IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\2[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\Nework[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\acentric[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\rstxdhuj[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\splwow64[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\HI1BCF07\2[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\HI1BCF07\5[1].exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\HI1BCF07\crypted[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\HI1BCF07\newbundle2[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\HI1BCF07\stealc_default2[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\12dsvc[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\66ed86be077bb_12[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\Blenar[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\JavvvUmar[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\penis[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\LummaC222222[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\gold[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\needmoney[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\QuantumDynamics Lab\QuantumFlow.scr
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000002001\gold.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000004001\12dsvc.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000005001\Nework.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000064001\JavvvUmar.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000191001\needmoney.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000254001\penis.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000284001\acentric.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000285001\2.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000287001\splwow64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000290001\crypted.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000314001\LummaC222222.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000318001\66ed86be077bb_12.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000321001\2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000322001\newbundle2.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000340001\Blenar.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000342001\rstxdhuj.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000343001\5.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\607698\Waters.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\svchost015.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\wZcULqdrBkDQvQgfGRYD.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\d3d9.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\u3uP67496d.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\weX3lQ8AOU.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\Opportunistic Telegraph\acentric.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\ProgramData\AFCFHDHIIIECBGCAKFIJDHJEGI
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\AKFCBFHJDHJKECAKEHID
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BFCAAEHJDBKJJKFHJEBKFBGDAA
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\CBGCBGCAFIIECBFIDHIJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DAKEHIJJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\DAKFIDHDGIEGCAKFIIJK
ASCII text, with very long lines (1765), with CRLF line terminators
dropped
C:\ProgramData\DGCAAAFCBFBAKFHJDBKJJJJJJD
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\EGIDHDGCBFBKECBFHCAF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FHDAFIID
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\GDGIJECGDGCBKECAKFBGCAKECG
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\GHDBKFHIJKJKECAAAECA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GHDBKFHIJKJKECAAAECAECFBFI
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GHJDBAKEHDHDGCAKKJJE
ASCII text, with very long lines (1765), with CRLF line terminators
dropped
C:\ProgramData\HIJJDGDH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IIEHJEHDBGHIDGDGHCBGDGCBFI
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\IJKFCFHJDBKKFHIEHIDGCFCAEB
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JKKEBGCGHIDHCBFHIDGHCBKEHC
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KECFIDGC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Thu Oct 5 08:16:11 2023, atime=Wed Sep 27 08:36:54 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\12dsvc.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\crypted.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\gold.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\penis.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\u3uP67496d.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\QuantumDynamics Lab\QuantumFlow.js
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\QuantumDynamics Lab\W
data
dropped
C:\Users\user\AppData\Local\Temp\607698\Q
data
dropped
C:\Users\user\AppData\Local\Temp\Asbestos
data
dropped
C:\Users\user\AppData\Local\Temp\Ashley
data
dropped
C:\Users\user\AppData\Local\Temp\Bet
data
dropped
C:\Users\user\AppData\Local\Temp\Emotions
ASCII text, with very long lines (950), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Emotions.bat (copy)
ASCII text, with very long lines (950), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Ensures
data
dropped
C:\Users\user\AppData\Local\Temp\Fla
data
dropped
C:\Users\user\AppData\Local\Temp\Language
data
dropped
C:\Users\user\AppData\Local\Temp\Navy
data
dropped
C:\Users\user\AppData\Local\Temp\Participants
data
dropped
C:\Users\user\AppData\Local\Temp\Rick
data
dropped
C:\Users\user\AppData\Local\Temp\Streaming
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\Temperature
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp6957.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp6968.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp7B1A.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp7B3B.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpE29E.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpE2AF.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Viruses
data
dropped
C:\Users\user\AppData\Local\Temp\Width
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\13ea046e647bb8e29b85781ced2af533_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\Hkbsse.job
data
dropped
C:\Windows\Tasks\axplong.job
data
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 108 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\1000002001\gold.exe
"C:\Users\user\AppData\Local\Temp\1000002001\gold.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000004001\12dsvc.exe
"C:\Users\user\AppData\Local\Temp\1000004001\12dsvc.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\user\AppData\Roaming\u3uP67496d.exe
"C:\Users\user\AppData\Roaming\u3uP67496d.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000005001\Nework.exe
"C:\Users\user\AppData\Local\Temp\1000005001\Nework.exe"
malicious
C:\Users\user\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
"C:\Users\user\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe
"C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe"
malicious
C:\Users\user\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
C:\Users\user\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
malicious
C:\Users\user\AppData\Local\Temp\1000191001\needmoney.exe
"C:\Users\user\AppData\Local\Temp\1000191001\needmoney.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000254001\penis.exe
"C:\Users\user\AppData\Local\Temp\1000254001\penis.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000284001\acentric.exe
"C:\Users\user\AppData\Local\Temp\1000284001\acentric.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000064001\JavvvUmar.exe
"C:\Users\user\AppData\Local\Temp\1000064001\JavvvUmar.exe"
malicious
C:\Users\user\AppData\Local\Temp\svchost015.exe
C:\Users\user\AppData\Local\Temp\svchost015.exe
malicious
C:\Users\user\AppData\Local\Temp\1000285001\2.exe
"C:\Users\user\AppData\Local\Temp\1000285001\2.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000287001\splwow64.exe
"C:\Users\user\AppData\Local\Temp\1000287001\splwow64.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c move Emotions Emotions.bat & Emotions.bat
malicious
C:\Users\user\AppData\Local\Temp\1000290001\crypted.exe
"C:\Users\user\AppData\Local\Temp\1000290001\crypted.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa opssvc"
malicious
C:\Users\user\AppData\Local\Temp\1000314001\LummaC222222.exe
"C:\Users\user\AppData\Local\Temp\1000314001\LummaC222222.exe"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 607698
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "MaskBathroomCompositionInjection" Participants
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Navy + ..\Temperature + ..\Streaming + ..\Ashley + ..\Ensures + ..\Language + ..\Viruses + ..\Bet + ..\Fla + ..\Asbestos + ..\Width Q
malicious
C:\Users\user\AppData\Local\Temp\607698\Waters.pif
Waters.pif Q
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\user\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Users\user\AppData\Roaming\weX3lQ8AOU.exe
"C:\Users\user\AppData\Roaming\weX3lQ8AOU.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 33 hidden processes, click here to show them.

URLs

Name
IP
Malicious
lootebarrkeyn.shop
malicious
http://91.202.233.158/e96ea2db21fa9a1b.php
malicious
@sevtvf17vt.top
malicious
analforeverlovyu.top
malicious
https://solutionhub.cc:443/socket/
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://cert.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.cer0Q
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://91.202.233.158/3836fd5700214436/msvcp140.dll
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://www.x-ways.net/winhex/subscribe-d.htmlU
unknown
http://185.215.113.117/inc/needmoney.exeI
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://103.130.147.211/Files/2.exe
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://185.215.113.117/inc/gold.exe
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
https://garageserviceoperation.com:443/socket/?i
unknown
https://solutionhub.cc:443/socket/?id=socket/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://sevtvf17vt.top/v1/upload.php
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
https://garageserviceoperation.com:443/socket/?id=H
unknown
https://www.x-ways.net/winhex/forum/www.x-ways.net/winhex/templates/www.x-ways.net/dongle_protection
unknown
https://www.leopardi.nl/frm/_vti_cnf/Blenar.exe
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
https://solutionhub.cc:443/socket/?id=socket/1y
unknown
http://185.215.113.16/dobre/splwow64.exe
unknown
http://185.215.113.117/inc/needmoney.exey
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
https://garageserviceoperation.com:443/socket/?id=heckup6
unknown
https://garageserviceoperation.com:443/socket/?id=l
unknown
http://185.215.113.17/2fb6c2cc8dce150a.phpB
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://185.215.113.16/inc/2.exe2Cm
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://185.215.113.16/inc/2.exe
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://185.215.113.26/Dem7kTu/index.phpo
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://185.215.113.17/2fb6c2cc8dce150a.phpN
unknown
http://185.215.113.26/Dem7kTu/index.phpt
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
https://solutionhub.cc:443/socket/443/socket/
unknown
http://185.215.113.17/2fb6c2cc8dce150a.phpa
unknown
http://91.202.233.158/3836fd5700214436/nss3.dllU2Ll
unknown
http://185.215.113.26/Dem7kTu/index.phpx
unknown
http://185.215.113.17/2fb6c2cc8dce150a.phpc
unknown
http://185.215.113.26/Dem7kTu/index.phpy
unknown
http://185.215.113.17/2fb6c2cc8dce150a.phpf
unknown
http://91.202.233.158/3836fd5700214436/nss3.dllsD7l
unknown
http://185.215.113.17/2fb6c2cc8dce150a.phpX
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://185.215.113.26/Dem7kTu/index.phpP
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
https://garageserviceoperation.com/aL
unknown
https://garageserviceoperation.com/socket/?id=5A
unknown
http://185.215.113.17/2fb6c2cc8dce150a.phpimple-storage.json
unknown
http://185.215.113.26/Dem7kTu/index.phpT
unknown
http://103.130.147.211/Files/2.exeO
unknown
http://tempuri.org/Entity/Id13Response
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
unknown
http://185.215.113.26/Dem7kTu/index.phpc
unknown
https://solutionhub.cc:443/socket/?serviceCheckup
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
https://garageserviceoperation.com:443/socket/?serviceCheckupJ-
unknown
http://185.215.113.26/Dem7kTu/index.php(
unknown
http://185.215.113.26/Dem7kTu/index.phpogramW6432=C:
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://tempuri.org/Entity/Id4ResponseD
unknown
http://185.215.113.26/Dem7kTu/index.php7
unknown
http://185.215.113.26/Dem7kTu/index.php4
unknown
http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
unknown
http://185.215.113.117/inc/LummaC222222.exeU
unknown
http://tempuri.org/Entity/Id22ResponseD
unknown
http://185.215.113.17/2fb6c2cc8dce150a.phprowser
unknown
http://tempuri.org/Entity/Id16ResponseD
unknown
http://185.215.113.26/Dem7kTu/index.php?
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
unknown
http://tempuri.org/Entity/Id19ResponseD
unknown
https://solutionhub.cc:443/socket/?id=/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
91.202.233.158
unknown
Russian Federation
malicious
185.215.113.16
unknown
Portugal
malicious
89.105.223.196
unknown
Netherlands
malicious
194.116.215.195
unknown
unknown
185.215.113.26
unknown
Portugal
46.19.218.204
unknown
Netherlands
103.130.147.211
unknown
Turkey
147.45.44.104
unknown
Russian Federation
185.215.113.17
unknown
Portugal
95.179.250.45
unknown
Netherlands
65.21.18.51
unknown
United States
185.215.113.117
unknown
Portugal
5.53.124.195
unknown
Russian Federation
81.19.139.138
unknown
Russian Federation
There are 4 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
splwow64.exe
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
acentric
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\acentric_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\acentric_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\acentric_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\acentric_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\acentric_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\acentric_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\acentric_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\acentric_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\acentric_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\acentric_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\acentric_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\acentric_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\acentric_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\acentric_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
There are 23 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
211000
unkown
page execute and read and write
malicious
9B2000
unkown
page readonly
malicious
2968000
heap
page read and write
malicious
3159000
direct allocation
page execute and read and write
malicious
423000
remote allocation
page execute and read and write
malicious
3B95000
trusted library allocation
page read and write
malicious
41F5000
trusted library allocation
page read and write
malicious
4980000
direct allocation
page read and write
malicious
D4E000
heap
page read and write
malicious
4A30000
direct allocation
page read and write
malicious
211000
unkown
page execute and read and write
malicious
2E50000
direct allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
88E000
heap
page read and write
malicious
211000
unkown
page execute and read and write
malicious
611000
unkown
page execute read
malicious
29C2000
heap
page read and write
malicious
221000
unkown
page execute read
malicious
3740000
direct allocation
page read and write
malicious
221000
unkown
page execute read
malicious
221000
unkown
page execute read
malicious
421000
remote allocation
page execute and read and write
malicious
611000
unkown
page execute read
malicious
ED1000
unkown
page execute and write copy
malicious
5080000
direct allocation
page read and write
malicious
F42000
unkown
page readonly
malicious
3E85000
heap
page read and write
malicious
ED1000
unkown
page execute and write copy
malicious
871000
unkown
page execute and read and write
malicious
3710000
direct allocation
page execute and read and write
malicious
298D000
heap
page read and write
malicious
221000
unkown
page execute read
malicious
4C40000
direct allocation
page read and write
malicious
89C0000
trusted library allocation
page read and write
33E8000
trusted library allocation
page read and write
8956000
heap
page read and write
2F9F000
stack
page read and write
210E1000
heap
page read and write
3A76000
trusted library allocation
page read and write
271BE000
heap
page read and write
2BFE000
stack
page read and write
38FF000
stack
page read and write
14EE000
stack
page read and write
6A8C000
stack
page read and write
3DE0000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
2F20000
direct allocation
page read and write
279000
unkown
page write copy
122E000
stack
page read and write
C84000
heap
page read and write
4BE1000
heap
page read and write
1160000
heap
page read and write
6A700000
unkown
page read and write
40EE000
trusted library allocation
page read and write
CFC000
stack
page read and write
3A4C000
trusted library allocation
page read and write
63C000
unkown
page write copy
367F000
stack
page read and write
2FD5000
trusted library allocation
page read and write
A70000
trusted library allocation
page read and write
210DE000
heap
page read and write
3FA1000
heap
page read and write
46A000
remote allocation
page execute and read and write
2910000
heap
page read and write
14E4000
heap
page read and write
65CE000
stack
page read and write
316E000
trusted library allocation
page read and write
4BE0000
heap
page read and write
7929000
trusted library allocation
page read and write
B90000
trusted library allocation
page read and write
5B10000
trusted library allocation
page read and write
2960000
heap
page read and write
4ED0000
heap
page read and write
323F000
stack
page read and write
5398000
trusted library allocation
page read and write
320F000
unkown
page read and write
3381000
trusted library allocation
page read and write
E47000
heap
page read and write
6FC0000
heap
page read and write
116F000
heap
page read and write
75E6000
trusted library allocation
page read and write
1312000
trusted library allocation
page read and write
313A000
heap
page read and write
867F000
stack
page read and write
D853000
heap
page read and write
2F40000
trusted library allocation
page read and write
69200000
unkown
page readonly
210EA000
heap
page read and write
531E000
stack
page read and write
2F20000
direct allocation
page read and write
6460000
trusted library allocation
page read and write
220000
unkown
page readonly
7F3E000
stack
page read and write
E4C000
heap
page read and write
9B000
stack
page read and write
4B90000
direct allocation
page execute and read and write
93E000
stack
page read and write
210DB000
heap
page read and write
B1A000
heap
page read and write
C84000
heap
page read and write
385F000
stack
page read and write
2690000
heap
page read and write
4BE1000
heap
page read and write
210000
unkown
page read and write
37FE000
stack
page read and write
4DC0000
direct allocation
page execute and read and write
289000
unkown
page readonly
26B0000
direct allocation
page read and write
4BB0000
direct allocation
page execute and read and write
1402000
heap
page read and write
B50000
heap
page read and write
36A5000
trusted library allocation
page read and write
6972000
trusted library allocation
page read and write
E16000
trusted library allocation
page read and write
4970000
direct allocation
page read and write
12E0000
trusted library allocation
page read and write
D830000
heap
page read and write
2550000
remote allocation
page execute and read and write
313D000
heap
page read and write
88A0000
heap
page read and write
90FE000
stack
page read and write
D855000
heap
page read and write
E5A000
heap
page read and write
2D2D000
trusted library allocation
page read and write
337B000
trusted library allocation
page read and write
77AB000
heap
page read and write
1756000
heap
page read and write
56C1000
heap
page read and write
A50000
trusted library allocation
page read and write
4BE1000
heap
page read and write
3E6E000
stack
page read and write
3359000
trusted library allocation
page read and write
5FEE000
stack
page read and write
404E000
trusted library allocation
page read and write
CFD000
stack
page read and write
6B9000
unkown
page readonly
50A0000
heap
page read and write
4BE1000
heap
page read and write
4970000
direct allocation
page read and write
4790000
direct allocation
page read and write
C5E000
stack
page read and write
6F10000
trusted library allocation
page read and write
2F20000
direct allocation
page read and write
1AEAD000
stack
page read and write
21102000
heap
page read and write
DE3B000
heap
page read and write
708000
heap
page read and write
6AF0000
trusted library allocation
page read and write
13FD000
heap
page read and write
12DD000
stack
page read and write
27EE000
trusted library allocation
page read and write
2F20000
direct allocation
page read and write
684C000
stack
page read and write
2620000
direct allocation
page read and write
47A1000
heap
page read and write
2B91000
trusted library allocation
page read and write
1A78F000
stack
page read and write
1263000
stack
page read and write
2E80000
heap
page read and write
391F000
trusted library allocation
page read and write
13CF000
stack
page read and write
6F63000
trusted library allocation
page read and write
14EE000
stack
page read and write
397F000
stack
page read and write
2F30000
heap
page read and write
324E000
stack
page read and write
285000
unkown
page read and write
32D8000
trusted library allocation
page read and write
5200000
direct allocation
page execute and read and write
D83D000
heap
page read and write
93FB000
heap
page read and write
6BE000
stack
page read and write
3E03000
trusted library allocation
page read and write
2F20000
direct allocation
page read and write
81BE000
stack
page read and write
2C89000
trusted library allocation
page read and write
3980000
trusted library allocation
page read and write
6610000
trusted library allocation
page read and write
18C3000
heap
page read and write
9388000
heap
page read and write
39D7000
trusted library allocation
page read and write
3EE0000
trusted library allocation
page read and write
4790000
direct allocation
page read and write
7A20000
trusted library allocation
page read and write
3AFE000
stack
page read and write
210E7000
heap
page read and write
47A1000
heap
page read and write
12F0000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
325B000
trusted library allocation
page read and write
3353000
trusted library allocation
page read and write
4BE1000
heap
page read and write
87E000
unkown
page readonly
400F000
trusted library allocation
page read and write
31C0000
heap
page read and write
4FA0000
heap
page read and write
210DE000
heap
page read and write
3FA1000
heap
page read and write
270000
unkown
page readonly
307E000
stack
page read and write
BE4000
heap
page read and write
32C2000
trusted library allocation
page read and write
3FAC000
trusted library allocation
page read and write
3A3F000
trusted library allocation
page read and write
4BE1000
heap
page read and write
E28000
heap
page read and write
1402000
heap
page read and write
4790000
direct allocation
page read and write
8A9A000
trusted library allocation
page read and write
4BF0000
direct allocation
page execute and read and write
52A0000
direct allocation
page execute and read and write
7025000
trusted library allocation
page read and write
3325000
trusted library allocation
page read and write
44E1000
heap
page read and write
1325000
trusted library allocation
page execute and read and write
2D3B2000
heap
page read and write
14E4000
heap
page read and write
75E0000
trusted library allocation
page read and write
8BFE000
stack
page read and write
3F99000
trusted library allocation
page read and write
4BE1000
heap
page read and write
173E000
stack
page read and write
312C000
heap
page read and write
D90000
heap
page read and write
D7C7000
heap
page read and write
436E000
stack
page read and write
4BE1000
heap
page read and write
7AE0000
trusted library allocation
page execute and read and write
B82000
heap
page read and write
43EC000
stack
page read and write
47A1000
heap
page read and write
34BD000
stack
page read and write
3375000
trusted library allocation
page read and write
331F000
trusted library allocation
page read and write
6940000
trusted library allocation
page execute and read and write
308E000
stack
page read and write
4E70000
heap
page read and write
211C000
stack
page read and write
47A1000
heap
page read and write
31C6000
trusted library allocation
page read and write
210D9000
heap
page read and write
EF9000
heap
page read and write
11B4000
heap
page read and write
36C000
stack
page read and write
3A3F000
stack
page read and write
2D03000
heap
page read and write
47A1000
heap
page read and write
4BE1000
heap
page read and write
3265000
trusted library allocation
page read and write
42FE000
stack
page read and write
D4E000
stack
page read and write
313A000
heap
page read and write
279000
unkown
page read and write
74EC000
heap
page read and write
13FD000
heap
page read and write
13BF000
stack
page read and write
210F5000
heap
page read and write
3BBE000
stack
page read and write
B83000
unkown
page execute and read and write
1782000
trusted library allocation
page read and write
9B0000
heap
page read and write
96AE000
stack
page read and write
140D000
heap
page read and write
4085000
trusted library allocation
page read and write
C10000
heap
page read and write
8A55000
trusted library allocation
page read and write
6B0000
unkown
page write copy
2834000
trusted library allocation
page read and write
5AD000
remote allocation
page execute and read and write
27B000
unkown
page execute and read and write
CCB000
trusted library allocation
page execute and read and write
4CA1000
direct allocation
page read and write
5D35000
heap
page read and write
794A000
trusted library allocation
page read and write
2EEB000
trusted library allocation
page read and write
483E000
stack
page read and write
5F3F000
heap
page read and write
2A6E000
stack
page read and write
47A1000
heap
page read and write
21102000
heap
page read and write
312D000
heap
page read and write
6910000
trusted library allocation
page execute and read and write
210F5000
heap
page read and write
DCE000
stack
page read and write
587000
remote allocation
page execute and read and write
430D000
trusted library allocation
page read and write
6D7000
unkown
page execute and write copy
407000
remote allocation
page execute and read and write
F87000
heap
page read and write
61ECD000
direct allocation
page readonly
1A9EE000
stack
page read and write
2550000
heap
page read and write
3317000
trusted library allocation
page read and write
4DC3000
heap
page read and write
93DA000
heap
page read and write
3334000
trusted library allocation
page read and write
1A9AF000
stack
page read and write
11D3000
heap
page read and write
A7E000
stack
page read and write
993000
stack
page read and write
210E7000
heap
page read and write
5123000
heap
page execute and read and write
289000
unkown
page readonly
279000
unkown
page read and write
21102000
heap
page read and write
47A1000
heap
page read and write
30D6000
trusted library allocation
page read and write
3BC0000
trusted library allocation
page read and write
61E00000
direct allocation
page execute and read and write
72D000
heap
page read and write
3B00000
trusted library allocation
page read and write
EDB000
heap
page read and write
4D7F000
stack
page read and write
14E4000
heap
page read and write
E7E000
heap
page read and write
2D1E0000
trusted library allocation
page read and write
E21000
heap
page read and write
D04000
unkown
page read and write
C94000
unkown
page read and write
CB0000
unkown
page readonly
211000
unkown
page execute and write copy
8F8000
stack
page read and write
210F1000
heap
page read and write
326E000
heap
page read and write
532000
unkown
page execute and write copy
3387000
trusted library allocation
page read and write
3250000
heap
page read and write
3F3F000
stack
page read and write
3F6F000
trusted library allocation
page read and write
332E000
stack
page read and write
5310000
trusted library allocation
page execute and read and write
87E000
unkown
page readonly
5B35000
heap
page read and write
270000
unkown
page readonly
D837000
heap
page read and write
7920000
trusted library allocation
page read and write
210EB000
heap
page read and write
342F000
stack
page read and write
5390000
heap
page read and write
11D8000
heap
page read and write
50E1000
direct allocation
page read and write
312C000
stack
page read and write
3DD0000
trusted library allocation
page read and write
259F000
stack
page read and write
134B000
trusted library allocation
page execute and read and write
1790000
heap
page read and write
5220000
trusted library allocation
page read and write
4790000
direct allocation
page read and write
4790000
direct allocation
page read and write
8970000
trusted library allocation
page execute and read and write
2871000
trusted library allocation
page read and write
47A1000
heap
page read and write
E53000
heap
page read and write
4DBB000
trusted library allocation
page read and write
1A6AF000
stack
page read and write
401E000
stack
page read and write
4BE1000
heap
page read and write
13EB000
heap
page read and write
2FA7000
trusted library allocation
page read and write
5140000
heap
page execute and read and write
21102000
heap
page read and write
4DC000
remote allocation
page execute and read and write
3A41000
trusted library allocation
page read and write
2C70000
trusted library allocation
page read and write
4BE1000
heap
page read and write
7714000
heap
page read and write
660000
unkown
page readonly
4770000
heap
page read and write
6A26000
trusted library allocation
page read and write
CE0000
heap
page read and write
2620000
direct allocation
page read and write
F10000
heap
page read and write
1F0000
remote allocation
page read and write
258E000
remote allocation
page readonly
41F000
unkown
page read and write
9F60000
trusted library allocation
page read and write
31DA000
heap
page read and write
117D000
stack
page read and write
3E2F000
stack
page read and write
B72000
trusted library allocation
page read and write
11CF000
heap
page read and write
5792000
trusted library allocation
page read and write
3E61000
trusted library allocation
page read and write
4DC0000
direct allocation
page execute and read and write
210F5000
heap
page read and write
4C6E000
stack
page read and write
333C000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
6515000
trusted library allocation
page read and write
88BF000
heap
page read and write
873000
unkown
page readonly
3C6F000
trusted library allocation
page read and write
5A8D000
heap
page read and write
22DE000
stack
page read and write
6695000
trusted library allocation
page read and write
5366000
heap
page read and write
26B0000
direct allocation
page read and write
2D3E000
stack
page read and write
CE5000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
2BBD000
trusted library allocation
page read and write
317C000
trusted library allocation
page read and write
651E000
trusted library allocation
page read and write
45BE000
stack
page read and write
2F56000
heap
page read and write
C5D000
trusted library allocation
page execute and read and write
31F3000
trusted library allocation
page read and write
1197000
heap
page read and write
36BE000
stack
page read and write
47A1000
heap
page read and write
4FD0000
heap
page read and write
AB9000
heap
page read and write
3146000
heap
page read and write
5400000
trusted library allocation
page read and write
3E9B000
trusted library allocation
page read and write
3144000
heap
page read and write
D93000
trusted library allocation
page execute and read and write
40EE000
stack
page read and write
88EE000
heap
page read and write
982000
heap
page read and write
E46000
heap
page read and write
3E37000
trusted library allocation
page read and write
9D0000
heap
page read and write
1340000
trusted library allocation
page read and write
5206000
trusted library allocation
page read and write
47A1000
heap
page read and write
82C000
heap
page read and write
3EF1000
trusted library allocation
page read and write
4BE1000
heap
page read and write
674A000
stack
page read and write
4DC5000
trusted library allocation
page read and write
2620000
direct allocation
page read and write
4790000
direct allocation
page read and write
1AF10000
heap
page read and write
4BE1000
heap
page read and write
3319000
trusted library allocation
page read and write
37EF000
stack
page read and write
83FF000
stack
page read and write
C7A000
trusted library allocation
page execute and read and write
89D0000
trusted library allocation
page execute and read and write
5120000
heap
page execute and read and write
ED0000
unkown
page readonly
893D000
stack
page read and write
3149000
heap
page read and write
324A000
trusted library allocation
page read and write
1332000
trusted library allocation
page read and write
21102000
heap
page read and write
6920000
trusted library allocation
page read and write
2FED000
trusted library allocation
page read and write
3FA1000
heap
page read and write
72F000
heap
page read and write
4342000
trusted library allocation
page read and write
6929000
trusted library allocation
page read and write
2FA7000
trusted library allocation
page read and write
36AF000
stack
page read and write
457F000
stack
page read and write
1390000
heap
page read and write
531000
unkown
page execute and write copy
85A000
stack
page read and write
570D000
stack
page read and write
41FD000
stack
page read and write
273F000
stack
page read and write
676E000
stack
page read and write
2DDF000
trusted library allocation
page read and write
279000
unkown
page read and write
1414000
heap
page read and write
69B8D000
unkown
page execute read
4BE1000
heap
page read and write
2E87000
trusted library allocation
page read and write
E26000
heap
page read and write
78E0000
trusted library allocation
page execute and read and write
11DB000
heap
page read and write
3323000
trusted library allocation
page read and write
2F9D000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
1E0000
heap
page read and write
4BE1000
heap
page read and write
85DE000
stack
page read and write
439F000
stack
page read and write
BE0000
trusted library allocation
page execute and read and write
E0E000
heap
page read and write
69B97000
unkown
page readonly
210E1000
heap
page read and write
6A10000
trusted library allocation
page read and write
3BFC000
stack
page read and write
569E000
stack
page read and write
2550000
heap
page execute and read and write
4B60000
direct allocation
page execute and read and write
A45000
heap
page read and write
32F5000
trusted library allocation
page read and write
333F000
stack
page read and write
3ACF000
trusted library allocation
page read and write
87D000
unkown
page write copy
47A1000
heap
page read and write
F7C000
stack
page read and write
1295000
heap
page read and write
28E4000
trusted library allocation
page read and write
500000
remote allocation
page execute and read and write
EFC000
unkown
page read and write
11C5000
heap
page read and write
D02000
unkown
page read and write
8D9000
unkown
page read and write
5D09000
heap
page read and write
4BE1000
heap
page read and write
51E0000
trusted library allocation
page read and write
2BAB000
trusted library allocation
page read and write
D3E000
stack
page read and write
210E1000
heap
page read and write
4E30000
direct allocation
page execute and read and write
2C66000
trusted library allocation
page read and write
162E000
heap
page read and write
18A3000
heap
page read and write
B7E000
stack
page read and write
4C70000
trusted library allocation
page read and write
39E0000
heap
page read and write
4A5E000
stack
page read and write
4C50000
direct allocation
page execute and read and write
6540000
trusted library allocation
page read and write
400000
unkown
page readonly
4BE1000
heap
page read and write
5250000
direct allocation
page execute and read and write
2BDA000
trusted library allocation
page read and write
1763000
trusted library allocation
page execute and read and write
82000
unkown
page readonly
3131000
heap
page read and write
2D29000
trusted library allocation
page read and write
3FA1000
heap
page read and write
13D4000
heap
page read and write
2770000
heap
page read and write
29EE000
stack
page read and write
3F90000
trusted library allocation
page read and write
DC0000
heap
page read and write
3306000
trusted library allocation
page read and write
B20000
heap
page read and write
16DC000
stack
page read and write
4E00000
direct allocation
page execute and read and write
3DDE000
trusted library allocation
page read and write
3F90000
trusted library allocation
page read and write
531000
unkown
page execute and write copy
5B6C000
heap
page read and write
410000
unkown
page execute and read and write
4E50000
heap
page read and write
4050000
heap
page read and write
6AD0000
trusted library allocation
page execute and read and write
7F0000
heap
page read and write
320C000
trusted library allocation
page read and write
1956000
heap
page read and write
44E0000
heap
page read and write
1933000
heap
page read and write
3252000
heap
page read and write
A7D000
trusted library allocation
page execute and read and write
59C0000
heap
page read and write
26B0000
direct allocation
page read and write
431B000
trusted library allocation
page read and write
B0E000
stack
page read and write
61ED3000
direct allocation
page read and write
26B0000
direct allocation
page read and write
C3E000
stack
page read and write
2ADC000
stack
page read and write
8F7000
stack
page read and write
7E0000
heap
page read and write
210EE000
heap
page read and write
2D08000
trusted library allocation
page read and write
3FA3000
trusted library allocation
page read and write
86BE000
stack
page read and write
2F60000
trusted library allocation
page read and write
3227000
trusted library allocation
page read and write
3EBE000
stack
page read and write
8D2000
unkown
page execute and read and write
210E5000
heap
page read and write
74AE000
heap
page read and write
3980000
trusted library allocation
page read and write
8B5E000
stack
page read and write
4BE1000
heap
page read and write
84C000
heap
page read and write
415E000
stack
page read and write
1357000
stack
page read and write
E2F000
heap
page read and write
61EB4000
direct allocation
page read and write
5365000
heap
page read and write
4BE1000
heap
page read and write
210F5000
heap
page read and write
3E59000
trusted library allocation
page read and write
401F000
trusted library allocation
page read and write
6BD0000
trusted library allocation
page read and write
E27000
heap
page read and write
29DD000
heap
page read and write
91FF000
stack
page read and write
4BE1000
heap
page read and write
6A60000
trusted library allocation
page read and write
210E5000
heap
page read and write
64C8000
heap
page read and write
47A1000
heap
page read and write
210D3000
heap
page read and write
210E8000
heap
page read and write
3FE0000
trusted library allocation
page read and write
4F50000
trusted library section
page readonly
4C30000
direct allocation
page execute and read and write
64B0000
trusted library allocation
page read and write
302D000
trusted library allocation
page read and write
39F6000
trusted library allocation
page read and write
EA4000
heap
page read and write
C00000
trusted library allocation
page read and write
5950000
heap
page read and write
7785000
heap
page read and write
27F0000
heap
page read and write
4BE1000
heap
page read and write
7A2F000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
433E000
stack
page read and write
479000
remote allocation
page execute and read and write
8893000
heap
page read and write
93A000
stack
page read and write
690E000
stack
page read and write
3B06000
heap
page read and write
DE0000
trusted library allocation
page read and write
53A0000
heap
page read and write
69B34000
unkown
page readonly
4BE1000
heap
page read and write
326A000
heap
page read and write
D5A000
heap
page read and write
5D0C000
heap
page read and write
4A7F000
stack
page read and write
4D02000
trusted library allocation
page read and write
3246000
trusted library allocation
page read and write
21100000
heap
page read and write
51EB000
trusted library allocation
page read and write
920000
heap
page read and write
1100000
heap
page read and write
69B0000
trusted library allocation
page read and write
8AA0000
trusted library allocation
page read and write
F34000
trusted library allocation
page read and write
8B80000
heap
page read and write
25D0000
trusted library allocation
page read and write
11B4000
heap
page read and write
532000
unkown
page execute and write copy
3FA1000
heap
page read and write
AFD000
stack
page read and write
794F000
trusted library allocation
page read and write
65BB000
heap
page read and write
E2A000
heap
page read and write
4E20000
direct allocation
page execute and read and write
6918000
trusted library allocation
page read and write
137E000
stack
page read and write
2BAF000
stack
page read and write
2DB1000
trusted library allocation
page read and write
326A000
heap
page read and write
EF0000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
24F0000
heap
page read and write
211DF000
heap
page read and write
828000
heap
page read and write
8127000
heap
page read and write
2855000
trusted library allocation
page read and write
437F000
stack
page read and write
4126000
trusted library allocation
page read and write
79C000
stack
page read and write
8EE000
heap
page read and write
3E50000
trusted library allocation
page read and write
7805000
heap
page read and write
12BE000
stack
page read and write
695B000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
33C0000
heap
page read and write
3561000
trusted library allocation
page read and write
3219000
heap
page read and write
DE3000
heap
page read and write
40BE000
stack
page read and write
3EDE000
stack
page read and write
7002000
trusted library allocation
page read and write
B2A000
heap
page read and write
57C0000
trusted library allocation
page read and write
2ECE000
stack
page read and write
14E0000
trusted library allocation
page read and write
5070000
direct allocation
page read and write
76FC000
heap
page read and write
5D08000
heap
page read and write
7A9E000
stack
page read and write
3E87000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
DC0000
trusted library allocation
page execute and read and write
522E000
stack
page read and write
9B000
stack
page read and write
40B000
unkown
page read and write
87C000
unkown
page write copy
4BE1000
heap
page read and write
E89000
heap
page read and write
29F8000
trusted library allocation
page read and write
8BBF000
unkown
page read and write
2A10000
heap
page read and write
5241000
heap
page read and write
99D000
stack
page read and write
11DB000
heap
page read and write
6DA0000
trusted library allocation
page execute and read and write
3B7A000
trusted library allocation
page read and write
2F20000
direct allocation
page read and write
520F000
stack
page read and write
523000
unkown
page execute and read and write
38FF000
stack
page read and write
2FC7000
trusted library allocation
page read and write
321C000
trusted library allocation
page read and write
4A91000
direct allocation
page read and write
269E000
stack
page read and write
1194000
heap
page read and write
4045000
trusted library allocation
page read and write
885D000
heap
page read and write
2C83000
trusted library allocation
page read and write
7809000
heap
page read and write
69A70000
unkown
page readonly
AE0000
direct allocation
page execute and read and write
48D000
unkown
page read and write
311F000
heap
page read and write
491000
unkown
page write copy
1FC000
stack
page read and write
686F000
stack
page read and write
21102000
heap
page read and write
31EE000
stack
page read and write
47A1000
heap
page read and write
2B73000
trusted library allocation
page read and write
2637000
heap
page read and write
6B10000
trusted library allocation
page read and write
8AF0000
trusted library allocation
page read and write
9F0000
heap
page read and write
4BE1000
heap
page read and write
966E000
stack
page read and write
3321000
trusted library allocation
page read and write
98B000
heap
page read and write
6275000
trusted library allocation
page read and write
679000
unkown
page readonly
E97000
heap
page read and write
28FA000
trusted library allocation
page read and write
44E1000
heap
page read and write
ACF000
stack
page read and write
3241000
heap
page read and write
3304000
trusted library allocation
page read and write
45B1000
heap
page read and write
4BE1000
heap
page read and write
78F0000
trusted library allocation
page read and write
362E000
stack
page read and write
6961000
trusted library allocation
page read and write
EFB000
unkown
page write copy
3105000
trusted library allocation
page read and write
97000
stack
page read and write
D94000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page execute and read and write
3ABF000
trusted library allocation
page read and write
E10000
heap
page read and write
11C5000
heap
page read and write
284000
unkown
page write copy
859000
heap
page read and write
700000
heap
page read and write
30D8000
trusted library allocation
page read and write
3ABF000
stack
page read and write
47A1000
heap
page read and write
88E0000
trusted library allocation
page read and write
2F39000
trusted library allocation
page read and write
210E7000
heap
page read and write
3ECC000
trusted library allocation
page read and write
20F97000
heap
page read and write
D47000
heap
page read and write
40AF000
stack
page read and write
14E4000
heap
page read and write
2C2E000
trusted library allocation
page read and write
3565000
trusted library allocation
page read and write
17DD000
stack
page read and write
2C1D000
stack
page read and write
2830000
trusted library allocation
page read and write
E92000
unkown
page readonly
3100000
heap
page read and write
1300000
heap
page read and write
26B0000
direct allocation
page read and write
2C55000
trusted library allocation
page read and write
210DE000
heap
page read and write
41E000
remote allocation
page execute and read and write
2D28D000
heap
page read and write
8A75000
trusted library allocation
page read and write
880000
heap
page read and write
4BE1000
heap
page read and write
210C3000
heap
page read and write
670000
heap
page read and write
A1B000
heap
page read and write
18F3000
heap
page read and write
4F4C000
stack
page read and write
580000
heap
page read and write
6870000
trusted library allocation
page execute and read and write
B70000
heap
page read and write
3980000
trusted library allocation
page read and write
27FD000
trusted library allocation
page read and write
412B000
trusted library allocation
page read and write
6530000
trusted library allocation
page read and write
50FE000
stack
page read and write
985000
heap
page read and write
957000
trusted library allocation
page execute and read and write
97B0000
heap
page read and write
5320000
trusted library allocation
page read and write
6ACE000
stack
page read and write
5EF0000
heap
page read and write
326A000
heap
page read and write
4BE1000
heap
page read and write
1F0000
heap
page read and write
2AE0000
direct allocation
page execute and read and write
69F0000
trusted library allocation
page read and write
930E000
heap
page read and write
40C0000
trusted library allocation
page read and write
3E9A000
trusted library allocation
page read and write
210E7000
heap
page read and write
590000
heap
page read and write
2E3F000
stack
page read and write
2E5F000
stack
page read and write
679000
unkown
page readonly
493F000
stack
page read and write
7950000
trusted library allocation
page read and write
2A2F000
stack
page read and write
2C1E000
stack
page read and write
CAA000
unkown
page read and write
21033000
heap
page read and write
F6F000
unkown
page read and write
47A1000
heap
page read and write
3980000
trusted library allocation
page read and write
4BE1000
heap
page read and write
64E4000
heap
page read and write
210E7000
heap
page read and write
2D3AA000
heap
page read and write
680000
unkown
page readonly
47A1000
heap
page read and write
24C0000
trusted library allocation
page read and write
3FA1000
heap
page read and write
371E000
stack
page read and write
3FA1000
heap
page read and write
3271000
heap
page read and write
210E8000
heap
page read and write
25C8000
trusted library allocation
page read and write
6D5000
unkown
page execute and read and write
4BE1000
heap
page read and write
69D4000
heap
page read and write
1250000
heap
page read and write
88A000
heap
page read and write
7AA000
heap
page read and write
335F000
trusted library allocation
page read and write
353F000
stack
page read and write
1245000
stack
page read and write
382E000
stack
page read and write
47B6000
heap
page read and write
672000
unkown
page read and write
DBE000
stack
page read and write
FBE000
stack
page read and write
5F0A000
heap
page read and write
47FF000
stack
page read and write
565F000
stack
page read and write
3980000
heap
page read and write
27150000
heap
page read and write
5EDE000
stack
page read and write
2DAC000
trusted library allocation
page read and write
4BE1000
heap
page read and write
3F40000
trusted library allocation
page read and write
45B1000
heap
page read and write
4F5E000
stack
page read and write
7A2000
unkown
page read and write
7711000
heap
page read and write
41BB000
stack
page read and write
1230000
heap
page read and write
3F33000
trusted library allocation
page read and write
330D000
trusted library allocation
page read and write
3F1A000
trusted library allocation
page read and write
15BE000
heap
page read and write
660000
unkown
page readonly
5870000
heap
page execute and read and write
E70000
heap
page read and write
404B000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
461F000
stack
page read and write
2C1B000
trusted library allocation
page read and write
21102000
heap
page read and write
3FA1000
heap
page read and write
53A3000
heap
page read and write
47A1000
heap
page read and write
2630000
heap
page read and write
21102000
heap
page read and write
330B000
trusted library allocation
page read and write
4790000
direct allocation
page read and write
3032000
trusted library allocation
page read and write
3E67000
trusted library allocation
page read and write
2F42000
trusted library allocation
page read and write
163E000
heap
page read and write
4BE1000
heap
page read and write
1180000
trusted library allocation
page read and write
5200000
direct allocation
page execute and read and write
6A0E000
stack
page read and write
5173000
heap
page read and write
15F4000
heap
page read and write
3E7F000
stack
page read and write
2CEE000
stack
page read and write
3FFF000
trusted library allocation
page read and write
2E50000
trusted library allocation
page read and write
3FED000
trusted library allocation
page read and write
4D10000
trusted library allocation
page execute and read and write
5F1000
unkown
page execute read
47A1000
heap
page read and write
396E000
stack
page read and write
32D0000
trusted library allocation
page read and write
27DE000
stack
page read and write
ACD000
stack
page read and write
8B60000
trusted library allocation
page execute and read and write
3FA1000
heap
page read and write
76E5000
heap
page read and write
4405000
trusted library allocation
page read and write
634F000
stack
page read and write
30FE000
trusted library allocation
page read and write
210F5000
heap
page read and write
210F5000
heap
page read and write
C84000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
5330000
trusted library allocation
page read and write
1AC6E000
stack
page read and write
2C60000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
4BE1000
heap
page read and write
58FB000
stack
page read and write
6FD0000
heap
page read and write
431E000
stack
page read and write
DD1000
heap
page read and write
3160000
trusted library allocation
page read and write
5910000
heap
page read and write
4B00000
direct allocation
page execute and read and write
1B020000
trusted library allocation
page read and write
12D0000
heap
page read and write
210F5000
heap
page read and write
82FE000
stack
page read and write
2640000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
76E0000
heap
page read and write
13C1000
heap
page read and write
4050000
trusted library allocation
page read and write
2C64000
trusted library allocation
page read and write
210E7000
heap
page read and write
8940000
heap
page read and write
3FA1000
heap
page read and write
305C000
stack
page read and write
3169000
trusted library allocation
page read and write
D837000
heap
page read and write
BCD000
stack
page read and write
25E5000
heap
page read and write
42C000
remote allocation
page execute and read and write
160000
heap
page read and write
53A0000
trusted library allocation
page read and write
3E8C000
trusted library allocation
page read and write
4006000
trusted library allocation
page read and write
6CE000
stack
page read and write
343E000
stack
page read and write
2620000
direct allocation
page read and write
4C10000
direct allocation
page execute and read and write
3F7C000
trusted library allocation
page read and write
6A21000
trusted library allocation
page read and write
C40000
heap
page read and write
8953000
heap
page read and write
693E0000
unkown
page read and write
402C000
trusted library allocation
page read and write
3FA1000
heap
page read and write
6B00000
trusted library allocation
page read and write
210F3000
heap
page read and write
64F0000
trusted library allocation
page read and write
1316000
trusted library allocation
page execute and read and write
493E000
stack
page read and write
1417000
heap
page read and write
3E27000
trusted library allocation
page read and write
84E000
stack
page read and write
14E4000
trusted library allocation
page read and write
F40000
heap
page read and write
11ED000
heap
page read and write
3FF7000
trusted library allocation
page read and write
3D5F000
stack
page read and write
2C5A000
trusted library allocation
page read and write
5D43000
heap
page read and write
220000
unkown
page readonly
1AF21000
heap
page read and write
61E01000
direct allocation
page execute read
4D5B000
stack
page read and write
210DA000
heap
page read and write
7B0000
heap
page read and write
3FF4000
trusted library allocation
page read and write
3FA1000
heap
page read and write
8850000
heap
page read and write
6A602000
unkown
page readonly
47A1000
heap
page read and write
21106000
heap
page read and write
3FA1000
heap
page read and write
266E000
stack
page read and write
43B0000
heap
page read and write
770A000
heap
page read and write
D70000
remote allocation
page read and write
50CE000
stack
page read and write
5360000
trusted library allocation
page read and write
25E0000
heap
page read and write
3821000
trusted library allocation
page read and write
4BE1000
heap
page read and write
2D3B8000
heap
page read and write
402000
remote allocation
page execute and read and write
119C000
heap
page read and write
30FE000
stack
page read and write
47A1000
heap
page read and write
4E9000
unkown
page execute and read and write
27B000
unkown
page execute and read and write
7DBE000
stack
page read and write
327C000
heap
page read and write
1AAEE000
stack
page read and write
C84000
heap
page read and write
980000
heap
page read and write
5781000
trusted library allocation
page read and write
29EA000
trusted library allocation
page read and write
210E7000
heap
page read and write
3AD6000
trusted library allocation
page read and write
6910000
trusted library allocation
page read and write
5160000
trusted library allocation
page execute and read and write
4E9000
unkown
page execute and read and write
3310000
trusted library allocation
page read and write
30CE000
trusted library allocation
page read and write
185000
heap
page read and write
627A000
trusted library allocation
page read and write
181000
unkown
page execute read
3EC2000
trusted library allocation
page read and write
3E43000
trusted library allocation
page read and write
6A57000
trusted library allocation
page read and write
100000
heap
page read and write
47A1000
heap
page read and write
2EBF000
stack
page read and write
4ABF000
stack
page read and write
519000
unkown
page execute and read and write
693DE000
unkown
page read and write
5FEF000
stack
page read and write
781E000
stack
page read and write
8A84000
trusted library allocation
page read and write
88CE000
trusted library allocation
page read and write
3E49000
trusted library allocation
page read and write
6A3E000
trusted library allocation
page read and write
E0D000
heap
page read and write
ABE000
stack
page read and write
39CA000
trusted library allocation
page read and write
859000
heap
page read and write
6AA0000
trusted library allocation
page read and write
3206000
trusted library allocation
page read and write
73BC000
stack
page read and write
5830000
heap
page read and write
CFC000
unkown
page readonly
AB0000
heap
page read and write
31EF000
stack
page read and write
3E66000
trusted library allocation
page read and write
44E1000
heap
page read and write
69201000
unkown
page execute read
1AF00000
heap
page read and write
B7D000
heap
page read and write
27EE000
stack
page read and write
3001000
trusted library allocation
page read and write
69D8000
heap
page read and write
3252000
heap
page read and write
B41000
heap
page read and write
2D5E000
stack
page read and write
5F1000
unkown
page execute read
3121000
trusted library allocation
page read and write
1711000
heap
page read and write
F60000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
3FA7000
trusted library allocation
page read and write
1D0000
unkown
page write copy
3EEF000
trusted library allocation
page read and write
311E000
stack
page read and write
1B015000
heap
page read and write
210E7000
heap
page read and write
5900000
trusted library section
page readonly
F94000
unkown
page read and write
3AE0000
trusted library allocation
page read and write
5210000
heap
page read and write
870000
unkown
page readonly
DAE000
heap
page read and write
4BE1000
heap
page read and write
14D3000
trusted library allocation
page execute and read and write
4790000
direct allocation
page read and write
39FB000
heap
page read and write
4B40000
direct allocation
page execute and read and write
2BCE000
trusted library allocation
page read and write
21103000
heap
page read and write
210E5000
heap
page read and write
3F44000
trusted library allocation
page read and write
E22000
trusted library allocation
page read and write
35BF000
stack
page read and write
43BE000
stack
page read and write
1AF11000
heap
page read and write
36EE000
stack
page read and write
39FD000
trusted library allocation
page read and write
11B4000
heap
page read and write
181000
unkown
page execute read
4BB0000
direct allocation
page execute and read and write
5D46000
heap
page read and write
3E53000
trusted library allocation
page read and write
2F6D000
trusted library allocation
page read and write
2F20000
direct allocation
page read and write
110E000
unkown
page readonly
88AA000
heap
page read and write
1780000
trusted library allocation
page read and write
4A9E000
stack
page read and write
399F000
stack
page read and write
EEE000
unkown
page readonly
74C0000
heap
page read and write
720000
heap
page read and write
3FA1000
heap
page read and write
3AE5000
trusted library allocation
page read and write
3A3C000
trusted library allocation
page read and write
4E90000
trusted library allocation
page execute and read and write
50F0000
trusted library allocation
page read and write
531000
unkown
page execute and read and write
4BE1000
heap
page read and write
3E7D000
trusted library allocation
page read and write
3143000
heap
page read and write
4CB0000
trusted library allocation
page read and write
4E60000
direct allocation
page execute and read and write
12D8000
heap
page read and write
210F5000
heap
page read and write
A30000
heap
page read and write
47A1000
heap
page read and write
210D3000
heap
page read and write
210E8000
heap
page read and write
210E7000
heap
page read and write
8876000
heap
page read and write
4BE1000
heap
page read and write
4E10000
direct allocation
page execute and read and write
2DAF000
trusted library allocation
page read and write
669D000
stack
page read and write
2C10000
trusted library allocation
page read and write
6A521000
unkown
page execute read
496000
unkown
page readonly
4BE1000
heap
page read and write
3F62000
trusted library allocation
page read and write
11DB000
heap
page read and write
4BE1000
heap
page read and write
B97000
stack
page read and write
40E2000
trusted library allocation
page read and write
47A1000
heap
page read and write
14E4000
heap
page read and write
E10000
trusted library allocation
page read and write
4B00000
direct allocation
page execute and read and write
42BC000
stack
page read and write
330D000
trusted library allocation
page read and write
6A50000
trusted library allocation
page execute and read and write
311E000
heap
page read and write
422E000
stack
page read and write
4BE1000
heap
page read and write
3A02000
trusted library allocation
page read and write
28D5000
trusted library allocation
page read and write
327E000
stack
page read and write
3B90000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
289F000
stack
page read and write
6A40000
trusted library allocation
page execute and read and write
77C000
stack
page read and write
299E000
stack
page read and write
524E000
trusted library allocation
page read and write
1AC4D000
stack
page read and write
9F1E000
stack
page read and write
E10000
heap
page read and write
D70000
remote allocation
page read and write
1580000
heap
page read and write
64BB000
trusted library allocation
page read and write
3EA0000
heap
page read and write
3FC7000
trusted library allocation
page read and write
873000
unkown
page readonly
88CB000
trusted library allocation
page read and write
210000
unkown
page readonly
47A0000
heap
page read and write
26B0000
direct allocation
page read and write
9AE000
stack
page read and write
5209000
stack
page read and write
531000
unkown
page execute and write copy
32CE000
trusted library allocation
page read and write
5B26000
heap
page read and write
3D8E000
stack
page read and write
2F10000
heap
page read and write
702F000
trusted library allocation
page read and write
32FE000
stack
page read and write
532000
unkown
page execute and write copy
3A7000
heap
page read and write
6A20000
trusted library allocation
page read and write
9850000
heap
page read and write
3131000
heap
page read and write
13E7000
heap
page read and write
69AFE000
unkown
page read and write
662E000
stack
page read and write
366E000
stack
page read and write
32BF000
stack
page read and write
88E4000
trusted library allocation
page read and write
2BDF000
stack
page read and write
4BE1000
heap
page read and write
6C7C000
stack
page read and write
A41000
heap
page read and write
4E50000
direct allocation
page execute and read and write
B0E000
heap
page read and write
210DB000
heap
page read and write
2C31000
trusted library allocation
page read and write
2F70000
trusted library allocation
page execute and read and write
11EE000
heap
page read and write
47A1000
heap
page read and write
210E9000
heap
page read and write
3122000
heap
page read and write
3144000
heap
page read and write
BF0000
heap
page read and write
26B0000
direct allocation
page read and write
2BF0000
trusted library allocation
page read and write
210E7000
heap
page read and write
3EEC000
trusted library allocation
page read and write
4BE1000
heap
page read and write
880000
heap
page read and write
4BE1000
heap
page read and write
1527000
heap
page read and write
DCB000
trusted library allocation
page execute and read and write
334F000
trusted library allocation
page read and write
1AF10000
heap
page read and write
3DD7000
trusted library allocation
page read and write
6A6000
unkown
page readonly
4BA0000
direct allocation
page execute and read and write
3130000
heap
page execute and read and write
69D0000
trusted library allocation
page read and write
1588000
heap
page read and write
931E000
heap
page read and write
8360000
heap
page read and write
4A1D000
stack
page read and write
4C60000
trusted library allocation
page read and write
4BE1000
heap
page read and write
4790000
direct allocation
page read and write
47A1000
heap
page read and write
4B00000
direct allocation
page execute and read and write
532E000
stack
page read and write
FCD000
unkown
page read and write
74E4000
heap
page read and write
401B000
trusted library allocation
page read and write
4BE1000
heap
page read and write
508000
stack
page read and write
2B72000
trusted library allocation
page execute and read and write
B58000
heap
page read and write
934C000
heap
page read and write
6A6FF000
unkown
page write copy
3300000
trusted library allocation
page read and write
3FE3000
trusted library allocation
page read and write
69B11000
unkown
page execute read
2FFE000
stack
page read and write
5370000
heap
page read and write
399F000
trusted library allocation
page read and write
2110A000
heap
page read and write
E28000
heap
page read and write
1AD6F000
stack
page read and write
279000
unkown
page write copy
2CE0000
heap
page read and write
5CF0000
heap
page read and write
86F000
heap
page read and write
9E7000
unkown
page readonly
E00000
heap
page read and write
19B000
stack
page read and write
39AD000
stack
page read and write
4C4000
remote allocation
page execute and read and write
7005000
trusted library allocation
page read and write
309C000
stack
page read and write
133A000
trusted library allocation
page execute and read and write
800000
heap
page read and write
6980000
trusted library allocation
page execute and read and write
292E000
trusted library allocation
page read and write
2504000
heap
page read and write
B77000
heap
page read and write
323E000
stack
page read and write
6516000
heap
page read and write
31DE000
trusted library allocation
page read and write
6570000
heap
page read and write
2EFE000
stack
page read and write
672000
unkown
page write copy
793A000
trusted library allocation
page read and write
CAE000
stack
page read and write
332C000
trusted library allocation
page read and write
69B3B000
unkown
page read and write
74F9000
heap
page read and write
1304000
heap
page read and write
2DC5000
trusted library allocation
page read and write
14E0000
heap
page read and write
2A2D000
trusted library allocation
page read and write
289000
unkown
page readonly
6900000
trusted library allocation
page execute and read and write
138E000
stack
page read and write
4048000
trusted library allocation
page read and write
311C000
trusted library allocation
page read and write
3A83000
trusted library allocation
page read and write
680E000
stack
page read and write
41BF000
stack
page read and write
4BE1000
heap
page read and write
96C000
stack
page read and write
21102000
heap
page read and write
7A82000
trusted library allocation
page read and write
D50000
heap
page read and write
25DA000
trusted library allocation
page read and write
47A1000
heap
page read and write
C60000
trusted library allocation
page read and write
3266000
heap
page read and write
180000
unkown
page readonly
4009000
trusted library allocation
page read and write
274E000
stack
page read and write
483F000
stack
page read and write
55CD000
stack
page read and write
102B000
heap
page read and write
210F7000
heap
page read and write
30DF000
stack
page read and write
5D18000
heap
page read and write
B91000
unkown
page execute and read and write
5F15000
heap
page read and write
3E9E000
stack
page read and write
3EAF000
trusted library allocation
page read and write
7A30000
heap
page read and write
8B1E000
stack
page read and write
2810000
heap
page execute and read and write
B25000
heap
page read and write
4BE0000
trusted library allocation
page read and write
3DE3000
trusted library allocation
page read and write
3DEA000
trusted library allocation
page read and write
411A000
trusted library allocation
page read and write
44E000
remote allocation
page execute and read and write
3EE3000
trusted library allocation
page read and write
F4B000
heap
page read and write
1190000
heap
page read and write
2B60000
heap
page execute and read and write
8881000
heap
page read and write
4BE1000
heap
page read and write
6F24000
trusted library allocation
page read and write
3E5A000
trusted library allocation
page read and write
4BE1000
heap
page read and write
9F5F000
stack
page read and write
32ED000
trusted library allocation
page read and write
118F000
heap
page read and write
2620000
direct allocation
page read and write
3254000
trusted library allocation
page read and write
2660000
heap
page read and write
3144000
heap
page read and write
2BE7000
trusted library allocation
page read and write
3340000
trusted library allocation
page read and write
DF5000
heap
page read and write
4BE1000
heap
page read and write
5A70000
heap
page read and write
1CD000
unkown
page readonly
31DE000
heap
page read and write
40AF000
trusted library allocation
page read and write
519000
unkown
page execute and read and write
660000
unkown
page readonly
6D8C000
stack
page read and write
2C14000
trusted library allocation
page read and write
5490000
trusted library allocation
page read and write
742000
heap
page read and write
EAE000
stack
page read and write
3FA1000
heap
page read and write
B61000
heap
page read and write
ED0000
unkown
page readonly
13ED000
heap
page read and write
272000
unkown
page execute and read and write
4B80000
direct allocation
page execute and read and write
94D000
heap
page read and write
31FF000
trusted library allocation
page read and write
429E000
stack
page read and write
80D000
heap
page read and write
4BE1000
heap
page read and write
26AE000
stack
page read and write
29D9000
trusted library allocation
page read and write
5370000
heap
page read and write
317C000
stack
page read and write
D2DC000
heap
page read and write
3AB3000
trusted library allocation
page read and write
6F13000
trusted library allocation
page read and write
6AC0000
trusted library allocation
page execute and read and write
325B000
heap
page read and write
342F000
stack
page read and write
2110C000
heap
page read and write
408000
unkown
page readonly
962D000
stack
page read and write
1819000
heap
page read and write
77F3000
heap
page read and write
4BE1000
heap
page read and write
2F20000
direct allocation
page read and write
2F20000
direct allocation
page read and write
2C61000
trusted library allocation
page read and write
6698000
trusted library allocation
page read and write
1750000
trusted library allocation
page read and write
61EB4000
direct allocation
page read and write
785E000
stack
page read and write
4BE1000
heap
page read and write
5BEE000
stack
page read and write
71EC000
stack
page read and write
6BBF000
stack
page read and write
210F3000
heap
page read and write
9A0000
heap
page read and write
211000
unkown
page execute and write copy
3BAF000
stack
page read and write
2840000
trusted library allocation
page read and write
F35000
unkown
page readonly
3336000
trusted library allocation
page read and write
272000
unkown
page execute and read and write
932B000
heap
page read and write
61ED3000
direct allocation
page read and write
30C5000
trusted library allocation
page read and write
2C1B000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
1413000
heap
page read and write
4BE1000
heap
page read and write
3241000
heap
page read and write
3315000
trusted library allocation
page read and write
13AE000
stack
page read and write
2E48000
trusted library allocation
page read and write
854000
heap
page read and write
3FA1000
heap
page read and write
2C30000
trusted library allocation
page execute and read and write
2D18000
trusted library allocation
page read and write
321F000
stack
page read and write
47A1000
heap
page read and write
9338000
heap
page read and write
47A1000
heap
page read and write
338D000
trusted library allocation
page read and write
849B000
stack
page read and write
4C00000
direct allocation
page execute and read and write
317F000
stack
page read and write
2C85000
trusted library allocation
page read and write
3122000
heap
page read and write
5FAF000
stack
page read and write
3F5D000
trusted library allocation
page read and write
1500000
heap
page read and write
4DF0000
direct allocation
page execute and read and write
64EA000
trusted library allocation
page read and write
2D34000
trusted library allocation
page read and write
518F000
stack
page read and write
2DF1000
trusted library allocation
page read and write
50BE000
trusted library allocation
page read and write
2DE6000
trusted library allocation
page read and write
9F9000
heap
page read and write
2FBE000
stack
page read and write
7945000
trusted library allocation
page read and write
6927000
trusted library allocation
page read and write
4B90000
direct allocation
page execute and read and write
94E000
heap
page read and write
5143000
heap
page execute and read and write
28CC000
trusted library allocation
page read and write
2D30F000
stack
page read and write
47A1000
heap
page read and write
6F20000
trusted library allocation
page read and write
92A000
heap
page read and write
2FDF000
trusted library allocation
page read and write
210E7000
heap
page read and write
3273000
heap
page read and write
85D000
heap
page read and write
25CE000
stack
page read and write
300E000
trusted library allocation
page read and write
4F80000
heap
page read and write
17AF000
stack
page read and write
3F5F000
trusted library allocation
page read and write
6588000
heap
page read and write
4790000
direct allocation
page read and write
54AE000
stack
page read and write
98C000
stack
page read and write
A63000
trusted library allocation
page execute and read and write
858000
heap
page read and write
2E37000
trusted library allocation
page read and write
F1E000
stack
page read and write
13D2000
heap
page read and write
64F0000
trusted library allocation
page read and write
7EBE000
stack
page read and write
7B0000
heap
page read and write
31AF000
stack
page read and write
C7F000
stack
page read and write
8FF000
stack
page read and write
4DD1000
trusted library allocation
page read and write
33FF000
stack
page read and write
E90000
unkown
page readonly
150B000
trusted library allocation
page execute and read and write
2D310000
trusted library allocation
page read and write
3F9B000
trusted library allocation
page read and write
888A000
heap
page read and write
326A000
heap
page read and write
210E7000
heap
page read and write
443F000
stack
page read and write
210E5000
heap
page read and write
C84000
heap
page read and write
4BE1000
heap
page read and write
392F000
stack
page read and write
D20000
heap
page read and write
140E000
stack
page read and write
33B6000
trusted library allocation
page read and write
15C8000
heap
page read and write
78F9000
trusted library allocation
page read and write
39EB000
trusted library allocation
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
497E000
stack
page read and write
25BE000
stack
page read and write
F32000
unkown
page write copy
31ED000
trusted library allocation
page read and write
7FDF0000
trusted library allocation
page execute and read and write
3317000
trusted library allocation
page read and write
6A1B000
trusted library allocation
page read and write
66E000
stack
page read and write
4077000
trusted library allocation
page read and write
287D000
trusted library allocation
page read and write
210DE000
heap
page read and write
69E0000
trusted library allocation
page read and write
403C000
trusted library allocation
page read and write
408000
unkown
page readonly
2955000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
177D000
trusted library allocation
page execute and read and write
90B000
heap
page read and write
3F26000
trusted library allocation
page read and write
8EE000
stack
page read and write
A73000
trusted library allocation
page read and write
15DD000
heap
page read and write
2AA0000
heap
page read and write
3980000
trusted library allocation
page read and write
1AD4D000
stack
page read and write
279000
unkown
page write copy
DD0000
heap
page read and write
433000
unkown
page read and write
1D0000
unkown
page write copy
2C40000
trusted library allocation
page read and write
3980000
trusted library allocation
page read and write
2C30000
heap
page read and write
5AA7000
heap
page read and write
7803000
heap
page read and write
2620000
direct allocation
page read and write
701F000
trusted library allocation
page read and write
C9E000
stack
page read and write
F6A000
heap
page read and write
B81000
heap
page read and write
27D7000
trusted library allocation
page read and write
3108000
heap
page read and write
14E4000
heap
page read and write
8A6A000
trusted library allocation
page read and write
F3D000
trusted library allocation
page execute and read and write
4141000
trusted library allocation
page read and write
4BE1000
heap
page read and write
7938000
trusted library allocation
page read and write
31BF000
stack
page read and write
6A6000
unkown
page readonly
6A6D000
stack
page read and write
30AF000
stack
page read and write
210D2000
heap
page read and write
326F000
heap
page read and write
8A7A000
trusted library allocation
page read and write
4BE1000
heap
page read and write
7A0E000
stack
page read and write
2F47000
trusted library allocation
page read and write
210E7000
heap
page read and write
210F5000
heap
page read and write
2590000
heap
page read and write
330E000
trusted library allocation
page read and write
4C80000
trusted library allocation
page read and write
555E000
stack
page read and write
284E000
trusted library allocation
page read and write
4ABE000
stack
page read and write
1883000
heap
page read and write
1971000
heap
page read and write
311E000
heap
page read and write
B99000
unkown
page read and write
807E000
stack
page read and write
410000
unkown
page execute and read and write
2551000
remote allocation
page execute read
2B1E000
stack
page read and write
47A1000
heap
page read and write
2B3C000
trusted library allocation
page read and write
3E04000
trusted library allocation
page read and write
7A50000
trusted library allocation
page execute and read and write
4AD0000
direct allocation
page execute and read and write
3B05000
heap
page read and write
97E000
stack
page read and write
139A000
heap
page read and write
3A23000
trusted library allocation
page read and write
458000
unkown
page readonly
4029000
trusted library allocation
page read and write
7A10000
trusted library allocation
page read and write
5201000
trusted library allocation
page read and write
26B0000
direct allocation
page read and write
8C00000
trusted library allocation
page read and write
88C8000
heap
page read and write
578D000
trusted library allocation
page read and write
400000
unkown
page readonly
2FAB000
stack
page read and write
5F92000
heap
page read and write
21189000
heap
page read and write
675000
unkown
page read and write
3244000
heap
page read and write
1450000
heap
page read and write
6D7C000
stack
page read and write
1290000
heap
page read and write
8153000
heap
page read and write
491E000
stack
page read and write
D0F000
unkown
page readonly
7F50000
heap
page read and write
8A52000
trusted library allocation
page read and write
F80000
heap
page read and write
29F8000
trusted library allocation
page read and write
3F83000
trusted library allocation
page read and write
25CE000
stack
page read and write
2561000
trusted library allocation
page read and write
210E7000
heap
page read and write
47C0000
heap
page read and write
7910000
trusted library allocation
page execute and read and write
3351000
trusted library allocation
page read and write
5A84000
heap
page read and write
210FE000
heap
page read and write
15B0000
heap
page read and write
1340000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
4B80000
direct allocation
page execute and read and write
3F4B000
trusted library allocation
page read and write
4BE1000
heap
page read and write
7A0000
heap
page read and write
333A000
trusted library allocation
page read and write
403C000
trusted library allocation
page read and write
4920000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
3308000
trusted library allocation
page read and write
51BF000
stack
page read and write
1E0000
unkown
page readonly
2D24000
trusted library allocation
page read and write
79CE000
stack
page read and write
76E9000
heap
page read and write
86DF000
stack
page read and write
600000
heap
page read and write
326E000
trusted library allocation
page read and write
211C7000
heap
page read and write
AFC000
stack
page read and write
49F000
remote allocation
page execute and read and write
2FBC000
trusted library allocation
page read and write
12F9000
stack
page read and write
21113000
heap
page read and write
7731000
heap
page read and write
3339000
trusted library allocation
page read and write
674000
unkown
page write copy
3F99000
trusted library allocation
page read and write
3E3C000
trusted library allocation
page read and write
57CD000
stack
page read and write
401000
unkown
page execute read
624E000
stack
page read and write
8BA7000
trusted library allocation
page read and write
47A1000
heap
page read and write
5EE0000
heap
page read and write
47A1000
heap
page read and write
1A98F000
stack
page read and write
82C000
heap
page read and write
639F000
stack
page read and write
2DFD000
trusted library allocation
page read and write
27B000
unkown
page execute and read and write
642C000
stack
page read and write
D42000
unkown
page read and write
A9F000
stack
page read and write
57F0000
trusted library allocation
page read and write
48D000
unkown
page write copy
865000
heap
page read and write
5D2B000
heap
page read and write
6A705000
unkown
page readonly
F81000
heap
page read and write
40B6000
trusted library allocation
page read and write
371F000
stack
page read and write
210E7000
heap
page read and write
E46000
heap
page read and write
3271000
trusted library allocation
page read and write
3428D000
heap
page read and write
258F000
stack
page read and write
1F0000
remote allocation
page read and write
337E000
stack
page read and write
3238000
heap
page read and write
2F20000
direct allocation
page read and write
514E000
stack
page read and write
2620000
direct allocation
page read and write
6620000
trusted library allocation
page read and write
940000
heap
page read and write
BE0000
heap
page read and write
408E000
trusted library allocation
page read and write
32D6000
trusted library allocation
page read and write
FFF000
stack
page read and write
4BE1000
heap
page read and write
1613000
heap
page read and write
63DD000
stack
page read and write
2500000
heap
page read and write
64F9000
trusted library allocation
page read and write
871000
unkown
page execute and write copy
3D7E000
stack
page read and write
49E1000
direct allocation
page read and write
2CA1000
trusted library allocation
page read and write
2836000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
3230000
heap
page read and write
3C0F000
stack
page read and write
2690000
heap
page read and write
5D28000
heap
page read and write
7F40000
heap
page read and write
2B34000
trusted library allocation
page read and write
4FAE000
stack
page read and write
5070000
direct allocation
page read and write
520D000
trusted library allocation
page read and write
3015000
trusted library allocation
page read and write
75DE000
stack
page read and write
282000
unkown
page write copy
13A0000
heap
page read and write
7F070000
trusted library allocation
page execute and read and write
9FE000
stack
page read and write
27B000
unkown
page execute and read and write
28C9000
trusted library allocation
page read and write
7E0000
heap
page read and write
3FBF000
stack
page read and write
669A000
trusted library allocation
page read and write
4BE1000
heap
page read and write
92F0000
heap
page read and write
4C85000
trusted library allocation
page read and write
4039000
trusted library allocation
page read and write
210F5000
heap
page read and write
998000
stack
page read and write
1AB2E000
stack
page read and write
6430000
trusted library allocation
page read and write
3E50000
trusted library allocation
page read and write
D850000
heap
page read and write
D70000
remote allocation
page read and write
1913000
heap
page read and write
68E000
stack
page read and write
47A1000
heap
page read and write
E1E000
heap
page read and write
74D1000
heap
page read and write
B92000
unkown
page execute and write copy
50C5000
trusted library allocation
page read and write
210EB000
heap
page read and write
772D000
heap
page read and write
4BE1000
heap
page read and write
99CE000
stack
page read and write
5FDA000
heap
page read and write
314C000
heap
page read and write
C9F000
unkown
page read and write
4CCF000
stack
page read and write
6A6FE000
unkown
page read and write
679E000
stack
page read and write
50A4000
trusted library allocation
page read and write
2CFB000
trusted library allocation
page read and write
F81000
heap
page read and write
465E000
stack
page read and write
47A1000
heap
page read and write
3C4E000
stack
page read and write
3F63000
trusted library allocation
page read and write
2FEE000
stack
page read and write
51A000
stack
page read and write
B2A000
heap
page read and write
2FC4000
trusted library allocation
page read and write
26B0000
direct allocation
page read and write
87FE000
stack
page read and write
3AFD000
stack
page read and write
210D0000
heap
page read and write
DDF000
stack
page read and write
210F5000
heap
page read and write
8F3E000
stack
page read and write
3C3E000
stack
page read and write
1863000
heap
page read and write
407000
remote allocation
page execute and read and write
4790000
direct allocation
page read and write
7AE000
heap
page read and write
6A80000
trusted library allocation
page execute and read and write
1AE9D000
stack
page read and write
43DE000
stack
page read and write
210F5000
heap
page read and write
13A0000
heap
page read and write
2C90000
heap
page read and write
8902000
heap
page read and write
30BF000
stack
page read and write
531000
unkown
page execute and read and write
732D000
stack
page read and write
6D7000
unkown
page execute and write copy
DC8000
heap
page read and write
58A0000
trusted library allocation
page read and write
1540000
heap
page read and write
47A1000
heap
page read and write
220000
unkown
page readonly
2821000
trusted library allocation
page read and write
4BE1000
heap
page read and write
68CC000
stack
page read and write
805000
heap
page read and write
4032000
trusted library allocation
page read and write
6950000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
F33000
trusted library allocation
page execute and read and write
412000
unkown
page readonly
4258000
trusted library allocation
page read and write
88AD000
heap
page read and write
432F000
stack
page read and write
36BD000
stack
page read and write
1395000
heap
page read and write
210ED000
heap
page read and write
6ABE000
stack
page read and write
272000
unkown
page execute and read and write
536E000
stack
page read and write
2C80000
trusted library allocation
page read and write
4089000
trusted library allocation
page read and write
CA5000
unkown
page read and write
4C30000
direct allocation
page read and write
F7D000
heap
page read and write
2C36000
trusted library allocation
page read and write
3E32000
trusted library allocation
page read and write
6DC0000
heap
page read and write
C20000
heap
page read and write
2360000
heap
page read and write
8A59000
trusted library allocation
page read and write
11DD000
heap
page read and write
44E000
remote allocation
page execute and read and write
21113000
heap
page read and write
4E2E000
trusted library allocation
page read and write
32F8000
trusted library allocation
page read and write
4C1C000
stack
page read and write
3E92000
trusted library allocation
page read and write
B77000
heap
page read and write
5D0F000
heap
page read and write
6A55000
trusted library allocation
page read and write
33E0000
heap
page read and write
5D26000
heap
page read and write
CBA000
trusted library allocation
page execute and read and write
924000
trusted library allocation
page read and write
1406000
heap
page read and write
3DA1000
trusted library allocation
page read and write
21102000
heap
page read and write
11C5000
heap
page read and write
4010000
trusted library allocation
page read and write
94A000
heap
page read and write
4041000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
963000
heap
page read and write
178A000
trusted library allocation
page execute and read and write
547F000
stack
page read and write
9ACE000
stack
page read and write
843E000
stack
page read and write
7DF000
unkown
page read and write
413E000
stack
page read and write
4092000
trusted library allocation
page read and write
21102000
heap
page read and write
400000
unkown
page readonly
2B30000
trusted library allocation
page read and write
47A1000
heap
page read and write
61ECC000
direct allocation
page read and write
2428000
heap
page read and write
4DB4000
trusted library allocation
page read and write
64F7000
trusted library allocation
page read and write
4C30000
direct allocation
page read and write
2C20000
heap
page execute and read and write
5CF5000
heap
page read and write
D3F000
stack
page read and write
4108000
trusted library allocation
page read and write
4E9000
unkown
page execute and read and write
338B000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page execute and read and write
A22000
heap
page read and write
327C000
trusted library allocation
page read and write
3FA1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
1420000
heap
page read and write
4BE1000
heap
page read and write
297E000
stack
page read and write
210F3000
heap
page read and write
57EE000
stack
page read and write
74C0000
heap
page read and write
303D000
trusted library allocation
page read and write
410000
unkown
page readonly
3EB2000
trusted library allocation
page read and write
74BD000
stack
page read and write
910000
heap
page read and write
210E5000
heap
page read and write
E25000
trusted library allocation
page execute and read and write
A40000
heap
page read and write
6F00000
trusted library allocation
page execute and read and write
9398000
heap
page read and write
3365000
trusted library allocation
page read and write
6560000
trusted library allocation
page read and write
4B5D000
stack
page read and write
E97000
heap
page read and write
46BF000
stack
page read and write
F3A000
unkown
page read and write
6A32000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
3C1D000
trusted library allocation
page read and write
3FA1000
heap
page read and write
702A000
trusted library allocation
page read and write
4BE1000
heap
page read and write
6AE0000
trusted library allocation
page execute and read and write
3357000
trusted library allocation
page read and write
305C000
trusted library allocation
page read and write
3A6F000
stack
page read and write
210E8000
heap
page read and write
29E7000
trusted library allocation
page read and write
4BE1000
heap
page read and write
3892000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
4BE1000
heap
page read and write
1170000
heap
page read and write
33D0000
heap
page read and write
6A520000
unkown
page readonly
2FA0000
heap
page read and write
3B71000
trusted library allocation
page read and write
6970000
heap
page read and write
3E3E000
stack
page read and write
7A8000
unkown
page read and write
27160000
heap
page read and write
4BE1000
heap
page read and write
C86000
heap
page read and write
361E000
stack
page read and write
3A0000
heap
page read and write
3FA1000
heap
page read and write
4BE1000
heap
page read and write
1190000
heap
page read and write
D80000
trusted library allocation
page read and write
3FA1000
heap
page read and write
281E000
stack
page read and write
2820000
trusted library allocation
page read and write
400000
unkown
page readonly
C70000
heap
page read and write
313A000
heap
page read and write
1285000
heap
page read and write
2620000
direct allocation
page read and write
E8C000
heap
page read and write
A8F000
stack
page read and write
531000
unkown
page execute and read and write
A75000
heap
page read and write
2F45000
trusted library allocation
page read and write
9B0000
heap
page read and write
1322000
trusted library allocation
page read and write
4BE1000
heap
page read and write
20F81000
heap
page read and write
45B1000
heap
page read and write
327C000
heap
page read and write
2DF8000
trusted library allocation
page read and write
291F000
stack
page read and write
3122000
heap
page read and write
A8A000
trusted library allocation
page execute and read and write
15AD000
trusted library allocation
page read and write
6A30000
trusted library allocation
page read and write
383F000
stack
page read and write
69B10000
unkown
page readonly
4BE1000
heap
page read and write
26A3000
trusted library allocation
page read and write
2330000
heap
page read and write
3AA2000
trusted library allocation
page read and write
2D05000
heap
page read and write
40B000
unkown
page write copy
3FA1000
heap
page read and write
3FAE000
stack
page read and write
132B000
trusted library allocation
page execute and read and write
6F50000
heap
page read and write
47A1000
heap
page read and write
6B30000
trusted library allocation
page execute and read and write
3E7A000
trusted library allocation
page read and write
411F000
stack
page read and write
69A71000
unkown
page execute read
69AF000
stack
page read and write
38E3000
trusted library allocation
page read and write
285000
unkown
page read and write
4137000
trusted library allocation
page read and write
2CAF000
stack
page read and write
48F000
unkown
page read and write
16AB000
heap
page read and write
4D90000
direct allocation
page execute and read and write
DD0000
heap
page read and write
F40000
heap
page read and write
B7F000
heap
page read and write
DB0000
heap
page read and write
2D9E000
stack
page read and write
9F6000
unkown
page readonly
41DE000
trusted library allocation
page read and write
2D05000
trusted library allocation
page read and write
3DC2000
trusted library allocation
page read and write
4DC0000
heap
page read and write
C80000
trusted library allocation
page read and write
5A7000
remote allocation
page execute and read and write
333E000
trusted library allocation
page read and write
651B000
trusted library allocation
page read and write
2FF4000
trusted library allocation
page read and write
173F000
stack
page read and write
40FF000
stack
page read and write
100000
heap
page read and write
672F000
stack
page read and write
7360000
trusted library allocation
page execute and read and write
5B15000
heap
page read and write
47A1000
heap
page read and write
4E9B000
stack
page read and write
4F1000
remote allocation
page execute and read and write
3358000
trusted library allocation
page read and write
410F000
trusted library allocation
page read and write
47A1000
heap
page read and write
4BE1000
heap
page read and write
13FD000
stack
page read and write
4C90000
trusted library allocation
page read and write
322B000
heap
page read and write
793F000
trusted library allocation
page read and write
314C000
heap
page read and write
B49000
unkown
page execute and read and write
5F4E000
stack
page read and write
846000
heap
page read and write
2680000
trusted library allocation
page read and write
CC7000
trusted library allocation
page execute and read and write
3AC9000
trusted library allocation
page read and write
21113000
heap
page read and write
4F85000
heap
page read and write
107C000
stack
page read and write
894C000
stack
page read and write
1AACF000
stack
page read and write
3FD6000
trusted library allocation
page read and write
4DDD000
trusted library allocation
page read and write
13F5000
heap
page read and write
210E7000
heap
page read and write
69EE000
stack
page read and write
FD0000
unkown
page read and write
1B010000
trusted library allocation
page read and write
A40000
heap
page read and write
B75000
heap
page read and write
910000
trusted library allocation
page read and write
5150000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
6BE0000
trusted library allocation
page read and write
B90000
heap
page read and write
33E7000
heap
page read and write
3FA1000
heap
page read and write
7723000
heap
page read and write
51FE000
trusted library allocation
page read and write
9A0000
heap
page read and write
F0C000
unkown
page read and write
4BA0000
direct allocation
page execute and read and write
520000
heap
page read and write
6260000
trusted library allocation
page read and write
C84000
heap
page read and write
21114000
heap
page read and write
14E4000
heap
page read and write
6D0000
heap
page read and write
14E4000
heap
page read and write
51D0000
direct allocation
page execute and read and write
5360000
heap
page read and write
908000
heap
page read and write
3980000
trusted library allocation
page read and write
3252000
heap
page read and write
6D7000
unkown
page execute and write copy
27EF000
stack
page read and write
210E7000
heap
page read and write
31FF000
stack
page read and write
1815000
heap
page read and write
3EAC000
heap
page read and write
D5B0000
heap
page read and write
220000
unkown
page readonly
A82000
trusted library allocation
page read and write
36AE000
stack
page read and write
4BE1000
heap
page read and write
210F9000
heap
page read and write
3EA6000
trusted library allocation
page read and write
FC1000
unkown
page read and write
6939F000
unkown
page readonly
6A59000
trusted library allocation
page read and write
210F5000
heap
page read and write
C84000
heap
page read and write
375E000
stack
page read and write
88F4000
heap
page read and write
2FA3000
trusted library allocation
page read and write
2860000
heap
page execute and read and write
D59000
stack
page read and write
303E000
stack
page read and write
4D1000
remote allocation
page execute and read and write
52B0000
direct allocation
page execute and read and write
14B0000
heap
page read and write
B79000
unkown
page execute and read and write
667000
unkown
page write copy
C80000
heap
page read and write
3249000
trusted library allocation
page read and write
C76000
trusted library allocation
page execute and read and write
E6E000
stack
page read and write
39E4000
heap
page read and write
2C51000
trusted library allocation
page read and write
47A1000
heap
page read and write
11D6000
heap
page read and write
47A1000
heap
page read and write
7904000
trusted library allocation
page read and write
6C8D000
stack
page read and write
3F93000
trusted library allocation
page read and write
AD0000
heap
page read and write
4078000
trusted library allocation
page read and write
B5E000
stack
page read and write
620000
heap
page read and write
2F8B000
trusted library allocation
page read and write
6C4C000
stack
page read and write
680000
unkown
page readonly
3980000
trusted library allocation
page read and write
4BE1000
heap
page read and write
3ADF000
stack
page read and write
9AE0000
heap
page read and write
64E0000
trusted library allocation
page read and write
76DE000
stack
page read and write
1400000
heap
page read and write
2DEF000
stack
page read and write
292E000
stack
page read and write
465E000
stack
page read and write
3020000
trusted library allocation
page read and write
3FF0000
trusted library allocation
page read and write
F32000
unkown
page read and write
68AE000
stack
page read and write
1370000
heap
page read and write
4FB000
stack
page read and write
326A000
heap
page read and write
5152000
trusted library allocation
page read and write
2F20000
direct allocation
page read and write
4BE1000
heap
page read and write
3DE8000
trusted library allocation
page read and write
31BE000
stack
page read and write
47A1000
heap
page read and write
2E02000
trusted library allocation
page read and write
AFC000
stack
page read and write
41EF000
stack
page read and write
3E22000
trusted library allocation
page read and write
32F3000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
9FE000
stack
page read and write
41EC000
stack
page read and write
13A5000
heap
page read and write
81D0000
trusted library allocation
page read and write
11DD000
heap
page read and write
2F53000
trusted library allocation
page read and write
E2E000
heap
page read and write
CFD000
stack
page read and write
D0F000
unkown
page readonly
6B0000
unkown
page read and write
E75000
heap
page read and write
3EA0000
heap
page read and write
3E5C000
trusted library allocation
page read and write
629E000
stack
page read and write
21103000
heap
page read and write
85D000
heap
page read and write
2573000
heap
page read and write
3A6A000
trusted library allocation
page read and write
990000
trusted library allocation
page read and write
5764000
trusted library allocation
page read and write
4B00000
direct allocation
page execute and read and write
356F000
stack
page read and write
2EB2000
trusted library allocation
page read and write
4A6E000
stack
page read and write
E20000
heap
page read and write
4B20000
direct allocation
page execute and read and write
339E000
stack
page read and write
26D0000
direct allocation
page read and write
210D7000
heap
page read and write
3F8C000
trusted library allocation
page read and write
210000
unkown
page readonly
337F000
trusted library allocation
page read and write
3FAE000
stack
page read and write
41F1000
trusted library allocation
page read and write
C84000
heap
page read and write
210E3000
heap
page read and write
2E3C000
stack
page read and write
2B48000
trusted library allocation
page read and write
311E000
heap
page read and write
1700000
heap
page read and write
923000
trusted library allocation
page execute and read and write
577E000
trusted library allocation
page read and write
210C9000
heap
page read and write
397E000
direct allocation
page read and write
12C0000
heap
page read and write
387E000
stack
page read and write
88D0000
trusted library allocation
page read and write
401000
unkown
page execute read
146E000
stack
page read and write
52DC000
stack
page read and write
69D5000
heap
page read and write
80E000
stack
page read and write
282000
unkown
page read and write
5292000
trusted library allocation
page read and write
9B000
stack
page read and write
4BE1000
heap
page read and write
8910000
trusted library allocation
page read and write
CFC000
heap
page read and write
541F000
stack
page read and write
11BE000
stack
page read and write
47A1000
heap
page read and write
771D000
heap
page read and write
881E000
stack
page read and write
64D2000
trusted library allocation
page read and write
29F6000
trusted library allocation
page read and write
30EE000
stack
page read and write
493000
remote allocation
page execute and read and write
3AAE000
stack
page read and write
210FA000
heap
page read and write
4C40000
direct allocation
page execute and read and write
8100000
heap
page read and write
3CDC000
trusted library allocation
page read and write
F30000
trusted library allocation
page read and write
210F5000
heap
page read and write
5230000
direct allocation
page execute and read and write
768C000
stack
page read and write
2D0C000
trusted library allocation
page read and write
191F000
heap
page read and write
357E000
stack
page read and write
4F5F000
trusted library section
page readonly
5C40000
heap
page read and write
3CBF000
stack
page read and write
3E83000
trusted library allocation
page read and write
326F000
heap
page read and write
313A000
heap
page read and write
9368000
heap
page read and write
6A50000
trusted library allocation
page read and write
283F000
stack
page read and write
990000
heap
page read and write
7480000
trusted library allocation
page execute and read and write
E63000
heap
page read and write
9E2000
unkown
page readonly
6960000
heap
page execute and read and write
6A5ED000
unkown
page readonly
61ED0000
direct allocation
page read and write
3346000
trusted library allocation
page read and write
3ADC000
trusted library allocation
page read and write
6980000
trusted library allocation
page execute and read and write
3C9B000
trusted library allocation
page read and write
64AC000
stack
page read and write
8F7E000
stack
page read and write
4045000
trusted library allocation
page read and write
27CC000
stack
page read and write
4040000
heap
page read and write
2ABE000
stack
page read and write
A80000
trusted library allocation
page read and write
B20000
heap
page read and write
336E000
stack
page read and write
4BE1000
heap
page read and write
C5F000
stack
page read and write
3E6E000
trusted library allocation
page read and write
F88000
heap
page read and write
3980000
trusted library allocation
page read and write
88E4000
heap
page read and write
7F0000
heap
page read and write
210E7000
heap
page read and write
3F95000
trusted library allocation
page read and write
1345000
trusted library allocation
page execute and read and write
6C30000
trusted library allocation
page execute and read and write
33C1000
trusted library allocation
page read and write
5200000
direct allocation
page execute and read and write
A25000
heap
page read and write
47A1000
heap
page read and write
2420000
heap
page read and write
9C0000
heap
page read and write
3B7D000
trusted library allocation
page read and write
33D80000
heap
page read and write
210E7000
heap
page read and write
3E76000
trusted library allocation
page read and write
652F000
heap
page read and write
32A7000
trusted library allocation
page read and write
57BF000
trusted library allocation
page read and write
47A1000
heap
page read and write
4BE1000
heap
page read and write
2610000
heap
page read and write
51E0000
direct allocation
page execute and read and write
210CB000
heap
page read and write
4BE1000
heap
page read and write
16C0000
heap
page read and write
5F0000
unkown
page readonly
8857000
heap
page read and write
897F000
stack
page read and write
21105000
heap
page read and write
2AAE000
trusted library allocation
page read and write
26B0000
direct allocation
page read and write
4760000
heap
page read and write
886C000
heap
page read and write
CA6000
trusted library allocation
page read and write
4BE1000
heap
page read and write
3FA1000
heap
page read and write
47A1000
heap
page read and write
61ECC000
direct allocation
page read and write
5220000
direct allocation
page execute and read and write
735000
heap
page read and write
13D4000
heap
page read and write
27F6000
trusted library allocation
page read and write
4DC0000
direct allocation
page execute and read and write
D72A000
heap
page read and write
14E4000
heap
page read and write
41AF000
stack
page read and write
3B10000
trusted library allocation
page read and write
7E5000
heap
page read and write
7C0000
heap
page read and write
64DE000
trusted library allocation
page read and write
14D4000
trusted library allocation
page read and write
31F2000
trusted library allocation
page execute and read and write
DCC000
heap
page read and write
3EFC000
trusted library allocation
page read and write
1077000
unkown
page read and write
14AE000
stack
page read and write
B54000
heap
page read and write
6F66000
trusted library allocation
page read and write
70E000
heap
page read and write
130D000
trusted library allocation
page execute and read and write
3A29000
trusted library allocation
page read and write
32D4000
trusted library allocation
page read and write
3374000
trusted library allocation
page read and write
11F2000
heap
page read and write
11C8000
heap
page read and write
47A1000
heap
page read and write
69AE000
trusted library allocation
page read and write
210E5000
heap
page read and write
3A67000
trusted library allocation
page read and write
C80000
heap
page read and write
278E000
stack
page read and write
210E7000
heap
page read and write
A60000
trusted library allocation
page read and write
35AE000
stack
page read and write
5AD0000
heap
page read and write
4F00000
heap
page execute and read and write
3282000
heap
page read and write
3E8F000
stack
page read and write
3A5000
heap
page read and write
27D0000
trusted library allocation
page read and write
3FA1000
heap
page read and write
53F8000
trusted library allocation
page read and write
17C1000
heap
page read and write
210D3000
heap
page read and write
47A1000
heap
page read and write
5DF0000
heap
page read and write
336C000
trusted library allocation
page read and write
2F7F000
trusted library allocation
page read and write
5200000
direct allocation
page execute and read and write
8908000
trusted library allocation
page read and write
8F0000
heap
page read and write
210D6000
heap
page read and write
1402000
heap
page read and write
3117000
trusted library allocation
page read and write
13E9000
heap
page read and write
4790000
direct allocation
page read and write
3EB0000
heap
page read and write
401000
unkown
page execute read
4BE1000
heap
page read and write
4B50000
direct allocation
page execute and read and write
7759000
heap
page read and write
26A0000
direct allocation
page read and write
6450000
trusted library allocation
page execute and read and write
B49000
heap
page read and write
1500000
trusted library allocation
page read and write
2F86000
trusted library allocation
page read and write
58CD000
stack
page read and write
1E0000
unkown
page readonly
301C000
stack
page read and write
27140000
heap
page read and write
88B0000
trusted library allocation
page read and write
41C000
remote allocation
page execute and read and write
21102000
heap
page read and write
31C1000
heap
page read and write
64DE000
stack
page read and write
697E000
trusted library allocation
page read and write
77A000
stack
page read and write
E27000
trusted library allocation
page execute and read and write
432000
remote allocation
page execute and read and write
D831000
heap
page read and write
3327000
trusted library allocation
page read and write
387F000
trusted library allocation
page read and write
872000
heap
page read and write
270000
unkown
page readonly
61ED4000
direct allocation
page readonly
5250000
heap
page read and write
4094000
trusted library allocation
page read and write
3FA1000
heap
page read and write
381F000
stack
page read and write
3131000
heap
page read and write
667C000
stack
page read and write
2F2F000
stack
page read and write
4042000
trusted library allocation
page read and write
7925000
trusted library allocation
page read and write
31B4000
trusted library allocation
page read and write
64B0000
trusted library allocation
page execute and read and write
2D58000
trusted library allocation
page read and write
E15000
heap
page read and write
210F5000
heap
page read and write
2D1F000
stack
page read and write
774C000
heap
page read and write
88C5000
trusted library allocation
page read and write
93A0000
heap
page read and write
32E9000
trusted library allocation
page read and write
6F0E000
stack
page read and write
6DB9000
trusted library allocation
page read and write
14E4000
heap
page read and write
312C000
trusted library allocation
page read and write
47A1000
heap
page read and write
3EE9000
trusted library allocation
page read and write
4036000
trusted library allocation
page read and write
26E0000
heap
page read and write
40C000
stack
page read and write
3C1F000
stack
page read and write
2695000
heap
page read and write
95ED000
stack
page read and write
9C0000
heap
page read and write
47A1000
heap
page read and write
2C40000
trusted library allocation
page read and write
31F4000
trusted library allocation
page read and write
346E000
stack
page read and write
6FCE000
heap
page read and write
97AE000
stack
page read and write
3FA1000
heap
page read and write
9ED000
heap
page read and write
4BF2000
heap
page read and write
5390000
trusted library allocation
page read and write
402000
unkown
page readonly
8934000
heap
page read and write
3372000
trusted library allocation
page read and write
82C000
heap
page read and write
87C000
unkown
page read and write
2930000
heap
page read and write
F87000
heap
page read and write
B77000
heap
page read and write
446F000
stack
page read and write
3A7E000
stack
page read and write
5270000
direct allocation
page execute and read and write
B4E000
stack
page read and write
13E7000
heap
page read and write
5D79000
heap
page read and write
4BE1000
heap
page read and write
18AF000
stack
page read and write
7000000
trusted library allocation
page read and write
13AA000
heap
page read and write
325E000
stack
page read and write
28C4000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
6680000
heap
page read and write
4E20000
trusted library allocation
page read and write
32E3000
trusted library allocation
page read and write
E2C000
heap
page read and write
8A0000
heap
page read and write
4083000
trusted library allocation
page read and write
771E000
stack
page read and write
32F0000
heap
page read and write
957000
stack
page read and write
307E000
trusted library allocation
page read and write
5090000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
5A6E000
stack
page read and write
4238000
trusted library allocation
page read and write
37BF000
stack
page read and write
11EE000
heap
page read and write
2BC4000
trusted library allocation
page read and write
7703000
heap
page read and write
4B10000
direct allocation
page execute and read and write
1BC000
stack
page read and write
2CFF000
stack
page read and write
B20000
heap
page read and write
4E1D000
stack
page read and write
3E49000
trusted library allocation
page read and write
AB5000
heap
page read and write
B6B000
heap
page read and write
421000
remote allocation
page execute and read and write
E27000
heap
page read and write
D1F000
stack
page read and write
14E4000
heap
page read and write
210E9000
heap
page read and write
2A9F000
stack
page read and write
5DC0000
heap
page read and write
2F7F000
stack
page read and write
8B90000
trusted library allocation
page execute and read and write
4DC0000
direct allocation
page execute and read and write
A70000
heap
page read and write
88DC000
heap
page read and write
33FF000
stack
page read and write
A34000
heap
page read and write
4BE1000
heap
page read and write
26EE000
stack
page read and write
1590000
heap
page execute and read and write
5EAE000
stack
page read and write
1425000
heap
page read and write
4F6B000
stack
page read and write
38A2000
trusted library allocation
page read and write
3A39000
trusted library allocation
page read and write
14E4000
heap
page read and write
65BE000
heap
page read and write
3A1C000
trusted library allocation
page read and write
5F30000
heap
page read and write
3276000
heap
page read and write
77D7000
heap
page read and write
3B00000
heap
page read and write
3E5F000
trusted library allocation
page read and write
AF3000
heap
page read and write
2B9E000
trusted library allocation
page read and write
1624000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
CFF000
unkown
page write copy
3C5E000
stack
page read and write
2DD2000
trusted library allocation
page read and write
2BBF000
stack
page read and write
78C000
stack
page read and write
4BE1000
heap
page read and write
3138000
trusted library allocation
page read and write
572E000
stack
page read and write
C35000
heap
page read and write
210F5000
heap
page read and write
6950000
trusted library allocation
page read and write
4BE1000
heap
page read and write
210F5000
heap
page read and write
644F000
stack
page read and write
870000
unkown
page read and write
3E1D000
trusted library allocation
page read and write
6B20000
heap
page execute and read and write
47A1000
heap
page read and write
21113000
heap
page read and write
47A1000
heap
page read and write
284000
unkown
page write copy
5C3E000
stack
page read and write
27130000
heap
page read and write
576E000
trusted library allocation
page read and write
11E0000
heap
page read and write
4DCE000
trusted library allocation
page read and write
11D6000
heap
page read and write
7A40000
trusted library allocation
page read and write
110E000
unkown
page readonly
3F72000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
8A68000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
320F000
heap
page read and write
3F56000
trusted library allocation
page read and write
336E000
trusted library allocation
page read and write
BDE000
stack
page read and write
E1D000
heap
page read and write
828000
heap
page read and write
3217000
trusted library allocation
page read and write
2E0E000
trusted library allocation
page read and write
6190000
trusted library allocation
page execute and read and write
3FA1000
heap
page read and write
5860000
trusted library allocation
page execute and read and write
3110000
trusted library allocation
page read and write
154E000
heap
page read and write
DCB000
stack
page read and write
3272000
heap
page read and write
8F5000
heap
page read and write
8B74000
trusted library allocation
page read and write
77A1000
heap
page read and write
F6E000
heap
page read and write
3871000
trusted library allocation
page read and write
32BF000
stack
page read and write
CFC000
unkown
page readonly
E3B000
heap
page read and write
C30000
heap
page read and write
5340000
trusted library allocation
page execute and read and write
4BCE000
stack
page read and write
4DC0000
direct allocation
page execute and read and write
8AB0000
trusted library allocation
page read and write
4BE1000
heap
page read and write
28DF000
stack
page read and write
21102000
heap
page read and write
27B000
unkown
page execute and read and write
93B5000
heap
page read and write
210000
unkown
page read and write
25DE000
stack
page read and write
11C5000
heap
page read and write
1327000
trusted library allocation
page execute and read and write
3DE6000
trusted library allocation
page read and write
47A1000
heap
page read and write
6F27000
trusted library allocation
page read and write
4050000
heap
page read and write
3980000
trusted library allocation
page read and write
5A8B000
heap
page read and write
32ED000
trusted library allocation
page read and write
116D000
heap
page read and write
D844000
heap
page read and write
3FA1000
heap
page read and write
2BB2000
trusted library allocation
page read and write
324E000
heap
page read and write
210F5000
heap
page read and write
C40000
heap
page read and write
33AF000
stack
page read and write
331B000
trusted library allocation
page read and write
26AF000
stack
page read and write
1510000
heap
page read and write
4790000
direct allocation
page read and write
36A1000
trusted library allocation
page read and write
1760000
trusted library allocation
page read and write
2B3A000
trusted library allocation
page read and write
45B0000
heap
page read and write
3100000
heap
page read and write
3F6F000
stack
page read and write
C93000
trusted library allocation
page execute and read and write
6500000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
27DC000
stack
page read and write
210F4000
heap
page read and write
4BE1000
heap
page read and write
3131000
heap
page read and write
400000
unkown
page readonly
4D1D000
stack
page read and write
956000
heap
page read and write
50D0000
trusted library allocation
page read and write
2B83000
trusted library allocation
page read and write
3A07000
trusted library allocation
page read and write
1580000
trusted library allocation
page execute and read and write
101F000
stack
page read and write
3B1E000
stack
page read and write
3FA1000
heap
page read and write
1240000
heap
page read and write
2BC9000
trusted library allocation
page read and write
1CD000
unkown
page readonly
3FA1000
heap
page read and write
5130000
heap
page read and write
210D3000
heap
page read and write
2C79000
trusted library allocation
page read and write
39BE000
stack
page read and write
2B43000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
3D0000
heap
page read and write
C84000
heap
page read and write
FF0000
heap
page read and write
1ADAE000
stack
page read and write
2D270000
heap
page read and write
2B56000
trusted library allocation
page read and write
32F8000
heap
page read and write
6C10000
trusted library allocation
page read and write
1006000
heap
page read and write
3C61000
trusted library allocation
page read and write
5200000
direct allocation
page execute and read and write
3AEE000
trusted library allocation
page read and write
12FD000
trusted library allocation
page execute and read and write
DF0000
trusted library allocation
page execute and read and write
6A2D000
stack
page read and write
210E7000
heap
page read and write
6BF0000
trusted library allocation
page read and write
C8D000
unkown
page read and write
3A33000
trusted library allocation
page read and write
87BE000
stack
page read and write
B0E000
stack
page read and write
88FE000
stack
page read and write
409D000
trusted library allocation
page read and write
A86000
trusted library allocation
page execute and read and write
3ED9000
trusted library allocation
page read and write
409D000
trusted library allocation
page read and write
210D9000
heap
page read and write
3F89000
trusted library allocation
page read and write
210E8000
heap
page read and write
3A30000
trusted library allocation
page read and write
332E000
stack
page read and write
65A6000
heap
page read and write
859C000
stack
page read and write
2370000
heap
page read and write
26E7000
heap
page read and write
D4EB000
heap
page read and write
14E4000
heap
page read and write
2110A000
heap
page read and write
23DE000
stack
page read and write
3150000
heap
page read and write
4B00000
direct allocation
page execute and read and write
4BE1000
heap
page read and write
64C6000
trusted library allocation
page read and write
6B9000
unkown
page readonly
51E4000
trusted library allocation
page read and write
210F5000
heap
page read and write
3C82000
trusted library allocation
page read and write
5290000
direct allocation
page execute and read and write
65F0000
trusted library allocation
page execute and read and write
3027000
trusted library allocation
page read and write
3A97000
trusted library allocation
page read and write
97F000
heap
page read and write
3CFE000
stack
page read and write
5D3F000
heap
page read and write
610000
unkown
page readonly
5F6A000
heap
page read and write
3BEE000
stack
page read and write
3829000
trusted library allocation
page read and write
3AAE000
stack
page read and write
2F62000
trusted library allocation
page read and write
111E000
heap
page read and write
30F1000
trusted library allocation
page read and write
24BE000
stack
page read and write
210DF000
heap
page read and write
5280000
direct allocation
page execute and read and write
BA0000
heap
page read and write
F35000
unkown
page readonly
69AB000
trusted library allocation
page read and write
270000
unkown
page readonly
3DDA000
trusted library allocation
page read and write
675000
heap
page read and write
3FCA000
trusted library allocation
page read and write
1400000
heap
page read and write
6A70000
trusted library allocation
page read and write
6FD0000
heap
page read and write
21124000
heap
page read and write
B7B000
trusted library allocation
page execute and read and write
36FF000
stack
page read and write
33B1000
trusted library allocation
page read and write
47A1000
heap
page read and write
210F1000
heap
page read and write
3F9E000
trusted library allocation
page read and write
2620000
direct allocation
page read and write
279F000
stack
page read and write
857E000
stack
page read and write
46FE000
stack
page read and write
6440000
trusted library allocation
page read and write
13C0000
heap
page read and write
2F6E000
stack
page read and write
4BF1000
heap
page read and write
6590000
heap
page read and write
89BE000
stack
page read and write
19B000
stack
page read and write
7F110000
trusted library allocation
page execute and read and write
728000
heap
page read and write
4E82000
trusted library allocation
page read and write
538E000
stack
page read and write
D92000
heap
page read and write
C5E000
stack
page read and write
8C2000
unkown
page read and write
13D1000
heap
page read and write
25F0000
heap
page read and write
3D9D000
stack
page read and write
3980000
trusted library allocation
page read and write
88F0000
trusted library allocation
page read and write
5B57000
heap
page read and write
2D01000
heap
page read and write
E00000
trusted library allocation
page read and write
5786000
trusted library allocation
page read and write
CF0000
heap
page execute and read and write
3F7F000
trusted library allocation
page read and write
B0A000
heap
page read and write
6B40000
trusted library allocation
page read and write
3FA1000
heap
page read and write
3275000
heap
page read and write
2D283000
heap
page read and write
5F0000
unkown
page readonly
21C0000
heap
page read and write
A20000
heap
page read and write
28EF000
stack
page read and write
693E5000
unkown
page readonly
1B028000
heap
page read and write
2850000
trusted library allocation
page read and write
FF9000
heap
page read and write
2C0B000
trusted library allocation
page read and write
4440000
trusted library allocation
page read and write
4BE0000
direct allocation
page execute and read and write
3FA1000
trusted library allocation
page read and write
F40000
unkown
page readonly
2D27D000
heap
page read and write
790000
heap
page read and write
31BE000
trusted library allocation
page read and write
D7E000
stack
page read and write
2F60000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
47A1000
heap
page read and write
26A1000
trusted library allocation
page execute and read and write
4BE1000
heap
page read and write
859000
heap
page read and write
9F70000
trusted library allocation
page read and write
75E3000
trusted library allocation
page read and write
289000
unkown
page readonly
423F000
stack
page read and write
2EE9000
trusted library allocation
page read and write
210F1000
heap
page read and write
3FA1000
heap
page read and write
3EB7000
trusted library allocation
page read and write
44AE000
stack
page read and write
5370000
trusted library allocation
page execute and read and write
26B0000
direct allocation
page read and write
693DF000
unkown
page write copy
E46000
heap
page read and write
53F0000
trusted library allocation
page read and write
35DF000
stack
page read and write
9302000
heap
page read and write
A20000
heap
page read and write
53A0000
heap
page read and write
7350000
trusted library allocation
page read and write
8F0000
heap
page read and write
6564000
heap
page read and write
210DB000
heap
page read and write
26B0000
direct allocation
page read and write
5070000
direct allocation
page read and write
52A0000
trusted library allocation
page execute and read and write
260E000
stack
page read and write
1773000
trusted library allocation
page read and write
1320000
trusted library allocation
page read and write
34DE000
stack
page read and write
1330000
trusted library allocation
page read and write
2670000
trusted library allocation
page execute and read and write
5AC4000
heap
page read and write
CA4000
trusted library allocation
page read and write
32FF000
trusted library allocation
page read and write
B7D000
heap
page read and write
D85B000
heap
page read and write
4BE1000
heap
page read and write
6D5000
unkown
page execute and read and write
105E000
stack
page read and write
3D3F000
stack
page read and write
5BAE000
stack
page read and write
69A0000
trusted library allocation
page read and write
44BF000
stack
page read and write
2C64000
trusted library allocation
page read and write
210F5000
heap
page read and write
401000
unkown
page execute read
3CEF000
stack
page read and write
92F8000
heap
page read and write
3E3E000
trusted library allocation
page read and write
451E000
stack
page read and write
4BE1000
heap
page read and write
C87000
heap
page read and write
1280000
heap
page read and write
649F000
stack
page read and write
210D3000
heap
page read and write
5760000
trusted library allocation
page read and write
3C3C000
trusted library allocation
page read and write
35FE000
stack
page read and write
D37000
unkown
page execute and write copy
6960000
trusted library allocation
page read and write
26D0000
direct allocation
page read and write
40FB000
trusted library allocation
page read and write
1396000
heap
page read and write
111F000
stack
page read and write
210E5000
heap
page read and write
1318000
heap
page read and write
3F07000
trusted library allocation
page read and write
F20000
trusted library allocation
page read and write
210F5000
heap
page read and write
41C000
remote allocation
page execute and read and write
AFA000
stack
page read and write
3DF3000
trusted library allocation
page read and write
A9A000
stack
page read and write
610000
unkown
page readonly
30FE000
stack
page read and write
56AE000
stack
page read and write
4BE1000
heap
page read and write
3FA1000
heap
page read and write
11B4000
heap
page read and write
47A1000
heap
page read and write
407F000
stack
page read and write
1470000
heap
page read and write
3980000
trusted library allocation
page read and write
74DA000
heap
page read and write
1A7AF000
stack
page read and write
1A8AF000
stack
page read and write
21102000
heap
page read and write
D84D000
heap
page read and write
930000
trusted library allocation
page read and write
3E2A000
trusted library allocation
page read and write
3FA1000
heap
page read and write
2FE7000
trusted library allocation
page read and write
4BE1000
heap
page read and write
3EAD000
trusted library allocation
page read and write
5ADE000
heap
page read and write
DF0000
heap
page read and write
4058000
trusted library allocation
page read and write
D55000
heap
page read and write
522E000
stack
page read and write
3FDF000
stack
page read and write
5AC0000
heap
page read and write
4BE1000
heap
page read and write
C0E000
stack
page read and write
31EC000
heap
page read and write
854000
heap
page read and write
14E4000
heap
page read and write
40BB000
trusted library allocation
page read and write
3144000
heap
page read and write
40D1000
trusted library allocation
page read and write
92E000
heap
page read and write
2F30000
trusted library allocation
page read and write
1764000
trusted library allocation
page read and write
B64000
heap
page read and write
853E000
stack
page read and write
210FD000
heap
page read and write
30EA000
trusted library allocation
page read and write
E2E000
stack
page read and write
210CF000
heap
page read and write
2B71000
trusted library allocation
page read and write
C83000
unkown
page read and write
57A0000
trusted library allocation
page read and write
210C5000
heap
page read and write
210000
unkown
page readonly
1AF20000
heap
page read and write
69AED000
unkown
page readonly
176D000
trusted library allocation
page execute and read and write
DC7000
trusted library allocation
page execute and read and write
560D000
stack
page read and write
6981000
trusted library allocation
page read and write
F76000
heap
page read and write
2B40000
trusted library allocation
page read and write
26B0000
direct allocation
page read and write
935F000
heap
page read and write
2F20000
direct allocation
page read and write
2D60000
trusted library allocation
page read and write
272F000
stack
page read and write
828000
heap
page read and write
EEE000
unkown
page readonly
4053000
trusted library allocation
page read and write
3F7E000
stack
page read and write
6170000
trusted library allocation
page execute and read and write
6FC1000
heap
page read and write
5200000
direct allocation
page execute and read and write
3D4F000
stack
page read and write
8A6F000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
795E000
stack
page read and write
47A1000
heap
page read and write
51CE000
stack
page read and write
691A000
trusted library allocation
page read and write
D4A000
heap
page read and write
402000
remote allocation
page execute and read and write
8D2000
heap
page read and write
326A000
heap
page read and write
4BE1000
heap
page read and write
3E0B000
trusted library allocation
page read and write
373E000
stack
page read and write
4BB0000
direct allocation
page execute and read and write
DDA000
heap
page read and write
64A0000
trusted library allocation
page execute and read and write
A70000
unkown
page execute and read and write
884C000
stack
page read and write
3389000
trusted library allocation
page read and write
1A9CE000
stack
page read and write
161F000
heap
page read and write
3980000
trusted library allocation
page read and write
46A000
remote allocation
page execute and read and write
64E8000
trusted library allocation
page read and write
4B70000
direct allocation
page execute and read and write
4BE1000
heap
page read and write
3338000
trusted library allocation
page read and write
2BDC000
stack
page read and write
64C1000
trusted library allocation
page read and write
1520000
heap
page read and write
6329000
stack
page read and write
8900000
trusted library allocation
page read and write
6C20000
trusted library allocation
page execute and read and write
11D6000
heap
page read and write
14C0000
trusted library allocation
page read and write
B2E000
heap
page read and write
47A1000
heap
page read and write
5258000
heap
page read and write
32F5000
trusted library allocation
page read and write
5F2A000
heap
page read and write
DD6000
heap
page read and write
64E1000
trusted library allocation
page read and write
211000
unkown
page execute and write copy
980000
trusted library allocation
page execute and read and write
2DB7000
trusted library allocation
page read and write
F0000
heap
page read and write
A64000
trusted library allocation
page read and write
4FD000
remote allocation
page execute and read and write
400000
unkown
page readonly
6880000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page execute and read and write
74C000
stack
page read and write
3AEB000
trusted library allocation
page read and write
21021000
heap
page read and write
3E55000
trusted library allocation
page read and write
D5E000
heap
page read and write
13E8000
heap
page read and write
1633000
heap
page read and write
6F9000
stack
page read and write
1583000
heap
page read and write
4DAE000
stack
page read and write
29D9000
heap
page read and write
3010000
trusted library allocation
page read and write
3FA1000
heap
page read and write
8B70000
trusted library allocation
page read and write
44C0000
heap
page read and write
76E000
heap
page read and write
400B000
trusted library allocation
page read and write
2C3D000
trusted library allocation
page read and write
3A90000
trusted library allocation
page read and write
92C000
stack
page read and write
210F5000
heap
page read and write
F63000
unkown
page read and write
17CC000
heap
page read and write
2F37000
heap
page read and write
B75000
heap
page read and write
101F000
stack
page read and write
69B0000
heap
page read and write
133E000
heap
page read and write
2B36000
trusted library allocation
page read and write
5D03000
heap
page read and write
5212000
trusted library allocation
page read and write
32FE000
stack
page read and write
28EC000
trusted library allocation
page read and write
3A47000
trusted library allocation
page read and write
105E000
stack
page read and write
407F000
trusted library allocation
page read and write
210E7000
heap
page read and write
2DB9000
trusted library allocation
page read and write
58EF000
stack
page read and write
A30000
heap
page read and write
15B4000
heap
page read and write
3E1D000
trusted library allocation
page read and write
43C000
remote allocation
page execute and read and write
657C000
stack
page read and write
6DFE000
stack
page read and write
5850000
trusted library allocation
page execute and read and write
32BF000
stack
page read and write
4090000
trusted library allocation
page read and write
36FE000
stack
page read and write
3F9C000
trusted library allocation
page read and write
EA4000
heap
page read and write
2B6F000
stack
page read and write
14A0000
heap
page read and write
3C8A000
trusted library allocation
page read and write
3AF3000
trusted library allocation
page read and write
76EE000
heap
page read and write
118D000
trusted library allocation
page execute and read and write
4CF0000
heap
page read and write
D7D000
stack
page read and write
323F000
heap
page read and write
210FA000
heap
page read and write
400000
unkown
page readonly
30E4000
trusted library allocation
page read and write
D847000
heap
page read and write
DDD000
heap
page read and write
12F4000
trusted library allocation
page read and write
9357000
heap
page read and write
7EFE000
stack
page read and write
5380000
heap
page read and write
A90000
heap
page read and write
475F000
stack
page read and write
4DD7000
trusted library allocation
page read and write
2C3F000
stack
page read and write
404E000
heap
page read and write
691A000
trusted library allocation
page execute and read and write
21105000
heap
page read and write
7900000
trusted library allocation
page read and write
50AE000
stack
page read and write
3383000
trusted library allocation
page read and write
4C7C000
stack
page read and write
331D000
trusted library allocation
page read and write
5260000
direct allocation
page execute and read and write
1A88F000
stack
page read and write
960000
heap
page read and write
4002000
trusted library allocation
page read and write
43F7000
trusted library allocation
page read and write
210CA000
heap
page read and write
536E000
stack
page read and write
404A000
trusted library allocation
page read and write
722E000
stack
page read and write
210C0000
heap
page read and write
3E95000
trusted library allocation
page read and write
325C000
heap
page read and write
8897000
heap
page read and write
3980000
trusted library allocation
page read and write
2DCE000
stack
page read and write
4BE1000
heap
page read and write
2F74000
trusted library allocation
page read and write
B71000
heap
page read and write
16F0000
heap
page read and write
4BE1000
heap
page read and write
1360000
trusted library allocation
page read and write
2D275000
heap
page read and write
5F0000
heap
page read and write
131A000
trusted library allocation
page execute and read and write
210FB000
heap
page read and write
3FD3000
trusted library allocation
page read and write
6940000
trusted library section
page read and write
510F000
stack
page read and write
3B75000
trusted library allocation
page read and write
BF7000
heap
page read and write
4E00000
heap
page read and write
49BE000
stack
page read and write
3370000
trusted library allocation
page read and write
2680000
heap
page read and write
2ECF000
stack
page read and write
6510000
trusted library allocation
page read and write
35AD000
stack
page read and write
817E000
stack
page read and write
314F000
heap
page read and write
2DBE000
stack
page read and write
2620000
direct allocation
page read and write
27F1000
trusted library allocation
page read and write
E3B000
heap
page read and write
CA0000
trusted library allocation
page read and write
86F000
heap
page read and write
C80000
heap
page read and write
3307000
trusted library allocation
page read and write
326A000
heap
page read and write
313A000
heap
page read and write
4B30000
direct allocation
page execute and read and write
34BE000
stack
page read and write
228E000
stack
page read and write
EFB000
unkown
page write copy
13C3000
heap
page read and write
334D000
trusted library allocation
page read and write
425F000
stack
page read and write
5D2E000
heap
page read and write
56EE000
stack
page read and write
537E000
stack
page read and write
44DF000
stack
page read and write
1530000
trusted library allocation
page read and write
21199000
heap
page read and write
7E6000
heap
page read and write
47A1000
heap
page read and write
3332000
trusted library allocation
page read and write
107D000
unkown
page read and write
3BB000
stack
page read and write
DEB000
heap
page read and write
B67000
heap
page read and write
6AB0000
trusted library allocation
page read and write
1AD9E000
stack
page read and write
496C000
stack
page read and write
2C00000
trusted library allocation
page read and write
393E000
stack
page read and write
1577000
heap
page read and write
327C000
heap
page read and write
9F0000
heap
page read and write
7B0000
unkown
page read and write
3241000
heap
page read and write
3211000
trusted library allocation
page read and write
C3E000
stack
page read and write
4BE1000
heap
page read and write
447E000
stack
page read and write
3260000
trusted library allocation
page read and write
21102000
heap
page read and write
303F000
stack
page read and write
53B0000
trusted library allocation
page read and write
3BFE000
stack
page read and write
57C5000
trusted library allocation
page read and write
C84000
heap
page read and write
3DEE000
trusted library allocation
page read and write
3345000
trusted library allocation
page read and write
33CF0000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
B00000
heap
page read and write
32EF000
trusted library allocation
page read and write
116E000
heap
page read and write
54B0000
heap
page execute and read and write
3DFF000
stack
page read and write
61E00000
direct allocation
page execute and read and write
210D9000
heap
page read and write
CBE000
stack
page read and write
2469000
stack
page read and write
1F0000
remote allocation
page read and write
32F7000
trusted library allocation
page read and write
AAF000
stack
page read and write
E55000
heap
page read and write
A4F000
heap
page read and write
2D27A000
heap
page read and write
6A90000
trusted library allocation
page read and write
FC8000
heap
page read and write
2F80000
trusted library allocation
page read and write
2F4B000
trusted library allocation
page execute and read and write
3AAF000
trusted library allocation
page read and write
5E0000
heap
page read and write
2D20E000
stack
page read and write
D40000
heap
page read and write
322B000
heap
page read and write
4BE1000
heap
page read and write
5890000
trusted library allocation
page execute and read and write
7DD000
stack
page read and write
9E8000
heap
page read and write
2F90000
trusted library allocation
page read and write
3F80000
heap
page read and write
8ABE000
stack
page read and write
6C00000
trusted library allocation
page read and write
10FA000
stack
page read and write
50C0000
trusted library allocation
page read and write
4025000
trusted library allocation
page read and write
1AF11000
heap
page read and write
15EF000
stack
page read and write
293F000
stack
page read and write
2620000
direct allocation
page read and write
47A1000
heap
page read and write
2C50000
trusted library allocation
page read and write
662000
unkown
page readonly
2F50000
heap
page read and write
49F0000
trusted library allocation
page read and write
5AE9000
heap
page read and write
50BE000
stack
page read and write
5384000
heap
page read and write
3D2D000
stack
page read and write
3230000
heap
page read and write
4BE1000
heap
page read and write
2570000
heap
page read and write
B10000
heap
page read and write
3ED3000
trusted library allocation
page read and write
64CE000
heap
page read and write
1786000
trusted library allocation
page execute and read and write
169B000
heap
page read and write
779000
heap
page read and write
6970000
trusted library allocation
page read and write
4DE0000
direct allocation
page execute and read and write
E39000
heap
page read and write
69B02000
unkown
page readonly
2F90000
trusted library allocation
page read and write
3980000
trusted library allocation
page read and write
95B000
trusted library allocation
page execute and read and write
13ED000
heap
page read and write
313E000
heap
page read and write
47A1000
heap
page read and write
4BBF000
stack
page read and write
1230000
heap
page read and write
9B0000
unkown
page readonly
47A1000
heap
page read and write
103E000
stack
page read and write
3F47000
trusted library allocation
page read and write
C70000
trusted library allocation
page read and write
4E03000
heap
page read and write
314C000
heap
page read and write
1390000
heap
page read and write
84C000
heap
page read and write
21102000
heap
page read and write
5280000
heap
page read and write
CB1000
unkown
page execute read
327C000
stack
page read and write
5B30000
heap
page read and write
4BE1000
heap
page read and write
2D3BE000
heap
page read and write
2FDE000
stack
page read and write
1057000
unkown
page read and write
247E000
stack
page read and write
2CEB000
heap
page read and write
47A1000
heap
page read and write
4BE1000
heap
page read and write
339A000
trusted library allocation
page read and write
2E19000
trusted library allocation
page read and write
DD0000
heap
page read and write
B91000
unkown
page execute and write copy
210E4000
heap
page read and write
C54000
trusted library allocation
page read and write
134A000
heap
page read and write
400000
remote allocation
page execute and read and write
4BE1000
heap
page read and write
AE0000
heap
page read and write
3270000
trusted library allocation
page read and write
21124000
heap
page read and write
6DB0000
trusted library allocation
page read and write
11F1000
heap
page read and write
80000
unkown
page readonly
DA0000
trusted library allocation
page read and write
1AC0D000
stack
page read and write
386D000
stack
page read and write
4121000
trusted library allocation
page read and write
335F000
stack
page read and write
3120000
heap
page read and write
11CE000
heap
page read and write
3980000
trusted library allocation
page read and write
934000
trusted library allocation
page read and write
1249000
stack
page read and write
3F67000
trusted library allocation
page read and write
1AC2E000
stack
page read and write
4BE1000
heap
page read and write
C84000
heap
page read and write
210000
unkown
page read and write
2E7E000
stack
page read and write
3FFE000
stack
page read and write
845000
heap
page read and write
159F000
stack
page read and write
4F9F000
stack
page read and write
3E70000
trusted library allocation
page read and write
14E4000
heap
page read and write
3B7F000
stack
page read and write
61ECD000
direct allocation
page readonly
116D000
heap
page read and write
2F47000
trusted library allocation
page execute and read and write
5F8E000
stack
page read and write
6915000
trusted library allocation
page read and write
C6D000
trusted library allocation
page execute and read and write
592E000
stack
page read and write
2C78000
trusted library allocation
page read and write
402F000
trusted library allocation
page read and write
C03000
unkown
page read and write
47A1000
heap
page read and write
4D00000
trusted library allocation
page read and write
974000
heap
page read and write
4040000
trusted library allocation
page read and write
C53000
trusted library allocation
page execute and read and write
2A90000
trusted library allocation
page execute and read and write
523000
unkown
page execute and read and write
12F3000
trusted library allocation
page execute and read and write
210DE000
heap
page read and write
47A1000
heap
page read and write
3E87000
trusted library allocation
page read and write
13AE000
heap
page read and write
2CB0000
heap
page read and write
773E000
heap
page read and write
5240000
direct allocation
page execute and read and write
B79000
heap
page read and write
E0A000
heap
page read and write
25D8000
trusted library allocation
page read and write
282000
unkown
page write copy
B00000
heap
page read and write
2620000
direct allocation
page read and write
401000
unkown
page execute read
47A1000
heap
page read and write
154A000
heap
page read and write
4BE1000
heap
page read and write
2D8A000
trusted library allocation
page read and write
44E1000
heap
page read and write
E14000
trusted library allocation
page read and write
7370000
heap
page read and write
6FD000
stack
page read and write
B00000
heap
page read and write
210F3000
heap
page read and write
5220000
heap
page read and write
5B4E000
heap
page read and write
3F9F000
trusted library allocation
page read and write
32EF000
stack
page read and write
331F000
trusted library allocation
page read and write
287C000
trusted library allocation
page read and write
57C000
stack
page read and write
6F3000
stack
page read and write
CF7000
stack
page read and write
3ED7000
trusted library allocation
page read and write
210E3000
heap
page read and write
C50000
trusted library allocation
page read and write
3275000
heap
page read and write
D8F000
stack
page read and write
26B0000
direct allocation
page read and write
6850000
trusted library allocation
page read and write
2C42000
trusted library allocation
page read and write
1334000
heap
page read and write
CC0000
heap
page read and write
39DE000
stack
page read and write
353F000
stack
page read and write
4DF0000
trusted library allocation
page read and write
3B3F000
stack
page read and write
47A1000
heap
page read and write
D86F000
heap
page read and write
1336000
trusted library allocation
page execute and read and write
B77000
trusted library allocation
page execute and read and write
2BEC000
stack
page read and write
2620000
direct allocation
page read and write
E2B000
trusted library allocation
page execute and read and write
AC5000
heap
page read and write
4C64000
trusted library allocation
page read and write
169F000
stack
page read and write
31C1000
heap
page read and write
6920000
trusted library allocation
page read and write
8D9000
unkown
page write copy
11F1000
heap
page read and write
3146000
heap
page read and write
3EF7000
trusted library allocation
page read and write
44E1000
heap
page read and write
396D000
stack
page read and write
5840000
trusted library allocation
page read and write
4F70000
heap
page read and write
69A5000
trusted library allocation
page read and write
CF4000
heap
page read and write
1814000
heap
page read and write
32BF000
trusted library allocation
page read and write
8861000
heap
page read and write
8A50000
trusted library allocation
page read and write
210DF000
heap
page read and write
5CF2000
heap
page read and write
77F7000
heap
page read and write
349F000
stack
page read and write
CF0000
heap
page read and write
6A5FE000
unkown
page read and write
9A0000
trusted library allocation
page read and write
2CB5000
trusted library allocation
page read and write
210D7000
heap
page read and write
5ADB000
heap
page read and write
393E000
stack
page read and write
26D0000
direct allocation
page read and write
27DB000
trusted library allocation
page read and write
1342000
trusted library allocation
page read and write
3355000
trusted library allocation
page read and write
3304000
trusted library allocation
page read and write
508D000
stack
page read and write
15E5000
heap
page read and write
5170000
heap
page read and write
3E11000
trusted library allocation
page read and write
CB0000
unkown
page readonly
1177000
heap
page read and write
210EF000
heap
page read and write
E40000
trusted library allocation
page read and write
44E1000
heap
page read and write
4BE1000
heap
page read and write
25A1000
remote allocation
page readonly
47A1000
heap
page read and write
69C0000
trusted library allocation
page read and write
1110000
heap
page read and write
64C0000
heap
page read and write
3EAA000
heap
page read and write
3223000
heap
page read and write
3E90000
trusted library allocation
page read and write
3DAF000
trusted library allocation
page read and write
141D000
heap
page read and write
C70000
heap
page read and write
DA4000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
45AF000
stack
page read and write
2E96000
trusted library allocation
page read and write
2C50000
heap
page execute and read and write
40CB000
trusted library allocation
page read and write
401000
unkown
page execute read
4790000
direct allocation
page read and write
11C7000
heap
page read and write
74D0000
heap
page read and write
2118A000
heap
page read and write
2684000
heap
page read and write
4C30000
direct allocation
page read and write
1569000
heap
page read and write
2BAE000
stack
page read and write
3141000
trusted library allocation
page read and write
2FDD000
trusted library allocation
page read and write
9333000
heap
page read and write
3E16000
trusted library allocation
page read and write
5B65000
heap
page read and write
3385000
trusted library allocation
page read and write
210D2000
heap
page read and write
8B9000
heap
page read and write
7960000
trusted library allocation
page read and write
D50000
heap
page read and write
4055000
trusted library allocation
page read and write
39E4000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
210D0000
heap
page read and write
47A1000
heap
page read and write
60EF000
stack
page read and write
2CD0000
heap
page read and write
74A0000
heap
page read and write
28D1000
trusted library allocation
page read and write
347F000
stack
page read and write
13ED000
heap
page read and write
180000
heap
page read and write
3AE9000
trusted library allocation
page read and write
3FA0000
heap
page read and write
4BE1000
heap
page read and write
210E7000
heap
page read and write
210DB000
heap
page read and write
3FA8000
trusted library allocation
page read and write
210DE000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
2E2E000
stack
page read and write
1002000
heap
page read and write
15B8000
heap
page read and write
C40000
trusted library allocation
page read and write
FA1000
unkown
page read and write
7018000
trusted library allocation
page read and write
D82E000
stack
page read and write
4BE1000
heap
page read and write
21102000
heap
page read and write
210DF000
heap
page read and write
6A571000
unkown
page execute read
65B0000
trusted library allocation
page execute and read and write
D40000
heap
page read and write
323F000
heap
page read and write
865000
heap
page read and write
2DA6000
trusted library allocation
page read and write
177E000
stack
page read and write
410000
unkown
page execute and read and write
2C7E000
trusted library allocation
page read and write
4BE1000
heap
page read and write
2620000
direct allocation
page read and write
5B46000
heap
page read and write
A8E000
stack
page read and write
B05000
unkown
page read and write
279D000
stack
page read and write
6DBE000
stack
page read and write
3A7000
heap
page read and write
326D000
heap
page read and write
5410000
heap
page read and write
3302000
trusted library allocation
page read and write
254E000
stack
page read and write
4BE1000
heap
page read and write
14E4000
heap
page read and write
5C74000
heap
page read and write
282000
unkown
page read and write
D720000
heap
page read and write
D3E000
stack
page read and write
294B000
stack
page read and write
210F1000
heap
page read and write
39BE000
trusted library allocation
page read and write
47A1000
heap
page read and write
2F20000
direct allocation
page read and write
5842000
trusted library allocation
page read and write
427E000
stack
page read and write
74DE000
heap
page read and write
32DB000
trusted library allocation
page read and write
3380000
trusted library allocation
page read and write
30E0000
heap
page read and write
7ADE000
stack
page read and write
2F31000
trusted library allocation
page read and write
1431000
heap
page read and write
D35000
unkown
page execute and read and write
50B0000
trusted library allocation
page read and write
5D27000
heap
page read and write
3BC6000
heap
page read and write
3CA3000
trusted library allocation
page read and write
2F20000
direct allocation
page read and write
6930000
trusted library allocation
page read and write
291A000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
6B4000
unkown
page write copy
2D285000
heap
page read and write
33B7000
trusted library allocation
page read and write
548B000
stack
page read and write
3F86000
trusted library allocation
page read and write
115F000
stack
page read and write
310E000
unkown
page read and write
4BE1000
heap
page read and write
5AB0000
heap
page read and write
180000
unkown
page readonly
B48000
heap
page read and write
15D8000
heap
page read and write
40B1000
trusted library allocation
page read and write
7505000
heap
page read and write
117F000
stack
page read and write
2E9E000
stack
page read and write
2F1C000
stack
page read and write
4013000
trusted library allocation
page read and write
2C6D000
trusted library allocation
page read and write
210EC000
heap
page read and write
9376000
heap
page read and write
306E000
stack
page read and write
3AEE000
stack
page read and write
3AA9000
trusted library allocation
page read and write
3F52000
trusted library allocation
page read and write
50FE000
trusted library allocation
page read and write
4BE1000
heap
page read and write
8FFE000
stack
page read and write
F17000
unkown
page read and write
3140000
heap
page read and write
5AF9000
heap
page read and write
210E6000
heap
page read and write
77B3000
heap
page read and write
2F0F000
stack
page read and write
5240000
trusted library allocation
page read and write
5EF2000
heap
page read and write
210E6000
heap
page read and write
40A4000
trusted library allocation
page read and write
9390000
heap
page read and write
210C7000
heap
page read and write
523000
unkown
page execute and read and write
4097000
trusted library allocation
page read and write
47A1000
heap
page read and write
8BB0000
trusted library allocation
page execute and read and write
5913000
heap
page read and write
610000
heap
page read and write
5C50000
heap
page read and write
51F0000
direct allocation
page execute and read and write
E50000
heap
page read and write
2410000
heap
page read and write
519000
unkown
page execute and read and write
31F1000
trusted library allocation
page read and write
DBA000
heap
page read and write
4049000
trusted library allocation
page read and write
6966000
trusted library allocation
page read and write
6500000
trusted library allocation
page read and write
CFF000
stack
page read and write
1155000
heap
page read and write
4BE1000
heap
page read and write
2EDF000
stack
page read and write
13FD000
heap
page read and write
4B6F000
stack
page read and write
125A000
stack
page read and write
32F1000
trusted library allocation
page read and write
3265000
heap
page read and write
326A000
heap
page read and write
31D3000
trusted library allocation
page read and write
47A1000
heap
page read and write
8A7F000
trusted library allocation
page read and write
3E0000
heap
page read and write
215C000
stack
page read and write
14E4000
heap
page read and write
8940000
trusted library allocation
page read and write
14E000
stack
page read and write
313F000
stack
page read and write
3980000
trusted library allocation
page read and write
2B85000
trusted library allocation
page read and write
31C1000
heap
page read and write
86F000
heap
page read and write
3048000
trusted library allocation
page read and write
3DF7000
trusted library allocation
page read and write
389E000
stack
page read and write
54CE000
stack
page read and write
6270000
trusted library allocation
page read and write
E00000
heap
page read and write
288A000
trusted library allocation
page read and write
3DCA000
trusted library allocation
page read and write
47A1000
heap
page read and write
92F4000
heap
page read and write
A10000
heap
page read and write
6A6BF000
unkown
page readonly
271CF000
heap
page read and write
CB1000
unkown
page execute read
6D5000
unkown
page execute and read and write
C8A000
heap
page read and write
C94000
trusted library allocation
page read and write
E0E000
stack
page read and write
21D0000
heap
page read and write
2F9C000
trusted library allocation
page read and write
3FA1000
heap
page read and write
4EC0000
trusted library allocation
page read and write
2DA1000
trusted library allocation
page read and write
324E000
heap
page read and write
688000
unkown
page readonly
2D3B6000
heap
page read and write
C0E000
stack
page read and write
4BE1000
heap
page read and write
2550000
heap
page read and write
334F000
stack
page read and write
1AF21000
heap
page read and write
53EE000
stack
page read and write
5210000
direct allocation
page execute and read and write
1810000
heap
page read and write
335C000
trusted library allocation
page read and write
30AE000
stack
page read and write
2A7F000
stack
page read and write
107E000
stack
page read and write
3E94000
trusted library allocation
page read and write
15A3000
heap
page read and write
690E000
stack
page read and write
A95000
heap
page read and write
8A80000
trusted library allocation
page read and write
8A90000
trusted library allocation
page read and write
1627000
heap
page read and write
13DD000
stack
page read and write
AC5000
unkown
page read and write
14E4000
heap
page read and write
259E000
remote allocation
page execute and read and write
401000
unkown
page execute read
4BC0000
heap
page read and write
157E000
stack
page read and write
3F79000
trusted library allocation
page read and write
1347000
trusted library allocation
page execute and read and write
210F5000
heap
page read and write
324E000
heap
page read and write
6EFC000
stack
page read and write
31C9000
heap
page read and write
2F0C000
stack
page read and write
4970000
direct allocation
page read and write
3980000
trusted library allocation
page read and write
111A000
heap
page read and write
C84000
heap
page read and write
236E000
stack
page read and write
7009000
trusted library allocation
page read and write
6278000
trusted library allocation
page read and write
3A12000
trusted library allocation
page read and write
BEC000
heap
page read and write
6520000
trusted library allocation
page read and write
313A000
heap
page read and write
AC1000
heap
page read and write
656E000
heap
page read and write
12E0000
trusted library allocation
page read and write
B1E000
heap
page read and write
210EC000
heap
page read and write
2F10000
heap
page read and write
4B00000
direct allocation
page execute and read and write
210DE000
heap
page read and write
3F59000
trusted library allocation
page read and write
6EBE000
stack
page read and write
4DE2000
trusted library allocation
page read and write
210DA000
heap
page read and write
11F1000
heap
page read and write
E79000
heap
page read and write
4F60000
heap
page read and write
3110000
heap
page read and write
4C20000
direct allocation
page execute and read and write
47A1000
heap
page read and write
6A570000
unkown
page readonly
7922000
trusted library allocation
page read and write
F45000
heap
page read and write
6590000
trusted library allocation
page execute and read and write
9D0000
heap
page read and write
6990000
trusted library allocation
page read and write
14E4000
heap
page read and write
306F000
stack
page read and write
61E01000
direct allocation
page execute read
140F000
heap
page read and write
C72000
trusted library allocation
page read and write
125F000
stack
page read and write
8BA0000
trusted library allocation
page read and write
5253000
heap
page read and write
CFF000
unkown
page write copy
FE0000
heap
page read and write
32D2000
trusted library allocation
page read and write
3FA1000
heap
page read and write
A6D000
trusted library allocation
page execute and read and write
6600000
trusted library allocation
page read and write
8DB000
unkown
page execute and read and write
9F5000
heap
page read and write
326A000
heap
page read and write
343E000
stack
page read and write
683E000
stack
page read and write
1AB0D000
stack
page read and write
There are 3650 hidden memdumps, click here to show them.