IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\NewB[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\amert[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\sarra[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\swiiii[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\gold[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\jok[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\cred64[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\file300un[1].exe
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\swiiiii[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\alexxxxxxxx[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\clip64[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\install[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000008001\b3168c3d9b.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000009001\2531414c80.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000012001\amert.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000147001\swiiiii.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000148001\alexxxxxxxx.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000149001\gold.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000150001\NewB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000152001\jok.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000153001\swiiii.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000181001\file300un.exe
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000208001\install.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\4d0ab15804\chrosha.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\M5gQOMOo3fGmoJBomt4v2FX.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\Users\user\AppData\Local\Temp\cgrqKzIZDKj22M18G57j8co.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\iolo\dm\BIT1659.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\c1ec479e5342a2\clip64.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\c1ec479e5342a2\cred64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xd119135a, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_2531414c80.exe_5e323fb4f1c666387d9cc1dee85f0b56b72b544_69a9f5ab_bbcf651c-2575-43b7-8cd7-ea1a1b4b92cf\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_12d0986cc18289ef8901cad6b43de906d388da1_d1a40e08_d80b7010-35f5-4a11-a4b9-1160bd036eec\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_c6c137ad26261ffbf179af25b12dcff5c58b13_d1a40e08_61a248c3-481b-4468-af45-0268f8e5e2de\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_swiiiii.exe_4644a13ebcdb6e10e65a72b8ec8bc0b0ff32d1fa_6563360f_1188cd97-5eaf-4e3e-b2ca-e3777ca54d21\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1052.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Apr 23 19:35:07 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER11F9.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1238.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER126B.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1328.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER276C.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2981.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4A19.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4B05.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5F78.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6035.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8884.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Apr 23 19:34:32 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8BF0.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8C30.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8C4D.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8D48.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER99D4.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9C94.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA1BA.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Apr 23 19:34:39 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA265.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Apr 23 19:34:40 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA42C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA45B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA47B.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA585.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAA60.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAC26.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB080.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB0A0.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB0C1.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB1CC.tmp.txt
data
dropped
C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\_Files_\BNAGMGSPLO.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\EEGWXUHVUG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\GRXZDKKVDB.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\NVWZAPQSQL.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\NVWZAPQSQL.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\PALRGUCVEH.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\SQSJKEBWDT.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\SQSJKEBWDT.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\spanR5OV7OYq0nWL\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanR5OV7OYq0nWL\1tMQdk_m1hNqWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanR5OV7OYq0nWL\3F8xdMXSM6gVWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanR5OV7OYq0nWL\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanR5OV7OYq0nWL\AgnbFJmDkw4DWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanR5OV7OYq0nWL\BUaWru1OY9dqLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanR5OV7OYq0nWL\BiKteJAFTArSLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanR5OV7OYq0nWL\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanR5OV7OYq0nWL\H4jv9ryDgviIWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanR5OV7OYq0nWL\KZl1PnKZSQCUHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanR5OV7OYq0nWL\LwOohb0OofEKLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanR5OV7OYq0nWL\Nsl376dgwgQLCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanR5OV7OYq0nWL\WCP7PKc3RGBwHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanR5OV7OYq0nWL\YLMJt9Fewg2TWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanR5OV7OYq0nWL\bXltIHp07DyFCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\spanR5OV7OYq0nWL\vCvMjkd9JmEgHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanR5OV7OYq0nWL\vbKGdxzUo0NnHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanR5OV7OYq0nWL\veUXa65l0ZGYWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spano6nZvZGi7n6F\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spano6nZvZGi7n6F\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spano6nZvZGi7n6F\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spano6nZvZGi7n6F\DpoKb1TgzuWIWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spano6nZvZGi7n6F\ErhB6uKxZtCKHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spano6nZvZGi7n6F\F7uygTvkxlIzCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spano6nZvZGi7n6F\Qm1AceSVKIlSWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spano6nZvZGi7n6F\QoVyn3aTUlnbLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spano6nZvZGi7n6F\R3aXl4Dcy7YjWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spano6nZvZGi7n6F\Rr5KBnMjw6zGWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spano6nZvZGi7n6F\ViF2XXfrZuiTHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spano6nZvZGi7n6F\W2o9V4GQRDVyWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spano6nZvZGi7n6F\WQN4l6QIKakALogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spano6nZvZGi7n6F\cFIp2Q1xHQk9Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\spano6nZvZGi7n6F\eVceOGHlj6zoWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spano6nZvZGi7n6F\kgxQgTh5UQ5GHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spano6nZvZGi7n6F\vEkSARep5ViMLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spano6nZvZGi7n6F\yiASaL1tzNLxHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\trixyR5OV7OYq0nWL\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyR5OV7OYq0nWL\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyR5OV7OYq0nWL\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyo6nZvZGi7n6F\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyo6nZvZGi7n6F\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyo6nZvZGi7n6F\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 23 18:34:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 23 18:34:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 23 18:34:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 23 18:34:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 23 18:34:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BIT1C07.tmp
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Apr 23 18:35:34 2024, mtime=Tue Apr 23 18:35:34 2024, atime=Tue Apr 23 18:35:33 2024, length=2469936, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Tzgsecure.lnk (copy)
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Apr 23 18:35:34 2024, mtime=Tue Apr 23 18:35:34 2024, atime=Tue Apr 23 18:35:33 2024, length=2469936, window=hide
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\Tasks\chrosha.job
data
dropped
C:\Windows\Tasks\explorta.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 254
ASCII text, with very long lines (1631)
downloaded
Chrome Cache Entry: 255
ASCII text, with very long lines (4199)
downloaded
Chrome Cache Entry: 256
ASCII text, with very long lines (405)
downloaded
Chrome Cache Entry: 257
ASCII text, with very long lines (775)
downloaded
Chrome Cache Entry: 258
HTML document, ASCII text, with very long lines (682)
downloaded
Chrome Cache Entry: 259
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 260
ASCII text, with very long lines (467)
downloaded
Chrome Cache Entry: 261
ASCII text, with very long lines (504)
downloaded
Chrome Cache Entry: 262
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
downloaded
Chrome Cache Entry: 263
Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
downloaded
Chrome Cache Entry: 264
ASCII text, with very long lines (693)
downloaded
Chrome Cache Entry: 265
ASCII text, with very long lines (17337)
downloaded
Chrome Cache Entry: 266
ASCII text, with very long lines (574)
downloaded
Chrome Cache Entry: 267
ASCII text, with very long lines (1299)
downloaded
Chrome Cache Entry: 268
ASCII text, with very long lines (834)
downloaded
Chrome Cache Entry: 269
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 270
ASCII text, with very long lines (2362)
downloaded
There are 144 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
"C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe"
malicious
C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
malicious
C:\Users\user\AppData\Local\Temp\1000008001\b3168c3d9b.exe
"C:\Users\user\AppData\Local\Temp\1000008001\b3168c3d9b.exe"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Users\user\AppData\Local\Temp\1000009001\2531414c80.exe
"C:\Users\user\AppData\Local\Temp\1000009001\2531414c80.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\Users\user\AppData\Local\Temp\1000008001\b3168c3d9b.exe
"C:\Users\user\AppData\Local\Temp\1000008001\b3168c3d9b.exe"
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
"C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000009001\2531414c80.exe
"C:\Users\user\AppData\Local\Temp\1000009001\2531414c80.exe"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
malicious
C:\Users\user\AppData\Local\Temp\1000012001\amert.exe
"C:\Users\user\AppData\Local\Temp\1000012001\amert.exe"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
malicious
C:\Users\user\AppData\Local\Temp\4d0ab15804\chrosha.exe
C:\Users\user\AppData\Local\Temp\4d0ab15804\chrosha.exe
malicious
C:\Users\user\AppData\Local\Temp\1000008001\b3168c3d9b.exe
"C:\Users\user\AppData\Local\Temp\1000008001\b3168c3d9b.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000009001\2531414c80.exe
"C:\Users\user\AppData\Local\Temp\1000009001\2531414c80.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\Temp\4d0ab15804\chrosha.exe
C:\Users\user\AppData\Local\Temp\4d0ab15804\chrosha.exe
malicious
C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
malicious
C:\Users\user\AppData\Local\Temp\1000147001\swiiiii.exe
"C:\Users\user\AppData\Local\Temp\1000147001\swiiiii.exe"
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
malicious
C:\Windows\System32\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\netsh.exe
netsh wlan show profiles
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=1940,i,13936497851858077106,7979509008271672704,262144 /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5612 --field-trial-handle=1940,i,13936497851858077106,7979509008271672704,262144 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5584 --field-trial-handle=1940,i,13936497851858077106,7979509008271672704,262144 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=2008,i,1160871462993257416,2185165771260797926,262144 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1940,i,13936497851858077106,7979509008271672704,262144 /prefetch:8
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 7556 -ip 7556
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7556 -s 2036
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1940,i,13936497851858077106,7979509008271672704,262144 /prefetch:8
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 6188 -ip 6188
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2584 -ip 2584
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 2040
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6188 -s 79380
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1960,i,5587240117108389418,17388237419523249848,262144 /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 12156 -ip 12156
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 12156 -s 844
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 42 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://193.233.132.139/
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://193.233.132.139/sev56rkm/index.php12001
unknown
https://db-ip.com:443/demo/home.php?s=89.187.171.132P
unknown
http://193.233.132.139/f1daa8e86e8e8fda7df3081405eac52aa495c49#b
unknown
https://duckduckgo.com/ac/?q=
unknown
https://ipinfo.io/FW
unknown
http://193.233.132.139/Local
unknown
https://t.tIpo
unknown
https://db-ip.com/
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
https://ipinfo.io/widget/demo/89.187.171.132
unknown
http://193.233.132.167/cost/lenin.exetK
unknown
https://login.microsoftonline.com/ppsecure/ResolveUser.srf
unknown
https://login.microsoftonline.com/ppsecure/devicechangecredential.srft
unknown
https://t.me/risepro_botftW
unknown
http://193.233.132.167/cost/go.exe
unknown
https://login.microsoftonline.com/ppsecure/deviceremovecredential.srfr
unknown
http://193.233.132.167/cost/go.exer
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
https://t.me/RiseProSUPPORTv=
unknown
https://login.microsoftonline.com/ppsecure/DeviceAssociate.srf(
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsds
unknown
https://db-ip.com:443/demo/home.php?s=89.187.171.132
unknown
https://t.me/risepro_botisepro_bot
unknown
https://db-ip.com/demo/home.php?s=89.187.171.132icroso/
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdAAAAA
unknown
https://login.microsoftonline.com/ppsecure/EnumerateDevices.srf
unknown
https://t.me/RiseProSUPPORTqUTv
unknown
https://account.live.com/InlineSignup.aspx?iww=1&id=80502
unknown
https://t.(
unknown
http://193.233.132.167/cost/lenin.exe4
unknown
http://193.233.132.139/erences.SourceAumid
unknown
https://download.iolo.net/
unknown
http://193.233.132.167/cost/lenin.exepro_botC
unknown
http://Passport.NET/tb_
unknown
http://schemas.xmlsoap.org/ws/2005/02/scdn
unknown
https://db-ip.com/demo/home.php?s=89.187.171.132J
unknown
https://ipinfo.io/W
unknown
https://db-ip.com/demo/home.php?s=89.187.171.132mp
unknown
https://ipinfo.io/T
unknown
http://193.233.132.139/sev56rkm/index.phpL
unknown
https://account.live.com/msangcwam
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe.ex
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://193.233.132.139/sev56rkm/index.phpX
unknown
http://Passport.NET/tbE%
unknown
http://crl.ver)
unknown
http://passport.net/tb
unknown
https://t.me/RiseProSUPPORT
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Issueue
unknown
https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srf
unknown
http://193.233.132.139/sev56rkm/index.phpcoded
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://147.45.47.102:57893/hera/amadka.exea
unknown
https://www.youtube.com/account
unknown
https://db-ip.com/e
unknown
http://193.233.132.139/sev56rkm/index.phpbE
unknown
http://193.233.132.139/sev56rkm/index.php1mb3JtLXVybGVuY29kZWQ=
unknown
https://ipinfo.io/
unknown
http://193.233.132.139/age.Streams.DataWriter
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
https://www.youtube.com/accountJ_
unknown
http://193.233.132.167/cost/random.exe
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdes
unknown
https://ipinfo.io/widget/demo/89.187.171.132v
unknown
http://193.233.132.167/cost/go.exeAK
unknown
http://193.233.132.167/cost/sarra.exe
unknown
https://t.me/risepro_botriseproU
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Issuesue
unknown
http://193.233.132.167/mine/random.exe
unknown
http://schemas.mi
unknown
https://ipinfo.io:443/widget/demo/89.187.171.132S
unknown
https://pcss.dll
unknown
https://t.me/risepro_botH
unknown
http://schemas.xmlsoap.org/ws/2005/02/trustce
unknown
http://193.233.132.139/sev56rkm/index.php001
unknown
https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srf:CLSID
unknown
https://login.microsoftonline.com/ppsecure/deviceremovecredential.srf
unknown
https://login.microsoftonline.com/ppsecure/DeviceUpdate.srfL
unknown
http://147.45.47.102:57893/hera/amadka.exe
unknown
https://ipinfo.io/widget/demo/89.187.171.132yB
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdAAAA
unknown
https://login.microsoftonline.com/ppsecure/DeviceQuery.srf
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://db-ip.com/2
unknown
http://147.45.47.102:57893/hera/amadka.exeHK
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
http://193.233.132.139/sev56rkm/index.phpWindows
unknown
https://login.microsoftonline.com/MSARST2.srf
unknown
https://account.live.com/inlinesignup.aspx?iww=1&id=80600e
unknown
http://Passport.NET/STS
unknown
http://docs.oasis-open.org/wss/2004/XX/oasis-2004XX-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://193.233.132.167/cost/go.exe.1
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
193.233.132.139
unknown
Russian Federation
malicious
193.233.132.167
unknown
Russian Federation
malicious
34.117.186.192
unknown
United States
142.250.105.84
unknown
United States
64.233.176.95
unknown
United States
52.182.143.212
unknown
United States
192.168.2.4
unknown
unknown
193.233.132.234
unknown
Russian Federation
192.168.2.6
unknown
unknown
192.168.2.5
unknown
unknown
147.45.47.93
unknown
Russian Federation
142.251.15.94
unknown
United States
172.217.215.94
unknown
United States
142.250.9.94
unknown
United States
104.21.67.211
unknown
United States
77.221.151.47
unknown
Russian Federation
40.126.28.22
unknown
United States
172.217.215.95
unknown
United States
1.1.1.1
unknown
Australia
142.250.9.138
unknown
United States
172.67.75.166
unknown
United States
20.42.65.92
unknown
United States
172.253.124.113
unknown
United States
172.253.124.136
unknown
United States
142.250.105.147
unknown
United States
64.233.185.102
unknown
United States
185.93.1.243
unknown
Czech Republic
185.172.128.19
unknown
Russian Federation
239.255.255.250
unknown
Reserved
23.221.242.90
unknown
United States
64.233.176.101
unknown
United States
127.0.0.1
unknown
unknown
There are 22 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
b3168c3d9b.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
2531414c80.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\6188
Terminator
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\6188
Reason
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\6188
CreationTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\9572
Terminator
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\9572
Reason
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\9572
CreationTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\8068
Terminator
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\8068
Reason
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\8068
CreationTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\10516
Terminator
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\10516
Reason
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\10516
CreationTime
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\2531414c80.exe|6adf17df7041f9f4
ProgramId
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\2531414c80.exe|6adf17df7041f9f4
FileId
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\2531414c80.exe|6adf17df7041f9f4
LowerCaseLongPath
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\2531414c80.exe|6adf17df7041f9f4
LongPathHash
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\2531414c80.exe|6adf17df7041f9f4
Name
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\2531414c80.exe|6adf17df7041f9f4
OriginalFileName
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\2531414c80.exe|6adf17df7041f9f4
Publisher
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\2531414c80.exe|6adf17df7041f9f4
Version
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\2531414c80.exe|6adf17df7041f9f4
BinFileVersion
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\2531414c80.exe|6adf17df7041f9f4
BinaryType
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\2531414c80.exe|6adf17df7041f9f4
ProductName
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\2531414c80.exe|6adf17df7041f9f4
ProductVersion
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\2531414c80.exe|6adf17df7041f9f4
LinkDate
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\2531414c80.exe|6adf17df7041f9f4
BinProductVersion
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\2531414c80.exe|6adf17df7041f9f4
AppxPackageFullName
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\2531414c80.exe|6adf17df7041f9f4
AppxPackageRelativeId
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\2531414c80.exe|6adf17df7041f9f4
Size
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\2531414c80.exe|6adf17df7041f9f4
Language
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\2531414c80.exe|6adf17df7041f9f4
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates\2C85006A1A028BCC349DF23C474724C055FDE8B6
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates\B68D8F953E551914324E557E6164D68B9926650C
Blob
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02vnquskfpppcivc
Reason
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02ddkfmhdzjequhu
DeviceId
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02ddkfmhdzjequhu
Provision Tuesday, April 23, 2024 21:34:40
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02ddkfmhdzjequhu
AppIdList
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02gfcilbgfbgtour
Request Tuesday, April 23, 2024 21:34:43
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02gfcilbgfbgtour
Response Tuesday, April 23, 2024 21:34:43
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02gfcilbgfbgtour
Reason
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02qntozuzhihsrat
DeviceId
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02qntozuzhihsrat
AppIdList
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02vnquskfpppcivc
AppIdList
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18
ValidDeviceId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL
GlobalDeviceUpdateTime
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02ddkfmhdzjequhu
DeviceId
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18
ValidDeviceId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02ddkfmhdzjequhu
DeviceId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_USERS.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC
Data
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02ddkfmhdzjequhu
DeviceId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003
ValidDeviceId
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02gfcilbgfbgtour
AppIdList
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
Data
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02qntozuzhihsrat
DeviceId
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003
ValidDeviceId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
Data
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02qntozuzhihsrat
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\ExtendedProperties
LID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
Data
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
Data
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02qntozuzhihsrat
DeviceId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
Data
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
Data
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProgramId
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
FileId
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LowerCaseLongPath
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LongPathHash
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Name
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
OriginalFileName
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Publisher
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Version
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinFileVersion
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinaryType
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductName
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductVersion
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LinkDate
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinProductVersion
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageFullName
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageRelativeId
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Size
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Language
\REGISTRY\A\{71088f03-5390-0b76-285a-8fa9184891a7}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Usn
\REGISTRY\A\{5ffff474-162b-a2cb-7ca9-1ac1a4169f2b}\Root\InventoryApplicationFile\swiiiii.exe|bde3547efb1debd
ProgramId
\REGISTRY\A\{5ffff474-162b-a2cb-7ca9-1ac1a4169f2b}\Root\InventoryApplicationFile\swiiiii.exe|bde3547efb1debd
FileId
\REGISTRY\A\{5ffff474-162b-a2cb-7ca9-1ac1a4169f2b}\Root\InventoryApplicationFile\swiiiii.exe|bde3547efb1debd
LowerCaseLongPath
\REGISTRY\A\{5ffff474-162b-a2cb-7ca9-1ac1a4169f2b}\Root\InventoryApplicationFile\swiiiii.exe|bde3547efb1debd
LongPathHash
\REGISTRY\A\{5ffff474-162b-a2cb-7ca9-1ac1a4169f2b}\Root\InventoryApplicationFile\swiiiii.exe|bde3547efb1debd
Name
\REGISTRY\A\{5ffff474-162b-a2cb-7ca9-1ac1a4169f2b}\Root\InventoryApplicationFile\swiiiii.exe|bde3547efb1debd
OriginalFileName
\REGISTRY\A\{5ffff474-162b-a2cb-7ca9-1ac1a4169f2b}\Root\InventoryApplicationFile\swiiiii.exe|bde3547efb1debd
Publisher
\REGISTRY\A\{5ffff474-162b-a2cb-7ca9-1ac1a4169f2b}\Root\InventoryApplicationFile\swiiiii.exe|bde3547efb1debd
Version
\REGISTRY\A\{5ffff474-162b-a2cb-7ca9-1ac1a4169f2b}\Root\InventoryApplicationFile\swiiiii.exe|bde3547efb1debd
BinFileVersion
\REGISTRY\A\{5ffff474-162b-a2cb-7ca9-1ac1a4169f2b}\Root\InventoryApplicationFile\swiiiii.exe|bde3547efb1debd
BinaryType
\REGISTRY\A\{5ffff474-162b-a2cb-7ca9-1ac1a4169f2b}\Root\InventoryApplicationFile\swiiiii.exe|bde3547efb1debd
ProductName
\REGISTRY\A\{5ffff474-162b-a2cb-7ca9-1ac1a4169f2b}\Root\InventoryApplicationFile\swiiiii.exe|bde3547efb1debd
ProductVersion
\REGISTRY\A\{5ffff474-162b-a2cb-7ca9-1ac1a4169f2b}\Root\InventoryApplicationFile\swiiiii.exe|bde3547efb1debd
LinkDate
\REGISTRY\A\{5ffff474-162b-a2cb-7ca9-1ac1a4169f2b}\Root\InventoryApplicationFile\swiiiii.exe|bde3547efb1debd
BinProductVersion
\REGISTRY\A\{5ffff474-162b-a2cb-7ca9-1ac1a4169f2b}\Root\InventoryApplicationFile\swiiiii.exe|bde3547efb1debd
AppxPackageFullName
\REGISTRY\A\{5ffff474-162b-a2cb-7ca9-1ac1a4169f2b}\Root\InventoryApplicationFile\swiiiii.exe|bde3547efb1debd
AppxPackageRelativeId
\REGISTRY\A\{5ffff474-162b-a2cb-7ca9-1ac1a4169f2b}\Root\InventoryApplicationFile\swiiiii.exe|bde3547efb1debd
Size
\REGISTRY\A\{5ffff474-162b-a2cb-7ca9-1ac1a4169f2b}\Root\InventoryApplicationFile\swiiiii.exe|bde3547efb1debd
Language
\REGISTRY\A\{5ffff474-162b-a2cb-7ca9-1ac1a4169f2b}\Root\InventoryApplicationFile\swiiiii.exe|bde3547efb1debd
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018800ECB65BB98
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
There are 162 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7BDD000
heap
page read and write
malicious
4CD0000
direct allocation
page read and write
malicious
5350000
direct allocation
page read and write
malicious
591000
unkown
page execute and read and write
malicious
5140000
direct allocation
page read and write
malicious
4D90000
direct allocation
page read and write
malicious
149E000
heap
page read and write
malicious
7A11000
heap
page read and write
malicious
591000
unkown
page execute and read and write
malicious
7A11000
heap
page read and write
malicious
A01000
unkown
page execute and read and write
malicious
B41000
unkown
page execute and read and write
malicious
5110000
direct allocation
page read and write
malicious
861000
unkown
page execute and read and write
malicious
7A11000
heap
page read and write
malicious
79D0000
heap
page read and write
malicious
4E10000
direct allocation
page read and write
malicious
591000
unkown
page execute and read and write
malicious
7A11000
heap
page read and write
malicious
A01000
unkown
page execute and read and write
malicious
5010000
direct allocation
page read and write
malicious
7C0E000
heap
page read and write
5350000
direct allocation
page execute and read and write
51A0000
remote allocation
page read and write
7ACE000
stack
page read and write
5060000
direct allocation
page execute and read and write
5000000
direct allocation
page execute and read and write
8C1000
unkown
page execute and read and write
2F1F000
stack
page read and write
412E000
stack
page read and write
B56000
unkown
page execute and read and write
79B8000
heap
page read and write
1EFCE574000
heap
page read and write
5120000
direct allocation
page execute and read and write
1EFCECCA000
heap
page read and write
8408000
heap
page read and write
12F0000
heap
page read and write
521D000
stack
page read and write
10E8000
heap
page read and write
5F2000
unkown
page execute and read and write
392E000
heap
page read and write
4E86000
heap
page read and write
4E71000
heap
page read and write
7A16000
heap
page read and write
1EFCE581000
heap
page read and write
11D4000
heap
page read and write
43DF000
stack
page read and write
319F000
stack
page read and write
5350000
direct allocation
page execute and read and write
4E86000
heap
page read and write
4E84000
heap
page read and write
147D000
heap
page read and write
51D0000
direct allocation
page execute and read and write
1556000
heap
page read and write
1EFCDD4C000
heap
page read and write
D49000
unkown
page execute and write copy
4E86000
heap
page read and write
12D0000
heap
page read and write
1EFCE50F000
heap
page read and write
1150000
direct allocation
page read and write
1959000
heap
page read and write
1495000
heap
page read and write
7A24000
heap
page read and write
4EB1000
heap
page read and write
354F000
stack
page read and write
37AF000
stack
page read and write
4BBF000
stack
page read and write
4E86000
heap
page read and write
1EFCE532000
heap
page read and write
7CD7000
heap
page read and write
A66000
unkown
page write copy
513927E000
unkown
page readonly
8FD000
stack
page read and write
3E9F000
stack
page read and write
2AF2AAC0000
trusted library allocation
page read and write
1060000
heap
page read and write
404F000
stack
page read and write
3D5F000
stack
page read and write
4E82000
heap
page read and write
EE0000
unkown
page readonly
1FBC2D50000
heap
page read and write
1EFCE553000
heap
page read and write
1000000
heap
page read and write
3E1F000
stack
page read and write
79F1000
heap
page read and write
12B4000
heap
page read and write
1EFCE531000
heap
page read and write
7CD5000
heap
page read and write
75BE000
stack
page read and write
B40000
heap
page read and write
4EA1000
direct allocation
page read and write
4B81000
heap
page read and write
5E000
unkown
page readonly
B62000
heap
page read and write
2AF2AA70000
trusted library allocation
page read and write
16E9000
heap
page read and write
14A8000
heap
page read and write
16FE000
stack
page read and write
42FF000
stack
page read and write
D51000
unkown
page execute and read and write
322E000
stack
page read and write
4C71000
heap
page read and write
BB2000
unkown
page execute and write copy
7CDE000
heap
page read and write
2AF25F91000
trusted library allocation
page read and write
4E84000
heap
page read and write
17E0000
heap
page read and write
3D9F000
stack
page read and write
11D4000
heap
page read and write
4E84000
heap
page read and write
FAF87FE000
unkown
page readonly
974000
heap
page read and write
51A0000
direct allocation
page execute and read and write
7C27000
heap
page read and write
12B0000
heap
page read and write
7E42000
heap
page read and write
8814000
heap
page read and write
7A2A000
heap
page read and write
50B0000
direct allocation
page execute and read and write
1EFCEC99000
heap
page read and write
842F000
heap
page read and write
4A70000
direct allocation
page read and write
A389EFE000
stack
page read and write
7C3B000
heap
page read and write
1880000
heap
page read and write
4EB1000
heap
page read and write
51C0000
direct allocation
page execute and read and write
4E71000
heap
page read and write
7AAA000
heap
page read and write
1182000
heap
page read and write
842F000
heap
page read and write
87E1000
heap
page read and write
4E84000
heap
page read and write
3A9E000
stack
page read and write
31F0000
direct allocation
page read and write
4D3E000
stack
page read and write
15F9000
heap
page read and write
5650000
heap
page read and write
DB9000
stack
page read and write
B70000
unkown
page execute and read and write
395E000
stack
page read and write
5180000
direct allocation
page execute and read and write
79E1000
heap
page read and write
38C6000
heap
page read and write
7CD5000
heap
page read and write
3910000
heap
page read and write
409E000
stack
page read and write
13E7000
heap
page read and write
37BE000
stack
page read and write
31F0000
direct allocation
page read and write
1728000
heap
page read and write
2A20000
direct allocation
page read and write
12E4000
heap
page read and write
4E86000
heap
page read and write
5070000
direct allocation
page read and write
408E000
stack
page read and write
4BE1000
heap
page read and write
A9C000
heap
page read and write
17E0000
heap
page read and write
3C8A000
heap
page read and write
16C000
unkown
page readonly
7EC4000
heap
page read and write
4E86000
heap
page read and write
13AB000
stack
page read and write
4D20000
direct allocation
page execute and read and write
2A20000
direct allocation
page read and write
47FF000
stack
page read and write
171D000
heap
page read and write
539F000
stack
page read and write
12FE000
heap
page read and write
4E82000
heap
page read and write
1650000
heap
page read and write
1856000
heap
page read and write
7C52000
heap
page read and write
774E000
stack
page read and write
4E82000
heap
page read and write
1EFCE55C000
heap
page read and write
379E000
stack
page read and write
C3E000
stack
page read and write
12E4000
heap
page read and write
1150000
direct allocation
page read and write
14B4000
unkown
page execute and write copy
1308000
heap
page read and write
4C71000
heap
page read and write
3876000
heap
page read and write
4E82000
heap
page read and write
2D8F000
stack
page read and write
1EFCE531000
heap
page read and write
4C71000
heap
page read and write
7995000
heap
page read and write
79E2000
heap
page read and write
15BE000
heap
page read and write
7A19000
heap
page read and write
4F00000
direct allocation
page execute and read and write
41FE000
stack
page read and write
4BD0000
direct allocation
page read and write
4C60000
direct allocation
page read and write
7C4D000
heap
page read and write
79F8000
heap
page read and write
4B91000
heap
page read and write
7AA7000
heap
page read and write
4E84000
heap
page read and write
130B000
heap
page read and write
79A2000
heap
page read and write
56A0000
direct allocation
page execute and read and write
10FA000
stack
page read and write
37C5000
heap
page read and write
4E82000
heap
page read and write
31CF000
stack
page read and write
3D81000
heap
page read and write
7F50000
trusted library allocation
page read and write
4E71000
heap
page read and write
7A19000
heap
page read and write
79D0000
heap
page read and write
5181000
direct allocation
page read and write
770000
unkown
page readonly
18E4000
heap
page read and write
50E0000
direct allocation
page execute and read and write
1486000
heap
page read and write
15AE000
stack
page read and write
4A70000
direct allocation
page read and write
4BC0000
heap
page read and write
7C4A000
heap
page read and write
78FF000
stack
page read and write
7F50000
trusted library allocation
page read and write
4BF1000
heap
page read and write
3665000
heap
page read and write
4E82000
heap
page read and write
7AA9000
heap
page read and write
FAF9DFE000
unkown
page readonly
1657000
heap
page read and write
8290000
trusted library allocation
page read and write
1EFCE576000
heap
page read and write
3880000
heap
page read and write
5350000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
7A91000
heap
page read and write
747E000
stack
page read and write
48FF000
stack
page read and write
348E000
stack
page read and write
15F0000
heap
page read and write
4B81000
heap
page read and write
3D35000
heap
page read and write
1981000
heap
page read and write
7EC4000
heap
page read and write
4E88000
heap
page read and write
1224000
heap
page read and write
1930000
heap
page read and write
1440000
heap
page read and write
ED5000
heap
page read and write
130C000
heap
page read and write
D97000
heap
page read and write
20474D02000
heap
page read and write
4E82000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
6D00000
heap
page read and write
1355000
heap
page read and write
4B81000
heap
page read and write
7C31000
heap
page read and write
53C0000
direct allocation
page execute and read and write
D4C000
unkown
page execute and write copy
12E4000
heap
page read and write
118F000
heap
page read and write
5160000
direct allocation
page execute and read and write
3CC8000
heap
page read and write
8310000
trusted library allocation
page read and write
4B1E000
stack
page read and write
1220000
heap
page read and write
79B4000
heap
page read and write
A389BBD000
stack
page read and write
1148000
heap
page read and write
4E88000
heap
page read and write
13EF000
stack
page read and write
2AF2AAF0000
trusted library allocation
page read and write
4BF1000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4EB1000
heap
page read and write
4B81000
heap
page read and write
7CE8000
heap
page read and write
1495000
heap
page read and write
7BE0000
heap
page read and write
3DB0000
heap
page read and write
118E000
heap
page read and write
4B81000
heap
page read and write
13DC000
heap
page read and write
77DE000
stack
page read and write
D44000
unkown
page execute and write copy
7EA2000
heap
page read and write
7CD3000
heap
page read and write
7CD1000
heap
page read and write
13EF000
heap
page read and write
188E000
heap
page read and write
1435000
heap
page read and write
4E71000
heap
page read and write
7CD6000
heap
page read and write
5201000
heap
page read and write
44CE000
stack
page read and write
4BF1000
heap
page read and write
10EE000
stack
page read and write
7E4D000
heap
page read and write
D40000
direct allocation
page read and write
1A4000
unkown
page readonly
7C5E000
stack
page read and write
4B81000
heap
page read and write
4BF1000
heap
page read and write
1398000
heap
page read and write
183C000
heap
page read and write
48A1000
heap
page read and write
3E8E000
stack
page read and write
5020000
direct allocation
page execute and read and write
1714000
heap
page read and write
B45000
unkown
page execute and read and write
4E90000
heap
page read and write
87E1000
heap
page read and write
3744000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
590000
unkown
page readonly
1328000
heap
page read and write
14EF000
heap
page read and write
1733000
heap
page read and write
79E1000
heap
page read and write
5110000
direct allocation
page execute and read and write
BED000
stack
page read and write
4A70000
direct allocation
page read and write
1733000
heap
page read and write
132C000
unkown
page execute and write copy
66B000
trusted library allocation
page execute and read and write
7A24000
heap
page read and write
4BD0000
direct allocation
page read and write
3F28000
heap
page read and write
7E62000
heap
page read and write
7E62000
heap
page read and write
138B000
heap
page read and write
7C3B000
heap
page read and write
5700000
direct allocation
page execute and read and write
12B0000
heap
page read and write
7AB8000
heap
page read and write
4E84000
heap
page read and write
3F18000
heap
page read and write
6D0E000
heap
page read and write
339E000
stack
page read and write
7A91000
heap
page read and write
5137A7E000
unkown
page readonly
1EFCEE04000
heap
page read and write
1367000
heap
page read and write
1354000
heap
page read and write
40BE000
stack
page read and write
54D0000
direct allocation
page execute and read and write
368E000
heap
page read and write
16BE000
stack
page read and write
4E84000
heap
page read and write
7F09000
heap
page read and write
79B8000
heap
page read and write
375F000
stack
page read and write
12EE000
heap
page read and write
770000
unkown
page readonly
4B81000
heap
page read and write
3CDF000
stack
page read and write
31E0000
heap
page read and write
79C5000
heap
page read and write
138B000
heap
page read and write
F14000
heap
page read and write
4E86000
heap
page read and write
132F000
unkown
page execute and read and write
2AF2AC42000
heap
page read and write
7D0B000
heap
page read and write
4C3F000
stack
page read and write
56A0000
direct allocation
page execute and read and write
1050000
heap
page read and write
D0000
unkown
page readonly
38EA000
heap
page read and write
4C71000
heap
page read and write
12A6000
heap
page read and write
48A1000
heap
page read and write
134D000
heap
page read and write
7CDA000
heap
page read and write
4E82000
heap
page read and write
12B4000
heap
page read and write
7BBE000
stack
page read and write
7C3B000
heap
page read and write
11D4000
heap
page read and write
183A000
heap
page read and write
33EF000
stack
page read and write
5190000
direct allocation
page execute and read and write
54D0000
direct allocation
page execute and read and write
4C71000
heap
page read and write
79D0000
heap
page read and write
37DF000
heap
page read and write
1150000
direct allocation
page read and write
4B81000
heap
page read and write
4C71000
heap
page read and write
7BF8000
heap
page read and write
15FA000
heap
page read and write
1EFCE596000
heap
page read and write
13D8000
heap
page read and write
7F0A000
heap
page read and write
1EFCE508000
heap
page read and write
11D4000
heap
page read and write
2F6F000
stack
page read and write
5770000
direct allocation
page execute and read and write
3F53000
heap
page read and write
1EFCECBE000
heap
page read and write
5500000
direct allocation
page execute and read and write
7592000
heap
page read and write
6D10000
heap
page read and write
7CD5000
heap
page read and write
1A1A000
heap
page read and write
4E82000
heap
page read and write
42EE000
heap
page read and write
12BC000
heap
page read and write
87EB000
heap
page read and write
1220000
heap
page read and write
10AC000
heap
page read and write
4E84000
heap
page read and write
1EFCDD4C000
heap
page read and write
1944000
heap
page read and write
7E42000
heap
page read and write
14B3000
unkown
page execute and read and write
5137E7E000
unkown
page readonly
115B000
heap
page read and write
4A70000
direct allocation
page read and write
3CE7000
heap
page read and write
418F000
stack
page read and write
4EB1000
heap
page read and write
390F000
stack
page read and write
8FC000
unkown
page read and write
4E82000
heap
page read and write
2AF25479000
heap
page read and write
7E49000
heap
page read and write
51377BE000
stack
page read and write
41AE000
stack
page read and write
10A5000
heap
page read and write
4E82000
heap
page read and write
7C47000
heap
page read and write
8423000
heap
page read and write
E0F000
stack
page read and write
3D2E000
stack
page read and write
4E90000
direct allocation
page execute and read and write
500000
heap
page read and write
4E82000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
2AF2AD0F000
heap
page read and write
132F000
unkown
page execute and read and write
1EFCE55B000
heap
page read and write
85D9000
heap
page read and write
490F000
stack
page read and write
79D0000
heap
page read and write
514B000
stack
page read and write
4EB1000
heap
page read and write
1792000
heap
page read and write
4A1F000
stack
page read and write
A3B000
stack
page read and write
1EFCEE03000
heap
page read and write
4D50000
direct allocation
page execute and read and write
1200000
heap
page read and write
1EFCEE0A000
heap
page read and write
1708000
heap
page read and write
771000
unkown
page execute and write copy
344F000
stack
page read and write
7BF8000
heap
page read and write
4B70000
direct allocation
page read and write
7F1C000
heap
page read and write
4E84000
heap
page read and write
7A19000
heap
page read and write
44FE000
stack
page read and write
1EFCDC97000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
15F0000
heap
page read and write
1125000
heap
page read and write
14F3000
heap
page read and write
374B000
heap
page read and write
4A70000
direct allocation
page read and write
4FF0000
direct allocation
page execute and read and write
7AA9000
heap
page read and write
1EFCE50F000
heap
page read and write
40EF000
stack
page read and write
12B0000
heap
page read and write
7BE6000
heap
page read and write
20474902000
trusted library allocation
page read and write
14FB000
heap
page read and write
1389000
heap
page read and write
4DF0000
direct allocation
page execute and read and write
451E000
stack
page read and write
133F000
heap
page read and write
2F8E000
stack
page read and write
4BE1000
heap
page read and write
320E000
stack
page read and write
7E4D000
heap
page read and write
1EFCECD3000
heap
page read and write
79E2000
heap
page read and write
192000
unkown
page readonly
1150000
direct allocation
page read and write
1EFCE529000
heap
page read and write
4B81000
heap
page read and write
71C7000
heap
page read and write
861000
unkown
page execute and write copy
3F0F000
stack
page read and write
7C31000
heap
page read and write
1195000
heap
page read and write
3FEE000
stack
page read and write
4AEE000
stack
page read and write
17B0000
heap
page read and write
397E000
heap
page read and write
4B81000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
7AA5000
heap
page read and write
4B30000
heap
page execute and read and write
EE1000
unkown
page execute and write copy
87E1000
heap
page read and write
D51000
unkown
page execute and write copy
7F0A000
heap
page read and write
43DE000
stack
page read and write
4BF1000
heap
page read and write
1678000
heap
page read and write
401F000
stack
page read and write
79D0000
heap
page read and write
50E0000
direct allocation
page execute and read and write
351E000
stack
page read and write
18E4000
heap
page read and write
85B5000
heap
page read and write
2AF26580000
trusted library section
page readonly
1150000
direct allocation
page read and write
4E82000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
9F0000
heap
page read and write
974000
heap
page read and write
344F000
stack
page read and write
EDF000
unkown
page read and write
1539000
heap
page read and write
4C90000
heap
page read and write
D9B000
stack
page read and write
3EEF000
stack
page read and write
7F24000
heap
page read and write
1AB8000
heap
page read and write
7D0B000
heap
page read and write
FAF94FE000
unkown
page readonly
4B81000
heap
page read and write
517E000
stack
page read and write
1EFCEE14000
heap
page read and write
33EE000
stack
page read and write
109B000
stack
page read and write
BB3000
unkown
page execute and write copy
10CB000
heap
page read and write
4F8E000
stack
page read and write
5030000
direct allocation
page execute and read and write
7ADE000
stack
page read and write
1EFCEE0A000
heap
page read and write
4CB1000
heap
page read and write
7BE2000
heap
page read and write
842F000
heap
page read and write
7A72000
heap
page read and write
40BE000
stack
page read and write
3CFA000
heap
page read and write
3C0E000
stack
page read and write
35DF000
stack
page read and write
118D000
heap
page read and write
7C47000
heap
page read and write
4E84000
heap
page read and write
ED4000
unkown
page execute and write copy
FFD000
unkown
page execute and read and write
650E000
stack
page read and write
5F2000
unkown
page execute and read and write
4CD0000
direct allocation
page read and write
1EFCDD4C000
heap
page read and write
13BF000
stack
page read and write
1EFCEC53000
heap
page read and write
47EF000
stack
page read and write
3A28000
heap
page read and write
1728000
heap
page read and write
4E82000
heap
page read and write
7C5E000
heap
page read and write
D49000
unkown
page execute and write copy
4950000
trusted library allocation
page read and write
345E000
stack
page read and write
7EC4000
heap
page read and write
1EFCECCD000
heap
page read and write
4BF1000
heap
page read and write
4E88000
heap
page read and write
AE6000
heap
page read and write
3AAF000
heap
page read and write
13B4000
heap
page read and write
497E000
stack
page read and write
13B8000
heap
page read and write
5730000
direct allocation
page execute and read and write
11D4000
heap
page read and write
5740000
direct allocation
page execute and read and write
1190000
heap
page read and write
4E88000
heap
page read and write
D1000
unkown
page execute read
4D8E000
stack
page read and write
3DEF000
stack
page read and write
13C7000
heap
page read and write
4BEE000
stack
page read and write
79F9000
heap
page read and write
37FE000
stack
page read and write
7C4F000
heap
page read and write
3AC8000
heap
page read and write
20474892000
heap
page read and write
7D0B000
heap
page read and write
4B81000
heap
page read and write
46FE000
stack
page read and write
648E000
stack
page read and write
12FC000
heap
page read and write
7AA4000
heap
page read and write
79C5000
heap
page read and write
4E70000
heap
page read and write
5110000
direct allocation
page execute and read and write
14C7000
heap
page read and write
3947000
heap
page read and write
4B5F000
stack
page read and write
1164000
heap
page read and write
163A000
heap
page read and write
8422000
heap
page read and write
D51000
unkown
page execute and read and write
7F50000
trusted library allocation
page read and write
4E10000
direct allocation
page execute and read and write
19C000
unkown
page write copy
842F000
heap
page read and write
5440000
direct allocation
page execute and read and write
19C000
unkown
page write copy
4BF1000
heap
page read and write
7A01000
heap
page read and write
36BC000
heap
page read and write
10EF000
heap
page read and write
85D9000
heap
page read and write
396A000
heap
page read and write
4A3F000
stack
page read and write
18E4000
heap
page read and write
1910000
heap
page read and write
17BB000
heap
page read and write
198F000
heap
page read and write
74DB000
heap
page read and write
784E000
stack
page read and write
1350000
heap
page read and write
1463000
heap
page read and write
124C000
heap
page read and write
4E88000
heap
page read and write
463E000
stack
page read and write
4B81000
heap
page read and write
5C9E000
stack
page read and write
1490000
heap
page read and write
4C71000
heap
page read and write
4E84000
heap
page read and write
85CC000
heap
page read and write
7AA4000
heap
page read and write
470000
heap
page read and write
12B4000
heap
page read and write
4E84000
heap
page read and write
18E4000
heap
page read and write
2AF2ACFC000
heap
page read and write
1136000
unkown
page execute and read and write
304E000
stack
page read and write
1EFCE57C000
heap
page read and write
45FF000
stack
page read and write
11C0000
heap
page read and write
495F000
stack
page read and write
7D0B000
heap
page read and write
3859000
heap
page read and write
2AF2A99D000
trusted library allocation
page read and write
79E2000
heap
page read and write
4E88000
heap
page read and write
7995000
heap
page read and write
4E86000
heap
page read and write
62A2000
heap
page read and write
1A30000
heap
page read and write
2A1E000
stack
page read and write
3B6F000
stack
page read and write
1210000
heap
page read and write
50C0000
direct allocation
page execute and read and write
410E000
stack
page read and write
373B000
heap
page read and write
3F66000
heap
page read and write
74FD000
stack
page read and write
2D8E000
stack
page read and write
3A0F000
stack
page read and write
F00000
direct allocation
page read and write
4EB1000
heap
page read and write
1EFCE50F000
heap
page read and write
7C11000
heap
page read and write
9E0000
heap
page read and write
4C71000
heap
page read and write
7CE0000
heap
page read and write
1EFCE552000
heap
page read and write
50D0000
direct allocation
page execute and read and write
FFF000
unkown
page execute and write copy
3E76000
heap
page read and write
7AA4000
heap
page read and write
19A2000
heap
page read and write
3E48000
heap
page read and write
12FC000
heap
page read and write
7C31000
heap
page read and write
4B81000
heap
page read and write
3E00000
heap
page read and write
50E0000
direct allocation
page execute and read and write
12CB000
heap
page read and write
4E86000
heap
page read and write
2AF2A910000
trusted library allocation
page read and write
7A31000
heap
page read and write
5137C79000
stack
page read and write
20474881000
heap
page read and write
4BE1000
heap
page read and write
4D50000
direct allocation
page execute and read and write
31F0000
direct allocation
page read and write
5030000
trusted library allocation
page read and write
14E0000
heap
page read and write
4B81000
heap
page read and write
68DE000
stack
page read and write
7C27000
heap
page read and write
2AF25474000
heap
page read and write
11D4000
heap
page read and write
3A6E000
stack
page read and write
44AF000
stack
page read and write
9FE000
stack
page read and write
133E000
heap
page read and write
1674000
heap
page read and write
39A3000
heap
page read and write
18E4000
heap
page read and write
3CA0000
heap
page read and write
BB2000
unkown
page execute and read and write
7995000
heap
page read and write
144E000
heap
page read and write
8AD000
unkown
page execute and write copy
7D20000
trusted library allocation
page read and write
3F2E000
stack
page read and write
2FC0000
direct allocation
page read and write
4F60000
direct allocation
page execute and read and write
15A4000
heap
page read and write
49BF000
stack
page read and write
198D000
heap
page read and write
4B81000
heap
page read and write
14DD000
heap
page read and write
2AF25491000
heap
page read and write
7A31000
heap
page read and write
378F000
heap
page read and write
50C0000
direct allocation
page execute and read and write
12B4000
heap
page read and write
335F000
stack
page read and write
3CC3000
heap
page read and write
1998000
heap
page read and write
4BF1000
heap
page read and write
15E760C0000
trusted library allocation
page read and write
1085000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
A01000
unkown
page execute and write copy
1A0000
unkown
page write copy
17CD000
heap
page read and write
840A000
heap
page read and write
50C0000
direct allocation
page execute and read and write
7F24000
heap
page read and write
163E000
stack
page read and write
7AB8000
heap
page read and write
12E4000
heap
page read and write
2A4E000
stack
page read and write
7AC1000
heap
page read and write
79E1000
heap
page read and write
3B4F000
stack
page read and write
1EFCDD4C000
heap
page read and write
4B81000
heap
page read and write
12E4000
heap
page read and write
3D3E000
stack
page read and write
3842000
heap
page read and write
16EB000
heap
page read and write
4EB1000
heap
page read and write
37CE000
stack
page read and write
8430000
heap
page read and write
8423000
heap
page read and write
38FE000
stack
page read and write
3E9A000
heap
page read and write
7AA7000
heap
page read and write
12B4000
heap
page read and write
4E86000
heap
page read and write
3D1E000
stack
page read and write
1638000
heap
page read and write
222A83AE000
heap
page read and write
3841000
heap
page read and write
2FC0000
direct allocation
page read and write
1EFCE581000
heap
page read and write
12EF000
heap
page read and write
1430000
heap
page read and write
17E3000
heap
page read and write
17AC000
heap
page read and write
5654000
heap
page read and write
605C000
heap
page read and write
1A4000
unkown
page readonly
50EC000
stack
page read and write
3885000
heap
page read and write
1EFCDCB4000
heap
page read and write
4E86000
heap
page read and write
4A70000
direct allocation
page read and write
7EF5000
heap
page read and write
7A0A000
heap
page read and write
72A2000
heap
page read and write
1EFCECD7000
heap
page read and write
11FF000
stack
page read and write
7EE1000
heap
page read and write
79E1000
heap
page read and write
C60000
heap
page read and write
2D5F000
stack
page read and write
7D1E000
stack
page read and write
3C5F000
stack
page read and write
4B81000
heap
page read and write
83F0000
heap
page read and write
16D8000
heap
page read and write
4BCF000
stack
page read and write
1EFCE530000
heap
page read and write
18E4000
heap
page read and write
3F22000
heap
page read and write
18E4000
heap
page read and write
3C7F000
stack
page read and write
159F000
heap
page read and write
2AF26900000
trusted library allocation
page read and write
3DD8000
heap
page read and write
7C31000
heap
page read and write
3907000
heap
page read and write
4EB1000
heap
page read and write
4B81000
heap
page read and write
14A7000
heap
page read and write
1224000
heap
page read and write
3AFD000
heap
page read and write
325F000
stack
page read and write
4E40000
direct allocation
page execute and read and write
35AE000
stack
page read and write
3E88000
heap
page read and write
7A0A000
heap
page read and write
1224000
heap
page read and write
791000
unkown
page execute and read and write
42AF000
stack
page read and write
168E000
stack
page read and write
7C0C000
heap
page read and write
85B2000
heap
page read and write
48DF000
stack
page read and write
2AF2A9D0000
trusted library allocation
page read and write
3E4E000
stack
page read and write
787E000
stack
page read and write
1EFCEE4E000
heap
page read and write
5130000
direct allocation
page read and write
126E000
stack
page read and write
1EFCE589000
heap
page read and write
1348000
heap
page read and write
7AB2000
heap
page read and write
1405000
heap
page read and write
1578000
heap
page read and write
505B000
stack
page read and write
7F24000
heap
page read and write
1224000
heap
page read and write
45CE000
stack
page read and write
1260000
heap
page read and write
5190000
direct allocation
page execute and read and write
54AD000
stack
page read and write
2B4F000
stack
page read and write
7AA4000
heap
page read and write
5F9000
unkown
page execute and read and write
7BE0000
heap
page read and write
4E71000
heap
page read and write
4B7F000
stack
page read and write
7A29000
heap
page read and write
7D0B000
heap
page read and write
7C1C000
heap
page read and write
79B4000
heap
page read and write
1EFCE50F000
heap
page read and write
7CE2000
heap
page read and write
7CE0000
heap
page read and write
AEF000
heap
page read and write
7C31000
heap
page read and write
4E84000
heap
page read and write
2FAB000
stack
page read and write
1505000
heap
page read and write
1EFCE533000
heap
page read and write
17D1000
heap
page read and write
31CE000
stack
page read and write
F14000
heap
page read and write
4C3E000
stack
page read and write
4E84000
heap
page read and write
7ED0000
trusted library allocation
page read and write
7C27000
heap
page read and write
4E82000
heap
page read and write
2AF25D02000
heap
page read and write
4B81000
heap
page read and write
2AF2AAE0000
trusted library allocation
page read and write
79E1000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
1704000
heap
page read and write
1EFCE508000
heap
page read and write
3F3F000
stack
page read and write
4C60000
direct allocation
page read and write
7EF8000
heap
page read and write
4E88000
heap
page read and write
42EE000
stack
page read and write
3CFE000
stack
page read and write
1EFCE529000
heap
page read and write
7D20000
trusted library allocation
page read and write
4E82000
heap
page read and write
4BE1000
heap
page read and write
1EFCEC13000
heap
page read and write
4C71000
heap
page read and write
13CB000
heap
page read and write
4ADE000
stack
page read and write
85BE000
heap
page read and write
3D16000
heap
page read and write
7CDA000
heap
page read and write
4C60000
direct allocation
page read and write
4C71000
heap
page read and write
4F90000
direct allocation
page execute and read and write
FAF8BFE000
unkown
page readonly
39EF000
stack
page read and write
1EFCE58A000
heap
page read and write
8827000
heap
page read and write
3B7F000
stack
page read and write
1EFCE530000
heap
page read and write
974000
heap
page read and write
805F000
stack
page read and write
591F000
stack
page read and write
36EE000
stack
page read and write
4BE1000
heap
page read and write
1440000
heap
page read and write
1EFCECA0000
heap
page read and write
7C7E000
heap
page read and write
1638000
heap
page read and write
FAF9FFE000
unkown
page readonly
4BF1000
heap
page read and write
38AF000
heap
page read and write
4B81000
heap
page read and write
1EFCECBE000
heap
page read and write
51A0000
direct allocation
page execute and read and write
1164000
heap
page read and write
3DB1000
heap
page read and write
89F000
unkown
page execute and read and write
46BE000
stack
page read and write
3B8F000
stack
page read and write
4E82000
heap
page read and write
4C71000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
2AF2AD10000
heap
page read and write
7A0A000
heap
page read and write
4E86000
heap
page read and write
177F000
heap
page read and write
4B81000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
1720000
heap
page read and write
882B000
heap
page read and write
5240000
direct allocation
page execute and read and write
419E000
stack
page read and write
1EFCEC9A000
heap
page read and write
4E86000
heap
page read and write
7A00000
heap
page read and write
1EFCECC5000
heap
page read and write
14EF000
heap
page read and write
87E1000
heap
page read and write
7C43000
heap
page read and write
4EB1000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
1EFCDCBB000
heap
page read and write
7A23000
heap
page read and write
1333000
heap
page read and write
3F3F000
stack
page read and write
87E1000
heap
page read and write
4BE1000
heap
page read and write
791000
unkown
page execute and read and write
7EF9000
heap
page read and write
118D000
heap
page read and write
1A15000
heap
page read and write
F14000
heap
page read and write
722000
heap
page read and write
16D3000
heap
page read and write
13B4000
heap
page read and write
4E82000
heap
page read and write
18E4000
heap
page read and write
44CE000
stack
page read and write
7BE0000
heap
page read and write
5070000
direct allocation
page read and write
301F000
stack
page read and write
1746000
heap
page read and write
1EFCEC8A000
heap
page read and write
562E000
stack
page read and write
147B000
heap
page read and write
7CFA000
heap
page read and write
7F24000
heap
page read and write
12B4000
heap
page read and write
4E71000
heap
page read and write
7A19000
heap
page read and write
B41000
unkown
page execute and write copy
5170000
direct allocation
page execute and read and write
1875000
heap
page read and write
79E6000
heap
page read and write
1224000
heap
page read and write
85E0000
trusted library allocation
page read and write
1323000
unkown
page execute and read and write
106C000
unkown
page read and write
5530000
direct allocation
page execute and read and write
16EF000
heap
page read and write
31F0000
direct allocation
page read and write
389E000
heap
page read and write
ED0000
heap
page read and write
D44000
unkown
page execute and write copy
359E000
stack
page read and write
12C6000
unkown
page execute and read and write
1224000
heap
page read and write
131A000
heap
page read and write
1A9F000
heap
page read and write
4911000
heap
page read and write
3A34000
heap
page read and write
1400000
heap
page read and write
13AF000
heap
page read and write
20474A00000
heap
page read and write
5AAD000
stack
page read and write
1EFCE582000
heap
page read and write
7A19000
heap
page read and write
1150000
direct allocation
page read and write
7BE0000
heap
page read and write
4E82000
heap
page read and write
144E000
heap
page read and write
1EFCECCE000
heap
page read and write
3DBB000
heap
page read and write
4CCC000
stack
page read and write
56A0000
direct allocation
page execute and read and write
1EFCDC7E000
heap
page read and write
1A4000
unkown
page readonly
79E1000
heap
page read and write
4E84000
heap
page read and write
8AD000
unkown
page execute and read and write
3862000
heap
page read and write
472E000
stack
page read and write
7C27000
heap
page read and write
4303000
heap
page read and write
4B81000
heap
page read and write
D49000
unkown
page execute and write copy
1EFCE52C000
heap
page read and write
12B4000
heap
page read and write
394E000
stack
page read and write
38AE000
heap
page read and write
15C5000
heap
page read and write
79D0000
heap
page read and write
79B7000
heap
page read and write
50C0000
direct allocation
page execute and read and write
7BE2000
heap
page read and write
2AE2F7B000
stack
page read and write
1EFCEE0A000
heap
page read and write
79C5000
heap
page read and write
3A7E000
stack
page read and write
6E40000
heap
page read and write
432E000
stack
page read and write
1EFCEC00000
heap
page read and write
18E4000
heap
page read and write
4C71000
heap
page read and write
79C5000
heap
page read and write
4B81000
heap
page read and write
1140000
heap
page read and write
5290000
direct allocation
page execute and read and write
85E1000
heap
page read and write
4E88000
heap
page read and write
1730000
heap
page read and write
BA7000
unkown
page read and write
AFC000
stack
page read and write
17C2000
heap
page read and write
50E0000
direct allocation
page execute and read and write
7AB2000
heap
page read and write
2A47000
heap
page read and write
5130000
direct allocation
page execute and read and write
1982000
heap
page read and write
493F000
stack
page read and write
7EF5000
heap
page read and write
7C3B000
heap
page read and write
1EFCDD4C000
heap
page read and write
7B9D000
stack
page read and write
4E84000
heap
page read and write
D49000
unkown
page execute and write copy
14E1000
heap
page read and write
4E88000
heap
page read and write
4C71000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
8825000
heap
page read and write
142E000
heap
page read and write
DFF000
stack
page read and write
1EFCDCE1000
heap
page read and write
4B81000
heap
page read and write
410E000
stack
page read and write
11A0000
heap
page read and write
14BC000
unkown
page execute and write copy
8825000
heap
page read and write
85BE000
heap
page read and write
7AC1000
heap
page read and write
4BD0000
direct allocation
page read and write
1FBC2E2B000
heap
page read and write
5420000
direct allocation
page execute and read and write
4DB0000
trusted library allocation
page read and write
1074000
unkown
page execute and read and write
1476000
heap
page read and write
11B4000
heap
page read and write
1998000
heap
page read and write
142E000
heap
page read and write
5180000
direct allocation
page execute and read and write
376F000
stack
page read and write
6D0000
trusted library allocation
page execute and read and write
130F000
heap
page read and write
12E4000
heap
page read and write
170E000
heap
page read and write
10A0000
heap
page read and write
8825000
heap
page read and write
7C31000
heap
page read and write
430E000
stack
page read and write
1EFCE50F000
heap
page read and write
3D0B000
heap
page read and write
3A2E000
stack
page read and write
1536000
heap
page read and write
BB2000
unkown
page execute and read and write
3732000
heap
page read and write
79E1000
heap
page read and write
222A8397000
heap
page read and write
7EC4000
heap
page read and write
2E5E000
stack
page read and write
3CCF000
heap
page read and write
3E96000
heap
page read and write
1173000
heap
page read and write
868000
unkown
page execute and read and write
399E000
heap
page read and write
1EFCE581000
heap
page read and write
4BE1000
heap
page read and write
3CF1000
heap
page read and write
79E2000
heap
page read and write
3F5A000
heap
page read and write
3F7E000
stack
page read and write
8423000
heap
page read and write
1EFCE50F000
heap
page read and write
FAF9CFD000
stack
page read and write
422F000
stack
page read and write
7CF9000
heap
page read and write
305F000
stack
page read and write
4E84000
heap
page read and write
187F000
stack
page read and write
8423000
heap
page read and write
74E2000
heap
page read and write
390D000
heap
page read and write
12B4000
heap
page read and write
380F000
stack
page read and write
79B4000
heap
page read and write
842F000
heap
page read and write
4EB1000
heap
page read and write
2DCE000
stack
page read and write
5350000
direct allocation
page execute and read and write
346F000
stack
page read and write
416F000
stack
page read and write
1FBC2F02000
heap
page read and write
17E0000
heap
page read and write
FAF88FB000
stack
page read and write
3D72000
heap
page read and write
4BE1000
heap
page read and write
7A91000
heap
page read and write
4E86000
heap
page read and write
138B000
heap
page read and write
1340000
heap
page read and write
1B0A000
heap
page read and write
485E000
stack
page read and write
1088000
heap
page read and write
4A0000
heap
page read and write
7C27000
heap
page read and write
14F7000
heap
page read and write
3C0E000
stack
page read and write
8410000
heap
page read and write
3E6F000
stack
page read and write
1139000
heap
page read and write
443E000
stack
page read and write
302E000
stack
page read and write
4E84000
heap
page read and write
7EC4000
heap
page read and write
12B4000
heap
page read and write
777E000
stack
page read and write
11D4000
heap
page read and write
7C48000
heap
page read and write
1EFCECBC000
heap
page read and write
1224000
heap
page read and write
3F52000
heap
page read and write
1EFCECCE000
heap
page read and write
12D4000
heap
page read and write
1220000
heap
page read and write
79E2000
heap
page read and write
4B6F000
stack
page read and write
367D000
stack
page read and write
342F000
stack
page read and write
5201000
heap
page read and write
1170000
heap
page read and write
1EFCE530000
heap
page read and write
5DB0000
heap
page read and write
3E6E000
stack
page read and write
48A1000
heap
page read and write
7C31000
heap
page read and write
7CE0000
heap
page read and write
7C48000
heap
page read and write
455E000
stack
page read and write
4E84000
heap
page read and write
667000
trusted library allocation
page execute and read and write
974000
heap
page read and write
79B4000
heap
page read and write
4E88000
heap
page read and write
3AFD000
heap
page read and write
1EFCE55B000
heap
page read and write
5F7000
unkown
page read and write
1EFCEE05000
heap
page read and write
13BB000
stack
page read and write
116F000
stack
page read and write
12E4000
heap
page read and write
3F3E000
stack
page read and write
763E000
stack
page read and write
12E4000
heap
page read and write
7C60000
heap
page read and write
620000
heap
page read and write
146C000
heap
page read and write
20474881000
heap
page read and write
773D000
stack
page read and write
4E84000
heap
page read and write
1EFCE55A000
heap
page read and write
53F0000
direct allocation
page execute and read and write
31EE000
stack
page read and write
4EB1000
heap
page read and write
8F7000
unkown
page read and write
1224000
heap
page read and write
2AF2A994000
trusted library allocation
page read and write
4B81000
heap
page read and write
FAF9BFE000
unkown
page readonly
15CD000
heap
page read and write
192E000
heap
page read and write
7BF8000
heap
page read and write
75FE000
stack
page read and write
4B81000
heap
page read and write
318D000
stack
page read and write
2AF25D1B000
heap
page read and write
5010000
direct allocation
page execute and read and write
2AF26560000
trusted library section
page readonly
50A0000
direct allocation
page execute and read and write
4BE1000
heap
page read and write
1344000
heap
page read and write
A50000
direct allocation
page read and write
5305000
direct allocation
page read and write
4A70000
trusted library allocation
page read and write
12DC000
heap
page read and write
3698000
heap
page read and write
85A9000
heap
page read and write
336E000
stack
page read and write
493E000
stack
page read and write
1EFCE55C000
heap
page read and write
3E3E000
stack
page read and write
5070000
direct allocation
page read and write
4E2F000
stack
page read and write
47BF000
stack
page read and write
4BF1000
heap
page read and write
14F9000
heap
page read and write
8825000
heap
page read and write
3FDF000
stack
page read and write
7D20000
trusted library allocation
page read and write
1224000
heap
page read and write
222A9F60000
heap
page read and write
7A12000
heap
page read and write
EAC000
stack
page read and write
7CA9000
heap
page read and write
150C000
heap
page read and write
4EB1000
heap
page read and write
13DB000
heap
page read and write
7C66000
heap
page read and write
AFF000
stack
page read and write
F14000
heap
page read and write
16F5000
heap
page read and write
3841000
heap
page read and write
1620000
heap
page read and write
D43000
unkown
page execute and read and write
4EB1000
heap
page read and write
767D000
stack
page read and write
14BC000
unkown
page execute and write copy
4B81000
heap
page read and write
7C48000
heap
page read and write
42F0000
heap
page read and write
79E2000
heap
page read and write
4D50000
direct allocation
page execute and read and write
1EFCE581000
heap
page read and write
5210000
direct allocation
page execute and read and write
57B0000
direct allocation
page execute and read and write
4850000
heap
page read and write
5010000
direct allocation
page execute and read and write
13DB000
stack
page read and write
1140000
heap
page read and write
4BE1000
heap
page read and write
3CA1000
heap
page read and write
486E000
stack
page read and write
19E5000
heap
page read and write
1224000
heap
page read and write
114D000
heap
page read and write
7A9B000
heap
page read and write
8F7000
unkown
page write copy
2AF2A9C0000
trusted library allocation
page read and write
3F8F000
stack
page read and write
311F000
stack
page read and write
192E000
heap
page read and write
F00000
direct allocation
page read and write
4E84000
heap
page read and write
4B70000
direct allocation
page read and write
4EB1000
heap
page read and write
12B4000
heap
page read and write
6525000
heap
page read and write
7A17000
heap
page read and write
7C47000
heap
page read and write
145E000
stack
page read and write
74E5000
heap
page read and write
199B000
heap
page read and write
7A8F000
stack
page read and write
5F9000
unkown
page execute and read and write
1322000
unkown
page execute and read and write
14F7000
heap
page read and write
451F000
stack
page read and write
15F9000
heap
page read and write
7C0B000
heap
page read and write
45AF000
stack
page read and write
3906000
trusted library allocation
page read and write
2463000
trusted library allocation
page read and write
7C27000
heap
page read and write
4E84000
heap
page read and write
365A000
heap
page read and write
4E88000
heap
page read and write
EE1000
unkown
page execute and read and write
3888000
heap
page read and write
3ED8000
heap
page read and write
50C0000
direct allocation
page execute and read and write
7F24000
heap
page read and write
160C000
heap
page read and write
3F19000
heap
page read and write
5320000
direct allocation
page execute and read and write
7A11000
heap
page read and write
7A30000
heap
page read and write
5350000
direct allocation
page execute and read and write
79E6000
heap
page read and write
1788000
heap
page read and write
5110000
direct allocation
page execute and read and write
3A28000
heap
page read and write
4C71000
heap
page read and write
4BE1000
heap
page read and write
8825000
heap
page read and write
BB3000
unkown
page execute and write copy
1351000
heap
page read and write
FAF9AF9000
stack
page read and write
134E000
heap
page read and write
1224000
heap
page read and write
11D4000
heap
page read and write
1863000
heap
page read and write
4C71000
heap
page read and write
11C5000
heap
page read and write
FA5000
heap
page read and write
52C0000
direct allocation
page execute and read and write
4B81000
heap
page read and write
11CF000
heap
page read and write
3CD5000
heap
page read and write
85B6000
heap
page read and write
4B81000
heap
page read and write
AAD000
heap
page read and write
4C71000
heap
page read and write
64CE000
stack
page read and write
7A11000
heap
page read and write
1266000
heap
page read and write
D43000
unkown
page execute and read and write
396E000
stack
page read and write
6C5F000
stack
page read and write
12E4000
heap
page read and write
543B000
stack
page read and write
367E000
stack
page read and write
808B000
heap
page read and write
590000
unkown
page readonly
4E71000
heap
page read and write
100B000
heap
page read and write
50C0000
direct allocation
page execute and read and write
1470000
direct allocation
page read and write
FAF977E000
stack
page read and write
79D0000
heap
page read and write
50C0000
direct allocation
page execute and read and write
31AC000
stack
page read and write
19B2000
heap
page read and write
33BF000
stack
page read and write
38DA000
heap
page read and write
1690000
heap
page read and write
79A2000
heap
page read and write
1927000
heap
page read and write
1EFCE596000
heap
page read and write
7C48000
heap
page read and write
3A7E000
stack
page read and write
483E000
stack
page read and write
A39000
stack
page read and write
5020000
direct allocation
page execute and read and write
7E46000
heap
page read and write
12E4000
heap
page read and write
449E000
stack
page read and write
1EFCE53B000
heap
page read and write
4BF1000
heap
page read and write
129E000
heap
page read and write
4E82000
heap
page read and write
1700000
heap
page read and write
35DF000
stack
page read and write
37F1000
heap
page read and write
12B4000
heap
page read and write
79B4000
heap
page read and write
39CA000
trusted library allocation
page read and write
7F7E000
stack
page read and write
1086000
heap
page read and write
1866000
heap
page read and write
37EF000
stack
page read and write
79A9000
heap
page read and write
1153000
heap
page read and write
42F4000
heap
page read and write
1A40000
direct allocation
page read and write
16E2000
heap
page read and write
1312000
unkown
page execute and read and write
1EFCE56E000
heap
page read and write
119E000
heap
page read and write
17C5000
heap
page read and write
1EFCEC53000
heap
page read and write
1542000
heap
page read and write
1150000
direct allocation
page read and write
F14000
heap
page read and write
1470000
direct allocation
page read and write
79E2000
heap
page read and write
5010000
direct allocation
page read and write
5090000
direct allocation
page execute and read and write
7C11000
heap
page read and write
158F000
heap
page read and write
9F7000
heap
page read and write
475F000
stack
page read and write
4AAF000
stack
page read and write
79F9000
heap
page read and write
7BE2000
heap
page read and write
1782000
heap
page read and write
1377000
heap
page read and write
7AA4000
heap
page read and write
3F9E000
stack
page read and write
7A0A000
heap
page read and write
974000
heap
page read and write
31F0000
direct allocation
page read and write
49FE000
stack
page read and write
4A70000
direct allocation
page read and write
1728000
heap
page read and write
7BCF000
stack
page read and write
168F000
heap
page read and write
4DCE000
stack
page read and write
7E4D000
heap
page read and write
4B81000
heap
page read and write
4BE000
stack
page read and write
5050000
direct allocation
page execute and read and write
14D0000
heap
page read and write
8402000
heap
page read and write
1EFCED02000
heap
page read and write
4C71000
heap
page read and write
145A000
heap
page read and write
52D0000
direct allocation
page execute and read and write
7E71000
heap
page read and write
4B81000
heap
page read and write
8FF000
unkown
page read and write
7E62000
heap
page read and write
1734000
heap
page read and write
7A28000
heap
page read and write
4B81000
heap
page read and write
459F000
stack
page read and write
4B60000
heap
page read and write
11D4000
heap
page read and write
1EFCE55B000
heap
page read and write
56E0000
direct allocation
page execute and read and write
5000000
direct allocation
page execute and read and write
7EE2000
heap
page read and write
2F9F000
stack
page read and write
317E000
stack
page read and write
5100000
direct allocation
page read and write
19D3000
heap
page read and write
4BE1000
heap
page read and write
4D50000
direct allocation
page execute and read and write
1EFCECCE000
heap
page read and write
195A000
heap
page read and write
1224000
heap
page read and write
5F7000
unkown
page write copy
39BB000
heap
page read and write
1981000
heap
page read and write
4E86000
heap
page read and write
1EFCE55B000
heap
page read and write
4E84000
heap
page read and write
11FD000
unkown
page execute and read and write
1280000
heap
page read and write
14EC000
heap
page read and write
3799000
heap
page read and write
4ACE000
stack
page read and write
1783000
heap
page read and write
4E71000
heap
page read and write
109F000
heap
page read and write
5491000
direct allocation
page read and write
3EBA000
heap
page read and write
6CE000
stack
page read and write
757F000
stack
page read and write
456E000
stack
page read and write
7AA6000
heap
page read and write
14EA000
heap
page read and write
477E000
stack
page read and write
1EFCE532000
heap
page read and write
154F000
heap
page read and write
7D20000
trusted library allocation
page read and write
1193000
unkown
page execute and write copy
1EFCE553000
heap
page read and write
16C000
unkown
page readonly
4E86000
heap
page read and write
17F0000
heap
page read and write
D0000
unkown
page readonly
4F9E000
stack
page read and write
7C11000
heap
page read and write
5201000
direct allocation
page read and write
3A5E000
heap
page read and write
5090000
direct allocation
page execute and read and write
42E6000
heap
page read and write
3B7E000
stack
page read and write
87E1000
heap
page read and write
13E4000
heap
page read and write
3872000
heap
page read and write
4E8A000
heap
page read and write
7F50000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
16FA000
heap
page read and write
5550000
direct allocation
page execute and read and write
8470000
heap
page read and write
1EFCE52C000
heap
page read and write
85BC000
heap
page read and write
1AAF000
heap
page read and write
1224000
heap
page read and write
13DB000
heap
page read and write
9DE000
stack
page read and write
6AF4000
heap
page read and write
2AF25D13000
heap
page read and write
4E86000
heap
page read and write
87E1000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
4E84000
heap
page read and write
1EFCE552000
heap
page read and write
12BC000
heap
page read and write
7EE2000
heap
page read and write
4BF1000
heap
page read and write
3908000
heap
page read and write
68B000
stack
page read and write
12FC000
heap
page read and write
4E82000
heap
page read and write
154F000
heap
page read and write
D40000
direct allocation
page read and write
13FC000
heap
page read and write
7A91000
heap
page read and write
1EFCE508000
heap
page read and write
5F9000
unkown
page execute and read and write
134B000
heap
page read and write
A4D000
unkown
page execute and read and write
7C0B000
heap
page read and write
1EFCE415000
heap
page read and write
31BE000
stack
page read and write
16F7000
heap
page read and write
4E50000
direct allocation
page execute and read and write
79A2000
heap
page read and write
3A5F000
stack
page read and write
12E4000
heap
page read and write
1224000
heap
page read and write
1EFCDCC1000
heap
page read and write
4E8A000
heap
page read and write
33FE000
stack
page read and write
447000
remote allocation
page execute and read and write
6B1F000
stack
page read and write
53E4000
heap
page read and write
51A0000
direct allocation
page execute and read and write
4C71000
heap
page read and write
4B81000
heap
page read and write
A50000
direct allocation
page read and write
4E82000
heap
page read and write
D10000
unkown
page execute and read and write
11D0000
heap
page read and write
37AE000
stack
page read and write
11D4000
heap
page read and write
348E000
stack
page read and write
B62000
heap
page read and write
3A3F000
heap
page read and write
45EE000
stack
page read and write
4BE1000
heap
page read and write
1EFCDBF0000
trusted library allocation
page read and write
7EE2000
heap
page read and write
11E7000
heap
page read and write
10AA000
heap
page read and write
A00000
unkown
page readonly
331E000
stack
page read and write
4E86000
heap
page read and write
4C71000
heap
page read and write
1EFCE57B000
heap
page read and write
377D000
stack
page read and write
4EB1000
heap
page read and write
3D0F000
stack
page read and write
4BF1000
heap
page read and write
1224000
heap
page read and write
4EB1000
heap
page read and write
7A93000
heap
page read and write
7C55000
heap
page read and write
328F000
stack
page read and write
73B000
stack
page read and write
1AD6000
heap
page read and write
117B000
heap
page read and write
4BF1000
heap
page read and write
8410000
heap
page read and write
1552000
heap
page read and write
2D5E000
stack
page read and write
7EE6000
heap
page read and write
4B81000
heap
page read and write
4C71000
heap
page read and write
178B000
heap
page read and write
358E000
stack
page read and write
12B4000
heap
page read and write
3A3E000
stack
page read and write
1628000
heap
page read and write
4EB1000
heap
page read and write
3E4F000
heap
page read and write
3CEF000
stack
page read and write
7C48000
heap
page read and write
1150000
direct allocation
page read and write
FAF7F7C000
stack
page read and write
11C4000
heap
page read and write
14B4000
heap
page read and write
1389000
heap
page read and write
10A3000
heap
page read and write
4C01000
heap
page read and write
3745000
heap
page read and write
1EFCE52E000
heap
page read and write
3BAE000
stack
page read and write
7E72000
heap
page read and write
3DDE000
stack
page read and write
87E1000
heap
page read and write
7BF8000
heap
page read and write
770000
unkown
page readonly
D4C000
unkown
page execute and write copy
18E4000
heap
page read and write
124B000
heap
page read and write
10A8000
heap
page read and write
13B0000
heap
page read and write
14EE000
heap
page read and write
77D000
stack
page read and write
11D4000
heap
page read and write
130D000
heap
page read and write
7D0B000
heap
page read and write
7CD0000
remote allocation
page read and write
192000
unkown
page readonly
4B81000
heap
page read and write
590C000
stack
page read and write
31F0000
direct allocation
page read and write
7CE3000
heap
page read and write
453F000
stack
page read and write
1EFCECC1000
heap
page read and write
3E99000
heap
page read and write
1AD4000
heap
page read and write
1A11000
heap
page read and write
17D4000
heap
page read and write
4C71000
heap
page read and write
7AA5000
heap
page read and write
1610000
heap
page read and write
1062000
unkown
page execute and read and write
11D4000
heap
page read and write
4EB1000
heap
page read and write
40CF000
stack
page read and write
4BE1000
heap
page read and write
3EEE000
heap
page read and write
7A1E000
heap
page read and write
2FC0000
direct allocation
page read and write
5138E7E000
unkown
page readonly
9F0000
heap
page read and write
4BF1000
heap
page read and write
7C4A000
heap
page read and write
1712000
heap
page read and write
1EFCE576000
heap
page read and write
1EFCEE12000
heap
page read and write
4B81000
heap
page read and write
7A11000
heap
page read and write
4E86000
heap
page read and write
3E1F000
heap
page read and write
A01000
unkown
page execute and write copy
2AE2D7B000
stack
page read and write
20474924000
heap
page read and write
2AF25D5C000
heap
page read and write
4B81000
heap
page read and write
1EFCE56B000
heap
page read and write
153E000
stack
page read and write
1381000
heap
page read and write
41AF000
stack
page read and write
12B4000
heap
page read and write
2FC0000
direct allocation
page read and write
3E0F000
stack
page read and write
7A12000
heap
page read and write
11D4000
heap
page read and write
85B6000
heap
page read and write
182E000
heap
page read and write
4EB1000
heap
page read and write
4E84000
heap
page read and write
1301000
heap
page read and write
4B81000
heap
page read and write
7C31000
heap
page read and write
1EFCE529000
heap
page read and write
17B0000
heap
page read and write
4EB1000
heap
page read and write
7CD0000
heap
page read and write
1ABF000
heap
page read and write
114D000
heap
page read and write
7A9B000
heap
page read and write
176D000
heap
page read and write
4C0F000
stack
page read and write
7A91000
heap
page read and write
789000
stack
page read and write
1EFCEC4F000
heap
page read and write
513907E000
unkown
page readonly
7F15000
heap
page read and write
1EFCE552000
heap
page read and write
4971000
heap
page read and write
5380000
heap
page read and write
138D000
heap
page read and write
1EFCE57F000
heap
page read and write
4E82000
heap
page read and write
1EFCEE1B000
heap
page read and write
7C48000
heap
page read and write
142E000
stack
page read and write
4EB1000
heap
page read and write
7A12000
heap
page read and write
4BF1000
heap
page read and write
118E000
stack
page read and write
7BD0000
heap
page read and write
4B81000
heap
page read and write
8825000
heap
page read and write
392F000
stack
page read and write
13D2000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
473F000
stack
page read and write
4E84000
heap
page read and write
4E86000
heap
page read and write
4D50000
direct allocation
page execute and read and write
7A11000
heap
page read and write
4E82000
heap
page read and write
380E000
stack
page read and write
133E000
heap
page read and write
82FE000
stack
page read and write
8827000
heap
page read and write
12B4000
heap
page read and write
37E6000
heap
page read and write
4E71000
heap
page read and write
222A8385000
heap
page read and write
222A8378000
heap
page read and write
1A40000
direct allocation
page read and write
4960000
heap
page read and write
1EFCECD3000
heap
page read and write
4BD0000
direct allocation
page read and write
38BF000
stack
page read and write
12E4000
heap
page read and write
7C48000
heap
page read and write
30AF000
stack
page read and write
1912000
heap
page read and write
3DD7000
heap
page read and write
1EFCE50F000
heap
page read and write
173C000
heap
page read and write
FAF86FE000
stack
page read and write
3207000
heap
page read and write
13FB000
heap
page read and write
7F24000
heap
page read and write
13F0000
heap
page read and write
1EFCE529000
heap
page read and write
17E0000
heap
page read and write
50D0000
direct allocation
page execute and read and write
85B3000
heap
page read and write
8410000
heap
page read and write
ED2000
unkown
page execute and read and write
7A11000
heap
page read and write
142A000
heap
page read and write
590000
unkown
page readonly
7D20000
trusted library allocation
page read and write
7ABC000
heap
page read and write
56F0000
direct allocation
page execute and read and write
D50000
unkown
page read and write
18C0000
heap
page read and write
14DB000
heap
page read and write
160C000
heap
page read and write
7EC4000
heap
page read and write
1427000
heap
page read and write
7BE7000
heap
page read and write
17F3000
heap
page read and write
1EFCECC1000
heap
page read and write
1EFCE555000
heap
page read and write
79B8000
heap
page read and write
126F000
heap
page read and write
18E4000
heap
page read and write
1EFCE529000
heap
page read and write
7C3B000
heap
page read and write
4E82000
heap
page read and write
1EFCE553000
heap
page read and write
7C5E000
heap
page read and write
1979000
heap
page read and write
50D0000
direct allocation
page execute and read and write
11E0000
heap
page read and write
11CC000
heap
page read and write
3745000
heap
page read and write
38CD000
heap
page read and write
31F0000
direct allocation
page read and write
8827000
heap
page read and write
497E000
stack
page read and write
3B90000
heap
page read and write
1EFCE576000
heap
page read and write
4C71000
heap
page read and write
3F26000
heap
page read and write
4E82000
heap
page read and write
12C9000
heap
page read and write
38F4000
heap
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
1360000
heap
page read and write
3E50000
heap
page read and write
903000
unkown
page write copy
1402000
heap
page read and write
7D0B000
heap
page read and write
14C6000
heap
page read and write
3ACF000
heap
page read and write
119C000
heap
page read and write
193A000
heap
page read and write
40EE000
stack
page read and write
4B81000
heap
page read and write
3E5E000
stack
page read and write
3949000
heap
page read and write
329E000
stack
page read and write
1EFCE508000
heap
page read and write
5170000
heap
page read and write
A68000
unkown
page execute and read and write
1EFCE552000
heap
page read and write
8405000
heap
page read and write
CE5000
unkown
page execute and read and write
36E7000
heap
page read and write
424E000
stack
page read and write
793E000
stack
page read and write
1792000
heap
page read and write
7A6A000
heap
page read and write
2F4F000
stack
page read and write
4B70000
direct allocation
page read and write
126B000
stack
page read and write
2AF2A970000
trusted library allocation
page read and write
7C48000
heap
page read and write
56B0000
direct allocation
page execute and read and write
5020000
direct allocation
page execute and read and write
5020000
direct allocation
page execute and read and write
4B81000
heap
page read and write
4971000
heap
page read and write
4E82000
heap
page read and write
4E86000
heap
page read and write
7A68000
heap
page read and write
7C0E000
heap
page read and write
45AE000
stack
page read and write
355F000
stack
page read and write
434F000
stack
page read and write
1E1F000
stack
page read and write
4E71000
heap
page read and write
2AF25B50000
trusted library section
page read and write
15E75EE0000
heap
page read and write
375A000
heap
page read and write
135F000
heap
page read and write
974000
heap
page read and write
1EFCECA0000
heap
page read and write
7C27000
heap
page read and write
1631000
heap
page read and write
4BE1000
heap
page read and write
1351000
heap
page read and write
12B4000
heap
page read and write
795E000
stack
page read and write
34AE000
stack
page read and write
79B6000
heap
page read and write
2AF25D1A000
heap
page read and write
389F000
stack
page read and write
3F08000
heap
page read and write
222A8397000
heap
page read and write
4E86000
heap
page read and write
7EE3000
heap
page read and write
7A12000
heap
page read and write
51B0000
direct allocation
page execute and read and write
7CDE000
heap
page read and write
4EB1000
heap
page read and write
4BF1000
heap
page read and write
1EFCEE07000
heap
page read and write
1EFCE50F000
heap
page read and write
5560000
direct allocation
page execute and read and write
4A9E000
stack
page read and write
493F000
stack
page read and write
3E8A000
heap
page read and write
1827000
heap
page read and write
1EFCE596000
heap
page read and write
11D4000
heap
page read and write
390D000
heap
page read and write
538B000
stack
page read and write
37CE000
stack
page read and write
131B000
heap
page read and write
4BE1000
heap
page read and write
12C7000
heap
page read and write
7E40000
heap
page read and write
48A1000
heap
page read and write
15E75FBD000
heap
page read and write
1EFCEC3E000
heap
page read and write
43EE000
stack
page read and write
1062000
unkown
page execute and read and write
3B07000
heap
page read and write
222A83AD000
heap
page read and write
12F3000
heap
page read and write
1EFCECFC000
heap
page read and write
7C31000
heap
page read and write
41BF000
stack
page read and write
167E000
heap
page read and write
2AF2545B000
heap
page read and write
3CC0000
heap
page read and write
1EFCE57B000
heap
page read and write
4EB1000
heap
page read and write
3A21000
heap
page read and write
2AF2547C000
heap
page read and write
7CE0000
heap
page read and write
41FE000
stack
page read and write
D0000
unkown
page readonly
4E82000
heap
page read and write
80BE000
stack
page read and write
4E82000
heap
page read and write
4BE1000
heap
page read and write
36EE000
heap
page read and write
3E3F000
stack
page read and write
ED7000
unkown
page read and write
1490000
heap
page read and write
18DA000
heap
page read and write
4BF1000
heap
page read and write
1EFCE508000
heap
page read and write
14B3000
unkown
page execute and read and write
10E7000
heap
page read and write
F4E000
stack
page read and write
76E0000
remote allocation
page read and write
51D0000
direct allocation
page execute and read and write
74BE000
stack
page read and write
7C0B000
heap
page read and write
7CDE000
heap
page read and write
4F90000
direct allocation
page execute and read and write
386C000
heap
page read and write
7C31000
heap
page read and write
19B5000
heap
page read and write
8422000
heap
page read and write
4E82000
heap
page read and write
4F00000
direct allocation
page execute and read and write
17F0000
heap
page read and write
164C000
heap
page read and write
7CE4000
heap
page read and write
79E4000
heap
page read and write
1EFCE540000
heap
page read and write
4ECF000
stack
page read and write
7A0A000
heap
page read and write
1314000
heap
page read and write
1546000
heap
page read and write
79C5000
heap
page read and write
44CE000
stack
page read and write
1EFCEC9B000
heap
page read and write
12E4000
heap
page read and write
33CF000
stack
page read and write
1331000
heap
page read and write
313F000
stack
page read and write
1EFCEE0A000
heap
page read and write
386B000
heap
page read and write
7CDC000
heap
page read and write
85CC000
heap
page read and write
4EB1000
heap
page read and write
406F000
stack
page read and write
4D1B000
stack
page read and write
56BF000
stack
page read and write
1496000
heap
page read and write
7C47000
heap
page read and write
52C0000
direct allocation
page execute and read and write
460E000
stack
page read and write
7AA1000
heap
page read and write
1EFCE508000
heap
page read and write
7C16000
heap
page read and write
7C52000
heap
page read and write
2ECF000
stack
page read and write
4E86000
heap
page read and write
747397E000
stack
page read and write
37E6000
heap
page read and write
12B4000
heap
page read and write
4E86000
heap
page read and write
381B000
heap
page read and write
1EFCDCF1000
heap
page read and write
4BF1000
heap
page read and write
1728000
heap
page read and write
7F09000
heap
page read and write
ED7000
unkown
page write copy
7C27000
heap
page read and write
1151000
heap
page read and write
FAF917E000
stack
page read and write
4BF1000
heap
page read and write
12E4000
heap
page read and write
18D3000
heap
page read and write
4BE1000
heap
page read and write
5ADD000
stack
page read and write
1AD8000
heap
page read and write
1AE2000
heap
page read and write
4C71000
heap
page read and write
D5337FF000
stack
page read and write
5260000
direct allocation
page execute and read and write
4E71000
heap
page read and write
432E000
stack
page read and write
492E000
stack
page read and write
468F000
stack
page read and write
7A11000
heap
page read and write
79BF000
stack
page read and write
1073000
unkown
page write copy
31EF000
stack
page read and write
117F000
heap
page read and write
378F000
stack
page read and write
41CF000
stack
page read and write
90E000
stack
page read and write
79A2000
heap
page read and write
7CDE000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
79B7000
heap
page read and write
B56000
unkown
page execute and read and write
4B70000
direct allocation
page read and write
4BD0000
direct allocation
page read and write
15F4000
heap
page read and write
12E4000
heap
page read and write
590000
unkown
page readonly
3823000
heap
page read and write
1EFCE555000
heap
page read and write
87F0000
heap
page read and write
4EB1000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
79A2000
heap
page read and write
1150000
direct allocation
page read and write
110A000
heap
page read and write
746000
heap
page read and write
747337D000
stack
page read and write
4E86000
heap
page read and write
3EFF000
heap
page read and write
1226000
heap
page read and write
974000
heap
page read and write
129C000
heap
page read and write
3A34000
heap
page read and write
CBE000
stack
page read and write
369F000
stack
page read and write
5201000
heap
page read and write
79C5000
heap
page read and write
5100000
direct allocation
page execute and read and write
4CB0000
heap
page read and write
16DD000
heap
page read and write
4D30000
direct allocation
page execute and read and write
4E86000
heap
page read and write
15E760B0000
heap
page read and write
8F7000
unkown
page write copy
340F000
stack
page read and write
7CEE000
heap
page read and write
4B81000
heap
page read and write
77FE000
stack
page read and write
128F000
heap
page read and write
474E000
stack
page read and write
5580000
heap
page read and write
4D50000
direct allocation
page execute and read and write
393E000
stack
page read and write
49B8000
heap
page read and write
4E60000
direct allocation
page execute and read and write
4EB1000
heap
page read and write
D9B000
heap
page read and write
7C3B000
heap
page read and write
36EE000
heap
page read and write
4BF1000
heap
page read and write
5200000
heap
page read and write
4E71000
heap
page read and write
3D4F000
heap
page read and write
974000
heap
page read and write
1194000
heap
page read and write
17B8000
heap
page read and write
7F24000
heap
page read and write
16F4000
heap
page read and write
4B0E000
stack
page read and write
8423000
heap
page read and write
4C71000
heap
page read and write
11CA000
heap
page read and write
1460000
heap
page read and write
3AAE000
heap
page read and write
52B0000
direct allocation
page execute and read and write
1322000
unkown
page execute and write copy
20474813000
unkown
page read and write
4BF1000
heap
page read and write
7AA4000
heap
page read and write
7E71000
heap
page read and write
7C47000
heap
page read and write
1EFCE507000
heap
page read and write
1EFCEE0A000
heap
page read and write
FAF967E000
stack
page read and write
1193000
heap
page read and write
52D0000
heap
page read and write
7A91000
heap
page read and write
496F000
stack
page read and write
4C71000
heap
page read and write
7C3E000
heap
page read and write
160C000
heap
page read and write
7BF8000
heap
page read and write
7C27000
heap
page read and write
2AF25D6E000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
4C71000
heap
page read and write
1EFCEC38000
heap
page read and write
50C0000
direct allocation
page execute and read and write
5138178000
stack
page read and write
A4D000
unkown
page execute and read and write
479E000
stack
page read and write
3F23000
heap
page read and write
E50000
heap
page read and write
11D0000
heap
page read and write
7CDA000
heap
page read and write
76CD000
stack
page read and write
3CB4000
heap
page read and write
7AAE000
heap
page read and write
7AB4000
heap
page read and write
4B81000
heap
page read and write
52C0000
direct allocation
page execute and read and write
1248000
heap
page read and write
7C27000
heap
page read and write
19A2000
heap
page read and write
4BE1000
heap
page read and write
1EFCE55B000
heap
page read and write
1EFCE50F000
heap
page read and write
7E43000
heap
page read and write
17B8000
heap
page read and write
16FC000
stack
page read and write
4BF1000
heap
page read and write
3A3F000
stack
page read and write
8DF000
stack
page read and write
5150000
direct allocation
page execute and read and write
7A31000
heap
page read and write
54D0000
direct allocation
page execute and read and write
79F5000
heap
page read and write
11D4000
heap
page read and write
3D0B000
heap
page read and write
1EFCDC2B000
heap
page read and write
1324000
unkown
page execute and write copy
184F000
heap
page read and write
1A17000
heap
page read and write
4E8A000
heap
page read and write
458F000
stack
page read and write
12EF000
heap
page read and write
D4C000
unkown
page execute and write copy
1729000
heap
page read and write
A61000
unkown
page execute and read and write
7AA9000
heap
page read and write
C70000
heap
page read and write
1863000
heap
page read and write
3AAF000
stack
page read and write
386B000
heap
page read and write
4BF1000
heap
page read and write
2E1E000
stack
page read and write
17F8000
heap
page read and write
1452000
heap
page read and write
7CD6000
heap
page read and write
1EFCDC9B000
heap
page read and write
17CC000
heap
page read and write
1EFCE580000
heap
page read and write
448E000
stack
page read and write
19D1000
heap
page read and write
4EB1000
heap
page read and write
1875000
heap
page read and write
E45000
unkown
page execute and read and write
46BF000
stack
page read and write
18E4000
heap
page read and write
38AF000
stack
page read and write
A4D000
unkown
page execute and read and write
7CDA000
heap
page read and write
842F000
heap
page read and write
4EB1000
heap
page read and write
4E82000
heap
page read and write
7995000
heap
page read and write
20474892000
heap
page read and write
14FE000
stack
page read and write
13B5000
heap
page read and write
1224000
heap
page read and write
1EFCDBC0000
heap
page read and write
D1000
unkown
page execute read
36BA000
heap
page read and write
1EFCE552000
heap
page read and write
4E86000
heap
page read and write
48A1000
heap
page read and write
2E2D000
heap
page read and write
441E000
stack
page read and write
1EFCDD13000
heap
page read and write
7A16000
heap
page read and write
7CF5000
heap
page read and write
D44000
unkown
page execute and write copy
3F64000
heap
page read and write
18E4000
heap
page read and write
51A0000
direct allocation
page execute and read and write
8FF000
unkown
page read and write
2F3B000
stack
page read and write
4FC0000
heap
page read and write
118D000
heap
page read and write
4BF1000
heap
page read and write
7EB4000
heap
page read and write
126B000
heap
page read and write
4B81000
heap
page read and write
640000
trusted library allocation
page read and write
4D4F000
stack
page read and write
19A2000
heap
page read and write
4E86000
heap
page read and write
12B4000
heap
page read and write
1EFCEC0F000
heap
page read and write
50C0000
direct allocation
page execute and read and write
14F4000
heap
page read and write
13B4000
heap
page read and write
7C27000
heap
page read and write
D50000
unkown
page readonly
79C5000
heap
page read and write
7FD000
stack
page read and write
45DE000
stack
page read and write
4EB1000
heap
page read and write
117E000
heap
page read and write
5350000
direct allocation
page execute and read and write
79C5000
heap
page read and write
3909000
heap
page read and write
128F000
heap
page read and write
194F000
heap
page read and write
50C0000
direct allocation
page execute and read and write
1EFCEE5A000
heap
page read and write
2461000
trusted library allocation
page execute and read and write
4E88000
heap
page read and write
3841000
heap
page read and write
4E82000
heap
page read and write
7D0B000
heap
page read and write
2AF25C15000
heap
page read and write
7C40000
heap
page read and write
1087000
heap
page read and write
1EFCE594000
heap
page read and write
3CFE000
stack
page read and write
FAF85FE000
unkown
page readonly
3DB0000
heap
page read and write
11A0000
heap
page read and write
5075000
direct allocation
page read and write
6D6B000
stack
page read and write
1EFCE55B000
heap
page read and write
7EE2000
heap
page read and write
B9A000
unkown
page execute and read and write
14DA000
heap
page read and write
11D4000
heap
page read and write
1291000
heap
page read and write
1404000
heap
page read and write
11D4000
heap
page read and write
484F000
stack
page read and write
35CE000
stack
page read and write
3750000
heap
page read and write
12B4000
heap
page read and write
4B81000
heap
page read and write
FCF000
stack
page read and write
50C0000
direct allocation
page execute and read and write
18E4000
heap
page read and write
7F0F000
heap
page read and write
F90000
heap
page read and write
44DF000
stack
page read and write
1A19000
heap
page read and write
40DE000
stack
page read and write
129E000
heap
page read and write
4E10000
direct allocation
page read and write
403F000
stack
page read and write
392E000
stack
page read and write
7C8A000
heap
page read and write
5100000
direct allocation
page execute and read and write
5201000
heap
page read and write
5800000
heap
page read and write
7C31000
heap
page read and write
1475000
heap
page read and write
11AF000
heap
page read and write
76BE000
stack
page read and write
11D4000
heap
page read and write
7A90000
heap
page read and write
7C04000
heap
page read and write
5290000
direct allocation
page execute and read and write
2AF2AB30000
remote allocation
page read and write
12E4000
heap
page read and write
4E86000
heap
page read and write
1EFCE402000
heap
page read and write
85AA000
heap
page read and write
D0000
unkown
page readonly
4EB1000
heap
page read and write
4FC0000
trusted library allocation
page read and write
5520000
direct allocation
page execute and read and write
1EFCE552000
heap
page read and write
353F000
stack
page read and write
2FAF000
stack
page read and write
39BA000
heap
page read and write
1484000
heap
page read and write
182E000
heap
page read and write
20474892000
heap
page read and write
62A000
heap
page read and write
17B8000
heap
page read and write
4316000
heap
page read and write
3C95000
heap
page read and write
3A17000
heap
page read and write
4E82000
heap
page read and write
4EB1000
heap
page read and write
1EFCE555000
heap
page read and write
2FC0000
direct allocation
page read and write
537E000
stack
page read and write
3C2E000
stack
page read and write
46EE000
stack
page read and write
424E000
stack
page read and write
1377000
heap
page read and write
17D4000
heap
page read and write
134D000
stack
page read and write
14C0000
heap
page read and write
32BE000
stack
page read and write
3BEE000
stack
page read and write
7A91000
heap
page read and write
5710000
direct allocation
page execute and read and write
1220000
heap
page read and write
1EFCE581000
heap
page read and write
1EFCEE13000
heap
page read and write
5201000
heap
page read and write
FAF927E000
stack
page read and write
E5D000
unkown
page execute and write copy
EE1000
unkown
page execute and read and write
4E82000
heap
page read and write
4E82000
heap
page read and write
1335000
heap
page read and write
5070000
direct allocation
page execute and read and write
50C0000
direct allocation
page execute and read and write
2AE2977000
stack
page read and write
8409000
heap
page read and write
7BE3000
heap
page read and write
3BCE000
stack
page read and write
12F9000
heap
page read and write
1760000
heap
page read and write
144F000
stack
page read and write
79E7000
heap
page read and write
860000
unkown
page readonly
3DBF000
stack
page read and write
4E86000
heap
page read and write
51A0000
direct allocation
page execute and read and write
5760000
direct allocation
page execute and read and write
1607000
heap
page read and write
7D20000
trusted library allocation
page read and write
4BD0000
direct allocation
page read and write
4E71000
heap
page read and write
62A5000
heap
page read and write
48A1000
heap
page read and write
5801000
direct allocation
page read and write
3ED8000
heap
page read and write
1EFCE553000
heap
page read and write
4E86000
heap
page read and write
1EFCEC66000
heap
page read and write
4E84000
heap
page read and write
5110000
direct allocation
page execute and read and write
6E0000
heap
page read and write
87E1000
heap
page read and write
32CE000
stack
page read and write
51E0000
direct allocation
page execute and read and write
17D4000
heap
page read and write
7ABC000
heap
page read and write
1EFCE50F000
heap
page read and write
A50000
direct allocation
page read and write
4CD0000
direct allocation
page read and write
3A34000
heap
page read and write
1470000
heap
page read and write
168F000
heap
page read and write
7AA4000
heap
page read and write
8825000
heap
page read and write
D4F000
unkown
page execute and read and write
407E000
stack
page read and write
7EC4000
heap
page read and write
4C60000
direct allocation
page read and write
4B81000
heap
page read and write
50C0000
direct allocation
page execute and read and write
7C14000
heap
page read and write
527D000
stack
page read and write
381A000
heap
page read and write
4E82000
heap
page read and write
54E0000
direct allocation
page execute and read and write
179D000
heap
page read and write
7A70000
remote allocation
page read and write
1402000
heap
page read and write
456E000
stack
page read and write
367E000
stack
page read and write
4E82000
heap
page read and write
4E8A000
heap
page read and write
1A68000
heap
page read and write
1192000
unkown
page execute and write copy
1EFCE530000
heap
page read and write
D43000
unkown
page execute and read and write
7F50000
trusted library allocation
page read and write
57A0000
direct allocation
page execute and read and write
4C71000
heap
page read and write
4306000
heap
page read and write
5160000
direct allocation
page execute and read and write
125F000
heap
page read and write
4C60000
direct allocation
page read and write
7AC1000
heap
page read and write
3AFC000
heap
page read and write
3CC8000
heap
page read and write
2AF25D5C000
heap
page read and write
154F000
heap
page read and write
38B5000
heap
page read and write
1EFCE531000
heap
page read and write
49CE000
stack
page read and write
5201000
heap
page read and write
4EB1000
heap
page read and write
79F8000
heap
page read and write
D70000
direct allocation
page read and write
16FA000
heap
page read and write
1EFCECA3000
heap
page read and write
341F000
stack
page read and write
3F15000
heap
page read and write
7CD5000
heap
page read and write
4B81000
heap
page read and write
15A0000
heap
page read and write
1EFCDD4C000
heap
page read and write
5130000
direct allocation
page execute and read and write
7C73000
heap
page read and write
1402000
heap
page read and write
38EC000
heap
page read and write
39C5000
heap
page read and write
14E8000
heap
page read and write
1EFCE530000
heap
page read and write
1351000
heap
page read and write
8B0000
heap
page read and write
4B81000
heap
page read and write
529E000
stack
page read and write
5100000
direct allocation
page read and write
2AF2ACF7000
heap
page read and write
620000
trusted library allocation
page read and write
85A9000
heap
page read and write
7AA1000
heap
page read and write
749F000
heap
page read and write
2AF2B010000
heap
page read and write
11B4000
heap
page read and write
12E4000
heap
page read and write
56E0000
heap
page read and write
17F8000
heap
page read and write
1EFCE57C000
heap
page read and write
7D0B000
heap
page read and write
3DFF000
stack
page read and write
8290000
trusted library allocation
page read and write
4E88000
heap
page read and write
7A13000
heap
page read and write
134C000
heap
page read and write
7A91000
heap
page read and write
5040000
direct allocation
page execute and read and write
974000
heap
page read and write
644C000
stack
page read and write
10BB000
heap
page read and write
EE1000
unkown
page execute and write copy
1511000
heap
page read and write
4E84000
heap
page read and write
7C3B000
heap
page read and write
1EFCEE48000
heap
page read and write
4C70000
heap
page read and write
1EFCE52A000
heap
page read and write
16DF000
heap
page read and write
4EB1000
heap
page read and write
370B000
heap
page read and write
7CD6000
heap
page read and write
12E4000
heap
page read and write
7F09000
heap
page read and write
16EB000
heap
page read and write
794F000
stack
page read and write
242E000
stack
page read and write
8310000
trusted library allocation
page read and write
13E8000
heap
page read and write
56A0000
direct allocation
page execute and read and write
16E9000
heap
page read and write
4E82000
heap
page read and write
12DC000
heap
page read and write
1EFCE513000
heap
page read and write
11B7000
heap
page read and write
34DF000
stack
page read and write
4B81000
heap
page read and write
1EFCE508000
heap
page read and write
398E000
stack
page read and write
4A70000
direct allocation
page read and write
1126000
heap
page read and write
13AF000
heap
page read and write
4E86000
heap
page read and write
50C0000
direct allocation
page execute and read and write
7F50000
trusted library allocation
page read and write
2AF2ACC5000
heap
page read and write
198D000
heap
page read and write
2AF2AD02000
heap
page read and write
52B0000
trusted library allocation
page read and write
A1D000
stack
page read and write
8AD000
unkown
page execute and read and write
56A0000
direct allocation
page execute and read and write
4E7E000
stack
page read and write
3E86000
heap
page read and write
85BD000
heap
page read and write
7C64000
heap
page read and write
7CDC000
heap
page read and write
4E71000
heap
page read and write
7BF8000
heap
page read and write
4E86000
heap
page read and write
14BF000
unkown
page execute and read and write
3ECC000
heap
page read and write
2AE2E7E000
stack
page read and write
5350000
direct allocation
page execute and read and write
4E84000
heap
page read and write
4E88000
heap
page read and write
784F000
stack
page read and write
4B81000
heap
page read and write
4B70000
direct allocation
page read and write
1EFCE55A000
heap
page read and write
7CEC000
heap
page read and write
3859000
heap
page read and write
1A0F000
heap
page read and write
1EFCE592000
heap
page read and write
7C3B000
heap
page read and write
7AA9000
heap
page read and write
1EFCE56E000
heap
page read and write
1168000
heap
page read and write
452F000
stack
page read and write
7ABD000
heap
page read and write
42E6000
heap
page read and write
513897C000
stack
page read and write
38FF000
stack
page read and write
4E9D000
stack
page read and write
168E000
heap
page read and write
4ABE000
stack
page read and write
140C000
heap
page read and write
4BF1000
heap
page read and write
1EFCE510000
heap
page read and write
1EFCE55A000
heap
page read and write
3944000
heap
page read and write
1EFCE531000
heap
page read and write
4C71000
heap
page read and write
F14000
heap
page read and write
4C71000
heap
page read and write
7C31000
heap
page read and write
1543000
heap
page read and write
7A0A000
heap
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
422E000
stack
page read and write
1638000
heap
page read and write
2AF25413000
heap
page read and write
4D50000
direct allocation
page execute and read and write
7BD6000
heap
page read and write
79A2000
heap
page read and write
184C000
heap
page read and write
1EFCE57A000
heap
page read and write
7CE0000
heap
page read and write
12B0000
heap
page read and write
4C71000
heap
page read and write
1EFCEC99000
heap
page read and write
170A000
heap
page read and write
1080000
heap
page read and write
1331000
heap
page read and write
4C71000
heap
page read and write
2AE2EFB000
stack
page read and write
7A16000
heap
page read and write
52A0000
direct allocation
page execute and read and write
334E000
stack
page read and write
1323000
unkown
page execute and write copy
1729000
heap
page read and write
3837000
heap
page read and write
EE0000
unkown
page readonly
40CE000
stack
page read and write
1343000
heap
page read and write
7E46000
heap
page read and write
11D4000
heap
page read and write
1EFCE531000
heap
page read and write
17C6000
heap
page read and write
2AF25B40000
trusted library allocation
page read and write
2AF2A990000
trusted library allocation
page read and write
4C60000
direct allocation
page read and write
10000
unkown
page readonly
974000
heap
page read and write
8410000
heap
page read and write
3684000
heap
page read and write
1EFCDD02000
heap
page read and write
7C9E000
stack
page read and write
3CBF000
stack
page read and write
1539000
heap
page read and write
4EB1000
heap
page read and write
3E74000
heap
page read and write
18E4000
heap
page read and write
4E84000
heap
page read and write
3DFE000
stack
page read and write
491E000
stack
page read and write
4D80000
direct allocation
page execute and read and write
7AB8000
heap
page read and write
1265000
heap
page read and write
1643000
heap
page read and write
1257000
heap
page read and write
79F8000
heap
page read and write
4A7F000
stack
page read and write
5020000
direct allocation
page execute and read and write
134C000
heap
page read and write
106D000
unkown
page execute and read and write
7C0E000
stack
page read and write
113E000
heap
page read and write
7C31000
heap
page read and write
8825000
heap
page read and write
54D0000
direct allocation
page execute and read and write
4E30000
direct allocation
page execute and read and write
842F000
heap
page read and write
5840000
remote allocation
page read and write
77BD000
stack
page read and write
1A15000
heap
page read and write
5340000
direct allocation
page read and write
1653000
heap
page read and write
4E84000
heap
page read and write
361F000
stack
page read and write
4EB1000
heap
page read and write
4B81000
heap
page read and write
4B70000
direct allocation
page read and write
2E0F000
stack
page read and write
183E000
stack
page read and write
974000
heap
page read and write
44B0000
heap
page read and write
7BF8000
heap
page read and write
770000
unkown
page read and write
1979000
heap
page read and write
4EB1000
heap
page read and write
791000
unkown
page execute and read and write
7AAA000
heap
page read and write
7F00000
heap
page read and write
8AD000
unkown
page execute and read and write
192000
unkown
page readonly
2AF25BD1000
trusted library allocation
page read and write
3EBA000
heap
page read and write
306E000
stack
page read and write
50C0000
direct allocation
page execute and read and write
FAF907E000
stack
page read and write
18EE000
heap
page read and write
525000
heap
page read and write
79B7000
heap
page read and write
1979000
heap
page read and write
1150000
direct allocation
page read and write
3E4F000
stack
page read and write
5020000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
1EFCE552000
heap
page read and write
7EA2000
heap
page read and write
974000
heap
page read and write
20474D02000
heap
page read and write
4E1F000
stack
page read and write
4E8A000
heap
page read and write
10A4000
heap
page read and write
39F0000
heap
page read and write
1428000
heap
page read and write
4EB1000
heap
page read and write
3A6A000
heap
page read and write
1EFCE529000
heap
page read and write
3E4F000
heap
page read and write
11D4000
heap
page read and write
151C000
heap
page read and write
1EFCE508000
heap
page read and write
1761000
heap
page read and write
7F0A000
heap
page read and write
222A85C0000
heap
page read and write
4E82000
heap
page read and write
138C000
heap
page read and write
6F7E000
stack
page read and write
51A0000
remote allocation
page read and write
4A70000
direct allocation
page read and write
185B000
heap
page read and write
36EF000
heap
page read and write
4EB1000
heap
page read and write
6895000
heap
page read and write
2AF2A991000
trusted library allocation
page read and write
4BF1000
heap
page read and write
634000
trusted library allocation
page read and write
4E88000
heap
page read and write
4A70000
direct allocation
page read and write
B9A000
unkown
page execute and read and write
56A0000
direct allocation
page execute and read and write
308E000
stack
page read and write
154E000
stack
page read and write
5350000
direct allocation
page execute and read and write
5201000
direct allocation
page read and write
7CDB000
heap
page read and write
1224000
heap
page read and write
8423000
heap
page read and write
3949000
heap
page read and write
158F000
stack
page read and write
15CE000
stack
page read and write
14CA000
heap
page read and write
7AA4000
heap
page read and write
4EB1000
heap
page read and write
4B81000
heap
page read and write
4E86000
heap
page read and write
1441000
heap
page read and write
7A16000
heap
page read and write
312F000
stack
page read and write
47FE000
stack
page read and write
1EFCE57F000
heap
page read and write
1A40000
direct allocation
page read and write
357E000
stack
page read and write
62A5000
heap
page read and write
1EFCED12000
heap
page read and write
7C5B000
heap
page read and write
56A0000
direct allocation
page execute and read and write
4EF0000
direct allocation
page execute and read and write
521D000
stack
page read and write
4EB1000
heap
page read and write
515E000
stack
page read and write
420F000
stack
page read and write
133F000
heap
page read and write
B79000
unkown
page execute and read and write
3650000
heap
page read and write
7ABD000
heap
page read and write
37FA000
heap
page read and write
1140000
heap
page read and write
4BE1000
heap
page read and write
A8D000
unkown
page execute and read and write
87F4000
heap
page read and write
79E2000
heap
page read and write
BB2000
unkown
page execute and write copy
222A9DF0000
heap
page read and write
3CA8000
heap
page read and write
7A9C000
heap
page read and write
36D4000
heap
page read and write
1224000
heap
page read and write
4E82000
heap
page read and write
1EFCE50F000
heap
page read and write
144D000
heap
page read and write
1224000
heap
page read and write
7C47000
heap
page read and write
3AAF000
heap
page read and write
4E82000
heap
page read and write
488E000
stack
page read and write
12E4000
heap
page read and write
7CDA000
heap
page read and write
4D50000
direct allocation
page execute and read and write
363F000
stack
page read and write
145C000
heap
page read and write
2FC0000
direct allocation
page read and write
EE3000
unkown
page write copy
4B81000
heap
page read and write
7E4D000
heap
page read and write
378F000
heap
page read and write
4E82000
heap
page read and write
7A19000
heap
page read and write
7E62000
heap
page read and write
7AB8000
heap
page read and write
E18000
unkown
page execute and read and write
4C80000
trusted library allocation
page read and write
BA7000
unkown
page write copy
7EC4000
heap
page read and write
9E0000
heap
page read and write
7AB8000
heap
page read and write
2EFF000
stack
page read and write
1EFCE573000
heap
page read and write
3A1E000
stack
page read and write
7F50000
trusted library allocation
page read and write
3AF3000
trusted library allocation
page read and write
7F5E000
stack
page read and write
7F50000
trusted library allocation
page read and write
134C000
heap
page read and write
1EFCEC4B000
heap
page read and write
12CB000
heap
page read and write
39D3000
heap
page read and write
12B4000
heap
page read and write
7BF9000
heap
page read and write
1FBC2E13000
heap
page read and write
51D0000
direct allocation
page execute and read and write
547E000
stack
page read and write
842F000
heap
page read and write
1EFCE508000
heap
page read and write
12E4000
heap
page read and write
4E84000
heap
page read and write
7A16000
heap
page read and write
4BF1000
heap
page read and write
118A000
heap
page read and write
18E4000
heap
page read and write
482F000
stack
page read and write
1779000
heap
page read and write
17F0000
heap
page read and write
5340000
direct allocation
page execute and read and write
4E82000
heap
page read and write
1403000
heap
page read and write
1EFCEE12000
heap
page read and write
12AE000
stack
page read and write
4E88000
heap
page read and write
7CD6000
heap
page read and write
531E000
stack
page read and write
4EB1000
heap
page read and write
E3E000
stack
page read and write
3ACE000
stack
page read and write
7AB8000
heap
page read and write
4BF1000
heap
page read and write
591000
unkown
page execute and write copy
4E88000
heap
page read and write
7A11000
heap
page read and write
169A000
heap
page read and write
4C40000
heap
page read and write
1272000
heap
page read and write
4E8A000
heap
page read and write
2C4F000
stack
page read and write
7C3B000
heap
page read and write
38CF000
stack
page read and write
12FD000
heap
page read and write
1EFCEE16000
heap
page read and write
4EB1000
heap
page read and write
50C0000
direct allocation
page execute and read and write
2AF2A99E000
trusted library allocation
page read and write
1224000
heap
page read and write
EE0000
heap
page read and write
56A0000
direct allocation
page execute and read and write
4B81000
heap
page read and write
4F00000
direct allocation
page execute and read and write
19A2000
heap
page read and write
14A7000
heap
page read and write
4EB1000
heap
page read and write
4B81000
heap
page read and write
EE3000
unkown
page write copy
7CE3000
heap
page read and write
48EF000
stack
page read and write
8827000
heap
page read and write
7C0B000
heap
page read and write
4BE1000
heap
page read and write
14CC000
heap
page read and write
3EAE000
stack
page read and write
1864000
heap
page read and write
3E0E000
stack
page read and write
1704000
heap
page read and write
15E75FA0000
heap
page read and write
38FD000
heap
page read and write
110E000
heap
page read and write
43C000
stack
page read and write
4C60000
direct allocation
page read and write
6FD3000
heap
page read and write
7F24000
heap
page read and write
1AB3000
heap
page read and write
448F000
stack
page read and write
1EFCE576000
heap
page read and write
7E4D000
heap
page read and write
ED2000
unkown
page execute and read and write
51A0000
direct allocation
page execute and read and write
5310000
direct allocation
page read and write
79D0000
heap
page read and write
7AB8000
heap
page read and write
87FC000
heap
page read and write
4EB1000
heap
page read and write
1A06000
heap
page read and write
15E760A0000
trusted library allocation
page read and write
8825000
heap
page read and write
42D7000
heap
page read and write
7CE3000
heap
page read and write
2AF25513000
heap
page read and write
1EFCE55A000
heap
page read and write
1A40000
direct allocation
page read and write
5510000
direct allocation
page execute and read and write
4E88000
heap
page read and write
3B5E000
stack
page read and write
7C48000
heap
page read and write
19D1000
heap
page read and write
7EAC000
heap
page read and write
18E4000
heap
page read and write
8409000
heap
page read and write
1224000
heap
page read and write
38E0000
trusted library allocation
page read and write
484E000
stack
page read and write
204747E0000
heap
page read and write
8C4F000
heap
page read and write
3D0F000
stack
page read and write
1931000
heap
page read and write
11EF000
heap
page read and write
4B81000
heap
page read and write
1782000
heap
page read and write
79B8000
heap
page read and write
5078000
direct allocation
page read and write
7C58000
heap
page read and write
7CF8000
heap
page read and write
7C76000
heap
page read and write
490000
heap
page read and write
17F2000
heap
page read and write
3902000
trusted library allocation
page read and write
85E0000
trusted library allocation
page read and write
79E2000
heap
page read and write
16D7000
heap
page read and write
50F0000
direct allocation
page execute and read and write
7A19000
heap
page read and write
2047483E000
heap
page read and write
4EB1000
heap
page read and write
4BF1000
heap
page read and write
446F000
stack
page read and write
1EFCE508000
heap
page read and write
1EFCE56E000
heap
page read and write
4A10000
trusted library allocation
page read and write
7CE0000
heap
page read and write
39FF000
stack
page read and write
50C0000
direct allocation
page execute and read and write
4EB1000
heap
page read and write
4EB1000
heap
page read and write
2AF2A980000
trusted library allocation
page read and write
2AF2AC60000
heap
page read and write
38E8000
trusted library allocation
page read and write
1EFCE578000
heap
page read and write
146C000
heap
page read and write
4BF1000
heap
page read and write
2AF2A943000
trusted library allocation
page read and write
7CD0000
remote allocation
page read and write
54EF000
stack
page read and write
3509000
heap
page read and write
5F7000
unkown
page read and write
5840000
remote allocation
page read and write
7C3E000
heap
page read and write
1EFCE557000
heap
page read and write
7CE0000
heap
page read and write
4B81000
heap
page read and write
1396000
heap
page read and write
85B6000
heap
page read and write
7C3B000
heap
page read and write
707E000
stack
page read and write
51F0000
direct allocation
page execute and read and write
18E4000
heap
page read and write
7C47000
heap
page read and write
79C5000
heap
page read and write
36BE000
stack
page read and write
771000
unkown
page execute and write copy
4EB1000
heap
page read and write
4EB1000
heap
page read and write
C72000
stack
page read and write
1D5F000
stack
page read and write
5120000
direct allocation
page execute and read and write
8C8000
unkown
page execute and read and write
143B000
heap
page read and write
555E000
stack
page read and write
D27000
unkown
page execute and write copy
1EFCE530000
heap
page read and write
4E82000
heap
page read and write
7EA2000
heap
page read and write
7AA9000
heap
page read and write
431F000
stack
page read and write
4BF1000
heap
page read and write
974000
heap
page read and write
3DDF000
heap
page read and write
308F000
stack
page read and write
13C1000
heap
page read and write
7E49000
heap
page read and write
3E8F000
heap
page read and write
4E86000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
1EFCE529000
heap
page read and write
EC0000
heap
page read and write
7B5E000
stack
page read and write
1224000
heap
page read and write
4BE1000
heap
page read and write
FDB000
stack
page read and write
4EB1000
heap
page read and write
4EB1000
heap
page read and write
5090000
direct allocation
page execute and read and write
48A1000
heap
page read and write
57FE000
stack
page read and write
222A83BB000
heap
page read and write
7C4C000
heap
page read and write
126F000
heap
page read and write
1163000
heap
page read and write
1D80000
direct allocation
page execute and read and write
7BE4000
heap
page read and write
4E8A000
heap
page read and write
525F000
stack
page read and write
7A12000
heap
page read and write
7A1C000
heap
page read and write
8AE000
unkown
page execute and write copy
7C31000
heap
page read and write
4E71000
heap
page read and write
7C5F000
heap
page read and write
13E5000
heap
page read and write
10A5000
heap
page read and write
10AB000
heap
page read and write
4B81000
heap
page read and write
12E5000
heap
page read and write
4B81000
heap
page read and write
1517000
heap
page read and write
7EE2000
heap
page read and write
7C65000
heap
page read and write
1A93000
heap
page read and write
465F000
stack
page read and write
3D3A000
heap
page read and write
1EFCE535000
heap
page read and write
2AF2548C000
heap
page read and write
7A91000
heap
page read and write
788E000
stack
page read and write
11F8000
heap
page read and write
7E62000
heap
page read and write
7CE7000
heap
page read and write
46CE000
stack
page read and write
1224000
heap
page read and write
4B81000
heap
page read and write
1EFCE532000
heap
page read and write
38BD000
heap
page read and write
4E8A000
heap
page read and write
513877E000
stack
page read and write
4EB1000
heap
page read and write
484F000
stack
page read and write
1249000
heap
page read and write
4E8A000
heap
page read and write
79E2000
heap
page read and write
16C000
unkown
page readonly
5360000
direct allocation
page execute and read and write
1EFCEE12000
heap
page read and write
52C0000
direct allocation
page execute and read and write
7EF1000
heap
page read and write
1D97000
heap
page read and write
FAF95FE000
unkown
page readonly
85B0000
heap
page read and write
4BF1000
heap
page read and write
8825000
heap
page read and write
7C48000
heap
page read and write
11BD000
heap
page read and write
11D4000
heap
page read and write
3A8F000
stack
page read and write
7A95000
heap
page read and write
1192000
unkown
page execute and write copy
4E50000
direct allocation
page execute and read and write
1EFCE508000
heap
page read and write
1EFCE57A000
heap
page read and write
7F1F000
stack
page read and write
D4F000
unkown
page execute and read and write
7A93000
heap
page read and write
192000
unkown
page readonly
79B7000
heap
page read and write
7EE2000
heap
page read and write
56D0000
direct allocation
page execute and read and write
131A000
heap
page read and write
7C27000
heap
page read and write
393E000
stack
page read and write
1EFCEE64000
heap
page read and write
3D4E000
stack
page read and write
4C71000
heap
page read and write
1538000
heap
page read and write
3F08000
heap
page read and write
4BAF000
stack
page read and write
4C71000
heap
page read and write
435E000
stack
page read and write
12B4000
heap
page read and write
128F000
heap
page read and write
7A28000
heap
page read and write
A00000
unkown
page readonly
F90000
heap
page read and write
386A000
heap
page read and write
1EFCE529000
heap
page read and write
5120000
direct allocation
page execute and read and write
4EBE000
stack
page read and write
2B4F000
stack
page read and write
52F0000
direct allocation
page execute and read and write
443F000
stack
page read and write
7AC1000
heap
page read and write
1EFCECA0000
heap
page read and write
4E82000
heap
page read and write
482E000
stack
page read and write
79E1000
heap
page read and write
4C71000
heap
page read and write
3848000
heap
page read and write
3CC0000
heap
page read and write
A50000
direct allocation
page read and write
4BE1000
heap
page read and write
11F7000
heap
page read and write
4F40000
direct allocation
page execute and read and write
2FDE000
stack
page read and write
480E000
stack
page read and write
6D01000
heap
page read and write
98D000
stack
page read and write
135D000
heap
page read and write
7C27000
heap
page read and write
1324000
heap
page read and write
375B000
heap
page read and write
3EDD000
stack
page read and write
8AD000
unkown
page execute and write copy
51C0000
direct allocation
page execute and read and write
1411000
heap
page read and write
1240000
heap
page read and write
11D4000
heap
page read and write
1264000
heap
page read and write
1EFCE531000
heap
page read and write
311E000
stack
page read and write
5170000
direct allocation
page execute and read and write
4EB1000
heap
page read and write
7C0B000
heap
page read and write
1224000
heap
page read and write
4EC1000
heap
page read and write
4B81000
heap
page read and write
50C0000
direct allocation
page execute and read and write
11A9000
heap
page read and write
1A2E000
stack
page read and write
307E000
stack
page read and write
5330000
direct allocation
page execute and read and write
16ED000
heap
page read and write
15E760A0000
trusted library allocation
page read and write
1EFCEE05000
heap
page read and write
5080000
direct allocation
page read and write
3D7B000
heap
page read and write
7A72000
heap
page read and write
1EFCE563000
heap
page read and write
2F4E000
stack
page read and write
EE0000
unkown
page read and write
4B90000
heap
page read and write
308E000
stack
page read and write
7C31000
heap
page read and write
1907000
heap
page read and write
F8E000
stack
page read and write
893B000
heap
page read and write
3961000
heap
page read and write
7AA4000
heap
page read and write
85D9000
heap
page read and write
D49000
unkown
page execute and write copy
7E4D000
heap
page read and write
B40000
unkown
page read and write
52E0000
direct allocation
page execute and read and write
7C3B000
heap
page read and write
2C0F000
stack
page read and write
1405000
heap
page read and write
332E000
stack
page read and write
1EFCDD02000
heap
page read and write
747377E000
stack
page read and write
7AA4000
heap
page read and write
1329000
unkown
page execute and write copy
AC6000
heap
page read and write
3936000
heap
page read and write
1AD2000
heap
page read and write
1544000
heap
page read and write
30AE000
stack
page read and write
7A16000
heap
page read and write
490E000
stack
page read and write
1EFCEE0F000
heap
page read and write
7AA4000
heap
page read and write
1EFCE531000
heap
page read and write
1EFCDCAA000
heap
page read and write
A50000
direct allocation
page read and write
3EBA000
heap
page read and write
89F000
unkown
page execute and read and write
F14000
heap
page read and write
37EE000
heap
page read and write
188A000
heap
page read and write
18E4000
heap
page read and write
7A9B000
heap
page read and write
4F10000
direct allocation
page execute and read and write
4E88000
heap
page read and write
5020000
trusted library allocation
page read and write
EDF000
unkown
page read and write
7CD1000
heap
page read and write
7F24000
heap
page read and write
17DA000
heap
page read and write
1A4000
unkown
page readonly
1324000
heap
page read and write
7C3E000
heap
page read and write
F00000
direct allocation
page read and write
4E86000
heap
page read and write
300F000
stack
page read and write
222A8397000
heap
page read and write
5220000
direct allocation
page execute and read and write
33DE000
stack
page read and write
12E4000
heap
page read and write
69DF000
stack
page read and write
53B1000
direct allocation
page read and write
F14000
heap
page read and write
1A40000
direct allocation
page read and write
7EC4000
heap
page read and write
7CE0000
heap
page read and write
1EFCE508000
heap
page read and write
20474C13000
heap
page read and write
12E4000
heap
page read and write
132C000
unkown
page execute and write copy
FAF9EFB000
stack
page read and write
39C4000
heap
page read and write
426E000
stack
page read and write
14BF000
unkown
page execute and read and write
1EFCEC4F000
heap
page read and write
20474C02000
heap
page read and write
143E000
heap
page read and write
7E44000
heap
page read and write
F00000
direct allocation
page read and write
4E84000
heap
page read and write
5100000
direct allocation
page execute and read and write
1067000
unkown
page write copy
53DE000
stack
page read and write
173D000
heap
page read and write
4E86000
heap
page read and write
20474D00000
heap
page read and write
1323000
heap
page read and write
513867E000
unkown
page readonly
7472DEB000
stack
page read and write
1760000
heap
page read and write
79EC000
heap
page read and write
420E000
stack
page read and write
7E47000
heap
page read and write
1EFCE592000
heap
page read and write
87FC000
heap
page read and write
38BD000
heap
page read and write
356F000
stack
page read and write
50C0000
direct allocation
page execute and read and write
188A000
heap
page read and write
11D4000
heap
page read and write
37F8000
heap
page read and write
1733000
heap
page read and write
4E8A000
heap
page read and write
3EFF000
stack
page read and write
7BF8000
heap
page read and write
12E6000
heap
page read and write
70BB000
stack
page read and write
714000
heap
page read and write
5E0000
heap
page read and write
5020000
direct allocation
page execute and read and write
7EE2000
heap
page read and write
4E84000
heap
page read and write
18E4000
heap
page read and write
420F000
stack
page read and write
1EFCEE0A000
heap
page read and write
1EFCE552000
heap
page read and write
1754000
heap
page read and write
4B70000
direct allocation
page read and write
2FC0000
direct allocation
page read and write
5020000
direct allocation
page execute and read and write
7AA4000
heap
page read and write
D28000
unkown
page execute and write copy
4BF1000
heap
page read and write
444E000
stack
page read and write
156F000
heap
page read and write
4D90000
direct allocation
page execute and read and write
7C88000
heap
page read and write
4304000
heap
page read and write
3873000
heap
page read and write
3667000
heap
page read and write
3DCE000
heap
page read and write
4E88000
heap
page read and write
1263000
heap
page read and write
1EFCDD4C000
heap
page read and write
38FA000
trusted library allocation
page read and write
4E82000
heap
page read and write
1EFCE57F000
heap
page read and write
4EB0000
heap
page read and write
1426000
heap
page read and write
3684000
heap
page read and write
974000
heap
page read and write
4C71000
heap
page read and write
2AF254FE000
heap
page read and write
1EFCE531000
heap
page read and write
56A0000
direct allocation
page execute and read and write
5078000
direct allocation
page read and write
2B9E000
stack
page read and write
4E8A000
heap
page read and write
12B4000
heap
page read and write
3D80000
heap
page read and write
101E000
stack
page read and write
3D2F000
stack
page read and write
19A2000
heap
page read and write
1910000
heap
page read and write
4E86000
heap
page read and write
7C0B000
heap
page read and write
79D0000
heap
page read and write
4E86000
heap
page read and write
7BE1000
heap
page read and write
12B4000
heap
page read and write
4B3E000
stack
page read and write
B56000
unkown
page execute and read and write
402F000
stack
page read and write
1476000
heap
page read and write
1182000
unkown
page execute and read and write
1EFCE508000
heap
page read and write
112E000
heap
page read and write
2AF2AB30000
remote allocation
page read and write
132C000
unkown
page execute and write copy
7CE9000
heap
page read and write
33AF000
stack
page read and write
3E63000
heap
page read and write
368F000
stack
page read and write
1F96000
heap
page read and write
13B0000
heap
page read and write
4EB1000
heap
page read and write
6E3B000
stack
page read and write
4BF1000
heap
page read and write
5090000
heap
page read and write
4E82000
heap
page read and write
138A000
heap
page read and write
4BE1000
heap
page read and write
1706000
heap
page read and write
358F000
stack
page read and write
2FC0000
direct allocation
page read and write
79D0000
heap
page read and write
138B000
heap
page read and write
4B81000
heap
page read and write
386B000
heap
page read and write
140E000
heap
page read and write
1785000
heap
page read and write
4E84000
heap
page read and write
990000
heap
page read and write
1FBC2E00000
heap
page read and write
1819000
heap
page read and write
46CF000
stack
page read and write
770000
unkown
page read and write
ED4000
unkown
page execute and write copy
3651000
heap
page read and write
FAF8EFB000
stack
page read and write
1EFCE530000
heap
page read and write
A00000
unkown
page read and write
7F0A000
heap
page read and write
36C4000
heap
page read and write
7C67000
heap
page read and write
5078000
direct allocation
page read and write
4E82000
heap
page read and write
12DC000
heap
page read and write
4E86000
heap
page read and write
970000
heap
page read and write
2AF2AB30000
remote allocation
page read and write
7CE9000
heap
page read and write
5080000
direct allocation
page read and write
11D4000
heap
page read and write
79E2000
heap
page read and write
5100000
direct allocation
page read and write
38F4000
heap
page read and write
1073000
unkown
page write copy
4F00000
direct allocation
page execute and read and write
7BE2000
heap
page read and write
12B4000
heap
page read and write
4E82000
heap
page read and write
7C31000
heap
page read and write
D40000
direct allocation
page read and write
124D000
heap
page read and write
4EB1000
heap
page read and write
14B3000
heap
page read and write
53A0000
direct allocation
page execute and read and write
89F000
unkown
page execute and read and write
7B28000
heap
page read and write
4EB1000
heap
page read and write
10B2000
heap
page read and write
222A83C5000
heap
page read and write
FAF957E000
stack
page read and write
4D50000
direct allocation
page execute and read and write
143F000
heap
page read and write
3C0E000
stack
page read and write
15E760C0000
trusted library allocation
page read and write
580000
heap
page read and write
78BE000
stack
page read and write
1193000
unkown
page execute and write copy
6C60000
heap
page read and write
3CAA000
heap
page read and write
7AAA000
heap
page read and write
13E7000
heap
page read and write
1EFCEC53000
heap
page read and write
2AF2A9C0000
trusted library allocation
page read and write
1794000
heap
page read and write
F00000
direct allocation
page read and write
4ED0000
direct allocation
page execute and read and write
4B81000
heap
page read and write
48A1000
heap
page read and write
781E000
stack
page read and write
4B81000
heap
page read and write
D28000
unkown
page execute and write copy
53B0000
direct allocation
page execute and read and write
4FA0000
direct allocation
page execute and read and write
14B5000
heap
page read and write
2E6E000
stack
page read and write
F00000
direct allocation
page read and write
52BE000
stack
page read and write
71FD000
stack
page read and write
4E82000
heap
page read and write
4EB1000
heap
page read and write
4E86000
heap
page read and write
7E1D000
stack
page read and write
79C5000
heap
page read and write
117A000
unkown
page execute and read and write
4C71000
heap
page read and write
12E8000
heap
page read and write
4B81000
heap
page read and write
1414000
heap
page read and write
4E84000
heap
page read and write
A38A0FF000
stack
page read and write
3ED1000
heap
page read and write
1EFCE559000
heap
page read and write
4B81000
heap
page read and write
13DB000
heap
page read and write
C69000
stack
page read and write
7C3B000
heap
page read and write
48A1000
heap
page read and write
1433000
heap
page read and write
4E88000
heap
page read and write
16D6000
heap
page read and write
7C4A000
heap
page read and write
342E000
stack
page read and write
399E000
heap
page read and write
3A61000
heap
page read and write
4EB1000
heap
page read and write
12DC000
heap
page read and write
4C71000
heap
page read and write
12E7000
heap
page read and write
7BE2000
heap
page read and write
692F000
stack
page read and write
17D4000
heap
page read and write
7CD1000
heap
page read and write
1224000
heap
page read and write
87E1000
heap
page read and write
79C5000
heap
page read and write
3CC2000
heap
page read and write
1EFCED02000
heap
page read and write
3786000
heap
page read and write
12E4000
heap
page read and write
4B81000
heap
page read and write
1EFCE507000
heap
page read and write
4B81000
heap
page read and write
31F0000
direct allocation
page read and write
4EB1000
heap
page read and write
7AA9000
heap
page read and write
1EFCEE74000
heap
page read and write
1EFCDD4C000
heap
page read and write
146E000
heap
page read and write
4E80000
direct allocation
page execute and read and write
2AF25C00000
heap
page read and write
1224000
heap
page read and write
4E82000
heap
page read and write
39BA000
heap
page read and write
15E75FE0000
heap
page read and write
158F000
heap
page read and write
4E84000
heap
page read and write
3F1E000
stack
page read and write
36EF000
stack
page read and write
304F000
stack
page read and write
10B2000
heap
page read and write
EE4000
unkown
page execute and read and write
2AF2AC4C000
heap
page read and write
106C000
unkown
page read and write
7CEC000
heap
page read and write
5320000
direct allocation
page execute and read and write
8A4C000
stack
page read and write
85BD000
heap
page read and write
5690000
direct allocation
page execute and read and write
D32000
unkown
page execute and read and write
382D000
heap
page read and write
8825000
heap
page read and write
7A19000
heap
page read and write
4B81000
heap
page read and write
2AE29FE000
stack
page read and write
176A000
heap
page read and write
3FCE000
stack
page read and write
4B81000
heap
page read and write
7C3B000
heap
page read and write
1FBC2E02000
heap
page read and write
48BE000
stack
page read and write
2AF265A0000
trusted library section
page readonly
1EFCE3B0000
remote allocation
page read and write
4AFF000
stack
page read and write
79D0000
heap
page read and write
4EB1000
heap
page read and write
3921000
heap
page read and write
3909000
heap
page read and write
318E000
stack
page read and write
3CAF000
stack
page read and write
2AF25D1B000
heap
page read and write
1EFCE530000
heap
page read and write
4EB1000
heap
page read and write
974000
heap
page read and write
4E84000
heap
page read and write
192000
unkown
page readonly
1EFCEC4F000
heap
page read and write
11D4000
heap
page read and write
4C71000
heap
page read and write
3F27000
heap
page read and write
15E760C0000
trusted library allocation
page read and write
12000
unkown
page readonly
1A19000
heap
page read and write
1EFCEC02000
heap
page read and write
7ABD000
heap
page read and write
3F30000
heap
page read and write
41EF000
stack
page read and write
7A60000
remote allocation
page read and write
1EFCE594000
heap
page read and write
35AF000
stack
page read and write
79C5000
heap
page read and write
682F000
stack
page read and write
7E42000
heap
page read and write
D4C000
unkown
page execute and write copy
36BA000
heap
page read and write
1EFCEC71000
heap
page read and write
7E49000
heap
page read and write
4E88000
heap
page read and write
487F000
stack
page read and write
50C0000
direct allocation
page execute and read and write
79F2000
heap
page read and write
6AF0000
heap
page read and write
1EFCEC56000
heap
page read and write
3672000
heap
page read and write
895000
unkown
page execute and read and write
A389FFA000
stack
page read and write
7EFA000
heap
page read and write
4B81000
heap
page read and write
3EBD000
heap
page read and write
79D0000
heap
page read and write
31F0000
direct allocation
page read and write
8825000
heap
page read and write
4BF1000
heap
page read and write
85D9000
heap
page read and write
3B9F000
stack
page read and write
434F000
stack
page read and write
7D0F000
stack
page read and write
11D4000
heap
page read and write
5137DFE000
stack
page read and write
3A3F000
stack
page read and write
7BF1000
heap
page read and write
7BF8000
heap
page read and write
1ABA000
heap
page read and write
3A8F000
stack
page read and write
1EFCE55B000
heap
page read and write
85B6000
heap
page read and write
BB3000
unkown
page execute and write copy
52F0000
direct allocation
page execute and read and write
79E6000
heap
page read and write
4BD0000
direct allocation
page read and write
5138D7A000
stack
page read and write
4E88000
heap
page read and write
75DE000
stack
page read and write
455E000
stack
page read and write
144E000
heap
page read and write
1224000
heap
page read and write
F00000
direct allocation
page read and write
4971000
heap
page read and write
4B80000
heap
page read and write
1EFCE531000
heap
page read and write
50C0000
direct allocation
page execute and read and write
18E4000
heap
page read and write
5780000
direct allocation
page execute and read and write
D90000
heap
page read and write
4BF1000
heap
page read and write
7EE1000
heap
page read and write
39BA000
heap
page read and write
1326000
heap
page read and write
EB0000
heap
page read and write
3C95000
heap
page read and write
974000
heap
page read and write
471E000
stack
page read and write
7E62000
heap
page read and write
3CBE000
stack
page read and write
4EB1000
heap
page read and write
3DEE000
stack
page read and write
1EFCECC1000
heap
page read and write
1EFCE531000
heap
page read and write
12B4000
heap
page read and write
7C3B000
heap
page read and write
14B9000
unkown
page execute and write copy
32CD000
stack
page read and write
48A1000
heap
page read and write
1470000
heap
page read and write
5300000
direct allocation
page execute and read and write
1EFCECBC000
heap
page read and write
1EFCE52A000
heap
page read and write
7F50000
trusted library allocation
page read and write
1060000
heap
page read and write
51FF000
stack
page read and write
13E7000
heap
page read and write
1EFCECD7000
heap
page read and write
EF0000
heap
page read and write
1EFCDD4C000
heap
page read and write
69B0000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
4E88000
heap
page read and write
4B81000
heap
page read and write
2AF2AA60000
trusted library allocation
page read and write
118D000
heap
page read and write
103E000
stack
page read and write
F14000
heap
page read and write
85C8000
heap
page read and write
7AA4000
heap
page read and write
7C3B000
heap
page read and write
442F000
stack
page read and write
3E03000
heap
page read and write
7A0A000
heap
page read and write
19DD000
heap
page read and write
79D0000
heap
page read and write
4E71000
heap
page read and write
1402000
heap
page read and write
7E8B000
heap
page read and write
5201000
heap
page read and write
140F000
heap
page read and write
461F000
stack
page read and write
222A8320000
heap
page read and write
79B4000
heap
page read and write
479F000
stack
page read and write
79FE000
heap
page read and write
771000
unkown
page execute and write copy
15B4000
heap
page read and write
15E76160000
trusted library allocation
page read and write
B3E000
stack
page read and write
1EFCE508000
heap
page read and write
3802000
heap
page read and write
4EB1000
heap
page read and write
1498000
heap
page read and write
481F000
stack
page read and write
4E88000
heap
page read and write
3876000
heap
page read and write
1EFCEE0A000
heap
page read and write
4E82000
heap
page read and write
7C47000
heap
page read and write
4E60000
direct allocation
page read and write
177C000
heap
page read and write
3D0E000
stack
page read and write
18E4000
heap
page read and write
31F0000
direct allocation
page read and write
4C71000
heap
page read and write
5201000
heap
page read and write
2E20000
heap
page read and write
1EFCDD3B000
heap
page read and write
4B81000
heap
page read and write
5340000
direct allocation
page read and write
D40000
direct allocation
page read and write
1FBC2E40000
heap
page read and write
771000
unkown
page execute and read and write
7CE9000
heap
page read and write
8408000
heap
page read and write
1EFCDD4C000
heap
page read and write
1EFCDD3B000
heap
page read and write
45BE000
stack
page read and write
3824000
heap
page read and write
1483000
heap
page read and write
2AF253B0000
heap
page read and write
4EB1000
heap
page read and write
548F000
stack
page read and write
188A000
heap
page read and write
7CED000
heap
page read and write
4E84000
heap
page read and write
18E4000
heap
page read and write
4E82000
heap
page read and write
79A2000
heap
page read and write
19D1000
heap
page read and write
D49000
unkown
page execute and write copy
1465000
heap
page read and write
465E000
stack
page read and write
1EFCEE45000
heap
page read and write
170A000
heap
page read and write
187E000
stack
page read and write
7A9B000
heap
page read and write
438E000
stack
page read and write
4E84000
heap
page read and write
4870000
heap
page read and write
3917000
heap
page read and write
15A3000
heap
page read and write
115A000
heap
page read and write
FAF99FE000
unkown
page readonly
18E4000
heap
page read and write
13EF000
heap
page read and write
12EF000
heap
page read and write
38FE000
heap
page read and write
7BE0000
heap
page read and write
4EB1000
heap
page read and write
4B81000
heap
page read and write
150F000
heap
page read and write
32AE000
stack
page read and write
15AB000
heap
page read and write
1169000
heap
page read and write
3CC3000
heap
page read and write
7BD8000
heap
page read and write
51B0000
heap
page read and write
79D0000
heap
page read and write
11C5000
heap
page read and write
4C71000
heap
page read and write
18DD000
heap
page read and write
4E84000
heap
page read and write
7F24000
heap
page read and write
7CD5000
heap
page read and write
79E1000
heap
page read and write
33FF000
stack
page read and write
5350000
direct allocation
page execute and read and write
2FC0000
direct allocation
page read and write
FAF97FE000
unkown
page readonly
4FC0000
direct allocation
page execute and read and write
4E60000
direct allocation
page execute and read and write
5201000
heap
page read and write
5020000
direct allocation
page execute and read and write
1A60000
heap
page read and write
5100000
direct allocation
page execute and read and write
4EB1000
heap
page read and write
8825000
heap
page read and write
A50000
direct allocation
page read and write
3E99000
heap
page read and write
1329000
heap
page read and write
50C0000
direct allocation
page execute and read and write
EE0000
unkown
page read and write
50B0000
direct allocation
page execute and read and write
50C0000
remote allocation
page read and write
38AA000
heap
page read and write
36AE000
stack
page read and write
7E62000
heap
page read and write
3DDF000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
40AF000
stack
page read and write
7ACE000
stack
page read and write
3876000
heap
page read and write
18DA000
heap
page read and write
D4C000
unkown
page execute and write copy
36E5000
heap
page read and write
4B81000
heap
page read and write
3ACE000
stack
page read and write
4EB1000
heap
page read and write
4BE1000
heap
page read and write
7A24000
heap
page read and write
1341000
heap
page read and write
791F000
stack
page read and write
7A16000
heap
page read and write
A8D000
unkown
page execute and read and write
37D6000
heap
page read and write
188B000
heap
page read and write
1EFCE57F000
heap
page read and write
4E84000
heap
page read and write
7EA2000
heap
page read and write
11D4000
heap
page read and write
7A23000
heap
page read and write
12E6000
heap
page read and write
5270000
direct allocation
page execute and read and write
31DE000
stack
page read and write
4B81000
heap
page read and write
4E71000
heap
page read and write
1EFCE579000
heap
page read and write
42D2000
heap
page read and write
7EC4000
heap
page read and write
4E82000
heap
page read and write
7C27000
heap
page read and write
3AEE000
stack
page read and write
4B70000
direct allocation
page read and write
79EB000
heap
page read and write
1EFCE531000
heap
page read and write
85B3000
heap
page read and write
4BD0000
direct allocation
page read and write
3DAF000
stack
page read and write
3AAE000
stack
page read and write
7AC1000
heap
page read and write
D532FFE000
stack
page read and write
7473A7E000
unkown
page readonly
4E5E000
stack
page read and write
17D4000
heap
page read and write
6D10000
heap
page read and write
2B50000
heap
page read and write
4E71000
heap
page read and write
1F7000
stack
page read and write
808B000
heap
page read and write
3863000
heap
page read and write
37C3000
heap
page read and write
5BDD000
stack
page read and write
7EF8000
heap
page read and write
8C6000
unkown
page write copy
4B81000
heap
page read and write
1EFCE594000
heap
page read and write
315E000
stack
page read and write
3E87000
heap
page read and write
158E000
stack
page read and write
1EFCE529000
heap
page read and write
1EFCE531000
heap
page read and write
1389000
heap
page read and write
2D0F000
stack
page read and write
319F000
stack
page read and write
7A91000
heap
page read and write
38AA000
heap
page read and write
7C40000
heap
page read and write
7D20000
trusted library allocation
page read and write
318F000
stack
page read and write
1856000
heap
page read and write
1EFCE537000
heap
page read and write
5BF0000
heap
page read and write
1136000
heap
page read and write
79E1000
heap
page read and write
51A0000
direct allocation
page execute and read and write
394F000
stack
page read and write
5300000
direct allocation
page execute and read and write
7D0B000
heap
page read and write
3AF0000
trusted library allocation
page read and write
2AF2AA03000
trusted library allocation
page read and write
1A15000
heap
page read and write
6520000
heap
page read and write
7CDA000
heap
page read and write
15AD000
heap
page read and write
42D7000
heap
page read and write
1EFCE581000
heap
page read and write
19EF000
stack
page read and write
1EFCECC9000
heap
page read and write
3C81000
heap
page read and write
6EA000
heap
page read and write
16F5000
heap
page read and write
8422000
heap
page read and write
2AF2AD2D000
heap
page read and write
1368000
stack
page read and write
32DF000
stack
page read and write
1A15000
heap
page read and write
4EB1000
heap
page read and write
2AF2A940000
trusted library allocation
page read and write
13AE000
stack
page read and write
8405000
heap
page read and write
50C0000
remote allocation
page read and write
3DBB000
heap
page read and write
1087000
heap
page read and write
4C60000
direct allocation
page read and write
1697000
heap
page read and write
974000
heap
page read and write
1EFCE57C000
heap
page read and write
3F6F000
stack
page read and write
121F000
heap
page read and write
A68000
unkown
page execute and read and write
5288000
stack
page read and write
8FF000
unkown
page read and write
4F50000
direct allocation
page execute and read and write
1224000
heap
page read and write
7C64000
heap
page read and write
4E60000
direct allocation
page execute and read and write
3DB0000
heap
page read and write
910000
heap
page read and write
7C3E000
heap
page read and write
317F000
stack
page read and write
780D000
stack
page read and write
7BF8000
heap
page read and write
4EB1000
heap
page read and write
B87000
unkown
page execute and read and write
3D0B000
heap
page read and write
4E84000
heap
page read and write
63D000
trusted library allocation
page execute and read and write
444F000
stack
page read and write
4C71000
heap
page read and write
5202000
heap
page read and write
17CC000
heap
page read and write
D40000
direct allocation
page read and write
7C3B000
heap
page read and write
12B4000
heap
page read and write
4B81000
heap
page read and write
18A7000
heap
page read and write
79C5000
heap
page read and write
148E000
stack
page read and write
1224000
heap
page read and write
4BF1000
heap
page read and write
5350000
direct allocation
page execute and read and write
1ACE000
heap
page read and write
4B81000
heap
page read and write
5201000
heap
page read and write
4E82000
heap
page read and write
62A2000
heap
page read and write
7EE3000
heap
page read and write
118A000
heap
page read and write
7CBF000
stack
page read and write
1381000
heap
page read and write
13EF000
stack
page read and write
B01000
heap
page read and write
3B1F000
stack
page read and write
498F000
stack
page read and write
4B81000
heap
page read and write
4E86000
heap
page read and write
2E4E000
stack
page read and write
7C0B000
heap
page read and write
4B81000
heap
page read and write
15E0000
heap
page read and write
79A2000
heap
page read and write
2DFE000
stack
page read and write
4BD0000
direct allocation
page read and write
7C31000
heap
page read and write
346E000
stack
page read and write
15E77F0D000
heap
page read and write
5201000
heap
page read and write
4C71000
heap
page read and write
4F80000
direct allocation
page execute and read and write
BB2000
unkown
page execute and read and write
18E4000
heap
page read and write
7AB2000
heap
page read and write
7CE0000
heap
page read and write
8824000
heap
page read and write
D4C000
unkown
page execute and write copy
330F000
stack
page read and write
4BE1000
heap
page read and write
1924000
heap
page read and write
79E2000
heap
page read and write
672F000
stack
page read and write
1224000
heap
page read and write
7DDD000
stack
page read and write
4FB0000
trusted library allocation
page read and write
3E00000
heap
page read and write
85E0000
trusted library allocation
page read and write
50BF000
stack
page read and write
1EFCDC8D000
heap
page read and write
460000
heap
page read and write
48A1000
heap
page read and write
4A70000
direct allocation
page read and write
1EFCE52A000
heap
page read and write
1379000
heap
page read and write
7CE3000
heap
page read and write
2AF253D0000
heap
page read and write
F14000
heap
page read and write
1369000
heap
page read and write
4E84000
heap
page read and write
1470000
direct allocation
page read and write
85B6000
heap
page read and write
1EFCE581000
heap
page read and write
434E000
stack
page read and write
150E000
heap
page read and write
1D65000
direct allocation
page read and write
4C71000
heap
page read and write
A38A3FB000
stack
page read and write
50C0000
direct allocation
page execute and read and write
51A0000
remote allocation
page read and write
79C5000
heap
page read and write
1444000
heap
page read and write
1EFCE533000
heap
page read and write
4EB1000
heap
page read and write
1201000
heap
page read and write
399D000
trusted library allocation
page read and write
974000
heap
page read and write
7EB4000
heap
page read and write
5201000
heap
page read and write
1521000
heap
page read and write
5220000
heap
page read and write
7C0B000
heap
page read and write
551E000
stack
page read and write
1EFCE530000
heap
page read and write
17F9000
heap
page read and write
52B0000
direct allocation
page execute and read and write
38FF000
heap
page read and write
483E000
stack
page read and write
4BBF000
stack
page read and write
B88000
unkown
page execute and write copy
171B000
heap
page read and write
3AB7000
heap
page read and write
8825000
heap
page read and write
1EFCE594000
heap
page read and write
1EFCE553000
heap
page read and write
1EFCE57F000
heap
page read and write
3200000
heap
page read and write
7C40000
heap
page read and write
1732000
heap
page read and write
11E0000
heap
page read and write
11CE000
stack
page read and write
1418000
heap
page read and write
5300000
direct allocation
page read and write
4E82000
heap
page read and write
842F000
heap
page read and write
5840000
remote allocation
page read and write
4B81000
heap
page read and write
3937000
heap
page read and write
7EE3000
heap
page read and write
79B8000
heap
page read and write
4B81000
heap
page read and write
7CE9000
heap
page read and write
1C5F000
stack
page read and write
13A4000
heap
page read and write
72FD000
stack
page read and write
20474800000
unkown
page read and write
45BE000
stack
page read and write
5350000
direct allocation
page execute and read and write
18E4000
heap
page read and write
4BD0000
direct allocation
page read and write
8409000
heap
page read and write
7D0B000
heap
page read and write
7F50000
trusted library allocation
page read and write
1EFCDCA3000
heap
page read and write
8F7000
unkown
page read and write
133C000
heap
page read and write
3C8C000
heap
page read and write
5308000
direct allocation
page read and write
FAFA5FE000
unkown
page readonly
3E7A000
heap
page read and write
7AA4000
heap
page read and write
7ABD000
heap
page read and write
1EFCE55A000
heap
page read and write
4BE1000
heap
page read and write
7A12000
heap
page read and write
1EFCEE02000
heap
page read and write
125F000
heap
page read and write
85BD000
heap
page read and write
7EE2000
heap
page read and write
4E86000
heap
page read and write
1EFCE533000
heap
page read and write
4E82000
heap
page read and write
1EFCEE00000
heap
page read and write
16FC000
heap
page read and write
1EFCEE43000
heap
page read and write
552D000
stack
page read and write
7A70000
remote allocation
page read and write
15E8000
heap
page read and write
7C31000
heap
page read and write
7ABD000
heap
page read and write
1470000
heap
page read and write
4C71000
heap
page read and write
85B6000
heap
page read and write
7A0A000
heap
page read and write
13DA000
heap
page read and write
4E8A000
heap
page read and write
12E4000
heap
page read and write
4E3F000
stack
page read and write
16ED000
heap
page read and write
4EB1000
heap
page read and write
3961000
heap
page read and write
1542000
heap
page read and write
12B0000
heap
page read and write
31F0000
direct allocation
page read and write
3C8A000
heap
page read and write
1EFCE55A000
heap
page read and write
1668000
direct allocation
page read and write
79EC000
heap
page read and write
11D1000
heap
page read and write
12B0000
heap
page read and write
4D50000
direct allocation
page execute and read and write
1863000
heap
page read and write
5030000
direct allocation
page execute and read and write
7C67000
heap
page read and write
3E86000
heap
page read and write
E2F000
stack
page read and write
2B57000
heap
page read and write
1EFCE52A000
heap
page read and write
4971000
heap
page read and write
1EFCEC3D000
heap
page read and write
85A9000
heap
page read and write
15E77ED0000
heap
page read and write
382E000
heap
page read and write
4A70000
direct allocation
page read and write
2FC0000
direct allocation
page read and write
3E37000
heap
page read and write
1EFCE57F000
heap
page read and write
A389E7E000
stack
page read and write
4EB1000
heap
page read and write
19E4000
heap
page read and write
155C000
heap
page read and write
4B70000
direct allocation
page read and write
3A2F000
stack
page read and write
3824000
heap
page read and write
14F9000
heap
page read and write
8825000
heap
page read and write
2AF26240000
trusted library allocation
page read and write
18E0000
heap
page read and write
18AF000
heap
page read and write
130A000
unkown
page execute and read and write
4E82000
heap
page read and write
127E000
heap
page read and write
1EFCE57C000
heap
page read and write
2AF2AD17000
heap
page read and write
2AF26590000
trusted library section
page readonly
3879000
heap
page read and write
4B81000
heap
page read and write
7C67000
heap
page read and write
1EFCECCC000
heap
page read and write
3CCE000
heap
page read and write
457F000
stack
page read and write
974000
heap
page read and write
55BE000
stack
page read and write
BB2000
unkown
page execute and write copy
5160000
direct allocation
page execute and read and write
330F000
stack
page read and write
7C4C000
heap
page read and write
171E000
heap
page read and write
1304000
heap
page read and write
34FF000
stack
page read and write
5201000
heap
page read and write
1793000
heap
page read and write
222A83C5000
heap
page read and write
D6F000
stack
page read and write
1224000
heap
page read and write
7A91000
heap
page read and write
4B81000
heap
page read and write
4E82000
heap
page read and write
3D72000
heap
page read and write
4E82000
heap
page read and write
20474C00000
heap
page read and write
17E6000
heap
page read and write
4BF0000
heap
page read and write
371F000
stack
page read and write
19A9000
heap
page read and write
4E82000
heap
page read and write
1EFCE50F000
heap
page read and write
4EB1000
heap
page read and write
3F8F000
stack
page read and write
18E4000
heap
page read and write
4E84000
heap
page read and write
D1000
unkown
page execute read
1EFCE572000
heap
page read and write
6890000
heap
page read and write
7A0A000
heap
page read and write
4B70000
direct allocation
page read and write
7A19000
heap
page read and write
8C2C000
stack
page read and write
1AF2000
heap
page read and write
48A1000
heap
page read and write
76E0000
remote allocation
page read and write
7C0B000
heap
page read and write
4E82000
heap
page read and write
ED7000
unkown
page read and write
4E86000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
3695000
heap
page read and write
15F9000
heap
page read and write
1EFCDD4C000
heap
page read and write
48A1000
heap
page read and write
11D4000
heap
page read and write
3A10000
heap
page read and write
48A0000
heap
page read and write
14CE000
heap
page read and write
8825000
heap
page read and write
7CE2000
heap
page read and write
4EB1000
heap
page read and write
515F000
stack
page read and write
5DF0000
heap
page read and write
4CB1000
heap
page read and write
132C000
unkown
page execute and write copy
1897000
heap
page read and write
29DE000
stack
page read and write
8AD000
unkown
page execute and write copy
38CD000
heap
page read and write
1EFCE581000
heap
page read and write
4BD0000
direct allocation
page read and write
326F000
stack
page read and write
7A0A000
heap
page read and write
4B81000
heap
page read and write
1EFCECBD000
heap
page read and write
50F0000
direct allocation
page execute and read and write
47AF000
stack
page read and write
149A000
heap
page read and write
2AF253E0000
heap
page read and write
5201000
heap
page read and write
AB2000
heap
page read and write
4C71000
heap
page read and write
3E8E000
stack
page read and write
5170000
direct allocation
page execute and read and write
12E4000
heap
page read and write
88C000
stack
page read and write
1408000
heap
page read and write
4AAE000
stack
page read and write
3F2F000
stack
page read and write
747347E000
unkown
page readonly
50C0000
remote allocation
page read and write
14DD000
heap
page read and write
4B70000
direct allocation
page read and write
8423000
heap
page read and write
4BF0000
heap
page read and write
182E000
heap
page read and write
7CD5000
heap
page read and write
3744000
heap
page read and write
1224000
heap
page read and write
146C000
heap
page read and write
327F000
stack
page read and write
1536000
heap
page read and write
7C3E000
heap
page read and write
7AB8000
heap
page read and write
4E86000
heap
page read and write
1220000
heap
page read and write
FAF8AFC000
stack
page read and write
51B0000
direct allocation
page execute and read and write
3888000
heap
page read and write
1721000
heap
page read and write
1A3F000
stack
page read and write
4E82000
heap
page read and write
1224000
heap
page read and write
7A19000
heap
page read and write
D0000
unkown
page readonly
1EFCE3A0000
remote allocation
page read and write
5201000
heap
page read and write
4E82000
heap
page read and write
12C9000
heap
page read and write
440F000
stack
page read and write
12D5000
heap
page read and write
4E86000
heap
page read and write
49AE000
stack
page read and write
4E84000
heap
page read and write
4E84000
heap
page read and write
5130000
direct allocation
page read and write
7D3E000
stack
page read and write
144E000
heap
page read and write
12B4000
heap
page read and write
41EE000
stack
page read and write
2AF25400000
heap
page read and write
17D5000
heap
page read and write
3E7A000
heap
page read and write
47FF000
stack
page read and write
4E82000
heap
page read and write
7A13000
heap
page read and write
1EFCE55F000
heap
page read and write
374E000
heap
page read and write
7D0B000
heap
page read and write
44AE000
stack
page read and write
1460000
heap
page read and write
7A19000
heap
page read and write
1EFCECB8000
heap
page read and write
4E82000
heap
page read and write
11D4000
heap
page read and write
4BE1000
heap
page read and write
4E60000
direct allocation
page read and write
1126000
heap
page read and write
222A8340000
heap
page read and write
1EFCE577000
heap
page read and write
8827000
heap
page read and write
4E84000
heap
page read and write
17C7000
heap
page read and write
1EFCE554000
heap
page read and write
2AF2AD08000
heap
page read and write
36BE000
stack
page read and write
3CCE000
stack
page read and write
5F7000
unkown
page write copy
133F000
heap
page read and write
1329000
unkown
page execute and write copy
3DBB000
heap
page read and write
34FF000
stack
page read and write
1EFCEC0A000
heap
page read and write
4BE1000
heap
page read and write
129C000
heap
page read and write
BA2000
unkown
page execute and read and write
1EFCECD3000
heap
page read and write
7EFE000
heap
page read and write
4E84000
heap
page read and write
5140000
direct allocation
page execute and read and write
4E82000
heap
page read and write
32FE000
stack
page read and write
D1000
unkown
page execute read
52E0000
direct allocation
page execute and read and write
1792000
heap
page read and write
1638000
heap
page read and write
4C71000
heap
page read and write
591000
unkown
page execute and write copy
12E6000
heap
page read and write
D4F000
unkown
page execute and read and write
37F8000
heap
page read and write
1EFCDD4C000
heap
page read and write
1910000
heap
page read and write
7AA4000
heap
page read and write
12E4000
heap
page read and write
4EB1000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
10E4000
heap
page read and write
12E4000
heap
page read and write
7F50000
trusted library allocation
page read and write
52C0000
direct allocation
page execute and read and write
141A000
heap
page read and write
4B81000
heap
page read and write
15CE000
stack
page read and write
590000
unkown
page read and write
2AF25D1A000
heap
page read and write
2AF2A900000
trusted library allocation
page read and write
8F2000
unkown
page execute and read and write
7C40000
heap
page read and write
5310000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
147E000
heap
page read and write
5200000
direct allocation
page execute and read and write
1A19000
heap
page read and write
4BE1000
heap
page read and write
54C0000
direct allocation
page execute and read and write
53E0000
heap
page read and write
3B02000
trusted library allocation
page read and write
D50000
unkown
page read and write
401E000
stack
page read and write
339F000
stack
page read and write
7D20000
trusted library allocation
page read and write
76E0000
remote allocation
page read and write
FAF8FFE000
unkown
page readonly
7F24000
heap
page read and write
4E8A000
heap
page read and write
4BE1000
heap
page read and write
3B6E000
stack
page read and write
3810000
heap
page read and write
3D58000
heap
page read and write
39DF000
stack
page read and write
1260000
heap
page read and write
79C5000
heap
page read and write
7C67000
heap
page read and write
4C71000
heap
page read and write
7EC4000
heap
page read and write
1192000
unkown
page execute and read and write
4BE1000
heap
page read and write
1EFCDC5F000
heap
page read and write
7CE3000
heap
page read and write
48A1000
heap
page read and write
4F30000
direct allocation
page execute and read and write
18E4000
heap
page read and write
11BD000
heap
page read and write
1224000
heap
page read and write
7A3F000
stack
page read and write
15E8000
heap
page read and write
4C60000
direct allocation
page read and write
4B81000
heap
page read and write
436F000
stack
page read and write
4911000
heap
page read and write
16CF000
heap
page read and write
12B4000
heap
page read and write
85D9000
heap
page read and write
467F000
stack
page read and write
1418000
heap
page read and write
FBF000
stack
page read and write
4E8A000
heap
page read and write
3A80000
heap
page read and write
1EFCE57C000
heap
page read and write
5180000
direct allocation
page execute and read and write
1419000
heap
page read and write
517E000
stack
page read and write
52D0000
heap
page read and write
8F2000
unkown
page execute and read and write
14AD000
heap
page read and write
79D0000
heap
page read and write
375A000
heap
page read and write
1329000
unkown
page execute and write copy
7CE9000
heap
page read and write
F14000
heap
page read and write
3AA6000
heap
page read and write
4E84000
heap
page read and write
13E0000
heap
page read and write
12E7000
heap
page read and write
3BCF000
stack
page read and write
1653000
heap
page read and write
1EFCE533000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
4E82000
heap
page read and write
1098000
heap
page read and write
8410000
heap
page read and write
69BE000
heap
page read and write
429F000
stack
page read and write
4E82000
heap
page read and write
4E71000
heap
page read and write
12DC000
heap
page read and write
8310000
trusted library allocation
page read and write
3E1A000
heap
page read and write
15E75F7A000
heap
page read and write
4EB1000
heap
page read and write
1EFCE400000
heap
page read and write
1925000
heap
page read and write
13F7000
heap
page read and write
354E000
stack
page read and write
2F6B000
stack
page read and write
3F4F000
stack
page read and write
117A000
unkown
page execute and read and write
7EE1000
heap
page read and write
4E60000
direct allocation
page read and write
1645000
heap
page read and write
50C0000
direct allocation
page execute and read and write
8422000
heap
page read and write
5330000
direct allocation
page execute and read and write
1470000
direct allocation
page read and write
4B81000
heap
page read and write
146D000
heap
page read and write
1369000
heap
page read and write
18B8000
heap
page read and write
12B4000
heap
page read and write
3CAE000
stack
page read and write
7AC0000
heap
page read and write
841A000
heap
page read and write
A38A1FE000
stack
page read and write
4BF1000
heap
page read and write
20474AE0000
trusted library allocation
page read and write
2AF25D5A000
heap
page read and write
7A19000
heap
page read and write
2E9E000
stack
page read and write
2AF25D1B000
heap
page read and write
C75000
heap
page read and write
7BF8000
heap
page read and write
4CEF000
stack
page read and write
4BE1000
heap
page read and write
7CD5000
heap
page read and write
4E86000
heap
page read and write
9BE000
stack
page read and write
1EFCE552000
heap
page read and write
974000
heap
page read and write
4A70000
direct allocation
page read and write
14C4000
heap
page read and write
5750000
direct allocation
page execute and read and write
36CF000
stack
page read and write
4E86000
heap
page read and write
3D72000
heap
page read and write
154F000
heap
page read and write
1EFCE510000
heap
page read and write
35F0000
heap
page read and write
4D70000
direct allocation
page execute and read and write
135F000
heap
page read and write
12C0000
heap
page read and write
3EEE000
heap
page read and write
4E86000
heap
page read and write
182F000
heap
page read and write
1156000
heap
page read and write
2AF2AD0A000
heap
page read and write
4F5F000
stack
page read and write
4BF1000
heap
page read and write
3F21000
heap
page read and write
3EA0000
heap
page read and write
362F000
stack
page read and write
841A000
heap
page read and write
5450000
direct allocation
page execute and read and write
4E71000
heap
page read and write
DD0000
heap
page read and write
E9F000
stack
page read and write
7C31000
heap
page read and write
F00000
direct allocation
page read and write
4E82000
heap
page read and write
5201000
heap
page read and write
A66000
unkown
page read and write
3CCF000
heap
page read and write
400000
remote allocation
page execute and read and write
125F000
heap
page read and write
1EFCDC45000
heap
page read and write
895000
unkown
page execute and read and write
4EB1000
heap
page read and write
4C71000
heap
page read and write
4855000
heap
page read and write
4911000
heap
page read and write
4ABE000
stack
page read and write
4E82000
heap
page read and write
1560000
heap
page read and write
3DF1000
heap
page read and write
3CC7000
heap
page read and write
79B7000
heap
page read and write
18F0000
heap
page read and write
2E10000
heap
page read and write
7AA4000
heap
page read and write
3C1F000
stack
page read and write
4E88000
heap
page read and write
131A000
heap
page read and write
2AF2AC8D000
heap
page read and write
19C000
unkown
page write copy
172B000
heap
page read and write
7995000
heap
page read and write
50C0000
direct allocation
page execute and read and write
1FBC3602000
trusted library allocation
page read and write
4E71000
heap
page read and write
4E88000
heap
page read and write
4E84000
heap
page read and write
145E000
stack
page read and write
7A9B000
heap
page read and write
172D000
heap
page read and write
5171000
direct allocation
page read and write
1EFCEE02000
heap
page read and write
14BA000
heap
page read and write
4BF1000
heap
page read and write
4971000
heap
page read and write
7A91000
heap
page read and write
591000
unkown
page execute and write copy
7CE3000
heap
page read and write
50C0000
direct allocation
page execute and read and write
16C000
unkown
page readonly
79C5000
heap
page read and write
7E62000
heap
page read and write
79E2000
heap
page read and write
374E000
heap
page read and write
840B000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
ED7000
unkown
page write copy
405E000
stack
page read and write
135C000
heap
page read and write
2AF2AC2B000
heap
page read and write
8AD000
unkown
page execute and write copy
7D20000
trusted library allocation
page read and write
7AA4000
heap
page read and write
6A1E000
stack
page read and write
5210000
heap
page read and write
79B8000
heap
page read and write
1451000
heap
page read and write
1127000
heap
page read and write
79B7000
heap
page read and write
1708000
heap
page read and write
357C000
stack
page read and write
4E86000
heap
page read and write
188E000
stack
page read and write
5130000
direct allocation
page execute and read and write
18E4000
heap
page read and write
2AF2A990000
trusted library allocation
page read and write
12E6000
heap
page read and write
37CF000
stack
page read and write
4E82000
heap
page read and write
1A17000
heap
page read and write
4E8A000
heap
page read and write
2047483B000
heap
page read and write
79E1000
heap
page read and write
4EB1000
heap
page read and write
4BD0000
direct allocation
page read and write
42D6000
heap
page read and write
390E000
stack
page read and write
4C71000
heap
page read and write
1550000
heap
page read and write
1EFCEE74000
heap
page read and write
53D0000
direct allocation
page execute and read and write
7A2A000
heap
page read and write
4E82000
heap
page read and write
11F7000
heap
page read and write
786B000
heap
page read and write
8FC000
unkown
page read and write
75CE000
stack
page read and write
4E84000
heap
page read and write
3B1E000
stack
page read and write
1EFCEE06000
heap
page read and write
1EFCDCA9000
heap
page read and write
4E88000
heap
page read and write
1EFCE556000
heap
page read and write
114E000
heap
page read and write
12E4000
heap
page read and write
1EFCE50F000
heap
page read and write
798E000
stack
page read and write
4B81000
heap
page read and write
974000
heap
page read and write
7A19000
heap
page read and write
4B70000
direct allocation
page read and write
7F21000
heap
page read and write
15B7000
heap
page read and write
12BC000
heap
page read and write
1EFCE552000
heap
page read and write
4851000
heap
page read and write
10FA000
stack
page read and write
4B81000
heap
page read and write
14E2000
heap
page read and write
4E88000
heap
page read and write
3A52000
heap
page read and write
4C71000
heap
page read and write
4FE000
stack
page read and write
A00000
unkown
page read and write
7BE0000
heap
page read and write
1538000
heap
page read and write
3E79000
heap
page read and write
4E84000
heap
page read and write
5020000
direct allocation
page execute and read and write
106F000
unkown
page read and write
14AA000
heap
page read and write
1EFCE552000
heap
page read and write
1598000
heap
page read and write
4EB1000
heap
page read and write
3D15000
heap
page read and write
7E4D000
heap
page read and write
1144000
heap
page read and write
4E86000
heap
page read and write
11D4000
heap
page read and write
1420000
heap
page read and write
2AF2A9D4000
trusted library allocation
page read and write
7C31000
heap
page read and write
150C000
heap
page read and write
7ABD000
heap
page read and write
7CD5000
heap
page read and write
349F000
stack
page read and write
4E84000
heap
page read and write
7D0B000
heap
page read and write
53E0000
direct allocation
page execute and read and write
4B70000
direct allocation
page read and write
128F000
heap
page read and write
3978000
trusted library allocation
page read and write
1665000
direct allocation
page read and write
7E44000
heap
page read and write
17C2000
heap
page read and write
3732000
heap
page read and write
1EFCE57F000
heap
page read and write
4B81000
heap
page read and write
D5333FF000
stack
page read and write
4E88000
heap
page read and write
3975000
heap
page read and write
FAF91FE000
unkown
page readonly
4C71000
heap
page read and write
7EEC000
heap
page read and write
FAF89FE000
unkown
page readonly
1272000
heap
page read and write
7E3F000
stack
page read and write
4C71000
heap
page read and write
1EFCE531000
heap
page read and write
4E84000
heap
page read and write
1470000
direct allocation
page read and write
B9A000
unkown
page execute and read and write
7C28000
heap
page read and write
2DCB000
stack
page read and write
11E1000
heap
page read and write
3C6F000
stack
page read and write
79A2000
heap
page read and write
7BF8000
heap
page read and write
3ECC000
heap
page read and write
4E84000
heap
page read and write
2AF2AC00000
heap
page read and write
2E5F000
stack
page read and write
2AF2AF60000
trusted library allocation
page read and write
4A5E000
stack
page read and write
4970000
heap
page read and write
1787000
heap
page read and write
AF4000
heap
page read and write
1EFCE507000
heap
page read and write
2F4F000
stack
page read and write
4B81000
heap
page read and write
470F000
stack
page read and write
B40000
unkown
page readonly
798F000
stack
page read and write
1087000
heap
page read and write
1EFCEE02000
heap
page read and write
8C30000
heap
page read and write
15FF000
stack
page read and write
3A6A000
heap
page read and write
14BC000
unkown
page execute and write copy
4F00000
direct allocation
page execute and read and write
162F000
heap
page read and write
11CC000
heap
page read and write
D10000
unkown
page execute and read and write
79D0000
heap
page read and write
18E4000
heap
page read and write
1986000
heap
page read and write
4EB1000
heap
page read and write
1150000
direct allocation
page read and write
4B81000
heap
page read and write
17DA000
heap
page read and write
1A0000
unkown
page write copy
4E71000
heap
page read and write
1EFCE553000
heap
page read and write
7990000
heap
page read and write
743D000
stack
page read and write
5460000
direct allocation
page execute and read and write
D27000
unkown
page execute and read and write
1638000
heap
page read and write
D50000
unkown
page readonly
D51000
unkown
page execute and write copy
4BAE000
stack
page read and write
7D0B000
heap
page read and write
85B6000
heap
page read and write
430F000
stack
page read and write
7CD1000
heap
page read and write
388F000
heap
page read and write
526F000
stack
page read and write
BA2000
unkown
page execute and read and write
1EFCEE15000
heap
page read and write
4E84000
heap
page read and write
1EFCE55D000
heap
page read and write
4F00000
direct allocation
page execute and read and write
54F0000
direct allocation
page execute and read and write
7EFA000
heap
page read and write
14B9000
unkown
page execute and write copy
4E82000
heap
page read and write
4F7F000
stack
page read and write
1EFCE3B0000
remote allocation
page read and write
87E1000
heap
page read and write
51B0000
direct allocation
page execute and read and write
7BE2000
heap
page read and write
3973000
heap
page read and write
1322000
unkown
page execute and read and write
19C000
unkown
page read and write
159F000
heap
page read and write
7A11000
heap
page read and write
4B81000
heap
page read and write
841A000
heap
page read and write
32CF000
stack
page read and write
2AF2AC57000
heap
page read and write
2AF25529000
heap
page read and write
36DE000
stack
page read and write
1EFCE579000
heap
page read and write
380F000
stack
page read and write
2AF2B000000
heap
page read and write
7D20000
trusted library allocation
page read and write
1323000
unkown
page execute and read and write
3CC8000
heap
page read and write
4B81000
heap
page read and write
1224000
heap
page read and write
4BF1000
heap
page read and write
12B4000
heap
page read and write
1295000
heap
page read and write
11B4000
heap
page read and write
FAF96FE000
unkown
page readonly
37BF000
stack
page read and write
4E8A000
heap
page read and write
10A4000
heap
page read and write
12B0000
heap
page read and write
17F3000
heap
page read and write
7B0000
heap
page read and write
3732000
heap
page read and write
FAF82FD000
stack
page read and write
79EB000
heap
page read and write
1424000
heap
page read and write
1331000
heap
page read and write
1418000
heap
page read and write
1460000
heap
page read and write
4E86000
heap
page read and write
7C62000
heap
page read and write
7AA7000
heap
page read and write
415E000
stack
page read and write
6896000
heap
page read and write
4FA0000
heap
page read and write
70B000
heap
page read and write
4EB1000
heap
page read and write
7BE5000
heap
page read and write
1EFCEC5C000
heap
page read and write
1418000
heap
page read and write
5680000
direct allocation
page execute and read and write
15E75EE8000
heap
page read and write
5800000
heap
page read and write
2C9F000
stack
page read and write
1067000
unkown
page write copy
1EFCDC97000
heap
page read and write
134E000
stack
page read and write
3811000
heap
page read and write
7AC1000
heap
page read and write
4B81000
heap
page read and write
7C59000
heap
page read and write
20474900000
trusted library allocation
page read and write
1215000
heap
page read and write
15F2000
heap
page read and write
7A91000
heap
page read and write
4EB1000
heap
page read and write
18E4000
heap
page read and write
2E0E000
stack
page read and write
1408000
heap
page read and write
18E4000
heap
page read and write
85BE000
heap
page read and write
303F000
stack
page read and write
3DEF000
heap
page read and write
3AE1000
heap
page read and write
1EFCDC75000
heap
page read and write
7CDF000
heap
page read and write
FAF8DFE000
unkown
page readonly
38F5000
heap
page read and write
A40000
trusted library allocation
page read and write
7F24000
heap
page read and write
FAF92FE000
unkown
page readonly
51376BB000
stack
page read and write
5075000
direct allocation
page read and write
7A30000
heap
page read and write
7CDA000
heap
page read and write
1175000
heap
page read and write
3ED8000
heap
page read and write
1324000
heap
page read and write
1EFCE529000
heap
page read and write
4E82000
heap
page read and write
D5334FE000
stack
page read and write
1EFCEE06000
heap
page read and write
2AF25D00000
heap
page read and write
4E40000
heap
page read and write
391A000
heap
page read and write
7A16000
heap
page read and write
7A93000
heap
page read and write
7CD6000
heap
page read and write
1224000
heap
page read and write
2AF2AD21000
heap
page read and write
57AD000
stack
page read and write
364F000
stack
page read and write
130C000
heap
page read and write
1EFCE508000
heap
page read and write
4B81000
heap
page read and write
1728000
heap
page read and write
3DE8000
heap
page read and write
4E88000
heap
page read and write
747357E000
stack
page read and write
365E000
stack
page read and write
3E4F000
heap
page read and write
51C0000
direct allocation
page execute and read and write
12B4000
heap
page read and write
170D000
heap
page read and write
4D2E000
stack
page read and write
3A57000
heap
page read and write
498E000
stack
page read and write
1264000
heap
page read and write
4E86000
heap
page read and write
15E75FC6000
heap
page read and write
4B81000
heap
page read and write
4A2F000
stack
page read and write
303F000
stack
page read and write
18D2000
heap
page read and write
16E8000
heap
page read and write
46DF000
stack
page read and write
12B4000
heap
page read and write
3665000
heap
page read and write
17D9000
heap
page read and write
394F000
stack
page read and write
6AF2000
heap
page read and write
A66000
unkown
page read and write
1240000
heap
page read and write
19E6000
heap
page read and write
3BBE000
stack
page read and write
36CF000
stack
page read and write
4E20000
direct allocation
page execute and read and write
39DE000
stack
page read and write
4EB1000
heap
page read and write
7A0A000
heap
page read and write
146F000
heap
page read and write
4E82000
heap
page read and write
48A1000
heap
page read and write
4CB1000
heap
page read and write
BA2000
unkown
page execute and read and write
5201000
heap
page read and write
368E000
stack
page read and write
4315000
heap
page read and write
12E4000
heap
page read and write
4E86000
heap
page read and write
1EFCEC99000
heap
page read and write
159F000
heap
page read and write
1EFCDB90000
heap
page read and write
7BE0000
heap
page read and write
D1000
unkown
page execute read
1EFCEE74000
heap
page read and write
F95000
heap
page read and write
17B0000
heap
page read and write
FAF947E000
stack
page read and write
4C71000
heap
page read and write
1EFCEE0F000
heap
page read and write
3D9E000
stack
page read and write
222A85C5000
heap
page read and write
7CEE000
heap
page read and write
7B5E000
stack
page read and write
18E4000
heap
page read and write
1EFCE55D000
heap
page read and write
1EFCE592000
heap
page read and write
1377000
heap
page read and write
3A2B000
heap
page read and write
1224000
heap
page read and write
12B4000
heap
page read and write
11D4000
heap
page read and write
50C0000
direct allocation
page execute and read and write
4D30000
direct allocation
page read and write
172D000
heap
page read and write
4E88000
heap
page read and write
5F7000
unkown
page write copy
332F000
stack
page read and write
358F000
stack
page read and write
1447000
heap
page read and write
12B4000
heap
page read and write
79F2000
heap
page read and write
4E8A000
heap
page read and write
4E8A000
heap
page read and write
15E761C5000
heap
page read and write
1998000
heap
page read and write
79E7000
heap
page read and write
79F8000
heap
page read and write
50B0000
direct allocation
page execute and read and write
2AF26570000
trusted library section
page readonly
382E000
stack
page read and write
140B000
heap
page read and write
17CB000
heap
page read and write
3945000
heap
page read and write
16E5000
heap
page read and write
14EE000
heap
page read and write
1508000
heap
page read and write
15B0000
heap
page read and write
11D4000
heap
page read and write
7EEC000
heap
page read and write
16DA000
heap
page read and write
85E0000
trusted library allocation
page read and write
5360000
direct allocation
page execute and read and write
7D0B000
heap
page read and write
41BE000
stack
page read and write
4E82000
heap
page read and write
1406000
heap
page read and write
A4F000
unkown
page execute and write copy
5137D7E000
unkown
page readonly
11D4000
heap
page read and write
386D000
heap
page read and write
79D8000
heap
page read and write
4B81000
heap
page read and write
974000
heap
page read and write
457E000
stack
page read and write
1305000
heap
page read and write
11D4000
heap
page read and write
1EFCECC9000
heap
page read and write
3749000
heap
page read and write
520000
heap
page read and write
7EE2000
heap
page read and write
4E82000
heap
page read and write
1EFCE50F000
heap
page read and write
4BF1000
heap
page read and write
E4F000
unkown
page execute and read and write
37D6000
heap
page read and write
1EFCE55C000
heap
page read and write
374E000
heap
page read and write
7A0000
heap
page read and write
7C0B000
heap
page read and write
1126000
heap
page read and write
B7F000
stack
page read and write
5010000
direct allocation
page read and write
591000
unkown
page execute and write copy
42F3000
heap
page read and write
18E4000
heap
page read and write
7C0F000
heap
page read and write
2FC0000
direct allocation
page read and write
85BE000
heap
page read and write
85BE000
heap
page read and write
7A32000
heap
page read and write
4C71000
heap
page read and write
4D50000
direct allocation
page execute and read and write
7A00000
heap
page read and write
147A000
heap
page read and write
1200000
heap
page read and write
8310000
trusted library allocation
page read and write
9DF000
stack
page read and write
7C3B000
heap
page read and write
7AA4000
heap
page read and write
4E8F000
stack
page read and write
974000
heap
page read and write
38EE000
stack
page read and write
4E84000
heap
page read and write
6B5E000
stack
page read and write
8303000
heap
page read and write
4CB1000
heap
page read and write
974000
heap
page read and write
7C0B000
heap
page read and write
50B0000
direct allocation
page execute and read and write
31AF000
stack
page read and write
50C0000
direct allocation
page execute and read and write
50F0000
direct allocation
page execute and read and write
50D0000
direct allocation
page execute and read and write
31DC000
stack
page read and write
3C5E000
stack
page read and write
19C000
unkown
page read and write
7EF3000
heap
page read and write
7A16000
heap
page read and write
41BF000
stack
page read and write
1985000
heap
page read and write
1921000
heap
page read and write
10FC000
stack
page read and write
4E82000
heap
page read and write
4F80000
direct allocation
page execute and read and write
352E000
stack
page read and write
1EFCEE1A000
heap
page read and write
3E84000
heap
page read and write
7AA9000
heap
page read and write
4D70000
trusted library allocation
page read and write
8825000
heap
page read and write
7A1C000
heap
page read and write
770000
unkown
page read and write
1EFCDBB0000
heap
page read and write
12C6000
unkown
page execute and read and write
50FE000
stack
page read and write
19BE000
heap
page read and write
7CE0000
heap
page read and write
1EFCE55B000
heap
page read and write
881B000
heap
page read and write
7BE0000
heap
page read and write
395A000
heap
page read and write
35CE000
stack
page read and write
4EB1000
heap
page read and write
4C71000
heap
page read and write
4B81000
heap
page read and write
3C80000
heap
page read and write
4C71000
heap
page read and write
7A9C000
heap
page read and write
4B81000
heap
page read and write
2047487D000
heap
page read and write
126E000
heap
page read and write
4F70000
direct allocation
page execute and read and write
4E82000
heap
page read and write
4B81000
heap
page read and write
7BE0000
heap
page read and write
4E86000
heap
page read and write
3AB3000
heap
page read and write
16C000
unkown
page readonly
1182000
unkown
page execute and read and write
841A000
heap
page read and write
87E5000
heap
page read and write
3911000
heap
page read and write
470E000
stack
page read and write
7CD5000
heap
page read and write
18B1000
heap
page read and write
30F0000
heap
page read and write
14D8000
heap
page read and write
4C60000
direct allocation
page read and write
4C71000
heap
page read and write
4A4E000
stack
page read and write
D27000
unkown
page execute and write copy
D41000
unkown
page execute and read and write
4EB1000
heap
page read and write
8300000
heap
page read and write
79D0000
heap
page read and write
85D9000
heap
page read and write
1A18000
heap
page read and write
4971000
heap
page read and write
4B81000
heap
page read and write
7AA4000
heap
page read and write
1FBC2C50000
heap
page read and write
5290000
direct allocation
page execute and read and write
4D40000
direct allocation
page execute and read and write
1EFCE57F000
heap
page read and write
3F6E000
stack
page read and write
3E2E000
stack
page read and write
3872000
heap
page read and write
79D0000
heap
page read and write
37FE000
stack
page read and write
770D000
stack
page read and write
7A9C000
heap
page read and write
19A4000
heap
page read and write
4B81000
heap
page read and write
79FE000
heap
page read and write
20474D13000
heap
page read and write
4ACF000
stack
page read and write
43FF000
stack
page read and write
8310000
trusted library allocation
page read and write
11D4000
heap
page read and write
1691000
heap
page read and write
3892000
heap
page read and write
117A000
heap
page read and write
1FBC2C70000
heap
page read and write
FAFA57E000
stack
page read and write
4E60000
direct allocation
page execute and read and write
30DF000
stack
page read and write
304F000
stack
page read and write
4E60000
direct allocation
page read and write
7C27000
heap
page read and write
85C1000
heap
page read and write
367F000
stack
page read and write
7CE3000
heap
page read and write
4E82000
heap
page read and write
974000
heap
page read and write
7CD0000
remote allocation
page read and write
20474D00000
heap
page read and write
7C0B000
heap
page read and write
3E5A000
heap
page read and write
4E71000
heap
page read and write
7C31000
heap
page read and write
79A2000
heap
page read and write
14F5000
heap
page read and write
11D4000
heap
page read and write
170F000
heap
page read and write
38EF000
stack
page read and write
5138A7E000
unkown
page readonly
1690000
heap
page read and write
7AA5000
heap
page read and write
4C71000
heap
page read and write
72E7000
heap
page read and write
128F000
heap
page read and write
11D4000
heap
page read and write
52C0000
direct allocation
page execute and read and write
E5D000
unkown
page execute and read and write
1EFCECC9000
heap
page read and write
15E8000
heap
page read and write
AE2000
heap
page read and write
141D000
heap
page read and write
A40000
heap
page read and write
4EB1000
heap
page read and write
FAF90FE000
unkown
page readonly
1074000
unkown
page execute and read and write
56AE000
stack
page read and write
1EFCE529000
heap
page read and write
14AF000
heap
page read and write
A5E000
unkown
page execute and read and write
565F000
stack
page read and write
407F000
stack
page read and write
454F000
stack
page read and write
8423000
heap
page read and write
1EFCEE12000
heap
page read and write
1EFCE584000
heap
page read and write
EDC000
unkown
page read and write
50C0000
direct allocation
page execute and read and write
3748000
heap
page read and write
4B81000
heap
page read and write
8089000
heap
page read and write
4B81000
heap
page read and write
7C47000
heap
page read and write
4C4E000
stack
page read and write
2AE2CFF000
stack
page read and write
1EFCE555000
heap
page read and write
A20000
heap
page read and write
85D9000
heap
page read and write
7A60000
remote allocation
page read and write
7C40000
heap
page read and write
146A000
heap
page read and write
5290000
direct allocation
page execute and read and write
30CE000
stack
page read and write
155F000
stack
page read and write
3FAF000
stack
page read and write
1EFCEE13000
heap
page read and write
4D0E000
stack
page read and write
439F000
stack
page read and write
12B4000
heap
page read and write
7AC1000
heap
page read and write
14B9000
unkown
page execute and write copy
12B0000
heap
page read and write
4E82000
heap
page read and write
4E88000
heap
page read and write
7EE2000
heap
page read and write
16EE000
heap
page read and write
4E8A000
heap
page read and write
EBE000
stack
page read and write
7A16000
heap
page read and write
42DE000
stack
page read and write
2047482B000
heap
page read and write
48A1000
heap
page read and write
11C4000
heap
page read and write
18D2000
heap
page read and write
7B7F000
stack
page read and write
3910000
heap
page read and write
7C47000
heap
page read and write
4B81000
heap
page read and write
47EE000
stack
page read and write
4E88000
heap
page read and write
4EB1000
heap
page read and write
3929000
heap
page read and write
FAF84F7000
stack
page read and write
79E2000
heap
page read and write
1A0F000
heap
page read and write
50C0000
direct allocation
page execute and read and write
747387E000
unkown
page readonly
662D000
stack
page read and write
38CF000
stack
page read and write
1EFCE532000
heap
page read and write
974000
heap
page read and write
1080000
heap
page read and write
4E84000
heap
page read and write
1EFCE52E000
heap
page read and write
1EFCEE05000
heap
page read and write
3461000
trusted library allocation
page read and write
7AA5000
heap
page read and write
1338000
heap
page read and write
11CC000
heap
page read and write
1731000
heap
page read and write
38F4000
heap
page read and write
130A000
unkown
page execute and read and write
DF0000
heap
page read and write
7EE1000
heap
page read and write
4E84000
heap
page read and write
48A1000
heap
page read and write
1172000
heap
page read and write
F00000
direct allocation
page read and write
4E84000
heap
page read and write
4A6E000
stack
page read and write
14C4000
heap
page read and write
7A17000
heap
page read and write
7BE2000
heap
page read and write
7CE0000
heap
page read and write
115E000
heap
page read and write
4C71000
heap
page read and write
3CC3000
heap
page read and write
105C000
stack
page read and write
787F000
stack
page read and write
6C2D000
stack
page read and write
1985000
heap
page read and write
7C27000
heap
page read and write
3AA2000
heap
page read and write
3EB3000
heap
page read and write
7D20000
trusted library allocation
page read and write
19F5000
heap
page read and write
20474915000
trusted library allocation
page read and write
4E88000
heap
page read and write
7CED000
heap
page read and write
126B000
heap
page read and write
2AF2AA00000
trusted library allocation
page read and write
50C0000
direct allocation
page execute and read and write
1638000
heap
page read and write
4E60000
direct allocation
page read and write
7A70000
remote allocation
page read and write
758E000
stack
page read and write
12E4000
heap
page read and write
4E84000
heap
page read and write
1733000
heap
page read and write
367F000
stack
page read and write
513887E000
unkown
page readonly
124D000
heap
page read and write
458E000
stack
page read and write
56A0000
direct allocation
page execute and read and write
12A0000
heap
page read and write
4F00000
direct allocation
page execute and read and write
39AE000
stack
page read and write
17B0000
heap
page read and write
4E84000
heap
page read and write
13DB000
heap
page read and write
4A7E000
stack
page read and write
3F23000
heap
page read and write
150C000
heap
page read and write
2A20000
direct allocation
page read and write
7CD5000
heap
page read and write
385F000
stack
page read and write
384E000
stack
page read and write
50A0000
direct allocation
page execute and read and write
79C5000
heap
page read and write
3DCF000
stack
page read and write
1308000
heap
page read and write
4E71000
heap
page read and write
5A4E000
stack
page read and write
3F23000
heap
page read and write
3874000
heap
page read and write
10CE000
heap
page read and write
1EFCE50F000
heap
page read and write
1EFCE55B000
heap
page read and write
50C0000
direct allocation
page execute and read and write
7AA6000
heap
page read and write
2F1F000
stack
page read and write
48CE000
stack
page read and write
14C7000
heap
page read and write
45CF000
stack
page read and write
11CF000
heap
page read and write
11B5000
heap
page read and write
54C000
stack
page read and write
4E84000
heap
page read and write
D27000
unkown
page execute and read and write
8920000
heap
page read and write
7E44000
heap
page read and write
85E0000
trusted library allocation
page read and write
747367E000
unkown
page readonly
46BF000
stack
page read and write
31CE000
stack
page read and write
4B70000
direct allocation
page read and write
1EFCE50F000
heap
page read and write
3FCE000
stack
page read and write
3A6A000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
5320000
direct allocation
page execute and read and write
1224000
heap
page read and write
140C000
heap
page read and write
344E000
stack
page read and write
2450000
heap
page read and write
3E3E000
stack
page read and write
83F8000
heap
page read and write
3B8E000
stack
page read and write
5330000
direct allocation
page execute and read and write
7C3E000
heap
page read and write
7B1F000
stack
page read and write
3775000
heap
page read and write
1215000
heap
page read and write
17A7000
heap
page read and write
172E000
heap
page read and write
50C0000
direct allocation
page execute and read and write
1056000
heap
page read and write
5190000
direct allocation
page execute and read and write
85B6000
heap
page read and write
12B4000
heap
page read and write
52A0000
direct allocation
page execute and read and write
1475000
heap
page read and write
4EB1000
heap
page read and write
4E86000
heap
page read and write
3E4F000
stack
page read and write
3C8F000
stack
page read and write
113C000
heap
page read and write
3C9E000
stack
page read and write
5138579000
stack
page read and write
125F000
heap
page read and write
48B0000
heap
page read and write
1348000
heap
page read and write
14F0000
heap
page read and write
4D50000
direct allocation
page execute and read and write
1902000
heap
page read and write
4F70000
direct allocation
page execute and read and write
1776000
heap
page read and write
79FE000
heap
page read and write
3FAE000
stack
page read and write
42FF000
stack
page read and write
46AF000
stack
page read and write
1680000
direct allocation
page execute and read and write
79D0000
heap
page read and write
1136000
unkown
page execute and read and write
14C5000
heap
page read and write
1EFCE573000
heap
page read and write
5080000
direct allocation
page execute and read and write
124C000
heap
page read and write
3DDF000
heap
page read and write
32EF000
stack
page read and write
1080000
heap
page read and write
3DCD000
heap
page read and write
868000
unkown
page execute and read and write
2FE0000
heap
page read and write
321F000
stack
page read and write
4BF1000
heap
page read and write
D5332FE000
unkown
page read and write
4BE1000
heap
page read and write
7EEC000
heap
page read and write
7A9C000
heap
page read and write
425F000
stack
page read and write
13AF000
heap
page read and write
799A000
heap
page read and write
7A19000
heap
page read and write
8AE000
unkown
page execute and write copy
1224000
heap
page read and write
11D4000
heap
page read and write
5120000
direct allocation
page execute and read and write
799A000
heap
page read and write
17C5000
heap
page read and write
8422000
heap
page read and write
7C40000
heap
page read and write
42E6000
heap
page read and write
92A000
stack
page read and write
101A000
heap
page read and write
4E82000
heap
page read and write
3EA2000
heap
page read and write
18E4000
heap
page read and write
7AA4000
heap
page read and write
974000
heap
page read and write
7A19000
heap
page read and write
4E71000
heap
page read and write
5201000
heap
page read and write
4E88000
heap
page read and write
1EFCEE04000
heap
page read and write
1898000
heap
page read and write
1792000
heap
page read and write
172B000
heap
page read and write
7A16000
heap
page read and write
4C71000
heap
page read and write
5180000
direct allocation
page execute and read and write
15E77DA0000
trusted library allocation
page read and write
1351000
heap
page read and write
15E761C0000
heap
page read and write
438E000
stack
page read and write
1A40000
direct allocation
page read and write
4E88000
heap
page read and write
7AA4000
heap
page read and write
18E4000
heap
page read and write
56A0000
direct allocation
page execute and read and write
7ABD000
heap
page read and write
5290000
heap
page read and write
4E6E000
stack
page read and write
3D7B000
heap
page read and write
7C6B000
heap
page read and write
1322000
unkown
page execute and write copy
591000
unkown
page execute and write copy
5070000
direct allocation
page read and write
4E84000
heap
page read and write
386E000
stack
page read and write
79D0000
heap
page read and write
119F000
heap
page read and write
F00000
direct allocation
page read and write
1EFCE531000
heap
page read and write
7495000
heap
page read and write
4C60000
direct allocation
page read and write
169D000
heap
page read and write
7C3B000
heap
page read and write
3CF1000
heap
page read and write
4EB1000
heap
page read and write
429E000
stack
page read and write
1317000
heap
page read and write
7C52000
heap
page read and write
2F3F000
stack
page read and write
5201000
heap
page read and write
79E1000
heap
page read and write
1EFCEE0A000
heap
page read and write
5380000
direct allocation
page execute and read and write
4BD0000
direct allocation
page read and write
18FF000
stack
page read and write
170A000
heap
page read and write
42EF000
stack
page read and write
3AA5000
heap
page read and write
340E000
stack
page read and write
4EB1000
heap
page read and write
556D000
stack
page read and write
17F8000
heap
page read and write
118D000
heap
page read and write
5140000
direct allocation
page execute and read and write
4851000
heap
page read and write
56C0000
direct allocation
page execute and read and write
584E000
stack
page read and write
388B000
heap
page read and write
3AFB000
heap
page read and write
14DA000
heap
page read and write
192000
unkown
page readonly
19C000
unkown
page read and write
39EE000
heap
page read and write
4C71000
heap
page read and write
38AF000
heap
page read and write
85B3000
heap
page read and write
4E86000
heap
page read and write
5020000
direct allocation
page execute and read and write
1EFCE554000
heap
page read and write
12EF000
heap
page read and write
7F50000
trusted library allocation
page read and write
4C71000
heap
page read and write
7995000
heap
page read and write
1067000
unkown
page read and write
4BF1000
heap
page read and write
3A4E000
stack
page read and write
1638000
heap
page read and write
4BE1000
heap
page read and write
FA0000
heap
page read and write
14BE000
heap
page read and write
5410000
direct allocation
page execute and read and write
79C5000
heap
page read and write
222A9E00000
heap
page read and write
53CC000
stack
page read and write
390E000
heap
page read and write
8825000
heap
page read and write
14B9000
unkown
page execute and write copy
1440000
heap
page read and write
7CD5000
heap
page read and write
20474892000
heap
page read and write
12B4000
heap
page read and write
4E84000
heap
page read and write
7C6B000
heap
page read and write
7AA4000
heap
page read and write
4C71000
heap
page read and write
1475000
heap
page read and write
130C000
heap
page read and write
4EB1000
heap
page read and write
A50000
heap
page execute and read and write
1464000
heap
page read and write
5201000
heap
page read and write
42FE000
stack
page read and write
7AA4000
heap
page read and write
14FA000
heap
page read and write
1733000
heap
page read and write
14AB000
heap
page read and write
F14000
heap
page read and write
1EFCEE06000
heap
page read and write
7F0000
heap
page read and write
CE5000
unkown
page execute and read and write
1405000
heap
page read and write
1141000
heap
page read and write
3F7E000
stack
page read and write
120C000
heap
page read and write
1377000
heap
page read and write
1476000
heap
page read and write
45CF000
stack
page read and write
4C71000
heap
page read and write
D1000
unkown
page execute read
7C27000
heap
page read and write
2AF2ACBC000
heap
page read and write
2F2F000
stack
page read and write
178C000
heap
page read and write
7C3E000
heap
page read and write
4EB1000
heap
page read and write
7F09000
heap
page read and write
7C31000
heap
page read and write
135F000
heap
page read and write
7EC4000
heap
page read and write
7BF8000
heap
page read and write
7BDF000
stack
page read and write
1527000
heap
page read and write
5020000
trusted library allocation
page read and write
133F000
heap
page read and write
38FD000
heap
page read and write
1249000
heap
page read and write
13AF000
heap
page read and write
8310000
trusted library allocation
page read and write
7995000
heap
page read and write
1AA4000
heap
page read and write
79B4000
heap
page read and write
2AF2AA60000
trusted library allocation
page read and write
DDB000
stack
page read and write
F14000
heap
page read and write
17D0000
heap
page read and write
408F000
stack
page read and write
4B81000
heap
page read and write
356E000
stack
page read and write
4E86000
heap
page read and write
1394000
heap
page read and write
8825000
heap
page read and write
1EFCE508000
heap
page read and write
17E5000
heap
page read and write
8825000
heap
page read and write
4E86000
heap
page read and write
5201000
heap
page read and write
38A3000
heap
page read and write
4C71000
heap
page read and write
18C0000
heap
page read and write
1878000
heap
page read and write
1704000
heap
page read and write
7A11000
heap
page read and write
1753000
heap
page read and write
496E000
stack
page read and write
141E000
heap
page read and write
50A0000
direct allocation
page execute and read and write
7A9C000
heap
page read and write
7D0B000
heap
page read and write
147E000
heap
page read and write
389E000
stack
page read and write
7EC4000
heap
page read and write
2AF25502000
heap
page read and write
7CD5000
heap
page read and write
352F000
stack
page read and write
14D5000
heap
page read and write
687F000
stack
page read and write
1EFCE50F000
heap
page read and write
7A0C000
heap
page read and write
3B3F000
stack
page read and write
79E1000
heap
page read and write
1EFCE57F000
heap
page read and write
4EB1000
heap
page read and write
1640000
heap
page read and write
E70000
heap
page read and write
128F000
heap
page read and write
1EFCEC3B000
heap
page read and write
4BF1000
heap
page read and write
13FE000
heap
page read and write
7E46000
heap
page read and write
4E8A000
heap
page read and write
A70000
heap
page read and write
124F000
heap
page read and write
1EFCE50F000
heap
page read and write
1EFCDC00000
heap
page read and write
79E1000
heap
page read and write
1D68000
direct allocation
page read and write
48A1000
heap
page read and write
1150000
direct allocation
page read and write
A66000
unkown
page write copy
366E000
stack
page read and write
469E000
stack
page read and write
377F000
stack
page read and write
2F0E000
stack
page read and write
3F4E000
stack
page read and write
10FC000
stack
page read and write
79D0000
heap
page read and write
474E000
stack
page read and write
1EFCECA0000
heap
page read and write
DDB000
stack
page read and write
4E70000
direct allocation
page execute and read and write
12E6000
heap
page read and write
7A60000
remote allocation
page read and write
57FF000
stack
page read and write
11D4000
heap
page read and write
8F7000
unkown
page write copy
4E82000
heap
page read and write
7EE7000
heap
page read and write
1189000
heap
page read and write
10D4000
heap
page read and write
527F000
stack
page read and write
1257000
heap
page read and write
7C29000
heap
page read and write
79F5000
heap
page read and write
4BF1000
heap
page read and write
181E000
heap
page read and write
4B81000
heap
page read and write
974000
heap
page read and write
4E30000
heap
page read and write
10BE000
heap
page read and write
3897000
heap
page read and write
1664000
heap
page read and write
5350000
direct allocation
page execute and read and write
32AF000
stack
page read and write
3925000
heap
page read and write
134C000
heap
page read and write
7F50000
trusted library allocation
page read and write
3D0B000
heap
page read and write
1475000
heap
page read and write
391F000
stack
page read and write
5D90000
heap
page read and write
557F000
stack
page read and write
171E000
heap
page read and write
3880000
heap
page read and write
4B81000
heap
page read and write
32BF000
stack
page read and write
7AA5000
heap
page read and write
D75000
direct allocation
page read and write
4E86000
heap
page read and write
3900000
trusted library allocation
page read and write
48A1000
heap
page read and write
1EFCECBE000
heap
page read and write
7CD4000
heap
page read and write
144F000
heap
page read and write
7D0B000
heap
page read and write
7C40000
heap
page read and write
4B81000
heap
page read and write
D0000
unkown
page readonly
13D0000
heap
page read and write
4E82000
heap
page read and write
460E000
stack
page read and write
85E0000
heap
page read and write
4B81000
heap
page read and write
13F7000
heap
page read and write
7A7D000
stack
page read and write
1EFCDD1A000
heap
page read and write
5290000
direct allocation
page execute and read and write
FAF83FE000
unkown
page readonly
4BF1000
heap
page read and write
4E84000
heap
page read and write
3E48000
heap
page read and write
500B000
stack
page read and write
4B81000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
83F1000
heap
page read and write
361E000
stack
page read and write
7A91000
heap
page read and write
2AF25496000
heap
page read and write
7D0B000
heap
page read and write
12B3000
heap
page read and write
11D4000
heap
page read and write
48A1000
heap
page read and write
2E27000
heap
page read and write
411F000
stack
page read and write
37FE000
stack
page read and write
42BF000
stack
page read and write
4E10000
direct allocation
page read and write
15E760A0000
trusted library allocation
page read and write
1439000
heap
page read and write
85C8000
heap
page read and write
1144000
heap
page read and write
1EFCDD3D000
heap
page read and write
7ABA000
heap
page read and write
382F000
stack
page read and write
7CEE000
heap
page read and write
7ABD000
heap
page read and write
1484000
heap
page read and write
4EB1000
heap
page read and write
5040000
direct allocation
page execute and read and write
1EFCE50F000
heap
page read and write
407F000
stack
page read and write
31F0000
direct allocation
page read and write
386B000
heap
page read and write
1EFCE3B0000
remote allocation
page read and write
3AAF000
heap
page read and write
1EFCE530000
heap
page read and write
79E1000
heap
page read and write
FAF98FB000
stack
page read and write
76BF000
stack
page read and write
4F20000
direct allocation
page execute and read and write
1660000
direct allocation
page read and write
4A8F000
stack
page read and write
7C57000
heap
page read and write
37BF000
stack
page read and write
1EFCE531000
heap
page read and write
4EB1000
heap
page read and write
87E1000
heap
page read and write
1EFCE529000
heap
page read and write
5190000
direct allocation
page execute and read and write
149A000
heap
page read and write
FEF000
stack
page read and write
5F7000
unkown
page write copy
895000
unkown
page execute and read and write
13EF000
heap
page read and write
3F8E000
stack
page read and write
3A4F000
stack
page read and write
1EFCECEC000
heap
page read and write
142A000
heap
page read and write
1AAA000
heap
page read and write
1395000
heap
page read and write
7F24000
heap
page read and write
3728000
heap
page read and write
5290000
direct allocation
page execute and read and write
4E84000
heap
page read and write
4BE0000
heap
page read and write
1172000
heap
page read and write
5140000
direct allocation
page execute and read and write
5020000
direct allocation
page execute and read and write
115D000
stack
page read and write
83E0000
heap
page read and write
4C80000
heap
page read and write
7D0B000
heap
page read and write
42C0000
heap
page read and write
13D0000
heap
page read and write
4B81000
heap
page read and write
4A6F000
stack
page read and write
877C000
stack
page read and write
7AA5000
heap
page read and write
D40000
direct allocation
page read and write
D19000
unkown
page execute and read and write
AEC000
stack
page read and write
79E1000
heap
page read and write
4C71000
heap
page read and write
175E000
heap
page read and write
11CA000
heap
page read and write
1100000
heap
page read and write
4E10000
direct allocation
page read and write
2AF2A992000
trusted library allocation
page read and write
4E88000
heap
page read and write
3E84000
heap
page read and write
4B81000
heap
page read and write
172C000
heap
page read and write
3703000
heap
page read and write
16F7000
heap
page read and write
1450000
heap
page read and write
4B81000
heap
page read and write
4E82000
heap
page read and write
FFE000
stack
page read and write
79F8000
heap
page read and write
4B81000
heap
page read and write
513807E000
unkown
page readonly
36A9000
heap
page read and write
A78000
heap
page read and write
4CAF000
stack
page read and write
5790000
direct allocation
page execute and read and write
149E000
heap
page read and write
31F0000
direct allocation
page read and write
5680000
direct allocation
page read and write
42F4000
heap
page read and write
1EFCEC12000
heap
page read and write
4E84000
heap
page read and write
1470000
direct allocation
page read and write
1FBC2D80000
trusted library allocation
page read and write
3BBE000
stack
page read and write
54DF000
stack
page read and write
5170000
direct allocation
page execute and read and write
7C13000
heap
page read and write
2AF26480000
trusted library allocation
page read and write
4E82000
heap
page read and write
10A4000
heap
page read and write
7E4D000
heap
page read and write
182E000
heap
page read and write
7E1E000
stack
page read and write
1EFCE553000
heap
page read and write
4BEF000
stack
page read and write
11D4000
heap
page read and write
7CDE000
heap
page read and write
ACD000
heap
page read and write
2AF2542B000
heap
page read and write
1323000
unkown
page execute and write copy
3BCF000
stack
page read and write
11EB000
heap
page read and write
7A1E000
stack
page read and write
513827E000
unkown
page readonly
4BE1000
heap
page read and write
37EE000
stack
page read and write
4E82000
heap
page read and write
1EFCECE3000
heap
page read and write
2AF25425000
heap
page read and write
1EFCE531000
heap
page read and write
129C000
heap
page read and write
316E000
stack
page read and write
222A83B6000
heap
page read and write
18D1000
heap
page read and write
5230000
direct allocation
page execute and read and write
7EC4000
heap
page read and write
2FC0000
direct allocation
page read and write
4CE0000
trusted library allocation
page read and write
4C77000
heap
page read and write
7F0A000
heap
page read and write
37F8000
heap
page read and write
7C0B000
heap
page read and write
13F4000
heap
page read and write
16DD000
heap
page read and write
1517000
heap
page read and write
1EFCEAA0000
remote allocation
page read and write
4E71000
heap
page read and write
1EFCED12000
heap
page read and write
37F8000
heap
page read and write
3B7F000
stack
page read and write
1067000
unkown
page read and write
1360000
heap
page read and write
316F000
stack
page read and write
121F000
heap
page read and write
350F000
stack
page read and write
1402000
heap
page read and write
4E88000
heap
page read and write
4E82000
heap
page read and write
5350000
direct allocation
page execute and read and write
7C27000
heap
page read and write
50C0000
direct allocation
page execute and read and write
2AF254A1000
heap
page read and write
1224000
heap
page read and write
41DF000
stack
page read and write
4EB1000
heap
page read and write
115A000
heap
page read and write
4EB1000
heap
page read and write
7D20000
trusted library allocation
page read and write
18E4000
heap
page read and write
2AF2ACBE000
heap
page read and write
466F000
stack
page read and write
7CDE000
heap
page read and write
4E84000
heap
page read and write
14DF000
heap
page read and write
5640000
trusted library allocation
page read and write
4EB1000
heap
page read and write
7D0B000
heap
page read and write
4E84000
heap
page read and write
7AA9000
heap
page read and write
4B81000
heap
page read and write
5310000
direct allocation
page execute and read and write
F14000
heap
page read and write
15E75F4C000
heap
page read and write
13DA000
heap
page read and write
1A40000
direct allocation
page read and write
4E71000
heap
page read and write
4CD0000
direct allocation
page read and write
1329000
unkown
page execute and write copy
4C60000
direct allocation
page read and write
79EC000
heap
page read and write
7998000
heap
page read and write
5A9C000
stack
page read and write
10F0000
heap
page read and write
12E4000
heap
page read and write
30F4000
heap
page read and write
32EE000
stack
page read and write
7D20000
trusted library allocation
page read and write
4E84000
heap
page read and write
85BE000
heap
page read and write
76DD000
stack
page read and write
3A17000
heap
page read and write
F00000
direct allocation
page read and write
ABC000
heap
page read and write
330E000
stack
page read and write
366F000
stack
page read and write
538E000
stack
page read and write
3A86000
heap
page read and write
1EFCDC85000
heap
page read and write
7CE0000
heap
page read and write
14B4000
unkown
page execute and write copy
4E60000
direct allocation
page execute and read and write
46EF000
stack
page read and write
15BE000
heap
page read and write
11B9000
heap
page read and write
4C71000
heap
page read and write
480F000
stack
page read and write
433E000
stack
page read and write
114B000
heap
page read and write
4BD0000
direct allocation
page read and write
3E98000
heap
page read and write
1EFCE577000
heap
page read and write
1EFCE510000
heap
page read and write
12E4000
heap
page read and write
1728000
heap
page read and write
7C3B000
heap
page read and write
5F7000
unkown
page write copy
AC4000
heap
page read and write
353E000
stack
page read and write
3A6F000
stack
page read and write
11C5000
heap
page read and write
309E000
stack
page read and write
4E82000
heap
page read and write
4E82000
heap
page read and write
12C1000
heap
page read and write
1EFCECB0000
heap
page read and write
7F50000
trusted library allocation
page read and write
5B0000
heap
page read and write
7CD5000
heap
page read and write
580D000
stack
page read and write
3DB0000
heap
page read and write
1224000
heap
page read and write
5320000
heap
page read and write
11E7000
heap
page read and write
1192000
unkown
page execute and read and write
AB6000
heap
page read and write
E5E000
unkown
page execute and write copy
4E84000
heap
page read and write
807F000
stack
page read and write
115A000
heap
page read and write
1704000
heap
page read and write
130C000
heap
page read and write
1EFCE532000
heap
page read and write
4DF1000
direct allocation
page read and write
17FE000
heap
page read and write
5370000
direct allocation
page execute and read and write
4E71000
heap
page read and write
1715000
heap
page read and write
11B7000
heap
page read and write
54D0000
direct allocation
page execute and read and write
4BE1000
heap
page read and write
4C71000
heap
page read and write
4E82000
heap
page read and write
85B6000
heap
page read and write
1EFCECBC000
heap
page read and write
36AF000
stack
page read and write
4B81000
heap
page read and write
36EE000
heap
page read and write
7C73000
heap
page read and write
7AB4000
heap
page read and write
2E4E000
stack
page read and write
50C0000
direct allocation
page execute and read and write
1224000
heap
page read and write
4E86000
heap
page read and write
79E2000
heap
page read and write
7C10000
heap
page read and write
1692000
heap
page read and write
1EFCE531000
heap
page read and write
5137F7C000
stack
page read and write
3EDD000
heap
page read and write
D532FF4000
stack
page read and write
4EB1000
heap
page read and write
52C0000
direct allocation
page execute and read and write
3947000
heap
page read and write
1296000
heap
page read and write
4C71000
heap
page read and write
1EC000
stack
page read and write
BA2000
unkown
page execute and read and write
2CDB000
stack
page read and write
3D6E000
stack
page read and write
1EFCE500000
heap
page read and write
3EDF000
stack
page read and write
1864000
heap
page read and write
1EFCEE24000
heap
page read and write
4EB1000
heap
page read and write
4B81000
heap
page read and write
7AA4000
heap
page read and write
733E000
stack
page read and write
51A0000
direct allocation
page execute and read and write
381E000
stack
page read and write
1A4000
unkown
page readonly
1EFCE535000
heap
page read and write
222A8388000
heap
page read and write
904000
unkown
page execute and read and write
1EFCDCD4000
heap
page read and write
4911000
heap
page read and write
79E2000
heap
page read and write
7BCF000
stack
page read and write
4E71000
heap
page read and write
415F000
stack
page read and write
974000
heap
page read and write
3ADF000
stack
page read and write
1189000
heap
page read and write
4E88000
heap
page read and write
12B1000
heap
page read and write
3876000
heap
page read and write
3EA0000
heap
page read and write
1EFCE57A000
heap
page read and write
4E82000
heap
page read and write
117E000
heap
page read and write
4E60000
direct allocation
page execute and read and write
494F000
stack
page read and write
7F50000
trusted library allocation
page read and write
399F000
stack
page read and write
4B81000
heap
page read and write
3CE8000
heap
page read and write
3B41000
heap
page read and write
7EE2000
heap
page read and write
860000
unkown
page read and write
4BE1000
heap
page read and write
12B4000
heap
page read and write
2047488E000
heap
page read and write
538F000
stack
page read and write
4BF1000
heap
page read and write
7C11000
heap
page read and write
15E75E00000
heap
page read and write
7A1E000
heap
page read and write
79E1000
heap
page read and write
5340000
direct allocation
page execute and read and write
31F0000
direct allocation
page read and write
1EFCE572000
heap
page read and write
1A0000
unkown
page write copy
7EB4000
heap
page read and write
442E000
stack
page read and write
7A13000
heap
page read and write
1EFCE581000
heap
page read and write
7C3B000
heap
page read and write
41CE000
stack
page read and write
4E71000
heap
page read and write
2AF254B3000
heap
page read and write
1483000
heap
page read and write
11FD000
unkown
page execute and read and write
4BE1000
heap
page read and write
1EFCDC7D000
heap
page read and write
23EE000
stack
page read and write
54B0000
direct allocation
page execute and read and write
525D000
stack
page read and write
4E30000
direct allocation
page execute and read and write
334E000
stack
page read and write
18E4000
heap
page read and write
8825000
heap
page read and write
4B81000
heap
page read and write
184C000
heap
page read and write
7CEC000
heap
page read and write
1EFCE510000
heap
page read and write
19DC000
heap
page read and write
396F000
stack
page read and write
79E1000
heap
page read and write
4C71000
heap
page read and write
1224000
heap
page read and write
4BF1000
heap
page read and write
3C97000
heap
page read and write
4E40000
direct allocation
page execute and read and write
79F5000
heap
page read and write
4BF1000
heap
page read and write
1136000
heap
page read and write
842F000
heap
page read and write
7C90000
trusted library allocation
page read and write
4E82000
heap
page read and write
4EB1000
heap
page read and write
7C47000
heap
page read and write
13CE000
stack
page read and write
4E71000
heap
page read and write
BFE000
unkown
page execute and read and write
4EB1000
heap
page read and write
4EB1000
heap
page read and write
1197000
heap
page read and write
8825000
heap
page read and write
1EFCE52E000
heap
page read and write
4E71000
heap
page read and write
2EAE000
stack
page read and write
3A3C000
heap
page read and write
81BF000
stack
page read and write
3D4E000
stack
page read and write
4E80000
heap
page read and write
47CF000
stack
page read and write
B87000
unkown
page execute and write copy
367B000
heap
page read and write
489F000
stack
page read and write
17E0000
heap
page read and write
DDB000
stack
page read and write
4B81000
heap
page read and write
D3E000
stack
page read and write
1807000
heap
page read and write
7A16000
heap
page read and write
4E82000
heap
page read and write
4E60000
direct allocation
page read and write
7D20000
trusted library allocation
page read and write
1224000
heap
page read and write
1EFCE55B000
heap
page read and write
117F000
heap
page read and write
4C71000
heap
page read and write
4E82000
heap
page read and write
633000
trusted library allocation
page execute and read and write
38C4000
heap
page read and write
4E84000
heap
page read and write
1EFCE508000
heap
page read and write
12E4000
heap
page read and write
4BF1000
heap
page read and write
470F000
stack
page read and write
7C67000
heap
page read and write
306F000
stack
page read and write
513847E000
unkown
page readonly
7CE7000
heap
page read and write
590000
unkown
page read and write
3465000
trusted library allocation
page read and write
5340000
direct allocation
page read and write
1285000
heap
page read and write
2AF25441000
heap
page read and write
447E000
stack
page read and write
1EFCE50F000
heap
page read and write
16C000
unkown
page readonly
390C000
heap
page read and write
1EFCECC9000
heap
page read and write
4C71000
heap
page read and write
CFC000
stack
page read and write
1540000
heap
page read and write
43AE000
stack
page read and write
1D90000
heap
page read and write
5570000
direct allocation
page execute and read and write
5C00000
heap
page read and write
12B4000
heap
page read and write
38CD000
heap
page read and write
7C27000
heap
page read and write
6D2E000
stack
page read and write
3A7F000
heap
page read and write
F10000
heap
page read and write
C6F000
stack
page read and write
1224000
heap
page read and write
378F000
heap
page read and write
79B4000
heap
page read and write
79B4000
heap
page read and write
2AF2A995000
trusted library allocation
page read and write
524F000
stack
page read and write
4D60000
direct allocation
page execute and read and write
2FE7000
heap
page read and write
1EFCE57C000
heap
page read and write
3A46000
heap
page read and write
594F000
stack
page read and write
79E1000
heap
page read and write
3F5F000
stack
page read and write
48A1000
heap
page read and write
5020000
direct allocation
page execute and read and write
11EA000
heap
page read and write
406E000
stack
page read and write
4E86000
heap
page read and write
FC000
stack
page read and write
FAFA07E000
stack
page read and write
436E000
stack
page read and write
A50000
direct allocation
page read and write
1525000
heap
page read and write
A38A2F9000
stack
page read and write
15E76160000
trusted library allocation
page read and write
F00000
direct allocation
page read and write
1EFCE50F000
heap
page read and write
2AF2AAF0000
trusted library allocation
page read and write
FAF8CFC000
stack
page read and write
A4F000
unkown
page execute and write copy
4B81000
heap
page read and write
52D0000
direct allocation
page execute and read and write
56FE000
stack
page read and write
5150000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
3E5B000
heap
page read and write
79C5000
heap
page read and write
3CBF000
stack
page read and write
4BF1000
heap
page read and write
797D000
stack
page read and write
7A15000
heap
page read and write
1751000
heap
page read and write
E1B000
stack
page read and write
3CCF000
stack
page read and write
7BF8000
heap
page read and write
599E000
stack
page read and write
903000
unkown
page write copy
118C000
heap
page read and write
7A12000
heap
page read and write
15B5000
heap
page read and write
10A4000
heap
page read and write
7C47000
heap
page read and write
12F6000
heap
page read and write
51C0000
direct allocation
page execute and read and write
4EB1000
heap
page read and write
4A7F000
stack
page read and write
7E4D000
heap
page read and write
1545000
heap
page read and write
4E00000
direct allocation
page execute and read and write
7CD5000
heap
page read and write
18E4000
heap
page read and write
119A000
stack
page read and write
378F000
heap
page read and write
7E4D000
heap
page read and write
4EB1000
heap
page read and write
38EF000
trusted library allocation
page read and write
7A0A000
heap
page read and write
3EE4000
heap
page read and write
3CEE000
stack
page read and write
7CED000
heap
page read and write
BFE000
unkown
page execute and read and write
4E84000
heap
page read and write
13A6000
heap
page read and write
7D0B000
heap
page read and write
3E00000
heap
page read and write
2AF265B0000
trusted library section
page readonly
144E000
stack
page read and write
8310000
trusted library allocation
page read and write
12E4000
heap
page read and write
5130000
direct allocation
page execute and read and write
130D000
heap
page read and write
7D0B000
heap
page read and write
5150000
direct allocation
page execute and read and write
42CF000
stack
page read and write
79C5000
heap
page read and write
7396000
heap
page read and write
222A8370000
heap
page read and write
314F000
stack
page read and write
1EFCE552000
heap
page read and write
F00000
direct allocation
page read and write
1224000
heap
page read and write
2AF2548F000
heap
page read and write
1EFCEE14000
heap
page read and write
50C0000
direct allocation
page execute and read and write
4B81000
heap
page read and write
2FC0000
direct allocation
page read and write
8AD000
unkown
page execute and write copy
325E000
stack
page read and write
6950000
heap
page read and write
175A000
heap
page read and write
EE4000
unkown
page execute and read and write
7E4A000
heap
page read and write
11D4000
heap
page read and write
1EFCE552000
heap
page read and write
4E82000
heap
page read and write
79A2000
heap
page read and write
771000
unkown
page execute and read and write
3B08000
heap
page read and write
38E6000
trusted library allocation
page read and write
2AF2ACF3000
heap
page read and write
17F0000
heap
page read and write
904000
unkown
page execute and read and write
4EB1000
heap
page read and write
372E000
stack
page read and write
4FBE000
stack
page read and write
1EFCE552000
heap
page read and write
8809000
heap
page read and write
1172000
heap
page read and write
13E9000
heap
page read and write
11C1000
heap
page read and write
1406000
heap
page read and write
ED2000
unkown
page execute and read and write
1304000
heap
page read and write
974000
heap
page read and write
3876000
heap
page read and write
417F000
stack
page read and write
20474838000
heap
page read and write
1515000
heap
page read and write
17E8000
heap
page read and write
1600000
heap
page read and write
13BE000
heap
page read and write
13E4000
heap
page read and write
3DFF000
stack
page read and write
590000
unkown
page readonly
7CED000
heap
page read and write
4E84000
heap
page read and write
12B0000
heap
page read and write
5201000
heap
page read and write
868000
unkown
page execute and read and write
36C0000
heap
page read and write
7EC4000
heap
page read and write
38FF000
heap
page read and write
1483000
heap
page read and write
1EFCECD7000
heap
page read and write
37C3000
heap
page read and write
3C90000
heap
page read and write
74D8000
heap
page read and write
40CF000
stack
page read and write
7A19000
heap
page read and write
85D9000
heap
page read and write
4E84000
heap
page read and write
3E8F000
heap
page read and write
15E8000
heap
page read and write
7C66000
heap
page read and write
18AA000
heap
page read and write
4BE1000
heap
page read and write
10CE000
stack
page read and write
14BC000
unkown
page execute and write copy
4C71000
heap
page read and write
4E82000
heap
page read and write
14DE000
heap
page read and write
2A40000
heap
page read and write
7BF8000
heap
page read and write
3BEF000
stack
page read and write
1EFCE556000
heap
page read and write
13E4000
heap
page read and write
8F2000
unkown
page execute and read and write
15E77DA0000
trusted library allocation
page read and write
974000
heap
page read and write
4C71000
heap
page read and write
1529000
heap
page read and write
3C4D000
stack
page read and write
D78000
direct allocation
page read and write
590000
unkown
page read and write
79E1000
heap
page read and write
1EFCDCC8000
heap
page read and write
8423000
heap
page read and write
7A93000
heap
page read and write
4851000
heap
page read and write
1EFCEC3A000
heap
page read and write
4BF1000
heap
page read and write
4E82000
heap
page read and write
5850000
heap
page read and write
370E000
stack
page read and write
771000
unkown
page execute and read and write
13FE000
stack
page read and write
106F000
unkown
page read and write
7E62000
heap
page read and write
165E000
stack
page read and write
4B81000
heap
page read and write
1372000
heap
page read and write
7C47000
heap
page read and write
7C10000
heap
page read and write
4E88000
heap
page read and write
7CE0000
heap
page read and write
1998000
heap
page read and write
56A0000
direct allocation
page execute and read and write
34EF000
stack
page read and write
2AF2AD31000
heap
page read and write
4EB1000
heap
page read and write
3E2F000
stack
page read and write
39DD000
heap
page read and write
8412000
heap
page read and write
79A2000
heap
page read and write
398E000
stack
page read and write
EDE000
stack
page read and write
4C71000
heap
page read and write
7C0B000
heap
page read and write
4BF1000
heap
page read and write
3B3E000
stack
page read and write
5720000
direct allocation
page execute and read and write
7AB8000
heap
page read and write
50C0000
direct allocation
page execute and read and write
18E4000
heap
page read and write
A4F000
unkown
page execute and write copy
175C000
heap
page read and write
1792000
heap
page read and write
1A15000
heap
page read and write
161D000
heap
page read and write
4EB1000
heap
page read and write
7AB8000
heap
page read and write
D532FED000
stack
page read and write
1EFCDC9C000
heap
page read and write
146C000
heap
page read and write
2C8C000
stack
page read and write
447E000
stack
page read and write
2E17000
heap
page read and write
492F000
stack
page read and write
7A0A000
heap
page read and write
8422000
heap
page read and write
421E000
stack
page read and write
19D1000
heap
page read and write
386B000
heap
page read and write
48A1000
heap
page read and write
4EB1000
heap
page read and write
7EF8000
heap
page read and write
4E82000
heap
page read and write
4E84000
heap
page read and write
1EFCEC58000
heap
page read and write
D40000
direct allocation
page read and write
79B7000
heap
page read and write
11D4000
heap
page read and write
40AE000
stack
page read and write
1EFCDD4C000
heap
page read and write
8FC000
unkown
page read and write
1A17000
heap
page read and write
5F7000
unkown
page read and write
5130000
direct allocation
page read and write
4E82000
heap
page read and write
7C0F000
heap
page read and write
12BC000
heap
page read and write
1348000
heap
page read and write
7EE6000
heap
page read and write
2AF2A9B0000
trusted library allocation
page read and write
79E4000
heap
page read and write
4BF1000
heap
page read and write
125E000
stack
page read and write
8F7000
unkown
page read and write
155E000
heap
page read and write
7CD5000
heap
page read and write
15BE000
heap
page read and write
BA9000
unkown
page execute and read and write
12B4000
heap
page read and write
1348000
heap
page read and write
4E84000
heap
page read and write
4E88000
heap
page read and write
4B81000
heap
page read and write
3A4B000
heap
page read and write
12E0000
heap
page read and write
128B000
heap
page read and write
384E000
stack
page read and write
2AF2AAE0000
trusted library allocation
page read and write
1509000
heap
page read and write
7E62000
heap
page read and write
110B000
stack
page read and write
4BE1000
heap
page read and write
7F09000
heap
page read and write
13DD000
heap
page read and write
79E1000
heap
page read and write
8825000
heap
page read and write
4B81000
heap
page read and write
7C60000
heap
page read and write
51B0000
direct allocation
page execute and read and write
5430000
direct allocation
page execute and read and write
5080000
direct allocation
page read and write
7A19000
heap
page read and write
14CA000
heap
page read and write
10E8000
heap
page read and write
2F0F000
stack
page read and write
12E4000
heap
page read and write
1272000
heap
page read and write
457F000
stack
page read and write
4BFE000
stack
page read and write
12CD000
heap
page read and write
1EFCDC8B000
heap
page read and write
7A91000
heap
page read and write
1EFCEC5B000
heap
page read and write
F00000
direct allocation
page read and write
1EFCEE03000
heap
page read and write
4D20000
direct allocation
page read and write
974000
heap
page read and write
445F000
stack
page read and write
18A7000
heap
page read and write
13F8000
heap
page read and write
15BE000
heap
page read and write
17B0000
heap
page read and write
3E99000
heap
page read and write
3751000
heap
page read and write
4B81000
heap
page read and write
1667000
heap
page read and write
4BE0000
heap
page read and write
7A91000
heap
page read and write
880E000
heap
page read and write
51A0000
direct allocation
page execute and read and write
79D0000
heap
page read and write
1420000
heap
page read and write
69C0000
heap
page read and write
12E4000
heap
page read and write
1760000
heap
page read and write
1EFCEE64000
heap
page read and write
46FE000
stack
page read and write
4EB1000
heap
page read and write
974000
heap
page read and write
7CDD000
stack
page read and write
1EFCE54D000
heap
page read and write
8410000
heap
page read and write
54EE000
stack
page read and write
841A000
heap
page read and write
594E000
stack
page read and write
4C71000
heap
page read and write
36CE000
stack
page read and write
85E0000
trusted library allocation
page read and write
1EFCE531000
heap
page read and write
7C73000
heap
page read and write
7F21000
heap
page read and write
7C27000
heap
page read and write
3A8E000
stack
page read and write
48A1000
heap
page read and write
4C60000
direct allocation
page read and write
106D000
unkown
page execute and read and write
18E4000
heap
page read and write
4EC5000
heap
page read and write
8820000
heap
page read and write
4C60000
direct allocation
page read and write
3BAF000
stack
page read and write
2FB0000
heap
page read and write
12E7000
heap
page read and write
142C000
heap
page read and write
7EB4000
heap
page read and write
7C0B000
heap
page read and write
87F0000
heap
page read and write
513837B000
stack
page read and write
4C71000
heap
page read and write
4E84000
heap
page read and write
7E44000
heap
page read and write
891C000
stack
page read and write
1EFCE530000
heap
page read and write
1EFCE530000
heap
page read and write
7E62000
heap
page read and write
7EFE000
heap
page read and write
4E84000
heap
page read and write
8423000
heap
page read and write
1224000
heap
page read and write
1312000
unkown
page execute and read and write
1EFCEE64000
heap
page read and write
12DE000
heap
page read and write
47DE000
stack
page read and write
8409000
heap
page read and write
5000000
direct allocation
page read and write
3CBF000
heap
page read and write
1EFCE552000
heap
page read and write
15E76000000
heap
page read and write
2F5E000
stack
page read and write
974000
heap
page read and write
3929000
heap
page read and write
375E000
stack
page read and write
4860000
heap
page read and write
7BF8000
heap
page read and write
8310000
trusted library allocation
page read and write
2AF25C02000
heap
page read and write
4E70000
direct allocation
page read and write
4BE1000
heap
page read and write
79F1000
heap
page read and write
3811000
heap
page read and write
50A0000
direct allocation
page execute and read and write
FAD000
stack
page read and write
4BF1000
heap
page read and write
4C71000
heap
page read and write
17C5000
heap
page read and write
D34000
unkown
page execute and write copy
38FF000
heap
page read and write
2047488E000
heap
page read and write
7C27000
heap
page read and write
8824000
heap
page read and write
1353000
heap
page read and write
1735000
heap
page read and write
4851000
heap
page read and write
1D60000
direct allocation
page read and write
375C000
heap
page read and write
176A000
heap
page read and write
5D9E000
stack
page read and write
18E4000
heap
page read and write
2AE2DFD000
stack
page read and write
20474D13000
heap
page read and write
5075000
direct allocation
page read and write
1435000
heap
page read and write
4B81000
heap
page read and write
37DF000
stack
page read and write
7EF0000
heap
page read and write
7C27000
heap
page read and write
1EFCE55A000
heap
page read and write
1EFCE552000
heap
page read and write
1170000
heap
page read and write
4B81000
heap
page read and write
52BD000
stack
page read and write
38DE000
stack
page read and write
7C5B000
heap
page read and write
4E60000
direct allocation
page read and write
38E6000
heap
page read and write
5F2000
unkown
page execute and read and write
7AC1000
heap
page read and write
7C3B000
heap
page read and write
79D0000
heap
page read and write
B5F000
heap
page read and write
12B4000
heap
page read and write
4EB1000
heap
page read and write
2AF2AC4F000
heap
page read and write
4CFF000
stack
page read and write
1158000
heap
page read and write
7AA9000
heap
page read and write
1EFCE52C000
heap
page read and write
15E75F91000
heap
page read and write
B63000
heap
page read and write
7995000
heap
page read and write
4910000
heap
page read and write
12E6000
heap
page read and write
370E000
stack
page read and write
1156000
heap
page read and write
5280000
direct allocation
page execute and read and write
A8D000
unkown
page execute and read and write
222A8240000
heap
page read and write
5400000
direct allocation
page execute and read and write
5290000
direct allocation
page execute and read and write
4E84000
heap
page read and write
12E4000
heap
page read and write
A61000
unkown
page execute and read and write
7AB4000
heap
page read and write
127B000
heap
page read and write
46AE000
stack
page read and write
13A1000
heap
page read and write
79C5000
heap
page read and write
1ADE000
heap
page read and write
5201000
heap
page read and write
5390000
direct allocation
page execute and read and write
175C000
heap
page read and write
4E71000
heap
page read and write
2AF2A9D0000
trusted library allocation
page read and write
1EFCE559000
heap
page read and write
1EFCE573000
heap
page read and write
3BDE000
stack
page read and write
1435000
heap
page read and write
5138F7D000
stack
page read and write
8310000
trusted library allocation
page read and write
3AB6000
heap
page read and write
1249000
heap
page read and write
7EAC000
heap
page read and write
42F3000
heap
page read and write
4C71000
heap
page read and write
446D000
stack
page read and write
14B4000
heap
page read and write
3973000
heap
page read and write
5090000
direct allocation
page execute and read and write
433E000
stack
page read and write
1264000
heap
page read and write
7C47000
heap
page read and write
79C5000
heap
page read and write
1470000
direct allocation
page read and write
30EE000
stack
page read and write
3E50000
heap
page read and write
1148000
heap
page read and write
7C3B000
heap
page read and write
1EFCE508000
heap
page read and write
4B80000
heap
page read and write
54D0000
direct allocation
page execute and read and write
79B8000
heap
page read and write
1876000
heap
page read and write
7A5F000
stack
page read and write
1224000
heap
page read and write
1204000
heap
page read and write
3F30000
heap
page read and write
8825000
heap
page read and write
903000
unkown
page write copy
15FB000
heap
page read and write
7EC4000
heap
page read and write
3F14000
heap
page read and write
3A5E000
heap
page read and write
51A1000
direct allocation
page read and write
7C67000
heap
page read and write
18E4000
heap
page read and write
114E000
stack
page read and write
4E71000
heap
page read and write
81FE000
stack
page read and write
8825000
heap
page read and write
605C000
heap
page read and write
8C6000
unkown
page read and write
7AA4000
heap
page read and write
4BF1000
heap
page read and write
11D9000
heap
page read and write
F70000
heap
page read and write
5BAE000
stack
page read and write
5540000
direct allocation
page execute and read and write
4B81000
heap
page read and write
1324000
unkown
page execute and write copy
1348000
heap
page read and write
3907000
heap
page read and write
3732000
heap
page read and write
1EFCE592000
heap
page read and write
7BF8000
heap
page read and write
7D20000
trusted library allocation
page read and write
34DE000
stack
page read and write
12B4000
heap
page read and write
4EB1000
heap
page read and write
5FE000
stack
page read and write
5010000
direct allocation
page read and write
1249000
heap
page read and write
841A000
heap
page read and write
12E4000
heap
page read and write
79E4000
heap
page read and write
6EE000
heap
page read and write
1453000
heap
page read and write
ADF000
heap
page read and write
38B0000
heap
page read and write
1224000
heap
page read and write
2FC0000
direct allocation
page read and write
8AE000
unkown
page execute and write copy
1475000
heap
page read and write
1F90000
heap
page read and write
50F0000
direct allocation
page execute and read and write
3A8F000
heap
page read and write
7CA7000
heap
page read and write
35EE000
stack
page read and write
4E4E000
stack
page read and write
448F000
stack
page read and write
3905000
heap
page read and write
2AE2C7F000
stack
page read and write
11F7000
heap
page read and write
4BF1000
heap
page read and write
2DDF000
stack
page read and write
4EB1000
heap
page read and write
1EFCE50F000
heap
page read and write
79B4000
heap
page read and write
4E84000
heap
page read and write
1EFCDC93000
heap
page read and write
513917E000
stack
page read and write
36F3000
heap
page read and write
1150000
direct allocation
page read and write
4E84000
heap
page read and write
4EB1000
heap
page read and write
1EFCE52D000
heap
page read and write
842F000
heap
page read and write
2AF2AAD0000
trusted library allocation
page read and write
ED2000
unkown
page execute and read and write
7AA6000
heap
page read and write
4E82000
heap
page read and write
443F000
stack
page read and write
2AF2AC1E000
heap
page read and write
4D3E000
stack
page read and write
7A16000
heap
page read and write
79C5000
heap
page read and write
4EB1000
heap
page read and write
1464000
heap
page read and write
386B000
heap
page read and write
12B4000
heap
page read and write
4B81000
heap
page read and write
4E82000
heap
page read and write
1328000
heap
page read and write
1475000
heap
page read and write
4E71000
heap
page read and write
EDC000
unkown
page read and write
904000
unkown
page execute and read and write
1EFCDC13000
heap
page read and write
8598000
heap
page read and write
184C000
heap
page read and write
1A4000
unkown
page readonly
1EFCECC9000
heap
page read and write
1875000
heap
page read and write
12B4000
heap
page read and write
4E82000
heap
page read and write
12FE000
stack
page read and write
85D9000
heap
page read and write
D19000
unkown
page execute and read and write
974000
heap
page read and write
7A93000
heap
page read and write
83F8000
heap
page read and write
3B2F000
stack
page read and write
54A0000
direct allocation
page execute and read and write
8B2B000
stack
page read and write
7AC1000
heap
page read and write
4A70000
direct allocation
page read and write
1381000
heap
page read and write
163E000
heap
page read and write
343E000
stack
page read and write
F14000
heap
page read and write
4C71000
heap
page read and write
38FF000
stack
page read and write
There are 6565 hidden memdumps, click here to show them.