IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\amadka[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000006001\a16b294260.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000007001\29c55c1284.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\KECBKKEBKE.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AEBKFIJEGCAAFHJKFCFC
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\EBAFHCBF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EBAFHCBFHDHCAAKFHDGDBKFCGC
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\FCAKFCGC
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GDBFHDHJKKJDHJJJJKEG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GIDAECGDAFBAAAAAECGI
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JKJKJJDBKEGIECAAECFHCFBGIJ
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KKJJEBFCGDAKFIEBAAFBFCGCBF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 193
HTML document, ASCII text, with very long lines (687)
downloaded
Chrome Cache Entry: 194
ASCII text, with very long lines (1192)
downloaded
Chrome Cache Entry: 195
ASCII text, with very long lines (44533)
downloaded
Chrome Cache Entry: 196
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
downloaded
Chrome Cache Entry: 197
Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
downloaded
Chrome Cache Entry: 198
ASCII text, with very long lines (467)
downloaded
Chrome Cache Entry: 199
ASCII text, with very long lines (4478)
downloaded
Chrome Cache Entry: 200
ASCII text, with very long lines (777)
downloaded
Chrome Cache Entry: 201
ASCII text, with very long lines (1694)
downloaded
Chrome Cache Entry: 202
ASCII text, with very long lines (2362)
downloaded
Chrome Cache Entry: 203
ASCII text, with very long lines (574)
downloaded
Chrome Cache Entry: 204
ASCII text, with very long lines (693)
downloaded
Chrome Cache Entry: 205
ASCII text, with very long lines (777)
downloaded
Chrome Cache Entry: 206
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 207
ASCII text, with very long lines (405)
downloaded
There are 37 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\KECBKKEBKE.exe
"C:\Users\user\AppData\Local\Temp\KECBKKEBKE.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
"C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\1000006001\a16b294260.exe
"C:\Users\user\AppData\Local\Temp\1000006001\a16b294260.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000007001\29c55c1284.exe
"C:\Users\user\AppData\Local\Temp\1000007001\29c55c1284.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\KECBKKEBKE.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\FCGIJDBAFC.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=2032,i,3988199415877584059,13618322696169036975,262144 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5560 --field-trial-handle=2032,i,3988199415877584059,13618322696169036975,262144 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 --field-trial-handle=2032,i,3988199415877584059,13618322696169036975,262144 /prefetch:8
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://85.28.47.30/69934896f997d5bb/softokn3.dll
85.28.47.30
malicious
http://85.28.47.30/69934896f997d5bb/freebl3.dll
85.28.47.30
malicious
http://77.91.77.82/Hun4Ko/index.php
77.91.77.82
malicious
http://85.28.47.30/69934896f997d5bb/nss3.dll
85.28.47.30
malicious
http://77.91.77.82/
unknown
malicious
http://85.28.47.30/
unknown
malicious
http://85.28.47.30/69934896f997d5bb/msvcp140.dll
85.28.47.30
malicious
http://85.28.47.30/69934896f997d5bb/mozglue.dll
85.28.47.30
malicious
http://77.91.77.81/mine/amadka.exe
77.91.77.81
malicious
http://85.28.47.30/69934896f997d5bb/sqlite3.dll
85.28.47.30
malicious
http://85.28.47.30/69934896f997d5bb/vcruntime140.dll
85.28.47.30
malicious
http://85.28.47.30/920475a59bac849d.php
85.28.47.30
malicious
http://85.28.47.30
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://85.28.47.30/69934896f997d5bb/freebl3.dllG
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://play.google.com/work/enroll?identifier=
unknown
https://policies.google.com/terms/service-specific
unknown
https://g.co/recover
unknown
https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://policies.google.com/technologies/cookies
unknown
https://policies.google.com/terms
unknown
http://77.91.77.82/Hun4Ko/index.php4
unknown
https://www.google.com
unknown
http://77.91.77.82/Hun4Ko/index.php1
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://www.youtube.com/t/terms?chromeless=1&hl=
unknown
http://77.91.77.81/mine/amadka.exerQs
unknown
http://77.91.77.82/Hun4Ko/index.phpB
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://77.91.77.82/Hun4Ko/index.php5
unknown
https://cdn.epnacl
unknown
http://77.91.77.81/mine/amadka.exe00
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
http://85.28.47.30/920475a59bac849d.php_
unknown
https://mozilla.org0/
unknown
https://youtube.com/t/terms?gl=
unknown
http://85.28.47.30/920475a59bac849d.phpd
unknown
https://www.google.com/intl/
unknown
https://apis.google.com/js/api.js
unknown
http://85.28.47.30.c
unknown
http://77.91.77.81/cost/go.exeData
unknown
http://77.91.77.81/stealc/random.exe
unknown
http://85.28.47.30/69934896f997d5bb/nss3.dll-
unknown
http://77.91.77.81/mine/amadka.exea
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://www.youtube.com/account2=
unknown
http://85.28.47.30/1
unknown
https://www.ecosia.org/newtab/
unknown
http://77.91.77.81/well/random.exem-urlencoded
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.youtube.com/account
172.217.16.142
https://www.google.com/favicon.ico
142.250.186.164
https://cdn.ep
unknown
https://play.google.com/log?format=json&hasfast=true
unknown
http://85.28.47.30/-
unknown
https://policies.google.com/privacy
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://play.google/intl/
unknown
https://families.google.com/intl/
unknown
http://77.91.77.81/cost/go.exe
unknown
https://policies.google.com/technologies/location-data
unknown
http://77.91.77.81/well/random.exe
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://85.28.47.30/920475a59bac849d.php3
unknown
http://85.28.47.30/920475a59bac849d.phpF
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://77.91.77.82/Hun4Ko/index.php59B
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016.exe
unknown
http://85.28.47.30/920475a59bac849d.phpQ
unknown
https://support.google.com/accounts?p=new-si-ui
unknown
http://www.sqlite.org/copyright.html.
unknown
https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://policies.google.com/privacy/google-partners
unknown
http://77.91.77.81/cost/go.exe00
unknown
https://www.youtube.com/account$
unknown
http://upx.sf.net
unknown
https://policies.google.com/privacy/additional
unknown
https://play.google.com/log?format=json&hasfast=true&authuser=0
142.250.185.206
http://85.28.47.30/69934896f997d5bb/sqlite3.dlla
unknown
https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://policies.google.com/privacy/additional/embedded?gl=kr
unknown
https://policies.google.com/terms/location/embedded
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://pki-ocsp.symauth.com0
unknown
https://support.google.com/accounts?hl=
unknown
https://support.mozilla.org
unknown
http://77.91.77.81/mine/amadka.exe.phpefoxx
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.youtube.com/accountj=&
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
youtube-ui.l.google.com
172.217.16.142
www3.l.google.com
142.250.185.78
play.google.com
142.250.185.206
www.google.com
142.250.186.164
accounts.youtube.com
unknown
www.youtube.com
unknown

IPs

IP
Domain
Country
Malicious
85.28.47.30
unknown
Russian Federation
malicious
77.91.77.82
unknown
Russian Federation
malicious
192.168.2.4
unknown
unknown
malicious
77.91.77.81
unknown
Russian Federation
malicious
142.250.185.78
www3.l.google.com
United States
142.250.185.206
play.google.com
United States
142.250.186.174
unknown
United States
239.255.255.250
unknown
Reserved
142.250.186.164
www.google.com
United States
172.217.16.142
youtube-ui.l.google.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
7A1000
unkown
page execute and read and write
malicious
4F80000
direct allocation
page read and write
malicious
170E000
heap
page read and write
malicious
51F0000
direct allocation
page read and write
malicious
4F70000
direct allocation
page read and write
malicious
D21000
unkown
page execute and read and write
malicious
4F70000
direct allocation
page read and write
malicious
634000
heap
page read and write
malicious
421000
unkown
page execute and read and write
malicious
4F00000
direct allocation
page read and write
malicious
7A1000
unkown
page execute and read and write
malicious
7A1000
unkown
page execute and read and write
malicious
7A1000
unkown
page execute and read and write
malicious
7A1000
unkown
page execute and read and write
malicious
4CE0000
direct allocation
page read and write
malicious
BD1000
unkown
page execute and read and write
malicious
4AF1000
heap
page read and write
4AF1000
heap
page read and write
30DE000
stack
page read and write
5120000
direct allocation
page execute and read and write
1443000
heap
page read and write
46FF000
stack
page read and write
4861000
heap
page read and write
13D6000
heap
page read and write
439E000
stack
page read and write
6C73E000
unkown
page read and write
2E50000
direct allocation
page read and write
4861000
heap
page read and write
31DF000
stack
page read and write
1134000
heap
page read and write
3C67000
heap
page read and write
16C2000
heap
page read and write
C39000
unkown
page read and write
33E0000
direct allocation
page execute and read and write
1C39F000
stack
page read and write
22D74000
heap
page read and write
22D53000
heap
page read and write
5140000
direct allocation
page execute and read and write
DD0000
direct allocation
page read and write
3E3E000
stack
page read and write
4861000
heap
page read and write
DF0000
unkown
page execute and write copy
331F000
stack
page read and write
50CF000
stack
page read and write
4E80000
direct allocation
page execute and read and write
471F000
stack
page read and write
7F2E0000
direct allocation
page execute and read and write
51A0000
direct allocation
page execute and read and write
359F000
stack
page read and write
22D62000
heap
page read and write
1510000
direct allocation
page read and write
4AF1000
heap
page read and write
22D79000
heap
page read and write
449F000
stack
page read and write
3ABE000
stack
page read and write
4AE0000
heap
page read and write
153B000
heap
page read and write
50E0000
direct allocation
page execute and read and write
10CE000
stack
page read and write
4AF1000
heap
page read and write
51A0000
direct allocation
page execute and read and write
4AD0000
direct allocation
page read and write
11F4000
heap
page read and write
D44000
unkown
page execute and write copy
1510000
direct allocation
page read and write
13EE000
heap
page read and write
3513000
direct allocation
page execute and read and write
1418000
heap
page read and write
347E000
stack
page read and write
AB5000
unkown
page execute and read and write
4AF1000
heap
page read and write
78C000
unkown
page execute and read and write
1414000
heap
page read and write
3BDF000
stack
page read and write
5119000
stack
page read and write
4861000
heap
page read and write
61ECC000
direct allocation
page read and write
11F4000
heap
page read and write
1571000
heap
page read and write
1134000
heap
page read and write
38E3000
direct allocation
page execute and read and write
C9C000
stack
page read and write
3C4F000
heap
page read and write
F5C000
stack
page read and write
D20000
unkown
page readonly
809000
unkown
page write copy
2E50000
direct allocation
page read and write
4AE1000
heap
page read and write
2E0E000
stack
page read and write
40DF000
stack
page read and write
5090000
direct allocation
page execute and read and write
1509000
heap
page read and write
38F0000
direct allocation
page execute and read and write
3BFE000
stack
page read and write
2F7E000
stack
page read and write
2CEE000
stack
page read and write
47FF000
stack
page read and write
16B5000
heap
page read and write
396F000
stack
page read and write
38F4000
direct allocation
page execute and read and write
4112000
heap
page read and write
993000
unkown
page execute and read and write
3AAF000
stack
page read and write
36EF000
stack
page read and write
396E000
heap
page read and write
522E000
stack
page read and write
4861000
heap
page read and write
4AC0000
heap
page read and write
4CEE000
stack
page read and write
3CE2000
heap
page read and write
C32000
unkown
page execute and read and write
4AD0000
direct allocation
page read and write
1887000
heap
page read and write
1561000
heap
page read and write
3BD4000
heap
page read and write
22D71000
heap
page read and write
1638000
heap
page read and write
3FBE000
stack
page read and write
50E0000
direct allocation
page execute and read and write
5120000
direct allocation
page execute and read and write
7A0000
unkown
page readonly
1104000
heap
page read and write
50BF000
stack
page read and write
4AF1000
heap
page read and write
40BE000
stack
page read and write
4861000
heap
page read and write
22D5C000
heap
page read and write
A70000
unkown
page execute and read and write
5100000
direct allocation
page execute and read and write
395F000
stack
page read and write
14F5000
heap
page read and write
336F000
stack
page read and write
61ECD000
direct allocation
page readonly
1CA5C000
stack
page read and write
16D7000
heap
page read and write
123B000
heap
page read and write
2E0000
unkown
page readonly
4FE1000
direct allocation
page read and write
4AD0000
direct allocation
page read and write
4D71000
heap
page read and write
1510000
direct allocation
page read and write
3CE2000
heap
page read and write
7A1000
unkown
page execute and write copy
2DC0000
direct allocation
page read and write
4D6F000
stack
page read and write
C58000
unkown
page execute and write copy
1120000
heap
page read and write
15A8000
heap
page read and write
159A000
heap
page read and write
1437000
heap
page read and write
37C000
unkown
page readonly
1110000
heap
page read and write
3D56000
heap
page read and write
4861000
heap
page read and write
22D74000
heap
page read and write
541F000
stack
page read and write
5370000
direct allocation
page execute and read and write
7A6000
unkown
page execute and read and write
6C53D000
unkown
page readonly
3CF4000
heap
page read and write
1623000
heap
page read and write
40DF000
stack
page read and write
22D60000
heap
page read and write
141A000
heap
page read and write
7A0000
unkown
page read and write
4A81000
heap
page read and write
13DA000
heap
page read and write
4AD0000
direct allocation
page read and write
14FD000
heap
page read and write
1496000
heap
page read and write
3360000
heap
page read and write
13DA000
heap
page read and write
37DE000
stack
page read and write
1510000
direct allocation
page read and write
5100000
direct allocation
page execute and read and write
335E000
stack
page read and write
6E0000
heap
page read and write
307F000
stack
page read and write
5100000
direct allocation
page execute and read and write
3340000
direct allocation
page execute and read and write
52AE000
stack
page read and write
399E000
stack
page read and write
2B9F000
stack
page read and write
1683000
heap
page read and write
4AD0000
direct allocation
page read and write
1502000
heap
page read and write
321E000
stack
page read and write
1104000
heap
page read and write
4AE0000
direct allocation
page read and write
2E50000
direct allocation
page read and write
2E50000
direct allocation
page read and write
14A4000
heap
page read and write
AA7000
unkown
page execute and read and write
15F8000
stack
page read and write
22D6F000
heap
page read and write
6950000
heap
page read and write
371E000
stack
page read and write
2E1F000
stack
page read and write
13AE000
heap
page read and write
3CBB000
heap
page read and write
3C46000
heap
page read and write
4AF1000
heap
page read and write
13A0000
heap
page read and write
2DC0000
direct allocation
page read and write
49BE000
stack
page read and write
1362000
heap
page read and write
374E000
stack
page read and write
1125000
heap
page read and write
4861000
heap
page read and write
4AF1000
heap
page read and write
3B0000
unkown
page write copy
4E50000
direct allocation
page execute and read and write
AB6000
unkown
page execute and write copy
147E000
heap
page read and write
3D93000
heap
page read and write
22D7D000
heap
page read and write
F5C000
unkown
page execute and write copy
B80000
heap
page read and write
147B000
heap
page read and write
11F4000
heap
page read and write
4AF1000
heap
page read and write
2B9E000
stack
page read and write
3A9F000
stack
page read and write
5110000
direct allocation
page execute and read and write
22D60000
heap
page read and write
E5A000
stack
page read and write
158B000
heap
page read and write
13A4000
heap
page read and write
2F9E000
stack
page read and write
3370000
heap
page read and write
5100000
direct allocation
page execute and read and write
4BE0000
trusted library allocation
page read and write
1CCC0000
heap
page read and write
1715000
heap
page read and write
3B86000
heap
page read and write
49AF000
stack
page read and write
5090000
direct allocation
page execute and read and write
4861000
heap
page read and write
461E000
stack
page read and write
31B0000
heap
page read and write
22D62000
heap
page read and write
2E50000
direct allocation
page read and write
5370000
direct allocation
page execute and read and write
473E000
stack
page read and write
DD0000
direct allocation
page read and write
F45000
unkown
page execute and read and write
657000
unkown
page execute and write copy
676E000
stack
page read and write
13A4000
heap
page read and write
D17000
heap
page read and write
3CC5000
heap
page read and write
13FB000
heap
page read and write
1338000
heap
page read and write
4861000
heap
page read and write
3C81000
heap
page read and write
3B45000
heap
page read and write
51B0000
direct allocation
page execute and read and write
3B32000
heap
page read and write
1104000
heap
page read and write
22D7A000
heap
page read and write
4F00000
direct allocation
page read and write
13A0000
heap
page read and write
37FF000
stack
page read and write
3D3E000
stack
page read and write
172F000
stack
page read and write
3E9E000
stack
page read and write
1110000
heap
page read and write
3BF0000
heap
page read and write
499F000
stack
page read and write
307F000
stack
page read and write
13A1000
heap
page read and write
22D5D000
heap
page read and write
4960000
trusted library allocation
page read and write
3E6F000
stack
page read and write
61E00000
direct allocation
page execute and read and write
180000
heap
page read and write
DED000
stack
page read and write
3830000
heap
page read and write
4861000
heap
page read and write
3DFF000
stack
page read and write
11F4000
heap
page read and write
22D6F000
heap
page read and write
349E000
stack
page read and write
343E000
stack
page read and write
4AF1000
heap
page read and write
172E000
heap
page read and write
4F70000
direct allocation
page read and write
4861000
heap
page read and write
ADE000
stack
page read and write
4AD0000
direct allocation
page read and write
420000
unkown
page readonly
3DA7000
heap
page read and write
53A0000
direct allocation
page execute and read and write
3CBB000
heap
page read and write
1A0000
heap
page read and write
171F000
heap
page read and write
A3B000
stack
page read and write
22D78000
heap
page read and write
31DF000
stack
page read and write
22D6F000
heap
page read and write
1363000
heap
page read and write
3BA1000
heap
page read and write
30F0000
heap
page read and write
3B87000
heap
page read and write
290B4000
heap
page read and write
483E000
stack
page read and write
50B0000
direct allocation
page execute and read and write
40BF000
stack
page read and write
4861000
heap
page read and write
164D000
heap
page read and write
4861000
heap
page read and write
3C56000
heap
page read and write
22D78000
heap
page read and write
2DC0000
direct allocation
page read and write
49EE000
stack
page read and write
809000
unkown
page write copy
4F80000
direct allocation
page read and write
4AF1000
heap
page read and write
16D7000
heap
page read and write
447F000
stack
page read and write
45DF000
stack
page read and write
371E000
stack
page read and write
11F4000
heap
page read and write
22D5A000
heap
page read and write
1636000
heap
page read and write
4861000
heap
page read and write
1130000
heap
page read and write
1034000
heap
page read and write
4861000
heap
page read and write
C6A000
heap
page read and write
1471000
heap
page read and write
3CD8000
heap
page read and write
5100000
direct allocation
page execute and read and write
694E000
heap
page read and write
3703000
heap
page read and write
3D1F000
stack
page read and write
3BA1000
heap
page read and write
359F000
stack
page read and write
22D60000
heap
page read and write
1C81D000
stack
page read and write
4AF1000
heap
page read and write
53D0000
direct allocation
page execute and read and write
439E000
stack
page read and write
157C000
heap
page read and write
4861000
heap
page read and write
3BE8000
heap
page read and write
A9C000
unkown
page execute and read and write
5340000
direct allocation
page execute and read and write
CCA000
heap
page read and write
1575000
heap
page read and write
2E50000
direct allocation
page read and write
4AF1000
heap
page read and write
13F4000
heap
page read and write
436F000
stack
page read and write
4AE1000
heap
page read and write
3160000
heap
page read and write
1134000
heap
page read and write
16AB000
heap
page read and write
45DF000
stack
page read and write
335E000
stack
page read and write
4861000
heap
page read and write
462E000
stack
page read and write
310E000
stack
page read and write
483F000
stack
page read and write
3BDF000
stack
page read and write
1135000
unkown
page execute and read and write
3CBF000
stack
page read and write
3C56000
heap
page read and write
122F000
stack
page read and write
1CDDA000
heap
page read and write
3A2000
unkown
page readonly
AB5000
unkown
page execute and write copy
4AF1000
heap
page read and write
1409000
heap
page read and write
5170000
direct allocation
page execute and read and write
22D7D000
heap
page read and write
4AF1000
heap
page read and write
3D94000
heap
page read and write
4861000
heap
page read and write
3BDF000
stack
page read and write
433E000
stack
page read and write
31DF000
stack
page read and write
138C000
heap
page read and write
5060000
direct allocation
page execute and read and write
3D1C000
heap
page read and write
4861000
heap
page read and write
3A9F000
stack
page read and write
1443000
heap
page read and write
4AF1000
heap
page read and write
13A4000
heap
page read and write
4AF1000
heap
page read and write
22D60000
heap
page read and write
321E000
stack
page read and write
8897000
heap
page read and write
485F000
stack
page read and write
4861000
heap
page read and write
3CE2000
heap
page read and write
125E000
stack
page read and write
15EE000
heap
page read and write
38F0000
heap
page read and write
4AF1000
heap
page read and write
50F0000
direct allocation
page execute and read and write
4AF1000
heap
page read and write
22D53000
heap
page read and write
4861000
heap
page read and write
AB6000
unkown
page execute and write copy
1510000
direct allocation
page read and write
44DE000
stack
page read and write
4861000
heap
page read and write
378E000
stack
page read and write
53B0000
direct allocation
page execute and read and write
66D000
stack
page read and write
4AD0000
direct allocation
page read and write
1C94D000
stack
page read and write
1134000
heap
page read and write
3B10000
heap
page read and write
1310000
heap
page read and write
5380000
direct allocation
page execute and read and write
4F80000
direct allocation
page read and write
3150000
direct allocation
page read and write
353F000
stack
page read and write
5160000
direct allocation
page execute and read and write
385E000
stack
page read and write
22D71000
heap
page read and write
4AF1000
heap
page read and write
4AF1000
heap
page read and write
22D60000
heap
page read and write
3CA1000
heap
page read and write
4AF1000
heap
page read and write
5410000
direct allocation
page execute and read and write
5160000
direct allocation
page execute and read and write
1812000
heap
page read and write
175D000
heap
page read and write
3AC000
unkown
page write copy
2226000
heap
page read and write
35DE000
stack
page read and write
D21000
unkown
page execute and write copy
5160000
direct allocation
page execute and read and write
13E9000
heap
page read and write
2C17000
heap
page read and write
11CF000
stack
page read and write
399E000
stack
page read and write
4AF1000
heap
page read and write
4861000
heap
page read and write
4AF1000
heap
page read and write
3FDE000
stack
page read and write
1706000
heap
page read and write
36BF000
stack
page read and write
1104000
heap
page read and write
22E4B000
heap
page read and write
22D7D000
heap
page read and write
4AE0000
direct allocation
page read and write
4EE0000
direct allocation
page execute and read and write
3B78000
heap
page read and write
556E000
stack
page read and write
4880000
heap
page read and write
3BC8000
heap
page read and write
1548000
heap
page read and write
1180000
heap
page read and write
4E60000
direct allocation
page execute and read and write
C39000
unkown
page write copy
4AE0000
heap
page read and write
4861000
heap
page read and write
4AF1000
heap
page read and write
4AE0000
direct allocation
page read and write
3D92000
heap
page read and write
566D000
stack
page read and write
40DF000
stack
page read and write
11F4000
heap
page read and write
2E70000
heap
page read and write
345F000
stack
page read and write
3CE2000
heap
page read and write
993000
unkown
page execute and read and write
22D7D000
heap
page read and write
1510000
direct allocation
page read and write
420000
unkown
page readonly
AB5000
unkown
page execute and read and write
4861000
heap
page read and write
3AB0000
heap
page read and write
3F9F000
stack
page read and write
461E000
stack
page read and write
124F000
stack
page read and write
3520000
direct allocation
page execute and read and write
5370000
direct allocation
page execute and read and write
3FDE000
stack
page read and write
1C34F000
stack
page read and write
5370000
direct allocation
page execute and read and write
22D7A000
heap
page read and write
4AF1000
heap
page read and write
AB5000
unkown
page execute and write copy
42FF000
stack
page read and write
1418000
heap
page read and write
497F000
stack
page read and write
4AF1000
heap
page read and write
4AE1000
heap
page read and write
4E1F000
stack
page read and write
DD0000
direct allocation
page read and write
802000
unkown
page execute and read and write
22D60000
heap
page read and write
333E000
stack
page read and write
4AF1000
heap
page read and write
435F000
stack
page read and write
372E000
stack
page read and write
7A0000
unkown
page readonly
50D0000
direct allocation
page execute and read and write
4A7F000
stack
page read and write
3A9F000
stack
page read and write
190000
heap
page read and write
165D000
heap
page read and write
11F4000
heap
page read and write
809000
unkown
page write copy
345F000
stack
page read and write
1127000
heap
page read and write
347E000
stack
page read and write
13D7000
heap
page read and write
4AF1000
heap
page read and write
13A4000
heap
page read and write
669000
heap
page read and write
7D4000
unkown
page execute and read and write
162D000
heap
page read and write
DD0000
direct allocation
page read and write
3B11000
heap
page read and write
DD0000
direct allocation
page read and write
4F2C000
stack
page read and write
4AF1000
heap
page read and write
552F000
stack
page read and write
6A84000
heap
page read and write
11F4000
heap
page read and write
3524000
direct allocation
page execute and read and write
C56000
unkown
page execute and read and write
6F6F000
stack
page read and write
14B7000
heap
page read and write
143B000
heap
page read and write
520C000
stack
page read and write
5110000
direct allocation
page execute and read and write
993000
unkown
page execute and read and write
802000
unkown
page execute and read and write
5FC000
stack
page read and write
4AF1000
heap
page read and write
4AF1000
heap
page read and write
381F000
stack
page read and write
3CFE000
heap
page read and write
4861000
heap
page read and write
425E000
stack
page read and write
153E000
heap
page read and write
22D59000
heap
page read and write
4F70000
direct allocation
page read and write
1104000
heap
page read and write
4AF1000
heap
page read and write
1100000
heap
page read and write
22D7A000
heap
page read and write
331F000
stack
page read and write
B4B000
unkown
page execute and read and write
22D54000
heap
page read and write
309F000
stack
page read and write
4B80000
trusted library allocation
page read and write
4861000
heap
page read and write
2DC0000
direct allocation
page read and write
29020000
trusted library allocation
page read and write
22D60000
heap
page read and write
1695000
heap
page read and write
16EA000
heap
page read and write
4D41000
direct allocation
page read and write
40BF000
stack
page read and write
5100000
direct allocation
page execute and read and write
13CC000
heap
page read and write
4AF1000
heap
page read and write
4139000
heap
page read and write
137E000
stack
page read and write
1396000
heap
page read and write
5110000
direct allocation
page execute and read and write
3CFE000
heap
page read and write
5110000
direct allocation
page execute and read and write
DD0000
direct allocation
page read and write
1CCD1000
heap
page read and write
2E50000
direct allocation
page read and write
41FF000
stack
page read and write
61E01000
direct allocation
page execute read
5360000
direct allocation
page execute and read and write
3950000
heap
page read and write
2FD0C000
stack
page read and write
809000
unkown
page read and write
35EE000
stack
page read and write
FC0000
heap
page read and write
3A3F000
stack
page read and write
1C5DE000
stack
page read and write
886C000
stack
page read and write
4AF1000
heap
page read and write
4D71000
heap
page read and write
6C54E000
unkown
page read and write
5B60000
heap
page read and write
D18000
heap
page read and write
38FE000
direct allocation
page execute and read and write
4AD0000
direct allocation
page read and write
1BF4F000
stack
page read and write
3AEE000
stack
page read and write
407F000
stack
page read and write
EE5000
unkown
page execute and read and write
3CC8000
heap
page read and write
4C6E000
stack
page read and write
4866000
heap
page read and write
1510000
direct allocation
page read and write
4861000
heap
page read and write
1443000
heap
page read and write
809000
unkown
page read and write
4AF1000
heap
page read and write
2BEE000
stack
page read and write
A70000
unkown
page execute and read and write
22D75000
heap
page read and write
4861000
heap
page read and write
171F000
heap
page read and write
3AC000
unkown
page read and write
5110000
direct allocation
page execute and read and write
C56000
unkown
page execute and read and write
14BE000
stack
page read and write
4AF1000
heap
page read and write
38F4000
direct allocation
page execute and read and write
3D59000
heap
page read and write
686F000
stack
page read and write
DAE000
stack
page read and write
13C5000
heap
page read and write
6D0000
heap
page read and write
22D78000
heap
page read and write
3E5F000
stack
page read and write
4AF1000
heap
page read and write
4C2F000
stack
page read and write
22D60000
heap
page read and write
4AE1000
heap
page read and write
1500000
heap
page read and write
3C60000
heap
page read and write
22D6F000
heap
page read and write
1220000
heap
page read and write
65C000
unkown
page execute and write copy
189D000
heap
page read and write
4AF1000
heap
page read and write
4AF1000
heap
page read and write
1418000
heap
page read and write
7EC30000
direct allocation
page execute and read and write
10B6000
heap
page read and write
5100000
direct allocation
page execute and read and write
421000
unkown
page execute and write copy
3E9E000
stack
page read and write
421F000
stack
page read and write
14AD000
heap
page read and write
4E30000
direct allocation
page execute and read and write
159B000
heap
page read and write
1539000
heap
page read and write
1532000
heap
page read and write
13F8000
heap
page read and write
3350000
heap
page read and write
3CFE000
heap
page read and write
172E000
heap
page read and write
56EB000
stack
page read and write
4861000
heap
page read and write
12FD000
stack
page read and write
53C0000
direct allocation
page execute and read and write
5B20000
heap
page read and write
11F4000
heap
page read and write
3BF0000
heap
page read and write
1120000
heap
page read and write
1230000
heap
page read and write
1409000
heap
page read and write
4861000
heap
page read and write
11F4000
heap
page read and write
4861000
heap
page read and write
3490000
heap
page read and write
461E000
stack
page read and write
1104000
heap
page read and write
393E000
stack
page read and write
4AF1000
heap
page read and write
5080000
direct allocation
page execute and read and write
4E40000
direct allocation
page execute and read and write
22D60000
heap
page read and write
5190000
direct allocation
page execute and read and write
3A9E000
stack
page read and write
13D6000
heap
page read and write
144F000
heap
page read and write
4FBE000
stack
page read and write
149E000
heap
page read and write
3A7E000
stack
page read and write
1134000
heap
page read and write
2E50000
direct allocation
page read and write
2E50000
direct allocation
page read and write
16D0000
heap
page read and write
D1E000
stack
page read and write
3700000
heap
page read and write
143E000
heap
page read and write
487E000
stack
page read and write
3C50000
heap
page read and write
DB0000
heap
page read and write
22D5A000
heap
page read and write
357F000
stack
page read and write
4861000
heap
page read and write
D20000
unkown
page readonly
EA0000
unkown
page execute and read and write
1134000
heap
page read and write
80B000
unkown
page execute and read and write
61ED4000
direct allocation
page readonly
4AF1000
heap
page read and write
3A7F000
stack
page read and write
B1E000
stack
page read and write
22D69000
heap
page read and write
3ADE000
stack
page read and write
C58000
unkown
page execute and write copy
7A0000
unkown
page readonly
139F000
stack
page read and write
3C56000
heap
page read and write
4AF1000
heap
page read and write
22D78000
heap
page read and write
22D74000
heap
page read and write
411E000
stack
page read and write
352E000
direct allocation
page execute and read and write
165D000
heap
page read and write
22D6F000
heap
page read and write
22D75000
heap
page read and write
DC3000
unkown
page execute and read and write
2DD7000
heap
page read and write
13EC000
heap
page read and write
5170000
direct allocation
page execute and read and write
809000
unkown
page write copy
3524000
direct allocation
page execute and read and write
4AF1000
heap
page read and write
3D94000
heap
page read and write
2DC0000
direct allocation
page read and write
15F3000
stack
page read and write
4861000
heap
page read and write
28E1E000
stack
page read and write
3CFF000
stack
page read and write
143D000
heap
page read and write
809000
unkown
page write copy
4861000
heap
page read and write
1497000
heap
page read and write
11F4000
heap
page read and write
4E40000
direct allocation
page execute and read and write
4A81000
heap
page read and write
3CE2000
heap
page read and write
471F000
stack
page read and write
1280000
heap
page read and write
4AEF000
stack
page read and write
3170000
heap
page read and write
AB5000
unkown
page execute and read and write
142C000
heap
page read and write
40F0000
heap
page read and write
A9C000
unkown
page execute and read and write
38FE000
direct allocation
page execute and read and write
3CC5000
heap
page read and write
ECC000
unkown
page execute and read and write
5110000
direct allocation
page execute and read and write
11F4000
heap
page read and write
1034000
heap
page read and write
4861000
heap
page read and write
674000
heap
page read and write
3150000
direct allocation
page read and write
139D000
heap
page read and write
1104000
heap
page read and write
2F9E000
stack
page read and write
CA3000
heap
page read and write
B90000
heap
page read and write
3014C000
stack
page read and write
3D80000
heap
page read and write
802000
unkown
page execute and read and write
3A2000
unkown
page readonly
2DC0000
direct allocation
page read and write
3F7E000
stack
page read and write
314E000
stack
page read and write
4AF1000
heap
page read and write
13A4000
heap
page read and write
4861000
heap
page read and write
111E000
stack
page read and write
435F000
stack
page read and write
13A4000
heap
page read and write
809000
unkown
page read and write
352E000
direct allocation
page execute and read and write
4AF1000
heap
page read and write
290C6000
heap
page read and write
4ABF000
stack
page read and write
5214000
heap
page read and write
139D000
heap
page read and write
18AA000
heap
page read and write
11F4000
heap
page read and write
4861000
heap
page read and write
290BC000
heap
page read and write
5130000
direct allocation
page execute and read and write
49DE000
stack
page read and write
4D1B000
stack
page read and write
5090000
direct allocation
page execute and read and write
4AE1000
heap
page read and write
6CFB000
stack
page read and write
388E000
stack
page read and write
4AF1000
heap
page read and write
11F4000
heap
page read and write
809000
unkown
page read and write
1510000
direct allocation
page read and write
46FE000
stack
page read and write
16A1000
heap
page read and write
4AE0000
direct allocation
page read and write
5130000
direct allocation
page execute and read and write
3C4F000
heap
page read and write
D9D000
stack
page read and write
14D2000
heap
page read and write
3D23000
heap
page read and write
3D1F000
stack
page read and write
DF0000
direct allocation
page read and write
1C59E000
stack
page read and write
1683000
heap
page read and write
1572000
heap
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
4AF1000
heap
page read and write
16D7000
heap
page read and write
ED7000
unkown
page execute and read and write
16F0000
unkown
page execute and write copy
C56000
unkown
page execute and read and write
359F000
stack
page read and write
4AE0000
direct allocation
page read and write
3C56000
heap
page read and write
63DE000
stack
page read and write
22D65000
heap
page read and write
809000
unkown
page read and write
22D78000
heap
page read and write
1443000
heap
page read and write
3100000
direct allocation
page execute and read and write
7A1000
unkown
page execute and write copy
383E000
stack
page read and write
4861000
heap
page read and write
6C745000
unkown
page readonly
BD0000
unkown
page readonly
435E000
stack
page read and write
3C1E000
stack
page read and write
40EF000
stack
page read and write
39AE000
stack
page read and write
4F70000
direct allocation
page read and write
1778000
heap
page read and write
3D1F000
stack
page read and write
331F000
stack
page read and write
3B13000
heap
page read and write
4AF1000
heap
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
3BA4000
heap
page read and write
3B7C000
heap
page read and write
1385000
heap
page read and write
1700000
heap
page read and write
22D59000
heap
page read and write
13A4000
heap
page read and write
1104000
heap
page read and write
3EAE000
stack
page read and write
1355000
heap
page read and write
10AB000
stack
page read and write
1443000
heap
page read and write
3CE5000
heap
page read and write
11F4000
heap
page read and write
43AE000
stack
page read and write
C9D000
heap
page read and write
1BFE000
stack
page read and write
16D1000
heap
page read and write
5100000
direct allocation
page execute and read and write
4AF1000
heap
page read and write
CE7000
heap
page read and write
41FE000
stack
page read and write
4861000
heap
page read and write
5110000
direct allocation
page execute and read and write
4AD0000
direct allocation
page read and write
61ED0000
direct allocation
page read and write
2D1E000
stack
page read and write
1310000
heap
page read and write
1134000
heap
page read and write
31BE000
stack
page read and write
330E000
stack
page read and write
2DAE000
stack
page read and write
2DC0000
direct allocation
page read and write
367F000
stack
page read and write
4A80000
heap
page read and write
143B000
heap
page read and write
3524000
direct allocation
page execute and read and write
61E000
heap
page read and write
22D7D000
heap
page read and write
3C78000
heap
page read and write
1090000
heap
page read and write
11F4000
heap
page read and write
4861000
heap
page read and write
F5C000
unkown
page execute and read and write
11E0000
direct allocation
page execute and read and write
171F000
heap
page read and write
1414000
heap
page read and write
4AF1000
heap
page read and write
662E000
stack
page read and write
380E000
stack
page read and write
4AE1000
heap
page read and write
2F5F000
stack
page read and write
1104000
heap
page read and write
502B000
stack
page read and write
3D5C000
heap
page read and write
3F3F000
stack
page read and write
143A000
heap
page read and write
68A0000
heap
page read and write
DC7000
heap
page read and write
6C552000
unkown
page readonly
110E000
stack
page read and write
45EF000
stack
page read and write
4A81000
heap
page read and write
2E1000
unkown
page execute read
11DE000
stack
page read and write
2F3F000
stack
page read and write
22D47000
heap
page read and write
381E000
stack
page read and write
22D62000
heap
page read and write
4ADF000
stack
page read and write
3B97000
heap
page read and write
1728000
heap
page read and write
44DE000
stack
page read and write
1418000
heap
page read and write
397E000
stack
page read and write
3B11000
heap
page read and write
485F000
stack
page read and write
DB1000
unkown
page execute and read and write
11F4000
heap
page read and write
1472000
heap
page read and write
A9C000
unkown
page execute and read and write
172B000
heap
page read and write
30DF000
stack
page read and write
144F000
heap
page read and write
3ADE000
stack
page read and write
3BCB000
heap
page read and write
3BBF000
stack
page read and write
22D7D000
heap
page read and write
51A0000
direct allocation
page execute and read and write
1034000
heap
page read and write
1405000
heap
page read and write
4861000
heap
page read and write
2BF0000
heap
page read and write
679000
heap
page read and write
4861000
heap
page read and write
1708000
heap
page read and write
22D7A000
heap
page read and write
13A4000
heap
page read and write
610000
heap
page read and write
4AF1000
heap
page read and write
4861000
heap
page read and write
371E000
stack
page read and write
4F70000
direct allocation
page read and write
2E50000
direct allocation
page read and write
3BD4000
heap
page read and write
3F9E000
stack
page read and write
4861000
heap
page read and write
4FD1000
direct allocation
page read and write
1492000
heap
page read and write
3954000
heap
page read and write
6BBD000
stack
page read and write
3BF0000
heap
page read and write
4AF1000
heap
page read and write
290C2000
heap
page read and write
5370000
direct allocation
page execute and read and write
290CE000
heap
page read and write
526E000
stack
page read and write
30CF000
stack
page read and write
13A4000
heap
page read and write
11F0000
heap
page read and write
4AE0000
direct allocation
page read and write
4AD0000
direct allocation
page read and write
384D000
stack
page read and write
6950000
heap
page read and write
5190000
direct allocation
page execute and read and write
13FB000
heap
page read and write
4AF1000
heap
page read and write
15A0000
heap
page read and write
423E000
stack
page read and write
AB6000
unkown
page execute and write copy
4861000
heap
page read and write
4861000
heap
page read and write
317F000
stack
page read and write
143B000
heap
page read and write
5AED000
stack
page read and write
36BE000
stack
page read and write
3BFA000
heap
page read and write
11F4000
heap
page read and write
36DF000
stack
page read and write
56AF000
stack
page read and write
143B000
heap
page read and write
118B000
heap
page read and write
7A0000
unkown
page read and write
993000
unkown
page execute and read and write
1720000
heap
page read and write
44EE000
stack
page read and write
876C000
stack
page read and write
1872000
heap
page read and write
143B000
heap
page read and write
3CBB000
heap
page read and write
22D60000
heap
page read and write
144F000
stack
page read and write
C58000
unkown
page execute and write copy
3B44000
heap
page read and write
4121000
heap
page read and write
22D5D000
heap
page read and write
D29000
heap
page read and write
1C54F000
stack
page read and write
66D000
heap
page read and write
4861000
heap
page read and write
35BE000
stack
page read and write
50E0000
direct allocation
page execute and read and write
475E000
stack
page read and write
40FD000
stack
page read and write
22D7D000
heap
page read and write
1495000
heap
page read and write
4AF1000
heap
page read and write
CEC000
stack
page read and write
C56000
unkown
page execute and read and write
13F8000
heap
page read and write
1034000
heap
page read and write
22D64000
heap
page read and write
4AF1000
heap
page read and write
5110000
direct allocation
page execute and read and write
A70000
unkown
page execute and read and write
5370000
direct allocation
page execute and read and write
5F7000
stack
page read and write
22D78000
heap
page read and write
4861000
heap
page read and write
10FE000
stack
page read and write
1510000
direct allocation
page read and write
F57000
unkown
page execute and read and write
3B7F000
stack
page read and write
433F000
stack
page read and write
1088000
unkown
page execute and write copy
11F4000
heap
page read and write
6C560000
unkown
page readonly
7A0000
unkown
page read and write
142D000
heap
page read and write
3D2D000
heap
page read and write
CF9000
heap
page read and write
3B40000
heap
page read and write
37C000
unkown
page readonly
4AF1000
heap
page read and write
382F000
stack
page read and write
11F4000
heap
page read and write
140C000
heap
page read and write
11F4000
heap
page read and write
4AF0000
heap
page read and write
411E000
stack
page read and write
109A000
heap
page read and write
3167000
heap
page read and write
3B44000
heap
page read and write
13EC000
heap
page read and write
74E000
stack
page read and write
385E000
stack
page read and write
395F000
stack
page read and write
4861000
heap
page read and write
2DC0000
direct allocation
page read and write
346F000
stack
page read and write
CEC000
stack
page read and write
3D2F000
stack
page read and write
3FEE000
stack
page read and write
1134000
heap
page read and write
2EDF000
stack
page read and write
16D0000
heap
page read and write
15F7000
heap
page read and write
171F000
heap
page read and write
16A8000
heap
page read and write
143E000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
2E3B000
stack
page read and write
7A1000
unkown
page execute and write copy
5070000
direct allocation
page execute and read and write
1AFE000
stack
page read and write
1034000
heap
page read and write
14A3000
heap
page read and write
430F000
stack
page read and write
476E000
stack
page read and write
16DA000
heap
page read and write
22D7A000
heap
page read and write
11F4000
heap
page read and write
2DFF000
stack
page read and write
1444000
heap
page read and write
38FF000
stack
page read and write
22D53000
heap
page read and write
4861000
heap
page read and write
14FC000
stack
page read and write
11F4000
heap
page read and write
16A8000
heap
page read and write
447E000
stack
page read and write
657000
unkown
page execute and read and write
4B01000
heap
page read and write
45DF000
stack
page read and write
1034000
heap
page read and write
4AF1000
heap
page read and write
38F4000
direct allocation
page execute and read and write
129E000
stack
page read and write
22D5D000
heap
page read and write
6C4C0000
unkown
page readonly
136A000
heap
page read and write
4AF1000
heap
page read and write
3EBF000
stack
page read and write
2E5C000
stack
page read and write
22D71000
heap
page read and write
3CDB000
heap
page read and write
13A4000
heap
page read and write
835000
unkown
page execute and read and write
1034000
heap
page read and write
5090000
direct allocation
page execute and read and write
4FCE000
stack
page read and write
14FD000
heap
page read and write
13FD000
heap
page read and write
33FF000
stack
page read and write
2C10000
heap
page read and write
16E0000
direct allocation
page execute and read and write
485F000
stack
page read and write
3BEF000
stack
page read and write
11F4000
heap
page read and write
6C740000
unkown
page read and write
DD0000
direct allocation
page read and write
3D5E000
stack
page read and write
53E0000
direct allocation
page execute and read and write
2E50000
direct allocation
page read and write
16F0000
unkown
page execute and read and write
4AF1000
heap
page read and write
162B000
heap
page read and write
13F1000
heap
page read and write
15EB000
heap
page read and write
3CA2000
heap
page read and write
11F4000
heap
page read and write
15C6000
heap
page read and write
4A81000
heap
page read and write
4861000
heap
page read and write
22D74000
heap
page read and write
4AE0000
direct allocation
page read and write
142F000
stack
page read and write
4AF1000
heap
page read and write
11F4000
heap
page read and write
38F4000
direct allocation
page execute and read and write
22D74000
heap
page read and write
172E000
heap
page read and write
DF0000
direct allocation
page read and write
22D46000
heap
page read and write
1104000
heap
page read and write
14FC000
heap
page read and write
1CCD1000
heap
page read and write
475E000
stack
page read and write
475E000
stack
page read and write
13DE000
heap
page read and write
13A4000
heap
page read and write
123B000
stack
page read and write
5350000
direct allocation
page execute and read and write
5090000
direct allocation
page execute and read and write
345F000
stack
page read and write
486F000
stack
page read and write
30BE000
stack
page read and write
5140000
direct allocation
page execute and read and write
3B44000
heap
page read and write
11F4000
heap
page read and write
4AF1000
heap
page read and write
35DE000
stack
page read and write
C58000
unkown
page execute and write copy
5090000
direct allocation
page execute and read and write
4AE0000
direct allocation
page read and write
2E4E000
stack
page read and write
4AF1000
heap
page read and write
4861000
heap
page read and write
1C14F000
stack
page read and write
13A4000
heap
page read and write
421E000
stack
page read and write
4AD0000
direct allocation
page read and write
2CF7000
heap
page read and write
13EC000
heap
page read and write
357E000
stack
page read and write
4AF1000
heap
page read and write
D80000
unkown
page execute and read and write
22D7D000
heap
page read and write
16F4000
heap
page read and write
1418000
heap
page read and write
1104000
heap
page read and write
3C02000
heap
page read and write
349E000
stack
page read and write
13D4000
heap
page read and write
36FE000
stack
page read and write
1362000
heap
page read and write
48AE000
stack
page read and write
22D7D000
heap
page read and write
203E000
stack
page read and write
1446000
heap
page read and write
37FE000
stack
page read and write
22D5D000
heap
page read and write
A9C000
unkown
page execute and read and write
FF0000
heap
page read and write
50F0000
direct allocation
page execute and read and write
2F7F000
stack
page read and write
1360000
heap
page read and write
343F000
stack
page read and write
3D2E000
heap
page read and write
143E000
heap
page read and write
4AF1000
heap
page read and write
802000
unkown
page execute and read and write
493F000
stack
page read and write
381F000
stack
page read and write
1510000
direct allocation
page read and write
C6E000
heap
page read and write
46BF000
stack
page read and write
4D70000
heap
page read and write
1493000
heap
page read and write
3E3F000
stack
page read and write
38F4000
direct allocation
page execute and read and write
1621000
heap
page read and write
4AF1000
heap
page read and write
4AF1000
heap
page read and write
437E000
stack
page read and write
121B000
stack
page read and write
108C000
unkown
page execute and read and write
3D87000
heap
page read and write
2DC0000
direct allocation
page read and write
2BDB000
stack
page read and write
3ADE000
stack
page read and write
3BA7000
heap
page read and write
D18000
heap
page read and write
4AF1000
heap
page read and write
1125000
heap
page read and write
15F8000
heap
page read and write
321E000
stack
page read and write
2C9E000
stack
page read and write
153B000
heap
page read and write
4AF1000
heap
page read and write
1570000
heap
page read and write
143E000
heap
page read and write
3B9F000
heap
page read and write
3B13000
heap
page read and write
4E70000
trusted library allocation
page read and write
4861000
heap
page read and write
80B000
unkown
page execute and read and write
3920000
heap
page read and write
4F00000
direct allocation
page read and write
2FF0C000
stack
page read and write
369E000
stack
page read and write
13FB000
heap
page read and write
45BF000
stack
page read and write
2220000
heap
page read and write
1104000
heap
page read and write
32FE000
stack
page read and write
1440000
heap
page read and write
1C19F000
stack
page read and write
22D6F000
heap
page read and write
4861000
heap
page read and write
1120000
heap
page read and write
22D46000
heap
page read and write
5150000
direct allocation
page execute and read and write
22D6F000
heap
page read and write
2D6E000
stack
page read and write
50E0000
direct allocation
page execute and read and write
2E50000
direct allocation
page read and write
140B000
heap
page read and write
4CA0000
heap
page read and write
16D7000
heap
page read and write
11F4000
heap
page read and write
1450000
heap
page read and write
31FE000
stack
page read and write
4EC0000
direct allocation
page execute and read and write
1586000
heap
page read and write
A70000
unkown
page execute and read and write
4AF1000
heap
page read and write
1300000
heap
page read and write
4AF1000
heap
page read and write
4AF1000
heap
page read and write
56C000
stack
page read and write
14D1000
heap
page read and write
4AF1000
heap
page read and write
172E000
heap
page read and write
2E5E000
stack
page read and write
BD0000
unkown
page read and write
472F000
stack
page read and write
12FF000
stack
page read and write
4AE1000
heap
page read and write
672000
heap
page read and write
38F4000
direct allocation
page execute and read and write
15E4000
heap
page read and write
5130000
direct allocation
page execute and read and write
16A8000
heap
page read and write
6CBE000
stack
page read and write
3AB1000
heap
page read and write
532F000
stack
page read and write
4AF1000
heap
page read and write
53EE000
stack
page read and write
13A0000
heap
page read and write
80B000
unkown
page execute and read and write
4AF1000
heap
page read and write
6940000
heap
page read and write
1570000
heap
page read and write
3D47000
heap
page read and write
1546000
heap
page read and write
37BE000
stack
page read and write
31C0000
direct allocation
page execute and read and write
5400000
direct allocation
page execute and read and write
13A4000
heap
page read and write
6C6FF000
unkown
page readonly
1086000
unkown
page execute and read and write
672F000
stack
page read and write
16D0000
heap
page read and write
15EF000
heap
page read and write
22D78000
heap
page read and write
144B000
unkown
page execute and read and write
2CDF000
stack
page read and write
3CC9000
heap
page read and write
5120000
direct allocation
page execute and read and write
16B4000
heap
page read and write
1409000
heap
page read and write
53F0000
direct allocation
page execute and read and write
50A0000
direct allocation
page execute and read and write
2D2C000
stack
page read and write
3C1E000
stack
page read and write
4AF1000
heap
page read and write
3D6E000
stack
page read and write
1414000
heap
page read and write
4AF1000
heap
page read and write
4AF1000
heap
page read and write
3E9E000
stack
page read and write
11F4000
heap
page read and write
4AE0000
direct allocation
page read and write
4F4E000
stack
page read and write
4AF1000
heap
page read and write
56AD000
stack
page read and write
4AF1000
heap
page read and write
172A000
heap
page read and write
1443000
heap
page read and write
586D000
stack
page read and write
80B000
unkown
page execute and read and write
13C5000
heap
page read and write
11F4000
heap
page read and write
147B000
heap
page read and write
4861000
heap
page read and write
7A0000
unkown
page read and write
1642000
heap
page read and write
DD0000
direct allocation
page read and write
DE0000
heap
page read and write
4AF1000
heap
page read and write
8870000
heap
page read and write
139F000
heap
page read and write
14D1000
heap
page read and write
4AF1000
heap
page read and write
2E1F000
stack
page read and write
1134000
heap
page read and write
1285000
heap
page read and write
4AD0000
direct allocation
page read and write
22D47000
heap
page read and write
4F70000
direct allocation
page read and write
1549000
heap
page read and write
50D0000
direct allocation
page execute and read and write
1679000
heap
page read and write
35AF000
stack
page read and write
3BA7000
heap
page read and write
3BD5000
heap
page read and write
3D59000
heap
page read and write
3FAF000
stack
page read and write
45FE000
stack
page read and write
5100000
direct allocation
page execute and read and write
45BE000
stack
page read and write
1CA1D000
stack
page read and write
497E000
stack
page read and write
35DE000
stack
page read and write
5251000
direct allocation
page read and write
169D000
heap
page read and write
43C000
unkown
page execute and write copy
3150000
direct allocation
page read and write
4E6E000
stack
page read and write
4AF1000
heap
page read and write
2DC0000
direct allocation
page read and write
4F00000
direct allocation
page read and write
15E3000
heap
page read and write
3CD8000
heap
page read and write
4AF1000
heap
page read and write
4FBE000
stack
page read and write
44BE000
stack
page read and write
1134000
heap
page read and write
13CD000
heap
page read and write
3B66000
heap
page read and write
22D6F000
heap
page read and write
1C7DF000
stack
page read and write
DD0000
direct allocation
page read and write
5180000
direct allocation
page execute and read and write
147B000
heap
page read and write
4AF1000
heap
page read and write
2E50000
direct allocation
page read and write
16C7000
heap
page read and write
14FE000
heap
page read and write
63E0000
heap
page read and write
4AF1000
heap
page read and write
7A1000
unkown
page execute and write copy
2FF4B000
stack
page read and write
1824000
heap
page read and write
4860000
heap
page read and write
1510000
direct allocation
page read and write
6E6E000
stack
page read and write
F57000
unkown
page execute and write copy
36DF000
stack
page read and write
4ED0000
direct allocation
page execute and read and write
457F000
stack
page read and write
4E40000
direct allocation
page execute and read and write
B3A000
stack
page read and write
4AF1000
heap
page read and write
37CE000
stack
page read and write
34E0000
direct allocation
page execute and read and write
1034000
heap
page read and write
542E000
stack
page read and write
117E000
stack
page read and write
1EE000
stack
page read and write
4AF1000
heap
page read and write
3524000
direct allocation
page execute and read and write
1430000
heap
page read and write
12B000
stack
page read and write
4AF1000
heap
page read and write
4AD0000
direct allocation
page read and write
38C0000
heap
page read and write
117E000
stack
page read and write
1817000
heap
page read and write
381F000
stack
page read and write
412E000
stack
page read and write
1566000
heap
page read and write
30DE000
stack
page read and write
121F000
stack
page read and write
6A80000
heap
page read and write
4861000
heap
page read and write
7A0000
unkown
page readonly
61ED3000
direct allocation
page read and write
50C0000
direct allocation
page execute and read and write
2DC0000
direct allocation
page read and write
3524000
direct allocation
page execute and read and write
31BF000
stack
page read and write
36DF000
stack
page read and write
3514000
direct allocation
page execute and read and write
3B4000
unkown
page readonly
4861000
heap
page read and write
61EB4000
direct allocation
page read and write
1510000
direct allocation
page read and write
2DC0000
direct allocation
page read and write
1134000
heap
page read and write
6C561000
unkown
page execute read
D2E000
heap
page read and write
11F4000
heap
page read and write
182F000
stack
page read and write
EE5000
unkown
page execute and write copy
AB5000
unkown
page execute and write copy
3B78000
heap
page read and write
504F000
stack
page read and write
2DD0000
heap
page read and write
4861000
heap
page read and write
22D5B000
heap
page read and write
8871000
heap
page read and write
DCC000
heap
page read and write
6941000
heap
page read and write
309F000
stack
page read and write
22D46000
heap
page read and write
693000
heap
page read and write
4138000
heap
page read and write
1510000
direct allocation
page read and write
3C43000
heap
page read and write
3D36000
heap
page read and write
65EF000
stack
page read and write
4AE0000
direct allocation
page read and write
AB5000
unkown
page execute and write copy
4AF1000
heap
page read and write
3FDE000
stack
page read and write
444000
unkown
page execute and write copy
10D4000
unkown
page execute and read and write
3D59000
heap
page read and write
3F7F000
stack
page read and write
1CCD0000
heap
page read and write
1414000
heap
page read and write
4F70000
direct allocation
page read and write
50D0000
direct allocation
page execute and read and write
44AE000
stack
page read and write
124C000
heap
page read and write
10A6000
unkown
page execute and read and write
3D0B000
heap
page read and write
4861000
heap
page read and write
3F9F000
stack
page read and write
1696000
heap
page read and write
5140000
direct allocation
page execute and read and write
3840000
heap
page read and write
1572000
heap
page read and write
153E000
heap
page read and write
22D5B000
heap
page read and write
3ADE000
stack
page read and write
AA7000
unkown
page execute and read and write
3C23000
heap
page read and write
6C4C1000
unkown
page execute read
1409000
heap
page read and write
4AF1000
heap
page read and write
1034000
heap
page read and write
5100000
direct allocation
page execute and read and write
DD0000
direct allocation
page read and write
14F3000
heap
page read and write
4AF1000
heap
page read and write
3BBE000
stack
page read and write
4870000
heap
page read and write
159A000
heap
page read and write
AB6000
unkown
page execute and write copy
15E1000
heap
page read and write
1100000
heap
page read and write
49DE000
stack
page read and write
13D4000
heap
page read and write
1030000
heap
page read and write
3CFE000
stack
page read and write
EE6000
unkown
page execute and write copy
3BEF000
heap
page read and write
4AF1000
heap
page read and write
1707000
heap
page read and write
4E70000
direct allocation
page execute and read and write
1570000
heap
page read and write
425E000
stack
page read and write
2FDF000
stack
page read and write
4BE0000
trusted library allocation
page read and write
D8C000
unkown
page execute and read and write
15F7000
heap
page read and write
499F000
stack
page read and write
13A4000
heap
page read and write
1509000
heap
page read and write
3AF1000
heap
page read and write
22D6F000
heap
page read and write
993000
unkown
page execute and read and write
1034000
heap
page read and write
154A000
heap
page read and write
4AF1000
heap
page read and write
2E0000
unkown
page readonly
1134000
heap
page read and write
1382000
heap
page read and write
4AF1000
heap
page read and write
168E000
stack
page read and write
50F0000
direct allocation
page execute and read and write
4FD1000
direct allocation
page read and write
1127000
heap
page read and write
531B000
stack
page read and write
AA7000
unkown
page execute and read and write
3C2E000
stack
page read and write
DF0000
direct allocation
page read and write
3D94000
heap
page read and write
DD0000
direct allocation
page read and write
4AF1000
heap
page read and write
D28000
heap
page read and write
4E40000
direct allocation
page execute and read and write
4AF1000
heap
page read and write
4AF1000
heap
page read and write
16ED000
unkown
page execute and write copy
32FE000
stack
page read and write
468000
unkown
page execute and read and write
4AD0000
direct allocation
page read and write
4AE0000
direct allocation
page read and write
4861000
heap
page read and write
4AF1000
heap
page read and write
C3B000
unkown
page execute and read and write
22D60000
heap
page read and write
22D7A000
heap
page read and write
22D7D000
heap
page read and write
11F4000
heap
page read and write
4E20000
direct allocation
page execute and read and write
349C000
heap
page read and write
7A0000
unkown
page read and write
4AF1000
heap
page read and write
2DC0000
direct allocation
page read and write
32B0000
heap
page read and write
1684000
heap
page read and write
34AE000
stack
page read and write
1034000
heap
page read and write
182B000
heap
page read and write
3820000
heap
page read and write
4AF1000
heap
page read and write
4AF1000
heap
page read and write
4861000
heap
page read and write
1134000
heap
page read and write
11F4000
heap
page read and write
3B4000
unkown
page readonly
3BD4000
heap
page read and write
80B000
unkown
page execute and read and write
489E000
stack
page read and write
5180000
direct allocation
page execute and read and write
5130000
direct allocation
page execute and read and write
1104000
heap
page read and write
61A000
heap
page read and write
868C000
stack
page read and write
DD0000
direct allocation
page read and write
5140000
direct allocation
page execute and read and write
1C74D000
stack
page read and write
32BF000
stack
page read and write
2901F000
stack
page read and write
1134000
heap
page read and write
52EE000
stack
page read and write
1493000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
50BF000
stack
page read and write
1601000
heap
page read and write
4861000
heap
page read and write
1539000
heap
page read and write
BD1000
unkown
page execute and write copy
3D58000
heap
page read and write
3C1E000
stack
page read and write
13EE000
heap
page read and write
422F000
stack
page read and write
153A000
heap
page read and write
3BDF000
heap
page read and write
4AE0000
direct allocation
page read and write
DD0000
direct allocation
page read and write
22D7A000
heap
page read and write
AB5000
unkown
page execute and read and write
4E40000
direct allocation
page execute and read and write
D38000
heap
page read and write
4AF1000
heap
page read and write
489E000
stack
page read and write
449F000
stack
page read and write
3D94000
heap
page read and write
AA7000
unkown
page execute and read and write
4861000
heap
page read and write
4AF1000
heap
page read and write
1621000
heap
page read and write
5120000
direct allocation
page execute and read and write
16E1000
heap
page read and write
63E5000
heap
page read and write
11F4000
heap
page read and write
1330000
heap
page read and write
1104000
heap
page read and write
3E5F000
stack
page read and write
1530000
heap
page read and write
163E000
stack
page read and write
4861000
heap
page read and write
4ADF000
stack
page read and write
1CDD0000
trusted library allocation
page read and write
136E000
heap
page read and write
4138000
heap
page read and write
3ADD000
heap
page read and write
1572000
heap
page read and write
172E000
heap
page read and write
3BB0000
heap
page read and write
411D000
stack
page read and write
1034000
heap
page read and write
38B0000
direct allocation
page execute and read and write
22D7A000
heap
page read and write
22D62000
heap
page read and write
DED000
unkown
page execute and write copy
393F000
stack
page read and write
14D8000
heap
page read and write
C58000
unkown
page execute and write copy
1669000
heap
page read and write
7A1000
unkown
page execute and write copy
1134000
heap
page read and write
4861000
heap
page read and write
645000
unkown
page execute and read and write
2E50000
direct allocation
page read and write
A70000
unkown
page execute and read and write
13EC000
heap
page read and write
4861000
heap
page read and write
439E000
stack
page read and write
4AF1000
heap
page read and write
10BE000
stack
page read and write
5390000
direct allocation
page execute and read and write
44DE000
stack
page read and write
4AF1000
heap
page read and write
1445000
heap
page read and write
4AF1000
heap
page read and write
4AE1000
heap
page read and write
4AF1000
heap
page read and write
22D5D000
heap
page read and write
4861000
heap
page read and write
5210000
heap
page read and write
AA7000
unkown
page execute and read and write
22D5F000
heap
page read and write
5180000
direct allocation
page execute and read and write
5100000
direct allocation
page execute and read and write
4AF1000
heap
page read and write
36A0000
direct allocation
page execute and read and write
3CA1000
heap
page read and write
135D000
heap
page read and write
2D1E000
stack
page read and write
AB6000
unkown
page execute and write copy
596E000
stack
page read and write
4AF1000
heap
page read and write
4861000
heap
page read and write
4D71000
heap
page read and write
22D71000
heap
page read and write
22D77000
heap
page read and write
3D5E000
stack
page read and write
4AF1000
heap
page read and write
6C73F000
unkown
page write copy
135B000
heap
page read and write
4AF1000
heap
page read and write
65C000
unkown
page execute and read and write
2CF0000
heap
page read and write
1104000
heap
page read and write
C56000
unkown
page execute and read and write
4AF1000
heap
page read and write
130E000
stack
page read and write
4F80000
direct allocation
page read and write
1634000
heap
page read and write
143F000
heap
page read and write
50F0000
direct allocation
page execute and read and write
41BF000
stack
page read and write
5170000
direct allocation
page execute and read and write
32FF000
stack
page read and write
16C2000
heap
page read and write
DC0000
heap
page read and write
410F000
stack
page read and write
316E000
stack
page read and write
1050000
heap
page read and write
DD0000
direct allocation
page read and write
22D6C000
heap
page read and write
3CE2000
heap
page read and write
4F61000
direct allocation
page read and write
425E000
stack
page read and write
4BF0000
trusted library allocation
page read and write
22D7A000
heap
page read and write
1496000
heap
page read and write
18AA000
heap
page read and write
4861000
heap
page read and write
15C3000
heap
page read and write
3E5F000
stack
page read and write
DED000
stack
page read and write
399E000
stack
page read and write
3E7E000
stack
page read and write
3CC5000
heap
page read and write
326F000
stack
page read and write
385E000
stack
page read and write
4AE0000
direct allocation
page read and write
1510000
direct allocation
page read and write
181E000
heap
page read and write
1683000
heap
page read and write
2DB0000
heap
page read and write
A9C000
unkown
page execute and read and write
4B2E000
stack
page read and write
426E000
stack
page read and write
56A000
unkown
page execute and read and write
3C56000
heap
page read and write
5100000
direct allocation
page execute and read and write
4C6000
unkown
page execute and read and write
131E000
heap
page read and write
22D5E000
heap
page read and write
3D5E000
stack
page read and write
11F4000
heap
page read and write
443F000
stack
page read and write
13A4000
heap
page read and write
AB5000
unkown
page execute and read and write
3BF1000
heap
page read and write
D3C000
unkown
page execute and write copy
3D65000
heap
page read and write
159A000
heap
page read and write
3BB1000
heap
page read and write
3D34000
heap
page read and write
3CA1000
heap
page read and write
11F4000
heap
page read and write
4AF1000
heap
page read and write
152F000
stack
page read and write
5190000
direct allocation
page execute and read and write
3524000
direct allocation
page execute and read and write
5100000
direct allocation
page execute and read and write
471F000
stack
page read and write
1662000
heap
page read and write
185F000
heap
page read and write
DF0000
unkown
page execute and read and write
133E000
stack
page read and write
4AE0000
direct allocation
page read and write
395F000
stack
page read and write
154F000
stack
page read and write
15EB000
heap
page read and write
1CC5C000
stack
page read and write
61EB7000
direct allocation
page readonly
12C0000
heap
page read and write
802000
unkown
page execute and read and write
4AF1000
heap
page read and write
57AC000
stack
page read and write
AB5000
unkown
page execute and write copy
38E4000
direct allocation
page execute and read and write
1409000
heap
page read and write
1695000
heap
page read and write
7A0000
unkown
page readonly
1570000
heap
page read and write
3190000
heap
page read and write
5150000
direct allocation
page execute and read and write
2DC0000
direct allocation
page read and write
38F4000
direct allocation
page execute and read and write
2E1000
unkown
page execute read
2DCF000
stack
page read and write
1561000
heap
page read and write
5150000
direct allocation
page execute and read and write
4E90000
direct allocation
page execute and read and write
335E000
stack
page read and write
3CAA000
heap
page read and write
13FD000
heap
page read and write
5110000
direct allocation
page execute and read and write
3B67000
heap
page read and write
4E40000
direct allocation
page execute and read and write
1060000
heap
page read and write
2E77000
heap
page read and write
4861000
heap
page read and write
449F000
stack
page read and write
1C3D000
stack
page read and write
3D0B000
heap
page read and write
22D7A000
heap
page read and write
4AF1000
heap
page read and write
3524000
direct allocation
page execute and read and write
22D5D000
heap
page read and write
4D71000
heap
page read and write
2F5F000
stack
page read and write
C60000
heap
page read and write
195000
heap
page read and write
4B00000
heap
page read and write
1451000
heap
page read and write
349E000
stack
page read and write
131A000
heap
page read and write
13E6000
heap
page read and write
3330000
heap
page read and write
386E000
stack
page read and write
4861000
heap
page read and write
421F000
stack
page read and write
150E000
heap
page read and write
16EB000
heap
page read and write
5100000
direct allocation
page execute and read and write
3D04000
heap
page read and write
There are 1797 hidden memdumps, click here to show them.