IOC Report
SecuriteInfo.com.Win32.TrojanX-gen.22693.32340.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.TrojanX-gen.22693.32340.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\cred64[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\amert[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\sarra[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\clip64[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\00c07260dc\explorgu.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000042001\ad0e9cf6d6.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000049001\amert.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000051001\b977f667d6.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\_Files_\DTBZGIOOSO.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\KATAXZVCPS.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\ONBQCLYSPU.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\VLZDGUKUTZ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\XZXHAVGRAG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\XZXHAVGRAG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j2qb2s3w.5yd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mzuezop3.mqp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nwkgvscn.0ig.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zacizpva.dzm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
dropped
C:\Windows\Tasks\explorgu.job
data
dropped
C:\Windows\Tasks\explorha.job
data
dropped
There are 22 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.22693.32340.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.22693.32340.exe"
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
"C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe"
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
malicious
C:\Windows\System32\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
malicious
C:\Windows\System32\netsh.exe
netsh wlan show profiles
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
malicious
C:\Users\user\AppData\Local\Temp\1000042001\ad0e9cf6d6.exe
"C:\Users\user\AppData\Local\Temp\1000042001\ad0e9cf6d6.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
"C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000042001\ad0e9cf6d6.exe
"C:\Users\user\AppData\Local\Temp\1000042001\ad0e9cf6d6.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000049001\amert.exe
"C:\Users\user\AppData\Local\Temp\1000049001\amert.exe"
malicious
C:\Users\user\AppData\Local\Temp\00c07260dc\explorgu.exe
C:\Users\user\AppData\Local\Temp\00c07260dc\explorgu.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000042001\ad0e9cf6d6.exe
"C:\Users\user\AppData\Local\Temp\1000042001\ad0e9cf6d6.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\Temp\00c07260dc\explorgu.exe
C:\Users\user\AppData\Local\Temp\00c07260dc\explorgu.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 16 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1
193.233.132.56
malicious
http://193.233.132.56/Pneh2sXQk0/Plugins/clip64.dll
193.233.132.56
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://193.233.132.56/Pneh2sXQk0/Plugins/cred64.dll
193.233.132.56
malicious
http://193.233.132.56/Pneh2sXQk0/index.php
193.233.132.56
malicious
http://193.233.132.56/Pneh2sXQk0/Plugins/clip64.dllh
unknown
http://193.233.132.56/Pneh2sXQk0/index.phpll32.dll
unknown
https://db-ip.com/demo/home.php?s=81.181.54.609
unknown
https://db-ip.com/
unknown
https://ipinfo.io:443/widget/demo/81.181.54.60R
unknown
http://193.233.132.56/Pneh2sXQk0/index.phpded
unknown
https://ipinfo.io:443/widget/demo/81.181.54.60P
unknown
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1Trg
unknown
https://t.me/RiseProSUPPORTW
unknown
https://t.me/risepro_bot:y
unknown
https://db-ip.com/demo/home.php?s=81.181.54.60e
unknown
https://nuget.org/nuget.exe
unknown
https://ipinfo.io/widget/demo/81.181.54.60s
unknown
https://t.me/risepro_botisepro_bot
unknown
https://db-ip.com/demo/home.php?s=81.181.54.60u
unknown
https://db-ip.com/demo/home.php?s=81.181.54.60r
unknown
https://t.me/risepro_botrisepro4.60#
unknown
http://www.winimage.com/zLibDllDp
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://193.233.132.56/
unknown
https://db-ip.com/demo/home.php?s=81.181.54.60l
unknown
http://193.233.132.167/mine/amert.exeQ
unknown
http://193.233.132.56/Pneh2sXQk0/index.php51001
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
https://t.me/risepro_botlaterH
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/Icon
unknown
https://db-ip.com/W
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://t.me/RiseProSUPPORT
unknown
https://t.me/RiseProSUPPORT7uW
unknown
http://193.233.132.56/Pneh2sXQk0/index.phpIY
unknown
http://193.233.132.56/Pneh2sXQk0/Plugins/clip64.dllB
unknown
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1;BU)(A;OICI;GXGR;;;WD)AY
unknown
https://github.com/Pester/Pester
unknown
https://ipinfo.io/B
unknown
https://db-ip.com:443/demo/home.php?s=81.181.54.60z
unknown
https://ipinfo.io/E
unknown
http://193.233.132.167/mine/random.exeu
unknown
http://193.233.132.167/lend/alexxxxxxxx.exe
193.233.132.167
http://193.233.132.167/mine/random.exeo
unknown
https://ipinfo.io/
unknown
https://ipinfo.io/widget/demo/81.181.54.604
unknown
https://t.me/RiseProSUPPORT.C
unknown
https://db-ip.com/y
unknown
http://193.233.132.167/cost/random.exe
193.233.132.167
http://schemas.xmlsoap.org/wsdl/
unknown
https://db-ip.com:443/demo/home.php?s=81.181.54.60j11
unknown
https://ipinfo.io/widget/demo/81.181.54.607g
unknown
http://193.233.132.56/Pneh2sXQk0/index.php1Y
unknown
http://193.233.132.56/Pneh2sXQk0/index.phpl
unknown
http://193.233.132.167/cost/sarra.exe
193.233.132.167
https://db-ip.com/demo/home.php?s=81.181.54.603
unknown
https://ipinfo.io/widget/demo/81.181.54.60D
unknown
https://ipinfo.io/widget/demo/81.181.54.60G
unknown
http://193.233.132.167/mine/random.exe5e67ee
unknown
http://www.winimage.com/zLibDllDpRTpR
unknown
https://t.me/RiseProSUPPORTy
unknown
http://193.233.132.167/mine/random.exe
193.233.132.167
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1=1
unknown
https://t.me/risepro_botH
unknown
https://contoso.com/License
unknown
http://193.233.132.56/Pneh2sXQk0/index.phpq8
unknown
https://db-ip.com/%
unknown
http://193.233.132.167/mine/random.exe5e67ee8
unknown
https://db-ip.com/?
unknown
https://ipinfo.io:443/widget/demo/81.181.54.60
unknown
https://ipinfo.io/s
unknown
https://contoso.com/
unknown
http://193.233.132.56/Pneh2sXQk0/index.phpF
unknown
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1heH
unknown
https://t.me/risepro_bot=
unknown
http://193.233.132.56/Pneh2sXQk0/index.phpUsers
unknown
https://db-ip.com/O
unknown
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1%r0
unknown
https://db-ip.com:443/demo/home.php?s=81.181.54.60
unknown
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1a
unknown
http://nuget.org/NuGet.exe
unknown
https://t.me/risepro_bot.60$
unknown
https://db-ip.com/demo/home.php?s=81.181.54.60z
unknown
https://t..
unknown
https://aka.ms/winsvr-2022-pshelpX
unknown
https://t.me/risepro_botisepro_bot=y
unknown
https://ipinfo.io/widget/demo/81.181.54.60
34.117.186.192
https://ipinfo.io/Mozilla/5.0
unknown
https://t.me/risepro_bot4y
unknown
https://t.me/risepro_bot
unknown
http://193.233.132.56/Pneh2sXQk0/index.phpmb3JtLXVybGVuY29kZWQ=
unknown
http://193.233.132.167/mine/amert.exe
193.233.132.167
https://db-ip.com/demo/home.php?s=81.181.54.60
172.67.75.166
http://www.winimage.com/zLibDll
unknown
https://aka.ms/pscore68
unknown
http://193.233.132.56/Pneh2sXQk0/index.phpoded
unknown
https://t.me/risepro_bot.604
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
db-ip.com
172.67.75.166

IPs

IP
Domain
Country
Malicious
147.45.47.93
unknown
Russian Federation
malicious
193.233.132.56
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
172.67.75.166
db-ip.com
United States
193.233.132.167
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ad0e9cf6d6.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4D90000
direct allocation
page read and write
malicious
5320000
direct allocation
page read and write
malicious
4920000
direct allocation
page read and write
malicious
4920000
direct allocation
page read and write
malicious
101000
unkown
page execute and read and write
malicious
152E000
heap
page read and write
malicious
101000
unkown
page execute and read and write
malicious
481000
unkown
page execute and read and write
malicious
E31000
unkown
page execute and read and write
malicious
481000
unkown
page execute and read and write
malicious
4E50000
direct allocation
page read and write
malicious
B01000
unkown
page execute and read and write
malicious
4E00000
direct allocation
page read and write
malicious
56F0000
direct allocation
page read and write
malicious
4F10000
direct allocation
page read and write
malicious
161000
unkown
page execute and read and write
malicious
161000
unkown
page execute and read and write
malicious
9A1000
unkown
page execute and read and write
malicious
101000
unkown
page execute and read and write
malicious
5340000
direct allocation
page read and write
malicious
E31000
unkown
page execute and read and write
malicious
4700000
direct allocation
page read and write
malicious
481000
unkown
page execute and read and write
malicious
4C10000
direct allocation
page read and write
malicious
4C80000
direct allocation
page read and write
malicious
6E5B1000
unkown
page execute read
malicious
49C0000
direct allocation
page read and write
malicious
4C50000
direct allocation
page read and write
malicious
9A1000
unkown
page execute and read and write
malicious
4A1000
unkown
page execute and read and write
malicious
13C000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
1094000
heap
page read and write
31EF000
stack
page read and write
67F000
unkown
page execute and write copy
35CB000
stack
page read and write
D0D000
heap
page read and write
333E000
stack
page read and write
747000
unkown
page execute and read and write
780000
heap
page read and write
9A4000
heap
page read and write
4ECE000
stack
page read and write
6A8000
unkown
page execute and read and write
4F0000
unkown
page execute and write copy
784000
heap
page read and write
79DE000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
2F8F000
stack
page read and write
246DD374000
heap
page read and write
AB3000
heap
page read and write
1094000
heap
page read and write
458E000
stack
page read and write
1094000
heap
page read and write
4F80000
direct allocation
page execute and read and write
1094000
heap
page read and write
355F000
stack
page read and write
246D4E11000
trusted library allocation
page read and write
49C1000
heap
page read and write
4521000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
781E000
stack
page read and write
1094000
heap
page read and write
4261000
heap
page read and write
129E000
heap
page read and write
449D000
stack
page read and write
DD4000
heap
page read and write
298E000
stack
page read and write
674000
unkown
page execute and read and write
3FCE000
stack
page read and write
4DC0000
direct allocation
page execute and read and write
1094000
heap
page read and write
7FFD9B7C2000
trusted library allocation
page read and write
1094000
heap
page read and write
4261000
heap
page read and write
9A4000
heap
page read and write
1095000
heap
page read and write
4781000
heap
page read and write
368E000
stack
page read and write
14A0000
heap
page read and write
1094000
heap
page read and write
1095000
heap
page read and write
AE4000
heap
page read and write
47D0000
direct allocation
page read and write
48D0000
direct allocation
page execute and read and write
324F000
stack
page read and write
40DE000
stack
page read and write
1094000
heap
page read and write
4911000
heap
page read and write
72AE000
stack
page read and write
1094000
heap
page read and write
414E000
stack
page read and write
3D9E000
stack
page read and write
C90000
heap
page read and write
39CE000
stack
page read and write
1094000
heap
page read and write
245000
unkown
page write copy
1094000
heap
page read and write
1095000
heap
page read and write
4781000
heap
page read and write
4510000
direct allocation
page read and write
A00000
direct allocation
page read and write
1094000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
1094000
heap
page read and write
4781000
heap
page read and write
A43000
heap
page read and write
4E30000
direct allocation
page execute and read and write
1094000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
1530000
heap
page read and write
7FFD9B6C6000
trusted library allocation
page execute and read and write
4EA1000
heap
page read and write
1094000
heap
page read and write
46C000
unkown
page execute and read and write
10A4000
heap
page read and write
69C000
stack
page read and write
30BF000
stack
page read and write
4EA1000
heap
page read and write
745000
unkown
page execute and write copy
1095000
heap
page read and write
1094000
heap
page read and write
2D8E000
stack
page read and write
745000
unkown
page execute and write copy
4781000
heap
page read and write
4AA0000
heap
page read and write
505D000
stack
page read and write
1184000
heap
page read and write
5250000
heap
page read and write
3ECF000
stack
page read and write
3F0F000
stack
page read and write
449000
unkown
page execute and read and write
1094000
heap
page read and write
1094000
heap
page read and write
1440000
direct allocation
page read and write
10A4000
heap
page read and write
1094000
heap
page read and write
56E0000
heap
page read and write
178B7240000
heap
page read and write
4781000
heap
page read and write
2F9F000
stack
page read and write
9A4000
heap
page read and write
67F000
unkown
page execute and read and write
12AE000
stack
page read and write
8EDA673000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
337E000
stack
page read and write
37CE000
stack
page read and write
1095000
heap
page read and write
4781000
heap
page read and write
1094000
heap
page read and write
2E1743B6000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4780000
heap
page read and write
9A1000
unkown
page execute and write copy
1094000
heap
page read and write
3E9E000
stack
page read and write
40CF000
stack
page read and write
3DCF000
stack
page read and write
741E000
stack
page read and write
795000
unkown
page execute and write copy
4E90000
direct allocation
page execute and read and write
440F000
stack
page read and write
3FDE000
stack
page read and write
5390000
direct allocation
page execute and read and write
4781000
heap
page read and write
F70000
direct allocation
page read and write
815E000
stack
page read and write
4D90000
direct allocation
page execute and read and write
1094000
heap
page read and write
1094000
heap
page read and write
49B000
unkown
page execute and read and write
246C6309000
trusted library allocation
page read and write
191B000
stack
page read and write
1095000
heap
page read and write
341F000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
49C1000
heap
page read and write
4EA1000
heap
page read and write
468F000
stack
page read and write
1095000
heap
page read and write
1094000
heap
page read and write
4F50000
direct allocation
page execute and read and write
7DF49CD20000
trusted library allocation
page execute and read and write
4261000
heap
page read and write
A00000
heap
page read and write
1094000
heap
page read and write
47A0000
direct allocation
page read and write
1094000
heap
page read and write
4E81000
heap
page read and write
1094000
heap
page read and write
4F10000
direct allocation
page execute and read and write
246C2E40000
heap
page read and write
8EDAE3E000
stack
page read and write
2E1760C0000
trusted library allocation
page read and write
1094000
heap
page read and write
4C70000
direct allocation
page read and write
11E3000
heap
page read and write
784000
heap
page read and write
79DD000
stack
page read and write
1094000
heap
page read and write
674000
unkown
page execute and read and write
488C000
stack
page read and write
7AB000
unkown
page execute and read and write
4261000
heap
page read and write
1094000
heap
page read and write
81FC000
stack
page read and write
311F000
stack
page read and write
430E000
stack
page read and write
1094000
heap
page read and write
4C70000
direct allocation
page read and write
3FDE000
stack
page read and write
4250000
direct allocation
page read and write
437E000
stack
page read and write
7FFD9B5FB000
trusted library allocation
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
E1F000
unkown
page execute and write copy
249000
unkown
page execute and read and write
1094000
heap
page read and write
1094000
heap
page read and write
4910000
heap
page read and write
1094000
heap
page read and write
3B4E000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
100000
unkown
page readonly
397F000
stack
page read and write
1094000
heap
page read and write
E1F000
unkown
page execute and write copy
315E000
stack
page read and write
46CF000
stack
page read and write
6055000
heap
page read and write
4F80000
direct allocation
page execute and read and write
1094000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
9A4000
heap
page read and write
2F9E000
stack
page read and write
4261000
heap
page read and write
18C4000
heap
page read and write
5450000
direct allocation
page execute and read and write
1094000
heap
page read and write
6DF000
unkown
page execute and write copy
1094000
heap
page read and write
641E000
stack
page read and write
10A4000
heap
page read and write
D69000
unkown
page execute and write copy
1094000
heap
page read and write
18C4000
heap
page read and write
1095000
heap
page read and write
428000
unkown
page execute and read and write
49C1000
heap
page read and write
1094000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
FEE000
stack
page read and write
13C7000
heap
page read and write
4261000
heap
page read and write
3C4F000
stack
page read and write
4781000
heap
page read and write
246DD2EA000
heap
page read and write
4521000
heap
page read and write
1094000
heap
page read and write
496E000
stack
page read and write
1094000
heap
page read and write
4911000
heap
page read and write
344E000
stack
page read and write
1094000
heap
page read and write
6336000
heap
page read and write
7FFD9B948000
trusted library allocation
page read and write
246C4D9D000
heap
page read and write
5740000
direct allocation
page execute and read and write
246C62B2000
trusted library allocation
page read and write
1094000
heap
page read and write
3D0E000
stack
page read and write
1094000
heap
page read and write
C90000
direct allocation
page read and write
5251000
heap
page read and write
4781000
heap
page read and write
3E5E000
stack
page read and write
F1F000
unkown
page execute and write copy
A00000
heap
page read and write
796E000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4E70000
direct allocation
page execute and read and write
8EDB88E000
stack
page read and write
4CB3000
direct allocation
page read and write
49AE000
stack
page read and write
2607000
heap
page read and write
B11000
heap
page read and write
2717000
heap
page read and write
1094000
heap
page read and write
F79000
unkown
page execute and read and write
1094000
heap
page read and write
4A00000
direct allocation
page execute and read and write
2A9E000
stack
page read and write
246C5E66000
trusted library allocation
page read and write
4520000
heap
page read and write
508000
unkown
page execute and read and write
8EDA7FF000
stack
page read and write
388E000
stack
page read and write
1560000
heap
page read and write
1184000
heap
page read and write
5080000
remote allocation
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
108E000
heap
page read and write
4C70000
direct allocation
page read and write
55D0000
heap
page read and write
18C4000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
AA4000
heap
page read and write
4A91000
heap
page read and write
678000
unkown
page execute and read and write
1094000
heap
page read and write
4E6F000
stack
page read and write
379E000
stack
page read and write
392F000
stack
page read and write
4EA1000
heap
page read and write
160000
unkown
page readonly
93E000
stack
page read and write
1611000
heap
page read and write
784000
heap
page read and write
2B77000
heap
page read and write
5360000
direct allocation
page execute and read and write
1B4000
heap
page read and write
1094000
heap
page read and write
3B5E000
stack
page read and write
4781000
heap
page read and write
2C4F000
stack
page read and write
4F0000
unkown
page execute and write copy
45BF000
stack
page read and write
357F000
stack
page read and write
2DFF000
stack
page read and write
370F000
stack
page read and write
53A0000
direct allocation
page execute and read and write
1094000
heap
page read and write
CFF000
unkown
page execute and read and write
D17000
unkown
page execute and write copy
4C8E000
stack
page read and write
2ECE000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1070000
heap
page read and write
1B4000
heap
page read and write
4A91000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
1094000
heap
page read and write
400E000
stack
page read and write
338E000
stack
page read and write
4781000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4A91000
heap
page read and write
1140000
heap
page read and write
CD4000
heap
page read and write
47E1000
heap
page read and write
711000
unkown
page execute and read and write
14E5000
heap
page read and write
469E000
stack
page read and write
4E5F000
stack
page read and write
1090000
heap
page read and write
4E9000
unkown
page write copy
3F4F000
stack
page read and write
CF5000
unkown
page execute and write copy
1094000
heap
page read and write
430F000
stack
page read and write
1094000
heap
page read and write
10A4000
heap
page read and write
4781000
heap
page read and write
1AC0000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
50D0000
heap
page read and write
5730000
direct allocation
page execute and read and write
5090000
heap
page read and write
784000
heap
page read and write
9A4000
heap
page read and write
784000
heap
page read and write
D9A000
heap
page read and write
4911000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
1094000
heap
page read and write
4261000
heap
page read and write
1094000
heap
page read and write
100000
unkown
page readonly
4B5D000
stack
page read and write
67F000
unkown
page execute and read and write
28EB000
stack
page read and write
4B50000
direct allocation
page execute and read and write
339E000
stack
page read and write
D79000
unkown
page execute and read and write
E04000
heap
page read and write
1521000
heap
page read and write
3C8F000
stack
page read and write
CF8000
unkown
page execute and read and write
4911000
heap
page read and write
1094000
heap
page read and write
365E000
stack
page read and write
9A4000
heap
page read and write
1094000
heap
page read and write
4E60000
direct allocation
page execute and read and write
506000
unkown
page write copy
1094000
heap
page read and write
7FFD9B94C000
trusted library allocation
page read and write
1DD0000
direct allocation
page read and write
1094000
heap
page read and write
2DAA000
heap
page read and write
892C000
stack
page read and write
1095000
heap
page read and write
4781000
heap
page read and write
D68000
unkown
page execute and read and write
1094000
heap
page read and write
DA5000
unkown
page execute and write copy
1B4000
heap
page read and write
2BDE000
stack
page read and write
1095000
heap
page read and write
1094000
heap
page read and write
D9D000
unkown
page execute and read and write
E16000
unkown
page execute and write copy
6E8000
unkown
page execute and read and write
13BF000
heap
page read and write
48B0000
trusted library allocation
page read and write
1094000
heap
page read and write
1080000
heap
page read and write
1094000
heap
page read and write
FF0000
heap
page read and write
4521000
heap
page read and write
246C4DF3000
heap
page read and write
1970000
heap
page read and write
1094000
heap
page read and write
A90000
heap
page read and write
116C000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1578000
heap
page read and write
6B4000
unkown
page execute and read and write
69BD000
heap
page read and write
43BE000
stack
page read and write
1095000
heap
page read and write
14C0000
heap
page read and write
990000
direct allocation
page read and write
769D000
stack
page read and write
100C000
heap
page read and write
784000
heap
page read and write
4F70000
direct allocation
page execute and read and write
284E000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
358E000
stack
page read and write
4A80000
trusted library allocation
page read and write
B00000
unkown
page readonly
DD4000
heap
page read and write
46F0000
direct allocation
page read and write
79F000
unkown
page execute and write copy
1095000
heap
page read and write
4F1000
unkown
page execute and write copy
468F000
stack
page read and write
11B8000
heap
page read and write
1094000
heap
page read and write
1AF8000
heap
page read and write
1095000
heap
page read and write
1212000
unkown
page execute and read and write
32B0000
heap
page read and write
B8E000
stack
page read and write
349E000
stack
page read and write
4EA1000
heap
page read and write
422E000
stack
page read and write
1094000
heap
page read and write
11AF000
stack
page read and write
1094000
heap
page read and write
4D2F000
stack
page read and write
2E1F000
stack
page read and write
3E3F000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
3DCF000
stack
page read and write
1094000
heap
page read and write
246C629A000
trusted library allocation
page read and write
7AB000
unkown
page execute and write copy
1094000
heap
page read and write
CAA000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
4D8E000
stack
page read and write
3D5E000
stack
page read and write
10A4000
heap
page read and write
4DCF000
stack
page read and write
AE4000
heap
page read and write
1054000
heap
page read and write
1094000
heap
page read and write
4781000
heap
page read and write
1184000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
371E000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
8BDC000
stack
page read and write
1094000
heap
page read and write
D50000
unkown
page execute and write copy
4911000
heap
page read and write
5380000
direct allocation
page execute and read and write
195E000
stack
page read and write
1094000
heap
page read and write
1180000
heap
page read and write
80F0000
remote allocation
page read and write
4A00000
direct allocation
page execute and read and write
D1E000
heap
page read and write
6A05000
heap
page read and write
1094000
heap
page read and write
784000
heap
page read and write
79C000
unkown
page execute and read and write
1094000
heap
page read and write
2D5F000
stack
page read and write
11DB000
heap
page read and write
3E8E000
stack
page read and write
1094000
heap
page read and write
498E000
stack
page read and write
6BFC000
heap
page read and write
3C5E000
stack
page read and write
1094000
heap
page read and write
2F7E000
stack
page read and write
42CF000
stack
page read and write
246DD385000
heap
page read and write
676000
unkown
page execute and read and write
4F70000
direct allocation
page execute and read and write
4E2E000
stack
page read and write
702D000
stack
page read and write
3F9E000
stack
page read and write
120C000
heap
page read and write
825F000
stack
page read and write
1095000
heap
page read and write
AE4000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
745D000
stack
page read and write
101000
unkown
page execute and write copy
4781000
heap
page read and write
45AE000
stack
page read and write
1094000
heap
page read and write
4781000
heap
page read and write
4E20000
direct allocation
page execute and read and write
1094000
heap
page read and write
1095000
heap
page read and write
4E3B000
stack
page read and write
1059000
heap
page read and write
246C48B0000
trusted library allocation
page read and write
7CDF000
stack
page read and write
39BE000
stack
page read and write
1094000
heap
page read and write
5430000
direct allocation
page execute and read and write
1554000
heap
page read and write
4261000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
433F000
stack
page read and write
4781000
heap
page read and write
2ACE000
stack
page read and write
E31000
unkown
page execute and write copy
4FB0000
direct allocation
page execute and read and write
37CE000
stack
page read and write
9A4000
heap
page read and write
1094000
heap
page read and write
246C4E00000
heap
page read and write
47E0000
heap
page read and write
738000
unkown
page execute and read and write
1094000
heap
page read and write
1043000
heap
page read and write
1094000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
10A4000
heap
page read and write
437F000
stack
page read and write
49C1000
heap
page read and write
1094000
heap
page read and write
440E000
stack
page read and write
4C3D000
stack
page read and write
4F50000
direct allocation
page execute and read and write
383E000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4521000
heap
page read and write
2E1760C0000
trusted library allocation
page read and write
4F0000
unkown
page execute and read and write
2D0E000
stack
page read and write
8EDAEBB000
stack
page read and write
1184000
heap
page read and write
CF6000
unkown
page execute and read and write
11EC000
heap
page read and write
71D000
unkown
page execute and read and write
1095000
heap
page read and write
F70000
unkown
page execute and read and write
65FE000
stack
page read and write
71B000
stack
page read and write
B11000
heap
page read and write
9A4000
heap
page read and write
79F000
unkown
page execute and write copy
3D8F000
stack
page read and write
1094000
heap
page read and write
4981000
heap
page read and write
1095000
heap
page read and write
7AAE000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4A91000
heap
page read and write
1094000
heap
page read and write
766000
unkown
page execute and read and write
1930000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
328F000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4781000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
9A0000
unkown
page read and write
1094000
heap
page read and write
3CCE000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
784000
heap
page read and write
4250000
direct allocation
page read and write
483F000
stack
page read and write
46D000
unkown
page execute and write copy
E15000
unkown
page execute and read and write
1094000
heap
page read and write
695000
unkown
page execute and write copy
4EA1000
heap
page read and write
18C4000
heap
page read and write
74DD000
stack
page read and write
1890000
heap
page read and write
695000
unkown
page execute and write copy
7DE000
stack
page read and write
4CE3000
direct allocation
page read and write
245000
unkown
page read and write
33CE000
stack
page read and write
2FCF000
stack
page read and write
46C000
unkown
page execute and write copy
137C000
stack
page read and write
4261000
heap
page read and write
FB0000
heap
page read and write
1094000
heap
page read and write
2BBE000
stack
page read and write
784000
heap
page read and write
2AEE000
stack
page read and write
374E000
stack
page read and write
6B2000
unkown
page execute and write copy
1094000
heap
page read and write
6E8000
unkown
page execute and read and write
4270000
heap
page read and write
4911000
heap
page read and write
D91000
unkown
page execute and read and write
1095000
heap
page read and write
4A00000
direct allocation
page execute and read and write
32CE000
stack
page read and write
1095000
heap
page read and write
781E000
stack
page read and write
4BEF000
stack
page read and write
4860000
direct allocation
page execute and read and write
10A4000
heap
page read and write
4E70000
direct allocation
page execute and read and write
4DA0000
direct allocation
page execute and read and write
1094000
heap
page read and write
3E8F000
stack
page read and write
1094000
heap
page read and write
725000
unkown
page execute and write copy
6E9000
unkown
page execute and write copy
328E000
stack
page read and write
356F000
stack
page read and write
67E000
unkown
page execute and read and write
F75000
unkown
page read and write
364E000
stack
page read and write
1094000
heap
page read and write
246C4E11000
trusted library allocation
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
13E0000
heap
page read and write
4A00000
direct allocation
page execute and read and write
1094000
heap
page read and write
76A98FD000
stack
page read and write
1094000
heap
page read and write
4A00000
direct allocation
page execute and read and write
246C2FC5000
heap
page read and write
425E000
stack
page read and write
1094000
heap
page read and write
4781000
heap
page read and write
1094000
heap
page read and write
1AB9000
heap
page read and write
AFC000
stack
page read and write
246DD3BF000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
4AE0000
direct allocation
page execute and read and write
1095000
heap
page read and write
6FED000
stack
page read and write
4781000
heap
page read and write
1184000
heap
page read and write
3B4F000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4EA1000
heap
page read and write
F7A000
heap
page read and write
3E5F000
stack
page read and write
725000
unkown
page execute and write copy
4781000
heap
page read and write
4C10000
direct allocation
page read and write
4781000
heap
page read and write
1094000
heap
page read and write
240000
unkown
page execute and read and write
3E4E000
stack
page read and write
73B0000
remote allocation
page read and write
1094000
heap
page read and write
1B4000
heap
page read and write
49E0000
direct allocation
page execute and read and write
17B0000
heap
page read and write
1094000
heap
page read and write
4ADE000
stack
page read and write
53F0000
direct allocation
page execute and read and write
1094000
heap
page read and write
784000
heap
page read and write
1094000
heap
page read and write
7660000
heap
page read and write
1094000
heap
page read and write
52E0000
trusted library allocation
page read and write
729000
unkown
page execute and read and write
178B7620000
heap
page read and write
1094000
heap
page read and write
388F000
stack
page read and write
1094000
heap
page read and write
D60000
unkown
page execute and read and write
4781000
heap
page read and write
D90000
unkown
page execute and read and write
7E4D000
stack
page read and write
1094000
heap
page read and write
4EA1000
heap
page read and write
784000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4E9C000
stack
page read and write
1094000
heap
page read and write
4261000
heap
page read and write
9A4000
heap
page read and write
1467000
heap
page read and write
18C4000
heap
page read and write
C20000
direct allocation
page read and write
4A00000
direct allocation
page execute and read and write
4E00000
direct allocation
page execute and read and write
1DD0000
direct allocation
page read and write
374F000
stack
page read and write
1094000
heap
page read and write
AF0000
heap
page read and write
2E5E000
stack
page read and write
1B1F000
heap
page read and write
7C1E000
stack
page read and write
FAE000
stack
page read and write
6DF000
unkown
page execute and write copy
15AC000
heap
page read and write
DCE000
stack
page read and write
4C70000
direct allocation
page read and write
6A5000
unkown
page execute and write copy
1094000
heap
page read and write
4911000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
9A4000
heap
page read and write
4F30000
direct allocation
page execute and read and write
F78000
unkown
page write copy
4920000
direct allocation
page read and write
18C4000
heap
page read and write
1094000
heap
page read and write
AE8000
unkown
page write copy
1094000
heap
page read and write
1095000
heap
page read and write
65BF000
stack
page read and write
1184000
heap
page read and write
D61000
unkown
page execute and write copy
5350000
direct allocation
page execute and read and write
1094000
heap
page read and write
784000
heap
page read and write
57C0000
direct allocation
page execute and read and write
1094000
heap
page read and write
42CF000
stack
page read and write
1094000
heap
page read and write
68A000
unkown
page execute and write copy
1094000
heap
page read and write
1094000
heap
page read and write
3BFE000
stack
page read and write
1094000
heap
page read and write
4EA1000
heap
page read and write
1094000
heap
page read and write
415F000
stack
page read and write
10A4000
heap
page read and write
4261000
heap
page read and write
1094000
heap
page read and write
5470000
direct allocation
page execute and read and write
4FF0000
direct allocation
page execute and read and write
481000
unkown
page execute and write copy
1094000
heap
page read and write
31FE000
stack
page read and write
1094000
heap
page read and write
47D0000
direct allocation
page read and write
1094000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
18C4000
heap
page read and write
18C4000
heap
page read and write
1170000
direct allocation
page read and write
3A9F000
stack
page read and write
4A6F000
stack
page read and write
1225000
heap
page read and write
2E1760C0000
trusted library allocation
page read and write
7FFD9B5E3000
trusted library allocation
page execute and read and write
1094000
heap
page read and write
18C4000
heap
page read and write
1094000
heap
page read and write
4F70000
direct allocation
page execute and read and write
41DF000
stack
page read and write
1094000
heap
page read and write
7FCE000
stack
page read and write
18C4000
heap
page read and write
1DD0000
direct allocation
page read and write
1094000
heap
page read and write
3D7E000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
128E000
stack
page read and write
5251000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
1094000
heap
page read and write
1094000
heap
page read and write
4911000
heap
page read and write
8EDADBC000
stack
page read and write
3D9F000
stack
page read and write
1094000
heap
page read and write
500E000
stack
page read and write
1094000
heap
page read and write
3D3F000
stack
page read and write
1094000
heap
page read and write
43DE000
stack
page read and write
1960000
direct allocation
page read and write
5251000
heap
page read and write
53A0000
direct allocation
page execute and read and write
4781000
heap
page read and write
304E000
stack
page read and write
5380000
direct allocation
page execute and read and write
4EB000
unkown
page execute and write copy
41FF000
stack
page read and write
10A4000
heap
page read and write
E90000
direct allocation
page read and write
476D000
stack
page read and write
4F2F000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
5370000
direct allocation
page execute and read and write
F21000
unkown
page execute and read and write
6A5000
unkown
page execute and write copy
1094000
heap
page read and write
3F9F000
stack
page read and write
4781000
heap
page read and write
18C4000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
4FFE000
stack
page read and write
4E40000
direct allocation
page execute and read and write
18C4000
heap
page read and write
699C000
stack
page read and write
4E9000
unkown
page read and write
4A91000
heap
page read and write
47D0000
direct allocation
page read and write
3ABF000
stack
page read and write
1094000
heap
page read and write
5380000
direct allocation
page execute and read and write
73B0000
remote allocation
page read and write
470E000
stack
page read and write
1094000
heap
page read and write
7FFD9B696000
trusted library allocation
page read and write
1405000
heap
page read and write
41CE000
stack
page read and write
2C5F000
stack
page read and write
4DD0000
direct allocation
page execute and read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
5251000
heap
page read and write
4781000
heap
page read and write
7FFD9B840000
trusted library allocation
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
8F0000
heap
page read and write
1094000
heap
page read and write
47E1000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
14A7000
heap
page read and write
40DF000
stack
page read and write
5380000
direct allocation
page execute and read and write
1031000
heap
page read and write
483F000
stack
page read and write
1094000
heap
page read and write
46CE000
stack
page read and write
A5A000
heap
page read and write
40FF000
stack
page read and write
4F90000
direct allocation
page execute and read and write
1094000
heap
page read and write
551D000
stack
page read and write
747000
unkown
page execute and read and write
1094000
heap
page read and write
18C4000
heap
page read and write
1094000
heap
page read and write
4781000
heap
page read and write
1184000
heap
page read and write
6E5C4000
unkown
page readonly
1094000
heap
page read and write
4911000
heap
page read and write
1094000
heap
page read and write
421F000
stack
page read and write
381E000
stack
page read and write
1094000
heap
page read and write
4261000
heap
page read and write
1095000
heap
page read and write
10FF000
unkown
page execute and read and write
1095000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1095000
heap
page read and write
1CBE000
stack
page read and write
1094000
heap
page read and write
329E000
stack
page read and write
7FFD9B5E2000
trusted library allocation
page read and write
7DF49CD10000
trusted library allocation
page execute and read and write
659000
unkown
page execute and read and write
1094000
heap
page read and write
1094000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
3ECE000
stack
page read and write
1094000
heap
page read and write
1DD0000
direct allocation
page read and write
1094000
heap
page read and write
246C3038000
heap
page read and write
784000
unkown
page execute and write copy
1094000
heap
page read and write
771E000
stack
page read and write
320F000
stack
page read and write
4261000
heap
page read and write
B4E000
stack
page read and write
418E000
stack
page read and write
1184000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
681000
unkown
page execute and read and write
1094000
heap
page read and write
5060000
direct allocation
page execute and read and write
2ABE000
stack
page read and write
29D0000
heap
page read and write
4781000
heap
page read and write
1094000
heap
page read and write
4781000
heap
page read and write
4E81000
heap
page read and write
9EE000
stack
page read and write
450F000
stack
page read and write
5310000
direct allocation
page read and write
1094000
heap
page read and write
784000
heap
page read and write
10A4000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
7AB000
unkown
page execute and write copy
1094000
heap
page read and write
13FE000
stack
page read and write
246DD0A2000
heap
page read and write
E1D000
unkown
page execute and read and write
5390000
direct allocation
page execute and read and write
1094000
heap
page read and write
1095000
heap
page read and write
1094000
heap
page read and write
384F000
stack
page read and write
435F000
stack
page read and write
4781000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
784000
heap
page read and write
1B4000
heap
page read and write
F3F000
stack
page read and write
3D3E000
stack
page read and write
5251000
heap
page read and write
44A1000
heap
page read and write
2C1F000
stack
page read and write
4D90000
direct allocation
page execute and read and write
E1D000
stack
page read and write
4EA1000
heap
page read and write
4F0000
unkown
page execute and write copy
411E000
stack
page read and write
4F70000
direct allocation
page execute and read and write
1094000
heap
page read and write
14E0000
heap
page read and write
6A1B000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
2E17628A000
heap
page read and write
1094000
heap
page read and write
46F0000
direct allocation
page read and write
681000
unkown
page execute and read and write
1094000
heap
page read and write
1094000
heap
page read and write
398E000
stack
page read and write
323E000
stack
page read and write
4261000
heap
page read and write
6E8000
unkown
page execute and read and write
7D7E000
stack
page read and write
4ECF000
direct allocation
page read and write
B09000
heap
page read and write
318E000
stack
page read and write
1095000
heap
page read and write
C6F000
unkown
page execute and read and write
13AE000
unkown
page execute and read and write
1094000
heap
page read and write
121B000
heap
page read and write
4D9000
unkown
page execute and read and write
47B1000
heap
page read and write
13B0000
heap
page read and write
FDB8DFE000
stack
page read and write
604B000
stack
page read and write
784000
unkown
page execute and write copy
B32000
heap
page read and write
246D50FF000
trusted library allocation
page read and write
246C6A2C000
trusted library allocation
page read and write
1094000
heap
page read and write
1035000
heap
page read and write
1094000
heap
page read and write
33CF000
stack
page read and write
69F4000
heap
page read and write
1095000
heap
page read and write
1094000
heap
page read and write
1095000
heap
page read and write
246D4E41000
trusted library allocation
page read and write
449F000
stack
page read and write
1209000
unkown
page execute and read and write
4261000
heap
page read and write
4E30000
direct allocation
page execute and read and write
1095000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
246C4890000
trusted library allocation
page read and write
47D0000
direct allocation
page read and write
5251000
heap
page read and write
1094000
heap
page read and write
71D000
unkown
page execute and read and write
75DE000
stack
page read and write
1095000
heap
page read and write
7FFD9B63C000
trusted library allocation
page execute and read and write
67F000
unkown
page execute and write copy
4521000
heap
page read and write
1095000
heap
page read and write
35BF000
stack
page read and write
1094000
heap
page read and write
4781000
heap
page read and write
4A60000
direct allocation
page execute and read and write
480000
unkown
page read and write
1094000
heap
page read and write
2E174170000
heap
page read and write
6D0000
unkown
page execute and write copy
1094000
heap
page read and write
1094000
heap
page read and write
2E9F000
stack
page read and write
2D1F000
stack
page read and write
4E80000
direct allocation
page execute and read and write
318E000
stack
page read and write
1094000
heap
page read and write
470F000
stack
page read and write
1094000
heap
page read and write
B77000
unkown
page execute and write copy
4F40000
direct allocation
page execute and read and write
1A60000
heap
page read and write
B64000
unkown
page execute and read and write
1094000
heap
page read and write
1DD0000
direct allocation
page read and write
1094000
heap
page read and write
5360000
direct allocation
page execute and read and write
784000
heap
page read and write
759D000
stack
page read and write
1094000
heap
page read and write
4781000
heap
page read and write
1094000
heap
page read and write
4EA1000
heap
page read and write
1094000
heap
page read and write
B01000
unkown
page execute and write copy
761F000
stack
page read and write
47A0000
direct allocation
page read and write
1568000
heap
page read and write
1B4000
heap
page read and write
1070000
heap
page read and write
5251000
heap
page read and write
47D0000
direct allocation
page read and write
1480000
direct allocation
page execute and read and write
1094000
heap
page read and write
2E174320000
heap
page read and write
2DFB000
heap
page read and write
4AFF000
direct allocation
page read and write
1DD0000
direct allocation
page read and write
4781000
heap
page read and write
2FDE000
unkown
page read and write
2E175BD0000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
2ECF000
stack
page read and write
36DE000
stack
page read and write
1094000
heap
page read and write
4FEB000
stack
page read and write
4261000
heap
page read and write
1094000
heap
page read and write
4A91000
heap
page read and write
34CF000
stack
page read and write
FEE000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
DD4000
heap
page read and write
E04000
heap
page read and write
6E5CB000
unkown
page read and write
70B000
unkown
page execute and write copy
6D21000
heap
page read and write
FCC000
heap
page read and write
4911000
heap
page read and write
1C6000
unkown
page read and write
678000
unkown
page execute and read and write
4250000
direct allocation
page read and write
5000000
direct allocation
page execute and read and write
80C5000
heap
page read and write
3ABE000
stack
page read and write
39DE000
stack
page read and write
10A4000
heap
page read and write
48E0000
trusted library allocation
page read and write
EA0000
heap
page read and write
1094000
heap
page read and write
49C1000
heap
page read and write
1094000
heap
page read and write
1184000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
103E000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
4980000
heap
page read and write
4980000
direct allocation
page read and write
4CEE000
stack
page read and write
4250000
direct allocation
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
2BCF000
stack
page read and write
3A4E000
stack
page read and write
18C4000
heap
page read and write
DD4000
heap
page read and write
4A80000
direct allocation
page execute and read and write
5730000
direct allocation
page execute and read and write
49C1000
heap
page read and write
1094000
heap
page read and write
4A91000
heap
page read and write
9A4000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
2D9E000
stack
page read and write
65C000
unkown
page execute and write copy
1094000
heap
page read and write
340E000
stack
page read and write
1095000
heap
page read and write
57F0000
heap
page read and write
246C6967000
trusted library allocation
page read and write
C0E000
stack
page read and write
787F000
heap
page read and write
590000
heap
page read and write
A4F000
heap
page read and write
1094000
heap
page read and write
1B4000
heap
page read and write
10A4000
heap
page read and write
405E000
stack
page read and write
124D000
heap
page read and write
D15000
unkown
page execute and write copy
1095000
heap
page read and write
449F000
stack
page read and write
1B4000
heap
page read and write
4781000
heap
page read and write
1094000
heap
page read and write
1095000
heap
page read and write
4E90000
direct allocation
page read and write
246DD3A2000
heap
page read and write
1094000
heap
page read and write
AA4000
heap
page read and write
6D2000
unkown
page execute and read and write
4261000
heap
page read and write
1094000
heap
page read and write
7DF49CD30000
trusted library allocation
page execute and read and write
784000
heap
page read and write
7FBE000
stack
page read and write
9A4000
heap
page read and write
E90000
direct allocation
page read and write
698000
unkown
page execute and read and write
6D0000
unkown
page execute and write copy
4E00000
direct allocation
page execute and read and write
E3F000
stack
page read and write
246C6A31000
trusted library allocation
page read and write
1094000
heap
page read and write
739E000
stack
page read and write
3AAE000
stack
page read and write
1094000
heap
page read and write
418F000
stack
page read and write
4781000
heap
page read and write
4E9000
unkown
page write copy
1094000
heap
page read and write
7AC000
unkown
page execute and write copy
1094000
heap
page read and write
795000
unkown
page execute and write copy
281F000
stack
page read and write
D00000
heap
page read and write
1094000
heap
page read and write
7AC000
unkown
page execute and write copy
246DD030000
trusted library allocation
page read and write
5330000
direct allocation
page execute and read and write
70B000
unkown
page execute and write copy
2E0F000
stack
page read and write
D33000
unkown
page execute and write copy
1094000
heap
page read and write
1184000
heap
page read and write
4EE4000
heap
page read and write
50A0000
heap
page read and write
4E30000
direct allocation
page execute and read and write
1094000
heap
page read and write
3F4E000
stack
page read and write
3B8F000
stack
page read and write
3E0E000
stack
page read and write
76DF000
stack
page read and write
1094000
heap
page read and write
5120000
heap
page read and write
4CAF000
stack
page read and write
1940000
heap
page read and write
E30000
unkown
page read and write
1094000
heap
page read and write
47A0000
direct allocation
page read and write
1095000
heap
page read and write
4A91000
heap
page read and write
5730000
direct allocation
page execute and read and write
4EB0000
direct allocation
page execute and read and write
4DA0000
direct allocation
page execute and read and write
1094000
heap
page read and write
1094000
heap
page read and write
795000
unkown
page execute and write copy
1094000
heap
page read and write
1DBF000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
4781000
heap
page read and write
E90000
direct allocation
page read and write
5140000
heap
page read and write
335E000
stack
page read and write
1094000
heap
page read and write
189F000
stack
page read and write
1184000
heap
page read and write
2A4E000
unkown
page read and write
373E000
stack
page read and write
1184000
heap
page read and write
4781000
heap
page read and write
696000
unkown
page execute and read and write
340F000
stack
page read and write
1094000
heap
page read and write
108A000
heap
page read and write
738000
unkown
page execute and read and write
4521000
heap
page read and write
4E10000
direct allocation
page execute and read and write
C90000
direct allocation
page read and write
1094000
heap
page read and write
5780000
direct allocation
page execute and read and write
75E9000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
29BE000
stack
page read and write
2B0F000
stack
page read and write
4A91000
heap
page read and write
1094000
heap
page read and write
2E176250000
heap
page read and write
1094000
heap
page read and write
461F000
stack
page read and write
41EF000
stack
page read and write
4981000
heap
page read and write
246C62F2000
trusted library allocation
page read and write
1060000
heap
page read and write
FD0000
heap
page read and write
1094000
heap
page read and write
FED000
heap
page read and write
4911000
heap
page read and write
245000
unkown
page read and write
5251000
heap
page read and write
18C4000
heap
page read and write
178B7270000
heap
page read and write
4880000
direct allocation
page execute and read and write
18C4000
heap
page read and write
123F000
heap
page read and write
47B0000
heap
page read and write
1094000
heap
page read and write
487E000
stack
page read and write
1094000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
30DE000
stack
page read and write
165B000
stack
page read and write
161000
unkown
page execute and write copy
1094000
heap
page read and write
4781000
heap
page read and write
DD4000
heap
page read and write
4781000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4EA1000
heap
page read and write
990000
direct allocation
page read and write
10A4000
heap
page read and write
1094000
heap
page read and write
6EEE000
stack
page read and write
420F000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1095000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
246DD3AF000
heap
page read and write
4781000
heap
page read and write
346E000
stack
page read and write
1094000
heap
page read and write
4781000
heap
page read and write
1094000
heap
page read and write
10C5000
heap
page read and write
4911000
heap
page read and write
18C4000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
697000
unkown
page execute and write copy
311E000
stack
page read and write
143E000
stack
page read and write
364F000
stack
page read and write
3FAE000
stack
page read and write
4781000
heap
page read and write
1094000
heap
page read and write
9A4000
heap
page read and write
DB8000
unkown
page execute and read and write
849E000
stack
page read and write
1094000
heap
page read and write
381F000
stack
page read and write
45C000
unkown
page execute and read and write
458F000
stack
page read and write
1094000
heap
page read and write
249000
unkown
page execute and read and write
246C2FC0000
heap
page read and write
57D0000
direct allocation
page execute and read and write
126E000
stack
page read and write
1094000
heap
page read and write
29CE000
stack
page read and write
4E10000
direct allocation
page execute and read and write
1094000
heap
page read and write
66FF000
stack
page read and write
350F000
stack
page read and write
990000
heap
page read and write
4F50000
direct allocation
page execute and read and write
246C302E000
heap
page read and write
1094000
heap
page read and write
246DD3B6000
heap
page read and write
2D1E000
stack
page read and write
AE4000
heap
page read and write
4C4E000
stack
page read and write
1094000
heap
page read and write
135C000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1095000
heap
page read and write
1094000
heap
page read and write
3600000
heap
page read and write
4781000
heap
page read and write
1094000
heap
page read and write
4EA1000
heap
page read and write
1094000
heap
page read and write
1440000
direct allocation
page read and write
410E000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
34F000
unkown
page execute and read and write
1094000
heap
page read and write
1054000
heap
page read and write
1094000
heap
page read and write
4A90000
direct allocation
page execute and read and write
F1E000
unkown
page execute and read and write
3E9F000
stack
page read and write
1095000
heap
page read and write
1094000
heap
page read and write
10D1000
heap
page read and write
69C000
stack
page read and write
4ED0000
direct allocation
page execute and read and write
246C62DE000
trusted library allocation
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4781000
heap
page read and write
4D2F000
stack
page read and write
D95000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
784000
heap
page read and write
1235000
heap
page read and write
1094000
heap
page read and write
4EB000
unkown
page execute and read and write
AE4000
heap
page read and write
659000
unkown
page execute and read and write
145C000
heap
page read and write
EEE000
stack
page read and write
4DEF000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4E9D000
stack
page read and write
44BE000
stack
page read and write
8EDAC38000
stack
page read and write
38CE000
stack
page read and write
4E10000
direct allocation
page execute and read and write
18C4000
heap
page read and write
2FCE000
stack
page read and write
18C4000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
370E000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
53C0000
direct allocation
page execute and read and write
4911000
heap
page read and write
1094000
heap
page read and write
2E176040000
trusted library allocation
page read and write
246DD376000
heap
page read and write
1094000
heap
page read and write
3A1E000
stack
page read and write
1094000
heap
page read and write
83B000
stack
page read and write
1094000
heap
page read and write
4261000
heap
page read and write
46DF000
stack
page read and write
1184000
heap
page read and write
240000
unkown
page execute and read and write
1094000
heap
page read and write
2A9E000
stack
page read and write
E04000
heap
page read and write
1094000
heap
page read and write
57A0000
direct allocation
page execute and read and write
155C000
heap
page read and write
409F000
stack
page read and write
4E9000
unkown
page read and write
499E000
stack
page read and write
678000
unkown
page execute and read and write
41CF000
stack
page read and write
F9E000
heap
page read and write
49C1000
heap
page read and write
13B9000
heap
page read and write
3FBF000
stack
page read and write
1094000
heap
page read and write
3EDE000
stack
page read and write
270F000
stack
page read and write
364F000
stack
page read and write
46CE000
stack
page read and write
1094000
heap
page read and write
E04000
heap
page read and write
471E000
stack
page read and write
36DF000
stack
page read and write
4781000
heap
page read and write
1094000
heap
page read and write
178B8DF2000
heap
page read and write
F75000
unkown
page read and write
1094000
heap
page read and write
47A0000
direct allocation
page read and write
1095000
heap
page read and write
D13000
heap
page read and write
4781000
heap
page read and write
698000
unkown
page execute and read and write
751E000
stack
page read and write
4B10000
direct allocation
page execute and read and write
69C000
unkown
page execute and read and write
4781000
heap
page read and write
5730000
direct allocation
page execute and read and write
4D1F000
stack
page read and write
1094000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
10ED000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1169000
heap
page read and write
6700000
heap
page read and write
F90000
heap
page read and write
1095000
heap
page read and write
AA4000
heap
page read and write
1095000
heap
page read and write
C20000
direct allocation
page read and write
FEF000
heap
page read and write
7FFD9B5E4000
trusted library allocation
page read and write
178B8DF0000
heap
page read and write
3E6E000
stack
page read and write
DDE000
stack
page read and write
1094000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
4261000
heap
page read and write
1094000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
49B000
unkown
page execute and read and write
67F000
unkown
page execute and write copy
CE1000
heap
page read and write
4E40000
direct allocation
page execute and read and write
1094000
heap
page read and write
36FF000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1518000
heap
page read and write
64BE000
stack
page read and write
1095000
heap
page read and write
4EA1000
heap
page read and write
68B000
unkown
page execute and read and write
5000000
heap
page read and write
8AD000
stack
page read and write
6D0000
unkown
page execute and write copy
1094000
heap
page read and write
1094000
heap
page read and write
725000
unkown
page execute and write copy
321E000
stack
page read and write
675000
unkown
page execute and write copy
3CCE000
stack
page read and write
246D4E79000
trusted library allocation
page read and write
63DF000
stack
page read and write
4781000
heap
page read and write
410F000
stack
page read and write
1AD6000
heap
page read and write
4920000
direct allocation
page execute and read and write
1094000
heap
page read and write
5251000
heap
page read and write
1094000
heap
page read and write
509D000
stack
page read and write
7AD000
unkown
page execute and write copy
1401000
heap
page read and write
4A20000
direct allocation
page execute and read and write
4DA0000
direct allocation
page execute and read and write
7FFD9B700000
trusted library allocation
page execute and read and write
1094000
heap
page read and write
3BEE000
stack
page read and write
4EA0000
direct allocation
page execute and read and write
4DF0000
direct allocation
page execute and read and write
1094000
heap
page read and write
1B4000
heap
page read and write
A3B000
stack
page read and write
1094000
heap
page read and write
457F000
stack
page read and write
424F000
stack
page read and write
FDB000
heap
page read and write
DD4000
heap
page read and write
1E0000
heap
page read and write
4F70000
direct allocation
page execute and read and write
4DA0000
direct allocation
page execute and read and write
175F000
stack
page read and write
1094000
heap
page read and write
4E90000
direct allocation
page execute and read and write
4781000
heap
page read and write
C90000
direct allocation
page read and write
5360000
direct allocation
page execute and read and write
179F000
stack
page read and write
CE5000
heap
page read and write
1094000
heap
page read and write
5251000
heap
page read and write
1094000
heap
page read and write
1220000
unkown
page execute and write copy
7FFD9B79A000
trusted library allocation
page read and write
4781000
heap
page read and write
1094000
heap
page read and write
33DE000
stack
page read and write
4E90000
direct allocation
page execute and read and write
6D2000
unkown
page execute and read and write
1094000
heap
page read and write
375E000
stack
page read and write
1031000
heap
page read and write
1094000
heap
page read and write
4E90000
direct allocation
page read and write
47B1000
heap
page read and write
1184000
heap
page read and write
1094000
heap
page read and write
4F5E000
stack
page read and write
1094000
heap
page read and write
7830000
remote allocation
page read and write
3D5E000
stack
page read and write
1094000
heap
page read and write
C8E000
stack
page read and write
7D0E000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
398F000
stack
page read and write
246C4945000
heap
page read and write
395F000
stack
page read and write
47D0000
direct allocation
page read and write
1094000
heap
page read and write
47E1000
heap
page read and write
7AC000
unkown
page execute and write copy
4DE0000
direct allocation
page execute and read and write
7FFD9B980000
trusted library allocation
page read and write
47B1000
heap
page read and write
7662000
heap
page read and write
1094000
heap
page read and write
4C0F000
stack
page read and write
711000
unkown
page execute and read and write
4C2E000
stack
page read and write
2C40000
heap
page read and write
C20000
direct allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
6530000
heap
page read and write
5360000
direct allocation
page execute and read and write
4261000
heap
page read and write
4521000
heap
page read and write
246D4E31000
trusted library allocation
page read and write
1094000
heap
page read and write
2FE0000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4521000
heap
page read and write
53B0000
direct allocation
page execute and read and write
1095000
heap
page read and write
3E0E000
stack
page read and write
F70000
direct allocation
page read and write
5380000
direct allocation
page execute and read and write
1094000
heap
page read and write
100000
unkown
page read and write
13AF000
unkown
page execute and write copy
479F000
stack
page read and write
5700000
direct allocation
page execute and read and write
A10000
heap
page read and write
F70000
direct allocation
page read and write
4BDF000
stack
page read and write
4EA1000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4F50000
direct allocation
page execute and read and write
7FFD9B950000
trusted library allocation
page read and write
79D000
stack
page read and write
6D2000
unkown
page execute and read and write
324E000
stack
page read and write
6335000
heap
page read and write
1AC5000
heap
page read and write
538E000
stack
page read and write
A50000
heap
page read and write
1094000
heap
page read and write
2FDE000
stack
page read and write
5690000
trusted library allocation
page read and write
246C3030000
heap
page read and write
1094000
heap
page read and write
5730000
direct allocation
page execute and read and write
D50000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1587000
heap
page read and write
1094000
heap
page read and write
4E60000
direct allocation
page execute and read and write
378F000
stack
page read and write
49C1000
heap
page read and write
178B7278000
heap
page read and write
4781000
heap
page read and write
354E000
stack
page read and write
6C7000
unkown
page execute and read and write
49C1000
heap
page read and write
4781000
heap
page read and write
2C0F000
stack
page read and write
68C000
unkown
page execute and read and write
1094000
heap
page read and write
1094000
heap
page read and write
6EF000
unkown
page execute and read and write
990000
direct allocation
page read and write
1094000
heap
page read and write
EA5000
heap
page read and write
4911000
heap
page read and write
1090000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1095000
heap
page read and write
3A4E000
stack
page read and write
1094000
heap
page read and write
246D50F2000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
784000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
2A9A000
heap
page read and write
1370000
heap
page read and write
122D000
heap
page read and write
49C0000
heap
page read and write
1094000
heap
page read and write
4E70000
direct allocation
page execute and read and write
4911000
heap
page read and write
7AB000
unkown
page execute and write copy
306E000
stack
page read and write
B69000
unkown
page write copy
C90000
direct allocation
page read and write
1095000
heap
page read and write
178B8DF3000
heap
page read and write
3B4F000
stack
page read and write
49F0000
direct allocation
page execute and read and write
1094000
heap
page read and write
1094000
heap
page read and write
2F3F000
stack
page read and write
80C0000
heap
page read and write
18C4000
heap
page read and write
40FE000
stack
page read and write
1094000
heap
page read and write
389E000
stack
page read and write
1094000
heap
page read and write
47D0000
direct allocation
page read and write
434F000
stack
page read and write
156D000
heap
page read and write
1094000
heap
page read and write
5410000
direct allocation
page execute and read and write
6EF000
unkown
page execute and read and write
446F000
stack
page read and write
1095000
heap
page read and write
1094000
heap
page read and write
428F000
stack
page read and write
331F000
stack
page read and write
1094000
heap
page read and write
9A4000
heap
page read and write
37FF000
stack
page read and write
1094000
heap
page read and write
13EF000
heap
page read and write
3D4E000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4880000
direct allocation
page execute and read and write
E6E000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
47B1000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
2A5F000
stack
page read and write
1095000
heap
page read and write
D1C000
unkown
page execute and read and write
7AC000
unkown
page execute and read and write
4261000
heap
page read and write
4261000
heap
page read and write
4781000
heap
page read and write
1095000
heap
page read and write
1094000
heap
page read and write
5360000
direct allocation
page execute and read and write
10A4000
heap
page read and write
8EDA97F000
stack
page read and write
1094000
heap
page read and write
1527000
heap
page read and write
4F20000
direct allocation
page execute and read and write
1184000
heap
page read and write
8EDAA79000
stack
page read and write
1094000
heap
page read and write
79FE000
stack
page read and write
55C0000
remote allocation
page read and write
246C4CC0000
trusted library allocation
page read and write
1059000
heap
page read and write
4781000
heap
page read and write
3CF000
unkown
page execute and read and write
5330000
direct allocation
page read and write
8EDA879000
stack
page read and write
1094000
heap
page read and write
A7F000
heap
page read and write
F70000
direct allocation
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
49D0000
direct allocation
page execute and read and write
3BDF000
stack
page read and write
309F000
stack
page read and write
4781000
heap
page read and write
82FC000
stack
page read and write
1094000
heap
page read and write
36EE000
stack
page read and write
F70000
direct allocation
page read and write
350F000
stack
page read and write
4261000
heap
page read and write
448F000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
54DE000
stack
page read and write
676000
unkown
page execute and read and write
45FF000
stack
page read and write
448E000
stack
page read and write
1170000
direct allocation
page read and write
4781000
heap
page read and write
28E0000
heap
page read and write
246C4E97000
trusted library allocation
page read and write
1094000
heap
page read and write
4A10000
direct allocation
page execute and read and write
4E90000
direct allocation
page read and write
378F000
stack
page read and write
FAE000
stack
page read and write
4EA0000
heap
page read and write
2B4C000
stack
page read and write
4781000
heap
page read and write
439F000
stack
page read and write
2FDF000
stack
page read and write
4781000
heap
page read and write
4E9000
unkown
page read and write
1094000
heap
page read and write
5760000
direct allocation
page execute and read and write
1150000
heap
page read and write
2B2F000
stack
page read and write
4261000
heap
page read and write
1094000
heap
page read and write
53F0000
direct allocation
page execute and read and write
190E000
stack
page read and write
1094000
heap
page read and write
C20000
direct allocation
page read and write
1B4000
heap
page read and write
4781000
heap
page read and write
3D2E000
stack
page read and write
1960000
direct allocation
page read and write
4510000
direct allocation
page read and write
1094000
heap
page read and write
378E000
stack
page read and write
1094000
heap
page read and write
30DE000
stack
page read and write
510F000
stack
page read and write
1B4000
heap
page read and write
9A4000
heap
page read and write
784000
unkown
page execute and write copy
1094000
heap
page read and write
5420000
direct allocation
page execute and read and write
5790000
direct allocation
page execute and read and write
47D0000
direct allocation
page read and write
18C0000
heap
page read and write
44A1000
heap
page read and write
13AE000
unkown
page execute and read and write
4E90000
direct allocation
page execute and read and write
3F0E000
stack
page read and write
6E1000
unkown
page execute and write copy
1094000
heap
page read and write
1094000
heap
page read and write
675000
unkown
page execute and write copy
7FFD9B780000
trusted library allocation
page read and write
246C6698000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page execute and read and write
4EA1000
heap
page read and write
80C8000
heap
page read and write
784000
heap
page read and write
D6F000
unkown
page execute and read and write
677000
unkown
page execute and write copy
1094000
heap
page read and write
4EA1000
heap
page read and write
2D0F000
stack
page read and write
547F000
direct allocation
page read and write
1095000
heap
page read and write
10A4000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page read and write
4B00000
direct allocation
page execute and read and write
1094000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
796000
unkown
page execute and write copy
674000
unkown
page execute and read and write
1094000
heap
page read and write
3BFF000
stack
page read and write
1490000
direct allocation
page execute and read and write
4AA0000
direct allocation
page execute and read and write
1094000
heap
page read and write
4921000
heap
page read and write
1094000
heap
page read and write
4781000
heap
page read and write
47A0000
direct allocation
page read and write
4EA1000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
8EDA77E000
stack
page read and write
4781000
heap
page read and write
629F000
stack
page read and write
7BB0000
heap
page read and write
8EDAD3F000
stack
page read and write
1094000
heap
page read and write
47A0000
direct allocation
page read and write
9D0000
heap
page read and write
1095000
heap
page read and write
B04000
heap
page read and write
9A4000
heap
page read and write
4781000
heap
page read and write
246C4940000
heap
page read and write
2E175C00000
heap
page read and write
4A91000
heap
page read and write
6DF000
unkown
page execute and write copy
DA9000
unkown
page execute and read and write
4F8F000
direct allocation
page read and write
10A4000
heap
page read and write
D82000
unkown
page execute and read and write
78BF000
stack
page read and write
F21000
unkown
page execute and read and write
9A4000
heap
page read and write
295E000
stack
page read and write
8260000
heap
page read and write
4F30000
direct allocation
page execute and read and write
7FFD9BA80000
trusted library allocation
page execute and read and write
1094000
heap
page read and write
1184000
heap
page read and write
5350000
heap
page read and write
1A9E000
heap
page read and write
1094000
heap
page read and write
4A9F000
stack
page read and write
1094000
heap
page read and write
473E000
stack
page read and write
3D8E000
stack
page read and write
1094000
heap
page read and write
444F000
stack
page read and write
46EE000
stack
page read and write
4A00000
direct allocation
page execute and read and write
D23000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
C90000
direct allocation
page read and write
331F000
stack
page read and write
13AE000
stack
page read and write
18C4000
heap
page read and write
4781000
heap
page read and write
4E00000
direct allocation
page execute and read and write
8EDABBC000
stack
page read and write
1094000
heap
page read and write
6DC9000
heap
page read and write
1095000
heap
page read and write
4781000
heap
page read and write
35DE000
stack
page read and write
323F000
unkown
page read and write
4A00000
direct allocation
page execute and read and write
69C000
unkown
page execute and read and write
10A4000
heap
page read and write
389F000
stack
page read and write
D60000
heap
page read and write
784000
heap
page read and write
9A4000
heap
page read and write
1094000
heap
page read and write
C90000
direct allocation
page read and write
1094000
heap
page read and write
DD4000
heap
page read and write
699000
unkown
page execute and write copy
1094000
heap
page read and write
AE5000
unkown
page write copy
444E000
stack
page read and write
946000
unkown
page execute and read and write
4BBD000
stack
page read and write
1170000
direct allocation
page read and write
1537000
heap
page read and write
79F000
unkown
page execute and write copy
5360000
direct allocation
page execute and read and write
697000
unkown
page execute and write copy
784000
heap
page read and write
A66000
heap
page read and write
7A00000
heap
page read and write
438E000
stack
page read and write
1221000
unkown
page execute and write copy
1094000
heap
page read and write
1220000
unkown
page execute and read and write
AA4000
heap
page read and write
484F000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
E90000
direct allocation
page read and write
10A4000
heap
page read and write
5730000
direct allocation
page execute and read and write
4AA0000
direct allocation
page execute and read and write
696000
unkown
page execute and read and write
71D000
unkown
page execute and read and write
3C0E000
stack
page read and write
18C4000
heap
page read and write
1147000
heap
page read and write
246C5A38000
trusted library allocation
page read and write
514E000
stack
page read and write
1094000
heap
page read and write
401E000
stack
page read and write
4261000
heap
page read and write
4280000
heap
page read and write
1184000
heap
page read and write
49C1000
heap
page read and write
1094000
heap
page read and write
2960000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
534C000
stack
page read and write
494F000
stack
page read and write
246C4D79000
heap
page read and write
745E000
heap
page read and write
45DE000
stack
page read and write
4A1000
unkown
page execute and write copy
1094000
heap
page read and write
1094000
heap
page read and write
246DD369000
heap
page read and write
3E7E000
stack
page read and write
4920000
direct allocation
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4521000
heap
page read and write
990000
direct allocation
page read and write
1094000
heap
page read and write
1C6000
unkown
page read and write
5070000
direct allocation
page execute and read and write
13D0000
heap
page read and write
4C5E000
stack
page read and write
524F000
stack
page read and write
4E90000
direct allocation
page execute and read and write
4261000
heap
page read and write
14DA000
heap
page read and write
387E000
stack
page read and write
1184000
heap
page read and write
4781000
heap
page read and write
4261000
heap
page read and write
10DF000
heap
page read and write
4EB000
unkown
page execute and write copy
5360000
direct allocation
page execute and read and write
1095000
heap
page read and write
3F9F000
stack
page read and write
349F000
stack
page read and write
1440000
direct allocation
page read and write
249000
unkown
page execute and read and write
45CF000
stack
page read and write
161000
unkown
page execute and write copy
759D000
stack
page read and write
4DF0000
direct allocation
page execute and read and write
796000
unkown
page execute and read and write
1094000
heap
page read and write
5010000
direct allocation
page execute and read and write
57E0000
direct allocation
page execute and read and write
4911000
heap
page read and write
1094000
heap
page read and write
49C1000
heap
page read and write
4781000
heap
page read and write
10A4000
heap
page read and write
1094000
heap
page read and write
425E000
stack
page read and write
1094000
heap
page read and write
3D4F000
stack
page read and write
1094000
heap
page read and write
7D6E000
stack
page read and write
606000
unkown
page execute and read and write
1095000
heap
page read and write
1094000
heap
page read and write
F1F000
unkown
page execute and write copy
49C1000
heap
page read and write
5251000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
4781000
heap
page read and write
7D00000
remote allocation
page read and write
246C304E000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
435F000
stack
page read and write
5850000
direct allocation
page execute and read and write
1094000
heap
page read and write
739E000
stack
page read and write
25EF000
stack
page read and write
1094000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
53C0000
direct allocation
page execute and read and write
1184000
heap
page read and write
843E000
stack
page read and write
1095000
heap
page read and write
5840000
direct allocation
page execute and read and write
FF0000
heap
page read and write
5360000
direct allocation
page execute and read and write
76DE000
stack
page read and write
13F4000
heap
page read and write
4261000
heap
page read and write
1094000
heap
page read and write
4781000
heap
page read and write
121D000
heap
page read and write
4781000
heap
page read and write
18C4000
heap
page read and write
35FE000
stack
page read and write
4781000
heap
page read and write
304F000
stack
page read and write
1184000
heap
page read and write
1095000
heap
page read and write
77DF000
stack
page read and write
2ACF000
stack
page read and write
4EA1000
heap
page read and write
18C4000
heap
page read and write
4B60000
heap
page read and write
80CF000
stack
page read and write
4DD0000
direct allocation
page execute and read and write
1094000
heap
page read and write
246C3076000
heap
page read and write
3CEF000
stack
page read and write
9A4000
heap
page read and write
F70000
direct allocation
page read and write
1095000
heap
page read and write
1094000
heap
page read and write
46D000
unkown
page execute and write copy
4A91000
heap
page read and write
4E00000
direct allocation
page execute and read and write
4781000
heap
page read and write
18EE000
stack
page read and write
4781000
heap
page read and write
4F50000
direct allocation
page execute and read and write
1094000
heap
page read and write
246C62AE000
trusted library allocation
page read and write
5450000
direct allocation
page execute and read and write
5251000
heap
page read and write
1094000
heap
page read and write
38CF000
stack
page read and write
5251000
heap
page read and write
990000
direct allocation
page read and write
4781000
heap
page read and write
FDB8F7F000
stack
page read and write
1184000
heap
page read and write
1184000
heap
page read and write
CF9000
heap
page read and write
2F2A000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4261000
heap
page read and write
69A4000
heap
page read and write
246D50F9000
trusted library allocation
page read and write
F70000
unkown
page execute and read and write
178B7287000
heap
page read and write
1094000
heap
page read and write
4DA9000
stack
page read and write
1094000
heap
page read and write
3E9E000
stack
page read and write
4A00000
direct allocation
page execute and read and write
6BA000
unkown
page execute and write copy
2CDF000
stack
page read and write
833E000
stack
page read and write
1094000
heap
page read and write
456000
unkown
page execute and read and write
1094000
heap
page read and write
310F000
stack
page read and write
246DCE17000
heap
page read and write
2A90000
heap
page read and write
8EDA8FF000
stack
page read and write
321F000
stack
page read and write
1581000
heap
page read and write
1094000
heap
page read and write
5251000
heap
page read and write
A4E000
stack
page read and write
26FE000
stack
page read and write
1094000
heap
page read and write
4960000
trusted library allocation
page read and write
101000
unkown
page execute and write copy
1094000
heap
page read and write
1094000
heap
page read and write
1184000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
178B7250000
heap
page read and write
4A91000
heap
page read and write
1094000
heap
page read and write
354F000
stack
page read and write
4C1E000
stack
page read and write
335E000
stack
page read and write
1094000
heap
page read and write
4A50000
direct allocation
page execute and read and write
4EA1000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
52C0000
trusted library allocation
page read and write
CF0000
heap
page read and write
9A4000
heap
page read and write
4261000
heap
page read and write
46FF000
stack
page read and write
463E000
stack
page read and write
D29000
heap
page read and write
D5F000
unkown
page execute and write copy
5710000
direct allocation
page execute and read and write
2D0F000
stack
page read and write
4521000
heap
page read and write
1094000
heap
page read and write
6E0000
unkown
page execute and read and write
7ADE000
stack
page read and write
2E3E000
stack
page read and write
47D0000
direct allocation
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
B00000
unkown
page read and write
347F000
stack
page read and write
A84000
heap
page read and write
C20000
direct allocation
page read and write
784000
heap
page read and write
1094000
heap
page read and write
5DE000
stack
page read and write
1094000
heap
page read and write
14D0000
heap
page read and write
1597000
heap
page read and write
4911000
heap
page read and write
1094000
heap
page read and write
390F000
stack
page read and write
4911000
heap
page read and write
152A000
heap
page read and write
1094000
heap
page read and write
698000
unkown
page execute and read and write
3C1F000
stack
page read and write
1094000
heap
page read and write
77BE000
stack
page read and write
5710000
heap
page read and write
441E000
stack
page read and write
1094000
heap
page read and write
2E174270000
heap
page read and write
B90000
heap
page read and write
77DE000
stack
page read and write
784000
heap
page read and write
1094000
heap
page read and write
85D000
stack
page read and write
1094000
heap
page read and write
4EA1000
heap
page read and write
397E000
stack
page read and write
4E90000
direct allocation
page execute and read and write
4781000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
4ACF000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1095000
heap
page read and write
1094000
heap
page read and write
555D000
stack
page read and write
2D1E000
stack
page read and write
1212000
unkown
page execute and read and write
2D3C000
stack
page read and write
325E000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
1094000
heap
page read and write
2E175BD0000
trusted library allocation
page read and write
619E000
stack
page read and write
755E000
stack
page read and write
1094000
heap
page read and write
2E7E000
stack
page read and write
FBB000
heap
page read and write
1094000
heap
page read and write
4261000
heap
page read and write
10A4000
heap
page read and write
1094000
heap
page read and write
AE5000
unkown
page write copy
D0B000
unkown
page execute and read and write
420E000
stack
page read and write
246C48E0000
heap
page execute and read and write
E30000
unkown
page readonly
1AAD000
heap
page read and write
8940000
trusted library allocation
page read and write
D79000
unkown
page execute and read and write
69C2000
heap
page read and write
4781000
heap
page read and write
6C7000
unkown
page execute and read and write
5380000
direct allocation
page execute and read and write
5251000
heap
page read and write
1184000
heap
page read and write
300E000
stack
page read and write
4A90000
direct allocation
page execute and read and write
444E000
stack
page read and write
F7E000
heap
page read and write
38CF000
stack
page read and write
1094000
heap
page read and write
501000
unkown
page execute and read and write
7EBE000
stack
page read and write
6D20000
heap
page read and write
246C3002000
heap
page read and write
360F000
stack
page read and write
74A7000
heap
page read and write
1094000
heap
page read and write
44A0000
heap
page read and write
2E5E000
stack
page read and write
1094000
heap
page read and write
AA1000
heap
page read and write
330E000
stack
page read and write
7FFD9B8D0000
trusted library allocation
page read and write
1094000
heap
page read and write
5350000
direct allocation
page execute and read and write
7FFD9B9D3000
trusted library allocation
page read and write
2F5F000
stack
page read and write
2E174275000
heap
page read and write
E04000
heap
page read and write
34BE000
stack
page read and write
755E000
stack
page read and write
659000
unkown
page execute and read and write
465F000
stack
page read and write
3A9E000
stack
page read and write
4E60000
heap
page read and write
4261000
heap
page read and write
4E00000
direct allocation
page execute and read and write
325F000
stack
page read and write
D20000
heap
page read and write
1184000
heap
page read and write
55C0000
remote allocation
page read and write
9A4000
heap
page read and write
1094000
heap
page read and write
AE8000
unkown
page write copy
3B9F000
stack
page read and write
2E09000
heap
page read and write
49C1000
heap
page read and write
48A0000
direct allocation
page execute and read and write
1094000
heap
page read and write
36AF000
stack
page read and write
1095000
heap
page read and write
246C5BF1000
trusted library allocation
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
5360000
direct allocation
page execute and read and write
13D0000
heap
page read and write
31CE000
stack
page read and write
1094000
heap
page read and write
2C0E000
stack
page read and write
1094000
heap
page read and write
796000
unkown
page execute and write copy
76A99FE000
stack
page read and write
1220000
unkown
page execute and read and write
BC7000
heap
page read and write
D15000
heap
page read and write
1095000
heap
page read and write
1094000
heap
page read and write
35DF000
stack
page read and write
7E0000
heap
page read and write
F9A000
heap
page read and write
1094000
heap
page read and write
4781000
heap
page read and write
1095000
heap
page read and write
4EA1000
heap
page read and write
4250000
direct allocation
page read and write
B2A000
heap
page read and write
D99000
unkown
page execute and write copy
10A4000
heap
page read and write
7FFD9B690000
trusted library allocation
page read and write
1094000
heap
page read and write
6B4000
unkown
page execute and read and write
6E5B0000
unkown
page readonly
429E000
stack
page read and write
4261000
heap
page read and write
1094000
heap
page read and write
246C5038000
trusted library allocation
page read and write
784000
heap
page read and write
1095000
heap
page read and write
423E000
stack
page read and write
4261000
heap
page read and write
1C6000
unkown
page write copy
6BA000
unkown
page execute and write copy
47D0000
direct allocation
page read and write
E30000
unkown
page read and write
1044000
heap
page read and write
246C2F40000
heap
page read and write
45FE000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
147E000
stack
page read and write
7830000
remote allocation
page read and write
1094000
heap
page read and write
345F000
stack
page read and write
559E000
stack
page read and write
DC5000
unkown
page execute and write copy
49C1000
heap
page read and write
1094000
heap
page read and write
4261000
heap
page read and write
415E000
stack
page read and write
4FD0000
direct allocation
page execute and read and write
4781000
heap
page read and write
1095000
heap
page read and write
6A5000
unkown
page execute and write copy
11B0000
heap
page read and write
4E60000
direct allocation
page execute and read and write
1094000
heap
page read and write
3CDF000
stack
page read and write
15A6000
heap
page read and write
356F000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
345F000
stack
page read and write
2A5F000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4763000
direct allocation
page read and write
741E000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
418F000
stack
page read and write
4B0E000
stack
page read and write
1B4000
heap
page read and write
451E000
stack
page read and write
1094000
heap
page read and write
4E10000
direct allocation
page execute and read and write
395E000
stack
page read and write
1094000
heap
page read and write
10A4000
heap
page read and write
340E000
stack
page read and write
4261000
heap
page read and write
4261000
heap
page read and write
3BAF000
stack
page read and write
4F40000
direct allocation
page execute and read and write
1094000
heap
page read and write
2B80000
heap
page read and write
1170000
direct allocation
page read and write
1094000
heap
page read and write
1C5F000
stack
page read and write
4911000
heap
page read and write
2BCF000
stack
page read and write
2E9E000
stack
page read and write
4FCF000
stack
page read and write
4A80000
direct allocation
page execute and read and write
1094000
heap
page read and write
C20000
direct allocation
page read and write
D82000
unkown
page execute and read and write
42CE000
stack
page read and write
246DD067000
heap
page execute and read and write
1094000
heap
page read and write
45C000
unkown
page execute and read and write
1184000
heap
page read and write
385E000
stack
page read and write
46A0000
heap
page read and write
1095000
heap
page read and write
106F000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
8CF8000
heap
page read and write
401F000
stack
page read and write
1094000
heap
page read and write
1AE4000
heap
page read and write
246DCFE0000
heap
page execute and read and write
4EE0000
direct allocation
page execute and read and write
1094000
heap
page read and write
5380000
direct allocation
page execute and read and write
4250000
direct allocation
page read and write
3FDF000
stack
page read and write
4760000
heap
page read and write
34DF000
stack
page read and write
1960000
direct allocation
page read and write
745000
unkown
page execute and write copy
4EA1000
heap
page read and write
1094000
heap
page read and write
4510000
direct allocation
page read and write
32EF000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
2E1743E1000
heap
page read and write
144E000
stack
page read and write
DD4000
heap
page read and write
5040000
direct allocation
page execute and read and write
A68000
heap
page read and write
1094000
heap
page read and write
5E0000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
1460000
heap
page read and write
80F0000
remote allocation
page read and write
E04000
heap
page read and write
CD9000
unkown
page execute and read and write
35BE000
stack
page read and write
505E000
stack
page read and write
1094000
heap
page read and write
790000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
D91000
unkown
page execute and write copy
368F000
stack
page read and write
1124000
heap
page read and write
1094000
heap
page read and write
7FFD9B880000
trusted library allocation
page read and write
784000
heap
page read and write
1094000
heap
page read and write
AA4000
heap
page read and write
C20000
direct allocation
page read and write
1095000
heap
page read and write
13AF000
unkown
page execute and write copy
1094000
heap
page read and write
1094000
heap
page read and write
4D5F000
stack
page read and write
784000
heap
page read and write
5251000
heap
page read and write
F75000
unkown
page write copy
1094000
heap
page read and write
A6F000
heap
page read and write
E04000
heap
page read and write
839E000
stack
page read and write
F70000
direct allocation
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
67E000
unkown
page execute and read and write
394F000
stack
page read and write
7ADD000
stack
page read and write
4250000
direct allocation
page read and write
1094000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
351E000
stack
page read and write
53E0000
direct allocation
page execute and read and write
178B7625000
heap
page read and write
1094000
heap
page read and write
826E000
heap
page read and write
1094000
heap
page read and write
4521000
heap
page read and write
1094000
heap
page read and write
246C30E9000
heap
page read and write
1095000
heap
page read and write
246DD2D4000
heap
page read and write
1094000
heap
page read and write
10FF000
unkown
page execute and read and write
1A0000
heap
page read and write
4261000
heap
page read and write
9A0000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
1184000
heap
page read and write
9A0000
unkown
page readonly
9A4000
heap
page read and write
349E000
stack
page read and write
475F000
stack
page read and write
2E8F000
stack
page read and write
E00000
heap
page read and write
5730000
direct allocation
page execute and read and write
E2B000
unkown
page execute and read and write
1094000
heap
page read and write
6B3000
unkown
page execute and write copy
10A4000
heap
page read and write
2E174328000
heap
page read and write
F57000
heap
page read and write
1094000
heap
page read and write
3D0F000
stack
page read and write
404F000
stack
page read and write
361F000
stack
page read and write
4AC0000
direct allocation
page execute and read and write
4781000
heap
page read and write
4781000
heap
page read and write
7BDF000
stack
page read and write
46C000
unkown
page execute and read and write
4EA1000
heap
page read and write
4E4000
unkown
page execute and read and write
178B72C0000
heap
page read and write
4870000
direct allocation
page execute and read and write
4DD0000
direct allocation
page execute and read and write
45A0000
trusted library allocation
page read and write
4EA1000
heap
page read and write
675000
unkown
page execute and write copy
360E000
stack
page read and write
7FFD9B5E0000
trusted library allocation
page read and write
1094000
heap
page read and write
1077000
heap
page read and write
1094000
heap
page read and write
2DA0000
heap
page read and write
309F000
stack
page read and write
A58000
heap
page read and write
4F50000
direct allocation
page execute and read and write
73B0000
remote allocation
page read and write
2E3F000
stack
page read and write
1170000
direct allocation
page read and write
1094000
heap
page read and write
481F000
stack
page read and write
4CBE000
stack
page read and write
2F9E000
stack
page read and write
175C000
stack
page read and write
4EA1000
heap
page read and write
D19000
unkown
page execute and write copy
1094000
heap
page read and write
321F000
stack
page read and write
1094000
heap
page read and write
359F000
stack
page read and write
413E000
stack
page read and write
1120000
heap
page read and write
1094000
heap
page read and write
159F000
heap
page read and write
1960000
direct allocation
page read and write
1094000
heap
page read and write
4B00000
direct allocation
page execute and read and write
2E1760C0000
trusted library allocation
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
CF7000
unkown
page execute and write copy
53E0000
direct allocation
page execute and read and write
795000
unkown
page execute and write copy
4E90000
direct allocation
page execute and read and write
291F000
stack
page read and write
FDB8FFD000
stack
page read and write
1094000
heap
page read and write
2A50000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
5460000
direct allocation
page execute and read and write
100000
unkown
page read and write
9EC000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
6E1000
unkown
page execute and write copy
1094000
heap
page read and write
1043000
heap
page read and write
4781000
heap
page read and write
1DD0000
direct allocation
page read and write
36CF000
stack
page read and write
1094000
heap
page read and write
339F000
stack
page read and write
371E000
stack
page read and write
246DD090000
heap
page read and write
1094000
heap
page read and write
4510000
direct allocation
page read and write
E90000
direct allocation
page read and write
6050000
heap
page read and write
139C000
heap
page read and write
795000
unkown
page execute and read and write
4A91000
heap
page read and write
9A4000
heap
page read and write
445F000
stack
page read and write
5370000
direct allocation
page execute and read and write
5810000
direct allocation
page execute and read and write
DB7000
unkown
page execute and write copy
350E000
stack
page read and write
30FE000
stack
page read and write
1094000
heap
page read and write
4A91000
heap
page read and write
1095000
heap
page read and write
10A4000
heap
page read and write
4A91000
heap
page read and write
3C8E000
stack
page read and write
4EB000
unkown
page execute and read and write
4E50000
direct allocation
page execute and read and write
1094000
heap
page read and write
F70000
direct allocation
page read and write
CFF000
unkown
page execute and write copy
FE1000
heap
page read and write
33CF000
stack
page read and write
2D8F000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
41CE000
stack
page read and write
749D000
stack
page read and write
2F0F000
stack
page read and write
1094000
heap
page read and write
738000
unkown
page execute and read and write
33F0000
heap
page read and write
509F000
stack
page read and write
2B8A000
heap
page read and write
3B0E000
stack
page read and write
2D5E000
stack
page read and write
4900000
direct allocation
page execute and read and write
1094000
heap
page read and write
1094000
heap
page read and write
CFD000
stack
page read and write
AA4000
heap
page read and write
53B0000
direct allocation
page execute and read and write
1094000
heap
page read and write
AE9000
unkown
page execute and read and write
1094000
heap
page read and write
49C1000
heap
page read and write
1060000
heap
page read and write
D3A000
unkown
page execute and write copy
4E80000
direct allocation
page execute and read and write
371F000
stack
page read and write
497F000
stack
page read and write
1094000
heap
page read and write
5480000
direct allocation
page execute and read and write
3E5F000
stack
page read and write
4EA1000
heap
page read and write
1094000
heap
page read and write
B6B000
unkown
page execute and read and write
4781000
heap
page read and write
1ABE000
heap
page read and write
47A0000
direct allocation
page read and write
4EB000
unkown
page execute and read and write
4E20000
direct allocation
page execute and read and write
5360000
direct allocation
page execute and read and write
2E17628C000
heap
page read and write
7FFD9B7E0000
trusted library allocation
page read and write
49C1000
heap
page read and write
48E0000
direct allocation
page execute and read and write
246C4D00000
heap
page read and write
3CCF000
stack
page read and write
49C1000
heap
page read and write
1094000
heap
page read and write
4920000
direct allocation
page read and write
13C0000
heap
page read and write
485E000
stack
page read and write
784000
heap
page read and write
10A4000
heap
page read and write
D47000
unkown
page execute and read and write
676000
unkown
page execute and read and write
8FC000
stack
page read and write
1094000
heap
page read and write
4521000
heap
page read and write
5260000
heap
page read and write
3F5F000
stack
page read and write
1094000
heap
page read and write
5380000
direct allocation
page execute and read and write
3CF000
unkown
page execute and read and write
287C000
stack
page read and write
1095000
heap
page read and write
49C1000
heap
page read and write
246D50F7000
trusted library allocation
page read and write
1AB4000
heap
page read and write
1094000
heap
page read and write
455E000
stack
page read and write
7FFD9B7B0000
trusted library allocation
page execute and read and write
1094000
heap
page read and write
394E000
stack
page read and write
15CD000
heap
page read and write
4D9000
unkown
page execute and read and write
D28000
unkown
page execute and read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
484E000
stack
page read and write
458E000
stack
page read and write
791D000
stack
page read and write
3BDF000
stack
page read and write
1094000
heap
page read and write
495F000
stack
page read and write
7FFD9B600000
trusted library allocation
page read and write
4EA1000
heap
page read and write
36BF000
stack
page read and write
15C1000
heap
page read and write
1DE7000
heap
page read and write
4A00000
direct allocation
page execute and read and write
4781000
heap
page read and write
76A97FD000
unkown
page read and write
B69000
unkown
page read and write
D90000
unkown
page execute and read and write
1094000
heap
page read and write
DD4000
heap
page read and write
1094000
heap
page read and write
480000
unkown
page readonly
DD4000
heap
page read and write
1094000
heap
page read and write
DDE000
stack
page read and write
1095000
heap
page read and write
5100000
remote allocation
page read and write
A54000
heap
page read and write
2E175BD0000
trusted library allocation
page read and write
1094000
heap
page read and write
4781000
heap
page read and write
49C1000
heap
page read and write
615E000
stack
page read and write
1094000
heap
page read and write
30CF000
stack
page read and write
1094000
heap
page read and write
716E000
stack
page read and write
45A0000
trusted library allocation
page read and write
8EDACBE000
stack
page read and write
246C6674000
trusted library allocation
page read and write
1094000
heap
page read and write
107E000
heap
page read and write
1094000
heap
page read and write
DD0000
heap
page read and write
4781000
heap
page read and write
246C643E000
trusted library allocation
page read and write
2710000
heap
page read and write
390E000
stack
page read and write
1095000
heap
page read and write
1017000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
30BE000
stack
page read and write
AE4000
heap
page read and write
1094000
heap
page read and write
C5A000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
348F000
stack
page read and write
4781000
heap
page read and write
4F40000
direct allocation
page execute and read and write
545F000
direct allocation
page read and write
AA4000
heap
page read and write
CA0000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7EAE000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
152B000
heap
page read and write
4880000
direct allocation
page execute and read and write
106E000
stack
page read and write
459F000
stack
page read and write
6A8000
unkown
page execute and read and write
7FFD9B939000
trusted library allocation
page read and write
10A0000
heap
page read and write
245000
unkown
page write copy
335F000
stack
page read and write
3D1F000
stack
page read and write
4E60000
direct allocation
page execute and read and write
E31000
unkown
page execute and write copy
70B000
unkown
page execute and write copy
6A8000
unkown
page execute and read and write
1094000
heap
page read and write
3C9E000
stack
page read and write
1095000
heap
page read and write
42DE000
stack
page read and write
795000
unkown
page execute and read and write
FA7000
heap
page read and write
421E000
stack
page read and write
7AB000
unkown
page execute and write copy
3A6F000
stack
page read and write
49C1000
heap
page read and write
4F1000
unkown
page execute and write copy
4E4000
unkown
page execute and read and write
5830000
direct allocation
page execute and read and write
328F000
stack
page read and write
1094000
heap
page read and write
4911000
heap
page read and write
6BA000
unkown
page execute and write copy
160000
unkown
page read and write
729000
unkown
page execute and read and write
8CE0000
heap
page read and write
1094000
heap
page read and write
D0A000
unkown
page execute and write copy
12CE000
stack
page read and write
380E000
stack
page read and write
9A4000
heap
page read and write
3FBD000
stack
page read and write
4781000
heap
page read and write
1094000
heap
page read and write
4E40000
direct allocation
page execute and read and write
1A6E000
heap
page read and write
C10000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
3A5F000
stack
page read and write
4510000
direct allocation
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1220000
unkown
page execute and write copy
178B8DF8000
heap
page read and write
1094000
heap
page read and write
3D1F000
stack
page read and write
2F7F000
stack
page read and write
1094000
heap
page read and write
44A1000
heap
page read and write
473F000
stack
page read and write
460E000
stack
page read and write
D3E000
heap
page read and write
4EA1000
heap
page read and write
FD4000
heap
page read and write
2C8E000
stack
page read and write
1094000
heap
page read and write
1419000
heap
page read and write
5340000
direct allocation
page execute and read and write
4B10000
direct allocation
page execute and read and write
481000
unkown
page execute and write copy
1094000
heap
page read and write
4EA1000
heap
page read and write
1094000
heap
page read and write
784000
unkown
page execute and write copy
7FFD9B940000
trusted library allocation
page read and write
1094000
heap
page read and write
3BCF000
stack
page read and write
45CE000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
3DCE000
stack
page read and write
1094000
heap
page read and write
2B3E000
stack
page read and write
3C1E000
stack
page read and write
10A4000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
116F000
stack
page read and write
4FA0000
direct allocation
page execute and read and write
1094000
heap
page read and write
1094000
heap
page read and write
480F000
stack
page read and write
FDB8D7E000
stack
page read and write
46C000
unkown
page execute and write copy
1094000
heap
page read and write
3090000
heap
page read and write
4BE0000
heap
page read and write
7A9E000
stack
page read and write
6D2E000
heap
page read and write
4E40000
direct allocation
page read and write
9A0000
unkown
page read and write
4DA0000
direct allocation
page execute and read and write
7FFD9BA00000
trusted library allocation
page read and write
8EDAABE000
stack
page read and write
1094000
heap
page read and write
781F000
stack
page read and write
37CF000
stack
page read and write
1094000
heap
page read and write
434E000
stack
page read and write
18C4000
heap
page read and write
1094000
heap
page read and write
677000
unkown
page execute and write copy
1094000
heap
page read and write
2D4F000
stack
page read and write
1095000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4A91000
heap
page read and write
49C1000
heap
page read and write
1094000
heap
page read and write
179E000
stack
page read and write
385F000
stack
page read and write
E90000
direct allocation
page read and write
454F000
stack
page read and write
1095000
heap
page read and write
369F000
stack
page read and write
246C62C8000
trusted library allocation
page read and write
1184000
heap
page read and write
1094000
heap
page read and write
18DE000
stack
page read and write
10A4000
heap
page read and write
990000
direct allocation
page read and write
4A91000
heap
page read and write
31BF000
stack
page read and write
5251000
heap
page read and write
4E90000
direct allocation
page execute and read and write
4EA1000
heap
page read and write
47D0000
direct allocation
page read and write
2D4F000
stack
page read and write
1B4000
heap
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
795000
unkown
page execute and read and write
4521000
heap
page read and write
4920000
direct allocation
page read and write
4781000
heap
page read and write
726F000
stack
page read and write
1094000
heap
page read and write
10A4000
heap
page read and write
4F50000
direct allocation
page execute and read and write
4261000
heap
page read and write
1094000
heap
page read and write
4F90000
direct allocation
page execute and read and write
7FFD9B870000
trusted library allocation
page read and write
1094000
heap
page read and write
4261000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
1094000
heap
page read and write
1157000
heap
page read and write
1094000
heap
page read and write
68F000
unkown
page execute and read and write
582F000
direct allocation
page read and write
4D8F000
stack
page read and write
327E000
stack
page read and write
E2D000
unkown
page execute and read and write
AA4000
heap
page read and write
7D4D000
stack
page read and write
1095000
heap
page read and write
4A70000
direct allocation
page execute and read and write
4EFE000
stack
page read and write
1094000
heap
page read and write
4272000
heap
page read and write
473C000
stack
page read and write
E90000
direct allocation
page read and write
4DF0000
direct allocation
page execute and read and write
1094000
heap
page read and write
4F50000
direct allocation
page execute and read and write
50ED000
stack
page read and write
4FD0000
direct allocation
page execute and read and write
368E000
stack
page read and write
B23000
heap
page read and write
47CF000
stack
page read and write
8EDA9FE000
stack
page read and write
35AE000
stack
page read and write
4D80000
direct allocation
page execute and read and write
4781000
heap
page read and write
F6F000
stack
page read and write
3DDE000
stack
page read and write
2940000
heap
page read and write
1094000
heap
page read and write
248000
unkown
page write copy
2FBE000
stack
page read and write
68C000
unkown
page execute and read and write
1094000
heap
page read and write
1095000
heap
page read and write
1095000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1095000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
D52000
unkown
page execute and read and write
A91000
heap
page read and write
8EDAB36000
stack
page read and write
4B30000
direct allocation
page execute and read and write
1094000
heap
page read and write
69A0000
heap
page read and write
1094000
heap
page read and write
47A0000
direct allocation
page read and write
E04000
heap
page read and write
3B8E000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
784000
heap
page read and write
4781000
heap
page read and write
1094000
heap
page read and write
10F0000
heap
page read and write
766000
unkown
page execute and read and write
1094000
heap
page read and write
3FCF000
stack
page read and write
487F000
stack
page read and write
414F000
stack
page read and write
768000
unkown
page execute and read and write
1094000
heap
page read and write
1094000
heap
page read and write
32FF000
stack
page read and write
4A8F000
stack
page read and write
1184000
heap
page read and write
4781000
heap
page read and write
480000
unkown
page readonly
E90000
direct allocation
page read and write
1094000
heap
page read and write
3CFF000
stack
page read and write
1094000
heap
page read and write
9A4000
heap
page read and write
1094000
heap
page read and write
C90000
direct allocation
page read and write
1094000
heap
page read and write
1A6A000
heap
page read and write
1094000
heap
page read and write
4EA1000
heap
page read and write
102C000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
6E9000
unkown
page execute and write copy
9CE000
stack
page read and write
C6F000
unkown
page execute and read and write
980000
heap
page read and write
7FFD9B5ED000
trusted library allocation
page execute and read and write
1094000
heap
page read and write
283C000
stack
page read and write
13C9000
heap
page read and write
1094000
heap
page read and write
57B0000
direct allocation
page execute and read and write
1095000
heap
page read and write
1094000
heap
page read and write
4E80000
direct allocation
page execute and read and write
695000
unkown
page execute and write copy
784000
heap
page read and write
3D1E000
stack
page read and write
8A6F000
stack
page read and write
4A30000
direct allocation
page execute and read and write
5020000
direct allocation
page execute and read and write
4AB0000
direct allocation
page execute and read and write
1C8000
unkown
page execute and read and write
1094000
heap
page read and write
AE0000
unkown
page execute and read and write
1094000
heap
page read and write
1094000
heap
page read and write
13E5000
heap
page read and write
7AB000
unkown
page execute and write copy
1094000
heap
page read and write
548D000
stack
page read and write
4F00000
direct allocation
page execute and read and write
4C40000
direct allocation
page read and write
4E30000
direct allocation
page execute and read and write
399E000
stack
page read and write
4B40000
direct allocation
page execute and read and write
486E000
stack
page read and write
4B20000
direct allocation
page execute and read and write
1233000
heap
page read and write
1094000
heap
page read and write
38DE000
stack
page read and write
79D000
unkown
page execute and read and write
246C2F80000
heap
page read and write
D90000
unkown
page execute and write copy
1094000
heap
page read and write
AA0000
heap
page read and write
1094000
heap
page read and write
465E000
stack
page read and write
737000
unkown
page execute and write copy
9A4000
heap
page read and write
4521000
heap
page read and write
1094000
heap
page read and write
4D70000
direct allocation
page execute and read and write
1094000
heap
page read and write
7D1F000
stack
page read and write
308E000
stack
page read and write
1184000
heap
page read and write
4E90000
direct allocation
page execute and read and write
4781000
heap
page read and write
1094000
heap
page read and write
737000
unkown
page execute and write copy
1094000
heap
page read and write
1184000
heap
page read and write
49C1000
heap
page read and write
CF4000
heap
page read and write
3A4F000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4A91000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
104C000
heap
page read and write
314F000
stack
page read and write
10A4000
heap
page read and write
AA4000
heap
page read and write
3F4E000
stack
page read and write
4880000
direct allocation
page execute and read and write
677000
unkown
page execute and write copy
6E1000
unkown
page execute and write copy
1095000
heap
page read and write
5100000
remote allocation
page read and write
1094000
heap
page read and write
7FAE000
stack
page read and write
1094000
heap
page read and write
7830000
remote allocation
page read and write
4EC0000
direct allocation
page execute and read and write
1094000
heap
page read and write
990000
direct allocation
page read and write
3BDE000
stack
page read and write
1094000
heap
page read and write
104D000
heap
page read and write
4E50000
direct allocation
page execute and read and write
637E000
stack
page read and write
4E2000
unkown
page execute and read and write
249000
unkown
page execute and read and write
E2B000
unkown
page execute and write copy
4261000
heap
page read and write
4E63000
direct allocation
page read and write
1094000
heap
page read and write
C4B000
heap
page read and write
30DF000
stack
page read and write
4F7000
unkown
page execute and write copy
1094000
heap
page read and write
1960000
direct allocation
page read and write
5480000
direct allocation
page execute and read and write
4DA0000
direct allocation
page execute and read and write
65C0000
trusted library allocation
page read and write
E04000
heap
page read and write
7D00000
remote allocation
page read and write
1C6000
unkown
page write copy
4781000
heap
page read and write
34F000
unkown
page execute and read and write
18C4000
heap
page read and write
1407000
heap
page read and write
45EE000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
246C48A0000
heap
page readonly
47A0000
direct allocation
page read and write
4F60000
direct allocation
page execute and read and write
130E000
stack
page read and write
5770000
direct allocation
page execute and read and write
C80000
heap
page read and write
4EA1000
heap
page read and write
4F0000
unkown
page execute and read and write
246C4D3A000
heap
page read and write
154D000
heap
page read and write
1094000
heap
page read and write
49B000
unkown
page execute and read and write
3C1D000
stack
page read and write
7BDE000
stack
page read and write
4EB000
unkown
page execute and write copy
4BAE000
stack
page read and write
1094000
heap
page read and write
2F90000
heap
page read and write
76A9CFE000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
249000
unkown
page execute and read and write
152D000
heap
page read and write
4981000
heap
page read and write
9A4000
heap
page read and write
1094000
heap
page read and write
4F7000
unkown
page execute and write copy
1094000
heap
page read and write
1094000
heap
page read and write
69AB000
heap
page read and write
482F000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4A91000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
6E5CD000
unkown
page readonly
411E000
stack
page read and write
4261000
heap
page read and write
4F3F000
stack
page read and write
1C8000
unkown
page execute and read and write
352E000
stack
page read and write
4DD0000
direct allocation
page execute and read and write
1094000
heap
page read and write
161D000
heap
page read and write
1B4000
heap
page read and write
2E5F000
stack
page read and write
79F000
unkown
page execute and write copy
56E0000
direct allocation
page read and write
3AFE000
stack
page read and write
4E90000
direct allocation
page execute and read and write
9A1000
unkown
page execute and write copy
5720000
direct allocation
page execute and read and write
1094000
heap
page read and write
C90000
direct allocation
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
78FE000
stack
page read and write
159E000
heap
page read and write
4911000
heap
page read and write
1095000
heap
page read and write
44A1000
heap
page read and write
481000
unkown
page execute and write copy
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
9E0000
heap
page read and write
4781000
heap
page read and write
5251000
heap
page read and write
3A7F000
stack
page read and write
160000
unkown
page read and write
3E4F000
stack
page read and write
4F50000
direct allocation
page execute and read and write
37EF000
stack
page read and write
1095000
heap
page read and write
7FFD9B860000
trusted library allocation
page read and write
1094000
heap
page read and write
332E000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
40DF000
stack
page read and write
451F000
stack
page read and write
1184000
heap
page read and write
7E8D000
stack
page read and write
4DD0000
direct allocation
page execute and read and write
1205000
heap
page read and write
480000
unkown
page read and write
4F50000
direct allocation
page execute and read and write
2B50000
direct allocation
page read and write
6D30000
heap
page read and write
246C6628000
trusted library allocation
page read and write
11FC000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
7FFD9B890000
trusted library allocation
page read and write
1094000
heap
page read and write
E2C000
unkown
page execute and write copy
4531000
heap
page read and write
1094000
heap
page read and write
39CF000
stack
page read and write
5400000
direct allocation
page execute and read and write
3E2F000
stack
page read and write
248000
unkown
page write copy
9A4000
heap
page read and write
2CFF000
stack
page read and write
699000
unkown
page execute and write copy
D18000
unkown
page execute and read and write
1094000
heap
page read and write
151D000
heap
page read and write
55C0000
remote allocation
page read and write
4E20000
direct allocation
page execute and read and write
4DD0000
direct allocation
page execute and read and write
6A0F000
heap
page read and write
126F000
stack
page read and write
AA0000
heap
page read and write
44A1000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
294F000
stack
page read and write
775F000
stack
page read and write
246DD34F000
heap
page read and write
DC7000
unkown
page execute and read and write
1094000
heap
page read and write
34CE000
stack
page read and write
281E000
stack
page read and write
7AC000
unkown
page execute and write copy
6EF000
unkown
page execute and read and write
1094000
heap
page read and write
784000
heap
page read and write
2E176275000
heap
page read and write
1095000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
E04000
unkown
page execute and write copy
751F000
stack
page read and write
1094000
heap
page read and write
A8D000
heap
page read and write
1094000
heap
page read and write
79D000
unkown
page execute and read and write
4261000
heap
page read and write
1547000
heap
page read and write
1094000
heap
page read and write
4250000
direct allocation
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
5730000
direct allocation
page execute and read and write
4A91000
heap
page read and write
D17000
heap
page read and write
FA0000
heap
page read and write
5080000
remote allocation
page read and write
480E000
stack
page read and write
C90000
direct allocation
page read and write
1094000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
D8B000
unkown
page execute and write copy
4911000
heap
page read and write
1160000
heap
page read and write
1094000
heap
page read and write
C20000
direct allocation
page read and write
A82000
heap
page read and write
6E9000
unkown
page execute and write copy
10A4000
heap
page read and write
1094000
heap
page read and write
6C7000
unkown
page execute and read and write
44BF000
stack
page read and write
5251000
heap
page read and write
18C4000
heap
page read and write
51ED000
stack
page read and write
4E9000
unkown
page write copy
789E000
stack
page read and write
1152000
heap
page read and write
1094000
heap
page read and write
3ACF000
stack
page read and write
359F000
stack
page read and write
73AF000
stack
page read and write
1095000
heap
page read and write
9A4000
heap
page read and write
1094000
heap
page read and write
4781000
heap
page read and write
39DF000
stack
page read and write
1AEB000
heap
page read and write
5440000
direct allocation
page execute and read and write
76DD000
stack
page read and write
1094000
heap
page read and write
424E000
stack
page read and write
100E000
heap
page read and write
4EA1000
heap
page read and write
248000
unkown
page write copy
2B50000
heap
page read and write
6DC0000
heap
page read and write
1094000
heap
page read and write
1095000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
D31000
heap
page read and write
18C4000
heap
page read and write
1094000
heap
page read and write
4781000
heap
page read and write
4781000
heap
page read and write
1095000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
A87000
heap
page read and write
1094000
heap
page read and write
2A5E000
stack
page read and write
FDB8EFB000
stack
page read and write
7FFD9BA10000
trusted library allocation
page execute and read and write
1094000
heap
page read and write
40AF000
stack
page read and write
4F9E000
stack
page read and write
446000
unkown
page execute and read and write
10A4000
heap
page read and write
4A00000
direct allocation
page execute and read and write
343F000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
5440000
direct allocation
page execute and read and write
1094000
heap
page read and write
7AD000
unkown
page execute and read and write
1094000
heap
page read and write
4781000
heap
page read and write
1095000
heap
page read and write
1094000
heap
page read and write
36DF000
stack
page read and write
34DE000
stack
page read and write
4E2000
unkown
page execute and read and write
33F8000
heap
page read and write
1094000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
2B50000
direct allocation
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
3EDF000
stack
page read and write
1094000
heap
page read and write
882C000
stack
page read and write
2E4F000
stack
page read and write
4510000
direct allocation
page read and write
784000
heap
page read and write
1094000
heap
page read and write
4F60000
direct allocation
page execute and read and write
1094000
heap
page read and write
647F000
stack
page read and write
4C10000
direct allocation
page read and write
4AD0000
direct allocation
page execute and read and write
1094000
heap
page read and write
1184000
heap
page read and write
1094000
heap
page read and write
404F000
stack
page read and write
1094000
heap
page read and write
35CF000
stack
page read and write
4DC0000
direct allocation
page execute and read and write
980000
heap
page read and write
1094000
heap
page read and write
1440000
direct allocation
page read and write
4250000
direct allocation
page read and write
791F000
stack
page read and write
481000
unkown
page execute and write copy
10A4000
heap
page read and write
29D5000
heap
page read and write
4EB0000
heap
page read and write
4E50000
direct allocation
page execute and read and write
1094000
heap
page read and write
1094000
heap
page read and write
36FE000
stack
page read and write
1095000
heap
page read and write
4A91000
heap
page read and write
1094000
heap
page read and write
18C4000
heap
page read and write
7BAE000
stack
page read and write
7B9F000
stack
page read and write
384E000
stack
page read and write
490F000
stack
page read and write
7F8F000
stack
page read and write
765E000
stack
page read and write
1094000
heap
page read and write
D3B000
unkown
page execute and read and write
6D30000
heap
page read and write
524D000
stack
page read and write
178B8DE0000
heap
page read and write
1095000
heap
page read and write
4A91000
heap
page read and write
300F000
stack
page read and write
AE4000
heap
page read and write
C20000
direct allocation
page read and write
301E000
stack
page read and write
4521000
heap
page read and write
31DF000
stack
page read and write
427E000
stack
page read and write
18C4000
heap
page read and write
2E1743FC000
heap
page read and write
1094000
heap
page read and write
49C1000
heap
page read and write
425F000
stack
page read and write
7FFD9B7D0000
trusted library allocation
page execute and read and write
1094000
heap
page read and write
1094000
heap
page read and write
7132000
heap
page read and write
67F000
unkown
page execute and write copy
1094000
heap
page read and write
2AFE000
stack
page read and write
37DF000
stack
page read and write
4781000
heap
page read and write
1094000
heap
page read and write
321E000
stack
page read and write
50EF000
stack
page read and write
47D0000
direct allocation
page read and write
1960000
direct allocation
page read and write
1400000
heap
page read and write
246C66AA000
trusted library allocation
page read and write
46EF000
stack
page read and write
784000
heap
page read and write
1AC8000
heap
page read and write
2D8E000
stack
page read and write
2CDF000
stack
page read and write
4781000
heap
page read and write
1094000
heap
page read and write
1223000
heap
page read and write
1977000
heap
page read and write
2950000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
28AB000
stack
page read and write
4EA1000
heap
page read and write
4EA1000
heap
page read and write
49D0000
heap
page read and write
4EA1000
heap
page read and write
1094000
heap
page read and write
46F0000
direct allocation
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1209000
unkown
page execute and read and write
411F000
stack
page read and write
4780000
heap
page read and write
7FFD9B69C000
trusted library allocation
page execute and read and write
4781000
heap
page read and write
359E000
stack
page read and write
93C000
stack
page read and write
712D000
stack
page read and write
5490000
direct allocation
page execute and read and write
1520000
heap
page read and write
4E4000
unkown
page execute and read and write
1225000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
11B0000
heap
page read and write
4CEE000
stack
page read and write
35DE000
stack
page read and write
D16000
unkown
page execute and read and write
178B72BA000
heap
page read and write
1094000
heap
page read and write
4781000
heap
page read and write
52B000
stack
page read and write
1B4000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
428000
unkown
page execute and read and write
1094000
heap
page read and write
4521000
heap
page read and write
178B7440000
heap
page read and write
4E90000
direct allocation
page execute and read and write
1094000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
504F000
direct allocation
page read and write
5360000
direct allocation
page execute and read and write
245000
unkown
page write copy
79D000
stack
page read and write
4A40000
direct allocation
page execute and read and write
1094000
heap
page read and write
7AD000
unkown
page execute and read and write
49C1000
heap
page read and write
1094000
heap
page read and write
3ACE000
stack
page read and write
1094000
heap
page read and write
18C4000
heap
page read and write
3E7F000
stack
page read and write
4880000
direct allocation
page execute and read and write
2D4E000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
AE0000
unkown
page execute and read and write
10A4000
heap
page read and write
5010000
direct allocation
page execute and read and write
1094000
heap
page read and write
A18000
heap
page read and write
AA4000
heap
page read and write
FDB8E7B000
stack
page read and write
E90000
direct allocation
page read and write
1095000
heap
page read and write
1094000
heap
page read and write
1184000
heap
page read and write
1094000
heap
page read and write
5750000
direct allocation
page execute and read and write
4920000
direct allocation
page read and write
423F000
stack
page read and write
FDB8C77000
stack
page read and write
1153000
heap
page read and write
2E1F000
stack
page read and write
1094000
heap
page read and write
1440000
direct allocation
page read and write
4DBF000
stack
page read and write
391F000
stack
page read and write
1094000
heap
page read and write
8CDC000
stack
page read and write
1094000
heap
page read and write
49CE000
stack
page read and write
3C0F000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4261000
heap
page read and write
3F7F000
stack
page read and write
1094000
heap
page read and write
178B7284000
heap
page read and write
2ABF000
stack
page read and write
1B4000
heap
page read and write
F70000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
2B50000
direct allocation
page read and write
334F000
stack
page read and write
477E000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4EB000
unkown
page execute and write copy
245000
unkown
page read and write
1094000
heap
page read and write
1203000
heap
page read and write
2B0E000
stack
page read and write
4F80000
direct allocation
page execute and read and write
E90000
direct allocation
page read and write
246C66E4000
trusted library allocation
page read and write
E1C000
stack
page read and write
E04000
heap
page read and write
67F000
unkown
page execute and write copy
1094000
heap
page read and write
1094000
heap
page read and write
43DF000
stack
page read and write
1440000
direct allocation
page read and write
5100000
remote allocation
page read and write
1094000
heap
page read and write
4C40000
direct allocation
page read and write
799F000
stack
page read and write
1B0000
heap
page read and write
1568000
heap
page read and write
1094000
heap
page read and write
7FFD9B800000
trusted library allocation
page read and write
1094000
heap
page read and write
E04000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
4250000
direct allocation
page read and write
3BBF000
stack
page read and write
4A91000
heap
page read and write
1094000
heap
page read and write
C90000
direct allocation
page read and write
7BAE000
stack
page read and write
47A0000
direct allocation
page read and write
240000
unkown
page execute and read and write
1094000
heap
page read and write
472E000
stack
page read and write
480000
unkown
page readonly
67F000
unkown
page execute and write copy
1094000
heap
page read and write
11CB000
unkown
page execute and read and write
1C8000
unkown
page execute and read and write
4DA0000
direct allocation
page execute and read and write
1094000
heap
page read and write
439E000
stack
page read and write
AF9000
heap
page read and write
76A96FE000
stack
page read and write
18C4000
heap
page read and write
5380000
direct allocation
page execute and read and write
246C62C6000
trusted library allocation
page read and write
1094000
heap
page read and write
F70000
direct allocation
page read and write
7E7F000
stack
page read and write
333F000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1095000
heap
page read and write
7FC0000
heap
page read and write
711000
unkown
page execute and read and write
1094000
heap
page read and write
79F000
unkown
page execute and write copy
6B4000
unkown
page execute and read and write
18C4000
heap
page read and write
4981000
heap
page read and write
4910000
direct allocation
page execute and read and write
1440000
direct allocation
page read and write
1094000
heap
page read and write
4F70000
direct allocation
page execute and read and write
3A9F000
stack
page read and write
1DE0000
heap
page read and write
1A0F000
stack
page read and write
3ADE000
stack
page read and write
795E000
stack
page read and write
4F7000
unkown
page execute and write copy
361E000
stack
page read and write
5380000
direct allocation
page execute and read and write
1094000
heap
page read and write
F60000
heap
page read and write
49B0000
direct allocation
page read and write
1094000
heap
page read and write
6E0000
unkown
page execute and read and write
1094000
heap
page read and write
246DD327000
heap
page read and write
696000
unkown
page execute and read and write
4EE0000
heap
page read and write
18C4000
heap
page read and write
4781000
heap
page read and write
1094000
heap
page read and write
A7E000
stack
page read and write
1094000
heap
page read and write
4A91000
heap
page read and write
1094000
heap
page read and write
784000
heap
page read and write
1094000
heap
page read and write
4F50000
direct allocation
page execute and read and write
53D0000
direct allocation
page execute and read and write
1094000
heap
page read and write
1094000
heap
page read and write
1153000
heap
page read and write
506000
unkown
page read and write
C20000
direct allocation
page read and write
765E000
stack
page read and write
1094000
heap
page read and write
246C2F20000
heap
page read and write
1B5D000
heap
page read and write
9A4000
heap
page read and write
F70000
direct allocation
page read and write
681000
unkown
page execute and read and write
ACF000
heap
page read and write
CAE000
heap
page read and write
4781000
heap
page read and write
4781000
heap
page read and write
1094000
heap
page read and write
5251000
heap
page read and write
7FFD9B5F0000
trusted library allocation
page read and write
1094000
heap
page read and write
4A91000
heap
page read and write
1094000
heap
page read and write
C90000
direct allocation
page read and write
49BF000
stack
page read and write
1B4000
heap
page read and write
314E000
stack
page read and write
3F8F000
stack
page read and write
127E000
stack
page read and write
1184000
heap
page read and write
2E176040000
trusted library allocation
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1545000
heap
page read and write
C90000
direct allocation
page read and write
1AA8000
heap
page read and write
4521000
heap
page read and write
5000000
heap
page read and write
4521000
heap
page read and write
7FFD9B791000
trusted library allocation
page read and write
A0B000
stack
page read and write
79F000
unkown
page execute and write copy
7AB000
unkown
page execute and read and write
F75000
unkown
page write copy
381F000
stack
page read and write
2E174250000
heap
page read and write
1095000
heap
page read and write
2DF0000
heap
page read and write
1094000
heap
page read and write
5820000
direct allocation
page execute and read and write
FDB907B000
stack
page read and write
5800000
direct allocation
page execute and read and write
4E00000
direct allocation
page execute and read and write
2EDE000
stack
page read and write
719000
unkown
page execute and write copy
D91000
unkown
page execute and write copy
53D0000
direct allocation
page execute and read and write
E9E000
stack
page read and write
784000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
439E000
stack
page read and write
32CE000
stack
page read and write
246DD329000
heap
page read and write
1046000
heap
page read and write
435E000
stack
page read and write
1094000
heap
page read and write
CFA000
stack
page read and write
CFB000
heap
page read and write
106F000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
488D000
stack
page read and write
429F000
stack
page read and write
1378000
heap
page read and write
F70000
direct allocation
page read and write
1599000
heap
page read and write
2D4F000
stack
page read and write
1184000
heap
page read and write
8EDA6FD000
unkown
page read and write
1094000
heap
page read and write
28F0000
heap
page read and write
4DF0000
direct allocation
page execute and read and write
1094000
heap
page read and write
A5E000
heap
page read and write
E90000
direct allocation
page read and write
4250000
direct allocation
page read and write
4F60000
direct allocation
page execute and read and write
1095000
heap
page read and write
E15000
unkown
page execute and write copy
98B000
stack
page read and write
9A4000
heap
page read and write
1094000
heap
page read and write
2C0E000
stack
page read and write
26BE000
stack
page read and write
4E90000
direct allocation
page read and write
4781000
heap
page read and write
1094000
heap
page read and write
784000
heap
page read and write
47D0000
direct allocation
page read and write
4EA1000
heap
page read and write
318F000
stack
page read and write
4A0000
unkown
page readonly
390E000
stack
page read and write
7AB000
unkown
page execute and read and write
CA8000
heap
page read and write
C20000
direct allocation
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4261000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4E70000
heap
page read and write
76A96F4000
stack
page read and write
3BCE000
stack
page read and write
48F0000
direct allocation
page execute and read and write
7FFD9B9F0000
trusted library allocation
page read and write
1DC0000
heap
page read and write
766000
unkown
page execute and read and write
4EA1000
heap
page read and write
31DF000
stack
page read and write
47E1000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4360000
trusted library allocation
page read and write
440F000
stack
page read and write
4F90000
direct allocation
page execute and read and write
4A00000
direct allocation
page execute and read and write
2F4E000
stack
page read and write
9A4000
heap
page read and write
1094000
heap
page read and write
CA0000
heap
page read and write
13A4000
heap
page read and write
4F70000
direct allocation
page execute and read and write
699000
unkown
page execute and write copy
4781000
heap
page read and write
1094000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
1094000
heap
page read and write
1094000
heap
page read and write
4ED0000
trusted library allocation
page read and write
1094000
heap
page read and write
2B70000
heap
page read and write
246DD070000
heap
page read and write
3070000
heap
page read and write
1094000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
4A91000
heap
page read and write
719000
unkown
page execute and write copy
178B8F90000
heap
page read and write
1170000
direct allocation
page read and write
69C000
unkown
page execute and read and write
AA4000
heap
page read and write
1095000
heap
page read and write
F78000
unkown
page write copy
7FFD9B8C0000
trusted library allocation
page read and write
F6C000
stack
page read and write
1095000
heap
page read and write
5430000
direct allocation
page execute and read and write
1094000
heap
page read and write
15B9000
heap
page read and write
380F000
stack
page read and write
2CBF000
stack
page read and write
314F000
stack
page read and write
3C4E000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
5030000
direct allocation
page execute and read and write
15B0000
heap
page read and write
27DF000
stack
page read and write
1094000
heap
page read and write
AE0000
heap
page read and write
1094000
heap
page read and write
79F000
unkown
page execute and write copy
1054000
heap
page read and write
1094000
heap
page read and write
298F000
stack
page read and write
4BFC000
stack
page read and write
4521000
heap
page read and write
4EA1000
heap
page read and write
1094000
heap
page read and write
4250000
direct allocation
page read and write
67F000
unkown
page execute and write copy
A96000
heap
page read and write
2E174280000
heap
page read and write
1094000
heap
page read and write
1095000
heap
page read and write
1094000
heap
page read and write
F1E000
unkown
page execute and read and write
2A60000
heap
page read and write
1094000
heap
page read and write
396E000
stack
page read and write
1467000
heap
page read and write
4E20000
direct allocation
page execute and read and write
1095000
heap
page read and write
1094000
heap
page read and write
719000
unkown
page execute and write copy
385E000
stack
page read and write
4261000
heap
page read and write
246C4DCB000
heap
page read and write
246DD2B0000
heap
page read and write
606000
unkown
page execute and read and write
4781000
heap
page read and write
4E80000
heap
page read and write
1094000
heap
page read and write
404E000
stack
page read and write
784000
heap
page read and write
4A2B000
stack
page read and write
4920000
direct allocation
page read and write
280F000
stack
page read and write
18C4000
heap
page read and write
1A4E000
stack
page read and write
1095000
heap
page read and write
BC0000
heap
page read and write
5420000
direct allocation
page execute and read and write
1094000
heap
page read and write
1094000
heap
page read and write
4D4F000
stack
page read and write
18C4000
heap
page read and write
62DE000
stack
page read and write
1947000
heap
page read and write
5050000
direct allocation
page execute and read and write
1094000
heap
page read and write
127B000
stack
page read and write
1184000
heap
page read and write
44DF000
stack
page read and write
2DCE000
stack
page read and write
1094000
heap
page read and write
AE5000
unkown
page read and write
1094000
heap
page read and write
4F1000
unkown
page execute and write copy
E04000
heap
page read and write
246DD2A0000
heap
page read and write
3B1E000
stack
page read and write
456000
unkown
page execute and read and write
1095000
heap
page read and write
54AE000
heap
page read and write
393F000
stack
page read and write
CFD000
stack
page read and write
E04000
heap
page read and write
246C630B000
trusted library allocation
page read and write
FDB8CFE000
stack
page read and write
5410000
direct allocation
page execute and read and write
3F1E000
stack
page read and write
E90000
direct allocation
page read and write
F50000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
AE4000
heap
page read and write
18C4000
heap
page read and write
1094000
heap
page read and write
4260000
heap
page read and write
4E90000
direct allocation
page read and write
246DD060000
heap
page execute and read and write
4781000
heap
page read and write
A10000
heap
page read and write
454F000
stack
page read and write
5730000
direct allocation
page execute and read and write
A3B000
heap
page read and write
2E4F000
stack
page read and write
3F6F000
stack
page read and write
3EBE000
stack
page read and write
13B1000
unkown
page execute and read and write
1169000
heap
page read and write
18C4000
heap
page read and write
EDE000
stack
page read and write
4DE0000
direct allocation
page execute and read and write
F2A000
stack
page read and write
246C62DC000
trusted library allocation
page read and write
18C4000
heap
page read and write
1094000
heap
page read and write
3E1F000
stack
page read and write
4880000
direct allocation
page execute and read and write
1094000
heap
page read and write
246DD339000
heap
page read and write
D25000
unkown
page execute and write copy
192C000
stack
page read and write
1094000
heap
page read and write
6E0000
unkown
page execute and read and write
3ADF000
stack
page read and write
13E3000
heap
page read and write
3B0F000
stack
page read and write
246C4D38000
heap
page read and write
1094000
heap
page read and write
480000
unkown
page readonly
1532000
heap
page read and write
408E000
stack
page read and write
3B1F000
stack
page read and write
4E90000
direct allocation
page execute and read and write
13B5000
heap
page read and write
9A4000
heap
page read and write
4D8E000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1035000
heap
page read and write
18C4000
heap
page read and write
F4E000
stack
page read and write
1094000
heap
page read and write
784000
heap
page read and write
18C4000
heap
page read and write
6330000
heap
page read and write
2E176286000
heap
page read and write
2B1F000
stack
page read and write
C7F000
stack
page read and write
2B9F000
stack
page read and write
31FF000
stack
page read and write
3ADD000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4781000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
1094000
heap
page read and write
2C4E000
stack
page read and write
178B8DFA000
heap
page read and write
1095000
heap
page read and write
1094000
heap
page read and write
F6E000
stack
page read and write
48BE000
stack
page read and write
47A0000
direct allocation
page read and write
7FFD9B850000
trusted library allocation
page read and write
F70000
direct allocation
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
347E000
stack
page read and write
4D50000
trusted library allocation
page read and write
101000
unkown
page execute and write copy
4781000
heap
page read and write
3E0F000
stack
page read and write
342F000
stack
page read and write
4DE0000
direct allocation
page execute and read and write
100000
unkown
page read and write
1B4000
heap
page read and write
7AD000
unkown
page execute and read and write
651F000
stack
page read and write
40CE000
stack
page read and write
36CE000
stack
page read and write
78DE000
stack
page read and write
1094000
heap
page read and write
1360000
direct allocation
page read and write
1ADE000
heap
page read and write
14DD000
heap
page read and write
B0D000
heap
page read and write
4781000
heap
page read and write
4261000
heap
page read and write
1147000
heap
page read and write
4AEE000
stack
page read and write
1184000
heap
page read and write
1094000
heap
page read and write
4EB000
unkown
page execute and write copy
5080000
remote allocation
page read and write
54A6000
heap
page read and write
4880000
trusted library allocation
page read and write
5730000
direct allocation
page execute and read and write
1094000
heap
page read and write
1094000
heap
page read and write
E04000
heap
page read and write
1094000
heap
page read and write
44CE000
stack
page read and write
10A4000
heap
page read and write
383F000
stack
page read and write
3B8E000
stack
page read and write
44A1000
heap
page read and write
DD4000
heap
page read and write
4261000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
496F000
stack
page read and write
7460000
heap
page read and write
4250000
direct allocation
page read and write
4A91000
heap
page read and write
1094000
heap
page read and write
1184000
heap
page read and write
AE4000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
447F000
stack
page read and write
1094000
heap
page read and write
4E00000
direct allocation
page execute and read and write
79F000
unkown
page execute and write copy
49C1000
heap
page read and write
C90000
direct allocation
page read and write
7A5D000
stack
page read and write
4EA1000
heap
page read and write
1094000
heap
page read and write
9A4000
heap
page read and write
1094000
heap
page read and write
178B8DF6000
heap
page read and write
4EA1000
heap
page read and write
4F50000
direct allocation
page execute and read and write
11CB000
unkown
page execute and read and write
5360000
direct allocation
page execute and read and write
1094000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
10A4000
heap
page read and write
2CFC000
stack
page read and write
1B4000
heap
page read and write
4C40000
direct allocation
page read and write
40EE000
stack
page read and write
B6B000
unkown
page execute and write copy
5380000
direct allocation
page execute and read and write
4EA1000
heap
page read and write
375F000
stack
page read and write
5400000
direct allocation
page execute and read and write
4250000
direct allocation
page read and write
CDC000
unkown
page execute and write copy
10A4000
heap
page read and write
4510000
direct allocation
page read and write
2E70000
heap
page read and write
48C0000
direct allocation
page execute and read and write
4781000
heap
page read and write
57F0000
direct allocation
page execute and read and write
345E000
stack
page read and write
2E176040000
trusted library allocation
page read and write
F70000
direct allocation
page read and write
4781000
heap
page read and write
1407000
heap
page read and write
1094000
heap
page read and write
E80000
heap
page read and write
382E000
stack
page read and write
1094000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
4521000
heap
page read and write
1094000
heap
page read and write
25F0000
heap
page read and write
5360000
direct allocation
page execute and read and write
408F000
stack
page read and write
68A000
unkown
page execute and write copy
7FFD9B7F0000
trusted library allocation
page read and write
9A4000
heap
page read and write
1094000
heap
page read and write
80F0000
remote allocation
page read and write
1094000
heap
page read and write
D3B000
unkown
page execute and read and write
1094000
heap
page read and write
3D5F000
stack
page read and write
44A1000
heap
page read and write
73DD000
stack
page read and write
3F0E000
stack
page read and write
1B4000
heap
page read and write
44FE000
stack
page read and write
1184000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
3C3E000
stack
page read and write
5470000
direct allocation
page execute and read and write
4E90000
direct allocation
page read and write
4E90000
direct allocation
page execute and read and write
395F000
stack
page read and write
498F000
stack
page read and write
3CF000
unkown
page execute and read and write
7FFD9BA50000
trusted library allocation
page read and write
5251000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1B4000
heap
page read and write
9A0000
unkown
page readonly
2EED000
stack
page read and write
1094000
heap
page read and write
E90000
direct allocation
page read and write
4D5E000
stack
page read and write
2DDB000
heap
page read and write
1094000
heap
page read and write
B0F000
heap
page read and write
246C631F000
trusted library allocation
page read and write
331F000
stack
page read and write
49C1000
heap
page read and write
F9F000
stack
page read and write
419E000
stack
page read and write
5380000
direct allocation
page execute and read and write
481000
unkown
page execute and write copy
68A000
unkown
page execute and write copy
C20000
direct allocation
page read and write
1094000
heap
page read and write
E04000
heap
page read and write
7A6F000
stack
page read and write
1043000
heap
page read and write
1094000
heap
page read and write
4521000
heap
page read and write
1184000
heap
page read and write
DE6000
unkown
page execute and read and write
5730000
direct allocation
page execute and read and write
18C4000
heap
page read and write
246C4DE3000
heap
page read and write
2BBF000
stack
page read and write
421F000
stack
page read and write
13DD000
heap
page read and write
1094000
heap
page read and write
246C2FF0000
heap
page read and write
400F000
stack
page read and write
F79000
unkown
page execute and read and write
3A0F000
stack
page read and write
7A10000
heap
page read and write
4EA1000
heap
page read and write
C3E000
stack
page read and write
1094000
heap
page read and write
408E000
stack
page read and write
4A0000
unkown
page read and write
4981000
heap
page read and write
67F000
unkown
page execute and write copy
796000
unkown
page execute and write copy
4EA1000
heap
page read and write
784000
heap
page read and write
4890000
direct allocation
page execute and read and write
1094000
heap
page read and write
1AF0000
heap
page read and write
1094000
heap
page read and write
2F0E000
stack
page read and write
4781000
heap
page read and write
9A4000
heap
page read and write
3F8E000
stack
page read and write
E6B000
stack
page read and write
D34000
unkown
page execute and read and write
1094000
heap
page read and write
49C1000
heap
page read and write
AE3000
heap
page read and write
4521000
heap
page read and write
7FFD9B913000
trusted library allocation
page read and write
4D9000
unkown
page execute and read and write
291F000
stack
page read and write
7AAE000
stack
page read and write
11AF000
stack
page read and write
1960000
direct allocation
page read and write
795000
unkown
page execute and write copy
747000
unkown
page execute and read and write
1094000
heap
page read and write
100000
unkown
page readonly
1094000
heap
page read and write
1094000
heap
page read and write
2600000
heap
page read and write
32CF000
stack
page read and write
1094000
heap
page read and write
10A4000
heap
page read and write
399F000
stack
page read and write
1B4000
heap
page read and write
1184000
heap
page read and write
9A4000
heap
page read and write
5730000
direct allocation
page execute and read and write
1094000
heap
page read and write
F70000
direct allocation
page read and write
2B40000
heap
page read and write
1095000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4EA1000
heap
page read and write
2AAF000
unkown
page read and write
65C000
unkown
page execute and write copy
295E000
stack
page read and write
7FFD9B999000
trusted library allocation
page read and write
65C000
unkown
page execute and write copy
4781000
heap
page read and write
49C1000
heap
page read and write
1C1000
unkown
page execute and read and write
1094000
heap
page read and write
C40000
heap
page read and write
1094000
heap
page read and write
7450000
heap
page read and write
288B000
stack
page read and write
E90000
direct allocation
page read and write
1094000
heap
page read and write
47CF000
stack
page read and write
48B0000
direct allocation
page execute and read and write
784000
heap
page read and write
1094000
heap
page read and write
1221000
unkown
page execute and write copy
4781000
heap
page read and write
4911000
heap
page read and write
4A90000
heap
page read and write
9A4000
heap
page read and write
47A0000
direct allocation
page read and write
7C0D000
stack
page read and write
33CF000
stack
page read and write
1094000
heap
page read and write
9A4000
heap
page read and write
4980000
direct allocation
page read and write
4EA1000
heap
page read and write
1094000
heap
page read and write
4F50000
direct allocation
page execute and read and write
480000
unkown
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
44A0000
heap
page read and write
4F50000
direct allocation
page execute and read and write
1094000
heap
page read and write
4850000
direct allocation
page execute and read and write
784000
heap
page read and write
4781000
heap
page read and write
896E000
stack
page read and write
9A4000
heap
page read and write
4261000
heap
page read and write
1094000
heap
page read and write
5380000
direct allocation
page execute and read and write
3FFE000
stack
page read and write
DD4000
heap
page read and write
70A8000
heap
page read and write
7D00000
remote allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
310E000
stack
page read and write
3C5F000
stack
page read and write
1170000
direct allocation
page read and write
1094000
heap
page read and write
47A0000
direct allocation
page read and write
1094000
heap
page read and write
148E000
stack
page read and write
70B6000
heap
page read and write
9A4000
heap
page read and write
1184000
heap
page read and write
79D000
unkown
page execute and read and write
304F000
stack
page read and write
4D6E000
stack
page read and write
3A8E000
stack
page read and write
D90000
unkown
page execute and write copy
4E00000
trusted library allocation
page read and write
4E90000
direct allocation
page read and write
480000
unkown
page readonly
4F20000
direct allocation
page execute and read and write
AA4000
heap
page read and write
1094000
heap
page read and write
2B57000
heap
page read and write
2F5F000
stack
page read and write
4EA1000
heap
page read and write
1094000
heap
page read and write
729000
unkown
page execute and read and write
1094000
heap
page read and write
1094000
heap
page read and write
10A4000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
102D000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
AE5000
unkown
page read and write
430E000
stack
page read and write
11F1000
heap
page read and write
A84000
heap
page read and write
5144000
heap
page read and write
4EA1000
heap
page read and write
CDF000
stack
page read and write
A7C000
heap
page read and write
11F5000
heap
page read and write
284F000
stack
page read and write
47A0000
direct allocation
page read and write
338F000
stack
page read and write
1094000
heap
page read and write
689B000
stack
page read and write
1095000
heap
page read and write
354E000
stack
page read and write
2BDE000
stack
page read and write
1094000
heap
page read and write
E5E000
stack
page read and write
1094000
heap
page read and write
134C000
stack
page read and write
5460000
direct allocation
page execute and read and write
4E8F000
stack
page read and write
4EA1000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
C20000
direct allocation
page read and write
AE4000
heap
page read and write
43CF000
stack
page read and write
4E90000
direct allocation
page execute and read and write
246DD3B9000
heap
page read and write
4EA1000
heap
page read and write
1035000
heap
page read and write
13B1000
unkown
page execute and read and write
1B10000
heap
page read and write
1AD8000
heap
page read and write
5000000
direct allocation
page execute and read and write
4781000
heap
page read and write
4A91000
heap
page read and write
1B09000
heap
page read and write
C90000
direct allocation
page read and write
4F0000
unkown
page execute and read and write
189E000
stack
page read and write
399E000
stack
page read and write
1094000
heap
page read and write
784000
unkown
page execute and write copy
3A0E000
stack
page read and write
3A8F000
stack
page read and write
4C10000
direct allocation
page read and write
2A8F000
stack
page read and write
69A8000
heap
page read and write
CF4000
unkown
page execute and read and write
4781000
heap
page read and write
436E000
stack
page read and write
40BF000
stack
page read and write
4F70000
direct allocation
page execute and read and write
4261000
heap
page read and write
1094000
heap
page read and write
4261000
heap
page read and write
5251000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
1094000
heap
page read and write
1095000
heap
page read and write
67F000
unkown
page execute and read and write
246DD302000
heap
page read and write
1094000
heap
page read and write
4911000
heap
page read and write
246D5101000
trusted library allocation
page read and write
1094000
heap
page read and write
160000
unkown
page readonly
89A000
stack
page read and write
1095000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
18C4000
heap
page read and write
1094000
heap
page read and write
9BC000
stack
page read and write
7E6F000
stack
page read and write
76A96ED000
stack
page read and write
67E000
unkown
page execute and read and write
C20000
direct allocation
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4261000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4E9000
unkown
page write copy
2B9F000
stack
page read and write
157F000
heap
page read and write
165E000
stack
page read and write
1094000
heap
page read and write
432F000
stack
page read and write
1050000
heap
page read and write
7FFD9B934000
trusted library allocation
page read and write
1094000
heap
page read and write
307F000
stack
page read and write
1094000
heap
page read and write
4AAF000
stack
page read and write
1C1000
unkown
page execute and read and write
AE9000
unkown
page execute and read and write
4261000
heap
page read and write
1094000
heap
page read and write
2E8E000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
697000
unkown
page execute and write copy
6B3000
unkown
page execute and write copy
1094000
heap
page read and write
1094000
heap
page read and write
44AD000
stack
page read and write
146C000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1460000
heap
page read and write
246C2FD0000
trusted library allocation
page read and write
47D0000
direct allocation
page read and write
3C8F000
stack
page read and write
1094000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
5251000
heap
page read and write
1094000
heap
page read and write
4E9000
unkown
page write copy
E30000
unkown
page readonly
1094000
heap
page read and write
1094000
heap
page read and write
14C0000
heap
page read and write
1094000
heap
page read and write
4E00000
direct allocation
page execute and read and write
4E00000
direct allocation
page execute and read and write
4781000
heap
page read and write
431F000
stack
page read and write
474E000
stack
page read and write
1094000
heap
page read and write
1095000
heap
page read and write
3A0F000
stack
page read and write
1094000
heap
page read and write
472F000
stack
page read and write
4C7E000
stack
page read and write
1094000
heap
page read and write
2F4F000
stack
page read and write
4E2000
unkown
page execute and read and write
AFE000
heap
page read and write
2BFE000
stack
page read and write
125B000
stack
page read and write
737000
unkown
page execute and write copy
There are 4417 hidden memdumps, click here to show them.