IOC Report
h3yRbjNWk1.exe

loading gif

Files

File Path
Type
Category
Malicious
h3yRbjNWk1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\1000350002\6a8d4317d4.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\num[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000349001\ea2c7beae0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000357001\4af6eb3e1f.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000401001\num.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\8X6R8OO7U6CNLMSAL.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\K46P1Y9YPMFY7JJQPHSRNJ30DZ0HXET.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\TG9CYTS7E59ZPZXS3YT9LXONWNDMZM8.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\4af6eb3e1f.exe.log
CSV text
dropped
C:\Windows\Tasks\skotes.job
data
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\h3yRbjNWk1.exe
"C:\Users\user\Desktop\h3yRbjNWk1.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1000349001\ea2c7beae0.exe
"C:\Users\user\AppData\Local\Temp\1000349001\ea2c7beae0.exe"
malicious
C:\Users\user\1000350002\6a8d4317d4.exe
"C:\Users\user\1000350002\6a8d4317d4.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000349001\ea2c7beae0.exe
"C:\Users\user\AppData\Local\Temp\1000349001\ea2c7beae0.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000357001\4af6eb3e1f.exe
"C:\Users\user\AppData\Local\Temp\1000357001\4af6eb3e1f.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\1000350002\6a8d4317d4.exe
"C:\Users\user\1000350002\6a8d4317d4.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000401001\num.exe
"C:\Users\user\AppData\Local\Temp\1000401001\num.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000349001\ea2c7beae0.exe
"C:\Users\user\AppData\Local\Temp\1000349001\ea2c7beae0.exe"
malicious
C:\Users\user\1000350002\6a8d4317d4.exe
"C:\Users\user\1000350002\6a8d4317d4.exe"
malicious
C:\Users\user\AppData\Local\Temp\TG9CYTS7E59ZPZXS3YT9LXONWNDMZM8.exe
"C:\Users\user\AppData\Local\Temp\TG9CYTS7E59ZPZXS3YT9LXONWNDMZM8.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000401001\num.exe
"C:\Users\user\AppData\Local\Temp\1000401001\num.exe"
malicious
C:\Users\user\AppData\Local\Temp\K46P1Y9YPMFY7JJQPHSRNJ30DZ0HXET.exe
"C:\Users\user\AppData\Local\Temp\K46P1Y9YPMFY7JJQPHSRNJ30DZ0HXET.exe"
malicious
C:\Users\user\AppData\Local\Temp\8X6R8OO7U6CNLMSAL.exe
"C:\Users\user\AppData\Local\Temp\8X6R8OO7U6CNLMSAL.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.37/S
unknown
malicious
http://185.215.113.37/L
unknown
malicious
http://185.215.113.37/M
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpo
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpv
unknown
malicious
studennotediw.store
malicious
http://185.215.113.37/v
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phps
unknown
malicious
http://185.215.113.37/s
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpd
unknown
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900t
unknown
malicious
http://185.215.113.37/ata
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
eaglepawnoy.store
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.43/Zu7JuNko/index.php395d7fac00b58987e8fff7a7df309c5441f
unknown
https://www.cloudflare.com/learning/acces
unknown
http://185.215.113.103/luma/random.exe
185.215.113.103
https://community.steamstat=_
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://licendfilteo.site/
unknown
https://sergei-esenin.com/
unknown
https://community.steamstatic.com/public/css/globalv2.css?v=dQy8Omh4p9PH&l=english
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://185.215.113.43/Zu7JuNko/index.phpnu
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://sergei-esenin.com/rs
unknown
http://185.215.113.43/Zu7JuNko/index.php38c2817dba29a4b5b25dcf03
unknown
https://sergei-esenin.com/pki/ceP
unknown
https://eaglepawnoy.store:443/api4Y
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://sergei-esenin.com/bisy
unknown
https://clearancek.site/J
unknown
https://s.ytimg.com;
unknown
https://eaglepawnoy.store:443/api
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://licendfilteo.site:443/apiH
unknown
https://www.cloudflare.com/learning/a
unknown
https://studennotediw.store:443/api:d
unknown
https://sergei-esenin.com/om
unknown
https://community.steamstatic.com/public/css/skin_1/pr
unknown
https://community.steamstatic.com/public/css/skin_1/profilev2.css?v=t9xiI4DlPpEB&l=english
unknown
http://store.st
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
http://185.215.113.103/mine/random.exeP
unknown
https://www.ecosia.org/newtab/
unknown
https://community.steamstatic.com/p
unknown
https://lv.queniujq.cn
unknown
https://sergei-esenin.com/s.j
unknown
https://www.youtube.com/
unknown
https://licendfilteo.site:443/apiF1
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://sergei-esenin.com/pi
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
http://185.215.113.103/mine/random.exe
unknown
http://185.215.113.43/Zu7JuNko/index.phpded
unknown
http://185.215.113.43/Zu7JuNko/index.phprPe
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://185.215.113.43/Zu7JuNko/index.phpqy
unknown
https://community.steamstatic.com/public/css/promo/summer2017/stickers.css?v=P8gOPraCSjV6&l=engl
unknown
https://community.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL&l=
unknown
https://help.steampowered.com/en/
unknown
http://185.215.113.372
unknown
https://sergei-esenin.com/Cy
unknown
https://sergei-esenin.com/D
unknown
https://community.steamstatic.com/public/javascript/global.js?v=7qlUmHSJhPRN&l=english
unknown
http://185.215.113.43/Zu7JuNko/index.phpC
unknown
https://sergei-esenin.com/5
unknown
https://sergei-esenin.com/6
unknown
http://185.215.113.103/steam/random.exeV;
unknown
http://185.215.113.43/Zu7JuNko/index.phpJ
unknown
http://185.215.113.43/Zu7JuNko/index.phpH
unknown
https://recaptcha.net/recaptcha/;
unknown
https://dissapoiznw.store:443/api
unknown
https://sergei-esenin.com/4
unknown
https://community.steamstatic.com/public/shared/css/shared_responsive.css?v=kR7y
unknown
http://185.215.113.43/Zu7JuNko/index.php4
unknown
https://sergei-esenin.com:443/api4p.default-release/key4.dbPK
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://sergei-esenin.com/Up
unknown
https://community.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://sergei-esenin.com/ia_id
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://community.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://community.steamstatic.com/public/shared/css/buttons.css?v=-WV9f1LdxEjq&l=english
unknown
https://community.steamstatic.com/public/javascript/applications/community/libraries~b28b7af69.js?v=
unknown
https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a61J
unknown
https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a61
unknown
https://sergei-esenin.com/apipE
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
104.21.53.8
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
104.21.53.8
sergei-esenin.com
United States
malicious
185.215.113.37
unknown
Portugal
malicious
104.102.49.254
steamcommunity.com
United States
malicious
185.215.113.16
unknown
Portugal
185.215.113.103
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ea2c7beae0.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
6a8d4317d4.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
num.exe
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection
There are 2 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
651000
unkown
page execute and write copy
malicious
95E000
heap
page read and write
malicious
7C1000
unkown
page execute and read and write
malicious
A51000
unkown
page execute and read and write
malicious
5150000
direct allocation
page read and write
malicious
4F50000
direct allocation
page read and write
malicious
4EC0000
direct allocation
page read and write
malicious
5160000
direct allocation
page read and write
malicious
651000
unkown
page execute and write copy
malicious
A51000
unkown
page execute and read and write
malicious
D21000
unkown
page execute and read and write
malicious
D21000
unkown
page execute and read and write
malicious
651000
unkown
page execute and write copy
malicious
11EE000
heap
page read and write
malicious
94B000
heap
page read and write
malicious
651000
unkown
page execute and write copy
malicious
C47000
heap
page read and write
malicious
4C70000
direct allocation
page read and write
malicious
A51000
unkown
page execute and read and write
malicious
5490000
direct allocation
page read and write
malicious
D21000
unkown
page execute and read and write
malicious
4AE0000
direct allocation
page read and write
malicious
D58000
heap
page read and write
malicious
5210000
direct allocation
page read and write
malicious
162B000
heap
page read and write
malicious
4E20000
direct allocation
page read and write
malicious
438E000
stack
page read and write
838000
heap
page read and write
A99000
heap
page read and write
4411000
heap
page read and write
5543000
trusted library allocation
page read and write
AF4000
heap
page read and write
B31000
unkown
page execute and write copy
5AC8000
trusted library allocation
page read and write
C84000
heap
page read and write
AF4000
heap
page read and write
4851000
heap
page read and write
23C000
unkown
page readonly
13BF000
stack
page read and write
47D0000
direct allocation
page read and write
C84000
heap
page read and write
49A000
unkown
page execute and read and write
4851000
heap
page read and write
16EF000
heap
page read and write
3A0E000
stack
page read and write
59B5000
trusted library allocation
page read and write
3E8F000
stack
page read and write
310F000
stack
page read and write
7E4000
heap
page read and write
A37000
heap
page read and write
5510000
trusted library allocation
page read and write
326F000
stack
page read and write
A51000
unkown
page execute and write copy
1244000
heap
page read and write
C84000
heap
page read and write
47D0000
direct allocation
page read and write
E67000
heap
page read and write
FC0000
heap
page read and write
54C1000
trusted library allocation
page read and write
3390000
direct allocation
page read and write
553C000
trusted library allocation
page read and write
1669000
heap
page read and write
853000
heap
page read and write
54F8000
trusted library allocation
page read and write
4CB0000
direct allocation
page read and write
AAB000
heap
page read and write
3ABF000
stack
page read and write
AF4000
heap
page read and write
4651000
heap
page read and write
13D5000
unkown
page execute and write copy
4D81000
heap
page read and write
4DC0000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
1054000
heap
page read and write
1450000
heap
page read and write
650000
unkown
page readonly
AF4000
heap
page read and write
C5E000
unkown
page execute and read and write
800000
heap
page read and write
561A000
trusted library allocation
page read and write
634000
heap
page read and write
5B9000
unkown
page execute and write copy
AF4000
heap
page read and write
D90000
direct allocation
page read and write
47E1000
heap
page read and write
53A5000
trusted library allocation
page read and write
4AA0000
direct allocation
page execute and read and write
4960000
direct allocation
page read and write
552F000
trusted library allocation
page read and write
B30000
unkown
page read and write
4B1F000
stack
page read and write
5250000
direct allocation
page read and write
53B5000
trusted library allocation
page read and write
3F0F000
stack
page read and write
1D54E000
stack
page read and write
5367000
trusted library allocation
page read and write
337E000
stack
page read and write
4411000
heap
page read and write
54F8000
trusted library allocation
page read and write
A70000
direct allocation
page read and write
7E4000
heap
page read and write
11E0000
heap
page read and write
59EE000
stack
page read and write
C84000
heap
page read and write
7E4000
heap
page read and write
5400000
direct allocation
page execute and read and write
47E1000
heap
page read and write
E2B000
unkown
page execute and write copy
550E000
trusted library allocation
page read and write
49A1000
heap
page read and write
53F0000
direct allocation
page execute and read and write
398F000
stack
page read and write
E22000
heap
page read and write
54C2000
trusted library allocation
page read and write
AF4000
heap
page read and write
4CE1000
heap
page read and write
5543000
trusted library allocation
page read and write
551A000
trusted library allocation
page read and write
5011000
heap
page read and write
C84000
heap
page read and write
634000
heap
page read and write
54F8000
trusted library allocation
page read and write
DAC000
unkown
page execute and write copy
4D10000
heap
page execute and read and write
47E1000
heap
page read and write
550D000
trusted library allocation
page read and write
119E000
stack
page read and write
390E000
stack
page read and write
716E000
stack
page read and write
565E000
stack
page read and write
52D0000
direct allocation
page execute and read and write
376F000
stack
page read and write
4B40000
trusted library allocation
page read and write
46AE000
stack
page read and write
49DF000
stack
page read and write
5312000
trusted library allocation
page read and write
27B0000
direct allocation
page read and write
5354000
trusted library allocation
page read and write
4E20000
direct allocation
page execute and read and write
36DF000
stack
page read and write
AF4000
heap
page read and write
53E0000
direct allocation
page execute and read and write
53C6000
trusted library allocation
page read and write
5011000
heap
page read and write
47E1000
heap
page read and write
33CB000
heap
page read and write
2E60000
direct allocation
page read and write
836000
heap
page read and write
D1D000
unkown
page execute and read and write
4411000
heap
page read and write
D79000
unkown
page execute and write copy
33CE000
stack
page read and write
410F000
stack
page read and write
5011000
heap
page read and write
40DF000
stack
page read and write
5A10000
trusted library allocation
page read and write
C84000
heap
page read and write
AF4000
heap
page read and write
1330000
direct allocation
page read and write
3390000
direct allocation
page read and write
3F4E000
stack
page read and write
4CB0000
direct allocation
page read and write
6215000
heap
page read and write
A29000
heap
page read and write
328E000
stack
page read and write
4CC1000
heap
page read and write
A51000
unkown
page execute and write copy
4CC1000
heap
page read and write
54CE000
stack
page read and write
47E1000
heap
page read and write
67B000
unkown
page write copy
FC4000
heap
page read and write
4411000
heap
page read and write
4651000
heap
page read and write
5543000
trusted library allocation
page read and write
59AA000
trusted library allocation
page read and write
4411000
heap
page read and write
AAA000
heap
page read and write
2F8E000
stack
page read and write
47E1000
heap
page read and write
AC6000
heap
page read and write
4651000
heap
page read and write
473F000
stack
page read and write
634000
heap
page read and write
51AF000
stack
page read and write
4A41000
heap
page read and write
4CC1000
heap
page read and write
12D4000
heap
page read and write
314E000
stack
page read and write
A48000
heap
page read and write
3C1F000
stack
page read and write
4650000
heap
page read and write
7E4000
heap
page read and write
59A5000
trusted library allocation
page read and write
C84000
heap
page read and write
AAB000
heap
page read and write
59A6000
trusted library allocation
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
4E20000
remote allocation
page read and write
C40000
heap
page read and write
4C70000
direct allocation
page read and write
411E000
stack
page read and write
107D000
heap
page read and write
47E1000
heap
page read and write
1B09F000
stack
page read and write
552F000
trusted library allocation
page read and write
C84000
heap
page read and write
4F90000
direct allocation
page execute and read and write
327F000
stack
page read and write
328F000
stack
page read and write
650000
unkown
page readonly
A15000
heap
page read and write
9FE000
stack
page read and write
1676000
heap
page read and write
54E8000
trusted library allocation
page read and write
ACA000
unkown
page execute and write copy
453F000
stack
page read and write
262E000
stack
page read and write
5110000
trusted library allocation
page read and write
4DB0000
heap
page read and write
D44000
heap
page read and write
54F8000
trusted library allocation
page read and write
54F8000
trusted library allocation
page read and write
E29000
unkown
page execute and write copy
10B0000
direct allocation
page read and write
47E0000
heap
page read and write
B4C000
stack
page read and write
E58000
heap
page read and write
A50000
unkown
page readonly
DB3000
heap
page read and write
2900000
heap
page read and write
AB9000
unkown
page write copy
13FB000
heap
page read and write
1218000
unkown
page execute and read and write
4CF6000
trusted library allocation
page read and write
4651000
heap
page read and write
12D4000
heap
page read and write
634000
heap
page read and write
503D000
stack
page read and write
54F7000
trusted library allocation
page read and write
5384000
trusted library allocation
page read and write
4C50000
direct allocation
page execute and read and write
3390000
direct allocation
page read and write
7E4000
heap
page read and write
1119000
unkown
page execute and read and write
DA2000
unkown
page execute and read and write
4651000
heap
page read and write
10C4000
heap
page read and write
53B3000
trusted library allocation
page read and write
53E3000
trusted library allocation
page read and write
103E000
heap
page read and write
634000
heap
page read and write
4EB0000
direct allocation
page read and write
4DB1000
heap
page read and write
DAE000
heap
page read and write
4EB0000
direct allocation
page read and write
1330000
direct allocation
page read and write
4F50000
direct allocation
page read and write
574F000
stack
page read and write
6DC000
stack
page read and write
4DB1000
heap
page read and write
134C000
heap
page read and write
4C20000
direct allocation
page execute and read and write
54F8000
trusted library allocation
page read and write
538C000
trusted library allocation
page read and write
598F000
trusted library allocation
page read and write
5386000
trusted library allocation
page read and write
102F000
heap
page read and write
2907000
heap
page read and write
A60000
heap
page read and write
5955000
trusted library allocation
page read and write
4EB0000
direct allocation
page read and write
4CAF000
stack
page read and write
4D05000
trusted library allocation
page read and write
1B9000
unkown
page write copy
1071000
heap
page read and write
B30000
unkown
page read and write
371F000
stack
page read and write
FFE000
heap
page read and write
A70000
direct allocation
page read and write
53A0000
direct allocation
page execute and read and write
4F70000
direct allocation
page execute and read and write
318E000
stack
page read and write
4CB0000
direct allocation
page read and write
4DA0000
heap
page read and write
1D09E000
stack
page read and write
50D0000
direct allocation
page execute and read and write
5011000
heap
page read and write
53AD000
trusted library allocation
page read and write
4CC1000
heap
page read and write
4E00000
direct allocation
page execute and read and write
53C6000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
C84000
heap
page read and write
54C4000
trusted library allocation
page read and write
55CC000
trusted library allocation
page read and write
427E000
stack
page read and write
AC2000
heap
page read and write
AF4000
heap
page read and write
11E4000
heap
page read and write
ABF000
heap
page read and write
54F3000
trusted library allocation
page read and write
1244000
heap
page read and write
42CE000
stack
page read and write
3067000
heap
page read and write
554D000
trusted library allocation
page read and write
4CC1000
heap
page read and write
309F000
stack
page read and write
5375000
trusted library allocation
page read and write
BBF000
stack
page read and write
AF4000
heap
page read and write
478E000
stack
page read and write
54F0000
trusted library allocation
page read and write
D95000
unkown
page execute and write copy
855000
heap
page read and write
5010000
direct allocation
page execute and read and write
1244000
heap
page read and write
E77000
heap
page read and write
1D12D000
stack
page read and write
A3E000
stack
page read and write
5508000
trusted library allocation
page read and write
AAB000
heap
page read and write
545D000
trusted library allocation
page read and write
4CB0000
direct allocation
page read and write
47E1000
heap
page read and write
C84000
heap
page read and write
3EBE000
stack
page read and write
7E4000
heap
page read and write
AF4000
heap
page read and write
2FCF000
stack
page read and write
10C0000
heap
page read and write
5A33000
trusted library allocation
page read and write
AF4000
heap
page read and write
3D5E000
stack
page read and write
5504000
trusted library allocation
page read and write
535C000
trusted library allocation
page read and write
DAA000
heap
page read and write
44BE000
stack
page read and write
4BAE000
stack
page read and write
26B0000
direct allocation
page read and write
5A0B000
trusted library allocation
page read and write
54E8000
trusted library allocation
page read and write
9DB000
stack
page read and write
36FF000
stack
page read and write
424F000
stack
page read and write
D98000
heap
page read and write
ABB000
unkown
page execute and read and write
5399000
trusted library allocation
page read and write
4411000
heap
page read and write
11E4000
heap
page read and write
4960000
direct allocation
page read and write
3390000
direct allocation
page read and write
53F6000
trusted library allocation
page read and write
5374000
trusted library allocation
page read and write
30FE000
stack
page read and write
C84000
heap
page read and write
4950000
trusted library allocation
page read and write
9CE000
stack
page read and write
4E30000
direct allocation
page execute and read and write
52D0000
direct allocation
page execute and read and write
4AC0000
trusted library allocation
page read and write
4CC1000
heap
page read and write
54F1000
trusted library allocation
page read and write
852000
heap
page read and write
47E1000
heap
page read and write
E59000
heap
page read and write
5383000
trusted library allocation
page read and write
53AD000
trusted library allocation
page read and write
847000
heap
page read and write
5314000
trusted library allocation
page read and write
39DE000
stack
page read and write
5430000
direct allocation
page execute and read and write
5369000
trusted library allocation
page read and write
754000
heap
page read and write
5011000
heap
page read and write
AAB000
heap
page read and write
C84000
heap
page read and write
33AF000
stack
page read and write
B31000
unkown
page execute and write copy
53F0000
direct allocation
page execute and read and write
5543000
trusted library allocation
page read and write
4651000
heap
page read and write
48CE000
stack
page read and write
58D6000
trusted library allocation
page read and write
521E000
stack
page read and write
47E1000
heap
page read and write
5543000
trusted library allocation
page read and write
5320000
direct allocation
page execute and read and write
3ACF000
stack
page read and write
465E000
stack
page read and write
32BE000
stack
page read and write
5566000
trusted library allocation
page read and write
A4B000
heap
page read and write
23C000
unkown
page readonly
AF4000
heap
page read and write
B31000
unkown
page execute and read and write
26CC000
heap
page read and write
2D0F000
stack
page read and write
4A41000
heap
page read and write
AB1000
unkown
page execute and read and write
122E000
unkown
page execute and read and write
153E000
stack
page read and write
373E000
stack
page read and write
7DA000
heap
page read and write
AB5000
heap
page read and write
535B000
trusted library allocation
page read and write
C84000
heap
page read and write
855000
heap
page read and write
4651000
heap
page read and write
56EE000
stack
page read and write
118E000
stack
page read and write
DD1000
unkown
page execute and read and write
535F000
trusted library allocation
page read and write
5506000
trusted library allocation
page read and write
5011000
heap
page read and write
54CD000
trusted library allocation
page read and write
4C90000
direct allocation
page execute and read and write
338E000
stack
page read and write
634000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
A3F000
heap
page read and write
D61000
unkown
page execute and read and write
4651000
heap
page read and write
57E000
unkown
page execute and write copy
4DB1000
heap
page read and write
550B000
trusted library allocation
page read and write
1B35D000
stack
page read and write
4651000
heap
page read and write
AC6000
heap
page read and write
5538000
trusted library allocation
page read and write
C84000
heap
page read and write
48E0000
trusted library allocation
page read and write
54F8000
trusted library allocation
page read and write
4DB1000
heap
page read and write
367E000
stack
page read and write
10B0000
direct allocation
page read and write
5369000
trusted library allocation
page read and write
A70000
direct allocation
page read and write
3A2E000
stack
page read and write
5375000
trusted library allocation
page read and write
54F8000
trusted library allocation
page read and write
122F000
unkown
page execute and write copy
5A3E000
trusted library allocation
page read and write
353E000
stack
page read and write
54D7000
trusted library allocation
page read and write
114E000
stack
page read and write
53AA000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
D82000
heap
page read and write
5386000
trusted library allocation
page read and write
AF4000
heap
page read and write
C54000
heap
page read and write
AAF000
heap
page read and write
B10000
direct allocation
page read and write
11E4000
heap
page read and write
E67000
heap
page read and write
A29000
heap
page read and write
4A41000
heap
page read and write
AF4000
heap
page read and write
335E000
stack
page read and write
110E000
stack
page read and write
4D81000
heap
page read and write
53D0000
direct allocation
page execute and read and write
FC4000
heap
page read and write
31DF000
stack
page read and write
DB6000
unkown
page execute and read and write
552C000
trusted library allocation
page read and write
53D0000
direct allocation
page execute and read and write
316E000
stack
page read and write
D4F000
unkown
page execute and write copy
4411000
heap
page read and write
58D2000
trusted library allocation
page read and write
5020000
heap
page read and write
58D8000
trusted library allocation
page read and write
E6C000
heap
page read and write
438F000
stack
page read and write
31A000
unkown
page execute and read and write
4651000
heap
page read and write
71000
unkown
page execute and write copy
9DE000
stack
page read and write
AB9000
unkown
page write copy
537F000
trusted library allocation
page read and write
1052000
heap
page read and write
ACC000
heap
page read and write
4411000
heap
page read and write
28FF000
stack
page read and write
B20000
direct allocation
page read and write
54F8000
trusted library allocation
page read and write
4960000
direct allocation
page read and write
1330000
direct allocation
page read and write
8F5000
stack
page read and write
5372000
trusted library allocation
page read and write
CF8000
unkown
page execute and write copy
5030000
direct allocation
page execute and read and write
AF4000
heap
page read and write
58DB000
trusted library allocation
page read and write
348E000
stack
page read and write
557B000
trusted library allocation
page read and write
4CC1000
heap
page read and write
E82000
heap
page read and write
4A41000
heap
page read and write
4651000
heap
page read and write
47E1000
heap
page read and write
463E000
stack
page read and write
11E4000
heap
page read and write
4411000
heap
page read and write
7CD000
heap
page read and write
D85000
heap
page read and write
360F000
stack
page read and write
E44000
heap
page read and write
47D0000
direct allocation
page read and write
C84000
heap
page read and write
5543000
trusted library allocation
page read and write
1230000
heap
page read and write
524E000
stack
page read and write
489E000
stack
page read and write
4651000
heap
page read and write
AAB000
heap
page read and write
47E1000
heap
page read and write
E31000
unkown
page execute and write copy
54DD000
trusted library allocation
page read and write
4A58000
heap
page read and write
5AE9000
trusted library allocation
page read and write
4AD0000
direct allocation
page read and write
7E4000
heap
page read and write
5517000
trusted library allocation
page read and write
D40000
heap
page read and write
A87000
heap
page read and write
16F5000
heap
page read and write
53BD000
trusted library allocation
page read and write
7E4000
heap
page read and write
58D7000
trusted library allocation
page read and write
5596000
trusted library allocation
page read and write
C84000
heap
page read and write
47E1000
heap
page read and write
650000
unkown
page readonly
4CC1000
heap
page read and write
509D000
stack
page read and write
634000
heap
page read and write
3A0F000
stack
page read and write
11E4000
heap
page read and write
47D0000
direct allocation
page read and write
4B3E000
stack
page read and write
12D4000
heap
page read and write
54C1000
trusted library allocation
page read and write
44D1000
heap
page read and write
2EAF000
stack
page read and write
D12000
unkown
page execute and read and write
E3C000
heap
page read and write
54D8000
trusted library allocation
page read and write
C85000
heap
page read and write
1244000
heap
page read and write
4CB0000
direct allocation
page read and write
4971000
heap
page read and write
845000
heap
page read and write
59BA000
trusted library allocation
page read and write
54F8000
trusted library allocation
page read and write
D90000
direct allocation
page read and write
D90000
direct allocation
page read and write
4960000
direct allocation
page read and write
C84000
heap
page read and write
5B59000
trusted library allocation
page read and write
4C2D000
trusted library allocation
page execute and read and write
A70000
direct allocation
page read and write
15A4000
heap
page read and write
9FF000
stack
page read and write
4940000
direct allocation
page read and write
41CE000
stack
page read and write
560F000
trusted library allocation
page read and write
4411000
heap
page read and write
537F000
trusted library allocation
page read and write
4A90000
heap
page read and write
C84000
heap
page read and write
58DA000
trusted library allocation
page read and write
5390000
direct allocation
page execute and read and write
40CF000
stack
page read and write
35CF000
stack
page read and write
11A7000
heap
page read and write
C84000
heap
page read and write
5375000
trusted library allocation
page read and write
1083000
heap
page read and write
55E2000
trusted library allocation
page read and write
48BE000
stack
page read and write
AF4000
heap
page read and write
2910000
heap
page read and write
12D4000
heap
page read and write
5364000
trusted library allocation
page read and write
E58000
heap
page read and write
4DC3000
trusted library allocation
page read and write
36CF000
stack
page read and write
10DB000
heap
page read and write
AB9000
unkown
page write copy
53D0000
direct allocation
page execute and read and write
52D0000
direct allocation
page execute and read and write
40FF000
stack
page read and write
52A0000
direct allocation
page execute and read and write
D41000
unkown
page execute and read and write
4FFF000
stack
page read and write
4651000
heap
page read and write
3DEE000
stack
page read and write
634000
heap
page read and write
5390000
direct allocation
page execute and read and write
702E000
stack
page read and write
537D000
trusted library allocation
page read and write
C84000
heap
page read and write
E1D000
unkown
page execute and write copy
C84000
heap
page read and write
4651000
heap
page read and write
375E000
stack
page read and write
13D4000
unkown
page execute and read and write
E6A000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
5367000
trusted library allocation
page read and write
E00000
unkown
page execute and read and write
4E1E000
stack
page read and write
1244000
heap
page read and write
D1D000
unkown
page execute and read and write
C84000
heap
page read and write
5011000
heap
page read and write
10B0000
direct allocation
page read and write
12D4000
heap
page read and write
2C4F000
stack
page read and write
F6A000
unkown
page execute and read and write
4880000
remote allocation
page read and write
4FD0000
direct allocation
page execute and read and write
54F8000
trusted library allocation
page read and write
7BD000
heap
page read and write
4EB0000
direct allocation
page read and write
47E1000
heap
page read and write
B9B000
unkown
page execute and read and write
1CBBF000
stack
page read and write
5356000
trusted library allocation
page read and write
2F9E000
stack
page read and write
54D7000
trusted library allocation
page read and write
C84000
heap
page read and write
54C8000
trusted library allocation
page read and write
536B000
trusted library allocation
page read and write
E40000
heap
page read and write
54FE000
trusted library allocation
page read and write
5367000
trusted library allocation
page read and write
9B7000
heap
page read and write
4411000
heap
page read and write
4A00000
direct allocation
page execute and read and write
3D8E000
stack
page read and write
4411000
heap
page read and write
1244000
heap
page read and write
A1C000
stack
page read and write
30DE000
stack
page read and write
5375000
trusted library allocation
page read and write
47AF000
stack
page read and write
4411000
heap
page read and write
5310000
direct allocation
page execute and read and write
A70000
direct allocation
page read and write
A29000
heap
page read and write
4411000
heap
page read and write
4CB0000
direct allocation
page read and write
47E1000
heap
page read and write
E2A000
unkown
page execute and read and write
10C8000
heap
page read and write
4D0D000
trusted library allocation
page read and write
45D0000
trusted library allocation
page read and write
2F4F000
stack
page read and write
11C0000
heap
page read and write
C84000
heap
page read and write
1B31D000
stack
page read and write
3ECE000
stack
page read and write
329F000
stack
page read and write
A50000
unkown
page readonly
D44000
heap
page read and write
4411000
heap
page read and write
5250000
direct allocation
page read and write
4411000
heap
page read and write
D26000
unkown
page execute and write copy
59F7000
trusted library allocation
page read and write
D8E000
stack
page read and write
7DD000
stack
page read and write
2E60000
direct allocation
page read and write
108F000
heap
page read and write
5011000
heap
page read and write
4E10000
direct allocation
page execute and read and write
5011000
heap
page read and write
75E000
unkown
page execute and write copy
5022000
trusted library allocation
page read and write
535B000
trusted library allocation
page read and write
47E1000
heap
page read and write
AF0000
heap
page read and write
AF4000
heap
page read and write
4CC1000
heap
page read and write
839000
heap
page read and write
E3F000
unkown
page execute and read and write
5386000
trusted library allocation
page read and write
4CC1000
heap
page read and write
4CC1000
heap
page read and write
A37000
heap
page read and write
4411000
heap
page read and write
52B0000
direct allocation
page execute and read and write
53DD000
stack
page read and write
A29000
heap
page read and write
2FCF000
stack
page read and write
B10000
direct allocation
page read and write
A50000
unkown
page readonly
399F000
stack
page read and write
ABA000
heap
page read and write
39CE000
stack
page read and write
C3E000
unkown
page execute and read and write
1AB2C000
stack
page read and write
5040000
direct allocation
page execute and read and write
334E000
stack
page read and write
310C000
stack
page read and write
7E4000
heap
page read and write
4EFE000
stack
page read and write
B00000
direct allocation
page read and write
354E000
stack
page read and write
528E000
stack
page read and write
5030000
heap
page read and write
4861000
heap
page read and write
43BE000
stack
page read and write
368E000
stack
page read and write
598E000
trusted library allocation
page read and write
4F5F000
stack
page read and write
47E1000
heap
page read and write
5390000
direct allocation
page execute and read and write
5543000
trusted library allocation
page read and write
D82000
heap
page read and write
A0F000
heap
page read and write
54E8000
trusted library allocation
page read and write
C84000
heap
page read and write
4DB1000
heap
page read and write
2ECE000
stack
page read and write
12D4000
heap
page read and write
2AE0000
heap
page read and write
13D4000
unkown
page execute and read and write
E31000
unkown
page execute and write copy
378F000
stack
page read and write
1D37D000
stack
page read and write
E26000
heap
page read and write
49D0000
direct allocation
page execute and read and write
D59000
unkown
page execute and write copy
4980000
heap
page read and write
4CC1000
heap
page read and write
ABE000
heap
page read and write
28FE000
stack
page read and write
7E4000
heap
page read and write
11A0000
heap
page read and write
42CF000
stack
page read and write
1A9ED000
stack
page read and write
4EB0000
direct allocation
page read and write
A40000
heap
page read and write
2E60000
direct allocation
page read and write
4A41000
heap
page read and write
754000
heap
page read and write
266B000
stack
page read and write
2B0F000
stack
page read and write
AF4000
heap
page read and write
4A6E000
stack
page read and write
710000
heap
page read and write
4C24000
trusted library allocation
page read and write
C84000
heap
page read and write
1244000
heap
page read and write
5543000
trusted library allocation
page read and write
5B4F000
trusted library allocation
page read and write
AF4000
heap
page read and write
5527000
trusted library allocation
page read and write
12FD000
stack
page read and write
ACA000
heap
page read and write
4651000
heap
page read and write
1A8ED000
stack
page read and write
A42000
heap
page read and write
C84000
heap
page read and write
109E000
stack
page read and write
45DF000
stack
page read and write
52B0000
direct allocation
page execute and read and write
E1A000
unkown
page execute and write copy
B00000
direct allocation
page read and write
3CCE000
stack
page read and write
A36A000
heap
page read and write
5011000
heap
page read and write
4411000
heap
page read and write
5011000
heap
page read and write
59FD000
stack
page read and write
4AB0000
direct allocation
page read and write
5360000
direct allocation
page execute and read and write
54EF000
trusted library allocation
page read and write
442E000
stack
page read and write
2F7F000
stack
page read and write
4411000
heap
page read and write
68FB000
stack
page read and write
79F000
heap
page read and write
384F000
stack
page read and write
1052000
heap
page read and write
D51000
unkown
page execute and write copy
3B0E000
stack
page read and write
5518000
trusted library allocation
page read and write
47E1000
heap
page read and write
316F000
stack
page read and write
AF4000
heap
page read and write
D90000
direct allocation
page read and write
AF4000
heap
page read and write
D59000
unkown
page execute and write copy
FC4000
heap
page read and write
47D0000
direct allocation
page read and write
4AC0000
direct allocation
page execute and read and write
B20000
direct allocation
page read and write
2D7F000
stack
page read and write
5A12000
trusted library allocation
page read and write
2B4E000
stack
page read and write
C84000
heap
page read and write
538E000
trusted library allocation
page read and write
4AD0000
direct allocation
page read and write
49F0000
direct allocation
page execute and read and write
7E4000
heap
page read and write
FC4000
heap
page read and write
3C7F000
stack
page read and write
4DFE000
stack
page read and write
AFB000
stack
page read and write
1330000
direct allocation
page read and write
4B0F000
stack
page read and write
A51000
unkown
page execute and write copy
44CF000
stack
page read and write
E58000
heap
page read and write
E31000
unkown
page execute and write copy
C3E000
unkown
page execute and read and write
56A2000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
52D0000
direct allocation
page execute and read and write
D20000
unkown
page readonly
A29000
heap
page read and write
53AA000
trusted library allocation
page read and write
4A1E000
stack
page read and write
E02000
unkown
page execute and read and write
B90000
unkown
page execute and read and write
58D3000
trusted library allocation
page read and write
4DE0000
trusted library allocation
page read and write
539D000
trusted library allocation
page read and write
5543000
trusted library allocation
page read and write
58D3000
trusted library allocation
page read and write
4A41000
heap
page read and write
34BE000
stack
page read and write
388E000
stack
page read and write
C84000
heap
page read and write
E96000
heap
page read and write
650000
heap
page read and write
1D50F000
stack
page read and write
F7E000
unkown
page execute and read and write
7E4000
heap
page read and write
634000
heap
page read and write
844000
heap
page read and write
334C000
stack
page read and write
58D9000
trusted library allocation
page read and write
531E000
trusted library allocation
page read and write
634000
heap
page read and write
374E000
stack
page read and write
5543000
trusted library allocation
page read and write
11E4000
heap
page read and write
5375000
trusted library allocation
page read and write
4AB0000
direct allocation
page read and write
454E000
stack
page read and write
18EE000
stack
page read and write
52D0000
direct allocation
page execute and read and write
376F000
stack
page read and write
5316000
trusted library allocation
page read and write
27FE000
stack
page read and write
E7F000
heap
page read and write
47D0000
direct allocation
page read and write
9BE000
stack
page read and write
44FE000
stack
page read and write
4C40000
direct allocation
page execute and read and write
44D1000
heap
page read and write
4651000
heap
page read and write
5011000
heap
page read and write
66E000
unkown
page readonly
ACA000
heap
page read and write
54E8000
trusted library allocation
page read and write
7E4000
heap
page read and write
1B4AE000
stack
page read and write
F9E000
stack
page read and write
647E000
heap
page read and write
1B21D000
stack
page read and write
461E000
stack
page read and write
D44000
heap
page read and write
6F5000
stack
page read and write
4FB0000
direct allocation
page execute and read and write
3D4F000
stack
page read and write
AAB000
heap
page read and write
5561000
trusted library allocation
page read and write
D59000
unkown
page execute and write copy
411E000
stack
page read and write
CCC000
stack
page read and write
B10000
direct allocation
page read and write
4CE0000
direct allocation
page execute and read and write
D78000
heap
page read and write
BB0000
heap
page read and write
E1A000
unkown
page execute and write copy
3390000
direct allocation
page read and write
C84000
heap
page read and write
C84000
heap
page read and write
50D0000
direct allocation
page execute and read and write
53C6000
trusted library allocation
page read and write
1A2F000
stack
page read and write
6480000
heap
page read and write
DCF000
unkown
page execute and write copy
537D000
trusted library allocation
page read and write
47E1000
heap
page read and write
54CA000
trusted library allocation
page read and write
E67000
heap
page read and write
4D7F000
stack
page read and write
352E000
stack
page read and write
366E000
stack
page read and write
DC5000
stack
page read and write
4A00000
direct allocation
page execute and read and write
C84000
heap
page read and write
12D4000
heap
page read and write
54F8000
trusted library allocation
page read and write
B90000
unkown
page execute and read and write
5364000
trusted library allocation
page read and write
B10000
direct allocation
page read and write
7BE000
heap
page read and write
4E40000
direct allocation
page execute and read and write
4C30000
trusted library allocation
page read and write
3E9E000
stack
page read and write
5250000
direct allocation
page read and write
4A50000
heap
page read and write
4F3D000
stack
page read and write
2E60000
direct allocation
page read and write
4EFE000
stack
page read and write
5011000
heap
page read and write
54C1000
trusted library allocation
page read and write
4651000
heap
page read and write
A25E000
heap
page read and write
4CC1000
heap
page read and write
54F8000
trusted library allocation
page read and write
5375000
trusted library allocation
page read and write
10B0000
direct allocation
page read and write
3190000
heap
page read and write
B30000
unkown
page readonly
425E000
stack
page read and write
304E000
stack
page read and write
4CC1000
heap
page read and write
7EE000
stack
page read and write
B20000
direct allocation
page read and write
4C70000
trusted library allocation
page read and write
52C0000
direct allocation
page execute and read and write
C84000
heap
page read and write
5122000
trusted library allocation
page read and write
15A0000
heap
page read and write
A44000
heap
page read and write
350E000
stack
page read and write
2D4F000
stack
page read and write
C84000
heap
page read and write
467F000
stack
page read and write
10CE000
heap
page read and write
511F000
trusted library allocation
page read and write
58A0000
remote allocation
page read and write
B9A000
unkown
page execute and write copy
572E000
stack
page read and write
FC4000
heap
page read and write
4411000
heap
page read and write
4651000
heap
page read and write
550D000
stack
page read and write
54E4000
trusted library allocation
page read and write
F1E000
stack
page read and write
3EDE000
stack
page read and write
470F000
stack
page read and write
38AF000
stack
page read and write
E40000
unkown
page execute and write copy
1244000
heap
page read and write
10B0000
heap
page read and write
7E4000
heap
page read and write
435F000
stack
page read and write
10B0000
direct allocation
page read and write
4960000
direct allocation
page read and write
4DB1000
heap
page read and write
308F000
stack
page read and write
3F0E000
stack
page read and write
349F000
stack
page read and write
D90000
direct allocation
page read and write
4CC1000
heap
page read and write
7E4000
heap
page read and write
2C6E000
stack
page read and write
54D7000
trusted library allocation
page read and write
2E60000
direct allocation
page read and write
34EF000
stack
page read and write
5143000
trusted library allocation
page read and write
AB4000
heap
page read and write
11E4000
heap
page read and write
10C4000
heap
page read and write
47E1000
heap
page read and write
11E4000
heap
page read and write
12D4000
heap
page read and write
634000
heap
page read and write
4A20000
direct allocation
page execute and read and write
AF4000
heap
page read and write
3D0F000
stack
page read and write
58DD000
trusted library allocation
page read and write
AF4000
heap
page read and write
39BE000
stack
page read and write
50D0000
direct allocation
page execute and read and write
47E1000
heap
page read and write
72CE000
stack
page read and write
5402000
trusted library allocation
page read and write
AF4000
heap
page read and write
107D000
heap
page read and write
59E5000
trusted library allocation
page read and write
AF4000
heap
page read and write
82D000
heap
page read and write
B8E000
stack
page read and write
84E000
heap
page read and write
417E000
stack
page read and write
4E50000
direct allocation
page execute and read and write
4651000
heap
page read and write
60CC000
stack
page read and write
10C4000
heap
page read and write
A95000
heap
page read and write
55CF000
stack
page read and write
FD0000
heap
page read and write
3F3E000
stack
page read and write
167E000
heap
page read and write
551E000
trusted library allocation
page read and write
439E000
stack
page read and write
366E000
stack
page read and write
54D2000
trusted library allocation
page read and write
4DC0000
direct allocation
page execute and read and write
5543000
trusted library allocation
page read and write
538C000
trusted library allocation
page read and write
B00000
direct allocation
page read and write
151000
unkown
page execute and write copy
5011000
heap
page read and write
AF4000
heap
page read and write
5543000
trusted library allocation
page read and write
4AC1000
heap
page read and write
AAE000
heap
page read and write
7A6000
heap
page read and write
4A41000
heap
page read and write
47BF000
stack
page read and write
5543000
trusted library allocation
page read and write
50AE000
stack
page read and write
2E0F000
stack
page read and write
5356000
trusted library allocation
page read and write
7C7000
heap
page read and write
47E1000
heap
page read and write
AE0000
direct allocation
page read and write
D44000
heap
page read and write
4F90000
direct allocation
page execute and read and write
4CCD000
stack
page read and write
388F000
stack
page read and write
5100000
trusted library allocation
page read and write
4C3F000
stack
page read and write
4411000
heap
page read and write
5367000
trusted library allocation
page read and write
4CC1000
heap
page read and write
823E000
stack
page read and write
2C7F000
stack
page read and write
AB6000
heap
page read and write
4651000
heap
page read and write
4DB1000
heap
page read and write
395F000
stack
page read and write
B9C000
unkown
page execute and write copy
47E1000
heap
page read and write
C84000
heap
page read and write
B10000
direct allocation
page read and write
AF4000
heap
page read and write
7E4000
heap
page read and write
1244000
heap
page read and write
E60000
heap
page read and write
7E4000
heap
page read and write
52D0000
direct allocation
page execute and read and write
56D1000
trusted library allocation
page read and write
55EE000
stack
page read and write
12D4000
heap
page read and write
FC4000
heap
page read and write
47D0000
direct allocation
page read and write
2B07000
heap
page read and write
5AA1000
trusted library allocation
page read and write
54D7000
trusted library allocation
page read and write
5020000
direct allocation
page execute and read and write
ADE000
stack
page read and write
701000
unkown
page read and write
634000
heap
page read and write
4851000
heap
page read and write
14B9000
heap
page read and write
D20000
unkown
page read and write
85E000
heap
page read and write
75C000
unkown
page execute and write copy
27B0000
direct allocation
page read and write
AAF000
heap
page read and write
5000000
direct allocation
page execute and read and write
F6A000
unkown
page execute and read and write
49A1000
heap
page read and write
54C4000
trusted library allocation
page read and write
4CC1000
heap
page read and write
5011000
heap
page read and write
DD2000
unkown
page execute and write copy
78E000
heap
page read and write
54F8000
trusted library allocation
page read and write
449F000
stack
page read and write
D59000
unkown
page execute and read and write
1244000
heap
page read and write
58D5000
trusted library allocation
page read and write
5402000
trusted library allocation
page read and write
754000
heap
page read and write
48EF000
stack
page read and write
DAD000
unkown
page execute and read and write
3F2E000
stack
page read and write
5A48000
trusted library allocation
page read and write
5543000
trusted library allocation
page read and write
3EEF000
stack
page read and write
13E0000
heap
page read and write
11E4000
heap
page read and write
54E8000
trusted library allocation
page read and write
D59000
unkown
page execute and write copy
2C5F000
stack
page read and write
4651000
heap
page read and write
5543000
trusted library allocation
page read and write
538C000
trusted library allocation
page read and write
A44000
heap
page read and write
AF4000
heap
page read and write
27CF000
stack
page read and write
B20000
direct allocation
page read and write
550F000
trusted library allocation
page read and write
4CC1000
heap
page read and write
4651000
heap
page read and write
D5A000
unkown
page execute and write copy
A44000
heap
page read and write
11EF000
unkown
page execute and read and write
1115000
heap
page read and write
2E60000
direct allocation
page read and write
4EB0000
direct allocation
page read and write
4800000
heap
page read and write
538A000
trusted library allocation
page read and write
58D8000
trusted library allocation
page read and write
AF4000
heap
page read and write
4C4F000
stack
page read and write
344F000
stack
page read and write
E40000
unkown
page execute and write copy
4DB1000
heap
page read and write
485F000
stack
page read and write
12FD000
stack
page read and write
CCE000
stack
page read and write
4960000
direct allocation
page read and write
5011000
heap
page read and write
3390000
direct allocation
page read and write
569A000
trusted library allocation
page read and write
4960000
direct allocation
page read and write
AF4000
heap
page read and write
54F8000
trusted library allocation
page read and write
4651000
heap
page read and write
4410000
heap
page read and write
5B0D000
trusted library allocation
page read and write
B20000
direct allocation
page read and write
5364000
trusted library allocation
page read and write
4B1E000
stack
page read and write
4411000
heap
page read and write
3C6F000
stack
page read and write
107B000
heap
page read and write
C54000
heap
page read and write
10D7000
heap
page read and write
3A4E000
stack
page read and write
634000
heap
page read and write
B20000
direct allocation
page read and write
4A41000
heap
page read and write
44D1000
heap
page read and write
5543000
trusted library allocation
page read and write
5579000
trusted library allocation
page read and write
D44000
heap
page read and write
634000
heap
page read and write
5370000
direct allocation
page execute and read and write
7E4000
heap
page read and write
320E000
stack
page read and write
754000
heap
page read and write
A0AA000
heap
page read and write
54F8000
trusted library allocation
page read and write
4A41000
heap
page read and write
4970000
heap
page read and write
10B0000
direct allocation
page read and write
168A000
heap
page read and write
630000
heap
page read and write
31CF000
stack
page read and write
84E000
heap
page read and write
4651000
heap
page read and write
C54000
heap
page read and write
53B0000
direct allocation
page execute and read and write
5507000
trusted library allocation
page read and write
AF4000
heap
page read and write
AF4000
heap
page read and write
75E000
unkown
page execute and write copy
634000
heap
page read and write
3D1E000
stack
page read and write
D44000
heap
page read and write
44D1000
heap
page read and write
CB0000
heap
page read and write
4651000
heap
page read and write
D50000
unkown
page execute and read and write
5543000
trusted library allocation
page read and write
1244000
heap
page read and write
C84000
heap
page read and write
47E1000
heap
page read and write
5543000
trusted library allocation
page read and write
1AF5E000
stack
page read and write
4D00000
trusted library allocation
page execute and read and write
5508000
trusted library allocation
page read and write
750000
heap
page read and write
2D8F000
stack
page read and write
3DCE000
stack
page read and write
AA3000
heap
page read and write
350F000
stack
page read and write
421F000
stack
page read and write
414E000
stack
page read and write
1244000
heap
page read and write
5011000
heap
page read and write
47E1000
heap
page read and write
35DE000
stack
page read and write
1CFED000
stack
page read and write
B00000
direct allocation
page read and write
4651000
heap
page read and write
54F8000
trusted library allocation
page read and write
4C60000
direct allocation
page execute and read and write
4C5B000
trusted library allocation
page execute and read and write
1310000
heap
page read and write
DE4000
heap
page read and write
712E000
stack
page read and write
54C8000
trusted library allocation
page read and write
634000
heap
page read and write
4A60000
heap
page read and write
5359000
trusted library allocation
page read and write
5543000
trusted library allocation
page read and write
414F000
stack
page read and write
A50000
unkown
page read and write
4F60000
direct allocation
page execute and read and write
A70000
direct allocation
page read and write
4AC1000
heap
page read and write
4DE0000
trusted library allocation
page read and write
DD1000
unkown
page execute and read and write
47E1000
heap
page read and write
5543000
trusted library allocation
page read and write
5410000
direct allocation
page execute and read and write
59CC000
trusted library allocation
page read and write
54D2000
trusted library allocation
page read and write
37CE000
stack
page read and write
4E20000
direct allocation
page execute and read and write
4DB1000
heap
page read and write
5011000
heap
page read and write
3E9F000
stack
page read and write
ACA000
heap
page read and write
466F000
stack
page read and write
4960000
direct allocation
page read and write
12D4000
heap
page read and write
D20000
unkown
page read and write
AF4000
heap
page read and write
D20000
heap
page read and write
D44000
heap
page read and write
54E8000
trusted library allocation
page read and write
3A2E000
stack
page read and write
A3D000
heap
page read and write
B00000
heap
page read and write
4A41000
heap
page read and write
2A9E000
stack
page read and write
33BF000
stack
page read and write
418E000
stack
page read and write
3390000
direct allocation
page read and write
50DD000
stack
page read and write
5C2D000
stack
page read and write
56D1000
trusted library allocation
page read and write
4651000
heap
page read and write
39EF000
stack
page read and write
E82000
heap
page read and write
4880000
remote allocation
page read and write
DBF000
unkown
page execute and read and write
C84000
heap
page read and write
54CB000
trusted library allocation
page read and write
A44000
heap
page read and write
832000
heap
page read and write
5011000
heap
page read and write
853000
heap
page read and write
AF4000
heap
page read and write
D44000
heap
page read and write
AE0000
direct allocation
page read and write
634000
heap
page read and write
1244000
heap
page read and write
C84000
heap
page read and write
547C000
trusted library allocation
page read and write
4A41000
heap
page read and write
4DF0000
direct allocation
page execute and read and write
E58000
heap
page read and write
634000
heap
page read and write
54E8000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
AF4000
heap
page read and write
B4F000
stack
page read and write
5543000
trusted library allocation
page read and write
FDB000
stack
page read and write
4AB0000
direct allocation
page read and write
5A07000
trusted library allocation
page read and write
4DB1000
heap
page read and write
E61000
heap
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
37AE000
stack
page read and write
47E1000
heap
page read and write
54F5000
trusted library allocation
page read and write
1244000
heap
page read and write
6D0000
remote allocation
page execute and read and write
415E000
stack
page read and write
4411000
heap
page read and write
4411000
heap
page read and write
634000
heap
page read and write
4C57000
trusted library allocation
page execute and read and write
10B0000
direct allocation
page read and write
4A3F000
stack
page read and write
54F8000
trusted library allocation
page read and write
49FE000
stack
page read and write
634000
heap
page read and write
339000
stack
page read and write
180000
heap
page read and write
D44000
heap
page read and write
5543000
trusted library allocation
page read and write
C54000
heap
page read and write
5555000
trusted library allocation
page read and write
58D5000
trusted library allocation
page read and write
A29000
heap
page read and write
C84000
heap
page read and write
754000
heap
page read and write
363F000
stack
page read and write
4BF9000
trusted library allocation
page read and write
378E000
stack
page read and write
4D00000
direct allocation
page execute and read and write
58D3000
trusted library allocation
page read and write
754000
heap
page read and write
54E7000
trusted library allocation
page read and write
4A41000
heap
page read and write
47E1000
heap
page read and write
E60000
heap
page read and write
370E000
stack
page read and write
4CB0000
direct allocation
page read and write
C84000
heap
page read and write
4651000
heap
page read and write
477E000
stack
page read and write
47E1000
heap
page read and write
5CED000
stack
page read and write
5A0F000
trusted library allocation
page read and write
7E4000
heap
page read and write
1244000
heap
page read and write
53A5000
trusted library allocation
page read and write
16AA000
heap
page read and write
47D0000
direct allocation
page read and write
43FF000
stack
page read and write
47E1000
heap
page read and write
4A41000
heap
page read and write
AF4000
heap
page read and write
83D000
heap
page read and write
D50000
heap
page read and write
58D0000
trusted library allocation
page read and write
1244000
heap
page read and write
51B1000
direct allocation
page read and write
A99000
heap
page read and write
4CC1000
heap
page read and write
11EF000
stack
page read and write
D1D000
unkown
page execute and write copy
D90000
direct allocation
page read and write
122E000
unkown
page execute and write copy
8AC000
unkown
page readonly
54E9000
trusted library allocation
page read and write
D44000
heap
page read and write
54C2000
trusted library allocation
page read and write
634000
heap
page read and write
5400000
direct allocation
page execute and read and write
3A9F000
stack
page read and write
DAE000
unkown
page execute and write copy
47D0000
direct allocation
page read and write
A70000
direct allocation
page read and write
1071000
heap
page read and write
4651000
heap
page read and write
5362000
trusted library allocation
page read and write
AF9000
stack
page read and write
D4B000
unkown
page execute and read and write
4CC6000
trusted library allocation
page read and write
E77000
heap
page read and write
D44000
heap
page read and write
754000
heap
page read and write
AF4000
heap
page read and write
2A0F000
stack
page read and write
4DB1000
heap
page read and write
5548000
trusted library allocation
page read and write
A50000
unkown
page read and write
318E000
stack
page read and write
54F8000
trusted library allocation
page read and write
54F8000
trusted library allocation
page read and write
4510000
trusted library allocation
page read and write
E3F000
unkown
page execute and write copy
805000
heap
page read and write
AF4000
heap
page read and write
AF4000
heap
page read and write
E02000
unkown
page execute and read and write
1A6AE000
stack
page read and write
4DB1000
heap
page read and write
A15000
heap
page read and write
5377000
trusted library allocation
page read and write
47D0000
direct allocation
page read and write
545E000
stack
page read and write
B44000
heap
page read and write
5B6F000
trusted library allocation
page read and write
103E000
heap
page read and write
FAC000
stack
page read and write
66E000
unkown
page readonly
5372000
trusted library allocation
page read and write
537D000
trusted library allocation
page read and write
10B0000
heap
page read and write
5369000
trusted library allocation
page read and write
589E000
stack
page read and write
10B0000
direct allocation
page read and write
50D0000
direct allocation
page execute and read and write
D44000
heap
page read and write
A48000
heap
page read and write
DD1000
unkown
page execute and read and write
47E1000
heap
page read and write
165F000
heap
page read and write
5535000
trusted library allocation
page read and write
42FE000
stack
page read and write
413E000
stack
page read and write
634000
heap
page read and write
1244000
heap
page read and write
AF4000
heap
page read and write
44DE000
stack
page read and write
26C000
unkown
page write copy
59D8000
trusted library allocation
page read and write
309F000
stack
page read and write
839000
heap
page read and write
AF4000
heap
page read and write
5355000
trusted library allocation
page read and write
5515000
trusted library allocation
page read and write
47E1000
heap
page read and write
7E4000
heap
page read and write
C84000
heap
page read and write
54EF000
trusted library allocation
page read and write
5366000
trusted library allocation
page read and write
3D9E000
stack
page read and write
A15000
heap
page read and write
5586000
trusted library allocation
page read and write
4CB0000
direct allocation
page read and write
4651000
heap
page read and write
3ADF000
stack
page read and write
54D8000
trusted library allocation
page read and write
A97000
heap
page read and write
3D8F000
stack
page read and write
182E000
stack
page read and write
DBF000
unkown
page execute and read and write
58D1000
trusted library allocation
page read and write
1D3A4000
heap
page read and write
754000
heap
page read and write
D85000
unkown
page execute and write copy
1110000
heap
page read and write
10CA000
heap
page read and write
1244000
heap
page read and write
C84000
heap
page read and write
54CF000
trusted library allocation
page read and write
720000
heap
page read and write
5999000
trusted library allocation
page read and write
30DE000
stack
page read and write
380000
heap
page read and write
A97000
heap
page read and write
AF4000
heap
page read and write
4CC1000
heap
page read and write
4651000
heap
page read and write
7A6000
heap
page read and write
54F8000
trusted library allocation
page read and write
407D000
stack
page read and write
1CF9E000
stack
page read and write
DCF000
stack
page read and write
754000
heap
page read and write
1CCFF000
stack
page read and write
C84000
heap
page read and write
448F000
stack
page read and write
5597000
trusted library allocation
page read and write
306D000
heap
page read and write
4A70000
trusted library allocation
page read and write
1460000
heap
page read and write
C54000
heap
page read and write
1218000
unkown
page execute and read and write
A0F000
heap
page read and write
13F0000
heap
page read and write
E3F000
unkown
page execute and write copy
11EA000
heap
page read and write
AAB000
heap
page read and write
410E000
stack
page read and write
5395000
trusted library allocation
page read and write
3B7E000
stack
page read and write
314E000
stack
page read and write
54C6000
trusted library allocation
page read and write
10B0000
direct allocation
page read and write
58D7000
trusted library allocation
page read and write
C3E000
unkown
page execute and read and write
312000
unkown
page execute and read and write
4CC1000
heap
page read and write
5A9F000
trusted library allocation
page read and write
4A40000
heap
page read and write
852000
heap
page read and write
1D1DF000
stack
page read and write
D21000
unkown
page execute and write copy
4CB0000
direct allocation
page read and write
AC6000
heap
page read and write
C84000
heap
page read and write
2C8E000
stack
page read and write
1630000
heap
page read and write
E29000
unkown
page execute and write copy
B20000
direct allocation
page read and write
539D000
trusted library allocation
page read and write
108E000
stack
page read and write
41AE000
stack
page read and write
310000
unkown
page read and write
C84000
heap
page read and write
54C2000
trusted library allocation
page read and write
DF0000
heap
page read and write
54F8000
trusted library allocation
page read and write
4971000
heap
page read and write
5376000
trusted library allocation
page read and write
3E8E000
stack
page read and write
6FE000
stack
page read and write
456E000
stack
page read and write
1AE5E000
stack
page read and write
1D22C000
stack
page read and write
1CE5E000
stack
page read and write
47E1000
heap
page read and write
58D5000
trusted library allocation
page read and write
6215000
heap
page read and write
B90000
unkown
page execute and write copy
C84000
heap
page read and write
2C4E000
stack
page read and write
47D0000
direct allocation
page read and write
3E5F000
stack
page read and write
5364000
trusted library allocation
page read and write
156E000
stack
page read and write
5010000
direct allocation
page execute and read and write
54F8000
trusted library allocation
page read and write
AF4000
heap
page read and write
50B0000
direct allocation
page execute and read and write
1330000
direct allocation
page read and write
1077000
heap
page read and write
3C3E000
stack
page read and write
4651000
heap
page read and write
5369000
trusted library allocation
page read and write
CF8000
unkown
page execute and write copy
1D33D000
stack
page read and write
E44000
heap
page read and write
778000
heap
page read and write
361E000
stack
page read and write
5369000
trusted library allocation
page read and write
39CF000
stack
page read and write
101F000
stack
page read and write
1244000
heap
page read and write
7E4000
heap
page read and write
4F5C000
stack
page read and write
54C4000
trusted library allocation
page read and write
274000
unkown
page readonly
3CBE000
stack
page read and write
53D0000
direct allocation
page execute and read and write
53A8000
trusted library allocation
page read and write
35DE000
stack
page read and write
650000
unkown
page readonly
7E4000
heap
page read and write
C84000
heap
page read and write
5543000
trusted library allocation
page read and write
4A41000
heap
page read and write
4971000
heap
page read and write
598D000
trusted library allocation
page read and write
54E8000
trusted library allocation
page read and write
26AE000
stack
page read and write
AB9000
unkown
page write copy
4CC1000
heap
page read and write
ABF000
heap
page read and write
5011000
heap
page read and write
C84000
heap
page read and write
13D5000
unkown
page execute and write copy
5386000
trusted library allocation
page read and write
67EC000
stack
page read and write
4E51000
trusted library allocation
page read and write
321E000
stack
page read and write
5011000
heap
page read and write
846000
heap
page read and write
345F000
stack
page read and write
836000
heap
page read and write
5E6A000
trusted library allocation
page read and write
B20000
direct allocation
page read and write
47E1000
heap
page read and write
ACC000
heap
page read and write
AA1000
heap
page read and write
5E51000
trusted library allocation
page read and write
389E000
stack
page read and write
A8D000
heap
page read and write
770000
heap
page read and write
B60000
heap
page read and write
59AD000
trusted library allocation
page read and write
A36A000
heap
page read and write
3D7E000
stack
page read and write
7E4000
heap
page read and write
7E4000
heap
page read and write
2ECF000
stack
page read and write
53C6000
trusted library allocation
page read and write
4CC1000
heap
page read and write
4A41000
heap
page read and write
5B2D000
stack
page read and write
5020000
direct allocation
page execute and read and write
5A2F000
trusted library allocation
page read and write
347F000
stack
page read and write
359F000
stack
page read and write
551F000
trusted library allocation
page read and write
320E000
stack
page read and write
1A0000
unkown
page readonly
1D3A0000
heap
page read and write
D59000
unkown
page execute and write copy
A70000
direct allocation
page read and write
312000
unkown
page execute and write copy
4411000
heap
page read and write
E7F000
heap
page read and write
AF4000
heap
page read and write
5384000
trusted library allocation
page read and write
5372000
trusted library allocation
page read and write
AF4000
heap
page read and write
144E000
heap
page read and write
D12000
unkown
page execute and read and write
312F000
stack
page read and write
1330000
direct allocation
page read and write
D44000
heap
page read and write
4CC1000
heap
page read and write
2DCE000
stack
page read and write
A15000
heap
page read and write
400F000
stack
page read and write
3C8F000
stack
page read and write
EF0000
unkown
page execute and write copy
754000
heap
page read and write
52E0000
direct allocation
page execute and read and write
4CBE000
stack
page read and write
5543000
trusted library allocation
page read and write
1033000
heap
page read and write
C84000
heap
page read and write
5018000
heap
page read and write
4960000
direct allocation
page read and write
AF4000
heap
page read and write
84E000
heap
page read and write
4CB0000
direct allocation
page read and write
3390000
direct allocation
page read and write
4CC1000
heap
page read and write
4A41000
heap
page read and write
4A41000
heap
page read and write
554E000
trusted library allocation
page read and write
DDD000
unkown
page execute and read and write
4E20000
direct allocation
page execute and read and write
5100000
heap
page read and write
634000
heap
page read and write
1465000
heap
page read and write
C54000
heap
page read and write
4CC1000
heap
page read and write
1330000
direct allocation
page read and write
4EB0000
direct allocation
page read and write
7E4000
heap
page read and write
AF4000
heap
page read and write
1244000
heap
page read and write
2917000
heap
page read and write
829000
unkown
page write copy
54D8000
trusted library allocation
page read and write
D28000
unkown
page execute and write copy
54D7000
trusted library allocation
page read and write
539E000
trusted library allocation
page read and write
1244000
heap
page read and write
4A41000
heap
page read and write
4A41000
heap
page read and write
5377000
trusted library allocation
page read and write
4A41000
heap
page read and write
499F000
stack
page read and write
4F90000
direct allocation
page execute and read and write
1244000
heap
page read and write
89A000
unkown
page read and write
FC4000
heap
page read and write
53C9000
trusted library allocation
page read and write
C84000
heap
page read and write
321E000
stack
page read and write
3BDF000
stack
page read and write
4F00000
trusted library allocation
page read and write
5271000
direct allocation
page read and write
58D4000
trusted library allocation
page read and write
984000
heap
page read and write
428E000
stack
page read and write
2E4E000
stack
page read and write
10B0000
direct allocation
page read and write
7CF000
heap
page read and write
4A90000
direct allocation
page execute and read and write
28CF000
stack
page read and write
83FA000
heap
page read and write
4971000
heap
page read and write
3FCE000
stack
page read and write
165F000
heap
page read and write
4411000
heap
page read and write
493E000
stack
page read and write
49CF000
stack
page read and write
A9A000
heap
page read and write
37AE000
stack
page read and write
3B2F000
stack
page read and write
47E1000
heap
page read and write
1676000
heap
page read and write
5375000
trusted library allocation
page read and write
4890000
direct allocation
page read and write
26C000
unkown
page read and write
2AEF000
stack
page read and write
4960000
direct allocation
page read and write
115E000
stack
page read and write
53C6000
trusted library allocation
page read and write
D1D000
unkown
page execute and write copy
5364000
trusted library allocation
page read and write
4651000
heap
page read and write
AC6000
heap
page read and write
62DF000
stack
page read and write
5150000
direct allocation
page read and write
E1B000
heap
page read and write
A95000
heap
page read and write
47E1000
heap
page read and write
58D3000
trusted library allocation
page read and write
4F80000
direct allocation
page execute and read and write
551C000
trusted library allocation
page read and write
5011000
heap
page read and write
C84000
heap
page read and write
EEE000
unkown
page execute and read and write
D41000
unkown
page execute and read and write
564E000
stack
page read and write
1234000
heap
page read and write
5364000
trusted library allocation
page read and write
44DE000
stack
page read and write
10D6000
heap
page read and write
168D000
heap
page read and write
B20000
direct allocation
page read and write
CBE000
stack
page read and write
4F5000
stack
page read and write
A35E000
heap
page read and write
DA0000
heap
page read and write
B00000
direct allocation
page read and write
1076000
heap
page read and write
4EB0000
direct allocation
page read and write
47E1000
heap
page read and write
AA3000
heap
page read and write
47EE000
stack
page read and write
B90000
unkown
page execute and write copy
4AC0000
direct allocation
page execute and read and write
12C000
stack
page read and write
D9E000
unkown
page execute and write copy
C84000
heap
page read and write
4CFC000
stack
page read and write
5318000
trusted library allocation
page read and write
4411000
heap
page read and write
7E4000
heap
page read and write
4651000
heap
page read and write
460F000
stack
page read and write
435F000
stack
page read and write
A44000
heap
page read and write
54C1000
trusted library allocation
page read and write
D44000
heap
page read and write
2AE0000
direct allocation
page execute and read and write
AA1000
heap
page read and write
C84000
heap
page read and write
AF4000
heap
page read and write
B00000
direct allocation
page read and write
1CE000
stack
page read and write
A9E000
heap
page read and write
597F000
trusted library allocation
page read and write
4EB4000
heap
page read and write
10C4000
heap
page read and write
2C2F000
stack
page read and write
385F000
stack
page read and write
D4F000
unkown
page execute and write copy
D90000
direct allocation
page read and write
54D8000
trusted library allocation
page read and write
AB4000
heap
page read and write
154F000
stack
page read and write
2D5F000
stack
page read and write
11EF000
unkown
page execute and read and write
AF4000
heap
page read and write
AF4000
heap
page read and write
A9E000
heap
page read and write
D44000
heap
page read and write
54FC000
trusted library allocation
page read and write
7E4000
heap
page read and write
471F000
stack
page read and write
54E8000
trusted library allocation
page read and write
1077000
heap
page read and write
3FDE000
stack
page read and write
1468000
heap
page read and write
1CF9F000
stack
page read and write
54E8000
trusted library allocation
page read and write
82B000
unkown
page execute and read and write
2A8F000
stack
page read and write
1D40E000
stack
page read and write
59DA000
trusted library allocation
page read and write
144E000
stack
page read and write
2E8F000
stack
page read and write
C84000
heap
page read and write
3390000
direct allocation
page read and write
53C3000
trusted library allocation
page read and write
13DE000
stack
page read and write
10B0000
direct allocation
page read and write
4CB0000
direct allocation
page read and write
1610000
heap
page read and write
456E000
stack
page read and write
AF4000
heap
page read and write
D44000
heap
page read and write
11E4000
heap
page read and write
E2A000
unkown
page execute and read and write
C60000
unkown
page execute and write copy
54D2000
trusted library allocation
page read and write
AF4000
heap
page read and write
1B1DF000
stack
page read and write
5300000
direct allocation
page execute and read and write
E40000
heap
page read and write
A0F000
heap
page read and write
E67000
heap
page read and write
30BF000
stack
page read and write
A70000
direct allocation
page read and write
DF3000
heap
page read and write
323E000
stack
page read and write
5E75000
trusted library allocation
page read and write
302E000
stack
page read and write
54F8000
trusted library allocation
page read and write
E44000
heap
page read and write
4651000
heap
page read and write
371E000
stack
page read and write
11E4000
heap
page read and write
E1E000
heap
page read and write
4651000
heap
page read and write
3C1D000
stack
page read and write
67B000
unkown
page write copy
54EF000
trusted library allocation
page read and write
7F0000
heap
page read and write
4A41000
heap
page read and write
C84000
heap
page read and write
484F000
stack
page read and write
4E20000
direct allocation
page execute and read and write
4651000
heap
page read and write
52F0000
direct allocation
page execute and read and write
3C8D000
stack
page read and write
539D000
trusted library allocation
page read and write
4940000
remote allocation
page read and write
5312000
trusted library allocation
page read and write
70D000
unkown
page read and write
42AF000
stack
page read and write
47AF000
stack
page read and write
55D0000
direct allocation
page execute and read and write
3AB000
stack
page read and write
B30000
unkown
page readonly
A51000
unkown
page execute and write copy
B10000
direct allocation
page read and write
A15000
heap
page read and write
4851000
heap
page read and write
4950000
direct allocation
page read and write
1330000
direct allocation
page read and write
4CC1000
heap
page read and write
D60000
heap
page read and write
A9A000
heap
page read and write
B40000
heap
page read and write
AB2000
unkown
page execute and read and write
42BF000
stack
page read and write
AF4000
heap
page read and write
2AD0000
direct allocation
page read and write
CF6000
unkown
page execute and read and write
4651000
heap
page read and write
AAB000
heap
page read and write
5011000
heap
page read and write
5577000
trusted library allocation
page read and write
535D000
stack
page read and write
2F5F000
stack
page read and write
C84000
heap
page read and write
362F000
stack
page read and write
3C4E000
stack
page read and write
AF4000
heap
page read and write
5543000
trusted library allocation
page read and write
C88000
heap
page read and write
10C9000
heap
page read and write
1A1000
unkown
page execute read
345F000
stack
page read and write
B10000
direct allocation
page read and write
4651000
heap
page read and write
5732000
trusted library allocation
page read and write
5011000
heap
page read and write
66EC000
stack
page read and write
335E000
stack
page read and write
49CF000
stack
page read and write
47D0000
direct allocation
page read and write
47D0000
direct allocation
page read and write
3DBF000
stack
page read and write
47E1000
heap
page read and write
1244000
heap
page read and write
B00000
direct allocation
page read and write
4411000
heap
page read and write
33C7000
heap
page read and write
553D000
trusted library allocation
page read and write
1A0000
unkown
page readonly
B31000
unkown
page execute and read and write
5386000
trusted library allocation
page read and write
E75000
heap
page read and write
5011000
heap
page read and write
7C0000
unkown
page readonly
D4B000
unkown
page execute and read and write
4A41000
heap
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
A29000
heap
page read and write
767000
heap
page read and write
3E9E000
stack
page read and write
54E8000
trusted library allocation
page read and write
38BF000
stack
page read and write
4C60000
direct allocation
page execute and read and write
5011000
heap
page read and write
5610000
heap
page read and write
1084000
heap
page read and write
59AA000
trusted library allocation
page read and write
4651000
heap
page read and write
38EE000
stack
page read and write
380F000
stack
page read and write
545D000
trusted library allocation
page read and write
732000
unkown
page read and write
4CC6000
heap
page read and write
49BF000
stack
page read and write
5A5E000
stack
page read and write
AF4000
heap
page read and write
EEE000
unkown
page execute and read and write
A3D000
heap
page read and write
F6A000
unkown
page execute and read and write
4DFD000
stack
page read and write
5375000
trusted library allocation
page read and write
439F000
stack
page read and write
634000
heap
page read and write
3CAE000
stack
page read and write
AF4000
heap
page read and write
10C4000
heap
page read and write
358F000
stack
page read and write
58DC000
trusted library allocation
page read and write
7E4000
heap
page read and write
845000
heap
page read and write
C80000
heap
page read and write
4CC1000
heap
page read and write
A50000
unkown
page readonly
5020000
direct allocation
page execute and read and write
4651000
heap
page read and write
11E4000
heap
page read and write
4E20000
direct allocation
page execute and read and write
539F000
trusted library allocation
page read and write
1330000
direct allocation
page read and write
E1A000
unkown
page execute and write copy
B00000
direct allocation
page read and write
54F8000
trusted library allocation
page read and write
5011000
heap
page read and write
B10000
direct allocation
page read and write
4EB0000
direct allocation
page read and write
5375000
trusted library allocation
page read and write
1D7AF000
stack
page read and write
5389000
trusted library allocation
page read and write
AAB000
heap
page read and write
54D8000
trusted library allocation
page read and write
4CC1000
heap
page read and write
3EFF000
stack
page read and write
535A000
trusted library allocation
page read and write
4CE0000
heap
page read and write
E1D000
unkown
page execute and write copy
31DF000
stack
page read and write
1AA2E000
stack
page read and write
634000
heap
page read and write
C84000
heap
page read and write
192E000
stack
page read and write
4C60000
direct allocation
page execute and read and write
9CF000
heap
page read and write
47E1000
heap
page read and write
D29000
unkown
page execute and read and write
47E1000
heap
page read and write
12D4000
heap
page read and write
C3E000
stack
page read and write
48FF000
stack
page read and write
D68000
heap
page read and write
732000
unkown
page read and write
5543000
trusted library allocation
page read and write
4CC1000
heap
page read and write
E69000
heap
page read and write
84A000
heap
page read and write
395F000
stack
page read and write
53B5000
trusted library allocation
page read and write
4CB0000
direct allocation
page read and write
47B0000
heap
page read and write
B00000
direct allocation
page read and write
4651000
heap
page read and write
EEE000
unkown
page execute and read and write
5366000
trusted library allocation
page read and write
11B0000
direct allocation
page read and write
5011000
heap
page read and write
ACE000
stack
page read and write
554E000
trusted library allocation
page read and write
E58000
heap
page read and write
1A5AF000
stack
page read and write
4CC1000
heap
page read and write
4CC1000
heap
page read and write
2B0D000
heap
page read and write
634000
heap
page read and write
4651000
heap
page read and write
C84000
heap
page read and write
5C0000
heap
page read and write
E77000
heap
page read and write
5386000
trusted library allocation
page read and write
4CE1000
heap
page read and write
5386000
trusted library allocation
page read and write
C54000
heap
page read and write
C84000
heap
page read and write
66E000
unkown
page readonly
4AE0000
direct allocation
page read and write
4CC1000
heap
page read and write
4651000
heap
page read and write
5369000
trusted library allocation
page read and write
4CC1000
heap
page read and write
4651000
heap
page read and write
429E000
stack
page read and write
460000
remote allocation
page execute and read and write
D97000
unkown
page execute and read and write
5366000
trusted library allocation
page read and write
4CC0000
heap
page read and write
3BCF000
stack
page read and write
3D1F000
stack
page read and write
70D000
unkown
page read and write
13C0000
heap
page read and write
4A41000
heap
page read and write
B00000
direct allocation
page read and write
AF4000
heap
page read and write
2B9F000
stack
page read and write
461F000
stack
page read and write
262000
unkown
page readonly
754000
heap
page read and write
F7E000
unkown
page execute and read and write
7D0000
heap
page read and write
4C8E000
stack
page read and write
4CE1000
heap
page read and write
754000
heap
page read and write
89A000
unkown
page read and write
536D000
trusted library allocation
page read and write
5011000
heap
page read and write
D44000
heap
page read and write
404F000
stack
page read and write
1472000
heap
page read and write
754000
heap
page read and write
4E20000
direct allocation
page execute and read and write
D44000
heap
page read and write
4CC1000
heap
page read and write
A8D000
heap
page read and write
4971000
heap
page read and write
133A000
heap
page read and write
49A1000
heap
page read and write
D2E000
heap
page read and write
124F000
heap
page read and write
C84000
heap
page read and write
A48000
heap
page read and write
4C60000
direct allocation
page execute and read and write
7DB000
heap
page read and write
4AE0000
direct allocation
page read and write
4AD0000
direct allocation
page read and write
6FED000
stack
page read and write
1CF5F000
stack
page read and write
54F8000
trusted library allocation
page read and write
4A41000
heap
page read and write
AB2000
unkown
page execute and read and write
1244000
heap
page read and write
799000
heap
page read and write
4420000
heap
page read and write
4411000
heap
page read and write
48DE000
stack
page read and write
5030000
direct allocation
page execute and read and write
1244000
heap
page read and write
1244000
heap
page read and write
AF4000
heap
page read and write
634000
heap
page read and write
500F000
stack
page read and write
3ADE000
stack
page read and write
5987000
trusted library allocation
page read and write
381F000
stack
page read and write
303E000
stack
page read and write
44D1000
heap
page read and write
3EE000
stack
page read and write
5000000
direct allocation
page execute and read and write
ACB000
heap
page read and write
5535000
trusted library allocation
page read and write
4CC1000
heap
page read and write
634000
heap
page read and write
53EF000
trusted library allocation
page read and write
A70000
direct allocation
page read and write
38EE000
stack
page read and write
4660000
heap
page read and write
54CF000
trusted library allocation
page read and write
A44000
heap
page read and write
58D1000
trusted library allocation
page read and write
829000
unkown
page write copy
5B5F000
stack
page read and write
7E4000
heap
page read and write
4C23000
trusted library allocation
page execute and read and write
E40000
heap
page read and write
A8B000
heap
page read and write
4651000
heap
page read and write
538F000
stack
page read and write
11EF000
unkown
page execute and read and write
2E60000
direct allocation
page read and write
5543000
trusted library allocation
page read and write
4651000
heap
page read and write
C84000
heap
page read and write
2E60000
direct allocation
page read and write
4E40000
heap
page read and write
4A41000
heap
page read and write
1CD1E000
stack
page read and write
754000
heap
page read and write
5508000
trusted library allocation
page read and write
50C0000
direct allocation
page execute and read and write
54F8000
trusted library allocation
page read and write
1620000
heap
page read and write
AF4000
heap
page read and write
5504000
trusted library allocation
page read and write
2E60000
direct allocation
page read and write
54E8000
trusted library allocation
page read and write
566A000
trusted library allocation
page read and write
45FF000
stack
page read and write
295B000
stack
page read and write
2E70000
heap
page read and write
58D0000
trusted library allocation
page read and write
54F8000
trusted library allocation
page read and write
32AE000
stack
page read and write
2F9E000
stack
page read and write
90E000
stack
page read and write
55C9000
trusted library allocation
page read and write
4651000
heap
page read and write
83DC000
stack
page read and write
4A41000
heap
page read and write
4CC1000
heap
page read and write
634000
heap
page read and write
6470000
heap
page read and write
4A41000
heap
page read and write
C84000
heap
page read and write
47E1000
heap
page read and write
C50000
heap
page read and write
55F0000
direct allocation
page execute and read and write
40DF000
stack
page read and write
55FA000
trusted library allocation
page read and write
5AA6000
trusted library allocation
page read and write
107A000
heap
page read and write
4CBE000
stack
page read and write
AF5000
heap
page read and write
4940000
remote allocation
page read and write
C84000
heap
page read and write
4CC1000
heap
page read and write
3B4E000
stack
page read and write
53BB000
trusted library allocation
page read and write
42EE000
stack
page read and write
78E000
stack
page read and write
401E000
stack
page read and write
42EE000
stack
page read and write
D12000
unkown
page execute and read and write
492E000
stack
page read and write
1244000
heap
page read and write
47E1000
heap
page read and write
846000
heap
page read and write
AF4000
heap
page read and write
35CE000
stack
page read and write
85D000
heap
page read and write
4AB0000
direct allocation
page read and write
65B0000
heap
page read and write
4E20000
direct allocation
page execute and read and write
1A8AF000
stack
page read and write
754000
heap
page read and write
AB0000
heap
page read and write
54CF000
trusted library allocation
page read and write
59CE000
trusted library allocation
page read and write
5543000
trusted library allocation
page read and write
857000
heap
page read and write
30CE000
stack
page read and write
47E1000
heap
page read and write
4A10000
direct allocation
page execute and read and write
641F000
stack
page read and write
C84000
heap
page read and write
552A000
trusted library allocation
page read and write
317E000
stack
page read and write
331F000
stack
page read and write
E29000
unkown
page execute and write copy
539D000
trusted library allocation
page read and write
AF4000
heap
page read and write
634000
heap
page read and write
54DA000
trusted library allocation
page read and write
DB6000
unkown
page execute and read and write
4430000
heap
page read and write
11CE000
heap
page read and write
D27000
unkown
page execute and read and write
4CC1000
heap
page read and write
4F0E000
stack
page read and write
4CC1000
heap
page read and write
536B000
trusted library allocation
page read and write
4A41000
heap
page read and write
7E4000
heap
page read and write
58D3000
trusted library allocation
page read and write
5F80000
heap
page read and write
95A000
heap
page read and write
B10000
heap
page read and write
C84000
heap
page read and write
5999000
trusted library allocation
page read and write
262000
unkown
page readonly
AF4000
heap
page read and write
2F0E000
stack
page read and write
ABB000
unkown
page execute and read and write
A95000
heap
page read and write
26C7000
heap
page read and write
2E1F000
stack
page read and write
2FEF000
stack
page read and write
D44000
heap
page read and write
4940000
remote allocation
page read and write
3F9F000
stack
page read and write
54D2000
trusted library allocation
page read and write
4D0C000
stack
page read and write
4651000
heap
page read and write
31C000
stack
page read and write
2E3E000
stack
page read and write
4DBF000
stack
page read and write
4971000
heap
page read and write
53C4000
trusted library allocation
page read and write
ABB000
unkown
page execute and read and write
4651000
heap
page read and write
A37000
heap
page read and write
54D2000
trusted library allocation
page read and write
5011000
heap
page read and write
2B0F000
stack
page read and write
843000
heap
page read and write
A25E000
heap
page read and write
5011000
heap
page read and write
AF4000
heap
page read and write
D44000
heap
page read and write
122F000
unkown
page execute and write copy
ACA000
heap
page read and write
5543000
trusted library allocation
page read and write
53C6000
trusted library allocation
page read and write
54EF000
trusted library allocation
page read and write
536D000
trusted library allocation
page read and write
54D8000
trusted library allocation
page read and write
A48000
heap
page read and write
54DF000
trusted library allocation
page read and write
A15000
heap
page read and write
5568000
trusted library allocation
page read and write
99B000
heap
page read and write
AF4000
heap
page read and write
3FDD000
stack
page read and write
5610000
direct allocation
page execute and read and write
5376000
trusted library allocation
page read and write
A50000
unkown
page read and write
554D000
trusted library allocation
page read and write
D90000
direct allocation
page read and write
370F000
stack
page read and write
3ACE000
stack
page read and write
B20000
direct allocation
page read and write
4F9E000
stack
page read and write
54F8000
trusted library allocation
page read and write
1330000
direct allocation
page read and write
434F000
stack
page read and write
2AD0000
direct allocation
page read and write
A15000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
108F000
heap
page read and write
324F000
stack
page read and write
1218000
unkown
page execute and read and write
728E000
stack
page read and write
364F000
stack
page read and write
5355000
trusted library allocation
page read and write
54E8000
trusted library allocation
page read and write
5630000
direct allocation
page execute and read and write
C54000
heap
page read and write
D44000
heap
page read and write
550F000
trusted library allocation
page read and write
464E000
stack
page read and write
4411000
heap
page read and write
B30000
unkown
page readonly
4651000
heap
page read and write
310000
unkown
page readonly
54F8000
trusted library allocation
page read and write
A82000
unkown
page execute and read and write
70B000
stack
page read and write
4CC1000
heap
page read and write
59E2000
trusted library allocation
page read and write
FC4000
heap
page read and write
A0AA000
heap
page read and write
1244000
heap
page read and write
A0E000
heap
page read and write
D12000
unkown
page execute and read and write
5555000
trusted library allocation
page read and write
420F000
stack
page read and write
4DB1000
heap
page read and write
4CC1000
heap
page read and write
73CE000
stack
page read and write
99E000
stack
page read and write
1610000
heap
page read and write
47E1000
heap
page read and write
4C50000
trusted library allocation
page read and write
588F000
stack
page read and write
4CC1000
heap
page read and write
4E5E000
stack
page read and write
41BE000
stack
page read and write
54B4000
trusted library allocation
page read and write
383F000
stack
page read and write
2ACE000
stack
page read and write
4CF9000
trusted library allocation
page read and write
AF4000
heap
page read and write
3050000
heap
page read and write
FF0000
heap
page read and write
5AEC000
stack
page read and write
7C7000
heap
page read and write
D1E000
stack
page read and write
54F7000
trusted library allocation
page read and write
535B000
trusted library allocation
page read and write
AF4000
heap
page read and write
528F000
stack
page read and write
4A0E000
stack
page read and write
1D7C0000
heap
page read and write
168A000
heap
page read and write
4960000
direct allocation
page read and write
4B0B000
stack
page read and write
53B8000
trusted library allocation
page read and write
10DF000
heap
page read and write
D82000
heap
page read and write
B90000
heap
page read and write
D44000
heap
page read and write
3390000
direct allocation
page read and write
45DF000
stack
page read and write
5F0000
heap
page read and write
634000
heap
page read and write
121F000
unkown
page execute and read and write
3D4E000
stack
page read and write
A51000
unkown
page execute and write copy
578D000
stack
page read and write
4A41000
heap
page read and write
AF4000
heap
page read and write
54CF000
trusted library allocation
page read and write
4411000
heap
page read and write
A37000
heap
page read and write
5543000
trusted library allocation
page read and write
402F000
stack
page read and write
FC4000
heap
page read and write
58DA000
trusted library allocation
page read and write
1330000
direct allocation
page read and write
406E000
stack
page read and write
5011000
heap
page read and write
5396000
trusted library allocation
page read and write
270000
unkown
page write copy
D70000
heap
page read and write
535B000
trusted library allocation
page read and write
A0F000
heap
page read and write
5ED000
remote allocation
page execute and read and write
274000
unkown
page readonly
1CE9E000
stack
page read and write
4651000
heap
page read and write
34CF000
stack
page read and write
4CE1000
heap
page read and write
53B0000
trusted library allocation
page read and write
54E8000
trusted library allocation
page read and write
7D0000
heap
page read and write
54FC000
trusted library allocation
page read and write
3080000
direct allocation
page read and write
11E4000
heap
page read and write
5A28000
trusted library allocation
page read and write
1640000
heap
page read and write
34DE000
stack
page read and write
E60000
heap
page read and write
C4F000
stack
page read and write
2F5F000
stack
page read and write
5011000
heap
page read and write
442E000
stack
page read and write
58DB000
trusted library allocation
page read and write
4651000
heap
page read and write
D90000
direct allocation
page read and write
4C7E000
stack
page read and write
3C0E000
stack
page read and write
33EE000
stack
page read and write
7E4000
heap
page read and write
1244000
heap
page read and write
AF4000
heap
page read and write
54F8000
trusted library allocation
page read and write
2E60000
direct allocation
page read and write
554D000
trusted library allocation
page read and write
F9E000
stack
page read and write
4A00000
direct allocation
page execute and read and write
4C0E000
stack
page read and write
A50000
unkown
page readonly
DAC000
unkown
page execute and write copy
11E4000
heap
page read and write
754000
heap
page read and write
4E10000
direct allocation
page execute and read and write
52D0000
direct allocation
page execute and read and write
634000
heap
page read and write
287E000
stack
page read and write
11B0000
direct allocation
page read and write
AF4000
heap
page read and write
1119000
unkown
page execute and read and write
3A8F000
stack
page read and write
47E1000
heap
page read and write
58DE000
trusted library allocation
page read and write
A70000
direct allocation
page read and write
4A45000
trusted library allocation
page read and write
829000
heap
page read and write
E00000
unkown
page execute and read and write
754000
heap
page read and write
D44000
heap
page read and write
A99000
heap
page read and write
4A2F000
stack
page read and write
2E60000
direct allocation
page read and write
8AC000
unkown
page readonly
2BDE000
stack
page read and write
E44000
heap
page read and write
58D5000
trusted library allocation
page read and write
4DB1000
heap
page read and write
4A90000
trusted library allocation
page read and write
4AC0000
direct allocation
page execute and read and write
531B000
trusted library allocation
page read and write
55CF000
stack
page read and write
4AC0000
direct allocation
page execute and read and write
43CE000
stack
page read and write
D9E000
unkown
page execute and write copy
398E000
stack
page read and write
4851000
heap
page read and write
58D4000
trusted library allocation
page read and write
34CF000
stack
page read and write
C54000
heap
page read and write
107B000
heap
page read and write
520E000
stack
page read and write
5354000
trusted library allocation
page read and write
1AC6E000
stack
page read and write
4651000
heap
page read and write
ACA000
heap
page read and write
B00000
direct allocation
page read and write
C84000
heap
page read and write
47E1000
heap
page read and write
ACA000
heap
page read and write
AF4000
heap
page read and write
4651000
heap
page read and write
47F6000
heap
page read and write
DDD000
unkown
page execute and read and write
FC4000
heap
page read and write
D44000
heap
page read and write
FFD000
stack
page read and write
AF4000
heap
page read and write
10B0000
direct allocation
page read and write
4CC1000
heap
page read and write
5340000
direct allocation
page execute and read and write
4651000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
3390000
direct allocation
page read and write
5382000
trusted library allocation
page read and write
1244000
heap
page read and write
4CC1000
heap
page read and write
54C5000
trusted library allocation
page read and write
4651000
heap
page read and write
47E1000
heap
page read and write
7E4000
heap
page read and write
4ECF000
stack
page read and write
5AC7000
trusted library allocation
page read and write
940000
heap
page read and write
D50000
unkown
page execute and read and write
554E000
trusted library allocation
page read and write
4A41000
heap
page read and write
94E000
stack
page read and write
46BE000
stack
page read and write
538B000
trusted library allocation
page read and write
A70000
direct allocation
page read and write
1244000
heap
page read and write
E12000
heap
page read and write
26C0000
heap
page read and write
54D8000
trusted library allocation
page read and write
6471000
heap
page read and write
47E1000
heap
page read and write
5DEE000
stack
page read and write
630000
heap
page read and write
54D2000
trusted library allocation
page read and write
950000
heap
page read and write
634000
heap
page read and write
4971000
heap
page read and write
47E1000
heap
page read and write
54F8000
trusted library allocation
page read and write
54E8000
trusted library allocation
page read and write
5988000
trusted library allocation
page read and write
38FE000
stack
page read and write
42AF000
stack
page read and write
53D0000
direct allocation
page execute and read and write
DAD000
unkown
page execute and read and write
2AF0000
direct allocation
page execute and read and write
AF4000
heap
page read and write
53C0000
direct allocation
page execute and read and write
D44000
heap
page read and write
C84000
heap
page read and write
4411000
heap
page read and write
165A000
heap
page read and write
3A3E000
stack
page read and write
49E0000
direct allocation
page execute and read and write
474F000
stack
page read and write
D7E000
heap
page read and write
406E000
stack
page read and write
C54000
heap
page read and write
575F000
stack
page read and write
61DE000
stack
page read and write
5600000
direct allocation
page execute and read and write
B20000
direct allocation
page read and write
1244000
heap
page read and write
A99000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
4AB0000
direct allocation
page read and write
437F000
stack
page read and write
C84000
heap
page read and write
10C4000
heap
page read and write
4411000
heap
page read and write
58D7000
trusted library allocation
page read and write
108F000
heap
page read and write
A50000
unkown
page readonly
54CE000
stack
page read and write
54D2000
trusted library allocation
page read and write
D44000
heap
page read and write
AB9000
unkown
page write copy
3BDF000
stack
page read and write
5367000
trusted library allocation
page read and write
1244000
heap
page read and write
54E8000
trusted library allocation
page read and write
5FCB000
stack
page read and write
5136000
trusted library allocation
page read and write
4CC1000
heap
page read and write
A90000
heap
page read and write
4651000
heap
page read and write
4AB0000
direct allocation
page read and write
4CC1000
heap
page read and write
9EF000
stack
page read and write
54F0000
trusted library allocation
page read and write
D59000
unkown
page execute and read and write
1B0DE000
stack
page read and write
4651000
heap
page read and write
5390000
direct allocation
page execute and read and write
4E6E000
trusted library allocation
page read and write
5543000
trusted library allocation
page read and write
4A41000
heap
page read and write
10C4000
heap
page read and write
163F000
stack
page read and write
83E0000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
4A41000
heap
page read and write
11E4000
heap
page read and write
4CC1000
heap
page read and write
E29000
unkown
page execute and write copy
4411000
heap
page read and write
54F8000
trusted library allocation
page read and write
4A41000
heap
page read and write
3CAE000
stack
page read and write
54CD000
trusted library allocation
page read and write
C84000
heap
page read and write
459000
unkown
page execute and write copy
5366000
trusted library allocation
page read and write
1020000
heap
page read and write
AAB000
heap
page read and write
58D5000
trusted library allocation
page read and write
1244000
heap
page read and write
A35B000
heap
page read and write
3B1E000
stack
page read and write
A9A000
heap
page read and write
A95000
heap
page read and write
5535000
trusted library allocation
page read and write
4AC0000
direct allocation
page execute and read and write
300B000
stack
page read and write
30CF000
stack
page read and write
CF6000
unkown
page execute and read and write
554D000
trusted library allocation
page read and write
54E8000
trusted library allocation
page read and write
44D1000
heap
page read and write
4651000
heap
page read and write
D0E000
stack
page read and write
536B000
trusted library allocation
page read and write
4A41000
heap
page read and write
53C0000
direct allocation
page execute and read and write
A99000
heap
page read and write
C84000
heap
page read and write
5356000
trusted library allocation
page read and write
450E000
stack
page read and write
2F5F000
stack
page read and write
D44000
heap
page read and write
3FFE000
stack
page read and write
3C5E000
stack
page read and write
2C0F000
stack
page read and write
400E000
stack
page read and write
B90000
unkown
page execute and write copy
AF4000
heap
page read and write
D79000
unkown
page execute and write copy
5210000
direct allocation
page read and write
330F000
stack
page read and write
AB3000
heap
page read and write
160E000
stack
page read and write
539A000
trusted library allocation
page read and write
1240000
heap
page read and write
4CC1000
heap
page read and write
5388000
trusted library allocation
page read and write
5A9000
unkown
page execute and read and write
58D7000
trusted library allocation
page read and write
122E000
unkown
page execute and write copy
3390000
direct allocation
page read and write
4CC1000
heap
page read and write
634000
heap
page read and write
2E60000
direct allocation
page read and write
58D4000
trusted library allocation
page read and write
4411000
heap
page read and write
331F000
stack
page read and write
AB9000
unkown
page write copy
421F000
stack
page read and write
AB9000
unkown
page write copy
A10000
heap
page read and write
4651000
heap
page read and write
5358000
trusted library allocation
page read and write
4411000
heap
page read and write
537E000
trusted library allocation
page read and write
3DEE000
stack
page read and write
634000
heap
page read and write
E12000
heap
page read and write
53B8000
trusted library allocation
page read and write
4FE000
stack
page read and write
5011000
heap
page read and write
4AB0000
direct allocation
page read and write
4E81000
direct allocation
page read and write
13D4000
unkown
page execute and read and write
425F000
stack
page read and write
3FBF000
stack
page read and write
4C70000
direct allocation
page read and write
5543000
trusted library allocation
page read and write
4DB1000
heap
page read and write
D44000
heap
page read and write
77B000
heap
page read and write
304E000
stack
page read and write
C84000
heap
page read and write
D26000
unkown
page execute and write copy
6FA000
stack
page read and write
4651000
heap
page read and write
5011000
heap
page read and write
AAE000
heap
page read and write
54F4000
trusted library allocation
page read and write
47E1000
heap
page read and write
4960000
direct allocation
page read and write
4C4A000
trusted library allocation
page execute and read and write
4651000
heap
page read and write
5385000
trusted library allocation
page read and write
3DAF000
stack
page read and write
4DB1000
heap
page read and write
1244000
heap
page read and write
3A0000
heap
page read and write
1CD3E000
stack
page read and write
3F0000
heap
page read and write
7E4000
heap
page read and write
313F000
stack
page read and write
44D1000
heap
page read and write
47D0000
direct allocation
page read and write
4DB1000
heap
page read and write
1244000
heap
page read and write
4A41000
heap
page read and write
4411000
heap
page read and write
54C4000
trusted library allocation
page read and write
4DE7000
trusted library allocation
page read and write
DD3000
unkown
page execute and read and write
4CC1000
heap
page read and write
AB2000
unkown
page execute and read and write
340E000
stack
page read and write
423F000
stack
page read and write
402F000
stack
page read and write
C84000
heap
page read and write
53D0000
direct allocation
page execute and read and write
35FE000
stack
page read and write
50D0000
direct allocation
page execute and read and write
5543000
trusted library allocation
page read and write
70F000
remote allocation
page execute and read and write
3E5F000
stack
page read and write
3B2F000
stack
page read and write
C84000
heap
page read and write
AAB000
heap
page read and write
A8D000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
4C9E000
stack
page read and write
850000
heap
page read and write
4A41000
heap
page read and write
E40000
heap
page read and write
ABB000
unkown
page execute and read and write
54AE000
stack
page read and write
4651000
heap
page read and write
634000
heap
page read and write
4E30000
trusted library allocation
page read and write
4651000
heap
page read and write
AB9000
unkown
page write copy
AF4000
heap
page read and write
38CE000
stack
page read and write
E3F000
unkown
page execute and write copy
53E9000
trusted library allocation
page read and write
D95000
unkown
page execute and write copy
488F000
stack
page read and write
47E1000
heap
page read and write
B10000
direct allocation
page read and write
5364000
trusted library allocation
page read and write
3390000
direct allocation
page read and write
168D000
heap
page read and write
D44000
heap
page read and write
D90000
direct allocation
page read and write
2E5E000
stack
page read and write
E31000
unkown
page execute and write copy
5384000
trusted library allocation
page read and write
333F000
stack
page read and write
479E000
stack
page read and write
3390000
direct allocation
page read and write
338F000
stack
page read and write
4C5F000
stack
page read and write
121F000
unkown
page execute and read and write
554E000
trusted library allocation
page read and write
4EB0000
heap
page read and write
AF4000
heap
page read and write
47E1000
heap
page read and write
3080000
direct allocation
page read and write
582F000
stack
page read and write
7E4000
heap
page read and write
5386000
trusted library allocation
page read and write
54E8000
trusted library allocation
page read and write
A35E000
heap
page read and write
2A5F000
stack
page read and write
4CC1000
heap
page read and write
47E1000
heap
page read and write
B20000
direct allocation
page read and write
AAB000
heap
page read and write
B00000
direct allocation
page read and write
362F000
stack
page read and write
D44000
heap
page read and write
4AFF000
stack
page read and write
4DB1000
heap
page read and write
D90000
direct allocation
page read and write
1D1E0000
heap
page read and write
4851000
heap
page read and write
A35B000
heap
page read and write
16AA000
heap
page read and write
59DB000
trusted library allocation
page read and write
A80000
heap
page read and write
122E000
unkown
page execute and read and write
E81000
heap
page read and write
5600000
direct allocation
page execute and read and write
A43000
heap
page read and write
1D64F000
stack
page read and write
4DB1000
heap
page read and write
121F000
unkown
page execute and read and write
4EB0000
direct allocation
page read and write
5330000
direct allocation
page execute and read and write
847000
heap
page read and write
5527000
trusted library allocation
page read and write
408E000
stack
page read and write
53BD000
trusted library allocation
page read and write
4DC6000
trusted library allocation
page read and write
750000
heap
page read and write
AAB000
heap
page read and write
364E000
stack
page read and write
5386000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
E1F000
heap
page read and write
54FB000
trusted library allocation
page read and write
531A000
trusted library allocation
page read and write
4411000
heap
page read and write
D44000
heap
page read and write
10B0000
direct allocation
page read and write
5543000
trusted library allocation
page read and write
32CE000
stack
page read and write
15AE000
stack
page read and write
326F000
stack
page read and write
33B0000
direct allocation
page read and write
5402000
trusted library allocation
page read and write
5420000
direct allocation
page execute and read and write
AF4000
heap
page read and write
4E20000
trusted library allocation
page read and write
3F2E000
stack
page read and write
4CC1000
heap
page read and write
AF4000
heap
page read and write
5543000
trusted library allocation
page read and write
B10000
direct allocation
page read and write
4EB0000
direct allocation
page read and write
54E8000
trusted library allocation
page read and write
4651000
heap
page read and write
D90000
direct allocation
page read and write
3C6F000
stack
page read and write
4A00000
direct allocation
page execute and read and write
4411000
heap
page read and write
4651000
heap
page read and write
26B0000
direct allocation
page read and write
4411000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
440E000
stack
page read and write
99D000
heap
page read and write
3B3F000
stack
page read and write
83D000
heap
page read and write
AF4000
heap
page read and write
A15000
heap
page read and write
58A0000
remote allocation
page read and write
CA1000
heap
page read and write
852000
heap
page read and write
D8B000
unkown
page execute and read and write
D1D000
unkown
page execute and write copy
47E1000
heap
page read and write
33EE000
stack
page read and write
54E8000
trusted library allocation
page read and write
404E000
stack
page read and write
54DF000
trusted library allocation
page read and write
4CC1000
heap
page read and write
4DAF000
stack
page read and write
3E0E000
stack
page read and write
460E000
stack
page read and write
4CC1000
heap
page read and write
850000
heap
page read and write
10C4000
heap
page read and write
44D1000
heap
page read and write
D51000
unkown
page execute and write copy
67B000
unkown
page write copy
33B0000
direct allocation
page read and write
2E60000
direct allocation
page read and write
4DD2000
trusted library allocation
page read and write
10B0000
direct allocation
page read and write
3D5F000
stack
page read and write
754000
heap
page read and write
5543000
trusted library allocation
page read and write
2D6F000
stack
page read and write
4971000
heap
page read and write
79C000
heap
page read and write
4CC1000
heap
page read and write
56C000
stack
page read and write
5350000
direct allocation
page execute and read and write
59E8000
trusted library allocation
page read and write
E64000
heap
page read and write
4A30000
direct allocation
page execute and read and write
5210000
direct allocation
page read and write
59C9000
trusted library allocation
page read and write
7CD000
heap
page read and write
4DB1000
heap
page read and write
103E000
stack
page read and write
A37F000
heap
page read and write
A48000
heap
page read and write
4A00000
direct allocation
page execute and read and write
4651000
heap
page read and write
4651000
heap
page read and write
4971000
heap
page read and write
54F8000
trusted library allocation
page read and write
DD2000
unkown
page execute and write copy
1AE1F000
stack
page read and write
DFE000
heap
page read and write
C84000
heap
page read and write
10CE000
heap
page read and write
58D4000
trusted library allocation
page read and write
5375000
trusted library allocation
page read and write
2CDF000
stack
page read and write
7B0000
heap
page read and write
38CF000
stack
page read and write
4CC1000
heap
page read and write
795000
heap
page read and write
1244000
heap
page read and write
A48000
heap
page read and write
58DE000
trusted library allocation
page read and write
47E1000
heap
page read and write
4651000
heap
page read and write
93E000
stack
page read and write
3DAF000
stack
page read and write
54F8000
trusted library allocation
page read and write
487F000
stack
page read and write
D44000
heap
page read and write
11E4000
heap
page read and write
385E000
stack
page read and write
44DE000
stack
page read and write
4CB0000
direct allocation
page read and write
55AF000
stack
page read and write
754000
heap
page read and write
349E000
stack
page read and write
634000
heap
page read and write
360E000
stack
page read and write
53DE000
trusted library allocation
page read and write
D59000
unkown
page execute and write copy
399E000
stack
page read and write
4CC1000
heap
page read and write
5543000
trusted library allocation
page read and write
518B000
stack
page read and write
53A6000
trusted library allocation
page read and write
5375000
trusted library allocation
page read and write
156F000
stack
page read and write
51DE000
stack
page read and write
4651000
heap
page read and write
A37000
heap
page read and write
5315000
trusted library allocation
page read and write
6480000
heap
page read and write
11E4000
heap
page read and write
14F0000
heap
page read and write
55C3000
trusted library allocation
page read and write
14B4000
heap
page read and write
5011000
heap
page read and write
4851000
heap
page read and write
4C1F000
stack
page read and write
3EEF000
stack
page read and write
5F95000
heap
page read and write
556F000
trusted library allocation
page read and write
4651000
heap
page read and write
4411000
heap
page read and write
B10000
direct allocation
page read and write
10B0000
heap
page read and write
D44000
heap
page read and write
3FCF000
stack
page read and write
C84000
heap
page read and write
C40000
heap
page read and write
537D000
trusted library allocation
page read and write
C84000
heap
page read and write
7E0000
heap
page read and write
5A05000
trusted library allocation
page read and write
8AC000
unkown
page readonly
54C2000
trusted library allocation
page read and write
A29000
heap
page read and write
5692000
trusted library allocation
page read and write
5B2E000
trusted library allocation
page read and write
DF2000
heap
page read and write
E44000
heap
page read and write
560E000
stack
page read and write
5369000
trusted library allocation
page read and write
4411000
heap
page read and write
7E4000
heap
page read and write
4A80000
heap
page read and write
4411000
heap
page read and write
4A41000
heap
page read and write
54CF000
trusted library allocation
page read and write
701000
unkown
page read and write
7E4000
heap
page read and write
58D1000
trusted library allocation
page read and write
1A7AF000
stack
page read and write
4960000
direct allocation
page read and write
9BF000
stack
page read and write
50A0000
direct allocation
page execute and read and write
300E000
stack
page read and write
C54000
heap
page read and write
D41000
unkown
page execute and read and write
4CC1000
heap
page read and write
41AE000
stack
page read and write
4CC1000
heap
page read and write
3DCF000
stack
page read and write
1244000
heap
page read and write
10C4000
heap
page read and write
85E000
heap
page read and write
54F6000
trusted library allocation
page read and write
425E000
stack
page read and write
598B000
trusted library allocation
page read and write
4F90000
direct allocation
page execute and read and write
C45000
stack
page read and write
4DB1000
heap
page read and write
4E20000
remote allocation
page read and write
2EEE000
stack
page read and write
4850000
heap
page read and write
A37F000
heap
page read and write
C84000
heap
page read and write
58DC000
trusted library allocation
page read and write
4FE0000
direct allocation
page execute and read and write
C84000
heap
page read and write
5566000
trusted library allocation
page read and write
47E1000
heap
page read and write
3B6E000
stack
page read and write
4651000
heap
page read and write
1038000
heap
page read and write
523D000
stack
page read and write
C84000
heap
page read and write
4CD0000
direct allocation
page read and write
3D3F000
stack
page read and write
546B000
stack
page read and write
4411000
heap
page read and write
54C8000
trusted library allocation
page read and write
D7D000
unkown
page execute and read and write
54F8000
trusted library allocation
page read and write
4C60000
direct allocation
page execute and read and write
5543000
trusted library allocation
page read and write
4DE0000
direct allocation
page execute and read and write
37BE000
stack
page read and write
AF4000
heap
page read and write
4C30000
heap
page read and write
C84000
heap
page read and write
47E1000
heap
page read and write
4960000
direct allocation
page read and write
5494000
trusted library allocation
page read and write
1244000
heap
page read and write
47E1000
heap
page read and write
4C50000
direct allocation
page execute and read and write
4E20000
remote allocation
page read and write
A0F000
heap
page read and write
43CF000
stack
page read and write
8FE000
stack
page read and write
4B6F000
stack
page read and write
53B1000
trusted library allocation
page read and write
754000
heap
page read and write
2A0E000
stack
page read and write
28BC000
stack
page read and write
1D0DE000
stack
page read and write
489F000
stack
page read and write
166A000
heap
page read and write
754000
heap
page read and write
D28000
unkown
page execute and write copy
384E000
stack
page read and write
98A000
heap
page read and write
1244000
heap
page read and write
55E0000
direct allocation
page execute and read and write
A50000
unkown
page readonly
F7E000
unkown
page execute and read and write
38AF000
stack
page read and write
339F000
stack
page read and write
C84000
heap
page read and write
5543000
trusted library allocation
page read and write
6F9000
remote allocation
page execute and read and write
2EFE000
stack
page read and write
760000
heap
page read and write
4DB1000
heap
page read and write
33CF000
stack
page read and write
4DB1000
heap
page read and write
54F8000
trusted library allocation
page read and write
10C4000
heap
page read and write
58FD000
stack
page read and write
5F90000
heap
page read and write
C84000
heap
page read and write
A70000
direct allocation
page read and write
4B12000
trusted library allocation
page read and write
5011000
heap
page read and write
634000
heap
page read and write
399E000
stack
page read and write
C84000
heap
page read and write
54DD000
trusted library allocation
page read and write
5366000
trusted library allocation
page read and write
4CC0000
direct allocation
page execute and read and write
54E8000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
10C4000
heap
page read and write
33AF000
stack
page read and write
1AF9E000
stack
page read and write
535A000
trusted library allocation
page read and write
8AC000
unkown
page readonly
1AB6E000
stack
page read and write
5220000
heap
page read and write
3B6E000
stack
page read and write
58D3000
trusted library allocation
page read and write
47E1000
heap
page read and write
4CC1000
heap
page read and write
E3F000
unkown
page execute and read and write
58DD000
trusted library allocation
page read and write
A0F000
heap
page read and write
A48000
heap
page read and write
430E000
stack
page read and write
464F000
stack
page read and write
44D1000
heap
page read and write
554D000
trusted library allocation
page read and write
385E000
stack
page read and write
49A0000
heap
page read and write
C84000
heap
page read and write
3F8F000
stack
page read and write
4651000
heap
page read and write
59B1000
trusted library allocation
page read and write
AF4000
heap
page read and write
4651000
heap
page read and write
54C1000
trusted library allocation
page read and write
46AE000
stack
page read and write
3F9F000
stack
page read and write
634000
heap
page read and write
1D28E000
stack
page read and write
B9A000
unkown
page execute and write copy
359F000
stack
page read and write
FC4000
heap
page read and write
3A9F000
stack
page read and write
9A1000
heap
page read and write
53A0000
direct allocation
page execute and read and write
4AB0000
direct allocation
page read and write
4411000
heap
page read and write
D44000
heap
page read and write
E58000
heap
page read and write
43EF000
stack
page read and write
29CF000
stack
page read and write
DDD000
unkown
page execute and read and write
A5B000
heap
page read and write
D7D000
unkown
page execute and read and write
A11000
heap
page read and write
58DF000
trusted library allocation
page read and write
C84000
heap
page read and write
330F000
stack
page read and write
AF4000
heap
page read and write
54C2000
trusted library allocation
page read and write
371E000
stack
page read and write
1330000
direct allocation
page read and write
4CC1000
heap
page read and write
1330000
direct allocation
page read and write
58D2000
trusted library allocation
page read and write
5011000
heap
page read and write
5B8000
unkown
page execute and write copy
397F000
stack
page read and write
10DD000
heap
page read and write
DEB000
heap
page read and write
54D7000
trusted library allocation
page read and write
2DAE000
stack
page read and write
54D7000
trusted library allocation
page read and write
A29000
heap
page read and write
439E000
stack
page read and write
10B0000
heap
page read and write
4411000
heap
page read and write
54F8000
trusted library allocation
page read and write
5A8F000
trusted library allocation
page read and write
35BF000
stack
page read and write
552D000
trusted library allocation
page read and write
AAB000
heap
page read and write
54EF000
trusted library allocation
page read and write
5518000
trusted library allocation
page read and write
B31000
unkown
page execute and write copy
7BB000
heap
page read and write
E77000
heap
page read and write
4B4E000
stack
page read and write
512E000
trusted library allocation
page read and write
682E000
stack
page read and write
D85000
unkown
page execute and write copy
4F50000
direct allocation
page read and write
DAE000
unkown
page execute and write copy
7C7000
heap
page read and write
A372000
heap
page read and write
401000
remote allocation
page execute and read and write
53D6000
trusted library allocation
page read and write
D20000
unkown
page readonly
2B2B000
stack
page read and write
54F4000
trusted library allocation
page read and write
106D000
heap
page read and write
552F000
trusted library allocation
page read and write
D27000
unkown
page execute and read and write
12D4000
heap
page read and write
C84000
heap
page read and write
163B000
heap
page read and write
4D9F000
stack
page read and write
4A41000
heap
page read and write
166A000
heap
page read and write
BF4000
heap
page read and write
4651000
heap
page read and write
4851000
heap
page read and write
4651000
heap
page read and write
B00000
direct allocation
page read and write
A37000
heap
page read and write
54C8000
trusted library allocation
page read and write
35DF000
stack
page read and write
33FE000
stack
page read and write
D21000
unkown
page execute and write copy
4C30000
direct allocation
page execute and read and write
314F000
stack
page read and write
4CC1000
heap
page read and write
381F000
stack
page read and write
EF0000
unkown
page execute and write copy
52D0000
direct allocation
page execute and read and write
3197000
heap
page read and write
5150000
direct allocation
page read and write
47E1000
heap
page read and write
E1D000
unkown
page execute and write copy
1084000
heap
page read and write
AB4000
heap
page read and write
C84000
heap
page read and write
47FE000
stack
page read and write
AF4000
heap
page read and write
D4B000
unkown
page execute and read and write
B00000
direct allocation
page read and write
3C0F000
stack
page read and write
4DB1000
heap
page read and write
1300000
heap
page read and write
4411000
heap
page read and write
58DC000
trusted library allocation
page read and write
1D91E000
stack
page read and write
2E50000
heap
page read and write
3EE000
stack
page read and write
3BFF000
stack
page read and write
4AB0000
direct allocation
page read and write
5543000
trusted library allocation
page read and write
4411000
heap
page read and write
122E000
unkown
page execute and write copy
59F8000
trusted library allocation
page read and write
4880000
remote allocation
page read and write
4411000
heap
page read and write
70000
unkown
page readonly
C54000
heap
page read and write
C84000
heap
page read and write
F8C000
stack
page read and write
4CC1000
heap
page read and write
A97000
heap
page read and write
10CD000
heap
page read and write
150000
unkown
page readonly
5350000
trusted library allocation
page read and write
4651000
heap
page read and write
A0F000
heap
page read and write
54E8000
trusted library allocation
page read and write
2ECE000
stack
page read and write
31FF000
stack
page read and write
1330000
heap
page read and write
5B8000
unkown
page execute and read and write
1D23D000
stack
page read and write
634000
heap
page read and write
A44000
heap
page read and write
A44000
heap
page read and write
475E000
stack
page read and write
5FD5000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
1244000
heap
page read and write
4651000
heap
page read and write
AB9000
unkown
page write copy
370000
heap
page read and write
DA2000
unkown
page execute and read and write
54E8000
trusted library allocation
page read and write
5504000
trusted library allocation
page read and write
AF4000
heap
page read and write
53D0000
direct allocation
page execute and read and write
300F000
stack
page read and write
AF4000
heap
page read and write
450F000
stack
page read and write
387E000
stack
page read and write
3B8E000
stack
page read and write
4411000
heap
page read and write
DB7000
unkown
page execute and write copy
122F000
unkown
page execute and write copy
1100000
heap
page read and write
5F80000
heap
page read and write
54C2000
trusted library allocation
page read and write
54C8000
trusted library allocation
page read and write
34FF000
stack
page read and write
3060000
heap
page read and write
3C4F000
stack
page read and write
316000
unkown
page write copy
4CC1000
heap
page read and write
A9B000
heap
page read and write
AC9000
unkown
page execute and read and write
B20000
direct allocation
page read and write
474E000
stack
page read and write
4851000
heap
page read and write
B20000
direct allocation
page read and write
47E1000
heap
page read and write
C54000
heap
page read and write
306B000
heap
page read and write
3AFE000
stack
page read and write
4F90000
direct allocation
page execute and read and write
D97000
unkown
page execute and read and write
554E000
trusted library allocation
page read and write
5543000
trusted library allocation
page read and write
5011000
heap
page read and write
A9E000
heap
page read and write
4CD0000
heap
page read and write
4A0D000
stack
page read and write
352E000
stack
page read and write
4CC1000
heap
page read and write
5360000
trusted library allocation
page read and write
418F000
stack
page read and write
377F000
stack
page read and write
4AB0000
direct allocation
page read and write
560D000
stack
page read and write
2900000
heap
page read and write
AF4000
heap
page read and write
5380000
direct allocation
page execute and read and write
C84000
heap
page read and write
1D38F000
stack
page read and write
4A41000
heap
page read and write
C84000
heap
page read and write
4CC1000
heap
page read and write
619F000
stack
page read and write
C84000
heap
page read and write
A95000
heap
page read and write
1434000
heap
page read and write
D44000
heap
page read and write
54C6000
trusted library allocation
page read and write
4DDA000
trusted library allocation
page read and write
3D5E000
stack
page read and write
33C0000
heap
page read and write
7BB000
heap
page read and write
449F000
stack
page read and write
D5A000
unkown
page execute and write copy
AF4000
heap
page read and write
51C0000
trusted library allocation
page read and write
1230000
heap
page read and write
7C1000
unkown
page execute and write copy
60E000
stack
page read and write
AF4000
heap
page read and write
11E4000
heap
page read and write
43DD000
stack
page read and write
701000
remote allocation
page execute and read and write
2E77000
heap
page read and write
83D000
heap
page read and write
7E4000
heap
page read and write
45CF000
stack
page read and write
4C7C000
stack
page read and write
AF4000
heap
page read and write
4A41000
heap
page read and write
4651000
heap
page read and write
C54000
heap
page read and write
1244000
heap
page read and write
AF4000
heap
page read and write
A15000
heap
page read and write
D5A000
unkown
page execute and write copy
3B0F000
stack
page read and write
5390000
direct allocation
page execute and read and write
4411000
heap
page read and write
4E0F000
stack
page read and write
4AC1000
heap
page read and write
4AB0000
direct allocation
page read and write
59FC000
trusted library allocation
page read and write
58D2000
trusted library allocation
page read and write
ACC000
heap
page read and write
4651000
heap
page read and write
AC2000
heap
page read and write
416F000
stack
page read and write
EF0000
unkown
page execute and write copy
539B000
trusted library allocation
page read and write
10C4000
heap
page read and write
5543000
trusted library allocation
page read and write
1221000
heap
page read and write
89E000
stack
page read and write
AAB000
heap
page read and write
534F000
stack
page read and write
D59000
unkown
page execute and read and write
B10000
direct allocation
page read and write
D8B000
unkown
page execute and read and write
1A1000
unkown
page execute read
4D8F000
stack
page read and write
7E4000
heap
page read and write
5543000
trusted library allocation
page read and write
531B000
trusted library allocation
page read and write
4EB0000
direct allocation
page read and write
4411000
heap
page read and write
4C80000
direct allocation
page execute and read and write
58A0000
remote allocation
page read and write
10C4000
heap
page read and write
1035000
heap
page read and write
780000
heap
page read and write
4C60000
direct allocation
page execute and read and write
E40000
heap
page read and write
A37000
heap
page read and write
47E1000
heap
page read and write
5389000
trusted library allocation
page read and write
AF4000
heap
page read and write
5390000
direct allocation
page execute and read and write
5374000
trusted library allocation
page read and write
531A000
trusted library allocation
page read and write
53E0000
direct allocation
page execute and read and write
47E1000
heap
page read and write
1330000
direct allocation
page read and write
47E1000
heap
page read and write
7E4000
heap
page read and write
5374000
trusted library allocation
page read and write
AF4000
heap
page read and write
47E1000
heap
page read and write
A48000
heap
page read and write
5011000
heap
page read and write
3EA000
stack
page read and write
5543000
trusted library allocation
page read and write
4651000
heap
page read and write
5534000
trusted library allocation
page read and write
3B4E000
stack
page read and write
C84000
heap
page read and write
75C000
unkown
page execute and read and write
E02000
unkown
page execute and read and write
E29000
unkown
page execute and write copy
822000
unkown
page execute and read and write
1244000
heap
page read and write
5011000
heap
page read and write
DD3000
unkown
page execute and read and write
47E1000
heap
page read and write
34EF000
stack
page read and write
4651000
heap
page read and write
5364000
trusted library allocation
page read and write
59EC000
trusted library allocation
page read and write
C73000
heap
page read and write
A372000
heap
page read and write
374F000
stack
page read and write
AC9000
unkown
page execute and write copy
4C34000
trusted library allocation
page read and write
1D95E000
stack
page read and write
122E000
unkown
page execute and read and write
4D81000
heap
page read and write
1244000
heap
page read and write
52C0000
direct allocation
page execute and read and write
D10000
direct allocation
page execute and read and write
4CC1000
heap
page read and write
9AE000
unkown
page execute and read and write
C84000
heap
page read and write
5364000
trusted library allocation
page read and write
4651000
heap
page read and write
AF4000
heap
page read and write
11E4000
heap
page read and write
424E000
stack
page read and write
845000
heap
page read and write
416F000
stack
page read and write
536D000
trusted library allocation
page read and write
C84000
heap
page read and write
32AE000
stack
page read and write
443E000
stack
page read and write
5356000
trusted library allocation
page read and write
AF4000
heap
page read and write
557F000
trusted library allocation
page read and write
1D47E000
stack
page read and write
1685000
heap
page read and write
4AB0000
direct allocation
page read and write
D44000
heap
page read and write
4A00000
direct allocation
page execute and read and write
4651000
heap
page read and write
2FFF000
stack
page read and write
1244000
heap
page read and write
4AB0000
direct allocation
page read and write
2FBE000
stack
page read and write
D12000
unkown
page execute and read and write
754000
heap
page read and write
5F96000
heap
page read and write
5543000
trusted library allocation
page read and write
AF4000
heap
page read and write
47E1000
heap
page read and write
54E8000
trusted library allocation
page read and write
85D000
heap
page read and write
1D0000
heap
page read and write
4CB0000
direct allocation
page read and write
D61000
unkown
page execute and read and write
532F000
stack
page read and write
5463000
trusted library allocation
page read and write
5E54000
trusted library allocation
page read and write
AF4000
heap
page read and write
1479000
heap
page read and write
349E000
stack
page read and write
4FB1000
direct allocation
page read and write
43EF000
stack
page read and write
FC4000
heap
page read and write
D59000
unkown
page execute and write copy
44D1000
heap
page read and write
4CAE000
stack
page read and write
5412000
trusted library allocation
page read and write
4DB1000
heap
page read and write
4411000
heap
page read and write
B10000
heap
page read and write
7F7000
heap
page read and write
48CB000
stack
page read and write
4EB0000
direct allocation
page read and write
BF0000
heap
page read and write
4AB0000
direct allocation
page read and write
A37000
heap
page read and write
4CC1000
heap
page read and write
C54000
heap
page read and write
3FDF000
stack
page read and write
AA1000
heap
page read and write
102A000
heap
page read and write
67B000
unkown
page write copy
AF4000
heap
page read and write
DFF000
heap
page read and write
1D0ED000
stack
page read and write
54EF000
trusted library allocation
page read and write
53C6000
trusted library allocation
page read and write
11CA000
heap
page read and write
531B000
trusted library allocation
page read and write
5A13000
trusted library allocation
page read and write
A48000
heap
page read and write
ACC000
heap
page read and write
5363000
trusted library allocation
page read and write
554E000
trusted library allocation
page read and write
1B5AE000
stack
page read and write
5360000
direct allocation
page execute and read and write
B10000
direct allocation
page read and write
5538000
trusted library allocation
page read and write
853000
heap
page read and write
53A2000
trusted library allocation
page read and write
C54000
heap
page read and write
14DF000
stack
page read and write
5F5E000
stack
page read and write
5402000
trusted library allocation
page read and write
47F0000
heap
page read and write
58D9000
trusted library allocation
page read and write
1244000
heap
page read and write
B10000
direct allocation
page read and write
10A0000
heap
page read and write
5586000
trusted library allocation
page read and write
4651000
heap
page read and write
50D0000
direct allocation
page execute and read and write
107D000
heap
page read and write
DD1000
unkown
page execute and read and write
5375000
trusted library allocation
page read and write
54DF000
trusted library allocation
page read and write
1244000
heap
page read and write
C84000
heap
page read and write
2E60000
direct allocation
page read and write
3DFE000
stack
page read and write
466F000
stack
page read and write
4D1A000
trusted library allocation
page read and write
316000
unkown
page write copy
FFA000
heap
page read and write
440F000
stack
page read and write
16F0000
heap
page read and write
4A41000
heap
page read and write
58DE000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
4651000
heap
page read and write
4DCE000
stack
page read and write
A51000
unkown
page execute and write copy
536C000
trusted library allocation
page read and write
44CE000
stack
page read and write
7C0000
unkown
page read and write
4EB0000
direct allocation
page read and write
CFE000
stack
page read and write
400000
remote allocation
page read and write
4B5E000
stack
page read and write
39EF000
stack
page read and write
D90000
direct allocation
page read and write
850000
heap
page read and write
5A09000
trusted library allocation
page read and write
4651000
heap
page read and write
1D6AE000
stack
page read and write
5A5F000
trusted library allocation
page read and write
1071000
heap
page read and write
3C1E000
stack
page read and write
5543000
trusted library allocation
page read and write
D1E000
stack
page read and write
D44000
heap
page read and write
531F000
stack
page read and write
47E1000
heap
page read and write
2E5F000
stack
page read and write
52DC000
stack
page read and write
D44000
heap
page read and write
553D000
trusted library allocation
page read and write
9B6000
heap
page read and write
452F000
stack
page read and write
A7E000
stack
page read and write
13D5000
unkown
page execute and write copy
AB9000
unkown
page write copy
5010000
heap
page read and write
C84000
heap
page read and write
E67000
heap
page read and write
5535000
trusted library allocation
page read and write
AF4000
heap
page read and write
5311000
trusted library allocation
page read and write
5364000
trusted library allocation
page read and write
4CC1000
heap
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
E7F000
heap
page read and write
D90000
direct allocation
page read and write
C54000
heap
page read and write
5543000
trusted library allocation
page read and write
14B2000
heap
page read and write
12D4000
heap
page read and write
12D4000
heap
page read and write
7FC000
stack
page read and write
2B00000
heap
page read and write
5316000
trusted library allocation
page read and write
4C70000
direct allocation
page execute and read and write
D29000
unkown
page execute and read and write
451E000
stack
page read and write
3ADE000
stack
page read and write
4651000
heap
page read and write
AF4000
heap
page read and write
4B3E000
stack
page read and write
428F000
stack
page read and write
1CE1F000
stack
page read and write
D44000
heap
page read and write
58D9000
trusted library allocation
page read and write
5364000
trusted library allocation
page read and write
C84000
heap
page read and write
B9B000
unkown
page execute and read and write
58D4000
trusted library allocation
page read and write
2D8E000
stack
page read and write
AAB000
heap
page read and write
4DF0000
direct allocation
page execute and read and write
53B0000
direct allocation
page execute and read and write
3E7F000
stack
page read and write
4411000
heap
page read and write
58DD000
trusted library allocation
page read and write
1DA5C000
stack
page read and write
3E4F000
stack
page read and write
4CC1000
heap
page read and write
4B7E000
stack
page read and write
36DF000
stack
page read and write
DB7000
unkown
page execute and write copy
59BA000
trusted library allocation
page read and write
4D80000
heap
page read and write
5620000
direct allocation
page execute and read and write
4651000
heap
page read and write
D20000
unkown
page readonly
4A41000
heap
page read and write
403F000
stack
page read and write
10C4000
heap
page read and write
1119000
unkown
page execute and read and write
550F000
trusted library allocation
page read and write
4CB0000
direct allocation
page execute and read and write
58DD000
trusted library allocation
page read and write
858000
heap
page read and write
C84000
heap
page read and write
394F000
stack
page read and write
54E8000
trusted library allocation
page read and write
4CC1000
heap
page read and write
5011000
heap
page read and write
5538000
trusted library allocation
page read and write
54F8000
trusted library allocation
page read and write
2C0F000
stack
page read and write
539A000
trusted library allocation
page read and write
D21000
unkown
page execute and write copy
452F000
stack
page read and write
1698000
heap
page read and write
2EB000
stack
page read and write
4850000
heap
page read and write
457E000
stack
page read and write
5384000
trusted library allocation
page read and write
A70000
direct allocation
page read and write
C54000
heap
page read and write
53DC000
trusted library allocation
page read and write
54C4000
trusted library allocation
page read and write
12D4000
heap
page read and write
4DB1000
heap
page read and write
4EB0000
trusted library allocation
page read and write
411F000
stack
page read and write
C84000
heap
page read and write
1CE3F000
stack
page read and write
4411000
heap
page read and write
D2A000
heap
page read and write
C84000
heap
page read and write
631E000
stack
page read and write
F5E000
stack
page read and write
D20000
unkown
page read and write
AF4000
heap
page read and write
54F8000
trusted library allocation
page read and write
7E4000
heap
page read and write
DD1000
unkown
page execute and read and write
1437000
heap
page read and write
DCF000
unkown
page execute and write copy
1B45C000
stack
page read and write
4CC1000
heap
page read and write
1244000
heap
page read and write
39FF000
stack
page read and write
5555000
trusted library allocation
page read and write
54F7000
trusted library allocation
page read and write
58D8000
trusted library allocation
page read and write
A37000
heap
page read and write
AF4000
heap
page read and write
66E000
unkown
page readonly
4F90000
direct allocation
page execute and read and write
AA1000
heap
page read and write
AA1000
heap
page read and write
7E4000
heap
page read and write
A51000
unkown
page execute and write copy
1D3CF000
stack
page read and write
E31000
unkown
page execute and write copy
54F8000
trusted library allocation
page read and write
C84000
heap
page read and write
47E1000
heap
page read and write
7180000
heap
page execute and read and write
B9C000
unkown
page execute and write copy
2D1E000
stack
page read and write
2DBB000
stack
page read and write
4DB2000
heap
page read and write
10C4000
heap
page read and write
4B41000
direct allocation
page read and write
3ECF000
stack
page read and write
550C000
trusted library allocation
page read and write
475F000
stack
page read and write
1D81D000
stack
page read and write
599F000
stack
page read and write
4651000
heap
page read and write
1CBFE000
stack
page read and write
536A000
trusted library allocation
page read and write
2EBF000
stack
page read and write
53A6000
trusted library allocation
page read and write
4CC1000
heap
page read and write
E2B000
unkown
page execute and write copy
There are 3639 hidden memdumps, click here to show them.