IOC Report
ElmEHL9kP9.exe

loading gif

Files

File Path
Type
Category
Malicious
ElmEHL9kP9.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\5TWLADXGMSKDNXXRW4MQ8.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\KF7H5PJ1NUO0L9UQ8ODVOZVGTTR9.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Documents\BFCGDAAKFH.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\CBKFIECBGDHJKECAKFBGDHJKEC
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\CGCAKKKE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DGHIDAFCGIEHIEBFCFBA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FBFHJJJD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\GCFHDAKECFIDGDGDBKJDGIIIDB
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HDGCFHIDAKECFHIEBFCG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KKKJEHCGCGDAAAKFHJKJ
ASCII text, with very long lines (1765), with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\5TWLADXGMSKDNXXRW4MQ8.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\2bae0ff8-79ab-4913-925f-be7200ab08da.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\39176822-a71b-4d12-ba8f-3b88b6c6c165.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\3d5f7c64-a210-4786-a2a0-4b86390005b0.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\4edb2a43-0724-4b65-9d3d-38f7d2c1f742.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\75855f47-a3fd-4dfe-9559-860d0c064ef7.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-676A6489-1734.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-676A648A-B1C.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF336b1.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF336c1.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF343d0.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF343e0.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Dec 24 06:36:34 2024, atime=Wed Sep 27 08:36:55 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Dec 24 06:36:34 2024, atime=Wed Sep 27 08:36:55 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 07:56:51 2023, atime=Wed Sep 27 08:36:55 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Dec 24 06:36:34 2024, atime=Wed Sep 27 08:36:55 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Dec 24 06:36:34 2024, atime=Wed Sep 27 08:36:55 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Dec 24 06:36:34 2024, atime=Wed Sep 27 08:36:55 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
Chrome Cache Entry: 106
ASCII text, with very long lines (823)
downloaded
Chrome Cache Entry: 107
ASCII text
downloaded
Chrome Cache Entry: 108
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 109
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 110
SVG Scalable Vector Graphics image
downloaded
There are 46 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ElmEHL9kP9.exe
"C:\Users\user\Desktop\ElmEHL9kP9.exe"
malicious
C:\Users\user\AppData\Local\Temp\5TWLADXGMSKDNXXRW4MQ8.exe
"C:\Users\user\AppData\Local\Temp\5TWLADXGMSKDNXXRW4MQ8.exe"
malicious
C:\Users\user\AppData\Local\Temp\KF7H5PJ1NUO0L9UQ8ODVOZVGTTR9.exe
"C:\Users\user\AppData\Local\Temp\KF7H5PJ1NUO0L9UQ8ODVOZVGTTR9.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 --field-trial-handle=2036,i,977222782350274699,15640815129298603006,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2532 --field-trial-handle=2360,i,18216618514387370903,8914943351200288340,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2304 --field-trial-handle=2252,i,2792277431044974332,3025383728570224330,262144 /prefetch:3
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\Documents\BFCGDAAKFH.exe"
malicious
C:\Users\user\Documents\BFCGDAAKFH.exe
"C:\Users\user\Documents\BFCGDAAKFH.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.phpaf9748e8b0bdf623d35f52a86479nsion
unknown
malicious
http://185.215.113.206/68b591d6548ec281/vcruntime140.dllX
unknown
malicious
http://185.215.113.206/68b591d6548ec281/softokn3.dll
185.215.113.206
https://duckduckgo.com/chrome_newtab
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dll
185.215.113.206
https://observerfry.lat/apiifaf
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
curverpluch.lat
slipperyloo.lat
tentabatte.lat
manyrestro.lat
https://observerfry.lat/pi
unknown
http://185.215.113.206/c4becf79229cb002.phpe
unknown
http://185.215.113.16/mine/random.exe
185.215.113.16
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.206ocal
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dll
185.215.113.206
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_e149f5d53c9263616797a13067f7a114fa287709b159d0a5
unknown
http://185.215.113.206/68b591d6548ec281/freebl3.dll
185.215.113.206
http://185.215.113.16/mine/random.exe)
unknown
bashfulacid.lat
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://observerfry.lat/P
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dll
185.215.113.206
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696495411400900000.1&ci=1696495411208.12791&cta
unknown
https://observerfry.lat/q/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GNzbMA16ssY5
unknown
http://185.215.113.206/68b591d6548ec281/mozglue.dll
185.215.113.206
http://185.215.113.206/?
unknown
https://observerfry.lat/6
unknown
https://observerfry.lat/AVd
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
172.217.21.36
https://support.mozilla.org/products/firefoxgro.all
unknown
https://observerfry.lat/x5g
unknown
http://www.sqlite.org/copyright.html.
unknown
https://observerfry.lat:443/api
unknown
observerfry.lat
http://185.215.113.206ocalMicrosoft
unknown
wordyfindy.lat
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://observerfry.lat/apirs
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://observerfry.lat/api
172.67.199.72
http://185.215.113.206/68b591d6548ec281/msvcp140.dll
185.215.113.206
shapestickyr.lat
http://185.215.113.16/steam/random.exe
unknown
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://www.google.com/async/newtab_promos
172.217.21.36
http://185.215.113.206/c4becf79229cb002.phpser
unknown
https://observerfry.lat/
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
http://185.215.113.206/c4becf79229cb002.php:F
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696495411400900000.2&ci=1696495411208.
unknown
https://observerfry.lat/api:
unknown
https://observerfry.lat:443/apicohortG
unknown
talkynicer.lat
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
172.217.21.36
http://185.215.113.16/
unknown
http://185.215.113.16/=
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
172.217.21.36
http://185.215.113.16/off/def.exent
unknown
http://185.215.113.16/6
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dllD
unknown
http://crl.microsoftR#
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
http://185.215.113.206/c4becf79229cb002.phpgPreference.Verb
unknown
http://185.215.113.206/c4becf79229cb002.phpI
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqd4plX4pbW1CbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://185.215.113.206/~
unknown
https://support.mozilla.org
unknown
http://185.215.113.16/off/def.exe
unknown
http://crl.microsoftY
unknown
http://185.215.113.16/mine/random.exes
unknown
http://185.215.113.206
unknown
https://observerfry.lat/Progr
unknown
http://185.215.113.206c4becf79229cb002.phpser
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://observerfry.lat/~
unknown
http://185.215.113.206/c4becf79229cb002.phpU
unknown
There are 81 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
172.217.21.36
observerfry.lat
172.67.199.72

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
192.168.2.9
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
172.67.199.72
observerfry.lat
United States
185.215.113.16
unknown
Portugal
239.255.255.250
unknown
Reserved
172.217.21.36
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
E51000
unkown
page execute and read and write
malicious
132E000
heap
page read and write
malicious
B1000
unkown
page execute and read and write
malicious
C21000
unkown
page execute and read and write
malicious
E51000
unkown
page execute and read and write
malicious
5D0E000
trusted library allocation
page read and write
6CB00000
unkown
page readonly
5370000
remote allocation
page read and write
4791000
heap
page read and write
BB2E000
stack
page read and write
E40000
direct allocation
page read and write
5C85000
trusted library allocation
page read and write
10EE000
heap
page read and write
4D40000
trusted library allocation
page read and write
105D000
heap
page read and write
5D51000
trusted library allocation
page read and write
56FF000
heap
page read and write
61ECC000
direct allocation
page read and write
5C84000
trusted library allocation
page read and write
EBB000
unkown
page execute and write copy
8A9E000
heap
page read and write
5C88000
trusted library allocation
page read and write
5370000
remote allocation
page read and write
491E000
stack
page read and write
5C80000
trusted library allocation
page read and write
584C000
trusted library allocation
page read and write
276000
unkown
page execute and write copy
5C81000
trusted library allocation
page read and write
5883000
trusted library allocation
page read and write
5C8F000
trusted library allocation
page read and write
4D40000
direct allocation
page execute and read and write
5C89000
trusted library allocation
page read and write
5D6E000
trusted library allocation
page read and write
320E000
stack
page read and write
10E7000
heap
page read and write
580D000
trusted library allocation
page read and write
126F000
stack
page read and write
57DD000
trusted library allocation
page read and write
37EF000
stack
page read and write
5DD6000
trusted library allocation
page read and write
488E000
stack
page read and write
930000
heap
page read and write
4F6F000
stack
page read and write
4871000
heap
page read and write
5DA9000
trusted library allocation
page read and write
EE4000
heap
page read and write
5D84000
trusted library allocation
page read and write
4791000
heap
page read and write
ED4000
heap
page read and write
584C000
trusted library allocation
page read and write
5C87000
trusted library allocation
page read and write
D70000
heap
page read and write
10B2000
unkown
page execute and read and write
11DB000
heap
page read and write
5ED0000
trusted library allocation
page read and write
4B71000
heap
page read and write
5180000
direct allocation
page execute and read and write
3C0E000
stack
page read and write
424E000
stack
page read and write
EB2000
unkown
page execute and write copy
110A000
unkown
page execute and read and write
585D000
trusted library allocation
page read and write
5708000
heap
page read and write
13F0000
heap
page read and write
4A90000
trusted library allocation
page read and write
5F36000
trusted library allocation
page read and write
5C86000
trusted library allocation
page read and write
1144000
heap
page read and write
4B71000
heap
page read and write
10DF000
heap
page read and write
4B71000
heap
page read and write
5C81000
trusted library allocation
page read and write
712000
unkown
page execute and write copy
1374000
heap
page read and write
B915000
heap
page read and write
E40000
direct allocation
page read and write
5D4C000
trusted library allocation
page read and write
4B71000
heap
page read and write
5860000
trusted library allocation
page read and write
4A80000
direct allocation
page read and write
44EF000
stack
page read and write
EE4000
heap
page read and write
585B000
trusted library allocation
page read and write
57F7000
trusted library allocation
page read and write
4A1F000
stack
page read and write
6CB01000
unkown
page execute read
5E61000
trusted library allocation
page read and write
2CD0000
heap
page read and write
5C85000
trusted library allocation
page read and write
10E2000
heap
page read and write
5E71000
trusted library allocation
page read and write
1094000
heap
page read and write
5C8D000
trusted library allocation
page read and write
415F000
stack
page read and write
422E000
stack
page read and write
4D34000
direct allocation
page read and write
586D000
trusted library allocation
page read and write
587E000
trusted library allocation
page read and write
389F000
stack
page read and write
1314000
heap
page read and write
3C4000
unkown
page execute and write copy
5D3F000
trusted library allocation
page read and write
4B71000
heap
page read and write
5E17000
trusted library allocation
page read and write
1300000
direct allocation
page read and write
1016000
unkown
page execute and write copy
4B71000
heap
page read and write
12881000
heap
page read and write
4A80000
direct allocation
page read and write
5C81000
trusted library allocation
page read and write
5860000
trusted library allocation
page read and write
1300000
direct allocation
page read and write
1310000
direct allocation
page read and write
57ED000
trusted library allocation
page read and write
448F000
stack
page read and write
10D1000
heap
page read and write
586A000
trusted library allocation
page read and write
1314000
heap
page read and write
36DF000
stack
page read and write
5D10000
trusted library allocation
page read and write
5856000
trusted library allocation
page read and write
9A7000
unkown
page execute and write copy
4791000
heap
page read and write
5D7E000
trusted library allocation
page read and write
D00000
heap
page read and write
1094000
heap
page read and write
DCD000
heap
page read and write
5210000
direct allocation
page execute and read and write
5C91000
trusted library allocation
page read and write
4BCD000
trusted library allocation
page execute and read and write
103D000
unkown
page execute and write copy
5DD5000
trusted library allocation
page read and write
5F95000
trusted library allocation
page read and write
3AAE000
stack
page read and write
1155000
unkown
page execute and write copy
4B71000
heap
page read and write
126000
unkown
page execute and read and write
5D37000
trusted library allocation
page read and write
E40000
direct allocation
page read and write
4B71000
heap
page read and write
58A0000
trusted library allocation
page read and write
3C4000
unkown
page execute and read and write
587E000
trusted library allocation
page read and write
5EB6000
trusted library allocation
page read and write
E40000
direct allocation
page read and write
5D46000
trusted library allocation
page read and write
571A000
heap
page read and write
5C8E000
trusted library allocation
page read and write
3A6F000
stack
page read and write
4791000
heap
page read and write
3E9E000
stack
page read and write
10BE000
unkown
page execute and write copy
401F000
stack
page read and write
4871000
heap
page read and write
5DDE000
trusted library allocation
page read and write
446F000
stack
page read and write
3F3000
unkown
page write copy
4B71000
heap
page read and write
3F8F000
stack
page read and write
379E000
stack
page read and write
1314000
heap
page read and write
584F000
trusted library allocation
page read and write
10ED000
heap
page read and write
1370000
direct allocation
page read and write
BA0000
heap
page read and write
5954000
trusted library allocation
page read and write
4C11000
heap
page read and write
ED4000
heap
page read and write
5DCF000
trusted library allocation
page read and write
4FA0000
direct allocation
page execute and read and write
EE4000
heap
page read and write
91E000
stack
page read and write
EE4000
heap
page read and write
1380000
direct allocation
page execute and read and write
1310000
heap
page read and write
E79000
unkown
page execute and write copy
2B9000
unkown
page execute and read and write
5D3A000
trusted library allocation
page read and write
2F9000
unkown
page execute and read and write
4F1E000
stack
page read and write
5801000
trusted library allocation
page read and write
3FEF000
stack
page read and write
420F000
stack
page read and write
585D000
trusted library allocation
page read and write
FF0000
direct allocation
page read and write
4991000
heap
page read and write
4B71000
heap
page read and write
EE4000
heap
page read and write
FF0000
direct allocation
page read and write
5721000
heap
page read and write
4A80000
direct allocation
page read and write
4A60000
direct allocation
page read and write
5B34000
trusted library allocation
page read and write
10E2000
heap
page read and write
EB9000
unkown
page write copy
51F0000
direct allocation
page execute and read and write
5C86000
trusted library allocation
page read and write
5D2C000
trusted library allocation
page read and write
10E4000
heap
page read and write
135E000
stack
page read and write
5DB8000
trusted library allocation
page read and write
5801000
trusted library allocation
page read and write
4B71000
heap
page read and write
105C000
unkown
page execute and read and write
10E5000
heap
page read and write
1300000
direct allocation
page read and write
5C8F000
trusted library allocation
page read and write
5860000
trusted library allocation
page read and write
EE4000
heap
page read and write
3F1E000
stack
page read and write
1034000
unkown
page execute and read and write
5D22000
trusted library allocation
page read and write
386F000
stack
page read and write
3EDF000
stack
page read and write
410E000
stack
page read and write
3FCE000
stack
page read and write
5C83000
trusted library allocation
page read and write
4791000
heap
page read and write
132A000
heap
page read and write
5180000
direct allocation
page execute and read and write
4B71000
heap
page read and write
1094000
heap
page read and write
385E000
stack
page read and write
57E2000
trusted library allocation
page read and write
3C9E000
stack
page read and write
2E5E000
stack
page read and write
11C9000
heap
page read and write
56EB000
heap
page read and write
1104000
heap
page read and write
586E000
trusted library allocation
page read and write
CD5000
unkown
page execute and read and write
4791000
heap
page read and write
5C8C000
trusted library allocation
page read and write
4B60000
direct allocation
page read and write
56EB000
heap
page read and write
4CF0000
direct allocation
page read and write
571A000
heap
page read and write
5857000
trusted library allocation
page read and write
5705000
heap
page read and write
584F000
trusted library allocation
page read and write
DB0000
heap
page read and write
5858000
trusted library allocation
page read and write
112000
unkown
page execute and write copy
103C000
unkown
page execute and read and write
4B71000
heap
page read and write
5709000
heap
page read and write
5D16000
trusted library allocation
page read and write
590E000
trusted library allocation
page read and write
5D45000
trusted library allocation
page read and write
4B60000
direct allocation
page read and write
411E000
stack
page read and write
6970000
heap
page read and write
4B71000
heap
page read and write
587E000
trusted library allocation
page read and write
4791000
heap
page read and write
4E70000
direct allocation
page execute and read and write
33DE000
stack
page read and write
BA5000
heap
page read and write
56FD000
heap
page read and write
586D000
trusted library allocation
page read and write
54DF000
stack
page read and write
5C83000
trusted library allocation
page read and write
5722000
heap
page read and write
10F8000
heap
page read and write
61ECD000
direct allocation
page readonly
8B1000
unkown
page execute and read and write
5F1F000
trusted library allocation
page read and write
EE4000
heap
page read and write
108A000
heap
page read and write
4791000
heap
page read and write
4B71000
heap
page read and write
940000
heap
page read and write
4791000
heap
page read and write
5874000
trusted library allocation
page read and write
13D6000
heap
page read and write
10E4000
heap
page read and write
2B7000
unkown
page execute and write copy
5C89000
trusted library allocation
page read and write
3DDE000
stack
page read and write
4B71000
heap
page read and write
1165000
unkown
page execute and write copy
1099000
unkown
page execute and read and write
486E000
stack
page read and write
4F90000
direct allocation
page execute and read and write
5713000
heap
page read and write
107C000
heap
page read and write
585B000
trusted library allocation
page read and write
30EF000
stack
page read and write
5DF9000
trusted library allocation
page read and write
5C85000
trusted library allocation
page read and write
110A000
heap
page read and write
586A000
trusted library allocation
page read and write
10E5000
heap
page read and write
56E2000
heap
page read and write
4B5F000
stack
page read and write
5806000
trusted library allocation
page read and write
5866000
trusted library allocation
page read and write
5DF4000
trusted library allocation
page read and write
8EA000
unkown
page execute and write copy
10EE000
heap
page read and write
336F000
stack
page read and write
584C000
trusted library allocation
page read and write
4D5B000
trusted library allocation
page execute and read and write
5DBF000
trusted library allocation
page read and write
5150000
direct allocation
page execute and read and write
5250000
direct allocation
page execute and read and write
BBD000
stack
page read and write
10CA000
unkown
page execute and write copy
4A80000
direct allocation
page read and write
110B000
unkown
page execute and write copy
380000
unkown
page execute and read and write
CA4000
unkown
page execute and read and write
58D8000
trusted library allocation
page read and write
5C8F000
trusted library allocation
page read and write
1067000
unkown
page execute and write copy
5000000
direct allocation
page execute and read and write
5D83000
trusted library allocation
page read and write
5C8F000
trusted library allocation
page read and write
5D81000
trusted library allocation
page read and write
140B000
heap
page read and write
4770000
heap
page read and write
4B71000
heap
page read and write
57FD000
trusted library allocation
page read and write
40CF000
stack
page read and write
2B2F000
stack
page read and write
E58000
unkown
page execute and read and write
4791000
heap
page read and write
586D000
trusted library allocation
page read and write
10E6000
heap
page read and write
5722000
heap
page read and write
5C95000
trusted library allocation
page read and write
57FA000
trusted library allocation
page read and write
5E1C000
trusted library allocation
page read and write
1095000
heap
page read and write
5EB2000
trusted library allocation
page read and write
439E000
stack
page read and write
5170000
direct allocation
page execute and read and write
5C87000
trusted library allocation
page read and write
EB9000
unkown
page write copy
B9B0000
trusted library allocation
page read and write
5D77000
trusted library allocation
page read and write
5E78000
trusted library allocation
page read and write
5845000
trusted library allocation
page read and write
114E000
unkown
page execute and write copy
5D6A000
trusted library allocation
page read and write
4B71000
heap
page read and write
5F32000
trusted library allocation
page read and write
10B2000
unkown
page execute and read and write
1155000
unkown
page execute and write copy
2E6F000
stack
page read and write
4B60000
direct allocation
page read and write
5860000
trusted library allocation
page read and write
5806000
trusted library allocation
page read and write
5863000
trusted library allocation
page read and write
589D000
trusted library allocation
page read and write
5D43000
trusted library allocation
page read and write
1389000
heap
page read and write
5C88000
trusted library allocation
page read and write
4BD4000
trusted library allocation
page read and write
E40000
direct allocation
page read and write
1082000
unkown
page execute and read and write
5C85000
trusted library allocation
page read and write
5C86000
trusted library allocation
page read and write
5370000
remote allocation
page read and write
4B71000
heap
page read and write
5C88000
trusted library allocation
page read and write
4CF0000
direct allocation
page read and write
4E20000
direct allocation
page read and write
103B000
unkown
page execute and read and write
1300000
direct allocation
page read and write
5709000
heap
page read and write
4B71000
heap
page read and write
2C5E000
stack
page read and write
4B71000
heap
page read and write
5896000
trusted library allocation
page read and write
1300000
direct allocation
page read and write
5857000
trusted library allocation
page read and write
5C86000
trusted library allocation
page read and write
2C9B000
stack
page read and write
585D000
trusted library allocation
page read and write
4991000
heap
page read and write
73DF000
stack
page read and write
ED4000
heap
page read and write
3EAF000
stack
page read and write
5875000
trusted library allocation
page read and write
376E000
stack
page read and write
57D5000
trusted library allocation
page read and write
4DDE000
stack
page read and write
10CB000
unkown
page execute and read and write
65BE000
stack
page read and write
4791000
heap
page read and write
5D66000
trusted library allocation
page read and write
592E000
trusted library allocation
page read and write
7D0000
heap
page read and write
110A000
heap
page read and write
5848000
trusted library allocation
page read and write
5C8A000
trusted library allocation
page read and write
E40000
direct allocation
page read and write
5D7B000
trusted library allocation
page read and write
4C11000
heap
page read and write
298C000
stack
page read and write
5E32000
trusted library allocation
page read and write
BBD2000
heap
page read and write
EE4000
heap
page read and write
9B8000
unkown
page execute and write copy
6D5C2000
unkown
page readonly
52ED000
stack
page read and write
5188000
stack
page read and write
4791000
heap
page read and write
110A000
heap
page read and write
3A0000
unkown
page execute and write copy
3E6E000
stack
page read and write
5897000
trusted library allocation
page read and write
5B38000
trusted library allocation
page read and write
E6C000
unkown
page execute and read and write
5722000
heap
page read and write
4791000
heap
page read and write
1310000
direct allocation
page read and write
4B71000
heap
page read and write
B961000
heap
page read and write
2E8F000
stack
page read and write
5863000
trusted library allocation
page read and write
5DB0000
trusted library allocation
page read and write
329E000
stack
page read and write
5C89000
trusted library allocation
page read and write
5856000
trusted library allocation
page read and write
4B71000
heap
page read and write
5722000
heap
page read and write
4791000
heap
page read and write
436E000
stack
page read and write
5E5E000
trusted library allocation
page read and write
6D530000
unkown
page readonly
5EBE000
trusted library allocation
page read and write
10A9000
unkown
page execute and read and write
4B60000
direct allocation
page read and write
6BEB000
stack
page read and write
363000
unkown
page execute and read and write
4B71000
heap
page read and write
3ACE000
stack
page read and write
4C0F000
stack
page read and write
12880000
heap
page read and write
710D000
stack
page read and write
56EB000
heap
page read and write
5DB4000
trusted library allocation
page read and write
584C000
trusted library allocation
page read and write
394F000
stack
page read and write
45DF000
stack
page read and write
5C8C000
trusted library allocation
page read and write
4791000
heap
page read and write
4791000
heap
page read and write
461E000
stack
page read and write
5D26000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
710000
unkown
page read and write
13C5000
heap
page read and write
61ED4000
direct allocation
page readonly
108D000
heap
page read and write
5896000
trusted library allocation
page read and write
B959000
heap
page read and write
EE4000
heap
page read and write
5704000
heap
page read and write
4791000
heap
page read and write
5C88000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
5C84000
trusted library allocation
page read and write
51E0000
direct allocation
page execute and read and write
10AA000
unkown
page execute and write copy
114F000
unkown
page execute and read and write
9B8000
unkown
page execute and write copy
51D0000
direct allocation
page execute and read and write
1314000
heap
page read and write
4B71000
heap
page read and write
9FE000
stack
page read and write
51F0000
direct allocation
page execute and read and write
1098000
heap
page read and write
1372000
heap
page read and write
57F2000
trusted library allocation
page read and write
419E000
stack
page read and write
585E000
trusted library allocation
page read and write
4791000
heap
page read and write
13FB000
heap
page read and write
5D1C000
trusted library allocation
page read and write
5C8B000
trusted library allocation
page read and write
5D24000
trusted library allocation
page read and write
EBB000
unkown
page execute and read and write
5895000
trusted library allocation
page read and write
2D0000
unkown
page execute and read and write
580D000
trusted library allocation
page read and write
2D1F000
stack
page read and write
1300000
direct allocation
page read and write
5D68000
trusted library allocation
page read and write
FE1000
unkown
page execute and write copy
10B3000
unkown
page execute and write copy
59AE000
trusted library allocation
page read and write
C1E000
stack
page read and write
4B71000
heap
page read and write
DB8000
heap
page read and write
5705000
heap
page read and write
938000
unkown
page execute and read and write
47DE000
stack
page read and write
5803000
trusted library allocation
page read and write
1079000
heap
page read and write
4871000
heap
page read and write
44DE000
stack
page read and write
1079000
heap
page read and write
57F7000
trusted library allocation
page read and write
6EDE000
stack
page read and write
1016000
unkown
page execute and write copy
6D5BE000
unkown
page read and write
586D000
trusted library allocation
page read and write
5D78000
trusted library allocation
page read and write
58AD000
trusted library allocation
page read and write
3B3000
unkown
page execute and read and write
571A000
heap
page read and write
5722000
heap
page read and write
93B000
heap
page read and write
10CC000
unkown
page execute and write copy
5C8E000
trusted library allocation
page read and write
EC5000
unkown
page execute and write copy
35DE000
stack
page read and write
4ACF000
stack
page read and write
11B000
unkown
page execute and write copy
13AF000
stack
page read and write
5200000
direct allocation
page execute and read and write
1032000
unkown
page execute and read and write
5180000
direct allocation
page execute and read and write
5C8D000
trusted library allocation
page read and write
1098000
unkown
page execute and read and write
2FA000
unkown
page execute and write copy
40EE000
stack
page read and write
56E9000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
2C2F000
stack
page read and write
5DBA000
trusted library allocation
page read and write
E50000
unkown
page readonly
537C000
stack
page read and write
4871000
heap
page read and write
1061000
unkown
page execute and write copy
4E70000
direct allocation
page execute and read and write
EE4000
heap
page read and write
D5B000
stack
page read and write
4B71000
heap
page read and write
10E4000
heap
page read and write
3AF000
unkown
page execute and read and write
6FDF000
stack
page read and write
8A20000
heap
page read and write
EE4000
heap
page read and write
143F000
stack
page read and write
4791000
heap
page read and write
BBDD000
heap
page read and write
4B60000
direct allocation
page read and write
922000
unkown
page execute and write copy
4B71000
heap
page read and write
5C88000
trusted library allocation
page read and write
56E1000
heap
page read and write
1035000
unkown
page execute and write copy
5705000
heap
page read and write
5E5D000
trusted library allocation
page read and write
1100000
unkown
page execute and write copy
6CCDF000
unkown
page write copy
5865000
trusted library allocation
page read and write
4871000
heap
page read and write
5C8B000
trusted library allocation
page read and write
53D0000
heap
page read and write
5C95000
trusted library allocation
page read and write
1287C000
stack
page read and write
1100000
heap
page read and write
5DB4000
trusted library allocation
page read and write
3D1F000
stack
page read and write
9A0000
unkown
page execute and write copy
5C85000
trusted library allocation
page read and write
5722000
heap
page read and write
5826000
trusted library allocation
page read and write
5D68000
trusted library allocation
page read and write
4B60000
direct allocation
page read and write
56FA000
heap
page read and write
5B38000
trusted library allocation
page read and write
4D70000
direct allocation
page execute and read and write
5D58000
trusted library allocation
page read and write
5E09000
trusted library allocation
page read and write
5ED4000
trusted library allocation
page read and write
908000
unkown
page execute and read and write
5DA0000
trusted library allocation
page read and write
5850000
trusted library allocation
page read and write
71A000
unkown
page execute and read and write
10F8000
heap
page read and write
5814000
trusted library allocation
page read and write
10D3000
unkown
page execute and read and write
587E000
trusted library allocation
page read and write
5860000
trusted library allocation
page read and write
362E000
stack
page read and write
5C8E000
trusted library allocation
page read and write
5875000
trusted library allocation
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
2B8E000
stack
page read and write
1057000
unkown
page execute and write copy
11B4000
heap
page read and write
5C82000
trusted library allocation
page read and write
5C89000
trusted library allocation
page read and write
4C10000
heap
page read and write
3E5F000
stack
page read and write
5DB6000
trusted library allocation
page read and write
496F000
stack
page read and write
2A0E000
stack
page read and write
11DE000
heap
page read and write
5DB6000
trusted library allocation
page read and write
2F8F000
stack
page read and write
ED4000
heap
page read and write
1090000
heap
page read and write
ED4000
heap
page read and write
1031000
unkown
page execute and write copy
585D000
trusted library allocation
page read and write
4B71000
heap
page read and write
5010000
direct allocation
page execute and read and write
1104000
heap
page read and write
ED4000
heap
page read and write
57E2000
trusted library allocation
page read and write
110A000
heap
page read and write
D7A000
heap
page read and write
584E000
trusted library allocation
page read and write
5EFB000
trusted library allocation
page read and write
4FF0000
direct allocation
page execute and read and write
5709000
heap
page read and write
B91E000
heap
page read and write
4AA2000
heap
page read and write
5875000
trusted library allocation
page read and write
1098000
unkown
page execute and write copy
5D9C000
trusted library allocation
page read and write
1063000
heap
page read and write
585B000
trusted library allocation
page read and write
5705000
heap
page read and write
5C91000
trusted library allocation
page read and write
589F000
trusted library allocation
page read and write
56E1000
heap
page read and write
2DEF000
stack
page read and write
5C85000
trusted library allocation
page read and write
8A32000
heap
page read and write
10CB000
unkown
page execute and read and write
10AE000
stack
page read and write
4F71000
trusted library allocation
page read and write
5851000
trusted library allocation
page read and write
5705000
heap
page read and write
358F000
stack
page read and write
EE4000
heap
page read and write
643B000
stack
page read and write
4791000
heap
page read and write
4B60000
direct allocation
page read and write
515E000
stack
page read and write
51D0000
direct allocation
page execute and read and write
EE4000
heap
page read and write
5804000
trusted library allocation
page read and write
3A8F000
stack
page read and write
45CF000
stack
page read and write
552D000
stack
page read and write
4C30000
heap
page read and write
5B3D000
trusted library allocation
page read and write
66C000
stack
page read and write
31DF000
stack
page read and write
4B71000
heap
page read and write
4791000
heap
page read and write
108F000
unkown
page execute and write copy
326E000
stack
page read and write
2C1E000
stack
page read and write
3BEE000
stack
page read and write
5E2E000
trusted library allocation
page read and write
5C8C000
trusted library allocation
page read and write
5714000
heap
page read and write
584F000
trusted library allocation
page read and write
BBDA000
heap
page read and write
584F000
trusted library allocation
page read and write
4791000
heap
page read and write
1120000
unkown
page execute and read and write
4B71000
heap
page read and write
56FC000
heap
page read and write
5C8A000
trusted library allocation
page read and write
1081000
unkown
page execute and write copy
5D75000
trusted library allocation
page read and write
5E07000
trusted library allocation
page read and write
5D8F000
trusted library allocation
page read and write
4D3E000
stack
page read and write
1165000
unkown
page execute and write copy
10AF000
unkown
page execute and write copy
322F000
stack
page read and write
4B60000
direct allocation
page read and write
5C81000
trusted library allocation
page read and write
5C84000
trusted library allocation
page read and write
1300000
direct allocation
page read and write
586D000
trusted library allocation
page read and write
FF0000
direct allocation
page read and write
1310000
direct allocation
page read and write
B8D0000
heap
page read and write
4B71000
heap
page read and write
585E000
trusted library allocation
page read and write
4A80000
direct allocation
page read and write
4B71000
heap
page read and write
421F000
stack
page read and write
1032000
unkown
page execute and read and write
5D8B000
trusted library allocation
page read and write
2FF000
unkown
page execute and read and write
1059000
unkown
page execute and read and write
5875000
trusted library allocation
page read and write
1090000
heap
page read and write
5D6C000
trusted library allocation
page read and write
1098000
heap
page read and write
10C3000
unkown
page execute and read and write
3E4F000
stack
page read and write
927000
unkown
page execute and read and write
CF9000
stack
page read and write
348E000
stack
page read and write
10ED000
heap
page read and write
8B20000
trusted library allocation
page read and write
5C91000
trusted library allocation
page read and write
5C87000
trusted library allocation
page read and write
5702000
heap
page read and write
105E000
unkown
page execute and write copy
5D36000
trusted library allocation
page read and write
57E9000
trusted library allocation
page read and write
5C88000
trusted library allocation
page read and write
E40000
direct allocation
page read and write
44CE000
stack
page read and write
5DA3000
trusted library allocation
page read and write
ED4000
heap
page read and write
5C87000
trusted library allocation
page read and write
5701000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
FF0000
direct allocation
page read and write
3C6E000
stack
page read and write
103B000
unkown
page execute and read and write
5D9E000
trusted library allocation
page read and write
4791000
heap
page read and write
1098000
unkown
page execute and write copy
4B71000
heap
page read and write
5C95000
trusted library allocation
page read and write
3D6F000
stack
page read and write
2FDF000
stack
page read and write
108E000
heap
page read and write
4B70000
heap
page read and write
4D80000
direct allocation
page execute and read and write
359F000
stack
page read and write
951000
unkown
page execute and write copy
5864000
trusted library allocation
page read and write
5D2E000
trusted library allocation
page read and write
5C95000
trusted library allocation
page read and write
43EE000
stack
page read and write
1110000
unkown
page execute and write copy
1094000
heap
page read and write
5230000
direct allocation
page execute and read and write
5D80000
trusted library allocation
page read and write
5713000
heap
page read and write
3ADE000
stack
page read and write
697E000
heap
page read and write
56EB000
heap
page read and write
10EA000
heap
page read and write
4EB8000
trusted library allocation
page read and write
4791000
heap
page read and write
1033000
unkown
page execute and write copy
470F000
stack
page read and write
4B71000
heap
page read and write
51E0000
direct allocation
page execute and read and write
D4E000
stack
page read and write
4FA0000
direct allocation
page execute and read and write
3E8E000
stack
page read and write
4A80000
direct allocation
page read and write
ED0000
heap
page read and write
58D9000
trusted library allocation
page read and write
503E000
stack
page read and write
2A10000
heap
page read and write
58D7000
trusted library allocation
page read and write
5713000
heap
page read and write
585D000
trusted library allocation
page read and write
274000
unkown
page execute and read and write
10A8000
unkown
page execute and write copy
944000
unkown
page execute and read and write
1070000
unkown
page execute and read and write
4FA0000
direct allocation
page execute and read and write
5EB8000
trusted library allocation
page read and write
8FD000
unkown
page execute and write copy
49CE000
stack
page read and write
5D9A000
trusted library allocation
page read and write
5722000
heap
page read and write
4B71000
heap
page read and write
C20000
unkown
page read and write
10ED000
heap
page read and write
11BA000
heap
page read and write
B5D000
stack
page read and write
1033000
unkown
page execute and write copy
30CE000
stack
page read and write
5D7D000
trusted library allocation
page read and write
5040000
direct allocation
page execute and read and write
4DC0000
direct allocation
page execute and read and write
315000
unkown
page execute and read and write
4FA0000
direct allocation
page execute and read and write
4B71000
heap
page read and write
5DDD000
trusted library allocation
page read and write
5C86000
trusted library allocation
page read and write
4871000
heap
page read and write
1070000
unkown
page execute and read and write
5C82000
trusted library allocation
page read and write
3B0000
unkown
page execute and write copy
3FDE000
stack
page read and write
4B71000
heap
page read and write
5C83000
trusted library allocation
page read and write
56D6000
heap
page read and write
4B71000
heap
page read and write
EAE000
stack
page read and write
5863000
trusted library allocation
page read and write
2F2F000
stack
page read and write
1300000
direct allocation
page read and write
5713000
heap
page read and write
331F000
stack
page read and write
50CE000
stack
page read and write
455E000
stack
page read and write
5D88000
trusted library allocation
page read and write
5863000
trusted library allocation
page read and write
57F8000
trusted library allocation
page read and write
581B000
trusted library allocation
page read and write
5DBA000
trusted library allocation
page read and write
58DB000
trusted library allocation
page read and write
2BD0000
heap
page read and write
4B71000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
E76000
unkown
page execute and write copy
5D98000
trusted library allocation
page read and write
4B71000
heap
page read and write
EC6000
unkown
page execute and read and write
10E1000
unkown
page execute and read and write
ED4000
heap
page read and write
ED4000
heap
page read and write
5D16000
trusted library allocation
page read and write
5D7B000
trusted library allocation
page read and write
57ED000
trusted library allocation
page read and write
4B71000
heap
page read and write
1300000
direct allocation
page read and write
5828000
trusted library allocation
page read and write
56F7000
heap
page read and write
110B000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
584C000
trusted library allocation
page read and write
5C90000
trusted library allocation
page read and write
1300000
direct allocation
page read and write
10ED000
heap
page read and write
4B71000
heap
page read and write
DC1000
heap
page read and write
4B71000
heap
page read and write
10F8000
heap
page read and write
36AF000
stack
page read and write
2BCE000
stack
page read and write
680E000
stack
page read and write
5DBB000
trusted library allocation
page read and write
48DF000
stack
page read and write
5F30000
trusted library allocation
page read and write
5864000
trusted library allocation
page read and write
10EB000
heap
page read and write
5D4F000
trusted library allocation
page read and write
3B1F000
stack
page read and write
5BBA000
trusted library allocation
page read and write
58AD000
trusted library allocation
page read and write
5DD6000
trusted library allocation
page read and write
4B71000
heap
page read and write
61ED3000
direct allocation
page read and write
5C8F000
trusted library allocation
page read and write
4E70000
direct allocation
page execute and read and write
580A000
trusted library allocation
page read and write
333000
unkown
page execute and read and write
BBCF000
heap
page read and write
5C82000
trusted library allocation
page read and write
58DC000
trusted library allocation
page read and write
11C6000
heap
page read and write
6980000
heap
page read and write
93E000
heap
page read and write
4871000
heap
page read and write
1104000
heap
page read and write
4B71000
heap
page read and write
5D1D000
trusted library allocation
page read and write
114E000
heap
page read and write
ABC000
stack
page read and write
5D28000
trusted library allocation
page read and write
583F000
trusted library allocation
page read and write
308000
unkown
page execute and write copy
5C8B000
trusted library allocation
page read and write
4791000
heap
page read and write
5A46000
trusted library allocation
page read and write
2A17000
heap
page read and write
2E2000
unkown
page execute and read and write
5D2B000
trusted library allocation
page read and write
5D8D000
trusted library allocation
page read and write
57FA000
trusted library allocation
page read and write
10F5000
heap
page read and write
5C86000
trusted library allocation
page read and write
3DAE000
stack
page read and write
5DDC000
trusted library allocation
page read and write
4B71000
heap
page read and write
BB30000
trusted library allocation
page read and write
56FA000
heap
page read and write
E51000
unkown
page execute and write copy
5ADA000
trusted library allocation
page read and write
5D4D000
trusted library allocation
page read and write
5719000
heap
page read and write
10F7000
heap
page read and write
924000
unkown
page execute and read and write
51C0000
direct allocation
page execute and read and write
36CF000
stack
page read and write
5F30000
trusted library allocation
page read and write
11DC000
heap
page read and write
4BE0000
direct allocation
page read and write
5C88000
trusted library allocation
page read and write
690F000
stack
page read and write
597E000
trusted library allocation
page read and write
109F000
unkown
page execute and write copy
587E000
trusted library allocation
page read and write
4A80000
direct allocation
page read and write
5C8A000
trusted library allocation
page read and write
380F000
stack
page read and write
1104000
heap
page read and write
5D3B000
trusted library allocation
page read and write
330F000
stack
page read and write
10DE000
heap
page read and write
57D6000
trusted library allocation
page read and write
1310000
direct allocation
page read and write
716000
unkown
page write copy
52AF000
stack
page read and write
1153000
unkown
page execute and read and write
587E000
trusted library allocation
page read and write
11B3000
heap
page read and write
1164000
unkown
page execute and write copy
4E40000
direct allocation
page execute and read and write
5C83000
trusted library allocation
page read and write
ED4000
heap
page read and write
56FD000
heap
page read and write
937000
heap
page read and write
5E75000
trusted library allocation
page read and write
56FF000
heap
page read and write
5864000
trusted library allocation
page read and write
5DDB000
trusted library allocation
page read and write
2BE0000
heap
page read and write
4791000
heap
page read and write
4B71000
heap
page read and write
71A000
unkown
page execute and write copy
8A1C000
stack
page read and write
B900000
heap
page read and write
5DDA000
trusted library allocation
page read and write
41EF000
stack
page read and write
5E60000
trusted library allocation
page read and write
1030000
unkown
page execute and read and write
6AB8000
heap
page read and write
4791000
heap
page read and write
4791000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
32C000
unkown
page execute and write copy
61EB4000
direct allocation
page read and write
587E000
trusted library allocation
page read and write
4791000
heap
page read and write
12770000
heap
page read and write
5713000
heap
page read and write
434F000
stack
page read and write
4871000
heap
page read and write
4A80000
direct allocation
page read and write
57ED000
trusted library allocation
page read and write
1417000
heap
page read and write
1390000
heap
page read and write
FF0000
direct allocation
page read and write
5C8A000
trusted library allocation
page read and write
1271C000
stack
page read and write
4791000
heap
page read and write
1096000
heap
page read and write
5E15000
trusted library allocation
page read and write
6910000
heap
page read and write
1082000
unkown
page execute and read and write
5705000
heap
page read and write
501F000
stack
page read and write
4B71000
heap
page read and write
5D30000
trusted library allocation
page read and write
5180000
direct allocation
page execute and read and write
1314000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
4B71000
heap
page read and write
4B60000
direct allocation
page read and write
4B71000
heap
page read and write
4D4A000
trusted library allocation
page execute and read and write
4F80000
direct allocation
page execute and read and write
56EB000
heap
page read and write
5722000
heap
page read and write
5D3D000
trusted library allocation
page read and write
4C11000
heap
page read and write
5C89000
trusted library allocation
page read and write
5D72000
trusted library allocation
page read and write
5863000
trusted library allocation
page read and write
6DFC000
stack
page read and write
4B71000
heap
page read and write
5DC9000
trusted library allocation
page read and write
3A1000
unkown
page execute and write copy
E6A000
unkown
page write copy
10CA000
unkown
page execute and write copy
5705000
heap
page read and write
2E2E000
stack
page read and write
1104000
heap
page read and write
5705000
heap
page read and write
584F000
trusted library allocation
page read and write
5C8F000
trusted library allocation
page read and write
5C83000
trusted library allocation
page read and write
2EDF000
stack
page read and write
4791000
heap
page read and write
5C80000
trusted library allocation
page read and write
5ADD000
trusted library allocation
page read and write
5D4E000
trusted library allocation
page read and write
4990000
heap
page read and write
370E000
stack
page read and write
57E2000
trusted library allocation
page read and write
10ED000
heap
page read and write
5220000
direct allocation
page execute and read and write
5D3E000
trusted library allocation
page read and write
5864000
trusted library allocation
page read and write
1098000
heap
page read and write
5160000
direct allocation
page execute and read and write
B1000
unkown
page execute and write copy
5D71000
trusted library allocation
page read and write
5A86000
trusted library allocation
page read and write
56FC000
heap
page read and write
31EE000
stack
page read and write
56EB000
heap
page read and write
5885000
trusted library allocation
page read and write
58DD000
trusted library allocation
page read and write
1098000
heap
page read and write
4BC3000
trusted library allocation
page execute and read and write
309F000
stack
page read and write
105E000
heap
page read and write
5DF7000
trusted library allocation
page read and write
587E000
trusted library allocation
page read and write
5C82000
trusted library allocation
page read and write
479F000
stack
page read and write
BBD7000
heap
page read and write
4871000
heap
page read and write
58AD000
trusted library allocation
page read and write
57E2000
trusted library allocation
page read and write
2BE7000
heap
page read and write
56E2000
heap
page read and write
5DFB000
trusted library allocation
page read and write
1153000
unkown
page execute and read and write
112000
unkown
page execute and read and write
4B71000
heap
page read and write
1098000
heap
page read and write
5D3D000
trusted library allocation
page read and write
8B0000
heap
page read and write
56FA000
heap
page read and write
4791000
heap
page read and write
9B6000
unkown
page execute and read and write
5E43000
trusted library allocation
page read and write
5863000
trusted library allocation
page read and write
1220000
heap
page read and write
61C3000
trusted library allocation
page read and write
1034000
unkown
page execute and read and write
1310000
direct allocation
page read and write
5D30000
trusted library allocation
page read and write
10E1000
unkown
page execute and read and write
5857000
trusted library allocation
page read and write
4791000
heap
page read and write
51CF000
stack
page read and write
768000
stack
page read and write
4B60000
direct allocation
page read and write
6AB0000
heap
page read and write
10F6000
heap
page read and write
B902000
heap
page read and write
5C8F000
trusted library allocation
page read and write
3AEF000
stack
page read and write
EC6000
unkown
page execute and read and write
4A91000
heap
page read and write
57DD000
trusted library allocation
page read and write
103A000
unkown
page execute and write copy
4B71000
heap
page read and write
5C8B000
trusted library allocation
page read and write
B906000
heap
page read and write
E6C000
unkown
page execute and write copy
586D000
trusted library allocation
page read and write
726000
unkown
page execute and write copy
57D7000
trusted library allocation
page read and write
301E000
stack
page read and write
5E5C000
trusted library allocation
page read and write
5705000
heap
page read and write
4A80000
direct allocation
page read and write
11B000
unkown
page execute and write copy
5D4A000
trusted library allocation
page read and write
67CF000
stack
page read and write
4B71000
heap
page read and write
1104000
heap
page read and write
5856000
trusted library allocation
page read and write
56F7000
heap
page read and write
4B71000
heap
page read and write
291000
unkown
page execute and write copy
5DC3000
trusted library allocation
page read and write
4B71000
heap
page read and write
344F000
stack
page read and write
60B2000
trusted library allocation
page read and write
ED4000
heap
page read and write
4B71000
heap
page read and write
916000
unkown
page execute and write copy
5DD7000
trusted library allocation
page read and write
1310000
direct allocation
page read and write
10FE000
unkown
page execute and write copy
334E000
stack
page read and write
5D8B000
trusted library allocation
page read and write
3D0F000
stack
page read and write
5B9D000
trusted library allocation
page read and write
5DA2000
trusted library allocation
page read and write
6D5AD000
unkown
page readonly
1314000
heap
page read and write
1034000
unkown
page execute and read and write
5722000
heap
page read and write
4791000
heap
page read and write
5C82000
trusted library allocation
page read and write
51E0000
direct allocation
page execute and read and write
4791000
heap
page read and write
5828000
trusted library allocation
page read and write
889000
unkown
page execute and read and write
EC7000
unkown
page execute and write copy
1314000
heap
page read and write
58D5000
trusted library allocation
page read and write
1104000
heap
page read and write
13E0000
direct allocation
page execute and read and write
5F34000
trusted library allocation
page read and write
EBB000
unkown
page execute and read and write
57D8000
trusted library allocation
page read and write
57E1000
trusted library allocation
page read and write
5260000
direct allocation
page execute and read and write
4B80000
heap
page read and write
4791000
heap
page read and write
5A82000
trusted library allocation
page read and write
4791000
heap
page read and write
5857000
trusted library allocation
page read and write
585D000
trusted library allocation
page read and write
4791000
heap
page read and write
E40000
direct allocation
page read and write
5C8D000
trusted library allocation
page read and write
315E000
stack
page read and write
56FB000
heap
page read and write
CB0000
heap
page read and write
42DE000
stack
page read and write
59A6000
trusted library allocation
page read and write
438E000
stack
page read and write
5829000
trusted library allocation
page read and write
5857000
trusted library allocation
page read and write
5D1B000
trusted library allocation
page read and write
12FE000
stack
page read and write
710000
unkown
page readonly
4E20000
heap
page read and write
61D1000
trusted library allocation
page read and write
51E0000
direct allocation
page execute and read and write
5DDF000
trusted library allocation
page read and write
586D000
trusted library allocation
page read and write
3A0000
unkown
page readonly
EB2000
unkown
page execute and read and write
57D5000
trusted library allocation
page read and write
402E000
stack
page read and write
586A000
trusted library allocation
page read and write
108D000
unkown
page execute and write copy
5C93000
trusted library allocation
page read and write
587E000
trusted library allocation
page read and write
5D3B000
trusted library allocation
page read and write
51AE000
stack
page read and write
FF0000
direct allocation
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4BD0000
trusted library allocation
page read and write
108A000
heap
page read and write
5C87000
trusted library allocation
page read and write
10E5000
heap
page read and write
1314000
heap
page read and write
5719000
heap
page read and write
EE4000
heap
page read and write
1030000
unkown
page execute and read and write
1094000
heap
page read and write
110A000
heap
page read and write
5DFE000
trusted library allocation
page read and write
586D000
trusted library allocation
page read and write
56FA000
heap
page read and write
5D82000
trusted library allocation
page read and write
5860000
trusted library allocation
page read and write
101D000
unkown
page execute and read and write
691000
unkown
page execute and write copy
1103000
unkown
page execute and read and write
EC7000
unkown
page execute and write copy
106D000
unkown
page execute and write copy
4B71000
heap
page read and write
342F000
stack
page read and write
4EDF000
stack
page read and write
4871000
heap
page read and write
653E000
stack
page read and write
5E9A000
trusted library allocation
page read and write
FF0000
direct allocation
page read and write
88C000
unkown
page execute and write copy
ED4000
heap
page read and write
4B71000
heap
page read and write
5722000
heap
page read and write
108D000
heap
page read and write
5F2E000
trusted library allocation
page read and write
1300000
heap
page read and write
57ED000
trusted library allocation
page read and write
4B71000
heap
page read and write
58A5000
trusted library allocation
page read and write
58DD000
trusted library allocation
page read and write
109A000
unkown
page execute and write copy
5DA2000
trusted library allocation
page read and write
925000
unkown
page execute and write copy
5C84000
trusted library allocation
page read and write
5DCF000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
4C20000
direct allocation
page read and write
1033000
unkown
page execute and write copy
88D000
unkown
page execute and read and write
5D59000
trusted library allocation
page read and write
5849000
trusted library allocation
page read and write
114F000
unkown
page execute and read and write
EE4000
heap
page read and write
5DAC000
trusted library allocation
page read and write
346E000
stack
page read and write
5DCD000
trusted library allocation
page read and write
657E000
stack
page read and write
5E96000
trusted library allocation
page read and write
5030000
direct allocation
page execute and read and write
38DE000
stack
page read and write
398E000
stack
page read and write
5705000
heap
page read and write
498F000
stack
page read and write
5865000
trusted library allocation
page read and write
B918000
heap
page read and write
51E0000
direct allocation
page execute and read and write
4B71000
heap
page read and write
11CB000
heap
page read and write
4B71000
heap
page read and write
4791000
heap
page read and write
29B000
unkown
page execute and read and write
585E000
trusted library allocation
page read and write
66CF000
stack
page read and write
5C92000
trusted library allocation
page read and write
5851000
trusted library allocation
page read and write
5DB0000
trusted library allocation
page read and write
5C91000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
E51000
unkown
page execute and write copy
4791000
heap
page read and write
571A000
heap
page read and write
532B000
stack
page read and write
4991000
heap
page read and write
1314000
heap
page read and write
580C000
trusted library allocation
page read and write
1082000
unkown
page execute and read and write
5D1E000
trusted library allocation
page read and write
10EF000
heap
page read and write
5C8C000
trusted library allocation
page read and write
53D4000
heap
page read and write
5DA4000
trusted library allocation
page read and write
5C92000
trusted library allocation
page read and write
43AF000
stack
page read and write
6E0000
heap
page read and write
10AA000
unkown
page execute and write copy
5864000
trusted library allocation
page read and write
58DD000
trusted library allocation
page read and write
5C8D000
trusted library allocation
page read and write
325F000
stack
page read and write
1099000
unkown
page execute and read and write
5E74000
trusted library allocation
page read and write
51E0000
direct allocation
page execute and read and write
5C8E000
trusted library allocation
page read and write
47B0000
heap
page read and write
1103000
unkown
page execute and read and write
5E2C000
trusted library allocation
page read and write
10E7000
heap
page read and write
4991000
heap
page read and write
513F000
stack
page read and write
5EBA000
trusted library allocation
page read and write
542E000
stack
page read and write
29CE000
stack
page read and write
105B000
unkown
page execute and write copy
10BE000
unkown
page execute and write copy
724F000
stack
page read and write
5DB4000
trusted library allocation
page read and write
4B71000
heap
page read and write
449F000
stack
page read and write
4E70000
direct allocation
page execute and read and write
D0A000
heap
page read and write
11E7000
heap
page read and write
E40000
direct allocation
page read and write
4C70000
trusted library allocation
page read and write
1079000
heap
page read and write
57F7000
trusted library allocation
page read and write
2EAE000
stack
page read and write
1094000
heap
page read and write
4B71000
heap
page read and write
5C89000
trusted library allocation
page read and write
4D90000
heap
page execute and read and write
4A90000
heap
page read and write
55CE000
stack
page read and write
56FA000
heap
page read and write
2CA0000
heap
page read and write
294000
unkown
page execute and read and write
584C000
trusted library allocation
page read and write
31CF000
stack
page read and write
714E000
stack
page read and write
3BAF000
stack
page read and write
EE4000
heap
page read and write
42AE000
stack
page read and write
B8F0000
heap
page read and write
E20000
heap
page read and write
10E5000
heap
page read and write
2B1F000
stack
page read and write
4871000
heap
page read and write
47A0000
heap
page read and write
432F000
stack
page read and write
584C000
trusted library allocation
page read and write
5865000
trusted library allocation
page read and write
5C89000
trusted library allocation
page read and write
4B71000
heap
page read and write
5A8C000
trusted library allocation
page read and write
56D0000
heap
page read and write
5E44000
trusted library allocation
page read and write
5D91000
trusted library allocation
page read and write
585B000
trusted library allocation
page read and write
11B000
unkown
page execute and read and write
1320000
heap
page read and write
E40000
direct allocation
page read and write
5705000
heap
page read and write
5C8A000
trusted library allocation
page read and write
5D61000
trusted library allocation
page read and write
4871000
heap
page read and write
584F000
trusted library allocation
page read and write
108D000
heap
page read and write
4C1B000
stack
page read and write
5C82000
trusted library allocation
page read and write
4B71000
heap
page read and write
5C85000
trusted library allocation
page read and write
10F8000
heap
page read and write
5D9E000
trusted library allocation
page read and write
1150000
unkown
page execute and write copy
897000
unkown
page execute and write copy
5851000
trusted library allocation
page read and write
4C11000
heap
page read and write
5DE0000
trusted library allocation
page read and write
5DAA000
trusted library allocation
page read and write
115C000
heap
page read and write
482F000
stack
page read and write
2F5F000
stack
page read and write
5C8E000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
10F4000
heap
page read and write
4791000
heap
page read and write
1098000
heap
page read and write
5ECE000
trusted library allocation
page read and write
46EF000
stack
page read and write
5D3D000
trusted library allocation
page read and write
580C000
heap
page read and write
31AF000
stack
page read and write
10DD000
unkown
page execute and write copy
5865000
trusted library allocation
page read and write
5D4C000
trusted library allocation
page read and write
119000
unkown
page write copy
4B71000
heap
page read and write
89B000
unkown
page execute and write copy
4BD0000
trusted library allocation
page read and write
1063000
heap
page read and write
45EE000
stack
page read and write
372F000
stack
page read and write
4FA0000
direct allocation
page execute and read and write
4791000
heap
page read and write
56EB000
heap
page read and write
5705000
heap
page read and write
119B000
heap
page read and write
4B0E000
stack
page read and write
4BE0000
direct allocation
page read and write
4E1C000
stack
page read and write
D7E000
heap
page read and write
56FA000
heap
page read and write
119000
unkown
page write copy
5D5A000
trusted library allocation
page read and write
5D20000
trusted library allocation
page read and write
4B71000
heap
page read and write
462F000
stack
page read and write
58D7000
trusted library allocation
page read and write
5EC9000
trusted library allocation
page read and write
38AE000
stack
page read and write
4B60000
direct allocation
page read and write
56FD000
heap
page read and write
4D10000
trusted library allocation
page read and write
1057000
unkown
page execute and write copy
5713000
heap
page read and write
13DE000
stack
page read and write
5B32000
trusted library allocation
page read and write
5DE9000
trusted library allocation
page read and write
58D8000
trusted library allocation
page read and write
4E20000
direct allocation
page read and write
6D531000
unkown
page execute read
5722000
heap
page read and write
5E2A000
trusted library allocation
page read and write
4791000
heap
page read and write
13AF000
stack
page read and write
FF0000
direct allocation
page read and write
585B000
trusted library allocation
page read and write
5701000
heap
page read and write
10EF000
heap
page read and write
5C81000
trusted library allocation
page read and write
1310000
direct allocation
page read and write
5722000
heap
page read and write
1049000
unkown
page execute and read and write
3C5F000
stack
page read and write
10F5000
heap
page read and write
10B5000
unkown
page execute and read and write
E6A000
unkown
page write copy
EC5000
unkown
page execute and write copy
3D5D000
stack
page read and write
5865000
trusted library allocation
page read and write
5D74000
trusted library allocation
page read and write
897000
unkown
page execute and read and write
5D89000
trusted library allocation
page read and write
B8B0000
heap
page read and write
5863000
trusted library allocation
page read and write
4B71000
heap
page read and write
DD0000
heap
page read and write
E40000
direct allocation
page read and write
5C89000
trusted library allocation
page read and write
ED4000
heap
page read and write
35EF000
stack
page read and write
57F5000
trusted library allocation
page read and write
1104000
heap
page read and write
66C000
stack
page read and write
4B71000
heap
page read and write
32B000
unkown
page execute and read and write
942000
unkown
page execute and write copy
13DE000
heap
page read and write
B8B0000
trusted library allocation
page read and write
1310000
direct allocation
page read and write
5020000
direct allocation
page execute and read and write
5DC5000
trusted library allocation
page read and write
FF0000
direct allocation
page read and write
4A80000
direct allocation
page read and write
4791000
heap
page read and write
61E01000
direct allocation
page execute read
5C86000
trusted library allocation
page read and write
585B000
trusted library allocation
page read and write
5D6E000
trusted library allocation
page read and write
8E9000
unkown
page execute and read and write
EBB000
unkown
page execute and write copy
D87000
unkown
page execute and read and write
5D9E000
trusted library allocation
page read and write
92E000
unkown
page execute and read and write
10D2000
heap
page read and write
1083000
unkown
page execute and write copy
1120000
unkown
page execute and write copy
5F71000
trusted library allocation
page read and write
4791000
heap
page read and write
452E000
stack
page read and write
4B71000
heap
page read and write
8EB000
unkown
page execute and read and write
11F7000
heap
page read and write
105C000
unkown
page execute and read and write
5DD4000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
57F9000
trusted library allocation
page read and write
585B000
trusted library allocation
page read and write
5D49000
trusted library allocation
page read and write
4791000
heap
page read and write
56E3000
heap
page read and write
4B71000
heap
page read and write
1063000
heap
page read and write
1100000
unkown
page execute and write copy
5713000
heap
page read and write
5806000
trusted library allocation
page read and write
5D40000
trusted library allocation
page read and write
1310000
direct allocation
page read and write
2CEF000
stack
page read and write
1003000
unkown
page execute and read and write
5D3F000
trusted library allocation
page read and write
10E4000
heap
page read and write
57DC000
trusted library allocation
page read and write
2FAF000
stack
page read and write
465F000
stack
page read and write
FF0000
direct allocation
page read and write
1098000
heap
page read and write
5714000
heap
page read and write
5855000
trusted library allocation
page read and write
5885000
trusted library allocation
page read and write
5D0E000
trusted library allocation
page read and write
5C8D000
trusted library allocation
page read and write
57F4000
trusted library allocation
page read and write
3B5000
unkown
page execute and write copy
1148000
heap
page read and write
8AAB000
heap
page read and write
5C8F000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
1031000
unkown
page execute and write copy
580A000
trusted library allocation
page read and write
A4E000
stack
page read and write
5895000
trusted library allocation
page read and write
586D000
trusted library allocation
page read and write
6CC9F000
unkown
page readonly
5A1A000
trusted library allocation
page read and write
58E1000
trusted library allocation
page read and write
56F7000
heap
page read and write
BD0000
heap
page read and write
8DC000
unkown
page execute and read and write
12AE000
stack
page read and write
5000000
direct allocation
page read and write
5C81000
trusted library allocation
page read and write
1090000
heap
page read and write
5958000
trusted library allocation
page read and write
392F000
stack
page read and write
584C000
trusted library allocation
page read and write
5826000
trusted library allocation
page read and write
57D5000
trusted library allocation
page read and write
588C000
trusted library allocation
page read and write
2CD7000
heap
page read and write
384E000
stack
page read and write
5DCE000
trusted library allocation
page read and write
902000
unkown
page execute and write copy
13A3000
heap
page read and write
127000
unkown
page execute and write copy
5C8E000
trusted library allocation
page read and write
51B0000
direct allocation
page execute and read and write
A5C000
stack
page read and write
472E000
stack
page read and write
901000
unkown
page execute and read and write
6AB5000
heap
page read and write
585B000
trusted library allocation
page read and write
DC0000
heap
page read and write
5896000
trusted library allocation
page read and write
4B71000
heap
page read and write
56FA000
heap
page read and write
61E00000
direct allocation
page execute and read and write
56DF000
heap
page read and write
4B71000
heap
page read and write
4791000
heap
page read and write
4B71000
heap
page read and write
4E40000
trusted library allocation
page read and write
3F9F000
stack
page read and write
10E2000
heap
page read and write
6CEC000
stack
page read and write
10B1000
unkown
page execute and read and write
585D000
trusted library allocation
page read and write
306F000
stack
page read and write
57F8000
trusted library allocation
page read and write
4791000
heap
page read and write
5C91000
trusted library allocation
page read and write
5855000
trusted library allocation
page read and write
382E000
stack
page read and write
39DF000
stack
page read and write
4791000
heap
page read and write
5180000
direct allocation
page execute and read and write
587B000
trusted library allocation
page read and write
570C000
heap
page read and write
313000
unkown
page execute and write copy
8AA000
unkown
page execute and write copy
1085000
unkown
page execute and read and write
5D43000
trusted library allocation
page read and write
5C80000
trusted library allocation
page read and write
1072000
unkown
page execute and write copy
5D4D000
trusted library allocation
page read and write
5DA5000
trusted library allocation
page read and write
425E000
stack
page read and write
5D3D000
trusted library allocation
page read and write
57FA000
trusted library allocation
page read and write
1059000
unkown
page execute and read and write
5855000
trusted library allocation
page read and write
341000
unkown
page execute and read and write
4871000
heap
page read and write
5D6C000
trusted library allocation
page read and write
5C94000
trusted library allocation
page read and write
3B5000
unkown
page execute and write copy
4A80000
direct allocation
page read and write
5D55000
trusted library allocation
page read and write
1300000
direct allocation
page read and write
5DDA000
trusted library allocation
page read and write
57E7000
trusted library allocation
page read and write
1314000
heap
page read and write
5809000
trusted library allocation
page read and write
589B000
trusted library allocation
page read and write
5863000
trusted library allocation
page read and write
4791000
heap
page read and write
C20000
unkown
page readonly
95C000
unkown
page execute and write copy
56E9000
heap
page read and write
5D3B000
trusted library allocation
page read and write
5D18000
trusted library allocation
page read and write
56FA000
heap
page read and write
5850000
trusted library allocation
page read and write
2F6E000
stack
page read and write
1314000
heap
page read and write
5DD8000
trusted library allocation
page read and write
5D20000
trusted library allocation
page read and write
5851000
trusted library allocation
page read and write
5C8B000
trusted library allocation
page read and write
3B5E000
stack
page read and write
5E1B000
trusted library allocation
page read and write
345F000
stack
page read and write
10F4000
heap
page read and write
1079000
heap
page read and write
33AE000
stack
page read and write
365E000
stack
page read and write
5280000
direct allocation
page execute and read and write
114E000
unkown
page execute and write copy
5DDA000
trusted library allocation
page read and write
4C20000
direct allocation
page read and write
4B71000
heap
page read and write
5875000
trusted library allocation
page read and write
9B6000
unkown
page execute and write copy
59B6000
trusted library allocation
page read and write
65C5000
heap
page read and write
5C86000
trusted library allocation
page read and write
587E000
trusted library allocation
page read and write
5887000
trusted library allocation
page read and write
5855000
trusted library allocation
page read and write
10EF000
heap
page read and write
1314000
heap
page read and write
9A7000
unkown
page execute and write copy
5DBA000
trusted library allocation
page read and write
5C8B000
trusted library allocation
page read and write
4871000
heap
page read and write
290000
unkown
page execute and read and write
FF0000
direct allocation
page read and write
1300000
direct allocation
page read and write
5860000
trusted library allocation
page read and write
E40000
direct allocation
page read and write
5D54000
trusted library allocation
page read and write
5DC7000
trusted library allocation
page read and write
8CA000
unkown
page execute and write copy
4B71000
heap
page read and write
1098000
heap
page read and write
5C8A000
trusted library allocation
page read and write
6D0000
heap
page read and write
5A82000
trusted library allocation
page read and write
4791000
heap
page read and write
585E000
trusted library allocation
page read and write
35AE000
stack
page read and write
E77000
unkown
page execute and read and write
4B71000
heap
page read and write
5C82000
trusted library allocation
page read and write
E3E000
stack
page read and write
4B71000
heap
page read and write
ED4000
heap
page read and write
5C83000
trusted library allocation
page read and write
585B000
trusted library allocation
page read and write
2E1F000
stack
page read and write
1104000
heap
page read and write
466E000
stack
page read and write
5D86000
trusted library allocation
page read and write
3D9F000
stack
page read and write
878000
unkown
page execute and write copy
5C8C000
trusted library allocation
page read and write
5C83000
trusted library allocation
page read and write
5DB9000
trusted library allocation
page read and write
5864000
trusted library allocation
page read and write
960000
unkown
page execute and read and write
E40000
direct allocation
page read and write
4B71000
heap
page read and write
57EE000
trusted library allocation
page read and write
5210000
direct allocation
page execute and read and write
5EB0000
trusted library allocation
page read and write
31E000
unkown
page execute and write copy
5865000
trusted library allocation
page read and write
5D7F000
trusted library allocation
page read and write
5705000
heap
page read and write
5C85000
trusted library allocation
page read and write
4B71000
heap
page read and write
580C000
trusted library allocation
page read and write
12BC000
stack
page read and write
10ED000
heap
page read and write
4E5E000
stack
page read and write
1164000
unkown
page execute and read and write
5EA8000
trusted library allocation
page read and write
4871000
heap
page read and write
1300000
direct allocation
page read and write
1164000
unkown
page execute and write copy
5874000
trusted library allocation
page read and write
2D2F000
stack
page read and write
5F21000
trusted library allocation
page read and write
B0000
unkown
page read and write
107C000
heap
page read and write
763000
stack
page read and write
585E000
trusted library allocation
page read and write
13CC000
heap
page read and write
5800000
trusted library allocation
page read and write
10B3000
unkown
page execute and write copy
3C5000
unkown
page execute and write copy
5D93000
trusted library allocation
page read and write
1120000
unkown
page execute and read and write
56CD000
stack
page read and write
45AF000
stack
page read and write
8A1000
unkown
page execute and read and write
5D51000
trusted library allocation
page read and write
57DC000
trusted library allocation
page read and write
583F000
trusted library allocation
page read and write
4791000
heap
page read and write
4791000
heap
page read and write
105B000
unkown
page execute and write copy
474E000
stack
page read and write
11D1000
heap
page read and write
1108000
unkown
page execute and write copy
396E000
stack
page read and write
ED4000
heap
page read and write
1081000
heap
page read and write
4871000
heap
page read and write
571F000
heap
page read and write
FF0000
direct allocation
page read and write
4791000
heap
page read and write
5824000
trusted library allocation
page read and write
5700000
heap
page read and write
728E000
stack
page read and write
ED4000
heap
page read and write
5853000
trusted library allocation
page read and write
110A000
heap
page read and write
4B60000
direct allocation
page read and write
451F000
stack
page read and write
127E000
stack
page read and write
4B60000
direct allocation
page read and write
4791000
heap
page read and write
5D72000
trusted library allocation
page read and write
BA2E000
stack
page read and write
335E000
stack
page read and write
405E000
stack
page read and write
8A2F000
heap
page read and write
2D6E000
stack
page read and write
426F000
stack
page read and write
4B71000
heap
page read and write
10F8000
heap
page read and write
EB2000
unkown
page execute and read and write
DFF000
heap
page read and write
56FC000
heap
page read and write
585E000
trusted library allocation
page read and write
4791000
heap
page read and write
586D000
trusted library allocation
page read and write
2C1F000
stack
page read and write
5865000
trusted library allocation
page read and write
57EE000
trusted library allocation
page read and write
5C87000
trusted library allocation
page read and write
5845000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
3EEE000
stack
page read and write
5E94000
trusted library allocation
page read and write
505E000
stack
page read and write
B8B0000
trusted library allocation
page read and write
586F000
trusted library allocation
page read and write
57FF000
trusted library allocation
page read and write
5200000
direct allocation
page execute and read and write
2BB000
unkown
page execute and write copy
5850000
trusted library allocation
page read and write
5D82000
trusted library allocation
page read and write
4B71000
heap
page read and write
10F8000
heap
page read and write
1397000
heap
page read and write
5C90000
trusted library allocation
page read and write
4791000
heap
page read and write
4B71000
heap
page read and write
5D68000
trusted library allocation
page read and write
339F000
stack
page read and write
5DB4000
trusted library allocation
page read and write
B90C000
heap
page read and write
4F70000
direct allocation
page execute and read and write
584C000
trusted library allocation
page read and write
4871000
heap
page read and write
5C8C000
trusted library allocation
page read and write
4D80000
trusted library allocation
page execute and read and write
312000
unkown
page execute and read and write
571F000
heap
page read and write
5E6F000
trusted library allocation
page read and write
5862000
trusted library allocation
page read and write
11C6000
heap
page read and write
5D36000
trusted library allocation
page read and write
10A9000
unkown
page execute and read and write
5860000
trusted library allocation
page read and write
114E000
unkown
page execute and write copy
5C82000
trusted library allocation
page read and write
34DF000
stack
page read and write
597E000
trusted library allocation
page read and write
2F9E000
stack
page read and write
570D000
heap
page read and write
1310000
direct allocation
page read and write
4871000
heap
page read and write
4B71000
heap
page read and write
1014000
unkown
page execute and read and write
309000
unkown
page execute and read and write
5857000
trusted library allocation
page read and write
57D8000
trusted library allocation
page read and write
5DFE000
trusted library allocation
page read and write
4791000
heap
page read and write
105D000
heap
page read and write
4791000
heap
page read and write
5722000
heap
page read and write
1140000
unkown
page execute and write copy
ED4000
heap
page read and write
4A91000
heap
page read and write
10E4000
heap
page read and write
5C91000
trusted library allocation
page read and write
876000
unkown
page execute and read and write
43DF000
stack
page read and write
106D000
unkown
page execute and write copy
56EB000
heap
page read and write
5E5F000
trusted library allocation
page read and write
4BC4000
trusted library allocation
page read and write
4871000
heap
page read and write
E50000
unkown
page readonly
EE4000
heap
page read and write
441E000
stack
page read and write
5EFA000
trusted library allocation
page read and write
13D1000
heap
page read and write
EB2000
unkown
page execute and write copy
ED4000
heap
page read and write
10A1000
unkown
page execute and read and write
585B000
trusted library allocation
page read and write
30AE000
stack
page read and write
5DBB000
trusted library allocation
page read and write
3FAD000
stack
page read and write
429F000
stack
page read and write
FDF000
unkown
page execute and read and write
5270000
direct allocation
page execute and read and write
4B71000
heap
page read and write
29B000
unkown
page execute and write copy
10A8000
unkown
page execute and write copy
351E000
stack
page read and write
10F8000
heap
page read and write
5C83000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
57FD000
trusted library allocation
page read and write
1155000
unkown
page execute and write copy
4791000
heap
page read and write
5D8D000
trusted library allocation
page read and write
5858000
trusted library allocation
page read and write
5C84000
trusted library allocation
page read and write
1150000
unkown
page execute and write copy
4B71000
heap
page read and write
109F000
unkown
page execute and read and write
2FEE000
stack
page read and write
57D7000
trusted library allocation
page read and write
5864000
trusted library allocation
page read and write
4871000
heap
page read and write
10F4000
heap
page read and write
1155000
unkown
page execute and write copy
10B5000
unkown
page execute and read and write
928000
unkown
page execute and write copy
4B60000
direct allocation
page read and write
B904000
heap
page read and write
1063000
heap
page read and write
10F4000
heap
page read and write
416E000
stack
page read and write
5A86000
trusted library allocation
page read and write
51A0000
direct allocation
page execute and read and write
B816000
heap
page read and write
4B71000
heap
page read and write
8A41000
heap
page read and write
4791000
heap
page read and write
5E2C000
trusted library allocation
page read and write
5804000
trusted library allocation
page read and write
ED4000
heap
page read and write
323000
unkown
page execute and read and write
5C88000
trusted library allocation
page read and write
125000
unkown
page execute and write copy
1310000
direct allocation
page read and write
5D5F000
trusted library allocation
page read and write
584C000
trusted library allocation
page read and write
5D39000
trusted library allocation
page read and write
4D5F000
stack
page read and write
5C92000
trusted library allocation
page read and write
1314000
heap
page read and write
4B71000
heap
page read and write
10ED000
heap
page read and write
4B71000
heap
page read and write
1110000
unkown
page execute and write copy
5C85000
trusted library allocation
page read and write
5D1C000
trusted library allocation
page read and write
74DF000
stack
page read and write
B771000
heap
page read and write
4791000
heap
page read and write
580C000
trusted library allocation
page read and write
5803000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
580D000
trusted library allocation
page read and write
4E60000
direct allocation
page execute and read and write
5705000
heap
page read and write
13E3000
heap
page read and write
4B71000
heap
page read and write
1310000
direct allocation
page read and write
4E70000
direct allocation
page execute and read and write
5000000
direct allocation
page read and write
5D32000
trusted library allocation
page read and write
5DEB000
trusted library allocation
page read and write
4B90000
trusted library allocation
page read and write
1108000
unkown
page execute and write copy
5F34000
trusted library allocation
page read and write
4D57000
trusted library allocation
page execute and read and write
5DEF000
trusted library allocation
page read and write
4B71000
heap
page read and write
585B000
trusted library allocation
page read and write
56FA000
heap
page read and write
5713000
heap
page read and write
5E4D000
trusted library allocation
page read and write
107C000
heap
page read and write
5C82000
trusted library allocation
page read and write
C21000
unkown
page execute and write copy
712000
unkown
page execute and read and write
5C88000
trusted library allocation
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4791000
heap
page read and write
10ED000
heap
page read and write
321E000
stack
page read and write
292000
unkown
page execute and read and write
57E7000
trusted library allocation
page read and write
1090000
heap
page read and write
1082000
heap
page read and write
4970000
trusted library allocation
page read and write
4791000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
4B71000
heap
page read and write
10C3000
unkown
page execute and read and write
5DBE000
trusted library allocation
page read and write
5C80000
trusted library allocation
page read and write
4A80000
direct allocation
page read and write
FF0000
direct allocation
page read and write
484F000
stack
page read and write
57FD000
trusted library allocation
page read and write
3AE000
unkown
page execute and write copy
360000
unkown
page execute and write copy
580A000
trusted library allocation
page read and write
936000
unkown
page execute and write copy
57DE000
trusted library allocation
page read and write
5D60000
trusted library allocation
page read and write
1060000
unkown
page execute and read and write
5C86000
trusted library allocation
page read and write
587E000
trusted library allocation
page read and write
107D000
heap
page read and write
945000
heap
page read and write
4D90000
direct allocation
page execute and read and write
2F8000
unkown
page execute and write copy
471F000
stack
page read and write
5220000
direct allocation
page execute and read and write
EE4000
heap
page read and write
4791000
heap
page read and write
585B000
trusted library allocation
page read and write
5D23000
trusted library allocation
page read and write
4B71000
heap
page read and write
5705000
heap
page read and write
56FA000
heap
page read and write
58D6000
trusted library allocation
page read and write
584C000
trusted library allocation
page read and write
105D000
heap
page read and write
15EF000
stack
page read and write
2CD000
unkown
page execute and write copy
5849000
trusted library allocation
page read and write
349E000
stack
page read and write
5C88000
trusted library allocation
page read and write
5C8F000
trusted library allocation
page read and write
412F000
stack
page read and write
5E63000
trusted library allocation
page read and write
4D70000
trusted library allocation
page read and write
5C80000
trusted library allocation
page read and write
332E000
stack
page read and write
371E000
stack
page read and write
4DAE000
stack
page read and write
ED4000
heap
page read and write
5C8F000
trusted library allocation
page read and write
44AE000
stack
page read and write
4B71000
heap
page read and write
3BCF000
stack
page read and write
39EE000
stack
page read and write
4B71000
heap
page read and write
4791000
heap
page read and write
57FA000
trusted library allocation
page read and write
584C000
trusted library allocation
page read and write
312E000
stack
page read and write
5D34000
trusted library allocation
page read and write
3BDF000
stack
page read and write
109F000
unkown
page execute and read and write
3CEF000
stack
page read and write
2D2000
unkown
page execute and write copy
62EC000
trusted library allocation
page read and write
5C89000
trusted library allocation
page read and write
5DFF000
trusted library allocation
page read and write
5C87000
trusted library allocation
page read and write
356F000
stack
page read and write
EE4000
heap
page read and write
1094000
heap
page read and write
57D5000
trusted library allocation
page read and write
5865000
trusted library allocation
page read and write
5C80000
trusted library allocation
page read and write
5E30000
trusted library allocation
page read and write
30DE000
stack
page read and write
5C81000
trusted library allocation
page read and write
10CC000
unkown
page execute and write copy
585B000
trusted library allocation
page read and write
10FA000
stack
page read and write
5708000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
5E29000
trusted library allocation
page read and write
5D6E000
trusted library allocation
page read and write
3E2F000
stack
page read and write
B0000
unkown
page readonly
CEC000
unkown
page execute and read and write
35CE000
stack
page read and write
103A000
unkown
page execute and write copy
56E1000
heap
page read and write
57E2000
trusted library allocation
page read and write
4791000
heap
page read and write
588D000
trusted library allocation
page read and write
4B71000
heap
page read and write
1121000
unkown
page execute and write copy
5DFE000
trusted library allocation
page read and write
EB9000
unkown
page write copy
5705000
heap
page read and write
10DD000
unkown
page execute and write copy
4A80000
direct allocation
page read and write
5DBA000
trusted library allocation
page read and write
4B71000
heap
page read and write
5865000
trusted library allocation
page read and write
4C5C000
stack
page read and write
887E000
stack
page read and write
435F000
stack
page read and write
5240000
direct allocation
page execute and read and write
58D5000
trusted library allocation
page read and write
375F000
stack
page read and write
5D2E000
trusted library allocation
page read and write
29A000
unkown
page execute and write copy
1140000
unkown
page execute and write copy
E01000
heap
page read and write
361F000
stack
page read and write
5705000
heap
page read and write
399E000
stack
page read and write
10F7000
heap
page read and write
4B71000
heap
page read and write
3D2E000
stack
page read and write
5855000
trusted library allocation
page read and write
4791000
heap
page read and write
5DD3000
trusted library allocation
page read and write
1280000
heap
page read and write
3C2F000
stack
page read and write
5D3F000
trusted library allocation
page read and write
5D41000
trusted library allocation
page read and write
3D4E000
stack
page read and write
4B71000
heap
page read and write
127E000
stack
page read and write
1120000
unkown
page execute and read and write
8E7000
unkown
page execute and write copy
1370000
direct allocation
page read and write
583F000
trusted library allocation
page read and write
5180000
direct allocation
page execute and read and write
3A1E000
stack
page read and write
460E000
stack
page read and write
E50000
unkown
page read and write
293000
unkown
page execute and write copy
5809000
trusted library allocation
page read and write
FF0000
direct allocation
page read and write
716000
unkown
page write copy
4B71000
heap
page read and write
2BC000
unkown
page execute and read and write
12F0000
heap
page read and write
5722000
heap
page read and write
6CCE5000
unkown
page readonly
4B71000
heap
page read and write
5D58000
trusted library allocation
page read and write
57F7000
trusted library allocation
page read and write
110A000
heap
page read and write
3B2E000
stack
page read and write
5D5E000
trusted library allocation
page read and write
53EC000
stack
page read and write
4B71000
heap
page read and write
3F6F000
stack
page read and write
56F9000
heap
page read and write
1225000
heap
page read and write
57F2000
trusted library allocation
page read and write
5C82000
trusted library allocation
page read and write
4791000
heap
page read and write
5DE7000
trusted library allocation
page read and write
5F01000
trusted library allocation
page read and write
E40000
direct allocation
page read and write
34AF000
stack
page read and write
4FD0000
direct allocation
page execute and read and write
2CB0000
heap
page read and write
72CE000
stack
page read and write
E50000
unkown
page read and write
4991000
heap
page read and write
586A000
trusted library allocation
page read and write
6CCDE000
unkown
page read and write
FF6000
unkown
page execute and read and write
5C8A000
trusted library allocation
page read and write
32EF000
stack
page read and write
36EE000
stack
page read and write
10D2000
heap
page read and write
4791000
heap
page read and write
ED4000
heap
page read and write
308F000
stack
page read and write
39AF000
stack
page read and write
40AF000
stack
page read and write
EB9000
unkown
page write copy
5C87000
trusted library allocation
page read and write
5F74000
trusted library allocation
page read and write
5885000
trusted library allocation
page read and write
4B71000
heap
page read and write
109A000
unkown
page execute and write copy
5C85000
trusted library allocation
page read and write
51E0000
direct allocation
page execute and read and write
12DE000
stack
page read and write
1066000
unkown
page execute and read and write
114E000
unkown
page execute and write copy
5F25000
trusted library allocation
page read and write
ED4000
heap
page read and write
57F4000
trusted library allocation
page read and write
5A81000
trusted library allocation
page read and write
56FA000
heap
page read and write
34EE000
stack
page read and write
57FD000
trusted library allocation
page read and write
122E000
stack
page read and write
1310000
direct allocation
page read and write
1300000
direct allocation
page read and write
395F000
stack
page read and write
110E000
heap
page read and write
5C89000
trusted library allocation
page read and write
5B34000
trusted library allocation
page read and write
4D70000
direct allocation
page execute and read and write
4B71000
heap
page read and write
586A000
trusted library allocation
page read and write
3C1E000
stack
page read and write
5190000
direct allocation
page execute and read and write
10D3000
unkown
page execute and read and write
5865000
trusted library allocation
page read and write
1003000
unkown
page execute and write copy
5C8E000
trusted library allocation
page read and write
4B71000
heap
page read and write
61ED0000
direct allocation
page read and write
1314000
heap
page read and write
5D55000
trusted library allocation
page read and write
952000
unkown
page execute and read and write
1164000
unkown
page execute and read and write
B96D000
heap
page read and write
5826000
trusted library allocation
page read and write
5ADE000
trusted library allocation
page read and write
476F000
stack
page read and write
5D7D000
trusted library allocation
page read and write
4970000
heap
page read and write
5D50000
trusted library allocation
page read and write
32A000
unkown
page execute and write copy
5708000
heap
page read and write
1098000
heap
page read and write
65C0000
heap
page read and write
586A000
trusted library allocation
page read and write
311F000
stack
page read and write
5D6A000
trusted library allocation
page read and write
1095000
unkown
page execute and write copy
919000
unkown
page execute and read and write
5876000
trusted library allocation
page read and write
3A9F000
stack
page read and write
47E4000
heap
page read and write
57DC000
trusted library allocation
page read and write
5D34000
trusted library allocation
page read and write
586A000
trusted library allocation
page read and write
4B71000
heap
page read and write
5B3D000
trusted library allocation
page read and write
56ED000
heap
page read and write
469E000
stack
page read and write
381F000
stack
page read and write
4A5E000
stack
page read and write
1014000
unkown
page execute and read and write
57DC000
trusted library allocation
page read and write
58F6000
trusted library allocation
page read and write
5C83000
trusted library allocation
page read and write
4E60000
heap
page read and write
ED4000
heap
page read and write
10E4000
heap
page read and write
5D22000
trusted library allocation
page read and write
4F5F000
stack
page read and write
EE4000
heap
page read and write
5D39000
trusted library allocation
page read and write
56FA000
heap
page read and write
57E2000
trusted library allocation
page read and write
72D0000
heap
page execute and read and write
1310000
direct allocation
page read and write
4791000
heap
page read and write
33D000
unkown
page execute and write copy
1094000
unkown
page execute and read and write
4791000
heap
page read and write
5C83000
trusted library allocation
page read and write
4991000
heap
page read and write
4B71000
heap
page read and write
4991000
heap
page read and write
4B71000
heap
page read and write
1018000
unkown
page execute and write copy
10DF000
heap
page read and write
10DF000
heap
page read and write
30A000
unkown
page execute and write copy
1314000
heap
page read and write
4791000
heap
page read and write
133D000
stack
page read and write
3AE000
unkown
page execute and write copy
57ED000
trusted library allocation
page read and write
1072000
unkown
page execute and write copy
D60000
heap
page read and write
4A80000
direct allocation
page read and write
40DF000
stack
page read and write
5EFD000
trusted library allocation
page read and write
6CCE0000
unkown
page read and write
580A000
trusted library allocation
page read and write
10DC000
unkown
page execute and read and write
108E000
unkown
page execute and read and write
5D8F000
trusted library allocation
page read and write
5D5B000
trusted library allocation
page read and write
5863000
trusted library allocation
page read and write
586D000
trusted library allocation
page read and write
2DDE000
stack
page read and write
5705000
heap
page read and write
106C000
unkown
page execute and read and write
4CF0000
direct allocation
page read and write
4B71000
heap
page read and write
D0D000
heap
page read and write
5DAE000
trusted library allocation
page read and write
587E000
trusted library allocation
page read and write
5E72000
trusted library allocation
page read and write
4790000
heap
page read and write
58A5000
trusted library allocation
page read and write
5DB7000
trusted library allocation
page read and write
6D2E000
stack
page read and write
5D5F000
trusted library allocation
page read and write
4E70000
direct allocation
page execute and read and write
5C8C000
trusted library allocation
page read and write
There are 2207 hidden memdumps, click here to show them.