IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Program Files\Windows Media Player\graph\graph.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[2].exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\random[1].exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\random[2].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\random[2].exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1019315001\5f0a381314.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1019316001\b2885fa695.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1019317001\72f44ceb0a.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1019318001\4115805b10.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1019319001\b7c03317c9.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1019320001\4cdf81e042.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1019321001\322c3dce5b.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\e458d263c0\Gxtuum.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\main\extracted\in.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f
PNG image data, 438 x 438, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\output[1].png
PNG image data, 438 x 438, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\sendMessage[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0qolotyr.qso.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cymooykj.ued.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_epjltkj1.ctt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mdreki0v.dd0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ryjtbzav.q4g.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vr43atyx.lq1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\main\7z.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\main\7z.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\main\KillDuplicate.cmd
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\main\extracted\AntiAV.data
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\main\extracted\file_1.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\main\extracted\file_2.zip
Zip archive data, at least v1.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\main\extracted\file_3.zip
Zip archive data, at least v1.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\main\extracted\file_4.zip
Zip archive data, at least v1.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\main\extracted\file_5.zip
Zip archive data, at least v1.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\main\extracted\file_6.zip
Zip archive data, at least v1.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\main\extracted\file_7.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\main\file.bin
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\main\file.zip (copy)
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\main\main.bat
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\json[1].json
JSON data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\output[1].png
PNG image data, 438 x 438, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\sendMessage[1].json
JSON data
dropped
C:\Windows\Tasks\Gxtuum.job
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
\Device\ConDrv
Non-ISO extended-ASCII text, with CRLF line terminators
dropped
There are 43 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1019315001\5f0a381314.exe
"C:\Users\user\AppData\Local\Temp\1019315001\5f0a381314.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\main\main.bat" /S"
malicious
C:\Windows\System32\attrib.exe
attrib +H "in.exe"
malicious
C:\Users\user\AppData\Local\Temp\main\in.exe
"in.exe"
malicious
C:\Windows\System32\attrib.exe
attrib +H +S C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
malicious
C:\Windows\System32\attrib.exe
attrib +H C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
malicious
C:\Windows\System32\schtasks.exe
schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell ping 127.0.0.1; del in.exe
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 127.0.0.1
malicious
C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Users\user\AppData\Local\Temp\1019316001\b2885fa695.exe
"C:\Users\user\AppData\Local\Temp\1019316001\b2885fa695.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 127.1.10.1
malicious
C:\Users\user\AppData\Local\Temp\1019317001\72f44ceb0a.exe
"C:\Users\user\AppData\Local\Temp\1019317001\72f44ceb0a.exe"
malicious
C:\Users\user\AppData\Local\Temp\e458d263c0\Gxtuum.exe
"C:\Users\user\AppData\Local\Temp\e458d263c0\Gxtuum.exe"
malicious
C:\Users\user\AppData\Local\Temp\e458d263c0\Gxtuum.exe
C:\Users\user\AppData\Local\Temp\e458d263c0\Gxtuum.exe
malicious
C:\Users\user\AppData\Local\Temp\1019318001\4115805b10.exe
"C:\Users\user\AppData\Local\Temp\1019318001\4115805b10.exe"
malicious
C:\Users\user\AppData\Local\Temp\1019318001\4115805b10.exe
C:\Users\user\AppData\Local\Temp\1019318001\4115805b10.exe
malicious
C:\Users\user\AppData\Local\Temp\1019319001\b7c03317c9.exe
"C:\Users\user\AppData\Local\Temp\1019319001\b7c03317c9.exe"
malicious
C:\Users\user\AppData\Local\Temp\1019320001\4cdf81e042.exe
"C:\Users\user\AppData\Local\Temp\1019320001\4cdf81e042.exe"
malicious
C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 127.1.10.1
malicious
C:\Users\user\AppData\Local\Temp\1019321001\322c3dce5b.exe
"C:\Users\user\AppData\Local\Temp\1019321001\322c3dce5b.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\mode.com
mode 65,10
C:\Users\user\AppData\Local\Temp\main\7z.exe
7z.exe e file.zip -p24291711423417250691697322505 -oextracted
C:\Users\user\AppData\Local\Temp\main\7z.exe
7z.exe e extracted/file_7.zip -oextracted
C:\Users\user\AppData\Local\Temp\main\7z.exe
7z.exe e extracted/file_6.zip -oextracted
C:\Users\user\AppData\Local\Temp\main\7z.exe
7z.exe e extracted/file_5.zip -oextracted
C:\Users\user\AppData\Local\Temp\main\7z.exe
7z.exe e extracted/file_4.zip -oextracted
C:\Users\user\AppData\Local\Temp\main\7z.exe
7z.exe e extracted/file_3.zip -oextracted
C:\Users\user\AppData\Local\Temp\main\7z.exe
7z.exe e extracted/file_2.zip -oextracted
C:\Users\user\AppData\Local\Temp\main\7z.exe
7z.exe e extracted/file_1.zip -oextracted
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Windows Media Player\graph\graph.exe
"C:\Program Files\Windows Media Player\graph\graph.exe"
C:\Program Files\Windows Media Player\graph\graph.exe
"C:\Program Files\Windows Media Player\graph\graph.exe"
C:\Program Files\Windows Media Player\graph\graph.exe
"C:\Program Files\Windows Media Player\graph\graph.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 39 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://212.193.31.8/3ofn3jf3e2ljk2/index.php
212.193.31.8
malicious
treehoneyi.click
malicious
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851?argument=CmXX9uDEYSg7ov7J1734779763
185.121.15.192
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://api.telegram.org/grkrs
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://ipinfo.io/missingauth
unknown
https://cheapptaxysu.click/apiIN
unknown
https://www.google.com/vate
unknown
http://31.41.244.11/files/karl/random.exexe
unknown
https://duckduckgo.com/ac/?q=
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
unknown
https://api.telegram.org/:Gr
unknown
http://31.41.244.11/files/karl/random.exe8476
unknown
https://api.telegram.org/-GB
unknown
https://api.telegram.org/bot
unknown
https://cheapptaxysu.click/api:L_
unknown
https://drive.google.com/uc?id=URL:
unknown
https://cheapptaxysu.click/api%L8
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://www.google.com/aome
unknown
https://ipinfo.io/jsonN/Aipcountry
unknown
aspecteirs.lat
http://31.41.244.11/files/burpin1/random.exe6H
unknown
http://185.215.113.43/Zu7JuNko/index.phpnu
unknown
https://link.storjshare.io/s/jx3obcnqgxa2u364c52wel6vrxba/cardan-shafts/Trazor%20(Software).zip?down
unknown
https://link.storjshare.io/s/jvrb5lh3pynx3et56bisfuuguvoq/cardan-shafts/Electrum%20(Software)(1).zip
unknown
https://docs.google.com/
unknown
https://www.google.com/olhkhi
unknown
https://curl.se/docs/hsts.html
unknown
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
https://payments.google.com/payments/v4/js/integrator.jsBACCDE8AZo
unknown
http://31.41.244.11/files/karl/random.exeO:
unknown
https://cheapptaxysu.click/api5RJ1JZ
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://drive.google.com/
unknown
http://31.41.244.11/files/burpin1/random.exeD
unknown
http://212.193.31.8/3ofn3jf3e2ljk2/index.phpf-
unknown
http://31.41.244.11/files/burpin1/random.exeC
unknown
https://ipinfo.io/json
34.117.59.81
sustainskelet.lat
https://drive-daily-3.corp.google.cosB
unknown
rapeflowwj.lat
http://212.193.31.8/3ofn3jf3e2ljk2/index.phped
unknown
https://github.com/Urijas/moperats/raw/refs/heads/main/ktyihkdfesf.exe
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://link.storjshare.io/s/jwkj6ktyi5kumzjvhrw6bdbvyceq/cardan-shafts/Ledger%20(Software).zip?down
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
unknown
https://cheapptaxysu.click/9
unknown
https://drive.usercontent.google.com/i
unknown
https://api.telegram.org/bot7855878545:AAEEMUvgpX9jTAxlDd2gM_Sbv2jbI6-5_0o/sendMessage?chat_id=7427009775&text=%3Cb%3E%F0%9F%94%94NEW%20VICTIM%20%2D%20Extensions%20Installed%3C%2Fb%3E%0A%3Cb%3EIP%20Address%3A%3C%2Fb%3E%208%2E46%2E123%2E189%0A%3Cb%3EDevice%20Name%3A%3C%2Fb%3E%20494126%0A%3Cb%3ELocation%3A%3C%2Fb%3E%20New%20York%20City%2C%20New%20York%2C%20US%0A%3Cb%3EWallets%3A%3C%2Fb%3E%0A%3Ccode%3ENothing%20found%3C%2Fcode%3E&parse_mode=HTML
149.154.167.220
https://api.telegram.org/ogle
unknown
http://31.41.244.11/files/karl/random.exe
unknown
https://chrome.google.com/webstore
unknown
https://sandbox.google.com/payments/v4/js/integrator.jsCF630DF4
unknown
https://cheapptaxysu.click/apioca
unknown
https://drive-daily-2.corp.google.com/
unknown
https://payments.google.com/payments/v4/js/integrator.js
unknown
https://api.telegram.org/1
unknown
https://drive-daily-4.corp.google.com/
unknown
https://treehoneyi.click/api$
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://payments.google.com/payments/v4/js/integrator.js9A495B9est
unknown
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv17
unknown
https://drive.google.com/uc?id=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://curl.se/docs/alt-svc.html
unknown
https://xmrig.com/wizard
unknown
energyaffai.lat
https://cheapptaxysu.click/Q
unknown
https://cheapptaxysu.click/apiCN
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://31.41.244.11/files/martin/random.exe
unknown
https://drive-daily-5.corp.google.com/
unknown
https://ipinfo.io/D
unknown
https://treehoneyi.click/
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://httpbin.org/ipbefore
unknown
https://treehoneyi.click/api
unknown
https://www.google.com/s
unknown
https://ipinfo.io/
unknown
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851?argument=CmXX9uDEYSg7ov7J1734779763G
unknown
https://ipinfo.io/1
unknown
http://31.41.244.11/files/geopoxid/random.exe
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
unknown
https://drive-preprod.co
unknown
https://ipinfo.io/na
unknown
https://support.microsof
unknown
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851
185.121.15.192
https://payments.google.com/payments/v4/js/integrator.js60335477Zu
unknown
https://drive-preprod.corp.google.com/
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
grannyejh.lat
https://chrome.google.com/webstore-l
unknown
https://sandbox.google.com/
unknown
https://docs.google.com/spreadsheets/installwebapp?usp=chrome_defaultr
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fivetk5ht.top
185.121.15.192
treehoneyi.click
104.21.91.209
cheapptaxysu.click
104.21.67.146
ipinfo.io
34.117.59.81
drive.google.com
172.217.17.46
drive.usercontent.google.com
172.217.17.65
api.telegram.org
149.154.167.220
httpbin.org
98.85.100.80

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
212.193.31.8
unknown
Russian Federation
malicious
127.0.0.1
unknown
unknown
malicious
127.1.10.1
unknown
unknown
malicious
185.121.15.192
home.fivetk5ht.top
Spain
98.85.100.80
httpbin.org
United States
172.217.17.46
drive.google.com
United States
34.117.59.81
ipinfo.io
United States
149.154.167.220
api.telegram.org
United Kingdom
104.21.91.209
treehoneyi.click
United States
172.217.17.65
drive.usercontent.google.com
United States
104.21.67.146
cheapptaxysu.click
United States
31.41.244.11
unknown
Russian Federation
There are 3 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Graph
HKEY_USERS.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
Graph

Memdumps

Base Address
Regiontype
Protect
Malicious
1319000
heap
page read and write
malicious
13C8000
heap
page read and write
malicious
151000
unkown
page execute and read and write
malicious
12F9000
heap
page read and write
malicious
4AB0000
direct allocation
page read and write
malicious
1FE626E0000
unkown
page read and write
malicious
1402DD000
unkown
page readonly
malicious
6D7000
heap
page read and write
malicious
6F9000
heap
page read and write
malicious
1402DD000
unkown
page readonly
malicious
14040B000
unkown
page read and write
malicious
52E0000
direct allocation
page read and write
malicious
714000
heap
page read and write
malicious
4AA0000
direct allocation
page read and write
malicious
14040B000
unkown
page read and write
malicious
AF1000
unkown
page execute and read and write
malicious
151000
unkown
page execute and read and write
malicious
202AA9D0000
unkown
page read and write
malicious
4E61000
heap
page read and write
3FAF000
stack
page read and write
334000
unkown
page execute and read and write
2E2F000
stack
page read and write
7FF6BDA40000
unkown
page readonly
574E000
stack
page read and write
5683000
trusted library allocation
page read and write
4601000
heap
page read and write
46F1000
heap
page read and write
2321000
trusted library allocation
page read and write
4E61000
heap
page read and write
C61A5FF000
stack
page read and write
56C5000
trusted library allocation
page read and write
7FF6BDA5D000
unkown
page read and write
76F0000
direct allocation
page execute and read and write
2E6E000
stack
page read and write
4E61000
heap
page read and write
150000
unkown
page readonly
2A0000
unkown
page readonly
1E365839000
heap
page read and write
B181DFF000
stack
page read and write
5661000
trusted library allocation
page read and write
4601000
heap
page read and write
650E000
stack
page read and write
1294000
heap
page read and write
1D54000
heap
page read and write
3A9E000
stack
page read and write
5693000
trusted library allocation
page read and write
1660000
heap
page read and write
17A1000
heap
page read and write
45D000
unkown
page execute and read and write
2006EC70000
trusted library allocation
page read and write
56B0000
trusted library allocation
page read and write
4601000
heap
page read and write
79CF000
heap
page read and write
4590000
heap
page read and write
7FF69F4CF000
unkown
page write copy
7FF68FAC1000
unkown
page execute read
447000
unkown
page execute and write copy
1E40000
direct allocation
page read and write
7011000
heap
page read and write
31DE000
stack
page read and write
157E000
stack
page read and write
53AE000
stack
page read and write
56BD000
trusted library allocation
page read and write
709000
heap
page read and write
2FCE000
stack
page read and write
7A81000
heap
page read and write
1790000
heap
page read and write
504F000
stack
page read and write
567A000
trusted library allocation
page read and write
CDB000
stack
page read and write
39A000
unkown
page execute and read and write
177C000
heap
page read and write
4E61000
heap
page read and write
23F0000
heap
page read and write
1E365780000
heap
page read and write
1EA2D3B0000
trusted library allocation
page read and write
420000
heap
page read and write
C34000
heap
page read and write
7011000
heap
page read and write
1294000
heap
page read and write
56CD000
trusted library allocation
page read and write
7011000
heap
page read and write
4E61000
heap
page read and write
45F0000
direct allocation
page read and write
4E61000
heap
page read and write
332F000
stack
page read and write
485E000
stack
page read and write
2F30000
heap
page read and write
1370000
trusted library allocation
page read and write
37AE000
stack
page read and write
26810A1C000
heap
page read and write
1621000
heap
page read and write
5683000
trusted library allocation
page read and write
76F0000
direct allocation
page execute and read and write
47653FE000
stack
page read and write
11FA000
heap
page read and write
7FF6BDA40000
unkown
page readonly
DEF000
unkown
page execute and write copy
D8D000
heap
page read and write
1E36581A000
heap
page read and write
568B000
trusted library allocation
page read and write
5200000
remote allocation
page read and write
4601000
heap
page read and write
1504000
heap
page read and write
4601000
heap
page read and write
1D566A00000
heap
page read and write
566B000
trusted library allocation
page read and write
7011000
heap
page read and write
1294000
heap
page read and write
37DF000
stack
page read and write
7011000
heap
page read and write
76F0000
direct allocation
page execute and read and write
4601000
heap
page read and write
17B5000
heap
page read and write
46E0000
direct allocation
page read and write
15B1000
heap
page read and write
26810A06000
heap
page read and write
2032F030000
direct allocation
page read and write
114E000
stack
page read and write
5665000
trusted library allocation
page read and write
39AE000
stack
page read and write
1504000
heap
page read and write
249E000
stack
page read and write
9C0000
unkown
page readonly
248C0560000
heap
page read and write
17E0000
heap
page read and write
DE7000
unkown
page execute and write copy
44C000
heap
page read and write
2A1F000
stack
page read and write
17BE000
heap
page read and write
4601000
heap
page read and write
87FE000
stack
page read and write
569B000
trusted library allocation
page read and write
583D000
trusted library allocation
page read and write
1D5669A0000
heap
page read and write
45E000
unkown
page execute and write copy
150000
unkown
page readonly
1504000
heap
page read and write
C81000
unkown
page execute read
5674000
trusted library allocation
page read and write
2A0000
unkown
page readonly
99E000
stack
page read and write
17DF000
heap
page read and write
7011000
heap
page read and write
AFD000
stack
page read and write
31DC000
stack
page read and write
4E61000
heap
page read and write
41A000
unkown
page readonly
4E61000
heap
page read and write
342000
unkown
page execute and read and write
4E61000
heap
page read and write
5678000
trusted library allocation
page read and write
7011000
heap
page read and write
56C8000
trusted library allocation
page read and write
268109D5000
heap
page read and write
C20000
heap
page read and write
2B9C2360000
trusted library allocation
page read and write
7011000
heap
page read and write
6AEF000
stack
page read and write
54A0000
direct allocation
page execute and read and write
1FDEBC10000
heap
page read and write
1F13000
heap
page read and write
7FF69F4C8000
unkown
page execute and read and write
47D0000
trusted library allocation
page read and write
4E61000
heap
page read and write
2B9C2610000
heap
page read and write
1BB1000
heap
page read and write
FC1000
unkown
page execute read
4D1F000
stack
page read and write
56BC000
trusted library allocation
page read and write
4AEE000
stack
page read and write
1B778330000
heap
page read and write
7FF712291000
unkown
page execute and read and write
C34000
heap
page read and write
CEF000
unkown
page readonly
540000
heap
page read and write
CEF000
unkown
page readonly
3AF000
unkown
page execute and write copy
2B9C2310000
heap
page read and write
700F000
stack
page read and write
26810958000
heap
page read and write
454F000
stack
page read and write
1E365843000
heap
page read and write
D9E000
heap
page read and write
54F0000
direct allocation
page execute and read and write
7011000
heap
page read and write
7011000
heap
page read and write
7FF69F040000
unkown
page readonly
7011000
heap
page read and write
56A1000
trusted library allocation
page read and write
1FE60F30000
heap
page read and write
445E000
stack
page read and write
16C0000
direct allocation
page read and write
140739000
unkown
page readonly
1294000
heap
page read and write
5F096FE000
stack
page read and write
355F000
stack
page read and write
341F000
stack
page read and write
1EA2D1F0000
heap
page read and write
530000
heap
page read and write
17A1000
heap
page read and write
45F0000
direct allocation
page read and write
1E36583D000
heap
page read and write
DE7000
unkown
page execute and write copy
90F000
stack
page read and write
1294000
heap
page read and write
2743F850000
heap
page read and write
1F2E000
heap
page read and write
4601000
heap
page read and write
15BE000
stack
page read and write
5699000
trusted library allocation
page read and write
1294000
heap
page read and write
499E000
stack
page read and write
D79000
unkown
page execute and write copy
4DCB000
stack
page read and write
2B9C23D8000
heap
page read and write
28F0000
direct allocation
page read and write
CCF000
unkown
page readonly
154A000
heap
page read and write
8C14000
heap
page read and write
79585FB000
stack
page read and write
1752000
heap
page read and write
4601000
heap
page read and write
3BF000
unkown
page execute and read and write
566C000
trusted library allocation
page read and write
28F0000
direct allocation
page read and write
C34000
heap
page read and write
45F0000
direct allocation
page read and write
306000
unkown
page read and write
56D2000
trusted library allocation
page read and write
7011000
heap
page read and write
C34000
heap
page read and write
2006EC70000
trusted library allocation
page read and write
D00000
heap
page read and write
268125C2000
heap
page read and write
15B3000
heap
page read and write
396D000
stack
page read and write
A9C19AC000
stack
page read and write
369F000
stack
page read and write
4E61000
heap
page read and write
20CD000
trusted library allocation
page execute and read and write
310E000
stack
page read and write
216F000
stack
page read and write
1D566AA0000
heap
page read and write
17A2000
heap
page read and write
1504000
heap
page read and write
20453120000
heap
page read and write
76F0000
direct allocation
page execute and read and write
46E0000
direct allocation
page read and write
36DE000
stack
page read and write
7FF68FAFA000
unkown
page write copy
268109DE000
heap
page read and write
B3D000
stack
page read and write
26810960000
heap
page read and write
3B9F000
stack
page read and write
1305EFC000
stack
page read and write
604F000
stack
page read and write
4601000
heap
page read and write
76F0000
direct allocation
page execute and read and write
D42000
heap
page read and write
2681096A000
heap
page read and write
B60000
heap
page read and write
16E0000
direct allocation
page read and write
1F06000
heap
page read and write
2006ED80000
heap
page read and write
7700000
direct allocation
page execute and read and write
14FF000
stack
page read and write
5661000
trusted library allocation
page read and write
4CE0000
direct allocation
page execute and read and write
4DC0000
heap
page read and write
1E365820000
heap
page read and write
598F000
stack
page read and write
1FDED780000
direct allocation
page read and write
5460000
direct allocation
page execute and read and write
1294000
heap
page read and write
4E61000
heap
page read and write
DE9000
unkown
page execute and write copy
706C000
stack
page read and write
7011000
heap
page read and write
C80000
unkown
page readonly
17C6000
heap
page read and write
1D94EF10000
direct allocation
page read and write
1B778310000
heap
page read and write
268109CF000
heap
page read and write
45F000
unkown
page execute and read and write
1E3657A0000
trusted library allocation
page read and write
359E000
stack
page read and write
5450000
direct allocation
page execute and read and write
1D94D550000
heap
page read and write
CCF000
unkown
page readonly
30D000
unkown
page readonly
DBA000
unkown
page execute and read and write
CEF000
unkown
page readonly
28D0000
heap
page read and write
1E365836000
heap
page read and write
4E61000
heap
page read and write
2006EC70000
trusted library allocation
page read and write
3D1D000
stack
page read and write
4561A7F000
stack
page read and write
12F0000
heap
page read and write
400000
unkown
page readonly
2B9C2360000
trusted library allocation
page read and write
26810983000
heap
page read and write
1504000
heap
page read and write
28CE000
stack
page read and write
C34000
heap
page read and write
56B0000
trusted library allocation
page read and write
1E365831000
heap
page read and write
7011000
heap
page read and write
1D4E000
stack
page read and write
1E365750000
heap
page read and write
401000
unkown
page execute read
1504000
heap
page read and write
52CF000
stack
page read and write
46F1000
heap
page read and write
520000
heap
page read and write
4601000
heap
page read and write
7011000
heap
page read and write
4E61000
heap
page read and write
3A9E000
stack
page read and write
1D54000
heap
page read and write
C34000
heap
page read and write
CCF000
unkown
page readonly
4E61000
heap
page read and write
4601000
heap
page read and write
1E365822000
heap
page read and write
4E61000
heap
page read and write
4C50000
direct allocation
page execute and read and write
C80000
unkown
page readonly
C34000
heap
page read and write
FA0000
heap
page read and write
6174000
trusted library allocation
page read and write
D68000
unkown
page execute and write copy
44CF000
stack
page read and write
32000
unkown
page readonly
D0E000
heap
page read and write
7011000
heap
page read and write
36E000
unkown
page execute and write copy
7011000
heap
page read and write
4611000
heap
page read and write
1EFF000
heap
page read and write
7011000
heap
page read and write
3D4F000
stack
page read and write
D9E000
heap
page read and write
46F1000
heap
page read and write
1789000
heap
page read and write
5686000
trusted library allocation
page read and write
56BC000
trusted library allocation
page read and write
1E365837000
heap
page read and write
1504000
heap
page read and write
17F0000
direct allocation
page read and write
C81000
unkown
page execute read
4C00000
direct allocation
page execute and read and write
26810990000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
1770000
remote allocation
page read and write
5696000
trusted library allocation
page read and write
569E000
trusted library allocation
page read and write
1D566ACA000
heap
page read and write
1E36582A000
heap
page read and write
B59000
unkown
page read and write
2EDF000
stack
page read and write
568F000
trusted library allocation
page read and write
447000
unkown
page execute and write copy
7011000
heap
page read and write
2006EC70000
trusted library allocation
page read and write
4A90000
direct allocation
page read and write
3F0F000
stack
page read and write
289000
unkown
page readonly
45E000
unkown
page execute and write copy
26810975000
heap
page read and write
4E61000
heap
page read and write
268109DD000
heap
page read and write
5664000
trusted library allocation
page read and write
5696000
trusted library allocation
page read and write
1E7E000
heap
page read and write
2D4E000
stack
page read and write
5675000
trusted library allocation
page read and write
56AD000
trusted library allocation
page read and write
1FB3D2C1000
heap
page read and write
7221000
heap
page read and write
1D90FDA0000
direct allocation
page read and write
348F000
stack
page read and write
2A6F000
stack
page read and write
56A3000
trusted library allocation
page read and write
1D54000
heap
page read and write
15A4000
heap
page read and write
15E7000
heap
page read and write
D2C000
heap
page read and write
3A5F000
stack
page read and write
1504000
heap
page read and write
3F5F000
stack
page read and write
26810A1C000
heap
page read and write
DAA000
heap
page read and write
4601000
heap
page read and write
130E000
stack
page read and write
1FB3D470000
heap
page read and write
77D0000
direct allocation
page execute and read and write
7FF68FAC0000
unkown
page readonly
1D566ACA000
heap
page read and write
2681095B000
heap
page read and write
15EF000
heap
page read and write
56E0000
trusted library allocation
page read and write
7011000
heap
page read and write
9C1000
unkown
page execute and write copy
4601000
heap
page read and write
17F0000
direct allocation
page read and write
4400000
direct allocation
page read and write
C61A6FD000
stack
page read and write
3ACF000
stack
page read and write
5665000
trusted library allocation
page read and write
148F000
unkown
page execute and read and write
15B3000
heap
page read and write
26FE000
stack
page read and write
1E36582D000
heap
page read and write
4D00000
direct allocation
page execute and read and write
12D0000
heap
page read and write
202A90D0000
heap
page read and write
1D54000
heap
page read and write
334F000
stack
page read and write
26810996000
heap
page read and write
2FE0000
heap
page read and write
D78000
unkown
page execute and read and write
6E5DFCA000
stack
page read and write
1A302FE000
stack
page read and write
56A0000
trusted library allocation
page read and write
1E3657E0000
heap
page read and write
4601000
heap
page read and write
30CF000
stack
page read and write
D8D000
heap
page read and write
A3E80FE000
stack
page read and write
568F000
trusted library allocation
page read and write
7011000
heap
page read and write
46E0000
direct allocation
page read and write
F4A000
heap
page read and write
CCF000
unkown
page readonly
56E1000
trusted library allocation
page read and write
1D94D540000
heap
page read and write
35F000
unkown
page execute and read and write
CEF000
unkown
page readonly
1EA2D6A0000
trusted library allocation
page read and write
7011000
heap
page read and write
345E000
stack
page read and write
4E61000
heap
page read and write
5430000
direct allocation
page execute and read and write
3AE000
unkown
page execute and read and write
395000
unkown
page execute and write copy
CEC000
unkown
page write copy
4601000
heap
page read and write
1D54000
heap
page read and write
5C64000
trusted library allocation
page read and write
39CE000
stack
page read and write
28F0000
direct allocation
page read and write
C34000
heap
page read and write
2900000
heap
page read and write
268109CE000
heap
page read and write
CE2000
unkown
page execute and write copy
70D9AFE000
stack
page read and write
15CC000
heap
page read and write
7FF68FAC0000
unkown
page readonly
268125B0000
heap
page read and write
787D000
heap
page read and write
1F0F000
heap
page read and write
1DF0000
heap
page read and write
2006EC70000
trusted library allocation
page read and write
C80000
heap
page read and write
11FC000
stack
page read and write
15FB000
heap
page read and write
4E61000
heap
page read and write
5650000
heap
page read and write
20453200000
heap
page read and write
7FF69F041000
unkown
page execute and read and write
4601000
heap
page read and write
26810961000
heap
page read and write
45F0000
direct allocation
page read and write
1670000
direct allocation
page read and write
2F7C000
stack
page read and write
44F000
unkown
page execute and write copy
56A7000
trusted library allocation
page read and write
CCF000
unkown
page readonly
6C5000
unkown
page execute and write copy
45F0000
direct allocation
page read and write
41DF000
stack
page read and write
54C0000
direct allocation
page execute and read and write
384F000
stack
page read and write
D21000
heap
page read and write
4D00000
direct allocation
page execute and read and write
DAF000
heap
page read and write
7011000
heap
page read and write
7FF69F4CF000
unkown
page read and write
35E000
unkown
page execute and write copy
7FF6BDA61000
unkown
page readonly
4C70000
direct allocation
page execute and read and write
569B000
trusted library allocation
page read and write
1B9000
unkown
page read and write
3F9E000
stack
page read and write
508F000
stack
page read and write
DFE000
stack
page read and write
CCF000
unkown
page readonly
574F000
stack
page read and write
526E000
stack
page read and write
5697000
trusted library allocation
page read and write
34CE000
stack
page read and write
4700000
heap
page read and write
17A1000
heap
page read and write
7011000
heap
page read and write
7FF68FAFA000
unkown
page read and write
15F9000
heap
page read and write
1E36584F000
heap
page read and write
C81000
unkown
page execute read
4E61000
heap
page read and write
320F000
stack
page read and write
372E000
stack
page read and write
674E000
stack
page read and write
4E61000
heap
page read and write
1868DA00000
direct allocation
page read and write
4E61000
heap
page read and write
7230000
heap
page read and write
377D000
stack
page read and write
7011000
heap
page read and write
5E0F000
stack
page read and write
1E7A000
heap
page read and write
C80000
unkown
page readonly
170A000
heap
page read and write
1504000
heap
page read and write
A3E7BFB000
stack
page read and write
4E7D000
stack
page read and write
D0D000
heap
page read and write
569C000
trusted library allocation
page read and write
4601000
heap
page read and write
B59000
unkown
page write copy
7011000
heap
page read and write
76E0000
direct allocation
page execute and read and write
26810977000
heap
page read and write
460000
unkown
page execute and write copy
5666000
trusted library allocation
page read and write
7FF69F4CF000
unkown
page write copy
248C0630000
heap
page read and write
43CE000
stack
page read and write
56D1000
trusted library allocation
page read and write
1D566A05000
heap
page read and write
CEC000
unkown
page read and write
1AB4A1C0000
heap
page read and write
CEC000
unkown
page read and write
7A90000
heap
page read and write
4E61000
heap
page read and write
4601000
heap
page read and write
CEF000
unkown
page readonly
567B000
trusted library allocation
page read and write
1504000
heap
page read and write
A9C1CFE000
stack
page read and write
4E61000
heap
page read and write
1B2000
unkown
page execute and read and write
C34000
heap
page read and write
26810974000
heap
page read and write
70D972C000
stack
page read and write
4601000
heap
page read and write
306000
unkown
page write copy
17B0000
heap
page read and write
567B000
trusted library allocation
page read and write
1E3661EF000
heap
page read and write
5686000
trusted library allocation
page read and write
1E365829000
heap
page read and write
1EA2CFE0000
heap
page read and write
150000
unkown
page read and write
C80000
unkown
page readonly
17B6000
heap
page read and write
B52000
unkown
page execute and read and write
7011000
heap
page read and write
1E36585C000
heap
page read and write
7011000
heap
page read and write
2110000
heap
page read and write
2743DE70000
heap
page read and write
2B9C2360000
trusted library allocation
page read and write
46DF000
stack
page read and write
7011000
heap
page read and write
566B000
trusted library allocation
page read and write
7011000
heap
page read and write
1868DA10000
heap
page read and write
7801000
heap
page read and write
1E365891000
heap
page read and write
4E61000
heap
page read and write
177E000
heap
page read and write
17CA000
heap
page read and write
7011000
heap
page read and write
57F0000
heap
page read and write
569C000
trusted library allocation
page read and write
141000
unkown
page execute read
4E61000
heap
page read and write
4601000
heap
page read and write
1703000
direct allocation
page read and write
4601000
heap
page read and write
1D94D590000
heap
page read and write
D4C000
heap
page read and write
1294000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
5721000
trusted library allocation
page read and write
1EA2D6A0000
trusted library allocation
page read and write
32DF000
stack
page read and write
F2E000
stack
page read and write
3BA000
unkown
page execute and write copy
434E000
stack
page read and write
1FF000
unkown
page readonly
2B9C2360000
trusted library allocation
page read and write
7011000
heap
page read and write
2E8E000
stack
page read and write
1294000
heap
page read and write
3F9E000
stack
page read and write
1E365865000
heap
page read and write
7011000
heap
page read and write
C80000
unkown
page readonly
7011000
heap
page read and write
2681096A000
heap
page read and write
26810974000
heap
page read and write
268109BA000
heap
page read and write
3BEF000
stack
page read and write
4C20000
direct allocation
page execute and read and write
1FB3D2A0000
heap
page read and write
45DE000
stack
page read and write
A3E7FFF000
stack
page read and write
3DA000
unkown
page execute and read and write
567F000
trusted library allocation
page read and write
2B9C2360000
trusted library allocation
page read and write
568F000
trusted library allocation
page read and write
17F0000
direct allocation
page read and write
7011000
heap
page read and write
2A1000
unkown
page execute read
5693000
trusted library allocation
page read and write
56F1000
trusted library allocation
page read and write
1F0F000
heap
page read and write
459F000
stack
page read and write
D47000
heap
page read and write
338E000
stack
page read and write
D8A000
heap
page read and write
4E61000
heap
page read and write
569B000
trusted library allocation
page read and write
2B9C2360000
trusted library allocation
page read and write
4E61000
heap
page read and write
4601000
heap
page read and write
6CBC000
stack
page read and write
331E000
stack
page read and write
400000
unkown
page readonly
2210000
heap
page execute and read and write
569B000
trusted library allocation
page read and write
395000
unkown
page execute and write copy
20453220000
heap
page read and write
C46000
heap
page read and write
2006EC70000
trusted library allocation
page read and write
3BDE000
stack
page read and write
15F0000
heap
page read and write
7FF69F041000
unkown
page execute and read and write
120F000
stack
page read and write
9E15FFF000
stack
page read and write
1622000
heap
page read and write
4611000
heap
page read and write
43AE000
stack
page read and write
4601000
heap
page read and write
20D7000
trusted library allocation
page execute and read and write
36F000
unkown
page execute and read and write
5698000
trusted library allocation
page read and write
7A7A000
heap
page read and write
15D0000
heap
page read and write
26810964000
heap
page read and write
1E3658C4000
heap
page read and write
7011000
heap
page read and write
7011000
heap
page read and write
569B000
trusted library allocation
page read and write
3EAE000
stack
page read and write
CEC000
unkown
page read and write
5686000
trusted library allocation
page read and write
268109A2000
heap
page read and write
A9C1DFE000
stack
page read and write
2260000
direct allocation
page execute read
3C2E000
stack
page read and write
8BFA000
heap
page read and write
17CF000
heap
page read and write
EEF000
stack
page read and write
268109BA000
heap
page read and write
1E36582C000
heap
page read and write
4601000
heap
page read and write
CEC000
unkown
page read and write
7011000
heap
page read and write
568F000
trusted library allocation
page read and write
56C0000
trusted library allocation
page read and write
7FF6BD9D1000
unkown
page execute read
4600000
heap
page read and write
7011000
heap
page read and write
2C0F000
stack
page read and write
76F0000
direct allocation
page execute and read and write
C81000
unkown
page execute read
5907000
trusted library allocation
page read and write
5687000
trusted library allocation
page read and write
7011000
heap
page read and write
16E0000
direct allocation
page read and write
A3E78FE000
stack
page read and write
46E0000
direct allocation
page read and write
CCF000
unkown
page readonly
7011000
heap
page read and write
36EF000
stack
page read and write
26812590000
remote allocation
page read and write
7A6C000
direct allocation
page read and write
1E3658C2000
heap
page read and write
5693000
trusted library allocation
page read and write
4C60000
direct allocation
page execute and read and write
C80000
unkown
page readonly
5675000
trusted library allocation
page read and write
5670000
trusted library allocation
page read and write
13F5000
heap
page read and write
14042E000
unkown
page read and write
D9A000
heap
page read and write
1FE60CA9000
heap
page read and write
20454C15000
heap
page read and write
1FDEBBD0000
heap
page read and write
1868F3F0000
direct allocation
page read and write
17A1000
heap
page read and write
45F0000
direct allocation
page read and write
CC0000
heap
page read and write
C34000
heap
page read and write
7010000
heap
page read and write
26810A08000
heap
page read and write
1294000
heap
page read and write
27FF000
stack
page read and write
1BFB000
stack
page read and write
2032D640000
heap
page read and write
566C000
trusted library allocation
page read and write
1F13000
heap
page read and write
D43000
heap
page read and write
334000
unkown
page execute and read and write
568F000
trusted library allocation
page read and write
46F1000
heap
page read and write
1B9000
unkown
page write copy
49CF000
stack
page read and write
D70000
unkown
page execute and read and write
342000
unkown
page execute and write copy
578E000
stack
page read and write
1611000
heap
page read and write
7FF69F311000
unkown
page execute and write copy
1EA2D6A0000
trusted library allocation
page read and write
1294000
heap
page read and write
3A6E000
stack
page read and write
7011000
heap
page read and write
4601000
heap
page read and write
6D0000
heap
page read and write
1D94F040000
direct allocation
page read and write
5674000
trusted library allocation
page read and write
7011000
heap
page read and write
A52BCFE000
stack
page read and write
1EA2D3B0000
trusted library allocation
page read and write
70D9BFE000
stack
page read and write
45EF000
stack
page read and write
5450000
direct allocation
page execute and read and write
17F0000
direct allocation
page read and write
5669000
trusted library allocation
page read and write
ECE000
stack
page read and write
16B7019B000
heap
page read and write
16BF000
stack
page read and write
3D0000
unkown
page execute and read and write
50FC000
direct allocation
page read and write
439000
unkown
page execute and write copy
2006EC70000
trusted library allocation
page read and write
56E1000
trusted library allocation
page read and write
567C000
trusted library allocation
page read and write
1A2FEFC000
stack
page read and write
7871000
heap
page read and write
337000
unkown
page execute and read and write
62CE000
stack
page read and write
2006EC70000
trusted library allocation
page read and write
76D0000
direct allocation
page execute and read and write
2006EC70000
trusted library allocation
page read and write
1E365865000
heap
page read and write
D0F000
heap
page read and write
722E000
heap
page read and write
6E5E3FF000
stack
page read and write
2800000
direct allocation
page read and write
2006EC70000
trusted library allocation
page read and write
16B70435000
heap
page read and write
518F000
stack
page read and write
44F000
unkown
page execute and write copy
123B000
stack
page read and write
268109DE000
heap
page read and write
FCF000
stack
page read and write
2D0F000
stack
page read and write
15D0000
heap
page read and write
56BB000
trusted library allocation
page read and write
8FB000
stack
page read and write
56AC000
trusted library allocation
page read and write
2F1000
unkown
page readonly
1504000
heap
page read and write
CEF000
unkown
page readonly
268109C0000
heap
page read and write
1D94D57B000
heap
page read and write
12A0000
heap
page read and write
567A000
trusted library allocation
page read and write
7011000
heap
page read and write
426E000
stack
page read and write
C34000
heap
page read and write
1305FFF000
stack
page read and write
550F000
stack
page read and write
4E61000
heap
page read and write
1621000
heap
page read and write
7011000
heap
page read and write
568F000
trusted library allocation
page read and write
1B77837D000
heap
page read and write
56A2000
trusted library allocation
page read and write
FC0000
unkown
page readonly
5950000
heap
page read and write
202A90D8000
heap
page read and write
45F0000
direct allocation
page read and write
CEF000
unkown
page readonly
20BD000
trusted library allocation
page execute and read and write
4601000
heap
page read and write
17A1000
heap
page read and write
7011000
heap
page read and write
306000
unkown
page read and write
76F0000
direct allocation
page execute and read and write
4E61000
heap
page read and write
1E365815000
heap
page read and write
4601000
heap
page read and write
CCF000
unkown
page readonly
2E4F000
stack
page read and write
7011000
heap
page read and write
2006EC70000
trusted library allocation
page read and write
7011000
heap
page read and write
1F13000
heap
page read and write
56F1000
trusted library allocation
page read and write
57EE000
heap
page read and write
5E4E000
stack
page read and write
CEF000
unkown
page readonly
85C4000
heap
page read and write
1504000
heap
page read and write
1504000
heap
page read and write
5682000
trusted library allocation
page read and write
1E3661F7000
heap
page read and write
54B0000
direct allocation
page execute and read and write
4620000
heap
page read and write
140000000
unkown
page read and write
D13000
heap
page read and write
76F0000
direct allocation
page execute and read and write
1F13000
heap
page read and write
336E000
stack
page read and write
568F000
trusted library allocation
page read and write
568D000
trusted library allocation
page read and write
44EE000
stack
page read and write
569C000
trusted library allocation
page read and write
CF7000
heap
page read and write
C34000
heap
page read and write
1E36588A000
heap
page read and write
61A000
heap
page read and write
4E61000
heap
page read and write
5683000
trusted library allocation
page read and write
7011000
heap
page read and write
1FE60C40000
heap
page read and write
284E000
stack
page read and write
7FF6BD9D0000
unkown
page readonly
56B9000
trusted library allocation
page read and write
1E36583D000
heap
page read and write
366F000
stack
page read and write
564E000
stack
page read and write
D90000
heap
page read and write
7BD2000
direct allocation
page read and write
17C8000
heap
page read and write
4E61000
heap
page read and write
C80000
unkown
page readonly
1FDEBBB0000
heap
page read and write
793E000
stack
page read and write
3064000
heap
page read and write
7011000
heap
page read and write
DD9000
unkown
page execute and write copy
56C5000
trusted library allocation
page read and write
7FF6BD9D1000
unkown
page execute read
7011000
heap
page read and write
1FE60C60000
heap
page read and write
4AA0000
direct allocation
page read and write
4C90000
direct allocation
page execute and read and write
1670000
direct allocation
page read and write
2681099A000
heap
page read and write
448000
unkown
page execute and read and write
7011000
heap
page read and write
50CE000
stack
page read and write
1294000
heap
page read and write
2032D770000
heap
page read and write
C34000
heap
page read and write
4BDF000
stack
page read and write
28F0000
direct allocation
page read and write
2006EC70000
trusted library allocation
page read and write
562F000
stack
page read and write
3F7000
unkown
page execute and write copy
4B01000
direct allocation
page read and write
4E61000
heap
page read and write
1E3658C2000
heap
page read and write
3D8E000
stack
page read and write
D90000
heap
page read and write
7780000
direct allocation
page execute and read and write
5686000
trusted library allocation
page read and write
C34000
heap
page read and write
2032D720000
heap
page read and write
1026000
unkown
page write copy
5668000
trusted library allocation
page read and write
28F0000
direct allocation
page read and write
34B000
unkown
page execute and read and write
337000
unkown
page execute and read and write
30AF000
stack
page read and write
8BEC000
heap
page read and write
C34000
heap
page read and write
42E000
heap
page read and write
4E61000
heap
page read and write
1504000
heap
page read and write
5845000
trusted library allocation
page read and write
45F0000
direct allocation
page read and write
1D90FD80000
heap
page read and write
1D54000
heap
page read and write
3D0000
unkown
page read and write
4C20000
direct allocation
page execute and read and write
46F0000
heap
page read and write
1D54000
heap
page read and write
1EA2D0F0000
heap
page read and write
79581FF000
stack
page read and write
4C20000
direct allocation
page execute and read and write
7011000
heap
page read and write
DA8000
heap
page read and write
7011000
heap
page read and write
628F000
stack
page read and write
7011000
heap
page read and write
7011000
heap
page read and write
5A266FF000
unkown
page read and write
3D1000
unkown
page execute and read and write
448000
unkown
page execute and read and write
421E000
stack
page read and write
26812225000
heap
page read and write
7011000
heap
page read and write
4C40000
direct allocation
page execute and read and write
56D6000
trusted library allocation
page read and write
76F0000
direct allocation
page execute and read and write
1670000
direct allocation
page read and write
4CD0000
direct allocation
page execute and read and write
20E0000
trusted library allocation
page read and write
76F0000
direct allocation
page execute and read and write
38000
unkown
page readonly
7011000
heap
page read and write
5A2667C000
stack
page read and write
1FE000
unkown
page read and write
1500000
heap
page read and write
2B9C2360000
trusted library allocation
page read and write
45616FC000
stack
page read and write
5674000
trusted library allocation
page read and write
7011000
heap
page read and write
1C9000
stack
page read and write
8F0000
heap
page read and write
5686000
trusted library allocation
page read and write
544C000
stack
page read and write
7011000
heap
page read and write
7FF68FAFA000
unkown
page write copy
7011000
heap
page read and write
1D54000
heap
page read and write
1AB4A180000
direct allocation
page read and write
17A1000
heap
page read and write
17BE000
heap
page read and write
20B4000
trusted library allocation
page read and write
5722000
trusted library allocation
page read and write
698E000
stack
page read and write
22FE000
stack
page read and write
4CF0000
direct allocation
page execute and read and write
26810965000
heap
page read and write
248C0635000
heap
page read and write
1BB000
unkown
page execute and write copy
7011000
heap
page read and write
D9D000
heap
page read and write
1D5669C0000
heap
page read and write
15F8000
heap
page read and write
5761000
trusted library allocation
page read and write
7011000
heap
page read and write
7011000
heap
page read and write
C81000
unkown
page execute read
569A000
trusted library allocation
page read and write
5664000
trusted library allocation
page read and write
CEC000
unkown
page write copy
4CBF000
stack
page read and write
7FF6BDA61000
unkown
page readonly
7011000
heap
page read and write
56B1000
trusted library allocation
page read and write
17BD000
heap
page read and write
7011000
heap
page read and write
6B7000
unkown
page execute and read and write
56BC000
trusted library allocation
page read and write
7011000
heap
page read and write
2A4F000
stack
page read and write
D8A000
heap
page read and write
EA0000
heap
page read and write
431F000
stack
page read and write
7740000
direct allocation
page execute and read and write
7011000
heap
page read and write
2006EC70000
trusted library allocation
page read and write
4601000
heap
page read and write
7FC000
stack
page read and write
7011000
heap
page read and write
1406B6000
unkown
page read and write
1504000
heap
page read and write
7011000
heap
page read and write
478F000
stack
page read and write
CBC000
unkown
page execute and write copy
346F000
stack
page read and write
35F000
unkown
page execute and read and write
268125BD000
heap
page read and write
26810A06000
heap
page read and write
CB9000
unkown
page execute and read and write
268109DD000
heap
page read and write
4E61000
heap
page read and write
26810962000
heap
page read and write
7FF6BD9D1000
unkown
page execute read
110E000
stack
page read and write
1868D9B0000
heap
page read and write
4AA0000
direct allocation
page read and write
56D0000
trusted library allocation
page read and write
41E000
unkown
page read and write
4E61000
heap
page read and write
C80000
unkown
page readonly
5691000
trusted library allocation
page read and write
20A0000
trusted library allocation
page read and write
1294000
heap
page read and write
3D0000
unkown
page readonly
F4E000
heap
page read and write
1FE60CA0000
heap
page read and write
1E365891000
heap
page read and write
5200000
remote allocation
page read and write
1294000
heap
page read and write
4E61000
heap
page read and write
4601000
heap
page read and write
56BC000
trusted library allocation
page read and write
56D6000
trusted library allocation
page read and write
3BDE000
stack
page read and write
2700000
direct allocation
page read and write
4E61000
heap
page read and write
7011000
heap
page read and write
7011000
heap
page read and write
7011000
heap
page read and write
7FF71271D000
unkown
page execute and read and write
B5B000
unkown
page execute and write copy
DFD000
unkown
page execute and read and write
56BC000
trusted library allocation
page read and write
1FDEBB70000
heap
page read and write
7011000
heap
page read and write
56CB000
trusted library allocation
page read and write
17F0000
direct allocation
page read and write
8BAC000
stack
page read and write
1397000
unkown
page execute and read and write
D88000
heap
page read and write
7011000
heap
page read and write
569B000
trusted library allocation
page read and write
6CFE000
stack
page read and write
164B000
unkown
page execute and write copy
1670000
direct allocation
page read and write
1D0000
heap
page read and write
C80000
unkown
page readonly
17F0000
direct allocation
page read and write
1D94EEF0000
heap
page read and write
1E365823000
heap
page read and write
76F0000
direct allocation
page execute and read and write
D22000
unkown
page execute and read and write
4E61000
heap
page read and write
7011000
heap
page read and write
4D00000
direct allocation
page execute and read and write
3F7000
unkown
page execute and write copy
D97000
unkown
page execute and write copy
7FF68FAE9000
unkown
page readonly
13A0000
heap
page read and write
4700000
trusted library allocation
page read and write
4E61000
heap
page read and write
7011000
heap
page read and write
7011000
heap
page read and write
140001000
unkown
page execute read
584D000
trusted library allocation
page read and write
1E36583E000
heap
page read and write
1504000
heap
page read and write
A3E7523000
stack
page read and write
360E000
stack
page read and write
5450000
direct allocation
page execute and read and write
7011000
heap
page read and write
3BA000
unkown
page execute and write copy
423000
unkown
page readonly
7011000
heap
page read and write
D13000
heap
page read and write
268109DE000
heap
page read and write
36E000
unkown
page execute and write copy
1011000
unkown
page readonly
610000
heap
page read and write
1294000
heap
page read and write
4601000
heap
page read and write
7011000
heap
page read and write
B70000
heap
page read and write
17A1000
heap
page read and write
1504000
heap
page read and write
3A2000
unkown
page execute and write copy
56D4000
trusted library allocation
page read and write
975000
heap
page read and write
1504000
heap
page read and write
1E365D40000
trusted library allocation
page read and write
17F0000
direct allocation
page read and write
460000
unkown
page execute and write copy
1EC7000
heap
page read and write
7FF68FAE9000
unkown
page readonly
56FA000
trusted library allocation
page read and write
5661000
trusted library allocation
page read and write
D90000
heap
page read and write
D93000
heap
page read and write
1670000
direct allocation
page read and write
1480000
heap
page read and write
D42000
unkown
page execute and write copy
567C000
trusted library allocation
page read and write
16B70430000
heap
page read and write
D8A000
heap
page read and write
1C7000
unkown
page execute and write copy
567B000
trusted library allocation
page read and write
3B2000
unkown
page execute and read and write
4D20000
direct allocation
page execute and read and write
D5A000
unkown
page execute and write copy
531E000
stack
page read and write
2006EC70000
trusted library allocation
page read and write
28F0000
direct allocation
page read and write
1E3657F4000
heap
page read and write
1E36585B000
heap
page read and write
567A000
trusted library allocation
page read and write
7011000
heap
page read and write
268109D1000
heap
page read and write
355F000
stack
page read and write
1D94EF35000
heap
page read and write
2006EC70000
trusted library allocation
page read and write
3A2000
unkown
page execute and write copy
5699000
trusted library allocation
page read and write
102F000
stack
page read and write
17A1000
heap
page read and write
1E3658C4000
heap
page read and write
1EA2D6A0000
trusted library allocation
page read and write
567D000
trusted library allocation
page read and write
42A000
heap
page read and write
1AB4A160000
heap
page read and write
125E000
stack
page read and write
670F000
stack
page read and write
A3E7CFF000
stack
page read and write
57E1000
heap
page read and write
1EA2D3B0000
trusted library allocation
page read and write
28F0000
direct allocation
page read and write
17A2000
heap
page read and write
3AAE000
stack
page read and write
3C0F000
stack
page read and write
77A0000
direct allocation
page execute and read and write
6DFE000
stack
page read and write
26810961000
heap
page read and write
781F000
heap
page read and write
3D1000
unkown
page execute and write copy
5698000
trusted library allocation
page read and write
20454AD0000
heap
page read and write
1E365670000
heap
page read and write
5450000
direct allocation
page execute and read and write
141000
unkown
page execute read
4E61000
heap
page read and write
7011000
heap
page read and write
569C000
trusted library allocation
page read and write
4601000
heap
page read and write
14042C000
unkown
page read and write
DFF000
unkown
page execute and read and write
D35000
unkown
page execute and write copy
1484000
heap
page read and write
7011000
heap
page read and write
4601000
heap
page read and write
34B000
unkown
page execute and read and write
572A000
trusted library allocation
page read and write
567A000
trusted library allocation
page read and write
1294000
heap
page read and write
435E000
stack
page read and write
7FF71271F000
unkown
page write copy
40DE000
stack
page read and write
45D000
unkown
page execute and write copy
46F1000
heap
page read and write
4601000
heap
page read and write
3FB000
unkown
page execute and read and write
567A000
trusted library allocation
page read and write
9E15EFC000
stack
page read and write
47AF8FE000
stack
page read and write
4601000
heap
page read and write
352F000
stack
page read and write
1690000
heap
page read and write
7FF69F4C8000
unkown
page execute and read and write
2F1000
unkown
page readonly
D5E000
heap
page read and write
1D911870000
heap
page read and write
1F27000
heap
page read and write
1294000
heap
page read and write
15A9000
heap
page read and write
7011000
heap
page read and write
1E60000
direct allocation
page execute and read and write
4601000
heap
page read and write
C80000
unkown
page readonly
1697000
heap
page read and write
6C00000
heap
page read and write
1FE60C30000
heap
page read and write
56E8000
trusted library allocation
page read and write
4ADC000
stack
page read and write
20454AF0000
heap
page read and write
DAA000
heap
page read and write
C34000
heap
page read and write
56A7000
trusted library allocation
page read and write
558D000
stack
page read and write
1170000
heap
page read and write
7011000
heap
page read and write
5678000
trusted library allocation
page read and write
13F0000
heap
page read and write
46DF000
stack
page read and write
414E000
stack
page read and write
3D9000
unkown
page execute and write copy
4E61000
heap
page read and write
686000
unkown
page execute and read and write
133A000
stack
page read and write
1C7000
unkown
page execute and write copy
30D000
unkown
page readonly
5678000
trusted library allocation
page read and write
85C0000
heap
page read and write
26810963000
heap
page read and write
26810A08000
heap
page read and write
4B80000
direct allocation
page read and write
CCA000
heap
page read and write
C34000
heap
page read and write
2032F010000
direct allocation
page read and write
5662000
trusted library allocation
page read and write
1700000
direct allocation
page readonly
C34000
heap
page read and write
EBA000
stack
page read and write
248C0580000
heap
page read and write
4601000
heap
page read and write
3E1F000
stack
page read and write
CE0000
heap
page read and write
3B9F000
stack
page read and write
4E61000
heap
page read and write
1F25000
heap
page read and write
148F000
unkown
page execute and write copy
C34000
heap
page read and write
CD6000
unkown
page execute and write copy
1E365822000
heap
page read and write
D8A000
heap
page read and write
7011000
heap
page read and write
1288000
unkown
page execute and read and write
B67000
unkown
page execute and write copy
4601000
heap
page read and write
2E68000
direct allocation
page execute read
449000
unkown
page execute and write copy
680000
heap
page read and write
56C9000
trusted library allocation
page read and write
143E000
stack
page read and write
391F000
stack
page read and write
471E000
stack
page read and write
7011000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
1626000
heap
page read and write
1294000
heap
page read and write
5AFC000
direct allocation
page read and write
17CF000
heap
page read and write
17CF000
heap
page read and write
4FBD000
stack
page read and write
4601000
heap
page read and write
1E36582D000
heap
page read and write
1FB3D270000
heap
page read and write
7011000
heap
page read and write
1D54000
heap
page read and write
C8C000
stack
page read and write
C34000
heap
page read and write
5694000
trusted library allocation
page read and write
7011000
heap
page read and write
1670000
direct allocation
page read and write
7011000
heap
page read and write
7FF68FAE9000
unkown
page readonly
46E0000
direct allocation
page read and write
7BC0000
heap
page read and write
5699000
trusted library allocation
page read and write
7011000
heap
page read and write
7011000
heap
page read and write
56AD000
trusted library allocation
page read and write
CEF000
unkown
page readonly
4601000
heap
page read and write
1B778368000
heap
page read and write
20B3000
trusted library allocation
page execute and read and write
6200000
direct allocation
page read and write
1E36582F000
heap
page read and write
1E365837000
heap
page read and write
C34000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
67E6000
heap
page read and write
2FCE000
stack
page read and write
15CC000
heap
page read and write
7FF6BDA5D000
unkown
page write copy
2BEE000
stack
page read and write
2F1000
unkown
page readonly
D4C000
heap
page read and write
B18190D000
stack
page read and write
DB4C3FF000
stack
page read and write
26810A08000
heap
page read and write
AF1000
unkown
page execute and write copy
C20000
heap
page read and write
4E61000
heap
page read and write
12FC000
stack
page read and write
2900000
heap
page read and write
2006EC70000
trusted library allocation
page read and write
CEF000
unkown
page readonly
26810994000
heap
page read and write
44D000
unkown
page execute and read and write
41E000
unkown
page write copy
1D54000
heap
page read and write
1D94D570000
heap
page read and write
D94000
heap
page read and write
45617FE000
stack
page read and write
462000
heap
page read and write
4E61000
heap
page read and write
7011000
heap
page read and write
4C30000
direct allocation
page execute and read and write
26810976000
heap
page read and write
970000
heap
page read and write
1589000
heap
page read and write
46F1000
heap
page read and write
DBB000
stack
page read and write
374E000
stack
page read and write
447000
heap
page read and write
C34000
heap
page read and write
1868F3E5000
heap
page read and write
D2A000
heap
page read and write
456177D000
stack
page read and write
7011000
heap
page read and write
C34000
heap
page read and write
530E000
stack
page read and write
1EA2D6A0000
trusted library allocation
page read and write
2AAE000
stack
page read and write
46E0000
direct allocation
page read and write
1FB3D2AD000
heap
page read and write
7900000
trusted library allocation
page read and write
7011000
heap
page read and write
1F13000
heap
page read and write
566F000
trusted library allocation
page read and write
7011000
heap
page read and write
7011000
heap
page read and write
127C000
stack
page read and write
CCF000
unkown
page readonly
1D50000
heap
page read and write
1108000
unkown
page execute and read and write
1E3E000
stack
page read and write
356E000
stack
page read and write
F7C000
stack
page read and write
4601000
heap
page read and write
CEC000
unkown
page write copy
268109D5000
heap
page read and write
56A7000
trusted library allocation
page read and write
17A1000
heap
page read and write
7011000
heap
page read and write
7957FFE000
stack
page read and write
4F7D000
stack
page read and write
5701000
trusted library allocation
page read and write
49AF000
stack
page read and write
423000
unkown
page readonly
7011000
heap
page read and write
410F000
stack
page read and write
47AF7FE000
stack
page read and write
1D566AA8000
heap
page read and write
567A000
trusted library allocation
page read and write
1E36582B000
heap
page read and write
28F0000
direct allocation
page read and write
26810996000
heap
page read and write
567F000
trusted library allocation
page read and write
BDE000
stack
page read and write
4601000
heap
page read and write
1103000
unkown
page execute and read and write
1760000
heap
page read and write
7011000
heap
page read and write
3D8000
unkown
page execute and read and write
5440000
direct allocation
page execute and read and write
1476000
heap
page read and write
B5B000
unkown
page execute and read and write
4601000
heap
page read and write
56B9000
trusted library allocation
page read and write
17C5000
heap
page read and write
56AC000
trusted library allocation
page read and write
5200000
remote allocation
page read and write
2743F855000
heap
page read and write
202A90A0000
heap
page read and write
56F9000
trusted library allocation
page read and write
48B0000
heap
page read and write
4F0F000
stack
page read and write
422000
unkown
page write copy
1611000
heap
page read and write
476527C000
stack
page read and write
3FEE000
stack
page read and write
3321000
trusted library allocation
page read and write
20DA000
trusted library allocation
page execute and read and write
4A0E000
stack
page read and write
7720000
direct allocation
page execute and read and write
1E40000
direct allocation
page read and write
C34000
heap
page read and write
A3E7DFF000
stack
page read and write
1B9000
unkown
page write copy
140001000
unkown
page execute read
C81000
unkown
page execute read
5420000
direct allocation
page execute and read and write
2800000
direct allocation
page read and write
46F1000
heap
page read and write
1E40000
direct allocation
page read and write
1E36582D000
heap
page read and write
61E000
heap
page read and write
1504000
heap
page read and write
1290000
heap
page read and write
C81000
unkown
page execute read
5693000
trusted library allocation
page read and write
26810A06000
heap
page read and write
673E000
stack
page read and write
CCF000
unkown
page readonly
2006EC70000
trusted library allocation
page read and write
7011000
heap
page read and write
1E36584F000
heap
page read and write
7011000
heap
page read and write
4E61000
heap
page read and write
7011000
heap
page read and write
248C039E000
heap
page read and write
17F0000
direct allocation
page read and write
1868F3E0000
heap
page read and write
1E365DB0000
remote allocation
page read and write
447000
unkown
page execute and write copy
6E0E000
stack
page read and write
7770000
direct allocation
page execute and read and write
A3C000
stack
page read and write
7011000
heap
page read and write
47C0000
trusted library allocation
page read and write
46E0000
direct allocation
page read and write
17CF000
heap
page read and write
344000
unkown
page execute and write copy
412E000
stack
page read and write
4E61000
heap
page read and write
56FA000
trusted library allocation
page read and write
5662000
trusted library allocation
page read and write
5669000
trusted library allocation
page read and write
248C0380000
heap
page read and write
7FF6BDA40000
unkown
page readonly
567A000
trusted library allocation
page read and write
4E61000
heap
page read and write
17F0000
direct allocation
page read and write
2032F0B0000
heap
page read and write
5699000
trusted library allocation
page read and write
4C40000
direct allocation
page execute and read and write
15D0000
heap
page read and write
1770000
remote allocation
page read and write
1504000
heap
page read and write
17A1000
heap
page read and write
57A5000
trusted library allocation
page read and write
1294000
heap
page read and write
20E7000
trusted library allocation
page execute and read and write
202A9225000
heap
page read and write
2F6F000
stack
page read and write
1670000
direct allocation
page read and write
1D54000
heap
page read and write
D77000
unkown
page execute and write copy
1EA2D3B0000
trusted library allocation
page read and write
1F25000
heap
page read and write
554E000
stack
page read and write
1756000
heap
page read and write
5F095FE000
stack
page read and write
4C30000
direct allocation
page execute and read and write
2A1000
unkown
page execute read
5698000
trusted library allocation
page read and write
566C000
trusted library allocation
page read and write
BE5000
heap
page read and write
7011000
heap
page read and write
1B9000
unkown
page read and write
215E000
stack
page read and write
1294000
heap
page read and write
C34000
heap
page read and write
2A0F000
stack
page read and write
268109D5000
heap
page read and write
5B3C000
stack
page read and write
7750000
direct allocation
page execute and read and write
1E36581F000
heap
page read and write
64CF000
stack
page read and write
FF0000
heap
page read and write
A3E79FE000
stack
page read and write
4A40000
heap
page read and write
460F000
stack
page read and write
2032F0B5000
heap
page read and write
3AEE000
stack
page read and write
56E8000
trusted library allocation
page read and write
4BDF000
stack
page read and write
C81000
unkown
page execute read
4BBC000
stack
page read and write
569C000
trusted library allocation
page read and write
1EA2D3B0000
trusted library allocation
page read and write
151000
unkown
page execute and write copy
2032F1C0000
direct allocation
page read and write
17E2000
heap
page read and write
C34000
heap
page read and write
395E000
stack
page read and write
569C000
trusted library allocation
page read and write
7011000
heap
page read and write
DA9000
heap
page read and write
56D0000
trusted library allocation
page read and write
2006EA70000
heap
page read and write
5A2687E000
stack
page read and write
E8D000
stack
page read and write
5668000
trusted library allocation
page read and write
1EA2D3B0000
trusted library allocation
page read and write
17F0000
direct allocation
page read and write
1D54000
heap
page read and write
306000
unkown
page write copy
4601000
heap
page read and write
567F000
trusted library allocation
page read and write
35E000
unkown
page execute and write copy
46F1000
heap
page read and write
4611000
heap
page read and write
46E0000
direct allocation
page read and write
9FB000
stack
page read and write
1D54000
heap
page read and write
7FF712290000
unkown
page readonly
5686000
trusted library allocation
page read and write
5341000
direct allocation
page read and write
D7C000
heap
page read and write
5662000
trusted library allocation
page read and write
D8D000
heap
page read and write
7FF68FAC1000
unkown
page execute read
C10000
heap
page read and write
C61A4F9000
stack
page read and write
1E365850000
heap
page read and write
7FF68FAC0000
unkown
page readonly
1E365876000
heap
page read and write
1294000
heap
page read and write
FC0000
unkown
page readonly
4E61000
heap
page read and write
56E0000
trusted library allocation
page read and write
2681096C000
heap
page read and write
4E61000
heap
page read and write
56AC000
trusted library allocation
page read and write
567C000
trusted library allocation
page read and write
7011000
heap
page read and write
388E000
stack
page read and write
7011000
heap
page read and write
46F1000
heap
page read and write
3D7000
unkown
page execute and write copy
17BA000
heap
page read and write
76F0000
direct allocation
page execute and read and write
541F000
stack
page read and write
CEC000
unkown
page write copy
54E0000
direct allocation
page execute and read and write
268109B3000
heap
page read and write
7011000
heap
page read and write
1EA2D3B0000
trusted library allocation
page read and write
7011000
heap
page read and write
46F1000
heap
page read and write
1FB3D2A9000
heap
page read and write
16DB000
stack
page read and write
4A90000
direct allocation
page read and write
7011000
heap
page read and write
4E00000
direct allocation
page read and write
2B5F000
stack
page read and write
17B5000
heap
page read and write
C80000
unkown
page readonly
C3F000
heap
page read and write
4601000
heap
page read and write
57C5000
trusted library allocation
page read and write
7011000
heap
page read and write
397D000
stack
page read and write
13A2000
unkown
page execute and read and write
4601000
heap
page read and write
566F000
trusted library allocation
page read and write
79582FF000
stack
page read and write
309E000
stack
page read and write
1D566ACA000
heap
page read and write
51FE000
stack
page read and write
26810985000
heap
page read and write
56C0000
trusted library allocation
page read and write
7071000
heap
page read and write
5683000
trusted library allocation
page read and write
2006EC70000
trusted library allocation
page read and write
2032D750000
heap
page read and write
140764000
unkown
page readonly
C34000
heap
page read and write
545000
heap
page read and write
CEF000
unkown
page readonly
7011000
heap
page read and write
26810A08000
heap
page read and write
7011000
heap
page read and write
5C0000
heap
page read and write
1FDED680000
direct allocation
page read and write
620000
heap
page read and write
1D90FDE0000
heap
page read and write
26810996000
heap
page read and write
7011000
heap
page read and write
2FF0000
heap
page read and write
7011000
heap
page read and write
160F000
stack
page read and write
566B000
trusted library allocation
page read and write
1E3661E6000
heap
page read and write
7AD000
stack
page read and write
1B778374000
heap
page read and write
4E61000
heap
page read and write
C34000
heap
page read and write
508E000
stack
page read and write
4D00000
direct allocation
page execute and read and write
445F000
stack
page read and write
3D8000
unkown
page execute and read and write
7011000
heap
page read and write
4B80000
direct allocation
page read and write
D45000
heap
page read and write
30EE000
stack
page read and write
28F0000
direct allocation
page read and write
7011000
heap
page read and write
17CA000
heap
page read and write
7957EFE000
stack
page read and write
CEC000
unkown
page write copy
35CF000
stack
page read and write
4C0F000
stack
page read and write
DAA000
heap
page read and write
344000
unkown
page execute and write copy
15CC000
heap
page read and write
268109DE000
heap
page read and write
324E000
stack
page read and write
7011000
heap
page read and write
7011000
heap
page read and write
268109DD000
heap
page read and write
1504000
heap
page read and write
DAA000
heap
page read and write
7900000
trusted library allocation
page read and write
C34000
heap
page read and write
67BE000
stack
page read and write
449000
unkown
page execute and write copy
4611000
heap
page read and write
5683000
trusted library allocation
page read and write
2EFE000
stack
page read and write
319000
unkown
page execute and read and write
7FF68FAE9000
unkown
page readonly
D4C000
stack
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
102D000
unkown
page readonly
2506000
heap
page read and write
7FF68FAC1000
unkown
page execute read
1611000
heap
page read and write
3FB000
unkown
page execute and read and write
C80000
unkown
page readonly
5665000
trusted library allocation
page read and write
7011000
heap
page read and write
342000
unkown
page execute and read and write
5420000
heap
page read and write
1294000
heap
page read and write
4E61000
heap
page read and write
C34000
heap
page read and write
C2A000
heap
page read and write
5693000
trusted library allocation
page read and write
52FF000
stack
page read and write
C34000
heap
page read and write
6B8F000
stack
page read and write
3BC0000
heap
page read and write
DB0000
heap
page read and write
4601000
heap
page read and write
140000
unkown
page readonly
3E5E000
stack
page read and write
5662000
trusted library allocation
page read and write
175D000
stack
page read and write
608E000
stack
page read and write
4E61000
heap
page read and write
4C30000
direct allocation
page execute and read and write
4C30000
direct allocation
page execute and read and write
566B000
trusted library allocation
page read and write
7900000
trusted library allocation
page read and write
5678000
trusted library allocation
page read and write
7011000
heap
page read and write
4E61000
heap
page read and write
1EA2D6A0000
trusted library allocation
page read and write
76F0000
direct allocation
page execute and read and write
44D000
unkown
page execute and read and write
178B000
heap
page read and write
CCE000
heap
page read and write
48D7AFE000
stack
page read and write
17F0000
direct allocation
page read and write
910000
direct allocation
page read and write
567F000
trusted library allocation
page read and write
2F1F000
stack
page read and write
4601000
heap
page read and write
4A9F000
stack
page read and write
1504000
heap
page read and write
C80000
unkown
page readonly
56B9000
trusted library allocation
page read and write
4596000
heap
page read and write
7FF68FAFA000
unkown
page read and write
7A76000
direct allocation
page read and write
1D54000
heap
page read and write
2006EC70000
trusted library allocation
page read and write
1E365841000
heap
page read and write
1D9B000
stack
page read and write
C34000
heap
page read and write
20454C20000
direct allocation
page read and write
1E365869000
heap
page read and write
3D2F000
stack
page read and write
1294000
heap
page read and write
1294000
heap
page read and write
7011000
heap
page read and write
289000
unkown
page readonly
56BC000
trusted library allocation
page read and write
3AF000
unkown
page execute and write copy
37DF000
stack
page read and write
26810A06000
heap
page read and write
319F000
stack
page read and write
1785000
heap
page read and write
7011000
heap
page read and write
569C000
trusted library allocation
page read and write
45DE000
stack
page read and write
202A9220000
heap
page read and write
268121C0000
trusted library allocation
page read and write
17A1000
heap
page read and write
100E000
stack
page read and write
3A00000
direct allocation
page read and write
1504000
heap
page read and write
5480000
direct allocation
page execute and read and write
20C0000
trusted library allocation
page read and write
422F000
stack
page read and write
26810973000
heap
page read and write
56A7000
trusted library allocation
page read and write
268109D1000
heap
page read and write
17F0000
direct allocation
page read and write
7011000
heap
page read and write
4E61000
heap
page read and write
40EF000
stack
page read and write
4601000
heap
page read and write
424000
unkown
page execute and read and write
1AB4BCA0000
heap
page read and write
7011000
heap
page read and write
458E000
stack
page read and write
1294000
heap
page read and write
15CC000
heap
page read and write
18FE000
stack
page read and write
CEF000
unkown
page readonly
F30000
heap
page read and write
1101000
unkown
page execute and read and write
1760000
heap
page read and write
C34000
heap
page read and write
1D911680000
heap
page read and write
26810A06000
heap
page read and write
2006EC70000
trusted library allocation
page read and write
6BEF000
stack
page read and write
7011000
heap
page read and write
77C0000
direct allocation
page execute and read and write
56E1000
trusted library allocation
page read and write
8BBF000
heap
page read and write
7FF68FAFD000
unkown
page readonly
2006EC70000
trusted library allocation
page read and write
2E1E000
stack
page read and write
17A1000
heap
page read and write
1AAB000
heap
page read and write
1B778610000
heap
page read and write
1B778300000
heap
page read and write
7011000
heap
page read and write
2B9C23E4000
heap
page read and write
1D90FDC0000
direct allocation
page read and write
2743DED0000
heap
page read and write
7957CF3000
stack
page read and write
7011000
heap
page read and write
F40000
heap
page read and write
CEF000
unkown
page readonly
46F1000
heap
page read and write
57F6000
trusted library allocation
page read and write
CF0000
heap
page read and write
566B000
trusted library allocation
page read and write
1294000
heap
page read and write
5678000
trusted library allocation
page read and write
5699000
trusted library allocation
page read and write
44AF000
stack
page read and write
5660000
trusted library allocation
page read and write
C34000
heap
page read and write
1E365835000
heap
page read and write
413000
unkown
page execute and read and write
268125BF000
heap
page read and write
950000
direct allocation
page read and write
1A2FFFE000
stack
page read and write
7450000
trusted library allocation
page read and write
5490000
direct allocation
page execute and read and write
C34000
heap
page read and write
AF0000
unkown
page readonly
1DDE000
stack
page read and write
7011000
heap
page read and write
C2E000
heap
page read and write
1E365826000
heap
page read and write
CC000
stack
page read and write
76F0000
direct allocation
page execute and read and write
4E61000
heap
page read and write
7011000
heap
page read and write
2B9C2360000
trusted library allocation
page read and write
1E365E90000
heap
page read and write
CE4000
unkown
page execute and write copy
4601000
heap
page read and write
76F0000
direct allocation
page execute and read and write
26810926000
heap
page read and write
20454BF0000
direct allocation
page read and write
7878000
heap
page read and write
CEB000
unkown
page execute and read and write
7011000
heap
page read and write
7011000
heap
page read and write
1E3661F4000
heap
page read and write
59CE000
stack
page read and write
15D0000
heap
page read and write
285000
unkown
page read and write
1D90FD50000
heap
page read and write
2B9C2360000
trusted library allocation
page read and write
7011000
heap
page read and write
454000
heap
page read and write
7220000
heap
page read and write
7011000
heap
page read and write
430F000
stack
page read and write
1B2000
unkown
page execute and read and write
56E0000
trusted library allocation
page read and write
1AB4BB30000
heap
page read and write
1E365817000
heap
page read and write
2743F770000
direct allocation
page read and write
28FE000
stack
page read and write
3E5E000
stack
page read and write
D4E000
unkown
page execute and read and write
566F000
trusted library allocation
page read and write
149D000
heap
page read and write
4E61000
heap
page read and write
C34000
heap
page read and write
1FB3D260000
heap
page read and write
11F6000
heap
page read and write
2B9C23D0000
heap
page read and write
5650000
heap
page read and write
56C0000
trusted library allocation
page read and write
7011000
heap
page read and write
17CF000
heap
page read and write
26812590000
remote allocation
page read and write
424F000
stack
page read and write
1038DFE000
stack
page read and write
5450000
direct allocation
page execute and read and write
7011000
heap
page read and write
54B0000
heap
page read and write
342000
unkown
page execute and write copy
438F000
stack
page read and write
1E3661EF000
heap
page read and write
567A000
trusted library allocation
page read and write
56BC000
trusted library allocation
page read and write
7FF6BDA61000
unkown
page readonly
7011000
heap
page read and write
1EA2D6A0000
trusted library allocation
page read and write
1E36582C000
heap
page read and write
4D10000
direct allocation
page execute and read and write
2B0F000
stack
page read and write
D0F000
unkown
page execute and read and write
26810A06000
heap
page read and write
1750000
heap
page read and write
7011000
heap
page read and write
4E61000
heap
page read and write
1EA2D6A0000
trusted library allocation
page read and write
4601000
heap
page read and write
288E000
stack
page read and write
7011000
heap
page read and write
26810989000
heap
page read and write
6C10000
heap
page read and write
1BB000
unkown
page execute and write copy
4C20000
direct allocation
page execute and read and write
79580FF000
stack
page read and write
7FF69F040000
unkown
page readonly
AF0000
unkown
page read and write
82DF000
heap
page read and write
C81000
unkown
page execute read
4C90000
direct allocation
page execute and read and write
26810A08000
heap
page read and write
56B0000
trusted library allocation
page read and write
E4E000
stack
page read and write
D8C000
stack
page read and write
1038CFC000
stack
page read and write
2F1F000
stack
page read and write
28F0000
direct allocation
page read and write
2006EA50000
heap
page read and write
7011000
heap
page read and write
1649000
unkown
page execute and read and write
56E9000
trusted library allocation
page read and write
1D54000
heap
page read and write
7FF6BD9D0000
unkown
page readonly
5694000
trusted library allocation
page read and write
31EF000
stack
page read and write
14EE000
stack
page read and write
569C000
trusted library allocation
page read and write
450E000
stack
page read and write
479F000
stack
page read and write
4E61000
heap
page read and write
17A1000
heap
page read and write
17A1000
heap
page read and write
13C0000
heap
page read and write
3D0F000
stack
page read and write
46E0000
direct allocation
page read and write
566B000
trusted library allocation
page read and write
2F20000
heap
page read and write
2B9C2360000
trusted library allocation
page read and write
26812220000
heap
page read and write
76F0000
direct allocation
page execute and read and write
1B778376000
heap
page read and write
428E000
stack
page read and write
13AD000
stack
page read and write
D0D000
heap
page read and write
1504000
heap
page read and write
4611000
heap
page read and write
2681097E000
heap
page read and write
4601000
heap
page read and write
1038EFF000
stack
page read and write
7011000
heap
page read and write
1D5000
heap
page read and write
331E000
stack
page read and write
1106000
unkown
page read and write
C34000
heap
page read and write
1504000
heap
page read and write
17F0000
direct allocation
page read and write
4601000
heap
page read and write
140764000
unkown
page readonly
26810961000
heap
page read and write
4E61000
heap
page read and write
7011000
heap
page read and write
C34000
heap
page read and write
4E61000
heap
page read and write
6C5000
unkown
page execute and read and write
7FF68FAC0000
unkown
page readonly
4E61000
heap
page read and write
4610000
heap
page read and write
694F000
stack
page read and write
F20000
heap
page read and write
381E000
stack
page read and write
7011000
heap
page read and write
7011000
heap
page read and write
3AAF000
stack
page read and write
76F0000
direct allocation
page execute and read and write
1E36582F000
heap
page read and write
56A8000
trusted library allocation
page read and write
41A000
unkown
page execute and read and write
D79000
heap
page read and write
51FF000
stack
page read and write
14042C000
unkown
page read and write
7FF69F040000
unkown
page readonly
54AE000
stack
page read and write
2CDE000
stack
page read and write
1D5668C0000
heap
page read and write
7011000
heap
page read and write
4F4E000
stack
page read and write
D7A000
unkown
page execute and read and write
1EA2CFE9000
heap
page read and write
58DD000
trusted library allocation
page read and write
1F30000
heap
page read and write
1700000
heap
page read and write
FC1000
unkown
page execute read
D84000
heap
page read and write
1481000
unkown
page execute and read and write
7011000
heap
page read and write
1EA2D3B0000
trusted library allocation
page read and write
D7C000
heap
page read and write
5C0E000
stack
page read and write
2B9C2360000
trusted library allocation
page read and write
20B0000
trusted library allocation
page read and write
2FF5000
heap
page read and write
DB4C4FF000
stack
page read and write
2550000
heap
page read and write
7011000
heap
page read and write
A3E7EFF000
stack
page read and write
1EA2D6A0000
trusted library allocation
page read and write
C30000
heap
page read and write
2006EC70000
trusted library allocation
page read and write
7011000
heap
page read and write
56D6000
trusted library allocation
page read and write
76CF000
stack
page read and write
7710000
direct allocation
page execute and read and write
4601000
heap
page read and write
5664000
trusted library allocation
page read and write
569C000
trusted library allocation
page read and write
C34000
heap
page read and write
4870000
heap
page read and write
1504000
heap
page read and write
D8D000
heap
page read and write
7FF69F4CF000
unkown
page read and write
202A91D0000
heap
page read and write
D11000
unkown
page execute and write copy
4B11000
direct allocation
page read and write
1294000
heap
page read and write
569C000
trusted library allocation
page read and write
7FF68FAC1000
unkown
page execute read
1D0E000
stack
page read and write
7011000
heap
page read and write
C34000
heap
page read and write
1504000
heap
page read and write
395E000
stack
page read and write
D0A000
heap
page read and write
7A80000
heap
page read and write
400E000
stack
page read and write
6DCF000
stack
page read and write
7FF71271F000
unkown
page read and write
4CC0000
direct allocation
page execute and read and write
56B4000
trusted library allocation
page read and write
1FB3D665000
heap
page read and write
4601000
heap
page read and write
268125C5000
heap
page read and write
1E365823000
heap
page read and write
15EF000
heap
page read and write
D2A000
heap
page read and write
5690000
trusted library allocation
page read and write
1DF7000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
EE0000
heap
page read and write
40DE000
stack
page read and write
6C6000
unkown
page execute and write copy
140739000
unkown
page readonly
391F000
stack
page read and write
CEF000
unkown
page readonly
2240000
heap
page read and write
1747000
heap
page read and write
5668000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
268125B8000
heap
page read and write
2A5C000
stack
page read and write
2460000
direct allocation
page read and write
3CDF000
stack
page read and write
2E60000
direct allocation
page execute read
D2A000
heap
page read and write
26810890000
heap
page read and write
1A9F000
stack
page read and write
26810964000
heap
page read and write
677E000
stack
page read and write
268109DB000
heap
page read and write
7011000
heap
page read and write
534D000
stack
page read and write
4C20000
direct allocation
page execute and read and write
1026000
unkown
page read and write
FE0000
heap
page read and write
56AA000
trusted library allocation
page read and write
3C8000
unkown
page execute and write copy
C34000
heap
page read and write
D0B000
heap
page read and write
1011000
unkown
page readonly
4601000
heap
page read and write
7FF68FAFD000
unkown
page readonly
4C50000
direct allocation
page execute and read and write
56F1000
trusted library allocation
page read and write
1868DA1A000
heap
page read and write
76F0000
direct allocation
page execute and read and write
3000000
direct allocation
page read and write
4C2C000
stack
page read and write
26810A08000
heap
page read and write
C34000
heap
page read and write
C81000
unkown
page execute read
46F1000
heap
page read and write
D9B000
unkown
page execute and read and write
483D000
stack
page read and write
410F000
stack
page read and write
15F4000
heap
page read and write
45F0000
direct allocation
page read and write
6F6C000
stack
page read and write
17A2000
heap
page read and write
7011000
heap
page read and write
319000
unkown
page execute and read and write
5682000
trusted library allocation
page read and write
56B4000
trusted library allocation
page read and write
34AE000
stack
page read and write
56BB000
trusted library allocation
page read and write
32DF000
stack
page read and write
7011000
heap
page read and write
1504000
heap
page read and write
46E0000
direct allocation
page read and write
5676000
trusted library allocation
page read and write
C34000
heap
page read and write
D88000
heap
page read and write
7011000
heap
page read and write
26810A08000
heap
page read and write
46F1000
heap
page read and write
4E61000
heap
page read and write
910000
heap
page read and write
391F000
stack
page read and write
1FDEBBD5000
heap
page read and write
1E365DB0000
remote allocation
page read and write
1D54000
heap
page read and write
7011000
heap
page read and write
286000
unkown
page write copy
4E61000
heap
page read and write
3CDF000
stack
page read and write
4C20000
direct allocation
page execute and read and write
4C70000
direct allocation
page execute and read and write
291C000
heap
page read and write
56BC000
trusted library allocation
page read and write
3FCF000
stack
page read and write
4E8E000
stack
page read and write
7FF69F4CD000
unkown
page execute and read and write
5683000
trusted library allocation
page read and write
436F000
stack
page read and write
48D79FF000
stack
page read and write
7011000
heap
page read and write
248C0388000
heap
page read and write
1E365876000
heap
page read and write
4E61000
heap
page read and write
15D0000
heap
page read and write
28F0000
direct allocation
page read and write
536F000
stack
page read and write
1BB000
unkown
page execute and write copy
17A1000
heap
page read and write
447000
unkown
page execute and write copy
1E36582E000
heap
page read and write
7011000
heap
page read and write
7FF68FAFD000
unkown
page readonly
56FA000
trusted library allocation
page read and write
17F0000
direct allocation
page read and write
76F0000
direct allocation
page execute and read and write
5686000
trusted library allocation
page read and write
569C000
trusted library allocation
page read and write
41A000
unkown
page execute and read and write
56AC000
trusted library allocation
page read and write
56C0000
trusted library allocation
page read and write
1F05000
heap
page read and write
4E61000
heap
page read and write
1740000
heap
page read and write
4D5E000
stack
page read and write
26810976000
heap
page read and write
14075E000
unkown
page execute read
CCF000
unkown
page readonly
56BD000
trusted library allocation
page read and write
1FE000
unkown
page write copy
4E61000
heap
page read and write
D8D000
heap
page read and write
7011000
heap
page read and write
DEF000
unkown
page execute and write copy
1E365817000
heap
page read and write
26810971000
heap
page read and write
7011000
heap
page read and write
45D000
unkown
page execute and write copy
3D6E000
stack
page read and write
1B778360000
heap
page read and write
4E61000
heap
page read and write
1294000
heap
page read and write
1D54000
heap
page read and write
7FF6BD9D0000
unkown
page readonly
15F0000
heap
page read and write
7011000
heap
page read and write
9C1000
unkown
page execute and read and write
8C03000
heap
page read and write
1294000
heap
page read and write
26810A08000
heap
page read and write
CEC000
unkown
page read and write
2743F860000
heap
page read and write
36F000
unkown
page execute and read and write
F9D000
unkown
page execute and read and write
7011000
heap
page read and write
56BC000
trusted library allocation
page read and write
9E160FE000
stack
page read and write
1670000
direct allocation
page read and write
5F094FD000
stack
page read and write
1580000
heap
page read and write
1E365837000
heap
page read and write
1504000
heap
page read and write
5686000
trusted library allocation
page read and write
20D0000
trusted library allocation
page read and write
D8B000
heap
page read and write
44F000
unkown
page execute and write copy
294E000
stack
page read and write
2743DEA0000
heap
page read and write
7760000
direct allocation
page execute and read and write
5699000
trusted library allocation
page read and write
4601000
heap
page read and write
469F000
stack
page read and write
3E8F000
stack
page read and write
296F000
stack
page read and write
30D000
unkown
page readonly
268108C0000
heap
page read and write
153E000
stack
page read and write
1FDEBBE0000
direct allocation
page read and write
56E0000
trusted library allocation
page read and write
4C30000
direct allocation
page execute and read and write
5654000
heap
page read and write
1294000
heap
page read and write
567B000
trusted library allocation
page read and write
1489000
heap
page read and write
17A1000
heap
page read and write
7FF6BDA5D000
unkown
page write copy
79583FB000
stack
page read and write
4E4F000
stack
page read and write
56AC000
trusted library allocation
page read and write
7FF712718000
unkown
page execute and read and write
324E000
trusted library allocation
page read and write
79CA000
heap
page read and write
56B3000
trusted library allocation
page read and write
1AB4A130000
heap
page read and write
910000
direct allocation
page read and write
1F25000
heap
page read and write
1270000
heap
page read and write
1E3658C4000
heap
page read and write
7FF68FAFA000
unkown
page read and write
7FF69F311000
unkown
page execute and write copy
5662000
trusted library allocation
page read and write
7B0000
heap
page read and write
7011000
heap
page read and write
B181CFF000
stack
page read and write
268109DB000
heap
page read and write
7011000
heap
page read and write
A3E7AFA000
stack
page read and write
2501000
heap
page read and write
D84000
heap
page read and write
569B000
trusted library allocation
page read and write
1E365890000
heap
page read and write
567A000
trusted library allocation
page read and write
C34000
heap
page read and write
DB4C2FA000
stack
page read and write
17B5000
heap
page read and write
4AA0000
direct allocation
page read and write
2045322A000
heap
page read and write
76F0000
direct allocation
page execute and read and write
D0E000
unkown
page execute and write copy
56A4000
trusted library allocation
page read and write
4E61000
heap
page read and write
7FF712561000
unkown
page execute and write copy
1627000
heap
page read and write
CFF000
unkown
page execute and read and write
26810A06000
heap
page read and write
C70000
heap
page read and write
2006EC70000
trusted library allocation
page read and write
1477000
unkown
page execute and read and write
1D54000
heap
page read and write
1BB000
unkown
page execute and read and write
FA5000
heap
page read and write
15D8000
heap
page read and write
C81000
unkown
page execute read
458E000
stack
page read and write
2681092B000
heap
page read and write
1712000
direct allocation
page readonly
1E36585C000
heap
page read and write
5661000
trusted library allocation
page read and write
15FE000
heap
page read and write
1868D9E0000
heap
page read and write
5AE000
stack
page read and write
30D000
unkown
page readonly
476547E000
stack
page read and write
2681095A000
heap
page read and write
56C1000
trusted library allocation
page read and write
170E000
heap
page read and write
268109AB000
heap
page read and write
1294000
heap
page read and write
1D566ACA000
heap
page read and write
1AB4A120000
heap
page read and write
15FB000
heap
page read and write
4D30000
direct allocation
page execute and read and write
C34000
heap
page read and write
2BAF000
stack
page read and write
5661000
trusted library allocation
page read and write
D52000
unkown
page execute and read and write
5683000
trusted library allocation
page read and write
1EA2D1D0000
heap
page read and write
45F0000
direct allocation
page read and write
17BE000
stack
page read and write
56AC000
trusted library allocation
page read and write
74CB000
stack
page read and write
C30000
heap
page read and write
17A0000
heap
page read and write
1BB000
unkown
page execute and read and write
569C000
trusted library allocation
page read and write
B70000
heap
page read and write
2743DEDB000
heap
page read and write
A52BBFE000
stack
page read and write
56BC000
trusted library allocation
page read and write
4BEF000
stack
page read and write
199000
stack
page read and write
11F0000
heap
page read and write
285000
unkown
page write copy
268107B0000
heap
page read and write
4E61000
heap
page read and write
CD7000
unkown
page execute and read and write
7FF68FAC0000
unkown
page readonly
2743DD90000
heap
page read and write
3DA000
unkown
page execute and read and write
3AE000
unkown
page execute and read and write
567A000
trusted library allocation
page read and write
56AA000
trusted library allocation
page read and write
5690000
trusted library allocation
page read and write
1AB4A1E1000
heap
page read and write
1D54000
heap
page read and write
D21000
heap
page read and write
248C0480000
heap
page read and write
4E61000
heap
page read and write
4860000
heap
page execute and read and write
4E61000
heap
page read and write
1868F4F0000
direct allocation
page read and write
2006EC70000
trusted library allocation
page read and write
381E000
stack
page read and write
7011000
heap
page read and write
E4944FF000
stack
page read and write
1294000
heap
page read and write
658000
heap
page read and write
6900000
direct allocation
page read and write
C34000
heap
page read and write
CD4000
unkown
page execute and read and write
CCF000
unkown
page readonly
2006EC70000
trusted library allocation
page read and write
1E365820000
heap
page read and write
C48000
heap
page read and write
1E3661E0000
heap
page read and write
CEC000
unkown
page write copy
C34000
heap
page read and write
3BF000
unkown
page execute and read and write
1294000
heap
page read and write
322E000
stack
page read and write
1294000
heap
page read and write
4610000
heap
page read and write
2006EAA9000
heap
page read and write
2681097D000
heap
page read and write
569C000
trusted library allocation
page read and write
489F000
stack
page read and write
56E000
stack
page read and write
47CE000
stack
page read and write
6ADA000
direct allocation
page read and write
2200000
trusted library allocation
page execute and read and write
2743F790000
direct allocation
page read and write
570A000
trusted library allocation
page read and write
35AF000
stack
page read and write
4601000
heap
page read and write
DEA000
heap
page read and write
3060000
heap
page read and write
1D566ACA000
heap
page read and write
23F5000
heap
page read and write
2B9C2360000
trusted library allocation
page read and write
7011000
heap
page read and write
1A2FF7F000
unkown
page read and write
7011000
heap
page read and write
370F000
stack
page read and write
690000
heap
page read and write
E00000
unkown
page execute and write copy
4CB0000
direct allocation
page execute and read and write
CCF000
unkown
page readonly
3345000
trusted library allocation
page read and write
7011000
heap
page read and write
17DF000
heap
page read and write
440000
heap
page read and write
5774000
trusted library allocation
page read and write
1504000
heap
page read and write
4E61000
heap
page read and write
382000
unkown
page execute and read and write
17BE000
heap
page read and write
7011000
heap
page read and write
4E61000
heap
page read and write
46E0000
direct allocation
page read and write
1D566ACA000
heap
page read and write
5676000
trusted library allocation
page read and write
17B5000
heap
page read and write
5719000
trusted library allocation
page read and write
3D0000
unkown
page execute and read and write
2F8F000
stack
page read and write
A9E000
stack
page read and write
7FF68FAC1000
unkown
page execute read
1FE60CAC000
heap
page read and write
56BE000
trusted library allocation
page read and write
67E0000
heap
page read and write
86FD000
stack
page read and write
16DE000
stack
page read and write
4602000
heap
page read and write
883B000
stack
page read and write
DED000
unkown
page execute and read and write
4E60000
heap
page read and write
569E000
trusted library allocation
page read and write
DAE000
heap
page read and write
7011000
heap
page read and write
4601000
heap
page read and write
4E0E000
stack
page read and write
47AF9FE000
stack
page read and write
7011000
heap
page read and write
2681097F000
heap
page read and write
26810973000
heap
page read and write
46F1000
heap
page read and write
3D7000
unkown
page execute and write copy
6A40000
direct allocation
page read and write
5699000
trusted library allocation
page read and write
2006EC70000
trusted library allocation
page read and write
56F0000
trusted library allocation
page read and write
1E36583B000
heap
page read and write
1E365DB0000
remote allocation
page read and write
26810A06000
heap
page read and write
1BB000
unkown
page execute and write copy
1F0F000
heap
page read and write
1F27000
heap
page read and write
7011000
heap
page read and write
1D566ACA000
heap
page read and write
56E8000
trusted library allocation
page read and write
248C039B000
heap
page read and write
56D3000
trusted library allocation
page read and write
435E000
stack
page read and write
4E61000
heap
page read and write
566B000
trusted library allocation
page read and write
7230000
heap
page read and write
2B9E000
stack
page read and write
C81000
unkown
page execute read
56D4000
trusted library allocation
page read and write
56B9000
trusted library allocation
page read and write
C81000
unkown
page execute read
7FF68FAC1000
unkown
page execute read
76F0000
direct allocation
page execute and read and write
C81000
unkown
page execute read
D8A000
heap
page read and write
1504000
heap
page read and write
150000
unkown
page read and write
D3A000
unkown
page execute and read and write
4601000
heap
page read and write
7490000
direct allocation
page read and write
56AC000
trusted library allocation
page read and write
2006EC70000
trusted library allocation
page read and write
1F25000
heap
page read and write
1755000
heap
page read and write
56D8000
trusted library allocation
page read and write
28F0000
direct allocation
page read and write
46F1000
heap
page read and write
1106000
unkown
page write copy
7FF68FAC0000
unkown
page readonly
1AB4A1CB000
heap
page read and write
280E000
stack
page read and write
9B000
stack
page read and write
7FF68FAFD000
unkown
page readonly
2C9F000
stack
page read and write
1F31000
heap
page read and write
5694000
trusted library allocation
page read and write
4601000
heap
page read and write
56A3000
trusted library allocation
page read and write
26812590000
remote allocation
page read and write
5667000
trusted library allocation
page read and write
1EA2D3C0000
heap
page read and write
50BF000
stack
page read and write
1294000
heap
page read and write
336000
unkown
page execute and write copy
46F1000
heap
page read and write
C34000
heap
page read and write
359E000
stack
page read and write
7011000
heap
page read and write
24F0000
heap
page read and write
567F000
trusted library allocation
page read and write
7957DFE000
stack
page read and write
56AB000
trusted library allocation
page read and write
56E1000
trusted library allocation
page read and write
5670000
trusted library allocation
page read and write
569B000
trusted library allocation
page read and write
2F1000
unkown
page readonly
CEC000
unkown
page read and write
2006EAAC000
heap
page read and write
319F000
stack
page read and write
BE0000
heap
page read and write
369F000
stack
page read and write
2500000
heap
page read and write
8AAB000
stack
page read and write
C34000
heap
page read and write
1670000
direct allocation
page read and write
7011000
heap
page read and write
435E000
stack
page read and write
2681096F000
heap
page read and write
17A1000
heap
page read and write
386E000
stack
page read and write
1E3661F1000
heap
page read and write
2006EC70000
trusted library allocation
page read and write
4C80000
direct allocation
page execute and read and write
1FF000
unkown
page readonly
46F1000
heap
page read and write
5690000
trusted library allocation
page read and write
DFD000
unkown
page execute and write copy
1A3027F000
stack
page read and write
9C0000
unkown
page read and write
569C000
trusted library allocation
page read and write
1504000
heap
page read and write
5661000
trusted library allocation
page read and write
1F0C000
heap
page read and write
568D000
trusted library allocation
page read and write
2F5E000
stack
page read and write
1294000
heap
page read and write
2B9C2360000
trusted library allocation
page read and write
1294000
heap
page read and write
CCF000
unkown
page readonly
5680000
trusted library allocation
page read and write
2A1000
unkown
page execute read
79586FF000
stack
page read and write
1587000
heap
page read and write
56B1000
trusted library allocation
page read and write
2910000
heap
page read and write
4E50000
trusted library allocation
page read and write
C81000
unkown
page execute read
1D94EF30000
heap
page read and write
7FF68FAFD000
unkown
page readonly
1B778615000
heap
page read and write
4A90000
direct allocation
page read and write
431F000
stack
page read and write
56D7000
trusted library allocation
page read and write
7011000
heap
page read and write
177D000
heap
page read and write
13060FF000
stack
page read and write
567A000
trusted library allocation
page read and write
57E0000
heap
page read and write
371000
unkown
page execute and write copy
26810920000
heap
page read and write
305F000
stack
page read and write
1E365820000
heap
page read and write
568F000
trusted library allocation
page read and write
56AC000
trusted library allocation
page read and write
2006EA40000
heap
page read and write
3E1F000
stack
page read and write
14075E000
unkown
page execute read
20EB000
trusted library allocation
page execute and read and write
1E36585B000
heap
page read and write
4601000
heap
page read and write
2A0000
unkown
page readonly
4E61000
heap
page read and write
1D911875000
heap
page read and write
1E3661F1000
heap
page read and write
164E000
stack
page read and write
CEF000
unkown
page readonly
CCF000
unkown
page readonly
7011000
heap
page read and write
4710000
trusted library allocation
page read and write
5693000
trusted library allocation
page read and write
1294000
heap
page read and write
4E61000
heap
page read and write
5450000
direct allocation
page execute and read and write
31C000
unkown
page execute and write copy
3A5F000
stack
page read and write
56CD000
trusted library allocation
page read and write
4E3E000
stack
page read and write
268125C2000
heap
page read and write
1613000
heap
page read and write
459F000
stack
page read and write
26810978000
heap
page read and write
4E61000
heap
page read and write
2B9C2230000
heap
page read and write
1762000
heap
page read and write
4D0D000
stack
page read and write
336000
unkown
page execute and write copy
57F0000
heap
page read and write
47A0000
heap
page read and write
5A267FE000
stack
page read and write
6E5E2FE000
stack
page read and write
2006EC70000
trusted library allocation
page read and write
1E36587C000
heap
page read and write
1D54000
heap
page read and write
7FF6BDA40000
unkown
page readonly
865000
unkown
page execute and write copy
E4942FC000
stack
page read and write
4C1E000
stack
page read and write
268109C1000
heap
page read and write
7011000
heap
page read and write
4C00000
direct allocation
page execute and read and write
20454C10000
heap
page read and write
7FF68FAFD000
unkown
page readonly
7011000
heap
page read and write
16B70190000
heap
page read and write
39A000
unkown
page execute and read and write
1AB4A1A0000
direct allocation
page read and write
56BC000
trusted library allocation
page read and write
4601000
heap
page read and write
2268000
direct allocation
page execute read
7011000
heap
page read and write
1E70000
heap
page read and write
268108E0000
trusted library allocation
page read and write
382F000
stack
page read and write
569B000
trusted library allocation
page read and write
D9E000
heap
page read and write
31C000
unkown
page execute and write copy
1E365847000
heap
page read and write
4D00000
direct allocation
page execute and read and write
DE8000
unkown
page execute and read and write
1E365E95000
heap
page read and write
2100000
trusted library allocation
page read and write
2917000
heap
page read and write
1504000
heap
page read and write
4D00000
direct allocation
page execute and read and write
102D000
unkown
page readonly
1504000
heap
page read and write
7011000
heap
page read and write
1868F2B0000
heap
page read and write
6BBB000
stack
page read and write
569E000
trusted library allocation
page read and write
7011000
heap
page read and write
35EE000
stack
page read and write
140738000
unkown
page read and write
2032D77B000
heap
page read and write
2681096B000
heap
page read and write
16C1000
direct allocation
page execute read
14042E000
unkown
page read and write
548D000
stack
page read and write
2700000
direct allocation
page read and write
1E3658C2000
heap
page read and write
1E365828000
heap
page read and write
1D566AAE000
heap
page read and write
4E61000
heap
page read and write
2681099A000
heap
page read and write
2006EC70000
trusted library allocation
page read and write
4C80000
direct allocation
page execute and read and write
1EA2D6A0000
trusted library allocation
page read and write
1294000
heap
page read and write
4E5F000
stack
page read and write
CEC000
unkown
page read and write
576E000
trusted library allocation
page read and write
1868F3B0000
direct allocation
page read and write
1E36582D000
heap
page read and write
4601000
heap
page read and write
1504000
heap
page read and write
CFE000
unkown
page execute and write copy
7011000
heap
page read and write
16B700E0000
heap
page read and write
76F0000
direct allocation
page execute and read and write
8C11000
heap
page read and write
DF0000
heap
page read and write
5668000
trusted library allocation
page read and write
4C30000
direct allocation
page execute and read and write
439000
unkown
page execute and write copy
4C10000
direct allocation
page execute and read and write
76F0000
direct allocation
page execute and read and write
C34000
heap
page read and write
7FF69F4CD000
unkown
page execute and read and write
1FE60F35000
heap
page read and write
4601000
heap
page read and write
4611000
heap
page read and write
569D000
trusted library allocation
page read and write
1FDEBC1B000
heap
page read and write
16E0000
direct allocation
page read and write
1504000
heap
page read and write
77E0000
direct allocation
page execute and read and write
1294000
heap
page read and write
1FDEBB80000
heap
page read and write
C34000
heap
page read and write
80E000
stack
page read and write
2CEF000
stack
page read and write
41DF000
stack
page read and write
1F0F000
heap
page read and write
8BE000
stack
page read and write
4601000
heap
page read and write
1E365822000
heap
page read and write
7011000
heap
page read and write
1294000
heap
page read and write
578D000
trusted library allocation
page read and write
1670000
direct allocation
page read and write
381E000
stack
page read and write
2006EAA0000
heap
page read and write
7011000
heap
page read and write
36AE000
stack
page read and write
1FB3D660000
heap
page read and write
5699000
trusted library allocation
page read and write
231E000
stack
page read and write
C34000
heap
page read and write
1294000
heap
page read and write
7730000
direct allocation
page execute and read and write
D94000
heap
page read and write
676000
heap
page read and write
56BC000
trusted library allocation
page read and write
45F000
unkown
page execute and read and write
4E61000
heap
page read and write
7FF6BDA5D000
unkown
page read and write
2681098C000
heap
page read and write
4E61000
heap
page read and write
5A2677F000
stack
page read and write
567A000
trusted library allocation
page read and write
1FDED580000
heap
page read and write
2907000
heap
page read and write
46F1000
heap
page read and write
76F0000
direct allocation
page execute and read and write
26810A08000
heap
page read and write
2681099F000
heap
page read and write
7011000
heap
page read and write
4601000
heap
page read and write
C80000
unkown
page readonly
15C9000
heap
page read and write
CFA000
heap
page read and write
568F000
trusted library allocation
page read and write
77B0000
direct allocation
page execute and read and write
C34000
heap
page read and write
48D78FC000
stack
page read and write
E00000
heap
page read and write
2B9C2360000
trusted library allocation
page read and write
4C4E000
stack
page read and write
567F000
trusted library allocation
page read and write
1290000
heap
page read and write
4E61000
heap
page read and write
3ECE000
stack
page read and write
2A1000
unkown
page execute read
7011000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
46F1000
heap
page read and write
476537F000
stack
page read and write
1200000
heap
page read and write
17BD000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
2006EC70000
trusted library allocation
page read and write
CEF000
unkown
page readonly
4C20000
direct allocation
page execute and read and write
1504000
heap
page read and write
7011000
heap
page read and write
54D0000
direct allocation
page execute and read and write
26810975000
heap
page read and write
26810989000
heap
page read and write
1E3661FB000
heap
page read and write
1670000
direct allocation
page read and write
3A00000
direct allocation
page read and write
154E000
heap
page read and write
1504000
heap
page read and write
1E36587E000
heap
page read and write
30000
unkown
page readonly
4601000
heap
page read and write
26810A08000
heap
page read and write
7011000
heap
page read and write
15E8000
heap
page read and write
D5F000
unkown
page execute and read and write
4E61000
heap
page read and write
7011000
heap
page read and write
56EA000
trusted library allocation
page read and write
1504000
heap
page read and write
7011000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
17A2000
heap
page read and write
4E61000
heap
page read and write
1770000
remote allocation
page read and write
CEC000
unkown
page write copy
4601000
heap
page read and write
16B700D0000
heap
page read and write
C81000
unkown
page execute read
3B0E000
stack
page read and write
44F000
unkown
page execute and write copy
422000
unkown
page write copy
1540000
heap
page read and write
C9E000
stack
page read and write
7FF712290000
unkown
page readonly
2A0000
unkown
page readonly
4B40000
heap
page read and write
202A8FC0000
heap
page read and write
C34000
heap
page read and write
66E000
stack
page read and write
50FE000
stack
page read and write
2B9C2330000
heap
page read and write
5661000
trusted library allocation
page read and write
7BD0000
direct allocation
page read and write
4F60000
trusted library allocation
page read and write
7450000
heap
page read and write
DAA000
heap
page read and write
140000000
unkown
page read and write
3324000
trusted library allocation
page read and write
7011000
heap
page read and write
495F000
stack
page read and write
3C8000
unkown
page execute and write copy
1406B6000
unkown
page read and write
454E000
stack
page read and write
7011000
heap
page read and write
140738000
unkown
page read and write
F7E000
stack
page read and write
1504000
heap
page read and write
C34000
heap
page read and write
D4F000
unkown
page execute and write copy
2006EC70000
trusted library allocation
page read and write
4601000
heap
page read and write
28F0000
direct allocation
page read and write
A3E81FB000
stack
page read and write
26810A06000
heap
page read and write
7011000
heap
page read and write
7011000
heap
page read and write
7011000
heap
page read and write
5693000
trusted library allocation
page read and write
3B2000
unkown
page execute and read and write
1D94EF40000
heap
page read and write
76F000
stack
page read and write
C34000
heap
page read and write
2006EC70000
trusted library allocation
page read and write
E4943FE000
stack
page read and write
5674000
trusted library allocation
page read and write
CEC000
unkown
page write copy
5800000
direct allocation
page read and write
4E71000
heap
page read and write
7011000
heap
page read and write
5815000
trusted library allocation
page read and write
140000
unkown
page readonly
370000
unkown
page execute and write copy
7FF6BD9D1000
unkown
page execute read
64FC000
direct allocation
page read and write
CE2000
unkown
page execute and read and write
1D90FC70000
heap
page read and write
16BF000
stack
page read and write
1762000
heap
page read and write
569F000
trusted library allocation
page read and write
56AA000
trusted library allocation
page read and write
1587000
heap
page read and write
5662000
trusted library allocation
page read and write
5683000
trusted library allocation
page read and write
7011000
heap
page read and write
45D000
unkown
page execute and read and write
46E0000
direct allocation
page read and write
4C30000
direct allocation
page execute and read and write
CCF000
unkown
page readonly
3BAC000
stack
page read and write
7DCF000
stack
page read and write
1E3661EE000
heap
page read and write
7011000
heap
page read and write
67E5000
heap
page read and write
45F0000
direct allocation
page read and write
47652FF000
unkown
page read and write
7FF68FAE9000
unkown
page readonly
30EB000
stack
page read and write
A52BAFC000
stack
page read and write
7011000
heap
page read and write
45F0000
direct allocation
page read and write
1D90FDEB000
heap
page read and write
567B000
trusted library allocation
page read and write
1EB3000
heap
page read and write
7FF68FAE9000
unkown
page readonly
7800000
heap
page read and write
1504000
heap
page read and write
41A000
unkown
page readonly
46F1000
heap
page read and write
28F0000
direct allocation
page read and write
3D9000
unkown
page execute and write copy
893C000
stack
page read and write
5674000
trusted library allocation
page read and write
268109B3000
heap
page read and write
16B70100000
heap
page read and write
7FF6BD9D0000
unkown
page readonly
1EA2D6A0000
trusted library allocation
page read and write
4D45000
trusted library allocation
page read and write
7011000
heap
page read and write
59E000
unkown
page execute and read and write
7011000
heap
page read and write
567A000
trusted library allocation
page read and write
CEC000
unkown
page read and write
56D6000
trusted library allocation
page read and write
1E3661F4000
heap
page read and write
26810A08000
heap
page read and write
2D2E000
stack
page read and write
4E61000
heap
page read and write
2032F0C0000
heap
page read and write
2FAE000
stack
page read and write
4E61000
heap
page read and write
1490000
unkown
page execute and write copy
C34000
heap
page read and write
1670000
direct allocation
page read and write
6AE000
unkown
page execute and read and write
6BCE000
stack
page read and write
45F0000
direct allocation
page read and write
3F5F000
stack
page read and write
5470000
direct allocation
page execute and read and write
4601000
heap
page read and write
481F000
stack
page read and write
4E61000
heap
page read and write
449E000
stack
page read and write
1F05000
heap
page read and write
1EA2D3B0000
trusted library allocation
page read and write
864000
unkown
page execute and read and write
1504000
heap
page read and write
67C000
stack
page read and write
26810966000
heap
page read and write
C80000
unkown
page readonly
4E61000
heap
page read and write
566B000
trusted library allocation
page read and write
7011000
heap
page read and write
DFE000
unkown
page execute and write copy
567D000
trusted library allocation
page read and write
4E61000
heap
page read and write
79584FD000
stack
page read and write
3E6F000
stack
page read and write
1EA2D3B0000
trusted library allocation
page read and write
7011000
heap
page read and write
46E0000
direct allocation
page read and write
7A70000
heap
page read and write
15F0000
heap
page read and write
7790000
direct allocation
page execute and read and write
5A3C000
stack
page read and write
450E000
stack
page read and write
1F0F000
heap
page read and write
17CF000
heap
page read and write
7FF6BDA61000
unkown
page readonly
4CB0000
direct allocation
page execute and read and write
1E3657E8000
heap
page read and write
5BCF000
stack
page read and write
17A2000
heap
page read and write
77F0000
direct allocation
page execute and read and write
3C4E000
stack
page read and write
4601000
heap
page read and write
569B000
trusted library allocation
page read and write
568F000
trusted library allocation
page read and write
1670000
direct allocation
page read and write
409F000
stack
page read and write
4B80000
direct allocation
page read and write
568F000
trusted library allocation
page read and write
4601000
heap
page read and write
7FF68FAFA000
unkown
page write copy
26810A06000
heap
page read and write
2DDF000
stack
page read and write
5670000
trusted library allocation
page read and write
7011000
heap
page read and write
17A1000
heap
page read and write
950000
direct allocation
page read and write
4C60000
direct allocation
page execute and read and write
7011000
heap
page read and write
1670000
direct allocation
page read and write
1762000
heap
page read and write
421E000
stack
page read and write
47F0000
trusted library allocation
page read and write
C34000
heap
page read and write
46E0000
direct allocation
page read and write
7011000
heap
page read and write
1780000
heap
page read and write
26810A06000
heap
page read and write
17A1000
heap
page read and write
341F000
stack
page read and write
345E000
stack
page read and write
1E36584F000
heap
page read and write
1D566ACA000
heap
page read and write
4C10000
direct allocation
page execute and read and write
7FF69F040000
unkown
page readonly
151000
unkown
page execute and write copy
7070000
heap
page read and write
7011000
heap
page read and write
D13000
heap
page read and write
445F000
stack
page read and write
C34000
heap
page read and write
398F000
stack
page read and write
4BC2000
direct allocation
page read and write
3D1E000
stack
page read and write
4595000
heap
page read and write
D8D000
heap
page read and write
396F000
stack
page read and write
C34000
heap
page read and write
1D54000
heap
page read and write
7011000
heap
page read and write
1E365818000
heap
page read and write
382000
unkown
page execute and read and write
1868D8D0000
heap
page read and write
45F0000
direct allocation
page read and write
3000000
direct allocation
page read and write
15CC000
heap
page read and write
2006EC70000
trusted library allocation
page read and write
C34000
heap
page read and write
C80000
unkown
page readonly
552E000
stack
page read and write
47AF6FC000
stack
page read and write
24DE000
stack
page read and write
1E365820000
heap
page read and write
3B0F000
stack
page read and write
36DE000
stack
page read and write
7011000
heap
page read and write
401000
unkown
page execute read
69EF000
stack
page read and write
1AB4BCA5000
heap
page read and write
409F000
stack
page read and write
4ADE000
stack
page read and write
449E000
stack
page read and write
There are 2927 hidden memdumps, click here to show them.