IOC Report
SecuriteInfo.com.Win32.Evo-gen.15237.11182.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.Evo-gen.15237.11182.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\clip64[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\build12[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\clip64[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\cred64[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\sarra[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\amert[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\cred64[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000054001\amert.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000055001\831840b410.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000056001\c884f8452a.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000187001\build12.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000188001\build12.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\4d0ab15804\chrosha.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\L6h0MKsU674R9uRTEifr_26.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\Users\user\AppData\Local\Temp\lGaQRZaI9ZBmSkbqM2Ghh6s.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\c1ec479e5342a2\clip64.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\c1ec479e5342a2\cred64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x8e035783, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_e7f941c137a56bc35a442066886260e392eebb0_71691813_2d0c8636-0fc2-4001-88f0-874664e35bad\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_e7f941c137a56bc35a442066886260e392eebb0_71691813_7c03d346-bca5-4ef7-ba13-0d329aabc53b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_c884f8452a.exe_cb7c7044b12ad4d5eac6ccbe687b5b5249d82ef_d12a3eaf_f8b9a4f9-955c-458d-a5da-73d12567bae0\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4E2.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Apr 19 01:29:42 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER60C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER63C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7FF.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Apr 19 01:29:43 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER938.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER968.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREE0E.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Apr 19 01:29:36 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF023.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF0A1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\_Files_\BJZFPPWAPT.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\BJZFPPWAPT.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\DUUDTUBZFW.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\GRXZDKKVDB.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\PALRGUCVEH.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\ZGGKNSUKOP.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0xxqvxcx.a0c.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bopvykdd.oof.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ir3hvxn4.n1i.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rvypm1z1.fpp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobebQmh7W1i7Wir\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobebQmh7W1i7Wir\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobebQmh7W1i7Wir\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobevqkoBMIvF7c3\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobevqkoBMIvF7c3\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobevqkoBMIvF7c3\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\heidibQmh7W1i7Wir\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidibQmh7W1i7Wir\07LucNa8jukyWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\heidibQmh7W1i7Wir\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidibQmh7W1i7Wir\7XR6xMZjKO19Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidibQmh7W1i7Wir\CITywoXtg3A3Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidibQmh7W1i7Wir\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidibQmh7W1i7Wir\EQdiqCjz0H8hWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidibQmh7W1i7Wir\IGPZ0gzg5563Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\heidibQmh7W1i7Wir\INEwiBvdy7w4Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidibQmh7W1i7Wir\SJkliA5V7z5tLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidibQmh7W1i7Wir\dqqa2Z_HIAV7History
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidibQmh7W1i7Wir\g8Bu6cD4CROQHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidibQmh7W1i7Wir\l97nQpdHtrGwLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidibQmh7W1i7Wir\m_zU7z10wd87Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\heidibQmh7W1i7Wir\ncGGapBPttpQHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidibQmh7W1i7Wir\xdpRti9nj1yoCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidibQmh7W1i7Wir\y69MPLSb6_5hWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\heidibQmh7W1i7Wir\yX7LbVUfjWEMHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidivqkoBMIvF7c3\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidivqkoBMIvF7c3\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidivqkoBMIvF7c3\3zhBGt1ZSpXxLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidivqkoBMIvF7c3\7shck7EoU5zbHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidivqkoBMIvF7c3\8WKYni7vc7xbWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidivqkoBMIvF7c3\AJ0N6EDplfFwWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidivqkoBMIvF7c3\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidivqkoBMIvF7c3\DJvHBWhRDG4bWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\heidivqkoBMIvF7c3\E8Idl7q7BQr3History
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidivqkoBMIvF7c3\GqGnAaGZuEf0Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidivqkoBMIvF7c3\HeGmTnwee70CHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidivqkoBMIvF7c3\WdcFI5q9u2RhHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidivqkoBMIvF7c3\ko3hkXjvgbJyWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\heidivqkoBMIvF7c3\qHlUA7t2UnGlLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidivqkoBMIvF7c3\rtwegp_kThPbCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\heidivqkoBMIvF7c3\t2bArKp9JT0dWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidivqkoBMIvF7c3\v6TCONTMO1JkCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidivqkoBMIvF7c3\yFCGJeJiS2CNWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp3811.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp3831.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp3852.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp3881.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp39A4.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp39EA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp39FA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp3A0A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp3F0F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp3F2F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp3F4F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp3FB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp3FE8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp41B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp41C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp43C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp43D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp45C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp687C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp689C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp68AD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp68CD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp6BC3.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp6BE4.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp6C04.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp6C24.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp6F05.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp6F06.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp6F25.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp6F26.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp6F46.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp6F55.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp71CA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp71DB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp71FB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp720C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp722C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp730F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp733F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp735F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp984A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp987A.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp9C0F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp9C2F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp9C40.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp9C60.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp9CB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp9EC.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpA3A5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA3E3.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA403.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA40A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpA479.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpA5DA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpA5EB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpA60B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpA61C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpBB8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpBD8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC92.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpCB2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpCBCE.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpCBEE.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpCDF5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpCE05.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpCE06.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpCE15.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpCE45.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD5FA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpD61A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpD839.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD849.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD853.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpD86A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 19 00:29:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 19 00:29:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 19 00:29:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 19 00:29:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 19 00:29:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\Tasks\chrosha.job
data
dropped
C:\Windows\Tasks\explorha.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 195
ASCII text, with very long lines (1631)
dropped
Chrome Cache Entry: 196
ASCII text, with very long lines (574)
dropped
Chrome Cache Entry: 197
ASCII text, with very long lines (4199)
dropped
Chrome Cache Entry: 198
ASCII text, with very long lines (405)
dropped
Chrome Cache Entry: 199
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 200
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
Chrome Cache Entry: 201
HTML document, ASCII text, with very long lines (682)
dropped
Chrome Cache Entry: 202
ASCII text, with very long lines (504)
dropped
Chrome Cache Entry: 203
ASCII text, with very long lines (834)
dropped
Chrome Cache Entry: 204
ASCII text, with very long lines (14200)
dropped
Chrome Cache Entry: 205
ASCII text, with very long lines (693)
dropped
Chrome Cache Entry: 206
Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
dropped
Chrome Cache Entry: 207
ASCII text, with very long lines (775)
dropped
Chrome Cache Entry: 208
ASCII text, with very long lines (3178)
dropped
Chrome Cache Entry: 209
ASCII text, with very long lines (1299)
dropped
Chrome Cache Entry: 210
ASCII text, with no line terminators
dropped
Chrome Cache Entry: 211
ASCII text, with very long lines (467)
dropped
Chrome Cache Entry: 212
ASCII text, with very long lines (2362)
dropped
unknown (copy)
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
There are 187 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15237.11182.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.15237.11182.exe"
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
"C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe"
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
malicious
C:\Windows\System32\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
malicious
C:\Windows\System32\netsh.exe
netsh wlan show profiles
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
malicious
C:\Users\user\AppData\Local\Temp\1000054001\amert.exe
"C:\Users\user\AppData\Local\Temp\1000054001\amert.exe"
malicious
C:\Users\user\AppData\Local\Temp\4d0ab15804\chrosha.exe
C:\Users\user\AppData\Local\Temp\4d0ab15804\chrosha.exe
malicious
C:\Users\user\AppData\Local\Temp\1000055001\831840b410.exe
"C:\Users\user\AppData\Local\Temp\1000055001\831840b410.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000056001\c884f8452a.exe
"C:\Users\user\AppData\Local\Temp\1000056001\c884f8452a.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
"C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000055001\831840b410.exe
"C:\Users\user\AppData\Local\Temp\1000055001\831840b410.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000056001\c884f8452a.exe
"C:\Users\user\AppData\Local\Temp\1000056001\c884f8452a.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000055001\831840b410.exe
"C:\Users\user\AppData\Local\Temp\1000055001\831840b410.exe"
malicious
C:\Users\user\AppData\Local\Temp\4d0ab15804\chrosha.exe
C:\Users\user\AppData\Local\Temp\4d0ab15804\chrosha.exe
malicious
C:\Users\user\AppData\Local\Temp\1000056001\c884f8452a.exe
"C:\Users\user\AppData\Local\Temp\1000056001\c884f8452a.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000187001\build12.exe
"C:\Users\user\AppData\Local\Temp\1000187001\build12.exe"
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
malicious
C:\Windows\System32\rundll32.exe
malicious
C:\Users\user\AppData\Local\Temp\1000188001\build12.exe
malicious
C:\Windows\System32\netsh.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1920,i,17797173087143306694,7612419587186816950,262144 /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5540 --field-trial-handle=1920,i,17797173087143306694,7612419587186816950,262144 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 --field-trial-handle=1920,i,17797173087143306694,7612419587186816950,262144 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 --field-trial-handle=1636,i,5624198576768077496,445941079671464976,262144 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3632 --field-trial-handle=1920,i,17797173087143306694,7612419587186816950,262144 /prefetch:8
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5596 -s 2132
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3872 --field-trial-handle=1920,i,17797173087143306694,7612419587186816950,262144 /prefetch:8
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 2052
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3436 -s 1948
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1984,i,457568203381776828,11237095852378400144,262144 /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
There are 39 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://b-stamps.gl.at.ply.gg:30946/
147.185.221.19
malicious
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1
193.233.132.56
malicious
http://193.233.132.56/Pneh2sXQk0/Plugins/clip64.dll
193.233.132.56
malicious
http://193.233.132.167/lend/build12.exe
193.233.132.167
malicious
http://193.233.132.167/cost/random.exe
193.233.132.167
malicious
http://193.233.132.167/cost/sarra.exe
193.233.132.167
malicious
http://193.233.132.56/Pneh2sXQk0/Plugins/cred64.dll
193.233.132.56
malicious
http://193.233.132.167/mine/random.exe
193.233.132.167
malicious
http://193.233.132.167/enigma/index.php?wal=1
193.233.132.167
malicious
http://193.233.132.56/Pneh2sXQk0/index.php
193.233.132.56
malicious
http://193.233.132.167/enigma/index.php
193.233.132.167
malicious
http://193.233.132.167/enigma/Plugins/cred64.dll
193.233.132.167
malicious
http://193.233.132.167/enigma/Plugins/clip64.dll
193.233.132.167
malicious
b-stamps.gl.at.ply.gg:30946
malicious
http://193.233.132.167/mine/amert.exe
193.233.132.167
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.youtube.com/accountM)
unknown
https://db-ip.com/demo/home.php?s=81.181.57.52r
unknown
https://db-ip.com/
unknown
http://193.233.132.167/cost/go.exerisepro
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
http://193.233.132.167/cost/go.exe
unknown
http://193.233.132.167/cost/go.exe0.1
unknown
https://nuget.org/nuget.exe
unknown
https://t.me/risepro_botisepro_bot
unknown
http://193.233.132.167/cost/lenin.exe/
unknown
http://www.winimage.com/zLibDllDp
unknown
https://t.5UHK
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
https://ipinfo.io/widget/demo/81.181.57.52E
unknown
https://t.me/risepro_botrisepW
unknown
https://db-ip.com/demo/home.php?s=81.181.57.52-
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://ipinfo.io/widget/demo/81.181.57.52L
unknown
https://contoso.com/Icon
unknown
https://db-ip.com/r
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ipinfo.io/widget/demo/81.181.57.526
unknown
http://crl.ver)
unknown
https://t.me/RiseProSUPPORT
unknown
https://t.me/risepro_botlater9
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://github.com/Pester/Pester
unknown
https://www.youtube.com/accountfmF(
unknown
https://www.youtube.com/account
64.233.185.136
https://www.google.com/favicon.ico
142.250.9.99
https://t.me/risepro_bot(m
unknown
https://ipinfo.io/
unknown
https://www.youtube.com/accountT)
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://db-ip.com/demo/home.php?s=81.181.57.52?q
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
http://www.winimage.com/zLibDllDpRTpR
unknown
http://147.45.47.102:57893/hera/amadka.exe
unknown
https://contoso.com/License
unknown
https://www.youtube.com/accountd
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://ipinfo.io:443/widget/demo/81.181.57.52#&K
unknown
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1ame=
unknown
https://www.youtube.com/accountp
unknown
http://193.233.132.167/cost/lenin.exe.eR
unknown
https://ipinfo.io:443/widget/demo/81.181.57.52
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://ipinfo.io/t
unknown
https://t.WU
unknown
http://193.233.132.167/cost/lenin.exe
unknown
http://193.233.132.167/cost/go.exeero
unknown
https://t.me/risepro_botrisepro
unknown
https://db-ip.com/J
unknown
https://db-ip.com/K
unknown
https://db-ip.com:443/demo/home.php?s=81.181.57.52
unknown
http://nuget.org/NuGet.exe
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://t.me/RiseProSUPPORTYo
unknown
https://t.me/risepro_botisepro_botP
unknown
https://aka.ms/winsvr-2022-pshelpX
unknown
https://t.me/RiseProSUPPORT%
unknown
http://www.winimage.com/zLibDllDpITpI
unknown
https://play.google.com/log?format=json&hasfast=true&authuser=0
74.125.138.101
https://ipinfo.io/Mozilla/5.0
unknown
https://ipinfo.io/widget/demo/81.181.57.52
34.117.186.192
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1E
unknown
https://t.me/RiseProSUPPORTrs
unknown
http://193.233.132.56/esI
unknown
https://t.me/risepro_botomania
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://g.live.com/odclientsettings/Prod/C:
unknown
https://t.me/risepro_bot
unknown
https://t.me/risepro_botlater
unknown
https://db-ip.com/demo/home.php?s=81.181.57.52
104.26.5.15
https://www.youtube.com/account7
unknown
http://www.winimage.com/zLibDll
unknown
https://aka.ms/pscore68
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
b-stamps.gl.at.ply.gg
147.185.221.19
malicious
accounts.youtube.com
unknown
malicious
api.ip.sb
unknown
malicious
www.youtube.com
unknown
malicious
youtube-ui.l.google.com
64.233.185.136
www3.l.google.com
108.177.122.101
play.google.com
74.125.138.101
ipinfo.io
34.117.186.192
www.google.com
142.250.9.99
db-ip.com
104.26.5.15

IPs

IP
Domain
Country
Malicious
193.233.132.56
unknown
Russian Federation
malicious
192.168.2.5
unknown
unknown
malicious
147.45.47.93
unknown
Russian Federation
malicious
193.233.132.167
unknown
Russian Federation
malicious
147.185.221.19
b-stamps.gl.at.ply.gg
United States
malicious
34.117.186.192
ipinfo.io
United States
142.250.9.104
unknown
United States
104.26.5.15
db-ip.com
United States
142.250.9.99
www.google.com
United States
64.233.185.136
youtube-ui.l.google.com
United States
142.250.105.100
unknown
United States
239.255.255.250
unknown
Reserved
108.177.122.101
www3.l.google.com
United States
127.0.0.1
unknown
unknown
74.125.138.101
play.google.com
United States
There are 5 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
831840b410.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
c884f8452a.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\c884f8452a.exe|62516a9f766f5274
ProgramId
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\c884f8452a.exe|62516a9f766f5274
FileId
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\c884f8452a.exe|62516a9f766f5274
LowerCaseLongPath
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\c884f8452a.exe|62516a9f766f5274
LongPathHash
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\c884f8452a.exe|62516a9f766f5274
Name
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\c884f8452a.exe|62516a9f766f5274
OriginalFileName
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\c884f8452a.exe|62516a9f766f5274
Publisher
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\c884f8452a.exe|62516a9f766f5274
Version
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\c884f8452a.exe|62516a9f766f5274
BinFileVersion
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\c884f8452a.exe|62516a9f766f5274
BinaryType
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\c884f8452a.exe|62516a9f766f5274
ProductName
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\c884f8452a.exe|62516a9f766f5274
ProductVersion
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\c884f8452a.exe|62516a9f766f5274
LinkDate
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\c884f8452a.exe|62516a9f766f5274
BinProductVersion
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\c884f8452a.exe|62516a9f766f5274
AppxPackageFullName
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\c884f8452a.exe|62516a9f766f5274
AppxPackageRelativeId
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\c884f8452a.exe|62516a9f766f5274
Size
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\c884f8452a.exe|62516a9f766f5274
Language
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\c884f8452a.exe|62516a9f766f5274
Usn
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProgramId
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
FileId
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LowerCaseLongPath
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LongPathHash
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Name
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
OriginalFileName
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Publisher
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Version
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinFileVersion
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinaryType
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductName
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductVersion
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LinkDate
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinProductVersion
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageFullName
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageRelativeId
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Size
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Language
\REGISTRY\A\{2dd35873-54b8-8e24-c51c-4751f15f2445}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build12_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build12_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build12_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build12_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build12_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build12_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build12_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build12_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build12_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build12_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build12_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build12_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build12_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build12_RASMANCS
FileDirectory
There are 69 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4FB0000
direct allocation
page read and write
malicious
4FE0000
direct allocation
page read and write
malicious
701000
unkown
page execute and read and write
malicious
7DEF000
heap
page read and write
malicious
5330000
direct allocation
page read and write
malicious
AA1000
unkown
page execute and read and write
malicious
48F0000
direct allocation
page read and write
malicious
891000
unkown
page execute and read and write
malicious
371000
unkown
page execute and read and write
malicious
7DEF000
heap
page read and write
malicious
5380000
direct allocation
page read and write
malicious
AA1000
unkown
page execute and read and write
malicious
4F20000
direct allocation
page read and write
malicious
7DEA000
heap
page read and write
malicious
4D90000
direct allocation
page read and write
malicious
7940000
heap
page read and write
malicious
701000
unkown
page execute and read and write
malicious
46B0000
direct allocation
page read and write
malicious
AA1000
unkown
page execute and read and write
malicious
7DEC000
heap
page read and write
malicious
4840000
direct allocation
page read and write
malicious
7EE5000
heap
page read and write
malicious
361000
unkown
page execute and read and write
malicious
3C2000
unkown
page readonly
malicious
891000
unkown
page execute and read and write
malicious
7C50000
heap
page read and write
malicious
7EE5000
heap
page read and write
malicious
4F30000
direct allocation
page read and write
malicious
52C0000
direct allocation
page read and write
malicious
7DEC000
heap
page read and write
malicious
B81000
unkown
page execute and read and write
malicious
4D70000
direct allocation
page read and write
malicious
4E00000
direct allocation
page read and write
malicious
71000
unkown
page execute and read and write
malicious
4820000
direct allocation
page execute and read and write
3E16000
heap
page read and write
17E6000
heap
page read and write
7CB7000
heap
page read and write
7EF4000
heap
page read and write
29EFCBF1000
heap
page read and write
1374000
heap
page read and write
1967CE40000
trusted library allocation
page read and write
1374000
heap
page read and write
7F2D000
heap
page read and write
1564000
heap
page read and write
17F6000
trusted library allocation
page execute and read and write
7FF848C40000
trusted library allocation
page read and write
37D7000
heap
page read and write
482F000
stack
page read and write
1564000
heap
page read and write
AF5000
trusted library allocation
page execute and read and write
29E81543000
trusted library allocation
page read and write
4830000
direct allocation
page execute and read and write
1374000
heap
page read and write
1374000
heap
page read and write
57D0000
trusted library allocation
page execute and read and write
3DFF000
stack
page read and write
1772000
heap
page read and write
5440000
direct allocation
page execute and read and write
40BE000
stack
page read and write
1048000
heap
page read and write
FAB000
heap
page read and write
1374000
heap
page read and write
11A9000
heap
page read and write
4911000
heap
page read and write
79A0000
remote allocation
page read and write
33CE000
stack
page read and write
61CB000
stack
page read and write
7F43000
heap
page read and write
10C3000
heap
page read and write
2E2E000
stack
page read and write
26E72200000
heap
page read and write
4EF1000
heap
page read and write
37B2000
trusted library allocation
page read and write
4FA0000
direct allocation
page execute and read and write
8FB0000
trusted library allocation
page read and write
A34000
heap
page read and write
1F406E20000
heap
page read and write
8310000
trusted library allocation
page read and write
D6000
unkown
page write copy
125F000
stack
page read and write
674000
unkown
page execute and read and write
7DF1000
heap
page read and write
8C79000
heap
page read and write
17E6000
heap
page read and write
48B0000
direct allocation
page execute and read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
98CA000
heap
page read and write
4440000
direct allocation
page read and write
189A000
heap
page read and write
FE8000
heap
page read and write
4A91000
heap
page read and write
7F99000
heap
page read and write
4A91000
heap
page read and write
1374000
heap
page read and write
29E814E5000
trusted library allocation
page read and write
5A0000
heap
page read and write
17D0000
trusted library allocation
page read and write
924000
heap
page read and write
1020000
direct allocation
page read and write
7F2D000
heap
page read and write
49D0000
direct allocation
page execute and read and write
8FF0000
trusted library allocation
page read and write
A34000
heap
page read and write
EE4000
heap
page read and write
2640000
trusted library allocation
page read and write
1374000
heap
page read and write
26FA000
trusted library allocation
page read and write
1374000
heap
page read and write
1E17CD8A000
heap
page read and write
4FFD000
stack
page read and write
44AB000
heap
page read and write
1600000
direct allocation
page read and write
7A04000
heap
page read and write
1374000
heap
page read and write
3E4C000
heap
page read and write
4EB1000
heap
page read and write
4C5A000
trusted library allocation
page read and write
26E71EB4000
heap
page read and write
4EF1000
heap
page read and write
AC0000
trusted library allocation
page read and write
1020000
direct allocation
page read and write
BF1000
unkown
page write copy
CA1000
unkown
page execute read
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
17E0000
heap
page read and write
4A91000
heap
page read and write
35AE000
stack
page read and write
19E2000
heap
page read and write
1164000
heap
page read and write
3B2E000
stack
page read and write
1918000
heap
page read and write
64C5000
heap
page read and write
66D0000
heap
page read and write
2BAF000
stack
page read and write
1168000
heap
page read and write
44A0000
direct allocation
page read and write
10A4000
heap
page read and write
172B000
stack
page read and write
9D0000
unkown
page execute and read and write
106C000
heap
page read and write
4B31000
heap
page read and write
11A6000
heap
page read and write
3EEB000
heap
page read and write
7DD7000
heap
page read and write
1B92000
heap
page read and write
76B000
unkown
page execute and read and write
185F000
heap
page read and write
92CE000
stack
page read and write
1374000
heap
page read and write
79EF000
heap
page read and write
7DE2000
heap
page read and write
3E83000
heap
page read and write
1E17CD50000
heap
page read and write
1861000
heap
page read and write
7F45000
heap
page read and write
1374000
heap
page read and write
3E1D000
heap
page read and write
454000
heap
page read and write
4EB1000
heap
page read and write
681F000
stack
page read and write
8D0B000
heap
page read and write
7F2D000
heap
page read and write
1374000
heap
page read and write
7F65000
heap
page read and write
1375000
heap
page read and write
1374000
heap
page read and write
18FD000
heap
page read and write
154E000
stack
page read and write
96A000
unkown
page execute and write copy
9FF000
unkown
page execute and write copy
7A35000
heap
page read and write
5D70000
trusted library allocation
page read and write
4A40000
direct allocation
page execute and read and write
924000
heap
page read and write
7CBD000
heap
page read and write
43A1000
heap
page read and write
1053000
heap
page read and write
BE5000
unkown
page read and write
EE0000
heap
page read and write
13C3000
heap
page read and write
1374000
heap
page read and write
7CBF000
heap
page read and write
5160000
direct allocation
page execute and read and write
F53AF7E000
stack
page read and write
7F86000
heap
page read and write
1044000
heap
page read and write
F8E000
heap
page read and write
10BB000
stack
page read and write
53A0000
direct allocation
page execute and read and write
7B4E000
stack
page read and write
1375000
heap
page read and write
146E000
heap
page read and write
1044000
heap
page read and write
1374000
heap
page read and write
1044000
heap
page read and write
53B0000
direct allocation
page execute and read and write
1375000
heap
page read and write
1374000
heap
page read and write
4060000
heap
page read and write
4DF0000
direct allocation
page read and write
1374000
heap
page read and write
7964000
heap
page read and write
1375000
heap
page read and write
10E4000
heap
page read and write
AE0000
trusted library allocation
page read and write
3789000
heap
page read and write
D62000
unkown
page readonly
3D2E000
stack
page read and write
7A24000
heap
page read and write
3FC0000
heap
page read and write
79E3000
heap
page read and write
1374000
heap
page read and write
5ED0000
trusted library allocation
page read and write
A34000
heap
page read and write
17D0000
heap
page read and write
7967000
heap
page read and write
1374000
heap
page read and write
7D0D000
heap
page read and write
7DB6000
heap
page read and write
F8B000
heap
page read and write
1375000
heap
page read and write
7A0F000
heap
page read and write
7E01000
heap
page read and write
3BBE000
stack
page read and write
B0F000
stack
page read and write
1375000
heap
page read and write
4911000
heap
page read and write
764000
unkown
page execute and read and write
183C000
heap
page read and write
8550000
trusted library allocation
page read and write
1374000
heap
page read and write
924000
heap
page read and write
5240000
trusted library allocation
page read and write
4A91000
heap
page read and write
7A35000
heap
page read and write
188E000
heap
page read and write
7973000
heap
page read and write
DD0000
heap
page read and write
1374000
heap
page read and write
40EF000
stack
page read and write
4231000
heap
page read and write
43A1000
heap
page read and write
7F45000
heap
page read and write
3ECF000
heap
page read and write
5490000
direct allocation
page execute and read and write
813B000
heap
page read and write
7C91000
heap
page read and write
1374000
heap
page read and write
866E000
stack
page read and write
11C7000
heap
page read and write
7870000
heap
page read and write
700000
unkown
page read and write
30C0000
direct allocation
page read and write
1374000
heap
page read and write
18F4000
heap
page read and write
17A0000
heap
page read and write
757E000
stack
page read and write
1374000
heap
page read and write
29E814B9000
trusted library allocation
page read and write
127E000
heap
page read and write
433E000
stack
page read and write
9800000
heap
page read and write
1852000
heap
page read and write
CAEDCFE000
unkown
page read and write
1374000
heap
page read and write
40B4000
heap
page read and write
950000
unkown
page execute and read and write
1375000
heap
page read and write
8131000
heap
page read and write
1186000
heap
page read and write
1374000
heap
page read and write
2AB8000
trusted library allocation
page read and write
D6F000
unkown
page execute and write copy
1967B685000
heap
page read and write
3F30000
heap
page read and write
1374000
heap
page read and write
7F49000
heap
page read and write
1374000
heap
page read and write
1375000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
977000
unkown
page execute and write copy
185D000
heap
page read and write
7C92000
heap
page read and write
114C000
heap
page read and write
26AF000
stack
page read and write
1990000
heap
page read and write
7CBF000
heap
page read and write
1374000
heap
page read and write
4F40000
direct allocation
page execute and read and write
4A81000
heap
page read and write
1375000
heap
page read and write
4E40000
direct allocation
page execute and read and write
3B4F000
stack
page read and write
3E80000
heap
page read and write
B70000
heap
page read and write
F53B07E000
stack
page read and write
7960000
heap
page read and write
198B000
heap
page read and write
4A80000
direct allocation
page read and write
43A1000
heap
page read and write
A90000
heap
page read and write
1374000
heap
page read and write
29EFCD30000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
7FF848F20000
trusted library allocation
page read and write
1730000
heap
page read and write
7CD0000
trusted library allocation
page read and write
FDD000
stack
page read and write
19CE000
heap
page read and write
4EB1000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
17E6000
heap
page read and write
1905000
heap
page read and write
436E000
stack
page read and write
4B2F000
stack
page read and write
796F000
heap
page read and write
7FF848D80000
trusted library allocation
page execute and read and write
1500000
heap
page read and write
7A35000
heap
page read and write
35AC000
trusted library allocation
page read and write
1374000
heap
page read and write
392F000
stack
page read and write
35EF000
stack
page read and write
3ED6000
heap
page read and write
29E805D5000
trusted library allocation
page read and write
1374000
heap
page read and write
4C10000
trusted library allocation
page execute and read and write
7F39000
heap
page read and write
759E000
stack
page read and write
1374000
heap
page read and write
4EF1000
heap
page read and write
1564000
heap
page read and write
1374000
heap
page read and write
454F000
stack
page read and write
1374000
heap
page read and write
29EFAE10000
heap
page readonly
378F000
stack
page read and write
1020000
direct allocation
page read and write
230F87F000
stack
page read and write
2EAC000
stack
page read and write
5460000
direct allocation
page execute and read and write
30C0000
direct allocation
page read and write
7FF848B90000
trusted library allocation
page read and write
401F000
stack
page read and write
30C0000
direct allocation
page read and write
4A91000
heap
page read and write
4451000
heap
page read and write
50EF000
direct allocation
page read and write
1B3E000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
7F0A000
heap
page read and write
3843000
trusted library allocation
page read and write
3F0E000
stack
page read and write
1061000
heap
page read and write
1007000
heap
page read and write
AA0000
unkown
page readonly
7F43000
heap
page read and write
2DDF000
stack
page read and write
29EFCC71000
heap
page read and write
7DCB000
heap
page read and write
1945000
heap
page read and write
4911000
heap
page read and write
1374000
heap
page read and write
7E01000
heap
page read and write
30C0000
direct allocation
page read and write
1375000
heap
page read and write
D63000
unkown
page execute and write copy
D3C000
unkown
page readonly
1523000
heap
page read and write
CA1000
unkown
page execute read
811C000
heap
page read and write
1F407195000
heap
page read and write
65E000
unkown
page execute and read and write
1374000
heap
page read and write
BE0000
unkown
page execute and read and write
7F0A000
heap
page read and write
1375000
heap
page read and write
38CF000
stack
page read and write
1BAD000
heap
page read and write
1374000
heap
page read and write
2839000
trusted library allocation
page read and write
1374000
heap
page read and write
4911000
heap
page read and write
1374000
heap
page read and write
3F2C000
heap
page read and write
C9E000
stack
page read and write
48E1000
heap
page read and write
811F000
heap
page read and write
10C3000
heap
page read and write
3FF9000
heap
page read and write
4B31000
heap
page read and write
3F28000
heap
page read and write
282E000
stack
page read and write
35BD000
heap
page read and write
7F39000
heap
page read and write
FDD000
heap
page read and write
1952000
heap
page read and write
36A1000
heap
page read and write
7F45000
heap
page read and write
4EF1000
heap
page read and write
5350000
direct allocation
page execute and read and write
4EF1000
heap
page read and write
7E01000
heap
page read and write
1374000
heap
page read and write
DFC000
unkown
page execute and read and write
1AAD000
heap
page read and write
33FF000
stack
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1E17AE70000
trusted library allocation
page read and write
1309000
heap
page read and write
38CE000
stack
page read and write
A34000
heap
page read and write
1AA4000
heap
page read and write
4911000
heap
page read and write
83A0000
trusted library allocation
page read and write
4451000
heap
page read and write
190E000
stack
page read and write
692747B000
stack
page read and write
1374000
heap
page read and write
7CBC000
heap
page read and write
1374000
heap
page read and write
156F000
heap
page read and write
17FA000
heap
page read and write
314E000
stack
page read and write
4D90000
direct allocation
page read and write
647F000
stack
page read and write
42CF000
stack
page read and write
2B87000
heap
page read and write
381A000
heap
page read and write
29EFAB60000
heap
page read and write
18F8000
heap
page read and write
17AE000
heap
page read and write
7DDA000
heap
page read and write
7CB8000
heap
page read and write
1374000
heap
page read and write
3E6E000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
11F0000
direct allocation
page read and write
50A0000
heap
page read and write
4EF1000
heap
page read and write
1173000
heap
page read and write
12DF000
heap
page read and write
37FE000
stack
page read and write
1374000
heap
page read and write
10A4000
heap
page read and write
BEF000
stack
page read and write
1542000
heap
page read and write
4980000
direct allocation
page execute and read and write
1374000
heap
page read and write
3FD7000
heap
page read and write
1967CE40000
trusted library allocation
page read and write
4A80000
direct allocation
page read and write
810E000
stack
page read and write
785D000
stack
page read and write
4911000
heap
page read and write
7D00000
heap
page read and write
454000
heap
page read and write
1E17AE70000
trusted library allocation
page read and write
97C000
unkown
page execute and read and write
4393000
trusted library allocation
page read and write
1831000
heap
page read and write
49F0000
direct allocation
page execute and read and write
1374000
heap
page read and write
33F2000
heap
page read and write
3C8D000
stack
page read and write
11AB000
heap
page read and write
12A1000
heap
page read and write
1A49000
heap
page read and write
18A1000
heap
page read and write
1374000
heap
page read and write
1480000
direct allocation
page read and write
4D6F000
stack
page read and write
D6000
unkown
page write copy
4911000
heap
page read and write
10E4000
heap
page read and write
4019000
heap
page read and write
1374000
heap
page read and write
769000
unkown
page read and write
A34000
heap
page read and write
3873000
heap
page read and write
29EFACF9000
heap
page read and write
D62000
unkown
page readonly
3FB4000
heap
page read and write
3F81000
heap
page read and write
7CDE000
heap
page read and write
7A1F000
heap
page read and write
10D6000
heap
page read and write
1564000
heap
page read and write
2A6F000
stack
page read and write
5340000
direct allocation
page execute and read and write
1375000
heap
page read and write
1264000
heap
page read and write
C29000
unkown
page execute and read and write
3FB4000
heap
page read and write
8E2000
unkown
page execute and read and write
6927077000
stack
page read and write
8111000
heap
page read and write
79F000
stack
page read and write
4930000
direct allocation
page execute and read and write
230F2C7000
stack
page read and write
91D000
unkown
page execute and write copy
7DF1000
heap
page read and write
E8E000
unkown
page execute and write copy
1374000
heap
page read and write
F91000
heap
page read and write
795E000
heap
page read and write
444E000
stack
page read and write
127C000
heap
page read and write
5350000
heap
page read and write
769000
unkown
page write copy
7FF848BB0000
trusted library allocation
page read and write
7EF1000
heap
page read and write
FCA000
heap
page read and write
19FF000
heap
page read and write
4FA0000
heap
page read and write
29E81C25000
trusted library allocation
page read and write
4A91000
heap
page read and write
1B5A000
heap
page read and write
1374000
heap
page read and write
1BE1000
heap
page read and write
454000
heap
page read and write
1375000
heap
page read and write
3EFD000
heap
page read and write
44EF000
stack
page read and write
105E000
stack
page read and write
3858000
heap
page read and write
7CE5000
heap
page read and write
E80000
heap
page read and write
48A0000
direct allocation
page execute and read and write
7A1A000
heap
page read and write
A34000
heap
page read and write
F53AFFE000
stack
page read and write
8124000
heap
page read and write
28FE000
stack
page read and write
7F39000
heap
page read and write
4451000
heap
page read and write
43A9000
trusted library allocation
page read and write
472E000
stack
page read and write
AF0000
trusted library allocation
page read and write
1C29000
heap
page read and write
28F6000
trusted library allocation
page read and write
43A1000
heap
page read and write
E7F000
unkown
page execute and write copy
1374000
heap
page read and write
36F5000
heap
page read and write
1854000
heap
page read and write
7DD7000
heap
page read and write
755E000
stack
page read and write
1044000
heap
page read and write
7DF1000
heap
page read and write
1374000
heap
page read and write
408E000
stack
page read and write
43AF000
stack
page read and write
1374000
heap
page read and write
5060000
direct allocation
page execute and read and write
7DE7000
heap
page read and write
454000
heap
page read and write
7FE0000
trusted library allocation
page read and write
3EAD000
heap
page read and write
4231000
heap
page read and write
3F81000
heap
page read and write
106E000
heap
page read and write
7CBD000
heap
page read and write
7F7E000
heap
page read and write
4911000
heap
page read and write
1374000
heap
page read and write
1044000
heap
page read and write
7A40000
trusted library allocation
page read and write
7CFD000
heap
page read and write
1840000
heap
page read and write
2783000
trusted library allocation
page read and write
1374000
heap
page read and write
F53B6BE000
stack
page read and write
7CB5000
heap
page read and write
3F0D000
heap
page read and write
367F000
stack
page read and write
795D000
heap
page read and write
EE4000
heap
page read and write
6A42000
heap
page read and write
1374000
heap
page read and write
177B000
heap
page read and write
5D7C000
stack
page read and write
7DCF000
heap
page read and write
8F8000
unkown
page execute and write copy
70000
unkown
page readonly
7ED0000
heap
page read and write
1374000
heap
page read and write
1F408976000
heap
page read and write
43E9000
trusted library allocation
page read and write
83D0000
trusted library allocation
page execute and read and write
1374000
heap
page read and write
1374000
heap
page read and write
5470000
direct allocation
page execute and read and write
43A1000
heap
page read and write
7D3F000
stack
page read and write
1258000
heap
page read and write
1898000
heap
page read and write
1374000
heap
page read and write
7060000
heap
page read and write
4A91000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
4C0000
heap
page read and write
1002000
heap
page read and write
CF0000
heap
page read and write
1B93000
heap
page read and write
4911000
heap
page read and write
19B3000
heap
page read and write
43A1000
heap
page read and write
1375000
heap
page read and write
4231000
heap
page read and write
509E000
stack
page read and write
1C2D000
heap
page read and write
1B36000
heap
page read and write
505F000
direct allocation
page read and write
4B31000
heap
page read and write
7F43000
heap
page read and write
7A1A000
heap
page read and write
6AAC000
stack
page read and write
3812000
trusted library allocation
page read and write
7F43000
heap
page read and write
A24000
heap
page read and write
1374000
heap
page read and write
FC8000
heap
page read and write
2B1B000
trusted library allocation
page read and write
65C000
heap
page read and write
48EE000
stack
page read and write
287D000
trusted library allocation
page read and write
40EE000
heap
page read and write
1F408978000
heap
page read and write
1854000
heap
page read and write
7F54000
heap
page read and write
4231000
heap
page read and write
5250000
trusted library allocation
page read and write
DFD000
unkown
page execute and write copy
1075000
heap
page read and write
1374000
heap
page read and write
10A4000
heap
page read and write
53C0000
direct allocation
page execute and read and write
29EFCF77000
heap
page read and write
2873000
trusted library allocation
page read and write
43A1000
heap
page read and write
1375000
heap
page read and write
8130000
heap
page read and write
18EE000
heap
page read and write
4911000
heap
page read and write
984A000
heap
page read and write
7E01000
heap
page read and write
4C5F000
trusted library allocation
page read and write
1374000
heap
page read and write
54E0000
direct allocation
page execute and read and write
4F60000
direct allocation
page execute and read and write
8657000
heap
page read and write
454000
heap
page read and write
4860000
direct allocation
page execute and read and write
1374000
heap
page read and write
2AC8000
trusted library allocation
page read and write
49D0000
direct allocation
page execute and read and write
7A35000
heap
page read and write
7F2D000
heap
page read and write
591E000
trusted library allocation
page read and write
F90000
heap
page read and write
332E000
stack
page read and write
7F5D000
heap
page read and write
454000
heap
page read and write
7F2A000
heap
page read and write
1564000
heap
page read and write
10A4000
heap
page read and write
1967B469000
heap
page read and write
7CA9000
heap
page read and write
7A60000
heap
page read and write
1374000
heap
page read and write
3C2F000
stack
page read and write
98CF000
heap
page read and write
4470000
heap
page read and write
7FF848DE0000
trusted library allocation
page read and write
6FBF000
stack
page read and write
4911000
heap
page read and write
4A91000
heap
page read and write
8C86000
heap
page read and write
AE2000
trusted library allocation
page read and write
1374000
heap
page read and write
7F30000
heap
page read and write
7DD8000
heap
page read and write
924000
heap
page read and write
1176000
heap
page read and write
F68000
heap
page read and write
769000
unkown
page write copy
D3C000
unkown
page readonly
1853000
heap
page read and write
1374000
heap
page read and write
10E4000
heap
page read and write
44BB000
heap
page read and write
7F30000
heap
page read and write
1374000
heap
page read and write
5010000
direct allocation
page execute and read and write
1374000
heap
page read and write
19CD000
heap
page read and write
1996000
heap
page read and write
1374000
heap
page read and write
7D4E000
heap
page read and write
EE4000
heap
page read and write
795D000
heap
page read and write
7CC1000
heap
page read and write
7CC3000
heap
page read and write
7EF1000
heap
page read and write
4911000
heap
page read and write
7CAC000
heap
page read and write
7CBD000
heap
page read and write
1374000
heap
page read and write
7F65000
heap
page read and write
7F4A000
heap
page read and write
11F0000
direct allocation
page read and write
7ABE000
stack
page read and write
6BE0000
heap
page read and write
4A91000
heap
page read and write
35DA000
heap
page read and write
402E000
stack
page read and write
1374000
heap
page read and write
7F45000
heap
page read and write
1B64000
heap
page read and write
4F00000
direct allocation
page execute and read and write
4911000
heap
page read and write
4EF1000
heap
page read and write
341A000
trusted library allocation
page read and write
17BC000
heap
page read and write
6CFE000
heap
page read and write
7F45000
heap
page read and write
1217000
heap
page read and write
42A1000
trusted library allocation
page read and write
7DD5000
heap
page read and write
11BE000
heap
page read and write
7CD5000
heap
page read and write
119F000
heap
page read and write
1374000
heap
page read and write
D74000
unkown
page readonly
4A91000
heap
page read and write
1374000
heap
page read and write
940000
heap
page read and write
4911000
heap
page read and write
4A81000
heap
page read and write
1375000
heap
page read and write
1374000
heap
page read and write
B80000
unkown
page read and write
3E1E000
heap
page read and write
F1B000
stack
page read and write
1922000
heap
page read and write
79C5000
heap
page read and write
7F43000
heap
page read and write
1374000
heap
page read and write
FFE000
stack
page read and write
1374000
heap
page read and write
79E6000
heap
page read and write
5840000
trusted library allocation
page read and write
4EB1000
heap
page read and write
18E6000
heap
page read and write
54C0000
direct allocation
page execute and read and write
4A91000
heap
page read and write
106D000
heap
page read and write
387D000
heap
page read and write
14EAB7B0000
trusted library allocation
page read and write
1430000
heap
page read and write
CAED93D000
stack
page read and write
3811000
trusted library allocation
page read and write
1542000
heap
page read and write
F80000
direct allocation
page read and write
6A3E000
heap
page read and write
5330000
direct allocation
page execute and read and write
9FF000
unkown
page execute and write copy
7CF7000
heap
page read and write
180F000
stack
page read and write
7FF848FB0000
trusted library allocation
page read and write
7F39000
heap
page read and write
370000
unkown
page readonly
39CF000
stack
page read and write
52E000
heap
page read and write
1374000
heap
page read and write
39AE000
stack
page read and write
1480000
direct allocation
page read and write
3C6E000
stack
page read and write
924000
heap
page read and write
7CB6000
heap
page read and write
97D000
unkown
page execute and write copy
7DDB000
heap
page read and write
67CF000
stack
page read and write
1374000
heap
page read and write
37AF000
trusted library allocation
page read and write
7E01000
heap
page read and write
4451000
heap
page read and write
292F000
stack
page read and write
14EABA63000
heap
page read and write
14D0000
heap
page read and write
36B5000
heap
page read and write
1374000
heap
page read and write
445E000
stack
page read and write
1374000
heap
page read and write
33DF000
stack
page read and write
4911000
heap
page read and write
58B0000
trusted library allocation
page read and write
35D9000
heap
page read and write
7DF1000
heap
page read and write
A34000
heap
page read and write
5980000
trusted library allocation
page read and write
3F67000
heap
page read and write
1374000
heap
page read and write
3831000
trusted library allocation
page read and write
1374000
heap
page read and write
4A4F000
stack
page read and write
7C91000
heap
page read and write
299E000
trusted library allocation
page read and write
29EFC7B0000
heap
page read and write
10E4000
heap
page read and write
4F90000
trusted library allocation
page read and write
1C22000
heap
page read and write
5430000
direct allocation
page execute and read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1375000
heap
page read and write
454000
heap
page read and write
F53C18E000
stack
page read and write
43EC000
heap
page read and write
371E000
heap
page read and write
4F60000
direct allocation
page execute and read and write
1375000
heap
page read and write
3FC3000
heap
page read and write
1374000
heap
page read and write
29EFAE30000
heap
page read and write
812E000
heap
page read and write
1374000
heap
page read and write
4F60000
direct allocation
page execute and read and write
4E40000
direct allocation
page execute and read and write
1967B5F0000
trusted library allocation
page read and write
F53B33E000
stack
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
30C0000
direct allocation
page read and write
7CBD000
heap
page read and write
1374000
heap
page read and write
2690000
trusted library allocation
page read and write
AF7000
trusted library allocation
page execute and read and write
1ACE000
heap
page read and write
1374000
heap
page read and write
1580000
heap
page read and write
1190000
heap
page read and write
7C86000
heap
page read and write
1374000
heap
page read and write
1564000
heap
page read and write
4911000
heap
page read and write
7FF848FD0000
trusted library allocation
page read and write
29E818D8000
trusted library allocation
page read and write
362D000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
1020000
direct allocation
page read and write
5D42000
trusted library allocation
page read and write
4C48000
trusted library allocation
page read and write
4B31000
heap
page read and write
1BEA000
heap
page read and write
4D1E000
stack
page read and write
10BA000
heap
page read and write
EFA000
stack
page read and write
2B2D000
trusted library allocation
page read and write
9F6000
unkown
page execute and write copy
43A1000
heap
page read and write
7C57000
heap
page read and write
11BD000
heap
page read and write
8111000
heap
page read and write
1375000
heap
page read and write
3F0D000
heap
page read and write
29EFC672000
heap
page read and write
4840000
direct allocation
page execute and read and write
7A64000
heap
page read and write
1374000
heap
page read and write
924000
heap
page read and write
4911000
heap
page read and write
BFE000
stack
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
133D000
stack
page read and write
43CC000
heap
page read and write
3798000
heap
page read and write
1374000
heap
page read and write
B80000
heap
page read and write
1374000
heap
page read and write
811B000
heap
page read and write
362E000
stack
page read and write
F9E000
heap
page read and write
452E000
stack
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
16AA000
heap
page read and write
44A0000
direct allocation
page read and write
3AEE000
stack
page read and write
1854000
heap
page read and write
1B2E000
heap
page read and write
9F2000
heap
page read and write
3D60000
heap
page read and write
12AE000
heap
page read and write
3F20000
heap
page read and write
1420000
heap
page read and write
1374000
heap
page read and write
358A000
heap
page read and write
4A81000
heap
page read and write
10E4000
heap
page read and write
1374000
heap
page read and write
29EFAC1F000
heap
page read and write
7F43000
heap
page read and write
7FF848BAB000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
14EAB920000
remote allocation
page read and write
4911000
heap
page read and write
A34000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
50B0000
direct allocation
page execute and read and write
19F5000
heap
page read and write
E70000
heap
page read and write
341C000
trusted library allocation
page read and write
9AFF000
stack
page read and write
1374000
heap
page read and write
10A4000
heap
page read and write
4911000
heap
page read and write
4F50000
direct allocation
page execute and read and write
7F43000
heap
page read and write
1374000
heap
page read and write
510000
direct allocation
page read and write
1B3C000
heap
page read and write
7F45000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
1375000
heap
page read and write
7CBD000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
4911000
heap
page read and write
8130000
heap
page read and write
2A84000
trusted library allocation
page read and write
FA0000
heap
page read and write
1374000
heap
page read and write
1542000
heap
page read and write
5304000
heap
page read and write
4F40000
direct allocation
page execute and read and write
1375000
heap
page read and write
197E000
heap
page read and write
5F20000
trusted library allocation
page read and write
43A1000
heap
page read and write
79A0000
remote allocation
page read and write
351E000
stack
page read and write
98B000
unkown
page execute and read and write
1374000
heap
page read and write
367F000
stack
page read and write
1374000
heap
page read and write
19A5000
heap
page read and write
4A81000
heap
page read and write
9FD000
unkown
page execute and read and write
47AE000
stack
page read and write
A3246ED000
stack
page read and write
769000
unkown
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
5080000
direct allocation
page execute and read and write
CA1000
unkown
page execute read
836000
heap
page read and write
50E000
stack
page read and write
FEF000
heap
page read and write
2BAF000
stack
page read and write
1375000
heap
page read and write
3E14000
heap
page read and write
1374000
heap
page read and write
6D00000
heap
page read and write
7FF848C4C000
trusted library allocation
page execute and read and write
1374000
heap
page read and write
4911000
heap
page read and write
A34000
heap
page read and write
1374000
heap
page read and write
1884000
heap
page read and write
37E2000
heap
page read and write
3C5F000
stack
page read and write
F53B4BE000
stack
page read and write
4451000
heap
page read and write
18E2000
heap
page read and write
1271000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
79EB000
heap
page read and write
42CE000
stack
page read and write
267E000
stack
page read and write
CA0000
unkown
page readonly
8136000
heap
page read and write
404F000
stack
page read and write
53C0000
direct allocation
page execute and read and write
1374000
heap
page read and write
EE4000
heap
page read and write
2AAE000
stack
page read and write
1374000
heap
page read and write
4971000
heap
page read and write
909000
unkown
page execute and read and write
4971000
heap
page read and write
1374000
heap
page read and write
39DF000
stack
page read and write
44A0000
trusted library allocation
page read and write
4D60000
direct allocation
page read and write
2B41000
trusted library allocation
page read and write
5CD000
heap
page read and write
7CE8000
heap
page read and write
1A0A000
heap
page read and write
1374000
heap
page read and write
3F9F000
heap
page read and write
7C64000
heap
page read and write
18FD000
heap
page read and write
79F6000
heap
page read and write
9FF000
unkown
page execute and write copy
6B8C000
stack
page read and write
7E01000
heap
page read and write
2AD8000
trusted library allocation
page read and write
7F2D000
heap
page read and write
196B000
heap
page read and write
40DD000
heap
page read and write
1190000
heap
page read and write
311F000
stack
page read and write
1375000
heap
page read and write
1AD3000
heap
page read and write
1BE8000
heap
page read and write
3764000
heap
page read and write
5E00000
heap
page read and write
7DF1000
heap
page read and write
4911000
heap
page read and write
1B32000
heap
page read and write
3D6E000
stack
page read and write
4B31000
heap
page read and write
CA0000
unkown
page readonly
5070000
direct allocation
page execute and read and write
98D6000
heap
page read and write
D62000
unkown
page readonly
3875000
heap
page read and write
39AE000
stack
page read and write
1374000
heap
page read and write
378E000
stack
page read and write
4B40000
heap
page read and write
6A70000
trusted library allocation
page read and write
9FF000
unkown
page execute and write copy
3C1000
unkown
page execute and read and write
7967000
heap
page read and write
156C000
heap
page read and write
4971000
heap
page read and write
1F406E47000
heap
page read and write
396E000
stack
page read and write
133E000
stack
page read and write
A34000
heap
page read and write
4911000
heap
page read and write
1374000
heap
page read and write
4F00000
direct allocation
page execute and read and write
287F000
trusted library allocation
page read and write
7DCB000
heap
page read and write
1374000
heap
page read and write
7BFE000
stack
page read and write
48A0000
direct allocation
page read and write
1357000
heap
page read and write
777000
unkown
page execute and write copy
1374000
heap
page read and write
318E000
stack
page read and write
3632000
heap
page read and write
1ABB000
heap
page read and write
18EB000
heap
page read and write
409E000
stack
page read and write
13F7000
heap
page read and write
332F000
stack
page read and write
7E01000
heap
page read and write
977000
unkown
page execute and write copy
3A7E000
stack
page read and write
7F2D000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
890000
unkown
page readonly
30C0000
direct allocation
page read and write
EE4000
heap
page read and write
1374000
heap
page read and write
10E4000
heap
page read and write
1374000
heap
page read and write
7FF848B9D000
trusted library allocation
page execute and read and write
5270000
heap
page read and write
4317000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
1374000
heap
page read and write
4971000
heap
page read and write
4053000
heap
page read and write
7D1C000
heap
page read and write
811B000
heap
page read and write
1374000
heap
page read and write
4F80000
direct allocation
page execute and read and write
1AC2000
heap
page read and write
1374000
heap
page read and write
3C8E000
stack
page read and write
43A4000
trusted library allocation
page read and write
13A9000
heap
page read and write
156C000
heap
page read and write
1374000
heap
page read and write
123C000
heap
page read and write
BF1000
unkown
page write copy
19F3000
heap
page read and write
1353000
heap
page read and write
79AC000
heap
page read and write
1B2E000
heap
page read and write
4971000
heap
page read and write
7CAC000
heap
page read and write
29EFCE7D000
heap
page read and write
37FA000
trusted library allocation
page read and write
79C3000
heap
page read and write
12D8000
heap
page read and write
1374000
heap
page read and write
C4F000
stack
page read and write
4062000
heap
page read and write
72DF000
stack
page read and write
440E000
stack
page read and write
1374000
heap
page read and write
36A1000
heap
page read and write
49C0000
direct allocation
page execute and read and write
44A0000
direct allocation
page read and write
4A30000
direct allocation
page execute and read and write
29E80001000
trusted library allocation
page read and write
4EF0000
heap
page read and write
4F00000
direct allocation
page execute and read and write
5360000
direct allocation
page execute and read and write
50B0000
direct allocation
page execute and read and write
2870000
trusted library allocation
page read and write
7F0A000
heap
page read and write
1374000
heap
page read and write
D3C000
unkown
page readonly
BF7000
unkown
page execute and write copy
3F20000
heap
page read and write
353F000
stack
page read and write
582B000
trusted library allocation
page read and write
4A80000
heap
page read and write
455E000
stack
page read and write
83F0000
trusted library allocation
page execute and read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
4CE4000
trusted library allocation
page read and write
1A46000
heap
page read and write
197E000
heap
page read and write
37C9000
heap
page read and write
3E1D000
heap
page read and write
7CEA000
heap
page read and write
3FBE000
heap
page read and write
7A35000
heap
page read and write
315E000
stack
page read and write
40CD000
heap
page read and write
32FE000
stack
page read and write
4EF1000
heap
page read and write
2F3E000
stack
page read and write
1374000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
5150000
remote allocation
page read and write
1374000
heap
page read and write
189D000
heap
page read and write
7F0A000
heap
page read and write
1357000
heap
page read and write
30C0000
direct allocation
page read and write
476E000
stack
page read and write
7CAC000
heap
page read and write
4A91000
heap
page read and write
7CAC000
heap
page read and write
1123000
heap
page read and write
7F45000
heap
page read and write
407F000
stack
page read and write
14A0000
heap
page read and write
11F0000
direct allocation
page read and write
CA0000
unkown
page readonly
EE4000
heap
page read and write
1374000
heap
page read and write
4B4F000
stack
page read and write
1374000
heap
page read and write
7D19000
heap
page read and write
BDD000
stack
page read and write
5410000
direct allocation
page execute and read and write
1375000
heap
page read and write
1F406FF0000
heap
page read and write
48E0000
direct allocation
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
7DB6000
heap
page read and write
7CED000
heap
page read and write
10E4000
heap
page read and write
7CC7000
heap
page read and write
161E000
heap
page read and write
1A9B000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
4911000
heap
page read and write
1374000
heap
page read and write
98B1000
heap
page read and write
3FD6000
heap
page read and write
BF2000
unkown
page execute and read and write
7A35000
heap
page read and write
7FAC000
heap
page read and write
7F31000
heap
page read and write
307E000
stack
page read and write
812E000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1854000
heap
page read and write
1375000
heap
page read and write
14EABB06000
heap
page read and write
7CBA000
heap
page read and write
1374000
heap
page read and write
1B8E000
heap
page read and write
7CA9000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
764000
unkown
page execute and read and write
1374000
heap
page read and write
3F3A000
heap
page read and write
7A35000
heap
page read and write
4911000
heap
page read and write
4F30000
direct allocation
page execute and read and write
3E0E000
stack
page read and write
799B000
heap
page read and write
4EF1000
heap
page read and write
7F39000
heap
page read and write
7CBB000
heap
page read and write
10BE000
stack
page read and write
454000
heap
page read and write
1999000
heap
page read and write
1B24000
heap
page read and write
460000
heap
page read and write
454000
heap
page read and write
813B000
heap
page read and write
1374000
heap
page read and write
10A4000
heap
page read and write
18F5000
heap
page read and write
202E000
stack
page read and write
11BB000
stack
page read and write
4B5000
unkown
page read and write
1374000
heap
page read and write
79AC000
heap
page read and write
4911000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
890000
unkown
page read and write
1375000
heap
page read and write
2ECF000
stack
page read and write
1375000
heap
page read and write
18E6000
heap
page read and write
301E000
stack
page read and write
286C000
trusted library allocation
page read and write
8111000
heap
page read and write
794E000
heap
page read and write
184D000
heap
page read and write
3F68000
heap
page read and write
649E000
stack
page read and write
1374000
heap
page read and write
6A57000
heap
page read and write
1306000
heap
page read and write
1044000
heap
page read and write
8111000
heap
page read and write
1044000
heap
page read and write
54B0000
direct allocation
page execute and read and write
3EAE000
stack
page read and write
4F20000
direct allocation
page read and write
E78000
unkown
page execute and write copy
7A9C000
stack
page read and write
4B31000
heap
page read and write
838D000
stack
page read and write
4EF1000
heap
page read and write
7DF4F98D0000
trusted library allocation
page execute and read and write
13B3000
heap
page read and write
362D000
heap
page read and write
16EE000
stack
page read and write
4C30000
trusted library allocation
page read and write
5360000
direct allocation
page execute and read and write
4990000
direct allocation
page execute and read and write
26E73C50000
heap
page read and write
375000
unkown
page execute and read and write
43A1000
heap
page read and write
37EB000
heap
page read and write
7F74000
heap
page read and write
4921000
heap
page read and write
428F000
stack
page read and write
8142000
heap
page read and write
7C74000
heap
page read and write
4C50000
trusted library allocation
page read and write
4E21000
heap
page read and write
4CFA000
trusted library allocation
page read and write
7EF1000
heap
page read and write
5040000
direct allocation
page execute and read and write
1A3B000
heap
page read and write
4A80000
direct allocation
page read and write
1131000
heap
page read and write
1374000
heap
page read and write
1A54000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
956000
unkown
page execute and read and write
769F000
stack
page read and write
1374000
heap
page read and write
795D000
heap
page read and write
5A7D000
stack
page read and write
5ECC000
trusted library allocation
page read and write
7CD0000
trusted library allocation
page read and write
304E000
stack
page read and write
A3247FE000
unkown
page read and write
1A60000
heap
page read and write
1374000
heap
page read and write
5390000
direct allocation
page execute and read and write
1374000
heap
page read and write
E11000
unkown
page execute and read and write
EF0000
heap
page read and write
7DB1000
heap
page read and write
1374000
heap
page read and write
7E01000
heap
page read and write
1374000
heap
page read and write
32EF000
stack
page read and write
4EF1000
heap
page read and write
7E01000
heap
page read and write
4911000
heap
page read and write
AA1000
unkown
page execute and write copy
1374000
heap
page read and write
1564000
heap
page read and write
590E000
trusted library allocation
page read and write
7F2D000
heap
page read and write
5F30000
trusted library allocation
page execute and read and write
982F000
heap
page read and write
1374000
heap
page read and write
42B2000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
7FDE000
stack
page read and write
1AC2000
heap
page read and write
7C91000
heap
page read and write
112E000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
8C70000
heap
page read and write
CAEE1FF000
stack
page read and write
1375000
heap
page read and write
3727000
heap
page read and write
3FEE000
stack
page read and write
468E000
stack
page read and write
2B73000
trusted library allocation
page read and write
1374000
heap
page read and write
145C000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
7CBF000
heap
page read and write
797E000
stack
page read and write
29EFAC00000
heap
page read and write
12FF000
stack
page read and write
1B7E000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1BFA000
heap
page read and write
419F000
stack
page read and write
799B000
heap
page read and write
512B000
stack
page read and write
1374000
heap
page read and write
18DE000
heap
page read and write
1840000
heap
page read and write
591A000
trusted library allocation
page read and write
3310000
heap
page read and write
6275000
heap
page read and write
7C88000
heap
page read and write
75E000
unkown
page execute and write copy
155F000
heap
page read and write
A80000
heap
page read and write
1740000
direct allocation
page read and write
5CB000
stack
page read and write
1375000
heap
page read and write
A3246FE000
stack
page read and write
7CC1000
heap
page read and write
4A91000
heap
page read and write
79E6000
heap
page read and write
789A000
heap
page read and write
7D19000
heap
page read and write
1374000
heap
page read and write
3ED2000
heap
page read and write
30D0000
heap
page read and write
1374000
heap
page read and write
598A000
trusted library allocation
page read and write
43FD000
trusted library allocation
page read and write
47DF000
stack
page read and write
EE4000
heap
page read and write
341E000
stack
page read and write
1374000
heap
page read and write
7A1E000
heap
page read and write
7FE0000
trusted library allocation
page read and write
151C000
heap
page read and write
7D9E000
stack
page read and write
40EE000
stack
page read and write
793F000
stack
page read and write
4ED0000
direct allocation
page execute and read and write
4F70000
direct allocation
page execute and read and write
3FF9000
heap
page read and write
7F43000
heap
page read and write
B4E000
stack
page read and write
7FAC000
heap
page read and write
7964000
heap
page read and write
469F000
stack
page read and write
1374000
heap
page read and write
53E0000
direct allocation
page execute and read and write
2BF2000
trusted library allocation
page read and write
193C000
heap
page read and write
3E65000
heap
page read and write
4B31000
heap
page read and write
4971000
heap
page read and write
3F4E000
stack
page read and write
4911000
heap
page read and write
812E000
heap
page read and write
3DDE000
stack
page read and write
1374000
heap
page read and write
3C9F000
stack
page read and write
EE4000
heap
page read and write
4971000
heap
page read and write
4CE6000
trusted library allocation
page read and write
29EFCFC8000
heap
page read and write
14AA000
heap
page read and write
10E4000
heap
page read and write
454000
heap
page read and write
53C0000
direct allocation
page execute and read and write
451F000
stack
page read and write
3D2F000
stack
page read and write
AF2000
trusted library allocation
page read and write
26E71EEB000
heap
page read and write
79E6000
heap
page read and write
811C000
heap
page read and write
1374000
heap
page read and write
69273FE000
stack
page read and write
7F74000
heap
page read and write
199F000
heap
page read and write
1374000
heap
page read and write
1997000
heap
page read and write
1374000
heap
page read and write
10E4000
heap
page read and write
5D4E000
trusted library allocation
page read and write
987000
heap
page read and write
4451000
heap
page read and write
3E3A000
heap
page read and write
7749000
heap
page read and write
1374000
heap
page read and write
4440000
direct allocation
page read and write
7F7E000
heap
page read and write
7A20000
heap
page read and write
1374000
heap
page read and write
7F39000
heap
page read and write
5120000
heap
page read and write
94F000
unkown
page execute and write copy
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
3815000
heap
page read and write
3E59000
heap
page read and write
4A81000
heap
page read and write
44A0000
direct allocation
page read and write
6937000
trusted library allocation
page read and write
C66000
unkown
page execute and read and write
1A5D000
heap
page read and write
8EF000
unkown
page execute and read and write
1374000
heap
page read and write
FD7000
heap
page read and write
188E000
heap
page read and write
7CCE000
heap
page read and write
29B6000
trusted library allocation
page read and write
36EF000
stack
page read and write
496F000
stack
page read and write
1B8F000
heap
page read and write
1B8E000
heap
page read and write
11B1000
heap
page read and write
29E902EB000
trusted library allocation
page read and write
1A4B000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
11F0000
direct allocation
page read and write
709000
unkown
page execute and read and write
7A1E000
heap
page read and write
36F3000
heap
page read and write
7A35000
heap
page read and write
53C0000
direct allocation
page execute and read and write
29FA000
trusted library allocation
page read and write
787E000
stack
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
4930000
direct allocation
page execute and read and write
7D0000
heap
page read and write
3E30000
heap
page read and write
1374000
heap
page read and write
29E902ED000
trusted library allocation
page read and write
1374000
heap
page read and write
454000
heap
page read and write
8590000
trusted library allocation
page execute and read and write
4230000
heap
page read and write
1A76000
heap
page read and write
1564000
heap
page read and write
7FF848F70000
trusted library allocation
page read and write
7A35000
heap
page read and write
7F14000
heap
page read and write
670E000
stack
page read and write
4F90000
direct allocation
page execute and read and write
A90000
heap
page read and write
3F0F000
stack
page read and write
1C27000
heap
page read and write
581E000
stack
page read and write
7BDF000
stack
page read and write
2490000
direct allocation
page read and write
26E73A70000
heap
page read and write
4EF1000
heap
page read and write
1374000
heap
page read and write
1377000
stack
page read and write
1374000
heap
page read and write
7F0A000
heap
page read and write
1374000
heap
page read and write
2C63000
trusted library allocation
page read and write
19C7000
heap
page read and write
1374000
heap
page read and write
29EFCF71000
heap
page read and write
3EFD000
heap
page read and write
17E6000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
4960000
direct allocation
page execute and read and write
4C6E000
stack
page read and write
F92000
heap
page read and write
1973000
heap
page read and write
1374000
heap
page read and write
1740000
direct allocation
page read and write
28E2000
trusted library allocation
page read and write
795B000
heap
page read and write
1044000
heap
page read and write
193C000
heap
page read and write
1374000
heap
page read and write
4971000
heap
page read and write
8CFD000
heap
page read and write
3FCA000
heap
page read and write
3F45000
heap
page read and write
1374000
heap
page read and write
4A2E000
stack
page read and write
EE4000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
5100000
trusted library allocation
page read and write
F80000
direct allocation
page read and write
31EE000
stack
page read and write
191D000
heap
page read and write
EE4000
heap
page read and write
1374000
heap
page read and write
2490000
direct allocation
page read and write
5E6E000
stack
page read and write
34EE000
stack
page read and write
7EFA000
heap
page read and write
1908000
heap
page read and write
4CEC000
trusted library allocation
page read and write
7F2D000
heap
page read and write
7FF848EF8000
trusted library allocation
page read and write
1417000
heap
page read and write
1374000
heap
page read and write
5420000
direct allocation
page execute and read and write
44A0000
direct allocation
page read and write
1400000
direct allocation
page read and write
1374000
heap
page read and write
1375000
heap
page read and write
1966000
heap
page read and write
3E6E000
heap
page read and write
43A1000
heap
page read and write
1374000
heap
page read and write
5843000
trusted library allocation
page read and write
4440000
direct allocation
page read and write
3676000
heap
page read and write
16A4000
heap
page read and write
7CBF000
heap
page read and write
4930000
direct allocation
page execute and read and write
2BA6000
trusted library allocation
page read and write
7F0A000
heap
page read and write
7F16000
heap
page read and write
7F30000
heap
page read and write
1C2E000
heap
page read and write
1374000
heap
page read and write
52A000
heap
page read and write
1846000
heap
page read and write
19C4000
heap
page read and write
1374000
heap
page read and write
7DCB000
heap
page read and write
7F43000
heap
page read and write
1374000
heap
page read and write
1021000
unkown
page execute and read and write
1374000
heap
page read and write
41BF000
stack
page read and write
1374000
heap
page read and write
3CFE000
stack
page read and write
181D000
heap
page read and write
5852000
trusted library allocation
page read and write
3DD1000
heap
page read and write
3F81000
heap
page read and write
339F000
stack
page read and write
7C91000
heap
page read and write
7EF3000
heap
page read and write
1374000
heap
page read and write
1044000
heap
page read and write
6950000
trusted library allocation
page read and write
902000
unkown
page execute and write copy
12E8000
heap
page read and write
5450000
direct allocation
page execute and read and write
1163000
heap
page read and write
36BE000
stack
page read and write
10A4000
heap
page read and write
1933000
heap
page read and write
1374000
heap
page read and write
7F39000
heap
page read and write
190A000
heap
page read and write
364E000
stack
page read and write
1374000
heap
page read and write
EE4000
heap
page read and write
1374000
heap
page read and write
3677000
heap
page read and write
447E000
stack
page read and write
3EBE000
heap
page read and write
1764000
heap
page read and write
1014000
unkown
page execute and read and write
1044000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
4450000
heap
page read and write
7F43000
heap
page read and write
1374000
heap
page read and write
4911000
heap
page read and write
37C2000
heap
page read and write
36A1000
heap
page read and write
4AEF000
stack
page read and write
1564000
heap
page read and write
795C000
heap
page read and write
7FE0000
trusted library allocation
page read and write
3FA6000
heap
page read and write
3F3F000
stack
page read and write
2ABC000
trusted library allocation
page read and write
C29000
unkown
page execute and read and write
9020000
trusted library allocation
page read and write
1F408970000
heap
page read and write
7F39000
heap
page read and write
3BC0000
heap
page read and write
288F000
trusted library allocation
page read and write
1AAF000
heap
page read and write
10A4000
heap
page read and write
3E6E000
stack
page read and write
11A9000
heap
page read and write
10A4000
heap
page read and write
10E4000
heap
page read and write
15DB000
stack
page read and write
11D0000
heap
page read and write
11AE000
stack
page read and write
7F61000
heap
page read and write
7FB0000
trusted library allocation
page read and write
127B000
stack
page read and write
48C0000
direct allocation
page execute and read and write
7CBF000
heap
page read and write
19B0000
heap
page read and write
119F000
heap
page read and write
1B3B000
heap
page read and write
1015000
unkown
page execute and write copy
43A1000
heap
page read and write
1A10000
heap
page read and write
EDA000
stack
page read and write
924000
heap
page read and write
1350000
direct allocation
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
B20000
heap
page read and write
1375000
heap
page read and write
4E40000
direct allocation
page execute and read and write
909000
unkown
page execute and read and write
7FF848E20000
trusted library allocation
page read and write
7CCB000
heap
page read and write
30C0000
direct allocation
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
3676000
heap
page read and write
3EEE000
stack
page read and write
1374000
heap
page read and write
454000
heap
page read and write
1374000
heap
page read and write
5150000
remote allocation
page read and write
3EDF000
stack
page read and write
17F0000
trusted library allocation
page read and write
7E01000
heap
page read and write
1ABD000
heap
page read and write
3110000
trusted library allocation
page read and write
1374000
heap
page read and write
7F330000
trusted library allocation
page execute and read and write
176B000
heap
page read and write
1F406E60000
heap
page read and write
1374000
heap
page read and write
4EF1000
heap
page read and write
1374000
heap
page read and write
7921000
heap
page read and write
1374000
heap
page read and write
40B5000
heap
page read and write
E8E000
unkown
page execute and write copy
7F43000
heap
page read and write
DA0000
unkown
page execute and write copy
2F30000
heap
page read and write
1984000
heap
page read and write
19CC000
heap
page read and write
4C10000
remote allocation
page read and write
4D15000
trusted library allocation
page read and write
36EF000
stack
page read and write
4F10000
direct allocation
page execute and read and write
FEE000
stack
page read and write
560000
heap
page read and write
4063000
heap
page read and write
29E8186A000
trusted library allocation
page read and write
7C7C000
heap
page read and write
1600000
direct allocation
page read and write
CA1000
unkown
page execute read
4EF1000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
4EF1000
heap
page read and write
13DD000
heap
page read and write
1374000
heap
page read and write
5884000
trusted library allocation
page read and write
1908000
heap
page read and write
3879000
trusted library allocation
page read and write
7DD8000
heap
page read and write
1374000
heap
page read and write
441A000
trusted library allocation
page read and write
1960000
heap
page read and write
1374000
heap
page read and write
1375000
heap
page read and write
8D1000
unkown
page execute and read and write
1740000
direct allocation
page read and write
1374000
heap
page read and write
3DCE000
stack
page read and write
1048000
heap
page read and write
7964000
heap
page read and write
4E60000
heap
page execute and read and write
1842000
heap
page read and write
743F000
stack
page read and write
A34000
heap
page read and write
10A4000
heap
page read and write
4062000
heap
page read and write
1374000
heap
page read and write
49CF000
stack
page read and write
3B7F000
stack
page read and write
BF5000
unkown
page execute and write copy
1374000
heap
page read and write
1A0A000
heap
page read and write
192C000
heap
page read and write
D6C000
unkown
page read and write
3D6E000
stack
page read and write
1B23000
heap
page read and write
811B000
heap
page read and write
8FA0000
trusted library allocation
page read and write
1375000
heap
page read and write
1374000
heap
page read and write
5400000
direct allocation
page execute and read and write
7CAC000
heap
page read and write
EE4000
heap
page read and write
4A91000
heap
page read and write
7CA9000
heap
page read and write
4F40000
direct allocation
page execute and read and write
1C27000
heap
page read and write
812E000
heap
page read and write
1374000
heap
page read and write
C7E000
unkown
page execute and write copy
5F0000
heap
page read and write
1E17CC10000
trusted library allocation
page read and write
5480000
direct allocation
page execute and read and write
745D000
stack
page read and write
3EFD000
heap
page read and write
4EB1000
heap
page read and write
454000
heap
page read and write
D62000
unkown
page readonly
1374000
heap
page read and write
43F2000
trusted library allocation
page read and write
3ECF000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
10C0000
heap
page read and write
130E000
heap
page read and write
9E1000
unkown
page write copy
1374000
heap
page read and write
4337000
trusted library allocation
page read and write
130E000
heap
page read and write
7C93000
heap
page read and write
1374000
heap
page read and write
3E65000
heap
page read and write
7DCB000
heap
page read and write
12F0000
heap
page read and write
462E000
stack
page read and write
1A3E000
heap
page read and write
4A80000
direct allocation
page read and write
7CBD000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
390E000
stack
page read and write
7A1E000
heap
page read and write
795A000
heap
page read and write
5160000
direct allocation
page execute and read and write
9D5000
unkown
page read and write
1425000
heap
page read and write
11F0000
direct allocation
page read and write
29F2000
trusted library allocation
page read and write
96E000
stack
page read and write
5480000
direct allocation
page execute and read and write
4670000
trusted library allocation
page read and write
13BC000
heap
page read and write
3D1E000
stack
page read and write
9FE000
heap
page read and write
79E5000
heap
page read and write
2758000
trusted library allocation
page read and write
7F65000
heap
page read and write
4EAF000
stack
page read and write
902000
unkown
page execute and write copy
14ED000
heap
page read and write
1E17AF80000
trusted library allocation
page read and write
6A8C000
stack
page read and write
1A82000
heap
page read and write
36A8000
trusted library allocation
page read and write
5984000
trusted library allocation
page read and write
4EF1000
heap
page read and write
1374000
heap
page read and write
AA7000
heap
page read and write
2A4D000
trusted library allocation
page read and write
D74000
unkown
page readonly
7D09000
heap
page read and write
384000
unkown
page execute and read and write
59DC000
stack
page read and write
7A1C000
heap
page read and write
7FF848D30000
trusted library allocation
page read and write
E76000
unkown
page execute and read and write
2F3E000
stack
page read and write
79E4000
heap
page read and write
3F0D000
heap
page read and write
1374000
heap
page read and write
29B2000
trusted library allocation
page read and write
1564000
heap
page read and write
C6E000
unkown
page execute and read and write
A0D000
unkown
page execute and write copy
1374000
heap
page read and write
14EAB786000
trusted library allocation
page read and write
4B80000
trusted library allocation
page read and write
1375000
heap
page read and write
2E6C000
stack
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
3C6000
unkown
page read and write
4911000
heap
page read and write
1A40000
heap
page read and write
29D6000
trusted library allocation
page read and write
7C51000
heap
page read and write
1350000
direct allocation
page read and write
462F000
stack
page read and write
346E000
stack
page read and write
1350000
direct allocation
page read and write
409A000
heap
page read and write
811C000
heap
page read and write
1374000
heap
page read and write
1375000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
51B0000
direct allocation
page execute and read and write
369E000
stack
page read and write
A34000
heap
page read and write
1374000
heap
page read and write
454000
heap
page read and write
A3246F4000
stack
page read and write
1374000
heap
page read and write
1F406E72000
heap
page read and write
151C000
heap
page read and write
1374000
heap
page read and write
4EB1000
heap
page read and write
501B000
stack
page read and write
D89000
unkown
page execute and read and write
1B12000
heap
page read and write
4E21000
heap
page read and write
29E80DE1000
trusted library allocation
page read and write
2774000
trusted library allocation
page read and write
1831000
heap
page read and write
7A0F000
heap
page read and write
79A3000
heap
page read and write
1374000
heap
page read and write
7FF848CB0000
trusted library allocation
page execute and read and write
E8D000
unkown
page execute and write copy
1849000
heap
page read and write
5DA0000
trusted library allocation
page read and write
796F000
heap
page read and write
4C60000
trusted library allocation
page read and write
920000
unkown
page execute and write copy
35C2000
trusted library allocation
page read and write
1374000
heap
page read and write
1015000
unkown
page execute and write copy
A324BFF000
stack
page read and write
1374000
heap
page read and write
1375000
heap
page read and write
8147000
heap
page read and write
1A76000
heap
page read and write
19C7000
heap
page read and write
7CDC000
heap
page read and write
4713000
direct allocation
page read and write
7C7C000
heap
page read and write
429F000
stack
page read and write
5460000
direct allocation
page execute and read and write
37BD000
heap
page read and write
7FF848F00000
trusted library allocation
page read and write
3B0F000
stack
page read and write
29EFAC88000
heap
page read and write
1A5D000
heap
page read and write
83A0000
trusted library allocation
page read and write
10E4000
heap
page read and write
7C5E000
heap
page read and write
50B0000
direct allocation
page execute and read and write
4911000
heap
page read and write
5935000
trusted library allocation
page read and write
4A91000
heap
page read and write
4088000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1AB8000
heap
page read and write
43D9000
heap
page read and write
AA1000
unkown
page execute and write copy
1374000
heap
page read and write
49D0000
direct allocation
page execute and read and write
8D25000
heap
page read and write
4971000
heap
page read and write
12DF000
heap
page read and write
2EFF000
stack
page read and write
4C90000
trusted library allocation
page read and write
3E71000
heap
page read and write
924000
heap
page read and write
1973000
heap
page read and write
29E814E3000
trusted library allocation
page read and write
1044000
heap
page read and write
12DF000
heap
page read and write
7CB7000
heap
page read and write
A34000
heap
page read and write
4A91000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
7A1E000
heap
page read and write
4911000
heap
page read and write
8570000
trusted library allocation
page read and write
1374000
heap
page read and write
29EFAC47000
heap
page read and write
190A000
heap
page read and write
184F000
heap
page read and write
3E9D000
heap
page read and write
7CF4000
heap
page read and write
F85000
heap
page read and write
41BF000
stack
page read and write
4D20000
trusted library allocation
page read and write
1374000
heap
page read and write
79F1000
heap
page read and write
125A000
heap
page read and write
7F78000
heap
page read and write
745D000
stack
page read and write
4EF1000
heap
page read and write
3ED0000
heap
page read and write
4A91000
heap
page read and write
1125000
heap
page read and write
7F45000
heap
page read and write
1672000
heap
page read and write
1374000
heap
page read and write
7A20000
heap
page read and write
4EF1000
heap
page read and write
3F1F000
stack
page read and write
4372000
trusted library allocation
page read and write
1374000
heap
page read and write
47AE000
stack
page read and write
168D000
heap
page read and write
1374000
heap
page read and write
1132000
heap
page read and write
343E000
stack
page read and write
1967D395000
heap
page read and write
4911000
heap
page read and write
1374000
heap
page read and write
5140000
direct allocation
page execute and read and write
3E6E000
heap
page read and write
7F17000
heap
page read and write
1B03000
heap
page read and write
412E000
stack
page read and write
546F000
direct allocation
page read and write
77DF000
stack
page read and write
7D19000
heap
page read and write
11BC000
heap
page read and write
510000
direct allocation
page read and write
7F80000
heap
page read and write
DCF000
unkown
page execute and write copy
3EFD000
heap
page read and write
16FF000
stack
page read and write
14FF000
heap
page read and write
4F60000
direct allocation
page execute and read and write
44A0000
direct allocation
page read and write
10B6000
heap
page read and write
5859000
trusted library allocation
page read and write
4911000
heap
page read and write
1374000
heap
page read and write
5110000
trusted library allocation
page read and write
4440000
direct allocation
page read and write
1139000
heap
page read and write
486E000
stack
page read and write
7FF848BA0000
trusted library allocation
page read and write
12CC000
heap
page read and write
1374000
heap
page read and write
7A35000
heap
page read and write
52C0000
direct allocation
page read and write
1AE0000
heap
page read and write
7DE2000
heap
page read and write
E0A000
unkown
page execute and write copy
2BAA000
trusted library allocation
page read and write
1178000
heap
page read and write
375C000
trusted library allocation
page read and write
1044000
heap
page read and write
443A000
trusted library allocation
page read and write
7CCB000
heap
page read and write
3B5E000
stack
page read and write
476F000
stack
page read and write
7A35000
heap
page read and write
4A91000
heap
page read and write
7A35000
heap
page read and write
3FBE000
heap
page read and write
688D000
stack
page read and write
1374000
heap
page read and write
13C1000
heap
page read and write
7ED6000
heap
page read and write
7800000
heap
page read and write
7FF848EB0000
trusted library allocation
page read and write
980000
heap
page read and write
7C9B000
heap
page read and write
7A20000
heap
page read and write
4F70000
direct allocation
page execute and read and write
29EFCF8B000
heap
page read and write
1374000
heap
page read and write
F80000
direct allocation
page read and write
BCF000
stack
page read and write
382F000
stack
page read and write
4EB1000
heap
page read and write
8111000
heap
page read and write
7A7F000
stack
page read and write
813000
unkown
page execute and read and write
1097000
heap
page read and write
547D000
stack
page read and write
184D000
heap
page read and write
4911000
heap
page read and write
5390000
direct allocation
page execute and read and write
FEA000
heap
page read and write
7DCB000
heap
page read and write
79E4000
heap
page read and write
1480000
direct allocation
page read and write
4451000
heap
page read and write
7CC1000
heap
page read and write
4B9F000
stack
page read and write
1374000
heap
page read and write
1AE8000
heap
page read and write
7A22000
heap
page read and write
29E90001000
trusted library allocation
page read and write
4A81000
heap
page read and write
924000
heap
page read and write
1B3E000
heap
page read and write
4B90000
heap
page read and write
4EF1000
heap
page read and write
3E6F000
stack
page read and write
8EF000
unkown
page execute and write copy
8111000
heap
page read and write
5D65000
trusted library allocation
page read and write
4971000
heap
page read and write
6EBE000
stack
page read and write
1A72000
heap
page read and write
113F000
heap
page read and write
443F000
stack
page read and write
79E6000
heap
page read and write
7975000
heap
page read and write
7CB8000
heap
page read and write
3FC9000
heap
page read and write
1359000
heap
page read and write
184C000
heap
page read and write
1374000
heap
page read and write
5D5000
heap
page read and write
7A35000
heap
page read and write
15F0000
heap
page read and write
745E000
stack
page read and write
43A1000
heap
page read and write
7CA0000
heap
page read and write
1374000
heap
page read and write
1AE6000
heap
page read and write
7E0000
heap
page read and write
44A0000
direct allocation
page read and write
1400000
heap
page read and write
303F000
stack
page read and write
153F000
heap
page read and write
12CC000
heap
page read and write
1374000
heap
page read and write
36E9000
heap
page read and write
4911000
heap
page read and write
4F60000
direct allocation
page execute and read and write
2821000
trusted library allocation
page read and write
7A35000
heap
page read and write
46EF000
stack
page read and write
126F000
heap
page read and write
1374000
heap
page read and write
28D9000
trusted library allocation
page read and write
29E3000
trusted library allocation
page read and write
1374000
heap
page read and write
7CD7000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
4A5F000
stack
page read and write
432F000
stack
page read and write
483E000
stack
page read and write
305E000
stack
page read and write
1221000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
7CBF000
heap
page read and write
A34000
heap
page read and write
336F000
stack
page read and write
29E8149F000
trusted library allocation
page read and write
3799000
heap
page read and write
3FFB000
heap
page read and write
1E17AE70000
trusted library allocation
page read and write
1374000
heap
page read and write
7A02000
heap
page read and write
4F30000
direct allocation
page execute and read and write
27FE000
trusted library allocation
page read and write
4911000
heap
page read and write
1BE9000
heap
page read and write
3689000
heap
page read and write
8560000
trusted library allocation
page execute and read and write
4A91000
heap
page read and write
300E000
stack
page read and write
F78000
heap
page read and write
537C000
stack
page read and write
29EFAB70000
heap
page read and write
4A8D000
stack
page read and write
5190000
direct allocation
page execute and read and write
5914000
trusted library allocation
page read and write
F53B1FE000
stack
page read and write
7FF848FE0000
trusted library allocation
page read and write
EE4000
heap
page read and write
7ECF000
stack
page read and write
3E3E000
stack
page read and write
E00000
unkown
page execute and read and write
4EEF000
stack
page read and write
1976000
heap
page read and write
15CF000
stack
page read and write
3F82000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
2DFE000
stack
page read and write
5130000
direct allocation
page execute and read and write
794E000
heap
page read and write
2B7C000
stack
page read and write
4950000
direct allocation
page execute and read and write
7FE0000
trusted library allocation
page read and write
1374000
heap
page read and write
364F000
stack
page read and write
4C10000
remote allocation
page read and write
1824000
heap
page read and write
7F17000
heap
page read and write
1374000
heap
page read and write
A30000
heap
page read and write
79FD000
heap
page read and write
4008000
heap
page read and write
7C9B000
heap
page read and write
8EF000
unkown
page execute and write copy
BF2000
unkown
page execute and read and write
2B7E000
stack
page read and write
1374000
heap
page read and write
7DC2000
heap
page read and write
1529000
heap
page read and write
317F000
stack
page read and write
4F20000
direct allocation
page execute and read and write
1374000
heap
page read and write
43A1000
heap
page read and write
3487000
trusted library allocation
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
813D000
heap
page read and write
1374000
heap
page read and write
1171000
heap
page read and write
371E000
heap
page read and write
F80000
direct allocation
page read and write
1374000
heap
page read and write
46BF000
stack
page read and write
1ACE000
heap
page read and write
4EF1000
heap
page read and write
4EF1000
heap
page read and write
7E01000
heap
page read and write
D9D000
unkown
page execute and write copy
EE4000
heap
page read and write
1400000
direct allocation
page read and write
1374000
heap
page read and write
4F60000
direct allocation
page execute and read and write
4A80000
direct allocation
page read and write
7F1B000
heap
page read and write
7FAC000
heap
page read and write
479F000
stack
page read and write
980000
unkown
page execute and read and write
1374000
heap
page read and write
105C000
heap
page read and write
7A0F000
heap
page read and write
1374000
heap
page read and write
44EE000
stack
page read and write
DDF000
unkown
page execute and read and write
58D000
heap
page read and write
EE4000
heap
page read and write
7964000
heap
page read and write
4A81000
heap
page read and write
1375000
heap
page read and write
5020000
heap
page read and write
7DF1000
heap
page read and write
7CBA000
heap
page read and write
7A1E000
heap
page read and write
4CFE000
trusted library allocation
page read and write
5480000
direct allocation
page execute and read and write
1374000
heap
page read and write
1764000
heap
page read and write
1374000
heap
page read and write
405E000
stack
page read and write
3816000
heap
page read and write
6AB1000
heap
page read and write
A34000
heap
page read and write
FC9000
heap
page read and write
8111000
heap
page read and write
36A8000
trusted library allocation
page read and write
1374000
heap
page read and write
1020000
direct allocation
page read and write
3C8000
unkown
page execute and read and write
7F6E000
stack
page read and write
3681000
trusted library allocation
page read and write
1374000
heap
page read and write
747E000
stack
page read and write
EE4000
heap
page read and write
242E000
stack
page read and write
1374000
heap
page read and write
7CD3000
heap
page read and write
455F000
stack
page read and write
8D3000
unkown
page execute and write copy
4CEE000
trusted library allocation
page read and write
3C6E000
stack
page read and write
1374000
heap
page read and write
1375000
heap
page read and write
4D06000
trusted library allocation
page read and write
1374000
heap
page read and write
1B36000
heap
page read and write
4053000
heap
page read and write
1374000
heap
page read and write
4EF1000
heap
page read and write
1374000
heap
page read and write
83F8000
heap
page read and write
3050000
heap
page read and write
7CAC000
heap
page read and write
1564000
heap
page read and write
3A3F000
stack
page read and write
1374000
heap
page read and write
454000
heap
page read and write
29E90021000
trusted library allocation
page read and write
34E0000
heap
page read and write
2470000
heap
page read and write
193B000
heap
page read and write
590C000
trusted library allocation
page read and write
17B9000
heap
page read and write
3E6E000
heap
page read and write
270E000
trusted library allocation
page read and write
1374000
heap
page read and write
3C2E000
stack
page read and write
2896000
trusted library allocation
page read and write
3681000
heap
page read and write
7ADE000
stack
page read and write
102D000
heap
page read and write
1374000
heap
page read and write
1A54000
heap
page read and write
8116000
heap
page read and write
9050000
heap
page read and write
183C000
heap
page read and write
2AD0000
trusted library allocation
page read and write
38DE000
stack
page read and write
3808000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
3F04000
heap
page read and write
1375000
heap
page read and write
1374000
heap
page read and write
10E4000
heap
page read and write
1374000
heap
page read and write
800E000
stack
page read and write
2EBC000
stack
page read and write
678C000
stack
page read and write
2AA6000
trusted library allocation
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1375000
heap
page read and write
1824000
heap
page read and write
1374000
heap
page read and write
3FAE000
stack
page read and write
4EB0000
heap
page read and write
7D0B000
heap
page read and write
932000
unkown
page execute and read and write
497E000
stack
page read and write
7A1C000
heap
page read and write
FBC000
heap
page read and write
2654000
trusted library allocation
page read and write
8133000
heap
page read and write
1193000
heap
page read and write
1374000
heap
page read and write
4971000
heap
page read and write
7FEB000
stack
page read and write
324F000
stack
page read and write
1374000
heap
page read and write
4911000
heap
page read and write
29C6000
trusted library allocation
page read and write
1564000
heap
page read and write
94F000
unkown
page execute and write copy
493F000
stack
page read and write
1256000
heap
page read and write
8E4000
unkown
page execute and read and write
4EB1000
heap
page read and write
1564000
heap
page read and write
191C000
heap
page read and write
3400000
trusted library allocation
page read and write
7F01000
heap
page read and write
CAED94E000
stack
page read and write
29EFCF14000
heap
page read and write
7F85000
heap
page read and write
330E000
stack
page read and write
3450000
trusted library allocation
page read and write
2B4C000
trusted library allocation
page read and write
3F2E000
heap
page read and write
24A0000
heap
page read and write
75BC000
stack
page read and write
50D0000
heap
page read and write
587F000
trusted library allocation
page read and write
1374000
heap
page read and write
50B0000
direct allocation
page execute and read and write
3F5C000
heap
page read and write
1C20000
heap
page read and write
1374000
heap
page read and write
7CAC000
heap
page read and write
33DE000
stack
page read and write
CAEDEFE000
stack
page read and write
3F9C000
heap
page read and write
1F407170000
heap
page read and write
296E000
stack
page read and write
5360000
direct allocation
page execute and read and write
1420000
heap
page read and write
466E000
stack
page read and write
EE4000
heap
page read and write
29EFCE65000
heap
page read and write
10E7000
heap
page read and write
7FF848F50000
trusted library allocation
page read and write
19B3000
heap
page read and write
19AA000
heap
page read and write
1374000
heap
page read and write
7F43000
heap
page read and write
28B2000
trusted library allocation
page read and write
3E9D000
heap
page read and write
9FD000
unkown
page execute and read and write
4E40000
direct allocation
page execute and read and write
4B30000
heap
page read and write
2BE8000
trusted library allocation
page read and write
4BED000
stack
page read and write
10D0000
heap
page read and write
7D50000
heap
page read and write
1374000
heap
page read and write
8640000
heap
page read and write
2BBE000
stack
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
3BEF000
stack
page read and write
379F000
stack
page read and write
4911000
heap
page read and write
17ED000
trusted library allocation
page execute and read and write
1374000
heap
page read and write
5926000
trusted library allocation
page read and write
3EFD000
heap
page read and write
29E814F9000
trusted library allocation
page read and write
37B3000
heap
page read and write
51E0000
direct allocation
page execute and read and write
1764000
heap
page read and write
1374000
heap
page read and write
8380000
trusted library allocation
page read and write
8CB6000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1559000
heap
page read and write
787E000
stack
page read and write
1374000
heap
page read and write
1021000
heap
page read and write
4E30000
direct allocation
page execute and read and write
490E000
stack
page read and write
5928000
trusted library allocation
page read and write
1374000
heap
page read and write
83A0000
trusted library allocation
page read and write
1374000
heap
page read and write
1F406E37000
heap
page read and write
155F000
stack
page read and write
102D000
heap
page read and write
194D000
heap
page read and write
10A4000
heap
page read and write
8147000
heap
page read and write
4451000
heap
page read and write
317F000
stack
page read and write
E39000
unkown
page execute and read and write
D62000
unkown
page readonly
795D000
heap
page read and write
1C27000
heap
page read and write
FE0000
heap
page read and write
7CE5000
heap
page read and write
4930000
direct allocation
page execute and read and write
4EF1000
heap
page read and write
1374000
heap
page read and write
962000
unkown
page execute and read and write
13D3000
heap
page read and write
137C000
stack
page read and write
1374000
heap
page read and write
19C7000
heap
page read and write
7D16000
heap
page read and write
10A4000
heap
page read and write
5EC0000
trusted library allocation
page read and write
1374000
heap
page read and write
7EF2000
heap
page read and write
43FB000
heap
page read and write
4E40000
direct allocation
page execute and read and write
9E7000
unkown
page execute and write copy
2A8D000
trusted library allocation
page read and write
1374000
heap
page read and write
3657000
heap
page read and write
7A1B000
heap
page read and write
1374000
heap
page read and write
1375000
heap
page read and write
7E6E000
stack
page read and write
356F000
stack
page read and write
FB4000
heap
page read and write
7F39000
heap
page read and write
9C3000
unkown
page execute and read and write
3F8A000
heap
page read and write
18A7000
heap
page read and write
1854000
heap
page read and write
183E000
heap
page read and write
3AAE000
stack
page read and write
1374000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
852B000
stack
page read and write
8E4000
unkown
page execute and read and write
7F17000
heap
page read and write
41DE000
stack
page read and write
3860000
trusted library allocation
page read and write
365F000
stack
page read and write
14EAB785000
trusted library allocation
page read and write
7CE4000
heap
page read and write
3F2F000
heap
page read and write
54A0000
direct allocation
page execute and read and write
436C000
trusted library allocation
page read and write
811C000
heap
page read and write
4B31000
heap
page read and write
7F2D000
heap
page read and write
7F39000
heap
page read and write
17FC000
heap
page read and write
8CC0000
heap
page read and write
4ED0000
trusted library allocation
page read and write
1B1B000
heap
page read and write
4A81000
heap
page read and write
1374000
heap
page read and write
8111000
heap
page read and write
657F000
stack
page read and write
382E000
heap
page read and write
1374000
heap
page read and write
7CBF000
heap
page read and write
1374000
heap
page read and write
32F0000
trusted library allocation
page read and write
45EF000
stack
page read and write
135A000
heap
page read and write
7CEA000
heap
page read and write
376E000
stack
page read and write
1374000
heap
page read and write
4A91000
heap
page read and write
1BD7000
heap
page read and write
199D000
heap
page read and write
A900000
heap
page read and write
2B3E000
stack
page read and write
2AB4000
trusted library allocation
page read and write
194A000
heap
page read and write
1564000
heap
page read and write
36BF000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
33CF000
stack
page read and write
2BEE000
stack
page read and write
1374000
heap
page read and write
108E000
heap
page read and write
75D000
unkown
page execute and read and write
1E17ADC0000
heap
page read and write
1374000
heap
page read and write
3100000
trusted library allocation
page read and write
1830000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
3DE1000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
4C10000
remote allocation
page read and write
12C2000
heap
page read and write
412F000
stack
page read and write
1374000
heap
page read and write
4911000
heap
page read and write
11DB000
heap
page read and write
2702000
trusted library allocation
page read and write
1374000
heap
page read and write
3657000
heap
page read and write
103B000
heap
page read and write
7A1A000
heap
page read and write
1374000
heap
page read and write
4911000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
1020000
direct allocation
page read and write
1B7E000
heap
page read and write
7136000
heap
page read and write
165C000
heap
page read and write
48DF000
stack
page read and write
10E4000
heap
page read and write
4B50000
heap
page read and write
1374000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
7A35000
heap
page read and write
1905000
heap
page read and write
7A35000
heap
page read and write
1375000
heap
page read and write
355E000
stack
page read and write
7CC7000
heap
page read and write
1C2A000
heap
page read and write
156A000
heap
page read and write
7A35000
heap
page read and write
7CD7000
heap
page read and write
7F17000
heap
page read and write
3FAF000
stack
page read and write
1374000
heap
page read and write
1280000
heap
page read and write
3AAF000
stack
page read and write
7CC1000
heap
page read and write
31BE000
stack
page read and write
1374000
heap
page read and write
3C6000
unkown
page write copy
29EFAC5F000
heap
page read and write
2F10000
heap
page read and write
30F0000
heap
page read and write
3F7E000
stack
page read and write
1044000
heap
page read and write
2ECF000
stack
page read and write
1AAD000
heap
page read and write
1375000
heap
page read and write
1375000
heap
page read and write
D51000
unkown
page execute and read and write
1171000
heap
page read and write
5868000
trusted library allocation
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
135F000
stack
page read and write
1689000
heap
page read and write
4DAE000
stack
page read and write
1E17AF1D000
heap
page read and write
19F5000
heap
page read and write
7F39000
heap
page read and write
17D7000
heap
page read and write
7E01000
heap
page read and write
1374000
heap
page read and write
924000
heap
page read and write
14EA6B1A000
heap
page read and write
7A23000
heap
page read and write
1375000
heap
page read and write
130E000
heap
page read and write
7F65000
heap
page read and write
266000
unkown
page execute and read and write
9898000
heap
page read and write
1374000
heap
page read and write
4354000
trusted library allocation
page read and write
173E000
stack
page read and write
7EF2000
heap
page read and write
3EE8000
heap
page read and write
43A1000
heap
page read and write
30C0000
direct allocation
page read and write
3F6F000
stack
page read and write
F90000
heap
page read and write
36B5000
heap
page read and write
1374000
heap
page read and write
4EB1000
heap
page read and write
1375000
heap
page read and write
1807000
trusted library allocation
page execute and read and write
475C000
stack
page read and write
1374000
heap
page read and write
1AF8000
heap
page read and write
4911000
heap
page read and write
10E4000
heap
page read and write
7FF848F4A000
trusted library allocation
page read and write
7A20000
heap
page read and write
7F30000
heap
page read and write
3BEF000
stack
page read and write
43A1000
heap
page read and write
8137000
heap
page read and write
7963000
heap
page read and write
35E3000
heap
page read and write
2A3E000
stack
page read and write
962000
unkown
page execute and read and write
EE4000
heap
page read and write
7DB0000
heap
page read and write
166F000
stack
page read and write
1374000
heap
page read and write
4A81000
heap
page read and write
1374000
heap
page read and write
1BF3000
heap
page read and write
454000
heap
page read and write
1A56000
heap
page read and write
8FD0000
trusted library allocation
page execute and read and write
43A1000
heap
page read and write
1374000
heap
page read and write
9FF000
unkown
page execute and write copy
1F406E79000
heap
page read and write
BE5000
unkown
page read and write
9806000
heap
page read and write
24A7000
heap
page read and write
1374000
heap
page read and write
5380000
direct allocation
page execute and read and write
4971000
heap
page read and write
7CBB000
heap
page read and write
1103000
heap
page read and write
1374000
heap
page read and write
230F8FE000
stack
page read and write
2F2F000
stack
page read and write
53C0000
direct allocation
page execute and read and write
79FD000
heap
page read and write
195F000
stack
page read and write
5180000
direct allocation
page execute and read and write
F53AE73000
stack
page read and write
386E000
stack
page read and write
2700000
trusted library allocation
page read and write
7CAC000
heap
page read and write
5A9000
heap
page read and write
1400000
direct allocation
page read and write
1374000
heap
page read and write
4971000
heap
page read and write
4930000
direct allocation
page execute and read and write
4451000
heap
page read and write
1374000
heap
page read and write
14EABABA000
heap
page read and write
2B95000
trusted library allocation
page read and write
D40000
heap
page read and write
3320000
trusted library allocation
page read and write
975000
heap
page read and write
7A35000
heap
page read and write
1374000
heap
page read and write
7D0C000
heap
page read and write
26E71E40000
heap
page read and write
454000
heap
page read and write
4A2F000
direct allocation
page read and write
103A000
heap
page read and write
7FF848F60000
trusted library allocation
page read and write
4930000
direct allocation
page execute and read and write
9E7000
unkown
page execute and write copy
7F43000
heap
page read and write
2D6E000
stack
page read and write
37AB000
heap
page read and write
4910000
heap
page read and write
1374000
heap
page read and write
14EAB8D0000
trusted library allocation
page read and write
30C0000
direct allocation
page read and write
7CC0000
heap
page read and write
7DCE000
stack
page read and write
14F1000
heap
page read and write
7A40000
trusted library allocation
page read and write
1374000
heap
page read and write
7CC2000
heap
page read and write
E67000
unkown
page execute and write copy
7CFE000
heap
page read and write
7A1D000
heap
page read and write
7FE0000
trusted library allocation
page read and write
4F70000
direct allocation
page execute and read and write
1374000
heap
page read and write
4342000
trusted library allocation
page read and write
7FF848B94000
trusted library allocation
page read and write
9EA000
heap
page read and write
4FB0000
trusted library allocation
page read and write
3E59000
heap
page read and write
8132000
heap
page read and write
426F000
stack
page read and write
1374000
heap
page read and write
2C7F000
stack
page read and write
1374000
heap
page read and write
7A35000
heap
page read and write
E8D000
unkown
page execute and read and write
54A0000
direct allocation
page execute and read and write
1674000
heap
page read and write
788E000
heap
page read and write
1B47000
heap
page read and write
1051000
heap
page read and write
42FF000
stack
page read and write
8122000
heap
page read and write
CAEDDFD000
stack
page read and write
135E000
stack
page read and write
1807000
heap
page read and write
1374000
heap
page read and write
2841000
trusted library allocation
page read and write
1374000
heap
page read and write
1375000
heap
page read and write
F80000
direct allocation
page read and write
924000
heap
page read and write
1374000
heap
page read and write
1A1B000
heap
page read and write
4B31000
heap
page read and write
4B31000
heap
page read and write
1A54000
heap
page read and write
79E6000
heap
page read and write
1374000
heap
page read and write
44A0000
direct allocation
page read and write
1291000
heap
page read and write
2AC4000
trusted library allocation
page read and write
1374000
heap
page read and write
DEA000
unkown
page execute and write copy
7A35000
heap
page read and write
675000
unkown
page execute and write copy
1564000
heap
page read and write
7F39000
heap
page read and write
1374000
heap
page read and write
36AF000
stack
page read and write
7CAC000
heap
page read and write
183E000
heap
page read and write
186A000
heap
page read and write
1374000
heap
page read and write
5170000
direct allocation
page execute and read and write
4451000
heap
page read and write
15EF000
stack
page read and write
8128000
heap
page read and write
4A9E000
stack
page read and write
7CC2000
heap
page read and write
197E000
heap
page read and write
1400000
direct allocation
page read and write
7CEB000
heap
page read and write
29EFCD42000
heap
page read and write
7CB4000
heap
page read and write
9855000
heap
page read and write
1A77000
heap
page read and write
7C91000
heap
page read and write
13E8000
heap
page read and write
419E000
stack
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
BEB000
unkown
page execute and write copy
7CBD000
heap
page read and write
5490000
direct allocation
page execute and read and write
1216000
heap
page read and write
7A1C000
heap
page read and write
1374000
heap
page read and write
1375000
heap
page read and write
161A000
heap
page read and write
1374000
heap
page read and write
DE0000
unkown
page execute and write copy
1374000
heap
page read and write
7FF848D72000
trusted library allocation
page read and write
EE4000
heap
page read and write
1831000
heap
page read and write
125C000
heap
page read and write
F80000
direct allocation
page read and write
4971000
heap
page read and write
280F000
trusted library allocation
page read and write
2A07000
trusted library allocation
page read and write
1967B680000
heap
page read and write
1374000
heap
page read and write
4367000
trusted library allocation
page read and write
1967B439000
heap
page read and write
1374000
heap
page read and write
3020000
heap
page read and write
EE4000
heap
page read and write
2FCF000
stack
page read and write
4EB1000
heap
page read and write
1374000
heap
page read and write
510000
direct allocation
page read and write
4FF0000
direct allocation
page execute and read and write
7DD0000
heap
page read and write
1967B46D000
heap
page read and write
53D0000
direct allocation
page execute and read and write
183F000
heap
page read and write
8330000
trusted library allocation
page read and write
1A5D000
heap
page read and write
7CD9000
heap
page read and write
4440000
direct allocation
page read and write
4A91000
heap
page read and write
9E1000
unkown
page write copy
1A83000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
17EE000
heap
page read and write
131A000
heap
page read and write
44A0000
direct allocation
page read and write
3752000
heap
page read and write
7E01000
heap
page read and write
49A0000
direct allocation
page execute and read and write
3402000
trusted library allocation
page read and write
1374000
heap
page read and write
7CAC000
heap
page read and write
350E000
stack
page read and write
4911000
heap
page read and write
F3D000
stack
page read and write
1480000
direct allocation
page read and write
79E6000
heap
page read and write
1374000
heap
page read and write
1AD7000
heap
page read and write
10E4000
heap
page read and write
7DD6000
heap
page read and write
3F9D000
heap
page read and write
47FF000
stack
page read and write
7D03000
heap
page read and write
7D22000
heap
page read and write
1374000
heap
page read and write
4EF1000
heap
page read and write
2BF4000
trusted library allocation
page read and write
4FC0000
direct allocation
page execute and read and write
3CBF000
stack
page read and write
9D0000
unkown
page execute and read and write
2EDF000
stack
page read and write
1374000
heap
page read and write
1375000
heap
page read and write
1374000
heap
page read and write
7A35000
heap
page read and write
1967B3F0000
trusted library allocation
page read and write
422E000
stack
page read and write
4DAF000
stack
page read and write
1374000
heap
page read and write
36BE000
heap
page read and write
5890000
trusted library allocation
page read and write
355E000
stack
page read and write
2DBB000
stack
page read and write
3DC1000
heap
page read and write
10C7000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
1374000
heap
page read and write
659E000
stack
page read and write
692737F000
stack
page read and write
9F7000
unkown
page execute and read and write
17F9000
heap
page read and write
1374000
heap
page read and write
7CA9000
heap
page read and write
4451000
heap
page read and write
1374000
heap
page read and write
1967B498000
heap
page read and write
7DF1000
heap
page read and write
AA0000
unkown
page read and write
1480000
direct allocation
page read and write
8F9000
unkown
page execute and read and write
176E000
heap
page read and write
956000
unkown
page execute and read and write
F53B0FA000
stack
page read and write
510000
direct allocation
page read and write
43B7000
trusted library allocation
page read and write
18B4000
heap
page read and write
37A9000
trusted library allocation
page read and write
A34000
heap
page read and write
76B000
unkown
page execute and write copy
14EA6B1C000
heap
page read and write
49EF000
stack
page read and write
18B5000
heap
page read and write
5F90000
trusted library allocation
page execute and read and write
54E0000
direct allocation
page execute and read and write
4911000
heap
page read and write
412F000
stack
page read and write
3E6E000
heap
page read and write
526F000
stack
page read and write
4D12000
trusted library allocation
page read and write
1853000
heap
page read and write
10A4000
heap
page read and write
4005000
heap
page read and write
1891000
heap
page read and write
367D000
heap
page read and write
1E17AF80000
trusted library allocation
page read and write
70000
unkown
page readonly
1374000
heap
page read and write
924000
heap
page read and write
3F8A000
heap
page read and write
511F000
stack
page read and write
1304000
heap
page read and write
9B10000
heap
page read and write
1750000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
33AE000
stack
page read and write
13E0000
heap
page read and write
454000
heap
page read and write
83A0000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
7A35000
heap
page read and write
D0E000
stack
page read and write
7CC1000
heap
page read and write
4451000
heap
page read and write
5300000
heap
page read and write
A3B000
stack
page read and write
1BC000
stack
page read and write
FB2000
heap
page read and write
183D000
heap
page read and write
76DE000
stack
page read and write
158B000
heap
page read and write
4A91000
heap
page read and write
42AE000
stack
page read and write
13DF000
heap
page read and write
197D000
heap
page read and write
4972000
heap
page read and write
7CB2000
heap
page read and write
7CCB000
heap
page read and write
13D5000
heap
page read and write
7DF1000
heap
page read and write
53F0000
direct allocation
page execute and read and write
F53B27E000
stack
page read and write
4EF1000
heap
page read and write
197E000
heap
page read and write
769000
unkown
page write copy
1374000
heap
page read and write
862C000
stack
page read and write
65A0000
trusted library allocation
page read and write
29EFABD0000
heap
page read and write
1480000
direct allocation
page read and write
6B91000
heap
page read and write
7DD6000
heap
page read and write
5D0000
heap
page read and write
36F3000
heap
page read and write
7CBD000
heap
page read and write
3F6F000
heap
page read and write
D70000
unkown
page write copy
10D5000
heap
page read and write
1F3F000
stack
page read and write
3010000
heap
page read and write
4A91000
heap
page read and write
7F4F000
heap
page read and write
44BA000
heap
page read and write
29EFCBE8000
heap
page read and write
1374000
heap
page read and write
454000
heap
page read and write
386E000
stack
page read and write
5136000
trusted library allocation
page read and write
7C74000
heap
page read and write
1564000
heap
page read and write
1570000
direct allocation
page read and write
7F43000
heap
page read and write
1921000
heap
page read and write
3FEF000
heap
page read and write
E04000
unkown
page execute and read and write
1374000
heap
page read and write
890000
unkown
page read and write
29EFCEF2000
heap
page read and write
79C5000
heap
page read and write
18F3000
heap
page read and write
1C27000
heap
page read and write
2A5A000
trusted library allocation
page read and write
692727D000
stack
page read and write
51A0000
direct allocation
page execute and read and write
3F30000
heap
page read and write
1374000
heap
page read and write
7A1F000
heap
page read and write
7F43000
heap
page read and write
4034000
heap
page read and write
7DCB000
heap
page read and write
697A000
heap
page read and write
193A000
heap
page read and write
5150000
remote allocation
page read and write
319E000
stack
page read and write
E8E000
unkown
page execute and write copy
1374000
heap
page read and write
7A23000
heap
page read and write
10E4000
heap
page read and write
17AB000
heap
page read and write
432E000
trusted library allocation
page read and write
AA0000
heap
page read and write
7DCB000
heap
page read and write
EE4000
heap
page read and write
BF6000
unkown
page execute and read and write
1374000
heap
page read and write
1763000
heap
page read and write
795C000
heap
page read and write
7F39000
heap
page read and write
1077000
heap
page read and write
7CED000
heap
page read and write
37AB000
heap
page read and write
1311000
heap
page read and write
7EE2000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1F406E79000
heap
page read and write
1B2F000
heap
page read and write
4EF1000
heap
page read and write
7DED000
heap
page read and write
3E5A000
heap
page read and write
1838000
heap
page read and write
4911000
heap
page read and write
4EB1000
heap
page read and write
1374000
heap
page read and write
7FF848B93000
trusted library allocation
page execute and read and write
7F43000
heap
page read and write
1A3E000
heap
page read and write
8111000
heap
page read and write
5FC5000
heap
page read and write
4E21000
heap
page read and write
3CD0000
heap
page read and write
7FE0000
trusted library allocation
page read and write
14F3000
heap
page read and write
1375000
heap
page read and write
4A91000
heap
page read and write
7934000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
14EA6B1B000
heap
page read and write
448A000
heap
page read and write
7957000
heap
page read and write
4911000
heap
page read and write
709E000
stack
page read and write
2BA2000
trusted library allocation
page read and write
1374000
heap
page read and write
1044000
heap
page read and write
EE4000
heap
page read and write
76DD000
stack
page read and write
7D1F000
stack
page read and write
298C000
trusted library allocation
page read and write
17D3000
trusted library allocation
page execute and read and write
7F43000
heap
page read and write
1A28000
heap
page read and write
7CC8000
heap
page read and write
1A9A000
heap
page read and write
7F45000
heap
page read and write
BB0000
heap
page read and write
1374000
heap
page read and write
39AF000
stack
page read and write
BE5000
unkown
page write copy
4911000
heap
page read and write
7A35000
heap
page read and write
3FB9000
heap
page read and write
4F60000
direct allocation
page execute and read and write
7F17000
heap
page read and write
1374000
heap
page read and write
50C0000
direct allocation
page execute and read and write
890000
unkown
page readonly
346F000
stack
page read and write
4334000
trusted library allocation
page read and write
18C0000
heap
page read and write
530E000
stack
page read and write
4890000
direct allocation
page execute and read and write
1941000
heap
page read and write
4BAB000
trusted library allocation
page read and write
C6E000
unkown
page execute and read and write
14EAB920000
remote allocation
page read and write
94E000
heap
page read and write
1374000
heap
page read and write
7CBA000
heap
page read and write
1374000
heap
page read and write
34AF000
stack
page read and write
43EE000
stack
page read and write
7F45000
heap
page read and write
3E0E000
stack
page read and write
150C000
heap
page read and write
7F39000
heap
page read and write
3E80000
heap
page read and write
1B3E000
heap
page read and write
7C54000
heap
page read and write
1994000
heap
page read and write
7F2D000
heap
page read and write
3CD4000
heap
page read and write
1171000
heap
page read and write
5F10000
trusted library allocation
page read and write
338F000
stack
page read and write
C7D000
unkown
page execute and read and write
5360000
direct allocation
page execute and read and write
4C2000
unkown
page execute and read and write
1374000
heap
page read and write
4930000
direct allocation
page execute and read and write
1044000
heap
page read and write
7E01000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
7CD0000
trusted library allocation
page read and write
360000
unkown
page read and write
30AF000
stack
page read and write
387E000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
326F000
stack
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
3E4B000
heap
page read and write
454000
heap
page read and write
1035000
heap
page read and write
7D25000
heap
page read and write
4EF1000
heap
page read and write
7937000
heap
page read and write
5360000
direct allocation
page execute and read and write
7E01000
heap
page read and write
4079000
heap
page read and write
813B000
heap
page read and write
10AA000
heap
page read and write
5906000
trusted library allocation
page read and write
A34000
heap
page read and write
A0B000
unkown
page execute and read and write
A34000
heap
page read and write
402B000
heap
page read and write
4231000
heap
page read and write
8132000
heap
page read and write
43A1000
heap
page read and write
4CE0000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
14ED000
heap
page read and write
1480000
direct allocation
page read and write
183E000
heap
page read and write
43D9000
trusted library allocation
page read and write
4911000
heap
page read and write
43C1000
heap
page read and write
1374000
heap
page read and write
83A4000
heap
page read and write
671E000
stack
page read and write
7FE0000
trusted library allocation
page read and write
189E000
heap
page read and write
7EF4000
heap
page read and write
4B51000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1375000
heap
page read and write
5090000
direct allocation
page execute and read and write
49A0000
direct allocation
page execute and read and write
1833000
heap
page read and write
14EABB1B000
heap
page read and write
C8E000
stack
page read and write
29EE000
trusted library allocation
page read and write
1374000
heap
page read and write
11BC000
heap
page read and write
195D000
heap
page read and write
51F0000
direct allocation
page execute and read and write
8111000
heap
page read and write
199E000
stack
page read and write
876F000
stack
page read and write
7A1E000
heap
page read and write
29EA000
trusted library allocation
page read and write
191C000
heap
page read and write
ECE000
stack
page read and write
7CE0000
heap
page read and write
4A81000
heap
page read and write
34AE000
stack
page read and write
7CD5000
heap
page read and write
125E000
stack
page read and write
3AAF000
stack
page read and write
2670000
heap
page read and write
862D000
trusted library allocation
page read and write
1374000
heap
page read and write
1A9B000
heap
page read and write
CCE000
stack
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1375000
heap
page read and write
1374000
heap
page read and write
43A1000
heap
page read and write
4F6E000
unkown
page read and write
13E0000
heap
page read and write
9E2000
unkown
page execute and read and write
15FE000
stack
page read and write
7D18000
heap
page read and write
1374000
heap
page read and write
42AE000
stack
page read and write
43A1000
heap
page read and write
79FD000
heap
page read and write
49AF000
stack
page read and write
7FF848BEC000
trusted library allocation
page execute and read and write
1139000
heap
page read and write
1374000
heap
page read and write
97D000
unkown
page execute and write copy
830000
heap
page read and write
29CA000
trusted library allocation
page read and write
29EFCBC2000
heap
page read and write
1374000
heap
page read and write
7F9D000
heap
page read and write
433C000
trusted library allocation
page read and write
D6C000
unkown
page write copy
49D0000
direct allocation
page execute and read and write
775000
unkown
page execute and write copy
3730000
heap
page read and write
EB0000
heap
page read and write
1309000
heap
page read and write
10E4000
heap
page read and write
83A0000
trusted library allocation
page read and write
1BA6000
heap
page read and write
1564000
heap
page read and write
8EF000
unkown
page execute and read and write
1A67000
heap
page read and write
CAED944000
stack
page read and write
26DB000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
D8E000
stack
page read and write
7D4E000
heap
page read and write
767000
stack
page read and write
3D8F000
stack
page read and write
3FE9000
heap
page read and write
7A0F000
heap
page read and write
9837000
heap
page read and write
35AF000
stack
page read and write
A34000
heap
page read and write
7C74000
heap
page read and write
F90000
heap
page read and write
1907000
heap
page read and write
3BDD000
heap
page read and write
7C57000
heap
page read and write
79BD000
heap
page read and write
4A00000
direct allocation
page execute and read and write
10C6000
heap
page read and write
1101000
heap
page read and write
18D6000
heap
page read and write
1923000
heap
page read and write
7DF1000
heap
page read and write
457F000
stack
page read and write
43AF000
stack
page read and write
2C59000
trusted library allocation
page read and write
1375000
heap
page read and write
187D000
heap
page read and write
2ACC000
trusted library allocation
page read and write
4971000
heap
page read and write
5D90000
heap
page read and write
811C000
heap
page read and write
79EE000
stack
page read and write
30F0000
trusted library allocation
page read and write
3070000
heap
page read and write
37FE000
stack
page read and write
1973000
heap
page read and write
54B0000
direct allocation
page execute and read and write
82CC000
stack
page read and write
3332000
trusted library allocation
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
186B000
heap
page read and write
1374000
heap
page read and write
83A0000
trusted library allocation
page read and write
8111000
heap
page read and write
9E7000
unkown
page execute and write copy
1188000
heap
page read and write
F80000
direct allocation
page read and write
29E81633000
trusted library allocation
page read and write
1549000
heap
page read and write
36E000
unkown
page execute and read and write
811F000
heap
page read and write
2699000
trusted library allocation
page read and write
43A1000
heap
page read and write
3FBE000
heap
page read and write
2D7E000
stack
page read and write
27FA000
trusted library allocation
page read and write
1689000
heap
page read and write
14F4000
heap
page read and write
4911000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
7DDD000
heap
page read and write
3679000
heap
page read and write
7A23000
heap
page read and write
AA0000
unkown
page read and write
1374000
heap
page read and write
7964000
heap
page read and write
1375000
heap
page read and write
4E20000
direct allocation
page execute and read and write
2490000
direct allocation
page read and write
1C27000
heap
page read and write
4EF1000
heap
page read and write
1480000
heap
page read and write
1564000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
26E71E70000
heap
page read and write
7964000
heap
page read and write
1A4B000
heap
page read and write
29A4000
trusted library allocation
page read and write
7F30000
heap
page read and write
F53C10E000
stack
page read and write
7A1E000
heap
page read and write
336E000
stack
page read and write
43DF000
stack
page read and write
1374000
heap
page read and write
1966000
heap
page read and write
130E000
heap
page read and write
7CD8000
heap
page read and write
230F7FB000
stack
page read and write
7CDB000
heap
page read and write
1374000
heap
page read and write
510000
direct allocation
page read and write
4850000
direct allocation
page execute and read and write
362E000
heap
page read and write
79D5000
heap
page read and write
1AC6000
heap
page read and write
4971000
heap
page read and write
1374000
heap
page read and write
3FCA000
heap
page read and write
145C000
heap
page read and write
37B6000
heap
page read and write
1374000
heap
page read and write
8CED000
heap
page read and write
69E000
stack
page read and write
1374000
heap
page read and write
1560000
heap
page read and write
10E4000
heap
page read and write
10A4000
heap
page read and write
812E000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
1374000
heap
page read and write
813E000
heap
page read and write
4971000
heap
page read and write
1C20000
heap
page read and write
156C000
heap
page read and write
1374000
heap
page read and write
1A80000
heap
page read and write
5070000
direct allocation
page execute and read and write
7E01000
heap
page read and write
3C0F000
heap
page read and write
3E26000
heap
page read and write
36B3000
trusted library allocation
page read and write
1F406E60000
heap
page read and write
193C000
heap
page read and write
7F43000
heap
page read and write
4451000
heap
page read and write
1374000
heap
page read and write
4911000
heap
page read and write
1374000
heap
page read and write
DEC000
unkown
page execute and read and write
3D6F000
stack
page read and write
17F2000
trusted library allocation
page read and write
36F3000
heap
page read and write
F9B000
heap
page read and write
1139000
heap
page read and write
4E10000
direct allocation
page execute and read and write
98A000
unkown
page execute and write copy
3E6F000
stack
page read and write
11BC000
heap
page read and write
1996000
heap
page read and write
1374000
heap
page read and write
EE4000
heap
page read and write
4930000
direct allocation
page execute and read and write
7F78000
heap
page read and write
E04000
unkown
page execute and read and write
2B80000
heap
page read and write
2C23000
trusted library allocation
page read and write
7CEA000
heap
page read and write
4D60000
direct allocation
page read and write
1886000
heap
page read and write
924000
heap
page read and write
7CB8000
heap
page read and write
4B31000
heap
page read and write
1564000
heap
page read and write
7894000
heap
page read and write
1938000
heap
page read and write
1374000
heap
page read and write
79BD000
stack
page read and write
1374000
heap
page read and write
15FE000
stack
page read and write
4911000
heap
page read and write
1374000
heap
page read and write
7F2D000
heap
page read and write
170E000
stack
page read and write
29BA000
trusted library allocation
page read and write
4086000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
31BE000
stack
page read and write
4E40000
direct allocation
page execute and read and write
389F000
stack
page read and write
7A36000
heap
page read and write
1564000
heap
page read and write
48AE000
stack
page read and write
705C000
stack
page read and write
CA0000
unkown
page readonly
7F80000
heap
page read and write
1564000
heap
page read and write
510000
direct allocation
page read and write
17EA000
heap
page read and write
1374000
heap
page read and write
795B000
heap
page read and write
7CEA000
heap
page read and write
47BE000
stack
page read and write
7FF848D50000
trusted library allocation
page execute and read and write
7F58000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1B36000
heap
page read and write
12CC000
heap
page read and write
1374000
heap
page read and write
43C2000
heap
page read and write
1266000
heap
page read and write
1A61000
heap
page read and write
4CAE000
stack
page read and write
7CAC000
heap
page read and write
1000000
heap
page read and write
BE5000
unkown
page write copy
48AF000
stack
page read and write
1374000
heap
page read and write
43A1000
heap
page read and write
3A6F000
stack
page read and write
1374000
heap
page read and write
155F000
heap
page read and write
190B000
heap
page read and write
A70000
heap
page read and write
13C7000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
5450000
direct allocation
page execute and read and write
43A0000
trusted library allocation
page read and write
F55000
heap
page read and write
1374000
heap
page read and write
7A1E000
heap
page read and write
186A000
heap
page read and write
43AE000
stack
page read and write
7DCB000
heap
page read and write
4A80000
direct allocation
page read and write
43EF000
trusted library allocation
page read and write
D1000
unkown
page execute and read and write
8111000
heap
page read and write
8142000
heap
page read and write
13F0000
heap
page read and write
4971000
heap
page read and write
181B000
heap
page read and write
1044000
heap
page read and write
2AF5000
trusted library allocation
page read and write
43DF000
trusted library allocation
page read and write
1374000
heap
page read and write
7FF848E80000
trusted library allocation
page read and write
6974000
heap
page read and write
29E9006D000
trusted library allocation
page read and write
9881000
heap
page read and write
4A80000
direct allocation
page read and write
26E71EC5000
heap
page read and write
1374000
heap
page read and write
1024000
heap
page read and write
4119000
heap
page read and write
FC5000
heap
page read and write
18FB000
heap
page read and write
2B6F000
trusted library allocation
page read and write
130D000
heap
page read and write
1375000
heap
page read and write
700000
unkown
page readonly
3E47000
heap
page read and write
426E000
stack
page read and write
3FF0000
heap
page read and write
133F000
heap
page read and write
7973000
heap
page read and write
1855000
heap
page read and write
7960000
heap
page read and write
1374000
heap
page read and write
7CEA000
heap
page read and write
188E000
heap
page read and write
7A40000
trusted library allocation
page read and write
48E1000
heap
page read and write
3F67000
heap
page read and write
4369000
trusted library allocation
page read and write
418F000
stack
page read and write
4D08000
trusted library allocation
page read and write
6EB000
stack
page read and write
1374000
heap
page read and write
454000
heap
page read and write
1374000
heap
page read and write
1796000
heap
page read and write
1374000
heap
page read and write
29EFAC25000
heap
page read and write
76B000
unkown
page execute and read and write
3F8B000
heap
page read and write
10E4000
heap
page read and write
1374000
heap
page read and write
27E0000
trusted library allocation
page read and write
1374000
heap
page read and write
4F80000
direct allocation
page execute and read and write
2BAD000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
7960000
heap
page read and write
379A000
heap
page read and write
7CEA000
heap
page read and write
7E01000
heap
page read and write
1600000
direct allocation
page read and write
87B000
stack
page read and write
79F5000
heap
page read and write
1374000
heap
page read and write
1A0B000
heap
page read and write
1375000
heap
page read and write
1374000
heap
page read and write
4A91000
heap
page read and write
7F2D000
heap
page read and write
5080000
direct allocation
page execute and read and write
4E70000
direct allocation
page execute and read and write
2B34000
trusted library allocation
page read and write
37A1000
heap
page read and write
17E7000
heap
page read and write
1374000
heap
page read and write
7E01000
heap
page read and write
29EFAE20000
trusted library allocation
page read and write
812E000
heap
page read and write
29EFCF4B000
heap
page read and write
F53B73B000
stack
page read and write
4A81000
heap
page read and write
79B3000
heap
page read and write
98BD000
heap
page read and write
1A46000
heap
page read and write
4911000
heap
page read and write
C50000
heap
page read and write
F6F000
heap
page read and write
10B3000
heap
page read and write
3E9E000
heap
page read and write
112C000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
300F000
stack
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
64C6000
heap
page read and write
35EC000
heap
page read and write
36B5000
heap
page read and write
DD1000
unkown
page execute and write copy
7A35000
heap
page read and write
D6C000
unkown
page write copy
5A30000
trusted library allocation
page execute and read and write
391E000
stack
page read and write
525000
unkown
page execute and write copy
4451000
heap
page read and write
1581000
heap
page read and write
454000
heap
page read and write
7F14000
heap
page read and write
EAE000
stack
page read and write
1196000
heap
page read and write
7FF848E30000
trusted library allocation
page read and write
1564000
heap
page read and write
7964000
heap
page read and write
37BF000
stack
page read and write
4F10000
direct allocation
page read and write
452E000
stack
page read and write
1374000
heap
page read and write
3A3F000
stack
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
2F0E000
stack
page read and write
4C35000
trusted library allocation
page read and write
3FEF000
stack
page read and write
527F000
stack
page read and write
1740000
heap
page read and write
1374000
heap
page read and write
F9B000
heap
page read and write
EE4000
heap
page read and write
3C4F000
stack
page read and write
8D36000
heap
page read and write
3F41000
heap
page read and write
3DDF000
stack
page read and write
EE4000
heap
page read and write
7C4E000
stack
page read and write
AE6000
trusted library allocation
page execute and read and write
7F7E000
heap
page read and write
A8E000
stack
page read and write
19A5000
heap
page read and write
795C000
heap
page read and write
3BAF000
stack
page read and write
133E000
heap
page read and write
2CEC000
stack
page read and write
4EF0000
direct allocation
page execute and read and write
3F5D000
heap
page read and write
2D8F000
stack
page read and write
39EE000
stack
page read and write
1075000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
186E000
heap
page read and write
29EFCC4B000
heap
page read and write
29DF000
trusted library allocation
page read and write
44A0000
direct allocation
page read and write
E39000
unkown
page execute and read and write
29EFCECB000
heap
page read and write
29EFCE10000
heap
page execute and read and write
4911000
heap
page read and write
E39000
unkown
page execute and read and write
1374000
heap
page read and write
17DF000
heap
page read and write
1938000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
1855000
heap
page read and write
3594000
heap
page read and write
A0B000
unkown
page execute and read and write
1374000
heap
page read and write
7CED000
heap
page read and write
7DC9000
heap
page read and write
26E71EC5000
heap
page read and write
510000
direct allocation
page read and write
4037000
heap
page read and write
3ECF000
heap
page read and write
34CF000
stack
page read and write
8D1000
unkown
page execute and read and write
29EFCFBA000
heap
page read and write
7F4F000
heap
page read and write
14EAB7F0000
trusted library allocation
page read and write
34AF000
stack
page read and write
11D3000
heap
page read and write
1375000
heap
page read and write
1374000
heap
page read and write
D74000
unkown
page readonly
1938000
heap
page read and write
106A000
heap
page read and write
7A35000
heap
page read and write
12C2000
heap
page read and write
4A81000
heap
page read and write
1070000
heap
page read and write
7CB8000
heap
page read and write
4A91000
heap
page read and write
1374000
heap
page read and write
F2A000
heap
page read and write
441E000
stack
page read and write
1374000
heap
page read and write
1525000
heap
page read and write
6940000
trusted library allocation
page execute and read and write
26E71E50000
heap
page read and write
1266000
heap
page read and write
43A1000
heap
page read and write
F87000
heap
page read and write
9864000
heap
page read and write
1E17B100000
heap
page read and write
1374000
heap
page read and write
4911000
heap
page read and write
7A35000
heap
page read and write
1190000
heap
page read and write
1374000
heap
page read and write
32DF000
stack
page read and write
597C000
stack
page read and write
795C000
heap
page read and write
1F406DE0000
heap
page read and write
D74000
unkown
page readonly
1E17ACC0000
heap
page read and write
7DF1000
heap
page read and write
4A91000
heap
page read and write
2A93000
trusted library allocation
page read and write
F8B000
heap
page read and write
79E4000
heap
page read and write
7740000
heap
page read and write
BF2000
unkown
page execute and read and write
1374000
heap
page read and write
812E000
heap
page read and write
7C92000
heap
page read and write
7A35000
heap
page read and write
7CD0000
trusted library allocation
page read and write
13EC000
heap
page read and write
E7E000
unkown
page execute and read and write
7964000
heap
page read and write
F9E000
stack
page read and write
430000
heap
page read and write
13E5000
heap
page read and write
35EE000
stack
page read and write
4A91000
heap
page read and write
157C000
heap
page read and write
79EB000
heap
page read and write
B5E000
unkown
page execute and read and write
4F90000
direct allocation
page execute and read and write
3C0D000
heap
page read and write
1960000
heap
page read and write
1374000
heap
page read and write
106A000
heap
page read and write
A28000
heap
page read and write
9F6000
unkown
page execute and write copy
1F406E47000
heap
page read and write
19A5000
heap
page read and write
136A000
heap
page read and write
7F39000
heap
page read and write
7B0F000
stack
page read and write
17E5000
heap
page read and write
3EAF000
stack
page read and write
2B6A000
trusted library allocation
page read and write
5D3000
heap
page read and write
1374000
heap
page read and write
7A30000
trusted library allocation
page read and write
18AD000
heap
page read and write
79F1000
heap
page read and write
2892000
trusted library allocation
page read and write
360F000
stack
page read and write
314F000
stack
page read and write
83A0000
trusted library allocation
page read and write
D8000
unkown
page execute and read and write
7CAD000
heap
page read and write
797C000
heap
page read and write
17AE000
heap
page read and write
8FE0000
trusted library allocation
page execute and read and write
7F43000
heap
page read and write
17C8000
heap
page read and write
3F67000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
5160000
direct allocation
page execute and read and write
7E01000
heap
page read and write
1564000
heap
page read and write
7C9B000
heap
page read and write
EE4000
heap
page read and write
F84000
heap
page read and write
4377000
trusted library allocation
page read and write
66B000
stack
page read and write
106A000
heap
page read and write
812A000
heap
page read and write
4EF1000
heap
page read and write
10E4000
heap
page read and write
3BF9000
heap
page read and write
1374000
heap
page read and write
14EAB7C4000
trusted library allocation
page read and write
7F64000
heap
page read and write
1374000
heap
page read and write
1306000
heap
page read and write
7C8E000
heap
page read and write
343000
unkown
page execute and read and write
1374000
heap
page read and write
7F43000
heap
page read and write
10E4000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
4E40000
direct allocation
page execute and read and write
1374000
heap
page read and write
332E000
trusted library allocation
page read and write
7DF1000
heap
page read and write
1374000
heap
page read and write
131B000
heap
page read and write
1564000
heap
page read and write
17AB000
heap
page read and write
2828000
trusted library allocation
page read and write
1374000
heap
page read and write
1967B400000
heap
page read and write
4B51000
heap
page read and write
1564000
heap
page read and write
436F000
stack
page read and write
1564000
heap
page read and write
F92000
heap
page read and write
5D76000
trusted library allocation
page read and write
812E000
heap
page read and write
10E4000
heap
page read and write
1960000
heap
page read and write
1171000
heap
page read and write
1247000
heap
page read and write
79E3000
heap
page read and write
18B7000
heap
page read and write
3574000
heap
page read and write
9D5000
unkown
page read and write
37D7000
heap
page read and write
880000
heap
page read and write
701000
unkown
page execute and write copy
28BF000
stack
page read and write
7E01000
heap
page read and write
29F6000
trusted library allocation
page read and write
7CC8000
heap
page read and write
31DF000
stack
page read and write
11A9000
heap
page read and write
4A91000
heap
page read and write
1374000
heap
page read and write
157D000
heap
page read and write
353F000
stack
page read and write
1375000
heap
page read and write
166B000
heap
page read and write
4A91000
heap
page read and write
14EAB781000
trusted library allocation
page read and write
7D4E000
heap
page read and write
3DE1000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
2CEF000
stack
page read and write
5875000
trusted library allocation
page read and write
5DDC000
stack
page read and write
4911000
heap
page read and write
106A000
heap
page read and write
3F5E000
stack
page read and write
11ED000
heap
page read and write
7050000
heap
page read and write
4EF1000
heap
page read and write
EE4000
heap
page read and write
7FF848C46000
trusted library allocation
page read and write
4BFF000
stack
page read and write
82E000
stack
page read and write
1A0A000
heap
page read and write
358A000
heap
page read and write
53C0000
direct allocation
page execute and read and write
1374000
heap
page read and write
10EA000
heap
page read and write
49EF000
stack
page read and write
1374000
heap
page read and write
198F000
heap
page read and write
4E1E000
stack
page read and write
1374000
heap
page read and write
F80000
direct allocation
page read and write
4830000
direct allocation
page execute and read and write
1770000
heap
page read and write
8111000
heap
page read and write
1374000
heap
page read and write
1600000
direct allocation
page read and write
1374000
heap
page read and write
39EE000
stack
page read and write
79F6000
heap
page read and write
10D0000
heap
page read and write
1E17AF65000
heap
page read and write
5420000
direct allocation
page execute and read and write
83E0000
trusted library allocation
page read and write
7DD7000
heap
page read and write
1374000
heap
page read and write
458E000
stack
page read and write
1301000
heap
page read and write
ADC000
stack
page read and write
1374000
heap
page read and write
EE4000
heap
page read and write
3E92000
heap
page read and write
3875000
heap
page read and write
38AE000
stack
page read and write
4911000
heap
page read and write
1C15000
heap
page read and write
783E000
stack
page read and write
812E000
heap
page read and write
4EF1000
heap
page read and write
C7D000
unkown
page execute and read and write
2B7C000
trusted library allocation
page read and write
7DE9000
heap
page read and write
3FCB000
heap
page read and write
191C000
heap
page read and write
125E000
stack
page read and write
132C000
heap
page read and write
43FE000
heap
page read and write
6F5E000
stack
page read and write
1A4D000
heap
page read and write
4911000
heap
page read and write
B0B000
stack
page read and write
386F000
stack
page read and write
7952000
heap
page read and write
1374000
heap
page read and write
4231000
heap
page read and write
7CD6000
heap
page read and write
19CA000
heap
page read and write
30AE000
stack
page read and write
43E6000
trusted library allocation
page read and write
19D2000
heap
page read and write
41CE000
stack
page read and write
4BA0000
trusted library allocation
page read and write
593F000
stack
page read and write
1374000
heap
page read and write
402D000
heap
page read and write
5AF000
heap
page read and write
469E000
stack
page read and write
358C000
heap
page read and write
7547000
heap
page read and write
372F000
stack
page read and write
7DF1000
heap
page read and write
1480000
direct allocation
page read and write
1374000
heap
page read and write
1375000
heap
page read and write
3130000
trusted library allocation
page read and write
454000
heap
page read and write
393E000
stack
page read and write
3692000
trusted library allocation
page read and write
7F47000
heap
page read and write
340E000
stack
page read and write
4911000
heap
page read and write
1374000
heap
page read and write
76FD000
stack
page read and write
3E91000
heap
page read and write
5160000
trusted library allocation
page read and write
1E17AFE0000
heap
page read and write
1374000
heap
page read and write
29E81056000
trusted library allocation
page read and write
14EAB784000
trusted library allocation
page read and write
7EF1000
heap
page read and write
7FF848EE9000
trusted library allocation
page read and write
29EFCF87000
heap
page read and write
1374000
heap
page read and write
1564000
heap
page read and write
E76000
unkown
page execute and read and write
123C000
stack
page read and write
53C0000
direct allocation
page execute and read and write
1374000
heap
page read and write
19FC000
heap
page read and write
3AEF000
stack
page read and write
2E7C000
stack
page read and write
5320000
direct allocation
page read and write
1374000
heap
page read and write
D6C000
unkown
page read and write
1218000
heap
page read and write
700000
unkown
page readonly
4FD0000
direct allocation
page read and write
1374000
heap
page read and write
43A1000
heap
page read and write
A34000
heap
page read and write
924000
heap
page read and write
1854000
heap
page read and write
7F14000
heap
page read and write
1374000
heap
page read and write
2A42000
trusted library allocation
page read and write
1186000
heap
page read and write
8E5000
unkown
page execute and write copy
422F000
stack
page read and write
3706000
heap
page read and write
2DFC000
stack
page read and write
1B36000
heap
page read and write
2FAE000
stack
page read and write
4800000
direct allocation
page execute and read and write
D70000
unkown
page write copy
3F3F000
stack
page read and write
2B78000
trusted library allocation
page read and write
1B92000
heap
page read and write
29E80755000
trusted library allocation
page read and write
131C000
heap
page read and write
426E000
stack
page read and write
7FF848F83000
trusted library allocation
page read and write
3C8F000
stack
page read and write
43F5000
trusted library allocation
page read and write
5B7000
heap
page read and write
3A7E000
stack
page read and write
1044000
heap
page read and write
53C0000
direct allocation
page execute and read and write
1502000
heap
page read and write
1805000
trusted library allocation
page execute and read and write
8147000
heap
page read and write
1F406E79000
heap
page read and write
1006000
heap
page read and write
1374000
heap
page read and write
7CC1000
heap
page read and write
83A0000
heap
page read and write
361F000
stack
page read and write
14EA6B1B000
heap
page read and write
F6B000
heap
page read and write
1C28000
heap
page read and write
454000
heap
page read and write
1375000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1A12000
heap
page read and write
624E000
stack
page read and write
6920000
trusted library allocation
page read and write
331A000
trusted library allocation
page read and write
10A4000
heap
page read and write
53E0000
direct allocation
page execute and read and write
83A0000
trusted library allocation
page read and write
1374000
heap
page read and write
44BD000
heap
page read and write
1374000
heap
page read and write
49EE000
stack
page read and write
1374000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
8730000
trusted library allocation
page execute and read and write
1374000
heap
page read and write
440A000
trusted library allocation
page read and write
101C000
heap
page read and write
454000
heap
page read and write
4451000
heap
page read and write
2CDF000
stack
page read and write
375F000
stack
page read and write
1374000
heap
page read and write
7F45000
heap
page read and write
17AB000
heap
page read and write
7F43000
heap
page read and write
D6000
unkown
page read and write
1021000
unkown
page execute and read and write
1375000
heap
page read and write
5450000
direct allocation
page execute and read and write
118E000
heap
page read and write
7CD0000
trusted library allocation
page read and write
1374000
heap
page read and write
A60000
heap
page read and write
3685000
trusted library allocation
page read and write
7C86000
heap
page read and write
43B0000
heap
page read and write
107F000
heap
page read and write
5855000
trusted library allocation
page read and write
9F6000
unkown
page execute and write copy
1374000
heap
page read and write
1374000
heap
page read and write
4A91000
heap
page read and write
39AF000
stack
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
EE4000
heap
page read and write
4930000
direct allocation
page execute and read and write
2867000
trusted library allocation
page read and write
A34000
heap
page read and write
924000
heap
page read and write
4EF1000
heap
page read and write
1374000
heap
page read and write
4A80000
direct allocation
page read and write
F53B43D000
stack
page read and write
7CCA000
heap
page read and write
3FDD000
heap
page read and write
266000
unkown
page execute and read and write
EE4000
heap
page read and write
1375000
heap
page read and write
472F000
stack
page read and write
1973000
heap
page read and write
7F2D000
heap
page read and write
4A91000
heap
page read and write
4F20000
direct allocation
page execute and read and write
4971000
heap
page read and write
FD6000
heap
page read and write
EFE000
stack
page read and write
53C0000
direct allocation
page execute and read and write
43CC000
heap
page read and write
2BBA000
trusted library allocation
page read and write
3F0D000
heap
page read and write
83A0000
trusted library allocation
page read and write
4EF1000
heap
page read and write
1374000
heap
page read and write
3B7E000
stack
page read and write
1374000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
7CC2000
heap
page read and write
3F8D000
heap
page read and write
5E2000
heap
page read and write
7963000
heap
page read and write
7DDA000
heap
page read and write
1E17CC10000
trusted library allocation
page read and write
3728000
trusted library allocation
page read and write
D6E000
unkown
page execute and read and write
1374000
heap
page read and write
1374000
heap
page read and write
4EB1000
heap
page read and write
7CAD000
heap
page read and write
811F000
heap
page read and write
35E3000
heap
page read and write
8111000
heap
page read and write
7D6E000
stack
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
E8D000
unkown
page execute and write copy
5110000
remote allocation
page read and write
7DF1000
heap
page read and write
7CC1000
heap
page read and write
1374000
heap
page read and write
462F000
stack
page read and write
3F54000
heap
page read and write
4EF1000
heap
page read and write
1374000
heap
page read and write
4A91000
heap
page read and write
19BE000
heap
page read and write
2BB6000
trusted library allocation
page read and write
3A0E000
stack
page read and write
230F67F000
stack
page read and write
7DCC000
heap
page read and write
7A23000
heap
page read and write
43A1000
heap
page read and write
1697000
heap
page read and write
19B6000
heap
page read and write
191C000
heap
page read and write
F80000
direct allocation
page read and write
49D0000
direct allocation
page execute and read and write
514E000
trusted library allocation
page read and write
250E000
stack
page read and write
1846000
heap
page read and write
4A91000
heap
page read and write
4A91000
heap
page read and write
17E0000
heap
page read and write
1A67000
heap
page read and write
12CC000
heap
page read and write
1896000
heap
page read and write
76B000
unkown
page execute and write copy
1AE1000
heap
page read and write
BE9000
unkown
page read and write
2B45000
trusted library allocation
page read and write
34F9000
trusted library allocation
page read and write
D74000
unkown
page readonly
2E6E000
stack
page read and write
1020000
direct allocation
page read and write
3657000
heap
page read and write
7DCB000
heap
page read and write
7CD5000
heap
page read and write
7F43000
heap
page read and write
1967CE40000
trusted library allocation
page read and write
6B9D000
heap
page read and write
7A35000
heap
page read and write
7A35000
heap
page read and write
29E814A2000
trusted library allocation
page read and write
5110000
remote allocation
page read and write
8E2000
unkown
page execute and read and write
A7E000
stack
page read and write
1374000
heap
page read and write
2B90000
trusted library allocation
page read and write
DF7000
unkown
page execute and write copy
6BD8000
heap
page read and write
29E80087000
trusted library allocation
page read and write
156F000
heap
page read and write
1AA6000
heap
page read and write
4041000
heap
page read and write
27E6000
trusted library allocation
page read and write
1374000
heap
page read and write
4911000
heap
page read and write
193E000
heap
page read and write
7CD0000
trusted library allocation
page read and write
A34000
heap
page read and write
7A23000
heap
page read and write
1374000
heap
page read and write
59D0000
trusted library allocation
page read and write
3ECF000
heap
page read and write
1374000
heap
page read and write
31AF000
stack
page read and write
8580000
trusted library allocation
page read and write
4C2F000
stack
page read and write
4347000
trusted library allocation
page read and write
1374000
heap
page read and write
1540000
heap
page read and write
4911000
heap
page read and write
1374000
heap
page read and write
4F20000
direct allocation
page execute and read and write
3FEE000
stack
page read and write
7FAD0000
trusted library allocation
page execute and read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
5FDD000
stack
page read and write
F56000
heap
page read and write
1480000
direct allocation
page read and write
5830000
trusted library allocation
page execute and read and write
5D51000
trusted library allocation
page read and write
1ABE000
heap
page read and write
7F0A000
heap
page read and write
7F39000
heap
page read and write
404E000
stack
page read and write
5360000
direct allocation
page execute and read and write
4970000
direct allocation
page execute and read and write
924000
heap
page read and write
14EAB780000
trusted library allocation
page read and write
7DCB000
heap
page read and write
5080000
direct allocation
page execute and read and write
43A1000
heap
page read and write
1374000
heap
page read and write
7CBF000
heap
page read and write
1374000
heap
page read and write
309E000
stack
page read and write
1829000
heap
page read and write
29EFC630000
trusted library allocation
page read and write
7A35000
heap
page read and write
2DCE000
stack
page read and write
BE5000
unkown
page write copy
379C000
trusted library allocation
page read and write
587A000
trusted library allocation
page read and write
1374000
heap
page read and write
F53B4B8000
stack
page read and write
1967B4C1000
heap
page read and write
407F000
stack
page read and write
7CEF000
heap
page read and write
EE4000
heap
page read and write
F20000
heap
page read and write
CCE000
unkown
page read and write
4F60000
direct allocation
page execute and read and write
1BB4000
heap
page read and write
373A000
trusted library allocation
page read and write
7CC1000
heap
page read and write
1374000
heap
page read and write
811E000
heap
page read and write
1350000
direct allocation
page read and write
5360000
direct allocation
page execute and read and write
7DF1000
heap
page read and write
924000
heap
page read and write
1BD7000
heap
page read and write
10E4000
heap
page read and write
12E3000
heap
page read and write
1374000
heap
page read and write
43A1000
heap
page read and write
7CBF000
heap
page read and write
7CA9000
heap
page read and write
F53B5BF000
stack
page read and write
18A7000
heap
page read and write
1177000
heap
page read and write
9F6000
unkown
page execute and write copy
1495000
heap
page read and write
1374000
heap
page read and write
11F0000
direct allocation
page read and write
540F000
stack
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
59E0000
trusted library allocation
page read and write
1AC2000
heap
page read and write
4EF1000
heap
page read and write
7F39000
heap
page read and write
7CB7000
heap
page read and write
1374000
heap
page read and write
4CF4000
trusted library allocation
page read and write
7060000
heap
page read and write
4EC0000
heap
page read and write
79E3000
heap
page read and write
1044000
heap
page read and write
5EE7000
trusted library allocation
page read and write
4A80000
direct allocation
page read and write
4F60000
direct allocation
page execute and read and write
1374000
heap
page read and write
B80000
unkown
page readonly
357E000
stack
page read and write
185B000
heap
page read and write
7DF1000
heap
page read and write
5410000
heap
page read and write
4911000
heap
page read and write
6AB0000
heap
page read and write
1862000
heap
page read and write
8147000
heap
page read and write
4FAE000
stack
page read and write
441F000
stack
page read and write
1375000
heap
page read and write
7CCE000
heap
page read and write
7173000
heap
page read and write
795E000
stack
page read and write
7DB7000
heap
page read and write
40DD000
heap
page read and write
811F000
heap
page read and write
1374000
heap
page read and write
1967B340000
heap
page read and write
775000
unkown
page execute and write copy
1359000
heap
page read and write
7992000
heap
page read and write
29EFCBC0000
heap
page read and write
1374000
heap
page read and write
71DE000
stack
page read and write
7A02000
heap
page read and write
586A000
trusted library allocation
page read and write
1374000
heap
page read and write
66CF000
stack
page read and write
37CE000
stack
page read and write
1854000
heap
page read and write
4EB1000
heap
page read and write
1028000
heap
page read and write
7F0A000
heap
page read and write
69A4000
heap
page read and write
7A0F000
heap
page read and write
19A7000
heap
page read and write
14EAB920000
remote allocation
page read and write
F80000
direct allocation
page read and write
407D000
heap
page read and write
329E000
stack
page read and write
37D1000
trusted library allocation
page read and write
19AC000
heap
page read and write
7964000
heap
page read and write
7E01000
heap
page read and write
191C000
heap
page read and write
4A91000
heap
page read and write
1F406E6F000
heap
page read and write
1375000
heap
page read and write
7F2D000
heap
page read and write
1000000
heap
page read and write
1AFE000
heap
page read and write
7FF848EC3000
trusted library allocation
page read and write
434E000
trusted library allocation
page read and write
3816000
heap
page read and write
8130000
heap
page read and write
7E01000
heap
page read and write
EE4000
heap
page read and write
42DF000
stack
page read and write
1374000
heap
page read and write
3F94000
heap
page read and write
1374000
heap
page read and write
47FE000
stack
page read and write
1564000
heap
page read and write
1480000
direct allocation
page read and write
7EA0000
heap
page read and write
379C000
trusted library allocation
page read and write
7A1C000
heap
page read and write
167A000
heap
page read and write
450000
heap
page read and write
1374000
heap
page read and write
813E000
heap
page read and write
79E6000
heap
page read and write
3FAB000
heap
page read and write
1B3D000
heap
page read and write
50B0000
direct allocation
page execute and read and write
4E40000
direct allocation
page execute and read and write
1374000
heap
page read and write
19E2000
heap
page read and write
7CBF000
heap
page read and write
3EE7000
heap
page read and write
1E17AE88000
heap
page read and write
769C000
stack
page read and write
1374000
heap
page read and write
7CD0000
trusted library allocation
page read and write
4A81000
heap
page read and write
361000
unkown
page execute and write copy
1374000
heap
page read and write
1374000
heap
page read and write
1967B3F0000
trusted library allocation
page read and write
3ECF000
stack
page read and write
1A54000
heap
page read and write
4BFE000
stack
page read and write
811C000
heap
page read and write
48E0000
heap
page read and write
1374000
heap
page read and write
402D000
heap
page read and write
29EFCD10000
heap
page read and write
1374000
heap
page read and write
105E000
heap
page read and write
EB0000
heap
page read and write
48AF000
stack
page read and write
7FF848EE4000
trusted library allocation
page read and write
10E4000
heap
page read and write
4EF1000
heap
page read and write
16C5000
heap
page read and write
79E6000
heap
page read and write
7A35000
heap
page read and write
1374000
heap
page read and write
2EAB000
stack
page read and write
1374000
heap
page read and write
7C86000
heap
page read and write
83B000
heap
page read and write
1F408974000
heap
page read and write
1374000
heap
page read and write
3FCE000
heap
page read and write
7A35000
heap
page read and write
7CBD000
heap
page read and write
36EE000
stack
page read and write
7A20000
heap
page read and write
1967B240000
heap
page read and write
83A0000
trusted library allocation
page read and write
4BDE000
stack
page read and write
7C57000
heap
page read and write
11BC000
heap
page read and write
4A81000
heap
page read and write
F10000
heap
page read and write
17D5000
heap
page read and write
36A4000
heap
page read and write
13AE000
heap
page read and write
3B2E000
stack
page read and write
1044000
heap
page read and write
1374000
heap
page read and write
4910000
direct allocation
page execute and read and write
1374000
heap
page read and write
4B2E000
stack
page read and write
7969000
heap
page read and write
1997000
heap
page read and write
7CE5000
heap
page read and write
1B39000
heap
page read and write
1044000
heap
page read and write
7F43000
heap
page read and write
9170000
heap
page read and write
35BE000
trusted library allocation
page read and write
48E1000
heap
page read and write
1044000
heap
page read and write
50FE000
stack
page read and write
28D5000
trusted library allocation
page read and write
2BE4000
trusted library allocation
page read and write
29E902E6000
trusted library allocation
page read and write
1BA3000
heap
page read and write
79E4000
heap
page read and write
4911000
heap
page read and write
4A91000
heap
page read and write
ADD000
trusted library allocation
page execute and read and write
4A91000
heap
page read and write
468F000
stack
page read and write
29EFCB70000
heap
page execute and read and write
1564000
heap
page read and write
43A1000
heap
page read and write
7CBD000
heap
page read and write
10AA000
heap
page read and write
7D4E000
heap
page read and write
5360000
direct allocation
page execute and read and write
1374000
heap
page read and write
E11000
unkown
page execute and read and write
769000
unkown
page write copy
1374000
heap
page read and write
1967CE40000
trusted library allocation
page read and write
1374000
heap
page read and write
2721000
trusted library allocation
page read and write
4EF1000
heap
page read and write
1953000
heap
page read and write
7CBF000
heap
page read and write
5ECF000
trusted library allocation
page read and write
7A50000
trusted library allocation
page read and write
8111000
heap
page read and write
3780000
heap
page read and write
233E000
stack
page read and write
C5D000
stack
page read and write
405F000
stack
page read and write
8CAA000
heap
page read and write
5D80000
trusted library allocation
page read and write
1856000
heap
page read and write
7A35000
heap
page read and write
7DE0000
heap
page read and write
7D3C000
heap
page read and write
4840000
direct allocation
page read and write
1760000
heap
page read and write
3DC0000
heap
page read and write
1A31000
heap
page read and write
7DDB000
heap
page read and write
D70000
unkown
page write copy
7F5C000
heap
page read and write
7FF848EE0000
trusted library allocation
page read and write
79F9000
heap
page read and write
3FEF000
stack
page read and write
1375000
heap
page read and write
DD6000
unkown
page execute and read and write
13B8000
heap
page read and write
4E60000
direct allocation
page execute and read and write
4911000
heap
page read and write
3311000
trusted library allocation
page read and write
4911000
heap
page read and write
2650000
trusted library allocation
page read and write
79E6000
heap
page read and write
36E8000
trusted library allocation
page read and write
D77000
heap
page read and write
15CE000
stack
page read and write
5B9000
heap
page read and write
44A0000
direct allocation
page read and write
69272FB000
stack
page read and write
7F6E000
heap
page read and write
924000
heap
page read and write
7F14000
heap
page read and write
1374000
heap
page read and write
7509000
heap
page read and write
EE4000
heap
page read and write
5430000
direct allocation
page execute and read and write
29E814CD000
trusted library allocation
page read and write
E76000
unkown
page execute and read and write
43EE000
stack
page read and write
1564000
heap
page read and write
1AF8000
heap
page read and write
1B9A000
heap
page read and write
1374000
heap
page read and write
4A70000
trusted library allocation
page read and write
157C000
heap
page read and write
F80000
direct allocation
page read and write
7DD6000
heap
page read and write
7CB7000
heap
page read and write
29E819C6000
trusted library allocation
page read and write
1374000
heap
page read and write
15BE000
stack
page read and write
384000
unkown
page execute and write copy
3F06000
heap
page read and write
79E6000
heap
page read and write
418E000
stack
page read and write
4C80000
trusted library allocation
page execute and read and write
8127000
heap
page read and write
5050000
direct allocation
page execute and read and write
1587000
heap
page read and write
924000
heap
page read and write
1F406E47000
heap
page read and write
10E4000
heap
page read and write
F6E000
stack
page read and write
7D60000
remote allocation
page read and write
49EF000
stack
page read and write
7D18000
heap
page read and write
E05000
unkown
page execute and write copy
3A0F000
stack
page read and write
1375000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
3679000
heap
page read and write
811C000
heap
page read and write
12D4000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
7FF848D41000
trusted library allocation
page read and write
1820000
trusted library allocation
page read and write
4440000
direct allocation
page read and write
127B000
stack
page read and write
E70000
heap
page read and write
29EFCB80000
heap
page read and write
1374000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
1374000
heap
page read and write
52C0000
direct allocation
page read and write
7A24000
heap
page read and write
1C2B000
heap
page read and write
35AF000
stack
page read and write
D62000
unkown
page execute and read and write
BEB000
unkown
page execute and read and write
1374000
heap
page read and write
1819000
heap
page read and write
36AC000
heap
page read and write
1374000
heap
page read and write
7F39000
heap
page read and write
1B9C000
heap
page read and write
2A05000
trusted library allocation
page read and write
1374000
heap
page read and write
777000
unkown
page execute and write copy
1374000
heap
page read and write
112F000
heap
page read and write
368E000
stack
page read and write
1374000
heap
page read and write
11CF000
heap
page read and write
322E000
stack
page read and write
1042000
heap
page read and write
1374000
heap
page read and write
5100000
direct allocation
page execute and read and write
4A81000
heap
page read and write
8400000
trusted library allocation
page read and write
1A9B000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
2A3E000
trusted library allocation
page read and write
599F000
stack
page read and write
30FA000
heap
page read and write
1374000
heap
page read and write
29E81510000
trusted library allocation
page read and write
510000
direct allocation
page read and write
50D0000
direct allocation
page execute and read and write
E7D000
unkown
page execute and read and write
1350000
direct allocation
page read and write
3780000
heap
page read and write
1740000
direct allocation
page read and write
4EB1000
heap
page read and write
43A1000
heap
page read and write
156F000
heap
page read and write
478F000
stack
page read and write
4F50000
direct allocation
page execute and read and write
381B000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
1374000
heap
page read and write
1374000
heap
page read and write
7FF848F30000
trusted library allocation
page read and write
7F2D000
heap
page read and write
9834000
heap
page read and write
49D0000
direct allocation
page execute and read and write
1374000
heap
page read and write
F40000
heap
page read and write
A34000
heap
page read and write
112C000
heap
page read and write
759E000
stack
page read and write
1374000
heap
page read and write
7C9A000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
7D24000
heap
page read and write
3F4F000
heap
page read and write
29E8148B000
trusted library allocation
page read and write
17B1000
heap
page read and write
1E17AE80000
heap
page read and write
7F39000
heap
page read and write
98A4000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
813E000
heap
page read and write
7C1E000
stack
page read and write
79A3000
heap
page read and write
7FE0000
trusted library allocation
page read and write
1374000
heap
page read and write
2DBF000
stack
page read and write
2E2F000
stack
page read and write
1374000
heap
page read and write
7A1E000
heap
page read and write
1374000
heap
page read and write
4840000
direct allocation
page read and write
D6E000
unkown
page execute and read and write
17C0000
heap
page read and write
7DF1000
heap
page read and write
7CEA000
heap
page read and write
1905000
heap
page read and write
3FC0000
heap
page read and write
1944000
heap
page read and write
7F43000
heap
page read and write
5360000
direct allocation
page execute and read and write
166E000
stack
page read and write
1581000
heap
page read and write
7A35000
heap
page read and write
69AC000
stack
page read and write
830000
heap
page read and write
19C7000
heap
page read and write
6F1E000
stack
page read and write
2416000
heap
page read and write
1374000
heap
page read and write
F53B63C000
stack
page read and write
2AFE000
stack
page read and write
2B29000
trusted library allocation
page read and write
74BD000
stack
page read and write
B10000
trusted library allocation
page read and write
7CC4000
heap
page read and write
37CE000
heap
page read and write
2725000
trusted library allocation
page read and write
123A000
heap
page read and write
277F000
stack
page read and write
18D7000
heap
page read and write
7F6D000
heap
page read and write
135D000
heap
page read and write
1374000
heap
page read and write
4E4E000
stack
page read and write
354E000
stack
page read and write
40F5000
heap
page read and write
1374000
heap
page read and write
4E21000
heap
page read and write
7960000
heap
page read and write
4F60000
direct allocation
page execute and read and write
2A45000
trusted library allocation
page read and write
1AEB000
heap
page read and write
7F45000
heap
page read and write
7CC8000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
50B0000
direct allocation
page execute and read and write
29BE000
trusted library allocation
page read and write
3EA4000
heap
page read and write
1374000
heap
page read and write
1C0C000
heap
page read and write
795B000
heap
page read and write
A34000
heap
page read and write
1740000
direct allocation
page read and write
1374000
heap
page read and write
1AA7000
heap
page read and write
1374000
heap
page read and write
7F43000
heap
page read and write
4830000
direct allocation
page execute and read and write
5000000
direct allocation
page execute and read and write
368A000
heap
page read and write
7BC2000
heap
page read and write
7C57000
heap
page read and write
1374000
heap
page read and write
7DDB000
heap
page read and write
7CA9000
heap
page read and write
155F000
heap
page read and write
700000
unkown
page readonly
2825000
trusted library allocation
page read and write
8E3000
unkown
page execute and write copy
301E000
stack
page read and write
1006000
heap
page read and write
7CC3000
heap
page read and write
EE4000
heap
page read and write
E0B000
unkown
page execute and read and write
3FEA000
heap
page read and write
3120000
heap
page execute and read and write
42A5000
trusted library allocation
page read and write
7964000
heap
page read and write
5450000
direct allocation
page execute and read and write
3BBE000
stack
page read and write
19C7000
heap
page read and write
A34000
heap
page read and write
7F2D000
heap
page read and write
1374000
heap
page read and write
7F7C000
heap
page read and write
8132000
heap
page read and write
1042000
heap
page read and write
9D5000
unkown
page write copy
5370000
direct allocation
page read and write
1020000
direct allocation
page read and write
37EF000
stack
page read and write
1905000
heap
page read and write
1AB7000
heap
page read and write
79AE000
stack
page read and write
1952000
heap
page read and write
1375000
heap
page read and write
4EDF000
stack
page read and write
17A7000
heap
page read and write
1AE0000
heap
page read and write
781E000
stack
page read and write
1357000
heap
page read and write
1564000
heap
page read and write
9030000
trusted library allocation
page execute and read and write
14C0000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
71000
unkown
page execute and write copy
1374000
heap
page read and write
E8B000
unkown
page execute and read and write
D6C000
unkown
page write copy
513D000
stack
page read and write
8300000
trusted library allocation
page read and write
34DF000
stack
page read and write
1981000
heap
page read and write
FD0000
heap
page read and write
8DDB000
stack
page read and write
812D000
heap
page read and write
10E4000
heap
page read and write
1374000
heap
page read and write
4451000
heap
page read and write
7CBE000
heap
page read and write
10A4000
heap
page read and write
D64000
unkown
page execute and read and write
510000
direct allocation
page read and write
19A5000
heap
page read and write
7CC0000
heap
page read and write
495E000
stack
page read and write
9F7000
unkown
page execute and read and write
69270FE000
stack
page read and write
8F9000
unkown
page execute and read and write
4A4E000
stack
page read and write
5400000
direct allocation
page execute and read and write
7F45000
heap
page read and write
8128000
heap
page read and write
79C3000
heap
page read and write
7DE2000
heap
page read and write
44A0000
direct allocation
page read and write
4911000
heap
page read and write
1374000
heap
page read and write
3C08000
heap
page read and write
7CEB000
heap
page read and write
54D0000
direct allocation
page execute and read and write
1480000
direct allocation
page read and write
4DDE000
stack
page read and write
855000
heap
page read and write
29CE000
trusted library allocation
page read and write
1804000
heap
page read and write
7A1A000
heap
page read and write
184D000
heap
page read and write
951000
unkown
page execute and write copy
1374000
heap
page read and write
3F16000
heap
page read and write
7CFE000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
130D000
heap
page read and write
40C9000
heap
page read and write
7F2D000
heap
page read and write
1108000
heap
page read and write
7FF848EF0000
trusted library allocation
page read and write
7CC2000
heap
page read and write
5180000
trusted library allocation
page read and write
10A4000
heap
page read and write
4451000
heap
page read and write
14F4000
heap
page read and write
230F3CD000
stack
page read and write
3DAE000
stack
page read and write
1374000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
79A3000
heap
page read and write
416E000
stack
page read and write
924000
heap
page read and write
396F000
stack
page read and write
17FE000
heap
page read and write
1374000
heap
page read and write
A0D000
unkown
page execute and write copy
3F83000
heap
page read and write
1374000
heap
page read and write
7CBA000
heap
page read and write
7C9B000
heap
page read and write
795D000
heap
page read and write
14EAB850000
trusted library allocation
page read and write
7A1F000
heap
page read and write
FEF000
heap
page read and write
1374000
heap
page read and write
409A000
heap
page read and write
79E6000
heap
page read and write
510000
direct allocation
page read and write
128D000
heap
page read and write
5470000
direct allocation
page execute and read and write
1374000
heap
page read and write
490F000
stack
page read and write
33F4000
trusted library allocation
page read and write
454000
heap
page read and write
11CF000
heap
page read and write
1F407190000
heap
page read and write
2AC0000
trusted library allocation
page read and write
48D0000
direct allocation
page execute and read and write
11F4000
heap
page read and write
48CF000
stack
page read and write
7CB8000
heap
page read and write
4A91000
heap
page read and write
4F93000
direct allocation
page read and write
1808000
heap
page read and write
1374000
heap
page read and write
D3C000
unkown
page readonly
1210000
heap
page read and write
3E67000
heap
page read and write
3F0D000
heap
page read and write
486F000
stack
page read and write
183F000
stack
page read and write
7D36000
heap
page read and write
7F50000
trusted library allocation
page read and write
1374000
heap
page read and write
11EA000
heap
page read and write
29EFCE4D000
heap
page read and write
1374000
heap
page read and write
EE4000
heap
page read and write
4EF1000
heap
page read and write
1374000
heap
page read and write
29EFCCF0000
heap
page execute and read and write
1374000
heap
page read and write
4E1F000
stack
page read and write
4A91000
heap
page read and write
1374000
heap
page read and write
1A5D000
heap
page read and write
1360000
heap
page read and write
924000
heap
page read and write
411A000
heap
page read and write
7CB7000
heap
page read and write
7DF1000
heap
page read and write
1A58000
heap
page read and write
446F000
stack
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1E17AF41000
heap
page read and write
79E6000
heap
page read and write
26E71EEB000
heap
page read and write
1374000
heap
page read and write
4B31000
heap
page read and write
7E01000
heap
page read and write
19FC000
heap
page read and write
D3C000
unkown
page readonly
42D3000
trusted library allocation
page read and write
183F000
heap
page read and write
79E3000
heap
page read and write
18F1000
heap
page read and write
29E8188E000
trusted library allocation
page read and write
19C7000
heap
page read and write
1375000
heap
page read and write
1600000
direct allocation
page read and write
83A0000
trusted library allocation
page read and write
4940000
direct allocation
page execute and read and write
EC000
stack
page read and write
76B000
unkown
page execute and write copy
FD1000
heap
page read and write
3F0D000
heap
page read and write
A34000
heap
page read and write
7FF849030000
trusted library allocation
page execute and read and write
1015000
unkown
page execute and write copy
97C000
unkown
page execute and read and write
4B2F000
stack
page read and write
924000
heap
page read and write
523000
unkown
page execute and read and write
2B0A000
trusted library allocation
page read and write
7A35000
heap
page read and write
1802000
trusted library allocation
page read and write
1020000
direct allocation
page read and write
29EFAC41000
heap
page read and write
16C2000
heap
page read and write
790D000
heap
page read and write
4B31000
heap
page read and write
343E000
stack
page read and write
27E4000
trusted library allocation
page read and write
16B0000
trusted library allocation
page execute and read and write
3ED2000
heap
page read and write
450F000
stack
page read and write
383F000
heap
page read and write
430E000
stack
page read and write
EE4000
heap
page read and write
1374000
heap
page read and write
5360000
direct allocation
page execute and read and write
3688000
heap
page read and write
FDD000
heap
page read and write
7CAC000
heap
page read and write
1961000
heap
page read and write
4E7E000
stack
page read and write
54C0000
direct allocation
page execute and read and write
4EB1000
heap
page read and write
1374000
heap
page read and write
7CAC000
heap
page read and write
2B9E000
trusted library allocation
page read and write
4038000
heap
page read and write
7A06000
heap
page read and write
D53000
unkown
page execute and write copy
7F39000
heap
page read and write
7A1C000
heap
page read and write
2DEF000
stack
page read and write
7CB8000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
1374000
heap
page read and write
7E01000
heap
page read and write
7A1E000
heap
page read and write
520000
heap
page read and write
D78000
unkown
page execute and write copy
1374000
heap
page read and write
7F2D000
heap
page read and write
1374000
heap
page read and write
4A91000
heap
page read and write
701000
unkown
page execute and write copy
36AD000
trusted library allocation
page read and write
3C0000
unkown
page readonly
1374000
heap
page read and write
F80000
direct allocation
page read and write
41EF000
stack
page read and write
7C9A000
heap
page read and write
EE4000
heap
page read and write
5410000
direct allocation
page execute and read and write
1914000
heap
page read and write
1244000
heap
page read and write
51D0000
direct allocation
page execute and read and write
1044000
heap
page read and write
8111000
heap
page read and write
701000
unkown
page execute and write copy
5DD000
heap
page read and write
17E6000
heap
page read and write
4C1000
unkown
page write copy
7CD3000
heap
page read and write
435E000
trusted library allocation
page read and write
7F45000
heap
page read and write
1459000
heap
page read and write
7DF1000
heap
page read and write
4C55000
trusted library allocation
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
7CB7000
heap
page read and write
4911000
heap
page read and write
8142000
heap
page read and write
E77000
unkown
page execute and read and write
18DA000
heap
page read and write
198B000
heap
page read and write
1374000
heap
page read and write
5880000
trusted library allocation
page read and write
1374000
heap
page read and write
3E1D000
heap
page read and write
EE4000
heap
page read and write
4A81000
heap
page read and write
4B31000
heap
page read and write
5110000
remote allocation
page read and write
4EF1000
heap
page read and write
B3A000
stack
page read and write
7FE0000
trusted library allocation
page read and write
40BE000
stack
page read and write
1205000
heap
page read and write
1374000
heap
page read and write
EE4000
heap
page read and write
53D0000
direct allocation
page execute and read and write
1374000
heap
page read and write
7FF848B92000
trusted library allocation
page read and write
3EEE000
heap
page read and write
EE4000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
3406000
trusted library allocation
page read and write
3E47000
heap
page read and write
1E17CD57000
heap
page read and write
50CD000
stack
page read and write
17A7000
heap
page read and write
18F8000
heap
page read and write
1374000
heap
page read and write
4E50000
direct allocation
page execute and read and write
36B1000
trusted library allocation
page read and write
7F45000
heap
page read and write
7EF2000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
7963000
heap
page read and write
4E21000
heap
page read and write
1B12000
heap
page read and write
4911000
heap
page read and write
371E000
trusted library allocation
page read and write
A917000
heap
page read and write
416E000
stack
page read and write
9D5000
unkown
page write copy
B27000
heap
page read and write
4A80000
direct allocation
page read and write
7F0A000
heap
page read and write
7E01000
heap
page read and write
1309000
heap
page read and write
15BF000
stack
page read and write
4EF0000
direct allocation
page execute and read and write
1374000
heap
page read and write
FC2000
heap
page read and write
F80000
direct allocation
page read and write
1374000
heap
page read and write
1C27000
heap
page read and write
278E000
trusted library allocation
page read and write
454000
heap
page read and write
38FF000
stack
page read and write
7A35000
heap
page read and write
83A0000
trusted library allocation
page read and write
12B7000
heap
page read and write
33EF000
stack
page read and write
14EA6B1C000
heap
page read and write
1374000
heap
page read and write
7CCE000
heap
page read and write
7DCB000
heap
page read and write
29EFAE00000
trusted library allocation
page read and write
1375000
heap
page read and write
DD0000
unkown
page execute and read and write
3BD2000
heap
page read and write
850000
heap
page read and write
126D000
heap
page read and write
7E01000
heap
page read and write
7DF1000
heap
page read and write
701000
unkown
page execute and write copy
4A80000
direct allocation
page read and write
106E000
heap
page read and write
40EF000
stack
page read and write
1375000
heap
page read and write
7E01000
heap
page read and write
36B5000
trusted library allocation
page read and write
813A000
heap
page read and write
1374000
heap
page read and write
1808000
heap
page read and write
168B000
heap
page read and write
1480000
direct allocation
page read and write
F53B53F000
stack
page read and write
1020000
direct allocation
page read and write
187C000
heap
page read and write
5932000
trusted library allocation
page read and write
44A0000
direct allocation
page read and write
1374000
heap
page read and write
282C000
trusted library allocation
page read and write
1374000
heap
page read and write
1AFA000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
7EF1000
heap
page read and write
1006000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
4EF1000
heap
page read and write
7CAC000
heap
page read and write
26EE000
stack
page read and write
1375000
heap
page read and write
7F2D000
heap
page read and write
7CD9000
heap
page read and write
26E73A60000
heap
page read and write
3CDE000
stack
page read and write
29EFCC40000
heap
page read and write
43A1000
heap
page read and write
7F2D000
heap
page read and write
491F000
stack
page read and write
59F0000
trusted library allocation
page execute and read and write
1374000
heap
page read and write
1374000
heap
page read and write
80DF000
stack
page read and write
D8000
unkown
page execute and read and write
1374000
heap
page read and write
BE5000
unkown
page read and write
1374000
heap
page read and write
2CAF000
stack
page read and write
7D11000
heap
page read and write
91F000
unkown
page execute and read and write
1374000
heap
page read and write
10C3000
heap
page read and write
1374000
heap
page read and write
4A80000
direct allocation
page read and write
29EFCC1B000
heap
page read and write
2BD0000
heap
page read and write
1374000
heap
page read and write
4A81000
heap
page read and write
1375000
heap
page read and write
4EB1000
heap
page read and write
36B5000
heap
page read and write
2FDF000
stack
page read and write
49AE000
stack
page read and write
5990000
heap
page execute and read and write
1AB8000
heap
page read and write
36D7000
heap
page read and write
1374000
heap
page read and write
2BB1000
trusted library allocation
page read and write
4364000
trusted library allocation
page read and write
79E8000
heap
page read and write
7F0A000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
17D4000
trusted library allocation
page read and write
1374000
heap
page read and write
7F45000
heap
page read and write
1558000
heap
page read and write
15EF000
stack
page read and write
415F000
stack
page read and write
2DC7000
heap
page read and write
29EFCC7A000
heap
page read and write
7A35000
heap
page read and write
2712000
trusted library allocation
page read and write
187B000
heap
page read and write
3CB0000
heap
page read and write
3F94000
heap
page read and write
12C3000
heap
page read and write
46FE000
stack
page read and write
1374000
heap
page read and write
4688000
trusted library allocation
page read and write
F53B3B7000
stack
page read and write
376E000
stack
page read and write
811B000
heap
page read and write
5450000
direct allocation
page execute and read and write
E7E000
unkown
page execute and read and write
281D000
trusted library allocation
page read and write
450000
heap
page read and write
5030000
direct allocation
page execute and read and write
1375000
heap
page read and write
FAD000
heap
page read and write
29FF000
stack
page read and write
1374000
heap
page read and write
9B00000
trusted library allocation
page execute and read and write
1374000
heap
page read and write
370000
unkown
page read and write
BED000
stack
page read and write
7FF848D60000
trusted library allocation
page execute and read and write
3680000
heap
page read and write
7CB7000
heap
page read and write
71000
unkown
page execute and write copy
87E000
stack
page read and write
1610000
heap
page read and write
F84000
heap
page read and write
230F6FE000
stack
page read and write
1374000
heap
page read and write
5904000
trusted library allocation
page read and write
4911000
heap
page read and write
1967B408000
heap
page read and write
10A4000
heap
page read and write
7F56000
heap
page read and write
54F0000
heap
page read and write
6270000
heap
page read and write
11C7000
heap
page read and write
1374000
heap
page read and write
1542000
heap
page read and write
1375000
heap
page read and write
1374000
heap
page read and write
5A00000
trusted library allocation
page read and write
307E000
stack
page read and write
4FD0000
direct allocation
page execute and read and write
29EFAE55000
heap
page read and write
312E000
stack
page read and write
7A35000
heap
page read and write
1374000
heap
page read and write
3DFF000
stack
page read and write
4A91000
heap
page read and write
7CB7000
heap
page read and write
7E01000
heap
page read and write
716D000
heap
page read and write
3F29000
heap
page read and write
1374000
heap
page read and write
6A4B000
heap
page read and write
1374000
heap
page read and write
8E4000
unkown
page execute and read and write
1943000
heap
page read and write
1374000
heap
page read and write
7DF1000
heap
page read and write
360000
unkown
page readonly
113A000
heap
page read and write
F84000
heap
page read and write
7F2D000
heap
page read and write
7A35000
heap
page read and write
1374000
heap
page read and write
46CE000
stack
page read and write
326F000
stack
page read and write
1040000
heap
page read and write
F70000
heap
page read and write
4451000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
2D2E000
stack
page read and write
18A9000
heap
page read and write
1073000
heap
page read and write
454000
heap
page read and write
303F000
stack
page read and write
1374000
heap
page read and write
10E4000
heap
page read and write
1374000
heap
page read and write
5D67000
trusted library allocation
page read and write
1374000
heap
page read and write
3F81000
heap
page read and write
1460000
heap
page read and write
8148000
heap
page read and write
7E9F000
stack
page read and write
33AE000
stack
page read and write
1374000
heap
page read and write
813B000
heap
page read and write
18F8000
heap
page read and write
306F000
stack
page read and write
1374000
heap
page read and write
4E40000
direct allocation
page execute and read and write
350F000
stack
page read and write
4EF1000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
130E000
heap
page read and write
1374000
heap
page read and write
7460000
heap
page read and write
1B3B000
heap
page read and write
592D000
trusted library allocation
page read and write
2660000
trusted library allocation
page read and write
7F0A000
heap
page read and write
1B2B000
heap
page read and write
52A8000
trusted library allocation
page read and write
53AE000
stack
page read and write
1374000
heap
page read and write
77DE000
stack
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
17BE000
heap
page read and write
4971000
heap
page read and write
10D0000
heap
page read and write
1044000
heap
page read and write
4A2E000
stack
page read and write
18E6000
heap
page read and write
1600000
direct allocation
page read and write
1918000
heap
page read and write
811C000
heap
page read and write
1374000
heap
page read and write
4D90000
direct allocation
page read and write
7DF1000
heap
page read and write
4F10000
direct allocation
page execute and read and write
7F22000
heap
page read and write
4C30000
trusted library allocation
page read and write
198C000
heap
page read and write
1374000
heap
page read and write
42FF000
stack
page read and write
98A000
unkown
page execute and write copy
13EE000
stack
page read and write
1374000
heap
page read and write
27FC000
trusted library allocation
page read and write
1ED000
stack
page read and write
130E000
heap
page read and write
7DF4F98C0000
trusted library allocation
page execute and read and write
8C73000
heap
page read and write
1564000
heap
page read and write
7F43000
heap
page read and write
2886000
trusted library allocation
page read and write
50A0000
direct allocation
page execute and read and write
1357000
heap
page read and write
BE4000
unkown
page execute and read and write
29EFD060000
heap
page read and write
1374000
heap
page read and write
43AD000
trusted library allocation
page read and write
1374000
heap
page read and write
3846000
heap
page read and write
19DB000
heap
page read and write
4911000
heap
page read and write
7F43000
heap
page read and write
EE0000
heap
page read and write
3C2E000
stack
page read and write
18B5000
heap
page read and write
D6E000
unkown
page execute and read and write
26E72205000
heap
page read and write
28E4000
trusted library allocation
page read and write
2835000
trusted library allocation
page read and write
1340000
heap
page read and write
30C0000
direct allocation
page read and write
7FB0000
trusted library allocation
page read and write
1155000
heap
page read and write
1564000
heap
page read and write
3E1E000
stack
page read and write
3AEE000
stack
page read and write
EA0000
heap
page read and write
7DF1000
heap
page read and write
8530000
trusted library allocation
page read and write
1F406DF0000
heap
page read and write
924000
heap
page read and write
4870000
direct allocation
page execute and read and write
1374000
heap
page read and write
4D01000
trusted library allocation
page read and write
2C8F000
stack
page read and write
9C3000
unkown
page execute and read and write
454E000
stack
page read and write
7FF848D4A000
trusted library allocation
page read and write
E05000
unkown
page execute and write copy
4B5000
unkown
page write copy
29EFCC59000
heap
page read and write
9875000
heap
page read and write
8390000
trusted library allocation
page execute and read and write
1B92000
heap
page read and write
4CF8000
trusted library allocation
page read and write
14EA6B1D000
heap
page read and write
1AC6000
heap
page read and write
1691000
heap
page read and write
7F17000
heap
page read and write
7FE0000
trusted library allocation
page read and write
1AAF000
heap
page read and write
43D9000
heap
page read and write
1374000
heap
page read and write
30C0000
direct allocation
page read and write
1374000
heap
page read and write
1E17AF5C000
heap
page read and write
3F66000
heap
page read and write
32BF000
stack
page read and write
506E000
stack
page read and write
1375000
heap
page read and write
3AEF000
stack
page read and write
2BD7000
heap
page read and write
F60000
heap
page read and write
7C74000
heap
page read and write
2B31000
trusted library allocation
page read and write
27BC000
stack
page read and write
D3C000
unkown
page readonly
10A4000
heap
page read and write
454000
heap
page read and write
1374000
heap
page read and write
7DD7000
heap
page read and write
755D000
stack
page read and write
382F000
stack
page read and write
5151000
trusted library allocation
page read and write
4830000
direct allocation
page execute and read and write
464F000
stack
page read and write
3FAF000
stack
page read and write
76B000
unkown
page execute and write copy
4E40000
direct allocation
page execute and read and write
3B1F000
stack
page read and write
7CBC000
heap
page read and write
1016000
heap
page read and write
1374000
heap
page read and write
5CE000
heap
page read and write
4EB1000
heap
page read and write
4C20000
trusted library allocation
page read and write
1A76000
heap
page read and write
19A4000
heap
page read and write
512B000
trusted library allocation
page read and write
797B000
heap
page read and write
F50000
heap
page read and write
7A35000
heap
page read and write
1800000
trusted library allocation
page read and write
4EF1000
heap
page read and write
796F000
heap
page read and write
7E01000
heap
page read and write
5CB000
heap
page read and write
1938000
heap
page read and write
E76000
unkown
page execute and write copy
3E70000
heap
page read and write
1849000
heap
page read and write
6960000
heap
page read and write
1A69000
heap
page read and write
1B36000
heap
page read and write
1049000
heap
page read and write
7F0A000
heap
page read and write
1374000
heap
page read and write
5820000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
19C0000
heap
page read and write
7A0F000
heap
page read and write
7A0E000
stack
page read and write
1BE8000
heap
page read and write
33FF000
stack
page read and write
4EF1000
heap
page read and write
3570000
heap
page read and write
5900000
trusted library allocation
page read and write
1374000
heap
page read and write
4F20000
direct allocation
page execute and read and write
2F6F000
stack
page read and write
25AF000
stack
page read and write
44AE000
stack
page read and write
7F9C000
heap
page read and write
3F4F000
heap
page read and write
7F14000
heap
page read and write
7A1C000
heap
page read and write
3E38000
heap
page read and write
7CBF000
heap
page read and write
48EE000
stack
page read and write
5120000
trusted library allocation
page read and write
4EF1000
heap
page read and write
3EEE000
stack
page read and write
7C86000
heap
page read and write
1374000
heap
page read and write
19E2000
heap
page read and write
1AF8000
heap
page read and write
1A3B000
heap
page read and write
AC3000
trusted library allocation
page execute and read and write
7F0A000
heap
page read and write
5190000
trusted library allocation
page read and write
5A5000
heap
page read and write
1258000
heap
page read and write
10AC000
heap
page read and write
4F3F000
direct allocation
page read and write
7E01000
heap
page read and write
950000
unkown
page execute and read and write
374F000
stack
page read and write
1374000
heap
page read and write
29AF000
trusted library allocation
page read and write
1374000
heap
page read and write
2863000
trusted library allocation
page read and write
79E6000
heap
page read and write
4DEE000
stack
page read and write
86E000
stack
page read and write
2A49000
trusted library allocation
page read and write
7CF0000
heap
page read and write
46EE000
stack
page read and write
811F000
heap
page read and write
4F50000
direct allocation
page execute and read and write
811C000
heap
page read and write
180D000
heap
page read and write
7EF1000
heap
page read and write
4EB1000
heap
page read and write
4A91000
heap
page read and write
36BE000
stack
page read and write
95F000
unkown
page execute and read and write
5460000
direct allocation
page execute and read and write
1284000
heap
page read and write
7CD0000
trusted library allocation
page read and write
2EFF000
stack
page read and write
1374000
heap
page read and write
7F2D000
heap
page read and write
7FF0000
trusted library allocation
page execute and read and write
3BEE000
stack
page read and write
4B6E000
stack
page read and write
3D6F000
stack
page read and write
5450000
direct allocation
page execute and read and write
4FF0000
direct allocation
page execute and read and write
4911000
heap
page read and write
7DF1000
heap
page read and write
F80000
direct allocation
page read and write
50F0000
direct allocation
page execute and read and write
4971000
heap
page read and write
49B0000
direct allocation
page execute and read and write
1687000
heap
page read and write
BBF000
stack
page read and write
795C000
heap
page read and write
813A000
heap
page read and write
454000
heap
page read and write
4C30000
heap
page read and write
1801000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
14EAB7C0000
trusted library allocation
page read and write
3F70000
heap
page read and write
7F39000
heap
page read and write
3E93000
heap
page read and write
1374000
heap
page read and write
53C0000
direct allocation
page execute and read and write
D3E000
unkown
page read and write
11F0000
direct allocation
page read and write
7A1A000
heap
page read and write
18DD000
heap
page read and write
E7E000
unkown
page execute and read and write
AFB000
trusted library allocation
page execute and read and write
1B87000
heap
page read and write
1374000
heap
page read and write
3734000
trusted library allocation
page read and write
34EE000
stack
page read and write
4911000
heap
page read and write
2B3E000
stack
page read and write
1374000
heap
page read and write
29EFCF68000
heap
page read and write
176A000
heap
page read and write
4063000
heap
page read and write
4C4A000
trusted library allocation
page read and write
8F9D000
stack
page read and write
1374000
heap
page read and write
178F000
heap
page read and write
30BE000
stack
page read and write
480E000
stack
page read and write
1374000
heap
page read and write
3F81000
heap
page read and write
12DF000
heap
page read and write
3DAE000
stack
page read and write
7EF2000
heap
page read and write
351F000
stack
page read and write
5131000
trusted library allocation
page read and write
12CD000
heap
page read and write
8620000
trusted library allocation
page read and write
510000
direct allocation
page read and write
18B4000
heap
page read and write
7FF848DA0000
trusted library allocation
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1940000
heap
page read and write
924000
heap
page read and write
BB000
stack
page read and write
7F17000
heap
page read and write
1374000
heap
page read and write
79A0000
remote allocation
page read and write
1B7E000
heap
page read and write
4B31000
heap
page read and write
2830000
trusted library allocation
page read and write
4F10000
direct allocation
page execute and read and write
1374000
heap
page read and write
3F31000
heap
page read and write
7F45000
heap
page read and write
E8B000
unkown
page execute and write copy
7FF848EFC000
trusted library allocation
page read and write
43A1000
heap
page read and write
5850000
trusted library allocation
page read and write
1374000
heap
page read and write
54D0000
direct allocation
page execute and read and write
4FD0000
direct allocation
page read and write
1374000
heap
page read and write
3A4E000
stack
page read and write
10D5000
heap
page read and write
2B7F000
trusted library allocation
page read and write
3F81000
heap
page read and write
1374000
heap
page read and write
4D60000
direct allocation
page read and write
1AFF000
heap
page read and write
1374000
heap
page read and write
7E01000
heap
page read and write
8430000
heap
page read and write
47DE000
stack
page read and write
454000
heap
page read and write
325F000
stack
page read and write
83F0000
heap
page read and write
402E000
heap
page read and write
CA0000
unkown
page readonly
7E01000
heap
page read and write
194E000
stack
page read and write
1374000
heap
page read and write
7A35000
heap
page read and write
1374000
heap
page read and write
7DDB000
heap
page read and write
5030000
direct allocation
page execute and read and write
7F39000
heap
page read and write
7F0A000
heap
page read and write
147F000
stack
page read and write
7C86000
heap
page read and write
E8D000
unkown
page execute and write copy
18D6000
heap
page read and write
7F43000
heap
page read and write
647E000
stack
page read and write
4A91000
heap
page read and write
7EF2000
heap
page read and write
10E4000
heap
page read and write
1028000
heap
page read and write
9E6000
heap
page read and write
811F000
heap
page read and write
16AE000
unkown
page read and write
1374000
heap
page read and write
402D000
heap
page read and write
3CCE000
stack
page read and write
7F30000
heap
page read and write
A34000
heap
page read and write
A34000
heap
page read and write
6A5E000
heap
page read and write
19F8000
heap
page read and write
130D000
heap
page read and write
376C000
trusted library allocation
page read and write
1815000
heap
page read and write
70000
unkown
page read and write
7DD6000
heap
page read and write
DB2000
unkown
page execute and read and write
813B000
heap
page read and write
1765000
heap
page read and write
9C8000
heap
page read and write
3780000
heap
page read and write
1374000
heap
page read and write
CA1000
unkown
page execute read
A34000
heap
page read and write
1374000
heap
page read and write
7A35000
heap
page read and write
1282000
heap
page read and write
3F50000
heap
page read and write
811C000
heap
page read and write
1242000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
396F000
stack
page read and write
37F4000
heap
page read and write
1E17ADA0000
heap
page read and write
96A000
unkown
page execute and write copy
1035000
heap
page read and write
7F85000
heap
page read and write
4A0E000
stack
page read and write
38DF000
stack
page read and write
516A000
trusted library allocation
page read and write
1020000
direct allocation
page read and write
CA1000
unkown
page execute read
4BB0000
trusted library allocation
page execute and read and write
18B4000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
7CAC000
heap
page read and write
957000
unkown
page execute and write copy
4EF0000
direct allocation
page execute and read and write
1014000
unkown
page execute and read and write
620E000
stack
page read and write
1F408AB0000
heap
page read and write
1374000
heap
page read and write
74E000
unkown
page execute and read and write
7D01000
heap
page read and write
192E000
heap
page read and write
1374000
heap
page read and write
260E000
stack
page read and write
7A23000
heap
page read and write
BA0000
heap
page read and write
14A3000
heap
page read and write
81CB000
stack
page read and write
1374000
heap
page read and write
1375000
heap
page read and write
4911000
heap
page read and write
1374000
heap
page read and write
A34000
heap
page read and write
1360000
heap
page read and write
169B000
heap
page read and write
7C92000
heap
page read and write
12F6000
heap
page read and write
8111000
heap
page read and write
3793000
trusted library allocation
page read and write
8EF000
unkown
page execute and write copy
EE4000
heap
page read and write
C7D000
unkown
page execute and write copy
7F2D000
heap
page read and write
7CBD000
heap
page read and write
1E17AF80000
trusted library allocation
page read and write
7FF848D90000
trusted library allocation
page read and write
1374000
heap
page read and write
7A1C000
heap
page read and write
D70000
heap
page read and write
8FE0000
heap
page read and write
7DDB000
heap
page read and write
4911000
heap
page read and write
7A35000
heap
page read and write
1502000
heap
page read and write
3EEB000
heap
page read and write
4B31000
heap
page read and write
7CBF000
heap
page read and write
B81000
unkown
page execute and write copy
1374000
heap
page read and write
4324000
trusted library allocation
page read and write
733E000
stack
page read and write
4E80000
direct allocation
page execute and read and write
29E90031000
trusted library allocation
page read and write
1350000
direct allocation
page read and write
7CD9000
heap
page read and write
4911000
heap
page read and write
10A4000
heap
page read and write
4E21000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
3C9E000
stack
page read and write
1374000
heap
page read and write
1375000
heap
page read and write
32A1000
trusted library allocation
page read and write
115F000
heap
page read and write
42DE000
stack
page read and write
29D2000
trusted library allocation
page read and write
7DE2000
heap
page read and write
4004000
heap
page read and write
4F60000
direct allocation
page execute and read and write
1A6C000
heap
page read and write
1374000
heap
page read and write
4EB1000
heap
page read and write
1967B5F0000
trusted library allocation
page read and write
1139000
heap
page read and write
D0F000
unkown
page read and write
8642000
heap
page read and write
1374000
heap
page read and write
106E000
heap
page read and write
7D4E000
heap
page read and write
1400000
direct allocation
page read and write
4EF1000
heap
page read and write
32CE000
stack
page read and write
1374000
heap
page read and write
4D0D000
trusted library allocation
page read and write
A34000
heap
page read and write
30C0000
direct allocation
page read and write
7CCE000
heap
page read and write
4A10000
direct allocation
page execute and read and write
1374000
heap
page read and write
3F94000
heap
page read and write
1374000
heap
page read and write
49D0000
direct allocation
page execute and read and write
7F39000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
4D90000
direct allocation
page read and write
29E8181C000
trusted library allocation
page read and write
38AE000
stack
page read and write
18A6000
heap
page read and write
C66000
unkown
page execute and read and write
382E000
stack
page read and write
1374000
heap
page read and write
4B8E000
stack
page read and write
3848000
trusted library allocation
page read and write
7DDB000
heap
page read and write
5020000
direct allocation
page execute and read and write
7F43000
heap
page read and write
4C32000
trusted library allocation
page read and write
8130000
heap
page read and write
1374000
heap
page read and write
372E000
stack
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
4F20000
direct allocation
page execute and read and write
1242000
heap
page read and write
795D000
heap
page read and write
3E31000
heap
page read and write
12AE000
heap
page read and write
1374000
heap
page read and write
633000
unkown
page execute and read and write
F2A000
stack
page read and write
466E000
stack
page read and write
9F8000
unkown
page execute and write copy
1967B5F0000
trusted library allocation
page read and write
1374000
heap
page read and write
7C74000
heap
page read and write
D4E000
stack
page read and write
1375000
heap
page read and write
28A7000
trusted library allocation
page read and write
1020000
direct allocation
page read and write
176C000
heap
page read and write
4B0000
heap
page read and write
5D2B000
trusted library allocation
page read and write
1374000
heap
page read and write
1F406E28000
heap
page read and write
15CE000
stack
page read and write
1400000
direct allocation
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
7A1A000
heap
page read and write
439A000
trusted library allocation
page read and write
E8D000
unkown
page execute and read and write
10E4000
heap
page read and write
1896000
heap
page read and write
10DE000
heap
page read and write
4A91000
heap
page read and write
4B0000
unkown
page execute and read and write
7FF848E50000
trusted library allocation
page read and write
7D60000
remote allocation
page read and write
77FE000
stack
page read and write
1F408973000
heap
page read and write
692717E000
stack
page read and write
3CBF000
stack
page read and write
2681000
trusted library allocation
page read and write
30A0000
heap
page read and write
1410000
heap
page read and write
37BF000
stack
page read and write
126D000
heap
page read and write
4DD3000
direct allocation
page read and write
1374000
heap
page read and write
63E000
unkown
page execute and read and write
8111000
heap
page read and write
52C0000
direct allocation
page read and write
43A1000
heap
page read and write
289E000
trusted library allocation
page read and write
121E000
stack
page read and write
8D2E000
heap
page read and write
7D4E000
heap
page read and write
7DF1000
heap
page read and write
5B5000
heap
page read and write
7EC000
stack
page read and write
7F74000
heap
page read and write
EE4000
heap
page read and write
13F0000
heap
page read and write
7CBF000
heap
page read and write
2B08000
trusted library allocation
page read and write
5020000
direct allocation
page execute and read and write
69271FE000
stack
page read and write
1374000
heap
page read and write
1740000
direct allocation
page read and write
924000
heap
page read and write
7CB3000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
5160000
direct allocation
page execute and read and write
3D70000
heap
page read and write
AB0000
trusted library allocation
page read and write
405C000
heap
page read and write
50A0000
direct allocation
page execute and read and write
190A000
heap
page read and write
336F000
stack
page read and write
1C2A000
heap
page read and write
A0B000
unkown
page execute and write copy
2807000
trusted library allocation
page read and write
10A4000
heap
page read and write
3F81000
heap
page read and write
1374000
heap
page read and write
5164000
trusted library allocation
page read and write
796B000
heap
page read and write
64C0000
heap
page read and write
811C000
heap
page read and write
1374000
heap
page read and write
F71000
heap
page read and write
3F8A000
heap
page read and write
7E01000
heap
page read and write
53C0000
direct allocation
page execute and read and write
1374000
heap
page read and write
16CC000
heap
page read and write
454000
heap
page read and write
8310000
trusted library allocation
page read and write
1375000
heap
page read and write
7CB1000
heap
page read and write
E40000
heap
page read and write
1044000
heap
page read and write
D9F000
unkown
page execute and read and write
8520000
trusted library allocation
page read and write
3F6F000
heap
page read and write
175F000
stack
page read and write
1044000
heap
page read and write
44EF000
stack
page read and write
F92000
heap
page read and write
3883000
trusted library allocation
page read and write
7BBE000
stack
page read and write
5440000
direct allocation
page execute and read and write
7964000
heap
page read and write
1F406E60000
heap
page read and write
242F000
stack
page read and write
29E81C20000
trusted library allocation
page read and write
1564000
heap
page read and write
1374000
heap
page read and write
7E01000
heap
page read and write
1720000
heap
page read and write
2B3C000
trusted library allocation
page read and write
1A3D000
heap
page read and write
15DB000
stack
page read and write
776000
unkown
page execute and read and write
43CF000
stack
page read and write
381A000
trusted library allocation
page read and write
43A1000
heap
page read and write
1374000
heap
page read and write
7CD0000
heap
page read and write
1374000
heap
page read and write
4EF0000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1375000
heap
page read and write
4034000
heap
page read and write
2BED000
trusted library allocation
page read and write
2BC2000
trusted library allocation
page read and write
2B38000
trusted library allocation
page read and write
5D36000
trusted library allocation
page read and write
19C0000
heap
page read and write
4A10000
trusted library allocation
page read and write
1374000
heap
page read and write
7DF1000
heap
page read and write
1A56000
heap
page read and write
556000
unkown
page execute and read and write
1A2E000
heap
page read and write
1120000
heap
page read and write
1374000
heap
page read and write
7C86000
heap
page read and write
2CBE000
stack
page read and write
77B000
stack
page read and write
E76000
unkown
page execute and write copy
4900000
direct allocation
page execute and read and write
138A000
heap
page read and write
7CAC000
heap
page read and write
1374000
heap
page read and write
11CF000
heap
page read and write
7A35000
heap
page read and write
960000
unkown
page execute and write copy
674000
unkown
page execute and write copy
1374000
heap
page read and write
2B3F000
stack
page read and write
17A9000
heap
page read and write
10E4000
heap
page read and write
433E000
stack
page read and write
5043000
direct allocation
page read and write
53C0000
direct allocation
page execute and read and write
17DC000
heap
page read and write
26E71EA0000
heap
page read and write
1216000
heap
page read and write
4911000
heap
page read and write
7EF2000
heap
page read and write
4C20000
heap
page read and write
18E6000
heap
page read and write
454000
heap
page read and write
1564000
heap
page read and write
102B000
heap
page read and write
5470000
direct allocation
page execute and read and write
B30000
trusted library allocation
page execute and read and write
1374000
heap
page read and write
49B0000
direct allocation
page execute and read and write
8121000
heap
page read and write
7F5B000
heap
page read and write
7DF1000
heap
page read and write
1374000
heap
page read and write
7C9B000
heap
page read and write
1542000
heap
page read and write
1044000
heap
page read and write
797C000
heap
page read and write
1B5B000
heap
page read and write
7E01000
heap
page read and write
2FAF000
stack
page read and write
3615000
heap
page read and write
4EF1000
heap
page read and write
2A7F000
trusted library allocation
page read and write
13D7000
heap
page read and write
4DAE000
stack
page read and write
ACD000
trusted library allocation
page execute and read and write
117F000
heap
page read and write
1374000
heap
page read and write
4B31000
heap
page read and write
4451000
heap
page read and write
189C000
heap
page read and write
1375000
heap
page read and write
32FE000
stack
page read and write
19A0000
direct allocation
page read and write
37FB000
heap
page read and write
1564000
heap
page read and write
362E000
stack
page read and write
96C000
unkown
page execute and read and write
5921000
trusted library allocation
page read and write
1967B3F0000
trusted library allocation
page read and write
1374000
heap
page read and write
1849000
heap
page read and write
5EF0000
trusted library allocation
page read and write
1374000
heap
page read and write
EE4000
heap
page read and write
1205000
heap
page read and write
7F39000
heap
page read and write
4EB1000
heap
page read and write
3010000
heap
page read and write
3ED1000
heap
page read and write
7DF6000
heap
page read and write
382E000
heap
page read and write
3A1F000
stack
page read and write
1520000
heap
page read and write
1205000
heap
page read and write
AA0000
unkown
page read and write
3DE1000
heap
page read and write
4C6F000
stack
page read and write
1374000
heap
page read and write
8410000
trusted library allocation
page read and write
4B31000
heap
page read and write
29EFCE40000
heap
page read and write
3B4E000
stack
page read and write
1093000
heap
page read and write
43A1000
heap
page read and write
3150000
heap
page read and write
54F0000
direct allocation
page execute and read and write
1374000
heap
page read and write
2410000
heap
page read and write
18E5000
heap
page read and write
4A81000
heap
page read and write
2A56000
trusted library allocation
page read and write
5008000
stack
page read and write
7F39000
heap
page read and write
29EFD070000
trusted library allocation
page read and write
4911000
heap
page read and write
1849000
heap
page read and write
43B2000
trusted library allocation
page read and write
1374000
heap
page read and write
95F000
unkown
page execute and read and write
1044000
heap
page read and write
3160000
heap
page read and write
54BF000
direct allocation
page read and write
50E0000
direct allocation
page execute and read and write
91F000
unkown
page execute and read and write
2FEE000
stack
page read and write
7D0D000
heap
page read and write
18B5000
heap
page read and write
7F17000
heap
page read and write
105E000
heap
page read and write
1374000
heap
page read and write
7A35000
heap
page read and write
1375000
heap
page read and write
D6C000
unkown
page read and write
1A1C000
heap
page read and write
5142000
trusted library allocation
page read and write
17A7000
heap
page read and write
4A81000
heap
page read and write
1374000
heap
page read and write
75FE000
stack
page read and write
1374000
heap
page read and write
1AA7000
heap
page read and write
326E000
stack
page read and write
1374000
heap
page read and write
811E000
heap
page read and write
7D30000
remote allocation
page read and write
8111000
heap
page read and write
6A18000
heap
page read and write
1021000
unkown
page execute and read and write
400F000
stack
page read and write
1ACE000
heap
page read and write
4A0F000
stack
page read and write
1564000
heap
page read and write
1374000
heap
page read and write
7A0F000
heap
page read and write
4911000
heap
page read and write
26E71EB7000
heap
page read and write
385000
unkown
page execute and write copy
5918000
trusted library allocation
page read and write
11BC000
heap
page read and write
A902000
heap
page read and write
1A19000
heap
page read and write
1854000
heap
page read and write
246E000
stack
page read and write
1374000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
4911000
heap
page read and write
79C3000
heap
page read and write
EBF000
unkown
page read and write
1073000
heap
page read and write
1005000
heap
page read and write
5F80000
trusted library allocation
page read and write
665000
unkown
page execute and read and write
49C0000
direct allocation
page execute and read and write
1374000
heap
page read and write
4FD0000
direct allocation
page read and write
30EE000
stack
page read and write
1564000
heap
page read and write
3E50000
heap
page read and write
83A0000
trusted library allocation
page read and write
181A000
heap
page read and write
7A1E000
heap
page read and write
1BAD000
heap
page read and write
CA0000
unkown
page readonly
12C2000
heap
page read and write
811F000
heap
page read and write
1044000
heap
page read and write
1139000
heap
page read and write
53B0000
direct allocation
page execute and read and write
1044000
heap
page read and write
53A0000
direct allocation
page execute and read and write
4971000
heap
page read and write
4451000
heap
page read and write
11EA000
heap
page read and write
2F6E000
stack
page read and write
3E43000
heap
page read and write
1823000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
4A91000
heap
page read and write
2B7E000
stack
page read and write
4911000
heap
page read and write
746000
unkown
page execute and read and write
9F6000
unkown
page execute and write copy
7D30000
remote allocation
page read and write
6BC8000
heap
page read and write
180B000
heap
page read and write
3580000
heap
page read and write
3FBE000
heap
page read and write
A34000
heap
page read and write
7F2D000
heap
page read and write
1854000
heap
page read and write
43A1000
heap
page read and write
1B36000
heap
page read and write
454000
heap
page read and write
3F29000
heap
page read and write
79C3000
heap
page read and write
4A81000
heap
page read and write
8EF000
unkown
page execute and write copy
2620000
trusted library allocation
page read and write
1375000
heap
page read and write
872E000
stack
page read and write
7DB7000
heap
page read and write
17B0000
heap
page read and write
D82000
unkown
page execute and write copy
984000
heap
page read and write
7CB7000
heap
page read and write
454000
heap
page read and write
8F8000
unkown
page execute and write copy
29E81B5B000
trusted library allocation
page read and write
372E000
stack
page read and write
4A81000
heap
page read and write
4911000
heap
page read and write
1374000
heap
page read and write
1350000
direct allocation
page read and write
27EF000
stack
page read and write
1073000
heap
page read and write
476F000
stack
page read and write
EF5000
heap
page read and write
7FE0000
trusted library allocation
page read and write
1564000
heap
page read and write
4451000
heap
page read and write
3C2F000
stack
page read and write
328E000
stack
page read and write
40AF000
stack
page read and write
4DF0000
direct allocation
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
797F000
stack
page read and write
5D60000
trusted library allocation
page read and write
5DB0000
trusted library allocation
page read and write
EE4000
heap
page read and write
7E01000
heap
page read and write
1375000
heap
page read and write
6CF0000
heap
page read and write
19AA000
heap
page read and write
1374000
heap
page read and write
1564000
heap
page read and write
2AA9000
trusted library allocation
page read and write
4F90000
direct allocation
page execute and read and write
2630000
heap
page execute and read and write
1374000
heap
page read and write
7F43000
heap
page read and write
EE4000
heap
page read and write
7A2C000
heap
page read and write
815000
unkown
page execute and write copy
1374000
heap
page read and write
4A91000
heap
page read and write
1E17CC10000
trusted library allocation
page read and write
2881000
trusted library allocation
page read and write
1C15000
heap
page read and write
1374000
heap
page read and write
37DB000
heap
page read and write
4EB1000
heap
page read and write
454000
heap
page read and write
2790000
trusted library allocation
page read and write
168F000
heap
page read and write
7A1A000
heap
page read and write
3CFE000
stack
page read and write
3675000
heap
page read and write
1772000
heap
page read and write
108B000
heap
page read and write
1E17AE8F000
heap
page read and write
1374000
heap
page read and write
5420000
direct allocation
page execute and read and write
EE4000
heap
page read and write
28A2000
trusted library allocation
page read and write
1374000
heap
page read and write
813A000
heap
page read and write
1BF3000
heap
page read and write
18B5000
heap
page read and write
5FE0000
trusted library allocation
page execute and read and write
7DF1000
heap
page read and write
1044000
heap
page read and write
7CBA000
heap
page read and write
328F000
stack
page read and write
7DD1000
heap
page read and write
1584000
heap
page read and write
1044000
heap
page read and write
1374000
heap
page read and write
64BE000
stack
page read and write
19F7000
heap
page read and write
4B31000
heap
page read and write
1374000
heap
page read and write
4A91000
heap
page read and write
7E01000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
951000
unkown
page execute and write copy
7DDD000
heap
page read and write
4C39000
trusted library allocation
page read and write
12E2000
heap
page read and write
1375000
heap
page read and write
14EAB8E0000
trusted library allocation
page read and write
6BED000
heap
page read and write
26E71EA8000
heap
page read and write
12CC000
heap
page read and write
F53B17E000
stack
page read and write
17F6000
heap
page read and write
1480000
direct allocation
page read and write
7A1A000
heap
page read and write
119A000
heap
page read and write
14EAB782000
trusted library allocation
page read and write
4971000
heap
page read and write
924000
heap
page read and write
1374000
heap
page read and write
44AF000
stack
page read and write
53CD000
stack
page read and write
29EFC7B5000
heap
page read and write
1C2E000
heap
page read and write
4911000
heap
page read and write
1374000
heap
page read and write
7DCB000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
7A35000
heap
page read and write
3D5E000
stack
page read and write
1545000
heap
page read and write
1139000
heap
page read and write
17A9000
heap
page read and write
83A0000
trusted library allocation
page read and write
4EB1000
heap
page read and write
1374000
heap
page read and write
158E000
stack
page read and write
79EC000
heap
page read and write
7CC8000
heap
page read and write
C7D000
unkown
page execute and write copy
1375000
heap
page read and write
10E0000
heap
page read and write
1374000
heap
page read and write
47CF000
stack
page read and write
2E6F000
stack
page read and write
379E000
stack
page read and write
1374000
heap
page read and write
8148000
heap
page read and write
1375000
heap
page read and write
7CEA000
heap
page read and write
7BC0000
heap
page read and write
7CD4000
heap
page read and write
9160000
heap
page read and write
7A40000
trusted library allocation
page read and write
7AFE000
stack
page read and write
6A0B000
heap
page read and write
2AAB000
trusted library allocation
page read and write
4A91000
heap
page read and write
E7F000
unkown
page execute and write copy
1374000
heap
page read and write
7CAC000
heap
page read and write
9847000
heap
page read and write
510000
direct allocation
page read and write
1374000
heap
page read and write
4A91000
heap
page read and write
4A81000
heap
page read and write
4339000
trusted library allocation
page read and write
342F000
stack
page read and write
36D8000
heap
page read and write
811B000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
7ABD000
stack
page read and write
14EAB787000
trusted library allocation
page read and write
7F39000
heap
page read and write
10D0000
heap
page read and write
1080000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
7D60000
remote allocation
page read and write
1967B320000
heap
page read and write
4B31000
heap
page read and write
932000
unkown
page execute and read and write
1374000
heap
page read and write
10E4000
heap
page read and write
7CE5000
heap
page read and write
796E000
heap
page read and write
4025000
heap
page read and write
2DC0000
heap
page read and write
1374000
heap
page read and write
18EC000
heap
page read and write
329E000
stack
page read and write
4930000
direct allocation
page execute and read and write
136D000
heap
page read and write
3502000
trusted library allocation
page read and write
E43000
unkown
page execute and read and write
7FF848E90000
trusted library allocation
page read and write
1931000
heap
page read and write
8132000
heap
page read and write
5010000
direct allocation
page execute and read and write
D62000
unkown
page readonly
2BDF000
trusted library allocation
page read and write
7A20000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
179F000
heap
page read and write
4980000
heap
page read and write
1374000
heap
page read and write
DE2000
unkown
page execute and read and write
1374000
heap
page read and write
1375000
heap
page read and write
1374000
heap
page read and write
53C0000
direct allocation
page execute and read and write
190A000
heap
page read and write
372F000
stack
page read and write
43AF000
trusted library allocation
page read and write
3661000
heap
page read and write
5DB0000
heap
page read and write
3F02000
heap
page read and write
30C0000
direct allocation
page read and write
10A4000
heap
page read and write
7F39000
heap
page read and write
3581000
heap
page read and write
28AB000
trusted library allocation
page read and write
4B31000
heap
page read and write
1374000
heap
page read and write
79FD000
heap
page read and write
8CDA000
heap
page read and write
3B8E000
stack
page read and write
29EFAC3F000
heap
page read and write
8110000
heap
page read and write
26D7000
trusted library allocation
page read and write
1A29000
heap
page read and write
1374000
heap
page read and write
7CFE000
heap
page read and write
3EAF000
stack
page read and write
1374000
heap
page read and write
485D000
stack
page read and write
194C000
heap
page read and write
49E0000
direct allocation
page execute and read and write
454000
heap
page read and write
1375000
heap
page read and write
4E40000
direct allocation
page execute and read and write
1374000
heap
page read and write
101E000
heap
page read and write
184B000
heap
page read and write
4440000
direct allocation
page read and write
1374000
heap
page read and write
7CD7000
heap
page read and write
43F7000
trusted library allocation
page read and write
1020000
direct allocation
page read and write
285E000
trusted library allocation
page read and write
BE9000
unkown
page write copy
402D000
heap
page read and write
230F34E000
stack
page read and write
D6F000
unkown
page execute and read and write
1AC5000
heap
page read and write
7DF1000
heap
page read and write
11A9000
heap
page read and write
776000
unkown
page execute and read and write
1375000
heap
page read and write
AA1000
unkown
page execute and write copy
1380000
heap
page read and write
19D7000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
4EB1000
heap
page read and write
A34000
heap
page read and write
795D000
heap
page read and write
36C5000
heap
page read and write
116E000
heap
page read and write
1375000
heap
page read and write
3F8C000
heap
page read and write
1375000
heap
page read and write
1375000
heap
page read and write
29EFAC8F000
heap
page read and write
45AF000
stack
page read and write
435B000
trusted library allocation
page read and write
4F20000
direct allocation
page execute and read and write
4EB0000
direct allocation
page execute and read and write
795D000
heap
page read and write
322F000
stack
page read and write
568000
heap
page read and write
32BF000
stack
page read and write
496F000
stack
page read and write
4911000
heap
page read and write
43BC000
trusted library allocation
page read and write
29E80228000
trusted library allocation
page read and write
1374000
heap
page read and write
7D4E000
heap
page read and write
79E6000
heap
page read and write
66BF000
stack
page read and write
10E4000
heap
page read and write
5440000
direct allocation
page execute and read and write
1E17CC10000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
4A91000
heap
page read and write
4F80000
direct allocation
page execute and read and write
1044000
heap
page read and write
1374000
heap
page read and write
6A4E000
heap
page read and write
459E000
stack
page read and write
700000
unkown
page read and write
BF1000
unkown
page write copy
1258000
heap
page read and write
3314000
trusted library allocation
page read and write
5000000
direct allocation
page execute and read and write
F0E000
stack
page read and write
4EF0000
direct allocation
page execute and read and write
40BB000
heap
page read and write
1F40897A000
heap
page read and write
7C73000
heap
page read and write
29E7000
trusted library allocation
page read and write
1374000
heap
page read and write
412E000
stack
page read and write
393E000
stack
page read and write
7A1E000
heap
page read and write
6AC5000
heap
page read and write
1905000
heap
page read and write
7964000
heap
page read and write
357E000
stack
page read and write
773E000
stack
page read and write
1374000
heap
page read and write
1019000
heap
page read and write
3EEB000
heap
page read and write
5846000
trusted library allocation
page read and write
17C3000
heap
page read and write
7DD4000
heap
page read and write
9F6000
unkown
page execute and write copy
7F43000
heap
page read and write
2908000
trusted library allocation
page read and write
1374000
heap
page read and write
37FB000
heap
page read and write
7CD0000
trusted library allocation
page read and write
7051000
heap
page read and write
1967D010000
heap
page read and write
266D000
trusted library allocation
page read and write
38FF000
stack
page read and write
5360000
direct allocation
page execute and read and write
1600000
direct allocation
page read and write
408B000
heap
page read and write
79F9000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
376E000
heap
page read and write
1AA8000
heap
page read and write
1374000
heap
page read and write
29E814CF000
trusted library allocation
page read and write
2F1A000
heap
page read and write
4B31000
heap
page read and write
1374000
heap
page read and write
3D71000
heap
page read and write
1374000
heap
page read and write
719E000
stack
page read and write
3DCF000
stack
page read and write
1252000
heap
page read and write
1374000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
1564000
heap
page read and write
7C57000
heap
page read and write
4971000
heap
page read and write
1374000
heap
page read and write
5430000
direct allocation
page execute and read and write
783F000
stack
page read and write
7A1C000
heap
page read and write
7F39000
heap
page read and write
812E000
heap
page read and write
4F00000
heap
page read and write
43A1000
heap
page read and write
45EE000
stack
page read and write
26D1000
trusted library allocation
page read and write
17D6000
heap
page read and write
29AB000
trusted library allocation
page read and write
2A88000
trusted library allocation
page read and write
1400000
direct allocation
page read and write
1521000
heap
page read and write
5450000
direct allocation
page execute and read and write
9FF000
unkown
page execute and write copy
1374000
heap
page read and write
7DCB000
heap
page read and write
1374000
heap
page read and write
7DCB000
heap
page read and write
106E000
heap
page read and write
4911000
heap
page read and write
1374000
heap
page read and write
56BC000
stack
page read and write
1375000
heap
page read and write
924000
heap
page read and write
7F2D000
heap
page read and write
7F17000
heap
page read and write
12FE000
stack
page read and write
1830000
trusted library allocation
page execute and read and write
10E4000
heap
page read and write
1755000
heap
page read and write
6C32000
heap
page read and write
1F406E34000
heap
page read and write
1374000
heap
page read and write
31EF000
stack
page read and write
16BE000
heap
page read and write
371000
unkown
page execute and write copy
34C2000
trusted library allocation
page read and write
799D000
stack
page read and write
7FF848DD0000
trusted library allocation
page read and write
924000
heap
page read and write
47EF000
stack
page read and write
7A24000
heap
page read and write
1BAD000
heap
page read and write
4A80000
direct allocation
page read and write
304F000
stack
page read and write
1374000
heap
page read and write
4E21000
heap
page read and write
454000
heap
page read and write
1374000
heap
page read and write
198B000
heap
page read and write
98B000
unkown
page execute and read and write
7F14000
heap
page read and write
797E000
stack
page read and write
7F39000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
5870000
trusted library allocation
page read and write
1374000
heap
page read and write
BE0000
unkown
page execute and read and write
37A4000
heap
page read and write
4F60000
direct allocation
page execute and read and write
1374000
heap
page read and write
A34000
heap
page read and write
920000
unkown
page execute and write copy
1374000
heap
page read and write
FCA000
heap
page read and write
30D7000
heap
page read and write
10C3000
heap
page read and write
1748000
heap
page read and write
7F6D000
heap
page read and write
A34000
heap
page read and write
465F000
stack
page read and write
4A81000
heap
page read and write
4461000
heap
page read and write
4911000
heap
page read and write
7DF4F98E0000
trusted library allocation
page execute and read and write
8550000
heap
page read and write
553E000
stack
page read and write
4A91000
heap
page read and write
35EE000
stack
page read and write
4EF1000
heap
page read and write
386F000
stack
page read and write
17B2000
heap
page read and write
3F7E000
stack
page read and write
10E4000
heap
page read and write
188E000
heap
page read and write
1374000
heap
page read and write
5E00000
heap
page read and write
9851000
heap
page read and write
1218000
heap
page read and write
4F20000
direct allocation
page read and write
1374000
heap
page read and write
7A1E000
heap
page read and write
35FA000
trusted library allocation
page read and write
3BC5000
heap
page read and write
180D000
heap
page read and write
7E01000
heap
page read and write
13F7000
heap
page read and write
1374000
heap
page read and write
5160000
heap
page read and write
4EB1000
heap
page read and write
1044000
heap
page read and write
2B03000
trusted library allocation
page read and write
443F000
stack
page read and write
4911000
heap
page read and write
7C91000
heap
page read and write
D74000
unkown
page readonly
D79000
unkown
page execute and read and write
7E01000
heap
page read and write
422F000
stack
page read and write
7F17000
heap
page read and write
813B000
heap
page read and write
1374000
heap
page read and write
7CFD000
heap
page read and write
1073000
heap
page read and write
4A91000
heap
page read and write
1374000
heap
page read and write
510000
direct allocation
page read and write
28D0000
trusted library allocation
page read and write
7D36000
heap
page read and write
454000
heap
page read and write
1374000
heap
page read and write
518D000
trusted library allocation
page read and write
388F000
stack
page read and write
3662000
heap
page read and write
1374000
heap
page read and write
2CBE000
stack
page read and write
7963000
heap
page read and write
5150000
direct allocation
page execute and read and write
4EF1000
heap
page read and write
5160000
direct allocation
page execute and read and write
43A1000
heap
page read and write
5040000
direct allocation
page execute and read and write
18E6000
heap
page read and write
47CE000
stack
page read and write
7F54000
heap
page read and write
79E6000
heap
page read and write
3E47000
heap
page read and write
1374000
heap
page read and write
7A35000
heap
page read and write
1313000
heap
page read and write
7C3E000
stack
page read and write
8D3000
unkown
page execute and write copy
4911000
heap
page read and write
10A0000
heap
page read and write
75D000
unkown
page execute and write copy
4F30000
direct allocation
page execute and read and write
454000
heap
page read and write
7A1E000
heap
page read and write
7CE5000
heap
page read and write
7CCB000
heap
page read and write
100E000
heap
page read and write
29DA000
trusted library allocation
page read and write
FC2000
heap
page read and write
9010000
trusted library allocation
page read and write
7CFB000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
4F20000
direct allocation
page execute and read and write
516C000
stack
page read and write
69F9000
heap
page read and write
68CF000
stack
page read and write
4911000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
EE4000
heap
page read and write
29EFAB90000
heap
page read and write
5490000
direct allocation
page execute and read and write
5187000
trusted library allocation
page read and write
181B000
heap
page read and write
79BD000
heap
page read and write
18D6000
heap
page read and write
1020000
direct allocation
page read and write
5EA000
stack
page read and write
1374000
heap
page read and write
1A77000
heap
page read and write
1740000
direct allocation
page read and write
1374000
heap
page read and write
A34000
heap
page read and write
1374000
heap
page read and write
10A4000
heap
page read and write
1375000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
431D000
trusted library allocation
page read and write
1B38000
heap
page read and write
68F0000
heap
page read and write
7DF1000
heap
page read and write
DD7000
unkown
page execute and write copy
4970000
heap
page read and write
42CB000
trusted library allocation
page read and write
8C95000
heap
page read and write
3FB7000
heap
page read and write
1374000
heap
page read and write
A34000
heap
page read and write
C9A000
stack
page read and write
7CAC000
heap
page read and write
510000
direct allocation
page read and write
59DC000
trusted library allocation
page read and write
1862000
heap
page read and write
1375000
heap
page read and write
7C74000
heap
page read and write
1374000
heap
page read and write
7A40000
trusted library allocation
page read and write
795C000
heap
page read and write
1374000
heap
page read and write
1B02000
heap
page read and write
F53B2F9000
stack
page read and write
1958000
heap
page read and write
18E9000
heap
page read and write
8CCB000
heap
page read and write
1374000
heap
page read and write
1490000
heap
page read and write
7EF3000
heap
page read and write
1374000
heap
page read and write
7F2D000
heap
page read and write
A34000
heap
page read and write
1374000
heap
page read and write
8147000
heap
page read and write
5360000
direct allocation
page execute and read and write
1374000
heap
page read and write
454000
heap
page read and write
1374000
heap
page read and write
189F000
heap
page read and write
F2E000
heap
page read and write
139E000
stack
page read and write
19D3000
heap
page read and write
2AFA000
trusted library allocation
page read and write
1828000
heap
page read and write
AD0000
trusted library allocation
page read and write
51C0000
direct allocation
page execute and read and write
1374000
heap
page read and write
7F45000
heap
page read and write
371E000
heap
page read and write
4F20000
heap
page read and write
4B31000
heap
page read and write
FD7000
heap
page read and write
811C000
heap
page read and write
1374000
heap
page read and write
3D79000
heap
page read and write
4451000
heap
page read and write
3CEF000
heap
page read and write
B8E000
stack
page read and write
5EAE000
stack
page read and write
924000
heap
page read and write
A0B000
unkown
page execute and write copy
3E6E000
heap
page read and write
8132000
heap
page read and write
4F60000
direct allocation
page execute and read and write
C7E000
unkown
page execute and write copy
7F39000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
10E4000
heap
page read and write
1374000
heap
page read and write
3798000
heap
page read and write
4911000
heap
page read and write
37D7000
heap
page read and write
4880000
direct allocation
page execute and read and write
791F000
stack
page read and write
7E01000
heap
page read and write
14FE000
stack
page read and write
66CF000
stack
page read and write
1297000
heap
page read and write
5A10000
trusted library allocation
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
4EF1000
heap
page read and write
29E902F3000
trusted library allocation
page read and write
1BAD000
heap
page read and write
1370000
heap
page read and write
7CBA000
heap
page read and write
7CC2000
heap
page read and write
7CCB000
heap
page read and write
1AE8000
heap
page read and write
83A0000
trusted library allocation
page read and write
F2E000
stack
page read and write
28DE000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
A34000
heap
page read and write
10C7000
heap
page read and write
9E2000
unkown
page execute and read and write
1374000
heap
page read and write
123A000
heap
page read and write
198B000
stack
page read and write
1374000
heap
page read and write
407F000
heap
page read and write
4093000
heap
page read and write
3F6F000
heap
page read and write
1374000
heap
page read and write
FEA000
heap
page read and write
1AA7000
heap
page read and write
138E000
heap
page read and write
796E000
heap
page read and write
7A20000
heap
page read and write
1296000
heap
page read and write
705E000
heap
page read and write
7F0A000
heap
page read and write
3671000
trusted library allocation
page read and write
198D000
heap
page read and write
8420000
trusted library allocation
page execute and read and write
1374000
heap
page read and write
7A35000
heap
page read and write
1B34000
heap
page read and write
7FF848C76000
trusted library allocation
page execute and read and write
29C2000
trusted library allocation
page read and write
7FF848DC0000
trusted library allocation
page read and write
5060000
direct allocation
page execute and read and write
1564000
heap
page read and write
4EF1000
heap
page read and write
1374000
heap
page read and write
156F000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
367C000
heap
page read and write
193A000
heap
page read and write
7DD0000
heap
page read and write
17DD000
trusted library allocation
page execute and read and write
367E000
heap
page read and write
1375000
heap
page read and write
7DF1000
heap
page read and write
980000
unkown
page execute and read and write
7FE0000
trusted library allocation
page read and write
891000
unkown
page execute and write copy
1374000
heap
page read and write
41FE000
stack
page read and write
289A000
trusted library allocation
page read and write
1374000
heap
page read and write
1151000
heap
page read and write
365E000
stack
page read and write
8390000
trusted library allocation
page read and write
45BE000
stack
page read and write
3B5F000
stack
page read and write
7CD6000
heap
page read and write
14F2000
heap
page read and write
11C5000
heap
page read and write
128C000
heap
page read and write
AA0000
unkown
page readonly
8F1000
unkown
page execute and read and write
1A28000
heap
page read and write
7F0A000
heap
page read and write
674E000
stack
page read and write
37DE000
stack
page read and write
4930000
direct allocation
page execute and read and write
1374000
heap
page read and write
1E17B105000
heap
page read and write
1E17AF34000
heap
page read and write
1374000
heap
page read and write
3593000
heap
page read and write
14EAB780000
trusted library allocation
page read and write
A0B000
unkown
page execute and write copy
4B51000
heap
page read and write
18E6000
heap
page read and write
5160000
direct allocation
page execute and read and write
1938000
heap
page read and write
1374000
heap
page read and write
310F000
stack
page read and write
1BDF000
heap
page read and write
1967B4FB000
heap
page read and write
4B31000
heap
page read and write
4C5000
heap
page read and write
8FCD000
stack
page read and write
7F39000
heap
page read and write
1B8E000
heap
page read and write
5050000
direct allocation
page execute and read and write
401A000
heap
page read and write
3DC7000
heap
page read and write
1A76000
heap
page read and write
AA0000
unkown
page readonly
8131000
heap
page read and write
50B0000
direct allocation
page execute and read and write
58A0000
trusted library allocation
page execute and read and write
4EF1000
heap
page read and write
EE4000
heap
page read and write
1AB0000
heap
page read and write
4911000
heap
page read and write
1375000
heap
page read and write
3BD1000
heap
page read and write
79FD000
heap
page read and write
7CC7000
heap
page read and write
17E0000
trusted library allocation
page read and write
1374000
heap
page read and write
384000
unkown
page execute and write copy
7F39000
heap
page read and write
9E7000
unkown
page execute and write copy
1374000
heap
page read and write
1480000
direct allocation
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
546E000
stack
page read and write
1374000
heap
page read and write
3CEF000
stack
page read and write
1264000
heap
page read and write
123B000
heap
page read and write
7CA9000
heap
page read and write
178B000
heap
page read and write
F53AEFE000
unkown
page read and write
11EE000
stack
page read and write
5C0000
heap
page read and write
1374000
heap
page read and write
1258000
heap
page read and write
1128000
heap
page read and write
7ED000
stack
page read and write
1374000
heap
page read and write
4F40000
direct allocation
page execute and read and write
4FF0000
trusted library allocation
page read and write
3E3E000
stack
page read and write
1074000
heap
page read and write
121F000
heap
page read and write
A3248FF000
stack
page read and write
1BC6000
heap
page read and write
559E000
stack
page read and write
7FF848E40000
trusted library allocation
page read and write
1374000
heap
page read and write
7A1A000
heap
page read and write
123A000
heap
page read and write
96C000
unkown
page execute and read and write
1374000
heap
page read and write
18E5000
heap
page read and write
44A0000
direct allocation
page read and write
91D000
unkown
page execute and write copy
1374000
heap
page read and write
1374000
heap
page read and write
4911000
heap
page read and write
3F1E000
stack
page read and write
420000
heap
page read and write
14EAB783000
trusted library allocation
page read and write
1375000
heap
page read and write
10D0000
heap
page read and write
4E20000
heap
page read and write
4971000
heap
page read and write
1374000
heap
page read and write
1375000
heap
page read and write
10E4000
heap
page read and write
4911000
heap
page read and write
414F000
stack
page read and write
BDB000
stack
page read and write
1374000
heap
page read and write
27D4000
trusted library allocation
page read and write
2DBF000
stack
page read and write
8ECC000
stack
page read and write
7F2D000
heap
page read and write
3741000
heap
page read and write
1374000
heap
page read and write
7EF2000
heap
page read and write
454000
heap
page read and write
9000000
trusted library allocation
page execute and read and write
19C7000
heap
page read and write
643E000
stack
page read and write
7F39000
heap
page read and write
4CDF000
stack
page read and write
7DCB000
heap
page read and write
EE4000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
29EFCB77000
heap
page execute and read and write
4810000
direct allocation
page execute and read and write
3D9F000
stack
page read and write
1374000
heap
page read and write
14EAB7F3000
trusted library allocation
page read and write
8090000
heap
page read and write
4911000
heap
page read and write
7A35000
heap
page read and write
481E000
stack
page read and write
230F77B000
stack
page read and write
3A1E000
stack
page read and write
7DF1000
heap
page read and write
230F97B000
stack
page read and write
F7F000
heap
page read and write
1374000
heap
page read and write
1524000
heap
page read and write
1374000
heap
page read and write
4F20000
trusted library allocation
page read and write
2610000
trusted library allocation
page execute and read and write
1374000
heap
page read and write
65BE000
stack
page read and write
1374000
heap
page read and write
3DE3000
heap
page read and write
4A91000
heap
page read and write
1374000
heap
page read and write
891000
unkown
page execute and write copy
1304000
heap
page read and write
4830000
direct allocation
page execute and read and write
7EF3000
heap
page read and write
7FB0000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page read and write
5A20000
trusted library allocation
page read and write
106A000
heap
page read and write
EE4000
heap
page read and write
1A79000
heap
page read and write
29EFCEBB000
heap
page read and write
41FE000
stack
page read and write
4F30000
direct allocation
page execute and read and write
5FE000
heap
page read and write
7A23000
heap
page read and write
184D000
heap
page read and write
85DD000
stack
page read and write
960000
unkown
page execute and write copy
4911000
heap
page read and write
1374000
heap
page read and write
7E01000
heap
page read and write
193C000
heap
page read and write
7F5B000
heap
page read and write
4A81000
heap
page read and write
79E6000
heap
page read and write
1AB0000
heap
page read and write
1375000
heap
page read and write
2A51000
trusted library allocation
page read and write
4A7F000
stack
page read and write
106A000
heap
page read and write
BE0000
unkown
page execute and read and write
46DE000
stack
page read and write
1919000
heap
page read and write
406A000
heap
page read and write
7D16000
heap
page read and write
9F8000
unkown
page execute and write copy
2A91000
trusted library allocation
page read and write
30EF000
stack
page read and write
783E000
stack
page read and write
1374000
heap
page read and write
4911000
heap
page read and write
1186000
heap
page read and write
4C70000
trusted library allocation
page read and write
1375000
heap
page read and write
1375000
heap
page read and write
19A5000
heap
page read and write
4930000
direct allocation
page execute and read and write
8540000
trusted library allocation
page execute and read and write
6930000
trusted library allocation
page read and write
1374000
heap
page read and write
52BB000
stack
page read and write
7D30000
remote allocation
page read and write
4A80000
direct allocation
page read and write
1374000
heap
page read and write
4911000
heap
page read and write
2AFE000
trusted library allocation
page read and write
1374000
heap
page read and write
4EAF000
stack
page read and write
1374000
heap
page read and write
1B36000
heap
page read and write
17C5000
heap
page read and write
957000
unkown
page execute and write copy
A34000
heap
page read and write
3E2F000
stack
page read and write
4F60000
direct allocation
page execute and read and write
A0B000
unkown
page execute and write copy
1374000
heap
page read and write
4005000
heap
page read and write
1374000
heap
page read and write
8111000
heap
page read and write
1374000
heap
page read and write
3B9E000
stack
page read and write
1B36000
heap
page read and write
1374000
heap
page read and write
29E814B6000
trusted library allocation
page read and write
4451000
heap
page read and write
10A4000
heap
page read and write
124D000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
5024000
heap
page read and write
431E000
stack
page read and write
53F0000
direct allocation
page execute and read and write
192A000
heap
page read and write
10A1000
heap
page read and write
14EABA8D000
heap
page read and write
8E3000
unkown
page execute and write copy
3EFD000
heap
page read and write
346F000
stack
page read and write
7DCB000
heap
page read and write
1564000
heap
page read and write
7F54000
heap
page read and write
3EAE000
stack
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
177E000
heap
page read and write
4911000
heap
page read and write
AC4000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
1374000
heap
page read and write
29E814FC000
trusted library allocation
page read and write
7F45000
heap
page read and write
402E000
stack
page read and write
29EFAE50000
heap
page read and write
3BDD000
heap
page read and write
1824000
heap
page read and write
4911000
heap
page read and write
34AE000
stack
page read and write
10A4000
heap
page read and write
7DF1000
heap
page read and write
29EFCBBD000
heap
page read and write
7A35000
heap
page read and write
7CDE000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
4911000
heap
page read and write
1374000
heap
page read and write
14AE000
heap
page read and write
7CBD000
heap
page read and write
7CBF000
heap
page read and write
36C5000
trusted library allocation
page read and write
7D11000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
7A1E000
heap
page read and write
17C0000
trusted library allocation
page read and write
FFE000
stack
page read and write
1374000
heap
page read and write
3EE7000
heap
page read and write
4E90000
direct allocation
page execute and read and write
7FF849000000
trusted library allocation
page read and write
19FA000
heap
page read and write
1374000
heap
page read and write
4A20000
direct allocation
page execute and read and write
1374000
heap
page read and write
1374000
heap
page read and write
4920000
direct allocation
page execute and read and write
7CB8000
heap
page read and write
56F0000
heap
page read and write
432A000
trusted library allocation
page read and write
4830000
direct allocation
page execute and read and write
1374000
heap
page read and write
4911000
heap
page read and write
4C64000
trusted library allocation
page read and write
E8D000
unkown
page execute and write copy
3F2B000
heap
page read and write
1AC2000
heap
page read and write
36B1000
trusted library allocation
page read and write
26E71EE5000
heap
page read and write
4F20000
direct allocation
page execute and read and write
7FF848E00000
trusted library allocation
page read and write
7F43000
heap
page read and write
7FF848E70000
trusted library allocation
page read and write
411A000
heap
page read and write
1B22000
heap
page read and write
1374000
heap
page read and write
7A35000
heap
page read and write
3D64000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
3A5E000
stack
page read and write
924000
heap
page read and write
1374000
heap
page read and write
4A81000
heap
page read and write
7F80000
heap
page read and write
A3A000
stack
page read and write
43A1000
heap
page read and write
700000
unkown
page readonly
1044000
heap
page read and write
A34000
heap
page read and write
79E3000
heap
page read and write
5450000
direct allocation
page execute and read and write
1374000
heap
page read and write
7F0A000
heap
page read and write
7F9D000
heap
page read and write
17AA000
heap
page read and write
35EF000
stack
page read and write
1374000
heap
page read and write
4A81000
heap
page read and write
5D20000
trusted library allocation
page read and write
7CCA000
heap
page read and write
1375000
heap
page read and write
4911000
heap
page read and write
1B22000
heap
page read and write
1374000
heap
page read and write
1014000
unkown
page execute and read and write
1514000
heap
page read and write
7A35000
heap
page read and write
130E000
heap
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
454000
heap
page read and write
F83000
heap
page read and write
10AA000
heap
page read and write
1967B4DE000
heap
page read and write
3679000
heap
page read and write
1AB7000
heap
page read and write
29EFADE0000
trusted library allocation
page read and write
1044000
heap
page read and write
1374000
heap
page read and write
2F20000
heap
page read and write
7DD5000
heap
page read and write
637D000
stack
page read and write
7FF848DB0000
trusted library allocation
page read and write
10E4000
heap
page read and write
5090000
direct allocation
page execute and read and write
3D2F000
stack
page read and write
7F2D000
heap
page read and write
1348000
heap
page read and write
4550000
trusted library allocation
page read and write
7C9B000
heap
page read and write
1374000
heap
page read and write
8CE1000
heap
page read and write
4911000
heap
page read and write
150D000
stack
page read and write
1375000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
7F43000
heap
page read and write
1374000
heap
page read and write
B5E000
unkown
page execute and read and write
8131000
heap
page read and write
1374000
heap
page read and write
811E000
heap
page read and write
7D0D000
heap
page read and write
192E000
heap
page read and write
8540000
heap
page read and write
7FF848E60000
trusted library allocation
page read and write
336F000
stack
page read and write
4911000
heap
page read and write
1660000
heap
page read and write
2A61000
trusted library allocation
page read and write
5370000
direct allocation
page execute and read and write
1375000
heap
page read and write
440F000
stack
page read and write
1374000
heap
page read and write
1374000
heap
page read and write
60A000
heap
page read and write
1A9E000
heap
page read and write
180B000
trusted library allocation
page execute and read and write
1B07000
heap
page read and write
1967D360000
heap
page read and write
5200000
direct allocation
page execute and read and write
54DD000
stack
page read and write
E8D000
unkown
page execute and read and write
10E4000
heap
page read and write
1374000
heap
page read and write
741E000
stack
page read and write
1374000
heap
page read and write
There are 7050 hidden memdumps, click here to show them.