IOC Report
SecuriteInfo.com.Win32.Evo-gen.29833.28353.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.Evo-gen.29833.28353.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\cred64[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\clip64[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\_Files_\CURQNKVOIX.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\JSDNGYCOWY.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\JSDNGYCOWY.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\KZWFNRXYKI.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\NIKHQAIQAU.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\NIKHQAIQAU.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\RAYHIWGKDI.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\ZBEDCJPBEY.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gxo5w0te.hch.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iy0vblow.bxf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iyswlnas.cwc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qprtmgnp.q1a.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Tasks\explorha.job
data
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.29833.28353.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.29833.28353.exe"
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
"C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe"
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
malicious
C:\Windows\System32\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
malicious
C:\Windows\System32\netsh.exe
netsh wlan show profiles
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://193.233.132.56/Pneh2sXQk0/index.php
193.233.132.56
malicious
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1
193.233.132.56
malicious
http://193.233.132.56/Pneh2sXQk0/Plugins/clip64.dll
193.233.132.56
malicious
http://193.233.132.56/Pneh2sXQk0/Plugins/cred64.dll
193.233.132.56
malicious
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://193.233.132.56/l
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://193.233.132.56/Pneh2sXQk0/index.phpk
unknown
http://193.233.132.56/Pneh2sXQk0/index.phpd
unknown
http://193.233.132.56/Pneh2sXQk0/index.phpg
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://aka.ms/winsvr-2022-pshelpX
unknown
http://193.233.132.56/ferences.SourceAumid
unknown
http://193.233.132.56/Pneh2sXQk0/Plugins/clip64.dllv
unknown
https://github.com/Pester/Pester
unknown
http://193.233.132.56/Pneh2sXQk0/index.phpded
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1s
unknown
http://193.233.132.56/Pneh2sXQk0/index.php3
unknown
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1;BU)(A;OICI;GXGR;;;WD)D
unknown
http://193.233.132.56/Pneh2sXQk0/index.php2
unknown
http://193.233.132.56/Pneh2sXQk0/index.php-
unknown
https://aka.ms/pscore68
unknown
http://193.233.132.56/Pneh2sXQk0/index.php27
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://193.233.132.56/
unknown
http://193.233.132.56/CoreCommonProxyStub.dll
unknown
http://193.233.132.56/Pneh2sXQk0/index.php6
unknown
There are 24 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
193.233.132.56
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5450000
direct allocation
page read and write
malicious
6C981000
unkown
page execute read
malicious
E11000
unkown
page execute and read and write
malicious
47E0000
direct allocation
page read and write
malicious
861000
unkown
page execute and read and write
malicious
4CD0000
direct allocation
page read and write
malicious
861000
unkown
page execute and read and write
malicious
861000
unkown
page execute and read and write
malicious
4D90000
direct allocation
page read and write
malicious
16C4000
heap
page read and write
F84000
heap
page read and write
B31000
unkown
page execute and read and write
7DF4363D0000
trusted library allocation
page execute and read and write
16C4000
heap
page read and write
110F000
unkown
page execute and write copy
162A000
heap
page read and write
356F000
stack
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
2CAF000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
21FF4000000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
AFD000
unkown
page execute and write copy
16C4000
heap
page read and write
57534F7000
stack
page read and write
16C4000
heap
page read and write
B25000
unkown
page execute and write copy
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
36BF000
stack
page read and write
850000
heap
page read and write
16C4000
heap
page read and write
3DEE000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
35BE000
stack
page read and write
8C9000
unkown
page write copy
1A3B90DA000
heap
page read and write
B02000
unkown
page execute and read and write
256D2C60000
trusted library allocation
page read and write
16C4000
heap
page read and write
1016000
unkown
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C0000
heap
page read and write
16C4000
heap
page read and write
10B2000
unkown
page execute and read and write
16C5000
heap
page read and write
1A3BB198000
trusted library allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
57531F9000
stack
page read and write
16C4000
heap
page read and write
BC4000
heap
page read and write
1A3D3161000
heap
page read and write
27D0000
heap
page read and write
16C4000
heap
page read and write
B6A000
unkown
page execute and write copy
3A2E000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
256D2C60000
trusted library allocation
page read and write
B4B000
unkown
page execute and read and write
16C4000
heap
page read and write
4D80000
direct allocation
page read and write
16C4000
heap
page read and write
4341000
heap
page read and write
393F000
stack
page read and write
4E50000
direct allocation
page execute and read and write
16C4000
heap
page read and write
54B3000
direct allocation
page read and write
5753476000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
49C0000
direct allocation
page execute and read and write
4F30000
direct allocation
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
256D2BB0000
trusted library allocation
page read and write
1600000
heap
page read and write
4C8E000
stack
page read and write
5630000
direct allocation
page execute and read and write
21FF5AE0000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4930000
trusted library allocation
page read and write
55D0000
direct allocation
page execute and read and write
FD6000
unkown
page execute and read and write
16C4000
heap
page read and write
6C4E000
stack
page read and write
25EE000
stack
page read and write
7FFD9B8C0000
trusted library allocation
page read and write
1A3D31E9000
heap
page read and write
16C5000
heap
page read and write
F70000
heap
page read and write
16C4000
heap
page read and write
699E000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
343F000
stack
page read and write
16C4000
heap
page read and write
6F4000
heap
page read and write
3190000
direct allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4E50000
direct allocation
page execute and read and write
16C4000
heap
page read and write
456E000
stack
page read and write
16C4000
heap
page read and write
747A000
heap
page read and write
31BF000
stack
page read and write
EAEBF7D000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
AA6000
unkown
page execute and read and write
1A3BAC35000
heap
page read and write
16C4000
heap
page read and write
2CA0000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
6F4000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
B77000
unkown
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4F10000
direct allocation
page execute and read and write
C44000
heap
page read and write
F84000
heap
page read and write
38D8FFE000
stack
page read and write
16C4000
heap
page read and write
1A3D3383000
heap
page read and write
16C4000
heap
page read and write
45AF000
stack
page read and write
AE2000
unkown
page execute and write copy
AEA000
unkown
page execute and read and write
31EE000
stack
page read and write
EAEBC7E000
stack
page read and write
4FB1000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
AE2000
unkown
page execute and write copy
16C4000
heap
page read and write
3BAF000
stack
page read and write
16C4000
heap
page read and write
FCE000
stack
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
16C4000
heap
page read and write
4341000
heap
page read and write
161D000
heap
page read and write
F84000
heap
page read and write
1A3BC5FE000
trusted library allocation
page read and write
16C4000
heap
page read and write
1A3D3114000
heap
page read and write
57530FE000
stack
page read and write
4B0B000
stack
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
C00000
direct allocation
page read and write
1A3BC642000
trusted library allocation
page read and write
7FFD9B860000
trusted library allocation
page read and write
5670000
direct allocation
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
15E2000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4831000
heap
page read and write
B6A000
unkown
page execute and write copy
7FFD9B666000
trusted library allocation
page read and write
32EF000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1A3D3375000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
B5F000
unkown
page execute and write copy
16C4000
heap
page read and write
4341000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
14FA000
stack
page read and write
41EF000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
47D0000
direct allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
F80000
direct allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
45EE000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
16C4000
heap
page read and write
6D4F000
stack
page read and write
16C5000
heap
page read and write
840000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4341000
heap
page read and write
47AF000
stack
page read and write
4F00000
direct allocation
page execute and read and write
16C4000
heap
page read and write
2C3F000
stack
page read and write
16C4000
heap
page read and write
2BE5000
heap
page read and write
1A3D3252000
heap
page read and write
16C4000
heap
page read and write
A3D000
unkown
page execute and read and write
F80000
direct allocation
page read and write
16C4000
heap
page read and write
1A3BC656000
trusted library allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
8D7000
unkown
page execute and write copy
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
C00000
direct allocation
page read and write
3180000
heap
page read and write
8C4000
unkown
page execute and read and write
2CD0000
direct allocation
page read and write
1A3D319D000
heap
page read and write
1091000
unkown
page execute and read and write
16C4000
heap
page read and write
AEA000
unkown
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
46EF000
stack
page read and write
1A3D31A4000
heap
page read and write
16C4000
heap
page read and write
B6A000
unkown
page execute and write copy
7FFD9B696000
trusted library allocation
page execute and read and write
4341000
heap
page read and write
21FF40AD000
heap
page read and write
16C4000
heap
page read and write
1A3D31D1000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
B31000
unkown
page execute and read and write
16C4000
heap
page read and write
3FAE000
stack
page read and write
F80000
direct allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
A79000
unkown
page execute and write copy
A66000
unkown
page execute and read and write
A48000
unkown
page execute and write copy
3F2E000
stack
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
4CC0000
direct allocation
page read and write
16C4000
heap
page read and write
1A3D3474000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1A3BC8FB000
trusted library allocation
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
33AF000
stack
page read and write
16C4000
heap
page read and write
10D5000
unkown
page execute and write copy
4980000
direct allocation
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
423E000
stack
page read and write
531E000
stack
page read and write
E87000
unkown
page execute and write copy
16C4000
heap
page read and write
16C4000
heap
page read and write
ADE000
unkown
page execute and write copy
16C4000
heap
page read and write
EAEBEFE000
stack
page read and write
6F4000
heap
page read and write
16C5000
heap
page read and write
A28000
unkown
page execute and write copy
16C4000
heap
page read and write
16C5000
heap
page read and write
16C5000
heap
page read and write
19DE000
stack
page read and write
1596000
heap
page read and write
256D13F0000
heap
page read and write
16C4000
heap
page read and write
7FFD9B792000
trusted library allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
1A3B911D000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
38D93FE000
stack
page read and write
482F000
stack
page read and write
1A3BC69B000
trusted library allocation
page read and write
7FFD9B5B4000
trusted library allocation
page read and write
B62000
unkown
page execute and write copy
4EC0000
direct allocation
page execute and read and write
16C4000
heap
page read and write
3190000
direct allocation
page read and write
256D11F0000
heap
page read and write
16C4000
heap
page read and write
6E00000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
AAE000
unkown
page execute and write copy
AA6000
unkown
page execute and read and write
16C4000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
256D2BB0000
trusted library allocation
page read and write
16C4000
heap
page read and write
3CEF000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
342F000
stack
page read and write
16C5000
heap
page read and write
1A3BCC68000
trusted library allocation
page read and write
16C4000
heap
page read and write
BC4000
heap
page read and write
4341000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
F80000
direct allocation
page read and write
16C4000
heap
page read and write
3D2E000
stack
page read and write
49AE000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
2CD0000
direct allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
40EE000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
7436000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
ABA000
unkown
page execute and read and write
3BEE000
stack
page read and write
1A3CB3F8000
trusted library allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
46AE000
stack
page read and write
16C4000
heap
page read and write
BC4000
heap
page read and write
5600000
direct allocation
page execute and read and write
AFD000
unkown
page execute and write copy
40FE000
stack
page read and write
16C4000
heap
page read and write
1A3BAC00000
heap
page execute and read and write
16C4000
heap
page read and write
2E3E000
stack
page read and write
10FB000
unkown
page execute and read and write
16C4000
heap
page read and write
1A3BC612000
trusted library allocation
page read and write
B79000
unkown
page execute and write copy
16C4000
heap
page read and write
16C4000
heap
page read and write
B52000
unkown
page execute and write copy
6F4000
heap
page read and write
AFB000
unkown
page execute and write copy
1A3BC7BE000
trusted library allocation
page read and write
1A3BC92E000
trusted library allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
48F1000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
5790000
heap
page read and write
16C4000
heap
page read and write
4E90000
direct allocation
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4DCE000
stack
page read and write
B62000
unkown
page execute and write copy
16C4000
heap
page read and write
B4B000
unkown
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
256D2BB0000
trusted library allocation
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
16C4000
heap
page read and write
2BBE000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
55E0000
direct allocation
page execute and read and write
3E6E000
stack
page read and write
16C4000
heap
page read and write
4E80000
direct allocation
page execute and read and write
1A3CB3FA000
trusted library allocation
page read and write
4A00000
direct allocation
page execute and read and write
16C4000
heap
page read and write
38EE000
stack
page read and write
16C4000
heap
page read and write
B77000
unkown
page execute and write copy
16C4000
heap
page read and write
16C4000
heap
page read and write
3BEE000
stack
page read and write
16C4000
heap
page read and write
ACB000
unkown
page execute and read and write
16C4000
heap
page read and write
2637000
heap
page read and write
6F4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
B5F000
unkown
page execute and write copy
A8D000
unkown
page execute and read and write
108E000
unkown
page execute and write copy
16C4000
heap
page read and write
3E3F000
stack
page read and write
4341000
heap
page read and write
1A3CB17A000
trusted library allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4BAC000
stack
page read and write
16C4000
heap
page read and write
FF8000
unkown
page execute and write copy
2CEE000
stack
page read and write
1642000
heap
page read and write
AE2000
unkown
page execute and write copy
4341000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
F90000
heap
page read and write
16C4000
heap
page read and write
AB7000
unkown
page execute and write copy
C00000
direct allocation
page read and write
16C4000
heap
page read and write
3E2F000
stack
page read and write
3EEF000
stack
page read and write
2F2F000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
BC4000
heap
page read and write
16C4000
heap
page read and write
4DCE000
stack
page read and write
41EF000
stack
page read and write
7FFD9B5BD000
trusted library allocation
page execute and read and write
8CB000
unkown
page execute and write copy
16C4000
heap
page read and write
B5F000
unkown
page execute and write copy
8CB000
unkown
page execute and read and write
16C4000
heap
page read and write
860000
unkown
page readonly
A66000
unkown
page execute and read and write
48F0000
heap
page read and write
FD8000
heap
page read and write
4960000
direct allocation
page execute and read and write
307F000
stack
page read and write
107B000
unkown
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
163B000
heap
page read and write
396E000
stack
page read and write
53D000
stack
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
48F1000
heap
page read and write
4341000
heap
page read and write
4E6F000
stack
page read and write
16C4000
heap
page read and write
F80000
direct allocation
page read and write
16C4000
heap
page read and write
452F000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
57B4000
heap
page read and write
575307E000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1A3D3419000
heap
page read and write
16C5000
heap
page read and write
4341000
heap
page read and write
16C4000
heap
page read and write
4341000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
A64000
unkown
page execute and write copy
6F4000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
4350000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4341000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4831000
heap
page read and write
16C4000
heap
page read and write
4990000
direct allocation
page execute and read and write
16C4000
heap
page read and write
7FFD9B8D0000
trusted library allocation
page read and write
8D7000
unkown
page execute and write copy
BC4000
heap
page read and write
861000
unkown
page execute and write copy
16C4000
heap
page read and write
8C9000
unkown
page read and write
6F4000
heap
page read and write
4D80000
direct allocation
page read and write
3B2F000
stack
page read and write
48F1000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
4F20000
direct allocation
page execute and read and write
16C4000
heap
page read and write
E10000
unkown
page read and write
16C4000
heap
page read and write
4440000
trusted library allocation
page read and write
3F7F000
stack
page read and write
5440000
direct allocation
page read and write
32EF000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
47FE000
stack
page read and write
B68000
unkown
page execute and read and write
AFB000
unkown
page execute and write copy
16C4000
heap
page read and write
16C4000
heap
page read and write
1624000
heap
page read and write
1616000
heap
page read and write
2EEF000
stack
page read and write
1A3BAAD0000
heap
page readonly
1A3BC629000
trusted library allocation
page read and write
81D000
stack
page read and write
1A3D33DD000
heap
page read and write
4C2D000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
3190000
direct allocation
page read and write
1032000
unkown
page execute and write copy
6C980000
unkown
page readonly
4E20000
direct allocation
page execute and read and write
326F000
stack
page read and write
16C5000
heap
page read and write
BCE000
stack
page read and write
3AAE000
stack
page read and write
16C4000
heap
page read and write
6F4000
heap
page read and write
16C4000
heap
page read and write
382E000
stack
page read and write
1A3BCD2D000
trusted library allocation
page read and write
16C4000
heap
page read and write
10AD000
unkown
page execute and write copy
16C4000
heap
page read and write
860000
unkown
page readonly
16C4000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
16C4000
heap
page read and write
4FAF000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
7FFD9B5C0000
trusted library allocation
page read and write
7FFD9B918000
trusted library allocation
page read and write
16C4000
heap
page read and write
312F000
stack
page read and write
3BBF000
stack
page read and write
B02000
unkown
page execute and read and write
256D2BB0000
trusted library allocation
page read and write
16C4000
heap
page read and write
38D8B4E000
stack
page read and write
16C4000
heap
page read and write
2F6E000
stack
page read and write
1A3D34AE000
heap
page read and write
1A3BAB80000
heap
page read and write
16C4000
heap
page read and write
B52000
unkown
page execute and write copy
F6E000
stack
page read and write
32AE000
stack
page read and write
1118000
unkown
page execute and read and write
F7E000
stack
page read and write
541D000
stack
page read and write
486E000
stack
page read and write
1A3BC6AF000
trusted library allocation
page read and write
1600000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
35AE000
stack
page read and write
AE1000
unkown
page execute and read and write
1530000
heap
page read and write
A7A000
unkown
page execute and read and write
496F000
stack
page read and write
6F40000
heap
page read and write
1A3D3365000
heap
page read and write
16C4000
heap
page read and write
432F000
stack
page read and write
16C4000
heap
page read and write
A26000
unkown
page execute and read and write
16C4000
heap
page read and write
4E50000
direct allocation
page execute and read and write
16C5000
heap
page read and write
1A3CB131000
trusted library allocation
page read and write
16C4000
heap
page read and write
E10000
unkown
page readonly
C00000
direct allocation
page read and write
16C4000
heap
page read and write
AEA000
unkown
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1127000
unkown
page execute and read and write
16C5000
heap
page read and write
1A3B90CE000
heap
page read and write
3190000
direct allocation
page read and write
16C4000
heap
page read and write
1A3BC16B000
trusted library allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
432F000
stack
page read and write
16C4000
heap
page read and write
332C000
stack
page read and write
26E0000
heap
page read and write
16C4000
heap
page read and write
575367F000
stack
page read and write
16C4000
heap
page read and write
366E000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
B6A000
unkown
page execute and write copy
4960000
direct allocation
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4341000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
7FFD9B750000
trusted library allocation
page read and write
F80000
direct allocation
page read and write
4341000
heap
page read and write
21FF5A40000
heap
page read and write
4D80000
direct allocation
page read and write
4960000
direct allocation
page execute and read and write
4F10000
direct allocation
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
256D1060000
heap
page read and write
B26000
unkown
page execute and read and write
16C4000
heap
page read and write
6A05000
heap
page read and write
16C4000
heap
page read and write
4720000
heap
page read and write
55D0000
direct allocation
page execute and read and write
1A3B90A2000
heap
page read and write
1624000
heap
page read and write
16C4000
heap
page read and write
1A3BB111000
trusted library allocation
page read and write
2CD0000
direct allocation
page read and write
860000
unkown
page read and write
16C4000
heap
page read and write
6A06000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
1A3D3570000
trusted library allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
A48000
unkown
page execute and read and write
16C4000
heap
page read and write
7FFD9B76A000
trusted library allocation
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
189E000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
6F4000
heap
page read and write
BC4000
heap
page read and write
16C4000
heap
page read and write
A77000
unkown
page execute and write copy
16C5000
heap
page read and write
1A3BAAA0000
trusted library allocation
page read and write
2D90000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
A48000
unkown
page execute and read and write
16C4000
heap
page read and write
1A3D31F8000
heap
page read and write
C00000
direct allocation
page read and write
16C4000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
1A3D3427000
heap
page read and write
16C4000
heap
page read and write
10D6000
unkown
page execute and read and write
A3D000
unkown
page execute and read and write
16C4000
heap
page read and write
B61000
unkown
page execute and read and write
ACA000
unkown
page execute and write copy
346E000
stack
page read and write
16C4000
heap
page read and write
4341000
heap
page read and write
16C4000
heap
page read and write
2A2F000
stack
page read and write
106A000
unkown
page execute and read and write
E7B000
unkown
page execute and read and write
40AF000
stack
page read and write
446F000
stack
page read and write
16C4000
heap
page read and write
2630000
heap
page read and write
16C4000
heap
page read and write
55D0000
direct allocation
page execute and read and write
16C4000
heap
page read and write
1102000
unkown
page execute and write copy
7FFD9B9D0000
trusted library allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
3E7E000
stack
page read and write
256D3130000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
108D000
unkown
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1A3BAA60000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
555C000
stack
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
1520000
heap
page read and write
16C4000
heap
page read and write
3190000
direct allocation
page read and write
B5F000
unkown
page execute and write copy
4341000
heap
page read and write
4F0D000
stack
page read and write
16C4000
heap
page read and write
436E000
stack
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
F80000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4831000
heap
page read and write
7FFD9B5B0000
trusted library allocation
page read and write
6F4000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
42EE000
stack
page read and write
16C4000
heap
page read and write
7FFD9B890000
trusted library allocation
page read and write
16C4000
heap
page read and write
548C000
stack
page read and write
46EF000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
B5F000
unkown
page execute and write copy
47D0000
direct allocation
page read and write
6E10000
heap
page read and write
4D2F000
stack
page read and write
A82000
unkown
page execute and write copy
16C4000
heap
page read and write
AA2000
unkown
page execute and write copy
1A3BBEF0000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
ADE000
unkown
page execute and write copy
2DF6000
heap
page read and write
16C4000
heap
page read and write
256D2C60000
trusted library allocation
page read and write
ACA000
unkown
page execute and write copy
16C4000
heap
page read and write
ADE000
unkown
page execute and write copy
16C4000
heap
page read and write
16C4000
heap
page read and write
263D000
heap
page read and write
16C4000
heap
page read and write
F80000
direct allocation
page read and write
16C4000
heap
page read and write
C00000
direct allocation
page read and write
16C4000
heap
page read and write
A26000
unkown
page execute and read and write
15DB000
heap
page read and write
16C5000
heap
page read and write
7FFD9B5B2000
trusted library allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
422E000
stack
page read and write
AFB000
unkown
page execute and write copy
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
7FFD9B7F0000
trusted library allocation
page read and write
16C4000
heap
page read and write
A82000
unkown
page execute and write copy
5752DEE000
stack
page read and write
4341000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
256D12D8000
heap
page read and write
4341000
heap
page read and write
4CC0000
direct allocation
page read and write
16C4000
heap
page read and write
47D0000
direct allocation
page read and write
3D3E000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
36EE000
stack
page read and write
16C4000
heap
page read and write
7430000
heap
page read and write
1A3D3600000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
111A000
unkown
page execute and write copy
256D1263000
heap
page read and write
16C4000
heap
page read and write
BC4000
heap
page read and write
A48000
unkown
page execute and write copy
21FF3EF0000
heap
page read and write
4F10000
direct allocation
page execute and read and write
16C4000
heap
page read and write
F84000
heap
page read and write
4F80000
direct allocation
page execute and read and write
16C4000
heap
page read and write
742C000
stack
page read and write
357F000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
21FF4068000
heap
page read and write
7FFD9B7C0000
trusted library allocation
page read and write
16C4000
heap
page read and write
B6A000
unkown
page execute and write copy
2CD0000
direct allocation
page read and write
16C4000
heap
page read and write
15C1000
heap
page read and write
16C4000
heap
page read and write
446F000
stack
page read and write
256D2BB0000
trusted library allocation
page read and write
16C4000
heap
page read and write
50B0000
trusted library allocation
page read and write
2DFF000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1A3B9430000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
1A3D3240000
heap
page read and write
1A3BC66C000
trusted library allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
A7A000
unkown
page execute and read and write
16C4000
heap
page read and write
1111000
unkown
page execute and read and write
2BC0000
heap
page read and write
16C4000
heap
page read and write
5752DAE000
unkown
page read and write
5640000
direct allocation
page execute and read and write
16C5000
heap
page read and write
7FFD9B6D0000
trusted library allocation
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4341000
heap
page read and write
16C4000
heap
page read and write
34EF000
stack
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
273F000
stack
page read and write
FD8000
unkown
page execute and write copy
7FFD9B870000
trusted library allocation
page read and write
B77000
unkown
page execute and write copy
AFC000
unkown
page execute and read and write
16C4000
heap
page read and write
57532FE000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
263C000
stack
page read and write
16C4000
heap
page read and write
49B0000
direct allocation
page execute and read and write
B77000
unkown
page execute and read and write
16C4000
heap
page read and write
8C4000
unkown
page execute and read and write
7FFD9B8B0000
trusted library allocation
page read and write
861000
unkown
page execute and write copy
5660000
direct allocation
page execute and read and write
57537FB000
stack
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
1A3BAB50000
trusted library allocation
page read and write
C00000
direct allocation
page read and write
16C4000
heap
page read and write
A79000
unkown
page execute and write copy
1A3BC97A000
trusted library allocation
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
BBE000
stack
page read and write
8D7000
unkown
page execute and write copy
6F4000
heap
page read and write
16C4000
heap
page read and write
21FF3FD0000
heap
page read and write
16C4000
heap
page read and write
3E2F000
stack
page read and write
B26000
unkown
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
39EF000
stack
page read and write
16C4000
heap
page read and write
6D60000
heap
page read and write
3190000
direct allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4341000
heap
page read and write
16C4000
heap
page read and write
15E3000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
8C9000
unkown
page read and write
16C4000
heap
page read and write
8B4F000
stack
page read and write
4F70000
direct allocation
page execute and read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
21FF4077000
heap
page read and write
7FFD9B660000
trusted library allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
109A000
unkown
page execute and read and write
16C5000
heap
page read and write
6C994000
unkown
page readonly
1A3CB141000
trusted library allocation
page read and write
1A3B9260000
heap
page read and write
1A3CB111000
trusted library allocation
page read and write
4F10000
direct allocation
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1A3BC6DE000
trusted library allocation
page read and write
F9E000
heap
page read and write
1A3B9090000
heap
page read and write
256D12BF000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
4F50000
direct allocation
page execute and read and write
575377E000
stack
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
4341000
heap
page read and write
16C4000
heap
page read and write
2A7B000
stack
page read and write
EAEBE7D000
stack
page read and write
16C4000
heap
page read and write
AFD000
unkown
page execute and write copy
52CD000
stack
page read and write
8CB000
unkown
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
B49000
unkown
page execute and write copy
110F000
unkown
page execute and write copy
1A3BC99C000
trusted library allocation
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1067000
unkown
page execute and write copy
1A3BAF80000
heap
page read and write
3FBE000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4341000
heap
page read and write
A8D000
unkown
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1A3CB402000
trusted library allocation
page read and write
16C4000
heap
page read and write
6F4000
heap
page read and write
16C4000
heap
page read and write
2CC0000
heap
page read and write
5440000
direct allocation
page read and write
575327E000
stack
page read and write
3FAE000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
AA6000
unkown
page execute and read and write
7FFD9B8A0000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
36AF000
stack
page read and write
4341000
heap
page read and write
35AE000
stack
page read and write
16C4000
heap
page read and write
8C9000
unkown
page write copy
16C4000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
57B0000
heap
page read and write
2CE0000
heap
page read and write
7DF4363B0000
trusted library allocation
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1A3B90EE000
heap
page read and write
16C4000
heap
page read and write
E79000
unkown
page read and write
392F000
stack
page read and write
16C4000
heap
page read and write
347E000
stack
page read and write
1A3BAAC0000
trusted library allocation
page read and write
2CD0000
direct allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
BD0000
heap
page read and write
422E000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
49A0000
direct allocation
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
49D0000
direct allocation
page execute and read and write
16C4000
heap
page read and write
C00000
direct allocation
page read and write
4960000
direct allocation
page execute and read and write
4341000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
B49000
unkown
page execute and write copy
C75000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
316E000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
7FFD9B5D0000
trusted library allocation
page read and write
383E000
stack
page read and write
2DDE000
heap
page read and write
1A3BC66F000
trusted library allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
306F000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4780000
heap
page read and write
16C5000
heap
page read and write
3DAF000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
ABA000
unkown
page execute and read and write
EAEB906000
stack
page read and write
16C4000
heap
page read and write
4341000
heap
page read and write
4D33000
direct allocation
page read and write
111A000
unkown
page execute and write copy
16C4000
heap
page read and write
16C4000
heap
page read and write
382E000
stack
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
2CD0000
direct allocation
page read and write
AA2000
unkown
page execute and write copy
F0E000
stack
page read and write
B62000
unkown
page execute and write copy
16C4000
heap
page read and write
7FFD9B60C000
trusted library allocation
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
47BF000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
3ABE000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4831000
heap
page read and write
5440000
direct allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
21FF4074000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1658000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1A3B918B000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
16C4000
heap
page read and write
E79000
unkown
page write copy
A82000
unkown
page execute and write copy
16C4000
heap
page read and write
41EF000
stack
page read and write
1A3D3446000
heap
page read and write
57536FC000
stack
page read and write
6C99B000
unkown
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
16C4000
heap
page read and write
746D000
heap
page read and write
2A3F000
stack
page read and write
B79000
unkown
page execute and write copy
F80000
direct allocation
page read and write
16C4000
heap
page read and write
7FFD9B91C000
trusted library allocation
page read and write
6D0000
heap
page read and write
16C4000
heap
page read and write
402E000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
F80000
direct allocation
page read and write
16C4000
heap
page read and write
BFC000
stack
page read and write
A28000
unkown
page execute and write copy
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
36EE000
stack
page read and write
7FFD9B9A3000
trusted library allocation
page read and write
16C4000
heap
page read and write
4AAF000
stack
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
BC4000
heap
page read and write
AB7000
unkown
page execute and write copy
A48000
unkown
page execute and write copy
C00000
direct allocation
page read and write
21FF4005000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
507E000
stack
page read and write
16C4000
heap
page read and write
256D13F5000
heap
page read and write
256D2BB0000
trusted library allocation
page read and write
861000
unkown
page execute and write copy
16C4000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
860000
unkown
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
F80000
direct allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
346E000
stack
page read and write
16C4000
heap
page read and write
416F000
stack
page read and write
6F4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
43EF000
stack
page read and write
6F0000
heap
page read and write
16C4000
heap
page read and write
F84000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4F90000
direct allocation
page execute and read and write
1A3BB339000
trusted library allocation
page read and write
4341000
heap
page read and write
1A3BAC07000
heap
page execute and read and write
C10000
heap
page read and write
4820000
heap
page read and write
F9A000
heap
page read and write
16C4000
heap
page read and write
103D000
unkown
page execute and read and write
16C4000
heap
page read and write
6B0F000
stack
page read and write
16C4000
heap
page read and write
40EE000
stack
page read and write
7FFD9BA20000
trusted library allocation
page read and write
2E2E000
stack
page read and write
B25000
unkown
page execute and write copy
16C4000
heap
page read and write
1A3D3466000
heap
page read and write
590000
heap
page read and write
16C4000
heap
page read and write
1A3D3110000
heap
page read and write
BC4000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
F80000
direct allocation
page read and write
1A3D349A000
heap
page read and write
2CFE000
stack
page read and write
16C4000
heap
page read and write
2BE0000
heap
page read and write
4E30000
direct allocation
page execute and read and write
6A00000
heap
page read and write
16C4000
heap
page read and write
10F9000
unkown
page execute and write copy
AAE000
unkown
page execute and write copy
F80000
direct allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
AB6000
unkown
page execute and read and write
B25000
unkown
page execute and write copy
EFD000
stack
page read and write
C00000
direct allocation
page read and write
30BE000
stack
page read and write
356F000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4341000
heap
page read and write
A8D000
unkown
page execute and read and write
A64000
unkown
page execute and write copy
6E01000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
ADD000
unkown
page execute and read and write
1A3BB100000
heap
page execute and read and write
16C4000
heap
page read and write
163A000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
31A0000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
EAEBFFB000
stack
page read and write
1066000
unkown
page execute and read and write
1014000
unkown
page execute and write copy
289F000
stack
page read and write
6F4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
283F000
stack
page read and write
2DEF000
stack
page read and write
2BAB000
stack
page read and write
B79000
unkown
page execute and write copy
16C4000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
3190000
direct allocation
page read and write
A78000
unkown
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
156E000
heap
page read and write
1A3B9280000
heap
page read and write
AFC000
unkown
page execute and read and write
16C4000
heap
page read and write
162C000
heap
page read and write
F84000
heap
page read and write
3BFE000
stack
page read and write
21FF4086000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4341000
heap
page read and write
C00000
direct allocation
page read and write
16C4000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
7FFD9B66C000
trusted library allocation
page execute and read and write
1A3BC9E5000
trusted library allocation
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
36AF000
stack
page read and write
1659000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
7DF4363C0000
trusted library allocation
page execute and read and write
2CD0000
direct allocation
page read and write
118F000
stack
page read and write
2CE7000
heap
page read and write
16C4000
heap
page read and write
B02000
unkown
page execute and read and write
6F4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
256D12DF000
heap
page read and write
156A000
heap
page read and write
69DE000
stack
page read and write
4341000
heap
page read and write
16C4000
heap
page read and write
37AE000
stack
page read and write
55C0000
direct allocation
page execute and read and write
3F6E000
stack
page read and write
16C5000
heap
page read and write
2A3B000
stack
page read and write
4D6E000
stack
page read and write
1112000
unkown
page execute and write copy
16C4000
heap
page read and write
16C5000
heap
page read and write
4340000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1129000
unkown
page execute and write copy
7FFD9BA40000
trusted library allocation
page read and write
4341000
heap
page read and write
F84000
heap
page read and write
16C4000
heap
page read and write
6F4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
6F4000
heap
page read and write
3A7F000
stack
page read and write
4960000
direct allocation
page execute and read and write
16C4000
heap
page read and write
1A3CB3F3000
trusted library allocation
page read and write
16C4000
heap
page read and write
21FF4010000
heap
page read and write
16C4000
heap
page read and write
3190000
direct allocation
page read and write
16C4000
heap
page read and write
2CD0000
direct allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
E74000
unkown
page execute and read and write
15C1000
heap
page read and write
491F000
stack
page read and write
B52000
unkown
page execute and write copy
EAEBDFB000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
B77000
unkown
page execute and write copy
4341000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
575317F000
stack
page read and write
16C4000
heap
page read and write
4341000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
F3E000
stack
page read and write
2F3F000
stack
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
37EF000
stack
page read and write
517F000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
262E000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
ACA000
unkown
page execute and write copy
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
47EE000
stack
page read and write
558F000
stack
page read and write
4830000
heap
page read and write
32FF000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
4F10000
direct allocation
page execute and read and write
4341000
heap
page read and write
16C4000
heap
page read and write
BA0000
heap
page read and write
477E000
stack
page read and write
1A3BB6E5000
trusted library allocation
page read and write
5620000
direct allocation
page execute and read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
ADD000
unkown
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
B68000
unkown
page execute and read and write
4D2E000
stack
page read and write
4AEE000
stack
page read and write
16C4000
heap
page read and write
2CD0000
direct allocation
page read and write
16C4000
heap
page read and write
BB0000
heap
page read and write
CA2000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page execute and read and write
1600000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
ACB000
unkown
page execute and read and write
16C4000
heap
page read and write
4C7E000
stack
page read and write
162A000
heap
page read and write
16C4000
heap
page read and write
1A3D3320000
heap
page execute and read and write
16C4000
heap
page read and write
EAEBCFE000
stack
page read and write
481C000
stack
page read and write
4CBF000
stack
page read and write
16C4000
heap
page read and write
161E000
heap
page read and write
B61000
unkown
page execute and read and write
500F000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4E70000
direct allocation
page execute and read and write
5650000
direct allocation
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
AD8000
unkown
page execute and write copy
16C4000
heap
page read and write
16C4000
heap
page read and write
B31000
unkown
page execute and read and write
16C4000
heap
page read and write
10E1000
unkown
page execute and read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1A3B90D8000
heap
page read and write
21FF40B1000
heap
page read and write
21FF4060000
heap
page read and write
49F0000
direct allocation
page execute and read and write
7FFD9B810000
trusted library allocation
page read and write
16C4000
heap
page read and write
4FB0000
heap
page read and write
16C4000
heap
page read and write
3190000
direct allocation
page read and write
AA2000
unkown
page execute and write copy
16C5000
heap
page read and write
4341000
heap
page read and write
2FEF000
stack
page read and write
7FFD9B8E3000
trusted library allocation
page read and write
F84000
heap
page read and write
E11000
unkown
page execute and write copy
3BAE000
stack
page read and write
442E000
stack
page read and write
7FFD9B880000
trusted library allocation
page read and write
1560000
heap
page read and write
4ECF000
stack
page read and write
1A3BC685000
trusted library allocation
page read and write
C00000
direct allocation
page read and write
45AF000
stack
page read and write
16C4000
heap
page read and write
A48000
unkown
page execute and read and write
16C4000
heap
page read and write
1088000
unkown
page execute and write copy
860000
unkown
page readonly
2B7F000
stack
page read and write
256D1160000
heap
page read and write
3190000
direct allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
4BEF000
stack
page read and write
16C4000
heap
page read and write
ACB000
unkown
page execute and read and write
2CBF000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
3190000
direct allocation
page read and write
342F000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
3190000
direct allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
7FFD9B840000
trusted library allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
A26000
unkown
page execute and read and write
16C4000
heap
page read and write
392F000
stack
page read and write
31FE000
stack
page read and write
F80000
direct allocation
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
A79000
unkown
page execute and write copy
16C5000
heap
page read and write
49F0000
trusted library allocation
page read and write
8CB000
unkown
page execute and read and write
4970000
direct allocation
page execute and read and write
16C4000
heap
page read and write
4341000
heap
page read and write
5752D23000
stack
page read and write
AB6000
unkown
page execute and read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
3190000
direct allocation
page read and write
1600000
heap
page read and write
16C4000
heap
page read and write
38D8EFE000
unkown
page read and write
16C5000
heap
page read and write
3E6E000
stack
page read and write
16C4000
heap
page read and write
BC4000
heap
page read and write
A28000
unkown
page execute and write copy
16C4000
heap
page read and write
7492000
heap
page read and write
BC0000
heap
page read and write
16C4000
heap
page read and write
38D8B3D000
stack
page read and write
2CD0000
direct allocation
page read and write
36FE000
stack
page read and write
16C4000
heap
page read and write
860000
unkown
page read and write
1A3BC6E4000
trusted library allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1A3B9435000
heap
page read and write
16C4000
heap
page read and write
267C000
stack
page read and write
40BF000
stack
page read and write
256D12B4000
heap
page read and write
33EE000
stack
page read and write
A3D000
unkown
page execute and read and write
C00000
direct allocation
page read and write
38D90FD000
stack
page read and write
AFC000
unkown
page execute and read and write
333E000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4D6F000
stack
page read and write
41FF000
stack
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
15A6000
heap
page read and write
2CD0000
direct allocation
page read and write
4341000
heap
page read and write
4E50000
direct allocation
page execute and read and write
6F4000
heap
page read and write
256D2C60000
trusted library allocation
page read and write
3CEF000
stack
page read and write
1A3D3360000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1A3D348C000
heap
page read and write
161E000
heap
page read and write
6F4000
heap
page read and write
4341000
heap
page read and write
2CD0000
direct allocation
page read and write
AD8000
unkown
page execute and write copy
16C4000
heap
page read and write
129F000
stack
page read and write
16C4000
heap
page read and write
2A6E000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
256D12C9000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4341000
heap
page read and write
4D8F000
stack
page read and write
16C4000
heap
page read and write
1A3BC658000
trusted library allocation
page read and write
31EE000
stack
page read and write
B68000
unkown
page execute and read and write
4843000
direct allocation
page read and write
4940000
direct allocation
page execute and read and write
71BE000
stack
page read and write
1056000
unkown
page execute and read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
6C99D000
unkown
page readonly
16C4000
heap
page read and write
2CD0000
direct allocation
page read and write
37FF000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
482F000
stack
page read and write
A7A000
unkown
page execute and read and write
466F000
stack
page read and write
16C4000
heap
page read and write
15AC000
heap
page read and write
16C4000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
15DE000
heap
page read and write
3A6F000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
28DE000
stack
page read and write
16C4000
heap
page read and write
71C000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
15B2000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4FB1000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
2DEF000
stack
page read and write
16C4000
heap
page read and write
55B0000
direct allocation
page execute and read and write
16C4000
heap
page read and write
7FFD9B904000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
2910000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4BED000
stack
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1A3D3350000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
E7B000
unkown
page execute and write copy
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
436E000
stack
page read and write
332E000
stack
page read and write
2F7E000
stack
page read and write
285E000
stack
page read and write
6C0F000
stack
page read and write
16C5000
heap
page read and write
B26000
unkown
page execute and read and write
16C4000
heap
page read and write
AB7000
unkown
page execute and write copy
4C2E000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
8C9000
unkown
page write copy
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
31A7000
heap
page read and write
16C4000
heap
page read and write
8CB000
unkown
page execute and write copy
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
AE1000
unkown
page execute and read and write
16C4000
heap
page read and write
1A3D342C000
heap
page read and write
FED000
unkown
page execute and read and write
16C4000
heap
page read and write
352E000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4341000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1A3B9118000
heap
page read and write
291A000
heap
page read and write
C1A000
heap
page read and write
16C4000
heap
page read and write
FD0000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
55F0000
direct allocation
page execute and read and write
7FFD9B7D0000
trusted library allocation
page read and write
AD8000
unkown
page execute and write copy
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1092000
unkown
page execute and write copy
16C4000
heap
page read and write
169E000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
2CBE000
stack
page read and write
1624000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1617000
heap
page read and write
F20000
heap
page read and write
16C4000
heap
page read and write
1A3BC683000
trusted library allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
57535FE000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
49E0000
direct allocation
page execute and read and write
AB6000
unkown
page execute and read and write
5610000
direct allocation
page execute and read and write
2D9A000
heap
page read and write
162C000
heap
page read and write
16C4000
heap
page read and write
6E10000
heap
page read and write
7FFD9B7E0000
trusted library allocation
page read and write
18DE000
stack
page read and write
2AE0000
heap
page read and write
16C5000
heap
page read and write
2CD0000
direct allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
472E000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1A3D341B000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1A3D34A7000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4930000
direct allocation
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
90F0000
trusted library allocation
page read and write
717C000
stack
page read and write
6F4000
heap
page read and write
16C4000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
38D8B44000
stack
page read and write
15BF000
heap
page read and write
1A3BC699000
trusted library allocation
page read and write
16C4000
heap
page read and write
BC4000
heap
page read and write
41AE000
stack
page read and write
16C4000
heap
page read and write
7485000
heap
page read and write
21FF4086000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
55D0000
direct allocation
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
55D0000
direct allocation
page execute and read and write
48EF000
stack
page read and write
1A3B9116000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
4341000
heap
page read and write
FF8000
unkown
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
256D313A000
heap
page read and write
4341000
heap
page read and write
2810000
heap
page read and write
1127000
unkown
page execute and write copy
16C4000
heap
page read and write
3D2E000
stack
page read and write
16C4000
heap
page read and write
42AF000
stack
page read and write
16C4000
heap
page read and write
1A3BAC30000
heap
page read and write
4341000
heap
page read and write
1A3BC640000
trusted library allocation
page read and write
16C4000
heap
page read and write
4F40000
direct allocation
page execute and read and write
16C4000
heap
page read and write
362F000
stack
page read and write
4EAE000
stack
page read and write
256D2D40000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4FB1000
heap
page read and write
16C4000
heap
page read and write
55D0000
direct allocation
page execute and read and write
30AE000
stack
page read and write
16C4000
heap
page read and write
1A3D345C000
heap
page read and write
1A3BCD31000
trusted library allocation
page read and write
55A0000
direct allocation
page execute and read and write
7FFD9B5CB000
trusted library allocation
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
1600000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
6F4000
heap
page read and write
16C4000
heap
page read and write
ADD000
unkown
page execute and read and write
7DC000
stack
page read and write
43C000
stack
page read and write
4341000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
3B6E000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
3A6F000
stack
page read and write
ABA000
unkown
page execute and read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
2C7E000
stack
page read and write
10AB000
unkown
page execute and write copy
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
8C4000
unkown
page execute and read and write
EAEBD7E000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
45EE000
stack
page read and write
16C4000
heap
page read and write
37EF000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
2B6F000
stack
page read and write
3C6F000
stack
page read and write
16C4000
heap
page read and write
105E000
unkown
page execute and write copy
16C4000
heap
page read and write
31AF000
stack
page read and write
3CFF000
stack
page read and write
3F6F000
stack
page read and write
4F10000
direct allocation
page execute and read and write
7FFD9B830000
trusted library allocation
page read and write
16C4000
heap
page read and write
1A3BC62C000
trusted library allocation
page read and write
16C4000
heap
page read and write
1A3D33CD000
heap
page read and write
7FFD9B5B3000
trusted library allocation
page execute and read and write
3190000
direct allocation
page read and write
48F1000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
256D1295000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
F84000
heap
page read and write
A64000
unkown
page execute and write copy
1A3D3150000
heap
page read and write
27C0000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
B49000
unkown
page execute and write copy
302E000
stack
page read and write
16C4000
heap
page read and write
EAEB98E000
stack
page read and write
16C4000
heap
page read and write
3AAE000
stack
page read and write
4FB1000
heap
page read and write
16C4000
heap
page read and write
4341000
heap
page read and write
545D000
stack
page read and write
16C4000
heap
page read and write
575337E000
stack
page read and write
4D0E000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
102A000
unkown
page execute and read and write
4341000
heap
page read and write
163F000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1A3BAB10000
trusted library allocation
page read and write
7FFD9B969000
trusted library allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
F84000
heap
page read and write
406E000
stack
page read and write
4FB0000
direct allocation
page execute and read and write
16C4000
heap
page read and write
707C000
stack
page read and write
16C4000
heap
page read and write
4341000
heap
page read and write
C90000
heap
page read and write
51CD000
stack
page read and write
16C4000
heap
page read and write
4341000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
7FFD9B800000
trusted library allocation
page read and write
139F000
stack
page read and write
B6A000
unkown
page execute and write copy
16C4000
heap
page read and write
16C4000
heap
page read and write
F80000
direct allocation
page read and write
1052000
unkown
page execute and write copy
16C4000
heap
page read and write
BC4000
heap
page read and write
4341000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
472E000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4FB1000
heap
page read and write
1621000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
8CB000
unkown
page execute and write copy
7FFD9B990000
trusted library allocation
page read and write
16C4000
heap
page read and write
10AC000
unkown
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
396E000
stack
page read and write
575424E000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
F84000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
7FFD9B850000
trusted library allocation
page read and write
4950000
direct allocation
page execute and read and write
16C4000
heap
page read and write
397E000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
B5F000
unkown
page execute and write copy
B4B000
unkown
page execute and read and write
44AE000
stack
page read and write
163F000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
6F4000
heap
page read and write
16C4000
heap
page read and write
4ECF000
stack
page read and write
293F000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1A3D3123000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4E60000
direct allocation
page execute and read and write
C48000
heap
page read and write
4E50000
direct allocation
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
496C000
stack
page read and write
40AF000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
575357A000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4DF3000
direct allocation
page read and write
16C4000
heap
page read and write
3CAE000
stack
page read and write
57533F9000
stack
page read and write
16C4000
heap
page read and write
4960000
direct allocation
page execute and read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
AE1000
unkown
page execute and read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
7FFD9B761000
trusted library allocation
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
6F48000
heap
page read and write
16C4000
heap
page read and write
38AF000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4E50000
direct allocation
page execute and read and write
4341000
heap
page read and write
F27000
heap
page read and write
16C4000
heap
page read and write
4341000
heap
page read and write
1A3BC740000
trusted library allocation
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
7FFD9B909000
trusted library allocation
page read and write
16C4000
heap
page read and write
C00000
direct allocation
page read and write
F84000
heap
page read and write
B61000
unkown
page execute and read and write
16C4000
heap
page read and write
1A3BC786000
trusted library allocation
page read and write
1A3B9070000
heap
page read and write
256D1140000
heap
page read and write
7FFD9B770000
trusted library allocation
page execute and read and write
16C4000
heap
page read and write
376F000
stack
page read and write
16C4000
heap
page read and write
4E0F000
stack
page read and write
1029000
unkown
page execute and write copy
F84000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
107A000
unkown
page execute and write copy
16C4000
heap
page read and write
4341000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
1A3D344E000
heap
page read and write
162C000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
433F000
stack
page read and write
1629000
heap
page read and write
6E0E000
heap
page read and write
8C9000
unkown
page read and write
AAE000
unkown
page execute and write copy
732C000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
B77000
unkown
page execute and read and write
16C4000
heap
page read and write
4341000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
4341000
heap
page read and write
16C5000
heap
page read and write
21FF5AD0000
heap
page read and write
A66000
unkown
page execute and read and write
16C4000
heap
page read and write
4CC0000
direct allocation
page read and write
44AE000
stack
page read and write
16C4000
heap
page read and write
57541CE000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
21FF4086000
heap
page read and write
2A7E000
stack
page read and write
11BB000
stack
page read and write
F84000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
16C5000
heap
page read and write
F84000
heap
page read and write
4F60000
direct allocation
page execute and read and write
1624000
heap
page read and write
16C5000
heap
page read and write
There are 2239 hidden memdumps, click here to show them.