IOC Report
y001L6lEK4.exe

loading gif

Files

File Path
Type
Category
Malicious
y001L6lEK4.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\2FQIF5POQ0GHCJLOQ9X7Q70F6KXO.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\S8VXM97P0DUL30GQ3MUFUZOTH.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2FQIF5POQ0GHCJLOQ9X7Q70F6KXO.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\y001L6lEK4.exe
"C:\Users\user\Desktop\y001L6lEK4.exe"
malicious
C:\Users\user\AppData\Local\Temp\2FQIF5POQ0GHCJLOQ9X7Q70F6KXO.exe
"C:\Users\user\AppData\Local\Temp\2FQIF5POQ0GHCJLOQ9X7Q70F6KXO.exe"
malicious
C:\Users\user\AppData\Local\Temp\S8VXM97P0DUL30GQ3MUFUZOTH.exe
"C:\Users\user\AppData\Local\Temp\S8VXM97P0DUL30GQ3MUFUZOTH.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
curverpluch.lat
slipperyloo.lat
tentabatte.lat
manyrestro.lat
http://185.215.113.16/X
unknown
https://observerfry.lat/pi
unknown
http://185.215.113.16/off/def.exeQ
unknown
http://185.215.113.206/c4becf79229cb002.phpl
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWfpbZ7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://185.215.113.206/ws
unknown
https://observerfry.lat/d
unknown
https://observerfry.lat/api5t
unknown
bashfulacid.lat
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.16/off/def.exeh
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://observerfry.lat:443/apil
unknown
https://observerfry.lat:443/api
unknown
observerfry.lat
http://185.215.113.206/c4becf79229cb002.php0c
unknown
https://observerfry.lat:443/apin.txtPK
unknown
wordyfindy.lat
http://185.215.113.206/c4becf79229cb002.phpm$
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.215.113.206/l
unknown
https://observerfry.lat/api
172.67.199.72
http://185.215.113.206f
unknown
shapestickyr.lat
http://185.215.113.16/steam/random.exe
unknown
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://185.215.113.206/c4becf79229cb002.php/
unknown
https://observerfry.lat/
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://185.215.113.16:80/off/def.exet=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15d7e4b694824b33323940336fbf0bead57d89764383fe44
unknown
http://185.215.113.206/e
unknown
talkynicer.lat
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.215.113.16/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://crl.microh
unknown
http://185.215.113.206/c4becf79229cb002.phpH
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696491991400800003.1&ci=1696491991993.12791&cta
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
http://185.215.113.16/off/def.exefDb
unknown
http://185.215.113.16/off/def.exe
unknown
http://185.215.113.206
unknown
https://observerfry.lat/apiletGw
unknown
http://185.215.113.206/c4becf79229cb002.phpT
unknown
http://185.215.113.16/(
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://185.215.113.206/c4becf79229cb002.phpW
unknown
There are 55 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
observerfry.lat
172.67.199.72

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious
172.67.199.72
observerfry.lat
United States
185.215.113.16
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
B21000
unkown
page execute and read and write
malicious
114D000
heap
page read and write
malicious
11A6000
heap
page read and write
30D000
unkown
page execute and read and write
13CC000
heap
page read and write
6230000
trusted library allocation
page read and write
30BF000
stack
page read and write
6289000
trusted library allocation
page read and write
5DBE000
trusted library allocation
page read and write
61F6000
trusted library allocation
page read and write
5F2B000
trusted library allocation
page read and write
33BE000
stack
page read and write
6250000
trusted library allocation
page read and write
6159000
trusted library allocation
page read and write
5D4D000
trusted library allocation
page read and write
6157000
trusted library allocation
page read and write
954000
heap
page read and write
3CC000
unkown
page execute and write copy
6211000
trusted library allocation
page read and write
6156000
trusted library allocation
page read and write
F34000
unkown
page execute and read and write
6116000
trusted library allocation
page read and write
620A000
trusted library allocation
page read and write
954000
heap
page read and write
45F1000
heap
page read and write
6285000
trusted library allocation
page read and write
62BB000
trusted library allocation
page read and write
5D4D000
trusted library allocation
page read and write
6154000
trusted library allocation
page read and write
5D54000
trusted library allocation
page read and write
62A1000
trusted library allocation
page read and write
53F0000
direct allocation
page execute and read and write
488F000
stack
page read and write
61E9000
trusted library allocation
page read and write
6157000
trusted library allocation
page read and write
D6A000
unkown
page write copy
309000
unkown
page execute and write copy
6303000
trusted library allocation
page read and write
6158000
trusted library allocation
page read and write
5DB8000
trusted library allocation
page read and write
5D6D000
trusted library allocation
page read and write
49C0000
trusted library allocation
page execute and read and write
5E4A000
trusted library allocation
page read and write
6325000
trusted library allocation
page read and write
13C9000
heap
page read and write
5D4D000
trusted library allocation
page read and write
BCF000
unkown
page execute and read and write
6381000
trusted library allocation
page read and write
954000
heap
page read and write
5D4D000
trusted library allocation
page read and write
F8B000
unkown
page execute and write copy
615D000
trusted library allocation
page read and write
28E000
unkown
page execute and read and write
122000
unkown
page execute and read and write
62CB000
trusted library allocation
page read and write
6264000
trusted library allocation
page read and write
63AC000
trusted library allocation
page read and write
6246000
trusted library allocation
page read and write
6EEF000
stack
page read and write
634A000
trusted library allocation
page read and write
620B000
trusted library allocation
page read and write
6152000
trusted library allocation
page read and write
141D000
heap
page read and write
6236000
trusted library allocation
page read and write
A9E000
heap
page read and write
6158000
trusted library allocation
page read and write
ACF000
heap
page read and write
2CB000
unkown
page execute and write copy
6157000
trusted library allocation
page read and write
5DB7000
trusted library allocation
page read and write
45F1000
heap
page read and write
629B000
trusted library allocation
page read and write
30A0000
direct allocation
page read and write
48C4000
heap
page read and write
61EE000
trusted library allocation
page read and write
3C3E000
stack
page read and write
6281000
trusted library allocation
page read and write
628F000
trusted library allocation
page read and write
62F3000
trusted library allocation
page read and write
5D6D000
trusted library allocation
page read and write
F64000
unkown
page execute and read and write
5D6C000
trusted library allocation
page read and write
631F000
trusted library allocation
page read and write
4DE1000
heap
page read and write
477F000
stack
page read and write
6150000
trusted library allocation
page read and write
6151000
trusted library allocation
page read and write
5D5B000
trusted library allocation
page read and write
AF0000
direct allocation
page read and write
62FD000
trusted library allocation
page read and write
6154000
trusted library allocation
page read and write
F7A000
unkown
page execute and read and write
5E79000
trusted library allocation
page read and write
954000
heap
page read and write
6302000
trusted library allocation
page read and write
5F32000
trusted library allocation
page read and write
6151000
trusted library allocation
page read and write
502E000
stack
page read and write
5D5C000
trusted library allocation
page read and write
1199000
heap
page read and write
6157000
trusted library allocation
page read and write
2E6000
unkown
page execute and write copy
627C000
trusted library allocation
page read and write
478B000
stack
page read and write
6153000
trusted library allocation
page read and write
48C1000
heap
page read and write
5DD4000
trusted library allocation
page read and write
6295000
trusted library allocation
page read and write
34F000
unkown
page execute and write copy
A3F000
stack
page read and write
6156000
trusted library allocation
page read and write
AF0000
direct allocation
page read and write
63C0000
trusted library allocation
page read and write
2C7E000
stack
page read and write
624B000
trusted library allocation
page read and write
6154000
trusted library allocation
page read and write
43BF000
stack
page read and write
48C1000
heap
page read and write
5E17000
trusted library allocation
page read and write
5DFF000
trusted library allocation
page read and write
2F1000
unkown
page execute and write copy
142F000
heap
page read and write
2BBF000
stack
page read and write
45E0000
direct allocation
page read and write
13C7000
heap
page read and write
48C1000
heap
page read and write
6151000
trusted library allocation
page read and write
48BF000
stack
page read and write
6151000
trusted library allocation
page read and write
3AFF000
stack
page read and write
25AB000
stack
page read and write
5D64000
trusted library allocation
page read and write
30A0000
direct allocation
page read and write
954000
heap
page read and write
30B000
unkown
page execute and write copy
631E000
trusted library allocation
page read and write
4AAE000
stack
page read and write
45F1000
heap
page read and write
5D61000
trusted library allocation
page read and write
F4F000
unkown
page execute and read and write
6217000
trusted library allocation
page read and write
615B000
trusted library allocation
page read and write
4DE1000
heap
page read and write
323F000
stack
page read and write
2EBF000
stack
page read and write
5DC9000
trusted library allocation
page read and write
2CBB000
heap
page read and write
6158000
trusted library allocation
page read and write
4DE1000
heap
page read and write
615E000
trusted library allocation
page read and write
3B4000
unkown
page execute and write copy
3FFE000
stack
page read and write
48B0000
trusted library allocation
page read and write
512F000
stack
page read and write
62C7000
trusted library allocation
page read and write
634E000
trusted library allocation
page read and write
329000
unkown
page execute and read and write
6157000
trusted library allocation
page read and write
6154000
trusted library allocation
page read and write
6288000
trusted library allocation
page read and write
6228000
trusted library allocation
page read and write
120000
unkown
page readonly
A6E000
stack
page read and write
552E000
stack
page read and write
636A000
trusted library allocation
page read and write
31FF000
stack
page read and write
1429000
heap
page read and write
467E000
stack
page read and write
61EE000
trusted library allocation
page read and write
45F1000
heap
page read and write
4750000
direct allocation
page read and write
5D6F000
trusted library allocation
page read and write
615A000
trusted library allocation
page read and write
6156000
trusted library allocation
page read and write
62E1000
trusted library allocation
page read and write
5D96000
trusted library allocation
page read and write
25B0000
heap
page read and write
35E000
unkown
page execute and read and write
954000
heap
page read and write
6272000
trusted library allocation
page read and write
621F000
trusted library allocation
page read and write
413F000
stack
page read and write
620D000
trusted library allocation
page read and write
6154000
trusted library allocation
page read and write
48C1000
heap
page read and write
48C1000
heap
page read and write
101A000
unkown
page execute and read and write
FA6000
unkown
page execute and write copy
620F000
trusted library allocation
page read and write
43FE000
stack
page read and write
AD1000
heap
page read and write
5DDF000
trusted library allocation
page read and write
621A000
trusted library allocation
page read and write
EF1000
unkown
page execute and write copy
6156000
trusted library allocation
page read and write
5D4F000
trusted library allocation
page read and write
5D56000
trusted library allocation
page read and write
30FF000
stack
page read and write
6207000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
632D000
trusted library allocation
page read and write
6155000
trusted library allocation
page read and write
628F000
trusted library allocation
page read and write
623F000
trusted library allocation
page read and write
45F1000
heap
page read and write
62B7000
trusted library allocation
page read and write
61F2000
trusted library allocation
page read and write
2ABE000
stack
page read and write
6150000
trusted library allocation
page read and write
6158000
trusted library allocation
page read and write
131F000
stack
page read and write
AF0000
direct allocation
page read and write
6288000
trusted library allocation
page read and write
53F0000
direct allocation
page execute and read and write
FCC000
unkown
page execute and write copy
954000
heap
page read and write
313E000
stack
page read and write
1427000
heap
page read and write
5D6D000
trusted library allocation
page read and write
1440000
heap
page read and write
45F1000
heap
page read and write
626B000
trusted library allocation
page read and write
323E000
stack
page read and write
4DE1000
heap
page read and write
615B000
trusted library allocation
page read and write
624F000
trusted library allocation
page read and write
5E88000
trusted library allocation
page read and write
65C000
stack
page read and write
6163000
trusted library allocation
page read and write
954000
heap
page read and write
61E3000
trusted library allocation
page read and write
5D6D000
trusted library allocation
page read and write
6153000
trusted library allocation
page read and write
332000
unkown
page execute and write copy
954000
heap
page read and write
62AB000
trusted library allocation
page read and write
6126000
trusted library allocation
page read and write
625B000
trusted library allocation
page read and write
954000
heap
page read and write
6205000
trusted library allocation
page read and write
629F000
trusted library allocation
page read and write
473D000
trusted library allocation
page execute and read and write
48C1000
heap
page read and write
6209000
trusted library allocation
page read and write
61EA000
trusted library allocation
page read and write
383F000
stack
page read and write
6327000
trusted library allocation
page read and write
45F1000
heap
page read and write
12A000
unkown
page execute and write copy
48C1000
heap
page read and write
615F000
trusted library allocation
page read and write
62E9000
trusted library allocation
page read and write
F5B000
unkown
page execute and read and write
4DE1000
heap
page read and write
5D86000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
6352000
trusted library allocation
page read and write
624F000
trusted library allocation
page read and write
45E0000
direct allocation
page read and write
5DD9000
trusted library allocation
page read and write
13AC000
heap
page read and write
6153000
trusted library allocation
page read and write
4733000
trusted library allocation
page execute and read and write
6157000
trusted library allocation
page read and write
5DDF000
trusted library allocation
page read and write
3AC000
unkown
page execute and read and write
5D6F000
trusted library allocation
page read and write
4600000
heap
page read and write
6159000
trusted library allocation
page read and write
5DD7000
trusted library allocation
page read and write
5DF7000
trusted library allocation
page read and write
30A0000
direct allocation
page read and write
609E000
trusted library allocation
page read and write
142F000
heap
page read and write
30A000
unkown
page execute and read and write
5E0000
heap
page read and write
615F000
trusted library allocation
page read and write
5E79000
trusted library allocation
page read and write
48C1000
heap
page read and write
6159000
trusted library allocation
page read and write
297E000
stack
page read and write
12A000
unkown
page execute and write copy
6278000
trusted library allocation
page read and write
6206000
trusted library allocation
page read and write
6154000
trusted library allocation
page read and write
48C1000
heap
page read and write
5D69000
trusted library allocation
page read and write
45E0000
direct allocation
page read and write
6047000
trusted library allocation
page read and write
2AA000
unkown
page execute and read and write
615E000
trusted library allocation
page read and write
25B7000
heap
page read and write
48C1000
heap
page read and write
377E000
stack
page read and write
634C000
trusted library allocation
page read and write
5D4E000
trusted library allocation
page read and write
48C1000
heap
page read and write
615A000
trusted library allocation
page read and write
5F32000
trusted library allocation
page read and write
61FD000
trusted library allocation
page read and write
5F2B000
trusted library allocation
page read and write
62C1000
trusted library allocation
page read and write
2BBF000
stack
page read and write
48C1000
heap
page read and write
48C1000
heap
page read and write
48C1000
heap
page read and write
5D70000
trusted library allocation
page read and write
58E0000
remote allocation
page read and write
379000
unkown
page execute and write copy
45E0000
direct allocation
page read and write
5D76000
trusted library allocation
page read and write
6154000
trusted library allocation
page read and write
6276000
trusted library allocation
page read and write
629C000
trusted library allocation
page read and write
6304000
trusted library allocation
page read and write
48C1000
heap
page read and write
AF0000
direct allocation
page read and write
5D49000
trusted library allocation
page read and write
954000
heap
page read and write
3BB000
unkown
page execute and write copy
621B000
trusted library allocation
page read and write
5D7B000
trusted library allocation
page read and write
954000
heap
page read and write
6152000
trusted library allocation
page read and write
48C1000
heap
page read and write
FCA000
unkown
page execute and write copy
335000
unkown
page execute and write copy
5E88000
trusted library allocation
page read and write
6156000
trusted library allocation
page read and write
3FBF000
stack
page read and write
112E000
heap
page read and write
5D6D000
trusted library allocation
page read and write
5D5C000
trusted library allocation
page read and write
6321000
trusted library allocation
page read and write
5D69000
trusted library allocation
page read and write
63D1000
trusted library allocation
page read and write
562C000
stack
page read and write
5D79000
trusted library allocation
page read and write
5DCD000
trusted library allocation
page read and write
6153000
trusted library allocation
page read and write
142D000
heap
page read and write
48C1000
heap
page read and write
6156000
trusted library allocation
page read and write
5FAF000
trusted library allocation
page read and write
62D9000
trusted library allocation
page read and write
5BE5000
trusted library allocation
page read and write
6253000
trusted library allocation
page read and write
62C3000
trusted library allocation
page read and write
F5C000
unkown
page execute and write copy
6316000
trusted library allocation
page read and write
5DC9000
trusted library allocation
page read and write
63BA000
trusted library allocation
page read and write
45F1000
heap
page read and write
632B000
trusted library allocation
page read and write
6217000
trusted library allocation
page read and write
62F1000
trusted library allocation
page read and write
628D000
trusted library allocation
page read and write
63AE000
trusted library allocation
page read and write
60EE000
trusted library allocation
page read and write
5E84000
trusted library allocation
page read and write
2D3E000
stack
page read and write
48C1000
heap
page read and write
62FC000
trusted library allocation
page read and write
66A6000
trusted library allocation
page read and write
F8D000
unkown
page execute and read and write
5E48000
trusted library allocation
page read and write
48AA000
trusted library allocation
page execute and read and write
5D50000
trusted library allocation
page read and write
4DE1000
heap
page read and write
48C1000
heap
page read and write
BB6000
unkown
page execute and read and write
615C000
trusted library allocation
page read and write
EC7000
unkown
page execute and read and write
3C7E000
stack
page read and write
6151000
trusted library allocation
page read and write
4AB0000
heap
page read and write
6153000
trusted library allocation
page read and write
FCE000
unkown
page execute and read and write
5D4D000
trusted library allocation
page read and write
5DFD000
trusted library allocation
page read and write
4750000
direct allocation
page read and write
6400000
trusted library allocation
page read and write
6152000
trusted library allocation
page read and write
6160000
trusted library allocation
page read and write
47BE000
stack
page read and write
6156000
trusted library allocation
page read and write
6272000
trusted library allocation
page read and write
136000
unkown
page execute and write copy
5D46000
trusted library allocation
page read and write
5D4C000
trusted library allocation
page read and write
5DD7000
trusted library allocation
page read and write
5D5C000
trusted library allocation
page read and write
101B000
unkown
page execute and write copy
5DD1000
trusted library allocation
page read and write
62A8000
trusted library allocation
page read and write
48C1000
heap
page read and write
954000
heap
page read and write
6461000
trusted library allocation
page read and write
62E7000
trusted library allocation
page read and write
B20000
unkown
page read and write
4EEE000
stack
page read and write
100C000
unkown
page execute and write copy
636A000
trusted library allocation
page read and write
4DE1000
heap
page read and write
615D000
trusted library allocation
page read and write
636C000
trusted library allocation
page read and write
6246000
trusted library allocation
page read and write
6367000
trusted library allocation
page read and write
53ED000
stack
page read and write
30FE000
stack
page read and write
463F000
stack
page read and write
622A000
trusted library allocation
page read and write
8F0000
heap
page read and write
5D54000
trusted library allocation
page read and write
5DF7000
trusted library allocation
page read and write
61FB000
trusted library allocation
page read and write
39FE000
stack
page read and write
954000
heap
page read and write
AED000
heap
page read and write
6159000
trusted library allocation
page read and write
AD3000
heap
page read and write
2CB7000
heap
page read and write
5D9A000
trusted library allocation
page read and write
954000
heap
page read and write
93E000
stack
page read and write
1422000
heap
page read and write
62ED000
trusted library allocation
page read and write
6352000
trusted library allocation
page read and write
63F3000
trusted library allocation
page read and write
6154000
trusted library allocation
page read and write
5E83000
trusted library allocation
page read and write
5E71000
trusted library allocation
page read and write
621B000
trusted library allocation
page read and write
6234000
trusted library allocation
page read and write
63CF000
trusted library allocation
page read and write
6200000
trusted library allocation
page read and write
F03000
unkown
page execute and write copy
FD9000
unkown
page execute and read and write
FCB000
unkown
page execute and read and write
53F0000
direct allocation
page execute and read and write
13BE000
heap
page read and write
62A1000
trusted library allocation
page read and write
2EA000
unkown
page execute and read and write
954000
heap
page read and write
62E8000
trusted library allocation
page read and write
30A0000
direct allocation
page read and write
5ED4000
trusted library allocation
page read and write
A9A000
heap
page read and write
45F0000
heap
page read and write
5D7C000
trusted library allocation
page read and write
62A5000
trusted library allocation
page read and write
5D98000
trusted library allocation
page read and write
61FC000
trusted library allocation
page read and write
35FE000
stack
page read and write
6157000
trusted library allocation
page read and write
6152000
trusted library allocation
page read and write
30A0000
direct allocation
page read and write
5D7B000
trusted library allocation
page read and write
34BF000
stack
page read and write
6150000
trusted library allocation
page read and write
48C1000
heap
page read and write
6220000
trusted library allocation
page read and write
6159000
trusted library allocation
page read and write
F82000
unkown
page execute and write copy
3CA000
unkown
page execute and write copy
615A000
trusted library allocation
page read and write
6217000
trusted library allocation
page read and write
AF0000
direct allocation
page read and write
2C80000
direct allocation
page execute and read and write
D6A000
unkown
page write copy
6156000
trusted library allocation
page read and write
516E000
stack
page read and write
61D6000
trusted library allocation
page read and write
5F0000
heap
page read and write
61ED000
trusted library allocation
page read and write
61FA000
trusted library allocation
page read and write
6594000
trusted library allocation
page read and write
334000
unkown
page execute and read and write
4DE1000
heap
page read and write
AF0000
direct allocation
page read and write
5DF4000
trusted library allocation
page read and write
4DE1000
heap
page read and write
6407000
trusted library allocation
page read and write
48C1000
heap
page read and write
2CB0000
heap
page read and write
3EBE000
stack
page read and write
48A0000
trusted library allocation
page read and write
62EF000
trusted library allocation
page read and write
615A000
trusted library allocation
page read and write
5DC6000
trusted library allocation
page read and write
6157000
trusted library allocation
page read and write
6159000
trusted library allocation
page read and write
6226000
trusted library allocation
page read and write
615B000
trusted library allocation
page read and write
42BE000
stack
page read and write
D6C000
unkown
page execute and write copy
4700000
heap
page read and write
351000
unkown
page execute and read and write
48C1000
heap
page read and write
45E0000
direct allocation
page read and write
622E000
trusted library allocation
page read and write
36FF000
stack
page read and write
954000
heap
page read and write
6257000
trusted library allocation
page read and write
6158000
trusted library allocation
page read and write
6158000
trusted library allocation
page read and write
6248000
trusted library allocation
page read and write
615B000
trusted library allocation
page read and write
5DE5000
trusted library allocation
page read and write
6152000
trusted library allocation
page read and write
6344000
trusted library allocation
page read and write
5270000
direct allocation
page read and write
BAE000
unkown
page execute and read and write
6F2E000
stack
page read and write
61F1000
trusted library allocation
page read and write
61EB000
trusted library allocation
page read and write
954000
heap
page read and write
1440000
heap
page read and write
6219000
trusted library allocation
page read and write
954000
heap
page read and write
48C1000
heap
page read and write
8F5000
stack
page read and write
6698000
trusted library allocation
page read and write
373E000
stack
page read and write
954000
heap
page read and write
5DBB000
trusted library allocation
page read and write
5D4D000
trusted library allocation
page read and write
48C1000
heap
page read and write
48D0000
heap
page read and write
1423000
heap
page read and write
5E1F000
trusted library allocation
page read and write
1423000
heap
page read and write
6401000
trusted library allocation
page read and write
48C1000
heap
page read and write
6238000
trusted library allocation
page read and write
31D000
unkown
page execute and write copy
6249000
trusted library allocation
page read and write
D58000
unkown
page execute and read and write
615F000
trusted library allocation
page read and write
2CFF000
stack
page read and write
629B000
trusted library allocation
page read and write
1429000
heap
page read and write
120000
unkown
page read and write
45F1000
heap
page read and write
5D46000
trusted library allocation
page read and write
356000
unkown
page execute and write copy
45F1000
heap
page read and write
628C000
trusted library allocation
page read and write
6152000
trusted library allocation
page read and write
6226000
trusted library allocation
page read and write
6350000
trusted library allocation
page read and write
5DD3000
trusted library allocation
page read and write
48C1000
heap
page read and write
6157000
trusted library allocation
page read and write
954000
heap
page read and write
1422000
heap
page read and write
63D5000
trusted library allocation
page read and write
6158000
trusted library allocation
page read and write
118A000
heap
page read and write
4BC1000
trusted library allocation
page read and write
4DE1000
heap
page read and write
4734000
trusted library allocation
page read and write
615A000
trusted library allocation
page read and write
6153000
trusted library allocation
page read and write
48E0000
heap
page read and write
4DE1000
heap
page read and write
13C9000
heap
page read and write
624E000
trusted library allocation
page read and write
6239000
trusted library allocation
page read and write
6152000
trusted library allocation
page read and write
61E8000
trusted library allocation
page read and write
45E0000
direct allocation
page read and write
13C9000
heap
page read and write
940000
heap
page read and write
61F7000
trusted library allocation
page read and write
623E000
trusted library allocation
page read and write
954000
heap
page read and write
ECA000
unkown
page execute and write copy
AB0000
unkown
page readonly
30A0000
direct allocation
page read and write
48C1000
heap
page read and write
1173000
heap
page read and write
48C1000
heap
page read and write
954000
heap
page read and write
5DE0000
trusted library allocation
page read and write
27FF000
stack
page read and write
625D000
trusted library allocation
page read and write
48C1000
heap
page read and write
6264000
trusted library allocation
page read and write
62DE000
trusted library allocation
page read and write
34BE000
stack
page read and write
5F73000
trusted library allocation
page read and write
615E000
trusted library allocation
page read and write
48C0000
heap
page read and write
52AE000
stack
page read and write
4EA0000
direct allocation
page execute and read and write
45E0000
direct allocation
page read and write
6162000
trusted library allocation
page read and write
6158000
trusted library allocation
page read and write
6427000
trusted library allocation
page read and write
6262000
trusted library allocation
page read and write
6150000
trusted library allocation
page read and write
45F1000
heap
page read and write
B10000
direct allocation
page read and write
2CA0000
direct allocation
page execute and read and write
615D000
trusted library allocation
page read and write
6211000
trusted library allocation
page read and write
397F000
stack
page read and write
38BE000
stack
page read and write
62A7000
trusted library allocation
page read and write
615A000
trusted library allocation
page read and write
AB1000
unkown
page execute and write copy
387E000
stack
page read and write
6404000
trusted library allocation
page read and write
5D4D000
trusted library allocation
page read and write
4DE1000
heap
page read and write
6156000
trusted library allocation
page read and write
6151000
trusted library allocation
page read and write
615D000
trusted library allocation
page read and write
5D4D000
trusted library allocation
page read and write
5DBE000
trusted library allocation
page read and write
B10000
direct allocation
page read and write
622C000
trusted library allocation
page read and write
615C000
trusted library allocation
page read and write
5DC5000
trusted library allocation
page read and write
337F000
stack
page read and write
337000
unkown
page execute and read and write
6340000
trusted library allocation
page read and write
5E0F000
trusted library allocation
page read and write
8A0000
heap
page read and write
954000
heap
page read and write
5D69000
trusted library allocation
page read and write
45E0000
direct allocation
page read and write
5D41000
trusted library allocation
page read and write
5DDA000
trusted library allocation
page read and write
48C1000
heap
page read and write
1005000
unkown
page execute and write copy
4DE1000
heap
page read and write
6375000
trusted library allocation
page read and write
5E59000
trusted library allocation
page read and write
6159000
trusted library allocation
page read and write
6204000
trusted library allocation
page read and write
5D4D000
trusted library allocation
page read and write
1422000
heap
page read and write
45E0000
direct allocation
page read and write
6297000
trusted library allocation
page read and write
1120000
heap
page read and write
6244000
trusted library allocation
page read and write
5DD0000
trusted library allocation
page read and write
5F8B000
trusted library allocation
page read and write
615C000
trusted library allocation
page read and write
2E7000
unkown
page execute and read and write
53E0000
direct allocation
page execute and read and write
F13000
unkown
page execute and write copy
5E59000
trusted library allocation
page read and write
45F1000
heap
page read and write
5D53000
trusted library allocation
page read and write
2E7E000
stack
page read and write
4A30000
trusted library allocation
page read and write
61F0000
trusted library allocation
page read and write
6233000
trusted library allocation
page read and write
44FF000
stack
page read and write
6220000
trusted library allocation
page read and write
AF0000
direct allocation
page read and write
633A000
trusted library allocation
page read and write
5DB1000
trusted library allocation
page read and write
6152000
trusted library allocation
page read and write
5F25000
trusted library allocation
page read and write
6366000
trusted library allocation
page read and write
48C1000
heap
page read and write
26FE000
stack
page read and write
5E59000
trusted library allocation
page read and write
2E8000
unkown
page execute and write copy
61E4000
trusted library allocation
page read and write
2BFE000
stack
page read and write
62A5000
trusted library allocation
page read and write
111E000
stack
page read and write
48C1000
heap
page read and write
6231000
trusted library allocation
page read and write
246E000
stack
page read and write
58E0000
remote allocation
page read and write
423F000
stack
page read and write
6150000
trusted library allocation
page read and write
615C000
trusted library allocation
page read and write
628B000
trusted library allocation
page read and write
6254000
trusted library allocation
page read and write
48C1000
heap
page read and write
46F0000
trusted library allocation
page read and write
F83000
unkown
page execute and read and write
626C000
trusted library allocation
page read and write
6A54000
trusted library allocation
page read and write
6151000
trusted library allocation
page read and write
6308000
trusted library allocation
page read and write
3B3E000
stack
page read and write
5DD9000
trusted library allocation
page read and write
13C9000
heap
page read and write
6157000
trusted library allocation
page read and write
5D6A000
trusted library allocation
page read and write
A7E000
stack
page read and write
5DBB000
trusted library allocation
page read and write
62FE000
trusted library allocation
page read and write
4DE1000
heap
page read and write
6220000
trusted library allocation
page read and write
62DE000
trusted library allocation
page read and write
6248000
trusted library allocation
page read and write
6066000
trusted library allocation
page read and write
48C1000
heap
page read and write
6276000
trusted library allocation
page read and write
5D4F000
trusted library allocation
page read and write
6231000
trusted library allocation
page read and write
654D000
trusted library allocation
page read and write
5D6C000
trusted library allocation
page read and write
615D000
trusted library allocation
page read and write
58E0000
remote allocation
page read and write
F99000
unkown
page execute and read and write
624F000
trusted library allocation
page read and write
FF8000
unkown
page execute and write copy
5D85000
trusted library allocation
page read and write
5D7C000
trusted library allocation
page read and write
48C1000
heap
page read and write
48C1000
heap
page read and write
EE0000
unkown
page execute and read and write
544B000
trusted library allocation
page read and write
48C1000
heap
page read and write
FF2000
unkown
page execute and read and write
F14000
unkown
page execute and read and write
62A2000
trusted library allocation
page read and write
30A0000
direct allocation
page read and write
3D3F000
stack
page read and write
5D4E000
trusted library allocation
page read and write
6153000
trusted library allocation
page read and write
628A000
trusted library allocation
page read and write
34FE000
stack
page read and write
5270000
direct allocation
page read and write
62F3000
trusted library allocation
page read and write
6385000
trusted library allocation
page read and write
6CBD000
stack
page read and write
615D000
trusted library allocation
page read and write
5DD1000
trusted library allocation
page read and write
5DB1000
trusted library allocation
page read and write
4A2C000
stack
page read and write
6154000
trusted library allocation
page read and write
4DE1000
heap
page read and write
48C1000
heap
page read and write
6163000
trusted library allocation
page read and write
5D46000
trusted library allocation
page read and write
6157000
trusted library allocation
page read and write
6280000
trusted library allocation
page read and write
6246000
trusted library allocation
page read and write
F08000
unkown
page execute and read and write
6154000
trusted library allocation
page read and write
101A000
unkown
page execute and write copy
AE2000
heap
page read and write
627C000
trusted library allocation
page read and write
30A0000
direct allocation
page read and write
615E000
trusted library allocation
page read and write
4740000
trusted library allocation
page read and write
D6C000
unkown
page execute and read and write
48C1000
heap
page read and write
625E000
trusted library allocation
page read and write
49D0000
trusted library allocation
page read and write
352000
unkown
page execute and write copy
413E000
stack
page read and write
2DBF000
stack
page read and write
30A0000
direct allocation
page read and write
5DC7000
trusted library allocation
page read and write
1440000
heap
page read and write
6240000
trusted library allocation
page read and write
6267000
trusted library allocation
page read and write
5D87000
trusted library allocation
page read and write
48C1000
heap
page read and write
4E80000
direct allocation
page execute and read and write
3ABF000
stack
page read and write
5DB1000
trusted library allocation
page read and write
53C0000
direct allocation
page execute and read and write
611E000
trusted library allocation
page read and write
45C0000
heap
page read and write
1427000
heap
page read and write
6155000
trusted library allocation
page read and write
6156000
trusted library allocation
page read and write
6285000
trusted library allocation
page read and write
242F000
stack
page read and write
48C1000
heap
page read and write
3CC000
unkown
page execute and write copy
759000
stack
page read and write
636D000
trusted library allocation
page read and write
48BB000
trusted library allocation
page execute and read and write
6206000
trusted library allocation
page read and write
1004000
unkown
page execute and write copy
6154000
trusted library allocation
page read and write
6294000
trusted library allocation
page read and write
2FBF000
stack
page read and write
61B6000
trusted library allocation
page read and write
5D4F000
trusted library allocation
page read and write
290000
unkown
page execute and write copy
954000
heap
page read and write
6157000
trusted library allocation
page read and write
5DD5000
trusted library allocation
page read and write
6287000
trusted library allocation
page read and write
61FC000
trusted library allocation
page read and write
627F000
trusted library allocation
page read and write
453E000
stack
page read and write
48C1000
heap
page read and write
6157000
trusted library allocation
page read and write
48C1000
heap
page read and write
954000
heap
page read and write
622D000
trusted library allocation
page read and write
615E000
trusted library allocation
page read and write
5D67000
trusted library allocation
page read and write
417E000
stack
page read and write
6152000
trusted library allocation
page read and write
35BF000
stack
page read and write
1423000
heap
page read and write
6152000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
6151000
trusted library allocation
page read and write
5DF6000
trusted library allocation
page read and write
634C000
trusted library allocation
page read and write
61F4000
trusted library allocation
page read and write
621E000
trusted library allocation
page read and write
5F27000
trusted library allocation
page read and write
30A0000
direct allocation
page read and write
F74000
unkown
page execute and read and write
5D4D000
trusted library allocation
page read and write
5E59000
trusted library allocation
page read and write
4DE1000
heap
page read and write
615A000
trusted library allocation
page read and write
6242000
trusted library allocation
page read and write
6213000
trusted library allocation
page read and write
61EE000
trusted library allocation
page read and write
62F5000
trusted library allocation
page read and write
48C1000
heap
page read and write
61E2000
trusted library allocation
page read and write
6371000
trusted library allocation
page read and write
5E48000
trusted library allocation
page read and write
5DC5000
trusted library allocation
page read and write
5BC4000
trusted library allocation
page read and write
333F000
stack
page read and write
48A0000
direct allocation
page execute and read and write
3BFF000
stack
page read and write
5F27000
trusted library allocation
page read and write
615A000
trusted library allocation
page read and write
45E0000
direct allocation
page read and write
5D6D000
trusted library allocation
page read and write
48D0000
direct allocation
page execute and read and write
AF0000
direct allocation
page read and write
5DD7000
trusted library allocation
page read and write
AEE000
stack
page read and write
1440000
heap
page read and write
629E000
trusted library allocation
page read and write
491E000
stack
page read and write
6DBE000
stack
page read and write
5DDE000
trusted library allocation
page read and write
283E000
stack
page read and write
954000
heap
page read and write
5D48000
trusted library allocation
page read and write
623C000
trusted library allocation
page read and write
4E7F000
stack
page read and write
AF0000
direct allocation
page read and write
6215000
trusted library allocation
page read and write
5E59000
trusted library allocation
page read and write
4DE1000
heap
page read and write
347F000
stack
page read and write
634E000
trusted library allocation
page read and write
AF0000
direct allocation
page read and write
F72000
unkown
page execute and write copy
2E3F000
stack
page read and write
6224000
trusted library allocation
page read and write
5D65000
trusted library allocation
page read and write
6273000
trusted library allocation
page read and write
4E90000
direct allocation
page execute and read and write
142F000
heap
page read and write
61EB000
trusted library allocation
page read and write
6302000
trusted library allocation
page read and write
6243000
trusted library allocation
page read and write
48C1000
heap
page read and write
6215000
trusted library allocation
page read and write
8F6000
heap
page read and write
5DCD000
trusted library allocation
page read and write
6155000
trusted library allocation
page read and write
6260000
trusted library allocation
page read and write
604D000
trusted library allocation
page read and write
26BF000
stack
page read and write
63D7000
trusted library allocation
page read and write
5DD7000
trusted library allocation
page read and write
631C000
trusted library allocation
page read and write
5D6D000
trusted library allocation
page read and write
6297000
trusted library allocation
page read and write
621B000
trusted library allocation
page read and write
6403000
trusted library allocation
page read and write
2C90000
direct allocation
page execute and read and write
624B000
trusted library allocation
page read and write
4744000
trusted library allocation
page read and write
4BBE000
stack
page read and write
2FFE000
stack
page read and write
5D4D000
trusted library allocation
page read and write
62FF000
trusted library allocation
page read and write
5D4C000
trusted library allocation
page read and write
4DE1000
heap
page read and write
5D6D000
trusted library allocation
page read and write
61F3000
trusted library allocation
page read and write
61FC000
trusted library allocation
page read and write
6222000
trusted library allocation
page read and write
6156000
trusted library allocation
page read and write
6155000
trusted library allocation
page read and write
5D52000
trusted library allocation
page read and write
526E000
stack
page read and write
5D5C000
trusted library allocation
page read and write
6157000
trusted library allocation
page read and write
5D56000
trusted library allocation
page read and write
6159000
trusted library allocation
page read and write
5D4D000
trusted library allocation
page read and write
2A7F000
stack
page read and write
623B000
trusted library allocation
page read and write
4E80000
direct allocation
page execute and read and write
5DD1000
trusted library allocation
page read and write
4DE1000
heap
page read and write
30A0000
direct allocation
page read and write
3DBE000
stack
page read and write
122000
unkown
page execute and write copy
F55000
unkown
page execute and write copy
5D5C000
trusted library allocation
page read and write
607E000
trusted library allocation
page read and write
61EF000
trusted library allocation
page read and write
626B000
trusted library allocation
page read and write
6154000
trusted library allocation
page read and write
F4C000
unkown
page execute and write copy
632A000
trusted library allocation
page read and write
D9F000
unkown
page execute and write copy
6157000
trusted library allocation
page read and write
654D000
trusted library allocation
page read and write
628F000
trusted library allocation
page read and write
62A1000
trusted library allocation
page read and write
6154000
trusted library allocation
page read and write
5D4D000
trusted library allocation
page read and write
6259000
trusted library allocation
page read and write
2B7000
unkown
page execute and write copy
48C1000
heap
page read and write
615A000
trusted library allocation
page read and write
62C1000
trusted library allocation
page read and write
5D76000
trusted library allocation
page read and write
5DC3000
trusted library allocation
page read and write
6158000
trusted library allocation
page read and write
AF0000
direct allocation
page read and write
615B000
trusted library allocation
page read and write
615E000
trusted library allocation
page read and write
30A0000
direct allocation
page read and write
6289000
trusted library allocation
page read and write
373F000
stack
page read and write
954000
heap
page read and write
950000
heap
page read and write
3BB000
unkown
page execute and write copy
5D4D000
trusted library allocation
page read and write
954000
heap
page read and write
702E000
stack
page read and write
6267000
trusted library allocation
page read and write
54ED000
stack
page read and write
3D7E000
stack
page read and write
B21000
unkown
page execute and write copy
61F6000
trusted library allocation
page read and write
323000
unkown
page execute and read and write
48C1000
heap
page read and write
6202000
trusted library allocation
page read and write
624D000
trusted library allocation
page read and write
5DD1000
trusted library allocation
page read and write
AF0000
direct allocation
page read and write
3EFE000
stack
page read and write
327E000
stack
page read and write
627A000
trusted library allocation
page read and write
5DBB000
trusted library allocation
page read and write
624C000
trusted library allocation
page read and write
5D7E000
trusted library allocation
page read and write
112A000
heap
page read and write
63DB000
trusted library allocation
page read and write
53D0000
direct allocation
page execute and read and write
48C1000
heap
page read and write
3E7F000
stack
page read and write
5D52000
trusted library allocation
page read and write
625A000
trusted library allocation
page read and write
615F000
trusted library allocation
page read and write
F96000
unkown
page execute and write copy
63B2000
trusted library allocation
page read and write
62A5000
trusted library allocation
page read and write
6237000
trusted library allocation
page read and write
632B000
trusted library allocation
page read and write
F75000
unkown
page execute and write copy
6206000
trusted library allocation
page read and write
6239000
trusted library allocation
page read and write
48C1000
heap
page read and write
615F000
trusted library allocation
page read and write
637F000
trusted library allocation
page read and write
6360000
trusted library allocation
page read and write
621E000
trusted library allocation
page read and write
1427000
heap
page read and write
63FE000
trusted library allocation
page read and write
3EBF000
stack
page read and write
6261000
trusted library allocation
page read and write
6152000
trusted library allocation
page read and write
4DE1000
heap
page read and write
5D5C000
trusted library allocation
page read and write
48D0000
trusted library allocation
page read and write
5DDA000
trusted library allocation
page read and write
45A0000
direct allocation
page read and write
6158000
trusted library allocation
page read and write
6236000
trusted library allocation
page read and write
5D5C000
trusted library allocation
page read and write
1426000
heap
page read and write
62C8000
trusted library allocation
page read and write
954000
heap
page read and write
48C1000
heap
page read and write
615B000
trusted library allocation
page read and write
954000
heap
page read and write
6211000
trusted library allocation
page read and write
6161000
trusted library allocation
page read and write
355000
unkown
page execute and read and write
5D54000
trusted library allocation
page read and write
61F5000
trusted library allocation
page read and write
45F1000
heap
page read and write
6153000
trusted library allocation
page read and write
6368000
trusted library allocation
page read and write
2FBE000
stack
page read and write
61DD000
trusted library allocation
page read and write
6157000
trusted library allocation
page read and write
5D5C000
trusted library allocation
page read and write
615F000
trusted library allocation
page read and write
5E84000
trusted library allocation
page read and write
624A000
trusted library allocation
page read and write
2BFC000
stack
page read and write
6156000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
53F0000
direct allocation
page execute and read and write
48C1000
heap
page read and write
1004000
unkown
page execute and read and write
6391000
trusted library allocation
page read and write
337E000
stack
page read and write
6265000
trusted library allocation
page read and write
6325000
trusted library allocation
page read and write
48C1000
heap
page read and write
AAE000
stack
page read and write
6156000
trusted library allocation
page read and write
620C000
trusted library allocation
page read and write
3FFF000
stack
page read and write
A90000
heap
page read and write
635D000
trusted library allocation
page read and write
61E8000
trusted library allocation
page read and write
615B000
trusted library allocation
page read and write
5D5C000
trusted library allocation
page read and write
100C000
unkown
page execute and write copy
4720000
trusted library allocation
page read and write
13E9000
heap
page read and write
53F0000
direct allocation
page execute and read and write
13B2000
heap
page read and write
45E0000
direct allocation
page read and write
5DC9000
trusted library allocation
page read and write
615D000
trusted library allocation
page read and write
621B000
trusted library allocation
page read and write
623A000
trusted library allocation
page read and write
FF1000
unkown
page execute and write copy
2B7000
unkown
page execute and read and write
5DFE000
trusted library allocation
page read and write
628E000
trusted library allocation
page read and write
61FA000
trusted library allocation
page read and write
37C000
unkown
page execute and read and write
6270000
trusted library allocation
page read and write
6237000
trusted library allocation
page read and write
5D6E000
trusted library allocation
page read and write
57C000
stack
page read and write
48C1000
heap
page read and write
5D41000
trusted library allocation
page read and write
126000
unkown
page write copy
3C3F000
stack
page read and write
39BE000
stack
page read and write
48B7000
trusted library allocation
page execute and read and write
626E000
trusted library allocation
page read and write
63BC000
trusted library allocation
page read and write
6152000
trusted library allocation
page read and write
3D7F000
stack
page read and write
6263000
trusted library allocation
page read and write
620D000
trusted library allocation
page read and write
387F000
stack
page read and write
40FF000
stack
page read and write
954000
heap
page read and write
954000
heap
page read and write
615A000
trusted library allocation
page read and write
625D000
trusted library allocation
page read and write
5DC2000
trusted library allocation
page read and write
4D7C000
stack
page read and write
5DC7000
trusted library allocation
page read and write
3CA000
unkown
page execute and read and write
8FE000
stack
page read and write
45F1000
heap
page read and write
5E48000
trusted library allocation
page read and write
6222000
trusted library allocation
page read and write
2D0000
unkown
page execute and read and write
2F7F000
stack
page read and write
45F1000
heap
page read and write
1423000
heap
page read and write
403E000
stack
page read and write
324000
unkown
page execute and write copy
5D4D000
trusted library allocation
page read and write
52B4000
direct allocation
page read and write
62AB000
trusted library allocation
page read and write
30A0000
direct allocation
page read and write
6DE0000
heap
page execute and read and write
615D000
trusted library allocation
page read and write
6299000
trusted library allocation
page read and write
5DD9000
trusted library allocation
page read and write
6152000
trusted library allocation
page read and write
48C1000
heap
page read and write
4DE1000
heap
page read and write
48C1000
heap
page read and write
2FE000
unkown
page execute and read and write
5D5C000
trusted library allocation
page read and write
626A000
trusted library allocation
page read and write
3AFE000
stack
page read and write
5E48000
trusted library allocation
page read and write
AF0000
direct allocation
page read and write
AF0000
direct allocation
page read and write
FA9000
unkown
page execute and read and write
615A000
trusted library allocation
page read and write
48C1000
heap
page read and write
4A6E000
stack
page read and write
48C1000
heap
page read and write
629F000
trusted library allocation
page read and write
4FEF000
stack
page read and write
6152000
trusted library allocation
page read and write
6280000
trusted library allocation
page read and write
6286000
trusted library allocation
page read and write
63A5000
trusted library allocation
page read and write
30A0000
direct allocation
page read and write
D78000
unkown
page execute and write copy
6158000
trusted library allocation
page read and write
5DB7000
trusted library allocation
page read and write
53AF000
stack
page read and write
53F0000
direct allocation
page execute and read and write
45E0000
direct allocation
page read and write
954000
heap
page read and write
6211000
trusted library allocation
page read and write
A80000
heap
page read and write
45E0000
direct allocation
page read and write
427F000
stack
page read and write
EEE000
unkown
page execute and write copy
5D6D000
trusted library allocation
page read and write
954000
heap
page read and write
6204000
trusted library allocation
page read and write
6308000
trusted library allocation
page read and write
5D47000
trusted library allocation
page read and write
5ED9000
trusted library allocation
page read and write
5D46000
trusted library allocation
page read and write
B20000
unkown
page readonly
6329000
trusted library allocation
page read and write
615D000
trusted library allocation
page read and write
61F8000
trusted library allocation
page read and write
6262000
trusted library allocation
page read and write
5D54000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
4DE1000
heap
page read and write
5DBE000
trusted library allocation
page read and write
49E0000
heap
page execute and read and write
62AB000
trusted library allocation
page read and write
954000
heap
page read and write
4DE1000
heap
page read and write
48C1000
heap
page read and write
45E0000
direct allocation
page read and write
625F000
trusted library allocation
page read and write
B03000
unkown
page write copy
6155000
trusted library allocation
page read and write
5E79000
trusted library allocation
page read and write
12A000
unkown
page execute and read and write
5220000
trusted library allocation
page read and write
35FF000
stack
page read and write
6163000
trusted library allocation
page read and write
39BF000
stack
page read and write
5E47000
trusted library allocation
page read and write
126000
unkown
page write copy
6227000
trusted library allocation
page read and write
5270000
direct allocation
page read and write
2C80000
heap
page read and write
EF6000
unkown
page execute and read and write
5D54000
trusted library allocation
page read and write
6206000
trusted library allocation
page read and write
13CB000
heap
page read and write
5EEC000
trusted library allocation
page read and write
293F000
stack
page read and write
48C1000
heap
page read and write
48C1000
heap
page read and write
3AB000
unkown
page execute and write copy
4DE1000
heap
page read and write
6152000
trusted library allocation
page read and write
48C1000
heap
page read and write
48C1000
heap
page read and write
954000
heap
page read and write
5D4D000
trusted library allocation
page read and write
5DBF000
trusted library allocation
page read and write
6295000
trusted library allocation
page read and write
F22000
unkown
page execute and write copy
62BD000
trusted library allocation
page read and write
363E000
stack
page read and write
6153000
trusted library allocation
page read and write
EEE000
unkown
page execute and read and write
61DF000
trusted library allocation
page read and write
2C3E000
stack
page read and write
256F000
stack
page read and write
7C0000
heap
page read and write
6153000
trusted library allocation
page read and write
626A000
trusted library allocation
page read and write
6152000
trusted library allocation
page read and write
There are 1197 hidden memdumps, click here to show them.