IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\DocumentsJJKEBGHJKF.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\CAEHDBAAECBFHJKFCFBFIDHIJK
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DGCBAFIJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DGHDHIDGHIDGIECBKKJJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FCFBFHIEBKJKFHIEBFBA
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\HDAFIIDAKJDGDHIDAKJJJEHCFB
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\IEHDBAAF
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JJKEBGHJKFIDGCAAFCAF
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\b617b009b1.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
Chrome Cache Entry: 76
ASCII text, with very long lines (3655)
downloaded
Chrome Cache Entry: 77
ASCII text
downloaded
Chrome Cache Entry: 78
ASCII text, with very long lines (2586)
downloaded
Chrome Cache Entry: 79
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 80
ASCII text, with very long lines (1302)
downloaded
Chrome Cache Entry: 81
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 82
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 83
ASCII text
downloaded
There are 26 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2532 --field-trial-handle=2360,i,6398929871605590170,10744528980538309104,262144 /prefetch:8
malicious
C:\Users\user\DocumentsJJKEBGHJKF.exe
"C:\Users\user\DocumentsJJKEBGHJKF.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1005761001\2012aae27e.exe
"C:\Users\user\AppData\Local\Temp\1005761001\2012aae27e.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\1005763001\b617b009b1.exe
"C:\Users\user\AppData\Local\Temp\1005763001\b617b009b1.exe"
malicious
C:\Users\user\AppData\Local\Temp\1005763001\b617b009b1.exe
"C:\Users\user\AppData\Local\Temp\1005763001\b617b009b1.exe"
malicious
C:\Users\user\AppData\Local\Temp\1005763001\b617b009b1.exe
"C:\Users\user\AppData\Local\Temp\1005763001\b617b009b1.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\DocumentsJJKEBGHJKF.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.206/68b591d6548ec281/softokn3.dll
185.215.113.206
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dll
185.215.113.206
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.43/Zu7JuNko/index.phpW
unknown
http://www.broofa.com
unknown
http://185.215.113.43/Zu7JuNko/index.php5763001
unknown
http://185.215.113.206/c4becf79229cb002.phpa
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
http://185.215.113.16/mine/random.exe
185.215.113.16
http://185.215.113.206/c4becf79229cb002.phpn(S
unknown
http://185.215.113.43/Zu7JuNko/index.phpsdX
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.206/68b591d6548ec281/softokn3.dllz/;
unknown
http://185.215.113.206/c4becf79229cb002.phpm
unknown
http://185.215.113.43/Zu7JuNko/index.phpncoded
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dll
185.215.113.206
http://185.215.113.206/68b591d6548ec281/freebl3.dll3
unknown
http://185.215.113.43/Zu7JuNko/index.phpnu
unknown
https://workspace.google.com/:session_prefix:marketplace/appfinder?usegapi=1
unknown
http://185.215.113.206/c4becf79229cb002.phpu
unknown
http://185.215.113.206Local
unknown
http://185.215.113.206/c4becf79229cb002.phpK%
unknown
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
http://185.215.113.43/Zu7JuNko/index.php3
unknown
http://185.215.113.43/Zu7JuNko/index.php4
unknown
http://185.215.113.206/c4becf79229cb002.phpation
unknown
http://185.215.113.206/68b591d6548ec281/freebl3.dll
185.215.113.206
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://185.215.113.2068A
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dll
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php%/
unknown
http://185.215.113.206/68b591d6548ec281/mozglue.dll
185.215.113.206
http://185.215.113.16/steam/random.exe61395d7fC_
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.185.164
https://apis.google.com
unknown
http://185.215.113.43/Zu7JuNko/index.php-
unknown
http://185.215.113.206/J
unknown
http://185.215.113.16/steam/random.exeZ
unknown
https://domains.google.com/suggest/flow
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://www.sqlite.org/copyright.html.
unknown
http://185.215.113.16/steam/random.exe?3
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.215.113.206/x
unknown
http://185.215.113.206/68b591d6548ec281/msvcp140.dll
185.215.113.206
http://185.215.113.16/steam/random.exe
185.215.113.16
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.google.com/async/newtab_promos
142.250.185.164
http://185.215.113.206/c4becf79229cb002.php/
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://185.215.113.206/c4becf79229cb002.phpSession
unknown
http://185.215.113.16/steam/random.exe:2
unknown
https://plus.google.com
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.185.164
https://play.google.com/log?format=json&hasfast=true
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.185.164
http://185.215.113.16/mine/random.exe;R
unknown
http://185.215.113.206/c4becf79229cb002.php=
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
142.250.181.238
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.215.113.16/off/random.exek3;
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dllG
unknown
http://185.215.113.206/c4becf79229cb002.php7Z
unknown
http://185.215.113.16/off/random.exe
unknown
https://support.mozilla.org
unknown
http://185.215.113.206
unknown
http://185.215.113.206/c4becf79229cb002.phpQ
unknown
http://185.215.113.43/Zu7JuNko/index.phpk
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://185.215.113.43/Zu7JuNko/index.phpo
unknown
https://clients6.google.com
unknown
There are 74 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
plus.l.google.com
142.250.181.238
play.google.com
142.250.185.206
www.google.com
142.250.185.164
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
192.168.2.4
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
185.215.113.16
unknown
Portugal
142.250.181.238
plus.l.google.com
United States
239.255.255.250
unknown
Reserved
142.250.185.164
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
b617b009b1.exe
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
169E000
heap
page read and write
malicious
B51000
unkown
page execute and read and write
malicious
12BE000
heap
page read and write
malicious
1D1000
unkown
page execute and read and write
malicious
4FA0000
direct allocation
page read and write
malicious
B51000
unkown
page execute and read and write
malicious
971000
unkown
page execute and read and write
malicious
B51000
unkown
page execute and read and write
malicious
271000
unkown
page execute and read and write
malicious
5320000
direct allocation
page read and write
malicious
2ABC000
stack
page read and write
3A2E000
stack
page read and write
4C71000
heap
page read and write
DD3000
unkown
page execute and write copy
1334000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
10AC000
stack
page read and write
2AFE000
stack
page read and write
5070000
direct allocation
page execute and read and write
4C80000
direct allocation
page execute and read and write
4C71000
heap
page read and write
431E000
stack
page read and write
55FE000
stack
page read and write
4A31000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
4B21000
heap
page read and write
23968000
heap
page read and write
463000
unkown
page execute and read and write
1D5E9000
heap
page read and write
4E91000
heap
page read and write
4C4000
unkown
page execute and write copy
4CB0000
direct allocation
page execute and read and write
11A5000
stack
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
4E91000
heap
page read and write
1335000
heap
page read and write
4C60000
direct allocation
page read and write
4C71000
heap
page read and write
4A31000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
1334000
heap
page read and write
DA4000
unkown
page execute and write copy
4C71000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
9FE000
unkown
page execute and read and write
50E1000
trusted library allocation
page read and write
254000
unkown
page execute and read and write
14A4000
heap
page read and write
35DF000
stack
page read and write
6434000
trusted library allocation
page read and write
5100000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
4C4000
unkown
page execute and write copy
4A31000
heap
page read and write
1334000
heap
page read and write
14A4000
heap
page read and write
424000
unkown
page execute and write copy
6BE4000
heap
page read and write
4D4000
unkown
page execute and read and write
3B6F000
stack
page read and write
14A4000
heap
page read and write
4E91000
heap
page read and write
56D000
unkown
page execute and write copy
39FE000
stack
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
40AE000
stack
page read and write
3F2E000
stack
page read and write
BBC000
unkown
page execute and read and write
14A0000
heap
page read and write
583000
unkown
page execute and read and write
4701000
heap
page read and write
498F000
stack
page read and write
31B0000
direct allocation
page read and write
271000
unkown
page execute and write copy
6C835000
unkown
page readonly
53D000
unkown
page execute and read and write
E41000
unkown
page execute and write copy
1D51F000
stack
page read and write
1D5F1000
heap
page read and write
E63000
unkown
page execute and read and write
1334000
heap
page read and write
1D60C000
heap
page read and write
4F30000
direct allocation
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
3EEF000
stack
page read and write
1334000
heap
page read and write
23A000
unkown
page execute and write copy
4B21000
heap
page read and write
329F000
stack
page read and write
4D4000
unkown
page execute and read and write
285000
unkown
page execute and read and write
DE2000
unkown
page execute and read and write
1334000
heap
page read and write
4701000
heap
page read and write
1334000
heap
page read and write
4FD6000
direct allocation
page read and write
2EDF000
stack
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
BB9000
unkown
page write copy
3C0F000
stack
page read and write
1334000
heap
page read and write
4AAE000
stack
page read and write
4F41000
heap
page read and write
61ED3000
direct allocation
page read and write
463000
unkown
page execute and read and write
4AD0000
direct allocation
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
439000
unkown
page execute and read and write
DD3000
unkown
page execute and write copy
4C71000
heap
page read and write
4C60000
direct allocation
page read and write
409000
unkown
page execute and read and write
43C000
unkown
page execute and write copy
361E000
stack
page read and write
5C4000
heap
page read and write
1334000
heap
page read and write
4A31000
heap
page read and write
F3E000
stack
page read and write
1D5C0000
heap
page read and write
31B0000
direct allocation
page read and write
23670000
heap
page read and write
3BAE000
stack
page read and write
4C71000
heap
page read and write
3C5E000
stack
page read and write
12B0000
heap
page read and write
3C4E000
stack
page read and write
DD9000
unkown
page execute and read and write
410E000
stack
page read and write
1D5E8000
heap
page read and write
68D000
unkown
page execute and read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
1335000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
A4E000
stack
page read and write
4E91000
heap
page read and write
1D5EC000
heap
page read and write
4A31000
heap
page read and write
327E000
stack
page read and write
4701000
heap
page read and write
4C60000
direct allocation
page read and write
E5F000
unkown
page execute and read and write
4C71000
heap
page read and write
2A7F000
stack
page read and write
48D1000
heap
page read and write
26FE000
stack
page read and write
1D66B000
heap
page read and write
49CE000
stack
page read and write
1334000
heap
page read and write
4A31000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
55AE000
stack
page read and write
14A4000
heap
page read and write
4701000
heap
page read and write
4F41000
heap
page read and write
4A31000
heap
page read and write
6BF000
unkown
page execute and read and write
324E000
stack
page read and write
1D5E8000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
1D5CE000
heap
page read and write
4701000
heap
page read and write
2D9000
unkown
page write copy
1335000
heap
page read and write
4C71000
heap
page read and write
4AE3000
heap
page read and write
1335000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4B80000
heap
page execute and read and write
129A000
heap
page read and write
1334000
heap
page read and write
D33000
unkown
page execute and read and write
1334000
heap
page read and write
42EE000
stack
page read and write
23650000
heap
page read and write
4C60000
direct allocation
page read and write
425F000
stack
page read and write
489E000
stack
page read and write
43EF000
stack
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
270000
unkown
page readonly
4860000
direct allocation
page read and write
12EA000
heap
page read and write
2E7000
unkown
page execute and write copy
37EE000
stack
page read and write
56FF000
stack
page read and write
1D5CE000
heap
page read and write
4B21000
heap
page read and write
4860000
direct allocation
page read and write
4B21000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
4B21000
heap
page read and write
1334000
heap
page read and write
DF0000
heap
page read and write
4E91000
heap
page read and write
3CAE000
stack
page read and write
1290000
direct allocation
page read and write
1334000
heap
page read and write
DD0000
unkown
page execute and write copy
12D1000
heap
page read and write
4C71000
heap
page read and write
48C0000
direct allocation
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
3B6000
unkown
page execute and read and write
4EA0000
heap
page read and write
4E91000
heap
page read and write
17CE000
stack
page read and write
5C4000
heap
page read and write
1334000
heap
page read and write
460E000
stack
page read and write
4A31000
heap
page read and write
467E000
stack
page read and write
4F9000
unkown
page execute and read and write
4C71000
heap
page read and write
402F000
stack
page read and write
1334000
heap
page read and write
1D5DE000
heap
page read and write
311E000
stack
page read and write
1D5E8000
heap
page read and write
1D02F000
stack
page read and write
D5C000
unkown
page execute and read and write
1334000
heap
page read and write
4C71000
heap
page read and write
546F000
stack
page read and write
D3F000
unkown
page execute and write copy
4B7E000
heap
page read and write
DD4000
unkown
page execute and read and write
4B21000
heap
page read and write
DF4000
heap
page read and write
1334000
heap
page read and write
4F30000
direct allocation
page read and write
1334000
heap
page read and write
39DE000
stack
page read and write
46EE000
stack
page read and write
F7E000
stack
page read and write
CF9000
stack
page read and write
1334000
heap
page read and write
3C7E000
stack
page read and write
1334000
heap
page read and write
462000
unkown
page execute and write copy
61ED0000
direct allocation
page read and write
1030000
heap
page read and write
1334000
heap
page read and write
4B5E000
stack
page read and write
8D0B000
stack
page read and write
6F8ED000
unkown
page readonly
4C71000
heap
page read and write
46F0000
direct allocation
page read and write
75CD000
stack
page read and write
4C71000
heap
page read and write
5050000
direct allocation
page execute and read and write
FE0000
heap
page read and write
46A1000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
1330000
heap
page read and write
48C0000
direct allocation
page read and write
28AE000
stack
page read and write
18CE000
stack
page read and write
3F5E000
stack
page read and write
13B5000
heap
page read and write
4EF0000
direct allocation
page read and write
5040000
direct allocation
page execute and read and write
1334000
heap
page read and write
49BA000
trusted library allocation
page execute and read and write
4D00000
direct allocation
page execute and read and write
4C71000
heap
page read and write
8FC000
stack
page read and write
1D0000
unkown
page read and write
316F000
stack
page read and write
34BF000
stack
page read and write
1334000
heap
page read and write
462000
unkown
page execute and write copy
42BE000
stack
page read and write
1335000
heap
page read and write
41C000
unkown
page execute and write copy
4F41000
heap
page read and write
1334000
heap
page read and write
4C60000
direct allocation
page read and write
1335000
heap
page read and write
4A37000
heap
page read and write
1334000
heap
page read and write
351F000
stack
page read and write
46F0000
direct allocation
page read and write
1290000
direct allocation
page read and write
31B0000
direct allocation
page read and write
DF4000
heap
page read and write
1334000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
1334000
heap
page read and write
398F000
stack
page read and write
293F000
stack
page read and write
4A31000
heap
page read and write
33BE000
stack
page read and write
4C71000
heap
page read and write
23A000
unkown
page execute and write copy
129C000
heap
page read and write
D33000
unkown
page execute and read and write
44DF000
stack
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
127B000
heap
page read and write
E1D000
unkown
page execute and read and write
4C71000
heap
page read and write
1D6AD000
stack
page read and write
BB9000
unkown
page write copy
4C71000
heap
page read and write
41D000
unkown
page execute and read and write
BB2000
unkown
page execute and read and write
5220000
direct allocation
page execute and read and write
1334000
heap
page read and write
1334000
heap
page read and write
E54000
unkown
page execute and write copy
4D6000
unkown
page execute and write copy
23A000
unkown
page execute and read and write
D3F000
unkown
page execute and write copy
23A000
unkown
page execute and write copy
4C71000
heap
page read and write
60E1000
trusted library allocation
page read and write
297E000
stack
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
1334000
heap
page read and write
3ACE000
stack
page read and write
31B0000
direct allocation
page read and write
3EFE000
stack
page read and write
399000
unkown
page execute and read and write
50B0000
direct allocation
page execute and read and write
12D3000
heap
page read and write
52F0000
direct allocation
page execute and read and write
12D3000
heap
page read and write
1335000
heap
page read and write
4C71000
heap
page read and write
450000
unkown
page execute and read and write
39B000
unkown
page execute and write copy
1334000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
4E91000
heap
page read and write
3FFF000
stack
page read and write
48D1000
heap
page read and write
1334000
heap
page read and write
D3F000
unkown
page execute and write copy
1335000
heap
page read and write
1334000
heap
page read and write
DA3000
unkown
page execute and read and write
1334000
heap
page read and write
2F5E000
heap
page read and write
14A4000
heap
page read and write
32DE000
stack
page read and write
475F000
stack
page read and write
31B0000
direct allocation
page read and write
452F000
stack
page read and write
1334000
heap
page read and write
6C651000
unkown
page execute read
4C71000
heap
page read and write
14A4000
heap
page read and write
1334000
heap
page read and write
535E000
stack
page read and write
3D7E000
stack
page read and write
406F000
stack
page read and write
1012000
unkown
page execute and read and write
48C0000
direct allocation
page read and write
13A1000
heap
page read and write
38EE000
stack
page read and write
475F000
stack
page read and write
2F9F000
stack
page read and write
23712000
heap
page read and write
44FF000
stack
page read and write
BBB000
unkown
page execute and write copy
4ACF000
stack
page read and write
4B1F000
stack
page read and write
1334000
heap
page read and write
46F0000
direct allocation
page read and write
B51000
unkown
page execute and write copy
2F1E000
stack
page read and write
3A1F000
stack
page read and write
4C71000
heap
page read and write
12D3000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
2D4E000
stack
page read and write
2E7F000
stack
page read and write
D72000
unkown
page execute and write copy
4AE1000
heap
page read and write
3B5000
unkown
page execute and write copy
1334000
heap
page read and write
D67000
unkown
page execute and read and write
50D0000
direct allocation
page execute and read and write
1334000
heap
page read and write
39DE000
stack
page read and write
4C71000
heap
page read and write
4B21000
heap
page read and write
B51000
unkown
page execute and write copy
4C71000
heap
page read and write
101E000
stack
page read and write
3AFF000
stack
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
4C4000
unkown
page execute and write copy
14A4000
heap
page read and write
45AE000
stack
page read and write
36FF000
stack
page read and write
1D60C000
heap
page read and write
1334000
heap
page read and write
B50000
unkown
page readonly
E3F000
unkown
page execute and write copy
1334000
heap
page read and write
5C4000
heap
page read and write
1334000
heap
page read and write
BBB000
unkown
page execute and read and write
4B21000
heap
page read and write
12CB000
heap
page read and write
1334000
heap
page read and write
4AD0000
direct allocation
page read and write
1334000
heap
page read and write
E4D000
unkown
page execute and write copy
373F000
stack
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
1D5D7000
heap
page read and write
4C71000
heap
page read and write
3FDF000
stack
page read and write
9A7000
unkown
page execute and read and write
4C71000
heap
page read and write
BCE000
stack
page read and write
DC5000
heap
page read and write
1D5EC000
heap
page read and write
4C71000
heap
page read and write
AFD000
stack
page read and write
5C4000
heap
page read and write
DF4000
heap
page read and write
C5A000
heap
page read and write
1335000
heap
page read and write
236000
unkown
page write copy
4A31000
heap
page read and write
4C71000
heap
page read and write
4A31000
heap
page read and write
12BE000
heap
page read and write
31AF000
stack
page read and write
3B5000
unkown
page execute and write copy
1334000
heap
page read and write
E3F000
unkown
page execute and write copy
388E000
stack
page read and write
B50000
unkown
page read and write
129C000
heap
page read and write
3B1E000
stack
page read and write
400E000
stack
page read and write
4E91000
heap
page read and write
4B21000
heap
page read and write
4C71000
heap
page read and write
14A4000
heap
page read and write
4C71000
heap
page read and write
1335000
heap
page read and write
3FA000
unkown
page execute and read and write
325F000
stack
page read and write
4C71000
heap
page read and write
438F000
stack
page read and write
4C71000
heap
page read and write
4BE000
unkown
page execute and write copy
1334000
heap
page read and write
E54000
unkown
page execute and write copy
7940000
heap
page read and write
4C71000
heap
page read and write
42EE000
stack
page read and write
1334000
heap
page read and write
5080000
trusted library allocation
page read and write
4B21000
heap
page read and write
2C9E000
stack
page read and write
4B30000
trusted library allocation
page read and write
4C71000
heap
page read and write
4BE000
unkown
page execute and write copy
4C71000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
2B00000
heap
page read and write
4854000
trusted library allocation
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
316E000
stack
page read and write
4E91000
heap
page read and write
60E4000
trusted library allocation
page read and write
1D45E000
stack
page read and write
129C000
heap
page read and write
37AE000
stack
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
E4D000
unkown
page execute and write copy
38DF000
stack
page read and write
4C71000
heap
page read and write
347F000
stack
page read and write
131D000
heap
page read and write
483000
unkown
page execute and write copy
3ADF000
stack
page read and write
4D6000
unkown
page execute and write copy
3B5000
unkown
page execute and write copy
23962000
heap
page read and write
4C71000
heap
page read and write
6B91000
heap
page read and write
14A4000
heap
page read and write
1334000
heap
page read and write
485000
unkown
page execute and write copy
14A4000
heap
page read and write
1334000
heap
page read and write
4E91000
heap
page read and write
1335000
heap
page read and write
2E9E000
heap
page read and write
4C71000
heap
page read and write
4A31000
heap
page read and write
2C5F000
stack
page read and write
1334000
heap
page read and write
463000
unkown
page execute and write copy
2930000
direct allocation
page read and write
6B8A000
heap
page read and write
423000
unkown
page execute and read and write
4C71000
heap
page read and write
1334000
heap
page read and write
52D0000
trusted library allocation
page read and write
2950000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
4A31000
heap
page read and write
4B21000
heap
page read and write
1334000
heap
page read and write
207000
unkown
page execute and read and write
4C71000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
49E0000
direct allocation
page execute and read and write
2DDE000
stack
page read and write
2E10000
direct allocation
page read and write
246000
unkown
page execute and write copy
1290000
direct allocation
page read and write
4F41000
heap
page read and write
4C71000
heap
page read and write
4701000
heap
page read and write
6A5C000
stack
page read and write
3C6F000
stack
page read and write
DF4000
heap
page read and write
50E0000
direct allocation
page execute and read and write
4E91000
heap
page read and write
8FD000
stack
page read and write
321F000
stack
page read and write
101E000
heap
page read and write
4C71000
heap
page read and write
A60000
heap
page read and write
1334000
heap
page read and write
4810000
heap
page read and write
50A0000
direct allocation
page execute and read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
FDE000
stack
page read and write
D9E000
unkown
page execute and write copy
4C71000
heap
page read and write
14A4000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
1690000
heap
page read and write
335F000
stack
page read and write
52D0000
direct allocation
page execute and read and write
4701000
heap
page read and write
14A4000
heap
page read and write
429000
unkown
page execute and read and write
1334000
heap
page read and write
117A000
stack
page read and write
1334000
heap
page read and write
2DAE000
stack
page read and write
4C71000
heap
page read and write
4B21000
heap
page read and write
1334000
heap
page read and write
55F000
unkown
page execute and write copy
4A31000
heap
page read and write
2CFF000
stack
page read and write
5084000
trusted library allocation
page read and write
4E91000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
4A31000
heap
page read and write
1344000
heap
page read and write
2E5000
unkown
page execute and write copy
1713000
heap
page read and write
40D000
unkown
page execute and read and write
4C71000
heap
page read and write
513B000
stack
page read and write
3D4F000
stack
page read and write
425F000
stack
page read and write
DCE000
unkown
page execute and write copy
B50000
unkown
page read and write
1334000
heap
page read and write
4E91000
heap
page read and write
1D604000
heap
page read and write
4C71000
heap
page read and write
14A4000
heap
page read and write
3C5E000
stack
page read and write
4AD0000
direct allocation
page read and write
574E000
stack
page read and write
32AF000
stack
page read and write
4B21000
heap
page read and write
4C71000
heap
page read and write
4B21000
heap
page read and write
1D5EE000
heap
page read and write
30DF000
stack
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
4C4E000
stack
page read and write
33EE000
stack
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
11E0000
heap
page read and write
4B21000
heap
page read and write
1D5E8000
heap
page read and write
6C82F000
unkown
page write copy
1D5FE000
heap
page read and write
31B0000
direct allocation
page read and write
DBF000
unkown
page execute and write copy
536E000
stack
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
41EE000
stack
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
D9D000
unkown
page execute and read and write
4B21000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
3E8E000
stack
page read and write
3D0000
unkown
page execute and read and write
2395A000
heap
page read and write
1334000
heap
page read and write
47EF000
stack
page read and write
12D1000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
4B21000
heap
page read and write
4701000
heap
page read and write
4FCE000
stack
page read and write
1334000
heap
page read and write
33AF000
stack
page read and write
1334000
heap
page read and write
12EA000
heap
page read and write
415E000
stack
page read and write
1000000
direct allocation
page read and write
465E000
stack
page read and write
1D6E2000
heap
page read and write
B40000
heap
page read and write
1334000
heap
page read and write
1D5E7000
heap
page read and write
1334000
heap
page read and write
1335000
heap
page read and write
1334000
heap
page read and write
5BA4000
trusted library allocation
page read and write
DC2000
unkown
page execute and read and write
305F000
stack
page read and write
67AE000
stack
page read and write
5C4000
heap
page read and write
8F9000
stack
page read and write
3D9E000
stack
page read and write
34EF000
stack
page read and write
14A4000
heap
page read and write
588E000
stack
page read and write
DBF000
unkown
page execute and write copy
5100000
direct allocation
page read and write
1290000
direct allocation
page read and write
2B2F000
stack
page read and write
4B21000
heap
page read and write
4C71000
heap
page read and write
1D5DE000
heap
page read and write
1290000
direct allocation
page read and write
4FD0000
heap
page execute and read and write
BC6000
unkown
page execute and read and write
1334000
heap
page read and write
2E10000
direct allocation
page read and write
4A31000
heap
page read and write
D3F000
unkown
page execute and read and write
666E000
stack
page read and write
4C71000
heap
page read and write
4A31000
heap
page read and write
4E91000
heap
page read and write
3DBE000
stack
page read and write
46F0000
direct allocation
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
54C0000
direct allocation
page execute and read and write
1334000
heap
page read and write
DAC000
stack
page read and write
1D5E7000
heap
page read and write
1334000
heap
page read and write
48D1000
heap
page read and write
4B21000
heap
page read and write
DC0000
heap
page read and write
43A000
unkown
page execute and read and write
16E2000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
2E7E000
stack
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
E1D000
unkown
page execute and read and write
1334000
heap
page read and write
40D000
unkown
page execute and read and write
3AB000
unkown
page execute and read and write
4AE1000
heap
page read and write
1334000
heap
page read and write
D3F000
unkown
page execute and write copy
1D5E6000
heap
page read and write
450000
unkown
page execute and read and write
6BD8000
heap
page read and write
4C71000
heap
page read and write
456E000
stack
page read and write
5B4D000
stack
page read and write
4A31000
heap
page read and write
1335000
heap
page read and write
399000
unkown
page execute and read and write
14A4000
heap
page read and write
1000000
direct allocation
page read and write
E6F000
unkown
page execute and write copy
3E9000
unkown
page execute and write copy
292E000
stack
page read and write
1334000
heap
page read and write
441F000
stack
page read and write
583000
unkown
page execute and write copy
1334000
heap
page read and write
188E000
stack
page read and write
14A4000
heap
page read and write
4A31000
heap
page read and write
4AD0000
direct allocation
page read and write
1334000
heap
page read and write
56E000
unkown
page execute and write copy
1334000
heap
page read and write
3E8F000
stack
page read and write
1071000
heap
page read and write
DD0000
heap
page read and write
4C71000
heap
page read and write
D84000
unkown
page execute and read and write
1303000
heap
page read and write
2E90000
heap
page read and write
532F000
stack
page read and write
2DE0000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
341E000
stack
page read and write
411F000
stack
page read and write
2BFE000
stack
page read and write
4850000
trusted library allocation
page read and write
1334000
heap
page read and write
4B21000
heap
page read and write
4C71000
heap
page read and write
2E10000
direct allocation
page read and write
4C71000
heap
page read and write
10F9000
stack
page read and write
1290000
direct allocation
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
1D2DE000
stack
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
120A000
heap
page read and write
4C71000
heap
page read and write
3F1F000
stack
page read and write
4A31000
heap
page read and write
4B21000
heap
page read and write
41AF000
stack
page read and write
E54000
unkown
page execute and write copy
1334000
heap
page read and write
4F30000
direct allocation
page read and write
1334000
heap
page read and write
43BF000
stack
page read and write
470F000
stack
page read and write
572000
unkown
page execute and read and write
230000
unkown
page readonly
4E9F000
stack
page read and write
4C71000
heap
page read and write
4D60000
direct allocation
page read and write
4C71000
heap
page read and write
410F000
stack
page read and write
1341000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
A80000
heap
page read and write
1334000
heap
page read and write
30BF000
stack
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
4E8F000
stack
page read and write
4C71000
heap
page read and write
52B0000
trusted library allocation
page execute and read and write
4F41000
heap
page read and write
439000
unkown
page execute and read and write
4C71000
heap
page read and write
1D5DF000
heap
page read and write
399F000
stack
page read and write
1334000
heap
page read and write
451E000
stack
page read and write
1335000
heap
page read and write
1D60C000
heap
page read and write
1334000
heap
page read and write
2D2F000
stack
page read and write
1000000
direct allocation
page read and write
4C71000
heap
page read and write
31B0000
direct allocation
page read and write
1335000
heap
page read and write
323E000
stack
page read and write
4C71000
heap
page read and write
1D5E8000
heap
page read and write
50E4000
heap
page read and write
4F30000
direct allocation
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
371F000
stack
page read and write
1334000
heap
page read and write
50F0000
direct allocation
page execute and read and write
E63000
unkown
page execute and write copy
4F60000
direct allocation
page execute and read and write
4C71000
heap
page read and write
A1F000
unkown
page execute and read and write
4A31000
heap
page read and write
13C7000
heap
page read and write
5D0000
heap
page read and write
4B21000
heap
page read and write
75CE000
stack
page read and write
B30000
heap
page read and write
4C71000
heap
page read and write
4E91000
heap
page read and write
2EFE000
stack
page read and write
4AD0000
direct allocation
page read and write
10F2000
stack
page read and write
1275000
heap
page read and write
41DE000
stack
page read and write
40C000
unkown
page execute and write copy
31B0000
direct allocation
page read and write
492F000
stack
page read and write
1D8EE000
stack
page read and write
4C83000
trusted library allocation
page execute and read and write
1D29F000
stack
page read and write
1334000
heap
page read and write
B50000
unkown
page readonly
1CEEF000
stack
page read and write
4B21000
heap
page read and write
46A0000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
406000
unkown
page execute and write copy
5320000
direct allocation
page read and write
1D609000
heap
page read and write
41E000
unkown
page execute and write copy
105E000
stack
page read and write
1334000
heap
page read and write
4C60000
direct allocation
page read and write
1318000
heap
page read and write
46AE000
stack
page read and write
DF4000
heap
page read and write
4D4000
unkown
page execute and write copy
4B21000
heap
page read and write
4E91000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
230000
unkown
page read and write
1D5E6000
heap
page read and write
D9E000
unkown
page execute and write copy
124E000
stack
page read and write
E63000
unkown
page execute and write copy
4C71000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
4B21000
heap
page read and write
12C5000
heap
page read and write
D0C000
stack
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
4B34000
heap
page read and write
2A671000
heap
page read and write
DE2000
unkown
page execute and read and write
5280000
direct allocation
page execute and read and write
3B6000
unkown
page execute and read and write
4C71000
heap
page read and write
3B6E000
stack
page read and write
E3F000
unkown
page execute and write copy
1D0000
unkown
page readonly
D70000
heap
page read and write
465E000
stack
page read and write
11DE000
stack
page read and write
6B5000
unkown
page execute and read and write
4C60000
direct allocation
page execute and read and write
1334000
heap
page read and write
54AD000
stack
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
1D5F1000
heap
page read and write
6B80000
heap
page read and write
128E000
stack
page read and write
1335000
heap
page read and write
46F0000
direct allocation
page read and write
DD1000
unkown
page execute and read and write
4C71000
heap
page read and write
102E000
heap
page read and write
125E000
heap
page read and write
4B21000
heap
page read and write
4C71000
heap
page read and write
72DE000
stack
page read and write
4C71000
heap
page read and write
4EE0000
heap
page read and write
403E000
stack
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4A31000
heap
page read and write
3D0000
unkown
page execute and read and write
5E3C000
stack
page read and write
1334000
heap
page read and write
4C3000
unkown
page execute and read and write
BC7000
unkown
page execute and write copy
3A6E000
stack
page read and write
4A31000
heap
page read and write
23A000
unkown
page execute and read and write
4C71000
heap
page read and write
1334000
heap
page read and write
DD4000
unkown
page execute and read and write
4C71000
heap
page read and write
4B21000
heap
page read and write
487000
unkown
page execute and read and write
1334000
heap
page read and write
127E000
stack
page read and write
4C71000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
1090000
heap
page read and write
B50000
unkown
page readonly
1334000
heap
page read and write
1334000
heap
page read and write
3CEE000
stack
page read and write
DF6000
unkown
page execute and write copy
1308000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
342E000
stack
page read and write
484F000
stack
page read and write
1334000
heap
page read and write
41C000
unkown
page execute and read and write
1334000
heap
page read and write
2E10000
direct allocation
page read and write
4C71000
heap
page read and write
127B000
heap
page read and write
4C71000
heap
page read and write
4A31000
heap
page read and write
1290000
direct allocation
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
44DF000
stack
page read and write
384F000
stack
page read and write
1334000
heap
page read and write
6F870000
unkown
page readonly
1334000
heap
page read and write
4B90000
heap
page read and write
417E000
stack
page read and write
4AD0000
direct allocation
page read and write
4D4000
unkown
page execute and write copy
1D60C000
heap
page read and write
40CF000
stack
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
2EBE000
stack
page read and write
4D60000
direct allocation
page read and write
3B0E000
stack
page read and write
61E01000
direct allocation
page execute read
4C71000
heap
page read and write
DE2000
unkown
page execute and read and write
D44000
unkown
page execute and read and write
1D19E000
stack
page read and write
4EFB000
stack
page read and write
1000000
direct allocation
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
3FCE000
stack
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
46A1000
heap
page read and write
4A31000
heap
page read and write
3A2F000
stack
page read and write
4A31000
heap
page read and write
1334000
heap
page read and write
12C5000
heap
page read and write
1000000
direct allocation
page read and write
4C30000
direct allocation
page read and write
49CB000
trusted library allocation
page execute and read and write
E41000
unkown
page execute and write copy
D3F000
unkown
page execute and read and write
5140000
direct allocation
page execute and read and write
B51000
unkown
page execute and write copy
4F5000
unkown
page execute and write copy
36CF000
stack
page read and write
1334000
heap
page read and write
366E000
stack
page read and write
2E10000
direct allocation
page read and write
1D6E0000
trusted library allocation
page read and write
409000
unkown
page execute and read and write
461F000
stack
page read and write
49DF000
stack
page read and write
438E000
stack
page read and write
1334000
heap
page read and write
3DDF000
stack
page read and write
4C71000
heap
page read and write
DF8000
unkown
page execute and read and write
4A31000
heap
page read and write
D43000
unkown
page execute and write copy
4C70000
direct allocation
page execute and read and write
4843000
trusted library allocation
page execute and read and write
1D5FE000
heap
page read and write
DDA000
unkown
page execute and write copy
2F57000
heap
page read and write
479E000
stack
page read and write
4F41000
heap
page read and write
5110000
direct allocation
page execute and read and write
39EF000
stack
page read and write
413E000
stack
page read and write
E41000
unkown
page execute and write copy
5280000
direct allocation
page execute and read and write
4701000
heap
page read and write
409000
unkown
page execute and read and write
1334000
heap
page read and write
1335000
heap
page read and write
4C71000
heap
page read and write
BC7000
unkown
page execute and write copy
4CB0000
trusted library allocation
page read and write
4C71000
heap
page read and write
4A31000
heap
page read and write
487000
unkown
page execute and read and write
4E94000
heap
page read and write
A85000
heap
page read and write
1335000
heap
page read and write
409E000
stack
page read and write
43DE000
stack
page read and write
E4D000
unkown
page execute and read and write
2E10000
direct allocation
page read and write
4C71000
heap
page read and write
4AD0000
direct allocation
page read and write
D5B000
unkown
page execute and write copy
29C000
unkown
page execute and read and write
14A4000
heap
page read and write
1335000
heap
page read and write
449000
unkown
page execute and write copy
1334000
heap
page read and write
33DF000
stack
page read and write
1334000
heap
page read and write
4EF000
unkown
page execute and read and write
124E000
stack
page read and write
102A000
heap
page read and write
1335000
heap
page read and write
169A000
heap
page read and write
4F3000
unkown
page execute and write copy
D1A000
unkown
page execute and read and write
4B8000
unkown
page execute and read and write
B00000
heap
page read and write
14A4000
heap
page read and write
1D06E000
stack
page read and write
12D7000
heap
page read and write
4E91000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
DCE000
unkown
page execute and write copy
4EE0000
direct allocation
page execute and read and write
1335000
heap
page read and write
30AE000
stack
page read and write
34CE000
stack
page read and write
466F000
stack
page read and write
4C71000
heap
page read and write
46A000
unkown
page execute and read and write
2396B000
heap
page read and write
31B0000
direct allocation
page read and write
4A31000
heap
page read and write
4F40000
direct allocation
page execute and read and write
1334000
heap
page read and write
4C71000
heap
page read and write
6C82E000
unkown
page read and write
DF4000
heap
page read and write
6BD6000
heap
page read and write
39BD000
stack
page read and write
1334000
heap
page read and write
103E000
heap
page read and write
4C71000
heap
page read and write
5220000
trusted library allocation
page read and write
270000
unkown
page read and write
406000
unkown
page execute and write copy
4C71000
heap
page read and write
C62000
heap
page read and write
1334000
heap
page read and write
44CE000
stack
page read and write
DC2000
unkown
page execute and read and write
BB2000
unkown
page execute and write copy
416F000
stack
page read and write
520F000
stack
page read and write
E4D000
unkown
page execute and write copy
1334000
heap
page read and write
5120000
direct allocation
page execute and read and write
4701000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
4A31000
heap
page read and write
4C71000
heap
page read and write
4700000
heap
page read and write
4E8C000
stack
page read and write
4C71000
heap
page read and write
BBB000
unkown
page execute and read and write
4F41000
heap
page read and write
4B21000
heap
page read and write
1D60C000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
3E9F000
stack
page read and write
12D4000
heap
page read and write
BC6000
unkown
page execute and read and write
2EBC000
stack
page read and write
4C71000
heap
page read and write
236000
unkown
page write copy
48BF000
stack
page read and write
D43000
unkown
page execute and write copy
5BC5000
trusted library allocation
page read and write
4C71000
heap
page read and write
1335000
heap
page read and write
424000
unkown
page execute and write copy
1D5EF000
heap
page read and write
4C71000
heap
page read and write
391E000
stack
page read and write
1334000
heap
page read and write
14A4000
heap
page read and write
4C71000
heap
page read and write
4D10000
direct allocation
page execute and read and write
E52000
unkown
page execute and read and write
DDA000
unkown
page execute and write copy
DF4000
heap
page read and write
5040000
direct allocation
page execute and read and write
4EE0000
direct allocation
page execute and read and write
4E90000
trusted library allocation
page read and write
1D5EE000
heap
page read and write
9D0000
heap
page read and write
3DAF000
stack
page read and write
23A000
unkown
page execute and write copy
5490000
direct allocation
page execute and read and write
73C0000
heap
page execute and read and write
DC2000
unkown
page execute and read and write
1334000
heap
page read and write
4A31000
heap
page read and write
1D5EE000
heap
page read and write
230000
unkown
page readonly
11F0000
heap
page read and write
46A1000
heap
page read and write
5290000
direct allocation
page execute and read and write
1334000
heap
page read and write
4FFF000
stack
page read and write
516000
unkown
page execute and write copy
48C0000
direct allocation
page read and write
4B21000
heap
page read and write
2ABE000
stack
page read and write
371F000
stack
page read and write
41AE000
stack
page read and write
4C71000
heap
page read and write
2D7E000
stack
page read and write
96C000
stack
page read and write
3E2E000
stack
page read and write
4E91000
heap
page read and write
4A1E000
stack
page read and write
3D0F000
stack
page read and write
5F3C000
stack
page read and write
4BD000
unkown
page execute and read and write
232000
unkown
page execute and read and write
D65000
unkown
page execute and write copy
3FCF000
stack
page read and write
FCE000
stack
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
451E000
stack
page read and write
1D5EC000
heap
page read and write
232000
unkown
page execute and write copy
415E000
stack
page read and write
492000
unkown
page execute and write copy
1D60C000
heap
page read and write
4E91000
heap
page read and write
339E000
stack
page read and write
4C71000
heap
page read and write
D67000
unkown
page execute and read and write
483000
unkown
page execute and write copy
1335000
heap
page read and write
50CE000
stack
page read and write
337F000
stack
page read and write
286F000
stack
page read and write
44CF000
stack
page read and write
1D5E9000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4A31000
heap
page read and write
1334000
heap
page read and write
370F000
stack
page read and write
4EC0000
direct allocation
page execute and read and write
1334000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
10F7000
stack
page read and write
355E000
stack
page read and write
1334000
heap
page read and write
4C60000
direct allocation
page read and write
4A1E000
stack
page read and write
423000
unkown
page execute and read and write
4B5E000
stack
page read and write
2E20000
heap
page read and write
5C0000
heap
page read and write
14A4000
heap
page read and write
1334000
heap
page read and write
FE0000
heap
page read and write
1334000
heap
page read and write
14A4000
heap
page read and write
1D5D7000
heap
page read and write
3FA000
unkown
page execute and read and write
4CB7000
trusted library allocation
page execute and read and write
4C71000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
373E000
stack
page read and write
DD0000
unkown
page execute and write copy
1334000
heap
page read and write
34BE000
stack
page read and write
26BF000
stack
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
4C84000
trusted library allocation
page read and write
1D5C2000
heap
page read and write
4A31000
heap
page read and write
1D5FF000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
6A10000
heap
page read and write
4C71000
heap
page read and write
1000000
direct allocation
page read and write
3B3E000
stack
page read and write
1334000
heap
page read and write
1D5FE000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
DF8000
unkown
page execute and read and write
4C71000
heap
page read and write
1290000
direct allocation
page read and write
3F6E000
stack
page read and write
4E91000
heap
page read and write
1334000
heap
page read and write
147E000
stack
page read and write
4C71000
heap
page read and write
E54000
unkown
page execute and write copy
1D5E5000
heap
page read and write
4A31000
heap
page read and write
4A2E000
stack
page read and write
970000
unkown
page readonly
1334000
heap
page read and write
1335000
heap
page read and write
31B0000
direct allocation
page read and write
1334000
heap
page read and write
238BE000
stack
page read and write
1334000
heap
page read and write
4B21000
heap
page read and write
4FA000
unkown
page execute and write copy
4C71000
heap
page read and write
5280000
direct allocation
page execute and read and write
4B21000
heap
page read and write
4BE000
unkown
page execute and write copy
46D0000
heap
page read and write
6B60000
heap
page read and write
BC5000
unkown
page execute and write copy
2A49C000
stack
page read and write
4B30000
heap
page read and write
1334000
heap
page read and write
453000
unkown
page execute and read and write
46F0000
direct allocation
page read and write
4A31000
heap
page read and write
1334000
heap
page read and write
4701000
heap
page read and write
446E000
stack
page read and write
3CC000
unkown
page execute and write copy
1334000
heap
page read and write
40C000
unkown
page execute and write copy
4C60000
direct allocation
page read and write
4B21000
heap
page read and write
6B7A000
heap
page read and write
1334000
heap
page read and write
429000
unkown
page execute and read and write
45A000
unkown
page execute and read and write
71DD000
stack
page read and write
526E000
stack
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
5060000
trusted library allocation
page read and write
1D5FF000
heap
page read and write
1334000
heap
page read and write
2E7E000
stack
page read and write
1D2CF000
stack
page read and write
4C71000
heap
page read and write
6F8FE000
unkown
page read and write
4C71000
heap
page read and write
4F00000
direct allocation
page execute and read and write
4C71000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
423F000
stack
page read and write
873000
unkown
page execute and write copy
120E000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
C70000
heap
page read and write
1D5DF000
heap
page read and write
31B0000
direct allocation
page read and write
4710000
heap
page read and write
14A4000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
377E000
stack
page read and write
1334000
heap
page read and write
D4A000
unkown
page execute and read and write
C20000
heap
page read and write
1334000
heap
page read and write
4B21000
heap
page read and write
574000
unkown
page execute and write copy
4C71000
heap
page read and write
4E91000
heap
page read and write
40D000
unkown
page execute and read and write
41C000
unkown
page execute and write copy
1380000
heap
page read and write
39CE000
stack
page read and write
1334000
heap
page read and write
2E27000
heap
page read and write
3ACF000
stack
page read and write
4C71000
heap
page read and write
12EC000
heap
page read and write
30FF000
stack
page read and write
BB2000
unkown
page execute and read and write
4C71000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
1D55D000
stack
page read and write
E4D000
unkown
page execute and read and write
1D7ED000
stack
page read and write
1334000
heap
page read and write
5040000
direct allocation
page execute and read and write
D9A000
unkown
page execute and write copy
1D5FE000
heap
page read and write
1334000
heap
page read and write
427E000
stack
page read and write
4B21000
heap
page read and write
1D55E000
stack
page read and write
1334000
heap
page read and write
55C000
stack
page read and write
2A7F000
stack
page read and write
4BE0000
trusted library allocation
page read and write
4CA0000
trusted library allocation
page read and write
109B000
heap
page read and write
429000
unkown
page execute and read and write
1334000
heap
page read and write
2A5F000
stack
page read and write
3AFE000
stack
page read and write
420F000
stack
page read and write
4D8E000
stack
page read and write
1D65F000
stack
page read and write
522E000
stack
page read and write
4C71000
heap
page read and write
971000
unkown
page execute and write copy
35DF000
stack
page read and write
1D7AD000
stack
page read and write
10FB000
stack
page read and write
1334000
heap
page read and write
1335000
heap
page read and write
FC0000
heap
page read and write
1335000
heap
page read and write
1334000
heap
page read and write
3FDF000
stack
page read and write
1334000
heap
page read and write
399000
unkown
page execute and read and write
1334000
heap
page read and write
42DF000
stack
page read and write
352F000
stack
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
3B1E000
stack
page read and write
545F000
stack
page read and write
2F2F000
stack
page read and write
2D2000
unkown
page execute and write copy
483000
unkown
page execute and write copy
4FDC000
stack
page read and write
4C71000
heap
page read and write
34DE000
stack
page read and write
474E000
stack
page read and write
1334000
heap
page read and write
4E91000
heap
page read and write
246000
unkown
page execute and write copy
46F0000
direct allocation
page read and write
48D1000
heap
page read and write
5C4000
heap
page read and write
4B21000
heap
page read and write
1334000
heap
page read and write
C73000
heap
page read and write
360E000
stack
page read and write
3D8E000
stack
page read and write
4B21000
heap
page read and write
1D5CB000
heap
page read and write
4C94000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
4A31000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
107B000
stack
page read and write
1334000
heap
page read and write
460F000
stack
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
12BD000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
52C0000
direct allocation
page execute and read and write
1D5EE000
heap
page read and write
4C71000
heap
page read and write
2E10000
direct allocation
page read and write
1270000
heap
page read and write
439E000
stack
page read and write
61ECD000
direct allocation
page readonly
4A6F000
stack
page read and write
4C71000
heap
page read and write
1D5E8000
heap
page read and write
449000
unkown
page execute and write copy
3EDE000
stack
page read and write
4B21000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
DF4000
heap
page read and write
32AE000
stack
page read and write
4A31000
heap
page read and write
48C0000
direct allocation
page read and write
4C71000
heap
page read and write
405F000
stack
page read and write
D60000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
16F8000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
4FA0000
direct allocation
page read and write
4D4F000
stack
page read and write
1334000
heap
page read and write
2D9000
unkown
page write copy
4C71000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
BB2000
unkown
page execute and write copy
2730000
heap
page read and write
1334000
heap
page read and write
41E000
unkown
page execute and write copy
1D5ED000
heap
page read and write
5320000
direct allocation
page read and write
54A0000
direct allocation
page execute and read and write
1334000
heap
page read and write
4C71000
heap
page read and write
349F000
stack
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
424000
unkown
page execute and write copy
1070000
heap
page read and write
1334000
heap
page read and write
1335000
heap
page read and write
D1A000
unkown
page execute and read and write
4CC0000
direct allocation
page execute and read and write
4CD0000
trusted library allocation
page read and write
74CF000
stack
page read and write
313E000
stack
page read and write
E1D000
unkown
page execute and read and write
48C0000
direct allocation
page read and write
232000
unkown
page execute and read and write
46F0000
direct allocation
page read and write
4B21000
heap
page read and write
676F000
stack
page read and write
BB9000
unkown
page write copy
1335000
heap
page read and write
E3F000
unkown
page execute and write copy
4D4000
unkown
page execute and read and write
4F20000
direct allocation
page execute and read and write
5074000
trusted library allocation
page read and write
1334000
heap
page read and write
424E000
stack
page read and write
4C71000
heap
page read and write
4F41000
heap
page read and write
4A31000
heap
page read and write
41D000
unkown
page execute and read and write
2E10000
direct allocation
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
DCF000
unkown
page execute and read and write
DF4000
heap
page read and write
5280000
direct allocation
page execute and read and write
48C0000
direct allocation
page read and write
406E000
stack
page read and write
1334000
heap
page read and write
4701000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
47EE000
stack
page read and write
1334000
heap
page read and write
1284000
heap
page read and write
3CAF000
stack
page read and write
4C60000
direct allocation
page read and write
4E91000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4F41000
heap
page read and write
3B2F000
stack
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
5010000
direct allocation
page execute and read and write
4F41000
heap
page read and write
14A4000
heap
page read and write
338E000
stack
page read and write
6B7C000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
5120000
direct allocation
page execute and read and write
4E91000
heap
page read and write
1301000
heap
page read and write
5480000
direct allocation
page execute and read and write
45A000
unkown
page execute and read and write
1334000
heap
page read and write
398E000
stack
page read and write
38EF000
stack
page read and write
230000
unkown
page read and write
4C71000
heap
page read and write
4E91000
heap
page read and write
BB2000
unkown
page execute and read and write
23691000
heap
page read and write
45A000
unkown
page execute and read and write
4B40000
heap
page read and write
1334000
heap
page read and write
3C9F000
stack
page read and write
1334000
heap
page read and write
12D3000
heap
page read and write
4C71000
heap
page read and write
339E000
stack
page read and write
6F871000
unkown
page execute read
128F000
stack
page read and write
4C71000
heap
page read and write
3E4F000
stack
page read and write
4701000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
56C000
stack
page read and write
361E000
stack
page read and write
BB9000
unkown
page write copy
1334000
heap
page read and write
2D0F000
stack
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
4860000
direct allocation
page read and write
4C71000
heap
page read and write
4C90000
direct allocation
page execute and read and write
4E91000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
1D5FE000
heap
page read and write
4E91000
heap
page read and write
4C71000
heap
page read and write
4D4000
unkown
page execute and write copy
1200000
heap
page read and write
1000000
direct allocation
page read and write
4F30000
direct allocation
page read and write
429E000
stack
page read and write
4C71000
heap
page read and write
365F000
stack
page read and write
B8E000
stack
page read and write
5090000
direct allocation
page read and write
4701000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
384E000
stack
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
4F80000
direct allocation
page execute and read and write
D9A000
unkown
page execute and write copy
4AD0000
direct allocation
page read and write
1334000
heap
page read and write
D65000
unkown
page execute and write copy
4C71000
heap
page read and write
1334000
heap
page read and write
276E000
stack
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4EAC000
stack
page read and write
3CC000
unkown
page execute and write copy
436000
unkown
page execute and write copy
232000
unkown
page execute and write copy
1334000
heap
page read and write
236000
unkown
page write copy
4C71000
heap
page read and write
4F1000
unkown
page execute and read and write
4B21000
heap
page read and write
4C60000
direct allocation
page read and write
32EE000
stack
page read and write
4E91000
heap
page read and write
469F000
stack
page read and write
232000
unkown
page execute and read and write
E3F000
unkown
page execute and write copy
3D3F000
stack
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
DA4000
unkown
page execute and write copy
4E91000
heap
page read and write
389E000
stack
page read and write
5E0000
heap
page read and write
4A31000
heap
page read and write
1334000
heap
page read and write
35FE000
stack
page read and write
23963000
heap
page read and write
1334000
heap
page read and write
3EDE000
stack
page read and write
348E000
stack
page read and write
79C000
stack
page read and write
4F41000
heap
page read and write
46F0000
direct allocation
page read and write
1000000
direct allocation
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
F90000
heap
page read and write
E63000
unkown
page execute and write copy
457000
unkown
page execute and write copy
352E000
stack
page read and write
E4D000
unkown
page execute and write copy
4C71000
heap
page read and write
38AF000
stack
page read and write
34FE000
stack
page read and write
4B21000
heap
page read and write
C55000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
BC6000
unkown
page execute and read and write
4AD0000
direct allocation
page read and write
D5B000
unkown
page execute and write copy
4E91000
heap
page read and write
E2D000
unkown
page execute and read and write
1334000
heap
page read and write
4CAA000
trusted library allocation
page execute and read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4701000
heap
page read and write
230000
unkown
page read and write
1290000
direct allocation
page read and write
4F30000
direct allocation
page read and write
4C60000
direct allocation
page read and write
1334000
heap
page read and write
1335000
heap
page read and write
1334000
heap
page read and write
5F44000
heap
page read and write
2FBE000
stack
page read and write
1335000
heap
page read and write
23A000
unkown
page execute and write copy
4A31000
heap
page read and write
5A4000
unkown
page execute and read and write
1334000
heap
page read and write
487000
unkown
page execute and read and write
1000000
direct allocation
page read and write
5280000
direct allocation
page execute and read and write
1D5FE000
heap
page read and write
1278000
heap
page read and write
1D5E3000
heap
page read and write
4F41000
heap
page read and write
1D5EE000
heap
page read and write
4E91000
heap
page read and write
1334000
heap
page read and write
236000
unkown
page write copy
4C71000
heap
page read and write
1335000
heap
page read and write
3E9000
unkown
page execute and write copy
2A670000
heap
page read and write
4A31000
heap
page read and write
5CE0000
heap
page read and write
37AF000
stack
page read and write
39B000
unkown
page execute and write copy
1334000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
2EEF000
stack
page read and write
2E10000
direct allocation
page read and write
DD4000
unkown
page execute and read and write
4C71000
heap
page read and write
310E000
stack
page read and write
5F44000
heap
page read and write
4F30000
direct allocation
page read and write
385F000
stack
page read and write
489F000
stack
page read and write
1335000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
D3F000
unkown
page execute and write copy
4EC0000
direct allocation
page read and write
30FE000
stack
page read and write
B50000
unkown
page readonly
442E000
stack
page read and write
56D000
unkown
page execute and read and write
1334000
heap
page read and write
4C71000
heap
page read and write
6CE000
unkown
page execute and read and write
F7E000
stack
page read and write
3C1F000
stack
page read and write
138B000
heap
page read and write
47B000
unkown
page execute and write copy
127D000
heap
page read and write
4EC0000
direct allocation
page read and write
4B21000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
6CF000
unkown
page execute and write copy
5431000
trusted library allocation
page read and write
D84000
unkown
page execute and read and write
51EB000
stack
page read and write
423000
unkown
page execute and read and write
48C0000
direct allocation
page read and write
1334000
heap
page read and write
4701000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
1334000
heap
page read and write
5090000
direct allocation
page read and write
2DB000
unkown
page execute and write copy
4B21000
heap
page read and write
39BF000
stack
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
23736000
heap
page read and write
4E91000
heap
page read and write
246000
unkown
page execute and write copy
1277000
heap
page read and write
42AF000
stack
page read and write
499F000
stack
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
5420000
heap
page execute and read and write
DDA000
unkown
page execute and write copy
4C71000
heap
page read and write
408000
unkown
page execute and read and write
2B37000
heap
page read and write
4C4000
unkown
page execute and write copy
1334000
heap
page read and write
4B21000
heap
page read and write
2DE7000
heap
page read and write
52B0000
direct allocation
page execute and read and write
4C71000
heap
page read and write
52E0000
direct allocation
page execute and read and write
47AF000
stack
page read and write
4A31000
heap
page read and write
312F000
stack
page read and write
12CB000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
A50000
heap
page read and write
4A2F000
stack
page read and write
5470000
direct allocation
page execute and read and write
50DF000
stack
page read and write
1334000
heap
page read and write
D33000
unkown
page execute and read and write
4C71000
heap
page read and write
E63000
unkown
page execute and read and write
4701000
heap
page read and write
793E000
heap
page read and write
1335000
heap
page read and write
3AB000
unkown
page execute and read and write
4C6B000
stack
page read and write
E63000
unkown
page execute and write copy
4B8000
unkown
page execute and read and write
FEE000
heap
page read and write
E52000
unkown
page execute and read and write
4BA000
unkown
page execute and write copy
1D5D7000
heap
page read and write
477F000
stack
page read and write
6C7EF000
unkown
page readonly
4C71000
heap
page read and write
5100000
direct allocation
page execute and read and write
427F000
stack
page read and write
1334000
heap
page read and write
9E0000
heap
page read and write
459E000
stack
page read and write
48C0000
direct allocation
page read and write
4C71000
heap
page read and write
4C5F000
stack
page read and write
4B6E000
stack
page read and write
1334000
heap
page read and write
14A4000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
5320000
direct allocation
page execute and read and write
4D9E000
stack
page read and write
14A4000
heap
page read and write
BB9000
unkown
page write copy
BB9000
unkown
page write copy
BB2000
unkown
page execute and write copy
48D0000
heap
page read and write
4A40000
heap
page read and write
1D5E7000
heap
page read and write
4E91000
heap
page read and write
D9E000
unkown
page execute and write copy
4C71000
heap
page read and write
4F30000
direct allocation
page read and write
437F000
stack
page read and write
2E97000
heap
page read and write
1334000
heap
page read and write
4A31000
heap
page read and write
DF4000
heap
page read and write
167F000
stack
page read and write
DF8000
unkown
page execute and read and write
1334000
heap
page read and write
D72000
unkown
page execute and write copy
4C71000
heap
page read and write
461F000
stack
page read and write
B1F000
stack
page read and write
2E2D000
heap
page read and write
4F50000
direct allocation
page execute and read and write
4C71000
heap
page read and write
48C0000
direct allocation
page read and write
4C71000
heap
page read and write
14A4000
heap
page read and write
3EBE000
stack
page read and write
387F000
stack
page read and write
4C71000
heap
page read and write
4C0F000
stack
page read and write
230000
unkown
page readonly
BBB000
unkown
page execute and write copy
1D5FF000
heap
page read and write
E63000
unkown
page execute and write copy
4A31000
heap
page read and write
6D40000
trusted library allocation
page read and write
1250000
heap
page read and write
4F30000
direct allocation
page read and write
4844000
trusted library allocation
page read and write
DF6000
unkown
page execute and write copy
4A31000
heap
page read and write
DD5000
unkown
page execute and write copy
3FA000
unkown
page execute and read and write
DD5000
unkown
page execute and write copy
15BF000
stack
page read and write
4C4000
unkown
page execute and write copy
3EBF000
stack
page read and write
334F000
stack
page read and write
1D60C000
heap
page read and write
DD3000
unkown
page execute and write copy
4C71000
heap
page read and write
4C20000
trusted library allocation
page read and write
DA3000
unkown
page execute and read and write
4B21000
heap
page read and write
523F000
stack
page read and write
1020000
heap
page read and write
1334000
heap
page read and write
49D0000
trusted library allocation
page read and write
BBB000
unkown
page execute and write copy
970000
unkown
page read and write
1334000
heap
page read and write
50E0000
heap
page read and write
1D60C000
heap
page read and write
4C71000
heap
page read and write
1013000
unkown
page execute and write copy
434F000
stack
page read and write
3BCF000
stack
page read and write
1334000
heap
page read and write
449000
unkown
page execute and write copy
1D5E3000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4C90000
trusted library allocation
page read and write
1334000
heap
page read and write
B50000
unkown
page readonly
325E000
stack
page read and write
512E000
stack
page read and write
4C71000
heap
page read and write
362F000
stack
page read and write
4E4E000
stack
page read and write
432E000
stack
page read and write
2E10000
direct allocation
page read and write
1335000
heap
page read and write
31CB000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
4C30000
direct allocation
page read and write
1334000
heap
page read and write
D9D000
unkown
page execute and read and write
4D70000
trusted library allocation
page read and write
4C71000
heap
page read and write
2D9F000
stack
page read and write
439000
unkown
page execute and read and write
4AD0000
direct allocation
page read and write
428E000
stack
page read and write
1D5E8000
heap
page read and write
453E000
stack
page read and write
4F41000
heap
page read and write
14A4000
heap
page read and write
2A560000
heap
page read and write
4C71000
heap
page read and write
E63000
unkown
page execute and read and write
4C71000
heap
page read and write
2F7F000
stack
page read and write
1334000
heap
page read and write
E4E000
unkown
page execute and write copy
E4D000
unkown
page execute and read and write
4C71000
heap
page read and write
31C7000
heap
page read and write
1334000
heap
page read and write
49E0000
trusted library allocation
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
23A000
unkown
page execute and write copy
502000
unkown
page execute and read and write
598C000
stack
page read and write
1290000
direct allocation
page read and write
333F000
stack
page read and write
4C71000
heap
page read and write
5020000
direct allocation
page execute and read and write
4B21000
heap
page read and write
BB9000
unkown
page write copy
4A30000
heap
page read and write
13DF000
heap
page read and write
301F000
stack
page read and write
4AE1000
heap
page read and write
1334000
heap
page read and write
E52000
unkown
page execute and read and write
1260000
heap
page read and write
1334000
heap
page read and write
144E000
stack
page read and write
2DB0000
heap
page read and write
4B21000
heap
page read and write
335F000
stack
page read and write
46F0000
direct allocation
page read and write
2DB000
unkown
page execute and read and write
1334000
heap
page read and write
46A1000
heap
page read and write
4E91000
heap
page read and write
B51000
unkown
page execute and write copy
4E91000
heap
page read and write
1028000
heap
page read and write
4D20000
trusted library allocation
page execute and read and write
419F000
stack
page read and write
1334000
heap
page read and write
4E91000
heap
page read and write
4B21000
heap
page read and write
1334000
heap
page read and write
4E91000
heap
page read and write
E54000
unkown
page execute and write copy
2930000
direct allocation
page read and write
DD9000
unkown
page execute and read and write
23650000
trusted library allocation
page read and write
4B21000
heap
page read and write
5090000
direct allocation
page read and write
4BE0000
heap
page read and write
49B0000
direct allocation
page execute and read and write
BB9000
unkown
page write copy
399F000
stack
page read and write
4C71000
heap
page read and write
1290000
direct allocation
page read and write
4AFB000
heap
page read and write
1334000
heap
page read and write
E41000
unkown
page execute and write copy
14A4000
heap
page read and write
4C71000
heap
page read and write
2E3F000
stack
page read and write
4A50000
heap
page read and write
5356000
direct allocation
page read and write
4AD0000
direct allocation
page read and write
5250000
direct allocation
page execute and read and write
DA4000
unkown
page execute and write copy
4E91000
heap
page read and write
374E000
stack
page read and write
3B9E000
stack
page read and write
4B21000
heap
page read and write
456F000
stack
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
429E000
stack
page read and write
1335000
heap
page read and write
50E0000
direct allocation
page execute and read and write
4C71000
heap
page read and write
1334000
heap
page read and write
6455000
trusted library allocation
page read and write
4E91000
heap
page read and write
4C71000
heap
page read and write
5040000
direct allocation
page execute and read and write
5150000
direct allocation
page execute and read and write
B51000
unkown
page execute and write copy
4F41000
heap
page read and write
1334000
heap
page read and write
4B0E000
stack
page read and write
2D6C000
stack
page read and write
4EE0000
direct allocation
page execute and read and write
4F30000
direct allocation
page execute and read and write
4A31000
heap
page read and write
BB2000
unkown
page execute and write copy
4C71000
heap
page read and write
31B0000
direct allocation
page read and write
1D5FF000
heap
page read and write
14AE000
stack
page read and write
1D5F1000
heap
page read and write
4E91000
heap
page read and write
4F4000
unkown
page execute and read and write
2E8E000
stack
page read and write
574000
unkown
page execute and write copy
518000
unkown
page execute and read and write
1335000
heap
page read and write
4A31000
heap
page read and write
4C71000
heap
page read and write
4E91000
heap
page read and write
4C71000
heap
page read and write
4F30000
direct allocation
page read and write
D72000
unkown
page execute and write copy
3DEE000
stack
page read and write
A1E000
stack
page read and write
4F30000
direct allocation
page read and write
334E000
stack
page read and write
5280000
direct allocation
page execute and read and write
1334000
heap
page read and write
4AD0000
direct allocation
page read and write
4C71000
heap
page read and write
BC5000
unkown
page execute and write copy
450E000
stack
page read and write
49C0000
trusted library allocation
page read and write
4B21000
heap
page read and write
1D5D7000
heap
page read and write
1CF2E000
stack
page read and write
77A9000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
315F000
stack
page read and write
4A31000
heap
page read and write
401E000
stack
page read and write
120D000
stack
page read and write
DAB000
unkown
page execute and read and write
E41000
unkown
page execute and write copy
14A4000
heap
page read and write
1D60C000
heap
page read and write
380F000
stack
page read and write
48DE000
stack
page read and write
2B30000
heap
page read and write
1334000
heap
page read and write
5073000
trusted library allocation
page execute and read and write
1334000
heap
page read and write
1334000
heap
page read and write
1D5F1000
heap
page read and write
1334000
heap
page read and write
D5C000
unkown
page execute and read and write
4D6000
unkown
page execute and write copy
3C3E000
stack
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
463000
unkown
page execute and read and write
1334000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4AE1000
heap
page read and write
54A0000
direct allocation
page execute and read and write
3C3F000
stack
page read and write
1280000
heap
page read and write
1334000
heap
page read and write
BA8000
unkown
page execute and read and write
6B6B000
heap
page read and write
1334000
heap
page read and write
4A31000
heap
page read and write
1060000
heap
page read and write
C10000
heap
page read and write
38BE000
stack
page read and write
2FBF000
stack
page read and write
2C3F000
stack
page read and write
2720000
direct allocation
page read and write
4D1E000
stack
page read and write
5310000
direct allocation
page execute and read and write
6C650000
unkown
page readonly
392E000
stack
page read and write
1290000
direct allocation
page read and write
4BE000
unkown
page execute and write copy
1334000
heap
page read and write
1334000
heap
page read and write
4D6000
unkown
page execute and write copy
1334000
heap
page read and write
4B21000
heap
page read and write
4701000
heap
page read and write
D4A000
unkown
page execute and read and write
4C71000
heap
page read and write
2FFE000
stack
page read and write
487000
unkown
page execute and read and write
4C71000
heap
page read and write
1335000
heap
page read and write
4C71000
heap
page read and write
F95000
heap
page read and write
4C71000
heap
page read and write
2F2E000
stack
page read and write
4C71000
heap
page read and write
D9A000
unkown
page execute and write copy
4C71000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
4F30000
direct allocation
page read and write
448F000
stack
page read and write
1334000
heap
page read and write
4B21000
heap
page read and write
4CBB000
trusted library allocation
page execute and read and write
4C71000
heap
page read and write
4F30000
direct allocation
page read and write
A0E000
stack
page read and write
4C71000
heap
page read and write
9FD000
stack
page read and write
5270000
direct allocation
page execute and read and write
1410000
heap
page read and write
2F8F000
stack
page read and write
4A31000
heap
page read and write
496E000
stack
page read and write
4A31000
heap
page read and write
4C71000
heap
page read and write
3ECE000
stack
page read and write
4BAF000
stack
page read and write
30CF000
stack
page read and write
4C4000
unkown
page execute and write copy
1334000
heap
page read and write
4AE1000
heap
page read and write
35CF000
stack
page read and write
12B8000
heap
page read and write
4C71000
heap
page read and write
DCE000
unkown
page execute and write copy
4C80000
direct allocation
page execute and read and write
4C71000
heap
page read and write
4B21000
heap
page read and write
3C1F000
stack
page read and write
3FFE000
stack
page read and write
358F000
stack
page read and write
DD1000
unkown
page execute and read and write
1334000
heap
page read and write
2FDE000
stack
page read and write
1D5F5000
heap
page read and write
4B20000
heap
page read and write
4B21000
heap
page read and write
436000
unkown
page execute and write copy
14A4000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
BBB000
unkown
page execute and write copy
1334000
heap
page read and write
4C60000
direct allocation
page read and write
1334000
heap
page read and write
23650000
trusted library allocation
page read and write
4B2E000
stack
page read and write
4C71000
heap
page read and write
4FA0000
direct allocation
page read and write
4A31000
heap
page read and write
4C71000
heap
page read and write
BBB000
unkown
page execute and write copy
E1E000
stack
page read and write
4A31000
heap
page read and write
1334000
heap
page read and write
1D5FE000
heap
page read and write
4C71000
heap
page read and write
319E000
stack
page read and write
1334000
heap
page read and write
D9D000
unkown
page execute and read and write
1000000
direct allocation
page read and write
1334000
heap
page read and write
4A31000
heap
page read and write
14BE000
stack
page read and write
4A31000
heap
page read and write
40FF000
stack
page read and write
DCF000
unkown
page execute and read and write
1334000
heap
page read and write
4C71000
heap
page read and write
8E4D000
stack
page read and write
872000
unkown
page execute and read and write
1334000
heap
page read and write
1334000
heap
page read and write
46AF000
stack
page read and write
3AB000
unkown
page execute and read and write
584D000
stack
page read and write
2940000
direct allocation
page execute and read and write
6525000
heap
page read and write
14A4000
heap
page read and write
1110000
heap
page read and write
5A4D000
stack
page read and write
4A4000
unkown
page execute and read and write
4F41000
heap
page read and write
69EF000
stack
page read and write
47BE000
stack
page read and write
48C0000
direct allocation
page read and write
1D41E000
stack
page read and write
4E91000
heap
page read and write
1D60C000
heap
page read and write
344F000
stack
page read and write
457000
unkown
page execute and write copy
1334000
heap
page read and write
4C80000
direct allocation
page execute and read and write
4C71000
heap
page read and write
394F000
stack
page read and write
D67000
unkown
page execute and read and write
1334000
heap
page read and write
1335000
heap
page read and write
2F3E000
stack
page read and write
1334000
heap
page read and write
4E91000
heap
page read and write
1334000
heap
page read and write
4A31000
heap
page read and write
237BE000
stack
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
1236000
heap
page read and write
8E0C000
stack
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
23A000
unkown
page execute and read and write
4B21000
heap
page read and write
4C71000
heap
page read and write
46F0000
direct allocation
page read and write
1D5E7000
heap
page read and write
1334000
heap
page read and write
3D7F000
stack
page read and write
1334000
heap
page read and write
450000
unkown
page execute and read and write
397F000
stack
page read and write
4DF000
unkown
page execute and write copy
4C71000
heap
page read and write
61ED4000
direct allocation
page readonly
C28000
heap
page read and write
3E9000
unkown
page execute and write copy
1334000
heap
page read and write
1334000
heap
page read and write
1335000
heap
page read and write
4F41000
heap
page read and write
1D5F1000
heap
page read and write
D84000
unkown
page execute and read and write
1334000
heap
page read and write
2E10000
direct allocation
page read and write
2E8C000
stack
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
4C8D000
trusted library allocation
page execute and read and write
4F41000
heap
page read and write
2F40000
heap
page read and write
1334000
heap
page read and write
6F902000
unkown
page readonly
1334000
heap
page read and write
28EE000
stack
page read and write
61E00000
direct allocation
page execute and read and write
52F0000
heap
page read and write
3A8F000
stack
page read and write
4C71000
heap
page read and write
DF4000
heap
page read and write
1290000
direct allocation
page read and write
236B1000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
3D0000
unkown
page execute and read and write
4ECE000
stack
page read and write
A06000
unkown
page execute and read and write
5C4000
heap
page read and write
FD0000
heap
page read and write
3F8F000
stack
page read and write
1334000
heap
page read and write
5C4000
heap
page read and write
366F000
stack
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
1D5F1000
heap
page read and write
1D1CE000
stack
page read and write
FE5000
heap
page read and write
4C80000
direct allocation
page execute and read and write
6B87000
heap
page read and write
1400000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
4C30000
direct allocation
page read and write
D43000
unkown
page execute and write copy
4C71000
heap
page read and write
48C0000
direct allocation
page read and write
154E000
stack
page read and write
1334000
heap
page read and write
5100000
direct allocation
page read and write
1334000
heap
page read and write
14A4000
heap
page read and write
2D3E000
stack
page read and write
50C0000
direct allocation
page execute and read and write
4F41000
heap
page read and write
4D6000
unkown
page execute and write copy
14A4000
heap
page read and write
DF4000
heap
page read and write
561000
unkown
page execute and write copy
2737000
heap
page read and write
1D60C000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
4B21000
heap
page read and write
DF4000
heap
page read and write
3D4E000
stack
page read and write
1D16E000
stack
page read and write
4A31000
heap
page read and write
1D1000
unkown
page execute and write copy
4C71000
heap
page read and write
37DE000
stack
page read and write
4F0000
unkown
page execute and write copy
10AF000
heap
page read and write
2E9B000
heap
page read and write
4A31000
heap
page read and write
1334000
heap
page read and write
4830000
trusted library allocation
page read and write
46F0000
direct allocation
page read and write
4B21000
heap
page read and write
4C60000
direct allocation
page read and write
41D000
unkown
page execute and read and write
4C71000
heap
page read and write
1D5D9000
heap
page read and write
5030000
direct allocation
page execute and read and write
4C71000
heap
page read and write
31B0000
direct allocation
page read and write
4C80000
direct allocation
page execute and read and write
4C71000
heap
page read and write
4E90000
heap
page read and write
1335000
heap
page read and write
479E000
stack
page read and write
DF4000
heap
page read and write
4C71000
heap
page read and write
DF6000
unkown
page execute and write copy
1334000
heap
page read and write
1334000
heap
page read and write
6CE000
unkown
page execute and write copy
401E000
stack
page read and write
4800000
trusted library allocation
page read and write
2DAE000
stack
page read and write
4D40000
heap
page read and write
48C0000
direct allocation
page read and write
1334000
heap
page read and write
1D41D000
stack
page read and write
178D000
stack
page read and write
1D5E3000
heap
page read and write
E4D000
unkown
page execute and write copy
4C71000
heap
page read and write
1334000
heap
page read and write
1D31D000
stack
page read and write
1D5F1000
heap
page read and write
320F000
stack
page read and write
1334000
heap
page read and write
4AE1000
heap
page read and write
5090000
direct allocation
page execute and read and write
1334000
heap
page read and write
731E000
stack
page read and write
12EB000
heap
page read and write
1334000
heap
page read and write
383F000
stack
page read and write
1D5E8000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
306E000
stack
page read and write
DBF000
unkown
page execute and write copy
4E91000
heap
page read and write
6C830000
unkown
page read and write
4AD0000
direct allocation
page read and write
4A31000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4A31000
heap
page read and write
474F000
stack
page read and write
4C71000
heap
page read and write
2E10000
direct allocation
page read and write
4C71000
heap
page read and write
E55000
unkown
page execute and read and write
2E4F000
stack
page read and write
47A0000
trusted library allocation
page read and write
4E91000
heap
page read and write
4C71000
heap
page read and write
4A31000
heap
page read and write
4C71000
heap
page read and write
4A31000
heap
page read and write
4C70000
heap
page read and write
4C71000
heap
page read and write
4A31000
heap
page read and write
2A66C000
stack
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
379F000
stack
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
DAB000
unkown
page execute and read and write
305E000
stack
page read and write
3D5F000
stack
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
376F000
stack
page read and write
5040000
direct allocation
page execute and read and write
FEA000
heap
page read and write
D1C000
unkown
page execute and write copy
E6E000
unkown
page execute and read and write
5300000
direct allocation
page execute and read and write
41E000
unkown
page execute and write copy
4C71000
heap
page read and write
4E91000
heap
page read and write
2C0F000
stack
page read and write
1334000
heap
page read and write
31B0000
direct allocation
page read and write
1334000
heap
page read and write
1D5F1000
heap
page read and write
1334000
heap
page read and write
3ABE000
stack
page read and write
4C60000
direct allocation
page read and write
17AE000
stack
page read and write
4C71000
heap
page read and write
DD9000
unkown
page execute and read and write
1312000
heap
page read and write
6B69000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
4C80000
direct allocation
page execute and read and write
4B21000
heap
page read and write
442F000
stack
page read and write
4C71000
heap
page read and write
3E1E000
stack
page read and write
1334000
heap
page read and write
3D9E000
stack
page read and write
4F40000
heap
page read and write
4C71000
heap
page read and write
2B5F000
stack
page read and write
4C71000
heap
page read and write
4B21000
heap
page read and write
1000000
direct allocation
page read and write
3E7F000
stack
page read and write
1334000
heap
page read and write
43CE000
stack
page read and write
2DF0000
heap
page read and write
DF4000
heap
page read and write
457000
unkown
page execute and write copy
6B5C000
stack
page read and write
14A4000
heap
page read and write
356E000
stack
page read and write
68AF000
stack
page read and write
1334000
heap
page read and write
413F000
stack
page read and write
E54000
unkown
page execute and write copy
1334000
heap
page read and write
7930000
heap
page read and write
2E4F000
stack
page read and write
12D3000
heap
page read and write
1334000
heap
page read and write
43DE000
stack
page read and write
464E000
stack
page read and write
6D3D000
stack
page read and write
4A31000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
283F000
stack
page read and write
385F000
stack
page read and write
14A4000
heap
page read and write
424F000
stack
page read and write
236000
unkown
page write copy
4C71000
heap
page read and write
1334000
heap
page read and write
4A31000
heap
page read and write
4C71000
heap
page read and write
D3F000
unkown
page execute and read and write
4C71000
heap
page read and write
337000
unkown
page execute and read and write
11AE000
stack
page read and write
1334000
heap
page read and write
53FE000
stack
page read and write
1334000
heap
page read and write
46F0000
direct allocation
page read and write
39B000
unkown
page execute and write copy
4E91000
heap
page read and write
4C71000
heap
page read and write
2B07000
heap
page read and write
1D5FF000
heap
page read and write
4C71000
heap
page read and write
4F30000
direct allocation
page read and write
4C71000
heap
page read and write
48C0000
direct allocation
page read and write
4C71000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
1334000
heap
page read and write
54B0000
direct allocation
page execute and read and write
48DE000
stack
page read and write
363E000
stack
page read and write
4C71000
heap
page read and write
4C5F000
stack
page read and write
E3E000
stack
page read and write
1D60C000
heap
page read and write
35BF000
stack
page read and write
482E000
stack
page read and write
1334000
heap
page read and write
1680000
heap
page read and write
4BA1000
trusted library allocation
page read and write
1D5F1000
heap
page read and write
DD1000
unkown
page execute and read and write
4C71000
heap
page read and write
3C0E000
stack
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
DE0000
heap
page read and write
1334000
heap
page read and write
4D6000
unkown
page execute and write copy
4A31000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
8F4F000
stack
page read and write
462000
unkown
page execute and write copy
DAB000
unkown
page execute and read and write
4A31000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
2E6000
unkown
page execute and read and write
1334000
heap
page read and write
1334000
heap
page read and write
3F2F000
stack
page read and write
330F000
stack
page read and write
4A31000
heap
page read and write
2DEE000
stack
page read and write
4E2000
unkown
page execute and read and write
389E000
stack
page read and write
D4A000
unkown
page execute and read and write
1D5FF000
heap
page read and write
4C71000
heap
page read and write
E54000
unkown
page execute and write copy
1306000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
2D2000
unkown
page execute and read and write
B50000
unkown
page read and write
DF4000
heap
page read and write
61ECC000
direct allocation
page read and write
4A31000
heap
page read and write
5C4000
heap
page read and write
14A4000
heap
page read and write
1020000
heap
page read and write
1335000
heap
page read and write
6526000
heap
page read and write
D1C000
unkown
page execute and write copy
1250000
heap
page read and write
D5B000
unkown
page execute and write copy
4C71000
heap
page read and write
4E91000
heap
page read and write
BC5000
unkown
page execute and write copy
4E91000
heap
page read and write
E4E000
unkown
page execute and write copy
3CDE000
stack
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
3BFF000
stack
page read and write
33EF000
stack
page read and write
1334000
heap
page read and write
323F000
stack
page read and write
1000000
direct allocation
page read and write
1334000
heap
page read and write
4EE000
unkown
page execute and write copy
302F000
stack
page read and write
1334000
heap
page read and write
1D5EE000
heap
page read and write
BC7000
unkown
page execute and write copy
4AD0000
direct allocation
page read and write
1D5D7000
heap
page read and write
DD0000
unkown
page execute and write copy
4B21000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
320B000
stack
page read and write
4B21000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
5BA2000
trusted library allocation
page read and write
1334000
heap
page read and write
4F10000
heap
page read and write
4C71000
heap
page read and write
387E000
stack
page read and write
6520000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
4D20000
direct allocation
page execute and read and write
4C71000
heap
page read and write
4AE0000
heap
page read and write
E4E000
unkown
page execute and write copy
D1A000
unkown
page execute and read and write
4B8000
unkown
page execute and read and write
E6E000
unkown
page execute and write copy
411F000
stack
page read and write
1334000
heap
page read and write
45CE000
stack
page read and write
4C71000
heap
page read and write
5260000
direct allocation
page execute and read and write
1334000
heap
page read and write
77A0000
heap
page read and write
1334000
heap
page read and write
463F000
stack
page read and write
2F50000
heap
page read and write
3D5F000
stack
page read and write
C0E000
stack
page read and write
1334000
heap
page read and write
4D30000
trusted library allocation
page read and write
1000000
direct allocation
page read and write
302F000
stack
page read and write
1000000
direct allocation
page read and write
45F000
unkown
page execute and write copy
50FB000
trusted library allocation
page execute and read and write
1D5F1000
heap
page read and write
3E9F000
stack
page read and write
4C71000
heap
page read and write
4F70000
direct allocation
page execute and read and write
326F000
stack
page read and write
1334000
heap
page read and write
5D0000
heap
page read and write
4C4000
unkown
page execute and write copy
4A31000
heap
page read and write
3ADF000
stack
page read and write
4B21000
heap
page read and write
49DF000
stack
page read and write
4C71000
heap
page read and write
DF4000
heap
page read and write
375E000
stack
page read and write
52A0000
direct allocation
page execute and read and write
1335000
heap
page read and write
1290000
direct allocation
page read and write
61EB4000
direct allocation
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
3B5F000
stack
page read and write
3DEF000
stack
page read and write
4CB000
unkown
page execute and read and write
4C71000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
492E000
stack
page read and write
1334000
heap
page read and write
2D3F000
stack
page read and write
4C71000
heap
page read and write
31C0000
heap
page read and write
369E000
stack
page read and write
4B21000
heap
page read and write
4E91000
heap
page read and write
4701000
heap
page read and write
4EB0000
heap
page read and write
4A31000
heap
page read and write
4F10000
direct allocation
page execute and read and write
4C71000
heap
page read and write
50EA000
trusted library allocation
page execute and read and write
1334000
heap
page read and write
5130000
direct allocation
page execute and read and write
7931000
heap
page read and write
489F000
stack
page read and write
4CD0000
direct allocation
page execute and read and write
4C71000
heap
page read and write
4A31000
heap
page read and write
1334000
heap
page read and write
4C80000
heap
page read and write
406000
unkown
page execute and write copy
349F000
stack
page read and write
1334000
heap
page read and write
45F000
unkown
page execute and read and write
DA3000
unkown
page execute and read and write
1D5E7000
heap
page read and write
2BBF000
stack
page read and write
35CE000
stack
page read and write
68EE000
stack
page read and write
4C71000
heap
page read and write
14A4000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
6FA0000
trusted library allocation
page read and write
1D3DF000
stack
page read and write
439F000
stack
page read and write
4E91000
heap
page read and write
4B70000
trusted library allocation
page execute and read and write
D1C000
unkown
page execute and write copy
31FF000
stack
page read and write
1334000
heap
page read and write
6105000
trusted library allocation
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
4F41000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
455F000
stack
page read and write
14A4000
heap
page read and write
315F000
stack
page read and write
DD5000
unkown
page execute and write copy
238C0000
trusted library allocation
page read and write
4C71000
heap
page read and write
2E10000
direct allocation
page read and write
1334000
heap
page read and write
375E000
stack
page read and write
4B21000
heap
page read and write
31AE000
stack
page read and write
4F60000
trusted library allocation
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
12D4000
heap
page read and write
1334000
heap
page read and write
4701000
heap
page read and write
14A4000
heap
page read and write
4C71000
heap
page read and write
4A31000
heap
page read and write
4C71000
heap
page read and write
488E000
stack
page read and write
14A4000
heap
page read and write
4C71000
heap
page read and write
445E000
stack
page read and write
5040000
direct allocation
page execute and read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
46F0000
direct allocation
page read and write
4E91000
heap
page read and write
4A31000
heap
page read and write
4E91000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
5C4000
heap
page read and write
5C4000
heap
page read and write
414E000
stack
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
3CC000
unkown
page execute and write copy
1334000
heap
page read and write
52AD000
stack
page read and write
137F000
stack
page read and write
4C71000
heap
page read and write
52C0000
trusted library allocation
page read and write
4AB0000
direct allocation
page read and write
1334000
heap
page read and write
4B21000
heap
page read and write
40C000
unkown
page execute and write copy
D5C000
unkown
page execute and read and write
436000
unkown
page execute and write copy
4E91000
heap
page read and write
7940000
heap
page read and write
2E10000
direct allocation
page read and write
1334000
heap
page read and write
4C80000
direct allocation
page execute and read and write
36AE000
stack
page read and write
4C71000
heap
page read and write
3B6000
unkown
page execute and read and write
4C71000
heap
page read and write
5470000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
348F000
stack
page read and write
337E000
stack
page read and write
34DE000
stack
page read and write
5080000
direct allocation
page execute and read and write
5060000
direct allocation
page execute and read and write
1334000
heap
page read and write
4B21000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
232000
unkown
page execute and write copy
4C71000
heap
page read and write
1334000
heap
page read and write
4B21000
heap
page read and write
4F50000
heap
page read and write
35FF000
stack
page read and write
D65000
unkown
page execute and write copy
236000
unkown
page write copy
1D5D7000
heap
page read and write
1334000
heap
page read and write
5C4000
heap
page read and write
1334000
heap
page read and write
4C71000
heap
page read and write
3FBF000
stack
page read and write
47C000
unkown
page execute and read and write
5040000
trusted library allocation
page read and write
4EE0000
direct allocation
page execute and read and write
1334000
heap
page read and write
4B1F000
stack
page read and write
50DF000
stack
page read and write
50F0000
trusted library allocation
page read and write
4A31000
heap
page read and write
BBB000
unkown
page execute and read and write
3A5E000
stack
page read and write
43FE000
stack
page read and write
1335000
heap
page read and write
1334000
heap
page read and write
1290000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
6432000
trusted library allocation
page read and write
DCF000
unkown
page execute and read and write
BB2000
unkown
page execute and write copy
2FCE000
stack
page read and write
1334000
heap
page read and write
41C000
unkown
page execute and write copy
DF4000
heap
page read and write
4E91000
heap
page read and write
4B21000
heap
page read and write
1335000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
370E000
stack
page read and write
E54000
unkown
page execute and write copy
1334000
heap
page read and write
14A4000
heap
page read and write
4C71000
heap
page read and write
1334000
heap
page read and write
2957000
heap
page read and write
4C71000
heap
page read and write
48EF000
stack
page read and write
4C71000
heap
page read and write
There are 2844 hidden memdumps, click here to show them.