IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\GuardTech Solutions\K
data
dropped
malicious
C:\Users\user\AppData\Local\GuardTech Solutions\LionGuard.js
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\GuardTech Solutions\LionGuard.scr
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\InnoSphere Dynamics\InnoSphere.scr
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\InnoSphere Dynamics\l
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[1].exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[2].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\QwGWuQZ[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\fMb18eF[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1008733001\779ae05f2f.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1008738001\fMb18eF.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1008743001\QwGWuQZ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1008744001\3907f97605.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1008745001\3ee5495637.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1008746001\04dc07bf76.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1008747001\c7f41aa061.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\662510\A
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\662510\Ryan.com
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\768032\Finish.com
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\768032\G
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\All
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Become
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Bermuda
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Blond
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Bt
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Cameras
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Candidates
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Client
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Contained
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Courts
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Dallas
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Defend
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Dist
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Distribution
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Ecommerce
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Editor
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Enabling
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Extensive
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Falls
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Fw
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Howard
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Id
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Kg
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Lady
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Los
OpenPGP Public Key
dropped
malicious
C:\Users\user\AppData\Local\Temp\Love
DOS executable (COM)
dropped
malicious
C:\Users\user\AppData\Local\Temp\Malta
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Mel
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Mental
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\More
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Myers
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Optimum
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Parameter
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Participation
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Principal
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Quantitative
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Raise
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Remedy
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Republicans
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Rocky
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Statement
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Strange
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Streams
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Tablets
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Tests
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Tft
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Thursday
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Tourist
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Transsexual
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Unit
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Vatican
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Vermont
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Webmaster
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\William
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Wow
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LionGuard.url
MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\GuardTech Solutions\LionGuard.js" >), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\InnoSphere Dynamics\InnoSphere.js
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\c7f41aa061.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\Config
ASCII text, with very long lines (5591), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Config.cmd
ASCII text, with very long lines (5591), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Feeling
ASCII text, with very long lines (1181), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Feeling.cmd
ASCII text, with very long lines (1181), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\InnoSphere.url
MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\InnoSphere Dynamics\InnoSphere.js" >), ASCII text, with CRLF line terminators
dropped
C:\Windows\Tasks\skotes.job
data
dropped
Chrome Cache Entry: 135
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 136
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 137
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 138
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 139
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 140
JSON data
downloaded
Chrome Cache Entry: 141
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 142
ASCII text
downloaded
Chrome Cache Entry: 143
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 144
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 145
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 146
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 147
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 148
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 149
JSON data
downloaded
Chrome Cache Entry: 150
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 151
JSON data
downloaded
Chrome Cache Entry: 152
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
downloaded
Chrome Cache Entry: 153
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 154
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 155
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 156
JSON data
downloaded
There are 103 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1008733001\779ae05f2f.exe
"C:\Users\user\AppData\Local\Temp\1008733001\779ae05f2f.exe"
malicious
C:\Users\user\AppData\Local\Temp\1008738001\fMb18eF.exe
"C:\Users\user\AppData\Local\Temp\1008738001\fMb18eF.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c copy Config Config.cmd && Config.cmd
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa opssvc"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 662510
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Cameras + ..\Webmaster + ..\Contained + ..\More + ..\Wow + ..\Kg + ..\Love + ..\Parameter + ..\Dallas + ..\Falls + ..\Principal + ..\Tft + ..\Enabling + ..\Id + ..\Raise + ..\Tests + ..\Fw + ..\Dist + ..\Optimum + ..\Editor + ..\Lady + ..\William + ..\Myers + ..\Distribution + ..\All + ..\Republicans + ..\Candidates + ..\Blond + ..\Bermuda + ..\Tablets + ..\Defend + ..\Statement + ..\Streams + ..\Extensive + ..\Ecommerce + ..\Tourist + ..\Transsexual + ..\Participation + ..\Strange + ..\Remedy + ..\Thursday + ..\Client + ..\Courts + ..\Malta + ..\Mel + ..\Quantitative A
malicious
C:\Users\user\AppData\Local\Temp\662510\Ryan.com
Ryan.com A
malicious
C:\Windows\System32\cmd.exe
cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LionGuard.url" & echo URL="C:\Users\user\AppData\Local\GuardTech Solutions\LionGuard.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LionGuard.url" & exit
malicious
C:\Users\user\AppData\Local\Temp\1008743001\QwGWuQZ.exe
"C:\Users\user\AppData\Local\Temp\1008743001\QwGWuQZ.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c copy Feeling Feeling.cmd && Feeling.cmd
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa opssvc"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\GuardTech Solutions\LionGuard.js"
malicious
C:\Users\user\AppData\Local\GuardTech Solutions\LionGuard.scr
"C:\Users\user\AppData\Local\GuardTech Solutions\LionGuard.scr" "C:\Users\user\AppData\Local\GuardTech Solutions\K"
malicious
C:\Users\user\AppData\Local\Temp\1008744001\3907f97605.exe
"C:\Users\user\AppData\Local\Temp\1008744001\3907f97605.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 768032
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Howard + ..\Los + ..\Become + ..\Mental + ..\Vermont + ..\Bt + ..\Vatican G
malicious
C:\Users\user\AppData\Local\Temp\768032\Finish.com
Finish.com G
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\InnoSphere.url" & echo URL="C:\Users\user\AppData\Local\InnoSphere Dynamics\InnoSphere.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\InnoSphere.url" & exit
malicious
C:\Users\user\AppData\Local\Temp\1008745001\3ee5495637.exe
"C:\Users\user\AppData\Local\Temp\1008745001\3ee5495637.exe"
malicious
C:\Users\user\AppData\Local\Temp\1008744001\3907f97605.exe
"C:\Users\user\AppData\Local\Temp\1008744001\3907f97605.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2468 --field-trial-handle=2224,i,1451387400477687369,13867640751301481737,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\1008746001\04dc07bf76.exe
"C:\Users\user\AppData\Local\Temp\1008746001\04dc07bf76.exe"
malicious
C:\Users\user\AppData\Local\Temp\1008745001\3ee5495637.exe
"C:\Users\user\AppData\Local\Temp\1008745001\3ee5495637.exe"
malicious
C:\Users\user\AppData\Local\Temp\1008747001\c7f41aa061.exe
"C:\Users\user\AppData\Local\Temp\1008747001\c7f41aa061.exe"
malicious
C:\Users\user\AppData\Local\Temp\1008746001\04dc07bf76.exe
"C:\Users\user\AppData\Local\Temp\1008746001\04dc07bf76.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 49 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
34.116.198.130
malicious
https://property-imper.sbs/api
104.21.33.116
malicious
http://185.215.113.206/68b591d6548ec281/sqlite3.dll
185.215.113.206
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
http://anglebug.com/7760ty
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhoneX
unknown
http://crl.microsoft
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://185.215.113.43/Zu7JuNko/index.phpnu
unknown
http://31.41.244.11/files/6856384433/fMb18eF.exe
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=bX
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://google-ohttp-relay-join.fastly-edge.com/hjh%
unknown
https://property-imper.sbs/api0R
unknown
https://aka.ms/feedback/report?space=61
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
http://www.entrust.net/rpa03
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions7
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://www.autoitscript.com/autoit3/X
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347w
unknown
https://chrome.google.com/webstoreX
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.icoresent.
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://drive-daily-3.corp.googlP8
unknown
https://clients4.google.com/chrome-sync
unknown
http://crl.entrust.net/2048ca.crl0
unknown
http://31.41.244.11/files/6856384433/fMb18eF.exeXYZ0123456789
unknown
http://anglebug.com/7036a
unknown
http://html4/loose.dtd
unknown
http://unisolated.invalid/a
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://chrome.google.com/webstorekgejglhpjiefppelpmljglcjbhoiplfn
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
EaUMrTLEnhJoi.EaUMrTLEnhJoi
unknown
malicious
aXoOEZERyLjmcASXxTaZGLMxwNjgk.aXoOEZERyLjmcASXxTaZGLMxwNjgk
unknown
malicious
home.fvtekk5pn.top
34.116.198.130
services.addons.mozilla.org
151.101.1.91
property-imper.sbs
104.21.33.116
www.google.com
142.250.181.68
s-part-0035.t-0009.t-msedge.net
13.107.246.63
normandy-cdn.services.mozilla.com
35.201.103.21
fvtekk5pn.top
34.116.198.130
xmr-eu2.nanopool.org
51.15.89.13
js.monitor.azure.com
unknown
normandy.cdn.mozilla.net
unknown
mdec.nelreports.net
unknown
There are 3 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
185.215.113.206
unknown
Portugal
malicious
185.215.113.16
unknown
Portugal
239.255.255.250
unknown
Reserved
104.21.33.116
property-imper.sbs
United States
34.116.198.130
home.fvtekk5pn.top
United States
142.250.181.68
www.google.com
United States
127.0.0.1
unknown
unknown
31.41.244.11
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
3907f97605.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
3ee5495637.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
04dc07bf76.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
c7f41aa061.exe
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
691000
unkown
page execute and read and write
malicious
4C00000
direct allocation
page read and write
malicious
4860000
direct allocation
page read and write
malicious
5120000
direct allocation
page read and write
malicious
4870000
direct allocation
page read and write
malicious
A1000
unkown
page execute and read and write
malicious
5060000
direct allocation
page read and write
malicious
691000
unkown
page execute and read and write
malicious
4A80000
direct allocation
page read and write
malicious
3230000
heap
page read and write
256800320000
trusted library allocation
page read and write
4AA1000
trusted library allocation
page read and write
5818001AC000
trusted library allocation
page read and write
282E000
heap
page read and write
1142000
heap
page read and write
3BBFBFE000
unkown
page readonly
4A30000
direct allocation
page execute and read and write
284C000
heap
page read and write
1505000
trusted library allocation
page read and write
43D1000
heap
page read and write
4BD1000
heap
page read and write
1BB8AB9D000
heap
page read and write
17E4000
heap
page read and write
4AA1000
trusted library allocation
page read and write
1BB8AB8C000
heap
page read and write
3BC13FD000
stack
page read and write
26E0000
heap
page read and write
581800D6E000
trusted library allocation
page read and write
328E000
heap
page read and write
3732000
heap
page read and write
1163000
heap
page read and write
10E4000
heap
page read and write
3090000
heap
page read and write
4AA1000
trusted library allocation
page read and write
1BB8ABA0000
heap
page read and write
5A7B000
trusted library allocation
page read and write
1BB8AB8C000
heap
page read and write
6A21000
heap
page read and write
41A1000
trusted library allocation
page read and write
4205000
trusted library allocation
page read and write
3BA9BFE000
unkown
page readonly
61E4000
heap
page read and write
4D10000
direct allocation
page read and write
1BB8ABA0000
heap
page read and write
1BB8AB9D000
heap
page read and write
5818012EC000
trusted library allocation
page read and write
964000
heap
page read and write
2D10000
direct allocation
page read and write
58180075C000
trusted library allocation
page read and write
256800698000
trusted library allocation
page read and write
1BB8ABA7000
heap
page read and write
5D99000
trusted library allocation
page read and write
3A2E000
stack
page read and write
E19000
heap
page read and write
70F0000
direct allocation
page execute and read and write
581800C80000
trusted library allocation
page read and write
2C6E000
stack
page read and write
1BB8B141000
heap
page read and write
5A86000
trusted library allocation
page read and write
581800368000
trusted library allocation
page read and write
1166000
heap
page read and write
510000
direct allocation
page read and write
1BB8AB60000
heap
page read and write
41A1000
trusted library allocation
page read and write
1BB8B0F4000
heap
page read and write
2AB8000
heap
page read and write
5A84000
trusted library allocation
page read and write
43D1000
heap
page read and write
5818003A4000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
74C9000
heap
page read and write
2940000
direct allocation
page read and write
1BB8AB9D000
heap
page read and write
51B000217000
direct allocation
page read and write
3BCA3F4000
stack
page read and write
3731000
heap
page read and write
29C0A180000
unkown
page read and write
EE4000
heap
page read and write
41FD000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
1BB8AB9D000
heap
page read and write
2AF9000
heap
page read and write
7CA000
heap
page read and write
BE1000
heap
page read and write
5818001AC000
trusted library allocation
page read and write
5A56000
trusted library allocation
page read and write
74CF000
heap
page read and write
13CE000
stack
page read and write
3B4000
heap
page read and write
43D1000
heap
page read and write
70F0000
direct allocation
page execute and read and write
43D1000
heap
page read and write
2C7E000
stack
page read and write
2095907F000
unkown
page read and write
1BB8ABA7000
heap
page read and write
26F0000
direct allocation
page read and write
43D1000
heap
page read and write
5A93000
trusted library allocation
page read and write
131D000
trusted library allocation
page read and write
20958F90000
unkown
page read and write
1780000
direct allocation
page read and write
1267000
trusted library allocation
page read and write
1244000
heap
page read and write
4BD1000
heap
page read and write
EB0000
direct allocation
page read and write
670000
direct allocation
page read and write
B94000
heap
page read and write
5A6A000
trusted library allocation
page read and write
7FF6183B5000
unkown
page readonly
3C4F000
stack
page read and write
4AA1000
trusted library allocation
page read and write
581800309000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
D24000
heap
page read and write
3981000
heap
page read and write
2833000
heap
page read and write
581800134000
trusted library allocation
page read and write
4BE0000
direct allocation
page read and write
1244000
heap
page read and write
5DB000
stack
page read and write
17E4000
heap
page read and write
EE4000
heap
page read and write
3BBB3FC000
stack
page read and write
1BB8ABA7000
heap
page read and write
5A8A000
trusted library allocation
page read and write
4A10000
direct allocation
page execute and read and write
2F1000
unkown
page execute read
5818000BC000
trusted library allocation
page read and write
2A40000
heap
page read and write
964000
heap
page read and write
2E9D000
heap
page read and write
1BB8AB8C000
heap
page read and write
1BB8ABA2000
heap
page read and write
17E4000
heap
page read and write
328E000
heap
page read and write
6A21000
heap
page read and write
2C4E000
stack
page read and write
3BC2BFE000
unkown
page readonly
5ABB000
trusted library allocation
page read and write
3BB93FC000
stack
page read and write
22DB000
heap
page read and write
4A40000
direct allocation
page execute and read and write
2EAB000
heap
page read and write
256800658000
trusted library allocation
page read and write
366E000
stack
page read and write
5A6F000
trusted library allocation
page read and write
2AF3000
heap
page read and write
5591000
trusted library allocation
page read and write
EB0000
direct allocation
page read and write
14D3000
heap
page read and write
1BB8AB8C000
heap
page read and write
1BB8AB9C000
heap
page read and write
1BB8F2C0000
heap
page read and write
7571000
heap
page read and write
31CE000
stack
page read and write
4A10000
direct allocation
page execute and read and write
1F729685000
heap
page read and write
17E4000
heap
page read and write
5A93000
trusted library allocation
page read and write
D44000
heap
page read and write
505F000
stack
page read and write
3BC53FE000
stack
page read and write
6A21000
heap
page read and write
3C4000
unkown
page readonly
27AF000
stack
page read and write
5A61000
trusted library allocation
page read and write
607F000
stack
page read and write
55CB000
trusted library allocation
page read and write
4A4F000
stack
page read and write
3BA13FE000
stack
page read and write
1265000
trusted library allocation
page read and write
2095A081000
unkown
page read and write
4BD1000
heap
page read and write
4FDF000
stack
page read and write
581800EBC000
trusted library allocation
page read and write
256800220000
trusted library allocation
page read and write
EE4000
heap
page read and write
49C0000
direct allocation
page execute and read and write
1F729480000
heap
page read and write
1BB8AB8C000
heap
page read and write
581800E58000
trusted library allocation
page read and write
5818005B0000
trusted library allocation
page read and write
2E93000
heap
page read and write
581800D78000
trusted library allocation
page read and write
256800380000
trusted library allocation
page read and write
581800FEC000
trusted library allocation
page read and write
581800358000
trusted library allocation
page read and write
58180120C000
trusted library allocation
page read and write
2275CB44000
heap
page read and write
5AA3000
trusted library allocation
page read and write
1BB8AB94000
heap
page read and write
4BD1000
heap
page read and write
374F000
stack
page read and write
C52000
unkown
page execute and write copy
3BBF3FE000
stack
page read and write
5A8A000
trusted library allocation
page read and write
581800FB0000
trusted library allocation
page read and write
2AFC000
heap
page read and write
5A7A000
trusted library allocation
page read and write
1BB8AB90000
heap
page read and write
4BD1000
heap
page read and write
4BD1000
heap
page read and write
414F000
stack
page read and write
1BB8AB94000
heap
page read and write
2D10000
direct allocation
page read and write
41FA000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
300E000
stack
page read and write
1BB8AB90000
heap
page read and write
3B4000
heap
page read and write
964000
heap
page read and write
34BE000
stack
page read and write
5F7F000
stack
page read and write
4BD1000
heap
page read and write
EE4000
heap
page read and write
5818002F0000
trusted library allocation
page read and write
2DBE000
stack
page read and write
82C000
heap
page read and write
284F000
heap
page read and write
4A20000
direct allocation
page execute and read and write
3C0000
unkown
page write copy
5818012C8000
trusted library allocation
page read and write
75EC000
heap
page read and write
2568006CC000
trusted library allocation
page read and write
3732000
heap
page read and write
2EA1000
heap
page read and write
2960000
direct allocation
page read and write
581800658000
trusted library allocation
page read and write
5ABA000
trusted library allocation
page read and write
504000
heap
page read and write
5700000
remote allocation
page read and write
5818004F8000
trusted library allocation
page read and write
1BB8AB90000
heap
page read and write
2095A15C000
unkown
page read and write
168C000
heap
page read and write
1244000
heap
page read and write
2568006E4000
trusted library allocation
page read and write
256800390000
trusted library allocation
page read and write
1BB8ABA7000
heap
page read and write
1BB8ABA0000
heap
page read and write
15BE000
heap
page read and write
5A51000
trusted library allocation
page read and write
5AA5000
trusted library allocation
page read and write
58180000C000
trusted library allocation
page read and write
1BB8ABC4000
heap
page read and write
B95000
heap
page read and write
1166000
heap
page read and write
4BE0000
direct allocation
page read and write
A9E000
stack
page read and write
58180047C000
trusted library allocation
page read and write
17E4000
heap
page read and write
1244000
heap
page read and write
BC2000
heap
page read and write
14D7000
heap
page read and write
1BB8B080000
heap
page read and write
2275C900000
heap
page read and write
5080000
heap
page read and write
5210000
direct allocation
page execute and read and write
5A51000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
1244000
heap
page read and write
1140000
heap
page read and write
3BA23FE000
stack
page read and write
5818007D4000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
43D1000
heap
page read and write
150E000
trusted library allocation
page read and write
42306FE000
stack
page read and write
5818003AC000
trusted library allocation
page read and write
1BB89DD0000
unkown
page read and write
581800504000
trusted library allocation
page read and write
159B000
heap
page read and write
42CE000
stack
page read and write
3BCBBFE000
unkown
page readonly
2EEF000
stack
page read and write
2095A081000
unkown
page read and write
2095A580000
unkown
page read and write
2940000
direct allocation
page read and write
3BB83FC000
stack
page read and write
5CDC00294000
trusted library allocation
page read and write
5A7B000
trusted library allocation
page read and write
1BB8ABA0000
heap
page read and write
5A8A000
trusted library allocation
page read and write
1BB8B146000
heap
page read and write
1475000
heap
page read and write
E3E000
stack
page read and write
1BB8ABC4000
heap
page read and write
964000
heap
page read and write
4D10000
direct allocation
page read and write
5CDC002A0000
trusted library allocation
page read and write
5A9D000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
256800654000
trusted library allocation
page read and write
15A2000
heap
page read and write
5AA5000
trusted library allocation
page read and write
1BB8AB94000
heap
page read and write
1F7294D3000
heap
page read and write
1BB8B0FC000
heap
page read and write
1BB8AB9D000
heap
page read and write
964000
heap
page read and write
43D1000
heap
page read and write
83E000
heap
page read and write
4BD1000
heap
page read and write
1F7294DC000
heap
page read and write
EE4000
heap
page read and write
C04000
heap
page read and write
4D10000
direct allocation
page read and write
1BB878A0000
heap
page read and write
1BB8AB9D000
heap
page read and write
691000
unkown
page execute and write copy
1BB8ABA7000
heap
page read and write
E1D000
unkown
page readonly
5818000E4000
trusted library allocation
page read and write
581800801000
trusted library allocation
page read and write
9AA000
unkown
page write copy
594000
heap
page read and write
5818001AC000
trusted library allocation
page read and write
2E91000
heap
page read and write
2095A3C7000
unkown
page read and write
5A51000
trusted library allocation
page read and write
5A8A000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
4D40000
direct allocation
page execute and read and write
55ED000
trusted library allocation
page read and write
3D91000
heap
page read and write
1265000
trusted library allocation
page read and write
40C000
unkown
page read and write
5A58000
trusted library allocation
page read and write
1F7294E2000
heap
page read and write
256800718000
trusted library allocation
page read and write
70F0000
direct allocation
page execute and read and write
1BB8ABA0000
heap
page read and write
288E000
stack
page read and write
325E000
heap
page read and write
EE4000
heap
page read and write
1BB8ABA0000
heap
page read and write
1010000
heap
page read and write
2E70000
heap
page read and write
49B0000
direct allocation
page execute and read and write
14ED000
heap
page read and write
6A21000
heap
page read and write
14DF000
heap
page read and write
581800F84000
trusted library allocation
page read and write
D24000
heap
page read and write
581800368000
trusted library allocation
page read and write
14D2000
heap
page read and write
581800E68000
trusted library allocation
page read and write
581801090000
trusted library allocation
page read and write
581800E84000
trusted library allocation
page read and write
10E4000
heap
page read and write
1507000
trusted library allocation
page read and write
5A61000
trusted library allocation
page read and write
765B000
heap
page read and write
58180018C000
trusted library allocation
page read and write
2095A081000
unkown
page read and write
4BF1000
heap
page read and write
1BB8AB90000
heap
page read and write
14D4000
heap
page read and write
EE4000
heap
page read and write
5A7B000
trusted library allocation
page read and write
1BB8AB95000
heap
page read and write
43D1000
heap
page read and write
396000
unkown
page execute and read and write
EE4000
heap
page read and write
4209000
trusted library allocation
page read and write
510000
direct allocation
page read and write
5CDC00270000
trusted library allocation
page read and write
2568006FC000
trusted library allocation
page read and write
292C000
stack
page read and write
3A0E000
stack
page read and write
4BD1000
heap
page read and write
1BB8ABC4000
heap
page read and write
1780000
direct allocation
page read and write
581800F5C000
trusted library allocation
page read and write
2095A351000
unkown
page read and write
43CF000
stack
page read and write
960000
heap
page read and write
2568006C4000
trusted library allocation
page read and write
1780000
direct allocation
page read and write
964000
heap
page read and write
1BB8AB9D000
heap
page read and write
807000
heap
page read and write
1314000
heap
page read and write
2568002FC000
trusted library allocation
page read and write
5A99000
trusted library allocation
page read and write
5CDC002BC000
trusted library allocation
page read and write
2EBE000
heap
page read and write
3BB7BFE000
unkown
page readonly
5A7B000
trusted library allocation
page read and write
43D1000
heap
page read and write
581800DA8000
trusted library allocation
page read and write
58180081C000
trusted library allocation
page read and write
1BB8ABA0000
heap
page read and write
51B00020C000
direct allocation
page read and write
4AA1000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
10E4000
heap
page read and write
1BB8776B000
heap
page read and write
940000
heap
page read and write
70F0000
direct allocation
page execute and read and write
530000
direct allocation
page read and write
327B000
heap
page read and write
1BB8AB9D000
heap
page read and write
581800A0C000
trusted library allocation
page read and write
581800C38000
trusted library allocation
page read and write
20B0000
trusted library allocation
page read and write
256800210000
trusted library allocation
page read and write
4860000
trusted library allocation
page read and write
284C000
heap
page read and write
1BB875E0000
heap
page readonly
43D1000
heap
page read and write
4D21000
heap
page read and write
C0A000
heap
page read and write
581800F1C000
trusted library allocation
page read and write
6A21000
heap
page read and write
1BB8AB90000
heap
page read and write
3A80000
trusted library allocation
page read and write
1BB8AB8C000
heap
page read and write
58180020C000
trusted library allocation
page read and write
3D3E000
stack
page read and write
1F7294DE000
heap
page read and write
2DFE000
stack
page read and write
3EEF000
stack
page read and write
2095A1E1000
unkown
page read and write
1BB8ABA7000
heap
page read and write
4AA1000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
312F000
stack
page read and write
4BE0000
direct allocation
page read and write
4781000
heap
page read and write
1BB8AB9D000
heap
page read and write
1BB8AB95000
heap
page read and write
2095906A000
unkown
page read and write
49E0000
direct allocation
page execute and read and write
5A61000
trusted library allocation
page read and write
1BB8B0EF000
heap
page read and write
586000
heap
page read and write
4BE0000
direct allocation
page read and write
41ED000
trusted library allocation
page read and write
4BE0000
direct allocation
page execute and read and write
D24000
heap
page read and write
5AB3000
trusted library allocation
page read and write
3BCABFE000
unkown
page readonly
1BB8AB87000
heap
page read and write
1BB8AB9D000
heap
page read and write
581800F68000
trusted library allocation
page read and write
1BB8B12B000
heap
page read and write
1BB87678000
heap
page read and write
27EF000
stack
page read and write
500000
unkown
page readonly
126A000
trusted library allocation
page read and write
15C6000
heap
page read and write
10E4000
heap
page read and write
3610000
heap
page read and write
4BD1000
heap
page read and write
4BD1000
heap
page read and write
581800784000
trusted library allocation
page read and write
5A98000
trusted library allocation
page read and write
1034000
heap
page read and write
26F0000
direct allocation
page read and write
3BB33FD000
stack
page read and write
964000
heap
page read and write
B34000
unkown
page execute and write copy
5818012D4000
trusted library allocation
page read and write
1780000
direct allocation
page read and write
370000
heap
page read and write
1BB8AB95000
heap
page read and write
1BB8ABA7000
heap
page read and write
1BB8ABA2000
heap
page read and write
581800DCC000
trusted library allocation
page read and write
1BB8ABA2000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
530000
direct allocation
page read and write
256800788000
trusted library allocation
page read and write
5CDC002BC000
trusted library allocation
page read and write
256800248000
trusted library allocation
page read and write
2F1000
unkown
page execute read
5818012C0000
trusted library allocation
page read and write
599C79D000
stack
page read and write
4E70000
direct allocation
page read and write
2095A231000
unkown
page read and write
1BB8AB94000
heap
page read and write
43D1000
heap
page read and write
328E000
heap
page read and write
294F000
stack
page read and write
20B0000
trusted library allocation
page read and write
43D1000
heap
page read and write
964000
heap
page read and write
1BB8ABA2000
heap
page read and write
114B000
heap
page read and write
2F2C000
stack
page read and write
5818002D0000
trusted library allocation
page read and write
2FB0000
direct allocation
page read and write
1BB8B112000
heap
page read and write
5818003E8000
trusted library allocation
page read and write
55ED000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
5AB3000
trusted library allocation
page read and write
29C0D054000
heap
page read and write
1BB8AB98000
heap
page read and write
14E7000
heap
page read and write
964000
heap
page read and write
5818000F4000
trusted library allocation
page read and write
1BB8ABA2000
heap
page read and write
2D10000
direct allocation
page read and write
3240000
heap
page read and write
271E000
stack
page read and write
6A21000
heap
page read and write
4C30000
direct allocation
page execute and read and write
3BC0BFE000
unkown
page readonly
43D1000
heap
page read and write
1BB91820000
trusted library section
page read and write
1BB8ABA2000
heap
page read and write
29C0A180000
unkown
page read and write
D81000
unkown
page execute read
4BF1000
heap
page read and write
1166000
heap
page read and write
5AEC000
trusted library allocation
page read and write
1BB8775C000
heap
page read and write
586000
heap
page read and write
6A21000
heap
page read and write
82F000
heap
page read and write
1BB8AB90000
heap
page read and write
581800368000
trusted library allocation
page read and write
1BB8AB95000
heap
page read and write
2EEE000
stack
page read and write
3BB8BFE000
unkown
page readonly
2C2F000
stack
page read and write
376F000
stack
page read and write
5A8A000
trusted library allocation
page read and write
35FE000
stack
page read and write
6A21000
heap
page read and write
1314000
heap
page read and write
6A21000
heap
page read and write
5AC4000
trusted library allocation
page read and write
51B000290000
direct allocation
page read and write
29C0A180000
unkown
page read and write
1BB8B16D000
heap
page read and write
43D1000
heap
page read and write
5A51000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
2AE0000
heap
page read and write
5CDC00235000
trusted library allocation
page read and write
51B000201000
direct allocation
page read and write
964000
heap
page read and write
581800CCC000
trusted library allocation
page read and write
581800C01000
trusted library allocation
page read and write
581800EB0000
trusted library allocation
page read and write
20959BF3000
heap
page read and write
5A8A000
trusted library allocation
page read and write
29C0D350000
unkown
page read and write
256800374000
trusted library allocation
page read and write
D44000
heap
page read and write
4D10000
direct allocation
page read and write
5818002C0000
trusted library allocation
page read and write
5818010F8000
trusted library allocation
page read and write
4C24000
direct allocation
page read and write
691000
unkown
page execute and write copy
1BB8ABA0000
heap
page read and write
4761000
heap
page read and write
222E000
stack
page read and write
D9000
unkown
page execute and read and write
6A21000
heap
page read and write
5818004BC000
trusted library allocation
page read and write
5A8A000
trusted library allocation
page read and write
1BB8ABA2000
heap
page read and write
1BB8B0CC000
heap
page read and write
5607000
trusted library allocation
page read and write
1F729488000
heap
page read and write
866000
unkown
page write copy
5A8C000
trusted library allocation
page read and write
1311000
trusted library allocation
page read and write
2970000
heap
page read and write
281F000
stack
page read and write
4BF1000
heap
page read and write
1BB91852000
trusted library section
page read and write
1302000
trusted library allocation
page read and write
29C0A180000
unkown
page read and write
4CEF000
stack
page read and write
256800624000
trusted library allocation
page read and write
BA1000
heap
page read and write
5A7B000
trusted library allocation
page read and write
4BE0000
direct allocation
page read and write
EB0000
direct allocation
page read and write
20959BF3000
heap
page read and write
5A7A000
trusted library allocation
page read and write
5110000
direct allocation
page read and write
42304FE000
stack
page read and write
51B0002A8000
direct allocation
page read and write
1BB8AB94000
heap
page read and write
581800198000
trusted library allocation
page read and write
55F4000
trusted library allocation
page read and write
48C1000
direct allocation
page read and write
581800C90000
trusted library allocation
page read and write
1F72968C000
heap
page read and write
1267000
trusted library allocation
page read and write
49D0000
direct allocation
page execute and read and write
581800398000
trusted library allocation
page read and write
70F0000
direct allocation
page execute and read and write
1BB8AB94000
heap
page read and write
C10000
heap
page read and write
2998000
heap
page read and write
70F0000
direct allocation
page execute and read and write
41DE000
trusted library allocation
page read and write
964000
heap
page read and write
1314000
heap
page read and write
9CF000
stack
page read and write
7619000
heap
page read and write
429E000
trusted library allocation
page read and write
25680060C000
trusted library allocation
page read and write
256800744000
trusted library allocation
page read and write
58180029A000
trusted library allocation
page read and write
2EBE000
heap
page read and write
256800330000
trusted library allocation
page read and write
1BB8AB94000
heap
page read and write
4BE0000
direct allocation
page read and write
2EB3000
heap
page read and write
1BB8ABA2000
heap
page read and write
1244000
heap
page read and write
4BD1000
heap
page read and write
3B9F3FF000
stack
page read and write
964000
heap
page read and write
1BB8B0E4000
heap
page read and write
1244000
heap
page read and write
5CDC002F4000
trusted library allocation
page read and write
58C000
heap
page read and write
30DE000
stack
page read and write
146B000
heap
page read and write
1BB8AB90000
heap
page read and write
1BB91F76000
trusted library section
page read and write
16A9000
heap
page read and write
20958830000
unkown
page read and write
380000
heap
page read and write
3DEE000
stack
page read and write
1110000
heap
page read and write
55CD000
trusted library allocation
page read and write
4BE0000
direct allocation
page read and write
3310000
heap
page read and write
49B0000
heap
page read and write
41A1000
trusted library allocation
page read and write
4D21000
heap
page read and write
256800640000
trusted library allocation
page read and write
2B20000
heap
page read and write
1142000
heap
page read and write
10E4000
heap
page read and write
5818010E8000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
1244000
heap
page read and write
C52000
unkown
page execute and write copy
4BBF000
stack
page read and write
581800C50000
trusted library allocation
page read and write
1BB91710000
trusted library allocation
page read and write
2EEC000
stack
page read and write
5A9B000
trusted library allocation
page read and write
17E4000
heap
page read and write
1BB8AB94000
heap
page read and write
581801140000
trusted library allocation
page read and write
760C000
heap
page read and write
256800688000
trusted library allocation
page read and write
3F2E000
stack
page read and write
15BB000
heap
page read and write
1BB8AB9D000
heap
page read and write
1D5C0000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
362F000
stack
page read and write
397F000
stack
page read and write
5AB7000
trusted library allocation
page read and write
5D9B000
trusted library allocation
page read and write
7622000
heap
page read and write
4AA1000
trusted library allocation
page read and write
5156000
direct allocation
page read and write
690000
unkown
page read and write
4A30000
direct allocation
page execute and read and write
126B000
trusted library allocation
page read and write
1BB8AB94000
heap
page read and write
5591000
trusted library allocation
page read and write
1BB8ABA7000
heap
page read and write
1BB8B11B000
heap
page read and write
4A20000
direct allocation
page execute and read and write
1BB8ABA7000
heap
page read and write
55CE000
trusted library allocation
page read and write
3268000
heap
page read and write
BE5000
heap
page read and write
4453000
trusted library allocation
page read and write
4B0E000
stack
page read and write
41FF000
trusted library allocation
page read and write
581800DA0000
trusted library allocation
page read and write
1F729670000
heap
page read and write
581800CCC000
trusted library allocation
page read and write
51C0000
direct allocation
page execute and read and write
3BA83FB000
stack
page read and write
1BB8AB9D000
heap
page read and write
1BB8AB8C000
heap
page read and write
4BF1000
heap
page read and write
256800354000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
278F000
stack
page read and write
20958F93000
unkown
page read and write
1266000
trusted library allocation
page read and write
4AE1000
direct allocation
page read and write
41F4000
trusted library allocation
page read and write
55AF000
trusted library allocation
page read and write
3BB43FE000
stack
page read and write
6A21000
heap
page read and write
5A5B000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
1BB8AB9D000
heap
page read and write
818000
heap
page read and write
1BB8AB95000
heap
page read and write
2E4E000
stack
page read and write
10E4000
heap
page read and write
29C0CE51000
heap
page read and write
1BB8AB95000
heap
page read and write
5CDC002C0000
trusted library allocation
page read and write
3B4000
heap
page read and write
5818003D8000
trusted library allocation
page read and write
581800C70000
trusted library allocation
page read and write
6F9000
unkown
page write copy
1BB8AB90000
heap
page read and write
256800310000
trusted library allocation
page read and write
263000
unkown
page execute and read and write
5AAB000
trusted library allocation
page read and write
34CF000
stack
page read and write
1BB8AB95000
heap
page read and write
5A61000
trusted library allocation
page read and write
5A87000
trusted library allocation
page read and write
2095A1FC000
unkown
page read and write
5A5E000
trusted library allocation
page read and write
EB0000
direct allocation
page read and write
5A5A000
trusted library allocation
page read and write
1BB8F2CF000
heap
page read and write
4BE0000
direct allocation
page read and write
500000
heap
page read and write
1BB8AB9D000
heap
page read and write
2095A085000
unkown
page read and write
38C000
unkown
page readonly
2568007C8000
trusted library allocation
page read and write
883000
unkown
page execute and read and write
504000
heap
page read and write
3D7E000
stack
page read and write
4BF1000
heap
page read and write
5A64000
trusted library allocation
page read and write
285E000
heap
page read and write
3CB2000
heap
page read and write
1BB9100E000
trusted library section
page read and write
578000
heap
page read and write
41F8000
trusted library allocation
page read and write
3BBA3FC000
stack
page read and write
1244000
heap
page read and write
1BB8ABA2000
heap
page read and write
58180022C000
trusted library allocation
page read and write
294F000
unkown
page read and write
5AFC000
trusted library allocation
page read and write
74C3000
heap
page read and write
41F2000
trusted library allocation
page read and write
29C0CD3B000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
55B3000
trusted library allocation
page read and write
1BB8AB95000
heap
page read and write
5A64000
trusted library allocation
page read and write
4D10000
direct allocation
page read and write
25680033C000
trusted library allocation
page read and write
285E000
heap
page read and write
14E4000
heap
page read and write
1BB8AB9D000
heap
page read and write
5818001B4000
trusted library allocation
page read and write
2D8E000
stack
page read and write
1BB8AB8C000
heap
page read and write
15BB000
heap
page read and write
14E7000
heap
page read and write
14C4000
heap
page read and write
3BC000
unkown
page read and write
1780000
direct allocation
page read and write
115B000
heap
page read and write
26A7000
heap
page read and write
4AA1000
trusted library allocation
page read and write
74F000
stack
page read and write
5270000
direct allocation
page execute and read and write
328E000
stack
page read and write
1BB8AB9D000
heap
page read and write
5818006B0000
trusted library allocation
page read and write
581800D10000
trusted library allocation
page read and write
840000
heap
page read and write
150B000
trusted library allocation
page read and write
15BB000
heap
page read and write
20956B23000
heap
page read and write
4761000
heap
page read and write
74C0000
heap
page read and write
401000
unkown
page execute read
369000
unkown
page execute and read and write
C10000
heap
page read and write
29C0D1E1000
unkown
page read and write
5818003AC000
trusted library allocation
page read and write
1BB8AB95000
heap
page read and write
1BB8AB90000
heap
page read and write
6A21000
heap
page read and write
55B9000
trusted library allocation
page read and write
5AB7000
trusted library allocation
page read and write
5A64000
trusted library allocation
page read and write
581800588000
trusted library allocation
page read and write
4BC0000
direct allocation
page execute and read and write
5A6A000
trusted library allocation
page read and write
126B000
trusted library allocation
page read and write
74C4000
heap
page read and write
1BB91F92000
trusted library section
page read and write
2D1E000
stack
page read and write
256800668000
trusted library allocation
page read and write
51B00023C000
direct allocation
page read and write
1BB8ABA7000
heap
page read and write
1BB90EE3000
heap
page read and write
43D1000
heap
page read and write
352E000
stack
page read and write
5A64000
trusted library allocation
page read and write
E07000
heap
page read and write
5CDC00288000
trusted library allocation
page read and write
2A9E000
stack
page read and write
581800C7C000
trusted library allocation
page read and write
1BB8ABA7000
heap
page read and write
1BB90DA0000
heap
page read and write
1BB8AB94000
heap
page read and write
5818006FD000
trusted library allocation
page read and write
1265000
trusted library allocation
page read and write
40C000
unkown
page write copy
5A8A000
trusted library allocation
page read and write
1BB8ABA0000
heap
page read and write
5A8A000
trusted library allocation
page read and write
2980000
heap
page read and write
20958830000
unkown
page read and write
3D91000
heap
page read and write
1BB8AB9D000
heap
page read and write
1BB8ABA2000
heap
page read and write
5818003B8000
trusted library allocation
page read and write
5CDC002BC000
trusted library allocation
page read and write
1F7294BF000
heap
page read and write
5AD0000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
500000
unkown
page readonly
5D40000
heap
page read and write
1607000
heap
page read and write
29C0D366000
unkown
page read and write
1BB8AB98000
heap
page read and write
42EE000
stack
page read and write
5CDC00264000
trusted library allocation
page read and write
1BB8AB95000
heap
page read and write
5700000
remote allocation
page read and write
581800F30000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
EE4000
heap
page read and write
EF0000
heap
page read and write
5818009E0000
trusted library allocation
page read and write
5818001AC000
trusted library allocation
page read and write
6A21000
heap
page read and write
581800144000
trusted library allocation
page read and write
5000000
direct allocation
page execute and read and write
504000
heap
page read and write
5A8A000
trusted library allocation
page read and write
14D3000
heap
page read and write
3B0000
heap
page read and write
3732000
heap
page read and write
61E1000
heap
page read and write
D44000
heap
page read and write
74CB000
heap
page read and write
1780000
direct allocation
page read and write
964000
heap
page read and write
43E1000
heap
page read and write
2A50000
heap
page read and write
29C0D37C000
unkown
page read and write
1244000
heap
page read and write
4F9E000
stack
page read and write
5A8A000
trusted library allocation
page read and write
5818009C4000
trusted library allocation
page read and write
2E7E000
stack
page read and write
1BB8ABA2000
heap
page read and write
1BB8AB9D000
heap
page read and write
2940000
direct allocation
page read and write
1BB8ABC4000
heap
page read and write
581800DA8000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
41DC000
trusted library allocation
page read and write
43D1000
heap
page read and write
25EE000
stack
page read and write
2FB0000
direct allocation
page read and write
B34000
unkown
page execute and write copy
4D20000
heap
page read and write
1BB8AB95000
heap
page read and write
1145000
heap
page read and write
581800AF8000
trusted library allocation
page read and write
BE5000
heap
page read and write
74C4000
heap
page read and write
2FF0000
heap
page read and write
5CDC002B0000
trusted library allocation
page read and write
30F6000
heap
page read and write
4AA1000
trusted library allocation
page read and write
98000
stack
page read and write
5818008EC000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
1314000
heap
page read and write
1132000
heap
page read and write
150B000
trusted library allocation
page read and write
1244000
heap
page read and write
EE4000
heap
page read and write
581800C90000
trusted library allocation
page read and write
1BB8B10B000
heap
page read and write
55BF000
trusted library allocation
page read and write
400000
unkown
page readonly
544000
unkown
page execute and write copy
5A61000
trusted library allocation
page read and write
581800CF4000
trusted library allocation
page read and write
1BB8AB95000
heap
page read and write
1314000
heap
page read and write
964000
heap
page read and write
409000
unkown
page readonly
2C6F000
stack
page read and write
5AA4000
trusted library allocation
page read and write
3BC03FD000
stack
page read and write
1BB8AB9D000
heap
page read and write
3BAF3FE000
stack
page read and write
3DAF000
stack
page read and write
3268000
heap
page read and write
41A1000
trusted library allocation
page read and write
29C0CF43000
heap
page read and write
1BB8AB8C000
heap
page read and write
2850000
heap
page read and write
4D10000
direct allocation
page read and write
2F0000
unkown
page readonly
1BB8ABA0000
heap
page read and write
29C0CD3B000
heap
page read and write
5A93000
trusted library allocation
page read and write
D44000
heap
page read and write
15BB000
heap
page read and write
3A8000
heap
page read and write
2D10000
direct allocation
page read and write
29C0A180000
unkown
page read and write
2568006B8000
trusted library allocation
page read and write
510000
direct allocation
page read and write
122F000
stack
page read and write
5A8A000
trusted library allocation
page read and write
4B90000
heap
page read and write
5210000
direct allocation
page execute and read and write
1263000
trusted library allocation
page read and write
43D1000
heap
page read and write
1BB8ABA0000
heap
page read and write
115B000
heap
page read and write
143E000
stack
page read and write
5700000
remote allocation
page read and write
20958830000
unkown
page read and write
2095A20E000
unkown
page read and write
43D1000
heap
page read and write
38C000
unkown
page readonly
29C09CDF000
heap
page read and write
413E000
stack
page read and write
6A21000
heap
page read and write
1BB8B101000
heap
page read and write
20B0000
trusted library allocation
page read and write
58180075C000
trusted library allocation
page read and write
1BB8AB8C000
heap
page read and write
959000
unkown
page execute and read and write
2095A081000
unkown
page read and write
5A68000
trusted library allocation
page read and write
581800998000
trusted library allocation
page read and write
5818001D0000
trusted library allocation
page read and write
6A21000
heap
page read and write
581800F88000
trusted library allocation
page read and write
1BB8AB8C000
heap
page read and write
1BB8AB90000
heap
page read and write
964000
heap
page read and write
2FB0000
direct allocation
page read and write
75A6000
heap
page read and write
4B60000
heap
page read and write
29C0D1E1000
unkown
page read and write
5A8A000
trusted library allocation
page read and write
4D60000
direct allocation
page execute and read and write
4BD1000
heap
page read and write
50C1000
direct allocation
page read and write
1BB8AB90000
heap
page read and write
20959E38000
heap
page read and write
5AB1000
trusted library allocation
page read and write
98C000
unkown
page execute and read and write
5ABB000
trusted library allocation
page read and write
2095A209000
unkown
page read and write
20956B34000
heap
page read and write
581800BD4000
trusted library allocation
page read and write
1502000
trusted library allocation
page read and write
2095A220000
unkown
page read and write
463C000
stack
page read and write
55E6000
trusted library allocation
page read and write
EB0000
direct allocation
page read and write
26FD000
stack
page read and write
4AA1000
trusted library allocation
page read and write
58180020C000
trusted library allocation
page read and write
581800210000
trusted library allocation
page read and write
1BB8ABC4000
heap
page read and write
70F0000
direct allocation
page execute and read and write
31FF000
stack
page read and write
20958830000
unkown
page read and write
29C0D33A000
unkown
page read and write
1BB8B10B000
heap
page read and write
4BE0000
direct allocation
page read and write
406E000
stack
page read and write
768B000
heap
page read and write
5A96000
trusted library allocation
page read and write
4D70000
direct allocation
page execute and read and write
43D1000
heap
page read and write
7FF6D84FE000
unkown
page write copy
41A1000
trusted library allocation
page read and write
61E4000
heap
page read and write
581800D5C000
trusted library allocation
page read and write
150D000
trusted library allocation
page read and write
333F000
stack
page read and write
256800644000
trusted library allocation
page read and write
4AA1000
trusted library allocation
page read and write
4201000
trusted library allocation
page read and write
30FE000
stack
page read and write
43D1000
heap
page read and write
5818008A0000
trusted library allocation
page read and write
813C000
stack
page read and write
5598000
trusted library allocation
page read and write
581800CC0000
trusted library allocation
page read and write
373E000
stack
page read and write
1BB8AB8C000
heap
page read and write
256800320000
trusted library allocation
page read and write
3BC5BFE000
unkown
page readonly
1BB8ABA7000
heap
page read and write
4BD1000
heap
page read and write
5A61000
trusted library allocation
page read and write
20958F90000
unkown
page read and write
3BB03FE000
stack
page read and write
7608000
heap
page read and write
EB0000
direct allocation
page read and write
58180129C000
trusted library allocation
page read and write
46AF000
stack
page read and write
1510000
trusted library allocation
page read and write
581800298000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
25680075C000
trusted library allocation
page read and write
1BB8B109000
heap
page read and write
3BA53FA000
stack
page read and write
3BAA3FE000
stack
page read and write
290E000
stack
page read and write
4ABE000
stack
page read and write
75B3000
heap
page read and write
1BB8ABA2000
heap
page read and write
55B000
heap
page read and write
EE4000
heap
page read and write
1BB8AB90000
heap
page read and write
1BB8ABB3000
heap
page read and write
581800CDC000
trusted library allocation
page read and write
2670000
direct allocation
page execute and read and write
67B0000
heap
page read and write
3731000
heap
page read and write
3BBD3FB000
stack
page read and write
2568002D4000
trusted library allocation
page read and write
1BB87853000
heap
page read and write
B3E000
stack
page read and write
20958F90000
unkown
page read and write
4AA1000
trusted library allocation
page read and write
504000
heap
page read and write
14ED000
heap
page read and write
29C0A180000
unkown
page read and write
337E000
stack
page read and write
337E000
stack
page read and write
2960000
direct allocation
page read and write
5A61000
trusted library allocation
page read and write
1034000
heap
page read and write
10E4000
heap
page read and write
74CA000
heap
page read and write
5AB3000
trusted library allocation
page read and write
14E4000
heap
page read and write
53A000
heap
page read and write
581800560000
trusted library allocation
page read and write
4D70000
direct allocation
page execute and read and write
5060000
direct allocation
page read and write
20B0000
trusted library allocation
page read and write
43D1000
heap
page read and write
55AF000
trusted library allocation
page read and write
4D10000
direct allocation
page read and write
BE1000
heap
page read and write
5C31000
trusted library allocation
page read and write
56E000
heap
page read and write
29C0CDBB000
heap
page read and write
20958F90000
unkown
page read and write
1BB8ABA2000
heap
page read and write
5A93000
trusted library allocation
page read and write
EE4000
heap
page read and write
1BB8ABA7000
heap
page read and write
2950000
direct allocation
page execute and read and write
1BB8AB9D000
heap
page read and write
594000
heap
page read and write
14F2000
heap
page read and write
1BB8AB9D000
heap
page read and write
964000
heap
page read and write
20958830000
unkown
page read and write
284C000
heap
page read and write
5818003A4000
trusted library allocation
page read and write
4BD1000
heap
page read and write
A1000
unkown
page execute and write copy
1BB8B107000
heap
page read and write
2EA1000
heap
page read and write
EB0000
direct allocation
page read and write
5CDC002A0000
trusted library allocation
page read and write
51B0002D0000
direct allocation
page read and write
43D1000
heap
page read and write
1BB8ABB3000
heap
page read and write
17A0000
direct allocation
page read and write
3234000
heap
page read and write
256800250000
trusted library allocation
page read and write
2568002C8000
trusted library allocation
page read and write
1265000
trusted library allocation
page read and write
20958830000
unkown
page read and write
1F7294B7000
heap
page read and write
BE1000
heap
page read and write
4D21000
heap
page read and write
581800DF0000
trusted library allocation
page read and write
55C6000
trusted library allocation
page read and write
4A60000
direct allocation
page execute and read and write
29C0D1E1000
unkown
page read and write
4F0000
heap
page read and write
3D8F000
stack
page read and write
581800D2C000
trusted library allocation
page read and write
660000
heap
page read and write
4AA1000
trusted library allocation
page read and write
581800154000
trusted library allocation
page read and write
E0D000
heap
page read and write
20959185000
heap
page read and write
1BB8AB95000
heap
page read and write
581800F5C000
trusted library allocation
page read and write
5A5C000
trusted library allocation
page read and write
B0E000
unkown
page execute and write copy
55D8000
trusted library allocation
page read and write
3B4000
heap
page read and write
49D0000
direct allocation
page execute and read and write
581800CCC000
trusted library allocation
page read and write
1BB8ABA0000
heap
page read and write
25680080C000
trusted library allocation
page read and write
29C0CF6F000
heap
page read and write
26F0000
direct allocation
page read and write
3BA6BFE000
unkown
page readonly
1F7294E3000
heap
page read and write
350E000
stack
page read and write
1BB8ABA7000
heap
page read and write
4601000
heap
page read and write
1244000
heap
page read and write
55AF000
trusted library allocation
page read and write
2EAB000
heap
page read and write
4600000
heap
page read and write
2AE0000
heap
page read and write
4BE0000
direct allocation
page read and write
126D000
trusted library allocation
page read and write
D44000
heap
page read and write
25680020C000
trusted library allocation
page read and write
5A61000
trusted library allocation
page read and write
3BB9BFE000
unkown
page readonly
43D1000
heap
page read and write
5A61000
trusted library allocation
page read and write
4461000
trusted library allocation
page read and write
1BB8ABA7000
heap
page read and write
1BB8AB9D000
heap
page read and write
2230000
heap
page read and write
159A000
heap
page read and write
383F000
stack
page read and write
1BB87880000
heap
page read and write
5A8A000
trusted library allocation
page read and write
1475000
heap
page read and write
5AB4000
trusted library allocation
page read and write
4BD1000
heap
page read and write
581800B04000
trusted library allocation
page read and write
45EE000
stack
page read and write
58180066C000
trusted library allocation
page read and write
75A9000
direct allocation
page read and write
BF6000
heap
page read and write
1BB8ABB3000
heap
page read and write
581800401000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
581800D44000
trusted library allocation
page read and write
1BB8F2C4000
heap
page read and write
581800B78000
trusted library allocation
page read and write
5A5E000
trusted library allocation
page read and write
1471000
heap
page read and write
581800228000
trusted library allocation
page read and write
7686000
heap
page read and write
20959BF3000
heap
page read and write
EE4000
heap
page read and write
126F000
trusted library allocation
page read and write
1BB8AB96000
heap
page read and write
43D1000
heap
page read and write
4BD1000
heap
page read and write
5A8A000
trusted library allocation
page read and write
256800630000
trusted library allocation
page read and write
3BA63FE000
stack
page read and write
20958F90000
unkown
page read and write
1BB8ABA0000
heap
page read and write
5AB3000
trusted library allocation
page read and write
5818001B4000
trusted library allocation
page read and write
4BD1000
heap
page read and write
1BB8AB9D000
heap
page read and write
1BB8AB8C000
heap
page read and write
1BB8AB9D000
heap
page read and write
581800B85000
trusted library allocation
page read and write
3B6E000
stack
page read and write
5AD0000
trusted library allocation
page read and write
1BB8ABA7000
heap
page read and write
1F7294AA000
heap
page read and write
581800A24000
trusted library allocation
page read and write
4BD1000
heap
page read and write
581800FB0000
trusted library allocation
page read and write
77CF000
heap
page read and write
5AC8000
trusted library allocation
page read and write
6A21000
heap
page read and write
2940000
direct allocation
page read and write
10E4000
heap
page read and write
5A6A000
trusted library allocation
page read and write
6A21000
heap
page read and write
2568002F4000
trusted library allocation
page read and write
3E7F000
stack
page read and write
581800BF8000
trusted library allocation
page read and write
4BD1000
heap
page read and write
20959D26000
heap
page read and write
4601000
heap
page read and write
6A21000
heap
page read and write
26F0000
direct allocation
page read and write
15C3000
heap
page read and write
581800310000
trusted library allocation
page read and write
1F7294DB000
heap
page read and write
7FF618301000
unkown
page execute read
1BB8AB9D000
heap
page read and write
1BB8AB9D000
heap
page read and write
2394000
heap
page read and write
1508000
trusted library allocation
page read and write
3B2000
unkown
page readonly
2D10000
direct allocation
page read and write
3FE000
stack
page read and write
2568002C0000
trusted library allocation
page read and write
5A8A000
trusted library allocation
page read and write
EB0000
direct allocation
page read and write
581800DCC000
trusted library allocation
page read and write
EB0000
direct allocation
page read and write
1BB91831000
trusted library section
page read and write
5818012A8000
trusted library allocation
page read and write
510000
direct allocation
page read and write
4D21000
heap
page read and write
74C6000
heap
page read and write
1271000
trusted library allocation
page read and write
5080000
direct allocation
page read and write
5A61000
trusted library allocation
page read and write
4761000
heap
page read and write
5CDC002BC000
trusted library allocation
page read and write
5A82000
trusted library allocation
page read and write
70F0000
direct allocation
page execute and read and write
26F0000
direct allocation
page read and write
2B2E000
stack
page read and write
3BA3BFE000
unkown
page readonly
27F0000
heap
page read and write
308F000
stack
page read and write
1BB8B101000
heap
page read and write
5AB5000
trusted library allocation
page read and write
8975000
heap
page read and write
43D1000
heap
page read and write
1BB8AB9D000
heap
page read and write
1244000
heap
page read and write
49B0000
direct allocation
page execute and read and write
5AC8000
trusted library allocation
page read and write
2CFF000
stack
page read and write
5818001EC000
trusted library allocation
page read and write
20B0000
trusted library allocation
page read and write
1BB8B0E1000
heap
page read and write
1244000
heap
page read and write
1244000
heap
page read and write
41A1000
trusted library allocation
page read and write
1BB8ABA2000
heap
page read and write
1269000
trusted library allocation
page read and write
E0B000
heap
page read and write
581800F68000
trusted library allocation
page read and write
1BB8AB90000
heap
page read and write
1F7294D3000
heap
page read and write
1BB8AB94000
heap
page read and write
51B000220000
direct allocation
page read and write
4AA1000
trusted library allocation
page read and write
4761000
heap
page read and write
767E000
heap
page read and write
5290000
direct allocation
page execute and read and write
1034000
heap
page read and write
581800CCC000
trusted library allocation
page read and write
6A21000
heap
page read and write
4BD1000
heap
page read and write
1269000
trusted library allocation
page read and write
2AF9000
heap
page read and write
BE5000
heap
page read and write
1BB8AB9C000
heap
page read and write
4AA1000
trusted library allocation
page read and write
32AE000
stack
page read and write
4C10000
direct allocation
page execute and read and write
2800000
heap
page read and write
1034000
heap
page read and write
2FCF000
stack
page read and write
4AA1000
trusted library allocation
page read and write
3D91000
heap
page read and write
2ACF000
stack
page read and write
5818004EC000
trusted library allocation
page read and write
294E000
stack
page read and write
2ABE000
stack
page read and write
4CF0000
trusted library allocation
page read and write
4AA1000
trusted library allocation
page read and write
14EB000
heap
page read and write
5A8A000
trusted library allocation
page read and write
3BC83FA000
stack
page read and write
58180066D000
trusted library allocation
page read and write
5818006D0000
trusted library allocation
page read and write
43D1000
heap
page read and write
1BB8AB95000
heap
page read and write
1510000
trusted library allocation
page read and write
1BB8ABA2000
heap
page read and write
41AE000
stack
page read and write
3B4000
heap
page read and write
75C2000
heap
page read and write
26F0000
direct allocation
page read and write
3BB3BFE000
unkown
page readonly
3287000
heap
page read and write
1BB8AB9D000
heap
page read and write
581800C0C000
trusted library allocation
page read and write
581800718000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
5818001D4000
trusted library allocation
page read and write
256800684000
trusted library allocation
page read and write
5A84000
trusted library allocation
page read and write
5818003A4000
trusted library allocation
page read and write
581800368000
trusted library allocation
page read and write
1244000
heap
page read and write
10E4000
heap
page read and write
4BD1000
heap
page read and write
74C3000
heap
page read and write
41A1000
trusted library allocation
page read and write
1118000
heap
page read and write
2F7F000
stack
page read and write
5CDC00201000
trusted library allocation
page read and write
4BD1000
heap
page read and write
70F0000
direct allocation
page execute and read and write
5AE2000
trusted library allocation
page read and write
EE4000
heap
page read and write
64E000
stack
page read and write
4BF1000
heap
page read and write
43D1000
heap
page read and write
1BB8AB94000
heap
page read and write
5A9B000
trusted library allocation
page read and write
115B000
heap
page read and write
3C6F000
stack
page read and write
5818008D0000
trusted library allocation
page read and write
61BF000
stack
page read and write
20958830000
unkown
page read and write
D24000
heap
page read and write
6F2000
unkown
page execute and read and write
2707000
heap
page read and write
3BFF000
stack
page read and write
74CF000
heap
page read and write
1132000
heap
page read and write
29C0CE67000
heap
page read and write
1BB8AB9D000
heap
page read and write
285E000
heap
page read and write
EE4000
heap
page read and write
737000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
1509000
trusted library allocation
page read and write
43D1000
heap
page read and write
1BB8ABA0000
heap
page read and write
1BB8AB94000
heap
page read and write
41A1000
trusted library allocation
page read and write
450000
heap
page read and write
581800304000
trusted library allocation
page read and write
CA9000
stack
page read and write
5A5E000
trusted library allocation
page read and write
58180060C000
trusted library allocation
page read and write
4BD1000
heap
page read and write
3BB5BFE000
unkown
page readonly
74C0000
heap
page read and write
5CDC002C0000
trusted library allocation
page read and write
500000
unkown
page readonly
17E4000
heap
page read and write
581800BB8000
trusted library allocation
page read and write
284C000
heap
page read and write
5AA3000
trusted library allocation
page read and write
1BB8AB90000
heap
page read and write
1509000
trusted library allocation
page read and write
2829000
heap
page read and write
4BF1000
heap
page read and write
5AD4000
trusted library allocation
page read and write
114C000
heap
page read and write
5818007E4000
trusted library allocation
page read and write
4C00000
direct allocation
page execute and read and write
5B58000
trusted library allocation
page read and write
3B4000
heap
page read and write
13BE000
stack
page read and write
4BD1000
heap
page read and write
2AFC000
heap
page read and write
581800FC0000
trusted library allocation
page read and write
2568006B0000
trusted library allocation
page read and write
88E000
stack
page read and write
6A21000
heap
page read and write
43BE000
stack
page read and write
6A21000
heap
page read and write
43D1000
heap
page read and write
6A21000
heap
page read and write
5F0000
heap
page read and write
1269000
trusted library allocation
page read and write
43D1000
heap
page read and write
2BFE000
stack
page read and write
74CA000
heap
page read and write
1BB8ABA2000
heap
page read and write
2F0000
unkown
page readonly
1305000
trusted library allocation
page read and write
37D000
unkown
page execute and write copy
2940000
direct allocation
page read and write
256800368000
trusted library allocation
page read and write
EE4000
heap
page read and write
1BB8ABA2000
heap
page read and write
581800F3C000
trusted library allocation
page read and write
58180009C000
trusted library allocation
page read and write
1BB8AB94000
heap
page read and write
4BD1000
heap
page read and write
803B000
stack
page read and write
99B000
unkown
page execute and read and write
4761000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
2AD2000
heap
page read and write
5A7B000
trusted library allocation
page read and write
1598000
heap
page read and write
14E1000
heap
page read and write
409000
unkown
page readonly
4367000
trusted library allocation
page read and write
1BB8AB91000
heap
page read and write
581801108000
trusted library allocation
page read and write
1471000
heap
page read and write
1309000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
2095A37E000
unkown
page read and write
581800A18000
trusted library allocation
page read and write
1BB8AB8C000
heap
page read and write
1BB90EE0000
heap
page read and write
55F3000
trusted library allocation
page read and write
5A8A000
trusted library allocation
page read and write
3248000
heap
page read and write
1034000
heap
page read and write
20956B53000
heap
page read and write
1BB90D87000
unclassified section
page read and write
5A6F000
trusted library allocation
page read and write
5CDC00260000
trusted library allocation
page read and write
1BB8ABA7000
heap
page read and write
256800700000
trusted library allocation
page read and write
1BB8776A000
heap
page read and write
1BB8ABA0000
heap
page read and write
1BB91BBE000
trusted library section
page read and write
1BB8B0E4000
heap
page read and write
49F0000
direct allocation
page execute and read and write
D44000
heap
page read and write
33AF000
stack
page read and write
26F0000
direct allocation
page read and write
1D6F000
stack
page read and write
347F000
stack
page read and write
EB0000
direct allocation
page read and write
5C29000
trusted library allocation
page read and write
55C4000
trusted library allocation
page read and write
5818006A8000
trusted library allocation
page read and write
29C0CE3B000
heap
page read and write
55C7000
trusted library allocation
page read and write
13DB000
stack
page read and write
20959C61000
heap
page read and write
1F7294F2000
heap
page read and write
581800E01000
trusted library allocation
page read and write
4D10000
direct allocation
page read and write
581800494000
trusted library allocation
page read and write
5A8B000
trusted library allocation
page read and write
755E000
heap
page read and write
12FD000
trusted library allocation
page read and write
256800704000
trusted library allocation
page read and write
48D1000
direct allocation
page read and write
27DC000
stack
page read and write
1244000
heap
page read and write
293000
unkown
page execute and read and write
1BB91F9D000
trusted library section
page read and write
61E4000
heap
page read and write
51B000280000
direct allocation
page read and write
2EB4000
heap
page read and write
3BC6BFE000
unkown
page readonly
2EAF000
stack
page read and write
41A1000
trusted library allocation
page read and write
5A8A000
trusted library allocation
page read and write
3BB63FB000
stack
page read and write
20958830000
unkown
page read and write
2FB0000
direct allocation
page read and write
2E8F000
heap
page read and write
1244000
heap
page read and write
A8A000
stack
page read and write
5210000
direct allocation
page execute and read and write
5CDC00238000
trusted library allocation
page read and write
7609000
heap
page read and write
17E4000
heap
page read and write
1BB8ABA0000
heap
page read and write
2ADB000
heap
page read and write
5A7B000
trusted library allocation
page read and write
5A7B000
trusted library allocation
page read and write
5CDC00278000
trusted library allocation
page read and write
2275C8D0000
heap
page read and write
15A5000
heap
page read and write
5818008C8000
trusted library allocation
page read and write
5A84000
trusted library allocation
page read and write
1261000
trusted library allocation
page read and write
1BB8AB8C000
heap
page read and write
4D70000
direct allocation
page execute and read and write
1128000
heap
page read and write
1244000
heap
page read and write
2940000
direct allocation
page read and write
5598000
trusted library allocation
page read and write
57C000
stack
page read and write
581800E2C000
trusted library allocation
page read and write
1BB8ABA0000
heap
page read and write
510000
heap
page read and write
7624000
heap
page read and write
1BB8ABA2000
heap
page read and write
7FF6183EE000
unkown
page write copy
1BB8ABA0000
heap
page read and write
964000
heap
page read and write
1F7294B7000
heap
page read and write
5A69000
trusted library allocation
page read and write
581800708000
trusted library allocation
page read and write
4D10000
direct allocation
page read and write
2D10000
direct allocation
page read and write
5818003E8000
trusted library allocation
page read and write
1F7294E7000
heap
page read and write
4D10000
direct allocation
page read and write
9ED000
unkown
page execute and write copy
B0C000
unkown
page execute and write copy
1BB8AB95000
heap
page read and write
581800AE8000
trusted library allocation
page read and write
5A69000
trusted library allocation
page read and write
4BD1000
heap
page read and write
126C000
trusted library allocation
page read and write
61E1000
heap
page read and write
2DAE000
stack
page read and write
5A61000
trusted library allocation
page read and write
5D9B000
trusted library allocation
page read and write
3AB000
unkown
page execute and read and write
20958F90000
unkown
page read and write
77FE000
heap
page read and write
1BB8ABA2000
heap
page read and write
52A0000
direct allocation
page execute and read and write
1BB8AB90000
heap
page read and write
36FF000
stack
page read and write
30F0000
heap
page read and write
3F0E000
stack
page read and write
581800AC8000
trusted library allocation
page read and write
581801198000
trusted library allocation
page read and write
42A6000
trusted library allocation
page read and write
EE4000
heap
page read and write
21FE000
stack
page read and write
1BB8AB90000
heap
page read and write
5AD8000
trusted library allocation
page read and write
1592000
heap
page read and write
58180068C000
trusted library allocation
page read and write
5A8A000
trusted library allocation
page read and write
256800614000
trusted library allocation
page read and write
581800C68000
trusted library allocation
page read and write
1BB8AB8C000
heap
page read and write
29C0A180000
unkown
page read and write
29AF000
stack
page read and write
D24000
heap
page read and write
2960000
direct allocation
page execute and read and write
256800424000
trusted library allocation
page read and write
1244000
heap
page read and write
4C91000
heap
page read and write
504000
heap
page read and write
4CAE000
stack
page read and write
3ABF000
stack
page read and write
1BB8ABA7000
heap
page read and write
51B000294000
direct allocation
page read and write
581800488000
trusted library allocation
page read and write
4E70000
direct allocation
page read and write
74C6000
heap
page read and write
1F7294C0000
heap
page read and write
2160000
heap
page read and write
20B0000
trusted library allocation
page read and write
4BD1000
heap
page read and write
5A8A000
trusted library allocation
page read and write
4B4F000
stack
page read and write
43D1000
heap
page read and write
81000
unkown
page execute and write copy
1BB8B103000
heap
page read and write
3B2000
unkown
page readonly
510000
direct allocation
page read and write
7452000
direct allocation
page read and write
581800BF8000
trusted library allocation
page read and write
29C0A180000
unkown
page read and write
5818003A4000
trusted library allocation
page read and write
7FF6D8411000
unkown
page execute read
428F000
stack
page read and write
130E000
trusted library allocation
page read and write
14A0000
heap
page read and write
D20000
heap
page read and write
2970000
heap
page read and write
5CFE000
stack
page read and write
B87000
heap
page read and write
1BB8B154000
heap
page read and write
75AE000
heap
page read and write
1F7294CD000
heap
page read and write
74C7000
heap
page read and write
2FB0000
direct allocation
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
15A2000
heap
page read and write
581800BF8000
trusted library allocation
page read and write
51F0000
direct allocation
page execute and read and write
2D10000
direct allocation
page read and write
964000
heap
page read and write
EB1000
unkown
page execute and write copy
5A8A000
trusted library allocation
page read and write
21CE000
stack
page read and write
581801308000
trusted library allocation
page read and write
70F0000
direct allocation
page execute and read and write
1BB8ABA7000
heap
page read and write
5A7A000
trusted library allocation
page read and write
3B4000
heap
page read and write
44BF000
stack
page read and write
190F000
stack
page read and write
5A80000
trusted library allocation
page read and write
26F0000
direct allocation
page read and write
420000
unkown
page read and write
60BE000
stack
page read and write
429E000
trusted library allocation
page read and write
26A0000
heap
page read and write
2990000
heap
page read and write
29C0CD3B000
heap
page read and write
1BB8AB9D000
heap
page read and write
2FB0000
direct allocation
page read and write
581800738000
trusted library allocation
page read and write
2FB0000
direct allocation
page read and write
1BB8B144000
heap
page read and write
670000
direct allocation
page read and write
5D70000
heap
page read and write
388F000
stack
page read and write
1BB87764000
heap
page read and write
1244000
heap
page read and write
5A7A000
trusted library allocation
page read and write
1BB8ABA2000
heap
page read and write
1326000
trusted library allocation
page read and write
3BBC3FD000
stack
page read and write
1314000
heap
page read and write
256800230000
trusted library allocation
page read and write
581800F5C000
trusted library allocation
page read and write
3BC7BFE000
unkown
page readonly
48AE000
stack
page read and write
581800294000
trusted library allocation
page read and write
581800368000
trusted library allocation
page read and write
1BB8AB90000
heap
page read and write
964000
heap
page read and write
51B000210000
direct allocation
page read and write
737000
heap
page read and write
418E000
stack
page read and write
17E4000
heap
page read and write
2095A081000
unkown
page read and write
5CDC00248000
trusted library allocation
page read and write
437F000
stack
page read and write
1244000
heap
page read and write
1F72949C000
heap
page read and write
43D1000
heap
page read and write
5CDC002C0000
trusted library allocation
page read and write
4BF1000
heap
page read and write
4E70000
direct allocation
page read and write
2EBE000
heap
page read and write
75EC000
heap
page read and write
3FBF000
stack
page read and write
29C0D094000
heap
page read and write
1BB8ABA0000
heap
page read and write
581800AA0000
trusted library allocation
page read and write
1BB914FC000
trusted library section
page read and write
5818003CC000
trusted library allocation
page read and write
75E3000
heap
page read and write
581800358000
trusted library allocation
page read and write
4761000
heap
page read and write
559B000
trusted library allocation
page read and write
964000
heap
page read and write
76CE000
heap
page read and write
1BB912F0000
trusted library section
page read and write
22D0000
heap
page read and write
D44000
heap
page read and write
23530000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
5A8A000
trusted library allocation
page read and write
3271000
heap
page read and write
581800601000
trusted library allocation
page read and write
2EAB000
heap
page read and write
5A5E000
trusted library allocation
page read and write
3BC63FE000
stack
page read and write
690000
unkown
page readonly
5A6F000
trusted library allocation
page read and write
1314000
heap
page read and write
5CDC00250000
trusted library allocation
page read and write
3258000
heap
page read and write
41A1000
trusted library allocation
page read and write
5818010A4000
trusted library allocation
page read and write
2AF9000
heap
page read and write
4D70000
direct allocation
page execute and read and write
41A1000
trusted library allocation
page read and write
1314000
heap
page read and write
6A21000
heap
page read and write
41A1000
trusted library allocation
page read and write
3C4000
unkown
page readonly
5A5B000
trusted library allocation
page read and write
75BD000
heap
page read and write
581800214000
trusted library allocation
page read and write
2568007B4000
trusted library allocation
page read and write
D24000
heap
page read and write
115B000
heap
page read and write
5A86000
trusted library allocation
page read and write
2E8F000
heap
page read and write
43D1000
heap
page read and write
C05000
heap
page read and write
2F90000
heap
page read and write
581800F68000
trusted library allocation
page read and write
4BD1000
heap
page read and write
67BE000
heap
page read and write
58180098F000
trusted library allocation
page read and write
1BB8AB8C000
heap
page read and write
3FFE000
stack
page read and write
1BB8ABA0000
heap
page read and write
581800F5C000
trusted library allocation
page read and write
1030000
heap
page read and write
1BB8AB95000
heap
page read and write
581800294000
trusted library allocation
page read and write
1BB8ABA7000
heap
page read and write
964000
heap
page read and write
55B7000
trusted library allocation
page read and write
4D70000
direct allocation
page execute and read and write
504000
heap
page read and write
5CDC002A0000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
43D1000
heap
page read and write
EE4000
heap
page read and write
1BB8EC17000
unclassified section
page read and write
74C9000
heap
page read and write
1BB8AB90000
heap
page read and write
4BD1000
heap
page read and write
58180100C000
trusted library allocation
page read and write
3BC4BFE000
unkown
page readonly
1BB8B154000
heap
page read and write
4761000
heap
page read and write
43D1000
heap
page read and write
D44000
heap
page read and write
6F9000
unkown
page write copy
B32000
unkown
page execute and read and write
B92000
heap
page read and write
E10000
direct allocation
page read and write
83E000
stack
page read and write
4AA1000
trusted library allocation
page read and write
5A80000
trusted library allocation
page read and write
B4A000
heap
page read and write
581800F5C000
trusted library allocation
page read and write
1314000
heap
page read and write
5A8A000
trusted library allocation
page read and write
58180084C000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
5A8A000
trusted library allocation
page read and write
29C0A180000
unkown
page read and write
2C70000
heap
page read and write
43D1000
heap
page read and write
581801078000
trusted library allocation
page read and write
540000
heap
page read and write
256800348000
trusted library allocation
page read and write
1163000
heap
page read and write
3BB6BFE000
unkown
page readonly
2940000
direct allocation
page read and write
3BAB3FE000
stack
page read and write
4AA1000
trusted library allocation
page read and write
29C0CDB6000
heap
page read and write
5818006A1000
trusted library allocation
page read and write
4C60000
direct allocation
page execute and read and write
581800F5C000
trusted library allocation
page read and write
256800294000
trusted library allocation
page read and write
600000
heap
page read and write
58180030B000
trusted library allocation
page read and write
1BB8AB95000
heap
page read and write
29C0CD3B000
heap
page read and write
5A7B000
trusted library allocation
page read and write
5A8A000
trusted library allocation
page read and write
67B1000
heap
page read and write
74C0000
heap
page read and write
420E000
trusted library allocation
page read and write
4203000
trusted library allocation
page read and write
20958865000
heap
page read and write
4AA1000
trusted library allocation
page read and write
25680069C000
trusted library allocation
page read and write
1BB8AB94000
heap
page read and write
20B0000
trusted library allocation
page read and write
BC7000
heap
page read and write
256800354000
trusted library allocation
page read and write
1BB8ABB3000
heap
page read and write
1BB8ABA7000
heap
page read and write
256800408000
trusted library allocation
page read and write
2095A081000
unkown
page read and write
5818003A4000
trusted library allocation
page read and write
542000
unkown
page execute and read and write
581800FD8000
trusted library allocation
page read and write
5CDC002A0000
trusted library allocation
page read and write
1034000
heap
page read and write
5CDC002F0000
trusted library allocation
page read and write
1BB8ABA2000
heap
page read and write
3000000
heap
page read and write
581801201000
trusted library allocation
page read and write
5ABF000
trusted library allocation
page read and write
43D1000
heap
page read and write
2095A081000
unkown
page read and write
7712000
heap
page read and write
1BB8ABA2000
heap
page read and write
2BBF000
stack
page read and write
1164000
heap
page read and write
2ACE000
heap
page read and write
1BB8ABA0000
heap
page read and write
10E4000
heap
page read and write
21BE000
stack
page read and write
1746000
heap
page read and write
409000
unkown
page readonly
5A7A000
trusted library allocation
page read and write
4BD1000
heap
page read and write
5A8A000
trusted library allocation
page read and write
115B000
heap
page read and write
1BB8AB9D000
heap
page read and write
4761000
heap
page read and write
280E000
stack
page read and write
5AAD000
trusted library allocation
page read and write
74CC000
heap
page read and write
41D9000
trusted library allocation
page read and write
4BD1000
heap
page read and write
1BB8AB8A000
heap
page read and write
20958F90000
unkown
page read and write
4D80000
direct allocation
page execute and read and write
4BD1000
heap
page read and write
758C000
heap
page read and write
1BB91002000
trusted library section
page read and write
5AC4000
trusted library allocation
page read and write
2A7F000
stack
page read and write
581800CE4000
trusted library allocation
page read and write
1BB8AB94000
heap
page read and write
2940000
direct allocation
page read and write
7592000
heap
page read and write
256800734000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
43D1000
heap
page read and write
5AA5000
trusted library allocation
page read and write
4BD1000
heap
page read and write
67C0000
heap
page read and write
BBB000
heap
page read and write
581800504000
trusted library allocation
page read and write
D44000
heap
page read and write
1BB8AB90000
heap
page read and write
5AB0000
trusted library allocation
page read and write
3C3E000
stack
page read and write
20959CF6000
heap
page read and write
7645000
heap
page read and write
20959C71000
heap
page read and write
1BB8ABA0000
heap
page read and write
1BB876FC000
heap
page read and write
4BD1000
heap
page read and write
1244000
heap
page read and write
4A40000
trusted library allocation
page read and write
51E0000
direct allocation
page execute and read and write
1244000
heap
page read and write
1BB8ABA2000
heap
page read and write
5818002B4000
trusted library allocation
page read and write
2940000
direct allocation
page read and write
3BBEBFE000
unkown
page readonly
5818000AC000
trusted library allocation
page read and write
1BB8B14F000
heap
page read and write
1BB8AB8C000
heap
page read and write
4BD1000
heap
page read and write
29E0000
heap
page read and write
3A80000
trusted library allocation
page read and write
387E000
stack
page read and write
38EE000
stack
page read and write
1BB8D380000
trusted library allocation
page read and write
29C0CE7B000
heap
page read and write
2095A1F6000
unkown
page read and write
1265000
trusted library allocation
page read and write
2568002DC000
trusted library allocation
page read and write
41EF000
trusted library allocation
page read and write
4BE0000
direct allocation
page read and write
5D76000
heap
page read and write
4A00000
direct allocation
page execute and read and write
4761000
heap
page read and write
4BD1000
heap
page read and write
2700000
heap
page read and write
1509000
trusted library allocation
page read and write
3732000
heap
page read and write
581800770000
trusted library allocation
page read and write
5A98000
trusted library allocation
page read and write
6F9000
unkown
page write copy
7646000
heap
page read and write
1BB8AB90000
heap
page read and write
42AF000
stack
page read and write
280F000
stack
page read and write
1BB8ABA8000
heap
page read and write
55B9000
trusted library allocation
page read and write
3B4000
heap
page read and write
4AA1000
trusted library allocation
page read and write
1BB918A0000
trusted library section
page read and write
4AA1000
trusted library allocation
page read and write
1BB918B1000
trusted library section
page read and write
1F7294CC000
heap
page read and write
16A7000
heap
page read and write
3BCD3FE000
stack
page read and write
1BB8AB90000
heap
page read and write
74C1000
heap
page read and write
BFC000
heap
page read and write
2F1000
unkown
page execute read
75DB000
heap
page read and write
3BA73FB000
stack
page read and write
2940000
direct allocation
page read and write
1BB8AB98000
heap
page read and write
3478000
heap
page read and write
1166000
heap
page read and write
1BB8B141000
heap
page read and write
150B000
trusted library allocation
page read and write
2940000
direct allocation
page read and write
6564000
trusted library allocation
page read and write
4BF1000
heap
page read and write
5AA9000
trusted library allocation
page read and write
6A21000
heap
page read and write
1BB8AB95000
heap
page read and write
510000
direct allocation
page read and write
1ADA000
heap
page read and write
1264000
trusted library allocation
page read and write
1BB8ABA2000
heap
page read and write
2AFC000
heap
page read and write
C1F000
heap
page read and write
1244000
heap
page read and write
1244000
heap
page read and write
2280000
heap
page read and write
5A64000
trusted library allocation
page read and write
D44000
heap
page read and write
256800237000
trusted library allocation
page read and write
4BD1000
heap
page read and write
5210000
direct allocation
page execute and read and write
574000
heap
page read and write
74C6000
heap
page read and write
7FF6D8410000
unkown
page readonly
400000
unkown
page readonly
670000
direct allocation
page read and write
1BB8ABA7000
heap
page read and write
1BB87500000
heap
page read and write
5A7B000
trusted library allocation
page read and write
320F000
stack
page read and write
5A6F000
trusted library allocation
page read and write
1F7294A0000
heap
page read and write
4AA1000
trusted library allocation
page read and write
2CA0000
heap
page read and write
61C0000
heap
page read and write
6A21000
heap
page read and write
1BB8AB95000
heap
page read and write
1F7294D3000
heap
page read and write
5CDC002B0000
trusted library allocation
page read and write
3271000
heap
page read and write
17E4000
heap
page read and write
A0000
unkown
page readonly
5A7D000
trusted library allocation
page read and write
3640000
heap
page read and write
1267000
trusted library allocation
page read and write
29C0A180000
unkown
page read and write
4BE0000
direct allocation
page read and write
5818012BC000
trusted library allocation
page read and write
5E0000
heap
page read and write
6B0000
heap
page read and write
256800364000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
1598000
heap
page read and write
5CDC002D8000
trusted library allocation
page read and write
E43000
unkown
page readonly
1BB8AB94000
heap
page read and write
1BB8AB9D000
heap
page read and write
43D1000
heap
page read and write
5AE2000
trusted library allocation
page read and write
2095A3A3000
unkown
page read and write
41FC000
trusted library allocation
page read and write
581800EE4000
trusted library allocation
page read and write
43D1000
heap
page read and write
1F7294AA000
heap
page read and write
5A8A000
trusted library allocation
page read and write
7C8B000
stack
page read and write
51B000270000
direct allocation
page read and write
316E000
stack
page read and write
4AA1000
trusted library allocation
page read and write
70F0000
direct allocation
page execute and read and write
9AA000
unkown
page write copy
1AFE000
heap
page read and write
126D000
trusted library allocation
page read and write
43D1000
heap
page read and write
58180119C000
trusted library allocation
page read and write
581800384000
trusted library allocation
page read and write
1F7294EA000
heap
page read and write
4BD1000
heap
page read and write
D44000
heap
page read and write
74C0000
heap
page read and write
5A8A000
trusted library allocation
page read and write
500000
unkown
page readonly
43D1000
heap
page read and write
1F72B190000
heap
page read and write
4210000
trusted library allocation
page read and write
61D9000
heap
page read and write
1BB8AB9D000
heap
page read and write
581801198000
trusted library allocation
page read and write
3BB53FB000
stack
page read and write
3BC8BFE000
unkown
page readonly
2977000
heap
page read and write
2FEE000
stack
page read and write
5A7B000
trusted library allocation
page read and write
43F1000
heap
page read and write
41F6000
trusted library allocation
page read and write
49E0000
direct allocation
page execute and read and write
38AF000
stack
page read and write
1BB8B16D000
heap
page read and write
765C000
heap
page read and write
1BB8AB95000
heap
page read and write
1780000
direct allocation
page read and write
1BB8ABA9000
heap
page read and write
3AB000
unkown
page execute and write copy
2568006D0000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
1BB8AB70000
heap
page read and write
EB0000
direct allocation
page read and write
578000
heap
page read and write
581800844000
trusted library allocation
page read and write
2235000
heap
page read and write
D24000
heap
page read and write
29C0A180000
unkown
page read and write
7CE000
heap
page read and write
2A56000
heap
page read and write
55E5000
trusted library allocation
page read and write
360F000
stack
page read and write
4AA1000
trusted library allocation
page read and write
3732000
heap
page read and write
1BB8AB99000
heap
page read and write
2B0E000
stack
page read and write
D44000
heap
page read and write
4BF1000
heap
page read and write
950000
heap
page read and write
5A7C000
trusted library allocation
page read and write
581800D20000
trusted library allocation
page read and write
581800D38000
trusted library allocation
page read and write
3BA8BFE000
unkown
page readonly
581800EFC000
trusted library allocation
page read and write
3B4E000
stack
page read and write
581800E84000
trusted library allocation
page read and write
1BB8AB95000
heap
page read and write
17A0000
direct allocation
page read and write
EE4000
heap
page read and write
1BB87830000
trusted library section
page readonly
1BB8AB8C000
heap
page read and write
1300000
trusted library allocation
page read and write
510000
direct allocation
page read and write
43D1000
heap
page read and write
2690000
direct allocation
page execute and read and write
29C0CD3B000
heap
page read and write
4BD1000
heap
page read and write
5A66000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
A0000
unkown
page read and write
6A21000
heap
page read and write
29C0D1E1000
unkown
page read and write
4BD1000
heap
page read and write
5818007AC000
trusted library allocation
page read and write
1BB87620000
heap
page read and write
21E0000
heap
page read and write
2EA1000
heap
page read and write
1F7294DB000
heap
page read and write
1BB8ABA2000
heap
page read and write
5A51000
trusted library allocation
page read and write
581800D04000
trusted library allocation
page read and write
1BB8ABA0000
heap
page read and write
2FEF000
stack
page read and write
51B0000
direct allocation
page execute and read and write
4BC0000
heap
page read and write
67C0000
heap
page read and write
5AB1000
trusted library allocation
page read and write
1BB8ABA7000
heap
page read and write
581800F4C000
trusted library allocation
page read and write
599000
heap
page read and write
45FF000
stack
page read and write
581800224000
trusted library allocation
page read and write
1BB8AB95000
heap
page read and write
10AE000
stack
page read and write
44FE000
stack
page read and write
17C0000
direct allocation
page execute and read and write
55D6000
trusted library allocation
page read and write
55B2000
trusted library allocation
page read and write
1BB8AB9C000
heap
page read and write
20959C66000
heap
page read and write
1BB8ABA2000
heap
page read and write
76FE000
heap
page read and write
2275CB40000
heap
page read and write
20B0000
trusted library allocation
page read and write
82F000
heap
page read and write
29D0000
heap
page read and write
5CDC00230000
trusted library allocation
page read and write
581800E80000
trusted library allocation
page read and write
761000
unkown
page execute and write copy
17E4000
heap
page read and write
4D80000
direct allocation
page execute and read and write
1BB8AB9D000
heap
page read and write
115E000
heap
page read and write
1F7294B7000
heap
page read and write
1BB8ABC4000
heap
page read and write
BE1000
heap
page read and write
1BB8ABA7000
heap
page read and write
581800BA8000
trusted library allocation
page read and write
760A000
heap
page read and write
1BB8B2B0000
trusted library section
page read and write
1244000
heap
page read and write
581800504000
trusted library allocation
page read and write
29EE000
stack
page read and write
5CDC002BC000
trusted library allocation
page read and write
4AA1000
trusted library allocation
page read and write
1244000
heap
page read and write
5A51000
trusted library allocation
page read and write
D7000
unkown
page write copy
5818007C4000
trusted library allocation
page read and write
5AAC000
trusted library allocation
page read and write
2AEF000
stack
page read and write
510000
direct allocation
page read and write
670000
direct allocation
page read and write
74CB000
heap
page read and write
4810000
trusted library allocation
page read and write
E4D000
unkown
page write copy
1BB8AB95000
heap
page read and write
581800E3C000
trusted library allocation
page read and write
EB0000
direct allocation
page read and write
1414000
heap
page read and write
964000
heap
page read and write
862000
unkown
page execute and write copy
5A7B000
trusted library allocation
page read and write
6F2000
unkown
page execute and read and write
256800201000
trusted library allocation
page read and write
5010000
trusted library allocation
page read and write
499F000
stack
page read and write
7630000
heap
page read and write
4761000
heap
page read and write
1244000
heap
page read and write
416F000
stack
page read and write
581800B94000
trusted library allocation
page read and write
42300FA000
stack
page read and write
5AB6000
trusted library allocation
page read and write
5604000
trusted library allocation
page read and write
256800280000
trusted library allocation
page read and write
51B000215000
direct allocation
page read and write
114B000
heap
page read and write
41A1000
trusted library allocation
page read and write
2810000
heap
page read and write
964000
heap
page read and write
99C000
unkown
page execute and write copy
4BD1000
heap
page read and write
1BB8AB9D000
heap
page read and write
5818001A0000
trusted library allocation
page read and write
1BB910A6000
trusted library section
page read and write
B4E000
heap
page read and write
4207000
trusted library allocation
page read and write
581800230000
trusted library allocation
page read and write
1BB8ABB0000
heap
page read and write
7814000
heap
page read and write
43D1000
heap
page read and write
2095A081000
unkown
page read and write
7622000
heap
page read and write
7FF6D84E8000
unkown
page readonly
1BB8ABA7000
heap
page read and write
43F1000
heap
page read and write
363F000
stack
page read and write
113B000
heap
page read and write
1F7294A9000
heap
page read and write
599CAFF000
unkown
page read and write
5A80000
trusted library allocation
page read and write
4AA1000
trusted library allocation
page read and write
5818001E4000
trusted library allocation
page read and write
75FE000
heap
page read and write
581800BE0000
trusted library allocation
page read and write
1BB8AB95000
heap
page read and write
43D1000
heap
page read and write
5591000
trusted library allocation
page read and write
21E4000
heap
page read and write
83E000
heap
page read and write
1BB8B107000
heap
page read and write
43D1000
heap
page read and write
964000
heap
page read and write
43D1000
heap
page read and write
1F7292D0000
heap
page read and write
41A1000
trusted library allocation
page read and write
55AA000
trusted library allocation
page read and write
2ECC000
stack
page read and write
5A62000
trusted library allocation
page read and write
99C000
unkown
page execute and write copy
51D0000
direct allocation
page execute and read and write
7637000
heap
page read and write
C10000
heap
page read and write
5818005C8000
trusted library allocation
page read and write
1BB8ABA0000
heap
page read and write
1138000
heap
page read and write
3BBDBFE000
unkown
page readonly
4BF1000
heap
page read and write
1BB8ABAB000
heap
page read and write
2810000
heap
page read and write
581801094000
trusted library allocation
page read and write
33CE000
stack
page read and write
39EF000
stack
page read and write
581800CCC000
trusted library allocation
page read and write
1F7294D9000
heap
page read and write
1BB914F0000
trusted library section
page read and write
3BA33FD000
stack
page read and write
29C09CFF000
heap
page read and write
10E4000
heap
page read and write
378E000
stack
page read and write
2EAF000
heap
page read and write
4BD1000
heap
page read and write
E0F000
stack
page read and write
1BB8B0FC000
heap
page read and write
14C4000
heap
page read and write
40C000
unkown
page write copy
1BB8B124000
heap
page read and write
1BB8ABA2000
heap
page read and write
4761000
heap
page read and write
2818000
heap
page read and write
1BB8AB99000
heap
page read and write
99B000
unkown
page execute and write copy
2CA6000
heap
page read and write
581800786000
trusted library allocation
page read and write
55C7000
trusted library allocation
page read and write
690000
unkown
page readonly
20958830000
unkown
page read and write
5A63000
trusted library allocation
page read and write
2FB0000
direct allocation
page read and write
3B9E3FE000
unkown
page read and write
2ABE000
stack
page read and write
14BE000
heap
page read and write
1BB8AB95000
heap
page read and write
1BB8AB95000
heap
page read and write
327F000
heap
page read and write
2095A171000
unkown
page read and write
5A7A000
trusted library allocation
page read and write
1780000
direct allocation
page read and write
1BB91063000
trusted library section
page read and write
3DCE000
stack
page read and write
43F0000
heap
page read and write
581800058000
trusted library allocation
page read and write
2830000
heap
page read and write
473C000
stack
page read and write
5280000
direct allocation
page execute and read and write
3BBCBFE000
unkown
page readonly
EB0000
direct allocation
page read and write
2AF9000
heap
page read and write
74C1000
heap
page read and write
E4F000
stack
page read and write
5AC9000
trusted library allocation
page read and write
6A21000
heap
page read and write
4860000
direct allocation
page read and write
1034000
heap
page read and write
BC0000
heap
page read and write
1BB8AB8C000
heap
page read and write
6A21000
heap
page read and write
55F5000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
1244000
heap
page read and write
1BB8ABA2000
heap
page read and write
1BB91890000
trusted library section
page read and write
3BC93FC000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
1BB8AB95000
heap
page read and write
15C9000
heap
page read and write
58180064C000
trusted library allocation
page read and write
1BB8ABA7000
heap
page read and write
D44000
heap
page read and write
29C0A180000
trusted library allocation
page read and write
16A9000
heap
page read and write
1BB8AB95000
heap
page read and write
4AA1000
trusted library allocation
page read and write
4BC0000
direct allocation
page execute and read and write
EB0000
direct allocation
page read and write
99B000
unkown
page execute and write copy
690000
unkown
page read and write
581800AC0000
trusted library allocation
page read and write
2568006D4000
trusted library allocation
page read and write
5210000
direct allocation
page execute and read and write
3A0000
heap
page read and write
434000
unkown
page read and write
5818006CC000
trusted library allocation
page read and write
41E9000
trusted library allocation
page read and write
1BB87640000
trusted library allocation
page read and write
2568006B4000
trusted library allocation
page read and write
581800368000
trusted library allocation
page read and write
E19000
heap
page read and write
1F7294E3000
heap
page read and write
5AB3000
trusted library allocation
page read and write
5080000
direct allocation
page read and write
74CC000
heap
page read and write
3AFE000
stack
page read and write
1244000
heap
page read and write
1F7293B0000
heap
page read and write
5A5B000
trusted library allocation
page read and write
126B000
trusted library allocation
page read and write
581800F3C000
trusted library allocation
page read and write
3981000
heap
page read and write
2E77000
heap
page read and write
510000
direct allocation
page read and write
5CF3000
trusted library allocation
page read and write
55A8000
trusted library allocation
page read and write
3B4000
heap
page read and write
1F7294DA000
heap
page read and write
4AA1000
trusted library allocation
page read and write
29C0CDB0000
heap
page read and write
1BB8AB90000
heap
page read and write
54A000
heap
page read and write
4D10000
direct allocation
page read and write
1244000
heap
page read and write
6F9000
unkown
page write copy
D7000
unkown
page write copy
3BADBFE000
unkown
page readonly
70F0000
direct allocation
page execute and read and write
409000
unkown
page readonly
4AA1000
trusted library allocation
page read and write
75E4000
heap
page read and write
98C000
unkown
page execute and read and write
581800CDF000
trusted library allocation
page read and write
670000
direct allocation
page read and write
51B00024C000
direct allocation
page read and write
429E000
trusted library allocation
page read and write
964000
heap
page read and write
115B000
heap
page read and write
5A7F000
trusted library allocation
page read and write
5CDC002BC000
trusted library allocation
page read and write
807000
heap
page read and write
3268000
heap
page read and write
14CE000
heap
page read and write
2275C90C000
heap
page read and write
5818003E8000
trusted library allocation
page read and write
46B0000
heap
page read and write
1BB8ABC4000
heap
page read and write
44FE000
stack
page read and write
3BB0BFE000
unkown
page readonly
74CB000
heap
page read and write
5AEB000
trusted library allocation
page read and write
1BB910CD000
trusted library section
page read and write
1BB8B0D5000
heap
page read and write
23A0000
heap
page read and write
581800294000
trusted library allocation
page read and write
55AF000
trusted library allocation
page read and write
43D1000
heap
page read and write
15A2000
heap
page read and write
4BD1000
heap
page read and write
5A59000
trusted library allocation
page read and write
1570000
heap
page read and write
670000
direct allocation
page read and write
599000
heap
page read and write
55CA000
trusted library allocation
page read and write
5A8A000
trusted library allocation
page read and write
1BB8AB90000
heap
page read and write
10E4000
heap
page read and write
55EE000
trusted library allocation
page read and write
964000
heap
page read and write
E0E000
heap
page read and write
1BB8AB9D000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
1BB8ABA2000
heap
page read and write
20959BF3000
heap
page read and write
1BB8AB90000
heap
page read and write
5CDC002B0000
trusted library allocation
page read and write
20B0000
trusted library allocation
page read and write
4D50000
direct allocation
page execute and read and write
44E0000
trusted library allocation
page read and write
5A61000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
1314000
heap
page read and write
29C0CF9B000
heap
page read and write
581801080000
trusted library allocation
page read and write
5CDC002E4000
trusted library allocation
page read and write
1BB8AB94000
heap
page read and write
39C000
unkown
page execute and read and write
3B4000
heap
page read and write
5818002A4000
trusted library allocation
page read and write
61D6000
heap
page read and write
20959D11000
heap
page read and write
5A97000
trusted library allocation
page read and write
2F30000
heap
page read and write
74C5000
heap
page read and write
2568007CC000
trusted library allocation
page read and write
670000
direct allocation
page read and write
2AA0000
heap
page read and write
51B000250000
direct allocation
page read and write
559B000
trusted library allocation
page read and write
1BB8ABA7000
heap
page read and write
504000
heap
page read and write
4BD1000
heap
page read and write
51B0002AC000
direct allocation
page read and write
1592000
heap
page read and write
1BB8ABA2000
heap
page read and write
26F0000
direct allocation
page read and write
324F000
stack
page read and write
5818012E0000
trusted library allocation
page read and write
26DF000
stack
page read and write
55C4000
trusted library allocation
page read and write
4AA1000
trusted library allocation
page read and write
6A21000
heap
page read and write
5AAB000
trusted library allocation
page read and write
80B000
heap
page read and write
EE4000
heap
page read and write
6A21000
heap
page read and write
1244000
heap
page read and write
5270000
remote allocation
page read and write
5CDC002BC000
trusted library allocation
page read and write
5A8A000
trusted library allocation
page read and write
1BB87761000
heap
page read and write
43D1000
heap
page read and write
5818006EC000
trusted library allocation
page read and write
5818010D0000
trusted library allocation
page read and write
5A66000
trusted library allocation
page read and write
1263000
trusted library allocation
page read and write
3BA1BFE000
unkown
page readonly
1BB8AB9D000
heap
page read and write
38C000
unkown
page readonly
20B0000
trusted library allocation
page read and write
1BB8AB8C000
heap
page read and write
4BD1000
heap
page read and write
3BB23FB000
stack
page read and write
3B2000
unkown
page readonly
256800758000
trusted library allocation
page read and write
1780000
direct allocation
page read and write
3260000
heap
page read and write
5270000
remote allocation
page read and write
2940000
direct allocation
page read and write
762E000
heap
page read and write
5A6F000
trusted library allocation
page read and write
E07000
heap
page read and write
15C6000
heap
page read and write
1BB8AB9D000
heap
page read and write
14C4000
heap
page read and write
462F000
stack
page read and write
1780000
direct allocation
page read and write
2EBF000
heap
page read and write
6A21000
heap
page read and write
20958830000
unkown
page read and write
4BD1000
heap
page read and write
501E000
stack
page read and write
3262000
heap
page read and write
29C0A180000
unkown
page read and write
425C000
trusted library allocation
page read and write
504000
heap
page read and write
298F000
stack
page read and write
D3E000
stack
page read and write
5818004E0000
trusted library allocation
page read and write
D24000
heap
page read and write
1BB8B14F000
heap
page read and write
43D1000
heap
page read and write
46B000
unkown
page read and write
3BCCBFE000
unkown
page readonly
4D10000
direct allocation
page read and write
46B000
unkown
page read and write
4ACF000
stack
page read and write
581801124000
trusted library allocation
page read and write
1BB8AB8C000
heap
page read and write
2D5F000
stack
page read and write
256800298000
trusted library allocation
page read and write
581800E8C000
trusted library allocation
page read and write
1BB8B11B000
heap
page read and write
4E20000
trusted library allocation
page read and write
3E90000
trusted library allocation
page read and write
2AF9000
heap
page read and write
1780000
direct allocation
page read and write
4AA1000
trusted library allocation
page read and write
1BB8ABA0000
heap
page read and write
20958D90000
trusted library allocation
page read and write
4375000
trusted library allocation
page read and write
1BB87700000
heap
page read and write
55BE000
trusted library allocation
page read and write
2EAE000
heap
page read and write
4D10000
direct allocation
page read and write
581800040000
trusted library allocation
page read and write
256800330000
trusted library allocation
page read and write
20959C6C000
heap
page read and write
51E0000
direct allocation
page execute and read and write
3BA03FE000
stack
page read and write
55C4000
trusted library allocation
page read and write
3BB4BFE000
unkown
page readonly
1BB91927000
unclassified section
page read and write
C10000
heap
page read and write
1244000
heap
page read and write
4BD1000
heap
page read and write
1BB87650000
trusted library allocation
page read and write
5818003A4000
trusted library allocation
page read and write
3ECF000
stack
page read and write
2F1000
unkown
page execute read
43D1000
heap
page read and write
5AA4000
trusted library allocation
page read and write
5818008FC000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
58180021C000
trusted library allocation
page read and write
1BB8ABA0000
heap
page read and write
581800001000
trusted library allocation
page read and write
737000
heap
page read and write
1F7293D0000
heap
page read and write
20B0000
trusted library allocation
page read and write
581800CB4000
trusted library allocation
page read and write
51B0002E4000
direct allocation
page read and write
55E9000
trusted library allocation
page read and write
E3A000
heap
page read and write
1695000
heap
page read and write
58180004C000
trusted library allocation
page read and write
5CDC002F8000
trusted library allocation
page read and write
1314000
heap
page read and write
55AF000
trusted library allocation
page read and write
43D1000
heap
page read and write
2568006F0000
trusted library allocation
page read and write
5F5000
heap
page read and write
55F3000
trusted library allocation
page read and write
EE4000
heap
page read and write
2DE0000
heap
page read and write
3B4000
heap
page read and write
1BB8B13B000
heap
page read and write
284E000
unkown
page read and write
14ED000
heap
page read and write
3BA2BFE000
unkown
page readonly
1BB8AB8C000
heap
page read and write
5818001F0000
trusted library allocation
page read and write
1BB8AB95000
heap
page read and write
7ECF000
stack
page read and write
581800310000
trusted library allocation
page read and write
1BB878A5000
heap
page read and write
1244000
heap
page read and write
49C0000
direct allocation
page execute and read and write
401000
unkown
page execute read
4761000
heap
page read and write
1034000
heap
page read and write
2690000
direct allocation
page execute and read and write
29C0D4CB000
unkown
page read and write
2CBF000
stack
page read and write
1BB8AB94000
heap
page read and write
3BA43FB000
stack
page read and write
466E000
stack
page read and write
29C0D49F000
unkown
page read and write
58180093C000
trusted library allocation
page read and write
5ABB000
trusted library allocation
page read and write
5A8A000
trusted library allocation
page read and write
964000
heap
page read and write
41A1000
trusted library allocation
page read and write
256800310000
trusted library allocation
page read and write
6F9000
unkown
page write copy
17E4000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
559C000
trusted library allocation
page read and write
43D1000
heap
page read and write
504000
heap
page read and write
2AB0000
heap
page read and write
7789000
heap
page read and write
80000
unkown
page readonly
2568006C8000
trusted library allocation
page read and write
284F000
stack
page read and write
43D1000
heap
page read and write
51B000234000
direct allocation
page read and write
1BB87762000
heap
page read and write
51E0000
direct allocation
page execute and read and write
2800000
heap
page read and write
964000
heap
page read and write
4A80000
direct allocation
page execute and read and write
5A6F000
trusted library allocation
page read and write
25680035C000
trusted library allocation
page read and write
423F000
stack
page read and write
41A1000
trusted library allocation
page read and write
5AAC000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
670000
direct allocation
page read and write
5A58000
trusted library allocation
page read and write
1244000
heap
page read and write
2095A081000
unkown
page read and write
76B8000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
EE4000
heap
page read and write
1BB8AB89000
heap
page read and write
581800374000
trusted library allocation
page read and write
2095A329000
unkown
page read and write
51E0000
direct allocation
page execute and read and write
7D8C000
stack
page read and write
27CE000
stack
page read and write
3288000
heap
page read and write
8CE000
stack
page read and write
43D0000
heap
page read and write
1163000
heap
page read and write
1314000
heap
page read and write
6A21000
heap
page read and write
4BD1000
heap
page read and write
1507000
trusted library allocation
page read and write
3BA4BFE000
unkown
page readonly
2390000
heap
page read and write
761000
unkown
page execute and write copy
3BC1BFE000
unkown
page readonly
5A8A000
trusted library allocation
page read and write
581800574000
trusted library allocation
page read and write
2EAB000
heap
page read and write
5A67000
trusted library allocation
page read and write
EE4000
heap
page read and write
4AA1000
trusted library allocation
page read and write
262E000
stack
page read and write
581800201000
trusted library allocation
page read and write
670000
direct allocation
page read and write
55C7000
trusted library allocation
page read and write
2C0F000
stack
page read and write
81000
unkown
page execute and write copy
20959BF3000
heap
page read and write
4BD1000
heap
page read and write
1BB8B0CE000
heap
page read and write
4761000
heap
page read and write
670000
direct allocation
page read and write
1BB8AB9D000
heap
page read and write
1BB8ABA2000
heap
page read and write
4DB3000
trusted library allocation
page read and write
4AA1000
trusted library allocation
page read and write
D10000
heap
page read and write
2FB0000
direct allocation
page read and write
1BB8B0EF000
heap
page read and write
29C0CD3B000
heap
page read and write
5A7B000
trusted library allocation
page read and write
581800FB0000
trusted library allocation
page read and write
1BB8AB8C000
heap
page read and write
4BD1000
heap
page read and write
74CD000
heap
page read and write
1BB8B0E1000
heap
page read and write
43D1000
heap
page read and write
670000
direct allocation
page read and write
1261000
trusted library allocation
page read and write
1BB8ABA7000
heap
page read and write
2FE0000
heap
page read and write
EE4000
heap
page read and write
1244000
heap
page read and write
38CE000
stack
page read and write
1BB8ABA0000
heap
page read and write
6A21000
heap
page read and write
55CD000
trusted library allocation
page read and write
263000
unkown
page execute and read and write
3BA0BFE000
unkown
page readonly
6A21000
heap
page read and write
5818002B4000
trusted library allocation
page read and write
70F0000
direct allocation
page execute and read and write
26F0000
direct allocation
page read and write
4860000
direct allocation
page read and write
2AE0000
heap
page read and write
29C0A180000
unkown
page read and write
40C000
unkown
page read and write
20958830000
unkown
page read and write
581800390000
trusted library allocation
page read and write
256800750000
trusted library allocation
page read and write
43D1000
heap
page read and write
581800294000
trusted library allocation
page read and write
25680035C000
trusted library allocation
page read and write
2170000
heap
page read and write
5818009D0000
trusted library allocation
page read and write
5060000
heap
page read and write
1506000
trusted library allocation
page read and write
5A68000
trusted library allocation
page read and write
33BF000
stack
page read and write
6A21000
heap
page read and write
581800CA0000
trusted library allocation
page read and write
1BB8AB94000
heap
page read and write
70F0000
direct allocation
page execute and read and write
4BD1000
heap
page read and write
1BB8ABA2000
heap
page read and write
581800294000
trusted library allocation
page read and write
5CDC00220000
trusted library allocation
page read and write
5A9B000
trusted library allocation
page read and write
986000
unkown
page execute and read and write
5A59000
trusted library allocation
page read and write
ADE000
stack
page read and write
67E000
stack
page read and write
43D1000
heap
page read and write
25680078C000
trusted library allocation
page read and write
81E000
heap
page read and write
2670000
heap
page read and write
75B7000
heap
page read and write
581800598000
trusted library allocation
page read and write
17E4000
heap
page read and write
BFD000
heap
page read and write
1BB91960000
trusted library section
page read and write
1BB8B13B000
heap
page read and write
55C3000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
1BB8ABA0000
heap
page read and write
49E0000
direct allocation
page execute and read and write
43D1000
heap
page read and write
581800A94000
trusted library allocation
page read and write
6A21000
heap
page read and write
80B000
heap
page read and write
5A7B000
trusted library allocation
page read and write
456E000
stack
page read and write
510000
direct allocation
page read and write
41A1000
trusted library allocation
page read and write
2275CB50000
heap
page read and write
73C1000
heap
page read and write
1BB8B149000
heap
page read and write
20B0000
trusted library allocation
page read and write
1BB8ABA7000
heap
page read and write
1BB8AB94000
heap
page read and write
1328000
trusted library allocation
page read and write
78E000
stack
page read and write
1034000
heap
page read and write
4761000
heap
page read and write
55AA000
trusted library allocation
page read and write
7FF6D84C5000
unkown
page readonly
1244000
heap
page read and write
5AC3000
trusted library allocation
page read and write
5AE2000
trusted library allocation
page read and write
51B0002DC000
direct allocation
page read and write
130B000
trusted library allocation
page read and write
6A21000
heap
page read and write
1BB8AB94000
heap
page read and write
3BC3BFE000
unkown
page readonly
4BD1000
heap
page read and write
6A21000
heap
page read and write
4BE0000
direct allocation
page read and write
14D8000
heap
page read and write
581800D6E000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
20958F90000
unkown
page read and write
1BB8B12B000
heap
page read and write
1BB8AB94000
heap
page read and write
43D1000
heap
page read and write
2ADC000
heap
page read and write
5818006DC000
trusted library allocation
page read and write
1BB8ABA7000
heap
page read and write
5609000
trusted library allocation
page read and write
1BB8ABA7000
heap
page read and write
1BB8AB94000
heap
page read and write
10E4000
heap
page read and write
256800664000
trusted library allocation
page read and write
1F7294DD000
heap
page read and write
1BB8ABA7000
heap
page read and write
986000
unkown
page execute and read and write
4BD1000
heap
page read and write
3B2E000
stack
page read and write
5A54000
trusted library allocation
page read and write
4BF1000
heap
page read and write
5818009F0000
trusted library allocation
page read and write
581801018000
trusted library allocation
page read and write
29C0C2E8000
heap
page read and write
5A61000
trusted library allocation
page read and write
C3D000
stack
page read and write
1BB8AB9D000
heap
page read and write
581800D98000
trusted library allocation
page read and write
1780000
direct allocation
page read and write
4BD1000
heap
page read and write
2AEA000
heap
page read and write
1BB8F2E4000
heap
page read and write
99B000
unkown
page execute and write copy
58180075C000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
29C0CD3B000
heap
page read and write
3BA93FC000
stack
page read and write
1BB8AB95000
heap
page read and write
EE4000
heap
page read and write
5AAE000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
6A21000
heap
page read and write
504000
heap
page read and write
5CDC002C8000
trusted library allocation
page read and write
1BB8ABA2000
heap
page read and write
5AB0000
trusted library allocation
page read and write
1F7294EA000
heap
page read and write
4BF1000
heap
page read and write
5C21000
trusted library allocation
page read and write
58180011C000
trusted library allocation
page read and write
3B4000
heap
page read and write
E51000
unkown
page write copy
158F000
heap
page read and write
581800218000
trusted library allocation
page read and write
2568007D0000
trusted library allocation
page read and write
1508000
trusted library allocation
page read and write
5A7B000
trusted library allocation
page read and write
326F000
stack
page read and write
5A61000
trusted library allocation
page read and write
B40000
heap
page read and write
504000
heap
page read and write
29C0CDAB000
heap
page read and write
12FB000
trusted library allocation
page read and write
302C000
stack
page read and write
2568006AC000
trusted library allocation
page read and write
EE4000
heap
page read and write
5818012B4000
trusted library allocation
page read and write
1BB8ABA7000
heap
page read and write
256800401000
trusted library allocation
page read and write
4AA1000
trusted library allocation
page read and write
4601000
heap
page read and write
4BD1000
heap
page read and write
29C0A180000
unkown
page read and write
427E000
stack
page read and write
581800420000
trusted library allocation
page read and write
691000
unkown
page execute and write copy
2CC000
stack
page read and write
1BB8ABA0000
heap
page read and write
1BB8AB94000
heap
page read and write
D9000
unkown
page execute and read and write
4CF0000
heap
page read and write
1BB8AB90000
heap
page read and write
3BC000
unkown
page write copy
5A7B000
trusted library allocation
page read and write
29C0D1E1000
unkown
page read and write
5A7B000
trusted library allocation
page read and write
6FB000
unkown
page execute and read and write
1262000
trusted library allocation
page read and write
4D21000
heap
page read and write
4D60000
direct allocation
page execute and read and write
5A5E000
trusted library allocation
page read and write
17E4000
heap
page read and write
581800640000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
1BB8AB8C000
heap
page read and write
25680033C000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
29C0A180000
unkown
page read and write
43EF000
stack
page read and write
1BB8AB94000
heap
page read and write
7FF6183EA000
unkown
page write copy
5A6F000
trusted library allocation
page read and write
2AF4000
heap
page read and write
10E4000
heap
page read and write
3008000
heap
page read and write
3BA7BFE000
unkown
page readonly
E0D000
heap
page read and write
7579000
heap
page read and write
2C3E000
stack
page read and write
5A61000
trusted library allocation
page read and write
2FB0000
direct allocation
page read and write
3B4000
heap
page read and write
1BB8AB8C000
heap
page read and write
E55000
unkown
page readonly
15C8000
heap
page read and write
4761000
heap
page read and write
256800610000
trusted library allocation
page read and write
1BB8AB8B000
heap
page read and write
8FA000
stack
page read and write
5A69000
trusted library allocation
page read and write
581800874000
trusted library allocation
page read and write
5AAD000
trusted library allocation
page read and write
1BB8AB94000
heap
page read and write
41A1000
trusted library allocation
page read and write
1BB90F37000
unclassified section
page read and write
43D1000
heap
page read and write
581800304000
trusted library allocation
page read and write
4C40000
direct allocation
page execute and read and write
1BB8AB9D000
heap
page read and write
1168000
heap
page read and write
1BB87600000
heap
page read and write
4761000
heap
page read and write
1BB87722000
heap
page read and write
102000
unkown
page execute and read and write
1BB8AB94000
heap
page read and write
1BB8B109000
heap
page read and write
327B000
heap
page read and write
1757000
heap
page read and write
581800EA4000
trusted library allocation
page read and write
B32000
unkown
page execute and read and write
51B000230000
direct allocation
page read and write
2D6F000
stack
page read and write
6A21000
heap
page read and write
840000
heap
page read and write
1507000
trusted library allocation
page read and write
BA1000
heap
page read and write
581800A01000
trusted library allocation
page read and write
402F000
stack
page read and write
1BB8AB95000
heap
page read and write
EE4000
heap
page read and write
1244000
heap
page read and write
2568006E8000
trusted library allocation
page read and write
1BB8AB90000
heap
page read and write
43D1000
heap
page read and write
5260000
trusted library allocation
page read and write
581800398000
trusted library allocation
page read and write
2E3F000
stack
page read and write
1BB8AB9D000
heap
page read and write
4AA1000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
131F000
trusted library allocation
page read and write
6A21000
heap
page read and write
1BB91840000
trusted library section
page read and write
41A1000
trusted library allocation
page read and write
1BB8AB94000
heap
page read and write
1BB8AB95000
heap
page read and write
3BCB3FE000
stack
page read and write
581800358000
trusted library allocation
page read and write
233E000
stack
page read and write
2710000
heap
page read and write
55D8000
trusted library allocation
page read and write
5818001D8000
trusted library allocation
page read and write
1BB8B11D000
heap
page read and write
43D1000
heap
page read and write
74C3000
heap
page read and write
4830000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
6A21000
heap
page read and write
4BF1000
heap
page read and write
D44000
heap
page read and write
285E000
heap
page read and write
41A1000
trusted library allocation
page read and write
581800A18000
trusted library allocation
page read and write
4BD1000
heap
page read and write
6A21000
heap
page read and write
1BB8B030000
trusted library section
page read and write
5F0000
heap
page read and write
D44000
heap
page read and write
1BB8ABA2000
heap
page read and write
126A000
trusted library allocation
page read and write
4761000
heap
page read and write
223B000
heap
page read and write
510000
direct allocation
page read and write
1314000
heap
page read and write
3BAC3FE000
stack
page read and write
581800DE4000
trusted library allocation
page read and write
4392000
trusted library allocation
page read and write
4BF1000
heap
page read and write
5BF9000
trusted library allocation
page read and write
2EB7000
heap
page read and write
C1F000
heap
page read and write
4BF1000
heap
page read and write
3B4000
heap
page read and write
2A2F000
stack
page read and write
112F000
heap
page read and write
5818003A4000
trusted library allocation
page read and write
14ED000
heap
page read and write
29C0CDA0000
heap
page read and write
43D1000
heap
page read and write
2AEA000
heap
page read and write
1BB8AB90000
heap
page read and write
964000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
6A21000
heap
page read and write
1BB8AB8C000
heap
page read and write
581800E24000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
98000
stack
page read and write
326D000
heap
page read and write
58180000C000
trusted library allocation
page read and write
504000
heap
page read and write
3732000
heap
page read and write
3A4F000
stack
page read and write
1BB8ABA7000
heap
page read and write
400F000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
43D1000
heap
page read and write
50C4000
direct allocation
page read and write
55F6000
trusted library allocation
page read and write
113A000
heap
page read and write
1BB8AB9D000
heap
page read and write
581800B14000
trusted library allocation
page read and write
5A98000
trusted library allocation
page read and write
420000
unkown
page read and write
1BB8AB9D000
heap
page read and write
5B71000
trusted library allocation
page read and write
C0A000
heap
page read and write
1BB8AB90000
heap
page read and write
20959BF3000
heap
page read and write
256800694000
trusted library allocation
page read and write
C08000
heap
page read and write
70F0000
direct allocation
page execute and read and write
581800D84000
trusted library allocation
page read and write
4761000
heap
page read and write
41A1000
trusted library allocation
page read and write
4BD1000
heap
page read and write
D80000
unkown
page readonly
5818003B8000
trusted library allocation
page read and write
581800F78000
trusted library allocation
page read and write
5A7B000
trusted library allocation
page read and write
1BB8AB8C000
heap
page read and write
5200000
direct allocation
page execute and read and write
E19000
heap
page read and write
1BB8ABA0000
heap
page read and write
1BB8AB9D000
heap
page read and write
581800488000
trusted library allocation
page read and write
1BB8ABA7000
heap
page read and write
256800724000
trusted library allocation
page read and write
581800910000
trusted library allocation
page read and write
1BB8AB95000
heap
page read and write
4BD1000
heap
page read and write
1BB8AB9D000
heap
page read and write
1244000
heap
page read and write
1BB8B0CC000
heap
page read and write
5818003A4000
trusted library allocation
page read and write
3BC73FD000
stack
page read and write
256800770000
trusted library allocation
page read and write
1BB8AB90000
heap
page read and write
1BB90F10000
trusted library section
page read and write
41A1000
trusted library allocation
page read and write
4D70000
direct allocation
page execute and read and write
2680000
direct allocation
page execute and read and write
1440000
heap
page read and write
2D10000
direct allocation
page read and write
74C1000
heap
page read and write
20959F24000
heap
page read and write
28C0000
heap
page read and write
1BB8ABA7000
heap
page read and write
1475000
heap
page read and write
2275CB45000
heap
page read and write
20958830000
unkown
page read and write
5A7B000
trusted library allocation
page read and write
EE4000
heap
page read and write
1BB8AB9D000
heap
page read and write
401000
unkown
page execute read
74C1000
heap
page read and write
5D3E000
stack
page read and write
20958F90000
unkown
page read and write
3BAABFE000
unkown
page readonly
434000
unkown
page read and write
364E000
stack
page read and write
1BB8AB94000
heap
page read and write
4AA1000
trusted library allocation
page read and write
3B2000
unkown
page readonly
1263000
trusted library allocation
page read and write
5A67000
trusted library allocation
page read and write
43D1000
heap
page read and write
51B000284000
direct allocation
page read and write
3BB1BFE000
unkown
page readonly
2FAF000
stack
page read and write
1034000
heap
page read and write
759E000
heap
page read and write
1BB90D07000
unclassified section
page read and write
581800CDC000
trusted library allocation
page read and write
20B0000
trusted library allocation
page read and write
2E8F000
stack
page read and write
256800678000
trusted library allocation
page read and write
1401000
heap
page read and write
4BC4000
heap
page read and write
581800B24000
trusted library allocation
page read and write
35BF000
stack
page read and write
581800D10000
trusted library allocation
page read and write
670000
direct allocation
page read and write
43D1000
heap
page read and write
4BE000
stack
page read and write
5060000
direct allocation
page read and write
323E000
stack
page read and write
3271000
heap
page read and write
14E7000
heap
page read and write
58180017F000
trusted library allocation
page read and write
26F0000
direct allocation
page read and write
5A87000
trusted library allocation
page read and write
5A7B000
trusted library allocation
page read and write
1BB8AB8C000
heap
page read and write
55A2000
trusted library allocation
page read and write
10E0000
heap
page read and write
313F000
stack
page read and write
55D2000
trusted library allocation
page read and write
1141000
heap
page read and write
581800E18000
trusted library allocation
page read and write
4D70000
direct allocation
page execute and read and write
1BB8AB95000
heap
page read and write
5818001E8000
trusted library allocation
page read and write
581800164000
trusted library allocation
page read and write
4BD1000
heap
page read and write
581800CDC000
trusted library allocation
page read and write
BE5000
heap
page read and write
15C3000
heap
page read and write
29C0A180000
trusted library allocation
page read and write
581801001000
trusted library allocation
page read and write
1BB87850000
heap
page read and write
325E000
heap
page read and write
263E000
stack
page read and write
5A6F000
trusted library allocation
page read and write
581800358000
trusted library allocation
page read and write
43D1000
heap
page read and write
74CB000
heap
page read and write
26F0000
direct allocation
page read and write
581800A60000
trusted library allocation
page read and write
4AA1000
trusted library allocation
page read and write
6A21000
heap
page read and write
55D5000
trusted library allocation
page read and write
2FB0000
direct allocation
page read and write
6A21000
heap
page read and write
2095A081000
unkown
page read and write
256800320000
trusted library allocation
page read and write
20958830000
unkown
page read and write
7665000
heap
page read and write
2E9C000
heap
page read and write
1BB91BB0000
trusted library section
page read and write
6EA0000
direct allocation
page read and write
5A7B000
trusted library allocation
page read and write
5CDC00274000
trusted library allocation
page read and write
5818001F8000
trusted library allocation
page read and write
581800F88000
trusted library allocation
page read and write
1317000
trusted library allocation
page read and write
581800BB0000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
581800790000
trusted library allocation
page read and write
282E000
heap
page read and write
2940000
direct allocation
page read and write
20958F90000
unkown
page read and write
5818002FF000
trusted library allocation
page read and write
22C0000
heap
page read and write
5CDC0020C000
trusted library allocation
page read and write
1780000
direct allocation
page read and write
4BD1000
heap
page read and write
15A2000
heap
page read and write
964000
heap
page read and write
2690000
direct allocation
page execute and read and write
581800DCC000
trusted library allocation
page read and write
126B000
trusted library allocation
page read and write
74C8000
heap
page read and write
75AF000
heap
page read and write
5080000
direct allocation
page read and write
1F7294EA000
heap
page read and write
3BA5BFE000
unkown
page readonly
581800A18000
trusted library allocation
page read and write
1244000
heap
page read and write
1578000
heap
page read and write
1BB8AB8C000
heap
page read and write
5A61000
trusted library allocation
page read and write
74C0000
heap
page read and write
1BB8AB9D000
heap
page read and write
5CC1000
trusted library allocation
page read and write
256800320000
trusted library allocation
page read and write
1F7294B7000
heap
page read and write
3BABBFE000
unkown
page readonly
1262000
trusted library allocation
page read and write
581800DA8000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
55C4000
trusted library allocation
page read and write
2095A3F0000
unkown
page read and write
1050000
heap
page read and write
4C50000
direct allocation
page execute and read and write
39BE000
stack
page read and write
5A6A000
trusted library allocation
page read and write
1BB8AB90000
heap
page read and write
400000
unkown
page readonly
7FF6D84FA000
unkown
page write copy
1BB8ABA7000
heap
page read and write
1BB9196E000
trusted library section
page read and write
1BB8ABA0000
heap
page read and write
5AB3000
trusted library allocation
page read and write
1034000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
10E4000
heap
page read and write
15A2000
heap
page read and write
5AC8000
trusted library allocation
page read and write
581800DCC000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
4AA1000
trusted library allocation
page read and write
28AF000
stack
page read and write
58180067C000
trusted library allocation
page read and write
3BBBBFE000
unkown
page readonly
30C000
stack
page read and write
41A1000
trusted library allocation
page read and write
74C6000
heap
page read and write
14ED000
heap
page read and write
55C0000
trusted library allocation
page read and write
4C0000
heap
page read and write
5818006B8000
trusted library allocation
page read and write
256800418000
trusted library allocation
page read and write
E20000
direct allocation
page execute and read and write
1F729680000
heap
page read and write
1BB8AB90000
heap
page read and write
3732000
heap
page read and write
1314000
heap
page read and write
20959BF3000
heap
page read and write
2275CB46000
heap
page read and write
5CDC002C0000
trusted library allocation
page read and write
43D1000
heap
page read and write
5596000
trusted library allocation
page read and write
E7F000
stack
page read and write
1034000
heap
page read and write
7FF6183D8000
unkown
page readonly
86A000
unkown
page execute and write copy
5A74000
trusted library allocation
page read and write
29C0A180000
unkown
page read and write
762E000
heap
page read and write
55DD000
trusted library allocation
page read and write
296C000
stack
page read and write
5818010B0000
trusted library allocation
page read and write
1BB8AB95000
heap
page read and write
41A1000
trusted library allocation
page read and write
581800174000
trusted library allocation
page read and write
14D2000
heap
page read and write
2FB0000
direct allocation
page read and write
964000
heap
page read and write
14D4000
heap
page read and write
29C0CD3B000
heap
page read and write
5CF2000
trusted library allocation
page read and write
2DBE000
stack
page read and write
70F0000
direct allocation
page execute and read and write
150E000
trusted library allocation
page read and write
302E000
stack
page read and write
400000
unkown
page readonly
630000
heap
page read and write
51B0002EC000
direct allocation
page read and write
3BB2BFE000
unkown
page readonly
2095A081000
unkown
page read and write
581800E98000
trusted library allocation
page read and write
1BB8AB90000
heap
page read and write
680000
direct allocation
page execute and read and write
1314000
heap
page read and write
581800C24000
trusted library allocation
page read and write
1BB8ABA0000
heap
page read and write
4A70000
direct allocation
page execute and read and write
10E4000
heap
page read and write
7638000
heap
page read and write
1BB8AB90000
heap
page read and write
3C4000
unkown
page readonly
39CF000
stack
page read and write
51E0000
direct allocation
page execute and read and write
29CE000
stack
page read and write
4BD1000
heap
page read and write
14EE000
stack
page read and write
256800730000
trusted library allocation
page read and write
100E000
stack
page read and write
49E0000
direct allocation
page execute and read and write
6A21000
heap
page read and write
1BB8AB90000
heap
page read and write
74C0000
heap
page read and write
581801130000
trusted library allocation
page read and write
1780000
direct allocation
page read and write
77A9000
heap
page read and write
256800620000
trusted library allocation
page read and write
10B000
unkown
page execute and read and write
2E8C000
stack
page read and write
1BB8AB95000
heap
page read and write
BE5000
heap
page read and write
D24000
heap
page read and write
5818003C4000
trusted library allocation
page read and write
55D8000
trusted library allocation
page read and write
EE4000
heap
page read and write
581800D4C000
trusted library allocation
page read and write
581800728000
trusted library allocation
page read and write
581800CCC000
trusted library allocation
page read and write
E6B000
stack
page read and write
5BA9000
trusted library allocation
page read and write
43D1000
heap
page read and write
3BAEBFE000
unkown
page readonly
1BB8F2CB000
heap
page read and write
20956B32000
heap
page read and write
4D50000
direct allocation
page execute and read and write
1BB8B16D000
heap
page read and write
1500000
trusted library allocation
page read and write
2DEE000
stack
page read and write
30C000
stack
page read and write
6A21000
heap
page read and write
1BB8ABA7000
heap
page read and write
10E4000
heap
page read and write
6B20000
trusted library allocation
page read and write
7FF6D8504000
unkown
page readonly
670000
direct allocation
page read and write
327B000
heap
page read and write
4AA1000
trusted library allocation
page read and write
40FF000
stack
page read and write
3732000
heap
page read and write
4BD1000
heap
page read and write
B8E000
heap
page read and write
64E000
stack
page read and write
421000
unkown
page execute and write copy
14D0000
heap
page read and write
2FBE000
stack
page read and write
E5F000
stack
page read and write
5AF4000
trusted library allocation
page read and write
4761000
heap
page read and write
4BF1000
heap
page read and write
3BCC3FE000
stack
page read and write
1475000
heap
page read and write
2275C8C0000
heap
page read and write
670000
direct allocation
page read and write
20958F90000
unkown
page read and write
1BB8ABA2000
heap
page read and write
1F7294B7000
heap
page read and write
2275CAD0000
heap
page read and write
581800F68000
trusted library allocation
page read and write
55B9000
trusted library allocation
page read and write
401000
unkown
page execute read
1BB90FF0000
trusted library section
page read and write
3731000
heap
page read and write
3BB73FD000
stack
page read and write
4761000
heap
page read and write
1BB8AB8C000
heap
page read and write
256800248000
trusted library allocation
page read and write
425C000
trusted library allocation
page read and write
7553000
heap
page read and write
5818002A8000
trusted library allocation
page read and write
289F000
stack
page read and write
4C91000
heap
page read and write
5A5B000
trusted library allocation
page read and write
605C000
trusted library allocation
page read and write
6A21000
heap
page read and write
5A6F000
trusted library allocation
page read and write
964000
heap
page read and write
49E0000
direct allocation
page execute and read and write
2D10000
direct allocation
page read and write
581800B78000
trusted library allocation
page read and write
581800298000
trusted library allocation
page read and write
4BC0000
direct allocation
page execute and read and write
49AF000
stack
page read and write
131E000
trusted library allocation
page read and write
1BB8AB89000
heap
page read and write
26F0000
direct allocation
page read and write
581800E0C000
trusted library allocation
page read and write
D44000
heap
page read and write
41A1000
trusted library allocation
page read and write
45FF000
stack
page read and write
1BB8AB9D000
heap
page read and write
290F000
stack
page read and write
3BAD3FD000
stack
page read and write
29C0A180000
unkown
page read and write
266E000
stack
page read and write
5B52000
trusted library allocation
page read and write
860000
unkown
page readonly
EE4000
heap
page read and write
37D000
unkown
page execute and write copy
1BB87670000
heap
page read and write
2ACE000
heap
page read and write
4C20000
direct allocation
page execute and read and write
1BB8B112000
heap
page read and write
581800C68000
trusted library allocation
page read and write
2F0000
unkown
page readonly
1BB8AB9D000
heap
page read and write
1034000
heap
page read and write
3470000
heap
page read and write
581800B38000
trusted library allocation
page read and write
3BC23FD000
stack
page read and write
1BB8AB9D000
heap
page read and write
5D75000
heap
page read and write
5A5B000
trusted library allocation
page read and write
3981000
heap
page read and write
70F0000
direct allocation
page execute and read and write
1244000
heap
page read and write
EC000
stack
page read and write
20B0000
trusted library allocation
page read and write
5A8A000
trusted library allocation
page read and write
2690000
direct allocation
page execute and read and write
49E0000
direct allocation
page execute and read and write
43D1000
heap
page read and write
70E0000
direct allocation
page execute and read and write
29C09CFF000
heap
page read and write
42305FE000
stack
page read and write
4AA1000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
41F1000
trusted library allocation
page read and write
256800714000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
510000
direct allocation
page read and write
285E000
heap
page read and write
1307000
trusted library allocation
page read and write
12F5000
trusted library allocation
page read and write
1BB8B0F4000
heap
page read and write
1BB8EE74000
trusted library allocation
page read and write
4A8E000
stack
page read and write
131C000
trusted library allocation
page read and write
6A21000
heap
page read and write
4761000
heap
page read and write
14E4000
heap
page read and write
33EE000
stack
page read and write
58180096C000
trusted library allocation
page read and write
310F000
stack
page read and write
581800064000
trusted library allocation
page read and write
58180026C000
trusted library allocation
page read and write
150D000
trusted library allocation
page read and write
B94000
heap
page read and write
5A8A000
trusted library allocation
page read and write
42302FF000
stack
page read and write
581800EF0000
trusted library allocation
page read and write
1BB8AB94000
heap
page read and write
55F5000
trusted library allocation
page read and write
5270000
remote allocation
page read and write
5ACB000
trusted library allocation
page read and write
55D8000
trusted library allocation
page read and write
1BB8EB90000
trusted library section
page read and write
29C0B9C9000
heap
page read and write
5A7A000
trusted library allocation
page read and write
5A63000
trusted library allocation
page read and write
5A87000
trusted library allocation
page read and write
581800CA4000
trusted library allocation
page read and write
756D000
heap
page read and write
1244000
heap
page read and write
1471000
heap
page read and write
780C000
heap
page read and write
2568002F2000
trusted library allocation
page read and write
327B000
heap
page read and write
43D1000
heap
page read and write
5A7A000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
581800234000
trusted library allocation
page read and write
2ECE000
stack
page read and write
1BB8AB95000
heap
page read and write
17D0000
direct allocation
page execute and read and write
2D3E000
stack
page read and write
2AEA000
heap
page read and write
326C000
heap
page read and write
1BB8AB96000
heap
page read and write
70F0000
direct allocation
page execute and read and write
1BB8ABA0000
heap
page read and write
883000
unkown
page execute and read and write
E0C000
heap
page read and write
1263000
trusted library allocation
page read and write
43D1000
heap
page read and write
1F7294EA000
heap
page read and write
2095A081000
unkown
page read and write
1166000
heap
page read and write
489E000
stack
page read and write
51E0000
direct allocation
page execute and read and write
3271000
heap
page read and write
41A1000
trusted library allocation
page read and write
5AE8000
trusted library allocation
page read and write
1263000
trusted library allocation
page read and write
964000
heap
page read and write
55E5000
trusted library allocation
page read and write
29C0A180000
unkown
page read and write
4BE0000
direct allocation
page read and write
43D1000
heap
page read and write
581800F20000
trusted library allocation
page read and write
510000
direct allocation
page read and write
5818012F8000
trusted library allocation
page read and write
6B5000
heap
page read and write
304E000
stack
page read and write
256800754000
trusted library allocation
page read and write
1F7294E0000
heap
page read and write
41A1000
trusted library allocation
page read and write
599CBFF000
stack
page read and write
4781000
heap
page read and write
4BD1000
heap
page read and write
29C0A180000
unkown
page read and write
1BB8AB90000
heap
page read and write
1166000
heap
page read and write
1244000
heap
page read and write
43D1000
heap
page read and write
3C0000
unkown
page write copy
43D1000
heap
page read and write
4AA1000
trusted library allocation
page read and write
4AA1000
trusted library allocation
page read and write
5B09000
trusted library allocation
page read and write
314E000
stack
page read and write
510000
direct allocation
page read and write
58180040C000
trusted library allocation
page read and write
328E000
heap
page read and write
51B000274000
direct allocation
page read and write
41A1000
trusted library allocation
page read and write
BC9000
heap
page read and write
4AA1000
trusted library allocation
page read and write
338F000
stack
page read and write
20959CFB000
heap
page read and write
4AA1000
trusted library allocation
page read and write
5A7B000
trusted library allocation
page read and write
2690000
direct allocation
page execute and read and write
581800C5C000
trusted library allocation
page read and write
75AB000
direct allocation
page read and write
E10000
direct allocation
page read and write
256800760000
trusted library allocation
page read and write
581800F68000
trusted library allocation
page read and write
2AFD000
heap
page read and write
15AB000
heap
page read and write
29C0A180000
unkown
page read and write
70F0000
direct allocation
page execute and read and write
3CAE000
stack
page read and write
15A2000
heap
page read and write
581800290000
trusted library allocation
page read and write
3BACBFE000
unkown
page readonly
19B000
stack
page read and write
757B000
heap
page read and write
3644000
heap
page read and write
760000
unkown
page readonly
EE4000
heap
page read and write
5A61000
trusted library allocation
page read and write
4BD1000
heap
page read and write
3BC000
unkown
page read and write
5AB3000
trusted library allocation
page read and write
1F7294B5000
heap
page read and write
70F0000
direct allocation
page execute and read and write
29C0D4F7000
unkown
page read and write
1BB8B103000
heap
page read and write
3C4000
unkown
page readonly
1686000
heap
page read and write
1BB8ABA7000
heap
page read and write
150A000
trusted library allocation
page read and write
5818003B8000
trusted library allocation
page read and write
1508000
trusted library allocation
page read and write
113C000
heap
page read and write
1BB8B105000
heap
page read and write
3BAE3FA000
stack
page read and write
1267000
trusted library allocation
page read and write
1313000
trusted library allocation
page read and write
4A50000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
7FF6183F4000
unkown
page readonly
41A1000
trusted library allocation
page read and write
3732000
heap
page read and write
3BC43FE000
stack
page read and write
2D4F000
stack
page read and write
150A000
trusted library allocation
page read and write
D24000
heap
page read and write
25AF000
stack
page read and write
20958830000
trusted library allocation
page read and write
1BB8773B000
heap
page read and write
55B2000
trusted library allocation
page read and write
23AD000
stack
page read and write
292E000
stack
page read and write
3732000
heap
page read and write
5AB1000
trusted library allocation
page read and write
4BD1000
heap
page read and write
74CB000
heap
page read and write
5A7B000
trusted library allocation
page read and write
20959E0C000
heap
page read and write
4A00000
direct allocation
page execute and read and write
4BD1000
heap
page read and write
581800CCC000
trusted library allocation
page read and write
1319000
trusted library allocation
page read and write
46E0000
heap
page read and write
E8E000
stack
page read and write
5A61000
trusted library allocation
page read and write
20958F90000
unkown
page read and write
1BB8AB94000
heap
page read and write
581800220000
trusted library allocation
page read and write
1BB8AB94000
heap
page read and write
1472000
heap
page read and write
1F7294AA000
heap
page read and write
2F2C000
stack
page read and write
74C4000
heap
page read and write
5A8A000
trusted library allocation
page read and write
1F7294A0000
heap
page read and write
330F000
stack
page read and write
25680040C000
trusted library allocation
page read and write
74C8000
heap
page read and write
1BB8AB90000
heap
page read and write
41A1000
trusted library allocation
page read and write
1BB91FD0000
trusted library section
page read and write
55C7000
trusted library allocation
page read and write
43D1000
heap
page read and write
3D90000
heap
page read and write
581800A18000
trusted library allocation
page read and write
1BB8AB8C000
heap
page read and write
74C9000
heap
page read and write
3980000
heap
page read and write
766B000
heap
page read and write
15C6000
heap
page read and write
42307FE000
stack
page read and write
29C0A180000
unkown
page read and write
5A7B000
trusted library allocation
page read and write
5CDC002C0000
trusted library allocation
page read and write
1F7294E6000
heap
page read and write
1BB8ABA2000
heap
page read and write
380000
heap
page read and write
43D1000
heap
page read and write
818000
heap
page read and write
20959BF3000
heap
page read and write
74CE000
heap
page read and write
4C6F000
stack
page read and write
4BD1000
heap
page read and write
5AB0000
trusted library allocation
page read and write
4BD1000
heap
page read and write
760000
unkown
page readonly
14DD000
heap
page read and write
3BC9BFE000
unkown
page readonly
1BB8AB8C000
heap
page read and write
42308FF000
stack
page read and write
D24000
heap
page read and write
1BB8AB9D000
heap
page read and write
581800A3C000
trusted library allocation
page read and write
5A7F000
trusted library allocation
page read and write
1BB8AB94000
heap
page read and write
5818002B9000
trusted library allocation
page read and write
29C0CDA5000
heap
page read and write
7FF000
heap
page read and write
68E000
stack
page read and write
5A8A000
trusted library allocation
page read and write
1BB8AB94000
heap
page read and write
7DCE000
stack
page read and write
159F000
heap
page read and write
20958F90000
unkown
page read and write
76BA000
heap
page read and write
D24000
heap
page read and write
5B01000
trusted library allocation
page read and write
4D10000
direct allocation
page read and write
5A61000
trusted library allocation
page read and write
1BB8ABA2000
heap
page read and write
BE1000
heap
page read and write
2D10000
direct allocation
page read and write
58180061C000
trusted library allocation
page read and write
5818010E4000
trusted library allocation
page read and write
3732000
heap
page read and write
3732000
heap
page read and write
4BD1000
heap
page read and write
5818001B4000
trusted library allocation
page read and write
420C000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
B9F000
heap
page read and write
256800330000
trusted library allocation
page read and write
25680039C000
trusted library allocation
page read and write
1BB8AB94000
heap
page read and write
29C09D01000
heap
page read and write
EE4000
heap
page read and write
4780000
trusted library allocation
page read and write
7C0000
heap
page read and write
13EF000
stack
page read and write
5A6A000
trusted library allocation
page read and write
581800294000
trusted library allocation
page read and write
2568006EC000
trusted library allocation
page read and write
5818001F4000
trusted library allocation
page read and write
3B0E000
stack
page read and write
2568006E0000
trusted library allocation
page read and write
530000
heap
page read and write
964000
heap
page read and write
5A61000
trusted library allocation
page read and write
61EA000
heap
page read and write
3188000
heap
page read and write
2AE0000
heap
page read and write
15C6000
heap
page read and write
109000
unkown
page write copy
581800980000
trusted library allocation
page read and write
3180000
heap
page read and write
38C000
unkown
page readonly
1588000
heap
page read and write
256800601000
trusted library allocation
page read and write
5A61000
trusted library allocation
page read and write
74C2000
heap
page read and write
690000
unkown
page readonly
D24000
heap
page read and write
4BF1000
heap
page read and write
5818001E0000
trusted library allocation
page read and write
2568003EC000
trusted library allocation
page read and write
1ED000
stack
page read and write
4BF1000
heap
page read and write
2EB8000
heap
page read and write
5818003AC000
trusted library allocation
page read and write
14E3000
heap
page read and write
E30000
heap
page read and write
2095A494000
unkown
page read and write
D0F000
stack
page read and write
581800EC8000
trusted library allocation
page read and write
5A61000
trusted library allocation
page read and write
EE4000
heap
page read and write
420B000
trusted library allocation
page read and write
404E000
stack
page read and write
19B000
stack
page read and write
6A21000
heap
page read and write
3BAFBFE000
unkown
page readonly
C22000
heap
page read and write
581800A18000
trusted library allocation
page read and write
1BB9185E000
trusted library section
page read and write
41EB000
trusted library allocation
page read and write
256800784000
trusted library allocation
page read and write
14E4000
heap
page read and write
3B9D3EF000
stack
page read and write
5210000
direct allocation
page execute and read and write
5A7A000
trusted library allocation
page read and write
581801028000
trusted library allocation
page read and write
45AF000
stack
page read and write
5818003E8000
trusted library allocation
page read and write
AFC000
unkown
page execute and write copy
827000
heap
page read and write
3030000
heap
page read and write
43D1000
heap
page read and write
4AA1000
trusted library allocation
page read and write
55D6000
trusted library allocation
page read and write
4BD1000
heap
page read and write
1BB8AB8C000
heap
page read and write
3C8E000
stack
page read and write
3BB13FE000
stack
page read and write
274C000
stack
page read and write
3BBABFE000
unkown
page readonly
53C000
stack
page read and write
1BB8AB9D000
heap
page read and write
964000
heap
page read and write
D45000
heap
page read and write
55AF000
trusted library allocation
page read and write
2AD0000
heap
page read and write
2D10000
direct allocation
page read and write
4BD1000
heap
page read and write
10E4000
heap
page read and write
1BB918C3000
trusted library section
page read and write
5818001DC000
trusted library allocation
page read and write
964000
heap
page read and write
1BB8B14F000
heap
page read and write
126C000
trusted library allocation
page read and write
4BE0000
direct allocation
page read and write
581800104000
trusted library allocation
page read and write
1BB8EE92000
trusted library allocation
page read and write
1BB8AB90000
heap
page read and write
279C000
stack
page read and write
2EA1000
heap
page read and write
2D10000
direct allocation
page read and write
1BB8ABA2000
heap
page read and write
1166000
heap
page read and write
7637000
heap
page read and write
3AC000
unkown
page execute and write copy
7FF618300000
unkown
page readonly
581800888000
trusted library allocation
page read and write
7754000
heap
page read and write
1BB8B105000
heap
page read and write
D44000
heap
page read and write
7561000
heap
page read and write
5818001C4000
trusted library allocation
page read and write
99B000
unkown
page execute and read and write
3731000
heap
page read and write
5818005DC000
trusted library allocation
page read and write
2FB0000
direct allocation
page read and write
959000
unkown
page execute and read and write
1269000
trusted library allocation
page read and write
581800550000
trusted library allocation
page read and write
15A1000
heap
page read and write
1BB8AB95000
heap
page read and write
581800AB0000
trusted library allocation
page read and write
BFD000
heap
page read and write
2AEA000
heap
page read and write
425D000
trusted library allocation
page read and write
370000
heap
page read and write
4C36000
direct allocation
page read and write
EE4000
heap
page read and write
581800D10000
trusted library allocation
page read and write
2FB0000
direct allocation
page read and write
167E000
heap
page read and write
6A21000
heap
page read and write
1BB8AB9D000
heap
page read and write
51B000260000
direct allocation
page read and write
5A64000
trusted library allocation
page read and write
5818003E8000
trusted library allocation
page read and write
7603000
heap
page read and write
5B89000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
2D10000
direct allocation
page read and write
3E90000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
4A40000
direct allocation
page execute and read and write
5AD1000
trusted library allocation
page read and write
1BB8ABA7000
heap
page read and write
5A8A000
trusted library allocation
page read and write
29C09D20000
heap
page read and write
2676000
heap
page read and write
5A7A000
trusted library allocation
page read and write
1BB8AB9D000
heap
page read and write
15A5000
heap
page read and write
256800430000
trusted library allocation
page read and write
5AE9000
trusted library allocation
page read and write
964000
heap
page read and write
5A6F000
trusted library allocation
page read and write
5110000
direct allocation
page read and write
4BD1000
heap
page read and write
4BF1000
heap
page read and write
49F0000
direct allocation
page execute and read and write
1264000
trusted library allocation
page read and write
3BC33FD000
stack
page read and write
256800404000
trusted library allocation
page read and write
29C0D1E1000
unkown
page read and write
43D1000
heap
page read and write
2690000
direct allocation
page execute and read and write
49E0000
direct allocation
page execute and read and write
581801044000
trusted library allocation
page read and write
5A6F000
trusted library allocation
page read and write
53E000
heap
page read and write
29C0A180000
unkown
page read and write
159C000
heap
page read and write
2095A1D1000
unkown
page read and write
34EF000
stack
page read and write
5818003B8000
trusted library allocation
page read and write
55FF000
trusted library allocation
page read and write
3BC000
unkown
page write copy
1244000
heap
page read and write
4781000
heap
page read and write
80000
unkown
page readonly
3BBE3FE000
stack
page read and write
42301FE000
stack
page read and write
6FB000
unkown
page execute and read and write
2E10000
heap
page read and write
4BF1000
heap
page read and write
14C4000
heap
page read and write
5A8A000
trusted library allocation
page read and write
13FD000
stack
page read and write
2DE8000
heap
page read and write
51E0000
direct allocation
page execute and read and write
82C000
heap
page read and write
43D1000
heap
page read and write
1244000
heap
page read and write
581800358000
trusted library allocation
page read and write
581800183000
trusted library allocation
page read and write
581800ED8000
trusted library allocation
page read and write
55AA000
trusted library allocation
page read and write
964000
heap
page read and write
6A21000
heap
page read and write
17E4000
heap
page read and write
5AB6000
trusted library allocation
page read and write
29C0CD3B000
heap
page read and write
1F7294F2000
heap
page read and write
640000
heap
page read and write
1244000
heap
page read and write
1BB8772F000
heap
page read and write
5818001B4000
trusted library allocation
page read and write
964000
heap
page read and write
5A69000
trusted library allocation
page read and write
4BD1000
heap
page read and write
5818003B8000
trusted library allocation
page read and write
109000
unkown
page write copy
43D1000
heap
page read and write
29C0D1E1000
unkown
page read and write
43D1000
heap
page read and write
E3E000
heap
page read and write
1BB8AB9D000
heap
page read and write
1BB8ABA2000
heap
page read and write
327E000
heap
page read and write
581800948000
trusted library allocation
page read and write
5A6F000
trusted library allocation
page read and write
9BF000
stack
page read and write
22D5000
heap
page read and write
37AE000
stack
page read and write
41A1000
trusted library allocation
page read and write
15BF000
heap
page read and write
6A21000
heap
page read and write
5A7B000
trusted library allocation
page read and write
256800260000
trusted library allocation
page read and write
2D10000
direct allocation
page read and write
2FDE000
stack
page read and write
30BF000
stack
page read and write
5A61000
trusted library allocation
page read and write
420000
unkown
page readonly
43D1000
heap
page read and write
5A7B000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
3B4000
heap
page read and write
2568002EC000
trusted library allocation
page read and write
298B000
heap
page read and write
7B50000
heap
page read and write
51B000303000
direct allocation
page read and write
58180080C000
trusted library allocation
page read and write
5818008B0000
trusted library allocation
page read and write
EE4000
heap
page read and write
1BB8AB95000
heap
page read and write
3EBE000
stack
page read and write
1BB8ABA7000
heap
page read and write
5AE9000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
5A86000
trusted library allocation
page read and write
3BCDBFE000
unkown
page readonly
1BB910C2000
trusted library section
page read and write
5B5A000
trusted library allocation
page read and write
1BB8ABA8000
heap
page read and write
14D2000
heap
page read and write
4BE0000
direct allocation
page read and write
12F7000
trusted library allocation
page read and write
15C4000
heap
page read and write
43F1000
heap
page read and write
1244000
heap
page read and write
5818006AD000
trusted library allocation
page read and write
964000
heap
page read and write
964000
heap
page read and write
964000
heap
page read and write
2F0000
unkown
page readonly
4BE0000
direct allocation
page read and write
2940000
direct allocation
page read and write
2B60000
heap
page read and write
26F0000
direct allocation
page read and write
55EC000
trusted library allocation
page read and write
There are 3838 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=3907f97605.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=3907f97605.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=3907f97605.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=3907f97605.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=3907f97605.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=3907f97605.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0