IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\qk4EiZw[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\random[2].exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1012933001\qk4EiZw.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1012942001\9faf801df7.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1012943001\0fb4fa91ba.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1012944001\e0da62c8af.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Documents\AAAAECGHCB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BKJKJEHJJDAKECBFCGIDBGCAEG
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\EBAKFIIJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IJDBGDGCGDAKFIDGIDBF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IJKKEHJDHJKFIECAAKFIJJKJKF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JDHCBAEHJJJKKFIDGHJE
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\ProgramData\JEBKEHJJDAAAAKECBGHD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JJJJEBGD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\2173e7be-c3a6-4daf-b4db-e90aa81c49c2.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\7993af03-b9da-4e6b-a05a-521ccc4de1df.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-675438A1-1944.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-675438A1-BCC.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF24154.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF24164.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF24eb2.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF24ec2.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\b1d5d7d3-699f-4aba-a6d2-7712a7cffb9e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\d47d22d0-c206-4d31-87ff-942a34325421.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\de2b6f67-53e2-4245-8702-81d8db73ba0c.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msedge.lnk
MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
Chrome Cache Entry: 100
ASCII text
downloaded
Chrome Cache Entry: 101
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 102
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 103
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 98
ASCII text, with very long lines (2412)
downloaded
Chrome Cache Entry: 99
ASCII text, with very long lines (752)
downloaded
There are 48 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2872 --field-trial-handle=2840,i,13733945476958162739,14775988417437195856,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2516 --field-trial-handle=2424,i,11967223973417229962,6328825183861097206,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2216 --field-trial-handle=2160,i,15529322534774427981,4503819060764799590,262144 /prefetch:3
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\Documents\AAAAECGHCB.exe"
malicious
C:\Users\user\Documents\AAAAECGHCB.exe
"C:\Users\user\Documents\AAAAECGHCB.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user~1\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user~1\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user~1\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1012933001\qk4EiZw.exe
"C:\Users\user~1\AppData\Local\Temp\1012933001\qk4EiZw.exe"
malicious
C:\Users\user\AppData\Local\Temp\1012942001\9faf801df7.exe
"C:\Users\user~1\AppData\Local\Temp\1012942001\9faf801df7.exe"
malicious
C:\Users\user\AppData\Local\Temp\1012943001\0fb4fa91ba.exe
"C:\Users\user~1\AppData\Local\Temp\1012943001\0fb4fa91ba.exe"
malicious
C:\Users\user\AppData\Local\Temp\1012944001\e0da62c8af.exe
"C:\Users\user~1\AppData\Local\Temp\1012944001\e0da62c8af.exe"
malicious
C:\Users\user\AppData\Local\Temp\1012942001\9faf801df7.exe
"C:\Users\user~1\AppData\Local\Temp\1012942001\9faf801df7.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.206/68b591d6548ec281/mozglue.dllL
unknown
malicious
112.213.116.149
malicious
http://185.215.113.206/68b591d6548ec281/softokn3.dll
185.215.113.206
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://duckduckgo.com/chrome_newtab
unknown
dare-curbys.biz
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
http://www.broofa.com
unknown
http://31.41.244.11/files/7299809293/qk4EiZw.exeXYZ0123456789
unknown
http://185.215.113.206/ws
unknown
http://31.41.244.11/files/7299809293/qk4EiZw.exe
unknown
https://www.google.com
unknown
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
https://atten-supporse.biz/&
unknown
http://185.215.113.206/c4becf79229cb002.phpation
unknown
http://185.215.113.206/68b591d6548ec281/freebl3.dll
185.215.113.206
formy-spill.biz
http://185.215.113.206/68b591d6548ec281/nss3.dll
185.215.113.206
http://185.215.113.2069365c8833f063ca53d79d3b404e416815d450862636a9c8fb29yZSBPbGR8MXxcQml0Y29pblx8Kn
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.181.68
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
http://185.215.113.16/well/random.exe
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dllf
unknown
http://185.215.113.206/c4becf79229cb002.phpcg
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://atten-supporse.biz/api
104.21.16.9
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://185.215.113.206/c4becf79229cb002.php1e
unknown
https://play.google.com/log?format=json&hasfast=true
unknown
http://crl.micro
unknown
http://185.215.113.16/well/random.exeQ
unknown
atten-supporse.biz
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
http://31.41.244.11/files/7299809293/qk4EiZw.exeshqos.dll)U
unknown
http://185.215.113.206/c4becf79229cb002.phpP
unknown
https://atten-supporse.biz/
unknown
print-vexer.biz
http://185.215.113.206/c4becf79229cb002.phpBS;.VBE;.JS;.JSE;.
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dll
185.215.113.206
http://185.215.113.206/68b591d6548ec281/msvcp140.dllD
unknown
impend-differ.biz
http://185.215.113.206PBMpw
unknown
http://185.215.113.206/c4becf79229cb002.phpd
unknown
http://185.215.113.16/well/random.exec613
unknown
http://185.215.113.16/well/random.exeo
unknown
http://185.215.113.43/Zu7JuNko/index.phpb
unknown
http://185.215.113.16/mine/random.exe
185.215.113.16
http://185.215.113.43/Zu7JuNko/index.phpF
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dll
185.215.113.206
http://185.215.113.206/c4becf79229cb002.phpn
unknown
dwell-exclaim.biz
http://185.215.113.16/luma/random.exe
unknown
http://185.215.113.206/c4becf79229cb002.phpx
unknown
http://185.215.113.206/68b591d6548ec281/softokn3.dllb
unknown
zinc-sneark.biz
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.206/T
unknown
http://185.215.113.16/well/random.exe450;
unknown
http://185.215.113.206/68b591d6548ec281/mozglue.dll
185.215.113.206
https://apis.google.com
unknown
se-blurry.biz
http://185.215.113.206/c4becf79229cb002.phpdge
unknown
http://www.sqlite.org/copyright.html.
unknown
https://atten-supporse.biz/apiA6
unknown
http://185.215.113.206/c4becf79229cb002.phpy5
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
covery-mover.biz
http://185.215.113.206/68b591d6548ec281/msvcp140.dll
185.215.113.206
http://185.215.113.16/steam/random.exeD
unknown
http://185.215.113.16/steam/random.exe
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/68b591d6548ec281/sqlite3.dllb
unknown
https://www.google.com/async/newtab_promos
142.250.181.68
http://185.215.113.206/68b591d6548ec281/softokn3.dllS
unknown
http://185.215.113.206ata
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.181.68
http://185.215.113.206/c4becf79229cb002.php&_
unknown
http://185.215.113.206/c4becf79229cb002.phpd2FsbGV0LmRhdHwxfEJpdGNvaW4gQ29yZSBPbGR8MXxcQml0Y29pblx8K
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.181.68
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
http://185.215.113.206/c4becf79229cb002.php/8
unknown
https://atten-supporse.biz:443/api
unknown
https://support.mozilla.org
unknown
http://185.215.113.206
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://atten-supporse.biz/api)
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
There are 87 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
atten-supporse.biz
104.21.16.9
www3.l.google.com
172.217.17.78
plus.l.google.com
172.217.17.46
www.google.com
142.250.181.68
ogs.google.com
unknown
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
192.168.2.7
unknown
unknown
malicious
185.215.113.16
unknown
Portugal
malicious
112.213.116.149
unknown
Hong Kong
malicious
185.215.113.206
unknown
Portugal
malicious
172.217.17.46
plus.l.google.com
United States
239.255.255.250
unknown
Reserved
142.250.181.68
www.google.com
United States
104.21.16.9
atten-supporse.biz
United States
127.0.0.1
unknown
unknown
31.41.244.11
unknown
Russian Federation
There are 1 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
9faf801df7.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
0fb4fa91ba.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5030000
direct allocation
page read and write
malicious
241000
unkown
page execute and read and write
malicious
241000
unkown
page execute and read and write
malicious
5395000
trusted library allocation
page read and write
malicious
BE1000
unkown
page execute and read and write
malicious
15FE000
heap
page read and write
malicious
15EC000
heap
page read and write
malicious
1C2000
unkown
page execute and read and write
malicious
541000
unkown
page execute and read and write
malicious
241000
unkown
page execute and read and write
malicious
FC1000
unkown
page execute and read and write
malicious
E50000
heap
page read and write
403E000
stack
page read and write
95BE000
stack
page read and write
6EDE6000
unkown
page readonly
3E8F000
stack
page read and write
7CE000
unkown
page execute and write copy
6EDEF000
unkown
page readonly
48E0000
direct allocation
page read and write
4781000
heap
page read and write
934000
heap
page read and write
375F000
stack
page read and write
DD4000
heap
page read and write
1D6F1000
heap
page read and write
FE0000
heap
page read and write
FDD000
heap
page read and write
4701000
heap
page read and write
7550000
trusted library allocation
page read and write
4701000
heap
page read and write
427E000
stack
page read and write
2A690000
heap
page read and write
4F71000
heap
page read and write
1458000
unkown
page execute and write copy
4F90000
direct allocation
page execute and read and write
4D0000
unkown
page execute and read and write
FA0000
direct allocation
page execute and read and write
D2A000
heap
page read and write
4701000
heap
page read and write
83F0000
trusted library allocation
page read and write
378F000
stack
page read and write
4AC000
unkown
page execute and write copy
10A4000
unkown
page execute and read and write
4F71000
heap
page read and write
2C60000
direct allocation
page read and write
48DF000
stack
page read and write
104E000
unkown
page execute and write copy
4781000
heap
page read and write
4701000
heap
page read and write
7B70000
trusted library allocation
page read and write
4781000
heap
page read and write
D10000
direct allocation
page read and write
1647000
heap
page read and write
8760000
trusted library allocation
page read and write
F10000
heap
page read and write
48C1000
heap
page read and write
23A61000
heap
page read and write
7550000
trusted library allocation
page read and write
23A68000
heap
page read and write
3C7E000
stack
page read and write
1D55D000
stack
page read and write
2A0F000
stack
page read and write
4701000
heap
page read and write
4D7000
unkown
page execute and write copy
4B0F000
stack
page read and write
FDD000
heap
page read and write
3FFF000
stack
page read and write
1D04E000
stack
page read and write
1010000
direct allocation
page read and write
43C0000
direct allocation
page read and write
83E1000
trusted library allocation
page read and write
4FB0000
direct allocation
page execute and read and write
35FF000
stack
page read and write
4701000
heap
page read and write
43C0000
direct allocation
page read and write
4C51000
heap
page read and write
4781000
heap
page read and write
83E0000
trusted library allocation
page read and write
48C1000
heap
page read and write
4D80000
direct allocation
page read and write
DC0000
heap
page read and write
7B30000
trusted library allocation
page read and write
179000
stack
page read and write
4701000
heap
page read and write
E70000
heap
page read and write
8FFE000
stack
page read and write
16C1000
heap
page read and write
4C51000
heap
page read and write
4701000
heap
page read and write
297F000
stack
page read and write
2ABE000
heap
page read and write
4F71000
heap
page read and write
85FB000
heap
page read and write
83F0000
trusted library allocation
page read and write
4701000
heap
page read and write
3BCF000
stack
page read and write
1382000
unkown
page execute and write copy
14F5000
stack
page read and write
DDF000
heap
page read and write
30FF000
stack
page read and write
4EF0000
direct allocation
page execute and read and write
DDD000
heap
page read and write
4F71000
heap
page read and write
528E000
stack
page read and write
7014E000
unkown
page read and write
559000
unkown
page execute and write copy
DC2000
heap
page read and write
7B40000
trusted library allocation
page read and write
1D70C000
heap
page read and write
44E000
unkown
page execute and write copy
347E000
stack
page read and write
7530000
trusted library allocation
page read and write
4701000
heap
page read and write
2FCC000
stack
page read and write
4F71000
heap
page read and write
54B000
unkown
page execute and write copy
13B1000
unkown
page execute and write copy
2AB000
unkown
page execute and write copy
510C000
stack
page read and write
10E9000
unkown
page execute and write copy
4EE1000
heap
page read and write
33BE000
stack
page read and write
1D6F4000
heap
page read and write
8740000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
1D70C000
heap
page read and write
4D60000
direct allocation
page execute and read and write
4C51000
heap
page read and write
4F60000
direct allocation
page read and write
398E000
stack
page read and write
4D7000
unkown
page execute and write copy
48E0000
direct allocation
page read and write
3AFF000
stack
page read and write
542000
unkown
page execute and write copy
51C0000
direct allocation
page execute and read and write
238CE000
stack
page read and write
468000
unkown
page execute and write copy
337F000
stack
page read and write
2BA0000
heap
page read and write
532F000
stack
page read and write
2AB000
unkown
page execute and read and write
8750000
trusted library allocation
page read and write
4701000
heap
page read and write
4E9000
unkown
page execute and read and write
377E000
stack
page read and write
4EE2000
heap
page read and write
515000
unkown
page execute and read and write
47E000
unkown
page execute and read and write
F48000
heap
page read and write
8770000
trusted library allocation
page read and write
1127000
unkown
page execute and read and write
81E0000
trusted library allocation
page read and write
FE1000
unkown
page execute and read and write
4D00000
direct allocation
page execute and read and write
8B6C000
stack
page read and write
14B9000
unkown
page execute and write copy
664E000
heap
page read and write
4C51000
heap
page read and write
4781000
heap
page read and write
DD0000
heap
page read and write
74A000
unkown
page execute and write copy
4EB0000
heap
page read and write
81EB000
trusted library allocation
page read and write
4701000
heap
page read and write
4701000
heap
page read and write
4A7000
unkown
page execute and write copy
4781000
heap
page read and write
4C51000
heap
page read and write
4870000
direct allocation
page read and write
4F71000
heap
page read and write
4ED0000
direct allocation
page read and write
10D1000
heap
page read and write
83E0000
trusted library allocation
page read and write
1010000
direct allocation
page read and write
1D6FE000
heap
page read and write
7B30000
trusted library allocation
page read and write
6CE00000
unkown
page readonly
E07000
heap
page read and write
C60000
heap
page read and write
531000
unkown
page execute and write copy
4781000
heap
page read and write
1078000
unkown
page execute and write copy
11F0000
heap
page read and write
2AB0000
heap
page read and write
FD0000
heap
page read and write
EC0000
heap
page read and write
4701000
heap
page read and write
239D0000
trusted library allocation
page read and write
8642000
heap
page read and write
4D10000
direct allocation
page execute and read and write
2AFE000
stack
page read and write
2F4F000
stack
page read and write
2AB000
unkown
page execute and read and write
16C7000
heap
page read and write
10CE000
unkown
page execute and write copy
8640000
heap
page read and write
121E000
stack
page read and write
4701000
heap
page read and write
638E000
stack
page read and write
44C000
unkown
page execute and read and write
831000
unkown
page execute and write copy
4F60000
direct allocation
page read and write
7590000
heap
page read and write
8A8C000
stack
page read and write
496000
unkown
page execute and read and write
3F0F000
stack
page read and write
85B0000
heap
page read and write
1D6FF000
heap
page read and write
4F60000
direct allocation
page read and write
4BA000
unkown
page execute and read and write
42CF000
stack
page read and write
6CFDE000
unkown
page read and write
1D6F1000
heap
page read and write
582000
unkown
page write copy
85C0000
heap
page read and write
700000
unkown
page write copy
8760000
trusted library allocation
page read and write
542000
unkown
page execute and write copy
4ED0000
direct allocation
page execute and read and write
4701000
heap
page read and write
D69000
heap
page read and write
DD4000
heap
page read and write
68BE000
stack
page read and write
4D20000
direct allocation
page execute and read and write
5090000
heap
page read and write
4701000
heap
page read and write
2C60000
direct allocation
page read and write
1337000
heap
page read and write
1034000
unkown
page execute and write copy
435000
unkown
page execute and read and write
85FD000
heap
page read and write
83B0000
trusted library allocation
page read and write
4701000
heap
page read and write
3D4F000
stack
page read and write
4D70000
direct allocation
page execute and read and write
1010000
direct allocation
page read and write
54B000
unkown
page execute and write copy
DD4000
heap
page read and write
363E000
stack
page read and write
38BE000
stack
page read and write
761000
unkown
page execute and read and write
DD4000
heap
page read and write
FBB000
unkown
page execute and read and write
934000
heap
page read and write
7230000
heap
page read and write
31FE000
stack
page read and write
81D000
unkown
page execute and read and write
48C1000
heap
page read and write
126E000
heap
page read and write
4C4B000
stack
page read and write
424E000
stack
page read and write
4E8000
unkown
page execute and write copy
145B000
unkown
page execute and read and write
4F71000
heap
page read and write
53A0000
remote allocation
page read and write
4F71000
heap
page read and write
80BC000
stack
page read and write
428D000
stack
page read and write
4ED0000
direct allocation
page read and write
E0E000
stack
page read and write
2EBE000
stack
page read and write
48C1000
heap
page read and write
EDE000
stack
page read and write
6867000
trusted library allocation
page read and write
F1E000
heap
page read and write
5330000
trusted library allocation
page read and write
D10000
direct allocation
page read and write
387F000
stack
page read and write
83E0000
trusted library allocation
page read and write
464E000
stack
page read and write
23A6F000
heap
page read and write
83F0000
trusted library allocation
page read and write
6F2000
unkown
page readonly
DDF000
heap
page read and write
410000
unkown
page execute and read and write
10BA000
unkown
page execute and write copy
4781000
heap
page read and write
4701000
heap
page read and write
842000
unkown
page execute and write copy
48C1000
heap
page read and write
8390000
trusted library allocation
page read and write
48C1000
heap
page read and write
43FE000
stack
page read and write
4ED0000
direct allocation
page execute and read and write
8212000
trusted library allocation
page read and write
500E000
stack
page read and write
2F3F000
stack
page read and write
4C51000
heap
page read and write
4701000
heap
page read and write
4701000
heap
page read and write
4781000
heap
page read and write
4D10000
direct allocation
page execute and read and write
11C4000
heap
page read and write
384F000
stack
page read and write
4781000
heap
page read and write
4701000
heap
page read and write
E2C000
unkown
page execute and read and write
DEA000
heap
page read and write
51A0000
trusted library allocation
page read and write
240000
unkown
page read and write
434000
unkown
page execute and write copy
453E000
stack
page read and write
417E000
stack
page read and write
4C51000
heap
page read and write
4EF3000
heap
page read and write
5580000
direct allocation
page execute and read and write
4F71000
heap
page read and write
9940000
trusted library allocation
page read and write
1F0000
heap
page read and write
3EDF000
stack
page read and write
48C1000
heap
page read and write
5AB000
unkown
page execute and read and write
404F000
stack
page read and write
4F71000
heap
page read and write
11C4000
heap
page read and write
313E000
stack
page read and write
31BF000
stack
page read and write
488F000
stack
page read and write
540E000
stack
page read and write
4781000
heap
page read and write
48FE000
stack
page read and write
4781000
heap
page read and write
4701000
heap
page read and write
3C8F000
stack
page read and write
4781000
heap
page read and write
8642000
heap
page read and write
4701000
heap
page read and write
3EBF000
stack
page read and write
4C51000
heap
page read and write
4D10000
direct allocation
page execute and read and write
81D0000
trusted library allocation
page read and write
4701000
heap
page read and write
81B9000
stack
page read and write
75DE000
stack
page read and write
4CE000
unkown
page execute and write copy
4B90000
direct allocation
page read and write
4AF000
unkown
page execute and read and write
163F000
heap
page read and write
2BBF000
stack
page read and write
1DB40000
heap
page read and write
1010000
direct allocation
page read and write
584E000
stack
page read and write
DD4000
heap
page read and write
28CE000
stack
page read and write
E18000
unkown
page execute and read and write
4F4F000
stack
page read and write
55A000
unkown
page execute and write copy
F5E000
heap
page read and write
338E000
stack
page read and write
11C4000
heap
page read and write
14FF000
stack
page read and write
4781000
heap
page read and write
4C51000
heap
page read and write
11C4000
heap
page read and write
460E000
stack
page read and write
F40000
direct allocation
page read and write
43C0000
direct allocation
page read and write
83F0000
trusted library allocation
page read and write
4E30000
heap
page read and write
4701000
heap
page read and write
83E0000
trusted library allocation
page read and write
E74000
heap
page read and write
4C51000
heap
page read and write
4D9000
unkown
page execute and read and write
50E000
stack
page read and write
4701000
heap
page read and write
2FFE000
stack
page read and write
DD4000
heap
page read and write
4F71000
heap
page read and write
2AB7000
heap
page read and write
39FE000
stack
page read and write
3D8E000
stack
page read and write
64B9000
heap
page read and write
83E0000
trusted library allocation
page read and write
48C1000
heap
page read and write
4CE000
unkown
page execute and write copy
960000
heap
page read and write
1DB44000
heap
page read and write
769000
unkown
page execute and read and write
4960000
trusted library allocation
page read and write
8220000
trusted library allocation
page read and write
453E000
stack
page read and write
74E000
unkown
page execute and write copy
3DBE000
stack
page read and write
4F3B000
stack
page read and write
859000
unkown
page execute and read and write
FF8000
unkown
page execute and read and write
2FFE000
stack
page read and write
7B30000
trusted library allocation
page read and write
3DBE000
stack
page read and write
4FE0000
unclassified section
page read and write
4F71000
heap
page read and write
4D90000
direct allocation
page execute and read and write
4781000
heap
page read and write
14AE000
unkown
page execute and write copy
4701000
heap
page read and write
7B30000
trusted library allocation
page read and write
16D4000
heap
page read and write
8750000
trusted library allocation
page read and write
4701000
heap
page read and write
E70000
heap
page read and write
2A2000
unkown
page execute and read and write
15E5000
heap
page read and write
237D0000
heap
page read and write
83E0000
trusted library allocation
page read and write
4F20000
direct allocation
page execute and read and write
4D9000
unkown
page execute and read and write
84B000
unkown
page execute and write copy
7B30000
trusted library allocation
page read and write
3DBE000
stack
page read and write
81D0000
trusted library allocation
page read and write
413F000
stack
page read and write
81C5000
trusted library allocation
page read and write
7B20000
trusted library allocation
page read and write
4A7000
unkown
page execute and write copy
108C000
unkown
page execute and read and write
44E000
unkown
page execute and write copy
DD4000
heap
page read and write
FF7000
unkown
page execute and write copy
4701000
heap
page read and write
45D000
unkown
page execute and read and write
7550000
trusted library allocation
page read and write
165A000
heap
page read and write
4781000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
1D6E8000
heap
page read and write
49C0000
direct allocation
page execute and read and write
8640000
heap
page read and write
6351000
trusted library allocation
page read and write
1D6E8000
heap
page read and write
4781000
heap
page read and write
DD4000
heap
page read and write
348F000
stack
page read and write
3C7E000
stack
page read and write
4DF0000
direct allocation
page execute and read and write
4D90000
direct allocation
page read and write
415F000
stack
page read and write
107E000
heap
page read and write
83E0000
trusted library allocation
page read and write
8760000
trusted library allocation
page read and write
4FE0000
trusted library allocation
page read and write
2C60000
direct allocation
page read and write
11DF000
stack
page read and write
4B8000
unkown
page execute and write copy
7B30000
trusted library allocation
page read and write
11C4000
heap
page read and write
384E000
stack
page read and write
2BFF000
stack
page read and write
461000
unkown
page execute and read and write
824000
unkown
page execute and read and write
48F1000
heap
page read and write
934000
heap
page read and write
133B000
heap
page read and write
3C5F000
stack
page read and write
739000
unkown
page execute and write copy
44CE000
stack
page read and write
387F000
stack
page read and write
2ABF000
stack
page read and write
2FBF000
stack
page read and write
4ED0000
direct allocation
page read and write
83D0000
trusted library allocation
page read and write
149A000
unkown
page execute and write copy
13AD000
unkown
page execute and write copy
4701000
heap
page read and write
48C1000
heap
page read and write
5210000
direct allocation
page execute and read and write
5580000
direct allocation
page execute and read and write
806D000
stack
page read and write
5A9000
unkown
page write copy
492000
unkown
page execute and write copy
F48000
heap
page read and write
61ED3000
direct allocation
page read and write
2E3E000
stack
page read and write
9E7000
stack
page read and write
107C000
unkown
page execute and write copy
4F71000
heap
page read and write
67BE000
stack
page read and write
F56000
heap
page read and write
4EE1000
heap
page read and write
97FF000
stack
page read and write
4CCF000
stack
page read and write
7BAE000
stack
page read and write
1D6D5000
heap
page read and write
4781000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
83F0000
trusted library allocation
page read and write
DD4000
heap
page read and write
8740000
trusted library allocation
page read and write
11C4000
heap
page read and write
61EB7000
direct allocation
page readonly
559000
unkown
page execute and read and write
11C4000
heap
page read and write
24AE000
stack
page read and write
34FE000
stack
page read and write
1D70C000
heap
page read and write
4E2F000
stack
page read and write
4F60000
direct allocation
page read and write
1020000
heap
page read and write
6FC000
unkown
page write copy
7B30000
trusted library allocation
page read and write
D10000
direct allocation
page read and write
D10000
direct allocation
page read and write
4FA0000
direct allocation
page execute and read and write
44F000
unkown
page execute and read and write
860B000
heap
page read and write
34BF000
stack
page read and write
1449000
unkown
page execute and read and write
43E000
unkown
page execute and read and write
DD4000
heap
page read and write
1D3DF000
stack
page read and write
4701000
heap
page read and write
1066000
unkown
page execute and write copy
7550000
trusted library allocation
page read and write
8642000
heap
page read and write
FD2000
unkown
page execute and read and write
E74000
heap
page read and write
61E00000
direct allocation
page execute and read and write
53CA000
trusted library allocation
page read and write
5A5000
heap
page read and write
46FF000
stack
page read and write
4EE1000
heap
page read and write
4701000
heap
page read and write
1D41E000
stack
page read and write
3E8E000
stack
page read and write
4781000
heap
page read and write
427000
unkown
page execute and read and write
14C8000
unkown
page execute and write copy
4C51000
heap
page read and write
1D6F1000
heap
page read and write
4A50000
direct allocation
page execute and read and write
4861000
heap
page read and write
F43000
heap
page read and write
712000
unkown
page execute and write copy
4C70000
heap
page read and write
4701000
heap
page read and write
4E80000
direct allocation
page execute and read and write
704000
unkown
page readonly
3C4E000
stack
page read and write
48C1000
heap
page read and write
7CED000
stack
page read and write
15E0000
direct allocation
page execute and read and write
43D0000
heap
page read and write
10E8000
unkown
page execute and write copy
1D6EA000
heap
page read and write
5090000
trusted library allocation
page read and write
8615000
heap
page read and write
1C2000
unkown
page execute and write copy
54B000
unkown
page execute and write copy
435000
unkown
page execute and read and write
188E000
stack
page read and write
2D3F000
stack
page read and write
11C4000
heap
page read and write
7B30000
trusted library allocation
page read and write
51AB000
trusted library allocation
page execute and read and write
450E000
stack
page read and write
83A0000
heap
page read and write
1D6E7000
heap
page read and write
11C4000
heap
page read and write
4781000
heap
page read and write
42BE000
stack
page read and write
4701000
heap
page read and write
413F000
stack
page read and write
34FE000
stack
page read and write
5FCB000
stack
page read and write
530000
unkown
page readonly
45BF000
stack
page read and write
400E000
stack
page read and write
4701000
heap
page read and write
11C4000
heap
page read and write
83B0000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
240000
unkown
page read and write
2A7C8000
heap
page read and write
44CF000
stack
page read and write
3C3F000
stack
page read and write
D87000
heap
page read and write
4D80000
direct allocation
page read and write
454F000
stack
page read and write
361F000
stack
page read and write
461000
unkown
page execute and read and write
1327000
heap
page read and write
1C0000
unkown
page read and write
4781000
heap
page read and write
83E0000
trusted library allocation
page read and write
36BF000
stack
page read and write
34DF000
stack
page read and write
1D0000
unkown
page execute and read and write
33CF000
stack
page read and write
4A90000
direct allocation
page execute and read and write
4F71000
heap
page read and write
1325000
heap
page read and write
4701000
heap
page read and write
1D708000
heap
page read and write
7E8000
unkown
page execute and write copy
515000
unkown
page execute and read and write
1D6F1000
heap
page read and write
C6C000
stack
page read and write
83E0000
trusted library allocation
page read and write
48C1000
heap
page read and write
DD4000
heap
page read and write
133C000
heap
page read and write
7530000
trusted library allocation
page read and write
4701000
heap
page read and write
4781000
heap
page read and write
1434000
unkown
page execute and read and write
4781000
heap
page read and write
947E000
stack
page read and write
4F00000
direct allocation
page execute and read and write
8640000
heap
page read and write
1068000
heap
page read and write
5077000
heap
page read and write
1D79E000
stack
page read and write
8760000
trusted library allocation
page read and write
2BD7000
heap
page read and write
7530000
trusted library allocation
page read and write
E36000
unkown
page execute and write copy
4701000
heap
page read and write
DD4000
heap
page read and write
420F000
stack
page read and write
48CE000
stack
page read and write
4A00000
direct allocation
page execute and read and write
383E000
stack
page read and write
CFD000
stack
page read and write
2AB000
unkown
page execute and write copy
4781000
heap
page read and write
7530000
trusted library allocation
page read and write
3A4E000
stack
page read and write
50ED000
stack
page read and write
330F000
stack
page read and write
7D7000
unkown
page execute and write copy
5550000
direct allocation
page execute and read and write
7B8000
unkown
page execute and write copy
F5E000
heap
page read and write
10C5000
unkown
page execute and write copy
6FC000
unkown
page read and write
4C51000
heap
page read and write
1D6E8000
heap
page read and write
7B30000
trusted library allocation
page read and write
8760000
trusted library allocation
page read and write
DD4000
heap
page read and write
23A70000
heap
page read and write
460000
unkown
page execute and write copy
43E000
unkown
page execute and read and write
634F000
stack
page read and write
83F0000
trusted library allocation
page read and write
1D50E000
stack
page read and write
7B30000
trusted library allocation
page read and write
EA5000
heap
page read and write
39FD000
stack
page read and write
FC0000
unkown
page read and write
61ECD000
direct allocation
page readonly
8780000
trusted library allocation
page read and write
397E000
stack
page read and write
3D9F000
stack
page read and write
145A000
unkown
page execute and write copy
8D40000
heap
page read and write
4CA0000
heap
page read and write
4701000
heap
page read and write
3EFE000
stack
page read and write
934000
heap
page read and write
1D6D7000
heap
page read and write
EB0000
heap
page read and write
34BF000
stack
page read and write
55A0000
direct allocation
page execute and read and write
100A000
unkown
page execute and read and write
43FE000
stack
page read and write
10E8000
unkown
page execute and read and write
83E0000
trusted library allocation
page read and write
4F71000
heap
page read and write
1010000
direct allocation
page read and write
1D70C000
heap
page read and write
4BB000
unkown
page execute and write copy
83B0000
trusted library allocation
page read and write
6EDD1000
unkown
page execute read
4861000
heap
page read and write
439000
unkown
page execute and write copy
1612000
heap
page read and write
2AFB000
stack
page read and write
4701000
heap
page read and write
4781000
heap
page read and write
1029000
unkown
page execute and write copy
13E0000
unkown
page execute and write copy
140A000
unkown
page execute and read and write
143F000
stack
page read and write
48E0000
direct allocation
page read and write
134A000
heap
page read and write
7B30000
trusted library allocation
page read and write
3DDE000
stack
page read and write
E74000
heap
page read and write
574E000
stack
page read and write
4781000
heap
page read and write
4C51000
heap
page read and write
7B80000
trusted library allocation
page read and write
4F71000
heap
page read and write
8206000
trusted library allocation
page read and write
E8E000
stack
page read and write
4781000
heap
page read and write
FEE000
stack
page read and write
C82000
heap
page read and write
81D000
unkown
page execute and read and write
F00000
heap
page read and write
970000
heap
page read and write
48D0000
heap
page read and write
4F71000
heap
page read and write
531000
unkown
page execute and read and write
4781000
heap
page read and write
4701000
heap
page read and write
3B8E000
stack
page read and write
320E000
stack
page read and write
447F000
stack
page read and write
FDD000
heap
page read and write
4701000
heap
page read and write
8380000
trusted library allocation
page read and write
2C60000
direct allocation
page read and write
12BB000
heap
page read and write
7B30000
trusted library allocation
page read and write
7AB000
unkown
page execute and read and write
4C51000
heap
page read and write
91BD000
stack
page read and write
4781000
heap
page read and write
7F28000
stack
page read and write
4D10000
direct allocation
page execute and read and write
E74000
heap
page read and write
3C0F000
stack
page read and write
2381C000
heap
page read and write
FC8000
unkown
page execute and write copy
479F000
stack
page read and write
8E7E000
stack
page read and write
83A0000
trusted library allocation
page read and write
4C51000
heap
page read and write
4A70000
direct allocation
page execute and read and write
11C4000
heap
page read and write
4781000
heap
page read and write
84B000
unkown
page execute and write copy
2C3E000
stack
page read and write
C72000
heap
page read and write
460000
unkown
page execute and write copy
C17000
unkown
page execute and read and write
30CF000
stack
page read and write
1334000
heap
page read and write
1D18E000
stack
page read and write
4701000
heap
page read and write
4701000
heap
page read and write
5EC000
stack
page read and write
83C0000
trusted library allocation
page execute and read and write
83E0000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
DD4000
heap
page read and write
519A000
trusted library allocation
page execute and read and write
4701000
heap
page read and write
393F000
stack
page read and write
4781000
heap
page read and write
7630000
heap
page execute and read and write
BE0000
unkown
page readonly
4C51000
heap
page read and write
4F71000
heap
page read and write
7CB0000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
241000
unkown
page execute and write copy
860D000
heap
page read and write
4D80000
direct allocation
page execute and read and write
41CE000
stack
page read and write
E38000
unkown
page execute and write copy
D36000
heap
page read and write
C30000
heap
page read and write
4C51000
heap
page read and write
4781000
heap
page read and write
388E000
stack
page read and write
7B70000
trusted library allocation
page read and write
5AB000
unkown
page execute and write copy
44F000
unkown
page execute and read and write
2DFF000
stack
page read and write
4781000
heap
page read and write
11C4000
heap
page read and write
4701000
heap
page read and write
5A9000
unkown
page write copy
4701000
heap
page read and write
DD4000
heap
page read and write
8740000
trusted library allocation
page read and write
8770000
trusted library allocation
page read and write
2EBE000
stack
page read and write
35CF000
stack
page read and write
468000
unkown
page execute and write copy
48F1000
heap
page read and write
47E000
unkown
page execute and read and write
FCC000
unkown
page execute and read and write
FD0000
heap
page read and write
4F71000
heap
page read and write
83F0000
trusted library allocation
page read and write
D10000
direct allocation
page read and write
F1E000
stack
page read and write
6CFDF000
unkown
page write copy
57E000
stack
page read and write
5590000
direct allocation
page execute and read and write
83E0000
trusted library allocation
page read and write
2A8E000
stack
page read and write
3FBE000
stack
page read and write
4701000
heap
page read and write
F68000
heap
page read and write
1323000
heap
page read and write
2B7000
unkown
page execute and write copy
54B000
unkown
page execute and write copy
1644000
heap
page read and write
4700000
heap
page read and write
3F8E000
stack
page read and write
E30000
heap
page read and write
498000
unkown
page execute and write copy
48C0000
heap
page read and write
4D50000
direct allocation
page read and write
343F000
stack
page read and write
48C1000
heap
page read and write
45CF000
stack
page read and write
2E4E000
stack
page read and write
2EBE000
stack
page read and write
4F60000
direct allocation
page read and write
498000
unkown
page execute and write copy
8760000
trusted library allocation
page read and write
4D40000
direct allocation
page execute and read and write
DD4000
heap
page read and write
2DF0000
heap
page read and write
7CAE000
stack
page read and write
83B0000
trusted library allocation
page read and write
4C51000
heap
page read and write
11C4000
heap
page read and write
4781000
heap
page read and write
83E0000
trusted library allocation
page read and write
15C0000
heap
page read and write
530000
unkown
page read and write
4701000
heap
page read and write
4701000
heap
page read and write
52FF000
stack
page read and write
48E0000
direct allocation
page read and write
8760000
trusted library allocation
page read and write
48E0000
direct allocation
page read and write
4E8000
unkown
page execute and write copy
E07000
heap
page read and write
FC0000
unkown
page readonly
48F1000
heap
page read and write
4C51000
heap
page read and write
56DD000
stack
page read and write
7B35000
trusted library allocation
page read and write
2CFE000
stack
page read and write
43BF000
stack
page read and write
4C60000
heap
page read and write
4F60000
direct allocation
page read and write
91FC000
stack
page read and write
43D1000
heap
page read and write
D7F000
heap
page read and write
2C60000
direct allocation
page read and write
198E000
stack
page read and write
83B0000
trusted library allocation
page read and write
820D000
trusted library allocation
page read and write
8C75000
heap
page read and write
4F70000
heap
page read and write
8EC000
stack
page read and write
834000
unkown
page execute and read and write
83E6000
trusted library allocation
page read and write
354E000
stack
page read and write
9D0000
heap
page read and write
83F0000
trusted library allocation
page read and write
48E0000
direct allocation
page read and write
8770000
trusted library allocation
page read and write
6CC000
unkown
page readonly
4870000
direct allocation
page read and write
35CE000
stack
page read and write
798000
unkown
page execute and write copy
815000
unkown
page execute and read and write
4A0000
unkown
page execute and read and write
AFF000
stack
page read and write
7B30000
trusted library allocation
page read and write
1D705000
heap
page read and write
4701000
heap
page read and write
1D6F1000
heap
page read and write
51FE000
stack
page read and write
4F71000
heap
page read and write
9DE000
stack
page read and write
30FF000
stack
page read and write
413F000
stack
page read and write
502D000
trusted library allocation
page execute and read and write
5013000
trusted library allocation
page execute and read and write
48C1000
heap
page read and write
313E000
stack
page read and write
83F0000
trusted library allocation
page read and write
35BE000
stack
page read and write
1D28E000
stack
page read and write
1218000
unkown
page execute and write copy
81C7000
trusted library allocation
page read and write
8760000
trusted library allocation
page read and write
DF1000
heap
page read and write
2AB000
unkown
page execute and read and write
BDD000
stack
page read and write
4D90000
direct allocation
page execute and read and write
2C40000
heap
page read and write
4FED000
stack
page read and write
7530000
trusted library allocation
page read and write
4781000
heap
page read and write
83E0000
trusted library allocation
page read and write
7535000
trusted library allocation
page read and write
1459000
unkown
page execute and read and write
141E000
unkown
page execute and read and write
1D6F1000
heap
page read and write
4701000
heap
page read and write
DD4000
heap
page read and write
DD4000
heap
page read and write
DD4000
heap
page read and write
4F71000
heap
page read and write
1216000
unkown
page execute and write copy
DDE000
heap
page read and write
2A2000
unkown
page execute and write copy
4BFC000
stack
page read and write
FDE000
stack
page read and write
2A9000
unkown
page write copy
441E000
stack
page read and write
7B30000
trusted library allocation
page read and write
81D0000
trusted library allocation
page read and write
5030000
direct allocation
page read and write
4AB000
unkown
page execute and read and write
43CE000
stack
page read and write
1D702000
heap
page read and write
107B000
unkown
page execute and read and write
F48000
heap
page read and write
30FF000
stack
page read and write
4EE1000
heap
page read and write
83B0000
trusted library allocation
page read and write
E97000
heap
page read and write
DD4000
heap
page read and write
FCD000
unkown
page execute and write copy
8400000
trusted library allocation
page read and write
451F000
stack
page read and write
5B8C000
stack
page read and write
4701000
heap
page read and write
1D6F1000
heap
page read and write
E74000
heap
page read and write
33BE000
stack
page read and write
46A000
unkown
page execute and write copy
1D6DB000
heap
page read and write
2460000
heap
page read and write
83F1000
trusted library allocation
page read and write
1D6E7000
heap
page read and write
7E9000
unkown
page execute and read and write
8380000
trusted library allocation
page read and write
F5B000
heap
page read and write
8390000
trusted library allocation
page read and write
2B5E000
stack
page read and write
2A9000
unkown
page write copy
327E000
stack
page read and write
8741000
trusted library allocation
page read and write
10CD000
heap
page read and write
323F000
stack
page read and write
4F71000
heap
page read and write
1D51D000
stack
page read and write
7C6000
unkown
page execute and write copy
1677000
heap
page read and write
4F71000
heap
page read and write
8FBD000
stack
page read and write
4C51000
heap
page read and write
8760000
trusted library allocation
page read and write
F66000
heap
page read and write
42BE000
stack
page read and write
145C000
unkown
page execute and write copy
419E000
stack
page read and write
4701000
heap
page read and write
3D7F000
stack
page read and write
15E0000
direct allocation
page execute and read and write
5B6000
unkown
page execute and read and write
83AA000
trusted library allocation
page read and write
363E000
stack
page read and write
48C1000
heap
page read and write
4A7000
unkown
page execute and write copy
1010000
direct allocation
page read and write
D10000
direct allocation
page read and write
3AFF000
stack
page read and write
4701000
heap
page read and write
2ABE000
stack
page read and write
458E000
stack
page read and write
FC9000
unkown
page execute and read and write
11C4000
heap
page read and write
8740000
trusted library allocation
page read and write
6EDED000
unkown
page read and write
5560000
direct allocation
page execute and read and write
3BBF000
stack
page read and write
83A0000
trusted library allocation
page read and write
40FE000
stack
page read and write
7B30000
trusted library allocation
page read and write
620F000
stack
page read and write
81FE000
trusted library allocation
page read and write
FD0000
unkown
page execute and read and write
3BFE000
stack
page read and write
7530000
trusted library allocation
page read and write
DE6000
heap
page read and write
4D8C000
stack
page read and write
4781000
heap
page read and write
4F71000
heap
page read and write
554D000
stack
page read and write
48E0000
direct allocation
page read and write
530000
unkown
page read and write
F20000
direct allocation
page read and write
1380000
unkown
page execute and read and write
934000
heap
page read and write
4EF2000
heap
page read and write
83E0000
trusted library allocation
page read and write
1D6E7000
heap
page read and write
4790000
heap
page read and write
4781000
heap
page read and write
5190000
direct allocation
page execute and read and write
1210000
heap
page read and write
4781000
heap
page read and write
44FF000
stack
page read and write
903E000
stack
page read and write
2BB0000
heap
page read and write
83E0000
trusted library allocation
page read and write
134D000
heap
page read and write
C40000
heap
page read and write
4701000
heap
page read and write
4701000
heap
page read and write
120E000
stack
page read and write
1D60F000
stack
page read and write
4781000
heap
page read and write
49F0000
direct allocation
page execute and read and write
38CF000
stack
page read and write
934000
heap
page read and write
DD4000
heap
page read and write
4F60000
direct allocation
page execute and read and write
83F0000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
60E000
unkown
page execute and write copy
410000
unkown
page execute and read and write
36CF000
stack
page read and write
3A8F000
stack
page read and write
4F71000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
460F000
stack
page read and write
480E000
stack
page read and write
700C1000
unkown
page execute read
410E000
stack
page read and write
9D6000
unkown
page execute and read and write
F20000
direct allocation
page read and write
311F000
stack
page read and write
2E50000
heap
page read and write
DB5000
heap
page read and write
77DE000
stack
page read and write
4701000
heap
page read and write
1054000
unkown
page execute and read and write
1D38F000
stack
page read and write
83F0000
trusted library allocation
page read and write
240000
unkown
page readonly
7B30000
trusted library allocation
page read and write
79DF000
stack
page read and write
8760000
trusted library allocation
page read and write
11C4000
heap
page read and write
4D50000
direct allocation
page read and write
317E000
stack
page read and write
83F0000
trusted library allocation
page read and write
64A0000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
11C4000
heap
page read and write
237B1000
heap
page read and write
4C51000
heap
page read and write
DED000
heap
page read and write
5B20000
heap
page read and write
1D64E000
stack
page read and write
D2E000
heap
page read and write
142E000
unkown
page execute and write copy
1027000
unkown
page execute and write copy
478E000
stack
page read and write
11C4000
heap
page read and write
13D8000
unkown
page execute and read and write
1D6E8000
heap
page read and write
F20000
direct allocation
page read and write
38BE000
stack
page read and write
11C4000
heap
page read and write
1D8DE000
stack
page read and write
4C51000
heap
page read and write
934000
heap
page read and write
4ED0000
direct allocation
page read and write
92FD000
stack
page read and write
763000
unkown
page execute and write copy
D10000
direct allocation
page read and write
23A69000
heap
page read and write
8390000
trusted library allocation
page read and write
41FF000
stack
page read and write
1408000
unkown
page execute and read and write
DD4000
heap
page read and write
48E0000
direct allocation
page read and write
4701000
heap
page read and write
42BE000
stack
page read and write
2EDF000
stack
page read and write
1D6C0000
heap
page read and write
4F10000
direct allocation
page execute and read and write
8740000
trusted library allocation
page read and write
6F2000
unkown
page readonly
7A0000
unkown
page execute and read and write
4701000
heap
page read and write
4781000
heap
page read and write
4701000
heap
page read and write
D20000
heap
page read and write
77E000
unkown
page execute and read and write
4781000
heap
page read and write
796000
unkown
page execute and read and write
4F71000
heap
page read and write
4781000
heap
page read and write
4F90000
heap
page read and write
4E00000
direct allocation
page execute and read and write
23791000
heap
page read and write
630000
unkown
page readonly
3EFE000
stack
page read and write
2467000
heap
page read and write
4BB000
unkown
page execute and write copy
96FE000
stack
page read and write
39FE000
stack
page read and write
3EFE000
stack
page read and write
4C10000
direct allocation
page read and write
4781000
heap
page read and write
463F000
stack
page read and write
7B40000
trusted library allocation
page read and write
2FBF000
stack
page read and write
934000
heap
page read and write
49F0000
direct allocation
page execute and read and write
DD4000
heap
page read and write
13AC000
unkown
page execute and read and write
FE3000
heap
page read and write
439000
unkown
page execute and write copy
4701000
heap
page read and write
4701000
heap
page read and write
4D50000
direct allocation
page read and write
61ED0000
direct allocation
page read and write
520F000
stack
page read and write
553F000
stack
page read and write
48E0000
direct allocation
page read and write
F9E000
stack
page read and write
11C4000
heap
page read and write
4F71000
heap
page read and write
F5D000
heap
page read and write
2F8E000
stack
page read and write
4781000
heap
page read and write
348E000
stack
page read and write
1D6F1000
heap
page read and write
E74000
heap
page read and write
F7B000
heap
page read and write
4E64000
heap
page read and write
934000
heap
page read and write
F20000
direct allocation
page read and write
4F70000
direct allocation
page execute and read and write
1D6FE000
heap
page read and write
3D4E000
stack
page read and write
571000
unkown
page execute and read and write
390E000
stack
page read and write
1D703000
heap
page read and write
710000
unkown
page execute and read and write
2A9000
unkown
page write copy
434000
unkown
page execute and write copy
4D0E000
stack
page read and write
39BF000
stack
page read and write
4C51000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
631000
unkown
page execute read
934000
heap
page read and write
11C4000
heap
page read and write
4F71000
heap
page read and write
1051000
unkown
page execute and read and write
405E000
stack
page read and write
81D0000
trusted library allocation
page read and write
4C51000
heap
page read and write
6EDD1000
unkown
page execute read
70152000
unkown
page readonly
8730000
trusted library allocation
page read and write
496000
unkown
page execute and read and write
4E8000
unkown
page execute and write copy
8740000
heap
page read and write
4701000
heap
page read and write
3DBE000
stack
page read and write
2D3F000
stack
page read and write
83E0000
trusted library allocation
page read and write
543000
unkown
page execute and write copy
2BBF000
stack
page read and write
81D0000
trusted library allocation
page read and write
1627000
heap
page read and write
EA0000
heap
page read and write
2C3E000
stack
page read and write
11C4000
heap
page read and write
3D7F000
stack
page read and write
3FFF000
stack
page read and write
3CFF000
stack
page read and write
4781000
heap
page read and write
3FCF000
stack
page read and write
424F000
stack
page read and write
F20000
direct allocation
page read and write
531000
unkown
page execute and write copy
CDE000
stack
page read and write
4ED0000
direct allocation
page read and write
4781000
heap
page read and write
4701000
heap
page read and write
34BF000
stack
page read and write
32FF000
stack
page read and write
60CD000
stack
page read and write
4C51000
heap
page read and write
E20000
heap
page read and write
4EE1000
heap
page read and write
4F1A000
trusted library allocation
page read and write
FCB000
unkown
page execute and write copy
496000
unkown
page execute and read and write
506C000
stack
page read and write
4D80000
direct allocation
page execute and read and write
4781000
heap
page read and write
4C51000
heap
page read and write
4A30000
direct allocation
page execute and read and write
1D6E3000
heap
page read and write
81E6000
trusted library allocation
page read and write
13B0000
unkown
page execute and read and write
337F000
stack
page read and write
35FF000
stack
page read and write
120A000
unkown
page write copy
83E0000
trusted library allocation
page read and write
6640000
heap
page read and write
2DDF000
stack
page read and write
4E35000
heap
page read and write
13FE000
stack
page read and write
549000
unkown
page execute and read and write
3E0E000
stack
page read and write
83E0000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
4F71000
heap
page read and write
735000
unkown
page execute and read and write
2D0F000
stack
page read and write
7F3000
unkown
page execute and read and write
74C000
unkown
page execute and read and write
83F0000
trusted library allocation
page read and write
10BB000
unkown
page execute and read and write
1063000
heap
page read and write
FD0000
heap
page read and write
43DF000
stack
page read and write
53BD000
trusted library allocation
page read and write
323F000
stack
page read and write
4BC0000
trusted library allocation
page read and write
8370000
trusted library allocation
page read and write
4BA000
unkown
page execute and read and write
83B0000
trusted library allocation
page read and write
4EDD000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
26FF000
stack
page read and write
4C6000
unkown
page execute and write copy
2D7E000
stack
page read and write
96C000
stack
page read and write
4C51000
heap
page read and write
C72000
heap
page read and write
1033000
unkown
page execute and read and write
7B30000
trusted library allocation
page read and write
5B5000
unkown
page execute and write copy
7530000
trusted library allocation
page read and write
8740000
trusted library allocation
page read and write
4781000
heap
page read and write
512E000
stack
page read and write
7B30000
trusted library allocation
page read and write
4C50000
heap
page read and write
90BE000
stack
page read and write
1E0000
heap
page read and write
FCA000
heap
page read and write
8740000
trusted library allocation
page read and write
8400000
trusted library allocation
page read and write
9E2000
stack
page read and write
83F0000
trusted library allocation
page read and write
1D6F5000
heap
page read and write
B2F000
stack
page read and write
83E0000
trusted library allocation
page read and write
4EE1000
heap
page read and write
860D000
heap
page read and write
4C51000
heap
page read and write
377E000
stack
page read and write
4E60000
heap
page read and write
4EE1000
heap
page read and write
403E000
stack
page read and write
DD4000
heap
page read and write
4EBF000
stack
page read and write
1CC000
unkown
page write copy
2C00000
heap
page read and write
D66000
heap
page read and write
36FE000
stack
page read and write
324E000
stack
page read and write
44E000
unkown
page execute and write copy
49C0000
trusted library allocation
page read and write
15CF000
stack
page read and write
38DE000
stack
page read and write
E37000
unkown
page execute and read and write
4EE1000
heap
page read and write
48F1000
heap
page read and write
103E000
unkown
page execute and read and write
2C60000
direct allocation
page read and write
48BF000
stack
page read and write
413F000
stack
page read and write
4B8000
unkown
page execute and write copy
549000
unkown
page execute and read and write
4DB0000
direct allocation
page execute and read and write
849000
unkown
page execute and read and write
60E000
unkown
page execute and write copy
11DF000
stack
page read and write
1D6F1000
heap
page read and write
389F000
stack
page read and write
56CE000
stack
page read and write
564E000
stack
page read and write
83F0000
trusted library allocation
page read and write
3F4E000
stack
page read and write
358F000
stack
page read and write
4E8F000
stack
page read and write
4B3F000
stack
page read and write
463F000
stack
page read and write
1CC000
unkown
page write copy
120C000
unkown
page execute and write copy
520E000
stack
page read and write
1D9DC000
stack
page read and write
333E000
stack
page read and write
44F000
unkown
page execute and read and write
7F3000
unkown
page execute and read and write
4D10000
direct allocation
page execute and read and write
48E0000
direct allocation
page read and write
2ABE000
stack
page read and write
14B9000
unkown
page execute and write copy
7013D000
unkown
page readonly
53A0000
remote allocation
page read and write
DF7000
heap
page read and write
704000
unkown
page readonly
11C4000
heap
page read and write
4701000
heap
page read and write
930000
heap
page read and write
6A30000
trusted library allocation
page read and write
8C6C000
stack
page read and write
5C8D000
stack
page read and write
15CE000
heap
page read and write
401F000
stack
page read and write
23850000
trusted library allocation
page read and write
44BE000
stack
page read and write
4E9000
unkown
page execute and read and write
CD6000
heap
page read and write
83B0000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
D10000
direct allocation
page read and write
39BF000
stack
page read and write
44FF000
stack
page read and write
8760000
trusted library allocation
page read and write
4781000
heap
page read and write
14FE000
stack
page read and write
4781000
heap
page read and write
2E7F000
stack
page read and write
4C51000
heap
page read and write
510D000
stack
page read and write
120C000
unkown
page execute and read and write
48C1000
heap
page read and write
1D6F1000
heap
page read and write
4781000
heap
page read and write
11C4000
heap
page read and write
4F00000
direct allocation
page execute and read and write
8380000
trusted library allocation
page read and write
83B0000
trusted library allocation
page read and write
4701000
heap
page read and write
133B000
heap
page read and write
283F000
stack
page read and write
4781000
heap
page read and write
83E0000
trusted library allocation
page read and write
2C60000
direct allocation
page read and write
3FFF000
stack
page read and write
3ACE000
stack
page read and write
434000
unkown
page execute and write copy
23834000
heap
page read and write
83A0000
trusted library allocation
page read and write
4781000
heap
page read and write
792000
unkown
page execute and write copy
11C4000
heap
page read and write
134A000
heap
page read and write
83B0000
trusted library allocation
page read and write
1D6E9000
heap
page read and write
D4B000
stack
page read and write
571000
unkown
page execute and read and write
934000
heap
page read and write
4F71000
heap
page read and write
45FE000
stack
page read and write
F76000
heap
page read and write
F20000
direct allocation
page read and write
F50000
heap
page read and write
10D0000
unkown
page execute and read and write
46C000
unkown
page execute and read and write
4C51000
heap
page read and write
4D90000
direct allocation
page execute and read and write
F20000
direct allocation
page read and write
4F00000
direct allocation
page execute and read and write
8760000
trusted library allocation
page read and write
23750000
trusted library allocation
page read and write
44C000
unkown
page execute and read and write
4701000
heap
page read and write
8605000
heap
page read and write
4701000
heap
page read and write
F4C000
heap
page read and write
5400000
direct allocation
page read and write
4D90000
direct allocation
page execute and read and write
7530000
trusted library allocation
page read and write
543000
unkown
page execute and write copy
12BE000
heap
page read and write
370F000
stack
page read and write
4701000
heap
page read and write
351E000
stack
page read and write
F7C000
heap
page read and write
4A4F000
stack
page read and write
438E000
stack
page read and write
C95000
heap
page read and write
468F000
stack
page read and write
F3E000
heap
page read and write
4F50000
direct allocation
page execute and read and write
4781000
heap
page read and write
102A000
unkown
page execute and read and write
4EF0000
direct allocation
page execute and read and write
FEF000
stack
page read and write
BE0000
unkown
page read and write
E63000
heap
page read and write
7550000
trusted library allocation
page read and write
5030000
direct allocation
page read and write
4C51000
heap
page read and write
81D0000
trusted library allocation
page read and write
2AB000
unkown
page execute and write copy
11C4000
heap
page read and write
8642000
heap
page read and write
934000
heap
page read and write
531000
unkown
page execute and write copy
134F000
heap
page read and write
4701000
heap
page read and write
1327000
heap
page read and write
1217000
unkown
page execute and read and write
DF1000
heap
page read and write
7B40000
trusted library allocation
page read and write
FDC000
unkown
page execute and write copy
2C77000
heap
page read and write
4781000
heap
page read and write
1334000
heap
page read and write
83E0000
trusted library allocation
page read and write
3DCF000
stack
page read and write
25FE000
stack
page read and write
364F000
stack
page read and write
474F000
stack
page read and write
1407000
unkown
page execute and write copy
47BE000
stack
page read and write
83E0000
trusted library allocation
page read and write
4F80000
heap
page read and write
2C60000
direct allocation
page read and write
47DE000
stack
page read and write
6EDE6000
unkown
page execute and read and write
49CF000
stack
page read and write
F1A000
heap
page read and write
648F000
stack
page read and write
49F0000
direct allocation
page execute and read and write
2C60000
direct allocation
page read and write
439000
unkown
page execute and write copy
83F0000
trusted library allocation
page read and write
469000
unkown
page execute and read and write
C90000
heap
page read and write
1075000
unkown
page execute and read and write
2B1E000
stack
page read and write
E10000
heap
page read and write
8760000
trusted library allocation
page read and write
768000
unkown
page execute and write copy
4EE1000
heap
page read and write
81D0000
trusted library allocation
page read and write
3C3F000
stack
page read and write
83F0000
trusted library allocation
page read and write
2FBF000
stack
page read and write
630000
unkown
page readonly
5A2000
unkown
page execute and write copy
469E000
stack
page read and write
1D00F000
stack
page read and write
524E000
stack
page read and write
4850000
direct allocation
page read and write
4C51000
heap
page read and write
83E0000
trusted library allocation
page read and write
11C4000
heap
page read and write
48E0000
direct allocation
page read and write
6EDD0000
unkown
page readonly
7E2A000
stack
page read and write
4850000
direct allocation
page read and write
3ECE000
stack
page read and write
2BFC000
stack
page read and write
AEF000
stack
page read and write
8EB000
stack
page read and write
437E000
stack
page read and write
4C51000
heap
page read and write
2C3E000
stack
page read and write
4781000
heap
page read and write
4701000
heap
page read and write
47BE000
stack
page read and write
8070000
trusted library allocation
page read and write
F71000
heap
page read and write
377E000
stack
page read and write
4BCE000
stack
page read and write
237BD000
heap
page read and write
4F75000
heap
page read and write
713000
unkown
page execute and read and write
11C4000
heap
page read and write
5391000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
15D0000
direct allocation
page execute and read and write
2A9000
unkown
page write copy
EDE000
stack
page read and write
49F0000
direct allocation
page execute and read and write
D20000
heap
page read and write
49F0000
direct allocation
page execute and read and write
E4D000
stack
page read and write
3A7F000
stack
page read and write
117C000
stack
page read and write
4D4F000
stack
page read and write
4E90000
direct allocation
page execute and read and write
4D7000
unkown
page execute and write copy
4701000
heap
page read and write
835000
unkown
page execute and write copy
83E0000
trusted library allocation
page read and write
8740000
trusted library allocation
page read and write
76A000
unkown
page execute and write copy
7B30000
trusted library allocation
page read and write
D00000
heap
page read and write
2AB000
unkown
page execute and write copy
4EE0000
heap
page read and write
49F0000
direct allocation
page execute and read and write
E2A000
unkown
page write copy
4B8F000
stack
page read and write
43FE000
stack
page read and write
4ED0000
direct allocation
page read and write
4ED0000
direct allocation
page read and write
83B0000
trusted library allocation
page read and write
2A2000
unkown
page execute and write copy
4F60000
direct allocation
page read and write
B1F000
stack
page read and write
8761000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
1431000
unkown
page execute and read and write
4F30000
direct allocation
page execute and read and write
7530000
trusted library allocation
page read and write
240000
unkown
page readonly
133E000
heap
page read and write
2C60000
direct allocation
page read and write
4C51000
heap
page read and write
7D9000
unkown
page execute and read and write
4780000
heap
page read and write
584000
unkown
page execute and read and write
1215000
heap
page read and write
344F000
stack
page read and write
412000
unkown
page execute and write copy
539F000
trusted library allocation
page read and write
410000
unkown
page execute and read and write
559000
unkown
page execute and read and write
7B30000
trusted library allocation
page read and write
2F8F000
stack
page read and write
4701000
heap
page read and write
2DF4000
heap
page read and write
8740000
trusted library allocation
page read and write
11C4000
heap
page read and write
DD4000
heap
page read and write
5196000
trusted library allocation
page execute and read and write
83E0000
trusted library allocation
page read and write
39BF000
stack
page read and write
2E4F000
stack
page read and write
44C000
unkown
page execute and read and write
4F71000
heap
page read and write
824000
unkown
page execute and read and write
43C0000
direct allocation
page read and write
5220000
direct allocation
page execute and read and write
4781000
heap
page read and write
43D1000
heap
page read and write
7B30000
trusted library allocation
page read and write
4F80000
direct allocation
page execute and read and write
43BF000
stack
page read and write
7530000
trusted library allocation
page read and write
470F000
stack
page read and write
3D3E000
stack
page read and write
427000
unkown
page execute and read and write
1D70C000
heap
page read and write
4C51000
heap
page read and write
290E000
stack
page read and write
4F00000
direct allocation
page execute and read and write
4701000
heap
page read and write
2AFE000
stack
page read and write
E99000
heap
page read and write
3D0F000
stack
page read and write
DED000
heap
page read and write
394F000
stack
page read and write
559E000
stack
page read and write
2D4E000
stack
page read and write
4701000
heap
page read and write
11F8000
unkown
page execute and read and write
1D6F1000
heap
page read and write
2B6000
unkown
page execute and read and write
48C1000
heap
page read and write
83B0000
trusted library allocation
page read and write
1010000
direct allocation
page read and write
2BD0000
heap
page read and write
4C51000
heap
page read and write
241000
unkown
page execute and write copy
10D9000
unkown
page execute and write copy
4D3D000
stack
page read and write
43C0000
direct allocation
page read and write
13A9000
unkown
page execute and read and write
4DBE000
stack
page read and write
8616000
heap
page read and write
3E7E000
stack
page read and write
4D90000
direct allocation
page execute and read and write
85A000
unkown
page execute and write copy
DD4000
heap
page read and write
8640000
heap
page read and write
30BE000
stack
page read and write
4701000
heap
page read and write
156E000
stack
page read and write
4F71000
heap
page read and write
F5E000
heap
page read and write
B0B000
stack
page read and write
301E000
stack
page read and write
83B6000
trusted library allocation
page read and write
E90000
heap
page read and write
1D6F1000
heap
page read and write
14C9000
unkown
page execute and write copy
4701000
heap
page read and write
11C4000
heap
page read and write
934000
heap
page read and write
4701000
heap
page read and write
4701000
heap
page read and write
4781000
heap
page read and write
834000
unkown
page execute and read and write
1010000
direct allocation
page read and write
363E000
stack
page read and write
3B4F000
stack
page read and write
4C6000
unkown
page execute and write copy
7530000
trusted library allocation
page read and write
464000
unkown
page execute and read and write
126A000
heap
page read and write
8750000
trusted library allocation
page read and write
EFE000
stack
page read and write
8400000
trusted library allocation
page read and write
4701000
heap
page read and write
540000
unkown
page readonly
83B1000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
4C51000
heap
page read and write
3C7E000
stack
page read and write
FD1000
unkown
page execute and write copy
8380000
trusted library allocation
page read and write
49FF000
stack
page read and write
7530000
trusted library allocation
page read and write
96BE000
stack
page read and write
60C000
unkown
page execute and read and write
43C0000
direct allocation
page read and write
83A0000
trusted library allocation
page read and write
4D90000
direct allocation
page execute and read and write
4F00000
direct allocation
page execute and read and write
61EB4000
direct allocation
page read and write
145E000
stack
page read and write
4701000
heap
page read and write
327E000
stack
page read and write
2C60000
direct allocation
page read and write
4710000
heap
page read and write
4EE1000
heap
page read and write
83E0000
trusted library allocation
page read and write
4701000
heap
page read and write
427F000
stack
page read and write
4F00000
direct allocation
page execute and read and write
1010000
direct allocation
page read and write
49E0000
direct allocation
page execute and read and write
4F71000
heap
page read and write
DD4000
heap
page read and write
73E000
unkown
page execute and read and write
4860000
heap
page read and write
30FF000
stack
page read and write
16BC000
heap
page read and write
8760000
trusted library allocation
page read and write
43E000
unkown
page execute and read and write
427000
unkown
page execute and read and write
3ACF000
stack
page read and write
4781000
heap
page read and write
934000
heap
page read and write
4F71000
heap
page read and write
1323000
heap
page read and write
4A3E000
stack
page read and write
4781000
heap
page read and write
7B30000
trusted library allocation
page read and write
37FF000
stack
page read and write
1079000
unkown
page execute and read and write
EA0000
heap
page read and write
2A2000
unkown
page execute and write copy
2B9E000
stack
page read and write
49AF000
stack
page read and write
13AB000
unkown
page execute and write copy
133E000
heap
page read and write
7B39000
trusted library allocation
page read and write
8370000
trusted library allocation
page read and write
CBF000
stack
page read and write
4ED0000
direct allocation
page execute and read and write
78DE000
stack
page read and write
624E000
stack
page read and write
490F000
stack
page read and write
47A0000
heap
page read and write
F20000
direct allocation
page read and write
38BE000
stack
page read and write
4781000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
1461000
unkown
page execute and read and write
F50000
heap
page read and write
7593000
heap
page read and write
11C4000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
81EE000
trusted library allocation
page read and write
1D6F1000
heap
page read and write
34FE000
stack
page read and write
F00000
heap
page read and write
47CF000
stack
page read and write
7530000
trusted library allocation
page read and write
1044000
unkown
page execute and read and write
50BE000
stack
page read and write
27CE000
stack
page read and write
7B30000
trusted library allocation
page read and write
7B30000
trusted library allocation
page read and write
1411000
unkown
page execute and write copy
2FFE000
stack
page read and write
4F71000
heap
page read and write
3C9E000
stack
page read and write
11C4000
heap
page read and write
2B6000
unkown
page execute and read and write
1D6EB000
heap
page read and write
559000
unkown
page execute and write copy
83B1000
trusted library allocation
page read and write
1D6FE000
heap
page read and write
83B0000
trusted library allocation
page read and write
4E30000
direct allocation
page execute and read and write
54B000
unkown
page execute and write copy
133E000
heap
page read and write
34CE000
stack
page read and write
E40000
heap
page read and write
3ABE000
stack
page read and write
4ED0000
direct allocation
page read and write
D30000
heap
page read and write
860B000
heap
page read and write
1D6FE000
heap
page read and write
133F000
heap
page read and write
DD4000
heap
page read and write
2D7F000
stack
page read and write
FE2000
heap
page read and write
1D6ED000
heap
page read and write
549000
unkown
page execute and read and write
43C0000
direct allocation
page read and write
44A000
unkown
page execute and write copy
4CAC000
heap
page read and write
2E70000
heap
page read and write
4BF000
unkown
page execute and read and write
4E4E000
stack
page read and write
7B30000
trusted library allocation
page read and write
23750000
heap
page read and write
4701000
heap
page read and write
34BF000
stack
page read and write
83E0000
trusted library allocation
page read and write
4781000
heap
page read and write
83F0000
trusted library allocation
page read and write
4701000
heap
page read and write
742C000
stack
page read and write
D10000
direct allocation
page read and write
1D89D000
stack
page read and write
1D6C2000
heap
page read and write
1010000
direct allocation
page read and write
8776000
trusted library allocation
page read and write
414E000
stack
page read and write
1D70C000
heap
page read and write
1D6E6000
heap
page read and write
273E000
stack
page read and write
39DF000
stack
page read and write
8760000
trusted library allocation
page read and write
4701000
heap
page read and write
F10000
heap
page read and write
3AFF000
stack
page read and write
BE1000
unkown
page execute and write copy
4F7E000
stack
page read and write
843000
unkown
page execute and write copy
F20000
direct allocation
page read and write
7246000
heap
page read and write
1D6D7000
heap
page read and write
85B7000
heap
page read and write
4A0000
unkown
page execute and read and write
4F71000
heap
page read and write
DD4000
heap
page read and write
DC6000
heap
page read and write
1D74F000
stack
page read and write
38BE000
stack
page read and write
83F0000
trusted library allocation
page read and write
4F60000
direct allocation
page read and write
48BF000
stack
page read and write
48C1000
heap
page read and write
1085000
heap
page read and write
1331000
heap
page read and write
835000
unkown
page execute and write copy
6EDEF000
unkown
page readonly
752D000
stack
page read and write
5550000
heap
page read and write
37CE000
stack
page read and write
8740000
trusted library allocation
page read and write
1010000
direct allocation
page read and write
4AC000
unkown
page execute and write copy
4701000
heap
page read and write
4D9000
unkown
page execute and read and write
4701000
heap
page read and write
10C1000
unkown
page execute and write copy
559000
unkown
page execute and read and write
D10000
direct allocation
page read and write
4781000
heap
page read and write
15AE000
stack
page read and write
4EE1000
heap
page read and write
4ED0000
direct allocation
page read and write
7530000
trusted library allocation
page read and write
8400000
trusted library allocation
page read and write
4B4E000
stack
page read and write
2C60000
direct allocation
page read and write
7B70000
trusted library allocation
page read and write
4C51000
heap
page read and write
4C4F000
stack
page read and write
3E3F000
stack
page read and write
1D65D000
stack
page read and write
412000
unkown
page execute and write copy
11C4000
heap
page read and write
387F000
stack
page read and write
51C0000
trusted library allocation
page read and write
43C0000
direct allocation
page read and write
F20000
direct allocation
page read and write
43C0000
direct allocation
page read and write
13C1000
unkown
page execute and read and write
FB0000
direct allocation
page execute and read and write
7EE60000
trusted library allocation
page execute and read and write
2E0F000
stack
page read and write
6CC000
unkown
page readonly
141A000
unkown
page execute and write copy
463000
unkown
page execute and write copy
4C51000
heap
page read and write
E02000
heap
page read and write
DD4000
heap
page read and write
1010000
direct allocation
page read and write
3C3F000
stack
page read and write
4A80000
direct allocation
page execute and read and write
1484000
unkown
page execute and read and write
357F000
stack
page read and write
E2A000
unkown
page write copy
4B40000
trusted library allocation
page read and write
4F71000
heap
page read and write
5220000
heap
page read and write
2A5BC000
stack
page read and write
631000
unkown
page execute read
35FF000
stack
page read and write
4EE1000
heap
page read and write
467E000
stack
page read and write
2C20000
heap
page read and write
81D0000
trusted library allocation
page read and write
313E000
stack
page read and write
30CE000
stack
page read and write
81D0000
trusted library allocation
page read and write
4850000
direct allocation
page read and write
83A0000
trusted library allocation
page read and write
134A000
heap
page read and write
8770000
trusted library allocation
page read and write
933E000
stack
page read and write
46C000
unkown
page execute and write copy
477F000
stack
page read and write
1D6FE000
heap
page read and write
4C51000
heap
page read and write
3B5E000
stack
page read and write
83F0000
trusted library allocation
page read and write
4E20000
direct allocation
page execute and read and write
33DE000
stack
page read and write
4F60000
direct allocation
page read and write
DEE000
heap
page read and write
2ABF000
stack
page read and write
F20000
direct allocation
page read and write
410F000
stack
page read and write
4EC0000
direct allocation
page execute and read and write
7D0000
unkown
page execute and read and write
8750000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
4EE0000
direct allocation
page execute and read and write
412000
unkown
page execute and write copy
3187000
heap
page read and write
4FF0000
unclassified section
page read and write
8390000
trusted library allocation
page read and write
543000
unkown
page execute and write copy
25AF000
stack
page read and write
83F0000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
2A4C000
stack
page read and write
F73000
heap
page read and write
15E0000
heap
page read and write
1D28E000
stack
page read and write
4781000
heap
page read and write
237BF000
heap
page read and write
1413000
unkown
page execute and read and write
13EA000
unkown
page execute and read and write
2E77000
heap
page read and write
2B7000
unkown
page execute and write copy
4701000
heap
page read and write
1D6F1000
heap
page read and write
7530000
trusted library allocation
page read and write
4D10000
direct allocation
page execute and read and write
427F000
stack
page read and write
DDD000
heap
page read and write
4701000
heap
page read and write
46CE000
stack
page read and write
AAB000
stack
page read and write
3EFE000
stack
page read and write
417E000
stack
page read and write
464000
unkown
page execute and read and write
6CFE0000
unkown
page read and write
E4A000
heap
page read and write
507F000
stack
page read and write
307F000
stack
page read and write
545F000
stack
page read and write
430E000
stack
page read and write
417E000
stack
page read and write
469000
unkown
page execute and read and write
E80000
heap
page read and write
7DEE000
stack
page read and write
4F71000
heap
page read and write
DD4000
heap
page read and write
2C0F000
stack
page read and write
55DE000
stack
page read and write
7B30000
trusted library allocation
page read and write
4D70000
direct allocation
page execute and read and write
33BE000
stack
page read and write
2B00000
heap
page read and write
2B5000
unkown
page execute and write copy
5070000
heap
page read and write
EBE000
stack
page read and write
EAB000
heap
page read and write
2FFE000
stack
page read and write
7B30000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
4701000
heap
page read and write
353000
unkown
page execute and read and write
4F71000
heap
page read and write
13D7000
unkown
page execute and write copy
15F0000
heap
page read and write
1D6FF000
heap
page read and write
16B8000
heap
page read and write
55A000
unkown
page execute and write copy
83E0000
trusted library allocation
page read and write
11C4000
heap
page read and write
46A000
unkown
page execute and write copy
5A2000
unkown
page execute and read and write
83B0000
trusted library allocation
page read and write
408E000
stack
page read and write
F1B000
heap
page read and write
4EE1000
heap
page read and write
7B30000
trusted library allocation
page read and write
4781000
heap
page read and write
734000
unkown
page execute and write copy
74F000
unkown
page execute and read and write
7530000
trusted library allocation
page read and write
1D6FE000
heap
page read and write
35FF000
stack
page read and write
4C51000
heap
page read and write
1010000
direct allocation
page read and write
6CE01000
unkown
page execute read
6CFE5000
unkown
page readonly
340E000
stack
page read and write
14C8000
unkown
page execute and read and write
83B0000
trusted library allocation
page execute and read and write
237D9000
heap
page read and write
4EF2000
heap
page read and write
14A1000
unkown
page execute and write copy
498000
unkown
page execute and write copy
11C4000
heap
page read and write
7247000
heap
page read and write
325F000
stack
page read and write
5400000
direct allocation
page read and write
1081000
unkown
page execute and read and write
11C4000
heap
page read and write
492000
unkown
page execute and write copy
7B30000
trusted library allocation
page read and write
F71000
heap
page read and write
1D6D9000
heap
page read and write
4A0E000
stack
page read and write
7530000
trusted library allocation
page read and write
377E000
stack
page read and write
4EE1000
heap
page read and write
7530000
trusted library allocation
page read and write
DB0000
heap
page read and write
323F000
stack
page read and write
1D7EE000
heap
page read and write
D70000
heap
page read and write
39FE000
stack
page read and write
526E000
stack
page read and write
4701000
heap
page read and write
469000
unkown
page execute and read and write
9FE000
heap
page read and write
8C7F000
heap
page read and write
8201000
trusted library allocation
page read and write
7BA000
unkown
page execute and read and write
1D6D7000
heap
page read and write
542000
unkown
page execute and read and write
4701000
heap
page read and write
4F71000
heap
page read and write
4701000
heap
page read and write
2B5000
unkown
page execute and write copy
4F71000
heap
page read and write
4701000
heap
page read and write
FF7000
unkown
page execute and read and write
1432000
unkown
page execute and write copy
8760000
trusted library allocation
page read and write
55B0000
direct allocation
page execute and read and write
23750000
trusted library allocation
page read and write
E40000
heap
page read and write
2FBF000
stack
page read and write
DD4000
heap
page read and write
7530000
trusted library allocation
page read and write
BAB000
stack
page read and write
14A5000
unkown
page execute and write copy
530000
unkown
page readonly
387F000
stack
page read and write
313E000
stack
page read and write
3C0E000
stack
page read and write
2B07000
heap
page read and write
4D2E000
stack
page read and write
4850000
direct allocation
page read and write
DD4000
heap
page read and write
155F000
stack
page read and write
1D4CF000
stack
page read and write
DD4000
heap
page read and write
4701000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
13B2000
unkown
page execute and read and write
2AB000
unkown
page execute and write copy
7B30000
trusted library allocation
page read and write
4720000
heap
page read and write
83E0000
trusted library allocation
page read and write
10F7000
stack
page read and write
81D0000
trusted library allocation
page read and write
1260000
heap
page read and write
2CBF000
stack
page read and write
7B30000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
5014000
trusted library allocation
page read and write
4701000
heap
page read and write
1D6FF000
heap
page read and write
11C4000
heap
page read and write
4E0C000
stack
page read and write
120A000
unkown
page write copy
3180000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
43C0000
direct allocation
page read and write
6EDED000
unkown
page read and write
1028000
unkown
page execute and read and write
8640000
heap
page read and write
3D7F000
stack
page read and write
4C10000
direct allocation
page read and write
1D3CD000
stack
page read and write
F57000
heap
page read and write
83B0000
trusted library allocation
page read and write
4BA000
unkown
page execute and read and write
FCD000
heap
page read and write
1409000
unkown
page execute and write copy
9EA000
stack
page read and write
4701000
heap
page read and write
3B1F000
stack
page read and write
8745000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
7B30000
trusted library allocation
page read and write
64B0000
heap
page read and write
3B3E000
stack
page read and write
3C7E000
stack
page read and write
23770000
heap
page read and write
8740000
trusted library allocation
page read and write
453E000
stack
page read and write
83D0000
trusted library allocation
page read and write
368E000
stack
page read and write
83E0000
trusted library allocation
page read and write
1C0000
unkown
page readonly
23828000
heap
page read and write
40CF000
stack
page read and write
2A7F000
stack
page read and write
5230000
direct allocation
page execute and read and write
444E000
stack
page read and write
14AE000
unkown
page execute and write copy
83F0000
trusted library allocation
page read and write
1D6F1000
heap
page read and write
4ED0000
direct allocation
page read and write
514E000
stack
page read and write
83E0000
trusted library allocation
page read and write
83E9000
trusted library allocation
page read and write
4820000
trusted library allocation
page read and write
2A9000
unkown
page write copy
1323000
heap
page read and write
16CE000
heap
page read and write
2C7D000
heap
page read and write
1DB42000
heap
page read and write
8740000
trusted library allocation
page read and write
7A7000
unkown
page execute and write copy
1DA3E000
stack
page read and write
2A7A0000
heap
page read and write
FA0000
unkown
page execute and read and write
2A9000
unkown
page write copy
D10000
direct allocation
page read and write
F20000
direct allocation
page read and write
83B0000
trusted library allocation
page read and write
C50000
heap
page read and write
4AF000
unkown
page execute and read and write
9FA000
heap
page read and write
46D000
unkown
page execute and write copy
48C1000
heap
page read and write
4C51000
heap
page read and write
4781000
heap
page read and write
4F71000
heap
page read and write
531000
unkown
page execute and write copy
81D0000
trusted library allocation
page read and write
237D4000
heap
page read and write
4701000
heap
page read and write
1D70C000
heap
page read and write
1331000
heap
page read and write
4E90000
direct allocation
page read and write
506F000
stack
page read and write
5192000
trusted library allocation
page read and write
4C6000
unkown
page execute and write copy
4D60000
direct allocation
page execute and read and write
4701000
heap
page read and write
434F000
stack
page read and write
1D14F000
stack
page read and write
2C70000
heap
page read and write
44FF000
stack
page read and write
582000
unkown
page write copy
433F000
stack
page read and write
1D70C000
heap
page read and write
339F000
stack
page read and write
E3E000
stack
page read and write
842000
unkown
page execute and read and write
8390000
trusted library allocation
page read and write
363E000
stack
page read and write
4701000
heap
page read and write
40BF000
stack
page read and write
429F000
stack
page read and write
83E0000
trusted library allocation
page read and write
DD4000
heap
page read and write
39CE000
stack
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
448F000
stack
page read and write
7530000
trusted library allocation
page read and write
C8F000
unkown
page execute and read and write
4EB0000
direct allocation
page execute and read and write
4C51000
heap
page read and write
7530000
trusted library allocation
page read and write
2B5000
unkown
page execute and write copy
83B0000
trusted library allocation
page read and write
4A40000
direct allocation
page execute and read and write
DD4000
heap
page read and write
379E000
stack
page read and write
373F000
stack
page read and write
1052000
unkown
page execute and write copy
541000
unkown
page execute and write copy
FDE000
heap
page read and write
FE0000
heap
page read and write
81C0000
trusted library allocation
page read and write
FE5000
heap
page read and write
49D0000
direct allocation
page execute and read and write
463000
unkown
page execute and write copy
C48000
heap
page read and write
4A10000
direct allocation
page execute and read and write
1D6E3000
heap
page read and write
8760000
trusted library allocation
page read and write
584000
unkown
page execute and read and write
4BCE000
stack
page read and write
4ED0000
direct allocation
page execute and read and write
4FAF000
stack
page read and write
373F000
stack
page read and write
4F71000
heap
page read and write
370E000
stack
page read and write
494E000
stack
page read and write
4CE000
unkown
page execute and write copy
4D30000
direct allocation
page execute and read and write
125E000
stack
page read and write
48F0000
heap
page read and write
83B0000
trusted library allocation
page read and write
4A20000
direct allocation
page execute and read and write
15CA000
heap
page read and write
83E0000
trusted library allocation
page read and write
4AC000
unkown
page execute and write copy
4C51000
heap
page read and write
5210000
trusted library allocation
page execute and read and write
287E000
stack
page read and write
4F60000
direct allocation
page read and write
2C60000
direct allocation
page read and write
4ED0000
direct allocation
page read and write
327E000
stack
page read and write
10CE000
unkown
page execute and write copy
7530000
trusted library allocation
page read and write
4701000
heap
page read and write
1031000
unkown
page execute and write copy
FA2000
unkown
page execute and write copy
4781000
heap
page read and write
61E01000
direct allocation
page execute read
4701000
heap
page read and write
47E000
unkown
page execute and read and write
380F000
stack
page read and write
FC1000
unkown
page execute and write copy
4701000
heap
page read and write
51A7000
trusted library allocation
page execute and read and write
7B30000
trusted library allocation
page read and write
4EE1000
heap
page read and write
5B7000
unkown
page execute and write copy
48F1000
heap
page read and write
83B0000
trusted library allocation
page read and write
3FCE000
stack
page read and write
713000
unkown
page execute and read and write
2FDF000
stack
page read and write
461000
unkown
page execute and read and write
4F71000
heap
page read and write
3F7F000
stack
page read and write
761E000
stack
page read and write
2CDF000
stack
page read and write
11C0000
heap
page read and write
4781000
heap
page read and write
859000
unkown
page execute and write copy
DD4000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
308F000
stack
page read and write
4A8E000
stack
page read and write
81C0000
trusted library allocation
page read and write
E74000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
477F000
stack
page read and write
5023000
trusted library allocation
page read and write
4AB000
unkown
page execute and read and write
DF7000
heap
page read and write
42BE000
stack
page read and write
4E9000
unkown
page execute and read and write
C76000
unkown
page execute and read and write
102B000
heap
page read and write
31CF000
stack
page read and write
E09000
heap
page read and write
542000
unkown
page execute and read and write
7B30000
trusted library allocation
page read and write
4D0000
unkown
page execute and read and write
4F00000
direct allocation
page execute and read and write
1D701000
heap
page read and write
334F000
stack
page read and write
3B0E000
stack
page read and write
1D6D7000
heap
page read and write
4701000
heap
page read and write
85A0000
heap
page read and write
4701000
heap
page read and write
83B0000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
423E000
stack
page read and write
4DC0000
direct allocation
page execute and read and write
8380000
trusted library allocation
page read and write
2A7A1000
heap
page read and write
2AB000
unkown
page execute and write copy
907F000
stack
page read and write
522F000
stack
page read and write
2A2000
unkown
page execute and read and write
4ED0000
direct allocation
page read and write
2A79C000
stack
page read and write
438F000
stack
page read and write
455E000
stack
page read and write
531000
unkown
page execute and write copy
39BF000
stack
page read and write
FD8000
heap
page read and write
43C0000
direct allocation
page read and write
1D7E0000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
934000
heap
page read and write
7530000
trusted library allocation
page read and write
4F71000
heap
page read and write
8390000
trusted library allocation
page read and write
4701000
heap
page read and write
2E7F000
stack
page read and write
7BF000
unkown
page execute and read and write
8CE4000
heap
page read and write
240000
unkown
page readonly
CCD000
heap
page read and write
43C0000
direct allocation
page read and write
43D1000
heap
page read and write
4F71000
heap
page read and write
8760000
trusted library allocation
page read and write
3A1E000
stack
page read and write
4F71000
heap
page read and write
2EBC000
stack
page read and write
83E6000
trusted library allocation
page read and write
1DB3E000
stack
page read and write
48F1000
heap
page read and write
15FA000
heap
page read and write
760000
unkown
page execute and write copy
DD4000
heap
page read and write
5020000
trusted library allocation
page read and write
337F000
stack
page read and write
83E0000
trusted library allocation
page read and write
1000000
unkown
page execute and write copy
540000
unkown
page read and write
4781000
heap
page read and write
4E10000
direct allocation
page execute and read and write
4D0000
unkown
page execute and read and write
559000
unkown
page execute and write copy
44D0000
heap
page read and write
1D703000
heap
page read and write
4781000
heap
page read and write
2A2000
unkown
page execute and read and write
4C51000
heap
page read and write
329E000
stack
page read and write
957E000
stack
page read and write
398F000
stack
page read and write
3F1E000
stack
page read and write
11C4000
heap
page read and write
237C8000
heap
page read and write
EE1000
heap
page read and write
1039000
unkown
page execute and read and write
EE5000
heap
page read and write
1D6CB000
heap
page read and write
48C1000
heap
page read and write
334E000
stack
page read and write
4781000
heap
page read and write
DD4000
heap
page read and write
34FE000
stack
page read and write
417E000
stack
page read and write
DD4000
heap
page read and write
2B6000
unkown
page execute and read and write
550F000
stack
page read and write
8760000
trusted library allocation
page read and write
2ADE000
stack
page read and write
7B30000
trusted library allocation
page read and write
48C1000
heap
page read and write
373F000
stack
page read and write
4ED0000
direct allocation
page read and write
328F000
stack
page read and write
4781000
heap
page read and write
239CF000
stack
page read and write
542000
unkown
page execute and read and write
4AB000
unkown
page execute and read and write
4E7D000
stack
page read and write
2D7E000
stack
page read and write
7BB000
unkown
page execute and write copy
5399000
trusted library allocation
page read and write
3EBF000
stack
page read and write
320F000
stack
page read and write
4701000
heap
page read and write
2C60000
direct allocation
page read and write
4D18000
stack
page read and write
427F000
stack
page read and write
4F60000
direct allocation
page read and write
4D90000
direct allocation
page execute and read and write
538F000
stack
page read and write
5351000
trusted library allocation
page read and write
465F000
stack
page read and write
2F7E000
stack
page read and write
4F71000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
7C7000
unkown
page execute and read and write
315E000
stack
page read and write
DE3000
heap
page read and write
4701000
heap
page read and write
51BF000
stack
page read and write
4F60000
direct allocation
page read and write
2E7F000
stack
page read and write
6EDE7000
unkown
page readonly
4701000
heap
page read and write
4701000
heap
page read and write
1446000
unkown
page execute and write copy
501D000
trusted library allocation
page execute and read and write
463000
unkown
page execute and write copy
4701000
heap
page read and write
85E8000
heap
page read and write
D10000
direct allocation
page read and write
44A000
unkown
page execute and write copy
1D6D5000
heap
page read and write
54B000
unkown
page execute and write copy
F74000
heap
page read and write
5680000
heap
page read and write
1D703000
heap
page read and write
46A000
unkown
page execute and write copy
5340000
heap
page execute and read and write
3C3E000
stack
page read and write
DED000
heap
page read and write
4F71000
heap
page read and write
F20000
direct allocation
page read and write
DD4000
heap
page read and write
4C51000
heap
page read and write
12AF000
heap
page read and write
403E000
stack
page read and write
8740000
trusted library allocation
page read and write
517E000
stack
page read and write
4F71000
heap
page read and write
13BC000
unkown
page execute and write copy
149B000
unkown
page execute and read and write
4F40000
direct allocation
page execute and read and write
4CCF000
stack
page read and write
1D2DE000
stack
page read and write
764000
unkown
page execute and read and write
2BFF000
stack
page read and write
12A7000
heap
page read and write
10D9000
unkown
page execute and write copy
42DE000
stack
page read and write
103A000
unkown
page execute and write copy
33BE000
stack
page read and write
360E000
stack
page read and write
834000
unkown
page execute and write copy
373F000
stack
page read and write
7B30000
trusted library allocation
page read and write
4A0000
unkown
page execute and read and write
3B3E000
stack
page read and write
4F6B000
stack
page read and write
4701000
heap
page read and write
1D709000
heap
page read and write
7AF000
unkown
page execute and read and write
3CCE000
stack
page read and write
3D7F000
stack
page read and write
DE6000
heap
page read and write
C50000
heap
page read and write
8613000
heap
page read and write
81F2000
trusted library allocation
page read and write
549E000
stack
page read and write
3B3E000
stack
page read and write
582000
unkown
page write copy
23832000
heap
page read and write
4C51000
heap
page read and write
7B30000
trusted library allocation
page read and write
7B30000
trusted library allocation
page read and write
1D6FE000
heap
page read and write
4C7000
unkown
page execute and read and write
1D6E5000
heap
page read and write
1D6F1000
heap
page read and write
1D6E9000
heap
page read and write
531000
unkown
page execute and read and write
12DF000
stack
page read and write
83B0000
trusted library allocation
page read and write
4F60000
direct allocation
page read and write
240000
unkown
page read and write
FF0000
heap
page read and write
4C51000
heap
page read and write
4701000
heap
page read and write
8760000
trusted library allocation
page read and write
3B3E000
stack
page read and write
582000
unkown
page write copy
8380000
trusted library allocation
page read and write
6375000
trusted library allocation
page read and write
83E5000
trusted library allocation
page read and write
4A60000
direct allocation
page execute and read and write
1D6F4000
heap
page read and write
43BF000
stack
page read and write
4781000
heap
page read and write
48E0000
direct allocation
page read and write
F50000
heap
page read and write
237C2000
heap
page read and write
4F71000
heap
page read and write
7B30000
trusted library allocation
page read and write
D10000
direct allocation
page read and write
468000
unkown
page execute and write copy
4850000
direct allocation
page read and write
4701000
heap
page read and write
536E000
stack
page read and write
43C0000
direct allocation
page read and write
83B0000
trusted library allocation
page read and write
4AF000
unkown
page execute and read and write
515000
unkown
page execute and read and write
83E0000
trusted library allocation
page read and write
4C51000
heap
page read and write
4781000
heap
page read and write
E74000
heap
page read and write
4701000
heap
page read and write
4F71000
heap
page read and write
7F6E000
stack
page read and write
D9D000
stack
page read and write
1CF0E000
stack
page read and write
4C51000
heap
page read and write
4F26000
heap
page read and write
542000
unkown
page execute and write copy
4C51000
heap
page read and write
8400000
trusted library allocation
page read and write
418F000
stack
page read and write
83B0000
trusted library allocation
page read and write
4701000
heap
page read and write
60C000
unkown
page execute and write copy
11BF000
stack
page read and write
DD4000
heap
page read and write
310E000
stack
page read and write
538F000
trusted library allocation
page read and write
43BF000
stack
page read and write
14B0000
unkown
page execute and read and write
109B000
heap
page read and write
7B70000
trusted library allocation
page read and write
4C51000
heap
page read and write
F40000
direct allocation
page read and write
1419000
unkown
page execute and read and write
C6E000
unkown
page execute and read and write
DD4000
heap
page read and write
48AE000
stack
page read and write
1414000
unkown
page execute and write copy
337F000
stack
page read and write
4E0F000
stack
page read and write
13A8000
unkown
page execute and write copy
365E000
stack
page read and write
535E000
stack
page read and write
2A90000
heap
page read and write
9EB000
stack
page read and write
700C0000
unkown
page readonly
4781000
heap
page read and write
6EDD0000
unkown
page readonly
4F71000
heap
page read and write
4C7000
unkown
page execute and read and write
53A0000
remote allocation
page read and write
7AC000
unkown
page execute and write copy
463F000
stack
page read and write
4D30000
trusted library allocation
page read and write
57CF000
stack
page read and write
4BB000
unkown
page execute and write copy
107A000
unkown
page execute and write copy
4701000
heap
page read and write
E59000
heap
page read and write
DC0000
heap
page read and write
7B20000
trusted library allocation
page read and write
1069000
unkown
page execute and read and write
3AFF000
stack
page read and write
1D6E8000
heap
page read and write
32CC000
stack
page read and write
83E6000
trusted library allocation
page read and write
2B7000
unkown
page execute and write copy
8760000
trusted library allocation
page read and write
610E000
stack
page read and write
9F0000
heap
page read and write
48C1000
heap
page read and write
8F7C000
stack
page read and write
3EBF000
stack
page read and write
7530000
trusted library allocation
page read and write
4701000
heap
page read and write
943F000
stack
page read and write
5A0000
heap
page read and write
EEE000
stack
page read and write
440F000
stack
page read and write
758E000
stack
page read and write
F56000
heap
page read and write
467E000
stack
page read and write
4F60000
direct allocation
page read and write
4701000
heap
page read and write
543C000
stack
page read and write
327E000
stack
page read and write
4F50000
heap
page read and write
12F8000
heap
page read and write
29BE000
stack
page read and write
8400000
trusted library allocation
page read and write
4BF000
unkown
page execute and read and write
4C51000
heap
page read and write
7B30000
trusted library allocation
page read and write
14B1000
unkown
page execute and write copy
4C51000
heap
page read and write
477F000
stack
page read and write
7550000
trusted library allocation
page read and write
474E000
stack
page read and write
4C7000
unkown
page execute and read and write
F20000
direct allocation
page read and write
467E000
stack
page read and write
727000
unkown
page execute and read and write
C63000
heap
page read and write
539B000
trusted library allocation
page read and write
1D6E3000
heap
page read and write
4701000
heap
page read and write
435000
unkown
page execute and read and write
8C8C000
heap
page read and write
55A000
unkown
page execute and write copy
E2C000
unkown
page execute and write copy
4BF000
unkown
page execute and read and write
48E0000
direct allocation
page read and write
4F71000
heap
page read and write
3EBF000
stack
page read and write
834000
unkown
page execute and write copy
D10000
direct allocation
page read and write
83B0000
trusted library allocation
page read and write
10D1000
unkown
page execute and write copy
8760000
trusted library allocation
page read and write
5010000
trusted library allocation
page read and write
8740000
trusted library allocation
page read and write
6650000
heap
page read and write
403E000
stack
page read and write
5570000
direct allocation
page execute and read and write
11C4000
heap
page read and write
9D6000
unkown
page execute and read and write
4781000
heap
page read and write
7358000
trusted library allocation
page read and write
D6D000
stack
page read and write
11C4000
heap
page read and write
4ED0000
direct allocation
page read and write
8760000
trusted library allocation
page read and write
7B30000
trusted library allocation
page read and write
51A2000
trusted library allocation
page read and write
43C0000
direct allocation
page read and write
EE0000
heap
page read and write
3FFF000
stack
page read and write
1D6ED000
heap
page read and write
8370000
trusted library allocation
page read and write
860B000
heap
page read and write
4D50000
direct allocation
page execute and read and write
374E000
stack
page read and write
53CF000
trusted library allocation
page read and write
464000
unkown
page execute and read and write
7550000
trusted library allocation
page read and write
44A000
unkown
page execute and write copy
7530000
trusted library allocation
page read and write
4B90000
direct allocation
page read and write
4EE1000
heap
page read and write
1010000
direct allocation
page read and write
31FF000
stack
page read and write
81D0000
trusted library allocation
page read and write
68FB000
stack
page read and write
48E0000
direct allocation
page read and write
4781000
heap
page read and write
484F000
stack
page read and write
4B8000
unkown
page execute and write copy
4701000
heap
page read and write
460000
unkown
page execute and write copy
139B000
unkown
page execute and read and write
DD0000
heap
page read and write
323F000
stack
page read and write
8770000
trusted library allocation
page read and write
83B0000
trusted library allocation
page read and write
CB7000
heap
page read and write
4C51000
heap
page read and write
6CF9F000
unkown
page readonly
1500000
heap
page read and write
7530000
trusted library allocation
page read and write
8FD000
stack
page read and write
7540000
trusted library allocation
page read and write
3E4F000
stack
page read and write
350F000
stack
page read and write
241000
unkown
page execute and write copy
3A0F000
stack
page read and write
ADC000
stack
page read and write
492000
unkown
page execute and write copy
4F71000
heap
page read and write
There are 2616 hidden memdumps, click here to show them.