IOC Report
magicline4nx_setup.exe

loading gif

Files

File Path
Type
Category
Malicious
magicline4nx_setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\CertManager.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicLine4NX.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicLine4NX.exe.hmac
data
dropped
malicious
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicLine4NXServices.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\certmgr.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\certutil.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\kc1pur8x.default\cert8.db
Berkeley DB 1.85 (Hash, version 2, native byte-order)
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\kc1pur8x.default\key3.db
Berkeley DB 1.85 (Hash, version 2, native byte-order)
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\kc1pur8x.default\secmod.db
Berkeley DB 1.85 (Hash, version 2, native byte-order)
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\tjbwzv1u.default-release\cert9.db
SQLite 3.x database, last written using SQLite version 3010002, page size 32768, file counter 7, database pages 7, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\tjbwzv1u.default-release\cert9.db-journal
SQLite Rollback Journal
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\tjbwzv1u.default-release\key4.db
SQLite 3.x database, last written using SQLite version 3010002, page size 32768, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
modified
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\tjbwzv1u.default-release\key4.db-journal
SQLite Rollback Journal
dropped
malicious
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\DSCToolkitV30-v3.4.2.20.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\ENG.ini
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\Images\Logo.bmp
PC bitmap, Windows 3.x format, 369 x 73 x 16, image size 54022, resolution 3779 x 3779 px/m, cbSize 54076, bits offset 54
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\IssuerOid.conf
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\IssuerOid_Eng.conf
ASCII text
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\KOR.ini
Generic INItialization configuration [Message]
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicCrypto32V21.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicLine4NX_Uninstall.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\ImportCAtoFirefox.vbs
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\ImportCAtoFirefoxCheck.vbs
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\dreamsecurity-rootca.der
Certificate, Version=3 Certificate, Version=01
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\dreamsecurity.com.der
Certificate, Version=3, Serial=009e5343085f93b442, not-valid-before=2015-09-03 04:11:52 GMT, not-valid-after=2035-08-28 04:11:52 GMT
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\libnspr4.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\libplc4.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\libplds4.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\nspr4.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\nssdbm3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\nssutil3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\plc4.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\plds4.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\smime3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\sqlite3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\httptx.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\libeay32.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\mlnp_dreamsecurity_com.ca-bundle
PEM certificate
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\nsldap32v50.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\ssleay32.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\DreamSecurity\MagicLine4NX\logs\install-202211281523.log
ISO-8859 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nst78C0.tmp\DumpLog.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nst78C0.tmp\KillProcDLL.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nst78C0.tmp\NsisUtil.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nst78C0.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nst78C0.tmp\nsExec.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nst78C0.tmp\nsProcess.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nst78C0.tmp\version.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\MagicLine4NX\MagicLine4NX.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Mon Mar 29 10:06:58 2021, mtime=Mon Nov 28 13:22:36 2022, atime=Mon Mar 29 10:06:58 2021, length=3753952, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\MagicLine4NX\Uninstall.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Mon Nov 28 13:22:36 2022, mtime=Mon Nov 28 13:22:36 2022, atime=Mon Nov 28 13:22:36 2022, length=113488, window=hide
dropped
C:\Windows\Logs\waasmedic\waasmedic.20221128_142248_759.etl
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\ConnectedDevicesPlatform\CDPGlobalSettings.cdp
Unicode text, UTF-8 (with BOM) text
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\ConnectedDevicesPlatform\L.user.cdp
Unicode text, UTF-8 (with BOM) text
modified
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 48 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\magicline4nx_setup.exe
C:\Users\user\Desktop\magicline4nx_setup.exe
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im NTSMagicLineNP.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im MagicLine4NX.exe
malicious
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\certmgr.exe
"C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\certmgr.exe" -add dreamsecurity-rootca.der -c -s -r localMachine Root
malicious
C:\Windows\SysWOW64\cscript.exe
cscript" "C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\ImportCAtoFirefoxCheck.vbs" "MagicLine4NX
malicious
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\certutil.exe
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\certutil.exe" -L -d "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\kc1pur8x.default" -n "Dreamsecurity ROOT CA
malicious
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\certutil.exe
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\certutil.exe" -L -d sql:"C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\tjbwzv1u.default-release" -n "Dreamsecurity ROOT CA
malicious
C:\Windows\SysWOW64\cscript.exe
cscript" "C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\ImportCAtoFirefox.vbs" "MagicLine4NX
malicious
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\certutil.exe
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\certutil.exe" -A -n "Dreamsecurity ROOT CA" -i "C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\dreamsecurity-rootca.der" -t "CT,c,C" -d "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\kc1pur8x.default
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p -s DoSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
malicious
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\certutil.exe
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\certutil.exe" -A -n "Dreamsecurity ROOT CA" -i "C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\dreamsecurity-rootca.der" -t "CT,c,C" -d sql:"C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\tjbwzv1u.default-release
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
malicious
C:\Windows\SysWOW64\netsh.exe
netsh advfirewall firewall delete rule name="MagicLine4NX" program="C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicLine4NX.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh advfirewall firewall add rule name="MagicLine4NX" dir=in action=allow program="C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicLine4NX.exe" enable=yes
malicious
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicLine4NX.exe
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicLine4NX.exe
malicious
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicLine4NXServices.exe
"C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicLine4NXServices.exe" -install
malicious
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicLine4NXServices.exe
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicLine4NXServices.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C taskkill /f /im NTSMagicLineNP.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\sc.exe
sc stop MagicLine4NXSVC
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\sc.exe
sc delete MagicLine4NXSVC
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C taskkill /f /im MagicLine4NX.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\CheckNetIsolation.exe
CheckNetIsolation LoopbackExempt -a -n="Microsoft.MicrosoftEdge_8wekyb3d8bbwe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\CheckNetIsolation.exe
CheckNetIsolation LoopbackExempt -a -n="Microsoft.Windows.Spartan_cw5n1h2txyewy"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\sc.exe
sc start MagicLine4NXSVC
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 36 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.openssl.org/support/faq.html....................rbwb.rndC:HOMERANDFILEPRNG
unknown
https://dev.ditu.live.com/REST/v1/Routes/
unknown
http://rootca.kisa.or.kr/kor/hsm/hsm.jsp
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
http://www.openssl.org/V
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
unknown
https://t0.tiles.ditu.live.com/tiles/gen
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
https://mobi.yessign.or.kr/mobisignInstall.htm
unknown
http://ids.smartcert.kr
unknown
http://www.openssl.org/support/faq.html
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
http://pcro.mobilesign.net/mini_cert_install.html
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://activity.windows.comds
unknown
http://www.ubikey.co.kr/infovine/download.html1.4.0.2609100003www.dreamsecurity.comcenter.smartcert.
unknown
https://ecn.dev.virtualearth.net/mapcontrol/roadshield.ashx?bucket=
unknown
http://www.bingmapsportal.com
unknown
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
http://cps.root-x1.letsencrypt.org0
unknown
http://rootca.kisa.or.kr/kor/hsm/hsm.jspPKCS#11.DriverDriver
unknown
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
unknown
https://mobi.yessign.or.kr/mobisignInstall.htmsiteCode6070059serviceOptubikeyUbikeylParamUbikeyWPara
unknown
https://dev.ditu.live.com/REST/v1/Transit/Stops/
unknown
http://ocsp.thawte.com0
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Transit/Stops/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://ecn.dev.virtualearth.net/REST/V1/MapControlConfiguration/native/
unknown
https://%s.xboxlive.com
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
unknown
https://dev.virtualearth.net/mapcontrol/logging.ashx
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://dynamic.t
unknown
https://www.thawte.com/cps0/
unknown
http://www.ubikey.co.kr/infovine/download.html
unknown
https://www.thawte.com/repository0W
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
unknown
https://dev.ditu.live.com/REST/v1/Transit/Schedules/
unknown
https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
https://activity.windows.com
unknown
https://dev.ditu.live.com/REST/v1/Locations
unknown
http://pcro.mobilesign.net/mini_cert_install.html679865F99D3C364AE1795B826BF546FAB3AC7343
unknown
https://%s.dnet.xboxlive.com
unknown
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
There are 54 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2
1406
malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2
1607
malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2
CurrentLevel
malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
1406
malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
1607
malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
CurrentLevel
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2
1406
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2
1607
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2
CurrentLevel
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
1406
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
1607
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
CurrentLevel
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\0BAFEC00CC085C92F94FD1F2DECA2374C72EFFDA
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MagicLine4NX
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MagicLine4NX
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MagicLine4NX
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MagicLine4NX
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MagicLine4NX
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MagicLine4NX
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\NTSMagicLineNP
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\NTSMagicLineNP
DefaultIcon
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\NTSMagicLineNP
URL Protocol
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\NTSMagicLineNP\shell\open\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\NTSMagicLineNP
WarnOnOpen
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\NTSMagicLineNP
WarnOnOpen
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D03745B1-EF05-4128-81FE-4EA062A6C468}
AppName
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D03745B1-EF05-4128-81FE-4EA062A6C468}
AppPath
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D03745B1-EF05-4128-81FE-4EA062A6C468}
Policy
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D03745B1-EF05-4128-81FE-4EA062A6C468}
AppName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D03745B1-EF05-4128-81FE-4EA062A6C468}
AppPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D03745B1-EF05-4128-81FE-4EA062A6C468}
Policy
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
MagicLine4NX
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_USERSS-1-5-20\Software\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
MonthID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
UsoCrmScan
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
CleanupUsoLogs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
SmartSchedulerValidationTask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av\{D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
STATE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av\{D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
STATE
There are 32 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
501000
heap
page read and write
malicious
6E10E000
unkown
page readonly
malicious
5DFB000
trusted library allocation
page read and write
malicious
918000
unkown
page execute and read and write
malicious
58B0000
direct allocation
page read and write
malicious
553000
heap
page read and write
malicious
542000
heap
page read and write
malicious
61AF000
trusted library allocation
page read and write
565000
heap
page read and write
156F000
heap
page read and write
A52000
unkown
page execute and read and write
E5B000
heap
page read and write
1134000
heap
page read and write
1F4000
heap
page read and write
61F9000
trusted library allocation
page read and write
980E000
stack
page read and write
806000
unkown
page execute and read and write
E19000
heap
page read and write
1F4000
heap
page read and write
55F9000
direct allocation
page read and write
5650000
direct allocation
page execute and read and write
1F5000
heap
page read and write
2682B2C0000
heap
page read and write
6E190000
unkown
page readonly
1707000
heap
page read and write
55C0000
direct allocation
page execute and read and write
1F4000
heap
page read and write
61B7000
trusted library allocation
page read and write
E13000
heap
page read and write
1592000
heap
page read and write
1F5000
heap
page read and write
15593440000
heap
page read and write
17535658000
heap
page read and write
4450000
heap
page read and write
FAE000
unkown
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
A2D000
unkown
page execute and read and write
39FE000
stack
page read and write
ACF000
unkown
page execute and read and write
6E328000
unkown
page read and write
5840000
direct allocation
page execute and read and write
4130000
direct allocation
page execute and read and write
DF4000
heap
page read and write
168B1E80000
heap
page read and write
A1B000
heap
page read and write
1F4F000
stack
page read and write
2500000
heap
page read and write
155B000
heap
page read and write
3B0E000
stack
page read and write
10000000
unkown
page readonly
5870000
direct allocation
page execute and read and write
1F4000
heap
page read and write
F70000
heap
page read and write
1F4000
heap
page read and write
10001000
unkown
page execute read
1F4000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
5310000
direct allocation
page execute and read and write
9979DF8000
stack
page read and write
AD4F000
stack
page read and write
54F0000
direct allocation
page execute and read and write
E56000
heap
page read and write
35CF000
stack
page read and write
2DFE000
stack
page read and write
44BE000
stack
page read and write
15D7000
heap
page read and write
9FE000
heap
page read and write
771000
unkown
page execute and read and write
1F5000
heap
page read and write
168B2078000
heap
page read and write
5990000
direct allocation
page execute and read and write
1F4000
heap
page read and write
545000
heap
page read and write
5881000
trusted library allocation
page read and write
32F5000
heap
page read and write
52C0000
direct allocation
page execute and read and write
5DF8000
trusted library allocation
page read and write
5590000
direct allocation
page execute and read and write
1563000
heap
page read and write
117E000
stack
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
C8D000
stack
page read and write
52C0000
direct allocation
page execute and read and write
135E000
stack
page read and write
997A27D000
stack
page read and write
1F4000
heap
page read and write
A34E000
stack
page read and write
4520000
trusted library allocation
page read and write
4ED0000
direct allocation
page read and write
1310000
trusted library allocation
page read and write
6E318000
unkown
page readonly
2FA0000
unkown
page readonly
31D1000
heap
page read and write
6DF70000
unkown
page readonly
5E42000
direct allocation
page read and write
360E000
stack
page read and write
109D000
heap
page read and write
168B205C000
heap
page read and write
B4C000
unkown
page write copy
3E8F000
stack
page read and write
5A80000
direct allocation
page execute and read and write
6178000
trusted library allocation
page read and write
96E000
stack
page read and write
29B7000
heap
page read and write
1F4000
heap
page read and write
15EC000
heap
page read and write
1F4000
heap
page read and write
1310000
trusted library allocation
page read and write
4454000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
58D0000
direct allocation
page execute and read and write
1F4000
heap
page read and write
384F000
stack
page read and write
395287B000
stack
page read and write
EDA000
heap
page read and write
C3C000
stack
page read and write
241FCC02000
trusted library allocation
page read and write
A10E000
stack
page read and write
160000
heap
page read and write
1F5000
heap
page read and write
1F5000
heap
page read and write
15C6000
heap
page read and write
5620000
direct allocation
page execute and read and write
1F4000
heap
page read and write
667E000
stack
page read and write
168B2061000
heap
page read and write
1F4000
heap
page read and write
52C0000
direct allocation
page execute and read and write
55B0000
direct allocation
page execute and read and write
62BE000
stack
page read and write
680000
heap
page read and write
E83000
heap
page read and write
1616000
heap
page read and write
1F4000
heap
page read and write
663E000
stack
page read and write
6E0F1000
unkown
page execute read
168B204A000
heap
page read and write
4EE1000
heap
page read and write
4EE1000
heap
page read and write
5670000
direct allocation
page execute and read and write
5C4E000
stack
page read and write
9FB000
heap
page read and write
DDC000
heap
page read and write
1324000
trusted library allocation
page read and write
1F4000
heap
page read and write
155932D0000
heap
page read and write
1F4000
heap
page read and write
6051000
unkown
page execute read
52C0000
direct allocation
page execute and read and write
4220000
direct allocation
page execute and read and write
1322000
trusted library allocation
page read and write
3150000
heap
page read and write
C166A7F000
stack
page read and write
154E000
heap
page read and write
2682B455000
heap
page read and write
6E4F6000
unkown
page read and write
A88E000
stack
page read and write
1F4000
heap
page read and write
346E000
stack
page read and write
1F4000
heap
page read and write
1D1EF3B0000
heap
page read and write
52C0000
direct allocation
page execute and read and write
1411000
heap
page read and write
22E4000
trusted library allocation
page read and write
90CE000
stack
page read and write
1F4000
heap
page read and write
144F000
stack
page read and write
5C84000
heap
page read and write
1D1EF613000
heap
page read and write
55D000
heap
page read and write
175356F3000
heap
page read and write
1C18EFE000
stack
page read and write
4EE1000
heap
page read and write
43F0000
direct allocation
page execute and read and write
A24E000
stack
page read and write
DEB000
heap
page read and write
EB0000
heap
page read and write
5320000
direct allocation
page execute and read and write
8D6000
unkown
page execute and read and write
5143000
direct allocation
page read and write
29B0000
heap
page read and write
DD4000
heap
page read and write
C166F7C000
stack
page read and write
A1D000
heap
page read and write
29B3000
heap
page read and write
5640000
direct allocation
page execute and read and write
3851000
heap
page read and write
1368000
heap
page read and write
5929000
trusted library allocation
page read and write
5C88000
heap
page read and write
1150000
direct allocation
page read and write
E2A000
heap
page read and write
6A3E000
stack
page read and write
6E1BC000
unkown
page readonly
15ED000
heap
page read and write
DD8000
heap
page read and write
56E0000
direct allocation
page execute and read and write
DF4000
heap
page read and write
413F000
stack
page read and write
94D97C000
stack
page read and write
58EF000
trusted library allocation
page read and write
548F000
stack
page read and write
15F0000
heap
page read and write
1F4000
heap
page read and write
9FD000
heap
page read and write
31C3000
heap
page read and write
4D90000
direct allocation
page read and write
3229000
heap
page read and write
8E0000
heap
page read and write
6E1F4000
unkown
page readonly
1371000
heap
page read and write
DF4000
heap
page read and write
2A4E000
stack
page read and write
374E000
stack
page read and write
8D6000
unkown
page execute and read and write
1F4000
heap
page read and write
20000
trusted library allocation
page read and write
553000
heap
page read and write
8E4E000
stack
page read and write
100E000
stack
page read and write
1F4000
heap
page read and write
3209000
heap
page read and write
3666000
heap
page read and write
39CE000
stack
page read and write
A6D000
unkown
page execute and read and write
9FCE000
stack
page read and write
10FF000
stack
page read and write
4520000
trusted library allocation
page read and write
58CC000
trusted library allocation
page read and write
15D5000
heap
page read and write
5442000
unkown
page readonly
1120000
trusted library allocation
page read and write
6DF71000
unkown
page execute read
10002000
unkown
page readonly
5690000
direct allocation
page execute and read and write
2C2E000
stack
page read and write
6E19A000
unkown
page readonly
1033000
trusted library allocation
page read and write
56A000
heap
page read and write
6E1B1000
unkown
page execute read
1382000
heap
page read and write
10C000
stack
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
4ED0000
direct allocation
page read and write
15AE000
heap
page read and write
31E8000
heap
page read and write
4496000
trusted library allocation
page read and write
5295000
direct allocation
page read and write
858F000
stack
page read and write
168B2036000
heap
page read and write
54F000
stack
page read and write
4480000
trusted library allocation
page read and write
15D2000
heap
page read and write
944E000
stack
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
A75000
heap
page read and write
5780000
direct allocation
page execute and read and write
587000
heap
page read and write
4D95000
direct allocation
page read and write
1F4000
heap
page read and write
4120000
direct allocation
page execute and read and write
A06000
heap
page read and write
6E121000
unkown
page readonly
31B8000
heap
page read and write
616E000
unkown
page readonly
16CE000
heap
page read and write
9E4F000
stack
page read and write
ACD000
unkown
page execute and read and write
AFCE000
stack
page read and write
BA5000
unkown
page write copy
6050000
unkown
page readonly
15D1000
heap
page read and write
AD8E000
stack
page read and write
4350000
direct allocation
page execute and read and write
820000
unkown
page readonly
4534000
trusted library allocation
page read and write
140A000
heap
page read and write
8CD000
unkown
page execute and read and write
1F4000
heap
page read and write
5290000
trusted library allocation
page read and write
2510000
trusted library allocation
page read and write
4B0F000
stack
page read and write
2F9C000
stack
page read and write
4EE1000
heap
page read and write
414E000
stack
page read and write
F3B000
stack
page read and write
6112000
unkown
page readonly
1F4000
heap
page read and write
2682B502000
heap
page read and write
1408000
heap
page read and write
168B2062000
heap
page read and write
43D0000
direct allocation
page execute and read and write
2FB0000
heap
page read and write
F0E000
stack
page read and write
1F4000
heap
page read and write
1530000
heap
page read and write
1753570F000
heap
page read and write
6E1C3000
unkown
page read and write
A47000
unkown
page execute and read and write
1F9B000
trusted library allocation
page read and write
13AB000
heap
page read and write
4D95000
direct allocation
page read and write
4C91000
heap
page read and write
3280000
heap
page read and write
2A3D000
stack
page read and write
1120000
heap
page read and write
54A0000
trusted library allocation
page read and write
17535840000
heap
page read and write
1F4000
heap
page read and write
EC0000
trusted library allocation
page read and write
1F4000
heap
page read and write
156F000
heap
page read and write
1F4000
heap
page read and write
15E1000
heap
page read and write
4480000
trusted library allocation
page read and write
1F4000
heap
page read and write
15CE000
stack
page read and write
1F4000
heap
page read and write
E0B000
heap
page read and write
4100000
direct allocation
page execute and read and write
5670000
direct allocation
page execute and read and write
2991000
heap
page read and write
915000
heap
page read and write
94D37C000
stack
page read and write
E62000
heap
page read and write
1324000
trusted library allocation
page read and write
A81000
heap
page read and write
167A000
heap
page read and write
8E8000
heap
page read and write
A3F000
heap
page read and write
4EE1000
heap
page read and write
10A84C90000
heap
page read and write
156C000
heap
page read and write
168B205B000
heap
page read and write
1F4000
heap
page read and write
170E000
stack
page read and write
A49000
heap
page read and write
5660000
direct allocation
page execute and read and write
1670000
heap
page read and write
1F4000
heap
page read and write
BDCE000
stack
page read and write
1528000
heap
page read and write
4480000
trusted library allocation
page read and write
C94E000
stack
page read and write
61A4000
trusted library allocation
page read and write
6E140000
unkown
page readonly
DF4000
heap
page read and write
3E4C000
stack
page read and write
1F4000
heap
page read and write
410F000
stack
page read and write
160C000
stack
page read and write
1470000
heap
page read and write
1F4000
heap
page read and write
4D99000
direct allocation
page read and write
15EF000
heap
page read and write
1F4000
heap
page read and write
10A84C41000
heap
page read and write
1377000
heap
page read and write
9D0E000
stack
page read and write
58A0000
heap
page read and write
1430000
heap
page read and write
5C80000
heap
page read and write
2682B45B000
heap
page read and write
6E1F8000
unkown
page read and write
1F4000
heap
page read and write
6E1FA000
unkown
page execute read
D8D000
stack
page read and write
1F4000
heap
page read and write
2D8E000
stack
page read and write
6E4E4000
unkown
page read and write
A58000
heap
page read and write
5E38000
trusted library allocation
page read and write
4ED5000
direct allocation
page read and write
DF4000
heap
page read and write
538000
heap
page read and write
4494000
trusted library allocation
page read and write
4EE1000
heap
page read and write
1F4000
heap
page read and write
371F6FE000
stack
page read and write
1F4000
heap
page read and write
168B2044000
heap
page read and write
31F7000
heap
page read and write
793E000
stack
page read and write
4EE1000
heap
page read and write
1F4000
heap
page read and write
241FC47B000
heap
page read and write
5700000
direct allocation
page execute and read and write
1F4000
heap
page read and write
2CFF000
stack
page read and write
1F4000
heap
page read and write
208F000
stack
page read and write
4B4E000
stack
page read and write
DCA000
heap
page read and write
AECE000
stack
page read and write
54CE000
stack
page read and write
56C0000
direct allocation
page execute and read and write
323D000
heap
page read and write
42E4000
heap
page read and write
4260000
trusted library allocation
page read and write
527F000
stack
page read and write
4EE1000
heap
page read and write
13E3000
heap
page read and write
1F4000
heap
page read and write
2B0F000
unkown
page read and write
2682B445000
heap
page read and write
1F4000
heap
page read and write
59D000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
474F000
stack
page read and write
94DAFF000
stack
page read and write
568000
heap
page read and write
589000
heap
page read and write
371EFDC000
stack
page read and write
4495000
trusted library allocation
page read and write
2790000
trusted library allocation
page read and write
12ED000
stack
page read and write
8F4000
unkown
page execute and read and write
934E000
stack
page read and write
A60E000
stack
page read and write
2450000
heap
page read and write
994E000
stack
page read and write
6E201000
unkown
page execute read
1F4000
heap
page read and write
52C0000
direct allocation
page execute and read and write
181C000
stack
page read and write
1247000
heap
page read and write
4110000
direct allocation
page execute and read and write
2E51000
trusted library allocation
page read and write
374E000
stack
page read and write
5B0E000
stack
page read and write
168B206D000
heap
page read and write
4ED5000
direct allocation
page read and write
6E0F0000
unkown
page readonly
A58000
heap
page read and write
1C81000
trusted library allocation
page read and write
1F4000
heap
page read and write
6E1D1000
unkown
page execute read
76BE000
stack
page read and write
40A0000
direct allocation
page execute and read and write
6E2F1000
unkown
page execute read
B33000
unkown
page write copy
5110000
heap
page read and write
107E000
stack
page read and write
B1C000
unkown
page execute and read and write
53F0000
direct allocation
page execute and read and write
1F4000
heap
page read and write
1365000
heap
page read and write
F70000
trusted library allocation
page read and write
1D1EF650000
heap
page read and write
77FE000
stack
page read and write
1559343E000
heap
page read and write
1F0000
heap
page read and write
1F4000
heap
page read and write
A3D000
heap
page read and write
54E000
heap
page read and write
3198000
heap
page read and write
10000000
unkown
page readonly
1F4000
heap
page read and write
525F000
stack
page read and write
58A6000
heap
page read and write
6DFF9000
unkown
page read and write
2682B500000
heap
page read and write
8CA000
unkown
page execute and read and write
73FE000
stack
page read and write
6E1C3000
unkown
page read and write
653E000
stack
page read and write
5E8C000
stack
page read and write
168B2093000
heap
page read and write
3650000
trusted library allocation
page read and write
E2F000
heap
page read and write
1F4000
heap
page read and write
59F0000
direct allocation
page execute and read and write
1F4000
heap
page read and write
3D4F000
stack
page read and write
537000
heap
page read and write
22CC000
trusted library allocation
page read and write
596000
heap
page read and write
1F4000
heap
page read and write
E62000
heap
page read and write
1F4000
heap
page read and write
31EC000
heap
page read and write
52C000
heap
page read and write
5760000
direct allocation
page execute and read and write
52C0000
direct allocation
page execute and read and write
4EE1000
heap
page read and write
1F4000
heap
page read and write
1251000
heap
page read and write
5800000
direct allocation
page execute and read and write
30CF000
stack
page read and write
6E03D000
unkown
page read and write
6DFF9000
unkown
page read and write
1D1EF655000
heap
page read and write
830E000
stack
page read and write
1F4000
heap
page read and write
408000
unkown
page readonly
337F000
stack
page read and write
2ACE000
stack
page read and write
26CF000
stack
page read and write
5A40000
direct allocation
page execute and read and write
155F000
heap
page read and write
10A0000
trusted library allocation
page read and write
A59000
heap
page read and write
13E1000
heap
page read and write
1606000
heap
page read and write
8F8E000
stack
page read and write
1043000
trusted library allocation
page read and write
463F000
stack
page read and write
AC4000
unkown
page execute and read and write
6F3E000
stack
page read and write
AC4E000
stack
page read and write
371FBFD000
stack
page read and write
F0E000
heap
page read and write
A1D000
heap
page read and write
460F000
stack
page read and write
1F4000
heap
page read and write
10004000
unkown
page readonly
707E000
stack
page read and write
1134000
heap
page read and write
A76000
unkown
page execute and read and write
DDD000
heap
page read and write
71BE000
stack
page read and write
20CE000
stack
page read and write
1F4000
heap
page read and write
15593413000
heap
page read and write
15593C02000
trusted library allocation
page read and write
22DC000
trusted library allocation
page read and write
1F5000
heap
page read and write
CD0E000
stack
page read and write
A25000
unkown
page execute and read and write
5917000
trusted library allocation
page read and write
31BC000
heap
page read and write
591D000
trusted library allocation
page read and write
5890000
heap
page read and write
1F4000
heap
page read and write
1134000
heap
page read and write
168B2063000
heap
page read and write
15593400000
heap
page read and write
B59000
unkown
page write copy
1F4000
heap
page read and write
1F4000
heap
page read and write
156D000
heap
page read and write
1F4000
heap
page read and write
52E000
heap
page read and write
94DBFF000
stack
page read and write
984E000
stack
page read and write
6C7E000
stack
page read and write
F50000
unkown
page readonly
31FC000
heap
page read and write
43B0000
direct allocation
page execute and read and write
90E000
stack
page read and write
86CE000
stack
page read and write
1BD0000
trusted library allocation
page read and write
4C91000
heap
page read and write
2AB0000
trusted library allocation
page read and write
2C0E000
stack
page read and write
1F4000
heap
page read and write
6000000
unkown
page readonly
1435000
heap
page read and write
10001000
unkown
page execute read
5D3C000
stack
page read and write
5A60000
direct allocation
page execute and read and write
6E1BD000
unkown
page readonly
1F4000
heap
page read and write
757D000
stack
page read and write
4480000
trusted library allocation
page read and write
C16707F000
stack
page read and write
27BD000
stack
page read and write
17535ED9000
heap
page read and write
1F4000
heap
page read and write
9979B7F000
stack
page read and write
1F4000
heap
page read and write
3AFF000
stack
page read and write
589000
heap
page read and write
49FF000
stack
page read and write
168B203F000
heap
page read and write
56A0000
direct allocation
page execute and read and write
55E0000
trusted library allocation
page read and write
103E000
stack
page read and write
1F4000
heap
page read and write
15AA000
heap
page read and write
4C8E000
stack
page read and write
1F4000
heap
page read and write
A9CE000
stack
page read and write
290000
trusted library allocation
page read and write
B0A000
unkown
page write copy
1446000
heap
page read and write
2B8E000
stack
page read and write
767F000
stack
page read and write
2F8F000
stack
page read and write
2DB0000
heap
page read and write
1F4000
heap
page read and write
58C0000
direct allocation
page execute and read and write
5600000
direct allocation
page execute and read and write
1F4000
heap
page read and write
4D90000
direct allocation
page read and write
1550000
heap
page read and write
2991000
heap
page read and write
A09000
heap
page read and write
327E000
stack
page read and write
162E000
stack
page read and write
6E32A000
unkown
page readonly
4EE1000
heap
page read and write
1F4000
heap
page read and write
541000
heap
page read and write
305B000
stack
page read and write
1F4000
heap
page read and write
4080000
direct allocation
page execute and read and write
1C88000
trusted library allocation
page read and write
A5B000
heap
page read and write
2614000
trusted library allocation
page read and write
1569000
heap
page read and write
6EFE000
stack
page read and write
56D0000
direct allocation
page execute and read and write
5430000
direct allocation
page execute and read and write
5B10000
direct allocation
page execute and read and write
A30000
heap
page read and write
168B208D000
heap
page read and write
371F3FF000
stack
page read and write
6E191000
unkown
page execute read
1D1EF700000
heap
page read and write
1F4000
heap
page read and write
1F5000
heap
page read and write
6E261000
unkown
page execute read
477F000
stack
page read and write
5540000
direct allocation
page execute and read and write
156D000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
6194000
trusted library allocation
page read and write
1F4000
heap
page read and write
1088000
unkown
page execute and read and write
9979F78000
stack
page read and write
168B206A000
heap
page read and write
54D000
heap
page read and write
17535EB6000
heap
page read and write
31B0000
heap
page read and write
2255000
heap
page read and write
1F4000
heap
page read and write
387F000
stack
page read and write
19AE000
stack
page read and write
6E1BD000
unkown
page readonly
17535EB9000
heap
page read and write
241FC42B000
heap
page read and write
428E000
stack
page read and write
52A000
heap
page read and write
1F4000
heap
page read and write
2430000
trusted library allocation
page read and write
4480000
trusted library allocation
page read and write
22C000
unkown
page readonly
1440000
heap
page read and write
4300000
heap
page read and write
4A0E000
stack
page read and write
42D0000
direct allocation
page execute and read and write
49CF000
stack
page read and write
DE8000
heap
page read and write
4494000
trusted library allocation
page read and write
A56000
unkown
page execute and read and write
6E1D1000
unkown
page execute read
2E10000
heap
page read and write
DBC000
stack
page read and write
15E4000
heap
page read and write
1F4000
heap
page read and write
B4C000
unkown
page read and write
1375000
trusted library allocation
page read and write
401000
unkown
page execute read
CB0000
heap
page read and write
6E2C1000
unkown
page execute read
2E40000
trusted library allocation
page read and write
6E12E000
unkown
page readonly
1380000
trusted library allocation
page read and write
22B4000
trusted library allocation
page read and write
B10000
heap
page read and write
334F000
stack
page read and write
2A8F000
stack
page read and write
4C80000
trusted library allocation
page read and write
10A8551A000
heap
page read and write
28FC000
stack
page read and write
DF4000
heap
page read and write
4060000
direct allocation
page execute and read and write
6E152000
unkown
page read and write
DF4000
heap
page read and write
3249000
heap
page read and write
34CE000
stack
page read and write
50D000
heap
page read and write
1F4000
heap
page read and write
5670000
direct allocation
page execute and read and write
3C3F000
stack
page read and write
980000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
52B0000
direct allocation
page execute and read and write
4160000
direct allocation
page execute and read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
22EC000
trusted library allocation
page read and write
880E000
stack
page read and write
1591000
heap
page read and write
4EE2000
heap
page read and write
241FC45B000
heap
page read and write
1F4000
heap
page read and write
341E000
stack
page read and write
15593502000
heap
page read and write
4260000
trusted library allocation
page read and write
338E000
stack
page read and write
423E000
stack
page read and write
1F4000
heap
page read and write
2B946F9000
stack
page read and write
1374000
heap
page read and write
52C0000
direct allocation
page execute and read and write
1F4000
heap
page read and write
5470000
trusted library allocation
page read and write
6E1A8000
unkown
page read and write
1F4000
heap
page read and write
9D0000
heap
page read and write
1592000
heap
page read and write
54D000
heap
page read and write
57FF000
stack
page read and write
17535DD0000
heap
page read and write
168B206E000
heap
page read and write
4D98000
direct allocation
page read and write
894E000
stack
page read and write
1F4000
heap
page read and write
3D8E000
stack
page read and write
F23000
heap
page read and write
9D8000
heap
page read and write
1F4000
heap
page read and write
6E1C5000
unkown
page readonly
4D93000
direct allocation
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
DB1000
heap
page read and write
DF4000
heap
page read and write
1F4000
heap
page read and write
17535717000
heap
page read and write
6E31D000
unkown
page readonly
158F000
heap
page read and write
1F4000
heap
page read and write
C00000
heap
page read and write
8A8E000
stack
page read and write
A0D000
heap
page read and write
3660000
heap
page read and write
15AA000
heap
page read and write
5140000
direct allocation
page read and write
29B0000
heap
page read and write
468E000
stack
page read and write
5913000
trusted library allocation
page read and write
310E000
stack
page read and write
4D95000
direct allocation
page read and write
4EE1000
heap
page read and write
3662000
heap
page read and write
168B2000000
heap
page read and write
1F4000
heap
page read and write
43A0000
direct allocation
page execute and read and write
2991000
heap
page read and write
2D36000
heap
page read and write
453E000
stack
page read and write
6030000
unkown
page readonly
883000
unkown
page execute and read and write
220E000
stack
page read and write
4480000
trusted library allocation
page read and write
1F4000
heap
page read and write
55CF000
stack
page read and write
22A000
unkown
page read and write
15C7000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
4EE1000
heap
page read and write
155C000
heap
page read and write
3FFF000
stack
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
A01000
heap
page read and write
52C0000
direct allocation
page execute and read and write
1F4000
heap
page read and write
1F5000
heap
page read and write
1F4000
heap
page read and write
2BFE000
stack
page read and write
A77000
heap
page read and write
C70E000
stack
page read and write
BB4E000
stack
page read and write
A32000
unkown
page execute and read and write
59D0000
direct allocation
page execute and read and write
587000
heap
page read and write
6E4D4000
unkown
page write copy
326E000
stack
page read and write
4EE1000
heap
page read and write
15E3000
heap
page read and write
1324000
trusted library allocation
page read and write
1322000
trusted library allocation
page read and write
371F87F000
stack
page read and write
AEA000
unkown
page execute and read and write
884E000
stack
page read and write
5E7F000
trusted library allocation
page read and write
1A20000
heap
page read and write
9C0E000
stack
page read and write
338E000
stack
page read and write
1F4000
heap
page read and write
527000
heap
page read and write
D78E000
stack
page read and write
53B0000
direct allocation
page execute and read and write
413C000
stack
page read and write
4EE1000
heap
page read and write
3C0F000
stack
page read and write
1399000
heap
page read and write
A5CE000
stack
page read and write
241FC513000
heap
page read and write
562000
heap
page read and write
85CE000
stack
page read and write
5450000
direct allocation
page execute and read and write
1F4000
heap
page read and write
96CE000
stack
page read and write
5A50000
direct allocation
page execute and read and write
538E000
stack
page read and write
2B74000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
DCC000
heap
page read and write
2991000
heap
page read and write
1F4000
heap
page read and write
10020000
unkown
page read and write
3F90000
direct allocation
page execute and read and write
5416000
direct allocation
page read and write
31E5000
heap
page read and write
44D6000
heap
page read and write
6E010000
unkown
page readonly
1F5000
heap
page read and write
5370000
direct allocation
page execute and read and write
241FC470000
heap
page read and write
770000
unkown
page readonly
1F4000
heap
page read and write
5A90000
direct allocation
page execute and read and write
6E188000
unkown
page read and write
1134000
heap
page read and write
166C000
stack
page read and write
158F000
heap
page read and write
15B6000
heap
page read and write
2B75000
heap
page read and write
168B2067000
heap
page read and write
1F4000
heap
page read and write
A9E000
stack
page read and write
417E000
stack
page read and write
717E000
stack
page read and write
15C6000
heap
page read and write
2B941DD000
stack
page read and write
4ED3000
direct allocation
page read and write
1551000
heap
page read and write
D54E000
stack
page read and write
2991000
heap
page read and write
4520000
trusted library allocation
page read and write
80CE000
stack
page read and write
31DF000
heap
page read and write
1558000
heap
page read and write
808E000
stack
page read and write
543B000
unkown
page readonly
43C000
unkown
page readonly
44D3000
heap
page read and write
4D93000
direct allocation
page read and write
2B94A79000
stack
page read and write
29B0000
heap
page read and write
1F4000
heap
page read and write
54B0000
trusted library allocation
page read and write
17535E38000
heap
page read and write
5B50000
direct allocation
page execute and read and write
5BA0000
direct allocation
page execute and read and write
59A0000
direct allocation
page execute and read and write
15D8000
heap
page read and write
1538000
heap
page read and write
C166E7E000
stack
page read and write
1F8E000
stack
page read and write
168B2076000
heap
page read and write
55F6000
direct allocation
page read and write
35CF000
stack
page read and write
C166D7F000
stack
page read and write
4260000
trusted library allocation
page read and write
6E191000
unkown
page execute read
A9F000
unkown
page execute and read and write
5AC0000
direct allocation
page execute and read and write
8CD000
unkown
page execute and read and write
1591000
heap
page read and write
DE4000
heap
page read and write
4EE1000
heap
page read and write
A36000
unkown
page execute and read and write
BED0000
trusted library allocation
page read and write
2B948FE000
stack
page read and write
551000
heap
page read and write
13E6000
heap
page read and write
1358000
heap
page read and write
1F4000
heap
page read and write
427F000
stack
page read and write
6F5000
unkown
page readonly
67BE000
stack
page read and write
52C0000
trusted library allocation
page read and write
50E000
stack
page read and write
1447000
heap
page read and write
52C0000
direct allocation
page execute and read and write
7AF000
stack
page read and write
156F000
heap
page read and write
5AF0000
direct allocation
page execute and read and write
168B206B000
heap
page read and write
4EE1000
heap
page read and write
E34000
heap
page read and write
19F0000
trusted library allocation
page read and write
41B0000
direct allocation
page execute and read and write
43C0000
direct allocation
page execute and read and write
241FC3E0000
trusted library allocation
page read and write
4ED5000
direct allocation
page read and write
5C0000
heap
page read and write
B12000
unkown
page execute and read and write
A1E000
stack
page read and write
1324000
trusted library allocation
page read and write
1F5000
heap
page read and write
1F5000
heap
page read and write
844E000
stack
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
294F000
stack
page read and write
7A0000
trusted library allocation
page read and write
1627000
heap
page read and write
1F4000
heap
page read and write
168F000
stack
page read and write
1F4000
heap
page read and write
2E3F000
stack
page read and write
2682B413000
heap
page read and write
1310000
trusted library allocation
page read and write
1F4000
heap
page read and write
B41000
unkown
page read and write
5DE2000
direct allocation
page read and write
52E0000
heap
page read and write
171E000
stack
page read and write
1F4000
heap
page read and write
4496000
trusted library allocation
page read and write
4304000
heap
page read and write
1F5000
heap
page read and write
14FB000
stack
page read and write
1F4000
heap
page read and write
156F000
heap
page read and write
41F0000
direct allocation
page execute and read and write
6E2BA000
unkown
page readonly
DF0000
direct allocation
page read and write
1F4000
heap
page read and write
15EE000
heap
page read and write
D7D000
stack
page read and write
1F4000
heap
page read and write
5500000
direct allocation
page execute and read and write
2B9487C000
stack
page read and write
8EE000
stack
page read and write
6DFE3000
unkown
page readonly
587E000
stack
page read and write
56F0000
direct allocation
page execute and read and write
997A17E000
stack
page read and write
6E2CA000
unkown
page readonly
5970000
direct allocation
page execute and read and write
13E0000
heap
page read and write
790000
heap
page read and write
562C000
stack
page read and write
4384000
heap
page read and write
4480000
trusted library allocation
page read and write
143C000
heap
page read and write
BB2000
unkown
page read and write
870E000
stack
page read and write
2A60000
heap
page read and write
E34000
heap
page read and write
6E1D0000
unkown
page readonly
589000
heap
page read and write
4EE1000
heap
page read and write
1F4000
heap
page read and write
CB6000
heap
page read and write
3DE0000
trusted library allocation
page read and write
DB2000
heap
page read and write
2991000
heap
page read and write
4364000
heap
page read and write
6E0E2000
unkown
page readonly
1F4000
heap
page read and write
175356B5000
heap
page read and write
898E000
stack
page read and write
C98E000
stack
page read and write
90B000
unkown
page execute and read and write
C16727F000
stack
page read and write
59D0000
heap
page read and write
DE0000
heap
page read and write
1F4000
heap
page read and write
5BC0000
direct allocation
page execute and read and write
A1D000
heap
page read and write
175355F0000
heap
page read and write
6E4F8000
unkown
page read and write
6E035000
unkown
page readonly
1F4000
heap
page read and write
A07000
heap
page read and write
1F5000
heap
page read and write
4B7E000
stack
page read and write
BC4E000
stack
page read and write
168B202B000
heap
page read and write
B3D000
stack
page read and write
2B50000
heap
page read and write
4A3E000
stack
page read and write
1D1EF600000
heap
page read and write
703E000
stack
page read and write
63FE000
stack
page read and write
1820000
trusted library allocation
page read and write
1F4000
heap
page read and write
12DF000
stack
page read and write
57AE000
stack
page read and write
958E000
stack
page read and write
5EF0000
trusted library allocation
page read and write
5670000
direct allocation
page execute and read and write
17535EBA000
heap
page read and write
1F4000
heap
page read and write
2BC4000
heap
page read and write
6E31D000
unkown
page readonly
10A84A90000
heap
page read and write
5B60000
direct allocation
page execute and read and write
1F4000
heap
page read and write
DFC000
heap
page read and write
15D1000
heap
page read and write
9EF000
stack
page read and write
54B000
heap
page read and write
4580000
heap
page read and write
5520000
direct allocation
page execute and read and write
BD8E000
stack
page read and write
1AE000
stack
page read and write
55F000
heap
page read and write
3F8E000
stack
page read and write
55F0000
direct allocation
page execute and read and write
11C0000
heap
page read and write
173C000
heap
page read and write
144B000
heap
page read and write
5900000
direct allocation
page execute and read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
15E1000
heap
page read and write
57F0000
direct allocation
page execute and read and write
15593427000
heap
page read and write
158E000
stack
page read and write
7E4E000
stack
page read and write
31D8000
heap
page read and write
6E328000
unkown
page read and write
4ED0000
direct allocation
page read and write
DBC000
stack
page read and write
54E000
heap
page read and write
3FE0000
direct allocation
page execute and read and write
154F000
stack
page read and write
1438000
heap
page read and write
17535DAF000
heap
page read and write
6E1C3000
unkown
page read and write
1E4E000
stack
page read and write
15D5000
heap
page read and write
1F4000
heap
page read and write
1F5000
heap
page read and write
1F4000
heap
page read and write
58FC000
trusted library allocation
page read and write
168B2074000
heap
page read and write
1F4000
heap
page read and write
1610000
direct allocation
page read and write
3620000
heap
page read and write
1F4000
heap
page read and write
289F000
stack
page read and write
3140000
heap
page read and write
4ED0000
direct allocation
page read and write
1F4000
heap
page read and write
6E2AB000
unkown
page read and write
1F4000
heap
page read and write
534000
heap
page read and write
1F4000
heap
page read and write
4390000
direct allocation
page execute and read and write
6E209000
unkown
page readonly
17535E71000
heap
page read and write
B3CE000
stack
page read and write
4190000
direct allocation
page execute and read and write
1603000
heap
page read and write
31B8000
heap
page read and write
168B2013000
heap
page read and write
17535900000
heap
page read and write
4260000
trusted library allocation
page read and write
15E2000
heap
page read and write
6D0000
unkown
page readonly
5E3B000
direct allocation
page read and write
34FE000
stack
page read and write
CBCF000
stack
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
4496000
trusted library allocation
page read and write
2FCE000
stack
page read and write
FA5000
heap
page read and write
1F4000
heap
page read and write
1310000
trusted library allocation
page read and write
F03000
heap
page read and write
5DF0000
trusted library allocation
page read and write
1F4000
heap
page read and write
1F5000
heap
page read and write
5300000
direct allocation
page execute and read and write
4330000
direct allocation
page execute and read and write
1F4000
heap
page read and write
63BE000
stack
page read and write
1F4000
heap
page read and write
52C0000
direct allocation
page execute and read and write
4150000
direct allocation
page execute and read and write
6E1A3000
unkown
page read and write
4520000
trusted library allocation
page read and write
A81000
heap
page read and write
1576000
heap
page read and write
1430000
heap
page read and write
371F57D000
stack
page read and write
5400000
direct allocation
page execute and read and write
1F4000
heap
page read and write
C166BFB000
stack
page read and write
A69000
heap
page read and write
4260000
direct allocation
page read and write
55E000
heap
page read and write
44FF000
stack
page read and write
DA8000
heap
page read and write
13BE000
heap
page read and write
4D97000
direct allocation
page read and write
323F000
stack
page read and write
E1B000
unkown
page execute and read and write
546000
heap
page read and write
B33000
unkown
page read and write
4494000
trusted library allocation
page read and write
31D8000
heap
page read and write
1F4000
heap
page read and write
15AA000
heap
page read and write
6E260000
unkown
page readonly
1520000
heap
page read and write
1F4000
heap
page read and write
30FF000
stack
page read and write
1F4000
heap
page read and write
14A0000
trusted library allocation
page read and write
5960000
direct allocation
page execute and read and write
575000
heap
page read and write
5976000
heap
page read and write
580000
trusted library allocation
page read and write
F3B000
stack
page read and write
1F4000
heap
page read and write
22D4000
trusted library allocation
page read and write
322E000
stack
page read and write
168B2068000
heap
page read and write
1F4000
heap
page read and write
68FE000
stack
page read and write
BAC000
unkown
page read and write
58EE000
trusted library allocation
page read and write
9ACE000
stack
page read and write
59B0000
direct allocation
page execute and read and write
BBF000
stack
page read and write
4DCE000
stack
page read and write
7A7E000
stack
page read and write
2B75000
heap
page read and write
2D32000
heap
page read and write
17535820000
heap
page read and write
C14E000
stack
page read and write
360E000
stack
page read and write
771000
unkown
page execute and write copy
35FF000
stack
page read and write
235F000
stack
page read and write
42E4000
heap
page read and write
E72000
heap
page read and write
1D1EF702000
heap
page read and write
5360000
trusted library allocation
page read and write
2BCF000
stack
page read and write
1559000
heap
page read and write
A4B000
unkown
page execute and read and write
221000
unkown
page execute read
9FB000
heap
page read and write
2991000
heap
page read and write
29AE000
heap
page read and write
5880000
direct allocation
page execute and read and write
D40000
trusted library allocation
page read and write
4ED3000
direct allocation
page read and write
27FD000
stack
page read and write
5130000
trusted library allocation
page read and write
17535E95000
heap
page read and write
6E160000
unkown
page readonly
1365000
trusted library allocation
page read and write
1753567A000
heap
page read and write
167D000
heap
page read and write
55F0000
direct allocation
page read and write
59C0000
direct allocation
page execute and read and write
5AFE000
stack
page read and write
5113000
heap
page read and write
1F4000
heap
page read and write
53D000
heap
page read and write
2FC0000
unkown
page read and write
1F4000
heap
page read and write
4520000
trusted library allocation
page read and write
3952C7E000
stack
page read and write
A50000
unkown
page execute and read and write
DF4000
heap
page read and write
5A00000
direct allocation
page execute and read and write
A4B000
heap
page read and write
1F4000
heap
page read and write
1D1EFC02000
trusted library allocation
page read and write
4260000
direct allocation
page read and write
5400000
heap
page read and write
1F4000
heap
page read and write
5B20000
direct allocation
page execute and read and write
323E000
unkown
page read and write
E46000
heap
page read and write
1F4000
heap
page read and write
95CE000
stack
page read and write
DE1000
heap
page read and write
2E3F000
stack
page read and write
1210000
heap
page read and write
241FC43E000
heap
page read and write
A77000
heap
page read and write
1F4000
heap
page read and write
6E210000
unkown
page readonly
1322000
trusted library allocation
page read and write
1090000
heap
page read and write
13E0000
heap
page read and write
8D4000
unkown
page write copy
15FC000
heap
page read and write
1F4000
heap
page read and write
15593431000
heap
page read and write
5DF9000
direct allocation
page read and write
39BF000
stack
page read and write
261C000
trusted library allocation
page read and write
4370000
direct allocation
page execute and read and write
2682BA80000
trusted library allocation
page read and write
A7F000
heap
page read and write
4EE1000
heap
page read and write
6E17A000
unkown
page readonly
15EC000
heap
page read and write
4F50000
trusted library allocation
page read and write
1C71000
trusted library allocation
page read and write
54A0000
direct allocation
page execute and read and write
5930000
direct allocation
page execute and read and write
52F0000
direct allocation
page execute and read and write
1447000
heap
page read and write
4EE1000
heap
page read and write
7B7E000
stack
page read and write
1F4000
heap
page read and write
1445000
heap
page read and write
4EE1000
heap
page read and write
43FE000
stack
page read and write
359F000
unkown
page read and write
1F5000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
2682B440000
heap
page read and write
13BF000
heap
page read and write
5950000
direct allocation
page execute and read and write
1F4000
heap
page read and write
1D1EF66B000
heap
page read and write
13E4000
heap
page read and write
4EE1000
heap
page read and write
435000
unkown
page read and write
2A00000
heap
page read and write
A84E000
stack
page read and write
29B0000
heap
page read and write
CC0E000
stack
page read and write
1F4000
heap
page read and write
6E2CA000
unkown
page readonly
DF4000
heap
page read and write
1F4000
heap
page read and write
3770000
heap
page read and write
57C0000
direct allocation
page execute and read and write
56A0000
heap
page read and write
1F4000
heap
page read and write
592B000
trusted library allocation
page read and write
6E2BF000
unkown
page readonly
1F5000
heap
page read and write
A7F000
heap
page read and write
1E0F000
stack
page read and write
A4CE000
stack
page read and write
1310000
trusted library allocation
page read and write
6E31D000
unkown
page readonly
1F4000
heap
page read and write
34CE000
stack
page read and write
6E19C000
unkown
page readonly
5ED000
stack
page read and write
A1A000
heap
page read and write
6E1A2000
unkown
page read and write
1C79000
trusted library allocation
page read and write
1F4000
heap
page read and write
E83000
heap
page read and write
63E000
stack
page read and write
6E1D1000
unkown
page execute read
1408000
heap
page read and write
997A07B000
stack
page read and write
1F4000
heap
page read and write
241FC400000
heap
page read and write
4D90000
direct allocation
page read and write
2A68000
heap
page read and write
1F4000
heap
page read and write
2BDE000
stack
page read and write
1F5000
heap
page read and write
1F4000
heap
page read and write
388E000
stack
page read and write
EF0000
unkown
page execute and read and write
55D0000
direct allocation
page execute and read and write
4480000
trusted library allocation
page read and write
BA5000
unkown
page read and write
1F4000
heap
page read and write
5360000
direct allocation
page execute and read and write
F14000
heap
page read and write
4EE1000
heap
page read and write
1134000
heap
page read and write
6E176000
unkown
page read and write
5710000
direct allocation
page execute and read and write
1F5000
heap
page read and write
29B7000
heap
page read and write
6E12C000
unkown
page read and write
30D000
stack
page read and write
4320000
direct allocation
page execute and read and write
4340000
direct allocation
page execute and read and write
56A7000
heap
page read and write
4310000
direct allocation
page execute and read and write
40F0000
direct allocation
page execute and read and write
4210000
direct allocation
page execute and read and write
220000
unkown
page readonly
1F4000
heap
page read and write
B3A000
unkown
page write copy
171E000
stack
page read and write
168B2069000
heap
page read and write
4480000
trusted library allocation
page read and write
10A85518000
heap
page read and write
5860000
direct allocation
page execute and read and write
52C0000
direct allocation
page execute and read and write
5720000
direct allocation
page execute and read and write
1F4000
heap
page read and write
32F4000
heap
page read and write
4270000
direct allocation
page execute and read and write
E0B000
heap
page read and write
6E1A2000
unkown
page read and write
284E000
stack
page read and write
15D1000
heap
page read and write
2BE0000
heap
page read and write
32E3000
heap
page read and write
1610000
direct allocation
page read and write
17535702000
heap
page read and write
22BC000
trusted library allocation
page read and write
3666000
heap
page read and write
5C0E000
stack
page read and write
A70E000
stack
page read and write
3233000
heap
page read and write
530000
heap
page read and write
15D8000
heap
page read and write
19EE000
stack
page read and write
4494000
trusted library allocation
page read and write
72FE000
stack
page read and write
43A000
unkown
page read and write
1F4000
heap
page read and write
2BEF000
stack
page read and write
58B0000
direct allocation
page execute and read and write
110E000
stack
page read and write
5320000
trusted library allocation
page read and write
1F4000
heap
page read and write
A05000
heap
page read and write
13A7000
heap
page read and write
B63000
unkown
page read and write
E15000
heap
page read and write
4480000
trusted library allocation
page read and write
4230000
direct allocation
page execute and read and write
1F4000
heap
page read and write
4536000
trusted library allocation
page read and write
10A84C00000
heap
page read and write
29B3000
heap
page read and write
A1D000
heap
page read and write
E16000
heap
page read and write
54D000
heap
page read and write
43BF000
stack
page read and write
9D4E000
stack
page read and write
241FC290000
heap
page read and write
1F4000
heap
page read and write
4360000
heap
page read and write
3740000
trusted library allocation
page read and write
D28000
unkown
page execute and read and write
168B2802000
trusted library allocation
page read and write
33BE000
stack
page read and write
F2A000
heap
page read and write
A80000
unkown
page execute and read and write
6E0E0000
unkown
page read and write
2520000
trusted library allocation
page read and write
55E0000
direct allocation
page execute and read and write
168B205D000
heap
page read and write
6E1F4000
unkown
page readonly
C16717D000
stack
page read and write
371FAFE000
stack
page read and write
1F4000
heap
page read and write
168B2060000
heap
page read and write
600E000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
248E000
stack
page read and write
D64E000
stack
page read and write
3FD0000
direct allocation
page execute and read and write
10A84CEF000
heap
page read and write
B5C000
unkown
page read and write
2B9F000
stack
page read and write
1F4000
heap
page read and write
F4B000
heap
page read and write
1F4000
heap
page read and write
1310000
trusted library allocation
page read and write
5920000
direct allocation
page execute and read and write
5B80000
direct allocation
page execute and read and write
1F5000
heap
page read and write
6B7E000
stack
page read and write
543F000
unkown
page read and write
1554000
heap
page read and write
430000
unkown
page read and write
2F00000
heap
page read and write
1F4000
heap
page read and write
6DBF000
stack
page read and write
591000
heap
page read and write
ADD000
unkown
page execute and read and write
570000
heap
page read and write
155A000
heap
page read and write
8C6000
unkown
page execute and read and write
E54000
heap
page read and write
371F97D000
stack
page read and write
5AA0000
direct allocation
page execute and read and write
68BE000
stack
page read and write
3EFE000
stack
page read and write
17535E71000
heap
page read and write
321C000
heap
page read and write
1F4000
heap
page read and write
4380000
direct allocation
page execute and read and write
D87000
heap
page read and write
1F4000
heap
page read and write
168B2102000
heap
page read and write
1F4000
heap
page read and write
5750000
direct allocation
page execute and read and write
1F4000
heap
page read and write
3209000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
10FE000
stack
page read and write
2DB6000
heap
page read and write
4400000
trusted library allocation
page read and write
59E0000
direct allocation
page execute and read and write
A74E000
stack
page read and write
5440000
direct allocation
page execute and read and write
1F4000
heap
page read and write
6E490000
unkown
page readonly
322A000
heap
page read and write
1F4000
heap
page read and write
6DFE3000
unkown
page readonly
DF4000
heap
page read and write
587000
heap
page read and write
143C000
heap
page read and write
FDE000
stack
page read and write
C24E000
stack
page read and write
BC8E000
stack
page read and write
10A84CFE000
heap
page read and write
4C7F000
stack
page read and write
1F4000
heap
page read and write
1559344F000
heap
page read and write
1F4000
heap
page read and write
1F5000
heap
page read and write
DB0000
remote allocation
page read and write
5F00000
trusted library allocation
page read and write
4E8000
heap
page read and write
677E000
stack
page read and write
1F4000
heap
page read and write
A1B000
heap
page read and write
5390000
trusted library allocation
page read and write
6E1C2000
unkown
page read and write
A74000
heap
page read and write
7DFE000
stack
page read and write
2B947FE000
stack
page read and write
6B3E000
stack
page read and write
AFA000
unkown
page execute and read and write
1F4000
heap
page read and write
1618000
heap
page read and write
17535E7E000
heap
page read and write
707000
unkown
page read and write
4ED0000
direct allocation
page read and write
168B205E000
heap
page read and write
525000
heap
page read and write
15AC000
heap
page read and write
43C4000
heap
page read and write
997973B000
stack
page read and write
58C2000
trusted library allocation
page read and write
1440000
heap
page read and write
E73000
heap
page read and write
1F4000
heap
page read and write
1559343A000
heap
page read and write
1001C000
unkown
page readonly
48E000
stack
page read and write
A48E000
stack
page read and write
6E1D0000
unkown
page readonly
15593455000
heap
page read and write
6E188000
unkown
page read and write
3850000
heap
page read and write
5916000
trusted library allocation
page read and write
B38E000
stack
page read and write
168B2042000
heap
page read and write
A0CE000
stack
page read and write
1C193FF000
stack
page read and write
3FA0000
direct allocation
page execute and read and write
260C000
trusted library allocation
page read and write
1D1EF666000
heap
page read and write
4EE1000
heap
page read and write
1553000
heap
page read and write
12F5000
stack
page read and write
9EE000
stack
page read and write
5740000
direct allocation
page execute and read and write
1433000
heap
page read and write
A8A000
unkown
page execute and read and write
5530000
direct allocation
page execute and read and write
1F5000
heap
page read and write
80E000
stack
page read and write
124C000
stack
page read and write
3247000
heap
page read and write
1402000
heap
page read and write
1F4000
heap
page read and write
B10E000
stack
page read and write
2780000
heap
page read and write
54C0000
direct allocation
page execute and read and write
E76000
heap
page read and write
E60000
heap
page read and write
113E000
stack
page read and write
AE8E000
stack
page read and write
4280000
direct allocation
page execute and read and write
5650000
direct allocation
page execute and read and write
2FB0000
unkown
page readonly
1F4000
heap
page read and write
DD4000
heap
page read and write
1244000
heap
page read and write
58E0000
direct allocation
page execute and read and write
1385000
heap
page read and write
E54000
heap
page read and write
10A85584000
heap
page read and write
1F4000
heap
page read and write
2991000
heap
page read and write
10EF000
stack
page read and write
1F4000
heap
page read and write
CA8E000
stack
page read and write
1F4000
heap
page read and write
E60000
heap
page read and write
3D7F000
stack
page read and write
DE5000
heap
page read and write
570000
heap
page read and write
848E000
stack
page read and write
2C57000
heap
page read and write
990000
trusted library allocation
page read and write
1134000
heap
page read and write
1F4000
heap
page read and write
5350000
trusted library allocation
page read and write
324E000
stack
page read and write
4D90000
direct allocation
page read and write
A3F000
heap
page read and write
1F4000
heap
page read and write
B3A000
unkown
page read and write
464E000
stack
page read and write
17535688000
heap
page read and write
40A000
unkown
page write copy
1F4000
heap
page read and write
9979CFE000
stack
page read and write
241FC47E000
heap
page read and write
B64E000
stack
page read and write
15D4000
heap
page read and write
1F4000
heap
page read and write
168B206C000
heap
page read and write
220E000
stack
page read and write
6E4F4000
unkown
page read and write
29B2000
heap
page read and write
E60000
heap
page read and write
2682B513000
heap
page read and write
371F67E000
stack
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
B14E000
stack
page read and write
4D93000
direct allocation
page read and write
521000
heap
page read and write
577D000
stack
page read and write
E1C000
heap
page read and write
1F4000
heap
page read and write
A3F000
heap
page read and write
6E2E8000
unkown
page read and write
81CE000
stack
page read and write
1F4000
heap
page read and write
234E000
stack
page read and write
1442000
heap
page read and write
4EE1000
heap
page read and write
168B204D000
heap
page read and write
4EE1000
heap
page read and write
C8E000
stack
page read and write
1F4000
heap
page read and write
3952B7E000
stack
page read and write
478E000
stack
page read and write
57D0000
direct allocation
page execute and read and write
168B2046000
heap
page read and write
376F000
stack
page read and write
AACE000
stack
page read and write
8BCF000
stack
page read and write
4140000
direct allocation
page execute and read and write
5893000
heap
page read and write
DC9000
heap
page read and write
4EE1000
heap
page read and write
2BC0000
heap
page read and write
6E185000
unkown
page readonly
570000
heap
page read and write
64FE000
stack
page read and write
1F5000
heap
page read and write
6280000
trusted library allocation
page read and write
31E2000
heap
page read and write
5330000
direct allocation
page execute and read and write
10A84AA0000
heap
page read and write
1610000
direct allocation
page read and write
1F4000
heap
page read and write
E2B000
heap
page read and write
AB0E000
stack
page read and write
EB0000
heap
page read and write
910000
heap
page read and write
4180000
direct allocation
page execute and read and write
866000
unkown
page execute and read and write
451E000
stack
page read and write
50000
trusted library allocation
page read and write
21CE000
stack
page read and write
31DD000
heap
page read and write
E90000
heap
page read and write
B25000
unkown
page write copy
1F4000
heap
page read and write
B5C000
unkown
page write copy
5B90000
direct allocation
page execute and read and write
1F4000
heap
page read and write
4040000
direct allocation
page execute and read and write
1F4000
heap
page read and write
1180000
heap
page read and write
241FC48D000
heap
page read and write
51D000
heap
page read and write
1F4000
heap
page read and write
4290000
direct allocation
page execute and read and write
44D0000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
9979E7E000
stack
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
1548000
heap
page read and write
B60E000
stack
page read and write
175356AC000
heap
page read and write
17535650000
heap
page read and write
DD5000
heap
page read and write
BB0E000
stack
page read and write
1310000
trusted library allocation
page read and write
6DFE000
stack
page read and write
1F4000
heap
page read and write
5830000
direct allocation
page execute and read and write
B24F000
stack
page read and write
DD4000
heap
page read and write
6E1ED000
unkown
page readonly
6F5000
unkown
page readonly
D68E000
stack
page read and write
43C0000
heap
page read and write
2E20000
trusted library allocation
page read and write
FED000
unkown
page read and write
2991000
heap
page read and write
143C000
heap
page read and write
1F4000
heap
page read and write
8C1000
unkown
page execute and read and write
F16000
heap
page read and write
5DC9000
direct allocation
page read and write
A77000
heap
page read and write
5D9F000
direct allocation
page read and write
1218000
heap
page read and write
15C6000
heap
page read and write
562000
heap
page read and write
A85000
unkown
page execute and read and write
1F4000
heap
page read and write
C6CE000
stack
page read and write
168B208E000
heap
page read and write
15C8000
heap
page read and write
1F4000
heap
page read and write
52C0000
direct allocation
page execute and read and write
347B000
heap
page read and write
540000
heap
page read and write
A81000
heap
page read and write
1F4000
heap
page read and write
10A84CD5000
heap
page read and write
312E000
stack
page read and write
320F000
stack
page read and write
168B1EE0000
heap
page read and write
1C00000
heap
page read and write
6CBE000
stack
page read and write
2BA0000
heap
page read and write
94E07F000
stack
page read and write
4EE1000
heap
page read and write
52E0000
direct allocation
page execute and read and write
5C3C000
stack
page read and write
42C0000
direct allocation
page execute and read and write
10A84B00000
heap
page read and write
83C000
stack
page read and write
E33000
heap
page read and write
1F4000
heap
page read and write
5C50000
direct allocation
page read and write
AC0E000
stack
page read and write
4250000
direct allocation
page execute and read and write
6E2DB000
unkown
page read and write
5670000
direct allocation
page execute and read and write
E1F000
heap
page read and write
4D90000
direct allocation
page read and write
2682B42B000
heap
page read and write
4EE1000
heap
page read and write
A06000
heap
page read and write
25CE000
stack
page read and write
12FD000
stack
page read and write
15B6000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
5560000
direct allocation
page execute and read and write
1F4000
heap
page read and write
408000
unkown
page readonly
403E000
stack
page read and write
2DC7000
heap
page read and write
4EE1000
heap
page read and write
A20000
heap
page read and write
1F4000
heap
page read and write
31EE000
heap
page read and write
BAC000
unkown
page write copy
47BE000
stack
page read and write
1753570B000
heap
page read and write
34BF000
stack
page read and write
22E4000
trusted library allocation
page read and write
41C0000
direct allocation
page execute and read and write
BECE000
stack
page read and write
13A0000
heap
page read and write
8D0E000
stack
page read and write
CD10000
trusted library allocation
page read and write
241FC502000
heap
page read and write
9F5000
heap
page read and write
E10000
heap
page read and write
1572000
heap
page read and write
5D8C000
stack
page read and write
E70000
heap
page read and write
5390000
direct allocation
page execute and read and write
4ED0000
direct allocation
page read and write
2CFE000
stack
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
6E4E6000
unkown
page write copy
A81000
heap
page read and write
5B70000
direct allocation
page execute and read and write
5B5E000
direct allocation
page read and write
1F4000
heap
page read and write
A3D000
heap
page read and write
15EE000
heap
page read and write
4EE1000
heap
page read and write
E70000
heap
page read and write
7CFE000
stack
page read and write
383E000
unkown
page read and write
707000
unkown
page read and write
6E141000
unkown
page execute read
5370000
direct allocation
page read and write
5AB0000
direct allocation
page execute and read and write
1F4000
heap
page read and write
5A10000
direct allocation
page execute and read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
54E0000
direct allocation
page execute and read and write
5A30000
direct allocation
page execute and read and write
29AA000
heap
page read and write
2E9D000
stack
page read and write
5BB0000
direct allocation
page execute and read and write
5AE0000
direct allocation
page execute and read and write
17535E74000
heap
page read and write
168B2085000
heap
page read and write
42E0000
direct allocation
page execute and read and write
1F4000
heap
page read and write
EBD000
stack
page read and write
B59000
unkown
page read and write
E5B000
heap
page read and write
5850000
trusted library allocation
page read and write
8D4E000
stack
page read and write
1610000
direct allocation
page read and write
32CF000
stack
page read and write
155932E0000
heap
page read and write
6E327000
unkown
page read and write
1F4000
heap
page read and write
72BE000
stack
page read and write
58E2000
trusted library allocation
page read and write
1F4000
heap
page read and write
920E000
stack
page read and write
5510000
direct allocation
page execute and read and write
2682B2B0000
heap
page read and write
1D1EF644000
heap
page read and write
DF0000
heap
page read and write
D30000
heap
page read and write
AC9000
unkown
page execute and read and write
3C7E000
stack
page read and write
1F4000
heap
page read and write
6E301000
unkown
page execute read
4EE1000
heap
page read and write
1F4000
heap
page read and write
10A85402000
heap
page read and write
52C0000
direct allocation
page execute and read and write
168B1FE0000
trusted library allocation
page read and write
1C192FE000
stack
page read and write
2454000
heap
page read and write
1F4000
heap
page read and write
D5C000
stack
page read and write
280F000
stack
page read and write
4480000
trusted library allocation
page read and write
1F4000
heap
page read and write
1584000
heap
page read and write
6E29A000
unkown
page readonly
1F4000
heap
page read and write
438F000
stack
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
4520000
trusted library allocation
page read and write
6E167000
unkown
page write copy
2D30000
heap
page read and write
743E000
stack
page read and write
12FF000
stack
page read and write
1F4000
heap
page read and write
6E22A000
unkown
page execute read
2A7C000
stack
page read and write
40D0000
direct allocation
page execute and read and write
1D1EF5E0000
trusted library allocation
page read and write
6E2EB000
unkown
page read and write
11BD000
heap
page read and write
1B8F000
stack
page read and write
9E8E000
stack
page read and write
6E28F000
unkown
page readonly
1F4000
heap
page read and write
3FF0000
direct allocation
page execute and read and write
12FB000
stack
page read and write
6E327000
unkown
page read and write
4240000
direct allocation
page execute and read and write
C10E000
stack
page read and write
EF0000
heap
page read and write
1F4000
heap
page read and write
1322000
trusted library allocation
page read and write
A2F000
stack
page read and write
3FCF000
stack
page read and write
C84E000
stack
page read and write
13E0000
heap
page read and write
A75000
heap
page read and write
230F000
stack
page read and write
A15000
heap
page read and write
9AE000
stack
page read and write
4200000
direct allocation
page execute and read and write
5910000
direct allocation
page execute and read and write
1F4000
heap
page read and write
4430000
heap
page read and write
94DF7B000
stack
page read and write
371F9FE000
stack
page read and write
DC7000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
519E000
stack
page read and write
570000
heap
page read and write
31B4000
heap
page read and write
43E0000
direct allocation
page execute and read and write
17535E70000
heap
page read and write
6E140000
unkown
page readonly
E57000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
998E000
stack
page read and write
930E000
stack
page read and write
168B2087000
heap
page read and write
4380000
heap
page read and write
4C4F000
stack
page read and write
5570000
direct allocation
page execute and read and write
58ED000
trusted library allocation
page read and write
9A8E000
stack
page read and write
1F4000
heap
page read and write
298E000
stack
page read and write
4520000
trusted library allocation
page read and write
A76000
unkown
page execute and read and write
1322000
trusted library allocation
page read and write
54D0000
direct allocation
page execute and read and write
17535EB9000
heap
page read and write
109A000
heap
page read and write
4EE1000
heap
page read and write
1F4000
heap
page read and write
348F000
stack
page read and write
3A3D000
stack
page read and write
35CF000
stack
page read and write
CD0000
heap
page read and write
548000
heap
page read and write
4170000
direct allocation
page execute and read and write
19A000
stack
page read and write
15D2000
heap
page read and write
1FAB000
trusted library allocation
page read and write
48BF000
stack
page read and write
258D000
stack
page read and write
700000
trusted library allocation
page read and write
7F4E000
stack
page read and write
1134000
heap
page read and write
5D0000
trusted library allocation
page read and write
3155000
heap
page read and write
6F5000
unkown
page readonly
1F4000
heap
page read and write
17535EA6000
heap
page read and write
EC0000
trusted library allocation
page read and write
10A84D13000
heap
page read and write
6002000
trusted library allocation
page read and write
DF9000
heap
page read and write
DDC000
heap
page read and write
168B204A000
heap
page read and write
56B0000
direct allocation
page execute and read and write
22CA000
trusted library allocation
page read and write
1F4000
heap
page read and write
118D000
heap
page read and write
13C0000
heap
page read and write
5810000
direct allocation
page execute and read and write
4D95000
direct allocation
page read and write
1583000
heap
page read and write
1C18E7B000
stack
page read and write
821000
unkown
page execute and write copy
3DBE000
stack
page read and write
1D1EF410000
heap
page read and write
A74000
heap
page read and write
1F4000
heap
page read and write
1310000
trusted library allocation
page read and write
6E200000
unkown
page readonly
1F5000
heap
page read and write
5470000
direct allocation
page execute and read and write
6E28A000
unkown
page readonly
1134000
heap
page read and write
1950000
heap
page read and write
12FB000
stack
page read and write
5ACF000
stack
page read and write
5DD0000
direct allocation
page read and write
53D000
heap
page read and write
6E0DF000
unkown
page write copy
1F4000
heap
page read and write
2B94AFF000
stack
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
DBC000
stack
page read and write
6001000
unkown
page execute read
A7F000
heap
page read and write
DD7000
heap
page read and write
535000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
38BE000
stack
page read and write
5B30000
direct allocation
page execute and read and write
6E2EE000
unkown
page readonly
4520000
trusted library allocation
page read and write
17535ED9000
heap
page read and write
8C6000
unkown
page execute and read and write
400E000
stack
page read and write
4494000
trusted library allocation
page read and write
1438000
heap
page read and write
4260000
trusted library allocation
page read and write
5430000
unkown
page readonly
94DDFF000
stack
page read and write
B99000
unkown
page execute and read and write
5550000
direct allocation
page execute and read and write
2613000
trusted library allocation
page read and write
1F4000
heap
page read and write
8ACE000
stack
page read and write
1160000
heap
page read and write
241FC480000
heap
page read and write
E49000
heap
page read and write
1F4000
heap
page read and write
7E00000
trusted library allocation
page read and write
506000
heap
page read and write
1119000
stack
page read and write
C00E000
stack
page read and write
241FC477000
heap
page read and write
8C0E000
stack
page read and write
59C0000
heap
page read and write
2682BA90000
trusted library allocation
page read and write
5BD0000
direct allocation
page execute and read and write
E56000
heap
page read and write
1557000
heap
page read and write
1D1EF66D000
heap
page read and write
6E2EB000
unkown
page read and write
1610000
direct allocation
page read and write
336E000
stack
page read and write
820E000
stack
page read and write
1F4000
heap
page read and write
11B0000
heap
page read and write
5A20000
direct allocation
page execute and read and write
1F4000
heap
page read and write
3190000
heap
page read and write
D30000
heap
page read and write
559000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
BFE000
stack
page read and write
B63000
unkown
page write copy
4496000
trusted library allocation
page read and write
1F4000
heap
page read and write
5880000
trusted library allocation
page read and write
31C2000
heap
page read and write
25FE000
unkown
page read and write
2E4F000
stack
page read and write
1F4000
heap
page read and write
4EE2000
heap
page read and write
C250000
trusted library allocation
page read and write
15DE000
heap
page read and write
A5E000
stack
page read and write
2FAF000
stack
page read and write
53C0000
direct allocation
page execute and read and write
589000
heap
page read and write
241FC413000
heap
page read and write
2B63000
heap
page read and write
16D3000
heap
page read and write
1700000
heap
page read and write
B4CE000
stack
page read and write
584F000
stack
page read and write
1F4000
heap
page read and write
E6F000
heap
page read and write
377E000
stack
page read and write
A6C000
heap
page read and write
42B0000
direct allocation
page execute and read and write
566000
heap
page read and write
11B9000
heap
page read and write
17535D70000
heap
page read and write
142E000
stack
page read and write
22BC000
trusted library allocation
page read and write
1F5000
heap
page read and write
241FC468000
heap
page read and write
1F4000
heap
page read and write
221000
unkown
page execute read
1D0F000
stack
page read and write
2991000
heap
page read and write
A77000
heap
page read and write
EF5000
heap
page read and write
EDE000
heap
page read and write
55A0000
direct allocation
page execute and read and write
DF8000
heap
page read and write
6E207000
unkown
page read and write
A5B000
heap
page read and write
2E8E000
stack
page read and write
10A84C98000
heap
page read and write
17535726000
heap
page read and write
4EE1000
heap
page read and write
1F4000
heap
page read and write
348F000
stack
page read and write
3F60000
direct allocation
page execute and read and write
52C000
heap
page read and write
555000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
17535EDB000
heap
page read and write
393E000
stack
page read and write
6E4F5000
unkown
page write copy
5690000
direct allocation
page execute and read and write
BE0000
trusted library allocation
page read and write
770000
unkown
page read and write
1EF000
stack
page read and write
423B000
stack
page read and write
280000
heap
page read and write
1310000
trusted library allocation
page read and write
A38E000
stack
page read and write
1389000
heap
page read and write
1F4000
heap
page read and write
54E0000
heap
page read and write
DCF000
heap
page read and write
4050000
direct allocation
page execute and read and write
241FC280000
heap
page read and write
9F8000
heap
page read and write
E08000
heap
page read and write
4C93000
heap
page read and write
373F000
stack
page read and write
69FE000
stack
page read and write
D3B000
stack
page read and write
1F4000
heap
page read and write
DF4000
heap
page read and write
E62000
heap
page read and write
1F4000
heap
page read and write
6E011000
unkown
page execute read
5680000
direct allocation
page execute and read and write
146E000
stack
page read and write
2C50000
heap
page read and write
1F5000
heap
page read and write
29B3000
heap
page read and write
4ECF000
stack
page read and write
B28E000
stack
page read and write
4EE1000
heap
page read and write
1610000
direct allocation
page read and write
23B0000
trusted library allocation
page read and write
5E0000
trusted library allocation
page read and write
168B2070000
heap
page read and write
1F4000
heap
page read and write
4EE1000
heap
page read and write
5660000
direct allocation
page execute and read and write
4EE0000
heap
page read and write
3C4E000
stack
page read and write
10A84C6D000
heap
page read and write
B00E000
stack
page read and write
533000
heap
page read and write
1F4000
heap
page read and write
3ECE000
stack
page read and write
1F4000
heap
page read and write
6E188000
unkown
page read and write
54B0000
direct allocation
page execute and read and write
1F4000
heap
page read and write
8E1000
unkown
page execute and read and write
85D000
stack
page read and write
4520000
trusted library allocation
page read and write
B28000
unkown
page execute and read and write
29B0000
heap
page read and write
6E2CA000
unkown
page readonly
1F4000
heap
page read and write
6E314000
unkown
page readonly
A75000
heap
page read and write
1D1EF3C0000
heap
page read and write
1F4000
heap
page read and write
E0F000
heap
page read and write
4ED3000
direct allocation
page read and write
2991000
heap
page read and write
D80000
heap
page read and write
42E0000
heap
page read and write
5670000
direct allocation
page execute and read and write
A58000
heap
page read and write
A17000
heap
page read and write
4EE1000
heap
page read and write
D9C000
stack
page read and write
1F4000
heap
page read and write
17535DB4000
heap
page read and write
6E1B0000
unkown
page readonly
4EE1000
heap
page read and write
B16000
heap
page read and write
52C0000
direct allocation
page execute and read and write
B50E000
stack
page read and write
1F4000
heap
page read and write
32D0000
heap
page read and write
6DF91000
unkown
page execute read
5680000
direct allocation
page execute and read and write
CE0000
trusted library allocation
page read and write
31E4000
heap
page read and write
42BE000
stack
page read and write
488F000
stack
page read and write
29B3000
heap
page read and write
1130000
heap
page read and write
1F4000
heap
page read and write
A7F000
heap
page read and write
A3D000
stack
page read and write
521000
heap
page read and write
A28000
unkown
page execute and read and write
52A000
heap
page read and write
1F4000
heap
page read and write
59CE000
stack
page read and write
5B00000
direct allocation
page execute and read and write
1F4000
heap
page read and write
BB5000
unkown
page read and write
5630000
direct allocation
page execute and read and write
2682B320000
heap
page read and write
1F5000
heap
page read and write
707000
unkown
page read and write
1D1EF602000
heap
page read and write
31D3000
heap
page read and write
61A0000
trusted library allocation
page read and write
F00000
heap
page read and write
31EA000
heap
page read and write
5850000
direct allocation
page execute and read and write
58FF000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
58F0000
direct allocation
page execute and read and write
48CE000
stack
page read and write
22DC000
trusted library allocation
page read and write
5431000
unkown
page execute read
618E000
trusted library allocation
page read and write
4010000
direct allocation
page execute and read and write
1F4000
heap
page read and write
A9D000
unkown
page execute and read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
17535ED9000
heap
page read and write
6D1000
unkown
page execute read
241FC479000
heap
page read and write
2B949F9000
stack
page read and write
40A000
unkown
page read and write
1134000
heap
page read and write
6187000
trusted library allocation
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
F0A000
heap
page read and write
570000
trusted library allocation
page read and write
A32000
heap
page read and write
5790000
trusted library allocation
page read and write
22A000
unkown
page write copy
144E000
heap
page read and write
A81000
heap
page read and write
2682B400000
heap
page read and write
10A84CDA000
heap
page read and write
55F0000
direct allocation
page read and write
370F000
stack
page read and write
9BCE000
stack
page read and write
1F5000
heap
page read and write
6E154000
unkown
page readonly
5340000
direct allocation
page execute and read and write
43CE000
stack
page read and write
1F4000
heap
page read and write
1310000
trusted library allocation
page read and write
1A27000
heap
page read and write
6E17D000
unkown
page readonly
52C0000
direct allocation
page execute and read and write
3EBF000
stack
page read and write
2682B402000
heap
page read and write
488F000
stack
page read and write
C90000
heap
page read and write
1616000
heap
page read and write
15D1000
heap
page read and write
1A00000
heap
page read and write
1F4000
heap
page read and write
4D20000
heap
page read and write
3851000
heap
page read and write
2960000
heap
page read and write
15593402000
heap
page read and write
424F000
stack
page read and write
1BCE000
stack
page read and write
6E2C0000
unkown
page readonly
1134000
heap
page read and write
5770000
direct allocation
page execute and read and write
821000
unkown
page execute and read and write
1F4000
heap
page read and write
41A0000
direct allocation
page execute and read and write
5420000
direct allocation
page execute and read and write
6F5000
unkown
page readonly
1F4000
heap
page read and write
4020000
direct allocation
page execute and read and write
C16679B000
stack
page read and write
8D5000
unkown
page read and write
40B0000
direct allocation
page execute and read and write
6E141000
unkown
page execute read
5DF1000
direct allocation
page read and write
6E19D000
unkown
page readonly
B8CE000
stack
page read and write
15F2000
heap
page read and write
1324000
trusted library allocation
page read and write
15B6000
heap
page read and write
2B9477F000
stack
page read and write
4B3F000
stack
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
DFE000
stack
page read and write
707000
unkown
page read and write
B88E000
stack
page read and write
31ED000
heap
page read and write
A58000
heap
page read and write
5460000
direct allocation
page execute and read and write
42A0000
direct allocation
page execute and read and write
1FA3000
trusted library allocation
page read and write
1F4000
heap
page read and write
168B2097000
heap
page read and write
4CE000
stack
page read and write
1FB3000
trusted library allocation
page read and write
1F4000
heap
page read and write
2D0F000
stack
page read and write
EF0000
unkown
page execute and write copy
4ED0000
direct allocation
page read and write
5F05000
trusted library allocation
page read and write
1554000
heap
page read and write
17535905000
heap
page read and write
E56000
heap
page read and write
11D1000
heap
page read and write
4C90000
heap
page read and write
3F70000
direct allocation
page execute and read and write
DC0000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
10A84D02000
heap
page read and write
1F4000
heap
page read and write
4EE1000
heap
page read and write
3470000
heap
page read and write
A17000
heap
page read and write
A15000
heap
page read and write
1C190FE000
stack
page read and write
5350000
direct allocation
page execute and read and write
2B5A000
heap
page read and write
A74000
heap
page read and write
154F000
heap
page read and write
1C18F7E000
stack
page read and write
31F9000
heap
page read and write
CD000
stack
page read and write
1F4000
heap
page read and write
1615000
heap
page read and write
6DFFC000
unkown
page read and write
B02000
unkown
page execute and read and write
DF0000
heap
page read and write
3FB0000
direct allocation
page execute and read and write
3B3E000
stack
page read and write
1379000
heap
page read and write
7BBE000
stack
page read and write
D28000
unkown
page execute and read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
58A0000
trusted library allocation
page read and write
BAC000
unkown
page execute and read and write
1F4000
heap
page read and write
22C4000
trusted library allocation
page read and write
ECD000
stack
page read and write
143C000
heap
page read and write
15C6000
heap
page read and write
820000
unkown
page read and write
2991000
heap
page read and write
5980000
direct allocation
page execute and read and write
154B000
heap
page read and write
241FC402000
heap
page read and write
1F4000
heap
page read and write
FED000
stack
page read and write
5940000
direct allocation
page execute and read and write
A98E000
stack
page read and write
4260000
trusted library allocation
page read and write
1F4000
heap
page read and write
4EE1000
heap
page read and write
10A85512000
heap
page read and write
4434000
heap
page read and write
5DBA000
direct allocation
page read and write
E34000
heap
page read and write
5730000
direct allocation
page execute and read and write
6E2DD000
unkown
page readonly
29B0000
heap
page read and write
2B9467E000
stack
page read and write
3781000
trusted library allocation
page read and write
270E000
stack
page read and write
37A0000
heap
page read and write
2B945FE000
stack
page read and write
2C5F000
stack
page read and write
57E0000
direct allocation
page execute and read and write
168B2080000
heap
page read and write
E5B000
stack
page read and write
2FFE000
stack
page read and write
6E050000
unkown
page readonly
1134000
heap
page read and write
3770000
trusted library allocation
page read and write
10A85260000
trusted library allocation
page read and write
E83000
heap
page read and write
1F4000
heap
page read and write
EDB000
unkown
page execute and read and write
C4D000
stack
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
AFF000
unkown
page execute and read and write
6180000
trusted library allocation
page read and write
4EE1000
heap
page read and write
52D0000
direct allocation
page execute and read and write
168B207C000
heap
page read and write
568000
heap
page read and write
970E000
stack
page read and write
78FE000
stack
page read and write
2E30000
trusted library allocation
page read and write
590000
heap
page read and write
22C4000
trusted library allocation
page read and write
4480000
trusted library allocation
page read and write
B78E000
stack
page read and write
58FB000
trusted library allocation
page read and write
D40000
trusted library allocation
page read and write
1F4000
heap
page read and write
560000
heap
page read and write
23A0000
trusted library allocation
page read and write
1F4000
heap
page read and write
A20E000
stack
page read and write
5970000
heap
page read and write
2682BC02000
trusted library allocation
page read and write
371F77A000
stack
page read and write
834E000
stack
page read and write
41E0000
direct allocation
page execute and read and write
241FC2E0000
heap
page read and write
168B2053000
heap
page read and write
2B9497E000
stack
page read and write
6E1B1000
unkown
page execute read
770000
unkown
page read and write
A7F000
heap
page read and write
1F4000
heap
page read and write
53E0000
direct allocation
page execute and read and write
168B2045000
heap
page read and write
597000
heap
page read and write
6E14C000
unkown
page readonly
1561000
heap
page read and write
5B40000
direct allocation
page execute and read and write
5AD0000
direct allocation
page execute and read and write
4EE1000
heap
page read and write
32F5000
heap
page read and write
99000
stack
page read and write
10A8558E000
heap
page read and write
4090000
direct allocation
page execute and read and write
1324000
trusted library allocation
page read and write
1F4000
heap
page read and write
D10000
heap
page read and write
878000
unkown
page execute and read and write
7CBF000
stack
page read and write
37A7000
heap
page read and write
15D5000
heap
page read and write
17535860000
trusted library allocation
page read and write
590D000
trusted library allocation
page read and write
6E211000
unkown
page execute read
40000
heap
page read and write
BCC000
stack
page read and write
5DD6000
direct allocation
page read and write
15D5000
heap
page read and write
370F000
stack
page read and write
B99000
unkown
page execute and read and write
12FF000
stack
page read and write
545000
heap
page read and write
114E000
stack
page read and write
4000000
direct allocation
page execute and read and write
534000
heap
page read and write
2D4E000
stack
page read and write
BB6000
unkown
page execute and read and write
31D5000
heap
page read and write
8E50000
trusted library allocation
page read and write
E1E000
heap
page read and write
4ED3000
direct allocation
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
1F5000
heap
page read and write
B0A000
unkown
page read and write
4496000
trusted library allocation
page read and write
1610000
direct allocation
page read and write
29AA000
heap
page read and write
C58E000
stack
page read and write
53A0000
direct allocation
page execute and read and write
58BB000
trusted library allocation
page read and write
1620000
heap
page read and write
B25000
unkown
page read and write
86F000
unkown
page execute and read and write
4D8F000
stack
page read and write
1F4000
heap
page read and write
4480000
trusted library allocation
page read and write
244F000
stack
page read and write
2990000
heap
page read and write
910000
unkown
page execute and read and write
1F4000
heap
page read and write
175356F0000
heap
page read and write
575000
heap
page read and write
91CE000
stack
page read and write
FEE000
stack
page read and write
4520000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
58C5000
trusted library allocation
page read and write
A58000
heap
page read and write
4030000
direct allocation
page execute and read and write
54D0000
trusted library allocation
page read and write
E2D000
heap
page read and write
1F4000
heap
page read and write
52A000
heap
page read and write
15E5000
heap
page read and write
58BE000
stack
page read and write
168B2091000
heap
page read and write
52C0000
direct allocation
page execute and read and write
E5B000
heap
page read and write
33C0000
heap
page read and write
51C000
heap
page read and write
10000
heap
page read and write
31F1000
heap
page read and write
363E000
stack
page read and write
B41000
unkown
page write copy
545000
heap
page read and write
94D8FF000
stack
page read and write
5290000
direct allocation
page execute and read and write
1F4000
heap
page read and write
5410000
direct allocation
page execute and read and write
5820000
direct allocation
page execute and read and write
9979EFE000
stack
page read and write
58D3000
trusted library allocation
page read and write
1690000
direct allocation
page read and write
10A84C2B000
heap
page read and write
17535684000
heap
page read and write
70A000
unkown
page readonly
103A000
trusted library allocation
page read and write
B74E000
stack
page read and write
241FC442000
heap
page read and write
1561000
heap
page read and write
1F4000
heap
page read and write
40E0000
direct allocation
page execute and read and write
A81000
heap
page read and write
34CF000
stack
page read and write
1F4000
heap
page read and write
A49000
heap
page read and write
12EE000
stack
page read and write
A78000
unkown
page execute and read and write
4260000
direct allocation
page execute and read and write
6E1D0000
unkown
page readonly
6E4FB000
unkown
page readonly
1F5000
heap
page read and write
53D0000
direct allocation
page execute and read and write
29B3000
heap
page read and write
1F4000
heap
page read and write
6E1AB000
unkown
page readonly
1567000
heap
page read and write
1F4000
heap
page read and write
771000
unkown
page execute and read and write
40C0000
direct allocation
page execute and read and write
4D93000
direct allocation
page read and write
591E000
trusted library allocation
page read and write
3670000
heap
page read and write
4C93000
heap
page read and write
1F4000
heap
page read and write
DED000
heap
page read and write
168B2041000
heap
page read and write
41D0000
direct allocation
page execute and read and write
1F4000
heap
page read and write
168B2072000
heap
page read and write
ED0000
heap
page read and write
1F4000
heap
page read and write
5580000
direct allocation
page execute and read and write
6200000
trusted library allocation
page read and write
1134000
heap
page read and write
1F4000
heap
page read and write
583000
heap
page read and write
1F4000
heap
page read and write
10A84C13000
heap
page read and write
6E2F0000
unkown
page readonly
EB0000
heap
page read and write
4070000
direct allocation
page execute and read and write
313E000
stack
page read and write
541000
heap
page read and write
94DE7C000
stack
page read and write
4EE1000
heap
page read and write
E17000
heap
page read and write
10A84CC9000
heap
page read and write
5DF0000
trusted library allocation
page read and write
5610000
direct allocation
page execute and read and write
384F000
stack
page read and write
1F4000
heap
page read and write
6E161000
unkown
page execute read
321C000
heap
page read and write
6F5000
unkown
page readonly
4E0000
heap
page read and write
1F4000
heap
page read and write
603B000
unkown
page read and write
33CF000
stack
page read and write
6E207000
unkown
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
371F37E000
stack
page read and write
3FC0000
direct allocation
page execute and read and write
4C91000
heap
page read and write
1F4000
heap
page read and write
1134000
heap
page read and write
5480000
direct allocation
page execute and read and write
42E0000
heap
page read and write
29B3000
heap
page read and write
603E000
unkown
page readonly
4480000
trusted library allocation
page read and write
168B2065000
heap
page read and write
159B000
heap
page read and write
1322000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
1F4000
heap
page read and write
FA0000
heap
page read and write
6E1B0000
unkown
page readonly
5910000
trusted library allocation
page read and write
12F5000
stack
page read and write
1545000
heap
page read and write
F18000
heap
page read and write
5D4F000
stack
page read and write
948E000
stack
page read and write
4360000
direct allocation
page execute and read and write
136D000
trusted library allocation
page read and write
4ED2000
direct allocation
page read and write
1559000
heap
page read and write
17535DAD000
heap
page read and write
AA0000
heap
page read and write
10022000
unkown
page readonly
DE0000
heap
page read and write
17535694000
heap
page read and write
15AA000
heap
page read and write
C5CE000
stack
page read and write
13C5000
heap
page read and write
6E300000
unkown
page readonly
10A85500000
heap
page read and write
58ED000
trusted library allocation
page read and write
17535EB3000
heap
page read and write
C80E000
stack
page read and write
44CF000
stack
page read and write
15593330000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
467E000
stack
page read and write
E46000
heap
page read and write
94D77C000
stack
page read and write
5F07000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
E62000
heap
page read and write
1090000
heap
page read and write
48FE000
stack
page read and write
B9CE000
stack
page read and write
1371000
heap
page read and write
753E000
stack
page read and write
77BE000
stack
page read and write
1310000
trusted library allocation
page read and write
1F4000
heap
page read and write
13BE000
heap
page read and write
6DFFC000
unkown
page read and write
DDD000
heap
page read and write
3F4F000
stack
page read and write
17535ED9000
heap
page read and write
3952D7A000
stack
page read and write
4ED2000
direct allocation
page read and write
1558000
heap
page read and write
1F4000
heap
page read and write
15E1000
heap
page read and write
168B1E70000
heap
page read and write
4520000
trusted library allocation
page read and write
168B2047000
heap
page read and write
E33000
heap
page read and write
400000
unkown
page readonly
1F4000
heap
page read and write
1F4000
heap
page read and write
707000
unkown
page write copy
1397000
heap
page read and write
537000
heap
page read and write
52C0000
direct allocation
page execute and read and write
535F000
stack
page read and write
6DF90000
unkown
page readonly
1551000
heap
page read and write
1F4000
heap
page read and write
2D36000
heap
page read and write
13A3000
heap
page read and write
1F4000
heap
page read and write
1591000
heap
page read and write
1F4000
heap
page read and write
29B0000
heap
page read and write
58C0000
trusted library allocation
page read and write
4EE1000
heap
page read and write
22D2000
trusted library allocation
page read and write
1F4000
heap
page read and write
15FD000
heap
page read and write
1F4000
heap
page read and write
5670000
direct allocation
page execute and read and write
32DA000
heap
page read and write
1D1EF62B000
heap
page read and write
156F000
heap
page read and write
A39000
unkown
page execute and read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
58FE000
trusted library allocation
page read and write
A40000
heap
page read and write
58CC000
trusted library allocation
page read and write
6F0000
heap
page read and write
571000
heap
page read and write
7F8E000
stack
page read and write
2D30000
heap
page read and write
6E03F000
unkown
page readonly
67E000
stack
page read and write
21CF000
stack
page read and write
DC2000
heap
page read and write
1F4000
heap
page read and write
51B0000
heap
page read and write
1F4000
heap
page read and write
2250000
heap
page read and write
BAC000
unkown
page execute and write copy
4EE1000
heap
page read and write
E20000
heap
page read and write
3ACF000
stack
page read and write
590E000
trusted library allocation
page read and write
5A70000
direct allocation
page execute and read and write
4ED3000
direct allocation
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
9F8E000
stack
page read and write
94DCFB000
stack
page read and write
1F4000
heap
page read and write
DEB000
heap
page read and write
13A0000
heap
page read and write
1F4000
heap
page read and write
57B0000
direct allocation
page execute and read and write
4536000
trusted library allocation
page read and write
161D000
unkown
page read and write
1F4000
heap
page read and write
BA0E000
stack
page read and write
16D2000
heap
page read and write
1F4000
heap
page read and write
59BE000
stack
page read and write
58CE000
trusted library allocation
page read and write
570000
heap
page read and write
6E051000
unkown
page execute read
367B000
heap
page read and write
1F4000
heap
page read and write
F60000
heap
page read and write
C48E000
stack
page read and write
1548000
heap
page read and write
1F4000
heap
page read and write
1C191FF000
stack
page read and write
4EE1000
heap
page read and write
4300000
direct allocation
page execute and read and write
1447000
heap
page read and write
52A0000
direct allocation
page execute and read and write
29B7000
heap
page read and write
6E0CF000
unkown
page readonly
1300000
heap
page read and write
4520000
trusted library allocation
page read and write
6166000
unkown
page read and write
16FE000
stack
page read and write
2B4E000
stack
page read and write
DF4000
heap
page read and write
7A3F000
stack
page read and write
118A000
heap
page read and write
15D8000
heap
page read and write
DC4000
heap
page read and write
1F5000
heap
page read and write
31DA000
heap
page read and write
5490000
direct allocation
page execute and read and write
31E4000
heap
page read and write
CACE000
stack
page read and write
BD0000
heap
page read and write
1350000
heap
page read and write
15593360000
trusted library allocation
page read and write
1F4000
heap
page read and write
A81000
heap
page read and write
1D1EF65E000
heap
page read and write
1F4000
heap
page read and write
908F000
stack
page read and write
3952A7F000
stack
page read and write
2DC0000
heap
page read and write
517E000
stack
page read and write
DD2000
heap
page read and write
89C000
stack
page read and write
6DFFF000
unkown
page readonly
8AF000
stack
page read and write
4480000
trusted library allocation
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
6E190000
unkown
page readonly
53A000
heap
page read and write
54E6000
heap
page read and write
42F0000
direct allocation
page execute and read and write
C10000
trusted library allocation
page read and write
A0A000
heap
page read and write
133E000
stack
page read and write
258F000
stack
page read and write
4D90000
direct allocation
page read and write
168B208B000
heap
page read and write
478F000
stack
page read and write
5380000
direct allocation
page execute and read and write
327E000
stack
page read and write
450E000
stack
page read and write
398F000
stack
page read and write
5BFF000
stack
page read and write
E34000
heap
page read and write
There are 2725 hidden memdumps, click here to show them.