IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\random[1].exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1008370001\870da04327.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\Tasks\skotes.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1008370001\870da04327.exe
"C:\Users\user\AppData\Local\Temp\1008370001\870da04327.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 --field-trial-handle=2212,i,12169460362055514967,5517979539831141923,262144 /prefetch:8
malicious

URLs

Name
IP
Malicious
http://anglebug.com/7724J
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actionsh
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://anglebug.com/72466
unknown
https://crbug.com/368855.)
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://185.215.113.43/Zu7JuNko/index.php0001
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://185.215.113.43/Zu7JuNko/index.phpcoded
unknown
http://185.215.113.43/Zu7JuNko/index.phpomf
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://docs.googl0
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://docs.google.com/presentation/
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
http://185.215.113.43/Zu7JuNko/index.phpFIL
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://www.youtube.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://docs.google.com/spreadsheets/
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://drive-daily-4.c
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
34.116.198.130
http://185.215.113.43/Zu7JuNko/index.phpWin~
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
http://anglebug.com/7279?
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://185.215.113.43/Zu7JuNko/index.php32#
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://31.41.244.11/files/random.exe5062
unknown
http://185.215.113.43/Zu7JuNko/index.phpJ
unknown
http://anglebug.com/4836
unknown
http://anglebug.com/7036N
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://185.215.113.43/Zu7JuNko/index.php:
unknown
http://185.215.113.43/Zu7JuNko/index.phpA
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://185.215.113.43/Zu7JuNko/index.phpncodedU
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fvtekk5pn.top
34.116.198.130
www.google.com
142.250.181.100
fvtekk5pn.top
34.116.198.130

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
239.255.255.250
unknown
Reserved
34.116.198.130
home.fvtekk5pn.top
United States
127.0.0.1
unknown
unknown
31.41.244.11
unknown
Russian Federation
142.250.181.100
www.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
61000
unkown
page execute and read and write
malicious
51E0000
direct allocation
page read and write
malicious
61000
unkown
page execute and read and write
malicious
4C00000
direct allocation
page read and write
malicious
4A10000
direct allocation
page read and write
malicious
61000
unkown
page execute and read and write
malicious
4BE0000
direct allocation
page read and write
malicious
9F1000
unkown
page execute and read and write
malicious
321E000
stack
page read and write
21900034C000
trusted library allocation
page read and write
219000E8C000
trusted library allocation
page read and write
2950000
direct allocation
page read and write
219000BDC000
trusted library allocation
page read and write
4D60000
direct allocation
page execute and read and write
1C1C3420000
heap
page read and write
398F000
stack
page read and write
219000380000
trusted library allocation
page read and write
2CF0002DC000
trusted library allocation
page read and write
219000380000
trusted library allocation
page read and write
51E0000
direct allocation
page read and write
2190008A0000
trusted library allocation
page read and write
2FBF000
stack
page read and write
CC000
unkown
page execute and read and write
6EA0000
direct allocation
page execute and read and write
13F1000
heap
page read and write
4591000
heap
page read and write
A6FFFFE000
unkown
page readonly
3ACF000
stack
page read and write
65E5000
heap
page read and write
93C000
stack
page read and write
C94000
heap
page read and write
A6887FE000
stack
page read and write
219001044000
trusted library allocation
page read and write
4D61000
heap
page read and write
C70000
direct allocation
page read and write
E04000
heap
page read and write
2CF000201000
trusted library allocation
page read and write
4591000
heap
page read and write
1C1BD1DE000
heap
page read and write
2CF0007D0000
trusted library allocation
page read and write
4D61000
heap
page read and write
219000FD8000
trusted library allocation
page read and write
219000708000
trusted library allocation
page read and write
CB000
unkown
page execute and read and write
74BA000
heap
page read and write
A6FBFFE000
unkown
page readonly
4D61000
heap
page read and write
2CF0006E8000
trusted library allocation
page read and write
4BE0000
direct allocation
page execute and read and write
4D90000
direct allocation
page execute and read and write
3F8E000
stack
page read and write
4D61000
heap
page read and write
1441000
heap
page read and write
1C1C3BEE000
trusted library section
page read and write
2CF000878000
trusted library allocation
page read and write
61000
unkown
page execute and write copy
219000F2C000
trusted library allocation
page read and write
2190001DC000
trusted library allocation
page read and write
72DE000
heap
page read and write
219000340000
trusted library allocation
page read and write
7179000
heap
page read and write
390F000
stack
page read and write
4591000
heap
page read and write
219000294000
trusted library allocation
page read and write
4D61000
heap
page read and write
A6E8FFE000
unkown
page readonly
219000354000
trusted library allocation
page read and write
21900097D000
trusted library allocation
page read and write
525F000
stack
page read and write
4D61000
heap
page read and write
ED8002C0000
trusted library allocation
page read and write
528000
unkown
page execute and write copy
219000184000
trusted library allocation
page read and write
21900093D000
trusted library allocation
page read and write
21900034C000
trusted library allocation
page read and write
4D61000
heap
page read and write
2190002B4000
trusted library allocation
page read and write
72DE000
heap
page read and write
219000894000
trusted library allocation
page read and write
219000C98000
trusted library allocation
page read and write
A6F47FC000
stack
page read and write
C94000
heap
page read and write
2CF0006D4000
trusted library allocation
page read and write
A6FAFFE000
unkown
page readonly
21900000C000
trusted library allocation
page read and write
C70000
direct allocation
page read and write
219000EC8000
trusted library allocation
page read and write
219000F74000
trusted library allocation
page read and write
5970000
heap
page read and write
219000958000
trusted library allocation
page read and write
141000
unkown
page execute and write copy
2CF000850000
trusted library allocation
page read and write
1C1C3C30000
trusted library section
page read and write
219000B58000
trusted library allocation
page read and write
A6FA7FE000
stack
page read and write
13C3000
heap
page read and write
FB0000
heap
page read and write
219000228000
trusted library allocation
page read and write
4D61000
heap
page read and write
6D69000
heap
page read and write
734E000
heap
page read and write
219000D38000
trusted library allocation
page read and write
BE7000
unkown
page execute and read and write
D11000
unkown
page execute and read and write
E04000
heap
page read and write
6D50000
heap
page read and write
1C1C3443000
heap
page read and write
2CF000894000
trusted library allocation
page read and write
219000354000
trusted library allocation
page read and write
C70000
direct allocation
page read and write
F0E000
stack
page read and write
4B90000
trusted library allocation
page read and write
8AC002EC000
direct allocation
page read and write
51E0000
direct allocation
page read and write
7457000
heap
page read and write
4D80000
direct allocation
page execute and read and write
2190008F8000
trusted library allocation
page read and write
8AC00217000
direct allocation
page read and write
717B000
heap
page read and write
3320000
direct allocation
page read and write
4591000
heap
page read and write
1C1C3020000
heap
page read and write
425E000
stack
page read and write
4D61000
heap
page read and write
6BD0000
trusted library allocation
page read and write
257000
unkown
page execute and read and write
4D61000
heap
page read and write
717F000
heap
page read and write
304F000
stack
page read and write
2CF000404000
trusted library allocation
page read and write
43CE000
stack
page read and write
E20000
direct allocation
page read and write
A6F0FFE000
unkown
page readonly
21900034C000
trusted library allocation
page read and write
66EF000
stack
page read and write
721D000
heap
page read and write
7311000
heap
page read and write
219000D74000
trusted library allocation
page read and write
382000
unkown
page execute and write copy
ED8002BC000
trusted library allocation
page read and write
4591000
heap
page read and write
219000CD0000
trusted library allocation
page read and write
ED800230000
trusted library allocation
page read and write
2CF000830000
trusted library allocation
page read and write
4751000
heap
page read and write
8AC0020C000
direct allocation
page read and write
4591000
heap
page read and write
49D0000
heap
page read and write
219000C98000
trusted library allocation
page read and write
219000F50000
trusted library allocation
page read and write
65E0000
heap
page read and write
8AC002E4000
direct allocation
page read and write
2950000
direct allocation
page read and write
C94000
heap
page read and write
36B000
unkown
page execute and read and write
219001128000
trusted library allocation
page read and write
219000FE4000
trusted library allocation
page read and write
3320000
direct allocation
page read and write
2970000
heap
page read and write
2CF0006E8000
trusted library allocation
page read and write
219000688000
trusted library allocation
page read and write
1C1BBB50000
heap
page read and write
1C1C3431000
heap
page read and write
2190006D8000
trusted library allocation
page read and write
729E000
heap
page read and write
74AC000
heap
page read and write
4591000
heap
page read and write
219000290000
trusted library allocation
page read and write
1C1C29E0000
trusted library section
page read and write
219000488000
trusted library allocation
page read and write
4D61000
heap
page read and write
219000BD0000
trusted library allocation
page read and write
4D61000
heap
page read and write
2CF000920000
trusted library allocation
page read and write
ED8002C0000
trusted library allocation
page read and write
2CF0007C0000
trusted library allocation
page read and write
C94000
heap
page read and write
CB000
unkown
page execute and read and write
3ECE000
stack
page read and write
2CF000401000
trusted library allocation
page read and write
C94000
heap
page read and write
219000944000
trusted library allocation
page read and write
2CF000860000
trusted library allocation
page read and write
A6FDFFE000
unkown
page readonly
1C1BD6D7000
heap
page read and write
219000B00000
trusted library allocation
page read and write
4D60000
heap
page read and write
8AC00303000
direct allocation
page read and write
2CF000601000
trusted library allocation
page read and write
21900036C000
trusted library allocation
page read and write
2CF0007AC000
trusted library allocation
page read and write
A6E17FB000
stack
page read and write
4D1F000
stack
page read and write
330E000
stack
page read and write
3320000
direct allocation
page read and write
354F000
stack
page read and write
4DF0000
direct allocation
page execute and read and write
381000
unkown
page execute and read and write
1C1C2EB0000
heap
page read and write
219000C8C000
trusted library allocation
page read and write
4D61000
heap
page read and write
309B000
stack
page read and write
1C1BD6C7000
heap
page read and write
219000CB0000
trusted library allocation
page read and write
4D61000
heap
page read and write
A6EDFFE000
unkown
page readonly
21900034C000
trusted library allocation
page read and write
2190005A4000
trusted library allocation
page read and write
2190001B4000
trusted library allocation
page read and write
4E00000
direct allocation
page execute and read and write
33BE000
stack
page read and write
C9000
unkown
page write copy
6D4C000
stack
page read and write
219000900000
trusted library allocation
page read and write
3320000
direct allocation
page read and write
2BFF000
stack
page read and write
1C1BD1E3000
heap
page read and write
1452000
heap
page read and write
C9000
unkown
page write copy
1C1BD1F0000
heap
page read and write
219000360000
trusted library allocation
page read and write
6EA0000
direct allocation
page execute and read and write
421F000
stack
page read and write
2CF00039C000
trusted library allocation
page read and write
219000F34000
trusted library allocation
page read and write
219000F1C000
trusted library allocation
page read and write
2190006CC000
trusted library allocation
page read and write
499F000
stack
page read and write
219000B70000
trusted library allocation
page read and write
E20000
direct allocation
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
8AC002A8000
direct allocation
page read and write
1350000
heap
page read and write
2CF0007E4000
trusted library allocation
page read and write
4B70000
direct allocation
page execute and read and write
219000930000
trusted library allocation
page read and write
3FCF000
stack
page read and write
A6897FE000
stack
page read and write
7424000
heap
page read and write
C94000
heap
page read and write
55AD000
stack
page read and write
4ADF000
stack
page read and write
3320000
direct allocation
page read and write
E40000
heap
page read and write
219000CC0000
trusted library allocation
page read and write
1C1C30F3000
trusted library section
page read and write
C57000
heap
page read and write
143E000
heap
page read and write
1C1B9CCE000
heap
page read and write
C5C000
heap
page read and write
4D61000
heap
page read and write
C70000
direct allocation
page read and write
3320000
direct allocation
page read and write
A689FFE000
unkown
page readonly
3EFE000
stack
page read and write
C90000
heap
page read and write
219000304000
trusted library allocation
page read and write
8AC002AC000
direct allocation
page read and write
6EA0000
direct allocation
page execute and read and write
3D5E000
stack
page read and write
4D61000
heap
page read and write
4E20000
direct allocation
page execute and read and write
4C61000
direct allocation
page read and write
219000958000
trusted library allocation
page read and write
2CF000424000
trusted library allocation
page read and write
2CF000418000
trusted library allocation
page read and write
219000214000
trusted library allocation
page read and write
71D2000
direct allocation
page read and write
6EA0000
direct allocation
page execute and read and write
13BD000
heap
page read and write
4591000
heap
page read and write
219000124000
trusted library allocation
page read and write
9D0000
heap
page read and write
A6817FE000
stack
page read and write
E20000
direct allocation
page read and write
2190012BC000
trusted library allocation
page read and write
4D61000
heap
page read and write
85DC000
stack
page read and write
219000B20000
trusted library allocation
page read and write
219000C80000
trusted library allocation
page read and write
2BCF000
stack
page read and write
219000068000
trusted library allocation
page read and write
4D61000
heap
page read and write
7110000
heap
page read and write
84A0000
heap
page read and write
219000E80000
trusted library allocation
page read and write
43BF000
stack
page read and write
219000C0C000
trusted library allocation
page read and write
360E000
stack
page read and write
219000294000
trusted library allocation
page read and write
CC000
unkown
page execute and read and write
1C1C3E2E000
trusted library section
page read and write
2190002A4000
trusted library allocation
page read and write
4A71000
direct allocation
page read and write
4D60000
direct allocation
page execute and read and write
4591000
heap
page read and write
73D9000
heap
page read and write
219000360000
trusted library allocation
page read and write
219000A6C000
trusted library allocation
page read and write
FB0000
heap
page read and write
A6F1FFE000
unkown
page readonly
4C00000
direct allocation
page read and write
2CF00087C000
trusted library allocation
page read and write
3AFF000
stack
page read and write
2190003D8000
trusted library allocation
page read and write
A6827FD000
stack
page read and write
D02000
unkown
page execute and read and write
2CF00079C000
trusted library allocation
page read and write
4C00000
direct allocation
page execute and read and write
C70000
direct allocation
page read and write
4D61000
heap
page read and write
7173000
heap
page read and write
219000500000
trusted library allocation
page read and write
2190001EC000
trusted library allocation
page read and write
4B50000
direct allocation
page execute and read and write
21900101C000
trusted library allocation
page read and write
219000298000
trusted library allocation
page read and write
21900064C000
trusted library allocation
page read and write
60000
unkown
page read and write
53EE000
stack
page read and write
219000C6C000
trusted library allocation
page read and write
4591000
heap
page read and write
219000218000
trusted library allocation
page read and write
4D61000
heap
page read and write
C94000
heap
page read and write
4D61000
heap
page read and write
7173000
heap
page read and write
4591000
heap
page read and write
2190002C0000
trusted library allocation
page read and write
4E00000
direct allocation
page execute and read and write
30D0000
heap
page read and write
4591000
heap
page read and write
A52000
unkown
page execute and read and write
7175000
heap
page read and write
219000858000
trusted library allocation
page read and write
AFD000
stack
page read and write
2CF000898000
trusted library allocation
page read and write
219000310000
trusted library allocation
page read and write
2CCE000
stack
page read and write
7265000
heap
page read and write
531F000
stack
page read and write
219001220000
trusted library allocation
page read and write
219000C98000
trusted library allocation
page read and write
2190009C0000
trusted library allocation
page read and write
219000EBC000
trusted library allocation
page read and write
368F000
stack
page read and write
219000CA8000
trusted library allocation
page read and write
219000174000
trusted library allocation
page read and write
A6E9FFE000
unkown
page readonly
3B3E000
stack
page read and write
8AC002DC000
direct allocation
page read and write
4D61000
heap
page read and write
2ABF000
stack
page read and write
34FE000
stack
page read and write
4591000
heap
page read and write
435F000
stack
page read and write
257000
unkown
page execute and read and write
C70000
direct allocation
page read and write
2190007F4000
trusted library allocation
page read and write
E70000
heap
page read and write
34BF000
stack
page read and write
21900060C000
trusted library allocation
page read and write
219000304000
trusted library allocation
page read and write
8AC002D0000
direct allocation
page read and write
FA0000
heap
page read and write
E04000
heap
page read and write
2CF000948000
trusted library allocation
page read and write
2CF000801000
trusted library allocation
page read and write
2190001C4000
trusted library allocation
page read and write
21900074C000
trusted library allocation
page read and write
C94000
heap
page read and write
219000714000
trusted library allocation
page read and write
4BB0000
direct allocation
page execute and read and write
4D61000
heap
page read and write
219000A4C000
trusted library allocation
page read and write
1C1B9BE0000
heap
page read and write
6EA0000
direct allocation
page execute and read and write
219000401000
trusted library allocation
page read and write
2CF000880000
trusted library allocation
page read and write
2190001F0000
trusted library allocation
page read and write
3D8E000
stack
page read and write
2CF000890000
trusted library allocation
page read and write
219001201000
trusted library allocation
page read and write
6EA0000
direct allocation
page execute and read and write
3E0F000
stack
page read and write
2CF000864000
trusted library allocation
page read and write
219000488000
trusted library allocation
page read and write
ED8002C0000
trusted library allocation
page read and write
4DD0000
direct allocation
page execute and read and write
43FE000
stack
page read and write
1C1C3C20000
trusted library section
page read and write
381000
unkown
page execute and write copy
E20000
direct allocation
page read and write
453E000
stack
page read and write
4D61000
heap
page read and write
EA1000
heap
page read and write
4D61000
heap
page read and write
A6F77FE000
unkown
page readonly
21900034C000
trusted library allocation
page read and write
13D0000
heap
page read and write
2E8E000
stack
page read and write
1C1B9D40000
trusted library allocation
page read and write
4D61000
heap
page read and write
1C1BD1F0000
heap
page read and write
4D61000
heap
page read and write
1C1BD1EA000
heap
page read and write
21900061C000
trusted library allocation
page read and write
ED800294000
trusted library allocation
page read and write
72F6000
heap
page read and write
C94000
heap
page read and write
21900050C000
trusted library allocation
page read and write
2FFE000
stack
page read and write
1360000
direct allocation
page read and write
4B90000
direct allocation
page execute and read and write
2190001B4000
trusted library allocation
page read and write
A6F37FC000
stack
page read and write
1413000
heap
page read and write
A6FCFFE000
unkown
page readonly
310E000
stack
page read and write
4B80000
direct allocation
page execute and read and write
2CF000818000
trusted library allocation
page read and write
219000C01000
trusted library allocation
page read and write
30D7000
heap
page read and write
A6807FD000
stack
page read and write
53A0000
direct allocation
page execute and read and write
219000584000
trusted library allocation
page read and write
9E0000
heap
page read and write
E45000
heap
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
338E000
stack
page read and write
C94000
heap
page read and write
2190003C8000
trusted library allocation
page read and write
4D80000
direct allocation
page execute and read and write
710E000
heap
page read and write
53E0000
direct allocation
page execute and read and write
30CF000
stack
page read and write
C94000
heap
page read and write
219000CA8000
trusted library allocation
page read and write
1C1C1382000
trusted library allocation
page read and write
4D61000
heap
page read and write
729D000
heap
page read and write
E4E000
stack
page read and write
2CF000884000
trusted library allocation
page read and write
219000ABC000
trusted library allocation
page read and write
133E000
stack
page read and write
2CF00084C000
trusted library allocation
page read and write
219000EB4000
trusted library allocation
page read and write
2190001D8000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
E04000
heap
page read and write
2CF0007A0000
trusted library allocation
page read and write
731F000
heap
page read and write
ED800201000
trusted library allocation
page read and write
219000354000
trusted library allocation
page read and write
A6E5FFE000
unkown
page readonly
4D70000
direct allocation
page execute and read and write
C94000
heap
page read and write
4D61000
heap
page read and write
1360000
direct allocation
page read and write
21900120C000
trusted library allocation
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
219001080000
trusted library allocation
page read and write
ED800274000
trusted library allocation
page read and write
ED8002A0000
trusted library allocation
page read and write
219000304000
trusted library allocation
page read and write
A6F5FFC000
stack
page read and write
60000
unkown
page readonly
8AC00280000
direct allocation
page read and write
E20000
direct allocation
page read and write
1413000
heap
page read and write
FBA000
heap
page read and write
2CF00040C000
trusted library allocation
page read and write
F5E000
heap
page read and write
7308000
heap
page read and write
219001134000
trusted library allocation
page read and write
E04000
heap
page read and write
4591000
heap
page read and write
A6DDFFE000
unkown
page readonly
4591000
heap
page read and write
219000054000
trusted library allocation
page read and write
C70000
direct allocation
page read and write
219001210000
trusted library allocation
page read and write
3FFF000
stack
page read and write
219000A74000
trusted library allocation
page read and write
C70000
direct allocation
page read and write
219001090000
trusted library allocation
page read and write
2190012E4000
trusted library allocation
page read and write
4D61000
heap
page read and write
4D80000
direct allocation
page execute and read and write
13F2000
heap
page read and write
2CF0002ED000
trusted library allocation
page read and write
1C1BD680000
heap
page read and write
CFD000
stack
page read and write
21900020C000
trusted library allocation
page read and write
414E000
stack
page read and write
4D61000
heap
page read and write
1441000
heap
page read and write
4D61000
heap
page read and write
C70000
direct allocation
page read and write
21900005F000
trusted library allocation
page read and write
4596000
heap
page read and write
467E000
stack
page read and write
3320000
direct allocation
page read and write
60000
unkown
page readonly
3BCD000
stack
page read and write
8AC00201000
direct allocation
page read and write
219000F1C000
trusted library allocation
page read and write
4D61000
heap
page read and write
219000294000
trusted library allocation
page read and write
219000418000
trusted library allocation
page read and write
21900034C000
trusted library allocation
page read and write
C94000
heap
page read and write
219000F74000
trusted library allocation
page read and write
3C1E000
stack
page read and write
6E80000
direct allocation
page execute and read and write
2CF000964000
trusted library allocation
page read and write
40DF000
stack
page read and write
337F000
stack
page read and write
2D0F000
stack
page read and write
219000E0C000
trusted library allocation
page read and write
3A8E000
stack
page read and write
4591000
heap
page read and write
143C000
heap
page read and write
4D40000
direct allocation
page execute and read and write
3CCF000
stack
page read and write
ED800260000
trusted library allocation
page read and write
2CF0006BC000
trusted library allocation
page read and write
36CE000
stack
page read and write
2190011A4000
trusted library allocation
page read and write
4E10000
direct allocation
page execute and read and write
4B80000
direct allocation
page execute and read and write
1457000
heap
page read and write
ED8002B0000
trusted library allocation
page read and write
7173000
heap
page read and write
FA0000
heap
page read and write
2CF0006AC000
trusted library allocation
page read and write
1C1BD1D8000
heap
page read and write
4BE0000
direct allocation
page read and write
C2000
unkown
page execute and read and write
2190008D8000
trusted library allocation
page read and write
2E7F000
stack
page read and write
C70000
direct allocation
page read and write
2190003D8000
trusted library allocation
page read and write
C94000
heap
page read and write
E8E000
stack
page read and write
1425000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
4D61000
heap
page read and write
39CE000
stack
page read and write
2CF00080C000
trusted library allocation
page read and write
2CF0006E0000
trusted library allocation
page read and write
3A9F000
stack
page read and write
36B000
unkown
page execute and read and write
2190010E8000
trusted library allocation
page read and write
7484000
heap
page read and write
2190004A4000
trusted library allocation
page read and write
528000
unkown
page execute and write copy
A6F57FE000
unkown
page readonly
143B000
heap
page read and write
7100000
heap
page read and write
1C1C3092000
trusted library section
page read and write
C94000
heap
page read and write
219000CAB000
trusted library allocation
page read and write
358E000
stack
page read and write
53D0000
direct allocation
page execute and read and write
4D70000
direct allocation
page execute and read and write
1C1BD6C9000
heap
page read and write
1413000
heap
page read and write
A6F4FFC000
stack
page read and write
2190003D8000
trusted library allocation
page read and write
219001128000
trusted library allocation
page read and write
ED8002F8000
trusted library allocation
page read and write
2C0E000
stack
page read and write
D12000
unkown
page execute and write copy
219000A5C000
trusted library allocation
page read and write
C94000
heap
page read and write
219000954000
trusted library allocation
page read and write
44DE000
stack
page read and write
13C5000
heap
page read and write
5450000
heap
page read and write
2950000
direct allocation
page read and write
4D60000
direct allocation
page execute and read and write
C94000
heap
page read and write
2190003E8000
trusted library allocation
page read and write
72A0000
heap
page read and write
30A0000
heap
page read and write
2CF00091C000
trusted library allocation
page read and write
219000C1F000
trusted library allocation
page read and write
2190006FC000
trusted library allocation
page read and write
219000F74000
trusted library allocation
page read and write
219000B94000
trusted library allocation
page read and write
7222000
heap
page read and write
1C1C3E20000
trusted library section
page read and write
1C1C3D60000
trusted library section
page read and write
4D61000
heap
page read and write
E20000
direct allocation
page read and write
219000BD0000
trusted library allocation
page read and write
721E000
heap
page read and write
219000D14000
trusted library allocation
page read and write
219000201000
trusted library allocation
page read and write
335E000
stack
page read and write
8AC00215000
direct allocation
page read and write
4591000
heap
page read and write
722E000
heap
page read and write
1C1BD6EE000
heap
page read and write
2190000DC000
trusted library allocation
page read and write
377E000
stack
page read and write
219000E78000
trusted library allocation
page read and write
69AE000
stack
page read and write
2190002FB000
trusted library allocation
page read and write
219000338000
trusted library allocation
page read and write
4591000
heap
page read and write
2190012CC000
trusted library allocation
page read and write
E04000
heap
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
4781000
heap
page read and write
1C1B9AF0000
heap
page read and write
2190002F0000
trusted library allocation
page read and write
219000C50000
trusted library allocation
page read and write
141000
unkown
page execute and write copy
7171000
heap
page read and write
305F000
stack
page read and write
717E000
heap
page read and write
4591000
heap
page read and write
2D7E000
stack
page read and write
717C000
heap
page read and write
A59000
unkown
page write copy
219000C38000
trusted library allocation
page read and write
219000850000
trusted library allocation
page read and write
2CF0007BC000
trusted library allocation
page read and write
219000958000
trusted library allocation
page read and write
219000ADC000
trusted library allocation
page read and write
3C3F000
stack
page read and write
A6F6FFD000
stack
page read and write
4B8C000
stack
page read and write
2CF0006C8000
trusted library allocation
page read and write
359F000
stack
page read and write
4591000
heap
page read and write
219000AE4000
trusted library allocation
page read and write
4591000
heap
page read and write
2CF000230000
trusted library allocation
page read and write
1C1C3136000
trusted library section
page read and write
37CF000
stack
page read and write
696F000
stack
page read and write
A6E2FFE000
unkown
page readonly
21900118C000
trusted library allocation
page read and write
1C1C3C41000
trusted library section
page read and write
72F8000
heap
page read and write
7175000
heap
page read and write
381000
unkown
page execute and read and write
72FF000
heap
page read and write
2190003E8000
trusted library allocation
page read and write
1C1C3D06000
trusted library section
page read and write
219000998000
trusted library allocation
page read and write
219000CEC000
trusted library allocation
page read and write
6EA0000
direct allocation
page execute and read and write
381F000
stack
page read and write
219000BF4000
trusted library allocation
page read and write
12FA000
stack
page read and write
A6F67FE000
unkown
page readonly
2CF0008F4000
trusted library allocation
page read and write
F58000
heap
page read and write
219000194000
trusted library allocation
page read and write
E00000
heap
page read and write
4D61000
heap
page read and write
2190002E0000
trusted library allocation
page read and write
45B0000
heap
page read and write
6C20000
direct allocation
page read and write
3D7F000
stack
page read and write
35CF000
stack
page read and write
308E000
stack
page read and write
E04000
heap
page read and write
381000
unkown
page execute and write copy
219000294000
trusted library allocation
page read and write
ED800278000
trusted library allocation
page read and write
4D61000
heap
page read and write
A6FEFFE000
unkown
page readonly
4D80000
direct allocation
page execute and read and write
2CF000848000
trusted library allocation
page read and write
73CA000
heap
page read and write
7176000
heap
page read and write
1360000
direct allocation
page read and write
219000801000
trusted library allocation
page read and write
4591000
heap
page read and write
A6877FC000
stack
page read and write
2190004F4000
trusted library allocation
page read and write
CC9000
unkown
page execute and read and write
395F000
stack
page read and write
2977000
heap
page read and write
219000164000
trusted library allocation
page read and write
2CF00081C000
trusted library allocation
page read and write
2CF0008C8000
trusted library allocation
page read and write
72CD000
heap
page read and write
A6F97FE000
unkown
page readonly
2CF000248000
trusted library allocation
page read and write
219000360000
trusted library allocation
page read and write
4D61000
heap
page read and write
8AC00260000
direct allocation
page read and write
3320000
direct allocation
page read and write
339000
unkown
page execute and read and write
4BE0000
direct allocation
page read and write
4D61000
heap
page read and write
4591000
heap
page read and write
E04000
heap
page read and write
219000304000
trusted library allocation
page read and write
2CF0008F0000
trusted library allocation
page read and write
2D4E000
stack
page read and write
4D61000
heap
page read and write
2CF0008E4000
trusted library allocation
page read and write
4D61000
heap
page read and write
4B80000
direct allocation
page execute and read and write
2190009E4000
trusted library allocation
page read and write
2F4E000
stack
page read and write
4D61000
heap
page read and write
2CF00078C000
trusted library allocation
page read and write
7110000
heap
page read and write
53C0000
direct allocation
page execute and read and write
13EE000
heap
page read and write
21900063C000
trusted library allocation
page read and write
4D61000
heap
page read and write
65E6000
heap
page read and write
4C3E000
stack
page read and write
6EA0000
direct allocation
page execute and read and write
A6E47FC000
stack
page read and write
ED800248000
trusted library allocation
page read and write
E20000
direct allocation
page read and write
38BE000
stack
page read and write
219000A98000
trusted library allocation
page read and write
2CF000294000
trusted library allocation
page read and write
4D61000
heap
page read and write
334F000
stack
page read and write
3BDF000
stack
page read and write
4751000
heap
page read and write
4D61000
heap
page read and write
219000F74000
trusted library allocation
page read and write
219000C4C000
trusted library allocation
page read and write
2190002F4000
trusted library allocation
page read and write
7317000
heap
page read and write
72FD000
heap
page read and write
4591000
heap
page read and write
C94000
heap
page read and write
8AC00210000
direct allocation
page read and write
7378000
heap
page read and write
4591000
heap
page read and write
C2000
unkown
page execute and read and write
4D61000
heap
page read and write
219000635000
trusted library allocation
page read and write
4591000
heap
page read and write
1C1BD1DE000
heap
page read and write
7175000
heap
page read and write
2CF0002F0000
trusted library allocation
page read and write
A6DFFFE000
unkown
page readonly
5350000
direct allocation
page execute and read and write
1C1BD1B0000
heap
page read and write
9F1000
unkown
page execute and write copy
219000428000
trusted library allocation
page read and write
4591000
heap
page read and write
2190003E8000
trusted library allocation
page read and write
C94000
heap
page read and write
2190001F4000
trusted library allocation
page read and write
E1E000
stack
page read and write
2190001D4000
trusted library allocation
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
A6FB7FE000
stack
page read and write
477F000
stack
page read and write
2950000
direct allocation
page read and write
C94000
heap
page read and write
720E000
heap
page read and write
ED7000
heap
page read and write
A6EBFFE000
unkown
page readonly
4591000
heap
page read and write
E04000
heap
page read and write
21900034C000
trusted library allocation
page read and write
4D61000
heap
page read and write
1439000
heap
page read and write
4591000
heap
page read and write
3F9F000
stack
page read and write
A6DEFFE000
unkown
page readonly
21900100C000
trusted library allocation
page read and write
C94000
heap
page read and write
219000360000
trusted library allocation
page read and write
2190012B4000
trusted library allocation
page read and write
400E000
stack
page read and write
464E000
stack
page read and write
CB000
unkown
page execute and read and write
1C1B9EA5000
heap
page read and write
14EA000
heap
page read and write
21900029E000
trusted library allocation
page read and write
21900034C000
trusted library allocation
page read and write
4D61000
heap
page read and write
36DF000
stack
page read and write
345F000
stack
page read and write
21900090B000
trusted library allocation
page read and write
1452000
heap
page read and write
348F000
stack
page read and write
4591000
heap
page read and write
1C1B9CAE000
heap
page read and write
A6857FE000
stack
page read and write
4D61000
heap
page read and write
4751000
heap
page read and write
4D60000
direct allocation
page execute and read and write
4591000
heap
page read and write
320F000
stack
page read and write
A6EEFFE000
unkown
page readonly
2CF0002FC000
trusted library allocation
page read and write
2190001E0000
trusted library allocation
page read and write
1C1B9C27000
heap
page read and write
ED8002B0000
trusted library allocation
page read and write
122F000
stack
page read and write
5340000
direct allocation
page execute and read and write
4591000
heap
page read and write
F3B000
stack
page read and write
6EA0000
direct allocation
page execute and read and write
4FAF000
stack
page read and write
97C000
stack
page read and write
4D61000
heap
page read and write
1C1C3BB0000
trusted library section
page read and write
C94000
heap
page read and write
7329000
direct allocation
page read and write
3320000
direct allocation
page read and write
3B8F000
stack
page read and write
219000F80000
trusted library allocation
page read and write
1C1BD1EF000
heap
page read and write
4DF0000
direct allocation
page execute and read and write
E60000
direct allocation
page read and write
4DC0000
direct allocation
page execute and read and write
4D61000
heap
page read and write
1445000
heap
page read and write
475E000
stack
page read and write
1C1BD75A000
heap
page read and write
C70000
direct allocation
page read and write
13D2000
heap
page read and write
8AC00270000
direct allocation
page read and write
428E000
stack
page read and write
1C1BD5D0000
trusted library section
page read and write
142D000
heap
page read and write
4781000
heap
page read and write
1C1BD6D4000
heap
page read and write
219000958000
trusted library allocation
page read and write
2CF0008E8000
trusted library allocation
page read and write
450E000
stack
page read and write
2950000
direct allocation
page read and write
4D61000
heap
page read and write
ED8002D8000
trusted library allocation
page read and write
219000878000
trusted library allocation
page read and write
219000080000
trusted library allocation
page read and write
2A0F000
stack
page read and write
6EA0000
direct allocation
page execute and read and write
E60000
direct allocation
page read and write
219000CA8000
trusted library allocation
page read and write
6EA0000
direct allocation
page execute and read and write
2CF00071C000
trusted library allocation
page read and write
31DF000
stack
page read and write
ED8002A0000
trusted library allocation
page read and write
460F000
stack
page read and write
6EA0000
direct allocation
page execute and read and write
7175000
heap
page read and write
72AD000
heap
page read and write
4D61000
heap
page read and write
219000C98000
trusted library allocation
page read and write
2CF00070C000
trusted library allocation
page read and write
4D61000
heap
page read and write
4A4C000
stack
page read and write
4591000
heap
page read and write
219000A38000
trusted library allocation
page read and write
72CB000
heap
page read and write
4D61000
heap
page read and write
21900022C000
trusted library allocation
page read and write
4591000
heap
page read and write
4D61000
heap
page read and write
1360000
direct allocation
page read and write
11AF000
stack
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
4591000
heap
page read and write
21900093A000
trusted library allocation
page read and write
2190002B0000
trusted library allocation
page read and write
4591000
heap
page read and write
51A0000
trusted library allocation
page read and write
A6E4FFE000
unkown
page readonly
526000
unkown
page execute and read and write
4591000
heap
page read and write
A6E37FA000
stack
page read and write
1C1BBB53000
heap
page read and write
4D61000
heap
page read and write
2190012B4000
trusted library allocation
page read and write
4751000
heap
page read and write
219000958000
trusted library allocation
page read and write
2190000A0000
trusted library allocation
page read and write
219000BD0000
trusted library allocation
page read and write
2CF0008D8000
trusted library allocation
page read and write
2190006D8000
trusted library allocation
page read and write
1C1C3152000
trusted library section
page read and write
2190000B4000
trusted library allocation
page read and write
2CF000298000
trusted library allocation
page read and write
21900088A000
trusted library allocation
page read and write
219000124000
trusted library allocation
page read and write
4591000
heap
page read and write
2190004A8000
trusted library allocation
page read and write
4751000
heap
page read and write
1C1BD70D000
heap
page read and write
13F9000
heap
page read and write
219000B68000
trusted library allocation
page read and write
84A4000
heap
page read and write
219000E64000
trusted library allocation
page read and write
219000C98000
trusted library allocation
page read and write
2CF000238000
trusted library allocation
page read and write
C94000
heap
page read and write
A688FFE000
unkown
page readonly
219000B84000
trusted library allocation
page read and write
4591000
heap
page read and write
9A0000
heap
page read and write
313E000
stack
page read and write
717E000
heap
page read and write
2CF000220000
trusted library allocation
page read and write
ED800288000
trusted library allocation
page read and write
1C1B9D10000
heap
page read and write
4D70000
heap
page read and write
7287000
heap
page read and write
219000DBC000
trusted library allocation
page read and write
2CF000778000
trusted library allocation
page read and write
2CF0002E4000
trusted library allocation
page read and write
257000
unkown
page execute and read and write
ED8002F4000
trusted library allocation
page read and write
374E000
stack
page read and write
2CF0008AC000
trusted library allocation
page read and write
219001170000
trusted library allocation
page read and write
FC0000
heap
page read and write
219000DAC000
trusted library allocation
page read and write
7364000
heap
page read and write
FB5000
heap
page read and write
13C1000
heap
page read and write
219000320000
trusted library allocation
page read and write
219000E50000
trusted library allocation
page read and write
A6DD7FE000
stack
page read and write
3E4E000
stack
page read and write
21900012C000
trusted library allocation
page read and write
410F000
stack
page read and write
4591000
heap
page read and write
219000A2C000
trusted library allocation
page read and write
4D61000
heap
page read and write
CFB000
unkown
page execute and read and write
1C1C3BC1000
trusted library section
page read and write
370F000
stack
page read and write
A6F8FFE000
stack
page read and write
2AFE000
stack
page read and write
2190010E0000
trusted library allocation
page read and write
C94000
heap
page read and write
137A000
heap
page read and write
2CF000904000
trusted library allocation
page read and write
A685FFE000
unkown
page readonly
112F000
stack
page read and write
7233000
heap
page read and write
4D61000
heap
page read and write
2D3F000
stack
page read and write
2CF00060C000
trusted library allocation
page read and write
ED800220000
trusted library allocation
page read and write
2ACF000
stack
page read and write
474F000
stack
page read and write
318F000
stack
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
4D61000
heap
page read and write
7179000
heap
page read and write
ED8002B0000
trusted library allocation
page read and write
372000
unkown
page execute and read and write
7178000
heap
page read and write
3D0E000
stack
page read and write
ED8002A0000
trusted library allocation
page read and write
344E000
stack
page read and write
61000
unkown
page execute and write copy
4D61000
heap
page read and write
2F8F000
stack
page read and write
489E000
stack
page read and write
8AC00284000
direct allocation
page read and write
13D2000
heap
page read and write
1C1B9CAA000
heap
page read and write
219001224000
trusted library allocation
page read and write
30FF000
stack
page read and write
2190010EA000
trusted library allocation
page read and write
2CF0007D4000
trusted library allocation
page read and write
219000A1C000
trusted library allocation
page read and write
411E000
stack
page read and write
49DE000
stack
page read and write
1360000
direct allocation
page read and write
735B000
heap
page read and write
A6FE7FC000
stack
page read and write
2CF000408000
trusted library allocation
page read and write
5360000
direct allocation
page execute and read and write
2CF000874000
trusted library allocation
page read and write
21900019C000
trusted library allocation
page read and write
1C1C3D2D000
trusted library section
page read and write
4591000
heap
page read and write
219000984000
trusted library allocation
page read and write
2CF000828000
trusted library allocation
page read and write
219000A01000
trusted library allocation
page read and write
21900008C000
trusted library allocation
page read and write
3D4F000
stack
page read and write
439E000
stack
page read and write
4D61000
heap
page read and write
21900032C000
trusted library allocation
page read and write
C9000
unkown
page write copy
9F0000
unkown
page readonly
6EA0000
direct allocation
page execute and read and write
4781000
heap
page read and write
A6E77FE000
stack
page read and write
7177000
heap
page read and write
C94000
heap
page read and write
2CF000728000
trusted library allocation
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
3E9E000
stack
page read and write
471F000
stack
page read and write
E04000
heap
page read and write
5360000
direct allocation
page execute and read and write
219001128000
trusted library allocation
page read and write
A6E0FFE000
unkown
page readonly
1360000
direct allocation
page read and write
2CF0008C4000
trusted library allocation
page read and write
4D61000
heap
page read and write
219000230000
trusted library allocation
page read and write
21900083C000
trusted library allocation
page read and write
2190005D8000
trusted library allocation
page read and write
4D61000
heap
page read and write
2190002F7000
trusted library allocation
page read and write
349E000
stack
page read and write
A6FF7FE000
stack
page read and write
72C4000
heap
page read and write
339000
unkown
page execute and read and write
F25000
heap
page read and write
4B4F000
stack
page read and write
C70000
direct allocation
page read and write
A687FFE000
unkown
page readonly
387F000
stack
page read and write
4D61000
heap
page read and write
3F4F000
stack
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
219000A8C000
trusted library allocation
page read and write
340F000
stack
page read and write
1C1BD6E6000
heap
page read and write
4D2B000
stack
page read and write
C94000
heap
page read and write
6EA0000
direct allocation
page execute and read and write
C94000
heap
page read and write
1C1C344F000
heap
page read and write
327E000
stack
page read and write
E04000
heap
page read and write
219001068000
trusted library allocation
page read and write
ED800238000
trusted library allocation
page read and write
ED8002F0000
trusted library allocation
page read and write
1360000
direct allocation
page read and write
6E90000
direct allocation
page execute and read and write
4591000
heap
page read and write
372000
unkown
page execute and read and write
C9000
unkown
page write copy
4D61000
heap
page read and write
1C1C31E3000
trusted library section
page read and write
2190003C8000
trusted library allocation
page read and write
2950000
direct allocation
page read and write
1C1C3220000
trusted library section
page read and write
E04000
heap
page read and write
2FCE000
stack
page read and write
4DE0000
direct allocation
page execute and read and write
2950000
direct allocation
page read and write
219000E34000
trusted library allocation
page read and write
219000CC0000
trusted library allocation
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
717A000
heap
page read and write
45DF000
stack
page read and write
4D61000
heap
page read and write
2950000
direct allocation
page read and write
4751000
heap
page read and write
2190006B0000
trusted library allocation
page read and write
32CF000
stack
page read and write
7171000
heap
page read and write
4D61000
heap
page read and write
7174000
heap
page read and write
219000D80000
trusted library allocation
page read and write
430F000
stack
page read and write
5241000
direct allocation
page read and write
1C1BD6CC000
heap
page read and write
E04000
heap
page read and write
219000632000
trusted library allocation
page read and write
4D61000
heap
page read and write
4D3F000
stack
page read and write
672E000
stack
page read and write
219000294000
trusted library allocation
page read and write
A6DE7FE000
stack
page read and write
219000F50000
trusted library allocation
page read and write
219000AA8000
trusted library allocation
page read and write
1C1BD1EB000
heap
page read and write
219000668000
trusted library allocation
page read and write
219000601000
trusted library allocation
page read and write
4D60000
direct allocation
page execute and read and write
1C1BD1DE000
heap
page read and write
717C000
heap
page read and write
413F000
stack
page read and write
143F000
heap
page read and write
21900119C000
trusted library allocation
page read and write
373F000
stack
page read and write
3DBE000
stack
page read and write
381000
unkown
page execute and read and write
1441000
heap
page read and write
3E8F000
stack
page read and write
219001154000
trusted library allocation
page read and write
449F000
stack
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
5360000
direct allocation
page execute and read and write
219000C1C000
trusted library allocation
page read and write
2CF0006C8000
trusted library allocation
page read and write
167E000
stack
page read and write
ED800235000
trusted library allocation
page read and write
7270000
heap
page read and write
A683FFE000
unkown
page readonly
219000374000
trusted library allocation
page read and write
1C1C3DB7000
unclassified section
page read and write
2CF00085C000
trusted library allocation
page read and write
219000F40000
trusted library allocation
page read and write
4591000
heap
page read and write
4C20000
direct allocation
page execute and read and write
F10000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
408F000
stack
page read and write
44CF000
stack
page read and write
4D61000
heap
page read and write
1360000
direct allocation
page read and write
2CF0007E0000
trusted library allocation
page read and write
6E70000
direct allocation
page execute and read and write
219000CF8000
trusted library allocation
page read and write
E04000
heap
page read and write
219000D24000
trusted library allocation
page read and write
1C1C322E000
trusted library section
page read and write
219000ED8000
trusted library allocation
page read and write
219000340000
trusted library allocation
page read and write
1C1BD1E2000
heap
page read and write
4591000
heap
page read and write
4D61000
heap
page read and write
1C1BF940000
trusted library allocation
page read and write
438F000
stack
page read and write
4C41000
direct allocation
page read and write
717C000
heap
page read and write
4FEE000
stack
page read and write
1C1C3E07000
unclassified section
page read and write
219000F1C000
trusted library allocation
page read and write
65DE000
stack
page read and write
4D61000
heap
page read and write
A6F87FE000
unkown
page readonly
C94000
heap
page read and write
2CF0002C8000
trusted library allocation
page read and write
4C1F000
stack
page read and write
4591000
heap
page read and write
2190006EC000
trusted library allocation
page read and write
515E000
stack
page read and write
2CF000260000
trusted library allocation
page read and write
371E000
stack
page read and write
ECF000
heap
page read and write
2CF0008B8000
trusted library allocation
page read and write
35DE000
stack
page read and write
7178000
heap
page read and write
219000C1C000
trusted library allocation
page read and write
2190005BC000
trusted library allocation
page read and write
2190003C8000
trusted library allocation
page read and write
219000958000
trusted library allocation
page read and write
3B0E000
stack
page read and write
7173000
heap
page read and write
2950000
direct allocation
page read and write
4DA0000
direct allocation
page execute and read and write
219000CC0000
trusted library allocation
page read and write
4D61000
heap
page read and write
A6F07FD000
stack
page read and write
1C1C309E000
trusted library section
page read and write
1C1B9BD0000
heap
page readonly
2190001A8000
trusted library allocation
page read and write
3320000
direct allocation
page read and write
1452000
heap
page read and write
3EBF000
stack
page read and write
C94000
heap
page read and write
1C1C3BE2000
trusted library section
page read and write
219000304000
trusted library allocation
page read and write
C94000
heap
page read and write
219001164000
trusted library allocation
page read and write
4D6E000
stack
page read and write
4D61000
heap
page read and write
13D2000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
403E000
stack
page read and write
4591000
heap
page read and write
2190003C8000
trusted library allocation
page read and write
881F000
stack
page read and write
4D61000
heap
page read and write
72E6000
heap
page read and write
219000C60000
trusted library allocation
page read and write
219000BD4000
trusted library allocation
page read and write
2CF000280000
trusted library allocation
page read and write
219000D4C000
trusted library allocation
page read and write
219000980000
trusted library allocation
page read and write
4D5F000
stack
page read and write
2CF000788000
trusted library allocation
page read and write
ED8002BC000
trusted library allocation
page read and write
2190009C8000
trusted library allocation
page read and write
5454000
heap
page read and write
C94000
heap
page read and write
A6FD7FD000
stack
page read and write
219000220000
trusted library allocation
page read and write
E5B000
stack
page read and write
219000BCC000
trusted library allocation
page read and write
4C5E000
stack
page read and write
4591000
heap
page read and write
E20000
direct allocation
page read and write
219000594000
trusted library allocation
page read and write
A6DCFFE000
unkown
page readonly
56AE000
stack
page read and write
1C1BC5A0000
unkown
page read and write
ED8002C0000
trusted library allocation
page read and write
1C1BD758000
heap
page read and write
4D30000
direct allocation
page execute and read and write
21900080C000
trusted library allocation
page read and write
4BA0000
direct allocation
page execute and read and write
7236000
heap
page read and write
4D61000
heap
page read and write
5380000
direct allocation
page execute and read and write
2CF000250000
trusted library allocation
page read and write
219001168000
trusted library allocation
page read and write
8AC00274000
direct allocation
page read and write
2CF000868000
trusted library allocation
page read and write
219001180000
trusted library allocation
page read and write
4D61000
heap
page read and write
2190010F4000
trusted library allocation
page read and write
7178000
heap
page read and write
C94000
heap
page read and write
3C7E000
stack
page read and write
6EA0000
direct allocation
page execute and read and write
4B80000
direct allocation
page execute and read and write
219000EA4000
trusted library allocation
page read and write
7449000
heap
page read and write
1360000
direct allocation
page read and write
4591000
heap
page read and write
219001078000
trusted library allocation
page read and write
E7B000
heap
page read and write
4591000
heap
page read and write
ED800250000
trusted library allocation
page read and write
143B000
heap
page read and write
528000
unkown
page execute and write copy
7178000
heap
page read and write
143B000
heap
page read and write
4D61000
heap
page read and write
BDB000
unkown
page execute and write copy
219000154000
trusted library allocation
page read and write
E30000
heap
page read and write
4D61000
heap
page read and write
394E000
stack
page read and write
219000E1C000
trusted library allocation
page read and write
2190001E8000
trusted library allocation
page read and write
1C1BD770000
trusted library section
page read and write
9F0000
heap
page read and write
4D61000
heap
page read and write
7170000
heap
page read and write
36B000
unkown
page execute and read and write
2CF0008EC000
trusted library allocation
page read and write
34CE000
stack
page read and write
72B2000
heap
page read and write
458F000
stack
page read and write
219000354000
trusted library allocation
page read and write
4D61000
heap
page read and write
2190001F8000
trusted library allocation
page read and write
7177000
heap
page read and write
1C1B9D07000
heap
page read and write
4D50000
direct allocation
page execute and read and write
2CF000790000
trusted library allocation
page read and write
C94000
heap
page read and write
219000D74000
trusted library allocation
page read and write
143F000
heap
page read and write
4591000
heap
page read and write
384F000
stack
page read and write
C94000
heap
page read and write
219000B58000
trusted library allocation
page read and write
733C000
heap
page read and write
A6EE7FB000
stack
page read and write
21900113C000
trusted library allocation
page read and write
2190000EC000
trusted library allocation
page read and write
C94000
heap
page read and write
21900105C000
trusted library allocation
page read and write
1C1BD6DB000
heap
page read and write
E20000
direct allocation
page read and write
4B80000
direct allocation
page execute and read and write
4B80000
direct allocation
page execute and read and write
9F0000
unkown
page read and write
ED80020C000
trusted library allocation
page read and write
39FE000
stack
page read and write
42BE000
stack
page read and write
219000EF4000
trusted library allocation
page read and write
ED8002BC000
trusted library allocation
page read and write
7178000
heap
page read and write
2CF000918000
trusted library allocation
page read and write
219001108000
trusted library allocation
page read and write
C94000
heap
page read and write
A681FFE000
unkown
page readonly
29BE000
stack
page read and write
2CF0006F4000
trusted library allocation
page read and write
2CF000960000
trusted library allocation
page read and write
4D61000
heap
page read and write
C94000
heap
page read and write
219000728000
trusted library allocation
page read and write
45A0000
heap
page read and write
2190000FC000
trusted library allocation
page read and write
A6EC7FE000
stack
page read and write
2DCF000
stack
page read and write
219000298000
trusted library allocation
page read and write
4D61000
heap
page read and write
53B0000
direct allocation
page execute and read and write
60000
unkown
page read and write
A6E87FE000
stack
page read and write
1C1BD1E3000
heap
page read and write
219000D68000
trusted library allocation
page read and write
E0E000
stack
page read and write
2CF00082C000
trusted library allocation
page read and write
219000CC0000
trusted library allocation
page read and write
7265000
heap
page read and write
717D000
heap
page read and write
C50000
heap
page read and write
49D0000
trusted library allocation
page read and write
6EA0000
direct allocation
page execute and read and write
A6847FD000
stack
page read and write
1360000
direct allocation
page read and write
2950000
direct allocation
page read and write
ECE000
stack
page read and write
2190009AF000
trusted library allocation
page read and write
6EA0000
direct allocation
page execute and read and write
4590000
heap
page read and write
CFD000
stack
page read and write
A6F17FB000
stack
page read and write
4D50000
direct allocation
page execute and read and write
C94000
heap
page read and write
4D61000
heap
page read and write
219001128000
trusted library allocation
page read and write
A680FFE000
unkown
page readonly
A59000
unkown
page write copy
4D61000
heap
page read and write
1C1BD6C3000
heap
page read and write
1C1B9CD8000
heap
page read and write
4D61000
heap
page read and write
142D000
heap
page read and write
1360000
direct allocation
page read and write
A6DBFFE000
unkown
page readonly
2CF000430000
trusted library allocation
page read and write
733E000
heap
page read and write
219000DC0000
trusted library allocation
page read and write
2CF000248000
trusted library allocation
page read and write
7E0000
heap
page read and write
4C10000
direct allocation
page execute and read and write
1C1BD6DF000
heap
page read and write
1370000
heap
page read and write
219000B8C000
trusted library allocation
page read and write
219000124000
trusted library allocation
page read and write
1C1BD1E2000
heap
page read and write
219000E01000
trusted library allocation
page read and write
4D90000
direct allocation
page execute and read and write
3D1F000
stack
page read and write
4D61000
heap
page read and write
8AC0024C000
direct allocation
page read and write
C70000
direct allocation
page read and write
1C1C3C53000
trusted library section
page read and write
1C1BD718000
heap
page read and write
ED8002BC000
trusted library allocation
page read and write
5360000
direct allocation
page execute and read and write
2190000AC000
trusted library allocation
page read and write
382000
unkown
page execute and write copy
4C1E000
stack
page read and write
2190008E8000
trusted library allocation
page read and write
31CE000
stack
page read and write
3FDE000
stack
page read and write
2CF000840000
trusted library allocation
page read and write
219000144000
trusted library allocation
page read and write
C2000
unkown
page execute and read and write
219000E5C000
trusted library allocation
page read and write
C9000
unkown
page write copy
4DB0000
direct allocation
page execute and read and write
C94000
heap
page read and write
E20000
direct allocation
page read and write
7350000
heap
page read and write
219000C98000
trusted library allocation
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
40CE000
stack
page read and write
E10000
heap
page read and write
380E000
stack
page read and write
21900027C000
trusted library allocation
page read and write
E37000
heap
page read and write
2950000
direct allocation
page read and write
420E000
stack
page read and write
ED8002E4000
trusted library allocation
page read and write
219000E28000
trusted library allocation
page read and write
1C1C344C000
heap
page read and write
2CF0002F4000
trusted library allocation
page read and write
1C1C3870000
trusted library section
page read and write
4D60000
direct allocation
page execute and read and write
4D61000
heap
page read and write
A684FFE000
unkown
page readonly
219000D1C000
trusted library allocation
page read and write
5390000
direct allocation
page execute and read and write
257000
unkown
page execute and read and write
6AE0000
heap
page read and write
1C1B9C18000
heap
page read and write
6C4C000
stack
page read and write
EEA000
heap
page read and write
219000498000
trusted library allocation
page read and write
EB6000
unkown
page execute and read and write
2190007E4000
trusted library allocation
page read and write
219000574000
trusted library allocation
page read and write
219000D5C000
trusted library allocation
page read and write
1360000
direct allocation
page read and write
7244000
heap
page read and write
143C000
heap
page read and write
219000918000
trusted library allocation
page read and write
4D61000
heap
page read and write
7538000
heap
page read and write
219001040000
trusted library allocation
page read and write
143B000
heap
page read and write
2F5E000
stack
page read and write
4D61000
heap
page read and write
1C1BD6D9000
heap
page read and write
C94000
heap
page read and write
2C8F000
stack
page read and write
1360000
direct allocation
page read and write
3A4F000
stack
page read and write
4780000
heap
page read and write
427F000
stack
page read and write
4591000
heap
page read and write
219000E60000
trusted library allocation
page read and write
2950000
direct allocation
page read and write
3320000
direct allocation
page read and write
72DE000
heap
page read and write
163E000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
1C1C31A2000
trusted library section
page read and write
4D61000
heap
page read and write
A6F3FFE000
unkown
page readonly
E20000
direct allocation
page read and write
4D60000
direct allocation
page execute and read and write
4DE0000
direct allocation
page execute and read and write
4D61000
heap
page read and write
2950000
direct allocation
page read and write
8AC00220000
direct allocation
page read and write
6EA0000
direct allocation
page execute and read and write
7264000
heap
page read and write
ED8002BC000
trusted library allocation
page read and write
A6867FA000
stack
page read and write
FBE000
heap
page read and write
363E000
stack
page read and write
750F000
heap
page read and write
4D61000
heap
page read and write
2CF000844000
trusted library allocation
page read and write
21900040C000
trusted library allocation
page read and write
7175000
heap
page read and write
4D61000
heap
page read and write
F38000
heap
page read and write
ED8002A0000
trusted library allocation
page read and write
725A000
heap
page read and write
A5B000
unkown
page execute and read and write
4B1E000
stack
page read and write
4D61000
heap
page read and write
A6EA7FA000
stack
page read and write
4DB0000
direct allocation
page execute and read and write
1C1B9EA0000
heap
page read and write
ED8002C0000
trusted library allocation
page read and write
A6F27FB000
stack
page read and write
ED8002BC000
trusted library allocation
page read and write
448E000
stack
page read and write
44FF000
stack
page read and write
219000DE8000
trusted library allocation
page read and write
4750000
heap
page read and write
A6E57FC000
stack
page read and write
417E000
stack
page read and write
6EA0000
direct allocation
page execute and read and write
21900020C000
trusted library allocation
page read and write
2190001B4000
trusted library allocation
page read and write
219000EF4000
trusted library allocation
page read and write
A6DAFFE000
unkown
page readonly
434E000
stack
page read and write
177E000
stack
page read and write
137E000
heap
page read and write
21900097B000
trusted library allocation
page read and write
4EAE000
stack
page read and write
A6EF7FC000
stack
page read and write
86DC000
stack
page read and write
485F000
stack
page read and write
219000E98000
trusted library allocation
page read and write
C94000
heap
page read and write
6C20000
direct allocation
page read and write
4591000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
3E5F000
stack
page read and write
5330000
direct allocation
page execute and read and write
4D61000
heap
page read and write
2CF0006F0000
trusted library allocation
page read and write
526000
unkown
page execute and read and write
257000
unkown
page execute and read and write
1C1BD3A0000
heap
page read and write
1C1BD1C0000
heap
page read and write
4D61000
heap
page read and write
ED800264000
trusted library allocation
page read and write
4BF0000
direct allocation
page execute and read and write
C70000
direct allocation
page read and write
A6E97FD000
stack
page read and write
2CF0006AC000
trusted library allocation
page read and write
3320000
direct allocation
page read and write
21900021C000
trusted library allocation
page read and write
2190009A8000
trusted library allocation
page read and write
1C1C3080000
trusted library section
page read and write
4591000
heap
page read and write
4D61000
heap
page read and write
4D80000
direct allocation
page execute and read and write
1445000
heap
page read and write
382000
unkown
page execute and write copy
219000224000
trusted library allocation
page read and write
EB8000
unkown
page execute and write copy
4591000
heap
page read and write
3ADE000
stack
page read and write
143B000
heap
page read and write
2190004D0000
trusted library allocation
page read and write
1C1BD6DD000
heap
page read and write
219000DCC000
trusted library allocation
page read and write
219000EBC000
trusted library allocation
page read and write
13D0000
heap
page read and write
6AAF000
stack
page read and write
A6E07FB000
stack
page read and write
7345000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
1C1BD729000
heap
page read and write
219000CE0000
trusted library allocation
page read and write
2CF0006AC000
trusted library allocation
page read and write
219000A0C000
trusted library allocation
page read and write
4591000
heap
page read and write
381000
unkown
page execute and write copy
4E6F000
stack
page read and write
2190003E8000
trusted library allocation
page read and write
C94000
heap
page read and write
A6F2FFE000
unkown
page readonly
2950000
direct allocation
page read and write
2C3E000
stack
page read and write
7398000
heap
page read and write
54EE000
stack
page read and write
21900053C000
trusted library allocation
page read and write
686E000
stack
page read and write
1413000
heap
page read and write
2CF0008A8000
trusted library allocation
page read and write
752A000
heap
page read and write
219000FD8000
trusted library allocation
page read and write
140000
unkown
page readonly
5360000
direct allocation
page execute and read and write
C20000
heap
page read and write
1445000
heap
page read and write
871E000
stack
page read and write
2CF0002C0000
trusted library allocation
page read and write
219000F80000
trusted library allocation
page read and write
A6E1FFE000
unkown
page readonly
ED8002C8000
trusted library allocation
page read and write
2CF00020C000
trusted library allocation
page read and write
1C1B9D30000
trusted library allocation
page read and write
219000294000
trusted library allocation
page read and write
219000320000
trusted library allocation
page read and write
41CF000
stack
page read and write
6EA0000
direct allocation
page execute and read and write
A6E3FFE000
unkown
page readonly
1C1BD726000
heap
page read and write
C9000
unkown
page write copy
219000210000
trusted library allocation
page read and write
4D61000
heap
page read and write
A6DA7FE000
unkown
page read and write
4D61000
heap
page read and write
461E000
stack
page read and write
3C0F000
stack
page read and write
4D61000
heap
page read and write
1C1C3BD0000
trusted library section
page read and write
2CF000974000
trusted library allocation
page read and write
A6EAFFE000
unkown
page readonly
1C1B9C10000
heap
page read and write
A6DB7FF000
stack
page read and write
219000814000
trusted library allocation
page read and write
4591000
heap
page read and write
3320000
direct allocation
page read and write
219000EBC000
trusted library allocation
page read and write
219000CA8000
trusted library allocation
page read and write
219000A6E000
trusted library allocation
page read and write
E20000
direct allocation
page read and write
219000C98000
trusted library allocation
page read and write
4591000
heap
page read and write
324E000
stack
page read and write
A6E27FE000
stack
page read and write
F8E000
stack
page read and write
8AC00234000
direct allocation
page read and write
1C1C3D22000
trusted library section
page read and write
219000BD4000
trusted library allocation
page read and write
1C1BD1D9000
heap
page read and write
7177000
heap
page read and write
21900032C000
trusted library allocation
page read and write
7177000
heap
page read and write
4591000
heap
page read and write
219000848000
trusted library allocation
page read and write
2190002A4000
trusted library allocation
page read and write
4DD0000
direct allocation
page execute and read and write
A6E67FE000
stack
page read and write
A6DF7FD000
stack
page read and write
21900077C000
trusted library allocation
page read and write
53F0000
direct allocation
page execute and read and write
717B000
heap
page read and write
5370000
direct allocation
page execute and read and write
2A4E000
stack
page read and write
21900001C000
trusted library allocation
page read and write
2190004B0000
trusted library allocation
page read and write
7172000
heap
page read and write
143F000
heap
page read and write
8AC00294000
direct allocation
page read and write
1C1C2FB7000
unclassified section
page read and write
2EBE000
stack
page read and write
1C1BD670000
heap
page read and write
F30000
heap
page read and write
52AD000
stack
page read and write
219000770000
trusted library allocation
page read and write
A682FFE000
unkown
page readonly
219001030000
trusted library allocation
page read and write
A6F9FFE000
unkown
page readonly
2B4F000
stack
page read and write
5360000
direct allocation
page execute and read and write
4591000
heap
page read and write
1C1C31AE000
trusted library section
page read and write
399E000
stack
page read and write
7172000
heap
page read and write
388E000
stack
page read and write
77C000
stack
page read and write
2CF00039C000
trusted library allocation
page read and write
A6F7FFB000
stack
page read and write
2190002B4000
trusted library allocation
page read and write
C94000
heap
page read and write
2190003C8000
trusted library allocation
page read and write
60000
unkown
page read and write
2E4F000
stack
page read and write
219000FDA000
trusted library allocation
page read and write
8AC0023C000
direct allocation
page read and write
A6E6FFE000
unkown
page readonly
4D61000
heap
page read and write
E04000
heap
page read and write
2190001D0000
trusted library allocation
page read and write
E20000
direct allocation
page read and write
219000D04000
trusted library allocation
page read and write
4B60000
direct allocation
page execute and read and write
4D61000
heap
page read and write
A6837FD000
stack
page read and write
1C1C2F27000
unclassified section
page read and write
C94000
heap
page read and write
C60000
heap
page read and write
219000234000
trusted library allocation
page read and write
E20000
direct allocation
page read and write
219000D44000
trusted library allocation
page read and write
A6DC7FE000
stack
page read and write
4D61000
heap
page read and write
521E000
stack
page read and write
7101000
heap
page read and write
725F000
heap
page read and write
35FF000
stack
page read and write
50EF000
stack
page read and write
4C00000
direct allocation
page read and write
2E0E000
stack
page read and write
1C1C3077000
unclassified section
page read and write
2190006D8000
trusted library allocation
page read and write
1C1C3620000
trusted library section
page read and write
C94000
heap
page read and write
2CF000700000
trusted library allocation
page read and write
F4F000
stack
page read and write
331F000
stack
page read and write
1360000
direct allocation
page read and write
7170000
heap
page read and write
A6ED7FE000
stack
page read and write
72B9000
heap
page read and write
53AD000
stack
page read and write
444F000
stack
page read and write
C94000
heap
page read and write
4D61000
heap
page read and write
4D80000
direct allocation
page execute and read and write
A6ECFFE000
unkown
page readonly
219000001000
trusted library allocation
page read and write
ED800270000
trusted library allocation
page read and write
7338000
heap
page read and write
219000790000
trusted library allocation
page read and write
A6E7FFE000
unkown
page readonly
60000
unkown
page readonly
463F000
stack
page read and write
290F000
stack
page read and write
219000F40000
trusted library allocation
page read and write
C94000
heap
page read and write
1C1C3040000
trusted library section
page read and write
219001001000
trusted library allocation
page read and write
1437000
heap
page read and write
219000964000
trusted library allocation
page read and write
A6FC7FE000
stack
page read and write
219000CA8000
trusted library allocation
page read and write
2190001E4000
trusted library allocation
page read and write
219000C2C000
trusted library allocation
page read and write
C94000
heap
page read and write
2CF00095C000
trusted library allocation
page read and write
4591000
heap
page read and write
733C000
heap
page read and write
339000
unkown
page execute and read and write
526000
unkown
page execute and read and write
6C20000
direct allocation
page read and write
8AC00230000
direct allocation
page read and write
4D80000
direct allocation
page execute and read and write
4D61000
heap
page read and write
A6EB7FE000
stack
page read and write
424F000
stack
page read and write
372000
unkown
page execute and read and write
8AC00250000
direct allocation
page read and write
3C4E000
stack
page read and write
219001214000
trusted library allocation
page read and write
1C1BD1E2000
heap
page read and write
4D61000
heap
page read and write
717E000
heap
page read and write
2B8E000
stack
page read and write
4D61000
heap
page read and write
ED8002BC000
trusted library allocation
page read and write
2CF000210000
trusted library allocation
page read and write
1C1C2EB3000
heap
page read and write
A686FFE000
unkown
page readonly
1C1B9E80000
trusted library section
page readonly
EB9000
heap
page read and write
2190010AC000
trusted library allocation
page read and write
2190007C8000
trusted library allocation
page read and write
732B000
direct allocation
page read and write
219000074000
trusted library allocation
page read and write
323F000
stack
page read and write
8AC00290000
direct allocation
page read and write
13C6000
heap
page read and write
2190003C8000
trusted library allocation
page read and write
1453000
heap
page read and write
3320000
direct allocation
page read and write
4D61000
heap
page read and write
1C1B9CD5000
heap
page read and write
73FC000
heap
page read and write
D11000
unkown
page execute and write copy
A6D97EF000
stack
page read and write
39BF000
stack
page read and write
2F0F000
stack
page read and write
682F000
stack
page read and write
1C1C315D000
trusted library section
page read and write
219000E60000
trusted library allocation
page read and write
385E000
stack
page read and write
A6EFFFE000
unkown
page readonly
61000
unkown
page execute and write copy
219000F74000
trusted library allocation
page read and write
6791000
heap
page read and write
There are 1750 hidden memdumps, click here to show them.