IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Program Files\Windows Media Player\graph\graph.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[2].exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\random[1].exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\random[2].exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\random[2].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1019522001\0516ff61af.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1019523001\abcebc1047.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1019524001\6eea3e30e9.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1019525001\8aec52a3fa.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1019526001\1b73492cb0.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1019527001\ed15fdf974.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\e458d263c0\Gxtuum.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\main\extracted\in.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f
PNG image data, 438 x 438, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\output[1].png
PNG image data, 438 x 438, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\sendMessage[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_20xasgg3.h1z.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ishseepu.0zw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nuy5ucmd.rba.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z3huhx22.ctr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\main\7z.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\main\7z.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\main\KillDuplicate.cmd
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\main\extracted\AntiAV.data
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\main\extracted\file_1.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\main\extracted\file_2.zip
Zip archive data, at least v1.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\main\extracted\file_3.zip
Zip archive data, at least v1.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\main\extracted\file_4.zip
Zip archive data, at least v1.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\main\extracted\file_5.zip
Zip archive data, at least v1.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\main\extracted\file_6.zip
Zip archive data, at least v1.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\main\extracted\file_7.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\main\file.bin
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\main\file.zip (copy)
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\main\main.bat
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\json[1].json
JSON data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\output[1].png
PNG image data, 438 x 438, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\sendMessage[1].json
JSON data
dropped
C:\Windows\Tasks\Gxtuum.job
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped
There are 40 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1019522001\0516ff61af.exe
"C:\Users\user\AppData\Local\Temp\1019522001\0516ff61af.exe"
malicious
C:\Users\user\AppData\Local\Temp\1019523001\abcebc1047.exe
"C:\Users\user\AppData\Local\Temp\1019523001\abcebc1047.exe"
malicious
C:\Users\user\AppData\Local\Temp\e458d263c0\Gxtuum.exe
"C:\Users\user\AppData\Local\Temp\e458d263c0\Gxtuum.exe"
malicious
C:\Users\user\AppData\Local\Temp\e458d263c0\Gxtuum.exe
C:\Users\user\AppData\Local\Temp\e458d263c0\Gxtuum.exe
malicious
C:\Users\user\AppData\Local\Temp\1019524001\6eea3e30e9.exe
"C:\Users\user\AppData\Local\Temp\1019524001\6eea3e30e9.exe"
malicious
C:\Users\user\AppData\Local\Temp\1019524001\6eea3e30e9.exe
C:\Users\user\AppData\Local\Temp\1019524001\6eea3e30e9.exe
malicious
C:\Users\user\AppData\Local\Temp\1019525001\8aec52a3fa.exe
"C:\Users\user\AppData\Local\Temp\1019525001\8aec52a3fa.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\main\main.bat" /S"
malicious
C:\Windows\System32\attrib.exe
attrib +H "in.exe"
malicious
C:\Users\user\AppData\Local\Temp\main\in.exe
"in.exe"
malicious
C:\Windows\System32\attrib.exe
attrib +H +S C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
malicious
C:\Windows\System32\attrib.exe
attrib +H C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
malicious
C:\Windows\System32\schtasks.exe
schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell ping 127.0.0.1; del in.exe
malicious
C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 127.0.0.1
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 127.1.10.1
malicious
C:\Users\user\AppData\Local\Temp\1019526001\1b73492cb0.exe
"C:\Users\user\AppData\Local\Temp\1019526001\1b73492cb0.exe"
malicious
C:\Users\user\AppData\Local\Temp\1019527001\ed15fdf974.exe
"C:\Users\user\AppData\Local\Temp\1019527001\ed15fdf974.exe"
malicious
C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
malicious
C:\Users\user\AppData\Local\Temp\e458d263c0\Gxtuum.exe
C:\Users\user\AppData\Local\Temp\e458d263c0\Gxtuum.exe
malicious
C:\Program Files\Windows Media Player\graph\graph.exe
"C:\Program Files\Windows Media Player\graph\graph.exe"
C:\Program Files\Windows Media Player\graph\graph.exe
"C:\Program Files\Windows Media Player\graph\graph.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\mode.com
mode 65,10
C:\Users\user\AppData\Local\Temp\main\7z.exe
7z.exe e file.zip -p24291711423417250691697322505 -oextracted
C:\Users\user\AppData\Local\Temp\main\7z.exe
7z.exe e extracted/file_7.zip -oextracted
C:\Users\user\AppData\Local\Temp\main\7z.exe
7z.exe e extracted/file_6.zip -oextracted
C:\Users\user\AppData\Local\Temp\main\7z.exe
7z.exe e extracted/file_5.zip -oextracted
C:\Users\user\AppData\Local\Temp\main\7z.exe
7z.exe e extracted/file_4.zip -oextracted
C:\Users\user\AppData\Local\Temp\main\7z.exe
7z.exe e extracted/file_3.zip -oextracted
C:\Users\user\AppData\Local\Temp\main\7z.exe
7z.exe e extracted/file_2.zip -oextracted
C:\Users\user\AppData\Local\Temp\main\7z.exe
7z.exe e extracted/file_1.zip -oextracted
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Windows Media Player\graph\graph.exe
"C:\Program Files\Windows Media Player\graph\graph.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Windows Media Player\graph\graph.exe
"C:\Program Files\Windows Media Player\graph\graph.exe"
There are 36 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://ipinfo.io/missingauth
unknown
https://duckduckgo.com/ac/?q=
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://cheapptaxysu.click
unknown
https://ipinfo.io/jsonN/Aipcountry
unknown
aspecteirs.lat
https://link.storjshare.io/s/jx3obcnqgxa2u364c52wel6vrxba/cardan-shafts/Trazor%20(Software).zip?down
unknown
https://link.storjshare.io/s/jvrb5lh3pynx3et56bisfuuguvoq/cardan-shafts/Electrum%20(Software)(1).zip
unknown
https://docs.google.com/
unknown
https://payments.goo
unknown
https://api.telegram.org/pb
unknown
https://ipinfo.io/json_
unknown
https://ipinfo.io/json
34.117.59.81
https://chrome.google.com/webstoreu
unknown
https://sandbox.google.com/payments/v4/js/integrator.js1BACCDE8yst
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://31.41.244.11/files/karl/random.exeSSC:
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
unknown
https://ipinfo.io/jsonj1O
unknown
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851?argume4
unknown
https://chrome.google.com/webstoreb
unknown
http://31.41.244.11/files/karl/random.exe
31.41.244.11
https://www.google.com/X
unknown
https://chrome.google.com/webstore
unknown
http://31.41.244.11/files/geopoxid/random.exeh
unknown
https://drive-daily-2.corp.google.com/
unknown
https://payments.google.com/payments/v4/js/integrator.js
unknown
http://31.41.244.11/files/geopoxid/random.exei
unknown
http://31.41.244.11/files/burpin1/random.exe_
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv17
unknown
https://drive.google.com/uc?id=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://xmrig.com/wizard
unknown
energyaffai.lat
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
http://31.41.244.11/files/martin/random.exe
unknown
https://drive-daily-5.corp.google.com/
unknown
https://treehoneyi.click/api6
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851?argume
unknown
https://httpbin.org/ipbefore
unknown
https://treehoneyi.click/api
unknown
https://cheapptaxysu.click/77
unknown
https://ipinfo.io/
unknown
http://31.41.244.11/files/geopoxid/random.exe
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
unknown
https://chrome.google.com/webstoreD
unknown
https://drive-preprod.co
unknown
https://api.telegram.org/-application-key
unknown
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851
185.121.15.192
https://drive-preprod.corp.google.com/
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
grannyejh.lat
https://sandbox.google.com/
unknown
https://api.telegram.org/rn
unknown
http://html4/loose.dtd
unknown
http://ocsp.sectigo.com0
unknown
https://api.telegram.org/j
unknown
https://drive-autopush.co
unknown
necklacebudi.lat
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
https://api.telegram.org/r
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
http://31.41.244.11/files/geopoxid/random.exe1
unknown
https://api.telegram.org/Z
unknown
http://.css
unknown
https://api.telegram.org/G
unknown
http://31.41.244.11/files/zhigarko/random.exeu
unknown
https://cheapptaxysu.click:443/api
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://api.telegram.org/
unknown
https://www.google.com/le.com
unknown
https://api.telegram.org/edia
unknown
crosshuaht.lat
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851?argument=uKsqdVCOyF9DZVCd1734801424L
unknown
http://31.41.244.11/files/martin/random.exe.
unknown
https://api.telegram.org/:
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://.jpg
unknown
https://docs.google.co0
unknown
https://api.telegram.org/C
unknown
http://31.41.244.11/files/karl/random.exeegUF
unknown
https://api.telegram.org/bot7855878545:AAEEMUvgpX9jTAxlDd2gM_Sbv2jbI6-5_0o
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://drive-autopush.corp.google.com/
unknown
https://drive.usercontent.google.com/
unknown
https://httpbin.org/ip
34.226.108.155
http://31.41.244.11/files/burpin1/random.exe
unknown
https://drive.usercontent.google.com/(F
unknown
http://home.fivetk5ht.top/zldPR
unknown
https://docs.google.com/presentation/installwebapp?usp=chrome_defaultc
unknown
https://www.cloudflare.com/learni
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fivetk5ht.top
185.121.15.192
treehoneyi.click
172.67.180.113
cheapptaxysu.click
104.21.67.146
ipinfo.io
34.117.59.81
drive.google.com
172.217.17.46
drive.usercontent.google.com
172.217.17.65
api.telegram.org
149.154.167.220
httpbin.org
34.226.108.155

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
127.0.0.1
unknown
unknown
malicious
127.1.10.1
unknown
unknown
malicious
185.121.15.192
home.fivetk5ht.top
Spain
212.193.31.8
unknown
Russian Federation
172.217.17.46
drive.google.com
United States
34.117.59.81
ipinfo.io
United States
149.154.167.220
api.telegram.org
United Kingdom
34.226.108.155
httpbin.org
United States
172.217.17.65
drive.usercontent.google.com
United States
104.21.67.146
cheapptaxysu.click
United States
31.41.244.11
unknown
Russian Federation
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Graph
HKEY_USERS.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
Graph

Memdumps

Base Address
Regiontype
Protect
Malicious
1100000
direct allocation
page readonly
malicious
361000
unkown
page execute and read and write
malicious
361000
unkown
page execute and read and write
malicious
17227910000
unkown
page read and write
malicious
14040B000
unkown
page read and write
malicious
DA1000
unkown
page execute and read and write
malicious
B5A000
heap
page read and write
malicious
B39000
heap
page read and write
malicious
131C27B0000
unkown
page read and write
malicious
1402DD000
unkown
page readonly
malicious
361000
unkown
page execute and read and write
malicious
27997630000
trusted library allocation
page read and write
145E000
heap
page read and write
2479E985000
heap
page read and write
140C000
heap
page read and write
4691000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
2479E91B000
heap
page read and write
4A80000
direct allocation
page execute and read and write
1430000
heap
page read and write
24C99AE0000
trusted library allocation
page read and write
5AA000
unkown
page execute and read and write
8E5000
unkown
page write copy
2DFE000
stack
page read and write
583BFFE000
stack
page read and write
B23000
heap
page read and write
6B6000
unkown
page write copy
4691000
heap
page read and write
1FED9E14000
heap
page read and write
5FA000
unkown
page execute and read and write
281AB8D0000
heap
page read and write
45F1000
heap
page read and write
4691000
heap
page read and write
5AC000
unkown
page read and write
72C0000
direct allocation
page execute and read and write
557000
unkown
page execute and write copy
5E19000
trusted library allocation
page read and write
806E000
stack
page read and write
4C5F000
stack
page read and write
6F20000
heap
page read and write
7FF6D9D50000
unkown
page readonly
1ACEAFF000
stack
page read and write
47FE000
stack
page read and write
D3E000
stack
page read and write
1B1B4270000
trusted library allocation
page read and write
671000
unkown
page execute and read and write
24C99AE0000
trusted library allocation
page read and write
5E31000
trusted library allocation
page read and write
2479E98E000
heap
page read and write
5E09000
trusted library allocation
page read and write
432F000
stack
page read and write
6930000
direct allocation
page read and write
B85B9DC000
stack
page read and write
3C2000
unkown
page execute and write copy
4A30000
direct allocation
page execute and read and write
621E000
stack
page read and write
382E000
stack
page read and write
8CA000
heap
page read and write
7FF7ECDED000
unkown
page read and write
5450000
direct allocation
page execute and read and write
B14000
heap
page read and write
6AE1000
heap
page read and write
7FF7ECD61000
unkown
page execute read
F89000
unkown
page execute and read and write
B10000
heap
page read and write
6AE1000
heap
page read and write
13C9000
heap
page read and write
3030000
direct allocation
page read and write
4C90000
direct allocation
page execute and read and write
1FED99A0000
remote allocation
page read and write
2479E8E0000
trusted library allocation
page read and write
7FF6DA1DF000
unkown
page write copy
B14000
heap
page read and write
549E000
stack
page read and write
290F000
stack
page read and write
5C3000
unkown
page execute and write copy
5E35000
trusted library allocation
page read and write
2A2F000
stack
page read and write
1019000
unkown
page execute and read and write
5E12000
trusted library allocation
page read and write
5F6000
unkown
page execute and write copy
B14000
heap
page read and write
6AE1000
heap
page read and write
B34000
unkown
page execute and read and write
B45000
heap
page read and write
13CB000
heap
page read and write
D96000
unkown
page execute and read and write
19E8000
heap
page read and write
7B0000
heap
page read and write
5DD5000
trusted library allocation
page read and write
E81000
unkown
page readonly
4691000
heap
page read and write
28E2CC99000
heap
page read and write
E81000
unkown
page readonly
5AC000
unkown
page read and write
4471000
heap
page read and write
598E000
stack
page read and write
3CB000
unkown
page execute and read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6FE000
stack
page read and write
1FED92CA000
heap
page read and write
45F1000
heap
page read and write
683000
unkown
page execute and write copy
5E5F000
trusted library allocation
page read and write
27997630000
trusted library allocation
page read and write
45F1000
heap
page read and write
6AE1000
heap
page read and write
13B3000
heap
page read and write
6AE1000
heap
page read and write
2B2E000
stack
page read and write
5E12000
trusted library allocation
page read and write
1002000
unkown
page execute and read and write
4691000
heap
page read and write
38FF000
stack
page read and write
78D000
stack
page read and write
41EF000
stack
page read and write
1930000
direct allocation
page execute and read and write
3C7F000
stack
page read and write
4A60000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
392F000
stack
page read and write
17D4000
heap
page read and write
64BB000
heap
page read and write
28909AC0000
heap
page read and write
28909C05000
heap
page read and write
5E5F000
trusted library allocation
page read and write
682000
unkown
page execute and read and write
5ACE000
stack
page read and write
16FF000
stack
page read and write
1B1B4270000
trusted library allocation
page read and write
1FED929F000
heap
page read and write
342F000
stack
page read and write
A6E000
heap
page read and write
131C1195000
heap
page read and write
4691000
heap
page read and write
7FF7EDA90000
unkown
page readonly
5E02000
trusted library allocation
page read and write
17D0000
heap
page read and write
540000
unkown
page readonly
DC7000
unkown
page execute and read and write
28E2CC99000
heap
page read and write
5E5F000
trusted library allocation
page read and write
3F6F000
stack
page read and write
53D000
unkown
page execute and read and write
5C7000
unkown
page execute and read and write
71C0000
direct allocation
page execute and read and write
683000
unkown
page execute and write copy
5E12000
trusted library allocation
page read and write
6AE1000
heap
page read and write
28E2CC55000
heap
page read and write
1ACE77A000
stack
page read and write
5DE8000
trusted library allocation
page read and write
131C0DD0000
heap
page read and write
5E5F000
trusted library allocation
page read and write
2479E964000
heap
page read and write
5D5F000
stack
page read and write
D80000
direct allocation
page read and write
5E09000
trusted library allocation
page read and write
AA1000
heap
page read and write
5AC000
unkown
page read and write
7A0000
unkown
page readonly
6AE1000
heap
page read and write
1015000
unkown
page execute and write copy
5E02000
trusted library allocation
page read and write
5DEE000
trusted library allocation
page read and write
4691000
heap
page read and write
B09000
heap
page read and write
4880000
trusted library allocation
page read and write
2479E974000
heap
page read and write
4430000
direct allocation
page read and write
45F1000
heap
page read and write
30AE000
stack
page read and write
27997630000
trusted library allocation
page read and write
1450000
heap
page read and write
247A0689000
heap
page read and write
545F000
stack
page read and write
1830000
heap
page read and write
14E4000
heap
page read and write
6AE1000
heap
page read and write
24C99AE0000
trusted library allocation
page read and write
5AF000
unkown
page readonly
1420000
heap
page read and write
45F1000
heap
page read and write
2451E0C0000
trusted library allocation
page read and write
850000
heap
page read and write
17D4000
heap
page read and write
593000
unkown
page execute and write copy
6AE1000
heap
page read and write
37FE000
stack
page read and write
247A0670000
heap
page read and write
DA5B7CD000
stack
page read and write
5DF7000
trusted library allocation
page read and write
71C0000
direct allocation
page execute and read and write
5E52000
trusted library allocation
page read and write
13EB000
heap
page read and write
2C2F000
stack
page read and write
4441000
heap
page read and write
13EC000
heap
page read and write
27997760000
heap
page read and write
5E09000
trusted library allocation
page read and write
2451DF90000
heap
page read and write
521F000
stack
page read and write
28BF000
stack
page read and write
5E24000
trusted library allocation
page read and write
376F000
stack
page read and write
1450000
heap
page read and write
356F000
stack
page read and write
A31000
heap
page read and write
6AE1000
heap
page read and write
1FED92A4000
heap
page read and write
A98000
heap
page read and write
3030000
direct allocation
page read and write
5BD000
unkown
page execute and write copy
1B1B42F8000
heap
page read and write
1062000
unkown
page execute and read and write
6AE1000
heap
page read and write
66E000
unkown
page execute and write copy
AA4000
heap
page read and write
B0E000
stack
page read and write
594000
unkown
page execute and read and write
AFD000
stack
page read and write
5AC000
unkown
page read and write
4471000
heap
page read and write
5E12000
trusted library allocation
page read and write
10B1000
unkown
page execute and read and write
142B000
heap
page read and write
BF8000
unkown
page execute and read and write
1B1B4270000
trusted library allocation
page read and write
6AE1000
heap
page read and write
5AF000
unkown
page readonly
16463CBB000
heap
page read and write
96E000
stack
page read and write
58F000
unkown
page readonly
DA1000
unkown
page execute and write copy
58F000
unkown
page readonly
4E30000
direct allocation
page read and write
4691000
heap
page read and write
2479E947000
heap
page read and write
2479E991000
heap
page read and write
4E00000
direct allocation
page read and write
71C0000
direct allocation
page execute and read and write
2730000
direct allocation
page read and write
5E49000
trusted library allocation
page read and write
2479E985000
heap
page read and write
1E2753F0000
direct allocation
page read and write
4691000
heap
page read and write
562000
unkown
page execute and read and write
636C000
stack
page read and write
5E12000
trusted library allocation
page read and write
45F1000
heap
page read and write
247A067A000
heap
page read and write
5E02000
trusted library allocation
page read and write
9D0000
heap
page read and write
59EC000
stack
page read and write
5E02000
trusted library allocation
page read and write
700000
heap
page read and write
2BAE000
stack
page read and write
8C6000
heap
page read and write
45E0000
direct allocation
page read and write
1007000
unkown
page execute and read and write
6AE1000
heap
page read and write
27997630000
trusted library allocation
page read and write
58F000
unkown
page readonly
2479E96B000
heap
page read and write
17D4000
heap
page read and write
5F5000
unkown
page execute and read and write
1026000
unkown
page execute and write copy
6AE1000
heap
page read and write
5F5000
unkown
page execute and read and write
140A000
heap
page read and write
452F000
stack
page read and write
4691000
heap
page read and write
E96000
unkown
page read and write
24C99D70000
heap
page read and write
AA1000
heap
page read and write
5E01000
trusted library allocation
page read and write
5E32000
trusted library allocation
page read and write
4CB0000
direct allocation
page execute and read and write
36EE000
stack
page read and write
56C000
unkown
page execute and read and write
D80000
direct allocation
page read and write
4691000
heap
page read and write
5DEA000
trusted library allocation
page read and write
592000
unkown
page execute and read and write
35C000
stack
page read and write
65D000
unkown
page execute and write copy
5DEF000
trusted library allocation
page read and write
5EDC000
trusted library allocation
page read and write
71C0000
direct allocation
page execute and read and write
5FAD000
trusted library allocation
page read and write
1036000
unkown
page execute and write copy
1443000
heap
page read and write
5AC000
unkown
page write copy
45E0000
direct allocation
page read and write
5E12000
trusted library allocation
page read and write
540000
unkown
page readonly
1FED92B3000
heap
page read and write
785E000
stack
page read and write
816E000
stack
page read and write
307E000
stack
page read and write
8AE000
stack
page read and write
3B6C000
stack
page read and write
3A30000
direct allocation
page read and write
6AE1000
heap
page read and write
27BE000
stack
page read and write
6A60000
heap
page read and write
38EE000
stack
page read and write
540000
unkown
page readonly
201FDA20000
heap
page read and write
5E12000
trusted library allocation
page read and write
1043000
unkown
page execute and read and write
3D7000
unkown
page execute and write copy
71C0000
direct allocation
page execute and read and write
4670000
heap
page read and write
4E21000
heap
page read and write
5E02000
trusted library allocation
page read and write
FA2000
unkown
page execute and write copy
28ED000
heap
page read and write
152E000
stack
page read and write
5920000
remote allocation
page read and write
1443000
heap
page read and write
A96000
heap
page read and write
5AC000
unkown
page read and write
78D000
stack
page read and write
59C000
unkown
page execute and write copy
4A50000
direct allocation
page execute and read and write
24C99AB0000
heap
page read and write
24C99AE0000
trusted library allocation
page read and write
160E000
stack
page read and write
BF6000
heap
page read and write
7FF7EDACA000
unkown
page write copy
2479E9F1000
heap
page read and write
13EC000
heap
page read and write
4691000
heap
page read and write
301E000
stack
page read and write
1FED92E8000
heap
page read and write
1FED9346000
heap
page read and write
41AE000
stack
page read and write
1422000
heap
page read and write
4691000
heap
page read and write
17226130000
heap
page read and write
41E000
unkown
page write copy
31C000
stack
page read and write
4691000
heap
page read and write
19DB000
heap
page read and write
671000
unkown
page execute and read and write
2A6E000
stack
page read and write
5EF5000
trusted library allocation
page read and write
3BD0000
heap
page read and write
5D5000
unkown
page execute and write copy
11AB000
stack
page read and write
1FED92B1000
heap
page read and write
71C0000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
7FF7EDA91000
unkown
page execute read
29AF000
stack
page read and write
2539000
stack
page read and write
F7F000
unkown
page execute and write copy
4BB33FE000
stack
page read and write
1580000
heap
page read and write
2479E985000
heap
page read and write
C60000
heap
page read and write
45F1000
heap
page read and write
8E9000
unkown
page readonly
2451E0C0000
trusted library allocation
page read and write
201FDB00000
heap
page read and write
1FED9348000
heap
page read and write
5E5F000
trusted library allocation
page read and write
1940000
heap
page read and write
4A3F000
stack
page read and write
360000
unkown
page read and write
32EF000
stack
page read and write
5E10000
trusted library allocation
page read and write
72D0000
heap
page read and write
82022FC000
stack
page read and write
A9C76FF000
stack
page read and write
7FF7EDACD000
unkown
page readonly
7FF7EDAB9000
unkown
page readonly
41BF000
stack
page read and write
4471000
heap
page read and write
41D0000
heap
page read and write
7FF73FDCF000
unkown
page read and write
A96000
heap
page read and write
442E000
stack
page read and write
6AE1000
heap
page read and write
6BD000
unkown
page readonly
5DEC000
trusted library allocation
page read and write
5AF000
unkown
page readonly
2451E0C0000
trusted library allocation
page read and write
6AE1000
heap
page read and write
4D00000
direct allocation
page execute and read and write
B14000
heap
page read and write
43EF000
stack
page read and write
1B1B430D000
heap
page read and write
14E4000
heap
page read and write
C40000
direct allocation
page read and write
58F000
unkown
page readonly
4900000
direct allocation
page read and write
2451E0C0000
trusted library allocation
page read and write
B10000
heap
page read and write
E31000
unkown
page execute read
5E12000
trusted library allocation
page read and write
7D0000
heap
page read and write
5E5F000
trusted library allocation
page read and write
7280000
direct allocation
page execute and read and write
5DEE000
trusted library allocation
page read and write
30AE000
stack
page read and write
3C2000
unkown
page execute and write copy
5D9E000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
45F1000
heap
page read and write
5E5F000
trusted library allocation
page read and write
7FF7ECDF1000
unkown
page readonly
AFE000
heap
page read and write
1B1B4270000
trusted library allocation
page read and write
2479E965000
heap
page read and write
3F6F000
stack
page read and write
4D20000
direct allocation
page execute and read and write
66D000
unkown
page execute and read and write
65F000
unkown
page execute and write copy
5E5F000
trusted library allocation
page read and write
5E5F000
trusted library allocation
page read and write
23630A80000
heap
page read and write
4471000
heap
page read and write
31EE000
stack
page read and write
2451E0C0000
trusted library allocation
page read and write
5DD5000
trusted library allocation
page read and write
BD0000
heap
page read and write
B14000
heap
page read and write
2451E0C0000
trusted library allocation
page read and write
5E14000
trusted library allocation
page read and write
27997630000
trusted library allocation
page read and write
71C0000
direct allocation
page execute and read and write
45F1000
heap
page read and write
C40000
direct allocation
page read and write
7FF6D9D51000
unkown
page execute and read and write
5E1F000
trusted library allocation
page read and write
B77000
heap
page read and write
2DBF7610000
heap
page read and write
1B1B4270000
trusted library allocation
page read and write
362F000
stack
page read and write
E97000
unkown
page execute and read and write
2655000
heap
page read and write
1FED92D2000
heap
page read and write
6AE1000
heap
page read and write
5E02000
trusted library allocation
page read and write
140000000
unkown
page read and write
3F6F000
stack
page read and write
555D000
stack
page read and write
57DF000
stack
page read and write
594000
unkown
page execute and read and write
A4B000
heap
page read and write
360000
unkown
page readonly
5EDF000
trusted library allocation
page read and write
425F000
stack
page read and write
A49000
heap
page read and write
303F000
stack
page read and write
1450000
heap
page read and write
D80000
direct allocation
page read and write
A95000
heap
page read and write
A90000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
2451E0C0000
trusted library allocation
page read and write
5E3A000
trusted library allocation
page read and write
3EFF000
stack
page read and write
D80000
direct allocation
page read and write
5D5000
unkown
page execute and write copy
753C000
direct allocation
page read and write
AAE000
heap
page read and write
2479E9F1000
heap
page read and write
396F000
stack
page read and write
45F1000
heap
page read and write
145E000
heap
page read and write
4D40000
direct allocation
page execute and read and write
46A1000
heap
page read and write
32BE000
stack
page read and write
4691000
heap
page read and write
19E8000
heap
page read and write
D90000
heap
page read and write
FA2000
unkown
page execute and read and write
2C6E000
stack
page read and write
302E000
stack
page read and write
63AD000
stack
page read and write
591E000
stack
page read and write
6AE1000
heap
page read and write
403F000
stack
page read and write
5E02000
trusted library allocation
page read and write
24C99AE0000
trusted library allocation
page read and write
2451E168000
heap
page read and write
A30000
heap
page read and write
58F000
unkown
page readonly
401000
unkown
page execute read
27997630000
trusted library allocation
page read and write
644A000
heap
page read and write
3BAF000
stack
page read and write
495E000
stack
page read and write
5C2000
unkown
page execute and read and write
360000
unkown
page readonly
4E10000
heap
page read and write
24C99AE0000
trusted library allocation
page read and write
5F0D000
trusted library allocation
page read and write
2CAF000
stack
page read and write
6AE1000
heap
page read and write
7CDB000
heap
page read and write
5DE3000
trusted library allocation
page read and write
6AE1000
heap
page read and write
3A6D000
stack
page read and write
24C99B50000
heap
page read and write
41A000
unkown
page readonly
C1F000
heap
page read and write
393E000
stack
page read and write
AE0000
unkown
page readonly
72B0000
direct allocation
page execute and read and write
7FF7EDA90000
unkown
page readonly
AB9000
heap
page read and write
4471000
heap
page read and write
24C99AE0000
trusted library allocation
page read and write
5E52000
trusted library allocation
page read and write
1FED9346000
heap
page read and write
5E01000
trusted library allocation
page read and write
1FED9360000
heap
page read and write
13D6000
heap
page read and write
6F60000
direct allocation
page read and write
3CBF000
stack
page read and write
E30000
unkown
page readonly
5DE1000
trusted library allocation
page read and write
133A000
stack
page read and write
1448000
heap
page read and write
5E68000
trusted library allocation
page read and write
4691000
heap
page read and write
D5E000
stack
page read and write
17D4000
heap
page read and write
190E000
stack
page read and write
5E23000
trusted library allocation
page read and write
5DF3000
trusted library allocation
page read and write
5DF1000
trusted library allocation
page read and write
2451E0C0000
trusted library allocation
page read and write
4471000
heap
page read and write
446F000
stack
page read and write
2830000
direct allocation
page read and write
6B6000
unkown
page read and write
6AE1000
heap
page read and write
1103000
direct allocation
page read and write
E30000
unkown
page readonly
17D4000
heap
page read and write
71B0000
direct allocation
page execute and read and write
2479E952000
heap
page read and write
1820000
direct allocation
page read and write
68E3000
trusted library allocation
page read and write
D80000
direct allocation
page read and write
144C000
heap
page read and write
41CC000
stack
page read and write
7FF73F940000
unkown
page readonly
D80000
direct allocation
page read and write
689F000
stack
page read and write
2479E963000
heap
page read and write
4690000
heap
page read and write
C50000
heap
page read and write
2451E0C0000
trusted library allocation
page read and write
317F000
stack
page read and write
201FDAA5000
heap
page read and write
4691000
heap
page read and write
2479E973000
heap
page read and write
4C80000
direct allocation
page execute and read and write
5AC000
unkown
page write copy
5AF000
unkown
page readonly
6AE1000
heap
page read and write
4691000
heap
page read and write
2479E966000
heap
page read and write
A7D7FA9000
stack
page read and write
CA14AFF000
stack
page read and write
C57000
heap
page read and write
5E5F000
trusted library allocation
page read and write
4E11000
heap
page read and write
145E000
heap
page read and write
36A8000
heap
page read and write
23630BB0000
direct allocation
page read and write
7FF7EDACA000
unkown
page write copy
AB0000
heap
page read and write
6AE1000
heap
page read and write
5B0000
heap
page read and write
5DEC000
trusted library allocation
page read and write
621000
unkown
page execute and write copy
4C00000
direct allocation
page execute and read and write
45F1000
heap
page read and write
B8E000
heap
page read and write
4691000
heap
page read and write
17D4000
heap
page read and write
6AE1000
heap
page read and write
5E12000
trusted library allocation
page read and write
C40000
direct allocation
page read and write
2DBF000
stack
page read and write
FA7000
unkown
page execute and write copy
58DF000
stack
page read and write
554000
unkown
page execute and read and write
32EF000
stack
page read and write
17225F49000
heap
page read and write
3BEE000
stack
page read and write
1E275370000
heap
page read and write
5B1F000
stack
page read and write
569F000
stack
page read and write
1FED98D0000
heap
page read and write
42AF000
stack
page read and write
56FD000
stack
page read and write
B18000
heap
page read and write
2479E9F1000
heap
page read and write
24C99AE0000
trusted library allocation
page read and write
24FE000
stack
page read and write
5C3000
unkown
page execute and write copy
66D000
unkown
page execute and read and write
3D943FE000
stack
page read and write
5F2000
unkown
page execute and write copy
83C000
stack
page read and write
4691000
heap
page read and write
11FD000
heap
page read and write
5DD1000
trusted library allocation
page read and write
9B673FD000
stack
page read and write
151E000
stack
page read and write
3AAE000
stack
page read and write
9B66EFE000
stack
page read and write
F70000
trusted library allocation
page read and write
64C84FF000
unkown
page read and write
E02000
unkown
page execute and write copy
98C000
stack
page read and write
76A0000
direct allocation
page read and write
5AC000
unkown
page write copy
7FF7ECD60000
unkown
page readonly
AEC000
heap
page read and write
45AF000
stack
page read and write
14E4000
heap
page read and write
23632690000
direct allocation
page read and write
D2E000
stack
page read and write
3CB000
unkown
page execute and read and write
5E68000
trusted library allocation
page read and write
19DA000
heap
page read and write
45F1000
heap
page read and write
27DE000
stack
page read and write
24C99AE0000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
AE1000
unkown
page execute and write copy
45F1000
heap
page read and write
6AE1000
heap
page read and write
1FED9297000
heap
page read and write
352E000
stack
page read and write
45F1000
heap
page read and write
5E2A000
trusted library allocation
page read and write
2451E0C0000
trusted library allocation
page read and write
2DBA1280000
direct allocation
page read and write
E88E8FC000
stack
page read and write
3BE5000
heap
page read and write
1454000
heap
page read and write
24C99AE0000
trusted library allocation
page read and write
1FED92B9000
heap
page read and write
4EA0000
heap
page read and write
5F80000
heap
page read and write
2479E9C5000
heap
page read and write
5F2D000
trusted library allocation
page read and write
65D000
unkown
page execute and write copy
4691000
heap
page read and write
7FF7EDACD000
unkown
page readonly
591000
unkown
page execute and write copy
2479E954000
heap
page read and write
6AE1000
heap
page read and write
5410000
direct allocation
page execute and read and write
3A2E000
stack
page read and write
5E75000
trusted library allocation
page read and write
17D4000
heap
page read and write
4E11000
heap
page read and write
19D9000
heap
page read and write
264E000
stack
page read and write
45E0000
direct allocation
page read and write
673000
unkown
page execute and write copy
4AB0000
direct allocation
page execute and read and write
91AF94C000
stack
page read and write
247A0680000
heap
page read and write
5E02000
trusted library allocation
page read and write
7491000
heap
page read and write
5AC000
unkown
page write copy
FB4000
heap
page read and write
5E34000
trusted library allocation
page read and write
64C857F000
stack
page read and write
6230000
direct allocation
page read and write
B85BEFF000
stack
page read and write
6AE1000
heap
page read and write
342F000
stack
page read and write
23630BD0000
direct allocation
page read and write
4AD0000
heap
page read and write
247A0675000
heap
page read and write
1FED92A7000
heap
page read and write
9B671FF000
stack
page read and write
5DD5000
trusted library allocation
page read and write
6AE1000
heap
page read and write
5DD9000
trusted library allocation
page read and write
45F1000
heap
page read and write
7200000
direct allocation
page execute and read and write
7FF73FC11000
unkown
page execute and write copy
4D00000
heap
page read and write
3D5000
unkown
page execute and write copy
6AE1000
heap
page read and write
201FDAA0000
heap
page read and write
6AE1000
heap
page read and write
19C4C22B000
heap
page read and write
45E0000
direct allocation
page read and write
6AE1000
heap
page read and write
A86000
heap
page read and write
19C4C510000
heap
page read and write
6AE1000
heap
page read and write
346D000
stack
page read and write
2451E0C0000
trusted library allocation
page read and write
363F000
stack
page read and write
6AE1000
heap
page read and write
7FF7EDACA000
unkown
page read and write
4E11000
heap
page read and write
6AE1000
heap
page read and write
F98000
unkown
page execute and read and write
AA4000
heap
page read and write
C40000
direct allocation
page read and write
555000
unkown
page execute and write copy
5E12000
trusted library allocation
page read and write
1FED92C6000
heap
page read and write
CCF000
stack
page read and write
16463F10000
heap
page read and write
1450000
heap
page read and write
F0E000
stack
page read and write
181E000
stack
page read and write
5E02000
trusted library allocation
page read and write
27997630000
trusted library allocation
page read and write
367F000
stack
page read and write
4B9E000
stack
page read and write
F1E11FF000
stack
page read and write
4E00000
direct allocation
page read and write
2451E0C0000
trusted library allocation
page read and write
7B8000
direct allocation
page execute read
14E4000
heap
page read and write
40EE000
stack
page read and write
FD4000
unkown
page execute and read and write
1FED98F0000
trusted library allocation
page read and write
4BF0000
direct allocation
page execute and read and write
5E5F000
trusted library allocation
page read and write
2479E959000
heap
page read and write
5DF5000
trusted library allocation
page read and write
5DE8000
trusted library allocation
page read and write
2B6F000
stack
page read and write
4C50000
direct allocation
page execute and read and write
85F000
unkown
page readonly
6AE1000
heap
page read and write
5E02000
trusted library allocation
page read and write
E81000
unkown
page readonly
7270000
direct allocation
page execute and read and write
A97000
heap
page read and write
7250000
direct allocation
page execute and read and write
4CD0000
direct allocation
page execute and read and write
27997630000
trusted library allocation
page read and write
1FED92DE000
heap
page read and write
554000
unkown
page execute and read and write
2451E0C0000
trusted library allocation
page read and write
622000
unkown
page execute and read and write
6AE1000
heap
page read and write
4691000
heap
page read and write
15CC000
stack
page read and write
2CEE000
stack
page read and write
5DF7000
trusted library allocation
page read and write
392F000
stack
page read and write
540000
unkown
page readonly
5BD000
unkown
page execute and write copy
6AE1000
heap
page read and write
5F9F000
stack
page read and write
A70000
heap
page read and write
640000
unkown
page execute and read and write
6AE1000
heap
page read and write
2479E9C7000
heap
page read and write
AA4000
heap
page read and write
A30000
heap
page read and write
3E6E000
stack
page read and write
D80000
direct allocation
page read and write
E81000
unkown
page readonly
33AF000
stack
page read and write
45F1000
heap
page read and write
3DFE000
stack
page read and write
4E00000
direct allocation
page read and write
4A80000
direct allocation
page read and write
1FED92CA000
heap
page read and write
673000
unkown
page execute and write copy
6AE1000
heap
page read and write
45F1000
heap
page read and write
4691000
heap
page read and write
5E37000
trusted library allocation
page read and write
140764000
unkown
page readonly
553D000
stack
page read and write
14E4000
heap
page read and write
D90000
heap
page read and write
6AE1000
heap
page read and write
26E0000
heap
page read and write
1FED9348000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
40CB000
stack
page read and write
5E60000
trusted library allocation
page read and write
5BD000
unkown
page execute and write copy
A3A000
heap
page read and write
24C99AE0000
trusted library allocation
page read and write
6AE1000
heap
page read and write
5AF000
unkown
page readonly
6AE1000
heap
page read and write
4C90000
direct allocation
page execute and read and write
5E09000
trusted library allocation
page read and write
1433000
heap
page read and write
3D6000
unkown
page execute and read and write
5420000
direct allocation
page execute and read and write
4A80000
direct allocation
page execute and read and write
5E5F000
trusted library allocation
page read and write
51AE000
stack
page read and write
45F1000
heap
page read and write
AA6000
heap
page read and write
1B1B42B0000
trusted library allocation
page read and write
E9D000
unkown
page readonly
45F1000
heap
page read and write
1661000
heap
page read and write
332E000
stack
page read and write
7FF7EDAB9000
unkown
page readonly
1452000
heap
page read and write
5E01000
trusted library allocation
page read and write
28E2CC20000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
6A30000
direct allocation
page read and write
4DFF000
stack
page read and write
5C7000
unkown
page execute and read and write
F8A000
unkown
page execute and write copy
5E41000
trusted library allocation
page read and write
2DBA1230000
heap
page read and write
1E275380000
heap
page read and write
4A80000
direct allocation
page execute and read and write
2479E975000
heap
page read and write
65F000
unkown
page execute and write copy
8E5000
unkown
page read and write
140A000
heap
page read and write
5E16000
trusted library allocation
page read and write
84E000
stack
page read and write
5E57000
trusted library allocation
page read and write
13B3000
heap
page read and write
7FF73FC11000
unkown
page execute and write copy
1E0CDFE000
stack
page read and write
3D2E000
stack
page read and write
621000
unkown
page execute and write copy
6AE1000
heap
page read and write
3BBE000
stack
page read and write
6430000
heap
page read and write
1FED92AF000
heap
page read and write
5E68000
trusted library allocation
page read and write
4B5F000
stack
page read and write
9D6000
heap
page read and write
4A50000
direct allocation
page execute and read and write
4691000
heap
page read and write
28E2CC00000
heap
page read and write
5E5F000
trusted library allocation
page read and write
53F0000
direct allocation
page execute and read and write
58F000
unkown
page readonly
5FB000
unkown
page execute and write copy
5E02000
trusted library allocation
page read and write
6AE1000
heap
page read and write
1D8F5890000
heap
page read and write
1820000
direct allocation
page read and write
449F000
stack
page read and write
45F1000
heap
page read and write
5DF7000
trusted library allocation
page read and write
5E5F000
trusted library allocation
page read and write
4AF0000
direct allocation
page execute and read and write
4C80000
direct allocation
page execute and read and write
5E6000
unkown
page execute and write copy
140738000
unkown
page read and write
58F000
unkown
page readonly
45F1000
heap
page read and write
1D8F56C0000
heap
page read and write
366D000
stack
page read and write
2451E0C0000
trusted library allocation
page read and write
542D000
stack
page read and write
46BE000
stack
page read and write
F6E000
stack
page read and write
BF6000
unkown
page write copy
1430000
heap
page read and write
1B1B42B0000
trusted library allocation
page read and write
1FED92A1000
heap
page read and write
4691000
heap
page read and write
5DEF000
trusted library allocation
page read and write
145E000
heap
page read and write
27997630000
trusted library allocation
page read and write
650000
unkown
page readonly
4CA0000
direct allocation
page execute and read and write
5E1B000
trusted library allocation
page read and write
8E6000
unkown
page write copy
2479E95A000
heap
page read and write
34EF000
stack
page read and write
3CAE000
stack
page read and write
A94000
heap
page read and write
34EF000
stack
page read and write
2451E0C0000
trusted library allocation
page read and write
640F000
stack
page read and write
38FE000
stack
page read and write
14E4000
heap
page read and write
557000
unkown
page execute and write copy
3DEE000
stack
page read and write
429E000
stack
page read and write
23630B60000
heap
page read and write
591000
unkown
page execute and write copy
3F2E000
stack
page read and write
3C9000
unkown
page write copy
AE0000
unkown
page read and write
53F000
unkown
page execute and write copy
541000
unkown
page execute read
2DBA12F0000
heap
page read and write
5AC000
unkown
page read and write
9D4000
heap
page read and write
5E12000
trusted library allocation
page read and write
1433000
heap
page read and write
2479E95A000
heap
page read and write
1FED9AB5000
heap
page read and write
4E00000
direct allocation
page read and write
45F1000
heap
page read and write
640000
unkown
page execute and read and write
114A000
unkown
page execute and write copy
4E00000
direct allocation
page read and write
5E5F000
trusted library allocation
page read and write
2A8C000
stack
page read and write
3A6F000
stack
page read and write
13D6000
heap
page read and write
6AE1000
heap
page read and write
2479E954000
heap
page read and write
DA0000
unkown
page read and write
5E02000
trusted library allocation
page read and write
5E01000
trusted library allocation
page read and write
6AE1000
heap
page read and write
4500000
trusted library allocation
page read and write
6AE1000
heap
page read and write
7336000
heap
page read and write
1D8F5810000
direct allocation
page read and write
45F1000
heap
page read and write
6AE1000
heap
page read and write
41A000
unkown
page readonly
FEA000
unkown
page execute and read and write
75C0000
heap
page read and write
5E5F000
trusted library allocation
page read and write
45F1000
heap
page read and write
422E000
stack
page read and write
C40000
direct allocation
page read and write
1FED9319000
heap
page read and write
5E12000
trusted library allocation
page read and write
790000
heap
page read and write
141E000
stack
page read and write
FD2000
unkown
page execute and read and write
145D000
heap
page read and write
5DD1000
trusted library allocation
page read and write
45F1000
heap
page read and write
131C0DC0000
heap
page read and write
24C99AE0000
trusted library allocation
page read and write
DFC000
stack
page read and write
540000
unkown
page readonly
2F3E000
stack
page read and write
13A2000
heap
page read and write
145E000
heap
page read and write
71D0000
direct allocation
page execute and read and write
F21000
unkown
page readonly
2479E952000
heap
page read and write
7FF7EDA90000
unkown
page readonly
2451E0C0000
trusted library allocation
page read and write
5F6000
unkown
page execute and write copy
A6A000
heap
page read and write
4691000
heap
page read and write
6AE1000
heap
page read and write
7B0000
direct allocation
page execute read
24C99AE0000
trusted library allocation
page read and write
2479E9C0000
heap
page read and write
5E27000
trusted library allocation
page read and write
626B000
stack
page read and write
144C000
heap
page read and write
5E6000
unkown
page execute and write copy
682000
unkown
page execute and write copy
AF0000
heap
page read and write
7260000
direct allocation
page execute and read and write
432F000
stack
page read and write
7A1000
unkown
page execute read
C17000
heap
page read and write
A56000
heap
page read and write
281AB8B0000
heap
page read and write
1820000
direct allocation
page read and write
140A000
heap
page read and write
149D000
stack
page read and write
140A000
heap
page read and write
91AFDFE000
stack
page read and write
6AE1000
heap
page read and write
AA1000
heap
page read and write
53FC000
stack
page read and write
A30000
heap
page read and write
5E6000
unkown
page execute and write copy
6AE1000
heap
page read and write
4A70000
direct allocation
page execute and read and write
5E02000
trusted library allocation
page read and write
6AE1000
heap
page read and write
2B7E000
stack
page read and write
B14000
heap
page read and write
5DD6000
trusted library allocation
page read and write
7C66000
heap
page read and write
1422000
heap
page read and write
27997630000
trusted library allocation
page read and write
423000
unkown
page readonly
377F000
stack
page read and write
3B3F000
stack
page read and write
4C70000
direct allocation
page execute and read and write
A4E000
heap
page read and write
2B06A7C0000
heap
page read and write
AE1000
unkown
page execute and read and write
31EE000
stack
page read and write
1B1B4270000
trusted library allocation
page read and write
D1E000
stack
page read and write
1ACEBFF000
stack
page read and write
3160000
heap
page read and write
6AE1000
heap
page read and write
45F1000
heap
page read and write
5E12000
trusted library allocation
page read and write
40EE000
stack
page read and write
BA7000
heap
page read and write
3C9000
unkown
page write copy
2451E0C0000
trusted library allocation
page read and write
6A51000
heap
page read and write
5E05000
trusted library allocation
page read and write
272E000
stack
page read and write
4E00000
direct allocation
page read and write
2F6E000
stack
page read and write
3F3F000
stack
page read and write
5DDB000
trusted library allocation
page read and write
6AE1000
heap
page read and write
5ED6000
trusted library allocation
page read and write
5DF7000
trusted library allocation
page read and write
540000
unkown
page readonly
27997630000
trusted library allocation
page read and write
4E11000
heap
page read and write
9B675FF000
stack
page read and write
E9D000
unkown
page readonly
640000
unkown
page execute and read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
13EC000
heap
page read and write
5420000
direct allocation
page execute and read and write
5DD8000
trusted library allocation
page read and write
990000
heap
page read and write
27997630000
trusted library allocation
page read and write
5E5F000
trusted library allocation
page read and write
5DD6000
trusted library allocation
page read and write
2479E9D1000
heap
page read and write
13D4000
heap
page read and write
2479E880000
heap
page read and write
5F86000
heap
page read and write
45F1000
heap
page read and write
BF6000
unkown
page read and write
9B672FE000
stack
page read and write
1E0CCFE000
stack
page read and write
2EAF000
stack
page read and write
42FE000
stack
page read and write
6AE1000
heap
page read and write
5E08000
trusted library allocation
page read and write
B14000
heap
page read and write
5E5F000
trusted library allocation
page read and write
2451E0C0000
trusted library allocation
page read and write
1FED92A9000
heap
page read and write
71C0000
direct allocation
page execute and read and write
4691000
heap
page read and write
558000
unkown
page execute and read and write
3C2000
unkown
page execute and read and write
5E85000
trusted library allocation
page read and write
CA149FF000
stack
page read and write
D80000
direct allocation
page read and write
56DE000
stack
page read and write
B32000
unkown
page write copy
7DF3000
heap
page read and write
64C85FE000
stack
page read and write
5F85000
heap
page read and write
2451E0C0000
trusted library allocation
page read and write
1FED9346000
heap
page read and write
140A000
heap
page read and write
1014000
unkown
page execute and read and write
27997630000
trusted library allocation
page read and write
E32D74C000
stack
page read and write
247A0650000
remote allocation
page read and write
10AC000
unkown
page execute and write copy
1FED92C1000
heap
page read and write
6AE1000
heap
page read and write
281A9FF0000
heap
page read and write
1D8F589B000
heap
page read and write
665F000
stack
page read and write
23630C1B000
heap
page read and write
A7D82FD000
stack
page read and write
4A50000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
750000
heap
page read and write
401F000
stack
page read and write
4691000
heap
page read and write
E9F000
unkown
page execute and read and write
9B674FB000
stack
page read and write
136A000
heap
page read and write
4C20000
direct allocation
page execute and read and write
76A2000
direct allocation
page read and write
5DEE000
trusted library allocation
page read and write
4CA0000
direct allocation
page execute and read and write
A9C78FE000
stack
page read and write
4691000
heap
page read and write
27997630000
trusted library allocation
page read and write
5E12000
trusted library allocation
page read and write
4441000
heap
page read and write
6AE1000
heap
page read and write
740E000
stack
page read and write
6AE1000
heap
page read and write
5E8B000
trusted library allocation
page read and write
4B20000
direct allocation
page read and write
5E5F000
trusted library allocation
page read and write
E2E000
stack
page read and write
306F000
stack
page read and write
554000
unkown
page execute and read and write
16463BE0000
heap
page read and write
27997630000
trusted library allocation
page read and write
144C000
heap
page read and write
19E4000
heap
page read and write
2451E0C0000
trusted library allocation
page read and write
6AE1000
heap
page read and write
BBE000
stack
page read and write
145E000
heap
page read and write
2DBF7630000
heap
page read and write
45E0000
direct allocation
page read and write
6AE1000
heap
page read and write
91AFCFE000
stack
page read and write
493E000
stack
page read and write
4E11000
heap
page read and write
4AD0000
trusted library allocation
page read and write
1B1B42B0000
trusted library allocation
page read and write
3B6E000
stack
page read and write
4691000
heap
page read and write
E32DA7D000
stack
page read and write
446F000
stack
page read and write
4691000
heap
page read and write
541000
unkown
page execute read
28909BC0000
direct allocation
page read and write
45F1000
heap
page read and write
19D9000
heap
page read and write
5FA000
unkown
page execute and read and write
5E12000
trusted library allocation
page read and write
45F1000
heap
page read and write
274F000
stack
page read and write
FED000
stack
page read and write
5CF000
unkown
page execute and write copy
490E000
stack
page read and write
27997630000
trusted library allocation
page read and write
4691000
heap
page read and write
13AF000
heap
page read and write
4691000
heap
page read and write
5E67000
trusted library allocation
page read and write
5FDE000
stack
page read and write
28E2CC70000
heap
page read and write
6AE1000
heap
page read and write
4AD4000
heap
page read and write
1FED92BB000
heap
page read and write
4A50000
direct allocation
page execute and read and write
27997630000
trusted library allocation
page read and write
4691000
heap
page read and write
72A0000
direct allocation
page execute and read and write
58F000
unkown
page readonly
603000
unkown
page execute and read and write
2479E958000
heap
page read and write
36EE000
stack
page read and write
131C0DF0000
heap
page read and write
5AC000
unkown
page read and write
6AE1000
heap
page read and write
D9E000
heap
page read and write
D80000
direct allocation
page read and write
5C0000
heap
page read and write
860000
heap
page read and write
1FED9313000
heap
page read and write
7FF7EDA91000
unkown
page execute read
3AAE000
stack
page read and write
A58000
heap
page read and write
630E000
stack
page read and write
4470000
heap
page read and write
14E4000
heap
page read and write
6AE1000
heap
page read and write
F1E10FC000
stack
page read and write
27997630000
trusted library allocation
page read and write
1FED9317000
heap
page read and write
2479E955000
heap
page read and write
27997630000
trusted library allocation
page read and write
5FB000
unkown
page execute and write copy
F80000
heap
page read and write
5FB5000
trusted library allocation
page read and write
A91000
heap
page read and write
2479E870000
heap
page read and write
510000
heap
page read and write
4CFE000
stack
page read and write
416F000
stack
page read and write
1B1B4270000
trusted library allocation
page read and write
DA5BAFE000
stack
page read and write
2DBF7530000
heap
page read and write
5E62000
trusted library allocation
page read and write
740000
direct allocation
page read and write
5DDC000
trusted library allocation
page read and write
27997630000
trusted library allocation
page read and write
4CA0000
direct allocation
page execute and read and write
1FED9E0D000
heap
page read and write
4C00000
direct allocation
page execute and read and write
5DE8000
trusted library allocation
page read and write
1820000
direct allocation
page read and write
2DBA12A0000
direct allocation
page read and write
40AF000
stack
page read and write
6AE1000
heap
page read and write
5DEC000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
2451E0C0000
trusted library allocation
page read and write
543D000
stack
page read and write
D80000
direct allocation
page read and write
5B5000
heap
page read and write
2479E998000
heap
page read and write
540000
unkown
page readonly
3BEE000
stack
page read and write
DD6000
unkown
page execute and write copy
6AE1000
heap
page read and write
5A0000
unkown
page execute and write copy
5E39000
trusted library allocation
page read and write
5AF000
unkown
page readonly
71C0000
direct allocation
page execute and read and write
27997630000
trusted library allocation
page read and write
145E000
heap
page read and write
1FED9E17000
heap
page read and write
1425000
heap
page read and write
E96000
unkown
page write copy
A60000
heap
page read and write
6AE1000
heap
page read and write
7FF7ECDD0000
unkown
page readonly
2479E9AC000
heap
page read and write
4A7E000
stack
page read and write
140C000
heap
page read and write
5E78000
trusted library allocation
page read and write
D80000
direct allocation
page read and write
5DE6000
trusted library allocation
page read and write
17225F4B000
heap
page read and write
4691000
heap
page read and write
4E11000
heap
page read and write
13EB000
heap
page read and write
6AE1000
heap
page read and write
E9D000
unkown
page readonly
145E000
heap
page read and write
5E12000
trusted library allocation
page read and write
2451E0C0000
trusted library allocation
page read and write
7FF7EDAB9000
unkown
page readonly
B23000
heap
page read and write
294E000
stack
page read and write
5E02000
trusted library allocation
page read and write
7A0000
unkown
page readonly
1FED92FC000
heap
page read and write
1429000
heap
page read and write
CB9BEFC000
stack
page read and write
6AE1000
heap
page read and write
1B1B4140000
heap
page read and write
7FF73FDCF000
unkown
page write copy
1FED9295000
heap
page read and write
5E5F000
trusted library allocation
page read and write
CDF000
stack
page read and write
52FE000
stack
page read and write
42FF000
stack
page read and write
5E0C000
trusted library allocation
page read and write
5E52000
trusted library allocation
page read and write
1820000
direct allocation
page read and write
A85000
heap
page read and write
5E09000
trusted library allocation
page read and write
1D8F5870000
heap
page read and write
6AE1000
heap
page read and write
4691000
heap
page read and write
45E0000
direct allocation
page read and write
3D5000
unkown
page execute and write copy
2EFF000
stack
page read and write
5420000
direct allocation
page execute and read and write
45F1000
heap
page read and write
247A067A000
heap
page read and write
5DF5000
trusted library allocation
page read and write
1820000
direct allocation
page read and write
7220000
direct allocation
page execute and read and write
1149000
unkown
page execute and read and write
6AE1000
heap
page read and write
45F1000
heap
page read and write
6AE1000
heap
page read and write
E96000
unkown
page write copy
7E0000
heap
page read and write
540000
unkown
page readonly
CA148FC000
stack
page read and write
315B000
stack
page read and write
366E000
stack
page read and write
2CAF000
stack
page read and write
13AE000
heap
page read and write
6AE1000
heap
page read and write
45F1000
heap
page read and write
6AE1000
heap
page read and write
2451E0C0000
trusted library allocation
page read and write
4691000
heap
page read and write
5A8F000
stack
page read and write
28E2CC99000
heap
page read and write
6AE1000
heap
page read and write
37EF000
stack
page read and write
AC9000
heap
page read and write
1847000
heap
page read and write
6460000
heap
page read and write
A94000
heap
page read and write
5E5F000
trusted library allocation
page read and write
2451E0C0000
trusted library allocation
page read and write
1120000
heap
page read and write
140C000
heap
page read and write
71C0000
direct allocation
page execute and read and write
A8D000
heap
page read and write
593000
unkown
page execute and write copy
19C2000
heap
page read and write
145E000
heap
page read and write
367E000
stack
page read and write
1B1B42B0000
trusted library allocation
page read and write
5E5F000
trusted library allocation
page read and write
6AE1000
heap
page read and write
1790000
unkown
page readonly
7FF7ECDED000
unkown
page read and write
4691000
heap
page read and write
45E0000
direct allocation
page read and write
E88EAFE000
stack
page read and write
558000
unkown
page execute and read and write
2DBF7670000
heap
page read and write
1FED9294000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
4691000
heap
page read and write
F89000
unkown
page execute and write copy
567000
unkown
page execute and write copy
1429000
heap
page read and write
1FED92AE000
heap
page read and write
CF0000
heap
page read and write
10C3000
unkown
page execute and write copy
6F9C000
stack
page read and write
100F000
unkown
page execute and write copy
9B66CF3000
stack
page read and write
4E00000
direct allocation
page read and write
AA4000
heap
page read and write
27997430000
heap
page read and write
4EA0000
heap
page read and write
592000
unkown
page execute and read and write
8E9000
unkown
page readonly
145E000
heap
page read and write
6AE1000
heap
page read and write
2479E94C000
heap
page read and write
35DE000
stack
page read and write
45F1000
heap
page read and write
FDC000
unkown
page execute and write copy
6AE1000
heap
page read and write
27997630000
trusted library allocation
page read and write
346E000
stack
page read and write
45F1000
heap
page read and write
17D4000
heap
page read and write
5E12000
trusted library allocation
page read and write
74A0000
heap
page read and write
4E00000
direct allocation
page read and write
B14000
heap
page read and write
6AE1000
heap
page read and write
401000
unkown
page execute read
7FF7EDAB9000
unkown
page readonly
4900000
direct allocation
page read and write
311F000
stack
page read and write
562000
unkown
page execute and write copy
17AE000
stack
page read and write
48D0000
direct allocation
page read and write
F10000
heap
page read and write
3D5000
unkown
page execute and write copy
392D000
stack
page read and write
17D4000
heap
page read and write
1429000
heap
page read and write
4A80000
direct allocation
page execute and read and write
48D0000
direct allocation
page read and write
7FF7EDA91000
unkown
page execute read
6AE1000
heap
page read and write
28908200000
heap
page read and write
343E000
stack
page read and write
E09000
unkown
page write copy
45F1000
heap
page read and write
2479E910000
heap
page read and write
5E12000
trusted library allocation
page read and write
5E12000
trusted library allocation
page read and write
27997630000
trusted library allocation
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
D80000
direct allocation
page read and write
140C000
heap
page read and write
2479E998000
heap
page read and write
5DD2000
trusted library allocation
page read and write
4691000
heap
page read and write
1450000
heap
page read and write
66D000
unkown
page execute and read and write
12FC000
stack
page read and write
2DBA2D80000
heap
page read and write
45F1000
heap
page read and write
24C99B58000
heap
page read and write
28909C10000
direct allocation
page read and write
466F000
stack
page read and write
277F000
stack
page read and write
2451E0C0000
trusted library allocation
page read and write
9DE000
heap
page read and write
4C60000
direct allocation
page execute and read and write
5E5F000
trusted library allocation
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
D9A000
heap
page read and write
5C3E000
stack
page read and write
5E7A000
trusted library allocation
page read and write
5AC000
unkown
page write copy
E31000
unkown
page execute read
6AE1000
heap
page read and write
4E11000
heap
page read and write
7D0000
heap
page read and write
5AF000
unkown
page readonly
27997630000
trusted library allocation
page read and write
2DBA1260000
heap
page read and write
3C2000
unkown
page execute and read and write
9B66DFE000
stack
page read and write
A9C77FA000
stack
page read and write
28909AA0000
heap
page read and write
9B670FE000
stack
page read and write
45F1000
heap
page read and write
5E5F000
trusted library allocation
page read and write
512C000
direct allocation
page read and write
B30000
heap
page read and write
453F000
stack
page read and write
A7227FF000
stack
page read and write
6AE1000
heap
page read and write
16463F15000
heap
page read and write
14E4000
heap
page read and write
A94000
heap
page read and write
68DE000
stack
page read and write
BD5000
heap
page read and write
4C70000
direct allocation
page execute and read and write
24C99AE0000
trusted library allocation
page read and write
5D9000
unkown
page execute and read and write
6AE1000
heap
page read and write
3C9000
unkown
page write copy
5E27000
trusted library allocation
page read and write
5E5F000
trusted library allocation
page read and write
247A0650000
remote allocation
page read and write
52A0000
direct allocation
page read and write
59C000
unkown
page execute and write copy
D80000
direct allocation
page read and write
E30000
unkown
page readonly
2D6F000
stack
page read and write
10AC000
unkown
page execute and write copy
5260000
heap
page read and write
7DE000
heap
page read and write
19E4000
heap
page read and write
D7E000
unkown
page execute and read and write
6AE1000
heap
page read and write
48FF000
stack
page read and write
1E275430000
heap
page read and write
C5E000
stack
page read and write
31AF000
stack
page read and write
1FED92AA000
heap
page read and write
82023FE000
stack
page read and write
131C0DF8000
heap
page read and write
27997630000
trusted library allocation
page read and write
4ABB000
stack
page read and write
281A9F00000
heap
page read and write
49B63FF000
stack
page read and write
4CBF000
stack
page read and write
13D6000
heap
page read and write
4691000
heap
page read and write
144C000
heap
page read and write
B32000
unkown
page write copy
24C99AE0000
trusted library allocation
page read and write
5DEC000
trusted library allocation
page read and write
13CD000
heap
page read and write
5AF000
unkown
page readonly
5E29000
trusted library allocation
page read and write
27997630000
trusted library allocation
page read and write
1FED9348000
heap
page read and write
4A40000
direct allocation
page execute and read and write
1FED92C0000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
2479E961000
heap
page read and write
562000
unkown
page execute and read and write
3C2000
unkown
page execute and write copy
5E5F000
trusted library allocation
page read and write
4E11000
heap
page read and write
E16000
unkown
page execute and read and write
23632680000
heap
page read and write
1149000
unkown
page execute and write copy
33EE000
stack
page read and write
7FF6DA1DF000
unkown
page read and write
45F1000
heap
page read and write
7210000
direct allocation
page execute and read and write
45F1000
heap
page read and write
28909C00000
heap
page read and write
5E12000
trusted library allocation
page read and write
27997630000
trusted library allocation
page read and write
5E5F000
trusted library allocation
page read and write
5DF7000
trusted library allocation
page read and write
109F000
unkown
page execute and write copy
29EE000
stack
page read and write
6AE1000
heap
page read and write
45F1000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
5E06000
trusted library allocation
page read and write
651000
unkown
page execute read
7DC000
stack
page read and write
5DC0000
heap
page read and write
45F0000
heap
page read and write
45F1000
heap
page read and write
4691000
heap
page read and write
1B1B4270000
trusted library allocation
page read and write
4691000
heap
page read and write
1FED92FC000
heap
page read and write
592000
unkown
page execute and read and write
71C0000
direct allocation
page execute and read and write
2451E0C0000
trusted library allocation
page read and write
326F000
stack
page read and write
5DEB000
trusted library allocation
page read and write
2479E98B000
heap
page read and write
35AE000
stack
page read and write
5E2A000
trusted library allocation
page read and write
1FED9348000
heap
page read and write
281AB9D0000
direct allocation
page read and write
F97000
unkown
page execute and write copy
10C1000
direct allocation
page execute read
27997630000
trusted library allocation
page read and write
541000
unkown
page execute read
145E000
heap
page read and write
6ADF000
stack
page read and write
5E02000
trusted library allocation
page read and write
53DF000
stack
page read and write
3E2F000
stack
page read and write
1B1B4270000
trusted library allocation
page read and write
10AE000
unkown
page execute and write copy
10C0000
direct allocation
page read and write
6AE1000
heap
page read and write
1FED9310000
heap
page read and write
1FED92B3000
heap
page read and write
3E2F000
stack
page read and write
A22000
heap
page read and write
541000
unkown
page execute read
1677000
heap
page read and write
B32000
heap
page read and write
1449000
heap
page read and write
700000
direct allocation
page read and write
E0B000
unkown
page execute and read and write
4601000
heap
page read and write
9CF000
stack
page read and write
2479E979000
heap
page read and write
17D4000
heap
page read and write
4691000
heap
page read and write
5DF1000
trusted library allocation
page read and write
9D1000
heap
page read and write
1433000
heap
page read and write
A7228FF000
stack
page read and write
5E4F000
trusted library allocation
page read and write
7DA000
heap
page read and write
27997630000
trusted library allocation
page read and write
D80000
direct allocation
page read and write
71C0000
direct allocation
page execute and read and write
1610000
heap
page read and write
1FED92A1000
heap
page read and write
6AE1000
heap
page read and write
3670000
heap
page read and write
6AE1000
heap
page read and write
5950000
heap
page read and write
353F000
stack
page read and write
4A50000
direct allocation
page execute and read and write
A9C6FFF000
stack
page read and write
3B7E000
stack
page read and write
19D4000
heap
page read and write
1820000
direct allocation
page read and write
E9D000
unkown
page readonly
DBE000
unkown
page execute and read and write
6AE1000
heap
page read and write
1035000
unkown
page execute and read and write
6AE1000
heap
page read and write
1FED92AF000
heap
page read and write
5E9000
unkown
page execute and read and write
1610000
heap
page read and write
1820000
direct allocation
page read and write
46A0000
heap
page read and write
652C000
direct allocation
page read and write
281AA0F0000
heap
page read and write
5E12000
trusted library allocation
page read and write
5E47000
trusted library allocation
page read and write
1450000
heap
page read and write
5E12000
trusted library allocation
page read and write
B78000
heap
page read and write
19C4C180000
heap
page read and write
1820000
direct allocation
page read and write
6AE1000
heap
page read and write
E15000
unkown
page execute and write copy
4691000
heap
page read and write
5E5F000
trusted library allocation
page read and write
621000
unkown
page execute and write copy
7A5F000
stack
page read and write
247A0687000
heap
page read and write
144C000
heap
page read and write
2451E0C0000
trusted library allocation
page read and write
423000
unkown
page readonly
7FF7EDA90000
unkown
page readonly
45F1000
heap
page read and write
5E32000
trusted library allocation
page read and write
4691000
heap
page read and write
14E4000
heap
page read and write
3F3E000
stack
page read and write
AA1000
heap
page read and write
24C99AE0000
trusted library allocation
page read and write
5AF000
unkown
page readonly
740000
direct allocation
page read and write
45F1000
heap
page read and write
2479E952000
heap
page read and write
5E0F000
trusted library allocation
page read and write
19E8000
heap
page read and write
540000
unkown
page readonly
2479E967000
heap
page read and write
13C9000
heap
page read and write
27997630000
trusted library allocation
page read and write
6AE1000
heap
page read and write
1820000
direct allocation
page read and write
2479E916000
heap
page read and write
1FED92DC000
heap
page read and write
6AE1000
heap
page read and write
1FED9440000
heap
page read and write
1FED9E1F000
heap
page read and write
4B0000
unkown
page readonly
1D8F7230000
direct allocation
page read and write
4691000
heap
page read and write
C40000
direct allocation
page read and write
4E9E000
heap
page read and write
140A000
heap
page read and write
2479E949000
heap
page read and write
45F1000
heap
page read and write
1FED99A0000
remote allocation
page read and write
10C2000
unkown
page execute and read and write
546C000
trusted library allocation
page read and write
247A0280000
trusted library allocation
page read and write
2451E0C0000
trusted library allocation
page read and write
17226155000
heap
page read and write
6AE1000
heap
page read and write
7FF7EDACD000
unkown
page readonly
145D000
stack
page read and write
4AE0000
direct allocation
page execute and read and write
2B06A6F0000
direct allocation
page read and write
8F0000
heap
page read and write
4E11000
heap
page read and write
45F1000
heap
page read and write
A9C74FD000
stack
page read and write
17D4000
heap
page read and write
5AC000
unkown
page write copy
7FF73FDCF000
unkown
page read and write
3BE0000
heap
page read and write
17D4000
heap
page read and write
5920000
remote allocation
page read and write
7FF7EDACD000
unkown
page readonly
6BE0000
trusted library allocation
page read and write
405E000
stack
page read and write
1FED92A5000
heap
page read and write
593000
unkown
page execute and write copy
7FF6D9D50000
unkown
page readonly
4691000
heap
page read and write
7FF73FDCF000
unkown
page write copy
9DA000
heap
page read and write
71C0000
direct allocation
page execute and read and write
7FF7EDA91000
unkown
page execute read
3E2F000
stack
page read and write
1D8F57F0000
direct allocation
page read and write
14E4000
heap
page read and write
1D8F57A0000
heap
page read and write
145E000
heap
page read and write
45F1000
heap
page read and write
5DF7000
trusted library allocation
page read and write
4BB34FE000
stack
page read and write
6AE1000
heap
page read and write
4691000
heap
page read and write
471E000
stack
page read and write
382E000
stack
page read and write
4B7F000
stack
page read and write
7FF7ECDD0000
unkown
page readonly
1FED92B4000
heap
page read and write
1FED92B2000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
2DBA2D85000
heap
page read and write
4BBF000
stack
page read and write
1FED9E00000
heap
page read and write
C0E000
stack
page read and write
103A000
unkown
page execute and read and write
13EC000
heap
page read and write
1B1B42B0000
trusted library allocation
page read and write
1FED9910000
trusted library allocation
page read and write
6AE1000
heap
page read and write
FA0000
heap
page read and write
6AE1000
heap
page read and write
D80000
direct allocation
page read and write
541000
unkown
page execute read
1395000
heap
page read and write
82DC000
stack
page read and write
6AE1000
heap
page read and write
D60000
heap
page read and write
6AE1000
heap
page read and write
5420000
direct allocation
page execute and read and write
683000
unkown
page execute and write copy
267E000
stack
page read and write
2890820B000
heap
page read and write
1FED9305000
heap
page read and write
4E11000
heap
page read and write
2DBA2C60000
heap
page read and write
9B676FB000
stack
page read and write
B18000
heap
page read and write
1D8F57D0000
heap
page read and write
5E01000
trusted library allocation
page read and write
1427000
heap
page read and write
5F0000
heap
page read and write
7FF7ECD60000
unkown
page readonly
7FF7ECDED000
unkown
page write copy
5D4000
unkown
page execute and read and write
7FF7ECD60000
unkown
page readonly
45F1000
heap
page read and write
4E90000
heap
page read and write
6AE1000
heap
page read and write
173E000
stack
page read and write
C40000
direct allocation
page read and write
16463AE0000
heap
page read and write
FDE000
unkown
page execute and read and write
5E5F000
trusted library allocation
page read and write
2FEF000
stack
page read and write
A20000
heap
page read and write
C30000
heap
page read and write
5DEA000
trusted library allocation
page read and write
B0F000
heap
page read and write
4691000
heap
page read and write
32C000
stack
page read and write
4D9B000
stack
page read and write
5E5F000
trusted library allocation
page read and write
33FF000
stack
page read and write
5400000
direct allocation
page execute and read and write
3F7E000
stack
page read and write
B60000
heap
page read and write
E30000
unkown
page readonly
3C0000
heap
page read and write
352E000
stack
page read and write
23630C10000
heap
page read and write
66C000
unkown
page execute and write copy
4691000
heap
page read and write
5F7D000
trusted library allocation
page read and write
201FDB0B000
heap
page read and write
45F1000
heap
page read and write
D80000
direct allocation
page read and write
3BAF000
stack
page read and write
673000
unkown
page execute and write copy
1E27543B000
heap
page read and write
2A6E000
stack
page read and write
3CEF000
stack
page read and write
B14000
heap
page read and write
540000
unkown
page readonly
541000
unkown
page execute read
6AE1000
heap
page read and write
5D5000
unkown
page execute and write copy
346E000
stack
page read and write
4691000
heap
page read and write
24C99AE0000
trusted library allocation
page read and write
5DEC000
trusted library allocation
page read and write
4441000
heap
page read and write
5AF000
unkown
page readonly
1FED9346000
heap
page read and write
45F1000
heap
page read and write
540000
unkown
page readonly
3D7000
unkown
page execute and write copy
268C000
stack
page read and write
5AF000
unkown
page readonly
201FDA70000
direct allocation
page read and write
7FF7EDAB9000
unkown
page readonly
4691000
heap
page read and write
71C0000
direct allocation
page execute and read and write
4E11000
heap
page read and write
F74000
unkown
page execute and read and write
8F5000
heap
page read and write
E30000
unkown
page readonly
567000
unkown
page execute and write copy
7FF7EDACD000
unkown
page readonly
145E000
heap
page read and write
28E0000
heap
page read and write
6AE1000
heap
page read and write
A7D83FE000
stack
page read and write
2479E98B000
heap
page read and write
3DFF000
stack
page read and write
33FE000
stack
page read and write
2B06A7C5000
heap
page read and write
B23000
unkown
page execute and read and write
13AE000
heap
page read and write
8FA000
stack
page read and write
37DF000
stack
page read and write
19E8000
heap
page read and write
45F1000
heap
page read and write
142B000
heap
page read and write
17225F40000
heap
page read and write
7546000
direct allocation
page read and write
19DA000
heap
page read and write
5E5F000
trusted library allocation
page read and write
C50000
heap
page read and write
24C99AE0000
trusted library allocation
page read and write
2B068E30000
heap
page read and write
6AE1000
heap
page read and write
5E12000
trusted library allocation
page read and write
3A3F000
stack
page read and write
58F000
unkown
page readonly
1112000
direct allocation
page readonly
1FED92EF000
heap
page read and write
292F000
stack
page read and write
45F1000
heap
page read and write
6AE1000
heap
page read and write
45F1000
heap
page read and write
145E000
heap
page read and write
760000
heap
page read and write
2479E967000
heap
page read and write
28E2CC78000
heap
page read and write
3D7000
unkown
page execute and write copy
A9C70FD000
stack
page read and write
CB9C1FF000
stack
page read and write
525E000
stack
page read and write
27997630000
trusted library allocation
page read and write
4A3F000
stack
page read and write
D80000
direct allocation
page read and write
D80000
direct allocation
page read and write
2479E9CE000
heap
page read and write
34FF000
stack
page read and write
45F1000
heap
page read and write
4691000
heap
page read and write
6AE1000
heap
page read and write
5DF0000
trusted library allocation
page read and write
45E0000
direct allocation
page read and write
417F000
stack
page read and write
6A1000
unkown
page readonly
77E000
stack
page read and write
3D2E000
stack
page read and write
5DF5000
trusted library allocation
page read and write
2479E9F1000
heap
page read and write
6AE1000
heap
page read and write
F1E12FF000
stack
page read and write
A94000
heap
page read and write
467F000
stack
page read and write
5F5000
unkown
page execute and read and write
1820000
direct allocation
page read and write
66C000
unkown
page execute and write copy
2479E99C000
heap
page read and write
5C2000
unkown
page execute and read and write
4B00000
direct allocation
page execute and read and write
45E0000
direct allocation
page read and write
6AE1000
heap
page read and write
1840000
heap
page read and write
5DEE000
trusted library allocation
page read and write
6AE1000
heap
page read and write
5DD9000
trusted library allocation
page read and write
556000
unkown
page execute and read and write
4C30000
direct allocation
page execute and read and write
45F1000
heap
page read and write
4691000
heap
page read and write
5E41000
trusted library allocation
page read and write
64AF000
stack
page read and write
5E02000
trusted library allocation
page read and write
443D000
stack
page read and write
13A2000
heap
page read and write
41E000
unkown
page read and write
5E2F000
trusted library allocation
page read and write
59E000
unkown
page execute and read and write
5E13000
trusted library allocation
page read and write
281AB9F0000
direct allocation
page read and write
E96000
unkown
page read and write
17D4000
heap
page read and write
357E000
stack
page read and write
6AE1000
heap
page read and write
5DEA000
trusted library allocation
page read and write
59C000
unkown
page execute and write copy
14075E000
unkown
page execute read
4691000
heap
page read and write
281A9FFB000
heap
page read and write
6FC000
stack
page read and write
2BAE000
stack
page read and write
2451E0C0000
trusted library allocation
page read and write
C21000
heap
page read and write
136E000
heap
page read and write
700000
direct allocation
page read and write
F96000
unkown
page execute and read and write
5DEC000
trusted library allocation
page read and write
27997630000
trusted library allocation
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
14E4000
heap
page read and write
A9C6BA3000
stack
page read and write
59E000
unkown
page execute and read and write
4691000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
B4E000
stack
page read and write
53F000
unkown
page execute and write copy
14E4000
heap
page read and write
1C3F000
stack
page read and write
A96000
heap
page read and write
4E00000
direct allocation
page read and write
1D8F5875000
heap
page read and write
2479E9C7000
heap
page read and write
5B2C000
direct allocation
page read and write
A9C6EFE000
stack
page read and write
D80000
direct allocation
page read and write
556000
unkown
page execute and read and write
5430000
direct allocation
page execute and read and write
E9D000
unkown
page readonly
541000
unkown
page execute read
2F2F000
stack
page read and write
6AE1000
heap
page read and write
3C2000
unkown
page execute and read and write
5E28000
trusted library allocation
page read and write
376F000
stack
page read and write
AFD000
heap
page read and write
19C4C220000
heap
page read and write
199000
stack
page read and write
6AE1000
heap
page read and write
1436000
heap
page read and write
4B1000
unkown
page execute and write copy
5DD1000
trusted library allocation
page read and write
4691000
heap
page read and write
6AE1000
heap
page read and write
A8D000
heap
page read and write
B85BCFF000
stack
page read and write
2451E0C0000
trusted library allocation
page read and write
2479E94A000
heap
page read and write
2451E0C0000
trusted library allocation
page read and write
567000
unkown
page execute and write copy
2451E0C0000
trusted library allocation
page read and write
6AE1000
heap
page read and write
145E000
heap
page read and write
7FF7ECDF1000
unkown
page readonly
1443000
heap
page read and write
5E5F000
trusted library allocation
page read and write
5E5F000
trusted library allocation
page read and write
7FF7EDA90000
unkown
page readonly
673000
unkown
page execute and write copy
139A000
heap
page read and write
1FED9E20000
heap
page read and write
5E60000
trusted library allocation
page read and write
5E5F000
trusted library allocation
page read and write
C40000
direct allocation
page read and write
FD3000
unkown
page execute and write copy
4691000
heap
page read and write
103B000
unkown
page execute and write copy
1128000
heap
page read and write
C2F000
stack
page read and write
4A70000
direct allocation
page execute and read and write
682000
unkown
page execute and write copy
1443000
heap
page read and write
24C99AE0000
trusted library allocation
page read and write
1B1B42B0000
trusted library allocation
page read and write
32BF000
stack
page read and write
1B1B42F0000
heap
page read and write
1FED92CD000
heap
page read and write
131C1190000
heap
page read and write
1820000
direct allocation
page read and write
5E5F000
trusted library allocation
page read and write
19E4000
heap
page read and write
B10000
heap
page read and write
312F000
stack
page read and write
407F000
stack
page read and write
5E12000
trusted library allocation
page read and write
5AA000
unkown
page execute and read and write
75CA000
heap
page read and write
5E5F000
trusted library allocation
page read and write
65D000
unkown
page execute and write copy
4691000
heap
page read and write
4691000
heap
page read and write
5E5F000
trusted library allocation
page read and write
71C0000
direct allocation
page execute and read and write
5E4F000
trusted library allocation
page read and write
5D4000
unkown
page execute and read and write
540000
unkown
page readonly
3BBE000
stack
page read and write
42BF000
stack
page read and write
622000
unkown
page execute and read and write
C40000
direct allocation
page read and write
5AF000
unkown
page readonly
7FF6DA1DD000
unkown
page execute and read and write
27997630000
trusted library allocation
page read and write
3E6E000
stack
page read and write
7FF73FDC8000
unkown
page execute and read and write
AFB000
heap
page read and write
38DF000
stack
page read and write
247A0687000
heap
page read and write
4D9F000
stack
page read and write
1B1B42B0000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
4691000
heap
page read and write
C4D000
stack
page read and write
35AE000
stack
page read and write
27997400000
heap
page read and write
6045000
trusted library allocation
page read and write
4DDE000
stack
page read and write
5AF000
unkown
page readonly
E96000
unkown
page write copy
5E5F000
trusted library allocation
page read and write
6AE1000
heap
page read and write
5E5F000
trusted library allocation
page read and write
7DF0000
heap
page read and write
7490000
heap
page read and write
6AE1000
heap
page read and write
45E0000
direct allocation
page read and write
4AA0000
direct allocation
page execute and read and write
4691000
heap
page read and write
4691000
heap
page read and write
6AE1000
heap
page read and write
10C2000
unkown
page execute and write copy
6AE1000
heap
page read and write
802C000
stack
page read and write
5E01000
trusted library allocation
page read and write
17D4000
heap
page read and write
17C0000
heap
page read and write
6AE1000
heap
page read and write
5F2000
unkown
page execute and write copy
17D4000
heap
page read and write
5F5000
heap
page read and write
618F000
stack
page read and write
FAC000
unkown
page execute and read and write
71C0000
direct allocation
page execute and read and write
540000
unkown
page readonly
10B3000
unkown
page execute and write copy
CB9BFFF000
stack
page read and write
2DBF77F5000
heap
page read and write
5DEC000
trusted library allocation
page read and write
139A000
heap
page read and write
2EEE000
stack
page read and write
4E11000
heap
page read and write
562000
unkown
page execute and write copy
5E0B000
trusted library allocation
page read and write
A59000
heap
page read and write
1FED92C6000
heap
page read and write
2479E985000
heap
page read and write
1FED9302000
heap
page read and write
11D6000
heap
page read and write
2479E9AC000
heap
page read and write
1FED9307000
heap
page read and write
7FF7EDACA000
unkown
page read and write
13D6000
heap
page read and write
2479E96F000
heap
page read and write
6AE1000
heap
page read and write
16463CA9000
heap
page read and write
24C99AE0000
trusted library allocation
page read and write
2479E9B0000
heap
page read and write
B23000
heap
page read and write
28DF000
stack
page read and write
140A000
heap
page read and write
1D8F5820000
direct allocation
page read and write
16463CA0000
heap
page read and write
C40000
direct allocation
page read and write
45F1000
heap
page read and write
4691000
heap
page read and write
6AE1000
heap
page read and write
5C2000
unkown
page execute and read and write
7FF7EDA91000
unkown
page execute read
2B3F000
stack
page read and write
27997630000
trusted library allocation
page read and write
5DD9000
trusted library allocation
page read and write
7FF7EDACA000
unkown
page read and write
5D0000
heap
page read and write
3CEF000
stack
page read and write
61DF000
stack
page read and write
4D30000
direct allocation
page execute and read and write
45F1000
heap
page read and write
5E1A000
trusted library allocation
page read and write
45F1000
heap
page read and write
4691000
heap
page read and write
6AE1000
heap
page read and write
289080F0000
heap
page read and write
3177000
heap
page read and write
48B0000
trusted library allocation
page read and write
B1C000
heap
page read and write
6AE1000
heap
page read and write
83DC000
stack
page read and write
6A50000
heap
page read and write
6AE1000
heap
page read and write
A70000
heap
page read and write
1FED92DC000
heap
page read and write
16F0000
heap
page read and write
5E5F000
trusted library allocation
page read and write
2479E952000
heap
page read and write
4691000
heap
page read and write
491F000
stack
page read and write
1E0C9BC000
stack
page read and write
31AF000
stack
page read and write
541000
unkown
page execute read
17D4000
heap
page read and write
6AE1000
heap
page read and write
A9C75FF000
stack
page read and write
13C9000
heap
page read and write
A94000
heap
page read and write
7FF73F941000
unkown
page execute and read and write
2479E972000
heap
page read and write
66C000
unkown
page execute and write copy
3C6F000
stack
page read and write
396E000
stack
page read and write
2451E0C0000
trusted library allocation
page read and write
55FE000
stack
page read and write
5E09000
trusted library allocation
page read and write
406E000
stack
page read and write
603000
unkown
page execute and read and write
24C99AE0000
trusted library allocation
page read and write
332E000
stack
page read and write
5E4F000
trusted library allocation
page read and write
247A0677000
heap
page read and write
A9C73FE000
stack
page read and write
422E000
stack
page read and write
7FF7ECDF1000
unkown
page readonly
3A2D000
stack
page read and write
45F1000
heap
page read and write
3BE6000
heap
page read and write
14E4000
heap
page read and write
F8F000
stack
page read and write
1FED9310000
heap
page read and write
1FED92AB000
heap
page read and write
5E12000
trusted library allocation
page read and write
3FAE000
stack
page read and write
5E5F000
trusted library allocation
page read and write
F7A000
unkown
page execute and read and write
27997630000
trusted library allocation
page read and write
4E00000
direct allocation
page read and write
650000
unkown
page readonly
6AE1000
heap
page read and write
56DE000
stack
page read and write
682000
unkown
page execute and read and write
4A80000
direct allocation
page execute and read and write
2479E95E000
heap
page read and write
A70000
heap
page read and write
4691000
heap
page read and write
56C000
unkown
page execute and read and write
2CEE000
stack
page read and write
17225F30000
heap
page read and write
407E000
stack
page read and write
16463BC0000
heap
page read and write
2DEF000
stack
page read and write
45F1000
heap
page read and write
6AE1000
heap
page read and write
53D000
unkown
page execute and read and write
B1C000
heap
page read and write
6440000
heap
page read and write
13D6000
heap
page read and write
6AE1000
heap
page read and write
4B5E000
stack
page read and write
5E12000
trusted library allocation
page read and write
27997630000
trusted library allocation
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
FD0000
heap
page read and write
1617000
heap
page read and write
A96000
heap
page read and write
3CB000
unkown
page execute and write copy
6AE1000
heap
page read and write
45F1000
heap
page read and write
27997460000
heap
page read and write
B0F000
heap
page read and write
1FED9260000
heap
page read and write
5E01000
trusted library allocation
page read and write
5E02000
trusted library allocation
page read and write
66C000
unkown
page execute and write copy
1450000
heap
page read and write
4E11000
heap
page read and write
4691000
heap
page read and write
5E0C000
trusted library allocation
page read and write
7FF7ECDED000
unkown
page write copy
361000
unkown
page execute and write copy
6AE1000
heap
page read and write
581D000
stack
page read and write
24C99AE0000
trusted library allocation
page read and write
28AE000
stack
page read and write
360000
unkown
page readonly
2A3E000
stack
page read and write
1FED9283000
heap
page read and write
F95000
unkown
page execute and write copy
40AF000
stack
page read and write
6AE1000
heap
page read and write
306F000
stack
page read and write
5E12000
trusted library allocation
page read and write
24C99B7A000
heap
page read and write
4691000
heap
page read and write
24C99AE0000
trusted library allocation
page read and write
2DBF767B000
heap
page read and write
13AD000
heap
page read and write
6AE1000
heap
page read and write
19C4C23D000
heap
page read and write
B0E000
stack
page read and write
63D3000
trusted library allocation
page read and write
39DF000
stack
page read and write
6AE1000
heap
page read and write
5AEC000
stack
page read and write
6AE1000
heap
page read and write
5E60000
trusted library allocation
page read and write
19F6000
heap
page read and write
5E27000
trusted library allocation
page read and write
E31000
unkown
page execute read
558000
unkown
page execute and read and write
3EEF000
stack
page read and write
A70000
heap
page read and write
62CF000
stack
page read and write
4DDE000
stack
page read and write
3DAE000
stack
page read and write
1B1B42B0000
trusted library allocation
page read and write
2451E0C0000
trusted library allocation
page read and write
7FF73F940000
unkown
page readonly
45F1000
heap
page read and write
28FE000
stack
page read and write
7FF7EDA91000
unkown
page execute read
1FED9346000
heap
page read and write
7FF7ECD61000
unkown
page execute read
430000
heap
page read and write
4691000
heap
page read and write
E32DAFF000
stack
page read and write
4691000
heap
page read and write
140C000
heap
page read and write
45F1000
heap
page read and write
4E11000
heap
page read and write
353E000
stack
page read and write
17226110000
heap
page read and write
27997630000
trusted library allocation
page read and write
5E5F000
trusted library allocation
page read and write
2479E99C000
heap
page read and write
5420000
direct allocation
page execute and read and write
73D0000
trusted library allocation
page read and write
6AE1000
heap
page read and write
362F000
stack
page read and write
71C0000
direct allocation
page execute and read and write
2479E99C000
heap
page read and write
6AE1000
heap
page read and write
3CBE000
stack
page read and write
5E34000
trusted library allocation
page read and write
540000
unkown
page readonly
2F2F000
stack
page read and write
1080000
unkown
page execute and read and write
4691000
heap
page read and write
541000
unkown
page execute read
493E000
stack
page read and write
436E000
stack
page read and write
24C999B0000
heap
page read and write
583C0FE000
stack
page read and write
5E01000
trusted library allocation
page read and write
64C847C000
stack
page read and write
19E4000
heap
page read and write
E96000
unkown
page read and write
31BE000
stack
page read and write
1E276E30000
heap
page read and write
4E00000
direct allocation
page read and write
2A4F000
stack
page read and write
E30000
unkown
page readonly
39EF000
stack
page read and write
4691000
heap
page read and write
7FF73FDCD000
unkown
page execute and read and write
1FED929C000
heap
page read and write
5830000
direct allocation
page read and write
2720000
heap
page read and write
5F6E000
stack
page read and write
58F000
unkown
page readonly
1443000
heap
page read and write
13CB000
heap
page read and write
5DEC000
trusted library allocation
page read and write
58F000
unkown
page readonly
433E000
stack
page read and write
3E6E000
stack
page read and write
5C3000
unkown
page execute and write copy
4691000
heap
page read and write
13CB000
heap
page read and write
281ABA40000
heap
page read and write
28E2CC7E000
heap
page read and write
140C000
heap
page read and write
1B20000
unkown
page readonly
7FF7ECD61000
unkown
page execute read
6AE1000
heap
page read and write
562000
unkown
page execute and write copy
7598000
heap
page read and write
140739000
unkown
page readonly
2479E8D5000
heap
page read and write
27997469000
heap
page read and write
5E02000
trusted library allocation
page read and write
37BF000
stack
page read and write
7FF7ECDF1000
unkown
page readonly
24C99AE0000
trusted library allocation
page read and write
5E1A000
trusted library allocation
page read and write
37BE000
stack
page read and write
59E000
stack
page read and write
52AF000
stack
page read and write
38AF000
stack
page read and write
4691000
heap
page read and write
A0E000
stack
page read and write
1B1B42A0000
heap
page read and write
457E000
stack
page read and write
2479E8D0000
heap
page read and write
4691000
heap
page read and write
37DE000
stack
page read and write
281ABA45000
heap
page read and write
27997630000
trusted library allocation
page read and write
B85BDFF000
stack
page read and write
2479E968000
heap
page read and write
4E11000
heap
page read and write
1B1B42B0000
trusted library allocation
page read and write
3B2F000
stack
page read and write
6AE1000
heap
page read and write
145C000
heap
page read and write
13A6000
heap
page read and write
4A50000
direct allocation
page execute and read and write
7FF6DA021000
unkown
page execute and write copy
28E2CC99000
heap
page read and write
41FE000
stack
page read and write
4C10000
direct allocation
page execute and read and write
13D6000
heap
page read and write
7C0000
heap
page read and write
145E000
heap
page read and write
64C867F000
stack
page read and write
7F2B000
stack
page read and write
3B7E000
stack
page read and write
541000
unkown
page execute read
5B0000
heap
page read and write
1450000
heap
page read and write
27997630000
trusted library allocation
page read and write
1910000
direct allocation
page read and write
5DF1000
trusted library allocation
page read and write
1FED92D2000
heap
page read and write
2479E935000
heap
page read and write
5E3A000
trusted library allocation
page read and write
19C4C190000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
49B62FF000
stack
page read and write
4610000
heap
page read and write
1FED9307000
heap
page read and write
541000
unkown
page execute read
D80000
direct allocation
page read and write
A7226FC000
stack
page read and write
1406B6000
unkown
page read and write
289081D0000
heap
page read and write
131C0FC0000
heap
page read and write
501F000
stack
page read and write
93C000
stack
page read and write
A9C71FB000
stack
page read and write
1FED9AB0000
heap
page read and write
5BCE000
stack
page read and write
71F0000
direct allocation
page execute and read and write
1FED9292000
heap
page read and write
19C4C240000
heap
page read and write
5E12000
trusted library allocation
page read and write
760000
direct allocation
page read and write
FE0000
unkown
page execute and write copy
71C0000
direct allocation
page execute and read and write
24C99AE0000
trusted library allocation
page read and write
3A6F000
stack
page read and write
5CF000
unkown
page execute and write copy
4691000
heap
page read and write
1FED92B0000
heap
page read and write
5E02000
trusted library allocation
page read and write
33BF000
stack
page read and write
7FF7ECDD0000
unkown
page readonly
5E9000
unkown
page execute and read and write
42EE000
stack
page read and write
D80000
direct allocation
page read and write
BF3000
unkown
page execute and read and write
7FF7EDACD000
unkown
page readonly
32FE000
stack
page read and write
140C000
heap
page read and write
860000
heap
page read and write
73C000
stack
page read and write
53D000
unkown
page execute and read and write
DA0000
unkown
page readonly
6AE1000
heap
page read and write
144C000
heap
page read and write
4691000
heap
page read and write
360000
unkown
page read and write
1FED92AB000
heap
page read and write
603000
unkown
page execute and read and write
4B20000
direct allocation
page execute and read and write
194E000
heap
page read and write
F75000
unkown
page execute and write copy
5F79000
trusted library allocation
page read and write
19C4C1B0000
heap
page read and write
4691000
heap
page read and write
6AE1000
heap
page read and write
3C9000
unkown
page write copy
4EDF000
stack
page read and write
E09000
unkown
page write copy
3CB000
unkown
page execute and write copy
F94000
unkown
page execute and read and write
456E000
stack
page read and write
4691000
heap
page read and write
5DE3000
trusted library allocation
page read and write
1FED99A0000
remote allocation
page read and write
1910000
direct allocation
page read and write
1E276E35000
heap
page read and write
F71000
unkown
page execute and read and write
D97000
heap
page read and write
1FED929F000
heap
page read and write
1E276E40000
heap
page read and write
DA5BBFE000
stack
page read and write
1442000
heap
page read and write
17226150000
heap
page read and write
4C00000
direct allocation
page execute and read and write
557000
unkown
page execute and write copy
E31000
unkown
page execute read
5B5E000
stack
page read and write
5E5F000
trusted library allocation
page read and write
4FDF000
stack
page read and write
4691000
heap
page read and write
559D000
stack
page read and write
71A0000
direct allocation
page execute and read and write
2B068E50000
heap
page read and write
80E000
stack
page read and write
C40000
direct allocation
page read and write
27997630000
trusted library allocation
page read and write
4691000
heap
page read and write
6AE1000
heap
page read and write
6A1000
unkown
page readonly
501E000
stack
page read and write
DD5000
unkown
page execute and write copy
1003000
unkown
page execute and write copy
2B6F000
stack
page read and write
1FED92B2000
heap
page read and write
4691000
heap
page read and write
47BF000
stack
page read and write
2FAE000
stack
page read and write
1530000
heap
page read and write
1FED9E1B000
heap
page read and write
49B60FC000
stack
page read and write
5E27000
trusted library allocation
page read and write
1425000
heap
page read and write
24C99AE0000
trusted library allocation
page read and write
5E98000
trusted library allocation
page read and write
5E12000
trusted library allocation
page read and write
4B1000
unkown
page execute and read and write
14E4000
heap
page read and write
27997630000
trusted library allocation
page read and write
1424000
heap
page read and write
FC1000
heap
page read and write
14042C000
unkown
page read and write
14E4000
heap
page read and write
4691000
heap
page read and write
C6A000
heap
page read and write
7FF7EDAB9000
unkown
page readonly
4691000
heap
page read and write
A70000
heap
page read and write
2479E984000
heap
page read and write
4A80000
direct allocation
page execute and read and write
555000
unkown
page execute and write copy
145E000
heap
page read and write
201FDAB0000
direct allocation
page read and write
6AE1000
heap
page read and write
2DBF77F0000
heap
page read and write
3CFE000
stack
page read and write
A8C000
heap
page read and write
45F1000
heap
page read and write
4BB32FD000
stack
page read and write
1147000
unkown
page execute and read and write
B70000
heap
page read and write
201FDA50000
heap
page read and write
13B3000
heap
page read and write
1032000
unkown
page execute and write copy
71C0000
direct allocation
page execute and read and write
27997630000
trusted library allocation
page read and write
1FED9E22000
heap
page read and write
6AE1000
heap
page read and write
2B068E5B000
heap
page read and write
540000
unkown
page readonly
4A20000
direct allocation
page execute and read and write
37AE000
stack
page read and write
366E000
stack
page read and write
2A2F000
stack
page read and write
13B3000
heap
page read and write
5E5F000
trusted library allocation
page read and write
6AE1000
heap
page read and write
5E22000
trusted library allocation
page read and write
6AE1000
heap
page read and write
2451E0C0000
trusted library allocation
page read and write
2451E410000
heap
page read and write
4691000
heap
page read and write
53F000
unkown
page execute and write copy
10AD000
unkown
page execute and read and write
1443000
heap
page read and write
2F6E000
stack
page read and write
541000
unkown
page execute read
2479E964000
heap
page read and write
7FF7EDACA000
unkown
page read and write
4691000
heap
page read and write
BF1000
unkown
page execute and read and write
59E000
unkown
page execute and read and write
5D3F000
stack
page read and write
3A7D000
stack
page read and write
4691000
heap
page read and write
B76000
heap
page read and write
A20000
heap
page read and write
5E12000
trusted library allocation
page read and write
7FF73FDCD000
unkown
page execute and read and write
72EC000
heap
page read and write
71C0000
direct allocation
page execute and read and write
66C000
unkown
page execute and write copy
5E02000
trusted library allocation
page read and write
E81000
unkown
page readonly
280E000
stack
page read and write
58F000
unkown
page readonly
4691000
heap
page read and write
4691000
heap
page read and write
3DBF000
stack
page read and write
719F000
stack
page read and write
4691000
heap
page read and write
1580000
heap
page read and write
DD5000
unkown
page execute and read and write
4E00000
direct allocation
page read and write
7FF7EDACA000
unkown
page write copy
253E000
stack
page read and write
555000
unkown
page execute and write copy
85F000
unkown
page readonly
9D0000
heap
page read and write
6AE1000
heap
page read and write
E31000
unkown
page execute read
183F000
stack
page read and write
71C0000
direct allocation
page execute and read and write
13C9000
heap
page read and write
622000
unkown
page execute and read and write
400000
unkown
page readonly
2830000
direct allocation
page read and write
A9C72FF000
stack
page read and write
45F1000
heap
page read and write
1FED92B7000
heap
page read and write
44DE000
stack
page read and write
5DD5000
trusted library allocation
page read and write
6AE1000
heap
page read and write
3CBE000
stack
page read and write
6AE1000
heap
page read and write
13C9000
heap
page read and write
4A30000
trusted library allocation
page read and write
3CB000
unkown
page execute and write copy
5DD9000
trusted library allocation
page read and write
7FF73FDC8000
unkown
page execute and read and write
6AE1000
heap
page read and write
4F10000
trusted library allocation
page read and write
27997630000
trusted library allocation
page read and write
7240000
direct allocation
page execute and read and write
45E0000
direct allocation
page read and write
2730000
direct allocation
page read and write
505E000
stack
page read and write
3C9000
unkown
page write copy
2DAE000
stack
page read and write
3E1E000
stack
page read and write
1FED9317000
heap
page read and write
3CB000
unkown
page execute and read and write
70B000
stack
page read and write
CAE000
unkown
page execute and read and write
3BDF000
stack
page read and write
14E4000
heap
page read and write
19F0000
heap
page read and write
188B000
stack
page read and write
72D1000
heap
page read and write
16463CBE000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
D80000
direct allocation
page read and write
7FF7ECD61000
unkown
page execute read
5E12000
trusted library allocation
page read and write
3FAE000
stack
page read and write
B18000
heap
page read and write
AA1000
heap
page read and write
1FED9268000
heap
page read and write
2B068E00000
heap
page read and write
52A0000
direct allocation
page read and write
B14000
heap
page read and write
6AE1000
heap
page read and write
7FF6DA1D8000
unkown
page execute and read and write
6AE1000
heap
page read and write
144C000
heap
page read and write
6AE1000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
24C99A90000
heap
page read and write
140C000
heap
page read and write
5E21000
trusted library allocation
page read and write
3D942FF000
stack
page read and write
2E2E000
stack
page read and write
6BD000
unkown
page readonly
6AE1000
heap
page read and write
13A6000
heap
page read and write
3D9427F000
unkown
page read and write
6AE1000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
27997630000
trusted library allocation
page read and write
24C99AE0000
trusted library allocation
page read and write
145E000
heap
page read and write
54B000
stack
page read and write
9B000
stack
page read and write
3D0000
heap
page read and write
71C0000
direct allocation
page execute and read and write
37EF000
stack
page read and write
140A000
heap
page read and write
24C99AE0000
trusted library allocation
page read and write
356F000
stack
page read and write
1FED92BA000
heap
page read and write
B32000
heap
page read and write
4C00000
direct allocation
page execute and read and write
52E2000
direct allocation
page read and write
4691000
heap
page read and write
3CEE000
stack
page read and write
4A0F000
stack
page read and write
28E2CB20000
heap
page read and write
6AE1000
heap
page read and write
6451000
heap
page read and write
E88E9FE000
stack
page read and write
C40000
direct allocation
page read and write
1441000
heap
page read and write
24C99AE0000
trusted library allocation
page read and write
D70000
heap
page read and write
38BF000
stack
page read and write
C1F000
stack
page read and write
5DF5000
trusted library allocation
page read and write
28E2CC50000
heap
page read and write
591000
unkown
page execute and write copy
D80000
direct allocation
page read and write
8C0000
heap
page read and write
4A90000
direct allocation
page execute and read and write
7FF7EDAB9000
unkown
page readonly
5E5F000
trusted library allocation
page read and write
3E3E000
stack
page read and write
5DEA000
trusted library allocation
page read and write
6ACA000
direct allocation
page read and write
10B3000
unkown
page execute and write copy
D80000
direct allocation
page read and write
292C000
stack
page read and write
682000
unkown
page execute and read and write
1B1B42B0000
trusted library allocation
page read and write
4691000
heap
page read and write
247A068C000
heap
page read and write
E81000
unkown
page readonly
4440000
heap
page read and write
6AE1000
heap
page read and write
1FED9317000
heap
page read and write
140001000
unkown
page execute read
4470000
heap
page read and write
A3E000
heap
page read and write
24C99AE0000
trusted library allocation
page read and write
B15000
heap
page read and write
247A0680000
heap
page read and write
4A90000
direct allocation
page execute and read and write
17D4000
heap
page read and write
5E5F000
trusted library allocation
page read and write
5E12000
trusted library allocation
page read and write
5CF000
unkown
page execute and write copy
9F0000
heap
page read and write
7FF73F940000
unkown
page readonly
B14000
heap
page read and write
7FF7EDA90000
unkown
page readonly
5C7000
unkown
page execute and read and write
D80000
direct allocation
page read and write
247A0650000
remote allocation
page read and write
A80000
heap
page read and write
4D10000
direct allocation
page execute and read and write
D80000
direct allocation
page read and write
5E12000
trusted library allocation
page read and write
144C000
heap
page read and write
5E73000
trusted library allocation
page read and write
682000
unkown
page execute and write copy
36AF000
stack
page read and write
3D93FDC000
stack
page read and write
32AE000
stack
page read and write
39FF000
stack
page read and write
71C0000
direct allocation
page execute and read and write
5E12000
trusted library allocation
page read and write
27997630000
trusted library allocation
page read and write
5E5F000
trusted library allocation
page read and write
2DEF000
stack
page read and write
45F1000
heap
page read and write
641F000
stack
page read and write
E31000
unkown
page execute read
5EDF000
trusted library allocation
page read and write
B0E000
stack
page read and write
17D4000
heap
page read and write
FFD000
unkown
page execute and write copy
6AE1000
heap
page read and write
2B068D20000
heap
page read and write
46DF000
stack
page read and write
27997630000
trusted library allocation
page read and write
5E02000
trusted library allocation
page read and write
594000
unkown
page execute and read and write
540000
unkown
page readonly
5FA5000
trusted library allocation
page read and write
AA4000
heap
page read and write
AAE000
heap
page read and write
13AA000
heap
page read and write
17D4000
heap
page read and write
66C000
unkown
page execute and write copy
5AF000
unkown
page readonly
541000
unkown
page execute read
5E12000
trusted library allocation
page read and write
9D1000
heap
page read and write
3170000
heap
page read and write
5DE5000
trusted library allocation
page read and write
58F000
unkown
page readonly
52DB000
stack
page read and write
2479E97C000
heap
page read and write
E9D000
unkown
page readonly
7FF7EDACD000
unkown
page readonly
6AE1000
heap
page read and write
5E5F000
trusted library allocation
page read and write
C40000
direct allocation
page read and write
5FA000
unkown
page execute and read and write
B72000
heap
page read and write
4E11000
heap
page read and write
FF0000
heap
page read and write
7290000
direct allocation
page execute and read and write
45B0000
heap
page read and write
2479E951000
heap
page read and write
5440000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
30AB000
stack
page read and write
45F1000
heap
page read and write
5AC000
unkown
page write copy
5E0C000
trusted library allocation
page read and write
4B0000
unkown
page read and write
13EB000
heap
page read and write
2C7F000
stack
page read and write
5D9000
unkown
page execute and read and write
FD1000
unkown
page execute and write copy
2451E090000
heap
page read and write
4691000
heap
page read and write
45F1000
heap
page read and write
5FB000
unkown
page execute and write copy
6AE1000
heap
page read and write
5E5F000
trusted library allocation
page read and write
2451E160000
heap
page read and write
66E000
unkown
page execute and write copy
5A0000
unkown
page execute and write copy
3DDF000
stack
page read and write
5DE1000
trusted library allocation
page read and write
5E5F000
trusted library allocation
page read and write
3D2E000
stack
page read and write
71C0000
direct allocation
page execute and read and write
4E00000
direct allocation
page read and write
2479E99A000
heap
page read and write
44AE000
stack
page read and write
27997630000
trusted library allocation
page read and write
64BD000
heap
page read and write
6467000
heap
page read and write
5E13000
trusted library allocation
page read and write
6AE0000
heap
page read and write
4E11000
heap
page read and write
1FED92AE000
heap
page read and write
175E000
stack
page read and write
1FED9348000
heap
page read and write
27997630000
trusted library allocation
page read and write
5D9000
unkown
page execute and read and write
24C99AE0000
trusted library allocation
page read and write
AFC000
heap
page read and write
556000
unkown
page execute and read and write
11E9000
heap
page read and write
4A80000
direct allocation
page execute and read and write
145E000
heap
page read and write
402F000
stack
page read and write
5AF000
unkown
page readonly
236324B0000
heap
page read and write
49B61FE000
stack
page read and write
327F000
stack
page read and write
E32D7CE000
stack
page read and write
24C99AE0000
trusted library allocation
page read and write
247A067D000
heap
page read and write
5A0000
unkown
page execute and write copy
14E4000
heap
page read and write
A8D000
heap
page read and write
AAE000
heap
page read and write
591E000
stack
page read and write
436E000
stack
page read and write
5E5F000
trusted library allocation
page read and write
5AA000
unkown
page execute and read and write
5E82000
trusted library allocation
page read and write
4691000
heap
page read and write
6AE1000
heap
page read and write
A96000
heap
page read and write
3D9437E000
stack
page read and write
4BBE000
stack
page read and write
247A0687000
heap
page read and write
14042E000
unkown
page read and write
5E68000
trusted library allocation
page read and write
B15000
heap
page read and write
6AE1000
heap
page read and write
85E000
unkown
page write copy
6AE1000
heap
page read and write
5E5F000
trusted library allocation
page read and write
645E000
stack
page read and write
FC0000
heap
page read and write
4A6C000
stack
page read and write
4C00000
direct allocation
page execute and read and write
7C0000
heap
page read and write
5AC000
unkown
page read and write
E0B000
unkown
page execute and write copy
123B000
stack
page read and write
4AE0000
direct allocation
page execute and read and write
15FE000
stack
page read and write
400000
unkown
page readonly
36AF000
stack
page read and write
361000
unkown
page execute and write copy
73D0000
trusted library allocation
page read and write
317D000
heap
page read and write
5E9000
unkown
page execute and read and write
2B2F000
stack
page read and write
1FED92A0000
heap
page read and write
58F000
unkown
page readonly
28E7000
heap
page read and write
7FF7EDACD000
unkown
page readonly
5E5F000
trusted library allocation
page read and write
3D6000
unkown
page execute and read and write
194A000
heap
page read and write
27997410000
heap
page read and write
27997630000
trusted library allocation
page read and write
6AE1000
heap
page read and write
5E5F000
trusted library allocation
page read and write
109D000
unkown
page execute and write copy
11E3000
heap
page read and write
3BCE000
stack
page read and write
1425000
heap
page read and write
5DF7000
trusted library allocation
page read and write
6AE1000
heap
page read and write
43FF000
stack
page read and write
80A000
stack
page read and write
817000
heap
page read and write
F7D000
unkown
page execute and read and write
29FF000
stack
page read and write
140A000
heap
page read and write
145E000
heap
page read and write
562000
unkown
page execute and read and write
5E5F000
trusted library allocation
page read and write
19F6000
heap
page read and write
5E12000
trusted library allocation
page read and write
A99000
heap
page read and write
165A000
heap
page read and write
5E5F000
trusted library allocation
page read and write
5E06000
trusted library allocation
page read and write
52A0000
direct allocation
page read and write
2E2E000
stack
page read and write
BB7000
heap
page read and write
5E02000
trusted library allocation
page read and write
1453000
heap
page read and write
2B06A7D0000
heap
page read and write
1490000
heap
page read and write
4B10000
direct allocation
page execute and read and write
1D8F7130000
heap
page read and write
2479E9D1000
heap
page read and write
5E12000
trusted library allocation
page read and write
1029000
unkown
page execute and read and write
4691000
heap
page read and write
3D6000
unkown
page execute and read and write
6AE1000
heap
page read and write
B3B000
heap
page read and write
6AE1000
heap
page read and write
4F1E000
stack
page read and write
9A0000
heap
page read and write
5E12000
trusted library allocation
page read and write
2799746C000
heap
page read and write
5E57000
trusted library allocation
page read and write
27997630000
trusted library allocation
page read and write
E02000
unkown
page execute and read and write
4A80000
direct allocation
page read and write
583BEFA000
stack
page read and write
7FF7ECD60000
unkown
page readonly
1B1B4220000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
24C99AE0000
trusted library allocation
page read and write
5E12000
trusted library allocation
page read and write
3C9000
unkown
page write copy
1061000
unkown
page execute and write copy
4AC0000
direct allocation
page execute and read and write
58F000
unkown
page readonly
6AE1000
heap
page read and write
4691000
heap
page read and write
4E91000
heap
page read and write
781F000
stack
page read and write
4691000
heap
page read and write
24C99AE0000
trusted library allocation
page read and write
7FF73F941000
unkown
page execute and read and write
14E4000
heap
page read and write
671000
unkown
page execute and read and write
2B8C000
stack
page read and write
A56000
heap
page read and write
5AF000
unkown
page readonly
24C99AE0000
trusted library allocation
page read and write
FB0000
heap
page read and write
6AE1000
heap
page read and write
13AA000
heap
page read and write
23630B90000
heap
page read and write
45E0000
direct allocation
page read and write
2451E0C0000
trusted library allocation
page read and write
6AE1000
heap
page read and write
17D4000
heap
page read and write
5420000
direct allocation
page execute and read and write
5AC000
unkown
page write copy
7A1000
unkown
page execute read
1910000
direct allocation
page read and write
2DBA1220000
heap
page read and write
D4E000
stack
page read and write
36BE000
stack
page read and write
5920000
remote allocation
page read and write
1422000
heap
page read and write
66E000
unkown
page execute and write copy
83A000
heap
page read and write
5F2000
unkown
page execute and write copy
2451E070000
heap
page read and write
15FB000
stack
page read and write
7A60000
heap
page read and write
1FED92A4000
heap
page read and write
2B06A710000
direct allocation
page read and write
4691000
heap
page read and write
6AE1000
heap
page read and write
5E2F000
trusted library allocation
page read and write
2451E0C0000
trusted library allocation
page read and write
2451E0C0000
trusted library allocation
page read and write
82024FE000
stack
page read and write
4691000
heap
page read and write
5E18000
trusted library allocation
page read and write
4691000
heap
page read and write
40BE000
stack
page read and write
45F1000
heap
page read and write
9B66FFF000
stack
page read and write
5E02000
trusted library allocation
page read and write
5DDA000
trusted library allocation
page read and write
178F000
stack
page read and write
64B9000
heap
page read and write
7594000
heap
page read and write
396E000
stack
page read and write
58F000
unkown
page readonly
2479E984000
heap
page read and write
19C4C239000
heap
page read and write
2650000
heap
page read and write
45F1000
heap
page read and write
23632685000
heap
page read and write
17D4000
heap
page read and write
D80000
direct allocation
page read and write
19C4C515000
heap
page read and write
2451E0C0000
trusted library allocation
page read and write
4691000
heap
page read and write
145E000
heap
page read and write
5DD9000
trusted library allocation
page read and write
141E000
stack
page read and write
4A60000
direct allocation
page execute and read and write
4691000
heap
page read and write
5DF1000
trusted library allocation
page read and write
5DF1000
trusted library allocation
page read and write
541000
unkown
page execute read
4E00000
direct allocation
page read and write
26E4000
heap
page read and write
7FF7EDA91000
unkown
page execute read
27997765000
heap
page read and write
4691000
heap
page read and write
4E11000
heap
page read and write
316E000
stack
page read and write
85E000
unkown
page read and write
5E01000
trusted library allocation
page read and write
7FF73F940000
unkown
page readonly
3A30000
direct allocation
page read and write
6AE1000
heap
page read and write
B40000
heap
page read and write
4691000
heap
page read and write
5E5F000
trusted library allocation
page read and write
4E11000
heap
page read and write
5DD2000
trusted library allocation
page read and write
65F000
unkown
page execute and write copy
C40000
direct allocation
page read and write
45F1000
heap
page read and write
45C0000
heap
page read and write
4A50000
direct allocation
page execute and read and write
541000
unkown
page execute read
4AC0000
direct allocation
page execute and read and write
7FF7EDAB9000
unkown
page readonly
4691000
heap
page read and write
5E5F000
trusted library allocation
page read and write
1820000
direct allocation
page read and write
24C99AE0000
trusted library allocation
page read and write
669E000
stack
page read and write
1FED9294000
heap
page read and write
F3C000
stack
page read and write
2479E8B0000
heap
page read and write
144C000
heap
page read and write
201FD940000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
2451E0C0000
trusted library allocation
page read and write
5F6000
unkown
page execute and write copy
41EF000
stack
page read and write
C7D000
heap
page read and write
1E2753D0000
direct allocation
page read and write
131C0DFE000
heap
page read and write
45E0000
direct allocation
page read and write
1360000
heap
page read and write
7FF7EDACA000
unkown
page write copy
4691000
heap
page read and write
27997630000
trusted library allocation
page read and write
1E2753B0000
heap
page read and write
2DBA12FB000
heap
page read and write
A98000
heap
page read and write
27997630000
trusted library allocation
page read and write
3A3E000
stack
page read and write
7333000
heap
page read and write
6AE1000
heap
page read and write
BC0000
heap
page read and write
45F1000
heap
page read and write
5DF7000
trusted library allocation
page read and write
BCE000
stack
page read and write
1B1B4240000
heap
page read and write
7FF7EDA90000
unkown
page readonly
6AE1000
heap
page read and write
55E000
stack
page read and write
140C000
heap
page read and write
CB9C0FE000
stack
page read and write
541000
unkown
page execute read
5DD5000
trusted library allocation
page read and write
7FF7EDA91000
unkown
page execute read
E17000
unkown
page execute and write copy
4C00000
direct allocation
page execute and read and write
61CE000
stack
page read and write
282F000
stack
page read and write
673000
unkown
page execute and write copy
B35000
heap
page read and write
5E3C000
trusted library allocation
page read and write
71E0000
direct allocation
page execute and read and write
7FF7EDA90000
unkown
page readonly
A8D000
unkown
page execute and read and write
2451E0C0000
trusted library allocation
page read and write
1FED92BF000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
13CB000
heap
page read and write
56C000
unkown
page execute and read and write
B14000
heap
page read and write
361000
unkown
page execute and write copy
4B20000
direct allocation
page read and write
5DF7000
trusted library allocation
page read and write
13B3000
heap
page read and write
2479E949000
heap
page read and write
6AE1000
heap
page read and write
5E5F000
trusted library allocation
page read and write
651000
unkown
page execute read
360000
unkown
page read and write
5DE1000
trusted library allocation
page read and write
443F000
stack
page read and write
6AE1000
heap
page read and write
6A5E000
heap
page read and write
7FF7ECDD0000
unkown
page readonly
2AEF000
stack
page read and write
7230000
direct allocation
page execute and read and write
6A60000
heap
page read and write
28909BE0000
direct allocation
page read and write
6AE1000
heap
page read and write
41BE000
stack
page read and write
4691000
heap
page read and write
263E000
stack
page read and write
14E4000
heap
page read and write
BFD000
heap
page read and write
1820000
direct allocation
page read and write
2451E0C0000
trusted library allocation
page read and write
14E0000
heap
page read and write
1480000
heap
page read and write
515F000
stack
page read and write
18CE000
stack
page read and write
5DD2000
trusted library allocation
page read and write
5E12000
trusted library allocation
page read and write
4691000
heap
page read and write
B32000
heap
page read and write
5E01000
trusted library allocation
page read and write
4C40000
direct allocation
page execute and read and write
2479E9F1000
heap
page read and write
4691000
heap
page read and write
1B1B4270000
trusted library allocation
page read and write
14E4000
heap
page read and write
45F1000
heap
page read and write
201FF3A0000
heap
page read and write
D80000
direct allocation
page read and write
673000
unkown
page execute and write copy
B18000
heap
page read and write
569D000
stack
page read and write
6AE1000
heap
page read and write
B30000
heap
page read and write
263B000
stack
page read and write
4691000
heap
page read and write
6AE1000
heap
page read and write
5D4000
unkown
page execute and read and write
45E0000
direct allocation
page read and write
2CBE000
stack
page read and write
4691000
heap
page read and write
5E27000
trusted library allocation
page read and write
5E08000
trusted library allocation
page read and write
There are 3070 hidden memdumps, click here to show them.