IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[1].exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1008348001\843a4bb3a5.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\Tasks\skotes.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1008348001\843a4bb3a5.exe
"C:\Users\user\AppData\Local\Temp\1008348001\843a4bb3a5.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2420 --field-trial-handle=2348,i,10504154459402330811,16956138012118111025,262144 /prefetch:8
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.icoc_state
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://crbug.com/368855.)
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
https://www.google.com/speech-api/v2/synthesize?
unknown
http://unisolated.invalid/
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://185.215.113.43/Zu7JuNko/index.phpcoded
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=by
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
http://anglebug.com/5906supportsExtendedDynamicState2
unknown
https://drive-daily-2.corp.google.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://185.215.113.43/Zu7JuNko/index.php;UN
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://185.215.113.43/Zu7JuNko/index.php2.
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
34.116.198.130
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://unisolated.invalid/a
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://185.215.113.43/Zu7JuNko/index.phpD
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://185.215.113.43/Zu7JuNko/index.phpR
unknown
http://185.215.113.43/Zu7JuNko/index.php5
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
http://185.215.113.43/Zu7JuNko/index.php0
unknown
https://anglebug.com/7604
unknown
https://google-ohttp-relay-join.fastly-edge.com/hj
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fvtekk5pn.top
34.116.198.130
www.google.com
142.250.181.68
fvtekk5pn.top
34.116.198.130

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
239.255.255.250
unknown
Reserved
34.116.198.130
home.fvtekk5pn.top
United States
142.250.181.68
www.google.com
United States
127.0.0.1
unknown
unknown
31.41.244.11
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
53E0000
direct allocation
page read and write
malicious
BF1000
unkown
page execute and read and write
malicious
D1000
unkown
page execute and read and write
malicious
BF1000
unkown
page execute and read and write
malicious
48C0000
direct allocation
page read and write
malicious
4B70000
direct allocation
page read and write
malicious
BF1000
unkown
page execute and read and write
malicious
4B50000
direct allocation
page read and write
malicious
4A40000
direct allocation
page execute and read and write
236C00220000
direct allocation
page read and write
4D00000
direct allocation
page execute and read and write
42A95FE000
unkown
page readonly
1A04FFE2000
heap
page read and write
69E40035C000
trusted library allocation
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
6AE0000
direct allocation
page read and write
8A4000
heap
page read and write
1A050552000
heap
page read and write
79F402B54000
trusted library allocation
page read and write
79F402424000
trusted library allocation
page read and write
1A04FFDE000
heap
page read and write
42A45FE000
unkown
page readonly
B00000
direct allocation
page read and write
366F000
stack
page read and write
69E4006F0000
trusted library allocation
page read and write
124C000
unkown
page execute and write copy
46D1000
heap
page read and write
46E1000
heap
page read and write
69E400230000
trusted library allocation
page read and write
79F402D3C000
trusted library allocation
page read and write
1A04FFF0000
heap
page read and write
79F4030DC000
trusted library allocation
page read and write
79F4024FC000
trusted library allocation
page read and write
6C3400288000
trusted library allocation
page read and write
8A4000
heap
page read and write
1A04FFF2000
heap
page read and write
705A000
heap
page read and write
458F000
stack
page read and write
32BF000
stack
page read and write
46E1000
heap
page read and write
69E40039C000
trusted library allocation
page read and write
46E1000
heap
page read and write
4A00000
direct allocation
page execute and read and write
236C0024C000
direct allocation
page read and write
46D0000
direct allocation
page read and write
1A04FFE4000
heap
page read and write
1A056B87000
unclassified section
page read and write
69E400654000
trusted library allocation
page read and write
46D1000
heap
page read and write
69E4002E4000
trusted library allocation
page read and write
594000
heap
page read and write
72B4000
heap
page read and write
1A04FFE4000
heap
page read and write
42A65FE000
unkown
page readonly
42B65FE000
unkown
page readonly
79F4023C4000
trusted library allocation
page read and write
5E0000
direct allocation
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
69E400668000
trusted library allocation
page read and write
1A05617E000
trusted library section
page read and write
79F402EA5000
trusted library allocation
page read and write
8A4000
heap
page read and write
11B0000
heap
page read and write
49FF000
stack
page read and write
79F402514000
trusted library allocation
page read and write
46E1000
heap
page read and write
46E1000
heap
page read and write
46D1000
heap
page read and write
2DBF000
stack
page read and write
79F402B20000
trusted library allocation
page read and write
1190000
heap
page read and write
69E4006D0000
trusted library allocation
page read and write
46E1000
heap
page read and write
6661000
heap
page read and write
1A04FFDE000
heap
page read and write
E1F000
heap
page read and write
5560000
direct allocation
page execute and read and write
1A04FFE4000
heap
page read and write
69E4006CC000
trusted library allocation
page read and write
6D40000
direct allocation
page execute and read and write
69E400718000
trusted library allocation
page read and write
46F0000
heap
page read and write
79F4023D8000
trusted library allocation
page read and write
33FF000
stack
page read and write
46E1000
heap
page read and write
46D0000
direct allocation
page read and write
1A04FFEA000
heap
page read and write
3B6F000
stack
page read and write
79F4023F0000
trusted library allocation
page read and write
6661000
heap
page read and write
7E42000
heap
page read and write
42A4DFA000
stack
page read and write
1A04FFE4000
heap
page read and write
1A04FFEA000
heap
page read and write
590000
heap
page read and write
236C00280000
direct allocation
page read and write
46E1000
heap
page read and write
7227000
heap
page read and write
46E1000
heap
page read and write
69E4006B4000
trusted library allocation
page read and write
7419000
heap
page read and write
236C002AC000
direct allocation
page read and write
4F40000
direct allocation
page read and write
163E000
heap
page read and write
B37000
heap
page read and write
1A04FFE2000
heap
page read and write
41BF000
stack
page read and write
69E400614000
trusted library allocation
page read and write
1A04FFF2000
heap
page read and write
1A050011000
heap
page read and write
46D1000
heap
page read and write
79F403093000
trusted library allocation
page read and write
42B95FE000
unkown
page readonly
236C00234000
direct allocation
page read and write
6AA0000
trusted library allocation
page read and write
4F3F000
stack
page read and write
1A04FFF2000
heap
page read and write
79F40309C000
trusted library allocation
page read and write
2CBE000
stack
page read and write
79F402D20000
trusted library allocation
page read and write
1A04FFE2000
heap
page read and write
14F0000
direct allocation
page execute and read and write
4C90000
direct allocation
page execute and read and write
2820000
direct allocation
page execute and read and write
443E000
stack
page read and write
46E1000
heap
page read and write
316F000
stack
page read and write
46E1000
heap
page read and write
71E4000
heap
page read and write
8A4000
heap
page read and write
69E400784000
trusted library allocation
page read and write
1A04FFF2000
heap
page read and write
5E0000
direct allocation
page read and write
7118000
heap
page read and write
79F402A94000
trusted library allocation
page read and write
1A04FFF0000
heap
page read and write
4E7E000
stack
page read and write
407E000
stack
page read and write
71AD000
heap
page read and write
79F4030E8000
trusted library allocation
page read and write
6AB0000
heap
page read and write
71EB000
direct allocation
page read and write
1A04FFE2000
heap
page read and write
5050000
trusted library allocation
page read and write
79F40240C000
trusted library allocation
page read and write
42FE000
stack
page read and write
6661000
heap
page read and write
79F402401000
trusted library allocation
page read and write
48FF000
stack
page read and write
2DEE000
stack
page read and write
46D1000
heap
page read and write
1A04FFE3000
heap
page read and write
1A04FFEA000
heap
page read and write
1A04FFEA000
heap
page read and write
69E400730000
trusted library allocation
page read and write
1A04FFDE000
heap
page read and write
69E400330000
trusted library allocation
page read and write
4CE0000
direct allocation
page execute and read and write
236C00250000
direct allocation
page read and write
79F402410000
trusted library allocation
page read and write
BC0000
direct allocation
page execute and read and write
42AFDFE000
stack
page read and write
6661000
heap
page read and write
46E1000
heap
page read and write
1A04FFE4000
heap
page read and write
8A4000
heap
page read and write
69E400354000
trusted library allocation
page read and write
8A4000
heap
page read and write
1A04FFE4000
heap
page read and write
429CDFE000
stack
page read and write
46E1000
heap
page read and write
2EFF000
stack
page read and write
4A00000
direct allocation
page execute and read and write
79F4029D1000
trusted library allocation
page read and write
C59000
unkown
page write copy
79F40221C000
trusted library allocation
page read and write
1A04FFF0000
heap
page read and write
69E400330000
trusted library allocation
page read and write
46D1000
heap
page read and write
57F000
unkown
page execute and write copy
4D30000
direct allocation
page execute and read and write
46E1000
heap
page read and write
42A05FE000
unkown
page readonly
6C3400264000
trusted library allocation
page read and write
46D1000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
46E1000
heap
page read and write
304F000
stack
page read and write
42B2DFB000
stack
page read and write
46E1000
heap
page read and write
1A050547000
heap
page read and write
1A04FFF2000
heap
page read and write
4B7F000
stack
page read and write
8A4000
heap
page read and write
6C3400294000
trusted library allocation
page read and write
42B4DFD000
stack
page read and write
46D1000
heap
page read and write
4E54000
heap
page read and write
E5B000
heap
page read and write
1A04FFEA000
heap
page read and write
3A6E000
stack
page read and write
6C34002A0000
trusted library allocation
page read and write
1A04FFF0000
heap
page read and write
442F000
stack
page read and write
79F402EC8000
trusted library allocation
page read and write
8A4000
heap
page read and write
1A05050D000
heap
page read and write
1A050011000
heap
page read and write
69E400390000
trusted library allocation
page read and write
79F402EDC000
trusted library allocation
page read and write
353E000
stack
page read and write
79F402498000
trusted library allocation
page read and write
30F7000
heap
page read and write
79F402E30000
trusted library allocation
page read and write
DF4000
heap
page read and write
4A10000
direct allocation
page execute and read and write
79F402F78000
trusted library allocation
page read and write
79F402DDC000
trusted library allocation
page read and write
79F403090000
trusted library allocation
page read and write
46E1000
heap
page read and write
11C0000
heap
page read and write
46E1000
heap
page read and write
79F402968000
trusted library allocation
page read and write
4A20000
direct allocation
page execute and read and write
79F40281C000
trusted library allocation
page read and write
C25000
heap
page read and write
46E1000
heap
page read and write
1A04FFF2000
heap
page read and write
1A04FFEA000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
1A050538000
heap
page read and write
6D40000
direct allocation
page execute and read and write
B00000
direct allocation
page read and write
8A0000
heap
page read and write
1A0558D7000
unclassified section
page read and write
46E1000
heap
page read and write
F01000
unkown
page execute and read and write
69E400430000
trusted library allocation
page read and write
1A050557000
heap
page read and write
46D1000
heap
page read and write
551F000
stack
page read and write
7221000
heap
page read and write
69E400320000
trusted library allocation
page read and write
6C3400201000
trusted library allocation
page read and write
46D1000
heap
page read and write
8A4000
heap
page read and write
E56000
heap
page read and write
1A050011000
heap
page read and write
42A3DFE000
stack
page read and write
48FE000
stack
page read and write
79F4030F8000
trusted library allocation
page read and write
7A0000
direct allocation
page read and write
1A056890000
trusted library section
page read and write
37AF000
stack
page read and write
69E4002F4000
trusted library allocation
page read and write
79F402A9C000
trusted library allocation
page read and write
69E40035C000
trusted library allocation
page read and write
1A04FFDB000
heap
page read and write
79F402FA4000
trusted library allocation
page read and write
42C7DFE000
stack
page read and write
E65000
heap
page read and write
79F40234C000
trusted library allocation
page read and write
8A4000
heap
page read and write
55A0000
direct allocation
page execute and read and write
E20000
heap
page read and write
46D1000
heap
page read and write
1A05648A000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
42BF5FE000
unkown
page readonly
1A050011000
heap
page read and write
6D40000
direct allocation
page execute and read and write
46D1000
heap
page read and write
594000
heap
page read and write
79F402720000
trusted library allocation
page read and write
79F40306C000
trusted library allocation
page read and write
BF0000
unkown
page readonly
2A2C000
stack
page read and write
69E400788000
trusted library allocation
page read and write
4441000
heap
page read and write
1A05056E000
heap
page read and write
79F4028FC000
trusted library allocation
page read and write
79F402584000
trusted library allocation
page read and write
6480000
heap
page read and write
34FF000
stack
page read and write
8A4000
heap
page read and write
3B8F000
stack
page read and write
1A04FFF2000
heap
page read and write
79F4028D0000
trusted library allocation
page read and write
1A056D3D000
trusted library section
page read and write
3E1000
unkown
page execute and write copy
4D60000
direct allocation
page execute and read and write
46E1000
heap
page read and write
726A000
heap
page read and write
79F402DD4000
trusted library allocation
page read and write
3E2000
unkown
page execute and write copy
DEF000
heap
page read and write
E65000
heap
page read and write
B00000
direct allocation
page read and write
46D1000
heap
page read and write
1A050011000
heap
page read and write
1A050011000
heap
page read and write
330E000
stack
page read and write
236C00294000
direct allocation
page read and write
429D5FE000
unkown
page readonly
55F0000
direct allocation
page execute and read and write
344E000
stack
page read and write
46E1000
heap
page read and write
79F4031EC000
trusted library allocation
page read and write
738E000
heap
page read and write
1A04FFE3000
heap
page read and write
C20000
heap
page read and write
79F4022A8000
trusted library allocation
page read and write
3B3F000
stack
page read and write
4BAE000
stack
page read and write
DDD000
unkown
page execute and read and write
E29000
heap
page read and write
7058000
heap
page read and write
69E4006E0000
trusted library allocation
page read and write
69E400754000
trusted library allocation
page read and write
8A4000
heap
page read and write
1A04FFEA000
heap
page read and write
79F402508000
trusted library allocation
page read and write
46D1000
heap
page read and write
42C85FE000
unkown
page readonly
184000
heap
page read and write
79F4028E0000
trusted library allocation
page read and write
4D90000
direct allocation
page execute and read and write
79F402FE0000
trusted library allocation
page read and write
3CC000
stack
page read and write
79F4023B4000
trusted library allocation
page read and write
760000
heap
page read and write
7A0000
direct allocation
page read and write
79F4026FC000
trusted library allocation
page read and write
79F402E90000
trusted library allocation
page read and write
46E1000
heap
page read and write
1A04FFE4000
heap
page read and write
79F4026D4000
trusted library allocation
page read and write
6C3400270000
trusted library allocation
page read and write
1A04FFEB000
heap
page read and write
8A4000
heap
page read and write
46E1000
heap
page read and write
9CA000
stack
page read and write
6C34002D8000
trusted library allocation
page read and write
1A04FFF2000
heap
page read and write
6C34002C0000
trusted library allocation
page read and write
38FF000
stack
page read and write
2A4F000
stack
page read and write
46D1000
heap
page read and write
69E400408000
trusted library allocation
page read and write
79F402C3C000
trusted library allocation
page read and write
7053000
heap
page read and write
1A052770000
trusted library allocation
page read and write
160E000
stack
page read and write
8A4000
heap
page read and write
1A04FFDE000
heap
page read and write
69E4006EC000
trusted library allocation
page read and write
594000
heap
page read and write
79F402587000
trusted library allocation
page read and write
46E1000
heap
page read and write
B00000
direct allocation
page read and write
79F402C1C000
trusted library allocation
page read and write
1A04FFE4000
heap
page read and write
79F402201000
trusted library allocation
page read and write
1A056DBE000
trusted library section
page read and write
B30000
heap
page read and write
79F403088000
trusted library allocation
page read and write
46D1000
heap
page read and write
28A7000
heap
page read and write
46E1000
heap
page read and write
6661000
heap
page read and write
79F402548000
trusted library allocation
page read and write
79F402654000
trusted library allocation
page read and write
647F000
stack
page read and write
429EDFE000
stack
page read and write
184000
heap
page read and write
1A056D70000
trusted library section
page read and write
1A04FFF2000
heap
page read and write
46D1000
heap
page read and write
41EE000
stack
page read and write
705E000
heap
page read and write
41AF000
stack
page read and write
1A04FFE2000
heap
page read and write
46D0000
direct allocation
page read and write
79F403088000
trusted library allocation
page read and write
1A04FFEA000
heap
page read and write
46F1000
heap
page read and write
46E1000
heap
page read and write
E43000
heap
page read and write
79F402C01000
trusted library allocation
page read and write
69E4006C4000
trusted library allocation
page read and write
7235000
heap
page read and write
46E1000
heap
page read and write
79F4030A8000
trusted library allocation
page read and write
79F402B68000
trusted library allocation
page read and write
1A04FFF2000
heap
page read and write
1A04FFE2000
heap
page read and write
79F4024A8000
trusted library allocation
page read and write
46E1000
heap
page read and write
163A000
heap
page read and write
1A0561D3000
trusted library section
page read and write
46D1000
heap
page read and write
42C9DFE000
stack
page read and write
E65000
heap
page read and write
E56000
heap
page read and write
1A04FFE4000
heap
page read and write
B3B000
heap
page read and write
2B7E000
stack
page read and write
E43000
heap
page read and write
2F3E000
stack
page read and write
E7F000
heap
page read and write
79F402494000
trusted library allocation
page read and write
1A04FFE2000
heap
page read and write
46D1000
heap
page read and write
4921000
direct allocation
page read and write
EEB000
unkown
page execute and read and write
236C002D0000
direct allocation
page read and write
6661000
heap
page read and write
BF0000
unkown
page readonly
6C34002B0000
trusted library allocation
page read and write
730000
heap
page read and write
715A000
heap
page read and write
715D000
heap
page read and write
DDD000
unkown
page execute and read and write
340F000
stack
page read and write
69E400698000
trusted library allocation
page read and write
7056000
heap
page read and write
7148000
heap
page read and write
69E40075C000
trusted library allocation
page read and write
79F4026E0000
trusted library allocation
page read and write
1A050000000
heap
page read and write
37FE000
stack
page read and write
705D000
heap
page read and write
70EC000
heap
page read and write
42AD5FE000
unkown
page readonly
1A04FFE2000
heap
page read and write
13B000
unkown
page execute and read and write
1A04FFDE000
heap
page read and write
79F40240C000
trusted library allocation
page read and write
7059000
heap
page read and write
5E0000
direct allocation
page read and write
79F402DA8000
trusted library allocation
page read and write
1A04FFF0000
heap
page read and write
79F40237C000
trusted library allocation
page read and write
69E4002DC000
trusted library allocation
page read and write
1A04FFE4000
heap
page read and write
46E1000
heap
page read and write
1A04FFDE000
heap
page read and write
73C9000
heap
page read and write
79F402EF8000
trusted library allocation
page read and write
5E0000
direct allocation
page read and write
79F402ED8000
trusted library allocation
page read and write
79F402B88000
trusted library allocation
page read and write
79F402E0C000
trusted library allocation
page read and write
1A04FFDE000
heap
page read and write
4F51000
heap
page read and write
280E000
stack
page read and write
79F40296A000
trusted library allocation
page read and write
4BBE000
stack
page read and write
79F402550000
trusted library allocation
page read and write
F01000
unkown
page execute and write copy
79F402490000
trusted library allocation
page read and write
46E1000
heap
page read and write
42FF000
stack
page read and write
79F402418000
trusted library allocation
page read and write
3CB000
unkown
page execute and read and write
720C000
heap
page read and write
31FF000
stack
page read and write
42B75FE000
unkown
page readonly
42B35FE000
unkown
page readonly
69E4007C8000
trusted library allocation
page read and write
69E400688000
trusted library allocation
page read and write
1A050516000
heap
page read and write
1A056DB0000
trusted library section
page read and write
79F400A01000
trusted library allocation
page read and write
79F402E90000
trusted library allocation
page read and write
7055000
heap
page read and write
BBF000
stack
page read and write
79F40260C000
trusted library allocation
page read and write
69E400238000
trusted library allocation
page read and write
393E000
stack
page read and write
E56000
heap
page read and write
1A04FFF2000
heap
page read and write
46E1000
heap
page read and write
40BE000
stack
page read and write
79F402A48000
trusted library allocation
page read and write
5590000
direct allocation
page execute and read and write
79F402F3C000
trusted library allocation
page read and write
5990000
heap
page read and write
D8E000
stack
page read and write
6C340020C000
trusted library allocation
page read and write
E1E000
heap
page read and write
46D1000
heap
page read and write
358E000
stack
page read and write
79F4022D0000
trusted library allocation
page read and write
79F402EB0000
trusted library allocation
page read and write
1A04FFDE000
heap
page read and write
3A3E000
stack
page read and write
1A056C73000
trusted library section
page read and write
69E400368000
trusted library allocation
page read and write
42C65FE000
unkown
page readonly
79F4031A0000
trusted library allocation
page read and write
8A4000
heap
page read and write
79F402F3C000
trusted library allocation
page read and write
42A0DFD000
stack
page read and write
1A04FFE2000
heap
page read and write
1A04FFDD000
heap
page read and write
184000
heap
page read and write
46D1000
heap
page read and write
69E400348000
trusted library allocation
page read and write
46D1000
heap
page read and write
8A4000
heap
page read and write
E5D000
heap
page read and write
274F000
stack
page read and write
1A056C0E000
trusted library section
page read and write
B3D000
heap
page read and write
79F402494000
trusted library allocation
page read and write
69E400700000
trusted library allocation
page read and write
705A000
heap
page read and write
1A04FFF2000
heap
page read and write
302F000
stack
page read and write
1A04FFF0000
heap
page read and write
4BB1000
direct allocation
page read and write
46E1000
heap
page read and write
69E400310000
trusted library allocation
page read and write
69E40020C000
trusted library allocation
page read and write
79F402965000
trusted library allocation
page read and write
42A55FE000
unkown
page readonly
46D1000
heap
page read and write
41FE000
stack
page read and write
6661000
heap
page read and write
EEB000
unkown
page execute and read and write
1A04FFF0000
heap
page read and write
B20000
direct allocation
page read and write
14E0000
direct allocation
page read and write
4E3B000
stack
page read and write
4BD1000
direct allocation
page read and write
69E400248000
trusted library allocation
page read and write
236C00303000
direct allocation
page read and write
69E4003EC000
trusted library allocation
page read and write
46E1000
heap
page read and write
DDD000
unkown
page execute and read and write
6D40000
direct allocation
page execute and read and write
4F51000
heap
page read and write
7055000
heap
page read and write
46BE000
stack
page read and write
42C35FE000
stack
page read and write
2B4F000
stack
page read and write
236C00290000
direct allocation
page read and write
6661000
heap
page read and write
406F000
stack
page read and write
46E1000
heap
page read and write
53E000
stack
page read and write
594000
heap
page read and write
79F40225F000
trusted library allocation
page read and write
6661000
heap
page read and write
6661000
heap
page read and write
6D40000
direct allocation
page execute and read and write
42BDDFB000
stack
page read and write
53E0000
direct allocation
page read and write
3A3F000
stack
page read and write
4FBE000
stack
page read and write
3C7F000
stack
page read and write
354F000
stack
page read and write
6661000
heap
page read and write
841000
heap
page read and write
3F3E000
stack
page read and write
46D1000
heap
page read and write
1A04FFE4000
heap
page read and write
42AB5FE000
unkown
page readonly
5570000
direct allocation
page execute and read and write
300E000
stack
page read and write
5F0000
heap
page read and write
69E400760000
trusted library allocation
page read and write
1A04FFF0000
heap
page read and write
1A04FFFB000
heap
page read and write
41BE000
stack
page read and write
46E1000
heap
page read and write
79F40228C000
trusted library allocation
page read and write
4C90000
direct allocation
page execute and read and write
594000
heap
page read and write
1A04FFDD000
heap
page read and write
40AE000
stack
page read and write
79F40247C000
trusted library allocation
page read and write
38EF000
stack
page read and write
46E1000
heap
page read and write
4F40000
direct allocation
page read and write
79F4027CC000
trusted library allocation
page read and write
42C3DFE000
unkown
page readonly
42BB5FE000
unkown
page readonly
8A4000
heap
page read and write
1A056C40000
trusted library section
page read and write
6661000
heap
page read and write
79F402FB4000
trusted library allocation
page read and write
79F4024B4000
trusted library allocation
page read and write
79F402D5C000
trusted library allocation
page read and write
743C000
heap
page read and write
1A04FFE2000
heap
page read and write
1A04FFDE000
heap
page read and write
79F40220C000
trusted library allocation
page read and write
79F40300C000
trusted library allocation
page read and write
4F51000
heap
page read and write
6C34002C0000
trusted library allocation
page read and write
DF5000
heap
page read and write
79F4024B4000
trusted library allocation
page read and write
6D40000
direct allocation
page execute and read and write
8CB000
stack
page read and write
46D1000
heap
page read and write
1A04FFF0000
heap
page read and write
46E1000
heap
page read and write
4D20000
direct allocation
page execute and read and write
79F40296C000
trusted library allocation
page read and write
3CEE000
stack
page read and write
46E1000
heap
page read and write
1A04CB67000
heap
page read and write
42BADFD000
stack
page read and write
79F4024FC000
trusted library allocation
page read and write
2C7F000
stack
page read and write
1A04FFEA000
heap
page read and write
54FD000
stack
page read and write
46E1000
heap
page read and write
1A04FFE4000
heap
page read and write
79F40241C000
trusted library allocation
page read and write
6C3400230000
trusted library allocation
page read and write
1A056160000
trusted library section
page read and write
42C0DFD000
stack
page read and write
1A050000000
heap
page read and write
36BE000
stack
page read and write
7051000
heap
page read and write
184000
heap
page read and write
79F403104000
trusted library allocation
page read and write
D1000
unkown
page execute and write copy
60F5000
heap
page read and write
46CF000
stack
page read and write
7F7B000
stack
page read and write
46E1000
heap
page read and write
46E1000
heap
page read and write
46E1000
heap
page read and write
1A04FFEA000
heap
page read and write
1A04FFE2000
heap
page read and write
46D1000
heap
page read and write
79F40236C000
trusted library allocation
page read and write
236C002E4000
direct allocation
page read and write
1A04FFEA000
heap
page read and write
429ADEF000
stack
page read and write
6C34002A0000
trusted library allocation
page read and write
4F40000
direct allocation
page read and write
7D6000
heap
page read and write
1A04FFF2000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
3DEF000
stack
page read and write
79F40320C000
trusted library allocation
page read and write
79F403168000
trusted library allocation
page read and write
1A04FFE4000
heap
page read and write
E71000
heap
page read and write
4CFE000
stack
page read and write
1A04FFE2000
heap
page read and write
4F51000
heap
page read and write
493E000
stack
page read and write
1A04FFEA000
heap
page read and write
42B25FE000
unkown
page readonly
69E400620000
trusted library allocation
page read and write
42B05FE000
unkown
page readonly
46D1000
heap
page read and write
79F402434000
trusted library allocation
page read and write
6C34002C0000
trusted library allocation
page read and write
46D0000
direct allocation
page read and write
4A00000
direct allocation
page execute and read and write
1A04FFF0000
heap
page read and write
B00000
direct allocation
page read and write
6C34002F0000
trusted library allocation
page read and write
1A04FFF9000
heap
page read and write
1A04FFE4000
heap
page read and write
1A04FFDE000
heap
page read and write
3DFE000
stack
page read and write
4A70000
direct allocation
page execute and read and write
1A04CA60000
trusted library allocation
page read and write
1A04FFF0000
heap
page read and write
236C00201000
direct allocation
page read and write
1A04FFDE000
heap
page read and write
79F402F60000
trusted library allocation
page read and write
BC0000
heap
page read and write
594000
heap
page read and write
31AE000
stack
page read and write
56BD000
stack
page read and write
819000
heap
page read and write
79F4031EC000
trusted library allocation
page read and write
7219000
heap
page read and write
79F4022A0000
trusted library allocation
page read and write
7181000
heap
page read and write
69E400601000
trusted library allocation
page read and write
6661000
heap
page read and write
C52000
unkown
page execute and read and write
4F51000
heap
page read and write
1A04FFDE000
heap
page read and write
46E1000
heap
page read and write
79F4025B0000
trusted library allocation
page read and write
7237000
heap
page read and write
2F0F000
stack
page read and write
4B8C000
stack
page read and write
79F4023AC000
trusted library allocation
page read and write
3B7E000
stack
page read and write
443F000
stack
page read and write
79F4023AC000
trusted library allocation
page read and write
79F40235C000
trusted library allocation
page read and write
4D30000
direct allocation
page execute and read and write
46E1000
heap
page read and write
5E0000
direct allocation
page read and write
6D40000
direct allocation
page execute and read and write
420E000
stack
page read and write
79F402F88000
trusted library allocation
page read and write
46E1000
heap
page read and write
184000
heap
page read and write
79F4029D3000
trusted library allocation
page read and write
184000
heap
page read and write
4F40000
direct allocation
page read and write
6661000
heap
page read and write
81BE000
stack
page read and write
79F403160000
trusted library allocation
page read and write
79F402E38000
trusted library allocation
page read and write
1A04FFDB000
heap
page read and write
1A05052A000
heap
page read and write
42ADDFE000
stack
page read and write
79F40312C000
trusted library allocation
page read and write
1630000
heap
page read and write
79F402E54000
trusted library allocation
page read and write
1A04FFE8000
heap
page read and write
7056000
heap
page read and write
6661000
heap
page read and write
4FD000
stack
page read and write
F02000
unkown
page execute and write copy
3BCE000
stack
page read and write
42A25FE000
unkown
page readonly
1A055E77000
unclassified section
page read and write
EEB000
unkown
page execute and read and write
46E1000
heap
page read and write
8A4000
heap
page read and write
6AAE000
heap
page read and write
467E000
stack
page read and write
E71000
heap
page read and write
69E4006D4000
trusted library allocation
page read and write
1A04FFE2000
heap
page read and write
DD6000
heap
page read and write
8A4000
heap
page read and write
37BF000
stack
page read and write
E01000
heap
page read and write
79F402A6C000
trusted library allocation
page read and write
B00000
direct allocation
page read and write
E65000
heap
page read and write
429DDFE000
stack
page read and write
79F402801000
trusted library allocation
page read and write
236C00284000
direct allocation
page read and write
4DFF000
stack
page read and write
71B2000
heap
page read and write
6C34002C0000
trusted library allocation
page read and write
1A056D16000
trusted library section
page read and write
4F7F000
stack
page read and write
594000
heap
page read and write
71C3000
heap
page read and write
4F40000
direct allocation
page read and write
37CF000
stack
page read and write
46E1000
heap
page read and write
46D1000
heap
page read and write
444F000
stack
page read and write
79F403050000
trusted library allocation
page read and write
69E400210000
trusted library allocation
page read and write
7A0000
direct allocation
page read and write
79F402494000
trusted library allocation
page read and write
79F402864000
trusted library allocation
page read and write
79F402710000
trusted library allocation
page read and write
2DFE000
stack
page read and write
46D1000
heap
page read and write
705F000
heap
page read and write
79F402A0C000
trusted library allocation
page read and write
79F4023B4000
trusted library allocation
page read and write
5E0000
direct allocation
page read and write
E81000
heap
page read and write
4D10000
direct allocation
page execute and read and write
1A054194000
trusted library allocation
page read and write
236C0020C000
direct allocation
page read and write
727C000
heap
page read and write
1A04FFEA000
heap
page read and write
6C3400248000
trusted library allocation
page read and write
1A04FFEA000
heap
page read and write
79F402DBC000
trusted library allocation
page read and write
79F402254000
trusted library allocation
page read and write
72D5000
heap
page read and write
79F40258F000
trusted library allocation
page read and write
1A04FFEA000
heap
page read and write
448E000
stack
page read and write
46D1000
heap
page read and write
61FF000
stack
page read and write
6661000
heap
page read and write
79F402BA4000
trusted library allocation
page read and write
4A3F000
stack
page read and write
1A04FFDE000
heap
page read and write
1A04FFE2000
heap
page read and write
B00000
direct allocation
page read and write
46D1000
heap
page read and write
8430000
heap
page read and write
429BDFE000
unkown
page read and write
79F40256C000
trusted library allocation
page read and write
79F402FD4000
trusted library allocation
page read and write
1A050530000
heap
page read and write
1A04FFF0000
heap
page read and write
46E1000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
1A056053000
heap
page read and write
1A04FFE2000
heap
page read and write
42B85FE000
unkown
page readonly
69E40060C000
trusted library allocation
page read and write
4CF0000
direct allocation
page execute and read and write
6661000
heap
page read and write
353F000
stack
page read and write
594000
heap
page read and write
69E400744000
trusted library allocation
page read and write
79F4024E0000
trusted library allocation
page read and write
8A4000
heap
page read and write
3CAF000
stack
page read and write
47BF000
stack
page read and write
1A050011000
heap
page read and write
42C25FE000
stack
page read and write
46D0000
direct allocation
page read and write
1A04FFF2000
heap
page read and write
46D1000
heap
page read and write
79F402654000
trusted library allocation
page read and write
1A04FFF0000
heap
page read and write
42B0DFB000
stack
page read and write
4F40000
direct allocation
page read and write
79F402334000
trusted library allocation
page read and write
278E000
stack
page read and write
1A04FFE4000
heap
page read and write
3F7E000
stack
page read and write
46E1000
heap
page read and write
79F40249E000
trusted library allocation
page read and write
1A04FFF2000
heap
page read and write
1620000
heap
page read and write
6C3400260000
trusted library allocation
page read and write
236C00230000
direct allocation
page read and write
79F402A20000
trusted library allocation
page read and write
69E4006B8000
trusted library allocation
page read and write
69E400678000
trusted library allocation
page read and write
6661000
heap
page read and write
E01000
heap
page read and write
430F000
stack
page read and write
30F0000
heap
page read and write
7196000
heap
page read and write
69E400714000
trusted library allocation
page read and write
3A4F000
stack
page read and write
5DE000
stack
page read and write
1A04CD55000
heap
page read and write
7B0000
unkown
page readonly
4CD0000
direct allocation
page execute and read and write
1A04FFF2000
heap
page read and write
731D000
heap
page read and write
446E000
stack
page read and write
1A056460000
heap
page read and write
1A0541B2000
trusted library allocation
page read and write
8A4000
heap
page read and write
8A4000
heap
page read and write
79F402D68000
trusted library allocation
page read and write
8A4000
heap
page read and write
73EF000
heap
page read and write
79F4028C0000
trusted library allocation
page read and write
1A04CAE8000
heap
page read and write
79F4023C8000
trusted library allocation
page read and write
717B000
heap
page read and write
32AF000
stack
page read and write
69E400330000
trusted library allocation
page read and write
69E400201000
trusted library allocation
page read and write
1A04FFF0000
heap
page read and write
1A04FFE4000
heap
page read and write
594000
heap
page read and write
46D0000
direct allocation
page read and write
46E1000
heap
page read and write
1A04FFF2000
heap
page read and write
10DE000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
46E1000
heap
page read and write
46D1000
heap
page read and write
7EE000
heap
page read and write
46D1000
heap
page read and write
236C00215000
direct allocation
page read and write
7A0000
direct allocation
page read and write
46D1000
heap
page read and write
705B000
heap
page read and write
69E400644000
trusted library allocation
page read and write
13C000
stack
page read and write
1A04FFEB000
heap
page read and write
1A04FFEA000
heap
page read and write
79F40253C000
trusted library allocation
page read and write
1A04FFF2000
heap
page read and write
1A04CB9B000
heap
page read and write
717D000
heap
page read and write
1A04FFE4000
heap
page read and write
BE0000
direct allocation
page execute and read and write
7242000
heap
page read and write
79F4028CA000
trusted library allocation
page read and write
1A04FFE4000
heap
page read and write
40CE000
stack
page read and write
79F4024F0000
trusted library allocation
page read and write
2890000
heap
page read and write
38FE000
stack
page read and write
8A4000
heap
page read and write
46D1000
heap
page read and write
2E0E000
stack
page read and write
2B2F000
stack
page read and write
4F40000
direct allocation
page read and write
7329000
heap
page read and write
69E400724000
trusted library allocation
page read and write
1A050011000
heap
page read and write
69E400248000
trusted library allocation
page read and write
BF0000
unkown
page read and write
55C0000
direct allocation
page execute and read and write
79F4030B4000
trusted library allocation
page read and write
42C15FE000
unkown
page readonly
184000
heap
page read and write
1A04FFF2000
heap
page read and write
432E000
stack
page read and write
69E4002FC000
trusted library allocation
page read and write
46E1000
heap
page read and write
6C3400278000
trusted library allocation
page read and write
4F40000
direct allocation
page read and write
71E5000
heap
page read and write
36AE000
stack
page read and write
42BC5FE000
unkown
page readonly
6C3400220000
trusted library allocation
page read and write
3F6E000
stack
page read and write
79F4031F4000
trusted library allocation
page read and write
6C3400238000
trusted library allocation
page read and write
5E0000
direct allocation
page read and write
1A04FFE4000
heap
page read and write
1A04FFE4000
heap
page read and write
E5F000
heap
page read and write
6C34002A0000
trusted library allocation
page read and write
720A000
heap
page read and write
457E000
stack
page read and write
7058000
heap
page read and write
6661000
heap
page read and write
1A04FFEA000
heap
page read and write
308E000
stack
page read and write
4D40000
direct allocation
page execute and read and write
368F000
stack
page read and write
79F402C44000
trusted library allocation
page read and write
3A2F000
stack
page read and write
69E400294000
trusted library allocation
page read and write
79F402428000
trusted library allocation
page read and write
6D40000
direct allocation
page execute and read and write
3CCF000
stack
page read and write
1A04FFE2000
heap
page read and write
363F000
stack
page read and write
79F402DEC000
trusted library allocation
page read and write
72A6000
heap
page read and write
6C34002BC000
trusted library allocation
page read and write
46E1000
heap
page read and write
1A04FFDE000
heap
page read and write
79F402494000
trusted library allocation
page read and write
46E1000
heap
page read and write
1A04FFDE000
heap
page read and write
EF4000
unkown
page execute and read and write
1A050587000
heap
page read and write
FDE000
stack
page read and write
79F40255C000
trusted library allocation
page read and write
46D1000
heap
page read and write
79F4028F0000
trusted library allocation
page read and write
5560000
direct allocation
page execute and read and write
8A4000
heap
page read and write
79F4026D8000
trusted library allocation
page read and write
79F402910000
trusted library allocation
page read and write
4D80000
direct allocation
page execute and read and write
6661000
heap
page read and write
72FB000
heap
page read and write
6661000
heap
page read and write
1A04FFF2000
heap
page read and write
46D1000
heap
page read and write
1A04FFF0000
heap
page read and write
50FE000
stack
page read and write
42C45FE000
stack
page read and write
79F402498000
trusted library allocation
page read and write
1A04FFEA000
heap
page read and write
705F000
heap
page read and write
79F402594000
trusted library allocation
page read and write
7D9000
heap
page read and write
580000
heap
page read and write
BF1000
unkown
page execute and write copy
6AA1000
heap
page read and write
BD0000
direct allocation
page read and write
69E4007CC000
trusted library allocation
page read and write
79F402980000
trusted library allocation
page read and write
79F402744000
trusted library allocation
page read and write
69E40080C000
trusted library allocation
page read and write
1A04FFF2000
heap
page read and write
1A056D32000
trusted library section
page read and write
E62000
heap
page read and write
69E40078C000
trusted library allocation
page read and write
408F000
stack
page read and write
1A04FFEA000
heap
page read and write
8A4000
heap
page read and write
32FF000
stack
page read and write
69E400380000
trusted library allocation
page read and write
46E1000
heap
page read and write
79F402BDC000
trusted library allocation
page read and write
79F402F28000
trusted library allocation
page read and write
79F4031A0000
trusted library allocation
page read and write
69E400298000
trusted library allocation
page read and write
79F402324000
trusted library allocation
page read and write
79F40251C000
trusted library allocation
page read and write
6D40000
direct allocation
page execute and read and write
79F4029E8000
trusted library allocation
page read and write
4CC0000
direct allocation
page execute and read and write
46D1000
heap
page read and write
79F402970000
trusted library allocation
page read and write
6661000
heap
page read and write
4C8F000
stack
page read and write
79F402854000
trusted library allocation
page read and write
1A04FFF2000
heap
page read and write
4D50000
direct allocation
page execute and read and write
79F4031AC000
trusted library allocation
page read and write
42B7DFC000
stack
page read and write
E5F000
heap
page read and write
1A04FFE4000
heap
page read and write
1A04FFDE000
heap
page read and write
79F402950000
trusted library allocation
page read and write
705B000
heap
page read and write
1A04FFF2000
heap
page read and write
1A05623D000
trusted library section
page read and write
42BCDFC000
stack
page read and write
1A056BF0000
trusted library section
page read and write
1A04CB95000
heap
page read and write
46E1000
heap
page read and write
30D0000
heap
page read and write
DAA000
heap
page read and write
2F4E000
stack
page read and write
453F000
stack
page read and write
8A4000
heap
page read and write
69E400664000
trusted library allocation
page read and write
1A04FFEA000
heap
page read and write
594000
heap
page read and write
1A04FFF2000
heap
page read and write
1A050557000
heap
page read and write
1A04FFE2000
heap
page read and write
1A04FFE4000
heap
page read and write
B00000
direct allocation
page read and write
1A04FFE4000
heap
page read and write
1A04FFEA000
heap
page read and write
29EF000
stack
page read and write
1D0000
heap
page read and write
79F4022EC000
trusted library allocation
page read and write
D0000
unkown
page read and write
71AC000
heap
page read and write
1A04FFEA000
heap
page read and write
1A04FFF5000
heap
page read and write
1A04FFDE000
heap
page read and write
46D1000
heap
page read and write
5540000
direct allocation
page execute and read and write
6D40000
direct allocation
page execute and read and write
46E1000
heap
page read and write
4441000
heap
page read and write
46D1000
heap
page read and write
42BBDFE000
stack
page read and write
1A056474000
heap
page read and write
4F40000
direct allocation
page read and write
42BEDFC000
stack
page read and write
1A04CB6B000
heap
page read and write
184000
heap
page read and write
79F402EFC000
trusted library allocation
page read and write
79F4024C0000
trusted library allocation
page read and write
1A04FFEA000
heap
page read and write
1A04FFF0000
heap
page read and write
7367000
heap
page read and write
1A050011000
heap
page read and write
45AE000
stack
page read and write
69E40033C000
trusted library allocation
page read and write
594000
heap
page read and write
42B9DFB000
stack
page read and write
EF4000
unkown
page execute and read and write
79F402530000
trusted library allocation
page read and write
1A050526000
heap
page read and write
712E000
heap
page read and write
1A04FFF0000
heap
page read and write
79F403001000
trusted library allocation
page read and write
79F4023DC000
trusted library allocation
page read and write
42BE5FE000
unkown
page readonly
E69000
heap
page read and write
46E5000
heap
page read and write
8A4000
heap
page read and write
79F402FC8000
trusted library allocation
page read and write
429E5FE000
unkown
page readonly
79F400801000
trusted library allocation
page read and write
DA0000
heap
page read and write
4540000
trusted library allocation
page read and write
6C34002C0000
trusted library allocation
page read and write
79F402CC4000
trusted library allocation
page read and write
46E1000
heap
page read and write
47E0000
trusted library allocation
page read and write
79F4023F4000
trusted library allocation
page read and write
7BF000
heap
page read and write
1A04FFEA000
heap
page read and write
69E40033C000
trusted library allocation
page read and write
42A5DFB000
stack
page read and write
42A75FE000
unkown
page readonly
8BF000
stack
page read and write
1A04FFE4000
heap
page read and write
5560000
direct allocation
page execute and read and write
79F40256C000
trusted library allocation
page read and write
1A04FFF2000
heap
page read and write
6C34002F4000
trusted library allocation
page read and write
60C000
heap
page read and write
6661000
heap
page read and write
1A04FFF0000
heap
page read and write
71EA000
heap
page read and write
1A04FFF9000
heap
page read and write
7059000
heap
page read and write
4C90000
direct allocation
page execute and read and write
60BE000
stack
page read and write
B00000
direct allocation
page read and write
37BE000
stack
page read and write
46D0000
direct allocation
page read and write
456F000
stack
page read and write
7142000
heap
page read and write
1A04FFDE000
heap
page read and write
79F403140000
trusted library allocation
page read and write
69E400750000
trusted library allocation
page read and write
79F40280C000
trusted library allocation
page read and write
1A04FFE4000
heap
page read and write
79F402EEC000
trusted library allocation
page read and write
6661000
heap
page read and write
79F402E48000
trusted library allocation
page read and write
6D40000
direct allocation
page execute and read and write
79F402FBC000
trusted library allocation
page read and write
79F40275C000
trusted library allocation
page read and write
79F403038000
trusted library allocation
page read and write
3E0F000
stack
page read and write
1A04FFB0000
heap
page read and write
1A04FFEA000
heap
page read and write
380E000
stack
page read and write
79F4030DA000
trusted library allocation
page read and write
6661000
heap
page read and write
69E400260000
trusted library allocation
page read and write
54BD000
stack
page read and write
79F4031BC000
trusted library allocation
page read and write
71FF000
heap
page read and write
28A0000
heap
page read and write
8A4000
heap
page read and write
1A04FFE2000
heap
page read and write
F9E000
stack
page read and write
6D40000
direct allocation
page execute and read and write
1A04FFEA000
heap
page read and write
6D40000
direct allocation
page execute and read and write
46E1000
heap
page read and write
69E400734000
trusted library allocation
page read and write
80BE000
stack
page read and write
7E40000
heap
page read and write
45CE000
stack
page read and write
69E400418000
trusted library allocation
page read and write
69E400220000
trusted library allocation
page read and write
1A04FFE4000
heap
page read and write
7188000
heap
page read and write
70FF000
heap
page read and write
79F40242C000
trusted library allocation
page read and write
184000
heap
page read and write
42C5DFA000
stack
page read and write
BF0000
unkown
page readonly
46E1000
heap
page read and write
79F4023E8000
trusted library allocation
page read and write
47D0000
trusted library allocation
page read and write
79F400C01000
trusted library allocation
page read and write
84B000
heap
page read and write
79F4028F0000
trusted library allocation
page read and write
390F000
stack
page read and write
4C90000
direct allocation
page execute and read and write
1A04FFE4000
heap
page read and write
7A0000
direct allocation
page read and write
79F402494000
trusted library allocation
page read and write
79F402CF0000
trusted library allocation
page read and write
1A056172000
trusted library section
page read and write
6AA0000
heap
page read and write
236C00274000
direct allocation
page read and write
1A04FFE3000
heap
page read and write
1A0504FE000
heap
page read and write
236C00260000
direct allocation
page read and write
3CBE000
stack
page read and write
79F402D00000
trusted library allocation
page read and write
79F402834000
trusted library allocation
page read and write
236C002DC000
direct allocation
page read and write
46E1000
heap
page read and write
6C34002B0000
trusted library allocation
page read and write
3BBE000
stack
page read and write
1A050547000
heap
page read and write
42C1DFE000
stack
page read and write
3E1000
unkown
page execute and read and write
7051000
heap
page read and write
705C000
heap
page read and write
E56000
heap
page read and write
70F4000
heap
page read and write
1A04FFEA000
heap
page read and write
8A4000
heap
page read and write
46E1000
heap
page read and write
1A04FFE2000
heap
page read and write
79F403178000
trusted library allocation
page read and write
6661000
heap
page read and write
46E1000
heap
page read and write
3D4000
unkown
page execute and read and write
EBB000
unkown
page execute and read and write
BBB000
stack
page read and write
79F4023D4000
trusted library allocation
page read and write
6661000
heap
page read and write
79F4023B4000
trusted library allocation
page read and write
2CCE000
stack
page read and write
14FD000
stack
page read and write
79F402268000
trusted library allocation
page read and write
79F403084000
trusted library allocation
page read and write
7B1000
unkown
page execute and write copy
4440000
heap
page read and write
73F5000
heap
page read and write
7051000
heap
page read and write
4A00000
direct allocation
page execute and read and write
2F2E000
stack
page read and write
C52000
unkown
page execute and read and write
1A04FFF2000
heap
page read and write
3E2E000
stack
page read and write
42B45FE000
unkown
page readonly
429FDFE000
stack
page read and write
79F402508000
trusted library allocation
page read and write
6661000
heap
page read and write
79F4028F0000
trusted library allocation
page read and write
79F402AE0000
trusted library allocation
page read and write
79F400201000
trusted library allocation
page read and write
79F402BC4000
trusted library allocation
page read and write
1A056BE1000
trusted library section
page read and write
1A04FFF0000
heap
page read and write
69E400320000
trusted library allocation
page read and write
79F402934000
trusted library allocation
page read and write
594000
heap
page read and write
53BE000
stack
page read and write
407F000
stack
page read and write
1A04FFE4000
heap
page read and write
46D0000
direct allocation
page read and write
1A04CA70000
trusted library allocation
page read and write
8A4000
heap
page read and write
7106000
heap
page read and write
42ACDFE000
stack
page read and write
46D0000
direct allocation
page read and write
F02000
unkown
page execute and write copy
F01000
unkown
page execute and read and write
46E1000
heap
page read and write
1A04FFF0000
heap
page read and write
BD0000
direct allocation
page execute and read and write
6D40000
direct allocation
page execute and read and write
1A04FFE2000
heap
page read and write
317F000
stack
page read and write
1A04CD23000
heap
page read and write
1A050538000
heap
page read and write
1A050540000
heap
page read and write
6C3400274000
trusted library allocation
page read and write
79F402F80000
trusted library allocation
page read and write
53E0000
direct allocation
page read and write
1A04CA40000
heap
page read and write
42B15FE000
unkown
page readonly
79F400E01000
trusted library allocation
page read and write
4B4C000
stack
page read and write
69E400320000
trusted library allocation
page read and write
1A04FFF0000
heap
page read and write
79F402A01000
trusted library allocation
page read and write
46E1000
heap
page read and write
6D40000
direct allocation
page execute and read and write
4F40000
direct allocation
page read and write
F02000
unkown
page execute and write copy
E65000
heap
page read and write
41CF000
stack
page read and write
42BFDFE000
stack
page read and write
790000
heap
page read and write
714E000
heap
page read and write
42BD5FE000
unkown
page readonly
1A050450000
trusted library section
page read and write
541E000
stack
page read and write
6C34002BC000
trusted library allocation
page read and write
1A04CB83000
heap
page read and write
79F4023E0000
trusted library allocation
page read and write
5E0000
direct allocation
page read and write
5FB000
heap
page read and write
69E400624000
trusted library allocation
page read and write
1A04FFF2000
heap
page read and write
79F4025A4000
trusted library allocation
page read and write
79F402C94000
trusted library allocation
page read and write
3F8E000
stack
page read and write
BF1000
unkown
page execute and write copy
5580000
direct allocation
page execute and read and write
46D1000
heap
page read and write
1A04CCF0000
heap
page read and write
1A04FFC0000
heap
page read and write
79F403114000
trusted library allocation
page read and write
42CA5FE000
unkown
page readonly
6661000
heap
page read and write
79F403108000
trusted library allocation
page read and write
8A4000
heap
page read and write
236C002A8000
direct allocation
page read and write
79F402BD0000
trusted library allocation
page read and write
807C000
stack
page read and write
69E4007B4000
trusted library allocation
page read and write
79F40321C000
trusted library allocation
page read and write
303F000
stack
page read and write
6661000
heap
page read and write
429F5FE000
unkown
page readonly
236C002EC000
direct allocation
page read and write
79F402F6C000
trusted library allocation
page read and write
1A04FFF2000
heap
page read and write
7058000
heap
page read and write
C5B000
unkown
page execute and read and write
79F40249E000
trusted library allocation
page read and write
308E000
stack
page read and write
79F402B34000
trusted library allocation
page read and write
1A04FFEA000
heap
page read and write
7055000
heap
page read and write
60F6000
heap
page read and write
79F4022FC000
trusted library allocation
page read and write
3EFF000
stack
page read and write
1A050011000
heap
page read and write
1A04FFEA000
heap
page read and write
79F4022E0000
trusted library allocation
page read and write
1A056C50000
trusted library section
page read and write
46D1000
heap
page read and write
46E1000
heap
page read and write
79F402528000
trusted library allocation
page read and write
46B0000
heap
page read and write
79F4023EC000
trusted library allocation
page read and write
7A0000
direct allocation
page read and write
69E400694000
trusted library allocation
page read and write
7A0000
direct allocation
page read and write
1A04FFE7000
heap
page read and write
46D1000
heap
page read and write
79F402CA0000
trusted library allocation
page read and write
46D1000
heap
page read and write
EF4000
unkown
page execute and read and write
1A04FFEA000
heap
page read and write
5E0000
direct allocation
page read and write
637E000
stack
page read and write
46D1000
heap
page read and write
1A04FFF2000
heap
page read and write
705C000
heap
page read and write
46D0000
heap
page read and write
307E000
stack
page read and write
79F402940000
trusted library allocation
page read and write
79F4023E4000
trusted library allocation
page read and write
B00000
direct allocation
page read and write
6D40000
direct allocation
page execute and read and write
3D0D000
stack
page read and write
1A04FFEA000
heap
page read and write
79F402730000
trusted library allocation
page read and write
31CE000
stack
page read and write
69E400320000
trusted library allocation
page read and write
1A050000000
heap
page read and write
842C000
stack
page read and write
293F000
stack
page read and write
79F400001000
trusted library allocation
page read and write
46D1000
heap
page read and write
69E400610000
trusted library allocation
page read and write
1A055E47000
unclassified section
page read and write
69E400684000
trusted library allocation
page read and write
46E1000
heap
page read and write
55D0000
direct allocation
page execute and read and write
4CF0000
direct allocation
page execute and read and write
7050000
heap
page read and write
2CAE000
stack
page read and write
1A04FFD9000
heap
page read and write
DF2000
heap
page read and write
46E1000
heap
page read and write
79F4031C8000
trusted library allocation
page read and write
69E400354000
trusted library allocation
page read and write
429C5FE000
unkown
page readonly
5E0000
direct allocation
page read and write
4D00000
direct allocation
page execute and read and write
4CAF000
stack
page read and write
42AE5FE000
unkown
page readonly
46D0000
direct allocation
page read and write
1A04FFF0000
heap
page read and write
69E4006B0000
trusted library allocation
page read and write
79F402D04000
trusted library allocation
page read and write
132000
unkown
page execute and read and write
79F402D6C000
trusted library allocation
page read and write
4C90000
direct allocation
page execute and read and write
BF0000
unkown
page read and write
79F402F0C000
trusted library allocation
page read and write
6C34002A0000
trusted library allocation
page read and write
7054000
heap
page read and write
1A05052A000
heap
page read and write
5530000
direct allocation
page execute and read and write
BE0000
direct allocation
page execute and read and write
46E1000
heap
page read and write
79F403078000
trusted library allocation
page read and write
4441000
heap
page read and write
4A00000
direct allocation
page execute and read and write
3CBF000
stack
page read and write
42EF000
stack
page read and write
79F402EA5000
trusted library allocation
page read and write
79F402F0C000
trusted library allocation
page read and write
1A04FFEA000
heap
page read and write
1A056690000
trusted library section
page read and write
109F000
unkown
page execute and write copy
79F402528000
trusted library allocation
page read and write
E6D000
heap
page read and write
4E3E000
stack
page read and write
42ABDFA000
stack
page read and write
4D20000
direct allocation
page execute and read and write
46E1000
heap
page read and write
46E1000
heap
page read and write
E56000
heap
page read and write
8A4000
heap
page read and write
46D1000
heap
page read and write
1A04CD20000
heap
page read and write
8A4000
heap
page read and write
8A4000
heap
page read and write
109D000
unkown
page execute and read and write
5560000
direct allocation
page execute and read and write
1A0570EE000
trusted library section
page read and write
6661000
heap
page read and write
377F000
stack
page read and write
46E1000
heap
page read and write
E65000
heap
page read and write
8A4000
heap
page read and write
6661000
heap
page read and write
6C3400250000
trusted library allocation
page read and write
79F402ABC000
trusted library allocation
page read and write
6AB0000
heap
page read and write
E71000
heap
page read and write
306E000
stack
page read and write
6661000
heap
page read and write
46E1000
heap
page read and write
1A04FFE4000
heap
page read and write
1A0504D0000
heap
page read and write
69E40040C000
trusted library allocation
page read and write
7058000
heap
page read and write
47FE000
stack
page read and write
1A04FFEB000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
B20000
direct allocation
page read and write
69E4002ED000
trusted library allocation
page read and write
E1C000
heap
page read and write
46E1000
heap
page read and write
69E400250000
trusted library allocation
page read and write
1A04FFF0000
heap
page read and write
33FF000
stack
page read and write
C59000
unkown
page write copy
1A04FFDE000
heap
page read and write
1A04FFF2000
heap
page read and write
1A04FFF2000
heap
page read and write
6661000
heap
page read and write
6D30000
direct allocation
page execute and read and write
1A04CA00000
heap
page readonly
46D1000
heap
page read and write
7058000
heap
page read and write
1A04C920000
heap
page read and write
46D0000
direct allocation
page read and write
46D1000
heap
page read and write
1A04FFE2000
heap
page read and write
55E0000
direct allocation
page execute and read and write
46D1000
heap
page read and write
BD0000
direct allocation
page read and write
79F4023B4000
trusted library allocation
page read and write
1A04FFE4000
heap
page read and write
3F4F000
stack
page read and write
46E1000
heap
page read and write
79B000
heap
page read and write
79F4028B4000
trusted library allocation
page read and write
46D1000
heap
page read and write
79F402F2C000
trusted library allocation
page read and write
5E0000
direct allocation
page read and write
C5B000
unkown
page execute and read and write
1A04FFF0000
heap
page read and write
32CF000
stack
page read and write
79F402580000
trusted library allocation
page read and write
2C6F000
stack
page read and write
C40000
heap
page read and write
1A04FFE2000
heap
page read and write
2DCF000
stack
page read and write
1A04FFF2000
heap
page read and write
F01000
unkown
page execute and write copy
42C8DFE000
stack
page read and write
E69000
heap
page read and write
46D1000
heap
page read and write
DFF000
heap
page read and write
109D000
unkown
page execute and read and write
46D1000
heap
page read and write
79F4027BC000
trusted library allocation
page read and write
79F402528000
trusted library allocation
page read and write
42C4DFE000
unkown
page readonly
46D1000
heap
page read and write
79F402E5C000
trusted library allocation
page read and write
6661000
heap
page read and write
7052000
heap
page read and write
4F40000
direct allocation
page read and write
417F000
stack
page read and write
1A04FFF2000
heap
page read and write
4F50000
heap
page read and write
1A04FFE2000
heap
page read and write
42A15FE000
unkown
page readonly
6FD000
stack
page read and write
79F400601000
trusted library allocation
page read and write
1A04FFE4000
heap
page read and write
5E0000
direct allocation
page read and write
5600000
direct allocation
page execute and read and write
526E000
stack
page read and write
6C3400235000
trusted library allocation
page read and write
79F402654000
trusted library allocation
page read and write
7118000
heap
page read and write
5550000
direct allocation
page execute and read and write
8A4000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
594000
heap
page read and write
79F402F3C000
trusted library allocation
page read and write
1A050519000
heap
page read and write
623E000
stack
page read and write
46E0000
heap
page read and write
79F4024BA000
trusted library allocation
page read and write
39B000
unkown
page execute and read and write
1A04FFF2000
heap
page read and write
B00000
direct allocation
page read and write
2837000
heap
page read and write
1A04FFE2000
heap
page read and write
69E4007D0000
trusted library allocation
page read and write
8431000
heap
page read and write
E43000
heap
page read and write
46E1000
heap
page read and write
BF0000
unkown
page read and write
60F0000
heap
page read and write
46D0000
direct allocation
page read and write
79F4031AC000
trusted library allocation
page read and write
C59000
unkown
page write copy
1A04FFE4000
heap
page read and write
F01000
unkown
page execute and write copy
4F40000
direct allocation
page read and write
184000
heap
page read and write
1A04FFE4000
heap
page read and write
718A000
heap
page read and write
2C8F000
stack
page read and write
42B3DFD000
stack
page read and write
1A04FFE2000
heap
page read and write
1A04FFE4000
heap
page read and write
79F4027DC000
trusted library allocation
page read and write
46E1000
heap
page read and write
6C34002BC000
trusted library allocation
page read and write
1A050540000
heap
page read and write
79F402AEC000
trusted library allocation
page read and write
C59000
unkown
page write copy
5E0000
direct allocation
page read and write
31BE000
stack
page read and write
2810000
direct allocation
page execute and read and write
1A04FFF0000
heap
page read and write
46E1000
heap
page read and write
79F4030C0000
trusted library allocation
page read and write
1A04CA10000
heap
page read and write
79F40238C000
trusted library allocation
page read and write
C59000
unkown
page write copy
6661000
heap
page read and write
3F3F000
stack
page read and write
1A04FFE4000
heap
page read and write
79F4024F0000
trusted library allocation
page read and write
6C34002E4000
trusted library allocation
page read and write
79F402B08000
trusted library allocation
page read and write
46E1000
heap
page read and write
14E0000
direct allocation
page read and write
139000
unkown
page write copy
6661000
heap
page read and write
79F401001000
trusted library allocation
page read and write
79F402924000
trusted library allocation
page read and write
1A04F280000
unkown
page read and write
28EE000
stack
page read and write
79F402DA8000
trusted library allocation
page read and write
4A00000
direct allocation
page execute and read and write
8A4000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
1A04FFEA000
heap
page read and write
6C34002BC000
trusted library allocation
page read and write
7209000
heap
page read and write
79F4027F0000
trusted library allocation
page read and write
79F4024F0000
trusted library allocation
page read and write
1A04FFF2000
heap
page read and write
69E400401000
trusted library allocation
page read and write
42B8DFD000
stack
page read and write
4B70000
direct allocation
page read and write
1A04FFF5000
heap
page read and write
6C34002B0000
trusted library allocation
page read and write
7A0000
direct allocation
page read and write
594000
heap
page read and write
1A04FFF8000
heap
page read and write
42C75FE000
unkown
page readonly
7052000
heap
page read and write
46D1000
heap
page read and write
46E1000
heap
page read and write
1A04CAE0000
heap
page read and write
1A04FFF0000
heap
page read and write
46D1000
heap
page read and write
6C34002BC000
trusted library allocation
page read and write
1A04FFF2000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
79F402E88000
trusted library allocation
page read and write
79F40302C000
trusted library allocation
page read and write
8A4000
heap
page read and write
6661000
heap
page read and write
536F000
stack
page read and write
46E1000
heap
page read and write
79F402398000
trusted library allocation
page read and write
79F403040000
trusted library allocation
page read and write
4A60000
direct allocation
page execute and read and write
1A04FFEA000
heap
page read and write
C5B000
unkown
page execute and read and write
46E1000
heap
page read and write
1A04FFEA000
heap
page read and write
367F000
stack
page read and write
46E1000
heap
page read and write
46D0000
direct allocation
page read and write
4CBF000
stack
page read and write
184000
heap
page read and write
3E4E000
stack
page read and write
1A050574000
heap
page read and write
42AADFD000
stack
page read and write
6661000
heap
page read and write
8A4000
heap
page read and write
BF1000
unkown
page execute and write copy
1A04FFDE000
heap
page read and write
1A04FFE2000
heap
page read and write
2A3F000
stack
page read and write
7052000
heap
page read and write
73AB000
heap
page read and write
79F402498000
trusted library allocation
page read and write
6D40000
direct allocation
page execute and read and write
79F4024A4000
trusted library allocation
page read and write
4CF0000
direct allocation
page execute and read and write
1A0000
heap
page read and write
1A04FFF0000
heap
page read and write
46D1000
heap
page read and write
71DE000
heap
page read and write
4F51000
heap
page read and write
46E1000
heap
page read and write
69E4006C8000
trusted library allocation
page read and write
69E4006E8000
trusted library allocation
page read and write
1A04FFE2000
heap
page read and write
79F402530000
trusted library allocation
page read and write
79F4029DC000
trusted library allocation
page read and write
6661000
heap
page read and write
109D000
unkown
page execute and read and write
46D1000
heap
page read and write
109F000
unkown
page execute and write copy
1A04FFDE000
heap
page read and write
46D1000
heap
page read and write
109F000
unkown
page execute and write copy
6D20000
direct allocation
page execute and read and write
42B5DFB000
stack
page read and write
69E400758000
trusted library allocation
page read and write
79F4030CC000
trusted library allocation
page read and write
42C55FE000
unkown
page readonly
E25000
heap
page read and write
1A056216000
trusted library section
page read and write
79F402C64000
trusted library allocation
page read and write
7053000
heap
page read and write
7056000
heap
page read and write
3F2F000
stack
page read and write
4A50000
direct allocation
page execute and read and write
79F4029BC000
trusted library allocation
page read and write
46D1000
heap
page read and write
79F4023A0000
trusted library allocation
page read and write
1A04FFDE000
heap
page read and write
36CE000
stack
page read and write
1A04FFF6000
heap
page read and write
79F402658000
trusted library allocation
page read and write
46D0000
direct allocation
page read and write
46D1000
heap
page read and write
69E400280000
trusted library allocation
page read and write
8A4000
heap
page read and write
70F7000
heap
page read and write
69E400424000
trusted library allocation
page read and write
69E4006FC000
trusted library allocation
page read and write
46E1000
heap
page read and write
1A04FFE2000
heap
page read and write
79F402E01000
trusted library allocation
page read and write
6D40000
direct allocation
page execute and read and write
433E000
stack
page read and write
79F402938000
trusted library allocation
page read and write
1A04FFDE000
heap
page read and write
1A04FFE2000
heap
page read and write
6661000
heap
page read and write
1195000
heap
page read and write
1A055F10000
heap
page read and write
6661000
heap
page read and write
39FF000
stack
page read and write
3BAE000
stack
page read and write
43FF000
stack
page read and write
1A056BD0000
trusted library section
page read and write
7053000
heap
page read and write
79F4024B4000
trusted library allocation
page read and write
46E1000
heap
page read and write
79F40255C000
trusted library allocation
page read and write
79F402601000
trusted library allocation
page read and write
3A8E000
stack
page read and write
79F402F54000
trusted library allocation
page read and write
46E1000
heap
page read and write
1A04FFEA000
heap
page read and write
69E400704000
trusted library allocation
page read and write
79F40271B000
trusted library allocation
page read and write
236C00270000
direct allocation
page read and write
46E1000
heap
page read and write
1A04FFF8000
heap
page read and write
1A04FFF2000
heap
page read and write
1A04FFE2000
heap
page read and write
1A05647D000
heap
page read and write
1A04FFF2000
heap
page read and write
8A4000
heap
page read and write
46E1000
heap
page read and write
69E400630000
trusted library allocation
page read and write
42AF5FE000
unkown
page readonly
1A04FFE4000
heap
page read and write
2B6E000
stack
page read and write
E71000
heap
page read and write
46E1000
heap
page read and write
57E000
stack
page read and write
1A04FFE4000
heap
page read and write
DAE000
heap
page read and write
79F402F44000
trusted library allocation
page read and write
69E4002C0000
trusted library allocation
page read and write
4A90000
direct allocation
page execute and read and write
42BF000
stack
page read and write
633F000
stack
page read and write
79F402280000
trusted library allocation
page read and write
79F4023AC000
trusted library allocation
page read and write
7092000
direct allocation
page read and write
1A04FFF2000
heap
page read and write
1A056232000
trusted library section
page read and write
7A0000
direct allocation
page read and write
79F402750000
trusted library allocation
page read and write
46E1000
heap
page read and write
79F402420000
trusted library allocation
page read and write
1A04CAA0000
trusted library section
page readonly
79F40253C000
trusted library allocation
page read and write
46E1000
heap
page read and write
318F000
stack
page read and write
B00000
direct allocation
page read and write
79F40251C000
trusted library allocation
page read and write
69E400770000
trusted library allocation
page read and write
6C34002C8000
trusted library allocation
page read and write
79F402DB4000
trusted library allocation
page read and write
3CFE000
stack
page read and write
46D1000
heap
page read and write
367E000
stack
page read and write
46E1000
heap
page read and write
1A0505D0000
trusted library section
page read and write
46E1000
heap
page read and write
3DFF000
stack
page read and write
46E1000
heap
page read and write
42A6DFC000
stack
page read and write
6C34002F8000
trusted library allocation
page read and write
1A04FFEA000
heap
page read and write
79F402430000
trusted library allocation
page read and write
69E4002C8000
trusted library allocation
page read and write
46E1000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
4F40000
direct allocation
page read and write
8A4000
heap
page read and write
B00000
direct allocation
page read and write
42AC5FE000
unkown
page readonly
46D1000
heap
page read and write
1A050550000
heap
page read and write
4D10000
direct allocation
page execute and read and write
46E1000
heap
page read and write
2EEF000
stack
page read and write
69E400310000
trusted library allocation
page read and write
D20000
heap
page read and write
E7F000
heap
page read and write
304E000
stack
page read and write
42A35FE000
unkown
page readonly
7055000
heap
page read and write
50BE000
stack
page read and write
4B70000
direct allocation
page read and write
69E400404000
trusted library allocation
page read and write
1A04FFD8000
heap
page read and write
46D1000
heap
page read and write
3DBF000
stack
page read and write
42BA5FE000
unkown
page readonly
6661000
heap
page read and write
69E400658000
trusted library allocation
page read and write
71B8000
heap
page read and write
E7F000
heap
page read and write
46E1000
heap
page read and write
1A04FFFD000
heap
page read and write
46E1000
heap
page read and write
1A04FFEA000
heap
page read and write
2B3F000
stack
page read and write
6661000
heap
page read and write
69E400640000
trusted library allocation
page read and write
79F402274000
trusted library allocation
page read and write
1A04CD50000
heap
page read and write
D0000
unkown
page readonly
705A000
heap
page read and write
4A30000
direct allocation
page execute and read and write
46AF000
stack
page read and write
42C6DFC000
stack
page read and write
C59000
unkown
page write copy
79F403150000
trusted library allocation
page read and write
890000
heap
page read and write
46E1000
heap
page read and write
79F4024A8000
trusted library allocation
page read and write
B00000
direct allocation
page read and write
46E1000
heap
page read and write
79F402E8C000
trusted library allocation
page read and write
357E000
stack
page read and write
716C000
heap
page read and write
E1F000
heap
page read and write
7053000
heap
page read and write
69E40069C000
trusted library allocation
page read and write
1A04FFEA000
heap
page read and write
79F402884000
trusted library allocation
page read and write
352F000
stack
page read and write
1A04FFF4000
heap
page read and write
46E1000
heap
page read and write
46E1000
heap
page read and write
42B6DFD000
stack
page read and write
2830000
heap
page read and write
1A04FFDE000
heap
page read and write
1A04FFEA000
heap
page read and write
69E400801000
trusted library allocation
page read and write
30CE000
stack
page read and write
184000
heap
page read and write
32FE000
stack
page read and write
7A0000
direct allocation
page read and write
8A4000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
46E1000
heap
page read and write
79F402414000
trusted library allocation
page read and write
6661000
heap
page read and write
79F402D48000
trusted library allocation
page read and write
79F400401000
trusted library allocation
page read and write
1A04FFEA000
heap
page read and write
5441000
direct allocation
page read and write
6C34002BC000
trusted library allocation
page read and write
42A8DFE000
stack
page read and write
57D000
unkown
page execute and read and write
71DB000
heap
page read and write
392E000
stack
page read and write
DE6000
heap
page read and write
69E4006AC000
trusted library allocation
page read and write
46E1000
heap
page read and write
809000
heap
page read and write
6D40000
direct allocation
page execute and read and write
46E1000
heap
page read and write
394E000
stack
page read and write
42A2DFB000
stack
page read and write
EBB000
unkown
page execute and read and write
79F4028C5000
trusted library allocation
page read and write
434E000
stack
page read and write
7A0000
direct allocation
page read and write
6661000
heap
page read and write
79F402CE0000
trusted library allocation
page read and write
3A7E000
stack
page read and write
79F403060000
trusted library allocation
page read and write
1A04FFDE000
heap
page read and write
113C000
stack
page read and write
2B8E000
stack
page read and write
5560000
direct allocation
page execute and read and write
F01000
unkown
page execute and read and write
E71000
heap
page read and write
1A04FFEF000
heap
page read and write
32EE000
stack
page read and write
236C0023C000
direct allocation
page read and write
42A85FE000
unkown
page readonly
69E400374000
trusted library allocation
page read and write
3B7F000
stack
page read and write
42A7DFE000
stack
page read and write
1A04FFDE000
heap
page read and write
1A04FFF2000
heap
page read and write
1A04FFEA000
heap
page read and write
79F402F70000
trusted library allocation
page read and write
4D70000
direct allocation
page execute and read and write
3E3E000
stack
page read and write
1A04FFEF000
heap
page read and write
38BF000
stack
page read and write
139000
unkown
page write copy
69E400364000
trusted library allocation
page read and write
4A80000
direct allocation
page execute and read and write
46E1000
heap
page read and write
6661000
heap
page read and write
1A056C02000
trusted library section
page read and write
7A0000
direct allocation
page read and write
7336000
heap
page read and write
C52000
unkown
page execute and read and write
1A04FFE4000
heap
page read and write
79F4026C8000
trusted library allocation
page read and write
42AA5FE000
unkown
page readonly
1A05056E000
heap
page read and write
342E000
stack
page read and write
4F40000
direct allocation
page read and write
33EF000
stack
page read and write
46E1000
heap
page read and write
1A0570E0000
trusted library section
page read and write
6661000
heap
page read and write
46D1000
heap
page read and write
4E50000
heap
page read and write
B7E000
stack
page read and write
37EE000
stack
page read and write
7218000
heap
page read and write
7A0000
direct allocation
page read and write
5560000
direct allocation
page execute and read and write
832C000
stack
page read and write
1A055840000
trusted library section
page read and write
42C05FE000
unkown
page readonly
6661000
heap
page read and write
42A9DFE000
stack
page read and write
1A04FFF2000
heap
page read and write
1A056477000
heap
page read and write
71E9000
direct allocation
page read and write
46E1000
heap
page read and write
1A04FFDE000
heap
page read and write
6661000
heap
page read and write
1A04FFF0000
heap
page read and write
1A056050000
heap
page read and write
1A0505AF000
heap
page read and write
236C00217000
direct allocation
page read and write
1A04FFF2000
heap
page read and write
79F402DE4000
trusted library allocation
page read and write
55FC000
stack
page read and write
79F402668000
trusted library allocation
page read and write
182F000
stack
page read and write
403F000
stack
page read and write
79F40256C000
trusted library allocation
page read and write
1A056C61000
trusted library section
page read and write
343E000
stack
page read and write
1A04FFF0000
heap
page read and write
5E0000
direct allocation
page read and write
2DAF000
stack
page read and write
57BE000
stack
page read and write
79F402DF4000
trusted library allocation
page read and write
7A0000
direct allocation
page read and write
79F4023F8000
trusted library allocation
page read and write
69E4006E4000
trusted library allocation
page read and write
79F402F9C000
trusted library allocation
page read and write
79F40295C000
trusted library allocation
page read and write
4C90000
direct allocation
page execute and read and write
6D40000
direct allocation
page execute and read and write
42B55FE000
unkown
page readonly
71B9000
heap
page read and write
79F402B48000
trusted library allocation
page read and write
42AEDFE000
stack
page read and write
42B1DFD000
stack
page read and write
55B0000
direct allocation
page execute and read and write
EBB000
unkown
page execute and read and write
1A04FFE4000
heap
page read and write
42C95FE000
unkown
page readonly
1A050530000
heap
page read and write
1A04FFF0000
heap
page read and write
E46000
heap
page read and write
79F402A30000
trusted library allocation
page read and write
356E000
stack
page read and write
46E1000
heap
page read and write
6661000
heap
page read and write
79F402D10000
trusted library allocation
page read and write
46E1000
heap
page read and write
717F000
heap
page read and write
46E1000
heap
page read and write
6661000
heap
page read and write
1A04FFF0000
heap
page read and write
1A04FFEA000
heap
page read and write
594000
heap
page read and write
E5F000
heap
page read and write
236C00210000
direct allocation
page read and write
27CE000
stack
page read and write
4A7E000
stack
page read and write
71DA000
heap
page read and write
42A1DFB000
stack
page read and write
4441000
heap
page read and write
6C34002BC000
trusted library allocation
page read and write
46D1000
heap
page read and write
1567000
heap
page read and write
46E1000
heap
page read and write
2BD000
unkown
page execute and read and write
1A050526000
heap
page read and write
6661000
heap
page read and write
1A04FFEA000
heap
page read and write
46D1000
heap
page read and write
1A04FFEA000
heap
page read and write
51FF000
stack
page read and write
42C2DFE000
unkown
page readonly
79F40311C000
trusted library allocation
page read and write
There are 1974 hidden memdumps, click here to show them.