IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\fontcreator[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\num[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1003142001\fontcreator.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1003143001\fontcreator.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1003144001\9eba8044e7.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1003145001\1553f88169.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1003146001\661f3ff865.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1003147001\num.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\7URDKE3CJSA37VV3INEEM0S4N1C.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\FT773VWATWFL9SRK5RTU4.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\KOLH45MMED0OMDDRYHIG.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\SWJQ0719J9GFR3PZ91XO7LBLZA7.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\NVFTVRDLL64.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\_isetup\_isdecmp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\ddETWExternal.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\is-9EFK3.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\is-BB72E.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\is-GF03F.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\nvfvsdksvc_x64.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-1UGLR.tmp\fontcreator.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-6RCEE.tmp\_isetup\_isdecmp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\NVFTVRDLL64.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\_isetup\_isdecmp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\ddETWExternal.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\is-5MQTR.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\is-7T5A6.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\is-DEVD7.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\nvfvsdksvc_x64.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-FANHF.tmp\_isetup\_isdecmp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-H6BOG.tmp\fontcreator.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-OPEFN.tmp\fontcreator.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-R63KU.tmp\fontcreator.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\hangbird\Updater.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\hangbird\is-21RVC.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\hangbird\is-8C9AL.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\FT773VWATWFL9SRK5RTU4.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\NvFrapsOpenVR.man (copy)
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\ddETWExternal.xml (copy)
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (399), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\htcvive_install.bat (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\is-94945.tmp
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (399), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\is-H5QIF.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\is-QAUKJ.tmp
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\is-UAEL0.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\nvinstall.cmd (copy)
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-6RCEE.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\NvFrapsOpenVR.man (copy)
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\ddETWExternal.xml (copy)
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (399), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\htcvive_install.bat (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\is-FMCKE.tmp
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\is-J075V.tmp
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (399), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\is-PT4NM.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\is-SFQQ2.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\nvinstall.cmd (copy)
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-FANHF.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\hangbird\caliculus.csv (copy)
data
dropped
C:\Users\user\AppData\Local\hangbird\caliculus.zip (copy)
data
dropped
C:\Users\user\AppData\Local\hangbird\is-2VLJU.tmp
data
dropped
C:\Users\user\AppData\Local\hangbird\is-69DVH.tmp
data
dropped
C:\Users\user\AppData\Local\hangbird\is-TACJK.tmp
data
dropped
C:\Users\user\AppData\Local\hangbird\is-V0B5I.tmp
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
There are 58 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\FT773VWATWFL9SRK5RTU4.exe
"C:\Users\user\AppData\Local\Temp\FT773VWATWFL9SRK5RTU4.exe"
malicious
C:\Users\user\AppData\Local\Temp\KOLH45MMED0OMDDRYHIG.exe
"C:\Users\user\AppData\Local\Temp\KOLH45MMED0OMDDRYHIG.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1003144001\9eba8044e7.exe
"C:\Users\user\AppData\Local\Temp\1003144001\9eba8044e7.exe"
malicious
C:\Users\user\AppData\Local\Temp\1003142001\fontcreator.exe
"C:\Users\user\AppData\Local\Temp\1003142001\fontcreator.exe"
C:\Users\user\AppData\Local\Temp\is-H6BOG.tmp\fontcreator.tmp
"C:\Users\user\AppData\Local\Temp\is-H6BOG.tmp\fontcreator.tmp" /SL5="$C0076,2820349,845824,C:\Users\user\AppData\Local\Temp\1003142001\fontcreator.exe"
C:\Users\user\AppData\Local\Temp\1003142001\fontcreator.exe
"C:\Users\user\AppData\Local\Temp\1003142001\fontcreator.exe" /VERYSILENT
C:\Users\user\AppData\Local\Temp\is-OPEFN.tmp\fontcreator.tmp
"C:\Users\user\AppData\Local\Temp\is-OPEFN.tmp\fontcreator.tmp" /SL5="$50284,2820349,845824,C:\Users\user\AppData\Local\Temp\1003142001\fontcreator.exe" /VERYSILENT
C:\Windows\System32\cmd.exe
"cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH
C:\Windows\System32\find.exe
find /I "wrsa.exe"
C:\Windows\System32\cmd.exe
"cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH
C:\Windows\System32\find.exe
find /I "opssvc.exe"
C:\Users\user\AppData\Local\Temp\1003143001\fontcreator.exe
"C:\Users\user\AppData\Local\Temp\1003143001\fontcreator.exe"
C:\Windows\System32\cmd.exe
"cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH
C:\Windows\System32\find.exe
find /I "avastui.exe"
C:\Users\user\AppData\Local\Temp\is-R63KU.tmp\fontcreator.tmp
"C:\Users\user\AppData\Local\Temp\is-R63KU.tmp\fontcreator.tmp" /SL5="$30472,2820349,845824,C:\Users\user\AppData\Local\Temp\1003143001\fontcreator.exe"
C:\Windows\System32\cmd.exe
"cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH
C:\Windows\System32\find.exe
find /I "avgui.exe"
C:\Users\user\AppData\Local\Temp\1003143001\fontcreator.exe
"C:\Users\user\AppData\Local\Temp\1003143001\fontcreator.exe" /VERYSILENT
C:\Users\user\AppData\Local\Temp\is-1UGLR.tmp\fontcreator.tmp
"C:\Users\user\AppData\Local\Temp\is-1UGLR.tmp\fontcreator.tmp" /SL5="$40474,2820349,845824,C:\Users\user\AppData\Local\Temp\1003143001\fontcreator.exe" /VERYSILENT
C:\Windows\System32\cmd.exe
"cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH
C:\Windows\System32\find.exe
find /I "nswscsvc.exe"
C:\Windows\System32\cmd.exe
"cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe"
C:\Windows\System32\tasklist.exe
tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH
C:\Windows\System32\find.exe
find /I "wrsa.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH
C:\Windows\System32\find.exe
find /I "sophoshealth.exe"
C:\Users\user\AppData\Local\hangbird\Updater.exe
"C:\Users\user\AppData\Local\hangbird\\Updater.exe" "C:\Users\user\AppData\Local\hangbird\\caliculus.csv"
C:\Windows\System32\cmd.exe
"cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH
C:\Windows\System32\find.exe
find /I "opssvc.exe"
C:\Windows\System32\cmd.exe
"cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH
C:\Windows\System32\find.exe
find /I "avastui.exe"
C:\Windows\System32\cmd.exe
"cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH
C:\Windows\System32\find.exe
find /I "avgui.exe"
C:\Windows\System32\cmd.exe
"cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH
There are 48 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.43/Zu7JuNko/index.phpncoded
unknown
malicious
http://185.215.113.43/Zu7JuNko/index.phpnu
unknown
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
malicious
founpiuer.store
malicious
crisiwarny.store
malicious
scriptyprefej.store
malicious
presticitpo.store
malicious
http://185.215.113.43/Zu7JuNko/index.phpgPZk
unknown
malicious
http://185.215.113.43/Zu7JuNko/index.php4
unknown
malicious
http://185.215.113.43/Zu7JuNko/index.phpA
unknown
malicious
http://185.215.113.43/Zu7JuNko/index.phpUsers
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.16/off/def.exeeh
unknown
http://cscasha2.ocsp-ce
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
http://185.215.113.16/off/def.exeev
unknown
http://repository.certum.pl/ccsca2021.cer0
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://www.remobjects.com/ps
unknown
http://185.215.113.16/off/def.exez
unknown
https://www.innosetup.com/
unknown
https://necklacedmny.store/apiRy
unknown
http://ccsca2021.ocsp-certum.com05
unknown
http://www.certum.pl/CPS0
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://185.215.113.16/off/def.exee
unknown
https://necklacedmny.store:443/api:w
unknown
https://necklacedmny.store/apiC
unknown
http://185.215.113.16/well/random.exe
unknown
http://185.215.113.43/fac00b58987e8fff7a7df309c5441f056fc49#
unknown
http://crl.certum.pl/ctnca.crl0k
unknown
http://185.215.113.43/ferences.SourceAumid0#
unknown
http://www.entrust.net/rpa03
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://185.215.113.43/Pictures
unknown
http://www.autoitscript.com/autoit3/X
unknown
http://185.215.113.43/15.113.43/ows
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://crl.microsoft:
unknown
https://necklacedmny.store/apiP
unknown
https://necklacedmny.store/d
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://185.215.113.43/ones
unknown
https://necklacedmny.store/_
unknown
https://support.microsof
unknown
https://necklacedmny.store/J
unknown
https://necklacedmny.store/apit
unknown
http://185.215.113.16/mine/random.exet
unknown
http://185.215.113.16/1
unknown
http://185.215.113.16/off/def.exe
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://necklacedmny.store/D
unknown
http://185.215.113.16/(
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://www.entrust.net/rpa0
unknown
https://necklacedmny.store/:
unknown
http://repository.certum.pl/ctsca2021.cer0A
unknown
http://crl.certum.pl/ctsca2021.crl0o
unknown
http://repository.certum.pl/cscasha2.cer0
unknown
http://ocsp.sectigo.com0
unknown
http://31.41.244.11/files/fontcreator.exe
unknown
http://ocsp.entrust.net03
unknown
https://necklacedmny.store/B
unknown
http://ocsp.entrust.net02
unknown
http://185.215.113.16/mine/random.exe
unknown
http://ccsca2021.crl.certum.pl/ccsca2021.crl0s
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.16/steam/random.exek
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://31.41.244.11/files/fontcreator.exeVj
unknown
http://185.215.113.16/luma/random.exe
unknown
http://185.215.113.16/test/num.exe
unknown
https://necklacedmny.store:443/apin
unknown
http://subca.ocsp-certum.com05
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
http://subca.ocsp-certum.com02
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://subca.ocsp-certum.com01
unknown
https://sectigo.com/CPS0D
unknown
http://crl.certum.pl/ctnca2.crl0l
unknown
http://repository.certum.pl/ctnca2.cer09
unknown
https://jrsoftware.org0
unknown
https://jrsoftware.org/
unknown
http://crl.entrust.net/ts1ca.crl0
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://necklacedmny.store:443/api
unknown
http://31.41.244.11/files/fontcreator.exe1
unknown
http://185.215.113.16:80/off/def.exeault-release/key4.dbPK
unknown
http://repository.certum.pl/ctnca.cer09
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.97.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
188.114.97.3
necklacedmny.store
European Union
malicious
185.215.113.16
unknown
Portugal
31.41.244.11
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
9eba8044e7.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
1553f88169.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
661f3ff865.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
num.exe
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
391000
unkown
page execute and read and write
malicious
4AC0000
direct allocation
page read and write
malicious
EE1000
unkown
page execute and read and write
malicious
EE1000
unkown
page execute and read and write
malicious
4CA0000
direct allocation
page read and write
malicious
47E0000
direct allocation
page read and write
malicious
2032F790000
heap
page read and write
5640000
trusted library allocation
page read and write
3A5E000
stack
page read and write
D6F000
unkown
page read and write
5E5E000
trusted library allocation
page read and write
636D000
trusted library allocation
page read and write
1383000
direct allocation
page read and write
13A0000
heap
page read and write
4C4F000
stack
page read and write
524C000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
5E17000
trusted library allocation
page read and write
580A000
trusted library allocation
page read and write
143E000
heap
page read and write
5278000
trusted library allocation
page read and write
61ED000
trusted library allocation
page read and write
4E41000
heap
page read and write
E14000
heap
page read and write
2032F587000
heap
page read and write
ECFCAFF000
stack
page read and write
4F20000
heap
page read and write
40CE000
stack
page read and write
EC0000
heap
page read and write
65C0000
heap
page read and write
1D428C0B000
heap
page read and write
1214000
heap
page read and write
6259000
trusted library allocation
page read and write
33D1000
heap
page read and write
344C000
heap
page read and write
4E41000
heap
page read and write
420F000
stack
page read and write
6276000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
61ED000
trusted library allocation
page read and write
1643AE80000
heap
page read and write
5E37000
trusted library allocation
page read and write
11E6000
unkown
page execute and write copy
5634000
trusted library allocation
page read and write
19FA321C000
heap
page read and write
E14000
heap
page read and write
19A2BA2D000
heap
page read and write
620000
heap
page read and write
5E65000
trusted library allocation
page read and write
6117000
trusted library allocation
page read and write
61E6000
trusted library allocation
page read and write
32D1000
heap
page read and write
B6D000
heap
page read and write
563C000
trusted library allocation
page read and write
2B8F000
stack
page read and write
33D1000
heap
page read and write
4F17000
heap
page read and write
5E37000
trusted library allocation
page read and write
51C0000
trusted library allocation
page read and write
5E78000
trusted library allocation
page read and write
42D1000
heap
page read and write
54E1000
heap
page read and write
32F4000
heap
page read and write
334D000
heap
page read and write
CC4000
unkown
page write copy
6654000
trusted library allocation
page read and write
12FE000
direct allocation
page read and write
56EA000
trusted library allocation
page read and write
97D40FF000
stack
page read and write
661D000
trusted library allocation
page read and write
26C8000
direct allocation
page read and write
2A9307F000
stack
page read and write
52DA000
trusted library allocation
page read and write
5EBD47E000
stack
page read and write
5767000
trusted library allocation
page read and write
4BBD000
trusted library allocation
page read and write
32D1000
heap
page read and write
523E000
trusted library allocation
page read and write
33D1000
heap
page read and write
E14000
heap
page read and write
57AE000
trusted library allocation
page read and write
4CA0000
direct allocation
page execute and read and write
61DD000
trusted library allocation
page read and write
3471000
heap
page read and write
EF3487E000
stack
page read and write
5721000
trusted library allocation
page read and write
63F1000
trusted library allocation
page read and write
7EFEB000
direct allocation
page read and write
56EC000
trusted library allocation
page read and write
A56000
unkown
page write copy
1C918595000
heap
page read and write
4EF0000
direct allocation
page read and write
5420000
direct allocation
page execute and read and write
33F4000
heap
page read and write
32F4000
heap
page read and write
1781000
heap
page read and write
3E0000
heap
page read and write
4FCB000
stack
page read and write
542F1EB000
stack
page read and write
3547000
heap
page read and write
820000
heap
page read and write
920000
direct allocation
page read and write
719000
heap
page read and write
6112000
trusted library allocation
page read and write
E14000
heap
page read and write
C50000
heap
page read and write
5BA000
heap
page read and write
32F4000
heap
page read and write
5E45000
trusted library allocation
page read and write
DCC000
direct allocation
page read and write
6117000
trusted library allocation
page read and write
313E000
stack
page read and write
5450000
direct allocation
page execute and read and write
BCF000
unkown
page execute and read and write
6116000
trusted library allocation
page read and write
52C4000
trusted library allocation
page read and write
2BFF000
stack
page read and write
4811000
heap
page read and write
19A2BA1A000
heap
page read and write
BD7000
unkown
page execute and read and write
6D0000
direct allocation
page read and write
4FD1000
heap
page read and write
575D000
trusted library allocation
page read and write
3C52000
direct allocation
page read and write
2841B650000
heap
page read and write
D72000
unkown
page read and write
32F4000
heap
page read and write
334D000
heap
page read and write
1771000
heap
page read and write
32F4000
heap
page read and write
E14000
heap
page read and write
F70000
remote allocation
page read and write
5E4000
heap
page read and write
E14000
heap
page read and write
35D1000
heap
page read and write
F0A000
heap
page read and write
E14000
heap
page read and write
3EAF000
stack
page read and write
42D1000
heap
page read and write
11E6000
unkown
page execute and read and write
2B5727E000
stack
page read and write
525B000
trusted library allocation
page read and write
5240000
trusted library allocation
page read and write
288F000
stack
page read and write
6F1D57E000
stack
page read and write
1D4757C0000
heap
page read and write
12B4000
direct allocation
page read and write
3500000
heap
page read and write
20CD1B000
stack
page read and write
FE3000
heap
page read and write
5633000
trusted library allocation
page read and write
19FA3208000
heap
page read and write
5431000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
4960000
direct allocation
page execute and read and write
C0E000
heap
page read and write
4800000
direct allocation
page read and write
608000
heap
page read and write
B8D000
unkown
page execute read
6FD000
stack
page read and write
5DE000
heap
page read and write
81D000
heap
page read and write
344D000
heap
page read and write
5E33000
trusted library allocation
page read and write
611B000
trusted library allocation
page read and write
26E0000
heap
page read and write
2E5A26C0000
heap
page read and write
2589000
direct allocation
page read and write
E14000
heap
page read and write
3547000
heap
page read and write
6E3000
heap
page read and write
654000
heap
page read and write
23C2D590000
heap
page read and write
34FE000
stack
page read and write
5E39000
trusted library allocation
page read and write
C27000
unkown
page execute and write copy
35D1000
heap
page read and write
5670000
heap
page read and write
5E2C000
trusted library allocation
page read and write
33DF000
stack
page read and write
307E000
stack
page read and write
639F000
trusted library allocation
page read and write
353F000
stack
page read and write
6F1D5FF000
stack
page read and write
E14000
heap
page read and write
83B000
stack
page read and write
F4B000
unkown
page execute and read and write
1D428C2C000
heap
page read and write
53F1000
trusted library allocation
page read and write
3371000
heap
page read and write
5E5D000
trusted library allocation
page read and write
5746000
trusted library allocation
page read and write
6276000
trusted library allocation
page read and write
3547000
heap
page read and write
336E000
heap
page read and write
3B3E000
stack
page read and write
1BB9688F000
heap
page read and write
1763000
heap
page read and write
5E1C000
trusted library allocation
page read and write
1D5000
heap
page read and write
181000
unkown
page execute and write copy
356A000
heap
page read and write
785E000
stack
page read and write
5245000
trusted library allocation
page read and write
4351000
heap
page read and write
81A000
heap
page read and write
5721000
trusted library allocation
page read and write
2563000
direct allocation
page read and write
274C000
direct allocation
page read and write
2A5E000
stack
page read and write
525B000
trusted library allocation
page read and write
570F000
trusted library allocation
page read and write
4811000
heap
page read and write
3371000
heap
page read and write
39BF000
stack
page read and write
C3B000
unkown
page execute and write copy
611B000
trusted library allocation
page read and write
2E5A2778000
heap
page read and write
3080000
direct allocation
page read and write
5E62000
trusted library allocation
page read and write
C0B000
heap
page read and write
4351000
heap
page read and write
506D000
stack
page read and write
2032F57B000
heap
page read and write
4D519FF000
stack
page read and write
A1ECEDB000
stack
page read and write
1D47555E000
heap
page read and write
5330000
heap
page execute and read and write
6115000
trusted library allocation
page read and write
19A2BA05000
heap
page read and write
579D000
trusted library allocation
page read and write
3877000
direct allocation
page read and write
588C000
trusted library allocation
page read and write
2E5A278E000
heap
page read and write
527C000
trusted library allocation
page read and write
369E000
stack
page read and write
1C91859B000
heap
page read and write
175A000
heap
page read and write
1150000
heap
page read and write
19A2B880000
heap
page read and write
7F3000
heap
page read and write
5E8C000
trusted library allocation
page read and write
4351000
heap
page read and write
2701000
direct allocation
page read and write
2A3E000
heap
page read and write
5722000
trusted library allocation
page read and write
1D428C06000
heap
page read and write
329F000
stack
page read and write
4E20000
direct allocation
page execute and read and write
4950000
direct allocation
page execute and read and write
3547000
heap
page read and write
33D1000
heap
page read and write
D5E000
stack
page read and write
E15000
heap
page read and write
113B000
heap
page read and write
563B000
trusted library allocation
page read and write
252CB760000
heap
page read and write
125E000
stack
page read and write
5450000
direct allocation
page execute and read and write
1750000
heap
page read and write
424E000
stack
page read and write
13D0000
heap
page read and write
35F4000
heap
page read and write
5E1E000
trusted library allocation
page read and write
52D0000
direct allocation
page read and write
56DE000
trusted library allocation
page read and write
2032F58C000
heap
page read and write
56EE000
trusted library allocation
page read and write
52A1000
trusted library allocation
page read and write
2587000
direct allocation
page read and write
52A1000
trusted library allocation
page read and write
33F4000
heap
page read and write
56DD000
trusted library allocation
page read and write
25F8000
direct allocation
page read and write
5E27000
trusted library allocation
page read and write
384E000
stack
page read and write
5FC3000
trusted library allocation
page read and write
52A1000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
582C000
trusted library allocation
page read and write
25C1000
direct allocation
page read and write
D40000
direct allocation
page read and write
4351000
heap
page read and write
E14000
heap
page read and write
5E25000
trusted library allocation
page read and write
FA2000
heap
page read and write
334D000
heap
page read and write
61E7000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
B91000
heap
page read and write
6115000
trusted library allocation
page read and write
CB5000
unkown
page write copy
3080000
direct allocation
page read and write
6115000
trusted library allocation
page read and write
4C10000
direct allocation
page execute and read and write
610000
direct allocation
page read and write
6119000
trusted library allocation
page read and write
37AE000
direct allocation
page read and write
365E000
stack
page read and write
252CB76B000
heap
page read and write
E14000
heap
page read and write
61A8000
trusted library allocation
page read and write
10B3000
heap
page read and write
279C000
direct allocation
page read and write
5253000
trusted library allocation
page read and write
B8E000
heap
page read and write
5E29000
trusted library allocation
page read and write
5E6D000
trusted library allocation
page read and write
A69000
unkown
page write copy
4DCD000
stack
page read and write
734A000
heap
page read and write
6113000
trusted library allocation
page read and write
1BB96848000
heap
page read and write
5E65000
trusted library allocation
page read and write
C1F000
stack
page read and write
5E65000
trusted library allocation
page read and write
524B000
trusted library allocation
page read and write
410E000
stack
page read and write
6265000
trusted library allocation
page read and write
6246000
trusted library allocation
page read and write
5769000
trusted library allocation
page read and write
346E000
heap
page read and write
80E000
heap
page read and write
BEF000
unkown
page execute and write copy
3A1F000
stack
page read and write
6114000
trusted library allocation
page read and write
26C0000
direct allocation
page read and write
5E9000
heap
page read and write
495E000
stack
page read and write
1214000
heap
page read and write
132B000
direct allocation
page read and write
344C000
heap
page read and write
7EF000
heap
page read and write
2BF0000
direct allocation
page read and write
4351000
heap
page read and write
5888000
trusted library allocation
page read and write
4351000
heap
page read and write
4BA8000
trusted library allocation
page read and write
58BC000
trusted library allocation
page read and write
4F00000
heap
page read and write
19BAFE87000
heap
page read and write
522F000
trusted library allocation
page read and write
E14000
heap
page read and write
25FC000
direct allocation
page read and write
5E55000
trusted library allocation
page read and write
5E55000
trusted library allocation
page read and write
42DF000
stack
page read and write
6114000
trusted library allocation
page read and write
91D000
unkown
page execute read
5E4D000
trusted library allocation
page read and write
65F6000
trusted library allocation
page read and write
7F7000
heap
page read and write
25D4B795000
heap
page read and write
FD2000
heap
page read and write
E14000
heap
page read and write
424E000
stack
page read and write
4351000
heap
page read and write
523E000
trusted library allocation
page read and write
5768000
trusted library allocation
page read and write
611C000
trusted library allocation
page read and write
523B000
trusted library allocation
page read and write
4B9B000
trusted library allocation
page read and write
C54000
unkown
page execute and read and write
679000
heap
page read and write
5729000
trusted library allocation
page read and write
525B000
trusted library allocation
page read and write
1B441C80000
heap
page read and write
B1F000
stack
page read and write
176F000
heap
page read and write
522D000
trusted library allocation
page read and write
E15000
heap
page read and write
2538000
direct allocation
page read and write
32D1000
heap
page read and write
135F000
stack
page read and write
5226000
trusted library allocation
page read and write
E14000
heap
page read and write
1BB9688C000
heap
page read and write
A52000
unkown
page execute and write copy
4800000
direct allocation
page read and write
177E000
heap
page read and write
52A1000
trusted library allocation
page read and write
363E000
stack
page read and write
88AB000
stack
page read and write
1214000
heap
page read and write
174F000
heap
page read and write
35D1000
heap
page read and write
C0B000
heap
page read and write
5E27000
trusted library allocation
page read and write
275A000
direct allocation
page read and write
63E000
stack
page read and write
563E000
trusted library allocation
page read and write
E14000
heap
page read and write
CE5C12F000
stack
page read and write
D79000
unkown
page readonly
57BA000
trusted library allocation
page read and write
3F1F000
stack
page read and write
5221000
trusted library allocation
page read and write
834000
heap
page read and write
525B000
trusted library allocation
page read and write
344D000
heap
page read and write
118D000
heap
page read and write
10FF000
stack
page read and write
2E5A2766000
heap
page read and write
3471000
heap
page read and write
5EAE000
trusted library allocation
page read and write
5080000
heap
page read and write
C0E000
heap
page read and write
FD6000
heap
page read and write
37B0000
direct allocation
page read and write
5638000
trusted library allocation
page read and write
F49000
unkown
page write copy
4351000
heap
page read and write
BEE000
unkown
page execute and read and write
5BF000
heap
page read and write
4800000
direct allocation
page read and write
6115000
trusted library allocation
page read and write
6257000
trusted library allocation
page read and write
5E1000
heap
page read and write
3EBF000
stack
page read and write
5E95000
trusted library allocation
page read and write
77E000
stack
page read and write
E14000
heap
page read and write
146000
stack
page read and write
62FB000
trusted library allocation
page read and write
6659000
trusted library allocation
page read and write
5639000
trusted library allocation
page read and write
6279000
trusted library allocation
page read and write
61B1000
trusted library allocation
page read and write
523B000
trusted library allocation
page read and write
752D000
stack
page read and write
4820000
heap
page read and write
2515000
direct allocation
page read and write
525B000
trusted library allocation
page read and write
5450000
direct allocation
page execute and read and write
12E1000
direct allocation
page read and write
52A1000
trusted library allocation
page read and write
19BAFEBC000
heap
page read and write
1214000
heap
page read and write
CEC000
unkown
page execute and read and write
1763000
heap
page read and write
32D1000
heap
page read and write
F61000
heap
page read and write
5011000
heap
page read and write
19BAFEAD000
heap
page read and write
5E44000
trusted library allocation
page read and write
12C3000
direct allocation
page read and write
4450000
trusted library allocation
page read and write
EB0000
heap
page read and write
22A4B420000
heap
page read and write
33D1000
heap
page read and write
5E1F000
trusted library allocation
page read and write
448C000
stack
page read and write
25D4B790000
heap
page read and write
262B000
direct allocation
page read and write
522F000
trusted library allocation
page read and write
1763000
heap
page read and write
346E000
heap
page read and write
32D1000
heap
page read and write
7D9000
heap
page read and write
E14000
heap
page read and write
523B000
trusted library allocation
page read and write
1BB96864000
heap
page read and write
4EF0000
direct allocation
page read and write
33D1000
heap
page read and write
36BE000
stack
page read and write
1DB000
unkown
page execute and write copy
394F000
stack
page read and write
629D000
trusted library allocation
page read and write
5050000
direct allocation
page read and write
62F9000
trusted library allocation
page read and write
524F000
trusted library allocation
page read and write
654000
heap
page read and write
563A000
trusted library allocation
page read and write
137C000
direct allocation
page read and write
52A1000
trusted library allocation
page read and write
10B1000
heap
page read and write
563C000
trusted library allocation
page read and write
6267000
trusted library allocation
page read and write
B6D000
heap
page read and write
700000
direct allocation
page read and write
5636000
trusted library allocation
page read and write
5E23000
trusted library allocation
page read and write
1068000
heap
page read and write
E14000
heap
page read and write
1BB9687B000
heap
page read and write
109E000
heap
page read and write
543E000
trusted library allocation
page read and write
7EF000
heap
page read and write
7E0000
heap
page read and write
4D51A7F000
stack
page read and write
330F000
stack
page read and write
5E7C000
trusted library allocation
page read and write
5255000
trusted library allocation
page read and write
5E65000
trusted library allocation
page read and write
344C000
heap
page read and write
62EA000
trusted library allocation
page read and write
4EF0000
direct allocation
page read and write
CB0000
unkown
page write copy
4C10000
direct allocation
page execute and read and write
334D000
heap
page read and write
E14000
heap
page read and write
500C000
heap
page read and write
4351000
heap
page read and write
48A0000
direct allocation
page execute and read and write
5746000
trusted library allocation
page read and write
5635000
trusted library allocation
page read and write
47FF000
stack
page read and write
33D1000
heap
page read and write
10C5000
unkown
page execute and read and write
54D7000
heap
page read and write
4C90000
direct allocation
page execute and read and write
5E1F000
trusted library allocation
page read and write
834000
heap
page read and write
5E27000
trusted library allocation
page read and write
5E19000
trusted library allocation
page read and write
DAF000
stack
page read and write
C72000
unkown
page execute and write copy
1255000
unkown
page readonly
E15000
heap
page read and write
523E000
trusted library allocation
page read and write
2786000
direct allocation
page read and write
D00000
unkown
page readonly
5E30000
trusted library allocation
page read and write
2622000
direct allocation
page read and write
67A000
heap
page read and write
52BD000
trusted library allocation
page read and write
52CC000
trusted library allocation
page read and write
B6D000
heap
page read and write
834000
heap
page read and write
5E95000
trusted library allocation
page read and write
1BB96866000
heap
page read and write
7F3000
heap
page read and write
5E55000
trusted library allocation
page read and write
336E000
heap
page read and write
2B3F000
stack
page read and write
4FA000
stack
page read and write
37CD000
direct allocation
page read and write
577A000
trusted library allocation
page read and write
621F000
trusted library allocation
page read and write
CB0000
direct allocation
page read and write
61AA000
trusted library allocation
page read and write
FE3000
heap
page read and write
4351000
heap
page read and write
2032F59C000
heap
page read and write
2B56D8B000
stack
page read and write
52A1000
trusted library allocation
page read and write
3FFF000
stack
page read and write
EC0000
heap
page read and write
2736000
direct allocation
page read and write
F49000
unkown
page write copy
E14000
heap
page read and write
7F3000
heap
page read and write
2780000
direct allocation
page read and write
5E94000
trusted library allocation
page read and write
2577000
direct allocation
page read and write
138A000
direct allocation
page read and write
344D000
heap
page read and write
920000
direct allocation
page read and write
4640000
heap
page read and write
358F000
stack
page read and write
33BE000
stack
page read and write
5E1D000
trusted library allocation
page read and write
E14000
heap
page read and write
5E1C000
trusted library allocation
page read and write
5278000
trusted library allocation
page read and write
ECFCA7F000
stack
page read and write
2638000
direct allocation
page read and write
263F000
direct allocation
page read and write
ADE000
stack
page read and write
2678000
direct allocation
page read and write
622E000
trusted library allocation
page read and write
455F000
stack
page read and write
16D3B0FF000
heap
page read and write
654000
heap
page read and write
52A1000
trusted library allocation
page read and write
16D3B0FC000
heap
page read and write
930000
heap
page read and write
BBE000
stack
page read and write
23C2D350000
heap
page read and write
334D000
heap
page read and write
5228000
trusted library allocation
page read and write
5E94000
trusted library allocation
page read and write
5ED5000
trusted library allocation
page read and write
524C000
trusted library allocation
page read and write
259E000
direct allocation
page read and write
5E0000
heap
page read and write
C07000
unkown
page execute and write copy
6DC01FF000
stack
page read and write
336E000
heap
page read and write
5E39000
trusted library allocation
page read and write
525B000
trusted library allocation
page read and write
E14000
heap
page read and write
524C000
trusted library allocation
page read and write
5450000
direct allocation
page execute and read and write
524C000
trusted library allocation
page read and write
6274000
trusted library allocation
page read and write
11E7000
unkown
page execute and write copy
D90000
heap
page read and write
5E4E000
trusted library allocation
page read and write
38D92FF000
stack
page read and write
4D01000
direct allocation
page read and write
5789000
trusted library allocation
page read and write
5786000
trusted library allocation
page read and write
6F1D4FF000
stack
page read and write
B10000
heap
page read and write
1763000
heap
page read and write
19BAFED4000
heap
page read and write
5E27000
trusted library allocation
page read and write
82A000
unkown
page execute and write copy
4C60000
direct allocation
page execute and read and write
624D000
trusted library allocation
page read and write
2D0E000
stack
page read and write
334D000
heap
page read and write
32F4000
heap
page read and write
523F000
trusted library allocation
page read and write
260D000
direct allocation
page read and write
65E8000
heap
page read and write
1B441D8F000
heap
page read and write
6223000
trusted library allocation
page read and write
E15000
heap
page read and write
6217000
trusted library allocation
page read and write
E1E000
stack
page read and write
6FC000
stack
page read and write
E14000
heap
page read and write
4800000
direct allocation
page read and write
1C918596000
heap
page read and write
3080000
direct allocation
page read and write
61A8000
trusted library allocation
page read and write
52CC000
trusted library allocation
page read and write
58BE000
trusted library allocation
page read and write
334D000
heap
page read and write
967000
unkown
page readonly
654000
heap
page read and write
5701000
trusted library allocation
page read and write
611F000
trusted library allocation
page read and write
52C5000
trusted library allocation
page read and write
E14000
heap
page read and write
434F000
stack
page read and write
F42000
unkown
page execute and read and write
2DFF000
stack
page read and write
5E85000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
E15000
heap
page read and write
5EBD3FE000
stack
page read and write
532F000
stack
page read and write
1060000
heap
page read and write
1B441D75000
heap
page read and write
E14000
heap
page read and write
582B000
trusted library allocation
page read and write
B6D000
heap
page read and write
EE0000
heap
page read and write
6208000
trusted library allocation
page read and write
6221000
trusted library allocation
page read and write
19A2BA2D000
heap
page read and write
74D1000
heap
page read and write
1BB96840000
heap
page read and write
32F4000
heap
page read and write
19FA31F7000
heap
page read and write
2E5A2740000
heap
page read and write
344C000
heap
page read and write
5E65000
trusted library allocation
page read and write
577C000
trusted library allocation
page read and write
C0B000
heap
page read and write
93E000
heap
page read and write
32FE000
stack
page read and write
5E94000
trusted library allocation
page read and write
4351000
heap
page read and write
533F000
trusted library allocation
page read and write
390000
unkown
page readonly
1D475564000
heap
page read and write
2E5A2AA5000
heap
page read and write
6263000
trusted library allocation
page read and write
FF4000
heap
page read and write
336E000
heap
page read and write
1D47553D000
heap
page read and write
4C10000
direct allocation
page execute and read and write
4F10000
heap
page read and write
6618000
trusted library allocation
page read and write
711000
heap
page read and write
1B442085000
heap
page read and write
2A1F000
stack
page read and write
56CF000
trusted library allocation
page read and write
FE9000
heap
page read and write
32D1000
heap
page read and write
3E3E000
stack
page read and write
6249000
trusted library allocation
page read and write
E14000
heap
page read and write
12CA000
direct allocation
page read and write
5719000
trusted library allocation
page read and write
27AC000
direct allocation
page read and write
1C918595000
heap
page read and write
438B000
stack
page read and write
34EB000
heap
page read and write
BD0000
heap
page read and write
3371000
heap
page read and write
56F6000
trusted library allocation
page read and write
E14000
heap
page read and write
BEC000
unkown
page execute and write copy
33D1000
heap
page read and write
B8E000
heap
page read and write
11E6000
unkown
page execute and read and write
6115000
trusted library allocation
page read and write
576A000
trusted library allocation
page read and write
5224000
trusted library allocation
page read and write
5E33000
trusted library allocation
page read and write
453E000
stack
page read and write
611F000
trusted library allocation
page read and write
F61000
heap
page read and write
4351000
heap
page read and write
9B0000
heap
page read and write
4EF0000
direct allocation
page read and write
6D0000
direct allocation
page read and write
81D000
heap
page read and write
F42000
unkown
page execute and read and write
344F000
stack
page read and write
2CD0000
heap
page read and write
25B4000
direct allocation
page read and write
5E54000
trusted library allocation
page read and write
525B000
trusted library allocation
page read and write
35F4000
heap
page read and write
3471000
heap
page read and write
834000
heap
page read and write
635F000
trusted library allocation
page read and write
1D428C05000
heap
page read and write
FA2000
heap
page read and write
508C000
stack
page read and write
370E000
stack
page read and write
611D000
trusted library allocation
page read and write
5634000
trusted library allocation
page read and write
3371000
heap
page read and write
1C9184B0000
heap
page read and write
1D47555E000
heap
page read and write
356E000
direct allocation
page read and write
E14000
heap
page read and write
6257000
trusted library allocation
page read and write
7FB000
heap
page read and write
3FB000
unkown
page execute and read and write
6114000
trusted library allocation
page read and write
1643AE20000
heap
page read and write
441E000
stack
page read and write
5E4E000
trusted library allocation
page read and write
6F1D1DB000
stack
page read and write
C0E000
heap
page read and write
6118000
trusted library allocation
page read and write
5653000
trusted library allocation
page read and write
5E55000
trusted library allocation
page read and write
348E000
stack
page read and write
525B000
trusted library allocation
page read and write
5239000
trusted library allocation
page read and write
32F4000
heap
page read and write
559F000
stack
page read and write
611E000
trusted library allocation
page read and write
6113000
trusted library allocation
page read and write
2772000
direct allocation
page read and write
611D000
trusted library allocation
page read and write
2EA10A57000
heap
page read and write
E14000
heap
page read and write
E14000
heap
page read and write
35F4000
heap
page read and write
37DD000
direct allocation
page read and write
31BE000
stack
page read and write
FD3000
heap
page read and write
1D428C0B000
heap
page read and write
346E000
heap
page read and write
5D2000
heap
page read and write
54E1000
heap
page read and write
34CA000
heap
page read and write
BE2000
unkown
page execute and write copy
1B441D8D000
heap
page read and write
585C000
trusted library allocation
page read and write
317F000
stack
page read and write
E14000
heap
page read and write
4351000
heap
page read and write
463F000
stack
page read and write
524C000
trusted library allocation
page read and write
52C5000
trusted library allocation
page read and write
59D007B000
stack
page read and write
33F4000
heap
page read and write
563A000
trusted library allocation
page read and write
5E3A000
trusted library allocation
page read and write
5E28000
trusted library allocation
page read and write
5E18000
trusted library allocation
page read and write
33F4000
heap
page read and write
33F4000
heap
page read and write
DDEA8FF000
stack
page read and write
52CC000
trusted library allocation
page read and write
BC5000
unkown
page write copy
5251000
trusted library allocation
page read and write
33D1000
heap
page read and write
2032F59C000
heap
page read and write
611D000
trusted library allocation
page read and write
1D47554E000
heap
page read and write
344C000
heap
page read and write
5221000
trusted library allocation
page read and write
39C1000
heap
page read and write
336E000
heap
page read and write
1282000
direct allocation
page read and write
35F4000
heap
page read and write
E14000
heap
page read and write
35D1000
heap
page read and write
654000
heap
page read and write
2EA109B5000
heap
page read and write
346E000
heap
page read and write
2711000
direct allocation
page read and write
6236000
trusted library allocation
page read and write
2032F58C000
heap
page read and write
C0B000
heap
page read and write
742C000
stack
page read and write
700000
direct allocation
page read and write
5E62000
trusted library allocation
page read and write
391E000
stack
page read and write
4351000
heap
page read and write
C0B000
heap
page read and write
608B000
trusted library allocation
page read and write
4A9E000
stack
page read and write
523B000
trusted library allocation
page read and write
5723000
trusted library allocation
page read and write
26DF000
direct allocation
page read and write
5E54000
trusted library allocation
page read and write
355B000
direct allocation
page read and write
A1ED37F000
stack
page read and write
E14000
heap
page read and write
A5A000
unkown
page execute and write copy
4E41000
heap
page read and write
8AEE000
stack
page read and write
5E65000
trusted library allocation
page read and write
B18000
heap
page read and write
344C000
heap
page read and write
3371000
heap
page read and write
25A6000
direct allocation
page read and write
3080000
direct allocation
page read and write
5E65000
trusted library allocation
page read and write
E14000
heap
page read and write
19BAFDF0000
heap
page read and write
5432000
trusted library allocation
page read and write
56DC000
trusted library allocation
page read and write
1C9185BF000
heap
page read and write
94E000
unkown
page write copy
3FCE000
stack
page read and write
334D000
heap
page read and write
61DB000
trusted library allocation
page read and write
576D000
trusted library allocation
page read and write
4B0B000
stack
page read and write
5735000
trusted library allocation
page read and write
5E55000
trusted library allocation
page read and write
1BB9688C000
heap
page read and write
D75000
unkown
page write copy
20D07F000
stack
page read and write
4EF0000
direct allocation
page read and write
1B441D6B000
heap
page read and write
B8E000
heap
page read and write
25E6000
direct allocation
page read and write
5E55000
trusted library allocation
page read and write
611C000
trusted library allocation
page read and write
540000
heap
page read and write
78E000
stack
page read and write
AA5000
heap
page read and write
1D47555E000
heap
page read and write
25C1000
direct allocation
page read and write
C08000
unkown
page execute and read and write
13D5000
heap
page read and write
2FFF000
stack
page read and write
373F000
stack
page read and write
1763000
heap
page read and write
26D0000
direct allocation
page read and write
ED0000
direct allocation
page execute and read and write
334D000
heap
page read and write
2AE3000
heap
page read and write
F00000
heap
page read and write
54E1000
heap
page read and write
4C80000
direct allocation
page execute and read and write
B91000
heap
page read and write
525B000
trusted library allocation
page read and write
B8E000
heap
page read and write
1771000
heap
page read and write
5E46000
trusted library allocation
page read and write
B6D000
heap
page read and write
DA8000
direct allocation
page read and write
33D1000
heap
page read and write
52A1000
trusted library allocation
page read and write
1763000
heap
page read and write
1643AE00000
heap
page read and write
48A0000
direct allocation
page execute and read and write
E14000
heap
page read and write
3DBE000
stack
page read and write
A01000
unkown
page execute read
6257000
trusted library allocation
page read and write
33F4000
heap
page read and write
563F000
trusted library allocation
page read and write
C0B000
heap
page read and write
5774000
trusted library allocation
page read and write
5E51000
trusted library allocation
page read and write
C0B000
heap
page read and write
356A000
heap
page read and write
E14000
heap
page read and write
5E5D000
trusted library allocation
page read and write
5237000
trusted library allocation
page read and write
563A000
trusted library allocation
page read and write
5EA5000
trusted library allocation
page read and write
52CC000
trusted library allocation
page read and write
405F000
stack
page read and write
3547000
heap
page read and write
1214000
heap
page read and write
39C0000
heap
page read and write
450000
unkown
page execute and write copy
E14000
heap
page read and write
3547000
heap
page read and write
8CE000
stack
page read and write
33D1000
heap
page read and write
135F000
direct allocation
page read and write
42D1000
heap
page read and write
334D000
heap
page read and write
EE0000
unkown
page read and write
32F4000
heap
page read and write
E14000
heap
page read and write
35FF000
stack
page read and write
6F1D67F000
stack
page read and write
4351000
heap
page read and write
5E9000
heap
page read and write
E14000
heap
page read and write
52A1000
trusted library allocation
page read and write
3547000
heap
page read and write
624B000
trusted library allocation
page read and write
F81000
heap
page read and write
4740000
trusted library allocation
page read and write
920000
direct allocation
page read and write
4641000
heap
page read and write
8FC000
stack
page read and write
5E55000
trusted library allocation
page read and write
19FA321C000
heap
page read and write
75D0000
heap
page read and write
575E000
trusted library allocation
page read and write
610000
direct allocation
page read and write
834000
heap
page read and write
CEE000
unkown
page execute and write copy
5F22000
trusted library allocation
page read and write
336E000
heap
page read and write
1750000
heap
page read and write
BBB000
unkown
page execute read
33D1000
heap
page read and write
334D000
heap
page read and write
4BFF000
stack
page read and write
42FF000
stack
page read and write
5283000
trusted library allocation
page read and write
CE0000
direct allocation
page read and write
33F4000
heap
page read and write
303F000
stack
page read and write
255B000
direct allocation
page read and write
828000
heap
page read and write
1750000
heap
page read and write
7EF000
heap
page read and write
5222000
trusted library allocation
page read and write
FEC000
heap
page read and write
1BB9688C000
heap
page read and write
611F000
trusted library allocation
page read and write
1D47554E000
heap
page read and write
272D000
direct allocation
page read and write
54DA000
heap
page read and write
6D0000
direct allocation
page read and write
134E000
stack
page read and write
4351000
heap
page read and write
49D0000
direct allocation
page execute and read and write
367F000
stack
page read and write
5E30000
trusted library allocation
page read and write
4351000
heap
page read and write
4B21000
direct allocation
page read and write
13093320000
heap
page read and write
346E000
heap
page read and write
5257000
trusted library allocation
page read and write
336E000
heap
page read and write
5E33000
trusted library allocation
page read and write
56D5000
trusted library allocation
page read and write
56DF000
trusted library allocation
page read and write
5E65000
trusted library allocation
page read and write
264D000
direct allocation
page read and write
612E000
stack
page read and write
261C000
direct allocation
page read and write
3547000
heap
page read and write
32D1000
heap
page read and write
E14000
heap
page read and write
ECFC7CC000
stack
page read and write
524F000
trusted library allocation
page read and write
4351000
heap
page read and write
52A1000
trusted library allocation
page read and write
DDF000
stack
page read and write
1D428C2F000
heap
page read and write
1214000
heap
page read and write
4351000
heap
page read and write
5E7D000
trusted library allocation
page read and write
5224000
trusted library allocation
page read and write
524C000
trusted library allocation
page read and write
7F200000
direct allocation
page read and write
628E000
trusted library allocation
page read and write
525F000
trusted library allocation
page read and write
FBF000
heap
page read and write
1D428BD0000
heap
page read and write
6111000
trusted library allocation
page read and write
3CF0000
heap
page read and write
33F4000
heap
page read and write
524C000
trusted library allocation
page read and write
6202000
trusted library allocation
page read and write
52A1000
trusted library allocation
page read and write
E15000
heap
page read and write
5040000
trusted library allocation
page read and write
E14000
heap
page read and write
525B000
trusted library allocation
page read and write
DBD000
direct allocation
page read and write
BE5000
unkown
page execute and read and write
434F000
stack
page read and write
2581000
direct allocation
page read and write
880000
heap
page read and write
2CBE000
stack
page read and write
3B7F000
stack
page read and write
1275000
direct allocation
page read and write
52A1000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
C0E000
heap
page read and write
4EF0000
direct allocation
page read and write
346E000
heap
page read and write
7F7000
heap
page read and write
433E000
stack
page read and write
1DB000
unkown
page execute and write copy
5638000
trusted library allocation
page read and write
52A1000
trusted library allocation
page read and write
5228000
trusted library allocation
page read and write
26ED000
direct allocation
page read and write
526D000
trusted library allocation
page read and write
2032F575000
heap
page read and write
FC6000
heap
page read and write
FDB000
unkown
page execute and write copy
4C10000
direct allocation
page execute and read and write
577A000
trusted library allocation
page read and write
523B000
trusted library allocation
page read and write
344D000
heap
page read and write
5E4C000
trusted library allocation
page read and write
E14000
heap
page read and write
E10000
heap
page read and write
33F4000
heap
page read and write
53E0000
heap
page read and write
2841B610000
heap
page read and write
1DA817E0000
heap
page read and write
4EF0000
direct allocation
page read and write
107D000
heap
page read and write
5E65000
trusted library allocation
page read and write
5E14000
trusted library allocation
page read and write
3371000
heap
page read and write
710000
heap
page read and write
4351000
heap
page read and write
61BC000
trusted library allocation
page read and write
834000
heap
page read and write
1A0000
heap
page read and write
7F7000
heap
page read and write
2522000
direct allocation
page read and write
5E45000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
32F4000
heap
page read and write
654000
heap
page read and write
DB6000
direct allocation
page read and write
12B7000
unkown
page readonly
5E27000
trusted library allocation
page read and write
E14000
heap
page read and write
2A92DAF000
stack
page read and write
305E000
stack
page read and write
5E65000
trusted library allocation
page read and write
B91000
heap
page read and write
5299000
trusted library allocation
page read and write
834000
heap
page read and write
F7B000
heap
page read and write
4351000
heap
page read and write
56EA000
trusted library allocation
page read and write
1250000
unkown
page execute and write copy
54A0000
heap
page read and write
611B000
trusted library allocation
page read and write
1C9185C2000
heap
page read and write
611E000
trusted library allocation
page read and write
334D000
heap
page read and write
622F000
trusted library allocation
page read and write
19FA31FD000
heap
page read and write
2DFE000
stack
page read and write
2590000
direct allocation
page read and write
4351000
heap
page read and write
336E000
heap
page read and write
32D1000
heap
page read and write
783000
heap
page read and write
524C000
trusted library allocation
page read and write
5E4B000
trusted library allocation
page read and write
38FF000
stack
page read and write
270A000
direct allocation
page read and write
5275000
trusted library allocation
page read and write
19BAFE60000
heap
page read and write
59D01FF000
stack
page read and write
5E65000
trusted library allocation
page read and write
124D000
unkown
page read and write
327E000
stack
page read and write
524C000
trusted library allocation
page read and write
61DD000
trusted library allocation
page read and write
563C000
trusted library allocation
page read and write
980000
heap
page read and write
6115000
trusted library allocation
page read and write
4351000
heap
page read and write
208B8A70000
heap
page read and write
5A0000
heap
page read and write
35D1000
heap
page read and write
6117000
trusted library allocation
page read and write
1D428C31000
heap
page read and write
D3A000
stack
page read and write
5754000
trusted library allocation
page read and write
36CD000
stack
page read and write
953133E000
stack
page read and write
25FF000
direct allocation
page read and write
3ACE000
stack
page read and write
22A4B320000
heap
page read and write
5E39000
trusted library allocation
page read and write
336E000
heap
page read and write
3080000
direct allocation
page read and write
6D0000
direct allocation
page read and write
3A8F000
stack
page read and write
D01000
unkown
page execute read
E14000
heap
page read and write
1210000
heap
page read and write
208B8AE0000
heap
page read and write
6119000
trusted library allocation
page read and write
2ADE000
stack
page read and write
522D000
trusted library allocation
page read and write
DFB000
stack
page read and write
3371000
heap
page read and write
611B000
trusted library allocation
page read and write
62FE000
trusted library allocation
page read and write
5253000
trusted library allocation
page read and write
5F4000
heap
page read and write
4EF0000
direct allocation
page read and write
5E4C000
trusted library allocation
page read and write
696000
unkown
page execute and read and write
E14000
heap
page read and write
5FE000
stack
page read and write
7E5000
heap
page read and write
3471000
heap
page read and write
1C918775000
heap
page read and write
FF4000
heap
page read and write
2032F59E000
heap
page read and write
6113000
trusted library allocation
page read and write
61BC000
trusted library allocation
page read and write
625F000
trusted library allocation
page read and write
5634000
trusted library allocation
page read and write
2CCF000
stack
page read and write
56F5000
trusted library allocation
page read and write
CE8000
direct allocation
page read and write
1D475560000
heap
page read and write
61AA000
trusted library allocation
page read and write
4910000
trusted library allocation
page read and write
2E5A2690000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
3371000
heap
page read and write
524C000
trusted library allocation
page read and write
19BAFECE000
heap
page read and write
344C000
heap
page read and write
E14000
heap
page read and write
5E65000
trusted library allocation
page read and write
1095000
heap
page read and write
1D428C05000
heap
page read and write
F49000
unkown
page write copy
2E00000
heap
page read and write
356A000
heap
page read and write
5299000
trusted library allocation
page read and write
4F01000
heap
page read and write
3471000
heap
page read and write
D5D000
direct allocation
page read and write
5EA5000
trusted library allocation
page read and write
2726000
direct allocation
page read and write
2511000
direct allocation
page read and write
33D1000
heap
page read and write
19BAFE65000
heap
page read and write
334D000
heap
page read and write
D80000
heap
page read and write
623C000
trusted library allocation
page read and write
4E41000
heap
page read and write
33D1000
heap
page read and write
4351000
heap
page read and write
32D1000
heap
page read and write
2CA0000
heap
page read and write
1D428C2D000
heap
page read and write
654000
heap
page read and write
E14000
heap
page read and write
5EC6000
trusted library allocation
page read and write
19BAFEB7000
heap
page read and write
336E000
heap
page read and write
2654000
direct allocation
page read and write
33F4000
heap
page read and write
834000
heap
page read and write
336E000
heap
page read and write
1B441D66000
heap
page read and write
7FB000
heap
page read and write
298F000
stack
page read and write
5E55000
trusted library allocation
page read and write
2F4F000
stack
page read and write
CF6000
direct allocation
page read and write
5238000
trusted library allocation
page read and write
816000
heap
page read and write
BA0000
heap
page read and write
647E000
stack
page read and write
A1ED2FE000
stack
page read and write
D24000
direct allocation
page read and write
54DA000
heap
page read and write
4351000
heap
page read and write
5E5D000
trusted library allocation
page read and write
5E9B000
trusted library allocation
page read and write
654000
heap
page read and write
7F1000
heap
page read and write
2C0F000
stack
page read and write
56DD000
trusted library allocation
page read and write
7348000
heap
page read and write
379F000
stack
page read and write
525B000
trusted library allocation
page read and write
43D0000
trusted library allocation
page read and write
56C7000
trusted library allocation
page read and write
1BB96800000
heap
page read and write
6201000
trusted library allocation
page read and write
133B000
direct allocation
page read and write
5639000
trusted library allocation
page read and write
4351000
heap
page read and write
344C000
heap
page read and write
5E7D000
trusted library allocation
page read and write
5EA000
heap
page read and write
1D475563000
heap
page read and write
1771000
heap
page read and write
52A1000
trusted library allocation
page read and write
7F2EA000
direct allocation
page read and write
AC38FFF000
stack
page read and write
19FA3375000
heap
page read and write
61D3000
trusted library allocation
page read and write
33D1000
heap
page read and write
FD6000
heap
page read and write
6112000
trusted library allocation
page read and write
33D1000
heap
page read and write
52A1000
trusted library allocation
page read and write
A6B000
unkown
page read and write
33F4000
heap
page read and write
32D1000
heap
page read and write
522D000
trusted library allocation
page read and write
1B441D77000
heap
page read and write
15CF000
stack
page read and write
1306000
direct allocation
page read and write
C8F000
unkown
page execute and write copy
95313BE000
stack
page read and write
EE0000
unkown
page read and write
3F8F000
stack
page read and write
61E5000
trusted library allocation
page read and write
1B441D91000
heap
page read and write
2603000
direct allocation
page read and write
74D0000
heap
page read and write
610000
direct allocation
page read and write
336E000
heap
page read and write
783000
heap
page read and write
96E000
heap
page read and write
400000
heap
page read and write
13093327000
heap
page read and write
4360000
heap
page read and write
523E000
trusted library allocation
page read and write
7B8000
heap
page read and write
1D428B50000
heap
page read and write
33D1000
heap
page read and write
3371000
heap
page read and write
5253000
trusted library allocation
page read and write
654000
heap
page read and write
19A2B980000
heap
page read and write
4890000
direct allocation
page execute and read and write
1B0000
heap
page read and write
BD6000
unkown
page execute and write copy
33D1000
heap
page read and write
BD7000
unkown
page readonly
51E0000
direct allocation
page execute and read and write
35D1000
heap
page read and write
377E000
stack
page read and write
522D000
trusted library allocation
page read and write
6381000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
11E6000
unkown
page execute and write copy
107A000
heap
page read and write
61CD000
trusted library allocation
page read and write
2671000
direct allocation
page read and write
2623000
direct allocation
page read and write
30FF000
stack
page read and write
19FA31F7000
heap
page read and write
1B442080000
heap
page read and write
E3E000
stack
page read and write
6111000
trusted library allocation
page read and write
7F1000
heap
page read and write
5190000
heap
page read and write
3501000
heap
page read and write
6247000
trusted library allocation
page read and write
6616000
trusted library allocation
page read and write
C0B000
heap
page read and write
409E000
stack
page read and write
6119000
trusted library allocation
page read and write
3E8E000
stack
page read and write
4E41000
heap
page read and write
5254000
trusted library allocation
page read and write
5E7D000
trusted library allocation
page read and write
137A000
unkown
page execute and write copy
2778000
direct allocation
page read and write
53FF000
trusted library allocation
page read and write
BC0000
unkown
page write copy
2C03000
heap
page read and write
523B000
trusted library allocation
page read and write
2A37000
heap
page read and write
1245000
unkown
page read and write
1C918770000
heap
page read and write
2761000
direct allocation
page read and write
B6D000
heap
page read and write
CE5C1AF000
stack
page read and write
52A1000
trusted library allocation
page read and write
63C2000
trusted library allocation
page read and write
611B000
trusted library allocation
page read and write
E6E000
stack
page read and write
4A00000
direct allocation
page execute and read and write
5E65000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
1D428C2C000
heap
page read and write
365E000
stack
page read and write
6136000
heap
page read and write
E14000
heap
page read and write
19FA30B0000
heap
page read and write
5E44000
trusted library allocation
page read and write
3CA6000
direct allocation
page read and write
D56000
direct allocation
page read and write
52A1000
trusted library allocation
page read and write
259B000
direct allocation
page read and write
A1ECFDF000
stack
page read and write
1D475538000
heap
page read and write
19FA3190000
heap
page read and write
CFD000
direct allocation
page read and write
5E54000
trusted library allocation
page read and write
491F000
stack
page read and write
2C60000
direct allocation
page read and write
A69000
unkown
page read and write
E14000
heap
page read and write
F81000
unkown
page execute and write copy
33D1000
heap
page read and write
6114000
trusted library allocation
page read and write
19FA31D7000
heap
page read and write
563B000
trusted library allocation
page read and write
654000
heap
page read and write
781F000
stack
page read and write
443F000
stack
page read and write
1763000
heap
page read and write
5639000
trusted library allocation
page read and write
518E000
stack
page read and write
56D3000
trusted library allocation
page read and write
E14000
heap
page read and write
12D0000
direct allocation
page read and write
E14000
heap
page read and write
FE9000
heap
page read and write
13B0000
heap
page read and write
5E65000
trusted library allocation
page read and write
E14000
heap
page read and write
252CB767000
heap
page read and write
634F000
trusted library allocation
page read and write
5EBD27F000
stack
page read and write
C70000
unkown
page execute and write copy
1B441D8D000
heap
page read and write
4351000
heap
page read and write
5E6000
heap
page read and write
469F000
stack
page read and write
20D17F000
stack
page read and write
1D428B30000
heap
page read and write
610000
direct allocation
page read and write
1334000
direct allocation
page read and write
E14000
heap
page read and write
2EA10A50000
heap
page read and write
34CA000
heap
page read and write
35D1000
heap
page read and write
523F000
trusted library allocation
page read and write
334D000
heap
page read and write
5635000
trusted library allocation
page read and write
FBF000
heap
page read and write
334D000
heap
page read and write
2B5707F000
stack
page read and write
344D000
heap
page read and write
33F4000
heap
page read and write
3A3F000
stack
page read and write
5E33000
trusted library allocation
page read and write
26B8000
direct allocation
page read and write
E14000
heap
page read and write
5E54000
trusted library allocation
page read and write
26A8000
direct allocation
page read and write
3CBF000
stack
page read and write
56CD000
trusted library allocation
page read and write
5E55000
trusted library allocation
page read and write
52A1000
trusted library allocation
page read and write
AC38F7C000
stack
page read and write
3F5E000
stack
page read and write
19FA31D0000
heap
page read and write
32D1000
heap
page read and write
60EE000
stack
page read and write
EF3477F000
stack
page read and write
80C000
heap
page read and write
850000
heap
page read and write
25D4B4C0000
heap
page read and write
4351000
heap
page read and write
7B0000
heap
page read and write
334D000
heap
page read and write
4351000
heap
page read and write
10AA000
heap
page read and write
6D0000
direct allocation
page read and write
10B1000
heap
page read and write
252CB620000
heap
page read and write
5E4C000
trusted library allocation
page read and write
447E000
stack
page read and write
95D000
unkown
page read and write
5635000
trusted library allocation
page read and write
35D1000
heap
page read and write
FEE000
stack
page read and write
3471000
heap
page read and write
61AE000
trusted library allocation
page read and write
5EA5000
trusted library allocation
page read and write
4ECF000
stack
page read and write
F90000
unkown
page readonly
27B3000
direct allocation
page read and write
52D7000
trusted library allocation
page read and write
27B1000
direct allocation
page read and write
611F000
trusted library allocation
page read and write
52A1000
trusted library allocation
page read and write
33D1000
heap
page read and write
2CB0000
trusted library allocation
page read and write
696000
unkown
page execute and write copy
E14000
heap
page read and write
4960000
direct allocation
page execute and read and write
DE0000
heap
page read and write
4FD0000
heap
page read and write
525B000
trusted library allocation
page read and write
1C9185AC000
heap
page read and write
19BAFEA8000
heap
page read and write
1437000
heap
page read and write
3BCC000
stack
page read and write
3BB000
stack
page read and write
4490000
heap
page read and write
4E70000
direct allocation
page execute and read and write
4B4E000
stack
page read and write
413F000
stack
page read and write
6234000
trusted library allocation
page read and write
C7B000
unkown
page execute and read and write
1780000
heap
page read and write
42D1000
heap
page read and write
19A2B960000
heap
page read and write
4E20000
direct allocation
page execute and read and write
6248000
trusted library allocation
page read and write
BCE000
unkown
page execute and write copy
6116000
trusted library allocation
page read and write
174F000
heap
page read and write
A72000
unkown
page read and write
E30000
heap
page read and write
C2F000
stack
page read and write
1214000
heap
page read and write
25C4000
direct allocation
page read and write
16D3B0FC000
heap
page read and write
C5C000
unkown
page execute and write copy
5782000
trusted library allocation
page read and write
654000
heap
page read and write
BD4000
unkown
page write copy
5E39000
trusted library allocation
page read and write
B6D000
heap
page read and write
611B000
trusted library allocation
page read and write
336E000
heap
page read and write
52A1000
trusted library allocation
page read and write
5E55000
trusted library allocation
page read and write
2EA10A5B000
heap
page read and write
3DDF000
stack
page read and write
5635000
trusted library allocation
page read and write
1D9000
unkown
page write copy
82E000
stack
page read and write
16D3B1D0000
heap
page read and write
3471000
heap
page read and write
177E000
heap
page read and write
5E30000
trusted library allocation
page read and write
4CB0000
direct allocation
page execute and read and write
5772000
trusted library allocation
page read and write
805000
heap
page read and write
32D1000
heap
page read and write
52A1000
trusted library allocation
page read and write
56EE000
trusted library allocation
page read and write
5E33000
trusted library allocation
page read and write
529B000
trusted library allocation
page read and write
4822000
heap
page read and write
3080000
direct allocation
page read and write
610000
direct allocation
page read and write
920000
direct allocation
page read and write
5E55000
trusted library allocation
page read and write
525B000
trusted library allocation
page read and write
771E000
stack
page read and write
3080000
direct allocation
page read and write
563D000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
3371000
heap
page read and write
33F4000
heap
page read and write
174F000
heap
page read and write
920000
direct allocation
page read and write
4EF0000
direct allocation
page read and write
5E55000
trusted library allocation
page read and write
11D8000
unkown
page execute and read and write
334D000
heap
page read and write
5E33000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
5E2C000
trusted library allocation
page read and write
627B000
trusted library allocation
page read and write
4811000
heap
page read and write
4960000
direct allocation
page execute and read and write
654000
heap
page read and write
2EA108D0000
heap
page read and write
5E1B000
trusted library allocation
page read and write
5E6E000
trusted library allocation
page read and write
1271000
direct allocation
page read and write
52A1000
trusted library allocation
page read and write
563A000
trusted library allocation
page read and write
33D1000
heap
page read and write
5E37000
trusted library allocation
page read and write
52A1000
trusted library allocation
page read and write
3371000
heap
page read and write
5715000
trusted library allocation
page read and write
5F3B000
trusted library allocation
page read and write
1398000
direct allocation
page read and write
3546000
heap
page read and write
76D0000
heap
page execute and read and write
2EE3E7F000
stack
page read and write
A00000
unkown
page readonly
611D000
trusted library allocation
page read and write
2AE0000
heap
page read and write
2C20000
direct allocation
page read and write
2703000
direct allocation
page read and write
2D50000
trusted library allocation
page read and write
1D4754A0000
heap
page read and write
5E39000
trusted library allocation
page read and write
54E4000
heap
page read and write
177A000
heap
page read and write
3547000
heap
page read and write
13DE000
heap
page read and write
4E80000
direct allocation
page execute and read and write
33D1000
heap
page read and write
6112000
trusted library allocation
page read and write
CD5000
unkown
page execute and write copy
1250000
unkown
page write copy
5752000
trusted library allocation
page read and write
41DE000
stack
page read and write
56C9000
trusted library allocation
page read and write
5782000
trusted library allocation
page read and write
1D428C17000
heap
page read and write
5E65000
trusted library allocation
page read and write
61FF000
trusted library allocation
page read and write
EB0000
heap
page read and write
834000
heap
page read and write
1772000
heap
page read and write
C0E000
heap
page read and write
4351000
heap
page read and write
EBE000
stack
page read and write
BF0000
heap
page read and write
19A2BA17000
heap
page read and write
563C000
trusted library allocation
page read and write
5639000
trusted library allocation
page read and write
5E61000
trusted library allocation
page read and write
910000
heap
page read and write
6E5000
heap
page read and write
EB3000
heap
page read and write
E14000
heap
page read and write
950000
unkown
page read and write
EE5BA7F000
stack
page read and write
391000
unkown
page execute and write copy
19FA31F8000
heap
page read and write
563B000
trusted library allocation
page read and write
33D1000
heap
page read and write
5711000
trusted library allocation
page read and write
5E33000
trusted library allocation
page read and write
5E65000
trusted library allocation
page read and write
DC1000
unkown
page readonly
5E8000
heap
page read and write
688000
unkown
page execute and read and write
5299000
trusted library allocation
page read and write
610000
direct allocation
page read and write
336E000
heap
page read and write
711000
heap
page read and write
4810000
heap
page read and write
BBE000
unkown
page write copy
12A6000
direct allocation
page read and write
63A5000
trusted library allocation
page read and write
FBF000
heap
page read and write
16D3B210000
heap
page read and write
6119000
trusted library allocation
page read and write
278D000
direct allocation
page read and write
5790000
trusted library allocation
page read and write
3F1D000
direct allocation
page read and write
6F1D47F000
stack
page read and write
5297000
trusted library allocation
page read and write
5E77000
trusted library allocation
page read and write
1786000
heap
page read and write
4351000
heap
page read and write
EE0000
unkown
page readonly
52A1000
trusted library allocation
page read and write
1763000
heap
page read and write
524B000
trusted library allocation
page read and write
44FF000
stack
page read and write
E14000
heap
page read and write
C5D000
unkown
page execute and read and write
5E55000
trusted library allocation
page read and write
51BA000
trusted library allocation
page execute and read and write
5E65000
trusted library allocation
page read and write
25AD000
direct allocation
page read and write
4811000
heap
page read and write
810000
heap
page read and write
A6B000
unkown
page write copy
C0B000
heap
page read and write
4F40000
trusted library allocation
page read and write
E14000
heap
page read and write
3C8D000
direct allocation
page read and write
6200000
trusted library allocation
page read and write
C0B000
heap
page read and write
1158000
heap
page read and write
315F000
stack
page read and write
5E27000
trusted library allocation
page read and write
F70000
direct allocation
page read and write
678000
heap
page read and write
4E00000
direct allocation
page execute and read and write
6DC027F000
stack
page read and write
CCD000
direct allocation
page read and write
2A92D2C000
stack
page read and write
3547000
heap
page read and write
1309332B000
heap
page read and write
2BCE000
stack
page read and write
139000
stack
page read and write
35D1000
heap
page read and write
920000
direct allocation
page read and write
174F000
heap
page read and write
4EC000
stack
page read and write
61BE000
trusted library allocation
page read and write
8D7C000
stack
page read and write
4351000
heap
page read and write
1214000
heap
page read and write
523B000
trusted library allocation
page read and write
32DE000
stack
page read and write
19BAFED0000
heap
page read and write
6118000
trusted library allocation
page read and write
2C3D000
direct allocation
page read and write
5E29000
trusted library allocation
page read and write
254D000
direct allocation
page read and write
525B000
trusted library allocation
page read and write
626E000
trusted library allocation
page read and write
20CD9F000
stack
page read and write
950000
unkown
page write copy
6211000
trusted library allocation
page read and write
FD9000
unkown
page write copy
5232000
trusted library allocation
page read and write
5E7C000
trusted library allocation
page read and write
C0B000
heap
page read and write
38DF000
stack
page read and write
2762000
direct allocation
page read and write
E14000
heap
page read and write
2629000
direct allocation
page read and write
38D937F000
stack
page read and write
4D5197E000
stack
page read and write
6A1000
unkown
page execute read
53E000
stack
page read and write
C71000
unkown
page execute and read and write
54D8000
heap
page read and write
2638000
direct allocation
page read and write
2A9E000
stack
page read and write
113B000
heap
page read and write
3371000
heap
page read and write
3080000
heap
page read and write
97D407F000
stack
page read and write
6118000
trusted library allocation
page read and write
FE3000
heap
page read and write
A1ECF5F000
stack
page read and write
6FC000
stack
page read and write
27A3000
direct allocation
page read and write
22A4B32B000
heap
page read and write
3471000
heap
page read and write
5754000
trusted library allocation
page read and write
51CB000
trusted library allocation
page execute and read and write
52C9000
trusted library allocation
page read and write
1266000
unkown
page execute and write copy
6116000
trusted library allocation
page read and write
523E000
trusted library allocation
page read and write
5635000
trusted library allocation
page read and write
590000
heap
page read and write
19BAFEBC000
heap
page read and write
542F4FF000
stack
page read and write
AE0000
heap
page read and write
7EFD0000
direct allocation
page read and write
208B8D35000
heap
page read and write
49B0000
direct allocation
page execute and read and write
5635000
trusted library allocation
page read and write
4B9F000
stack
page read and write
319E000
stack
page read and write
5FEB000
trusted library allocation
page read and write
12E9000
direct allocation
page read and write
563C000
trusted library allocation
page read and write
2716000
direct allocation
page read and write
D0B000
direct allocation
page read and write
33D1000
heap
page read and write
334D000
heap
page read and write
5719000
trusted library allocation
page read and write
1760000
heap
page read and write
3E4F000
stack
page read and write
E14000
heap
page read and write
AA9000
heap
page read and write
920000
direct allocation
page read and write
1771000
heap
page read and write
1DA81730000
heap
page read and write
5239000
trusted library allocation
page read and write
63C1000
trusted library allocation
page read and write
4960000
direct allocation
page execute and read and write
1750000
heap
page read and write
176F000
heap
page read and write
B6D000
heap
page read and write
5E65000
trusted library allocation
page read and write
4353000
heap
page read and write
654000
heap
page read and write
334D000
heap
page read and write
5E44000
trusted library allocation
page read and write
6130000
heap
page read and write
334D000
heap
page read and write
1358000
direct allocation
page read and write
524B000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
7EF000
heap
page read and write
1773000
heap
page read and write
336E000
heap
page read and write
5221000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
7EF000
heap
page read and write
5222000
trusted library allocation
page read and write
32D1000
heap
page read and write
419F000
stack
page read and write
343E000
stack
page read and write
522E000
trusted library allocation
page read and write
626C000
trusted library allocation
page read and write
4351000
heap
page read and write
1214000
heap
page read and write
58C8000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
6F5000
heap
page read and write
35D1000
heap
page read and write
76F000
heap
page read and write
1461000
heap
page read and write
5293000
trusted library allocation
page read and write
89AC000
stack
page read and write
2B00000
direct allocation
page read and write
CC7000
unkown
page readonly
45E000
unkown
page execute and write copy
C0B000
heap
page read and write
1418000
heap
page read and write
51B0000
trusted library allocation
page read and write
176E000
heap
page read and write
FD6000
heap
page read and write
A6C000
unkown
page read and write
61B9000
trusted library allocation
page read and write
7F5000
heap
page read and write
16D3B0B8000
heap
page read and write
E14000
heap
page read and write
5752000
trusted library allocation
page read and write
33F4000
heap
page read and write
4E41000
heap
page read and write
5E5C000
trusted library allocation
page read and write
2C44000
direct allocation
page read and write
1214000
heap
page read and write
59D00FE000
stack
page read and write
19FA3220000
heap
page read and write
5E33000
trusted library allocation
page read and write
920000
direct allocation
page read and write
574D000
trusted library allocation
page read and write
630000
heap
page read and write
5E44000
trusted library allocation
page read and write
61CF000
trusted library allocation
page read and write
1771000
heap
page read and write
19FA321F000
heap
page read and write
5E4A000
trusted library allocation
page read and write
E14000
heap
page read and write
B91000
heap
page read and write
5E65000
trusted library allocation
page read and write
5737000
trusted library allocation
page read and write
6E9000
heap
page read and write
6BC000
unkown
page execute read
EE0000
heap
page read and write
4990000
direct allocation
page execute and read and write
5E14000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
344C000
heap
page read and write
B8E000
heap
page read and write
344D000
heap
page read and write
6117000
trusted library allocation
page read and write
E14000
heap
page read and write
6110000
trusted library allocation
page read and write
3080000
direct allocation
page read and write
6DC007E000
stack
page read and write
524B000
trusted library allocation
page read and write
35F4000
heap
page read and write
3D0F000
stack
page read and write
130936D5000
heap
page read and write
E14000
heap
page read and write
2C5A000
direct allocation
page read and write
6114000
trusted library allocation
page read and write
5E65000
trusted library allocation
page read and write
32D1000
heap
page read and write
7F2000
heap
page read and write
E14000
heap
page read and write
22A4B327000
heap
page read and write
B6D000
heap
page read and write
19A2B9F7000
heap
page read and write
525B000
trusted library allocation
page read and write
19FA321C000
heap
page read and write
E90000
heap
page read and write
3547000
heap
page read and write
525B000
trusted library allocation
page read and write
E14000
heap
page read and write
C1C000
unkown
page execute and read and write
4350000
heap
page read and write
23C2D437000
heap
page read and write
2B00000
direct allocation
page read and write
7F1000
heap
page read and write
33D1000
heap
page read and write
5637000
trusted library allocation
page read and write
524B000
trusted library allocation
page read and write
5E74000
trusted library allocation
page read and write
2570000
direct allocation
page read and write
C0E000
heap
page read and write
61BE000
trusted library allocation
page read and write
5E5C000
trusted library allocation
page read and write
5636000
trusted library allocation
page read and write
A50000
unkown
page readonly
336E000
heap
page read and write
33D1000
heap
page read and write
525B000
trusted library allocation
page read and write
B16000
unkown
page execute read
2E5A277B000
heap
page read and write
525B000
trusted library allocation
page read and write
76F000
heap
page read and write
611C000
trusted library allocation
page read and write
6121000
trusted library allocation
page read and write
2E5A2790000
heap
page read and write
417E000
stack
page read and write
374E000
stack
page read and write
32D1000
heap
page read and write
E14000
heap
page read and write
457F000
stack
page read and write
563C000
trusted library allocation
page read and write
81C000
heap
page read and write
E14000
heap
page read and write
6D0000
direct allocation
page read and write
2841B990000
heap
page read and write
5440000
direct allocation
page execute and read and write
19A2BA1A000
heap
page read and write
5E9D000
trusted library allocation
page read and write
4351000
heap
page read and write
11A1000
unkown
page execute and read and write
5F2000
heap
page read and write
4F01000
heap
page read and write
611C000
trusted library allocation
page read and write
52A1000
trusted library allocation
page read and write
4351000
heap
page read and write
261A000
direct allocation
page read and write
56F4000
trusted library allocation
page read and write
1750000
heap
page read and write
3371000
heap
page read and write
D8B000
direct allocation
page read and write
336E000
heap
page read and write
5784000
trusted library allocation
page read and write
26FA000
direct allocation
page read and write
33D1000
heap
page read and write
253F000
direct allocation
page read and write
5E65000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
52A1000
trusted library allocation
page read and write
6261000
trusted library allocation
page read and write
E14000
heap
page read and write
3E1E000
stack
page read and write
5226000
trusted library allocation
page read and write
ED0000
heap
page read and write
208B8AEB000
heap
page read and write
3792000
direct allocation
page read and write
33F4000
heap
page read and write
356A000
heap
page read and write
6116000
trusted library allocation
page read and write
5717000
trusted library allocation
page read and write
52A1000
trusted library allocation
page read and write
611B000
trusted library allocation
page read and write
57E7000
trusted library allocation
page read and write
36CF000
stack
page read and write
E14000
heap
page read and write
BE0000
direct allocation
page execute and read and write
1763000
heap
page read and write
1D47553D000
heap
page read and write
E14000
heap
page read and write
27B8000
direct allocation
page read and write
D6B000
unkown
page read and write
10B7000
heap
page read and write
E7E000
stack
page read and write
137A000
unkown
page execute and write copy
C6B000
unkown
page execute and write copy
279D000
direct allocation
page read and write
583D000
trusted library allocation
page read and write
9C000
stack
page read and write
5270000
trusted library allocation
page read and write
23C2D430000
heap
page read and write
25A4000
direct allocation
page read and write
4841000
direct allocation
page read and write
33F4000
heap
page read and write
33F4000
heap
page read and write
6115000
trusted library allocation
page read and write
1C9185BC000
heap
page read and write
610000
direct allocation
page read and write
56FF000
trusted library allocation
page read and write
81A000
heap
page read and write
51B0000
direct allocation
page execute and read and write
67A000
heap
page read and write
5273000
trusted library allocation
page read and write
12D4000
direct allocation
page read and write
2606000
direct allocation
page read and write
2032F59C000
heap
page read and write
4C10000
direct allocation
page execute and read and write
1DA8161B000
heap
page read and write
93E000
stack
page read and write
33D1000
heap
page read and write
4D5187F000
stack
page read and write
CAE000
unkown
page write copy
680000
heap
page read and write
32D1000
heap
page read and write
32D1000
heap
page read and write
5E55000
trusted library allocation
page read and write
3471000
heap
page read and write
3371000
heap
page read and write
620F000
trusted library allocation
page read and write
1771000
heap
page read and write
5E54000
trusted library allocation
page read and write
524C000
trusted library allocation
page read and write
5DA000
heap
page read and write
5326000
trusted library allocation
page read and write
56F6000
trusted library allocation
page read and write
5E55000
trusted library allocation
page read and write
2EFF000
stack
page read and write
AC0000
heap
page read and write
7560000
trusted library allocation
page read and write
5E54000
trusted library allocation
page read and write
D69000
unkown
page read and write
E14000
heap
page read and write
660000
heap
page read and write
1314000
direct allocation
page read and write
3471000
heap
page read and write
355E000
stack
page read and write
23C2D550000
heap
page read and write
81D000
heap
page read and write
4351000
heap
page read and write
2751000
direct allocation
page read and write
33F4000
heap
page read and write
4E41000
heap
page read and write
51AD000
stack
page read and write
32D1000
heap
page read and write
2A20000
heap
page read and write
2032F510000
heap
page read and write
26F3000
direct allocation
page read and write
28DE000
stack
page read and write
13DA000
heap
page read and write
1B441D8E000
heap
page read and write
26F4000
direct allocation
page read and write
4800000
direct allocation
page read and write
32D1000
heap
page read and write
1D428A50000
heap
page read and write
563C000
trusted library allocation
page read and write
5E65000
trusted library allocation
page read and write
F70000
remote allocation
page read and write
5631000
trusted library allocation
page read and write
474000
unkown
page execute and write copy
19A2BA15000
heap
page read and write
4E20000
direct allocation
page execute and read and write
41FE000
stack
page read and write
57AE000
trusted library allocation
page read and write
526F000
trusted library allocation
page read and write
1214000
heap
page read and write
CB917DF000
stack
page read and write
42D1000
heap
page read and write
32F4000
heap
page read and write
2E5A278D000
heap
page read and write
334D000
heap
page read and write
5E7B000
trusted library allocation
page read and write
67A000
heap
page read and write
336E000
heap
page read and write
5238000
trusted library allocation
page read and write
E14000
heap
page read and write
38BE000
stack
page read and write
FDD000
heap
page read and write
7F3000
heap
page read and write
10B0000
heap
page read and write
920000
direct allocation
page read and write
1C9185AC000
heap
page read and write
E15000
heap
page read and write
798000
heap
page read and write
2841B657000
heap
page read and write
180000
unkown
page readonly
636F000
trusted library allocation
page read and write
256A000
direct allocation
page read and write
5E65000
trusted library allocation
page read and write
252CB700000
heap
page read and write
25AB000
direct allocation
page read and write
1771000
heap
page read and write
398E000
stack
page read and write
63A7000
trusted library allocation
page read and write
E14000
heap
page read and write
336E000
heap
page read and write
1298000
direct allocation
page read and write
5221000
trusted library allocation
page read and write
834000
heap
page read and write
654000
heap
page read and write
524A000
trusted library allocation
page read and write
32F4000
heap
page read and write
7DB000
heap
page read and write
1214000
heap
page read and write
C3E000
unkown
page execute and write copy
25E2000
direct allocation
page read and write
526B000
trusted library allocation
page read and write
5E46000
trusted library allocation
page read and write
90E000
stack
page read and write
D8C000
stack
page read and write
563A000
trusted library allocation
page read and write
610000
direct allocation
page read and write
61C9000
trusted library allocation
page read and write
272E000
direct allocation
page read and write
46DE000
stack
page read and write
4641000
heap
page read and write
2546000
direct allocation
page read and write
2F00000
direct allocation
page read and write
33D1000
heap
page read and write
525B000
trusted library allocation
page read and write
524B000
trusted library allocation
page read and write
563E000
trusted library allocation
page read and write
341E000
stack
page read and write
524C000
trusted library allocation
page read and write
5E33000
trusted library allocation
page read and write
5E44000
trusted library allocation
page read and write
5634000
trusted library allocation
page read and write
6235000
trusted library allocation
page read and write
BC0000
unkown
page read and write
1774000
heap
page read and write
525B000
trusted library allocation
page read and write
3471000
heap
page read and write
81D000
heap
page read and write
4DDF000
stack
page read and write
336E000
heap
page read and write
563E000
trusted library allocation
page read and write
670000
direct allocation
page execute and read and write
6FD000
heap
page read and write
56F4000
trusted library allocation
page read and write
4351000
heap
page read and write
BC5000
unkown
page read and write
B8E000
heap
page read and write
16D3AFD0000
heap
page read and write
2032F550000
heap
page read and write
1D428BE8000
heap
page read and write
E14000
heap
page read and write
C0E000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
4E20000
direct allocation
page execute and read and write
D9D000
unkown
page readonly
4351000
heap
page read and write
4800000
direct allocation
page read and write
5241000
trusted library allocation
page read and write
1775000
heap
page read and write
7FF000
heap
page read and write
EF347FE000
stack
page read and write
8CD000
stack
page read and write
62B000
heap
page read and write
35D1000
heap
page read and write
19BAFEAD000
heap
page read and write
6114000
trusted library allocation
page read and write
4EF0000
direct allocation
page read and write
3564000
direct allocation
page read and write
265C000
direct allocation
page read and write
46BF000
stack
page read and write
5E55000
trusted library allocation
page read and write
81D000
heap
page read and write
1125000
heap
page read and write
6261000
trusted library allocation
page read and write
6121000
trusted library allocation
page read and write
A5A000
unkown
page execute and read and write
6278000
trusted library allocation
page read and write
1763000
heap
page read and write
356A000
heap
page read and write
3080000
direct allocation
page read and write
5633000
trusted library allocation
page read and write
3547000
heap
page read and write
E14000
heap
page read and write
5720000
trusted library allocation
page read and write
6135000
heap
page read and write
5E37000
trusted library allocation
page read and write
4351000
heap
page read and write
5E65000
trusted library allocation
page read and write
E14000
heap
page read and write
A72000
unkown
page read and write
A1ED27F000
stack
page read and write
5273000
trusted library allocation
page read and write
E14000
heap
page read and write
C2B000
unkown
page execute and read and write
5278000
trusted library allocation
page read and write
1D428C32000
heap
page read and write
1214000
heap
page read and write
33D1000
heap
page read and write
334D000
heap
page read and write
7EF000
heap
page read and write
334D000
heap
page read and write
5221000
trusted library allocation
page read and write
32D1000
heap
page read and write
5632000
trusted library allocation
page read and write
334D000
heap
page read and write
33D1000
heap
page read and write
25DB000
direct allocation
page read and write
E14000
heap
page read and write
E14000
heap
page read and write
526B000
trusted library allocation
page read and write
32D1000
heap
page read and write
52A1000
trusted library allocation
page read and write
D13000
direct allocation
page read and write
1D47554A000
heap
page read and write
B91000
heap
page read and write
5707000
trusted library allocation
page read and write
654000
heap
page read and write
52A1000
trusted library allocation
page read and write
11E7000
unkown
page execute and write copy
346E000
heap
page read and write
1780000
heap
page read and write
1214000
heap
page read and write
5780000
trusted library allocation
page read and write
9A0000
heap
page read and write
52A1000
trusted library allocation
page read and write
1BB96760000
heap
page read and write
4EF0000
direct allocation
page read and write
334D000
heap
page read and write
D4B000
direct allocation
page read and write
2A30000
heap
page read and write
5237000
trusted library allocation
page read and write
10C5000
heap
page read and write
57AC000
trusted library allocation
page read and write
22A4B475000
heap
page read and write
7F3000
heap
page read and write
2646000
direct allocation
page read and write
3DAF000
stack
page read and write
5E54000
trusted library allocation
page read and write
2596000
direct allocation
page read and write
620B000
trusted library allocation
page read and write
52A1000
trusted library allocation
page read and write
920000
direct allocation
page read and write
1214000
heap
page read and write
26D7000
direct allocation
page read and write
1378000
unkown
page execute and read and write
357E000
stack
page read and write
2C1E000
direct allocation
page read and write
2E5A26A0000
heap
page read and write
1082000
heap
page read and write
E14000
heap
page read and write
600000
heap
page read and write
81A000
heap
page read and write
3F9000
unkown
page write copy
2841B995000
heap
page read and write
4351000
heap
page read and write
3471000
heap
page read and write
A6F000
unkown
page read and write
34CA000
heap
page read and write
3CB000
stack
page read and write
5705000
trusted library allocation
page read and write
263F000
direct allocation
page read and write
DA0000
direct allocation
page read and write
5E44000
trusted library allocation
page read and write
C0E000
heap
page read and write
EF3439B000
stack
page read and write
4C50000
direct allocation
page execute and read and write
5237000
trusted library allocation
page read and write
581E000
trusted library allocation
page read and write
809000
heap
page read and write
1D475537000
heap
page read and write
5E8A000
trusted library allocation
page read and write
344C000
heap
page read and write
6D0000
direct allocation
page read and write
836000
stack
page read and write
2745000
direct allocation
page read and write
7ED000
heap
page read and write
136D000
direct allocation
page read and write
3371000
heap
page read and write
5EA000
heap
page read and write
22A4B470000
heap
page read and write
577D000
trusted library allocation
page read and write
5E73000
trusted library allocation
page read and write
6265000
trusted library allocation
page read and write
5BD000
heap
page read and write
2EEC000
stack
page read and write
5E39000
trusted library allocation
page read and write
96E000
heap
page read and write
26FB000
direct allocation
page read and write
56F7000
trusted library allocation
page read and write
403E000
stack
page read and write
346E000
heap
page read and write
DBF000
stack
page read and write
2C4B000
direct allocation
page read and write
4E41000
heap
page read and write
626E000
trusted library allocation
page read and write
E14000
heap
page read and write
F9E000
heap
page read and write
EE5000
heap
page read and write
25A4000
direct allocation
page read and write
FE9000
heap
page read and write
545000
heap
page read and write
139E000
stack
page read and write
344C000
heap
page read and write
1324000
direct allocation
page read and write
E14000
heap
page read and write
1789000
heap
page read and write
1214000
heap
page read and write
16D3B0DB000
heap
page read and write
2500000
direct allocation
page read and write
5E39000
trusted library allocation
page read and write
A69000
unkown
page read and write
4351000
heap
page read and write
6278000
trusted library allocation
page read and write
5E65000
trusted library allocation
page read and write
525B000
trusted library allocation
page read and write
334D000
heap
page read and write
34EE000
heap
page read and write
2EA109C0000
heap
page read and write
EF3467F000
stack
page read and write
33F4000
heap
page read and write
1BB9686B000
heap
page read and write
62A9000
trusted library allocation
page read and write
CBD000
unkown
page read and write
19BAFEA7000
heap
page read and write
5294000
trusted library allocation
page read and write
32D1000
heap
page read and write
1771000
heap
page read and write
81E000
stack
page read and write
4AFE000
stack
page read and write
271F000
direct allocation
page read and write
5634000
trusted library allocation
page read and write
D77000
unkown
page readonly
1772000
heap
page read and write
8C7C000
stack
page read and write
6BA000
heap
page read and write
F70000
remote allocation
page read and write
6A8000
heap
page read and write
5F1C000
trusted library allocation
page read and write
5E65000
trusted library allocation
page read and write
75AE000
stack
page read and write
525B000
trusted library allocation
page read and write
19FA3370000
heap
page read and write
563A000
trusted library allocation
page read and write
CD1000
unkown
page execute and write copy
35CE000
stack
page read and write
578B000
trusted library allocation
page read and write
6276000
trusted library allocation
page read and write
5E5C000
trusted library allocation
page read and write
16D3B0D5000
heap
page read and write
5E79000
trusted library allocation
page read and write
9C0000
unkown
page readonly
1214000
heap
page read and write
2663000
direct allocation
page read and write
445E000
stack
page read and write
356A000
heap
page read and write
26E4000
direct allocation
page read and write
6288000
trusted library allocation
page read and write
611D000
trusted library allocation
page read and write
E14000
heap
page read and write
61C9000
trusted library allocation
page read and write
5E44000
trusted library allocation
page read and write
346E000
heap
page read and write
61B3000
trusted library allocation
page read and write
C50000
unkown
page execute and write copy
D90000
heap
page read and write
54B9000
trusted library allocation
page read and write
E14000
heap
page read and write
52A1000
trusted library allocation
page read and write
1424000
heap
page read and write
22A4B440000
heap
page read and write
1643AEE7000
heap
page read and write
1257000
unkown
page readonly
2770000
direct allocation
page read and write
5F4000
heap
page read and write
5E30000
trusted library allocation
page read and write
5221000
trusted library allocation
page read and write
5638000
trusted library allocation
page read and write
5638000
trusted library allocation
page read and write
1DA81530000
heap
page read and write
E14000
heap
page read and write
914000
heap
page read and write
4E41000
heap
page read and write
6219000
trusted library allocation
page read and write
1D475517000
heap
page read and write
5E55000
trusted library allocation
page read and write
56E1000
trusted library allocation
page read and write
525C000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
563C000
trusted library allocation
page read and write
7FE000
heap
page read and write
1D47555E000
heap
page read and write
5257000
trusted library allocation
page read and write
33F4000
heap
page read and write
4370000
heap
page read and write
5008000
heap
page read and write
F0E000
heap
page read and write
1214000
heap
page read and write
344D000
heap
page read and write
23C2D530000
heap
page read and write
1643AD20000
heap
page read and write
5D38000
trusted library allocation
page read and write
5EBCFEB000
stack
page read and write
5E4C000
trusted library allocation
page read and write
5266000
trusted library allocation
page read and write
6597000
trusted library allocation
page read and write
25CF000
direct allocation
page read and write
58A8000
trusted library allocation
page read and write
52A1000
trusted library allocation
page read and write
3371000
heap
page read and write
2C12000
direct allocation
page read and write
2032F795000
heap
page read and write
13093280000
heap
page read and write
525B000
trusted library allocation
page read and write
19BAFECE000
heap
page read and write
5320000
trusted library allocation
page read and write
25AB000
direct allocation
page read and write
11D0000
unkown
page execute and read and write
10A0000
heap
page read and write
334D000
heap
page read and write
1BB96805000
heap
page read and write
5E65000
trusted library allocation
page read and write
A76000
unkown
page write copy
8C8000
stack
page read and write
542F47F000
stack
page read and write
3DBE000
stack
page read and write
32D1000
heap
page read and write
D69000
unkown
page read and write
5641000
trusted library allocation
page read and write
858000
heap
page read and write
903000
heap
page read and write
344C000
heap
page read and write
25CB000
direct allocation
page read and write
5E7D000
trusted library allocation
page read and write
265C000
direct allocation
page read and write
301F000
stack
page read and write
6415000
trusted library allocation
page read and write
48A0000
direct allocation
page execute and read and write
16D3B1B0000
heap
page read and write
346E000
heap
page read and write
5E5C000
trusted library allocation
page read and write
10F9000
stack
page read and write
5E33000
trusted library allocation
page read and write
1BB9687B000
heap
page read and write
CC0000
unkown
page readonly
5228000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
61C7000
trusted library allocation
page read and write
7570000
trusted library allocation
page read and write
35D1000
heap
page read and write
410E000
stack
page read and write
34BF000
stack
page read and write
E14000
heap
page read and write
63F4000
trusted library allocation
page read and write
2E0F000
stack
page read and write
5251000
trusted library allocation
page read and write
2B570FE000
stack
page read and write
344C000
heap
page read and write
270F000
direct allocation
page read and write
431E000
stack
page read and write
5638000
trusted library allocation
page read and write
E14000
heap
page read and write
37BF000
stack
page read and write
F80000
heap
page read and write
39FE000
stack
page read and write
2DBF000
stack
page read and write
5E52000
trusted library allocation
page read and write
1DA817E5000
heap
page read and write
524C000
trusted library allocation
page read and write
1763000
heap
page read and write
2F10000
heap
page read and write
1750000
heap
page read and write
620A000
trusted library allocation
page read and write
611E000
trusted library allocation
page read and write
2B5717F000
stack
page read and write
61EB000
trusted library allocation
page read and write
61BB000
trusted library allocation
page read and write
33D1000
heap
page read and write
5298000
trusted library allocation
page read and write
25D4B4A0000
heap
page read and write
E14000
heap
page read and write
5256000
trusted library allocation
page read and write
31CF000
stack
page read and write
E14000
heap
page read and write
5E44000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
33FF000
stack
page read and write
2C53000
direct allocation
page read and write
96F000
heap
page read and write
780000
heap
page read and write
3AFF000
stack
page read and write
576A000
trusted library allocation
page read and write
809000
heap
page read and write
52A1000
trusted library allocation
page read and write
1DA81710000
heap
page read and write
334D000
heap
page read and write
25BA000
direct allocation
page read and write
955000
unkown
page write copy
2C2F000
direct allocation
page read and write
3C5D000
direct allocation
page read and write
5639000
trusted library allocation
page read and write
16D3B0E8000
heap
page read and write
491F000
stack
page read and write
1B441D8D000
heap
page read and write
3C0E000
stack
page read and write
2032F58C000
heap
page read and write
398E000
stack
page read and write
4800000
direct allocation
page read and write
DDE000
stack
page read and write
563F000
trusted library allocation
page read and write
1B441D6B000
heap
page read and write
95316FE000
stack
page read and write
CC0000
direct allocation
page read and write
53E000
stack
page read and write
BCD000
unkown
page execute and read and write
4641000
heap
page read and write
5E4C000
trusted library allocation
page read and write
33F4000
heap
page read and write
525B000
trusted library allocation
page read and write
798000
heap
page read and write
1D47554E000
heap
page read and write
524B000
trusted library allocation
page read and write
52CC000
trusted library allocation
page read and write
795E000
stack
page read and write
4E30000
direct allocation
page execute and read and write
4351000
heap
page read and write
16D3B0E6000
heap
page read and write
5E2C000
trusted library allocation
page read and write
6D0000
direct allocation
page read and write
FDD000
heap
page read and write
3371000
heap
page read and write
EE0000
unkown
page readonly
4351000
heap
page read and write
48FC000
trusted library allocation
page read and write
1750000
heap
page read and write
420E000
stack
page read and write
278F000
direct allocation
page read and write
E14000
heap
page read and write
62C8000
trusted library allocation
page read and write
4800000
direct allocation
page read and write
563A000
trusted library allocation
page read and write
2796000
direct allocation
page read and write
3CFE000
stack
page read and write
E14000
heap
page read and write
5E65000
trusted library allocation
page read and write
4351000
heap
page read and write
C3B000
stack
page read and write
A50000
unkown
page read and write
1C918570000
heap
page read and write
6231000
trusted library allocation
page read and write
622C000
trusted library allocation
page read and write
523B000
trusted library allocation
page read and write
CDB000
unkown
page execute and write copy
525B000
trusted library allocation
page read and write
4351000
heap
page read and write
59D027E000
stack
page read and write
4C20000
direct allocation
page execute and read and write
5E39000
trusted library allocation
page read and write
4830000
heap
page read and write
5E55000
trusted library allocation
page read and write
32D1000
heap
page read and write
10B3000
heap
page read and write
5E6B000
trusted library allocation
page read and write
5E65000
trusted library allocation
page read and write
25C8000
direct allocation
page read and write
730000
heap
page read and write
16D3B102000
heap
page read and write
2C36000
direct allocation
page read and write
5264000
trusted library allocation
page read and write
563F000
trusted library allocation
page read and write
B91000
heap
page read and write
1DA81610000
heap
page read and write
2032F591000
heap
page read and write
5636000
trusted library allocation
page read and write
5268000
trusted library allocation
page read and write
52D0000
direct allocation
page read and write
DDEA5BC000
stack
page read and write
90E000
stack
page read and write
5F12000
trusted library allocation
page read and write
32F4000
heap
page read and write
52A1000
trusted library allocation
page read and write
6319000
trusted library allocation
page read and write
2E5A2748000
heap
page read and write
CB5000
unkown
page read and write
52A1000
trusted library allocation
page read and write
C0E000
heap
page read and write
3350000
heap
page read and write
2A8F000
stack
page read and write
628C000
trusted library allocation
page read and write
CC1000
unkown
page execute read
3080000
direct allocation
page read and write
5EBD37E000
stack
page read and write
5238000
trusted library allocation
page read and write
2630000
direct allocation
page read and write
6119000
trusted library allocation
page read and write
261B000
direct allocation
page read and write
563B000
trusted library allocation
page read and write
320E000
stack
page read and write
5294000
trusted library allocation
page read and write
B91000
heap
page read and write
274A000
direct allocation
page read and write
65B3000
trusted library allocation
page read and write
5E73000
trusted library allocation
page read and write
334D000
heap
page read and write
5E4B000
trusted library allocation
page read and write
5228000
trusted library allocation
page read and write
5E65000
trusted library allocation
page read and write
5637000
trusted library allocation
page read and write
344C000
heap
page read and write
657F000
stack
page read and write
2622000
direct allocation
page read and write
37E6000
direct allocation
page read and write
A90000
heap
page read and write
2EB0000
heap
page read and write
5634000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
4351000
heap
page read and write
E14000
heap
page read and write
E14000
heap
page read and write
2032F57B000
heap
page read and write
40CF000
stack
page read and write
35D1000
heap
page read and write
13D0000
heap
page read and write
5E63000
trusted library allocation
page read and write
176E000
heap
page read and write
F60000
heap
page read and write
5228000
trusted library allocation
page read and write
571F000
trusted library allocation
page read and write
337F000
stack
page read and write
E14000
heap
page read and write
6113000
trusted library allocation
page read and write
2AF7000
heap
page read and write
4E10000
direct allocation
page execute and read and write
37FE000
stack
page read and write
53C7000
trusted library allocation
page read and write
12FB000
direct allocation
page read and write
4351000
heap
page read and write
5357000
trusted library allocation
page read and write
620C000
trusted library allocation
page read and write
522B000
trusted library allocation
page read and write
611B000
trusted library allocation
page read and write
74E0000
heap
page read and write
5084000
heap
page read and write
1C9185B0000
heap
page read and write
2E5A276B000
heap
page read and write
3371000
heap
page read and write
5241000
trusted library allocation
page read and write
62C1000
trusted library allocation
page read and write
5259000
trusted library allocation
page read and write
308F000
stack
page read and write
6DC00FE000
stack
page read and write
E14000
heap
page read and write
C40000
heap
page read and write
6118000
trusted library allocation
page read and write
4351000
heap
page read and write
5886000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
1099000
heap
page read and write
4960000
direct allocation
page execute and read and write
63FA000
trusted library allocation
page read and write
715000
heap
page read and write
AA0000
heap
page read and write
45BE000
stack
page read and write
7E1000
heap
page read and write
5239000
trusted library allocation
page read and write
7DB000
heap
page read and write
4811000
heap
page read and write
525B000
trusted library allocation
page read and write
5224000
trusted library allocation
page read and write
526C000
trusted library allocation
page read and write
5E2C000
trusted library allocation
page read and write
25ED000
direct allocation
page read and write
F91000
unkown
page execute read
830000
heap
page read and write
34C000
unkown
page execute and write copy
525B000
trusted library allocation
page read and write
1BB9688C000
heap
page read and write
5E65000
trusted library allocation
page read and write
334D000
heap
page read and write
26CF000
direct allocation
page read and write
D04000
direct allocation
page read and write
2032F4E0000
heap
page read and write
323F000
stack
page read and write
3547000
heap
page read and write
2E5A277B000
heap
page read and write
252CB960000
heap
page read and write
5252000
trusted library allocation
page read and write
654000
heap
page read and write
6286000
trusted library allocation
page read and write
525B000
trusted library allocation
page read and write
3080000
direct allocation
page read and write
2EE3B9C000
stack
page read and write
208B8A90000
heap
page read and write
5633000
trusted library allocation
page read and write
1B441D40000
heap
page read and write
5637000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
98E000
heap
page read and write
5271000
trusted library allocation
page read and write
525B000
trusted library allocation
page read and write
2718000
direct allocation
page read and write
380F000
stack
page read and write
4E90000
direct allocation
page execute and read and write
DE8000
direct allocation
page read and write
1C9184D0000
heap
page read and write
D99000
direct allocation
page read and write
654000
heap
page read and write
563E000
trusted library allocation
page read and write
D73000
unkown
page read and write
5709000
trusted library allocation
page read and write
5F3000
heap
page read and write
523E000
trusted library allocation
page read and write
524C000
trusted library allocation
page read and write
25B3000
direct allocation
page read and write
5636000
trusted library allocation
page read and write
1410000
heap
page read and write
2841B65B000
heap
page read and write
7340000
heap
page read and write
61EF000
trusted library allocation
page read and write
6259000
trusted library allocation
page read and write
26B8000
direct allocation
page read and write
3547000
heap
page read and write
F80000
unkown
page readonly
5821000
trusted library allocation
page read and write
5635000
trusted library allocation
page read and write
5E96000
trusted library allocation
page read and write
BBC000
unkown
page execute and write copy
2788000
direct allocation
page read and write
2769000
direct allocation
page read and write
27C8000
direct allocation
page read and write
3371000
heap
page read and write
7EF000
heap
page read and write
2B571FE000
stack
page read and write
5637000
trusted library allocation
page read and write
610000
direct allocation
page read and write
97D3DFC000
stack
page read and write
6D0000
direct allocation
page read and write
4EF0000
direct allocation
page read and write
5242000
trusted library allocation
page read and write
EAE000
stack
page read and write
953167E000
stack
page read and write
74E0000
heap
page read and write
C0B000
heap
page read and write
3471000
heap
page read and write
1780000
heap
page read and write
654000
heap
page read and write
56F1000
trusted library allocation
page read and write
23C2D595000
heap
page read and write
33D1000
heap
page read and write
5E55000
trusted library allocation
page read and write
1771000
heap
page read and write
D74000
direct allocation
page read and write
5015000
heap
page read and write
522E000
trusted library allocation
page read and write
5E62000
trusted library allocation
page read and write
C0B000
heap
page read and write
5E3A000
trusted library allocation
page read and write
527E000
trusted library allocation
page read and write
25D4B3C0000
heap
page read and write
82F000
stack
page read and write
828000
unkown
page execute and read and write
3080000
direct allocation
page read and write
63F1000
trusted library allocation
page read and write
5E68000
trusted library allocation
page read and write
4A5F000
stack
page read and write
5E17000
trusted library allocation
page read and write
E14000
heap
page read and write
529C000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
EE1000
unkown
page execute and write copy
CB91A7F000
stack
page read and write
4E60000
direct allocation
page execute and read and write
1771000
heap
page read and write
611A000
trusted library allocation
page read and write
1D428C18000
heap
page read and write
528B000
trusted library allocation
page read and write
3471000
heap
page read and write
1C9185BC000
heap
page read and write
1214000
heap
page read and write
1C9185BC000
heap
page read and write
525B000
trusted library allocation
page read and write
1274000
unkown
page execute and write copy
26E6000
direct allocation
page read and write
E14000
heap
page read and write
35D1000
heap
page read and write
EA0000
direct allocation
page execute and read and write
336E000
heap
page read and write
3471000
heap
page read and write
1D0000
heap
page read and write
52A1000
trusted library allocation
page read and write
5E54000
trusted library allocation
page read and write
611C000
trusted library allocation
page read and write
54E1000
heap
page read and write
123E000
unkown
page read and write
5268000
trusted library allocation
page read and write
DD5000
unkown
page readonly
DEE000
stack
page read and write
33D1000
heap
page read and write
1214000
heap
page read and write
6225000
trusted library allocation
page read and write
6206000
trusted library allocation
page read and write
42BE000
stack
page read and write
273D000
direct allocation
page read and write
5E75000
trusted library allocation
page read and write
2735000
direct allocation
page read and write
33F4000
heap
page read and write
1120000
heap
page read and write
19FA31B0000
heap
page read and write
33D1000
heap
page read and write
1785000
heap
page read and write
29DE000
stack
page read and write
680000
unkown
page execute and read and write
EF346FF000
stack
page read and write
61DB000
trusted library allocation
page read and write
1771000
heap
page read and write
2568000
direct allocation
page read and write
33D1000
heap
page read and write
5E54000
trusted library allocation
page read and write
E14000
heap
page read and write
6D0000
direct allocation
page read and write
32D1000
heap
page read and write
52A1000
trusted library allocation
page read and write
1772000
heap
page read and write
2614000
direct allocation
page read and write
130932A0000
heap
page read and write
5765000
trusted library allocation
page read and write
61C7000
trusted library allocation
page read and write
5253000
trusted library allocation
page read and write
33D1000
heap
page read and write
527C000
trusted library allocation
page read and write
6259000
trusted library allocation
page read and write
6117000
trusted library allocation
page read and write
5784000
trusted library allocation
page read and write
144E000
stack
page read and write
5E65000
trusted library allocation
page read and write
63BF000
trusted library allocation
page read and write
5E46000
trusted library allocation
page read and write
1BB96740000
heap
page read and write
5E39000
trusted library allocation
page read and write
2EA109E0000
heap
page read and write
536D000
stack
page read and write
4351000
heap
page read and write
1B441D64000
heap
page read and write
542F5FE000
stack
page read and write
5EB5000
trusted library allocation
page read and write
35F4000
heap
page read and write
4E50000
direct allocation
page execute and read and write
6116000
trusted library allocation
page read and write
549E000
stack
page read and write
B30000
heap
page read and write
C06000
unkown
page execute read
5050000
direct allocation
page read and write
C0B000
heap
page read and write
5758000
trusted library allocation
page read and write
4351000
heap
page read and write
56D5000
trusted library allocation
page read and write
575F000
trusted library allocation
page read and write
59D02FF000
stack
page read and write
5E65000
trusted library allocation
page read and write
32D1000
heap
page read and write
5E54000
trusted library allocation
page read and write
5E17000
trusted library allocation
page read and write
C8B000
unkown
page execute and write copy
95E000
stack
page read and write
334D000
heap
page read and write
634D000
trusted library allocation
page read and write
563A000
trusted library allocation
page read and write
56CD000
trusted library allocation
page read and write
3C3F000
stack
page read and write
25F5000
direct allocation
page read and write
710000
direct allocation
page execute and read and write
4CDE000
stack
page read and write
CB9175C000
stack
page read and write
CD4000
unkown
page execute and read and write
1C9185A8000
heap
page read and write
5221000
trusted library allocation
page read and write
2C0D000
direct allocation
page read and write
E14000
heap
page read and write
208B8D30000
heap
page read and write
6113000
trusted library allocation
page read and write
5011000
heap
page read and write
33F4000
heap
page read and write
3A7E000
stack
page read and write
920000
direct allocation
page read and write
C7D000
unkown
page execute read
5299000
trusted library allocation
page read and write
651000
unkown
page execute and read and write
524B000
trusted library allocation
page read and write
7EF000
heap
page read and write
1785000
heap
page read and write
4DF0000
direct allocation
page execute and read and write
1C9185A7000
heap
page read and write
4E29000
stack
page read and write
334D000
heap
page read and write
503D000
trusted library allocation
page execute and read and write
6D0000
direct allocation
page read and write
654000
heap
page read and write
12D7000
direct allocation
page read and write
574F000
trusted library allocation
page read and write
BCD000
unkown
page read and write
65B0000
heap
page read and write
BF2000
unkown
page execute and read and write
E14000
heap
page read and write
42D1000
heap
page read and write
25CF000
direct allocation
page read and write
D6C000
unkown
page read and write
273C000
direct allocation
page read and write
5E55000
trusted library allocation
page read and write
1771000
heap
page read and write
49F0000
direct allocation
page execute and read and write
6F4000
heap
page read and write
4CA0000
direct allocation
page read and write
CAF000
stack
page read and write
19BAFEB9000
heap
page read and write
334D000
heap
page read and write
1763000
heap
page read and write
5E0000
heap
page read and write
E14000
heap
page read and write
C10000
unkown
page execute and write copy
336E000
heap
page read and write
4641000
heap
page read and write
5E45000
trusted library allocation
page read and write
387F000
stack
page read and write
25BA000
direct allocation
page read and write
10C4000
heap
page read and write
56DE000
trusted library allocation
page read and write
47E0000
direct allocation
page read and write
5850000
trusted library allocation
page read and write
5E2C000
trusted library allocation
page read and write
25D4B4E7000
heap
page read and write
523B000
trusted library allocation
page read and write
27C1000
direct allocation
page read and write
52A1000
trusted library allocation
page read and write
E14000
heap
page read and write
252CB965000
heap
page read and write
5E55000
trusted library allocation
page read and write
F4B000
unkown
page execute and read and write
3CDE000
stack
page read and write
528F000
trusted library allocation
page read and write
19BAFE20000
heap
page read and write
42D1000
heap
page read and write
1D4753C0000
heap
page read and write
2C00000
heap
page read and write
2C7F000
stack
page read and write
1260000
direct allocation
page read and write
E14000
heap
page read and write
3D7F000
stack
page read and write
526D000
trusted library allocation
page read and write
E14000
heap
page read and write
5294000
trusted library allocation
page read and write
7E1000
heap
page read and write
DF0000
heap
page read and write
33D1000
heap
page read and write
251D000
direct allocation
page read and write
5ECE000
trusted library allocation
page read and write
63A1000
trusted library allocation
page read and write
54A2000
heap
page read and write
953177E000
stack
page read and write
19BAFEA7000
heap
page read and write
344D000
heap
page read and write
525B000
trusted library allocation
page read and write
5E44000
trusted library allocation
page read and write
275A000
direct allocation
page read and write
1342000
direct allocation
page read and write
2611000
direct allocation
page read and write
5008000
heap
page read and write
AC8000
heap
page read and write
113B000
heap
page read and write
356A000
heap
page read and write
336E000
heap
page read and write
346E000
heap
page read and write
7F6000
heap
page read and write
920000
direct allocation
page read and write
5044000
trusted library allocation
page read and write
920000
direct allocation
page read and write
A1C000
unkown
page execute read
5241000
trusted library allocation
page read and write
C0E000
heap
page read and write
5CD000
heap
page read and write
B8E000
heap
page read and write
4C00000
direct allocation
page execute and read and write
E14000
heap
page read and write
5634000
trusted library allocation
page read and write
B6D000
heap
page read and write
5E7D000
trusted library allocation
page read and write
803000
heap
page read and write
27A4000
direct allocation
page read and write
D6D000
direct allocation
page read and write
D92000
direct allocation
page read and write
346E000
heap
page read and write
4E41000
heap
page read and write
6114000
trusted library allocation
page read and write
1099000
heap
page read and write
52A1000
trusted library allocation
page read and write
277F000
direct allocation
page read and write
2032F59C000
heap
page read and write
768000
heap
page read and write
805000
heap
page read and write
5632000
trusted library allocation
page read and write
266A000
direct allocation
page read and write
E14000
heap
page read and write
3F2000
unkown
page execute and read and write
252CB720000
heap
page read and write
208B8990000
heap
page read and write
1C9185BC000
heap
page read and write
51C7000
trusted library allocation
page execute and read and write
2B7E000
stack
page read and write
1BB9686B000
heap
page read and write
2638000
direct allocation
page read and write
5635000
trusted library allocation
page read and write
E14000
heap
page read and write
5E44000
trusted library allocation
page read and write
5E54000
trusted library allocation
page read and write
527B000
trusted library allocation
page read and write
174F000
heap
page read and write
525C000
trusted library allocation
page read and write
B8E000
heap
page read and write
35D1000
heap
page read and write
52A1000
trusted library allocation
page read and write
16D3B0D6000
heap
page read and write
2F4F000
stack
page read and write
19BAFED3000
heap
page read and write
58BA000
trusted library allocation
page read and write
525B000
trusted library allocation
page read and write
5808000
trusted library allocation
page read and write
2C05000
direct allocation
page read and write
C43000
unkown
page execute and read and write
1366000
direct allocation
page read and write
CDB000
unkown
page execute and write copy
C8E000
unkown
page execute and read and write
1D428C2C000
heap
page read and write
33D1000
heap
page read and write
3471000
heap
page read and write
6113000
trusted library allocation
page read and write
A66000
unkown
page execute and write copy
32D1000
heap
page read and write
525B000
trusted library allocation
page read and write
11A1000
unkown
page execute and read and write
5000000
trusted library allocation
page read and write
3B5E000
stack
page read and write
6116000
trusted library allocation
page read and write
68F000
heap
page read and write
5E65000
trusted library allocation
page read and write
1D4754C0000
heap
page read and write
5221000
trusted library allocation
page read and write
262A000
direct allocation
page read and write
13093270000
heap
page read and write
26C7000
direct allocation
page read and write
10C5000
unkown
page execute and read and write
5011000
heap
page read and write
4E41000
heap
page read and write
629F000
trusted library allocation
page read and write
20D0FF000
stack
page read and write
16D3B0D5000
heap
page read and write
583F000
trusted library allocation
page read and write
E14000
heap
page read and write
6A0000
unkown
page readonly
62A7000
trusted library allocation
page read and write
6D0000
direct allocation
page read and write
2794000
direct allocation
page read and write
9D7000
unkown
page execute read
4351000
heap
page read and write
6117000
trusted library allocation
page read and write
63EF000
trusted library allocation
page read and write
4970000
direct allocation
page execute and read and write
33D1000
heap
page read and write
5703000
trusted library allocation
page read and write
35F4000
heap
page read and write
BBE000
unkown
page read and write
834000
heap
page read and write
5E65000
trusted library allocation
page read and write
4EC0000
direct allocation
page execute and read and write
FDD000
heap
page read and write
1EE000
stack
page read and write
2E5A278D000
heap
page read and write
610000
direct allocation
page read and write
259D000
direct allocation
page read and write
2032F4F0000
heap
page read and write
5E69000
trusted library allocation
page read and write
4351000
heap
page read and write
5E7E000
trusted library allocation
page read and write
DDEA87F000
stack
page read and write
5741000
trusted library allocation
page read and write
5637000
trusted library allocation
page read and write
5633000
trusted library allocation
page read and write
B6D000
heap
page read and write
344C000
heap
page read and write
1D428BE0000
heap
page read and write
573E000
trusted library allocation
page read and write
5637000
trusted library allocation
page read and write
4EA0000
direct allocation
page execute and read and write
3BBE000
stack
page read and write
524B000
trusted library allocation
page read and write
4351000
heap
page read and write
2C28000
direct allocation
page read and write
5E32000
trusted library allocation
page read and write
125E000
stack
page read and write
5767000
trusted library allocation
page read and write
5E32000
trusted library allocation
page read and write
19D000
stack
page read and write
42D1000
heap
page read and write
33D1000
heap
page read and write
10B2000
heap
page read and write
4351000
heap
page read and write
5279000
trusted library allocation
page read and write
19A2B9E8000
heap
page read and write
56DB000
trusted library allocation
page read and write
654000
heap
page read and write
5015000
heap
page read and write
5E39000
trusted library allocation
page read and write
3B1E000
stack
page read and write
D4E000
direct allocation
page read and write
4351000
heap
page read and write
33E0000
trusted library allocation
page read and write
4351000
heap
page read and write
57B5000
trusted library allocation
page read and write
1B441C90000
heap
page read and write
611D000
trusted library allocation
page read and write
5A8000
heap
page read and write
E14000
heap
page read and write
E14000
heap
page read and write
208B8AE7000
heap
page read and write
B91000
heap
page read and write
2554000
direct allocation
page read and write
346E000
heap
page read and write
5637000
trusted library allocation
page read and write
947000
heap
page read and write
5637000
trusted library allocation
page read and write
5727000
trusted library allocation
page read and write
5768000
trusted library allocation
page read and write
BBA000
unkown
page execute and read and write
4811000
heap
page read and write
56E9000
trusted library allocation
page read and write
52A1000
trusted library allocation
page read and write
5033000
trusted library allocation
page execute and read and write
CD2000
direct allocation
page read and write
52A1000
trusted library allocation
page read and write
7F1000
heap
page read and write
3371000
heap
page read and write
500B000
heap
page read and write
2C03000
direct allocation
page read and write
63C4000
trusted library allocation
page read and write
1D475561000
heap
page read and write
3F7E000
stack
page read and write
542F57E000
stack
page read and write
5E56000
trusted library allocation
page read and write
1F0000
heap
page read and write
6652000
trusted library allocation
page read and write
125E000
unkown
page execute and write copy
5E12000
trusted library allocation
page read and write
114C000
unkown
page execute and write copy
61AC000
trusted library allocation
page read and write
7530000
trusted library allocation
page execute and read and write
37DE000
stack
page read and write
3371000
heap
page read and write
563D000
trusted library allocation
page read and write
42D1000
heap
page read and write
610000
direct allocation
page read and write
5717000
trusted library allocation
page read and write
610000
direct allocation
page read and write
481C000
stack
page read and write
32D1000
heap
page read and write
EE5B7AC000
stack
page read and write
522E000
trusted library allocation
page read and write
3371000
heap
page read and write
38D927C000
stack
page read and write
D84000
direct allocation
page read and write
715000
heap
page read and write
611F000
trusted library allocation
page read and write
5E44000
trusted library allocation
page read and write
336E000
heap
page read and write
6110000
trusted library allocation
page read and write
52A1000
trusted library allocation
page read and write
63B000
heap
page read and write
346E000
heap
page read and write
356A000
heap
page read and write
3C79000
direct allocation
page read and write
DE1000
direct allocation
page read and write
F47000
heap
page read and write
697000
unkown
page execute and write copy
2513000
direct allocation
page read and write
4C10000
direct allocation
page execute and read and write
4930000
direct allocation
page execute and read and write
5011000
heap
page read and write
351F000
stack
page read and write
2E4E000
stack
page read and write
10A3000
heap
page read and write
5253000
trusted library allocation
page read and write
5259000
trusted library allocation
page read and write
32D1000
heap
page read and write
16D3B215000
heap
page read and write
58AA000
trusted library allocation
page read and write
5FF000
heap
page read and write
5940000
remote allocation
page read and write
5298000
trusted library allocation
page read and write
37B9000
direct allocation
page read and write
910000
unkown
page readonly
74DE000
heap
page read and write
13D9000
heap
page read and write
525B000
trusted library allocation
page read and write
5055000
heap
page read and write
346E000
heap
page read and write
1643AEE0000
heap
page read and write
32BF000
stack
page read and write
47DF000
stack
page read and write
E14000
heap
page read and write
524B000
trusted library allocation
page read and write
1D475537000
heap
page read and write
6119000
trusted library allocation
page read and write
4351000
heap
page read and write
12AD000
direct allocation
page read and write
CEF000
direct allocation
page read and write
19A2B9D5000
heap
page read and write
6112000
trusted library allocation
page read and write
40BE000
stack
page read and write
611B000
trusted library allocation
page read and write
5255000
trusted library allocation
page read and write
60E000
heap
page read and write
5E50000
trusted library allocation
page read and write
87E000
stack
page read and write
6113000
trusted library allocation
page read and write
1391000
direct allocation
page read and write
6113000
trusted library allocation
page read and write
526C000
trusted library allocation
page read and write
4351000
heap
page read and write
955000
unkown
page read and write
67A000
heap
page read and write
33F4000
heap
page read and write
4EF0000
direct allocation
page read and write
DD3000
direct allocation
page read and write
3471000
heap
page read and write
5F0000
heap
page read and write
35F4000
heap
page read and write
BD0000
heap
page read and write
6115000
trusted library allocation
page read and write
1643AE85000
heap
page read and write
AC3927F000
stack
page read and write
16D3B0B0000
heap
page read and write
94E000
unkown
page read and write
4351000
heap
page read and write
CAB000
unkown
page execute read
5E55000
trusted library allocation
page read and write
3A8F000
stack
page read and write
FA2000
heap
page read and write
B6D000
heap
page read and write
610000
direct allocation
page read and write
43FE000
stack
page read and write
EC0000
direct allocation
page read and write
654000
heap
page read and write
346E000
heap
page read and write
643F000
stack
page read and write
B6D000
heap
page read and write
7D9000
heap
page read and write
E14000
heap
page read and write
344C000
heap
page read and write
3371000
heap
page read and write
548F000
trusted library allocation
page read and write
1C0000
heap
page read and write
3F3E000
stack
page read and write
4F01000
heap
page read and write
16D3B0FC000
heap
page read and write
563C000
trusted library allocation
page read and write
522F000
trusted library allocation
page read and write
6223000
trusted library allocation
page read and write
4F1E000
stack
page read and write
57E9000
trusted library allocation
page read and write
4EB0000
direct allocation
page execute and read and write
D31000
direct allocation
page read and write
5377000
trusted library allocation
page read and write
2E5A276B000
heap
page read and write
4351000
heap
page read and write
1763000
heap
page read and write
3CCC000
stack
page read and write
6237000
trusted library allocation
page read and write
346E000
heap
page read and write
6113000
trusted library allocation
page read and write
2580000
direct allocation
page read and write
52A4000
trusted library allocation
page read and write
3471000
heap
page read and write
336E000
heap
page read and write
834000
heap
page read and write
5E55000
trusted library allocation
page read and write
A5F000
stack
page read and write
6116000
trusted library allocation
page read and write
10AB000
heap
page read and write
5FF3000
trusted library allocation
page read and write
5E4A000
trusted library allocation
page read and write
1BB9688D000
heap
page read and write
30CE000
stack
page read and write
B6D000
heap
page read and write
523F000
trusted library allocation
page read and write
52C5000
trusted library allocation
page read and write
393E000
stack
page read and write
4351000
heap
page read and write
D64000
direct allocation
page read and write
47E0000
direct allocation
page read and write
5E37000
trusted library allocation
page read and write
53EF000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
25D6000
direct allocation
page read and write
25DE000
direct allocation
page read and write
5E44000
trusted library allocation
page read and write
E14000
heap
page read and write
1D475510000
heap
page read and write
32F4000
heap
page read and write
811000
heap
page read and write
582D000
trusted library allocation
page read and write
542F67F000
stack
page read and write
26EB000
direct allocation
page read and write
2E5A2AA0000
heap
page read and write
523B000
trusted library allocation
page read and write
E14000
heap
page read and write
3F9000
unkown
page write copy
4351000
heap
page read and write
5638000
trusted library allocation
page read and write
19BAFE80000
heap
page read and write
6111000
trusted library allocation
page read and write
525B000
trusted library allocation
page read and write
573F000
trusted library allocation
page read and write
52A1000
trusted library allocation
page read and write
94B000
unkown
page execute read
1BB9687B000
heap
page read and write
334D000
heap
page read and write
5238000
trusted library allocation
page read and write
2EE3EFF000
stack
page read and write
611A000
trusted library allocation
page read and write
524C000
trusted library allocation
page read and write
C0E000
heap
page read and write
3D0000
heap
page read and write
C92000
unkown
page execute and read and write
32F4000
heap
page read and write
1290000
direct allocation
page read and write
D4C000
stack
page read and write
611E000
trusted library allocation
page read and write
2E5A278D000
heap
page read and write
76AF000
stack
page read and write
6D0000
direct allocation
page read and write
1214000
heap
page read and write
2841B5F0000
heap
page read and write
2E5A277B000
heap
page read and write
834000
heap
page read and write
1C9185B1000
heap
page read and write
334D000
heap
page read and write
6267000
trusted library allocation
page read and write
5E30000
trusted library allocation
page read and write
266A000
direct allocation
page read and write
5F5000
heap
page read and write
3090000
direct allocation
page execute and read and write
5450000
direct allocation
page execute and read and write
4940000
direct allocation
page execute and read and write
3C9F000
stack
page read and write
52A9000
trusted library allocation
page read and write
5E4E000
trusted library allocation
page read and write
1BB96877000
heap
page read and write
8A6000
unkown
page execute read
369E000
stack
page read and write
637F000
trusted library allocation
page read and write
336E000
heap
page read and write
1BB96660000
heap
page read and write
6116000
trusted library allocation
page read and write
563E000
trusted library allocation
page read and write
C59000
heap
page read and write
2032F558000
heap
page read and write
C3D000
unkown
page execute and read and write
4E20000
direct allocation
page execute and read and write
33F4000
heap
page read and write
516D000
stack
page read and write
41BF000
stack
page read and write
48A0000
direct allocation
page execute and read and write
11D0000
heap
page read and write
334D000
heap
page read and write
E14000
heap
page read and write
E14000
heap
page read and write
57E000
stack
page read and write
52C1000
trusted library allocation
page read and write
3471000
heap
page read and write
276A000
direct allocation
page read and write
1129000
heap
page read and write
1BB96865000
heap
page read and write
FBF000
heap
page read and write
525B000
trusted library allocation
page read and write
4CA0000
direct allocation
page read and write
5034000
trusted library allocation
page read and write
4800000
direct allocation
page read and write
DAF000
direct allocation
page read and write
529C000
trusted library allocation
page read and write
113B000
heap
page read and write
5636000
trusted library allocation
page read and write
B2F000
stack
page read and write
62EC000
trusted library allocation
page read and write
1214000
heap
page read and write
25D4B4E0000
heap
page read and write
575000
unkown
page execute and read and write
33D1000
heap
page read and write
2EA109B0000
heap
page read and write
19BAFECE000
heap
page read and write
FA2000
heap
page read and write
654000
heap
page read and write
1092000
heap
page read and write
F70000
direct allocation
page read and write
588A000
trusted library allocation
page read and write
176E000
heap
page read and write
4E41000
heap
page read and write
4E41000
heap
page read and write
6FD000
heap
page read and write
AAE000
stack
page read and write
4351000
heap
page read and write
C55000
heap
page read and write
5E3000
heap
page read and write
52AD000
stack
page read and write
52A1000
trusted library allocation
page read and write
4960000
direct allocation
page execute and read and write
466000
unkown
page execute and write copy
3471000
heap
page read and write
19BAFEBC000
heap
page read and write
2708000
direct allocation
page read and write
3DFF000
stack
page read and write
1763000
heap
page read and write
F7E000
heap
page read and write
48A0000
direct allocation
page execute and read and write
1C9183D0000
heap
page read and write
B8E000
heap
page read and write
6DBFDBB000
stack
page read and write
5EBD2FF000
stack
page read and write
19BAFE00000
heap
page read and write
1214000
heap
page read and write
E14000
heap
page read and write
585A000
trusted library allocation
page read and write
89ED000
stack
page read and write
5015000
heap
page read and write
2530000
direct allocation
page read and write
EC0000
direct allocation
page read and write
1C9185AC000
heap
page read and write
3550000
direct allocation
page read and write
DD1000
unkown
page write copy
626E000
trusted library allocation
page read and write
834000
heap
page read and write
2654000
direct allocation
page read and write
49C0000
direct allocation
page execute and read and write
6112000
trusted library allocation
page read and write
525B000
trusted library allocation
page read and write
379D000
direct allocation
page read and write
5E7D000
trusted library allocation
page read and write
1771000
heap
page read and write
427F000
stack
page read and write
11D8000
unkown
page execute and read and write
5769000
trusted library allocation
page read and write
2032F5A0000
heap
page read and write
407F000
stack
page read and write
27AA000
direct allocation
page read and write
334D000
heap
page read and write
4E41000
heap
page read and write
4E41000
heap
page read and write
5634000
trusted library allocation
page read and write
2CFF000
stack
page read and write
E14000
heap
page read and write
52D0000
direct allocation
page read and write
49A0000
direct allocation
page execute and read and write
EEE000
stack
page read and write
5744000
trusted library allocation
page read and write
130936D0000
heap
page read and write
5E84000
trusted library allocation
page read and write
E14000
heap
page read and write
2AE0000
direct allocation
page execute and read and write
563D000
trusted library allocation
page read and write
E14000
heap
page read and write
4C30000
direct allocation
page execute and read and write
259D000
direct allocation
page read and write
5E54000
trusted library allocation
page read and write
FD3000
heap
page read and write
334D000
heap
page read and write
524B000
trusted library allocation
page read and write
E14000
heap
page read and write
5238000
trusted library allocation
page read and write
C6F000
unkown
page execute and read and write
3C9D000
direct allocation
page read and write
5634000
trusted library allocation
page read and write
58DE000
trusted library allocation
page read and write
DC4000
direct allocation
page read and write
46FE000
stack
page read and write
4D518FF000
stack
page read and write
5430000
direct allocation
page execute and read and write
2EAF000
stack
page read and write
25D4B4EB000
heap
page read and write
2F3E000
stack
page read and write
346E000
heap
page read and write
5744000
trusted library allocation
page read and write
1214000
heap
page read and write
2A1E000
stack
page read and write
5632000
trusted library allocation
page read and write
3371000
heap
page read and write
528B000
trusted library allocation
page read and write
5E9C000
trusted library allocation
page read and write
633F000
stack
page read and write
7B0000
heap
page read and write
346E000
heap
page read and write
6D0000
direct allocation
page read and write
12BB000
direct allocation
page read and write
3471000
heap
page read and write
35D1000
heap
page read and write
12F0000
direct allocation
page read and write
522E000
stack
page read and write
4351000
heap
page read and write
E14000
heap
page read and write
42D1000
heap
page read and write
E14000
heap
page read and write
631B000
trusted library allocation
page read and write
DFE000
stack
page read and write
61E8000
trusted library allocation
page read and write
7F6000
heap
page read and write
346E000
heap
page read and write
3B9E000
stack
page read and write
5E27000
trusted library allocation
page read and write
19BAFED1000
heap
page read and write
5636000
trusted library allocation
page read and write
1771000
heap
page read and write
623E000
trusted library allocation
page read and write
522F000
trusted library allocation
page read and write
10BA000
heap
page read and write
27BA000
direct allocation
page read and write
19A2BA0B000
heap
page read and write
4800000
direct allocation
page read and write
CB0000
unkown
page read and write
52A1000
trusted library allocation
page read and write
F70000
direct allocation
page execute and read and write
2743000
direct allocation
page read and write
1763000
heap
page read and write
523B000
trusted library allocation
page read and write
E14000
heap
page read and write
52A1000
trusted library allocation
page read and write
5050000
direct allocation
page read and write
600000
heap
page read and write
C0E000
heap
page read and write
524A000
trusted library allocation
page read and write
4E41000
heap
page read and write
32F4000
heap
page read and write
1D428C2C000
heap
page read and write
5F73000
trusted library allocation
page read and write
20D1FE000
stack
page read and write
525B000
trusted library allocation
page read and write
E14000
heap
page read and write
E14000
heap
page read and write
4EF0000
direct allocation
page read and write
4800000
direct allocation
page read and write
7F7000
heap
page read and write
481E000
stack
page read and write
65D3000
heap
page read and write
2F17000
heap
page read and write
570E000
trusted library allocation
page read and write
B6D000
heap
page read and write
5E9C000
trusted library allocation
page read and write
D69000
unkown
page write copy
2631000
direct allocation
page read and write
379A000
direct allocation
page read and write
C0E000
heap
page read and write
654000
heap
page read and write
5E1C000
trusted library allocation
page read and write
E14000
heap
page read and write
1B441D8D000
heap
page read and write
CEC000
unkown
page execute and write copy
3550000
direct allocation
page read and write
C0E000
heap
page read and write
EE5BAFF000
stack
page read and write
839000
heap
page read and write
37C4000
direct allocation
page read and write
4BB0000
trusted library allocation
page read and write
563D000
trusted library allocation
page read and write
4800000
direct allocation
page read and write
524B000
trusted library allocation
page read and write
730000
heap
page read and write
176F000
heap
page read and write
5E44000
trusted library allocation
page read and write
1771000
heap
page read and write
3371000
heap
page read and write
52C5000
trusted library allocation
page read and write
271E000
direct allocation
page read and write
B91000
heap
page read and write
1B441D65000
heap
page read and write
4351000
heap
page read and write
E14000
heap
page read and write
346E000
heap
page read and write
33F4000
heap
page read and write
4A96000
trusted library allocation
page read and write
390000
unkown
page read and write
386D000
direct allocation
page read and write
123E000
unkown
page write copy
1DA81618000
heap
page read and write
834000
heap
page read and write
5450000
direct allocation
page execute and read and write
80A000
heap
page read and write
2032F576000
heap
page read and write
19A2BA1A000
heap
page read and write
48A0000
direct allocation
page execute and read and write
4E41000
heap
page read and write
3371000
heap
page read and write
6115000
trusted library allocation
page read and write
1378000
unkown
page execute and read and write
F49000
unkown
page write copy
36C000
stack
page read and write
528F000
trusted library allocation
page read and write
D39000
direct allocation
page read and write
4351000
heap
page read and write
63F8000
trusted library allocation
page read and write
920000
direct allocation
page read and write
2032F574000
heap
page read and write
5290000
trusted library allocation
page read and write
2E5A2765000
heap
page read and write
52A1000
trusted library allocation
page read and write
524C000
trusted library allocation
page read and write
5ECD000
trusted library allocation
page read and write
563B000
trusted library allocation
page read and write
9C1000
unkown
page execute read
5E37000
trusted library allocation
page read and write
19A2B9E0000
heap
page read and write
1B441D92000
heap
page read and write
2EFF000
stack
page read and write
654000
heap
page read and write
CAE000
unkown
page read and write
2574000
direct allocation
page read and write
1D428BD5000
heap
page read and write
52A1000
trusted library allocation
page read and write
92C000
unkown
page execute read
D80000
heap
page read and write
FC7000
heap
page read and write
2F8E000
stack
page read and write
4800000
direct allocation
page read and write
5E44000
trusted library allocation
page read and write
7FC000
heap
page read and write
DCD000
unkown
page write copy
E14000
heap
page read and write
5221000
trusted library allocation
page read and write
32D1000
heap
page read and write
E14000
heap
page read and write
4E20000
direct allocation
page execute and read and write
3580000
direct allocation
page read and write
1240000
unkown
page read and write
611D000
trusted library allocation
page read and write
56C4000
trusted library allocation
page read and write
5D4000
heap
page read and write
3EFE000
stack
page read and write
2596000
direct allocation
page read and write
E14000
heap
page read and write
5636000
trusted library allocation
page read and write
19FA3209000
heap
page read and write
563A000
trusted library allocation
page read and write
129F000
direct allocation
page read and write
5940000
remote allocation
page read and write
3080000
direct allocation
page read and write
334D000
heap
page read and write
1273000
direct allocation
page read and write
5E55000
trusted library allocation
page read and write
B6D000
heap
page read and write
5239000
trusted library allocation
page read and write
19A2B9D0000
heap
page read and write
6118000
trusted library allocation
page read and write
5631000
trusted library allocation
page read and write
32D1000
heap
page read and write
5635000
trusted library allocation
page read and write
52AC000
trusted library allocation
page read and write
5E1A000
trusted library allocation
page read and write
E14000
heap
page read and write
459E000
stack
page read and write
F8A000
heap
page read and write
4351000
heap
page read and write
CEE000
unkown
page execute and write copy
6119000
trusted library allocation
page read and write
30B3000
heap
page read and write
CE5C0AC000
stack
page read and write
174F000
heap
page read and write
5E65000
trusted library allocation
page read and write
2E5A2776000
heap
page read and write
110E000
stack
page read and write
5E65000
trusted library allocation
page read and write
A79000
unkown
page readonly
334D000
heap
page read and write
D1A000
direct allocation
page read and write
4351000
heap
page read and write
4C70000
direct allocation
page execute and read and write
563E000
trusted library allocation
page read and write
108E000
heap
page read and write
FD3000
heap
page read and write
35D1000
heap
page read and write
4351000
heap
page read and write
5294000
trusted library allocation
page read and write
3BCF000
stack
page read and write
6209000
trusted library allocation
page read and write
2C01000
direct allocation
page read and write
2AF0000
heap
page read and write
2568000
direct allocation
page read and write
4D515AB000
stack
page read and write
346E000
heap
page read and write
5E45000
trusted library allocation
page read and write
33D1000
heap
page read and write
5DA000
heap
page read and write
5F8000
heap
page read and write
524A000
trusted library allocation
page read and write
3547000
heap
page read and write
23C2D43B000
heap
page read and write
56F0000
trusted library allocation
page read and write
6924000
trusted library allocation
page read and write
C0E000
heap
page read and write
6B40000
trusted library allocation
page read and write
3B5F000
stack
page read and write
33D1000
heap
page read and write
5E17000
trusted library allocation
page read and write
33D1000
heap
page read and write
93C000
stack
page read and write
A56000
unkown
page write copy
33D1000
heap
page read and write
95312BB000
stack
page read and write
C0E000
heap
page read and write
22A4B230000
heap
page read and write
3547000
heap
page read and write
522E000
trusted library allocation
page read and write
178D000
heap
page read and write
2032F588000
heap
page read and write
654000
heap
page read and write
3B8F000
stack
page read and write
2630000
direct allocation
page read and write
2E5A278D000
heap
page read and write
5E65000
trusted library allocation
page read and write
3547000
heap
page read and write
E90000
heap
page read and write
57B000
stack
page read and write
25D4000
direct allocation
page read and write
52A1000
trusted library allocation
page read and write
109D000
heap
page read and write
3D4E000
stack
page read and write
1750000
heap
page read and write
6111000
trusted library allocation
page read and write
32D1000
heap
page read and write
35F4000
heap
page read and write
4980000
direct allocation
page execute and read and write
177B000
heap
page read and write
344D000
heap
page read and write
4800000
direct allocation
page read and write
4E41000
heap
page read and write
2779000
direct allocation
page read and write
5637000
trusted library allocation
page read and write
5710000
trusted library allocation
page read and write
DDA000
direct allocation
page read and write
524C000
trusted library allocation
page read and write
1214000
heap
page read and write
FC7000
heap
page read and write
768000
heap
page read and write
1374000
direct allocation
page read and write
80A000
heap
page read and write
4C40000
direct allocation
page execute and read and write
6DC017E000
stack
page read and write
336E000
heap
page read and write
525B000
trusted library allocation
page read and write
3C7E000
stack
page read and write
5241000
trusted library allocation
page read and write
1BB96875000
heap
page read and write
5E75000
trusted library allocation
page read and write
43BF000
stack
page read and write
5E30000
trusted library allocation
page read and write
30B0000
heap
page read and write
334D000
heap
page read and write
816000
heap
page read and write
B6D000
heap
page read and write
5E65000
trusted library allocation
page read and write
35F4000
heap
page read and write
32D1000
heap
page read and write
C0E000
heap
page read and write
A52000
unkown
page execute and read and write
5E65000
trusted library allocation
page read and write
49E0000
direct allocation
page execute and read and write
4351000
heap
page read and write
174F000
heap
page read and write
525B000
trusted library allocation
page read and write
911000
unkown
page execute read
2E5A2765000
heap
page read and write
2841B5E0000
heap
page read and write
61D5000
trusted library allocation
page read and write
5E65000
trusted library allocation
page read and write
D7B000
direct allocation
page read and write
127D000
direct allocation
page read and write
59D017F000
stack
page read and write
4F01000
heap
page read and write
523B000
trusted library allocation
page read and write
E14000
heap
page read and write
5639000
trusted library allocation
page read and write
F50000
heap
page read and write
EE1000
unkown
page execute and write copy
5E39000
trusted library allocation
page read and write
113A000
heap
page read and write
5E70000
trusted library allocation
page read and write
174F000
heap
page read and write
5E54000
trusted library allocation
page read and write
1643AEEB000
heap
page read and write
1D475548000
heap
page read and write
1D4757C5000
heap
page read and write
65D9000
trusted library allocation
page read and write
2DAE000
stack
page read and write
33D1000
heap
page read and write
6111000
trusted library allocation
page read and write
1763000
heap
page read and write
11D0000
unkown
page execute and read and write
334E000
stack
page read and write
2032F592000
heap
page read and write
3471000
heap
page read and write
1B441CB0000
heap
page read and write
26D6000
direct allocation
page read and write
2726000
direct allocation
page read and write
610000
direct allocation
page read and write
16D3B0FC000
heap
page read and write
130D000
direct allocation
page read and write
7540000
heap
page read and write
10B7000
heap
page read and write
5FFB000
trusted library allocation
page read and write
6221000
trusted library allocation
page read and write
6113000
trusted library allocation
page read and write
4351000
heap
page read and write
6361000
trusted library allocation
page read and write
5940000
remote allocation
page read and write
501F000
stack
page read and write
19A2BA2D000
heap
page read and write
3547000
heap
page read and write
524A000
trusted library allocation
page read and write
1093000
heap
page read and write
258F000
direct allocation
page read and write
4351000
heap
page read and write
5717000
trusted library allocation
page read and write
93A000
heap
page read and write
4351000
heap
page read and write
C0B000
heap
page read and write
5E55000
trusted library allocation
page read and write
4351000
heap
page read and write
11BB000
heap
page read and write
33D1000
heap
page read and write
62C3000
trusted library allocation
page read and write
627000
heap
page read and write
9CA000
stack
page read and write
C0B000
heap
page read and write
5E2C000
trusted library allocation
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
19FA31FD000
heap
page read and write
546E000
stack
page read and write
3C84000
direct allocation
page read and write
81D000
heap
page read and write
5640000
trusted library allocation
page read and write
5F53000
trusted library allocation
page read and write
26DD000
direct allocation
page read and write
62CA000
trusted library allocation
page read and write
4351000
heap
page read and write
57BC000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
1774000
heap
page read and write
5238000
trusted library allocation
page read and write
1C918578000
heap
page read and write
5639000
trusted library allocation
page read and write
4351000
heap
page read and write
47CC000
stack
page read and write
370E000
stack
page read and write
4750000
direct allocation
page read and write
3080000
direct allocation
page read and write
19BAFECE000
heap
page read and write
53F7000
trusted library allocation
page read and write
E15000
heap
page read and write
5820000
trusted library allocation
page read and write
19FA321C000
heap
page read and write
964000
unkown
page write copy
3371000
heap
page read and write
1B441D48000
heap
page read and write
There are 3761 hidden memdumps, click here to show them.