and write
2EAF000
heap
page read and write
685000
heap
page read and write
9FD000
direct allocation
page read and write
2E86000
heap
page read and write
391000
unkown
page execute read
261E7000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
287E0000
trusted library allocation
page read and write
283DA000
trusted library allocation
page execute and read and write
2EAF000
heap
page read and write
28DD0000
trusted library allocation
page read and write
2C530000
trusted library allocation
page read and write
2E9F000
heap
page read and write
289F4000
trusted library allocation
page read and write
34930000
trusted library allocation
page read and write
2C2B0000
trusted library allocation
page read and write
2179D000
heap
page read and write
26256000
trusted library allocation
page read and write
3DA000
unkown
page readonly
20A2A000
stack
page read and write
2E9F000
heap
page read and write
2E86000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
34730000
trusted library allocation
page read and write
34270000
heap
page read and write
2F4E000
stack
page read and write
2EAF000
heap
page read and write
28E40000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
7FB20000
direct allocation
page read and write
2B700000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
2E10000
heap
page read and write
373E0000
trusted library allocation
page read and write
2E86000
heap
page read and write
289B0000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
2C280000
trusted library allocation
page read and write
280E000
stack
page read and write
29920000
trusted library allocation
page read and write
7ED40000
direct allocation
page read and write
2C550000
trusted library allocation
page read and write
34BD7000
trusted library allocation
page read and write
20B6E000
stack
page read and write
56D6000
heap
page read and write
2E86000
heap
page read and write
2EAF000
heap
page read and write
2108E000
stack
page read and write
2E86000
heap
page read and write
29920000
trusted library allocation
page read and write
37FF0000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
1F0000
heap
page read and write
2E86000
heap
page read and write
2E9F000
heap
page read and write
29920000
trusted library allocation
page read and write
2E9F000
heap
page read and write
28E00000
heap
page read and write
2EAF000
heap
page read and write
2E85000
heap
page read and write
2C520000
trusted library allocation
page read and write
2EAF000
heap
page read and write
441000
remote allocation
page execute and read and write
2C260000
trusted library allocation
page read and write
7CE000
stack
page read and write
2C0DF000
stack
page read and write
2EAF000
heap
page read and write
373A4000
trusted library allocation
page read and write
34A72000
trusted library allocation
page read and write
292DF000
stack
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
37460000
trusted library allocation
page read and write
29960000
trusted library allocation
page read and write
26AA000
heap
page read and write
211D0000
remote allocation
page read and write
374E0000
trusted library allocation
page read and write
2C260000
remote allocation
page read and write
2D0A000
heap
page read and write
283C0000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2E9F000
heap
page read and write
241CE000
heap
page read and write
2E86000
heap
page read and write
2EAF000
heap
page read and write
374D0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
29CA0000
trusted library allocation
page read and write
4E74000
heap
page read and write
208E3000
direct allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
7FC70000
direct allocation
page read and write
29D2000
heap
page read and write
28E80000
trusted library allocation
page read and write
2E83000
heap
page read and write
38410000
trusted library allocation
page read and write
29C20000
trusted library allocation
page read and write
26934000
heap
page read and write
38290000
trusted library allocation
page read and write
34242000
trusted library allocation
page read and write
78F000
stack
page read and write
37390000
heap
page read and write
2C250000
trusted library allocation
page read and write
2EAF000
heap
page read and write
28DE0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2B67000
direct allocation
page execute and read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
380000
unkown
page readonly
2EAF000
heap
page read and write
550000
heap
page read and write
2E9F000
heap
page read and write
2D3B000
direct allocation
page execute and read and write
5160000
heap
page read and write
2EAF000
heap
page read and write
29C20000
trusted library allocation
page read and write
2E9F000
heap
page read and write
4B9F000
stack
page read and write
28BAF000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
34940000
heap
page execute and read and write
2AE8F000
stack
page read and write
2C2A0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2B5E0000
trusted library allocation
page read and write
28D70000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
25C9E000
stack
page read and write
37FAE000
stack
page read and write
2118F000
stack
page read and write
2E86000
heap
page read and write
37451000
trusted library allocation
page read and write
37440000
trusted library allocation
page read and write
34AD2000
trusted library allocation
page read and write
37FF0000
trusted library allocation
page read and write
24110000
trusted library allocation
page read and write
2E86000
heap
page read and write
2691D000
heap
page read and write
2B48E000
trusted library allocation
page read and write
34B9F000
trusted library allocation
page read and write
2EAF000
heap
page read and write
29C10000
trusted library allocation
page read and write
2EAF000
heap
page read and write
20F3E000
stack
page read and write
2EAF000
heap
page read and write
36DA0000
trusted library allocation
page read and write
29B60000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
208F1000
direct allocation
page read and write
2B770000
heap
page read and write
2C220000
trusted library allocation
page read and write
37FE0000
trusted library allocation
page read and write
251E000
stack
page read and write
2E9F000
heap
page read and write
28F10000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2C70F000
stack
page read and write
2B619000
trusted library allocation
page read and write
37FE0000
remote allocation
page read and write
2BF9F000
stack
page read and write
2C220000
trusted library allocation
page read and write
24122000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
2EAF000
heap
page read and write
34C0B000
trusted library allocation
page read and write
390000
unkown
page readonly
2EAF000
heap
page read and write
4E85000
heap
page read and write
2E86000
heap
page read and write
550000
heap
page read and write
2EB3000
heap
page read and write
23B4000
direct allocation
page read and write
28C51000
trusted library allocation
page read and write
2C530000
trusted library allocation
page read and write
2C70000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2AFE000
stack
page read and write
34BFB000
trusted library allocation
page read and write
28B93000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2B720000
trusted library allocation
page read and write
2959E000
stack
page read and write
24137000
trusted library allocation
page execute and read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
326C5000
heap
page read and write
2C540000
trusted library allocation
page execute and read and write
346DB000
trusted library allocation
page read and write
70420000
unkown
page readonly
29920000
trusted library allocation
page read and write
391000
unkown
page execute read
2E9F000
heap
page read and write
11AF000
remote allocation
page execute and read and write
36DC0000
trusted library allocation
page read and write
28D10000
heap
page read and write
2E9F000
heap
page read and write
20E0E000
stack
page read and write
2EAF000
heap
page read and write
283D2000
trusted library allocation
page read and write
2E87000
heap
page read and write
29C20000
trusted library allocation
page read and write
36D90000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E87000
heap
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
209DF000
stack
page read and write
29920000
trusted library allocation
page read and write
26531000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
2EAF000
heap
page read and write
37FFE000
trusted library allocation
page read and write
3220000
heap
page read and write
28CE0000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
7F200000
direct allocation
page read and write
32832000
heap
page read and write
2EAF000
heap
page read and write
2B620000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
28D00000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
283E5000
trusted library allocation
page execute and read and write
2176A000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
28D50000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2B35000
direct allocation
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
391000
unkown
page execute read
2EAF000
heap
page read and write
28DE0000
trusted library allocation
page read and write
2E86000
heap
page read and write
2EAF000
heap
page read and write
37FE0000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
2E86000
heap
page read and write
3DE000
unkown
page readonly
208E0000
direct allocation
page read and write
215B0000
heap
page read and write
28E50000
trusted library allocation
page read and write
2C520000
trusted library allocation
page read and write
29960000
trusted library allocation
page read and write
76E000
heap
page read and write
2EAF000
heap
page read and write
34750000
heap
page read and write
2EAF000
heap
page read and write
3BE000
unkown
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
34233000
trusted library allocation
page read and write
373B6000
trusted library allocation
page read and write
2EAF000
heap
page read and write
391000
unkown
page execute read
2B780000
trusted library allocation
page read and write
37FB0000
trusted library allocation
page read and write
35D000
stack
page read and write
2E9F000
heap
page read and write
2E9F000
heap
page read and write
1020000
unkown
page execute and read and write
7ED00000
direct allocation
page read and write
2B7B1000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
25ED0000
trusted library allocation
page read and write
28E00000
trusted library allocation
page read and write
2EAF000
heap
page read and write
A5E000
stack
page read and write
28D40000
trusted library allocation
page read and write
2EAF000
heap
page read and write
28BCF000
trusted library allocation
page read and write
7ED90000
direct allocation
page read and write
28BB3000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
37D6E000
stack
page read and write
2EAF000
heap
page read and write
2C5E000
stack
page read and write
2EAF000
heap
page read and write
28B0F000
trusted library allocation
page read and write
2C260000
trusted library allocation
page read and write
2EAF000
heap
page read and write
7F0F0000
direct allocation
page read and write
36DC0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
34BD3000
trusted library allocation
page read and write
28A1F000
trusted library allocation
page read and write
345CE000
stack
page read and write
29920000
trusted library allocation
page read and write
2EAF000
heap
page read and write
240E5000
heap
page read and write
3330000
heap
page read and write
29920000
trusted library allocation
page read and write
2EAF000
heap
page read and write
34380000
trusted library allocation
page read and write
2E86000
heap
page read and write
2EAF000
heap
page read and write
2E87000
heap
page read and write
2E9F000
heap
page read and write
5390000
direct allocation
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2E87000
heap
page read and write
2EAF000
heap
page read and write
2C460000
trusted library allocation
page read and write
2EAF000
heap
page read and write
29979000
trusted library allocation
page read and write
29960000
trusted library allocation
page read and write
2E86000
heap
page read and write
211AF000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2904000
direct allocation
page read and write
2EAF000
heap
page read and write
28D24000
trusted library allocation
page read and write
29C20000
trusted library allocation
page read and write
34A5A000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2C520000
trusted library allocation
page read and write
2C27F000
trusted library allocation
page read and write
2D00000
heap
page read and write
2EAF000
heap
page read and write
25CA0000
trusted library allocation
page read and write
26938000
heap
page read and write
2EAF000
heap
page read and write
26920000
heap
page read and write
34A2B000
trusted library allocation
page read and write
26246000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2428F000
heap
page read and write
28A86000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
7F290000
direct allocation
page read and write
2FA0000
heap
page read and write
280E000
stack
page read and write
263B9000
trusted library allocation
page read and write
26146000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
36DA0000
trusted library allocation
page read and write
23CF000
stack
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
5DE000
stack
page read and write
28B3000
direct allocation
page read and write
36DC0000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
7FD10000
direct allocation
page read and write
36DC0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
496000
unkown
page write copy
2E86000
heap
page read and write
36DC0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
29990000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
3755D000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2E87000
heap
page read and write
25E18000
trusted library allocation
page read and write
28E01000
heap
page read and write
2E86000
heap
page read and write
450000
unkown
page execute and read and write
37566000
heap
page read and write
2C220000
trusted library allocation
page read and write
2E87000
heap
page read and write
494000
unkown
page read and write
24180000
trusted library allocation
page read and write
450000
remote allocation
page execute and read and write
59E000
stack
page read and write
374A0000
trusted library allocation
page read and write
28CF0000
trusted library allocation
page read and write
2E9F000
heap
page read and write
70436000
unkown
page readonly
29920000
trusted library allocation
page read and write
2EAF000
heap
page read and write
29C20000
trusted library allocation
page read and write
2EAF000
heap
page read and write
29920000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2B5D4000
trusted library allocation
page read and write
2EAF000
heap
page read and write
37AEE000
stack
page read and write
2997E000
trusted library allocation
page read and write
3DA000
unkown
page readonly
2EAF000
heap
page read and write
374C0000
heap
page read and write
2EAF000
heap
page read and write
3796F000
stack
page read and write
32815000
heap
page read and write
2EAF000
heap
page read and write
3424A000
trusted library allocation
page execute and read and write
2EAF000
heap
page read and write
2C290000
trusted library allocation
page read and write
29C90000
trusted library allocation
page read and write
37391000
heap
page read and write
2B601000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2C260000
trusted library allocation
page read and write
26232000
trusted library allocation
page read and write
720000
remote allocation
page execute and read and write
2EAF000
heap
page read and write
2B5E0000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
2B710000
trusted library allocation
page read and write
37FE0000
trusted library allocation
page read and write
2E9F000
heap
page read and write
832000
heap
page read and write
29980000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
3050000
heap
page read and write
28E00000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
2103F000
stack
page read and write
37FB0000
trusted library allocation
page execute and read and write
2E87000
heap
page read and write
28FD000
direct allocation
page read and write
2B700000
trusted library allocation
page read and write
29970000
trusted library allocation
page read and write
2412A000
trusted library allocation
page execute and read and write
38210000
trusted library allocation
page read and write
7D3000
heap
page read and write
23D8000
direct allocation
page read and write
29C20000
trusted library allocation
page read and write
AD0000
heap
page read and write
36DC0000
trusted library allocation
page read and write
2B7F0000
heap
page read and write
2E87000
heap
page read and write
337E000
stack
page read and write
215C3000
heap
page read and write
7043D000
unkown
page read and write
2EAF000
heap
page read and write
28DF0000
trusted library allocation
page read and write
28CEA000
heap
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
299AA000
trusted library allocation
page read and write
2C250000
trusted library allocation
page execute and read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
3280D000
heap
page read and write
4DA9000
stack
page read and write
2E86000
heap
page read and write
28DE0000
trusted library allocation
page read and write
2E86000
heap
page read and write
28D90000
trusted library allocation
page read and write
2E87000
heap
page read and write
400000
remote allocation
page execute and read and write
2EAF000
heap
page read and write
2C260000
trusted library allocation
page read and write
3848F000
stack
page read and write
29920000
trusted library allocation
page read and write
2B700000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
21760000
heap
page read and write
2C220000
trusted library allocation
page read and write
2E9F000
heap
page read and write
34BCB000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
29C90000
trusted library allocation
page read and write
2E9F000
heap
page read and write
391000
unkown
page execute read
36DC0000
trusted library allocation
page read and write
2406E000
stack
page read and write
2EAF000
heap
page read and write
7B0000
unkown
page execute and read and write
29B0000
heap
page read and write
2EAF000
heap
page read and write
5300000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
27155000
trusted library allocation
page read and write
21EF1000
direct allocation
page read and write
2E86000
heap
page read and write
23D0000
heap
page read and write
36DC0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2530000
heap
page read and write
2B700000
trusted library allocation
page read and write
2EAF000
heap
page read and write
4A0000
unkown
page execute and read and write
36DC0000
trusted library allocation
page read and write
28C90000
trusted library allocation
page read and write
38010000
trusted library allocation
page read and write
349D1000
trusted library allocation
page read and write
327A0000
heap
page read and write
2E9F000
heap
page read and write
3DA000
unkown
page readonly
24170000
trusted library allocation
page execute and read and write
2EAF000
heap
page read and write
4E75000
heap
page read and write
28360000
heap
page read and write
29920000
trusted library allocation
page read and write
2859F000
stack
page read and write
2EAF000
heap
page read and write
36DB0000
trusted library allocation
page execute and read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
28C30000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
2EAF000
heap
page read and write
28DE0000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2E87000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
28E20000
trusted library allocation
page read and write
38410000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
37FB0000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
29920000
trusted library allocation
page read and write
29B70000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
26142000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
29C50000
trusted library allocation
page read and write
28BC3000
trusted library allocation
page read and write
2E9F000
heap
page read and write
36DC0000
trusted library allocation
page read and write
209DA000
stack
page read and write
34BE3000
trusted library allocation
page read and write
9CC000
stack
page read and write
37FFF000
trusted library allocation
page read and write
2FBD000
stack
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
3864F000
stack
page read and write
2EAF000
heap
page read and write
382B0000
trusted library allocation
page read and write
2945E000
stack
page read and write
2E9F000
heap
page read and write
36DC0000
trusted library allocation
page read and write
29970000
trusted library allocation
page read and write
2E87000
heap
page read and write
381000
unkown
page execute read
2EAF000
heap
page read and write
2EAF000
heap
page read and write
268E2000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
297F000
stack
page read and write
34210000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2C220000
trusted library allocation
page read and write
24132000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
2EAF000
heap
page read and write
28CB0000
trusted library allocation
page read and write
28E90000
trusted library allocation
page read and write
2EAF000
heap
page read and write
29920000
trusted library allocation
page read and write
28420000
heap
page read and write
2E86000
heap
page read and write
29C90000
trusted library allocation
page read and write
2C260000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
382B0000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
34740000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
7F960000
direct allocation
page read and write
381000
unkown
page execute read
2EAF000
heap
page read and write
28BBE000
trusted library allocation
page read and write
492000
unkown
page read and write
291DE000
stack
page read and write
2EAF000
heap
page read and write
2E87000
heap
page read and write
2EAF000
heap
page read and write
3410000
heap
page read and write
2EAF000
heap
page read and write
382A0000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2D0F000
stack
page read and write
2C220000
trusted library allocation
page read and write
7F0CF000
direct allocation
page read and write
2C47000
direct allocation
page execute and read and write
2EAF000
heap
page read and write
7ED40000
direct allocation
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
2BD5E000
stack
page read and write
4E3F000
stack
page read and write
2B560000
trusted library allocation
page read and write
347F000
stack
page read and write
28350000
trusted library allocation
page read and write
2EAF000
heap
page read and write
28BBB000
trusted library allocation
page read and write
28DE0000
trusted library allocation
page read and write
720000
heap
page read and write
370000
heap
page read and write
2C220000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E87000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2C470000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
208D9000
direct allocation
page read and write
27F2000
heap
page read and write
2EAF000
heap
page read and write
720000
unkown
page execute and read and write
28BD3000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2B4A1000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
1290000
remote allocation
page execute and read and write
2C570000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2108E000
stack
page read and write
2EAF000
heap
page read and write
3844E000
stack
page read and write
2E86000
heap
page read and write
2B710000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2E87000
heap
page read and write
2E9F000
heap
page read and write
4D6D000
stack
page read and write
36DC0000
trusted library allocation
page read and write
37480000
trusted library allocation
page read and write
4F0000
remote allocation
page execute and read and write
36DC0000
trusted library allocation
page read and write
2E9F000
heap
page read and write
ABC000
stack
page read and write
65E000
stack
page read and write
2B6E0000
trusted library allocation
page read and write
2C260000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
28DE0000
trusted library allocation
page read and write
34C0F000
trusted library allocation
page read and write
2E9F000
heap
page read and write
9F0000
heap
page read and write
29E7E000
stack
page read and write
2411D000
trusted library allocation
page execute and read and write
36DA0000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
2E83000
heap
page read and write
49B000
unkown
page readonly
28F00000
trusted library allocation
page read and write
327AD000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
2E9F000
heap
page read and write
3DA000
unkown
page readonly
36DC0000
trusted library allocation
page read and write
36DA0000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2E86000
heap
page read and write
28BA3000
trusted library allocation
page read and write
2EAF000
heap
page read and write
29C40000
trusted library allocation
page execute and read and write
2B7D7000
heap
page read and write
533B000
heap
page read and write
2B4A6000
trusted library allocation
page read and write
38020000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
2EAF000
heap
page read and write
9B000
stack
page read and write
286B000
heap
page read and write
343CE000
stack
page read and write
34B9A000
trusted library allocation
page read and write
70421000
unkown
page execute read
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
441000
unkown
page execute and read and write
2E7C000
heap
page read and write
2E86000
heap
page read and write
483000
unkown
page read and write
9E0000
remote allocation
page execute and read and write
7F290000
direct allocation
page read and write
7F320000
direct allocation
page read and write
2E9F000
heap
page read and write
2E86000
heap
page read and write
29920000
trusted library allocation
page read and write
34BEB000
trusted library allocation
page read and write
37470000
trusted library allocation
page read and write
2E9F000
heap
page read and write
386000
unkown
page readonly
7ED90000
direct allocation
page read and write
37FE0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
29920000
trusted library allocation
page read and write
2EAF000
heap
page read and write
34A38000
trusted library allocation
page read and write
533C000
heap
page read and write
2EAF000
heap
page read and write
27E0000
heap
page read and write
317F000
unkown
page read and write
7FC80000
direct allocation
page read and write
32825000
heap
page read and write
2EAF000
heap
page read and write
330000
heap
page read and write
2C220000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
2B640000
trusted library allocation
page read and write
374B0000
heap
page read and write
2E9F000
heap
page read and write
2C240000
trusted library allocation
page read and write
2E87000
heap
page read and write
4E8D000
heap
page read and write
2B5E0000
trusted library allocation
page read and write
261DD000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
24261000
heap
page read and write
37400000
trusted library allocation
page read and write
2EAF000
heap
page read and write
29B60000
trusted library allocation
page read and write
37FE0000
trusted library allocation
page read and write
268BC000
heap
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
4E50000
heap
page read and write
2DAA000
heap
page read and write
2BC0000
heap
page read and write
29920000
trusted library allocation
page read and write
2E86000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
A21000
direct allocation
page read and write
381E0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
29920000
trusted library allocation
page read and write
240C0000
trusted library section
page read and write
2B624000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2C530000
trusted library allocation
page read and write
28F00000
trusted library allocation
page read and write
4A0000
remote allocation
page execute and read and write
36DC0000
trusted library allocation
page read and write
2E86000
heap
page read and write
2E9F000
heap
page read and write
373D0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
7EA000
heap
page read and write
29920000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EB2000
heap
page read and write
2091A000
direct allocation
page read and write
2C8B000
direct allocation
page execute and read and write
2E9F000
heap
page read and write
2E87000
heap
page read and write
2BD1F000
stack
page read and write
54C0000
heap
page read and write
28F00000
trusted library allocation
page read and write
2E86000
heap
page read and write
20913000
direct allocation
page read and write
2B700000
trusted library allocation
page read and write
2B750000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
2E87000
heap
page read and write
23CA000
direct allocation
page read and write
2EAF000
heap
page read and write
26967000
heap
page read and write
7F21F000
direct allocation
page read and write
2E9F000
heap
page read and write
2B680000
trusted library allocation
page read and write
287D0000
trusted library allocation
page read and write
829000
heap
page read and write
2EAF000
heap
page read and write
2890F000
stack
page read and write
22D8000
direct allocation
page read and write
2B6D0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
384CE000
stack
page read and write
24265000
heap
page read and write
2C220000
trusted library allocation
page read and write
2BEE000
direct allocation
page read and write
2EAF000
heap
page read and write
2AE1000
direct allocation
page execute read
1F0000
heap
page read and write
2E87000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2691E000
heap
page read and write
28BDB000
trusted library allocation
page read and write
23D1000
direct allocation
page read and write
4F0000
remote allocation
page execute and read and write
34C1F000
trusted library allocation
page read and write
2EAF000
heap
page read and write
379AE000
stack
page read and write
3BE000
unkown
page read and write
2B760000
trusted library allocation
page read and write
28A7E000
trusted library allocation
page read and write
29960000
trusted library allocation
page read and write
240F0000
trusted library allocation
page read and write
31BE000
stack
page read and write
34BF3000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
373A0000
trusted library allocation
page read and write
29960000
trusted library allocation
page read and write
1290000
unkown
page execute and read and write
24120000
trusted library allocation
page read and write
B20000
unkown
page execute and read and write
2EAF000
heap
page read and write
29950000
trusted library allocation
page execute and read and write
9E0000
unkown
page execute and read and write
9B000
stack
page read and write
2EAF000
heap
page read and write
29B60000
trusted library allocation
page read and write
2EAF000
heap
page read and write
4E8B000
heap
page read and write
2B700000
trusted library allocation
page read and write
832000
heap
page read and write
9E0000
heap
page read and write
29C30000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
2E87000
heap
page read and write
29C20000
trusted library allocation
page read and write
2C8E000
direct allocation
page execute and read and write
2EAF000
heap
page read and write
34252000
trusted library allocation
page read and write
2EAF000
heap
page read and write
391000
unkown
page execute read
21A70000
direct allocation
page read and write
26850000
heap
page read and write
217F2000
heap
page read and write
2C260000
trusted library allocation
page read and write
36DA0000
trusted library allocation
page read and write
2C520000
trusted library allocation
page read and write
3485E000
stack
page read and write
37FE0000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
2C88E000
stack
page read and write
24280000
heap
page read and write
492000
unkown
page read and write
2EAF000
heap
page read and write
1F0000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2C27B000
trusted library allocation
page read and write
270FA000
trusted library allocation
page read and write
22AD000
direct allocation
page read and write
29920000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
5309000
heap
page read and write
2EAF000
heap
page read and write
29960000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
2EAF000
heap
page read and write
2AA0E000
stack
page read and write
3BE000
unkown
page write copy
2326000
direct allocation
page read and write
2EAF000
heap
page read and write
40D000
unkown
page write copy
283B0000
trusted library allocation
page read and write
29C90000
trusted library allocation
page read and write
2E87000
heap
page read and write
37FE0000
trusted library allocation
page read and write
3DA000
unkown
page readonly
29960000
trusted library allocation
page read and write
2E9F000
heap
page read and write
3BE000
unkown
page write copy
2693E000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
2E9F000
heap
page read and write
36DC0000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
2EAF000
heap
page read and write
346D6000
trusted library allocation
page read and write
2C260000
trusted library allocation
page read and write
2941F000
stack
page read and write
2EAF000
heap
page read and write
2BA9F000
stack
page read and write
2E87000
heap
page read and write
2BE9E000
stack
page read and write
2E9F000
heap
page read and write
2E86000
heap
page read and write
29920000
trusted library allocation
page read and write
3782F000
stack
page read and write
2EAF000
heap
page read and write
327AA000
heap
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2C530000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
441000
remote allocation
page execute and read and write
36DC0000
trusted library allocation
page read and write
207F0000
direct allocation
page read and write
2EAF000
heap
page read and write
2614E000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
2E87000
heap
page read and write
2CD0000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
2B540000
trusted library allocation
page read and write
9B0000
heap
page read and write
2B570000
trusted library allocation
page read and write
2B660000
trusted library allocation
page read and write
209FA000
stack
page read and write
382B0000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
34C17000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2C260000
trusted library allocation
page read and write
28A72000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2C580000
trusted library allocation
page read and write
29C30000
trusted library allocation
page read and write
2E86000
heap
page read and write
7FC90000
direct allocation
page read and write
2E87000
heap
page read and write
260D9000
trusted library allocation
page read and write
2C250000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
283CD000
trusted library allocation
page execute and read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
2EAF000
heap
page read and write
70420000
unkown
page readonly
2EAF000
heap
page read and write
4B50000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
28400000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2B6A0000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2FAA000
heap
page read and write
2C260000
remote allocation
page read and write
260F4000
trusted library allocation
page read and write
2BADE000
stack
page read and write
286BE000
stack
page read and write
28DE0000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
2413B000
trusted library allocation
page execute and read and write
2E87000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
82F000
heap
page read and write
2E9F000
heap
page read and write
37FE0000
trusted library allocation
page read and write
2C690000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
2EAF000
heap
page read and write
3878F000
stack
page read and write
2EAF000
heap
page read and write
56D7000
heap
page read and write
2E9F000
heap
page read and write
7ED66000
direct allocation
page read and write
2EAF000
heap
page read and write
2B790000
trusted library allocation
page read and write
26236000
trusted library allocation
page read and write
22B4000
direct allocation
page read and write
4BDE000
stack
page read and write
20DBF000
stack
page read and write
2EAF000
heap
page read and write
2E85000
heap
page read and write
2EAF000
heap
page read and write
28B8F000
trusted library allocation
page read and write
7F960000
direct allocation
page read and write
56A9000
heap
page read and write
2E9F000
heap
page read and write
29C20000
trusted library allocation
page read and write
289AB000
trusted library allocation
page read and write
2320000
heap
page read and write
2C220000
trusted library allocation
page read and write
2B5E0000
trusted library allocation
page read and write
33AF000
stack
page read and write
2C260000
trusted library allocation
page read and write
2E87000
heap
page read and write
36DA0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
29C10000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
4F0000
unkown
page execute and read and write
29960000
remote allocation
page read and write
2B610000
trusted library allocation
page read and write
3281F000
heap
page read and write
52B9000
stack
page read and write
5DC0000
trusted library allocation
page read and write
32AE000
stack
page read and write
2EAF000
heap
page read and write
374B0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
349CC000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2E86000
heap
page read and write
7EDA0000
direct allocation
page read and write
28D10000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
7EDE0000
direct allocation
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
38420000
trusted library allocation
page read and write
25FEF000
stack
page read and write
36DA0000
trusted library allocation
page read and write
3DE000
unkown
page readonly
29920000
trusted library allocation
page read and write
34273000
heap
page read and write
2C15000
direct allocation
page read and write
2EAF000
heap
page read and write
2913000
direct allocation
page read and write
2C260000
trusted library allocation
page read and write
349EA000
trusted library allocation
page read and write
37D2F000
stack
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
21860000
heap
page read and write
2E9F000
heap
page read and write
29930000
trusted library allocation
page read and write
28B44000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
2C510000
trusted library allocation
page read and write
2EAF000
heap
page read and write
5325000
heap
page read and write
380000
unkown
page readonly
37C2E000
stack
page read and write
2623E000
trusted library allocation
page read and write
373E0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
391000
unkown
page execute read
2AD8E000
stack
page read and write
28D20000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
32803000
heap
page read and write
2C220000
trusted library allocation
page read and write
3DE000
unkown
page readonly
5335000
heap
page read and write
2E86000
heap
page read and write
2E9F000
heap
page read and write
36DA0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
3DE000
unkown
page readonly
37567000
heap
page read and write
56DB000
heap
page read and write
29920000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
28BBF000
trusted library allocation
page read and write
2C550000
trusted library allocation
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2B5E0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
28C40000
heap
page read and write
36DC0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
2997B000
trusted library allocation
page read and write
2B49E000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
A13000
direct allocation
page read and write
36DC0000
trusted library allocation
page read and write
29B80000
trusted library allocation
page read and write
2621A000
trusted library allocation
page read and write
3BE000
unkown
page write copy
2EAF000
heap
page read and write
2EAF000
heap
page read and write
450000
remote allocation
page execute and read and write
2C84F000
stack
page read and write
2E9F000
heap
page read and write
36DA0000
trusted library allocation
page read and write
2E86000
heap
page read and write
343E0000
trusted library allocation
page read and write
26111000
trusted library allocation
page read and write
22BC000
direct allocation
page read and write
29A17000
trusted library allocation
page read and write
391000
unkown
page execute read
32826000
heap
page read and write
2330000
direct allocation
page execute and read and write
28E60000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
4E85000
heap
page read and write
29C90000
trusted library allocation
page read and write
2EAF000
heap
page read and write
35EE000
stack
page read and write
2C220000
trusted library allocation
page read and write
7F460000
direct allocation
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2B10000
direct allocation
page readonly
19C000
stack
page read and write
28BAB000
trusted library allocation
page read and write
28C60000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2B4AD000
trusted library allocation
page read and write
348C1000
trusted library allocation
page read and write
2E9F000
heap
page read and write
34246000
trusted library allocation
page execute and read and write
2C0E000
stack
page read and write
29C50000
trusted library allocation
page read and write
3DA000
unkown
page readonly
381E0000
trusted library allocation
page read and write
2E9F000
heap
page read and write
28F00000
trusted library allocation
page read and write
373D0000
trusted library allocation
page read and write
7F1D0000
direct allocation
page read and write
2C220000
trusted library allocation
page read and write
2B0E000
direct allocation
page read and write
2EAF000
heap
page read and write
23C3000
direct allocation
page read and write
381D0000
trusted library allocation
page execute and read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2E87000
heap
page read and write
2EAF000
heap
page read and write
261E2000
trusted library allocation
page read and write
27F0000
heap
page read and write
28A2A000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2690000
heap
page read and write
37420000
trusted library allocation
page read and write
29960000
trusted library allocation
page read and write
2E86000
heap
page read and write
2E9F000
heap
page read and write
29920000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
5325000
heap
page read and write
29960000
trusted library allocation
page read and write
2EAF000
heap
page read and write
3C2000
unkown
page read and write
2EAF000
heap
page read and write
34AD6000
trusted library allocation
page read and write
3425B000
trusted library allocation
page execute and read and write
3DA000
unkown
page readonly
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2E87000
heap
page read and write
36DC0000
trusted library allocation
page read and write
28F00000
trusted library allocation
page read and write
2EAF000
heap
page read and write
3786E000
stack
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
2EAF000
heap
page read and write
208CD000
direct allocation
page read and write
28C83000
heap
page read and write
2B5E0000
trusted library allocation
page read and write
197000
stack
page read and write
20A2E000
stack
page execute and read and write
4E6A000
heap
page read and write
37FE0000
trusted library allocation
page read and write
70421000
unkown
page execute read
2E9F000
heap
page read and write
2EAF000
heap
page read and write
20EFE000
stack
page read and write
2E86000
heap
page read and write
391000
unkown
page execute read
36DC0000
trusted library allocation
page read and write
22C3000
direct allocation
page read and write
36DC0000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
2630000
heap
page read and write
2C220000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
56DB000
heap
page read and write
2A13F000
stack
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2C460000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
207C7000
direct allocation
page read and write
26050000
heap
page read and write
2BFDE000
stack
page read and write
20E0E000
stack
page read and write
37390000
trusted library allocation
page read and write
34D50000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
23AD000
direct allocation
page read and write
2602E000
stack
page read and write
2C220000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2E87000
heap
page read and write
268BA000
heap
page read and write
2EAF000
heap
page read and write
28C40000
trusted library allocation
page read and write
2E9F000
heap
page read and write
34BDF000
trusted library allocation
page read and write
615000
heap
page read and write
2E9F000
heap
page read and write
34230000
trusted library allocation
page read and write
2EAF000
heap
page read and write
29920000
trusted library allocation
page read and write
29960000
trusted library allocation
page read and write
2EAF000
heap
page read and write
37490000
trusted library allocation
page read and write
2EAF000
heap
page read and write
25CA0000
trusted library allocation
page read and write
28A92000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
2E87000
heap
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
2118E000
stack
page read and write
26927000
heap
page read and write
2E9F000
heap
page read and write
346FD000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
28C5E000
heap
page read and write
5680000
heap
page read and write
2427C000
heap
page read and write
82F000
heap
page read and write
2720000
heap
page read and write
29960000
trusted library allocation
page read and write
4E8B000
heap
page read and write
34D60000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E87000
heap
page read and write
2EAF000
heap
page read and write
327D4000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
36DA0000
trusted library allocation
page read and write
6D0000
heap
page read and write
28DD1000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
2B720000
heap
page read and write
2C220000
trusted library allocation
page read and write
950000
remote allocation
page execute and read and write
28CDF000
heap
page read and write
3BE000
unkown
page read and write
29960000
trusted library allocation
page read and write
5320000
heap
page read and write
2EAF000
heap
page read and write
36DCA000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
494000
unkown
page read and write
2E9F000
heap
page read and write
AF0000
heap
page read and write
2320000
heap
page read and write
8FF000
stack
page read and write
28E90000
trusted library allocation
page read and write
28E19000
trusted library allocation
page read and write
7F060000
direct allocation
page read and write
7FB40000
direct allocation
page read and write
522F000
stack
page read and write
2E86000
heap
page read and write
29950000
trusted library allocation
page read and write
730000
direct allocation
page execute and read and write
29920000
trusted library allocation
page read and write
2E9F000
heap
page read and write
345D0000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
22F0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
36DA0000
trusted library allocation
page read and write
2898D000
trusted library allocation
page read and write
2E87000
heap
page read and write
29920000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2BAF000
stack
page read and write
2EAF000
heap
page read and write
29970000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2C279000
trusted library allocation
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
20DFE000
stack
page read and write
2EAF000
heap
page read and write
7043D000
unkown
page read and write
2BBDF000
stack
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
29920000
trusted library allocation
page read and write
28B9F000
trusted library allocation
page read and write
7EEC0000
direct allocation
page read and write
28BCB000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
29920000
trusted library allocation
page read and write
28800000
heap
page read and write
2C220000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
2624E000
trusted library allocation
page read and write
2E86000
heap
page read and write
34C13000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
29920000
trusted library allocation
page read and write
2B99E000
stack
page read and write
29930000
trusted library allocation
page execute and read and write
29A0000
heap
page read and write
21BA0000
trusted library allocation
page read and write
9B000
stack
page read and write
2B5E0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2997F000
trusted library allocation
page read and write
2B770000
trusted library allocation
page read and write
2C500000
trusted library allocation
page read and write
28C28000
heap
page read and write
26880000
heap
page read and write
20B1F000
stack
page read and write
2E9F000
heap
page read and write
7043D000
unkown
page read and write
2E9F000
heap
page read and write
2E9F000
heap
page read and write
93E000
stack
page read and write
35A58000
trusted library allocation
page read and write
26152000
trusted library allocation
page read and write
197000
stack
page read and write
37FE0000
trusted library allocation
page read and write
382D0000
trusted library allocation
page read and write
24F000
stack
page read and write
2C6A0000
trusted library allocation
page read and write
28363000
heap
page read and write
35A4C000
trusted library allocation
page read and write
2E9F000
heap
page read and write
3DE000
unkown
page readonly
29920000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
26222000
trusted library allocation
page read and write
2E85000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
28430000
trusted library allocation
page read and write
2E87000
heap
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
28E10000
trusted library allocation
page read and write
359EA000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
37E000
stack
page read and write
2E87000
heap
page read and write
2C550000
trusted library allocation
page read and write
2F00000
heap
page read and write
5325000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2E86000
heap
page read and write
2B48B000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2C450000
trusted library allocation
page execute and read and write
2E86000
heap
page read and write
2E87000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2E85000
heap
page read and write
3772E000
stack
page read and write
28E01000
heap
page read and write
2C220000
trusted library allocation
page read and write
2909E000
stack
page read and write
3300000
heap
page read and write
29940000
trusted library allocation
page read and write
382B0000
trusted library allocation
page read and write
2B7AB000
heap
page read and write
20A2F000
stack
page read and write
208D4000
direct allocation
page read and write
543E000
stack
page read and write
34BF7000
trusted library allocation
page read and write
2EB3000
heap
page read and write
34240000
trusted library allocation
page read and write
441000
unkown
page execute and read and write
2C230000
trusted library allocation
page execute and read and write
2B700000
trusted library allocation
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
2E86000
heap
page read and write
660000
heap
page read and write
2930000
heap
page read and write
34570000
heap
page read and write
551F000
stack
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
37391000
heap
page read and write
2919F000
stack
page read and write
2E86000
heap
page read and write
26902000
heap
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
37574000
heap
page read and write
2EAF000
heap
page read and write
2C220000
trusted library allocation
page read and write
2CD000
stack
page read and write
56D6000
heap
page read and write
2E87000
heap
page read and write
29C30000
trusted library allocation
page read and write
2625E000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
3DA000
unkown
page readonly
2EAF000
heap
page read and write
2863000
heap
page read and write
36DC0000
trusted library allocation
page read and write
2C510000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2E9F000
heap
page read and write
2C220000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
32770000
heap
page read and write
2C220000
trusted library allocation
page read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
21761000
heap
page read and write
32760000
trusted library section
page read and write
B20000
remote allocation
page execute and read and write
2EAF000
heap
page read and write
2C30000
heap
page read and write
283C3000
trusted library allocation
page read and write
2EAF000
heap
page read and write
382A0000
trusted library allocation
page read and write
3281C000
heap
page read and write
2EAF000
heap
page read and write
3DE000
unkown
page readonly
38410000
trusted library allocation
page read and write
382D0000
trusted library allocation
page read and write
2E87000
heap
page read and write
2B5F0000
trusted library allocation
page execute and read and write
28E60000
trusted library allocation
page read and write
2C260000
trusted library allocation
page read and write
29C90000
trusted library allocation
page read and write
37FFB000
trusted library allocation
page read and write
28DE0000
trusted library allocation
page read and write
3DA000
unkown
page readonly
26156000
trusted library allocation
page read and write
34A94000
trusted library allocation
page read and write
287B0000
heap
page read and write
2EAF000
heap
page read and write
3423D000
trusted library allocation
page execute and read and write
2EAF000
heap
page read and write
36DC0000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
36DC0000
trusted library allocation
page read and write
2E9F000
heap
page read and write
34220000
trusted library allocation
page read and write
34920000
trusted library allocation
page read and write
390000
unkown
page readonly
374F2000
heap
page read and write
8FD000
stack
page read and write
2EAF000
heap
page read and write
28A49000
trusted library allocation
page read and write
2C266000
trusted library allocation
page read and write
2EAF000
heap
page read and write
208F8000
direct allocation
page read and write
29960000
trusted library allocation
page read and write
28DB0000
trusted library allocation
page read and write
29C70000
trusted library allocation
page read and write
29960000
trusted library allocation
page read and write
2C280000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
287E0000
trusted library allocation
page read and write
29960000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2611A000
trusted library allocation
page read and write
2EAF000
heap
page read and write
5335000
heap
page read and write
29960000
trusted library allocation
page read and write
28BA0000
trusted library allocation
page read and write
2C220000
trusted library allocation
page read and write
2EAF000
heap
page read and write
2EAF000
heap
page read and write
36DB0000
trusted library allocation
page read and write
2E9F000
heap
page read and write
7FCDF000
direct allocation
page read and write
28DE0000
trusted library allocation
page read and write
32815000
heap
page read and write
2B5D0000
trusted library allocation
page read and write
2E70000
heap
page read and write
36DC0000
trusted library allocation
page read and write
3DA000
unkown
page readonly
3DE000
unkown
page readonly
2C90E000
stack
page read and write
70420000
unkown
page readonly
2E86000
heap
page read and write
2C520000
trusted library allocation
page read and write
2E86000
heap
page read and write
2E9F000
heap
page read and write
28B50000
trusted library allocation
page read and write
2E87000
heap
page read and write
2EAF000
heap
page read and write
5960000
direct allocation
page read and write
2EAF000
heap
page read and write
2E87000
heap
page read and write
9A0000
heap
page read and write
7F460000
direct allocation
page read and write
20B3F000
stack
page read and write
2EAF000
heap
page read and write
34C03000
trusted library allocation
page read and write
20D9F000
stack
page read and write
28A7A000
trusted library allocation
page read and write
2E86000
heap
page read and write
2E87000
heap
page read and write
2C260000
trusted library allocation
page read and write
29CCE000
stack
page read and write
There are 3273 hidden memdumps, click here to show them.