IOC Report
UeW2b6mU6Z.exe

loading gif

Files

File Path
Type
Category
Malicious
UeW2b6mU6Z.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\amert[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\cred64[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\clip64[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\clip64[2].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\sarra[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\cred64[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000054001\amert.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000055001\bad48ea9ac.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000056001\590971cd60.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\4JKZLoG_AJreMfNRzAg0gnZ.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\4d0ab15804\chrosha.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\aMLtP386CmzygUXw7MGrDsU.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\c1ec479e5342a2\clip64.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\c1ec479e5342a2\cred64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x1335672c, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_590971cd60.exe_149de64985787461d87d0d1efcae31c73651fe_a5a86e23_910ffeb1-ded4-48c0-afeb-48341804a6e8\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_1bf26049f73fda96130f9655cb8501eed2c1a51_71691813_bda1928f-30fd-4554-8fe6-8c6e4b25f618\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2B1D.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 18 21:40:50 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2C28.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2C58.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBAF.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC2D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF604.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 18 21:40:42 2024, 0x1205a4 type
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\_Files_\AIXACVYBSB.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\AIXACVYBSB.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\DTBZGIOOSO.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\KATAXZVCPS.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\NHPKIZUUSG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\VLZDGUKUTZ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\XZXHAVGRAG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\XZXHAVGRAG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1a0sarny.rdp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5jp5wlvf.1yv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cm3kjch4.0nj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gn53rrwp.db0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qruw5gax.olm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_su2c5wrx.vrs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uham2nb2.dib.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v3cinp54.mfn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobebtrs_8Zx22oC\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobebtrs_8Zx22oC\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobebtrs_8Zx22oC\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobeuIh7Ey0HBdjO\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobeuIh7Ey0HBdjO\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobeuIh7Ey0HBdjO\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\heidibtrs_8Zx22oC\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidibtrs_8Zx22oC\0olcqcB29zzZHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\heidibtrs_8Zx22oC\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidibtrs_8Zx22oC\5HPHbOZLhEp1Login Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidibtrs_8Zx22oC\7PxlCnLZPha7History
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidibtrs_8Zx22oC\7R9nGllcZM_sWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidibtrs_8Zx22oC\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidibtrs_8Zx22oC\NiKiztIBQKyrHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\heidibtrs_8Zx22oC\SqkyUMCNLwxxLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidibtrs_8Zx22oC\XBU1iGwN5zycCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\heidibtrs_8Zx22oC\_NQPeWg1oQyKWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidibtrs_8Zx22oC\aKY1hsYwVVg4Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidibtrs_8Zx22oC\h7auhgAcYq9XWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidibtrs_8Zx22oC\hr8FlqzWpm2kWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidibtrs_8Zx22oC\vLQq0Xn3c80rHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidibtrs_8Zx22oC\wreJGDGYe3O5Login Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidibtrs_8Zx22oC\zSDK0bkB71k5Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidiuIh7Ey0HBdjO\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidiuIh7Ey0HBdjO\0S7mryHFOjgYWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidiuIh7Ey0HBdjO\0jSDkr3QBYFlHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\heidiuIh7Ey0HBdjO\2OeNVprmQH8XWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidiuIh7Ey0HBdjO\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidiuIh7Ey0HBdjO\6KMxTjOLfx8RWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidiuIh7Ey0HBdjO\Cbs_zuUKIUdIWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidiuIh7Ey0HBdjO\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidiuIh7Ey0HBdjO\DZEiEHWqD9fCLogin Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidiuIh7Ey0HBdjO\GNx207WTjtbFHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\heidiuIh7Ey0HBdjO\PImqxeZJHwYsLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidiuIh7Ey0HBdjO\XL5RjBEsi8lyWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidiuIh7Ey0HBdjO\X_STjINBgJ4HHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidiuIh7Ey0HBdjO\aEI1BJFrD22tLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidiuIh7Ey0HBdjO\cwR_H7C7b38yCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\heidiuIh7Ey0HBdjO\n9KUN3buEroRHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidiuIh7Ey0HBdjO\pyOtnmuB0byGWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\Tasks\chrosha.job
data
dropped
C:\Windows\Tasks\explorha.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 217
ASCII text, with very long lines (1631)
downloaded
Chrome Cache Entry: 218
ASCII text, with very long lines (467)
downloaded
Chrome Cache Entry: 219
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 220
ASCII text, with very long lines (693)
downloaded
Chrome Cache Entry: 221
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
downloaded
Chrome Cache Entry: 222
ASCII text, with very long lines (775)
downloaded
Chrome Cache Entry: 223
Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
downloaded
Chrome Cache Entry: 224
ASCII text, with very long lines (1299)
downloaded
Chrome Cache Entry: 225
ASCII text, with very long lines (574)
downloaded
Chrome Cache Entry: 226
ASCII text, with very long lines (775)
downloaded
Chrome Cache Entry: 227
ASCII text, with very long lines (405)
downloaded
Chrome Cache Entry: 228
ASCII text, with very long lines (504)
downloaded
Chrome Cache Entry: 229
ASCII text, with very long lines (2362)
downloaded
Chrome Cache Entry: 230
ASCII text, with very long lines (834)
downloaded
Chrome Cache Entry: 231
ASCII text, with very long lines (405)
downloaded
Chrome Cache Entry: 232
ASCII text, with very long lines (504)
downloaded
Chrome Cache Entry: 234
ASCII text, with very long lines (4199)
downloaded
Chrome Cache Entry: 235
ASCII text, with very long lines (14200)
downloaded
Chrome Cache Entry: 236
ASCII text, with very long lines (17337)
downloaded
Chrome Cache Entry: 238
HTML document, ASCII text, with very long lines (682)
downloaded
Chrome Cache Entry: 239
ASCII text, with very long lines (467)
downloaded
Chrome Cache Entry: 240
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 241
ASCII text, with very long lines (693)
downloaded
Chrome Cache Entry: 242
ASCII text, with very long lines (574)
downloaded
Chrome Cache Entry: 243
ASCII text, with very long lines (3178)
downloaded
Chrome Cache Entry: 244
ASCII text, with very long lines (834)
downloaded
Chrome Cache Entry: 245
HTML document, ASCII text, with very long lines (682)
downloaded
There are 114 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\UeW2b6mU6Z.exe
"C:\Users\user\Desktop\UeW2b6mU6Z.exe"
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
"C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe"
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
malicious
C:\Windows\System32\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
malicious
C:\Windows\System32\netsh.exe
netsh wlan show profiles
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
malicious
C:\Users\user\AppData\Local\Temp\1000054001\amert.exe
"C:\Users\user\AppData\Local\Temp\1000054001\amert.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal
malicious
C:\Users\user\AppData\Local\Temp\1000055001\bad48ea9ac.exe
"C:\Users\user\AppData\Local\Temp\1000055001\bad48ea9ac.exe"
malicious
C:\Users\user\AppData\Local\Temp\4d0ab15804\chrosha.exe
C:\Users\user\AppData\Local\Temp\4d0ab15804\chrosha.exe
malicious
C:\Users\user\AppData\Local\Temp\1000056001\590971cd60.exe
"C:\Users\user\AppData\Local\Temp\1000056001\590971cd60.exe"
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
malicious
C:\Windows\System32\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
malicious
C:\Windows\System32\netsh.exe
netsh wlan show profiles
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal
malicious
C:\Users\user\AppData\Local\Temp\1000055001\bad48ea9ac.exe
"C:\Users\user\AppData\Local\Temp\1000055001\bad48ea9ac.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
"C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe"
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\Temp\1000056001\590971cd60.exe
"C:\Users\user\AppData\Local\Temp\1000056001\590971cd60.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000055001\bad48ea9ac.exe
"C:\Users\user\AppData\Local\Temp\1000055001\bad48ea9ac.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000056001\590971cd60.exe
"C:\Users\user\AppData\Local\Temp\1000056001\590971cd60.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1908,i,11369697979599954763,617967172269754470,262144 /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5564 --field-trial-handle=1908,i,11369697979599954763,617967172269754470,262144 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3896 --field-trial-handle=1908,i,11369697979599954763,617967172269754470,262144 /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=2000,i,11986883696083450326,11027901686881542534,262144 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3476 --field-trial-handle=1908,i,11369697979599954763,617967172269754470,262144 /prefetch:8
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5804 -s 2108
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 --field-trial-handle=2028,i,1801343791717140739,10780303537673974787,262144 /prefetch:8
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 2156
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4752 --field-trial-handle=2028,i,1801343791717140739,10780303537673974787,262144 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=2028,i,1801343791717140739,10780303537673974787,262144 /prefetch:8
There are 38 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1
193.233.132.56
malicious
http://193.233.132.56/Pneh2sXQk0/Plugins/clip64.dll
193.233.132.56
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://193.233.132.167/cost/random.exe
193.233.132.167
malicious
http://193.233.132.167/cost/sarra.exe
193.233.132.167
malicious
http://193.233.132.56/Pneh2sXQk0/Plugins/cred64.dll
193.233.132.56
malicious
http://193.233.132.167/mine/random.exe
193.233.132.167
malicious
http://193.233.132.56/Pneh2sXQk0/index.php
193.233.132.56
malicious
http://193.233.132.167/enigma/index.php
193.233.132.167
malicious
http://193.233.132.167/xeJ
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://193.233.132.167/cost/sarra.exe8
unknown
https://duckduckgo.com/ac/?q=
unknown
https://t.me/RiseProSUPPORTr
unknown
http://193.233.132.167/enigma/index.phpq
unknown
http://193.233.132.56/33.132.56/015f815db2cd0aea5fb37b3eefba1586aa0e17e76n
unknown
http://193.233.132.167/enigma/index.phpp
unknown
http://193.233.132.167/
unknown
http://193.233.132.167/cost/sarra.exeata
unknown
https://db-ip.com/
unknown
http://193.233.132.167/enigma/index.phpY
unknown
http://193.233.132.56/4e40adc2dc8e2a9e730e8b2e8b2446fe1e928766ada
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
https://ipinfo.io/widget/demo/81.181.57.52u
unknown
http://193.233.132.167/enigma/index.php6)
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016/ee
unknown
http://www.microsoft.?
unknown
http://193.233.132.56/Pneh2sXQk0/index.phpded
unknown
https://t.me/risepro_bot.52
unknown
http://193.233.132.167/cost/go.exe
unknown
https://g.live.com/odclientsettings/Prod.C:
unknown
http://193.233.132.167/cost/go.exe0.1
unknown
http://193.233.132.167/enigma/index.phpG
unknown
http://193.233.132.167/enigma/index.phpP
unknown
https://nuget.org/nuget.exe
unknown
https://t.me/risepro_botisepro_bot
unknown
http://193.233.132.167/enigma/index.php;
unknown
http://www.winimage.com/zLibDllDp
unknown
http://193.233.132.167/SOR_LEVEL=6PROCESSOR_RE
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://193.233.132.167/enigma/index.phpB
unknown
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
unknown
http://193.233.132.167/cost/sarra.exeP
unknown
http://193.233.132.56/
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.winimage.com/zLibDllDpuTpu
unknown
https://contoso.com/Icon
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
http://193.233.132.56/015f815db2cd0aea5fb37b3eefba1586aa0e17e76#da#
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://193.233.132.167/en-US
unknown
http://crl.ver)
unknown
https://t.me/RiseProSUPPORT
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://github.com/Pester/Pester
unknown
https://www.youtube.com/account
108.177.122.91
https://www.google.com/favicon.ico
64.233.176.103
https://ipinfo.io/
unknown
http://193.233.132.56/Pneh2sXQk0/index.phpru
unknown
https://ipinfo.io:443/widget/demo/81.181.57.52lM
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://193.233.132.56/Pneh2sXQk0/index.php56001
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://193.233.132.167/enigma/index.phpv
unknown
http://193.233.132.56/Pneh2sXQk0/index.phpx
unknown
http://193.233.132.167/cost/random.exel
unknown
http://www.winimage.com/zLibDllDpRTpR
unknown
http://193.233.132.56/Pneh2sXQk0/index.phpv
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
http://193.233.132.56/e19fbffc5144f69e5e67ee8015f815db2cd0aea5fb37b3eefba1586aa0e17e76#
unknown
https://t.me/risepro_botI
unknown
http://193.233.132.56/Pneh2sXQk0/index.phph
unknown
http://147.45.47.102:57893/hera/amadka.exe
unknown
https://contoso.com/License
unknown
http://193.233.132.56/&
unknown
http://193.233.132.56/33.132.56/015f815db2cd0aea5fb37b3eefba1586aa001
unknown
https://www.youtube.com/accountYouTube
unknown
http://193.233.132.167/8r
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://193.233.132.56/e19fbffc5144f69e5e67ee8015f815db2cd0aea5fb37b3eefba1586aa0e17e001
unknown
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1es
unknown
http://193.233.132.167/enigma/index.phperWgfTOmIUKDbvTuTS4b2SL=ex.php
unknown
https://www.youtube.com/accountt
unknown
http://193.233.132.167/mine/random.exe5
unknown
http://193.233.132.56/Pneh2sXQk0/index.php51a4f
unknown
https://g.live.com/odclientsettings/ProdV2
unknown
https://www.youtube.com/accountn
unknown
http://193.233.132.56/Pneh2sXQk0/index.php?
unknown
https://accounts.goo
unknown
http://193.233.132.167/cost/lenin.exe192.168.0Yx8
unknown
https://ipinfo.io:443/widget/demo/81.181.57.52
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17/ewGpY
unknown
http://193.233.132.56/Pneh2sXQk0/index.php01
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
youtube-ui.l.google.com
108.177.122.91
www3.l.google.com
142.250.105.138
play.google.com
173.194.219.139
ipinfo.io
34.117.186.192
www.google.com
64.233.176.103
db-ip.com
104.26.5.15
accounts.youtube.com
unknown
www.youtube.com
unknown

IPs

IP
Domain
Country
Malicious
193.233.132.56
unknown
Russian Federation
malicious
192.168.2.4
unknown
unknown
malicious
147.45.47.93
unknown
Russian Federation
malicious
193.233.132.167
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
104.26.5.15
db-ip.com
United States
142.250.105.138
www3.l.google.com
United States
172.217.215.136
unknown
United States
239.255.255.250
unknown
Reserved
108.177.122.91
youtube-ui.l.google.com
United States
64.233.177.101
unknown
United States
64.233.176.103
www.google.com
United States
127.0.0.1
unknown
unknown
74.125.138.101
unknown
United States
108.177.122.99
unknown
United States
There are 5 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
bad48ea9ac.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
590971cd60.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\590971cd60.exe|a5eb51d4c333e05a
ProgramId
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\590971cd60.exe|a5eb51d4c333e05a
FileId
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\590971cd60.exe|a5eb51d4c333e05a
LowerCaseLongPath
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\590971cd60.exe|a5eb51d4c333e05a
LongPathHash
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\590971cd60.exe|a5eb51d4c333e05a
Name
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\590971cd60.exe|a5eb51d4c333e05a
OriginalFileName
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\590971cd60.exe|a5eb51d4c333e05a
Publisher
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\590971cd60.exe|a5eb51d4c333e05a
Version
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\590971cd60.exe|a5eb51d4c333e05a
BinFileVersion
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\590971cd60.exe|a5eb51d4c333e05a
BinaryType
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\590971cd60.exe|a5eb51d4c333e05a
ProductName
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\590971cd60.exe|a5eb51d4c333e05a
ProductVersion
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\590971cd60.exe|a5eb51d4c333e05a
LinkDate
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\590971cd60.exe|a5eb51d4c333e05a
BinProductVersion
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\590971cd60.exe|a5eb51d4c333e05a
AppxPackageFullName
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\590971cd60.exe|a5eb51d4c333e05a
AppxPackageRelativeId
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\590971cd60.exe|a5eb51d4c333e05a
Size
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\590971cd60.exe|a5eb51d4c333e05a
Language
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\590971cd60.exe|a5eb51d4c333e05a
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProgramId
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
FileId
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LowerCaseLongPath
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LongPathHash
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Name
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
OriginalFileName
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Publisher
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Version
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinFileVersion
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinaryType
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductName
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductVersion
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LinkDate
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinProductVersion
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageFullName
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageRelativeId
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Size
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Language
\REGISTRY\A\{2cdbb4ed-8f3f-05e9-fb18-4529d85d44c5}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Usn
There are 57 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4C90000
direct allocation
page read and write
malicious
53D0000
direct allocation
page read and write
malicious
5260000
direct allocation
page read and write
malicious
5440000
direct allocation
page read and write
malicious
1868000
heap
page read and write
malicious
721000
unkown
page execute and read and write
malicious
5440000
direct allocation
page read and write
malicious
D01000
unkown
page execute and read and write
malicious
8107000
heap
page read and write
malicious
AD1000
unkown
page execute and read and write
malicious
2E1000
unkown
page execute and read and write
malicious
6E361000
unkown
page execute read
malicious
4FF0000
direct allocation
page read and write
malicious
4730000
direct allocation
page read and write
malicious
5290000
direct allocation
page read and write
malicious
4FD0000
direct allocation
page read and write
malicious
4BA0000
direct allocation
page read and write
malicious
631000
unkown
page execute and read and write
malicious
B81000
unkown
page execute and read and write
malicious
AD1000
unkown
page execute and read and write
malicious
6C8B1000
unkown
page execute read
malicious
631000
unkown
page execute and read and write
malicious
5150000
direct allocation
page read and write
malicious
4F30000
direct allocation
page read and write
malicious
C41000
unkown
page execute and read and write
malicious
B81000
unkown
page execute and read and write
malicious
AD1000
unkown
page execute and read and write
malicious
7CBA000
heap
page read and write
149E000
heap
page read and write
47F1000
heap
page read and write
4B61000
heap
page read and write
1557000
heap
page read and write
4E11000
heap
page read and write
4721000
heap
page read and write
12B8000
heap
page read and write
141E000
stack
page read and write
17A3000
heap
page read and write
F90000
direct allocation
page read and write
1889000
heap
page read and write
1253000
heap
page read and write
1DDF3050000
trusted library allocation
page read and write
480E000
stack
page read and write
134D000
heap
page read and write
15B7000
heap
page read and write
2D3E000
stack
page read and write
4E11000
heap
page read and write
1111000
unkown
page execute and read and write
13C0000
direct allocation
page read and write
153B000
heap
page read and write
D56000
unkown
page execute and read and write
DAD000
unkown
page execute and read and write
3A0F000
stack
page read and write
42B1000
heap
page read and write
17E3B540000
heap
page read and write
8DB6FDF000
stack
page read and write
4A81000
heap
page read and write
1CA6D6CA000
heap
page read and write
7F81000
heap
page read and write
7F59000
heap
page read and write
3A87000
heap
page read and write
4E0F000
stack
page read and write
19ECF0A0000
trusted library allocation
page read and write
97F000
stack
page read and write
3975000
heap
page read and write
1DDF12D8000
heap
page read and write
19ECF4BA000
trusted library allocation
page read and write
7FA9000
heap
page read and write
7FFD9BA68000
trusted library allocation
page read and write
17E212A0000
heap
page read and write
7CDA000
heap
page read and write
4B61000
heap
page read and write
368E000
stack
page read and write
F5D000
unkown
page execute and read and write
7D45000
heap
page read and write
22F0000
heap
page read and write
DD7000
unkown
page execute and write copy
304E000
stack
page read and write
7F4E000
heap
page read and write
18D3000
heap
page read and write
7CF3000
heap
page read and write
4DC1000
heap
page read and write
42B1000
heap
page read and write
813C000
heap
page read and write
7D9C000
heap
page read and write
4DC1000
heap
page read and write
2E1000
unkown
page execute and write copy
17E24708000
trusted library allocation
page read and write
82E0000
trusted library allocation
page read and write
4E11000
heap
page read and write
4F6B000
stack
page read and write
10D5000
heap
page read and write
4E80000
direct allocation
page execute and read and write
17E3B5AD000
heap
page read and write
7CE8000
heap
page read and write
463F000
stack
page read and write
3DBE000
stack
page read and write
5010000
direct allocation
page execute and read and write
17E3B55E000
heap
page read and write
F6E000
unkown
page execute and read and write
32CF000
stack
page read and write
167A000
heap
page read and write
5460000
direct allocation
page execute and read and write
7F2C000
heap
page read and write
7DAF000
heap
page read and write
15D4000
heap
page read and write
3CC2000
heap
page read and write
17E3B676000
heap
page read and write
7FFD9BA59000
trusted library allocation
page read and write
378F000
stack
page read and write
13C0000
direct allocation
page read and write
2CBB000
stack
page read and write
8CE000
stack
page read and write
12FA000
heap
page read and write
4E60000
direct allocation
page execute and read and write
1501000
heap
page read and write
7AD0000
heap
page read and write
7CD2000
heap
page read and write
7D5D000
heap
page read and write
4E4E000
stack
page read and write
DEF000
unkown
page execute and write copy
17E22E10000
heap
page readonly
D00000
unkown
page read and write
142D000
heap
page read and write
5450000
direct allocation
page execute and read and write
B5B000
stack
page read and write
680000
heap
page read and write
3D5E000
stack
page read and write
19ECF130000
trusted library allocation
page read and write
D90000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
4ED0000
heap
page read and write
22A82538000
heap
page read and write
7F47000
heap
page read and write
4DF0000
direct allocation
page execute and read and write
19ECF218000
heap
page read and write
EDD000
unkown
page execute and read and write
131A000
heap
page read and write
4A81000
heap
page read and write
4721000
heap
page read and write
1440000
heap
page read and write
8DB797E000
unkown
page readonly
186A000
heap
page read and write
7CF5000
heap
page read and write
1574000
heap
page read and write
37D0000
heap
page read and write
4A8E000
stack
page read and write
688000
heap
page read and write
1684000
heap
page read and write
3D01000
heap
page read and write
14C0000
heap
page read and write
E35000
unkown
page execute and write copy
1615000
heap
page read and write
7CE0000
heap
page read and write
134E000
stack
page read and write
3B25000
heap
page read and write
4B61000
heap
page read and write
1240000
heap
page read and write
B3B000
unkown
page execute and write copy
1AA0000
heap
page read and write
1628000
heap
page read and write
3DB9000
heap
page read and write
10D0000
heap
page read and write
169C000
heap
page read and write
52B0000
direct allocation
page execute and read and write
7CBA000
heap
page read and write
4A81000
heap
page read and write
4C7F000
stack
page read and write
354E000
stack
page read and write
50B0000
direct allocation
page execute and read and write
203072B0000
heap
page read and write
4A81000
heap
page read and write
19ECF507000
trusted library allocation
page read and write
7CE8000
heap
page read and write
300F000
stack
page read and write
1416000
heap
page read and write
3F2E000
stack
page read and write
8A0000
heap
page read and write
6BBC000
stack
page read and write
4B51000
heap
page read and write
5330000
direct allocation
page execute and read and write
7D02000
heap
page read and write
4F51000
heap
page read and write
63A000
heap
page read and write
EAF000
unkown
page execute and read and write
5250000
direct allocation
page read and write
1818000
heap
page read and write
4FB1000
heap
page read and write
7F8D000
heap
page read and write
8020000
trusted library allocation
page read and write
12BB000
heap
page read and write
133E000
heap
page read and write
B3B000
unkown
page execute and read and write
3CA9000
heap
page read and write
12E0000
heap
page read and write
7C2F000
stack
page read and write
2B9E000
stack
page read and write
1593000
heap
page read and write
7D00000
heap
page read and write
366E000
stack
page read and write
13C0000
direct allocation
page read and write
F58000
unkown
page execute and write copy
FF3CFFE000
stack
page read and write
7CF2000
heap
page read and write
DFE000
unkown
page execute and write copy
7CBA000
heap
page read and write
7FFD9B6F2000
trusted library allocation
page read and write
4E11000
heap
page read and write
293D0F000
stack
page read and write
19ECF2EF000
heap
page read and write
22A84100000
heap
page read and write
7FC4000
heap
page read and write
5490000
direct allocation
page execute and read and write
19ECB0A0000
trusted library allocation
page read and write
1744000
heap
page read and write
15EE000
heap
page read and write
7F94000
heap
page read and write
1574000
heap
page read and write
4A70000
direct allocation
page read and write
16AC000
heap
page read and write
3C05000
heap
page read and write
1244000
heap
page read and write
3F0E000
stack
page read and write
4B80000
heap
page read and write
4DC1000
heap
page read and write
89C000
unkown
page readonly
B39000
unkown
page write copy
1364000
heap
page read and write
19ECF2FA000
heap
page read and write
7B7E000
stack
page read and write
D45000
unkown
page execute and read and write
11A4000
heap
page read and write
22BD7330000
heap
page read and write
165C000
heap
page read and write
50D0000
direct allocation
page execute and read and write
4B61000
heap
page read and write
203057B7000
heap
page read and write
4FB1000
heap
page read and write
4BFD000
stack
page read and write
A18000
unkown
page execute and read and write
AC0000
heap
page read and write
CAC000
unkown
page execute and write copy
14E5000
heap
page read and write
3C8E000
stack
page read and write
F1D000
unkown
page execute and read and write
4D0E000
stack
page read and write
39A2000
heap
page read and write
562C000
stack
page read and write
3CF7000
heap
page read and write
19ECF120000
trusted library allocation
page read and write
1364000
heap
page read and write
14C6000
heap
page read and write
4B0000
heap
page read and write
A34000
heap
page read and write
1310000
heap
page read and write
79D0000
remote allocation
page read and write
7F71000
heap
page read and write
22A8256B000
heap
page read and write
14AD000
heap
page read and write
4930000
direct allocation
page execute and read and write
17E23CCF000
trusted library allocation
page read and write
5400000
direct allocation
page execute and read and write
1DDF11D0000
heap
page read and write
5440000
direct allocation
page execute and read and write
7CB1000
heap
page read and write
800000
unkown
page readonly
19ECF472000
trusted library allocation
page read and write
344E000
stack
page read and write
ED4000
heap
page read and write
1400000
direct allocation
page read and write
3A4F000
stack
page read and write
510F000
direct allocation
page read and write
3B51000
heap
page read and write
7F47000
heap
page read and write
7DF467AA0000
trusted library allocation
page execute and read and write
8DB7FFE000
stack
page read and write
3D8F000
stack
page read and write
16AC000
heap
page read and write
EA0000
direct allocation
page read and write
4FB0000
heap
page read and write
158E000
stack
page read and write
8144000
heap
page read and write
4E22000
heap
page read and write
BB5000
unkown
page execute and read and write
468E000
stack
page read and write
B3B000
unkown
page execute and read and write
518E000
stack
page read and write
7D13000
heap
page read and write
1DDF136D000
heap
page read and write
3BAE000
stack
page read and write
8C2000
unkown
page readonly
13C0000
direct allocation
page read and write
139E000
stack
page read and write
22BD73D5000
heap
page read and write
362F000
stack
page read and write
7F3C000
heap
page read and write
4E11000
heap
page read and write
37CE000
stack
page read and write
1CA54DD0000
heap
page read and write
4B50000
direct allocation
page read and write
19ECF30C000
heap
page read and write
7CED000
heap
page read and write
50B0000
direct allocation
page execute and read and write
8CC000
unkown
page read and write
1684000
heap
page read and write
54E9000
stack
page read and write
4E11000
heap
page read and write
5200000
trusted library allocation
page read and write
7CEE000
heap
page read and write
7F59000
heap
page read and write
4BA8000
heap
page read and write
812B000
heap
page read and write
4DC1000
heap
page read and write
564E000
stack
page read and write
5470000
direct allocation
page execute and read and write
B39000
unkown
page write copy
7CA5000
heap
page read and write
19ECA701000
trusted library allocation
page read and write
1462000
heap
page read and write
33CF000
stack
page read and write
4E11000
heap
page read and write
7D99000
heap
page read and write
15B4000
heap
page read and write
36AE000
stack
page read and write
7CC6000
heap
page read and write
D61000
unkown
page execute and read and write
3A25000
heap
page read and write
5310000
direct allocation
page execute and read and write
A27000
unkown
page execute and write copy
1259000
heap
page read and write
4DC1000
heap
page read and write
1364000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
1459000
heap
page read and write
8C2000
unkown
page readonly
7A2D000
stack
page read and write
13FE000
stack
page read and write
4A4E000
stack
page read and write
41A8000
heap
page read and write
83D0000
trusted library allocation
page read and write
166C000
heap
page read and write
B81000
unkown
page execute and write copy
4DC1000
heap
page read and write
14BC779000
stack
page read and write
104B000
heap
page read and write
464F000
stack
page read and write
4CD1000
heap
page read and write
DE6000
unkown
page execute and write copy
3ECF000
stack
page read and write
7F82000
heap
page read and write
310F000
stack
page read and write
1879000
heap
page read and write
D53000
unkown
page execute and write copy
4FB1000
heap
page read and write
3CB9000
heap
page read and write
7F31000
heap
page read and write
7D4A000
heap
page read and write
4DC1000
heap
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
19ECF2DB000
heap
page read and write
14BC6FE000
stack
page read and write
1DDF15B0000
heap
page read and write
316E000
stack
page read and write
8870000
heap
page read and write
1670000
direct allocation
page read and write
4FA0000
direct allocation
page read and write
22BD7270000
trusted library allocation
page read and write
15CE000
heap
page read and write
A34000
heap
page read and write
3A40000
heap
page read and write
D35000
unkown
page execute and write copy
4B61000
heap
page read and write
D3F000
unkown
page execute and read and write
8154000
heap
page read and write
75ED000
stack
page read and write
7FFD9B940000
trusted library allocation
page read and write
118E000
stack
page read and write
15B4000
heap
page read and write
6D64E7E000
stack
page read and write
1679000
heap
page read and write
13C0000
direct allocation
page read and write
D74000
unkown
page execute and write copy
1CA55A1D000
trusted library allocation
page read and write
7CAF000
heap
page read and write
3A0F000
stack
page read and write
7DA5000
heap
page read and write
CD0000
unkown
page execute and write copy
CC5000
unkown
page execute and write copy
7CB6000
heap
page read and write
368E000
stack
page read and write
14A9000
heap
page read and write
4A81000
heap
page read and write
11A4000
heap
page read and write
7F6A000
heap
page read and write
328F000
stack
page read and write
121C000
heap
page read and write
E1A000
unkown
page execute and read and write
4F7F000
stack
page read and write
A40000
heap
page read and write
1684000
heap
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
7CF2000
heap
page read and write
1022000
unkown
page execute and write copy
CD0000
unkown
page execute and read and write
1800000
heap
page read and write
CC9000
unkown
page execute and read and write
EA0000
direct allocation
page read and write
6D64FF9000
stack
page read and write
3F0F000
stack
page read and write
4B61000
heap
page read and write
13CD000
heap
page read and write
DEF000
unkown
page execute and write copy
4B51000
heap
page read and write
1244000
heap
page read and write
7F00000
heap
page read and write
670000
direct allocation
page read and write
404E000
stack
page read and write
14EF000
heap
page read and write
1878000
heap
page read and write
14A9000
heap
page read and write
4FB1000
heap
page read and write
30B0000
heap
page read and write
1CA53515000
heap
page read and write
15B4000
heap
page read and write
7CDE000
heap
page read and write
1410000
direct allocation
page read and write
8154000
heap
page read and write
1593000
heap
page read and write
D5B000
stack
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
4E11000
heap
page read and write
7F3C000
heap
page read and write
1684000
heap
page read and write
72D0000
heap
page read and write
D63000
unkown
page execute and read and write
129F000
heap
page read and write
8DB84FE000
stack
page read and write
7FFD9BA33000
trusted library allocation
page read and write
D01000
unkown
page execute and write copy
50B0000
direct allocation
page execute and read and write
7F16000
heap
page read and write
1CA55447000
trusted library allocation
page read and write
4F51000
heap
page read and write
1574000
heap
page read and write
7F3B000
heap
page read and write
42CE000
stack
page read and write
CC5000
unkown
page write copy
1589000
heap
page read and write
7F94000
heap
page read and write
4E11000
heap
page read and write
4FB1000
heap
page read and write
7E40000
remote allocation
page read and write
4FB1000
heap
page read and write
E39000
unkown
page execute and read and write
42B1000
heap
page read and write
7FFD9BA44000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page read and write
17E22E40000
heap
page execute and read and write
1684000
heap
page read and write
DE6000
unkown
page execute and write copy
CD1000
unkown
page write copy
EB5000
unkown
page execute and read and write
CD2000
unkown
page execute and read and write
22A82700000
heap
page read and write
1823000
heap
page read and write
1452000
heap
page read and write
188E000
stack
page read and write
501D000
stack
page read and write
4F51000
heap
page read and write
408E000
stack
page read and write
25EC000
stack
page read and write
1AB0000
heap
page read and write
5530000
direct allocation
page execute and read and write
356E000
stack
page read and write
17E212B0000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
3CEE000
stack
page read and write
18AB000
heap
page read and write
4A0F000
stack
page read and write
7CDD000
heap
page read and write
7D5A000
heap
page read and write
186A000
heap
page read and write
1474000
heap
page read and write
176F000
heap
page read and write
458E000
stack
page read and write
22A82538000
heap
page read and write
32CE000
stack
page read and write
15B4000
heap
page read and write
1651000
heap
page read and write
16B8000
heap
page read and write
772D000
stack
page read and write
19ECF4F4000
trusted library allocation
page read and write
7D9C000
heap
page read and write
52E0000
direct allocation
page execute and read and write
7FA2000
heap
page read and write
19ECF261000
heap
page read and write
130D000
heap
page read and write
14CF000
heap
page read and write
15B4000
heap
page read and write
3DB9000
heap
page read and write
15D4000
heap
page read and write
3B4F000
stack
page read and write
1574000
heap
page read and write
1421000
heap
page read and write
1306000
heap
page read and write
CC4000
unkown
page execute and read and write
4DC1000
heap
page read and write
8DB7879000
stack
page read and write
15CB000
heap
page read and write
22BD7270000
trusted library allocation
page read and write
324F000
stack
page read and write
614000
heap
page read and write
1574000
heap
page read and write
12AC000
heap
page read and write
1400000
direct allocation
page read and write
B34000
unkown
page execute and read and write
3BBD000
heap
page read and write
DCD000
stack
page read and write
1430000
direct allocation
page read and write
8020000
trusted library allocation
page read and write
775D000
stack
page read and write
167F000
heap
page read and write
7F47000
heap
page read and write
4A70000
direct allocation
page read and write
CEC000
unkown
page execute and read and write
1244000
heap
page read and write
1CA6D42A000
heap
page read and write
1410000
heap
page read and write
519D000
stack
page read and write
143B000
heap
page read and write
D80000
heap
page read and write
490E000
stack
page read and write
15A0000
direct allocation
page read and write
13A2000
heap
page read and write
4B61000
heap
page read and write
14E5000
heap
page read and write
17E2451E000
trusted library allocation
page read and write
F68000
unkown
page execute and read and write
16A2000
heap
page read and write
2DAE000
stack
page read and write
F90000
direct allocation
page read and write
19ECF200000
heap
page read and write
55A4000
heap
page read and write
1679000
heap
page read and write
5560000
heap
page read and write
7703000
heap
page read and write
13E5000
heap
page read and write
4D4E000
stack
page read and write
80F0000
heap
page read and write
7FFD9B710000
trusted library allocation
page read and write
17D5000
heap
page read and write
14D5000
heap
page read and write
5490000
direct allocation
page execute and read and write
4A0F000
stack
page read and write
3C8F000
stack
page read and write
14ED000
heap
page read and write
80E87C6000
stack
page read and write
D53000
unkown
page execute and write copy
811B000
heap
page read and write
53E0000
direct allocation
page execute and read and write
1430000
direct allocation
page read and write
46F0000
heap
page read and write
4F51000
heap
page read and write
E74000
unkown
page execute and write copy
7FFD9B9A0000
trusted library allocation
page read and write
29427E000
stack
page read and write
14BC152000
stack
page read and write
1244000
heap
page read and write
7F59000
heap
page read and write
3C04000
heap
page read and write
8020000
trusted library allocation
page read and write
13CD000
heap
page read and write
925C000
stack
page read and write
7F46000
heap
page read and write
22BD6FC0000
heap
page read and write
165E000
heap
page read and write
350F000
stack
page read and write
7CDE000
heap
page read and write
3B0F000
stack
page read and write
15B4000
heap
page read and write
19ECF305000
heap
page read and write
813E000
stack
page read and write
1208000
heap
page read and write
14BC5FE000
stack
page read and write
43CF000
stack
page read and write
1574000
heap
page read and write
5490000
direct allocation
page execute and read and write
54A0000
direct allocation
page execute and read and write
1421000
heap
page read and write
15C5000
heap
page read and write
340F000
stack
page read and write
F9D000
stack
page read and write
7C90000
heap
page read and write
A34000
heap
page read and write
11A4000
heap
page read and write
775000
unkown
page read and write
4FF0000
direct allocation
page read and write
390E000
stack
page read and write
494E000
stack
page read and write
D6B000
unkown
page execute and write copy
3CCF000
stack
page read and write
53E0000
direct allocation
page execute and read and write
364F000
stack
page read and write
3ACA000
heap
page read and write
1690000
direct allocation
page read and write
19EF000
stack
page read and write
191D000
heap
page read and write
7F33000
heap
page read and write
17E331D7000
trusted library allocation
page read and write
7FFD9B8A1000
trusted library allocation
page read and write
3F50000
heap
page read and write
14BCABD000
stack
page read and write
8DB83FE000
stack
page read and write
8119000
heap
page read and write
7D0A000
heap
page read and write
1CA533F0000
heap
page read and write
CAA000
unkown
page execute and read and write
1CA65515000
trusted library allocation
page read and write
17E3B63E000
heap
page read and write
1574000
heap
page read and write
748E000
stack
page read and write
A34000
unkown
page execute and read and write
3A9F000
stack
page read and write
CEC000
unkown
page execute and read and write
7F57000
heap
page read and write
D56000
unkown
page execute and read and write
3AFF000
heap
page read and write
3B4E000
stack
page read and write
144D000
heap
page read and write
178C000
heap
page read and write
1CA56A81000
trusted library allocation
page read and write
352F000
stack
page read and write
165E000
stack
page read and write
D3F000
unkown
page execute and read and write
7FFD9BA80000
trusted library allocation
page read and write
4DC1000
heap
page read and write
22A82540000
heap
page read and write
145D000
heap
page read and write
4E11000
heap
page read and write
11A4000
heap
page read and write
32AF000
stack
page read and write
4DC1000
heap
page read and write
3B60000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
ED4000
heap
page read and write
EA0000
direct allocation
page read and write
DE6000
unkown
page execute and write copy
12A6000
heap
page read and write
6CFE000
stack
page read and write
1665000
heap
page read and write
5020000
direct allocation
page execute and read and write
1632000
heap
page read and write
7CBA000
heap
page read and write
17E24B13000
trusted library allocation
page read and write
3DB9000
heap
page read and write
11A4000
heap
page read and write
191B000
heap
page read and write
42B1000
heap
page read and write
1736000
heap
page read and write
FFE000
stack
page read and write
167E000
heap
page read and write
4F0C000
stack
page read and write
1022000
unkown
page execute and read and write
8119000
heap
page read and write
3BDF000
stack
page read and write
D87000
unkown
page execute and write copy
7F84000
heap
page read and write
8133000
heap
page read and write
8DB7E7E000
unkown
page readonly
46CE000
stack
page read and write
EFF000
unkown
page execute and read and write
3ADB000
heap
page read and write
15B4000
heap
page read and write
203057FC000
heap
page read and write
1459000
heap
page read and write
7F59000
heap
page read and write
5BAE000
stack
page read and write
4B50000
direct allocation
page read and write
50D0000
direct allocation
page execute and read and write
4A81000
heap
page read and write
54F0000
direct allocation
page execute and read and write
1574000
heap
page read and write
4FB1000
heap
page read and write
53B0000
direct allocation
page execute and read and write
7CD4000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9B720000
trusted library allocation
page read and write
1605000
heap
page read and write
3ADE000
stack
page read and write
17E21190000
heap
page read and write
D18000
unkown
page execute and read and write
1679000
heap
page read and write
17E246E5000
trusted library allocation
page read and write
7F82000
heap
page read and write
4E11000
heap
page read and write
338F000
stack
page read and write
120D000
stack
page read and write
10E1000
heap
page read and write
6B6000
heap
page read and write
318E000
stack
page read and write
1395000
heap
page read and write
4F51000
heap
page read and write
CD9000
unkown
page execute and read and write
7F47000
heap
page read and write
6E360000
unkown
page readonly
2F2E000
stack
page read and write
53E0000
direct allocation
page execute and read and write
7D9C000
heap
page read and write
54AB000
stack
page read and write
7D1C000
heap
page read and write
360F000
stack
page read and write
3F87000
heap
page read and write
3911000
heap
page read and write
770000
unkown
page execute and read and write
3A0B000
heap
page read and write
12A9000
heap
page read and write
4DC1000
heap
page read and write
7D1C000
heap
page read and write
3B45000
heap
page read and write
A34000
heap
page read and write
610000
heap
page read and write
15B4000
heap
page read and write
53E0000
direct allocation
page execute and read and write
2EEE000
stack
page read and write
400F000
stack
page read and write
1474000
heap
page read and write
1210000
heap
page read and write
ED4000
heap
page read and write
364E000
stack
page read and write
1CA6D33A000
heap
page read and write
1574000
heap
page read and write
7CE8000
heap
page read and write
50F0000
direct allocation
page execute and read and write
3C30000
heap
page read and write
1DDF2CF0000
trusted library allocation
page read and write
3C02000
heap
page read and write
D57000
unkown
page execute and write copy
42B1000
heap
page read and write
1914000
heap
page read and write
468F000
stack
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
11A4000
heap
page read and write
52B0000
direct allocation
page execute and read and write
10D0000
heap
page read and write
631000
unkown
page execute and write copy
5480000
direct allocation
page execute and read and write
4C80000
direct allocation
page read and write
16FE000
heap
page read and write
3BBD000
heap
page read and write
1574000
heap
page read and write
4E11000
heap
page read and write
3B77000
heap
page read and write
7FC7000
heap
page read and write
4F51000
heap
page read and write
FCF000
stack
page read and write
16FE000
heap
page read and write
4721000
heap
page read and write
D8F000
unkown
page execute and read and write
5090000
direct allocation
page execute and read and write
7CD9000
heap
page read and write
11A4000
heap
page read and write
8D4000
unkown
page readonly
373F000
stack
page read and write
15D0000
heap
page read and write
1D0000
heap
page read and write
5950000
heap
page read and write
16B4000
heap
page read and write
3F66000
heap
page read and write
525B000
stack
page read and write
14EE000
stack
page read and write
7FB6000
heap
page read and write
7DB8000
heap
page read and write
68CF000
stack
page read and write
19ECF44D000
trusted library allocation
page read and write
133E000
heap
page read and write
670000
direct allocation
page read and write
378E000
stack
page read and write
D6D000
unkown
page execute and read and write
1244000
heap
page read and write
1400000
direct allocation
page read and write
FC0000
heap
page read and write
54CF000
stack
page read and write
387F000
stack
page read and write
41A0000
heap
page read and write
41CF000
stack
page read and write
7FFD9B7D6000
trusted library allocation
page execute and read and write
3BD4000
heap
page read and write
4DC1000
heap
page read and write
7DA5000
heap
page read and write
42AF000
stack
page read and write
1CA6D476000
heap
page execute and read and write
7EF16FF000
stack
page read and write
5040000
direct allocation
page execute and read and write
11A4000
heap
page read and write
54C0000
direct allocation
page execute and read and write
8020000
trusted library allocation
page read and write
1684000
heap
page read and write
7F4D000
heap
page read and write
4A70000
direct allocation
page read and write
3DF3000
heap
page read and write
5490000
direct allocation
page execute and read and write
1424000
heap
page read and write
17E3B223000
heap
page read and write
388F000
stack
page read and write
1571000
heap
page read and write
7F34000
heap
page read and write
4DC1000
heap
page read and write
1635000
heap
page read and write
4E11000
heap
page read and write
7CE9000
heap
page read and write
811B000
heap
page read and write
1248000
heap
page read and write
7F77000
heap
page read and write
7F4D000
heap
page read and write
125F000
heap
page read and write
1244000
heap
page read and write
811D000
heap
page read and write
203057B4000
heap
page read and write
8DB72FE000
stack
page read and write
15AB000
heap
page read and write
DFE000
unkown
page execute and write copy
3B56000
heap
page read and write
47F1000
heap
page read and write
22A82540000
heap
page read and write
1560000
heap
page read and write
2F0F000
stack
page read and write
17E248B4000
trusted library allocation
page read and write
C80000
heap
page read and write
17E22EE0000
heap
page read and write
17E24B0F000
trusted library allocation
page read and write
13C2000
heap
page read and write
1244000
heap
page read and write
1684000
heap
page read and write
14A9000
heap
page read and write
1643000
heap
page read and write
3A11000
heap
page read and write
130F000
heap
page read and write
304F000
stack
page read and write
5400000
direct allocation
page execute and read and write
1761000
heap
page read and write
1574000
heap
page read and write
D3A000
unkown
page execute and read and write
7F76000
heap
page read and write
17E22E80000
trusted library allocation
page read and write
5040000
direct allocation
page execute and read and write
4B61000
heap
page read and write
1400000
direct allocation
page read and write
17FD000
heap
page read and write
51FD000
stack
page read and write
4B50000
direct allocation
page read and write
1620000
heap
page read and write
4A81000
heap
page read and write
12E3000
heap
page read and write
7FA3000
heap
page read and write
402F000
stack
page read and write
39FE000
stack
page read and write
D01000
unkown
page execute and write copy
7F4F000
heap
page read and write
3A0F000
stack
page read and write
1214000
heap
page read and write
1313000
heap
page read and write
ED4000
heap
page read and write
10FC000
stack
page read and write
178E000
stack
page read and write
1555000
heap
page read and write
4A81000
heap
page read and write
12FE000
heap
page read and write
7CA2000
heap
page read and write
3989000
heap
page read and write
3BE9000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
3D01000
heap
page read and write
E72000
unkown
page execute and read and write
801000
unkown
page execute read
4C20000
direct allocation
page execute and read and write
50C0000
direct allocation
page execute and read and write
4E11000
heap
page read and write
9FA000
unkown
page execute and read and write
7F31000
heap
page read and write
5490000
direct allocation
page execute and read and write
3FFF000
stack
page read and write
3A2D000
heap
page read and write
4E11000
heap
page read and write
4B61000
heap
page read and write
3B95000
heap
page read and write
1222000
heap
page read and write
1303000
heap
page read and write
4E11000
heap
page read and write
614000
heap
page read and write
1080000
heap
page read and write
8119000
heap
page read and write
DD0000
heap
page read and write
374F000
stack
page read and write
CC5000
unkown
page execute and write copy
79E0000
remote allocation
page read and write
5CAC000
stack
page read and write
52C3000
direct allocation
page read and write
374F000
stack
page read and write
3B6B000
heap
page read and write
7D60000
heap
page read and write
4E70000
direct allocation
page execute and read and write
13C0000
direct allocation
page read and write
4B51000
heap
page read and write
5110000
direct allocation
page execute and read and write
DFE000
unkown
page execute and write copy
3C4D000
heap
page read and write
5250000
direct allocation
page read and write
1340000
heap
page read and write
44FE000
stack
page read and write
66D000
heap
page read and write
1890000
heap
page read and write
4B50000
direct allocation
page read and write
13B0000
heap
page read and write
7F31000
heap
page read and write
45DF000
stack
page read and write
30BA000
heap
page read and write
7D99000
heap
page read and write
8DB8A7C000
stack
page read and write
4F51000
heap
page read and write
7D7B000
heap
page read and write
7CF2000
heap
page read and write
8CC000
unkown
page write copy
18DE000
heap
page read and write
5030000
direct allocation
page execute and read and write
D57000
unkown
page execute and write copy
7CFF000
heap
page read and write
4F0000
heap
page read and write
53E0000
direct allocation
page execute and read and write
161A000
heap
page read and write
4B8F000
stack
page read and write
11A4000
heap
page read and write
630000
heap
page read and write
3B13000
heap
page read and write
1244000
heap
page read and write
4F90000
direct allocation
page read and write
7F57000
heap
page read and write
450F000
stack
page read and write
7F91000
heap
page read and write
3AAC000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
418F000
stack
page read and write
EB0000
heap
page read and write
22A8255F000
heap
page read and write
7F47000
heap
page read and write
17E0000
direct allocation
page read and write
7CDE000
heap
page read and write
4A70000
direct allocation
page read and write
4E11000
heap
page read and write
4E11000
heap
page read and write
11A4000
heap
page read and write
15B000
stack
page read and write
1619000
heap
page read and write
D8A000
unkown
page execute and read and write
F76000
unkown
page execute and write copy
91F000
unkown
page execute and read and write
14BC1DE000
unkown
page read and write
7FC4000
heap
page read and write
17E331E4000
trusted library allocation
page read and write
4A81000
heap
page read and write
33CF000
stack
page read and write
3D82000
heap
page read and write
476C000
stack
page read and write
5520000
direct allocation
page execute and read and write
7CC6000
heap
page read and write
354E000
stack
page read and write
19EC9B40000
heap
page read and write
5410000
direct allocation
page execute and read and write
7FD7000
heap
page read and write
490E000
stack
page read and write
4A70000
direct allocation
page read and write
3BDE000
heap
page read and write
4E11000
heap
page read and write
5500000
direct allocation
page execute and read and write
4E11000
heap
page read and write
53E0000
direct allocation
page execute and read and write
45ED000
stack
page read and write
4DC1000
heap
page read and write
550F000
direct allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
18B6000
heap
page read and write
812B000
heap
page read and write
37F0000
heap
page read and write
775000
unkown
page write copy
490F000
stack
page read and write
404F000
stack
page read and write
7FCF000
heap
page read and write
7F71000
heap
page read and write
1244000
heap
page read and write
4F20000
direct allocation
page read and write
1299000
heap
page read and write
7F5E000
heap
page read and write
1CA568C6000
trusted library allocation
page read and write
19ECF4C0000
remote allocation
page read and write
5490000
direct allocation
page execute and read and write
19EC9C00000
heap
page read and write
14DE000
heap
page read and write
406E000
stack
page read and write
5BBC000
stack
page read and write
1430000
direct allocation
page read and write
4721000
heap
page read and write
7F6B000
heap
page read and write
4E11000
heap
page read and write
15B4000
heap
page read and write
7CBF000
heap
page read and write
22A827B0000
heap
page read and write
4FB1000
heap
page read and write
8C2000
unkown
page readonly
124E000
stack
page read and write
D07000
unkown
page execute and write copy
19EC9C7D000
heap
page read and write
F76000
unkown
page execute and read and write
7FB3000
heap
page read and write
7C9C000
heap
page read and write
22A826E0000
heap
page read and write
80FE000
heap
page read and write
38CF000
stack
page read and write
E00000
unkown
page execute and write copy
7CFD000
heap
page read and write
3B8D000
heap
page read and write
C7A000
stack
page read and write
418F000
stack
page read and write
8154000
heap
page read and write
11A4000
heap
page read and write
756000
heap
page read and write
321E000
stack
page read and write
557F000
direct allocation
page read and write
15CE000
heap
page read and write
4E11000
heap
page read and write
2060000
heap
page read and write
50D0000
direct allocation
page execute and read and write
428F000
stack
page read and write
406F000
stack
page read and write
CFC000
stack
page read and write
7CDD000
heap
page read and write
F5F000
unkown
page execute and write copy
1A0000
heap
page read and write
ED4000
heap
page read and write
4FA0000
trusted library allocation
page read and write
1574000
heap
page read and write
7CBA000
heap
page read and write
42B1000
heap
page read and write
4721000
heap
page read and write
135E000
heap
page read and write
354F000
stack
page read and write
8010000
trusted library allocation
page read and write
539F000
stack
page read and write
15C5000
heap
page read and write
337F000
stack
page read and write
4DC1000
heap
page read and write
7FFD9BB60000
trusted library allocation
page read and write
4DC1000
heap
page read and write
4FB1000
heap
page read and write
7FB3000
heap
page read and write
1244000
heap
page read and write
350F000
stack
page read and write
2E1F000
stack
page read and write
1684000
heap
page read and write
723E000
stack
page read and write
3D0E000
stack
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
328F000
stack
page read and write
5010000
direct allocation
page execute and read and write
B47000
unkown
page execute and write copy
1959000
heap
page read and write
3A0E000
heap
page read and write
3ABF000
heap
page read and write
ED4000
heap
page read and write
E77000
unkown
page execute and write copy
8D0000
heap
page read and write
7734000
heap
page read and write
46F0000
trusted library allocation
page read and write
7CBA000
heap
page read and write
614000
heap
page read and write
8010000
trusted library allocation
page read and write
8DB7A7C000
stack
page read and write
3940000
heap
page read and write
54D0000
direct allocation
page execute and read and write
1CA6D3B5000
heap
page read and write
15E1000
heap
page read and write
1420000
heap
page read and write
6C8B0000
unkown
page readonly
1371000
heap
page read and write
15B1000
heap
page read and write
11A4000
heap
page read and write
16C1000
heap
page read and write
7F8C000
heap
page read and write
486F000
stack
page read and write
4DCF000
stack
page read and write
A0F000
unkown
page execute and read and write
D3B000
unkown
page execute and write copy
800000
unkown
page readonly
4DC1000
heap
page read and write
5060000
direct allocation
page execute and read and write
71F6000
heap
page read and write
390E000
stack
page read and write
12EE000
heap
page read and write
19ECF2E5000
heap
page read and write
1650000
heap
page read and write
6E374000
unkown
page readonly
D8F000
unkown
page execute and read and write
1023000
unkown
page execute and write copy
17E3AEF9000
heap
page read and write
4B51000
heap
page read and write
5480000
direct allocation
page execute and read and write
9BE000
stack
page read and write
3B5D000
heap
page read and write
DDF000
stack
page read and write
1574000
heap
page read and write
5410000
direct allocation
page execute and read and write
3F4E000
stack
page read and write
17E21219000
heap
page read and write
390E000
stack
page read and write
D57000
unkown
page execute and write copy
3CAE000
stack
page read and write
F5F000
unkown
page execute and write copy
3DEE000
stack
page read and write
4DC1000
heap
page read and write
4721000
heap
page read and write
4DC1000
heap
page read and write
7F57000
heap
page read and write
19ECF2DE000
heap
page read and write
801000
unkown
page execute read
DE8000
unkown
page execute and write copy
7CBA000
heap
page read and write
814E000
heap
page read and write
4B51000
heap
page read and write
4FBE000
stack
page read and write
8133000
heap
page read and write
4F51000
heap
page read and write
45F0000
heap
page read and write
7FA9000
heap
page read and write
1495000
heap
page read and write
133E000
heap
page read and write
EE7000
unkown
page execute and read and write
7F47000
heap
page read and write
13EB000
heap
page read and write
5400000
direct allocation
page execute and read and write
15B6000
heap
page read and write
F76000
unkown
page execute and write copy
378F000
stack
page read and write
4E11000
heap
page read and write
4FA0000
direct allocation
page read and write
22A82500000
heap
page read and write
5480000
direct allocation
page execute and read and write
12D4000
heap
page read and write
17E2447B000
trusted library allocation
page read and write
3CAF000
stack
page read and write
1684000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
4DC1000
heap
page read and write
7FFD9BAFC000
trusted library allocation
page read and write
7F57000
heap
page read and write
14BC938000
stack
page read and write
17CC000
stack
page read and write
1244000
heap
page read and write
1CA6D3CB000
heap
page read and write
DEF000
unkown
page execute and write copy
7D0A000
heap
page read and write
42B1000
heap
page read and write
811B000
heap
page read and write
15D4000
heap
page read and write
52B0000
direct allocation
page execute and read and write
5130000
direct allocation
page execute and read and write
7CE8000
heap
page read and write
15EE000
heap
page read and write
7FFD9B700000
trusted library allocation
page read and write
6BF000
unkown
page execute and read and write
430E000
stack
page read and write
467E000
stack
page read and write
5470000
direct allocation
page execute and read and write
11AB000
stack
page read and write
1105000
unkown
page execute and read and write
12FA000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
3C11000
heap
page read and write
3D34000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
FFE000
heap
page read and write
154E000
heap
page read and write
7CF2000
heap
page read and write
105B000
stack
page read and write
1462000
heap
page read and write
143B000
heap
page read and write
ED4000
heap
page read and write
8DB8EFE000
stack
page read and write
79E0000
remote allocation
page read and write
7F4F000
heap
page read and write
16AC000
heap
page read and write
566E000
stack
page read and write
1357000
heap
page read and write
ED4000
heap
page read and write
4FB1000
heap
page read and write
7F3C000
heap
page read and write
2FEF000
stack
page read and write
4890000
direct allocation
page execute and read and write
17E24A49000
trusted library allocation
page read and write
7D1C000
heap
page read and write
136D000
heap
page read and write
DA9000
unkown
page execute and write copy
D63000
unkown
page execute and read and write
BE9000
unkown
page execute and read and write
7CF2000
heap
page read and write
7F31000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7F31000
heap
page read and write
17E2447D000
trusted library allocation
page read and write
17E3B130000
trusted library allocation
page read and write
4FA0000
direct allocation
page read and write
4F4F000
stack
page read and write
52CE000
stack
page read and write
4D0E000
stack
page read and write
4F8F000
stack
page read and write
7F59000
heap
page read and write
DFE000
unkown
page execute and read and write
E4E000
stack
page read and write
CD2000
unkown
page execute and read and write
1244000
heap
page read and write
4E11000
heap
page read and write
5480000
direct allocation
page execute and read and write
1853000
heap
page read and write
3C6F000
stack
page read and write
A34000
heap
page read and write
19ECF4C0000
remote allocation
page read and write
364F000
stack
page read and write
29417D000
stack
page read and write
19ECAA40000
trusted library allocation
page read and write
7F47000
heap
page read and write
7CA2000
heap
page read and write
1364000
heap
page read and write
3E24000
heap
page read and write
8C2000
unkown
page readonly
164C000
heap
page read and write
4E11000
heap
page read and write
3B6A000
heap
page read and write
11A4000
heap
page read and write
7DB2000
heap
page read and write
720000
unkown
page readonly
1704000
heap
page read and write
1462000
heap
page read and write
4C2E000
stack
page read and write
19EC9B70000
heap
page read and write
4B51000
heap
page read and write
4FB1000
heap
page read and write
3D43000
heap
page read and write
3A6E000
stack
page read and write
7CE0000
heap
page read and write
4FB1000
heap
page read and write
80F2000
heap
page read and write
3B62000
heap
page read and write
16EF000
heap
page read and write
13C0000
direct allocation
page read and write
15B4000
heap
page read and write
4B51000
heap
page read and write
7D7A000
heap
page read and write
7FFD9B7A6000
trusted library allocation
page read and write
6F9D000
heap
page read and write
26F0000
direct allocation
page read and write
358E000
stack
page read and write
54A0000
direct allocation
page execute and read and write
F80000
heap
page read and write
111A000
heap
page read and write
ED4000
heap
page read and write
1555000
heap
page read and write
48D0000
direct allocation
page execute and read and write
12FA000
heap
page read and write
41CE000
stack
page read and write
7F71000
heap
page read and write
4DDE000
stack
page read and write
66C6000
heap
page read and write
313B000
stack
page read and write
7FFD9B71B000
trusted library allocation
page read and write
1CA55221000
trusted library allocation
page read and write
4CD0000
direct allocation
page execute and read and write
17E3B65F000
heap
page read and write
7CBA000
heap
page read and write
2C1F000
stack
page read and write
1632000
heap
page read and write
19ECF30A000
heap
page read and write
3B09000
heap
page read and write
B47000
unkown
page execute and write copy
19ECF48E000
trusted library allocation
page read and write
39F2000
heap
page read and write
4B51000
heap
page read and write
812D000
heap
page read and write
F76000
unkown
page execute and write copy
4CBE000
stack
page read and write
7DF467AB0000
trusted library allocation
page execute and read and write
7FC4000
heap
page read and write
3B8E000
stack
page read and write
1410000
direct allocation
page read and write
7DF4D58E0000
trusted library allocation
page execute and read and write
11A4000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1320000
heap
page read and write
4E11000
heap
page read and write
DFE000
unkown
page execute and read and write
50A0000
heap
page read and write
812B000
heap
page read and write
1310000
heap
page read and write
4721000
heap
page read and write
50F0000
direct allocation
page execute and read and write
1CA6D6EE000
heap
page read and write
1410000
direct allocation
page read and write
3B8D000
heap
page read and write
22A82562000
heap
page read and write
17E211CE000
heap
page read and write
52B0000
direct allocation
page execute and read and write
8DB7F7E000
unkown
page readonly
DDA000
unkown
page execute and write copy
786000
unkown
page write copy
7FFD9B8AA000
trusted library allocation
page read and write
DFF000
stack
page read and write
19ECAB50000
trusted library section
page readonly
47CE000
stack
page read and write
13E5000
heap
page read and write
5470000
direct allocation
page execute and read and write
4FB1000
heap
page read and write
5539000
heap
page read and write
458E000
stack
page read and write
420000
unkown
page execute and read and write
42C0000
heap
page read and write
51B3000
direct allocation
page read and write
19ECF400000
trusted library allocation
page read and write
42B1000
heap
page read and write
1CA534A2000
heap
page read and write
ED4000
heap
page read and write
CC4000
unkown
page execute and read and write
5460000
direct allocation
page execute and read and write
312F000
stack
page read and write
167E000
stack
page read and write
82E0000
trusted library allocation
page read and write
3A2E000
stack
page read and write
42B1000
heap
page read and write
3E1A000
heap
page read and write
1674000
heap
page read and write
A27000
unkown
page execute and write copy
7ADE000
heap
page read and write
7F31000
heap
page read and write
177A000
heap
page read and write
14F8000
heap
page read and write
4DC1000
heap
page read and write
7D1C000
heap
page read and write
5120000
direct allocation
page execute and read and write
1421000
heap
page read and write
1244000
heap
page read and write
359F000
stack
page read and write
4721000
heap
page read and write
7FC4000
heap
page read and write
811C000
heap
page read and write
468F000
stack
page read and write
1CA56531000
trusted library allocation
page read and write
6C8000
unkown
page execute and read and write
1390000
heap
page read and write
F7D000
stack
page read and write
7F82000
heap
page read and write
44E000
stack
page read and write
3C30000
heap
page read and write
3B94000
heap
page read and write
3C04000
heap
page read and write
7FCF000
heap
page read and write
1462000
heap
page read and write
5010000
direct allocation
page execute and read and write
3E06000
heap
page read and write
7D02000
heap
page read and write
272D000
heap
page read and write
4E20000
direct allocation
page execute and read and write
1CA65241000
trusted library allocation
page read and write
42B1000
heap
page read and write
2326000
heap
page read and write
4721000
heap
page read and write
4E11000
heap
page read and write
CD0000
unkown
page execute and read and write
3A05000
heap
page read and write
15A0000
direct allocation
page read and write
1615000
heap
page read and write
17E3B0F0000
heap
page execute and read and write
4DC1000
heap
page read and write
17E2440B000
trusted library allocation
page read and write
11F0000
heap
page read and write
3C56000
heap
page read and write
22BD7270000
trusted library allocation
page read and write
14BCA3E000
stack
page read and write
7B2E000
stack
page read and write
4A81000
heap
page read and write
41E3000
heap
page read and write
1684000
heap
page read and write
614000
heap
page read and write
7F59000
heap
page read and write
440E000
stack
page read and write
4DC1000
heap
page read and write
8CC000
unkown
page read and write
4A81000
heap
page read and write
168B000
heap
page read and write
D5F000
unkown
page execute and write copy
3B72000
heap
page read and write
4E11000
heap
page read and write
4FB0000
heap
page read and write
CD0000
unkown
page execute and write copy
5FC000
stack
page read and write
3AF5000
heap
page read and write
1C0000
heap
page read and write
4DC1000
heap
page read and write
EE4000
unkown
page execute and write copy
440F000
stack
page read and write
4D3E000
stack
page read and write
17E3B1F1000
heap
page read and write
1244000
heap
page read and write
7F84000
heap
page read and write
7F76000
heap
page read and write
B3B000
unkown
page execute and write copy
195D000
heap
page read and write
15EE000
heap
page read and write
1CA5529B000
trusted library allocation
page read and write
6C8CD000
unkown
page readonly
3A59000
heap
page read and write
41CE000
stack
page read and write
B39000
unkown
page read and write
1684000
heap
page read and write
498E000
stack
page read and write
354E000
stack
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
203057EA000
heap
page read and write
3B2F000
stack
page read and write
4EC0000
remote allocation
page read and write
AD0000
unkown
page readonly
4B0E000
stack
page read and write
12B1000
heap
page read and write
4DC1000
heap
page read and write
11A4000
heap
page read and write
7CE8000
heap
page read and write
17A3000
heap
page read and write
4721000
heap
page read and write
48F0000
direct allocation
page execute and read and write
7F3C000
heap
page read and write
3B4A000
heap
page read and write
3B2C000
heap
page read and write
411E000
stack
page read and write
4A81000
heap
page read and write
17E24464000
trusted library allocation
page read and write
7001000
heap
page read and write
43BF000
stack
page read and write
7F3C000
heap
page read and write
18CA000
heap
page read and write
46CE000
stack
page read and write
D45000
unkown
page execute and read and write
614000
heap
page read and write
EA0000
direct allocation
page read and write
137D000
heap
page read and write
A42000
unkown
page execute and read and write
1456000
heap
page read and write
1684000
heap
page read and write
1CA56E45000
trusted library allocation
page read and write
D58000
unkown
page execute and read and write
3BAE000
heap
page read and write
22BD7150000
heap
page read and write
7FFD9BA23000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
8020000
trusted library allocation
page read and write
3D1A000
heap
page read and write
71DE000
stack
page read and write
19EC9CA0000
heap
page read and write
53E0000
direct allocation
page execute and read and write
4F51000
heap
page read and write
8127000
heap
page read and write
430E000
stack
page read and write
4BA0000
direct allocation
page read and write
1818000
heap
page read and write
7F57000
heap
page read and write
DEF000
unkown
page execute and write copy
3B7A000
heap
page read and write
749E000
stack
page read and write
30DE000
stack
page read and write
350E000
stack
page read and write
19ECA3C1000
trusted library allocation
page read and write
13D8000
heap
page read and write
8C2000
unkown
page readonly
D77000
unkown
page execute and read and write
3BFB000
heap
page read and write
3A8E000
stack
page read and write
1400000
direct allocation
page read and write
3952000
heap
page read and write
4B60000
heap
page read and write
108E000
heap
page read and write
4E11000
heap
page read and write
4B51000
heap
page read and write
13BE000
heap
page read and write
1014000
unkown
page execute and read and write
D77000
unkown
page execute and read and write
4C80000
direct allocation
page execute and read and write
5010000
direct allocation
page execute and read and write
7DA2000
heap
page read and write
D05000
unkown
page execute and read and write
BC1000
unkown
page execute and read and write
1465000
heap
page read and write
1244000
heap
page read and write
7CBA000
heap
page read and write
12E1000
heap
page read and write
7F31000
heap
page read and write
14FB000
stack
page read and write
19ECAB70000
trusted library section
page readonly
7F86000
heap
page read and write
4B50000
heap
page read and write
1886000
heap
page read and write
7CA4000
heap
page read and write
7F57000
heap
page read and write
79D0000
remote allocation
page read and write
17E32EF1000
trusted library allocation
page read and write
3B13000
heap
page read and write
10D5000
heap
page read and write
4FB1000
heap
page read and write
1471000
heap
page read and write
8DB6EDB000
stack
page read and write
2D4B000
heap
page read and write
19EC9C43000
heap
page read and write
12FA000
stack
page read and write
10E8000
heap
page read and write
5400000
direct allocation
page execute and read and write
14E5000
heap
page read and write
3B8E000
stack
page read and write
670000
direct allocation
page read and write
4E11000
heap
page read and write
DE7000
unkown
page execute and read and write
4DC1000
heap
page read and write
630000
unkown
page readonly
3D7F000
stack
page read and write
D63000
unkown
page execute and read and write
52F0000
direct allocation
page execute and read and write
42B1000
heap
page read and write
4E11000
heap
page read and write
39F2000
heap
page read and write
3A6B000
heap
page read and write
8010000
trusted library allocation
page read and write
4E11000
heap
page read and write
54FD000
stack
page read and write
7F3D000
heap
page read and write
13E5000
heap
page read and write
1864000
heap
page read and write
7FFD9BB46000
trusted library allocation
page read and write
138C000
heap
page read and write
4E11000
heap
page read and write
8157000
heap
page read and write
178F000
stack
page read and write
D6B000
unkown
page execute and write copy
F7E000
stack
page read and write
7D9F000
heap
page read and write
1684000
heap
page read and write
EC8000
unkown
page execute and read and write
EDB000
unkown
page execute and write copy
7CF3000
heap
page read and write
149E000
heap
page read and write
4E20000
heap
page read and write
B3B000
unkown
page execute and write copy
7FFD9B900000
trusted library allocation
page read and write
7FA4000
heap
page read and write
14F4000
heap
page read and write
4F90000
direct allocation
page read and write
393F000
heap
page read and write
10E6000
heap
page read and write
42B1000
heap
page read and write
7CFD000
heap
page read and write
F90000
direct allocation
page read and write
42B1000
heap
page read and write
13EF000
heap
page read and write
1648000
heap
page read and write
7A3E000
stack
page read and write
EA0000
direct allocation
page read and write
CC0000
unkown
page execute and read and write
15B4000
heap
page read and write
D02000
unkown
page execute and read and write
17E3B58F000
heap
page read and write
22A827B5000
heap
page read and write
38BF000
heap
page read and write
1674000
heap
page read and write
DE7000
unkown
page execute and read and write
1571000
heap
page read and write
4E11000
heap
page read and write
7F95000
heap
page read and write
7F60000
heap
page read and write
6A6F000
stack
page read and write
53D0000
direct allocation
page execute and read and write
50E0000
direct allocation
page execute and read and write
1855000
heap
page read and write
2EAE000
stack
page read and write
35FF000
stack
page read and write
DEF000
unkown
page execute and write copy
5400000
direct allocation
page execute and read and write
15DE000
heap
page read and write
12FF000
heap
page read and write
2320000
heap
page read and write
42B1000
heap
page read and write
1574000
heap
page read and write
144D000
heap
page read and write
F90000
direct allocation
page read and write
B39000
unkown
page write copy
4E11000
heap
page read and write
7CB3000
heap
page read and write
3AA7000
heap
page read and write
133E000
heap
page read and write
3B77000
heap
page read and write
53CF000
stack
page read and write
7F57000
heap
page read and write
3C25000
heap
page read and write
4E11000
heap
page read and write
7F81000
heap
page read and write
42B1000
heap
page read and write
8154000
heap
page read and write
FDA000
unkown
page execute and read and write
127F000
stack
page read and write
935C000
stack
page read and write
3A4E000
stack
page read and write
1CA55210000
heap
page execute and read and write
31CE000
stack
page read and write
3BB7000
heap
page read and write
90B000
stack
page read and write
8119000
heap
page read and write
3935000
heap
page read and write
8DB7477000
stack
page read and write
1684000
heap
page read and write
1220000
heap
page read and write
1684000
heap
page read and write
89C000
unkown
page readonly
38BE000
stack
page read and write
5010000
direct allocation
page execute and read and write
1584000
heap
page read and write
D40000
unkown
page execute and write copy
7FFD9B75C000
trusted library allocation
page execute and read and write
6D652FB000
stack
page read and write
2CFE000
stack
page read and write
12D4000
heap
page read and write
30AF000
stack
page read and write
3B13000
heap
page read and write
42B1000
heap
page read and write
1CA6D6F1000
heap
page read and write
17E4000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
8DB807E000
unkown
page readonly
18DF000
heap
page read and write
7F0A000
heap
page read and write
670000
direct allocation
page read and write
D3A000
unkown
page execute and read and write
408F000
stack
page read and write
309F000
stack
page read and write
19ECF4C2000
trusted library allocation
page read and write
CD0000
unkown
page execute and write copy
6D651FC000
stack
page read and write
7F59000
heap
page read and write
4B61000
heap
page read and write
4DC1000
heap
page read and write
30F7000
heap
page read and write
2F9E000
stack
page read and write
4CCF000
stack
page read and write
731D000
stack
page read and write
8DB887B000
stack
page read and write
1574000
heap
page read and write
11A4000
heap
page read and write
7D1C000
heap
page read and write
10EB000
heap
page read and write
39B8000
heap
page read and write
103E000
stack
page read and write
39C5000
heap
page read and write
7D91000
heap
page read and write
1679000
heap
page read and write
3AA8000
heap
page read and write
55DE000
stack
page read and write
16C1000
heap
page read and write
140B000
heap
page read and write
1294000
heap
page read and write
7D2B000
heap
page read and write
614000
heap
page read and write
18D3000
heap
page read and write
46AE000
stack
page read and write
CAB000
unkown
page execute and write copy
1421000
heap
page read and write
1244000
heap
page read and write
392B000
heap
page read and write
41E4000
heap
page read and write
19ECF300000
heap
page read and write
7F84000
heap
page read and write
7FFD9B8E0000
trusted library allocation
page execute and read and write
6D6490E000
unkown
page read and write
4E11000
heap
page read and write
13A8000
heap
page read and write
10CC000
heap
page read and write
4C40000
direct allocation
page execute and read and write
468E000
stack
page read and write
8DB85FE000
stack
page read and write
CD9000
unkown
page execute and read and write
DE6000
unkown
page execute and write copy
ED4000
heap
page read and write
1555000
heap
page read and write
1574000
heap
page read and write
F6E000
unkown
page execute and write copy
58C0000
heap
page read and write
4A81000
heap
page read and write
4E11000
heap
page read and write
46EF000
stack
page read and write
4721000
heap
page read and write
19ECA400000
heap
page read and write
1574000
heap
page read and write
17E211D2000
heap
page read and write
7F31000
heap
page read and write
AD0000
unkown
page read and write
19ECF100000
trusted library allocation
page read and write
F77000
unkown
page execute and write copy
470E000
stack
page read and write
FB0000
heap
page read and write
5140000
direct allocation
page execute and read and write
4B51000
heap
page read and write
168B000
heap
page read and write
8DB897E000
unkown
page readonly
7CC6000
heap
page read and write
7CA6000
heap
page read and write
614000
heap
page read and write
3BB3000
heap
page read and write
1A7D000
stack
page read and write
461E000
stack
page read and write
1574000
heap
page read and write
902000
unkown
page execute and read and write
800000
unkown
page readonly
7F81000
heap
page read and write
11A4000
heap
page read and write
6BC000
stack
page read and write
7F94000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
3D81000
heap
page read and write
7EF12FD000
unkown
page read and write
8010000
trusted library allocation
page read and write
AD0000
unkown
page readonly
74DE000
stack
page read and write
B34000
unkown
page execute and read and write
5040000
direct allocation
page execute and read and write
15CA000
heap
page read and write
6D65CCE000
stack
page read and write
3C55000
heap
page read and write
4B4F000
stack
page read and write
3853000
heap
page read and write
18C9000
heap
page read and write
161E000
stack
page read and write
7F47000
heap
page read and write
8120000
heap
page read and write
7F8D000
heap
page read and write
385E000
stack
page read and write
3CA6000
heap
page read and write
1684000
heap
page read and write
14BE000
heap
page read and write
1853000
heap
page read and write
786F000
stack
page read and write
3C3F000
stack
page read and write
440F000
stack
page read and write
7CD1000
heap
page read and write
123D000
heap
page read and write
4910000
direct allocation
page execute and read and write
3F2F000
stack
page read and write
1370000
heap
page read and write
2F07000
heap
page read and write
17E3B140000
heap
page execute and read and write
15D4000
heap
page read and write
4FA1000
heap
page read and write
4DC1000
heap
page read and write
2B5E000
stack
page read and write
14BC47E000
stack
page read and write
3A10000
heap
page read and write
502E000
stack
page read and write
4DC1000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
17E211D8000
heap
page read and write
4E10000
direct allocation
page execute and read and write
5440000
direct allocation
page read and write
4721000
heap
page read and write
17E2443A000
trusted library allocation
page read and write
48BF000
stack
page read and write
7F57000
heap
page read and write
D00000
unkown
page execute and write copy
1222000
heap
page read and write
11B000
stack
page read and write
7F84000
heap
page read and write
5150000
direct allocation
page execute and read and write
31AE000
stack
page read and write
3B1C000
heap
page read and write
4B51000
heap
page read and write
14E2000
heap
page read and write
17E211EE000
heap
page read and write
19EC9BB0000
trusted library section
page read and write
1360000
heap
page read and write
7CBA000
heap
page read and write
17E3B20E000
heap
page read and write
37D4000
heap
page read and write
17E3B530000
heap
page read and write
7D43000
heap
page read and write
8010000
trusted library allocation
page read and write
178C000
heap
page read and write
42B1000
heap
page read and write
4E11000
heap
page read and write
2F70000
heap
page read and write
5130000
direct allocation
page execute and read and write
7F65000
heap
page read and write
1400000
direct allocation
page read and write
D02000
unkown
page execute and read and write
E71000
unkown
page execute and write copy
22A841E0000
heap
page read and write
14BC9BE000
stack
page read and write
EC3000
unkown
page execute and write copy
1684000
heap
page read and write
1CA53750000
heap
page read and write
19EC9C2B000
heap
page read and write
E30000
heap
page read and write
7F15000
heap
page read and write
4FB1000
heap
page read and write
4A80000
heap
page read and write
11A4000
heap
page read and write
4C90000
direct allocation
page execute and read and write
11A4000
heap
page read and write
631000
unkown
page execute and write copy
3E2E000
stack
page read and write
14DF000
heap
page read and write
7FFD9BB20000
trusted library allocation
page read and write
19ECF2F6000
heap
page read and write
CD1000
unkown
page write copy
80E8C7B000
stack
page read and write
4DC1000
heap
page read and write
AD0000
unkown
page readonly
12A6000
heap
page read and write
18E7000
heap
page read and write
3A51000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7F57000
heap
page read and write
1364000
heap
page read and write
3F9F000
stack
page read and write
135B000
heap
page read and write
7DB2000
heap
page read and write
45EF000
stack
page read and write
4DC1000
heap
page read and write
7F59000
heap
page read and write
32CE000
stack
page read and write
17A4000
heap
page read and write
770000
unkown
page execute and read and write
39A2000
heap
page read and write
11A4000
heap
page read and write
428E000
stack
page read and write
1CA53490000
heap
page read and write
4DC1000
heap
page read and write
7F6F000
heap
page read and write
4A81000
heap
page read and write
7F15000
heap
page read and write
71A0000
heap
page read and write
1503000
heap
page read and write
1130000
heap
page read and write
3D43000
heap
page read and write
545000
heap
page read and write
A43000
unkown
page execute and write copy
7F71000
heap
page read and write
306E000
stack
page read and write
19ECF491000
trusted library allocation
page read and write
3A7D000
heap
page read and write
4E11000
heap
page read and write
8136000
heap
page read and write
1589000
heap
page read and write
66C0000
heap
page read and write
7D1C000
heap
page read and write
3BD6000
heap
page read and write
15D4000
heap
page read and write
5CE000
stack
page read and write
7EF0F54000
stack
page read and write
400F000
stack
page read and write
458E000
stack
page read and write
7F57000
heap
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
CA4000
unkown
page execute and read and write
7490000
heap
page read and write
13B4000
heap
page read and write
7CB1000
heap
page read and write
4C9E000
stack
page read and write
4DC1000
heap
page read and write
4F51000
heap
page read and write
3C5A000
heap
page read and write
7CE0000
heap
page read and write
316F000
stack
page read and write
16B4000
heap
page read and write
497C000
stack
page read and write
42B1000
heap
page read and write
143D000
heap
page read and write
7FFD9BAB9000
trusted library allocation
page read and write
4B61000
heap
page read and write
FF3CB2E000
stack
page read and write
4F90000
direct allocation
page read and write
1249000
heap
page read and write
1A30000
heap
page read and write
13B9000
heap
page read and write
1DDF1560000
trusted library allocation
page read and write
364E000
stack
page read and write
13EF000
heap
page read and write
D58000
unkown
page execute and read and write
8154000
heap
page read and write
614000
heap
page read and write
ED0000
heap
page read and write
A2A000
unkown
page execute and read and write
7D7E000
heap
page read and write
1311000
heap
page read and write
1DDF1386000
heap
page read and write
3B3E000
stack
page read and write
145B000
heap
page read and write
2FFF000
stack
page read and write
4DC1000
heap
page read and write
12D4000
heap
page read and write
1818000
heap
page read and write
13D5000
heap
page read and write
15D4000
heap
page read and write
3EBF000
stack
page read and write
42B1000
heap
page read and write
7CDA000
heap
page read and write
3B6B000
heap
page read and write
12D4000
heap
page read and write
1504000
heap
page read and write
12EB000
heap
page read and write
203073E0000
heap
page read and write
4A70000
direct allocation
page read and write
1113000
heap
page read and write
7CB1000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7F8D000
heap
page read and write
6C8C4000
unkown
page readonly
15B4000
heap
page read and write
7F57000
heap
page read and write
1101000
heap
page read and write
5110000
direct allocation
page execute and read and write
779E000
stack
page read and write
4DC1000
heap
page read and write
1400000
direct allocation
page read and write
87F000
stack
page read and write
550E000
stack
page read and write
E1D000
stack
page read and write
15AF000
heap
page read and write
A26000
unkown
page execute and write copy
7FFD9BA50000
trusted library allocation
page read and write
E5C000
unkown
page execute and read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
8D4000
unkown
page readonly
42B1000
heap
page read and write
4E11000
heap
page read and write
4E11000
heap
page read and write
15B4000
heap
page read and write
2C2F000
stack
page read and write
7FD6000
heap
page read and write
53E0000
direct allocation
page execute and read and write
3DEF000
heap
page read and write
16B4000
heap
page read and write
7D13000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
1400000
direct allocation
page read and write
3F0E000
stack
page read and write
4BCE000
stack
page read and write
79DF000
stack
page read and write
2D40000
heap
page read and write
4F51000
heap
page read and write
5684000
heap
page read and write
506F000
stack
page read and write
CC5000
unkown
page write copy
1360000
heap
page read and write
4B50000
direct allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
4F51000
heap
page read and write
5100000
direct allocation
page execute and read and write
16B2000
heap
page read and write
762E000
stack
page read and write
B39000
unkown
page read and write
380E000
stack
page read and write
7D90000
remote allocation
page read and write
7CE8000
heap
page read and write
11F0000
heap
page read and write
A34000
heap
page read and write
38B5000
heap
page read and write
4F51000
heap
page read and write
83D0000
trusted library allocation
page read and write
4DC1000
heap
page read and write
7F46000
heap
page read and write
58E000
stack
page read and write
6CBC000
stack
page read and write
3D5D000
heap
page read and write
19ECF120000
trusted library allocation
page read and write
4B51000
heap
page read and write
1737000
heap
page read and write
4E11000
heap
page read and write
812B000
heap
page read and write
3AB5000
heap
page read and write
16C5000
heap
page read and write
AD0000
unkown
page readonly
1DDF10F0000
heap
page read and write
381F000
stack
page read and write
7D9F000
heap
page read and write
4F51000
heap
page read and write
11A4000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
614000
heap
page read and write
3D66000
heap
page read and write
1684000
heap
page read and write
15D4000
heap
page read and write
3C8A000
heap
page read and write
CEB000
unkown
page execute and write copy
1030000
heap
page read and write
1692000
heap
page read and write
7F70000
heap
page read and write
42B1000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
414F000
stack
page read and write
19ECF415000
trusted library allocation
page read and write
1410000
direct allocation
page read and write
165D000
heap
page read and write
1410000
direct allocation
page read and write
523D000
stack
page read and write
3DCE000
stack
page read and write
26F0000
direct allocation
page read and write
7FA3000
heap
page read and write
444E000
stack
page read and write
12FD000
heap
page read and write
7FFD9B71D000
trusted library allocation
page execute and read and write
7FFD9BB10000
trusted library allocation
page execute and read and write
3A2E000
heap
page read and write
4F90000
direct allocation
page read and write
13C9000
heap
page read and write
1CA6D6D1000
heap
page read and write
811B000
heap
page read and write
1670000
direct allocation
page read and write
1571000
heap
page read and write
4E11000
heap
page read and write
B39000
unkown
page write copy
7FFD9BA5C000
trusted library allocation
page read and write
20305730000
heap
page read and write
1660000
heap
page read and write
195D000
heap
page read and write
3DAF000
stack
page read and write
546F000
stack
page read and write
577F000
stack
page read and write
3A62000
heap
page read and write
11A4000
heap
page read and write
4E11000
heap
page read and write
26F0000
direct allocation
page read and write
4FA0000
direct allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
D87000
unkown
page execute and write copy
781000
unkown
page write copy
7FAD000
heap
page read and write
1633000
heap
page read and write
3C8F000
stack
page read and write
54C0000
direct allocation
page execute and read and write
1200000
heap
page read and write
7FFD9BB70000
trusted library allocation
page read and write
7FFD9B8C0000
trusted library allocation
page execute and read and write
7FFD9BB30000
trusted library allocation
page read and write
6D64D7E000
stack
page read and write
4DC1000
heap
page read and write
7F47000
heap
page read and write
7CF2000
heap
page read and write
DED000
unkown
page execute and read and write
42B1000
heap
page read and write
1684000
heap
page read and write
1585000
heap
page read and write
ED4000
heap
page read and write
D74000
unkown
page execute and write copy
AD1000
unkown
page execute and write copy
ED4000
heap
page read and write
1CA54DA9000
heap
page read and write
1CA6551F000
trusted library allocation
page read and write
739000
heap
page read and write
4CDF000
direct allocation
page read and write
47CF000
stack
page read and write
5470000
direct allocation
page execute and read and write
4A8E000
stack
page read and write
1213000
heap
page read and write
11CB000
unkown
page execute and write copy
12D4000
heap
page read and write
1364000
heap
page read and write
7FBB000
heap
page read and write
38CE000
stack
page read and write
6D64CF9000
stack
page read and write
1705000
heap
page read and write
4DC1000
heap
page read and write
EC7000
unkown
page execute and write copy
E75000
unkown
page execute and read and write
865000
unkown
page execute and read and write
15D1000
heap
page read and write
17FD000
heap
page read and write
34EF000
stack
page read and write
4B50000
direct allocation
page read and write
4F10000
trusted library allocation
page read and write
1621000
heap
page read and write
4A81000
heap
page read and write
4DC1000
heap
page read and write
7F31000
heap
page read and write
18DE000
heap
page read and write
42C8000
heap
page read and write
14CF000
heap
page read and write
5550000
direct allocation
page execute and read and write
4BF0000
direct allocation
page execute and read and write
5010000
direct allocation
page execute and read and write
7D1C000
heap
page read and write
4E11000
heap
page read and write
AD0000
unkown
page read and write
16DA000
heap
page read and write
7F94000
heap
page read and write
3A0E000
stack
page read and write
80E8A7E000
stack
page read and write
7CBA000
heap
page read and write
4DC1000
heap
page read and write
39CC000
heap
page read and write
50E0000
direct allocation
page execute and read and write
12AE000
heap
page read and write
60F000
stack
page read and write
1684000
heap
page read and write
3D5D000
heap
page read and write
1DDF2D00000
heap
page read and write
8020000
trusted library allocation
page read and write
89C000
unkown
page readonly
129E000
heap
page read and write
814E000
heap
page read and write
7F8D000
heap
page read and write
7700000
heap
page read and write
EA0000
direct allocation
page read and write
ED4000
heap
page read and write
A26000
unkown
page execute and read and write
47CF000
stack
page read and write
578F000
stack
page read and write
3ADB000
heap
page read and write
37AE000
stack
page read and write
5110000
trusted library allocation
page read and write
4E11000
heap
page read and write
39EF000
stack
page read and write
13D0000
heap
page read and write
2ED0000
direct allocation
page read and write
5400000
direct allocation
page execute and read and write
1844000
heap
page read and write
ED4000
heap
page read and write
4FB1000
heap
page read and write
ED4000
heap
page read and write
7F15000
heap
page read and write
614000
heap
page read and write
9E0000
heap
page read and write
54D0000
direct allocation
page execute and read and write
3DB0000
heap
page read and write
7CEE000
heap
page read and write
3C93000
heap
page read and write
4A81000
heap
page read and write
4DC1000
heap
page read and write
3B4F000
stack
page read and write
2050000
heap
page read and write
EA5000
unkown
page execute and write copy
E90000
heap
page read and write
5100000
direct allocation
page execute and read and write
38EF000
stack
page read and write
2D6F000
stack
page read and write
19ECF464000
trusted library allocation
page read and write
7D73000
heap
page read and write
4E3F000
stack
page read and write
AD1000
unkown
page execute and write copy
16B1000
heap
page read and write
427F000
stack
page read and write
1CA6D430000
heap
page execute and read and write
29AF000
stack
page read and write
7D96000
heap
page read and write
2710000
direct allocation
page execute and read and write
8DB767E000
stack
page read and write
6D64C7F000
stack
page read and write
7D1C000
heap
page read and write
670000
direct allocation
page read and write
1244000
heap
page read and write
7FFD9BB20000
trusted library allocation
page read and write
4A81000
heap
page read and write
721E000
stack
page read and write
46CE000
stack
page read and write
12B8000
heap
page read and write
19ECA415000
heap
page read and write
5110000
direct allocation
page execute and read and write
7FFD9BAA0000
trusted library allocation
page read and write
135E000
heap
page read and write
735E000
stack
page read and write
4DC1000
heap
page read and write
17E24424000
trusted library allocation
page read and write
3CCE000
stack
page read and write
3B45000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
5300000
direct allocation
page execute and read and write
6FE8000
heap
page read and write
1CA6D609000
heap
page read and write
14C2000
heap
page read and write
DD7000
unkown
page execute and write copy
104E000
stack
page read and write
79E0000
remote allocation
page read and write
4B51000
heap
page read and write
37CE000
stack
page read and write
54B0000
direct allocation
page execute and read and write
7FFD9B7AC000
trusted library allocation
page execute and read and write
8CC000
unkown
page write copy
4DC1000
heap
page read and write
19ECF418000
trusted library allocation
page read and write
F90000
direct allocation
page read and write
73E000
heap
page read and write
378F000
stack
page read and write
6D65077000
stack
page read and write
82E0000
trusted library allocation
page read and write
A26000
unkown
page execute and write copy
1684000
heap
page read and write
670000
direct allocation
page read and write
4E11000
heap
page read and write
203057F8000
heap
page read and write
3A30000
heap
page read and write
4B51000
heap
page read and write
FB7000
heap
page read and write
7F59000
heap
page read and write
D8A000
unkown
page execute and read and write
50C0000
direct allocation
page execute and read and write
335E000
stack
page read and write
42B1000
heap
page read and write
3CF5000
heap
page read and write
3B13000
heap
page read and write
7F47000
heap
page read and write
12FF000
heap
page read and write
D45000
unkown
page execute and read and write
7DB2000
heap
page read and write
7CE0000
heap
page read and write
1671000
heap
page read and write
A34000
heap
page read and write
408E000
stack
page read and write
195D000
heap
page read and write
385D000
heap
page read and write
3F0F000
stack
page read and write
1303000
heap
page read and write
3BFB000
heap
page read and write
7DA8000
heap
page read and write
1684000
heap
page read and write
19ECF4A0000
trusted library allocation
page read and write
8010000
trusted library allocation
page read and write
122E000
heap
page read and write
1670000
direct allocation
page read and write
3C60000
heap
page read and write
3A18000
heap
page read and write
1574000
heap
page read and write
4C10000
direct allocation
page execute and read and write
50E0000
direct allocation
page execute and read and write
7F6F000
heap
page read and write
7F83000
heap
page read and write
7D31000
heap
page read and write
B3B000
unkown
page execute and read and write
8159000
heap
page read and write
3DCE000
stack
page read and write
1CA56173000
trusted library allocation
page read and write
788000
unkown
page execute and read and write
7F81000
heap
page read and write
32CF000
stack
page read and write
22BD71EF000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
13FE000
heap
page read and write
B80000
unkown
page read and write
9D1000
unkown
page execute and read and write
184F000
heap
page read and write
7CF3000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
22BD7270000
trusted library allocation
page read and write
A20000
heap
page read and write
4DC1000
heap
page read and write
713D000
stack
page read and write
782000
unkown
page execute and read and write
1CA65230000
trusted library allocation
page read and write
215E000
stack
page read and write
17E234C5000
trusted library allocation
page read and write
4E11000
heap
page read and write
CEB000
unkown
page execute and write copy
15C2000
heap
page read and write
7F31000
heap
page read and write
6D64EF9000
stack
page read and write
3020000
heap
page read and write
D0C000
stack
page read and write
5440000
direct allocation
page execute and read and write
1720000
heap
page read and write
7F0D000
heap
page read and write
E1C000
unkown
page execute and write copy
4E11000
heap
page read and write
368E000
stack
page read and write
1574000
heap
page read and write
1854000
heap
page read and write
15D0000
heap
page read and write
55A0000
heap
page read and write
191C000
heap
page read and write
3D8B000
heap
page read and write
3C0E000
heap
page read and write
1661000
heap
page read and write
12B8000
heap
page read and write
DEF000
unkown
page execute and write copy
17E21283000
heap
page read and write
19ECF4FC000
trusted library allocation
page read and write
15B4000
heap
page read and write
2941FE000
stack
page read and write
3705000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
345F000
stack
page read and write
19ECF258000
heap
page read and write
1574000
heap
page read and write
D4D000
stack
page read and write
7D24000
heap
page read and write
7C9D000
heap
page read and write
4E10000
heap
page read and write
19EC9C95000
heap
page read and write
4E11000
heap
page read and write
120E000
stack
page read and write
886C000
stack
page read and write
1533000
heap
page read and write
7CFB000
heap
page read and write
5080000
direct allocation
page execute and read and write
F77000
unkown
page execute and write copy
430E000
stack
page read and write
162A000
heap
page read and write
2940FB000
stack
page read and write
34FE000
stack
page read and write
1878000
heap
page read and write
4A4E000
stack
page read and write
7D09000
heap
page read and write
3C30000
heap
page read and write
1608000
heap
page read and write
42B1000
heap
page read and write
4F90000
trusted library allocation
page read and write
CAA000
unkown
page execute and read and write
7D90000
remote allocation
page read and write
ED4000
heap
page read and write
80E0000
heap
page read and write
4FB1000
heap
page read and write
13CF000
stack
page read and write
13FE000
stack
page read and write
7F57000
heap
page read and write
306E000
stack
page read and write
125C000
heap
page read and write
801000
unkown
page execute read
7CF2000
heap
page read and write
ED4000
heap
page read and write
1862000
heap
page read and write
42B1000
heap
page read and write
3ED5000
heap
page read and write
7FC3000
heap
page read and write
3C0E000
heap
page read and write
192D000
heap
page read and write
42B0000
heap
page read and write
4B61000
heap
page read and write
19ECF254000
heap
page read and write
1574000
heap
page read and write
8670000
heap
page read and write
19EC9B60000
heap
page read and write
12FF000
heap
page read and write
5A3E000
stack
page read and write
5400000
direct allocation
page execute and read and write
3C30000
heap
page read and write
42CE000
stack
page read and write
3E06000
heap
page read and write
33EF000
stack
page read and write
ED4000
heap
page read and write
8143000
heap
page read and write
39A7000
heap
page read and write
45CE000
stack
page read and write
1A2E000
stack
page read and write
ECF000
unkown
page execute and write copy
7CBA000
heap
page read and write
22BD7340000
trusted library allocation
page read and write
458F000
stack
page read and write
14D2000
heap
page read and write
B39000
unkown
page read and write
CC4000
unkown
page execute and read and write
3A0B000
heap
page read and write
39A3000
heap
page read and write
14B0000
heap
page read and write
3CC9000
heap
page read and write
1CA65298000
trusted library allocation
page read and write
1218000
heap
page read and write
76FF000
stack
page read and write
4F51000
heap
page read and write
7CE8000
heap
page read and write
DEF000
unkown
page execute and write copy
15B4000
heap
page read and write
C3E000
stack
page read and write
4F51000
heap
page read and write
3B6E000
stack
page read and write
53E0000
direct allocation
page execute and read and write
4A81000
heap
page read and write
4E11000
heap
page read and write
13FE000
heap
page read and write
3A2D000
heap
page read and write
318F000
stack
page read and write
4CD1000
heap
page read and write
4890000
direct allocation
page execute and read and write
3EA8000
heap
page read and write
7E40000
remote allocation
page read and write
17E22F76000
trusted library allocation
page read and write
12B1000
heap
page read and write
7F3C000
heap
page read and write
15D4000
heap
page read and write
DE8000
unkown
page execute and write copy
83D0000
trusted library allocation
page read and write
1CA65221000
trusted library allocation
page read and write
14B4000
heap
page read and write
146F000
heap
page read and write
5490000
direct allocation
page execute and read and write
1244000
heap
page read and write
314E000
stack
page read and write
338F000
stack
page read and write
376F000
stack
page read and write
5500000
direct allocation
page execute and read and write
3B47000
heap
page read and write
183F000
heap
page read and write
4BFE000
stack
page read and write
19ECF110000
trusted library allocation
page read and write
49DE000
stack
page read and write
4C80000
direct allocation
page read and write
4E11000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
7CDF000
heap
page read and write
4E11000
heap
page read and write
17E3B614000
heap
page read and write
696E000
stack
page read and write
1926000
heap
page read and write
8DB837E000
unkown
page readonly
775000
unkown
page write copy
7D90000
heap
page read and write
2FAE000
stack
page read and write
1CA65511000
trusted library allocation
page read and write
75D000
heap
page read and write
EAA000
unkown
page execute and read and write
7CFD000
heap
page read and write
7F94000
heap
page read and write
1560000
heap
page read and write
1244000
heap
page read and write
4E11000
heap
page read and write
7CF2000
heap
page read and write
1481000
heap
page read and write
41EB000
heap
page read and write
F56000
unkown
page execute and write copy
312F000
stack
page read and write
13B7000
heap
page read and write
4E90000
direct allocation
page execute and read and write
4F51000
heap
page read and write
7FFD9BA58000
trusted library allocation
page read and write
5460000
direct allocation
page execute and read and write
700000
heap
page read and write
3F4E000
stack
page read and write
811B000
heap
page read and write
7D43000
heap
page read and write
7FFD9B8E2000
trusted library allocation
page read and write
7FFD9B892000
trusted library allocation
page read and write
160E000
heap
page read and write
1461000
heap
page read and write
801000
unkown
page execute read
ED4000
heap
page read and write
3AB5000
heap
page read and write
D88000
unkown
page execute and read and write
6D64DFE000
stack
page read and write
15D4000
heap
page read and write
4A70000
direct allocation
page read and write
7FD4000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
7CE8000
heap
page read and write
53D0000
direct allocation
page execute and read and write
14EF000
heap
page read and write
4E11000
heap
page read and write
2727000
heap
page read and write
22BD723D000
heap
page read and write
82E0000
trusted library allocation
page read and write
700F000
heap
page read and write
1CA56E41000
trusted library allocation
page read and write
2EF0000
direct allocation
page execute and read and write
7F47000
heap
page read and write
CD0000
unkown
page execute and write copy
812B000
heap
page read and write
7F8D000
heap
page read and write
13F0000
heap
page read and write
11A4000
heap
page read and write
188E000
heap
page read and write
FF3CEFE000
unkown
page read and write
42B1000
heap
page read and write
1574000
heap
page read and write
12FE000
heap
page read and write
2E4F000
stack
page read and write
48B0000
direct allocation
page execute and read and write
8DB877E000
unkown
page readonly
811B000
heap
page read and write
CD0000
unkown
page execute and read and write
F4A000
unkown
page execute and write copy
751E000
stack
page read and write
19ECA502000
heap
page read and write
2054000
heap
page read and write
3BB6000
heap
page read and write
3810000
heap
page read and write
4A70000
direct allocation
page read and write
5410000
direct allocation
page execute and read and write
5010000
direct allocation
page execute and read and write
3D8F000
stack
page read and write
4A81000
heap
page read and write
3DCF000
stack
page read and write
14AC000
heap
page read and write
121B000
heap
page read and write
83D0000
trusted library allocation
page read and write
19ECA3F0000
trusted library allocation
page read and write
17E212A5000
heap
page read and write
16C1000
heap
page read and write
EA0000
direct allocation
page read and write
169C000
heap
page read and write
9CE000
stack
page read and write
42B1000
heap
page read and write
7F83000
heap
page read and write
1180000
heap
page read and write
2C6E000
stack
page read and write
7D7E000
heap
page read and write
7D9C000
heap
page read and write
12A6000
heap
page read and write
CFE000
stack
page read and write
60E000
stack
page read and write
7B3F000
stack
page read and write
4B51000
heap
page read and write
8020000
trusted library allocation
page read and write
4F51000
heap
page read and write
7CFD000
heap
page read and write
5470000
direct allocation
page execute and read and write
1684000
heap
page read and write
1410000
direct allocation
page read and write
E00000
unkown
page execute and write copy
10EE000
stack
page read and write
7CBA000
heap
page read and write
12F1000
heap
page read and write
1244000
heap
page read and write
1244000
heap
page read and write
14E2000
heap
page read and write
7EF13FF000
stack
page read and write
180E000
heap
page read and write
7F8A000
heap
page read and write
D66000
unkown
page read and write
E00000
unkown
page execute and write copy
1666000
heap
page read and write
1610000
heap
page read and write
15D4000
heap
page read and write
13D5000
heap
page read and write
105D000
heap
page read and write
16B2000
heap
page read and write
4A91000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1364000
heap
page read and write
4B8F000
stack
page read and write
E52000
unkown
page execute and read and write
4FA0000
heap
page read and write
3A2D000
heap
page read and write
7FFD9BB10000
trusted library allocation
page read and write
3C4C000
heap
page read and write
165D000
heap
page read and write
173B000
heap
page read and write
4E11000
heap
page read and write
7F57000
heap
page read and write
161C000
heap
page read and write
12A9000
heap
page read and write
811B000
heap
page read and write
180A000
heap
page read and write
484E000
stack
page read and write
1CA6D8A0000
heap
page read and write
D6D000
unkown
page execute and read and write
7FC4000
heap
page read and write
17E24421000
trusted library allocation
page read and write
7F3C000
heap
page read and write
8D0000
unkown
page write copy
7F81000
heap
page read and write
17E248B2000
trusted library allocation
page read and write
154F000
heap
page read and write
107E000
stack
page read and write
1430000
direct allocation
page read and write
17A6000
heap
page read and write
1CA53518000
heap
page read and write
4FB1000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
3946000
heap
page read and write
4E11000
heap
page read and write
4E11000
heap
page read and write
83D0000
trusted library allocation
page read and write
5490000
direct allocation
page execute and read and write
1CA6D510000
heap
page read and write
4DC1000
heap
page read and write
39D4000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
4FA0000
direct allocation
page read and write
39FB000
heap
page read and write
7F31000
heap
page read and write
6BB0000
heap
page read and write
761E000
stack
page read and write
7B2E000
stack
page read and write
42EF000
stack
page read and write
556E000
stack
page read and write
17E32F21000
trusted library allocation
page read and write
1AA0000
direct allocation
page execute and read and write
1CA534D9000
heap
page read and write
7F81000
heap
page read and write
7F57000
heap
page read and write
1684000
heap
page read and write
4A81000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
A2E000
stack
page read and write
33BE000
stack
page read and write
169D000
heap
page read and write
83D0000
trusted library allocation
page read and write
1574000
heap
page read and write
22A8256B000
heap
page read and write
7F4D000
heap
page read and write
326F000
stack
page read and write
1625000
heap
page read and write
16A7000
heap
page read and write
CAA000
unkown
page execute and read and write
610000
heap
page read and write
8DB80FE000
stack
page read and write
37EE000
stack
page read and write
5490000
direct allocation
page execute and read and write
7140000
trusted library allocation
page read and write
15C6000
heap
page read and write
1819000
heap
page read and write
39B0000
heap
page read and write
1DDF2CF0000
trusted library allocation
page read and write
79ED000
stack
page read and write
17E243DF000
trusted library allocation
page read and write
3CDB000
heap
page read and write
3A59000
heap
page read and write
5060000
direct allocation
page execute and read and write
490F000
stack
page read and write
141E000
heap
page read and write
5140000
direct allocation
page execute and read and write
3CA6000
heap
page read and write
3994000
heap
page read and write
1665000
heap
page read and write
42CF000
stack
page read and write
660000
heap
page read and write
3DC4000
heap
page read and write
5B2000
unkown
page execute and read and write
CC5000
unkown
page read and write
1400000
direct allocation
page read and write
5490000
direct allocation
page execute and read and write
3D95000
heap
page read and write
4DC1000
heap
page read and write
6D64F77000
stack
page read and write
83D0000
trusted library allocation
page read and write
135E000
heap
page read and write
D40000
unkown
page execute and write copy
3A23000
heap
page read and write
449F000
stack
page read and write
2DEF000
stack
page read and write
404F000
stack
page read and write
37CE000
stack
page read and write
CC5000
unkown
page read and write
8107000
heap
page read and write
1622000
heap
page read and write
7D45000
heap
page read and write
4F20000
direct allocation
page read and write
4A8F000
stack
page read and write
371E000
stack
page read and write
183F000
heap
page read and write
551B000
stack
page read and write
EF8000
unkown
page execute and read and write
3F8E000
stack
page read and write
1CA6D375000
heap
page read and write
1456000
heap
page read and write
46EE000
stack
page read and write
4E11000
heap
page read and write
7CF9000
heap
page read and write
7CF2000
heap
page read and write
34CF000
stack
page read and write
17E212FE000
heap
page read and write
6D649CE000
stack
page read and write
980000
heap
page read and write
7F76000
heap
page read and write
4E11000
heap
page read and write
614000
heap
page read and write
1639000
heap
page read and write
7EFF000
stack
page read and write
7CB1000
heap
page read and write
454F000
stack
page read and write
41E9000
heap
page read and write
F21000
unkown
page execute and read and write
5490000
direct allocation
page execute and read and write
4E11000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
11A4000
heap
page read and write
1574000
heap
page read and write
323F000
stack
page read and write
41CE000
stack
page read and write
50A0000
direct allocation
page execute and read and write
14BD58E000
stack
page read and write
4DC1000
heap
page read and write
7D9F000
heap
page read and write
7F98000
heap
page read and write
567C000
stack
page read and write
42B1000
heap
page read and write
48CF000
stack
page read and write
19ECF46C000
trusted library allocation
page read and write
ED4000
heap
page read and write
4E11000
heap
page read and write
13BF000
stack
page read and write
42B1000
heap
page read and write
352E000
stack
page read and write
7CB1000
heap
page read and write
4F51000
heap
page read and write
5290000
direct allocation
page execute and read and write
1CA6D385000
heap
page read and write
3AA1000
heap
page read and write
1297000
heap
page read and write
13DB000
stack
page read and write
4DC1000
heap
page read and write
3B18000
heap
page read and write
152E000
stack
page read and write
7F47000
heap
page read and write
CD7000
unkown
page execute and write copy
812B000
heap
page read and write
3BD5000
heap
page read and write
34CF000
stack
page read and write
5070000
direct allocation
page execute and read and write
16CC000
heap
page read and write
15D4000
heap
page read and write
50A0000
direct allocation
page execute and read and write
39C2000
heap
page read and write
1680000
heap
page read and write
4DC1000
heap
page read and write
53E0000
direct allocation
page execute and read and write
F2A000
unkown
page execute and read and write
43CF000
stack
page read and write
D77000
unkown
page execute and read and write
51E0000
heap
page read and write
7D11000
heap
page read and write
4DC1000
heap
page read and write
4B50000
direct allocation
page read and write
5490000
direct allocation
page execute and read and write
1630000
heap
page read and write
1CA534ED000
heap
page read and write
15B4000
heap
page read and write
14C0000
heap
page read and write
4A81000
heap
page read and write
5040000
direct allocation
page execute and read and write
156E000
stack
page read and write
4F51000
heap
page read and write
4E50000
heap
page read and write
7F59000
heap
page read and write
528F000
stack
page read and write
1342000
heap
page read and write
E88000
unkown
page execute and read and write
53F0000
direct allocation
page execute and read and write
42B1000
heap
page read and write
340E000
stack
page read and write
446E000
stack
page read and write
17E23F4A000
trusted library allocation
page read and write
6EE9000
heap
page read and write
18D5000
heap
page read and write
35DE000
stack
page read and write
7CD8000
heap
page read and write
19ECA500000
heap
page read and write
117E000
stack
page read and write
DDA000
unkown
page execute and write copy
3C8F000
stack
page read and write
15D4000
heap
page read and write
162B000
heap
page read and write
D04000
unkown
page execute and write copy
4BC0000
direct allocation
page execute and read and write
488F000
stack
page read and write
7D9C000
heap
page read and write
179B000
heap
page read and write
4E11000
heap
page read and write
186E000
heap
page read and write
3910000
heap
page read and write
1670000
direct allocation
page read and write
106F000
stack
page read and write
8129000
heap
page read and write
19ECF1F0000
trusted library allocation
page read and write
740000
heap
page read and write
B81000
unkown
page execute and write copy
17E247C5000
trusted library allocation
page read and write
3E1A000
heap
page read and write
781000
unkown
page write copy
7FFD9BA20000
trusted library allocation
page read and write
185D000
heap
page read and write
3C8F000
stack
page read and write
A42000
unkown
page execute and write copy
7F59000
heap
page read and write
19EC9C13000
heap
page read and write
1684000
heap
page read and write
16B2000
heap
page read and write
16B1000
heap
page read and write
3BFB000
heap
page read and write
15B4000
heap
page read and write
7CB9000
heap
page read and write
19EC9BA0000
trusted library allocation
page read and write
4721000
heap
page read and write
5040000
direct allocation
page execute and read and write
7FFD9BB90000
trusted library allocation
page read and write
276E000
stack
page read and write
1296000
heap
page read and write
17C9000
heap
page read and write
15B4000
heap
page read and write
1878000
heap
page read and write
331F000
stack
page read and write
6F8B000
stack
page read and write
83D0000
trusted library allocation
page read and write
3B6F000
stack
page read and write
B3B000
unkown
page execute and write copy
16C8000
heap
page read and write
721000
unkown
page execute and write copy
10FB000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
3C4D000
heap
page read and write
4A81000
heap
page read and write
5450000
direct allocation
page execute and read and write
1260000
heap
page read and write
162F000
stack
page read and write
17E3B16B000
heap
page read and write
5040000
direct allocation
page execute and read and write
801000
unkown
page execute read
39F2000
heap
page read and write
1599000
heap
page read and write
4FB1000
heap
page read and write
7D2B000
heap
page read and write
7CF3000
heap
page read and write
4F90000
direct allocation
page read and write
8DB867E000
unkown
page readonly
7D40000
heap
page read and write
190A000
heap
page read and write
185F000
heap
page read and write
DA9000
unkown
page execute and write copy
5010000
direct allocation
page execute and read and write
970000
heap
page read and write
1245000
heap
page read and write
1599000
heap
page read and write
7D34000
heap
page read and write
7F3C000
heap
page read and write
14B6000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
1487000
heap
page read and write
ED4000
heap
page read and write
7CDE000
heap
page read and write
4DC1000
heap
page read and write
462E000
stack
page read and write
1357000
heap
page read and write
3E47000
heap
page read and write
42B1000
heap
page read and write
4DC1000
heap
page read and write
7E40000
remote allocation
page read and write
7CB1000
heap
page read and write
14E0000
heap
page read and write
6D6498E000
stack
page read and write
5050000
direct allocation
page execute and read and write
46CE000
stack
page read and write
54DF000
stack
page read and write
FF3CB1D000
stack
page read and write
3CCE000
stack
page read and write
22A82527000
heap
page read and write
630000
unkown
page read and write
40AE000
stack
page read and write
16A0000
heap
page read and write
13C0000
direct allocation
page read and write
19ECA51A000
heap
page read and write
3E0E000
stack
page read and write
4B61000
heap
page read and write
413F000
stack
page read and write
17E3B22E000
heap
page read and write
FCA000
heap
page read and write
404F000
stack
page read and write
4BD0000
direct allocation
page execute and read and write
1170000
heap
page read and write
1272000
heap
page read and write
80F4000
heap
page read and write
3A0B000
heap
page read and write
DD7000
unkown
page execute and write copy
ED4000
heap
page read and write
7D1C000
heap
page read and write
17E3B150000
heap
page read and write
7D02000
heap
page read and write
7DB1000
heap
page read and write
15A2000
heap
page read and write
7CF3000
heap
page read and write
EA0000
direct allocation
page read and write
3D2B000
heap
page read and write
4E11000
heap
page read and write
13DB000
stack
page read and write
180E000
heap
page read and write
980000
heap
page read and write
DE7000
unkown
page execute and read and write
1240000
heap
page read and write
4F51000
heap
page read and write
DFE000
unkown
page execute and read and write
195D000
heap
page read and write
13AE000
stack
page read and write
14F8000
heap
page read and write
3DC4000
heap
page read and write
4FB1000
heap
page read and write
48FE000
stack
page read and write
456F000
stack
page read and write
8147000
heap
page read and write
1810000
heap
page read and write
1364000
heap
page read and write
1736000
heap
page read and write
90EC000
stack
page read and write
134D000
heap
page read and write
7D91000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
480E000
stack
page read and write
8DB86FE000
stack
page read and write
4CD0000
heap
page read and write
41D4000
heap
page read and write
7F8D000
heap
page read and write
7F15000
heap
page read and write
163E000
stack
page read and write
15DE000
heap
page read and write
3C0B000
heap
page read and write
ED4000
heap
page read and write
7F15000
heap
page read and write
D05000
unkown
page execute and read and write
418F000
stack
page read and write
178F000
heap
page read and write
1482000
heap
page read and write
DBA000
unkown
page execute and read and write
ED4000
heap
page read and write
17E2440D000
trusted library allocation
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
186C000
heap
page read and write
7F57000
heap
page read and write
A34000
heap
page read and write
F90000
direct allocation
page read and write
13B4000
heap
page read and write
4E10000
direct allocation
page execute and read and write
83D0000
trusted library allocation
page read and write
DE8000
unkown
page execute and write copy
2D47000
heap
page read and write
4DC1000
heap
page read and write
1244000
heap
page read and write
42CF000
stack
page read and write
FDB000
stack
page read and write
15EE000
heap
page read and write
1818000
heap
page read and write
17E22DE0000
trusted library allocation
page read and write
7DAA000
heap
page read and write
7FFD9B8B1000
trusted library allocation
page read and write
3ABF000
heap
page read and write
D66000
unkown
page write copy
7F3C000
heap
page read and write
52B0000
direct allocation
page execute and read and write
7D02000
heap
page read and write
17E24754000
trusted library allocation
page read and write
5510000
heap
page read and write
D02000
unkown
page execute and read and write
9C0000
heap
page read and write
557F000
direct allocation
page read and write
D07000
unkown
page execute and write copy
17E243F7000
trusted library allocation
page read and write
4B80000
trusted library allocation
page read and write
782000
unkown
page execute and read and write
6CA000
heap
page read and write
1570000
heap
page read and write
4E11000
heap
page read and write
8135000
heap
page read and write
166E000
heap
page read and write
7F47000
heap
page read and write
2CEF000
stack
page read and write
1244000
heap
page read and write
134A000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
54A0000
direct allocation
page execute and read and write
17E32F5E000
trusted library allocation
page read and write
85F000
stack
page read and write
3C30000
heap
page read and write
8DB777E000
unkown
page readonly
4F51000
heap
page read and write
8DB757E000
unkown
page readonly
1729000
heap
page read and write
DDA000
unkown
page execute and write copy
7CE3000
heap
page read and write
4E1E000
stack
page read and write
7F8D000
heap
page read and write
7D9A000
heap
page read and write
5390000
trusted library allocation
page read and write
19EC9CFF000
heap
page read and write
811B000
heap
page read and write
4E11000
heap
page read and write
19ECF4A3000
trusted library allocation
page read and write
34BF000
stack
page read and write
293C88000
stack
page read and write
4F51000
heap
page read and write
CD7000
unkown
page execute and write copy
189C000
heap
page read and write
7F81000
heap
page read and write
1CA55150000
trusted library allocation
page read and write
1214000
heap
page read and write
4DC1000
heap
page read and write
48A0000
direct allocation
page execute and read and write
4E8E000
stack
page read and write
4E00000
direct allocation
page execute and read and write
1106000
unkown
page execute and write copy
1410000
direct allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
19ECF456000
trusted library allocation
page read and write
8135000
heap
page read and write
83C000
stack
page read and write
15D4000
heap
page read and write
4A4F000
stack
page read and write
CEB000
unkown
page execute and write copy
19EC9C5B000
heap
page read and write
17E23118000
trusted library allocation
page read and write
7F15000
heap
page read and write
793F000
stack
page read and write
1684000
heap
page read and write
4B61000
heap
page read and write
10F0000
heap
page read and write
7F4D000
heap
page read and write
1647000
heap
page read and write
17E3B633000
heap
page read and write
1CA6D470000
heap
page execute and read and write
4EA0000
direct allocation
page execute and read and write
1684000
heap
page read and write
4F51000
heap
page read and write
15B4000
heap
page read and write
7C98000
heap
page read and write
4F51000
heap
page read and write
7CE0000
heap
page read and write
4FB1000
heap
page read and write
143A000
heap
page read and write
1878000
heap
page read and write
6D6517E000
stack
page read and write
7CBA000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
13ED000
heap
page read and write
1670000
direct allocation
page read and write
57AE000
stack
page read and write
26EF000
stack
page read and write
5350000
direct allocation
page execute and read and write
42B1000
heap
page read and write
2F5F000
stack
page read and write
46AF000
stack
page read and write
378E000
stack
page read and write
4E11000
heap
page read and write
57BF000
heap
page read and write
FEF000
stack
page read and write
38F0000
heap
page read and write
190C000
heap
page read and write
CC5000
unkown
page write copy
670000
direct allocation
page read and write
15E8000
heap
page read and write
5490000
direct allocation
page execute and read and write
137A000
heap
page read and write
14E4000
heap
page read and write
E49000
unkown
page execute and read and write
1416000
heap
page read and write
4DC1000
heap
page read and write
7CAF000
heap
page read and write
4E11000
heap
page read and write
50B0000
direct allocation
page execute and read and write
5040000
direct allocation
page execute and read and write
1CA534CD000
heap
page read and write
F57000
unkown
page execute and read and write
4DC1000
heap
page read and write
80E8DFD000
stack
page read and write
392E000
stack
page read and write
8129000
heap
page read and write
6D6527E000
stack
page read and write
17E3B602000
heap
page read and write
5490000
direct allocation
page execute and read and write
7D91000
heap
page read and write
13B4000
heap
page read and write
3BDE000
heap
page read and write
4E11000
heap
page read and write
ED4000
heap
page read and write
7BD000
stack
page read and write
7CB1000
heap
page read and write
51A0000
heap
page read and write
2ED0000
direct allocation
page read and write
15B4000
heap
page read and write
7FFD9B703000
trusted library allocation
page execute and read and write
43FD000
stack
page read and write
813D000
heap
page read and write
670000
direct allocation
page read and write
4E11000
heap
page read and write
C41000
unkown
page execute and write copy
52A0000
direct allocation
page execute and read and write
190A000
heap
page read and write
11A4000
heap
page read and write
7F47000
heap
page read and write
3E0E000
stack
page read and write
383E000
stack
page read and write
3DD4000
heap
page read and write
EFB000
unkown
page execute and write copy
AD1000
unkown
page execute and write copy
1E7E000
stack
page read and write
8159000
heap
page read and write
ED4000
heap
page read and write
1574000
heap
page read and write
14FB000
heap
page read and write
1574000
heap
page read and write
17E3B62A000
heap
page read and write
1433000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
ED4000
heap
page read and write
1259000
heap
page read and write
53E0000
direct allocation
page execute and read and write
1296000
heap
page read and write
1244000
heap
page read and write
6A4E000
stack
page read and write
7CF5000
heap
page read and write
7CBA000
heap
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
B8C000
stack
page read and write
3975000
heap
page read and write
4C00000
direct allocation
page execute and read and write
1668000
heap
page read and write
16AC000
heap
page read and write
22BD73D0000
heap
page read and write
EA0000
direct allocation
page read and write
7FFD9B7B6000
trusted library allocation
page read and write
5420000
direct allocation
page execute and read and write
7CC9000
heap
page read and write
3DA1000
heap
page read and write
8154000
heap
page read and write
1410000
direct allocation
page read and write
4DC1000
heap
page read and write
4B51000
heap
page read and write
490F000
stack
page read and write
314F000
stack
page read and write
408E000
stack
page read and write
4E7E000
stack
page read and write
4E10000
direct allocation
page execute and read and write
3E42000
heap
page read and write
190A000
heap
page read and write
BE0000
heap
page read and write
4DC1000
heap
page read and write
330C000
stack
page read and write
1410000
direct allocation
page read and write
7CDF000
heap
page read and write
146D000
heap
page read and write
F70000
unkown
page execute and write copy
80E8D7F000
stack
page read and write
7DB1000
heap
page read and write
8141000
heap
page read and write
42B1000
heap
page read and write
440E000
stack
page read and write
4BF0000
direct allocation
page execute and read and write
7FFD9B6F4000
trusted library allocation
page read and write
41EE000
stack
page read and write
14D8000
heap
page read and write
D8F000
unkown
page execute and read and write
130B000
stack
page read and write
22A841F0000
heap
page read and write
13C0000
direct allocation
page read and write
8020000
trusted library allocation
page read and write
7FFD9B8D0000
trusted library allocation
page execute and read and write
4F51000
heap
page read and write
314F000
stack
page read and write
8DB7B7E000
unkown
page readonly
37CE000
stack
page read and write
494E000
stack
page read and write
EFF000
unkown
page execute and read and write
6A0F000
stack
page read and write
DBA000
unkown
page execute and read and write
3B8E000
stack
page read and write
5490000
direct allocation
page execute and read and write
56E0000
heap
page read and write
53E0000
direct allocation
page execute and read and write
3C0C000
heap
page read and write
5460000
direct allocation
page execute and read and write
1704000
heap
page read and write
CC9000
unkown
page execute and read and write
4DC1000
heap
page read and write
1DDF133D000
heap
page read and write
14BCBBC000
stack
page read and write
1CA6D701000
heap
page read and write
1514000
heap
page read and write
7C8F000
stack
page read and write
2FEE000
stack
page read and write
36CE000
stack
page read and write
7D02000
heap
page read and write
1CA53430000
heap
page read and write
203057A8000
heap
page read and write
15DA000
heap
page read and write
478F000
stack
page read and write
122E000
heap
page read and write
7CE3000
heap
page read and write
3CA6000
heap
page read and write
5050000
direct allocation
page execute and read and write
776E000
stack
page read and write
5515000
heap
page read and write
53C0000
direct allocation
page execute and read and write
17E4000
heap
page read and write
15B0000
heap
page read and write
464F000
stack
page read and write
13EF000
stack
page read and write
1577000
heap
page read and write
7B8E000
stack
page read and write
1CA56A36000
trusted library allocation
page read and write
4DC1000
heap
page read and write
3B06000
heap
page read and write
5430000
direct allocation
page execute and read and write
8020000
trusted library allocation
page read and write
3D6F000
heap
page read and write
57BB000
stack
page read and write
7D7B000
heap
page read and write
153B000
heap
page read and write
7D79000
heap
page read and write
15CC000
heap
page read and write
4DC1000
heap
page read and write
7CE8000
heap
page read and write
7CDF000
heap
page read and write
1430000
direct allocation
page read and write
11BE000
stack
page read and write
670000
direct allocation
page read and write
17E22EF1000
trusted library allocation
page read and write
7F15000
heap
page read and write
3B68000
heap
page read and write
448E000
stack
page read and write
13D0000
heap
page read and write
16AA000
heap
page read and write
168B000
heap
page read and write
1665000
heap
page read and write
17AF000
heap
page read and write
3E0E000
stack
page read and write
3990000
heap
page read and write
50C0000
direct allocation
page execute and read and write
4721000
heap
page read and write
360F000
stack
page read and write
4FD000
stack
page read and write
82E0000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1244000
heap
page read and write
3DAD000
heap
page read and write
506E000
stack
page read and write
19ED0000000
heap
page read and write
4B4F000
stack
page read and write
4B7E000
stack
page read and write
7CE8000
heap
page read and write
1296000
heap
page read and write
391A000
heap
page read and write
8140000
heap
page read and write
3ECF000
heap
page read and write
366F000
stack
page read and write
5680000
heap
page read and write
3D8E000
heap
page read and write
5590000
direct allocation
page execute and read and write
416F000
stack
page read and write
7D09000
heap
page read and write
7D02000
heap
page read and write
5140000
direct allocation
page execute and read and write
17A4000
heap
page read and write
117F000
stack
page read and write
4DC1000
heap
page read and write
435F000
stack
page read and write
37CF000
stack
page read and write
4A81000
heap
page read and write
3940000
heap
page read and write
7CE0000
heap
page read and write
3B47000
heap
page read and write
16E4000
heap
page read and write
1AB7000
heap
page read and write
7F6C000
heap
page read and write
7F5E000
heap
page read and write
614000
heap
page read and write
7F15000
heap
page read and write
1244000
heap
page read and write
DC0000
heap
page read and write
78DE000
stack
page read and write
4F60000
heap
page read and write
4E11000
heap
page read and write
4E40000
direct allocation
page execute and read and write
4DC1000
heap
page read and write
DDA000
unkown
page execute and write copy
4721000
heap
page read and write
781000
unkown
page execute and read and write
7FFD9BA6C000
trusted library allocation
page read and write
17E21060000
heap
page read and write
1364000
heap
page read and write
13DB000
heap
page read and write
1684000
heap
page read and write
591C000
stack
page read and write
18AC000
heap
page read and write
12EE000
heap
page read and write
1410000
direct allocation
page read and write
11A4000
heap
page read and write
A30000
heap
page read and write
7CC9000
heap
page read and write
1357000
heap
page read and write
17E21160000
heap
page read and write
D58000
unkown
page execute and read and write
19ECF4E8000
trusted library allocation
page read and write
19ECF130000
trusted library allocation
page read and write
42B1000
heap
page read and write
7F31000
heap
page read and write
3C24000
heap
page read and write
7FFD9B810000
trusted library allocation
page execute and read and write
186A000
heap
page read and write
8154000
heap
page read and write
42B1000
heap
page read and write
1244000
heap
page read and write
15D4000
heap
page read and write
7F77000
heap
page read and write
4DC1000
heap
page read and write
5070000
direct allocation
page execute and read and write
5490000
direct allocation
page execute and read and write
FBB000
stack
page read and write
4CCF000
stack
page read and write
152D000
heap
page read and write
D88000
unkown
page execute and read and write
D6D000
unkown
page execute and read and write
7CA2000
heap
page read and write
12D8000
heap
page read and write
19EC9C22000
heap
page read and write
19ECF280000
heap
page read and write
7CE8000
heap
page read and write
5490000
direct allocation
page execute and read and write
29EE000
stack
page read and write
1557000
heap
page read and write
4A70000
direct allocation
page read and write
3ABF000
heap
page read and write
7D45000
heap
page read and write
1CA56AA3000
trusted library allocation
page read and write
7D1C000
heap
page read and write
11A4000
heap
page read and write
4B51000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
7CBA000
heap
page read and write
D07000
unkown
page execute and write copy
7F3C000
heap
page read and write
5B3D000
stack
page read and write
4721000
heap
page read and write
1369000
heap
page read and write
4A70000
direct allocation
page read and write
7DB7000
heap
page read and write
1679000
heap
page read and write
3E1D000
heap
page read and write
4DC1000
heap
page read and write
3C56000
heap
page read and write
47CE000
stack
page read and write
3B4F000
stack
page read and write
7CF2000
heap
page read and write
1642000
heap
page read and write
172B000
heap
page read and write
7F81000
heap
page read and write
4E11000
heap
page read and write
5090000
direct allocation
page execute and read and write
17E3B5C3000
heap
page read and write
7D91000
heap
page read and write
4DC1000
heap
page read and write
7CCD000
heap
page read and write
1400000
direct allocation
page read and write
7FFD9B8D2000
trusted library allocation
page read and write
3DCD000
heap
page read and write
7F57000
heap
page read and write
7D02000
heap
page read and write
7CF2000
heap
page read and write
EF7000
unkown
page execute and write copy
13DB000
heap
page read and write
7AE0000
heap
page read and write
3BCE000
stack
page read and write
EA0000
direct allocation
page read and write
8146000
heap
page read and write
158A000
heap
page read and write
20305AF0000
heap
page read and write
15B4000
heap
page read and write
7CA6000
heap
page read and write
CA9000
unkown
page read and write
902000
unkown
page execute and read and write
157B000
heap
page read and write
3E4E000
stack
page read and write
630000
unkown
page read and write
4F51000
heap
page read and write
7F3C000
heap
page read and write
EA0000
direct allocation
page read and write
17C9000
heap
page read and write
1CA534D3000
heap
page read and write
7F3F000
heap
page read and write
17F6000
heap
page read and write
D35000
unkown
page execute and write copy
32CE000
stack
page read and write
7FC0000
heap
page read and write
139A000
heap
page read and write
14F4000
heap
page read and write
1357000
heap
page read and write
10FB000
stack
page read and write
42CF000
stack
page read and write
50A0000
direct allocation
page execute and read and write
3B6E000
heap
page read and write
7F31000
heap
page read and write
4E10000
direct allocation
page execute and read and write
7F47000
heap
page read and write
328F000
stack
page read and write
3D01000
heap
page read and write
18EF000
stack
page read and write
11A4000
heap
page read and write
15B4000
heap
page read and write
EC6000
unkown
page execute and read and write
FCE000
heap
page read and write
14BC7BE000
stack
page read and write
13C0000
direct allocation
page read and write
4DC1000
heap
page read and write
4B51000
heap
page read and write
14F4000
heap
page read and write
439E000
stack
page read and write
19ECF22F000
heap
page read and write
EBE000
heap
page read and write
38CF000
stack
page read and write
12A6000
heap
page read and write
CC5000
unkown
page execute and write copy
3B4F000
stack
page read and write
58FD000
stack
page read and write
48E000
stack
page read and write
13C000
stack
page read and write
7F57000
heap
page read and write
4E11000
heap
page read and write
14BC4FF000
stack
page read and write
6D6507E000
stack
page read and write
5430000
direct allocation
page execute and read and write
6C8CB000
unkown
page read and write
C1A000
stack
page read and write
15C7000
heap
page read and write
364F000
stack
page read and write
7F4E000
heap
page read and write
673000
heap
page read and write
7CB0000
heap
page read and write
1CA53470000
trusted library allocation
page read and write
3978000
heap
page read and write
20305AC0000
heap
page read and write
494F000
stack
page read and write
3F87000
heap
page read and write
7CE9000
heap
page read and write
7FC8000
heap
page read and write
614000
heap
page read and write
3D81000
heap
page read and write
1DDF130A000
heap
page read and write
1674000
heap
page read and write
1400000
direct allocation
page read and write
22BD7320000
trusted library allocation
page read and write
15D4000
heap
page read and write
1610000
heap
page read and write
3DA6000
heap
page read and write
1367000
heap
page read and write
4DC1000
heap
page read and write
D8B000
unkown
page execute and write copy
1693000
heap
page read and write
108A000
heap
page read and write
302E000
stack
page read and write
314E000
heap
page read and write
3CA6000
heap
page read and write
5150000
direct allocation
page execute and read and write
7D99000
heap
page read and write
102E000
heap
page read and write
19ECF2F3000
heap
page read and write
12D9000
heap
page read and write
3A2F000
stack
page read and write
4A81000
heap
page read and write
4E30000
heap
page read and write
D89000
unkown
page execute and write copy
16E2000
heap
page read and write
F1E000
stack
page read and write
4DC1000
heap
page read and write
50B0000
direct allocation
page execute and read and write
811B000
heap
page read and write
11A4000
heap
page read and write
3C1A000
heap
page read and write
3C9B000
heap
page read and write
7D7A000
heap
page read and write
7CFD000
heap
page read and write
444E000
stack
page read and write
A0F000
unkown
page execute and read and write
7CF9000
heap
page read and write
12AC000
heap
page read and write
4E11000
heap
page read and write
18E3000
heap
page read and write
4E11000
heap
page read and write
5010000
direct allocation
page execute and read and write
5CF000
stack
page read and write
A34000
heap
page read and write
7CF3000
heap
page read and write
7F01000
heap
page read and write
8020000
trusted library allocation
page read and write
E47000
unkown
page execute and write copy
19ECF24E000
heap
page read and write
3DCF000
stack
page read and write
4BF0000
direct allocation
page execute and read and write
7FFD9B70D000
trusted library allocation
page execute and read and write
7FFD9B6F3000
trusted library allocation
page execute and read and write
D5F000
unkown
page execute and write copy
4F90000
direct allocation
page read and write
8137000
heap
page read and write
1364000
heap
page read and write
1628000
heap
page read and write
13BE000
heap
page read and write
153D000
heap
page read and write
7FC3000
heap
page read and write
8DB7DFE000
stack
page read and write
1535000
heap
page read and write
160E000
stack
page read and write
5040000
direct allocation
page execute and read and write
19EC9CAE000
heap
page read and write
ED4000
heap
page read and write
1CA56AF9000
trusted library allocation
page read and write
2BE0000
heap
page read and write
16B1000
heap
page read and write
14E2000
heap
page read and write
22BD7214000
heap
page read and write
3F6E000
stack
page read and write
32EE000
stack
page read and write
4B8F000
stack
page read and write
4B4E000
stack
page read and write
53FD000
stack
page read and write
53E0000
direct allocation
page execute and read and write
3B10000
heap
page read and write
5340000
direct allocation
page execute and read and write
80E8E7C000
stack
page read and write
5040000
direct allocation
page execute and read and write
574F000
stack
page read and write
4721000
heap
page read and write
477F000
stack
page read and write
614000
heap
page read and write
789F000
stack
page read and write
1DDF12A0000
trusted library allocation
page read and write
1CA56849000
trusted library allocation
page read and write
7DF4D58D0000
trusted library allocation
page execute and read and write
1221000
heap
page read and write
7FE0000
heap
page read and write
1639000
heap
page read and write
49FF000
stack
page read and write
7FA4000
heap
page read and write
C40000
unkown
page read and write
54F0000
direct allocation
page execute and read and write
184C000
heap
page read and write
7CF2000
heap
page read and write
811B000
heap
page read and write
440F000
stack
page read and write
71B000
heap
page read and write
8D4000
unkown
page readonly
5430000
direct allocation
page execute and read and write
8131000
heap
page read and write
17E212F0000
heap
page read and write
3E9E000
stack
page read and write
7CD1000
heap
page read and write
D8D000
stack
page read and write
7CF3000
heap
page read and write
3DCF000
stack
page read and write
4A8E000
stack
page read and write
A34000
heap
page read and write
AAE000
stack
page read and write
7FFD9B920000
trusted library allocation
page read and write
3C04000
heap
page read and write
19ECF4F1000
trusted library allocation
page read and write
15B4000
heap
page read and write
4DC0000
heap
page read and write
168B000
heap
page read and write
340E000
stack
page read and write
4880000
direct allocation
page execute and read and write
17E243F3000
trusted library allocation
page read and write
1CA53730000
heap
page readonly
7CAF000
heap
page read and write
E9C000
stack
page read and write
4DBF000
stack
page read and write
39CF000
stack
page read and write
4DC1000
heap
page read and write
3DBB000
heap
page read and write
39CF000
stack
page read and write
169E000
heap
page read and write
19ECAB40000
trusted library section
page readonly
7D5D000
heap
page read and write
811B000
heap
page read and write
56EE000
stack
page read and write
4BCF000
stack
page read and write
1135000
heap
page read and write
1684000
heap
page read and write
4C80000
direct allocation
page read and write
12FF000
heap
page read and write
7CE9000
heap
page read and write
4DC1000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
4DC1000
heap
page read and write
4F51000
heap
page read and write
19ECF40E000
trusted library allocation
page read and write
4BF0000
direct allocation
page execute and read and write
17E3B231000
heap
page read and write
33C4000
heap
page read and write
1574000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
2B2E000
stack
page read and write
4B61000
heap
page read and write
1244000
heap
page read and write
7CC5000
heap
page read and write
1670000
direct allocation
page read and write
388F000
stack
page read and write
22BD70C0000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
6B70000
heap
page read and write
17E3B5FA000
heap
page read and write
8020000
trusted library allocation
page read and write
65E000
stack
page read and write
1574000
heap
page read and write
614000
heap
page read and write
2F4F000
stack
page read and write
153B000
heap
page read and write
4E11000
heap
page read and write
4890000
direct allocation
page execute and read and write
800000
unkown
page readonly
184A000
heap
page read and write
7F94000
heap
page read and write
3CCC000
heap
page read and write
7CB1000
heap
page read and write
3D81000
heap
page read and write
188C000
heap
page read and write
4DC1000
heap
page read and write
5040000
direct allocation
page execute and read and write
19EC9CA2000
heap
page read and write
8123000
heap
page read and write
3AC9000
heap
page read and write
434E000
stack
page read and write
83D0000
trusted library allocation
page read and write
8142000
heap
page read and write
4E11000
heap
page read and write
7D91000
heap
page read and write
4B60000
heap
page read and write
8123000
heap
page read and write
17E211A2000
heap
page read and write
7CC6000
heap
page read and write
7D9C000
heap
page read and write
19ECF21A000
heap
page read and write
4DC1000
heap
page read and write
4A81000
heap
page read and write
4730000
heap
page read and write
1693000
heap
page read and write
7F8D000
heap
page read and write
38EE000
stack
page read and write
4E11000
heap
page read and write
368F000
stack
page read and write
7F15000
heap
page read and write
160F000
heap
page read and write
7D13000
heap
page read and write
560F000
stack
page read and write
19ECF302000
heap
page read and write
14F7000
heap
page read and write
1410000
direct allocation
page read and write
4FB1000
heap
page read and write
8340000
trusted library allocation
page read and write
74ED000
stack
page read and write
46F0000
heap
page read and write
15B4000
heap
page read and write
6B4F000
stack
page read and write
870000
heap
page read and write
3B45000
heap
page read and write
DFE000
unkown
page execute and write copy
8DB7EFE000
stack
page read and write
8124000
heap
page read and write
1674000
heap
page read and write
14BC67E000
stack
page read and write
47CF000
stack
page read and write
800000
unkown
page readonly
7D80000
trusted library allocation
page read and write
53E0000
direct allocation
page execute and read and write
13C2000
heap
page read and write
7FFD9BB30000
trusted library allocation
page execute and read and write
C40000
unkown
page readonly
17E3B270000
heap
page read and write
3CDE000
heap
page read and write
CAC000
unkown
page execute and write copy
19ECF160000
trusted library allocation
page read and write
22BD9090000
heap
page read and write
CEC000
unkown
page execute and read and write
40DF000
stack
page read and write
3EEF000
stack
page read and write
1409000
heap
page read and write
1001000
heap
page read and write
4B51000
heap
page read and write
2F30000
heap
page read and write
432000
unkown
page execute and read and write
58AF000
stack
page read and write
1859000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
15C7000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
4E11000
heap
page read and write
7CF2000
heap
page read and write
1CA53755000
heap
page read and write
BB6000
unkown
page execute and write copy
38CF000
stack
page read and write
3C09000
heap
page read and write
14B6000
heap
page read and write
80E8BFF000
stack
page read and write
15D8000
heap
page read and write
5450000
direct allocation
page execute and read and write
1573000
heap
page read and write
121A000
heap
page read and write
19ECF241000
heap
page read and write
5040000
direct allocation
page execute and read and write
6725000
heap
page read and write
1574000
heap
page read and write
167A000
heap
page read and write
3840000
heap
page read and write
13C0000
direct allocation
page read and write
614000
heap
page read and write
12EC000
heap
page read and write
1676000
heap
page read and write
7CCC000
heap
page read and write
1818000
heap
page read and write
8DB827B000
stack
page read and write
395B000
heap
page read and write
7F70000
heap
page read and write
8020000
trusted library allocation
page read and write
33CF000
stack
page read and write
3C1A000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
42B1000
heap
page read and write
7C80000
heap
page read and write
10E0000
heap
page read and write
7F4F000
heap
page read and write
80F2000
heap
page read and write
8157000
heap
page read and write
7FFD9BA54000
trusted library allocation
page read and write
9360000
heap
page read and write
1035000
heap
page read and write
15B4000
heap
page read and write
CA9000
unkown
page write copy
4E10000
direct allocation
page execute and read and write
4DC1000
heap
page read and write
11A4000
heap
page read and write
D19000
stack
page read and write
80FD000
heap
page read and write
8020000
trusted library allocation
page read and write
F56000
unkown
page execute and write copy
293D8F000
stack
page read and write
418E000
stack
page read and write
8DB857E000
unkown
page readonly
7FFD9BA60000
trusted library allocation
page read and write
D35000
unkown
page execute and write copy
12EC000
heap
page read and write
ED4000
heap
page read and write
7CF4000
heap
page read and write
4CF3000
direct allocation
page read and write
5010000
direct allocation
page execute and read and write
41CE000
stack
page read and write
759F000
stack
page read and write
7D9B000
heap
page read and write
7D00000
heap
page read and write
11A0000
heap
page read and write
3ECF000
stack
page read and write
53E0000
direct allocation
page execute and read and write
6DFF000
stack
page read and write
160E000
heap
page read and write
48E0000
direct allocation
page execute and read and write
18F0000
heap
page read and write
19ECF46F000
trusted library allocation
page read and write
3A4E000
stack
page read and write
363E000
stack
page read and write
17E3B195000
heap
page read and write
4DC1000
heap
page read and write
33CE000
stack
page read and write
BB6000
unkown
page execute and write copy
7D9C000
heap
page read and write
7FFD9BAF3000
trusted library allocation
page read and write
6E37B000
unkown
page read and write
7CCA000
heap
page read and write
52B0000
direct allocation
page execute and read and write
4E11000
heap
page read and write
4FA1000
heap
page read and write
159B000
heap
page read and write
1CA6D5F0000
heap
page read and write
D3A000
unkown
page execute and read and write
7CF5000
heap
page read and write
4E0F000
stack
page read and write
E5B000
unkown
page execute and write copy
BCC000
stack
page read and write
7F3D000
heap
page read and write
7CA0000
heap
page read and write
54B0000
direct allocation
page execute and read and write
12BC000
heap
page read and write
1416000
heap
page read and write
4E11000
heap
page read and write
42B1000
heap
page read and write
161E000
heap
page read and write
2E0000
unkown
page readonly
4F51000
heap
page read and write
2AEF000
stack
page read and write
1CA54DD5000
heap
page read and write
681000
heap
page read and write
15A0000
direct allocation
page read and write
4DC1000
heap
page read and write
1474000
heap
page read and write
42B1000
heap
page read and write
512F000
direct allocation
page read and write
4E11000
heap
page read and write
3E46000
heap
page read and write
15C4000
heap
page read and write
31DF000
stack
page read and write
7FFD9B950000
trusted library allocation
page read and write
48C0000
direct allocation
page execute and read and write
403E000
stack
page read and write
12EC000
heap
page read and write
100A000
unkown
page execute and read and write
1643000
heap
page read and write
30EF000
stack
page read and write
A6F000
stack
page read and write
7FFD9BA60000
trusted library allocation
page read and write
454F000
stack
page read and write
DD7000
unkown
page execute and write copy
DAD000
unkown
page execute and read and write
1574000
heap
page read and write
7CBA000
heap
page read and write
803E000
stack
page read and write
4E0000
heap
page read and write
1589000
heap
page read and write
17E3B66C000
heap
page read and write
42BE000
stack
page read and write
7F57000
heap
page read and write
3A0E000
stack
page read and write
1448000
heap
page read and write
7FC7000
heap
page read and write
8143000
heap
page read and write
EFA000
unkown
page execute and read and write
172C000
heap
page read and write
12D3000
heap
page read and write
4DC1000
heap
page read and write
168B000
heap
page read and write
42B1000
heap
page read and write
5010000
direct allocation
page execute and read and write
4E4F000
stack
page read and write
5490000
direct allocation
page execute and read and write
19ECF131000
trusted library allocation
page read and write
11A4000
heap
page read and write
17E24450000
trusted library allocation
page read and write
80E1000
heap
page read and write
17E2128B000
heap
page read and write
3DF6000
heap
page read and write
33CE000
stack
page read and write
1410000
direct allocation
page read and write
82E0000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
3918000
heap
page read and write
7F57000
heap
page read and write
15D4000
heap
page read and write
533E000
stack
page read and write
1CA6D6A6000
heap
page read and write
4FA0000
direct allocation
page read and write
3CC9000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
47EF000
stack
page read and write
5250000
direct allocation
page read and write
22A8256B000
heap
page read and write
19ECA402000
heap
page read and write
42B1000
heap
page read and write
33CF000
stack
page read and write
6D6000
unkown
page execute and read and write
16B1000
heap
page read and write
4B61000
heap
page read and write
368E000
stack
page read and write
1244000
heap
page read and write
19ECF4E5000
trusted library allocation
page read and write
4E11000
heap
page read and write
7D31000
heap
page read and write
3A4E000
stack
page read and write
7F4E000
heap
page read and write
3A0F000
stack
page read and write
4A70000
direct allocation
page read and write
1CA6D330000
heap
page read and write
3B6B000
heap
page read and write
783E000
stack
page read and write
D04000
unkown
page execute and write copy
138E000
stack
page read and write
7D45000
heap
page read and write
1510000
heap
page read and write
318E000
stack
page read and write
4D0F000
stack
page read and write
DAD000
unkown
page execute and read and write
15B4000
heap
page read and write
19ECAB60000
trusted library section
page readonly
450F000
stack
page read and write
7CFD000
heap
page read and write
2E0000
unkown
page read and write
17E22E00000
trusted library allocation
page read and write
4DC1000
heap
page read and write
1509000
heap
page read and write
7FFD9BB40000
trusted library allocation
page read and write
F5F000
unkown
page execute and read and write
52C0000
direct allocation
page execute and read and write
1328000
heap
page read and write
14DF000
heap
page read and write
4E11000
heap
page read and write
7FFD9B700000
trusted library allocation
page read and write
1895000
heap
page read and write
3BB2000
heap
page read and write
1DDF11F0000
heap
page read and write
8118000
heap
page read and write
203057F8000
heap
page read and write
1350000
heap
page read and write
22A82538000
heap
page read and write
89C000
unkown
page readonly
7FA5000
heap
page read and write
7F95000
heap
page read and write
7F3D000
heap
page read and write
17E32F11000
trusted library allocation
page read and write
1568000
heap
page read and write
3F4F000
stack
page read and write
7FFD9BA49000
trusted library allocation
page read and write
55EB000
stack
page read and write
10F9000
heap
page read and write
670000
direct allocation
page read and write
D8A000
unkown
page execute and read and write
3C8E000
stack
page read and write
15B4000
heap
page read and write
3A52000
heap
page read and write
18A8000
heap
page read and write
5460000
direct allocation
page execute and read and write
4C50000
direct allocation
page execute and read and write
1410000
direct allocation
page read and write
22BD7320000
trusted library allocation
page read and write
4A81000
heap
page read and write
15CE000
heap
page read and write
7F8D000
heap
page read and write
3DE6000
heap
page read and write
12FA000
heap
page read and write
138E000
stack
page read and write
1606000
heap
page read and write
425000
unkown
page read and write
4EAD000
stack
page read and write
ECE000
stack
page read and write
5490000
direct allocation
page execute and read and write
7FFD9B7E6000
trusted library allocation
page execute and read and write
4A4F000
stack
page read and write
3147000
heap
page read and write
7CC8000
heap
page read and write
3B61000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
29407E000
stack
page read and write
39F2000
heap
page read and write
19ECA51A000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1684000
heap
page read and write
D18000
unkown
page execute and read and write
17E3B278000
heap
page read and write
107F000
stack
page read and write
4890000
direct allocation
page execute and read and write
54E0000
direct allocation
page execute and read and write
7F5C000
heap
page read and write
3EB8000
heap
page read and write
A34000
heap
page read and write
3C7E000
stack
page read and write
4C0E000
stack
page read and write
1684000
heap
page read and write
1244000
heap
page read and write
7D6F000
stack
page read and write
153A000
heap
page read and write
ABF000
stack
page read and write
7F94000
heap
page read and write
50B0000
direct allocation
page execute and read and write
17E3B64E000
heap
page read and write
471F000
stack
page read and write
DED000
unkown
page execute and read and write
1DDF1560000
trusted library allocation
page read and write
DDE000
stack
page read and write
4B61000
heap
page read and write
33EE000
stack
page read and write
18DE000
heap
page read and write
4A81000
heap
page read and write
3A1A000
heap
page read and write
7F47000
heap
page read and write
BEB000
unkown
page execute and write copy
B47000
unkown
page execute and write copy
7F6D000
heap
page read and write
7CAA000
heap
page read and write
7EF0F4D000
stack
page read and write
2E0E000
stack
page read and write
4F51000
heap
page read and write
815A000
heap
page read and write
11A4000
heap
page read and write
8140000
heap
page read and write
33C0000
heap
page read and write
4C30000
trusted library allocation
page read and write
1861000
heap
page read and write
7CAA000
heap
page read and write
4E4E000
stack
page read and write
146C000
heap
page read and write
41AE000
stack
page read and write
13F5000
heap
page read and write
18AE000
heap
page read and write
4E11000
heap
page read and write
17CD000
heap
page read and write
7FFD9B8C0000
trusted library allocation
page execute and read and write
3B8F000
stack
page read and write
3B4E000
stack
page read and write
168B000
heap
page read and write
2D4D000
heap
page read and write
EBA000
heap
page read and write
13C0000
direct allocation
page read and write
6E2000
heap
page read and write
7F8D000
heap
page read and write
D2B000
stack
page read and write
1A90000
direct allocation
page execute and read and write
7F81000
heap
page read and write
42B1000
heap
page read and write
304F000
stack
page read and write
3C0E000
heap
page read and write
83D0000
trusted library allocation
page read and write
16BA000
heap
page read and write
745F000
stack
page read and write
7F81000
heap
page read and write
14FC000
stack
page read and write
1410000
direct allocation
page read and write
815A000
heap
page read and write
7CA2000
heap
page read and write
444E000
stack
page read and write
1533000
heap
page read and write
17E22E20000
trusted library allocation
page read and write
4E11000
heap
page read and write
7F95000
heap
page read and write
404E000
stack
page read and write
786000
unkown
page read and write
DED000
unkown
page execute and read and write
7F57000
heap
page read and write
6D6000
unkown
page execute and write copy
1244000
heap
page read and write
3F4E000
stack
page read and write
3A3F000
heap
page read and write
19EC9C8F000
heap
page read and write
FF3D0FE000
stack
page read and write
15B4000
heap
page read and write
19ECF4C0000
remote allocation
page read and write
4DC1000
heap
page read and write
8154000
heap
page read and write
399E000
stack
page read and write
46CF000
stack
page read and write
4B3F000
stack
page read and write
12FC000
heap
page read and write
1400000
direct allocation
page read and write
378F000
stack
page read and write
1DDF12A0000
trusted library allocation
page read and write
7CBF000
heap
page read and write
3F4E000
stack
page read and write
8DB737E000
unkown
page readonly
1176000
heap
page read and write
42B1000
heap
page read and write
41AF000
stack
page read and write
7F4F000
heap
page read and write
160E000
heap
page read and write
80E8AFE000
stack
page read and write
1574000
heap
page read and write
37AF000
stack
page read and write
6BAF000
stack
page read and write
D40000
unkown
page execute and write copy
430E000
stack
page read and write
17E2444E000
trusted library allocation
page read and write
53E0000
direct allocation
page execute and read and write
4FA0000
direct allocation
page read and write
DFE000
unkown
page execute and write copy
3E19000
heap
page read and write
169D000
heap
page read and write
C80000
heap
page read and write
4B51000
heap
page read and write
7F57000
heap
page read and write
6D650FF000
stack
page read and write
54E0000
direct allocation
page execute and read and write
8020000
trusted library allocation
page read and write
11C9000
unkown
page execute and read and write
17CA000
heap
page read and write
4DC1000
heap
page read and write
7CD8000
heap
page read and write
D8B000
unkown
page execute and write copy
1244000
heap
page read and write
13B9000
heap
page read and write
52F0000
direct allocation
page read and write
15B4000
heap
page read and write
14BC838000
stack
page read and write
1637000
heap
page read and write
7F0D000
heap
page read and write
7D90000
remote allocation
page read and write
328E000
stack
page read and write
BC1000
unkown
page execute and read and write
7F15000
heap
page read and write
4DC1000
heap
page read and write
4E11000
heap
page read and write
8159000
heap
page read and write
7CF3000
heap
page read and write
15EE000
heap
page read and write
5580000
direct allocation
page execute and read and write
1474000
heap
page read and write
4E11000
heap
page read and write
1CA54DA0000
heap
page read and write
19ECF408000
trusted library allocation
page read and write
1574000
heap
page read and write
3994000
heap
page read and write
ED4000
heap
page read and write
340E000
stack
page read and write
50BF000
stack
page read and write
4E11000
heap
page read and write
1244000
heap
page read and write
1700000
heap
page read and write
40CE000
stack
page read and write
AD1000
unkown
page execute and write copy
7F57000
heap
page read and write
14FA000
heap
page read and write
19ECF150000
trusted library allocation
page read and write
1684000
heap
page read and write
3A05000
heap
page read and write
4E11000
heap
page read and write
1CA56D7C000
trusted library allocation
page read and write
7CF2000
heap
page read and write
187C000
heap
page read and write
3C04000
heap
page read and write
1528000
heap
page read and write
3C61000
heap
page read and write
134F000
stack
page read and write
53E0000
direct allocation
page execute and read and write
EF9000
unkown
page execute and write copy
EB0000
unkown
page execute and write copy
33AF000
stack
page read and write
5040000
direct allocation
page execute and read and write
1CA532F0000
heap
page read and write
160E000
heap
page read and write
350F000
stack
page read and write
19ECF2FC000
heap
page read and write
D05000
unkown
page execute and read and write
B80000
unkown
page readonly
D18000
unkown
page execute and read and write
431000
unkown
page write copy
78AE000
stack
page read and write
7F8D000
heap
page read and write
8020000
trusted library allocation
page read and write
ED4000
heap
page read and write
EA0000
direct allocation
page read and write
E40000
unkown
page execute and read and write
17E2459A000
trusted library allocation
page read and write
8DB8F7E000
unkown
page readonly
50F0000
direct allocation
page execute and read and write
161A000
heap
page read and write
4B61000
heap
page read and write
4DC1000
heap
page read and write
7F4F000
heap
page read and write
1CA53740000
trusted library allocation
page read and write
327E000
stack
page read and write
4DC1000
heap
page read and write
176E000
heap
page read and write
1474000
heap
page read and write
DE0000
heap
page read and write
4A81000
heap
page read and write
D3B000
unkown
page execute and write copy
18F0000
heap
page read and write
CD1000
unkown
page write copy
16AC000
heap
page read and write
C7F000
stack
page read and write
17E3B1CB000
heap
page read and write
2B1F000
stack
page read and write
2FBE000
stack
page read and write
7CA3000
heap
page read and write
454F000
stack
page read and write
11F8000
heap
page read and write
1395000
heap
page read and write
42B1000
heap
page read and write
1684000
heap
page read and write
4F51000
heap
page read and write
1574000
heap
page read and write
17C9000
heap
page read and write
13FA000
heap
page read and write
480E000
stack
page read and write
7DB2000
heap
page read and write
38D9000
heap
page read and write
364F000
stack
page read and write
430F000
stack
page read and write
4A70000
direct allocation
page read and write
42B1000
heap
page read and write
1653000
heap
page read and write
484E000
stack
page read and write
4FB1000
heap
page read and write
3D81000
heap
page read and write
4F20000
direct allocation
page read and write
5490000
direct allocation
page execute and read and write
14B7000
heap
page read and write
4DC1000
heap
page read and write
7F8D000
heap
page read and write
670000
direct allocation
page read and write
432E000
stack
page read and write
D88000
unkown
page execute and read and write
15B4000
heap
page read and write
3C5E000
heap
page read and write
15D4000
heap
page read and write
39B9000
heap
page read and write
12CB000
heap
page read and write
3E31000
heap
page read and write
EA0000
direct allocation
page read and write
80E8B7E000
stack
page read and write
42B1000
heap
page read and write
17E211DA000
heap
page read and write
1244000
heap
page read and write
1684000
heap
page read and write
614000
heap
page read and write
42B1000
heap
page read and write
16BB000
heap
page read and write
16CC000
heap
page read and write
417E000
stack
page read and write
31CE000
stack
page read and write
176E000
heap
page read and write
20305720000
heap
page read and write
5320000
direct allocation
page execute and read and write
7FC4000
heap
page read and write
8139000
heap
page read and write
3DAD000
heap
page read and write
7F7D000
heap
page read and write
540000
heap
page read and write
9EA000
stack
page read and write
38AF000
stack
page read and write
1DDF1560000
trusted library allocation
page read and write
3E47000
heap
page read and write
7D44000
heap
page read and write
7FFD9B74C000
trusted library allocation
page execute and read and write
DDA000
unkown
page execute and write copy
7CB1000
heap
page read and write
1624000
heap
page read and write
10DF000
heap
page read and write
1244000
heap
page read and write
4DC1000
heap
page read and write
1298000
heap
page read and write
D74000
unkown
page execute and write copy
421F000
stack
page read and write
190A000
heap
page read and write
4E11000
heap
page read and write
4B51000
heap
page read and write
5540000
direct allocation
page execute and read and write
6FF8000
heap
page read and write
937E000
heap
page read and write
7D9F000
heap
page read and write
4CCF000
stack
page read and write
C90000
heap
page read and write
4F51000
heap
page read and write
4A70000
direct allocation
page read and write
13C0000
direct allocation
page read and write
133F000
heap
page read and write
3C9D000
heap
page read and write
4A3E000
stack
page read and write
8154000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
4DC1000
heap
page read and write
E52000
unkown
page execute and read and write
7D5D000
heap
page read and write
3C39000
heap
page read and write
ED4000
heap
page read and write
7F59000
heap
page read and write
19ECAB80000
trusted library section
page readonly
871000
unkown
page execute and read and write
156A000
heap
page read and write
AD0000
unkown
page readonly
4E11000
heap
page read and write
7F0D000
heap
page read and write
7CBA000
heap
page read and write
42D0000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
50FD000
stack
page read and write
4E11000
heap
page read and write
7F71000
heap
page read and write
812B000
heap
page read and write
1A3E000
stack
page read and write
614000
heap
page read and write
140D000
heap
page read and write
3B8E000
stack
page read and write
1628000
heap
page read and write
5020000
direct allocation
page execute and read and write
7CDA000
heap
page read and write
1578000
heap
page read and write
50B0000
direct allocation
page execute and read and write
D87000
unkown
page execute and write copy
7F3C000
heap
page read and write
1400000
heap
page read and write
12BD000
heap
page read and write
4E30000
direct allocation
page execute and read and write
11A4000
heap
page read and write
1259000
heap
page read and write
11A4000
heap
page read and write
42B1000
heap
page read and write
1679000
heap
page read and write
2EAF000
stack
page read and write
A18000
unkown
page execute and read and write
3E17000
heap
page read and write
670000
direct allocation
page read and write
408E000
stack
page read and write
4721000
heap
page read and write
5490000
direct allocation
page execute and read and write
47BE000
stack
page read and write
152C000
heap
page read and write
1574000
heap
page read and write
B3B000
unkown
page execute and write copy
614000
heap
page read and write
147E000
heap
page read and write
529E000
stack
page read and write
19ECF470000
trusted library allocation
page read and write
12CE000
stack
page read and write
490F000
stack
page read and write
4ACE000
stack
page read and write
7CD2000
heap
page read and write
E8E000
stack
page read and write
7CFF000
heap
page read and write
1DDF3050000
trusted library allocation
page read and write
3FDE000
stack
page read and write
1305000
heap
page read and write
404F000
stack
page read and write
5720000
heap
page read and write
4BCE000
stack
page read and write
8010000
trusted library allocation
page read and write
19ECF4FF000
trusted library allocation
page read and write
1430000
direct allocation
page read and write
476F000
stack
page read and write
AAE000
stack
page read and write
8DB8B7E000
unkown
page readonly
4E50000
direct allocation
page execute and read and write
165C000
heap
page read and write
10F0000
heap
page read and write
1684000
heap
page read and write
19EC9C7B000
heap
page read and write
89C000
unkown
page readonly
7D40000
heap
page read and write
1CA53720000
trusted library allocation
page read and write
15D4000
heap
page read and write
3E0F000
stack
page read and write
466C000
stack
page read and write
15D4000
heap
page read and write
13C4000
heap
page read and write
56F0000
heap
page read and write
A34000
heap
page read and write
B80000
unkown
page read and write
53F0000
direct allocation
page execute and read and write
1244000
heap
page read and write
3D9A000
heap
page read and write
7FFD9B8F0000
trusted library allocation
page execute and read and write
14DA000
heap
page read and write
3F7C000
heap
page read and write
454E000
stack
page read and write
5040000
direct allocation
page execute and read and write
454F000
stack
page read and write
19ECF2A8000
heap
page read and write
3A04000
heap
page read and write
19ECF150000
trusted library allocation
page read and write
19EC9C73000
heap
page read and write
7FFD9BA52000
trusted library allocation
page read and write
ED4000
heap
page read and write
390F000
stack
page read and write
7D04000
heap
page read and write
15D4000
heap
page read and write
7FAD000
heap
page read and write
D5F000
unkown
page execute and write copy
509F000
stack
page read and write
444F000
stack
page read and write
72DE000
heap
page read and write
1704000
heap
page read and write
5120000
direct allocation
page execute and read and write
61A000
heap
page read and write
4FB1000
heap
page read and write
2BDE000
stack
page read and write
4E11000
heap
page read and write
8D4000
unkown
page readonly
5490000
direct allocation
page execute and read and write
630000
unkown
page readonly
720000
unkown
page read and write
681000
unkown
page execute and read and write
72E0000
heap
page read and write
22BD7270000
trusted library allocation
page read and write
17E244C5000
trusted library allocation
page read and write
7FC3000
heap
page read and write
1477000
heap
page read and write
1400000
heap
page read and write
3D5D000
heap
page read and write
17E3B228000
heap
page read and write
3930000
heap
page read and write
1544000
heap
page read and write
D68000
unkown
page execute and read and write
394E000
stack
page read and write
4DC1000
heap
page read and write
122B000
heap
page read and write
14B5000
heap
page read and write
17B0000
heap
page read and write
4E11000
heap
page read and write
1364000
heap
page read and write
3A08000
heap
page read and write
13CE000
heap
page read and write
133E000
heap
page read and write
4DC1000
heap
page read and write
1CA6D22E000
heap
page read and write
4DC1000
heap
page read and write
1501000
heap
page read and write
DA9000
unkown
page execute and write copy
19ECF1F0000
trusted library allocation
page read and write
1459000
heap
page read and write
4EC0000
remote allocation
page read and write
D8B000
unkown
page execute and write copy
53CE000
stack
page read and write
1D5F000
stack
page read and write
328E000
stack
page read and write
3AB9000
heap
page read and write
14E2000
heap
page read and write
8149000
heap
page read and write
1CA53513000
heap
page read and write
7F8D000
heap
page read and write
5080000
direct allocation
page execute and read and write
44DE000
stack
page read and write
17FD000
heap
page read and write
4CD1000
heap
page read and write
1574000
heap
page read and write
FF3CB24000
stack
page read and write
4DC1000
heap
page read and write
17E212F5000
heap
page read and write
203057F0000
heap
page read and write
4B5000
heap
page read and write
12EE000
heap
page read and write
4E11000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
7CDB000
heap
page read and write
3C4F000
stack
page read and write
8010000
trusted library allocation
page read and write
D6B000
unkown
page execute and write copy
1303000
heap
page read and write
7FFD9BB60000
trusted library allocation
page read and write
1DDF12A0000
trusted library allocation
page read and write
7F4D000
heap
page read and write
4DC1000
heap
page read and write
20305750000
heap
page read and write
7DAC000
heap
page read and write
3F0F000
stack
page read and write
FFB000
stack
page read and write
7D2B000
heap
page read and write
203057FC000
heap
page read and write
8010000
trusted library allocation
page read and write
458E000
stack
page read and write
813A000
heap
page read and write
1736000
heap
page read and write
18B5000
heap
page read and write
ED4000
heap
page read and write
17E331DB000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
177C000
heap
page read and write
ED4000
heap
page read and write
4DC1000
heap
page read and write
7CE8000
heap
page read and write
3D1F000
stack
page read and write
189A000
heap
page read and write
3E80000
heap
page read and write
8CC000
unkown
page read and write
28AE000
stack
page read and write
4900000
direct allocation
page execute and read and write
472E000
stack
page read and write
4CCE000
stack
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
396E000
heap
page read and write
4890000
direct allocation
page execute and read and write
39E0000
heap
page read and write
7CC9000
heap
page read and write
4793000
direct allocation
page read and write
19EC9D02000
heap
page read and write
3CCE000
stack
page read and write
4B61000
heap
page read and write
1571000
heap
page read and write
3AB5000
heap
page read and write
1368000
heap
page read and write
D89000
unkown
page execute and write copy
390E000
stack
page read and write
3C1E000
stack
page read and write
866000
unkown
page execute and write copy
15AC000
heap
page read and write
42B1000
heap
page read and write
2F00000
heap
page read and write
1434000
heap
page read and write
57BF000
heap
page read and write
DE6000
unkown
page execute and write copy
4DC1000
heap
page read and write
17E3B147000
heap
page execute and read and write
15C9000
heap
page read and write
7F9E000
heap
page read and write
8118000
heap
page read and write
4E11000
heap
page read and write
4FB1000
heap
page read and write
480E000
stack
page read and write
121E000
heap
page read and write
4EC0000
remote allocation
page read and write
7FFD9B6FD000
trusted library allocation
page execute and read and write
340E000
stack
page read and write
444E000
stack
page read and write
4F51000
heap
page read and write
468F000
stack
page read and write
53F0000
trusted library allocation
page read and write
7D99000
heap
page read and write
1624000
heap
page read and write
E0E000
stack
page read and write
7CBC000
heap
page read and write
162D000
heap
page read and write
14CE000
heap
page read and write
7F57000
heap
page read and write
1674000
heap
page read and write
79D0000
remote allocation
page read and write
4720000
heap
page read and write
CD7000
unkown
page execute and write copy
2E5E000
stack
page read and write
83D0000
trusted library allocation
page read and write
113E000
stack
page read and write
7F7C000
heap
page read and write
811B000
heap
page read and write
7F6B000
heap
page read and write
4F51000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
4721000
heap
page read and write
5570000
direct allocation
page execute and read and write
14F8000
heap
page read and write
425000
unkown
page write copy
5120000
direct allocation
page execute and read and write
3B36000
heap
page read and write
D53000
unkown
page execute and write copy
7D45000
heap
page read and write
354E000
stack
page read and write
4E11000
heap
page read and write
BB5000
unkown
page execute and read and write
7DB1000
heap
page read and write
E7C000
stack
page read and write
DD0000
heap
page read and write
4E11000
heap
page read and write
5490000
direct allocation
page execute and read and write
4E11000
heap
page read and write
19EC9D13000
heap
page read and write
7FFD9B702000
trusted library allocation
page read and write
3CCE000
stack
page read and write
7F15000
heap
page read and write
148D000
heap
page read and write
7705000
heap
page read and write
1364000
heap
page read and write
4920000
direct allocation
page execute and read and write
11A4000
heap
page read and write
7FFD9BB00000
trusted library allocation
page read and write
135F000
heap
page read and write
DE6000
unkown
page execute and write copy
4A4F000
stack
page read and write
7FFD9B710000
trusted library allocation
page read and write
D3F000
unkown
page execute and read and write
7940000
heap
page read and write
440F000
stack
page read and write
50DE000
stack
page read and write
A26000
unkown
page execute and read and write
B80000
unkown
page readonly
1CA53576000
heap
page read and write
11A4000
heap
page read and write
7F31000
heap
page read and write
41A9000
heap
page read and write
614000
heap
page read and write
1160000
heap
page read and write
7CDF000
heap
page read and write
16D1000
heap
page read and write
A34000
heap
page read and write
7D2B000
heap
page read and write
5080000
direct allocation
page execute and read and write
1684000
heap
page read and write
8159000
heap
page read and write
14BC8B9000
stack
page read and write
4B51000
heap
page read and write
141A000
heap
page read and write
B34000
unkown
page execute and read and write
7FFD9B990000
trusted library allocation
page read and write
5090000
direct allocation
page execute and read and write
ED4000
heap
page read and write
151E000
heap
page read and write
1544000
heap
page read and write
3EFE000
stack
page read and write
53F0000
direct allocation
page execute and read and write
42CF000
stack
page read and write
5130000
direct allocation
page execute and read and write
4E11000
heap
page read and write
7CBA000
heap
page read and write
8154000
heap
page read and write
8123000
heap
page read and write
9D1000
unkown
page execute and read and write
478F000
stack
page read and write
1874000
heap
page read and write
52D0000
direct allocation
page execute and read and write
6D64883000
stack
page read and write
4B60000
trusted library allocation
page read and write
167A000
heap
page read and write
414F000
stack
page read and write
692F000
stack
page read and write
7FFD9BB40000
trusted library allocation
page read and write
56DE000
stack
page read and write
3E5F000
stack
page read and write
72E0000
heap
page read and write
1300000
heap
page read and write
163A000
heap
page read and write
2C7E000
stack
page read and write
670000
direct allocation
page read and write
5100000
direct allocation
page execute and read and write
4E11000
heap
page read and write
125E000
heap
page read and write
17E24778000
trusted library allocation
page read and write
8C2000
unkown
page readonly
8D0000
unkown
page write copy
129B000
heap
page read and write
4F90000
direct allocation
page read and write
4E11000
heap
page read and write
5010000
direct allocation
page execute and read and write
775000
unkown
page read and write
3BC0000
heap
page read and write
1CA534CF000
heap
page read and write
454E000
stack
page read and write
1CA533D0000
heap
page read and write
7D02000
heap
page read and write
8CC000
unkown
page write copy
14BCB3E000
stack
page read and write
7D91000
heap
page read and write
12D4000
heap
page read and write
7CAA000
heap
page read and write
AD1000
unkown
page execute and write copy
ED4000
heap
page read and write
4DD1000
heap
page read and write
8143000
heap
page read and write
16C1000
heap
page read and write
CAC000
unkown
page execute and write copy
30F0000
heap
page read and write
3DEF000
stack
page read and write
7CE8000
heap
page read and write
19ECF51A000
trusted library allocation
page read and write
166A000
heap
page read and write
4E10000
direct allocation
page execute and read and write
812F000
heap
page read and write
5420000
direct allocation
page execute and read and write
7CC5000
heap
page read and write
EA0000
direct allocation
page read and write
453E000
stack
page read and write
14C2000
heap
page read and write
1574000
heap
page read and write
4E11000
heap
page read and write
5490000
direct allocation
page execute and read and write
3BBD000
heap
page read and write
1CA6D6D6000
heap
page read and write
1060000
heap
page read and write
3C4F000
stack
page read and write
B80000
unkown
page readonly
1400000
direct allocation
page read and write
302F000
stack
page read and write
614000
heap
page read and write
4A7B000
stack
page read and write
4C30000
direct allocation
page execute and read and write
32AE000
stack
page read and write
1222000
heap
page read and write
155E000
stack
page read and write
2ECE000
stack
page read and write
3D44000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7CF3000
heap
page read and write
7AED000
stack
page read and write
494E000
stack
page read and write
42B1000
heap
page read and write
442F000
stack
page read and write
7CE8000
heap
page read and write
5510000
direct allocation
page execute and read and write
3D02000
heap
page read and write
1853000
heap
page read and write
6D7000
unkown
page execute and write copy
1497000
heap
page read and write
377E000
stack
page read and write
DE6000
unkown
page execute and write copy
1CA6D7F0000
trusted library allocation
page read and write
670000
direct allocation
page read and write
4DC1000
heap
page read and write
18DE000
heap
page read and write
15AE000
stack
page read and write
2EEF000
stack
page read and write
ED4000
heap
page read and write
1528000
heap
page read and write
14C0000
heap
page read and write
14A9000
heap
page read and write
494E000
stack
page read and write
2D1F000
stack
page read and write
6FEC000
heap
page read and write
14BC579000
stack
page read and write
7F3C000
heap
page read and write
12E0000
heap
page read and write
14F8000
heap
page read and write
41B5000
heap
page read and write
164E000
heap
page read and write
7CF2000
heap
page read and write
1CA6D611000
heap
page read and write
4E11000
heap
page read and write
8DB7C7B000
stack
page read and write
17E21215000
heap
page read and write
15AD000
heap
page read and write
314F000
stack
page read and write
B39000
unkown
page write copy
1215000
heap
page read and write
A34000
heap
page read and write
140D000
heap
page read and write
4DC1000
heap
page read and write
7EF0F5E000
stack
page read and write
3CDB000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
3A4E000
stack
page read and write
614000
heap
page read and write
ED4000
heap
page read and write
5440000
direct allocation
page execute and read and write
4F50000
heap
page read and write
2066000
heap
page read and write
1244000
heap
page read and write
176E000
heap
page read and write
4B69000
heap
page read and write
53F0000
trusted library allocation
page read and write
D90000
heap
page read and write
4A70000
direct allocation
page read and write
167C000
heap
page read and write
19ECF222000
heap
page read and write
7F57000
heap
page read and write
22A82510000
heap
page read and write
D56000
unkown
page execute and read and write
47CF000
stack
page read and write
813F000
heap
page read and write
1688000
heap
page read and write
1653000
heap
page read and write
420E000
stack
page read and write
5560000
direct allocation
page execute and read and write
19ECF460000
trusted library allocation
page read and write
47F1000
heap
page read and write
B81000
unkown
page execute and write copy
148F000
stack
page read and write
7F15000
heap
page read and write
79AF000
stack
page read and write
7F3C000
heap
page read and write
1364000
heap
page read and write
AD0000
unkown
page read and write
4DC1000
heap
page read and write
38CF000
stack
page read and write
CCD000
stack
page read and write
7F1F000
heap
page read and write
8154000
heap
page read and write
195D000
heap
page read and write
22A82518000
heap
page read and write
1430000
direct allocation
page read and write
20305AF5000
heap
page read and write
18AB000
heap
page read and write
8FEB000
stack
page read and write
8EAD000
stack
page read and write
4870000
direct allocation
page execute and read and write
3A2D000
heap
page read and write
468F000
stack
page read and write
ED4000
heap
page read and write
89C000
unkown
page readonly
13D2000
heap
page read and write
19EC9CB2000
heap
page read and write
47F0000
heap
page read and write
17E24438000
trusted library allocation
page read and write
1400000
direct allocation
page read and write
812E000
heap
page read and write
7CCC000
heap
page read and write
2BE7000
heap
page read and write
5000000
direct allocation
page execute and read and write
6E37D000
unkown
page readonly
7DF467A90000
trusted library allocation
page execute and read and write
F5F000
unkown
page execute and read and write
7F82000
heap
page read and write
1621000
heap
page read and write
7FFD9BB00000
trusted library allocation
page read and write
F47000
unkown
page execute and write copy
7FFD9BAE0000
trusted library allocation
page read and write
1684000
heap
page read and write
7CE8000
heap
page read and write
537E000
stack
page read and write
103E000
stack
page read and write
1796000
heap
page read and write
8159000
heap
page read and write
682D000
stack
page read and write
5400000
direct allocation
page execute and read and write
2720000
heap
page read and write
350F000
stack
page read and write
1299000
heap
page read and write
5D60000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
39BF000
stack
page read and write
4A81000
heap
page read and write
172E000
heap
page read and write
425E000
stack
page read and write
812E000
heap
page read and write
1CA65251000
trusted library allocation
page read and write
CB7000
unkown
page execute and write copy
17E211DE000
heap
page read and write
E34000
unkown
page execute and read and write
F21000
unkown
page execute and read and write
167D000
heap
page read and write
5BF0000
heap
page read and write
4B61000
heap
page read and write
36DF000
stack
page read and write
14AF000
heap
page read and write
18FA000
heap
page read and write
8DB847E000
unkown
page readonly
1111000
unkown
page execute and read and write
CC0000
unkown
page execute and read and write
65F000
heap
page read and write
83D0000
trusted library allocation
page read and write
1647000
heap
page read and write
3B83000
heap
page read and write
342E000
stack
page read and write
3F7B000
heap
page read and write
7CBA000
heap
page read and write
7F57000
heap
page read and write
480E000
stack
page read and write
3C5D000
heap
page read and write
13C2000
heap
page read and write
418F000
stack
page read and write
47B000
stack
page read and write
117E000
heap
page read and write
7CF2000
heap
page read and write
14C8000
heap
page read and write
4A81000
heap
page read and write
7FB4000
heap
page read and write
ED3000
unkown
page execute and read and write
66EE000
stack
page read and write
1430000
heap
page read and write
48CF000
stack
page read and write
4DC1000
heap
page read and write
16A9000
heap
page read and write
13C0000
direct allocation
page read and write
E40000
unkown
page execute and write copy
3ABF000
heap
page read and write
17E7000
heap
page read and write
3AE9000
heap
page read and write
1383000
heap
page read and write
158C000
heap
page read and write
D04000
unkown
page execute and write copy
5420000
direct allocation
page execute and read and write
7CE8000
heap
page read and write
4B61000
heap
page read and write
22BD7232000
heap
page read and write
18D3000
heap
page read and write
1CA6D698000
heap
page read and write
42B1000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
7FCF000
heap
page read and write
17A4000
heap
page read and write
7CE8000
heap
page read and write
7F4E000
heap
page read and write
22BD70A0000
heap
page read and write
22BD7340000
trusted library allocation
page read and write
3C24000
heap
page read and write
11A4000
heap
page read and write
D3B000
unkown
page execute and write copy
7F59000
heap
page read and write
350E000
stack
page read and write
6720000
heap
page read and write
DE6000
unkown
page execute and write copy
4F51000
heap
page read and write
37CF000
stack
page read and write
41B5000
heap
page read and write
CD9000
unkown
page execute and read and write
801000
unkown
page execute read
66C5000
heap
page read and write
4DC1000
heap
page read and write
800000
unkown
page readonly
1364000
heap
page read and write
166C000
heap
page read and write
10DB000
heap
page read and write
14DC000
heap
page read and write
5010000
direct allocation
page execute and read and write
7FFD9B704000
trusted library allocation
page read and write
14C1000
heap
page read and write
7F5E000
heap
page read and write
8C0000
heap
page read and write
7CAF000
heap
page read and write
1DDF12D0000
heap
page read and write
14D5000
heap
page read and write
1574000
heap
page read and write
83D0000
trusted library allocation
page read and write
17E21140000
heap
page read and write
19ECA513000
heap
page read and write
4B70000
heap
page read and write
45AE000
stack
page read and write
ED4000
heap
page read and write
14C3000
heap
page read and write
4E11000
heap
page read and write
7FFD9B70B000
trusted library allocation
page read and write
B1B000
stack
page read and write
1AA6000
heap
page read and write
286F000
stack
page read and write
4F51000
heap
page read and write
1674000
heap
page read and write
193F000
heap
page read and write
ACA000
heap
page read and write
1483000
heap
page read and write
1642000
heap
page read and write
1764000
heap
page read and write
3E2E000
heap
page read and write
1364000
heap
page read and write
4B51000
heap
page read and write
3C9C000
heap
page read and write
53D0000
direct allocation
page execute and read and write
D01000
unkown
page execute and write copy
4C60000
direct allocation
page execute and read and write
7F6B000
heap
page read and write
3B2C000
heap
page read and write
4A4F000
stack
page read and write
DBA000
unkown
page execute and read and write
418E000
stack
page read and write
19ECF164000
trusted library allocation
page read and write
318B000
stack
page read and write
7F57000
heap
page read and write
521E000
stack
page read and write
699000
heap
page read and write
75FE000
stack
page read and write
F68000
unkown
page execute and read and write
6AAE000
stack
page read and write
7F57000
heap
page read and write
7FFD9B8BA000
trusted library allocation
page read and write
CD0000
unkown
page execute and write copy
3BC8000
heap
page read and write
66AE000
stack
page read and write
8D4000
unkown
page readonly
19ECF400000
trusted library allocation
page read and write
1890000
heap
page read and write
3A38000
heap
page read and write
72D1000
heap
page read and write
38CE000
stack
page read and write
15D0000
heap
page read and write
42B1000
heap
page read and write
1853000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
8155000
heap
page read and write
1853000
heap
page read and write
2ED0000
direct allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7F57000
heap
page read and write
395F000
stack
page read and write
3D2B000
heap
page read and write
3B83000
heap
page read and write
15B8000
heap
page read and write
1684000
heap
page read and write
1574000
heap
page read and write
172F000
heap
page read and write
1670000
direct allocation
page read and write
3AEC000
heap
page read and write
7FAC000
heap
page read and write
DEF000
unkown
page execute and write copy
7FAB000
heap
page read and write
7C7F000
stack
page read and write
22BD7270000
trusted library allocation
page read and write
5480000
direct allocation
page execute and read and write
53D0000
heap
page read and write
4DC1000
heap
page read and write
4E11000
heap
page read and write
3AFF000
stack
page read and write
7F63000
heap
page read and write
1CA6D810000
heap
page read and write
134F000
stack
page read and write
5490000
direct allocation
page execute and read and write
3BDE000
heap
page read and write
4C70000
direct allocation
page execute and read and write
3A1C000
heap
page read and write
3F0F000
stack
page read and write
1244000
heap
page read and write
DD7000
unkown
page execute and write copy
470D000
stack
page read and write
4BF0000
direct allocation
page execute and read and write
4DC1000
heap
page read and write
3B77000
heap
page read and write
F90000
direct allocation
page read and write
3B25000
heap
page read and write
3ABF000
heap
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
CAB000
unkown
page execute and read and write
3C7A000
heap
page read and write
181A000
heap
page read and write
7F31000
heap
page read and write
F19000
unkown
page execute and write copy
7F4D000
heap
page read and write
1574000
heap
page read and write
CC9000
unkown
page execute and read and write
3E0E000
stack
page read and write
8D4000
unkown
page readonly
81E000
stack
page read and write
ED4000
heap
page read and write
1574000
heap
page read and write
142D000
heap
page read and write
4DC1000
heap
page read and write
143B000
heap
page read and write
1108000
heap
page read and write
4B51000
heap
page read and write
7F81000
heap
page read and write
5490000
direct allocation
page execute and read and write
1684000
heap
page read and write
15B4000
heap
page read and write
4CFF000
stack
page read and write
17E24491000
trusted library allocation
page read and write
19EC9C78000
heap
page read and write
3BFD000
heap
page read and write
EAB000
unkown
page execute and write copy
1D0000
heap
page read and write
17E211D0000
heap
page read and write
D89000
unkown
page execute and write copy
7F3C000
heap
page read and write
4B51000
heap
page read and write
1736000
heap
page read and write
43B000
stack
page read and write
4721000
heap
page read and write
4BCE000
stack
page read and write
58AC000
stack
page read and write
59FE000
stack
page read and write
160E000
heap
page read and write
7C6E000
stack
page read and write
22A82540000
heap
page read and write
1CA6D363000
heap
page read and write
7CBA000
heap
page read and write
4890000
direct allocation
page execute and read and write
166C000
heap
page read and write
2B1F000
stack
page read and write
15D8000
heap
page read and write
FBF000
stack
page read and write
1105000
unkown
page execute and read and write
7F15000
heap
page read and write
7D45000
heap
page read and write
7F26000
heap
page read and write
39D7000
heap
page read and write
F76000
unkown
page execute and read and write
7F15000
heap
page read and write
4E11000
heap
page read and write
53E0000
direct allocation
page execute and read and write
17C9000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7CFB000
heap
page read and write
12B4000
heap
page read and write
FF3D3FE000
stack
page read and write
3A59000
heap
page read and write
8D0000
unkown
page write copy
7CF2000
heap
page read and write
11A4000
heap
page read and write
14DF000
heap
page read and write
7F3C000
heap
page read and write
4DC1000
heap
page read and write
4721000
heap
page read and write
7F31000
heap
page read and write
690E000
stack
page read and write
7FFD9B900000
trusted library allocation
page read and write
7F57000
heap
page read and write
7F15000
heap
page read and write
7DA8000
heap
page read and write
80E8CFE000
stack
page read and write
3B0F000
stack
page read and write
2F4F000
stack
page read and write
56AE000
stack
page read and write
3140000
heap
page read and write
1672000
heap
page read and write
4DC1000
heap
page read and write
154E000
stack
page read and write
4721000
heap
page read and write
5030000
direct allocation
page execute and read and write
3DCF000
stack
page read and write
8FAE000
stack
page read and write
393B000
heap
page read and write
4F90000
direct allocation
page read and write
22A8252A000
heap
page read and write
15AC000
heap
page read and write
3FA9000
heap
page read and write
1DDF15B5000
heap
page read and write
7D0B000
heap
page read and write
7D9C000
heap
page read and write
7F59000
heap
page read and write
7FA9000
heap
page read and write
7F93000
heap
page read and write
53E0000
direct allocation
page execute and read and write
195D000
heap
page read and write
15D4000
heap
page read and write
83D0000
trusted library allocation
page read and write
324F000
stack
page read and write
7F6A000
heap
page read and write
2A1F000
stack
page read and write
18DE000
heap
page read and write
A34000
heap
page read and write
8129000
heap
page read and write
7CF2000
heap
page read and write
1765000
heap
page read and write
300F000
stack
page read and write
765D000
stack
page read and write
19ECF450000
trusted library allocation
page read and write
50B0000
direct allocation
page execute and read and write
7DB1000
heap
page read and write
19ECAB90000
trusted library section
page readonly
349E000
stack
page read and write
7D1C000
heap
page read and write
7CFD000
heap
page read and write
133E000
stack
page read and write
19ECAC80000
trusted library allocation
page read and write
4A50000
heap
page read and write
1106000
unkown
page execute and write copy
7DFE000
stack
page read and write
15B4000
heap
page read and write
15B0000
heap
page read and write
203057A0000
heap
page read and write
1132000
heap
page read and write
D00000
unkown
page readonly
8DB7D7E000
unkown
page readonly
4721000
heap
page read and write
4DC1000
heap
page read and write
There are 5072 hidden memdumps, click here to show them.