IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[1].exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1008392001\f7fa65d988.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\Tasks\skotes.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1008392001\f7fa65d988.exe
"C:\Users\user\AppData\Local\Temp\1008392001\f7fa65d988.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2912 --field-trial-handle=2744,i,15832663537055450618,8229323892131128527,262144 /prefetch:8
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actionsManage
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.icoNames)
unknown
https://drive-daily-2.corp.google.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://google-ohttp-relay-join.fastly-edge.com/hjxf
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=b(
unknown
http://anglebug.com/7556
unknown
http://185.215.113.43/Zu7JuNko/index.phpded
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
http://185.215.113.43/Zu7JuNko/index.php8392001
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
34.116.198.130
https://clients4.google.com/chrome-sync
unknown
http://185.215.113.43/Zu7JuNko/index.phpU
unknown
http://html4/loose.dtd
unknown
http://unisolated.invalid/a
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://185.215.113.43/Zu7JuNko/index.phpIk
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
http://185.215.113.43/Zu7JuNko/index.phpncodedb
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://.jpg
unknown
http://185.215.113.43/Zu7JuNko/index.php1
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
https://anglebug.com/7369H
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://anglebug.com/7162
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fvtekk5pn.top
34.116.198.130
www.google.com
172.217.21.36
fvtekk5pn.top
34.116.198.130

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
239.255.255.250
unknown
Reserved
34.116.198.130
home.fvtekk5pn.top
United States
172.217.21.36
www.google.com
United States
127.0.0.1
unknown
unknown
31.41.244.11
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
4BF0000
direct allocation
page read and write
malicious
52A0000
direct allocation
page read and write
malicious
4B30000
direct allocation
page read and write
malicious
CC1000
unkown
page execute and read and write
malicious
961000
unkown
page execute and read and write
malicious
5180000
direct allocation
page read and write
malicious
961000
unkown
page execute and read and write
malicious
961000
unkown
page execute and read and write
malicious
22499FE000
unkown
page readonly
9C2000
unkown
page execute and read and write
66780033C000
trusted library allocation
page read and write
28F000D78000
trusted library allocation
page read and write
18B93358000
heap
page read and write
18B92DB0000
heap
page read and write
28F00075C000
trusted library allocation
page read and write
18B92DB0000
heap
page read and write
18B92DB3000
heap
page read and write
28F000C44000
trusted library allocation
page read and write
46B1000
heap
page read and write
C66000
unkown
page execute and read and write
4E11000
heap
page read and write
6A20000
heap
page read and write
A41000
heap
page read and write
18B92DB5000
heap
page read and write
22649FE000
unkown
page readonly
18B915F3000
heap
page read and write
A7B000
heap
page read and write
18B92DAD000
heap
page read and write
46B1000
heap
page read and write
CC0000
unkown
page readonly
7910000
direct allocation
page execute and read and write
18B92DB3000
heap
page read and write
6678006B8000
trusted library allocation
page read and write
18B92DA4000
heap
page read and write
667800678000
trusted library allocation
page read and write
18B92D9E000
heap
page read and write
4E11000
heap
page read and write
18B92DB3000
heap
page read and write
14E7000
heap
page read and write
7DC0000
heap
page read and write
28F000BD4000
trusted library allocation
page read and write
18B92DAA000
heap
page read and write
7201000
heap
page read and write
46B1000
heap
page read and write
4D01000
heap
page read and write
7420002E4000
direct allocation
page read and write
6678006FC000
trusted library allocation
page read and write
18B92DA3000
heap
page read and write
4E11000
heap
page read and write
18B92DB5000
heap
page read and write
6678006EC000
trusted library allocation
page read and write
2B6F000
stack
page read and write
46B1000
heap
page read and write
129E000
stack
page read and write
18B92DB5000
heap
page read and write
28F000EA4000
trusted library allocation
page read and write
46B1000
heap
page read and write
18B92DB5000
heap
page read and write
18B92DB0000
heap
page read and write
7910000
direct allocation
page execute and read and write
83DA000
heap
page read and write
18B92DB5000
heap
page read and write
18B92DAA000
heap
page read and write
18B92DB0000
heap
page read and write
31B400230000
trusted library allocation
page read and write
4E11000
heap
page read and write
A1C000
heap
page read and write
378F000
stack
page read and write
28F000E1C000
trusted library allocation
page read and write
18B93352000
heap
page read and write
3DAE000
stack
page read and write
328F000
stack
page read and write
18B92DB5000
heap
page read and write
2EAE000
stack
page read and write
18B92DB0000
heap
page read and write
A7C000
heap
page read and write
22491FB000
stack
page read and write
2FF0000
direct allocation
page read and write
1370000
direct allocation
page read and write
46B1000
heap
page read and write
A1F000
heap
page read and write
18B92DB0000
heap
page read and write
18B92DAA000
heap
page read and write
336F000
stack
page read and write
28F00041C000
trusted library allocation
page read and write
A5D000
heap
page read and write
31B400260000
trusted library allocation
page read and write
990000
direct allocation
page read and write
4E11000
heap
page read and write
667800320000
trusted library allocation
page read and write
7DD9000
heap
page read and write
18B92D98000
heap
page read and write
18B92DAA000
heap
page read and write
3A2F000
stack
page read and write
667800718000
trusted library allocation
page read and write
28F0006EC000
trusted library allocation
page read and write
4ABE000
stack
page read and write
C66000
unkown
page execute and read and write
56FF000
stack
page read and write
7201000
heap
page read and write
2FC0000
direct allocation
page read and write
28F0007A4000
trusted library allocation
page read and write
C5C000
stack
page read and write
7C5000
heap
page read and write
226A1FA000
stack
page read and write
28F000124000
trusted library allocation
page read and write
18B92DB5000
heap
page read and write
18B933A2000
heap
page read and write
12D4000
heap
page read and write
2930000
direct allocation
page read and write
28F000380000
trusted library allocation
page read and write
667800668000
trusted library allocation
page read and write
28F0000DC000
trusted library allocation
page read and write
22631FD000
stack
page read and write
C66000
unkown
page execute and read and write
667800644000
trusted library allocation
page read and write
18B92DB5000
heap
page read and write
3BAE000
stack
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
83B1000
heap
page read and write
82AB000
stack
page read and write
4E11000
heap
page read and write
300D000
heap
page read and write
18B92DB0000
heap
page read and write
18B92DB5000
heap
page read and write
A41000
heap
page read and write
6678002FC000
trusted library allocation
page read and write
18B92DA4000
heap
page read and write
2EFF000
stack
page read and write
667800310000
trusted library allocation
page read and write
18B92D9B000
heap
page read and write
342E000
stack
page read and write
7BEE000
heap
page read and write
3EAF000
stack
page read and write
18B92DB0000
heap
page read and write
18B97377000
unclassified section
page read and write
4E11000
heap
page read and write
28F0003B0000
trusted library allocation
page read and write
990000
direct allocation
page read and write
7DA1000
heap
page read and write
990000
direct allocation
page read and write
18B933D4000
heap
page read and write
2A2F000
stack
page read and write
352F000
stack
page read and write
A7C000
heap
page read and write
961000
unkown
page execute and write copy
18B92DB0000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
31B400264000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
5420000
direct allocation
page execute and read and write
4E11000
heap
page read and write
18B8F730000
heap
page read and write
7201000
heap
page read and write
7201000
heap
page read and write
A55000
heap
page read and write
416E000
stack
page read and write
28F000EA0000
trusted library allocation
page read and write
18B92DB0000
heap
page read and write
28F00035C000
trusted library allocation
page read and write
44EF000
stack
page read and write
4E11000
heap
page read and write
4E11000
heap
page read and write
18B8F9F5000
heap
page read and write
4B6E000
stack
page read and write
667800624000
trusted library allocation
page read and write
3CBF000
stack
page read and write
28F00020C000
trusted library allocation
page read and write
46B1000
heap
page read and write
18B92DB0000
heap
page read and write
224C9FE000
unkown
page readonly
28F0002F0000
trusted library allocation
page read and write
18B933C4000
heap
page read and write
33FF000
stack
page read and write
31B4002A0000
trusted library allocation
page read and write
46B1000
heap
page read and write
A5D000
heap
page read and write
28F000380000
trusted library allocation
page read and write
4CD0000
direct allocation
page execute and read and write
18B999F8000
trusted library section
page read and write
66780060C000
trusted library allocation
page read and write
5410000
direct allocation
page execute and read and write
7201000
heap
page read and write
7C9A000
heap
page read and write
18B92DCF000
heap
page read and write
316F000
stack
page read and write
139A000
heap
page read and write
18B92DAB000
heap
page read and write
950000
heap
page read and write
7BE5000
heap
page read and write
28F00043C000
trusted library allocation
page read and write
18B92DB5000
heap
page read and write
18B92DB0000
heap
page read and write
7BE7000
heap
page read and write
18B999F2000
trusted library section
page read and write
18B92DB0000
heap
page read and write
E20000
unkown
page execute and write copy
667800364000
trusted library allocation
page read and write
7BE1000
heap
page read and write
18B93327000
heap
page read and write
28F000BC4000
trusted library allocation
page read and write
22689FE000
unkown
page readonly
F6E000
stack
page read and write
28F0001C4000
trusted library allocation
page read and write
46B1000
heap
page read and write
4E11000
heap
page read and write
52DB000
stack
page read and write
4E11000
heap
page read and write
28F000001000
trusted library allocation
page read and write
2930000
direct allocation
page read and write
18B92DB0000
heap
page read and write
18B92DB3000
heap
page read and write
9F5000
heap
page read and write
224D1FE000
stack
page read and write
225A1FD000
stack
page read and write
28F000228000
trusted library allocation
page read and write
667800250000
trusted library allocation
page read and write
3CAF000
stack
page read and write
4D60000
direct allocation
page execute and read and write
304E000
stack
page read and write
7F16000
heap
page read and write
447E000
stack
page read and write
46AF000
stack
page read and write
18B92DA2000
heap
page read and write
7910000
direct allocation
page execute and read and write
18B92DA2000
heap
page read and write
4C70000
direct allocation
page execute and read and write
3F2F000
stack
page read and write
41CE000
stack
page read and write
4E11000
heap
page read and write
46B1000
heap
page read and write
7201000
heap
page read and write
B56000
unkown
page execute and read and write
22411FF000
stack
page read and write
41AF000
stack
page read and write
18B92DA2000
heap
page read and write
6678002ED000
trusted library allocation
page read and write
803E000
stack
page read and write
224B1FC000
stack
page read and write
3A7E000
stack
page read and write
4E11000
heap
page read and write
7201000
heap
page read and write
386F000
stack
page read and write
18B92DB0000
heap
page read and write
2FF0000
direct allocation
page read and write
E1E000
unkown
page execute and read and write
28F0007C0000
trusted library allocation
page read and write
46B1000
heap
page read and write
18B92DB0000
heap
page read and write
31B400201000
trusted library allocation
page read and write
6A30000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
FD0000
heap
page read and write
4D2F000
stack
page read and write
18B988E2000
heap
page read and write
18B92DB5000
heap
page read and write
18B92DCF000
heap
page read and write
5EC0000
heap
page read and write
22451FD000
stack
page read and write
225A9FE000
unkown
page readonly
28F0004B4000
trusted library allocation
page read and write
28F000CC0000
trusted library allocation
page read and write
4E11000
heap
page read and write
3CCE000
stack
page read and write
B56000
unkown
page execute and read and write
480E000
stack
page read and write
37CE000
stack
page read and write
46B1000
heap
page read and write
3CEE000
stack
page read and write
356E000
stack
page read and write
18B92D70000
heap
page read and write
14E2000
heap
page read and write
43EE000
stack
page read and write
224F1FD000
stack
page read and write
18B92DB5000
heap
page read and write
850000
heap
page read and write
28F00017C000
trusted library allocation
page read and write
A5D000
heap
page read and write
366F000
stack
page read and write
7CF5000
heap
page read and write
18B92DB5000
heap
page read and write
7910000
direct allocation
page execute and read and write
12D4000
heap
page read and write
28F000F1C000
trusted library allocation
page read and write
12A0000
heap
page read and write
18B92DB0000
heap
page read and write
2930000
direct allocation
page read and write
443E000
stack
page read and write
28F000662000
trusted library allocation
page read and write
3E0000
heap
page read and write
28F000444000
trusted library allocation
page read and write
C1E000
stack
page read and write
28F000B78000
trusted library allocation
page read and write
2930000
direct allocation
page read and write
42FF000
stack
page read and write
18B92DB5000
heap
page read and write
18B92DA4000
heap
page read and write
A69000
heap
page read and write
7BE5000
heap
page read and write
18B915F0000
heap
page read and write
18B92DAA000
heap
page read and write
A6A000
heap
page read and write
28F000D30000
trusted library allocation
page read and write
225F1FC000
stack
page read and write
7D72000
heap
page read and write
28F000AC0000
trusted library allocation
page read and write
28F0006FA000
trusted library allocation
page read and write
18B92DB3000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
314F000
stack
page read and write
860000
heap
page read and write
66780035C000
trusted library allocation
page read and write
18B92DA4000
heap
page read and write
7640000
trusted library allocation
page read and write
22489FE000
unkown
page readonly
C7C000
unkown
page execute and write copy
28F0002E0000
trusted library allocation
page read and write
165F000
stack
page read and write
18B932EE000
heap
page read and write
28F000928000
trusted library allocation
page read and write
18B92DB5000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
18B92DB3000
heap
page read and write
7201000
heap
page read and write
18B92DB3000
heap
page read and write
46B1000
heap
page read and write
18B92DB5000
heap
page read and write
7CE0000
heap
page read and write
46B1000
heap
page read and write
7BE1000
heap
page read and write
4E11000
heap
page read and write
990000
direct allocation
page read and write
18B92DAB000
heap
page read and write
18B92DA3000
heap
page read and write
18B92DB5000
heap
page read and write
18B92DBA000
heap
page read and write
28F000A34000
trusted library allocation
page read and write
28F00057C000
trusted library allocation
page read and write
83B0000
heap
page read and write
4E11000
heap
page read and write
3CFE000
stack
page read and write
667800201000
trusted library allocation
page read and write
457F000
stack
page read and write
7910000
direct allocation
page execute and read and write
4E11000
heap
page read and write
12D4000
heap
page read and write
2A67000
heap
page read and write
18B92DB0000
heap
page read and write
28F000DF8000
trusted library allocation
page read and write
46B1000
heap
page read and write
18B92DAA000
heap
page read and write
18B92DB3000
heap
page read and write
4E11000
heap
page read and write
6678006C4000
trusted library allocation
page read and write
4E11000
heap
page read and write
46B1000
heap
page read and write
18B999C0000
trusted library section
page read and write
46B1000
heap
page read and write
7201000
heap
page read and write
74200020C000
direct allocation
page read and write
46B1000
heap
page read and write
28F000CE0000
trusted library allocation
page read and write
28F000294000
trusted library allocation
page read and write
31B4002B0000
trusted library allocation
page read and write
18B92DB0000
heap
page read and write
4E30000
heap
page read and write
990000
direct allocation
page read and write
35EF000
stack
page read and write
46B1000
heap
page read and write
18B99380000
trusted library section
page read and write
28F000E24000
trusted library allocation
page read and write
28F000A74000
trusted library allocation
page read and write
4E11000
heap
page read and write
45BE000
stack
page read and write
7C42000
direct allocation
page read and write
22409FE000
unkown
page readonly
4E11000
heap
page read and write
4E11000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
51E1000
direct allocation
page read and write
18B93336000
heap
page read and write
A63000
heap
page read and write
432E000
stack
page read and write
18B92D9E000
heap
page read and write
18B98F80000
heap
page read and write
667800390000
trusted library allocation
page read and write
C7C000
unkown
page execute and write copy
22559FE000
unkown
page readonly
2930000
direct allocation
page read and write
39AF000
stack
page read and write
28F000C90000
trusted library allocation
page read and write
312E000
stack
page read and write
9CB000
unkown
page execute and read and write
18B92DA4000
heap
page read and write
18B92DB5000
heap
page read and write
318B000
stack
page read and write
3B8E000
stack
page read and write
4E11000
heap
page read and write
4E11000
heap
page read and write
3F4E000
stack
page read and write
28F0002F0000
trusted library allocation
page read and write
7E0000
heap
page read and write
18B8F7E3000
heap
page read and write
667800320000
trusted library allocation
page read and write
22569FE000
unkown
page readonly
7201000
heap
page read and write
22459FE000
unkown
page readonly
28F000CEC000
trusted library allocation
page read and write
28F000E48000
trusted library allocation
page read and write
18B99BAE000
trusted library section
page read and write
28F0001D8000
trusted library allocation
page read and write
28F000093000
trusted library allocation
page read and write
18B92DB3000
heap
page read and write
4E00000
trusted library allocation
page read and write
4A8E000
stack
page read and write
3C8F000
stack
page read and write
46B1000
heap
page read and write
7D57000
heap
page read and write
B56000
unkown
page execute and read and write
4C80000
direct allocation
page execute and read and write
4E11000
heap
page read and write
66780069C000
trusted library allocation
page read and write
18B9332A000
heap
page read and write
28F00015C000
trusted library allocation
page read and write
52D0000
direct allocation
page execute and read and write
667800714000
trusted library allocation
page read and write
46B1000
heap
page read and write
224B9FE000
unkown
page readonly
990000
direct allocation
page read and write
1370000
direct allocation
page read and write
28F000C90000
trusted library allocation
page read and write
28F000218000
trusted library allocation
page read and write
42EF000
stack
page read and write
38EF000
stack
page read and write
376E000
stack
page read and write
18B92DB0000
heap
page read and write
22509FE000
unkown
page readonly
18B954C0000
trusted library allocation
page read and write
FBD000
stack
page read and write
28F0002A4000
trusted library allocation
page read and write
7D7C000
heap
page read and write
28F000494000
trusted library allocation
page read and write
224E1FE000
stack
page read and write
52BF000
stack
page read and write
6FA000
stack
page read and write
18B92DAA000
heap
page read and write
28F000638000
trusted library allocation
page read and write
52A0000
direct allocation
page read and write
46B1000
heap
page read and write
18B92DAA000
heap
page read and write
28F000CFC000
trusted library allocation
page read and write
31FF000
stack
page read and write
18B92DB3000
heap
page read and write
7BE6000
heap
page read and write
4E0F000
stack
page read and write
6140000
heap
page read and write
18B92DB0000
heap
page read and write
7910000
direct allocation
page execute and read and write
7D39000
heap
page read and write
22481FE000
stack
page read and write
18B92DA4000
heap
page read and write
46B1000
heap
page read and write
31B4002BC000
trusted library allocation
page read and write
A81000
heap
page read and write
1E1B000
heap
page read and write
7D0C000
heap
page read and write
46B1000
heap
page read and write
4E11000
heap
page read and write
28F0001EC000
trusted library allocation
page read and write
18B92D80000
heap
page read and write
22531FE000
stack
page read and write
34EE000
stack
page read and write
990000
direct allocation
page read and write
150D000
heap
page read and write
28F000A14000
trusted library allocation
page read and write
A54000
heap
page read and write
18B92DB5000
heap
page read and write
18B9337E000
heap
page read and write
18B92DB3000
heap
page read and write
28F000294000
trusted library allocation
page read and write
18B92DB0000
heap
page read and write
667800658000
trusted library allocation
page read and write
E31000
unkown
page execute and write copy
4C70000
direct allocation
page execute and read and write
18B92DB5000
heap
page read and write
28F000C3A000
trusted library allocation
page read and write
18B988AC000
heap
page read and write
28F0000EC000
trusted library allocation
page read and write
22639FE000
unkown
page readonly
6678006B0000
trusted library allocation
page read and write
18B92DA4000
heap
page read and write
18B92DB5000
heap
page read and write
12D4000
heap
page read and write
45AE000
stack
page read and write
28F000E54000
trusted library allocation
page read and write
18B92DA4000
heap
page read and write
7DB6000
heap
page read and write
7D50000
heap
page read and write
31B400235000
trusted library allocation
page read and write
28F0001E8000
trusted library allocation
page read and write
FDD000
unkown
page execute and write copy
18B92DAA000
heap
page read and write
18B92DAA000
heap
page read and write
66780039C000
trusted library allocation
page read and write
9C2000
unkown
page execute and read and write
4870000
trusted library allocation
page read and write
66780033C000
trusted library allocation
page read and write
7201000
heap
page read and write
7201000
heap
page read and write
667800320000
trusted library allocation
page read and write
225E9FE000
unkown
page readonly
18B93356000
heap
page read and write
46B1000
heap
page read and write
28F00029A000
trusted library allocation
page read and write
5340000
direct allocation
page execute and read and write
52D0000
direct allocation
page execute and read and write
18B92DB0000
heap
page read and write
12D4000
heap
page read and write
7DC3000
heap
page read and write
7201000
heap
page read and write
226E9FE000
unkown
page readonly
490F000
stack
page read and write
7D4D000
heap
page read and write
226B9FE000
unkown
page readonly
A60000
heap
page read and write
18B92DB0000
heap
page read and write
28F000704000
trusted library allocation
page read and write
12D4000
heap
page read and write
4D60000
direct allocation
page execute and read and write
4E11000
heap
page read and write
7D7E000
heap
page read and write
28F0005C8000
trusted library allocation
page read and write
402E000
stack
page read and write
28F000224000
trusted library allocation
page read and write
426F000
stack
page read and write
18B99A51000
trusted library section
page read and write
46B1000
heap
page read and write
7201000
heap
page read and write
18B99DA0000
trusted library section
page read and write
28F000F28000
trusted library allocation
page read and write
42AE000
stack
page read and write
22679FE000
unkown
page readonly
28F000D04000
trusted library allocation
page read and write
18B92DAA000
heap
page read and write
32FF000
stack
page read and write
1370000
direct allocation
page read and write
742000230000
direct allocation
page read and write
46B1000
heap
page read and write
1D84000
heap
page read and write
71F0000
direct allocation
page read and write
18B92DB0000
heap
page read and write
7201000
heap
page read and write
18B92DB5000
heap
page read and write
18B933D4000
heap
page read and write
1360000
heap
page read and write
2FE0000
direct allocation
page execute and read and write
667800320000
trusted library allocation
page read and write
18B92DB0000
heap
page read and write
18B8F810000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
31B4002C0000
trusted library allocation
page read and write
A13000
heap
page read and write
7201000
heap
page read and write
2FF0000
direct allocation
page read and write
31B4002BC000
trusted library allocation
page read and write
28F00009F000
trusted library allocation
page read and write
18B92DB5000
heap
page read and write
18B92DA4000
heap
page read and write
408E000
stack
page read and write
40AE000
stack
page read and write
18B92DB5000
heap
page read and write
18B92DB0000
heap
page read and write
3DCF000
stack
page read and write
A63000
heap
page read and write
224F9FE000
unkown
page readonly
628F000
stack
page read and write
667800664000
trusted library allocation
page read and write
18B92DB0000
heap
page read and write
742000270000
direct allocation
page read and write
18B92DA4000
heap
page read and write
18B99DAE000
trusted library section
page read and write
37BF000
stack
page read and write
A7E000
heap
page read and write
18E5000
unkown
page execute and write copy
18B92DB5000
heap
page read and write
22529FE000
unkown
page readonly
7910000
direct allocation
page execute and read and write
36AE000
stack
page read and write
4C90000
direct allocation
page execute and read and write
28F000394000
trusted library allocation
page read and write
6678002F4000
trusted library allocation
page read and write
18B92DB0000
heap
page read and write
28F00074C000
trusted library allocation
page read and write
7420002A8000
direct allocation
page read and write
28F000F64000
trusted library allocation
page read and write
18B93336000
heap
page read and write
28F000AF0000
trusted library allocation
page read and write
7BE1000
heap
page read and write
31AE000
stack
page read and write
18B92DA4000
heap
page read and write
C6D000
unkown
page execute and read and write
4BCE000
stack
page read and write
18B92DB0000
heap
page read and write
742000280000
direct allocation
page read and write
667800408000
trusted library allocation
page read and write
742000274000
direct allocation
page read and write
7201000
heap
page read and write
28F000968000
trusted library allocation
page read and write
46B1000
heap
page read and write
28F000844000
trusted library allocation
page read and write
306E000
stack
page read and write
18B8F750000
heap
page read and write
1390000
heap
page read and write
28F000E60000
trusted library allocation
page read and write
1D84000
heap
page read and write
31B40020C000
trusted library allocation
page read and write
454E000
stack
page read and write
28F00065C000
trusted library allocation
page read and write
18B92D9E000
heap
page read and write
18B92DB5000
heap
page read and write
990000
direct allocation
page read and write
18B93356000
heap
page read and write
18B92DB3000
heap
page read and write
1370000
direct allocation
page read and write
5ACF000
stack
page read and write
46B1000
heap
page read and write
362E000
stack
page read and write
37B000
stack
page read and write
A5C000
heap
page read and write
742000294000
direct allocation
page read and write
18B92DAD000
heap
page read and write
22469FE000
unkown
page readonly
7BE4000
heap
page read and write
28F000234000
trusted library allocation
page read and write
667800788000
trusted library allocation
page read and write
22601FE000
stack
page read and write
78F0000
direct allocation
page execute and read and write
C3A000
unkown
page execute and read and write
433E000
stack
page read and write
667800248000
trusted library allocation
page read and write
2A60000
heap
page read and write
28F000A40000
trusted library allocation
page read and write
7BE0000
heap
page read and write
357E000
stack
page read and write
7BE7000
heap
page read and write
46B0000
heap
page read and write
22589FE000
unkown
page readonly
224E9FE000
unkown
page readonly
452E000
stack
page read and write
18B92DB0000
heap
page read and write
4E11000
heap
page read and write
5490000
direct allocation
page execute and read and write
2FF0000
direct allocation
page read and write
28F000368000
trusted library allocation
page read and write
46B1000
heap
page read and write
18B93358000
heap
page read and write
368E000
stack
page read and write
7EBC000
heap
page read and write
587E000
stack
page read and write
7201000
heap
page read and write
28F0001F0000
trusted library allocation
page read and write
D29000
unkown
page write copy
18B9332A000
heap
page read and write
28F00049C000
trusted library allocation
page read and write
7201000
heap
page read and write
2FF0000
direct allocation
page read and write
46B1000
heap
page read and write
960000
unkown
page read and write
28F000690000
trusted library allocation
page read and write
7CAC000
heap
page read and write
18B92DA4000
heap
page read and write
A6A000
heap
page read and write
18B92DB5000
heap
page read and write
18B92DB5000
heap
page read and write
4E11000
heap
page read and write
46BF000
stack
page read and write
FDC000
unkown
page execute and read and write
42CF000
stack
page read and write
18B933E0000
trusted library section
page read and write
18B92DB3000
heap
page read and write
28F00065C000
trusted library allocation
page read and write
28F000328000
trusted library allocation
page read and write
223F1EF000
stack
page read and write
7D1E000
heap
page read and write
4E11000
heap
page read and write
7BE7000
heap
page read and write
22591FC000
stack
page read and write
7910000
direct allocation
page execute and read and write
1370000
direct allocation
page read and write
7D9D000
heap
page read and write
28F000685000
trusted library allocation
page read and write
9AE000
heap
page read and write
31B4002C0000
trusted library allocation
page read and write
18B92DB5000
heap
page read and write
46B1000
heap
page read and write
4E11000
heap
page read and write
22661FE000
stack
page read and write
18B93392000
heap
page read and write
4E11000
heap
page read and write
28F000310000
trusted library allocation
page read and write
12D4000
heap
page read and write
4E34000
heap
page read and write
18B92DB0000
heap
page read and write
18B8F980000
trusted library allocation
page read and write
28F000C34000
trusted library allocation
page read and write
28F000370000
trusted library allocation
page read and write
71F0000
direct allocation
page read and write
A5C000
heap
page read and write
4771000
heap
page read and write
43AF000
stack
page read and write
18B92DB5000
heap
page read and write
3A6E000
stack
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
28F00014C000
trusted library allocation
page read and write
7FAF000
heap
page read and write
28F00077C000
trusted library allocation
page read and write
5320000
direct allocation
page execute and read and write
2FF0000
direct allocation
page read and write
FDE000
heap
page read and write
3B4F000
stack
page read and write
28F0005D8000
trusted library allocation
page read and write
7CFC000
heap
page read and write
28F000344000
trusted library allocation
page read and write
225D9FE000
unkown
page readonly
18B92DAA000
heap
page read and write
9CB000
unkown
page execute and read and write
18B92DA4000
heap
page read and write
A54000
heap
page read and write
18B92DB5000
heap
page read and write
22621FC000
stack
page read and write
2FF0000
direct allocation
page read and write
18B92DB5000
heap
page read and write
28F000D5C000
trusted library allocation
page read and write
667800730000
trusted library allocation
page read and write
31B400274000
trusted library allocation
page read and write
46B1000
heap
page read and write
28F000EBC000
trusted library allocation
page read and write
458E000
stack
page read and write
4C2E000
stack
page read and write
18B96F02000
trusted library allocation
page read and write
FDC000
unkown
page execute and write copy
7201000
heap
page read and write
46B1000
heap
page read and write
4E11000
heap
page read and write
18B99817000
unclassified section
page read and write
4C70000
direct allocation
page execute and read and write
18B92DB5000
heap
page read and write
4E11000
heap
page read and write
7201000
heap
page read and write
4E20000
heap
page read and write
1370000
direct allocation
page read and write
12D4000
heap
page read and write
742000210000
direct allocation
page read and write
1D84000
heap
page read and write
6678007D0000
trusted library allocation
page read and write
28F000432000
trusted library allocation
page read and write
14A0000
heap
page read and write
7201000
heap
page read and write
4E11000
heap
page read and write
1D84000
heap
page read and write
28F000940000
trusted library allocation
page read and write
28F0008FC000
trusted library allocation
page read and write
2FF0000
heap
page read and write
224C1FE000
stack
page read and write
573E000
stack
page read and write
28F00088C000
trusted library allocation
page read and write
A63000
heap
page read and write
18B92DB5000
heap
page read and write
28F0003A4000
trusted library allocation
page read and write
18B92DAF000
heap
page read and write
18B92DB3000
heap
page read and write
4C6F000
stack
page read and write
C7C000
unkown
page execute and read and write
18B92DB0000
heap
page read and write
28F000801000
trusted library allocation
page read and write
46B1000
heap
page read and write
5330000
direct allocation
page execute and read and write
31B4002BC000
trusted library allocation
page read and write
18B92DB6000
heap
page read and write
7CEB000
heap
page read and write
46B1000
heap
page read and write
6678007C8000
trusted library allocation
page read and write
494E000
stack
page read and write
226D9FE000
unkown
page readonly
960000
unkown
page readonly
7201000
heap
page read and write
28EE000
stack
page read and write
18B92DAA000
heap
page read and write
28F000C50000
trusted library allocation
page read and write
28F000AD8000
trusted library allocation
page read and write
28F0009A0000
trusted library allocation
page read and write
A13000
heap
page read and write
28F0001E0000
trusted library allocation
page read and write
742000217000
direct allocation
page read and write
28F0001A0000
trusted library allocation
page read and write
667800760000
trusted library allocation
page read and write
667800354000
trusted library allocation
page read and write
4E11000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
18B92DB5000
heap
page read and write
4E11000
heap
page read and write
2960000
heap
page read and write
18B92DB5000
heap
page read and write
37AF000
stack
page read and write
2FF0000
direct allocation
page read and write
18B92DB5000
heap
page read and write
E1E000
unkown
page execute and read and write
4E11000
heap
page read and write
7D3B000
heap
page read and write
667800238000
trusted library allocation
page read and write
18B92DCB000
heap
page read and write
18B92DB3000
heap
page read and write
18B92DAA000
heap
page read and write
34AF000
stack
page read and write
5380000
direct allocation
page execute and read and write
2FC0000
direct allocation
page read and write
22429FE000
unkown
page readonly
4E11000
heap
page read and write
14B8000
heap
page read and write
18B92DB3000
heap
page read and write
28F0008E8000
trusted library allocation
page read and write
28F0007DC000
trusted library allocation
page read and write
28F000DBC000
trusted library allocation
page read and write
31B4002A0000
trusted library allocation
page read and write
52D0000
direct allocation
page execute and read and write
46B1000
heap
page read and write
ECC000
stack
page read and write
28F000DA4000
trusted library allocation
page read and write
28F000788000
trusted library allocation
page read and write
28F0001D4000
trusted library allocation
page read and write
28F000C80000
trusted library allocation
page read and write
52F0000
direct allocation
page execute and read and write
18B988A0000
heap
page read and write
E20000
unkown
page execute and write copy
2930000
direct allocation
page read and write
54A0000
direct allocation
page execute and read and write
18B92DB3000
heap
page read and write
2FD0000
heap
page read and write
7E8C000
heap
page read and write
18B92DA4000
heap
page read and write
4C70000
direct allocation
page execute and read and write
4DA0000
direct allocation
page execute and read and write
6A30000
heap
page read and write
18B92DAA000
heap
page read and write
E20000
unkown
page execute and write copy
6678006B4000
trusted library allocation
page read and write
7EFC000
stack
page read and write
28F000300000
trusted library allocation
page read and write
4E11000
heap
page read and write
18B92DAA000
heap
page read and write
224A9FE000
unkown
page readonly
18B93373000
heap
page read and write
A41000
heap
page read and write
54B0000
direct allocation
page execute and read and write
667800280000
trusted library allocation
page read and write
71F0000
direct allocation
page read and write
37FE000
stack
page read and write
5350000
direct allocation
page execute and read and write
D29000
unkown
page write copy
D22000
unkown
page execute and read and write
37EE000
stack
page read and write
A58000
heap
page read and write
4CCF000
stack
page read and write
156B000
heap
page read and write
FCD000
stack
page read and write
31B4002BC000
trusted library allocation
page read and write
18B92DB5000
heap
page read and write
18B92DA2000
heap
page read and write
28F00051C000
trusted library allocation
page read and write
71F0000
direct allocation
page read and write
31B4002A0000
trusted library allocation
page read and write
28F000A01000
trusted library allocation
page read and write
18B9335A000
heap
page read and write
18B92DA4000
heap
page read and write
E30000
unkown
page readonly
226C1FE000
stack
page read and write
742000220000
direct allocation
page read and write
5301000
direct allocation
page read and write
28F000201000
trusted library allocation
page read and write
2DAF000
stack
page read and write
46B1000
heap
page read and write
28F000268000
trusted library allocation
page read and write
7201000
heap
page read and write
990000
direct allocation
page read and write
466E000
stack
page read and write
7D1E000
heap
page read and write
28F000B6C000
trusted library allocation
page read and write
18B92DB0000
heap
page read and write
18B92DB5000
heap
page read and write
7C0000
heap
page read and write
18B92DB5000
heap
page read and write
7D27000
heap
page read and write
53F0000
direct allocation
page execute and read and write
4E11000
heap
page read and write
407F000
stack
page read and write
28F000E7C000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
28F0001D0000
trusted library allocation
page read and write
225E1FB000
stack
page read and write
28F000994000
trusted library allocation
page read and write
18B92DAD000
heap
page read and write
4E30000
heap
page read and write
28F000984000
trusted library allocation
page read and write
7E18000
heap
page read and write
618E000
stack
page read and write
6400000
heap
page read and write
46B1000
heap
page read and write
960000
unkown
page readonly
7BEB000
heap
page read and write
1D84000
heap
page read and write
1370000
direct allocation
page read and write
22521FE000
stack
page read and write
46B1000
heap
page read and write
18B92DA2000
heap
page read and write
5420000
direct allocation
page execute and read and write
418F000
stack
page read and write
46B1000
heap
page read and write
18B9333E000
heap
page read and write
4E11000
heap
page read and write
40BE000
stack
page read and write
18B92DA4000
heap
page read and write
22539FE000
unkown
page readonly
18B92FE0000
heap
page read and write
667800404000
trusted library allocation
page read and write
18B92DB3000
heap
page read and write
3B2E000
stack
page read and write
667800401000
trusted library allocation
page read and write
28F00029C000
trusted library allocation
page read and write
28F000CFC000
trusted library allocation
page read and write
28F0005D4000
trusted library allocation
page read and write
18B92DAA000
heap
page read and write
FC6000
unkown
page execute and read and write
440F000
stack
page read and write
28F000D80000
trusted library allocation
page read and write
4BBF000
stack
page read and write
18B92DB0000
heap
page read and write
18B9331E000
heap
page read and write
18B92DB0000
heap
page read and write
28F000B0C000
trusted library allocation
page read and write
18B92DB0000
heap
page read and write
7420002D0000
direct allocation
page read and write
18B92DB0000
heap
page read and write
28F000A8C000
trusted library allocation
page read and write
82E000
stack
page read and write
4E11000
heap
page read and write
225D1FD000
stack
page read and write
18B92DB5000
heap
page read and write
667800734000
trusted library allocation
page read and write
A6A000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
7201000
heap
page read and write
6678006AC000
trusted library allocation
page read and write
7201000
heap
page read and write
3C6E000
stack
page read and write
7D46000
heap
page read and write
7201000
heap
page read and write
3C2F000
stack
page read and write
52D0000
direct allocation
page execute and read and write
18B92DA3000
heap
page read and write
28F000508000
trusted library allocation
page read and write
28F000E0C000
trusted library allocation
page read and write
667800620000
trusted library allocation
page read and write
18B98F57000
unclassified section
page read and write
28F0004B2000
trusted library allocation
page read and write
28F0000B4000
trusted library allocation
page read and write
31B400294000
trusted library allocation
page read and write
1D84000
heap
page read and write
28F000298000
trusted library allocation
page read and write
A63000
heap
page read and write
18B92DB0000
heap
page read and write
31B4002BC000
trusted library allocation
page read and write
28F00022C000
trusted library allocation
page read and write
7BE4000
heap
page read and write
18B92DA4000
heap
page read and write
28F0002A8000
trusted library allocation
page read and write
5EC6000
heap
page read and write
28F000E88000
trusted library allocation
page read and write
18B92DB3000
heap
page read and write
4D90000
direct allocation
page execute and read and write
28F0006EC000
trusted library allocation
page read and write
1D84000
heap
page read and write
7201000
heap
page read and write
8C0000
heap
page read and write
1D84000
heap
page read and write
742000250000
direct allocation
page read and write
2DEE000
stack
page read and write
41BF000
stack
page read and write
22511FE000
stack
page read and write
18B92D9E000
heap
page read and write
22401FE000
unkown
page read and write
22669FE000
unkown
page readonly
C7C000
unkown
page execute and read and write
18B92DAA000
heap
page read and write
117E000
unkown
page execute and read and write
18B92DA4000
heap
page read and write
4E11000
heap
page read and write
7BE4000
heap
page read and write
28F000F0C000
trusted library allocation
page read and write
1D84000
heap
page read and write
667800784000
trusted library allocation
page read and write
F9A000
unkown
page execute and read and write
47FF000
stack
page read and write
667800310000
trusted library allocation
page read and write
9CB000
unkown
page execute and read and write
28F000918000
trusted library allocation
page read and write
2FF0000
direct allocation
page read and write
18B92DB5000
heap
page read and write
31B400250000
trusted library allocation
page read and write
28F000304000
trusted library allocation
page read and write
C7C000
unkown
page execute and read and write
55BB000
stack
page read and write
18B92DAA000
heap
page read and write
1370000
direct allocation
page read and write
28F00001C000
trusted library allocation
page read and write
155C000
heap
page read and write
71F0000
direct allocation
page read and write
18B93290000
trusted library section
page read and write
9FE000
heap
page read and write
7BEC000
heap
page read and write
7CCE000
heap
page read and write
4D40000
direct allocation
page execute and read and write
A54000
heap
page read and write
2B6F000
stack
page read and write
18B8F758000
heap
page read and write
742000284000
direct allocation
page read and write
2A40000
direct allocation
page execute and read and write
18B92DB5000
heap
page read and write
28F000210000
trusted library allocation
page read and write
28F000CFC000
trusted library allocation
page read and write
3B6F000
stack
page read and write
4E11000
heap
page read and write
28F000C9C000
trusted library allocation
page read and write
28F000D70000
trusted library allocation
page read and write
A28000
heap
page read and write
667800418000
trusted library allocation
page read and write
46B1000
heap
page read and write
742000303000
direct allocation
page read and write
18B988E9000
heap
page read and write
31B4002C0000
trusted library allocation
page read and write
7201000
heap
page read and write
5C5D000
stack
page read and write
46B1000
heap
page read and write
18B92DBE000
heap
page read and write
46B1000
heap
page read and write
22439FE000
unkown
page readonly
46B1000
heap
page read and write
28F000EB0000
trusted library allocation
page read and write
18B8F950000
heap
page read and write
372F000
stack
page read and write
4A4F000
stack
page read and write
18B92DB5000
heap
page read and write
28F0002C0000
trusted library allocation
page read and write
3A3F000
stack
page read and write
390E000
stack
page read and write
18B92DA2000
heap
page read and write
18B92D99000
heap
page read and write
13AD000
heap
page read and write
18B8F7DF000
heap
page read and write
3007000
heap
page read and write
28F0007AC000
trusted library allocation
page read and write
71F0000
direct allocation
page read and write
4D01000
heap
page read and write
47CF000
stack
page read and write
7BE4000
heap
page read and write
46B1000
heap
page read and write
2FF0000
direct allocation
page read and write
18B92DB5000
heap
page read and write
CC1000
unkown
page execute and write copy
46B1000
heap
page read and write
18B999D1000
trusted library section
page read and write
A7C000
heap
page read and write
A69000
heap
page read and write
4BFE000
stack
page read and write
18B92DB0000
heap
page read and write
18B92DB5000
heap
page read and write
326E000
stack
page read and write
28F000E6C000
trusted library allocation
page read and write
343E000
stack
page read and write
46B1000
heap
page read and write
18B92DA4000
heap
page read and write
4D60000
direct allocation
page execute and read and write
66780035C000
trusted library allocation
page read and write
C7D000
unkown
page execute and write copy
28F000CD0000
trusted library allocation
page read and write
46B1000
heap
page read and write
28F000BA4000
trusted library allocation
page read and write
A2A000
heap
page read and write
2D6F000
stack
page read and write
28F000344000
trusted library allocation
page read and write
18B92DB3000
heap
page read and write
667800698000
trusted library allocation
page read and write
430E000
stack
page read and write
7910000
direct allocation
page execute and read and write
5B1D000
stack
page read and write
28F000134000
trusted library allocation
page read and write
4771000
heap
page read and write
83E0000
heap
page read and write
18B8F970000
trusted library allocation
page read and write
3D6F000
stack
page read and write
6678007B4000
trusted library allocation
page read and write
18B92DAA000
heap
page read and write
18B92DB5000
heap
page read and write
28F00080C000
trusted library allocation
page read and write
5460000
direct allocation
page execute and read and write
7CC2000
heap
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
2930000
direct allocation
page read and write
302F000
stack
page read and write
A6A000
heap
page read and write
22551FB000
stack
page read and write
18B8F740000
heap
page readonly
6678006D4000
trusted library allocation
page read and write
2930000
direct allocation
page read and write
28F000878000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
4E11000
heap
page read and write
18B92DAA000
heap
page read and write
18B92DAA000
heap
page read and write
28F000CD0000
trusted library allocation
page read and write
28F00033C000
trusted library allocation
page read and write
18B92DA4000
heap
page read and write
46B1000
heap
page read and write
597E000
stack
page read and write
D2B000
unkown
page execute and read and write
18B92DAA000
heap
page read and write
18B8F80A000
heap
page read and write
30EF000
stack
page read and write
18B92DB0000
heap
page read and write
4E11000
heap
page read and write
392E000
stack
page read and write
22449FE000
unkown
page readonly
7910000
direct allocation
page execute and read and write
2FF0000
direct allocation
page read and write
2930000
direct allocation
page read and write
667800640000
trusted library allocation
page read and write
3000000
heap
page read and write
4E11000
heap
page read and write
28F000F54000
trusted library allocation
page read and write
14E5000
heap
page read and write
18B999E0000
trusted library section
page read and write
4D80000
direct allocation
page execute and read and write
2A6F000
stack
page read and write
31B4002F8000
trusted library allocation
page read and write
5440000
direct allocation
page execute and read and write
18B9335A000
heap
page read and write
7201000
heap
page read and write
7DAA000
heap
page read and write
28F00000C000
trusted library allocation
page read and write
18B98917000
heap
page read and write
46B1000
heap
page read and write
18B92DB3000
heap
page read and write
18B92DAD000
heap
page read and write
18B92DB3000
heap
page read and write
3F0F000
stack
page read and write
18B92DB5000
heap
page read and write
2C6F000
stack
page read and write
5450000
direct allocation
page execute and read and write
7201000
heap
page read and write
18B92DB5000
heap
page read and write
4E11000
heap
page read and write
3A0F000
stack
page read and write
28F000ED0000
trusted library allocation
page read and write
46B1000
heap
page read and write
4E11000
heap
page read and write
4E11000
heap
page read and write
970000
heap
page read and write
9C2000
unkown
page execute and read and write
18B92DB3000
heap
page read and write
7BE9000
heap
page read and write
156C000
heap
page read and write
6678003EC000
trusted library allocation
page read and write
18B92DB3000
heap
page read and write
4B91000
direct allocation
page read and write
28F00073C000
trusted library allocation
page read and write
46B1000
heap
page read and write
18B932E0000
heap
page read and write
12D4000
heap
page read and write
2F3E000
stack
page read and write
41EE000
stack
page read and write
6678006E8000
trusted library allocation
page read and write
18B92DAD000
heap
page read and write
22571FD000
stack
page read and write
28F000F50000
trusted library allocation
page read and write
1370000
direct allocation
page read and write
46B1000
heap
page read and write
A63000
heap
page read and write
7E54000
heap
page read and write
46B1000
heap
page read and write
28F0009E0000
trusted library allocation
page read and write
9C9000
unkown
page write copy
18B92DA4000
heap
page read and write
46B1000
heap
page read and write
7D11000
heap
page read and write
667800298000
trusted library allocation
page read and write
18B93334000
heap
page read and write
6678006F0000
trusted library allocation
page read and write
4E11000
heap
page read and write
18B92DB0000
heap
page read and write
18B93380000
heap
page read and write
28F000A34000
trusted library allocation
page read and write
28F000401000
trusted library allocation
page read and write
71F0000
direct allocation
page read and write
52D0000
direct allocation
page execute and read and write
18B92DB5000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
18B92DAA000
heap
page read and write
225B1FE000
stack
page read and write
18B92DB5000
heap
page read and write
33AE000
stack
page read and write
46B1000
heap
page read and write
7201000
heap
page read and write
46B1000
heap
page read and write
18B92DB5000
heap
page read and write
46B1000
heap
page read and write
2A50000
direct allocation
page execute and read and write
18B92DB0000
heap
page read and write
990000
direct allocation
page read and write
18B92DB3000
heap
page read and write
7910000
direct allocation
page execute and read and write
667800614000
trusted library allocation
page read and write
7F72000
heap
page read and write
18B92DB5000
heap
page read and write
18B92DB3000
heap
page read and write
2930000
direct allocation
page read and write
667800210000
trusted library allocation
page read and write
12D4000
heap
page read and write
28F00031C000
trusted library allocation
page read and write
46B1000
heap
page read and write
28F00033C000
trusted library allocation
page read and write
28F0000FC000
trusted library allocation
page read and write
C7C000
unkown
page execute and write copy
497E000
stack
page read and write
31B4002C0000
trusted library allocation
page read and write
18B92DAD000
heap
page read and write
18B92DB0000
heap
page read and write
28F000CA0000
trusted library allocation
page read and write
6678006CC000
trusted library allocation
page read and write
4E11000
heap
page read and write
28F000B1C000
trusted library allocation
page read and write
28F000A50000
trusted library allocation
page read and write
22609FE000
unkown
page readonly
28F000298000
trusted library allocation
page read and write
667800688000
trusted library allocation
page read and write
4E11000
heap
page read and write
28F0001B4000
trusted library allocation
page read and write
4A7F000
stack
page read and write
FDA000
heap
page read and write
4E11000
heap
page read and write
4B8F000
stack
page read and write
225B9FE000
unkown
page readonly
18B92DB3000
heap
page read and write
22519FE000
unkown
page readonly
46B1000
heap
page read and write
28F0002FB000
trusted library allocation
page read and write
6A2E000
heap
page read and write
96F000
stack
page read and write
66C000
stack
page read and write
7BE0000
heap
page read and write
52D0000
direct allocation
page execute and read and write
364F000
stack
page read and write
5360000
direct allocation
page execute and read and write
18B93389000
heap
page read and write
4E11000
heap
page read and write
28F0000AC000
trusted library allocation
page read and write
18B92DB5000
heap
page read and write
46B1000
heap
page read and write
4D50000
direct allocation
page execute and read and write
A67000
heap
page read and write
28F0002B4000
trusted library allocation
page read and write
18B92DA4000
heap
page read and write
667800758000
trusted library allocation
page read and write
667800754000
trusted library allocation
page read and write
22681FE000
stack
page read and write
28F000CBC000
trusted library allocation
page read and write
1D84000
heap
page read and write
28F000A0C000
trusted library allocation
page read and write
31B4002BC000
trusted library allocation
page read and write
4D00000
heap
page read and write
2A30000
direct allocation
page execute and read and write
813F000
stack
page read and write
5EC5000
heap
page read and write
226D1FE000
stack
page read and write
18B92DAA000
heap
page read and write
7BE9000
heap
page read and write
22599FE000
unkown
page readonly
224D9FE000
unkown
page readonly
961000
unkown
page execute and write copy
39EE000
stack
page read and write
1375000
heap
page read and write
4E10000
heap
page read and write
31B400288000
trusted library allocation
page read and write
18B92DB0000
heap
page read and write
28F0005E0000
trusted library allocation
page read and write
28F0004AC000
trusted library allocation
page read and write
46B1000
heap
page read and write
28F0001B4000
trusted library allocation
page read and write
18B933B1000
heap
page read and write
28F000D90000
trusted library allocation
page read and write
7690000
direct allocation
page read and write
7BEA000
heap
page read and write
990000
direct allocation
page read and write
22441FE000
stack
page read and write
18B92DB0000
heap
page read and write
66780075C000
trusted library allocation
page read and write
667800380000
trusted library allocation
page read and write
7F8E000
heap
page read and write
28F000330000
trusted library allocation
page read and write
28F0009BC000
trusted library allocation
page read and write
462F000
stack
page read and write
9AA000
heap
page read and write
18B92DB3000
heap
page read and write
18B92DAD000
heap
page read and write
2FEE000
stack
page read and write
18B92DB5000
heap
page read and write
C3A000
unkown
page execute and read and write
7201000
heap
page read and write
18B92DA2000
heap
page read and write
4E11000
heap
page read and write
18B93361000
heap
page read and write
71F0000
direct allocation
page read and write
18B92DB3000
heap
page read and write
5310000
direct allocation
page execute and read and write
18B92DB3000
heap
page read and write
7910000
direct allocation
page execute and read and write
18B92DA4000
heap
page read and write
18B92DB3000
heap
page read and write
7D73000
heap
page read and write
22431FE000
stack
page read and write
7BE9000
heap
page read and write
18B92DB5000
heap
page read and write
31B4002BC000
trusted library allocation
page read and write
28F000230000
trusted library allocation
page read and write
2930000
direct allocation
page read and write
31B4002B0000
trusted library allocation
page read and write
28F00090C000
trusted library allocation
page read and write
A1D000
heap
page read and write
28F0005A4000
trusted library allocation
page read and write
22629FE000
unkown
page readonly
7BE7000
heap
page read and write
28F00018C000
trusted library allocation
page read and write
667800260000
trusted library allocation
page read and write
46CE000
stack
page read and write
18B92DCF000
heap
page read and write
EBC000
stack
page read and write
28F0001F8000
trusted library allocation
page read and write
4E11000
heap
page read and write
667800744000
trusted library allocation
page read and write
1370000
direct allocation
page read and write
46B1000
heap
page read and write
18B92DB3000
heap
page read and write
22671FE000
stack
page read and write
2930000
direct allocation
page read and write
31B400248000
trusted library allocation
page read and write
4E11000
heap
page read and write
C6D000
unkown
page execute and read and write
52E0000
direct allocation
page execute and read and write
46B1000
heap
page read and write
5470000
direct allocation
page execute and read and write
18B92DB6000
heap
page read and write
18B92DA3000
heap
page read and write
28F000590000
trusted library allocation
page read and write
12D4000
heap
page read and write
4E17000
heap
page read and write
7CE0000
heap
page read and write
28F000290000
trusted library allocation
page read and write
28F000ED8000
trusted library allocation
page read and write
7BEE000
heap
page read and write
18B93373000
heap
page read and write
18B92DB5000
heap
page read and write
990000
direct allocation
page read and write
FCD000
unkown
page execute and read and write
22541FE000
stack
page read and write
5420000
direct allocation
page execute and read and write
7D75000
heap
page read and write
18B92DB0000
heap
page read and write
74200024C000
direct allocation
page read and write
28F0001F4000
trusted library allocation
page read and write
28F0002F3000
trusted library allocation
page read and write
7201000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
78E0000
direct allocation
page execute and read and write
7201000
heap
page read and write
FB0000
heap
page read and write
2967000
heap
page read and write
28F000470000
trusted library allocation
page read and write
46B1000
heap
page read and write
52C0000
direct allocation
page execute and read and write
9F4000
heap
page read and write
38CF000
stack
page read and write
3BBE000
stack
page read and write
28F000CB0000
trusted library allocation
page read and write
18B92DB5000
heap
page read and write
28F000E7C000
trusted library allocation
page read and write
7900000
direct allocation
page execute and read and write
4C51000
direct allocation
page read and write
71F0000
direct allocation
page read and write
1D84000
heap
page read and write
28F000850000
trusted library allocation
page read and write
4CF0000
direct allocation
page execute and read and write
18B92DB3000
heap
page read and write
6678002DC000
trusted library allocation
page read and write
456F000
stack
page read and write
7BEE000
heap
page read and write
F2F000
stack
page read and write
135E000
stack
page read and write
C3A000
unkown
page execute and read and write
4E11000
heap
page read and write
528C000
stack
page read and write
18B92DB0000
heap
page read and write
667800654000
trusted library allocation
page read and write
31B400270000
trusted library allocation
page read and write
18B92DB0000
heap
page read and write
7D15000
heap
page read and write
31B4002F4000
trusted library allocation
page read and write
46B1000
heap
page read and write
7BED000
heap
page read and write
28F000DCC000
trusted library allocation
page read and write
9E6000
heap
page read and write
367F000
stack
page read and write
7690000
direct allocation
page read and write
3F6E000
stack
page read and write
224A1FC000
stack
page read and write
28F000B30000
trusted library allocation
page read and write
1220000
heap
page read and write
46B1000
heap
page read and write
292E000
stack
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
960000
unkown
page read and write
28F000304000
trusted library allocation
page read and write
2FBE000
stack
page read and write
4F10000
trusted library allocation
page read and write
742000215000
direct allocation
page read and write
6678006D0000
trusted library allocation
page read and write
7201000
heap
page read and write
46B1000
heap
page read and write
18B93392000
heap
page read and write
7BE2000
heap
page read and write
7201000
heap
page read and write
46B1000
heap
page read and write
476F000
stack
page read and write
46B1000
heap
page read and write
2FF0000
direct allocation
page read and write
9C9000
unkown
page write copy
28F000554000
trusted library allocation
page read and write
28F000D4C000
trusted library allocation
page read and write
28F000294000
trusted library allocation
page read and write
7BE4000
heap
page read and write
7BE3000
heap
page read and write
1370000
direct allocation
page read and write
28F0006F8000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
18B92DCB000
heap
page read and write
28F000BE0000
trusted library allocation
page read and write
742000234000
direct allocation
page read and write
18B92DB3000
heap
page read and write
4E11000
heap
page read and write
28F00016C000
trusted library allocation
page read and write
667800330000
trusted library allocation
page read and write
406F000
stack
page read and write
6678007CC000
trusted library allocation
page read and write
5400000
direct allocation
page execute and read and write
28F00040C000
trusted library allocation
page read and write
7420002EC000
direct allocation
page read and write
28F000F88000
trusted library allocation
page read and write
18B92DB5000
heap
page read and write
7FFC000
stack
page read and write
18B92DCB000
heap
page read and write
28F00020C000
trusted library allocation
page read and write
18B92DA4000
heap
page read and write
2F7E000
stack
page read and write
2F2E000
stack
page read and write
66780080C000
trusted library allocation
page read and write
28F000E01000
trusted library allocation
page read and write
4C70000
direct allocation
page execute and read and write
18B92DB0000
heap
page read and write
667800724000
trusted library allocation
page read and write
28F000D14000
trusted library allocation
page read and write
18B92DA4000
heap
page read and write
46B1000
heap
page read and write
5F1E000
stack
page read and write
28F000B94000
trusted library allocation
page read and write
83AC000
stack
page read and write
18B92DB3000
heap
page read and write
7F5F000
heap
page read and write
4D10000
direct allocation
page execute and read and write
18B92DA4000
heap
page read and write
28F000CEC000
trusted library allocation
page read and write
66780078C000
trusted library allocation
page read and write
28F000060000
trusted library allocation
page read and write
28F000B2C000
trusted library allocation
page read and write
7201000
heap
page read and write
7201000
heap
page read and write
4E11000
heap
page read and write
340E000
stack
page read and write
22419FE000
unkown
page readonly
18B92DA4000
heap
page read and write
28F000C20000
trusted library allocation
page read and write
1360000
heap
page read and write
18B92DB3000
heap
page read and write
71F0000
direct allocation
page read and write
CB0000
direct allocation
page read and write
9C9000
unkown
page write copy
1370000
direct allocation
page read and write
46B1000
heap
page read and write
3E0E000
stack
page read and write
A63000
heap
page read and write
7BEC000
heap
page read and write
76D000
stack
page read and write
4D0E000
stack
page read and write
28F000C39000
trusted library allocation
page read and write
4E11000
heap
page read and write
46B1000
heap
page read and write
C7D000
unkown
page execute and write copy
990000
direct allocation
page read and write
667800220000
trusted library allocation
page read and write
28F000C0C000
trusted library allocation
page read and write
2FF0000
direct allocation
page read and write
18B92DB0000
heap
page read and write
4E11000
heap
page read and write
30FF000
stack
page read and write
7DD1000
heap
page read and write
18B92DB5000
heap
page read and write
28F000078000
trusted library allocation
page read and write
7D5D000
heap
page read and write
28F000294000
trusted library allocation
page read and write
C7D000
unkown
page execute and write copy
92E000
stack
page read and write
55FE000
stack
page read and write
18B92DAA000
heap
page read and write
18B92DB5000
heap
page read and write
667800630000
trusted library allocation
page read and write
18B92DCF000
heap
page read and write
31B4002B0000
trusted library allocation
page read and write
18B92DAA000
heap
page read and write
22691FD000
stack
page read and write
22641FD000
stack
page read and write
22479FE000
unkown
page readonly
2CAE000
stack
page read and write
18B92DAA000
heap
page read and write
66780020C000
trusted library allocation
page read and write
18B92040000
unkown
page read and write
7BE7000
heap
page read and write
614F000
stack
page read and write
28F000438000
trusted library allocation
page read and write
131E000
stack
page read and write
18B92DB5000
heap
page read and write
7BE7000
heap
page read and write
18B92DAA000
heap
page read and write
31B400220000
trusted library allocation
page read and write
7CAC000
heap
page read and write
5420000
direct allocation
page execute and read and write
28F000B00000
trusted library allocation
page read and write
46B1000
heap
page read and write
5370000
direct allocation
page execute and read and write
18B92DB5000
heap
page read and write
A65000
heap
page read and write
46B1000
heap
page read and write
46C1000
heap
page read and write
18B933B1000
heap
page read and write
22611FE000
stack
page read and write
18B92DB5000
heap
page read and write
7910000
direct allocation
page execute and read and write
28F000220000
trusted library allocation
page read and write
9C9000
unkown
page write copy
18B92DB5000
heap
page read and write
18B92DA4000
heap
page read and write
28F000B9C000
trusted library allocation
page read and write
4771000
heap
page read and write
7BE8000
heap
page read and write
9C9000
unkown
page write copy
7201000
heap
page read and write
667800601000
trusted library allocation
page read and write
A64000
heap
page read and write
18B98F33000
heap
page read and write
404F000
stack
page read and write
BDE000
stack
page read and write
7201000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
18B92DB5000
heap
page read and write
18B9890D000
heap
page read and write
3AEF000
stack
page read and write
18B92DB0000
heap
page read and write
18B92DB5000
heap
page read and write
38AE000
stack
page read and write
18B92DAA000
heap
page read and write
667800330000
trusted library allocation
page read and write
18B92DA2000
heap
page read and write
28F00056C000
trusted library allocation
page read and write
31B4002C0000
trusted library allocation
page read and write
28F00079C000
trusted library allocation
page read and write
28F00081C000
trusted library allocation
page read and write
53DF000
stack
page read and write
28F000380000
trusted library allocation
page read and write
28F0006A4000
trusted library allocation
page read and write
6678002C8000
trusted library allocation
page read and write
7201000
heap
page read and write
18B92DB3000
heap
page read and write
3DEF000
stack
page read and write
4771000
heap
page read and write
4E11000
heap
page read and write
28F000AB0000
trusted library allocation
page read and write
18B92DAA000
heap
page read and write
5D5D000
stack
page read and write
2950000
direct allocation
page read and write
12D0000
heap
page read and write
7201000
heap
page read and write
2950000
direct allocation
page read and write
32EE000
stack
page read and write
28F000F04000
trusted library allocation
page read and write
4D60000
direct allocation
page execute and read and write
9C9000
unkown
page write copy
4C70000
direct allocation
page execute and read and write
28F00052C000
trusted library allocation
page read and write
28F000B6C000
trusted library allocation
page read and write
18B92DB0000
heap
page read and write
2E6F000
stack
page read and write
493F000
stack
page read and write
CB0000
direct allocation
page read and write
353F000
stack
page read and write
46B1000
heap
page read and write
9A0000
heap
page read and write
5420000
direct allocation
page execute and read and write
71F0000
direct allocation
page read and write
46B1000
heap
page read and write
18B92DAA000
heap
page read and write
28F000330000
trusted library allocation
page read and write
4770000
heap
page read and write
960000
unkown
page read and write
18B92DB5000
heap
page read and write
46B1000
heap
page read and write
18B92DAA000
heap
page read and write
446E000
stack
page read and write
667800750000
trusted library allocation
page read and write
7D52000
heap
page read and write
59CE000
stack
page read and write
7D71000
heap
page read and write
36BE000
stack
page read and write
7CFB000
heap
page read and write
7DA7000
heap
page read and write
7201000
heap
page read and write
18B92DA4000
heap
page read and write
2C6F000
stack
page read and write
7E76000
heap
page read and write
604E000
stack
page read and write
18B92DBA000
heap
page read and write
18B93389000
heap
page read and write
18B93361000
heap
page read and write
5480000
direct allocation
page execute and read and write
18B92DA4000
heap
page read and write
226C9FE000
unkown
page readonly
28F000294000
trusted library allocation
page read and write
71F0000
direct allocation
page read and write
667800374000
trusted library allocation
page read and write
18B92DB0000
heap
page read and write
667800424000
trusted library allocation
page read and write
583F000
stack
page read and write
28F000D54000
trusted library allocation
page read and write
18B92DB5000
heap
page read and write
31B400238000
trusted library allocation
page read and write
22549FE000
unkown
page readonly
6678006E0000
trusted library allocation
page read and write
52A0000
direct allocation
page read and write
28F000328000
trusted library allocation
page read and write
18B92DA5000
heap
page read and write
6678006E4000
trusted library allocation
page read and write
18B92DD1000
heap
page read and write
667800368000
trusted library allocation
page read and write
6A21000
heap
page read and write
28F0001E4000
trusted library allocation
page read and write
22651FE000
stack
page read and write
483E000
stack
page read and write
7C77000
heap
page read and write
742000260000
direct allocation
page read and write
28F00021C000
trusted library allocation
page read and write
18B92DB5000
heap
page read and write
4771000
heap
page read and write
155B000
heap
page read and write
6678006C8000
trusted library allocation
page read and write
4DF0000
direct allocation
page execute and read and write
18B92DB0000
heap
page read and write
28F000E30000
trusted library allocation
page read and write
5C1C000
stack
page read and write
71F0000
direct allocation
page read and write
7201000
heap
page read and write
961000
unkown
page execute and write copy
7F32000
heap
page read and write
46B1000
heap
page read and write
18B8F9B0000
trusted library section
page readonly
18B92D9E000
heap
page read and write
18B92DAB000
heap
page read and write
4D01000
heap
page read and write
4E11000
heap
page read and write
3A4E000
stack
page read and write
18B92DAD000
heap
page read and write
28F000A28000
trusted library allocation
page read and write
3F7E000
stack
page read and write
28F0001AC000
trusted library allocation
page read and write
18B92DAE000
heap
page read and write
18B92DB5000
heap
page read and write
7D9B000
direct allocation
page read and write
A41000
heap
page read and write
18B92D9E000
heap
page read and write
46B1000
heap
page read and write
28F000DB8000
trusted library allocation
page read and write
22579FE000
unkown
page readonly
28F000DE8000
trusted library allocation
page read and write
28F000E98000
trusted library allocation
page read and write
4D01000
heap
page read and write
18B92DAD000
heap
page read and write
225C9FE000
unkown
page readonly
66780040C000
trusted library allocation
page read and write
18B92DA4000
heap
page read and write
18B92DB3000
heap
page read and write
46B1000
heap
page read and write
7BE8000
heap
page read and write
28F000054000
trusted library allocation
page read and write
18B92DA4000
heap
page read and write
74200023C000
direct allocation
page read and write
28F000D04000
trusted library allocation
page read and write
7201000
heap
page read and write
18B92DCB000
heap
page read and write
22659FE000
unkown
page readonly
412F000
stack
page read and write
46B1000
heap
page read and write
18B972E0000
trusted library section
page read and write
667800348000
trusted library allocation
page read and write
667800694000
trusted library allocation
page read and write
28F000601000
trusted library allocation
page read and write
4E11000
heap
page read and write
22581FD000
stack
page read and write
226E1FE000
stack
page read and write
46B1000
heap
page read and write
7201000
heap
page read and write
46B1000
heap
page read and write
A6A000
heap
page read and write
46FE000
stack
page read and write
7BE5000
heap
page read and write
667800610000
trusted library allocation
page read and write
28F00006C000
trusted library allocation
page read and write
18B92DAA000
heap
page read and write
CC0000
unkown
page read and write
18B92DAA000
heap
page read and write
28F000430000
trusted library allocation
page read and write
28F0002B8000
trusted library allocation
page read and write
667800684000
trusted library allocation
page read and write
3F3F000
stack
page read and write
1230000
heap
page read and write
18B92DB5000
heap
page read and write
51BE000
stack
page read and write
742000290000
direct allocation
page read and write
4E11000
heap
page read and write
E1E000
unkown
page execute and read and write
18B92DB5000
heap
page read and write
7BE9000
heap
page read and write
31B4002F0000
trusted library allocation
page read and write
46B1000
heap
page read and write
1370000
direct allocation
page read and write
300B000
heap
page read and write
18B92DAA000
heap
page read and write
6678002E4000
trusted library allocation
page read and write
28F00033C000
trusted library allocation
page read and write
28F000540000
trusted library allocation
page read and write
28F0006EC000
trusted library allocation
page read and write
18B92DA4000
heap
page read and write
ADE000
stack
page read and write
28AE000
stack
page read and write
226B1FC000
stack
page read and write
14B0000
heap
page read and write
28F0005EC000
trusted library allocation
page read and write
22461FB000
stack
page read and write
28F000DF4000
trusted library allocation
page read and write
12D4000
heap
page read and write
7BE2000
heap
page read and write
46B1000
heap
page read and write
990000
direct allocation
page read and write
7201000
heap
page read and write
7201000
heap
page read and write
7201000
heap
page read and write
18B92DAD000
heap
page read and write
22619FE000
unkown
page readonly
32CE000
stack
page read and write
28F000198000
trusted library allocation
page read and write
18B92DA4000
heap
page read and write
1D84000
heap
page read and write
1D84000
heap
page read and write
2930000
direct allocation
page read and write
6678002F0000
trusted library allocation
page read and write
41FE000
stack
page read and write
12D4000
heap
page read and write
667800330000
trusted library allocation
page read and write
C6D000
unkown
page execute and read and write
4E11000
heap
page read and write
28F000394000
trusted library allocation
page read and write
18B98F30000
heap
page read and write
667800770000
trusted library allocation
page read and write
18B92DAA000
heap
page read and write
18B93354000
heap
page read and write
28F0008B0000
trusted library allocation
page read and write
28F00060C000
trusted library allocation
page read and write
31B4002E4000
trusted library allocation
page read and write
18B8F9F0000
heap
page read and write
28F00083B000
trusted library allocation
page read and write
7BE3000
heap
page read and write
7420002DC000
direct allocation
page read and write
18B92DAD000
heap
page read and write
7690000
direct allocation
page read and write
18B92DB5000
heap
page read and write
4D60000
direct allocation
page execute and read and write
28F000C01000
trusted library allocation
page read and write
18B92DA4000
heap
page read and write
22421FE000
stack
page read and write
18B92D9E000
heap
page read and write
46B1000
heap
page read and write
5E1D000
stack
page read and write
3EEE000
stack
page read and write
18B92DAA000
heap
page read and write
28F000D24000
trusted library allocation
page read and write
18B92DB5000
heap
page read and write
350F000
stack
page read and write
9F2000
heap
page read and write
46B1000
heap
page read and write
18B92DAA000
heap
page read and write
18B92DAA000
heap
page read and write
22501FA000
stack
page read and write
667800294000
trusted library allocation
page read and write
5300000
direct allocation
page execute and read and write
7910000
direct allocation
page execute and read and write
2FF0000
direct allocation
page read and write
18B93354000
heap
page read and write
4D30000
direct allocation
page execute and read and write
4E11000
heap
page read and write
18B933B1000
heap
page read and write
18B93334000
heap
page read and write
28F000350000
trusted library allocation
page read and write
18B92DB3000
heap
page read and write
960000
unkown
page readonly
18B92DB3000
heap
page read and write
31B4002D8000
trusted library allocation
page read and write
46B1000
heap
page read and write
28F000EF4000
trusted library allocation
page read and write
468F000
stack
page read and write
18B99BA0000
trusted library section
page read and write
7C86000
heap
page read and write
667800248000
trusted library allocation
page read and write
31B400278000
trusted library allocation
page read and write
1370000
direct allocation
page read and write
28F000E7A000
trusted library allocation
page read and write
18B92DB5000
heap
page read and write
31B4002A0000
trusted library allocation
page read and write
4E11000
heap
page read and write
EB6000
unkown
page execute and read and write
12D4000
heap
page read and write
18B9333E000
heap
page read and write
32AF000
stack
page read and write
5430000
direct allocation
page execute and read and write
7D89000
heap
page read and write
4E11000
heap
page read and write
28F0001DC000
trusted library allocation
page read and write
667800354000
trusted library allocation
page read and write
3FEF000
stack
page read and write
18B92DAA000
heap
page read and write
28F0002BC000
trusted library allocation
page read and write
18B92DB0000
heap
page read and write
28F000E3C000
trusted library allocation
page read and write
18B8F920000
heap
page read and write
A54000
heap
page read and write
28F000C4C000
trusted library allocation
page read and write
3F0000
heap
page read and write
4D00000
direct allocation
page execute and read and write
9FE000
heap
page read and write
18B995D0000
trusted library section
page read and write
28F0001AC000
trusted library allocation
page read and write
18B92D9E000
heap
page read and write
865000
heap
page read and write
18B92DAA000
heap
page read and write
1D84000
heap
page read and write
7DC3000
heap
page read and write
A6A000
heap
page read and write
354E000
stack
page read and write
22561FA000
stack
page read and write
4D70000
direct allocation
page execute and read and write
7FC9000
heap
page read and write
31B4002C8000
trusted library allocation
page read and write
28F000D04000
trusted library allocation
page read and write
A24000
heap
page read and write
7201000
heap
page read and write
7EDA000
heap
page read and write
7C8D000
heap
page read and write
7DEA000
heap
page read and write
46B1000
heap
page read and write
667800704000
trusted library allocation
page read and write
28F000864000
trusted library allocation
page read and write
46B1000
heap
page read and write
71F0000
direct allocation
page read and write
4E11000
heap
page read and write
46B1000
heap
page read and write
28F000628000
trusted library allocation
page read and write
28F000EEC000
trusted library allocation
page read and write
18B93327000
heap
page read and write
63CF000
stack
page read and write
2FD0000
direct allocation
page execute and read and write
18B92DB0000
heap
page read and write
393E000
stack
page read and write
2FAF000
stack
page read and write
18B933C4000
heap
page read and write
225F9FE000
unkown
page readonly
28F0001AC000
trusted library allocation
page read and write
46B1000
heap
page read and write
18B96EE4000
trusted library allocation
page read and write
18B92DAD000
heap
page read and write
18B92DA4000
heap
page read and write
4D60000
direct allocation
page execute and read and write
28F000D44000
trusted library allocation
page read and write
28F0003C0000
trusted library allocation
page read and write
46B1000
heap
page read and write
3DFF000
stack
page read and write
7910000
direct allocation
page execute and read and write
4E11000
heap
page read and write
667800430000
trusted library allocation
page read and write
18B92DB5000
heap
page read and write
18B933D3000
heap
page read and write
18B92DB5000
heap
page read and write
18B92DB5000
heap
page read and write
742000201000
direct allocation
page read and write
A7E000
heap
page read and write
28F000438000
trusted library allocation
page read and write
4E11000
heap
page read and write
18B98DF7000
unclassified section
page read and write
46B1000
heap
page read and write
47B0000
trusted library allocation
page read and write
1180000
unkown
page execute and write copy
18B93352000
heap
page read and write
18B92DAD000
heap
page read and write
28F000C74000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
667800230000
trusted library allocation
page read and write
2930000
direct allocation
page read and write
3E2E000
stack
page read and write
18B92D9E000
heap
page read and write
1D84000
heap
page read and write
2EEF000
stack
page read and write
18B92DB3000
heap
page read and write
322F000
stack
page read and write
18B99A40000
trusted library section
page read and write
33EF000
stack
page read and write
3B7F000
stack
page read and write
C9E000
stack
page read and write
2FF7000
heap
page read and write
46B1000
heap
page read and write
7D99000
direct allocation
page read and write
22471FB000
stack
page read and write
A41000
heap
page read and write
5420000
direct allocation
page execute and read and write
28F0006EC000
trusted library allocation
page read and write
18B92DAA000
heap
page read and write
28F000CEC000
trusted library allocation
page read and write
7CC2000
heap
page read and write
18B92DB5000
heap
page read and write
7420002AC000
direct allocation
page read and write
4771000
heap
page read and write
18B92DCF000
heap
page read and write
28F000C58000
trusted library allocation
page read and write
442F000
stack
page read and write
28F0005CD000
trusted library allocation
page read and write
FAE000
stack
page read and write
28F000214000
trusted library allocation
page read and write
38FF000
stack
page read and write
22699FE000
unkown
page readonly
7201000
heap
page read and write
18B92DA2000
heap
page read and write
4CFF000
stack
page read and write
28F000B80000
trusted library allocation
page read and write
12D4000
heap
page read and write
667800700000
trusted library allocation
page read and write
18B92DB0000
heap
page read and write
62CE000
stack
page read and write
1370000
heap
page read and write
28F000AD0000
trusted library allocation
page read and write
18B92DA4000
heap
page read and write
225C1FC000
stack
page read and write
444E000
stack
page read and write
7BE6000
heap
page read and write
156B000
heap
page read and write
28F0001B4000
trusted library allocation
page read and write
33CF000
stack
page read and write
28F0008D0000
trusted library allocation
page read and write
3E3E000
stack
page read and write
1529000
heap
page read and write
18B92DA2000
heap
page read and write
18B92DB5000
heap
page read and write
7201000
heap
page read and write
18B92DAA000
heap
page read and write
18B92DA4000
heap
page read and write
226A9FE000
unkown
page readonly
28F00066C000
trusted library allocation
page read and write
7C82000
heap
page read and write
46B1000
heap
page read and write
18B92DAD000
heap
page read and write
28F000DDC000
trusted library allocation
page read and write
18B92DB0000
heap
page read and write
6678002C0000
trusted library allocation
page read and write
28F00029C000
trusted library allocation
page read and write
There are 2001 hidden memdumps, click here to show them.