IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1013060001\16b11e2c5c.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1013061001\7215223519.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Documents\FIDGHIIECG.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AAEHIDAKECFIEBGDHJEB
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\ProgramData\BKJJJDHD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\CBKFBAECBAEGDGDHIEHI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\EGDBAFHJJDAKEBGCFCBGDHDGII
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\FIEHDBGD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IDHDGIEHJJJJEBGDAFHJEBGDGI
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IJDBGDGCGDAKFIDGIDBF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\409fd701-3892-426f-9320-4266add8030e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\890c4016-6365-4968-8d49-56aa548944e9.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\90677d24-d03b-4e3a-9b74-933243eb5742.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-6754DEC9-1F74.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-6754DEC9-86C.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2352f.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2354e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF24329.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF24339.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\f7a30c1e-81eb-4b68-9c6b-fed2010d1582.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\f9de4eb6-90fa-4484-b3d8-9609bc6d1e63.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
Chrome Cache Entry: 92
ASCII text, with very long lines (2412)
downloaded
Chrome Cache Entry: 93
ASCII text, with very long lines (3509)
downloaded
Chrome Cache Entry: 94
ASCII text
downloaded
Chrome Cache Entry: 95
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 96
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 97
SVG Scalable Vector Graphics image
downloaded
There are 42 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2492 --field-trial-handle=2196,i,4868894601841744955,10257987303288311924,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2408 --field-trial-handle=2248,i,9099896745264163238,9476134514677469961,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=2004,i,15111161645592940276,13810185552624013604,262144 /prefetch:3
malicious
C:\Users\user\Documents\FIDGHIIECG.exe
"C:\Users\user\Documents\FIDGHIIECG.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user~1\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user~1\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user~1\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1013060001\16b11e2c5c.exe
"C:\Users\user~1\AppData\Local\Temp\1013060001\16b11e2c5c.exe"
malicious
C:\Users\user\AppData\Local\Temp\1013061001\7215223519.exe
"C:\Users\user~1\AppData\Local\Temp\1013061001\7215223519.exe"
malicious
C:\Users\user\AppData\Local\Temp\1013060001\16b11e2c5c.exe
"C:\Users\user~1\AppData\Local\Temp\1013060001\16b11e2c5c.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\Documents\FIDGHIIECG.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.206/68b591d6548ec281/softokn3.dll
185.215.113.206
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://duckduckgo.com/chrome_newtab
unknown
dare-curbys.biz
http://185.215.113.206/68b591d6548ec281/sqlite3.dll2
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206/68b591d6548ec281/sqlite3.dll.
unknown
http://www.broofa.com
unknown
https://bridge.sfo1.admarketplace.net/c
unknown
http://185.215.113.43/Zu7JuNko/index.phph%D
unknown
https://atten-supporse.biz/_
unknown
http://185.215.113.206c4becf79229cb002.phpdge
unknown
http://185.215.113.206/c4becf79229cb002.phpBGDGCGDAKFIDGIDBFy
unknown
https://www.google.com
unknown
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
http://185.215.113.206/68b591d6548ec281/freebl3.dll
185.215.113.206
https://atten-supporse.biz//
unknown
formy-spill.biz
http://185.215.113.206/68b591d6548ec281/nss3.dll
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php&)
unknown
https://atten-supporse.biz/7
unknown
http://185.215.113.206/68b591d6548ec281/mozglue.dllB
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
216.58.208.228
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
https://atten-supporse.biz/apii
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://atten-supporse.biz/api
172.67.165.166
http://185.215.113.16/steam/random.exegram
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
http://185.215.113.206/c4becf79229cb002.php1
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://play.google.com/log?format=json&hasfast=true
unknown
atten-supporse.biz
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
http://185.215.113.206/c4becf79229cb002.phpJ
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dllL
unknown
http://185.215.113.206/c4becf79229cb002.phpP
unknown
http://185.215.113.206/c4becf79229cb002.phpN
unknown
https://atten-supporse.biz/
unknown
print-vexer.biz
http://185.215.113.16/steam/random.exe1395d7
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dll
185.215.113.206
impend-differ.biz
http://185.215.113.206/c4becf79229cb002.phpZ
unknown
http://185.215.113.206/c4becf79229cb002.phpgram
unknown
http://185.215.113.206/c4becf79229cb002.phpb
unknown
http://185.215.113.206/c4becf79229cb002.phpg
unknown
http://185.215.113.43/Zu7JuNko/index.phpa
unknown
http://185.215.113.206/c4becf79229cb002.phpf
unknown
http://185.215.113.16/mine/random.exe
185.215.113.16
http://185.215.113.206/c4becf79229cb002.phpi
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dll
185.215.113.206
http://185.215.113.43/Zu7JuNko/index.phpC$
unknown
http://185.215.113.206/c4becf79229cb002.php2c542939725eb1a730a525b0c7bb
unknown
http://185.215.113.43/Zu7JuNko/index.phpN
unknown
dwell-exclaim.biz
http://185.215.113.16/luma/random.exe
unknown
zinc-sneark.biz
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.206/68b591d6548ec281/mozglue.dll
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php/x
unknown
https://apis.google.com
unknown
se-blurry.biz
http://185.215.113.206/c4becf79229cb002.phpdge
unknown
http://www.sqlite.org/copyright.html.
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
covery-mover.biz
http://185.215.113.206/68b591d6548ec281/msvcp140.dll
185.215.113.206
http://185.215.113.206/68b591d6548ec281/sqlite3.dllv
unknown
http://185.215.113.16/steam/random.exe
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
https://www.google.com/async/newtab_promos
216.58.208.228
http://185.215.113.16/steam/random.exe64
unknown
https://atten-supporse.biz/apiR
unknown
http://185.215.113.16/steam/random.exe7
unknown
http://185.215.113.206/j
unknown
http://185.215.113.206ata
unknown
https://atten-supporse.biz/apiO
unknown
http://185.215.113.43/Zu7JuNko/index.phpKw
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
216.58.208.228
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
216.58.208.228
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
http://185.215.113.16/steam/random.exe132
unknown
http://185.215.113.43/Zu7JuNko/index.phpi
unknown
https://support.mozilla.org
unknown
http://185.215.113.206
unknown
http://185.215.113.43/Zu7JuNko/index.phpm
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
atten-supporse.biz
172.67.165.166
www3.l.google.com
142.250.181.142
plus.l.google.com
172.217.17.46
www.google.com
216.58.208.228
ogs.google.com
unknown
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
192.168.2.7
unknown
unknown
malicious
185.215.113.16
unknown
Portugal
malicious
185.215.113.206
unknown
Portugal
malicious
142.250.181.142
www3.l.google.com
United States
172.67.165.166
atten-supporse.biz
United States
239.255.255.250
unknown
Reserved
216.58.208.228
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
16b11e2c5c.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4C80000
direct allocation
page read and write
malicious
711000
unkown
page execute and read and write
malicious
711000
unkown
page execute and read and write
malicious
4F00000
direct allocation
page read and write
malicious
129E000
heap
page read and write
malicious
711000
unkown
page execute and read and write
malicious
9B1000
unkown
page execute and read and write
malicious
661000
unkown
page execute and read and write
malicious
8F0000
unkown
page execute and read and write
5890000
heap
page read and write
5C53000
trusted library allocation
page read and write
1460000
direct allocation
page read and write
3E0F000
stack
page read and write
58C1000
heap
page read and write
669F000
stack
page read and write
5B91000
trusted library allocation
page read and write
2C2E000
stack
page read and write
C79000
heap
page read and write
1387000
heap
page read and write
41EE000
stack
page read and write
41D0000
heap
page read and write
58DC000
heap
page read and write
7047F000
unkown
page readonly
58C1000
heap
page read and write
316F000
stack
page read and write
5280000
direct allocation
page execute and read and write
358E000
stack
page read and write
994000
unkown
page execute and read and write
1144000
heap
page read and write
901000
unkown
page execute and read and write
5C97000
trusted library allocation
page read and write
1144000
heap
page read and write
6D7000
unkown
page execute and write copy
BA04000
heap
page read and write
543F000
stack
page read and write
F94000
heap
page read and write
4BD0000
direct allocation
page read and write
4931000
heap
page read and write
482E000
stack
page read and write
4931000
heap
page read and write
973000
unkown
page execute and read and write
1144000
heap
page read and write
5210000
direct allocation
page execute and read and write
4931000
heap
page read and write
915000
unkown
page execute and read and write
36AE000
stack
page read and write
985000
unkown
page execute and write copy
306E000
stack
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
5BC9000
trusted library allocation
page read and write
356E000
stack
page read and write
F94000
heap
page read and write
4931000
heap
page read and write
902000
unkown
page execute and write copy
5C70000
trusted library allocation
page read and write
772000
unkown
page execute and write copy
9AC000
unkown
page execute and write copy
5BAB000
trusted library allocation
page read and write
5B9E000
trusted library allocation
page read and write
41D1000
heap
page read and write
58A7000
heap
page read and write
1166000
heap
page read and write
342E000
stack
page read and write
4931000
heap
page read and write
41ED000
stack
page read and write
5C29000
trusted library allocation
page read and write
8FB000
unkown
page execute and write copy
1070000
direct allocation
page execute and read and write
916000
unkown
page execute and write copy
4A71000
heap
page read and write
F94000
heap
page read and write
41D1000
heap
page read and write
4A71000
heap
page read and write
326E000
stack
page read and write
5070000
direct allocation
page execute and read and write
2E6D000
heap
page read and write
36EE000
stack
page read and write
49B0000
heap
page read and write
4A71000
heap
page read and write
5BB7000
trusted library allocation
page read and write
5BC2000
trusted library allocation
page read and write
5B7000
heap
page read and write
441000
unkown
page execute and write copy
5BA6000
trusted library allocation
page read and write
4931000
heap
page read and write
1290000
heap
page read and write
9EB000
unkown
page execute and write copy
4ED0000
direct allocation
page execute and read and write
A02000
unkown
page execute and write copy
4931000
heap
page read and write
5210000
direct allocation
page execute and read and write
1141000
heap
page read and write
711000
unkown
page execute and write copy
1144000
heap
page read and write
F94000
heap
page read and write
41D1000
heap
page read and write
958000
unkown
page execute and write copy
55CC000
stack
page read and write
4931000
heap
page read and write
958000
unkown
page execute and write copy
58B7000
heap
page read and write
58D5000
heap
page read and write
312E000
stack
page read and write
985000
unkown
page execute and write copy
45AE000
stack
page read and write
645E000
stack
page read and write
4931000
heap
page read and write
F94000
heap
page read and write
547E000
stack
page read and write
5CA9000
trusted library allocation
page read and write
41D1000
heap
page read and write
A1A000
unkown
page execute and read and write
902000
unkown
page execute and write copy
779000
unkown
page write copy
101E000
stack
page read and write
A05000
unkown
page execute and read and write
41D1000
heap
page read and write
3B2E000
stack
page read and write
725000
unkown
page execute and read and write
2E1B000
stack
page read and write
9AE000
stack
page read and write
1144000
heap
page read and write
4931000
heap
page read and write
41D1000
heap
page read and write
4D50000
direct allocation
page read and write
BC50000
heap
page read and write
386F000
stack
page read and write
902000
unkown
page execute and write copy
1169000
heap
page read and write
6C2000
unkown
page execute and write copy
3A2F000
stack
page read and write
41D1000
heap
page read and write
4931000
heap
page read and write
A0C000
unkown
page execute and write copy
787000
unkown
page execute and write copy
4931000
heap
page read and write
2AD0000
direct allocation
page read and write
6CDF0000
unkown
page readonly
991000
unkown
page execute and write copy
520D000
stack
page read and write
4DEE000
stack
page read and write
BEE000
stack
page read and write
4A71000
heap
page read and write
508E000
stack
page read and write
58C5000
heap
page read and write
47EF000
stack
page read and write
4931000
heap
page read and write
128E000
stack
page read and write
70461000
unkown
page execute read
5BB1000
trusted library allocation
page read and write
35AE000
stack
page read and write
A0C000
unkown
page execute and write copy
4650000
direct allocation
page read and write
4EDD000
stack
page read and write
710000
unkown
page readonly
10F0000
heap
page read and write
772000
unkown
page execute and read and write
53D000
stack
page read and write
4870000
direct allocation
page execute and read and write
F30000
heap
page read and write
F94000
heap
page read and write
8DB000
unkown
page execute and read and write
3A6E000
stack
page read and write
406F000
stack
page read and write
58C4000
heap
page read and write
1144000
heap
page read and write
6B2E000
heap
page read and write
4931000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
F94000
heap
page read and write
5C3E000
trusted library allocation
page read and write
58CF000
heap
page read and write
4BD0000
direct allocation
page read and write
19D000
stack
page read and write
5BDB000
trusted library allocation
page read and write
75B1000
heap
page read and write
93D000
unkown
page execute and write copy
5200000
direct allocation
page execute and read and write
5210000
direct allocation
page execute and read and write
1144000
heap
page read and write
1460000
direct allocation
page read and write
141F000
stack
page read and write
8C4E000
stack
page read and write
5CB7000
trusted library allocation
page read and write
4F60000
direct allocation
page execute and read and write
5C90000
trusted library allocation
page read and write
46EF000
stack
page read and write
4EF0000
direct allocation
page execute and read and write
A0C000
unkown
page execute and write copy
47D0000
direct allocation
page execute and read and write
96F000
unkown
page execute and read and write
4A75000
heap
page read and write
700B1000
unkown
page execute read
5C35000
trusted library allocation
page read and write
F60000
direct allocation
page read and write
446F000
stack
page read and write
58B5000
heap
page read and write
99E000
unkown
page execute and read and write
4BD0000
direct allocation
page read and write
10DE000
heap
page read and write
691F000
stack
page read and write
1090000
heap
page read and write
46AF000
stack
page read and write
9F4000
unkown
page execute and write copy
2FEF000
stack
page read and write
4931000
heap
page read and write
12920000
heap
page read and write
5BF5000
trusted library allocation
page read and write
5BA8000
trusted library allocation
page read and write
3D0E000
stack
page read and write
41D1000
heap
page read and write
41D1000
heap
page read and write
5C6D000
trusted library allocation
page read and write
62D6000
heap
page read and write
15DF000
stack
page read and write
129E000
stack
page read and write
466E000
stack
page read and write
2DE0000
heap
page read and write
47C0000
direct allocation
page execute and read and write
145E000
stack
page read and write
4A71000
heap
page read and write
955000
unkown
page execute and read and write
710000
unkown
page read and write
8FC000
unkown
page execute and read and write
5BE3000
trusted library allocation
page read and write
4BD0000
direct allocation
page read and write
366F000
stack
page read and write
50C0000
direct allocation
page read and write
2AE7000
heap
page read and write
1112000
heap
page read and write
44AE000
stack
page read and write
12FA000
heap
page read and write
41D1000
heap
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
32AF000
stack
page read and write
58CE000
heap
page read and write
12AA000
heap
page read and write
58CE000
heap
page read and write
3F2F000
stack
page read and write
BC48000
heap
page read and write
4A71000
heap
page read and write
3CAF000
stack
page read and write
117C000
heap
page read and write
4E9F000
stack
page read and write
62D5000
heap
page read and write
3BCE000
stack
page read and write
5B8F000
stack
page read and write
58C1000
heap
page read and write
5210000
direct allocation
page execute and read and write
12EE000
heap
page read and write
5C3C000
trusted library allocation
page read and write
5080000
direct allocation
page read and write
1020000
direct allocation
page read and write
4A71000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
2D6F000
stack
page read and write
56ED000
stack
page read and write
F60000
direct allocation
page read and write
8FC000
unkown
page execute and write copy
9EC000
unkown
page execute and read and write
352F000
stack
page read and write
2AD0000
direct allocation
page read and write
A02000
unkown
page execute and write copy
41D1000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
5BF5000
trusted library allocation
page read and write
111A000
heap
page read and write
2C6F000
stack
page read and write
5C5E000
trusted library allocation
page read and write
3BEE000
stack
page read and write
F94000
heap
page read and write
117C000
heap
page read and write
940000
unkown
page execute and read and write
4830000
direct allocation
page execute and read and write
1050000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
A1A000
unkown
page execute and read and write
C43000
heap
page read and write
61EB4000
direct allocation
page read and write
4BD0000
direct allocation
page read and write
77B000
unkown
page execute and write copy
1460000
direct allocation
page read and write
12EE000
stack
page read and write
58A7000
heap
page read and write
4A6F000
stack
page read and write
37AF000
stack
page read and write
10BA000
heap
page read and write
4931000
heap
page read and write
4A71000
heap
page read and write
2A0F000
stack
page read and write
5B91000
trusted library allocation
page read and write
4931000
heap
page read and write
3C6E000
stack
page read and write
4BF0000
heap
page read and write
55BE000
stack
page read and write
3E4E000
stack
page read and write
99E000
unkown
page execute and read and write
BB9E000
stack
page read and write
58BA000
heap
page read and write
41D1000
heap
page read and write
4A71000
heap
page read and write
E63000
unkown
page execute and read and write
F94000
heap
page read and write
5C6A000
trusted library allocation
page read and write
4A71000
heap
page read and write
5C47000
trusted library allocation
page read and write
1300000
heap
page read and write
41D1000
heap
page read and write
9AE000
unkown
page execute and read and write
5080000
direct allocation
page execute and read and write
38EF000
stack
page read and write
6C20000
trusted library allocation
page read and write
52FE000
stack
page read and write
1133000
heap
page read and write
F94000
heap
page read and write
4A71000
heap
page read and write
117D000
heap
page read and write
3DEF000
stack
page read and write
1141000
heap
page read and write
5CBF000
trusted library allocation
page read and write
2DEC000
stack
page read and write
8CA000
unkown
page execute and write copy
5090000
direct allocation
page read and write
3EEE000
stack
page read and write
111A000
heap
page read and write
5C40000
trusted library allocation
page read and write
58CE000
heap
page read and write
41D1000
heap
page read and write
4EB0000
heap
page read and write
994000
unkown
page execute and read and write
F94000
heap
page read and write
B99C000
heap
page read and write
4BEF000
stack
page read and write
4931000
heap
page read and write
BAD000
stack
page read and write
1165000
heap
page read and write
5BC1000
trusted library allocation
page read and write
1460000
direct allocation
page read and write
C5E000
heap
page read and write
4800000
direct allocation
page execute and read and write
62C0000
heap
page read and write
918000
unkown
page execute and read and write
436E000
stack
page read and write
711000
unkown
page execute and write copy
4931000
heap
page read and write
9EE000
unkown
page execute and read and write
4931000
heap
page read and write
F94000
heap
page read and write
1144000
heap
page read and write
3BAE000
stack
page read and write
4931000
heap
page read and write
5C41000
trusted library allocation
page read and write
2E60000
heap
page read and write
1020000
direct allocation
page read and write
5BBB000
trusted library allocation
page read and write
47E0000
trusted library allocation
page read and write
58D8000
heap
page read and write
5BEA000
trusted library allocation
page read and write
1460000
direct allocation
page read and write
4F30000
direct allocation
page execute and read and write
5B9E000
trusted library allocation
page read and write
3AEF000
stack
page read and write
915000
unkown
page execute and read and write
2FAF000
stack
page read and write
73D000
unkown
page execute and write copy
95C000
unkown
page execute and write copy
4A71000
heap
page read and write
4A71000
heap
page read and write
F94000
heap
page read and write
994000
unkown
page execute and read and write
A05000
unkown
page execute and read and write
4F70000
direct allocation
page execute and read and write
4BAF000
stack
page read and write
965000
unkown
page execute and write copy
1020000
direct allocation
page read and write
1020000
direct allocation
page read and write
37AF000
stack
page read and write
9ED000
unkown
page execute and write copy
46E1000
heap
page read and write
3B6F000
stack
page read and write
4931000
heap
page read and write
5BFA000
trusted library allocation
page read and write
1144000
heap
page read and write
77B000
unkown
page execute and write copy
F60000
direct allocation
page read and write
E00000
direct allocation
page read and write
47D0000
direct allocation
page execute and read and write
58DC000
heap
page read and write
4AAF000
stack
page read and write
9EE000
unkown
page execute and read and write
2D80000
direct allocation
page read and write
70476000
unkown
page readonly
4A71000
heap
page read and write
1042000
unkown
page execute and write copy
4C11000
heap
page read and write
58D3000
heap
page read and write
3F6E000
stack
page read and write
5C46000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
2D70000
heap
page read and write
497B000
stack
page read and write
5BDB000
trusted library allocation
page read and write
4931000
heap
page read and write
442F000
stack
page read and write
F94000
heap
page read and write
61E00000
direct allocation
page execute and read and write
12E5000
heap
page read and write
6D5000
unkown
page execute and write copy
5BAA000
trusted library allocation
page read and write
302F000
stack
page read and write
56D0000
remote allocation
page read and write
2AD0000
direct allocation
page read and write
42EF000
stack
page read and write
5C3D000
trusted library allocation
page read and write
C24000
heap
page read and write
3CEE000
stack
page read and write
41D1000
heap
page read and write
916000
unkown
page execute and write copy
492F000
stack
page read and write
115C000
heap
page read and write
51CF000
stack
page read and write
115F000
heap
page read and write
6AFE000
stack
page read and write
368F000
stack
page read and write
4931000
heap
page read and write
973000
unkown
page execute and read and write
41EE000
stack
page read and write
456F000
stack
page read and write
9B0000
unkown
page readonly
E97000
unkown
page execute and read and write
5D0000
direct allocation
page read and write
110F000
heap
page read and write
985000
unkown
page execute and write copy
4A71000
heap
page read and write
352F000
stack
page read and write
4931000
heap
page read and write
35EF000
stack
page read and write
1144000
heap
page read and write
F94000
heap
page read and write
2AD0000
direct allocation
page read and write
73C000
unkown
page execute and read and write
B991000
heap
page read and write
5247000
trusted library allocation
page read and write
47D0000
direct allocation
page execute and read and write
3B8F000
stack
page read and write
306F000
stack
page read and write
989000
unkown
page execute and read and write
2D80000
direct allocation
page read and write
1317000
heap
page read and write
9D6000
unkown
page execute and read and write
149F000
stack
page read and write
5BAA000
trusted library allocation
page read and write
58A5000
heap
page read and write
543D000
stack
page read and write
9B0000
unkown
page read and write
400000
heap
page read and write
452E000
stack
page read and write
32AF000
stack
page read and write
97C000
unkown
page execute and read and write
1133000
heap
page read and write
DEC000
stack
page read and write
97C000
unkown
page execute and read and write
37AF000
stack
page read and write
5D0000
direct allocation
page read and write
4931000
heap
page read and write
6CF8F000
unkown
page readonly
138E000
stack
page read and write
5C5B000
trusted library allocation
page read and write
1140000
heap
page read and write
5C75000
trusted library allocation
page read and write
918000
unkown
page execute and read and write
852000
unkown
page execute and write copy
58D3000
heap
page read and write
4FDD000
stack
page read and write
36CE000
stack
page read and write
2D80000
direct allocation
page read and write
9EC000
unkown
page execute and read and write
989000
unkown
page execute and read and write
F94000
heap
page read and write
7012D000
unkown
page readonly
B930000
trusted library allocation
page read and write
432E000
stack
page read and write
4C3E000
stack
page read and write
5C6A000
trusted library allocation
page read and write
965000
unkown
page execute and write copy
4BFE000
stack
page read and write
1144000
heap
page read and write
F94000
heap
page read and write
BC5C000
heap
page read and write
4BE1000
heap
page read and write
147B000
heap
page read and write
47EF000
stack
page read and write
58CF000
heap
page read and write
582C000
stack
page read and write
3E2F000
stack
page read and write
A1A000
unkown
page execute and write copy
4ED0000
direct allocation
page execute and read and write
5C9A000
trusted library allocation
page read and write
6C2000
unkown
page execute and read and write
1220000
heap
page read and write
92D000
unkown
page execute and write copy
32AF000
stack
page read and write
A06000
unkown
page execute and write copy
87D000
unkown
page execute and write copy
B950000
heap
page read and write
41D1000
heap
page read and write
5C40000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
46E1000
heap
page read and write
1060000
direct allocation
page execute and read and write
C24000
heap
page read and write
4BE1000
heap
page read and write
3F6E000
stack
page read and write
965000
unkown
page execute and write copy
5D0000
direct allocation
page read and write
787000
unkown
page execute and write copy
3CAF000
stack
page read and write
4EC0000
direct allocation
page execute and read and write
A1B000
unkown
page execute and write copy
1144000
heap
page read and write
362E000
stack
page read and write
6F0000
heap
page read and write
10E0000
heap
page read and write
7047D000
unkown
page read and write
37EF000
stack
page read and write
9F4000
unkown
page execute and write copy
4D3F000
stack
page read and write
42EE000
stack
page read and write
396E000
stack
page read and write
FDE000
stack
page read and write
5C41000
trusted library allocation
page read and write
991000
unkown
page execute and write copy
1317000
heap
page read and write
4931000
heap
page read and write
4930000
heap
page read and write
392E000
stack
page read and write
75BE000
heap
page read and write
9EE000
unkown
page execute and read and write
5C53000
trusted library allocation
page read and write
1460000
direct allocation
page read and write
5D0000
direct allocation
page read and write
8DB000
unkown
page execute and read and write
8A8000
unkown
page execute and write copy
1165000
heap
page read and write
5250000
direct allocation
page execute and read and write
41D1000
heap
page read and write
12FF000
heap
page read and write
2F0F000
stack
page read and write
55EE000
stack
page read and write
4EF0000
direct allocation
page read and write
5C46000
trusted library allocation
page read and write
1385000
heap
page read and write
33AE000
stack
page read and write
4931000
heap
page read and write
41D1000
heap
page read and write
4610000
trusted library allocation
page read and write
1144000
heap
page read and write
2AD0000
direct allocation
page read and write
41D1000
heap
page read and write
8CC000
unkown
page execute and read and write
4E8F000
stack
page read and write
C0B000
heap
page read and write
42EF000
stack
page read and write
6EF000
stack
page read and write
4A71000
heap
page read and write
4AFE000
stack
page read and write
5C67000
trusted library allocation
page read and write
37EE000
stack
page read and write
4931000
heap
page read and write
41AF000
stack
page read and write
1470000
heap
page read and write
55AF000
stack
page read and write
33EF000
stack
page read and write
8FB000
unkown
page execute and write copy
440000
unkown
page readonly
4ED0000
direct allocation
page execute and read and write
4931000
heap
page read and write
4F50000
direct allocation
page execute and read and write
C00000
heap
page read and write
4931000
heap
page read and write
5C28000
trusted library allocation
page read and write
4BF0000
heap
page read and write
41D1000
heap
page read and write
95D000
unkown
page execute and read and write
41D1000
heap
page read and write
2AE0000
heap
page read and write
342E000
stack
page read and write
41D1000
heap
page read and write
5B0000
heap
page read and write
39EE000
stack
page read and write
F00000
heap
page read and write
779000
unkown
page write copy
9AC000
unkown
page execute and write copy
F94000
heap
page read and write
8F3000
stack
page read and write
4AAE000
stack
page read and write
5CA9000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
50B0000
direct allocation
page execute and read and write
1020000
direct allocation
page read and write
C70000
heap
page read and write
4931000
heap
page read and write
4A71000
heap
page read and write
5CC000
stack
page read and write
8BF000
unkown
page execute and read and write
492000
unkown
page write copy
5C4B000
trusted library allocation
page read and write
F94000
heap
page read and write
75B0000
heap
page read and write
10B0000
heap
page read and write
4D9E000
stack
page read and write
B930000
trusted library allocation
page read and write
EA4000
unkown
page execute and read and write
2DAB000
heap
page read and write
38EF000
stack
page read and write
786000
unkown
page execute and read and write
4F00000
direct allocation
page execute and read and write
4BE1000
heap
page read and write
1144000
heap
page read and write
F60000
direct allocation
page read and write
10FA000
stack
page read and write
2D80000
direct allocation
page read and write
41AF000
stack
page read and write
462F000
stack
page read and write
851000
unkown
page execute and read and write
4BE1000
heap
page read and write
4824000
heap
page read and write
4C11000
heap
page read and write
322F000
stack
page read and write
51F0000
direct allocation
page execute and read and write
785000
unkown
page execute and write copy
99C000
unkown
page execute and write copy
9ED000
unkown
page execute and write copy
96A000
unkown
page execute and write copy
9AC000
unkown
page execute and write copy
F80000
heap
page read and write
4A71000
heap
page read and write
4BE1000
heap
page read and write
41D1000
heap
page read and write
4931000
heap
page read and write
710000
unkown
page read and write
C24000
heap
page read and write
4BD0000
direct allocation
page read and write
4EF0000
direct allocation
page read and write
49BE000
stack
page read and write
622000
unkown
page execute and read and write
A1B000
unkown
page execute and write copy
5C29000
trusted library allocation
page read and write
900000
unkown
page execute and write copy
F94000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
1141000
heap
page read and write
4A71000
heap
page read and write
5C37000
trusted library allocation
page read and write
5200000
direct allocation
page execute and read and write
5BB1000
trusted library allocation
page read and write
58CE000
heap
page read and write
92D000
unkown
page execute and write copy
12E1000
heap
page read and write
5200000
direct allocation
page execute and read and write
1460000
direct allocation
page read and write
5BF8000
trusted library allocation
page read and write
332E000
stack
page read and write
F94000
heap
page read and write
59C0000
trusted library allocation
page read and write
A02000
unkown
page execute and write copy
58B3000
heap
page read and write
318F000
stack
page read and write
95C000
unkown
page execute and write copy
3DEF000
stack
page read and write
32CF000
stack
page read and write
45EE000
stack
page read and write
4D70000
trusted library allocation
page read and write
4EF0000
direct allocation
page read and write
52A0000
direct allocation
page execute and read and write
3BAE000
stack
page read and write
EF0000
heap
page read and write
42AE000
stack
page read and write
456F000
stack
page read and write
2F6F000
stack
page read and write
5C4C000
trusted library allocation
page read and write
316F000
stack
page read and write
58C1000
heap
page read and write
C72000
heap
page read and write
5C43000
trusted library allocation
page read and write
2AD0000
direct allocation
page read and write
96F000
unkown
page execute and read and write
5C28000
trusted library allocation
page read and write
1169000
heap
page read and write
2AD0000
direct allocation
page read and write
1290000
heap
page read and write
4F80000
direct allocation
page execute and read and write
F94000
heap
page read and write
4A71000
heap
page read and write
2E6F000
stack
page read and write
4931000
heap
page read and write
5C28000
trusted library allocation
page read and write
2DAF000
stack
page read and write
583F000
stack
page read and write
A0C000
unkown
page execute and write copy
41D1000
heap
page read and write
4C10000
heap
page read and write
4931000
heap
page read and write
F94000
heap
page read and write
5C6D000
trusted library allocation
page read and write
2AD0000
direct allocation
page read and write
4A71000
heap
page read and write
1020000
direct allocation
page read and write
4A71000
heap
page read and write
1144000
heap
page read and write
4BE1000
heap
page read and write
422D000
stack
page read and write
1374000
heap
page read and write
50A0000
direct allocation
page execute and read and write
10FD000
stack
page read and write
5C37000
trusted library allocation
page read and write
48B1000
heap
page read and write
3AAE000
stack
page read and write
5090000
direct allocation
page execute and read and write
A0C000
unkown
page execute and write copy
573E000
stack
page read and write
51D0000
direct allocation
page execute and read and write
4A71000
heap
page read and write
1040000
direct allocation
page read and write
31CE000
stack
page read and write
45AE000
stack
page read and write
5210000
direct allocation
page execute and read and write
B996000
heap
page read and write
46EE000
stack
page read and write
73C000
unkown
page execute and write copy
E00000
direct allocation
page read and write
41D1000
heap
page read and write
47B0000
direct allocation
page execute and read and write
58B8000
heap
page read and write
58C1000
heap
page read and write
5C28000
trusted library allocation
page read and write
75C0000
heap
page read and write
432E000
stack
page read and write
BC4E000
heap
page read and write
402E000
stack
page read and write
43EE000
stack
page read and write
4C70000
direct allocation
page read and write
4BD0000
direct allocation
page read and write
6CFCE000
unkown
page read and write
129A000
heap
page read and write
148E000
stack
page read and write
47AE000
stack
page read and write
4820000
direct allocation
page execute and read and write
2F2E000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
432E000
stack
page read and write
5BBB000
trusted library allocation
page read and write
4931000
heap
page read and write
710000
unkown
page read and write
989000
unkown
page execute and read and write
3F2F000
stack
page read and write
8E1000
unkown
page execute and write copy
3CCF000
stack
page read and write
58B9000
heap
page read and write
5BD9000
trusted library allocation
page read and write
41D1000
heap
page read and write
4BE1000
heap
page read and write
4A71000
heap
page read and write
4931000
heap
page read and write
5BB000
heap
page read and write
1144000
heap
page read and write
2E67000
heap
page read and write
5C57000
trusted library allocation
page read and write
468C000
stack
page read and write
464C000
stack
page read and write
5D0000
direct allocation
page read and write
1140000
heap
page read and write
304F000
stack
page read and write
779000
unkown
page write copy
4A71000
heap
page read and write
47EF000
stack
page read and write
66DC000
stack
page read and write
4A71000
heap
page read and write
6CDF1000
unkown
page execute read
4BD0000
direct allocation
page read and write
58B3000
heap
page read and write
F94000
heap
page read and write
2C6E000
stack
page read and write
4BD0000
direct allocation
page read and write
77B000
unkown
page execute and write copy
58A7000
heap
page read and write
2BEF000
stack
page read and write
2AD0000
direct allocation
page read and write
4931000
heap
page read and write
2DEE000
stack
page read and write
1165000
heap
page read and write
4A71000
heap
page read and write
97A000
unkown
page execute and write copy
944000
unkown
page execute and write copy
2B8E000
stack
page read and write
5B95000
trusted library allocation
page read and write
8DB000
unkown
page execute and read and write
5290000
direct allocation
page execute and read and write
572E000
stack
page read and write
5C98000
trusted library allocation
page read and write
8FB000
unkown
page execute and write copy
4BE1000
heap
page read and write
4A71000
heap
page read and write
F60000
direct allocation
page read and write
6B15000
heap
page read and write
41D1000
heap
page read and write
58C1000
heap
page read and write
5A80000
heap
page read and write
EF6000
heap
page read and write
4931000
heap
page read and write
F94000
heap
page read and write
631E000
stack
page read and write
3CEE000
stack
page read and write
58C1000
heap
page read and write
918000
unkown
page execute and read and write
4931000
heap
page read and write
900000
unkown
page execute and write copy
342F000
stack
page read and write
494000
unkown
page execute and read and write
50A0000
heap
page read and write
911000
unkown
page execute and write copy
9D6000
unkown
page execute and read and write
41D1000
heap
page read and write
58C1000
heap
page read and write
99C000
unkown
page execute and write copy
354F000
stack
page read and write
58C1000
heap
page read and write
4BE1000
heap
page read and write
372F000
stack
page read and write
9AE000
unkown
page execute and read and write
95A000
unkown
page execute and read and write
5CA9000
trusted library allocation
page read and write
2D80000
direct allocation
page read and write
96B000
unkown
page execute and write copy
5C28000
trusted library allocation
page read and write
2DDE000
stack
page read and write
250F000
stack
page read and write
110D000
heap
page read and write
940000
unkown
page execute and read and write
5BDA000
trusted library allocation
page read and write
82D000
unkown
page execute and write copy
710000
unkown
page readonly
77B000
unkown
page execute and read and write
8F0000
unkown
page execute and read and write
32EE000
stack
page read and write
956000
unkown
page execute and write copy
F60000
direct allocation
page read and write
6B24000
heap
page read and write
37EE000
stack
page read and write
290E000
stack
page read and write
4A71000
heap
page read and write
58D3000
heap
page read and write
6C9000
unkown
page write copy
C24000
heap
page read and write
33EF000
stack
page read and write
F94000
heap
page read and write
F94000
heap
page read and write
32EE000
stack
page read and write
952000
unkown
page execute and write copy
5B9C000
trusted library allocation
page read and write
47D0000
direct allocation
page execute and read and write
41D1000
heap
page read and write
3E2E000
stack
page read and write
4931000
heap
page read and write
4F10000
direct allocation
page execute and read and write
973000
unkown
page execute and read and write
5BD9000
trusted library allocation
page read and write
4931000
heap
page read and write
5050000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
75C0000
heap
page read and write
4A71000
heap
page read and write
4F20000
direct allocation
page execute and read and write
F94000
heap
page read and write
A1A000
unkown
page execute and read and write
446E000
stack
page read and write
117C000
heap
page read and write
952000
unkown
page execute and write copy
1144000
heap
page read and write
4EEF000
stack
page read and write
97A000
unkown
page execute and write copy
2D80000
direct allocation
page read and write
4A70000
heap
page read and write
4A71000
heap
page read and write
5C39000
trusted library allocation
page read and write
4A71000
heap
page read and write
3A2F000
stack
page read and write
4CE0000
heap
page read and write
278F000
stack
page read and write
779000
unkown
page write copy
3A2F000
stack
page read and write
1144000
heap
page read and write
476F000
stack
page read and write
38AE000
stack
page read and write
A65000
unkown
page execute and read and write
C24000
heap
page read and write
5200000
direct allocation
page execute and read and write
1315000
heap
page read and write
32EE000
stack
page read and write
4F3C000
stack
page read and write
41F0000
heap
page read and write
F94000
heap
page read and write
41D1000
heap
page read and write
38EF000
stack
page read and write
58BD000
heap
page read and write
589B000
heap
page read and write
37CF000
stack
page read and write
907000
unkown
page execute and read and write
342E000
stack
page read and write
4850000
direct allocation
page execute and read and write
2AD0000
direct allocation
page read and write
E50000
heap
page read and write
41D1000
heap
page read and write
51E0000
direct allocation
page execute and read and write
2AD0000
direct allocation
page read and write
5C98000
trusted library allocation
page read and write
F94000
heap
page read and write
4931000
heap
page read and write
82B000
unkown
page execute and read and write
4942000
heap
page read and write
40AE000
stack
page read and write
50BB000
stack
page read and write
4931000
heap
page read and write
440000
unkown
page read and write
F94000
heap
page read and write
352F000
stack
page read and write
958000
unkown
page execute and write copy
3CEF000
stack
page read and write
4931000
heap
page read and write
268E000
stack
page read and write
1160000
heap
page read and write
5BA3000
trusted library allocation
page read and write
4EB0000
direct allocation
page execute and read and write
901000
unkown
page execute and read and write
911000
unkown
page execute and write copy
105E000
heap
page read and write
5B92000
trusted library allocation
page read and write
3BAF000
stack
page read and write
8FE000
unkown
page execute and read and write
8A4C000
stack
page read and write
344E000
stack
page read and write
41D1000
heap
page read and write
2FEE000
stack
page read and write
5270000
direct allocation
page execute and read and write
3A6E000
stack
page read and write
3CAF000
stack
page read and write
2F2E000
stack
page read and write
12D8000
heap
page read and write
1057000
heap
page read and write
BA30000
trusted library allocation
page read and write
5C39000
trusted library allocation
page read and write
861000
unkown
page execute and write copy
4931000
heap
page read and write
B9F9000
heap
page read and write
3E6E000
stack
page read and write
A0A000
unkown
page execute and read and write
5C61000
trusted library allocation
page read and write
4DE0000
direct allocation
page execute and read and write
4931000
heap
page read and write
46AF000
stack
page read and write
5C35000
trusted library allocation
page read and write
1150000
heap
page read and write
C7D000
heap
page read and write
1460000
direct allocation
page read and write
5C9D000
trusted library allocation
page read and write
5240000
direct allocation
page execute and read and write
99E000
unkown
page execute and read and write
2E0E000
stack
page read and write
4C11000
heap
page read and write
58C1000
heap
page read and write
58B3000
heap
page read and write
1020000
direct allocation
page read and write
58C1000
heap
page read and write
41D1000
heap
page read and write
4931000
heap
page read and write
5BC6000
trusted library allocation
page read and write
2DCE000
stack
page read and write
8D9000
unkown
page execute and read and write
DDB000
stack
page read and write
8DD000
unkown
page execute and write copy
58DC000
heap
page read and write
4840000
direct allocation
page execute and read and write
58CF000
heap
page read and write
58D2000
heap
page read and write
6AB3000
heap
page read and write
3F4F000
stack
page read and write
41D1000
heap
page read and write
2E5E000
stack
page read and write
1144000
heap
page read and write
41D1000
heap
page read and write
58DC000
heap
page read and write
A1A000
unkown
page execute and write copy
6ABB000
heap
page read and write
6CFD0000
unkown
page read and write
4931000
heap
page read and write
3DAE000
stack
page read and write
5C2B000
trusted library allocation
page read and write
2AD0000
direct allocation
page read and write
30EF000
stack
page read and write
5C66000
trusted library allocation
page read and write
46EE000
stack
page read and write
446E000
stack
page read and write
4BE0000
heap
page read and write
4BD0000
direct allocation
page read and write
4BD0000
direct allocation
page read and write
41D1000
heap
page read and write
5C3D000
trusted library allocation
page read and write
84C000
unkown
page execute and read and write
F94000
heap
page read and write
78A000
unkown
page write copy
4BE1000
heap
page read and write
8F8000
stack
page read and write
1144000
heap
page read and write
441000
unkown
page execute and read and write
72D000
unkown
page execute and read and write
772000
unkown
page execute and read and write
5B9C000
trusted library allocation
page read and write
39AF000
stack
page read and write
330E000
stack
page read and write
4931000
heap
page read and write
F6E000
stack
page read and write
5C51000
trusted library allocation
page read and write
41D1000
heap
page read and write
4931000
heap
page read and write
9AE000
unkown
page execute and read and write
4ED0000
direct allocation
page execute and read and write
4931000
heap
page read and write
58A9000
heap
page read and write
9EB000
unkown
page execute and write copy
C47000
heap
page read and write
2ACE000
stack
page read and write
D7F000
unkown
page execute and read and write
A1A000
unkown
page execute and write copy
659E000
stack
page read and write
641F000
stack
page read and write
4931000
heap
page read and write
1133000
heap
page read and write
926000
unkown
page execute and read and write
1041000
unkown
page execute and read and write
2AD0000
direct allocation
page read and write
A05000
unkown
page execute and read and write
915000
unkown
page execute and read and write
772000
unkown
page execute and read and write
B9A5000
heap
page read and write
58CE000
heap
page read and write
2CCE000
stack
page read and write
5C2B000
trusted library allocation
page read and write
41D1000
heap
page read and write
F60000
direct allocation
page read and write
356E000
stack
page read and write
BFA000
unkown
page write copy
700B0000
unkown
page readonly
2D2F000
stack
page read and write
58DC000
heap
page read and write
5BD3000
trusted library allocation
page read and write
F94000
heap
page read and write
492F000
stack
page read and write
3B6F000
stack
page read and write
50A4000
heap
page read and write
2D6E000
stack
page read and write
40EE000
stack
page read and write
4931000
heap
page read and write
4DF0000
direct allocation
page execute and read and write
2DCF000
stack
page read and write
8A69000
heap
page read and write
2D80000
direct allocation
page read and write
3F6F000
stack
page read and write
40CE000
stack
page read and write
4931000
heap
page read and write
408F000
stack
page read and write
58A7000
heap
page read and write
1020000
direct allocation
page read and write
5C28000
trusted library allocation
page read and write
8DE000
unkown
page execute and read and write
12F3000
heap
page read and write
B17000
unkown
page execute and read and write
58BD000
heap
page read and write
AAC000
stack
page read and write
58D9000
heap
page read and write
12A0000
heap
page read and write
41D1000
heap
page read and write
2B6E000
stack
page read and write
4931000
heap
page read and write
41EF000
stack
page read and write
30EF000
stack
page read and write
148A000
heap
page read and write
2DA0000
heap
page read and write
442F000
stack
page read and write
2AD0000
direct allocation
page read and write
41D1000
heap
page read and write
5D0000
direct allocation
page read and write
5D0000
direct allocation
page read and write
F94000
heap
page read and write
6CFCF000
unkown
page write copy
48B0000
heap
page read and write
711000
unkown
page execute and write copy
1144000
heap
page read and write
5C2C000
trusted library allocation
page read and write
48F0000
trusted library allocation
page read and write
390F000
stack
page read and write
1020000
direct allocation
page read and write
6CB000
unkown
page execute and write copy
A7C000
unkown
page execute and read and write
5D0000
direct allocation
page read and write
5C67000
trusted library allocation
page read and write
7013E000
unkown
page read and write
336F000
stack
page read and write
5B97000
trusted library allocation
page read and write
B9A8000
heap
page read and write
5BAB000
trusted library allocation
page read and write
41D1000
heap
page read and write
12AE000
heap
page read and write
4931000
heap
page read and write
31AE000
stack
page read and write
4BE1000
heap
page read and write
61ECC000
direct allocation
page read and write
4BD0000
direct allocation
page read and write
4931000
heap
page read and write
1144000
heap
page read and write
482E000
stack
page read and write
B9F1000
heap
page read and write
911000
unkown
page execute and write copy
2EAE000
stack
page read and write
4BE1000
heap
page read and write
56CC000
stack
page read and write
503F000
stack
page read and write
58AB000
heap
page read and write
4F50000
direct allocation
page execute and read and write
8DF000
unkown
page execute and write copy
5BDD000
trusted library allocation
page read and write
5B99000
trusted library allocation
page read and write
5C39000
trusted library allocation
page read and write
4A71000
heap
page read and write
298E000
stack
page read and write
416E000
stack
page read and write
41D1000
heap
page read and write
4931000
heap
page read and write
41D1000
heap
page read and write
10EF000
heap
page read and write
1144000
heap
page read and write
32EF000
stack
page read and write
4ACC000
heap
page read and write
58B7000
heap
page read and write
8FC000
unkown
page execute and read and write
F60000
direct allocation
page read and write
4931000
heap
page read and write
4BE1000
heap
page read and write
5050000
direct allocation
page execute and read and write
2D80000
direct allocation
page read and write
4A71000
heap
page read and write
840000
unkown
page execute and read and write
3BAE000
stack
page read and write
496F000
stack
page read and write
51BF000
stack
page read and write
45AE000
stack
page read and write
991000
unkown
page execute and write copy
482F000
stack
page read and write
5080000
direct allocation
page read and write
84B000
unkown
page execute and write copy
2D80000
direct allocation
page read and write
412F000
stack
page read and write
41D1000
heap
page read and write
4BE1000
heap
page read and write
4810000
direct allocation
page execute and read and write
2A4E000
stack
page read and write
1166000
heap
page read and write
12E6000
heap
page read and write
5C51000
trusted library allocation
page read and write
4BE1000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
5080000
direct allocation
page execute and read and write
1158000
heap
page read and write
4BE1000
heap
page read and write
240F000
stack
page read and write
5BA8000
trusted library allocation
page read and write
109E000
heap
page read and write
5C3C000
trusted library allocation
page read and write
4931000
heap
page read and write
1150000
heap
page read and write
376E000
stack
page read and write
47F1000
heap
page read and write
2DAE000
heap
page read and write
5E5000
heap
page read and write
4931000
heap
page read and write
BA9E000
stack
page read and write
5210000
direct allocation
page execute and read and write
34AF000
stack
page read and write
41D1000
heap
page read and write
1278C000
stack
page read and write
BBB0000
trusted library allocation
page read and write
2F4E000
stack
page read and write
786000
unkown
page execute and read and write
58B7000
heap
page read and write
4931000
heap
page read and write
2CAE000
stack
page read and write
3A6E000
stack
page read and write
5B99000
trusted library allocation
page read and write
492000
unkown
page write copy
4A71000
heap
page read and write
4931000
heap
page read and write
54AE000
stack
page read and write
5BD8000
trusted library allocation
page read and write
10DC000
heap
page read and write
2D80000
direct allocation
page read and write
58C1000
heap
page read and write
5BF8000
trusted library allocation
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
916000
unkown
page execute and write copy
7420000
heap
page read and write
5BA5000
trusted library allocation
page read and write
51BF000
stack
page read and write
95D000
unkown
page execute and read and write
41D4000
heap
page read and write
5CC9000
trusted library allocation
page read and write
496E000
stack
page read and write
70142000
unkown
page readonly
5C3C000
trusted library allocation
page read and write
597E000
stack
page read and write
41D1000
heap
page read and write
1158000
heap
page read and write
6CFD5000
unkown
page readonly
1165000
heap
page read and write
1020000
direct allocation
page read and write
2B4F000
stack
page read and write
5CC7000
trusted library allocation
page read and write
C24000
heap
page read and write
4F30000
direct allocation
page execute and read and write
392E000
stack
page read and write
67DC000
stack
page read and write
59E000
stack
page read and write
BFC000
unkown
page execute and read and write
9F4000
unkown
page execute and write copy
61ED3000
direct allocation
page read and write
8D5000
unkown
page execute and write copy
12E2000
heap
page read and write
660000
unkown
page read and write
9D6000
unkown
page execute and read and write
779000
unkown
page write copy
316F000
stack
page read and write
1144000
heap
page read and write
A0A000
unkown
page execute and read and write
41D1000
heap
page read and write
772000
unkown
page execute and write copy
5C50000
trusted library allocation
page read and write
1460000
direct allocation
page read and write
4E00000
direct allocation
page execute and read and write
41D1000
heap
page read and write
4A90000
heap
page read and write
868000
unkown
page execute and read and write
2EEF000
stack
page read and write
3C2F000
stack
page read and write
5C3C000
trusted library allocation
page read and write
264F000
stack
page read and write
4931000
heap
page read and write
1230000
heap
page read and write
5D0000
direct allocation
page read and write
4D70000
heap
page read and write
472E000
stack
page read and write
306E000
stack
page read and write
93C000
unkown
page execute and read and write
3FAE000
stack
page read and write
4931000
heap
page read and write
10BE000
heap
page read and write
5B9C000
trusted library allocation
page read and write
106F000
stack
page read and write
47F1000
heap
page read and write
8DD000
unkown
page execute and write copy
10EB000
heap
page read and write
59CC000
heap
page read and write
B9EA000
heap
page read and write
1144000
heap
page read and write
5CAF000
trusted library allocation
page read and write
5B99000
trusted library allocation
page read and write
F60000
direct allocation
page read and write
5220000
direct allocation
page execute and read and write
4BE1000
heap
page read and write
2D80000
direct allocation
page read and write
40AF000
stack
page read and write
4BB0000
heap
page read and write
6FC000
unkown
page execute and read and write
4D8E000
stack
page read and write
8F0000
unkown
page execute and read and write
56D0000
remote allocation
page read and write
406F000
stack
page read and write
1080000
direct allocation
page execute and read and write
4931000
heap
page read and write
890000
unkown
page execute and read and write
58B8000
heap
page read and write
E8D000
unkown
page execute and read and write
4A71000
heap
page read and write
356E000
stack
page read and write
61E01000
direct allocation
page execute read
36AE000
stack
page read and write
4A71000
heap
page read and write
F60000
direct allocation
page read and write
5C46000
trusted library allocation
page read and write
A06000
unkown
page execute and write copy
3F2F000
stack
page read and write
382E000
stack
page read and write
8DD000
unkown
page execute and write copy
41D1000
heap
page read and write
3A6F000
stack
page read and write
4F60000
direct allocation
page execute and read and write
41D1000
heap
page read and write
302F000
stack
page read and write
BE8000
unkown
page execute and read and write
3FEF000
stack
page read and write
392E000
stack
page read and write
5C66000
trusted library allocation
page read and write
1144000
heap
page read and write
C24000
heap
page read and write
5C57000
trusted library allocation
page read and write
4A71000
heap
page read and write
41D1000
heap
page read and write
1144000
heap
page read and write
710000
unkown
page readonly
136A000
heap
page read and write
41D1000
heap
page read and write
5BA3000
trusted library allocation
page read and write
478F000
stack
page read and write
5BCC000
trusted library allocation
page read and write
432F000
stack
page read and write
F94000
heap
page read and write
41D1000
heap
page read and write
5C3C000
trusted library allocation
page read and write
B9AE000
heap
page read and write
4A71000
heap
page read and write
2C8F000
stack
page read and write
A1B000
unkown
page execute and write copy
1235000
heap
page read and write
61EB7000
direct allocation
page readonly
12810000
heap
page read and write
1165000
heap
page read and write
4F40000
direct allocation
page execute and read and write
356F000
stack
page read and write
F94000
heap
page read and write
77B000
unkown
page execute and read and write
46EE000
stack
page read and write
58B8000
heap
page read and write
2D80000
direct allocation
page read and write
540000
unkown
page readonly
5BC1000
trusted library allocation
page read and write
41D1000
heap
page read and write
41D1000
heap
page read and write
9B1000
unkown
page execute and write copy
5D0000
direct allocation
page read and write
3EAF000
stack
page read and write
681E000
stack
page read and write
BC56000
heap
page read and write
1144000
heap
page read and write
31EF000
stack
page read and write
4ABF000
stack
page read and write
850000
unkown
page execute and write copy
6CB000
unkown
page execute and read and write
540000
heap
page read and write
1167000
heap
page read and write
4A71000
heap
page read and write
52DE000
stack
page read and write
3D6F000
stack
page read and write
865000
unkown
page execute and read and write
41D1000
heap
page read and write
4A71000
heap
page read and write
73C000
unkown
page execute and write copy
1133000
heap
page read and write
F94000
heap
page read and write
3E2E000
stack
page read and write
2D4E000
stack
page read and write
3F6E000
stack
page read and write
392E000
stack
page read and write
970000
unkown
page execute and write copy
970000
unkown
page execute and write copy
1144000
heap
page read and write
56D0000
remote allocation
page read and write
B992000
heap
page read and write
51FE000
stack
page read and write
1144000
heap
page read and write
4931000
heap
page read and write
40AE000
stack
page read and write
5B91000
trusted library allocation
page read and write
41E0000
heap
page read and write
47E0000
direct allocation
page execute and read and write
1169000
heap
page read and write
41D1000
heap
page read and write
A0A000
unkown
page execute and read and write
786000
unkown
page execute and read and write
F60000
direct allocation
page read and write
40AE000
stack
page read and write
1020000
direct allocation
page read and write
12FA000
heap
page read and write
4931000
heap
page read and write
492000
unkown
page write copy
12921000
heap
page read and write
9C000
stack
page read and write
41D1000
heap
page read and write
5C61000
trusted library allocation
page read and write
4A71000
heap
page read and write
1144000
heap
page read and write
456F000
stack
page read and write
4BD0000
direct allocation
page read and write
1144000
heap
page read and write
F94000
heap
page read and write
1144000
heap
page read and write
47F1000
heap
page read and write
5C29000
trusted library allocation
page read and write
1460000
direct allocation
page read and write
4EF0000
direct allocation
page execute and read and write
41D1000
heap
page read and write
93E000
unkown
page execute and read and write
5230000
direct allocation
page execute and read and write
2D80000
direct allocation
page read and write
446E000
stack
page read and write
4C11000
heap
page read and write
5440000
heap
page read and write
5B9C000
trusted library allocation
page read and write
346E000
stack
page read and write
5090000
direct allocation
page read and write
8B5000
unkown
page execute and write copy
501E000
stack
page read and write
B971000
heap
page read and write
47F0000
direct allocation
page execute and read and write
6C9000
unkown
page write copy
4EF0000
direct allocation
page execute and read and write
5BF4000
trusted library allocation
page read and write
97A000
unkown
page execute and write copy
58DC000
heap
page read and write
308E000
stack
page read and write
5C37000
trusted library allocation
page read and write
B9D1000
heap
page read and write
5C70000
trusted library allocation
page read and write
787000
unkown
page execute and write copy
41D1000
heap
page read and write
99C000
unkown
page execute and write copy
380D000
stack
page read and write
8E4000
unkown
page execute and read and write
772000
unkown
page execute and write copy
1460000
direct allocation
page read and write
4A71000
heap
page read and write
533C000
stack
page read and write
43AF000
stack
page read and write
4931000
heap
page read and write
12E6000
heap
page read and write
442F000
stack
page read and write
4BE1000
heap
page read and write
46AF000
stack
page read and write
41CF000
stack
page read and write
41D1000
heap
page read and write
28CF000
stack
page read and write
661000
unkown
page execute and write copy
14DE000
stack
page read and write
61ED4000
direct allocation
page readonly
9EC000
unkown
page execute and read and write
F94000
heap
page read and write
1144000
heap
page read and write
41D1000
heap
page read and write
4A71000
heap
page read and write
1020000
direct allocation
page read and write
2D8E000
stack
page read and write
5200000
direct allocation
page execute and read and write
8AD000
unkown
page execute and read and write
5BA5000
trusted library allocation
page read and write
51E0000
direct allocation
page execute and read and write
3DEF000
stack
page read and write
41D1000
heap
page read and write
907000
unkown
page execute and read and write
1460000
direct allocation
page read and write
5D0000
direct allocation
page read and write
41D1000
heap
page read and write
5C39000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
5D0000
direct allocation
page read and write
930000
heap
page read and write
41D1000
heap
page read and write
5200000
direct allocation
page execute and read and write
1291D000
stack
page read and write
4F20000
direct allocation
page execute and read and write
1460000
direct allocation
page read and write
1144000
heap
page read and write
1040000
direct allocation
page read and write
124E000
stack
page read and write
406F000
stack
page read and write
128E000
stack
page read and write
58C1000
heap
page read and write
B930000
heap
page read and write
9EB000
unkown
page execute and write copy
5060000
direct allocation
page execute and read and write
A34000
unkown
page execute and read and write
41AF000
stack
page read and write
F60000
direct allocation
page read and write
4A71000
heap
page read and write
138A000
heap
page read and write
41D1000
heap
page read and write
5B9A000
trusted library allocation
page read and write
96A000
unkown
page execute and read and write
31AE000
stack
page read and write
660000
unkown
page readonly
A0C000
unkown
page execute and write copy
254C000
stack
page read and write
4931000
heap
page read and write
4F00000
direct allocation
page execute and read and write
4A71000
heap
page read and write
7429000
heap
page read and write
128E000
stack
page read and write
940000
heap
page read and write
58BB000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
3A8E000
stack
page read and write
B9B1000
heap
page read and write
5C2B000
trusted library allocation
page read and write
4A71000
heap
page read and write
4931000
heap
page read and write
340F000
stack
page read and write
785000
unkown
page execute and write copy
1152000
heap
page read and write
4D50000
direct allocation
page read and write
4A71000
heap
page read and write
440000
unkown
page readonly
8A50000
heap
page read and write
5C47000
trusted library allocation
page read and write
1020000
direct allocation
page read and write
5BE7000
trusted library allocation
page read and write
4931000
heap
page read and write
41D1000
heap
page read and write
3B6F000
stack
page read and write
5C61000
trusted library allocation
page read and write
4A71000
heap
page read and write
970000
unkown
page execute and write copy
4C11000
heap
page read and write
B994000
heap
page read and write
655F000
stack
page read and write
45AF000
stack
page read and write
8EC000
unkown
page execute and write copy
857000
unkown
page execute and read and write
EA4000
unkown
page execute and write copy
4931000
heap
page read and write
2D80000
direct allocation
page read and write
58C1000
heap
page read and write
58B6000
heap
page read and write
511C000
stack
page read and write
1368000
heap
page read and write
482E000
stack
page read and write
36AF000
stack
page read and write
481000
unkown
page execute and read and write
C24000
heap
page read and write
4BE1000
heap
page read and write
6D6000
unkown
page execute and read and write
5CC9000
trusted library allocation
page read and write
41D1000
heap
page read and write
F94000
heap
page read and write
58CE000
heap
page read and write
2A8F000
stack
page read and write
4931000
heap
page read and write
41D1000
heap
page read and write
900000
unkown
page execute and write copy
5C56000
trusted library allocation
page read and write
486E000
stack
page read and write
4EA0000
direct allocation
page execute and read and write
492F000
stack
page read and write
496E000
stack
page read and write
2EEF000
stack
page read and write
58A5000
heap
page read and write
48AF000
stack
page read and write
97C000
unkown
page execute and read and write
4931000
heap
page read and write
51DE000
stack
page read and write
5230000
direct allocation
page execute and read and write
41D1000
heap
page read and write
56BF000
stack
page read and write
3F8E000
stack
page read and write
4A71000
heap
page read and write
5C75000
trusted library allocation
page read and write
4A80000
heap
page read and write
5BFA000
trusted library allocation
page read and write
BFA000
unkown
page read and write
5220000
direct allocation
page execute and read and write
4931000
heap
page read and write
779000
unkown
page write copy
4931000
heap
page read and write
58C4000
heap
page read and write
8FC000
unkown
page execute and read and write
4A71000
heap
page read and write
4BD0000
direct allocation
page read and write
34EE000
stack
page read and write
48C1000
heap
page read and write
4A71000
heap
page read and write
3D2E000
stack
page read and write
1310000
heap
page read and write
4A71000
heap
page read and write
27CE000
stack
page read and write
62D0000
heap
page read and write
F60000
direct allocation
page read and write
1144000
heap
page read and write
5BDB000
trusted library allocation
page read and write
58CE000
heap
page read and write
3E2E000
stack
page read and write
50CE000
stack
page read and write
41D1000
heap
page read and write
A34000
unkown
page execute and write copy
F94000
heap
page read and write
A02000
unkown
page execute and write copy
4F10000
direct allocation
page execute and read and write
4CE0000
trusted library allocation
page read and write
5E0000
heap
page read and write
8EE000
unkown
page execute and read and write
59EE000
stack
page read and write
48B2000
heap
page read and write
41D1000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
92D000
unkown
page execute and write copy
5D0000
direct allocation
page read and write
4EF0000
direct allocation
page execute and read and write
1141000
heap
page read and write
58B9000
heap
page read and write
F94000
heap
page read and write
E00000
direct allocation
page read and write
3CEE000
stack
page read and write
8C0000
unkown
page execute and write copy
907000
unkown
page execute and read and write
2DE7000
heap
page read and write
4860000
direct allocation
page execute and read and write
4F40000
direct allocation
page execute and read and write
51F0000
direct allocation
page execute and read and write
426F000
stack
page read and write
44EF000
stack
page read and write
940000
unkown
page execute and read and write
5C5E000
trusted library allocation
page read and write
4931000
heap
page read and write
BA17000
heap
page read and write
533E000
stack
page read and write
F90000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
5BA5000
trusted library allocation
page read and write
58DC000
heap
page read and write
4931000
heap
page read and write
58C1000
heap
page read and write
4F70000
direct allocation
page execute and read and write
4931000
heap
page read and write
41D1000
heap
page read and write
5080000
direct allocation
page read and write
4A71000
heap
page read and write
1460000
direct allocation
page read and write
EA5000
unkown
page execute and write copy
3A4F000
stack
page read and write
E10000
heap
page read and write
441000
unkown
page execute and write copy
115F000
heap
page read and write
366F000
stack
page read and write
5260000
direct allocation
page execute and read and write
5C0000
heap
page read and write
58C1000
heap
page read and write
394E000
stack
page read and write
5BD000
heap
page read and write
A02000
unkown
page execute and write copy
33EF000
stack
page read and write
F94000
heap
page read and write
9ED000
unkown
page execute and write copy
5200000
direct allocation
page execute and read and write
587E000
stack
page read and write
F94000
heap
page read and write
93B000
unkown
page execute and write copy
4650000
direct allocation
page read and write
785000
unkown
page execute and write copy
4A71000
heap
page read and write
5C29000
trusted library allocation
page read and write
4A6F000
stack
page read and write
557F000
stack
page read and write
41D1000
heap
page read and write
5BBB000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
4941000
heap
page read and write
41D1000
heap
page read and write
4BE1000
heap
page read and write
5D0000
direct allocation
page read and write
47D0000
direct allocation
page execute and read and write
5C39000
trusted library allocation
page read and write
BEA000
stack
page read and write
96F000
unkown
page execute and read and write
4AEE000
stack
page read and write
4931000
heap
page read and write
2DA7000
heap
page read and write
4931000
heap
page read and write
541000
unkown
page execute and write copy
77B000
unkown
page execute and read and write
F94000
heap
page read and write
8A6A000
heap
page read and write
41D1000
heap
page read and write
95D000
unkown
page execute and read and write
4E00000
direct allocation
page execute and read and write
1020000
direct allocation
page read and write
2EEF000
stack
page read and write
1090000
heap
page read and write
4C11000
heap
page read and write
4A71000
heap
page read and write
4931000
heap
page read and write
5210000
direct allocation
page execute and read and write
5BC4000
trusted library allocation
page read and write
58DC000
heap
page read and write
901000
unkown
page execute and read and write
58D1000
heap
page read and write
58B8000
heap
page read and write
70460000
unkown
page readonly
37EE000
stack
page read and write
31AE000
stack
page read and write
866000
unkown
page execute and write copy
6AAC000
stack
page read and write
5892000
heap
page read and write
12E3000
heap
page read and write
AEB000
stack
page read and write
A02000
unkown
page execute and write copy
8C3000
unkown
page execute and read and write
4931000
heap
page read and write
F60000
direct allocation
page read and write
4BE1000
heap
page read and write
36AE000
stack
page read and write
5CC1000
trusted library allocation
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
A06000
unkown
page execute and write copy
47A0000
direct allocation
page execute and read and write
506D000
stack
page read and write
58B8000
heap
page read and write
C24000
heap
page read and write
47D0000
direct allocation
page execute and read and write
4BE1000
heap
page read and write
4C70000
direct allocation
page read and write
41D1000
heap
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
49AE000
stack
page read and write
1144000
heap
page read and write
366F000
stack
page read and write
5C39000
trusted library allocation
page read and write
There are 1730 hidden memdumps, click here to show them.