IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000332001\c0968d0b44.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000332001\da8dfab19c.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000333001\634af23a05.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000333001\7d57c960f4.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 3 00:27:15 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 3 00:27:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 3 00:27:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 3 00:27:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 3 00:27:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Windows\Tasks\skotes.job
data
dropped
Chrome Cache Entry: 93
ASCII text, with very long lines (553)
downloaded
Chrome Cache Entry: 94
ASCII text, with very long lines (533)
downloaded
Chrome Cache Entry: 95
ASCII text, with very long lines (5693)
downloaded
Chrome Cache Entry: 96
Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
downloaded
Chrome Cache Entry: 97
ASCII text, with very long lines (1052)
downloaded
Chrome Cache Entry: 98
ASCII text, with no line terminators
downloaded
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1000332001\c0968d0b44.exe
"C:\Users\user\AppData\Local\Temp\1000332001\c0968d0b44.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1912,i,10956692214313634026,6000861696528189421,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\1000333001\7d57c960f4.exe
"C:\Users\user\AppData\Local\Temp\1000333001\7d57c960f4.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000332001\c0968d0b44.exe
"C:\Users\user\AppData\Local\Temp\1000332001\c0968d0b44.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=1948,i,592972262324258279,17265959936427429495,262144 /prefetch:8
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
malicious
C:\Users\user\AppData\Local\Temp\1000333001\7d57c960f4.exe
"C:\Users\user\AppData\Local\Temp\1000333001\7d57c960f4.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 --field-trial-handle=2008,i,5070483553180137210,3664771771658724366,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\1000332001\c0968d0b44.exe
"C:\Users\user\AppData\Local\Temp\1000332001\c0968d0b44.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2020 --field-trial-handle=1932,i,3992076036556009603,15202519978378107295,262144 /prefetch:8
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
malicious
C:\Users\user\AppData\Local\Temp\1000333001\7d57c960f4.exe
"C:\Users\user\AppData\Local\Temp\1000333001\7d57c960f4.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 --field-trial-handle=2012,i,8412964653088469761,193010010935408969,262144 /prefetch:8
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 60 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/on:
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpn
unknown
malicious
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
malicious
http://185.215.113.37/TW
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpm
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpp
unknown
malicious
http://185.215.113.37K
unknown
malicious
http://185.215.113.37/v
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpy
unknown
malicious
http://185.215.113.37/A=&
unknown
malicious
http://185.215.113.37/$=
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/N=_
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpM
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpL
unknown
malicious
http://185.215.113.37/lU
unknown
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpA
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpD
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpJ
unknown
malicious
http://185.215.113.37/=
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php-=
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php8
unknown
malicious
http://185.215.113.37/C:
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php%
unknown
malicious
http://185.215.113.43/Zu7JuNko/index.php%$l
unknown
http://185.215.113.43/fae1daa8882e8f8e6b1ca72dd534db057eb-1003xu_
unknown
http://185.215.113.43/Zu7JuNko/index.php3001
unknown
http://185.215.113.43/Zu7JuNko/index.phpncoded75
unknown
http://185.215.113.43/Zu7JuNko/index.phpncoded
unknown
http://185.215.113.43/Zu7JuNko/index.phpnu
unknown
http://185.215.113.103/steam/random.exe
185.215.113.103
http://185.215.113.103/well/random.exeencoded
unknown
http://185.215.113.43/Zu7JuNko/index.php38c2817dba29a4b5b25dcf02
unknown
http://185.215.113.103/steam/random.exeYef
unknown
http://185.215.113.43/Zu7JuNko/index.phpcoded
unknown
http://185.215.113.43/c00b58981f4a4e1a0ce7e9f0e5ebf5de043E6
unknown
http://185.215.113.103/well/random.exe
185.215.113.103
https://apis.google.com/js/api.js
unknown
https://play.google.com/log?format=json&hasfast=true&authuser=0
216.58.206.78
https://www.google.com/favicon.ico
216.58.212.132
https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
unknown
http://185.215.113.43/Zu7JuNko/index.php6$
unknown
http://185.215.113.43/Zu7JuNko/index.phps
unknown
http://185.215.113.103/well/random.exe13
unknown
http://185.215.113.43/Zu7JuNko/index.phpncodedS5
unknown
http://185.215.113.43/Zu7JuNko/index.php8s
unknown
http://185.215.113.43/Zu7JuNko/index.phpded
unknown
There are 40 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
youtube-ui.l.google.com
142.250.185.142
www3.l.google.com
216.58.206.78
play.google.com
216.58.206.78
www.google.com
142.250.186.132
youtube.com
142.250.186.174
accounts.youtube.com
unknown
www.youtube.com
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
185.215.113.37
unknown
Portugal
malicious
192.168.2.5
unknown
unknown
malicious
142.250.186.174
youtube.com
United States
239.255.255.250
unknown
Reserved
142.250.185.142
youtube-ui.l.google.com
United States
142.250.186.132
www.google.com
United States
185.215.113.103
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
c0968d0b44.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
7d57c960f4.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
da8dfab19c.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
634af23a05.exe
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4CB0000
direct allocation
page read and write
malicious
581000
unkown
page execute and read and write
malicious
11DB000
heap
page read and write
malicious
B11000
unkown
page execute and read and write
malicious
131E000
heap
page read and write
malicious
DB1000
unkown
page execute and read and write
malicious
4BC0000
direct allocation
page read and write
malicious
581000
unkown
page execute and read and write
malicious
4F40000
direct allocation
page read and write
malicious
54A0000
direct allocation
page read and write
malicious
B11000
unkown
page execute and read and write
malicious
17DB000
heap
page read and write
malicious
B11000
unkown
page execute and read and write
malicious
5030000
direct allocation
page read and write
malicious
4810000
direct allocation
page read and write
malicious
766000
heap
page read and write
2350000
trusted library allocation
page read and write
562E000
stack
page read and write
49A0000
direct allocation
page execute and read and write
7B4000
heap
page read and write
4371000
heap
page read and write
1423000
heap
page read and write
4360000
direct allocation
page read and write
E50000
heap
page read and write
2B10000
direct allocation
page read and write
4D30000
direct allocation
page execute and read and write
7B0000
heap
page read and write
5011000
heap
page read and write
1514000
heap
page read and write
11BE000
stack
page read and write
150E000
stack
page read and write
7B4000
heap
page read and write
12F0000
direct allocation
page read and write
4741000
heap
page read and write
5180000
direct allocation
page execute and read and write
AE4000
heap
page read and write
AE4000
heap
page read and write
E19000
unkown
page write copy
436F000
stack
page read and write
5011000
heap
page read and write
1664000
heap
page read and write
4BA1000
heap
page read and write
5011000
heap
page read and write
323E000
stack
page read and write
AE4000
heap
page read and write
3CAF000
stack
page read and write
12EE000
stack
page read and write
970000
heap
page read and write
4E30000
direct allocation
page execute and read and write
5011000
heap
page read and write
1CECE000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
4AC1000
heap
page read and write
7B4000
heap
page read and write
EF4000
unkown
page execute and read and write
4AC1000
heap
page read and write
1425000
heap
page read and write
5011000
heap
page read and write
35AF000
stack
page read and write
4811000
heap
page read and write
4AC1000
heap
page read and write
75F000
heap
page read and write
AE4000
heap
page read and write
13E4000
heap
page read and write
5011000
heap
page read and write
1D0FE000
stack
page read and write
2F3F000
stack
page read and write
4371000
heap
page read and write
302F000
stack
page read and write
7B4000
heap
page read and write
23A0000
heap
page read and write
4BA0000
heap
page read and write
1514000
heap
page read and write
FF7000
unkown
page execute and read and write
122D000
heap
page read and write
89E000
stack
page read and write
2CBF000
stack
page read and write
4371000
heap
page read and write
75F000
heap
page read and write
1514000
heap
page read and write
4371000
heap
page read and write
12F0000
direct allocation
page read and write
4741000
heap
page read and write
AFC000
unkown
page readonly
55DF000
stack
page read and write
4741000
heap
page read and write
A60000
unkown
page readonly
1D97D000
stack
page read and write
42CF000
stack
page read and write
AE4000
heap
page read and write
10AC000
unkown
page execute and read and write
4BA1000
heap
page read and write
3634000
heap
page read and write
AE4000
heap
page read and write
4AC1000
heap
page read and write
12B4000
heap
page read and write
1664000
heap
page read and write
5011000
heap
page read and write
4741000
heap
page read and write
7B4000
heap
page read and write
E6A000
heap
page read and write
13E4000
heap
page read and write
7B4000
heap
page read and write
2E3F000
stack
page read and write
2A50000
direct allocation
page read and write
12B7000
heap
page read and write
15E4000
heap
page read and write
12B2000
heap
page read and write
4371000
heap
page read and write
160F000
stack
page read and write
4360000
direct allocation
page read and write
5011000
heap
page read and write
4AC1000
heap
page read and write
895000
unkown
page execute and write copy
1298000
heap
page read and write
4B90000
direct allocation
page read and write
119D000
unkown
page execute and write copy
7B4000
heap
page read and write
6302000
heap
page read and write
58E000
stack
page read and write
4AC1000
heap
page read and write
28FF000
stack
page read and write
1432000
heap
page read and write
13DE000
stack
page read and write
4AC1000
heap
page read and write
5011000
heap
page read and write
4741000
heap
page read and write
1D66F000
stack
page read and write
1423000
heap
page read and write
7B4000
heap
page read and write
4AC1000
heap
page read and write
4E30000
direct allocation
page execute and read and write
580000
unkown
page read and write
31AE000
stack
page read and write
54DE000
stack
page read and write
E50000
direct allocation
page read and write
3D81000
heap
page read and write
EF4000
unkown
page execute and read and write
3D81000
heap
page read and write
595000
heap
page read and write
50E0000
direct allocation
page execute and read and write
D6E000
unkown
page execute and read and write
15D2000
heap
page read and write
30BE000
stack
page read and write
4741000
heap
page read and write
13A1000
heap
page read and write
11BF000
stack
page read and write
11DB000
stack
page read and write
7FEB000
stack
page read and write
7B4000
heap
page read and write
1A0E000
stack
page read and write
929000
stack
page read and write
3EE0000
heap
page read and write
784000
heap
page read and write
4371000
heap
page read and write
5011000
heap
page read and write
4741000
heap
page read and write
895000
unkown
page execute and read and write
2A0E000
stack
page read and write
12C0000
heap
page read and write
3CFF000
stack
page read and write
1D9CF000
stack
page read and write
1514000
heap
page read and write
4B90000
direct allocation
page read and write
2350000
trusted library allocation
page read and write
4741000
heap
page read and write
4371000
heap
page read and write
766000
heap
page read and write
31BF000
stack
page read and write
4CA0000
direct allocation
page read and write
771000
heap
page read and write
4371000
heap
page read and write
1664000
heap
page read and write
397F000
stack
page read and write
4B80000
heap
page read and write
11CF000
stack
page read and write
1D59E000
stack
page read and write
3B94000
heap
page read and write
51B0000
direct allocation
page execute and read and write
4741000
heap
page read and write
4741000
heap
page read and write
9AE5000
heap
page read and write
12F0000
direct allocation
page read and write
4741000
heap
page read and write
343F000
stack
page read and write
7FE000
stack
page read and write
516F000
stack
page read and write
306E000
stack
page read and write
4D70000
direct allocation
page execute and read and write
2E2E000
stack
page read and write
4371000
heap
page read and write
71C000
heap
page read and write
4AC1000
heap
page read and write
4C2F000
stack
page read and write
4741000
heap
page read and write
5EB000
unkown
page execute and read and write
A30000
unkown
page execute and read and write
3590000
trusted library allocation
page read and write
2E7E000
stack
page read and write
4A4F000
stack
page read and write
7B4000
heap
page read and write
5620000
direct allocation
page execute and read and write
4371000
heap
page read and write
5011000
heap
page read and write
72C000
stack
page read and write
766000
heap
page read and write
653C000
stack
page read and write
725000
heap
page read and write
5011000
heap
page read and write
7B4000
heap
page read and write
5011000
heap
page read and write
4BA1000
heap
page read and write
A60000
unkown
page readonly
580000
unkown
page readonly
BCD000
unkown
page execute and read and write
758000
heap
page read and write
2B10000
direct allocation
page read and write
4371000
heap
page read and write
1664000
heap
page read and write
3D3F000
stack
page read and write
7B4000
heap
page read and write
781000
heap
page read and write
AE4000
heap
page read and write
4371000
heap
page read and write
4741000
heap
page read and write
1514000
heap
page read and write
1664000
heap
page read and write
4371000
heap
page read and write
BCD000
unkown
page execute and read and write
1430000
heap
page read and write
76C000
heap
page read and write
3ABF000
stack
page read and write
1664000
heap
page read and write
4371000
heap
page read and write
580000
unkown
page readonly
EF4000
unkown
page execute and read and write
4B90000
direct allocation
page read and write
4AC1000
heap
page read and write
3C8F000
stack
page read and write
4741000
heap
page read and write
494F000
stack
page read and write
45EF000
stack
page read and write
4741000
heap
page read and write
4D11000
direct allocation
page read and write
E50000
direct allocation
page read and write
1BEF000
stack
page read and write
7B4000
heap
page read and write
4D3C000
stack
page read and write
5011000
heap
page read and write
BDA000
stack
page read and write
3F2E000
stack
page read and write
4AC1000
heap
page read and write
7B4000
heap
page read and write
EC1000
heap
page read and write
6120000
heap
page read and write
51A0000
direct allocation
page execute and read and write
5011000
heap
page read and write
886000
unkown
page execute and read and write
895000
unkown
page execute and read and write
1514000
heap
page read and write
4371000
heap
page read and write
AE4000
heap
page read and write
E3E000
stack
page read and write
5011000
heap
page read and write
7B4000
heap
page read and write
2A7E000
stack
page read and write
7B4000
heap
page read and write
4741000
heap
page read and write
442F000
stack
page read and write
1D50D000
stack
page read and write
AE4000
heap
page read and write
1514000
heap
page read and write
4371000
heap
page read and write
11CE000
stack
page read and write
1D3CD000
stack
page read and write
4371000
heap
page read and write
4AC1000
heap
page read and write
4810000
heap
page read and write
AE4000
heap
page read and write
1D69F000
stack
page read and write
AE4000
heap
page read and write
AE4000
heap
page read and write
1514000
heap
page read and write
766000
heap
page read and write
4AC1000
heap
page read and write
4371000
heap
page read and write
4AC1000
heap
page read and write
4741000
heap
page read and write
1664000
heap
page read and write
55D000
stack
page read and write
1510000
heap
page read and write
4741000
heap
page read and write
4D80000
direct allocation
page execute and read and write
4371000
heap
page read and write
5011000
heap
page read and write
BC1000
unkown
page execute and read and write
440F000
stack
page read and write
1514000
heap
page read and write
2E6E000
stack
page read and write
B34000
unkown
page readonly
1D6A0000
heap
page read and write
4AC1000
heap
page read and write
26BC000
stack
page read and write
5000000
direct allocation
page read and write
1664000
heap
page read and write
4CEE000
stack
page read and write
559D000
stack
page read and write
4FEF000
stack
page read and write
B10000
unkown
page readonly
1514000
heap
page read and write
2B0F000
stack
page read and write
4B90000
direct allocation
page read and write
2F7F000
stack
page read and write
1664000
heap
page read and write
328F000
stack
page read and write
530E000
stack
page read and write
4E80000
direct allocation
page execute and read and write
13BE000
stack
page read and write
4741000
heap
page read and write
7B4000
heap
page read and write
AFE000
stack
page read and write
46AF000
stack
page read and write
4BC0000
heap
page read and write
3EE1000
heap
page read and write
4B90000
direct allocation
page read and write
1664000
heap
page read and write
4A30000
direct allocation
page execute and read and write
2DFF000
stack
page read and write
A61000
unkown
page execute read
3BAE000
stack
page read and write
5000000
direct allocation
page read and write
B22000
unkown
page readonly
50B0000
direct allocation
page execute and read and write
5011000
heap
page read and write
80EC000
stack
page read and write
3BBF000
stack
page read and write
38AF000
stack
page read and write
357F000
stack
page read and write
7B4000
heap
page read and write
4BA1000
heap
page read and write
AE4000
heap
page read and write
1240000
heap
page read and write
38CF000
stack
page read and write
4740000
heap
page read and write
3B90000
heap
page read and write
7B4000
heap
page read and write
2BBF000
stack
page read and write
372E000
stack
page read and write
4811000
heap
page read and write
46CE000
stack
page read and write
5011000
heap
page read and write
4371000
heap
page read and write
7B4000
heap
page read and write
4741000
heap
page read and write
1514000
heap
page read and write
4D30000
direct allocation
page execute and read and write
1664000
heap
page read and write
12F0000
direct allocation
page read and write
5011000
heap
page read and write
5011000
heap
page read and write
B22000
unkown
page readonly
BDE000
stack
page read and write
38EF000
stack
page read and write
5000000
direct allocation
page read and write
1514000
heap
page read and write
4AC1000
heap
page read and write
40FE000
stack
page read and write
6FE000
heap
page read and write
357F000
stack
page read and write
4371000
heap
page read and write
FA4000
unkown
page execute and read and write
1006000
unkown
page execute and write copy
4371000
heap
page read and write
5030000
direct allocation
page read and write
1428000
heap
page read and write
B3D000
stack
page read and write
386E000
stack
page read and write
12B7000
heap
page read and write
4371000
heap
page read and write
5011000
heap
page read and write
2B10000
direct allocation
page read and write
4990000
direct allocation
page execute and read and write
333E000
stack
page read and write
54A0000
direct allocation
page read and write
AE4000
heap
page read and write
300F000
stack
page read and write
1664000
heap
page read and write
B10000
unkown
page read and write
4B90000
direct allocation
page read and write
11FE000
stack
page read and write
13E4000
heap
page read and write
1CFCF000
stack
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
4A10000
direct allocation
page execute and read and write
383E000
stack
page read and write
5011000
heap
page read and write
4E70000
direct allocation
page execute and read and write
B10000
unkown
page read and write
4371000
heap
page read and write
50F0000
direct allocation
page execute and read and write
7B4000
heap
page read and write
1280000
heap
page read and write
7B4000
heap
page read and write
45FF000
stack
page read and write
AFC000
unkown
page readonly
FEF000
unkown
page execute and read and write
10C5000
unkown
page execute and write copy
3EAE000
stack
page read and write
447F000
stack
page read and write
2B10000
direct allocation
page read and write
4741000
heap
page read and write
5000000
direct allocation
page read and write
5011000
heap
page read and write
7B4000
heap
page read and write
F1C000
heap
page read and write
44AF000
stack
page read and write
7B4000
heap
page read and write
19A000
stack
page read and write
AE4000
heap
page read and write
4BA1000
heap
page read and write
293E000
stack
page read and write
7B4000
heap
page read and write
43AE000
stack
page read and write
5011000
heap
page read and write
7B4000
heap
page read and write
2350000
trusted library allocation
page read and write
1514000
heap
page read and write
4741000
heap
page read and write
1514000
heap
page read and write
1514000
heap
page read and write
1D3EF000
stack
page read and write
1664000
heap
page read and write
3E2E000
stack
page read and write
545D000
stack
page read and write
1664000
heap
page read and write
EAA000
heap
page read and write
30FE000
stack
page read and write
7B4000
heap
page read and write
AE4000
heap
page read and write
4AC1000
heap
page read and write
5011000
heap
page read and write
400000
heap
page read and write
1664000
heap
page read and write
AE4000
heap
page read and write
423E000
stack
page read and write
347F000
stack
page read and write
352F000
stack
page read and write
437F000
stack
page read and write
350F000
stack
page read and write
7B4000
heap
page read and write
4BA1000
heap
page read and write
59E0000
heap
page read and write
1428000
heap
page read and write
EEE000
heap
page read and write
5E9000
unkown
page write copy
444E000
stack
page read and write
1664000
heap
page read and write
5011000
heap
page read and write
4BA1000
heap
page read and write
4371000
heap
page read and write
2ABC000
stack
page read and write
1005000
unkown
page execute and write copy
32EE000
stack
page read and write
7B4000
heap
page read and write
E50000
direct allocation
page read and write
7B4000
heap
page read and write
3D80000
heap
page read and write
368E000
stack
page read and write
71E000
heap
page read and write
4FF0000
heap
page read and write
4AC1000
heap
page read and write
4741000
heap
page read and write
6304000
heap
page read and write
7B4000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
643B000
stack
page read and write
1664000
heap
page read and write
4360000
direct allocation
page read and write
2A70000
heap
page read and write
4371000
heap
page read and write
ADC000
stack
page read and write
4741000
heap
page read and write
4371000
heap
page read and write
4D00000
direct allocation
page execute and read and write
5000000
direct allocation
page read and write
3B4F000
stack
page read and write
4E10000
direct allocation
page execute and read and write
580000
unkown
page readonly
27FE000
stack
page read and write
3CEE000
stack
page read and write
462E000
stack
page read and write
2350000
trusted library allocation
page read and write
4741000
heap
page read and write
1D792000
heap
page read and write
4340000
heap
page read and write
6300000
heap
page read and write
1514000
heap
page read and write
7B4000
heap
page read and write
4BA1000
heap
page read and write
55F0000
direct allocation
page execute and read and write
B11000
unkown
page execute and write copy
1514000
heap
page read and write
4741000
heap
page read and write
1664000
heap
page read and write
4990000
direct allocation
page execute and read and write
1D6EE000
stack
page read and write
392E000
stack
page read and write
4371000
heap
page read and write
5011000
heap
page read and write
B11000
unkown
page execute and write copy
4BA1000
heap
page read and write
1B4F000
stack
page read and write
4AC1000
heap
page read and write
1514000
heap
page read and write
1380000
heap
page read and write
B2C000
unkown
page read and write
1664000
heap
page read and write
771000
heap
page read and write
119D000
unkown
page execute and write copy
4371000
heap
page read and write
12A8000
heap
page read and write
3EE1000
heap
page read and write
4AC1000
heap
page read and write
2C8B000
heap
page read and write
7B4000
heap
page read and write
AE4000
heap
page read and write
AE4000
heap
page read and write
D5A000
unkown
page execute and read and write
657E000
stack
page read and write
473E000
stack
page read and write
7B4000
heap
page read and write
119C000
unkown
page execute and read and write
935000
stack
page read and write
4BA1000
heap
page read and write
4CA0000
direct allocation
page read and write
1514000
heap
page read and write
4371000
heap
page read and write
744000
heap
page read and write
1CF7F000
stack
page read and write
4AC1000
heap
page read and write
12C2000
heap
page read and write
12F0000
direct allocation
page read and write
13E4000
heap
page read and write
5011000
heap
page read and write
4BA1000
heap
page read and write
4360000
direct allocation
page read and write
463E000
stack
page read and write
4371000
heap
page read and write
6A0000
heap
page read and write
307F000
stack
page read and write
12AE000
stack
page read and write
E3E000
stack
page read and write
1423000
heap
page read and write
2A50000
direct allocation
page read and write
7B4000
heap
page read and write
757000
heap
page read and write
44BE000
stack
page read and write
2E3E000
stack
page read and write
49F0000
direct allocation
page execute and read and write
4AC1000
heap
page read and write
3360000
heap
page read and write
49BE000
stack
page read and write
4741000
heap
page read and write
757000
heap
page read and write
3BF1000
heap
page read and write
4BA1000
heap
page read and write
D97000
heap
page read and write
4371000
heap
page read and write
4BA1000
heap
page read and write
4D50000
direct allocation
page execute and read and write
1DAE000
stack
page read and write
418F000
stack
page read and write
12F0000
direct allocation
page read and write
B10000
unkown
page read and write
5600000
direct allocation
page execute and read and write
D6E000
unkown
page execute and read and write
757000
heap
page read and write
5011000
heap
page read and write
4741000
heap
page read and write
61D0000
heap
page read and write
AFC000
unkown
page readonly
390E000
stack
page read and write
4741000
heap
page read and write
7B4000
heap
page read and write
4BA1000
heap
page read and write
17CF000
stack
page read and write
4990000
direct allocation
page execute and read and write
5000000
direct allocation
page read and write
5011000
heap
page read and write
2A77000
heap
page read and write
75C000
heap
page read and write
4750000
heap
page read and write
37FF000
stack
page read and write
744000
heap
page read and write
4371000
heap
page read and write
E50000
direct allocation
page read and write
4360000
direct allocation
page read and write
7B4000
heap
page read and write
4B90000
direct allocation
page read and write
35FE000
stack
page read and write
51C0000
direct allocation
page execute and read and write
13DB000
stack
page read and write
7B4000
heap
page read and write
4371000
heap
page read and write
7B4000
heap
page read and write
2F0C000
stack
page read and write
7B4000
heap
page read and write
4371000
heap
page read and write
AE4000
heap
page read and write
B34000
unkown
page readonly
2CFE000
stack
page read and write
4371000
heap
page read and write
BE0000
heap
page read and write
4371000
heap
page read and write
7B4000
heap
page read and write
4CA0000
direct allocation
page read and write
810F000
heap
page read and write
15D9000
heap
page read and write
35EE000
stack
page read and write
4371000
heap
page read and write
3D6E000
stack
page read and write
4741000
heap
page read and write
A40000
heap
page read and write
2B10000
direct allocation
page read and write
2A3F000
stack
page read and write
B70000
heap
page read and write
184C000
heap
page read and write
766000
heap
page read and write
1514000
heap
page read and write
4741000
heap
page read and write
11D0000
heap
page read and write
AE4000
heap
page read and write
12F0000
direct allocation
page read and write
4BC0000
trusted library allocation
page read and write
5011000
heap
page read and write
15E3000
heap
page read and write
31FE000
stack
page read and write
7B4000
heap
page read and write
40BF000
stack
page read and write
3F4E000
stack
page read and write
4741000
heap
page read and write
3A7F000
stack
page read and write
4AC1000
heap
page read and write
5000000
direct allocation
page read and write
487E000
stack
page read and write
11FE000
stack
page read and write
4AC1000
heap
page read and write
4AC1000
heap
page read and write
5011000
heap
page read and write
383E000
stack
page read and write
13E4000
heap
page read and write
700000
heap
page read and write
5011000
heap
page read and write
3A6E000
stack
page read and write
4371000
heap
page read and write
7B4000
heap
page read and write
3B8E000
stack
page read and write
1384000
heap
page read and write
2ECF000
stack
page read and write
4AC1000
heap
page read and write
581000
unkown
page execute and write copy
4360000
direct allocation
page read and write
15B8000
heap
page read and write
1D42E000
stack
page read and write
AE4000
heap
page read and write
356E000
stack
page read and write
75F000
heap
page read and write
61C0000
heap
page read and write
5011000
heap
page read and write
2DAF000
stack
page read and write
D5A000
unkown
page execute and read and write
5011000
heap
page read and write
B34000
unkown
page readonly
2B20000
heap
page read and write
DDE000
stack
page read and write
E60000
heap
page read and write
7B4000
heap
page read and write
7B4000
heap
page read and write
3AFE000
stack
page read and write
41EE000
stack
page read and write
4AC1000
heap
page read and write
1CE8F000
stack
page read and write
112F000
stack
page read and write
5EBE000
stack
page read and write
D8F000
stack
page read and write
4741000
heap
page read and write
4371000
heap
page read and write
4F1E000
stack
page read and write
4E00000
direct allocation
page execute and read and write
1D2BD000
stack
page read and write
1664000
heap
page read and write
3630000
heap
page read and write
4BA1000
heap
page read and write
7F0F000
stack
page read and write
B2C000
unkown
page read and write
119C000
unkown
page execute and read and write
744000
heap
page read and write
DB0000
unkown
page read and write
A45000
heap
page read and write
2B7F000
stack
page read and write
7B4000
heap
page read and write
E50000
direct allocation
page read and write
4800000
direct allocation
page read and write
4371000
heap
page read and write
37CE000
stack
page read and write
5011000
heap
page read and write
4AC1000
heap
page read and write
B10000
unkown
page readonly
1D370000
heap
page read and write
5011000
heap
page read and write
4AC1000
heap
page read and write
47CF000
stack
page read and write
4741000
heap
page read and write
B00000
heap
page read and write
5011000
heap
page read and write
2350000
trusted library allocation
page read and write
4E60000
direct allocation
page execute and read and write
4371000
heap
page read and write
4D30000
direct allocation
page execute and read and write
984000
heap
page read and write
50D0000
direct allocation
page execute and read and write
1428000
heap
page read and write
33EF000
stack
page read and write
4371000
heap
page read and write
B22000
unkown
page readonly
327F000
stack
page read and write
4D20000
direct allocation
page execute and read and write
4AC1000
heap
page read and write
896000
unkown
page execute and write copy
A60000
unkown
page readonly
4E20000
direct allocation
page execute and read and write
12F0000
direct allocation
page read and write
2DEE000
stack
page read and write
135E000
stack
page read and write
1005000
unkown
page execute and read and write
4371000
heap
page read and write
4B90000
direct allocation
page read and write
7B4000
heap
page read and write
4371000
heap
page read and write
397E000
stack
page read and write
40FF000
stack
page read and write
6F2000
heap
page read and write
4D30000
direct allocation
page execute and read and write
30BF000
stack
page read and write
5011000
heap
page read and write
333F000
stack
page read and write
4360000
direct allocation
page read and write
BC1000
unkown
page execute and read and write
4371000
heap
page read and write
4360000
direct allocation
page read and write
5011000
heap
page read and write
1664000
heap
page read and write
AE4000
heap
page read and write
31FF000
stack
page read and write
5000000
direct allocation
page read and write
4371000
heap
page read and write
4741000
heap
page read and write
3590000
trusted library allocation
page read and write
4741000
heap
page read and write
3CCE000
stack
page read and write
1514000
heap
page read and write
21AF000
stack
page read and write
2E77000
heap
page read and write
4BA1000
heap
page read and write
3CFF000
stack
page read and write
DA0000
heap
page read and write
11EF000
stack
page read and write
EA4000
heap
page read and write
40EF000
stack
page read and write
4C21000
direct allocation
page read and write
3B6F000
stack
page read and write
5020000
heap
page read and write
540F000
stack
page read and write
3D7E000
stack
page read and write
4BFC000
stack
page read and write
BD0000
heap
page read and write
37EE000
stack
page read and write
13E4000
heap
page read and write
590000
heap
page read and write
1514000
heap
page read and write
4371000
heap
page read and write
12B3000
heap
page read and write
3BBF000
stack
page read and write
7B4000
heap
page read and write
51B0000
direct allocation
page execute and read and write
3E7E000
stack
page read and write
4741000
heap
page read and write
3EE1000
heap
page read and write
AE4000
heap
page read and write
13E4000
heap
page read and write
4371000
heap
page read and write
497F000
stack
page read and write
4371000
heap
page read and write
5011000
heap
page read and write
4E30000
direct allocation
page execute and read and write
757000
heap
page read and write
4CA0000
trusted library allocation
page read and write
39AE000
stack
page read and write
3367000
heap
page read and write
5D7E000
stack
page read and write
49B0000
direct allocation
page execute and read and write
4B90000
direct allocation
page read and write
4371000
heap
page read and write
393F000
stack
page read and write
AE4000
heap
page read and write
433F000
stack
page read and write
A2E000
stack
page read and write
1664000
heap
page read and write
B22000
unkown
page readonly
FEF000
unkown
page execute and read and write
5011000
heap
page read and write
D5A000
unkown
page execute and read and write
1514000
heap
page read and write
427E000
stack
page read and write
32CE000
stack
page read and write
12A6000
heap
page read and write
4371000
heap
page read and write
7B4000
heap
page read and write
581000
unkown
page execute and write copy
E60000
heap
page read and write
1D25E000
stack
page read and write
4371000
heap
page read and write
4AC1000
heap
page read and write
3D3E000
stack
page read and write
4BA1000
heap
page read and write
346F000
stack
page read and write
4AC1000
heap
page read and write
107D000
unkown
page execute and read and write
87C000
unkown
page execute and read and write
4AC1000
heap
page read and write
4741000
heap
page read and write
AE4000
heap
page read and write
B34000
unkown
page readonly
1D0BF000
stack
page read and write
3FEE000
stack
page read and write
5030000
heap
page read and write
5E9000
unkown
page write copy
AFC000
unkown
page readonly
9AE5000
heap
page read and write
7B4000
heap
page read and write
4BA1000
heap
page read and write
5000000
direct allocation
page read and write
AE4000
heap
page read and write
5011000
heap
page read and write
3BF0000
heap
page read and write
15F1000
heap
page read and write
DB0000
unkown
page readonly
7B4000
heap
page read and write
3DCF000
stack
page read and write
1664000
heap
page read and write
FCB000
unkown
page execute and read and write
4AC1000
heap
page read and write
36FE000
stack
page read and write
E50000
direct allocation
page read and write
5011000
heap
page read and write
AE4000
heap
page read and write
4741000
heap
page read and write
4371000
heap
page read and write
36FF000
stack
page read and write
980000
heap
page read and write
383F000
stack
page read and write
AFC000
unkown
page readonly
4811000
heap
page read and write
FCB000
unkown
page execute and read and write
AE4000
heap
page read and write
3E3F000
stack
page read and write
1410000
heap
page read and write
4371000
heap
page read and write
10C6000
unkown
page execute and write copy
4BA1000
heap
page read and write
1431000
heap
page read and write
4371000
heap
page read and write
1514000
heap
page read and write
895000
unkown
page execute and write copy
41AF000
stack
page read and write
426E000
stack
page read and write
4EDB000
stack
page read and write
4360000
direct allocation
page read and write
486F000
stack
page read and write
2C87000
heap
page read and write
1514000
heap
page read and write
3F7F000
stack
page read and write
F53000
heap
page read and write
60FF000
stack
page read and write
AF0000
heap
page read and write
4AC1000
heap
page read and write
7B4000
heap
page read and write
1664000
heap
page read and write
744000
heap
page read and write
15D5000
heap
page read and write
3EE1000
heap
page read and write
45FE000
stack
page read and write
83C000
stack
page read and write
771000
heap
page read and write
5E9000
unkown
page write copy
12A5000
heap
page read and write
12F0000
direct allocation
page read and write
780000
heap
page read and write
4371000
heap
page read and write
4BA1000
heap
page read and write
1360000
heap
page read and write
12F0000
direct allocation
page read and write
1D56E000
stack
page read and write
4EAF000
stack
page read and write
50CE000
stack
page read and write
15EB000
heap
page read and write
4371000
heap
page read and write
1514000
heap
page read and write
1D93D000
stack
page read and write
AE4000
heap
page read and write
4811000
heap
page read and write
373E000
stack
page read and write
511F000
stack
page read and write
4371000
heap
page read and write
1CA0000
heap
page read and write
4371000
heap
page read and write
422F000
stack
page read and write
33E0000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
4AC1000
heap
page read and write
2B10000
direct allocation
page read and write
3E7E000
stack
page read and write
3C2E000
stack
page read and write
15EB000
heap
page read and write
A9E000
stack
page read and write
4BA1000
heap
page read and write
4360000
direct allocation
page read and write
4BA1000
heap
page read and write
2F2E000
stack
page read and write
4371000
heap
page read and write
1664000
heap
page read and write
5011000
heap
page read and write
4BA1000
heap
page read and write
2B27000
heap
page read and write
1D35F000
stack
page read and write
7B4000
heap
page read and write
119C000
unkown
page execute and read and write
FEF000
unkown
page execute and read and write
4DB0000
direct allocation
page execute and read and write
4B90000
direct allocation
page read and write
393F000
stack
page read and write
80F0000
heap
page read and write
76C000
heap
page read and write
B10000
unkown
page readonly
4AC1000
heap
page read and write
4741000
heap
page read and write
5011000
heap
page read and write
757000
heap
page read and write
B34000
unkown
page readonly
1D4FE000
stack
page read and write
4AC1000
heap
page read and write
4AC1000
heap
page read and write
9EE000
stack
page read and write
4AC1000
heap
page read and write
4360000
direct allocation
page read and write
4E30000
direct allocation
page execute and read and write
E50000
direct allocation
page read and write
406F000
stack
page read and write
4AB0000
heap
page read and write
44BF000
stack
page read and write
5E2000
unkown
page execute and read and write
36AE000
stack
page read and write
E19000
unkown
page read and write
4BA1000
heap
page read and write
FCB000
unkown
page execute and read and write
1514000
heap
page read and write
473F000
stack
page read and write
7B5000
heap
page read and write
4371000
heap
page read and write
1514000
heap
page read and write
4E30000
direct allocation
page execute and read and write
13E0000
heap
page read and write
1419000
heap
page read and write
4AE0000
heap
page read and write
5011000
heap
page read and write
5D35000
heap
page read and write
7B4000
heap
page read and write
4371000
heap
page read and write
34A4000
heap
page read and write
4371000
heap
page read and write
4E0000
heap
page read and write
5011000
heap
page read and write
A61000
unkown
page execute read
2CAE000
stack
page read and write
4A20000
direct allocation
page execute and read and write
AE4000
heap
page read and write
B2C000
unkown
page write copy
4AC1000
heap
page read and write
1006000
unkown
page execute and write copy
314F000
stack
page read and write
895000
unkown
page execute and write copy
3EE1000
heap
page read and write
3ABE000
stack
page read and write
896000
unkown
page execute and write copy
51BE000
stack
page read and write
1D52E000
stack
page read and write
4AC1000
heap
page read and write
15DC000
heap
page read and write
4371000
heap
page read and write
37FF000
stack
page read and write
1D83D000
stack
page read and write
7B4000
heap
page read and write
555D000
stack
page read and write
2FBE000
stack
page read and write
A30000
unkown
page execute and read and write
4B8F000
stack
page read and write
5D36000
heap
page read and write
1D795000
heap
page read and write
182D000
heap
page read and write
44EE000
stack
page read and write
7B4000
heap
page read and write
4AC1000
heap
page read and write
4741000
heap
page read and write
DB1000
unkown
page execute and write copy
5620000
direct allocation
page execute and read and write
46FF000
stack
page read and write
5011000
heap
page read and write
4AC1000
heap
page read and write
4BA1000
heap
page read and write
3E6F000
stack
page read and write
12B8000
heap
page read and write
1664000
heap
page read and write
138F000
heap
page read and write
4741000
heap
page read and write
13E4000
heap
page read and write
3BF1000
heap
page read and write
4360000
direct allocation
page read and write
50A0000
direct allocation
page execute and read and write
9EE000
stack
page read and write
366F000
stack
page read and write
5011000
heap
page read and write
AE4000
heap
page read and write
B22000
unkown
page readonly
2E70000
heap
page read and write
12A2000
heap
page read and write
51D0000
direct allocation
page execute and read and write
D6E000
unkown
page execute and read and write
41FF000
stack
page read and write
581000
unkown
page execute and write copy
1664000
heap
page read and write
1514000
heap
page read and write
44FE000
stack
page read and write
413E000
stack
page read and write
5011000
heap
page read and write
4371000
heap
page read and write
1664000
heap
page read and write
7B4000
heap
page read and write
131A000
heap
page read and write
4D6F000
stack
page read and write
4371000
heap
page read and write
4AC1000
heap
page read and write
4970000
direct allocation
page execute and read and write
5011000
heap
page read and write
437E000
stack
page read and write
4741000
heap
page read and write
E50000
direct allocation
page read and write
4D30000
direct allocation
page execute and read and write
119D000
unkown
page execute and write copy
40FE000
stack
page read and write
7B4000
heap
page read and write
886000
unkown
page execute and read and write
5D30000
heap
page read and write
1006000
unkown
page execute and write copy
32AF000
stack
page read and write
4AC1000
heap
page read and write
980000
heap
page read and write
5C53000
heap
page read and write
F48000
heap
page read and write
1D6A2000
heap
page read and write
1CFBE000
stack
page read and write
5480000
heap
page read and write
347F000
stack
page read and write
378F000
stack
page read and write
3FBF000
stack
page read and write
2D3E000
stack
page read and write
433F000
stack
page read and write
42EF000
stack
page read and write
446E000
stack
page read and write
5FFE000
stack
page read and write
1514000
heap
page read and write
12F0000
direct allocation
page read and write
AE4000
heap
page read and write
3E3F000
stack
page read and write
75F000
heap
page read and write
15D6000
heap
page read and write
5011000
heap
page read and write
4AC1000
heap
page read and write
45BF000
stack
page read and write
3BEF000
stack
page read and write
1005000
unkown
page execute and read and write
1514000
heap
page read and write
1D7EF000
stack
page read and write
4BB0000
heap
page read and write
3590000
trusted library allocation
page read and write
A60000
unkown
page readonly
7B4000
heap
page read and write
4371000
heap
page read and write
35BE000
stack
page read and write
4760000
heap
page read and write
1664000
heap
page read and write
3FBE000
stack
page read and write
4AC1000
heap
page read and write
4F7E000
stack
page read and write
484E000
stack
page read and write
F9E000
stack
page read and write
984000
heap
page read and write
75E000
heap
page read and write
7B4000
heap
page read and write
2B10000
direct allocation
page read and write
5011000
heap
page read and write
37AF000
stack
page read and write
A61000
unkown
page execute read
5011000
heap
page read and write
1514000
heap
page read and write
3C3E000
stack
page read and write
4D40000
direct allocation
page execute and read and write
7B4000
heap
page read and write
E12000
unkown
page execute and read and write
4A00000
direct allocation
page execute and read and write
4B90000
direct allocation
page read and write
1CF0000
heap
page read and write
7B4000
heap
page read and write
4BA1000
heap
page read and write
5E9000
unkown
page read and write
36EF000
stack
page read and write
12B2000
heap
page read and write
7B4000
heap
page read and write
984000
heap
page read and write
585D000
stack
page read and write
4741000
heap
page read and write
4370000
heap
page read and write
4741000
heap
page read and write
5011000
heap
page read and write
1260000
unkown
page execute and read and write
4BA1000
heap
page read and write
E6B000
heap
page read and write
181A000
heap
page read and write
B30000
unkown
page write copy
1A10000
heap
page read and write
36BF000
stack
page read and write
4AC1000
heap
page read and write
4371000
heap
page read and write
4371000
heap
page read and write
B2C000
unkown
page write copy
F16000
heap
page read and write
4AC1000
heap
page read and write
408E000
stack
page read and write
4371000
heap
page read and write
5011000
heap
page read and write
40BF000
stack
page read and write
AF5000
stack
page read and write
7B4000
heap
page read and write
1514000
heap
page read and write
53C000
stack
page read and write
AE0000
heap
page read and write
4AEF000
stack
page read and write
7B4000
heap
page read and write
4371000
heap
page read and write
B11000
unkown
page execute and write copy
5011000
heap
page read and write
69F000
stack
page read and write
7B4000
heap
page read and write
4990000
direct allocation
page execute and read and write
13E4000
heap
page read and write
4741000
heap
page read and write
48AE000
stack
page read and write
1D66E000
stack
page read and write
4AC1000
heap
page read and write
AE4000
heap
page read and write
35BE000
stack
page read and write
4AC1000
heap
page read and write
4AC1000
heap
page read and write
347E000
stack
page read and write
7B4000
heap
page read and write
569E000
stack
page read and write
423F000
stack
page read and write
4800000
direct allocation
page read and write
432E000
stack
page read and write
4741000
heap
page read and write
A61000
unkown
page execute read
4AC1000
heap
page read and write
4BA1000
heap
page read and write
7B4000
heap
page read and write
4371000
heap
page read and write
4371000
heap
page read and write
1514000
heap
page read and write
2F7F000
stack
page read and write
4F40000
direct allocation
page read and write
404F000
stack
page read and write
1514000
heap
page read and write
4AC6000
heap
page read and write
490F000
stack
page read and write
AE4000
heap
page read and write
4990000
direct allocation
page execute and read and write
7B4000
heap
page read and write
84D000
unkown
page execute and read and write
15EB000
heap
page read and write
4BA1000
heap
page read and write
5C53000
heap
page read and write
D90000
heap
page read and write
4371000
heap
page read and write
5011000
heap
page read and write
1664000
heap
page read and write
1514000
heap
page read and write
15EB000
heap
page read and write
472F000
stack
page read and write
5000000
direct allocation
page read and write
4741000
heap
page read and write
7B4000
heap
page read and write
1D76F000
stack
page read and write
1514000
heap
page read and write
4741000
heap
page read and write
54A0000
direct allocation
page read and write
4741000
heap
page read and write
3BFF000
stack
page read and write
1D16E000
stack
page read and write
4AC1000
heap
page read and write
13E4000
heap
page read and write
3BFE000
stack
page read and write
1358000
heap
page read and write
5610000
direct allocation
page execute and read and write
293E000
stack
page read and write
5011000
heap
page read and write
4BA1000
heap
page read and write
12BF000
heap
page read and write
4741000
heap
page read and write
4371000
heap
page read and write
54D000
stack
page read and write
476E000
stack
page read and write
304E000
stack
page read and write
4741000
heap
page read and write
5011000
heap
page read and write
47F0000
heap
page read and write
FF7000
unkown
page execute and read and write
5011000
heap
page read and write
4371000
heap
page read and write
4AC1000
heap
page read and write
412E000
stack
page read and write
5011000
heap
page read and write
1363000
heap
page read and write
7B4000
heap
page read and write
4371000
heap
page read and write
729000
heap
page read and write
1514000
heap
page read and write
4371000
heap
page read and write
382F000
stack
page read and write
4AC1000
heap
page read and write
AFC000
unkown
page readonly
E50000
direct allocation
page read and write
5110000
trusted library allocation
page read and write
1664000
heap
page read and write
4990000
direct allocation
page execute and read and write
3AAF000
stack
page read and write
4371000
heap
page read and write
4741000
heap
page read and write
580000
unkown
page readonly
4371000
heap
page read and write
4AC1000
heap
page read and write
4371000
heap
page read and write
4BA1000
heap
page read and write
4371000
heap
page read and write
36FE000
stack
page read and write
3A0F000
stack
page read and write
1DA7C000
stack
page read and write
4385000
heap
page read and write
318E000
stack
page read and write
4741000
heap
page read and write
AB0000
heap
page read and write
4371000
heap
page read and write
E50000
direct allocation
page read and write
5000000
direct allocation
page read and write
A61000
unkown
page execute read
4CFF000
stack
page read and write
4470000
trusted library allocation
page read and write
5E7F000
stack
page read and write
13CE000
stack
page read and write
4371000
heap
page read and write
4D30000
direct allocation
page execute and read and write
4371000
heap
page read and write
2CFF000
stack
page read and write
122F000
stack
page read and write
5FBF000
stack
page read and write
2B6E000
stack
page read and write
1243000
heap
page read and write
153F000
stack
page read and write
5011000
heap
page read and write
1664000
heap
page read and write
143C000
stack
page read and write
4AC1000
heap
page read and write
4390000
heap
page read and write
13E4000
heap
page read and write
4741000
heap
page read and write
2B10000
direct allocation
page read and write
580000
unkown
page read and write
12F0000
direct allocation
page read and write
3ABE000
stack
page read and write
4371000
heap
page read and write
774000
unkown
page execute and read and write
4741000
heap
page read and write
51E0000
direct allocation
page execute and read and write
2BFE000
stack
page read and write
49E0000
direct allocation
page execute and read and write
AE4000
heap
page read and write
FF7000
unkown
page execute and read and write
9F0000
heap
page read and write
B34000
unkown
page readonly
4F40000
direct allocation
page read and write
AE4000
heap
page read and write
423E000
stack
page read and write
71D000
heap
page read and write
AE4000
heap
page read and write
61D0000
heap
page read and write
2350000
trusted library allocation
page read and write
1414000
heap
page read and write
3EE1000
heap
page read and write
B60000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
5011000
heap
page read and write
4EEE000
stack
page read and write
49EE000
stack
page read and write
3590000
trusted library allocation
page read and write
480E000
stack
page read and write
4741000
heap
page read and write
50C0000
direct allocation
page execute and read and write
3A3F000
stack
page read and write
E50000
direct allocation
page read and write
4371000
heap
page read and write
7B4000
heap
page read and write
4AC1000
heap
page read and write
3F6E000
stack
page read and write
7B4000
heap
page read and write
4BA1000
heap
page read and write
AE0000
heap
page read and write
4AC1000
heap
page read and write
4741000
heap
page read and write
87C000
unkown
page execute and read and write
1310000
heap
page read and write
1D8CE000
stack
page read and write
75E000
heap
page read and write
331F000
stack
page read and write
1664000
heap
page read and write
1431000
heap
page read and write
4AC1000
heap
page read and write
5190000
direct allocation
page execute and read and write
1218000
heap
page read and write
A61000
unkown
page execute read
1664000
heap
page read and write
1514000
heap
page read and write
4371000
heap
page read and write
3E0E000
stack
page read and write
4371000
heap
page read and write
5630000
direct allocation
page execute and read and write
3D81000
heap
page read and write
7B4000
heap
page read and write
61CE000
heap
page read and write
1664000
heap
page read and write
4E50000
direct allocation
page execute and read and write
984000
heap
page read and write
7B4000
heap
page read and write
4BA1000
heap
page read and write
A80000
heap
page read and write
B22000
unkown
page readonly
1288000
heap
page read and write
4910000
trusted library allocation
page read and write
1514000
heap
page read and write
2E7B000
heap
page read and write
337F000
stack
page read and write
4AC1000
heap
page read and write
1514000
heap
page read and write
5011000
heap
page read and write
12A5000
heap
page read and write
5011000
heap
page read and write
4BB5000
heap
page read and write
32FF000
stack
page read and write
1D10E000
stack
page read and write
771000
heap
page read and write
10B6000
unkown
page execute and read and write
5000000
direct allocation
page read and write
1514000
heap
page read and write
3E7F000
stack
page read and write
E50000
direct allocation
page read and write
49AF000
stack
page read and write
11EF000
stack
page read and write
4811000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
4371000
heap
page read and write
4741000
heap
page read and write
5011000
heap
page read and write
17D0000
heap
page read and write
2B10000
direct allocation
page read and write
337E000
stack
page read and write
15D8000
heap
page read and write
1431000
heap
page read and write
4AC1000
heap
page read and write
4371000
heap
page read and write
4380000
heap
page read and write
1005000
unkown
page execute and read and write
3FFE000
stack
page read and write
5011000
heap
page read and write
4371000
heap
page read and write
4871000
direct allocation
page read and write
4371000
heap
page read and write
15B0000
heap
page read and write
AE4000
heap
page read and write
1005000
unkown
page execute and write copy
47EF000
stack
page read and write
771000
heap
page read and write
5011000
heap
page read and write
3EE1000
heap
page read and write
2350000
trusted library allocation
page read and write
35BF000
stack
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
506E000
stack
page read and write
33E0000
trusted library allocation
page read and write
B2C000
unkown
page read and write
5011000
heap
page read and write
4960000
direct allocation
page execute and read and write
9A0000
heap
page read and write
5011000
heap
page read and write
7B4000
heap
page read and write
4B2E000
stack
page read and write
4E30000
direct allocation
page execute and read and write
5011000
heap
page read and write
AE4000
heap
page read and write
15CF000
heap
page read and write
342E000
stack
page read and write
1664000
heap
page read and write
4371000
heap
page read and write
4371000
heap
page read and write
581000
unkown
page execute and write copy
2B10000
direct allocation
page read and write
9B000
stack
page read and write
7B4000
heap
page read and write
41CD000
stack
page read and write
5011000
heap
page read and write
1664000
heap
page read and write
396F000
stack
page read and write
BF2000
unkown
page execute and read and write
501F000
stack
page read and write
84D000
unkown
page execute and read and write
7B4000
heap
page read and write
4371000
heap
page read and write
4A8E000
stack
page read and write
2B10000
direct allocation
page read and write
4DAE000
stack
page read and write
4AC0000
heap
page read and write
4BA1000
heap
page read and write
3A4E000
stack
page read and write
7B4000
heap
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
4AC1000
heap
page read and write
45C000
stack
page read and write
1514000
heap
page read and write
3D81000
heap
page read and write
4371000
heap
page read and write
763000
heap
page read and write
4741000
heap
page read and write
456F000
stack
page read and write
BF2000
unkown
page execute and read and write
4EC0000
direct allocation
page execute and read and write
5011000
heap
page read and write
A60000
unkown
page readonly
4AC1000
heap
page read and write
129F000
heap
page read and write
4371000
heap
page read and write
1D3FE000
stack
page read and write
4BA1000
heap
page read and write
EDC000
heap
page read and write
BF2000
unkown
page execute and read and write
1514000
heap
page read and write
15E2000
heap
page read and write
12F0000
direct allocation
page read and write
2C6F000
stack
page read and write
4741000
heap
page read and write
61C1000
heap
page read and write
5011000
heap
page read and write
7B4000
heap
page read and write
AE4000
heap
page read and write
15F0000
heap
page read and write
AE4000
heap
page read and write
D40000
heap
page read and write
7B4000
heap
page read and write
4DEF000
stack
page read and write
6D0000
heap
page read and write
4BA1000
heap
page read and write
3FBE000
stack
page read and write
B90000
heap
page read and write
12B2000
heap
page read and write
AE4000
heap
page read and write
4BA1000
heap
page read and write
3D81000
heap
page read and write
4BA1000
heap
page read and write
4980000
direct allocation
page execute and read and write
4371000
heap
page read and write
771000
heap
page read and write
5011000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
135E000
heap
page read and write
1413000
heap
page read and write
34A0000
heap
page read and write
317F000
stack
page read and write
12AA000
heap
page read and write
6AA000
heap
page read and write
5011000
heap
page read and write
15A0000
heap
page read and write
4BA1000
heap
page read and write
7B4000
heap
page read and write
1514000
heap
page read and write
7B4000
heap
page read and write
36BF000
stack
page read and write
5011000
heap
page read and write
34BE000
stack
page read and write
3D2F000
stack
page read and write
2A3F000
stack
page read and write
2350000
trusted library allocation
page read and write
7B4000
heap
page read and write
B30000
unkown
page write copy
5EB000
unkown
page execute and read and write
3A2F000
stack
page read and write
4AB4000
heap
page read and write
4741000
heap
page read and write
335C000
stack
page read and write
4AC1000
heap
page read and write
13E4000
heap
page read and write
3EE1000
heap
page read and write
141A000
heap
page read and write
16CE000
stack
page read and write
4DD0000
direct allocation
page execute and read and write
BC1000
unkown
page execute and read and write
4371000
heap
page read and write
1814000
heap
page read and write
4BA1000
heap
page read and write
507F000
stack
page read and write
2A50000
direct allocation
page read and write
5011000
heap
page read and write
4371000
heap
page read and write
4B90000
direct allocation
page read and write
B8E000
stack
page read and write
43BE000
stack
page read and write
7B4000
heap
page read and write
4371000
heap
page read and write
40AE000
stack
page read and write
5011000
heap
page read and write
5011000
heap
page read and write
28FE000
stack
page read and write
4D90000
direct allocation
page execute and read and write
5000000
direct allocation
page read and write
1D4CD000
stack
page read and write
1660000
heap
page read and write
5010000
heap
page read and write
6EF000
heap
page read and write
3EBE000
stack
page read and write
4741000
heap
page read and write
1514000
heap
page read and write
4371000
heap
page read and write
4371000
heap
page read and write
1514000
heap
page read and write
468F000
stack
page read and write
1664000
heap
page read and write
4AC1000
heap
page read and write
494E000
stack
page read and write
5011000
heap
page read and write
2C80000
heap
page read and write
5E2000
unkown
page execute and read and write
2DCE000
stack
page read and write
5011000
heap
page read and write
4840000
trusted library allocation
page read and write
4800000
direct allocation
page read and write
3F7F000
stack
page read and write
E40000
heap
page read and write
4AD0000
heap
page read and write
41FF000
stack
page read and write
7B4000
heap
page read and write
766000
heap
page read and write
190E000
stack
page read and write
B30000
unkown
page write copy
5000000
direct allocation
page read and write
2F7E000
stack
page read and write
3D3E000
stack
page read and write
575D000
stack
page read and write
F18000
heap
page read and write
33CF000
stack
page read and write
1514000
heap
page read and write
5030000
direct allocation
page read and write
1D3BC000
stack
page read and write
4E90000
direct allocation
page execute and read and write
5640000
direct allocation
page execute and read and write
A60000
unkown
page readonly
387E000
stack
page read and write
4741000
heap
page read and write
E6E000
heap
page read and write
1005000
unkown
page execute and write copy
4371000
heap
page read and write
4D60000
direct allocation
page execute and read and write
4741000
heap
page read and write
7B4000
heap
page read and write
4371000
heap
page read and write
3EE1000
heap
page read and write
7B4000
heap
page read and write
3BFE000
stack
page read and write
E1B000
unkown
page execute and read and write
50C0000
direct allocation
page execute and read and write
13F0000
heap
page read and write
5011000
heap
page read and write
3FAF000
stack
page read and write
4D10000
direct allocation
page execute and read and write
458E000
stack
page read and write
93E000
stack
page read and write
2350000
trusted library allocation
page read and write
4741000
heap
page read and write
781000
heap
page read and write
4741000
heap
page read and write
15DA000
heap
page read and write
11DB000
stack
page read and write
6AE000
heap
page read and write
4371000
heap
page read and write
4371000
heap
page read and write
5011000
heap
page read and write
1514000
heap
page read and write
354E000
stack
page read and write
2DEE000
stack
page read and write
4371000
heap
page read and write
4371000
heap
page read and write
5011000
heap
page read and write
4BA1000
heap
page read and write
7B4000
heap
page read and write
D8D000
stack
page read and write
7B4000
heap
page read and write
3F0F000
stack
page read and write
7B4000
heap
page read and write
4ABF000
stack
page read and write
5E9000
unkown
page read and write
4741000
heap
page read and write
7B4000
heap
page read and write
45AE000
stack
page read and write
4B90000
direct allocation
page read and write
BCD000
unkown
page execute and read and write
7B4000
heap
page read and write
3BF1000
heap
page read and write
3AEE000
stack
page read and write
46EE000
stack
page read and write
7B4000
heap
page read and write
5011000
heap
page read and write
2B10000
direct allocation
page read and write
4741000
heap
page read and write
1664000
heap
page read and write
AE4000
heap
page read and write
C8E000
stack
page read and write
5011000
heap
page read and write
12B2000
heap
page read and write
3DEF000
stack
page read and write
364F000
stack
page read and write
AE4000
heap
page read and write
2C7E000
stack
page read and write
5011000
heap
page read and write
2BBE000
stack
page read and write
5011000
heap
page read and write
5E9000
unkown
page write copy
13FE000
stack
page read and write
4B90000
direct allocation
page read and write
4741000
heap
page read and write
5650000
direct allocation
page execute and read and write
895000
unkown
page execute and write copy
1664000
heap
page read and write
2350000
trusted library allocation
page read and write
E50000
direct allocation
page read and write
1664000
heap
page read and write
340E000
stack
page read and write
7B4000
heap
page read and write
BE5000
heap
page read and write
5011000
heap
page read and write
39BE000
stack
page read and write
2D8F000
stack
page read and write
2EEF000
stack
page read and write
34AE000
stack
page read and write
5011000
heap
page read and write
321E000
stack
page read and write
4AC1000
heap
page read and write
13EF000
stack
page read and write
1664000
heap
page read and write
149F000
stack
page read and write
4741000
heap
page read and write
4AC1000
heap
page read and write
766000
heap
page read and write
4360000
direct allocation
page read and write
10C5000
unkown
page execute and read and write
5011000
heap
page read and write
4371000
heap
page read and write
5011000
heap
page read and write
307F000
stack
page read and write
5011000
heap
page read and write
4741000
heap
page read and write
27BF000
stack
page read and write
3EE1000
heap
page read and write
4741000
heap
page read and write
4747000
heap
page read and write
7B4000
heap
page read and write
1664000
heap
page read and write
11C0000
heap
page read and write
7B4000
heap
page read and write
5011000
heap
page read and write
430E000
stack
page read and write
13E4000
heap
page read and write
1580000
heap
page read and write
4C6E000
stack
page read and write
1D790000
heap
page read and write
5011000
heap
page read and write
3EE1000
heap
page read and write
1535000
stack
page read and write
D90000
heap
page read and write
4360000
direct allocation
page read and write
7B4000
heap
page read and write
2B10000
direct allocation
page read and write
1377000
heap
page read and write
4BA1000
heap
page read and write
7B4000
heap
page read and write
CDA000
stack
page read and write
1D00E000
stack
page read and write
E50000
direct allocation
page read and write
7B4000
heap
page read and write
1664000
heap
page read and write
1514000
heap
page read and write
49C0000
direct allocation
page execute and read and write
454F000
stack
page read and write
49D0000
direct allocation
page execute and read and write
4811000
heap
page read and write
984000
heap
page read and write
5011000
heap
page read and write
316F000
stack
page read and write
2B10000
direct allocation
page read and write
15EB000
heap
page read and write
1664000
heap
page read and write
483F000
stack
page read and write
4371000
heap
page read and write
1D26F000
stack
page read and write
1D1FF000
stack
page read and write
774000
unkown
page execute and read and write
1D60C000
stack
page read and write
B2C000
unkown
page write copy
1514000
heap
page read and write
7B4000
heap
page read and write
4AC1000
heap
page read and write
12F0000
direct allocation
page read and write
15D3000
heap
page read and write
397E000
stack
page read and write
3A7F000
stack
page read and write
13F8000
heap
page read and write
1514000
heap
page read and write
1514000
heap
page read and write
5090000
direct allocation
page execute and read and write
336B000
heap
page read and write
There are 1744 hidden memdumps, click here to show them.