IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[2].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\random[2].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\ziNGMDa[1].exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1013433001\ziNGMDa.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1013443001\eb02f9ad86.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1013444001\0eb65aaf2f.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1013445001\8b4f365c71.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1013446001\20bbca6d77.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\SDL2.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\SDL2_ttf.dll
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\_asyncio.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\_multiprocessing.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\_overlapped.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\_uuid.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\libFLAC-8.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\libcrypto-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\libfreetype-6.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\libmodplug-1.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\libmpg123-0.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\libopus-0.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\libopusfile-0.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\libssl-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\portmidi.dll
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pyexpat.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\_freetype.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\base.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\bufferproxy.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\color.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\constants.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\display.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\draw.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\event.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\font.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\image.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\imageext.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\joystick.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\key.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\mask.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\math.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\mixer.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\mixer_music.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\mouse.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\pixelarray.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\pixelcopy.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\rect.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\rwobject.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\scrap.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\surface.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\surflock.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\time.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\transform.cp310-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\python310.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI79282\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Documents\FHCGCAAKJD.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BGCBGCAFIIECBFIDHIJK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\EBGDHJEC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\FCFIJEBFCGDAAKFHIDBFIDBKFH
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HCFIIIJJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HDGIEBGHDAEBGDGCFIID
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\HJDGHIJDGCBAAAAAFIJDAECGHC
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\IJKKKFCFHCFIECBGDHID
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\01c3d52c-db39-4660-ac7f-b24576c9ad13.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\1b5b74b3-c9da-4359-b9b7-f97fea2e6643.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\370fea41-13ab-41d9-92ed-48d5f8e3f355.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\57ef47fb-3258-47a0-a315-6361f4525269.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-6756FEBA-1F60.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF376b8.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF376c7.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF38156.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF38166.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\e4686c87-eef5-4aa4-9c4c-1498e2e179ff.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\add[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\download[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\download[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\download[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\key[1].htm
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\fuckingdllENCR[1].dll
data
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\SDL2_image.dll
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\SDL2_mixer.dll
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\altgraph-0.17.2.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\altgraph-0.17.2.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\altgraph-0.17.2.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\altgraph-0.17.2.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\altgraph-0.17.2.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\altgraph-0.17.2.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\altgraph-0.17.2.dist-info\zip-safe
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\libffi-7.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\libjpeg-9.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\libogg-0.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\libpng16-16.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\libtiff-5.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\libvorbis-0.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\libvorbisfile-3.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\libwebp-7.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\freesansbold.ttf
TrueType Font data, 13 tables, 1st "GSUB", 34 names, Macintosh, Copyright 2002 Free Software Foundation.
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\pygame\pygame_icon.bmp
PC bitmap, Windows 3.x format, 32 x 32 x 4, image size 512, cbSize 630, bits offset 118
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\pyinstaller-4.9.dist-info\COPYING.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\pyinstaller-4.9.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\pyinstaller-4.9.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\pyinstaller-4.9.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\pyinstaller-4.9.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\pyinstaller-4.9.dist-info\entry_points.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\pyinstaller-4.9.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI79282\zlib1.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 9 13:29:06 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 9 13:29:06 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 9 13:29:06 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 9 13:29:06 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 9 13:29:06 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
Chrome Cache Entry: 203
ASCII text, with very long lines (3367)
downloaded
Chrome Cache Entry: 204
ASCII text
downloaded
Chrome Cache Entry: 205
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 206
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 207
ASCII text, with very long lines (2412)
downloaded
Chrome Cache Entry: 208
SVG Scalable Vector Graphics image
downloaded
There are 142 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 --field-trial-handle=1984,i,16614534286300256734,1037011460224527743,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2260 --field-trial-handle=2156,i,937543281221703452,12637460150167344842,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1992,i,295519456222836343,140382832148699311,262144 /prefetch:3
malicious
C:\Users\user\Documents\FHCGCAAKJD.exe
"C:\Users\user\Documents\FHCGCAAKJD.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1013433001\ziNGMDa.exe
"C:\Users\user\AppData\Local\Temp\1013433001\ziNGMDa.exe"
malicious
C:\Users\user\AppData\Local\Temp\1013433001\ziNGMDa.exe
"C:\Users\user\AppData\Local\Temp\1013433001\ziNGMDa.exe"
malicious
C:\Users\user\AppData\Local\Temp\1013443001\eb02f9ad86.exe
"C:\Users\user\AppData\Local\Temp\1013443001\eb02f9ad86.exe"
malicious
C:\Users\user\AppData\Local\Temp\1013444001\0eb65aaf2f.exe
"C:\Users\user\AppData\Local\Temp\1013444001\0eb65aaf2f.exe"
malicious
C:\Users\user\AppData\Local\Temp\1013445001\8b4f365c71.exe
"C:\Users\user\AppData\Local\Temp\1013445001\8b4f365c71.exe"
malicious
C:\Users\user\AppData\Local\Temp\1013446001\20bbca6d77.exe
"C:\Users\user\AppData\Local\Temp\1013446001\20bbca6d77.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\Documents\FHCGCAAKJD.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.206/68b591d6548ec281/softokn3.dll
185.215.113.206
http://80.82.65.70/files/download0/files/downloadMicrosoft
unknown
http://80.82.65.70/files/downloadOu
unknown
https://duckduckgo.com/chrome_newtab
unknown
dare-curbys.biz
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
https://atten-supporse.biz/apiEd7sSF1Bg=
unknown
http://185.215.113.206/68b591d6548ec281/msvcp140.dllfI
unknown
http://80.82.65.70/files/download6
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
http://185.215.113.206c4becf79229cb002.php
unknown
https://python.org/dev/peps/pep-0263/
unknown
http://185.215.113.206/?:
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
https://pyinstaller.readthedocs.io/en/v4.9/CHANGES.html
unknown
http://185.215.113.16/luma/random.exeuW
unknown
https://pyinstaller.readthedocs.io/en/v4.9
unknown
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
http://stackoverflow.com/questions/267399/how-do-you-match-only-valid-roman-numerals-with-a-regular-
unknown
https://github.com/pypa/packaging
unknown
http://185.215.113.206/68b591d6548ec281/freebl3.dll
185.215.113.206
formy-spill.biz
http://185.215.113.206/68b591d6548ec281/nss3.dll
185.215.113.206
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
172.217.21.36
http://80.82.65.70/files/download7tG
unknown
http://185.215.113.206/68b591d6548ec281/msvcp140.dllUI))
unknown
http://80.82.65.70/files/downloadE
unknown
http://pypi.python.org/pypi/altgraph
unknown
185.215.113.206/c4becf79229cb002.php
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
unknown
http://185.215.113.16/well/random.exe.T
unknown
http://185.215.113.16/well/random.exe
unknown
http://185.215.113.206m
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
http://80.82.65.70/dll/downloadwsock.dll.mui
unknown
http://185.215.113.206/Local
unknown
https://altgraph.readthedocs.io
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://atten-supporse.biz/api
172.67.165.166
http://185.215.113.206/c4becf79229cb002.php/
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
http://185.215.113.206/c4becf79229cb002.php1
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://185.215.113.206/c4becf79229cb002.php8
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
unknown
http://80.82.65.70/files/download
80.82.65.70
http://185.215.113.206/c4becf79229cb002.php:
unknown
https://setuptools.readthedocs.io/en/latest/pkg_resources.html#basic-resource-access
unknown
http://github.com/ActiveState/appdirs
unknown
https://github.com/ronaldoussoren/altgraph/workflows/Lint/badge.svg
unknown
https://wiki.debian.org/XDGBaseDirectorySpecification#state
unknown
http://31.41.244.11/files/7993434781/ziNGMDa.exe
unknown
http://80.82.65.70/dll/downloadZ
unknown
http://www.zlib.net/D
unknown
https://github.com/ronaldoussoren/altgraph/workflows/Test/badge.svg
unknown
http://185.215.113.16/luma/random.exeJW
unknown
http://80.82.65.70/add?substr=mixtwo&s=three&sub=emp
80.82.65.70
http://crl3.digiV
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
atten-supporse.biz
https://atten-supporse.biz/apiUv
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://atten-supporse.biz/
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
unknown
print-vexer.biz
https://pyinstaller.readthedocs.io/en/v4.9/
unknown
http://31.41.244.11/files/unique2/random.exe
unknown
http://www.gnu.org/copyleft/gpl.html
unknown
https://gnu.org/licenses/gpl-2.0.html
unknown
http://80.82.65.70/files/downloadlr
unknown
https://github.com/ronaldoussoren/altgraph
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dll
185.215.113.206
https://github.com/naufraghi/tinyaes-py
unknown
impend-differ.biz
http://80.82.65.70/files/downloadstem32
unknown
https://www.python.org/download/releases/2.3/mro/.
unknown
http://185.215.113.16/well/random.exen
unknown
https://github.com/pyinstaller/pyinstaller
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://github.com/ronaldoussoren/altgraph/issues
unknown
http://185.215.113.16/mine/random.exe
185.215.113.16
http://185.215.113.206/V:y)
unknown
http://185.215.113.206/6gG
unknown
http://packages.python.org/altgraph
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dllLJ
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dll
185.215.113.206
http://80.82.65.70/files/downloadlZ
unknown
http://crl3.digi
unknown
dwell-exclaim.biz
http://185.215.113.206/c4becf79229cb002.phpx
unknown
http://185.215.113.206/c4becf79229cb002.php8rD
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://www.gnu.org/copyleft/gpl.htmlThe
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
atten-supporse.biz
172.67.165.166
plus.l.google.com
172.217.17.46
www.google.com
172.217.21.36
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
185.215.113.16
unknown
Portugal
malicious
192.168.2.5
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
80.82.65.70
unknown
Netherlands
172.67.165.166
atten-supporse.biz
United States
239.255.255.250
unknown
Reserved
172.217.21.36
www.google.com
United States
127.0.0.1
unknown
unknown
31.41.244.11
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
0eb65aaf2f.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
8b4f365c71.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
71000
unkown
page execute and read and write
malicious
4CB0000
direct allocation
page read and write
malicious
71000
unkown
page execute and read and write
malicious
D7E000
heap
page read and write
malicious
71000
unkown
page execute and read and write
malicious
2F1000
unkown
page execute and read and write
malicious
113E000
heap
page read and write
malicious
241000
unkown
page execute and read and write
malicious
301000
unkown
page execute and read and write
malicious
4F00000
direct allocation
page read and write
malicious
4200000
heap
page read and write
3CFF000
stack
page read and write
1C7FDB23000
heap
page read and write
4C60000
direct allocation
page execute and read and write
5649000
trusted library allocation
page read and write
4531000
heap
page read and write
890000
heap
page read and write
4531000
heap
page read and write
441000
unkown
page execute and write copy
2AAF000
stack
page read and write
51CF000
stack
page read and write
FD4000
heap
page read and write
1C7FDB22000
heap
page read and write
2CCC000
stack
page read and write
1F69CBFA000
heap
page read and write
1C7FFA38000
direct allocation
page read and write
520E000
stack
page read and write
4821000
heap
page read and write
1C7FF642000
heap
page read and write
1120000
heap
page read and write
2AB000
unkown
page execute and write copy
316E000
stack
page read and write
1284000
heap
page read and write
46F1000
heap
page read and write
55AE000
stack
page read and write
55C9000
trusted library allocation
page read and write
C64000
heap
page read and write
1C7FD3DA000
heap
page read and write
7FF8BFAF3000
unkown
page read and write
32FE000
stack
page read and write
585E000
stack
page read and write
5773000
trusted library allocation
page read and write
10000000
direct allocation
page read and write
1F69CBFF000
heap
page read and write
43AF000
stack
page read and write
3BBE000
stack
page read and write
7FF8BFB0D000
unkown
page readonly
2840000
direct allocation
page execute and read and write
1C7FD3C2000
heap
page read and write
4821000
heap
page read and write
1C7FDB28000
heap
page read and write
55DF000
trusted library allocation
page read and write
1C7FDB23000
heap
page read and write
4D40000
direct allocation
page execute and read and write
55E6000
trusted library allocation
page read and write
32FE000
stack
page read and write
4531000
heap
page read and write
39EF000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
DF4000
heap
page read and write
EA4000
heap
page read and write
1C7FDAFA000
heap
page read and write
BE2000
heap
page read and write
2DCF000
stack
page read and write
5A30000
heap
page read and write
7FF8BFB81000
unkown
page execute read
465B5E3000
stack
page read and write
3D8F000
stack
page read and write
4531000
heap
page read and write
12B40000
heap
page read and write
1F69CC0C000
heap
page read and write
63C000
stack
page read and write
4531000
heap
page read and write
2FEE000
stack
page read and write
384000
unkown
page execute and write copy
4A81000
heap
page read and write
5544000
heap
page read and write
55D1000
trusted library allocation
page read and write
4810000
direct allocation
page read and write
5A2B000
heap
page read and write
4810000
direct allocation
page read and write
46F1000
heap
page read and write
50AF000
stack
page read and write
434000
unkown
page execute and read and write
402F000
stack
page read and write
46F1000
heap
page read and write
4821000
heap
page read and write
4820000
direct allocation
page execute and read and write
1F69CBFE000
heap
page read and write
DB000
unkown
page execute and write copy
1C7FDB28000
heap
page read and write
1C7FD3DA000
heap
page read and write
B94000
heap
page read and write
4A81000
heap
page read and write
C60000
heap
page read and write
3C4F000
stack
page read and write
1F69CBFA000
heap
page read and write
3CCF000
stack
page read and write
55E9000
trusted library allocation
page read and write
7FF8BFB61000
unkown
page execute read
46F1000
heap
page read and write
FD4000
heap
page read and write
E6000
unkown
page execute and read and write
822000
unkown
page execute and read and write
56D9000
trusted library allocation
page read and write
BBD0000
trusted library allocation
page read and write
2D10000
direct allocation
page read and write
4531000
heap
page read and write
D31000
heap
page read and write
4A81000
heap
page read and write
1290000
heap
page read and write
37BE000
stack
page read and write
AE0000
direct allocation
page read and write
4531000
heap
page read and write
4BB3000
direct allocation
page read and write
5544000
heap
page read and write
4C50000
direct allocation
page execute and read and write
446000
unkown
page execute and write copy
FD4000
heap
page read and write
B62000
heap
page read and write
1F69CC0C000
heap
page read and write
F80000
heap
page read and write
462F000
stack
page read and write
46E0000
direct allocation
page read and write
1C7FD3B0000
heap
page read and write
39AF000
stack
page read and write
1367000
heap
page read and write
2F1000
unkown
page execute and write copy
4531000
heap
page read and write
E00000
direct allocation
page read and write
1F69CC0B000
heap
page read and write
3BC000
unkown
page execute and read and write
5663000
trusted library allocation
page read and write
46FE000
stack
page read and write
4D00000
direct allocation
page execute and read and write
5A15000
heap
page read and write
36E000
unkown
page execute and write copy
7FF8BFB12000
unkown
page readonly
DB000
unkown
page execute and read and write
4750000
trusted library allocation
page read and write
3D4E000
stack
page read and write
1F69CBFA000
heap
page read and write
29AF000
stack
page read and write
59F1000
heap
page read and write
265000
unkown
page execute and read and write
46F1000
heap
page read and write
55DF000
trusted library allocation
page read and write
45C000
unkown
page execute and read and write
565D000
trusted library allocation
page read and write
193000
unkown
page write copy
27FE000
stack
page read and write
240000
unkown
page read and write
4821000
heap
page read and write
1284000
heap
page read and write
4821000
heap
page read and write
4C80000
direct allocation
page execute and read and write
265000
unkown
page execute and read and write
5661000
trusted library allocation
page read and write
56C8000
trusted library allocation
page read and write
4531000
heap
page read and write
414F000
stack
page read and write
3D6E000
stack
page read and write
5649000
trusted library allocation
page read and write
4531000
heap
page read and write
14AE000
stack
page read and write
BBD000
heap
page read and write
7FF7F7F95000
unkown
page readonly
AC4000
heap
page read and write
4630000
heap
page read and write
4C91000
heap
page read and write
4F5000
heap
page read and write
1284000
heap
page read and write
4840000
direct allocation
page execute and read and write
54A000
unkown
page write copy
8A93000
heap
page read and write
4C91000
heap
page read and write
1C7FFE84000
direct allocation
page read and write
4531000
heap
page read and write
CAF000
heap
page read and write
D9000
unkown
page write copy
4531000
heap
page read and write
5A22000
heap
page read and write
995000
unkown
page execute and read and write
1F69CC0B000
heap
page read and write
1284000
heap
page read and write
1C7FD3C7000
heap
page read and write
EA4000
heap
page read and write
5657000
trusted library allocation
page read and write
7FF7F7FB8000
unkown
page readonly
4821000
heap
page read and write
55F9000
trusted library allocation
page read and write
141000
unkown
page execute and read and write
563E000
trusted library allocation
page read and write
7FF8BFB26000
unkown
page readonly
5658000
trusted library allocation
page read and write
5656000
trusted library allocation
page read and write
1C7FDB23000
heap
page read and write
1C7FDB19000
heap
page read and write
12E4000
heap
page read and write
43CF000
stack
page read and write
4531000
heap
page read and write
28F000
unkown
page execute and read and write
465B5ED000
stack
page read and write
3B6E000
stack
page read and write
5280000
direct allocation
page execute and read and write
5639000
trusted library allocation
page read and write
B94000
heap
page read and write
4A81000
heap
page read and write
4821000
heap
page read and write
4702000
heap
page read and write
1C7FF5E4000
heap
page read and write
4531000
heap
page read and write
2CBF000
stack
page read and write
2D6F000
stack
page read and write
408000
unkown
page execute and write copy
7A0000
unkown
page write copy
59F2000
heap
page read and write
4661000
heap
page read and write
59AD000
stack
page read and write
6320000
heap
page read and write
3B2E000
stack
page read and write
5653000
trusted library allocation
page read and write
7B4000
unkown
page execute and read and write
46F1000
heap
page read and write
E6000
unkown
page execute and read and write
4D20000
direct allocation
page execute and read and write
F3F000
stack
page read and write
5A30000
heap
page read and write
AC4000
heap
page read and write
25A000
unkown
page execute and write copy
1284000
heap
page read and write
FD4000
heap
page read and write
2D37000
heap
page read and write
E7000
unkown
page execute and write copy
AC4000
heap
page read and write
44CE000
stack
page read and write
DFB000
heap
page read and write
1F69CC03000
heap
page read and write
1C7FDB20000
heap
page read and write
100F000
stack
page read and write
1F69CC0B000
heap
page read and write
433000
unkown
page execute and read and write
58743CE000
stack
page read and write
4C91000
heap
page read and write
12A0000
heap
page read and write
350E000
stack
page read and write
3E8E000
stack
page read and write
342000
unkown
page execute and read and write
4531000
heap
page read and write
400F000
stack
page read and write
4C90000
direct allocation
page execute and read and write
5656000
trusted library allocation
page read and write
46F1000
heap
page read and write
46E0000
direct allocation
page read and write
1C7FF623000
heap
page read and write
4AE0000
direct allocation
page read and write
385000
unkown
page execute and write copy
BEF4000
heap
page read and write
5A19000
heap
page read and write
1F69CC03000
heap
page read and write
E40000
heap
page read and write
2F8F000
stack
page read and write
59F1000
heap
page read and write
2C8E000
stack
page read and write
4B1000
unkown
page execute and read and write
59FB000
heap
page read and write
3F0E000
stack
page read and write
1C7FD330000
heap
page read and write
5A30000
heap
page read and write
E00000
direct allocation
page read and write
7DC000
stack
page read and write
3C6E000
stack
page read and write
FD4000
heap
page read and write
1F69CC04000
heap
page read and write
343F000
stack
page read and write
5649000
trusted library allocation
page read and write
4230000
heap
page read and write
4A81000
heap
page read and write
5619000
trusted library allocation
page read and write
54AE000
stack
page read and write
790000
heap
page read and write
1284000
heap
page read and write
4531000
heap
page read and write
4821000
heap
page read and write
AC4000
heap
page read and write
5668000
trusted library allocation
page read and write
7FF8BFB80000
unkown
page readonly
7FF7F7F70000
unkown
page readonly
AFD000
stack
page read and write
BE7000
heap
page read and write
322F000
stack
page read and write
1C7FF5CB000
heap
page read and write
4A81000
heap
page read and write
1C7FDB30000
heap
page read and write
46F1000
heap
page read and write
2867000
heap
page read and write
4C80000
direct allocation
page execute and read and write
56F9000
trusted library allocation
page read and write
F0E000
heap
page read and write
D13000
heap
page read and write
EA4000
heap
page read and write
565F000
trusted library allocation
page read and write
1284000
heap
page read and write
5668000
trusted library allocation
page read and write
4C91000
heap
page read and write
5A22000
heap
page read and write
5609000
trusted library allocation
page read and write
FD4000
heap
page read and write
5A0B000
heap
page read and write
6FB000
stack
page read and write
4980000
heap
page read and write
5635000
trusted library allocation
page read and write
1F69CBFE000
heap
page read and write
36E000
unkown
page execute and write copy
55F2000
trusted library allocation
page read and write
46F1000
heap
page read and write
1C7FDB30000
heap
page read and write
28C000
unkown
page execute and read and write
5A30000
heap
page read and write
1C7FFEE8000
direct allocation
page read and write
1F69CBF5000
heap
page read and write
5661000
trusted library allocation
page read and write
1284000
heap
page read and write
2D10000
direct allocation
page read and write
1C7FDB06000
heap
page read and write
616F000
stack
page read and write
73D000
stack
page read and write
4B90000
direct allocation
page execute and read and write
55C3000
trusted library allocation
page read and write
5641000
trusted library allocation
page read and write
4810000
direct allocation
page read and write
71000
unkown
page execute and write copy
1C7FDB20000
heap
page read and write
48D0000
direct allocation
page execute and read and write
524F000
stack
page read and write
7FA000
stack
page read and write
1C7FDB30000
heap
page read and write
2F90000
direct allocation
page read and write
28C000
unkown
page execute and read and write
6C6000
unkown
page execute and read and write
5652000
trusted library allocation
page read and write
55E1000
trusted library allocation
page read and write
374000
unkown
page execute and read and write
4A81000
heap
page read and write
5689000
trusted library allocation
page read and write
5A15000
heap
page read and write
4531000
heap
page read and write
1F69CC07000
heap
page read and write
4531000
heap
page read and write
4C91000
heap
page read and write
1C7FF566000
heap
page read and write
4810000
direct allocation
page read and write
4CA0000
heap
page read and write
2FC000
unkown
page execute and write copy
1C7FF5AD000
heap
page read and write
2A4F000
stack
page read and write
4D90000
direct allocation
page execute and read and write
46F1000
heap
page read and write
348E000
stack
page read and write
5656000
trusted library allocation
page read and write
501F000
stack
page read and write
5A30000
heap
page read and write
BD0000
heap
page read and write
3BCE000
stack
page read and write
41AE000
stack
page read and write
BC98000
heap
page read and write
59FB000
heap
page read and write
45CE000
stack
page read and write
B00000
heap
page read and write
58B9000
heap
page read and write
1C7FFA68000
heap
page read and write
BE7000
heap
page read and write
2CCE000
stack
page read and write
1130000
heap
page read and write
5641000
trusted library allocation
page read and write
4A0F000
stack
page read and write
FD4000
heap
page read and write
5873FDA000
stack
page read and write
28B000
unkown
page execute and write copy
1C7FDB03000
heap
page read and write
5B10000
trusted library allocation
page read and write
AC4000
heap
page read and write
4A90000
heap
page read and write
24F000
unkown
page execute and read and write
1C7FDAEF000
heap
page read and write
AD0000
heap
page read and write
46F1000
heap
page read and write
464F000
stack
page read and write
4C91000
heap
page read and write
55F2000
trusted library allocation
page read and write
1284000
heap
page read and write
42AF000
stack
page read and write
4B50000
direct allocation
page execute and read and write
1F69CBFF000
heap
page read and write
5250000
direct allocation
page execute and read and write
4670000
trusted library allocation
page read and write
4531000
heap
page read and write
1284000
heap
page read and write
4A81000
heap
page read and write
268000
unkown
page execute and read and write
B9F000
stack
page read and write
4C91000
heap
page read and write
55F5000
trusted library allocation
page read and write
55FD000
stack
page read and write
F73000
stack
page read and write
C64000
heap
page read and write
FD4000
heap
page read and write
7FF8BFB23000
unkown
page readonly
468E000
stack
page read and write
2A2E000
stack
page read and write
326E000
stack
page read and write
1C7FF65F000
heap
page read and write
4AE0000
direct allocation
page read and write
4F1E000
stack
page read and write
2E6F000
stack
page read and write
5659000
trusted library allocation
page read and write
44EF000
stack
page read and write
1C7FD410000
heap
page read and write
2D30000
heap
page read and write
55FD000
trusted library allocation
page read and write
344F000
stack
page read and write
2F90000
direct allocation
page read and write
D4F000
heap
page read and write
56C8000
trusted library allocation
page read and write
43EE000
stack
page read and write
4C70000
direct allocation
page execute and read and write
563E000
trusted library allocation
page read and write
45D1000
heap
page read and write
4970000
trusted library allocation
page read and write
3A7E000
stack
page read and write
FAE000
heap
page read and write
34EE000
stack
page read and write
C70000
heap
page read and write
52BF000
stack
page read and write
1087000
heap
page read and write
296000
unkown
page execute and write copy
4531000
heap
page read and write
55E6000
trusted library allocation
page read and write
70000
unkown
page readonly
3E4E000
stack
page read and write
4A81000
heap
page read and write
420F000
stack
page read and write
50CF000
stack
page read and write
2840000
heap
page read and write
1C7FDABF000
heap
page read and write
1F69CBFE000
heap
page read and write
B49000
heap
page read and write
1C7FDB30000
heap
page read and write
2CCF000
stack
page read and write
4840000
heap
page read and write
238000
unkown
page execute and write copy
2FC0000
heap
page read and write
2EA000
unkown
page execute and read and write
56C0000
trusted library allocation
page read and write
56D9000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
3EEE000
stack
page read and write
56EE000
stack
page read and write
4220000
direct allocation
page read and write
535000
heap
page read and write
312E000
stack
page read and write
55E4000
trusted library allocation
page read and write
416E000
stack
page read and write
565E000
trusted library allocation
page read and write
5639000
trusted library allocation
page read and write
434E000
stack
page read and write
B94000
heap
page read and write
52A0000
direct allocation
page execute and read and write
4531000
heap
page read and write
1C7FDB30000
heap
page read and write
5647000
trusted library allocation
page read and write
5544000
heap
page read and write
5070000
direct allocation
page execute and read and write
514C000
stack
page read and write
1C7FDB03000
heap
page read and write
1C7FF6F6000
heap
page read and write
396000
unkown
page execute and read and write
4810000
direct allocation
page read and write
7048000
heap
page read and write
1F69CBFA000
heap
page read and write
404E000
stack
page read and write
2F90000
direct allocation
page read and write
1F69CC03000
heap
page read and write
55C0000
trusted library allocation
page read and write
1C7FD3E0000
heap
page read and write
2E9000
unkown
page execute and write copy
1F69CC0B000
heap
page read and write
33FF000
stack
page read and write
24F000
unkown
page execute and read and write
320E000
stack
page read and write
FD4000
heap
page read and write
7040000
heap
page read and write
46F1000
heap
page read and write
4F9E000
stack
page read and write
55DA000
trusted library allocation
page read and write
1C7FFEA8000
direct allocation
page read and write
2F90000
direct allocation
page read and write
55C5000
trusted library allocation
page read and write
2B7E000
stack
page read and write
4821000
heap
page read and write
3A7F000
stack
page read and write
4B80000
direct allocation
page execute and read and write
D9000
unkown
page write copy
340F000
stack
page read and write
140000
unkown
page read and write
1C7FDB03000
heap
page read and write
50D0000
trusted library allocation
page read and write
5A20000
heap
page read and write
376000
unkown
page execute and write copy
53FE000
stack
page read and write
59F3000
heap
page read and write
6C73F000
unkown
page readonly
347E000
stack
page read and write
11B2000
heap
page read and write
4A81000
heap
page read and write
278000
unkown
page execute and read and write
307E000
stack
page read and write
8A8E000
heap
page read and write
E7C000
stack
page read and write
4220000
direct allocation
page read and write
55C9000
trusted library allocation
page read and write
390E000
stack
page read and write
4AF000
unkown
page execute and write copy
385000
unkown
page execute and write copy
109D000
heap
page read and write
31BE000
stack
page read and write
D9000
unkown
page write copy
493F000
stack
page read and write
1F69CBFE000
heap
page read and write
46E0000
direct allocation
page read and write
426F000
stack
page read and write
4A81000
heap
page read and write
AC4000
heap
page read and write
1C7FDAF6000
heap
page read and write
442E000
stack
page read and write
7FF8BFB42000
unkown
page readonly
1C7FF9B4000
direct allocation
page read and write
4B80000
direct allocation
page read and write
E7000
unkown
page execute and write copy
2DE000
unkown
page execute and read and write
46F1000
heap
page read and write
490E000
stack
page read and write
1C7FDB23000
heap
page read and write
4A81000
heap
page read and write
1F69CBFA000
heap
page read and write
2830000
direct allocation
page read and write
5A20000
heap
page read and write
1F69CBFA000
heap
page read and write
41BF000
stack
page read and write
563E000
trusted library allocation
page read and write
1F69CBFA000
heap
page read and write
7FF8BFB01000
unkown
page execute read
D2000
unkown
page execute and write copy
4D50000
direct allocation
page execute and read and write
1C7FDAB1000
heap
page read and write
4B00000
direct allocation
page execute and read and write
55CA000
trusted library allocation
page read and write
1F69CC0B000
heap
page read and write
6C785000
unkown
page readonly
5544000
heap
page read and write
4531000
heap
page read and write
370000
unkown
page execute and write copy
253F000
stack
page read and write
4821000
heap
page read and write
5619000
trusted library allocation
page read and write
5641000
trusted library allocation
page read and write
4C90000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
AC4000
heap
page read and write
4B80000
direct allocation
page read and write
1F69CC04000
heap
page read and write
1F69CC0B000
heap
page read and write
36E000
unkown
page execute and write copy
364E000
stack
page read and write
2EA000
unkown
page execute and read and write
384000
unkown
page execute and write copy
5653000
trusted library allocation
page read and write
EA4000
heap
page read and write
5A11000
heap
page read and write
3CBF000
stack
page read and write
1F69CBFE000
heap
page read and write
FD4000
heap
page read and write
42A000
unkown
page execute and write copy
442000
unkown
page execute and write copy
46C0000
direct allocation
page read and write
7FF8BFB40000
unkown
page read and write
1F69CBFE000
heap
page read and write
30CE000
stack
page read and write
1F69CBFA000
heap
page read and write
400000
unkown
page execute and read and write
534E000
stack
page read and write
1C7FF950000
direct allocation
page read and write
1F69CC0B000
heap
page read and write
7FF7F7FB8000
unkown
page readonly
5601000
trusted library allocation
page read and write
EA4000
heap
page read and write
4B60000
direct allocation
page execute and read and write
4CF000
unkown
page execute and read and write
2B30000
heap
page read and write
565E000
trusted library allocation
page read and write
1284000
heap
page read and write
10001000
direct allocation
page execute read
45BE000
stack
page read and write
BE50000
trusted library allocation
page read and write
1C7FDAFA000
heap
page read and write
1F69CC0B000
heap
page read and write
5544000
heap
page read and write
2DE000
unkown
page execute and read and write
4A81000
heap
page read and write
7A4000
unkown
page readonly
2E3F000
stack
page read and write
71000
unkown
page execute and write copy
4651000
heap
page read and write
4220000
direct allocation
page read and write
5665000
trusted library allocation
page read and write
1F69CC0B000
heap
page read and write
1C7FFF2C000
direct allocation
page read and write
5656000
trusted library allocation
page read and write
12AB000
heap
page read and write
4651000
heap
page read and write
792000
unkown
page readonly
AC4000
heap
page read and write
1C7FD410000
heap
page read and write
5649000
trusted library allocation
page read and write
BC31000
heap
page read and write
1C7FFB08000
heap
page read and write
36E000
unkown
page execute and write copy
4CA9000
trusted library allocation
page read and write
46F1000
heap
page read and write
1F69CC03000
heap
page read and write
563E000
trusted library allocation
page read and write
3CAE000
stack
page read and write
34CF000
stack
page read and write
10EE000
stack
page read and write
6310000
heap
page read and write
2B47000
heap
page read and write
EA4000
heap
page read and write
7DD000
unkown
page execute and read and write
41FE000
stack
page read and write
3AEF000
stack
page read and write
343E000
stack
page read and write
1F69CC01000
heap
page read and write
76C000
unkown
page readonly
46F1000
heap
page read and write
4640000
direct allocation
page read and write
61ED0000
direct allocation
page read and write
53E000
unkown
page execute and write copy
528C000
stack
page read and write
46F1000
heap
page read and write
E10000
heap
page read and write
E5000
unkown
page execute and write copy
3BBF000
stack
page read and write
560B000
trusted library allocation
page read and write
2B5000
unkown
page execute and write copy
55EB000
trusted library allocation
page read and write
238000
unkown
page execute and write copy
7FF8BFB30000
unkown
page readonly
1284000
heap
page read and write
E00000
direct allocation
page read and write
595F000
stack
page read and write
5653000
trusted library allocation
page read and write
5A0D000
heap
page read and write
2F1000
unkown
page execute and write copy
1C7FD2F0000
heap
page read and write
4821000
heap
page read and write
370E000
stack
page read and write
5665000
trusted library allocation
page read and write
563B000
trusted library allocation
page read and write
1F69CBFB000
heap
page read and write
4BA000
unkown
page execute and read and write
1C7FDB06000
heap
page read and write
BBD0000
trusted library allocation
page read and write
4A81000
heap
page read and write
1C7FD870000
direct allocation
page read and write
5A30000
heap
page read and write
7FF7F7F71000
unkown
page execute read
1F69CBFE000
heap
page read and write
2DC000
unkown
page execute and write copy
C60000
heap
page read and write
4C91000
heap
page read and write
1284000
heap
page read and write
4531000
heap
page read and write
4E30000
direct allocation
page execute and read and write
7FF8BFAD1000
unkown
page execute read
1C7FD3EA000
heap
page read and write
372F000
stack
page read and write
2F90000
direct allocation
page read and write
4C60000
direct allocation
page execute and read and write
BCC5000
heap
page read and write
2B6000
unkown
page execute and read and write
B7B000
heap
page read and write
440E000
stack
page read and write
1F69CBFE000
heap
page read and write
4B20000
direct allocation
page execute and read and write
528000
unkown
page execute and read and write
1F69CBFA000
heap
page read and write
6320000
heap
page read and write
6F851000
unkown
page execute read
BE0000
heap
page read and write
36F000
unkown
page execute and read and write
C4B000
unkown
page execute and read and write
4810000
direct allocation
page read and write
1C7FDADD000
heap
page read and write
DC8000
heap
page read and write
4C91000
heap
page read and write
46F1000
heap
page read and write
1C7FDB23000
heap
page read and write
E5000
unkown
page execute and write copy
1C7FDB4A000
heap
page read and write
4B00000
direct allocation
page execute and read and write
4E10000
heap
page read and write
4840000
direct allocation
page execute and read and write
1F69CC02000
heap
page read and write
1284000
heap
page read and write
59FB000
heap
page read and write
546E000
stack
page read and write
C64000
heap
page read and write
E00000
direct allocation
page read and write
1C7FF8D4000
direct allocation
page read and write
1C7FD3EA000
heap
page read and write
AE0000
direct allocation
page read and write
367F000
stack
page read and write
276000
unkown
page execute and write copy
E76000
heap
page read and write
5A15000
heap
page read and write
4821000
heap
page read and write
C60000
heap
page read and write
353F000
stack
page read and write
534E000
stack
page read and write
BC51000
heap
page read and write
DB000
unkown
page execute and write copy
56FD000
stack
page read and write
5664000
trusted library allocation
page read and write
1C7FD344000
heap
page read and write
B94000
heap
page read and write
E00000
direct allocation
page read and write
4531000
heap
page read and write
59A2000
trusted library allocation
page read and write
4651000
heap
page read and write
C57000
unkown
page execute and read and write
278000
unkown
page execute and read and write
5902000
trusted library allocation
page read and write
46FE000
stack
page read and write
4DFF000
stack
page read and write
46F1000
heap
page read and write
BBD0000
heap
page read and write
2FF000
unkown
page execute and read and write
4D30000
direct allocation
page execute and read and write
383E000
stack
page read and write
2AB000
unkown
page execute and write copy
7FF7F7FB6000
unkown
page read and write
58EA000
trusted library allocation
page read and write
1F69CBFA000
heap
page read and write
1C7FD339000
heap
page read and write
C64000
heap
page read and write
61E01000
direct allocation
page execute read
E00000
direct allocation
page read and write
4C91000
heap
page read and write
46E0000
direct allocation
page read and write
6D0000
unkown
page readonly
48CF000
stack
page read and write
2C8000
unkown
page execute and read and write
46F1000
heap
page read and write
F78000
heap
page read and write
1284000
heap
page read and write
5619000
trusted library allocation
page read and write
4C60000
direct allocation
page execute and read and write
1C7FDAF7000
heap
page read and write
2F90000
direct allocation
page read and write
1F69CBFE000
heap
page read and write
4531000
heap
page read and write
AAF000
unkown
page execute and write copy
4CF0000
direct allocation
page read and write
4A81000
heap
page read and write
7FF7F7F71000
unkown
page execute read
BA0000
heap
page read and write
1F69CC0B000
heap
page read and write
376000
unkown
page execute and write copy
360F000
stack
page read and write
12FE000
heap
page read and write
5617000
trusted library allocation
page read and write
117D000
stack
page read and write
4651000
heap
page read and write
4C1000
unkown
page execute and write copy
61ECC000
direct allocation
page read and write
4821000
heap
page read and write
D40000
heap
page read and write
53E000
unkown
page execute and write copy
46F1000
heap
page read and write
4AE000
unkown
page execute and read and write
1C7FDB8B000
heap
page read and write
70000
unkown
page read and write
D37000
heap
page read and write
1F69CBFA000
heap
page read and write
438E000
stack
page read and write
12B3C000
stack
page read and write
CB5000
heap
page read and write
5E1000
unkown
page execute and write copy
4C60000
direct allocation
page execute and read and write
5652000
trusted library allocation
page read and write
3DFF000
stack
page read and write
46F1000
heap
page read and write
8B0A000
heap
page read and write
D4B000
heap
page read and write
1F69CBFE000
heap
page read and write
985000
unkown
page execute and read and write
370000
unkown
page execute and write copy
282F000
stack
page read and write
B87000
heap
page read and write
46F1000
heap
page read and write
2F90000
direct allocation
page read and write
F77000
stack
page read and write
457000
unkown
page execute and read and write
5A03000
heap
page read and write
7CD000
unkown
page execute and read and write
CA0000
heap
page read and write
236000
unkown
page execute and read and write
46F1000
heap
page read and write
D84000
heap
page read and write
7FF8BFB91000
unkown
page readonly
4C91000
heap
page read and write
4650000
heap
page read and write
55AF000
stack
page read and write
4531000
heap
page read and write
4F0000
heap
page read and write
271E000
stack
page read and write
4A81000
heap
page read and write
56AE000
stack
page read and write
E00000
direct allocation
page read and write
7FF8BFB51000
unkown
page execute read
31CE000
stack
page read and write
4B30000
direct allocation
page execute and read and write
4C91000
heap
page read and write
480F000
stack
page read and write
10D0000
heap
page read and write
3BBE000
stack
page read and write
2EEE000
stack
page read and write
448F000
stack
page read and write
558E000
stack
page read and write
4531000
heap
page read and write
36E000
unkown
page execute and write copy
5653000
trusted library allocation
page read and write
594D000
heap
page read and write
4B8E000
direct allocation
page read and write
1284000
heap
page read and write
45D0000
heap
page read and write
268000
unkown
page execute and read and write
4531000
heap
page read and write
41FF000
stack
page read and write
2F0000
unkown
page read and write
52F0000
direct allocation
page execute and read and write
C20000
heap
page read and write
E3E000
heap
page read and write
1F69CBEF000
heap
page read and write
394F000
stack
page read and write
1C7FF642000
heap
page read and write
40BF000
stack
page read and write
2D10000
direct allocation
page read and write
563E000
trusted library allocation
page read and write
3B2F000
stack
page read and write
5524000
heap
page read and write
4C91000
heap
page read and write
AC4000
heap
page read and write
55DA000
trusted library allocation
page read and write
4A81000
heap
page read and write
54C000
unkown
page execute and read and write
4E40000
direct allocation
page execute and read and write
1F69CBFA000
heap
page read and write
376E000
stack
page read and write
1C7FDB30000
heap
page read and write
4A90000
heap
page read and write
328E000
stack
page read and write
4810000
direct allocation
page read and write
71000
unkown
page execute and write copy
4A81000
heap
page read and write
AE0000
direct allocation
page read and write
B40000
heap
page read and write
1F69CBFA000
heap
page read and write
1F69CBFE000
heap
page read and write
4531000
heap
page read and write
1C7FD3DA000
heap
page read and write
1C7FF57D000
heap
page read and write
4824000
heap
page read and write
4EC0000
heap
page read and write
55D1000
trusted library allocation
page read and write
B94000
heap
page read and write
D35000
stack
page read and write
510000
heap
page read and write
45D1000
heap
page read and write
4531000
heap
page read and write
70000
unkown
page read and write
1F69CAB0000
heap
page read and write
46F1000
heap
page read and write
56CF000
trusted library allocation
page read and write
4BB0000
direct allocation
page execute and read and write
554000
unkown
page execute and write copy
5AAD000
stack
page read and write
4FC0000
heap
page read and write
4A81000
heap
page read and write
2AB000
unkown
page execute and read and write
47FF000
stack
page read and write
378E000
stack
page read and write
1183000
heap
page read and write
4640000
direct allocation
page read and write
4821000
heap
page read and write
EA4000
heap
page read and write
300000
unkown
page readonly
5635000
trusted library allocation
page read and write
1C7FDB28000
heap
page read and write
4821000
heap
page read and write
5A30000
heap
page read and write
2D10000
direct allocation
page read and write
6311000
heap
page read and write
296000
unkown
page execute and write copy
1C7FDAFF000
heap
page read and write
1284000
heap
page read and write
5A22000
heap
page read and write
EA4000
heap
page read and write
55EF000
trusted library allocation
page read and write
4531000
heap
page read and write
1C7FDB28000
heap
page read and write
141000
unkown
page execute and write copy
5290000
direct allocation
page execute and read and write
4531000
heap
page read and write
7FF8BFB70000
unkown
page readonly
4531000
heap
page read and write
E00000
direct allocation
page read and write
40CF000
stack
page read and write
4531000
heap
page read and write
2C9000
unkown
page execute and write copy
3E7E000
stack
page read and write
1C7FFE60000
direct allocation
page read and write
55C9000
trusted library allocation
page read and write
4BD0000
direct allocation
page execute and read and write
2FB0000
direct allocation
page read and write
35E000
unkown
page execute and write copy
4531000
heap
page read and write
531000
unkown
page execute and write copy
7FF8BFB50000
unkown
page readonly
410E000
stack
page read and write
42EE000
stack
page read and write
50B0000
direct allocation
page execute and read and write
3C6E000
stack
page read and write
1F69CBFE000
heap
page read and write
4821000
heap
page read and write
544000
unkown
page execute and read and write
1F69CC04000
heap
page read and write
5A30000
heap
page read and write
70000
unkown
page readonly
14EE000
stack
page read and write
2C9000
unkown
page execute and write copy
338F000
stack
page read and write
5A0F000
heap
page read and write
1C7FF618000
heap
page read and write
1C7FFA81000
heap
page read and write
4C00000
direct allocation
page execute and read and write
4810000
direct allocation
page read and write
5A15000
heap
page read and write
32CF000
stack
page read and write
4C91000
heap
page read and write
4A81000
heap
page read and write
4E10000
direct allocation
page execute and read and write
1C7FD3EA000
heap
page read and write
122E000
stack
page read and write
CBE000
heap
page read and write
4F00000
direct allocation
page read and write
1C7FDB39000
heap
page read and write
2DF000
unkown
page execute and write copy
BC9D000
heap
page read and write
4A81000
heap
page read and write
4640000
direct allocation
page read and write
5A0E000
heap
page read and write
31FE000
stack
page read and write
40BE000
stack
page read and write
5A18000
heap
page read and write
7A4000
unkown
page execute and read and write
1C7FDB7C000
heap
page read and write
BEEE000
heap
page read and write
4821000
heap
page read and write
4C91000
heap
page read and write
1C7FDAFA000
heap
page read and write
384E000
stack
page read and write
4C91000
heap
page read and write
2C8000
unkown
page execute and read and write
6F850000
unkown
page readonly
2FF000
unkown
page execute and read and write
55CF000
trusted library allocation
page read and write
5B1E000
heap
page read and write
5A0F000
heap
page read and write
36BE000
stack
page read and write
358F000
stack
page read and write
4821000
heap
page read and write
DB000
unkown
page execute and write copy
1C7FFF58000
direct allocation
page read and write
28B000
unkown
page execute and write copy
BA0000
heap
page read and write
B7F000
heap
page read and write
D0E000
stack
page read and write
5280000
direct allocation
page execute and read and write
55C7000
trusted library allocation
page read and write
4A81000
heap
page read and write
6F8DE000
unkown
page read and write
2F90000
direct allocation
page read and write
BA0000
heap
page read and write
264000
unkown
page execute and write copy
40FE000
stack
page read and write
4640000
direct allocation
page read and write
2D10000
direct allocation
page read and write
1F69CBFA000
heap
page read and write
AC4000
heap
page read and write
2D3E000
heap
page read and write
DB000
unkown
page execute and read and write
1F69CBFF000
heap
page read and write
4531000
heap
page read and write
1284000
heap
page read and write
465BBBF000
stack
page read and write
45F000
unkown
page execute and read and write
478F000
stack
page read and write
3F2E000
stack
page read and write
5641000
trusted library allocation
page read and write
4A81000
heap
page read and write
542B000
stack
page read and write
36BE000
stack
page read and write
4C60000
direct allocation
page execute and read and write
1F69CC0B000
heap
page read and write
61ECD000
direct allocation
page readonly
4640000
direct allocation
page read and write
5641000
trusted library allocation
page read and write
1C7FF5D2000
heap
page read and write
BC4000
heap
page read and write
7FF8BFB25000
unkown
page read and write
1284000
heap
page read and write
4B4F000
stack
page read and write
2C9000
unkown
page execute and write copy
4821000
heap
page read and write
AC4000
heap
page read and write
7FF7F7FA7000
unkown
page read and write
2F4000
unkown
page execute and read and write
AC4000
heap
page read and write
EA000
stack
page read and write
FD4000
heap
page read and write
AC4000
heap
page read and write
22B7000
heap
page read and write
1C7FDAFF000
heap
page read and write
55E6000
trusted library allocation
page read and write
5A22000
heap
page read and write
2A3000
unkown
page execute and read and write
55CA000
trusted library allocation
page read and write
59FB000
heap
page read and write
407F000
stack
page read and write
1DE000
stack
page read and write
5A29000
heap
page read and write
E00000
direct allocation
page read and write
4531000
heap
page read and write
55E9000
trusted library allocation
page read and write
59F3000
heap
page read and write
4821000
heap
page read and write
15AE000
stack
page read and write
2F4000
unkown
page execute and read and write
4CB0000
direct allocation
page read and write
E6000
unkown
page execute and read and write
55D1000
trusted library allocation
page read and write
4A81000
heap
page read and write
4AE0000
direct allocation
page read and write
5A20000
heap
page read and write
E1E000
heap
page read and write
5542000
heap
page read and write
AC4000
heap
page read and write
1284000
heap
page read and write
5678000
trusted library allocation
page read and write
1C7FFA61000
heap
page read and write
5A15000
heap
page read and write
1C7FDAB1000
heap
page read and write
AE0000
direct allocation
page read and write
4810000
direct allocation
page read and write
57CF000
stack
page read and write
374000
unkown
page execute and read and write
46F1000
heap
page read and write
46F1000
heap
page read and write
1C7FDAFE000
heap
page read and write
4531000
heap
page read and write
2FC000
unkown
page execute and write copy
2F7E000
stack
page read and write
4220000
direct allocation
page read and write
AE0000
direct allocation
page read and write
384000
unkown
page execute and read and write
1C7FD3BD000
heap
page read and write
272E000
stack
page read and write
4C91000
heap
page read and write
393E000
stack
page read and write
1C7FDAF8000
heap
page read and write
5A20000
heap
page read and write
5A2C000
heap
page read and write
46F1000
heap
page read and write
7FF8BFB20000
unkown
page readonly
AC4000
heap
page read and write
7FF8A8A48000
unkown
page readonly
3F7E000
stack
page read and write
5673000
trusted library allocation
page read and write
1284000
heap
page read and write
35EF000
stack
page read and write
6D1000
unkown
page execute read
5A07000
heap
page read and write
3A7E000
stack
page read and write
376000
unkown
page execute and write copy
2D3B000
heap
page read and write
38FF000
stack
page read and write
2860000
heap
page read and write
AC4000
heap
page read and write
380E000
stack
page read and write
BCD000
heap
page read and write
28FF000
stack
page read and write
4840000
direct allocation
page execute and read and write
E30000
heap
page read and write
317F000
stack
page read and write
5A0A000
heap
page read and write
50C0000
direct allocation
page execute and read and write
AC4000
heap
page read and write
4640000
direct allocation
page read and write
5260000
direct allocation
page execute and read and write
46E0000
direct allocation
page read and write
4A81000
heap
page read and write
2847000
heap
page read and write
4C91000
heap
page read and write
1C7FDB20000
heap
page read and write
2B4B000
heap
page read and write
1F69CBFE000
heap
page read and write
4F6F000
stack
page read and write
5F60000
heap
page read and write
46F0000
heap
page read and write
1C7FDAE7000
heap
page read and write
B94000
heap
page read and write
3DEE000
stack
page read and write
4A81000
heap
page read and write
3A4F000
stack
page read and write
4821000
heap
page read and write
4651000
heap
page read and write
276000
unkown
page execute and write copy
22B0000
heap
page read and write
46F1000
heap
page read and write
AE0000
direct allocation
page read and write
12CF000
heap
page read and write
38CE000
stack
page read and write
51BE000
stack
page read and write
7FF7F7F71000
unkown
page execute read
4640000
direct allocation
page read and write
4E60000
direct allocation
page execute and read and write
366E000
stack
page read and write
AC4000
heap
page read and write
FD4000
heap
page read and write
599A000
trusted library allocation
page read and write
59F9000
heap
page read and write
70000
unkown
page readonly
4531000
heap
page read and write
7FF8BFAEB000
unkown
page readonly
3EEF000
stack
page read and write
5A11000
heap
page read and write
4A81000
heap
page read and write
594D000
heap
page read and write
9CE000
stack
page read and write
55DB000
trusted library allocation
page read and write
BEF9000
heap
page read and write
D41000
heap
page read and write
55D3000
trusted library allocation
page read and write
5653000
trusted library allocation
page read and write
FD4000
heap
page read and write
5635000
trusted library allocation
page read and write
5972000
trusted library allocation
page read and write
1C7FDB20000
heap
page read and write
1F69CBFA000
heap
page read and write
AE0000
direct allocation
page read and write
AB0000
unkown
page execute and write copy
4C91000
heap
page read and write
1C7FD7F8000
direct allocation
page read and write
5695000
trusted library allocation
page read and write
4A81000
heap
page read and write
4C91000
heap
page read and write
1F69CBFA000
heap
page read and write
46F1000
heap
page read and write
55CF000
trusted library allocation
page read and write
4A81000
heap
page read and write
4C91000
heap
page read and write
BEE6000
heap
page read and write
4C91000
heap
page read and write
AC4000
heap
page read and write
447E000
stack
page read and write
38AE000
stack
page read and write
1C7FDAF3000
heap
page read and write
CD1000
heap
page read and write
4F1F000
stack
page read and write
193000
unkown
page write copy
FD4000
heap
page read and write
1C7FDB6A000
heap
page read and write
3C2F000
stack
page read and write
2F90000
direct allocation
page read and write
BEF1000
heap
page read and write
438000
unkown
page execute and read and write
4B70000
direct allocation
page execute and read and write
4C91000
heap
page read and write
1284000
heap
page read and write
B51000
heap
page read and write
56D9000
trusted library allocation
page read and write
594D000
heap
page read and write
4531000
heap
page read and write
1F69CBFE000
heap
page read and write
2E1000
unkown
page execute and read and write
2F0000
unkown
page readonly
1C7FF5D2000
heap
page read and write
5A30000
heap
page read and write
4821000
heap
page read and write
4F00000
direct allocation
page read and write
1F69CBFA000
heap
page read and write
1F69CBFA000
heap
page read and write
33CE000
stack
page read and write
4CB0000
heap
page read and write
361000
unkown
page execute and write copy
5542000
heap
page read and write
4531000
heap
page read and write
1F69CBFE000
heap
page read and write
AC4000
heap
page read and write
41FE000
stack
page read and write
BAD000
heap
page read and write
1F69CC0B000
heap
page read and write
5609000
trusted library allocation
page read and write
3B0F000
stack
page read and write
7FF7F7FAA000
unkown
page read and write
46F1000
heap
page read and write
50ED000
stack
page read and write
4890000
direct allocation
page execute and read and write
556F000
stack
page read and write
7FF8A8BEB000
unkown
page read and write
4C91000
heap
page read and write
EA4000
heap
page read and write
631E000
heap
page read and write
4531000
heap
page read and write
4C91000
heap
page read and write
6C5A0000
unkown
page readonly
1250000
heap
page read and write
E00000
direct allocation
page read and write
278000
unkown
page execute and read and write
AC4000
heap
page read and write
FD4000
heap
page read and write
1083000
heap
page read and write
5A02000
heap
page read and write
22FE000
stack
page read and write
4531000
heap
page read and write
5609000
trusted library allocation
page read and write
357F000
stack
page read and write
4810000
direct allocation
page read and write
4A81000
heap
page read and write
7FF7F7FB8000
unkown
page readonly
241000
unkown
page execute and write copy
AC4000
heap
page read and write
CF7000
heap
page read and write
4821000
heap
page read and write
5A11000
heap
page read and write
4651000
heap
page read and write
4821000
heap
page read and write
FCC000
heap
page execute and read and write
4A81000
heap
page read and write
4531000
heap
page read and write
30EF000
stack
page read and write
7FF8A8C24000
unkown
page read and write
437000
unkown
page execute and write copy
40CE000
stack
page read and write
B90000
heap
page read and write
986000
unkown
page execute and write copy
1F69CBFE000
heap
page read and write
433E000
stack
page read and write
457F000
stack
page read and write
4651000
heap
page read and write
1C7FFECC000
direct allocation
page read and write
BA0000
heap
page read and write
4B9000
unkown
page execute and write copy
3DFF000
stack
page read and write
5A0C000
heap
page read and write
1F69CB90000
heap
page read and write
FD4000
heap
page read and write
4C70000
heap
page read and write
499000
unkown
page execute and write copy
C4C000
unkown
page execute and write copy
2F8E000
stack
page read and write
3D0F000
stack
page read and write
1C7FDB30000
heap
page read and write
1C7FDB20000
heap
page read and write
B60000
heap
page read and write
46F1000
heap
page read and write
FEE000
stack
page read and write
1C7FD3E0000
heap
page read and write
4B00000
direct allocation
page execute and read and write
5A15000
heap
page read and write
E5000
unkown
page execute and write copy
594E000
heap
page read and write
53A000
unkown
page write copy
343E000
stack
page read and write
2A3F000
stack
page read and write
679B000
stack
page read and write
28F000
unkown
page execute and read and write
2E4E000
stack
page read and write
4AD0000
remote allocation
page read and write
55F7000
trusted library allocation
page read and write
4821000
heap
page read and write
FF0000
heap
page read and write
1C7FF5EB000
heap
page read and write
4B21000
direct allocation
page read and write
4651000
heap
page read and write
AE0000
direct allocation
page read and write
3DAE000
stack
page read and write
2E3E000
stack
page read and write
4531000
heap
page read and write
1F69CBFA000
heap
page read and write
4810000
direct allocation
page execute and read and write
12E6000
heap
page read and write
E3D000
heap
page read and write
46F1000
heap
page read and write
59F2000
heap
page read and write
7FF8BFB21000
unkown
page execute read
80E000
unkown
page read and write
5310000
direct allocation
page execute and read and write
5686000
trusted library allocation
page read and write
4BE0000
direct allocation
page execute and read and write
2DFE000
stack
page read and write
4810000
direct allocation
page read and write
400000
unkown
page readonly
6840000
trusted library allocation
page read and write
1C7FDB06000
heap
page read and write
5A30000
heap
page read and write
1C7FDB22000
heap
page read and write
59FB000
heap
page read and write
C64000
heap
page read and write
4531000
heap
page read and write
333E000
stack
page read and write
441000
unkown
page execute and read and write
4531000
heap
page read and write
1C7FF550000
heap
page read and write
59AA000
trusted library allocation
page read and write
5E0000
unkown
page execute and read and write
5673000
trusted library allocation
page read and write
4CDF000
stack
page read and write
4D20000
direct allocation
page execute and read and write
1C7FF70D000
heap
page read and write
473000
unkown
page execute and read and write
C58000
unkown
page execute and write copy
53A000
unkown
page read and write
56CD000
trusted library allocation
page read and write
5320000
direct allocation
page execute and read and write
4EDD000
stack
page read and write
EA4000
heap
page read and write
1C7FF551000
heap
page read and write
59DE000
stack
page read and write
1C7FD3B8000
heap
page read and write
4531000
heap
page read and write
243E000
stack
page read and write
46F1000
heap
page read and write
2B7000
unkown
page execute and write copy
66CE000
stack
page read and write
55E9000
trusted library allocation
page read and write
4E4E000
stack
page read and write
393F000
stack
page read and write
28D000
unkown
page execute and write copy
4640000
direct allocation
page read and write
54F7000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
1C7FF585000
heap
page read and write
4A81000
heap
page read and write
12B41000
heap
page read and write
195000
unkown
page execute and read and write
1C7FDB03000
heap
page read and write
AC4000
heap
page read and write
3E4F000
stack
page read and write
406E000
stack
page read and write
34AF000
stack
page read and write
37AE000
stack
page read and write
1284000
heap
page read and write
4531000
heap
page read and write
38FF000
stack
page read and write
1F69CBFA000
heap
page read and write
AD0000
heap
page read and write
56F7000
trusted library allocation
page read and write
4640000
direct allocation
page read and write
2E0E000
stack
page read and write
55D1000
trusted library allocation
page read and write
FD4000
heap
page read and write
F50000
heap
page read and write
7FF8B9170000
unkown
page readonly
4531000
heap
page read and write
4640000
direct allocation
page read and write
79C000
unkown
page read and write
FD4000
heap
page read and write
4C30000
direct allocation
page execute and read and write
546000
unkown
page execute and write copy
4C91000
heap
page read and write
300C000
stack
page read and write
4531000
heap
page read and write
4A60000
direct allocation
page read and write
55FD000
trusted library allocation
page read and write
556F000
stack
page read and write
4531000
heap
page read and write
55E1000
trusted library allocation
page read and write
4531000
heap
page read and write
E7000
unkown
page execute and write copy
5665000
trusted library allocation
page read and write
1F69CC07000
heap
page read and write
E2E000
stack
page read and write
4220000
direct allocation
page read and write
374000
unkown
page execute and read and write
52D0000
direct allocation
page execute and read and write
5DAD000
stack
page read and write
E90000
heap
page read and write
4B00000
direct allocation
page execute and read and write
1F69CBFA000
heap
page read and write
4531000
heap
page read and write
385000
unkown
page execute and write copy
EA4000
heap
page read and write
4821000
heap
page read and write
465B5EA000
stack
page read and write
563E000
trusted library allocation
page read and write
EA4000
heap
page read and write
5641000
trusted library allocation
page read and write
BCD0000
trusted library allocation
page read and write
45CF000
stack
page read and write
3ABE000
stack
page read and write
28D000
unkown
page execute and write copy
329000
unkown
page execute and read and write
AC4000
heap
page read and write
46F1000
heap
page read and write
361000
unkown
page execute and write copy
2FB0000
direct allocation
page read and write
512000
unkown
page execute and read and write
314E000
stack
page read and write
564A000
trusted library allocation
page read and write
4A81000
heap
page read and write
7FF8BFB7B000
unkown
page readonly
4C91000
heap
page read and write
2FC7000
heap
page read and write
2D0E000
stack
page read and write
6C77F000
unkown
page write copy
4531000
heap
page read and write
4B1B000
stack
page read and write
42CE000
stack
page read and write
565F000
trusted library allocation
page read and write
7FF8A8C0B000
unkown
page write copy
755000
heap
page read and write
361000
unkown
page execute and write copy
1C7FFF50000
direct allocation
page read and write
257C000
stack
page read and write
1F69CBFA000
heap
page read and write
568B000
stack
page read and write
530000
heap
page read and write
1C7FF928000
direct allocation
page read and write
6F8E2000
unkown
page readonly
DE0000
heap
page read and write
3E0F000
stack
page read and write
1284000
heap
page read and write
4C91000
heap
page read and write
AC4000
heap
page read and write
4531000
heap
page read and write
1F69CC03000
heap
page read and write
55D1000
trusted library allocation
page read and write
7FF7F7FA7000
unkown
page write copy
7FF8A8C28000
unkown
page read and write
4531000
heap
page read and write
43EF000
stack
page read and write
3A8F000
stack
page read and write
2F3E000
stack
page read and write
AC4000
heap
page read and write
4D10000
direct allocation
page execute and read and write
2CE000
unkown
page execute and read and write
EA4000
heap
page read and write
1284000
heap
page read and write
DA9000
heap
page read and write
7FF7F7FB6000
unkown
page read and write
594D000
heap
page read and write
EA4000
heap
page read and write
5634000
trusted library allocation
page read and write
1C7FFEEC000
direct allocation
page read and write
1C7FDB39000
heap
page read and write
59FB000
heap
page read and write
384000
unkown
page execute and write copy
4F5E000
stack
page read and write
59EF000
heap
page read and write
334E000
stack
page read and write
4C40000
direct allocation
page execute and read and write
5060000
direct allocation
page execute and read and write
28F000
unkown
page execute and read and write
7FF8BFB38000
unkown
page readonly
4A81000
heap
page read and write
1C7FDB43000
heap
page read and write
5641000
trusted library allocation
page read and write
2C8F000
stack
page read and write
1C7FDAB0000
heap
page read and write
119F000
stack
page read and write
580E000
trusted library allocation
page read and write
55FB000
trusted library allocation
page read and write
4B40000
direct allocation
page execute and read and write
1C7FF642000
heap
page read and write
EA4000
heap
page read and write
1F69CBFE000
heap
page read and write
4531000
heap
page read and write
4C10000
direct allocation
page execute and read and write
BBF0000
heap
page read and write
3A0E000
stack
page read and write
1C7FD770000
direct allocation
page read and write
4A4E000
stack
page read and write
DCE000
stack
page read and write
7FF8BFB00000
unkown
page readonly
5A15000
heap
page read and write
4220000
direct allocation
page read and write
1F69CC01000
heap
page read and write
19D000
stack
page read and write
330E000
stack
page read and write
1F69CC0C000
heap
page read and write
3BFE000
stack
page read and write
55F9000
trusted library allocation
page read and write
EA4000
heap
page read and write
4530000
heap
page read and write
2867000
heap
page read and write
4651000
heap
page read and write
6D0000
unkown
page readonly
497E000
stack
page read and write
2D10000
direct allocation
page read and write
386F000
stack
page read and write
1F69CBFA000
heap
page read and write
4C91000
heap
page read and write
342000
unkown
page execute and read and write
268000
unkown
page execute and read and write
1C7FF58E000
heap
page read and write
1F69CC01000
heap
page read and write
AE0000
direct allocation
page read and write
357E000
stack
page read and write
1F69CBE0000
heap
page read and write
1F69CC04000
heap
page read and write
48C0000
direct allocation
page execute and read and write
31BE000
stack
page read and write
4B10000
direct allocation
page execute and read and write
35E000
unkown
page execute and write copy
344E000
stack
page read and write
2BCE000
stack
page read and write
1C7FFF4C000
direct allocation
page read and write
1F69CC04000
heap
page read and write
1284000
heap
page read and write
1284000
heap
page read and write
46F1000
heap
page read and write
4A81000
heap
page read and write
1C7FFA60000
heap
page read and write
267F000
stack
page read and write
46F1000
heap
page read and write
5635000
trusted library allocation
page read and write
8A7C000
stack
page read and write
424E000
stack
page read and write
D8E000
stack
page read and write
59F2000
heap
page read and write
5A22000
heap
page read and write
126E000
stack
page read and write
2AEE000
stack
page read and write
EA4000
heap
page read and write
5617000
trusted library allocation
page read and write
4821000
heap
page read and write
5542000
heap
page read and write
4C91000
heap
page read and write
5619000
trusted library allocation
page read and write
EB4000
heap
page read and write
1F69CBFA000
heap
page read and write
E2B000
heap
page read and write
76C000
unkown
page readonly
1F69CC01000
heap
page read and write
1C7FF5B3000
heap
page read and write
62B0000
heap
page read and write
563B000
trusted library allocation
page read and write
52E000
unkown
page execute and write copy
5A30000
heap
page read and write
55C5000
trusted library allocation
page read and write
4C91000
heap
page read and write
4AD0000
remote allocation
page read and write
4A81000
heap
page read and write
46C0000
heap
page read and write
286E000
heap
page read and write
4640000
direct allocation
page read and write
59E6000
heap
page read and write
4531000
heap
page read and write
4C91000
heap
page read and write
FD4000
heap
page read and write
1F69CBFA000
heap
page read and write
EA4000
heap
page read and write
4C91000
heap
page read and write
1C7FDB23000
heap
page read and write
4220000
direct allocation
page read and write
4880000
direct allocation
page execute and read and write
49E000
unkown
page execute and read and write
1C7FDB30000
heap
page read and write
19C000
stack
page read and write
1001A000
direct allocation
page read and write
5649000
trusted library allocation
page read and write
757000
heap
page read and write
55EF000
trusted library allocation
page read and write
BBD000
heap
page read and write
4531000
heap
page read and write
7FF7F7F70000
unkown
page readonly
1C7FDB48000
heap
page read and write
4C91000
heap
page read and write
5A2D000
heap
page read and write
58741DE000
stack
page read and write
BC5000
heap
page read and write
61ED4000
direct allocation
page readonly
5661000
trusted library allocation
page read and write
35CE000
stack
page read and write
2BD000
unkown
page execute and write copy
EA4000
heap
page read and write
BAC000
heap
page read and write
E00000
direct allocation
page read and write
376000
unkown
page execute and write copy
393E000
stack
page read and write
53C000
unkown
page execute and read and write
544F000
stack
page read and write
E1A000
heap
page read and write
AC4000
heap
page read and write
D3A000
heap
page read and write
2DC000
unkown
page execute and write copy
5A2B000
heap
page read and write
4C20000
direct allocation
page execute and read and write
6C780000
unkown
page read and write
1C7FDAFF000
heap
page read and write
4A81000
heap
page read and write
5653000
trusted library allocation
page read and write
4C50000
direct allocation
page execute and read and write
4531000
heap
page read and write
65CE000
stack
page read and write
46F1000
heap
page read and write
4DEE000
stack
page read and write
DEE000
stack
page read and write
4651000
heap
page read and write
4A81000
heap
page read and write
374000
unkown
page execute and read and write
7FF8B9192000
unkown
page readonly
4A81000
heap
page read and write
7A4000
unkown
page readonly
4C91000
heap
page read and write
4A81000
heap
page read and write
563B000
trusted library allocation
page read and write
1C7FDB20000
heap
page read and write
55EB000
trusted library allocation
page read and write
236000
unkown
page execute and read and write
1F69CC04000
heap
page read and write
384000
unkown
page execute and read and write
52B0000
direct allocation
page execute and read and write
5A22000
heap
page read and write
5A03000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
4C91000
heap
page read and write
1284000
heap
page read and write
4C60000
trusted library allocation
page read and write
5662000
trusted library allocation
page read and write
1C7FDB07000
heap
page read and write
BB30000
heap
page read and write
59E2000
heap
page read and write
55F3000
trusted library allocation
page read and write
4C91000
heap
page read and write
6D6000
unkown
page execute and read and write
46F1000
heap
page read and write
46E0000
direct allocation
page read and write
3A8E000
stack
page read and write
1C7FFF44000
direct allocation
page read and write
F75000
heap
page read and write
4A80000
heap
page read and write
3C0D000
stack
page read and write
293E000
stack
page read and write
46BF000
stack
page read and write
46F1000
heap
page read and write
265000
unkown
page execute and read and write
1C7FD290000
heap
page read and write
34EF000
stack
page read and write
4F4C000
stack
page read and write
BBF000
stack
page read and write
4C60000
direct allocation
page execute and read and write
D22000
heap
page read and write
CB3000
heap
page read and write
196000
unkown
page execute and read and write
56CE000
stack
page read and write
4531000
heap
page read and write
5F65000
heap
page read and write
4531000
heap
page read and write
55E9000
trusted library allocation
page read and write
2F4000
unkown
page execute and read and write
432000
unkown
page execute and read and write
1C7FDB12000
heap
page read and write
435000
unkown
page execute and read and write
4231000
heap
page read and write
5270000
direct allocation
page execute and read and write
E8A000
heap
page read and write
307F000
stack
page read and write
5A0B000
heap
page read and write
AE0000
direct allocation
page read and write
5613000
trusted library allocation
page read and write
C7A000
heap
page read and write
562E000
trusted library allocation
page read and write
59F1000
heap
page read and write
55F3000
trusted library allocation
page read and write
4220000
direct allocation
page read and write
DAF000
stack
page read and write
140000
unkown
page readonly
1284000
heap
page read and write
2B8C000
stack
page read and write
5542000
heap
page read and write
2DFF000
stack
page read and write
5524000
heap
page read and write
1C7FD410000
heap
page read and write
376000
unkown
page execute and write copy
380F000
stack
page read and write
6D1000
unkown
page execute read
403000
unkown
page execute and read and write
5CAD000
stack
page read and write
B0A000
heap
page read and write
DB000
unkown
page execute and write copy
54DD000
stack
page read and write
4220000
direct allocation
page read and write
32AE000
stack
page read and write
4821000
heap
page read and write
5641000
trusted library allocation
page read and write
27BF000
stack
page read and write
452E000
stack
page read and write
4B30000
direct allocation
page execute and read and write
2F90000
direct allocation
page read and write
23FF000
stack
page read and write
29AB000
stack
page read and write
41CF000
stack
page read and write
3BCF000
stack
page read and write
1F69CC07000
heap
page read and write
46F1000
heap
page read and write
326F000
stack
page read and write
505E000
stack
page read and write
7FF8BFB96000
unkown
page read and write
565F000
trusted library allocation
page read and write
D2000
unkown
page execute and write copy
3FCE000
stack
page read and write
3D0E000
stack
page read and write
2F3F000
stack
page read and write
1C7FDB0F000
heap
page read and write
AC4000
heap
page read and write
1F69CBFE000
heap
page read and write
5603000
trusted library allocation
page read and write
4C91000
heap
page read and write
1F69CBFE000
heap
page read and write
1284000
heap
page read and write
B5B000
stack
page read and write
4A81000
heap
page read and write
C64000
heap
page read and write
384000
unkown
page execute and read and write
307E000
stack
page read and write
49EE000
stack
page read and write
BBD000
heap
page read and write
5A0B000
heap
page read and write
4C91000
heap
page read and write
10011000
direct allocation
page readonly
3E3F000
stack
page read and write
7FF8BFB97000
unkown
page readonly
4531000
heap
page read and write
4640000
direct allocation
page read and write
BC71000
heap
page read and write
4A81000
heap
page read and write
48A0000
direct allocation
page execute and read and write
52FE000
stack
page read and write
AE0000
direct allocation
page read and write
4651000
heap
page read and write
2F0F000
stack
page read and write
1F69CBFA000
heap
page read and write
4B80000
direct allocation
page read and write
4821000
heap
page read and write
37FE000
stack
page read and write
573E000
stack
page read and write
56F1000
trusted library allocation
page read and write
1F69CBFE000
heap
page read and write
4860000
direct allocation
page execute and read and write
AC4000
heap
page read and write
2C2F000
stack
page read and write
D7C000
heap
page read and write
4531000
heap
page read and write
29EE000
stack
page read and write
FD4000
heap
page read and write
5635000
trusted library allocation
page read and write
30BE000
stack
page read and write
FD4000
heap
page read and write
D9000
unkown
page write copy
418E000
stack
page read and write
4821000
heap
page read and write
4C91000
heap
page read and write
3ECF000
stack
page read and write
FD4000
heap
page read and write
4821000
heap
page read and write
2FAF000
stack
page read and write
4821000
heap
page read and write
EA4000
heap
page read and write
37CF000
stack
page read and write
1284000
heap
page read and write
B94000
heap
page read and write
1C7FDB07000
heap
page read and write
530F000
stack
page read and write
2D10000
direct allocation
page read and write
457F000
stack
page read and write
47CE000
stack
page read and write
46F1000
heap
page read and write
61EB4000
direct allocation
page read and write
5A30000
heap
page read and write
4C91000
heap
page read and write
8AFB000
heap
page read and write
3FEF000
stack
page read and write
4531000
heap
page read and write
AC4000
heap
page read and write
1F69CBFA000
heap
page read and write
3EAE000
stack
page read and write
13AD000
stack
page read and write
3B4E000
stack
page read and write
2FF000
unkown
page execute and read and write
4531000
heap
page read and write
4651000
heap
page read and write
5A30000
heap
page read and write
452F000
stack
page read and write
3D3E000
stack
page read and write
46F1000
heap
page read and write
4821000
heap
page read and write
4531000
heap
page read and write
4531000
heap
page read and write
DC5000
heap
page read and write
7FF8A8811000
unkown
page execute read
4DA0000
direct allocation
page execute and read and write
46C0000
direct allocation
page read and write
46F1000
heap
page read and write
C64000
heap
page read and write
1F69CBFA000
heap
page read and write
2830000
direct allocation
page read and write
A60000
heap
page read and write
2D10000
direct allocation
page read and write
55B0000
heap
page read and write
EA4000
heap
page read and write
1F69CBFE000
heap
page read and write
1F69CC02000
heap
page read and write
5649000
trusted library allocation
page read and write
1C7FD3C7000
heap
page read and write
2DBF000
stack
page read and write
56C7000
trusted library allocation
page read and write
1F69CBFA000
heap
page read and write
D7A000
heap
page read and write
2B8F000
stack
page read and write
D65000
heap
page read and write
1C7FFEF8000
direct allocation
page read and write
544D000
stack
page read and write
1C7FF5FB000
heap
page read and write
540000
unkown
page execute and write copy
1C7FDB95000
heap
page read and write
1C7FD410000
heap
page read and write
1F69CBFF000
heap
page read and write
113A000
heap
page read and write
BD3E000
stack
page read and write
45D000
unkown
page execute and write copy
4AA0000
heap
page read and write
4850000
direct allocation
page execute and read and write
4C91000
heap
page read and write
5664000
trusted library allocation
page read and write
EA4000
heap
page read and write
FD4000
heap
page read and write
36CE000
stack
page read and write
12E9000
heap
page read and write
EA4000
heap
page read and write
5641000
trusted library allocation
page read and write
26BE000
stack
page read and write
4651000
heap
page read and write
D4E000
heap
page read and write
55C3000
trusted library allocation
page read and write
4BDC000
stack
page read and write
AC4000
heap
page read and write
4531000
heap
page read and write
46F1000
heap
page read and write
B7A000
heap
page read and write
5524000
heap
page read and write
447E000
stack
page read and write
AC4000
heap
page read and write
AA1000
unkown
page execute and read and write
996000
unkown
page execute and write copy
1F69CEB0000
heap
page read and write
562E000
trusted library allocation
page read and write
4640000
direct allocation
page read and write
5649000
trusted library allocation
page read and write
42B000
unkown
page execute and read and write
433E000
stack
page read and write
182000
unkown
page execute and read and write
55E9000
trusted library allocation
page read and write
DB000
unkown
page execute and read and write
4870000
direct allocation
page execute and read and write
4A81000
heap
page read and write
5A30000
heap
page read and write
AC4000
heap
page read and write
48E0000
direct allocation
page execute and read and write
792000
unkown
page readonly
4531000
heap
page read and write
55D9000
trusted library allocation
page read and write
EA4000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
276000
unkown
page execute and write copy
5A15000
heap
page read and write
48D000
unkown
page execute and write copy
B8E000
stack
page read and write
54A000
unkown
page read and write
1C7FF6EF000
heap
page read and write
55D5000
trusted library allocation
page read and write
1F69CC0B000
heap
page read and write
554000
unkown
page execute and read and write
E37000
heap
page read and write
61E00000
direct allocation
page execute and read and write
5665000
trusted library allocation
page read and write
1284000
heap
page read and write
46F1000
heap
page read and write
28C000
unkown
page execute and read and write
588A000
heap
page read and write
1C7FF66F000
heap
page read and write
46E0000
direct allocation
page read and write
38E000
unkown
page execute and read and write
4531000
heap
page read and write
2D10000
direct allocation
page read and write
4EC0000
trusted library allocation
page read and write
4651000
heap
page read and write
7FF8BFB60000
unkown
page readonly
AC4000
heap
page read and write
4A7F000
stack
page read and write
2B40000
heap
page read and write
46CF000
stack
page read and write
264000
unkown
page execute and write copy
1C7FDAFA000
heap
page read and write
46F1000
heap
page read and write
4AD0000
remote allocation
page read and write
5A0F000
heap
page read and write
4C91000
heap
page read and write
46E0000
direct allocation
page read and write
2E0F000
stack
page read and write
11E0000
heap
page read and write
1C7FFF04000
direct allocation
page read and write
2DAE000
stack
page read and write
27EE000
stack
page read and write
5280000
direct allocation
page execute and read and write
2D10000
direct allocation
page read and write
5653000
trusted library allocation
page read and write
549D000
stack
page read and write
D2000
unkown
page execute and read and write
52E0000
direct allocation
page execute and read and write
61AC000
stack
page read and write
3DAF000
stack
page read and write
3A5000
unkown
page execute and read and write
46F1000
heap
page read and write
7E4000
unkown
page execute and read and write
AC4000
heap
page read and write
C80000
heap
page read and write
CA9000
heap
page read and write
1F69CBFE000
heap
page read and write
DC0000
heap
page read and write
BBE000
heap
page read and write
36E000
unkown
page execute and write copy
F5A000
heap
page read and write
2B2E000
stack
page read and write
5634000
trusted library allocation
page read and write
4531000
heap
page read and write
EA4000
heap
page read and write
5A20000
heap
page read and write
4231000
heap
page read and write
1C7FDB28000
heap
page read and write
5A3A000
trusted library allocation
page read and write
443F000
stack
page read and write
3F7E000
stack
page read and write
5A13000
heap
page read and write
303F000
stack
page read and write
4531000
heap
page read and write
BC11000
heap
page read and write
318F000
stack
page read and write
32FF000
stack
page read and write
1C7FD3EA000
heap
page read and write
2DE000
unkown
page execute and read and write
4C91000
heap
page read and write
5635000
trusted library allocation
page read and write
1C7FDAE7000
heap
page read and write
4ADA000
heap
page read and write
FD4000
heap
page read and write
750000
heap
page read and write
7E4000
unkown
page execute and write copy
1F69CBFE000
heap
page read and write
5635000
trusted library allocation
page read and write
28B000
unkown
page execute and write copy
4BE0000
direct allocation
page execute and read and write
4C91000
heap
page read and write
D4F000
heap
page read and write
5649000
trusted library allocation
page read and write
1F69CBFE000
heap
page read and write
606F000
stack
page read and write
324F000
stack
page read and write
4C91000
heap
page read and write
7FF8B919B000
unkown
page read and write
46F1000
heap
page read and write
5300000
direct allocation
page execute and read and write
4C91000
heap
page read and write
5F66000
heap
page read and write
E7000
unkown
page execute and write copy
5665000
trusted library allocation
page read and write
583C000
stack
page read and write
4A81000
heap
page read and write
4A81000
heap
page read and write
DD8000
heap
page read and write
1284000
heap
page read and write
24F000
unkown
page execute and read and write
56F9000
trusted library allocation
page read and write
3A3F000
stack
page read and write
EA4000
heap
page read and write
4A81000
heap
page read and write
5A0F000
heap
page read and write
C7E000
heap
page read and write
D2000
unkown
page execute and read and write
5675000
trusted library allocation
page read and write
330F000
stack
page read and write
1F69CC0B000
heap
page read and write
4C91000
heap
page read and write
1F69CBFA000
heap
page read and write
2F90000
direct allocation
page read and write
10018000
direct allocation
page read and write
5A2B000
heap
page read and write
1F69CC0C000
heap
page read and write
B94000
heap
page read and write
1F69CBFE000
heap
page read and write
BE7000
heap
page read and write
4C60000
direct allocation
page execute and read and write
AC4000
heap
page read and write
2F1000
unkown
page execute and write copy
757000
heap
page read and write
4531000
heap
page read and write
25A000
unkown
page execute and write copy
2860000
heap
page read and write
1F69CBFE000
heap
page read and write
238000
unkown
page execute and write copy
46E0000
direct allocation
page read and write
7FF8A8C09000
unkown
page read and write
52C0000
direct allocation
page execute and read and write
1F69CBFE000
heap
page read and write
1319000
heap
page read and write
7FF7F7F95000
unkown
page readonly
4E50000
direct allocation
page execute and read and write
56CA000
trusted library allocation
page read and write
FD0000
heap
page read and write
1C7FDB3A000
heap
page read and write
36CF000
stack
page read and write
2CBE000
stack
page read and write
2CE000
unkown
page execute and read and write
2F1000
unkown
page execute and write copy
32BF000
stack
page read and write
420E000
stack
page read and write
5A30000
heap
page read and write
470E000
stack
page read and write
4531000
heap
page read and write
370000
unkown
page execute and write copy
594D000
heap
page read and write
61AE000
stack
page read and write
ACF000
stack
page read and write
1F69CBFE000
heap
page read and write
458F000
stack
page read and write
7FF7F7F95000
unkown
page readonly
3A2E000
stack
page read and write
4541000
heap
page read and write
2D6E000
stack
page read and write
2EA000
unkown
page execute and read and write
5A0B000
heap
page read and write
1F69CBFA000
heap
page read and write
1280000
heap
page read and write
4B00000
direct allocation
page execute and read and write
4D80000
direct allocation
page execute and read and write
1F69CC03000
heap
page read and write
1069000
heap
page read and write
2BEF000
stack
page read and write
4821000
heap
page read and write
46E0000
direct allocation
page read and write
79C000
unkown
page write copy
562E000
trusted library allocation
page read and write
B94000
heap
page read and write
2A2000
unkown
page execute and write copy
46F1000
heap
page read and write
5A14000
heap
page read and write
568C000
trusted library allocation
page read and write
2FEF000
stack
page read and write
4A81000
heap
page read and write
AC4000
heap
page read and write
4220000
direct allocation
page read and write
46F1000
heap
page read and write
5617000
trusted library allocation
page read and write
4AEF000
stack
page read and write
3CBF000
stack
page read and write
1C7FDAF6000
heap
page read and write
2EFF000
stack
page read and write
4830000
heap
page read and write
AC4000
heap
page read and write
4542000
heap
page read and write
7FF8A8C2B000
unkown
page read and write
281E000
stack
page read and write
560B000
trusted library allocation
page read and write
4C91000
heap
page read and write
46F1000
heap
page read and write
2BD000
unkown
page execute and write copy
4CF0000
direct allocation
page execute and read and write
2DF000
unkown
page execute and write copy
2A3F000
stack
page read and write
6C5A1000
unkown
page execute read
58DD000
stack
page read and write
4651000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
465B7DE000
stack
page read and write
33AE000
stack
page read and write
46F1000
heap
page read and write
302E000
stack
page read and write
4531000
heap
page read and write
C64000
heap
page read and write
39CF000
stack
page read and write
6060000
heap
page read and write
46F1000
heap
page read and write
362E000
stack
page read and write
362F000
stack
page read and write
BE3E000
stack
page read and write
1C7FDABF000
heap
page read and write
524E000
stack
page read and write
BBD000
heap
page read and write
5A15000
heap
page read and write
7FF8BFAD0000
unkown
page readonly
2850000
direct allocation
page execute and read and write
3F7F000
stack
page read and write
4531000
heap
page read and write
563B000
trusted library allocation
page read and write
4821000
heap
page read and write
1F69CBFE000
heap
page read and write
5A30000
heap
page read and write
5524000
heap
page read and write
1C7FF5AA000
heap
page read and write
4AC000
unkown
page execute and write copy
1C7FF5EB000
heap
page read and write
240000
unkown
page readonly
658C000
stack
page read and write
55DD000
stack
page read and write
1C7FF585000
heap
page read and write
4220000
direct allocation
page read and write
7FF8A8810000
unkown
page readonly
3AF000
unkown
page execute and read and write
5A0F000
heap
page read and write
EA4000
heap
page read and write
C4E000
stack
page read and write
5A2B000
heap
page read and write
36FE000
stack
page read and write
1C7FD3B8000
heap
page read and write
45BE000
stack
page read and write
1F69CC05000
heap
page read and write
B94000
heap
page read and write
5641000
trusted library allocation
page read and write
4A60000
direct allocation
page read and write
509E000
stack
page read and write
9C000
stack
page read and write
5653000
trusted library allocation
page read and write
5A0B000
heap
page read and write
2A8E000
stack
page read and write
312F000
stack
page read and write
5A02000
heap
page read and write
25A000
unkown
page execute and write copy
5653000
trusted library allocation
page read and write
4C91000
heap
page read and write
308E000
stack
page read and write
4840000
direct allocation
page execute and read and write
5A30000
heap
page read and write
3DCE000
stack
page read and write
FE9000
heap
page read and write
4531000
heap
page read and write
401000
unkown
page execute and write copy
33FF000
stack
page read and write
1C7FF6EF000
heap
page read and write
1197000
heap
page read and write
5A2B000
heap
page read and write
1C7FDB20000
heap
page read and write
55E6000
trusted library allocation
page read and write
4A81000
heap
page read and write
1F69CBFE000
heap
page read and write
4531000
heap
page read and write
5080000
direct allocation
page execute and read and write
1F69CC0B000
heap
page read and write
1C7FD3EA000
heap
page read and write
59E0000
heap
page read and write
55F7000
trusted library allocation
page read and write
9A3000
unkown
page execute and read and write
7E3000
unkown
page execute and read and write
4C91000
heap
page read and write
FD4000
heap
page read and write
310F000
stack
page read and write
50A0000
direct allocation
page execute and read and write
4531000
heap
page read and write
25A000
unkown
page execute and read and write
39EE000
stack
page read and write
450F000
stack
page read and write
1F69CBFE000
heap
page read and write
FD4000
heap
page read and write
5F1E000
stack
page read and write
1C7FF450000
direct allocation
page read and write
B5F000
heap
page read and write
406000
unkown
page execute and read and write
4821000
heap
page read and write
4B9F000
stack
page read and write
55C7000
trusted library allocation
page read and write
2BD000
unkown
page execute and write copy
B94000
heap
page read and write
4220000
direct allocation
page read and write
B94000
heap
page read and write
2FC000
unkown
page execute and write copy
5280000
direct allocation
page execute and read and write
46F1000
heap
page read and write
4810000
direct allocation
page read and write
1284000
heap
page read and write
37FF000
stack
page read and write
1F69CC05000
heap
page read and write
C64000
heap
page read and write
7FF8A8C57000
unkown
page readonly
4C91000
heap
page read and write
1284000
heap
page read and write
4531000
heap
page read and write
5A0F000
heap
page read and write
444F000
stack
page read and write
33AF000
stack
page read and write
57EF000
stack
page read and write
4D9E000
stack
page read and write
1F69CBE9000
heap
page read and write
4640000
direct allocation
page read and write
1F69CBFA000
heap
page read and write
4C6D000
stack
page read and write
303F000
stack
page read and write
5A30000
heap
page read and write
1F69CBFE000
heap
page read and write
2D10000
direct allocation
page read and write
4C91000
heap
page read and write
4C91000
heap
page read and write
36F000
unkown
page execute and read and write
BA8F000
heap
page read and write
C64000
heap
page read and write
5A2D000
heap
page read and write
5641000
trusted library allocation
page read and write
2E1000
unkown
page execute and read and write
2D0E000
stack
page read and write
267000
unkown
page execute and write copy
58CB000
trusted library allocation
page read and write
42FF000
stack
page read and write
16AF000
stack
page read and write
367F000
stack
page read and write
4B00000
direct allocation
page execute and read and write
53F000
unkown
page execute and read and write
374F000
stack
page read and write
8A80000
heap
page read and write
BD2000
heap
page read and write
28AB000
stack
page read and write
31CF000
stack
page read and write
4C74000
heap
page read and write
5649000
trusted library allocation
page read and write
59F9000
heap
page read and write
4B80000
direct allocation
page read and write
32BF000
stack
page read and write
4C90000
heap
page read and write
42AE000
stack
page read and write
296000
unkown
page execute and write copy
7FF7F7FA7000
unkown
page read and write
37BF000
stack
page read and write
416F000
stack
page read and write
1C7FFEF0000
direct allocation
page read and write
55F9000
trusted library allocation
page read and write
4A81000
heap
page read and write
89B000
heap
page read and write
1284000
heap
page read and write
5461000
heap
page read and write
AC4000
heap
page read and write
1F69CC05000
heap
page read and write
BD7000
heap
page read and write
1F69CBFA000
heap
page read and write
46F1000
heap
page read and write
4B8E000
stack
page read and write
4531000
heap
page read and write
4C4000
unkown
page execute and read and write
1C7FF65F000
heap
page read and write
296F000
stack
page read and write
1F69CBFA000
heap
page read and write
36F000
unkown
page execute and read and write
EA4000
heap
page read and write
402E000
stack
page read and write
4821000
heap
page read and write
1F69CC05000
heap
page read and write
48B0000
direct allocation
page execute and read and write
1F69CC00000
heap
page read and write
F5F000
stack
page read and write
2F90000
direct allocation
page read and write
2A9000
unkown
page write copy
4D20000
direct allocation
page execute and read and write
8AA0000
heap
page read and write
4830000
direct allocation
page execute and read and write
F51000
heap
page read and write
5A09000
heap
page read and write
1C7FDB06000
heap
page read and write
4821000
heap
page read and write
50D0000
heap
page read and write
35E000
unkown
page execute and write copy
3A3F000
stack
page read and write
F9C000
stack
page read and write
5A18000
heap
page read and write
46F1000
heap
page read and write
46F1000
heap
page read and write
434F000
stack
page read and write
394E000
stack
page read and write
7FF8BFB77000
unkown
page read and write
7FF7F7F71000
unkown
page execute read
4821000
heap
page read and write
1C7FFEE4000
direct allocation
page read and write
46F1000
heap
page read and write
40BE000
stack
page read and write
430F000
stack
page read and write
4810000
direct allocation
page read and write
5638000
trusted library allocation
page read and write
AE0000
direct allocation
page read and write
47FF000
stack
page read and write
1C7FF66F000
heap
page read and write
41BF000
stack
page read and write
5517000
heap
page read and write
EA4000
heap
page read and write
46F1000
heap
page read and write
37FE000
stack
page read and write
4CFB000
stack
page read and write
1C7FDB20000
heap
page read and write
2E8E000
stack
page read and write
1284000
heap
page read and write
7FF8B919D000
unkown
page readonly
EA4000
heap
page read and write
563E000
trusted library allocation
page read and write
FD4000
heap
page read and write
7FF8B9171000
unkown
page execute read
2C2E000
stack
page read and write
5A0F000
heap
page read and write
372F000
stack
page read and write
EA4000
heap
page read and write
1C7FDB30000
heap
page read and write
FD4000
heap
page read and write
46E0000
direct allocation
page read and write
4CC000
unkown
page execute and write copy
E00000
direct allocation
page read and write
3E3E000
stack
page read and write
4A81000
heap
page read and write
448000
unkown
page execute and read and write
2DF000
unkown
page execute and write copy
EA4000
heap
page read and write
5641000
trusted library allocation
page read and write
B94000
heap
page read and write
4CB0000
direct allocation
page read and write
317F000
stack
page read and write
4821000
heap
page read and write
5A0F000
heap
page read and write
434000
unkown
page execute and write copy
342000
unkown
page execute and read and write
3B7F000
stack
page read and write
5691000
trusted library allocation
page read and write
264000
unkown
page execute and write copy
1C7FD3DE000
heap
page read and write
28D000
unkown
page execute and write copy
55F9000
trusted library allocation
page read and write
4C8F000
stack
page read and write
F4F000
stack
page read and write
294F000
stack
page read and write
1C7FD370000
heap
page read and write
354F000
stack
page read and write
308F000
stack
page read and write
1C7FDB39000
heap
page read and write
46F1000
heap
page read and write
1F69CBFA000
heap
page read and write
31BF000
stack
page read and write
1C7FF5EB000
heap
page read and write
BD2000
heap
page read and write
117F000
heap
page read and write
7FF8A8B3E000
unkown
page readonly
5873FED000
stack
page read and write
4821000
heap
page read and write
1C7FDAFF000
heap
page read and write
E6B000
heap
page read and write
1C7FDB22000
heap
page read and write
514000
heap
page read and write
1F69CBFA000
heap
page read and write
E00000
direct allocation
page read and write
B94000
heap
page read and write
4531000
heap
page read and write
504F000
stack
page read and write
3B7F000
stack
page read and write
BF00000
heap
page read and write
5A20000
heap
page read and write
F81000
heap
page read and write
51EE000
stack
page read and write
5656000
trusted library allocation
page read and write
4BE0000
direct allocation
page execute and read and write
BEA000
heap
page read and write
267000
unkown
page execute and write copy
4C91000
heap
page read and write
41F000
unkown
page execute and read and write
300000
unkown
page read and write
EA4000
heap
page read and write
2A9000
unkown
page write copy
4651000
heap
page read and write
1284000
heap
page read and write
46F1000
heap
page read and write
398E000
stack
page read and write
4A81000
heap
page read and write
5A20000
heap
page read and write
5451000
heap
page read and write
FD4000
heap
page read and write
1284000
heap
page read and write
3F8E000
stack
page read and write
A70000
heap
page read and write
2A3000
unkown
page execute and read and write
55D1000
trusted library allocation
page read and write
4531000
heap
page read and write
5641000
trusted library allocation
page read and write
5675000
trusted library allocation
page read and write
33EE000
stack
page read and write
EA4000
heap
page read and write
25A000
unkown
page execute and write copy
4C70000
direct allocation
page execute and read and write
4531000
heap
page read and write
5A0D000
heap
page read and write
530E000
stack
page read and write
4C91000
heap
page read and write
1284000
heap
page read and write
1C7FF5A6000
heap
page read and write
428F000
stack
page read and write
4A81000
heap
page read and write
4A81000
heap
page read and write
5656000
trusted library allocation
page read and write
352E000
stack
page read and write
7FF7F7FB8000
unkown
page readonly
1C7FDB03000
heap
page read and write
4821000
heap
page read and write
AC4000
heap
page read and write
1C7FF575000
heap
page read and write
4531000
heap
page read and write
6F8CD000
unkown
page readonly
EA4000
heap
page read and write
5BEC000
stack
page read and write
B5F000
heap
page read and write
E50000
heap
page read and write
4A81000
heap
page read and write
4C91000
heap
page read and write
EA4000
heap
page read and write
C3C000
stack
page read and write
1C7FDB28000
heap
page read and write
1C7FF850000
direct allocation
page read and write
D22000
heap
page read and write
7FF8BFAF4000
unkown
page readonly
5280000
direct allocation
page execute and read and write
376000
unkown
page execute and write copy
35BE000
stack
page read and write
E98000
heap
page read and write
546000
unkown
page execute and write copy
4C91000
heap
page read and write
55F8000
trusted library allocation
page read and write
3ACE000
stack
page read and write
36BF000
stack
page read and write
AC0000
heap
page read and write
5542000
heap
page read and write
3F3F000
stack
page read and write
376F000
stack
page read and write
563E000
trusted library allocation
page read and write
D3E000
stack
page read and write
62AF000
stack
page read and write
483E000
stack
page read and write
FD4000
heap
page read and write
59FD000
heap
page read and write
150000
heap
page read and write
4C91000
heap
page read and write
25A000
unkown
page execute and write copy
46F1000
heap
page read and write
4A81000
heap
page read and write
4220000
direct allocation
page read and write
565F000
trusted library allocation
page read and write
3E3E000
stack
page read and write
1284000
heap
page read and write
2B2F000
stack
page read and write
4821000
heap
page read and write
2B7F000
stack
page read and write
2830000
heap
page read and write
1C7FF642000
heap
page read and write
4531000
heap
page read and write
E55000
heap
page read and write
5652000
trusted library allocation
page read and write
AC4000
heap
page read and write
2D2F000
stack
page read and write
56E7000
trusted library allocation
page read and write
56EF000
trusted library allocation
page read and write
5090000
direct allocation
page execute and read and write
7FF7F7F95000
unkown
page readonly
7FF7F7F70000
unkown
page readonly
55E6000
trusted library allocation
page read and write
5652000
trusted library allocation
page read and write
B53000
heap
page read and write
4CB0000
direct allocation
page read and write
3C8E000
stack
page read and write
2F4E000
stack
page read and write
1C7FDAEE000
heap
page read and write
7F4000
unkown
page execute and write copy
42FF000
stack
page read and write
1284000
heap
page read and write
448E000
stack
page read and write
CAE000
stack
page read and write
5AED000
stack
page read and write
70000
unkown
page read and write
22A0000
heap
page read and write
4D60000
direct allocation
page execute and read and write
5A14000
heap
page read and write
2A7E000
stack
page read and write
25A000
unkown
page execute and read and write
55D9000
trusted library allocation
page read and write
4A81000
heap
page read and write
4821000
heap
page read and write
1C7FDB06000
heap
page read and write
3F8F000
stack
page read and write
FD4000
heap
page read and write
A5B000
stack
page read and write
5524000
heap
page read and write
4531000
heap
page read and write
1C7FD270000
heap
page read and write
1284000
heap
page read and write
1C7FF57D000
heap
page read and write
7FF8BFAE7000
unkown
page readonly
38EE000
stack
page read and write
5663000
trusted library allocation
page read and write
F64000
heap
page read and write
4231000
heap
page read and write
1F69CBB0000
heap
page read and write
7FF8A8C35000
unkown
page readonly
4C91000
heap
page read and write
4821000
heap
page read and write
AE0000
direct allocation
page read and write
2D10000
direct allocation
page read and write
46F1000
heap
page read and write
BD0000
heap
page read and write
46F1000
heap
page read and write
4A81000
heap
page read and write
4821000
heap
page read and write
466000
unkown
page execute and write copy
E4E000
stack
page read and write
4C91000
heap
page read and write
1284000
heap
page read and write
1F69CC07000
heap
page read and write
18EE000
stack
page read and write
515E000
stack
page read and write
562E000
trusted library allocation
page read and write
4820000
heap
page read and write
FD4000
heap
page read and write
3B8F000
stack
page read and write
757000
heap
page read and write
4DDD000
stack
page read and write
5A15000
heap
page read and write
4821000
heap
page read and write
156E000
stack
page read and write
4C91000
heap
page read and write
301000
unkown
page execute and write copy
5A15000
heap
page read and write
46F1000
heap
page read and write
5635000
trusted library allocation
page read and write
285E000
stack
page read and write
60AC000
stack
page read and write
539D000
stack
page read and write
4A9E000
stack
page read and write
80E000
unkown
page write copy
4531000
heap
page read and write
4220000
direct allocation
page read and write
D2000
unkown
page execute and write copy
5A15000
heap
page read and write
12A3C000
stack
page read and write
55F8000
trusted library allocation
page read and write
4531000
heap
page read and write
336F000
stack
page read and write
2F4F000
stack
page read and write
4A81000
heap
page read and write
AAF000
unkown
page execute and read and write
4840000
direct allocation
page execute and read and write
7F3000
unkown
page execute and read and write
368F000
stack
page read and write
5090000
direct allocation
page execute and read and write
5A07000
heap
page read and write
304F000
stack
page read and write
1C7FD3E0000
heap
page read and write
5649000
trusted library allocation
page read and write
2E1000
unkown
page execute and read and write
1C7FDAB1000
heap
page read and write
4D70000
direct allocation
page execute and read and write
4531000
heap
page read and write
1F69CBFE000
heap
page read and write
EA4000
heap
page read and write
AE0000
direct allocation
page read and write
4C91000
heap
page read and write
1C7FF9B0000
direct allocation
page read and write
4C91000
heap
page read and write
EA4000
heap
page read and write
D9000
unkown
page write copy
648B000
stack
page read and write
45B000
unkown
page execute and write copy
4531000
heap
page read and write
2D10000
direct allocation
page read and write
357E000
stack
page read and write
107C000
stack
page read and write
5649000
trusted library allocation
page read and write
45D1000
heap
page read and write
EA4000
heap
page read and write
5680000
trusted library allocation
page read and write
7FF7F7FA7000
unkown
page write copy
4C91000
heap
page read and write
FD4000
heap
page read and write
4C91000
heap
page read and write
564A000
trusted library allocation
page read and write
DC7000
heap
page read and write
1284000
heap
page read and write
1C7FDB19000
heap
page read and write
7F3000
unkown
page execute and write copy
B94000
heap
page read and write
4C91000
heap
page read and write
1C7FDAF6000
heap
page read and write
4821000
heap
page read and write
55F5000
trusted library allocation
page read and write
FAA000
heap
page read and write
1C7FF750000
direct allocation
page read and write
4A10000
trusted library allocation
page read and write
2EAF000
stack
page read and write
2F3F000
stack
page read and write
7FF8A8C08000
unkown
page write copy
51CF000
stack
page read and write
4B30000
trusted library allocation
page read and write
4651000
heap
page read and write
55E9000
trusted library allocation
page read and write
7E3000
unkown
page execute and write copy
B0E000
heap
page read and write
286D000
heap
page read and write
2C6E000
stack
page read and write
1C7FFAB9000
heap
page read and write
3F3F000
stack
page read and write
1C7FDAFF000
heap
page read and write
2DC000
unkown
page execute and write copy
EA4000
heap
page read and write
5A0B000
heap
page read and write
1C7FDAE7000
heap
page read and write
4A81000
heap
page read and write
4821000
heap
page read and write
46F1000
heap
page read and write
2CE000
unkown
page execute and read and write
4C91000
heap
page read and write
6C77E000
unkown
page read and write
2A2000
unkown
page execute and read and write
42A000
unkown
page execute and read and write
4C91000
heap
page read and write
FD4000
heap
page read and write
4BB1000
direct allocation
page read and write
7FF7F7F70000
unkown
page readonly
555000
unkown
page execute and write copy
1F69CC0B000
heap
page read and write
124E000
stack
page read and write
4821000
heap
page read and write
4651000
heap
page read and write
538000
unkown
page execute and read and write
1C7FDAEF000
heap
page read and write
358E000
stack
page read and write
4810000
direct allocation
page read and write
282B000
stack
page read and write
2F90000
direct allocation
page read and write
BAB000
stack
page read and write
C64000
heap
page read and write
1284000
heap
page read and write
5A0A000
heap
page read and write
4C1F000
stack
page read and write
E00000
direct allocation
page read and write
2D10000
direct allocation
page read and write
4C30000
direct allocation
page execute and read and write
2BBE000
stack
page read and write
7FF8A8B19000
unkown
page readonly
388F000
stack
page read and write
4C91000
heap
page read and write
546E000
stack
page read and write
4821000
heap
page read and write
1C7FDB2C000
heap
page read and write
5A15000
heap
page read and write
46F1000
heap
page read and write
5A22000
heap
page read and write
46E0000
direct allocation
page read and write
55E6000
trusted library allocation
page read and write
BD7000
heap
page read and write
BE2000
heap
page read and write
5280000
direct allocation
page execute and read and write
38AF000
stack
page read and write
1C7FDB30000
heap
page read and write
5922000
trusted library allocation
page read and write
7FF8A8C56000
unkown
page read and write
4821000
heap
page read and write
267000
unkown
page execute and write copy
3CFE000
stack
page read and write
4821000
heap
page read and write
2F90000
direct allocation
page read and write
498000
unkown
page execute and read and write
1F69CBFE000
heap
page read and write
1C7FFA8C000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
61EB7000
direct allocation
page readonly
353F000
stack
page read and write
5617000
trusted library allocation
page read and write
5A07000
heap
page read and write
5F5E000
stack
page read and write
1C7FD190000
heap
page read and write
236000
unkown
page execute and read and write
46BF000
stack
page read and write
D70000
heap
page read and write
FD4000
heap
page read and write
1C7FFF34000
direct allocation
page read and write
4531000
heap
page read and write
4C91000
heap
page read and write
55E9000
trusted library allocation
page read and write
D2000
unkown
page execute and read and write
46F1000
heap
page read and write
46E0000
direct allocation
page read and write
520E000
stack
page read and write
1C7FF94C000
direct allocation
page read and write
443F000
stack
page read and write
5A22000
heap
page read and write
46F1000
heap
page read and write
4C40000
direct allocation
page execute and read and write
5638000
trusted library allocation
page read and write
46F1000
heap
page read and write
EA4000
heap
page read and write
454E000
stack
page read and write
397E000
stack
page read and write
1E0000
heap
page read and write
5542000
heap
page read and write
2A3000
unkown
page execute and read and write
1C7FFF1C000
direct allocation
page read and write
55EC000
trusted library allocation
page read and write
1C7FFF48000
direct allocation
page read and write
1C7FDAFB000
heap
page read and write
2C7F000
stack
page read and write
8AFD000
heap
page read and write
1F69CC05000
heap
page read and write
1C7FDB5B000
heap
page read and write
5A20000
heap
page read and write
56DF000
trusted library allocation
page read and write
58D1000
trusted library allocation
page read and write
4F00000
direct allocation
page read and write
3CFE000
stack
page read and write
1F69CBFF000
heap
page read and write
3F4F000
stack
page read and write
4C91000
heap
page read and write
112E000
stack
page read and write
FD4000
heap
page read and write
534F000
stack
page read and write
2C8000
unkown
page execute and read and write
1284000
heap
page read and write
1F69CBFE000
heap
page read and write
5678000
trusted library allocation
page read and write
2AEF000
stack
page read and write
136F000
stack
page read and write
7D4000
unkown
page execute and read and write
408F000
stack
page read and write
1284000
heap
page read and write
1C7FD3C2000
heap
page read and write
4531000
heap
page read and write
46F1000
heap
page read and write
5649000
trusted library allocation
page read and write
7FF8A8AD7000
unkown
page readonly
2E9000
unkown
page execute and write copy
CF0000
heap
page read and write
4FAE000
stack
page read and write
2CFE000
stack
page read and write
7FF8BFB59000
unkown
page readonly
46E0000
direct allocation
page read and write
4C91000
heap
page read and write
7FF8BFB56000
unkown
page readonly
CEE000
stack
page read and write
1284000
heap
page read and write
DB000
unkown
page execute and write copy
7FF8BFB31000
unkown
page execute read
2E9000
unkown
page execute and write copy
EA0000
heap
page read and write
7FF8BFB11000
unkown
page read and write
FA0000
heap
page read and write
1284000
heap
page read and write
2B3F000
stack
page read and write
4531000
heap
page read and write
4C91000
heap
page read and write
D9000
unkown
page write copy
25A000
unkown
page execute and read and write
61ED3000
direct allocation
page read and write
407F000
stack
page read and write
4651000
heap
page read and write
2EAE000
stack
page read and write
FD4000
heap
page read and write
1F69CBFE000
heap
page read and write
55EC000
trusted library allocation
page read and write
5652000
trusted library allocation
page read and write
B7C000
heap
page read and write
412F000
stack
page read and write
3FBE000
stack
page read and write
4E20000
direct allocation
page execute and read and write
BBD000
heap
page read and write
4840000
direct allocation
page execute and read and write
4821000
heap
page read and write
AC4000
heap
page read and write
BCF000
stack
page read and write
E0E000
stack
page read and write
1C7FDBA7000
heap
page read and write
There are 2794 hidden memdumps, click here to show them.