IOC Report
MejqsB9tx9.exe

loading gif

Files

File Path
Type
Category
Malicious
MejqsB9tx9.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\cred64[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\clip64[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\_Files_\MXPXCVPDVN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\NEBFQQYWPS.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\SFPUSAFIOL.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\SFPUSAFIOL.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\SQRKHNBNYN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\UOOJJOZIRH.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\UOOJJOZIRH.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\ZQIXMVQGAH.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cwiqnadl.y2l.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m2mbhj4h.wtu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nyif2m4o.hcl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rt3ns3e0.oef.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Tasks\explorha.job
data
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\MejqsB9tx9.exe
"C:\Users\user\Desktop\MejqsB9tx9.exe"
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
"C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe"
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
malicious
C:\Windows\System32\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
malicious
C:\Windows\System32\netsh.exe
netsh wlan show profiles
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 --field-trial-handle=2000,i,12118425566247776453,12709347483506542613,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://193.233.132.56/Pneh2sXQk0/index.php
193.233.132.56
malicious
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1
193.233.132.56
malicious
http://193.233.132.56/Pneh2sXQk0/Plugins/clip64.dll
193.233.132.56
malicious
http://193.233.132.56/Pneh2sXQk0/Plugins/cred64.dll
193.233.132.56
malicious
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/License
unknown
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1ws
unknown
https://contoso.com/Icon
unknown
https://aka.ms/winsvr-2022-pshelpX
unknown
https://www.google.com/async/newtab_promos
142.251.40.132
https://github.com/Pester/Pester
unknown
http://193.233.132.56/3
unknown
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1E
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.251.40.132
http://crl.m
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.251.40.132
http://193.233.132.56/Pneh2sXQk0/index.php?wal=17
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgS_YJbhGNfnzbEGIjD1WaW_kQpX5UuTH3k6sLaT2sgha20jAZtNUmX4owd2e1RNY717lgQsRK3T9_HrP4AyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.251.40.132
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1s
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgS_YJbhGNjnzbEGIjCy5MxkR43JXxLUWmJrXennO5Nx-D2Gy-xkAQ-34AfzKqBYUVHfWo10HJp47EMi6woyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.251.40.132
http://193.233.132.56/neh2sXQk0/index.php?wal=1a
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.251.40.132
https://aka.ms/pscore68
unknown
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1k
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
142.251.40.132

IPs

IP
Domain
Country
Malicious
193.233.132.56
unknown
Russian Federation
malicious
192.168.2.6
unknown
unknown
malicious
142.251.40.132
www.google.com
United States
239.255.255.250
unknown
Reserved
192.168.2.4
unknown
unknown
192.168.2.5
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
4CF0000
direct allocation
page read and write
malicious
201000
unkown
page execute and read and write
malicious
4E10000
direct allocation
page read and write
malicious
201000
unkown
page execute and read and write
malicious
52D0000
direct allocation
page read and write
malicious
201000
unkown
page execute and read and write
malicious
C81000
unkown
page execute and read and write
malicious
49F0000
direct allocation
page read and write
malicious
201000
unkown
page execute and read and write
malicious
201000
unkown
page execute and read and write
malicious
49F0000
direct allocation
page read and write
malicious
5100000
direct allocation
page read and write
malicious
4E90000
direct allocation
page read and write
malicious
52E0000
direct allocation
page read and write
malicious
201000
unkown
page execute and read and write
malicious
4F40000
direct allocation
page read and write
malicious
201000
unkown
page execute and read and write
malicious
49F0000
direct allocation
page read and write
malicious
4B00000
direct allocation
page read and write
malicious
201000
unkown
page execute and read and write
malicious
201000
unkown
page execute and read and write
malicious
4561000
heap
page read and write
31A0000
direct allocation
page read and write
4BB0000
direct allocation
page execute and read and write
438E000
stack
page read and write
118A000
heap
page read and write
49E0000
direct allocation
page read and write
CD0000
direct allocation
page read and write
4F70000
direct allocation
page execute and read and write
F34000
heap
page read and write
31A0000
direct allocation
page read and write
FCB000
heap
page read and write
2D40000
direct allocation
page read and write
13C0000
heap
page read and write
3AEF000
stack
page read and write
4FA3000
direct allocation
page read and write
38CF000
stack
page read and write
CF4000
heap
page read and write
7FFD2463F000
trusted library allocation
page read and write
2E5A000
heap
page read and write
B8DA27E000
stack
page read and write
4E20000
direct allocation
page read and write
320E000
stack
page read and write
4E40000
direct allocation
page execute and read and write
319E000
stack
page read and write
CEE000
stack
page read and write
3CFE000
stack
page read and write
3DBF000
stack
page read and write
1E190001000
trusted library allocation
page read and write
FA0000
direct allocation
page read and write
5440000
direct allocation
page execute and read and write
507000
unkown
page execute and read and write
511B000
stack
page read and write
5020000
direct allocation
page execute and read and write
2E9E000
stack
page read and write
4CB0000
trusted library allocation
page read and write
BA0000
direct allocation
page read and write
264000
unkown
page execute and read and write
4871000
heap
page read and write
4D1E000
stack
page read and write
954000
heap
page read and write
1314000
heap
page read and write
483E000
stack
page read and write
BB0000
heap
page read and write
5090000
direct allocation
page execute and read and write
43DE000
stack
page read and write
1E1F2F5D000
heap
page read and write
4551000
heap
page read and write
298F000
stack
page read and write
CD0000
direct allocation
page read and write
41BF000
stack
page read and write
28FC000
stack
page read and write
7FFD24610000
trusted library allocation
page read and write
5280000
direct allocation
page execute and read and write
7FFD24560000
trusted library allocation
page read and write
7FFD2429D000
trusted library allocation
page execute and read and write
448F000
stack
page read and write
B07CAFE000
stack
page read and write
954000
heap
page read and write
43AE000
stack
page read and write
135D000
stack
page read and write
42FF000
stack
page read and write
52F0000
direct allocation
page execute and read and write
523F000
stack
page read and write
4C00000
direct allocation
page execute and read and write
B7E000
heap
page read and write
4F60000
direct allocation
page execute and read and write
417F000
stack
page read and write
5343000
direct allocation
page read and write
BB0000
heap
page read and write
4E31000
heap
page read and write
ECF000
stack
page read and write
4AA0000
trusted library allocation
page read and write
35AF000
stack
page read and write
4650000
direct allocation
page read and write
CE9000
unkown
page write copy
466E000
stack
page read and write
396E000
stack
page read and write
488E000
stack
page read and write
4650000
direct allocation
page read and write
7FFD246B0000
trusted library allocation
page execute and read and write
130E000
stack
page read and write
1E180228000
trusted library allocation
page read and write
46FE000
stack
page read and write
135E000
stack
page read and write
361E000
stack
page read and write
54A0000
direct allocation
page execute and read and write
3B2E000
stack
page read and write
13A0000
direct allocation
page read and write
4871000
heap
page read and write
4E20000
direct allocation
page read and write
362E000
stack
page read and write
1E1F2C9F000
heap
page read and write
3A0E000
stack
page read and write
FB4000
heap
page read and write
49E0000
direct allocation
page read and write
34DE000
stack
page read and write
1E1F2F6D000
heap
page read and write
1020000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
201000
unkown
page execute and write copy
28A6D62B000
heap
page read and write
4ECE000
stack
page read and write
D94000
heap
page read and write
447E000
stack
page read and write
20C08AA8000
heap
page read and write
329F000
stack
page read and write
1E180753000
trusted library allocation
page read and write
DF0000
heap
page read and write
51E000
unkown
page execute and write copy
34AE000
stack
page read and write
200000
unkown
page readonly
38DF000
stack
page read and write
54C0000
direct allocation
page execute and read and write
4871000
heap
page read and write
9F974F4000
stack
page read and write
28A6D590000
heap
page read and write
BA0000
direct allocation
page read and write
40EF000
stack
page read and write
B8DA4FF000
stack
page read and write
2E0F000
stack
page read and write
3FC000
unkown
page execute and read and write
13D4000
heap
page read and write
464F000
stack
page read and write
13A0000
direct allocation
page read and write
28A6D598000
heap
page read and write
4871000
heap
page read and write
378E000
stack
page read and write
2FDE000
stack
page read and write
200000
unkown
page read and write
2C30000
direct allocation
page read and write
D94000
heap
page read and write
7FFD24472000
trusted library allocation
page read and write
4540000
direct allocation
page read and write
269000
unkown
page write copy
2ECE000
stack
page read and write
5130000
direct allocation
page execute and read and write
1E1902F6000
trusted library allocation
page read and write
2F1E000
stack
page read and write
1E1814F2000
trusted library allocation
page read and write
BF7000
heap
page read and write
C64000
heap
page read and write
4871000
heap
page read and write
4561000
heap
page read and write
3B9D000
stack
page read and write
3B7F000
stack
page read and write
4BFE000
stack
page read and write
136F000
stack
page read and write
1144000
unkown
page execute and read and write
2EDF000
stack
page read and write
51D000
unkown
page execute and write copy
382F000
stack
page read and write
BB4000
heap
page read and write
CAC000
stack
page read and write
28A6D6A0000
trusted library allocation
page read and write
B3A000
heap
page read and write
6804000
heap
page read and write
54F0000
direct allocation
page execute and read and write
B8DA57E000
stack
page read and write
BE1000
heap
page read and write
4BDE000
stack
page read and write
2C30000
direct allocation
page read and write
1314000
heap
page read and write
CE9000
unkown
page read and write
3A0F000
stack
page read and write
4541000
heap
page read and write
7FFD24520000
trusted library allocation
page read and write
510000
unkown
page execute and read and write
1490000
heap
page read and write
8FA000
stack
page read and write
457F000
stack
page read and write
3CBE000
stack
page read and write
861B000
heap
page read and write
CEB000
unkown
page execute and read and write
4871000
heap
page read and write
49E0000
direct allocation
page read and write
37BF000
stack
page read and write
4C71000
heap
page read and write
FB4000
heap
page read and write
5080000
direct allocation
page execute and read and write
37BE000
stack
page read and write
476F000
stack
page read and write
407E000
stack
page read and write
5460000
direct allocation
page execute and read and write
7FFD24620000
trusted library allocation
page read and write
4561000
heap
page read and write
75C000
stack
page read and write
4B63000
direct allocation
page read and write
DF4000
heap
page read and write
D94000
heap
page read and write
1310000
heap
page read and write
4E20000
direct allocation
page read and write
16BE000
stack
page read and write
4C10000
direct allocation
page execute and read and write
28A6D59F000
heap
page read and write
7FFD24680000
trusted library allocation
page read and write
FB4000
heap
page read and write
2EBF000
stack
page read and write
3E8E000
stack
page read and write
13D4000
heap
page read and write
2D40000
direct allocation
page read and write
C6E000
stack
page read and write
39FF000
stack
page read and write
4ABE000
stack
page read and write
5280000
direct allocation
page execute and read and write
54E0000
direct allocation
page execute and read and write
7FFD245B0000
trusted library allocation
page read and write
201000
unkown
page execute and write copy
391E000
stack
page read and write
F34000
heap
page read and write
2D40000
direct allocation
page read and write
31EF000
stack
page read and write
7FFD24441000
trusted library allocation
page read and write
3ADF000
stack
page read and write
4871000
heap
page read and write
4871000
heap
page read and write
200000
unkown
page readonly
DF4000
heap
page read and write
4871000
heap
page read and write
332E000
stack
page read and write
200000
unkown
page readonly
1160000
direct allocation
page execute and read and write
28A6D3F0000
heap
page read and write
B93000
heap
page read and write
4E80000
direct allocation
page read and write
13A0000
direct allocation
page read and write
B4C000
stack
page read and write
26B000
unkown
page execute and read and write
31A0000
direct allocation
page read and write
3F3F000
stack
page read and write
BB4000
heap
page read and write
4661000
heap
page read and write
30DF000
stack
page read and write
6C4000
unkown
page execute and read and write
40BE000
stack
page read and write
4871000
heap
page read and write
EE0000
heap
page read and write
1314000
heap
page read and write
F34000
heap
page read and write
13CB000
heap
page read and write
372F000
stack
page read and write
2C30000
direct allocation
page read and write
C64000
heap
page read and write
54D0000
direct allocation
page execute and read and write
4B3E000
stack
page read and write
52D0000
direct allocation
page read and write
4B60000
direct allocation
page execute and read and write
493F000
stack
page read and write
5310000
direct allocation
page execute and read and write
FA0000
direct allocation
page read and write
2C30000
direct allocation
page read and write
434F000
stack
page read and write
BF9000
heap
page read and write
954000
heap
page read and write
4A7F000
stack
page read and write
F34000
heap
page read and write
28A6D6A0000
trusted library allocation
page read and write
954000
heap
page read and write
1E1F0C6E000
heap
page read and write
7FFD246A0000
trusted library allocation
page read and write
28A6D64E000
heap
page read and write
4871000
heap
page read and write
4E20000
direct allocation
page read and write
1E1F2CC0000
heap
page read and write
4871000
heap
page read and write
422F000
stack
page read and write
4E4E000
stack
page read and write
4E70000
direct allocation
page execute and read and write
4D2E000
stack
page read and write
1E181887000
trusted library allocation
page read and write
1140000
heap
page read and write
1314000
heap
page read and write
4DD0000
trusted library allocation
page read and write
52C0000
direct allocation
page execute and read and write
1E1F2795000
heap
page read and write
CF4000
heap
page read and write
AFD000
stack
page read and write
379F000
stack
page read and write
4871000
heap
page read and write
440E000
stack
page read and write
D3E000
stack
page read and write
75C000
stack
page read and write
CF7000
heap
page read and write
FB4000
heap
page read and write
63FE000
stack
page read and write
FA0000
direct allocation
page read and write
13D9000
heap
page read and write
1414000
heap
page read and write
3C1F000
stack
page read and write
4C80000
direct allocation
page execute and read and write
2D40000
direct allocation
page read and write
3020000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
4540000
direct allocation
page read and write
4660000
heap
page read and write
1E1815A3000
trusted library allocation
page read and write
C64000
heap
page read and write
2D40000
direct allocation
page read and write
4E80000
direct allocation
page execute and read and write
4BD0000
direct allocation
page execute and read and write
2E8F000
stack
page read and write
28A6D4D0000
heap
page read and write
4870000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
4540000
direct allocation
page read and write
36EF000
stack
page read and write
200000
unkown
page readonly
51E000
unkown
page execute and write copy
4541000
heap
page read and write
BA0000
heap
page read and write
2C30000
direct allocation
page read and write
338F000
stack
page read and write
4650000
direct allocation
page read and write
954000
heap
page read and write
4871000
heap
page read and write
4540000
direct allocation
page read and write
4D20000
direct allocation
page execute and read and write
5000000
direct allocation
page execute and read and write
54C0000
direct allocation
page execute and read and write
D4B000
heap
page read and write
4F4F000
stack
page read and write
264000
unkown
page execute and read and write
B90000
heap
page read and write
66CE000
heap
page read and write
322F000
stack
page read and write
20C08A98000
heap
page read and write
334E000
stack
page read and write
7FFD24510000
trusted library allocation
page read and write
B07CA7E000
stack
page read and write
51D000
unkown
page execute and write copy
2C9E000
stack
page read and write
FB4000
heap
page read and write
4871000
heap
page read and write
4E20000
direct allocation
page read and write
4E20000
direct allocation
page read and write
CF4000
heap
page read and write
3C8F000
stack
page read and write
49E0000
direct allocation
page read and write
1414000
heap
page read and write
4C70000
heap
page read and write
31A0000
direct allocation
page read and write
143B000
heap
page read and write
2D60000
heap
page read and write
49DF000
stack
page read and write
CD0000
direct allocation
page read and write
4BC0000
direct allocation
page execute and read and write
200000
unkown
page read and write
66D0000
heap
page read and write
7FFD244A0000
trusted library allocation
page read and write
4540000
direct allocation
page read and write
1414000
heap
page read and write
3FC000
unkown
page execute and read and write
37EF000
stack
page read and write
B8DA37F000
stack
page read and write
4A53000
direct allocation
page read and write
BB5000
heap
page read and write
BB4000
heap
page read and write
4BBF000
stack
page read and write
1414000
heap
page read and write
20C08C15000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
4F80000
direct allocation
page execute and read and write
954000
heap
page read and write
7FFD24720000
trusted library allocation
page execute and read and write
51D000
unkown
page execute and read and write
BCB000
heap
page read and write
404F000
stack
page read and write
264000
unkown
page execute and read and write
4541000
heap
page read and write
4871000
heap
page read and write
4650000
direct allocation
page read and write
1414000
heap
page read and write
4DA000
unkown
page execute and read and write
4871000
heap
page read and write
4A2E000
stack
page read and write
51D000
unkown
page execute and read and write
47DF000
stack
page read and write
49E0000
direct allocation
page read and write
1E1F2BFC000
heap
page read and write
110E000
stack
page read and write
1E1818DC000
trusted library allocation
page read and write
7FFD24710000
trusted library allocation
page read and write
4AF0000
direct allocation
page read and write
F87000
unkown
page execute and read and write
3DFF000
stack
page read and write
954000
heap
page read and write
954000
heap
page read and write
3A8F000
stack
page read and write
49E0000
direct allocation
page read and write
CE4000
unkown
page execute and read and write
369E000
stack
page read and write
2C30000
direct allocation
page read and write
3FCE000
stack
page read and write
5430000
direct allocation
page execute and read and write
49F1000
heap
page read and write
1497000
heap
page read and write
BE1000
heap
page read and write
3CCE000
stack
page read and write
49E0000
direct allocation
page read and write
4991000
heap
page read and write
4871000
heap
page read and write
DF4000
heap
page read and write
D50000
heap
page read and write
B80000
heap
page read and write
2DBE000
stack
page read and write
C64000
heap
page read and write
7C0000
heap
page read and write
54B0000
direct allocation
page execute and read and write
200000
unkown
page readonly
4F00000
direct allocation
page execute and read and write
38FF000
stack
page read and write
7FFD242EC000
trusted library allocation
page execute and read and write
2F8E000
stack
page read and write
402E000
stack
page read and write
28A6D750000
trusted library allocation
page read and write
36CF000
stack
page read and write
3BBE000
stack
page read and write
1E1F2F7F000
heap
page read and write
324F000
stack
page read and write
3DCE000
stack
page read and write
1E1F2EF1000
heap
page read and write
1120000
direct allocation
page read and write
BB4000
heap
page read and write
371F000
stack
page read and write
443F000
stack
page read and write
4B40000
direct allocation
page execute and read and write
BB4000
heap
page read and write
C00000
heap
page read and write
F5A000
unkown
page execute and read and write
2D7F000
stack
page read and write
1E1F2BF0000
heap
page read and write
349F000
stack
page read and write
336E000
stack
page read and write
140F000
stack
page read and write
C64000
heap
page read and write
52C0000
direct allocation
page read and write
4650000
direct allocation
page read and write
4B70000
direct allocation
page execute and read and write
507000
unkown
page execute and read and write
13A0000
direct allocation
page read and write
52D0000
direct allocation
page read and write
2C7E000
stack
page read and write
66D0000
heap
page read and write
4DA000
unkown
page execute and read and write
1E1F2610000
heap
page read and write
1E180086000
trusted library allocation
page read and write
13E0000
heap
page read and write
1E1F2EB8000
heap
page read and write
52B0000
direct allocation
page execute and read and write
B8E000
heap
page read and write
1E18105D000
trusted library allocation
page read and write
49E0000
direct allocation
page read and write
B8D9FDE000
stack
page read and write
CBE000
stack
page read and write
FB4000
heap
page read and write
4C80000
direct allocation
page execute and read and write
1E1F0C78000
heap
page read and write
7FFD244D0000
trusted library allocation
page read and write
33FF000
stack
page read and write
142B000
heap
page read and write
3F0E000
stack
page read and write
4871000
heap
page read and write
4B70000
direct allocation
page execute and read and write
1E181536000
trusted library allocation
page read and write
1E1F2EA0000
heap
page read and write
4B80000
direct allocation
page execute and read and write
BA0000
direct allocation
page read and write
5450000
direct allocation
page execute and read and write
33FE000
stack
page read and write
5450000
direct allocation
page execute and read and write
4B2F000
stack
page read and write
F9D000
unkown
page execute and write copy
475F000
stack
page read and write
4541000
heap
page read and write
B8DA677000
stack
page read and write
7FFD24490000
trusted library allocation
page read and write
5460000
direct allocation
page execute and read and write
1E1F2FC1000
heap
page read and write
C70000
heap
page read and write
378F000
stack
page read and write
348E000
stack
page read and write
1E1F0C74000
heap
page read and write
454E000
stack
page read and write
BB4000
heap
page read and write
3C0E000
stack
page read and write
4E80000
direct allocation
page read and write
357E000
stack
page read and write
313F000
stack
page read and write
F90000
heap
page read and write
1E180DE1000
trusted library allocation
page read and write
35AE000
stack
page read and write
5300000
direct allocation
page execute and read and write
4E20000
direct allocation
page read and write
2C67000
heap
page read and write
4871000
heap
page read and write
540F000
stack
page read and write
CF4000
heap
page read and write
6C4000
unkown
page execute and read and write
6C4000
unkown
page execute and read and write
2B1F000
stack
page read and write
4B90000
direct allocation
page execute and read and write
350E000
stack
page read and write
5010000
direct allocation
page execute and read and write
5460000
direct allocation
page execute and read and write
4871000
heap
page read and write
1E1F0FA0000
heap
page read and write
350F000
stack
page read and write
2C30000
direct allocation
page read and write
44CE000
stack
page read and write
E9F000
stack
page read and write
B07C97E000
stack
page read and write
394F000
stack
page read and write
7FFD24580000
trusted library allocation
page read and write
510000
unkown
page execute and read and write
446F000
stack
page read and write
4541000
heap
page read and write
4B80000
direct allocation
page execute and read and write
9F974ED000
stack
page read and write
26B000
unkown
page execute and read and write
134F000
stack
page read and write
7FFD245F8000
trusted library allocation
page read and write
1314000
heap
page read and write
4871000
heap
page read and write
472F000
stack
page read and write
54F0000
direct allocation
page execute and read and write
5000000
direct allocation
page execute and read and write
CD0000
direct allocation
page read and write
2D0E000
stack
page read and write
26B000
unkown
page execute and read and write
20C0A670000
heap
page read and write
3DFE000
stack
page read and write
954000
heap
page read and write
BB4000
heap
page read and write
FA0000
direct allocation
page read and write
4871000
heap
page read and write
491F000
stack
page read and write
399F000
stack
page read and write
7FFD2444A000
trusted library allocation
page read and write
201000
unkown
page execute and write copy
4871000
heap
page read and write
1E1F2C3B000
heap
page read and write
2B5E000
stack
page read and write
3C2E000
stack
page read and write
44EE000
stack
page read and write
663F000
stack
page read and write
4650000
direct allocation
page read and write
3D2E000
stack
page read and write
3EAF000
stack
page read and write
5060000
direct allocation
page execute and read and write
1414000
heap
page read and write
50C0000
direct allocation
page execute and read and write
7FFD24290000
trusted library allocation
page read and write
34FF000
stack
page read and write
123C000
stack
page read and write
4871000
heap
page read and write
DF4000
heap
page read and write
304E000
stack
page read and write
6A3E000
stack
page read and write
DF4000
heap
page read and write
1170000
heap
page read and write
172E000
stack
page read and write
1E1F2EDC000
heap
page read and write
13B0000
heap
page read and write
4F60000
direct allocation
page execute and read and write
FA0000
direct allocation
page read and write
FB4000
heap
page read and write
1E181865000
trusted library allocation
page read and write
4B70000
direct allocation
page execute and read and write
507000
unkown
page execute and read and write
4BF0000
direct allocation
page execute and read and write
6C4000
unkown
page execute and read and write
4871000
heap
page read and write
3AEE000
stack
page read and write
7FFD24630000
trusted library allocation
page read and write
51D000
unkown
page execute and write copy
50B0000
direct allocation
page execute and read and write
2F6F000
stack
page read and write
5480000
direct allocation
page execute and read and write
147E000
stack
page read and write
CD0000
direct allocation
page read and write
7FFD24690000
trusted library allocation
page read and write
4541000
heap
page read and write
137F000
stack
page read and write
4871000
heap
page read and write
4871000
heap
page read and write
384E000
stack
page read and write
49E0000
direct allocation
page read and write
321F000
stack
page read and write
3F1F000
stack
page read and write
FA0000
direct allocation
page read and write
382E000
stack
page read and write
1070000
heap
page read and write
125C000
stack
page read and write
BB4000
heap
page read and write
4541000
heap
page read and write
444E000
stack
page read and write
269000
unkown
page write copy
50F0000
direct allocation
page read and write
D94000
heap
page read and write
5140000
direct allocation
page execute and read and write
43FF000
stack
page read and write
2C30000
direct allocation
page read and write
1E181C28000
trusted library allocation
page read and write
B8DB44E000
stack
page read and write
FCF000
stack
page read and write
4B9F000
stack
page read and write
51D000
unkown
page execute and read and write
F34000
heap
page read and write
1414000
heap
page read and write
2C30000
direct allocation
page read and write
351F000
stack
page read and write
13A0000
direct allocation
page read and write
50F0000
direct allocation
page read and write
BFC000
heap
page read and write
4C71000
heap
page read and write
3190000
heap
page read and write
4871000
heap
page read and write
954000
heap
page read and write
4E41000
heap
page read and write
3C8D000
stack
page read and write
1E1F2DC0000
heap
page read and write
269000
unkown
page read and write
4B40000
direct allocation
page execute and read and write
15BF000
stack
page read and write
4990000
trusted library allocation
page read and write
1E1F0C41000
heap
page read and write
269000
unkown
page read and write
13A0000
direct allocation
page read and write
4650000
direct allocation
page read and write
51D000
unkown
page execute and write copy
9F975FF000
unkown
page read and write
3C9E000
stack
page read and write
1E1F0C8E000
heap
page read and write
3C6E000
stack
page read and write
4E20000
direct allocation
page read and write
507000
unkown
page execute and read and write
29A0000
heap
page read and write
CF0000
heap
page read and write
49F1000
heap
page read and write
186F000
stack
page read and write
A6E000
stack
page read and write
F34000
heap
page read and write
1414000
heap
page read and write
4871000
heap
page read and write
2D0F000
stack
page read and write
B76000
heap
page read and write
293F000
stack
page read and write
1E1F0C7A000
heap
page read and write
4C80000
direct allocation
page execute and read and write
BF7000
heap
page read and write
63BF000
stack
page read and write
B8DA777000
stack
page read and write
F34000
heap
page read and write
33AE000
stack
page read and write
20C0A850000
heap
page read and write
6C6000
unkown
page execute and write copy
4541000
heap
page read and write
1E181534000
trusted library allocation
page read and write
4E80000
direct allocation
page read and write
30AE000
stack
page read and write
4871000
heap
page read and write
50C0000
direct allocation
page execute and read and write
3027000
heap
page read and write
4C80000
direct allocation
page execute and read and write
4E41000
heap
page read and write
BBB000
heap
page read and write
D94000
heap
page read and write
13D4000
heap
page read and write
4E20000
direct allocation
page read and write
4650000
direct allocation
page read and write
3E6F000
stack
page read and write
32CE000
stack
page read and write
1050000
heap
page read and write
311E000
stack
page read and write
355E000
stack
page read and write
9F974FE000
stack
page read and write
1E18150A000
trusted library allocation
page read and write
200000
unkown
page readonly
CD0000
direct allocation
page read and write
B8E000
heap
page read and write
4A2E000
stack
page read and write
CF0000
heap
page read and write
510000
unkown
page execute and read and write
954000
heap
page read and write
4E40000
heap
page read and write
B2C000
stack
page read and write
FA0000
direct allocation
page read and write
385F000
stack
page read and write
26B000
unkown
page execute and read and write
6C6000
unkown
page execute and write copy
BA0000
direct allocation
page read and write
C64000
heap
page read and write
7FFD245FC000
trusted library allocation
page read and write
2F6F000
stack
page read and write
4551000
heap
page read and write
45EE000
stack
page read and write
51D000
unkown
page execute and write copy
453F000
stack
page read and write
507000
unkown
page execute and read and write
1E181819000
trusted library allocation
page read and write
1E1F2C7A000
heap
page read and write
5450000
direct allocation
page execute and read and write
468F000
stack
page read and write
4871000
heap
page read and write
BA0000
direct allocation
page read and write
BE1000
heap
page read and write
415E000
stack
page read and write
BE7000
heap
page read and write
29B0000
heap
page read and write
BB4000
heap
page read and write
2D5B000
stack
page read and write
368E000
stack
page read and write
954000
heap
page read and write
4540000
direct allocation
page read and write
C80000
unkown
page readonly
41CE000
stack
page read and write
7FFD245E9000
trusted library allocation
page read and write
13D4000
heap
page read and write
3A4E000
stack
page read and write
306F000
stack
page read and write
20C08ADF000
heap
page read and write
BAC000
heap
page read and write
DF4000
heap
page read and write
200000
unkown
page read and write
4871000
heap
page read and write
66C1000
heap
page read and write
1E1F0BA0000
heap
page read and write
B07CBFC000
stack
page read and write
3D6F000
stack
page read and write
5470000
direct allocation
page execute and read and write
4871000
heap
page read and write
479E000
stack
page read and write
3F0F000
stack
page read and write
4B2F000
stack
page read and write
84FB000
stack
page read and write
653E000
stack
page read and write
B8DA7FE000
stack
page read and write
B8DA5F9000
stack
page read and write
BE1000
heap
page read and write
BCB000
heap
page read and write
4C71000
heap
page read and write
BAB000
heap
page read and write
C64000
heap
page read and write
2C60000
heap
page read and write
1E1F2760000
heap
page execute and read and write
954000
heap
page read and write
1314000
heap
page read and write
4871000
heap
page read and write
C00000
heap
page read and write
B8DA2FF000
stack
page read and write
33CF000
stack
page read and write
BB1000
heap
page read and write
201000
unkown
page execute and write copy
7DF46C7B0000
trusted library allocation
page execute and read and write
954000
heap
page read and write
20C08950000
heap
page read and write
CF4000
heap
page read and write
33CE000
stack
page read and write
1E1F2FAC000
heap
page read and write
50F0000
direct allocation
page execute and read and write
510000
unkown
page execute and read and write
363F000
stack
page read and write
293C000
stack
page read and write
4540000
direct allocation
page read and write
4C6F000
stack
page read and write
4E30000
heap
page read and write
FA0000
direct allocation
page read and write
28A6D68A000
heap
page read and write
49E0000
direct allocation
page read and write
52A0000
direct allocation
page execute and read and write
BCB000
heap
page read and write
458E000
stack
page read and write
2A3F000
stack
page read and write
124F000
stack
page read and write
269000
unkown
page write copy
4871000
heap
page read and write
BD0000
heap
page read and write
31A0000
direct allocation
page read and write
49A0000
trusted library allocation
page read and write
B8D9F13000
stack
page read and write
6C4000
unkown
page execute and read and write
3A7E000
stack
page read and write
108A000
heap
page read and write
954000
heap
page read and write
954000
heap
page read and write
2D40000
direct allocation
page read and write
5490000
direct allocation
page execute and read and write
507000
unkown
page execute and read and write
386E000
stack
page read and write
FA0000
direct allocation
page read and write
1414000
heap
page read and write
4871000
heap
page read and write
D0E000
stack
page read and write
44DF000
stack
page read and write
1314000
heap
page read and write
408E000
stack
page read and write
7FFD246F0000
trusted library allocation
page read and write
14AB000
heap
page read and write
49E0000
direct allocation
page read and write
954000
heap
page read and write
BA0000
direct allocation
page read and write
380F000
stack
page read and write
403F000
stack
page read and write
4871000
heap
page read and write
2E5F000
stack
page read and write
2C50000
direct allocation
page read and write
6C6000
unkown
page execute and write copy
2C10000
heap
page read and write
5040000
direct allocation
page execute and read and write
51E000
unkown
page execute and write copy
D5B000
heap
page read and write
42FE000
stack
page read and write
BB4000
heap
page read and write
2FCF000
stack
page read and write
7FFD246C0000
trusted library allocation
page read and write
4871000
heap
page read and write
45AF000
stack
page read and write
1E1F2AEE000
heap
page read and write
26B000
unkown
page execute and read and write
5280000
direct allocation
page execute and read and write
4B70000
direct allocation
page execute and read and write
510000
unkown
page execute and read and write
4871000
heap
page read and write
3A3E000
stack
page read and write
F70000
heap
page read and write
3BAF000
stack
page read and write
43AF000
stack
page read and write
269000
unkown
page read and write
330F000
stack
page read and write
305E000
stack
page read and write
356F000
stack
page read and write
FB4000
heap
page read and write
315F000
stack
page read and write
1E1902F2000
trusted library allocation
page read and write
51D000
unkown
page execute and write copy
45CF000
stack
page read and write
7FFD242AB000
trusted library allocation
page read and write
13D4000
heap
page read and write
1E1F2F75000
heap
page read and write
48DE000
stack
page read and write
3FC000
unkown
page execute and read and write
4ED0000
direct allocation
page execute and read and write
693D000
stack
page read and write
5070000
direct allocation
page execute and read and write
C64000
heap
page read and write
1147000
heap
page read and write
954000
heap
page read and write
28A6F4F9000
heap
page read and write
51D000
unkown
page execute and read and write
5270000
direct allocation
page execute and read and write
2F9F000
stack
page read and write
332F000
stack
page read and write
461F000
stack
page read and write
954000
heap
page read and write
400F000
stack
page read and write
513E000
stack
page read and write
954000
heap
page read and write
D94000
heap
page read and write
4871000
heap
page read and write
28A6D760000
heap
page read and write
F34000
heap
page read and write
BEB000
heap
page read and write
7FFD24430000
trusted library allocation
page read and write
49E0000
direct allocation
page read and write
5460000
direct allocation
page execute and read and write
3CDE000
stack
page read and write
7F0000
heap
page read and write
1E1F0C00000
heap
page read and write
462F000
stack
page read and write
33BF000
stack
page read and write
52D0000
direct allocation
page read and write
4E1F000
stack
page read and write
BE3000
heap
page read and write
376E000
stack
page read and write
4871000
heap
page read and write
CD0000
direct allocation
page read and write
28A6D7D0000
heap
page read and write
5440000
direct allocation
page execute and read and write
42BF000
stack
page read and write
4871000
heap
page read and write
BB4000
heap
page read and write
2D40000
direct allocation
page read and write
49EF000
stack
page read and write
1E1F2790000
heap
page read and write
346E000
stack
page read and write
4DA000
unkown
page execute and read and write
5450000
direct allocation
page execute and read and write
4FB0000
direct allocation
page execute and read and write
420F000
stack
page read and write
405F000
stack
page read and write
BB4000
heap
page read and write
29CB000
stack
page read and write
30EE000
stack
page read and write
CF4000
heap
page read and write
3C7E000
stack
page read and write
1E1F2BF7000
heap
page read and write
328E000
stack
page read and write
CD0000
direct allocation
page read and write
4541000
heap
page read and write
26B000
unkown
page execute and read and write
4871000
heap
page read and write
1E1F2650000
trusted library allocation
page read and write
5163000
direct allocation
page read and write
34CF000
stack
page read and write
7FFD245A0000
trusted library allocation
page read and write
51D000
unkown
page execute and write copy
2BEF000
stack
page read and write
32BF000
stack
page read and write
4871000
heap
page read and write
7DF46C7D0000
trusted library allocation
page execute and read and write
13A0000
direct allocation
page read and write
F9E000
unkown
page execute and write copy
2ACF000
stack
page read and write
436F000
stack
page read and write
454F000
stack
page read and write
3F8E000
stack
page read and write
6C4000
unkown
page execute and read and write
BB4000
heap
page read and write
1E1F2D10000
trusted library allocation
page read and write
FB4000
heap
page read and write
2D40000
direct allocation
page read and write
3FAE000
stack
page read and write
3FC000
unkown
page execute and read and write
5290000
direct allocation
page execute and read and write
2837000
heap
page read and write
7FFD24670000
trusted library allocation
page read and write
418F000
stack
page read and write
49E0000
direct allocation
page read and write
13D4000
heap
page read and write
269000
unkown
page read and write
7FFD24640000
trusted library allocation
page read and write
4871000
heap
page read and write
B8DB3CF000
stack
page read and write
7FFD245E0000
trusted library allocation
page read and write
465E000
stack
page read and write
2C3F000
stack
page read and write
CF4000
heap
page read and write
2C17000
heap
page read and write
51D000
unkown
page execute and write copy
7FFD24590000
trusted library allocation
page read and write
50E0000
direct allocation
page execute and read and write
3AAF000
stack
page read and write
5260000
direct allocation
page execute and read and write
C0D000
heap
page read and write
3F6F000
stack
page read and write
1E181561000
trusted library allocation
page read and write
2D2E000
stack
page read and write
1E1F2F43000
heap
page read and write
38BF000
stack
page read and write
3B4E000
stack
page read and write
3CEF000
stack
page read and write
3E1E000
stack
page read and write
F3F000
stack
page read and write
36EE000
stack
page read and write
317E000
stack
page read and write
28A6D6A0000
trusted library allocation
page read and write
1E1F25E0000
trusted library allocation
page read and write
51E000
unkown
page execute and write copy
439F000
stack
page read and write
1E181506000
trusted library allocation
page read and write
4B70000
direct allocation
page execute and read and write
301E000
stack
page read and write
430E000
stack
page read and write
6290000
heap
page read and write
1E1F2DD2000
heap
page read and write
4650000
direct allocation
page read and write
4541000
heap
page read and write
201000
unkown
page execute and write copy
5010000
heap
page read and write
1414000
heap
page read and write
32EF000
stack
page read and write
58B000
stack
page read and write
54E0000
direct allocation
page execute and read and write
4871000
heap
page read and write
4E40000
heap
page read and write
344F000
stack
page read and write
28A6D6A0000
trusted library allocation
page read and write
2D40000
direct allocation
page read and write
3FDF000
stack
page read and write
C60000
heap
page read and write
4871000
heap
page read and write
6800000
heap
page read and write
28A6D4F0000
heap
page read and write
CF4000
heap
page read and write
4A2E000
stack
page read and write
4871000
heap
page read and write
4871000
heap
page read and write
10EF000
stack
page read and write
392F000
stack
page read and write
32BE000
stack
page read and write
474E000
stack
page read and write
1390000
heap
page read and write
31A0000
direct allocation
page read and write
4FD0000
direct allocation
page execute and read and write
4F10000
direct allocation
page execute and read and write
4650000
direct allocation
page read and write
B94000
heap
page read and write
B07C9FB000
stack
page read and write
F34000
heap
page read and write
1420000
heap
page read and write
1314000
heap
page read and write
4871000
heap
page read and write
28A6D5C9000
heap
page read and write
29DF000
stack
page read and write
5110000
direct allocation
page execute and read and write
3D4E000
stack
page read and write
51E000
unkown
page execute and write copy
51D000
unkown
page execute and read and write
2D9F000
stack
page read and write
FA0000
heap
page read and write
14BF000
stack
page read and write
4C90000
direct allocation
page execute and read and write
2D40000
direct allocation
page read and write
201000
unkown
page execute and write copy
37CE000
stack
page read and write
117B000
heap
page read and write
433E000
stack
page read and write
4871000
heap
page read and write
1414000
heap
page read and write
F3E000
stack
page read and write
13A0000
direct allocation
page read and write
507000
unkown
page execute and read and write
51D000
unkown
page execute and write copy
E7C000
unkown
page execute and read and write
6C4000
unkown
page execute and read and write
954000
heap
page read and write
304E000
stack
page read and write
B07C5E6000
stack
page read and write
1E1F2C04000
heap
page read and write
CF4000
heap
page read and write
1E190300000
trusted library allocation
page read and write
B6D000
stack
page read and write
BA0000
direct allocation
page read and write
4F30000
direct allocation
page read and write
4541000
heap
page read and write
40AF000
stack
page read and write
2C50000
direct allocation
page read and write
7FFD246E0000
trusted library allocation
page read and write
364F000
stack
page read and write
7FFD24293000
trusted library allocation
page execute and read and write
341E000
stack
page read and write
1E18189E000
trusted library allocation
page read and write
5280000
direct allocation
page execute and read and write
498F000
stack
page read and write
4871000
heap
page read and write
4E31000
heap
page read and write
1E1F0BC0000
heap
page read and write
11D0000
heap
page read and write
EFD000
stack
page read and write
1E1F2F09000
heap
page read and write
1E190021000
trusted library allocation
page read and write
3A6F000
stack
page read and write
2EFE000
stack
page read and write
7FFD24340000
trusted library allocation
page read and write
41BE000
stack
page read and write
48EE000
stack
page read and write
5030000
direct allocation
page execute and read and write
31A0000
direct allocation
page read and write
5010000
direct allocation
page execute and read and write
1E1F2600000
trusted library allocation
page read and write
510000
unkown
page execute and read and write
BB4000
heap
page read and write
50C0000
direct allocation
page execute and read and write
200000
unkown
page read and write
3BEE000
stack
page read and write
200000
unkown
page readonly
28A6D770000
trusted library allocation
page read and write
31A0000
direct allocation
page read and write
34AF000
stack
page read and write
507000
unkown
page execute and read and write
36BE000
stack
page read and write
2D1F000
stack
page read and write
3D8E000
stack
page read and write
4661000
heap
page read and write
7FFD245E4000
trusted library allocation
page read and write
49E0000
direct allocation
page read and write
310F000
stack
page read and write
4AAF000
stack
page read and write
364E000
stack
page read and write
51E000
unkown
page execute and write copy
B07C8FE000
stack
page read and write
BA0000
direct allocation
page read and write
2F9F000
stack
page read and write
10CE000
stack
page read and write
3B3F000
stack
page read and write
9F976FF000
stack
page read and write
27AB000
stack
page read and write
4550000
heap
page read and write
20C08AA5000
heap
page read and write
54B0000
direct allocation
page execute and read and write
5450000
direct allocation
page execute and read and write
4B40000
direct allocation
page execute and read and write
3A3F000
stack
page read and write
4871000
heap
page read and write
50A0000
direct allocation
page execute and read and write
13A0000
direct allocation
page read and write
3070000
heap
page read and write
3D2F000
stack
page read and write
4871000
heap
page read and write
51E000
unkown
page execute and write copy
4BB0000
direct allocation
page execute and read and write
49E0000
direct allocation
page read and write
13A0000
direct allocation
page read and write
37FE000
stack
page read and write
31A0000
direct allocation
page read and write
BB4000
heap
page read and write
3F4E000
stack
page read and write
BB4000
heap
page read and write
2FDE000
stack
page read and write
2CAE000
stack
page read and write
BA0000
direct allocation
page read and write
4F59000
stack
page read and write
3FEE000
stack
page read and write
39AE000
stack
page read and write
47AE000
stack
page read and write
462E000
stack
page read and write
201000
unkown
page execute and write copy
FDA000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
3EAE000
stack
page read and write
3FC000
unkown
page execute and read and write
3B0F000
stack
page read and write
3DDF000
stack
page read and write
3B4F000
stack
page read and write
13A0000
heap
page read and write
4B50000
direct allocation
page execute and read and write
40ED000
stack
page read and write
436E000
stack
page read and write
2E6F000
stack
page read and write
2E9E000
stack
page read and write
325E000
stack
page read and write
841C000
stack
page read and write
425F000
stack
page read and write
4AB0000
heap
page read and write
4B70000
direct allocation
page execute and read and write
3ECF000
stack
page read and write
200000
unkown
page readonly
470F000
stack
page read and write
7FFD24660000
trusted library allocation
page read and write
4871000
heap
page read and write
4DA000
unkown
page execute and read and write
3A5E000
stack
page read and write
3BEF000
stack
page read and write
4871000
heap
page read and write
4871000
heap
page read and write
3FAF000
stack
page read and write
269000
unkown
page write copy
452E000
stack
page read and write
4E31000
heap
page read and write
28A6F4C0000
heap
page read and write
954000
heap
page read and write
541F000
stack
page read and write
54D0000
direct allocation
page execute and read and write
BA6000
heap
page read and write
6C6000
unkown
page execute and write copy
314F000
stack
page read and write
F34000
heap
page read and write
3E3E000
stack
page read and write
264000
unkown
page execute and read and write
F34000
heap
page read and write
367F000
stack
page read and write
327F000
stack
page read and write
AAE000
stack
page read and write
4AB1000
heap
page read and write
B8DA6FD000
stack
page read and write
28DF000
stack
page read and write
954000
heap
page read and write
4E70000
direct allocation
page execute and read and write
D94000
heap
page read and write
4871000
heap
page read and write
4871000
heap
page read and write
5250000
direct allocation
page execute and read and write
B8DA8FC000
stack
page read and write
445E000
stack
page read and write
322E000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
4540000
direct allocation
page read and write
6C4000
unkown
page execute and read and write
12CF000
stack
page read and write
407F000
stack
page read and write
4CFF000
stack
page read and write
1120000
direct allocation
page read and write
4650000
direct allocation
page read and write
51E000
unkown
page execute and write copy
308F000
stack
page read and write
4A5F000
stack
page read and write
370E000
stack
page read and write
4871000
heap
page read and write
D90000
heap
page read and write
2D8E000
stack
page read and write
4871000
heap
page read and write
F34000
heap
page read and write
393E000
stack
page read and write
EF0000
heap
page read and write
39DE000
stack
page read and write
201000
unkown
page execute and write copy
FB0000
heap
page read and write
4540000
direct allocation
page read and write
51D000
unkown
page execute and read and write
D80000
heap
page read and write
1E1F0CBB000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
954000
heap
page read and write
49E0000
direct allocation
page read and write
3DAE000
stack
page read and write
1420000
heap
page read and write
2DDE000
stack
page read and write
1E18154A000
trusted library allocation
page read and write
2C0F000
stack
page read and write
269000
unkown
page read and write
4F60000
direct allocation
page execute and read and write
5010000
direct allocation
page execute and read and write
4871000
heap
page read and write
BCB000
heap
page read and write
BB4000
heap
page read and write
4540000
direct allocation
page read and write
13D4000
heap
page read and write
954000
heap
page read and write
3ACE000
stack
page read and write
D94000
heap
page read and write
507000
unkown
page execute and read and write
4871000
heap
page read and write
495E000
stack
page read and write
4F7E000
stack
page read and write
35EF000
stack
page read and write
4871000
heap
page read and write
264000
unkown
page execute and read and write
312F000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
7FFD244C0000
trusted library allocation
page read and write
3C2F000
stack
page read and write
CC0000
heap
page read and write
1E1F25C0000
trusted library allocation
page read and write
27EE000
stack
page read and write
1E18158D000
trusted library allocation
page read and write
44AF000
stack
page read and write
2D40000
direct allocation
page read and write
D87000
heap
page read and write
954000
heap
page read and write
26B000
unkown
page execute and read and write
4541000
heap
page read and write
4E20000
direct allocation
page read and write
31A0000
direct allocation
page read and write
342F000
stack
page read and write
FA0000
direct allocation
page read and write
4871000
heap
page read and write
BEB000
heap
page read and write
FB4000
heap
page read and write
484F000
stack
page read and write
954000
heap
page read and write
7FFD24450000
trusted library allocation
page execute and read and write
3E6E000
stack
page read and write
300E000
stack
page read and write
269000
unkown
page read and write
2E50000
heap
page read and write
2B0E000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
31B7000
heap
page read and write
3AAE000
stack
page read and write
2A1E000
stack
page read and write
2D30000
heap
page read and write
30CE000
stack
page read and write
C00000
heap
page read and write
50C0000
direct allocation
page execute and read and write
35DF000
stack
page read and write
4541000
heap
page read and write
7FFD24600000
trusted library allocation
page read and write
34EE000
stack
page read and write
52C0000
direct allocation
page read and write
2C4E000
stack
page read and write
48AF000
stack
page read and write
1E1F0D24000
heap
page read and write
C0D000
heap
page read and write
269000
unkown
page write copy
103F000
stack
page read and write
5270000
trusted library allocation
page read and write
7FFD24292000
trusted library allocation
page read and write
CF4000
heap
page read and write
4B6E000
stack
page read and write
46DE000
stack
page read and write
7FFD24530000
trusted library allocation
page read and write
1360000
heap
page read and write
28A6D7D5000
heap
page read and write
9F979FF000
stack
page read and write
510000
unkown
page execute and read and write
32DE000
stack
page read and write
49E0000
direct allocation
page read and write
4C50000
direct allocation
page execute and read and write
FB4000
heap
page read and write
3B7E000
stack
page read and write
3B1E000
stack
page read and write
4560000
heap
page read and write
B30000
heap
page read and write
372E000
stack
page read and write
F30000
heap
page read and write
4871000
heap
page read and write
4871000
heap
page read and write
4E70000
direct allocation
page execute and read and write
8600000
heap
page read and write
31EE000
stack
page read and write
DF4000
heap
page read and write
1E1F2D20000
heap
page execute and read and write
4CB0000
direct allocation
page execute and read and write
49AE000
stack
page read and write
C64000
heap
page read and write
176F000
stack
page read and write
5050000
direct allocation
page execute and read and write
F9D000
unkown
page execute and read and write
2C30000
direct allocation
page read and write
5480000
direct allocation
page execute and read and write
269000
unkown
page read and write
FB4000
heap
page read and write
BB4000
heap
page read and write
13D4000
heap
page read and write
4990000
heap
page read and write
4C70000
direct allocation
page execute and read and write
B8DA47E000
stack
page read and write
BFC000
stack
page read and write
954000
heap
page read and write
1E1F25F0000
heap
page readonly
1E181B5F000
trusted library allocation
page read and write
141E000
stack
page read and write
3B5F000
stack
page read and write
C64000
heap
page read and write
431E000
stack
page read and write
31B0000
heap
page read and write
4DA000
unkown
page execute and read and write
D40000
heap
page read and write
4E90000
direct allocation
page execute and read and write
4EA0000
direct allocation
page execute and read and write
4871000
heap
page read and write
7C0000
heap
page read and write
3D9E000
stack
page read and write
4EE0000
direct allocation
page execute and read and write
5150000
direct allocation
page execute and read and write
6C6000
unkown
page execute and write copy
4F30000
direct allocation
page read and write
389E000
stack
page read and write
4B70000
direct allocation
page execute and read and write
1E190079000
trusted library allocation
page read and write
28A6D770000
trusted library allocation
page read and write
390E000
stack
page read and write
4B60000
direct allocation
page execute and read and write
BB4000
heap
page read and write
1120000
direct allocation
page read and write
52C0000
direct allocation
page read and write
1E1F3170000
heap
page read and write
D94000
heap
page read and write
42CE000
stack
page read and write
5014000
heap
page read and write
CF4000
heap
page read and write
4541000
heap
page read and write
4871000
heap
page read and write
1E181577000
trusted library allocation
page read and write
5280000
trusted library allocation
page read and write
1E1F2C39000
heap
page read and write
2C30000
direct allocation
page read and write
6C6000
unkown
page execute and write copy
BCB000
heap
page read and write
50C0000
direct allocation
page execute and read and write
62B0000
heap
page read and write
35EE000
stack
page read and write
1E1F0FA5000
heap
page read and write
FB4000
heap
page read and write
4E20000
direct allocation
page read and write
4871000
heap
page read and write
4C80000
direct allocation
page execute and read and write
1E1F2D26000
heap
page execute and read and write
7FFD242B0000
trusted library allocation
page read and write
4871000
heap
page read and write
2D4F000
stack
page read and write
46EF000
stack
page read and write
954000
heap
page read and write
1E1F0B90000
heap
page read and write
49F1000
heap
page read and write
4EF3000
direct allocation
page read and write
5280000
direct allocation
page execute and read and write
4B70000
direct allocation
page execute and read and write
5120000
direct allocation
page execute and read and write
1314000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
410E000
stack
page read and write
422E000
stack
page read and write
4871000
heap
page read and write
2FFF000
stack
page read and write
4A53000
direct allocation
page read and write
13A0000
direct allocation
page read and write
398E000
stack
page read and write
42DF000
stack
page read and write
50A0000
direct allocation
page execute and read and write
4A9E000
stack
page read and write
201000
unkown
page execute and write copy
346F000
stack
page read and write
4871000
heap
page read and write
318E000
stack
page read and write
1314000
heap
page read and write
404E000
stack
page read and write
13A0000
direct allocation
page read and write
3EFF000
stack
page read and write
4E20000
direct allocation
page read and write
CD0000
direct allocation
page read and write
7FFD24550000
trusted library allocation
page read and write
C64000
heap
page read and write
426F000
stack
page read and write
13A0000
direct allocation
page read and write
3C5E000
stack
page read and write
146F000
stack
page read and write
FA0000
direct allocation
page read and write
314E000
stack
page read and write
52E0000
direct allocation
page execute and read and write
4871000
heap
page read and write
7FFD243B0000
trusted library allocation
page execute and read and write
BF2000
heap
page read and write
7FFD244E0000
trusted library allocation
page read and write
49E0000
direct allocation
page read and write
7FFD24460000
trusted library allocation
page execute and read and write
C80000
unkown
page read and write
4B70000
direct allocation
page execute and read and write
4690000
heap
page read and write
264000
unkown
page execute and read and write
4B70000
direct allocation
page execute and read and write
6A7B000
stack
page read and write
4991000
heap
page read and write
3FEF000
stack
page read and write
2D6F000
stack
page read and write
3E9F000
stack
page read and write
3F5E000
stack
page read and write
4871000
heap
page read and write
1E18151E000
trusted library allocation
page read and write
497E000
stack
page read and write
954000
heap
page read and write
4871000
heap
page read and write
200000
unkown
page read and write
4871000
heap
page read and write
5460000
direct allocation
page execute and read and write
627E000
stack
page read and write
41EF000
stack
page read and write
4B70000
direct allocation
page execute and read and write
B3E000
stack
page read and write
4871000
heap
page read and write
20C08A30000
heap
page read and write
B5F000
heap
page read and write
1E18162E000
trusted library allocation
page read and write
52D0000
direct allocation
page execute and read and write
1E1F2720000
heap
page execute and read and write
418E000
stack
page read and write
4541000
heap
page read and write
DF4000
heap
page read and write
4C3F000
stack
page read and write
343E000
stack
page read and write
3FC000
unkown
page execute and read and write
4871000
heap
page read and write
4871000
heap
page read and write
4CDF000
stack
page read and write
450F000
stack
page read and write
2D67000
heap
page read and write
416E000
stack
page read and write
41FE000
stack
page read and write
2E6F000
stack
page read and write
B8DA87F000
stack
page read and write
6C6000
unkown
page execute and write copy
472E000
stack
page read and write
D94000
heap
page read and write
4871000
heap
page read and write
4A53000
direct allocation
page read and write
BE1000
heap
page read and write
5010000
direct allocation
page execute and read and write
20C0A4D0000
heap
page read and write
DF4000
heap
page read and write
4B60000
direct allocation
page execute and read and write
5450000
direct allocation
page execute and read and write
5F0000
heap
page read and write
358F000
stack
page read and write
1E180001000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
269000
unkown
page write copy
1E181579000
trusted library allocation
page read and write
45BE000
stack
page read and write
7FFD24294000
trusted library allocation
page read and write
3FC000
unkown
page execute and read and write
BFC000
heap
page read and write
2D60000
heap
page read and write
13D4000
heap
page read and write
426E000
stack
page read and write
455F000
stack
page read and write
51D000
unkown
page execute and read and write
1146000
unkown
page execute and write copy
5280000
direct allocation
page execute and read and write
20C08AB7000
heap
page read and write
5470000
direct allocation
page execute and read and write
4871000
heap
page read and write
4650000
direct allocation
page read and write
A6C000
stack
page read and write
BA0000
direct allocation
page read and write
4650000
direct allocation
page read and write
13A0000
direct allocation
page read and write
3D0F000
stack
page read and write
7FFD2434C000
trusted library allocation
page execute and read and write
954000
heap
page read and write
4B2F000
stack
page read and write
4D10000
direct allocation
page execute and read and write
2C50000
direct allocation
page read and write
C0E000
stack
page read and write
401E000
stack
page read and write
F90000
unkown
page execute and read and write
4E60000
direct allocation
page execute and read and write
31CF000
stack
page read and write
62B6000
heap
page read and write
49E0000
direct allocation
page read and write
264000
unkown
page execute and read and write
4E73000
direct allocation
page read and write
1E1F2CCD000
heap
page read and write
4871000
heap
page read and write
1E1F0CB7000
heap
page read and write
7FFD244F0000
trusted library allocation
page read and write
1E181563000
trusted library allocation
page read and write
BA0000
direct allocation
page read and write
4CC0000
direct allocation
page execute and read and write
BB4000
heap
page read and write
2D40000
direct allocation
page read and write
FC0000
heap
page read and write
DF4000
heap
page read and write
4D00000
direct allocation
page execute and read and write
3E0E000
stack
page read and write
4871000
heap
page read and write
3F7E000
stack
page read and write
424E000
stack
page read and write
386F000
stack
page read and write
FB4000
heap
page read and write
62B5000
heap
page read and write
38AE000
stack
page read and write
45EF000
stack
page read and write
412F000
stack
page read and write
4BF0000
direct allocation
page execute and read and write
4F60000
direct allocation
page execute and read and write
13D0000
heap
page read and write
4DA000
unkown
page execute and read and write
4650000
direct allocation
page read and write
B07C87D000
stack
page read and write
26B000
unkown
page execute and read and write
51E000
unkown
page execute and write copy
486F000
stack
page read and write
4E70000
direct allocation
page execute and read and write
CD0000
direct allocation
page read and write
20C08A50000
heap
page read and write
BA0000
direct allocation
page read and write
3F3E000
stack
page read and write
B7E000
stack
page read and write
49E0000
direct allocation
page read and write
46BF000
stack
page read and write
4871000
heap
page read and write
33DF000
stack
page read and write
C0E000
heap
page read and write
DF4000
heap
page read and write
4871000
heap
page read and write
32FE000
stack
page read and write
13BE000
stack
page read and write
7FFD245F0000
trusted library allocation
page read and write
4E41000
heap
page read and write
1E190031000
trusted library allocation
page read and write
412E000
stack
page read and write
CD0000
direct allocation
page read and write
531E000
stack
page read and write
B8F000
heap
page read and write
4D3E000
stack
page read and write
28A6D6A0000
trusted library allocation
page read and write
DF4000
heap
page read and write
4551000
heap
page read and write
C0D000
heap
page read and write
6C4000
unkown
page execute and read and write
4FE0000
direct allocation
page execute and read and write
BCB000
heap
page read and write
4871000
heap
page read and write
44EF000
stack
page read and write
2D40000
direct allocation
page read and write
5460000
direct allocation
page execute and read and write
4AF0000
direct allocation
page read and write
13D4000
heap
page read and write
326E000
stack
page read and write
3C4F000
stack
page read and write
339E000
stack
page read and write
4871000
heap
page read and write
441F000
stack
page read and write
41DE000
stack
page read and write
354E000
stack
page read and write
133D000
stack
page read and write
116D000
stack
page read and write
B8DA97E000
stack
page read and write
3D6E000
stack
page read and write
7FFD24480000
trusted library allocation
page execute and read and write
4D53000
direct allocation
page read and write
DAD000
stack
page read and write
54A0000
direct allocation
page execute and read and write
31A0000
direct allocation
page read and write
50C0000
direct allocation
page execute and read and write
43EE000
stack
page read and write
BB4000
heap
page read and write
107B000
heap
page read and write
360F000
stack
page read and write
38CE000
stack
page read and write
28A6D750000
trusted library allocation
page read and write
3EEE000
stack
page read and write
F34000
heap
page read and write
4B70000
direct allocation
page execute and read and write
D94000
heap
page read and write
F7E000
stack
page read and write
3E4F000
stack
page read and write
510000
unkown
page execute and read and write
D94000
heap
page read and write
476E000
stack
page read and write
318B000
stack
page read and write
336F000
stack
page read and write
4DA000
unkown
page execute and read and write
2C30000
direct allocation
page read and write
CD0000
direct allocation
page read and write
30AF000
stack
page read and write
CF4000
heap
page read and write
954000
heap
page read and write
3B8E000
stack
page read and write
4871000
heap
page read and write
13D4000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
1414000
heap
page read and write
4541000
heap
page read and write
B8D9F9E000
unkown
page read and write
4E30000
trusted library allocation
page read and write
4871000
heap
page read and write
36AF000
stack
page read and write
5500000
direct allocation
page execute and read and write
FB4000
heap
page read and write
954000
heap
page read and write
50F0000
direct allocation
page read and write
EDE000
stack
page read and write
20C08A90000
heap
page read and write
4C60000
direct allocation
page execute and read and write
6C6000
unkown
page execute and write copy
4F60000
direct allocation
page execute and read and write
4E20000
direct allocation
page read and write
954000
heap
page read and write
409E000
stack
page read and write
482F000
stack
page read and write
2B3F000
stack
page read and write
5430000
direct allocation
page execute and read and write
D94000
heap
page read and write
3FC000
unkown
page execute and read and write
4871000
heap
page read and write
F34000
heap
page read and write
954000
heap
page read and write
FA0000
direct allocation
page read and write
BB4000
heap
page read and write
4541000
heap
page read and write
4EF0000
trusted library allocation
page read and write
BA9000
heap
page read and write
4871000
heap
page read and write
D94000
heap
page read and write
4E70000
direct allocation
page execute and read and write
4871000
heap
page read and write
1314000
heap
page read and write
BB4000
heap
page read and write
7DF46C7C0000
trusted library allocation
page execute and read and write
486E000
stack
page read and write
3BCF000
stack
page read and write
4540000
direct allocation
page read and write
4871000
heap
page read and write
507F000
stack
page read and write
51D000
unkown
page execute and write copy
7FFD24346000
trusted library allocation
page read and write
42CF000
stack
page read and write
303E000
stack
page read and write
489F000
stack
page read and write
4AF0000
direct allocation
page read and write
49E0000
direct allocation
page read and write
44AE000
stack
page read and write
7FFD24570000
trusted library allocation
page read and write
367E000
stack
page read and write
50D0000
direct allocation
page execute and read and write
B3E000
heap
page read and write
FA0000
direct allocation
page read and write
BA0000
direct allocation
page read and write
176E000
stack
page read and write
85FC000
stack
page read and write
35CE000
stack
page read and write
5010000
direct allocation
page execute and read and write
31A0000
direct allocation
page read and write
4E20000
direct allocation
page read and write
BEB000
heap
page read and write
269000
unkown
page write copy
4871000
heap
page read and write
7FFD245C0000
trusted library allocation
page read and write
162E000
stack
page read and write
282E000
stack
page read and write
20C08AB7000
heap
page read and write
4C00000
direct allocation
page execute and read and write
49F0000
heap
page read and write
5420000
direct allocation
page execute and read and write
374F000
stack
page read and write
BE0000
heap
page read and write
F0A000
heap
page read and write
451E000
stack
page read and write
4F90000
direct allocation
page execute and read and write
31A0000
direct allocation
page read and write
51D000
unkown
page execute and read and write
4CF0000
direct allocation
page execute and read and write
AFD000
stack
page read and write
1150000
direct allocation
page execute and read and write
1E1F2F98000
heap
page read and write
1314000
heap
page read and write
1E1902F8000
trusted library allocation
page read and write
481E000
stack
page read and write
20C08AB7000
heap
page read and write
396F000
stack
page read and write
3D5F000
stack
page read and write
440F000
stack
page read and write
4FF0000
direct allocation
page execute and read and write
C64000
heap
page read and write
39CF000
stack
page read and write
301F000
stack
page read and write
7FFD24650000
trusted library allocation
page read and write
4BD0000
direct allocation
page execute and read and write
264000
unkown
page execute and read and write
4540000
direct allocation
page read and write
269000
unkown
page write copy
1414000
heap
page read and write
14A0000
heap
page read and write
3E2F000
stack
page read and write
1E1815D7000
trusted library allocation
page read and write
D4E000
stack
page read and write
2C00000
heap
page read and write
4871000
heap
page read and write
414F000
stack
page read and write
1314000
heap
page read and write
C64000
heap
page read and write
7FFD245C3000
trusted library allocation
page read and write
47FF000
stack
page read and write
2830000
heap
page read and write
4871000
heap
page read and write
2D40000
direct allocation
page read and write
4FCF000
stack
page read and write
201000
unkown
page execute and write copy
6C6000
unkown
page execute and write copy
3DCF000
stack
page read and write
4540000
direct allocation
page read and write
2CEE000
stack
page read and write
388F000
stack
page read and write
4E2F000
stack
page read and write
4F30000
direct allocation
page read and write
2BFE000
stack
page read and write
200000
unkown
page readonly
BB4000
heap
page read and write
4871000
heap
page read and write
428F000
stack
page read and write
269000
unkown
page write copy
314F000
stack
page read and write
7FFD24540000
trusted library allocation
page read and write
4871000
heap
page read and write
4991000
heap
page read and write
411E000
stack
page read and write
4871000
heap
page read and write
40CF000
stack
page read and write
200000
unkown
page read and write
328F000
stack
page read and write
4B70000
direct allocation
page execute and read and write
7FFD244B0000
trusted library allocation
page read and write
4C80000
direct allocation
page execute and read and write
4DA000
unkown
page execute and read and write
7FFD246D0000
trusted library allocation
page read and write
4EF0000
direct allocation
page execute and read and write
4541000
heap
page read and write
4B70000
direct allocation
page execute and read and write
4661000
heap
page read and write
954000
heap
page read and write
66C0000
heap
page read and write
4DA000
unkown
page execute and read and write
130E000
stack
page read and write
EFB000
heap
page read and write
950000
heap
page read and write
432F000
stack
page read and write
4F50000
direct allocation
page execute and read and write
4B90000
direct allocation
page execute and read and write
7FFD242A0000
trusted library allocation
page read and write
CF4000
heap
page read and write
200000
unkown
page read and write
269000
unkown
page write copy
BF2000
heap
page read and write
269000
unkown
page read and write
5090000
direct allocation
page execute and read and write
4871000
heap
page read and write
50B0000
trusted library allocation
page read and write
4B50000
direct allocation
page execute and read and write
419F000
stack
page read and write
26B000
unkown
page execute and read and write
5450000
direct allocation
page execute and read and write
20C08AD9000
heap
page read and write
4871000
heap
page read and write
353F000
stack
page read and write
C81000
unkown
page execute and write copy
1E1817F4000
trusted library allocation
page read and write
13D4000
heap
page read and write
49E0000
direct allocation
page read and write
EFD000
stack
page read and write
F34000
heap
page read and write
4B50000
direct allocation
page execute and read and write
4871000
heap
page read and write
335F000
stack
page read and write
2C30000
direct allocation
page read and write
300F000
stack
page read and write
DF4000
heap
page read and write
2F4F000
stack
page read and write
1E181C24000
trusted library allocation
page read and write
39AF000
stack
page read and write
5010000
direct allocation
page execute and read and write
3A1F000
stack
page read and write
7FFD24376000
trusted library allocation
page execute and read and write
20C08C10000
heap
page read and write
CD0000
direct allocation
page read and write
375E000
stack
page read and write
429E000
stack
page read and write
2D4F000
stack
page read and write
200000
unkown
page read and write
4880000
heap
page read and write
5333000
direct allocation
page read and write
C64000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
4990000
trusted library allocation
page read and write
377F000
stack
page read and write
900000
heap
page read and write
CF4000
heap
page read and write
1414000
heap
page read and write
7FFD24500000
trusted library allocation
page read and write
3EDE000
stack
page read and write
31AF000
stack
page read and write
4E3F000
stack
page read and write
4CA0000
direct allocation
page execute and read and write
1E181520000
trusted library allocation
page read and write
1E1F0C30000
heap
page read and write
340E000
stack
page read and write
5490000
direct allocation
page execute and read and write
4540000
direct allocation
page read and write
4AB1000
heap
page read and write
4871000
heap
page read and write
11CE000
stack
page read and write
B8DA3F9000
stack
page read and write
64FF000
stack
page read and write
4541000
heap
page read and write
2C2E000
stack
page read and write
D94000
heap
page read and write
460E000
stack
page read and write
510000
unkown
page execute and read and write
31A0000
direct allocation
page read and write
5100000
direct allocation
page execute and read and write
4871000
heap
page read and write
DF4000
heap
page read and write
4B70000
direct allocation
page execute and read and write
200000
unkown
page readonly
CF4000
heap
page read and write
39EE000
stack
page read and write
13D4000
heap
page read and write
14BB000
heap
page read and write
7F0000
heap
page read and write
4871000
heap
page read and write
BFC000
heap
page read and write
4B70000
direct allocation
page execute and read and write
C4E000
stack
page read and write
3FC000
unkown
page execute and read and write
1410000
heap
page read and write
127E000
stack
page read and write
BA0000
direct allocation
page read and write
CD0000
direct allocation
page read and write
1414000
heap
page read and write
FA0000
direct allocation
page read and write
4871000
heap
page read and write
4541000
heap
page read and write
496F000
stack
page read and write
4541000
heap
page read and write
2C5F000
stack
page read and write
2C30000
direct allocation
page read and write
4E70000
direct allocation
page execute and read and write
AEE000
stack
page read and write
38FE000
stack
page read and write
B8DA9FB000
stack
page read and write
4AB1000
heap
page read and write
37DE000
stack
page read and write
1314000
heap
page read and write
365F000
stack
page read and write
13D4000
heap
page read and write
BB4000
heap
page read and write
4871000
heap
page read and write
200000
unkown
page read and write
2E4E000
stack
page read and write
C64000
heap
page read and write
28A6D6A0000
trusted library allocation
page read and write
BF2000
heap
page read and write
264000
unkown
page execute and read and write
353E000
stack
page read and write
4F60000
direct allocation
page execute and read and write
530E000
stack
page read and write
443E000
stack
page read and write
269000
unkown
page read and write
2DEF000
stack
page read and write
51D000
unkown
page execute and read and write
13D4000
heap
page read and write
4B70000
direct allocation
page execute and read and write
42AE000
stack
page read and write
1314000
heap
page read and write
2DAE000
stack
page read and write
2FAE000
stack
page read and write
B07CB7D000
stack
page read and write
5460000
direct allocation
page execute and read and write
106C000
stack
page read and write
3CBF000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
43CF000
stack
page read and write
26B000
unkown
page execute and read and write
28A6D671000
heap
page read and write
4B70000
direct allocation
page execute and read and write
DF4000
heap
page read and write
4871000
heap
page read and write
There are 1927 hidden memdumps, click here to show them.